From c82798769c4b2cb4a321dea27fade8bf084f2977 Mon Sep 17 00:00:00 2001
From: str4d http://i2p-projekt.i2p/hosts.txt (http://udhdrtrcetjm5sxzskjyr5ztpeszydbh4dpl3pl4utgqqw2v4jna.b32.i2p/hosts.txt)
, \n"
+"default is http://i2p-projekt.i2p/hosts.txt "
+"(http://udhdrtrcetjm5sxzskjyr5ztpeszydbh4dpl3pl4utgqqw2v4jna.b32.i2p/hosts.txt)
,"
+" \n"
"which contains a copy of the hosts.txt included\n"
"in the I2P release.\n"
"Users must configure additional subscriptions in their\n"
-"local addressbook application (via subscriptions.txt or SusiDNS)."
+"local addressbook application (via subscriptions.txt or SusiDNS)."
msgstr ""
#: i2p2www/pages/site/docs/naming.html:211
@@ -808,7 +852,8 @@ msgstr ""
#: i2p2www/pages/site/docs/naming.html:218
msgid ""
-"The operators of these services may have various policies for listing hosts.\n"
+"The operators of these services may have various policies for listing "
+"hosts.\n"
"Presence on this list does not imply endorsement."
msgstr ""
@@ -819,10 +864,12 @@ msgstr ""
#: i2p2www/pages/site/docs/naming.html:224
msgid ""
-"While there are hopefully not any technical limitations within I2P on host names,\n"
+"While there are hopefully not any technical limitations within I2P on "
+"host names,\n"
"the addressbook enforces several restrictions on host names\n"
"imported from subscriptions.\n"
-"It does this for basic typographical sanity and compatibility with browsers,\n"
+"It does this for basic typographical sanity and compatibility with "
+"browsers,\n"
"and for security.\n"
"The rules are essentially the same as those in RFC2396 Section 3.2.2.\n"
"Any hostnames violating these rules may not be propagated\n"
@@ -835,13 +882,13 @@ msgstr ""
#: i2p2www/pages/site/docs/naming.html:243
msgid ""
-"Names are checked for conflict with existing names in the existing userhosts.txt and hosts.txt\n"
+"Names are checked for conflict with existing names in the existing "
+"userhosts.txt and hosts.txt\n"
"(but not privatehosts.txt) after conversion to lower case."
msgstr ""
#: i2p2www/pages/site/docs/naming.html:248
-msgid ""
-"Must contain only [a-z] [0-9] '.' and '-' after conversion to lower case."
+msgid "Must contain only [a-z] [0-9] '.' and '-' after conversion to lower case."
msgstr ""
#: i2p2www/pages/site/docs/naming.html:252
@@ -877,7 +924,8 @@ msgstr ""
#: i2p2www/pages/site/docs/naming.html:280
msgid ""
"Certain hostnames reserved for project use are not allowed\n"
-"(proxy.i2p, router.i2p, console.i2p, *.proxy.i2p, *.router.i2p, *.console.i2p, and others)"
+"(proxy.i2p, router.i2p, console.i2p, *.proxy.i2p, *.router.i2p, "
+"*.console.i2p, and others)"
msgstr ""
#: i2p2www/pages/site/docs/naming.html:285
@@ -900,8 +948,8 @@ msgstr ""
#: i2p2www/pages/site/docs/naming.html:302
msgid ""
-"Any name received via subscription that passes all the checks is added via "
-"the local naming service."
+"Any name received via subscription that passes all the checks is added "
+"via the local naming service."
msgstr ""
#: i2p2www/pages/site/docs/naming.html:306
@@ -918,15 +966,19 @@ msgstr ""
#: i2p2www/pages/site/docs/naming.html:317
msgid ""
-"International Domain Names (IDN) also work in i2p (using punycode 'xn--' form).\n"
-"To see IDN .i2p domain names rendered correctly in Firefox's location bar,\n"
+"International Domain Names (IDN) also work in i2p (using punycode 'xn--' "
+"form).\n"
+"To see IDN .i2p domain names rendered correctly in Firefox's location "
+"bar,\n"
"add 'network.IDN.whitelist.i2p (boolean) = true' in about:config."
msgstr ""
#: i2p2www/pages/site/docs/naming.html:323
msgid ""
-"As the addressbook application does not use privatehosts.txt at all, in practice\n"
-"this file is the only place where it is appropriate to place private aliases or\n"
+"As the addressbook application does not use privatehosts.txt at all, in "
+"practice\n"
+"this file is the only place where it is appropriate to place private "
+"aliases or\n"
"\"pet names\" for sites already in hosts.txt."
msgstr ""
@@ -937,14 +989,16 @@ msgstr ""
#: i2p2www/pages/site/docs/naming.html:330
msgid ""
"Addressbook will publish the merged hosts.txt to a location\n"
-"(traditionally hosts.txt in the local eepsite's home directory) to be accessed by others\n"
+"(traditionally hosts.txt in the local eepsite's home directory) to be "
+"accessed by others\n"
"for their subscriptions.\n"
"This step is optional and is disabled by default."
msgstr ""
#: i2p2www/pages/site/docs/naming.html:338
msgid ""
-"The addressbook application, together with eepget, saves the Etag and/or Last-Modified\n"
+"The addressbook application, together with eepget, saves the Etag and/or "
+"Last-Modified\n"
"information returned by the web server of the subscription.\n"
"This greatly reduces the bandwidth required, as the web server will\n"
"return a '304 Not Modified' on the next fetch if nothing has changed."
@@ -961,7 +1015,8 @@ msgid ""
"Hosts serving a static hosts.txt or an equivalent CGI application\n"
"are strongly encouraged to deliver\n"
"a Content-Length header, and either an Etag or Last-Modified header.\n"
-"Also ensure that the server delivers a '304 Not Modified' when appropriate.\n"
+"Also ensure that the server delivers a '304 Not Modified' when "
+"appropriate.\n"
"This will dramatically reduce the network bandwidth, and\n"
"reduce chances of corruption."
msgstr ""
@@ -972,7 +1027,8 @@ msgstr ""
#: i2p2www/pages/site/docs/naming.html:360
msgid ""
-"A host add service is a simple CGI application that takes a hostname and a Base64 key as parameters\n"
+"A host add service is a simple CGI application that takes a hostname and "
+"a Base64 key as parameters\n"
"and adds that to its local hosts.txt.\n"
"If other routers subscribe to that hosts.txt, the new hostname/key\n"
"will be propagated through the network."
@@ -980,8 +1036,10 @@ msgstr ""
#: i2p2www/pages/site/docs/naming.html:367
msgid ""
-"It is recommended that host add services impose, at a minimum, the restrictions imposed by the addressbook application listed above.\n"
-"Host add services may impose additional restrictions on hostnames and keys, for example:"
+"It is recommended that host add services impose, at a minimum, the "
+"restrictions imposed by the addressbook application listed above.\n"
+"Host add services may impose additional restrictions on hostnames and "
+"keys, for example:"
msgstr ""
#: i2p2www/pages/site/docs/naming.html:372
@@ -1034,8 +1092,10 @@ msgstr ""
#: i2p2www/pages/site/docs/naming.html:418
msgid ""
-"A jump service is a simple CGI application that takes a hostname as a parameter\n"
-"and returns a 301 redirect to the proper URL with a ?i2paddresshelper=key
\n"
+"A jump service is a simple CGI application that takes a hostname as a "
+"parameter\n"
+"and returns a 301 redirect to the proper URL with a "
+"?i2paddresshelper=key
\n"
"string appended.\n"
"The HTTP proxy will interpret the appended string and\n"
"use that key as the actual destination.\n"
@@ -1058,14 +1118,16 @@ msgstr ""
#: i2p2www/pages/site/docs/naming.html:440
msgid ""
-"SusiDNS is simply a web interface front-end to configuring addressbook subscriptions\n"
+"SusiDNS is simply a web interface front-end to configuring addressbook "
+"subscriptions\n"
"and accessing the four addressbook files.\n"
"All the real work is done by the 'addressbook' application."
msgstr ""
#: i2p2www/pages/site/docs/naming.html:446
msgid ""
-"Currently, there is little enforcement of addressbook naming rules within SusiDNS,\n"
+"Currently, there is little enforcement of addressbook naming rules within"
+" SusiDNS,\n"
"so a user may enter hostnames locally that would be rejected by\n"
"the addressbook subscription rules."
msgstr ""
@@ -1079,29 +1141,36 @@ msgid ""
"I2P supports Base32 hostnames similar to Tor's .onion addresses.\n"
"Base32 addresses are much shorter and easier to handle than the\n"
"full 516-character Base64 Destinations or addresshelpers.\n"
-"Example: ukeu3k5oycgaauneqgtnvselmt4yemvoilkln7jpvamvfx7dnkdq.b32.i2p
"
+"Example: "
+"ukeu3k5oycgaauneqgtnvselmt4yemvoilkln7jpvamvfx7dnkdq.b32.i2p
"
msgstr ""
#: i2p2www/pages/site/docs/naming.html:460
#, python-format
msgid ""
-"In Tor, the address is 16 characters (80 bits), or half of the SHA-1 hash.\n"
+"In Tor, the address is 16 characters (80 bits), or half of the SHA-1 "
+"hash.\n"
"I2P uses 52 characters (256 bits) to represent the full SHA-256 hash.\n"
"The form is {52 chars}.b32.i2p.\n"
"Tor has recently published a\n"
-"proposal\n"
-"to convert to an identical format of {52 chars}.onion for their hidden services.\n"
+"proposal\n"
+"to convert to an identical format of {52 chars}.onion for their hidden "
+"services.\n"
"Base32 is implemented in the naming service, which queries the\n"
"router over I2CP to lookup the LeaseSet to get the full Destination.\n"
-"Base32 lookups will only be successful when the Destination is up and publishing\n"
+"Base32 lookups will only be successful when the Destination is up and "
+"publishing\n"
"a LeaseSet.\n"
-"Because resolution may require a network database lookup, it may take significantly\n"
+"Because resolution may require a network database lookup, it may take "
+"significantly\n"
"longer than a local address book lookup."
msgstr ""
#: i2p2www/pages/site/docs/naming.html:475
msgid ""
-"Base32 addresses can be used in most places where hostnames or full destinations\n"
+"Base32 addresses can be used in most places where hostnames or full "
+"destinations\n"
"are used, however there are some exceptions where they may fail if the\n"
"name does not immediately resolve. I2PTunnel will fail, for example, if\n"
"the name does not resolve to a destination."
@@ -1128,7 +1197,8 @@ msgstr ""
#: i2p2www/pages/site/docs/plugins.html:12
msgid ""
-"There are now plugins available that support distributed email, blogs, IRC\n"
+"There are now plugins available that support distributed email, blogs, "
+"IRC\n"
"clients, distributed file storage, wikis, and more."
msgstr ""
@@ -1148,7 +1218,8 @@ msgstr ""
#: i2p2www/pages/site/docs/plugins.html:31
msgid ""
-"Support large or special-purpose applications that would never be bundled\n"
+"Support large or special-purpose applications that would never be bundled"
+"\n"
"with the I2P installation"
msgstr ""
@@ -1162,8 +1233,8 @@ msgstr ""
#: i2p2www/pages/site/docs/plugins.html:44
msgid ""
-"Separate initial install and update packages, if desired, for smaller update"
-" downloads"
+"Separate initial install and update packages, if desired, for smaller "
+"update downloads"
msgstr ""
#: i2p2www/pages/site/docs/plugins.html:48
@@ -1193,8 +1264,7 @@ msgid ""
msgstr ""
#: i2p2www/pages/site/docs/plugins.html:70
-msgid ""
-"Automatic integration and startup of webapps into console Jetty instance"
+msgid "Automatic integration and startup of webapps into console Jetty instance"
msgstr ""
#: i2p2www/pages/site/docs/plugins.html:74
@@ -1234,21 +1304,32 @@ msgstr "Installation"
#: i2p2www/pages/site/docs/plugins.html:101
msgid ""
-"To install and start a plugin, copy the .xpi2p
install link to\n"
+"To install and start a plugin, copy the .xpi2p
install link "
+"to\n"
"the form at the bottom of\n"
-"configclients.jsp in\n"
-"your router console and click the \"install plugin\" button. After a\n"
-"plugin is installed and started, a link to the plugin will usually appear at\n"
+"configclients.jsp"
+" in\n"
+"your router console and click the \"install plugin\" button. After a"
+"\n"
+"plugin is installed and started, a link to the plugin will usually appear"
+" at\n"
"the top of your summary bar."
msgstr ""
#: i2p2www/pages/site/docs/plugins.html:110
msgid ""
-"To update a plugin to the latest version, just click the update button on\n"
-"configclients.jsp.\n"
-"There is also a button to check if the plugin has a more recent version, as\n"
-"well as a button to check for updates for all plugins. Plugins will be checked\n"
-"for updates automatically when updating to a new I2P release (not including dev\n"
+"To update a plugin to the latest version, just click the update button on"
+"\n"
+"configclients.jsp."
+"\n"
+"There is also a button to check if the plugin has a more recent version, "
+"as\n"
+"well as a button to check for updates for all plugins. Plugins will be "
+"checked\n"
+"for updates automatically when updating to a new I2P release (not "
+"including dev\n"
"builds)."
msgstr ""
@@ -1259,21 +1340,25 @@ msgstr "Entwicklung"
#: i2p2www/pages/site/docs/plugins.html:121
#, python-format
msgid ""
-"See the latest plugin specification and the\n"
+"See the latest plugin specification and "
+"the\n"
"plugin forum on %(zzz)s."
msgstr ""
#: i2p2www/pages/site/docs/plugins.html:126
#, python-format
msgid ""
-"See also the sources for plugins developed by various people. Some plugins, such\n"
-"as snowman, were developed\n"
+"See also the sources for plugins developed by various people. Some "
+"plugins, such\n"
+"as snowman, were "
+"developed\n"
"specifically as examples."
msgstr ""
#: i2p2www/pages/site/docs/plugins.html:132
msgid ""
-"Developers wanted! Plugins are a great way to learn more about I2P\n"
+"Developers wanted! Plugins are a great way to learn more about I2P"
+"\n"
"or easily add some feature."
msgstr ""
@@ -1285,7 +1370,8 @@ msgstr "Erste Schritte"
#, python-format
msgid ""
"To create a plugin from an existing binary package you will need to get\n"
-"makeplugin.sh from the i2p.scripts branch in monotone."
+"makeplugin.sh from the i2p.scripts branch in "
+"monotone."
msgstr ""
#: i2p2www/pages/site/docs/plugins.html:144
@@ -1301,7 +1387,8 @@ msgstr ""
#: i2p2www/pages/site/docs/plugins.html:151
msgid ""
"Updates of a plugin with included jars (not wars) won't be recognized if\n"
-"the plugin was already run, as it requires class loader trickery to flush the\n"
+"the plugin was already run, as it requires class loader trickery to flush"
+" the\n"
"class cache; a full router restart is required."
msgstr ""
@@ -1311,27 +1398,32 @@ msgstr ""
#: i2p2www/pages/site/docs/plugins.html:161
msgid ""
-"Plugins running in a separate JVM create a logs/
directory in\n"
+"Plugins running in a separate JVM create a logs/
directory "
+"in\n"
"$CWD
."
msgstr ""
#: i2p2www/pages/site/docs/plugins.html:166
msgid ""
-"No initial keys are present, except for those of jrandom and zzz (using the\n"
+"No initial keys are present, except for those of jrandom and zzz (using "
+"the\n"
"same keys as for router update), so the first key seen for a signer is\n"
"automatically accepted—there is no signing key authority."
msgstr ""
#: i2p2www/pages/site/docs/plugins.html:172
msgid ""
-"When deleting a plugin, the directory is not always deleted, especially on\n"
+"When deleting a plugin, the directory is not always deleted, especially "
+"on\n"
"Windows."
msgstr ""
#: i2p2www/pages/site/docs/plugins.html:177
msgid ""
-"Installing a plugin requiring Java 1.6 on a Java 1.5 machine will result in a\n"
-"\"plugin is corrupt\" message if pack200 compression of the plugin file is used."
+"Installing a plugin requiring Java 1.6 on a Java 1.5 machine will result "
+"in a\n"
+"\"plugin is corrupt\" message if pack200 compression of the plugin file "
+"is used."
msgstr ""
#: i2p2www/pages/site/docs/plugins.html:182
@@ -1352,7 +1444,8 @@ msgstr "May 2013"
#: i2p2www/pages/site/docs/ports.html:7
msgid ""
-"These are the ports used or reserved by I2P, including those for known plugins,\n"
+"These are the ports used or reserved by I2P, including those for known "
+"plugins,\n"
"common alternates,\n"
"and some typical related applications."
msgstr ""
@@ -1406,7 +1499,8 @@ msgstr ""
msgid ""
"BOB does not hold keypair values, nor does the router.\n"
"Your application holds the keypair values. \n"
-"This is to reduce any extra complexity in the router code, it also adds to\n"
+"This is to reduce any extra complexity in the router code, it also adds "
+"to\n"
"your privacy."
msgstr ""
@@ -1429,25 +1523,27 @@ msgstr "SCHLÜSSEL
= öffentlicher Schlüssel, auch BASE64"
#: i2p2www/pages/site/docs/api/bob.html:48
msgid ""
"ERROR
as is implied returns the message \"ERROR "
-"\"+DESCRIPTION+\"\\n\"
, where the DESCRIPTION
is what "
-"went wrong."
+"\"+DESCRIPTION+\"\\n\", where the DESCRIPTION
is what"
+" went wrong."
msgstr ""
#: i2p2www/pages/site/docs/api/bob.html:51
msgid ""
-"OK
returns \"OK\"
, and if data is to be returned, "
-"it is on the same line. OK
means the command is finished."
+"OK
returns \"OK\"
, and if data is to be "
+"returned, it is on the same line. OK
means the command is "
+"finished."
msgstr ""
#: i2p2www/pages/site/docs/api/bob.html:54
msgid ""
-"DATA
lines contain information that you requested. There may be"
-" multiple DATA
lines per request."
+"DATA
lines contain information that you requested. There may"
+" be multiple DATA
lines per request."
msgstr ""
#: i2p2www/pages/site/docs/api/bob.html:58
msgid ""
-"NOTE: The help command is the ONLY command that has an exception to\n"
+"NOTE: The help command is the ONLY command that has an exception "
+"to\n"
"the rules... it can actually return nothing! This is intentional, since\n"
"help is a HUMAN and not an APPLICATION command."
msgstr ""
@@ -1455,14 +1551,16 @@ msgstr ""
#: i2p2www/pages/site/docs/api/bob.html:64
msgid ""
"PLEASE NOTE:\n"
-"For CURRENT details on the commands PLEASE use the built-in help command. \n"
-"Just telnet to localhost 2827 and type help and you can get full documentation on each command."
+"For CURRENT details on the commands PLEASE use the built-in help command."
+" \n"
+"Just telnet to localhost 2827 and type help and you can get full "
+"documentation on each command."
msgstr ""
#: i2p2www/pages/site/docs/api/bob.html:70
msgid ""
-"Commands never get obsoleted or changed, however new commands do get added "
-"from time to time."
+"Commands never get obsoleted or changed, however new commands do get "
+"added from time to time."
msgstr ""
#: i2p2www/pages/site/docs/api/bob.html:74
@@ -1483,30 +1581,46 @@ msgstr "GIBT ZURÜCK"
#: i2p2www/pages/site/docs/api/bob.html:106
msgid ""
-"Once set up, all TCP sockets can and will block as needed, and there is no need for any \n"
-"additional messages to/from the command channel. This allows the router to pace the\n"
-"stream without exploding with OOM like SAM does as it chokes on attempting to shove \n"
-"many streams in or out one socket -- that can't scale when you have alot of connections!"
+"Once set up, all TCP sockets can and will block as needed, and there is "
+"no need for any \n"
+"additional messages to/from the command channel. This allows the router "
+"to pace the\n"
+"stream without exploding with OOM like SAM does as it chokes on "
+"attempting to shove \n"
+"many streams in or out one socket -- that can't scale when you have alot "
+"of connections!"
msgstr ""
#: i2p2www/pages/site/docs/api/bob.html:113
msgid ""
-"What is also nice about this particular interface is that writing anything to interface \n"
-"to it, is much much easier than SAM. There is no other processing to do after the set up.\n"
-"It's configuration is so simple, that very simple tools, such as nc (netcat) can be used \n"
-"to point to some application. The value there is that one could schedule up and down times \n"
-"for an application, and not have to change the application to do that, or to even have \n"
-"to stop that application. Instead, you can literally \"unplug\" the destination, and \n"
-"\"plug it in\" again. As long as the same IP/port addresses and destination keys are used \n"
-"when bringing the bridge up, the normal TCP application won't care, and won't notice.\n"
-"It will simply be fooled -- the destinations are not reachable, and that nothing is coming in."
+"What is also nice about this particular interface is that writing "
+"anything to interface \n"
+"to it, is much much easier than SAM. There is no other processing to do "
+"after the set up.\n"
+"It's configuration is so simple, that very simple tools, such as nc "
+"(netcat) can be used \n"
+"to point to some application. The value there is that one could schedule "
+"up and down times \n"
+"for an application, and not have to change the application to do that, or"
+" to even have \n"
+"to stop that application. Instead, you can literally \"unplug\" the "
+"destination, and \n"
+"\"plug it in\" again. As long as the same IP/port addresses and "
+"destination keys are used \n"
+"when bringing the bridge up, the normal TCP application won't care, and "
+"won't notice.\n"
+"It will simply be fooled -- the destinations are not reachable, and that "
+"nothing is coming in."
msgstr ""
#: i2p2www/pages/site/docs/api/bob.html:125
msgid ""
-"For the following example, we'll setup a very simple local loopback connection, \n"
-"with two destinations. Destination \"mouth\" will be the CHARGEN service from \n"
-"the INET superserver daemon. Destination \"ear\" will be a local port that you\n"
+"For the following example, we'll setup a very simple local loopback "
+"connection, \n"
+"with two destinations. Destination \"mouth\" will be the CHARGEN service "
+"from \n"
+"the INET superserver daemon. Destination \"ear\" will be a local port "
+"that you\n"
"can telnet into, and watch the pretty ASCII test puke forth."
msgstr ""
@@ -1555,28 +1669,30 @@ msgstr ""
#: i2p2www/pages/site/docs/api/bob.html:158
msgid ""
-"At this point, there was no error, a destination with a nickname of \"mouth\" \n"
-"is set up. When you contact the destination provided, you actually connect \n"
+"At this point, there was no error, a destination with a nickname of "
+"\"mouth\" \n"
+"is set up. When you contact the destination provided, you actually "
+"connect \n"
"to the CHARGEN
service on 19/TCP
."
msgstr ""
#: i2p2www/pages/site/docs/api/bob.html:164
-msgid ""
-"Now for the other half, so that we can actually contact this destination."
+msgid "Now for the other half, so that we can actually contact this destination."
msgstr ""
#: i2p2www/pages/site/docs/api/bob.html:184
msgid ""
"Now all we need to do is telnet into 127.0.0.1, port 37337,\n"
-"send the destination key or host address from addressbook we want to contact.\n"
+"send the destination key or host address from addressbook we want to "
+"contact.\n"
"In this case, we want to contact \"mouth\", all we do is paste in the\n"
"key and it goes."
msgstr ""
#: i2p2www/pages/site/docs/api/bob.html:191
msgid ""
-"NOTE: The \"quit\" command in the command channel does NOT disconnect"
-" the tunnels like SAM."
+"NOTE: The \"quit\" command in the command channel does NOT "
+"disconnect the tunnels like SAM."
msgstr ""
#: i2p2www/pages/site/docs/api/bob.html:208
@@ -1593,10 +1709,14 @@ msgstr ""
#: i2p2www/pages/site/docs/api/bob.html:261
msgid ""
-"Pretty cool isn't it? Try some other well known EEPSITES if you like, nonexistent ones, \n"
-"etc, to get a feel for what kind of output to expect in different situations. \n"
-"For the most part, it is suggested that you ignore any of the error messages. \n"
-"They would be meaningless to the application, and are only presented for human debugging."
+"Pretty cool isn't it? Try some other well known EEPSITES if you like, "
+"nonexistent ones, \n"
+"etc, to get a feel for what kind of output to expect in different "
+"situations. \n"
+"For the most part, it is suggested that you ignore any of the error "
+"messages. \n"
+"They would be meaningless to the application, and are only presented for "
+"human debugging."
msgstr ""
#: i2p2www/pages/site/docs/api/bob.html:268
@@ -1613,7 +1733,8 @@ msgstr ""
#: i2p2www/pages/site/docs/api/bob.html:298
msgid ""
-"Now to remove \"ear\", note that this is what happens when you type too fast,\n"
+"Now to remove \"ear\", note that this is what happens when you type too "
+"fast,\n"
"and shows you what typical ERROR messages looks like."
msgstr ""
@@ -1664,11 +1785,16 @@ msgstr "Datagrammübersicht"
#: i2p2www/pages/site/docs/api/datagrams.html:7
#, python-format
msgid ""
-"Datagrams build upon the base I2CP to provide authenticated\n"
-"and repliable messages in a standard format. This lets applications reliably read\n"
-"the \"from\" address out of a datagram and know that the address really sent the\n"
-"message. This is necessary for some applications since the base I2P message is\n"
-"completely raw - it has no \"from\" address (unlike IP packets). In addition, the\n"
+"Datagrams build upon the base I2CP to provide "
+"authenticated\n"
+"and repliable messages in a standard format. This lets applications "
+"reliably read\n"
+"the \"from\" address out of a datagram and know that the address really "
+"sent the\n"
+"message. This is necessary for some applications since the base I2P "
+"message is\n"
+"completely raw - it has no \"from\" address (unlike IP packets). In "
+"addition, the\n"
"message and sender are authenticated by signing the payload."
msgstr ""
@@ -1677,7 +1803,8 @@ msgstr ""
msgid ""
"Datagrams, like streaming library packets,\n"
"are an application-level construct.\n"
-"These protocols are independent of the low-level transports;\n"
+"These protocols are independent of the low-level transports;\n"
"the protocols are converted to I2NP messages by the router, and\n"
"either protocol may be carried by either transport."
msgstr ""
@@ -1693,7 +1820,8 @@ msgid ""
"datagram API,\n"
"while applications in other languages \n"
"can use SAM's datagram support.\n"
-"There is also limited support in i2ptunnel in the SOCKS proxy,\n"
+"There is also limited support in i2ptunnel in the SOCKS proxy,\n"
"the 'streamr' tunnel types, and udpTunnel classes."
msgstr ""
@@ -1703,23 +1831,34 @@ msgstr "Datagrammlänge"
#: i2p2www/pages/site/docs/api/datagrams.html:38
msgid ""
-"The application designer should carefully consider the tradeoff of repliable vs. non-repliable\n"
-"datagrams. Also, the datagram size will affect reliability, due to tunnel fragmentation into 1KB\n"
-"tunnel messages. The more message fragments, the more likely that one of them will be dropped\n"
-"by an intermediate hop. Messages larger than a few KB are not recommended.\n"
+"The application designer should carefully consider the tradeoff of "
+"repliable vs. non-repliable\n"
+"datagrams. Also, the datagram size will affect reliability, due to tunnel"
+" fragmentation into 1KB\n"
+"tunnel messages. The more message fragments, the more likely that one of "
+"them will be dropped\n"
+"by an intermediate hop. Messages larger than a few KB are not "
+"recommended.\n"
"Over about 10 KB, the delivery probablility drops dramatically.\n"
-"Messages over 16 KB cannot be delivered over NTCP, dropping delivery chances even more."
+"Messages over 16 KB cannot be delivered over NTCP, dropping delivery "
+"chances even more."
msgstr ""
#: i2p2www/pages/site/docs/api/datagrams.html:47
#, python-format
msgid ""
-"Also note that the various overheads added by lower layers, in particular asymmetric\n"
-"ElGamal/AES, place a large burden on intermittent messages\n"
-"such as used by a Kademlia-over-UDP application. The implementations are currently tuned\n"
-"for frequent traffic using the streaming library. There are a high number\n"
-"of session tags delivered, and a short session tag lifetime, for example.\n"
-"There are currently no configuration parameters available within I2CP to tune\n"
+"Also note that the various overheads added by lower layers, in particular"
+" asymmetric\n"
+"ElGamal/AES, place a large burden on "
+"intermittent messages\n"
+"such as used by a Kademlia-over-UDP application. The implementations are "
+"currently tuned\n"
+"for frequent traffic using the streaming library. There are a high number"
+"\n"
+"of session tags delivered, and a short session tag lifetime, for example."
+"\n"
+"There are currently no configuration parameters available within I2CP to "
+"tune\n"
"the ElGamal Session Tag parameters."
msgstr ""
@@ -1732,30 +1871,38 @@ msgid ""
"The standard I2CP protocol number for datagrams is PROTO_DATAGRAM (17).\n"
"Applications may or may not choose to set the\n"
"protocol in the I2CP header. It is not set by default.\n"
-"It must be set to demultiplex datagram and streaming traffic received on the same Destination."
+"It must be set to demultiplex datagram and streaming traffic received on "
+"the same Destination."
msgstr ""
#: i2p2www/pages/site/docs/api/datagrams.html:65
#, python-format
msgid ""
"As datagrams are not connection-oriented, the application may require\n"
-"port numbers to correlate datagrams with particular peers or communications sessions,\n"
+"port numbers to correlate datagrams with particular peers or "
+"communications sessions,\n"
"as is traditional with UDP over IP.\n"
-"Applications may add 'from' and 'to' ports to the I2CP (gzip) header as described in\n"
+"Applications may add 'from' and 'to' ports to the I2CP (gzip) header as "
+"described in\n"
"the I2CP page."
msgstr ""
#: i2p2www/pages/site/docs/api/datagrams.html:73
#, python-format
msgid ""
-"There is no method within the datagram API to specify whether it is non-repliable (raw)\n"
-"or repliable. The application should be designed to expect the appropriate type.\n"
+"There is no method within the datagram API to specify whether it is non-"
+"repliable (raw)\n"
+"or repliable. The application should be designed to expect the "
+"appropriate type.\n"
"The I2CP protocol number or port should be used by the application to\n"
"indicate datagram type.\n"
-"The I2CP protocol numbers PROTO_DATAGRAM (signed) and PROTO_DATAGRAM_RAW are defined in the\n"
+"The I2CP protocol numbers PROTO_DATAGRAM (signed) and PROTO_DATAGRAM_RAW "
+"are defined in the\n"
"I2PSession API\n"
-"for this purpose. A common design pattern in client/server datagram applications is to\n"
-"use signed datagrams for a request which includes a nonce, and use a raw datagram\n"
+"for this purpose. A common design pattern in client/server datagram "
+"applications is to\n"
+"use signed datagrams for a request which includes a nonce, and use a raw "
+"datagram\n"
"for the reply, returning the nonce from the request."
msgstr ""
@@ -1789,13 +1936,15 @@ msgstr ""
#: i2p2www/pages/site/docs/api/datagrams.html:101
#, python-format
msgid ""
-"Each datagram is sent through I2P as a single message (or as an individual clove in a\n"
+"Each datagram is sent through I2P as a single message (or as an "
+"individual clove in a\n"
"Garlic Message).\n"
"Message encapsulation is implemented in the underlying\n"
"I2CP,\n"
"I2NP, and\n"
"tunnel message layers.\n"
-"There is no packet delimiter mechanism or length field in the datagram protocol."
+"There is no packet delimiter mechanism or length field in the datagram "
+"protocol."
msgstr ""
#: i2p2www/pages/site/docs/api/datagrams.html:114
@@ -1815,10 +1964,17 @@ msgstr ""
#: i2p2www/pages/site/docs/api/i2pcontrol.html:4
#, python-format
msgid ""
-"I2P enables a JSONRPC2 interface via the plugin I2PControl.\n"
-"The aim of the interface is to provide simple way to interface with a running I2P node. A client, itoopie, has been developed in parallel.\n"
-"The JSONRPC2 implementation for the client as well as the plugin is provided by the java libraries JSON-RPC 2.0. \n"
-"A list of implementations of JSON-RPC for various languages can be found at the JSON-RPC wiki."
+"I2P enables a JSONRPC2 interface via the plugin I2PControl.\n"
+"The aim of the interface is to provide simple way to interface with a "
+"running I2P node. A client, itoopie, has been developed in parallel.\n"
+"The JSONRPC2 implementation for the client as well as the plugin is "
+"provided by the java libraries JSON-RPC 2.0. \n"
+"A list of implementations of JSON-RPC for various languages can be found "
+"at the JSON-RPC "
+"wiki."
msgstr ""
#: i2p2www/pages/site/docs/api/i2pcontrol.html:11
@@ -1894,8 +2050,8 @@ msgstr "Beschreibung"
#: i2p2www/pages/site/docs/api/i2pcontrol.html:29
msgid ""
-"Token used for authenticating every request (excluding the 'Authenticate' "
-"RPC method)"
+"Token used for authenticating every request (excluding the 'Authenticate'"
+" RPC method)"
msgstr ""
#: i2p2www/pages/site/docs/api/i2pcontrol.html:37
@@ -1904,7 +2060,8 @@ msgstr "Implementierte Methoden"
#: i2p2www/pages/site/docs/api/i2pcontrol.html:38
msgid ""
-"Creates and returns an authentication token used for further communication."
+"Creates and returns an authentication token used for further "
+"communication."
msgstr ""
#: i2p2www/pages/site/docs/api/i2pcontrol.html:40
@@ -1937,8 +2094,8 @@ msgstr ""
#: i2p2www/pages/site/docs/api/i2pcontrol.html:98
#: i2p2www/pages/site/docs/api/i2pcontrol.html:142
msgid ""
-"Token used for authenticating the client. Is provided by the server via the "
-"'Authenticate' RPC method."
+"Token used for authenticating the client. Is provided by the server via "
+"the 'Authenticate' RPC method."
msgstr ""
#: i2p2www/pages/site/docs/api/i2pcontrol.html:54
@@ -2000,8 +2157,7 @@ msgid "Returns true if any changes were made."
msgstr ""
#: i2p2www/pages/site/docs/api/i2pcontrol.html:79
-msgid ""
-"Returns true if any changes requiring a restart to take effect were made."
+msgid "Returns true if any changes requiring a restart to take effect were made."
msgstr ""
#: i2p2www/pages/site/docs/api/i2pcontrol.html:82
@@ -2070,7 +2226,8 @@ msgstr ""
#: i2p2www/pages/site/docs/api/i2pcontrol.html:137
msgid ""
-"Initiates a router reseed, fetching peers into our NetDB from a remote host."
+"Initiates a router reseed, fetching peers into our NetDB from a remote "
+"host."
msgstr ""
#: i2p2www/pages/site/docs/api/i2pcontrol.html:138
@@ -2079,7 +2236,8 @@ msgstr ""
#: i2p2www/pages/site/docs/api/i2pcontrol.html:139
msgid ""
-"Restarts the router gracefully (waits for participating tunnels to expire)."
+"Restarts the router gracefully (waits for participating tunnels to "
+"expire)."
msgstr ""
#: i2p2www/pages/site/docs/api/i2pcontrol.html:140
@@ -2113,8 +2271,7 @@ msgid "If requested, verifies that a graceful shutdown has been initiated"
msgstr ""
#: i2p2www/pages/site/docs/api/i2pcontrol.html:152
-msgid ""
-"Fetches or sets various network related settings. Ports, addresses etc."
+msgid "Fetches or sets various network related settings. Ports, addresses etc."
msgstr ""
#: i2p2www/pages/site/docs/api/i2pcontrol.html:154
@@ -2125,8 +2282,8 @@ msgstr ""
#: i2p2www/pages/site/docs/api/i2pcontrol.html:155
msgid ""
-"What hostname is used for the TCP transport. If null is submitted, current "
-"setting will be returned."
+"What hostname is used for the TCP transport. If null is submitted, "
+"current setting will be returned."
msgstr ""
#: i2p2www/pages/site/docs/api/i2pcontrol.html:156
@@ -2143,8 +2300,8 @@ msgstr ""
#: i2p2www/pages/site/docs/api/i2pcontrol.html:158
msgid ""
-"What hostname is used for the UDP transport. If null is submitted, current "
-"setting will be returned."
+"What hostname is used for the UDP transport. If null is submitted, "
+"current setting will be returned."
msgstr ""
#: i2p2www/pages/site/docs/api/i2pcontrol.html:159
@@ -2158,20 +2315,19 @@ msgid "What ip has been detected by the UDP transport."
msgstr ""
#: i2p2www/pages/site/docs/api/i2pcontrol.html:161
-msgid ""
-"Is UPnP enabled. If null is submitted, current setting will be returned."
+msgid "Is UPnP enabled. If null is submitted, current setting will be returned."
msgstr ""
#: i2p2www/pages/site/docs/api/i2pcontrol.html:162
msgid ""
-"How many percent of bandwidth is usable for participating tunnels. If null "
-"is submitted, current setting will be returned."
+"How many percent of bandwidth is usable for participating tunnels. If "
+"null is submitted, current setting will be returned."
msgstr ""
#: i2p2www/pages/site/docs/api/i2pcontrol.html:163
msgid ""
-"How many KB/s of inbound bandwidth is allowed. If null is submitted, current"
-" setting will be returned."
+"How many KB/s of inbound bandwidth is allowed. If null is submitted, "
+"current setting will be returned."
msgstr ""
#: i2p2www/pages/site/docs/api/i2pcontrol.html:164
@@ -2182,15 +2338,15 @@ msgstr ""
#: i2p2www/pages/site/docs/api/i2pcontrol.html:165
msgid ""
-"Is laptop mode enabled (change router identity and UDP port when IP changes "
-"). If null is submitted, current setting will be returned."
+"Is laptop mode enabled (change router identity and UDP port when IP "
+"changes ). If null is submitted, current setting will be returned."
msgstr ""
#: i2p2www/pages/site/docs/api/i2pcontrol.html:166
msgid ""
-"Token used for authenticating the client. Is provided by the server via the "
-"'Authenticate' RPC method. If null is submitted, current setting will be "
-"returned."
+"Token used for authenticating the client. Is provided by the server via "
+"the 'Authenticate' RPC method. If null is submitted, current setting will"
+" be returned."
msgstr ""
#: i2p2www/pages/site/docs/api/i2pcontrol.html:169
@@ -2203,8 +2359,8 @@ msgstr ""
#: i2p2www/pages/site/docs/api/i2pcontrol.html:171
msgid ""
-"If requested, returns the method used for automatically detecting ip for the"
-" TCP transport."
+"If requested, returns the method used for automatically detecting ip for "
+"the TCP transport."
msgstr ""
#: i2p2www/pages/site/docs/api/i2pcontrol.html:172
@@ -2217,8 +2373,8 @@ msgstr ""
#: i2p2www/pages/site/docs/api/i2pcontrol.html:174
msgid ""
-"If requested, returns methods used for detecting the ip address of the UDP "
-"transport."
+"If requested, returns methods used for detecting the ip address of the "
+"UDP transport."
msgstr ""
#: i2p2www/pages/site/docs/api/i2pcontrol.html:175
@@ -2313,27 +2469,34 @@ msgstr ""
#: i2p2www/pages/site/docs/api/i2pcontrol.html:201
msgid ""
-"The version of the I2PControl API used wasn't specified, but is required to "
-"be specified."
+"The version of the I2PControl API used wasn't specified, but is required "
+"to be specified."
msgstr ""
#: i2p2www/pages/site/docs/api/i2pcontrol.html:202
msgid ""
-"The version of the I2PControl API specified is not supported by I2PControl."
+"The version of the I2PControl API specified is not supported by "
+"I2PControl."
msgstr ""
#: i2p2www/pages/site/docs/api/i2ptunnel.html:12
#, python-format
msgid ""
"I2PTunnel is a tool for interfacing with and providing services on I2P.\n"
-"Destination of an I2PTunnel can be defined using a hostname,\n"
-"Base32, or a full 516-byte destination key.\n"
-"An established I2PTunnel will be available on your client machine as localhost:port.\n"
-"If you wish to provide a service on I2P network, you simply create I2PTunnel to the\n"
-"appropriate ip_address:port. A corresponding 516-byte destination key will be generated\n"
+"Destination of an I2PTunnel can be defined using a hostname,\n"
+"Base32, or a full 516-byte destination "
+"key.\n"
+"An established I2PTunnel will be available on your client machine as "
+"localhost:port.\n"
+"If you wish to provide a service on I2P network, you simply create "
+"I2PTunnel to the\n"
+"appropriate ip_address:port. A corresponding 516-byte destination key "
+"will be generated\n"
"for the service and it will become avaliable throughout I2P.\n"
"A web interface for I2PTunnel management is avaliable on\n"
-"localhost:7657/i2ptunnel/."
+"localhost:7657/i2ptunnel/."
msgstr ""
#: i2p2www/pages/site/docs/api/i2ptunnel.html:24
@@ -2347,7 +2510,8 @@ msgstr ""
#: i2p2www/pages/site/docs/api/i2ptunnel.html:27
msgid ""
"I2P Webserver - A tunnel pointed to a Jetty webserver run\n"
-"on localhost:7658 for convenient and quick hosting on I2P.\n"
+"on localhost:7658 for convenient "
+"and quick hosting on I2P.\n"
"
The document root is:"
msgstr ""
@@ -2357,8 +2521,10 @@ msgstr ""
#: i2p2www/pages/site/docs/api/i2ptunnel.html:37
msgid ""
-"A HTTP proxy used for browsing I2P and the regular internet anonymously through I2P. \n"
-"Browsing internet through I2P uses a random proxy specified by the \"Outproxies:\" option."
+"A HTTP proxy used for browsing I2P and the regular internet anonymously "
+"through I2P. \n"
+"Browsing internet through I2P uses a random proxy specified by the "
+"\"Outproxies:\" option."
msgstr ""
#: i2p2www/pages/site/docs/api/i2ptunnel.html:41
@@ -2401,32 +2567,37 @@ msgstr "Standard"
#: i2p2www/pages/site/docs/api/i2ptunnel.html:60
msgid ""
-"Opens a local TCP port that connects to a service (like HTTP, FTP or SMTP) on a destination inside of I2P.\n"
-"The tunnel is directed to a random host from the comma seperated (\", \") list of destinations."
+"Opens a local TCP port that connects to a service (like HTTP, FTP or "
+"SMTP) on a destination inside of I2P.\n"
+"The tunnel is directed to a random host from the comma seperated (\", \")"
+" list of destinations."
msgstr ""
#: i2p2www/pages/site/docs/api/i2ptunnel.html:66
msgid ""
-"A HTTP-client tunnel. The tunnel connects to the destination specified by the URL\n"
-"in a HTTP request. Supports proxying onto internet if an outproxy is provided. Strips HTTP connections of the following headers:"
+"A HTTP-client tunnel. The tunnel connects to the destination specified by"
+" the URL\n"
+"in a HTTP request. Supports proxying onto internet if an outproxy is "
+"provided. Strips HTTP connections of the following headers:"
msgstr ""
#: i2p2www/pages/site/docs/api/i2ptunnel.html:71
msgid ""
"Accept, Accept-Charset, Accept-Encoding, Accept-Language\n"
-" and Accept-Ranges as they vary greatly between browsers and can be used as an identifier."
+" and Accept-Ranges as they vary greatly between browsers and can be "
+"used as an identifier."
msgstr ""
#: i2p2www/pages/site/docs/api/i2ptunnel.html:79
msgid ""
-"HTTP client/server tunnels are via I2Ptunnel force-enabling compression via "
-"the following http headers:"
+"HTTP client/server tunnels are via I2Ptunnel force-enabling compression "
+"via the following http headers:"
msgstr ""
#: i2p2www/pages/site/docs/api/i2ptunnel.html:86
msgid ""
-"Depending on if the tunnel is using an outproxy or not it will append the "
-"following User-Agent:"
+"Depending on if the tunnel is using an outproxy or not it will append the"
+" following User-Agent:"
msgstr ""
#: i2p2www/pages/site/docs/api/i2ptunnel.html:90
@@ -2439,8 +2610,10 @@ msgstr "Interne I2P-Nutzung:"
#: i2p2www/pages/site/docs/api/i2ptunnel.html:96
msgid ""
-"Creates a connection to a random IRC server specified by the comma seprated (\", \") \n"
-"list of destinations. Only a whitelisted subset of IRC commands are allowed due to anonymity concerns."
+"Creates a connection to a random IRC server specified by the comma "
+"seprated (\", \") \n"
+"list of destinations. Only a whitelisted subset of IRC commands are "
+"allowed due to anonymity concerns."
msgstr ""
#: i2p2www/pages/site/docs/api/i2ptunnel.html:100
@@ -2453,7 +2626,8 @@ msgstr ""
#: i2p2www/pages/site/docs/api/i2ptunnel.html:120
msgid ""
-"Enables using the I2P router as a SOCKS proxy with the command whitelist specified by\n"
+"Enables using the I2P router as a SOCKS proxy with the command whitelist "
+"specified by\n"
"IRC client mode."
msgstr ""
@@ -2465,7 +2639,8 @@ msgstr ""
#: i2p2www/pages/site/docs/api/i2ptunnel.html:132
msgid ""
-"Creates a UDP-server attached to a Streamr client I2PTunnel. The streamr client tunnel will \n"
+"Creates a UDP-server attached to a Streamr client I2PTunnel. The streamr "
+"client tunnel will \n"
"subscribe to a streamr server tunnel."
msgstr ""
@@ -2479,27 +2654,32 @@ msgstr ""
#: i2p2www/pages/site/docs/api/i2ptunnel.html:147
msgid ""
-"Creates a destination to a local HTTP server ip:port. Supports gzip for requests with \n"
-"Accept-encoding: x-i2p-gzip, replies with Content-encoding: x-i2p-gzip in such a request."
+"Creates a destination to a local HTTP server ip:port. Supports gzip for "
+"requests with \n"
+"Accept-encoding: x-i2p-gzip, replies with Content-encoding: x-i2p-gzip in"
+" such a request."
msgstr ""
#: i2p2www/pages/site/docs/api/i2ptunnel.html:153
msgid ""
-"Functions as both a I2PTunnel HTTP Server, and a I2PTunnel HTTP client with no outproxying\n"
-"capabilities. An example application would be a web application that does client-type\n"
+"Functions as both a I2PTunnel HTTP Server, and a I2PTunnel HTTP client "
+"with no outproxying\n"
+"capabilities. An example application would be a web application that does"
+" client-type\n"
"requests, or loopback-testing an eepsite as a diagnostic tool."
msgstr ""
#: i2p2www/pages/site/docs/api/i2ptunnel.html:160
msgid ""
-"Creates a destination that filters the reqistration sequence of a client and passes \n"
+"Creates a destination that filters the reqistration sequence of a client "
+"and passes \n"
"the clients destination key as a hostname to the IRC-server."
msgstr ""
#: i2p2www/pages/site/docs/api/i2ptunnel.html:166
msgid ""
-"A UDP-client that connects to a media server is created. The UDP-Client is "
-"coupled with a Streamr server I2PTunnel."
+"A UDP-client that connects to a media server is created. The UDP-Client "
+"is coupled with a Streamr server I2PTunnel."
msgstr ""
#: i2p2www/pages/site/docs/api/ministreaming.html:2
@@ -2516,11 +2696,14 @@ msgstr ""
msgid ""
"The ministreaming library has been enhanced and extended by the\n"
"\"full\" streaming library.\n"
-"Ministreaming is deprecated and is incompatible with today's applications.\n"
+"Ministreaming is deprecated and is incompatible with today's "
+"applications.\n"
"The following documentation is old.\n"
-"Also note that streaming extends ministreaming in the same Java package (net.i2p.client.streaming),\n"
+"Also note that streaming extends ministreaming in the same Java package "
+"(net.i2p.client.streaming),\n"
"so the current API documentation contains both.\n"
-"Obsolete ministreaming classes and methods are clearly marked as deprecated in the Javadocs."
+"Obsolete ministreaming classes and methods are clearly marked as "
+"deprecated in the Javadocs."
msgstr ""
#: i2p2www/pages/site/docs/api/ministreaming.html:19
@@ -2528,12 +2711,17 @@ msgstr ""
msgid ""
"\n"
"The ministreaming library is a layer on top of the core \n"
-"I2CP that allows reliable, in order, and authenticated streams\n"
-"of messages to operate across an unreliable, unordered, and unauthenticated \n"
+"I2CP that allows reliable, in order, and "
+"authenticated streams\n"
+"of messages to operate across an unreliable, unordered, and "
+"unauthenticated \n"
"message layer. Just like the TCP to IP relationship, this streaming \n"
-"functionality has a whole series of tradeoffs and optimizations available, but\n"
-"rather than embed that functionality into the base I2P code, it has been factored\n"
-"off into its own library both to keep the TCP-esque complexities separate and to\n"
+"functionality has a whole series of tradeoffs and optimizations "
+"available, but\n"
+"rather than embed that functionality into the base I2P code, it has been "
+"factored\n"
+"off into its own library both to keep the TCP-esque complexities separate"
+" and to\n"
"allow alternative optimized implementations."
msgstr ""
@@ -2541,29 +2729,42 @@ msgstr ""
#, python-format
msgid ""
"The ministreaming library was written by mihi as a part of his \n"
-"I2PTunnel application and then factored out and released\n"
-"under the BSD license. It is called the \"mini\"streaming library because it makes\n"
-"some simplifications in the implementation, while a more robust streaming library\n"
-"could be further optimized for operation over I2P. The two main issues with \n"
+"I2PTunnel application and then factored out"
+" and released\n"
+"under the BSD license. It is called the \"mini\"streaming library "
+"because it makes\n"
+"some simplifications in the implementation, while a more robust streaming"
+" library\n"
+"could be further optimized for operation over I2P. The two main issues "
+"with \n"
"the ministreaming library are its use of the traditional TCP two phase \n"
-"establishment protocol and the current fixed window size of 1. The establishment\n"
-"issue is minor for long lived streams, but for short ones, such as quick HTTP\n"
-"requests, the impact can be significant. As for the window\n"
-"size, the ministreaming library doesn't maintain any ID or ordering within the \n"
-"messages sent (or include any application level ACK or SACK), so it must wait \n"
-"on average twice the time it takes to send a message before sending another."
+"establishment protocol and the current fixed window size of 1. The "
+"establishment\n"
+"issue is minor for long lived streams, but for short ones, such as quick "
+"HTTP\n"
+"requests, the impact can be significant. As "
+"for the window\n"
+"size, the ministreaming library doesn't maintain any ID or ordering "
+"within the \n"
+"messages sent (or include any application level ACK or SACK), so it must "
+"wait \n"
+"on average twice the time it takes to send a message before sending "
+"another."
msgstr ""
#: i2p2www/pages/site/docs/api/ministreaming.html:45
#, python-format
msgid ""
-"Even with those issues, the ministreaming library performs quite well in many\n"
+"Even with those issues, the ministreaming library performs quite well in "
+"many\n"
"situations, and its API\n"
-"is both quite simple and capable of remaining unchanged as different streaming\n"
+"is both quite simple and capable of remaining unchanged as different "
+"streaming\n"
"implementations are introduced. The library is deployed in its own \n"
"ministreaming.jar.\n"
"Developers in Java who would like to use it can\n"
-"access the API directly, while developers in other languages can use it through\n"
+"access the API directly, while developers in other languages can use it "
+"through\n"
"SAM's streaming support."
msgstr ""
@@ -2574,7 +2775,8 @@ msgstr "SOCKS und SOCKS-Proxies"
#: i2p2www/pages/site/docs/api/socks.html:5
msgid ""
"\n"
-"The SOCKS proxy is working as of release 0.7.1. SOCKS 4/4a/5 are supported.\n"
+"The SOCKS proxy is working as of release 0.7.1. SOCKS 4/4a/5 are "
+"supported.\n"
"Enable SOCKS by creating a SOCKS client tunnel in i2ptunnel.\n"
"Both shared-clients and non-shared are supported.\n"
"There is no SOCKS outproxy so it is of limited use."
@@ -2595,7 +2797,8 @@ msgid ""
"information as content, I2P has no way to protect your anonymity. For\n"
"example, some mail applications will send the IP address of the machine\n"
"they are running on to a mail server. There is no way for I2P to filter\n"
-"this, thus using I2P to 'socksify' existing applications is possible, but\n"
+"this, thus using I2P to 'socksify' existing applications is possible, but"
+"\n"
"extremely dangerous."
msgstr ""
@@ -2678,34 +2881,47 @@ msgstr ""
#, python-format
msgid ""
"The streaming library is a layer on top of the core \n"
-"I2CP API that allows reliable, in-order, and authenticated streams\n"
-"of messages to operate across an unreliable, unordered, and unauthenticated \n"
+"I2CP API that allows reliable, in-order, and "
+"authenticated streams\n"
+"of messages to operate across an unreliable, unordered, and "
+"unauthenticated \n"
"message layer. Just like the TCP to IP relationship, this streaming \n"
-"functionality has a whole series of tradeoffs and optimizations available, but\n"
-"rather than embed that functionality into the base I2P code, it has been factored\n"
-"off into its own library both to keep the TCP-esque complexities separate and to\n"
+"functionality has a whole series of tradeoffs and optimizations "
+"available, but\n"
+"rather than embed that functionality into the base I2P code, it has been "
+"factored\n"
+"off into its own library both to keep the TCP-esque complexities separate"
+" and to\n"
"allow alternative optimized implementations."
msgstr ""
#: i2p2www/pages/site/docs/api/streaming.html:29
msgid ""
"In consideration of the relatively high cost of messages, \n"
-"the streaming library's protocol for scheduling and delivering those messages has been optimized to\n"
-"allow individual messages passed to contain as much information as is available.\n"
-"For instance, a small HTTP transaction proxied through the streaming library can\n"
-"be completed in a single round trip - the first messages bundle a SYN, FIN, and\n"
+"the streaming library's protocol for scheduling and delivering those "
+"messages has been optimized to\n"
+"allow individual messages passed to contain as much information as is "
+"available.\n"
+"For instance, a small HTTP transaction proxied through the streaming "
+"library can\n"
+"be completed in a single round trip - the first messages bundle a SYN, "
+"FIN, and\n"
"the small HTTP request payload, and the reply bundles the SYN,\n"
"FIN, ACK, and the HTTP response payload. While an additional\n"
-"ACK must be transmitted to tell the HTTP server that the SYN/FIN/ACK has been\n"
-"received, the local HTTP proxy can often deliver the full response to the browser \n"
+"ACK must be transmitted to tell the HTTP server that the SYN/FIN/ACK has "
+"been\n"
+"received, the local HTTP proxy can often deliver the full response to the"
+" browser \n"
"immediately."
msgstr ""
#: i2p2www/pages/site/docs/api/streaming.html:42
msgid ""
"The streaming library bears much resemblance to an \n"
-"abstraction of TCP, with its sliding windows, congestion control algorithms\n"
-"(both slow start and congestion avoidance), and general packet behavior (ACK,\n"
+"abstraction of TCP, with its sliding windows, congestion control "
+"algorithms\n"
+"(both slow start and congestion avoidance), and general packet behavior "
+"(ACK,\n"
"SYN, FIN, RST, rto calculation, etc)."
msgstr ""
@@ -2725,21 +2941,29 @@ msgstr "API"
#: i2p2www/pages/site/docs/api/streaming.html:60
#, python-format
msgid ""
-"The streaming library API provides a standard socket paradigm to Java applications.\n"
-"The lower-level I2CP API is completely hidden, except that\n"
-"applications may pass I2CP parameters through the\n"
+"The streaming library API provides a standard socket paradigm to Java "
+"applications.\n"
+"The lower-level I2CP API is completely hidden, "
+"except that\n"
+"applications may pass I2CP parameters "
+"through the\n"
"streaming library, to be interpreted by I2CP."
msgstr ""
#: i2p2www/pages/site/docs/api/streaming.html:67
#, python-format
msgid ""
-"The standard interface to the streaming lib is for the application to use the\n"
+"The standard interface to the streaming lib is for the application to use"
+" the\n"
"I2PSocketManagerFactory to create an\n"
-"I2PSocketManager. The application then asks the\n"
-"socket manager for an I2PSession, which will cause\n"
-"a connection to the router via I2CP. The application\n"
-"can then setup connections with an I2PSocket or\n"
+"I2PSocketManager. The application then asks "
+"the\n"
+"socket manager for an I2PSession, which will "
+"cause\n"
+"a connection to the router via I2CP. The "
+"application\n"
+"can then setup connections with an I2PSocket "
+"or\n"
"receive connections with an I2PServerSocket."
msgstr ""
@@ -2760,12 +2984,17 @@ msgstr "Optionen und Standardeinstellungen"
#, python-format
msgid ""
"The options and current default values are listed below.\n"
-"Options are case-sensitive and may be set for the whole router, for a particular client, or for an individual socket on a\n"
+"Options are case-sensitive and may be set for the whole router, for a "
+"particular client, or for an individual socket on a\n"
"per-connection basis.\n"
-"Many values are tuned for HTTP performance over typical I2P conditions. Other applications such\n"
+"Many values are tuned for HTTP performance over typical I2P conditions. "
+"Other applications such\n"
"as peer-to-peer services are strongly encouraged to\n"
-"modify as necessary, by setting the options and passing them via the call to\n"
-"I2PSocketManagerFactory.createManager(_i2cpHost, _i2cpPort, opts).\n"
+"modify as necessary, by setting the options and passing them via the call"
+" to\n"
+"I2PSocketManagerFactory.createManager(_i2cpHost,"
+" _i2cpPort, opts).\n"
"Time values are in ms."
msgstr ""
@@ -2773,14 +3002,17 @@ msgstr ""
#, python-format
msgid ""
"Note that higher-layer APIs, such as SAM,\n"
-"BOB, and I2PTunnel,\n"
+"BOB, and I2PTunnel,"
+"\n"
"may override these defaults with their own defaults.\n"
-"Also note that many options only apply to servers listening for incoming connections."
+"Also note that many options only apply to servers listening for incoming "
+"connections."
msgstr ""
#: i2p2www/pages/site/docs/api/streaming.html:110
msgid ""
-"As of release 0.9.1, most, but not all, options may be changed on an active socket manager or session.\n"
+"As of release 0.9.1, most, but not all, options may be changed on an "
+"active socket manager or session.\n"
"See the javadocs for details."
msgstr ""
@@ -2818,8 +3050,8 @@ msgstr ""
#: i2p2www/pages/site/docs/api/streaming.html:119
msgid ""
-"Comma- or space-separated list of Base64 peer Hashes used for either access "
-"list or blacklist."
+"Comma- or space-separated list of Base64 peer Hashes used for either "
+"access list or blacklist."
msgstr ""
#: i2p2www/pages/site/docs/api/streaming.html:121
@@ -2861,21 +3093,24 @@ msgstr ""
msgid ""
"Comma- or space-separated list of Base64 peer Hashes to be\n"
"blacklisted for incoming connections to ALL destinations in the context.\n"
-"This option must be set in the context properties, NOT in the createManager() options argument.\n"
-"Note that setting this in the router context will not affect clients outside the\n"
+"This option must be set in the context properties, NOT in the "
+"createManager() options argument.\n"
+"Note that setting this in the router context will not affect clients "
+"outside the\n"
"router in a separate JVM and context."
msgstr ""
#: i2p2www/pages/site/docs/api/streaming.html:167
msgid ""
-"How much transmit data (in bytes) will be accepted that hasn't been written "
-"out yet."
+"How much transmit data (in bytes) will be accepted that hasn't been "
+"written out yet."
msgstr ""
#: i2p2www/pages/site/docs/api/streaming.html:171
msgid ""
"When we're in congestion avoidance, we grow the window size at the rate\n"
-"of 1/(windowSize*factor)
. In standard TCP, window sizes are in bytes,\n"
+"of 1/(windowSize*factor)
. In standard TCP, window sizes are"
+" in bytes,\n"
"while in I2P, window sizes are in messages.\n"
"A higher number means slower growth."
msgstr ""
@@ -2884,15 +3119,16 @@ msgstr ""
msgid ""
"How long to wait after instantiating a new con \n"
"before actually attempting to connect. If this is\n"
-"<= 0, connect immediately with no initial data. If greater than 0, wait\n"
+"<= 0, connect immediately with no initial data. If greater than 0, "
+"wait\n"
"until the output stream is flushed, the buffer fills, \n"
"or that many milliseconds pass, and include any initial data with the SYN."
msgstr ""
#: i2p2www/pages/site/docs/api/streaming.html:186
msgid ""
-"How long to block on connect, in milliseconds. Negative means indefinitely. "
-"Default is 5 minutes."
+"How long to block on connect, in milliseconds. Negative means "
+"indefinitely. Default is 5 minutes."
msgstr ""
#: i2p2www/pages/site/docs/api/streaming.html:190
@@ -2904,19 +3140,23 @@ msgstr ""
#: i2p2www/pages/site/docs/api/streaming.html:196
msgid ""
"Whether to listen only for the streaming protocol.\n"
-"Setting to true will prohibit communication with Destinations earlier than release 0.7.1\n"
-"(released March 2009). Set to true if running multiple protocols on this Destination."
+"Setting to true will prohibit communication with Destinations earlier "
+"than release 0.7.1\n"
+"(released March 2009). Set to true if running multiple protocols on this "
+"Destination."
msgstr ""
#: i2p2www/pages/site/docs/api/streaming.html:204
msgid ""
"(0=noop, 1=disconnect)\n"
-"What to do on an inactivity timeout - do nothing, disconnect, or send a duplicate ack."
+"What to do on an inactivity timeout - do nothing, disconnect, or send a "
+"duplicate ack."
msgstr ""
#: i2p2www/pages/site/docs/api/streaming.html:212
msgid ""
-"The initial value of the resend delay field in the packet header, times 1000.\n"
+"The initial value of the resend delay field in the packet header, times "
+"1000.\n"
"Not fully implemented; see below."
msgstr ""
@@ -2939,8 +3179,8 @@ msgstr ""
#: i2p2www/pages/site/docs/api/streaming.html:230
msgid ""
-"In standard TCP, window sizes are in bytes, while in I2P, window sizes are "
-"in messages."
+"In standard TCP, window sizes are in bytes, while in I2P, window sizes "
+"are in messages."
msgstr ""
#: i2p2www/pages/site/docs/api/streaming.html:242
@@ -2980,12 +3220,12 @@ msgstr ""
#: i2p2www/pages/site/docs/api/streaming.html:295
msgid ""
"(2=interactive not supported)\n"
-"This doesn't currently do anything, but setting it to a value other than 1 will cause an error."
+"This doesn't currently do anything, but setting it to a value other than "
+"1 will cause an error."
msgstr ""
#: i2p2www/pages/site/docs/api/streaming.html:300
-msgid ""
-"How long to block on read, in milliseconds. Negative means indefinitely."
+msgid "How long to block on read, in milliseconds. Negative means indefinitely."
msgstr ""
#: i2p2www/pages/site/docs/api/streaming.html:304
@@ -3029,15 +3269,19 @@ msgstr "Einrichtung"
#: i2p2www/pages/site/docs/api/streaming.html:349
msgid ""
-"The initiator sends a packet with the SYNCHRONIZE flag set. This packet may contain the initial data as well.\n"
-"The peer replies with a packet with the SYNCHRONIZE flag set. This packet may contain the initial response data as well."
+"The initiator sends a packet with the SYNCHRONIZE flag set. This packet "
+"may contain the initial data as well.\n"
+"The peer replies with a packet with the SYNCHRONIZE flag set. This packet"
+" may contain the initial response data as well."
msgstr ""
#: i2p2www/pages/site/docs/api/streaming.html:354
msgid ""
-"The initiator may send additional data packets, up to the initial window size, before receiving the SYNCHRONIZE response.\n"
+"The initiator may send additional data packets, up to the initial window "
+"size, before receiving the SYNCHRONIZE response.\n"
"These packets will also have the send Stream ID field set to 0.\n"
-"Recipients must buffer packets received on unknown streams for a short period of time, as they may\n"
+"Recipients must buffer packets received on unknown streams for a short "
+"period of time, as they may\n"
"arrive out of order, in advance of the SYNCHRONIZE packet."
msgstr ""
@@ -3047,23 +3291,33 @@ msgstr ""
#: i2p2www/pages/site/docs/api/streaming.html:362
msgid ""
-"The maximum message size (also called the MTU / MRU) is negotiated to the lower value supported by\n"
-"the two peers. As tunnel messages are padded to 1KB, a poor MTU selection will lead to\n"
+"The maximum message size (also called the MTU / MRU) is negotiated to the"
+" lower value supported by\n"
+"the two peers. As tunnel messages are padded to 1KB, a poor MTU selection"
+" will lead to\n"
"a large amount of overhead.\n"
"The MTU is specified by the option i2p.streaming.maxMessageSize.\n"
-"The current default MTU of 1730 was chosen to fit precisely into two 1K I2NP tunnel messages,\n"
+"The current default MTU of 1730 was chosen to fit precisely into two 1K "
+"I2NP tunnel messages,\n"
"including overhead for the typical case."
msgstr ""
#: i2p2www/pages/site/docs/api/streaming.html:371
msgid ""
-"The first message in a connection includes a 387 byte (typical) Destination added by the streaming layer,\n"
-"and usually a 898 byte (typical) LeaseSet, and Session keys, bundled in the Garlic message by the router.\n"
-"(The LeaseSet and Session Keys will not be bundled if an ElGamal Session was previously established).\n"
-"Therefore, the goal of fitting a complete HTTP request in a single 1KB I2NP message is not always attainable.\n"
-"However, the selection of the MTU, together with careful implementation of fragmentation\n"
-"and batching strategies in the tunnel gateway processor, are important factors in network bandwidth,\n"
-"latency, reliability, and efficiency, especially for long-lived connections."
+"The first message in a connection includes a 387 byte (typical) "
+"Destination added by the streaming layer,\n"
+"and usually a 898 byte (typical) LeaseSet, and Session keys, bundled in "
+"the Garlic message by the router.\n"
+"(The LeaseSet and Session Keys will not be bundled if an ElGamal Session "
+"was previously established).\n"
+"Therefore, the goal of fitting a complete HTTP request in a single 1KB "
+"I2NP message is not always attainable.\n"
+"However, the selection of the MTU, together with careful implementation "
+"of fragmentation\n"
+"and batching strategies in the tunnel gateway processor, are important "
+"factors in network bandwidth,\n"
+"latency, reliability, and efficiency, especially for long-lived "
+"connections."
msgstr ""
#: i2p2www/pages/site/docs/api/streaming.html:382
@@ -3077,10 +3331,14 @@ msgstr ""
#: i2p2www/pages/site/docs/api/streaming.html:390
#, python-format
msgid ""
-"Each packet is sent through I2P as a single message (or as an individual clove in a\n"
-"Garlic Message). Message encapsulation is implemented\n"
-"in the underlying I2CP, I2NP, and\n"
-"tunnel message layers. There is no packet delimiter\n"
+"Each packet is sent through I2P as a single message (or as an individual "
+"clove in a\n"
+"Garlic Message). Message encapsulation "
+"is implemented\n"
+"in the underlying I2CP, I2NP, and\n"
+"tunnel message layers. There is no "
+"packet delimiter\n"
"mechanism or payload length field in the streaming protocol."
msgstr ""
@@ -3090,7 +3348,8 @@ msgstr ""
#: i2p2www/pages/site/docs/api/streaming.html:401
msgid ""
-"The streaming lib uses standard slow-start (exponential window growth) and congestion avoidance (linear window growth)\n"
+"The streaming lib uses standard slow-start (exponential window growth) "
+"and congestion avoidance (linear window growth)\n"
"phases, with exponential backoff.\n"
"Windowing and acknowledgments use packet count, not byte count."
msgstr ""
@@ -3101,38 +3360,46 @@ msgstr "Schließen"
#: i2p2www/pages/site/docs/api/streaming.html:409
msgid ""
-"Any packet, including one with the SYNCHRONIZE flag set, may have the CLOSE flag sent as well.\n"
-"The connection is not closed until the peer responds with the CLOSE flag.\n"
+"Any packet, including one with the SYNCHRONIZE flag set, may have the "
+"CLOSE flag sent as well.\n"
+"The connection is not closed until the peer responds with the CLOSE flag."
+"\n"
"CLOSE packets may contain data as well."
msgstr ""
#: i2p2www/pages/site/docs/api/streaming.html:417
msgid ""
-"There is no ping function at the I2CP layer (equivalent to ICMP echo) or in datagrams.\n"
+"There is no ping function at the I2CP layer (equivalent to ICMP echo) or "
+"in datagrams.\n"
"This function is provided in streaming.\n"
"Pings and pongs may not be combined with a standard streaming packet;\n"
"if the ECHO option is set, then\n"
-"most other flags, options, ackThrough, sequenceNum, NACKs, payload, etc. are ignored."
+"most other flags, options, ackThrough, sequenceNum, NACKs, payload, etc. "
+"are ignored."
msgstr ""
#: i2p2www/pages/site/docs/api/streaming.html:425
msgid ""
-"A ping packet must have the ECHO, SIGNATURE_INCLUDED, and FROM_INCLUDED flags set.\n"
-"The sendStreamId must be greater than zero, and the receiveStreamId is ignored.\n"
+"A ping packet must have the ECHO, SIGNATURE_INCLUDED, and FROM_INCLUDED "
+"flags set.\n"
+"The sendStreamId must be greater than zero, and the receiveStreamId is "
+"ignored.\n"
"The sendStreamId may or may not correspond to an existing connection."
msgstr ""
#: i2p2www/pages/site/docs/api/streaming.html:431
msgid ""
"A pong packet must have the ECHO flag set.\n"
-"The sendStreamId must be zero, and the receiveStreamId is the sendStreamId from the ping.\n"
-"The pong packet does not include any payload that was contained in the ping."
+"The sendStreamId must be zero, and the receiveStreamId is the "
+"sendStreamId from the ping.\n"
+"The pong packet does not include any payload that was contained in the "
+"ping."
msgstr ""
#: i2p2www/pages/site/docs/api/streaming.html:437
msgid ""
-"Streaming may be configured to disable sending pongs with the configuration "
-"i2p.streaming.answerPings=false."
+"Streaming may be configured to disable sending pongs with the "
+"configuration i2p.streaming.answerPings=false."
msgstr ""
#: i2p2www/pages/site/docs/api/streaming.html:442
@@ -3148,7 +3415,8 @@ msgid ""
"This is used for \"temporal\" sharing at connection open/close time,\n"
"not \"ensemble\" sharing during a connection (See\n"
"RFC 2140).\n"
-"There is a separate share per ConnectionManager (i.e. per local Destination)\n"
+"There is a separate share per ConnectionManager (i.e. per local "
+"Destination)\n"
"so that there is no information leakage to other Destinations on the\n"
"same router.\n"
"The share data for a given peer expires after a few minutes.\n"
@@ -3161,7 +3429,8 @@ msgstr "Weitere Parameter"
#: i2p2www/pages/site/docs/api/streaming.html:465
msgid ""
-"The following parameters are hardcoded, but may be of interest for analysis:"
+"The following parameters are hardcoded, but may be of interest for "
+"analysis:"
msgstr ""
#: i2p2www/pages/site/docs/api/streaming.html:484
@@ -3171,16 +3440,25 @@ msgstr "Chronik"
#: i2p2www/pages/site/docs/api/streaming.html:485
msgid ""
-"The streaming library has grown organically for I2P - first mihi implemented the\n"
-"\"mini streaming library\" as part of I2PTunnel, which was limited to a window\n"
-"size of 1 message (requiring an ACK before sending the next one), and then it was\n"
-"refactored out into a generic streaming interface (mirroring TCP sockets) and the\n"
-"full streaming implementation was deployed with a sliding window protocol and \n"
-"optimizations to take into account the high bandwidth x delay product. Individual\n"
-"streams may adjust the maximum packet size and other options. The default\n"
-"message size is selected to fit precisely in two 1K I2NP tunnel messages,\n"
+"The streaming library has grown organically for I2P - first mihi "
+"implemented the\n"
+"\"mini streaming library\" as part of I2PTunnel, which was limited to a "
+"window\n"
+"size of 1 message (requiring an ACK before sending the next one), and "
+"then it was\n"
+"refactored out into a generic streaming interface (mirroring TCP sockets)"
+" and the\n"
+"full streaming implementation was deployed with a sliding window protocol"
+" and \n"
+"optimizations to take into account the high bandwidth x delay product. "
+"Individual\n"
+"streams may adjust the maximum packet size and other options. The default"
+"\n"
+"message size is selected to fit precisely in two 1K I2NP tunnel messages,"
+"\n"
"and is a reasonable tradeoff between the bandwidth costs of \n"
-"retransmitting lost messages, and the latency and overhead of multiple messages."
+"retransmitting lost messages, and the latency and overhead of multiple "
+"messages."
msgstr ""
#: i2p2www/pages/site/docs/api/streaming.html:499
@@ -3212,16 +3490,20 @@ msgstr ""
#: i2p2www/pages/site/docs/api/streaming.html:509
#, python-format
msgid ""
-"Another area for research is the interaction of the streaming lib with the\n"
+"Another area for research is the interaction of the streaming lib with "
+"the\n"
"NTCP and SSU transport layers.\n"
"See the NTCP discussion page for details."
msgstr ""
#: i2p2www/pages/site/docs/api/streaming.html:514
msgid ""
-"The interaction of the routing algorithms with the streaming lib strongly affects performance.\n"
-"In particular, random distribution of messages to multiple tunnels in a pool\n"
-"leads to a high degree of out-of-order delivery which results in smaller window\n"
+"The interaction of the routing algorithms with the streaming lib strongly"
+" affects performance.\n"
+"In particular, random distribution of messages to multiple tunnels in a "
+"pool\n"
+"leads to a high degree of out-of-order delivery which results in smaller "
+"window\n"
"sizes than would otherwise be the case. The router currently routes \n"
"messages for a single from/to destination pair through a consistent set \n"
"of tunnels, until tunnel expiration or delivery failure. The router's \n"
@@ -3256,9 +3538,11 @@ msgstr ""
#: i2p2www/pages/site/docs/api/streaming.html:541
msgid ""
-"zzz has added debug code to the streaming library to log packets in a wireshark-compatible\n"
+"zzz has added debug code to the streaming library to log packets in a "
+"wireshark-compatible\n"
"(pcap) format; Use this to further analyze performance.\n"
-"The format may require enhancement to map more streaming lib parameters to TCP fields."
+"The format may require enhancement to map more streaming lib parameters "
+"to TCP fields."
msgstr ""
#: i2p2www/pages/site/docs/api/streaming.html:546
@@ -3277,15 +3561,18 @@ msgstr "Mai 2014"
msgid ""
"There are several bittorrent clients and trackers on I2P.\n"
"As I2P addressing uses a Destination instead of an IP and port, minor\n"
-"changes are required to tracker and client software for operation on I2P.\n"
+"changes are required to tracker and client software for operation on I2P."
+"\n"
"These changes are specified below.\n"
-"Note carefully the guidelines for compatibility with older I2P clients and trackers."
+"Note carefully the guidelines for compatibility with older I2P clients "
+"and trackers."
msgstr ""
#: i2p2www/pages/site/docs/applications/bittorrent.html:15
msgid ""
"This page specifies protocol details common to all clients and trackers.\n"
-"Specific clients and trackers may implement other unique features or protocols."
+"Specific clients and trackers may implement other unique features or "
+"protocols."
msgstr ""
#: i2p2www/pages/site/docs/applications/bittorrent.html:20
@@ -3298,7 +3585,8 @@ msgstr ""
#: i2p2www/pages/site/docs/applications/bittorrent.html:27
msgid ""
-"Clients generally include a fake port=6881 parameter in the announce, for compatibility with older trackers.\n"
+"Clients generally include a fake port=6881 parameter in the announce, for"
+" compatibility with older trackers.\n"
"Trackers may ignore the port parameter, and should not require it."
msgstr ""
@@ -3310,7 +3598,8 @@ msgid ""
"using the I2P Base 64 alphabet [A-Z][a-z][0-9]-~.\n"
"Destinations\n"
"are 387+ bytes, so the Base 64 is 516+ bytes.\n"
-"Clients generally append \".i2p\" to the Base 64 Destination for compatibility with older trackers.\n"
+"Clients generally append \".i2p\" to the Base 64 Destination for "
+"compatibility with older trackers.\n"
"Trackers should not require an appended \".i2p\"."
msgstr ""
@@ -3320,15 +3609,19 @@ msgstr ""
#: i2p2www/pages/site/docs/applications/bittorrent.html:46
msgid ""
-"While all current Destinations for clients are exactly 387 bytes, a tracker should not\n"
-"presume that will always be so. A reasonable maximum to assume, for now, is 475 bytes.\n"
-"As the tracker must decode the Base64 to deliver compact responses (see below),\n"
+"While all current Destinations for clients are exactly 387 bytes, a "
+"tracker should not\n"
+"presume that will always be so. A reasonable maximum to assume, for now, "
+"is 475 bytes.\n"
+"As the tracker must decode the Base64 to deliver compact responses (see "
+"below),\n"
"the tracker should probably decode and reject bad Base64 when announced."
msgstr ""
#: i2p2www/pages/site/docs/applications/bittorrent.html:53
msgid ""
-"The default response type is non-compact. Clients may request a compact response with\n"
+"The default response type is non-compact. Clients may request a compact "
+"response with\n"
"the parameter compact=1. A tracker may, but is not required to, return\n"
"a compact response when requested."
msgstr ""
@@ -3336,8 +3629,10 @@ msgstr ""
#: i2p2www/pages/site/docs/applications/bittorrent.html:59
msgid ""
"Developers of new I2P clients\n"
-"are strongly encouraged to implemenent announces over their own tunnel rather than\n"
-"the HTTP client proxy at port 4444. Doing so is both more efficient and it allows\n"
+"are strongly encouraged to implemenent announces over their own tunnel "
+"rather than\n"
+"the HTTP client proxy at port 4444. Doing so is both more efficient and "
+"it allows\n"
"destination enforcement by the tracker (see below)."
msgstr ""
@@ -3359,7 +3654,8 @@ msgstr ""
#: i2p2www/pages/site/docs/applications/bittorrent.html:76
msgid ""
-"Trackers generally include a fake port key, or use the port from the announce, for compatibility with older clients.\n"
+"Trackers generally include a fake port key, or use the port from the "
+"announce, for compatibility with older clients.\n"
"Clients must ignore the port parameter, and should not require it."
msgstr ""
@@ -3367,8 +3663,10 @@ msgstr ""
#, python-format
msgid ""
"The value of the ip key is the base 64 of the client's\n"
-"Destination, as described above.\n"
-"Trackers generally append \".i2p\" to the Base 64 Destination if it wasn't in the announce ip, for compatibility with older clients.\n"
+"Destination, as "
+"described above.\n"
+"Trackers generally append \".i2p\" to the Base 64 Destination if it "
+"wasn't in the announce ip, for compatibility with older clients.\n"
"Clients should not require an appended \".i2p\" in the responses."
msgstr ""
@@ -3383,22 +3681,26 @@ msgstr ""
#: i2p2www/pages/site/docs/applications/bittorrent.html:95
#, python-format
msgid ""
-"In the compact response, the value of the \"peers\" dictionary key is a single byte string,\n"
+"In the compact response, the value of the \"peers\" dictionary key is a "
+"single byte string,\n"
"whose length is a multiple of 32 bytes.\n"
"This string contains the concatenated\n"
"32-byte SHA-256 Hashes\n"
"of the binary\n"
"Destinations\n"
"of the peers.\n"
-"This hash must be computed by the tracker, unless destination enforcement\n"
-"(see below) is used, in which case the hash delivered in the X-I2P-DestHash\n"
+"This hash must be computed by the tracker, unless destination enforcement"
+"\n"
+"(see below) is used, in which case the hash delivered in the X-I2P-"
+"DestHash\n"
"or X-I2P-DestB32 HTTP headers may be converted to binary and stored.\n"
"The peers key may be absent, or the peers value may be zero-length."
msgstr ""
#: i2p2www/pages/site/docs/applications/bittorrent.html:109
msgid ""
-"While compact response support is optional for both clients and trackers, it is highly\n"
+"While compact response support is optional for both clients and trackers,"
+" it is highly\n"
"recommended as it reduces the nominal response size by over 90%."
msgstr ""
@@ -3409,27 +3711,34 @@ msgstr ""
#: i2p2www/pages/site/docs/applications/bittorrent.html:117
#, python-format
msgid ""
-"Some, but not all, I2P bittorrent clients announce over their own tunnels.\n"
-"Trackers may choose to prevent spoofing by requiring this, and verifying the\n"
+"Some, but not all, I2P bittorrent clients announce over their own "
+"tunnels.\n"
+"Trackers may choose to prevent spoofing by requiring this, and verifying "
+"the\n"
"client's\n"
"Destination\n"
"using HTTP headers added by the I2PTunnel HTTP Server tunnel.\n"
-"The headers are X-I2P-DestHash, X-I2P-DestB64, and X-I2P-DestB32, which are\n"
+"The headers are X-I2P-DestHash, X-I2P-DestB64, and X-I2P-DestB32, which "
+"are\n"
"different formats for the same information.\n"
"These headers cannot be spoofed by the client.\n"
-"A tracker enforcing destinations need not require the ip announce parameter at all."
+"A tracker enforcing destinations need not require the ip announce "
+"parameter at all."
msgstr ""
#: i2p2www/pages/site/docs/applications/bittorrent.html:129
msgid ""
-"As several clients use the HTTP proxy instead of their own tunnel for announces,\n"
-"destination enforcement will prevent usage by those clients unless or until\n"
+"As several clients use the HTTP proxy instead of their own tunnel for "
+"announces,\n"
+"destination enforcement will prevent usage by those clients unless or "
+"until\n"
"those clients are converted to announcing over their own tunnel."
msgstr ""
#: i2p2www/pages/site/docs/applications/bittorrent.html:135
msgid ""
-"Unfortunately, as the network grows, so will the amount of maliciousness,\n"
+"Unfortunately, as the network grows, so will the amount of maliciousness,"
+"\n"
"so we expect that all trackers will eventually enforce destinations.\n"
"Both tracker and client developers should anticipate it."
msgstr ""
@@ -3443,9 +3752,12 @@ msgstr ""
msgid ""
"Announce URL host names in torrent files generally follow the\n"
"I2P naming standards.\n"
-"In addition to host names from address books and \".b32.i2p\" Base 32 hostnames,\n"
-"the full Base 64 Destination (with [or without?] \".i2p\" appended) should be supported.\n"
-"Non-open trackers should recognize their own host name in any of these formats."
+"In addition to host names from address books and \".b32.i2p\" Base 32 "
+"hostnames,\n"
+"the full Base 64 Destination (with [or without?] \".i2p\" appended) "
+"should be supported.\n"
+"Non-open trackers should recognize their own host name in any of these "
+"formats."
msgstr ""
#: i2p2www/pages/site/docs/applications/bittorrent.html:152
@@ -3467,22 +3779,27 @@ msgstr ""
#: i2p2www/pages/site/docs/applications/bittorrent.html:165
#, python-format
msgid ""
-"I2P uses 387+ byte Destinations\n"
+"I2P uses 387+ byte Destinations\n"
"for addresses, as explained above."
msgstr ""
#: i2p2www/pages/site/docs/applications/bittorrent.html:170
msgid ""
-"If the client has only the hash of the destination (such as from a compact response or PEX), it must perform a lookup\n"
-"by encoding it with Base 32, appending \".b32.i2p\", and querying the Naming Service,\n"
+"If the client has only the hash of the destination (such as from a "
+"compact response or PEX), it must perform a lookup\n"
+"by encoding it with Base 32, appending \".b32.i2p\", and querying the "
+"Naming Service,\n"
"which will return the full Destination if available."
msgstr ""
#: i2p2www/pages/site/docs/applications/bittorrent.html:176
msgid ""
-"If the client has a peer's full Destination it received in a non-compact response, it should use it\n"
+"If the client has a peer's full Destination it received in a non-compact "
+"response, it should use it\n"
"directly in the connection setup.\n"
-"Do not convert a Destination back to a Base 32 hash for lookup, this is quite inefficient."
+"Do not convert a Destination back to a Base 32 hash for lookup, this is "
+"quite inefficient."
msgstr ""
#: i2p2www/pages/site/docs/applications/bittorrent.html:183
@@ -3492,32 +3809,40 @@ msgstr ""
#: i2p2www/pages/site/docs/applications/bittorrent.html:184
msgid ""
"To preserve anonymity,\n"
-"I2P bittorrent clients generally do not support non-I2P announces or peer connections.\n"
+"I2P bittorrent clients generally do not support non-I2P announces or peer"
+" connections.\n"
"I2P HTTP outproxies often block announces.\n"
"There are no known SOCKS outproxies supporting bittorrent traffic."
msgstr ""
#: i2p2www/pages/site/docs/applications/bittorrent.html:191
msgid ""
-"To prevent usage by non-I2P clients via an HTTP inproxy, I2P trackers often\n"
+"To prevent usage by non-I2P clients via an HTTP inproxy, I2P trackers "
+"often\n"
"block accesses or announces that contain an X-Forwarded-For HTTP header.\n"
-"Trackers should reject standard network announces with IPv4 or IPv6 IPs, and not deliver them in responses."
+"Trackers should reject standard network announces with IPv4 or IPv6 IPs, "
+"and not deliver them in responses."
msgstr ""
#: i2p2www/pages/site/docs/applications/bittorrent.html:200
#, python-format
msgid ""
"I2P PEX is based on ut_pex.\n"
-"As there does not appear to be a formal specification of ut_pex available,\n"
+"As there does not appear to be a formal specification of ut_pex "
+"available,\n"
"it may be necessary to review the libtorrent source for assistance.\n"
"It is an extension message, identified as \"i2p_pex\" in\n"
-"the extension handshake.\n"
-"It contains a bencoded dictionary with up to 3 keys, \"added\", \"added.f\", and \"dropped\".\n"
-"The added and dropped values are each a single byte string, whose length is a multiple of 32 bytes.\n"
+"the extension "
+"handshake.\n"
+"It contains a bencoded dictionary with up to 3 keys, \"added\", "
+"\"added.f\", and \"dropped\".\n"
+"The added and dropped values are each a single byte string, whose length "
+"is a multiple of 32 bytes.\n"
"These byte strings are the concatenated SHA-256 Hashes of the binary\n"
"Destinations\n"
"of the peers.\n"
-"This is the same format as the peers dictionary value in the i2p compact response format specified above.\n"
+"This is the same format as the peers dictionary value in the i2p compact "
+"response format specified above.\n"
"The added.f value, if present, is the same as in ut_pex."
msgstr ""
@@ -3532,10 +3857,13 @@ msgstr ""
#: i2p2www/pages/site/docs/applications/bittorrent.html:226
msgid ""
-"Unlike standard DHT, I2P DHT does not use a bit in the options handshake, or the PORT message.\n"
+"Unlike standard DHT, I2P DHT does not use a bit in the options handshake,"
+" or the PORT message.\n"
"It is advertised with an extension message, identified as \"i2p_dht\" in\n"
-"the extension handshake.\n"
-"It contains a bencoded dictionary with two keys, \"port\" and \"rport\", both integers."
+"the extension "
+"handshake.\n"
+"It contains a bencoded dictionary with two keys, \"port\" and \"rport\", "
+"both integers."
msgstr ""
#: i2p2www/pages/site/docs/applications/bittorrent.html:233
@@ -3565,12 +3893,14 @@ msgstr ""
msgid ""
"Compact peer info is 32 bytes (32 byte SHA256 Hash)\n"
"instead of 4 byte IP + 2 byte port. There is no peer port.\n"
-"In a response, the \"values\" key is a list of strings, each containing a single compact peer info."
+"In a response, the \"values\" key is a list of strings, each containing a"
+" single compact peer info."
msgstr ""
#: i2p2www/pages/site/docs/applications/bittorrent.html:260
msgid ""
-"Compact node info is 54 bytes (20 byte SHA1 Hash + 32 byte SHA256 Hash + 2 byte port)\n"
+"Compact node info is 54 bytes (20 byte SHA1 Hash + 32 byte SHA256 Hash + "
+"2 byte port)\n"
"instead of 20 byte SHA1 Hash + 4 byte IP + 2 byte port.\n"
"In a response, the \"nodes\" key is a\n"
"single byte string with concatenated compact node info."
@@ -3579,8 +3909,10 @@ msgstr ""
#: i2p2www/pages/site/docs/applications/bittorrent.html:267
msgid ""
"Secure node ID requirement: To make various DHT attacks more difficult,\n"
-"the first 4 bytes of the Node ID must match the first 4 bytes of the destination Hash,\n"
-"and the next two bytes of the Node ID must match the next two bytes of the\n"
+"the first 4 bytes of the Node ID must match the first 4 bytes of the "
+"destination Hash,\n"
+"and the next two bytes of the Node ID must match the next two bytes of "
+"the\n"
"destination hash exclusive-ORed with the port."
msgstr ""
@@ -3605,38 +3937,51 @@ msgid ""
"Preliminary differences from\n"
"BEP 15\n"
"are described below, and are subject to change.\n"
-"Contact the I2P developers if you wish to develop a client or tracker supporting datagram announces."
+"Contact the I2P developers if you wish to develop a client or tracker "
+"supporting datagram announces."
msgstr ""
#: i2p2www/pages/site/docs/applications/bittorrent.html:295
msgid ""
"A UDP tracker listens on two ports.\n"
-"The \"query port\" is the advertised port, and is used to receive repliable (signed) datagrams, for the connect request only.\n"
-"The \"response port\" is used to receive unsigned (raw) datagrams, and is the source port for all replies.\n"
+"The \"query port\" is the advertised port, and is used to receive "
+"repliable (signed) datagrams, for the connect request only.\n"
+"The \"response port\" is used to receive unsigned (raw) datagrams, and is"
+" the source port for all replies.\n"
"The response port is arbitrary.\n"
"A client sends and receives on a single port only.\n"
"It receives only unsigned (raw) datagrams.\n"
-"Raw datagrams provides increased efficiency for replies since they contain tokens sent in the query, and need not be signed."
+"Raw datagrams provides increased efficiency for replies since they "
+"contain tokens sent in the query, and need not be signed."
msgstr ""
#: i2p2www/pages/site/docs/applications/bittorrent.html:305
msgid ""
-"In the announce request, the 4-byte IP is replaced by a 32-byte hash, and the port is still present,\n"
+"In the announce request, the 4-byte IP is replaced by a 32-byte hash, and"
+" the port is still present,\n"
"although it may be ignored by the tracker.\n"
-"In the announce response, each 4-byte IP and 2-byte port is replaced by a 32-byte hash (compact peer info), and no port is present.\n"
-"The client sends the announce request and scrape request to the source port in the announce response packet.\n"
-"The connect request, connect response, scrape request, scrape response, and error response are the same as in BEP 15."
+"In the announce response, each 4-byte IP and 2-byte port is replaced by a"
+" 32-byte hash (compact peer info), and no port is present.\n"
+"The client sends the announce request and scrape request to the source "
+"port in the announce response packet.\n"
+"The connect request, connect response, scrape request, scrape response, "
+"and error response are the same as in BEP 15."
msgstr ""
#: i2p2www/pages/site/docs/applications/bittorrent.html:313
msgid ""
-"Source addresses in I2P cannot be spoofed, so it is possible to use a simplified protocol\n"
+"Source addresses in I2P cannot be spoofed, so it is possible to use a "
+"simplified protocol\n"
"with 2 packets instead of 4, omitting the connect request and response.\n"
-"In this case, the announce request would be a repliable datagram sent to the tracker's query port,\n"
+"In this case, the announce request would be a repliable datagram sent to "
+"the tracker's query port,\n"
"and the tracker would not require a response port.\n"
-"While this is more efficient, it would be more difficult to modify an existing tracker to support this mode.\n"
-"The URL for the 4-packet-mode tracker would use standard \"udp://\" prefix. \n"
-"The URL for a modified 2-packet-mode tracker would require a different prefix if both modes are supported in I2P."
+"While this is more efficient, it would be more difficult to modify an "
+"existing tracker to support this mode.\n"
+"The URL for the 4-packet-mode tracker would use standard \"udp://\" "
+"prefix. \n"
+"The URL for a modified 2-packet-mode tracker would require a different "
+"prefix if both modes are supported in I2P."
msgstr ""
#: i2p2www/pages/site/docs/applications/bittorrent.html:326
@@ -3676,15 +4021,19 @@ msgstr ""
#: i2p2www/pages/site/docs/applications/embedding.html:8
msgid ""
-"This page is about bundling the entire I2P router binary with your application.\n"
-"It is not about writing an application to work with I2P (either bundled or external)."
+"This page is about bundling the entire I2P router binary with your "
+"application.\n"
+"It is not about writing an application to work with I2P (either bundled "
+"or external)."
msgstr ""
#: i2p2www/pages/site/docs/applications/embedding.html:13
msgid ""
-"Lots of projects are bundling, or talking about bundling, I2P. That's great if done right.\n"
+"Lots of projects are bundling, or talking about bundling, I2P. That's "
+"great if done right.\n"
"If done wrong, it could cause real harm to our network.\n"
-"The I2P router is complex, and it can be a challenge to hide all the complexity from your users.\n"
+"The I2P router is complex, and it can be a challenge to hide all the "
+"complexity from your users.\n"
"This page discusses some general guidelines."
msgstr ""
@@ -3694,8 +4043,10 @@ msgstr ""
#: i2p2www/pages/site/docs/applications/embedding.html:24
msgid ""
-"Start a dialog. We're here to help. Applications that embed I2P are the most promising - and exciting -\n"
-"opportunities for us to grow the network and improve anonymity for everyone."
+"Start a dialog. We're here to help. Applications that embed I2P are the "
+"most promising - and exciting -\n"
+"opportunities for us to grow the network and improve anonymity for "
+"everyone."
msgstr ""
#: i2p2www/pages/site/docs/applications/embedding.html:30
@@ -3704,9 +4055,11 @@ msgstr ""
#: i2p2www/pages/site/docs/applications/embedding.html:31
msgid ""
-"If your application is in Java or Scala, it's an easy choice - use the Java router.\n"
+"If your application is in Java or Scala, it's an easy choice - use the "
+"Java router.\n"
"If in C/C++, we recommend i2pd. The development of i2pcpp has stopped.\n"
-"For apps in other languages, best to use SAM or BOB or SOCKS and bundle the Java router as a separate process.\n"
+"For apps in other languages, best to use SAM or BOB or SOCKS and bundle "
+"the Java router as a separate process.\n"
"Some of the following only applies to the Java router."
msgstr ""
@@ -3715,8 +4068,7 @@ msgid "Licensing"
msgstr ""
#: i2p2www/pages/site/docs/applications/embedding.html:40
-msgid ""
-"Ensure you meet the license requirements of the software you are bundling."
+msgid "Ensure you meet the license requirements of the software you are bundling."
msgstr ""
#: i2p2www/pages/site/docs/applications/embedding.html:45
@@ -3725,22 +4077,29 @@ msgstr ""
#: i2p2www/pages/site/docs/applications/embedding.html:46
msgid ""
-"A correct default configuration is crucial. Most users will not change the defaults.\n"
-"The defaults for your application may need to be different than the defaults for the router you are bundling.\n"
+"A correct default configuration is crucial. Most users will not change "
+"the defaults.\n"
+"The defaults for your application may need to be different than the "
+"defaults for the router you are bundling.\n"
"Override the router defaults if necessary."
msgstr ""
#: i2p2www/pages/site/docs/applications/embedding.html:51
msgid ""
-"Some important defaults to review: Max bandwidth, tunnel quantity and length, max participating tunnels.\n"
-"A lot of this depends on the expected bandwidth and usage patterns of your app."
+"Some important defaults to review: Max bandwidth, tunnel quantity and "
+"length, max participating tunnels.\n"
+"A lot of this depends on the expected bandwidth and usage patterns of "
+"your app."
msgstr ""
#: i2p2www/pages/site/docs/applications/embedding.html:55
msgid ""
-"Configure enough bandwidth and tunnels to allow your users to contribute to the network.\n"
-"Consider disabling external I2CP, as you probably don't need it and it would conflict with any other running I2P instance.\n"
-"Also look at the configs for disabling killing of the JVM on exit, for example."
+"Configure enough bandwidth and tunnels to allow your users to contribute "
+"to the network.\n"
+"Consider disabling external I2CP, as you probably don't need it and it "
+"would conflict with any other running I2P instance.\n"
+"Also look at the configs for disabling killing of the JVM on exit, for "
+"example."
msgstr ""
#: i2p2www/pages/site/docs/applications/embedding.html:62
@@ -3750,25 +4109,32 @@ msgstr ""
#: i2p2www/pages/site/docs/applications/embedding.html:63
msgid ""
"It may be tempting for you to disable participating traffic.\n"
-"There's several ways to do this (hidden mode, setting max tunnels to 0, setting shared bandwidth below 12 KBytes/sec).\n"
-"Without participating traffic, you don't have to worry about graceful shutdown,\n"
+"There's several ways to do this (hidden mode, setting max tunnels to 0, "
+"setting shared bandwidth below 12 KBytes/sec).\n"
+"Without participating traffic, you don't have to worry about graceful "
+"shutdown,\n"
"your users don't see bandwidth usage not generated by them, etc.\n"
-"However, there's lots of reasons why you should allow participating tunnels."
+"However, there's lots of reasons why you should allow participating "
+"tunnels."
msgstr ""
#: i2p2www/pages/site/docs/applications/embedding.html:70
msgid ""
-"First of all, the router doesn't work that well if it doesn't have a chance to \"integrate\" with the network,\n"
+"First of all, the router doesn't work that well if it doesn't have a "
+"chance to \"integrate\" with the network,\n"
"which is helped tremendously by others building tunnels through you."
msgstr ""
#: i2p2www/pages/site/docs/applications/embedding.html:74
msgid ""
-"Secondly, over 90% of the routers in the current network allow participating traffic.\n"
+"Secondly, over 90% of the routers in the current network allow "
+"participating traffic.\n"
"It's the default in the Java router.\n"
-"If your application doesn't route for others and it gets really popular, then it's a leech on the network,\n"
+"If your application doesn't route for others and it gets really popular, "
+"then it's a leech on the network,\n"
"and it upsets the balance we have now.\n"
-"If it gets really big, then we become Tor, and spend our time begging for people to enable relaying."
+"If it gets really big, then we become Tor, and spend our time begging for"
+" people to enable relaying."
msgstr ""
#: i2p2www/pages/site/docs/applications/embedding.html:81
@@ -3779,8 +4145,10 @@ msgstr ""
#: i2p2www/pages/site/docs/applications/embedding.html:84
msgid ""
-"We strongly discourage you from disabling participating traffic by default.\n"
-"If you do this and your application gets hugely popular, it could break the network."
+"We strongly discourage you from disabling participating traffic by "
+"default.\n"
+"If you do this and your application gets hugely popular, it could break "
+"the network."
msgstr ""
#: i2p2www/pages/site/docs/applications/embedding.html:90
@@ -3789,9 +4157,12 @@ msgstr ""
#: i2p2www/pages/site/docs/applications/embedding.html:91
msgid ""
-"You must save the router's data (netdb, configuration, etc.) between runs of the router.\n"
-"I2P does not work well if you must reseed each startup, and that's a huge load on our reseed servers, and not very good for anonymity either.\n"
-"Even if you bundle router infos, I2P needs saved profile data for best performance."
+"You must save the router's data (netdb, configuration, etc.) between runs"
+" of the router.\n"
+"I2P does not work well if you must reseed each startup, and that's a huge"
+" load on our reseed servers, and not very good for anonymity either.\n"
+"Even if you bundle router infos, I2P needs saved profile data for best "
+"performance."
msgstr ""
#: i2p2www/pages/site/docs/applications/embedding.html:99
@@ -3800,9 +4171,12 @@ msgstr ""
#: i2p2www/pages/site/docs/applications/embedding.html:100
msgid ""
-"Give your users a way to change the configuration of the important settings.\n"
-"We understand that you will probably want to hide most of I2P's complexity, but it's important to show some basic settings.\n"
-"In addition to the defaults above, some network settings such as UPnP, IP/port may be helpful."
+"Give your users a way to change the configuration of the important "
+"settings.\n"
+"We understand that you will probably want to hide most of I2P's "
+"complexity, but it's important to show some basic settings.\n"
+"In addition to the defaults above, some network settings such as UPnP, "
+"IP/port may be helpful."
msgstr ""
#: i2p2www/pages/site/docs/applications/embedding.html:108
@@ -3811,9 +4185,12 @@ msgstr ""
#: i2p2www/pages/site/docs/applications/embedding.html:109
msgid ""
-"Above a certain bandwidth setting, and meeting other health criteria, your router will become floodfill,\n"
-"which may cause a large increase in connections and memory usage (at least with the Java router).\n"
-"Think about whether that's OK. You can disable floodfill, but then your fastest users aren't contributing what they could.\n"
+"Above a certain bandwidth setting, and meeting other health criteria, "
+"your router will become floodfill,\n"
+"which may cause a large increase in connections and memory usage (at "
+"least with the Java router).\n"
+"Think about whether that's OK. You can disable floodfill, but then your "
+"fastest users aren't contributing what they could.\n"
"It also depends on the typical uptime for your application."
msgstr ""
@@ -3824,7 +4201,8 @@ msgstr ""
#: i2p2www/pages/site/docs/applications/embedding.html:120
msgid ""
"Decide if you are bundling router infos or using our reseed hosts.\n"
-"The Java reseed host list is in the source code, so if you keep your source up to date, the host list will be also.\n"
+"The Java reseed host list is in the source code, so if you keep your "
+"source up to date, the host list will be also.\n"
"Be aware of possible blocking by hostile governments."
msgstr ""
@@ -3834,9 +4212,12 @@ msgstr ""
#: i2p2www/pages/site/docs/applications/embedding.html:130
msgid ""
-"Consider setting your application tunnels to delay-open, reduce-on-idle and/or close-on-idle.\n"
-"This is straightforward if using i2ptunnel but you'll have to implement some of it yourself if using I2CP directly.\n"
-"See i2psnark for code that reduces tunnel count and then closes the tunnel, even in the presence of some background DHT activity."
+"Consider setting your application tunnels to delay-open, reduce-on-idle "
+"and/or close-on-idle.\n"
+"This is straightforward if using i2ptunnel but you'll have to implement "
+"some of it yourself if using I2CP directly.\n"
+"See i2psnark for code that reduces tunnel count and then closes the "
+"tunnel, even in the presence of some background DHT activity."
msgstr ""
#: i2p2www/pages/site/docs/applications/embedding.html:138
@@ -3845,11 +4226,16 @@ msgstr ""
#: i2p2www/pages/site/docs/applications/embedding.html:139
msgid ""
-"Have an auto-update feature if at all possible, or at least auto-notification of a new version.\n"
-"Our biggest fear is a huge number of routers out there that can't be updated.\n"
-"We have about 6-8 releases a year of the Java router, and it's critical to the health of the network that the users keep up.\n"
-"We usually have over 80% of the network on the latest release within 6 weeks after the release, and we'd like to keep it that way.\n"
-"You don't need to worry about disabling the router's built-in auto-update function, as that code is in the router console,\n"
+"Have an auto-update feature if at all possible, or at least auto-"
+"notification of a new version.\n"
+"Our biggest fear is a huge number of routers out there that can't be "
+"updated.\n"
+"We have about 6-8 releases a year of the Java router, and it's critical "
+"to the health of the network that the users keep up.\n"
+"We usually have over 80% of the network on the latest release within "
+"6 weeks after the release, and we'd like to keep it that way.\n"
+"You don't need to worry about disabling the router's built-in auto-update"
+" function, as that code is in the router console,\n"
"which you presumably are not bundling."
msgstr ""
@@ -3860,12 +4246,17 @@ msgstr ""
#: i2p2www/pages/site/docs/applications/embedding.html:151
msgid ""
"Have a gradual rollout plan. Don't overwhelm the network all at once.\n"
-"We currently have approximately 25K unique users per day and 40K uniques per month.\n"
-"We are probably able to handle growth of 2-3X per year without too much issue.\n"
-"If you anticipate a faster rampup than that, OR the bandwidth distribution (or uptime distribution,\n"
-"or any other significant characteristic) of your userbase is significantly different from our current userbase,\n"
+"We currently have approximately 25K unique users per day and 40K uniques "
+"per month.\n"
+"We are probably able to handle growth of 2-3X per year without too much "
+"issue.\n"
+"If you anticipate a faster rampup than that, OR the bandwidth "
+"distribution (or uptime distribution,\n"
+"or any other significant characteristic) of your userbase is "
+"significantly different from our current userbase,\n"
"we really need to have a discussion.\n"
-"The bigger your growth plans, the more important everthing else in this checklist is."
+"The bigger your growth plans, the more important everthing else in this "
+"checklist is."
msgstr ""
#: i2p2www/pages/site/docs/applications/embedding.html:163
@@ -3875,8 +4266,10 @@ msgstr ""
#: i2p2www/pages/site/docs/applications/embedding.html:164
msgid ""
"Tell your users that I2P works best if it keeps running.\n"
-"It may be several minutes after startup before it works well, and even more after first install.\n"
-"If your average uptime is less than an hour, I2P is probably the wrong solution."
+"It may be several minutes after startup before it works well, and even "
+"more after first install.\n"
+"If your average uptime is less than an hour, I2P is probably the wrong "
+"solution."
msgstr ""
#: i2p2www/pages/site/docs/applications/embedding.html:172
@@ -3885,8 +4278,8 @@ msgstr ""
#: i2p2www/pages/site/docs/applications/embedding.html:173
msgid ""
-"Provide some indication to the user that the application tunnels are ready. "
-"Encourage patience."
+"Provide some indication to the user that the application tunnels are "
+"ready. Encourage patience."
msgstr ""
#: i2p2www/pages/site/docs/applications/embedding.html:178
@@ -3896,7 +4289,8 @@ msgstr ""
#: i2p2www/pages/site/docs/applications/embedding.html:179
msgid ""
"If possible, delay the shutdown until your participating tunnels expire.\n"
-"Don't let your users break tunnels easily, or at least ask them to confirm."
+"Don't let your users break tunnels easily, or at least ask them to "
+"confirm."
msgstr ""
#: i2p2www/pages/site/docs/applications/embedding.html:185
@@ -3905,8 +4299,8 @@ msgstr ""
#: i2p2www/pages/site/docs/applications/embedding.html:186
msgid ""
-"It would be nice if you give your users links to learn more about I2P and to"
-" donate."
+"It would be nice if you give your users links to learn more about I2P and"
+" to donate."
msgstr ""
#: i2p2www/pages/site/docs/applications/embedding.html:192
@@ -3916,7 +4310,8 @@ msgstr ""
#: i2p2www/pages/site/docs/applications/embedding.html:193
msgid ""
"Depending on your user base and application,\n"
-"it may be helpful to provide an option or a separate package to use an external router."
+"it may be helpful to provide an option or a separate package to use an "
+"external router."
msgstr ""
#: i2p2www/pages/site/docs/applications/embedding.html:200
@@ -3925,7 +4320,8 @@ msgstr ""
#: i2p2www/pages/site/docs/applications/embedding.html:201
msgid ""
-"If you plan to use or link to other common I2P services (news feeds, hosts.txt subscriptions, trackers, outproxies, etc.),\n"
+"If you plan to use or link to other common I2P services (news feeds, "
+"hosts.txt subscriptions, trackers, outproxies, etc.),\n"
"make sure you aren't overloading them,\n"
"and talk to the people who are running them to make sure it's ok."
msgstr ""
@@ -3937,8 +4333,10 @@ msgstr ""
#: i2p2www/pages/site/docs/applications/embedding.html:210
msgid ""
"I2P includes an SNTP client. I2P requires correct time to operate.\n"
-"It will compensate for a skewed system clock but this may delay startup. You may disable I2P's SNTP queries,\n"
-"but this isn't advised unless your application makes sure the system clock is correct."
+"It will compensate for a skewed system clock but this may delay startup. "
+"You may disable I2P's SNTP queries,\n"
+"but this isn't advised unless your application makes sure the system "
+"clock is correct."
msgstr ""
#: i2p2www/pages/site/docs/applications/embedding.html:218
@@ -3947,15 +4345,20 @@ msgstr ""
#: i2p2www/pages/site/docs/applications/embedding.html:219
msgid ""
-"At a minimum you will need i2p.jar, router.jar, streaming.jar, and mstreaming.jar.\n"
+"At a minimum you will need i2p.jar, router.jar, streaming.jar, and "
+"mstreaming.jar.\n"
"You may omit the two straming jars for a datagram-only app.\n"
"Some apps may need more, e.g. i2ptunnel.jar or addressbook.jar.\n"
-"Don't forget jbigi.jar, or a subset of it for the platforms you support, to make the crypto much faster.\n"
-"We are currently building them for Java 6, as of 0.9.14. The source is mostly compatible with Java 5 if you want to do your own compile,\n"
+"Don't forget jbigi.jar, or a subset of it for the platforms you support, "
+"to make the crypto much faster.\n"
+"We are currently building them for Java 6, as of 0.9.14. The source is "
+"mostly compatible with Java 5 if you want to do your own compile,\n"
"but we may start using Java 6 features at any time without notice.\n"
"We plan to migrate to Java 7 in 2015.\n"
-"If you're building Debian / Ubuntu packages, you should require the I2P package from our PPA instead of bundling it.\n"
-"You almost certainly do not need susimail, susidns, the router console, and i2psnark, for example."
+"If you're building Debian / Ubuntu packages, you should require the I2P "
+"package from our PPA instead of bundling it.\n"
+"You almost certainly do not need susimail, susidns, the router console, "
+"and i2psnark, for example."
msgstr ""
#: i2p2www/pages/site/docs/applications/embedding.html:233
@@ -3973,13 +4376,17 @@ msgstr ""
#: i2p2www/pages/site/docs/applications/embedding.html:245
msgid ""
"If your application is using I2P datagrams, e.g. for a DHT,\n"
-"there's lots of advanced options available to reduce overhead and increase reliability.\n"
+"there's lots of advanced options available to reduce overhead and "
+"increase reliability.\n"
"This may take some time and experimentation to get working well.\n"
"Be aware of size/reliability tradeoffs. Talk to us for help.\n"
-"It is possible - and recommended - to use Datagrams and Streaming on the same Destination.\n"
+"It is possible - and recommended - to use Datagrams and Streaming on the "
+"same Destination.\n"
"Don't create separate Destinations for this.\n"
-"Don't try to store your unrelated data in the existing network DHTs (iMule, bote, bittorrent, and router).\n"
-"Build your own. If you are hardcoding seed nodes, we recommend that you have several."
+"Don't try to store your unrelated data in the existing network DHTs "
+"(iMule, bote, bittorrent, and router).\n"
+"Build your own. If you are hardcoding seed nodes, we recommend that you "
+"have several."
msgstr ""
#: i2p2www/pages/site/docs/applications/embedding.html:258
@@ -3989,7 +4396,8 @@ msgstr ""
#: i2p2www/pages/site/docs/applications/embedding.html:259
msgid ""
"Let's work together. Don't wait until it's done.\n"
-"Give us your Twitter handle and start tweeting about it, we will return the favor."
+"Give us your Twitter handle and start tweeting about it, we will return "
+"the favor."
msgstr ""
#: i2p2www/pages/site/docs/applications/embedding.html:265
@@ -4008,7 +4416,8 @@ msgstr ""
#: i2p2www/pages/site/docs/applications/embedding.html:273
msgid ""
-"This may be obvious, but join the community. Run I2P 24/7. Start an eepsite about your project.\n"
+"This may be obvious, but join the community. Run I2P 24/7. Start an "
+"eepsite about your project.\n"
"Hang out in IRC #i2p-dev. Post on the forums. Spread the word.\n"
"We can help get you users, testers, translators, or even coders."
msgstr ""
@@ -4019,10 +4428,12 @@ msgstr ""
#: i2p2www/pages/site/docs/applications/embedding.html:282
msgid ""
-"You may wish to install and play with the I2P Android app, and look at its code, for an example of an application that bundles the router.\n"
+"You may wish to install and play with the I2P Android app, and look at "
+"its code, for an example of an application that bundles the router.\n"
"See what we expose to the user and what we hide.\n"
"Look at the state machine we use to start and stop the router.\n"
-"Other examples are: Vuze, the Nightweb Android app, iMule, TAILS, iCloak, and Monero."
+"Other examples are: Vuze, the Nightweb Android app, iMule, TAILS, iCloak,"
+" and Monero."
msgstr ""
#: i2p2www/pages/site/docs/applications/embedding.html:290
@@ -4037,8 +4448,10 @@ msgstr ""
#: i2p2www/pages/site/docs/applications/embedding.html:306
msgid ""
-"This code is for the case where your application starts the router, as in our Android app.\n"
-"You could also have the router start the applictaion via the clients.config and i2ptunnel.config files,\n"
+"This code is for the case where your application starts the router, as in"
+" our Android app.\n"
+"You could also have the router start the applictaion via the "
+"clients.config and i2ptunnel.config files,\n"
"together with Jetty webapps,\n"
"as is done in our Java packages.\n"
"As always, state management is the difficult part."
@@ -4065,18 +4478,24 @@ msgstr ""
msgid ""
"As of release 0.9.4, the router supports managed clients.\n"
"Managed clients are instantiated and started by the ClientAppManager.\n"
-"The ClientAppManager maintains a reference to the client and receives updates on the client's state.\n"
-"Managed clients are preferred, as it is much easier to implement state tracking\n"
-"and to start and stop a client. It also is much easier to avoid static references in the client code\n"
+"The ClientAppManager maintains a reference to the client and receives "
+"updates on the client's state.\n"
+"Managed clients are preferred, as it is much easier to implement state "
+"tracking\n"
+"and to start and stop a client. It also is much easier to avoid static "
+"references in the client code\n"
"which could lead to excessive memory usage after a client is stopped.\n"
-"Managed clients may be started and stopped by the user in the router console,\n"
+"Managed clients may be started and stopped by the user in the router "
+"console,\n"
"and are stopped at router shutdown."
msgstr ""
#: i2p2www/pages/site/docs/applications/managed-clients.html:31
msgid ""
-"Managed clients implement either the net.i2p.app.ClientApp or net.i2p.router.app.RouterApp interface.\n"
-"Clients implementing the ClientApp interface must provide the following constructor:"
+"Managed clients implement either the net.i2p.app.ClientApp or "
+"net.i2p.router.app.RouterApp interface.\n"
+"Clients implementing the ClientApp interface must provide the following "
+"constructor:"
msgstr ""
#: i2p2www/pages/site/docs/applications/managed-clients.html:38
@@ -4095,10 +4514,12 @@ msgstr ""
#: i2p2www/pages/site/docs/applications/managed-clients.html:49
msgid ""
-"If the main class specified in the clients.config file does not implement a managed interface,\n"
+"If the main class specified in the clients.config file does not implement"
+" a managed interface,\n"
"it will be started with main() with the arguments specified,\n"
"and stopped with main() with the arguments specified.\n"
-"The router does not maintain a reference, since all interactions are via the static main() method.\n"
+"The router does not maintain a reference, since all interactions are via "
+"the static main() method.\n"
"The console cannot provide accurate state information to the user."
msgstr ""
@@ -4108,7 +4529,8 @@ msgstr "Registered Clients"
#: i2p2www/pages/site/docs/applications/managed-clients.html:58
msgid ""
-"Clients, whether managed or unmanaged, may register with the ClientAppManager\n"
+"Clients, whether managed or unmanaged, may register with the "
+"ClientAppManager\n"
"so that other clients may retrieve a reference to them.\n"
"Registration is by name.\n"
"Known registered clients are:"
@@ -4120,10 +4542,12 @@ msgstr ""
#: i2p2www/pages/site/docs/applications/managed-clients.html:69
msgid ""
-"The router also provides a simple mechanism for clients to find an internal socket service,\n"
+"The router also provides a simple mechanism for clients to find an "
+"internal socket service,\n"
"such as the HTTP proxy. This is provided by the Port Mapper.\n"
"Registration is by name.\n"
-"Clients that register generally provide an internal emulated socket on that port."
+"Clients that register generally provide an internal emulated socket on "
+"that port."
msgstr ""
#: i2p2www/pages/site/docs/applications/supported.html:2
@@ -4395,12 +4819,17 @@ msgstr ""
#, python-format
msgid ""
"Warning: Using an application, plugin, or service with I2P\n"
-"doesn't automatically protect your anonymity. I2P is merely a set of tools\n"
-"which can help you mitigate certain identified\n"
-"threats to anonymity. We do not and cannot make any guarantees about the\n"
+"doesn't automatically protect your anonymity. I2P is merely a set of "
+"tools\n"
+"which can help you mitigate certain identified\n"
+"threats to anonymity. We do not and cannot make any guarantees about "
+"the\n"
"safety of the applications, plugins, and services listed below. Most\n"
-"applications and plugins must be properly configured, and some will need to\n"
-"be patched — and even then your anonymity might not be assured. Similarly,\n"
+"applications and plugins must be properly configured, and some will need "
+"to\n"
+"be patched — and even then your anonymity might not be assured. "
+"Similarly,\n"
"services could put your anonymity at risk, either by design or through\n"
"carelessness on their part or your own."
msgstr ""
@@ -4408,8 +4837,10 @@ msgstr ""
#: i2p2www/pages/site/docs/applications/supported.html:171
msgid ""
"If you have doubts about the suitability of an application,\n"
-"plugin, or service for use with I2P, you are urged to inquire about privacy\n"
-"issues with its maintainers, to search its mailing lists and bug tracker if\n"
+"plugin, or service for use with I2P, you are urged to inquire about "
+"privacy\n"
+"issues with its maintainers, to search its mailing lists and bug tracker "
+"if\n"
"one exists, and consult trusted, knowledgeable members of the I2P\n"
"community."
msgstr ""
@@ -4417,7 +4848,8 @@ msgstr ""
#: i2p2www/pages/site/docs/applications/supported.html:179
msgid ""
"Take responsibility for your own anonymity and safety — always\n"
-"seek expert advice, educate yourself, practice good judgment, be mindful of\n"
+"seek expert advice, educate yourself, practice good judgment, be mindful "
+"of\n"
"disclosing personally identifying information, and don't take\n"
"shortcuts."
msgstr ""
@@ -4448,7 +4880,8 @@ msgstr ""
#: i2p2www/pages/site/docs/applications/supported.html:236
#, python-format
msgid ""
-"Port of the Tahoe-LAFS\n"
+"Port of the Tahoe-"
+"LAFS\n"
"distributed file system to the I2P network. Controller plugin here."
msgstr ""
@@ -4470,8 +4903,10 @@ msgid ""
"Provides management of addressbooks, which are part of a simple,\n"
"user-controlled I2P naming system somewhat\n"
"analogous to the Internet's Domain Name System (DNS). Addressbooks map\n"
-"Base64 destinations to short, usually human-readable “domain” names ending\n"
-"with a .i2p suffix which the I2P router's HTTP client can resolve back to\n"
+"Base64 destinations to short, usually human-readable “domain” names "
+"ending\n"
+"with a .i2p suffix which the I2P router's HTTP client can resolve back to"
+"\n"
"Base64 addresses. (Note: While Base64 destinations are globally\n"
"unique, addressbook “domain” names only resolve to unique destinations\n"
"locally.)"
@@ -4486,7 +4921,8 @@ msgstr ""
#: i2p2www/pages/site/docs/applications/supported.html:297
msgid ""
"Provides email service within the I2P network via @mail.i2p addresses,\n"
-"and email gateway service between the I2P network and the public Internet\n"
+"and email gateway service between the I2P network and the public Internet"
+"\n"
"via @i2pmail.org addresses. One of the oldest continuous services on I2P."
msgstr ""
@@ -4541,7 +4977,8 @@ msgstr ""
#: i2p2www/pages/site/docs/applications/supported.html:382
msgid ""
-"The code that powered one of the first major tracker/indexer sites on the\n"
+"The code that powered one of the first major tracker/indexer sites on the"
+"\n"
"Internet. Patched for I2P."
msgstr ""
@@ -4566,7 +5003,8 @@ msgstr ""
#: i2p2www/pages/site/docs/applications/supported.html:422
#, python-format
msgid ""
-"Port of the Phex Gnutella client. Website\n"
+"Port of the Phex Gnutella "
+"client. Website\n"
"for plugin version here."
msgstr ""
@@ -4589,13 +5027,14 @@ msgstr ""
#: i2p2www/pages/site/docs/applications/supported.html:461
msgid ""
-"Proxy providing simple, transparent SOCKS-ification of network applications."
+"Proxy providing simple, transparent SOCKS-ification of network "
+"applications."
msgstr ""
#: i2p2www/pages/site/docs/applications/supported.html:471
msgid ""
-"Most popular implementation of the Secure Shell (SSH) protocol and related "
-"tools."
+"Most popular implementation of the Secure Shell (SSH) protocol and "
+"related tools."
msgstr ""
#: i2p2www/pages/site/docs/applications/supported.html:477
@@ -4609,21 +5048,29 @@ msgstr ""
#: i2p2www/pages/site/docs/applications/supported.html:496
msgid ""
"Many IRC clients leak identifying information to servers or other\n"
-"clients, so I2P's IRC and SOCKS IRC client tunnels filter certain inbound\n"
-"and outbound messages to scrub data such as LAN IP addresses, external IP\n"
-"addresses, local hostnames, and the name and version of the IRC client. Two\n"
-"message types in particular, DCC and CTCP, can't be sufficiently anonymized\n"
-"without changes to the protocols or to IRC client/server code, so they are\n"
+"clients, so I2P's IRC and SOCKS IRC client tunnels filter certain inbound"
+"\n"
+"and outbound messages to scrub data such as LAN IP addresses, external IP"
+"\n"
+"addresses, local hostnames, and the name and version of the IRC client. "
+"Two\n"
+"message types in particular, DCC and CTCP, can't be sufficiently "
+"anonymized\n"
+"without changes to the protocols or to IRC client/server code, so they "
+"are\n"
"completely blocked, except for CTCP ACTION (the message emitted by the\n"
"/me
command) which isn't inherently dangerous."
msgstr ""
#: i2p2www/pages/site/docs/applications/supported.html:507
msgid ""
-"I2P's IRC filtering may not cover every possible leak — users should also\n"
-"check if their client is sending their real name or local username. Packet\n"
+"I2P's IRC filtering may not cover every possible leak — users should also"
+"\n"
+"check if their client is sending their real name or local username. "
+"Packet\n"
"sniffers such as Wireshark are\n"
-"useful here. Eliminating remaining leaks may be as simple as changing the\n"
+"useful here. Eliminating remaining leaks may be as simple as changing the"
+"\n"
"client's default configuration. If that doesn't help, inform the I2P\n"
"developers; they may be able to solve it via additional filtering."
msgstr ""
@@ -4657,8 +5104,8 @@ msgstr ""
#: i2p2www/pages/site/docs/applications/supported.html:568
msgid ""
-"Any website hosted anonymously on I2P, reachable through the I2P router's "
-"HTTP proxy."
+"Any website hosted anonymously on I2P, reachable through the I2P router's"
+" HTTP proxy."
msgstr ""
#: i2p2www/pages/site/docs/applications/supported.html:576
@@ -4718,7 +5165,8 @@ msgstr ""
#: i2p2www/pages/site/docs/applications/supported.html:671
msgid ""
-"Gateways allowing I2P users to access content hosted on the public Internet."
+"Gateways allowing I2P users to access content hosted on the public "
+"Internet."
msgstr ""
#: i2p2www/pages/site/docs/applications/supported.html:678
@@ -4728,9 +5176,12 @@ msgstr ""
#: i2p2www/pages/site/docs/applications/supported.html:688
msgid ""
"Lightweight web server and Java servlet container. I2P is tightly\n"
-"integrated with a bundled copy of Jetty which by default is configured to\n"
-"host the user's eepsite. The bundled\n"
-"Jetty also serves the I2P router console and web applications bundled with\n"
+"integrated with a bundled copy of Jetty which by default is configured to"
+"\n"
+"host the user's eepsite. The "
+"bundled\n"
+"Jetty also serves the I2P router console and web applications bundled "
+"with\n"
"I2P."
msgstr ""
@@ -4764,7 +5215,8 @@ msgstr ""
#: i2p2www/pages/site/docs/discussions/naming.html:4
#, python-format
msgid ""
-"NOTE: The following is a discussion of the reasons behind the I2P naming system,\n"
+"NOTE: The following is a discussion of the reasons behind the I2P naming "
+"system,\n"
"common arguments and possible alternatives.\n"
"See the naming page for current documentation."
msgstr ""
@@ -4775,49 +5227,72 @@ msgstr ""
#: i2p2www/pages/site/docs/discussions/naming.html:12
msgid ""
-"Naming within I2P has been an oft-debated topic since the very beginning with\n"
-"advocates across the spectrum of possibilities. However, given I2P's inherent\n"
-"demand for secure communication and decentralized operation, the traditional\n"
-"DNS-style naming system is clearly out, as are \"majority rules\" voting systems."
+"Naming within I2P has been an oft-debated topic since the very beginning "
+"with\n"
+"advocates across the spectrum of possibilities. However, given I2P's "
+"inherent\n"
+"demand for secure communication and decentralized operation, the "
+"traditional\n"
+"DNS-style naming system is clearly out, as are \"majority rules\" voting "
+"systems."
msgstr ""
#: i2p2www/pages/site/docs/discussions/naming.html:19
msgid ""
-"I2P does not promote the use of DNS-like services though, as the damage done\n"
-"by hijacking a site can be tremendous - and insecure destinations have no\n"
-"value. DNSsec itself still falls back on registrars and certificate authorities,\n"
-"while with I2P, requests sent to a destination cannot be intercepted or the reply\n"
-"spoofed, as they are encrypted to the destination's public keys, and a destination\n"
-"itself is just a pair of public keys and a certificate. DNS-style systems on the\n"
-"other hand allow any of the name servers on the lookup path to mount simple denial\n"
-"of service and spoofing attacks. Adding on a certificate authenticating the\n"
-"responses as signed by some centralized certificate authority would address many of\n"
-"the hostile nameserver issues but would leave open replay attacks as well as \n"
+"I2P does not promote the use of DNS-like services though, as the damage "
+"done\n"
+"by hijacking a site can be tremendous - and insecure destinations have no"
+"\n"
+"value. DNSsec itself still falls back on registrars and certificate "
+"authorities,\n"
+"while with I2P, requests sent to a destination cannot be intercepted or "
+"the reply\n"
+"spoofed, as they are encrypted to the destination's public keys, and a "
+"destination\n"
+"itself is just a pair of public keys and a certificate. DNS-style "
+"systems on the\n"
+"other hand allow any of the name servers on the lookup path to mount "
+"simple denial\n"
+"of service and spoofing attacks. Adding on a certificate authenticating "
+"the\n"
+"responses as signed by some centralized certificate authority would "
+"address many of\n"
+"the hostile nameserver issues but would leave open replay attacks as well"
+" as \n"
"hostile certificate authority attacks."
msgstr ""
#: i2p2www/pages/site/docs/discussions/naming.html:33
msgid ""
-"Voting style naming is dangerous as well, especially given the effectiveness of\n"
-"Sybil attacks in anonymous systems - the attacker can simply create an arbitrarily\n"
-"high number of peers and \"vote\" with each to take over a given name. Proof-of-work\n"
-"methods can be used to make identity non-free, but as the network grows the load\n"
-"required to contact everyone to conduct online voting is implausible, or if the\n"
+"Voting style naming is dangerous as well, especially given the "
+"effectiveness of\n"
+"Sybil attacks in anonymous systems - the attacker can simply create an "
+"arbitrarily\n"
+"high number of peers and \"vote\" with each to take over a given name. "
+"Proof-of-work\n"
+"methods can be used to make identity non-free, but as the network grows "
+"the load\n"
+"required to contact everyone to conduct online voting is implausible, or "
+"if the\n"
"full network is not queried, different sets of answers may be reachable."
msgstr ""
#: i2p2www/pages/site/docs/discussions/naming.html:42
msgid ""
-"As with the Internet however, I2P is keeping the design and operation of a \n"
-"naming system out of the (IP-like) communication layer. The bundled naming library\n"
-"includes a simple service provider interface which alternate naming systems can\n"
-"plug into, allowing end users to drive what sort of naming tradeoffs they prefer."
+"As with the Internet however, I2P is keeping the design and operation of "
+"a \n"
+"naming system out of the (IP-like) communication layer. The bundled "
+"naming library\n"
+"includes a simple service provider interface which alternate naming systems can\n"
+"plug into, allowing end users to drive what sort of naming tradeoffs they"
+" prefer."
msgstr ""
#: i2p2www/pages/site/docs/discussions/naming.html:50
msgid ""
-"See also Names: Decentralized, "
-"Secure, Human-Meaningful: Choose Two."
+"See also Names: "
+"Decentralized, Secure, Human-Meaningful: Choose Two."
msgstr ""
#: i2p2www/pages/site/docs/discussions/naming.html:55
@@ -4828,26 +5303,36 @@ msgstr ""
msgid ""
"Q:\n"
"What to do if some hosts \n"
-"do not agree on one address and if some addresses are working, others are not? \n"
+"do not agree on one address and if some addresses are working, others are"
+" not? \n"
"Who is the right source of a name?"
msgstr ""
#: i2p2www/pages/site/docs/discussions/naming.html:64
msgid ""
"A:\n"
-"You don't. This is actually a critical difference between names on I2P and how \n"
-"DNS works - names in I2P are human readable, secure, but not globally \n"
-"unique. This is by design, and an inherent part of our need for security."
+"You don't. This is actually a critical difference between names on I2P "
+"and how \n"
+"DNS works - names in I2P are human readable, secure, but not globally"
+" \n"
+"unique. This is by design, and an inherent part of our need for "
+"security."
msgstr ""
#: i2p2www/pages/site/docs/discussions/naming.html:70
msgid ""
-"If I could somehow convince you to change the destination associated with some \n"
-"name, I'd successfully \"take over\" the site, and under no circumstances is that \n"
-"acceptable. Instead, what we do is make names locally unique: they are \n"
-"what you use to call a site, just as how you can call things whatever \n"
-"you want when you add them to your browser's bookmarks, or your IM client's \n"
-"buddy list. Who you call \"Boss\" may be who someone else calls \"Sally\"."
+"If I could somehow convince you to change the destination associated with"
+" some \n"
+"name, I'd successfully \"take over\" the site, and under no circumstances"
+" is that \n"
+"acceptable. Instead, what we do is make names locally unique: "
+"they are \n"
+"what you use to call a site, just as how you can call things "
+"whatever \n"
+"you want when you add them to your browser's bookmarks, or your IM "
+"client's \n"
+"buddy list. Who you call \"Boss\" may be who someone else calls "
+"\"Sally\"."
msgstr ""
#: i2p2www/pages/site/docs/discussions/naming.html:78
@@ -4863,33 +5348,44 @@ msgstr ""
#: i2p2www/pages/site/docs/discussions/naming.html:89
msgid ""
"Inefficiency:\n"
-"The whole hosts.txt is downloaded (if it has changed, since eepget uses the etag and last-modified headers).\n"
+"The whole hosts.txt is downloaded (if it has changed, since eepget uses "
+"the etag and last-modified headers).\n"
"It's about 400K right now for almost 800 hosts."
msgstr ""
#: i2p2www/pages/site/docs/discussions/naming.html:94
msgid ""
-"True, but this isn't a lot of traffic in the context of i2p, which is itself wildly inefficient\n"
-"(floodfill databases, huge encryption overhead and padding, garlic routing, etc.).\n"
-"If you downloaded a hosts.txt file from someone every 12 hours it averages out to about 10 bytes/sec."
+"True, but this isn't a lot of traffic in the context of i2p, which is "
+"itself wildly inefficient\n"
+"(floodfill databases, huge encryption overhead and padding, garlic "
+"routing, etc.).\n"
+"If you downloaded a hosts.txt file from someone every 12 hours it "
+"averages out to about 10 bytes/sec."
msgstr ""
#: i2p2www/pages/site/docs/discussions/naming.html:99
msgid ""
-"As is usually the case in i2p, there is a fundamental tradeoff here between anonymity and efficiency.\n"
-"Some would say that using the etag and last-modified headers is hazardous because it exposes when you\n"
+"As is usually the case in i2p, there is a fundamental tradeoff here "
+"between anonymity and efficiency.\n"
+"Some would say that using the etag and last-modified headers is hazardous"
+" because it exposes when you\n"
"last requested the data.\n"
-"Others have suggested asking for specific keys only (similar to what jump services do, but\n"
+"Others have suggested asking for specific keys only (similar to what jump"
+" services do, but\n"
"in a more automated fashion), possibly at a further cost in anonymity."
msgstr ""
#: i2p2www/pages/site/docs/discussions/naming.html:106
#, python-format
msgid ""
-"Possible improvements would be a replacement or supplement to addressbook (see %(i2host)sp),\n"
-"or something simple like subscribing to http://example.i2p/cgi-bin/recenthosts.cgi rather than http://example.i2p/hosts.txt.\n"
-"If a hypothetical recenthosts.cgi distributed all hosts from the last 24 hours, for example,\n"
-"that could be both more efficient and more anonymous than the current hosts.txt with last-modified and etag."
+"Possible improvements would be a replacement or supplement to addressbook"
+" (see %(i2host)sp),\n"
+"or something simple like subscribing to http://example.i2p/cgi-"
+"bin/recenthosts.cgi rather than http://example.i2p/hosts.txt.\n"
+"If a hypothetical recenthosts.cgi distributed all hosts from the last 24 "
+"hours, for example,\n"
+"that could be both more efficient and more anonymous than the current "
+"hosts.txt with last-modified and etag."
msgstr ""
#: i2p2www/pages/site/docs/discussions/naming.html:112
@@ -4899,14 +5395,17 @@ msgid ""
"%(url)s.\n"
"This script returns an Etag with a timestamp.\n"
"When a request comes in with the If-None-Match etag,\n"
-"the script ONLY returns new hosts since that timestamp, or 304 Not Modified if there are none.\n"
-"In this way, the script efficiently returns only the hosts the subscriber\n"
+"the script ONLY returns new hosts since that timestamp, or 304 Not "
+"Modified if there are none.\n"
+"In this way, the script efficiently returns only the hosts the subscriber"
+"\n"
"does not know about, in an addressbook-compatible manner."
msgstr ""
#: i2p2www/pages/site/docs/discussions/naming.html:121
msgid ""
-"So the inefficiency is not a big issue and there are several ways to improve things without\n"
+"So the inefficiency is not a big issue and there are several ways to "
+"improve things without\n"
"radical change."
msgstr ""
@@ -4920,30 +5419,37 @@ msgstr ""
#: i2p2www/pages/site/docs/discussions/naming.html:132
msgid ""
"As far as network traffic see above.\n"
-"But unless you're going to do a slow real-time query over the network for\n"
-"a key, you need to have the whole set of keys stored locally, at a cost of about 500 bytes per key."
+"But unless you're going to do a slow real-time query over the network for"
+"\n"
+"a key, you need to have the whole set of keys stored locally, at a cost "
+"of about 500 bytes per key."
msgstr ""
#: i2p2www/pages/site/docs/discussions/naming.html:139
msgid ""
"Requires configuration and \"trust\":\n"
-"Out-of-the-box addressbook is only subscribed to http://www.i2p2.i2p/hosts.txt, which is rarely updated,\n"
+"Out-of-the-box addressbook is only subscribed to "
+"http://www.i2p2.i2p/hosts.txt, which is rarely updated,\n"
"leading to poor new-user experience."
msgstr ""
#: i2p2www/pages/site/docs/discussions/naming.html:144
msgid ""
-"This is very much intentional. jrandom wants a user to \"trust\" a hosts.txt\n"
+"This is very much intentional. jrandom wants a user to \"trust\" a "
+"hosts.txt\n"
"provider, and as he likes to say, \"trust is not a boolean\".\n"
-"The configuration step attempts to force users to think about issues of trust in an anonymous network."
+"The configuration step attempts to force users to think about issues of "
+"trust in an anonymous network."
msgstr ""
#: i2p2www/pages/site/docs/discussions/naming.html:149
msgid ""
"As another example, the \"Eepsite Unknown\" error page in the HTTP Proxy\n"
-"lists some jump services, but doesn't \"recommend\" any one in particular,\n"
+"lists some jump services, but doesn't \"recommend\" any one in "
+"particular,\n"
"and it's up to the user to pick one (or not).\n"
-"jrandom would say we trust the listed providers enough to list them but not enough to\n"
+"jrandom would say we trust the listed providers enough to list them but "
+"not enough to\n"
"automatically go fetch the key from them."
msgstr ""
@@ -4960,13 +5466,14 @@ msgstr ""
#: i2p2www/pages/site/docs/discussions/naming.html:166
msgid ""
-"Unfortunately real-time lookups over i2p would significantly slow down web "
-"browsing."
+"Unfortunately real-time lookups over i2p would significantly slow down "
+"web browsing."
msgstr ""
#: i2p2www/pages/site/docs/discussions/naming.html:169
msgid ""
-"Also, DNS is based on lookups with limited caching and time-to-live, while i2p\n"
+"Also, DNS is based on lookups with limited caching and time-to-live, "
+"while i2p\n"
"keys are permanent."
msgstr ""
@@ -4985,21 +5492,26 @@ msgid ""
"Yes it depends on a few servers that you have configured.\n"
"Within i2p, servers and services come and go.\n"
"Any other centralized system (for example DNS root servers) would\n"
-"have the same problem. A completely decentralized system (everybody is authoritative)\n"
-"is possible by implementing an \"everybody is a root DNS server\" solution, or by\n"
-"something even simpler, like a script that adds everybody in your hosts.txt to your addressbook."
+"have the same problem. A completely decentralized system (everybody is "
+"authoritative)\n"
+"is possible by implementing an \"everybody is a root DNS server\" "
+"solution, or by\n"
+"something even simpler, like a script that adds everybody in your "
+"hosts.txt to your addressbook."
msgstr ""
#: i2p2www/pages/site/docs/discussions/naming.html:190
msgid ""
-"People advocating all-authoritative solutions generally haven't thought through\n"
+"People advocating all-authoritative solutions generally haven't thought "
+"through\n"
"the issues of conflicts and hijacking, however."
msgstr ""
#: i2p2www/pages/site/docs/discussions/naming.html:196
msgid ""
"Awkward, not real-time:\n"
-"It's a patchwork of hosts.txt providers, key-add web form providers, jump service providers,\n"
+"It's a patchwork of hosts.txt providers, key-add web form providers, jump"
+" service providers,\n"
"eepsite status reporters.\n"
"Jump servers and subscriptions are a pain, it should just work like DNS."
msgstr ""
@@ -5010,7 +5522,8 @@ msgstr ""
#: i2p2www/pages/site/docs/discussions/naming.html:207
msgid ""
-"So, in summary, the current system is not horribly broken, inefficient, or un-scalable,\n"
+"So, in summary, the current system is not horribly broken, inefficient, "
+"or un-scalable,\n"
"and proposals to \"just use DNS\" aren't well thought-through."
msgstr ""
@@ -5020,7 +5533,8 @@ msgstr "Alternativen"
#: i2p2www/pages/site/docs/discussions/naming.html:213
msgid ""
-"The I2P source contains several pluggable naming systems and supports configuration options\n"
+"The I2P source contains several pluggable naming systems and supports "
+"configuration options\n"
"to enable experimentation with naming systems."
msgstr ""
@@ -5042,8 +5556,8 @@ msgstr ""
#: i2p2www/pages/site/docs/discussions/naming.html:234
msgid ""
-"AddressDB - Each host is listed in a separate file in a addressDb/ "
-"directory."
+"AddressDB - Each host is listed in a separate file in a addressDb/"
+" directory."
msgstr ""
#: i2p2www/pages/site/docs/discussions/naming.html:237
@@ -5068,7 +5582,8 @@ msgstr ""
#: i2p2www/pages/site/docs/discussions/naming.html:253
msgid ""
-"The current naming system can be changed with the advanced config option 'i2p.naming.impl'\n"
+"The current naming system can be changed with the advanced config option "
+"'i2p.naming.impl'\n"
"(restart required).\n"
"See core/java/src/net/i2p/client/naming for details."
msgstr ""
@@ -5076,7 +5591,8 @@ msgstr ""
#: i2p2www/pages/site/docs/discussions/naming.html:258
msgid ""
"Any new system should be stacked with HostsTxt, or should\n"
-"implement local storage and/or the addressbook subscription functions, since addressbook\n"
+"implement local storage and/or the addressbook subscription functions, "
+"since addressbook\n"
"only knows about the hosts.txt files and format."
msgstr ""
@@ -5086,40 +5602,50 @@ msgstr "Zertifikate"
#: i2p2www/pages/site/docs/discussions/naming.html:265
msgid ""
-"I2P destinations contain a certificate, however at the moment that certificate\n"
+"I2P destinations contain a certificate, however at the moment that "
+"certificate\n"
"is always null.\n"
-"With a null certificate, base64 destinations are always 516 bytes ending in \"AAAA\",\n"
-"and this is checked in the addressbook merge mechanism, and possibly other places.\n"
-"Also, there is no method available to generate a certificate or add it to a\n"
+"With a null certificate, base64 destinations are always 516 bytes ending "
+"in \"AAAA\",\n"
+"and this is checked in the addressbook merge mechanism, and possibly "
+"other places.\n"
+"Also, there is no method available to generate a certificate or add it to"
+" a\n"
"destination. So these will have to be updated to implement certificates."
msgstr ""
#: i2p2www/pages/site/docs/discussions/naming.html:273
#, python-format
msgid ""
-"One possible use of certificates is for proof "
-"of work."
+"One possible use of certificates is for proof of work."
msgstr ""
#: i2p2www/pages/site/docs/discussions/naming.html:276
msgid ""
-"Another is for \"subdomains\" (in quotes because there is really no such thing,\n"
-"i2p uses a flat naming system) to be signed by the 2nd level domain's keys."
+"Another is for \"subdomains\" (in quotes because there is really no such "
+"thing,\n"
+"i2p uses a flat naming system) to be signed by the 2nd level domain's "
+"keys."
msgstr ""
#: i2p2www/pages/site/docs/discussions/naming.html:280
msgid ""
-"With any certificate implementation must come the method for verifying the\n"
+"With any certificate implementation must come the method for verifying "
+"the\n"
"certificates.\n"
"Presumably this would happen in the addressbook merge code.\n"
-"Is there a method for multiple types of certificates, or multiple certificates?"
+"Is there a method for multiple types of certificates, or multiple "
+"certificates?"
msgstr ""
#: i2p2www/pages/site/docs/discussions/naming.html:286
msgid ""
"Adding on a certificate authenticating the\n"
-"responses as signed by some centralized certificate authority would address many of\n"
-"the hostile nameserver issues but would leave open replay attacks as well as \n"
+"responses as signed by some centralized certificate authority would "
+"address many of\n"
+"the hostile nameserver issues but would leave open replay attacks as well"
+" as \n"
"hostile certificate authority attacks."
msgstr ""
@@ -5134,13 +5660,20 @@ msgstr ""
#: i2p2www/pages/site/docs/how/cryptography.html:10
#, python-format
msgid ""
-"There are a handful of cryptographic algorithms in use within I2P, but we have\n"
-"reduced them to a bare minimum to deal with our needs - one symmetric algorithm\n"
-"one asymmetric algorithm, one signing algorithm, and one hashing algorithm. However, \n"
-"we do combine them in some particular ways to provide message integrity (rather than\n"
-"relying on a MAC). In addition, as much as we hate doing anything new in regards to \n"
-"cryptography, we can't seem to find a reference discussing (or even naming) the \n"
-"technique used in ElGamal/AES+SessionTag (but we're sure others have done it)."
+"There are a handful of cryptographic algorithms in use within I2P, but we"
+" have\n"
+"reduced them to a bare minimum to deal with our needs - one symmetric "
+"algorithm\n"
+"one asymmetric algorithm, one signing algorithm, and one hashing "
+"algorithm. However, \n"
+"we do combine them in some particular ways to provide message integrity "
+"(rather than\n"
+"relying on a MAC). In addition, as much as we hate doing anything new in"
+" regards to \n"
+"cryptography, we can't seem to find a reference discussing (or even "
+"naming) the \n"
+"technique used in ElGamal/AES+SessionTag "
+"(but we're sure others have done it)."
msgstr ""
#: i2p2www/pages/site/docs/how/cryptography.html:20
@@ -5164,23 +5697,28 @@ msgstr ""
#: i2p2www/pages/site/docs/how/cryptography.html:30
#, python-format
msgid ""
-"For end-to-end (destination-to-destination) encryption as a part of ElGamal/AES+SessionTag\n"
-"using the encryption key in the LeaseSet"
+"For end-to-end (destination-to-destination) encryption as a part of ElGamal/AES+SessionTag\n"
+"using the encryption key in the LeaseSet"
msgstr ""
#: i2p2www/pages/site/docs/how/cryptography.html:34
#: i2p2www/pages/site/docs/how/cryptography.html:198
#, python-format
msgid ""
-"For encryption of some netDb stores and queries sent to floodfill routers\n"
+"For encryption of some netDb stores and "
+"queries sent to floodfill routers\n"
"as a part of ElGamal/AES+SessionTag\n"
"(destination-to-router or router-to-router)."
msgstr ""
#: i2p2www/pages/site/docs/how/cryptography.html:41
msgid ""
-"We use common primes for 2048 ElGamal encryption and decryption, as given by IETF RFC-3526.\n"
-"We currently only use ElGamal to encrypt the IV and session key in a single block, followed by the \n"
+"We use common primes for 2048 ElGamal encryption and decryption, as given"
+" by IETF RFC-3526.\n"
+"We currently only use ElGamal to encrypt the IV and session key in a "
+"single block, followed by the \n"
"AES encrypted payload using that key and IV."
msgstr ""
@@ -5190,13 +5728,15 @@ msgstr ""
#: i2p2www/pages/site/docs/how/cryptography.html:64
msgid ""
-"The H(data) is the SHA256 of the data that is encrypted in the ElGamal block,\n"
+"The H(data) is the SHA256 of the data that is encrypted in the ElGamal "
+"block,\n"
"and is preceded by a nonzero byte. \n"
"This byte could be random, but as implemented it is always 0xFF.\n"
"It could possibly be used for flags in the future.\n"
"The data encrypted in the block may be up to 222 bytes long.\n"
"As the encrypted data may contain a substantial number of zeros if the\n"
-"cleartext is smaller than 222 bytes, it is recommended that higher layers pad\n"
+"cleartext is smaller than 222 bytes, it is recommended that higher layers"
+" pad\n"
"the cleartext to 222 bytes with random data.\n"
"Total length: typically 255 bytes."
msgstr ""
@@ -5207,7 +5747,8 @@ msgstr ""
#: i2p2www/pages/site/docs/how/cryptography.html:102
msgid ""
-"Each encrypted part is prepended with zeros to a size of exactly 257 bytes.\n"
+"Each encrypted part is prepended with zeros to a size of exactly 257 "
+"bytes.\n"
"Total length: 514 bytes.\n"
"In typical usage, higher layers pad the cleartext data to 222 bytes,\n"
"resulting in an unencrypted block of 255 bytes.\n"
@@ -5223,7 +5764,8 @@ msgstr ""
#: i2p2www/pages/site/docs/how/cryptography.html:115
msgid ""
"The shared prime is the \n"
-"[Oakley prime for 2048 bit keys]"
+"[Oakley prime "
+"for 2048 bit keys]"
msgstr ""
#: i2p2www/pages/site/docs/how/cryptography.html:122
@@ -5251,17 +5793,23 @@ msgstr ""
#, python-format
msgid ""
"This should be safe for use with the Oakley primes, per\n"
-"On Diffie-Hellman Key Agreement with Short Exponents - van Oorschot, Weiner\n"
-"at EuroCrypt 96, and crypto++'s benchmarks.\n"
-"Benchmarks originally at this link, now dead,\n"
-"rescued from the wayback machine, dated Apr 23, 2008."
+"On Diffie-Hellman Key Agreement with Short Exponents "
+"- van Oorschot, Weiner\n"
+"at EuroCrypt 96, and crypto++'s "
+"benchmarks.\n"
+"Benchmarks originally at this link, now dead,\n"
+"rescued from the wayback machine,"
+" dated Apr 23, 2008."
msgstr ""
#: i2p2www/pages/site/docs/how/cryptography.html:160
#, python-format
msgid ""
-"Also, Koshiba & Kurosawa: Short Exponent Diffie-Hellman Problems (PKC 2004, LNCS 2947, pp. 173-186)\n"
-"(full text on Google Books) apparently supports this, according to\n"
+"Also, Koshiba & Kurosawa: Short Exponent Diffie-"
+"Hellman Problems (PKC 2004, LNCS 2947, pp. 173-186)\n"
+"(full text on Google Books) apparently "
+"supports this, according to\n"
"this sci.crypt thread.\n"
"The remainder of the PrivateKey is padded with zeroes."
msgstr ""
@@ -5270,8 +5818,10 @@ msgstr ""
msgid ""
"Prior to release 0.9.8, all routers used the short exponent.\n"
"As of release 0.9.8, 64-bit x86 routers use a full 2048-bit exponent.\n"
-"Other routers continue to use the short exponent due to concerns about processor load.\n"
-"The transition to a longer exponent for these platforms is a topic for further study."
+"Other routers continue to use the short exponent due to concerns about "
+"processor load.\n"
+"The transition to a longer exponent for these platforms is a topic for "
+"further study."
msgstr ""
#: i2p2www/pages/site/docs/how/cryptography.html:176
@@ -5283,7 +5833,8 @@ msgstr ""
#: i2p2www/pages/site/docs/how/cryptography.html:177
msgid ""
-"The vulnerability of the network to an ElGamal attack and the impact of transitioning to a longer bit length is to be studied.\n"
+"The vulnerability of the network to an ElGamal attack and the impact of "
+"transitioning to a longer bit length is to be studied.\n"
"It may be quite difficult to make any change backward-compatible."
msgstr ""
@@ -5305,24 +5856,30 @@ msgstr ""
#: i2p2www/pages/site/docs/how/cryptography.html:204
#, python-format
msgid ""
-"For encryption of periodic tunnel test"
-" messages sent from the router to itself, through its own tunnels."
+"For encryption of periodic tunnel "
+"test messages sent from the router to itself, through its own "
+"tunnels."
msgstr ""
#: i2p2www/pages/site/docs/how/cryptography.html:209
#, python-format
msgid ""
"We use AES with 256 bit keys and 128 bit blocks in CBC mode.\n"
-"The padding used is specified in IETF RFC-2313 (PKCS#5 1.5, section 8.1 (for block type 02)).\n"
-"In this case, padding exists of pseudorandomly generated octets to match 16 byte blocks.\n"
-"Specifically, see [the CBC code] and the Cryptix AES\n"
-"[implementation], as well as the padding, found in the\n"
+"The padding used is specified in IETF RFC-2313 "
+"(PKCS#5 1.5, section 8.1 (for block type 02)).\n"
+"In this case, padding exists of pseudorandomly generated octets to match "
+"16 byte blocks.\n"
+"Specifically, see [the CBC code] and the "
+"Cryptix AES\n"
+"[implementation], as well as the padding, found"
+" in the\n"
"ElGamalAESEngine.getPadding function."
msgstr ""
#: i2p2www/pages/site/docs/how/cryptography.html:274
msgid ""
-"The vulnerability of the network to an AES attack and the impact of transitioning to a longer bit length is to be studied.\n"
+"The vulnerability of the network to an AES attack and the impact of "
+"transitioning to a longer bit length is to be studied.\n"
"It may be quite difficult to make any change backward-compatible."
msgstr ""
@@ -5352,7 +5909,8 @@ msgstr ""
#: i2p2www/pages/site/docs/how/cryptography.html:295
#, python-format
msgid ""
-"Signatures are generated and verified with 1024 bit DSA (L=1024, N=160), as implemented in\n"
+"Signatures are generated and verified with 1024 bit DSA (L=1024, N=160), "
+"as implemented in\n"
"[DSAEngine].\n"
"DSA was chosen because it is much faster for signatures than ElGamal."
msgstr ""
@@ -5360,8 +5918,10 @@ msgstr ""
#: i2p2www/pages/site/docs/how/cryptography.html:350
#, python-format
msgid ""
-"The Signing Public Key is 1024 bits.\n"
-"The Signing Private Key is 160 bits."
+"The Signing Public"
+" Key is 1024 bits.\n"
+"The Signing "
+"Private Key is 160 bits."
msgstr ""
#: i2p2www/pages/site/docs/how/cryptography.html:357
@@ -5369,15 +5929,18 @@ msgstr ""
msgid ""
"NIST 800-57\n"
"recommends a minimum of (L=2048, N=224) for usage beyond 2010.\n"
-"This may be mitigated somewhat by the \"cryptoperiod\", or lifespan of a given key."
+"This may be mitigated somewhat by the \"cryptoperiod\", or lifespan of a "
+"given key."
msgstr ""
#: i2p2www/pages/site/docs/how/cryptography.html:363
msgid ""
"The prime number was chosen in 2003,\n"
-"and the person that chose the number (TheCrypto) is currently no longer an I2P developer.\n"
+"and the person that chose the number (TheCrypto) is currently no longer "
+"an I2P developer.\n"
"As such, we do not know if the prime chosen is a 'strong prime'.\n"
-"If a larger prime is chosen for future purposes, this should be a strong prime, and we will document the construction process."
+"If a larger prime is chosen for future purposes, this should be a strong "
+"prime, and we will document the construction process."
msgstr ""
#: i2p2www/pages/site/docs/how/cryptography.html:374
@@ -5396,10 +5959,14 @@ msgstr "Neue Signaturalgorithmen"
#: i2p2www/pages/site/docs/how/cryptography.html:386
msgid ""
-"As of release 0.9.12, the router supports additional signature algorithms that are more secure than 1024-bit DSA.\n"
-"The first usage is for Destinations; support for Router Identities was added in release 0.9.16.\n"
-"Support for migrating existing Destinations from old to new signatures will be added in a future release.\n"
-"Signature type is encoded in the Destination and Router Identity, so that new signature algorithms\n"
+"As of release 0.9.12, the router supports additional signature algorithms"
+" that are more secure than 1024-bit DSA.\n"
+"The first usage is for Destinations; support for Router Identities was "
+"added in release 0.9.16.\n"
+"Support for migrating existing Destinations from old to new signatures "
+"will be added in a future release.\n"
+"Signature type is encoded in the Destination and Router Identity, so that"
+" new signature algorithms\n"
"or curves may be added at any time.\n"
"The current supported signature types are as follows:"
msgstr ""
@@ -5407,24 +5974,30 @@ msgstr ""
#: i2p2www/pages/site/docs/how/cryptography.html:407
msgid ""
"ECDSA uses the standard NIST curves and standard SHA-2 hashes.\n"
-"We will migrate new destinations to ECDSA-SHA256-P256 in the 0.9.16 - 0.9.19 release time frame.\n"
-"Usage for Router Identities is supported as of release 0.9.16 and migration may occur in early 2015."
+"We will migrate new destinations to ECDSA-SHA256-P256 in the 0.9.16 - "
+"0.9.19 release time frame.\n"
+"Usage for Router Identities is supported as of release 0.9.16 and "
+"migration may occur in early 2015."
msgstr ""
#: i2p2www/pages/site/docs/how/cryptography.html:416
msgid ""
"Standard RSA with the public exponent F4 = 65537.\n"
-"RSA is now used for signing all out-of-band trusted content, including router updates, reseeding, plugins, and news.\n"
-"The signatures are embedded in the \"su3\" format documented on the router updates page.\n"
+"RSA is now used for signing all out-of-band trusted content, including "
+"router updates, reseeding, plugins, and news.\n"
+"The signatures are embedded in the \"su3\" format documented on the "
+"router updates page.\n"
"4096-bit keys are recommended and used by all known signers.\n"
-"RSA is not used, or planned for use, in any in-network Destinations or Router Identities."
+"RSA is not used, or planned for use, in any in-network Destinations or "
+"Router Identities."
msgstr ""
#: i2p2www/pages/site/docs/how/cryptography.html:427
msgid ""
"Standard EdDSA using curve 25519 and standard 512-bit SHA-2 hashes.\n"
"Supported as of release 0.9.15.\n"
-"Migration for Destinations and Router Identities is scheduled for mid-2015."
+"Migration for Destinations and Router Identities is scheduled for "
+"mid-2015."
msgstr ""
#: i2p2www/pages/site/docs/how/cryptography.html:437
@@ -5436,7 +6009,8 @@ msgstr ""
#: i2p2www/pages/site/docs/how/cryptography.html:443
msgid ""
-"The vulnerability of the network to a SHA-256 attack and the impact of transitioning to a longer hash is to be studied.\n"
+"The vulnerability of the network to a SHA-256 attack and the impact of "
+"transitioning to a longer hash is to be studied.\n"
"It may be quite difficult to make any change backward-compatible."
msgstr ""
@@ -5447,13 +6021,16 @@ msgstr "Transports"
#: i2p2www/pages/site/docs/how/cryptography.html:455
msgid ""
"At the lowest protocol layer,\n"
-"point-to-point inter-router communication is protected by the transport layer security.\n"
+"point-to-point inter-router communication is protected by the transport "
+"layer security.\n"
"Both transports use 256 byte (2048 bit) Diffie-Hellman key exchange\n"
"using\n"
-"the same shared prime and generator as specified above for ElGamal,\n"
+"the same shared prime and generator as specified "
+"above for ElGamal,\n"
"followed by symmetric AES encryption as described above.\n"
"This provides\n"
-"perfect forward secrecy\n"
+"perfect "
+"forward secrecy\n"
"on the transport links."
msgstr ""
@@ -5464,17 +6041,24 @@ msgstr "NTCP-Verbindungen"
#: i2p2www/pages/site/docs/how/cryptography.html:469
#, python-format
msgid ""
-"NTCP connections are negotiated with a 2048 Diffie-Hellman implementation,\n"
-"using the router's identity to proceed with a station to station agreement, followed by\n"
-"some encrypted protocol specific fields, with all subsequent data encrypted with AES\n"
+"NTCP connections are negotiated with a 2048 Diffie-Hellman "
+"implementation,\n"
+"using the router's identity to proceed with a station to station "
+"agreement, followed by\n"
+"some encrypted protocol specific fields, with all subsequent data "
+"encrypted with AES\n"
"(as above).\n"
-"The primary reason to do the DH negotiation instead of using ElGamalAES+SessionTag is that it provides '(perfect) forward secrecy', while ElGamalAES+SessionTag does not."
+"The primary reason to do the DH negotiation instead of using ElGamalAES+SessionTag is that it provides '(perfect) "
+"forward secrecy', while ElGamalAES+SessionTag does not."
msgstr ""
#: i2p2www/pages/site/docs/how/cryptography.html:477
msgid ""
-"In order to migrate to a more standardized implementation (TLS/SSL or even "
-"SSH), the following issues must be addressed:"
+"In order to migrate to a more standardized implementation (TLS/SSL or "
+"even SSH), the following issues must be addressed:"
msgstr ""
#: i2p2www/pages/site/docs/how/cryptography.html:481
@@ -5485,7 +6069,8 @@ msgstr ""
#: i2p2www/pages/site/docs/how/cryptography.html:484
msgid ""
-"Can we simplify/avoid the x509 or other certificate formats and use our own RouterInfo structure (which \n"
+"Can we simplify/avoid the x509 or other certificate formats and use our "
+"own RouterInfo structure (which \n"
"contains the ElGamal and DSA keys)?"
msgstr ""
@@ -5500,10 +6085,14 @@ msgstr "UDP-Verbindungen"
#: i2p2www/pages/site/docs/how/cryptography.html:494
msgid ""
-"SSU (the UDP transport) encrypts each packet with AES256/CBC with both an explicit IV and MAC \n"
-"(HMAC-MD5-128) after agreeing upon an ephemeral session key through a 2048 bit \n"
-"Diffie-Hellman exchange, station-to-station authentication with the other \n"
-"router's DSA key, plus each network message has their own hash for local integrity \n"
+"SSU (the UDP transport) encrypts each packet with AES256/CBC with both an"
+" explicit IV and MAC \n"
+"(HMAC-MD5-128) after agreeing upon an ephemeral session key through a "
+"2048 bit \n"
+"Diffie-Hellman exchange, station-to-station authentication with the other"
+" \n"
+"router's DSA key, plus each network message has their own hash for local "
+"integrity \n"
"checking."
msgstr ""
@@ -5516,8 +6105,10 @@ msgstr ""
#, python-format
msgid ""
"WARNING - I2P's HMAC-MD5-128 used in SSU is apparently non-standard.\n"
-"Apparently, an early version of SSU used HMAC-SHA256, and then it was switched\n"
-"to MD5-128 for performance reasons, but left the 32-byte buffer size intact.\n"
+"Apparently, an early version of SSU used HMAC-SHA256, and then it was "
+"switched\n"
+"to MD5-128 for performance reasons, but left the 32-byte buffer size "
+"intact.\n"
"See HMACGenerator.java and\n"
"the 2005-07-05 status notes\n"
"for details."
@@ -5538,58 +6129,91 @@ msgstr ""
#: i2p2www/pages/site/docs/how/elgamal-aes.html:11
msgid ""
-"As an unreliable, unordered, message based system, I2P uses a simple combination \n"
-"of asymmetric and symmetric encryption algorithms to provide data confidentiality \n"
-"and integrity to garlic messages. As a whole, the combination is referred \n"
-"to as ElGamal/AES+SessionTags, but that is an excessively verbose way to describe \n"
+"As an unreliable, unordered, message based system, I2P uses a simple "
+"combination \n"
+"of asymmetric and symmetric encryption algorithms to provide data "
+"confidentiality \n"
+"and integrity to garlic messages. As a whole, the combination is referred"
+" \n"
+"to as ElGamal/AES+SessionTags, but that is an excessively verbose way to "
+"describe \n"
"the use of 2048bit ElGamal, AES256, SHA256, and 32 byte nonces."
msgstr ""
#: i2p2www/pages/site/docs/how/elgamal-aes.html:19
#: i2p2www/pages/site/docs/how/tech-intro.html:512
msgid ""
-"The first time a router wants to encrypt a garlic message to another router, \n"
-"they encrypt the keying material for an AES256 session key with ElGamal and \n"
-"append the AES256/CBC encrypted payload after that encrypted ElGamal block. \n"
-"In addition to the encrypted payload, the AES encrypted section contains the \n"
-"payload length, the SHA256 hash of the unencrypted payload, as well as a number \n"
-"of \"session tags\" - random 32 byte nonces. The next time the sender wants \n"
-"to encrypt a garlic message to another router, rather than ElGamal encrypt \n"
-"a new session key they simply pick one of the previously delivered session \n"
-"tags and AES encrypt the payload like before, using the session key used with \n"
-"that session tag, prepended with the session tag itself. When a router receives \n"
-"a garlic encrypted message, they check the first 32 bytes to see if it matches \n"
-"an available session tag - if it does, they simply AES decrypt the message, \n"
+"The first time a router wants to encrypt a garlic message to another "
+"router, \n"
+"they encrypt the keying material for an AES256 session key with ElGamal "
+"and \n"
+"append the AES256/CBC encrypted payload after that encrypted ElGamal "
+"block. \n"
+"In addition to the encrypted payload, the AES encrypted section contains "
+"the \n"
+"payload length, the SHA256 hash of the unencrypted payload, as well as a "
+"number \n"
+"of \"session tags\" - random 32 byte nonces. The next time the sender "
+"wants \n"
+"to encrypt a garlic message to another router, rather than ElGamal "
+"encrypt \n"
+"a new session key they simply pick one of the previously delivered "
+"session \n"
+"tags and AES encrypt the payload like before, using the session key used "
+"with \n"
+"that session tag, prepended with the session tag itself. When a router "
+"receives \n"
+"a garlic encrypted message, they check the first 32 bytes to see if it "
+"matches \n"
+"an available session tag - if it does, they simply AES decrypt the "
+"message, \n"
"but if it does not, they ElGamal decrypt the first block."
msgstr ""
#: i2p2www/pages/site/docs/how/elgamal-aes.html:35
#: i2p2www/pages/site/docs/how/tech-intro.html:528
msgid ""
-"Each session tag can be used only once so as to prevent internal adversaries \n"
-"from unnecessarily correlating different messages as being between the same \n"
-"routers. The sender of an ElGamal/AES+SessionTag encrypted message chooses \n"
-"when and how many tags to deliver, prestocking the recipient with enough tags \n"
-"to cover a volley of messages. Garlic messages may detect the successful tag \n"
-"delivery by bundling a small additional message as a clove (a \"delivery status \n"
-"message\") - when the garlic message arrives at the intended recipient and \n"
-"is decrypted successfully, this small delivery status message is one of the \n"
-"cloves exposed and has instructions for the recipient to send the clove back \n"
-"to the original sender (through an inbound tunnel, of course). When the original \n"
-"sender receives this delivery status message, they know that the session tags \n"
+"Each session tag can be used only once so as to prevent internal "
+"adversaries \n"
+"from unnecessarily correlating different messages as being between the "
+"same \n"
+"routers. The sender of an ElGamal/AES+SessionTag encrypted message "
+"chooses \n"
+"when and how many tags to deliver, prestocking the recipient with enough "
+"tags \n"
+"to cover a volley of messages. Garlic messages may detect the successful "
+"tag \n"
+"delivery by bundling a small additional message as a clove (a \"delivery "
+"status \n"
+"message\") - when the garlic message arrives at the intended recipient "
+"and \n"
+"is decrypted successfully, this small delivery status message is one of "
+"the \n"
+"cloves exposed and has instructions for the recipient to send the clove "
+"back \n"
+"to the original sender (through an inbound tunnel, of course). When the "
+"original \n"
+"sender receives this delivery status message, they know that the session "
+"tags \n"
"bundled in the garlic message were successfully delivered."
msgstr ""
#: i2p2www/pages/site/docs/how/elgamal-aes.html:50
msgid ""
"Session tags themselves have a short lifetime, after which they are \n"
-"discarded if not used. In addition, the quantity stored for each key is limited, \n"
-"as are the number of keys themselves - if too many arrive, either new or old \n"
-"messages may be dropped. The sender keeps track whether messages using session \n"
-"tags are getting through, and if there isn't sufficient communication it may \n"
-"drop the ones previously assumed to be properly delivered, reverting back \n"
+"discarded if not used. In addition, the quantity stored for each key is "
+"limited, \n"
+"as are the number of keys themselves - if too many arrive, either new or "
+"old \n"
+"messages may be dropped. The sender keeps track whether messages using "
+"session \n"
+"tags are getting through, and if there isn't sufficient communication it "
+"may \n"
+"drop the ones previously assumed to be properly delivered, reverting back"
+" \n"
"to the full expensive ElGamal encryption.\n"
-"A session will continue to exist until all its tags are exhausted or expire."
+"A session will continue to exist until all its tags are exhausted or "
+"expire."
msgstr ""
#: i2p2www/pages/site/docs/how/elgamal-aes.html:61
@@ -5604,7 +6228,8 @@ msgid ""
"between a Router and a Destination.\n"
"Each Router and Destination maintains its own Session Key Manager to\n"
"keep track of Session Keys and Session Tags.\n"
-"Separate Session Key Managers prevents correlation of multiple Destinations\n"
+"Separate Session Key Managers prevents correlation of multiple "
+"Destinations\n"
"to each other or a Router by adversaries."
msgstr ""
@@ -5625,14 +6250,14 @@ msgid ""
msgstr ""
#: i2p2www/pages/site/docs/how/elgamal-aes.html:85
-msgid ""
-"It is for a new session and contains both ElGamal and AES encrypted blocks"
+msgid "It is for a new session and contains both ElGamal and AES encrypted blocks"
msgstr ""
#: i2p2www/pages/site/docs/how/elgamal-aes.html:88
msgid ""
"When a router receives a message, it will first assume it is from\n"
-"an existing session and attempt to look up the Session Tag and decrypt the following data using AES.\n"
+"an existing session and attempt to look up the Session Tag and decrypt "
+"the following data using AES.\n"
"If that fails, it will assume it is for a new session and attempt to\n"
"decrypt it using ElGamal."
msgstr ""
@@ -5643,7 +6268,8 @@ msgstr ""
#: i2p2www/pages/site/docs/how/elgamal-aes.html:98
msgid ""
-"A New Session ElGamal Message contains two parts, an encrypted ElGamal block\n"
+"A New Session ElGamal Message contains two parts, an encrypted ElGamal "
+"block\n"
"and an encrypted AES block."
msgstr ""
@@ -5669,7 +6295,8 @@ msgid ""
"The 32-byte\n"
"Session Key\n"
"is the identifier for the session.\n"
-"The 32-byte Pre-IV will be used to generate the IV for the AES block that follows;\n"
+"The 32-byte Pre-IV will be used to generate the IV for the AES block that"
+" follows;\n"
"the IV is the first 16 bytes of the SHA-256 Hash of the Pre-IV."
msgstr ""
@@ -5698,8 +6325,8 @@ msgstr ""
#: i2p2www/pages/site/docs/how/elgamal-aes.html:228
#, python-format
msgid ""
-"That many 32-byte Session "
-"Tags"
+"That many 32-byte Session Tags"
msgstr ""
#: i2p2www/pages/site/docs/how/elgamal-aes.html:232
@@ -5710,8 +6337,8 @@ msgstr "4-Byte Ganzzahl"
#: i2p2www/pages/site/docs/how/elgamal-aes.html:236
#, python-format
msgid ""
-"The 32-byte SHA256 Hash of "
-"the payload"
+"The 32-byte SHA256 Hash of"
+" the payload"
msgstr ""
#: i2p2www/pages/site/docs/how/elgamal-aes.html:240
@@ -5721,8 +6348,10 @@ msgstr ""
#: i2p2www/pages/site/docs/how/elgamal-aes.html:244
#, python-format
msgid ""
-"A 32-byte Session Key,\n"
-" to replace the old key, and is only present if preceding flag is 0x01"
+"A 32-byte Session "
+"Key,\n"
+" to replace the old key, and is only present if preceding"
+" flag is 0x01"
msgstr ""
#: i2p2www/pages/site/docs/how/elgamal-aes.html:249
@@ -5743,16 +6372,18 @@ msgstr "Mindestlänge: 48 Byte"
#, python-format
msgid ""
"The data is then AES Encrypted,\n"
-"using the session key and IV (calculated from the pre-IV) from the ElGamal section.\n"
-"The encrypted AES Block length is variable but is always a multiple of 16 bytes.\n"
+"using the session key and IV (calculated from the pre-IV) from the "
+"ElGamal section.\n"
+"The encrypted AES Block length is variable but is always a multiple of 16"
+" bytes.\n"
"
O(log(N))
due to the network database's algorithm, while end\n"
-"to end messages should be O(1)
(scale free), since messages go out K hops through the\n"
-"outbound tunnel and another K hops through the inbound tunnel, with K no longer than 3. The size of\n"
+"Some questions have been raised with regards to the scalability of I2P, "
+"and reasonably so. There\n"
+"will certainly be more analysis over time, but peer lookup and "
+"integration should be bounded by\n"
+"O(log(N))
due to the network "
+"database's algorithm, while end\n"
+"to end messages should be O(1)
(scale free), since messages "
+"go out K hops through the\n"
+"outbound tunnel and another K hops through the inbound tunnel, with K no "
+"longer than 3. The size of\n"
"the network (N) bears no impact."
msgstr ""
@@ -6457,10 +7426,13 @@ msgstr "Wann?"
#, python-format
msgid ""
"I2P initially began in Feb 2003 as a proposed modification to Freenet to allow it to use alternate transports, such as Freenet to allow it to use "
+"alternate transports, such as JMS, then grew into its own as an\n"
-"'anonCommFramework' in April 2003, turning into I2P in July, with code being written in earnest\n"
-"starting in August '03. I2P is currently under development, following the roadmap."
+"'anonCommFramework' in April 2003, turning into I2P in July, with code "
+"being written in earnest\n"
+"starting in August '03. I2P is currently under development, following the"
+" roadmap."
msgstr ""
#: i2p2www/pages/site/docs/how/intro.html:161
@@ -6470,14 +7442,22 @@ msgstr "Wer?"
#: i2p2www/pages/site/docs/how/intro.html:162
#, python-format
msgid ""
-"We have a small team spread around several continents, working to advance\n"
-"different aspects of the project. We are very open to other developers who want to get involved and\n"
-"anyone else who would like to contribute in other ways, such as critiques, peer review, testing,\n"
-"writing I2P enabled applications, or documentation. The entire system is open source - the router\n"
-"and most of the SDK are outright public domain with some BSD and Cryptix licensed code, while some\n"
-"applications like I2PTunnel and I2PSnark are GPL. Almost everything is written in Java (1.5+),\n"
-"though some third party applications are being written in Python and other languages. The code works\n"
-"on Sun Java SE and other Java Virtual Machines."
+"We have a small team spread around several "
+"continents, working to advance\n"
+"different aspects of the project. We are very open to other developers "
+"who want to get involved and\n"
+"anyone else who would like to contribute in other ways, such as "
+"critiques, peer review, testing,\n"
+"writing I2P enabled applications, or documentation. The entire system is "
+"open source - the router\n"
+"and most of the SDK are outright public domain with some BSD and Cryptix "
+"licensed code, while some\n"
+"applications like I2PTunnel and I2PSnark are GPL. Almost everything is "
+"written in Java (1.5+),\n"
+"though some third party applications are being written in Python and "
+"other languages. The code works\n"
+"on Sun Java SE and other Java Virtual"
+" Machines."
msgstr ""
#: i2p2www/pages/site/docs/how/intro.html:173
@@ -6487,15 +7467,20 @@ msgstr "Wo?"
#: i2p2www/pages/site/docs/how/intro.html:174
#, python-format
msgid ""
-"Anyone interested should join us on the IRC channel #i2p-dev (hosted concurrently on irc.freenode.net,\n"
-"irc.postman.i2p, irc.echelon.i2p, irc.dg.i2p and irc.oftc.net). There are currently no\n"
-"scheduled development meetings, however archives are available."
+"Anyone interested should join us on the IRC channel #i2p-dev (hosted "
+"concurrently on irc.freenode.net,\n"
+"irc.postman.i2p, irc.echelon.i2p, irc.dg.i2p and irc.oftc.net). There are"
+" currently no\n"
+"scheduled development meetings, however archives"
+" are available."
msgstr ""
#: i2p2www/pages/site/docs/how/intro.html:180
#, python-format
msgid "The current source is available in monotone."
-msgstr "Der aktuelle Quelltext ist in Monotone verfügbar."
+msgstr ""
+"Der aktuelle Quelltext ist in Monotone "
+"verfügbar."
#: i2p2www/pages/site/docs/how/intro.html:185
#, python-format
@@ -6513,24 +7498,32 @@ msgstr ""
#: i2p2www/pages/site/docs/how/network-database.html:8
msgid ""
"I2P's netDb is a specialized distributed database, containing \n"
-"just two types of data - router contact information (RouterInfos) and destination contact\n"
-"information (LeaseSets). Each piece of data is signed by the appropriate party and verified\n"
-"by anyone who uses or stores it. In addition, the data has liveliness information\n"
-"within it, allowing irrelevant entries to be dropped, newer entries to replace\n"
+"just two types of data - router contact information (RouterInfos) "
+"and destination contact\n"
+"information (LeaseSets). Each piece of data is signed by the "
+"appropriate party and verified\n"
+"by anyone who uses or stores it. In addition, the data has liveliness "
+"information\n"
+"within it, allowing irrelevant entries to be dropped, newer entries to "
+"replace\n"
"older ones, and protection against certain classes of attack."
msgstr ""
#: i2p2www/pages/site/docs/how/network-database.html:17
msgid ""
"The netDb is distributed with a simple technique called \"floodfill\",\n"
-"where a subset of all routers, called \"floodfill routers\", maintains the distributed database."
+"where a subset of all routers, called \"floodfill routers\", maintains "
+"the distributed database."
msgstr ""
#: i2p2www/pages/site/docs/how/network-database.html:25
msgid ""
-"When an I2P router wants to contact another router, they need to know some \n"
-"key pieces of data - all of which are bundled up and signed by the router into\n"
-"a structure called the \"RouterInfo\", which is distributed with the SHA256 of the router's identity\n"
+"When an I2P router wants to contact another router, they need to know "
+"some \n"
+"key pieces of data - all of which are bundled up and signed by the router"
+" into\n"
+"a structure called the \"RouterInfo\", which is distributed with the "
+"SHA256 of the router's identity\n"
"as the key. The structure itself contains:"
msgstr ""
@@ -6542,8 +7535,8 @@ msgstr ""
#: i2p2www/pages/site/docs/how/network-database.html:33
msgid ""
-"The contact addresses at which it can be reached (e.g. TCP: example.org port"
-" 4108)"
+"The contact addresses at which it can be reached (e.g. TCP: example.org "
+"port 4108)"
msgstr ""
#: i2p2www/pages/site/docs/how/network-database.html:34
@@ -6555,8 +7548,7 @@ msgid "A set of arbitrary text options"
msgstr ""
#: i2p2www/pages/site/docs/how/network-database.html:36
-msgid ""
-"The signature of the above, generated by the identity's DSA signing key"
+msgid "The signature of the above, generated by the identity's DSA signing key"
msgstr ""
#: i2p2www/pages/site/docs/how/network-database.html:39
@@ -6567,8 +7559,8 @@ msgstr ""
#: i2p2www/pages/site/docs/how/network-database.html:45
msgid ""
-"Capabilities flags - used to indicate floodfill participation, approximate "
-"bandwidth, and perceived reachability"
+"Capabilities flags - used to indicate floodfill participation, "
+"approximate bandwidth, and perceived reachability"
msgstr ""
#: i2p2www/pages/site/docs/how/network-database.html:47
@@ -6625,29 +7617,36 @@ msgstr ""
#: i2p2www/pages/site/docs/how/network-database.html:70
msgid ""
-"Always sent as 90m, for compatibility with an older scheme where routers published their actual uptime,\n"
+"Always sent as 90m, for compatibility with an older scheme where routers "
+"published their actual uptime,\n"
"and only sent tunnel requests to peers whose was more than 60m"
msgstr ""
#: i2p2www/pages/site/docs/how/network-database.html:76
msgid ""
"These values are used by other routers for basic decisions.\n"
-"Should we connect to this router? Should we attempt to route a tunnel through this router?\n"
-"The bandwidth capability flag, in particular, is used only to determine whether\n"
+"Should we connect to this router? Should we attempt to route a tunnel "
+"through this router?\n"
+"The bandwidth capability flag, in particular, is used only to determine "
+"whether\n"
"the router meets a minimum threshold for routing tunnels.\n"
-"Above the minimum threshold, the advertised bandwidth is not used or trusted anywhere\n"
-"in the router, except for display in the user interface and for debugging and network analysis."
+"Above the minimum threshold, the advertised bandwidth is not used or "
+"trusted anywhere\n"
+"in the router, except for display in the user interface and for debugging"
+" and network analysis."
msgstr ""
#: i2p2www/pages/site/docs/how/network-database.html:86
#, python-format
msgid ""
"Additional text options include\n"
-"a small number of statistics about the router's health, which are aggregated by\n"
+"a small number of statistics about the router's health, which are "
+"aggregated by\n"
"sites such as %(stats)s\n"
"for network performance analysis and debugging.\n"
"These statistics were chosen to provide data crucial to the developers,\n"
-"such as tunnel build success rates, while balancing the need for such data\n"
+"such as tunnel build success rates, while balancing the need for such "
+"data\n"
"with the side-effects that could result from revealing this data.\n"
"Current statistics are limited to:"
msgstr ""
@@ -6662,16 +7661,18 @@ msgstr ""
#: i2p2www/pages/site/docs/how/network-database.html:101
msgid ""
-"Floodfill routers publish additional data on the number of entries in their "
-"network database."
+"Floodfill routers publish additional data on the number of entries in "
+"their network database."
msgstr ""
#: i2p2www/pages/site/docs/how/network-database.html:105
msgid ""
"The data published can be seen in the router's user interface,\n"
"but is not used or trusted within the router.\n"
-"As the network has matured, we have gradually removed most of the published\n"
-"statistics to improve anonymity, and we plan to remove more in future releases."
+"As the network has matured, we have gradually removed most of the "
+"published\n"
+"statistics to improve anonymity, and we plan to remove more in future "
+"releases."
msgstr ""
#: i2p2www/pages/site/docs/how/network-database.html:113
@@ -6689,15 +7690,16 @@ msgstr ""
#: i2p2www/pages/site/docs/how/network-database.html:120
msgid ""
"RouterInfos have no set expiration time.\n"
-"Each router is free to maintain its own local policy to trade off the frequency of RouterInfo lookups\n"
+"Each router is free to maintain its own local policy to trade off the "
+"frequency of RouterInfo lookups\n"
"with memory or disk usage.\n"
"In the current implementation, there are the following general policies:"
msgstr ""
#: i2p2www/pages/site/docs/how/network-database.html:127
msgid ""
-"There is no expiration during the first hour of uptime, as the persistent "
-"stored data may be old."
+"There is no expiration during the first hour of uptime, as the persistent"
+" stored data may be old."
msgstr ""
#: i2p2www/pages/site/docs/how/network-database.html:130
@@ -6706,21 +7708,25 @@ msgstr ""
#: i2p2www/pages/site/docs/how/network-database.html:133
msgid ""
-"As the number of local RouterInfos grows, the expiration time shrinks, in an attempt to maintain\n"
-"a reasonable number RouterInfos. The expiration time with less than 120 routers is 72 hours,\n"
+"As the number of local RouterInfos grows, the expiration time shrinks, in"
+" an attempt to maintain\n"
+"a reasonable number RouterInfos. The expiration time with less than 120 "
+"routers is 72 hours,\n"
"while expiration time with 300 routers is around 30 hours."
msgstr ""
#: i2p2www/pages/site/docs/how/network-database.html:138
#, python-format
msgid ""
-"RouterInfos containing SSU introducers expire in about an hour, as\n"
+"RouterInfos containing SSU introducers expire in "
+"about an hour, as\n"
"the introducer list expires in about that time."
msgstr ""
#: i2p2www/pages/site/docs/how/network-database.html:142
msgid ""
-"Floodfills use a short expiration time (1 hour) for all local RouterInfos, as valid RouterInfos will\n"
+"Floodfills use a short expiration time (1 hour) for all local "
+"RouterInfos, as valid RouterInfos will\n"
"be frequently republished to them."
msgstr ""
@@ -6736,8 +7742,10 @@ msgstr ""
#: i2p2www/pages/site/docs/how/network-database.html:157
msgid ""
-"The second piece of data distributed in the netDb is a \"LeaseSet\" - documenting\n"
-"a group of tunnel entry points (leases) for a particular client destination.\n"
+"The second piece of data distributed in the netDb is a \"LeaseSet\" - "
+"documenting\n"
+"a group of tunnel entry points (leases) for a particular client "
+"destination.\n"
"Each of these leases specify the following information:"
msgstr ""
@@ -6771,8 +7779,8 @@ msgstr ""
#: i2p2www/pages/site/docs/how/network-database.html:177
msgid ""
-"Additional encryption public key: used for end-to-end encryption of garlic "
-"messages"
+"Additional encryption public key: used for end-to-end encryption of "
+"garlic messages"
msgstr ""
#: i2p2www/pages/site/docs/how/network-database.html:178
@@ -6783,8 +7791,8 @@ msgstr ""
#: i2p2www/pages/site/docs/how/network-database.html:179
msgid ""
-"Signature of all the LeaseSet data, to make sure the Destination published "
-"the LeaseSet."
+"Signature of all the LeaseSet data, to make sure the Destination "
+"published the LeaseSet."
msgstr ""
#: i2p2www/pages/site/docs/how/network-database.html:183
@@ -6809,10 +7817,13 @@ msgstr ""
#: i2p2www/pages/site/docs/how/network-database.html:195
msgid ""
-"A LeaseSet for a destination used only for outgoing connections is unpublished.\n"
+"A LeaseSet for a destination used only for outgoing connections is "
+"unpublished.\n"
"It is never sent for publication to a floodfill router.\n"
-"\"Client\" tunnels, such as those for web browsing and IRC clients, are unpublished.\n"
-"Servers will still be able to send messages back to those unpublished destinations,\n"
+"\"Client\" tunnels, such as those for web browsing and IRC clients, are "
+"unpublished.\n"
+"Servers will still be able to send messages back to those unpublished "
+"destinations,\n"
"because of I2NP storage messages."
msgstr ""
@@ -6822,10 +7833,14 @@ msgstr ""
#: i2p2www/pages/site/docs/how/network-database.html:206
msgid ""
-"A LeaseSet may be revoked by publishing a new LeaseSet with zero leases.\n"
-"Revocations must be signed by the additional signing key in the LeaseSet.\n"
-"Revocations are not fully implemented, and it is unclear if they have any practical use.\n"
-"This is the only planned use for that signing key, so it is currently unused."
+"A LeaseSet may be revoked by publishing a new LeaseSet with zero "
+"leases.\n"
+"Revocations must be signed by the additional signing key in the LeaseSet."
+"\n"
+"Revocations are not fully implemented, and it is unclear if they have any"
+" practical use.\n"
+"This is the only planned use for that signing key, so it is currently "
+"unused."
msgstr ""
#: i2p2www/pages/site/docs/how/network-database.html:213
@@ -6834,12 +7849,17 @@ msgstr ""
#: i2p2www/pages/site/docs/how/network-database.html:214
msgid ""
-"In an encrypted LeaseSet, all Leases are encrypted with a separate DSA key.\n"
-"The leases may only be decoded, and thus the destination may only be contacted,\n"
+"In an encrypted LeaseSet, all Leases are encrypted with a separate"
+" DSA key.\n"
+"The leases may only be decoded, and thus the destination may only be "
+"contacted,\n"
"by those with the key.\n"
-"There is no flag or other direct indication that the LeaseSet is encrypted.\n"
-"Encrypted LeaseSets are not widely used, and it is a topic for future work to\n"
-"research whether the user interface and implementation of encrypted LeaseSets could be improved."
+"There is no flag or other direct indication that the LeaseSet is "
+"encrypted.\n"
+"Encrypted LeaseSets are not widely used, and it is a topic for future "
+"work to\n"
+"research whether the user interface and implementation of encrypted "
+"LeaseSets could be improved."
msgstr ""
#: i2p2www/pages/site/docs/how/network-database.html:223
@@ -6848,7 +7868,8 @@ msgstr ""
#: i2p2www/pages/site/docs/how/network-database.html:224
msgid ""
-"All Leases (tunnels) are valid for 10 minutes; therefore, a LeaseSet expires\n"
+"All Leases (tunnels) are valid for 10 minutes; therefore, a LeaseSet "
+"expires\n"
"10 minutes after the earliest creation time of all its Leases."
msgstr ""
@@ -6870,32 +7891,46 @@ msgstr ""
msgid ""
"The netDb is decentralized, however you do need at\n"
"least one reference to a peer so that the integration process\n"
-"ties you in. This is accomplished by \"reseeding\" your router with the RouterInfo\n"
-"of an active peer - specifically, by retrieving their routerInfo-$hash.dat
\n"
-"file and storing it in your netDb/
directory. Anyone can provide\n"
-"you with those files - you can even provide them to others by exposing your own\n"
+"ties you in. This is accomplished by \"reseeding\" your router with the "
+"RouterInfo\n"
+"of an active peer - specifically, by retrieving their "
+"routerInfo-$hash.dat
\n"
+"file and storing it in your netDb/
directory. Anyone can "
+"provide\n"
+"you with those files - you can even provide them to others by exposing "
+"your own\n"
"netDb directory. To simplify the process,\n"
-"volunteers publish their netDb directories (or a subset) on the regular (non-i2p) network,\n"
+"volunteers publish their netDb directories (or a subset) on the regular "
+"(non-i2p) network,\n"
"and the URLs of these directories are hardcoded in I2P.\n"
-"When the router starts up for the first time, it automatically fetches from\n"
+"When the router starts up for the first time, it automatically fetches "
+"from\n"
"one of these URLs, selected at random."
msgstr ""
#: i2p2www/pages/site/docs/how/network-database.html:251
msgid ""
"The floodfill netDb is a simple distributed storage mechanism.\n"
-"The storage algorithm is simple: send the data to the closest peer that has advertised itself\n"
-"as a floodfill router. Then wait 10 seconds, pick another floodfill router and ask them \n"
-"for the entry to be sent, verifying its proper insertion / distribution. If the \n"
-"verification peer doesn't reply, or they don't have the entry, the sender \n"
-"repeats the process. When the peer in the floodfill netDb receives a netDb \n"
-"store from a peer not in the floodfill netDb, they send it to a subset of the floodfill netDb-peers.\n"
-"The peers selected are the ones closest (according to the XOR-metric) to a specific key."
+"The storage algorithm is simple: send the data to the closest peer that "
+"has advertised itself\n"
+"as a floodfill router. Then wait 10 seconds, pick another floodfill "
+"router and ask them \n"
+"for the entry to be sent, verifying its proper insertion / distribution. "
+"If the \n"
+"verification peer doesn't reply, or they don't have the entry, the sender"
+" \n"
+"repeats the process. When the peer in the floodfill netDb receives a "
+"netDb \n"
+"store from a peer not in the floodfill netDb, they send it to a subset of"
+" the floodfill netDb-peers.\n"
+"The peers selected are the ones closest (according to the XOR-metric) to a specific key."
msgstr ""
#: i2p2www/pages/site/docs/how/network-database.html:262
msgid ""
-"Determining who is part of the floodfill netDb is trivial - it is exposed in each \n"
+"Determining who is part of the floodfill netDb is trivial - it is exposed"
+" in each \n"
"router's published routerInfo as a capability."
msgstr ""
@@ -6925,13 +7960,15 @@ msgid ""
"Routers with high bandwidth limits (which must be manually configured,\n"
"as the default is much lower) are presumed to be on lower-latency\n"
"connections, and are more likely to be available 24/7.\n"
-"The current minimum share bandwidth for a floodfill router is 128 KBytes/sec."
+"The current minimum share bandwidth for a floodfill router is 128 "
+"KBytes/sec."
msgstr ""
#: i2p2www/pages/site/docs/how/network-database.html:293
msgid ""
"In addition, a router must pass several additional tests for health\n"
-"(outbound message queue time, job lag, etc.) before floodfill operation is\n"
+"(outbound message queue time, job lag, etc.) before floodfill operation "
+"is\n"
"automatically enabled."
msgstr ""
@@ -6958,10 +7995,13 @@ msgstr ""
#: i2p2www/pages/site/docs/how/network-database.html:315
msgid ""
-"A floodfill router's only services that are in addition to those of non-floodfill routers\n"
+"A floodfill router's only services that are in addition to those of non-"
+"floodfill routers\n"
"are in accepting netDb stores and responding to netDb queries.\n"
-"Since they are generally high-bandwidth, they are more likely to participate in a high number of tunnels\n"
-"(i.e. be a \"relay\" for others), but this is not directly related to their distributed database services."
+"Since they are generally high-bandwidth, they are more likely to "
+"participate in a high number of tunnels\n"
+"(i.e. be a \"relay\" for others), but this is not directly related to "
+"their distributed database services."
msgstr ""
#: i2p2www/pages/site/docs/how/network-database.html:323
@@ -6970,21 +8010,29 @@ msgstr ""
#: i2p2www/pages/site/docs/how/network-database.html:324
msgid ""
-"The netDb uses a simple Kademlia-style XOR metric to determine closeness.\n"
+"The netDb uses a simple Kademlia-style XOR metric to determine closeness."
+"\n"
"The SHA256 hash of the key being looked up or stored is XOR-ed with\n"
"the hash of the router in question to determine closeness.\n"
-"A modification to this algorithm is done to increase the costs of Sybil attacks.\n"
-"Instead of the SHA256 hash of the key being looked up of stored, the SHA256 hash is taken\n"
-"of the 32-byte binary search key appended with the UTC date represented as an 8-byte ASCII string yyyyMMdd, i.e. SHA256(key + yyyyMMdd).\n"
-"This is called the \"routing key\", and it changes every day at midnight UTC.\n"
-"Only the search key is modified in this way, not the floodfill router hashes.\n"
-"The daily transformation of the DHT is sometimes called \"keyspace rotation\",\n"
+"A modification to this algorithm is done to increase the costs of Sybil attacks.\n"
+"Instead of the SHA256 hash of the key being looked up of stored, the "
+"SHA256 hash is taken\n"
+"of the 32-byte binary search key appended with the UTC date represented "
+"as an 8-byte ASCII string yyyyMMdd, i.e. SHA256(key + yyyyMMdd).\n"
+"This is called the \"routing key\", and it changes every day at midnight "
+"UTC.\n"
+"Only the search key is modified in this way, not the floodfill router "
+"hashes.\n"
+"The daily transformation of the DHT is sometimes called \"keyspace "
+"rotation\",\n"
"although it isn't strictly a rotation."
msgstr ""
#: i2p2www/pages/site/docs/how/network-database.html:337
msgid ""
-"Routing keys are never sent on-the-wire in any I2NP message, they are only used locally for\n"
+"Routing keys are never sent on-the-wire in any I2NP message, they are "
+"only used locally for\n"
"determination of distance."
msgstr ""
@@ -6999,7 +8047,8 @@ msgstr ""
#: i2p2www/pages/site/docs/how/network-database.html:347
#, python-format
msgid ""
-"I2NP DatabaseStoreMessages containing the local RouterInfo are exchanged with peers\n"
+"I2NP DatabaseStoreMessages containing the local "
+"RouterInfo are exchanged with peers\n"
"as a part of the initialization of a NTCP\n"
"or SSU transport connection."
msgstr ""
@@ -7011,32 +8060,46 @@ msgstr ""
#: i2p2www/pages/site/docs/how/network-database.html:355
#, python-format
msgid ""
-"I2NP DatabaseStoreMessages containing the local LeaseSet are periodically exchanged with peers\n"
-"by bundling them in a garlic message along with normal traffic from the related Destination.\n"
-"This allows an initial response, and later responses, to be sent to an appropriate Lease,\n"
-"without requiring any LeaseSet lookups, or requiring the communicating Destinations to have published LeaseSets at all."
+"I2NP DatabaseStoreMessages containing the local "
+"LeaseSet are periodically exchanged with peers\n"
+"by bundling them in a garlic message along with normal traffic from the "
+"related Destination.\n"
+"This allows an initial response, and later responses, to be sent to an "
+"appropriate Lease,\n"
+"without requiring any LeaseSet lookups, or requiring the communicating "
+"Destinations to have published LeaseSets at all."
msgstr ""
#: i2p2www/pages/site/docs/how/network-database.html:363
msgid ""
"The DatabaseStoreMessage should be sent to the floodfill that is closest\n"
"to the current routing key for the RouterInfo or LeaseSet being stored.\n"
-"Currently, the closest floodfill is found by a search in the local database.\n"
-"Even if that floodfill is not actually closest, it will flood it \"closer\" by\n"
+"Currently, the closest floodfill is found by a search in the local "
+"database.\n"
+"Even if that floodfill is not actually closest, it will flood it "
+"\"closer\" by\n"
"sending it to multiple other floodfills.\n"
"This provides a high degree of fault-tolerance."
msgstr ""
#: i2p2www/pages/site/docs/how/network-database.html:372
msgid ""
-"In traditional Kademlia, a peer would do a \"find-closest\" search before inserting\n"
-"an item in the DHT to the closest target. As the verify operation will tend to\n"
-"discover closer floodfills if they are present, a router will quickly improve\n"
-"its knowledge of the DHT \"neighborhood\" for the RouterInfo and LeaseSets it regularly publishes.\n"
-"While I2NP does not define a \"find-closest\" message, if it becomes necessary,\n"
-"a router may simply do an iterative search for a key with the least significant bit flipped\n"
-"(i.e. key ^ 0x01) until no closer peers are received in the DatabaseSearchReplyMessages.\n"
-"This ensures that the true closest peer will be found even if a more-distant peer had\n"
+"In traditional Kademlia, a peer would do a \"find-closest\" search before"
+" inserting\n"
+"an item in the DHT to the closest target. As the verify operation will "
+"tend to\n"
+"discover closer floodfills if they are present, a router will quickly "
+"improve\n"
+"its knowledge of the DHT \"neighborhood\" for the RouterInfo and "
+"LeaseSets it regularly publishes.\n"
+"While I2NP does not define a \"find-closest\" message, if it becomes "
+"necessary,\n"
+"a router may simply do an iterative search for a key with the least "
+"significant bit flipped\n"
+"(i.e. key ^ 0x01) until no closer peers are received in the "
+"DatabaseSearchReplyMessages.\n"
+"This ensures that the true closest peer will be found even if a more-"
+"distant peer had\n"
"the netdb item."
msgstr ""
@@ -7047,9 +8110,11 @@ msgstr ""
#: i2p2www/pages/site/docs/how/network-database.html:386
#, python-format
msgid ""
-"A router publishes its own RouterInfo by directly connecting to a floodfill router\n"
+"A router publishes its own RouterInfo by directly connecting to a "
+"floodfill router\n"
"and sending it a I2NP DatabaseStoreMessage\n"
-"with a nonzero Reply Token. The message is not end-to-end garlic encrypted,\n"
+"with a nonzero Reply Token. The message is not end-to-end garlic "
+"encrypted,\n"
"as this is a direct connection, so there are no intervening routers\n"
"(and no need to hide this data anyway).\n"
"The floodfill router replies with a\n"
@@ -7063,7 +8128,8 @@ msgstr ""
#: i2p2www/pages/site/docs/how/network-database.html:401
msgid ""
-"Storage of LeaseSets is much more sensitive than for RouterInfos, as a router\n"
+"Storage of LeaseSets is much more sensitive than for RouterInfos, as a "
+"router\n"
"must take care that the LeaseSet cannot be associated with the router."
msgstr ""
@@ -7072,8 +8138,10 @@ msgstr ""
msgid ""
"A router publishes a local LeaseSet by\n"
"sending a I2NP DatabaseStoreMessage\n"
-"with a nonzero Reply Token over an outbound client tunnel for that Destination.\n"
-"The message is end-to-end garlic encrypted using the Destination's Session Key Manager,\n"
+"with a nonzero Reply Token over an outbound client tunnel for that "
+"Destination.\n"
+"The message is end-to-end garlic encrypted using the Destination's "
+"Session Key Manager,\n"
"to hide the message from the tunnel's outbound endpoint.\n"
"The floodfill router replies with a\n"
"I2NP DeliveryStatusMessage,\n"
@@ -7089,12 +8157,17 @@ msgstr ""
#, python-format
msgid ""
"After a floodfill router receives a DatabaseStoreMessage containing a\n"
-"valid RouterInfo or LeaseSet which is newer than that previously stored in its\n"
+"valid RouterInfo or LeaseSet which is newer than that previously stored "
+"in its\n"
"local NetDb, it \"floods\" it.\n"
-"To flood a NetDb entry, it looks up several (currently %(floodsize)s) floodfill routers closest to the routing key\n"
-"of the NetDb entry. (The routing key is the SHA256 Hash of the RouterIdentity or Destination with the date (yyyyMMdd) appended.)\n"
-"By flooding to those closest to the key, not closest to itself, the floodfill ensures that the storage\n"
-"gets to the right place, even if the storing router did not have good knowledge of the\n"
+"To flood a NetDb entry, it looks up several (currently %(floodsize)s) "
+"floodfill routers closest to the routing key\n"
+"of the NetDb entry. (The routing key is the SHA256 Hash of the "
+"RouterIdentity or Destination with the date (yyyyMMdd) appended.)\n"
+"By flooding to those closest to the key, not closest to itself, the "
+"floodfill ensures that the storage\n"
+"gets to the right place, even if the storing router did not have good "
+"knowledge of the\n"
"DHT \"neighborhood\" for the routing key."
msgstr ""
@@ -7116,15 +8189,17 @@ msgstr ""
#: i2p2www/pages/site/docs/how/network-database.html:442
#, python-format
msgid ""
-"The I2NP DatabaseLookupMessage is used to request a netdb entry from a floodfill router.\n"
+"The I2NP DatabaseLookupMessage is used to "
+"request a netdb entry from a floodfill router.\n"
"Lookups are sent out one of the router's outbound exploratory tunnels.\n"
-"The replies are specified to return via one of the router's inbound exploratory tunnels."
+"The replies are specified to return via one of the router's inbound "
+"exploratory tunnels."
msgstr ""
#: i2p2www/pages/site/docs/how/network-database.html:448
msgid ""
-"Lookups are generally sent to the two \"good\" (the connection doesn't fail)"
-" floodfill routers closest to the requested key, in parallel."
+"Lookups are generally sent to the two \"good\" (the connection doesn't "
+"fail) floodfill routers closest to the requested key, in parallel."
msgstr ""
#: i2p2www/pages/site/docs/how/network-database.html:452
@@ -7132,7 +8207,8 @@ msgstr ""
msgid ""
"If the key is found locally by the floodfill router, it responds with a\n"
"I2NP DatabaseStoreMessage.\n"
-"If the key is not found locally by the floodfill router, it responds with a\n"
+"If the key is not found locally by the floodfill router, it responds with"
+" a\n"
"I2NP DatabaseSearchReplyMessage\n"
"containing a list of other floodfill routers close to the key."
msgstr ""
@@ -7140,17 +8216,22 @@ msgstr ""
#: i2p2www/pages/site/docs/how/network-database.html:460
msgid ""
"LeaseSet lookups are garlic encrypted end-to-end as of release 0.9.5.\n"
-"RouterInfo lookups are not encrypted and thus are vulnerable to snooping by the outbound endpoint\n"
-"(OBEP) of the client tunnel. This is due to the expense of the ElGamal encryption.\n"
+"RouterInfo lookups are not encrypted and thus are vulnerable to snooping "
+"by the outbound endpoint\n"
+"(OBEP) of the client tunnel. This is due to the expense of the ElGamal "
+"encryption.\n"
"RouterInfo lookup encryption may be enabled in a future release."
msgstr ""
#: i2p2www/pages/site/docs/how/network-database.html:467
msgid ""
-"As of release 0.9.7, replies to a LeaseSet lookup (a DatabaseStoreMessage or a DatabaseSearchReplyMessage)\n"
+"As of release 0.9.7, replies to a LeaseSet lookup (a DatabaseStoreMessage"
+" or a DatabaseSearchReplyMessage)\n"
"will be encrypted by including the session key and tag in the lookup.\n"
-"This hides the reply from the inbound gateway (IBGW) of the reply tunnel.\n"
-"Responses to RouterInfo lookups will be encrypted if we enable the lookup encryption."
+"This hides the reply from the inbound gateway (IBGW) of the reply tunnel."
+"\n"
+"Responses to RouterInfo lookups will be encrypted if we enable the lookup"
+" encryption."
msgstr ""
#: i2p2www/pages/site/docs/how/network-database.html:474
@@ -7162,33 +8243,44 @@ msgstr ""
#: i2p2www/pages/site/docs/how/network-database.html:478
msgid ""
-"Due to the relatively small size of the network and the flooding redundancy of 8x,\n"
+"Due to the relatively small size of the network and the flooding "
+"redundancy of 8x,\n"
"lookups are usually O(1) rather than O(log n) --\n"
-"a router is highly likely to know a floodfill router close enough to the key to get the answer on the first try.\n"
+"a router is highly likely to know a floodfill router close enough to the "
+"key to get the answer on the first try.\n"
"In releases prior to 0.8.9, routers used a lookup redundancy of two\n"
-"(that is, two lookups were performed in parallel to different peers), and\n"
-"neither recursive nor iterative routing for lookups was implemented.\n"
+"(that is, two lookups were performed in parallel to different peers), and"
+"\n"
+"neither recursive nor iterative routing for lookups was "
+"implemented.\n"
"Queries were sent through multiple routes simultaneously\n"
"to reduce the chance of query failure."
msgstr ""
#: i2p2www/pages/site/docs/how/network-database.html:489
msgid ""
-"As of release 0.8.9, iterative lookups are implemented with no lookup redundancy.\n"
+"As of release 0.8.9, iterative lookups are implemented with no "
+"lookup redundancy.\n"
"This is a more efficient and reliable lookup that will work much better\n"
"when not all floodfill peers are known, and it removes a serious\n"
-"limitation to network growth. As the network grows and each router knows only a small\n"
+"limitation to network growth. As the network grows and each router knows "
+"only a small\n"
"subset of the floodfill peers, lookups will become O(log n).\n"
-"Even if the peer does not return references closer to the key, the lookup continues with\n"
-"the next-closest peer, for added robustness, and to prevent a malicious floodfill from\n"
-"black-holing a part of the key space. Lookups continue until a total lookup timeout is reached,\n"
+"Even if the peer does not return references closer to the key, the lookup"
+" continues with\n"
+"the next-closest peer, for added robustness, and to prevent a malicious "
+"floodfill from\n"
+"black-holing a part of the key space. Lookups continue until a total "
+"lookup timeout is reached,\n"
"or the maximum number of peers is queried."
msgstr ""
#: i2p2www/pages/site/docs/how/network-database.html:501
msgid ""
-"Node IDs are verifiable in that we use the router hash directly as both the node ID and the Kademlia key.\n"
-"Incorrect responses that are not closer to the search key are generally ignored.\n"
+"Node IDs are verifiable in that we use the router hash "
+"directly as both the node ID and the Kademlia key.\n"
+"Incorrect responses that are not closer to the search key are generally "
+"ignored.\n"
"Given the current size of the network, a router has\n"
"detailed knowledge of the neighborhood of the destination ID space."
msgstr ""
@@ -7200,7 +8292,8 @@ msgstr ""
#: i2p2www/pages/site/docs/how/network-database.html:511
#, python-format
msgid ""
-"Note: RouterInfo verification is disabled as of release 0.9.7.1 to prevent\n"
+"Note: RouterInfo verification is disabled as of release 0.9.7.1 to "
+"prevent\n"
"the attack described in the paper\n"
"Practical Attacks Against the I2P Network.\n"
"It is not clear if verification can be redesigned to be done safely."
@@ -7208,11 +8301,13 @@ msgstr ""
#: i2p2www/pages/site/docs/how/network-database.html:518
msgid ""
-"To verify a storage was successful, a router simply waits about 10 seconds,\n"
+"To verify a storage was successful, a router simply waits about 10 "
+"seconds,\n"
"then sends a lookup to another floodfill router close to the key\n"
"(but not the one the store was sent to).\n"
"Lookups sent out one of the router's outbound exploratory tunnels.\n"
-"Lookups are end-to-end garlic encrypted to prevent snooping by the outbound endpoint(OBEP)."
+"Lookups are end-to-end garlic encrypted to prevent snooping by the "
+"outbound endpoint(OBEP)."
msgstr ""
#: i2p2www/pages/site/docs/how/network-database.html:526
@@ -7221,18 +8316,22 @@ msgstr ""
#: i2p2www/pages/site/docs/how/network-database.html:527
msgid ""
-"To verify a storage was successful, a router simply waits about 10 seconds,\n"
+"To verify a storage was successful, a router simply waits about 10 "
+"seconds,\n"
"then sends a lookup to another floodfill router close to the key\n"
"(but not the one the store was sent to).\n"
-"Lookups sent out one of the outbound client tunnels for the destination of the LeaseSet being verified.\n"
+"Lookups sent out one of the outbound client tunnels for the destination "
+"of the LeaseSet being verified.\n"
"To prevent snooping by the OBEP of the outbound tunnel,\n"
"lookups are end-to-end garlic encrypted.\n"
-"The replies are specified to return via one of the client's inbound tunnels."
+"The replies are specified to return via one of the client's inbound "
+"tunnels."
msgstr ""
#: i2p2www/pages/site/docs/how/network-database.html:537
msgid ""
-"As of release 0.9.7, replies for both RouterInfo and LeaseSet lookups (a DatabaseStoreMessage or a DatabaseSearchReplyMessage)\n"
+"As of release 0.9.7, replies for both RouterInfo and LeaseSet lookups (a "
+"DatabaseStoreMessage or a DatabaseSearchReplyMessage)\n"
"will be encrypted,\n"
"to hide the reply from the inbound gateway (IBGW) of the reply tunnel."
msgstr ""
@@ -7244,16 +8343,24 @@ msgstr ""
#: i2p2www/pages/site/docs/how/network-database.html:546
#, python-format
msgid ""
-"Exploration is a special form of netdb lookup, where a router attempts to learn about\n"
+"Exploration is a special form of netdb lookup, where a router "
+"attempts to learn about\n"
"new routers.\n"
-"It does this by sending a floodfill router a I2NP DatabaseLookupMessage, looking for a random key.\n"
+"It does this by sending a floodfill router a I2NP DatabaseLookupMessage, looking for a random "
+"key.\n"
"As this lookup will fail, the floodfill would normally respond with a\n"
-"I2NP DatabaseSearchReplyMessage containing hashes of floodfill routers close to the key.\n"
-"This would not be helpful, as the requesting router probably already knows those floodfills,\n"
-"and it would be impractical to add ALL floodfill routers to the \"don't include\" field of the lookup.\n"
-"For an exploration query, the requesting router adds a router hash of all zeros to the\n"
+"I2NP DatabaseSearchReplyMessage containing "
+"hashes of floodfill routers close to the key.\n"
+"This would not be helpful, as the requesting router probably already "
+"knows those floodfills,\n"
+"and it would be impractical to add ALL floodfill routers to the \"don't "
+"include\" field of the lookup.\n"
+"For an exploration query, the requesting router adds a router hash of all"
+" zeros to the\n"
"\"don't include\" field of the DatabaseLookupMessage.\n"
-"The floodfill will then respond only with non-floodfill routers close to the requested key."
+"The floodfill will then respond only with non-floodfill routers close to "
+"the requested key."
msgstr ""
#: i2p2www/pages/site/docs/how/network-database.html:560
@@ -7262,11 +8369,14 @@ msgstr ""
#: i2p2www/pages/site/docs/how/network-database.html:561
msgid ""
-"The response to a lookup request is either a Database Store Message (on success) or a\n"
-"Database Search Reply Message (on failure). The DSRM contains a 'from' router hash field\n"
+"The response to a lookup request is either a Database Store Message (on "
+"success) or a\n"
+"Database Search Reply Message (on failure). The DSRM contains a 'from' "
+"router hash field\n"
"to indicate the source of the reply; the DSM does not.\n"
"The DSRM 'from' field is unauthenticated and may be spoofed or invalid.\n"
-"There are no other response tags. Therefore, when making multiple requests in parallel, it is\n"
+"There are no other response tags. Therefore, when making multiple "
+"requests in parallel, it is\n"
"difficult to monitor the performance of the various floodfill routers."
msgstr ""
@@ -7276,13 +8386,19 @@ msgstr ""
#: i2p2www/pages/site/docs/how/network-database.html:573
msgid ""
-"Destinations may be hosted on multiple routers simultaneously, by using the same\n"
+"Destinations may be hosted on multiple routers simultaneously, by using "
+"the same\n"
"private and public keys (traditionally stored in eepPriv.dat files).\n"
-"As both instances will periodically publish their signed LeaseSets to the floodfill peers,\n"
-"the most recently published LeaseSet will be returned to a peer requesting a database lookup.\n"
-"As LeaseSets have (at most) a 10 minute lifetime, should a particular instance go down,\n"
-"the outage will be 10 minutes at most, and generally much less than that.\n"
-"The multihoming function has been verified and is in use by several services on the network."
+"As both instances will periodically publish their signed LeaseSets to the"
+" floodfill peers,\n"
+"the most recently published LeaseSet will be returned to a peer "
+"requesting a database lookup.\n"
+"As LeaseSets have (at most) a 10 minute lifetime, should a particular "
+"instance go down,\n"
+"the outage will be 10 minutes at most, and generally much less than that."
+"\n"
+"The multihoming function has been verified and is in use by several "
+"services on the network."
msgstr ""
#: i2p2www/pages/site/docs/how/network-database.html:583
@@ -7312,7 +8428,8 @@ msgstr ""
#, python-format
msgid ""
"There are currently around %(ffcount)s floodfill routers in the network.\n"
-"Most of the following attacks will become more difficult, or have less impact,\n"
+"Most of the following attacks will become more difficult, or have less "
+"impact,\n"
"as the network size and number of floodfill routers increase."
msgstr ""
@@ -7323,8 +8440,8 @@ msgstr ""
#: i2p2www/pages/site/docs/how/network-database.html:604
#, python-format
msgid ""
-"Via flooding, all netdb entries are stored on the %(floodsize)s floodfill "
-"routers closest to the key."
+"Via flooding, all netdb entries are stored on the %(floodsize)s floodfill"
+" routers closest to the key."
msgstr ""
#: i2p2www/pages/site/docs/how/network-database.html:609
@@ -7345,7 +8462,8 @@ msgstr ""
#, python-format
msgid ""
"Each router maintains an expanded set of statistics in the\n"
-"peer profile for each floodfill router,\n"
+"peer profile for each floodfill router,"
+"\n"
"covering various quality metrics for that peer.\n"
"The set includes:"
msgstr ""
@@ -7376,11 +8494,14 @@ msgstr ""
#: i2p2www/pages/site/docs/how/network-database.html:631
msgid ""
-"Each time a router needs to make a determination on which floodfill router is closest to a key,\n"
+"Each time a router needs to make a determination on which floodfill "
+"router is closest to a key,\n"
"it uses these metrics to determine which floodfill routers are \"good\".\n"
-"The methods, and thresholds, used to determine \"goodness\" are relatively new, and\n"
+"The methods, and thresholds, used to determine \"goodness\" are "
+"relatively new, and\n"
"are subject to further analysis and improvement.\n"
-"While a completely unresponsive router will quickly be identified and avoided,\n"
+"While a completely unresponsive router will quickly be identified and "
+"avoided,\n"
"routers that are only sometimes malicious may be much harder to deal with."
msgstr ""
@@ -7392,7 +8513,8 @@ msgstr ""
#, python-format
msgid ""
"An attacker may mount a Sybil attack\n"
-"by creating a large number of floodfill routers spread throughout the keyspace."
+"by creating a large number of floodfill routers spread throughout the "
+"keyspace."
msgstr ""
#: i2p2www/pages/site/docs/how/network-database.html:647
@@ -7400,29 +8522,35 @@ msgstr ""
msgid ""
"(In a related example, a researcher recently created a\n"
"large number of Tor relays.)\n"
-"If successful, this could be an effective DOS attack on the entire network."
+"If successful, this could be an effective DOS attack on the entire "
+"network."
msgstr ""
#: i2p2www/pages/site/docs/how/network-database.html:653
msgid ""
-"If the floodfills are not sufficiently misbehaving to be marked as \"bad\" using the peer profile\n"
+"If the floodfills are not sufficiently misbehaving to be marked as "
+"\"bad\" using the peer profile\n"
"metrics described above, this is a difficult scenario to handle.\n"
-"Tor's response can be much more nimble in the relay case, as the suspicious relays\n"
+"Tor's response can be much more nimble in the relay case, as the "
+"suspicious relays\n"
"can be manually removed from the consensus.\n"
-"Some possible responses for the I2P network are listed below, however none of them is completely satisfactory:"
+"Some possible responses for the I2P network are listed below, however "
+"none of them is completely satisfactory:"
msgstr ""
#: i2p2www/pages/site/docs/how/network-database.html:661
msgid ""
-"Compile a list of bad router hashes or IPs, and announce the list through various means\n"
-"(console news, website, forum, etc.); users would have to manually download the list and\n"
+"Compile a list of bad router hashes or IPs, and announce the list through"
+" various means\n"
+"(console news, website, forum, etc.); users would have to manually "
+"download the list and\n"
"add it to their local \"blacklist\"."
msgstr ""
#: i2p2www/pages/site/docs/how/network-database.html:666
msgid ""
-"Ask everyone in the network to enable floodfill manually (fight Sybil with "
-"more Sybil)"
+"Ask everyone in the network to enable floodfill manually (fight Sybil "
+"with more Sybil)"
msgstr ""
#: i2p2www/pages/site/docs/how/network-database.html:667
@@ -7431,7 +8559,8 @@ msgstr ""
#: i2p2www/pages/site/docs/how/network-database.html:668
msgid ""
-"Release a new software version that improves the peer profile metrics and thresholds,\n"
+"Release a new software version that improves the peer profile metrics and"
+" thresholds,\n"
"in an attempt to automatically identify the \"bad\" peers."
msgstr ""
@@ -7443,9 +8572,12 @@ msgstr ""
#: i2p2www/pages/site/docs/how/network-database.html:673
msgid ""
-"Implement an automatic subscription-based blacklist controlled by a single individual or group.\n"
-"This would essentially implement a portion of the Tor \"consensus\" model.\n"
-"Unfortunately it would also give a single individual or group the power to\n"
+"Implement an automatic subscription-based blacklist controlled by a "
+"single individual or group.\n"
+"This would essentially implement a portion of the Tor \"consensus\" "
+"model.\n"
+"Unfortunately it would also give a single individual or group the power "
+"to\n"
"block participation of any particular router or IP in the network,\n"
"or even to completely shutdown or destroy the entire network."
msgstr ""
@@ -7462,19 +8594,25 @@ msgstr ""
#, python-format
msgid ""
"An attacker may mount a Sybil attack\n"
-"by creating a small number (8-15) of floodfill routers clustered closely in the keyspace,\n"
+"by creating a small number (8-15) of floodfill routers clustered closely "
+"in the keyspace,\n"
"and distribute the RouterInfos for these routers widely.\n"
-"Then, all lookups and stores for a key in that keyspace would be directed\n"
+"Then, all lookups and stores for a key in that keyspace would be directed"
+"\n"
"to one of the attacker's routers.\n"
-"If successful, this could be an effective DOS attack on a particular eepsite, for example."
+"If successful, this could be an effective DOS attack on a particular "
+"eepsite, for example."
msgstr ""
#: i2p2www/pages/site/docs/how/network-database.html:698
msgid ""
-"As the keyspace is indexed by the cryptographic (SHA256) Hash of the key,\n"
-"an attacker must use a brute-force method to repeatedly generate router hashes\n"
+"As the keyspace is indexed by the cryptographic (SHA256) Hash of the key,"
+"\n"
+"an attacker must use a brute-force method to repeatedly generate router "
+"hashes\n"
"until he has enough that are sufficiently close to the key.\n"
-"The amount of computational power required for this, which is dependent on network\n"
+"The amount of computational power required for this, which is dependent "
+"on network\n"
"size, is unknown."
msgstr ""
@@ -7482,10 +8620,14 @@ msgstr ""
msgid ""
"As a partial defense against this attack,\n"
"the algorithm used to determine Kademlia \"closeness\" varies over time.\n"
-"Rather than using the Hash of the key (i.e. H(k)) to determine closeness,\n"
-"we use the Hash of the key appended with the current date string, i.e. H(k + YYYYMMDD).\n"
-"A function called the \"routing key generator\" does this, which transforms the original key into a \"routing key\".\n"
-"In other words, the entire netdb keyspace \"rotates\" every day at UTC midnight.\n"
+"Rather than using the Hash of the key (i.e. H(k)) to determine closeness,"
+"\n"
+"we use the Hash of the key appended with the current date string, i.e. "
+"H(k + YYYYMMDD).\n"
+"A function called the \"routing key generator\" does this, which "
+"transforms the original key into a \"routing key\".\n"
+"In other words, the entire netdb keyspace \"rotates\" every day at UTC "
+"midnight.\n"
"Any partial-keyspace attack would have to be regenerated every day, for\n"
"after the rotation, the attacking routers would no longer be close\n"
"to the target key, or to each other."
@@ -7494,7 +8636,8 @@ msgstr ""
#: i2p2www/pages/site/docs/how/network-database.html:718
msgid ""
"This attack becomes more difficult as the network size grows.\n"
-"However, recent research demonstrates that the keyspace rotation is not particularly effective.\n"
+"However, recent research demonstrates that the keyspace rotation is not "
+"particularly effective.\n"
"An attacker can precompute numerous router hashes in advance,\n"
"and only a few routers are sufficient to \"eclipse\" a portion\n"
"of the keyspace within a half hour after rotation."
@@ -7502,9 +8645,11 @@ msgstr ""
#: i2p2www/pages/site/docs/how/network-database.html:726
msgid ""
-"One consequence of daily keyspace rotation is that the distributed network database\n"
+"One consequence of daily keyspace rotation is that the distributed "
+"network database\n"
"may become unreliable for a few minutes after the rotation --\n"
-"lookups will fail because the new \"closest\" router has not received a store yet.\n"
+"lookups will fail because the new \"closest\" router has not received a "
+"store yet.\n"
"The extent of the issue, and methods for mitigation\n"
"(for example netdb \"handoffs\" at midnight)\n"
"are a topic for further study."
@@ -7567,19 +8712,24 @@ msgstr ""
#, python-format
msgid ""
"See also lookup\n"
-"(Reference: Hashing it out in Public Sections 2.2-2.3 for terms below in italics)"
+"(Reference: Hashing it out in Public Sections "
+"2.2-2.3 for terms below in italics)"
msgstr ""
#: i2p2www/pages/site/docs/how/network-database.html:782
msgid ""
-"Similar to a bootstrap attack, an attacker using a floodfill router could attempt to \"steer\"\n"
-"peers to a subset of routers controlled by him by returning their references."
+"Similar to a bootstrap attack, an attacker using a floodfill router could"
+" attempt to \"steer\"\n"
+"peers to a subset of routers controlled by him by returning their "
+"references."
msgstr ""
#: i2p2www/pages/site/docs/how/network-database.html:787
msgid ""
-"This is unlikely to work via exploration, because exploration is a low-frequency task.\n"
-"Routers acquire a majority of their peer references through normal tunnel building activity.\n"
+"This is unlikely to work via exploration, because exploration is a low-"
+"frequency task.\n"
+"Routers acquire a majority of their peer references through normal tunnel"
+" building activity.\n"
"Exploration results are generally limited to a few router hashes,\n"
"and each exploration query is directed to a random floodfill router."
msgstr ""
@@ -7591,13 +8741,18 @@ msgid ""
"For floodfill router references returned in a\n"
"I2NP DatabaseSearchReplyMessage\n"
"response to a lookup,\n"
-"these references are followed if they are closer (or the next closest) to the lookup key.\n"
+"these references are followed if they are closer (or the next closest) to"
+" the lookup key.\n"
"The requesting router does not trust that the references are\n"
"closer to the key (i.e. they are verifiably correct.\n"
-"The lookup also does not stop when no closer key is found, but continues by querying the\n"
-"next-closet node, until the timeout or maximum number of queries is reached.\n"
-"This prevents a malicious floodfill from black-holing a part of the key space.\n"
-"Also, the daily keyspace rotation requires an attacker to regenerate a router info\n"
+"The lookup also does not stop when no closer key is found, but continues "
+"by querying the\n"
+"next-closet node, until the timeout or maximum number of queries is "
+"reached.\n"
+"This prevents a malicious floodfill from black-holing a part of the key "
+"space.\n"
+"Also, the daily keyspace rotation requires an attacker to regenerate a "
+"router info\n"
"within the desired key space region.\n"
"This design ensures that the query capture attack described in\n"
"Hashing it out in Public\n"
@@ -7635,30 +8790,43 @@ msgstr ""
#: i2p2www/pages/site/docs/how/network-database.html:829
#, python-format
msgid ""
-"This paper addresses weaknesses in the \"Finger Table\" DHT lookups used by Torsk and NISAN.\n"
-"At first glance, these do not appear to apply to I2P. First, the use of DHT by Torsk and NISAN\n"
-"is significantly different from that in I2P. Second, I2P's network database lookups are only\n"
-"loosely correlated to the peer selection and\n"
-"tunnel building processes; only previously-known peers\n"
+"This paper addresses weaknesses in the \"Finger Table\" DHT lookups used "
+"by Torsk and NISAN.\n"
+"At first glance, these do not appear to apply to I2P. First, the use of "
+"DHT by Torsk and NISAN\n"
+"is significantly different from that in I2P. Second, I2P's network "
+"database lookups are only\n"
+"loosely correlated to the peer "
+"selection and\n"
+"tunnel building processes; only "
+"previously-known peers\n"
"are used for tunnels.\n"
"Also, peer selection is unrelated to any notion of DHT key-closeness."
msgstr ""
#: i2p2www/pages/site/docs/how/network-database.html:840
msgid ""
-"Some of this may actually be more interesting when the I2P network gets much larger.\n"
-"Right now, each router knows a large proportion of the network, so looking up a particular\n"
-"Router Info in the network database is not strongly indicative of a future intent to use\n"
-"that router in a tunnel. Perhaps when the network is 100 times larger, the lookup may be\n"
-"more correlative. Of course, a larger network makes a Sybil attack that much harder."
+"Some of this may actually be more interesting when the I2P network gets "
+"much larger.\n"
+"Right now, each router knows a large proportion of the network, so "
+"looking up a particular\n"
+"Router Info in the network database is not strongly indicative of a "
+"future intent to use\n"
+"that router in a tunnel. Perhaps when the network is 100 times larger, "
+"the lookup may be\n"
+"more correlative. Of course, a larger network makes a Sybil attack that "
+"much harder."
msgstr ""
#: i2p2www/pages/site/docs/how/network-database.html:848
#, python-format
msgid ""
-"However, the general issue of DHT information leakage in I2P needs further investigation.\n"
-"The floodfill routers are in a position to observe queries and gather information.\n"
-"Certainly, at a level of f = 0.2 (20% malicious nodes, as specifed in the paper)\n"
+"However, the general issue of DHT information leakage in I2P needs "
+"further investigation.\n"
+"The floodfill routers are in a position to observe queries and gather "
+"information.\n"
+"Certainly, at a level of f = 0.2 (20% malicious nodes, as "
+"specifed in the paper)\n"
"we expect that many of the Sybil threats we describe\n"
"(here,\n"
"here and\n"
@@ -7693,9 +8861,11 @@ msgstr ""
#: i2p2www/pages/site/docs/how/peer-selection.html:10
#, python-format
msgid ""
-"Peer profiling is the process of collecting data based on the observed performance\n"
+"Peer profiling is the process of collecting data based on the "
+"observed performance\n"
"of other routers or peers, and classifying those peers into groups.\n"
-"Profiling does not use any claimed performance data published by the peer itself\n"
+"Profiling does not use any claimed performance data published by "
+"the peer itself\n"
"in the network database."
msgstr ""
@@ -7710,7 +8880,8 @@ msgstr ""
#: i2p2www/pages/site/docs/how/peer-selection.html:20
#, python-format
msgid ""
-"Choosing peers from the set of floodfill routers to use for network database storage and queries,\n"
+"Choosing peers from the set of floodfill routers to use for network "
+"database storage and queries,\n"
"which is discussed on the network database page"
msgstr ""
@@ -7723,9 +8894,11 @@ msgstr ""
#: i2p2www/pages/site/docs/how/peer-selection.html:28
msgid ""
"Peer selection is the process of choosing which routers\n"
-"on the network we want to relay our messages to go through (which peers will we \n"
+"on the network we want to relay our messages to go through (which peers "
+"will we \n"
"ask to join our tunnels). To accomplish this, we keep track of how each\n"
-"peer performs (the peer's \"profile\") and use that data to estimate how \n"
+"peer performs (the peer's \"profile\") and use that data to estimate how"
+" \n"
"fast they are, how often they will be able to accept our requests, and \n"
"whether they seem to be overloaded or otherwise unable to perform what\n"
"they agree to reliably."
@@ -7735,7 +8908,8 @@ msgstr ""
#, python-format
msgid ""
"Unlike some other anonymous networks, in I2P,\n"
-"claimed bandwidth is untrusted and is only used to avoid those peers\n"
+"claimed bandwidth is untrusted and is only used to avoid those "
+"peers\n"
"advertising very low bandwidth insufficient for routing tunnels.\n"
"All peer selection is done through profiling.\n"
"This prevents simple attacks based on peers claiming high bandwidth\n"
@@ -7747,8 +8921,10 @@ msgstr ""
#: i2p2www/pages/site/docs/how/peer-selection.html:50
msgid ""
-"Peer selection is done quite frequently, as a router may maintain a large number\n"
-"of client and exploratory tunnels, and a tunnel lifetime is only 10 minutes."
+"Peer selection is done quite frequently, as a router may maintain a large"
+" number\n"
+"of client and exploratory tunnels, and a tunnel lifetime is only 10 "
+"minutes."
msgstr ""
#: i2p2www/pages/site/docs/how/peer-selection.html:56
@@ -7759,9 +8935,11 @@ msgstr "Weitere Informationen"
#, python-format
msgid ""
"For more information see the paper\n"
-"Peer Profiling and Selection in the I2P Anonymous Network\n"
+"Peer Profiling and Selection in the I2P Anonymous "
+"Network\n"
"presented at PET-CON 2009.1.\n"
-"See below for notes on minor changes since the paper was published."
+"See below for notes on minor changes since the "
+"paper was published."
msgstr ""
#: i2p2www/pages/site/docs/how/peer-selection.html:65
@@ -7771,21 +8949,30 @@ msgstr "Profile"
#: i2p2www/pages/site/docs/how/peer-selection.html:66
#, python-format
msgid ""
-"Each peer has a set of data points collected about them, including statistics \n"
-"about how long it takes for them to reply to a network database query, how \n"
-"often their tunnels fail, and how many new peers they are able to introduce \n"
-"us to, as well as simple data points such as when we last heard from them or\n"
-"when the last communication error occurred. The specific data points gathered\n"
+"Each peer has a set of data points collected about them, including "
+"statistics \n"
+"about how long it takes for them to reply to a network database query, "
+"how \n"
+"often their tunnels fail, and how many new peers they are able to "
+"introduce \n"
+"us to, as well as simple data points such as when we last heard from them"
+" or\n"
+"when the last communication error occurred. The specific data points "
+"gathered\n"
"can be found in the code."
msgstr ""
#: i2p2www/pages/site/docs/how/peer-selection.html:75
msgid ""
-"Profiles are fairly small, a few KB. To control memory usage, the profile expiration time\n"
+"Profiles are fairly small, a few KB. To control memory usage, the profile"
+" expiration time\n"
"lessens as the number of profiles grows.\n"
-"Profiles are kept in memory until router shutdown, when they are written to disk.\n"
-"At startup, the profiles are read so the router need not reinitialize all profiles,\n"
-"thus allowing a router to quickly re-integrate into the network after startup."
+"Profiles are kept in memory until router shutdown, when they are written "
+"to disk.\n"
+"At startup, the profiles are read so the router need not reinitialize all"
+" profiles,\n"
+"thus allowing a router to quickly re-integrate into the network after "
+"startup."
msgstr ""
#: i2p2www/pages/site/docs/how/peer-selection.html:85
@@ -7795,8 +8982,10 @@ msgstr ""
#: i2p2www/pages/site/docs/how/peer-selection.html:86
msgid ""
"While the profiles themselves can be considered a summary of a peer's \n"
-"performance, to allow for effective peer selection we break each summary down \n"
-"into four simple values, representing the peer's speed, its capacity, how well \n"
+"performance, to allow for effective peer selection we break each summary "
+"down \n"
+"into four simple values, representing the peer's speed, its capacity, how"
+" well \n"
"integrated into the network it is, and whether it is failing."
msgstr ""
@@ -7808,7 +8997,8 @@ msgstr "Geschwindigkeit"
msgid ""
"The speed calculation\n"
"simply goes through the profile and estimates how much data we can\n"
-"send or receive on a single tunnel through the peer in a minute. For this estimate it just looks at\n"
+"send or receive on a single tunnel through the peer in a minute. For "
+"this estimate it just looks at\n"
"performance in the previous minute."
msgstr ""
@@ -7820,11 +9010,13 @@ msgstr "Kapazität"
msgid ""
"The capacity calculation\n"
"simply goes through the profile and estimates how many tunnels the peer\n"
-"would agree to participate in over a given time period. For this estimate it looks at \n"
+"would agree to participate in over a given time period. For this "
+"estimate it looks at \n"
"how many tunnel build requests\n"
"the peer has accepted, rejected, and dropped, and how many\n"
"of the agreed-to tunnels later failed.\n"
-"While the calculation is time-weighted so that recent activity counts more than later activity,\n"
+"While the calculation is time-weighted so that recent activity counts "
+"more than later activity,\n"
"statistics up to 48 hours old may be included."
msgstr ""
@@ -7832,8 +9024,10 @@ msgstr ""
msgid ""
"Recognizing and avoiding unreliable and unreachable\n"
"peers is critically important.\n"
-"Unfortunately, as the tunnel building and testing require the participation of several peers,\n"
-"it is difficult to positively identify the cause of a dropped build request or test failure.\n"
+"Unfortunately, as the tunnel building and testing require the "
+"participation of several peers,\n"
+"it is difficult to positively identify the cause of a dropped build "
+"request or test failure.\n"
"The router assigns a probability of failure to each of the\n"
"peers, and uses that probability in the capacity calculation.\n"
"Drops and test failures are weighted much higher than rejections."
@@ -7845,8 +9039,10 @@ msgstr ""
#: i2p2www/pages/site/docs/how/peer-selection.html:124
msgid ""
-"As mentioned above, we drill through each peer's profile to come up with a \n"
-"few key calculations, and based upon those, we organize each peer into three\n"
+"As mentioned above, we drill through each peer's profile to come up with "
+"a \n"
+"few key calculations, and based upon those, we organize each peer into "
+"three\n"
"groups - fast, high capacity, and standard."
msgstr ""
@@ -7856,13 +9052,15 @@ msgstr ""
#: i2p2www/pages/site/docs/how/peer-selection.html:134
msgid ""
-"A peer is considered \"high capacity\" if its capacity calculation meets or \n"
+"A peer is considered \"high capacity\" if its capacity calculation meets "
+"or \n"
"exceeds the median of all peers."
msgstr ""
#: i2p2www/pages/site/docs/how/peer-selection.html:138
msgid ""
-"A peer is considered \"fast\" if they are already \"high capacity\" and their \n"
+"A peer is considered \"fast\" if they are already \"high capacity\" and "
+"their \n"
"speed calculation meets or exceeds the median of all peers."
msgstr ""
@@ -7888,20 +9086,25 @@ msgstr ""
#: i2p2www/pages/site/docs/how/peer-selection.html:156
msgid ""
"The fast group is limited to 30 peers.\n"
-"If there would be more, only the ones with the highest speed rating are placed in the group."
+"If there would be more, only the ones with the highest speed rating are "
+"placed in the group."
msgstr ""
#: i2p2www/pages/site/docs/how/peer-selection.html:160
msgid ""
-"The high capacity group is limited to 75 peers (including the fast group)\n"
-"If there would be more, only the ones with the highest capacity rating are placed in the group."
+"The high capacity group is limited to 75 peers (including the fast group)"
+"\n"
+"If there would be more, only the ones with the highest capacity rating "
+"are placed in the group."
msgstr ""
#: i2p2www/pages/site/docs/how/peer-selection.html:164
msgid ""
-"The standard group has no fixed limit, but is somewhat smaller than the number of RouterInfos\n"
+"The standard group has no fixed limit, but is somewhat smaller than the "
+"number of RouterInfos\n"
"stored in the local network database.\n"
-"On an active router in today's network, there may be about 1000 RouterInfos and 500 peer profiles\n"
+"On an active router in today's network, there may be about 1000 "
+"RouterInfos and 500 peer profiles\n"
"(including those in the fast and high capacity groups)"
msgstr ""
@@ -7917,15 +9120,16 @@ msgstr ""
#: i2p2www/pages/site/docs/how/peer-selection.html:177
msgid ""
-"The groups tend to be fairly stable, that is, there is not much \"churn\" in the rankings\n"
+"The groups tend to be fairly stable, that is, there is not much \"churn\""
+" in the rankings\n"
"at each recalculation.\n"
-"Peers in the fast and high capacity groups get more tunnels build through them, which increases their speed and capacity ratings,\n"
+"Peers in the fast and high capacity groups get more tunnels build through"
+" them, which increases their speed and capacity ratings,\n"
"which reinforces their presence in the group."
msgstr ""
#: i2p2www/pages/site/docs/how/peer-selection.html:188
-msgid ""
-"The router selects peers from the above groups to build tunnels through."
+msgid "The router selects peers from the above groups to build tunnels through."
msgstr ""
#: i2p2www/pages/site/docs/how/peer-selection.html:193
@@ -7934,16 +9138,19 @@ msgstr ""
#: i2p2www/pages/site/docs/how/peer-selection.html:194
msgid ""
-"Client tunnels are used for application traffic, such as for HTTP proxies "
-"and web servers."
+"Client tunnels are used for application traffic, such as for HTTP proxies"
+" and web servers."
msgstr ""
#: i2p2www/pages/site/docs/how/peer-selection.html:198
msgid ""
-"To reduce the susceptibility to some attacks,\n"
+"To reduce the susceptibility to some attacks,\n"
"and increase performance,\n"
-"peers for building client tunnels are chosen randomly from the smallest group, which is the \"fast\" group.\n"
-"There is no bias toward selecting peers that were previously participants in a tunnel for the same client."
+"peers for building client tunnels are chosen randomly from the smallest "
+"group, which is the \"fast\" group.\n"
+"There is no bias toward selecting peers that were previously participants"
+" in a tunnel for the same client."
msgstr ""
#: i2p2www/pages/site/docs/how/peer-selection.html:206
@@ -7952,26 +9159,35 @@ msgstr ""
#: i2p2www/pages/site/docs/how/peer-selection.html:207
msgid ""
-"Exploratory tunnels are used for router administrative purposes, such as network database traffic\n"
+"Exploratory tunnels are used for router administrative purposes, such as "
+"network database traffic\n"
"and testing client tunnels.\n"
-"Exploratory tunnels are also used to contact previously unconnected routers, which is why\n"
+"Exploratory tunnels are also used to contact previously unconnected "
+"routers, which is why\n"
"they are called \"exploratory\".\n"
"These tunnels are usually low-bandwidth."
msgstr ""
#: i2p2www/pages/site/docs/how/peer-selection.html:215
msgid ""
-"Peers for building exploratory tunnels are generally chosen randomly from the standard group.\n"
-"If the success rate of these build attempts is low compared to the client tunnel build success rate,\n"
-"the router will select a weighted average of peers randomly from the high capacity group instead.\n"
-"This helps maintain a satisfactory build success rate even when network performance is poor.\n"
-"There is no bias toward selecting peers that were previously participants in an exploratory tunnel."
+"Peers for building exploratory tunnels are generally chosen randomly from"
+" the standard group.\n"
+"If the success rate of these build attempts is low compared to the client"
+" tunnel build success rate,\n"
+"the router will select a weighted average of peers randomly from the high"
+" capacity group instead.\n"
+"This helps maintain a satisfactory build success rate even when network "
+"performance is poor.\n"
+"There is no bias toward selecting peers that were previously participants"
+" in an exploratory tunnel."
msgstr ""
#: i2p2www/pages/site/docs/how/peer-selection.html:223
msgid ""
-"As the standard group includes a very large subset of all peers the router knows about,\n"
-"exploratory tunnels are essentially built through a random selection of all peers,\n"
+"As the standard group includes a very large subset of all peers the "
+"router knows about,\n"
+"exploratory tunnels are essentially built through a random selection of "
+"all peers,\n"
"until the build success rate becomes too low."
msgstr ""
@@ -7981,8 +9197,8 @@ msgstr "Beschränkungen"
#: i2p2www/pages/site/docs/how/peer-selection.html:232
msgid ""
-"To prevent some simple attacks, and for performance, there are the following"
-" restrictions:"
+"To prevent some simple attacks, and for performance, there are the "
+"following restrictions:"
msgstr ""
#: i2p2www/pages/site/docs/how/peer-selection.html:236
@@ -7991,8 +9207,8 @@ msgstr ""
#: i2p2www/pages/site/docs/how/peer-selection.html:239
msgid ""
-"A peer may participate in a maximum of 33% of all tunnels created by the"
-" router."
+"A peer may participate in a maximum of 33% of all tunnels created by "
+"the router."
msgstr ""
#: i2p2www/pages/site/docs/how/peer-selection.html:242
@@ -8013,18 +9229,18 @@ msgid ""
"Peers are ordered within tunnels to\n"
"to deal with the predecessor attack\n"
"(2008 update).\n"
-"More information is on the tunnel page."
+"More information is on the tunnel "
+"page."
msgstr ""
#: i2p2www/pages/site/docs/how/peer-selection.html:268
-msgid ""
-"Continue to analyze an tune speed and capacity calculations as necessary"
+msgid "Continue to analyze an tune speed and capacity calculations as necessary"
msgstr ""
#: i2p2www/pages/site/docs/how/peer-selection.html:271
msgid ""
-"Implement a more aggressive ejection strategy if necessary to control memory"
-" usage as the network grows"
+"Implement a more aggressive ejection strategy if necessary to control "
+"memory usage as the network grows"
msgstr ""
#: i2p2www/pages/site/docs/how/peer-selection.html:274
@@ -8039,8 +9255,10 @@ msgstr ""
#, python-format
msgid ""
"For those reading the paper\n"
-"Peer Profiling and Selection in the I2P Anonymous Network,\n"
-"please keep in mind the following minor changes in I2P since the paper's publication:"
+"Peer Profiling and Selection in the I2P Anonymous "
+"Network,\n"
+"please keep in mind the following minor changes in I2P since the paper's "
+"publication:"
msgstr ""
#: i2p2www/pages/site/docs/how/peer-selection.html:289
@@ -8114,18 +9332,24 @@ msgstr "Kryptographie"
#: i2p2www/pages/site/docs/how/tech-intro.html:25
msgid ""
"I2P is a scalable, self organizing, resilient packet switched anonymous \n"
-"network layer, upon which any number of different anonymity or security conscious \n"
-"applications can operate. Each of these applications may make their own anonymity, \n"
-"latency, and throughput tradeoffs without worrying about the proper implementation \n"
-"of a free route mixnet, allowing them to blend their activity with the larger \n"
+"network layer, upon which any number of different anonymity or security "
+"conscious \n"
+"applications can operate. Each of these applications may make their own "
+"anonymity, \n"
+"latency, and throughput tradeoffs without worrying about the proper "
+"implementation \n"
+"of a free route mixnet, allowing them to blend their activity with the "
+"larger \n"
"anonymity set of users already running on top of I2P."
msgstr ""
#: i2p2www/pages/site/docs/how/tech-intro.html:34
msgid ""
-"Applications available already provide the full range of typical Internet activities -\n"
+"Applications available already provide the full range of typical Internet"
+" activities -\n"
"anonymous web browsing, web hosting, chat, file sharing, e-mail,\n"
-"blogging and content syndication, newsgroups, as well as several other applications under development."
+"blogging and content syndication, newsgroups, as well as several other "
+"applications under development."
msgstr ""
#: i2p2www/pages/site/docs/how/tech-intro.html:40
@@ -8138,8 +9362,10 @@ msgstr ""
#: i2p2www/pages/site/docs/how/tech-intro.html:42
msgid ""
-"File sharing: I2PSnark, Robert, iMule, \n"
-"I2Phex, PyBit, I2P-bt\n"
+"File sharing: I2PSnark, Robert, iMule, \n"
+"I2Phex, PyBit, I2P-bt\n"
"and others."
msgstr ""
@@ -8151,14 +9377,14 @@ msgstr ""
#: i2p2www/pages/site/docs/how/tech-intro.html:48
msgid ""
-"Blog: using e.g. the pebble plugin or the distributed blogging software Syndie."
+"Blog: using e.g. the pebble plugin or the distributed blogging software "
+"Syndie."
msgstr ""
#: i2p2www/pages/site/docs/how/tech-intro.html:49
msgid ""
-"Distributed Data Store: Save your data redundantly in the Tahoe-LAFS cloud "
-"over I2P."
+"Distributed Data Store: Save your data redundantly in the Tahoe-LAFS "
+"cloud over I2P."
msgstr ""
#: i2p2www/pages/site/docs/how/tech-intro.html:50
@@ -8167,47 +9393,77 @@ msgstr ""
#: i2p2www/pages/site/docs/how/tech-intro.html:53
msgid ""
-"Unlike web sites hosted within content distribution networks like Freenet \n"
-"or GNUnet, the services hosted on \n"
-"I2P are fully interactive - there are traditional web-style search engines, \n"
-"bulletin boards, blogs you can comment on, database driven sites, and bridges \n"
-"to query static systems like Freenet without needing to install it locally."
+"Unlike web sites hosted within content distribution networks like Freenet \n"
+"or GNUnet, the services "
+"hosted on \n"
+"I2P are fully interactive - there are traditional web-style search "
+"engines, \n"
+"bulletin boards, blogs you can comment on, database driven sites, and "
+"bridges \n"
+"to query static systems like Freenet without needing to install it "
+"locally."
msgstr ""
#: i2p2www/pages/site/docs/how/tech-intro.html:61
msgid ""
"With all of these anonymity enabled applications, I2P takes on the role \n"
-"of the message oriented middleware - applications say that they want to send \n"
-"some data to a cryptographic identifier (a \"destination\") and I2P takes care \n"
-"of making sure it gets there securely and anonymously. I2P also bundles a \n"
-"simple streaming library to allow I2P's anonymous \n"
-"best-effort messages to transfer as reliable, in-order streams, transparently \n"
-"offering a TCP based congestion control algorithm tuned for the high bandwidth \n"
-"delay product of the network. While there have been several simple SOCKS proxies \n"
-"available to tie existing applications into the network, their value has been \n"
-"limited as nearly every application routinely exposes what, in an anonymous \n"
-"context, is sensitive information. The only safe way to go is to fully audit \n"
-"an application to ensure proper operation and to assist in that we provide \n"
-"a series of APIs in various languages which can be used to make the most out \n"
+"of the message oriented middleware - applications say that they want to "
+"send \n"
+"some data to a cryptographic identifier (a \"destination\") and I2P takes"
+" care \n"
+"of making sure it gets there securely and anonymously. I2P also bundles a"
+" \n"
+"simple streaming library to allow I2P's "
+"anonymous \n"
+"best-effort messages to transfer as reliable, in-order streams, "
+"transparently \n"
+"offering a TCP based congestion control algorithm tuned for the high "
+"bandwidth \n"
+"delay product of the network. While there have been several simple SOCKS "
+"proxies \n"
+"available to tie existing applications into the network, their value has "
+"been \n"
+"limited as nearly every application routinely exposes what, in an "
+"anonymous \n"
+"context, is sensitive information. The only safe way to go is to fully "
+"audit \n"
+"an application to ensure proper operation and to assist in that we "
+"provide \n"
+"a series of APIs in various languages which can be used to make the most "
+"out \n"
"of the network."
msgstr ""
#: i2p2www/pages/site/docs/how/tech-intro.html:78
#, python-format
msgid ""
-"I2P is not a research project - academic, commercial, or governmental, but \n"
-"is instead an engineering effort aimed at doing whatever is necessary to provide \n"
-"a sufficient level of anonymity to those who need it. It has been in active \n"
-"development since early 2003 with one full time developer and a dedicated \n"
-"group of part time contributors from all over the world. All of the work done \n"
-"on I2P is open source and freely available on the website, \n"
-"with the majority of the code released outright into the public domain, though \n"
-"making use of a few cryptographic routines under BSD-style licenses. The people \n"
-"working on I2P do not control what people release client applications under, \n"
-"and there are several GPL'ed applications available (I2PTunnel, \n"
-"susimail, I2PSnark, I2P-Bote, \n"
+"I2P is not a research project - academic, commercial, or governmental, "
+"but \n"
+"is instead an engineering effort aimed at doing whatever is necessary to "
+"provide \n"
+"a sufficient level of anonymity to those who need it. It has been in "
+"active \n"
+"development since early 2003 with one full time developer and a dedicated"
+" \n"
+"group of part time contributors from all over the world. All of the work "
+"done \n"
+"on I2P is open source and freely available on the website, \n"
+"with the majority of the code released outright into the public domain, "
+"though \n"
+"making use of a few cryptographic routines under BSD-style licenses. The "
+"people \n"
+"working on I2P do not control what people release client applications "
+"under, \n"
+"and there are several GPL'ed applications available (I2PTunnel, \n"
+"susimail, I2PSnark, I2P-"
+"Bote, \n"
"I2Phex and others.).\n"
-"Funding for I2P comes entirely from donations,\n"
+"Funding for I2P comes entirely from "
+"donations,\n"
"and does not receive any tax breaks in any jurisdiction at this time,\n"
"as many of the developers are themselves anonymous."
msgstr ""
@@ -8218,27 +9474,40 @@ msgstr ""
#: i2p2www/pages/site/docs/how/tech-intro.html:98
msgid ""
-"To understand I2P's operation, it is essential to understand a few key concepts. \n"
-"First, I2P makes a strict separation between the software participating in \n"
-"the network (a \"router\") and the anonymous endpoints (\"destinations\") associated \n"
-"with individual applications. The fact that someone is running I2P is not \n"
-"usually a secret. What is hidden is information on what the user is doing, \n"
-"if anything at all, as well as what router a particular destination is connected \n"
-"to. End users will typically have several local destinations on their router \n"
-"- for instance, one proxying in to IRC servers, another supporting the user's \n"
-"anonymous webserver (\"eepsite\"), another for an I2Phex instance, another for \n"
+"To understand I2P's operation, it is essential to understand a few key "
+"concepts. \n"
+"First, I2P makes a strict separation between the software participating "
+"in \n"
+"the network (a \"router\") and the anonymous endpoints (\"destinations\")"
+" associated \n"
+"with individual applications. The fact that someone is running I2P is not"
+" \n"
+"usually a secret. What is hidden is information on what the user is "
+"doing, \n"
+"if anything at all, as well as what router a particular destination is "
+"connected \n"
+"to. End users will typically have several local destinations on their "
+"router \n"
+"- for instance, one proxying in to IRC servers, another supporting the "
+"user's \n"
+"anonymous webserver (\"eepsite\"), another for an I2Phex instance, "
+"another for \n"
"torrents, etc."
msgstr ""
#: i2p2www/pages/site/docs/how/tech-intro.html:111
msgid ""
"Another critical concept to understand is the \"tunnel\".\n"
-"A tunnel is a directed path through an explicitly selected list of routers.\n"
-"Layered encryption is used, so each of the routers can only decrypt a single layer.\n"
+"A tunnel is a directed path through an explicitly selected list of "
+"routers.\n"
+"Layered encryption is used, so each of the routers can only decrypt a "
+"single layer.\n"
"The decrypted information contains the IP of the next router, along with\n"
"the encrypted information to be forwarded.\n"
-"Each tunnel has a starting point (the first router, also known as \"gateway\")\n"
-"and an end point. Messages can be sent only in one way. To send messages back,\n"
+"Each tunnel has a starting point (the first router, also known as "
+"\"gateway\")\n"
+"and an end point. Messages can be sent only in one way. To send messages "
+"back,\n"
"another tunnel is required."
msgstr ""
@@ -8258,12 +9527,15 @@ msgid ""
"while \"inbound\" tunnels bring messages to the tunnel creator.\n"
"Combining these two tunnels allows users to send messages to each other.\n"
"The sender (\"Alice\" in the above image) sets up an outbound tunnel,\n"
-"while the receiver (\"Bob\" in the above image) creates an inbound tunnel.\n"
-"The gateway of an inbound tunnel can receive messages from any other user\n"
+"while the receiver (\"Bob\" in the above image) creates an inbound "
+"tunnel.\n"
+"The gateway of an inbound tunnel can receive messages from any other user"
+"\n"
"and will send them on until the endpoint (\"Bob\").\n"
"The endpoint of the outbound tunnel will need to send the message\n"
"on to the gateway of the inbound tunnel.\n"
-"To do this, the sender (\"Alice\") adds instructions to her encrypted message.\n"
+"To do this, the sender (\"Alice\") adds instructions to her encrypted "
+"message.\n"
"Once the endpoint of the outbound tunnel decrypts the message,\n"
"it will have instructions to forward the message to the correct\n"
"inbound gateway (the gateway to \"Bob\")."
@@ -8271,19 +9543,25 @@ msgstr ""
#: i2p2www/pages/site/docs/how/tech-intro.html:144
msgid ""
-"A third critical concept to understand is I2P's \"network database\" (or \"netDb\") \n"
-"- a pair of algorithms used to share network metadata. The two types of metadata \n"
-"carried are \"routerInfo\" and \"leaseSets\" - the routerInfo gives routers the \n"
-"data necessary for contacting a particular router (their public keys, transport \n"
-"addresses, etc), while the leaseSet gives routers the information necessary \n"
-"for contacting a particular destination. A leaseSet contains a number of \"leases\".\n"
-"Each of this leases specifies a tunnel gateway, which allows reaching a specific destination.\n"
+"A third critical concept to understand is I2P's \"network "
+"database\" (or \"netDb\") \n"
+"- a pair of algorithms used to share network metadata. The two types of "
+"metadata \n"
+"carried are \"routerInfo\" and \"leaseSets\" - the "
+"routerInfo gives routers the \n"
+"data necessary for contacting a particular router (their public keys, "
+"transport \n"
+"addresses, etc), while the leaseSet gives routers the information "
+"necessary \n"
+"for contacting a particular destination. A leaseSet contains a number of "
+"\"leases\".\n"
+"Each of this leases specifies a tunnel gateway, which allows reaching a "
+"specific destination.\n"
"The full information contained in a lease:"
msgstr ""
#: i2p2www/pages/site/docs/how/tech-intro.html:155
-msgid ""
-"Inbound gateway for a tunnel that allows reaching a specific destination."
+msgid "Inbound gateway for a tunnel that allows reaching a specific destination."
msgstr ""
#: i2p2www/pages/site/docs/how/tech-intro.html:156
@@ -8298,8 +9576,10 @@ msgstr ""
#: i2p2www/pages/site/docs/how/tech-intro.html:159
msgid ""
-"Routers themselves send their routerInfo to the netDb directly, while leaseSets are sent through outbound tunnels\n"
-"(leaseSets need to be sent anonymously, to avoid correlating a router with his leaseSets)."
+"Routers themselves send their routerInfo to the netDb directly, while "
+"leaseSets are sent through outbound tunnels\n"
+"(leaseSets need to be sent anonymously, to avoid correlating a router "
+"with his leaseSets)."
msgstr ""
#: i2p2www/pages/site/docs/how/tech-intro.html:164
@@ -8310,10 +9590,13 @@ msgstr ""
#: i2p2www/pages/site/docs/how/tech-intro.html:168
msgid ""
-"To build up her own inbound and outbound tunnels, Alice does a lookup in the netDb to collect routerInfo.\n"
+"To build up her own inbound and outbound tunnels, Alice does a lookup in "
+"the netDb to collect routerInfo.\n"
"This way, she gathers lists of peers she can use as hops in her tunnels.\n"
-"She can then send a build message to the first hop, requesting the construction of a tunnel and asking\n"
-"that router to send the construction message onward, until the tunnel has been constructed."
+"She can then send a build message to the first hop, requesting the "
+"construction of a tunnel and asking\n"
+"that router to send the construction message onward, until the tunnel has"
+" been constructed."
msgstr ""
#: i2p2www/pages/site/docs/how/tech-intro.html:175
@@ -8330,19 +9613,30 @@ msgstr ""
#: i2p2www/pages/site/docs/how/tech-intro.html:182
msgid ""
-"When Alice wants to send a message to Bob, she first does a lookup in the \n"
-"netDb to find Bob's leaseSet, giving her his current inbound tunnel gateways. \n"
-"She then picks one of her outbound tunnels and sends the message down it with \n"
-"instructions for the outbound tunnel's endpoint to forward the message on \n"
-"to one of Bob's inbound tunnel gateways. When the outbound tunnel endpoint \n"
-"receives those instructions, it forwards the message as requested, and when \n"
-"Bob's inbound tunnel gateway receives it, it is forwarded down the tunnel \n"
-"to Bob's router. If Alice wants Bob to be able to reply to the message, she \n"
-"needs to transmit her own destination explicitly as part of the message itself.\n"
-"This can be done by introducing a higher-level layer, which is done in the\n"
+"When Alice wants to send a message to Bob, she first does a lookup in the"
+" \n"
+"netDb to find Bob's leaseSet, giving her his current inbound tunnel "
+"gateways. \n"
+"She then picks one of her outbound tunnels and sends the message down it "
+"with \n"
+"instructions for the outbound tunnel's endpoint to forward the message on"
+" \n"
+"to one of Bob's inbound tunnel gateways. When the outbound tunnel "
+"endpoint \n"
+"receives those instructions, it forwards the message as requested, and "
+"when \n"
+"Bob's inbound tunnel gateway receives it, it is forwarded down the tunnel"
+" \n"
+"to Bob's router. If Alice wants Bob to be able to reply to the message, "
+"she \n"
+"needs to transmit her own destination explicitly as part of the message "
+"itself.\n"
+"This can be done by introducing a higher-level layer, which is done in "
+"the\n"
"streaming library.\n"
"Alice may also cut down on the response time by bundling her most \n"
-"recent LeaseSet with the message so that Bob doesn't need to do a netDb lookup \n"
+"recent LeaseSet with the message so that Bob doesn't need to do a netDb "
+"lookup \n"
"for it when he wants to reply, but this is optional."
msgstr ""
@@ -8360,126 +9654,210 @@ msgstr ""
#: i2p2www/pages/site/docs/how/tech-intro.html:204
msgid ""
-"While the tunnels themselves have layered encryption to prevent unauthorized \n"
-"disclosure to peers inside the network (as the transport layer itself does \n"
-"to prevent unauthorized disclosure to peers outside the network), it is necessary \n"
-"to add an additional end to end layer of encryption to hide the message from \n"
-"the outbound tunnel endpoint and the inbound tunnel gateway. This \"garlic \n"
-"encryption\" lets Alice's router wrap up multiple messages into a single \n"
-"\"garlic message\", encrypted to a particular public key so that intermediary \n"
-"peers cannot determine either how many messages are within the garlic, what \n"
-"those messages say, or where those individual cloves are destined. For typical \n"
-"end to end communication between Alice and Bob, the garlic will be encrypted \n"
-"to the public key published in Bob's leaseSet, allowing the message to be \n"
+"While the tunnels themselves have layered encryption to prevent "
+"unauthorized \n"
+"disclosure to peers inside the network (as the transport layer itself "
+"does \n"
+"to prevent unauthorized disclosure to peers outside the network), it is "
+"necessary \n"
+"to add an additional end to end layer of encryption to hide the message "
+"from \n"
+"the outbound tunnel endpoint and the inbound tunnel gateway. This \"garlic \n"
+"encryption\" lets Alice's router wrap up multiple messages into a "
+"single \n"
+"\"garlic message\", encrypted to a particular public key so that "
+"intermediary \n"
+"peers cannot determine either how many messages are within the garlic, "
+"what \n"
+"those messages say, or where those individual cloves are destined. For "
+"typical \n"
+"end to end communication between Alice and Bob, the garlic will be "
+"encrypted \n"
+"to the public key published in Bob's leaseSet, allowing the message to be"
+" \n"
"encrypted without giving out the public key to Bob's own router."
msgstr ""
#: i2p2www/pages/site/docs/how/tech-intro.html:219
msgid ""
-"Another important fact to keep in mind is that I2P is entirely message based \n"
-"and that some messages may be lost along the way. Applications using I2P can \n"
-"use the message oriented interfaces and take care of their own congestion \n"
-"control and reliability needs, but most would be best served by reusing the \n"
-"provided streaming library to view I2P as a streams \n"
+"Another important fact to keep in mind is that I2P is entirely message "
+"based \n"
+"and that some messages may be lost along the way. Applications using I2P "
+"can \n"
+"use the message oriented interfaces and take care of their own congestion"
+" \n"
+"control and reliability needs, but most would be best served by reusing "
+"the \n"
+"provided streaming library to view I2P as "
+"a streams \n"
"based network."
msgstr ""
#: i2p2www/pages/site/docs/how/tech-intro.html:229
msgid ""
"Both inbound and outbound tunnels work along similar principles.\n"
-"The tunnel gateway accumulates a number of tunnel messages, eventually preprocessing \n"
-"them into something for tunnel delivery. Next, the gateway encrypts that preprocessed \n"
-"data and forwards it to the first hop. That peer and subsequent tunnel participants \n"
-"add on a layer of encryption after verifying that it isn't a duplicate before \n"
-"forward it on to the next peer. Eventually, the message arrives at the endpoint \n"
-"where the messages are split out again and forwarded on as requested. The \n"
-"difference arises in what the tunnel's creator does - for inbound tunnels, \n"
-"the creator is the endpoint and they simply decrypt all of the layers added, \n"
-"while for outbound tunnels, the creator is the gateway and they pre-decrypt \n"
-"all of the layers so that after all of the layers of per-hop encryption are \n"
+"The tunnel gateway accumulates a number of tunnel messages, eventually "
+"preprocessing \n"
+"them into something for tunnel delivery. Next, the gateway encrypts that "
+"preprocessed \n"
+"data and forwards it to the first hop. That peer and subsequent tunnel "
+"participants \n"
+"add on a layer of encryption after verifying that it isn't a duplicate "
+"before \n"
+"forward it on to the next peer. Eventually, the message arrives at the "
+"endpoint \n"
+"where the messages are split out again and forwarded on as requested. The"
+" \n"
+"difference arises in what the tunnel's creator does - for inbound "
+"tunnels, \n"
+"the creator is the endpoint and they simply decrypt all of the layers "
+"added, \n"
+"while for outbound tunnels, the creator is the gateway and they pre-"
+"decrypt \n"
+"all of the layers so that after all of the layers of per-hop encryption "
+"are \n"
"added, the message arrives in the clear at the tunnel endpoint."
msgstr ""
#: i2p2www/pages/site/docs/how/tech-intro.html:244
msgid ""
-"The choice of specific peers to pass on messages as well as their particular \n"
-"ordering is important to understanding both I2P's anonymity and performance \n"
-"characteristics. While the network database (below) has its own criteria for \n"
-"picking what peers to query and store entries on, tunnel creators may use any peers \n"
-"in the network in any order (and even any number of times) in a single tunnel. \n"
-"If perfect latency and capacity data were globally known, selection and ordering \n"
-"would be driven by the particular needs of the client in tandem with their \n"
-"threat model. Unfortunately, latency and capacity data is not trivial to gather \n"
-"anonymously, and depending upon untrusted peers to provide this information \n"
+"The choice of specific peers to pass on messages as well as their "
+"particular \n"
+"ordering is important to understanding both I2P's anonymity and "
+"performance \n"
+"characteristics. While the network database (below) has its own criteria "
+"for \n"
+"picking what peers to query and store entries on, tunnel creators may use"
+" any peers \n"
+"in the network in any order (and even any number of times) in a single "
+"tunnel. \n"
+"If perfect latency and capacity data were globally known, selection and "
+"ordering \n"
+"would be driven by the particular needs of the client in tandem with "
+"their \n"
+"threat model. Unfortunately, latency and capacity data is not trivial to "
+"gather \n"
+"anonymously, and depending upon untrusted peers to provide this "
+"information \n"
"has its own serious anonymity implications."
msgstr ""
#: i2p2www/pages/site/docs/how/tech-intro.html:257
msgid ""
-"From an anonymity perspective, the simplest technique would be to pick peers \n"
-"randomly from the entire network, order them randomly and use those peers \n"
-"in that order for all eternity. From a performance perspective, the simplest \n"
-"technique would be to pick the fastest peers with the necessary spare capacity, \n"
-"spreading the load across different peers to handle transparent failover, \n"
-"and to rebuild the tunnel whenever capacity information changes. While the \n"
-"former is both brittle and inefficient, the later requires inaccessible information \n"
-"and offers insufficient anonymity. I2P is instead working on offering a range \n"
-"of peer selection strategies, coupled with anonymity aware measurement code \n"
+"From an anonymity perspective, the simplest technique would be to pick "
+"peers \n"
+"randomly from the entire network, order them randomly and use those peers"
+" \n"
+"in that order for all eternity. From a performance perspective, the "
+"simplest \n"
+"technique would be to pick the fastest peers with the necessary spare "
+"capacity, \n"
+"spreading the load across different peers to handle transparent failover,"
+" \n"
+"and to rebuild the tunnel whenever capacity information changes. While "
+"the \n"
+"former is both brittle and inefficient, the later requires inaccessible "
+"information \n"
+"and offers insufficient anonymity. I2P is instead working on offering a "
+"range \n"
+"of peer selection strategies, coupled with anonymity aware measurement "
+"code \n"
"to organize the peers by their profiles."
msgstr ""
#: i2p2www/pages/site/docs/how/tech-intro.html:270
msgid ""
-"As a base, I2P is constantly profiling the peers with which it interacts \n"
-"with by measuring their indirect behavior - for instance, when a peer responds \n"
-"to a netDb lookup in 1.3 seconds, that round trip latency is recorded in the \n"
-"profiles for all of the routers involved in the two tunnels (inbound and outbound) \n"
-"through which the request and response passed, as well as the queried peer's \n"
-"profile. Direct measurement, such as transport layer latency or congestion, \n"
-"is not used as part of the profile, as it can be manipulated and associated \n"
-"with the measuring router, exposing them to trivial attacks. While gathering \n"
-"these profiles, a series of calculations are run on each to summarize its \n"
-"performance - its latency, capacity to handle lots of activity, whether they \n"
-"are currently overloaded, and how well integrated into the network they seem \n"
-"to be. These calculations are then compared for active peers to organize the \n"
-"routers into four tiers - fast and high capacity, high capacity, not failing, \n"
-"and failing. The thresholds for those tiers are determined dynamically, and \n"
+"As a base, I2P is constantly profiling the peers with which it interacts"
+" \n"
+"with by measuring their indirect behavior - for instance, when a peer "
+"responds \n"
+"to a netDb lookup in 1.3 seconds, that round trip latency is recorded in "
+"the \n"
+"profiles for all of the routers involved in the two tunnels (inbound and "
+"outbound) \n"
+"through which the request and response passed, as well as the queried "
+"peer's \n"
+"profile. Direct measurement, such as transport layer latency or "
+"congestion, \n"
+"is not used as part of the profile, as it can be manipulated and "
+"associated \n"
+"with the measuring router, exposing them to trivial attacks. While "
+"gathering \n"
+"these profiles, a series of calculations are run on each to summarize its"
+" \n"
+"performance - its latency, capacity to handle lots of activity, whether "
+"they \n"
+"are currently overloaded, and how well integrated into the network they "
+"seem \n"
+"to be. These calculations are then compared for active peers to organize "
+"the \n"
+"routers into four tiers - fast and high capacity, high capacity, not "
+"failing, \n"
+"and failing. The thresholds for those tiers are determined dynamically, "
+"and \n"
"while they currently use fairly simple algorithms, alternatives exist."
msgstr ""
#: i2p2www/pages/site/docs/how/tech-intro.html:288
msgid ""
-"Using this profile data, the simplest reasonable peer selection strategy \n"
-"is to pick peers randomly from the top tier (fast and high capacity), and \n"
-"this is currently deployed for client tunnels. Exploratory tunnels (used for \n"
-"netDb and tunnel management) pick peers randomly from the \"not failing\" tier \n"
-"(which includes routers in 'better' tiers as well), allowing the peer to sample \n"
-"routers more widely, in effect optimizing the peer selection through randomized \n"
-"hill climbing. These strategies alone do however leak information regarding \n"
-"the peers in the router's top tier through predecessor and netDb harvesting \n"
-"attacks. In turn, several alternatives exist which, while not balancing the \n"
-"load as evenly, will address the attacks mounted by particular classes of \n"
+"Using this profile data, the simplest reasonable peer selection strategy"
+" \n"
+"is to pick peers randomly from the top tier (fast and high capacity), and"
+" \n"
+"this is currently deployed for client tunnels. Exploratory tunnels (used "
+"for \n"
+"netDb and tunnel management) pick peers randomly from the \"not failing\""
+" tier \n"
+"(which includes routers in 'better' tiers as well), allowing the peer to "
+"sample \n"
+"routers more widely, in effect optimizing the peer selection through "
+"randomized \n"
+"hill climbing. These strategies alone do however leak information "
+"regarding \n"
+"the peers in the router's top tier through predecessor and netDb "
+"harvesting \n"
+"attacks. In turn, several alternatives exist which, while not balancing "
+"the \n"
+"load as evenly, will address the attacks mounted by particular classes of"
+" \n"
"adversaries."
msgstr ""
#: i2p2www/pages/site/docs/how/tech-intro.html:302
msgid ""
-"By picking a random key and ordering the peers according to their XOR distance \n"
-"from it, the information leaked is reduced in predecessor and harvesting attacks \n"
-"according to the peers' failure rate and the tier's churn. Another simple \n"
-"strategy for dealing with netDb harvesting attacks is to simply fix the inbound \n"
-"tunnel gateway(s) yet randomize the peers further on in the tunnels. To deal \n"
-"with predecessor attacks for adversaries which the client contacts, the outbound \n"
-"tunnel endpoints would also remain fixed. The selection of which peer to fix \n"
-"on the most exposed point would of course need to have a limit to the duration, \n"
-"as all peers fail eventually, so it could either be reactively adjusted or \n"
-"proactively avoided to mimic a measured mean time between failures of other \n"
-"routers. These two strategies can in turn be combined, using a fixed exposed \n"
-"peer and an XOR based ordering within the tunnels themselves. A more rigid \n"
-"strategy would fix the exact peers and ordering of a potential tunnel, only \n"
-"using individual peers if all of them agree to participate in the same way \n"
-"each time. This varies from the XOR based ordering in that the predecessor \n"
-"and successor of each peer is always the same, while the XOR only makes sure \n"
+"By picking a random key and ordering the peers according to their XOR "
+"distance \n"
+"from it, the information leaked is reduced in predecessor and harvesting "
+"attacks \n"
+"according to the peers' failure rate and the tier's churn. Another simple"
+" \n"
+"strategy for dealing with netDb harvesting attacks is to simply fix the "
+"inbound \n"
+"tunnel gateway(s) yet randomize the peers further on in the tunnels. To "
+"deal \n"
+"with predecessor attacks for adversaries which the client contacts, the "
+"outbound \n"
+"tunnel endpoints would also remain fixed. The selection of which peer to "
+"fix \n"
+"on the most exposed point would of course need to have a limit to the "
+"duration, \n"
+"as all peers fail eventually, so it could either be reactively adjusted "
+"or \n"
+"proactively avoided to mimic a measured mean time between failures of "
+"other \n"
+"routers. These two strategies can in turn be combined, using a fixed "
+"exposed \n"
+"peer and an XOR based ordering within the tunnels themselves. A more "
+"rigid \n"
+"strategy would fix the exact peers and ordering of a potential tunnel, "
+"only \n"
+"using individual peers if all of them agree to participate in the same "
+"way \n"
+"each time. This varies from the XOR based ordering in that the "
+"predecessor \n"
+"and successor of each peer is always the same, while the XOR only makes "
+"sure \n"
"their order doesn't change."
msgstr ""
@@ -8488,8 +9866,10 @@ msgstr ""
msgid ""
"As mentioned before, I2P currently (release 0.8) includes the tiered \n"
"random strategy above, with XOR-based ordering. A \n"
-"more detailed discussion of the mechanics involved in tunnel operation, management, \n"
-"and peer selection can be found in the tunnel spec."
+"more detailed discussion of the mechanics involved in tunnel operation, "
+"management, \n"
+"and peer selection can be found in the tunnel "
+"spec."
msgstr ""
#: i2p2www/pages/site/docs/how/tech-intro.html:330
@@ -8503,20 +9883,27 @@ msgstr ""
#: i2p2www/pages/site/docs/how/tech-intro.html:336
msgid ""
"A percentage of I2P users are appointed as 'floodfill peers'.\n"
-"Currently, I2P installations that have a lot of bandwidth and are fast enough,\n"
-"will appoint themselves as floodfill as soon as the number of existing floodfill routers\n"
+"Currently, I2P installations that have a lot of bandwidth and are fast "
+"enough,\n"
+"will appoint themselves as floodfill as soon as the number of existing "
+"floodfill routers\n"
"drops too low."
msgstr ""
#: i2p2www/pages/site/docs/how/tech-intro.html:343
#, python-format
msgid ""
-"Other I2P routers will store their data and lookup data by sending simple 'store' and 'lookup' queries to the floodfills.\n"
-"If a floodfill router receives a 'store' query, it will spread the information to other floodfill routers\n"
-"using the Kademlia algorithm.\n"
-"The 'lookup' queries currently function differently, to avoid an important\n"
+"Other I2P routers will store their data and lookup data by sending simple"
+" 'store' and 'lookup' queries to the floodfills.\n"
+"If a floodfill router receives a 'store' query, it will spread the "
+"information to other floodfill routers\n"
+"using the Kademlia "
+"algorithm.\n"
+"The 'lookup' queries currently function differently, to avoid an "
+"important\n"
"security issue.\n"
-"When a lookup is done, the floodfill router will not forward the lookup to other peers,\n"
+"When a lookup is done, the floodfill router will not forward the lookup "
+"to other peers,\n"
"but will always answer by itself (if it has the requested data)."
msgstr ""
@@ -8526,8 +9913,8 @@ msgstr ""
#: i2p2www/pages/site/docs/how/tech-intro.html:357
msgid ""
-"A RouterInfo stores information on a specific I2P router and how to "
-"contact it"
+"A RouterInfo stores information on a specific I2P router and how "
+"to contact it"
msgstr ""
#: i2p2www/pages/site/docs/how/tech-intro.html:358
@@ -8538,10 +9925,14 @@ msgstr ""
#: i2p2www/pages/site/docs/how/tech-intro.html:360
msgid ""
-"All of this information is signed by the publishing party and verified by any I2P router using or storing the information.\n"
-"In addition, the data contains timing information, to avoid storage of old entries and possible attacks.\n"
-"This is also why I2P bundles the necessary code for maintaining the correct time, occasionally querying some SNTP servers \n"
-"(the pool.ntp.org round robin by default)\n"
+"All of this information is signed by the publishing party and verified by"
+" any I2P router using or storing the information.\n"
+"In addition, the data contains timing information, to avoid storage of "
+"old entries and possible attacks.\n"
+"This is also why I2P bundles the necessary code for maintaining the "
+"correct time, occasionally querying some SNTP servers \n"
+"(the pool.ntp.org round robin by"
+" default)\n"
"and detecting skew between routers at the transport layer."
msgstr ""
@@ -8556,8 +9947,10 @@ msgstr ""
#: i2p2www/pages/site/docs/how/tech-intro.html:374
msgid ""
"One could only want specific people to be able to reach a destination.\n"
-"This is possible by not publishing the destination in the netDb. You will however have to transmit the destination by other means.\n"
-"An alternative are the 'encrypted leaseSets'. These leaseSets can only be decoded by people with access to the decryption key."
+"This is possible by not publishing the destination in the netDb. You will"
+" however have to transmit the destination by other means.\n"
+"An alternative are the 'encrypted leaseSets'. These leaseSets can only be"
+" decoded by people with access to the decryption key."
msgstr ""
#: i2p2www/pages/site/docs/how/tech-intro.html:381
@@ -8566,10 +9959,13 @@ msgstr ""
#: i2p2www/pages/site/docs/how/tech-intro.html:382
msgid ""
-"Bootstrapping the netDb is quite simple. Once a router manages to receive a single routerInfo of a reachable peer,\n"
+"Bootstrapping the netDb is quite simple. Once a router manages to receive"
+" a single routerInfo of a reachable peer,\n"
"it can query that router for references to other routers in the network.\n"
-"Currently, a number of users post their routerInfo files to a website to make this information available.\n"
-"I2P automatically connects to one of these websites to gather routerInfo files and bootstrap."
+"Currently, a number of users post their routerInfo files to a website to "
+"make this information available.\n"
+"I2P automatically connects to one of these websites to gather routerInfo "
+"files and bootstrap."
msgstr ""
#: i2p2www/pages/site/docs/how/tech-intro.html:390
@@ -8579,18 +9975,26 @@ msgstr ""
#: i2p2www/pages/site/docs/how/tech-intro.html:391
msgid ""
"Lookups in the I2P network are not forwarded to other netDb routers.\n"
-"Currently, this is not a major problem, since the network is not very large.\n"
-"However, as the network grows, not all routerInfo and leaseSet files will be present\n"
-"on each netDb router. This will cause a deterioration of the percentage of successful lookups.\n"
-"Because of this, refinements to the netDb will be done in the next releases."
+"Currently, this is not a major problem, since the network is not very "
+"large.\n"
+"However, as the network grows, not all routerInfo and leaseSet files will"
+" be present\n"
+"on each netDb router. This will cause a deterioration of the percentage "
+"of successful lookups.\n"
+"Because of this, refinements to the netDb will be done in the next "
+"releases."
msgstr ""
#: i2p2www/pages/site/docs/how/tech-intro.html:402
msgid ""
-"Communication between routers needs to provide confidentiality and integrity \n"
-"against external adversaries while authenticating that the router contacted \n"
-"is the one who should receive a given message. The particulars of how routers \n"
-"communicate with other routers aren't critical - three separate protocols \n"
+"Communication between routers needs to provide confidentiality and "
+"integrity \n"
+"against external adversaries while authenticating that the router "
+"contacted \n"
+"is the one who should receive a given message. The particulars of how "
+"routers \n"
+"communicate with other routers aren't critical - three separate protocols"
+" \n"
"have been used at different points to provide those bare necessities."
msgstr ""
@@ -8598,9 +10002,12 @@ msgstr ""
#, python-format
msgid ""
"I2P started with a TCP-based protocol which \n"
-"has since been disabled. Then, to accommodate the need for high degree communication \n"
-"(as a number of routers will end up speaking with many others), I2P moved \n"
-"from a TCP based transport to a UDP-based one - \"Secure \n"
+"has since been disabled. Then, to accommodate the need for high degree "
+"communication \n"
+"(as a number of routers will end up speaking with many others), I2P moved"
+" \n"
+"from a TCP based transport to a UDP-based one - "
+"\"Secure \n"
"Semireliable UDP\", or \"SSU\"."
msgstr ""
@@ -8612,32 +10019,46 @@ msgstr ""
#: i2p2www/pages/site/docs/how/tech-intro.html:422
msgid ""
"The goal of this protocol is to provide secure, authenticated, \n"
-"semireliable and unordered message delivery, exposing only a minimal amount \n"
-"of data easily discernible to third parties. It should support high degree \n"
-"communication as well as TCP-friendly congestion control and may include \n"
-"PMTU detection. It should be capable of efficiently moving bulk data at rates \n"
-"sufficient for home users. In addition, it should support techniques for addressing \n"
+"semireliable and unordered message delivery, exposing only a minimal "
+"amount \n"
+"of data easily discernible to third parties. It should support high "
+"degree \n"
+"communication as well as TCP-friendly congestion control and may include"
+" \n"
+"PMTU detection. It should be capable of efficiently moving bulk data at "
+"rates \n"
+"sufficient for home users. In addition, it should support techniques for "
+"addressing \n"
"network obstacles, like most NATs or firewalls."
msgstr ""
#: i2p2www/pages/site/docs/how/tech-intro.html:432
#, python-format
msgid ""
-"Following the introduction of SSU, after issues with congestion collapse \n"
-"appeared, a new NIO-based TCP transport called NTCP \n"
-"was implemented. It is enabled by default for outbound connections only. Those \n"
-"who configure their NAT/firewall to allow inbound connections and specify \n"
-"the external host and port (dyndns/etc is ok) on /config.jsp can receive inbound \n"
-"connections. As NTCP is NIO based, so it doesn't suffer from the 1 thread \n"
+"Following the introduction of SSU, after issues with congestion collapse"
+" \n"
+"appeared, a new NIO-based TCP transport called NTCP \n"
+"was implemented. It is enabled by default for outbound connections only. "
+"Those \n"
+"who configure their NAT/firewall to allow inbound connections and specify"
+" \n"
+"the external host and port (dyndns/etc is ok) on /config.jsp can receive "
+"inbound \n"
+"connections. As NTCP is NIO based, so it doesn't suffer from the 1 thread"
+" \n"
"per connection issues of the old TCP transport."
msgstr ""
#: i2p2www/pages/site/docs/how/tech-intro.html:442
msgid ""
"I2P supports multiple transports simultaneously. A particular transport \n"
-"for an outbound connection is selected with \"bids\". Each transport bids for \n"
-"the connection and the relative value of these bids assigns the priority. \n"
-"Transports may reply with different bids, depending on whether there is already \n"
+"for an outbound connection is selected with \"bids\". Each transport bids"
+" for \n"
+"the connection and the relative value of these bids assigns the priority."
+" \n"
+"Transports may reply with different bids, depending on whether there is "
+"already \n"
"an established connection to the peer."
msgstr ""
@@ -8645,25 +10066,38 @@ msgstr ""
#, python-format
msgid ""
"The current implementation ranks NTCP as the highest-priority transport \n"
-"for outbound connections in most situations. SSU is enabled for both outbound \n"
-"and inbound connections. Your firewall and your I2P router must be configured \n"
-"to allow inbound NTCP connections. For further information see the NTCP \n"
+"for outbound connections in most situations. SSU is enabled for both "
+"outbound \n"
+"and inbound connections. Your firewall and your I2P router must be "
+"configured \n"
+"to allow inbound NTCP connections. For further information see the NTCP \n"
"page."
msgstr ""
#: i2p2www/pages/site/docs/how/tech-intro.html:459
msgid ""
"A bare minimum set of cryptographic primitives are combined together to \n"
-"provide I2P's layered defenses against a variety of adversaries. At the lowest \n"
-"level, inter router communication is protected by the transport layer security \n"
-"- SSU encrypts each packet with AES256/CBC with both an explicit IV and MAC \n"
-"(HMAC-MD5-128) after agreeing upon an ephemeral session key through a 2048bit \n"
-"Diffie-Hellman exchange, station-to-station authentication with the other \n"
-"router's DSA key, plus each network message has their own hash for local integrity \n"
-"checking. Tunnel messages passed over the transports \n"
-"have their own layered AES256/CBC encryption with an explicit IV and verified \n"
-"at the tunnel endpoint with an additional SHA256 hash. Various other messages \n"
-"are passed along inside \"garlic messages\", which are encrypted with ElGamal/AES+SessionTags \n"
+"provide I2P's layered defenses against a variety of adversaries. At the "
+"lowest \n"
+"level, inter router communication is protected by the transport layer "
+"security \n"
+"- SSU encrypts each packet with AES256/CBC with both an explicit IV and "
+"MAC \n"
+"(HMAC-MD5-128) after agreeing upon an ephemeral session key through a "
+"2048bit \n"
+"Diffie-Hellman exchange, station-to-station authentication with the other"
+" \n"
+"router's DSA key, plus each network message has their own hash for local "
+"integrity \n"
+"checking. Tunnel messages passed over the "
+"transports \n"
+"have their own layered AES256/CBC encryption with an explicit IV and "
+"verified \n"
+"at the tunnel endpoint with an additional SHA256 hash. Various other "
+"messages \n"
+"are passed along inside \"garlic messages\", which are encrypted with "
+"ElGamal/AES+SessionTags \n"
"(explained below)."
msgstr ""
@@ -8673,31 +10107,51 @@ msgstr ""
#: i2p2www/pages/site/docs/how/tech-intro.html:475
msgid ""
-"Garlic messages are an extension of \"onion\" layered encryption, allowing \n"
-"the contents of a single message to contain multiple \"cloves\" - fully formed \n"
-"messages alongside their own instructions for delivery. Messages are wrapped \n"
-"into a garlic message whenever the message would otherwise be passing in cleartext \n"
-"through a peer who should not have access to the information - for instance, \n"
-"when a router wants to ask another router to participate in a tunnel, they \n"
-"wrap the request inside a garlic, encrypt that garlic to the receiving router's \n"
-"2048bit ElGamal public key, and forward it through a tunnel. Another example \n"
-"is when a client wants to send a message to a destination - the sender's router \n"
-"will wrap up that data message (alongside some other messages) into a garlic, \n"
-"encrypt that garlic to the 2048bit ElGamal public key published in the recipient's \n"
+"Garlic messages are an extension of \"onion\" layered encryption, "
+"allowing \n"
+"the contents of a single message to contain multiple \"cloves\" - fully "
+"formed \n"
+"messages alongside their own instructions for delivery. Messages are "
+"wrapped \n"
+"into a garlic message whenever the message would otherwise be passing in "
+"cleartext \n"
+"through a peer who should not have access to the information - for "
+"instance, \n"
+"when a router wants to ask another router to participate in a tunnel, "
+"they \n"
+"wrap the request inside a garlic, encrypt that garlic to the receiving "
+"router's \n"
+"2048bit ElGamal public key, and forward it through a tunnel. Another "
+"example \n"
+"is when a client wants to send a message to a destination - the sender's "
+"router \n"
+"will wrap up that data message (alongside some other messages) into a "
+"garlic, \n"
+"encrypt that garlic to the 2048bit ElGamal public key published in the "
+"recipient's \n"
"leaseSet, and forward it through the appropriate tunnels."
msgstr ""
#: i2p2www/pages/site/docs/how/tech-intro.html:490
msgid ""
-"The \"instructions\" attached to each clove inside the encryption layer includes \n"
-"the ability to request that the clove be forwarded locally, to a remote router, \n"
-"or to a remote tunnel on a remote router. There are fields in those instructions \n"
-"allowing a peer to request that the delivery be delayed until a certain time \n"
-"or condition has been met, though they won't be honored until the nontrivial \n"
-"delays are deployed. It is possible to explicitly route garlic messages \n"
-"any number of hops without building tunnels, or even to reroute tunnel messages \n"
-"by wrapping them in garlic messages and forwarding them a number of hops prior \n"
-"to delivering them to the next hop in the tunnel, but those techniques are \n"
+"The \"instructions\" attached to each clove inside the encryption layer "
+"includes \n"
+"the ability to request that the clove be forwarded locally, to a remote "
+"router, \n"
+"or to a remote tunnel on a remote router. There are fields in those "
+"instructions \n"
+"allowing a peer to request that the delivery be delayed until a certain "
+"time \n"
+"or condition has been met, though they won't be honored until the nontrivial \n"
+"delays are deployed. It is possible to explicitly route garlic "
+"messages \n"
+"any number of hops without building tunnels, or even to reroute tunnel "
+"messages \n"
+"by wrapping them in garlic messages and forwarding them a number of hops "
+"prior \n"
+"to delivering them to the next hop in the tunnel, but those techniques "
+"are \n"
"not currently used in the existing implementation."
msgstr ""
@@ -8707,35 +10161,54 @@ msgstr ""
#: i2p2www/pages/site/docs/how/tech-intro.html:504
msgid ""
-"As an unreliable, unordered, message based system, I2P uses a simple combination \n"
-"of asymmetric and symmetric encryption algorithms to provide data confidentiality \n"
-"and integrity to garlic messages. As a whole, the combination is referred \n"
-"to as ElGamal/AES+SessionTags, but that is an excessively verbose way to describe \n"
+"As an unreliable, unordered, message based system, I2P uses a simple "
+"combination \n"
+"of asymmetric and symmetric encryption algorithms to provide data "
+"confidentiality \n"
+"and integrity to garlic messages. As a whole, the combination is referred"
+" \n"
+"to as ElGamal/AES+SessionTags, but that is an excessively verbose way to "
+"describe \n"
"the simple use of 2048bit ElGamal, AES256, SHA256 and 32 byte nonces."
msgstr ""
#: i2p2www/pages/site/docs/how/tech-intro.html:543
msgid ""
-"Session tags themselves have a very short lifetime, after which they are \n"
-"discarded if not used. In addition, the quantity stored for each key is limited, \n"
-"as are the number of keys themselves - if too many arrive, either new or old \n"
-"messages may be dropped. The sender keeps track whether messages using session \n"
-"tags are getting through, and if there isn't sufficient communication it may \n"
-"drop the ones previously assumed to be properly delivered, reverting back \n"
+"Session tags themselves have a very short lifetime, after which they are"
+" \n"
+"discarded if not used. In addition, the quantity stored for each key is "
+"limited, \n"
+"as are the number of keys themselves - if too many arrive, either new or "
+"old \n"
+"messages may be dropped. The sender keeps track whether messages using "
+"session \n"
+"tags are getting through, and if there isn't sufficient communication it "
+"may \n"
+"drop the ones previously assumed to be properly delivered, reverting back"
+" \n"
"to the full expensive ElGamal encryption."
msgstr ""
#: i2p2www/pages/site/docs/how/tech-intro.html:553
msgid ""
-"One alternative is to transmit only a single session tag, and from that, \n"
-"seed a deterministic PRNG for determining what tags to use or expect. By keeping \n"
-"this PRNG roughly synchronized between the sender and recipient (the recipient \n"
-"precomputes a window of the next e.g. 50 tags), the overhead of periodically \n"
-"bundling a large number of tags is removed, allowing more options in the space/time \n"
-"tradeoff, and perhaps reducing the number of ElGamal encryptions necessary. \n"
-"However, it would depend upon the strength of the PRNG to provide the necessary \n"
-"cover against internal adversaries, though perhaps by limiting the amount \n"
-"of times each PRNG is used, any weaknesses can be minimized. At the moment, \n"
+"One alternative is to transmit only a single session tag, and from that,"
+" \n"
+"seed a deterministic PRNG for determining what tags to use or expect. By "
+"keeping \n"
+"this PRNG roughly synchronized between the sender and recipient (the "
+"recipient \n"
+"precomputes a window of the next e.g. 50 tags), the overhead of "
+"periodically \n"
+"bundling a large number of tags is removed, allowing more options in the "
+"space/time \n"
+"tradeoff, and perhaps reducing the number of ElGamal encryptions "
+"necessary. \n"
+"However, it would depend upon the strength of the PRNG to provide the "
+"necessary \n"
+"cover against internal adversaries, though perhaps by limiting the amount"
+" \n"
+"of times each PRNG is used, any weaknesses can be minimized. At the "
+"moment, \n"
"there are no immediate plans to move towards these synchronized PRNGs."
msgstr ""
@@ -8745,9 +10218,12 @@ msgstr "Zukunft"
#: i2p2www/pages/site/docs/how/tech-intro.html:567
msgid ""
-"While I2P is currently functional and sufficient for many scenarios, there \n"
-"are several areas which require further improvement to meet the needs of those \n"
-"facing more powerful adversaries as well as substantial user experience optimization."
+"While I2P is currently functional and sufficient for many scenarios, "
+"there \n"
+"are several areas which require further improvement to meet the needs of "
+"those \n"
+"facing more powerful adversaries as well as substantial user experience "
+"optimization."
msgstr ""
#: i2p2www/pages/site/docs/how/tech-intro.html:573
@@ -8756,64 +10232,106 @@ msgstr ""
#: i2p2www/pages/site/docs/how/tech-intro.html:574
msgid ""
-"I2P is an overlay network designed to be run on top of a functional packet \n"
-"switched network, exploiting the end to end principle to offer anonymity and \n"
-"security. While the Internet no longer fully embraces the end to end principle\n"
+"I2P is an overlay network designed to be run on top of a functional "
+"packet \n"
+"switched network, exploiting the end to end principle to offer anonymity "
+"and \n"
+"security. While the Internet no longer fully embraces the end to end "
+"principle\n"
"(due to the usage of NAT), \n"
-"I2P does require a substantial portion of the network to be reachable - there \n"
-"may be a number of peers along the edges running using restricted routes, \n"
-"but I2P does not include an appropriate routing algorithm for the degenerate \n"
-"case where most peers are unreachable. It would, however work on top of a \n"
+"I2P does require a substantial portion of the network to be reachable - "
+"there \n"
+"may be a number of peers along the edges running using restricted routes,"
+" \n"
+"but I2P does not include an appropriate routing algorithm for the "
+"degenerate \n"
+"case where most peers are unreachable. It would, however work on top of a"
+" \n"
"network employing such an algorithm."
msgstr ""
#: i2p2www/pages/site/docs/how/tech-intro.html:586
msgid ""
-"Restricted route operation, where there are limits to what peers are reachable \n"
-"directly, has several different functional and anonymity implications, dependent \n"
-"upon how the restricted routes are handled. At the most basic level, restricted \n"
-"routes exist when a peer is behind a NAT or firewall which does not allow \n"
-"inbound connections. This was largely addressed in I2P 0.6.0.6 by integrating \n"
-"distributed hole punching into the transport layer, allowing people behind \n"
-"most NATs and firewalls to receive unsolicited connections without any configuration. \n"
-"However, this does not limit the exposure of the peer's IP address to routers \n"
-"inside the network, as they can simply get introduced to the peer through \n"
+"Restricted route operation, where there are limits to what peers are "
+"reachable \n"
+"directly, has several different functional and anonymity implications, "
+"dependent \n"
+"upon how the restricted routes are handled. At the most basic level, "
+"restricted \n"
+"routes exist when a peer is behind a NAT or firewall which does not allow"
+" \n"
+"inbound connections. This was largely addressed in I2P 0.6.0.6 by "
+"integrating \n"
+"distributed hole punching into the transport layer, allowing people "
+"behind \n"
+"most NATs and firewalls to receive unsolicited connections without any "
+"configuration. \n"
+"However, this does not limit the exposure of the peer's IP address to "
+"routers \n"
+"inside the network, as they can simply get introduced to the peer through"
+" \n"
"the published introducer."
msgstr ""
#: i2p2www/pages/site/docs/how/tech-intro.html:599
msgid ""
-"Beyond the functional handling of restricted routes, there are two levels \n"
-"of restricted operation that can be used to limit the exposure of one's IP \n"
-"address - using router-specific tunnels for communication, and offering 'client \n"
-"routers'. For the former, routers can either build a new pool of tunnels or \n"
-"reuse their exploratory pool, publishing the inbound gateways to some of them \n"
-"as part of their routerInfo in place of their transport addresses. When a \n"
-"peer wants to get in touch with them, they see those tunnel gateways in the \n"
-"netDb and simply send the relevant message to them through one of the published \n"
-"tunnels. If the peer behind the restricted route wants to reply, it may do \n"
-"so either directly (if they are willing to expose their IP to the peer) or \n"
-"indirectly through their outbound tunnels. When the routers that the peer \n"
-"has direct connections to want to reach it (to forward tunnel messages, for \n"
-"instance), they simply prioritize their direct connection over the published \n"
-"tunnel gateway. The concept of 'client routers' simply extends the restricted \n"
-"route by not publishing any router addresses. Such a router would not even \n"
-"need to publish their routerInfo in the netDb, merely providing their self \n"
-"signed routerInfo to the peers that it contacts (necessary to pass the router's \n"
-"public keys). Both levels of restricted route operation are planned for I2P \n"
+"Beyond the functional handling of restricted routes, there are two levels"
+" \n"
+"of restricted operation that can be used to limit the exposure of one's "
+"IP \n"
+"address - using router-specific tunnels for communication, and offering "
+"'client \n"
+"routers'. For the former, routers can either build a new pool of tunnels "
+"or \n"
+"reuse their exploratory pool, publishing the inbound gateways to some of "
+"them \n"
+"as part of their routerInfo in place of their transport addresses. When a"
+" \n"
+"peer wants to get in touch with them, they see those tunnel gateways in "
+"the \n"
+"netDb and simply send the relevant message to them through one of the "
+"published \n"
+"tunnels. If the peer behind the restricted route wants to reply, it may "
+"do \n"
+"so either directly (if they are willing to expose their IP to the peer) "
+"or \n"
+"indirectly through their outbound tunnels. When the routers that the peer"
+" \n"
+"has direct connections to want to reach it (to forward tunnel messages, "
+"for \n"
+"instance), they simply prioritize their direct connection over the "
+"published \n"
+"tunnel gateway. The concept of 'client routers' simply extends the "
+"restricted \n"
+"route by not publishing any router addresses. Such a router would not "
+"even \n"
+"need to publish their routerInfo in the netDb, merely providing their "
+"self \n"
+"signed routerInfo to the peers that it contacts (necessary to pass the "
+"router's \n"
+"public keys). Both levels of restricted route operation are planned for "
+"I2P \n"
"2.0."
msgstr ""
#: i2p2www/pages/site/docs/how/tech-intro.html:621
msgid ""
-"There are tradeoffs for those behind restricted routes, as they would likely \n"
-"participate in other people's tunnels less frequently, and the routers which \n"
-"they are connected to would be able to infer traffic patterns that would not \n"
-"otherwise be exposed. On the other hand, if the cost of that exposure is less \n"
-"than the cost of an IP being made available, it may be worthwhile. This, of \n"
-"course, assumes that the peers that the router behind a restricted route contacts \n"
-"are not hostile - either the network is large enough that the probability \n"
-"of using a hostile peer to get connected is small enough, or trusted (and \n"
+"There are tradeoffs for those behind restricted routes, as they would "
+"likely \n"
+"participate in other people's tunnels less frequently, and the routers "
+"which \n"
+"they are connected to would be able to infer traffic patterns that would "
+"not \n"
+"otherwise be exposed. On the other hand, if the cost of that exposure is "
+"less \n"
+"than the cost of an IP being made available, it may be worthwhile. This, "
+"of \n"
+"course, assumes that the peers that the router behind a restricted route "
+"contacts \n"
+"are not hostile - either the network is large enough that the probability"
+" \n"
+"of using a hostile peer to get connected is small enough, or trusted (and"
+" \n"
"perhaps temporary) peers are used instead."
msgstr ""
@@ -8823,28 +10341,45 @@ msgstr "Variable Latenz"
#: i2p2www/pages/site/docs/how/tech-intro.html:634
msgid ""
-"Even though the bulk of I2P's initial efforts have been on low latency communication, \n"
-"it was designed with variable latency services in mind from the beginning. \n"
-"At the most basic level, applications running on top of I2P can offer the \n"
-"anonymity of medium and high latency communication while still blending their \n"
-"traffic patterns in with low latency traffic. Internally though, I2P can offer \n"
-"its own medium and high latency communication through the garlic encryption \n"
-"- specifying that the message should be sent after a certain delay, at a certain \n"
-"time, after a certain number of messages have passed, or another mix strategy. \n"
-"With the layered encryption, only the router that the clove exposed the delay \n"
-"request would know that the message requires high latency, allowing the traffic \n"
-"to blend in further with the low latency traffic. Once the transmission precondition \n"
-"is met, the router holding on to the clove (which itself would likely be a \n"
-"garlic message) simply forwards it as requested - to a router, to a tunnel, \n"
+"Even though the bulk of I2P's initial efforts have been on low latency "
+"communication, \n"
+"it was designed with variable latency services in mind from the "
+"beginning. \n"
+"At the most basic level, applications running on top of I2P can offer the"
+" \n"
+"anonymity of medium and high latency communication while still blending "
+"their \n"
+"traffic patterns in with low latency traffic. Internally though, I2P can "
+"offer \n"
+"its own medium and high latency communication through the garlic "
+"encryption \n"
+"- specifying that the message should be sent after a certain delay, at a "
+"certain \n"
+"time, after a certain number of messages have passed, or another mix "
+"strategy. \n"
+"With the layered encryption, only the router that the clove exposed the "
+"delay \n"
+"request would know that the message requires high latency, allowing the "
+"traffic \n"
+"to blend in further with the low latency traffic. Once the transmission "
+"precondition \n"
+"is met, the router holding on to the clove (which itself would likely be "
+"a \n"
+"garlic message) simply forwards it as requested - to a router, to a "
+"tunnel, \n"
"or, most likely, to a remote client destination."
msgstr ""
#: i2p2www/pages/site/docs/how/tech-intro.html:651
msgid ""
-"There are a substantial number of ways to exploit this capacity for high \n"
-"latency comm in I2P, but for the moment, doing so has been scheduled for the \n"
-"I2P 3.0 release. In the meantime, those requiring the anonymity that high \n"
-"latency comm can offer should look towards the application layer to provide \n"
+"There are a substantial number of ways to exploit this capacity for high"
+" \n"
+"latency comm in I2P, but for the moment, doing so has been scheduled for "
+"the \n"
+"I2P 3.0 release. In the meantime, those requiring the anonymity that high"
+" \n"
+"latency comm can offer should look towards the application layer to "
+"provide \n"
"it."
msgstr ""
@@ -8878,12 +10413,18 @@ msgstr "Ähnliche Systeme"
#: i2p2www/pages/site/docs/how/tech-intro.html:669
msgid ""
-"I2P's architecture builds on the concepts of message oriented middleware, \n"
-"the topology of DHTs, the anonymity and cryptography of free route mixnets, \n"
-"and the adaptability of packet switched networking. The value comes not from \n"
-"novel concepts of algorithms though, but from careful engineering combining \n"
-"the research results of existing systems and papers. While there are a few \n"
-"similar efforts worth reviewing, both for technical and functional comparisons, \n"
+"I2P's architecture builds on the concepts of message oriented middleware,"
+" \n"
+"the topology of DHTs, the anonymity and cryptography of free route "
+"mixnets, \n"
+"and the adaptability of packet switched networking. The value comes not "
+"from \n"
+"novel concepts of algorithms though, but from careful engineering "
+"combining \n"
+"the research results of existing systems and papers. While there are a "
+"few \n"
+"similar efforts worth reviewing, both for technical and functional "
+"comparisons, \n"
"two in particular are pulled out here - Tor and Freenet."
msgstr ""
@@ -8900,127 +10441,209 @@ msgstr "Webseite"
#: i2p2www/pages/site/docs/how/tech-intro.html:686
msgid ""
"At first glance, Tor and I2P have many functional and anonymity related \n"
-"similarities. While I2P's development began before we were aware of the early \n"
-"stage efforts on Tor, many of the lessons of the original onion routing and \n"
-"ZKS efforts were integrated into I2P's design. Rather than building an essentially \n"
-"trusted, centralized system with directory servers, I2P has a self organizing \n"
-"network database with each peer taking on the responsibility of profiling \n"
-"other routers to determine how best to exploit available resources. Another \n"
-"key difference is that while both I2P and Tor use layered and ordered paths \n"
-"(tunnels and circuits/streams), I2P is fundamentally a packet switched network, \n"
-"while Tor is fundamentally a circuit switched one, allowing I2P to transparently \n"
-"route around congestion or other network failures, operate redundant pathways, \n"
-"and load balance the data across available resources. While Tor offers the \n"
-"useful outproxy functionality by offering integrated outproxy discovery and \n"
-"selection, I2P leaves such application layer decisions up to applications \n"
-"running on top of I2P - in fact, I2P has even externalized the TCP-like streaming \n"
-"library itself to the application layer, allowing developers to experiment \n"
-"with different strategies, exploiting their domain specific knowledge to offer \n"
+"similarities. While I2P's development began before we were aware of the "
+"early \n"
+"stage efforts on Tor, many of the lessons of the original onion routing "
+"and \n"
+"ZKS efforts were integrated into I2P's design. Rather than building an "
+"essentially \n"
+"trusted, centralized system with directory servers, I2P has a self "
+"organizing \n"
+"network database with each peer taking on the responsibility of profiling"
+" \n"
+"other routers to determine how best to exploit available resources. "
+"Another \n"
+"key difference is that while both I2P and Tor use layered and ordered "
+"paths \n"
+"(tunnels and circuits/streams), I2P is fundamentally a packet switched "
+"network, \n"
+"while Tor is fundamentally a circuit switched one, allowing I2P to "
+"transparently \n"
+"route around congestion or other network failures, operate redundant "
+"pathways, \n"
+"and load balance the data across available resources. While Tor offers "
+"the \n"
+"useful outproxy functionality by offering integrated outproxy discovery "
+"and \n"
+"selection, I2P leaves such application layer decisions up to applications"
+" \n"
+"running on top of I2P - in fact, I2P has even externalized the TCP-like "
+"streaming \n"
+"library itself to the application layer, allowing developers to "
+"experiment \n"
+"with different strategies, exploiting their domain specific knowledge to "
+"offer \n"
"better performance."
msgstr ""
#: i2p2www/pages/site/docs/how/tech-intro.html:707
msgid ""
-"From an anonymity perspective, there is much similarity when the core networks \n"
-"are compared. However, there are a few key differences. When dealing with \n"
-"an internal adversary or most external adversaries, I2P's simplex tunnels \n"
-"expose half as much traffic data than would be exposed with Tor's duplex circuits \n"
-"by simply looking at the flows themselves - an HTTP request and response would \n"
-"follow the same path in Tor, while in I2P the packets making up the request \n"
-"would go out through one or more outbound tunnels and the packets making up \n"
-"the response would come back through one or more different inbound tunnels. \n"
-"While I2P's peer selection and ordering strategies should sufficiently address \n"
-"predecessor attacks, should a switch to bidirectional tunnels be necessary,\n"
-"we could simply build an inbound and outbound tunnel along the same routers."
+"From an anonymity perspective, there is much similarity when the core "
+"networks \n"
+"are compared. However, there are a few key differences. When dealing with"
+" \n"
+"an internal adversary or most external adversaries, I2P's simplex tunnels"
+" \n"
+"expose half as much traffic data than would be exposed with Tor's duplex "
+"circuits \n"
+"by simply looking at the flows themselves - an HTTP request and response "
+"would \n"
+"follow the same path in Tor, while in I2P the packets making up the "
+"request \n"
+"would go out through one or more outbound tunnels and the packets making "
+"up \n"
+"the response would come back through one or more different inbound "
+"tunnels. \n"
+"While I2P's peer selection and ordering strategies should sufficiently "
+"address \n"
+"predecessor attacks, should a switch to bidirectional tunnels be "
+"necessary,\n"
+"we could simply build an inbound and outbound tunnel along the same "
+"routers."
msgstr ""
#: i2p2www/pages/site/docs/how/tech-intro.html:721
msgid ""
-"Another anonymity issue comes up in Tor's use of telescopic tunnel creation, \n"
-"as simple packet counting and timing measurements as the cells in a circuit \n"
-"pass through an adversary's node exposes statistical information regarding \n"
-"where the adversary is within the circuit. I2P's unidirectional tunnel creation \n"
-"with a single message so that this data is not exposed. Protecting the position \n"
-"in a tunnel is important, as an adversary would otherwise be able to mount \n"
-"a series of powerful predecessor, intersection, and traffic confirmation attacks."
+"Another anonymity issue comes up in Tor's use of telescopic tunnel "
+"creation, \n"
+"as simple packet counting and timing measurements as the cells in a "
+"circuit \n"
+"pass through an adversary's node exposes statistical information "
+"regarding \n"
+"where the adversary is within the circuit. I2P's unidirectional tunnel "
+"creation \n"
+"with a single message so that this data is not exposed. Protecting the "
+"position \n"
+"in a tunnel is important, as an adversary would otherwise be able to "
+"mount \n"
+"a series of powerful predecessor, intersection, and traffic confirmation "
+"attacks."
msgstr ""
#: i2p2www/pages/site/docs/how/tech-intro.html:731
msgid ""
-"Tor's support for a second tier of \"onion proxies\" does offer a non-trivial \n"
-"degree of anonymity while requiring a low cost of entry, while I2P will not \n"
+"Tor's support for a second tier of \"onion proxies\" does offer a non-"
+"trivial \n"
+"degree of anonymity while requiring a low cost of entry, while I2P will "
+"not \n"
"offer this topology until 2.0."
msgstr ""
#: i2p2www/pages/site/docs/how/tech-intro.html:737
msgid ""
-"On the whole, Tor and I2P complement each other in their focus - Tor works \n"
-"towards offering high speed anonymous Internet outproxying, while I2P works \n"
-"towards offering a decentralized resilient network in itself. In theory, both \n"
-"can be used to achieve both purposes, but given limited development resources, \n"
-"they both have their strengths and weaknesses. The I2P developers have considered \n"
-"the steps necessary to modify Tor to take advantage of I2P's design, but concerns \n"
-"of Tor's viability under resource scarcity suggest that I2P's packet switching \n"
+"On the whole, Tor and I2P complement each other in their focus - Tor "
+"works \n"
+"towards offering high speed anonymous Internet outproxying, while I2P "
+"works \n"
+"towards offering a decentralized resilient network in itself. In theory, "
+"both \n"
+"can be used to achieve both purposes, but given limited development "
+"resources, \n"
+"they both have their strengths and weaknesses. The I2P developers have "
+"considered \n"
+"the steps necessary to modify Tor to take advantage of I2P's design, but "
+"concerns \n"
+"of Tor's viability under resource scarcity suggest that I2P's packet "
+"switching \n"
"architecture will be able to exploit scarce resources more effectively."
msgstr ""
#: i2p2www/pages/site/docs/how/tech-intro.html:751
msgid ""
-"Freenet played a large part in the initial stages of I2P's design - giving \n"
-"proof to the viability of a vibrant pseudonymous community completely contained \n"
-"within the network, demonstrating that the dangers inherent in outproxies \n"
-"could be avoided. The first seed of I2P began as a replacement communication \n"
-"layer for Freenet, attempting to factor out the complexities of a scalable, \n"
-"anonymous and secure point to point communication from the complexities of \n"
-"a censorship resistant distributed data store. Over time however, some of \n"
-"the anonymity and scalability issues inherent in Freenet's algorithms made \n"
-"it clear that I2P's focus should stay strictly on providing a generic anonymous \n"
-"communication layer, rather than as a component of Freenet. Over the years, \n"
-"the Freenet developers have come to see the weaknesses in the older design, \n"
-"prompting them to suggest that they will require a \"premix\" layer to offer \n"
-"substantial anonymity. In other words, Freenet needs to run on top of a mixnet \n"
-"such as I2P or Tor, with \"client nodes\" requesting and publishing data through \n"
-"the mixnet to the \"server nodes\" which then fetch and store the data according \n"
+"Freenet played a large part in the initial stages of I2P's design - "
+"giving \n"
+"proof to the viability of a vibrant pseudonymous community completely "
+"contained \n"
+"within the network, demonstrating that the dangers inherent in outproxies"
+" \n"
+"could be avoided. The first seed of I2P began as a replacement "
+"communication \n"
+"layer for Freenet, attempting to factor out the complexities of a "
+"scalable, \n"
+"anonymous and secure point to point communication from the complexities "
+"of \n"
+"a censorship resistant distributed data store. Over time however, some of"
+" \n"
+"the anonymity and scalability issues inherent in Freenet's algorithms "
+"made \n"
+"it clear that I2P's focus should stay strictly on providing a generic "
+"anonymous \n"
+"communication layer, rather than as a component of Freenet. Over the "
+"years, \n"
+"the Freenet developers have come to see the weaknesses in the older "
+"design, \n"
+"prompting them to suggest that they will require a \"premix\" layer to "
+"offer \n"
+"substantial anonymity. In other words, Freenet needs to run on top of a "
+"mixnet \n"
+"such as I2P or Tor, with \"client nodes\" requesting and publishing data "
+"through \n"
+"the mixnet to the \"server nodes\" which then fetch and store the data "
+"according \n"
"to Freenet's heuristic distributed data storage algorithms."
msgstr ""
#: i2p2www/pages/site/docs/how/tech-intro.html:770
msgid ""
-"Freenet's functionality is very complementary to I2P's, as Freenet natively \n"
-"provides many of the tools for operating medium and high latency systems, \n"
-"while I2P natively provides the low latency mix network suitable for offering \n"
-"adequate anonymity. The logic of separating the mixnet from the censorship-\n"
-"resistant distributed data store still seems self-evident from an engineering, \n"
-"anonymity, security, and resource allocation perspective, so hopefully the \n"
-"Freenet team will pursue efforts in that direction, if not simply reusing \n"
+"Freenet's functionality is very complementary to I2P's, as Freenet "
+"natively \n"
+"provides many of the tools for operating medium and high latency systems,"
+" \n"
+"while I2P natively provides the low latency mix network suitable for "
+"offering \n"
+"adequate anonymity. The logic of separating the mixnet from the "
+"censorship-\n"
+"resistant distributed data store still seems self-evident from an "
+"engineering, \n"
+"anonymity, security, and resource allocation perspective, so hopefully "
+"the \n"
+"Freenet team will pursue efforts in that direction, if not simply reusing"
+" \n"
"(or helping to improve, as necessary) existing mixnets like I2P or Tor."
msgstr ""
#: i2p2www/pages/site/docs/how/tech-intro.html:781
msgid ""
"It is worth mentioning that there has recently been discussion and work \n"
-"by the Freenet developers on a \"globally scalable darknet\" using restricted \n"
-"routes between peers of various trust. While insufficient information has \n"
-"been made publicly available regarding how such a system would operate for \n"
-"a full review, from what has been said the anonymity and scalability claims \n"
-"seem highly dubious. In particular, the appropriateness for use in hostile \n"
-"regimes against state level adversaries has been tremendously overstated, \n"
-"and any analysis on the implications of resource scarcity upon the scalability \n"
-"of the network has seemingly been avoided. Further questions regarding susceptibility \n"
-"to traffic analysis, trust and other topics do exist, but a more in-depth \n"
-"review of this \"globally scalable darknet\" will have to wait until the Freenet \n"
+"by the Freenet developers on a \"globally scalable darknet\" using "
+"restricted \n"
+"routes between peers of various trust. While insufficient information has"
+" \n"
+"been made publicly available regarding how such a system would operate "
+"for \n"
+"a full review, from what has been said the anonymity and scalability "
+"claims \n"
+"seem highly dubious. In particular, the appropriateness for use in "
+"hostile \n"
+"regimes against state level adversaries has been tremendously overstated,"
+" \n"
+"and any analysis on the implications of resource scarcity upon the "
+"scalability \n"
+"of the network has seemingly been avoided. Further questions regarding "
+"susceptibility \n"
+"to traffic analysis, trust and other topics do exist, but a more in-depth"
+" \n"
+"review of this \"globally scalable darknet\" will have to wait until the "
+"Freenet \n"
"team makes more information available."
msgstr ""
#: i2p2www/pages/site/docs/how/tech-intro.html:797
msgid ""
-"I2P itself doesn't really do much - it simply sends messages to remote destinations \n"
-"and receives messages targeting local destinations - most of the interesting \n"
-"work goes on at the layers above it. By itself, I2P could be seen as an anonymous \n"
-"and secure IP layer, and the bundled streaming library \n"
-"as an implementation of an anonymous and secure TCP layer on top of it. Beyond \n"
-"that, I2PTunnel exposes a generic TCP proxying \n"
-"system for either getting into or out of the I2P network, plus a variety of \n"
+"I2P itself doesn't really do much - it simply sends messages to remote "
+"destinations \n"
+"and receives messages targeting local destinations - most of the "
+"interesting \n"
+"work goes on at the layers above it. By itself, I2P could be seen as an "
+"anonymous \n"
+"and secure IP layer, and the bundled streaming"
+" library \n"
+"as an implementation of an anonymous and secure TCP layer on top of it. "
+"Beyond \n"
+"that, I2PTunnel exposes a generic TCP "
+"proxying \n"
+"system for either getting into or out of the I2P network, plus a variety "
+"of \n"
"network applications provide further functionality for end users."
msgstr ""
@@ -9030,34 +10653,51 @@ msgstr "Streaming-Bibliothek"
#: i2p2www/pages/site/docs/how/tech-intro.html:809
msgid ""
-"The I2P streaming library can be viewed as a generic streaming interface (mirroring TCP sockets),\n"
-"and the implementation supports a sliding window protocol\n"
-"with several optimizations, to take into account the high delay over I2P.\n"
+"The I2P streaming library can be viewed as a generic streaming interface "
+"(mirroring TCP sockets),\n"
+"and the implementation supports a sliding "
+"window protocol\n"
+"with several optimizations, to take into account the high delay over I2P."
+"\n"
"Individual streams may adjust the maximum packet size and \n"
-"other options, though the default of 4KB compressed seems a reasonable tradeoff \n"
-"between the bandwidth costs of retransmitting lost messages and the latency \n"
+"other options, though the default of 4KB compressed seems a reasonable "
+"tradeoff \n"
+"between the bandwidth costs of retransmitting lost messages and the "
+"latency \n"
"of multiple messages."
msgstr ""
#: i2p2www/pages/site/docs/how/tech-intro.html:819
msgid ""
"In addition, in consideration of the relatively high cost of subsequent \n"
-"messages, the streaming library's protocol for scheduling and delivering messages \n"
-"has been optimized to allow individual messages passed to contain as much \n"
-"information as is available. For instance, a small HTTP transaction proxied \n"
-"through the streaming library can be completed in a single round trip - the \n"
-"first message bundles a SYN, FIN and the small payload (an HTTP request typically \n"
-"fits) and the reply bundles the SYN, FIN, ACK and the small payload (many \n"
-"HTTP responses fit). While an additional ACK must be transmitted to tell the \n"
-"HTTP server that the SYN/FIN/ACK has been received, the local HTTP proxy can \n"
+"messages, the streaming library's protocol for scheduling and delivering "
+"messages \n"
+"has been optimized to allow individual messages passed to contain as much"
+" \n"
+"information as is available. For instance, a small HTTP transaction "
+"proxied \n"
+"through the streaming library can be completed in a single round trip - "
+"the \n"
+"first message bundles a SYN, FIN and the small payload (an HTTP request "
+"typically \n"
+"fits) and the reply bundles the SYN, FIN, ACK and the small payload (many"
+" \n"
+"HTTP responses fit). While an additional ACK must be transmitted to tell "
+"the \n"
+"HTTP server that the SYN/FIN/ACK has been received, the local HTTP proxy "
+"can \n"
"deliver the full response to the browser immediately."
msgstr ""
#: i2p2www/pages/site/docs/how/tech-intro.html:832
msgid ""
-"On the whole, however, the streaming library bears much resemblance to an \n"
-"abstraction of TCP, with its sliding windows, congestion control algorithms \n"
-"(both slow start and congestion avoidance), and general packet behavior (ACK, \n"
+"On the whole, however, the streaming library bears much resemblance to an"
+" \n"
+"abstraction of TCP, with its sliding windows, congestion control "
+"algorithms \n"
+"(both slow start and congestion avoidance), and general packet behavior "
+"(ACK, \n"
"SYN, FIN, RST, etc)."
msgstr ""
@@ -9087,142 +10727,227 @@ msgstr "Entwickelt von: %(dev)s"
#: i2p2www/pages/site/docs/how/tech-intro.html:846
msgid ""
-"Naming within I2P has been an oft-debated topic since the very beginning \n"
-"with advocates across the spectrum of possibilities. However, given I2P's \n"
-"inherent demand for secure communication and decentralized operation, the \n"
-"traditional DNS-style naming system is clearly out, as are \"majority rules\" \n"
-"voting systems. Instead, I2P ships with a generic naming library and a base \n"
-"implementation designed to work off a local name to destination mapping, as \n"
-"well as an optional add-on application called the \"addressbook\". The addressbook \n"
-"is a web-of-trust-driven secure, distributed, and human readable naming system, \n"
-"sacrificing only the call for all human readable names to be globally unique \n"
-"by mandating only local uniqueness. While all messages in I2P are cryptographically \n"
-"addressed by their destination, different people can have local addressbook \n"
-"entries for \"Alice\" which refer to different destinations. People can still \n"
-"discover new names by importing published addressbooks of peers specified \n"
-"in their web of trust, by adding in the entries provided through a third party, \n"
-"or (if some people organize a series of published addressbooks using a first \n"
-"come first serve registration system) people can choose to treat these addressbooks \n"
+"Naming within I2P has been an oft-debated topic since the very beginning"
+" \n"
+"with advocates across the spectrum of possibilities. However, given I2P's"
+" \n"
+"inherent demand for secure communication and decentralized operation, the"
+" \n"
+"traditional DNS-style naming system is clearly out, as are \"majority "
+"rules\" \n"
+"voting systems. Instead, I2P ships with a generic naming library and a "
+"base \n"
+"implementation designed to work off a local name to destination mapping, "
+"as \n"
+"well as an optional add-on application called the \"addressbook\". The "
+"addressbook \n"
+"is a web-of-trust-driven secure, distributed, and human readable naming "
+"system, \n"
+"sacrificing only the call for all human readable names to be globally "
+"unique \n"
+"by mandating only local uniqueness. While all messages in I2P are "
+"cryptographically \n"
+"addressed by their destination, different people can have local "
+"addressbook \n"
+"entries for \"Alice\" which refer to different destinations. People can "
+"still \n"
+"discover new names by importing published addressbooks of peers specified"
+" \n"
+"in their web of trust, by adding in the entries provided through a third "
+"party, \n"
+"or (if some people organize a series of published addressbooks using a "
+"first \n"
+"come first serve registration system) people can choose to treat these "
+"addressbooks \n"
"as name servers, emulating traditional DNS."
msgstr ""
#: i2p2www/pages/site/docs/how/tech-intro.html:866
msgid ""
"I2P does not promote the use of DNS-like services though, as the damage \n"
-"done by hijacking a site can be tremendous - and insecure destinations have \n"
-"no value. DNSsec itself still falls back on registrars and certificate authorities, \n"
-"while with I2P, requests sent to a destination cannot be intercepted or the \n"
-"reply spoofed, as they are encrypted to the destination's public keys, and \n"
-"a destination itself is just a pair of public keys and a certificate. DNS-style \n"
-"systems on the other hand allow any of the name servers on the lookup path \n"
-"to mount simple denial of service and spoofing attacks. Adding on a certificate \n"
-"authenticating the responses as signed by some centralized certificate authority \n"
-"would address many of the hostile nameserver issues but would leave open replay \n"
+"done by hijacking a site can be tremendous - and insecure destinations "
+"have \n"
+"no value. DNSsec itself still falls back on registrars and certificate "
+"authorities, \n"
+"while with I2P, requests sent to a destination cannot be intercepted or "
+"the \n"
+"reply spoofed, as they are encrypted to the destination's public keys, "
+"and \n"
+"a destination itself is just a pair of public keys and a certificate. "
+"DNS-style \n"
+"systems on the other hand allow any of the name servers on the lookup "
+"path \n"
+"to mount simple denial of service and spoofing attacks. Adding on a "
+"certificate \n"
+"authenticating the responses as signed by some centralized certificate "
+"authority \n"
+"would address many of the hostile nameserver issues but would leave open "
+"replay \n"
"attacks as well as hostile certificate authority attacks."
msgstr ""
#: i2p2www/pages/site/docs/how/tech-intro.html:880
msgid ""
-"Voting style naming is dangerous as well, especially given the effectiveness \n"
-"of Sybil attacks in anonymous systems - the attacker can simply create an \n"
-"arbitrarily high number of peers and \"vote\" with each to take over a given \n"
-"name. Proof-of-work methods can be used to make identity non-free, but as \n"
-"the network grows the load required to contact everyone to conduct online \n"
-"voting is implausible, or if the full network is not queried, different sets \n"
+"Voting style naming is dangerous as well, especially given the "
+"effectiveness \n"
+"of Sybil attacks in anonymous systems - the attacker can simply create an"
+" \n"
+"arbitrarily high number of peers and \"vote\" with each to take over a "
+"given \n"
+"name. Proof-of-work methods can be used to make identity non-free, but as"
+" \n"
+"the network grows the load required to contact everyone to conduct online"
+" \n"
+"voting is implausible, or if the full network is not queried, different "
+"sets \n"
"of answers may be reachable."
msgstr ""
#: i2p2www/pages/site/docs/how/tech-intro.html:890
msgid ""
-"As with the Internet however, I2P is keeping the design and operation of \n"
-"a naming system out of the (IP-like) communication layer. The bundled naming \n"
-"library includes a simple service provider interface which alternate naming \n"
-"systems can plug into, allowing end users to drive what sort of naming tradeoffs \n"
+"As with the Internet however, I2P is keeping the design and operation of"
+" \n"
+"a naming system out of the (IP-like) communication layer. The bundled "
+"naming \n"
+"library includes a simple service provider interface which alternate "
+"naming \n"
+"systems can plug into, allowing end users to drive what sort of naming "
+"tradeoffs \n"
"they prefer."
msgstr ""
#: i2p2www/pages/site/docs/how/tech-intro.html:899
msgid ""
-"The old Syndie bundled with I2P has been replaced by the new Syndie which\n"
-"is distributed separately. For more information see the Syndie\n"
+"The old Syndie bundled with I2P has been replaced by the new Syndie which"
+"\n"
+"is distributed separately. For more information see the Syndie\n"
"pages."
msgstr ""
#: i2p2www/pages/site/docs/how/tech-intro.html:905
msgid ""
-"Syndie is a safe, anonymous blogging / content publication / content aggregation \n"
-"system. It lets you create information, share it with others, and read posts \n"
-"from those you're interested in, all while taking into consideration your \n"
-"needs for security and anonymity. Rather than building its own content distribution \n"
-"network, Syndie is designed to run on top of existing networks, syndicating \n"
-"content through eepsites, Tor hidden services, Freenet freesites, normal websites, \n"
-"usenet newsgroups, email lists, RSS feeds, etc. Data published with Syndie \n"
-"is done so as to offer pseudonymous authentication to anyone reading or archiving \n"
+"Syndie is a safe, anonymous blogging / content publication / content "
+"aggregation \n"
+"system. It lets you create information, share it with others, and read "
+"posts \n"
+"from those you're interested in, all while taking into consideration your"
+" \n"
+"needs for security and anonymity. Rather than building its own content "
+"distribution \n"
+"network, Syndie is designed to run on top of existing networks, "
+"syndicating \n"
+"content through eepsites, Tor hidden services, Freenet freesites, normal "
+"websites, \n"
+"usenet newsgroups, email lists, RSS feeds, etc. Data published with "
+"Syndie \n"
+"is done so as to offer pseudonymous authentication to anyone reading or "
+"archiving \n"
"it."
msgstr ""
#: i2p2www/pages/site/docs/how/tech-intro.html:920
msgid ""
-"I2PTunnel is probably I2P's most popular and versatile client application, \n"
-"allowing generic proxying both into and out of the I2P network. I2PTunnel \n"
-"can be viewed as four separate proxying applications - a \"client\" which receives \n"
-"inbound TCP connections and forwards them to a given I2P destination, an \"httpclient\" \n"
-"(aka \"eepproxy\") which acts like an HTTP proxy and forwards the requests to \n"
-"the appropriate I2P destination (after querying the naming service if necessary), \n"
-"a \"server\" which receives inbound I2P streaming connections on a destination \n"
-"and forwards them to a given TCP host+port, and an \"httpserver\" which extends \n"
-"the \"server\" by parsing the HTTP request and responses to allow safer operation. \n"
-"There is an additional \"socksclient\" application, but its use is not encouraged \n"
+"I2PTunnel is probably I2P's most popular and versatile client "
+"application, \n"
+"allowing generic proxying both into and out of the I2P network. I2PTunnel"
+" \n"
+"can be viewed as four separate proxying applications - a \"client\" which"
+" receives \n"
+"inbound TCP connections and forwards them to a given I2P destination, an "
+"\"httpclient\" \n"
+"(aka \"eepproxy\") which acts like an HTTP proxy and forwards the "
+"requests to \n"
+"the appropriate I2P destination (after querying the naming service if "
+"necessary), \n"
+"a \"server\" which receives inbound I2P streaming connections on a "
+"destination \n"
+"and forwards them to a given TCP host+port, and an \"httpserver\" which "
+"extends \n"
+"the \"server\" by parsing the HTTP request and responses to allow safer "
+"operation. \n"
+"There is an additional \"socksclient\" application, but its use is not "
+"encouraged \n"
"for reasons previously mentioned."
msgstr ""
#: i2p2www/pages/site/docs/how/tech-intro.html:934
msgid ""
-"I2P itself is not an outproxy network - the anonymity and security concerns \n"
-"inherent in a mix net which forwards data into and out of the mix have kept \n"
-"I2P's design focused on providing an anonymous network which capable of meeting \n"
-"the user's needs without requiring external resources. However, the I2PTunnel \n"
-"\"httpclient\" application offers a hook for outproxying - if the hostname requested \n"
-"doesn't end in \".i2p\", it picks a random destination from a user-provided \n"
-"set of outproxies and forwards the request to them. These destinations are \n"
-"simply I2PTunnel \"server\" instances run by volunteers who have explicitly \n"
-"chosen to run outproxies - no one is an outproxy by default, and running an \n"
-"outproxy doesn't automatically tell other people to proxy through you. While \n"
-"outproxies do have inherent weaknesses, they offer a simple proof of concept \n"
-"for using I2P and provide some functionality under a threat model which may \n"
+"I2P itself is not an outproxy network - the anonymity and security "
+"concerns \n"
+"inherent in a mix net which forwards data into and out of the mix have "
+"kept \n"
+"I2P's design focused on providing an anonymous network which capable of "
+"meeting \n"
+"the user's needs without requiring external resources. However, the "
+"I2PTunnel \n"
+"\"httpclient\" application offers a hook for outproxying - if the "
+"hostname requested \n"
+"doesn't end in \".i2p\", it picks a random destination from a user-"
+"provided \n"
+"set of outproxies and forwards the request to them. These destinations "
+"are \n"
+"simply I2PTunnel \"server\" instances run by volunteers who have "
+"explicitly \n"
+"chosen to run outproxies - no one is an outproxy by default, and running "
+"an \n"
+"outproxy doesn't automatically tell other people to proxy through you. "
+"While \n"
+"outproxies do have inherent weaknesses, they offer a simple proof of "
+"concept \n"
+"for using I2P and provide some functionality under a threat model which "
+"may \n"
"be sufficient for some users."
msgstr ""
#: i2p2www/pages/site/docs/how/tech-intro.html:950
msgid ""
-"I2PTunnel enables most of the applications in use. An \"httpserver\" pointing \n"
-"at a webserver lets anyone run their own anonymous website (or \"eepsite\") \n"
-"- a webserver is bundled with I2P for this purpose, but any webserver can \n"
-"be used. Anyone may run a \"client\" pointing at one of the anonymously hosted \n"
-"IRC servers, each of which are running a \"server\" pointing at their local \n"
-"IRCd and communicating between IRCds over their own \"client\" tunnels. End \n"
-"users also have \"client\" tunnels pointing at I2Pmail's \n"
-"POP3 and SMTP destinations (which in turn are simply \"server\" instances pointing \n"
-"at POP3 and SMTP servers), as well as \"client\" tunnels pointing at I2P's CVS \n"
-"server, allowing anonymous development. At times people have even run \"client\" \n"
+"I2PTunnel enables most of the applications in use. An \"httpserver\" "
+"pointing \n"
+"at a webserver lets anyone run their own anonymous website (or "
+"\"eepsite\") \n"
+"- a webserver is bundled with I2P for this purpose, but any webserver can"
+" \n"
+"be used. Anyone may run a \"client\" pointing at one of the anonymously "
+"hosted \n"
+"IRC servers, each of which are running a \"server\" pointing at their "
+"local \n"
+"IRCd and communicating between IRCds over their own \"client\" tunnels. "
+"End \n"
+"users also have \"client\" tunnels pointing at I2Pmail's \n"
+"POP3 and SMTP destinations (which in turn are simply \"server\" instances"
+" pointing \n"
+"at POP3 and SMTP servers), as well as \"client\" tunnels pointing at "
+"I2P's CVS \n"
+"server, allowing anonymous development. At times people have even run "
+"\"client\" \n"
"proxies to access the \"server\" instances pointing at an NNTP server."
msgstr ""
#: i2p2www/pages/site/docs/how/tech-intro.html:967
msgid ""
-"i2p-bt is a port of the mainline python BitTorrent client to run both the \n"
-"tracker and peer communication over I2P. Tracker requests are forwarded through \n"
-"the eepproxy to eepsites specified in the torrent file while tracker responses \n"
-"refer to peers by their destination explicitly, allowing i2p-bt to open up \n"
-"a streaming lib connection to query them for \n"
+"i2p-bt is a port of the mainline python BitTorrent client to run both the"
+" \n"
+"tracker and peer communication over I2P. Tracker requests are forwarded "
+"through \n"
+"the eepproxy to eepsites specified in the torrent file while tracker "
+"responses \n"
+"refer to peers by their destination explicitly, allowing i2p-bt to open "
+"up \n"
+"a streaming lib connection to query them "
+"for \n"
"blocks."
msgstr ""
#: i2p2www/pages/site/docs/how/tech-intro.html:976
msgid ""
-"In addition to i2p-bt, a port of bytemonsoon has been made to I2P, making \n"
-"a few modifications as necessary to strip any anonymity-compromising information \n"
-"from the application and to take into consideration the fact that IPs cannot \n"
+"In addition to i2p-bt, a port of bytemonsoon has been made to I2P, making"
+" \n"
+"a few modifications as necessary to strip any anonymity-compromising "
+"information \n"
+"from the application and to take into consideration the fact that IPs "
+"cannot \n"
"be used for identifying peers."
msgstr ""
@@ -9235,8 +10960,10 @@ msgstr ""
#: i2p2www/pages/site/docs/how/tech-intro.html:990
msgid ""
-"Bundled with the I2P install, I2PSnark offers a simple anonymous BitTorrent \n"
-"client with multitorrent capabilities, exposing all of the functionality through \n"
+"Bundled with the I2P install, I2PSnark offers a simple anonymous "
+"BitTorrent \n"
+"client with multitorrent capabilities, exposing all of the functionality "
+"through \n"
"a plain HTML web interface."
msgstr ""
@@ -9244,7 +10971,9 @@ msgstr ""
#, python-format
msgid ""
"Robert is a Bittorrent client written in Python.\n"
-"It is hosted on http://%(bob)s/Robert.html "
+"It is hosted on http://%(bob)s/Robert.html "
msgstr ""
#: i2p2www/pages/site/docs/how/tech-intro.html:1007
@@ -9256,9 +10985,12 @@ msgstr ""
#: i2p2www/pages/site/docs/how/tech-intro.html:1015
msgid ""
-"I2Phex is a fairly direct port of the Phex Gnutella filesharing client to \n"
-"run entirely on top of I2P. While it has disabled some of Phex's functionality, \n"
-"such as integration with Gnutella webcaches, the basic file sharing and chatting \n"
+"I2Phex is a fairly direct port of the Phex Gnutella filesharing client to"
+" \n"
+"run entirely on top of I2P. While it has disabled some of Phex's "
+"functionality, \n"
+"such as integration with Gnutella webcaches, the basic file sharing and "
+"chatting \n"
"system is fully functional."
msgstr ""
@@ -9271,39 +11003,62 @@ msgstr ""
#: i2p2www/pages/site/docs/how/tech-intro.html:1033
#, python-format
msgid ""
-"I2Pmail is more a service than an application - postman offers both internal \n"
-"and external email with POP3 and SMTP service through I2PTunnel instances \n"
-"accessing a series of components developed with mastiejaner, allowing people \n"
-"to use their preferred mail clients to send and receive mail pseudonymously. \n"
-"However, as most mail clients expose substantial identifying information, \n"
-"I2P bundles susi23's web based susimail client which has been built specifically \n"
-"with I2P's anonymity needs in mind. The I2Pmail/mail.i2p service offers transparent \n"
-"virus filtering as well as denial of service prevention with hashcash augmented \n"
-"quotas. In addition, each user has control of their batching strategy prior \n"
-"to delivery through the mail.i2p outproxies, which are separate from the mail.i2p \n"
-"SMTP and POP3 servers - both the outproxies and inproxies communicate with \n"
-"the mail.i2p SMTP and POP3 servers through I2P itself, so compromising those \n"
-"non-anonymous locations does not give access to the mail accounts or activity \n"
-"patterns of the user. At the moment the developers work on a decentralized \n"
-"mailsystem, called \"v2mail\". More information can be found on the eepsite \n"
+"I2Pmail is more a service than an application - postman offers both "
+"internal \n"
+"and external email with POP3 and SMTP service through I2PTunnel instances"
+" \n"
+"accessing a series of components developed with mastiejaner, allowing "
+"people \n"
+"to use their preferred mail clients to send and receive mail "
+"pseudonymously. \n"
+"However, as most mail clients expose substantial identifying information,"
+" \n"
+"I2P bundles susi23's web based susimail client which has been built "
+"specifically \n"
+"with I2P's anonymity needs in mind. The I2Pmail/mail.i2p service offers "
+"transparent \n"
+"virus filtering as well as denial of service prevention with hashcash "
+"augmented \n"
+"quotas. In addition, each user has control of their batching strategy "
+"prior \n"
+"to delivery through the mail.i2p outproxies, which are separate from the "
+"mail.i2p \n"
+"SMTP and POP3 servers - both the outproxies and inproxies communicate "
+"with \n"
+"the mail.i2p SMTP and POP3 servers through I2P itself, so compromising "
+"those \n"
+"non-anonymous locations does not give access to the mail accounts or "
+"activity \n"
+"patterns of the user. At the moment the developers work on a "
+"decentralized \n"
+"mailsystem, called \"v2mail\". More information can be found on the "
+"eepsite \n"
"%(postman)s."
msgstr ""
#: i2p2www/pages/site/docs/how/tech-intro.html:1055
msgid ""
-"I2P-Bote is a distributed e-mail application. It does not use the traditional\n"
-"e-mail concept of sending an e-mail to a server and retrieving it from a server.\n"
+"I2P-Bote is a distributed e-mail application. It does not use the "
+"traditional\n"
+"e-mail concept of sending an e-mail to a server and retrieving it from a "
+"server.\n"
"Instead, it uses a Kademlia Distributed Hash Table to store mails.\n"
-"One user can push a mail into the DHT, while another can request the e-mail from the DHT.\n"
-"And all the mails sent within the I2P-Bote network are automatically encrypted end-to-end. X = g^x mod "
-"p
."
+"Alice generates a secret integer x. She then calculates X = g^x mod"
+" p
."
msgstr ""
#: i2p2www/pages/site/docs/transport/ntcp.html:166
@@ -13666,7 +15979,8 @@ msgstr ""
#: i2p2www/pages/site/docs/transport/ntcp.html:173
#, python-format
msgid ""
-"The sessionKey is then used to exchange identities in Message 3 and Message 4.\n"
+"The sessionKey is then used to exchange identities in Message 3 "
+"and Message 4.\n"
"The exponent (x and y) length for the DH exchange is documented on the\n"
"cryptography page."
msgstr ""
@@ -13679,7 +15993,8 @@ msgstr ""
#, python-format
msgid ""
"This is the DH request. Alice already has Bob's\n"
-"Router Identity,\n"
+"Router "
+"Identity,\n"
"IP address, and port, as contained in his\n"
"Router Info,\n"
"which was published to the\n"
@@ -13759,7 +16074,8 @@ msgstr "Verschlüsselte Inhalte:"
#: i2p2www/pages/site/docs/transport/ntcp.html:312
#, python-format
msgid ""
-"48 bytes AES encrypted using the DH session key and\n"
+"48 bytes AES encrypted using the DH "
+"session key and\n"
" the last 16 bytes of Y as the IV"
msgstr ""
@@ -13775,8 +16091,8 @@ msgstr ""
#: i2p2www/pages/site/docs/transport/ntcp.html:326
msgid ""
-"This contains Alice's router identity, and a signature of the critical data."
-" Alice sends Bob:"
+"This contains Alice's router identity, and a signature of the critical "
+"data. Alice sends Bob:"
msgstr ""
#: i2p2www/pages/site/docs/transport/ntcp.html:360
@@ -13796,14 +16112,17 @@ msgstr ""
msgid ""
"the `Signature` of the following concatenated data:\n"
" X, Y, Bob's `RouterIdentity`, tsA, tsB.\n"
-" Alice signs it with the `SigningPrivateKey` associated with the `SigningPublicKey` in her `RouterIdentity`"
+" Alice signs it with the `SigningPrivateKey` associated with "
+"the `SigningPublicKey` in her `RouterIdentity`"
msgstr ""
#: i2p2www/pages/site/docs/transport/ntcp.html:389
#, python-format
msgid ""
-"448 bytes AES encrypted using the DH session key and\n"
-" the last 16 bytes of HXxorHI (i.e., the last 16 bytes of message #1) as the IV"
+"448 bytes AES encrypted using the DH"
+" session key and\n"
+" the last 16 bytes of HXxorHI (i.e., the last 16 bytes "
+"of message #1) as the IV"
msgstr ""
#: i2p2www/pages/site/docs/transport/ntcp.html:400
@@ -13818,8 +16137,8 @@ msgstr ""
#: i2p2www/pages/site/docs/transport/ntcp.html:406
msgid ""
-"Alice will use the last 16 bytes of the encrypted contents of this message "
-"as the IV for the next message."
+"Alice will use the last 16 bytes of the encrypted contents of this "
+"message as the IV for the next message."
msgstr ""
#: i2p2www/pages/site/docs/transport/ntcp.html:430
@@ -13834,15 +16153,19 @@ msgstr ""
msgid ""
"the `Signature` of the following concatenated data:\n"
" X, Y, Alice's `RouterIdentity`, tsA, tsB.\n"
-" Bob signs it with the `SigningPrivateKey` associated with the `SigningPublicKey` in his `RouterIdentity`"
+" Bob signs it with the `SigningPrivateKey` associated with "
+"the `SigningPublicKey` in his `RouterIdentity`"
msgstr ""
#: i2p2www/pages/site/docs/transport/ntcp.html:479
#, python-format
msgid ""
-"Data AES encrypted using the DH session key and\n"
-" the last 16 bytes of the encrypted contents of message #2 as the IV\n"
-" 48 bytes for a DSA signature, may vary for other signature types"
+"Data AES encrypted using the DH "
+"session key and\n"
+" the last 16 bytes of the encrypted contents of message "
+"#2 as the IV\n"
+" 48 bytes for a DSA signature, may vary for other "
+"signature types"
msgstr ""
#: i2p2www/pages/site/docs/transport/ntcp.html:488
@@ -13851,8 +16174,8 @@ msgstr ""
#: i2p2www/pages/site/docs/transport/ntcp.html:491
msgid ""
-"Bob will use the last 16 bytes of the encrypted contents of this message as "
-"the IV for the next message."
+"Bob will use the last 16 bytes of the encrypted contents of this message "
+"as the IV for the next message."
msgstr ""
#: i2p2www/pages/site/docs/transport/ntcp.html:506
@@ -13861,10 +16184,14 @@ msgstr ""
#: i2p2www/pages/site/docs/transport/ntcp.html:507
msgid ""
-"The connection is established, and standard or time sync messages may be exchanged.\n"
-"All subsequent messages are AES encrypted using the negotiated DH session key.\n"
-"Alice will use the last 16 bytes of the encrypted contents of message #3 as the next IV.\n"
-"Bob will use the last 16 bytes of the encrypted contents of message #4 as the next IV."
+"The connection is established, and standard or time sync messages may be "
+"exchanged.\n"
+"All subsequent messages are AES encrypted using the negotiated DH session"
+" key.\n"
+"Alice will use the last 16 bytes of the encrypted contents of message #3 "
+"as the next IV.\n"
+"Bob will use the last 16 bytes of the encrypted contents of message #4 as"
+" the next IV."
msgstr ""
#: i2p2www/pages/site/docs/transport/ntcp.html:516
@@ -13891,8 +16218,8 @@ msgstr ""
#: i2p2www/pages/site/docs/transport/ntcp.html:528
msgid ""
-"that many bytes making up the local router's IP address (as reached by the "
-"remote side)"
+"that many bytes making up the local router's IP address (as reached by "
+"the remote side)"
msgstr ""
#: i2p2www/pages/site/docs/transport/ntcp.html:529
@@ -13911,8 +16238,8 @@ msgstr ""
#: i2p2www/pages/site/docs/transport/ntcp.html:532
msgid ""
-"xor of the local router's identity hash and the SHA256 of bytes 32 through "
-"bytes 223"
+"xor of the local router's identity hash and the SHA256 of bytes 32 "
+"through bytes 223"
msgstr ""
#: i2p2www/pages/site/docs/transport/ntcp.html:535
@@ -13935,9 +16262,11 @@ msgstr ""
#: i2p2www/pages/site/docs/transport/ntcp.html:550
msgid ""
"A set of fixed packet sizes may be appropriate to further hide the data \n"
-"fragmentation to external adversaries, but the tunnel, garlic, and end to \n"
+"fragmentation to external adversaries, but the tunnel, garlic, and end to"
+" \n"
"end padding should be sufficient for most needs until then.\n"
-"However, there is currently no provision for padding beyond the next 16-byte boundary,\n"
+"However, there is currently no provision for padding beyond the next "
+"16-byte boundary,\n"
"to create a limited number of message sizes."
msgstr ""
@@ -13960,8 +16289,10 @@ msgstr ""
#: i2p2www/pages/site/docs/transport/ssu.html:7
#, python-format
msgid ""
-"SSU (also called \"UDP\" in much of the I2P documentation and user interfaces)\n"
-"is one of two transports currently implemented in I2P.\n"
+"SSU (also called \"UDP\" in much of the I2P documentation and user "
+"interfaces)\n"
+"is one of two transports currently "
+"implemented in I2P.\n"
"The other is NTCP."
msgstr ""
@@ -13969,14 +16300,17 @@ msgstr ""
msgid ""
"SSU is the newer of the two transports,\n"
"introduced in I2P release 0.6.\n"
-"In a standard I2P installation, the router uses both NTCP and SSU for outbound connections.\n"
+"In a standard I2P installation, the router uses both NTCP and SSU for "
+"outbound connections.\n"
"SSU-over-IPv6 is supported as of version 0.9.8."
msgstr ""
#: i2p2www/pages/site/docs/transport/ssu.html:20
msgid ""
-"SSU is called \"semireliable\" because it will repeatedly retransmit unacknowledged messages,\n"
-"but only up to a maximum number of times. After that, the message is dropped."
+"SSU is called \"semireliable\" because it will repeatedly retransmit "
+"unacknowledged messages,\n"
+"but only up to a maximum number of times. After that, the message is "
+"dropped."
msgstr ""
#: i2p2www/pages/site/docs/transport/ssu.html:25
@@ -13985,8 +16319,10 @@ msgstr "SSU-Dienste"
#: i2p2www/pages/site/docs/transport/ssu.html:27
msgid ""
-"Like the NTCP transport, SSU provides reliable, encrypted, connection-oriented, point-to-point data transport.\n"
-"Unique to SSU, it also provides IP detection and NAT traversal services, including:"
+"Like the NTCP transport, SSU provides reliable, encrypted, connection-"
+"oriented, point-to-point data transport.\n"
+"Unique to SSU, it also provides IP detection and NAT traversal services, "
+"including:"
msgstr ""
#: i2p2www/pages/site/docs/transport/ssu.html:33
@@ -14003,7 +16339,8 @@ msgstr ""
#: i2p2www/pages/site/docs/transport/ssu.html:35
msgid ""
-"Communication of firewall status and local IP, and changes to either to NTCP"
+"Communication of firewall status and local IP, and changes to either to "
+"NTCP"
msgstr ""
#: i2p2www/pages/site/docs/transport/ssu.html:47
@@ -14037,20 +16374,26 @@ msgid ""
"Packets are scheduled according to the router's policy, taking care\n"
"not to exceed the router's outbound capacity or to exceed the measured \n"
"capacity of the remote peer. The measured capacity operates along the\n"
-"lines of TCP's slow start and congestion avoidance, with additive increases\n"
-"to the sending capacity and multiplicative decreases in face of congestion.\n"
+"lines of TCP's slow start and congestion avoidance, with additive "
+"increases\n"
+"to the sending capacity and multiplicative decreases in face of "
+"congestion.\n"
"Unlike for TCP, routers may give up on some messages after\n"
-"a given period or number of retransmissions while continuing to transmit \n"
+"a given period or number of retransmissions while continuing to transmit"
+" \n"
"other messages."
msgstr ""
#: i2p2www/pages/site/docs/transport/ssu.html:95
msgid ""
"The congestion detection techniques vary from TCP as well, since each \n"
-"message has its own unique and nonsequential identifier, and each message\n"
-"has a limited size - at most, 32KB. To efficiently transmit this feedback\n"
+"message has its own unique and nonsequential identifier, and each message"
+"\n"
+"has a limited size - at most, 32KB. To efficiently transmit this "
+"feedback\n"
"to the sender, the receiver periodically includes a list of fully ACKed \n"
-"message identifiers and may also include bitfields for partially received\n"
+"message identifiers and may also include bitfields for partially received"
+"\n"
"messages, where each bit represents the reception of a fragment. If \n"
"duplicate fragments arrive, the message should be ACKed again, or if the\n"
"message has still not been fully received, the bitfield should be \n"
@@ -14060,7 +16403,8 @@ msgstr ""
#: i2p2www/pages/site/docs/transport/ssu.html:107
msgid ""
"The current implementation does not pad the packets to\n"
-"any particular size, but instead just places a single message fragment into\n"
+"any particular size, but instead just places a single message fragment "
+"into\n"
"a packet and sends it off (careful not to exceed the MTU)."
msgstr ""
@@ -14068,7 +16412,8 @@ msgstr ""
msgid ""
"As of router version 0.8.12,\n"
"two MTU values are used for IPv4: 620 and 1484.\n"
-"The MTU value is adjusted based on the percentage of packets that are retransmitted."
+"The MTU value is adjusted based on the percentage of packets that are "
+"retransmitted."
msgstr ""
#: i2p2www/pages/site/docs/transport/ssu.html:120
@@ -14087,8 +16432,10 @@ msgstr ""
#: i2p2www/pages/site/docs/transport/ssu.html:132
msgid ""
-"Based on measurements, 1492 fits nearly all reasonably small I2NP messages\n"
-"(larger I2NP messages may be up to 1900 to 4500 bytes, which isn't going to fit\n"
+"Based on measurements, 1492 fits nearly all reasonably small I2NP "
+"messages\n"
+"(larger I2NP messages may be up to 1900 to 4500 bytes, which isn't going "
+"to fit\n"
"into a live network MTU anyway)."
msgstr ""
@@ -14108,7 +16455,8 @@ msgstr ""
#: i2p2www/pages/site/docs/transport/ssu.html:150
msgid ""
-"As of release 0.9.2, if a router's network interface MTU is less than 1484,\n"
+"As of release 0.9.2, if a router's network interface MTU is less than "
+"1484,\n"
"it will publish that in the network database, and other routers should\n"
"honor that when a connection is established."
msgstr ""
@@ -14127,10 +16475,13 @@ msgstr ""
#: i2p2www/pages/site/docs/transport/ssu.html:163
msgid ""
"While the maximum message size is nominally 32KB, the practical\n"
-"limit differs. The protocol limits the number of fragments to 7 bits, or 128.\n"
-"The current implementation, however, limits each message to a maximum of 64 fragments,\n"
+"limit differs. The protocol limits the number of fragments to 7 bits, or "
+"128.\n"
+"The current implementation, however, limits each message to a maximum of "
+"64 fragments,\n"
"which is sufficient for 64 * 534 = 33.3 KB when using the 608 MTU.\n"
-"Due to overhead for bundled LeaseSets and session keys, the practical limit\n"
+"Due to overhead for bundled LeaseSets and session keys, the practical "
+"limit\n"
"at the application level is about 6KB lower, or about 26KB.\n"
"Further work is necessary to raise the UDP transport limit above 32KB.\n"
"For connections using the larger MTU, larger messages are possible."
@@ -14144,7 +16495,8 @@ msgstr "Schlüssel"
msgid ""
"All encryption used is AES256/CBC with 32 byte keys and 16 byte IVs.\n"
"When Alice originates a session with Bob,\n"
-"the MAC and session keys are negotiated as part of the DH exchange, and are then used\n"
+"the MAC and session keys are negotiated as part of the DH exchange, and "
+"are then used\n"
"for the HMAC and encryption, respectively. During the DH exchange, \n"
"Bob's publicly knowable introKey is used for the MAC and encryption."
msgstr ""
@@ -14161,7 +16513,8 @@ msgstr ""
#: i2p2www/pages/site/docs/transport/ssu.html:204
msgid ""
-"Upon receiving a message, the receiver checks the \"from\" IP address and port\n"
+"Upon receiving a message, the receiver checks the \"from\" IP address and"
+" port\n"
"with all established sessions - if there are matches,\n"
"that session's MAC keys are tested in the HMAC. If none\n"
"of those verify or if there are no matching IP addresses, the \n"
@@ -14251,7 +16604,8 @@ msgstr ""
#: i2p2www/pages/site/docs/transport/ssu.html:284
msgid ""
-"Direct session establishment is used when no third party is required for NAT traversal.\n"
+"Direct session establishment is used when no third party is required for "
+"NAT traversal.\n"
"The message sequence is as follows:"
msgstr ""
@@ -14271,8 +16625,10 @@ msgid ""
"After the SessionConfirmed message is received, Bob sends a small\n"
"DeliveryStatus message\n"
"as a confirmation.\n"
-"In this message, the 4-byte message ID is set to a random number, and the\n"
-"8-byte \"arrival time\" is set to the current network-wide ID, which is 2\n"
+"In this message, the 4-byte message ID is set to a random number, and the"
+"\n"
+"8-byte \"arrival time\" is set to the current network-wide ID, which is 2"
+"\n"
"(i.e. 0x0000000000000002)."
msgstr ""
@@ -14287,7 +16643,8 @@ msgstr ""
#: i2p2www/pages/site/docs/transport/ssu.html:322
msgid ""
-"It does not appear that the type of the status message or its contents matters.\n"
+"It does not appear that the type of the status message or its contents "
+"matters.\n"
"It was originally added becasue the DatabaseStore message was delayed\n"
"several seconds; since the store is now sent immediately, perhaps\n"
"the status message can be eliminated."
@@ -14296,7 +16653,8 @@ msgstr ""
#: i2p2www/pages/site/docs/transport/ssu.html:331
msgid ""
"Introduction keys are delivered through an external channel \n"
-"(the network database, where they are identical to the router Hash for now)\n"
+"(the network database, where they are identical to the router Hash for "
+"now)\n"
"and must be used when establishing a session key. For the indirect\n"
"address, the peer must first contact the relayhost and ask them for\n"
"an introduction to the peer known at that relayhost under the given\n"
@@ -14314,16 +16672,24 @@ msgid ""
"is necessary for efficient NAT traversal. Charlie, a router behind a\n"
"NAT or firewall which does not allow unsolicited inbound UDP packets,\n"
"first contacts a few peers, choosing some to serve as introducers. Each\n"
-"of these peers (Bob, Bill, Betty, etc) provide Charlie with an introduction\n"
-"tag - a 4 byte random number - which he then makes available to the public\n"
-"as methods of contacting him. Alice, a router who has Charlie's published\n"
-"contact methods, first sends a RelayRequest packet to one or more of the \n"
+"of these peers (Bob, Bill, Betty, etc) provide Charlie with an "
+"introduction\n"
+"tag - a 4 byte random number - which he then makes available to the "
+"public\n"
+"as methods of contacting him. Alice, a router who has Charlie's "
+"published\n"
+"contact methods, first sends a RelayRequest packet to one or more of the"
+" \n"
"introducers, asking each to introduce her to Charlie (offering the \n"
"introduction tag to identify Charlie). Bob then forwards a RelayIntro\n"
-"packet to Charlie including Alice's public IP and port number, then sends\n"
-"Alice back a RelayResponse packet containing Charlie's public IP and port\n"
-"number. When Charlie receives the RelayIntro packet, he sends off a small\n"
-"random packet to Alice's IP and port (poking a hole in his NAT/firewall),\n"
+"packet to Charlie including Alice's public IP and port number, then sends"
+"\n"
+"Alice back a RelayResponse packet containing Charlie's public IP and port"
+"\n"
+"number. When Charlie receives the RelayIntro packet, he sends off a "
+"small\n"
+"random packet to Alice's IP and port (poking a hole in his NAT/firewall),"
+"\n"
"and when Alice receives Bob's RelayResponse packet, she begins a new \n"
"full direction session establishment with the specified IP and port."
msgstr ""
@@ -14333,14 +16699,13 @@ msgid "Connection establishment (indirect using an introducer)"
msgstr ""
#: i2p2www/pages/site/docs/transport/ssu.html:374
-msgid ""
-"Alice first connects to introducer Bob, who relays the request to Charlie."
+msgid "Alice first connects to introducer Bob, who relays the request to Charlie."
msgstr ""
#: i2p2www/pages/site/docs/transport/ssu.html:392
msgid ""
-"After the hole punch, the session is established between Alice and Charlie "
-"as in a direct establishment."
+"After the hole punch, the session is established between Alice and "
+"Charlie as in a direct establishment."
msgstr ""
#: i2p2www/pages/site/docs/transport/ssu.html:404
@@ -14444,12 +16809,14 @@ msgstr ""
#: i2p2www/pages/site/docs/transport/ssu.html:510
#, python-format
msgid ""
-"The details of windowing, ACK, and retransmission strategies are not specified\n"
+"The details of windowing, ACK, and retransmission strategies are not "
+"specified\n"
"here. See the Java code for the current implementation.\n"
"During the establishment phase, and for peer testing, routers\n"
"should implement exponential backoff for retransmission.\n"
"For an established connection, routers should implement\n"
-"an adjustable transmission window, RTT estimate and timeout, similar to TCP\n"
+"an adjustable transmission window, RTT estimate and timeout, similar to "
+"TCP\n"
"or streaming.\n"
"See the code for initial, min and max parameters."
msgstr ""
@@ -14493,22 +16860,27 @@ msgstr ""
#: i2p2www/pages/site/docs/transport/ssu.html:556
msgid ""
-"Analysis of current SSU performance, including assessment of window size adjustment\n"
-"and other parameters, and adjustment of the protocol implementation to improve\n"
+"Analysis of current SSU performance, including assessment of window size "
+"adjustment\n"
+"and other parameters, and adjustment of the protocol implementation to "
+"improve\n"
"performance, is a topic for future work."
msgstr ""
#: i2p2www/pages/site/docs/transport/ssu.html:562
msgid ""
-"The current implementation repeatedly sends acknowledgments for the same packets,\n"
+"The current implementation repeatedly sends acknowledgments for the same "
+"packets,\n"
"which unnecessarily increases overhead."
msgstr ""
#: i2p2www/pages/site/docs/transport/ssu.html:567
msgid ""
-"The default small MTU value of 620 should be analyzed and possibly increased.\n"
+"The default small MTU value of 620 should be analyzed and possibly "
+"increased.\n"
"The current MTU adjustment strategy should be evaluated.\n"
-"Does a streaming lib 1730-byte packet fit in 3 small SSU packets? Probably not."
+"Does a streaming lib 1730-byte packet fit in 3 small SSU packets? "
+"Probably not."
msgstr ""
#: i2p2www/pages/site/docs/transport/ssu.html:573
@@ -14521,28 +16893,32 @@ msgstr ""
#: i2p2www/pages/site/docs/transport/ssu.html:581
msgid ""
-"The potential use of the 'challenge' fields in RelayIntro and RelayResponse,\n"
-"and use of the padding field in SessionRequest and SessionCreated, is undocumented."
+"The potential use of the 'challenge' fields in RelayIntro and "
+"RelayResponse,\n"
+"and use of the padding field in SessionRequest and SessionCreated, is "
+"undocumented."
msgstr ""
#: i2p2www/pages/site/docs/transport/ssu.html:586
msgid ""
"Instead of a single fragment per packet, a more efficient\n"
-"strategy may be to bundle multiple message fragments into the same packet,\n"
+"strategy may be to bundle multiple message fragments into the same "
+"packet,\n"
"so long as it doesn't exceed the MTU."
msgstr ""
#: i2p2www/pages/site/docs/transport/ssu.html:592
msgid ""
"A set of fixed packet sizes may be appropriate to further hide the data \n"
-"fragmentation to external adversaries, but the tunnel, garlic, and end to \n"
+"fragmentation to external adversaries, but the tunnel, garlic, and end to"
+" \n"
"end padding should be sufficient for most needs until then."
msgstr ""
#: i2p2www/pages/site/docs/transport/ssu.html:598
msgid ""
-"Why are introduction keys the same as the router hash, should it be changed,"
-" would there be any benefit?"
+"Why are introduction keys the same as the router hash, should it be "
+"changed, would there be any benefit?"
msgstr ""
#: i2p2www/pages/site/docs/transport/ssu.html:602
@@ -14551,8 +16927,8 @@ msgstr ""
#: i2p2www/pages/site/docs/transport/ssu.html:606
msgid ""
-"Signed-on times in SessionCreated and SessionConfirmed appear to be unused "
-"or unverified."
+"Signed-on times in SessionCreated and SessionConfirmed appear to be "
+"unused or unverified."
msgstr ""
#: i2p2www/pages/site/docs/transport/ssu.html:611
@@ -14562,7 +16938,8 @@ msgstr ""
#: i2p2www/pages/site/docs/transport/ssu.html:612
msgid ""
"This diagram\n"
-"should accurately reflect the current implementation, however there may be small differences."
+"should accurately reflect the current implementation, however there may "
+"be small differences."
msgstr ""
#: i2p2www/pages/site/docs/transport/ssu.html:620
@@ -14590,9 +16967,12 @@ msgid ""
"Within I2P, messages are passed in one direction through a virtual\n"
"tunnel of peers, using whatever means are available to pass the \n"
"message on to the next hop. Messages arrive at the tunnel's \n"
-"gateway, get bundled up and/or fragmented into fixed-size tunnel messages, \n"
-"and are forwarded on to the next hop in the tunnel, which processes and verifies\n"
-"the validity of the message and sends it on to the next hop, and so on, until\n"
+"gateway, get bundled up and/or fragmented into fixed-size tunnel "
+"messages, \n"
+"and are forwarded on to the next hop in the tunnel, which processes and "
+"verifies\n"
+"the validity of the message and sends it on to the next hop, and so on, "
+"until\n"
"it reaches the tunnel endpoint. That endpoint takes the messages\n"
"bundled up by the gateway and forwards them as instructed - either\n"
"to another router, to another tunnel on another router, or locally."
@@ -14614,9 +16994,12 @@ msgid ""
"in the tunnel, and provides each with the necessary configuration\n"
"data. They may have any number of hops.\n"
"It is the intent to make\n"
-"it hard for either participants or third parties to determine the length of \n"
-"a tunnel, or even for colluding participants to determine whether they are a\n"
-"part of the same tunnel at all (barring the situation where colluding peers are\n"
+"it hard for either participants or third parties to determine the length "
+"of \n"
+"a tunnel, or even for colluding participants to determine whether they "
+"are a\n"
+"part of the same tunnel at all (barring the situation where colluding "
+"peers are\n"
"next to each other in the tunnel)."
msgstr ""
@@ -14654,7 +17037,8 @@ msgstr ""
#: i2p2www/pages/site/docs/tunnels/implementation.html:69
#, python-format
msgid ""
-"After a tunnel is built, I2NP messages are processed and passed through it.\n"
+"After a tunnel is built, I2NP messages are "
+"processed and passed through it.\n"
"Tunnel operation has four distinct processes, taken on by various \n"
"peers in the tunnel."
msgstr ""
@@ -14681,7 +17065,8 @@ msgstr ""
#: i2p2www/pages/site/docs/tunnels/implementation.html:89
msgid ""
-"Eventually, the tunnel messages arrive at the endpoint where the I2NP messages\n"
+"Eventually, the tunnel messages arrive at the endpoint where the I2NP "
+"messages\n"
"originally bundled by the gateway are reassembled and forwarded on as \n"
"requested."
msgstr ""
@@ -14741,13 +17126,11 @@ msgid "Decrypt (using an encryption operation)"
msgstr ""
#: i2p2www/pages/site/docs/tunnels/implementation.html:133
-msgid ""
-"Decrypt (using an encryption operation) to reveal plaintext tunnel message"
+msgid "Decrypt (using an encryption operation) to reveal plaintext tunnel message"
msgstr ""
#: i2p2www/pages/site/docs/tunnels/implementation.html:134
-msgid ""
-"Reassemble Fragments, Forward as instructed to Inbound Gateway or Router"
+msgid "Reassemble Fragments, Forward as instructed to Inbound Gateway or Router"
msgstr ""
#: i2p2www/pages/site/docs/tunnels/implementation.html:142
@@ -14808,8 +17191,10 @@ msgstr ""
#: i2p2www/pages/site/docs/tunnels/implementation.html:181
msgid ""
"Tunnel IDs are 4 byte numbers used at each hop - participants know what\n"
-"tunnel ID to listen for messages with and what tunnel ID they should be forwarded\n"
-"on as to the next hop, and each hop chooses the tunnel ID which they receive messages\n"
+"tunnel ID to listen for messages with and what tunnel ID they should be "
+"forwarded\n"
+"on as to the next hop, and each hop chooses the tunnel ID which they "
+"receive messages\n"
"on. Tunnels themselves are short-lived (10 minutes).\n"
"Even if subsequent tunnels are built using the same sequence of \n"
"peers, each hop's tunnel ID will change."
@@ -14817,11 +17202,16 @@ msgstr ""
#: i2p2www/pages/site/docs/tunnels/implementation.html:190
msgid ""
-"To prevent adversaries from tagging the messages along the path by adjusting\n"
-"the message size, all tunnel messages are a fixed 1024 bytes in size. To accommodate \n"
-"larger I2NP messages as well as to support smaller ones more efficiently, the\n"
-"gateway splits up the larger I2NP messages into fragments contained within each\n"
-"tunnel message. The endpoint will attempt to rebuild the I2NP message from the\n"
+"To prevent adversaries from tagging the messages along the path by "
+"adjusting\n"
+"the message size, all tunnel messages are a fixed 1024 bytes in size. To"
+" accommodate \n"
+"larger I2NP messages as well as to support smaller ones more efficiently,"
+" the\n"
+"gateway splits up the larger I2NP messages into fragments contained "
+"within each\n"
+"tunnel message. The endpoint will attempt to rebuild the I2NP message "
+"from the\n"
"fragments for a short period of time, but will discard them as necessary."
msgstr ""
@@ -14838,20 +17228,30 @@ msgstr "Gateway-Verschlüsselung"
#: i2p2www/pages/site/docs/tunnels/implementation.html:207
msgid ""
-"After the preprocessing of messages into a padded payload, the gateway builds\n"
-"a random 16 byte IV value, iteratively encrypting it and the tunnel message as\n"
-"necessary, and forwards the tuple {tunnelID, IV, encrypted tunnel message} to the next hop."
+"After the preprocessing of messages into a padded payload, the gateway "
+"builds\n"
+"a random 16 byte IV value, iteratively encrypting it and the tunnel "
+"message as\n"
+"necessary, and forwards the tuple {tunnelID, IV, encrypted tunnel "
+"message} to the next hop."
msgstr ""
#: i2p2www/pages/site/docs/tunnels/implementation.html:213
msgid ""
-"How encryption at the gateway is done depends on whether the tunnel is an\n"
-"inbound or an outbound tunnel. For inbound tunnels, they simply select a random\n"
-"IV, postprocessing and updating it to generate the IV for the gateway and using \n"
-"that IV along side their own layer key to encrypt the preprocessed data. For outbound \n"
-"tunnels they must iteratively decrypt the (unencrypted) IV and preprocessed \n"
-"data with the IV and layer keys for all hops in the tunnel. The result of the outbound\n"
-"tunnel encryption is that when each peer encrypts it, the endpoint will recover \n"
+"How encryption at the gateway is done depends on whether the tunnel is an"
+"\n"
+"inbound or an outbound tunnel. For inbound tunnels, they simply select a"
+" random\n"
+"IV, postprocessing and updating it to generate the IV for the gateway and"
+" using \n"
+"that IV along side their own layer key to encrypt the preprocessed data."
+" For outbound \n"
+"tunnels they must iteratively decrypt the (unencrypted) IV and "
+"preprocessed \n"
+"data with the IV and layer keys for all hops in the tunnel. The result "
+"of the outbound\n"
+"tunnel encryption is that when each peer encrypts it, the endpoint will "
+"recover \n"
"the initial preprocessed data."
msgstr ""
@@ -14861,29 +17261,46 @@ msgstr ""
#: i2p2www/pages/site/docs/tunnels/implementation.html:227
msgid ""
-"When a peer receives a tunnel message, it checks that the message came from\n"
-"the same previous hop as before (initialized when the first message comes through\n"
-"the tunnel). If the previous peer is a different router, or if the message has\n"
-"already been seen, the message is dropped. The participant then encrypts the \n"
-"received IV with AES256/ECB using their IV key to determine the current IV, uses \n"
-"that IV with the participant's layer key to encrypt the data, encrypts the \n"
-"current IV with AES256/ECB using their IV key again, then forwards the tuple \n"
-"{nextTunnelId, nextIV, encryptedData} to the next hop. This double encryption\n"
+"When a peer receives a tunnel message, it checks that the message came "
+"from\n"
+"the same previous hop as before (initialized when the first message comes"
+" through\n"
+"the tunnel). If the previous peer is a different router, or if the "
+"message has\n"
+"already been seen, the message is dropped. The participant then encrypts"
+" the \n"
+"received IV with AES256/ECB using their IV key to determine the current "
+"IV, uses \n"
+"that IV with the participant's layer key to encrypt the data, encrypts "
+"the \n"
+"current IV with AES256/ECB using their IV key again, then forwards the "
+"tuple \n"
+"{nextTunnelId, nextIV, encryptedData} to the next hop. This double "
+"encryption\n"
"of the IV (both before and after use) help address a certain class of\n"
"confirmation attacks."
msgstr ""
#: i2p2www/pages/site/docs/tunnels/implementation.html:243
msgid ""
-"Duplicate message detection is handled by a decaying Bloom filter on message\n"
-"IVs. Each router maintains a single Bloom filter to contain the XOR of the IV and\n"
-"the first block of the message received for all of the tunnels it is participating\n"
-"in, modified to drop seen entries after 10-20 minutes (when the tunnels will have\n"
-"expired). The size of the bloom filter and the parameters used are sufficient to\n"
-"more than saturate the router's network connection with a negligible chance of \n"
-"false positive. The unique value fed into the Bloom filter is the XOR of the IV \n"
-"and the first block so as to prevent nonsequential colluding peers in the tunnel \n"
-"from tagging a message by resending it with the IV and first block switched."
+"Duplicate message detection is handled by a decaying Bloom filter on "
+"message\n"
+"IVs. Each router maintains a single Bloom filter to contain the XOR of "
+"the IV and\n"
+"the first block of the message received for all of the tunnels it is "
+"participating\n"
+"in, modified to drop seen entries after 10-20 minutes (when the tunnels "
+"will have\n"
+"expired). The size of the bloom filter and the parameters used are "
+"sufficient to\n"
+"more than saturate the router's network connection with a negligible "
+"chance of \n"
+"false positive. The unique value fed into the Bloom filter is the XOR of"
+" the IV \n"
+"and the first block so as to prevent nonsequential colluding peers in the"
+" tunnel \n"
+"from tagging a message by resending it with the IV and first block "
+"switched."
msgstr ""
#: i2p2www/pages/site/docs/tunnels/implementation.html:256
@@ -14892,19 +17309,27 @@ msgstr "Endpunktverarbeitung"
#: i2p2www/pages/site/docs/tunnels/implementation.html:258
msgid ""
-"After receiving and validating a tunnel message at the last hop in the tunnel,\n"
-"how the endpoint recovers the data encoded by the gateway depends upon whether \n"
-"the tunnel is an inbound or an outbound tunnel. For outbound tunnels, the \n"
-"endpoint encrypts the message with its layer key just like any other participant, \n"
-"exposing the preprocessed data. For inbound tunnels, the endpoint is also the \n"
-"tunnel creator so they can merely iteratively decrypt the IV and message, using the \n"
+"After receiving and validating a tunnel message at the last hop in the "
+"tunnel,\n"
+"how the endpoint recovers the data encoded by the gateway depends upon "
+"whether \n"
+"the tunnel is an inbound or an outbound tunnel. For outbound tunnels, "
+"the \n"
+"endpoint encrypts the message with its layer key just like any other "
+"participant, \n"
+"exposing the preprocessed data. For inbound tunnels, the endpoint is "
+"also the \n"
+"tunnel creator so they can merely iteratively decrypt the IV and message,"
+" using the \n"
"layer and IV keys of each step in reverse order."
msgstr ""
#: i2p2www/pages/site/docs/tunnels/implementation.html:268
msgid ""
-"At this point, the tunnel endpoint has the preprocessed data sent by the gateway,\n"
-"which it may then parse out into the included I2NP messages and forwards them as\n"
+"At this point, the tunnel endpoint has the preprocessed data sent by the "
+"gateway,\n"
+"which it may then parse out into the included I2NP messages and forwards "
+"them as\n"
"requested in their delivery instructions."
msgstr ""
@@ -14914,21 +17339,30 @@ msgstr ""
#: i2p2www/pages/site/docs/tunnels/implementation.html:277
msgid ""
-"When building a tunnel, the creator must send a request with the necessary\n"
-"configuration data to each of the hops and wait for all of them to agree before\n"
-"enabling the tunnel. The requests are encrypted so that only the peers who need\n"
-"to know a piece of information (such as the tunnel layer or IV key) has that\n"
-"data. In addition, only the tunnel creator will have access to the peer's\n"
-"reply. There are three important dimensions to keep in mind when producing\n"
-"the tunnels: what peers are used (and where), how the requests are sent (and \n"
+"When building a tunnel, the creator must send a request with the "
+"necessary\n"
+"configuration data to each of the hops and wait for all of them to agree "
+"before\n"
+"enabling the tunnel. The requests are encrypted so that only the peers "
+"who need\n"
+"to know a piece of information (such as the tunnel layer or IV key) has "
+"that\n"
+"data. In addition, only the tunnel creator will have access to the "
+"peer's\n"
+"reply. There are three important dimensions to keep in mind when "
+"producing\n"
+"the tunnels: what peers are used (and where), how the requests are sent "
+"(and \n"
"replies received), and how they are maintained."
msgstr ""
#: i2p2www/pages/site/docs/tunnels/implementation.html:291
msgid ""
-"Beyond the two types of tunnels - inbound and outbound - there are two styles\n"
+"Beyond the two types of tunnels - inbound and outbound - there are two "
+"styles\n"
"of peer selection used for different tunnels - exploratory and client.\n"
-"Exploratory tunnels are used for both network database maintenance and tunnel\n"
+"Exploratory tunnels are used for both network database maintenance and "
+"tunnel\n"
"maintenance, while client tunnels are used for end to end client messages."
msgstr ""
@@ -14938,12 +17372,18 @@ msgstr ""
#: i2p2www/pages/site/docs/tunnels/implementation.html:301
msgid ""
-"Exploratory tunnels are built out of a random selection of peers from a subset\n"
-"of the network. The particular subset varies on the local router and on what their\n"
-"tunnel routing needs are. In general, the exploratory tunnels are built out of\n"
-"randomly selected peers who are in the peer's \"not failing but active\" profile\n"
-"category. The secondary purpose of the tunnels, beyond merely tunnel routing,\n"
-"is to find underutilized high capacity peers so that they can be promoted for\n"
+"Exploratory tunnels are built out of a random selection of peers from a "
+"subset\n"
+"of the network. The particular subset varies on the local router and on "
+"what their\n"
+"tunnel routing needs are. In general, the exploratory tunnels are built "
+"out of\n"
+"randomly selected peers who are in the peer's \"not failing but active\" "
+"profile\n"
+"category. The secondary purpose of the tunnels, beyond merely tunnel "
+"routing,\n"
+"is to find underutilized high capacity peers so that they can be promoted"
+" for\n"
"use in client tunnels."
msgstr ""
@@ -14960,10 +17400,14 @@ msgstr ""
#: i2p2www/pages/site/docs/tunnels/implementation.html:319
msgid ""
-"Client tunnels are built with a more stringent set of requirements - the local\n"
-"router will select peers out of its \"fast and high capacity\" profile category so\n"
-"that performance and reliability will meet the needs of the client application.\n"
-"However, there are several important details beyond that basic selection that \n"
+"Client tunnels are built with a more stringent set of requirements - the "
+"local\n"
+"router will select peers out of its \"fast and high capacity\" profile "
+"category so\n"
+"that performance and reliability will meet the needs of the client "
+"application.\n"
+"However, there are several important details beyond that basic selection "
+"that \n"
"should be adhered to, depending upon the client's anonymity needs."
msgstr ""
@@ -14989,8 +17433,10 @@ msgstr ""
#: i2p2www/pages/site/docs/tunnels/implementation.html:341
msgid ""
"To frustrate the predecessor \n"
-"attack, the tunnel selection keeps the peers selected in a strict order -\n"
-"if A, B, and C are in a tunnel for a particular tunnel pool, the hop after A is always B, and the hop after\n"
+"attack, the tunnel selection keeps the peers selected in a strict order -"
+"\n"
+"if A, B, and C are in a tunnel for a particular tunnel pool, the hop "
+"after A is always B, and the hop after\n"
"B is always C."
msgstr ""
@@ -14999,15 +17445,18 @@ msgid ""
"Ordering is implemented by generating a random 32-byte key for each\n"
"tunnel pool at startup.\n"
"Peers should not be able to guess the ordering, or an attacker could\n"
-"craft two router hashes far apart to maximize the chance of being at both\n"
+"craft two router hashes far apart to maximize the chance of being at both"
+"\n"
"ends of a tunnel.\n"
"Peers are sorted by XOR distance of the\n"
-"SHA256 Hash of (the peer's hash concatenated with the random key) from the random key"
+"SHA256 Hash of (the peer's hash concatenated with the random key) from "
+"the random key"
msgstr ""
#: i2p2www/pages/site/docs/tunnels/implementation.html:363
msgid ""
-"Because each tunnel pool uses a different random key, ordering is consistent\n"
+"Because each tunnel pool uses a different random key, ordering is "
+"consistent\n"
"within a single pool but not between different pools.\n"
"New keys are generated at each router restart."
msgstr ""
@@ -15019,7 +17468,8 @@ msgstr ""
#: i2p2www/pages/site/docs/tunnels/implementation.html:372
#, python-format
msgid ""
-"A multi-hop tunnel is built using a single build message which is repeatedly\n"
+"A multi-hop tunnel is built using a single build message which is "
+"repeatedly\n"
"decrypted and forwarded. In the terminology of\n"
"Hashing it out in Public,\n"
"this is \"non-interactive\" telescopic tunnel building."
@@ -15030,28 +17480,38 @@ msgstr ""
msgid ""
"This tunnel request preparation, delivery, and response method is\n"
"designed to reduce the number of\n"
-"predecessors exposed, cuts the number of messages transmitted, verifies proper\n"
-"connectivity, and avoids the message counting attack of traditional telescopic\n"
+"predecessors exposed, cuts the number of messages transmitted, verifies "
+"proper\n"
+"connectivity, and avoids the message counting attack of traditional "
+"telescopic\n"
"tunnel creation.\n"
-"(This method, which sends messages to extend a tunnel through the already-established\n"
-"part of the tunnel, is termed \"interactive\" telescopic tunnel building in\n"
+"(This method, which sends messages to extend a tunnel through the "
+"already-established\n"
+"part of the tunnel, is termed \"interactive\" telescopic tunnel building "
+"in\n"
"the \"Hashing it out\" paper.)"
msgstr ""
#: i2p2www/pages/site/docs/tunnels/implementation.html:390
#, python-format
msgid ""
-"The details of tunnel request and response messages, and their encryption,\n"
+"The details of tunnel request and response messages, and their "
+"encryption,\n"
"are specified here."
msgstr ""
#: i2p2www/pages/site/docs/tunnels/implementation.html:395
msgid ""
-"Peers may reject tunnel creation requests for a variety of reasons, though\n"
-"a series of four increasingly severe rejections are known: probabilistic rejection\n"
-"(due to approaching the router's capacity, or in response to a flood of requests), \n"
-"transient overload, bandwidth overload, and critical failure. When received, \n"
-"those four are interpreted by the tunnel creator to help adjust their profile of\n"
+"Peers may reject tunnel creation requests for a variety of reasons, "
+"though\n"
+"a series of four increasingly severe rejections are known: probabilistic "
+"rejection\n"
+"(due to approaching the router's capacity, or in response to a flood of "
+"requests), \n"
+"transient overload, bandwidth overload, and critical failure. When "
+"received, \n"
+"those four are interpreted by the tunnel creator to help adjust their "
+"profile of\n"
"the router in question."
msgstr ""
@@ -15069,26 +17529,37 @@ msgstr ""
#: i2p2www/pages/site/docs/tunnels/implementation.html:412
#, python-format
msgid ""
-"To allow efficient operation, the router maintains a series of tunnel pools,\n"
-"each managing a group of tunnels used for a specific purpose with their own\n"
-"configuration. When a tunnel is needed for that purpose, the router selects one\n"
-"out of the appropriate pool at random. Overall, there are two exploratory tunnel\n"
-"pools - one inbound and one outbound - each using the router's default configuration.\n"
+"To allow efficient operation, the router maintains a series of tunnel "
+"pools,\n"
+"each managing a group of tunnels used for a specific purpose with their "
+"own\n"
+"configuration. When a tunnel is needed for that purpose, the router "
+"selects one\n"
+"out of the appropriate pool at random. Overall, there are two "
+"exploratory tunnel\n"
+"pools - one inbound and one outbound - each using the router's default "
+"configuration.\n"
"In addition, there is a pair of pools for each local destination -\n"
-"one inbound and one outbound tunnel pool. Those pools use the configuration specified\n"
-"when the local destination connects to the router via I2CP, or the router's defaults if\n"
+"one inbound and one outbound tunnel pool. Those pools use the "
+"configuration specified\n"
+"when the local destination connects to the router via I2CP, or the router's defaults if\n"
"not specified."
msgstr ""
#: i2p2www/pages/site/docs/tunnels/implementation.html:424
#, python-format
msgid ""
-"Each pool has within its configuration a few key settings, defining how many\n"
-"tunnels to keep active, how many backup tunnels to maintain in case of failure,\n"
+"Each pool has within its configuration a few key settings, defining how "
+"many\n"
+"tunnels to keep active, how many backup tunnels to maintain in case of "
+"failure,\n"
"how long the tunnels should be, whether those\n"
"lengths should be randomized, as \n"
-"well as any of the other settings allowed when configuring individual tunnels.\n"
-"Configuration options are specified on the I2CP page."
+"well as any of the other settings allowed when configuring individual "
+"tunnels.\n"
+"Configuration options are specified on the I2CP "
+"page."
msgstr ""
#: i2p2www/pages/site/docs/tunnels/implementation.html:434
@@ -15105,14 +17576,20 @@ msgstr ""
#: i2p2www/pages/site/docs/tunnels/implementation.html:440
msgid ""
-"Tunnel building is expensive, and tunnels expire a fixed time after they are built.\n"
-"However, when a pool that runs out of tunnels, the Destination is essentially dead.\n"
-"In addition, tunnel build success rate may vary greatly with both local and global\n"
+"Tunnel building is expensive, and tunnels expire a fixed time after they "
+"are built.\n"
+"However, when a pool that runs out of tunnels, the Destination is "
+"essentially dead.\n"
+"In addition, tunnel build success rate may vary greatly with both local "
+"and global\n"
"network conditions.\n"
-"Therefore, it is important to maintain an anticipatory, adaptive build strategy\n"
-"to ensure that new tunnels are successfully built before they are needed,\n"
+"Therefore, it is important to maintain an anticipatory, adaptive build "
+"strategy\n"
+"to ensure that new tunnels are successfully built before they are needed,"
+"\n"
"without building an excess of tunnels, building them too soon,\n"
-"or consuming too much CPU or bandwidth creating and sending the encrypted build messages."
+"or consuming too much CPU or bandwidth creating and sending the encrypted"
+" build messages."
msgstr ""
#: i2p2www/pages/site/docs/tunnels/implementation.html:451
@@ -15120,7 +17597,8 @@ msgid ""
"For each tuple {exploratory/client, in/out, length, length variance}\n"
"the router maintains statistics on the time required for a successful\n"
"tunnel build.\n"
-"Using these statistics, it calculates how long before a tunnel's expiration\n"
+"Using these statistics, it calculates how long before a tunnel's "
+"expiration\n"
"it should start attempting to build a replacement.\n"
"As the expiration time approaches without a successful replacement,\n"
"it starts multiple build attempts in parallel, and then\n"
@@ -15142,18 +17620,30 @@ msgstr ""
#: i2p2www/pages/site/docs/tunnels/implementation.html:473
msgid ""
-"Even though the tunnels within I2P bear a resemblance to a circuit switched\n"
-"network, everything within I2P is strictly message based - tunnels are merely\n"
-"accounting tricks to help organize the delivery of messages. No assumptions are\n"
-"made regarding reliability or ordering of messages, and retransmissions are left\n"
-"to higher levels (e.g. I2P's client layer streaming library). This allows I2P\n"
-"to take advantage of throttling techniques available to both packet switched and\n"
-"circuit switched networks. For instance, each router may keep track of the \n"
-"moving average of how much data each tunnel is using, combine that with all of \n"
-"the averages used by other tunnels the router is participating in, and be able\n"
-"to accept or reject additional tunnel participation requests based on its \n"
-"capacity and utilization. On the other hand, each router can simply drop \n"
-"messages that are beyond its capacity, exploiting the research used on the \n"
+"Even though the tunnels within I2P bear a resemblance to a circuit "
+"switched\n"
+"network, everything within I2P is strictly message based - tunnels are "
+"merely\n"
+"accounting tricks to help organize the delivery of messages. No "
+"assumptions are\n"
+"made regarding reliability or ordering of messages, and retransmissions "
+"are left\n"
+"to higher levels (e.g. I2P's client layer streaming library). This "
+"allows I2P\n"
+"to take advantage of throttling techniques available to both packet "
+"switched and\n"
+"circuit switched networks. For instance, each router may keep track of "
+"the \n"
+"moving average of how much data each tunnel is using, combine that with "
+"all of \n"
+"the averages used by other tunnels the router is participating in, and be"
+" able\n"
+"to accept or reject additional tunnel participation requests based on its"
+" \n"
+"capacity and utilization. On the other hand, each router can simply drop"
+" \n"
+"messages that are beyond its capacity, exploiting the research used on "
+"the \n"
"normal Internet."
msgstr ""
@@ -15161,16 +17651,23 @@ msgstr ""
msgid ""
"In the current implementation, routers implement a\n"
"weighted random early discard (WRED) strategy.\n"
-"For all participating routers (internal participant, inbound gateway, and outbound endpoint),\n"
+"For all participating routers (internal participant, inbound gateway, and"
+" outbound endpoint),\n"
"the router will start randomly dropping a portion of messages as the\n"
"bandwidth limits are approached.\n"
-"As traffic gets closer to, or exceeds, the limits, more messages are dropped.\n"
-"For an internal participant, all messages are fragmented and padded and therefore are the same size.\n"
-"At the inbound gateway and outbound endpoint, however, the dropping decision is made\n"
-"on the full (coalesced) message, and the message size is taken into account.\n"
+"As traffic gets closer to, or exceeds, the limits, more messages are "
+"dropped.\n"
+"For an internal participant, all messages are fragmented and padded and "
+"therefore are the same size.\n"
+"At the inbound gateway and outbound endpoint, however, the dropping "
+"decision is made\n"
+"on the full (coalesced) message, and the message size is taken into "
+"account.\n"
"Larger messages are more likely to be dropped.\n"
-"Also, messages are more likely to be dropped at the outbound endpoint than the inbound gateway,\n"
-"as those messages are not as \"far along\" in their journey and thus the network cost of\n"
+"Also, messages are more likely to be dropped at the outbound endpoint "
+"than the inbound gateway,\n"
+"as those messages are not as \"far along\" in their journey and thus the "
+"network cost of\n"
"dropping those messages is lower."
msgstr ""
@@ -15180,11 +17677,16 @@ msgstr ""
#: i2p2www/pages/site/docs/tunnels/implementation.html:509
msgid ""
-"What strategies could be used at the gateway and at each hop for delaying,\n"
-"reordering, rerouting, or padding messages? To what extent should this be done\n"
-"automatically, how much should be configured as a per tunnel or per hop setting,\n"
-"and how should the tunnel's creator (and in turn, user) control this operation?\n"
-"All of this is left as unknown, to be worked out for a distant future release."
+"What strategies could be used at the gateway and at each hop for "
+"delaying,\n"
+"reordering, rerouting, or padding messages? To what extent should this "
+"be done\n"
+"automatically, how much should be configured as a per tunnel or per hop "
+"setting,\n"
+"and how should the tunnel's creator (and in turn, user) control this "
+"operation?\n"
+"All of this is left as unknown, to be worked out for a distant future "
+"release."
msgstr ""
#: i2p2www/pages/site/docs/tunnels/implementation.html:518
@@ -15193,10 +17695,13 @@ msgstr ""
#: i2p2www/pages/site/docs/tunnels/implementation.html:519
msgid ""
-"The padding strategies can be used on a variety of levels, addressing the\n"
+"The padding strategies can be used on a variety of levels, addressing the"
+"\n"
"exposure of message size information to different adversaries.\n"
-"The current fixed tunnel message size is 1024 bytes. Within this however, the fragmented\n"
-"messages themselves are not padded by the tunnel at all, though for end to end \n"
+"The current fixed tunnel message size is 1024 bytes. Within this "
+"however, the fragmented\n"
+"messages themselves are not padded by the tunnel at all, though for end "
+"to end \n"
"messages, they may be padded as part of the garlic wrapping."
msgstr ""
@@ -15220,7 +17725,8 @@ msgstr ""
#: i2p2www/pages/site/docs/tunnels/unidirectional.html:7
msgid ""
-"This page describes the origins and design of I2P's unidirectional tunnels.\n"
+"This page describes the origins and design of I2P's unidirectional "
+"tunnels.\n"
"For further infomrmation see:"
msgstr ""
@@ -15254,7 +17760,8 @@ msgid ""
"Several apps and protocols, notably HTTP,\n"
"do transfer data in such manner. Having the traffic follow the same \n"
"route to its destination and back could make it easier for an \n"
-"attacker who has only timing and traffic volume data to infer the path a \n"
+"attacker who has only timing and traffic volume data to infer the path a"
+" \n"
"tunnel is taking.\n"
"Having the response come back along a different path arguably \n"
"makes it harder."
@@ -15263,27 +17770,42 @@ msgstr ""
#: i2p2www/pages/site/docs/tunnels/unidirectional.html:45
msgid ""
"When dealing with \n"
-"an internal adversary or most external adversaries, I2P's undirectional tunnels\n"
-"expose half as much traffic data than would be exposed with bidirectional circuits\n"
-"by simply looking at the flows themselves - an HTTP request and response would \n"
-"follow the same path in Tor, while in I2P the packets making up the request \n"
-"would go out through one or more outbound tunnels and the packets making up \n"
-"the response would come back through one or more different inbound tunnels."
+"an internal adversary or most external adversaries, I2P's undirectional "
+"tunnels\n"
+"expose half as much traffic data than would be exposed with bidirectional"
+" circuits\n"
+"by simply looking at the flows themselves - an HTTP request and response "
+"would \n"
+"follow the same path in Tor, while in I2P the packets making up the "
+"request \n"
+"would go out through one or more outbound tunnels and the packets making "
+"up \n"
+"the response would come back through one or more different inbound "
+"tunnels."
msgstr ""
#: i2p2www/pages/site/docs/tunnels/unidirectional.html:55
msgid ""
"The strategy of using two separate tunnels for inbound and outbound\n"
-"communication is not the only technique available, and it does have anonymity\n"
-"implications. On the positive side, by using separate tunnels it lessens the\n"
-"traffic data exposed for analysis to participants in a tunnel - for instance,\n"
-"peers in an outbound tunnel from a web browser would only see the traffic of\n"
+"communication is not the only technique available, and it does have "
+"anonymity\n"
+"implications. On the positive side, by using separate tunnels it lessens"
+" the\n"
+"traffic data exposed for analysis to participants in a tunnel - for "
+"instance,\n"
+"peers in an outbound tunnel from a web browser would only see the traffic"
+" of\n"
"an HTTP GET, while the peers in an inbound tunnel would see the payload \n"
-"delivered along the tunnel. With bidirectional tunnels, all participants would\n"
-"have access to the fact that e.g. 1KB was sent in one direction, then 100KB\n"
-"in the other. On the negative side, using unidirectional tunnels means that\n"
-"there are two sets of peers which need to be profiled and accounted for, and\n"
-"additional care must be taken to address the increased speed of predecessor\n"
+"delivered along the tunnel. With bidirectional tunnels, all participants"
+" would\n"
+"have access to the fact that e.g. 1KB was sent in one direction, then "
+"100KB\n"
+"in the other. On the negative side, using unidirectional tunnels means "
+"that\n"
+"there are two sets of peers which need to be profiled and accounted for, "
+"and\n"
+"additional care must be taken to address the increased speed of "
+"predecessor\n"
"attacks. The tunnel pooling and building process\n"
"(peer selection and ordering strategies)\n"
"should minimize the worries of the predecessor attack."
@@ -15297,22 +17819,28 @@ msgstr "Anonymität"
#, python-format
msgid ""
"A recent paper by Hermann and Grothoff\n"
-"declared that I2P's unidirectional tunnels \"seems to be a bad design decision\"."
+"declared that I2P's unidirectional tunnels \"seems to be a bad design "
+"decision\"."
msgstr ""
#: i2p2www/pages/site/docs/tunnels/unidirectional.html:80
msgid ""
"The paper's main point is that\n"
-"deanonymizations on unidirectional tunnels take a longer time, which is an \n"
-"advantage, but that an attacker can be more certain in the unidirectional case. \n"
-"Therefore, the paper claims it isn't an advantage at all, but a disadvantage, at least\n"
+"deanonymizations on unidirectional tunnels take a longer time, which is "
+"an \n"
+"advantage, but that an attacker can be more certain in the unidirectional"
+" case. \n"
+"Therefore, the paper claims it isn't an advantage at all, but a "
+"disadvantage, at least\n"
"with long-living eepsites."
msgstr ""
#: i2p2www/pages/site/docs/tunnels/unidirectional.html:88
msgid ""
-"This conclusion is not fully supported by the paper. Unidirectional tunnels clearly \n"
-"mitigate other attacks and it's not clear how to trade off the risk of the \n"
+"This conclusion is not fully supported by the paper. Unidirectional "
+"tunnels clearly \n"
+"mitigate other attacks and it's not clear how to trade off the risk of "
+"the \n"
"attack in the paper\n"
"with attacks on a bidirectional tunnel architecture."
msgstr ""
@@ -15321,45 +17849,63 @@ msgstr ""
msgid ""
"This conclusion is based on an arbitrary certainty vs. time weighting \n"
"(tradeoff) that may not be applicable in all cases. For \n"
-"example, somebody could make a list of possible IPs then issue subpoenas to \n"
+"example, somebody could make a list of possible IPs then issue subpoenas "
+"to \n"
"each. Or the attacker could DDoS each in turn and via a simple \n"
-"intersection attack see if the eepsite goes down or is slowed down. So close \n"
+"intersection attack see if the eepsite goes down or is slowed down. So "
+"close \n"
"may be good enough, or time may be more important."
msgstr ""
#: i2p2www/pages/site/docs/tunnels/unidirectional.html:104
msgid ""
-"The conclusion is based on a specific weighting of the importance of certainty \n"
-"vs. time, and that weighting may be wrong, and it's definitely debatable, \n"
-"especially in a real world with subpoenas, search warrants, and other methods \n"
+"The conclusion is based on a specific weighting of the importance of "
+"certainty \n"
+"vs. time, and that weighting may be wrong, and it's definitely debatable,"
+" \n"
+"especially in a real world with subpoenas, search warrants, and other "
+"methods \n"
"available for final confirmation."
msgstr ""
#: i2p2www/pages/site/docs/tunnels/unidirectional.html:111
msgid ""
"A full analysis of the tradeoffs of unidirectional vs. bidirectional \n"
-"tunnels is clearly outside the scope of the paper, and has not been done \n"
-"elsewhere. For example, how does this attack compare to the numerous possible \n"
-"timing attacks published about onion-routed networks? Clearly the authors have not\n"
+"tunnels is clearly outside the scope of the paper, and has not been done"
+" \n"
+"elsewhere. For example, how does this attack compare to the numerous "
+"possible \n"
+"timing attacks published about onion-routed networks? Clearly the authors"
+" have not\n"
"done that analysis, if it's even possible to do it\n"
"effectively."
msgstr ""
#: i2p2www/pages/site/docs/tunnels/unidirectional.html:120
msgid ""
-"Tor uses bidirectional tunnels and has had a lot of academic review. I2P \n"
-"uses unidirectional tunnels and has had very little review. Does the lack of a \n"
-"research paper defending unidirectional tunnels mean that it is a poor design \n"
+"Tor uses bidirectional tunnels and has had a lot of academic review. I2P"
+" \n"
+"uses unidirectional tunnels and has had very little review. Does the lack"
+" of a \n"
+"research paper defending unidirectional tunnels mean that it is a poor "
+"design \n"
"choice, or just that it needs more study? Timing attacks and \n"
-"distributed attacks are difficult to defend against in both I2P and Tor. The \n"
-"design intent (see references above) was that unidirectional tunnels are more \n"
-"resistant to timing attacks. However, the paper presents a somewhat different type of timing \n"
+"distributed attacks are difficult to defend against in both I2P and Tor. "
+"The \n"
+"design intent (see references above) was that unidirectional tunnels are "
+"more \n"
+"resistant to timing attacks. However, the paper presents a somewhat "
+"different type of timing \n"
"attack. Is this attack, innovative as it is, sufficient to label I2P's \n"
"tunnel architecture (and thus I2P as a whole) a \"bad design\", and by \n"
-"implication clearly inferior to Tor, or is it just a design alternative that \n"
-"clearly needs further investigation and analysis? There are several other reasons \n"
-"to consider I2P currently inferior to Tor and other projects (small network \n"
-"size, lack of funding, lack of review) but is unidirectional tunnels really a \n"
+"implication clearly inferior to Tor, or is it just a design alternative "
+"that \n"
+"clearly needs further investigation and analysis? There are several other"
+" reasons \n"
+"to consider I2P currently inferior to Tor and other projects (small "
+"network \n"
+"size, lack of funding, lack of review) but is unidirectional tunnels "
+"really a \n"
"reason?"
msgstr ""
@@ -15370,3 +17916,4 @@ msgid ""
"tunnels are unequivocally inferior to bidirectional tunnels\", yet this \n"
"conclusion is not supported by the paper."
msgstr ""
+
diff --git a/i2p2www/translations/de/LC_MESSAGES/get-involved.po b/i2p2www/translations/de/LC_MESSAGES/get-involved.po
index 8e8c6273..c41fa4a3 100644
--- a/i2p2www/translations/de/LC_MESSAGES/get-involved.po
+++ b/i2p2www/translations/de/LC_MESSAGES/get-involved.po
@@ -1,7 +1,7 @@
-# Translations template for I2P.
+# German translations for I2P.
# Copyright (C) 2014 ORGANIZATION
# This file is distributed under the same license as the I2P project.
-#
+#
# Translators:
# amiga4000 i2p.i2p
) has been set up to "
-"enable developers to easily set up two of the commonly-used IDEs for Java "
-"development: Eclipse and NetBeans."
+"The main I2P development branch (i2p.i2p
) has been set up to"
+" enable developers to easily set up two of the commonly-used IDEs for "
+"Java development: Eclipse and NetBeans."
msgstr ""
#: i2p2www/pages/site/get-involved/guides/ides.html:10
msgid ""
-"The main I2P development branches (i2p.i2p
and branches from "
-"it) contain .project and .classpath Eclipse files, to enable the branch to "
-"be easily set up in Eclipse."
+"The main I2P development branches (i2p.i2p
and branches from"
+" it) contain .project and .classpath Eclipse files, to enable the branch "
+"to be easily set up in Eclipse."
msgstr ""
#: i2p2www/pages/site/get-involved/guides/ides.html:16
@@ -2328,8 +2614,8 @@ msgstr ""
#: i2p2www/pages/site/get-involved/guides/ides.html:20
msgid ""
-"Open Eclipse and create a new Workspace, based in the directory that the I2P"
-" branch was checked out to."
+"Open Eclipse and create a new Workspace, based in the directory that the "
+"I2P branch was checked out to."
msgstr ""
#: i2p2www/pages/site/get-involved/guides/ides.html:24
@@ -2340,8 +2626,8 @@ msgstr ""
#: i2p2www/pages/site/get-involved/guides/ides.html:28
msgid ""
-"For \"Select root directory:\" choose the directory that the I2P branch was "
-"checked out to."
+"For \"Select root directory:\" choose the directory that the I2P branch "
+"was checked out to."
msgstr ""
#: i2p2www/pages/site/get-involved/guides/ides.html:32
@@ -2354,14 +2640,14 @@ msgstr ""
#: i2p2www/pages/site/get-involved/guides/ides.html:40
msgid ""
-"Done! Your workspace should now contain all projects within the I2P branch, "
-"and their build dependencies should be correctly set up."
+"Done! Your workspace should now contain all projects within the I2P "
+"branch, and their build dependencies should be correctly set up."
msgstr ""
#: i2p2www/pages/site/get-involved/guides/ides.html:48
msgid ""
-"The main I2P development branches (i2p.i2p
and branches from "
-"it) contain NetBeans project files."
+"The main I2P development branches (i2p.i2p
and branches from"
+" it) contain NetBeans project files."
msgstr ""
#: i2p2www/pages/site/get-involved/guides/monotone.html:2
@@ -2440,26 +2726,34 @@ msgstr "Unterschiede unter Debian GNU/Linux"
#: i2p2www/pages/site/get-involved/guides/monotone.html:32
#, python-format
msgid ""
-"This is a revised version of Complication's original\n"
+"This is a revised version of Complication's original\n"
" guide detailing the use of Monotone in I2P development.\n"
-" For basic instructions see the quick-start guide."
+" For basic instructions see the quick-start "
+"guide."
msgstr ""
#: i2p2www/pages/site/get-involved/guides/monotone.html:40
#, python-format
msgid ""
-"I2P has a distributed development model. The source code is replicated across\n"
-" independently administered Monotone (\"MTN\") repositories.\n"
-" Developers with commit rights are able to push their changes to the repository\n"
-" (a license agreement needs to be signed\n"
+"I2P has a distributed development model. The source code is replicated "
+"across\n"
+" independently administered Monotone (\"MTN\") repositories.\n"
+" Developers with commit rights are able to push their changes to the "
+"repository\n"
+" (a license agreement needs to be "
+"signed\n"
" before commit rights are granted)."
msgstr ""
#: i2p2www/pages/site/get-involved/guides/monotone.html:50
msgid ""
"Some of Monotone's noteworthy qualities are: distributed\n"
-" version control, cryptographic authentication, access control, its small size, having few\n"
-" dependencies, storage of projects in a compressed SQLite database file, and\n"
+" version control, cryptographic authentication, access control, its "
+"small size, having few\n"
+" dependencies, storage of projects in a compressed SQLite database file,"
+" and\n"
" having the ability to resume interrupted synchronization attempts."
msgstr ""
@@ -2469,16 +2763,20 @@ msgstr ""
#: i2p2www/pages/site/get-involved/guides/monotone.html:64
msgid ""
-"A transport key grants you the ability to push your changes to a Monotone repository server.\n"
-" In order to commit code into Monotone (in essence signing your code), a commit key is also needed.\n"
-" None of the public Monotone servers on I2P currently require a key in order to read (or pull) the source code."
+"A transport key grants you the ability to push your changes to a Monotone"
+" repository server.\n"
+" In order to commit code into Monotone (in essence signing your code), a"
+" commit key is also needed.\n"
+" None of the public Monotone servers on I2P currently require a key in "
+"order to read (or pull) the source code."
msgstr ""
#: i2p2www/pages/site/get-involved/guides/monotone.html:72
msgid ""
"Without a transport key, one cannot:\n"
" $HOME/.monotone/keys
in text files which\n"
+"Monotone stores keys under $HOME/.monotone/keys
in "
+"text files which\n"
" are named identically to the keys. For example:"
msgstr ""
@@ -2519,8 +2820,10 @@ msgstr ""
#: i2p2www/pages/site/get-involved/guides/monotone.html:131
msgid ""
-"Monotone will prompt you for a password to protect your keys. You are very strongly encouraged to set a password\n"
-" for the commit key. Many users will leave an empty password for the transport key, especially those running a\n"
+"Monotone will prompt you for a password to protect your keys. You are "
+"very strongly encouraged to set a password\n"
+" for the commit key. Many users will leave an empty password for the "
+"transport key, especially those running a\n"
" Monotone server."
msgstr ""
@@ -2530,30 +2833,38 @@ msgstr ""
#: i2p2www/pages/site/get-involved/guides/monotone.html:143
msgid ""
-"Monotone's security model helps to ensure that nobody can easily impersonate a developer without\n"
-" it being noticed. Since developers can make mistakes and become compromised,only manual review can\n"
-" ensure quality of code. Monotone's trust model will ensure that you read the right diffs. It does\n"
+"Monotone's security model helps to ensure that nobody can easily "
+"impersonate a developer without\n"
+" it being noticed. Since developers can make mistakes and become "
+"compromised,only manual review can\n"
+" ensure quality of code. Monotone's trust model will ensure that you "
+"read the right diffs. It does\n"
" not replace reading diffs."
msgstr ""
#: i2p2www/pages/site/get-involved/guides/monotone.html:153
msgid ""
-"A Monotone repository is a single file (a compressed SQLite database) which "
-"contains all of the project's source code and history."
+"A Monotone repository is a single file (a compressed SQLite database) "
+"which contains all of the project's source code and history."
msgstr ""
#: i2p2www/pages/site/get-involved/guides/monotone.html:159
msgid ""
-"After importing the developers' keys into Monotone and\n"
-" setting up trust evaluation hooks,\n"
-" Monotone will prevent untrusted code from being checked out into your workspace.\n"
-" There are commands available to clean untrusted code from your workspace but in practice they've not been\n"
+"After importing the "
+"developers' keys into Monotone and\n"
+" setting up trust "
+"evaluation hooks,\n"
+" Monotone will prevent untrusted code from being checked out into your "
+"workspace.\n"
+" There are commands available to clean untrusted code from your "
+"workspace but in practice they've not been\n"
" needed due to the push access policies in place."
msgstr ""
#: i2p2www/pages/site/get-involved/guides/monotone.html:169
msgid ""
-"A repository can hold many branches. For example, our repository holds the\n"
+"A repository can hold many branches. For example, our repository holds "
+"the\n"
" following main branches:"
msgstr ""
@@ -2571,17 +2882,23 @@ msgstr ""
#: i2p2www/pages/site/get-involved/guides/monotone.html:181
msgid ""
-"By convention, the I2P Monotone repository is named i2p.mtn
. Before pulling\n"
-" source code from servers, a database for your repository will need to be initialized.\n"
-" To initialize your local repository, change into the directory that you want the\n"
-" i2p.mtn
file and branch directories to be stored and issue the following\n"
+"By convention, the I2P Monotone repository is named i2p.mtn
."
+" Before pulling\n"
+" source code from servers, a database for your repository will need to "
+"be initialized.\n"
+" To initialize your local repository, change into the directory that you"
+" want the\n"
+" i2p.mtn
file and branch directories to be stored and issue"
+" the following\n"
" command:"
msgstr ""
#: i2p2www/pages/site/get-involved/guides/monotone.html:197
msgid ""
-"Keys which developers use to commit code are essential for trust evaluation in\n"
-" Monotone. The other developers' transport keys are only required for Monotone server operators.\n"
+"Keys which developers use to commit code are essential for trust "
+"evaluation in\n"
+" Monotone. The other developers' transport keys are only required for "
+"Monotone server operators.\n"
" "
msgstr ""
@@ -2595,8 +2912,11 @@ msgstr ""
#: i2p2www/pages/site/get-involved/guides/monotone.html:210
#, python-format
msgid ""
-"To import developers' keys after verifying their authenticity, copy all of the keys into a new\n"
-" file. Create this file (e.g. keys.txt
) in the same directory where i2p.mtn
is located. Import the keys with the command:"
+"To import developers' keys after verifying their authenticity, copy all of the keys into a new\n"
+" file. Create this file (e.g. keys.txt
) in the same "
+"directory where i2p.mtn
is located. Import the keys with the"
+" command:"
msgstr ""
#: i2p2www/pages/site/get-involved/guides/monotone.html:220
@@ -2607,27 +2927,34 @@ msgstr ""
#: i2p2www/pages/site/get-involved/guides/monotone.html:228
msgid ""
-"The default Monotone trust policy is way too lax for our requirements: every committer is trusted by default.\n"
+"The default Monotone trust policy is way too lax for our requirements: "
+"every committer is trusted by default.\n"
" That is not acceptable for I2P development."
msgstr ""
#: i2p2www/pages/site/get-involved/guides/monotone.html:235
msgid ""
-"Change into the directory $HOME/.monotone
and open the file\n"
-" monotonerc
with a text editor. Copy and paste the following two functions into this file:"
+"Change into the directory $HOME/.monotone
and open "
+"the file\n"
+" monotonerc
with a text editor. Copy and paste the "
+"following two functions into this file:"
msgstr ""
#: i2p2www/pages/site/get-involved/guides/monotone.html:244
msgid ""
-"The first function determines an intersection between two sets, in our case a\n"
+"The first function determines an intersection between two sets, in our "
+"case a\n"
" revision's signers and trusted signers."
msgstr ""
#: i2p2www/pages/site/get-involved/guides/monotone.html:251
msgid ""
-"The second function determines trust in a given revision, by calling the first\n"
-" function with \"signers\" and \"trusted\" as arguments. If the intersection is\n"
-" null, the revision is not trusted. If the intersection is not empty, the\n"
+"The second function determines trust in a given revision, by calling the "
+"first\n"
+" function with \"signers\" and \"trusted\" as arguments. If the "
+"intersection is\n"
+" null, the revision is not trusted. If the intersection is not empty, "
+"the\n"
" revision is trusted. Otherwise, the revision is not trusted."
msgstr ""
@@ -2640,14 +2967,18 @@ msgstr ""
#: i2p2www/pages/site/get-involved/guides/monotone.html:268
msgid ""
-"I2P is shipped with a pre-configured tunnel pointing to the project Monotone server. Ensure that the tunnel has been started\n"
-" within I2PTunnel before attempting to pull the source code from 127.0.0.1:8998."
+"I2P is shipped with a pre-configured tunnel pointing to the project "
+"Monotone server. Ensure that the tunnel has been started\n"
+" within I2PTunnel before"
+" attempting to pull the source code from 127.0.0.1:8998."
msgstr ""
#: i2p2www/pages/site/get-involved/guides/monotone.html:275
msgid ""
-"Enter the directory where you initialized i2p.mtn
. Depending on whether you\n"
-" want only I2P sources, or also sources for the I2P website and Syndie, you can\n"
+"Enter the directory where you initialized i2p.mtn
. Depending"
+" on whether you\n"
+" want only I2P sources, or also sources for the I2P website and Syndie, "
+"you can\n"
" perform the pull
operation in different ways."
msgstr ""
@@ -2661,14 +2992,16 @@ msgstr ""
#: i2p2www/pages/site/get-involved/guides/monotone.html:298
msgid ""
-"If the transfer aborts before completing sucessfully, simply repeating the "
-"pull command will resume the transfer."
+"If the transfer aborts before completing sucessfully, simply repeating "
+"the pull command will resume the transfer."
msgstr ""
#: i2p2www/pages/site/get-involved/guides/monotone.html:304
msgid ""
-"Pulling in the above examples is done anonymously by specifying an empty transport key.\n"
-" If everyone pulls anonymously it will be harder for an attacker who gains control of the server\n"
+"Pulling in the above examples is done anonymously by specifying an empty "
+"transport key.\n"
+" If everyone pulls anonymously it will be harder for an attacker who "
+"gains control of the server\n"
" to selectively provide some people with tampered data."
msgstr ""
@@ -2688,57 +3021,67 @@ msgstr ""
#: i2p2www/pages/site/get-involved/guides/monotone.html:326
msgid ""
-"With monotonerc
configured as above, Monotone will no longer trust any committers. Confirm this by changing into the\n"
-"directory where i2p.mtn
was created and attempt a checkout of the I2P branch:"
+"With monotonerc
configured as above, Monotone will no"
+" longer trust any committers. Confirm this by changing into the\n"
+"directory where i2p.mtn
was created and attempt a checkout "
+"of the I2P branch:"
msgstr ""
#: i2p2www/pages/site/get-involved/guides/monotone.html:336
msgid ""
-"A directory named i2p.i2p
should not appear. You should encounter many\n"
+"A directory named i2p.i2p
should not appear. You "
+"should encounter many\n"
" error messages like:"
msgstr ""
#: i2p2www/pages/site/get-involved/guides/monotone.html:353
msgid ""
"If you are satisfied with results, restore the backup of\n"
-" monotonerc
that was created above. If you didn't create a backup\n"
-" as advised, re-read Setting up trust evaluation hooks."
+" monotonerc
that was created above. If you didn't create a "
+"backup\n"
+" as advised, re-read Setting up trust evaluation hooks."
msgstr ""
#: i2p2www/pages/site/get-involved/guides/monotone.html:364
msgid ""
-"If you already have a branch checked out, skip to the next\n"
+"If you already have a branch checked out, skip to the next\n"
" section."
msgstr ""
#: i2p2www/pages/site/get-involved/guides/monotone.html:371
msgid ""
-"Change into the directory where i2p.mtn
is located. Over there "
-"issue:"
+"Change into the directory where i2p.mtn
is located. Over "
+"there issue:"
msgstr ""
#: i2p2www/pages/site/get-involved/guides/monotone.html:380
msgid ""
-"The checkout should complete without error messages and a directory named\n"
-" i2p.i2p
should appear in the current directory. Congratulations! You have\n"
+"The checkout should complete without error messages and a directory named"
+"\n"
+" i2p.i2p
should appear in the current directory. "
+"Congratulations! You have\n"
" successfully checked out the latest I2P sources, ready to be compiled."
msgstr ""
#: i2p2www/pages/site/get-involved/guides/monotone.html:391
msgid ""
-"If you haven't done this already, pull fresh code from the server to your local\n"
-" Monotone repository. To accomplish this, change into the directory where\n"
+"If you haven't done this already, pull fresh code from the server to your"
+" local\n"
+" Monotone repository. To accomplish this, change into the directory "
+"where\n"
" i2p.mtn
is located and issue:"
msgstr ""
#: i2p2www/pages/site/get-involved/guides/monotone.html:402
-msgid ""
-"Now change into your i2p.i2p
directory, and over there issue:"
+msgid "Now change into your i2p.i2p
directory, and over there issue:"
msgstr ""
#: i2p2www/pages/site/get-involved/guides/monotone.html:411
msgid ""
-"As long as there were no errors…Congratulations! You have successfully updated to the latest I2P sources. They\n"
+"As long as there were no errors…Congratulations! You have "
+"successfully updated to the latest I2P sources. They\n"
" should be ready to compile."
msgstr ""
@@ -2762,8 +3105,8 @@ msgstr ""
#: i2p2www/pages/site/get-involved/guides/monotone.html:449
msgid ""
-"No one will not be able to push code to your server without permission being"
-" explicitly granted. To grant push access:"
+"No one will not be able to push code to your server without permission "
+"being explicitly granted. To grant push access:"
msgstr ""
#: i2p2www/pages/site/get-involved/guides/monotone.html:455
@@ -2779,34 +3122,44 @@ msgstr ""
#: i2p2www/pages/site/get-involved/guides/monotone.html:466
msgid ""
-"Import the transport key(s) into your database. The procedure for importing transport keys is the same as for\n"
-"importing commit keys, which is described in the section Obtaining and deploying developers' keys."
+"Import the transport key(s) into your database. The procedure for "
+"importing transport keys is the same as for\n"
+"importing commit keys, which is described in the section Obtaining and deploying "
+"developers' keys."
msgstr ""
#: i2p2www/pages/site/get-involved/guides/monotone.html:476
msgid ""
-"A separate database should be used for your Monotone server because monotone will lock the database while it is served to others.\n"
+"A separate database should be used for your Monotone server because "
+"monotone will lock the database while it is served to others.\n"
" Make a copy of your development database, then start the server with:"
msgstr ""
#: i2p2www/pages/site/get-involved/guides/monotone.html:483
msgid ""
-"If your key is protected with a passphrase, Monotone may request the passphrase\n"
-" when the first client connects. You can work around this by connecting making the first client connection to your server\n"
+"If your key is protected with a passphrase, Monotone may request the "
+"passphrase\n"
+" when the first client connects. You can work around this by connecting "
+"making the first client connection to your server\n"
" (or by clearing the password for your transport key)."
msgstr ""
#: i2p2www/pages/site/get-involved/guides/monotone.html:491
msgid ""
-"For your server to be accessible for others over I2P, you will need to create a\n"
-" server tunnel for it. Use the \"Standard\" tunnel type and \"Bulk\" profile."
+"For your server to be accessible for others over I2P, you will need to "
+"create a\n"
+" server tunnel for it. Use the \"Standard\" tunnel type and \"Bulk\" "
+"profile."
msgstr ""
#: i2p2www/pages/site/get-involved/guides/monotone.html:501
msgid ""
"Debian (amongst other distributions) has integrated Monotone into their\n"
-" framework of daemons/services. Although Monotone servers can still be run\n"
-" \"the ordinary way\" on Debian systems, doing it the \"Debian way\" may be more straightforward."
+" framework of daemons/services. Although Monotone servers can still be "
+"run\n"
+" \"the ordinary way\" on Debian systems, doing it the \"Debian way\" may"
+" be more straightforward."
msgstr ""
#: i2p2www/pages/site/get-involved/guides/monotone.html:509
@@ -2814,7 +3167,8 @@ msgid ""
"Permissions are granted by editing the files\n"
" /etc/monotone/read-permissions
and\n"
" /etc/monotone/write-permissions
. You'll also need to edit\n"
-" /etc/default/monotone
to enable monotone to start at boot or to\n"
+" /etc/default/monotone
to enable monotone to start at boot "
+"or to\n"
" customize the host, port, or database location."
msgstr ""
@@ -2827,7 +3181,8 @@ msgid ""
"\n"
"So you want to start work on I2P? Great!\n"
"Here's a quick guide to getting started\n"
-"on contributing to the website or the software, doing development or creating translations."
+"on contributing to the website or the software, doing development or "
+"creating translations."
msgstr ""
#: i2p2www/pages/site/get-involved/guides/new-developers.html:9
@@ -2880,8 +3235,10 @@ msgstr "Werkzeuge"
#: i2p2www/pages/site/get-involved/guides/new-developers.html:29
msgid ""
-"Basic development on the I2P router or the embedded applications uses Java as the main development language.\n"
-"If you don't have experience with Java, you can always have a look at Thinking in Java."
+"Basic development on the I2P router or the embedded applications uses "
+"Java as the main development language.\n"
+"If you don't have experience with Java, you can always have a look at Thinking in Java."
msgstr ""
#: i2p2www/pages/site/get-involved/guides/new-developers.html:33
@@ -2891,7 +3248,8 @@ msgid ""
"the other \"how\" documents,\n"
"the tech intro,\n"
"and associated documents.\n"
-"These will give you a good overview of how I2P is structured and what different things it does."
+"These will give you a good overview of how I2P is structured and what "
+"different things it does."
msgstr ""
#: i2p2www/pages/site/get-involved/guides/new-developers.html:43
@@ -2904,19 +3262,22 @@ msgstr ""
msgid ""
"Install monotone.\n"
"Monotone is a version control system.\n"
-"We use it because it allows us to keep track of who does what changes to the source code (and for a lot of complicated things, but 'keeping track of changes' is the basic idea)."
+"We use it because it allows us to keep track of who does what changes to "
+"the source code (and for a lot of complicated things, but 'keeping track "
+"of changes' is the basic idea)."
msgstr ""
#: i2p2www/pages/site/get-involved/guides/new-developers.html:53
msgid ""
-"Skim over the monotone"
-" tutorial, to make sure you understand the concepts."
+"Skim over the monotone tutorial,"
+" to make sure you understand the concepts."
msgstr ""
#: i2p2www/pages/site/get-involved/guides/new-developers.html:57
msgid ""
-"If you want to remain anonymous, you need to do an additional step, to set "
-"up a connection to a monotone server over I2P:"
+"If you want to remain anonymous, you need to do an additional step, to "
+"set up a connection to a monotone server over I2P:"
msgstr ""
#: i2p2www/pages/site/get-involved/guides/new-developers.html:60
@@ -2934,22 +3295,24 @@ msgstr ""
#: i2p2www/pages/site/get-involved/guides/new-developers.html:67
msgid ""
-"Define the trust list by creating ~/.monotone/monotonerc
(or "
-"_MTN/monotonerc
in the i2p.i2p workspace) with the following "
-"contents:"
+"Define the trust list by creating ~/.monotone/monotonerc
(or"
+" _MTN/monotonerc
in the i2p.i2p workspace) with the "
+"following contents:"
msgstr ""
#: i2p2www/pages/site/get-involved/guides/new-developers.html:72
#, python-format
msgid ""
-"Copy and paste the developer's commit keys into a new file (e.g. keys.txt
) in the same directory\n"
-" that i2p.mtn
is in. Import the keys into your database with mtn -d i2p.mtn read < keys.txt
"
+"Copy and paste the developer's commit keys "
+"into a new file (e.g. keys.txt
) in the same directory\n"
+" that i2p.mtn
is in. Import the keys into your database "
+"with mtn -d i2p.mtn read < keys.txt
"
msgstr ""
#: i2p2www/pages/site/get-involved/guides/new-developers.html:76
msgid ""
-"Pull the I2P sources to your machine. This may take a long time, especially "
-"if you are doing this over I2P!"
+"Pull the I2P sources to your machine. This may take a long time, "
+"especially if you are doing this over I2P!"
msgstr ""
#: i2p2www/pages/site/get-involved/guides/new-developers.html:78
@@ -2962,20 +3325,20 @@ msgstr "Nicht anonym:"
#: i2p2www/pages/site/get-involved/guides/new-developers.html:83
msgid ""
-"Alternatively, instead of 'mtn.i2p2.de', you can also download from mtn.i2p-"
-"projekt.de."
+"Alternatively, instead of 'mtn.i2p2.de', you can also download from mtn"
+".i2p-projekt.de."
msgstr ""
#: i2p2www/pages/site/get-involved/guides/new-developers.html:90
msgid ""
-"All the sources are now present on your machine, in the database file. To "
-"make them available in a directory, you need to check them out:"
+"All the sources are now present on your machine, in the database file. To"
+" make them available in a directory, you need to check them out:"
msgstr ""
#: i2p2www/pages/site/get-involved/guides/new-developers.html:92
msgid ""
-"The above command creates a directory i2p.i2p, which contains all of the I2P"
-" sources."
+"The above command creates a directory i2p.i2p, which contains all of the "
+"I2P sources."
msgstr ""
#: i2p2www/pages/site/get-involved/guides/new-developers.html:96
@@ -2985,21 +3348,23 @@ msgstr "Bemerkungen"
#: i2p2www/pages/site/get-involved/guides/new-developers.html:97
msgid ""
"\n"
-"To download the website files instead of the I2P source files, use 'i2p.www' instead of 'i2p.i2p'."
+"To download the website files instead of the I2P source files, use "
+"'i2p.www' instead of 'i2p.i2p'."
msgstr ""
#: i2p2www/pages/site/get-involved/guides/new-developers.html:100
msgid ""
"The initial pull may take several hours using the tunnel.\n"
-"If it fails after a partial pull, simply rerun it, it will start where it left off.\n"
+"If it fails after a partial pull, simply rerun it, it will start where it"
+" left off.\n"
"If you are in a hurry, use the non-anonymous access."
msgstr ""
#: i2p2www/pages/site/get-involved/guides/new-developers.html:105
#, python-format
msgid ""
-"A full list of branches, including i2p.i2p and i2p.www can be found on viewmtn."
+"A full list of branches, including i2p.i2p and i2p.www can be found on viewmtn."
msgstr ""
#: i2p2www/pages/site/get-involved/guides/new-developers.html:108
@@ -3012,11 +3377,13 @@ msgstr ""
#: i2p2www/pages/site/get-involved/guides/new-developers.html:114
#, python-format
msgid ""
-"To compile the code, you need the Sun Java Development Kit 6 or higher, or equivalent JDK\n"
+"To compile the code, you need the Sun Java Development Kit 6 or higher, "
+"or equivalent JDK\n"
"(Sun JDK 6 strongly recommended) and\n"
"Apache ant\n"
"version 1.7.0 or higher.\n"
-"If you go are working on the main I2P code, you can go into the i2p.i2p directory and run 'ant' to see the build options."
+"If you go are working on the main I2P code, you can go into the i2p.i2p "
+"directory and run 'ant' to see the build options."
msgstr ""
#: i2p2www/pages/site/get-involved/guides/new-developers.html:122
@@ -3045,8 +3412,10 @@ msgstr ""
#: i2p2www/pages/site/get-involved/guides/new-developers.html:143
#, python-format
msgid ""
-"See the bottom of the licenses page for\n"
-"commit privilege requirements. You need these to put code into i2p.i2p (not required for the website!)."
+"See the bottom of the licenses page "
+"for\n"
+"commit privilege requirements. You need these to put code into i2p.i2p "
+"(not required for the website!)."
msgstr ""
#: i2p2www/pages/site/get-involved/guides/new-developers.html:148
@@ -3091,32 +3460,42 @@ msgstr ""
#: i2p2www/pages/site/get-involved/guides/new-developers.html:163
#, python-format
msgid ""
-"The developers hang around on IRC. They can be reached on the Freenode network, OFTC, and on the I2P internal networks. The usual place to look is #i2p-dev. Join the channel and say hi!\n"
-"We also have additional guidelines for regular developers."
+"The developers hang around on IRC. They can be reached on the Freenode "
+"network, OFTC, and on the I2P internal networks. The usual place to look "
+"is #i2p-dev. Join the channel and say hi!\n"
+"We also have additional guidelines for regular"
+" developers."
msgstr ""
#: i2p2www/pages/site/get-involved/guides/new-developers.html:169
#, python-format
msgid ""
-"Website and router console translators: See the New Translator's Guide\n"
+"Website and router console translators: See the New Translator's Guide\n"
"for next steps."
msgstr ""
#: i2p2www/pages/site/get-involved/guides/new-developers.html:175
msgid ""
"I2P is open source software that is mostly developed using open sourced\n"
-"toolkits. The I2P project recently acquired a license for the YourKit Java\n"
-"Profiler. Open source projects are eligible to receive a free license provided\n"
-"that YourKit is referenced on the project web site. Please get in touch if you\n"
+"toolkits. The I2P project recently acquired a license for the YourKit "
+"Java\n"
+"Profiler. Open source projects are eligible to receive a free license "
+"provided\n"
+"that YourKit is referenced on the project web site. Please get in touch "
+"if you\n"
"are interested in profiling the I2P codebase."
msgstr ""
#: i2p2www/pages/site/get-involved/guides/new-developers.html:183
#, python-format
msgid ""
-"YourKit is kindly supporting open source projects with its full-featured Java Profiler.\n"
-"YourKit, LLC is the creator of innovative and intelligent tools for profiling\n"
-"Java and .NET applications. Take a look at YourKit's leading software products:\n"
+"YourKit is kindly supporting open source projects with its full-featured "
+"Java Profiler.\n"
+"YourKit, LLC is the creator of innovative and intelligent tools for "
+"profiling\n"
+"Java and .NET applications. Take a look at YourKit's leading software "
+"products:\n"
"YourKit Java Profiler and\n"
"YourKit .NET Profiler."
msgstr ""
@@ -3136,9 +3515,11 @@ msgstr ""
#: i2p2www/pages/site/get-involved/guides/new-translators.html:8
#, python-format
msgid ""
-"Translation of the website is done with .po files. The easiest way by far to\n"
+"Translation of the website is done with .po files. The easiest way by far"
+" to\n"
"translate the website is to sign up for an account at \n"
-"Transifex and request to join a translation team. \n"
+"Transifex and request to join a translation"
+" team. \n"
"Alternatively it can be done \"the old way\" as outlined below."
msgstr ""
@@ -3153,8 +3534,10 @@ msgstr "Vorbereitung"
msgid ""
"Come to #i2p-dev on irc and talk to people.\n"
"Claim the language -\n"
-"To make sure other coworkers don't bump onto the files you are working on,\n"
-"please update the translation status on this wiki page."
+"To make sure other coworkers don't bump onto the files you are working "
+"on,\n"
+"please update the translation status on this wiki "
+"page."
msgstr ""
#: i2p2www/pages/site/get-involved/guides/new-translators.html:25
@@ -3174,9 +3557,12 @@ msgstr ""
#: i2p2www/pages/site/get-involved/guides/new-translators.html:38
msgid ""
-"Run \"./extract-messages.sh
\" to generate a messages.pot
in the base directory.\n"
-"Edit the header of this file, then run \"./init-new-po.sh locale
\" to generate the file\n"
-"i2p2www/translations/locale/LC_MESSAGES/messages.po
. \"mtn add
\" this file."
+"Run \"./extract-messages.sh
\" to generate a "
+"messages.pot
in the base directory.\n"
+"Edit the header of this file, then run \"./init-new-po.sh "
+"locale
\" to generate the file\n"
+"i2p2www/translations/locale/LC_MESSAGES/messages.po
. "
+"\"mtn add
\" this file."
msgstr ""
#: i2p2www/pages/site/get-involved/guides/new-translators.html:43
@@ -3187,23 +3573,27 @@ msgstr ""
#: i2p2www/pages/site/get-involved/guides/new-translators.html:46
msgid ""
-"Add a flag image file to i2p2www/static/images/flags/
for the "
-"menu (copy from the router)."
+"Add a flag image file to i2p2www/static/images/flags/
for "
+"the menu (copy from the router)."
msgstr ""
#: i2p2www/pages/site/get-involved/guides/new-translators.html:52
msgid ""
"Edit files:\n"
"Edit i2p2www/translations/locale/LC_MESSAGES/messages.po
.\n"
-"To work with .po files efficiently, you may wish to use POEdit"
+"To work with .po files efficiently, you may wish to use POEdit"
msgstr ""
#: i2p2www/pages/site/get-involved/guides/new-translators.html:58
#: i2p2www/pages/site/get-involved/guides/new-translators.html:151
msgid ""
"Check in:\n"
-"\"mtn pull
\", \"mtn update
\". Then check in by \"mtn ci -k yourname@mail.i2p file1 file2 ...
\"\n"
-"This collects the diff info of your changed file into your local repo. Then \"mtn sync mtn.i2p2.de -k yourname-transport@mail.i2p i2p.i2p
\".\n"
+"\"mtn pull
\", \"mtn update
\". Then check in by "
+"\"mtn ci -k yourname@mail.i2p file1 file2 ...
\"\n"
+"This collects the diff info of your changed file into your local repo. "
+"Then \"mtn sync mtn.i2p2.de -k yourname-transport@mail.i2p "
+"i2p.i2p
\".\n"
"This synchronizes your local repo with the repo on the target machine."
msgstr ""
@@ -3219,8 +3609,10 @@ msgstr ""
#: i2p2www/pages/site/get-involved/guides/new-translators.html:74
#, python-format
msgid ""
-"The easiest way by far to translate the router console is to sign up for an account at \n"
-"Transifex and request to join a translation team. \n"
+"The easiest way by far to translate the router console is to sign up for "
+"an account at \n"
+"Transifex and request to join a translation"
+" team. \n"
"Alternatively it can be done \"the old way\" as outlined below."
msgstr ""
@@ -3238,7 +3630,8 @@ msgstr ""
#: i2p2www/pages/site/get-involved/guides/new-translators.html:101
msgid ""
-"Before starting a console translation, better help translate some i2p webpages first.\n"
+"Before starting a console translation, better help translate some i2p "
+"webpages first.\n"
"At least an i2p homepage in your language would be great."
msgstr ""
@@ -3251,15 +3644,19 @@ msgstr ""
#: i2p2www/pages/site/get-involved/guides/new-translators.html:132
msgid ""
"Where xx is your language code like fr/de/ch/zh/...\n"
-"There may be or may not be files with your lang code. If not, you can create your own. by copying and renaming other language files you know with your own lang code."
+"There may be or may not be files with your lang code. If not, you can "
+"create your own. by copying and renaming other language files you know "
+"with your own lang code."
msgstr ""
#: i2p2www/pages/site/get-involved/guides/new-translators.html:137
msgid ""
"Create files:\n"
-"If the file for your language does not exist yet, copy another language file to a new file foo_xx.bar
for your language.\n"
+"If the file for your language does not exist yet, copy another language "
+"file to a new file foo_xx.bar
for your language.\n"
"Then \"mtn add
\" the file.\n"
-"After creating a .po file, edit the headers. Then run \"ant distclean poupdate
\"."
+"After creating a .po file, edit the headers. Then run \"ant "
+"distclean poupdate
\"."
msgstr ""
#: i2p2www/pages/site/get-involved/guides/new-translators.html:144
@@ -3267,13 +3664,15 @@ msgid ""
"Start to work:\n"
"Edit the HTML files with any text editor.\n"
"Be sure not to use an editor in HTML mode that reformats everything.\n"
-"To work with .po files efficiently, you may wish to use POEdit"
+"To work with .po files efficiently, you may wish to use POEdit"
msgstr ""
#: i2p2www/pages/site/get-involved/guides/new-translators.html:163
msgid ""
"As you can see, it's not that difficult.\n"
-"If you have questions about the meaning of the terms in the console, ask in #i2p-dev
on IRC."
+"If you have questions about the meaning of the terms in the console, ask "
+"in #i2p-dev
on IRC."
msgstr ""
#: i2p2www/pages/site/get-involved/guides/new-translators.html:169
@@ -3282,8 +3681,8 @@ msgstr "FAQ"
#: i2p2www/pages/site/get-involved/guides/new-translators.html:171
msgid ""
-"Q: Why do I have to install monotone, Java, jsp, learn about .po files and "
-"html, etc.? Why can't I just do a translation and email it to you?"
+"Q: Why do I have to install monotone, Java, jsp, learn about .po files "
+"and html, etc.? Why can't I just do a translation and email it to you?"
msgstr ""
#: i2p2www/pages/site/get-involved/guides/new-translators.html:175
@@ -3299,65 +3698,67 @@ msgstr ""
#: i2p2www/pages/site/get-involved/guides/new-translators.html:182
msgid ""
-"We don't have anybody who has time to accept manual contributions and submit"
-" them to our source control system on your behalf. Even if we did, it "
-"doesn't scale."
+"We don't have anybody who has time to accept manual contributions and "
+"submit them to our source control system on your behalf. Even if we did, "
+"it doesn't scale."
msgstr ""
#: i2p2www/pages/site/get-involved/guides/new-translators.html:186
msgid ""
"Maybe you are thinking translation is a one-step process. It isn't. You "
"can't do it all at once. You will make mistakes. You need to test it and "
-"tweak it to make it look right before you submit it. Developers will "
-"update or add to the English text, thus requiring a translation update."
+"tweak it to make it look right before you submit it. Developers "
+"will update or add to the English text, thus requiring a translation "
+"update."
msgstr ""
#: i2p2www/pages/site/get-involved/guides/new-translators.html:190
msgid ""
"Having translators use a source control system directly provides "
-"authentication and accountablility - we know who is doing what, and we can "
-"track changes, and revert them if necessary."
+"authentication and accountablility - we know who is doing what, and we "
+"can track changes, and revert them if necessary."
msgstr ""
#: i2p2www/pages/site/get-involved/guides/new-translators.html:194
msgid ""
-".po files are not difficult. If you don't want to work directly with them, "
-"we recommend 'poedit'."
+".po files are not difficult. If you don't want to work directly with "
+"them, we recommend 'poedit'."
msgstr ""
#: i2p2www/pages/site/get-involved/guides/new-translators.html:198
msgid ""
-"HTML files are not difficult. Just ignore the html stuff and translate the "
-"text."
+"HTML files are not difficult. Just ignore the html stuff and translate "
+"the text."
msgstr ""
#: i2p2www/pages/site/get-involved/guides/new-translators.html:202
msgid ""
"Installing and using monotone is not that difficult. Several of the "
-"translators and other contributors to I2P are non-programmers, and they use "
-"monotone regularly. Monotone is simply a source control system, it is not "
-"about \"coding\"."
+"translators and other contributors to I2P are non-programmers, and they "
+"use monotone regularly. Monotone is simply a source control system, it is"
+" not about \"coding\"."
msgstr ""
#: i2p2www/pages/site/get-involved/guides/new-translators.html:206
msgid ""
"Our items to translate are not \"documents\". They are html files and po "
-"files, with a specific format and character encoding (UTF-8) that must be "
-"maintained, and not corrupted by email programs or other methods of "
+"files, with a specific format and character encoding (UTF-8) that must be"
+" maintained, and not corrupted by email programs or other methods of "
"transfer."
msgstr ""
#: i2p2www/pages/site/get-involved/guides/new-translators.html:210
msgid ""
-"We looked at 'pootle' as a front-end for translators. It didn't work well, "
-"needed an administrator, and a pootle-based process would suffer from a "
-"number of the above flaws."
+"We looked at 'pootle' as a front-end for translators. It didn't work "
+"well, needed an administrator, and a pootle-based process would suffer "
+"from a number of the above flaws."
msgstr ""
#: i2p2www/pages/site/get-involved/guides/new-translators.html:215
msgid ""
"In summary:\n"
-"Yes, we know it is somewhat of a hurdle to get started. It's really the only possible way we can do it. Give it a try, it really isn't that hard."
+"Yes, we know it is somewhat of a hurdle to get started. It's really the "
+"only possible way we can do it. Give it a try, it really isn't that hard."
msgstr ""
#: i2p2www/pages/site/get-involved/guides/new-translators.html:220
@@ -3370,3 +3771,4 @@ msgid ""
"The #i2p-dev channel on IRC, or the translation forum on %(zzz)s."
msgstr ""
+
diff --git a/i2p2www/translations/es/LC_MESSAGES/blog.po b/i2p2www/translations/es/LC_MESSAGES/blog.po
index ec5474c1..5222659a 100644
--- a/i2p2www/translations/es/LC_MESSAGES/blog.po
+++ b/i2p2www/translations/es/LC_MESSAGES/blog.po
@@ -1,36 +1,30 @@
-# Translations template for I2P.
+# Spanish translations for I2P.
# Copyright (C) 2014 ORGANIZATION
# This file is distributed under the same license as the I2P project.
-#
+#
# Translators:
# Adolfo Jayme Barrientos http://i2p-projekt.i2p/hosts.txt (http://udhdrtrcetjm5sxzskjyr5ztpeszydbh4dpl3pl4utgqqw2v4jna.b32.i2p/hosts.txt)
, \n"
+"default is http://i2p-projekt.i2p/hosts.txt "
+"(http://udhdrtrcetjm5sxzskjyr5ztpeszydbh4dpl3pl4utgqqw2v4jna.b32.i2p/hosts.txt)
,"
+" \n"
"which contains a copy of the hosts.txt included\n"
"in the I2P release.\n"
"Users must configure additional subscriptions in their\n"
-"local addressbook application (via subscriptions.txt or SusiDNS)."
-msgstr "Por esta razón, el único suscriptor configurado por\ndefecto es http://i2p-projekt.i2p/hosts.txt (http://udhdrtrcetjm5sxzskjyr5ztpeszydbh4dpl3pl4utgqqw2v4jna.b32.i2p/hosts.txt)
, \nque contiene una copia del hosts.txt incluido\nen la versión de I2P.\nLos usuarios tienen que configurar suscripciones adicionales en sus\naplicaciones de libreta de direcciones (vía suscriptions.txt o SusiDNS)."
+"local addressbook application (via subscriptions.txt or SusiDNS)."
+msgstr ""
+"Por esta razón, el único suscriptor configurado por\n"
+"defecto es http://i2p-projekt.i2p/hosts.txt "
+"(http://udhdrtrcetjm5sxzskjyr5ztpeszydbh4dpl3pl4utgqqw2v4jna.b32.i2p/hosts.txt)
,"
+" \n"
+"que contiene una copia del hosts.txt incluido\n"
+"en la versión de I2P.\n"
+"Los usuarios tienen que configurar suscripciones adicionales en sus\n"
+"aplicaciones de libreta de direcciones (vía suscriptions.txt o SusiDNS)."
#: i2p2www/pages/site/docs/naming.html:211
msgid "Some other public addressbook subscription links:"
-msgstr "Algunos enlaces extra de suscripciones públicas a libretas de direcciones: "
+msgstr ""
+"Algunos enlaces extra de suscripciones públicas a libretas de "
+"direcciones: "
#: i2p2www/pages/site/docs/naming.html:218
msgid ""
-"The operators of these services may have various policies for listing hosts.\n"
+"The operators of these services may have various policies for listing "
+"hosts.\n"
"Presence on this list does not imply endorsement."
-msgstr "Los operadores de estos servicios pueden tener diferentes políticas para \nlistar servidores. La presencia en esta lista no implica su respaldo."
+msgstr ""
+"Los operadores de estos servicios pueden tener diferentes políticas para"
+" \n"
+"listar servidores. La presencia en esta lista no implica su respaldo."
#: i2p2www/pages/site/docs/naming.html:223
#: i2p2www/pages/site/docs/naming.html:235
@@ -824,15 +1066,25 @@ msgstr "Reglas de nombres"
#: i2p2www/pages/site/docs/naming.html:224
msgid ""
-"While there are hopefully not any technical limitations within I2P on host names,\n"
+"While there are hopefully not any technical limitations within I2P on "
+"host names,\n"
"the addressbook enforces several restrictions on host names\n"
"imported from subscriptions.\n"
-"It does this for basic typographical sanity and compatibility with browsers,\n"
+"It does this for basic typographical sanity and compatibility with "
+"browsers,\n"
"and for security.\n"
"The rules are essentially the same as those in RFC2396 Section 3.2.2.\n"
"Any hostnames violating these rules may not be propagated\n"
"to other routers."
-msgstr "Aunque afortunadamente no hay limitación técnica alguna en I2P para los \nnombres de servidor, la libreta de direcciones impone varias restricciones \nsobre los nombres de servidor importados desde suscripciones. Hace \nesto por higiene tipográfica básica y compatibilidad con navegadores, y \npor seguridad. Las reglas son esencialmente las mismas que aquellas de \nla Sección 3.2.2. en el RFC2396. Cualquier nombre de servidor que viole \nesas reglas puede no ser propagado a otros routers."
+msgstr ""
+"Aunque afortunadamente no hay limitación técnica alguna en I2P para los \n"
+"nombres de servidor, la libreta de direcciones impone varias "
+"restricciones \n"
+"sobre los nombres de servidor importados desde suscripciones. Hace \n"
+"esto por higiene tipográfica básica y compatibilidad con navegadores, y \n"
+"por seguridad. Las reglas son esencialmente las mismas que aquellas de \n"
+"la Sección 3.2.2. en el RFC2396. Cualquier nombre de servidor que viole \n"
+"esas reglas puede no ser propagado a otros routers."
#: i2p2www/pages/site/docs/naming.html:239
msgid "Names are converted to lower case on import."
@@ -840,14 +1092,20 @@ msgstr "Los nombres se convierten a minúsculas al importarlos."
#: i2p2www/pages/site/docs/naming.html:243
msgid ""
-"Names are checked for conflict with existing names in the existing userhosts.txt and hosts.txt\n"
+"Names are checked for conflict with existing names in the existing "
+"userhosts.txt and hosts.txt\n"
"(but not privatehosts.txt) after conversion to lower case."
-msgstr "Se comprueban los conflictos entre los nombres y los nombres existentes en \nuserhosts.txt y hosts.txt (pero no privatehosts.txt) tras su conversión a minúsculas."
+msgstr ""
+"Se comprueban los conflictos entre los nombres y los nombres existentes "
+"en \n"
+"userhosts.txt y hosts.txt (pero no privatehosts.txt) tras su conversión a"
+" minúsculas."
#: i2p2www/pages/site/docs/naming.html:248
-msgid ""
-"Must contain only [a-z] [0-9] '.' and '-' after conversion to lower case."
-msgstr "Sólo deben contener [a-z] [0-9] '.' y '-' tras su conversión a minúsculas."
+msgid "Must contain only [a-z] [0-9] '.' and '-' after conversion to lower case."
+msgstr ""
+"Sólo deben contener [a-z] [0-9] '.' y '-' tras su conversión a "
+"minúsculas."
#: i2p2www/pages/site/docs/naming.html:252
msgid "Must not start with '.' or '-'."
@@ -877,13 +1135,20 @@ msgstr "No deben contener '--' excepto en 'xn--' para IDN."
msgid ""
"Base32 hostnames (*.b32.i2p) are reserved for base 32 use and so are not "
"allowed to be imported."
-msgstr "Los nombres de equipo Base32 (*.b32.i2p) están reservados para el uso de base 32 y por tanto no está permitida su importación."
+msgstr ""
+"Los nombres de equipo Base32 (*.b32.i2p) están reservados para el uso de "
+"base 32 y por tanto no está permitida su importación."
#: i2p2www/pages/site/docs/naming.html:280
msgid ""
"Certain hostnames reserved for project use are not allowed\n"
-"(proxy.i2p, router.i2p, console.i2p, *.proxy.i2p, *.router.i2p, *.console.i2p, and others)"
-msgstr "Ciertos nombres de servidor reservados para uso del proyecto no están autorizados \n(proxy.i2p, router.i2p, console.i2p, *.proxy.i2p, *.router.i2p, *.console.i2p, y otros)"
+"(proxy.i2p, router.i2p, console.i2p, *.proxy.i2p, *.router.i2p, "
+"*.console.i2p, and others)"
+msgstr ""
+"Ciertos nombres de servidor reservados para uso del proyecto no están "
+"autorizados \n"
+"(proxy.i2p, router.i2p, console.i2p, *.proxy.i2p, *.router.i2p, "
+"*.console.i2p, y otros)"
#: i2p2www/pages/site/docs/naming.html:285
msgid "Keys are checked for base64 validity."
@@ -893,7 +1158,9 @@ msgstr "Se comprueba la validez base64 de las claves."
msgid ""
"Keys are checked for conflict with existing keys in hosts.txt (but not "
"privatehosts.txt)."
-msgstr "Se comprueba si las claves tienen conflictos con claves existentes en \nhosts.txt (pero no privatehosts.txt)."
+msgstr ""
+"Se comprueba si las claves tienen conflictos con claves existentes en \n"
+"hosts.txt (pero no privatehosts.txt)."
#: i2p2www/pages/site/docs/naming.html:293
msgid "Minimum key length 516 bytes."
@@ -901,13 +1168,17 @@ msgstr "La longitud mínima de clave es 516 bytes."
#: i2p2www/pages/site/docs/naming.html:297
msgid "Maximum key length 616 bytes (to account for certs up to 100 bytes)."
-msgstr "La longitud máxima de clave es 616 bytes (para contar con certificados de hasta 100 bytes)."
+msgstr ""
+"La longitud máxima de clave es 616 bytes (para contar con certificados de"
+" hasta 100 bytes)."
#: i2p2www/pages/site/docs/naming.html:302
msgid ""
-"Any name received via subscription that passes all the checks is added via "
-"the local naming service."
-msgstr "Cualquier nombre recibido vía suscripción que pase todas las comprobaciones, se añade a través del servicio de nombres local."
+"Any name received via subscription that passes all the checks is added "
+"via the local naming service."
+msgstr ""
+"Cualquier nombre recibido vía suscripción que pase todas las "
+"comprobaciones, se añade a través del servicio de nombres local."
#: i2p2www/pages/site/docs/naming.html:306
msgid ""
@@ -919,21 +1190,45 @@ msgid ""
"Methods to deny subdomains to non-domain 'owners' (certificates?),\n"
"and the desirability and feasibility of these methods,\n"
"are topics for future discussion."
-msgstr "Observe que los símbolos '.' en el nombre de servidor no tienen\nsignificado, y no denotan jerarquía de confianza o de nombres alguna. \nSi el nombre 'host.i2p' ya existe, no hay nada que evite que alguien añada \nun nombre 'a.host.i2p' a su(s) hosts.txt, y este nombre pueda ser importado \npor las libretas de direcciones de otros. Los métodos para denegar \nsubdominios a propietarios de no-dominios (¿certificados?), y lo deseable \ny factible de estos métodos, son temas para futura discusión."
+msgstr ""
+"Observe que los símbolos '.' en el nombre de servidor no tienen\n"
+"significado, y no denotan jerarquía de confianza o de nombres alguna. \n"
+"Si el nombre 'host.i2p' ya existe, no hay nada que evite que alguien "
+"añada \n"
+"un nombre 'a.host.i2p' a su(s) hosts.txt, y este nombre pueda ser "
+"importado \n"
+"por las libretas de direcciones de otros. Los métodos para denegar \n"
+"subdominios a propietarios de no-dominios (¿certificados?), y lo deseable"
+" \n"
+"y factible de estos métodos, son temas para futura discusión."
#: i2p2www/pages/site/docs/naming.html:317
msgid ""
-"International Domain Names (IDN) also work in i2p (using punycode 'xn--' form).\n"
-"To see IDN .i2p domain names rendered correctly in Firefox's location bar,\n"
+"International Domain Names (IDN) also work in i2p (using punycode 'xn--' "
+"form).\n"
+"To see IDN .i2p domain names rendered correctly in Firefox's location "
+"bar,\n"
"add 'network.IDN.whitelist.i2p (boolean) = true' in about:config."
-msgstr "Los Nombres de Dominio Internacionales (IDN) también funcionan con I2P \n(usando la forma punycode 'xn--'). Para ver nombres de dominio .i2p IDN \ncorrectamente formados en la barra de direcciones de Firefox, añada \n'network.IDN.whitelist.i2p (boolean) = true' en about:config"
+msgstr ""
+"Los Nombres de Dominio Internacionales (IDN) también funcionan con I2P \n"
+"(usando la forma punycode 'xn--'). Para ver nombres de dominio .i2p IDN \n"
+"correctamente formados en la barra de direcciones de Firefox, añada \n"
+"'network.IDN.whitelist.i2p (boolean) = true' en about:config"
#: i2p2www/pages/site/docs/naming.html:323
msgid ""
-"As the addressbook application does not use privatehosts.txt at all, in practice\n"
-"this file is the only place where it is appropriate to place private aliases or\n"
+"As the addressbook application does not use privatehosts.txt at all, in "
+"practice\n"
+"this file is the only place where it is appropriate to place private "
+"aliases or\n"
"\"pet names\" for sites already in hosts.txt."
-msgstr "Como la aplicación libreta de direcciones no usa privatehosts.txt para nada, \nen la práctica este fichero es el único lugar donde es apropiado emplazar \nalias privados o \"nombres de mascota\" para sitios ya existentes en hosts.txt"
+msgstr ""
+"Como la aplicación libreta de direcciones no usa privatehosts.txt para "
+"nada, \n"
+"en la práctica este fichero es el único lugar donde es apropiado emplazar"
+" \n"
+"alias privados o \"nombres de mascota\" para sitios ya existentes en "
+"hosts.txt"
#: i2p2www/pages/site/docs/naming.html:329
msgid "Outgoing Subscriptions"
@@ -942,34 +1237,56 @@ msgstr "Suscripciones salientes"
#: i2p2www/pages/site/docs/naming.html:330
msgid ""
"Addressbook will publish the merged hosts.txt to a location\n"
-"(traditionally hosts.txt in the local eepsite's home directory) to be accessed by others\n"
+"(traditionally hosts.txt in the local eepsite's home directory) to be "
+"accessed by others\n"
"for their subscriptions.\n"
"This step is optional and is disabled by default."
-msgstr "La libreta de direcciones publicará el hosts.txt fusionado hacia un \nemplazamiento (tradicionalmente el hosts.txt del directorio home del \neepsite) para que sea accesible para las suscripciones de otros. \nEste paso es opcional y está deshabilitado por defecto."
+msgstr ""
+"La libreta de direcciones publicará el hosts.txt fusionado hacia un \n"
+"emplazamiento (tradicionalmente el hosts.txt del directorio home del \n"
+"eepsite) para que sea accesible para las suscripciones de otros. \n"
+"Este paso es opcional y está deshabilitado por defecto."
#: i2p2www/pages/site/docs/naming.html:338
msgid ""
-"The addressbook application, together with eepget, saves the Etag and/or Last-Modified\n"
+"The addressbook application, together with eepget, saves the Etag and/or "
+"Last-Modified\n"
"information returned by the web server of the subscription.\n"
"This greatly reduces the bandwidth required, as the web server will\n"
"return a '304 Not Modified' on the next fetch if nothing has changed."
-msgstr "La aplicación libreta de direcciones, junto con eepget, previene que la \ninformación del Etag y/o la de Última-modificación sea devuelta por el \nservidor web de la suscripción. Esto reduce enormemente el ancho de banda \nrequerido ya que el servidor web devolverá un '304 No Modificado' en la \nla siguiente toma de datos (`fetch`) si nada ha cambiado."
+msgstr ""
+"La aplicación libreta de direcciones, junto con eepget, previene que la \n"
+"información del Etag y/o la de Última-modificación sea devuelta por el \n"
+"servidor web de la suscripción. Esto reduce enormemente el ancho de banda"
+" \n"
+"requerido ya que el servidor web devolverá un '304 No Modificado' en la \n"
+"la siguiente toma de datos (`fetch`) si nada ha cambiado."
#: i2p2www/pages/site/docs/naming.html:345
msgid ""
"However the entire hosts.txt is downloaded if it has changed.\n"
"See below for discussion on this issue."
-msgstr "Sin embargo, si ha cambiado se descarga el hosts.txt completo. \nMire debajo las discusiones sobre este asunto."
+msgstr ""
+"Sin embargo, si ha cambiado se descarga el hosts.txt completo. \n"
+"Mire debajo las discusiones sobre este asunto."
#: i2p2www/pages/site/docs/naming.html:350
msgid ""
"Hosts serving a static hosts.txt or an equivalent CGI application\n"
"are strongly encouraged to deliver\n"
"a Content-Length header, and either an Etag or Last-Modified header.\n"
-"Also ensure that the server delivers a '304 Not Modified' when appropriate.\n"
+"Also ensure that the server delivers a '304 Not Modified' when "
+"appropriate.\n"
"This will dramatically reduce the network bandwidth, and\n"
"reduce chances of corruption."
-msgstr "Se recomienda que los servidores que sirven un archivo host.txt o una aplicación CGI equivalente, lleven una cabecera con el tqmaño del contenido, Content-Length header, y una Etag o la última cabecera modificada, Last-Modified header. Además asegúrese de que el servidor muestra el aviso '304 Not Modified' cuando sea apropiado. Esto reducirá dramáticamente el ancho de banda usado, y reducirá las posibilidades de corrupción."
+msgstr ""
+"Se recomienda que los servidores que sirven un archivo host.txt o una "
+"aplicación CGI equivalente, lleven una cabecera con el tqmaño del "
+"contenido, Content-Length header, y una Etag o la última cabecera "
+"modificada, Last-Modified header. Además asegúrese de que el servidor "
+"muestra el aviso '304 Not Modified' cuando sea apropiado. Esto reducirá "
+"dramáticamente el ancho de banda usado, y reducirá las posibilidades de "
+"corrupción."
#: i2p2www/pages/site/docs/naming.html:359
msgid "Host Add Services"
@@ -977,17 +1294,29 @@ msgstr "Servicio de gestión de dominios"
#: i2p2www/pages/site/docs/naming.html:360
msgid ""
-"A host add service is a simple CGI application that takes a hostname and a Base64 key as parameters\n"
+"A host add service is a simple CGI application that takes a hostname and "
+"a Base64 key as parameters\n"
"and adds that to its local hosts.txt.\n"
"If other routers subscribe to that hosts.txt, the new hostname/key\n"
"will be propagated through the network."
-msgstr "Un servicio de gestión de dominios es una aplicación CGI simple que toma un nombre de dominio y una clave Base64 como parámetros y loa añade a su hosts.txt local. SI otros ruters se suscriben a ese host.txt, el nuevo nombre de domino/clave serán propagados a través de la red."
+msgstr ""
+"Un servicio de gestión de dominios es una aplicación CGI simple que toma "
+"un nombre de dominio y una clave Base64 como parámetros y loa añade a su "
+"hosts.txt local. SI otros ruters se suscriben a ese host.txt, el nuevo "
+"nombre de domino/clave serán propagados a través de la red."
#: i2p2www/pages/site/docs/naming.html:367
msgid ""
-"It is recommended that host add services impose, at a minimum, the restrictions imposed by the addressbook application listed above.\n"
-"Host add services may impose additional restrictions on hostnames and keys, for example:"
-msgstr "Se recomienda que los servicios de gestión de dominios impongan, como mínimo, las restricciones impuestas por la aplicación libreta de direcciones listadas anteriormente. Los servicios de gestión de dominios deben imponer restricciones adicionales en los nombres de dominio y en las claves, por ejemplo:"
+"It is recommended that host add services impose, at a minimum, the "
+"restrictions imposed by the addressbook application listed above.\n"
+"Host add services may impose additional restrictions on hostnames and "
+"keys, for example:"
+msgstr ""
+"Se recomienda que los servicios de gestión de dominios impongan, como "
+"mínimo, las restricciones impuestas por la aplicación libreta de "
+"direcciones listadas anteriormente. Los servicios de gestión de dominios "
+"deben imponer restricciones adicionales en los nombres de dominio y en "
+"las claves, por ejemplo:"
#: i2p2www/pages/site/docs/naming.html:372
msgid "A limit on number of 'subdomains'."
@@ -1015,7 +1344,9 @@ msgstr "Reserva o rechazo de ciertos dominios."
#: i2p2www/pages/site/docs/naming.html:396
msgid "Restrictions on the number of names registered in a given time period."
-msgstr "Restricciones en el número de dominios registrados en un determinado periodo de tiempo."
+msgstr ""
+"Restricciones en el número de dominios registrados en un determinado "
+"periodo de tiempo."
#: i2p2www/pages/site/docs/naming.html:400
msgid "Delays between registration and publication."
@@ -1039,41 +1370,66 @@ msgstr "Servicios de salto"
#: i2p2www/pages/site/docs/naming.html:418
msgid ""
-"A jump service is a simple CGI application that takes a hostname as a parameter\n"
-"and returns a 301 redirect to the proper URL with a ?i2paddresshelper=key
\n"
+"A jump service is a simple CGI application that takes a hostname as a "
+"parameter\n"
+"and returns a 301 redirect to the proper URL with a "
+"?i2paddresshelper=key
\n"
"string appended.\n"
"The HTTP proxy will interpret the appended string and\n"
"use that key as the actual destination.\n"
"In addition, the proxy will cache that key so the\n"
"address helper is not necessary until restart."
-msgstr "Un servicio de salto, jump service, es una aplicación CGI que toma un nombre de dominio como parámetro y devuelve una re-dirección 301 a la URL apropiada con una cadena de texto ?i2paddresshelper=key
añadida. El servidor HTTP interpretará la cadena de texto añadida y usará la clave como la destinación actual. Además, el proxy cacheará esa clave para que el address helper no sea necesario hasta el próximo reinicio."
+msgstr ""
+"Un servicio de salto, jump service, es una aplicación CGI que toma un "
+"nombre de dominio como parámetro y devuelve una re-dirección 301 a la URL"
+" apropiada con una cadena de texto ?i2paddresshelper=key
"
+"añadida. El servidor HTTP interpretará la cadena de texto añadida y usará"
+" la clave como la destinación actual. Además, el proxy cacheará esa clave"
+" para que el address helper no sea necesario hasta el próximo reinicio."
#: i2p2www/pages/site/docs/naming.html:428
msgid ""
"Note that, like with subscriptions, using a jump service\n"
"implies a certain amount of trust, as a jump service could maliciously\n"
"redirect a user to an incorrect destination."
-msgstr "Dese cuenta que, al igual que con las suscripciones, el usar un servicio de salto implica confianza de su parte, debe fiarse del servicio de salto, ya que un servicio de salto podría redirigirle maliciosamente a una destinación incorrecta."
+msgstr ""
+"Dese cuenta que, al igual que con las suscripciones, el usar un servicio "
+"de salto implica confianza de su parte, debe fiarse del servicio de "
+"salto, ya que un servicio de salto podría redirigirle maliciosamente a "
+"una destinación incorrecta."
#: i2p2www/pages/site/docs/naming.html:434
msgid ""
"To provide the best service, a jump service should be subscribed to\n"
"several hosts.txt providers so that its local host list is current."
-msgstr "Para proporcionar un mejor servicio, un servicio de salto debería estar suscrito a varios proveedores de archivos host,.txt , para que su lista local de dominios esté al día."
+msgstr ""
+"Para proporcionar un mejor servicio, un servicio de salto debería estar "
+"suscrito a varios proveedores de archivos host,.txt , para que su lista "
+"local de dominios esté al día."
#: i2p2www/pages/site/docs/naming.html:440
msgid ""
-"SusiDNS is simply a web interface front-end to configuring addressbook subscriptions\n"
+"SusiDNS is simply a web interface front-end to configuring addressbook "
+"subscriptions\n"
"and accessing the four addressbook files.\n"
"All the real work is done by the 'addressbook' application."
-msgstr "SusiDNS es simplemente un interfaz web para configurar las suscripciones a la libreta de direcciones, y con acceso a los cuatro archivos de libretas de direcciones. Todo el trabajo duro es realizado por la aplicación 'addressbook', 'libreta de direcciones'."
+msgstr ""
+"SusiDNS es simplemente un interfaz web para configurar las suscripciones "
+"a la libreta de direcciones, y con acceso a los cuatro archivos de "
+"libretas de direcciones. Todo el trabajo duro es realizado por la "
+"aplicación 'addressbook', 'libreta de direcciones'."
#: i2p2www/pages/site/docs/naming.html:446
msgid ""
-"Currently, there is little enforcement of addressbook naming rules within SusiDNS,\n"
+"Currently, there is little enforcement of addressbook naming rules within"
+" SusiDNS,\n"
"so a user may enter hostnames locally that would be rejected by\n"
"the addressbook subscription rules."
-msgstr "Actualmente, hay poco control sobre las reglas de creación de los nombres de dominio dentro de SusiDNS, por lo que un usuario puede añadir nombres de dominios localmente que serían rechazados por las reglas de suscripción de la libreta de direcciones."
+msgstr ""
+"Actualmente, hay poco control sobre las reglas de creación de los nombres"
+" de dominio dentro de SusiDNS, por lo que un usuario puede añadir nombres"
+" de dominios localmente que serían rechazados por las reglas de "
+"suscripción de la libreta de direcciones."
#: i2p2www/pages/site/docs/naming.html:452
msgid "Base32 Names"
@@ -1084,33 +1440,68 @@ msgid ""
"I2P supports Base32 hostnames similar to Tor's .onion addresses.\n"
"Base32 addresses are much shorter and easier to handle than the\n"
"full 516-character Base64 Destinations or addresshelpers.\n"
-"Example: ukeu3k5oycgaauneqgtnvselmt4yemvoilkln7jpvamvfx7dnkdq.b32.i2p
"
-msgstr "I2P soporta nombres de dominios Base32 similares a las direcciones .onion de Tor. Las direcciones Base32 son mucho más fáciles de manejar y mucho más cortas que los addresshelpers o las Destinaciones Base64 de 516 caracteres. Ejemplo:\nukeu3k5oycgaauneqgtnvselmt4yemvoilkln7jpvamvfx7dnkdq.b32.i2p
"
+"Example: "
+"ukeu3k5oycgaauneqgtnvselmt4yemvoilkln7jpvamvfx7dnkdq.b32.i2p
"
+msgstr ""
+"I2P soporta nombres de dominios Base32 similares a las direcciones .onion"
+" de Tor. Las direcciones Base32 son mucho más fáciles de manejar y mucho "
+"más cortas que los addresshelpers o las Destinaciones Base64 de 516 "
+"caracteres. Ejemplo:\n"
+"ukeu3k5oycgaauneqgtnvselmt4yemvoilkln7jpvamvfx7dnkdq.b32.i2p
"
#: i2p2www/pages/site/docs/naming.html:460
#, python-format
msgid ""
-"In Tor, the address is 16 characters (80 bits), or half of the SHA-1 hash.\n"
+"In Tor, the address is 16 characters (80 bits), or half of the SHA-1 "
+"hash.\n"
"I2P uses 52 characters (256 bits) to represent the full SHA-256 hash.\n"
"The form is {52 chars}.b32.i2p.\n"
"Tor has recently published a\n"
-"proposal\n"
-"to convert to an identical format of {52 chars}.onion for their hidden services.\n"
+"proposal\n"
+"to convert to an identical format of {52 chars}.onion for their hidden "
+"services.\n"
"Base32 is implemented in the naming service, which queries the\n"
"router over I2CP to lookup the LeaseSet to get the full Destination.\n"
-"Base32 lookups will only be successful when the Destination is up and publishing\n"
+"Base32 lookups will only be successful when the Destination is up and "
+"publishing\n"
"a LeaseSet.\n"
-"Because resolution may require a network database lookup, it may take significantly\n"
+"Because resolution may require a network database lookup, it may take "
+"significantly\n"
"longer than a local address book lookup."
-msgstr "En Tor, la dirección es de 16 caracteres (80 bits), o la mitad del (identificador criptográfico) hash SHA-1.\nI2P usa 52 caracteres (256 bits) para representar el hash SHA-256 completo.\nLa la forma es {52 chars}.b32.i2p .\nTor ha publicado recientemente una propuesta para\nconvertirlas a un formato idéntico de {52 chars}.onion para sus servicios ocultos.\nBase32 está implementado en el servicio de nombres, que realiza peticiones al router sobre I2CP para buscar el LeaseSet para obtener el destino completo.\nLas búsquedas Base32 sólo serán exitosas cuando el destino esté activo y publicando un LeaseSet.\nA causa de que la resolución puede requerir una búsqueda en la base de datos de red, puede llevar significativamente más tiempo que una búsqueda en la libreta de direcciones local."
+msgstr ""
+"En Tor, la dirección es de 16 caracteres (80 bits), o la mitad del "
+"(identificador criptográfico) hash SHA-1.\n"
+"I2P usa 52 caracteres (256 bits) para representar el hash SHA-256 "
+"completo.\n"
+"La la forma es {52 chars}.b32.i2p .\n"
+"Tor ha publicado recientemente una propuesta para\n"
+"convertirlas a un formato idéntico de {52 chars}.onion para sus servicios"
+" ocultos.\n"
+"Base32 está implementado en el servicio de nombres, que realiza "
+"peticiones al router sobre I2CP para buscar el LeaseSet para obtener el "
+"destino completo.\n"
+"Las búsquedas Base32 sólo serán exitosas cuando el destino esté activo y "
+"publicando un LeaseSet.\n"
+"A causa de que la resolución puede requerir una búsqueda en la base de "
+"datos de red, puede llevar significativamente más tiempo que una búsqueda"
+" en la libreta de direcciones local."
#: i2p2www/pages/site/docs/naming.html:475
msgid ""
-"Base32 addresses can be used in most places where hostnames or full destinations\n"
+"Base32 addresses can be used in most places where hostnames or full "
+"destinations\n"
"are used, however there are some exceptions where they may fail if the\n"
"name does not immediately resolve. I2PTunnel will fail, for example, if\n"
"the name does not resolve to a destination."
-msgstr "Las direcciones Base32 pueden ser usadas en la mayoría de sitios donde se puedan usar los nombres de dominios o la Destinación completa, aunque hay algunas excepciones donde podría fallar sin el dominio no se resuelve inmediatamente, Por ejemplo, I2PTunnel fallará si el domino no resuelve una destinación."
+msgstr ""
+"Las direcciones Base32 pueden ser usadas en la mayoría de sitios donde se"
+" puedan usar los nombres de dominios o la Destinación completa, aunque "
+"hay algunas excepciones donde podría fallar sin el dominio no se resuelve"
+" inmediatamente, Por ejemplo, I2PTunnel fallará si el domino no resuelve "
+"una destinación."
#: i2p2www/pages/site/docs/plugins.html:2
#: i2p2www/pages/site/docs/spec/configuration.html:152
@@ -1129,17 +1520,24 @@ msgstr "Información general"
msgid ""
"I2P includes a plugin architecture\n"
"to support easy development and installation of additional software."
-msgstr "I2P incluye una arquitectura de pluguins para dar soporte a la instalación fácil y desarrollo fácil de aplicaciones adicionales."
+msgstr ""
+"I2P incluye una arquitectura de pluguins para dar soporte a la "
+"instalación fácil y desarrollo fácil de aplicaciones adicionales."
#: i2p2www/pages/site/docs/plugins.html:12
msgid ""
-"There are now plugins available that support distributed email, blogs, IRC\n"
+"There are now plugins available that support distributed email, blogs, "
+"IRC\n"
"clients, distributed file storage, wikis, and more."
-msgstr "Ahora hay plugins disponibles que soportan email distribuido, blogs, \nclientes IRC, almacenamiento de ficheros distribuido, wikis y más."
+msgstr ""
+"Ahora hay plugins disponibles que soportan email distribuido, blogs, \n"
+"clientes IRC, almacenamiento de ficheros distribuido, wikis y más."
#: i2p2www/pages/site/docs/plugins.html:17
msgid "Benefits to i2p users and app developers:"
-msgstr "Los beneficios para los usuarios de I2P y los desarrolladores de aplicaciones son:"
+msgstr ""
+"Los beneficios para los usuarios de I2P y los desarrolladores de "
+"aplicaciones son:"
#: i2p2www/pages/site/docs/plugins.html:22
msgid "Easy distribution of applications"
@@ -1149,13 +1547,19 @@ msgstr "Fácil distribución de aplicaciones"
msgid ""
"Allows innovation and use of additional libraries without worrying about\n"
"increasing the size of i2pupdate.sud
"
-msgstr "Permite la innovación y el uso de librerías adicionales sin preocuparse por el \nincremento de tamaño de i2pupdate.sud
"
+msgstr ""
+"Permite la innovación y el uso de librerías adicionales sin preocuparse "
+"por el \n"
+"incremento de tamaño de i2pupdate.sud
"
#: i2p2www/pages/site/docs/plugins.html:31
msgid ""
-"Support large or special-purpose applications that would never be bundled\n"
+"Support large or special-purpose applications that would never be bundled"
+"\n"
"with the I2P installation"
-msgstr "Soporta aplicaciones grandes o de proposito-especial que nunca serían \nempaquetadas con la instalación de I2P"
+msgstr ""
+"Soporta aplicaciones grandes o de proposito-especial que nunca serían \n"
+"empaquetadas con la instalación de I2P"
#: i2p2www/pages/site/docs/plugins.html:36
msgid "Cryptographically signed and verified applications"
@@ -1167,15 +1571,21 @@ msgstr "Actualizaciones automáticas de aplicaciones, igual que para el router"
#: i2p2www/pages/site/docs/plugins.html:44
msgid ""
-"Separate initial install and update packages, if desired, for smaller update"
-" downloads"
-msgstr "Paquetes separados para la instalación inicial y las actualizaciones, si se \ndesea, para tener descargas de actualizaciones más pequeñas"
+"Separate initial install and update packages, if desired, for smaller "
+"update downloads"
+msgstr ""
+"Paquetes separados para la instalación inicial y las actualizaciones, si "
+"se \n"
+"desea, para tener descargas de actualizaciones más pequeñas"
#: i2p2www/pages/site/docs/plugins.html:48
msgid ""
"One-click installation of applications. No more asking users to modify\n"
"wrapper.config
or clients.config
"
-msgstr "Instalación de aplicaciones en un-sólo-clic. Sin preguntar más al usuario \npara modificar wrapper.config
o clients.config
"
+msgstr ""
+"Instalación de aplicaciones en un-sólo-clic. Sin preguntar más al usuario"
+" \n"
+"para modificar wrapper.config
o clients.config
"
#: i2p2www/pages/site/docs/plugins.html:53
msgid "Isolate applications from the base $I2P
installation"
@@ -1185,7 +1595,11 @@ msgstr "Aplicaciones aisladas desde la instalación base de $I2P
"
msgid ""
"Automatic compatibility checking for I2P version, Java version, Jetty\n"
"version, and previous installed application version"
-msgstr "Comprobación automática de compatibilidad para la versión de I2P, la versión \nde Java, la versión de Jetty, y versiones de la aplicación previamente instaladas"
+msgstr ""
+"Comprobación automática de compatibilidad para la versión de I2P, la "
+"versión \n"
+"de Java, la versión de Jetty, y versiones de la aplicación previamente "
+"instaladas"
#: i2p2www/pages/site/docs/plugins.html:62
msgid "Automatic link addition in console"
@@ -1195,19 +1609,26 @@ msgstr "Añadido automático de enlaces en la consola"
msgid ""
"Automatic startup of application, including modifying classpath, without "
"requiring a restart"
-msgstr "Inicio automático de la aplicación, incluyendo modificación de la ruta de \nclases (`classpath`), sin requerir un reinicio"
+msgstr ""
+"Inicio automático de la aplicación, incluyendo modificación de la ruta de"
+" \n"
+"clases (`classpath`), sin requerir un reinicio"
#: i2p2www/pages/site/docs/plugins.html:70
-msgid ""
-"Automatic integration and startup of webapps into console Jetty instance"
-msgstr "Integración automática e inicio de aplicaciones web en la instancia de \nconsola Jetty"
+msgid "Automatic integration and startup of webapps into console Jetty instance"
+msgstr ""
+"Integración automática e inicio de aplicaciones web en la instancia de \n"
+"consola Jetty"
#: i2p2www/pages/site/docs/plugins.html:74
#, python-format
msgid ""
"Facilitate creation of 'app stores' like the one at\n"
"%(pluginsite)s"
-msgstr "Facilita la creación de 'app stores' (tiendas de aplicaciones) como la de \n%(pluginsite)s"
+msgstr ""
+"Facilita la creación de 'app stores' (tiendas de aplicaciones) como la de"
+" \n"
+"%(pluginsite)s"
#: i2p2www/pages/site/docs/plugins.html:79
msgid "One-click uninstall"
@@ -1239,23 +1660,52 @@ msgstr "Instalación"
#: i2p2www/pages/site/docs/plugins.html:101
msgid ""
-"To install and start a plugin, copy the .xpi2p
install link to\n"
+"To install and start a plugin, copy the .xpi2p
install link "
+"to\n"
"the form at the bottom of\n"
-"configclients.jsp in\n"
-"your router console and click the \"install plugin\" button. After a\n"
-"plugin is installed and started, a link to the plugin will usually appear at\n"
+"configclients.jsp"
+" in\n"
+"your router console and click the \"install plugin\" button. After a"
+"\n"
+"plugin is installed and started, a link to the plugin will usually appear"
+" at\n"
"the top of your summary bar."
-msgstr "Para instalar e iniciar un plugin, copie el enlace de instalación .xpi2p
en \nel formulario al final de configclients.jsp en la consola de su router y \nhaga clic en el botón \"instalar plugin\". Después de que un plugin sea instalado e iniciado, un enlace al plugin aparecerá normalmente en la parte superior de su barra de resumen."
+msgstr ""
+"Para instalar e iniciar un plugin, copie el enlace de instalación "
+".xpi2p
en \n"
+"el formulario al final de configclients.jsp"
+" en la consola de su router y \n"
+"haga clic en el botón \"instalar plugin\". Después de que un plugin sea "
+"instalado e iniciado, un enlace al plugin aparecerá normalmente en la "
+"parte superior de su barra de resumen."
#: i2p2www/pages/site/docs/plugins.html:110
msgid ""
-"To update a plugin to the latest version, just click the update button on\n"
-"configclients.jsp.\n"
-"There is also a button to check if the plugin has a more recent version, as\n"
-"well as a button to check for updates for all plugins. Plugins will be checked\n"
-"for updates automatically when updating to a new I2P release (not including dev\n"
+"To update a plugin to the latest version, just click the update button on"
+"\n"
+"configclients.jsp."
+"\n"
+"There is also a button to check if the plugin has a more recent version, "
+"as\n"
+"well as a button to check for updates for all plugins. Plugins will be "
+"checked\n"
+"for updates automatically when updating to a new I2P release (not "
+"including dev\n"
"builds)."
-msgstr "Para actualizar un plugin a la última versión, tan solo haga clic en el botón de actualización sobre configclients.jsp. También hay un botón para \ncomprobar si el plugin tiene una versión más reciente, así como un botón \npara buscar actualizaciones para todos los plugins. Se comprobará si hay \nactualizaciones para los plugins automáticamente cuando se actualice a \nuna nueva versión de I2P (sin incluir las versiones de desarrollo)."
+msgstr ""
+"Para actualizar un plugin a la última versión, tan solo haga clic en el "
+"botón de actualización sobre configclients.jsp."
+" También hay un botón para \n"
+"comprobar si el plugin tiene una versión más reciente, así como un botón"
+" \n"
+"para buscar actualizaciones para todos los plugins. Se comprobará si hay"
+" \n"
+"actualizaciones para los plugins automáticamente cuando se actualice a \n"
+"una nueva versión de I2P (sin incluir las versiones de desarrollo)."
#: i2p2www/pages/site/docs/plugins.html:120
msgid "Development"
@@ -1264,23 +1714,38 @@ msgstr "Desarrollo"
#: i2p2www/pages/site/docs/plugins.html:121
#, python-format
msgid ""
-"See the latest plugin specification and the\n"
+"See the latest plugin specification and "
+"the\n"
"plugin forum on %(zzz)s."
-msgstr "Vea las últimas especificaciones de plugins y el \nforum de plugins en %(zzz)s."
+msgstr ""
+"Vea las últimas especificaciones de "
+"plugins y el \n"
+"forum de plugins en %(zzz)s."
#: i2p2www/pages/site/docs/plugins.html:126
#, python-format
msgid ""
-"See also the sources for plugins developed by various people. Some plugins, such\n"
-"as snowman, were developed\n"
+"See also the sources for plugins developed by various people. Some "
+"plugins, such\n"
+"as snowman, were "
+"developed\n"
"specifically as examples."
-msgstr "Vea también las fuentes de los plugins desarrollados por diferentes personas. \nAlgunos plugins como snowman, fueron desarrollados específicamente \ncomo ejemplos."
+msgstr ""
+"Vea también las fuentes de los plugins desarrollados por diferentes "
+"personas. \n"
+"Algunos plugins como snowman, fueron "
+"desarrollados específicamente \n"
+"como ejemplos."
#: i2p2www/pages/site/docs/plugins.html:132
msgid ""
-"Developers wanted! Plugins are a great way to learn more about I2P\n"
+"Developers wanted! Plugins are a great way to learn more about I2P"
+"\n"
"or easily add some feature."
-msgstr "¡Se buscan desarrolladores! Los plugins son una gran manera de \naprender más acerca de I2P o de añadir fácilmente alguna característica."
+msgstr ""
+"¡Se buscan desarrolladores! Los plugins son una gran manera de \n"
+"aprender más acerca de I2P o de añadir fácilmente alguna característica."
#: i2p2www/pages/site/docs/plugins.html:137
msgid "Getting Started"
@@ -1290,8 +1755,13 @@ msgstr "Primeros pasos"
#, python-format
msgid ""
"To create a plugin from an existing binary package you will need to get\n"
-"makeplugin.sh from the i2p.scripts branch in monotone."
-msgstr "Para crear un plugin desde un paquete binario existente necesitará obtener \nmakeplugin.sh desde el ramal (`branch`) de i2p.scripts en monotone."
+"makeplugin.sh from the i2p.scripts branch in "
+"monotone."
+msgstr ""
+"Para crear un plugin desde un paquete binario existente necesitará "
+"obtener \n"
+"makeplugin.sh desde el ramal (`branch`) de "
+"i2p.scripts en monotone."
#: i2p2www/pages/site/docs/plugins.html:144
msgid "Known Issues"
@@ -1301,14 +1771,22 @@ msgstr "Problemas conocidos"
msgid ""
"Note that the router's plugin architecture does NOT currently\n"
"provide any additional security isolation or sandboxing of plugins."
-msgstr "Observe que la arquitectura del plugin del router actualmente NO\nproporciona seguridad adicional, aislamiento o sandboxing de plugins."
+msgstr ""
+"Observe que la arquitectura del plugin del router actualmente NO\n"
+"proporciona seguridad adicional, aislamiento o sandboxing de plugins."
#: i2p2www/pages/site/docs/plugins.html:151
msgid ""
"Updates of a plugin with included jars (not wars) won't be recognized if\n"
-"the plugin was already run, as it requires class loader trickery to flush the\n"
+"the plugin was already run, as it requires class loader trickery to flush"
+" the\n"
"class cache; a full router restart is required."
-msgstr "Las actualizaciones de un plugin con jars (no wars) incluidos, no serán \nreconocidas si el plugin ya se está ejecutando, ya que requiere usar \ntrucos en el cargador de clases ('class') para limpiar la caché de clases;\nse requiere un reinicio completo del router."
+msgstr ""
+"Las actualizaciones de un plugin con jars (no wars) incluidos, no serán \n"
+"reconocidas si el plugin ya se está ejecutando, ya que requiere usar \n"
+"trucos en el cargador de clases ('class') para limpiar la caché de "
+"clases;\n"
+"se requiere un reinicio completo del router."
#: i2p2www/pages/site/docs/plugins.html:157
msgid "The stop button may be displayed even if there is nothing to stop."
@@ -1316,28 +1794,49 @@ msgstr "El botón de parada podría mostarse incluso si no hay nada que parar."
#: i2p2www/pages/site/docs/plugins.html:161
msgid ""
-"Plugins running in a separate JVM create a logs/
directory in\n"
+"Plugins running in a separate JVM create a logs/
directory "
+"in\n"
+"$CWD
."
+msgstr ""
+"Los plugins ejecutandose en una JVM crean un directorio "
+"logs/
en \n"
"$CWD
."
-msgstr "Los plugins ejecutandose en una JVM crean un directorio logs/
en \n$CWD
."
#: i2p2www/pages/site/docs/plugins.html:166
msgid ""
-"No initial keys are present, except for those of jrandom and zzz (using the\n"
+"No initial keys are present, except for those of jrandom and zzz (using "
+"the\n"
"same keys as for router update), so the first key seen for a signer is\n"
"automatically accepted—there is no signing key authority."
-msgstr "No hay claves inciales presentes, excepto para aquellos de `jrandom` y `zzz` \n(que usan las mismas claves que para la actualización del router), por \nlo que la primera clave vista para un firmante es automáticamente \naceptada—no hay autoridad de clave de firmado."
+msgstr ""
+"No hay claves inciales presentes, excepto para aquellos de `jrandom` y "
+"`zzz` \n"
+"(que usan las mismas claves que para la actualización del router), por \n"
+"lo que la primera clave vista para un firmante es automáticamente \n"
+"aceptada—no hay autoridad de clave de firmado."
#: i2p2www/pages/site/docs/plugins.html:172
msgid ""
-"When deleting a plugin, the directory is not always deleted, especially on\n"
+"When deleting a plugin, the directory is not always deleted, especially "
+"on\n"
"Windows."
-msgstr "Cuando se borra un plugin el directorio no siempre se borra, especialmente \nsobre Windows."
+msgstr ""
+"Cuando se borra un plugin el directorio no siempre se borra, "
+"especialmente \n"
+"sobre Windows."
#: i2p2www/pages/site/docs/plugins.html:177
msgid ""
-"Installing a plugin requiring Java 1.6 on a Java 1.5 machine will result in a\n"
-"\"plugin is corrupt\" message if pack200 compression of the plugin file is used."
-msgstr "Instalar un plugin que requiere Java 1.6 sobre una máquina Java 1.5 resultará \nen un mensaje \"el plugin está corrupto\" si se usó la compresión pack200 \nen el fichero del plugin."
+"Installing a plugin requiring Java 1.6 on a Java 1.5 machine will result "
+"in a\n"
+"\"plugin is corrupt\" message if pack200 compression of the plugin file "
+"is used."
+msgstr ""
+"Instalar un plugin que requiere Java 1.6 sobre una máquina Java 1.5 "
+"resultará \n"
+"en un mensaje \"el plugin está corrupto\" si se usó la compresión pack200"
+" \n"
+"en el fichero del plugin."
#: i2p2www/pages/site/docs/plugins.html:182
msgid "Theme and translation plugins are untested."
@@ -1357,10 +1856,15 @@ msgstr "Mayo de 2013"
#: i2p2www/pages/site/docs/ports.html:7
msgid ""
-"These are the ports used or reserved by I2P, including those for known plugins,\n"
+"These are the ports used or reserved by I2P, including those for known "
+"plugins,\n"
"common alternates,\n"
"and some typical related applications."
-msgstr "Estos son los puertos usados o reservados por I2P, incluyendo aquellos para plugins conocidos, \nalternativas comunes, \ny algunas aplicaciones típicas relacionadas."
+msgstr ""
+"Estos son los puertos usados o reservados por I2P, incluyendo aquellos "
+"para plugins conocidos, \n"
+"alternativas comunes, \n"
+"y algunas aplicaciones típicas relacionadas."
#: i2p2www/pages/site/docs/ports.html:13
#, python-format
@@ -1371,7 +1875,13 @@ msgid ""
"Plugin authors please add any ports you use here.\n"
"For new plugins, we recommend using the next available port\n"
"in the 766x range."
-msgstr "Observe que muchos de estos no están habilitados de forma predeterminada. \nHay más información en las FAQ. Vea también la documentación para plugins individuales. Los autores de los \nplugins por favor añadan cualquier puerto que usen aquí. Para nuevos \nplugins recomendamos usar el siguiente puerto disponible en el rango 766x."
+msgstr ""
+"Observe que muchos de estos no están habilitados de forma predeterminada."
+" \n"
+"Hay más información en las FAQ. Vea también"
+" la documentación para plugins individuales. Los autores de los \n"
+"plugins por favor añadan cualquier puerto que usen aquí. Para nuevos \n"
+"plugins recomendamos usar el siguiente puerto disponible en el rango 766x."
#: i2p2www/pages/site/docs/ports.html:53
msgid "recommended spot for new plugins/applications"
@@ -1399,21 +1909,39 @@ msgid ""
"The command channel is only needed for making or setting the initial\n"
"destination key, and to set the destination key to port bindings. \n"
"All connections run in parallel."
-msgstr "BOB tiene canales separados de comandos y de datos. \nUno, un socket de canal de comandos de aplicación hacia el router.\nDos, los sockets de datos de aplicación hacia/desde el router, que portan \nsólo datos.\nEl canal de comandos sólo es necesario para generar o establecer la clave \nde destino inicial, y para establecer las ligaduras (`bindings`) de las claves \nde destino con los puertos. Todas las conexiones se ejecutan en paralelo."
+msgstr ""
+"BOB tiene canales separados de comandos y de datos. \n"
+"Uno, un socket de canal de comandos de aplicación hacia el router.\n"
+"Dos, los sockets de datos de aplicación hacia/desde el router, que portan"
+" \n"
+"sólo datos.\n"
+"El canal de comandos sólo es necesario para generar o establecer la clave"
+" \n"
+"de destino inicial, y para establecer las ligaduras (`bindings`) de las "
+"claves \n"
+"de destino con los puertos. Todas las conexiones se ejecutan en paralelo."
#: i2p2www/pages/site/docs/api/bob.html:23
msgid ""
"SAM has one connection that does everything, and you need to parse every "
"packet."
-msgstr "SAM tiene una conexión que hace todo, y usted necesita procesar todos los paquetes."
+msgstr ""
+"SAM tiene una conexión que hace todo, y usted necesita procesar todos los"
+" paquetes."
#: i2p2www/pages/site/docs/api/bob.html:27
msgid ""
"BOB does not hold keypair values, nor does the router.\n"
"Your application holds the keypair values. \n"
-"This is to reduce any extra complexity in the router code, it also adds to\n"
+"This is to reduce any extra complexity in the router code, it also adds "
+"to\n"
"your privacy."
-msgstr "BOB no retiene valores de parejas de claves, tampoco lo hace el router. \nLa aplicación de usted retiene los valores de parejas de claves.\nEsto es para reducir cualquier complejidad extra en el código del router, \ntambién contribuye a su privacidad."
+msgstr ""
+"BOB no retiene valores de parejas de claves, tampoco lo hace el router. \n"
+"La aplicación de usted retiene los valores de parejas de claves.\n"
+"Esto es para reducir cualquier complejidad extra en el código del router,"
+" \n"
+"también contribuye a su privacidad."
#: i2p2www/pages/site/docs/api/bob.html:34
msgid "SAM router stores every keypair you ever make."
@@ -1434,41 +1962,64 @@ msgstr "CLAVE
= clave pública, también BASE64"
#: i2p2www/pages/site/docs/api/bob.html:48
msgid ""
"ERROR
as is implied returns the message \"ERROR "
-"\"+DESCRIPTION+\"\\n\"
, where the DESCRIPTION
is what "
-"went wrong."
-msgstr "ERROR
como está implícito, devuelve el mensaje \"ERROR \"+DESCRIPCIÓN+\"\\n\"
, donde la DESCRIPCIÓN
es lo que fue mal."
+"\"+DESCRIPTION+\"\\n\", where the DESCRIPTION
is what"
+" went wrong."
+msgstr ""
+"ERROR
como está implícito, devuelve el mensaje \"ERROR"
+" \"+DESCRIPCIÓN+\"\\n\"
, donde la DESCRIPCIÓN
es lo "
+"que fue mal."
#: i2p2www/pages/site/docs/api/bob.html:51
msgid ""
-"OK
returns \"OK\"
, and if data is to be returned, "
-"it is on the same line. OK
means the command is finished."
-msgstr "OK
devuelve \"OK\"
, y si se van a devolver datos, se hará en la misma línea. OK
significa que el comando ha finalizado."
+"OK
returns \"OK\"
, and if data is to be "
+"returned, it is on the same line. OK
means the command is "
+"finished."
+msgstr ""
+"OK
devuelve \"OK\"
, y si se van a devolver "
+"datos, se hará en la misma línea. OK
significa que el "
+"comando ha finalizado."
#: i2p2www/pages/site/docs/api/bob.html:54
msgid ""
-"DATA
lines contain information that you requested. There may be"
-" multiple DATA
lines per request."
-msgstr "DATOS
líneas conteniendo la información que usted solicitó. Puede haber múltiples líneas de DATOS
por solicitud."
+"DATA
lines contain information that you requested. There may"
+" be multiple DATA
lines per request."
+msgstr ""
+"DATOS
líneas conteniendo la información que usted solicitó. "
+"Puede haber múltiples líneas de DATOS
por solicitud."
#: i2p2www/pages/site/docs/api/bob.html:58
msgid ""
-"NOTE: The help command is the ONLY command that has an exception to\n"
+"NOTE: The help command is the ONLY command that has an exception "
+"to\n"
"the rules... it can actually return nothing! This is intentional, since\n"
"help is a HUMAN and not an APPLICATION command."
-msgstr "NOTA: El comando `help` es el ÚNICO comando que tiene una \nexcepción a las reglas... actualmente puede devolver ¡nada! Es intencionado, \ndado que `help` es un HUMANO y no un comando de APLICACIÓN."
+msgstr ""
+"NOTA: El comando `help` es el ÚNICO comando que tiene una \n"
+"excepción a las reglas... actualmente puede devolver ¡nada! Es "
+"intencionado, \n"
+"dado que `help` es un HUMANO y no un comando de APLICACIÓN."
#: i2p2www/pages/site/docs/api/bob.html:64
msgid ""
"PLEASE NOTE:\n"
-"For CURRENT details on the commands PLEASE use the built-in help command. \n"
-"Just telnet to localhost 2827 and type help and you can get full documentation on each command."
-msgstr "POR FAVOR OBSERVE QUE: Para detalles ACTUALES de los comandos POR FAVOR use el comando interno `help`. \nTan sólo haga telnet al localhost 2827, teclee `help` y podrá obtener la \ndocumentación completa para cada comando."
+"For CURRENT details on the commands PLEASE use the built-in help command."
+" \n"
+"Just telnet to localhost 2827 and type help and you can get full "
+"documentation on each command."
+msgstr ""
+"POR FAVOR OBSERVE QUE: Para detalles ACTUALES de los comandos POR "
+"FAVOR use el comando interno `help`. \n"
+"Tan sólo haga telnet al localhost 2827, teclee `help` y podrá obtener la"
+" \n"
+"documentación completa para cada comando."
#: i2p2www/pages/site/docs/api/bob.html:70
msgid ""
-"Commands never get obsoleted or changed, however new commands do get added "
-"from time to time."
-msgstr "Los comandos nunca cambian o se vuelven obsoletos, sin embargo nuevos comandos son añadidos de cuando en cuando."
+"Commands never get obsoleted or changed, however new commands do get "
+"added from time to time."
+msgstr ""
+"Los comandos nunca cambian o se vuelven obsoletos, sin embargo nuevos "
+"comandos son añadidos de cuando en cuando."
#: i2p2www/pages/site/docs/api/bob.html:74
msgid "Here are the commands we have as of this writing:"
@@ -1488,32 +2039,77 @@ msgstr "DEVUELVE"
#: i2p2www/pages/site/docs/api/bob.html:106
msgid ""
-"Once set up, all TCP sockets can and will block as needed, and there is no need for any \n"
-"additional messages to/from the command channel. This allows the router to pace the\n"
-"stream without exploding with OOM like SAM does as it chokes on attempting to shove \n"
-"many streams in or out one socket -- that can't scale when you have alot of connections!"
-msgstr "Una vez configurado, todos los sockets TCP pueden y bloquearán según se \nnecesite, y no hay necesidad de mensaje adicional alguno hacia/desde el \ncanal de comandos. Esto permite al router marcar el paso del stream sin \nreventar con un OOM (out of memory/agotamiento de memoria) como lo hace \nSAM al ahogarse intentando empujar varios streams dentro o fuera de un \nsocket -- ¡que no puede crecer cuando tiene muchas conexiones!"
+"Once set up, all TCP sockets can and will block as needed, and there is "
+"no need for any \n"
+"additional messages to/from the command channel. This allows the router "
+"to pace the\n"
+"stream without exploding with OOM like SAM does as it chokes on "
+"attempting to shove \n"
+"many streams in or out one socket -- that can't scale when you have alot "
+"of connections!"
+msgstr ""
+"Una vez configurado, todos los sockets TCP pueden y bloquearán según se \n"
+"necesite, y no hay necesidad de mensaje adicional alguno hacia/desde el \n"
+"canal de comandos. Esto permite al router marcar el paso del stream sin \n"
+"reventar con un OOM (out of memory/agotamiento de memoria) como lo hace \n"
+"SAM al ahogarse intentando empujar varios streams dentro o fuera de un \n"
+"socket -- ¡que no puede crecer cuando tiene muchas conexiones!"
#: i2p2www/pages/site/docs/api/bob.html:113
msgid ""
-"What is also nice about this particular interface is that writing anything to interface \n"
-"to it, is much much easier than SAM. There is no other processing to do after the set up.\n"
-"It's configuration is so simple, that very simple tools, such as nc (netcat) can be used \n"
-"to point to some application. The value there is that one could schedule up and down times \n"
-"for an application, and not have to change the application to do that, or to even have \n"
-"to stop that application. Instead, you can literally \"unplug\" the destination, and \n"
-"\"plug it in\" again. As long as the same IP/port addresses and destination keys are used \n"
-"when bringing the bridge up, the normal TCP application won't care, and won't notice.\n"
-"It will simply be fooled -- the destinations are not reachable, and that nothing is coming in."
-msgstr "Lo que también es agradable acerca de esta interfaz en particular es que \nescribir algo para la interfaz, es mucho mucho más fácil que para SAM. \nNo hay ningún otro proceso que realizar después de configurarla. Su \nconfiguración es tan simple, que muchas aplicaciones sencillas, tales \ncomo nc (netcat) se pueden usar para apuntar a alguna aplicación. El valor \nahí es que uno puede programar periodos de actividad e inactividad para \nuna aplicación, sin tener que cambiar la aplicación para hacer eso, o \nincluso sin tener que detener esa aplicación. En su lugar, puede literalmente\n\"desenchufar\" el destino, y \"enchufarlo\" de nuevo. Mientras las mismas \ndirecciones IP/puerto y claves de destino sean usadas al levantar la \npasarela, a las aplicaciones TCP normales no les importará, y no lo notarán. Simplemente serán engañadas -- los destinos no son alcanzables, \ny así nada va a recibirse."
+"What is also nice about this particular interface is that writing "
+"anything to interface \n"
+"to it, is much much easier than SAM. There is no other processing to do "
+"after the set up.\n"
+"It's configuration is so simple, that very simple tools, such as nc "
+"(netcat) can be used \n"
+"to point to some application. The value there is that one could schedule "
+"up and down times \n"
+"for an application, and not have to change the application to do that, or"
+" to even have \n"
+"to stop that application. Instead, you can literally \"unplug\" the "
+"destination, and \n"
+"\"plug it in\" again. As long as the same IP/port addresses and "
+"destination keys are used \n"
+"when bringing the bridge up, the normal TCP application won't care, and "
+"won't notice.\n"
+"It will simply be fooled -- the destinations are not reachable, and that "
+"nothing is coming in."
+msgstr ""
+"Lo que también es agradable acerca de esta interfaz en particular es que"
+" \n"
+"escribir algo para la interfaz, es mucho mucho más fácil que para SAM. \n"
+"No hay ningún otro proceso que realizar después de configurarla. Su \n"
+"configuración es tan simple, que muchas aplicaciones sencillas, tales \n"
+"como nc (netcat) se pueden usar para apuntar a alguna aplicación. El "
+"valor \n"
+"ahí es que uno puede programar periodos de actividad e inactividad para \n"
+"una aplicación, sin tener que cambiar la aplicación para hacer eso, o \n"
+"incluso sin tener que detener esa aplicación. En su lugar, puede "
+"literalmente\n"
+"\"desenchufar\" el destino, y \"enchufarlo\" de nuevo. Mientras las "
+"mismas \n"
+"direcciones IP/puerto y claves de destino sean usadas al levantar la \n"
+"pasarela, a las aplicaciones TCP normales no les importará, y no lo "
+"notarán. Simplemente serán engañadas -- los destinos no son alcanzables,"
+" \n"
+"y así nada va a recibirse."
#: i2p2www/pages/site/docs/api/bob.html:125
msgid ""
-"For the following example, we'll setup a very simple local loopback connection, \n"
-"with two destinations. Destination \"mouth\" will be the CHARGEN service from \n"
-"the INET superserver daemon. Destination \"ear\" will be a local port that you\n"
+"For the following example, we'll setup a very simple local loopback "
+"connection, \n"
+"with two destinations. Destination \"mouth\" will be the CHARGEN service "
+"from \n"
+"the INET superserver daemon. Destination \"ear\" will be a local port "
+"that you\n"
"can telnet into, and watch the pretty ASCII test puke forth."
-msgstr "Para el siguiente ejemplo, estableceremos un conexión loopback local \nmuy simple, con dos destinos. El destino \"boca\" será el servicio \nCHARGEN desde el demonio superservidor INET. El destino \"oido\" será \nun puerto local sobre el que podrá hacer telnet, y observar el precioso \nASCII de prueba vomitado."
+msgstr ""
+"Para el siguiente ejemplo, estableceremos un conexión loopback local \n"
+"muy simple, con dos destinos. El destino \"boca\" será el servicio \n"
+"CHARGEN desde el demonio superservidor INET. El destino \"oido\" será \n"
+"un puerto local sobre el que podrá hacer telnet, y observar el precioso \n"
+"ASCII de prueba vomitado."
#: i2p2www/pages/site/docs/api/bob.html:133
msgid "EXAMPLE SESSION DIALOGUE -- simple telnet 127.0.0.1 2827 works"
@@ -1560,33 +2156,50 @@ msgstr "ANOTE LA CLAVE DE DESTINO ANTERIOR, ¡LA SUYA SERÁ DIFERENTE!"
#: i2p2www/pages/site/docs/api/bob.html:158
msgid ""
-"At this point, there was no error, a destination with a nickname of \"mouth\" \n"
-"is set up. When you contact the destination provided, you actually connect \n"
+"At this point, there was no error, a destination with a nickname of "
+"\"mouth\" \n"
+"is set up. When you contact the destination provided, you actually "
+"connect \n"
"to the CHARGEN
service on 19/TCP
."
-msgstr "En este punto no hubo error, un destino con un apodo de \"boca\" está \nestablecido. Cuando contacte con el destino proporcionado, en realidad \nconectará con el servicio CHARGEN
sobre 19/TCP
."
+msgstr ""
+"En este punto no hubo error, un destino con un apodo de \"boca\" está \n"
+"establecido. Cuando contacte con el destino proporcionado, en realidad \n"
+"conectará con el servicio CHARGEN
sobre 19/TCP
."
#: i2p2www/pages/site/docs/api/bob.html:164
-msgid ""
-"Now for the other half, so that we can actually contact this destination."
-msgstr "Ahora para la otra mitad, para que realmente podamos contactar con este destino."
+msgid "Now for the other half, so that we can actually contact this destination."
+msgstr ""
+"Ahora para la otra mitad, para que realmente podamos contactar con este "
+"destino."
#: i2p2www/pages/site/docs/api/bob.html:184
msgid ""
"Now all we need to do is telnet into 127.0.0.1, port 37337,\n"
-"send the destination key or host address from addressbook we want to contact.\n"
+"send the destination key or host address from addressbook we want to "
+"contact.\n"
"In this case, we want to contact \"mouth\", all we do is paste in the\n"
"key and it goes."
-msgstr "Ahora todo lo que necesitamos es hacer telnet a 127.0.0.1, puerto 37337, \nenviar la clave destino o la dirección del servidor de la libreta de direcciones \ncon la que queramos contactar. En este caso, queremos contactar con \n\"boca\", todo lo que haremos es pegar la clave e irá."
+msgstr ""
+"Ahora todo lo que necesitamos es hacer telnet a 127.0.0.1, puerto 37337,"
+" \n"
+"enviar la clave destino o la dirección del servidor de la libreta de "
+"direcciones \n"
+"con la que queramos contactar. En este caso, queremos contactar con \n"
+"\"boca\", todo lo que haremos es pegar la clave e irá."
#: i2p2www/pages/site/docs/api/bob.html:191
msgid ""
-"NOTE: The \"quit\" command in the command channel does NOT disconnect"
-" the tunnels like SAM."
-msgstr "NOTA: El comando \"quit\" en el canal de comandos NO desconecta \nlos túneles como SAM."
+"NOTE: The \"quit\" command in the command channel does NOT "
+"disconnect the tunnels like SAM."
+msgstr ""
+"NOTA: El comando \"quit\" en el canal de comandos NO desconecta \n"
+"los túneles como SAM."
#: i2p2www/pages/site/docs/api/bob.html:208
msgid "After a few virtual miles of this spew, press Control-]
"
-msgstr "Después de unas pocas millas virtuales de esta eyección, presione Control-]
"
+msgstr ""
+"Después de unas pocas millas virtuales de esta eyección, presione "
+"Control-]
"
#: i2p2www/pages/site/docs/api/bob.html:220
msgid "Here is what happened..."
@@ -1598,15 +2211,29 @@ msgstr "¡También puede conectar con EEPSITES!"
#: i2p2www/pages/site/docs/api/bob.html:261
msgid ""
-"Pretty cool isn't it? Try some other well known EEPSITES if you like, nonexistent ones, \n"
-"etc, to get a feel for what kind of output to expect in different situations. \n"
-"For the most part, it is suggested that you ignore any of the error messages. \n"
-"They would be meaningless to the application, and are only presented for human debugging."
-msgstr "Bastante chulo ¿verdad? Pruebe con algún otro EEPSITE bien conocido si \nprefiere, o con los no existentes, etc. para conseguir una sensación de qué \ntipo de resultado esperar en diferentes situaciones. Para la mayor parte, se \nsugiere que ignore cualquier tipo de mensajes de error. No tendrían significado \npara la aplicación, y sólo son presentados para depuración por humanos."
+"Pretty cool isn't it? Try some other well known EEPSITES if you like, "
+"nonexistent ones, \n"
+"etc, to get a feel for what kind of output to expect in different "
+"situations. \n"
+"For the most part, it is suggested that you ignore any of the error "
+"messages. \n"
+"They would be meaningless to the application, and are only presented for "
+"human debugging."
+msgstr ""
+"Bastante chulo ¿verdad? Pruebe con algún otro EEPSITE bien conocido si \n"
+"prefiere, o con los no existentes, etc. para conseguir una sensación de "
+"qué \n"
+"tipo de resultado esperar en diferentes situaciones. Para la mayor parte,"
+" se \n"
+"sugiere que ignore cualquier tipo de mensajes de error. No tendrían "
+"significado \n"
+"para la aplicación, y sólo son presentados para depuración por humanos."
#: i2p2www/pages/site/docs/api/bob.html:268
msgid "Let's put down our destinations now that we are all done with them."
-msgstr "Desactivemos nuestros destinos ahora que hemos terminado del todo con ellos."
+msgstr ""
+"Desactivemos nuestros destinos ahora que hemos terminado del todo con "
+"ellos."
#: i2p2www/pages/site/docs/api/bob.html:272
msgid "First, lets see what destination nicknames we have."
@@ -1618,16 +2245,26 @@ msgstr "De acuerdo, ahí las tiene. Primero, eliminemos \"boca\" (`mouth`)."
#: i2p2www/pages/site/docs/api/bob.html:298
msgid ""
-"Now to remove \"ear\", note that this is what happens when you type too fast,\n"
+"Now to remove \"ear\", note that this is what happens when you type too "
+"fast,\n"
"and shows you what typical ERROR messages looks like."
-msgstr "Ahora para eliminar \"oido\" (`ear`), note que esto es lo que ocurre cuando teclea\ndemasiado rápido, y le muestra el aspecto de los típicos mensajes de ERROR."
+msgstr ""
+"Ahora para eliminar \"oido\" (`ear`), note que esto es lo que ocurre "
+"cuando teclea\n"
+"demasiado rápido, y le muestra el aspecto de los típicos mensajes de "
+"ERROR."
#: i2p2www/pages/site/docs/api/bob.html:317
msgid ""
"I won't bother to show an example of the receiver end of a bridge\n"
"because it is very simple. There are two possible settings for it, and\n"
"it is toggled with the \"quiet\" command."
-msgstr "No le molestaré mostrando un ejemplo de un receptor final de una pasarela \n(`bridge`) porque es muy simple. Hay dos posibles configuraciones para ello, \ny se accionan con el comando \"quiet\" (silenciar)."
+msgstr ""
+"No le molestaré mostrando un ejemplo de un receptor final de una pasarela"
+" \n"
+"(`bridge`) porque es muy simple. Hay dos posibles configuraciones para "
+"ello, \n"
+"y se accionan con el comando \"quiet\" (silenciar)."
#: i2p2www/pages/site/docs/api/bob.html:323
msgid ""
@@ -1635,7 +2272,13 @@ msgid ""
"listening socket is the destination that is making the contact. It is a\n"
"single line consisting of the BASE64 address followed by a newline.\n"
"Everything after that is for the application to actually consume."
-msgstr "La configuración por defecto es NO silenciado, a y los primeros datos en \nllegar a su socket de escucha es el destiono que está estableciendo el \ncontacto. Es una sola línea consistente en una dirección BASE64 seguida \nde una nueva línea. Todo lo que viene después de aquello es en realidad \npara consumo de la aplicación."
+msgstr ""
+"La configuración por defecto es NO silenciado, a y los primeros datos en"
+" \n"
+"llegar a su socket de escucha es el destiono que está estableciendo el \n"
+"contacto. Es una sola línea consistente en una dirección BASE64 seguida \n"
+"de una nueva línea. Todo lo que viene después de aquello es en realidad \n"
+"para consumo de la aplicación."
#: i2p2www/pages/site/docs/api/bob.html:330
msgid ""
@@ -1645,7 +2288,20 @@ msgid ""
"is available on the router console tunnel settings pages, so that you\n"
"can use BOB to point a destination at a web server, for example, and\n"
"you would not have to modify the web server at all."
-msgstr "En modo silencioso, piense en él como en una conexión regular a Internet. \nNo hay dato extra entrante alguno. Es tan solo como si estuviera conectado \nnormalmente al Internet regular. Este modo permite una forma de transparencia \nmuy parecida a la que está disponible en las páginas de configuración del \ntúnel de la consola del router, así que usted puede, por ejemplo, usar BOB \npara apuntar hacia un destino en un servidor web, y no tendría que modificar \npara nada el servidor web."
+msgstr ""
+"En modo silencioso, piense en él como en una conexión regular a Internet."
+" \n"
+"No hay dato extra entrante alguno. Es tan solo como si estuviera "
+"conectado \n"
+"normalmente al Internet regular. Este modo permite una forma de "
+"transparencia \n"
+"muy parecida a la que está disponible en las páginas de configuración del"
+" \n"
+"túnel de la consola del router, así que usted puede, por ejemplo, usar "
+"BOB \n"
+"para apuntar hacia un destino en un servidor web, y no tendría que "
+"modificar \n"
+"para nada el servidor web."
#: i2p2www/pages/site/docs/api/bob.html:339
msgid ""
@@ -1660,7 +2316,25 @@ msgid ""
"and point to a different machine on your LAN while you do updates, or\n"
"point to a set of backup machines depending on what is running, etc,\n"
"etc. Only your imagination limits what you could do with BOB."
-msgstr "La ventaja de usar BOB para esto es la que fue discutida previamente. \nPuede programar periodos de actividad aleatorios para la aplicación, redirigirla \na una máquina diferente, etc. Un uso de esto puede ser algo parecido a \ntratar de confundir acciones de estimación de la conectividad router-destino. \nPuede detener e iniciar el destino con un proceso totalmente diferente para \nestablecer periodos aleatorios de actividad e inactividad para los servicios. De ese modo sólo se estaría deteniendo la capacidad de contactar con tal \nservicio, sin tener que preocuparse cerrándolo y reiniciándolo. Podría redirigir \ny apuntar a una máquina diferente de su LAN, mientras hace actualizaciones, \no apuntar a un conjunto de máquinas de respaldo dependiendo de lo que se esté ejecuntando, etc, etc. Sólo su imaginación limita lo que podría hacer con BOB."
+msgstr ""
+"La ventaja de usar BOB para esto es la que fue discutida previamente. \n"
+"Puede programar periodos de actividad aleatorios para la aplicación, "
+"redirigirla \n"
+"a una máquina diferente, etc. Un uso de esto puede ser algo parecido a \n"
+"tratar de confundir acciones de estimación de la conectividad router-"
+"destino. \n"
+"Puede detener e iniciar el destino con un proceso totalmente diferente "
+"para \n"
+"establecer periodos aleatorios de actividad e inactividad para los "
+"servicios. De ese modo sólo se estaría deteniendo la capacidad de "
+"contactar con tal \n"
+"servicio, sin tener que preocuparse cerrándolo y reiniciándolo. Podría "
+"redirigir \n"
+"y apuntar a una máquina diferente de su LAN, mientras hace "
+"actualizaciones, \n"
+"o apuntar a un conjunto de máquinas de respaldo dependiendo de lo que se "
+"esté ejecuntando, etc, etc. Sólo su imaginación limita lo que podría "
+"hacer con BOB."
#: i2p2www/pages/site/docs/api/datagrams.html:6
msgid "Datagram Overview"
@@ -1669,23 +2343,48 @@ msgstr "Introducción a los datagramas"
#: i2p2www/pages/site/docs/api/datagrams.html:7
#, python-format
msgid ""
-"Datagrams build upon the base I2CP to provide authenticated\n"
-"and repliable messages in a standard format. This lets applications reliably read\n"
-"the \"from\" address out of a datagram and know that the address really sent the\n"
-"message. This is necessary for some applications since the base I2P message is\n"
-"completely raw - it has no \"from\" address (unlike IP packets). In addition, the\n"
+"Datagrams build upon the base I2CP to provide "
+"authenticated\n"
+"and repliable messages in a standard format. This lets applications "
+"reliably read\n"
+"the \"from\" address out of a datagram and know that the address really "
+"sent the\n"
+"message. This is necessary for some applications since the base I2P "
+"message is\n"
+"completely raw - it has no \"from\" address (unlike IP packets). In "
+"addition, the\n"
"message and sender are authenticated by signing the payload."
-msgstr "Los datagramas se construyen sobre la base de I2CP para proporcionar \nautentificación y mensajes respondibles en un formato estandar. \nEsto permite a las aplicaciones leer con fiabilidad la dirección \"from\" (desde)\nde los datragramas, y confirmar que la dirección envió efectivamente el mensaje. \nEsto es necesario para algunas aplicaciones ya que el mensaje base I2P es \ncompletamente crudo (`raw`) - no tiene dirección \"from\" (al contrario que los \npaquetes IP). Además el mensaje y el emisor son autentificados mediante \nel firmado de la carga."
+msgstr ""
+"Los datagramas se construyen sobre la base de I2CP para proporcionar \n"
+"autentificación y mensajes respondibles en un formato estandar. \n"
+"Esto permite a las aplicaciones leer con fiabilidad la dirección \"from\""
+" (desde)\n"
+"de los datragramas, y confirmar que la dirección envió efectivamente el "
+"mensaje. \n"
+"Esto es necesario para algunas aplicaciones ya que el mensaje base I2P es"
+" \n"
+"completamente crudo (`raw`) - no tiene dirección \"from\" (al contrario "
+"que los \n"
+"paquetes IP). Además el mensaje y el emisor son autentificados mediante \n"
+"el firmado de la carga."
#: i2p2www/pages/site/docs/api/datagrams.html:16
#, python-format
msgid ""
"Datagrams, like streaming library packets,\n"
"are an application-level construct.\n"
-"These protocols are independent of the low-level transports;\n"
+"These protocols are independent of the low-level transports;\n"
"the protocols are converted to I2NP messages by the router, and\n"
"either protocol may be carried by either transport."
-msgstr "Los datagramas, al igual que los paquetes de la librería de streaming, son una construcción al nivel de aplicación. Estos protocolos son diferentes de los transportes de bajo nivel; estos protocolos son convertidos en mensajes I2NP por el ruter, y así cualquier protocolo puede ser llevado por cualquier transporte."
+msgstr ""
+"Los datagramas, al igual que los paquetes de la"
+" librería de streaming, son una construcción al nivel de aplicación. "
+"Estos protocolos son diferentes de los transportes de bajo nivel; estos protocolos "
+"son convertidos en mensajes I2NP por el ruter, y así cualquier protocolo "
+"puede ser llevado por cualquier transporte."
#: i2p2www/pages/site/docs/api/datagrams.html:25
msgid "Application Guide"
@@ -1698,9 +2397,16 @@ msgid ""
"datagram API,\n"
"while applications in other languages \n"
"can use SAM's datagram support.\n"
-"There is also limited support in i2ptunnel in the SOCKS proxy,\n"
+"There is also limited support in i2ptunnel in the SOCKS proxy,\n"
"the 'streamr' tunnel types, and udpTunnel classes."
-msgstr "Las aplicaciones escritas en Java pueden usar la API datagram, mientras que las aplicaciones en otros idomas pueden usar \nel soporte datagram de SAM. También hay soporte limitado en i2ptunnel en el proxy SOCKS, los \ntipos de túnel 'streamr', y las clases udpTunnel."
+msgstr ""
+"Las aplicaciones escritas en Java pueden usar la API "
+"datagram, mientras que las aplicaciones en otros idomas pueden usar"
+" \n"
+"el soporte datagram de SAM. También hay soporte "
+"limitado en i2ptunnel en el proxy SOCKS, los \n"
+"tipos de túnel 'streamr', y las clases udpTunnel."
#: i2p2www/pages/site/docs/api/datagrams.html:37
msgid "Datagram Length"
@@ -1708,25 +2414,56 @@ msgstr "Longitud del datagrama"
#: i2p2www/pages/site/docs/api/datagrams.html:38
msgid ""
-"The application designer should carefully consider the tradeoff of repliable vs. non-repliable\n"
-"datagrams. Also, the datagram size will affect reliability, due to tunnel fragmentation into 1KB\n"
-"tunnel messages. The more message fragments, the more likely that one of them will be dropped\n"
-"by an intermediate hop. Messages larger than a few KB are not recommended.\n"
+"The application designer should carefully consider the tradeoff of "
+"repliable vs. non-repliable\n"
+"datagrams. Also, the datagram size will affect reliability, due to tunnel"
+" fragmentation into 1KB\n"
+"tunnel messages. The more message fragments, the more likely that one of "
+"them will be dropped\n"
+"by an intermediate hop. Messages larger than a few KB are not "
+"recommended.\n"
"Over about 10 KB, the delivery probablility drops dramatically.\n"
-"Messages over 16 KB cannot be delivered over NTCP, dropping delivery chances even more."
-msgstr "El diseñador de la aplicación debe considerar cuidadosamente las\ncontrapartidas de datagramas respondibles frente a los no-respondibles. \nEl tamaño del datagrama también afectaría a la fiabilidad, debido a la \nfragmentación del túnel en mensajes de túnel de 1KB. Cuantos más \nfragmentos de mensaje, más probable es que uno de ellos se pierda en un \nsalto intermedio. Los mensajes más largos de unos pocos KB no están \nrecomendados. Por encima de alrededor de 10KB, la probabilidad de entrega \ncae dramáticamente. Los mensajes por encima de 16KB no pueden ser \nentregados sobre NTCP (TCP basado en NIO)."
+"Messages over 16 KB cannot be delivered over NTCP, dropping delivery "
+"chances even more."
+msgstr ""
+"El diseñador de la aplicación debe considerar cuidadosamente las\n"
+"contrapartidas de datagramas respondibles frente a los no-respondibles. \n"
+"El tamaño del datagrama también afectaría a la fiabilidad, debido a la \n"
+"fragmentación del túnel en mensajes de túnel de 1KB. Cuantos más \n"
+"fragmentos de mensaje, más probable es que uno de ellos se pierda en un \n"
+"salto intermedio. Los mensajes más largos de unos pocos KB no están \n"
+"recomendados. Por encima de alrededor de 10KB, la probabilidad de entrega"
+" \n"
+"cae dramáticamente. Los mensajes por encima de 16KB no pueden ser \n"
+"entregados sobre NTCP (TCP basado en NIO)."
#: i2p2www/pages/site/docs/api/datagrams.html:47
#, python-format
msgid ""
-"Also note that the various overheads added by lower layers, in particular asymmetric\n"
-"ElGamal/AES, place a large burden on intermittent messages\n"
-"such as used by a Kademlia-over-UDP application. The implementations are currently tuned\n"
-"for frequent traffic using the streaming library. There are a high number\n"
-"of session tags delivered, and a short session tag lifetime, for example.\n"
-"There are currently no configuration parameters available within I2CP to tune\n"
+"Also note that the various overheads added by lower layers, in particular"
+" asymmetric\n"
+"ElGamal/AES, place a large burden on "
+"intermittent messages\n"
+"such as used by a Kademlia-over-UDP application. The implementations are "
+"currently tuned\n"
+"for frequent traffic using the streaming library. There are a high number"
+"\n"
+"of session tags delivered, and a short session tag lifetime, for example."
+"\n"
+"There are currently no configuration parameters available within I2CP to "
+"tune\n"
"the ElGamal Session Tag parameters."
-msgstr "Observe también que el variado tráfico de control añadido por las capas \ninferiores, en particular la asimétrica ElGamal/AES, coloca una \ngran carga sobre los mensajes intermitentes tales como los usados por \nuna aplicación Kademlia-sobre-UDP. Las implementaciones actualmente \nse ajustan para tráfico frecuente usando la librería streaming. Por \nejemplo, si hay un alto número de etiquetas de sesión entregadas, y una \nvida corta de etiqueta de sesión. Actualmente no hay parámetros de \nconfiguración disponibles dentro de I2CP para ajustar los parametros de \nla Etiqueta de Sesión ElGamal."
+msgstr ""
+"Observe también que el variado tráfico de control añadido por las capas \n"
+"inferiores, en particular la asimétrica ElGamal/AES, coloca una \n"
+"gran carga sobre los mensajes intermitentes tales como los usados por \n"
+"una aplicación Kademlia-sobre-UDP. Las implementaciones actualmente \n"
+"se ajustan para tráfico frecuente usando la librería streaming. Por \n"
+"ejemplo, si hay un alto número de etiquetas de sesión entregadas, y una \n"
+"vida corta de etiqueta de sesión. Actualmente no hay parámetros de \n"
+"configuración disponibles dentro de I2CP para ajustar los parametros de \n"
+"la Etiqueta de Sesión ElGamal."
#: i2p2www/pages/site/docs/api/datagrams.html:57
msgid "I2CP Protocol Number and Ports"
@@ -1737,32 +2474,66 @@ msgid ""
"The standard I2CP protocol number for datagrams is PROTO_DATAGRAM (17).\n"
"Applications may or may not choose to set the\n"
"protocol in the I2CP header. It is not set by default.\n"
-"It must be set to demultiplex datagram and streaming traffic received on the same Destination."
-msgstr "El número stadard del protocolo I2CP (Protocolo de Cliente I2P) para \ndatagramas es PROTO_DATAGRAM (17). Las aplicaciones pueden o no \nelegir establecer el protocolo en la cabecera I2CP. No está establecido por \ndefecto. Debe ser establecido para demultiplexar el datagrama y el tráfico de streaming recibido en el mismo Destino."
+"It must be set to demultiplex datagram and streaming traffic received on "
+"the same Destination."
+msgstr ""
+"El número stadard del protocolo I2CP (Protocolo de Cliente I2P) para \n"
+"datagramas es PROTO_DATAGRAM (17). Las aplicaciones pueden o no \n"
+"elegir establecer el protocolo en la cabecera I2CP. No está establecido "
+"por \n"
+"defecto. Debe ser establecido para demultiplexar el datagrama y el "
+"tráfico de streaming recibido en el mismo Destino."
#: i2p2www/pages/site/docs/api/datagrams.html:65
#, python-format
msgid ""
"As datagrams are not connection-oriented, the application may require\n"
-"port numbers to correlate datagrams with particular peers or communications sessions,\n"
+"port numbers to correlate datagrams with particular peers or "
+"communications sessions,\n"
"as is traditional with UDP over IP.\n"
-"Applications may add 'from' and 'to' ports to the I2CP (gzip) header as described in\n"
+"Applications may add 'from' and 'to' ports to the I2CP (gzip) header as "
+"described in\n"
"the I2CP page."
-msgstr "Como los datagramas no están orientados a la conexión, la aplicación puede \nrequerir números de puerto para correlacionar los datagramas con pares ('peers') concrectos o sesiones de comunicaciones, como es tradicional con UDP sobre IP. Las aplicaciones pueden añadir puertos 'from' (origen) y 'to' (destino) a la cabecera (gzip) I2CP como se describe en la página de I2CP."
+msgstr ""
+"Como los datagramas no están orientados a la conexión, la aplicación "
+"puede \n"
+"requerir números de puerto para correlacionar los datagramas con pares "
+"('peers') concrectos o sesiones de comunicaciones, como es tradicional "
+"con UDP sobre IP. Las aplicaciones pueden añadir puertos 'from' (origen) "
+"y 'to' (destino) a la cabecera (gzip) I2CP como se describe en la página de I2CP."
#: i2p2www/pages/site/docs/api/datagrams.html:73
#, python-format
msgid ""
-"There is no method within the datagram API to specify whether it is non-repliable (raw)\n"
-"or repliable. The application should be designed to expect the appropriate type.\n"
+"There is no method within the datagram API to specify whether it is non-"
+"repliable (raw)\n"
+"or repliable. The application should be designed to expect the "
+"appropriate type.\n"
"The I2CP protocol number or port should be used by the application to\n"
"indicate datagram type.\n"
-"The I2CP protocol numbers PROTO_DATAGRAM (signed) and PROTO_DATAGRAM_RAW are defined in the\n"
+"The I2CP protocol numbers PROTO_DATAGRAM (signed) and PROTO_DATAGRAM_RAW "
+"are defined in the\n"
"I2PSession API\n"
-"for this purpose. A common design pattern in client/server datagram applications is to\n"
-"use signed datagrams for a request which includes a nonce, and use a raw datagram\n"
+"for this purpose. A common design pattern in client/server datagram "
+"applications is to\n"
+"use signed datagrams for a request which includes a nonce, and use a raw "
+"datagram\n"
"for the reply, returning the nonce from the request."
-msgstr "No hay método dentro de la API datagram para especificar si es no-respondible (raw (crudo)) o respondible. La aplicación debe ser designada \npara esperar el tipo apropiado. El número de protocolo I2CP o el puerto \ndebería ser usado por la aplicación para indicar el tipo de datagrama. Los \nnúmeros de protocolo I2CP `PROTO_DATAGRAM_RAW` se definen en la \nAPI I2PSession para este propósito. Un patrón de diseño común en aplicaciones datagrama cliente/servidor es usar \ndatagramas firmados para una petición que incluye un nonce (valor de \nseguridad de un único uso), y usa un datagrama crudo (`raw`) para la \nrespuesta, devolviendo el nonce desde la petición."
+msgstr ""
+"No hay método dentro de la API datagram para especificar si es no-"
+"respondible (raw (crudo)) o respondible. La aplicación debe ser designada"
+" \n"
+"para esperar el tipo apropiado. El número de protocolo I2CP o el puerto \n"
+"debería ser usado por la aplicación para indicar el tipo de datagrama. "
+"Los \n"
+"números de protocolo I2CP `PROTO_DATAGRAM_RAW` se definen en la \n"
+"API I2PSession para este propósito. Un "
+"patrón de diseño común en aplicaciones datagrama cliente/servidor es usar"
+" \n"
+"datagramas firmados para una petición que incluye un nonce (valor de \n"
+"seguridad de un único uso), y usa un datagrama crudo (`raw`) para la \n"
+"respuesta, devolviendo el nonce desde la petición."
#: i2p2www/pages/site/docs/api/datagrams.html:85
#, python-format
@@ -1771,7 +2542,11 @@ msgid ""
"I2PSession API,\n"
"as implemented in\n"
"I2PSessionMuxedImpl."
-msgstr "Los protocolos y puertos pueden ser establecidos en la API I2PSession \nde I2CP, tal como están implementados en I2PSessionMuxedImpl."
+msgstr ""
+"Los protocolos y puertos pueden ser establecidos en la API I2PSession \n"
+"de I2CP, tal como están implementados en I2PSessionMuxedImpl."
#: i2p2www/pages/site/docs/api/datagrams.html:93
#: i2p2www/pages/site/docs/api/streaming.html:381
@@ -1784,7 +2559,11 @@ msgid ""
"Data integrity is assured by the gzip CRC-32 checksum implemented in\n"
"the I2CP layer.\n"
"There is no checksum field in the datagram protocol."
-msgstr "La integridad de los datos está asegurada por el checksum CRC-32 de gzip \nimplementado en la capa I2CP. No hay campo checksum en el protocolo datagram"
+msgstr ""
+"La integridad de los datos está asegurada por el checksum CRC-32 de gzip"
+" \n"
+"implementado en la capa I2CP. No hay "
+"campo checksum en el protocolo datagram"
#: i2p2www/pages/site/docs/api/datagrams.html:100
#: i2p2www/pages/site/docs/api/streaming.html:389
@@ -1794,14 +2573,24 @@ msgstr "Encapsulado de paquetes"
#: i2p2www/pages/site/docs/api/datagrams.html:101
#, python-format
msgid ""
-"Each datagram is sent through I2P as a single message (or as an individual clove in a\n"
+"Each datagram is sent through I2P as a single message (or as an "
+"individual clove in a\n"
"Garlic Message).\n"
"Message encapsulation is implemented in the underlying\n"
"I2CP,\n"
"I2NP, and\n"
"tunnel message layers.\n"
-"There is no packet delimiter mechanism or length field in the datagram protocol."
-msgstr "Cada datagrama se envía a través de I2P como un mensaje único (o como un 'clove' (diente) individual en un `Garlic Message)` (mensaje ajo). \nLa encapsulación del mensaje se implementa en los I2CP, I2NP, y \nlas capas de mensaje de túnel subyacentes. No hay mecanismo \ndelimitador de paquetes o campo de tamaño en el protocolo datagram."
+"There is no packet delimiter mechanism or length field in the datagram "
+"protocol."
+msgstr ""
+"Cada datagrama se envía a través de I2P como un mensaje único (o como un "
+"'clove' (diente) individual en un `Garlic "
+"Message)` (mensaje ajo). \n"
+"La encapsulación del mensaje se implementa en los I2CP, I2NP, y \n"
+"las capas de mensaje de túnel "
+"subyacentes. No hay mecanismo \n"
+"delimitador de paquetes o campo de tamaño en el protocolo datagram."
#: i2p2www/pages/site/docs/api/datagrams.html:114
#: i2p2www/pages/site/docs/spec/datagrams.html:10
@@ -1820,11 +2609,33 @@ msgstr "I2PControl - Servicio de Control Remoto"
#: i2p2www/pages/site/docs/api/i2pcontrol.html:4
#, python-format
msgid ""
-"I2P enables a JSONRPC2 interface via the plugin I2PControl.\n"
-"The aim of the interface is to provide simple way to interface with a running I2P node. A client, itoopie, has been developed in parallel.\n"
-"The JSONRPC2 implementation for the client as well as the plugin is provided by the java libraries JSON-RPC 2.0. \n"
-"A list of implementations of JSON-RPC for various languages can be found at the JSON-RPC wiki."
-msgstr "I2P habilita una interfaz JSONRPC2 a través del plugin I2PControl. \nEl propósito de la interfaz es proporcionar un camino sencillo a la interacción con \nun nodo I2P en ejecución. Un cliente, itoopie, ha sido desarrollado en paralelo. \nLa implementación JSONRPC2 para el cliente, así como el plugin, son \nproporcionados por las librerías Java JSON-RPC 2.0. Una lista de \nimplementaciones de JSON-RPC para diferentes lenguajes puede encontrarse en \nel wiki de JSON-RPC."
+"I2P enables a JSONRPC2 interface via the plugin I2PControl.\n"
+"The aim of the interface is to provide simple way to interface with a "
+"running I2P node. A client, itoopie, has been developed in parallel.\n"
+"The JSONRPC2 implementation for the client as well as the plugin is "
+"provided by the java libraries JSON-RPC 2.0. \n"
+"A list of implementations of JSON-RPC for various languages can be found "
+"at the JSON-RPC "
+"wiki."
+msgstr ""
+"I2P habilita una interfaz JSONRPC2 a través del plugin I2PControl. \n"
+"El propósito de la interfaz es proporcionar un camino sencillo a la "
+"interacción con \n"
+"un nodo I2P en ejecución. Un cliente, itoopie, ha sido desarrollado en "
+"paralelo. \n"
+"La implementación JSONRPC2 para el cliente, así como el plugin, son \n"
+"proporcionados por las librerías Java JSON-RPC "
+"2.0. Una lista de \n"
+"implementaciones de JSON-RPC para diferentes lenguajes puede encontrarse "
+"en \n"
+"el wiki de JSON-"
+"RPC."
#: i2p2www/pages/site/docs/api/i2pcontrol.html:11
msgid "I2PControl is by default listening on localhost:7650"
@@ -1899,9 +2710,11 @@ msgstr "Descripción"
#: i2p2www/pages/site/docs/api/i2pcontrol.html:29
msgid ""
-"Token used for authenticating every request (excluding the 'Authenticate' "
-"RPC method)"
-msgstr "Muestra usada para autentificar cada petición (excluyendo el método RPC 'Authenticate')"
+"Token used for authenticating every request (excluding the 'Authenticate'"
+" RPC method)"
+msgstr ""
+"Muestra usada para autentificar cada petición (excluyendo el método RPC "
+"'Authenticate')"
#: i2p2www/pages/site/docs/api/i2pcontrol.html:37
msgid "Implemented methods"
@@ -1909,8 +2722,11 @@ msgstr "Métodos implemetados"
#: i2p2www/pages/site/docs/api/i2pcontrol.html:38
msgid ""
-"Creates and returns an authentication token used for further communication."
-msgstr "Crea y devuelve un token de autentificación usado para comunicaciones posteriores."
+"Creates and returns an authentication token used for further "
+"communication."
+msgstr ""
+"Crea y devuelve un token de autentificación usado para comunicaciones "
+"posteriores."
#: i2p2www/pages/site/docs/api/i2pcontrol.html:40
msgid "The version of the I2PControl API used by the client."
@@ -1942,9 +2758,11 @@ msgstr "Un valor será devuelto como respuesta."
#: i2p2www/pages/site/docs/api/i2pcontrol.html:98
#: i2p2www/pages/site/docs/api/i2pcontrol.html:142
msgid ""
-"Token used for authenticating the client. Is provided by the server via the "
-"'Authenticate' RPC method."
-msgstr "Token usado para autentificar el cliente. Es provisto por el servidor a través del método RPC 'Authenticate'"
+"Token used for authenticating the client. Is provided by the server via "
+"the 'Authenticate' RPC method."
+msgstr ""
+"Token usado para autentificar el cliente. Es provisto por el servidor a "
+"través del método RPC 'Authenticate'"
#: i2p2www/pages/site/docs/api/i2pcontrol.html:54
msgid "Value of the key 'echo' in the request."
@@ -1954,14 +2772,18 @@ msgstr "Valor de la clave 'echo', clave eco, en la petición."
msgid ""
"Fetches rateStat from router statManager. Creates stat if not already "
"created."
-msgstr "Obtiene el rateStat del StatManager del ruter. Crear el stat si no ha sido creado ya."
+msgstr ""
+"Obtiene el rateStat del StatManager del ruter. Crear el stat si no ha "
+"sido creado ya."
#: i2p2www/pages/site/docs/api/i2pcontrol.html:59
#, python-format
msgid ""
"Determines which rateStat to fetch, see ratestats."
-msgstr "Determina que rateStat debe obtenerse, vea ratestats."
+msgstr ""
+"Determina que rateStat debe obtenerse, vea ratestats."
#: i2p2www/pages/site/docs/api/i2pcontrol.html:60
msgid "Determines which period a stat is fetched for. Measured in ms."
@@ -1979,13 +2801,17 @@ msgstr "Administra I2PControl, Puertos, contraseñas y cosas de ese tipo."
msgid ""
"Sets a new listen address for I2PControl (only 127.0.0.1 and 0.0.0.0 are "
"implemented in I2PControl currently)."
-msgstr "Cambia la dirección donde escucha I2PControl (sólo se han implementado 127.0.0.1 y 0.0.0.0 para I2PControl hasta ahora)."
+msgstr ""
+"Cambia la dirección donde escucha I2PControl (sólo se han implementado "
+"127.0.0.1 y 0.0.0.0 para I2PControl hasta ahora)."
#: i2p2www/pages/site/docs/api/i2pcontrol.html:70
msgid ""
"Sets a new password for I2PControl, all Authentication tokens will be "
"revoked."
-msgstr "Cambia la contraseña para I2PControl, todos los tokens de autentificación serán revocados."
+msgstr ""
+"Cambia la contraseña para I2PControl, todos los tokens de autentificación"
+" serán revocados."
#: i2p2www/pages/site/docs/api/i2pcontrol.html:71
msgid "Switches which port I2PControl will listen for connections on."
@@ -2005,13 +2831,16 @@ msgid "Returns true if any changes were made."
msgstr "Devuelve verdadero si se hizo algún cambio."
#: i2p2www/pages/site/docs/api/i2pcontrol.html:79
-msgid ""
-"Returns true if any changes requiring a restart to take effect were made."
-msgstr "Devuelve verdadero si se hizo algún cambio que necesite un reinicio para tener efecto."
+msgid "Returns true if any changes requiring a restart to take effect were made."
+msgstr ""
+"Devuelve verdadero si se hizo algún cambio que necesite un reinicio para "
+"tener efecto."
#: i2p2www/pages/site/docs/api/i2pcontrol.html:82
msgid "Fetches basic information about the I2P router. Uptime, version etc."
-msgstr "Obtiene información básica sobre el ruter I2P. Tiempo encendido, versión, etc."
+msgstr ""
+"Obtiene información básica sobre el ruter I2P. Tiempo encendido, versión,"
+" etc."
#: i2p2www/pages/site/docs/api/i2pcontrol.html:101
msgid "What the status of the router is."
@@ -2075,8 +2904,11 @@ msgstr "Maneja el arrancado/apagado del ruter I2P."
#: i2p2www/pages/site/docs/api/i2pcontrol.html:137
msgid ""
-"Initiates a router reseed, fetching peers into our NetDB from a remote host."
-msgstr "Inicia el resembrado de un ruter, obteniendo los pares para nuestra NetDB desde un ordenador remoto."
+"Initiates a router reseed, fetching peers into our NetDB from a remote "
+"host."
+msgstr ""
+"Inicia el resembrado de un ruter, obteniendo los pares para nuestra NetDB"
+" desde un ordenador remoto."
#: i2p2www/pages/site/docs/api/i2pcontrol.html:138
msgid "Restarts the router."
@@ -2084,8 +2916,11 @@ msgstr "Reinicia el router."
#: i2p2www/pages/site/docs/api/i2pcontrol.html:139
msgid ""
-"Restarts the router gracefully (waits for participating tunnels to expire)."
-msgstr "Reinicia el ruter con cuidado (espera a que expiren los túneles participantes)."
+"Restarts the router gracefully (waits for participating tunnels to "
+"expire)."
+msgstr ""
+"Reinicia el ruter con cuidado (espera a que expiren los túneles "
+"participantes)."
#: i2p2www/pages/site/docs/api/i2pcontrol.html:140
msgid "Shuts down the router."
@@ -2095,7 +2930,9 @@ msgstr "Apaga el router."
msgid ""
"Shuts down the router gracefully (waits for participating tunnels to "
"expire)."
-msgstr "Apaga el ruter con cuidado (espera a que expiren los túneles participantes)."
+msgstr ""
+"Apaga el ruter con cuidado (espera a que expiren los túneles "
+"participantes)."
#: i2p2www/pages/site/docs/api/i2pcontrol.html:145
msgid "If requested, verifies that a reseed has been initiated."
@@ -2118,85 +2955,113 @@ msgid "If requested, verifies that a graceful shutdown has been initiated"
msgstr "Si se ha requerido, verifica que el apagado con cuidado ha sido iniciado."
#: i2p2www/pages/site/docs/api/i2pcontrol.html:152
-msgid ""
-"Fetches or sets various network related settings. Ports, addresses etc."
-msgstr "Obtiene un conjunto de configuraciones relacionadas con la red. Puertos, direcciones, etc."
+msgid "Fetches or sets various network related settings. Ports, addresses etc."
+msgstr ""
+"Obtiene un conjunto de configuraciones relacionadas con la red. Puertos, "
+"direcciones, etc."
#: i2p2www/pages/site/docs/api/i2pcontrol.html:154
msgid ""
"What port is used for the TCP transport. If null is submitted, current "
"setting will be returned."
-msgstr "Qué puerto es usado para el transporte TCP. Si se ha enviado null, se devolverá la configuración actual."
+msgstr ""
+"Qué puerto es usado para el transporte TCP. Si se ha enviado null, se "
+"devolverá la configuración actual."
#: i2p2www/pages/site/docs/api/i2pcontrol.html:155
msgid ""
-"What hostname is used for the TCP transport. If null is submitted, current "
-"setting will be returned."
-msgstr "Qué nombre de dominio es usado para el transporte TCP. Si se ha enviado null, se devolverá la configuración actual."
+"What hostname is used for the TCP transport. If null is submitted, "
+"current setting will be returned."
+msgstr ""
+"Qué nombre de dominio es usado para el transporte TCP. Si se ha enviado "
+"null, se devolverá la configuración actual."
#: i2p2www/pages/site/docs/api/i2pcontrol.html:156
msgid ""
"Use automatically detected ip for TCP transport. If null is submitted, "
"current setting will be returned."
-msgstr "Usar la ip detectada automáticamente para el transporte TCP . Si se ha enciado null, se devolverá la configuración actual."
+msgstr ""
+"Usar la ip detectada automáticamente para el transporte TCP . Si se ha "
+"enciado null, se devolverá la configuración actual."
#: i2p2www/pages/site/docs/api/i2pcontrol.html:157
msgid ""
"What port is used for the UDP transport. If null is submitted, current "
"setting will be returned."
-msgstr "Qué puerto es usado para el transporte UDP. Si se ha enviado null, se devolverá la configuración actual."
+msgstr ""
+"Qué puerto es usado para el transporte UDP. Si se ha enviado null, se "
+"devolverá la configuración actual."
#: i2p2www/pages/site/docs/api/i2pcontrol.html:158
msgid ""
-"What hostname is used for the UDP transport. If null is submitted, current "
-"setting will be returned."
-msgstr "Qué nombre de dominio es usado para el transporte UDP. Si se ha enviado null, se devolverá la configuración actual."
+"What hostname is used for the UDP transport. If null is submitted, "
+"current setting will be returned."
+msgstr ""
+"Qué nombre de dominio es usado para el transporte UDP. Si se ha enviado "
+"null, se devolverá la configuración actual."
#: i2p2www/pages/site/docs/api/i2pcontrol.html:159
msgid ""
"Which methods should be used for detecting the ip address of the UDP "
"transport. If null is submitted, current setting will be returned."
-msgstr "Qué métodos deben susarse para detectar la dirección ip del transporte UDP. Si se ha enviado null, se devolverá la configuración actual."
+msgstr ""
+"Qué métodos deben susarse para detectar la dirección ip del transporte "
+"UDP. Si se ha enviado null, se devolverá la configuración actual."
#: i2p2www/pages/site/docs/api/i2pcontrol.html:160
msgid "What ip has been detected by the UDP transport."
msgstr "Qué ip ha sido detectada para el transporte UDP."
#: i2p2www/pages/site/docs/api/i2pcontrol.html:161
-msgid ""
-"Is UPnP enabled. If null is submitted, current setting will be returned."
-msgstr "Está UPnP activo. Si se ha enviado null, se devolverá la configuración actual."
+msgid "Is UPnP enabled. If null is submitted, current setting will be returned."
+msgstr ""
+"Está UPnP activo. Si se ha enviado null, se devolverá la configuración "
+"actual."
#: i2p2www/pages/site/docs/api/i2pcontrol.html:162
msgid ""
-"How many percent of bandwidth is usable for participating tunnels. If null "
-"is submitted, current setting will be returned."
-msgstr "Qué tanto por ciento del ancho de banda es utilizable para los túneles participantes. Si se ha enviado null, se devolverá la configuración actual."
+"How many percent of bandwidth is usable for participating tunnels. If "
+"null is submitted, current setting will be returned."
+msgstr ""
+"Qué tanto por ciento del ancho de banda es utilizable para los túneles "
+"participantes. Si se ha enviado null, se devolverá la configuración "
+"actual."
#: i2p2www/pages/site/docs/api/i2pcontrol.html:163
msgid ""
-"How many KB/s of inbound bandwidth is allowed. If null is submitted, current"
-" setting will be returned."
-msgstr "Cuántos KB/s se permiten para el ancho de banda entrante. Si se ha enviado null, se devolverá la configuración actual."
+"How many KB/s of inbound bandwidth is allowed. If null is submitted, "
+"current setting will be returned."
+msgstr ""
+"Cuántos KB/s se permiten para el ancho de banda entrante. Si se ha "
+"enviado null, se devolverá la configuración actual."
#: i2p2www/pages/site/docs/api/i2pcontrol.html:164
msgid ""
"How many KB/s of outbound bandwidth is allowed. If null is submitted, "
"current setting will be returned."
-msgstr "Cuántos KB/s se permiten para el ancho de banda de salida. Si se ha enviado null, se devolverá la configuración actual."
+msgstr ""
+"Cuántos KB/s se permiten para el ancho de banda de salida. Si se ha "
+"enviado null, se devolverá la configuración actual."
#: i2p2www/pages/site/docs/api/i2pcontrol.html:165
msgid ""
-"Is laptop mode enabled (change router identity and UDP port when IP changes "
-"). If null is submitted, current setting will be returned."
-msgstr "Si está el modo laptop activado (el cambio de la identidad del ruter cuando cambia la IP). Si se ha enviado null, se devolverá la configuración actual."
+"Is laptop mode enabled (change router identity and UDP port when IP "
+"changes ). If null is submitted, current setting will be returned."
+msgstr ""
+"Si está el modo laptop activado (el cambio de la identidad del ruter "
+"cuando cambia la IP). Si se ha enviado null, se devolverá la "
+"configuración actual."
#: i2p2www/pages/site/docs/api/i2pcontrol.html:166
msgid ""
-"Token used for authenticating the client. Is provided by the server via the "
-"'Authenticate' RPC method. If null is submitted, current setting will be "
-"returned."
-msgstr "El identificador (`token`) usado para la autentificación del cliente, es proporcionado por el servidor a través del método 'Authenticate' (autentificar) de RPC. Si se envía vacío ('null'), se devolverá el valor de configuración actual."
+"Token used for authenticating the client. Is provided by the server via "
+"the 'Authenticate' RPC method. If null is submitted, current setting will"
+" be returned."
+msgstr ""
+"El identificador (`token`) usado para la autentificación del cliente, es "
+"proporcionado por el servidor a través del método 'Authenticate' "
+"(autentificar) de RPC. Si se envía vacío ('null'), se devolverá el valor "
+"de configuración actual."
#: i2p2www/pages/site/docs/api/i2pcontrol.html:169
msgid "If requested, returns the port used for the TCP transport."
@@ -2204,13 +3069,17 @@ msgstr "Si se solicita, devuelve el puerto usado para el transporte TCP."
#: i2p2www/pages/site/docs/api/i2pcontrol.html:170
msgid "If requested, returns the hostname used for the TCP transport."
-msgstr "Si se solicita, devuelve el nombre del servidor usado para el transporte TCP."
+msgstr ""
+"Si se solicita, devuelve el nombre del servidor usado para el transporte "
+"TCP."
#: i2p2www/pages/site/docs/api/i2pcontrol.html:171
msgid ""
-"If requested, returns the method used for automatically detecting ip for the"
-" TCP transport."
-msgstr "Si se solicita, devuelve el método usado para detectar automáticamente la IP para el transporte TCP."
+"If requested, returns the method used for automatically detecting ip for "
+"the TCP transport."
+msgstr ""
+"Si se solicita, devuelve el método usado para detectar automáticamente la"
+" IP para el transporte TCP."
#: i2p2www/pages/site/docs/api/i2pcontrol.html:172
msgid "If requested, returns the port used for the UDP transport."
@@ -2218,17 +3087,23 @@ msgstr "Si se solicita, devuelve el puerto usado para el transporte UDP."
#: i2p2www/pages/site/docs/api/i2pcontrol.html:173
msgid "If requested, returns the hostname used for the UDP transport."
-msgstr "Si se solicita, devuelve el nombre del servidor usado para el transporte UDP."
+msgstr ""
+"Si se solicita, devuelve el nombre del servidor usado para el transporte "
+"UDP."
#: i2p2www/pages/site/docs/api/i2pcontrol.html:174
msgid ""
-"If requested, returns methods used for detecting the ip address of the UDP "
-"transport."
-msgstr "Si se solicita, devuelve los métodos usados para detectar la dirección IP del transporte UDP."
+"If requested, returns methods used for detecting the ip address of the "
+"UDP transport."
+msgstr ""
+"Si se solicita, devuelve los métodos usados para detectar la dirección IP"
+" del transporte UDP."
#: i2p2www/pages/site/docs/api/i2pcontrol.html:175
msgid "If requested, returns what ip has been detected by the UDP transport."
-msgstr "Si se solicita, devuelve la IP que ha sido detectada por el transporte UDP."
+msgstr ""
+"Si se solicita, devuelve la IP que ha sido detectada por el transporte "
+"UDP."
#: i2p2www/pages/site/docs/api/i2pcontrol.html:176
msgid "If requested, returns the UPNP setting."
@@ -2238,15 +3113,21 @@ msgstr "Si se solicita, devuelve el valor de la configuración UPnP."
msgid ""
"If requested, returns how many percent of bandwidth is usable for "
"participating tunnels."
-msgstr "Si se solicita, devuelve el porcentaje de ancho de banda disponible para los túneles participantes."
+msgstr ""
+"Si se solicita, devuelve el porcentaje de ancho de banda disponible para "
+"los túneles participantes."
#: i2p2www/pages/site/docs/api/i2pcontrol.html:178
msgid "If requested, returns how many KB/s of inbound bandwidth is allowed."
-msgstr "Si se solicita, devuelve el número de KB/s de ancho de banda de entrada que están permitidos."
+msgstr ""
+"Si se solicita, devuelve el número de KB/s de ancho de banda de entrada "
+"que están permitidos."
#: i2p2www/pages/site/docs/api/i2pcontrol.html:179
msgid "If requested, returns how many KB/s of outbound bandwidth is allowed."
-msgstr "Si se solicita, devuelve el número de KB/s de ancho de banda de salida que están permitidos."
+msgstr ""
+"Si se solicita, devuelve el número de KB/s de ancho de banda de salida "
+"que están permitidos."
#: i2p2www/pages/site/docs/api/i2pcontrol.html:180
msgid "If requested, returns the laptop mode."
@@ -2318,28 +3199,54 @@ msgstr "La credencial (`token`) de identificación ha expirado y será eliminada
#: i2p2www/pages/site/docs/api/i2pcontrol.html:201
msgid ""
-"The version of the I2PControl API used wasn't specified, but is required to "
-"be specified."
-msgstr "La versión de la API I2PControl usada no fue especificada, pero se requiere que sea especificada."
+"The version of the I2PControl API used wasn't specified, but is required "
+"to be specified."
+msgstr ""
+"La versión de la API I2PControl usada no fue especificada, pero se "
+"requiere que sea especificada."
#: i2p2www/pages/site/docs/api/i2pcontrol.html:202
msgid ""
-"The version of the I2PControl API specified is not supported by I2PControl."
-msgstr "La versión de la API I2PControl especificada no está soportada por I2PControl."
+"The version of the I2PControl API specified is not supported by "
+"I2PControl."
+msgstr ""
+"La versión de la API I2PControl especificada no está soportada por "
+"I2PControl."
#: i2p2www/pages/site/docs/api/i2ptunnel.html:12
#, python-format
msgid ""
"I2PTunnel is a tool for interfacing with and providing services on I2P.\n"
-"Destination of an I2PTunnel can be defined using a hostname,\n"
-"Base32, or a full 516-byte destination key.\n"
-"An established I2PTunnel will be available on your client machine as localhost:port.\n"
-"If you wish to provide a service on I2P network, you simply create I2PTunnel to the\n"
-"appropriate ip_address:port. A corresponding 516-byte destination key will be generated\n"
+"Destination of an I2PTunnel can be defined using a hostname,\n"
+"Base32, or a full 516-byte destination "
+"key.\n"
+"An established I2PTunnel will be available on your client machine as "
+"localhost:port.\n"
+"If you wish to provide a service on I2P network, you simply create "
+"I2PTunnel to the\n"
+"appropriate ip_address:port. A corresponding 516-byte destination key "
+"will be generated\n"
"for the service and it will become avaliable throughout I2P.\n"
"A web interface for I2PTunnel management is avaliable on\n"
-"localhost:7657/i2ptunnel/."
-msgstr "I2PTunnel es una herramienta para intermediar con, y proveer servicios a\nI2P. El destino de un I2PTunnel puede ser definido usando un nombre de servidor \nBase32, o una clave de destino completa de 516-bytes. Un I2PTunnel establecido estará disponible sobre \nsu máquina cliente en localhost:puerto Si desea proporcionar un servicio \nsobre la red I2P, simplemente cree un I2PTunnel hasta la dirección IP:puerto \napropiada. Se generarará una clave de destino de 516-bytes correspondiente \npara el servicio, y se hará disponible a través de I2P. Una interfaz web para \nla administración del I2PTunnel está disponible en localhost:7657/i2ptunnel/."
+"localhost:7657/i2ptunnel/."
+msgstr ""
+"I2PTunnel es una herramienta para intermediar con, y proveer servicios a\n"
+"I2P. El destino de un I2PTunnel puede ser definido usando un nombre de servidor \n"
+"Base32, o una clave de destino completa"
+" de 516-bytes. Un I2PTunnel establecido estará disponible sobre \n"
+"su máquina cliente en localhost:puerto Si desea proporcionar un servicio"
+" \n"
+"sobre la red I2P, simplemente cree un I2PTunnel hasta la dirección "
+"IP:puerto \n"
+"apropiada. Se generarará una clave de destino de 516-bytes "
+"correspondiente \n"
+"para el servicio, y se hará disponible a través de I2P. Una interfaz web "
+"para \n"
+"la administración del I2PTunnel está disponible en localhost:7657/i2ptunnel/."
#: i2p2www/pages/site/docs/api/i2ptunnel.html:24
msgid "Default Services"
@@ -2352,9 +3259,15 @@ msgstr "Túneles de servidor"
#: i2p2www/pages/site/docs/api/i2ptunnel.html:27
msgid ""
"I2P Webserver - A tunnel pointed to a Jetty webserver run\n"
-"on localhost:7658 for convenient and quick hosting on I2P.\n"
+"on localhost:7658 for convenient "
+"and quick hosting on I2P.\n"
"1/(windowSize*factor)
. In standard TCP, window sizes are in bytes,\n"
+"of 1/(windowSize*factor)
. In standard TCP, window sizes are"
+" in bytes,\n"
"while in I2P, window sizes are in messages.\n"
"A higher number means slower growth."
-msgstr "Cuando estamos evitando la congestión, aumentamos el tamaño de la \nventana (protocolo) al ritmo de 1/(tamañodeventana*factor)
. \nEn TCP estándar, los tamaños de ventana se miden en bytes, mientras que \nen I2P los tamaños de ventana se miden en mensajes. Un número más alto \nsignifica un crecimiento más lento."
+msgstr ""
+"Cuando estamos evitando la congestión, aumentamos el tamaño de la \n"
+"ventana (protocolo) al ritmo de 1/(tamañodeventana*factor)
."
+" \n"
+"En TCP estándar, los tamaños de ventana se miden en bytes, mientras que \n"
+"en I2P los tamaños de ventana se miden en mensajes. Un número más alto \n"
+"significa un crecimiento más lento."
#: i2p2www/pages/site/docs/api/streaming.html:178
msgid ""
"How long to wait after instantiating a new con \n"
"before actually attempting to connect. If this is\n"
-"<= 0, connect immediately with no initial data. If greater than 0, wait\n"
+"<= 0, connect immediately with no initial data. If greater than 0, "
+"wait\n"
"until the output stream is flushed, the buffer fills, \n"
"or that many milliseconds pass, and include any initial data with the SYN."
-msgstr "Cuánto esperar después de crear una instancia de nueva conexión antes de \nintentar conectar realmente. Si esto es <= 0 conecta inmediatamente \nsin datos inciales. Si es mayor que 0, espera hasta que la salida del flujo de \ndatos (`stream`) sea evacuada, se llene el buffer, o que pasen muchos \nmilisegundos, e incluye cualquier dato inicial con el SYN."
+msgstr ""
+"Cuánto esperar después de crear una instancia de nueva conexión antes de"
+" \n"
+"intentar conectar realmente. Si esto es <= 0 conecta inmediatamente \n"
+"sin datos inciales. Si es mayor que 0, espera hasta que la salida del "
+"flujo de \n"
+"datos (`stream`) sea evacuada, se llene el buffer, o que pasen muchos \n"
+"milisegundos, e incluye cualquier dato inicial con el SYN."
#: i2p2www/pages/site/docs/api/streaming.html:186
msgid ""
-"How long to block on connect, in milliseconds. Negative means indefinitely. "
-"Default is 5 minutes."
-msgstr "Durante cuánto bloquear al conectar, en milisegundos. Valores negativos \nsignifican indefinidamente. El valor predeterminado es 5 minutos."
+"How long to block on connect, in milliseconds. Negative means "
+"indefinitely. Default is 5 minutes."
+msgstr ""
+"Durante cuánto bloquear al conectar, en milisegundos. Valores negativos \n"
+"significan indefinidamente. El valor predeterminado es 5 minutos."
#: i2p2www/pages/site/docs/api/streaming.html:190
msgid ""
"Whether to disable warnings in the logs when an incoming connection is "
"rejected due to connection limits."
-msgstr "Desactivar o no las advertencias en los registros (`logs`), cuando se rechaza \nuna conexión entrante debido a los límites de la conexión."
+msgstr ""
+"Desactivar o no las advertencias en los registros (`logs`), cuando se "
+"rechaza \n"
+"una conexión entrante debido a los límites de la conexión."
#: i2p2www/pages/site/docs/api/streaming.html:196
msgid ""
"Whether to listen only for the streaming protocol.\n"
-"Setting to true will prohibit communication with Destinations earlier than release 0.7.1\n"
-"(released March 2009). Set to true if running multiple protocols on this Destination."
-msgstr "Escuchar o no sólo el protocolo streaming. Configurando a verdadero \n(`true`) prohibirá la comunicación con Destinos que usen una versión más \ntemprana que la 0.7.1 (publicada en marzo de 2009). Configure a \nverdadero si ejecuta múltiples protocolos sobre este Destino."
+"Setting to true will prohibit communication with Destinations earlier "
+"than release 0.7.1\n"
+"(released March 2009). Set to true if running multiple protocols on this "
+"Destination."
+msgstr ""
+"Escuchar o no sólo el protocolo streaming. Configurando a verdadero \n"
+"(`true`) prohibirá la comunicación con Destinos que usen una versión más"
+" \n"
+"temprana que la 0.7.1 (publicada en marzo de 2009). Configure a \n"
+"verdadero si ejecuta múltiples protocolos sobre este Destino."
#: i2p2www/pages/site/docs/api/streaming.html:204
msgid ""
"(0=noop, 1=disconnect)\n"
-"What to do on an inactivity timeout - do nothing, disconnect, or send a duplicate ack."
-msgstr "(0=nada, 1=desconectar)\nQúe hacer durante un periodo de inactividad - no hacer nada, desconectar, o enviar un ACK duplicado."
+"What to do on an inactivity timeout - do nothing, disconnect, or send a "
+"duplicate ack."
+msgstr ""
+"(0=nada, 1=desconectar)\n"
+"Qúe hacer durante un periodo de inactividad - no hacer nada, desconectar,"
+" o enviar un ACK duplicado."
#: i2p2www/pages/site/docs/api/streaming.html:212
msgid ""
-"The initial value of the resend delay field in the packet header, times 1000.\n"
+"The initial value of the resend delay field in the packet header, times "
+"1000.\n"
"Not fully implemented; see below."
-msgstr "El valor incial del campo de demora del reenvío en la cabecera del paquete, \nmarca 1000. No está implementado completamente; vea debajo."
+msgstr ""
+"El valor incial del campo de demora del reenvío en la cabecera del "
+"paquete, \n"
+"marca 1000. No está implementado completamente; vea debajo."
#: i2p2www/pages/site/docs/api/streaming.html:217
msgid ""
"Initial timeout\n"
"(if no sharing data available)."
-msgstr "Tiempo límite inicial (si no hay datos compartidos disponibles)."
+msgstr ""
+"Tiempo límite inicial (si no hay datos "
+"compartidos disponibles)."
#: i2p2www/pages/site/docs/api/streaming.html:224
msgid ""
"Initial round trip time estimate\n"
"(if no sharing data available).\n"
"Disabled as of release 0.9.8; uses actual RTT."
-msgstr "Estimación de (RTT/RTD) tiempo de viaje de ida y vuelta (si no hay \ndatos compartidos disponibles). Deshabilitado desde la \nversión 0.9.8; usa el RTT real."
+msgstr ""
+"Estimación de (RTT/RTD) tiempo de viaje de ida y vuelta (si no hay \n"
+"datos compartidos disponibles). Deshabilitado "
+"desde la \n"
+"versión 0.9.8; usa el RTT real."
#: i2p2www/pages/site/docs/api/streaming.html:230
msgid "if no sharing data available"
@@ -2944,19 +4240,26 @@ msgstr "si no hay datos compatidos disponibles"
#: i2p2www/pages/site/docs/api/streaming.html:230
msgid ""
-"In standard TCP, window sizes are in bytes, while in I2P, window sizes are "
-"in messages."
-msgstr "En TCP estándar, los tamaños de las ventanas se miden en bytes, mientras \nque en I2P los tamaños de las ventanas se miden en mensajes."
+"In standard TCP, window sizes are in bytes, while in I2P, window sizes "
+"are in messages."
+msgstr ""
+"En TCP estándar, los tamaños de las ventanas se miden en bytes, mientras"
+" \n"
+"que en I2P los tamaños de las ventanas se miden en mensajes."
#: i2p2www/pages/site/docs/api/streaming.html:242
msgid ""
"(0 or negative value means unlimited)\n"
"This is a total limit for incoming and outgoing combined."
-msgstr "(0 o valores negativos significan ilimitado) \nEsto es un límite total para la combinación entrante y saliente."
+msgstr ""
+"(0 o valores negativos significan ilimitado) \n"
+"Esto es un límite total para la combinación entrante y saliente."
#: i2p2www/pages/site/docs/api/streaming.html:247
msgid "Incoming connection limit (per peer; 0 means disabled)"
-msgstr "Límite de conexión entrante (por pares ('peer`); 0 significa deshabilitado)"
+msgstr ""
+"Límite de conexión entrante (por pares ('peer`); 0 significa "
+"deshabilitado)"
#: i2p2www/pages/site/docs/api/streaming.html:253
#: i2p2www/pages/site/docs/api/streaming.html:259
@@ -2973,25 +4276,35 @@ msgstr "Número máximo de retransmisiones antes de fallo."
#: i2p2www/pages/site/docs/api/streaming.html:273
msgid "Incoming connection limit (all peers; 0 means disabled)"
-msgstr "Límite de conexión entrante (todos los pares (`peers`); 0 significa deshabilitado)"
+msgstr ""
+"Límite de conexión entrante (todos los pares (`peers`); 0 significa "
+"deshabilitado)"
#: i2p2www/pages/site/docs/api/streaming.html:279
#: i2p2www/pages/site/docs/api/streaming.html:286
msgid ""
"(all peers; 0 means disabled)\n"
"Use with caution as exceeding this will disable a server for a long time."
-msgstr "(todos los pares (`peers`); 0 significa deshabilitado)\nUsar con precaución ya que exceder esto deshabilitará un servidor por un largo periodo."
+msgstr ""
+"(todos los pares (`peers`); 0 significa deshabilitado)\n"
+"Usar con precaución ya que exceder esto deshabilitará un servidor por un "
+"largo periodo."
#: i2p2www/pages/site/docs/api/streaming.html:295
msgid ""
"(2=interactive not supported)\n"
-"This doesn't currently do anything, but setting it to a value other than 1 will cause an error."
-msgstr "(2=interactivo no soportado)\nEsto actualmente no hace nada, pero configurándolo a un valor distino de 1 causará un error."
+"This doesn't currently do anything, but setting it to a value other than "
+"1 will cause an error."
+msgstr ""
+"(2=interactivo no soportado)\n"
+"Esto actualmente no hace nada, pero configurándolo a un valor distino de "
+"1 causará un error."
#: i2p2www/pages/site/docs/api/streaming.html:300
-msgid ""
-"How long to block on read, in milliseconds. Negative means indefinitely."
-msgstr "Durante cuánto bloquear al leer, en milisegundos. Valores negativos significan indefinidamente."
+msgid "How long to block on read, in milliseconds. Negative means indefinitely."
+msgstr ""
+"Durante cuánto bloquear al leer, en milisegundos. Valores negativos "
+"significan indefinidamente."
#: i2p2www/pages/site/docs/api/streaming.html:304
msgid ""
@@ -2999,7 +4312,12 @@ msgid ""
"of 1/(factor). In standard TCP, window sizes are in bytes,\n"
"while in I2P, window sizes are in messages.\n"
"A higher number means slower growth."
-msgstr "Cuando estemos en un inicio lento, elevaremos el tamaño de la ventana \n(del protocolo) a un ritmo de 1/(factor). En TCP estándar, los tamaños de ventana se miden en bytes, mientras que en I2P los tamaños de ventana se miden en mensajes. Un número más alto significa un crecimiento más lento."
+msgstr ""
+"Cuando estemos en un inicio lento, elevaremos el tamaño de la ventana \n"
+"(del protocolo) a un ritmo de 1/(factor). En TCP estándar, los tamaños de"
+" ventana se miden en bytes, mientras que en I2P los tamaños de ventana se"
+" miden en mensajes. Un número más alto significa un crecimiento más "
+"lento."
#: i2p2www/pages/site/docs/api/streaming.html:311
#: i2p2www/pages/site/docs/api/streaming.html:318
@@ -3007,13 +4325,18 @@ msgstr "Cuando estemos en un inicio lento, elevaremos el tamaño de la ventana \
msgid ""
"Ref: RFC 2140. Floating point value.\n"
"May be set only via context properties, not connection options."
-msgstr "Ref: RFC 2140. Valor del punto flotante.\nPuede ser establecido sólo mediante las propiedades contextuales, no las opciones de conexión"
+msgstr ""
+"Ref: RFC 2140. Valor del punto flotante.\n"
+"Puede ser establecido sólo mediante las propiedades contextuales, no las "
+"opciones de conexión"
#: i2p2www/pages/site/docs/api/streaming.html:332
msgid ""
"How long to block on write/flush, in milliseconds. Negative means "
"indefinitely."
-msgstr "Durante cuánto bloquear al escribir/limpiar, en milisegundos. Los valores negativos significan indefinidamente."
+msgstr ""
+"Durante cuánto bloquear al escribir/limpiar, en milisegundos. Los valores"
+" negativos significan indefinidamente."
#: i2p2www/pages/site/docs/api/streaming.html:340
#: i2p2www/pages/site/docs/spec/streaming.html:10
@@ -3034,17 +4357,36 @@ msgstr "Configuración"
#: i2p2www/pages/site/docs/api/streaming.html:349
msgid ""
-"The initiator sends a packet with the SYNCHRONIZE flag set. This packet may contain the initial data as well.\n"
-"The peer replies with a packet with the SYNCHRONIZE flag set. This packet may contain the initial response data as well."
-msgstr "El iniciador envía un paquete con el distintitivo SYNCHRONIZE (sincronizar) \nestablecido. Este paquete puede contener también los datos iniciales. El par (`peer`) responde con un paquete con el distintivo SYNCHRONIZE establecido. Este paquete puede contener también los datos de respuesta iniciales"
+"The initiator sends a packet with the SYNCHRONIZE flag set. This packet "
+"may contain the initial data as well.\n"
+"The peer replies with a packet with the SYNCHRONIZE flag set. This packet"
+" may contain the initial response data as well."
+msgstr ""
+"El iniciador envía un paquete con el distintitivo SYNCHRONIZE "
+"(sincronizar) \n"
+"establecido. Este paquete puede contener también los datos iniciales. El "
+"par (`peer`) responde con un paquete con el distintivo SYNCHRONIZE "
+"establecido. Este paquete puede contener también los datos de respuesta "
+"iniciales"
#: i2p2www/pages/site/docs/api/streaming.html:354
msgid ""
-"The initiator may send additional data packets, up to the initial window size, before receiving the SYNCHRONIZE response.\n"
+"The initiator may send additional data packets, up to the initial window "
+"size, before receiving the SYNCHRONIZE response.\n"
"These packets will also have the send Stream ID field set to 0.\n"
-"Recipients must buffer packets received on unknown streams for a short period of time, as they may\n"
+"Recipients must buffer packets received on unknown streams for a short "
+"period of time, as they may\n"
"arrive out of order, in advance of the SYNCHRONIZE packet."
-msgstr "El iniciador puede enviar paquetes de datos adicionales, hasta el tamaño de \nventana inicial, antes de recibir la respuesta SYNCHRONIZE. Estos \npaquetes también tendrán el campo `envíar Identificador de Stream` \nestablecido a 0. Los receptores deben guardar en el buffer los paquetes \nrecibidos sobre flujos (`streams`) desconocidos durante un periodo corto de \ntiempo, ya que pueden llegar estropeados, adelantándose al paquete \nSYNCHRONIZE."
+msgstr ""
+"El iniciador puede enviar paquetes de datos adicionales, hasta el tamaño "
+"de \n"
+"ventana inicial, antes de recibir la respuesta SYNCHRONIZE. Estos \n"
+"paquetes también tendrán el campo `envíar Identificador de Stream` \n"
+"establecido a 0. Los receptores deben guardar en el buffer los paquetes \n"
+"recibidos sobre flujos (`streams`) desconocidos durante un periodo corto "
+"de \n"
+"tiempo, ya que pueden llegar estropeados, adelantándose al paquete \n"
+"SYNCHRONIZE."
#: i2p2www/pages/site/docs/api/streaming.html:361
msgid "MTU Selection and Negotiation"
@@ -3052,24 +4394,61 @@ msgstr "Selección y negociación MTU"
#: i2p2www/pages/site/docs/api/streaming.html:362
msgid ""
-"The maximum message size (also called the MTU / MRU) is negotiated to the lower value supported by\n"
-"the two peers. As tunnel messages are padded to 1KB, a poor MTU selection will lead to\n"
+"The maximum message size (also called the MTU / MRU) is negotiated to the"
+" lower value supported by\n"
+"the two peers. As tunnel messages are padded to 1KB, a poor MTU selection"
+" will lead to\n"
"a large amount of overhead.\n"
"The MTU is specified by the option i2p.streaming.maxMessageSize.\n"
-"The current default MTU of 1730 was chosen to fit precisely into two 1K I2NP tunnel messages,\n"
+"The current default MTU of 1730 was chosen to fit precisely into two 1K "
+"I2NP tunnel messages,\n"
"including overhead for the typical case."
-msgstr "El máximo tamaño de mensaje (también llamado MTU / MRU) es negociado \nal menor valor soportado por los dos pares (`peers`). Como los mensajes \ntúnel están acotados a 1KB, una elección MTU pobre llevaría a una gran cantidad de tráfico de control. La MTU está especificada por la opción i2p.streaming.maxMessageSize. La MTU está especificada por la opción i2p.streaming.maxMessageSize. La MTU actual por defecto de 1720 fue \nelegida para encajar precisamente en dos mensajes túnel I2NP de 1K, \nincluyendo el tráfico de control para un caso típico."
+msgstr ""
+"El máximo tamaño de mensaje (también llamado MTU / MRU) es negociado \n"
+"al menor valor soportado por los dos pares (`peers`). Como los mensajes \n"
+"túnel están acotados a 1KB, una elección MTU pobre llevaría a una gran "
+"cantidad de tráfico de control. La MTU está especificada por la opción "
+"i2p.streaming.maxMessageSize. La MTU está especificada por la opción "
+"i2p.streaming.maxMessageSize. La MTU actual por defecto de 1720 fue \n"
+"elegida para encajar precisamente en dos mensajes túnel I2NP de 1K, \n"
+"incluyendo el tráfico de control para un caso típico."
#: i2p2www/pages/site/docs/api/streaming.html:371
msgid ""
-"The first message in a connection includes a 387 byte (typical) Destination added by the streaming layer,\n"
-"and usually a 898 byte (typical) LeaseSet, and Session keys, bundled in the Garlic message by the router.\n"
-"(The LeaseSet and Session Keys will not be bundled if an ElGamal Session was previously established).\n"
-"Therefore, the goal of fitting a complete HTTP request in a single 1KB I2NP message is not always attainable.\n"
-"However, the selection of the MTU, together with careful implementation of fragmentation\n"
-"and batching strategies in the tunnel gateway processor, are important factors in network bandwidth,\n"
-"latency, reliability, and efficiency, especially for long-lived connections."
-msgstr "El primer mensaje en una conexión incluye un Destino de 387 bytes (típico) \nañadido por la capa streaming, y usualmente un LeaseSet (todos los leases o túneles autorizados a recibir conexiones para un destino concreto) de 898 \nbytes (típico), y claves de Sesión, empaquetadas en un mensaje Ajo \n(`Garlic`) por el router (El LeaseSet y las Claves de Sesión no serán \nempaquetadas si se estableció previamente una Sesión ElGamal). Por lo \ntanto, la meta de encajar una petición HTTP completa en un sólo \nmensaje I2NP (I2P Network Protocol) de 1KB no siempre es alcanzable. Sin \nembargo, la elección de MTU, junto con una cuidadosa implementación de \nfragmentación y estrategias de elaboración de lotes en el procesador del \ntúnel de la pasarela de salida (`gateway`), son factores importantes en el \nancho de banda, latencia, confiabilidad y eficiencia de la red, especialmente \npara conexión de vida-larga."
+"The first message in a connection includes a 387 byte (typical) "
+"Destination added by the streaming layer,\n"
+"and usually a 898 byte (typical) LeaseSet, and Session keys, bundled in "
+"the Garlic message by the router.\n"
+"(The LeaseSet and Session Keys will not be bundled if an ElGamal Session "
+"was previously established).\n"
+"Therefore, the goal of fitting a complete HTTP request in a single 1KB "
+"I2NP message is not always attainable.\n"
+"However, the selection of the MTU, together with careful implementation "
+"of fragmentation\n"
+"and batching strategies in the tunnel gateway processor, are important "
+"factors in network bandwidth,\n"
+"latency, reliability, and efficiency, especially for long-lived "
+"connections."
+msgstr ""
+"El primer mensaje en una conexión incluye un Destino de 387 bytes "
+"(típico) \n"
+"añadido por la capa streaming, y usualmente un LeaseSet (todos los leases"
+" o túneles autorizados a recibir conexiones para un destino concreto) de "
+"898 \n"
+"bytes (típico), y claves de Sesión, empaquetadas en un mensaje Ajo \n"
+"(`Garlic`) por el router (El LeaseSet y las Claves de Sesión no serán \n"
+"empaquetadas si se estableció previamente una Sesión ElGamal). Por lo \n"
+"tanto, la meta de encajar una petición HTTP completa en un sólo \n"
+"mensaje I2NP (I2P Network Protocol) de 1KB no siempre es alcanzable. Sin"
+" \n"
+"embargo, la elección de MTU, junto con una cuidadosa implementación de \n"
+"fragmentación y estrategias de elaboración de lotes en el procesador del"
+" \n"
+"túnel de la pasarela de salida (`gateway`), son factores importantes en "
+"el \n"
+"ancho de banda, latencia, confiabilidad y eficiencia de la red, "
+"especialmente \n"
+"para conexión de vida-larga."
#: i2p2www/pages/site/docs/api/streaming.html:382
#, python-format
@@ -3077,17 +4456,32 @@ msgid ""
"Data integrity is assured by the gzip CRC-32 checksum implemented in\n"
"the I2CP layer.\n"
"There is no checksum field in the streaming protocol."
-msgstr "La integridad de los datos está asegurada por el checksum CRC-32 de gzip \nimplementado en la capa I2CP. No hay un campo checksum en el protocolo streaming."
+msgstr ""
+"La integridad de los datos está asegurada por el checksum CRC-32 de gzip"
+" \n"
+"implementado en la capa I2CP. No hay un "
+"campo checksum en el protocolo streaming."
#: i2p2www/pages/site/docs/api/streaming.html:390
#, python-format
msgid ""
-"Each packet is sent through I2P as a single message (or as an individual clove in a\n"
-"Garlic Message). Message encapsulation is implemented\n"
-"in the underlying I2CP, I2NP, and\n"
-"tunnel message layers. There is no packet delimiter\n"
+"Each packet is sent through I2P as a single message (or as an individual "
+"clove in a\n"
+"Garlic Message). Message encapsulation "
+"is implemented\n"
+"in the underlying I2CP, I2NP, and\n"
+"tunnel message layers. There is no "
+"packet delimiter\n"
"mechanism or payload length field in the streaming protocol."
-msgstr "Cada paquete es enviado a través de I2P como un solo mensaje (o como un diente en un mensaje Garlic). La encapsulación de los mensajes es implementada en el I2CP subyacente, en el I2NP, y en las capas de los túneles de mensajes. No hay mecanismo delimitador o campo de tamaño del payload en el protocolo de streaming."
+msgstr ""
+"Cada paquete es enviado a través de I2P como un solo mensaje (o como un "
+"diente en un mensaje Garlic). La "
+"encapsulación de los mensajes es implementada en el I2CP subyacente, en el I2NP, y en las capas de los túneles de mensajes. No hay mecanismo "
+"delimitador o campo de tamaño del payload en el protocolo de streaming."
#: i2p2www/pages/site/docs/api/streaming.html:400
msgid "Windowing"
@@ -3095,10 +4489,17 @@ msgstr "Ventanización"
#: i2p2www/pages/site/docs/api/streaming.html:401
msgid ""
-"The streaming lib uses standard slow-start (exponential window growth) and congestion avoidance (linear window growth)\n"
+"The streaming lib uses standard slow-start (exponential window growth) "
+"and congestion avoidance (linear window growth)\n"
"phases, with exponential backoff.\n"
"Windowing and acknowledgments use packet count, not byte count."
-msgstr "La librería streaming utiliza fases estándar de inicio-lento (crecimiento \nexponencial de la ventana (del protocolo)) y de elusión de congestión \n(crecimiento lineal de la ventana), con retroceso exponencial. La \nventanización y los acuses de recibo ('acknowledments') cuentan paquetes, no bytes."
+msgstr ""
+"La librería streaming utiliza fases estándar de inicio-lento (crecimiento"
+" \n"
+"exponencial de la ventana (del protocolo)) y de elusión de congestión \n"
+"(crecimiento lineal de la ventana), con retroceso exponencial. La \n"
+"ventanización y los acuses de recibo ('acknowledments') cuentan paquetes,"
+" no bytes."
#: i2p2www/pages/site/docs/api/streaming.html:408
msgid "Close"
@@ -3106,39 +4507,71 @@ msgstr "Cerrar"
#: i2p2www/pages/site/docs/api/streaming.html:409
msgid ""
-"Any packet, including one with the SYNCHRONIZE flag set, may have the CLOSE flag sent as well.\n"
-"The connection is not closed until the peer responds with the CLOSE flag.\n"
+"Any packet, including one with the SYNCHRONIZE flag set, may have the "
+"CLOSE flag sent as well.\n"
+"The connection is not closed until the peer responds with the CLOSE flag."
+"\n"
"CLOSE packets may contain data as well."
-msgstr "Cualquier paquete, incluyendo uno con el distintivo SYNCHRONIZE establecido, puede haber enviado también el distintivo CLOSE. La \nconexión no está cerrada hasta que el par (`peer`) responde con el \ndistintivo CLOSE. Los paquetes CLOSE también pueden contener datos."
+msgstr ""
+"Cualquier paquete, incluyendo uno con el distintivo SYNCHRONIZE "
+"establecido, puede haber enviado también el distintivo CLOSE. La \n"
+"conexión no está cerrada hasta que el par (`peer`) responde con el \n"
+"distintivo CLOSE. Los paquetes CLOSE también pueden contener datos."
#: i2p2www/pages/site/docs/api/streaming.html:417
msgid ""
-"There is no ping function at the I2CP layer (equivalent to ICMP echo) or in datagrams.\n"
+"There is no ping function at the I2CP layer (equivalent to ICMP echo) or "
+"in datagrams.\n"
"This function is provided in streaming.\n"
"Pings and pongs may not be combined with a standard streaming packet;\n"
"if the ECHO option is set, then\n"
-"most other flags, options, ackThrough, sequenceNum, NACKs, payload, etc. are ignored."
-msgstr "No hay función ping en la capa I2CP (equivalente a un echo ICMP) o en los datagramas.\nEsta función se proporciona en streaming.\nLos pings y pongs pueden no estar combinados con un paquete streaming estandar;\nSi la opción ECHO está establecida, entonces la mayoría de otros indicadores ('flags'),\nopciones, ackThrough(s), sequenceNum(s), NACK(s), cargas, etc. (ver arriba), son ignorados."
+"most other flags, options, ackThrough, sequenceNum, NACKs, payload, etc. "
+"are ignored."
+msgstr ""
+"No hay función ping en la capa I2CP (equivalente a un echo ICMP) o en los"
+" datagramas.\n"
+"Esta función se proporciona en streaming.\n"
+"Los pings y pongs pueden no estar combinados con un paquete streaming "
+"estandar;\n"
+"Si la opción ECHO está establecida, entonces la mayoría de otros "
+"indicadores ('flags'),\n"
+"opciones, ackThrough(s), sequenceNum(s), NACK(s), cargas, etc. (ver "
+"arriba), son ignorados."
#: i2p2www/pages/site/docs/api/streaming.html:425
msgid ""
-"A ping packet must have the ECHO, SIGNATURE_INCLUDED, and FROM_INCLUDED flags set.\n"
-"The sendStreamId must be greater than zero, and the receiveStreamId is ignored.\n"
+"A ping packet must have the ECHO, SIGNATURE_INCLUDED, and FROM_INCLUDED "
+"flags set.\n"
+"The sendStreamId must be greater than zero, and the receiveStreamId is "
+"ignored.\n"
"The sendStreamId may or may not correspond to an existing connection."
-msgstr "Un paquete de ping debe tener establecidos los indicadores ECHO (eco),\nSIGNATURE_INCLUDED (firma incluida), y FROM_INCLUDED (origen incluido).\nEl sendStreamId (identificador de stream de envío) puede o no corresponder con una conexión existente."
+msgstr ""
+"Un paquete de ping debe tener establecidos los indicadores ECHO (eco),\n"
+"SIGNATURE_INCLUDED (firma incluida), y FROM_INCLUDED (origen incluido).\n"
+"El sendStreamId (identificador de stream de envío) puede o no "
+"corresponder con una conexión existente."
#: i2p2www/pages/site/docs/api/streaming.html:431
msgid ""
"A pong packet must have the ECHO flag set.\n"
-"The sendStreamId must be zero, and the receiveStreamId is the sendStreamId from the ping.\n"
-"The pong packet does not include any payload that was contained in the ping."
-msgstr "Un paquete pong debe tener el indicador ECHO establecido.\nEl sendStreamId debe ser cero, y el receiveStreamId (identificador de stream de recepción) es el sendStreamId del ping.\nEl paquete pong no incluye carga alguna que estuviera contenida en el ping."
+"The sendStreamId must be zero, and the receiveStreamId is the "
+"sendStreamId from the ping.\n"
+"The pong packet does not include any payload that was contained in the "
+"ping."
+msgstr ""
+"Un paquete pong debe tener el indicador ECHO establecido.\n"
+"El sendStreamId debe ser cero, y el receiveStreamId (identificador de "
+"stream de recepción) es el sendStreamId del ping.\n"
+"El paquete pong no incluye carga alguna que estuviera contenida en el "
+"ping."
#: i2p2www/pages/site/docs/api/streaming.html:437
msgid ""
-"Streaming may be configured to disable sending pongs with the configuration "
-"i2p.streaming.answerPings=false."
-msgstr "El protocolo de streaming puede ser configurado para deshabilitar el envío de pongs con la configuración i2p.streaming.answerPings=false ."
+"Streaming may be configured to disable sending pongs with the "
+"configuration i2p.streaming.answerPings=false."
+msgstr ""
+"El protocolo de streaming puede ser configurado para deshabilitar el "
+"envío de pongs con la configuración i2p.streaming.answerPings=false ."
#: i2p2www/pages/site/docs/api/streaming.html:442
msgid "Control Block Sharing"
@@ -3153,12 +4586,33 @@ msgid ""
"This is used for \"temporal\" sharing at connection open/close time,\n"
"not \"ensemble\" sharing during a connection (See\n"
"RFC 2140).\n"
-"There is a separate share per ConnectionManager (i.e. per local Destination)\n"
+"There is a separate share per ConnectionManager (i.e. per local "
+"Destination)\n"
"so that there is no information leakage to other Destinations on the\n"
"same router.\n"
"The share data for a given peer expires after a few minutes.\n"
"The following Control Block Sharing parameters can be set per router:"
-msgstr "La librería streaming (de flujo) soporta compartición del Bloque de Control \n\"TCP\" (protocolo de control de transmisiones). Esto comparte tres \nimportantes parámetros de la librería streaming (tamaño de la ventana, \ntiempo de viaje de ida y vuelta (RTT/RTD), variación del RTT) entre las \nconexiones al mismo par (`peer`) remoto. Esto se usa para la compartición \n\"temporal\" en el momento de apertura/cierre de la conexión, no para la \ncompartición \"coral\" durante una conexión (Vea RFC 2140). Hay una compartición separada por \nConnectionManager (administrador de conexión) (ej: por destino local), así \nque no hay información sobre filtraciones a otros destinos en el mismo \nrouter. Los datos compartidos para un par (`peer`) dado expiran después de \nunos pocos minutos. Los siguientes parámetros de Compartición del Bloque \nde Control pueden ser establecidos en cada router."
+msgstr ""
+"La librería streaming (de flujo) soporta compartición del Bloque de "
+"Control \n"
+"\"TCP\" (protocolo de control de transmisiones). Esto comparte tres \n"
+"importantes parámetros de la librería streaming (tamaño de la ventana, \n"
+"tiempo de viaje de ida y vuelta (RTT/RTD), variación del RTT) entre las \n"
+"conexiones al mismo par (`peer`) remoto. Esto se usa para la compartición"
+" \n"
+"\"temporal\" en el momento de apertura/cierre de la conexión, no para la"
+" \n"
+"compartición \"coral\" durante una conexión (Vea RFC 2140). Hay una "
+"compartición separada por \n"
+"ConnectionManager (administrador de conexión) (ej: por destino local), "
+"así \n"
+"que no hay información sobre filtraciones a otros destinos en el mismo \n"
+"router. Los datos compartidos para un par (`peer`) dado expiran después "
+"de \n"
+"unos pocos minutos. Los siguientes parámetros de Compartición del Bloque"
+" \n"
+"de Control pueden ser establecidos en cada router."
#: i2p2www/pages/site/docs/api/streaming.html:464
msgid "Other Parameters"
@@ -3166,8 +4620,11 @@ msgstr "Otros parámetros"
#: i2p2www/pages/site/docs/api/streaming.html:465
msgid ""
-"The following parameters are hardcoded, but may be of interest for analysis:"
-msgstr "Los siguientes parámetros son internos, pero pueden ser de interés para el análisis:"
+"The following parameters are hardcoded, but may be of interest for "
+"analysis:"
+msgstr ""
+"Los siguientes parámetros son internos, pero pueden ser de interés para "
+"el análisis:"
#: i2p2www/pages/site/docs/api/streaming.html:484
#: i2p2www/pages/site/docs/how/network-database.html:860
@@ -3176,17 +4633,41 @@ msgstr "Historia"
#: i2p2www/pages/site/docs/api/streaming.html:485
msgid ""
-"The streaming library has grown organically for I2P - first mihi implemented the\n"
-"\"mini streaming library\" as part of I2PTunnel, which was limited to a window\n"
-"size of 1 message (requiring an ACK before sending the next one), and then it was\n"
-"refactored out into a generic streaming interface (mirroring TCP sockets) and the\n"
-"full streaming implementation was deployed with a sliding window protocol and \n"
-"optimizations to take into account the high bandwidth x delay product. Individual\n"
-"streams may adjust the maximum packet size and other options. The default\n"
-"message size is selected to fit precisely in two 1K I2NP tunnel messages,\n"
+"The streaming library has grown organically for I2P - first mihi "
+"implemented the\n"
+"\"mini streaming library\" as part of I2PTunnel, which was limited to a "
+"window\n"
+"size of 1 message (requiring an ACK before sending the next one), and "
+"then it was\n"
+"refactored out into a generic streaming interface (mirroring TCP sockets)"
+" and the\n"
+"full streaming implementation was deployed with a sliding window protocol"
+" and \n"
+"optimizations to take into account the high bandwidth x delay product. "
+"Individual\n"
+"streams may adjust the maximum packet size and other options. The default"
+"\n"
+"message size is selected to fit precisely in two 1K I2NP tunnel messages,"
+"\n"
"and is a reasonable tradeoff between the bandwidth costs of \n"
-"retransmitting lost messages, and the latency and overhead of multiple messages."
-msgstr "La librería streaming ha crecido orgánicamente para I2P - primero mihi \nimplementó la \"librería mini streaming\" como parte de I2PTunnel, que \nestaba limitada a un tamaño de ventana de 1 mensaje (requiriendo un ACK \nantes de enviar el siguiente), y entonces fue desgajado en una interfaz \nstreaming genérica (a semejanza de los sockets TCP) y la implementación \nstreaming completa fue desplegada con un protocolo de ventanas deslizantes y optimizaciones para tener en cuenta el alto valor del producto \n(ancho-de-banda x demora). Los flujos (`streams`) individuales pueden \najustar su tamaño máximo de paquete y otras opciones. El tamaño \npredeterminado del mensaje se selecciona para encajar de forma precisa \nen dos mensajes túnel I2NP (I2P Network Protocol) de 1KB, y es un \ncompromiso de equilibrio razonable entre el coste en ancho de banda de \nretransmitir mensajes perdidos, y la latencia y tráfico de control de \nmúltiples mensajes."
+"retransmitting lost messages, and the latency and overhead of multiple "
+"messages."
+msgstr ""
+"La librería streaming ha crecido orgánicamente para I2P - primero mihi \n"
+"implementó la \"librería mini streaming\" como parte de I2PTunnel, que \n"
+"estaba limitada a un tamaño de ventana de 1 mensaje (requiriendo un ACK \n"
+"antes de enviar el siguiente), y entonces fue desgajado en una interfaz \n"
+"streaming genérica (a semejanza de los sockets TCP) y la implementación \n"
+"streaming completa fue desplegada con un protocolo de ventanas "
+"deslizantes y optimizaciones para tener en cuenta el alto valor del "
+"producto \n"
+"(ancho-de-banda x demora). Los flujos (`streams`) individuales pueden \n"
+"ajustar su tamaño máximo de paquete y otras opciones. El tamaño \n"
+"predeterminado del mensaje se selecciona para encajar de forma precisa \n"
+"en dos mensajes túnel I2NP (I2P Network Protocol) de 1KB, y es un \n"
+"compromiso de equilibrio razonable entre el coste en ancho de banda de \n"
+"retransmitir mensajes perdidos, y la latencia y tráfico de control de \n"
+"múltiples mensajes."
#: i2p2www/pages/site/docs/api/streaming.html:499
#: i2p2www/pages/site/docs/how/elgamal-aes.html:344
@@ -3208,35 +4689,62 @@ msgid ""
"The behavior of the streaming library has a profound impact on\n"
"application-level performance, and as such, is an important\n"
"area for further analysis."
-msgstr "El comportamiento de la librería streaming tiene un profundo impacto sobre\nel rendimiento en el nivel-aplicación, y como tal, es un área importante para análisis detallados."
+msgstr ""
+"El comportamiento de la librería streaming tiene un profundo impacto "
+"sobre\n"
+"el rendimiento en el nivel-aplicación, y como tal, es un área importante "
+"para análisis detallados."
#: i2p2www/pages/site/docs/api/streaming.html:506
msgid "Additional tuning of the streaming lib parameters may be necessary."
-msgstr "Podrían ser necesarios ajustes adicionales de los parámetros de librería streaming."
+msgstr ""
+"Podrían ser necesarios ajustes adicionales de los parámetros de librería "
+"streaming."
#: i2p2www/pages/site/docs/api/streaming.html:509
#, python-format
msgid ""
-"Another area for research is the interaction of the streaming lib with the\n"
+"Another area for research is the interaction of the streaming lib with "
+"the\n"
"NTCP and SSU transport layers.\n"
"See the NTCP discussion page for details."
-msgstr "Otro área de investigación es la interacción de la librería streaming con las capas de transporte NTCP (TCP basado en NIO) y SSU (UDP Seguro \nSemiconfiable). Para mayor detalle vea la página de discusión sobre NTCP."
+msgstr ""
+"Otro área de investigación es la interacción de la librería streaming con"
+" las capas de transporte NTCP (TCP basado en NIO) y SSU (UDP Seguro \n"
+"Semiconfiable). Para mayor detalle vea la página"
+" de discusión sobre NTCP."
#: i2p2www/pages/site/docs/api/streaming.html:514
msgid ""
-"The interaction of the routing algorithms with the streaming lib strongly affects performance.\n"
-"In particular, random distribution of messages to multiple tunnels in a pool\n"
-"leads to a high degree of out-of-order delivery which results in smaller window\n"
+"The interaction of the routing algorithms with the streaming lib strongly"
+" affects performance.\n"
+"In particular, random distribution of messages to multiple tunnels in a "
+"pool\n"
+"leads to a high degree of out-of-order delivery which results in smaller "
+"window\n"
"sizes than would otherwise be the case. The router currently routes \n"
"messages for a single from/to destination pair through a consistent set \n"
"of tunnels, until tunnel expiration or delivery failure. The router's \n"
"failure and tunnel selection algorithms should be reviewed for possible \n"
"improvements."
-msgstr "La interacción de los algoritmos de enrutado con la librería streaming afecta \nfuertemente al rendimiento. En particular, la distribución aleatoria de \nmensajes a múltiples túneles entre los que están en depósito, lleva a un alto grado de entregas estropeadas que resultan en tamaños de ventana \nmás pequeños de lo que serían en otro caso. Actualmente el router enruta \nmensajes para un único par desde/hacia el destino a través de un conjunto consistente de túneles, hasta la expiración del túnel o un fallo en la entrega. El fallo del router y los algoritmos de selección del túnel deben ser revisados en busca de posibles mejoras."
+msgstr ""
+"La interacción de los algoritmos de enrutado con la librería streaming "
+"afecta \n"
+"fuertemente al rendimiento. En particular, la distribución aleatoria de \n"
+"mensajes a múltiples túneles entre los que están en depósito, lleva a un "
+"alto grado de entregas estropeadas que resultan en tamaños de ventana \n"
+"más pequeños de lo que serían en otro caso. Actualmente el router enruta"
+" \n"
+"mensajes para un único par desde/hacia el destino a través de un conjunto"
+" consistente de túneles, hasta la expiración del túnel o un fallo en la "
+"entrega. El fallo del router y los algoritmos de selección del túnel "
+"deben ser revisados en busca de posibles mejoras."
#: i2p2www/pages/site/docs/api/streaming.html:524
msgid "The data in the first SYN packet may exceed the receiver's MTU."
-msgstr "Los datos en el primer paquete SYN (sincronizar) pueden exceder la MTU (Unidad Máxima de Transporte) del receptor."
+msgstr ""
+"Los datos en el primer paquete SYN (sincronizar) pueden exceder la MTU "
+"(Unidad Máxima de Transporte) del receptor."
#: i2p2www/pages/site/docs/api/streaming.html:527
msgid "The DELAY_REQUESTED field could be used more."
@@ -3246,7 +4754,9 @@ msgstr "El campo DELAY_REQUESTED (demora requerida) podría ser usado más."
msgid ""
"Duplicate initial SYNCHRONIZE packets on short-lived streams may not be "
"recognized and removed."
-msgstr "Los paquetes iniciales SYNCHRONIZE duplicados sobre streams de \nvida-corta pueden ser no reconocidos y eliminados."
+msgstr ""
+"Los paquetes iniciales SYNCHRONIZE duplicados sobre streams de \n"
+"vida-corta pueden ser no reconocidos y eliminados."
#: i2p2www/pages/site/docs/api/streaming.html:533
msgid "Don't send the MTU in a retransmission."
@@ -3257,14 +4767,26 @@ msgid ""
"Data is sent along unless the outbound window is full.\n"
"(i.e. no-Nagle or TCP_NODELAY)\n"
"Probably should have a configuration option for this."
-msgstr "Los datos se envían al recorrido a menos que la ventana de salida esté \nllena (es decir sin-Nagle o TCP_NODELAY).\nProbablemente debe haber una opción de configuración para esto."
+msgstr ""
+"Los datos se envían al recorrido a menos que la ventana de salida esté \n"
+"llena (es decir sin-Nagle o TCP_NODELAY).\n"
+"Probablemente debe haber una opción de configuración para esto."
#: i2p2www/pages/site/docs/api/streaming.html:541
msgid ""
-"zzz has added debug code to the streaming library to log packets in a wireshark-compatible\n"
+"zzz has added debug code to the streaming library to log packets in a "
+"wireshark-compatible\n"
"(pcap) format; Use this to further analyze performance.\n"
-"The format may require enhancement to map more streaming lib parameters to TCP fields."
-msgstr "zzz ha añadido código de depuración a la librería streaming para registrar \n(`log`) paquetes en un formato compatible-wireshark (pcap); utilice esto para \nanalizar el rendimiento con mayor detalle. El formato puede requerir mejoras \npara mapear más parámetros de librería streaming en campos TCP."
+"The format may require enhancement to map more streaming lib parameters "
+"to TCP fields."
+msgstr ""
+"zzz ha añadido código de depuración a la librería streaming para "
+"registrar \n"
+"(`log`) paquetes en un formato compatible-wireshark (pcap); utilice esto "
+"para \n"
+"analizar el rendimiento con mayor detalle. El formato puede requerir "
+"mejoras \n"
+"para mapear más parámetros de librería streaming en campos TCP."
#: i2p2www/pages/site/docs/api/streaming.html:546
msgid ""
@@ -3272,7 +4794,13 @@ msgid ""
"(or perhaps a null layer together with raw sockets).\n"
"This would unfortunately be incompatible with the streaming lib\n"
"but it would be good to compare the performance of the two."
-msgstr "Hay propuestas para reemplazar la librería streaming con TCP estándar (o \nquizá con una capa vacía junto con sockets crudos (`raw`)). \nDesafortunadamente esto sería incompatible con la librería streaming pero \nsería bueno para comparar el rendimiento de los dos."
+msgstr ""
+"Hay propuestas para reemplazar la librería streaming con TCP estándar (o"
+" \n"
+"quizá con una capa vacía junto con sockets crudos (`raw`)). \n"
+"Desafortunadamente esto sería incompatible con la librería streaming pero"
+" \n"
+"sería bueno para comparar el rendimiento de los dos."
#: i2p2www/pages/site/docs/applications/bittorrent.html:3
msgid "May 2014"
@@ -3282,20 +4810,37 @@ msgstr "Mayo de 2014"
msgid ""
"There are several bittorrent clients and trackers on I2P.\n"
"As I2P addressing uses a Destination instead of an IP and port, minor\n"
-"changes are required to tracker and client software for operation on I2P.\n"
+"changes are required to tracker and client software for operation on I2P."
+"\n"
"These changes are specified below.\n"
-"Note carefully the guidelines for compatibility with older I2P clients and trackers."
-msgstr "Hay varios clientes bittorrent y trackers sobre I2P. Como el direccionamiento \nde I2P usa un Destino en lugar de IP y puerto, los cambios que se requieren \nen los softwares del tracker y del cliente para operar sobre I2P son \nmenores. Estos cambios se especifican debajo. Observe con cuidado las \ndirectrices para compatibilidad con anteriores clientes y trackers I2P."
+"Note carefully the guidelines for compatibility with older I2P clients "
+"and trackers."
+msgstr ""
+"Hay varios clientes bittorrent y trackers sobre I2P. Como el "
+"direccionamiento \n"
+"de I2P usa un Destino en lugar de IP y puerto, los cambios que se "
+"requieren \n"
+"en los softwares del tracker y del cliente para operar sobre I2P son \n"
+"menores. Estos cambios se especifican debajo. Observe con cuidado las \n"
+"directrices para compatibilidad con anteriores clientes y trackers I2P."
#: i2p2www/pages/site/docs/applications/bittorrent.html:15
msgid ""
"This page specifies protocol details common to all clients and trackers.\n"
-"Specific clients and trackers may implement other unique features or protocols."
-msgstr "Esta página especifica detalles del protocolo comunes a todos los clientes \ny trackers. Los clientes y trackers específicos pueden implementar otras \ncaracterísticas únicas o protocolos."
+"Specific clients and trackers may implement other unique features or "
+"protocols."
+msgstr ""
+"Esta página especifica detalles del protocolo comunes a todos los "
+"clientes \n"
+"y trackers. Los clientes y trackers específicos pueden implementar otras"
+" \n"
+"características únicas o protocolos."
#: i2p2www/pages/site/docs/applications/bittorrent.html:20
msgid "We welcome additional ports of client and tracker software to I2P."
-msgstr "Son bienvenidos puertos adicionales de software de cliente y tracker para I2P."
+msgstr ""
+"Son bienvenidos puertos adicionales de software de cliente y tracker para"
+" I2P."
#: i2p2www/pages/site/docs/applications/bittorrent.html:26
msgid "Announces"
@@ -3303,9 +4848,14 @@ msgstr "Anuncios"
#: i2p2www/pages/site/docs/applications/bittorrent.html:27
msgid ""
-"Clients generally include a fake port=6881 parameter in the announce, for compatibility with older trackers.\n"
+"Clients generally include a fake port=6881 parameter in the announce, for"
+" compatibility with older trackers.\n"
"Trackers may ignore the port parameter, and should not require it."
-msgstr "Los clientes generalmente incluyen un parámetro falso port=6881 en el \nanuncio, por compatibilidad con anteriores trackers. Los trackers pueden \nignorar el parámetro port (puerto), y no deberían necesitarlo."
+msgstr ""
+"Los clientes generalmente incluyen un parámetro falso port=6881 en el \n"
+"anuncio, por compatibilidad con anteriores trackers. Los trackers pueden"
+" \n"
+"ignorar el parámetro port (puerto), y no deberían necesitarlo."
#: i2p2www/pages/site/docs/applications/bittorrent.html:32
#, python-format
@@ -3315,9 +4865,18 @@ msgid ""
"using the I2P Base 64 alphabet [A-Z][a-z][0-9]-~.\n"
"Destinations\n"
"are 387+ bytes, so the Base 64 is 516+ bytes.\n"
-"Clients generally append \".i2p\" to the Base 64 Destination for compatibility with older trackers.\n"
+"Clients generally append \".i2p\" to the Base 64 Destination for "
+"compatibility with older trackers.\n"
"Trackers should not require an appended \".i2p\"."
-msgstr "El parámetro IP es la base 64 de la Destinación del cliente, usando el alfabeto I2P Base 64 [A-Z][a-z][0-9]-~. Las Destinaciones son de 387+ bytes, con lo que la Base 64 es de 516+ bytes. Los clientes generalmente añaden \".i2p\" a la Destinación Base 64 para mantener la compatibilidad con los trackers antiguos. Los trackers no deberían necesitar añadir \".i2p\" al final."
+msgstr ""
+"El parámetro IP es la base 64 de la Destinación del "
+"cliente, usando el alfabeto I2P Base 64 [A-Z][a-z][0-9]-~. Las Destinaciones son de"
+" 387+ bytes, con lo que la Base 64 es de 516+ bytes. Los clientes "
+"generalmente añaden \".i2p\" a la Destinación Base 64 para mantener la "
+"compatibilidad con los trackers antiguos. Los trackers no deberían "
+"necesitar añadir \".i2p\" al final."
#: i2p2www/pages/site/docs/applications/bittorrent.html:42
msgid "Other parameters are the same as in standard bittorrent."
@@ -3325,32 +4884,58 @@ msgstr "Otros parámetros son los mismos que en el bittorrent estandar."
#: i2p2www/pages/site/docs/applications/bittorrent.html:46
msgid ""
-"While all current Destinations for clients are exactly 387 bytes, a tracker should not\n"
-"presume that will always be so. A reasonable maximum to assume, for now, is 475 bytes.\n"
-"As the tracker must decode the Base64 to deliver compact responses (see below),\n"
+"While all current Destinations for clients are exactly 387 bytes, a "
+"tracker should not\n"
+"presume that will always be so. A reasonable maximum to assume, for now, "
+"is 475 bytes.\n"
+"As the tracker must decode the Base64 to deliver compact responses (see "
+"below),\n"
"the tracker should probably decode and reject bad Base64 when announced."
-msgstr "Aunque todos los Destinos actuales para clientes son exactamente de \n387 bytes, un tracker no debería presumir que siempre será así. Un valor \nmáximo razonable a asumir, por ahora, es 475 bytes. Como el tracker debe \ndecodificar la Base64 para entregar respuestas compactas (vea debajo), el \ntracker probablemente debe decodificar y rechazar las Base64 defectuosas cuando se anuncie."
+msgstr ""
+"Aunque todos los Destinos actuales para clientes son exactamente de \n"
+"387 bytes, un tracker no debería presumir que siempre será así. Un valor"
+" \n"
+"máximo razonable a asumir, por ahora, es 475 bytes. Como el tracker debe"
+" \n"
+"decodificar la Base64 para entregar respuestas compactas (vea debajo), el"
+" \n"
+"tracker probablemente debe decodificar y rechazar las Base64 defectuosas "
+"cuando se anuncie."
#: i2p2www/pages/site/docs/applications/bittorrent.html:53
msgid ""
-"The default response type is non-compact. Clients may request a compact response with\n"
+"The default response type is non-compact. Clients may request a compact "
+"response with\n"
"the parameter compact=1. A tracker may, but is not required to, return\n"
"a compact response when requested."
-msgstr "La respuesta tipo predeterminada es no-compacta. Los clientes pueden \nsolicitar una respuesta compacta con el parámetro compact=1. Un tracker\npodría, pero no es un requisito, devolver una respuesta compacta cuando\nse le solicite."
+msgstr ""
+"La respuesta tipo predeterminada es no-compacta. Los clientes pueden \n"
+"solicitar una respuesta compacta con el parámetro compact=1. Un tracker\n"
+"podría, pero no es un requisito, devolver una respuesta compacta cuando\n"
+"se le solicite."
#: i2p2www/pages/site/docs/applications/bittorrent.html:59
msgid ""
"Developers of new I2P clients\n"
-"are strongly encouraged to implemenent announces over their own tunnel rather than\n"
-"the HTTP client proxy at port 4444. Doing so is both more efficient and it allows\n"
+"are strongly encouraged to implemenent announces over their own tunnel "
+"rather than\n"
+"the HTTP client proxy at port 4444. Doing so is both more efficient and "
+"it allows\n"
"destination enforcement by the tracker (see below)."
-msgstr "A los desarrolladores de nuevos clientes I2P se les anima fuertemente a \nimplementar anuncios sobre su propio túnel en lugar de sobre el proxy del \ncliente HTTP en el puerto 4444. Hacerlo así es tanto más eficiente como a su vez permite al tracker aplicar destinos (vea debajo)."
+msgstr ""
+"A los desarrolladores de nuevos clientes I2P se les anima fuertemente a \n"
+"implementar anuncios sobre su propio túnel en lugar de sobre el proxy del"
+" \n"
+"cliente HTTP en el puerto 4444. Hacerlo así es tanto más eficiente como a"
+" su vez permite al tracker aplicar destinos (vea debajo)."
#: i2p2www/pages/site/docs/applications/bittorrent.html:66
msgid ""
"There are no known I2P clients or trackers that currently support UDP "
"announce/responses."
-msgstr "No hay clientes o trackers I2P conocidos que actualmente soporten anuncios/respuestas UDP."
+msgstr ""
+"No hay clientes o trackers I2P conocidos que actualmente soporten "
+"anuncios/respuestas UDP."
#: i2p2www/pages/site/docs/applications/bittorrent.html:71
msgid "Non-Compact Tracker Responses"
@@ -3360,26 +4945,45 @@ msgstr "Respuestas de tracker no-compactas"
msgid ""
"The non-compact response is just as in standard bittorrent, with an I2P "
"\"ip\"."
-msgstr "La respuesta no-compacta es como la del bittorrent estándar, con una \"ip\" I2P."
+msgstr ""
+"La respuesta no-compacta es como la del bittorrent estándar, con una "
+"\"ip\" I2P."
#: i2p2www/pages/site/docs/applications/bittorrent.html:76
msgid ""
-"Trackers generally include a fake port key, or use the port from the announce, for compatibility with older clients.\n"
+"Trackers generally include a fake port key, or use the port from the "
+"announce, for compatibility with older clients.\n"
"Clients must ignore the port parameter, and should not require it."
-msgstr "Los trackers generalmente incluyen un clave de puerto falsa, o usan el puerto del anuncio, por compatibilidad con anteriores clientes. Los \nclientes deben ignorar el parámetro port (puerto), y no deben solicitarlo."
+msgstr ""
+"Los trackers generalmente incluyen un clave de puerto falsa, o usan el "
+"puerto del anuncio, por compatibilidad con anteriores clientes. Los \n"
+"clientes deben ignorar el parámetro port (puerto), y no deben solicitarlo."
#: i2p2www/pages/site/docs/applications/bittorrent.html:81
#, python-format
msgid ""
"The value of the ip key is the base 64 of the client's\n"
-"Destination, as described above.\n"
-"Trackers generally append \".i2p\" to the Base 64 Destination if it wasn't in the announce ip, for compatibility with older clients.\n"
+"Destination, as "
+"described above.\n"
+"Trackers generally append \".i2p\" to the Base 64 Destination if it "
+"wasn't in the announce ip, for compatibility with older clients.\n"
"Clients should not require an appended \".i2p\" in the responses."
-msgstr "El valor de la clave ip es la base 64 del Destino del cliente, como se \ndescribe arriba. Los trackers generalmente añaden \".i2p\" al final del Destino \nBase 64 si no estaba en el ip del anuncio, por compatibilidad con anteriores \nclientes. Los clientes no deben solicitar un sufijo \".i2p\" en las respuestas."
+msgstr ""
+"El valor de la clave ip es la base 64 del Destino del cliente,"
+" como se \n"
+"describe arriba. Los trackers generalmente añaden \".i2p\" al final del "
+"Destino \n"
+"Base 64 si no estaba en el ip del anuncio, por compatibilidad con "
+"anteriores \n"
+"clientes. Los clientes no deben solicitar un sufijo \".i2p\" en las "
+"respuestas."
#: i2p2www/pages/site/docs/applications/bittorrent.html:88
msgid "Other response keys and values are the same as in standard bittorrent."
-msgstr "Otras claves y valores de respuesta son los mismos que en el bittorrent estandar."
+msgstr ""
+"Otras claves y valores de respuesta son los mismos que en el bittorrent "
+"estandar."
#: i2p2www/pages/site/docs/applications/bittorrent.html:94
msgid "Compact Tracker Responses"
@@ -3388,24 +4992,46 @@ msgstr "Respuestas de tracker compactas"
#: i2p2www/pages/site/docs/applications/bittorrent.html:95
#, python-format
msgid ""
-"In the compact response, the value of the \"peers\" dictionary key is a single byte string,\n"
+"In the compact response, the value of the \"peers\" dictionary key is a "
+"single byte string,\n"
"whose length is a multiple of 32 bytes.\n"
"This string contains the concatenated\n"
"32-byte SHA-256 Hashes\n"
"of the binary\n"
"Destinations\n"
"of the peers.\n"
-"This hash must be computed by the tracker, unless destination enforcement\n"
-"(see below) is used, in which case the hash delivered in the X-I2P-DestHash\n"
+"This hash must be computed by the tracker, unless destination enforcement"
+"\n"
+"(see below) is used, in which case the hash delivered in the X-I2P-"
+"DestHash\n"
"or X-I2P-DestB32 HTTP headers may be converted to binary and stored.\n"
"The peers key may be absent, or the peers value may be zero-length."
-msgstr "En la respuesta compacta, el valor de la clave de diccionario de los \"peers\" (pares) es una única cadena de bytes, cuya longitud es un múltiplo de 32 \nbytes. Esta cadena contiene los Hashes SHA-256 de 32-bytes \nconcatenados del binario Destinos de los pares. Este \n`hash` (identificador único) debe calcularse por el tracker, a menos que use \naplicación en destino (vea debajo), en cuyo caso el identificador (`hash`) \nentregado en las cabeceras HTTP X-I2P-DestHash o X-I2P-DestB32 puede ser convertido a binario y almacenado. La clave de los pares (`peers`) \npuede estar ausente, o el valor de los pares puede tener longitud-cero."
+msgstr ""
+"En la respuesta compacta, el valor de la clave de diccionario de los "
+"\"peers\" (pares) es una única cadena de bytes, cuya longitud es un "
+"múltiplo de 32 \n"
+"bytes. Esta cadena contiene los Hashes SHA-256 de 32-bytes \n"
+"concatenados del binario Destinos de los "
+"pares. Este \n"
+"`hash` (identificador único) debe calcularse por el tracker, a menos que "
+"use \n"
+"aplicación en destino (vea debajo), en cuyo caso el identificador "
+"(`hash`) \n"
+"entregado en las cabeceras HTTP X-I2P-DestHash o X-I2P-DestB32 puede ser "
+"convertido a binario y almacenado. La clave de los pares (`peers`) \n"
+"puede estar ausente, o el valor de los pares puede tener longitud-cero."
#: i2p2www/pages/site/docs/applications/bittorrent.html:109
msgid ""
-"While compact response support is optional for both clients and trackers, it is highly\n"
+"While compact response support is optional for both clients and trackers,"
+" it is highly\n"
"recommended as it reduces the nominal response size by over 90%."
-msgstr "Aunque el soporte para respuesta compacta es opcional para ambos, \nclientes y trackers, es altamente recomendable ya que reduce el tamaño \nnominal de respuesta alrededor de un 90%."
+msgstr ""
+"Aunque el soporte para respuesta compacta es opcional para ambos, \n"
+"clientes y trackers, es altamente recomendable ya que reduce el tamaño \n"
+"nominal de respuesta alrededor de un 90%."
#: i2p2www/pages/site/docs/applications/bittorrent.html:116
msgid "Destination Enforcement"
@@ -3414,30 +5040,56 @@ msgstr "Aplicación en destino"
#: i2p2www/pages/site/docs/applications/bittorrent.html:117
#, python-format
msgid ""
-"Some, but not all, I2P bittorrent clients announce over their own tunnels.\n"
-"Trackers may choose to prevent spoofing by requiring this, and verifying the\n"
+"Some, but not all, I2P bittorrent clients announce over their own "
+"tunnels.\n"
+"Trackers may choose to prevent spoofing by requiring this, and verifying "
+"the\n"
"client's\n"
"Destination\n"
"using HTTP headers added by the I2PTunnel HTTP Server tunnel.\n"
-"The headers are X-I2P-DestHash, X-I2P-DestB64, and X-I2P-DestB32, which are\n"
+"The headers are X-I2P-DestHash, X-I2P-DestB64, and X-I2P-DestB32, which "
+"are\n"
"different formats for the same information.\n"
"These headers cannot be spoofed by the client.\n"
-"A tracker enforcing destinations need not require the ip announce parameter at all."
-msgstr "Algunos clientes de torrent de I2P, aunque no todos, anuncian sus propios túneles. Los trackers pueden elegir el prevenir engaños exigiéndolos, y verificando la Destinación de los clientes usando las cabeceras añadidas por el túnel servidor HTTP I2PTunnel. Las cabeceras son X-I2P-DestHash, X-I2P-DestB64, y X-I2P-DestB32, que son diferentes formatos para la misma información. Estas cabeceras no pueden ser falseadas por el cliente. Un tracker exigiendo destinaciones no necesita el parámetro de anuncio de la ip para nada."
+"A tracker enforcing destinations need not require the ip announce "
+"parameter at all."
+msgstr ""
+"Algunos clientes de torrent de I2P, aunque no todos, anuncian sus propios"
+" túneles. Los trackers pueden elegir el prevenir engaños exigiéndolos, y "
+"verificando la Destinación de los "
+"clientes usando las cabeceras añadidas por el túnel servidor HTTP "
+"I2PTunnel. Las cabeceras son X-I2P-DestHash, X-I2P-DestB64, y X-I2P-"
+"DestB32, que son diferentes formatos para la misma información. Estas "
+"cabeceras no pueden ser falseadas por el cliente. Un tracker exigiendo "
+"destinaciones no necesita el parámetro de anuncio de la ip para nada."
#: i2p2www/pages/site/docs/applications/bittorrent.html:129
msgid ""
-"As several clients use the HTTP proxy instead of their own tunnel for announces,\n"
-"destination enforcement will prevent usage by those clients unless or until\n"
+"As several clients use the HTTP proxy instead of their own tunnel for "
+"announces,\n"
+"destination enforcement will prevent usage by those clients unless or "
+"until\n"
"those clients are converted to announcing over their own tunnel."
-msgstr "Como varios clientes usan el proxy HTTP en lugar de sus propios túneles \npara los anuncios, la aplicación de destino (en el tracker) prevendrá su uso \npor aquellos clientes a menos que, o hasta que, aquellos clientes se \nreconviertan para anunciarse sobre sus propios túneles. "
+msgstr ""
+"Como varios clientes usan el proxy HTTP en lugar de sus propios túneles \n"
+"para los anuncios, la aplicación de destino (en el tracker) prevendrá su "
+"uso \n"
+"por aquellos clientes a menos que, o hasta que, aquellos clientes se \n"
+"reconviertan para anunciarse sobre sus propios túneles. "
#: i2p2www/pages/site/docs/applications/bittorrent.html:135
msgid ""
-"Unfortunately, as the network grows, so will the amount of maliciousness,\n"
+"Unfortunately, as the network grows, so will the amount of maliciousness,"
+"\n"
"so we expect that all trackers will eventually enforce destinations.\n"
"Both tracker and client developers should anticipate it."
-msgstr "Desafortunadamente, al crecer la red, también lo hará la cantidad de \nmaliciosidad, así que esperamos que en su momento todos los trackers \napliquen los destinos. Ambos, desarrolladores de trackers y clientes deben \nanticiparlo."
+msgstr ""
+"Desafortunadamente, al crecer la red, también lo hará la cantidad de \n"
+"maliciosidad, así que esperamos que en su momento todos los trackers \n"
+"apliquen los destinos. Ambos, desarrolladores de trackers y clientes "
+"deben \n"
+"anticiparlo."
#: i2p2www/pages/site/docs/applications/bittorrent.html:143
msgid "Announce Host Names"
@@ -3448,16 +5100,30 @@ msgstr "Nombres de Servidor de Anuncio"
msgid ""
"Announce URL host names in torrent files generally follow the\n"
"I2P naming standards.\n"
-"In addition to host names from address books and \".b32.i2p\" Base 32 hostnames,\n"
-"the full Base 64 Destination (with [or without?] \".i2p\" appended) should be supported.\n"
-"Non-open trackers should recognize their own host name in any of these formats."
-msgstr "Los nombres de servidor de URLs de anuncio en los archivos torrent siguen\ngeneralmente los estándares de nombres I2P. Además de los \nnombres de servidor de las libretas de direcciones y los nombre de servidor Base 32 \".b32.i2p\", el Destino Base 64 completo (con [¿o sin?] \nsufijo \".i2p\"] debe ser soportado. Los trackers no-abiertos deben \nreconocer sus propios nombres de servidor en cualquiera de estos formatos."
+"In addition to host names from address books and \".b32.i2p\" Base 32 "
+"hostnames,\n"
+"the full Base 64 Destination (with [or without?] \".i2p\" appended) "
+"should be supported.\n"
+"Non-open trackers should recognize their own host name in any of these "
+"formats."
+msgstr ""
+"Los nombres de servidor de URLs de anuncio en los archivos torrent siguen"
+"\n"
+"generalmente los estándares de nombres I2P. "
+"Además de los \n"
+"nombres de servidor de las libretas de direcciones y los nombre de "
+"servidor Base 32 \".b32.i2p\", el Destino Base 64 completo (con [¿o sin?]"
+" \n"
+"sufijo \".i2p\"] debe ser soportado. Los trackers no-abiertos deben \n"
+"reconocer sus propios nombres de servidor en cualquiera de estos formatos."
#: i2p2www/pages/site/docs/applications/bittorrent.html:152
msgid ""
"To preserve anonymity,\n"
"clients should generally ignore non-I2P announce URLs in torrent files."
-msgstr "Para preservar el anonimato, los clientes por lo general deben ignorar URLs de anuncio no-I2P en los ficheros torrent."
+msgstr ""
+"Para preservar el anonimato, los clientes por lo general deben ignorar "
+"URLs de anuncio no-I2P en los ficheros torrent."
#: i2p2www/pages/site/docs/applications/bittorrent.html:159
msgid "Client Connections"
@@ -3467,28 +5133,53 @@ msgstr "Conexiones entre clientes"
msgid ""
"Client-to-client connections use the standard protocol over TCP.\n"
"There are no known I2P clients that currently support uTP communication."
-msgstr "Las conexiones cliente-a-cliente usan el protocolo estándar sobre TCP. \nActualmente no hay clientes I2P conocidos que soporten comunicación uTP \n(Protocol de Transporte utorrent)."
+msgstr ""
+"Las conexiones cliente-a-cliente usan el protocolo estándar sobre TCP. \n"
+"Actualmente no hay clientes I2P conocidos que soporten comunicación uTP \n"
+"(Protocol de Transporte utorrent)."
#: i2p2www/pages/site/docs/applications/bittorrent.html:165
#, python-format
msgid ""
-"I2P uses 387+ byte Destinations\n"
+"I2P uses 387+ byte Destinations\n"
"for addresses, as explained above."
-msgstr "I2P usa Destinos de 387+ bytes para direcciones, como se explicó arriba."
+msgstr ""
+"I2P usa Destinos "
+"de 387+ bytes para direcciones, como se explicó arriba."
#: i2p2www/pages/site/docs/applications/bittorrent.html:170
msgid ""
-"If the client has only the hash of the destination (such as from a compact response or PEX), it must perform a lookup\n"
-"by encoding it with Base 32, appending \".b32.i2p\", and querying the Naming Service,\n"
+"If the client has only the hash of the destination (such as from a "
+"compact response or PEX), it must perform a lookup\n"
+"by encoding it with Base 32, appending \".b32.i2p\", and querying the "
+"Naming Service,\n"
"which will return the full Destination if available."
-msgstr "Si el cliente tiene sólo el identificador criptográfico (`hash`) del destino \n(como el de una respuesta compacta o el PEX (protocolo de Intercambio de \nPares)), debe realizar una búsqueda codificándolo con Base 32, añadiendo \nel sufijo \".b32.i2p\", y consultando en el Servicio de Nombres, que devolverá \nel Destino completo si está disponible."
+msgstr ""
+"Si el cliente tiene sólo el identificador criptográfico (`hash`) del "
+"destino \n"
+"(como el de una respuesta compacta o el PEX (protocolo de Intercambio de"
+" \n"
+"Pares)), debe realizar una búsqueda codificándolo con Base 32, añadiendo"
+" \n"
+"el sufijo \".b32.i2p\", y consultando en el Servicio de Nombres, que "
+"devolverá \n"
+"el Destino completo si está disponible."
#: i2p2www/pages/site/docs/applications/bittorrent.html:176
msgid ""
-"If the client has a peer's full Destination it received in a non-compact response, it should use it\n"
+"If the client has a peer's full Destination it received in a non-compact "
+"response, it should use it\n"
"directly in the connection setup.\n"
-"Do not convert a Destination back to a Base 32 hash for lookup, this is quite inefficient."
-msgstr "Si el cliente tiene el Destino completo de un par (`peer`) que recibió en una \nrespuesta no-compacta, debe usarlo directamente en el establecimiento de \nla conexión. No convierta un Destino de vuelta a un identificador \ncriptográfico (`hash`) Base 32, esto es bastante ineficiente."
+"Do not convert a Destination back to a Base 32 hash for lookup, this is "
+"quite inefficient."
+msgstr ""
+"Si el cliente tiene el Destino completo de un par (`peer`) que recibió en"
+" una \n"
+"respuesta no-compacta, debe usarlo directamente en el establecimiento de"
+" \n"
+"la conexión. No convierta un Destino de vuelta a un identificador \n"
+"criptográfico (`hash`) Base 32, esto es bastante ineficiente."
#: i2p2www/pages/site/docs/applications/bittorrent.html:183
msgid "Cross-Network Prevention"
@@ -3497,34 +5188,75 @@ msgstr "Prevención de redes-cruzadas."
#: i2p2www/pages/site/docs/applications/bittorrent.html:184
msgid ""
"To preserve anonymity,\n"
-"I2P bittorrent clients generally do not support non-I2P announces or peer connections.\n"
+"I2P bittorrent clients generally do not support non-I2P announces or peer"
+" connections.\n"
"I2P HTTP outproxies often block announces.\n"
"There are no known SOCKS outproxies supporting bittorrent traffic."
-msgstr "Para preservar el anonimato, los clientes I2P bittorrent por lo general no soportan anuncios no-I2P, o conexiones de pares (`peers`). Los proxys \nal exterior (`outproxies`) HTTP de I2P con frecuencia bloquean anuncios. No \nhay proxys al exterior SOCKS conocidos que soporten tráfico bittorrent."
+msgstr ""
+"Para preservar el anonimato, los clientes I2P bittorrent por lo general "
+"no soportan anuncios no-I2P, o conexiones de pares (`peers`). Los proxys"
+" \n"
+"al exterior (`outproxies`) HTTP de I2P con frecuencia bloquean anuncios. "
+"No \n"
+"hay proxys al exterior SOCKS conocidos que soporten tráfico bittorrent."
#: i2p2www/pages/site/docs/applications/bittorrent.html:191
msgid ""
-"To prevent usage by non-I2P clients via an HTTP inproxy, I2P trackers often\n"
+"To prevent usage by non-I2P clients via an HTTP inproxy, I2P trackers "
+"often\n"
"block accesses or announces that contain an X-Forwarded-For HTTP header.\n"
-"Trackers should reject standard network announces with IPv4 or IPv6 IPs, and not deliver them in responses."
-msgstr "Para prevenir el uso por clientes no-I2P a través de un proxy hacia el \ninterior (`inproxy`) HTTP, los trackers I2P a menudo bloquean accesos o \nanuncios que contengan una cabecera HTTP X-Forwarded-For. Los \ntrackers deben rechazar anuncios de red estándar con IPs IPv4 o IPv6, y \nno entregarlos en las respuestas."
+"Trackers should reject standard network announces with IPv4 or IPv6 IPs, "
+"and not deliver them in responses."
+msgstr ""
+"Para prevenir el uso por clientes no-I2P a través de un proxy hacia el \n"
+"interior (`inproxy`) HTTP, los trackers I2P a menudo bloquean accesos o \n"
+"anuncios que contengan una cabecera HTTP X-Forwarded-For. Los \n"
+"trackers deben rechazar anuncios de red estándar con IPs IPv4 o IPv6, y \n"
+"no entregarlos en las respuestas."
#: i2p2www/pages/site/docs/applications/bittorrent.html:200
#, python-format
msgid ""
"I2P PEX is based on ut_pex.\n"
-"As there does not appear to be a formal specification of ut_pex available,\n"
+"As there does not appear to be a formal specification of ut_pex "
+"available,\n"
"it may be necessary to review the libtorrent source for assistance.\n"
"It is an extension message, identified as \"i2p_pex\" in\n"
-"the extension handshake.\n"
-"It contains a bencoded dictionary with up to 3 keys, \"added\", \"added.f\", and \"dropped\".\n"
-"The added and dropped values are each a single byte string, whose length is a multiple of 32 bytes.\n"
+"the extension "
+"handshake.\n"
+"It contains a bencoded dictionary with up to 3 keys, \"added\", "
+"\"added.f\", and \"dropped\".\n"
+"The added and dropped values are each a single byte string, whose length "
+"is a multiple of 32 bytes.\n"
"These byte strings are the concatenated SHA-256 Hashes of the binary\n"
"Destinations\n"
"of the peers.\n"
-"This is the same format as the peers dictionary value in the i2p compact response format specified above.\n"
+"This is the same format as the peers dictionary value in the i2p compact "
+"response format specified above.\n"
"The added.f value, if present, is the same as in ut_pex."
-msgstr "El PEX (protocolo de Intercambio de Pares) I2P está basado en ut_pex \n(utorrent PEX). Como no parece haber una especificación ut_pex formal \ndisponible, puede ser necesario revisar el código fuente de libtorrent para \nobtener asistencia. Es un mensaje de extensión, identificado como \n\"i2p_pex\" en la extensión de toma de contacto (`handshake`). Contiene un diccionario \nb-codificado (`bencoded`) con hasta 3 claves, \"added\" (añadido), \"added.f\", \ny \"dropped\" (descartado). Los valores `added` y `dropped` son cada uno una \núnica cadena de bytes, cuyo tamaño es un múltiplo de 32 bytes. Estas \ncadenas de bytes son los identificadores criptográficos ('hashes') SHA-256 \nconcatenados del binario Destinos \nde los pares (`peers`). \nEste es el mismo formato que el de los valores de diccionario de los pares \nen el formato de respuesta compacta de I2P especificado arriba. Si está \npresente, el valor de added.f es el mismo que en ut_pex."
+msgstr ""
+"El PEX (protocolo de Intercambio de Pares) I2P está basado en ut_pex \n"
+"(utorrent PEX). Como no parece haber una especificación ut_pex formal \n"
+"disponible, puede ser necesario revisar el código fuente de libtorrent "
+"para \n"
+"obtener asistencia. Es un mensaje de extensión, identificado como \n"
+"\"i2p_pex\" en la extensión de "
+"toma de contacto (`handshake`). Contiene un diccionario \n"
+"b-codificado (`bencoded`) con hasta 3 claves, \"added\" (añadido), "
+"\"added.f\", \n"
+"y \"dropped\" (descartado). Los valores `added` y `dropped` son cada uno "
+"una \n"
+"única cadena de bytes, cuyo tamaño es un múltiplo de 32 bytes. Estas \n"
+"cadenas de bytes son los identificadores criptográficos ('hashes') "
+"SHA-256 \n"
+"concatenados del binario Destinos \n"
+"de los pares (`peers`). \n"
+"Este es el mismo formato que el de los valores de diccionario de los "
+"pares \n"
+"en el formato de respuesta compacta de I2P especificado arriba. Si está \n"
+"presente, el valor de added.f es el mismo que en ut_pex."
#: i2p2www/pages/site/docs/applications/bittorrent.html:218
msgid ""
@@ -3533,15 +5265,34 @@ msgid ""
"BEP 5\n"
"are described below, and are subject to change.\n"
"Contact the I2P developers if you wish to develop a client supporting DHT."
-msgstr "El soporte DHT (tabla de hash dinámica) está incluido en el cliente i2psnark \ndesde la versión 0.9.2. Las diferencias preliminares con la BEP 5 \n(Propuesta de Mejora de Bittorrent 5) están descritas debajo, y están \nsujetas a cambios. Contacte con los desarrolladores de I2P si quiere \ndesarrollar un cliente con soporte DHT."
+msgstr ""
+"El soporte DHT (tabla de hash dinámica) está incluido en el cliente "
+"i2psnark \n"
+"desde la versión 0.9.2. Las diferencias preliminares con la BEP 5 \n"
+"(Propuesta de Mejora de Bittorrent 5) están descritas debajo, y están \n"
+"sujetas a cambios. Contacte con los desarrolladores de I2P si quiere \n"
+"desarrollar un cliente con soporte DHT."
#: i2p2www/pages/site/docs/applications/bittorrent.html:226
msgid ""
-"Unlike standard DHT, I2P DHT does not use a bit in the options handshake, or the PORT message.\n"
+"Unlike standard DHT, I2P DHT does not use a bit in the options handshake,"
+" or the PORT message.\n"
"It is advertised with an extension message, identified as \"i2p_dht\" in\n"
-"the extension handshake.\n"
-"It contains a bencoded dictionary with two keys, \"port\" and \"rport\", both integers."
-msgstr "Al contario que DHT (tabla de hash dinámica), I2P DHT no usa bit alguno en \nlas opciones de toma de contacto (`handshake`), o en el mensaje PORT \n(puerto). Se anuncia con un mensaje de extensión, identificado como \n\"i2p_dht\" en la extensión handshake. Contiene un diccionario b-codificado \n(`bencoded`) con dos claves, \"port\" y \"rport\" (puerto de respuesta), ambos enteros."
+"the extension "
+"handshake.\n"
+"It contains a bencoded dictionary with two keys, \"port\" and \"rport\", "
+"both integers."
+msgstr ""
+"Al contario que DHT (tabla de hash dinámica), I2P DHT no usa bit alguno "
+"en \n"
+"las opciones de toma de contacto (`handshake`), o en el mensaje PORT \n"
+"(puerto). Se anuncia con un mensaje de extensión, identificado como \n"
+"\"i2p_dht\" en la extensión "
+"handshake. Contiene un diccionario b-codificado \n"
+"(`bencoded`) con dos claves, \"port\" y \"rport\" (puerto de respuesta), "
+"ambos enteros."
#: i2p2www/pages/site/docs/applications/bittorrent.html:233
msgid ""
@@ -3551,7 +5302,14 @@ msgid ""
"We call this the \"query port\".\n"
"This is the \"port\" value from the extension message.\n"
"Queries use I2CP protocol number 17."
-msgstr "Para recibir datagramas respondibles (firmados) se usa el puerto UDP\n(Protocolo de Datagrama de Usuario) listado en la información del nodo \ncompacto. Este se usa para consultas, excepto para anuncios. Le \nllamamos el \"query port\" (puerto de consulta). Es el valor \"port\" (puerto) del \nmensaje de extensión. Las consultas usan el protocolo I2CP (Protocolo \nde Cliente I2P) número 17."
+msgstr ""
+"Para recibir datagramas respondibles (firmados) se usa el puerto UDP\n"
+"(Protocolo de Datagrama de Usuario) listado en la información del nodo \n"
+"compacto. Este se usa para consultas, excepto para anuncios. Le \n"
+"llamamos el \"query port\" (puerto de consulta). Es el valor \"port\" "
+"(puerto) del \n"
+"mensaje de extensión. Las consultas usan el protocolo I2CP (Protocolo \n"
+"de Cliente I2P) número 17."
#: i2p2www/pages/site/docs/applications/bittorrent.html:242
msgid ""
@@ -3564,30 +5322,63 @@ msgid ""
"This is the \"rport\" value from the extension message.\n"
"It must be 1 + the query port.\n"
"Responses and announces use I2CP protocol number 18."
-msgstr "Además de ese puerto UDP, usamos un segundo puerto de datagrama igual \nal puerto de consulta + 1. Esto se usa para recibir datagramas no firmados \n(raw (crudos)) para las respuestas, errores, y anuncios. Este puerto \nproporciona una eficiencia aumentada ya que las respuestas contienen las \ncredenciales (`tokens`) enviadas en la consulta, y no necesitan ser \nfirmadas. Llamamos a esto el \"response port\" (puerto de respuesta). Este es el valor \"rport\" del mensaje de extensión. Las respuestas y los anuncios usan el protocolo I2CP número 18."
+msgstr ""
+"Además de ese puerto UDP, usamos un segundo puerto de datagrama igual \n"
+"al puerto de consulta + 1. Esto se usa para recibir datagramas no "
+"firmados \n"
+"(raw (crudos)) para las respuestas, errores, y anuncios. Este puerto \n"
+"proporciona una eficiencia aumentada ya que las respuestas contienen las"
+" \n"
+"credenciales (`tokens`) enviadas en la consulta, y no necesitan ser \n"
+"firmadas. Llamamos a esto el \"response port\" (puerto de respuesta). "
+"Este es el valor \"rport\" del mensaje de extensión. Las respuestas y los"
+" anuncios usan el protocolo I2CP número 18."
#: i2p2www/pages/site/docs/applications/bittorrent.html:254
msgid ""
"Compact peer info is 32 bytes (32 byte SHA256 Hash)\n"
"instead of 4 byte IP + 2 byte port. There is no peer port.\n"
-"In a response, the \"values\" key is a list of strings, each containing a single compact peer info."
-msgstr "La información compacta del par (`peer`) son 32 bytes (identificador criptográfico (`hash`) SHA256 de 32 bytes) en lugar de 4 bytes de IP + 2 bytes de puerto. No hay puerto del par. En una respuesta, la clave \n\"values\" (valores) es una lista de cadenas, conteniendo cada una la \ninformación compacta de un único par."
+"In a response, the \"values\" key is a list of strings, each containing a"
+" single compact peer info."
+msgstr ""
+"La información compacta del par (`peer`) son 32 bytes (identificador "
+"criptográfico (`hash`) SHA256 de 32 bytes) en lugar de 4 bytes de IP + 2 "
+"bytes de puerto. No hay puerto del par. En una respuesta, la clave \n"
+"\"values\" (valores) es una lista de cadenas, conteniendo cada una la \n"
+"información compacta de un único par."
#: i2p2www/pages/site/docs/applications/bittorrent.html:260
msgid ""
-"Compact node info is 54 bytes (20 byte SHA1 Hash + 32 byte SHA256 Hash + 2 byte port)\n"
+"Compact node info is 54 bytes (20 byte SHA1 Hash + 32 byte SHA256 Hash + "
+"2 byte port)\n"
"instead of 20 byte SHA1 Hash + 4 byte IP + 2 byte port.\n"
"In a response, the \"nodes\" key is a\n"
"single byte string with concatenated compact node info."
-msgstr "La información de nodo compacto son 54 bytes (20 bytes de hash SHA1 + \n32 bytes de hash SHA256 + 2 bytes de puerto) en lugar de 20 bytes de \nhash SHA1 + 4 bytes de IP + 2 bytes de puerto. En una respuesta, la clave \n\"nodes\" (nodos) es una única cadena de bytes con la información \nconcatenada de nodo compacto."
+msgstr ""
+"La información de nodo compacto son 54 bytes (20 bytes de hash SHA1 + \n"
+"32 bytes de hash SHA256 + 2 bytes de puerto) en lugar de 20 bytes de \n"
+"hash SHA1 + 4 bytes de IP + 2 bytes de puerto. En una respuesta, la clave"
+" \n"
+"\"nodes\" (nodos) es una única cadena de bytes con la información \n"
+"concatenada de nodo compacto."
#: i2p2www/pages/site/docs/applications/bittorrent.html:267
msgid ""
"Secure node ID requirement: To make various DHT attacks more difficult,\n"
-"the first 4 bytes of the Node ID must match the first 4 bytes of the destination Hash,\n"
-"and the next two bytes of the Node ID must match the next two bytes of the\n"
+"the first 4 bytes of the Node ID must match the first 4 bytes of the "
+"destination Hash,\n"
+"and the next two bytes of the Node ID must match the next two bytes of "
+"the\n"
"destination hash exclusive-ORed with the port."
-msgstr "Requisito de identificador (`ID`) de nodo seguro: Para hacer más difíciles diferentes ataques DHT (tabla de hash distribuida) los primeros 4 bytes \ndel identificador de nodo (`ID`) deben coincidir con los primeros 4 bytes del identificador criptográfico (`hash`) del destino, y los siguientes 2 bytes del identificador de nodo deben coincidir con los siguientes 2 bytes del resultado de la operación OR-exclusivo del hash del destino con el puerto. "
+msgstr ""
+"Requisito de identificador (`ID`) de nodo seguro: Para hacer más "
+"difíciles diferentes ataques DHT (tabla de hash distribuida) los primeros"
+" 4 bytes \n"
+"del identificador de nodo (`ID`) deben coincidir con los primeros 4 bytes"
+" del identificador criptográfico (`hash`) del destino, y los siguientes 2"
+" bytes del identificador de nodo deben coincidir con los siguientes 2 "
+"bytes del resultado de la operación OR-exclusivo del hash del destino con"
+" el puerto. "
#: i2p2www/pages/site/docs/applications/bittorrent.html:274
msgid ""
@@ -3598,7 +5389,15 @@ msgid ""
"containing a host string and a port integer.\n"
"Alternatives: A single byte string with concatenated hashes,\n"
"or a list of strings alone."
-msgstr "En un fichero torrent, la clave \"nodos\" del diccionario de un torrent sin \ntracker ha de ser determinada. Podría ser una lista de cadenas binarias de \n32 bytes (hashes SHA256) en lugar de una lista de listas que contengan \nuna cadena de servidor y un valor entero de puerto. \nAlternativas: Una única cadena de bytes con hashes concatenados, o una lista de cadenas por si solas."
+msgstr ""
+"En un fichero torrent, la clave \"nodos\" del diccionario de un torrent "
+"sin \n"
+"tracker ha de ser determinada. Podría ser una lista de cadenas binarias "
+"de \n"
+"32 bytes (hashes SHA256) en lugar de una lista de listas que contengan \n"
+"una cadena de servidor y un valor entero de puerto. \n"
+"Alternativas: Una única cadena de bytes con hashes concatenados, o una "
+"lista de cadenas por si solas."
#: i2p2www/pages/site/docs/applications/bittorrent.html:286
msgid "Datagram (UDP) Trackers"
@@ -3610,39 +5409,96 @@ msgid ""
"Preliminary differences from\n"
"BEP 15\n"
"are described below, and are subject to change.\n"
-"Contact the I2P developers if you wish to develop a client or tracker supporting datagram announces."
-msgstr "Aún no está disponible para clientes y trackers (rastreadores bittorrent) el soporte para trackers UDP.\nLas diferencias preliminares con la (propuesta de mejora de bittorrent)\nBEP 15\nestán descritas debajo, y son susceptibles de cambiar.\nContacte con los desarrolladores de I2P si desea desarrollar un cliente o un tracker que soporte anuncios sobre datagramas."
+"Contact the I2P developers if you wish to develop a client or tracker "
+"supporting datagram announces."
+msgstr ""
+"Aún no está disponible para clientes y trackers (rastreadores bittorrent)"
+" el soporte para trackers UDP.\n"
+"Las diferencias preliminares con la (propuesta de mejora de bittorrent)\n"
+"BEP 15\n"
+"están descritas debajo, y son susceptibles de cambiar.\n"
+"Contacte con los desarrolladores de I2P si desea desarrollar un cliente o"
+" un tracker que soporte anuncios sobre datagramas."
#: i2p2www/pages/site/docs/applications/bittorrent.html:295
msgid ""
"A UDP tracker listens on two ports.\n"
-"The \"query port\" is the advertised port, and is used to receive repliable (signed) datagrams, for the connect request only.\n"
-"The \"response port\" is used to receive unsigned (raw) datagrams, and is the source port for all replies.\n"
+"The \"query port\" is the advertised port, and is used to receive "
+"repliable (signed) datagrams, for the connect request only.\n"
+"The \"response port\" is used to receive unsigned (raw) datagrams, and is"
+" the source port for all replies.\n"
"The response port is arbitrary.\n"
"A client sends and receives on a single port only.\n"
"It receives only unsigned (raw) datagrams.\n"
-"Raw datagrams provides increased efficiency for replies since they contain tokens sent in the query, and need not be signed."
-msgstr "Un tracker UDP escucha en 2 puertos.\nEl \"puerto de petición\" es el puerto publicitado, y se usa para recibir datagramas respondibles (firmados), únicamente para la solicitud de conexión.\nEl \"puerto de respuesta\" se usa para recibir datagramas sin firmar (raw, en crudo), y es el puerto fuente para todas las respuestas.\nEl puerto de respuesta es arbitrario.\nUn cliente envía y recibe exclusivamente en un único puerto.\nÚnicamente recibe datagramas sin firmar (raw).\nLos datagramas raw proporcionan una mayor eficiencia para las respuestas, ya que contienen credenciales enviadas en la petición, y no necesitan estar firmados."
+"Raw datagrams provides increased efficiency for replies since they "
+"contain tokens sent in the query, and need not be signed."
+msgstr ""
+"Un tracker UDP escucha en 2 puertos.\n"
+"El \"puerto de petición\" es el puerto publicitado, y se usa para recibir"
+" datagramas respondibles (firmados), únicamente para la solicitud de "
+"conexión.\n"
+"El \"puerto de respuesta\" se usa para recibir datagramas sin firmar "
+"(raw, en crudo), y es el puerto fuente para todas las respuestas.\n"
+"El puerto de respuesta es arbitrario.\n"
+"Un cliente envía y recibe exclusivamente en un único puerto.\n"
+"Únicamente recibe datagramas sin firmar (raw).\n"
+"Los datagramas raw proporcionan una mayor eficiencia para las respuestas,"
+" ya que contienen credenciales enviadas en la petición, y no necesitan "
+"estar firmados."
#: i2p2www/pages/site/docs/applications/bittorrent.html:305
msgid ""
-"In the announce request, the 4-byte IP is replaced by a 32-byte hash, and the port is still present,\n"
+"In the announce request, the 4-byte IP is replaced by a 32-byte hash, and"
+" the port is still present,\n"
"although it may be ignored by the tracker.\n"
-"In the announce response, each 4-byte IP and 2-byte port is replaced by a 32-byte hash (compact peer info), and no port is present.\n"
-"The client sends the announce request and scrape request to the source port in the announce response packet.\n"
-"The connect request, connect response, scrape request, scrape response, and error response are the same as in BEP 15."
-msgstr "En la solicitud de anuncio, la IP de 4-bytes es reemplazada por un hash de 32-bytes, y el puerto todavía está presente, aunque puede ser ignorado por el tracker.\nEn la respuesta de anuncio, cada IP de 4-bytes y puerto de 2-bytes, es reemplazado por un hash (información compacta del par) de 32-bytes, sin presentar ningún puerto.\nEl cliente envía la solicitud de anuncio, y la solicitud de scrape (rascado, estadísticas del torrent) al puerto fuente del paquete de respuesta de anuncio.\nLa petición de conexión, la respuesta de conexión, la petición de scrape, la respuesta de scrape, y la respuesta de error, son los mismos que en la (proposición de mejora de bittorrent) BEP 15."
+"In the announce response, each 4-byte IP and 2-byte port is replaced by a"
+" 32-byte hash (compact peer info), and no port is present.\n"
+"The client sends the announce request and scrape request to the source "
+"port in the announce response packet.\n"
+"The connect request, connect response, scrape request, scrape response, "
+"and error response are the same as in BEP 15."
+msgstr ""
+"En la solicitud de anuncio, la IP de 4-bytes es reemplazada por un hash "
+"de 32-bytes, y el puerto todavía está presente, aunque puede ser ignorado"
+" por el tracker.\n"
+"En la respuesta de anuncio, cada IP de 4-bytes y puerto de 2-bytes, es "
+"reemplazado por un hash (información compacta del par) de 32-bytes, sin "
+"presentar ningún puerto.\n"
+"El cliente envía la solicitud de anuncio, y la solicitud de scrape "
+"(rascado, estadísticas del torrent) al puerto fuente del paquete de "
+"respuesta de anuncio.\n"
+"La petición de conexión, la respuesta de conexión, la petición de scrape,"
+" la respuesta de scrape, y la respuesta de error, son los mismos que en "
+"la (proposición de mejora de bittorrent) BEP 15."
#: i2p2www/pages/site/docs/applications/bittorrent.html:313
msgid ""
-"Source addresses in I2P cannot be spoofed, so it is possible to use a simplified protocol\n"
+"Source addresses in I2P cannot be spoofed, so it is possible to use a "
+"simplified protocol\n"
"with 2 packets instead of 4, omitting the connect request and response.\n"
-"In this case, the announce request would be a repliable datagram sent to the tracker's query port,\n"
+"In this case, the announce request would be a repliable datagram sent to "
+"the tracker's query port,\n"
"and the tracker would not require a response port.\n"
-"While this is more efficient, it would be more difficult to modify an existing tracker to support this mode.\n"
-"The URL for the 4-packet-mode tracker would use standard \"udp://\" prefix. \n"
-"The URL for a modified 2-packet-mode tracker would require a different prefix if both modes are supported in I2P."
-msgstr "Las direcciones fuente en I2P no pueden ser falsificadas, así que es posible usar un protocolo simplificado\ncon 2 paquetes en lugar de 4, omitiendo la solicitud y la respuesta de conexión.\nEn este caso, la solicitud de anuncio sería un datagrama respondible enviado al puerto de petición del tracker,\ny el tracker no requeriría un puerto de respuesta.\nAunque esto es más eficiente, sería más difícil modificar un tracker existente para que soportara este modo.\nLa URL para el tracker en modo-de-4-paquetes usaría el prefijo estandar \"udp://\".\nLa URL para un tracker modificado en modo-de-2-paquetes requeriría un prefijo diferente si ambos modos están soportados en I2P."
+"While this is more efficient, it would be more difficult to modify an "
+"existing tracker to support this mode.\n"
+"The URL for the 4-packet-mode tracker would use standard \"udp://\" "
+"prefix. \n"
+"The URL for a modified 2-packet-mode tracker would require a different "
+"prefix if both modes are supported in I2P."
+msgstr ""
+"Las direcciones fuente en I2P no pueden ser falsificadas, así que es "
+"posible usar un protocolo simplificado\n"
+"con 2 paquetes en lugar de 4, omitiendo la solicitud y la respuesta de "
+"conexión.\n"
+"En este caso, la solicitud de anuncio sería un datagrama respondible "
+"enviado al puerto de petición del tracker,\n"
+"y el tracker no requeriría un puerto de respuesta.\n"
+"Aunque esto es más eficiente, sería más difícil modificar un tracker "
+"existente para que soportara este modo.\n"
+"La URL para el tracker en modo-de-4-paquetes usaría el prefijo estandar "
+"\"udp://\".\n"
+"La URL para un tracker modificado en modo-de-2-paquetes requeriría un "
+"prefijo diferente si ambos modos están soportados en I2P."
#: i2p2www/pages/site/docs/applications/bittorrent.html:326
#: i2p2www/pages/site/docs/how/intro.html:184
@@ -3654,21 +5510,27 @@ msgstr "Información adicional"
msgid ""
"I2P bittorrent standards are generally discussed on %(zzz)s."
-msgstr "Los estandares bittorrent I2P se discuten generalmente en %(zzz)s."
+msgstr ""
+"Los estandares bittorrent I2P se discuten generalmente en %(zzz)s."
#: i2p2www/pages/site/docs/applications/bittorrent.html:331
#, python-format
msgid ""
"A chart of current tracker software capabilities is also available there."
-msgstr "Una gráfica con las capacidades del actual software de tracker también está disponible allí."
+msgstr ""
+"Una gráfica con las capacidades del actual software de tracker también "
+"está disponible allí."
#: i2p2www/pages/site/docs/applications/bittorrent.html:334
#, python-format
msgid ""
"The\n"
"I2P bittorrent FAQ"
-msgstr "El FAQ del bittorrent I2P"
+msgstr ""
+"El FAQ del bittorrent "
+"I2P"
#: i2p2www/pages/site/docs/applications/bittorrent.html:338
#, python-format
@@ -3681,17 +5543,31 @@ msgstr "Empotrar I2P en su aplicación"
#: i2p2www/pages/site/docs/applications/embedding.html:8
msgid ""
-"This page is about bundling the entire I2P router binary with your application.\n"
-"It is not about writing an application to work with I2P (either bundled or external)."
-msgstr "Esta página trata sobre el empaquetado del binario completo del router I2P con su aplicación.\nNo trata sobre escribir una aplicación que funcione con I2P (tanto empaquetada como externa)."
+"This page is about bundling the entire I2P router binary with your "
+"application.\n"
+"It is not about writing an application to work with I2P (either bundled "
+"or external)."
+msgstr ""
+"Esta página trata sobre el empaquetado del binario completo del router "
+"I2P con su aplicación.\n"
+"No trata sobre escribir una aplicación que funcione con I2P (tanto "
+"empaquetada como externa)."
#: i2p2www/pages/site/docs/applications/embedding.html:13
msgid ""
-"Lots of projects are bundling, or talking about bundling, I2P. That's great if done right.\n"
+"Lots of projects are bundling, or talking about bundling, I2P. That's "
+"great if done right.\n"
"If done wrong, it could cause real harm to our network.\n"
-"The I2P router is complex, and it can be a challenge to hide all the complexity from your users.\n"
+"The I2P router is complex, and it can be a challenge to hide all the "
+"complexity from your users.\n"
"This page discusses some general guidelines."
-msgstr "Muchos proyectos están empaquetando, o hablando de empaquetar, I2P. Esto es magnífico si se hace bien.\nSi se hace mal, podría causar un daño real a nuestra red.\nEl router I2P es complicado, y puede ser un desafío ocultar toda esa complejidad a sus usuarios.\nEsta página discute algunas directrices generales."
+msgstr ""
+"Muchos proyectos están empaquetando, o hablando de empaquetar, I2P. Esto "
+"es magnífico si se hace bien.\n"
+"Si se hace mal, podría causar un daño real a nuestra red.\n"
+"El router I2P es complicado, y puede ser un desafío ocultar toda esa "
+"complejidad a sus usuarios.\n"
+"Esta página discute algunas directrices generales."
#: i2p2www/pages/site/docs/applications/embedding.html:23
msgid "Talk to us"
@@ -3699,9 +5575,14 @@ msgstr "Hable con nosotros"
#: i2p2www/pages/site/docs/applications/embedding.html:24
msgid ""
-"Start a dialog. We're here to help. Applications that embed I2P are the most promising - and exciting -\n"
-"opportunities for us to grow the network and improve anonymity for everyone."
-msgstr "Inicie un diálogo. Estamos aquí para ayudar. Las aplicaciones que integra I2P representan las oportunidades más prometedoras - y excitantes -\npara nosotros de expandir la red y mejorar el anonimato para todos."
+"Start a dialog. We're here to help. Applications that embed I2P are the "
+"most promising - and exciting -\n"
+"opportunities for us to grow the network and improve anonymity for "
+"everyone."
+msgstr ""
+"Inicie un diálogo. Estamos aquí para ayudar. Las aplicaciones que integra"
+" I2P representan las oportunidades más prometedoras - y excitantes -\n"
+"para nosotros de expandir la red y mejorar el anonimato para todos."
#: i2p2www/pages/site/docs/applications/embedding.html:30
msgid "Choose your router wisely"
@@ -3709,44 +5590,81 @@ msgstr "Escoja su router I2P con sabiduría"
#: i2p2www/pages/site/docs/applications/embedding.html:31
msgid ""
-"If your application is in Java or Scala, it's an easy choice - use the Java router.\n"
+"If your application is in Java or Scala, it's an easy choice - use the "
+"Java router.\n"
"If in C/C++, we recommend i2pd. The development of i2pcpp has stopped.\n"
-"For apps in other languages, best to use SAM or BOB or SOCKS and bundle the Java router as a separate process.\n"
+"For apps in other languages, best to use SAM or BOB or SOCKS and bundle "
+"the Java router as a separate process.\n"
"Some of the following only applies to the Java router."
-msgstr "Si su aplicación está en Java o Scala, es una elección fácil - utilice el router I2P Java.\nSi está en C/C++, recomendamos i2pd. El desarrollo de i2pcpp se ha detenido.\nPara aplicaciones en otros lenguajes, es mejor usar SAM, o BOB, o SOCKS, y empaquetar el router I2P Java como un proceso separado de la aplicación.\nParte de lo siguiente sólo se aplica al router I2P Java."
+msgstr ""
+"Si su aplicación está en Java o Scala, es una elección fácil - utilice el"
+" router I2P Java.\n"
+"Si está en C/C++, recomendamos i2pd. El desarrollo de i2pcpp se ha "
+"detenido.\n"
+"Para aplicaciones en otros lenguajes, es mejor usar SAM, o BOB, o SOCKS, "
+"y empaquetar el router I2P Java como un proceso separado de la "
+"aplicación.\n"
+"Parte de lo siguiente sólo se aplica al router I2P Java."
#: i2p2www/pages/site/docs/applications/embedding.html:39
msgid "Licensing"
msgstr "Licenciamiento"
#: i2p2www/pages/site/docs/applications/embedding.html:40
-msgid ""
-"Ensure you meet the license requirements of the software you are bundling."
-msgstr "Asegúrese de que cumple con los requerimientos de la licencia del sofware que está empaquetando."
+msgid "Ensure you meet the license requirements of the software you are bundling."
+msgstr ""
+"Asegúrese de que cumple con los requerimientos de la licencia del sofware"
+" que está empaquetando."
#: i2p2www/pages/site/docs/applications/embedding.html:45
msgid "Verify default configuration"
-msgstr "Verificar la configuración por defecto"
+msgstr "Verifique la configuración por defecto"
#: i2p2www/pages/site/docs/applications/embedding.html:46
msgid ""
-"A correct default configuration is crucial. Most users will not change the defaults.\n"
-"The defaults for your application may need to be different than the defaults for the router you are bundling.\n"
+"A correct default configuration is crucial. Most users will not change "
+"the defaults.\n"
+"The defaults for your application may need to be different than the "
+"defaults for the router you are bundling.\n"
"Override the router defaults if necessary."
-msgstr "Una configuración por defecto correcta es crucial. La mayoría de los usuarios no cambiará la configuración predeterminada.\nPuede que la configuración por defecto para su aplicación tenga que ser diferente de la configuración por defecto para el router I2P que está empaquetando.\nImpóngase sobre la configuración predeterminada del router IP2 si es necesario."
+msgstr ""
+"Una configuración por defecto correcta es crucial. La mayoría de los "
+"usuarios no cambiará la configuración predeterminada.\n"
+"Puede que la configuración por defecto para su aplicación tenga que ser "
+"diferente de la configuración por defecto para el router I2P que está "
+"empaquetando.\n"
+"Impóngase sobre la configuración predeterminada del router IP2 si es "
+"necesario."
#: i2p2www/pages/site/docs/applications/embedding.html:51
msgid ""
-"Some important defaults to review: Max bandwidth, tunnel quantity and length, max participating tunnels.\n"
-"A lot of this depends on the expected bandwidth and usage patterns of your app."
-msgstr "Algunas configuraciones por defecto importantes a revisar: Máximo ancho de banda, cantidad y longitud de túneles, valor máximo de túneles participantes.\nGran parte de esto depende del ancho de banda esperado y de los patrones de uso de su aplicación."
+"Some important defaults to review: Max bandwidth, tunnel quantity and "
+"length, max participating tunnels.\n"
+"A lot of this depends on the expected bandwidth and usage patterns of "
+"your app."
+msgstr ""
+"Algunas configuraciones por defecto importantes a revisar: Máximo ancho "
+"de banda, cantidad y longitud de túneles, valor máximo de túneles "
+"participantes.\n"
+"Gran parte de esto depende del ancho de banda esperado y de los patrones "
+"de uso de su aplicación."
#: i2p2www/pages/site/docs/applications/embedding.html:55
msgid ""
-"Configure enough bandwidth and tunnels to allow your users to contribute to the network.\n"
-"Consider disabling external I2CP, as you probably don't need it and it would conflict with any other running I2P instance.\n"
-"Also look at the configs for disabling killing of the JVM on exit, for example."
-msgstr "Configure suficiente ancho de banda y túneles para permitir a sus usuarios contribuir a la red.\nConsidere deshabilitar el I2CP externo, ya que probablemente no lo necesita y entraría en conflicto con cualquier otra instancia de I2P en ejecución.\nRevise también las configuraciones, por ejemplo, para deshabilitar el cierre forzado de la JVM al salir."
+"Configure enough bandwidth and tunnels to allow your users to contribute "
+"to the network.\n"
+"Consider disabling external I2CP, as you probably don't need it and it "
+"would conflict with any other running I2P instance.\n"
+"Also look at the configs for disabling killing of the JVM on exit, for "
+"example."
+msgstr ""
+"Configure suficiente ancho de banda y túneles para permitir a sus "
+"usuarios contribuir a la red.\n"
+"Considere deshabilitar el I2CP (protocolo de cliente de I2P) externo, ya "
+"que probablemente no lo necesita y entraría en conflicto con cualquier "
+"otra instancia de I2P en ejecución.\n"
+"Revise también, por ejemplo, las configuraciones para deshabilitar el "
+"cierre forzado de la JVM (máquina virtual de Java) al salir."
#: i2p2www/pages/site/docs/applications/embedding.html:62
msgid "Participating Traffic Considerations"
@@ -3755,38 +5673,76 @@ msgstr "Consideraciones sobre el tráfico participante"
#: i2p2www/pages/site/docs/applications/embedding.html:63
msgid ""
"It may be tempting for you to disable participating traffic.\n"
-"There's several ways to do this (hidden mode, setting max tunnels to 0, setting shared bandwidth below 12 KBytes/sec).\n"
-"Without participating traffic, you don't have to worry about graceful shutdown,\n"
+"There's several ways to do this (hidden mode, setting max tunnels to 0, "
+"setting shared bandwidth below 12 KBytes/sec).\n"
+"Without participating traffic, you don't have to worry about graceful "
+"shutdown,\n"
"your users don't see bandwidth usage not generated by them, etc.\n"
-"However, there's lots of reasons why you should allow participating tunnels."
-msgstr "Puede ser tentador para usted deshabilitar el tráfico participante.\nHay varias formas de hacer esto (modo oculto, establecer el número máximo de túneles a 0, establecer el ancho de banda compartido por debajo de 12 KBytes/s).\nSin tráfico participante no tiene que preocuparse de cerrar de forma ordenada,\nsus usuarios no ven uso de ancho de banda que no este generado por ellos, etc.\nSin embargo, hay muchas razones por las que debe permitir los túneles participantes."
+"However, there's lots of reasons why you should allow participating "
+"tunnels."
+msgstr ""
+"Puede que sea tentador para usted deshabilitar el tráfico participante.\n"
+"Hay varias maneras de hacer esto (modo oculto, establecer el número "
+"máximo de túneles a 0, establecer el ancho de banda compartido por debajo"
+" de 12 KBytes/s).\n"
+"Sin tráfico participante no tiene que preocuparse por cerrar de forma "
+"ordenada,\n"
+"sus usuarios no ven ningún uso del ancho de banda que no esté generado "
+"por ellos, etc.\n"
+"Sin embargo, hay muchas razones por las que debe permitir los túneles "
+"participantes."
#: i2p2www/pages/site/docs/applications/embedding.html:70
msgid ""
-"First of all, the router doesn't work that well if it doesn't have a chance to \"integrate\" with the network,\n"
+"First of all, the router doesn't work that well if it doesn't have a "
+"chance to \"integrate\" with the network,\n"
"which is helped tremendously by others building tunnels through you."
-msgstr "Lo primero de todo, el router I2P no funcionará igual de bien si no tiene una oportunidad de \"integrarse\" con la red,\nla cual está recibiendo una ayuda tremenda por parte de otros que construyen túneles a través de usted."
+msgstr ""
+"Lo primero de todo, el router I2P no funcionará igual de bien si no tiene"
+" una oportunidad de \"integrarse\" con la red,\n"
+"la cual está recibiendo una ayuda tremenda por parte de otros que crean "
+"túneles a través de usted."
#: i2p2www/pages/site/docs/applications/embedding.html:74
msgid ""
-"Secondly, over 90% of the routers in the current network allow participating traffic.\n"
+"Secondly, over 90% of the routers in the current network allow "
+"participating traffic.\n"
"It's the default in the Java router.\n"
-"If your application doesn't route for others and it gets really popular, then it's a leech on the network,\n"
+"If your application doesn't route for others and it gets really popular, "
+"then it's a leech on the network,\n"
"and it upsets the balance we have now.\n"
-"If it gets really big, then we become Tor, and spend our time begging for people to enable relaying."
-msgstr "En segundo lugar, más de 90% de los routers en la red actual permiten el tráfico participante.\nEs la configuración predeterminada en el router I2P Java.\nSi su aplicación no enruta para otros y se vuelve verdaderamente popular, entonces es una sanguijuela para la red,\ny perturba el equilibrio que tenemos ahora.\nSi se vuelve realmente grande, entonces nos convertiremos en Tor, y pasaremos nuestro tiempo suplicando a la gente que habilite la repetición entre nodos."
+"If it gets really big, then we become Tor, and spend our time begging for"
+" people to enable relaying."
+msgstr ""
+"En segundo lugar, más del 90% de los routers I2P en la red actual "
+"permiten el tráfico participante.\n"
+"Es la configuración predeterminada en el router I2P Java.\n"
+"Si su aplicación no enruta para otros, y se volviera muy popular, "
+"entonces se convertiría en una sanguijuela para la red\n"
+"y perturbaría el equilibrio que tenemos ahora.\n"
+"Y si se volviera verdaderamente grande, entonces nos convertiríamos en "
+"Tor, y pasaríamos nuestro tiempo suplicando a la gente que habilitase la "
+"repetición entre nodos."
#: i2p2www/pages/site/docs/applications/embedding.html:81
msgid ""
"Thirdly, participating traffic is cover traffic that helps your users' "
"anonymity."
-msgstr "En tercer lugar, el tráfico participante es tráfico de cobertura que contribuye al anonimato de sus usuarios."
+msgstr ""
+"En tercer lugar, el tráfico participante es tráfico de cobertura que "
+"contribuye al anonimato de sus usuarios."
#: i2p2www/pages/site/docs/applications/embedding.html:84
msgid ""
-"We strongly discourage you from disabling participating traffic by default.\n"
-"If you do this and your application gets hugely popular, it could break the network."
-msgstr "Le desaconsejamos vivamente que deshabilite el tráfico participante de forma predeterminada.\nSi hace esto y su aplicación se vuelve enormemente popular, podría estropear la red."
+"We strongly discourage you from disabling participating traffic by "
+"default.\n"
+"If you do this and your application gets hugely popular, it could break "
+"the network."
+msgstr ""
+"Le desaconsejamos vivamente que deshabilite el tráfico participante de "
+"forma predeterminada.\n"
+"Si hace esto, y su aplicación se vuelve enormemente popular, podría "
+"provocar daños a la red."
#: i2p2www/pages/site/docs/applications/embedding.html:90
msgid "Persistence"
@@ -3794,10 +5750,20 @@ msgstr "Persistencia"
#: i2p2www/pages/site/docs/applications/embedding.html:91
msgid ""
-"You must save the router's data (netdb, configuration, etc.) between runs of the router.\n"
-"I2P does not work well if you must reseed each startup, and that's a huge load on our reseed servers, and not very good for anonymity either.\n"
-"Even if you bundle router infos, I2P needs saved profile data for best performance."
-msgstr "Debe guardar los datos del router I2P (netdb, configuración, etc.) entre ejecuciones del router.\nI2P no funcionará bien si usted tiene que resembrar en cada inicio, y eso supone una enorme carga en nuestros servidores de resembrado, y tampoco es muy bueno para el anonimato.\nIncluso si empaqueta la información (info) de los routers, I2P necesita datos de perfil guardados para un rendimiento óptimo."
+"You must save the router's data (netdb, configuration, etc.) between runs"
+" of the router.\n"
+"I2P does not work well if you must reseed each startup, and that's a huge"
+" load on our reseed servers, and not very good for anonymity either.\n"
+"Even if you bundle router infos, I2P needs saved profile data for best "
+"performance."
+msgstr ""
+"Debe guardar los datos del router I2P (netdb, configuración, etc.) entre "
+"ejecuciones del router.\n"
+"I2P no funcionará bien si usted tiene que resembrar en cada inicio, y eso"
+" supone una enorme carga en nuestros servidores de resembrado, y tampoco "
+"es muy bueno para el anonimato.\n"
+"Incluso si empaqueta la información de los routers, I2P necesita los "
+"datos del perfil guardados para un rendimiento óptimo."
#: i2p2www/pages/site/docs/applications/embedding.html:99
msgid "Configurability"
@@ -3805,22 +5771,44 @@ msgstr "Configurabilidad"
#: i2p2www/pages/site/docs/applications/embedding.html:100
msgid ""
-"Give your users a way to change the configuration of the important settings.\n"
-"We understand that you will probably want to hide most of I2P's complexity, but it's important to show some basic settings.\n"
-"In addition to the defaults above, some network settings such as UPnP, IP/port may be helpful."
-msgstr "Proporcione a sus usuarios una forma de cambiar los valores de las configuraciones importantes.\nComprendemos que probablemente querrá ocultar el grueso de la complejidad de I2P, pero es importante mostrar algunas configuraciones importantes.\nAdemás de las configuraciones por defecto de arriba, algunas configuraciones de red tales como UPnP, IP/puerto podrían ser provechosas."
+"Give your users a way to change the configuration of the important "
+"settings.\n"
+"We understand that you will probably want to hide most of I2P's "
+"complexity, but it's important to show some basic settings.\n"
+"In addition to the defaults above, some network settings such as UPnP, "
+"IP/port may be helpful."
+msgstr ""
+"Proporcione a sus usuarios una forma de cambiar los valores de las "
+"configuraciones importantes.\n"
+"Comprendemos que probablemente querrá ocultar la mayoría de la "
+"complejidad de I2P, pero es importante mostrar algunas configuraciones "
+"básicas.\n"
+"Además de las configuraciones por defecto de arriba, algunas "
+"configuraciones de red tales como UPnP, o IP/puerto, podrían ser útiles."
#: i2p2www/pages/site/docs/applications/embedding.html:108
msgid "Floodfill Considerations"
-msgstr "Consideraciones de inundación"
+msgstr "Consideraciones sobre el router de inundación"
#: i2p2www/pages/site/docs/applications/embedding.html:109
msgid ""
-"Above a certain bandwidth setting, and meeting other health criteria, your router will become floodfill,\n"
-"which may cause a large increase in connections and memory usage (at least with the Java router).\n"
-"Think about whether that's OK. You can disable floodfill, but then your fastest users aren't contributing what they could.\n"
+"Above a certain bandwidth setting, and meeting other health criteria, "
+"your router will become floodfill,\n"
+"which may cause a large increase in connections and memory usage (at "
+"least with the Java router).\n"
+"Think about whether that's OK. You can disable floodfill, but then your "
+"fastest users aren't contributing what they could.\n"
"It also depends on the typical uptime for your application."
-msgstr "Por encima de cierto valor de configuración de ancho de banda, y si se cumplen otros criterios de salubridad, su router I2P se convertirá en un router de inundación (floodfill),\nque puede causar un gran incremento de conexiones y de consumo de memoria (al menos con el router I2P Java).\nPiense en si esto será adecuado. Puede deshabilitarlo como router I2P de inundación, pero entonces sus usuarios más rápidos no estarán contribuyendo todo lo que podrían.\nTambién depende de la duración media de ejecución de su aplicación."
+msgstr ""
+"Por encima de cierto valor de configuración del ancho de banda, y si se "
+"cumplen otros criterios de capacidad, su router I2P se convertirá en un "
+"router de inundación (floodfill),\n"
+"lo que puede causar un gran incremento de conexiones y de consumo de "
+"memoria (al menos con el router I2P Java).\n"
+"Piense en si esto será adecuado. Puede deshabilitarlo como router I2P de "
+"inundación, pero entonces sus usuarios más rápidos no estarán "
+"contribuyendo todo lo que podrían.\n"
+"También depende de la duración media de ejecución de su aplicación."
#: i2p2www/pages/site/docs/applications/embedding.html:119
msgid "Reseeding"
@@ -3829,20 +5817,37 @@ msgstr "Resembrado"
#: i2p2www/pages/site/docs/applications/embedding.html:120
msgid ""
"Decide if you are bundling router infos or using our reseed hosts.\n"
-"The Java reseed host list is in the source code, so if you keep your source up to date, the host list will be also.\n"
+"The Java reseed host list is in the source code, so if you keep your "
+"source up to date, the host list will be also.\n"
"Be aware of possible blocking by hostile governments."
-msgstr "Decida si va a empaquetar la información (info) de routers I2P o va a usar nuestros servidores de resembrado.\nLa lista de servidores de resembrado Java está en el código fuente, así que si mantiene su código fuente actualizado, la lista de servidores también lo estará.\nEsté alerta ante posibles bloqueos por parte de Gobiernos hostiles."
+msgstr ""
+"Decida si va a empaquetar la información de los routers I2P o va a usar "
+"nuestros servidores de resembrado.\n"
+"La lista de servidores de resembrado Java está en el código fuente, así "
+"que si mantiene su código fuente actualizado, la lista de servidores "
+"también lo estará.\n"
+"Esté alerta ante posibles bloqueos por parte de Gobiernos hostiles."
#: i2p2www/pages/site/docs/applications/embedding.html:129
msgid "Reduce Network Resource Usage"
-msgstr "Reducir consumo de recursos de red"
+msgstr "Reduzca el consumo de recursos de red"
#: i2p2www/pages/site/docs/applications/embedding.html:130
msgid ""
-"Consider setting your application tunnels to delay-open, reduce-on-idle and/or close-on-idle.\n"
-"This is straightforward if using i2ptunnel but you'll have to implement some of it yourself if using I2CP directly.\n"
-"See i2psnark for code that reduces tunnel count and then closes the tunnel, even in the presence of some background DHT activity."
-msgstr "Considere configurar sus túneles de aplicación a retardo-abierto, reducir-en-inactividad y/o cerrar-en-inactividad.\nEsto es mecánico si usa i2ptunnel, pero tendrá que implementar algunos de ellos usted mismo si usa I2CP directamente.\nVea i2psnark para un código que reduce el recuento de túneles y luego cierra el túnel, incluso en presencia de alguna actividad de DHT (tabla dinámica de hashes) en segundo plano."
+"Consider setting your application tunnels to delay-open, reduce-on-idle "
+"and/or close-on-idle.\n"
+"This is straightforward if using i2ptunnel but you'll have to implement "
+"some of it yourself if using I2CP directly.\n"
+"See i2psnark for code that reduces tunnel count and then closes the "
+"tunnel, even in the presence of some background DHT activity."
+msgstr ""
+"Considere configurar sus túneles de aplicación a retardo-abierto, "
+"reducir-en-inactividad y/o cerrar-en-inactividad.\n"
+"Esto es mecánico si usa i2ptunnel, pero tendrá que implementar algunos de"
+" ellos usted mismo si usa I2CP directamente.\n"
+"Vea i2psnark para un código que reduce el recuento de túneles y luego "
+"cierra el túnel, incluso en presencia de alguna actividad de DHT (tabla "
+"dinámica de hashes) en segundo plano."
#: i2p2www/pages/site/docs/applications/embedding.html:138
msgid "Updatability"
@@ -3850,13 +5855,31 @@ msgstr "Actualizabilidad"
#: i2p2www/pages/site/docs/applications/embedding.html:139
msgid ""
-"Have an auto-update feature if at all possible, or at least auto-notification of a new version.\n"
-"Our biggest fear is a huge number of routers out there that can't be updated.\n"
-"We have about 6-8 releases a year of the Java router, and it's critical to the health of the network that the users keep up.\n"
-"We usually have over 80% of the network on the latest release within 6 weeks after the release, and we'd like to keep it that way.\n"
-"You don't need to worry about disabling the router's built-in auto-update function, as that code is in the router console,\n"
+"Have an auto-update feature if at all possible, or at least auto-"
+"notification of a new version.\n"
+"Our biggest fear is a huge number of routers out there that can't be "
+"updated.\n"
+"We have about 6-8 releases a year of the Java router, and it's critical "
+"to the health of the network that the users keep up.\n"
+"We usually have over 80% of the network on the latest release within "
+"6 weeks after the release, and we'd like to keep it that way.\n"
+"You don't need to worry about disabling the router's built-in auto-update"
+" function, as that code is in the router console,\n"
"which you presumably are not bundling."
-msgstr "Añada una característica de auto-actualización si es completamente posible, o al menos una auto-notificación de nueva versión.\nNuestro mayor temor es un enorme número de routers I2P ahí fuera que no se puedan actualizar.\nTenemos alrededor de 6-8 versiones al año del router I2P Java, y es crítico para la salud de la red que los usuarios mantengan el ritmo.\nHabitualmente tenemos a más del 80% de la red con la última versión en las 6 semanas siguientes desde la publicación, y nos gustaría seguir de esta manera.\nNo tiene que preocuparse de deshabilitar la función de auto-actualización integrada del router I2P, ya que el código está en la consola del router,\nque presumiblemente usted no está empaquetando."
+msgstr ""
+"Añada una característica de auto-actualización si es completamente "
+"posible, o al menos una auto-notificación de nueva versión.\n"
+"Nuestro mayor temor es un enorme número de routers I2P ahí fuera que no "
+"se puedan actualizar.\n"
+"Tenemos alrededor de 6-8 versiones al año del router I2P Java, y es "
+"crítico para la salud de la red que los usuarios mantengan el ritmo.\n"
+"Habitualmente tenemos a más del 80% de la red con la última versión "
+"en las 6 semanas siguientes desde la publicación, y nos gustaría seguir "
+"de esta manera.\n"
+"No tiene que preocuparse de deshabilitar la función de auto-actualización"
+" integrada del router I2P, ya que el código está en la consola del "
+"router,\n"
+"que presumiblemente usted no está empaquetando."
#: i2p2www/pages/site/docs/applications/embedding.html:150
msgid "Rollout"
@@ -3865,13 +5888,31 @@ msgstr "Presentación"
#: i2p2www/pages/site/docs/applications/embedding.html:151
msgid ""
"Have a gradual rollout plan. Don't overwhelm the network all at once.\n"
-"We currently have approximately 25K unique users per day and 40K uniques per month.\n"
-"We are probably able to handle growth of 2-3X per year without too much issue.\n"
-"If you anticipate a faster rampup than that, OR the bandwidth distribution (or uptime distribution,\n"
-"or any other significant characteristic) of your userbase is significantly different from our current userbase,\n"
+"We currently have approximately 25K unique users per day and 40K uniques "
+"per month.\n"
+"We are probably able to handle growth of 2-3X per year without too much "
+"issue.\n"
+"If you anticipate a faster rampup than that, OR the bandwidth "
+"distribution (or uptime distribution,\n"
+"or any other significant characteristic) of your userbase is "
+"significantly different from our current userbase,\n"
"we really need to have a discussion.\n"
-"The bigger your growth plans, the more important everthing else in this checklist is."
-msgstr "Cree un plan de despliegue gradual. No sobrecargue la red toda de una vez.\nActualmente tenemos aproximadamente 25.000 usuarios únicos al día y 40.000 usuarios únicos al mes.\nProbablemente podemos manejar un crecimiento por un factor de 2-3X al año sin demasiados problemas.\nSi pronostica una escalada más rápida que esa — O — la distribución del ancho de banda (o distribución de la duración de ejecución,\no cualquier otra característica significativa) de su base de usuarios es significativamente distinta de la de nuestra base de usuarios actual,\nverdaderamente necesitamos tener una charla.\nCuanto mayores sean sus planes de crecimiento, más importante es todo lo demás de esta lista de comprobación."
+"The bigger your growth plans, the more important everthing else in this "
+"checklist is."
+msgstr ""
+"Cree un plan de despliegue gradual. No sobrecargue la red toda de una "
+"vez.\n"
+"Actualmente tenemos aproximadamente 25.000 usuarios únicos al día y "
+"40.000 usuarios únicos al mes.\n"
+"Probablemente podemos manejar un crecimiento por un factor de 2-3X al año"
+" sin demasiados problemas.\n"
+"Si pronostica una escalada más rápida que esa — O — la distribución del "
+"ancho de banda (o distribución de la duración de ejecución,\n"
+"o cualquier otra característica significativa) de su base de usuarios es "
+"significativamente distinta de la de nuestra base de usuarios actual,\n"
+"verdaderamente necesitamos tener una charla.\n"
+"Cuanto mayores sean sus planes de crecimiento, más importante es todo lo "
+"demás de esta lista de comprobación."
#: i2p2www/pages/site/docs/applications/embedding.html:163
msgid "Design for and Encourage Long Uptimes"
@@ -3880,9 +5921,17 @@ msgstr "Diseño para promover ejecuciones de larga duración"
#: i2p2www/pages/site/docs/applications/embedding.html:164
msgid ""
"Tell your users that I2P works best if it keeps running.\n"
-"It may be several minutes after startup before it works well, and even more after first install.\n"
-"If your average uptime is less than an hour, I2P is probably the wrong solution."
-msgstr "Cuente a sus usuarios que I2P funciona mejor cuanto más se mantenga en ejecución.\nPueden pasar varios minutos desde el inicio hasta que funcione bien, e incluso más después de la primera instalación.\nSi su duración media de ejecución es menor de una hora, I2P probablemente no es la solución correcta."
+"It may be several minutes after startup before it works well, and even "
+"more after first install.\n"
+"If your average uptime is less than an hour, I2P is probably the wrong "
+"solution."
+msgstr ""
+"Cuente a sus usuarios que I2P funciona mejor cuanto más se mantenga en "
+"ejecución.\n"
+"Pueden pasar varios minutos desde el inicio hasta que funcione bien, e "
+"incluso más después de la primera instalación.\n"
+"Si su duración media de ejecución es menor de una hora, I2P probablemente"
+" no es la solución correcta."
#: i2p2www/pages/site/docs/applications/embedding.html:172
msgid "Show Status"
@@ -3890,9 +5939,11 @@ msgstr "Mostrar estado"
#: i2p2www/pages/site/docs/applications/embedding.html:173
msgid ""
-"Provide some indication to the user that the application tunnels are ready. "
-"Encourage patience."
-msgstr "Proporcione alguna indicación al usuario en el instante en que los túneles de la aplicación estén listos. Anime a tener paciencia."
+"Provide some indication to the user that the application tunnels are "
+"ready. Encourage patience."
+msgstr ""
+"Proporcione alguna indicación al usuario en el instante en que los "
+"túneles de la aplicación estén listos. Anime a tener paciencia."
#: i2p2www/pages/site/docs/applications/embedding.html:178
msgid "Graceful Shutdown"
@@ -3901,8 +5952,13 @@ msgstr "Cierre ordenado"
#: i2p2www/pages/site/docs/applications/embedding.html:179
msgid ""
"If possible, delay the shutdown until your participating tunnels expire.\n"
-"Don't let your users break tunnels easily, or at least ask them to confirm."
-msgstr "Si es posible, retrase el cierre hasta que sus túneles participantes expiren.\nNo permita que sus usuarios rompan los túneles fácilmemnte, o al menos pregúnteles para confirmarlo."
+"Don't let your users break tunnels easily, or at least ask them to "
+"confirm."
+msgstr ""
+"Si es posible, retrase el cierre hasta que sus túneles participantes "
+"expiren.\n"
+"No permita que sus usuarios rompan los túneles fácilmemnte, o al menos "
+"pregúnteles para confirmarlo."
#: i2p2www/pages/site/docs/applications/embedding.html:185
msgid "Education and Donation"
@@ -3910,9 +5966,11 @@ msgstr "Educación y donación"
#: i2p2www/pages/site/docs/applications/embedding.html:186
msgid ""
-"It would be nice if you give your users links to learn more about I2P and to"
-" donate."
-msgstr "Sería estupendo si proporcionase a sus usuarios enlaces para que aprendan más sobre I2P y realicen donaciones."
+"It would be nice if you give your users links to learn more about I2P and"
+" to donate."
+msgstr ""
+"Sería estupendo si proporcionase a sus usuarios enlaces para que aprendan"
+" más sobre I2P y realicen donaciones."
#: i2p2www/pages/site/docs/applications/embedding.html:192
msgid "External Router Option"
@@ -3921,8 +5979,12 @@ msgstr "Opción de router I2P externo"
#: i2p2www/pages/site/docs/applications/embedding.html:193
msgid ""
"Depending on your user base and application,\n"
-"it may be helpful to provide an option or a separate package to use an external router."
-msgstr "Dependiendo de su base de usuarios y aplicacion,\npuede que sea útil proporcionar una opción o un paquete aparte para usar un router I2P externo."
+"it may be helpful to provide an option or a separate package to use an "
+"external router."
+msgstr ""
+"Dependiendo de su base de usuarios y aplicacion,\n"
+"puede que sea útil proporcionar una opción o un paquete aparte para usar "
+"un router I2P externo."
#: i2p2www/pages/site/docs/applications/embedding.html:200
msgid "Use of other Common Services"
@@ -3930,10 +5992,17 @@ msgstr "Uso de otros servicios comunes"
#: i2p2www/pages/site/docs/applications/embedding.html:201
msgid ""
-"If you plan to use or link to other common I2P services (news feeds, hosts.txt subscriptions, trackers, outproxies, etc.),\n"
+"If you plan to use or link to other common I2P services (news feeds, "
+"hosts.txt subscriptions, trackers, outproxies, etc.),\n"
"make sure you aren't overloading them,\n"
"and talk to the people who are running them to make sure it's ok."
-msgstr "Si planea usar o enlazar a otros servicios de I2P comunes (suscripciones a noticias (feeds), suscripciones de hosts.txt, proxys de salida, etc.),\nasegúrese de que no está sobrecargándolos, \ny cuente a la gente quién los está ejecutando para cerciorarse de que todo es correcto."
+msgstr ""
+"Si planea usar o enlazar a otros servicios de I2P comunes (suscripciones "
+"a noticias (feeds), suscripciones de hosts.txt, proxys de salida, etc.),"
+"\n"
+"asegúrese de que no está sobrecargándolos, \n"
+"y cuente a la gente quién los está ejecutando para cerciorarse de que "
+"todo es correcto."
#: i2p2www/pages/site/docs/applications/embedding.html:209
msgid "Time / NTP Issues"
@@ -3942,9 +6011,16 @@ msgstr "Hora / Asuntos de NTP"
#: i2p2www/pages/site/docs/applications/embedding.html:210
msgid ""
"I2P includes an SNTP client. I2P requires correct time to operate.\n"
-"It will compensate for a skewed system clock but this may delay startup. You may disable I2P's SNTP queries,\n"
-"but this isn't advised unless your application makes sure the system clock is correct."
-msgstr "I2P incluye un cliente SNTP. I2P requiere la hora correcta para operar.\nEl cliente compensará un reloj de sistema desincronizado, pero esto puede retrasar el inicio. Puede deshabilitar las peticiones SNTP de I2P,\npero esto no está aconsejado a menos que su aplicación se asegure de que el reloj de sistema está en hora."
+"It will compensate for a skewed system clock but this may delay startup. "
+"You may disable I2P's SNTP queries,\n"
+"but this isn't advised unless your application makes sure the system "
+"clock is correct."
+msgstr ""
+"I2P incluye un cliente SNTP. I2P requiere la hora correcta para operar.\n"
+"El cliente compensará un reloj de sistema desincronizado, pero esto puede"
+" retrasar el inicio. Puede deshabilitar las peticiones SNTP de I2P,\n"
+"pero esto no está aconsejado a menos que su aplicación se asegure de que "
+"el reloj de sistema está en hora."
#: i2p2www/pages/site/docs/applications/embedding.html:218
msgid "Choose What and How you Bundle"
@@ -3952,16 +6028,39 @@ msgstr "Escoja qué empaqueta y cómo"
#: i2p2www/pages/site/docs/applications/embedding.html:219
msgid ""
-"At a minimum you will need i2p.jar, router.jar, streaming.jar, and mstreaming.jar.\n"
+"At a minimum you will need i2p.jar, router.jar, streaming.jar, and "
+"mstreaming.jar.\n"
"You may omit the two straming jars for a datagram-only app.\n"
"Some apps may need more, e.g. i2ptunnel.jar or addressbook.jar.\n"
-"Don't forget jbigi.jar, or a subset of it for the platforms you support, to make the crypto much faster.\n"
-"We are currently building them for Java 6, as of 0.9.14. The source is mostly compatible with Java 5 if you want to do your own compile,\n"
+"Don't forget jbigi.jar, or a subset of it for the platforms you support, "
+"to make the crypto much faster.\n"
+"We are currently building them for Java 6, as of 0.9.14. The source is "
+"mostly compatible with Java 5 if you want to do your own compile,\n"
"but we may start using Java 6 features at any time without notice.\n"
"We plan to migrate to Java 7 in 2015.\n"
-"If you're building Debian / Ubuntu packages, you should require the I2P package from our PPA instead of bundling it.\n"
-"You almost certainly do not need susimail, susidns, the router console, and i2psnark, for example."
-msgstr "Como mínimo necesitará i2p.jar, router.jar, streaming.jar, y mstreaming.jar.\nPuede omitir los dos jars de streaming para una aplicación de sólo-datagramas.\nAlgunas aplicaciones pueden necesitar más, ej. i2ptunnel.jar o addressbook.jar.\nNo olvide jbigi.jar, o un subconjunto de este para las plataformas que usted soporte, para hacer el cifrado mucho más rápido.\nActualmente estamos compilándolos para Java 6, desde la 0.9.14. El código fuente es en su mayor parte compatible con Java 5, por si quiere hacer su propia compilación,\npero podemos comenzar a usar las características de Java 6 en cualquier momento sin avisar.\nPlaneamos migrar a Java 7 en 2015.\nSi está compilando paquetes Debian / Ubuntu, debe obtener el paquete I2P de nuestra PPA en lugar de empaquetarlo.\nCasi con certeza no necesitará, por ejemplo, susimail, susidns, la consola del router I2P, e i2psnark."
+"If you're building Debian / Ubuntu packages, you should require the I2P "
+"package from our PPA instead of bundling it.\n"
+"You almost certainly do not need susimail, susidns, the router console, "
+"and i2psnark, for example."
+msgstr ""
+"Como mínimo necesitará i2p.jar, router.jar, streaming.jar, y "
+"mstreaming.jar.\n"
+"Puede omitir los dos jars de streaming para una aplicación de sólo-"
+"datagramas.\n"
+"Algunas aplicaciones pueden necesitar más, ej. i2ptunnel.jar o "
+"addressbook.jar.\n"
+"No olvide jbigi.jar, o un subconjunto de este para las plataformas que "
+"usted soporte, para hacer el cifrado mucho más rápido.\n"
+"Actualmente estamos compilándolos para Java 6, desde la 0.9.14. El código"
+" fuente es en su mayor parte compatible con Java 5, por si quiere hacer "
+"su propia compilación,\n"
+"pero podemos comenzar a usar las características de Java 6 en cualquier "
+"momento sin avisar.\n"
+"Planeamos migrar a Java 7 en 2015.\n"
+"Si está compilando paquetes Debian / Ubuntu, debe obtener el paquete I2P "
+"de nuestra PPA en lugar de empaquetarlo.\n"
+"Casi con certeza no necesitará, por ejemplo, susimail, susidns, la "
+"consola del router I2P, e i2psnark."
#: i2p2www/pages/site/docs/applications/embedding.html:233
msgid "You may also wish to bundle a hosts.txt file."
@@ -3978,14 +6077,33 @@ msgstr "Consideraciones sobre datagramas (DHT)"
#: i2p2www/pages/site/docs/applications/embedding.html:245
msgid ""
"If your application is using I2P datagrams, e.g. for a DHT,\n"
-"there's lots of advanced options available to reduce overhead and increase reliability.\n"
+"there's lots of advanced options available to reduce overhead and "
+"increase reliability.\n"
"This may take some time and experimentation to get working well.\n"
"Be aware of size/reliability tradeoffs. Talk to us for help.\n"
-"It is possible - and recommended - to use Datagrams and Streaming on the same Destination.\n"
+"It is possible - and recommended - to use Datagrams and Streaming on the "
+"same Destination.\n"
"Don't create separate Destinations for this.\n"
-"Don't try to store your unrelated data in the existing network DHTs (iMule, bote, bittorrent, and router).\n"
-"Build your own. If you are hardcoding seed nodes, we recommend that you have several."
-msgstr "Si su aplicación está usando datagramas I2P, ej. para una DHT (tabla dinámica de hashes),\nhay muchas opciones avanzadas disponibles para reducir el tráfico de control e incrementar la confiabilidad.\nEsto puede llevar algún tiempo y experimentación para conseguir que funcione bien.\nSea consciente de los equilibrios entre tamaño/fiabilidad. Hable con nosotros para obtener ayuda.\nEs posible - y recomendado - usar datagramas y streaming sobre el mismo destino.\nNo cree destinos aparte para esto.\nNo intente almacenar su datos no relacionados en las DHTs (iMule, bote, bittorrent, y router I2P) de la red existente.\nCompile su aplicación. Si está integrando en código los nodos semilla (seed), recomendamos que añada varios."
+"Don't try to store your unrelated data in the existing network DHTs "
+"(iMule, bote, bittorrent, and router).\n"
+"Build your own. If you are hardcoding seed nodes, we recommend that you "
+"have several."
+msgstr ""
+"Si su aplicación está usando datagramas I2P, ej. para una DHT (tabla "
+"dinámica de hashes),\n"
+"hay muchas opciones avanzadas disponibles para reducir el tráfico de "
+"control e incrementar la confiabilidad.\n"
+"Esto puede llevar algún tiempo y experimentación para conseguir que "
+"funcione bien.\n"
+"Sea consciente de los equilibrios entre tamaño/fiabilidad. Hable con "
+"nosotros para obtener ayuda.\n"
+"Es posible - y recomendado - usar datagramas y streaming sobre el mismo "
+"destino.\n"
+"No cree destinos aparte para esto.\n"
+"No intente almacenar su datos no relacionados en las DHTs (iMule, bote, "
+"bittorrent, y router I2P) de la red existente.\n"
+"Compile su aplicación. Si está integrando en código los nodos semilla "
+"(seed), recomendamos que añada varios."
#: i2p2www/pages/site/docs/applications/embedding.html:258
msgid "Comarketing"
@@ -3994,8 +6112,12 @@ msgstr "Copromoción"
#: i2p2www/pages/site/docs/applications/embedding.html:259
msgid ""
"Let's work together. Don't wait until it's done.\n"
-"Give us your Twitter handle and start tweeting about it, we will return the favor."
-msgstr "Trabajemos juntos. No espere hasta que esté hecho.\nDenos su nombre de usuario de Twitter y comience a twitear sobre ello, le devolveremos el favor."
+"Give us your Twitter handle and start tweeting about it, we will return "
+"the favor."
+msgstr ""
+"Trabajemos juntos. No espere hasta que esté hecho.\n"
+"Denos su nombre de usuario de Twitter y comience a twitear sobre ello, le"
+" devolveremos el favor."
#: i2p2www/pages/site/docs/applications/embedding.html:265
msgid "Malware"
@@ -4005,7 +6127,9 @@ msgstr "Malware"
msgid ""
"Please don't use I2P for evil.\n"
"It could cause great harm both to our network and our reputation."
-msgstr "Por favor no use I2P para la maldad.\nPodría causar un gran daño tanto a nuestra red como a nuestra reputación."
+msgstr ""
+"Por favor no use I2P para la maldad.\n"
+"Podría causar un gran daño tanto a nuestra red como a nuestra reputación."
#: i2p2www/pages/site/docs/applications/embedding.html:272
msgid "Join Us"
@@ -4013,10 +6137,16 @@ msgstr "Únase a nosotros"
#: i2p2www/pages/site/docs/applications/embedding.html:273
msgid ""
-"This may be obvious, but join the community. Run I2P 24/7. Start an eepsite about your project.\n"
+"This may be obvious, but join the community. Run I2P 24/7. Start an "
+"eepsite about your project.\n"
"Hang out in IRC #i2p-dev. Post on the forums. Spread the word.\n"
"We can help get you users, testers, translators, or even coders."
-msgstr "Esto puede parecer obvio, pero únase a la comunidad. Ejecute I2P las 24 horas, los 7 días de la semana. Arranque un eepsite sobre su proyecto.\nAcuda al IRC #i2p-dev. Publique en los foros. Difunda el mensaje.\nPodemos ayudar a conseguirle usuarios, probadores, traductores, o incluso programadores."
+msgstr ""
+"Esto puede parecer obvio, pero únase a la comunidad. Ejecute I2P las 24 "
+"horas, los 7 días de la semana. Arranque un eepsite sobre su proyecto.\n"
+"Acuda al IRC #i2p-dev. Publique en los foros. Difunda el mensaje.\n"
+"Podemos ayudar a conseguirle usuarios, probadores, traductores, o incluso"
+" programadores."
#: i2p2www/pages/site/docs/applications/embedding.html:281
msgid "Application Examples"
@@ -4024,11 +6154,17 @@ msgstr "Ejemplos de aplicación"
#: i2p2www/pages/site/docs/applications/embedding.html:282
msgid ""
-"You may wish to install and play with the I2P Android app, and look at its code, for an example of an application that bundles the router.\n"
+"You may wish to install and play with the I2P Android app, and look at "
+"its code, for an example of an application that bundles the router.\n"
"See what we expose to the user and what we hide.\n"
"Look at the state machine we use to start and stop the router.\n"
-"Other examples are: Vuze, the Nightweb Android app, iMule, TAILS, iCloak, and Monero."
-msgstr "Puede que quiera instalar y juguetear con la aplicación I2P Android, y mirar su código en busca de un ejemplo de aplicación que empaqueta el router IP2.\nVea lo que exponemos al usuario y lo que ocultamos."
+"Other examples are: Vuze, the Nightweb Android app, iMule, TAILS, iCloak,"
+" and Monero."
+msgstr ""
+"Puede que quiera instalar y juguetear con la aplicación I2P Android, y "
+"mirar su código en busca de un ejemplo de aplicación que empaqueta el "
+"router IP2.\n"
+"Vea lo que exponemos al usuario y lo que ocultamos."
#: i2p2www/pages/site/docs/applications/embedding.html:290
msgid "Code Example"
@@ -4038,16 +6174,29 @@ msgstr "Ejemplo de código"
msgid ""
"None of the above actually tells you how to write your code to\n"
"bundle the Java router, so following is a brief example."
-msgstr "Ninguno de los de arriba le cuenta en realidad cómo escribir su código para\nempaquetar el router IP2 Java, así que a continuación tiene un breve ejemplo."
+msgstr ""
+"Ninguno de los de arriba le cuenta en realidad cómo escribir su código "
+"para\n"
+"empaquetar el router IP2 Java, así que a continuación tiene un breve "
+"ejemplo."
#: i2p2www/pages/site/docs/applications/embedding.html:306
msgid ""
-"This code is for the case where your application starts the router, as in our Android app.\n"
-"You could also have the router start the applictaion via the clients.config and i2ptunnel.config files,\n"
+"This code is for the case where your application starts the router, as in"
+" our Android app.\n"
+"You could also have the router start the applictaion via the "
+"clients.config and i2ptunnel.config files,\n"
"together with Jetty webapps,\n"
"as is done in our Java packages.\n"
"As always, state management is the difficult part."
-msgstr "Este código es para el caso en el que su aplicación inicia el router I2P, como en el de nuestra aplicación para Android.\nTambién podría hacer que el router I2P inicie la aplicación mediante los ficheros clients.config e i2ptunnel.config, junto con las aplicaciones web de Jetty,\ntal como se hizo en nuestros paquetes Java.\nComo siempre, la gestión de estado es la parte difícil."
+msgstr ""
+"Este código es para el caso en el que su aplicación inicia el router I2P,"
+" como en el de nuestra aplicación para Android.\n"
+"También podría hacer que el router I2P inicie la aplicación mediante los "
+"ficheros clients.config e i2ptunnel.config, junto con las aplicaciones "
+"web de Jetty,\n"
+"tal como se hizo en nuestros paquetes Java.\n"
+"Como siempre, la gestión de estado es la parte difícil."
#: i2p2www/pages/site/docs/applications/managed-clients.html:3
msgid "February 2014"
@@ -4064,35 +6213,75 @@ msgid ""
"ClientAppManager so that other clients may retrieve a reference to them.\n"
"There is also a simple Port Mapper facility for clients to register an\n"
"internal port that other clients may look up."
-msgstr "Los clientes pueden ser iniciados directamente por el router I2P cuando\nestén listados en el fichero clients.config.\nEstos clientes pueden ser \"gestionados\" o \"no gestionados\".\nEsto es manejado por el ClientAppManager (gestor de aplicaciones cliente).\nAdicionalmente, gestionados o no, los clientes pueden registrarse con el\nClientAppManager de forma que otros clientes puedan obtener referencias hacia ellos.\nTambién hay una funcionalidad de Mapeador de Puertos para que los clientes\nregistren un puerto interno por el que otros clientes pueden buscar."
+msgstr ""
+"Los clientes pueden ser iniciados directamente por el router I2P cuando\n"
+"estén listados en el fichero clients.config.\n"
+"Estos clientes pueden ser \"gestionados\" o \"no gestionados\".\n"
+"Esto es manejado por el ClientAppManager (gestor de aplicaciones "
+"cliente).\n"
+"Adicionalmente, gestionados o no, los clientes pueden registrarse con el\n"
+"ClientAppManager de forma que otros clientes puedan obtener referencias "
+"hacia ellos.\n"
+"También hay una funcionalidad de Mapeador de Puertos para que los "
+"clientes\n"
+"registren un puerto interno por el que otros clientes pueden buscar."
#: i2p2www/pages/site/docs/applications/managed-clients.html:21
msgid ""
"As of release 0.9.4, the router supports managed clients.\n"
"Managed clients are instantiated and started by the ClientAppManager.\n"
-"The ClientAppManager maintains a reference to the client and receives updates on the client's state.\n"
-"Managed clients are preferred, as it is much easier to implement state tracking\n"
-"and to start and stop a client. It also is much easier to avoid static references in the client code\n"
+"The ClientAppManager maintains a reference to the client and receives "
+"updates on the client's state.\n"
+"Managed clients are preferred, as it is much easier to implement state "
+"tracking\n"
+"and to start and stop a client. It also is much easier to avoid static "
+"references in the client code\n"
"which could lead to excessive memory usage after a client is stopped.\n"
-"Managed clients may be started and stopped by the user in the router console,\n"
+"Managed clients may be started and stopped by the user in the router "
+"console,\n"
"and are stopped at router shutdown."
-msgstr "Desde la versión 0.9.4, el router I2P soporta clientes gestionados.\nLos clientes gestionados son invocados e iniciados por el ClientAppManager.\nEl ClientAppManager mantiene una referencia hacia el cliente y recibe actualizaciones sobre su estado.\nSe prefieren los clientes gestionados, ya que es mucho más fácil implementar el rastreo del estado\ne iniciar y detener un cliente. También es mucho más fácil evitar referencias estáticas en el código \ndel cliente que podrían llevar a un uso excesivo de memoria después de que un cliente sea detenido.\nLos clientes gestionados pueden ser iniciados y detenidos por el usuario en la consola del router I2P,\ny son detenidos en el apagado del router."
+msgstr ""
+"Desde la versión 0.9.4, el router I2P soporta clientes gestionados.\n"
+"Los clientes gestionados son invocados e iniciados por el "
+"ClientAppManager.\n"
+"El ClientAppManager mantiene una referencia hacia el cliente y recibe "
+"actualizaciones sobre su estado.\n"
+"Se prefieren los clientes gestionados, ya que es mucho más fácil "
+"implementar el rastreo del estado\n"
+"e iniciar y detener un cliente. También es mucho más fácil evitar "
+"referencias estáticas en el código \n"
+"del cliente que podrían llevar a un uso excesivo de memoria después de "
+"que un cliente sea detenido.\n"
+"Los clientes gestionados pueden ser iniciados y detenidos por el usuario "
+"en la consola del router I2P,\n"
+"y son detenidos en el apagado del router."
#: i2p2www/pages/site/docs/applications/managed-clients.html:31
msgid ""
-"Managed clients implement either the net.i2p.app.ClientApp or net.i2p.router.app.RouterApp interface.\n"
-"Clients implementing the ClientApp interface must provide the following constructor:"
-msgstr "Los clientes gestionados implementan o bien la interfaz net.i2p.app.ClientApp o bien net.i2p.router.app.RouterApp .\nLos clientes que implementan la interfaz ClientApp deben proporcionar el siguiente constructor:"
+"Managed clients implement either the net.i2p.app.ClientApp or "
+"net.i2p.router.app.RouterApp interface.\n"
+"Clients implementing the ClientApp interface must provide the following "
+"constructor:"
+msgstr ""
+"Los clientes gestionados implementan o bien la interfaz "
+"net.i2p.app.ClientApp o bien net.i2p.router.app.RouterApp .\n"
+"Los clientes que implementan la interfaz ClientApp deben proporcionar el "
+"siguiente constructor:"
#: i2p2www/pages/site/docs/applications/managed-clients.html:38
msgid ""
"Clients implementing the RouterApp interface must provide the following "
"constructor:"
-msgstr "Los clientes que implementan la interfaz RouterApp deben proporcionar el siguiente constructor:"
+msgstr ""
+"Los clientes que implementan la interfaz RouterApp deben proporcionar el "
+"siguiente constructor:"
#: i2p2www/pages/site/docs/applications/managed-clients.html:44
msgid "The arguments provided are specified in the clients.config file."
-msgstr "Los argumentos proporcionados se especifican en el fichero clients.config ."
+msgstr ""
+"Los argumentos proporcionados se especifican en el fichero clients.config"
+" ."
#: i2p2www/pages/site/docs/applications/managed-clients.html:48
msgid "Unmanaged Clients"
@@ -4100,12 +6289,21 @@ msgstr "Clientes no gestionados"
#: i2p2www/pages/site/docs/applications/managed-clients.html:49
msgid ""
-"If the main class specified in the clients.config file does not implement a managed interface,\n"
+"If the main class specified in the clients.config file does not implement"
+" a managed interface,\n"
"it will be started with main() with the arguments specified,\n"
"and stopped with main() with the arguments specified.\n"
-"The router does not maintain a reference, since all interactions are via the static main() method.\n"
+"The router does not maintain a reference, since all interactions are via "
+"the static main() method.\n"
"The console cannot provide accurate state information to the user."
-msgstr "Si la clase principal especificada en el fichero clients.config no implementa una interfaz gestionada,\nserá iniciada con main() con los argumentos especificados,\ny detenida con main() con los argumentos especificados.\nEl router I2P no mantiene una referencia, ya que todas las interacciones se realizan mediante el método main().\nLa consola no puede proporcionar información de estado precisa al usuario."
+msgstr ""
+"Si la clase principal especificada en el fichero clients.config no "
+"implementa una interfaz gestionada,\n"
+"será iniciada con main() con los argumentos especificados,\n"
+"y detenida con main() con los argumentos especificados.\n"
+"El router I2P no mantiene una referencia, ya que todas las interacciones "
+"se realizan mediante el método main().\n"
+"La consola no puede proporcionar información de estado precisa al usuario."
#: i2p2www/pages/site/docs/applications/managed-clients.html:57
msgid "Registered Clients"
@@ -4113,11 +6311,18 @@ msgstr "Clientes registrados"
#: i2p2www/pages/site/docs/applications/managed-clients.html:58
msgid ""
-"Clients, whether managed or unmanaged, may register with the ClientAppManager\n"
+"Clients, whether managed or unmanaged, may register with the "
+"ClientAppManager\n"
"so that other clients may retrieve a reference to them.\n"
"Registration is by name.\n"
"Known registered clients are:"
-msgstr "Los clientes, tanto si son gestionados como si no, pueden registrarse con el ClientAppManger\nde forma que los demás clientes pueden obtener una referencia hacia ellos.\nEl registro es por nombre.\nSon clientes registrados conocidos:"
+msgstr ""
+"Los clientes, tanto si son gestionados como si no, pueden registrarse con"
+" el ClientAppManger\n"
+"de forma que los demás clientes pueden obtener una referencia hacia "
+"ellos.\n"
+"El registro es por nombre.\n"
+"Son clientes registrados conocidos:"
#: i2p2www/pages/site/docs/applications/managed-clients.html:68
msgid "Port Mapper"
@@ -4125,11 +6330,20 @@ msgstr "Mapeador de puertos"
#: i2p2www/pages/site/docs/applications/managed-clients.html:69
msgid ""
-"The router also provides a simple mechanism for clients to find an internal socket service,\n"
+"The router also provides a simple mechanism for clients to find an "
+"internal socket service,\n"
"such as the HTTP proxy. This is provided by the Port Mapper.\n"
"Registration is by name.\n"
-"Clients that register generally provide an internal emulated socket on that port."
-msgstr "El router I2P también proporciona un mecanismo simple para que los clientes encuentren un servicio de socket\ninterno (conexión entre procesos), como el proxy HTTP. Esto es proporcionado por el Mapeador de Puertos.\nEl registro es por nombre.\nLos clientes que se registran generalmente proporcionan un socket emulado interno sobre ese puerto."
+"Clients that register generally provide an internal emulated socket on "
+"that port."
+msgstr ""
+"El router I2P también proporciona un mecanismo simple para que los "
+"clientes encuentren un servicio de socket\n"
+"interno (conexión entre procesos), como el proxy HTTP. Esto es "
+"proporcionado por el Mapeador de Puertos.\n"
+"El registro es por nombre.\n"
+"Los clientes que se registran generalmente proporcionan un socket emulado"
+" interno sobre ese puerto."
#: i2p2www/pages/site/docs/applications/supported.html:2
#: i2p2www/pages/site/docs/applications/supported.html:5
@@ -4253,13 +6467,19 @@ msgid ""
"I2P. If you know of something that's missing please submit a ticket on\n"
"Trac, and be sure to select the\n"
"“www” component in the submission form."
-msgstr "Esto pretende ser una lista precisa de las aplicaciones usadas en I2P. Si conoce alguna que falte, por favor cree un ticket en el Trac, y asegúrese de seleccionar el componente \"www\" en el formulario."
+msgstr ""
+"Esto pretende ser una lista precisa de las aplicaciones usadas en I2P. Si"
+" conoce alguna que falte, por favor cree un ticket en el Trac, y asegúrese de seleccionar el componente "
+"\"www\" en el formulario."
#: i2p2www/pages/site/docs/applications/supported.html:92
msgid ""
"\n"
"Supported applications are tagged with one or more of the following:"
-msgstr "\nLas aplicaciones soportadas tienen una de las siguientes etiquetas:"
+msgstr ""
+"\n"
+"Las aplicaciones soportadas tienen una de las siguientes etiquetas:"
#: i2p2www/pages/site/docs/applications/supported.html:97
#: i2p2www/pages/site/docs/applications/supported.html:279
@@ -4274,7 +6494,10 @@ msgid ""
"Bundled application — I2P ships with a few officially\n"
"supported applications that let new users take immediate advantage of\n"
"some of I2P's more useful capabilities."
-msgstr "Aplicación incluida — I2P vienen con algunas aplicaciones incluidas oficialmente que permiten a los nuevos usuarios usar inmediatamente algunas de las capacidades mas útiles de i2P."
+msgstr ""
+"Aplicación incluida — I2P vienen con algunas aplicaciones "
+"incluidas oficialmente que permiten a los nuevos usuarios usar "
+"inmediatamente algunas de las capacidades mas útiles de i2P."
#: i2p2www/pages/site/docs/applications/supported.html:107
#: i2p2www/pages/site/docs/applications/supported.html:195
@@ -4298,7 +6521,12 @@ msgid ""
"with the router. Plugins are [reviewed by the community](http://%(plugins)s) to identify security and\n"
"anonymity issues."
-msgstr " Pluguins de terceras partes — el sistema de pluguins de I2P provee el despliegue de aplicaciones para I2P y permite una integración más estrecha con el ruter. Los pluguins son [revisados por la comunidad] (http://%(plugins)s) para identificar problemas de seguridad y anonimato."
+msgstr ""
+" Pluguins de terceras partes — el sistema de pluguins de I2P "
+"provee el despliegue de aplicaciones para I2P y permite una integración "
+"más estrecha con el ruter. Los pluguins son [revisados por la comunidad] "
+"(http://%(plugins)s) para identificar "
+"problemas de seguridad y anonimato."
#: i2p2www/pages/site/docs/applications/supported.html:121
#: i2p2www/pages/site/docs/applications/supported.html:220
@@ -4356,7 +6584,14 @@ msgid ""
"function properly over I2P or to prevent inadvertent disclosure of\n"
"identifying information such as the user's hostname or external IP\n"
"address."
-msgstr "Aplicaciones independientes de terceras partes — Muchas de las aplicaciones de red sólo necesitan una configuración cuidadosa para poder ser usadas anónimamente sobre I2P. Estas están etiquetadas como independientes. Algunas aplicaciones etiquetadas como independientes/mod, requieren ser parcheadas para funcionar bien sobre I2P, o para evitar la revelación no intencionada de información tal como el hostname o la IP externa."
+msgstr ""
+"Aplicaciones independientes de terceras partes — Muchas de las "
+"aplicaciones de red sólo necesitan una configuración cuidadosa para poder"
+" ser usadas anónimamente sobre I2P. Estas están etiquetadas como "
+"independientes. Algunas aplicaciones etiquetadas como "
+"independientes/mod, requieren ser parcheadas para funcionar bien"
+" sobre I2P, o para evitar la revelación no intencionada de información "
+"tal como el hostname o la IP externa."
#: i2p2www/pages/site/docs/applications/supported.html:135
#: i2p2www/pages/site/docs/applications/supported.html:302
@@ -4381,7 +6616,14 @@ msgid ""
"services, search engines, email, DNS-style name services, hosting,\n"
"proxies, etc. These services focus on boosting the usefulness of the\n"
"network as a whole, and making network content more discoverable."
-msgstr "Servicios esenciales de red de terceras partes — Servicios que estando en I2P son análogos a aquellos disponibles en Internet al estilo de los de los proveedores de hosting, ISPs y Google: índices de eepsites y servicios de saltos, motores de búsquedas, email, servidores de dominios tipo DNS, alojamiento, proxies, etc. Estos servicios se centran en mejorar la utilidad la red en general, y hacen el contenido de más accesible."
+msgstr ""
+"Servicios esenciales de red de terceras partes — Servicios que "
+"estando en I2P son análogos a aquellos disponibles en Internet al estilo "
+"de los de los proveedores de hosting, ISPs y Google: índices de eepsites "
+"y servicios de saltos, motores de búsquedas, email, servidores de "
+"dominios tipo DNS, alojamiento, proxies, etc. Estos servicios se centran "
+"en mejorar la utilidad la red en general, y hacen el contenido de más "
+"accesible."
#: i2p2www/pages/site/docs/applications/supported.html:148
#: i2p2www/pages/site/docs/applications/supported.html:220
@@ -4394,38 +6636,68 @@ msgid ""
"Unmaintained — This is used to tag plugins, applications,\n"
"and services which appear to be unmaintained and may be removed from\n"
"this listing in the future."
-msgstr "Sin mantenimiento — Es usado para etiquetar los pluguins, aplicaciones y servicios que no son actualizados o mantenidos y serán removidos de la lista en el futuro."
+msgstr ""
+"Sin mantenimiento — Es usado para etiquetar los pluguins, "
+"aplicaciones y servicios que no son actualizados o mantenidos y serán "
+"removidos de la lista en el futuro."
#: i2p2www/pages/site/docs/applications/supported.html:159
#, python-format
msgid ""
"Warning: Using an application, plugin, or service with I2P\n"
-"doesn't automatically protect your anonymity. I2P is merely a set of tools\n"
-"which can help you mitigate certain identified\n"
-"threats to anonymity. We do not and cannot make any guarantees about the\n"
+"doesn't automatically protect your anonymity. I2P is merely a set of "
+"tools\n"
+"which can help you mitigate certain identified\n"
+"threats to anonymity. We do not and cannot make any guarantees about "
+"the\n"
"safety of the applications, plugins, and services listed below. Most\n"
-"applications and plugins must be properly configured, and some will need to\n"
-"be patched — and even then your anonymity might not be assured. Similarly,\n"
+"applications and plugins must be properly configured, and some will need "
+"to\n"
+"be patched — and even then your anonymity might not be assured. "
+"Similarly,\n"
"services could put your anonymity at risk, either by design or through\n"
"carelessness on their part or your own."
-msgstr "Aviso: Usar un programa, pluguin o servicio en I2P no protege automáticamente su anonimato. I2P no es más que un conjunto de herramientas que pueden ayudarle a mitigar ciertos peligros conocidos para su anonimato. No damos ni podríamos darle ninguna garantía sobre la seguridad de las aplicaciones, pluguins o servicios listados abajo. La mayoría de las aplicaciones y pluguins deben ser configurados adecuadamente, y algunos necesitan ser parcheados — e incluso así su anonimato podría no estar asegurado. Igualmente, los servicios podrían poner su anonimato en riesgo, ya sea por diseño o por una configuración deficiente del servicio o de usted mismo."
+msgstr ""
+"Aviso: Usar un programa, pluguin o servicio en I2P no protege "
+"automáticamente su anonimato. I2P no es más que un conjunto de "
+"herramientas que pueden ayudarle a mitigar ciertos peligros conocidos para su anonimato. No "
+"damos ni podríamos darle ninguna garantía sobre la seguridad de las "
+"aplicaciones, pluguins o servicios listados abajo. La mayoría de las "
+"aplicaciones y pluguins deben ser configurados adecuadamente, y algunos "
+"necesitan ser parcheados — e incluso así su anonimato podría no estar "
+"asegurado. Igualmente, los servicios podrían poner su anonimato en "
+"riesgo, ya sea por diseño o por una configuración deficiente del servicio"
+" o de usted mismo."
#: i2p2www/pages/site/docs/applications/supported.html:171
msgid ""
"If you have doubts about the suitability of an application,\n"
-"plugin, or service for use with I2P, you are urged to inquire about privacy\n"
-"issues with its maintainers, to search its mailing lists and bug tracker if\n"
+"plugin, or service for use with I2P, you are urged to inquire about "
+"privacy\n"
+"issues with its maintainers, to search its mailing lists and bug tracker "
+"if\n"
"one exists, and consult trusted, knowledgeable members of the I2P\n"
"community."
-msgstr "Si tiene dudas sobre una aplicación, pluguin o servicio a la hora de usarlo con I2P, le recomendamos que consulte sobre sus posibles problemas con la privacidad a sus programadores, buscando en su listas o en los servidores de errores, si existen, y consultando a miembros de la comunidad de i2p conocidos y de confianza."
+msgstr ""
+"Si tiene dudas sobre una aplicación, pluguin o servicio a la hora de "
+"usarlo con I2P, le recomendamos que consulte sobre sus posibles problemas"
+" con la privacidad a sus programadores, buscando en su listas o en los "
+"servidores de errores, si existen, y consultando a miembros de la "
+"comunidad de i2p conocidos y de confianza."
#: i2p2www/pages/site/docs/applications/supported.html:179
msgid ""
"Take responsibility for your own anonymity and safety — always\n"
-"seek expert advice, educate yourself, practice good judgment, be mindful of\n"
+"seek expert advice, educate yourself, practice good judgment, be mindful "
+"of\n"
"disclosing personally identifying information, and don't take\n"
"shortcuts."
-msgstr "Tome responsabilidad por su propia seguridad y anonimato — busque siempre asesoramiento experto, edúquese usted mismo, use su buen juicio, sea consciente de si revela información personal, y no tome atajos."
+msgstr ""
+"Tome responsabilidad por su propia seguridad y anonimato — busque siempre"
+" asesoramiento experto, edúquese usted mismo, use su buen juicio, sea "
+"consciente de si revela información personal, y no tome atajos."
#: i2p2www/pages/site/docs/applications/supported.html:201
msgid "Lightweight forum software."
@@ -4448,15 +6720,22 @@ msgstr "Sistema de foros distribuido, originalmente creado por jrandom."
msgid ""
"A Java-based MediaWiki clone. No external database needed.\n"
"Plugin available here."
-msgstr "Un clon en Java de MediaWiki. Sin necesidad de base de datos externa. Pluguin disponible aquí."
+msgstr ""
+"Un clon en Java de MediaWiki. Sin necesidad de base de datos externa. "
+"Pluguin disponible aquí."
#: i2p2www/pages/site/docs/applications/supported.html:236
#, python-format
msgid ""
-"Port of the Tahoe-LAFS\n"
+"Port of the Tahoe-"
+"LAFS\n"
"distributed file system to the I2P network. Controller plugin here."
-msgstr "Port del sistema de archivos distribuido Tahoe-LAFS para la red I2P. El pluguin de control aquí."
+msgstr ""
+"Port del sistema de archivos distribuido Tahoe-LAFS para la red I2P. El pluguin "
+"de control aquí."
#: i2p2www/pages/site/docs/applications/supported.html:251
msgid "Most popular distributed version control system."
@@ -4467,7 +6746,9 @@ msgstr "El sistema distribuido de control de versiones más popular."
msgid ""
"Another distributed version control system. Currently\n"
"used in I2P development."
-msgstr "Otro sistema distribuido de control de versiones. Actualmente usado para el desarrollo de I2P."
+msgstr ""
+"Otro sistema distribuido de control de versiones. Actualmente usado para el desarrollo de I2P."
#: i2p2www/pages/site/docs/applications/supported.html:269
#, python-format
@@ -4475,31 +6756,53 @@ msgid ""
"Provides management of addressbooks, which are part of a simple,\n"
"user-controlled I2P naming system somewhat\n"
"analogous to the Internet's Domain Name System (DNS). Addressbooks map\n"
-"Base64 destinations to short, usually human-readable “domain” names ending\n"
-"with a .i2p suffix which the I2P router's HTTP client can resolve back to\n"
+"Base64 destinations to short, usually human-readable “domain” names "
+"ending\n"
+"with a .i2p suffix which the I2P router's HTTP client can resolve back to"
+"\n"
"Base64 addresses. (Note: While Base64 destinations are globally\n"
"unique, addressbook “domain” names only resolve to unique destinations\n"
"locally.)"
-msgstr "Proporciona control sobre la listas de direcciones, que son parte de un sistema sencillo controlado por el usuario del sistema de dominios de I2P, de alguna forma análogo al Sistema de Nombres de Internet(DNS). La lista de direcciones convierte las destinaciones Base64 a nombres de dominio cortos, normalmente comprensibles para los humanos, con el sufijo .i2p, los cuales pueden ser traducidos de vuelta por el cliente HTTP del ruter de I2P a sus direcciones Base64. (Nota: Mientras que las destinaciones Base64 son únicas globalmente, los nombres de \"domino\" de la lista de direcciones sólo son resueltos por destinaciones locales únicas.)"
+msgstr ""
+"Proporciona control sobre la listas de direcciones, que son parte de un "
+"sistema sencillo controlado por el usuario del sistema de dominios de I2P, de alguna forma "
+"análogo al Sistema de Nombres de Internet(DNS). La lista de direcciones "
+"convierte las destinaciones Base64 a nombres de dominio cortos, "
+"normalmente comprensibles para los humanos, con el sufijo .i2p, los "
+"cuales pueden ser traducidos de vuelta por el cliente HTTP del ruter de "
+"I2P a sus direcciones Base64. (Nota: Mientras que las "
+"destinaciones Base64 son únicas globalmente, los nombres de \"domino\" de"
+" la lista de direcciones sólo son resueltos por destinaciones locales "
+"únicas.)"
#: i2p2www/pages/site/docs/applications/supported.html:288
msgid ""
"Serverless peer-to-peer email application using a distributed hash table\n"
"(DHT) for secure mail storage."
-msgstr "Sistema de email p2p sin servidores que usa una tabla distribuida de hashes (DHT) para el almacenaje seguro de emails."
+msgstr ""
+"Sistema de email p2p sin servidores que usa una tabla distribuida de "
+"hashes (DHT) para el almacenaje seguro de emails."
#: i2p2www/pages/site/docs/applications/supported.html:297
msgid ""
"Provides email service within the I2P network via @mail.i2p addresses,\n"
-"and email gateway service between the I2P network and the public Internet\n"
+"and email gateway service between the I2P network and the public Internet"
+"\n"
"via @i2pmail.org addresses. One of the oldest continuous services on I2P."
-msgstr "Proporciona servicio de email dentro de I2P a través de direcciones @mail.i2p, y un servicio de salida de emails entre la red I2P y el Internet público a través de las direcciones @i2pmail.org. Es uno de los sistemas continuados más viejo de I2P."
+msgstr ""
+"Proporciona servicio de email dentro de I2P a través de direcciones "
+"@mail.i2p, y un servicio de salida de emails entre la red I2P y el "
+"Internet público a través de las direcciones @i2pmail.org. Es uno de los "
+"sistemas continuados más viejo de I2P."
#: i2p2www/pages/site/docs/applications/supported.html:307
msgid ""
"Simple web browser-based email interface. Configured to use Postman's\n"
"email service by default."
-msgstr "Interfaz web simple para emails. Configurado por defecto para usar el servidor de email Postman."
+msgstr ""
+"Interfaz web simple para emails. Configurado por defecto para usar el "
+"servidor de email Postman."
#: i2p2www/pages/site/docs/applications/supported.html:316
#, python-format
@@ -4508,7 +6811,11 @@ msgid ""
"this comparison of MUAs,\n"
"and configuration settings for\n"
"SMTP and POP3."
-msgstr "Puede configurarse para usar el servicio de email de Postman. Vea \nesta comparación de MUAs, y las opciones de configuración para \nSMTP y POP3."
+msgstr ""
+"Puede configurarse para usar el servicio de email de Postman. Vea \n"
+"esta comparación de MUAs, y las opciones de "
+"configuración para \n"
+"SMTP y POP3."
#: i2p2www/pages/site/docs/applications/supported.html:335
msgid "I2P's integrated BitTorrent client."
@@ -4525,13 +6832,21 @@ msgid ""
"improvements, including using the latest wxwidgets and python. It also\n"
"supports use of seedless if installed for trackerless torrents and\n"
"magnet-link like fetching of torrents within I2P.\n"
-msgstr "\nUn fork de rufus que utiliza Basic Open Bridge (BOB), puente básico libre, y tiene muchas mejoras, incluyendo el uso del último wxwidgets y python. También soporta el uso de seedless, sin-emilla, si está instalado, para los torrents sin tracker, y el uso de anlaces imán, magnet-link, para torrents dentro de I2P.\n"
+msgstr ""
+"\n"
+"Un fork de rufus que utiliza Basic Open Bridge (BOB), puente básico "
+"libre, y tiene muchas mejoras, incluyendo el uso del último wxwidgets y "
+"python. También soporta el uso de seedless, sin-emilla, si está "
+"instalado, para los torrents sin tracker, y el uso de anlaces imán, "
+"magnet-link, para torrents dentro de I2P.\n"
#: i2p2www/pages/site/docs/applications/supported.html:358
msgid ""
"Clean, full-featured cross-platform BitTorrent client with official\n"
"ports for several GUI toolkits."
-msgstr "Cliente de BitTorrent completo multi plataforma con varios ports para varios GUIs diferentes."
+msgstr ""
+"Cliente de BitTorrent completo multi plataforma con varios ports para "
+"varios GUIs diferentes."
#: i2p2www/pages/site/docs/applications/supported.html:367
msgid "Has a plugin providing I2P support."
@@ -4542,27 +6857,37 @@ msgstr "Contiene un pluguin para usarse con I2P."
msgid ""
"For a detailed feature comparison of I2P-enabled trackers/indexers, see\n"
"here."
-msgstr "Para una comparación detallada entre trackers/indexadores en I2P, mire aquí."
+msgstr ""
+"Para una comparación detallada entre trackers/indexadores en I2P, mire aquí."
#: i2p2www/pages/site/docs/applications/supported.html:382
msgid ""
-"The code that powered one of the first major tracker/indexer sites on the\n"
+"The code that powered one of the first major tracker/indexer sites on the"
+"\n"
"Internet. Patched for I2P."
-msgstr "El código que que hace funcionar uno de las mayores webs trackers en Internet. Parcheado para I2P."
+msgstr ""
+"El código que que hace funcionar uno de las mayores webs trackers en "
+"Internet. Parcheado para I2P."
#: i2p2www/pages/site/docs/applications/supported.html:391
#, python-format
msgid ""
"Lightweight tracker/indexer. I2P mod available in the i2p.opentracker\n"
"branch of the I2P Monotone repository."
-msgstr "Tracker/indexador ligero. Mod para I2P disponible en la rama de i2p.opentracker del repositorio Monotone de I2P."
+msgstr ""
+"Tracker/indexador ligero. Mod para I2P disponible en la rama de "
+"i2p.opentracker del repositorio Monotone de "
+"I2P."
#: i2p2www/pages/site/docs/applications/supported.html:400
#, python-format
msgid ""
"zzz's Java-based open tracker. More info\n"
"here."
-msgstr "de zzz Tracker libre basado en Java. Más información aquí."
+msgstr ""
+"de zzz Tracker libre basado en Java. Más "
+"información aquí."
#: i2p2www/pages/site/docs/applications/supported.html:413
msgid "I2P port of the aMule ED2K client."
@@ -4571,22 +6896,30 @@ msgstr "Port para I2P del cliente aMule ED2K."
#: i2p2www/pages/site/docs/applications/supported.html:422
#, python-format
msgid ""
-"Port of the Phex Gnutella client. Website\n"
+"Port of the Phex Gnutella "
+"client. Website\n"
"for plugin version here."
-msgstr "Port del cliente Gnutella Phex. La web del pluguin aquí."
+msgstr ""
+"Port del cliente Gnutella Phex. La web del pluguin aquí."
#: i2p2www/pages/site/docs/applications/supported.html:431
#, python-format
msgid ""
"Cache for Gnutella peers on I2P. Website for plugin version\n"
"here."
-msgstr "Caché de los pares de Gnutella en I2P. Web del pluguin aquí."
+msgstr ""
+"Caché de los pares de Gnutella en I2P. Web del pluguin aquí."
#: i2p2www/pages/site/docs/applications/supported.html:446
msgid ""
"Unix standard tool for socket relaying. Several clones, ports, and forks\n"
"have appeared over the years."
-msgstr "Herramienta estándar Unix para la manipulación de sockets. Durante los años han aparecido varios clons, ports y forks."
+msgstr ""
+"Herramienta estándar Unix para la manipulación de sockets. Durante los "
+"años han aparecido varios clons, ports y forks."
#: i2p2www/pages/site/docs/applications/supported.html:455
msgid "Like netcat but more powerful."
@@ -4594,14 +6927,19 @@ msgstr "Igual que netcat pero más potente."
#: i2p2www/pages/site/docs/applications/supported.html:461
msgid ""
-"Proxy providing simple, transparent SOCKS-ification of network applications."
-msgstr "Proxy que proporciona el uso transparente de SOCKS de las palicaciones de la red."
+"Proxy providing simple, transparent SOCKS-ification of network "
+"applications."
+msgstr ""
+"Proxy que proporciona el uso transparente de SOCKS de las palicaciones de"
+" la red."
#: i2p2www/pages/site/docs/applications/supported.html:471
msgid ""
-"Most popular implementation of the Secure Shell (SSH) protocol and related "
-"tools."
-msgstr "La implementación más popular del protocolo Secure Shell (SSH) y varias herramientas relacionadas."
+"Most popular implementation of the Secure Shell (SSH) protocol and "
+"related tools."
+msgstr ""
+"La implementación más popular del protocolo Secure Shell (SSH) y varias "
+"herramientas relacionadas."
#: i2p2www/pages/site/docs/applications/supported.html:477
msgid "Open source Secure Shell (SSH) client for Windows."
@@ -4614,31 +6952,58 @@ msgstr "Cliente de mensajería, IM, con múltiples encarnaciones."
#: i2p2www/pages/site/docs/applications/supported.html:496
msgid ""
"Many IRC clients leak identifying information to servers or other\n"
-"clients, so I2P's IRC and SOCKS IRC client tunnels filter certain inbound\n"
-"and outbound messages to scrub data such as LAN IP addresses, external IP\n"
-"addresses, local hostnames, and the name and version of the IRC client. Two\n"
-"message types in particular, DCC and CTCP, can't be sufficiently anonymized\n"
-"without changes to the protocols or to IRC client/server code, so they are\n"
+"clients, so I2P's IRC and SOCKS IRC client tunnels filter certain inbound"
+"\n"
+"and outbound messages to scrub data such as LAN IP addresses, external IP"
+"\n"
+"addresses, local hostnames, and the name and version of the IRC client. "
+"Two\n"
+"message types in particular, DCC and CTCP, can't be sufficiently "
+"anonymized\n"
+"without changes to the protocols or to IRC client/server code, so they "
+"are\n"
"completely blocked, except for CTCP ACTION (the message emitted by the\n"
"/me
command) which isn't inherently dangerous."
-msgstr "Muchos clientes IRC filtran información del usuario a los servidores u otros clientes, por lo que el IRC de I2P y los túneles clientes SOCKS IRC filtran ciertos mensajes de entrada y de salida para limpiar los datos tales como la IP de la LAN, la IP externa, los nombres de host local, y el nombre y la versión de los clientes de IRC. En particular, dos tipos de mensajes, DCC y CTCP, no pueden ser anonimizados sin cambios en el protocolo de los clientes y servidores de IRC, por lo que han sido completamente bloqueados, excepto para CTCP ACTION (el mensaje emitido por el comando /me
) que no es peligroso por sí mismo."
+msgstr ""
+"Muchos clientes IRC filtran información del usuario a los servidores u "
+"otros clientes, por lo que el IRC de I2P y los túneles clientes SOCKS IRC"
+" filtran ciertos mensajes de entrada y de salida para limpiar los datos "
+"tales como la IP de la LAN, la IP externa, los nombres de host local, y "
+"el nombre y la versión de los clientes de IRC. En particular, dos tipos "
+"de mensajes, DCC y CTCP, no pueden ser anonimizados sin cambios en el "
+"protocolo de los clientes y servidores de IRC, por lo que han sido "
+"completamente bloqueados, excepto para CTCP ACTION (el mensaje emitido "
+"por el comando /me
) que no es peligroso por sí mismo."
#: i2p2www/pages/site/docs/applications/supported.html:507
msgid ""
-"I2P's IRC filtering may not cover every possible leak — users should also\n"
-"check if their client is sending their real name or local username. Packet\n"
+"I2P's IRC filtering may not cover every possible leak — users should also"
+"\n"
+"check if their client is sending their real name or local username. "
+"Packet\n"
"sniffers such as Wireshark are\n"
-"useful here. Eliminating remaining leaks may be as simple as changing the\n"
+"useful here. Eliminating remaining leaks may be as simple as changing the"
+"\n"
"client's default configuration. If that doesn't help, inform the I2P\n"
"developers; they may be able to solve it via additional filtering."
-msgstr "El filtro de IRC de I2P no puede cubrir todas las filtraciones — los usuarios deben comprobar si su cliente envía su nombre real o su nombre local. Los sniffers de paquetes como Wireshark son muy útiles en estos casos. Para eliminar las filtraciones puede ser tan simple como cambiar la configuración por defecto del cliente IRC. Si eso no ayuda, avise a los desarrolladores de I2P, podrían ser capaces de arreglarlo añadiendo algún filtro adicional."
+msgstr ""
+"El filtro de IRC de I2P no puede cubrir todas las filtraciones — los "
+"usuarios deben comprobar si su cliente envía su nombre real o su nombre "
+"local. Los sniffers de paquetes como Wireshark son muy útiles en estos "
+"casos. Para eliminar las filtraciones puede ser tan simple como cambiar "
+"la configuración por defecto del cliente IRC. Si eso no ayuda, avise a "
+"los desarrolladores de I2P, podrían ser capaces de arreglarlo añadiendo "
+"algún filtro adicional."
#: i2p2www/pages/site/docs/applications/supported.html:519
#, python-format
msgid ""
"Small Java-based IRC client. Plugin available here."
-msgstr "Cliente de IRC pequeño en Java. Pluguin disponible aquí."
+msgstr ""
+"Cliente de IRC pequeño en Java. Pluguin disponible aquí."
#: i2p2www/pages/site/docs/applications/supported.html:528
msgid "Cross-platform graphical IRC client."
@@ -4662,23 +7027,30 @@ msgstr "El servidor IRC más popular."
#: i2p2www/pages/site/docs/applications/supported.html:568
msgid ""
-"Any website hosted anonymously on I2P, reachable through the I2P router's "
-"HTTP proxy."
-msgstr "Cualquier web alojada anónimamente en I2P, accesible desde el proxy HTTP del ruter de I2P."
+"Any website hosted anonymously on I2P, reachable through the I2P router's"
+" HTTP proxy."
+msgstr ""
+"Cualquier web alojada anónimamente en I2P, accesible desde el proxy HTTP "
+"del ruter de I2P."
#: i2p2www/pages/site/docs/applications/supported.html:576
msgid ""
"Distributed anonymous websites hosted\n"
"using Tahoe-LAFS-I2P, currently only reachable with Tahoe-LAFS-I2P\n"
"clients or through the Tahoe-LAFS-I2P HTTP proxy."
-msgstr "Webs anónimas distribuidas alojadas usando Tahoe-LAFS-I2P, actualmente sólo accesibles con clientes Tahoe-LAFS-I2P o a través del proxy HTTP Tahoe-LAFS-I2P."
+msgstr ""
+"Webs anónimas distribuidas alojadas usando Tahoe-LAFS-I2P, actualmente "
+"sólo accesibles con clientes Tahoe-LAFS-I2P o a través del proxy HTTP "
+"Tahoe-LAFS-I2P."
#: i2p2www/pages/site/docs/applications/supported.html:586
#, python-format
msgid ""
"Website for sponge's jump service.\n"
"Source code available."
-msgstr "Web para el servicio de saltos de sponge. Con el código fuente desponible."
+msgstr ""
+"Web para el servicio de saltos de sponge. Con el código fuente desponible."
#: i2p2www/pages/site/docs/applications/supported.html:595
msgid "Another jump service."
@@ -4701,7 +7073,9 @@ msgstr "Web proxy con cacheo activo SOCKS con la capacidad de filtrado básico."
msgid ""
"Privacy-focused non-caching web proxy with advanced filtering\n"
"capabilities. Excels at removing ads and other junk."
-msgstr "Web proxy sin cacheo enfocado a la privacidad con capacidad de filtrado avanzado. Excelente a la hora de eliminar anuncios y otras mierdas."
+msgstr ""
+"Web proxy sin cacheo enfocado a la privacidad con capacidad de filtrado "
+"avanzado. Excelente a la hora de eliminar anuncios y otras mierdas."
#: i2p2www/pages/site/docs/applications/supported.html:632
msgid "Venerable caching web proxy."
@@ -4709,12 +7083,16 @@ msgstr "Venerable web proxy con caché."
#: i2p2www/pages/site/docs/applications/supported.html:639
msgid "Gateways allowing users on the public Internet to access eepsites."
-msgstr "Salidas que permiten a los usuarios en el Internet público acceder a las eepsites en I2P."
+msgstr ""
+"Salidas que permiten a los usuarios en el Internet público acceder a las "
+"eepsites en I2P."
#: i2p2www/pages/site/docs/applications/supported.html:646
#, python-format
msgid "tino's inproxy on the public Internet."
-msgstr "Proxy de entrada de tino en el Internet público."
+msgstr ""
+"Proxy de entrada de tino en el Internet "
+"público."
#: i2p2www/pages/site/docs/applications/supported.html:654
#: i2p2www/pages/site/docs/applications/supported.html:662
@@ -4723,28 +7101,45 @@ msgstr "Otro proxy de entrada en la Internet abierta."
#: i2p2www/pages/site/docs/applications/supported.html:671
msgid ""
-"Gateways allowing I2P users to access content hosted on the public Internet."
-msgstr "Salidas que permiten a los usuarios de I2P acceder al contenido en el Internet público."
+"Gateways allowing I2P users to access content hosted on the public "
+"Internet."
+msgstr ""
+"Salidas que permiten a los usuarios de I2P acceder al contenido en el "
+"Internet público."
#: i2p2www/pages/site/docs/applications/supported.html:678
msgid "Publicly advertised outproxy running Squid, located in Germany."
-msgstr "Proxy de salida públicamente anunciado que usa Squid, localizado en Alemania."
+msgstr ""
+"Proxy de salida públicamente anunciado que usa Squid, localizado en "
+"Alemania."
#: i2p2www/pages/site/docs/applications/supported.html:688
msgid ""
"Lightweight web server and Java servlet container. I2P is tightly\n"
-"integrated with a bundled copy of Jetty which by default is configured to\n"
-"host the user's eepsite. The bundled\n"
-"Jetty also serves the I2P router console and web applications bundled with\n"
+"integrated with a bundled copy of Jetty which by default is configured to"
+"\n"
+"host the user's eepsite. The "
+"bundled\n"
+"Jetty also serves the I2P router console and web applications bundled "
+"with\n"
"I2P."
-msgstr "Servidor web ligero basado en Java servlet container. I2P está estrechamente integrado con una copia de Jetty incluida, que está configurada por defecto para alojar la eepsite del usuario. La copia de Jetty incluida también sirve la consola del ruter de I2P y las palicaciones web incluidas con I2P."
+msgstr ""
+"Servidor web ligero basado en Java servlet container. I2P está "
+"estrechamente integrado con una copia de Jetty incluida, que está "
+"configurada por defecto para alojar la eepsite del usuario. La copia de "
+"Jetty incluida también sirve la consola del ruter de I2P y las "
+"palicaciones web incluidas con I2P."
#: i2p2www/pages/site/docs/applications/supported.html:700
msgid ""
"In addition to Jetty, any web server should function over I2P without\n"
"modification so long as it's HTTP-compliant. Some web servers known to\n"
"currently serve content on the I2P network are:"
-msgstr "Además de Jetty, cualquier servidor web debería funcionar con I2P sin modificaciones mientras sea compatible con HTTP. Algunos servidores web usados actualmente para servir contenido en I2P son:"
+msgstr ""
+"Además de Jetty, cualquier servidor web debería funcionar con I2P sin "
+"modificaciones mientras sea compatible con HTTP. Algunos servidores web "
+"usados actualmente para servir contenido en I2P son:"
#: i2p2www/pages/site/docs/applications/supported.html:709
msgid "Most popular web server on the public WWW."
@@ -4769,10 +7164,15 @@ msgstr "Discusión de nombres"
#: i2p2www/pages/site/docs/discussions/naming.html:4
#, python-format
msgid ""
-"NOTE: The following is a discussion of the reasons behind the I2P naming system,\n"
+"NOTE: The following is a discussion of the reasons behind the I2P naming "
+"system,\n"
"common arguments and possible alternatives.\n"
"See the naming page for current documentation."
-msgstr "NOTA: La siguiente es una discusión de las razones que hay detrás del \nsistema de nombres de I2P, argumentos comunes y posibles alternativas. \nVea en la página de nombres la documentación actual."
+msgstr ""
+"NOTA: La siguiente es una discusión de las razones que hay detrás del \n"
+"sistema de nombres de I2P, argumentos comunes y posibles alternativas. \n"
+"Vea en la página de nombres la documentación "
+"actual."
#: i2p2www/pages/site/docs/discussions/naming.html:10
msgid "Discarded alternatives"
@@ -4780,50 +7180,119 @@ msgstr "Alternativas descartadas"
#: i2p2www/pages/site/docs/discussions/naming.html:12
msgid ""
-"Naming within I2P has been an oft-debated topic since the very beginning with\n"
-"advocates across the spectrum of possibilities. However, given I2P's inherent\n"
-"demand for secure communication and decentralized operation, the traditional\n"
-"DNS-style naming system is clearly out, as are \"majority rules\" voting systems."
-msgstr "Los nombres dentro de I2P han sido un tema a menudo debatido desde el principio mismo, con defensores de todas las posibilidades del espectro. \nSin embargo, dada la demanda inherente a I2P de comunicaciones \nseguras y operaciones descentralizadas, el sistema de nombres \ntradicional estilo-DNS está claramente desestimado, ya que son\nsistemas de voto donde la \"mayoría manda\"."
+"Naming within I2P has been an oft-debated topic since the very beginning "
+"with\n"
+"advocates across the spectrum of possibilities. However, given I2P's "
+"inherent\n"
+"demand for secure communication and decentralized operation, the "
+"traditional\n"
+"DNS-style naming system is clearly out, as are \"majority rules\" voting "
+"systems."
+msgstr ""
+"Los nombres dentro de I2P han sido un tema a menudo debatido desde el "
+"principio mismo, con defensores de todas las posibilidades del espectro."
+" \n"
+"Sin embargo, dada la demanda inherente a I2P de comunicaciones \n"
+"seguras y operaciones descentralizadas, el sistema de nombres \n"
+"tradicional estilo-DNS está claramente desestimado, ya que son\n"
+"sistemas de voto donde la \"mayoría manda\"."
#: i2p2www/pages/site/docs/discussions/naming.html:19
msgid ""
-"I2P does not promote the use of DNS-like services though, as the damage done\n"
-"by hijacking a site can be tremendous - and insecure destinations have no\n"
-"value. DNSsec itself still falls back on registrars and certificate authorities,\n"
-"while with I2P, requests sent to a destination cannot be intercepted or the reply\n"
-"spoofed, as they are encrypted to the destination's public keys, and a destination\n"
-"itself is just a pair of public keys and a certificate. DNS-style systems on the\n"
-"other hand allow any of the name servers on the lookup path to mount simple denial\n"
-"of service and spoofing attacks. Adding on a certificate authenticating the\n"
-"responses as signed by some centralized certificate authority would address many of\n"
-"the hostile nameserver issues but would leave open replay attacks as well as \n"
+"I2P does not promote the use of DNS-like services though, as the damage "
+"done\n"
+"by hijacking a site can be tremendous - and insecure destinations have no"
+"\n"
+"value. DNSsec itself still falls back on registrars and certificate "
+"authorities,\n"
+"while with I2P, requests sent to a destination cannot be intercepted or "
+"the reply\n"
+"spoofed, as they are encrypted to the destination's public keys, and a "
+"destination\n"
+"itself is just a pair of public keys and a certificate. DNS-style "
+"systems on the\n"
+"other hand allow any of the name servers on the lookup path to mount "
+"simple denial\n"
+"of service and spoofing attacks. Adding on a certificate authenticating "
+"the\n"
+"responses as signed by some centralized certificate authority would "
+"address many of\n"
+"the hostile nameserver issues but would leave open replay attacks as well"
+" as \n"
"hostile certificate authority attacks."
-msgstr "I2P no promociona el uso de servicios tipo-DNS, ya que el \ndaño hecho al secuestrar un sitio puede ser tremedo - y los destinos inseguros no tienen valor. El propio DNSsec aún se respalda sobre los \nregistradores y las autoridades de certificados, mientras que con I2P las solicitudes enviadas a un destino no pueden ser interceptadas, o la \nrespuesta falseada (`spoofed`), ya que están cifradas hasta recibir las \nclaves públicas del destino, y un destino en si mismo es sólo un par de claves públicas y un certificado. Por otra parte, los sistemas estilo-DNS \npermiten a cualquiera de los servidores de nombres en la ruta de la \nconsulta, montar sencillos ataques de denegación de servicio (DoS) y de \nfalsificación (`spoofing`). Añadir un certificado autentificando las respuestas \ncomo firmadas por alguna autoridad centralizada de certificados podría \nsolventar muchos de los problemas con servidores de nombres hostiles, \npero también dejaría abiertos los ataques de respuesta así como los ataques de autoridades de certificados hostiles."
+msgstr ""
+"I2P no promociona el uso de servicios tipo-DNS, ya que el \n"
+"daño hecho al secuestrar un sitio puede ser tremedo - y los destinos "
+"inseguros no tienen valor. El propio DNSsec aún se respalda sobre los \n"
+"registradores y las autoridades de certificados, mientras que con I2P las"
+" solicitudes enviadas a un destino no pueden ser interceptadas, o la \n"
+"respuesta falseada (`spoofed`), ya que están cifradas hasta recibir las \n"
+"claves públicas del destino, y un destino en si mismo es sólo un par de "
+"claves públicas y un certificado. Por otra parte, los sistemas estilo-DNS"
+" \n"
+"permiten a cualquiera de los servidores de nombres en la ruta de la \n"
+"consulta, montar sencillos ataques de denegación de servicio (DoS) y de \n"
+"falsificación (`spoofing`). Añadir un certificado autentificando las "
+"respuestas \n"
+"como firmadas por alguna autoridad centralizada de certificados podría \n"
+"solventar muchos de los problemas con servidores de nombres hostiles, \n"
+"pero también dejaría abiertos los ataques de respuesta así como los "
+"ataques de autoridades de certificados hostiles."
#: i2p2www/pages/site/docs/discussions/naming.html:33
msgid ""
-"Voting style naming is dangerous as well, especially given the effectiveness of\n"
-"Sybil attacks in anonymous systems - the attacker can simply create an arbitrarily\n"
-"high number of peers and \"vote\" with each to take over a given name. Proof-of-work\n"
-"methods can be used to make identity non-free, but as the network grows the load\n"
-"required to contact everyone to conduct online voting is implausible, or if the\n"
+"Voting style naming is dangerous as well, especially given the "
+"effectiveness of\n"
+"Sybil attacks in anonymous systems - the attacker can simply create an "
+"arbitrarily\n"
+"high number of peers and \"vote\" with each to take over a given name. "
+"Proof-of-work\n"
+"methods can be used to make identity non-free, but as the network grows "
+"the load\n"
+"required to contact everyone to conduct online voting is implausible, or "
+"if the\n"
"full network is not queried, different sets of answers may be reachable."
-msgstr "El estilo de voto de nombres también es peligroso, especialmente \ndada la efectividad de ataques Sybil en sistemas anónimos - el atacante \nsimplemente puede crear arbitrariamente un alto número de pares (`peers`) \ny \"votar\" con cada uno para conquistar un determinado nombre. Métodos prueba-de-trabajo pueden usarse para hacer la identidad no-gratuita, pero al crecer la red, la carga necesaria para contactar con todos para realizar una \nvotación en línea no es plausible, o si no se consulta a la red completa diferentes grupos de respuestas pueden ser alcanzables."
+msgstr ""
+"El estilo de voto de nombres también es peligroso, especialmente \n"
+"dada la efectividad de ataques Sybil en sistemas anónimos - el atacante \n"
+"simplemente puede crear arbitrariamente un alto número de pares (`peers`)"
+" \n"
+"y \"votar\" con cada uno para conquistar un determinado nombre. Métodos "
+"prueba-de-trabajo pueden usarse para hacer la identidad no-gratuita, pero"
+" al crecer la red, la carga necesaria para contactar con todos para "
+"realizar una \n"
+"votación en línea no es plausible, o si no se consulta a la red completa "
+"diferentes grupos de respuestas pueden ser alcanzables."
#: i2p2www/pages/site/docs/discussions/naming.html:42
msgid ""
-"As with the Internet however, I2P is keeping the design and operation of a \n"
-"naming system out of the (IP-like) communication layer. The bundled naming library\n"
-"includes a simple service provider interface which alternate naming systems can\n"
-"plug into, allowing end users to drive what sort of naming tradeoffs they prefer."
-msgstr "Sin embargo, como sucede con Internet, I2P está manteniendo el diseño\ny las operaciones de un sistema de nombres fuera de la capa de comunicación \n(al estilo-IP). La librería de nombres empaquetada incluye una interfaz sencilla \nde proveedor de servicios a la que los sistemas de nombres alternativos \npueden enchufarse, permitiendo a los usuarios finales dirigir la clase de compromisos de equilibrio con los nombres que ellos prefieran."
+"As with the Internet however, I2P is keeping the design and operation of "
+"a \n"
+"naming system out of the (IP-like) communication layer. The bundled "
+"naming library\n"
+"includes a simple service provider interface which alternate naming systems can\n"
+"plug into, allowing end users to drive what sort of naming tradeoffs they"
+" prefer."
+msgstr ""
+"Sin embargo, como sucede con Internet, I2P está manteniendo el diseño\n"
+"y las operaciones de un sistema de nombres fuera de la capa de "
+"comunicación \n"
+"(al estilo-IP). La librería de nombres empaquetada incluye una interfaz "
+"sencilla \n"
+"de proveedor de servicios a la que los sistemas"
+" de nombres alternativos \n"
+"pueden enchufarse, permitiendo a los usuarios finales dirigir la clase de"
+" compromisos de equilibrio con los nombres que ellos prefieran."
#: i2p2www/pages/site/docs/discussions/naming.html:50
msgid ""
-"See also Names: Decentralized, "
-"Secure, Human-Meaningful: Choose Two."
-msgstr "Vea también Nombres: descentralizados, seguros, con-significado-humano: escoja dos."
+"See also Names: "
+"Decentralized, Secure, Human-Meaningful: Choose Two."
+msgstr ""
+"Vea también Nombres:"
+" descentralizados, seguros, con-significado-humano: escoja dos."
#: i2p2www/pages/site/docs/discussions/naming.html:55
msgid "(adapted from a post in the old Syndie, November 26, 2005)"
@@ -4833,69 +7302,144 @@ msgstr "(adaptado desde un post en el antiguo Syndie, 26 de noviembre de 2005)"
msgid ""
"Q:\n"
"What to do if some hosts \n"
-"do not agree on one address and if some addresses are working, others are not? \n"
+"do not agree on one address and if some addresses are working, others are"
+" not? \n"
"Who is the right source of a name?"
-msgstr "P: ¿Qué hacer si algunos servidores no están de acuerdo con una de las \ndirecciones, y si algunas de las direcciones están funcionando y otras no? \n¿Quién es la fuente correcta de un nombre?"
+msgstr ""
+"P: ¿Qué hacer si algunos servidores no están de acuerdo con una de las \n"
+"direcciones, y si algunas de las direcciones están funcionando y otras "
+"no? \n"
+"¿Quién es la fuente correcta de un nombre?"
#: i2p2www/pages/site/docs/discussions/naming.html:64
msgid ""
"A:\n"
-"You don't. This is actually a critical difference between names on I2P and how \n"
-"DNS works - names in I2P are human readable, secure, but not globally \n"
-"unique. This is by design, and an inherent part of our need for security."
-msgstr "R: Tú no. En realidad esta es una diferencia crítica entre los nombres en I2P \ny como funciona DNS - los nombres en I2P son legibles por humanos, \nseguros, pero no globalmente únicos. Esto es así por diseño, y una \nparte inherente de nuestra necesidad de seguridad."
+"You don't. This is actually a critical difference between names on I2P "
+"and how \n"
+"DNS works - names in I2P are human readable, secure, but not globally"
+" \n"
+"unique. This is by design, and an inherent part of our need for "
+"security."
+msgstr ""
+"R: Tú no. En realidad esta es una diferencia crítica entre los nombres en"
+" I2P \n"
+"y como funciona DNS - los nombres en I2P son legibles por humanos, \n"
+"seguros, pero no globalmente únicos. Esto es así por diseño, y una"
+" \n"
+"parte inherente de nuestra necesidad de seguridad."
#: i2p2www/pages/site/docs/discussions/naming.html:70
msgid ""
-"If I could somehow convince you to change the destination associated with some \n"
-"name, I'd successfully \"take over\" the site, and under no circumstances is that \n"
-"acceptable. Instead, what we do is make names locally unique: they are \n"
-"what you use to call a site, just as how you can call things whatever \n"
-"you want when you add them to your browser's bookmarks, or your IM client's \n"
-"buddy list. Who you call \"Boss\" may be who someone else calls \"Sally\"."
-msgstr "Si yo pudiese convencerle de alguna forma de cambiar la destinación asociada a algún nombre, yo habría \"tomado control\" de la web, y esto no es aceptable bajo ninguna circunstancia. En su lugar, lo que hacemos es hacer que los nombres sean únicos localmente: son lo que usted normalmente llamaría un web, al igual que puede llamar a las cosas como desea cuando las añade los favoritos de su navegador, o a su lista de amigos de su cliente de mensajería. Aquél al que llama \"jefe\" puede ser alguien llamado \"Sally\"."
+"If I could somehow convince you to change the destination associated with"
+" some \n"
+"name, I'd successfully \"take over\" the site, and under no circumstances"
+" is that \n"
+"acceptable. Instead, what we do is make names locally unique: "
+"they are \n"
+"what you use to call a site, just as how you can call things "
+"whatever \n"
+"you want when you add them to your browser's bookmarks, or your IM "
+"client's \n"
+"buddy list. Who you call \"Boss\" may be who someone else calls "
+"\"Sally\"."
+msgstr ""
+"Si yo pudiese convencerle de alguna forma de cambiar la destinación "
+"asociada a algún nombre, yo habría \"tomado control\" de la web, y esto "
+"no es aceptable bajo ninguna circunstancia. En su lugar, lo que hacemos "
+"es hacer que los nombres sean únicos localmente: son lo que "
+"usted normalmente llamaría un web, al igual que puede llamar a las"
+" cosas como desea cuando las añade los favoritos de su navegador, o a su "
+"lista de amigos de su cliente de mensajería. Aquél al que llama \"jefe\" "
+"puede ser alguien llamado \"Sally\"."
#: i2p2www/pages/site/docs/discussions/naming.html:78
msgid "Names will not, ever, be securely human readable and globally unique."
-msgstr "Los nombres no serán, nunca, legibles por humanos con-total-certeza, ni \nglobalmente únicos."
+msgstr ""
+"Los nombres no serán, nunca, legibles por humanos con-total-certeza, ni \n"
+"globalmente únicos."
#: i2p2www/pages/site/docs/discussions/naming.html:83
msgid ""
"The following from zzz is a review of several common\n"
"complaints about I2P's naming system."
-msgstr "Lo siguiente, desde el sitio de zzz, es un compendio de varias quejas \ncomunes acerca del sistema de nombres de I2P."
+msgstr ""
+"Lo siguiente, desde el sitio de zzz, es un compendio de varias quejas \n"
+"comunes acerca del sistema de nombres de I2P."
#: i2p2www/pages/site/docs/discussions/naming.html:89
msgid ""
"Inefficiency:\n"
-"The whole hosts.txt is downloaded (if it has changed, since eepget uses the etag and last-modified headers).\n"
+"The whole hosts.txt is downloaded (if it has changed, since eepget uses "
+"the etag and last-modified headers).\n"
"It's about 400K right now for almost 800 hosts."
-msgstr "Ineficiencia: \nEl fichero hosts.txt completo se descarga (si ha cambiado, ya que eepget \nusa la ETag (etiqueta de entidad HTTP) y las últimas cabeceras \nmodificadas). Ahora ocupa alrededor de 400KB para casi 800 servidores."
+msgstr ""
+"Ineficiencia: \n"
+"El fichero hosts.txt completo se descarga (si ha cambiado, ya que eepget"
+" \n"
+"usa la ETag (etiqueta de entidad HTTP) y las últimas cabeceras \n"
+"modificadas). Ahora ocupa alrededor de 400KB para casi 800 servidores."
#: i2p2www/pages/site/docs/discussions/naming.html:94
msgid ""
-"True, but this isn't a lot of traffic in the context of i2p, which is itself wildly inefficient\n"
-"(floodfill databases, huge encryption overhead and padding, garlic routing, etc.).\n"
-"If you downloaded a hosts.txt file from someone every 12 hours it averages out to about 10 bytes/sec."
-msgstr "Cierto, pero esto no es mucho tráfico en el contexto de I2P, que en si \nmismo es salvajemente ineficiente (bases de datos inundadas, enorme \ntráfico de control por la encriptación y tráfico por esquemas de relleno, enrutado ajo (`garlic`), etc.). Si usted descargó un fichero hosts.txt desde alguien cada 12 horas, esto hace una media de unos 10 bytes/s."
+"True, but this isn't a lot of traffic in the context of i2p, which is "
+"itself wildly inefficient\n"
+"(floodfill databases, huge encryption overhead and padding, garlic "
+"routing, etc.).\n"
+"If you downloaded a hosts.txt file from someone every 12 hours it "
+"averages out to about 10 bytes/sec."
+msgstr ""
+"Cierto, pero esto no es mucho tráfico en el contexto de I2P, que en si \n"
+"mismo es salvajemente ineficiente (bases de datos inundadas, enorme \n"
+"tráfico de control por la encriptación y tráfico por esquemas de relleno,"
+" enrutado ajo (`garlic`), etc.). Si usted descargó un fichero hosts.txt "
+"desde alguien cada 12 horas, esto hace una media de unos 10 bytes/s."
#: i2p2www/pages/site/docs/discussions/naming.html:99
msgid ""
-"As is usually the case in i2p, there is a fundamental tradeoff here between anonymity and efficiency.\n"
-"Some would say that using the etag and last-modified headers is hazardous because it exposes when you\n"
+"As is usually the case in i2p, there is a fundamental tradeoff here "
+"between anonymity and efficiency.\n"
+"Some would say that using the etag and last-modified headers is hazardous"
+" because it exposes when you\n"
"last requested the data.\n"
-"Others have suggested asking for specific keys only (similar to what jump services do, but\n"
+"Others have suggested asking for specific keys only (similar to what jump"
+" services do, but\n"
"in a more automated fashion), possibly at a further cost in anonymity."
-msgstr "Como es habitualmente el caso en I2P, hay un compromiso de equilibrio \nfundamental aquí entre anonimato y eficiencia. Alguien diría que usar la \nETag y las últimas cabeceras modificadas es arriesgado porque expone la última vez que solicitó los datos. Otros han sugerido pedir sólo claves \nespecíficas (similar a lo que otros servicios distribuidos ('jump') hacen, pero \nde una forma más automatizada), posiblemente a un coste superior en \nanonimato."
+msgstr ""
+"Como es habitualmente el caso en I2P, hay un compromiso de equilibrio \n"
+"fundamental aquí entre anonimato y eficiencia. Alguien diría que usar la"
+" \n"
+"ETag y las últimas cabeceras modificadas es arriesgado porque expone la "
+"última vez que solicitó los datos. Otros han sugerido pedir sólo claves"
+" \n"
+"específicas (similar a lo que otros servicios distribuidos ('jump') "
+"hacen, pero \n"
+"de una forma más automatizada), posiblemente a un coste superior en \n"
+"anonimato."
#: i2p2www/pages/site/docs/discussions/naming.html:106
#, python-format
msgid ""
-"Possible improvements would be a replacement or supplement to addressbook (see %(i2host)sp),\n"
-"or something simple like subscribing to http://example.i2p/cgi-bin/recenthosts.cgi rather than http://example.i2p/hosts.txt.\n"
-"If a hypothetical recenthosts.cgi distributed all hosts from the last 24 hours, for example,\n"
-"that could be both more efficient and more anonymous than the current hosts.txt with last-modified and etag."
-msgstr "Posibles mejoras serían un reemplazo o suplemento a la libreta de direcciones \n(vea %(i2host)sp), o algo sencillo como suscribirse a \nhttp://example.i2p/cgi-bin/recenthosts.cgi en lugar de http://example.i2p/hosts.txt, \npor ejemplo, si hubiera un hipotético recenthosts.cgi desplegado en todos \nlos servidores en las últimas 24 horas, que pudiera ser tanto más eficiente \ncomo más anónimo que el actual hosts.txt con las últimas modificaciones\ny ETag."
+"Possible improvements would be a replacement or supplement to addressbook"
+" (see %(i2host)sp),\n"
+"or something simple like subscribing to http://example.i2p/cgi-"
+"bin/recenthosts.cgi rather than http://example.i2p/hosts.txt.\n"
+"If a hypothetical recenthosts.cgi distributed all hosts from the last 24 "
+"hours, for example,\n"
+"that could be both more efficient and more anonymous than the current "
+"hosts.txt with last-modified and etag."
+msgstr ""
+"Posibles mejoras serían un reemplazo o suplemento a la libreta de "
+"direcciones \n"
+"(vea %(i2host)sp), o algo sencillo "
+"como suscribirse a \n"
+"http://example.i2p/cgi-bin/recenthosts.cgi en lugar de "
+"http://example.i2p/hosts.txt, \n"
+"por ejemplo, si hubiera un hipotético recenthosts.cgi desplegado en todos"
+" \n"
+"los servidores en las últimas 24 horas, que pudiera ser tanto más "
+"eficiente \n"
+"como más anónimo que el actual hosts.txt con las últimas modificaciones\n"
+"y ETag."
#: i2p2www/pages/site/docs/discussions/naming.html:112
#, python-format
@@ -4904,60 +7448,105 @@ msgid ""
"%(url)s.\n"
"This script returns an Etag with a timestamp.\n"
"When a request comes in with the If-None-Match etag,\n"
-"the script ONLY returns new hosts since that timestamp, or 304 Not Modified if there are none.\n"
-"In this way, the script efficiently returns only the hosts the subscriber\n"
+"the script ONLY returns new hosts since that timestamp, or 304 Not "
+"Modified if there are none.\n"
+"In this way, the script efficiently returns only the hosts the subscriber"
+"\n"
"does not know about, in an addressbook-compatible manner."
-msgstr "Una implementación de ejemplo está en stats.i2p en %(url)s.\nEste script devuelve un ETag con marcas de tiempo. Cuando una solicitud \nentra con el ETag If-None-Match (si ninguno coincide), el script SÓLO \ndevuelve nuevos servidores desde esa marca de tiempo, o `304 No Modificado` si no hay ninguno. De esta manera el script devuelve \neficientemente sólo los servidores de los que el suscriptor no tenga \nconocimiento, de una manera compatible-con-la-libreta-de-direcciones."
+msgstr ""
+"Una implementación de ejemplo está en stats.i2p en %(url)s.\n"
+"Este script devuelve un ETag con marcas de tiempo. Cuando una solicitud \n"
+"entra con el ETag If-None-Match (si ninguno coincide), el script SÓLO \n"
+"devuelve nuevos servidores desde esa marca de tiempo, o `304 No "
+"Modificado` si no hay ninguno. De esta manera el script devuelve \n"
+"eficientemente sólo los servidores de los que el suscriptor no tenga \n"
+"conocimiento, de una manera compatible-con-la-libreta-de-direcciones."
#: i2p2www/pages/site/docs/discussions/naming.html:121
msgid ""
-"So the inefficiency is not a big issue and there are several ways to improve things without\n"
+"So the inefficiency is not a big issue and there are several ways to "
+"improve things without\n"
"radical change."
-msgstr "Así que la ineficiencia no es un gran problema y hay varias formas de \nmejorar las cosas sin un cambio radical."
+msgstr ""
+"Así que la ineficiencia no es un gran problema y hay varias formas de \n"
+"mejorar las cosas sin un cambio radical."
#: i2p2www/pages/site/docs/discussions/naming.html:127
msgid ""
"Not Scalable:\n"
"The 400K hosts.txt (with linear search) isn't that big at the moment and\n"
"we can probably grow by 10x or 100x before it's a problem."
-msgstr "No escalable: \nEl fichero hosts.txt de 400KB (con búsqueda lineal) no es tan grande de \nmomento, y probablemente podamos crecer por un factor de 10x o 100x antes de que sea un problema."
+msgstr ""
+"No escalable: \n"
+"El fichero hosts.txt de 400KB (con búsqueda lineal) no es tan grande de \n"
+"momento, y probablemente podamos crecer por un factor de 10x o 100x antes"
+" de que sea un problema."
#: i2p2www/pages/site/docs/discussions/naming.html:132
msgid ""
"As far as network traffic see above.\n"
-"But unless you're going to do a slow real-time query over the network for\n"
-"a key, you need to have the whole set of keys stored locally, at a cost of about 500 bytes per key."
-msgstr "En cuanto al tráfico de red, vea más arriba. Pero a no ser que vaya a hacer una petición a tiempo real lenta sobre la red para obtener una clave, necesita tener todo el grupo de claves almacenadas localmente, con el coste de unos 500 bytes por clave."
+"But unless you're going to do a slow real-time query over the network for"
+"\n"
+"a key, you need to have the whole set of keys stored locally, at a cost "
+"of about 500 bytes per key."
+msgstr ""
+"En cuanto al tráfico de red, vea más arriba. Pero a no ser que vaya a "
+"hacer una petición a tiempo real lenta sobre la red para obtener una "
+"clave, necesita tener todo el grupo de claves almacenadas localmente, con"
+" el coste de unos 500 bytes por clave."
#: i2p2www/pages/site/docs/discussions/naming.html:139
msgid ""
"Requires configuration and \"trust\":\n"
-"Out-of-the-box addressbook is only subscribed to http://www.i2p2.i2p/hosts.txt, which is rarely updated,\n"
+"Out-of-the-box addressbook is only subscribed to "
+"http://www.i2p2.i2p/hosts.txt, which is rarely updated,\n"
"leading to poor new-user experience."
-msgstr "Requiere configuración y \"confianza\": La libreta de direcciones lista para usar sólo está suscrita a http://www.i2p2.i2p/hosts.txt, la cual raramente se actualiza, creando una experiencia pobre para los principiantes."
+msgstr ""
+"Requiere configuración y \"confianza\": La libreta de direcciones "
+"lista para usar sólo está suscrita a http://www.i2p2.i2p/hosts.txt, la "
+"cual raramente se actualiza, creando una experiencia pobre para los "
+"principiantes."
#: i2p2www/pages/site/docs/discussions/naming.html:144
msgid ""
-"This is very much intentional. jrandom wants a user to \"trust\" a hosts.txt\n"
+"This is very much intentional. jrandom wants a user to \"trust\" a "
+"hosts.txt\n"
"provider, and as he likes to say, \"trust is not a boolean\".\n"
-"The configuration step attempts to force users to think about issues of trust in an anonymous network."
-msgstr "Esto es intencionado. jrandom quiere que un usuario \"confíe\" en un proveedor de host.txt, y como a él le gusta decir, \"la confianza no es una variable binaria\". Los pasos de configuración intenta obligar a los usuarios a pensar sobre los problemas de confianza en una red anónima."
+"The configuration step attempts to force users to think about issues of "
+"trust in an anonymous network."
+msgstr ""
+"Esto es intencionado. jrandom quiere que un usuario \"confíe\" en un "
+"proveedor de host.txt, y como a él le gusta decir, \"la confianza no es "
+"una variable binaria\". Los pasos de configuración intenta obligar a los"
+" usuarios a pensar sobre los problemas de confianza en una red anónima."
#: i2p2www/pages/site/docs/discussions/naming.html:149
msgid ""
"As another example, the \"Eepsite Unknown\" error page in the HTTP Proxy\n"
-"lists some jump services, but doesn't \"recommend\" any one in particular,\n"
+"lists some jump services, but doesn't \"recommend\" any one in "
+"particular,\n"
"and it's up to the user to pick one (or not).\n"
-"jrandom would say we trust the listed providers enough to list them but not enough to\n"
+"jrandom would say we trust the listed providers enough to list them but "
+"not enough to\n"
"automatically go fetch the key from them."
-msgstr "Como otro ejemplo, la página de error \"Eepsite Unknown\" en el proxy HTTP muestra algunos servicios de salto, pero no \"recomienda\" ninguno en particular, y es elección del usuario el elegir uno (o no). jramdom diría que confiamos en los proveedores listados suficientemente como para mostrarlos pero no como para obtener la clave de ellos automáticamente."
+msgstr ""
+"Como otro ejemplo, la página de error \"Eepsite Unknown\" en el proxy "
+"HTTP muestra algunos servicios de salto, pero no \"recomienda\" ninguno "
+"en particular, y es elección del usuario el elegir uno (o no). jramdom "
+"diría que confiamos en los proveedores listados suficientemente como para"
+" mostrarlos pero no como para obtener la clave de ellos automáticamente."
#: i2p2www/pages/site/docs/discussions/naming.html:156
msgid ""
"How successful this is, I'm not sure.\n"
"But there must be some sort of hierarchy of trust for the naming system.\n"
"To treat everyone equally may increase the risk of hijacking."
-msgstr "¿Cómo es de exitoso este sistema?. No estoy seguro. Pero tiene que haber algún tipo de jerarquía de confianza en el sistema de nombres/dominios. El tratar a todo el mundo igual puede aumentar el riesgo de secuestro de dominios."
+msgstr ""
+"¿Cómo es de exitoso este sistema?. No estoy seguro. Pero tiene que haber "
+"algún tipo de jerarquía de confianza en el sistema de nombres/dominios. "
+"El tratar a todo el mundo igual puede aumentar el riesgo de secuestro de "
+"dominios."
#: i2p2www/pages/site/docs/discussions/naming.html:163
msgid "It isn't DNS"
@@ -4965,15 +7554,20 @@ msgstr "No es DNS"
#: i2p2www/pages/site/docs/discussions/naming.html:166
msgid ""
-"Unfortunately real-time lookups over i2p would significantly slow down web "
-"browsing."
-msgstr "Desafortunadamente, las búsquedas en tiempo real sobre I2P relentizarían significativamente la navegación web."
+"Unfortunately real-time lookups over i2p would significantly slow down "
+"web browsing."
+msgstr ""
+"Desafortunadamente, las búsquedas en tiempo real sobre I2P relentizarían "
+"significativamente la navegación web."
#: i2p2www/pages/site/docs/discussions/naming.html:169
msgid ""
-"Also, DNS is based on lookups with limited caching and time-to-live, while i2p\n"
+"Also, DNS is based on lookups with limited caching and time-to-live, "
+"while i2p\n"
"keys are permanent."
-msgstr "Además, DNS está basado en búsquedas con caché y tiempo de vida limitados, mientras que las claves de i2p son permanentes. "
+msgstr ""
+"Además, DNS está basado en búsquedas con caché y tiempo de vida "
+"limitados, mientras que las claves de i2p son permanentes. "
#: i2p2www/pages/site/docs/discussions/naming.html:173
msgid "Sure, we could make it work, but why? It's a bad fit."
@@ -4983,31 +7577,52 @@ msgstr "Seguro, podríamos hacerlo funcionar, pero ¿para qué? Sería un mal ap
msgid ""
"Not reliable:\n"
"It depends on specific servers for addressbook subscriptions."
-msgstr "No fiable: Depende de servidores específicos para las suscripciones de la libreta de direcciones."
+msgstr ""
+"No fiable: Depende de servidores específicos para las "
+"suscripciones de la libreta de direcciones."
#: i2p2www/pages/site/docs/discussions/naming.html:182
msgid ""
"Yes it depends on a few servers that you have configured.\n"
"Within i2p, servers and services come and go.\n"
"Any other centralized system (for example DNS root servers) would\n"
-"have the same problem. A completely decentralized system (everybody is authoritative)\n"
-"is possible by implementing an \"everybody is a root DNS server\" solution, or by\n"
-"something even simpler, like a script that adds everybody in your hosts.txt to your addressbook."
-msgstr "Si, depende de los pocos servidores que ha configurado. Dentro de i2p, los servidores y los servicios van y vienen. Cualquier otros sistema centralizado (por ejemplo servidores raíz DNS) tendrían los mismos problemas. Un sistema descentralizado completamente (todo el mundo es una autoridad) es posible implementando una solución tipo \"todo el mundo es un servidor raíz DNS\", o con algo incluso más simple, con un script que añada a todos los que estén en su hosts.txt a su libreta de direcciones."
+"have the same problem. A completely decentralized system (everybody is "
+"authoritative)\n"
+"is possible by implementing an \"everybody is a root DNS server\" "
+"solution, or by\n"
+"something even simpler, like a script that adds everybody in your "
+"hosts.txt to your addressbook."
+msgstr ""
+"Si, depende de los pocos servidores que ha configurado. Dentro de i2p, "
+"los servidores y los servicios van y vienen. Cualquier otros sistema "
+"centralizado (por ejemplo servidores raíz DNS) tendrían los mismos "
+"problemas. Un sistema descentralizado completamente (todo el mundo es una"
+" autoridad) es posible implementando una solución tipo \"todo el mundo es"
+" un servidor raíz DNS\", o con algo incluso más simple, con un script que"
+" añada a todos los que estén en su hosts.txt a su libreta de direcciones."
#: i2p2www/pages/site/docs/discussions/naming.html:190
msgid ""
-"People advocating all-authoritative solutions generally haven't thought through\n"
+"People advocating all-authoritative solutions generally haven't thought "
+"through\n"
"the issues of conflicts and hijacking, however."
-msgstr "La gente que defiende la solución de todos-son-autoridad generalmente no han pensado en los conflictos y en los secuestros de dominios."
+msgstr ""
+"La gente que defiende la solución de todos-son-autoridad generalmente no "
+"han pensado en los conflictos y en los secuestros de dominios."
#: i2p2www/pages/site/docs/discussions/naming.html:196
msgid ""
"Awkward, not real-time:\n"
-"It's a patchwork of hosts.txt providers, key-add web form providers, jump service providers,\n"
+"It's a patchwork of hosts.txt providers, key-add web form providers, jump"
+" service providers,\n"
"eepsite status reporters.\n"
"Jump servers and subscriptions are a pain, it should just work like DNS."
-msgstr "Embarazoso, no es en tiempo real: Es un lío de proveedores de hosts.txt, proveedores de formularios webs para el añadido de claves, proveedores de saltos, webs con el estado de las eepsites. Los servicios de saltos y las suscripciones son molestos, debería simplemente funcionar, al igual que los DNS."
+msgstr ""
+"Embarazoso, no es en tiempo real: Es un lío de proveedores de "
+"hosts.txt, proveedores de formularios webs para el añadido de claves, "
+"proveedores de saltos, webs con el estado de las eepsites. Los servicios "
+"de saltos y las suscripciones son molestos, debería simplemente "
+"funcionar, al igual que los DNS."
#: i2p2www/pages/site/docs/discussions/naming.html:202
msgid "See the reliability and trust sections."
@@ -5015,9 +7630,13 @@ msgstr "Vea las secciones de confianza y seguridad."
#: i2p2www/pages/site/docs/discussions/naming.html:207
msgid ""
-"So, in summary, the current system is not horribly broken, inefficient, or un-scalable,\n"
+"So, in summary, the current system is not horribly broken, inefficient, "
+"or un-scalable,\n"
"and proposals to \"just use DNS\" aren't well thought-through."
-msgstr "En resumen, el sistema actual no está terriblemente roto, no es ineficiente, o no es escalable, y las propuestas de \"simplemente usemos DNS\" no están bien pensadas."
+msgstr ""
+"En resumen, el sistema actual no está terriblemente roto, no es "
+"ineficiente, o no es escalable, y las propuestas de \"simplemente usemos "
+"DNS\" no están bien pensadas."
#: i2p2www/pages/site/docs/discussions/naming.html:212
msgid "Alternatives"
@@ -5025,21 +7644,29 @@ msgstr "Alternativas"
#: i2p2www/pages/site/docs/discussions/naming.html:213
msgid ""
-"The I2P source contains several pluggable naming systems and supports configuration options\n"
+"The I2P source contains several pluggable naming systems and supports "
+"configuration options\n"
"to enable experimentation with naming systems."
-msgstr "El código de I2P contiene varios sistemas de dominios listos para enchufar, y soporta opciones de configuración para permitir experimentar con sistemas de nombres."
+msgstr ""
+"El código de I2P contiene varios sistemas de dominios listos para "
+"enchufar, y soporta opciones de configuración para permitir experimentar "
+"con sistemas de nombres."
#: i2p2www/pages/site/docs/discussions/naming.html:218
msgid ""
"Meta - calls two or more other naming systems in order.\n"
"By default, calls PetName then HostsTxt."
-msgstr "Meta - llama a uno o más sistemas de nombres en orden. Por defecto llama a PetName y después a Hosts Txt."
+msgstr ""
+"Meta - llama a uno o más sistemas de nombres en orden. Por defecto"
+" llama a PetName y después a Hosts Txt."
#: i2p2www/pages/site/docs/discussions/naming.html:222
msgid ""
"PetName - Looks up in a petnames.txt file.\n"
"The format for this file is NOT the same as hosts.txt."
-msgstr "PetName - busca en el archivo petnames.txt. El formato de este archivo NO es el mismo que el de "
+msgstr ""
+"PetName - busca en el archivo petnames.txt. El formato de este "
+"archivo NO es el mismo que el de "
#: i2p2www/pages/site/docs/discussions/naming.html:226
msgid "HostsTxt - Looks up in the following files, in order:"
@@ -5047,9 +7674,11 @@ msgstr "HostsTxt - Busca en los siguentes archivos en orden:"
#: i2p2www/pages/site/docs/discussions/naming.html:234
msgid ""
-"AddressDB - Each host is listed in a separate file in a addressDb/ "
-"directory."
-msgstr "AddressDB - Cada host es listado en un archivo separado en el directorio addressDb/."
+"AddressDB - Each host is listed in a separate file in a addressDb/"
+" directory."
+msgstr ""
+"AddressDB - Cada host es listado en un archivo separado en el "
+"directorio addressDb/."
#: i2p2www/pages/site/docs/discussions/naming.html:237
msgid ""
@@ -5057,7 +7686,10 @@ msgid ""
"server - must be stacked after the HostsTxt lookup with Meta.\n"
"This could augment or replace the jump system.\n"
"Includes in-memory caching."
-msgstr "Eepget - hace una búsqueda HTTP en un servidor externo - debe ser usado después de la búsqueda en HostsTxt con Meta. Esto puede aumentar o reemplazar al sistema de saltos. Incluye cacheado en-memoria."
+msgstr ""
+"Eepget - hace una búsqueda HTTP en un servidor externo - debe ser "
+"usado después de la búsqueda en HostsTxt con Meta. Esto puede aumentar o "
+"reemplazar al sistema de saltos. Incluye cacheado en-memoria."
#: i2p2www/pages/site/docs/discussions/naming.html:243
msgid ""
@@ -5065,25 +7697,40 @@ msgid ""
"additional experimentation in lookup schemes, independent of java.\n"
"Can be used after HostsTxt or as the sole naming system.\n"
"Includes in-memory caching."
-msgstr "Exec - llama a un programa externo para las búsquedas, permite experimentación adicional en los esquemas de búsquedas, independientemente de java. Puede ser usado después de HostsTxt o como un sistema de nombres en solitario. Incluye caché en-memoria."
+msgstr ""
+"Exec - llama a un programa externo para las búsquedas, permite "
+"experimentación adicional en los esquemas de búsquedas, "
+"independientemente de java. Puede ser usado después de HostsTxt o como un"
+" sistema de nombres en solitario. Incluye caché en-memoria."
#: i2p2www/pages/site/docs/discussions/naming.html:249
msgid "Dummy - used as a fallback for Base64 names, otherwise fails."
-msgstr "Dummy - usado como apoyo para los nombres BAse64, do otra forma falla."
+msgstr ""
+"Dummy - usado como apoyo para los nombres BAse64, do otra forma "
+"falla."
#: i2p2www/pages/site/docs/discussions/naming.html:253
msgid ""
-"The current naming system can be changed with the advanced config option 'i2p.naming.impl'\n"
+"The current naming system can be changed with the advanced config option "
+"'i2p.naming.impl'\n"
"(restart required).\n"
"See core/java/src/net/i2p/client/naming for details."
-msgstr "El sistema actual de dominios puede ser cambiado en la configuración avanzada 'i2p.naming.impl' (se necesita reiniciar). Vea core/java/src/net/i2p/client/naming para más detalles."
+msgstr ""
+"El sistema actual de dominios puede ser cambiado en la configuración "
+"avanzada 'i2p.naming.impl' (se necesita reiniciar). Vea "
+"core/java/src/net/i2p/client/naming para más detalles."
#: i2p2www/pages/site/docs/discussions/naming.html:258
msgid ""
"Any new system should be stacked with HostsTxt, or should\n"
-"implement local storage and/or the addressbook subscription functions, since addressbook\n"
+"implement local storage and/or the addressbook subscription functions, "
+"since addressbook\n"
"only knows about the hosts.txt files and format."
-msgstr "Cualquier sistema nuevo debería usarse con HostsTxt, o debería implementar almacenamiento local o/y las funciones de suscripción de la libreta de direcciones, ya que la libreta de direcciones sólo conoce el archivo hosts.txt y su formato."
+msgstr ""
+"Cualquier sistema nuevo debería usarse con HostsTxt, o debería "
+"implementar almacenamiento local o/y las funciones de suscripción de la "
+"libreta de direcciones, ya que la libreta de direcciones sólo conoce el "
+"archivo hosts.txt y su formato."
#: i2p2www/pages/site/docs/discussions/naming.html:264
msgid "Certificates"
@@ -5091,42 +7738,73 @@ msgstr "Certificados"
#: i2p2www/pages/site/docs/discussions/naming.html:265
msgid ""
-"I2P destinations contain a certificate, however at the moment that certificate\n"
+"I2P destinations contain a certificate, however at the moment that "
+"certificate\n"
"is always null.\n"
-"With a null certificate, base64 destinations are always 516 bytes ending in \"AAAA\",\n"
-"and this is checked in the addressbook merge mechanism, and possibly other places.\n"
-"Also, there is no method available to generate a certificate or add it to a\n"
+"With a null certificate, base64 destinations are always 516 bytes ending "
+"in \"AAAA\",\n"
+"and this is checked in the addressbook merge mechanism, and possibly "
+"other places.\n"
+"Also, there is no method available to generate a certificate or add it to"
+" a\n"
"destination. So these will have to be updated to implement certificates."
-msgstr "Las destinaciones I2P contiene un certificado, aunque hasta el momento ese certificado es siempre vacío, null. Con un certificado nulo, las destinaciones base64 son siempre de 516 bytes y terminan en \"AAAA\", y esto es comprobado en el mecanismo de unión de la libreta de direcciones, y posiblemente en otros sitios. Además, no hay ningún método disponible para generar un certificado o añadirlo a la destinación. Con lo que este debe ser actualizado para implementar los certificados."
+msgstr ""
+"Las destinaciones I2P contiene un certificado, aunque hasta el momento "
+"ese certificado es siempre vacío, null. Con un certificado nulo, las "
+"destinaciones base64 son siempre de 516 bytes y terminan en \"AAAA\", y "
+"esto es comprobado en el mecanismo de unión de la libreta de direcciones,"
+" y posiblemente en otros sitios. Además, no hay ningún método disponible "
+"para generar un certificado o añadirlo a la destinación. Con lo que este "
+"debe ser actualizado para implementar los certificados."
#: i2p2www/pages/site/docs/discussions/naming.html:273
#, python-format
msgid ""
-"One possible use of certificates is for proof "
-"of work."
-msgstr "Un posible uso para los certificados sería para la prueba de trabajo."
+"One possible use of certificates is for proof of work."
+msgstr ""
+"Un posible uso para los certificados sería para la prueba de trabajo."
#: i2p2www/pages/site/docs/discussions/naming.html:276
msgid ""
-"Another is for \"subdomains\" (in quotes because there is really no such thing,\n"
-"i2p uses a flat naming system) to be signed by the 2nd level domain's keys."
-msgstr "Otro es para que los \"subdominios\" (entre comillas porque realmente no existe tal cosa, I2P utiliza un sistema de dominios plano) sean firmados por las claves de dominio de segundo nivel ."
+"Another is for \"subdomains\" (in quotes because there is really no such "
+"thing,\n"
+"i2p uses a flat naming system) to be signed by the 2nd level domain's "
+"keys."
+msgstr ""
+"Otro es para que los \"subdominios\" (entre comillas porque realmente no "
+"existe tal cosa, I2P utiliza un sistema de dominios plano) sean firmados "
+"por las claves de dominio de segundo nivel ."
#: i2p2www/pages/site/docs/discussions/naming.html:280
msgid ""
-"With any certificate implementation must come the method for verifying the\n"
+"With any certificate implementation must come the method for verifying "
+"the\n"
"certificates.\n"
"Presumably this would happen in the addressbook merge code.\n"
-"Is there a method for multiple types of certificates, or multiple certificates?"
-msgstr "Con cualquier tipo de implementación de certificados tiene que venir algún método para verificar los certificados. Probablemente esto debería en al código de unión de la libreta de direcciones. ¿Hay un método para múltiples tipos de certificados, o múltiples certificados?"
+"Is there a method for multiple types of certificates, or multiple "
+"certificates?"
+msgstr ""
+"Con cualquier tipo de implementación de certificados tiene que venir "
+"algún método para verificar los certificados. Probablemente esto debería "
+"en al código de unión de la libreta de direcciones. ¿Hay un método para "
+"múltiples tipos de certificados, o múltiples certificados?"
#: i2p2www/pages/site/docs/discussions/naming.html:286
msgid ""
"Adding on a certificate authenticating the\n"
-"responses as signed by some centralized certificate authority would address many of\n"
-"the hostile nameserver issues but would leave open replay attacks as well as \n"
+"responses as signed by some centralized certificate authority would "
+"address many of\n"
+"the hostile nameserver issues but would leave open replay attacks as well"
+" as \n"
"hostile certificate authority attacks."
-msgstr "Añadiendo sobre un certificado, autentificando la respuesta como firmada por alguna autoridad certificada centralizada podría solucionar muchos de los problemas con los servidores de nombres hostiles, pero lo dejaría abierto a ataques de respuesta, al igual que a los ataques desde una autoridad de certificados hostil."
+msgstr ""
+"Añadiendo sobre un certificado, autentificando la respuesta como firmada "
+"por alguna autoridad certificada centralizada podría solucionar muchos de"
+" los problemas con los servidores de nombres hostiles, pero lo dejaría "
+"abierto a ataques de respuesta, al igual que a los ataques desde una "
+"autoridad de certificados hostil."
#: i2p2www/pages/site/docs/how/cryptography.html:2
msgid "Low-level Cryptography Details"
@@ -5139,14 +7817,31 @@ msgstr "Esta página especifica los detalles de bajo nivel de los cifrados en I2
#: i2p2www/pages/site/docs/how/cryptography.html:10
#, python-format
msgid ""
-"There are a handful of cryptographic algorithms in use within I2P, but we have\n"
-"reduced them to a bare minimum to deal with our needs - one symmetric algorithm\n"
-"one asymmetric algorithm, one signing algorithm, and one hashing algorithm. However, \n"
-"we do combine them in some particular ways to provide message integrity (rather than\n"
-"relying on a MAC). In addition, as much as we hate doing anything new in regards to \n"
-"cryptography, we can't seem to find a reference discussing (or even naming) the \n"
-"technique used in ElGamal/AES+SessionTag (but we're sure others have done it)."
-msgstr "Hay bastantes algoritmos de cifrado en uso dentro de I2P, pero los hemos reducido al mínimo para ajustarse a nuestras necesidades - un cifrado simétrico, un cifrado asimétrico, un algoritmo de firma y un algoritmo de hashing. Sin embargo, los combinamos de forma especial para proporcionar integridad en los mensajes (en vez de depender de una MAC). Además, y aunque odiamos el crear cosas nuevas en los que se refiere a cifrados, no hemos podido encontrar ninguna referencia discutiendo (o incluso nombrando) la técnica usada en el ElGamal/AES+SessionTag (pero estamos seguros que otros ya lo han usado)."
+"There are a handful of cryptographic algorithms in use within I2P, but we"
+" have\n"
+"reduced them to a bare minimum to deal with our needs - one symmetric "
+"algorithm\n"
+"one asymmetric algorithm, one signing algorithm, and one hashing "
+"algorithm. However, \n"
+"we do combine them in some particular ways to provide message integrity "
+"(rather than\n"
+"relying on a MAC). In addition, as much as we hate doing anything new in"
+" regards to \n"
+"cryptography, we can't seem to find a reference discussing (or even "
+"naming) the \n"
+"technique used in ElGamal/AES+SessionTag "
+"(but we're sure others have done it)."
+msgstr ""
+"Hay bastantes algoritmos de cifrado en uso dentro de I2P, pero los hemos "
+"reducido al mínimo para ajustarse a nuestras necesidades - un cifrado "
+"simétrico, un cifrado asimétrico, un algoritmo de firma y un algoritmo de"
+" hashing. Sin embargo, los combinamos de forma especial para proporcionar"
+" integridad en los mensajes (en vez de depender de una MAC). Además, y "
+"aunque odiamos el crear cosas nuevas en los que se refiere a cifrados, no"
+" hemos podido encontrar ninguna referencia discutiendo (o incluso "
+"nombrando) la técnica usada en el ElGamal/AES+SessionTag (pero estamos seguros "
+"que otros ya lo han usado)."
#: i2p2www/pages/site/docs/how/cryptography.html:20
msgid "ElGamal encryption"
@@ -5157,37 +7852,60 @@ msgid ""
"\n"
"ElGamal is used for asymmetric encryption.\n"
"ElGamal is used in several places in I2P:"
-msgstr "\nElGamal es usado para el cifrado asimétrico. ElGamal es usado en varios sitios de I2P."
+msgstr ""
+"\n"
+"ElGamal es usado para el cifrado asimétrico. ElGamal es usado en varios "
+"sitios de I2P."
#: i2p2www/pages/site/docs/how/cryptography.html:27
#, python-format
msgid ""
"To encrypt router-to-router Tunnel Build "
"Messages"
-msgstr "Para cifrar los mensajes de creación de túnel de ruter a ruter."
+msgstr ""
+"Para cifrar los mensajes de creación de "
+"túnel de ruter a ruter."
#: i2p2www/pages/site/docs/how/cryptography.html:30
#, python-format
msgid ""
-"For end-to-end (destination-to-destination) encryption as a part of ElGamal/AES+SessionTag\n"
-"using the encryption key in the LeaseSet"
-msgstr "Para el cifrado de fin a fin (destinación a destinación) como parte de ElGamal/AES+SessionTag usando la clave de cifrado en el LeaseSet"
+"For end-to-end (destination-to-destination) encryption as a part of ElGamal/AES+SessionTag\n"
+"using the encryption key in the LeaseSet"
+msgstr ""
+"Para el cifrado de fin a fin (destinación a destinación) como parte de "
+"ElGamal/AES+SessionTag usando la clave de "
+"cifrado en el LeaseSet"
#: i2p2www/pages/site/docs/how/cryptography.html:34
#: i2p2www/pages/site/docs/how/cryptography.html:198
#, python-format
msgid ""
-"For encryption of some netDb stores and queries sent to floodfill routers\n"
+"For encryption of some netDb stores and "
+"queries sent to floodfill routers\n"
"as a part of ElGamal/AES+SessionTag\n"
"(destination-to-router or router-to-router)."
-msgstr "Para el cifrado de algunos almacenamientos en la netDb y peticiones enviadas a los ruters floodfill como parte de ElGamal/AES+SessionTag (destinación a ruter o ruter a ruter)"
+msgstr ""
+"Para el cifrado de algunos almacenamientos"
+" en la netDb y peticiones enviadas a los ruters floodfill como parte "
+"de ElGamal/AES+SessionTag (destinación a "
+"ruter o ruter a ruter)"
#: i2p2www/pages/site/docs/how/cryptography.html:41
msgid ""
-"We use common primes for 2048 ElGamal encryption and decryption, as given by IETF RFC-3526.\n"
-"We currently only use ElGamal to encrypt the IV and session key in a single block, followed by the \n"
+"We use common primes for 2048 ElGamal encryption and decryption, as given"
+" by IETF RFC-3526.\n"
+"We currently only use ElGamal to encrypt the IV and session key in a "
+"single block, followed by the \n"
"AES encrypted payload using that key and IV."
-msgstr "Usamos primos comunes para el cifrado y descifrado de ElGamal 2048, como se indica en IETF RFC-3526. Actualmente sólo usamos ELGamal para cifrar el IV y la clave de sesión en un solo bloque, seguido por el payload cifrado AES usando la clave y el IV."
+msgstr ""
+"Usamos primos comunes para el cifrado y descifrado de ElGamal 2048, como "
+"se indica en IETF "
+"RFC-3526. Actualmente sólo usamos ELGamal para cifrar el IV y la "
+"clave de sesión en un solo bloque, seguido por el payload cifrado AES "
+"usando la clave y el IV."
#: i2p2www/pages/site/docs/how/cryptography.html:47
msgid "The unencrypted ElGamal contains:"
@@ -5195,16 +7913,26 @@ msgstr "ElGamal sin cifrar contiene: "
#: i2p2www/pages/site/docs/how/cryptography.html:64
msgid ""
-"The H(data) is the SHA256 of the data that is encrypted in the ElGamal block,\n"
+"The H(data) is the SHA256 of the data that is encrypted in the ElGamal "
+"block,\n"
"and is preceded by a nonzero byte. \n"
"This byte could be random, but as implemented it is always 0xFF.\n"
"It could possibly be used for flags in the future.\n"
"The data encrypted in the block may be up to 222 bytes long.\n"
"As the encrypted data may contain a substantial number of zeros if the\n"
-"cleartext is smaller than 222 bytes, it is recommended that higher layers pad\n"
+"cleartext is smaller than 222 bytes, it is recommended that higher layers"
+" pad\n"
"the cleartext to 222 bytes with random data.\n"
"Total length: typically 255 bytes."
-msgstr "La H(datos) es el SHA256 de los datos cifrados en al bloque ElGamal, y es precedido por un byte distinto de cero. El byte puede ser aleatorio, pero como está implementado es siempre 0xFF. Podría usarse en el futuro para las banderas. Los datos cifrados en el bloque pueden ser de hasta 222 bytes de largo. Ya que los datos cifrados pueden contener un gran número de ceros si el texto en plano es menor de 222 bytes, se recomienda que las capas superiores rellenen el texto en plano con datos aleatorios hasta los 222 bytes. Tamaño total: normalmente 255 bytes."
+msgstr ""
+"La H(datos) es el SHA256 de los datos cifrados en al bloque ElGamal, y es"
+" precedido por un byte distinto de cero. El byte puede ser aleatorio, "
+"pero como está implementado es siempre 0xFF. Podría usarse en el futuro "
+"para las banderas. Los datos cifrados en el bloque pueden ser de hasta "
+"222 bytes de largo. Ya que los datos cifrados pueden contener un gran "
+"número de ceros si el texto en plano es menor de 222 bytes, se recomienda"
+" que las capas superiores rellenen el texto en plano con datos aleatorios"
+" hasta los 222 bytes. Tamaño total: normalmente 255 bytes."
#: i2p2www/pages/site/docs/how/cryptography.html:76
msgid "The encrypted ElGamal contains:"
@@ -5212,13 +7940,19 @@ msgstr "El cifrado ElGamal contiene:"
#: i2p2www/pages/site/docs/how/cryptography.html:102
msgid ""
-"Each encrypted part is prepended with zeros to a size of exactly 257 bytes.\n"
+"Each encrypted part is prepended with zeros to a size of exactly 257 "
+"bytes.\n"
"Total length: 514 bytes.\n"
"In typical usage, higher layers pad the cleartext data to 222 bytes,\n"
"resulting in an unencrypted block of 255 bytes.\n"
"This is encoded as two 256-byte encrypted parts,\n"
"and there is a single byte of zero padding before each part at this layer."
-msgstr "Cada parte cifrada es precedida con ceros hasta el tamaño de 257 bytes. Tamaño total: 514 bytes. En un uso normal, las capas superiores colocan el texto en plano hasta los 222 bytes, resultando en un bloque no cifrado de 255 bytes. Esto es codificado como dos partes cifradas de 256 bytes, y hay un solo byte cero de relleno antes de cada parte de esta capa."
+msgstr ""
+"Cada parte cifrada es precedida con ceros hasta el tamaño de 257 bytes. "
+"Tamaño total: 514 bytes. En un uso normal, las capas superiores colocan "
+"el texto en plano hasta los 222 bytes, resultando en un bloque no cifrado"
+" de 255 bytes. Esto es codificado como dos partes cifradas de 256 bytes, "
+"y hay un solo byte cero de relleno antes de cada parte de esta capa."
#: i2p2www/pages/site/docs/how/cryptography.html:111
#, python-format
@@ -5228,8 +7962,12 @@ msgstr "Vea el código ElGamal."
#: i2p2www/pages/site/docs/how/cryptography.html:115
msgid ""
"The shared prime is the \n"
-"[Oakley prime for 2048 bit keys]"
-msgstr "El primo compartido es el [primo Oakley para las claves de 2048 bits]"
+"[Oakley prime "
+"for 2048 bit keys]"
+msgstr ""
+"El primo compartido es el [primo Oakley para "
+"las claves de 2048 bits]"
#: i2p2www/pages/site/docs/how/cryptography.html:122
msgid "or as a hexadecimal value:"
@@ -5250,34 +7988,71 @@ msgid ""
"PrivateKey\n"
"is a full 256 bytes, in some cases\n"
"we use the short exponent size of 226 bits (28.25 bytes)."
-msgstr "Aunque el tamaño de exponente estándar es de 2048 bits (256 bytes) y la \nPrivateKey (clave privada) de I2P ocupa los 256 bytes completos, en \nalgunos casos usamos el tamaño de exponente corto de 226 bits (28,25 bytes)."
+msgstr ""
+"Aunque el tamaño de exponente estándar es de 2048 bits (256 bytes) y la \n"
+"PrivateKey (clave "
+"privada) de I2P ocupa los 256 bytes completos, en \n"
+"algunos casos usamos el tamaño de exponente corto de 226 bits (28,25 "
+"bytes)."
#: i2p2www/pages/site/docs/how/cryptography.html:150
#, python-format
msgid ""
"This should be safe for use with the Oakley primes, per\n"
-"On Diffie-Hellman Key Agreement with Short Exponents - van Oorschot, Weiner\n"
-"at EuroCrypt 96, and crypto++'s benchmarks.\n"
-"Benchmarks originally at this link, now dead,\n"
-"rescued from the wayback machine, dated Apr 23, 2008."
-msgstr "Esto debería ser seguro para el uso con los (números) primos Oakley, por (el algoritmo) \nOn Diffie-Hellman Key Agreement with Short Exponents - van Oorschot, Weiner \nen EuroCrypt 96, y por los resultados de los test de rendimiento de crypto++. \nResultados de tests de rendimiento que estaban originalmente en este enlace, \nque ahora está muerto, rescatado desde la wayback machine \n(máquina del tiempo), con fecha 23 de abril de 2008."
+"On Diffie-Hellman Key Agreement with Short Exponents "
+"- van Oorschot, Weiner\n"
+"at EuroCrypt 96, and crypto++'s "
+"benchmarks.\n"
+"Benchmarks originally at this link, now dead,\n"
+"rescued from the wayback machine,"
+" dated Apr 23, 2008."
+msgstr ""
+"Esto debería ser seguro para el uso con los (números) primos Oakley, por "
+"(el algoritmo) \n"
+"On Diffie-Hellman Key Agreement with Short Exponents "
+"- van Oorschot, Weiner \n"
+"en EuroCrypt 96, y por los resultados de los "
+"test de rendimiento de crypto++. \n"
+"Resultados de tests de rendimiento que estaban originalmente en este enlace, \n"
+"que ahora está muerto, rescatado desde la wayback machine \n"
+"(máquina del tiempo), con fecha 23 de abril de 2008."
#: i2p2www/pages/site/docs/how/cryptography.html:160
#, python-format
msgid ""
-"Also, Koshiba & Kurosawa: Short Exponent Diffie-Hellman Problems (PKC 2004, LNCS 2947, pp. 173-186)\n"
-"(full text on Google Books) apparently supports this, according to\n"
+"Also, Koshiba & Kurosawa: Short Exponent Diffie-"
+"Hellman Problems (PKC 2004, LNCS 2947, pp. 173-186)\n"
+"(full text on Google Books) apparently "
+"supports this, according to\n"
"this sci.crypt thread.\n"
"The remainder of the PrivateKey is padded with zeroes."
-msgstr "También Koshiba & Kurosawa: Short Exponent Diffie-Hellman Problems (PKC 2004, LNCS 2947, pp. 173-186) (texto completo en Google Books) aparentemente los soporta, de acuerdo con este hilo sci.crypt. El resultado del PrivateKey es rellenado con ceros."
+msgstr ""
+"También Koshiba & Kurosawa: Short Exponent "
+"Diffie-Hellman Problems (PKC 2004, LNCS 2947, pp. 173-186) (texto completo en Google Books) aparentemente "
+"los soporta, de acuerdo con este hilo "
+"sci.crypt. El resultado del PrivateKey es rellenado con ceros."
#: i2p2www/pages/site/docs/how/cryptography.html:169
msgid ""
"Prior to release 0.9.8, all routers used the short exponent.\n"
"As of release 0.9.8, 64-bit x86 routers use a full 2048-bit exponent.\n"
-"Other routers continue to use the short exponent due to concerns about processor load.\n"
-"The transition to a longer exponent for these platforms is a topic for further study."
-msgstr "Anteriormente a la versión 0.9.8, todos los routers I2P usaban el exponente corto. \nDesde la versión 0.9.8, los routers I2P para 64-bit x86 usan un exponente completo de 2048-bits. \nOtros routers I2P continuan usando el exponente corto debido a las preocupaciones por la carga del procesador. \nLa traducción a un exponente más largo para estas plataformas es un asunto para un estudio más concienzudo."
+"Other routers continue to use the short exponent due to concerns about "
+"processor load.\n"
+"The transition to a longer exponent for these platforms is a topic for "
+"further study."
+msgstr ""
+"Anteriormente a la versión 0.9.8, todos los routers I2P usaban el "
+"exponente corto. \n"
+"Desde la versión 0.9.8, los routers I2P para 64-bit x86 usan un exponente"
+" completo de 2048-bits. \n"
+"Otros routers I2P continuan usando el exponente corto debido a las "
+"preocupaciones por la carga del procesador. \n"
+"La traducción a un exponente más largo para estas plataformas es un "
+"asunto para un estudio más concienzudo."
#: i2p2www/pages/site/docs/how/cryptography.html:176
#: i2p2www/pages/site/docs/how/cryptography.html:273
@@ -5288,9 +8063,13 @@ msgstr "Obsolescencia "
#: i2p2www/pages/site/docs/how/cryptography.html:177
msgid ""
-"The vulnerability of the network to an ElGamal attack and the impact of transitioning to a longer bit length is to be studied.\n"
+"The vulnerability of the network to an ElGamal attack and the impact of "
+"transitioning to a longer bit length is to be studied.\n"
"It may be quite difficult to make any change backward-compatible."
-msgstr "Las vulnerabilidades de la red a un ataque ElGamal y el impacto de una transición a un tamaño mayor no han sido aún estudiados. Podría ser muy difícil hacer cambios que fuesen compatibles hacia atrás. "
+msgstr ""
+"Las vulnerabilidades de la red a un ataque ElGamal y el impacto de una "
+"transición a un tamaño mayor no han sido aún estudiados. Podría ser muy "
+"difícil hacer cambios que fuesen compatibles hacia atrás. "
#: i2p2www/pages/site/docs/how/cryptography.html:185
msgid "AES is used for symmetric encryption, in several cases:"
@@ -5298,38 +8077,63 @@ msgstr "AES es utilizado para el cifrado simétrico en varios casos:"
#: i2p2www/pages/site/docs/how/cryptography.html:190
msgid "For transport encryption after DH key exchange"
-msgstr "Para el cifrado de transporte después del intercambio de la clave DH."
+msgstr ""
+"Para el cifrado de transporte después del "
+"intercambio de la clave DH."
#: i2p2www/pages/site/docs/how/cryptography.html:194
#, python-format
msgid ""
"For end-to-end (destination-to-destination) encryption as a part of ElGamal/AES+SessionTag"
-msgstr "Para los cifrados de fin a fin (destinación a destinación) como parte de ElGamal/AES+SessionTag"
+msgstr ""
+"Para los cifrados de fin a fin (destinación a destinación) como parte de "
+"ElGamal/AES+SessionTag"
#: i2p2www/pages/site/docs/how/cryptography.html:204
#, python-format
msgid ""
-"For encryption of periodic tunnel test"
-" messages sent from the router to itself, through its own tunnels."
-msgstr "Para el cifrado de los mensajes periódicos de pruebas de túnel, enviado desde un ruter a sí mismo a través de sus propios túneles."
+"For encryption of periodic tunnel "
+"test messages sent from the router to itself, through its own "
+"tunnels."
+msgstr ""
+"Para el cifrado de los mensajes "
+"periódicos de pruebas de túnel, enviado desde un ruter a sí mismo a "
+"través de sus propios túneles."
#: i2p2www/pages/site/docs/how/cryptography.html:209
#, python-format
msgid ""
"We use AES with 256 bit keys and 128 bit blocks in CBC mode.\n"
-"The padding used is specified in IETF RFC-2313 (PKCS#5 1.5, section 8.1 (for block type 02)).\n"
-"In this case, padding exists of pseudorandomly generated octets to match 16 byte blocks.\n"
-"Specifically, see [the CBC code] and the Cryptix AES\n"
-"[implementation], as well as the padding, found in the\n"
+"The padding used is specified in IETF RFC-2313 "
+"(PKCS#5 1.5, section 8.1 (for block type 02)).\n"
+"In this case, padding exists of pseudorandomly generated octets to match "
+"16 byte blocks.\n"
+"Specifically, see [the CBC code] and the "
+"Cryptix AES\n"
+"[implementation], as well as the padding, found"
+" in the\n"
"ElGamalAESEngine.getPadding function."
-msgstr "Usamos AES con claves de 256 bytes y con bloques de 128 bits en modo CBC. El rellenado usado está especificado en IETF RFC-2313 (PKCS#5 1.5, sección 8.1 (para bloques de tipo 02)). En este caso, el relleno es creado aleatoriamente en octetos para ajustarse a los bloques de 16 bytes. Específicamente vea [the CBC code] y el Cryptix AES [implementación], al igual que el relleno encontrado en la función ElGamalAESEngine.getPadding."
+msgstr ""
+"Usamos AES con claves de 256 bytes y con bloques de 128 bits en modo CBC."
+" El rellenado usado está especificado en IETF "
+"RFC-2313 (PKCS#5 1.5, sección 8.1 (para bloques de tipo 02)). En este"
+" caso, el relleno es creado aleatoriamente en octetos para ajustarse a "
+"los bloques de 16 bytes. Específicamente vea [the "
+"CBC code] y el Cryptix AES [implementación], al igual que el relleno "
+"encontrado en la función ElGamalAESEngine.getPadding."
#: i2p2www/pages/site/docs/how/cryptography.html:274
msgid ""
-"The vulnerability of the network to an AES attack and the impact of transitioning to a longer bit length is to be studied.\n"
+"The vulnerability of the network to an AES attack and the impact of "
+"transitioning to a longer bit length is to be studied.\n"
"It may be quite difficult to make any change backward-compatible."
-msgstr "Las vulnerabilidades de la red a un ataque AES y el impacto del cambio a unas clave más grande no han sido estudiados aún. Podría ser realmente difícil hacer cambios que fuesen compatibles hacia atrás."
+msgstr ""
+"Las vulnerabilidades de la red a un ataque AES y el impacto del cambio a "
+"unas clave más grande no han sido estudiados aún. Podría ser realmente "
+"difícil hacer cambios que fuesen compatibles hacia atrás."
#: i2p2www/pages/site/docs/how/cryptography.html:279
#: i2p2www/pages/site/docs/how/cryptography.html:371
@@ -5352,38 +8156,62 @@ msgstr "Firmas digitales"
msgid ""
"DSA is the default signature algorithm, but we are in the process of "
"migrating to more secure algorithms. See below."
-msgstr "DSA es el algoritmo de firma predeterminado, pero estamos en proceso de migrar a algoritmos más seguros. Mire debajo."
+msgstr ""
+"DSA es el algoritmo de firma predeterminado, pero estamos en proceso de "
+"migrar a algoritmos más seguros. Mire debajo."
#: i2p2www/pages/site/docs/how/cryptography.html:295
#, python-format
msgid ""
-"Signatures are generated and verified with 1024 bit DSA (L=1024, N=160), as implemented in\n"
+"Signatures are generated and verified with 1024 bit DSA (L=1024, N=160), "
+"as implemented in\n"
"[DSAEngine].\n"
"DSA was chosen because it is much faster for signatures than ElGamal."
-msgstr "Las firmas son generadas y verificadas con DSA de 1024 bits (L=1024, N=160), al igual que está implementado en [DSAEngine]. DSA fue escogida porque es mucho más rápida para firmar que ElGamal."
+msgstr ""
+"Las firmas son generadas y verificadas con DSA de 1024 bits (L=1024, "
+"N=160), al igual que está implementado en [DSAEngine]. DSA fue escogida porque es mucho más "
+"rápida para firmar que ElGamal."
#: i2p2www/pages/site/docs/how/cryptography.html:350
#, python-format
msgid ""
-"The Signing Public Key is 1024 bits.\n"
-"The Signing Private Key is 160 bits."
-msgstr "La clave pública de firma es de 1024 bits. La clave privada de firma es de 160 bits."
+"The Signing Public"
+" Key is 1024 bits.\n"
+"The Signing "
+"Private Key is 160 bits."
+msgstr ""
+"La clave pública "
+"de firma es de 1024 bits. La clave privada de "
+"firma es de 160 bits."
#: i2p2www/pages/site/docs/how/cryptography.html:357
#, python-format
msgid ""
"NIST 800-57\n"
"recommends a minimum of (L=2048, N=224) for usage beyond 2010.\n"
-"This may be mitigated somewhat by the \"cryptoperiod\", or lifespan of a given key."
-msgstr "NIST 800-57 recomienda un mínimo de (L=2048, N=224) para su uso más allá del 2010. Esto puede mitigarse de alguna forma con el \"cryptoperiod\", o tiempo de vida dado a una clave."
+"This may be mitigated somewhat by the \"cryptoperiod\", or lifespan of a "
+"given key."
+msgstr ""
+"NIST 800-57 recomienda un mínimo de (L=2048, "
+"N=224) para su uso más allá del 2010. Esto puede mitigarse de alguna "
+"forma con el \"cryptoperiod\", o tiempo de vida dado a una clave."
#: i2p2www/pages/site/docs/how/cryptography.html:363
msgid ""
"The prime number was chosen in 2003,\n"
-"and the person that chose the number (TheCrypto) is currently no longer an I2P developer.\n"
+"and the person that chose the number (TheCrypto) is currently no longer "
+"an I2P developer.\n"
"As such, we do not know if the prime chosen is a 'strong prime'.\n"
-"If a larger prime is chosen for future purposes, this should be a strong prime, and we will document the construction process."
-msgstr "El número primo fue escogido en el 2003, y la persona que lo eligió (TheCrypto) no es ya un desarrollador de I2P. Por eso, no sabemos si el primo escogido es un 'primo fuerte'. Si en el futuro se elige un nuevo primo, debería ser un primo fuerte y documentaremos el proceso de construcción."
+"If a larger prime is chosen for future purposes, this should be a strong "
+"prime, and we will document the construction process."
+msgstr ""
+"El número primo fue escogido en el "
+"2003, y la persona que lo eligió (TheCrypto) no es ya un "
+"desarrollador de I2P. Por eso, no sabemos si el primo escogido es un "
+"'primo fuerte'. Si en el futuro se elige un nuevo primo, debería ser un "
+"primo fuerte y documentaremos el proceso de construcción."
#: i2p2www/pages/site/docs/how/cryptography.html:374
#: i2p2www/pages/site/docs/how/cryptography.html:376
@@ -5401,49 +8229,94 @@ msgstr "Nuevos algoritmos de firma"
#: i2p2www/pages/site/docs/how/cryptography.html:386
msgid ""
-"As of release 0.9.12, the router supports additional signature algorithms that are more secure than 1024-bit DSA.\n"
-"The first usage is for Destinations; support for Router Identities was added in release 0.9.16.\n"
-"Support for migrating existing Destinations from old to new signatures will be added in a future release.\n"
-"Signature type is encoded in the Destination and Router Identity, so that new signature algorithms\n"
+"As of release 0.9.12, the router supports additional signature algorithms"
+" that are more secure than 1024-bit DSA.\n"
+"The first usage is for Destinations; support for Router Identities was "
+"added in release 0.9.16.\n"
+"Support for migrating existing Destinations from old to new signatures "
+"will be added in a future release.\n"
+"Signature type is encoded in the Destination and Router Identity, so that"
+" new signature algorithms\n"
"or curves may be added at any time.\n"
"The current supported signature types are as follows:"
-msgstr "Desde la versión 0.9.12, el router soporta algoritmos de firma adicionales que son ma´s seguros que 1024-bit DSA.\nEl primer uso es para destinos; el soporte para identificaciones de router I2P se añadió en la versión 0.9.16.\nEl soporte para migrar destinos existentes desde firmas antiguas a firmas nuevas se añadirá en el la futura versión.\nEl tipo de firma está codificado en el destino e identidad del router I2P, así que los nuevos algoritmos de firmar\no curvas pude que se añadan en cualquier momento.\nLos tipos de firmas soportadas actualmente son los siguientes:"
+msgstr ""
+"Desde la versión 0.9.12, el router soporta algoritmos de firma "
+"adicionales que son ma´s seguros que 1024-bit DSA.\n"
+"El primer uso es para destinos; el soporte para identificaciones de "
+"router I2P se añadió en la versión 0.9.16.\n"
+"El soporte para migrar destinos existentes desde firmas antiguas a firmas"
+" nuevas se añadirá en el la futura versión.\n"
+"El tipo de firma está codificado en el destino e identidad del router "
+"I2P, así que los nuevos algoritmos de firmar\n"
+"o curvas pude que se añadan en cualquier momento.\n"
+"Los tipos de firmas soportadas actualmente son los siguientes:"
#: i2p2www/pages/site/docs/how/cryptography.html:407
msgid ""
"ECDSA uses the standard NIST curves and standard SHA-2 hashes.\n"
-"We will migrate new destinations to ECDSA-SHA256-P256 in the 0.9.16 - 0.9.19 release time frame.\n"
-"Usage for Router Identities is supported as of release 0.9.16 and migration may occur in early 2015."
-msgstr "ECDSA utiliza las curvas NIST estándar y los hashes SHA-2 estándar.\nMigraremos los nuevos destinos a ECDSA-SHA256-P256 en la ventana temporal entre las versiones 0.9.16 - 0.9.19.\nSu uso para identificadores de routers I2P está soportado desde la versión 0.9.16 y la migración puede ocurrir a principios de 2015."
+"We will migrate new destinations to ECDSA-SHA256-P256 in the 0.9.16 - "
+"0.9.19 release time frame.\n"
+"Usage for Router Identities is supported as of release 0.9.16 and "
+"migration may occur in early 2015."
+msgstr ""
+"ECDSA utiliza las curvas NIST estándar y los hashes SHA-2 estándar.\n"
+"Migraremos los nuevos destinos a ECDSA-SHA256-P256 en la ventana temporal"
+" entre las versiones 0.9.16 - 0.9.19.\n"
+"Su uso para identificadores de routers I2P está soportado desde la "
+"versión 0.9.16 y la migración puede ocurrir a principios de 2015."
#: i2p2www/pages/site/docs/how/cryptography.html:416
msgid ""
"Standard RSA with the public exponent F4 = 65537.\n"
-"RSA is now used for signing all out-of-band trusted content, including router updates, reseeding, plugins, and news.\n"
-"The signatures are embedded in the \"su3\" format documented on the router updates page.\n"
+"RSA is now used for signing all out-of-band trusted content, including "
+"router updates, reseeding, plugins, and news.\n"
+"The signatures are embedded in the \"su3\" format documented on the "
+"router updates page.\n"
"4096-bit keys are recommended and used by all known signers.\n"
-"RSA is not used, or planned for use, in any in-network Destinations or Router Identities."
-msgstr "RSA estándar con el exponente público F4 = 65537.\nRSA ahora se usa para firmar todo el contenido de confianza fuera-de-banda, incluyendo las actualizaciones del router I2P, resembrado, complementos, y noticias.\nLas firmas están empotradas en el formato \"su3\" documentado en la página de actualizaciones del router I2P.\nSe recomiendan claves de 4096-bits, y las usan todos los firmantes conocidos.\nRSA no se usa, ni se planea su uso, en ningún destino interno-a-la-red o en identificadores de routers I2P."
+"RSA is not used, or planned for use, in any in-network Destinations or "
+"Router Identities."
+msgstr ""
+"RSA estándar con el exponente público F4 = 65537.\n"
+"RSA ahora se usa para firmar todo el contenido de confianza fuera-de-"
+"banda, incluyendo las actualizaciones del router I2P, resembrado, "
+"complementos, y noticias.\n"
+"Las firmas están empotradas en el formato \"su3\" documentado en la "
+"página de actualizaciones del router I2P.\n"
+"Se recomiendan claves de 4096-bits, y las usan todos los firmantes "
+"conocidos.\n"
+"RSA no se usa, ni se planea su uso, en ningún destino interno-a-la-red o "
+"en identificadores de routers I2P."
#: i2p2www/pages/site/docs/how/cryptography.html:427
msgid ""
"Standard EdDSA using curve 25519 and standard 512-bit SHA-2 hashes.\n"
"Supported as of release 0.9.15.\n"
-"Migration for Destinations and Router Identities is scheduled for mid-2015."
-msgstr "EdDSA estándar usando curva 25519 y hashes SHA-2 de 512-bits estándar.\nSoportados desde la versión 0.9.15.\nLa migración para los destinos e identificadores de routers I2P está programada para mediados-de-2015."
+"Migration for Destinations and Router Identities is scheduled for "
+"mid-2015."
+msgstr ""
+"EdDSA estándar usando curva 25519 y hashes SHA-2 de 512-bits estándar.\n"
+"Soportados desde la versión 0.9.15.\n"
+"La migración para los destinos e identificadores de routers I2P está "
+"programada para mediados-de-2015."
#: i2p2www/pages/site/docs/how/cryptography.html:437
#, python-format
msgid ""
"Hashes within I2P are plain old SHA256, as implemented in\n"
"[SHA256Generator]"
-msgstr "Los hashes en I2P son hashes planos viejos SHA256, como se implementaron en [SHA256Generator]"
+msgstr ""
+"Los hashes en I2P son hashes planos viejos SHA256, como se implementaron "
+"en [SHA256Generator]"
#: i2p2www/pages/site/docs/how/cryptography.html:443
msgid ""
-"The vulnerability of the network to a SHA-256 attack and the impact of transitioning to a longer hash is to be studied.\n"
+"The vulnerability of the network to a SHA-256 attack and the impact of "
+"transitioning to a longer hash is to be studied.\n"
"It may be quite difficult to make any change backward-compatible."
-msgstr "Las vulnerabilidades de la red a un ataque SHA-256 y el impacto del cambio a una hash más grande no han sido estudiados aún. Podría ser realmente difícil hacer cambios que fuesen compatibles hacia atrás."
+msgstr ""
+"Las vulnerabilidades de la red a un ataque SHA-256 y el impacto del "
+"cambio a una hash más grande no han sido estudiados aún. Podría ser "
+"realmente difícil hacer cambios que fuesen compatibles hacia atrás."
#: i2p2www/pages/site/docs/how/cryptography.html:454
msgid "Transports"
@@ -5452,15 +8325,26 @@ msgstr "Transportes"
#: i2p2www/pages/site/docs/how/cryptography.html:455
msgid ""
"At the lowest protocol layer,\n"
-"point-to-point inter-router communication is protected by the transport layer security.\n"
+"point-to-point inter-router communication is protected by the transport "
+"layer security.\n"
"Both transports use 256 byte (2048 bit) Diffie-Hellman key exchange\n"
"using\n"
-"the same shared prime and generator as specified above for ElGamal,\n"
+"the same shared prime and generator as specified "
+"above for ElGamal,\n"
"followed by symmetric AES encryption as described above.\n"
"This provides\n"
-"perfect forward secrecy\n"
+"perfect "
+"forward secrecy\n"
"on the transport links."
-msgstr "En la capa del protocolo más baja, la comunicación entre ruters punto a punto es protegida por la seguridad de la capa de transporte. Ambos transportes usan claves de intercambio de 256 bytes (2048 bit) Diffie-Hellman usando el mismo primo y generador compartidos como se especifica arriba para ElGamal, seguido por el cifrado simétrico AES como se describe arriba. Esto proporciona un perfecto secreto en el envío en los enlaces de transporte."
+msgstr ""
+"En la capa del protocolo más baja, la comunicación entre ruters punto a "
+"punto es protegida por la seguridad de la capa de transporte. Ambos "
+"transportes usan claves de intercambio de 256 bytes (2048 bit) Diffie-"
+"Hellman usando el mismo primo y generador "
+"compartidos como se especifica arriba para ElGamal, seguido por el "
+"cifrado simétrico AES como se describe arriba. Esto proporciona un perfecto"
+" secreto en el envío en los enlaces de transporte."
#: i2p2www/pages/site/docs/how/cryptography.html:467
msgid "NTCP connections"
@@ -5469,30 +8353,55 @@ msgstr "Conexiones NTCP"
#: i2p2www/pages/site/docs/how/cryptography.html:469
#, python-format
msgid ""
-"NTCP connections are negotiated with a 2048 Diffie-Hellman implementation,\n"
-"using the router's identity to proceed with a station to station agreement, followed by\n"
-"some encrypted protocol specific fields, with all subsequent data encrypted with AES\n"
+"NTCP connections are negotiated with a 2048 Diffie-Hellman "
+"implementation,\n"
+"using the router's identity to proceed with a station to station "
+"agreement, followed by\n"
+"some encrypted protocol specific fields, with all subsequent data "
+"encrypted with AES\n"
"(as above).\n"
-"The primary reason to do the DH negotiation instead of using ElGamalAES+SessionTag is that it provides '(perfect) forward secrecy', while ElGamalAES+SessionTag does not."
-msgstr "Las conexiones NTCP son negociadas con una implementación 2048 Diffie-Hellman, usando la identidad del ruter para crear un acuerdo/contrato de estación a estación, seguido de algunos campos específicos para protocolos cifrados, con todos los datos subsecuentes cifrados con AES (como arriba). La principal razón para hacer la negociación DH en vez de usar ElGamalAES+SessionTag es que proporciona 'secreto de envío (perfecto)', mientras que ElGamalAES+SessionTag no lo hace."
+"The primary reason to do the DH negotiation instead of using ElGamalAES+SessionTag is that it provides '(perfect) "
+"forward secrecy', while ElGamalAES+SessionTag does not."
+msgstr ""
+"Las conexiones NTCP son negociadas con una implementación 2048 Diffie-"
+"Hellman, usando la identidad del ruter para crear un acuerdo/contrato de "
+"estación a estación, seguido de algunos campos específicos para "
+"protocolos cifrados, con todos los datos subsecuentes cifrados con AES "
+"(como arriba). La principal razón para hacer la negociación DH en vez de "
+"usar ElGamalAES+SessionTag es que "
+"proporciona 'secreto de "
+"envío (perfecto)', mientras que ElGamalAES+SessionTag no lo hace."
#: i2p2www/pages/site/docs/how/cryptography.html:477
msgid ""
-"In order to migrate to a more standardized implementation (TLS/SSL or even "
-"SSH), the following issues must be addressed:"
-msgstr "Para poder migrar a una implementación más estándar (TLS/SSL o incluso SSH), se deben arreglar los siguientes problemas:"
+"In order to migrate to a more standardized implementation (TLS/SSL or "
+"even SSH), the following issues must be addressed:"
+msgstr ""
+"Para poder migrar a una implementación más estándar (TLS/SSL o incluso "
+"SSH), se deben arreglar los siguientes problemas:"
#: i2p2www/pages/site/docs/how/cryptography.html:481
msgid ""
"Can we somehow reestablish sessions securely (ala session tags) or do we "
"need to do full negotiation each time?"
-msgstr "¿Podemos restablecer sesiones de forma segura (tipo etiquetas de sesión) o necesitamos hacer una negociación completa cada vez?"
+msgstr ""
+"¿Podemos restablecer sesiones de forma segura (tipo etiquetas de sesión) "
+"o necesitamos hacer una negociación completa cada vez?"
#: i2p2www/pages/site/docs/how/cryptography.html:484
msgid ""
-"Can we simplify/avoid the x509 or other certificate formats and use our own RouterInfo structure (which \n"
+"Can we simplify/avoid the x509 or other certificate formats and use our "
+"own RouterInfo structure (which \n"
"contains the ElGamal and DSA keys)?"
-msgstr "¿Podemos simplemente evitar el x509 u otros formatos de certificados usados en nuestra estructura del RouterInfo (la cual contiene las claves ElGamal y DSA)?"
+msgstr ""
+"¿Podemos simplemente evitar el x509 u otros formatos de certificados "
+"usados en nuestra estructura del RouterInfo (la cual contiene las claves "
+"ElGamal y DSA)?"
#: i2p2www/pages/site/docs/how/cryptography.html:489
#, python-format
@@ -5505,28 +8414,48 @@ msgstr "Conexiones UDP"
#: i2p2www/pages/site/docs/how/cryptography.html:494
msgid ""
-"SSU (the UDP transport) encrypts each packet with AES256/CBC with both an explicit IV and MAC \n"
-"(HMAC-MD5-128) after agreeing upon an ephemeral session key through a 2048 bit \n"
-"Diffie-Hellman exchange, station-to-station authentication with the other \n"
-"router's DSA key, plus each network message has their own hash for local integrity \n"
+"SSU (the UDP transport) encrypts each packet with AES256/CBC with both an"
+" explicit IV and MAC \n"
+"(HMAC-MD5-128) after agreeing upon an ephemeral session key through a "
+"2048 bit \n"
+"Diffie-Hellman exchange, station-to-station authentication with the other"
+" \n"
+"router's DSA key, plus each network message has their own hash for local "
+"integrity \n"
"checking."
-msgstr "SSU (el transporte UDP) cifra cada paquete con AES256/CBC con un IV explícito y la MAC (HMAC-MD5-128) después de acordar una clave de sesión efímera a través del sistema de intercambio Diffie-Hellman de 2048 bits, autenticación estación a estación con la clave DSA del otro ruter, además cada mensaje de red tiene su propio hash para su comprobar su integridad localmente."
+msgstr ""
+"SSU (el transporte UDP) cifra cada paquete con AES256/CBC con un IV "
+"explícito y la MAC (HMAC-MD5-128) después de acordar una clave de sesión "
+"efímera a través del sistema de intercambio Diffie-Hellman de 2048 bits, "
+"autenticación estación a estación con la clave DSA del otro ruter, además"
+" cada mensaje de red tiene su propio hash para su comprobar su integridad"
+" localmente."
#: i2p2www/pages/site/docs/how/cryptography.html:502
#, python-format
msgid "See the SSU specification for details."
-msgstr "Vea las especificaciones de SSU para más detalles."
+msgstr ""
+"Vea las especificaciones de SSU para más "
+"detalles."
#: i2p2www/pages/site/docs/how/cryptography.html:506
#, python-format
msgid ""
"WARNING - I2P's HMAC-MD5-128 used in SSU is apparently non-standard.\n"
-"Apparently, an early version of SSU used HMAC-SHA256, and then it was switched\n"
-"to MD5-128 for performance reasons, but left the 32-byte buffer size intact.\n"
+"Apparently, an early version of SSU used HMAC-SHA256, and then it was "
+"switched\n"
+"to MD5-128 for performance reasons, but left the 32-byte buffer size "
+"intact.\n"
"See HMACGenerator.java and\n"
"the 2005-07-05 status notes\n"
"for details."
-msgstr "CUIDADO - el HMAC-MD5-128 de I2P usado en el SSU aparentemente no es estándar. Aparentemente, una versión anterior de SSU usaba HMAC-SHA256, y después fue cambiada a MD5-128 por razones de rendimiento, pero dejaron el tamaño del buffer de 32 bytes intacto. Vea HMACGenerator.java y las notas de estado del 2005-07-05 para más detalles."
+msgstr ""
+"CUIDADO - el HMAC-MD5-128 de I2P usado en el SSU aparentemente no es "
+"estándar. Aparentemente, una versión anterior de SSU usaba HMAC-SHA256, y"
+" después fue cambiada a MD5-128 por razones de rendimiento, pero dejaron "
+"el tamaño del buffer de 32 bytes intacto. Vea HMACGenerator.java y las notas de estado del 2005-07-05 para más "
+"detalles."
#: i2p2www/pages/site/docs/how/elgamal-aes.html:2
msgid "ElGamal/AES + SessionTag Encryption"
@@ -5543,65 +8472,151 @@ msgstr "ElGamal/AES+SessionTags es usado para los cifrados de fin a fin."
#: i2p2www/pages/site/docs/how/elgamal-aes.html:11
msgid ""
-"As an unreliable, unordered, message based system, I2P uses a simple combination \n"
-"of asymmetric and symmetric encryption algorithms to provide data confidentiality \n"
-"and integrity to garlic messages. As a whole, the combination is referred \n"
-"to as ElGamal/AES+SessionTags, but that is an excessively verbose way to describe \n"
+"As an unreliable, unordered, message based system, I2P uses a simple "
+"combination \n"
+"of asymmetric and symmetric encryption algorithms to provide data "
+"confidentiality \n"
+"and integrity to garlic messages. As a whole, the combination is referred"
+" \n"
+"to as ElGamal/AES+SessionTags, but that is an excessively verbose way to "
+"describe \n"
"the use of 2048bit ElGamal, AES256, SHA256, and 32 byte nonces."
-msgstr "Como un sistema basado en mensajes no ordenados y no fiable que es, I2P usa una combinación simple de algoritmos de cifrados simétricos y asimétricos para proporcionar la confidencialidad de los datos y la integridad de los mensajes garlic. En conjunto, la combinación es llamada ElGamal/AES+SessionTags, pero es una forma excesivamente larga de describir el uso de ElGamal de 2048 bits, AES256, SHA256 y nonces de 32 bytes."
+msgstr ""
+"Como un sistema basado en mensajes no ordenados y no fiable que es, I2P "
+"usa una combinación simple de algoritmos de cifrados simétricos y "
+"asimétricos para proporcionar la confidencialidad de los datos y la "
+"integridad de los mensajes garlic. En conjunto, la combinación es llamada"
+" ElGamal/AES+SessionTags, pero es una forma excesivamente larga de "
+"describir el uso de ElGamal de 2048 bits, AES256, SHA256 y nonces de 32 "
+"bytes."
#: i2p2www/pages/site/docs/how/elgamal-aes.html:19
#: i2p2www/pages/site/docs/how/tech-intro.html:512
msgid ""
-"The first time a router wants to encrypt a garlic message to another router, \n"
-"they encrypt the keying material for an AES256 session key with ElGamal and \n"
-"append the AES256/CBC encrypted payload after that encrypted ElGamal block. \n"
-"In addition to the encrypted payload, the AES encrypted section contains the \n"
-"payload length, the SHA256 hash of the unencrypted payload, as well as a number \n"
-"of \"session tags\" - random 32 byte nonces. The next time the sender wants \n"
-"to encrypt a garlic message to another router, rather than ElGamal encrypt \n"
-"a new session key they simply pick one of the previously delivered session \n"
-"tags and AES encrypt the payload like before, using the session key used with \n"
-"that session tag, prepended with the session tag itself. When a router receives \n"
-"a garlic encrypted message, they check the first 32 bytes to see if it matches \n"
-"an available session tag - if it does, they simply AES decrypt the message, \n"
+"The first time a router wants to encrypt a garlic message to another "
+"router, \n"
+"they encrypt the keying material for an AES256 session key with ElGamal "
+"and \n"
+"append the AES256/CBC encrypted payload after that encrypted ElGamal "
+"block. \n"
+"In addition to the encrypted payload, the AES encrypted section contains "
+"the \n"
+"payload length, the SHA256 hash of the unencrypted payload, as well as a "
+"number \n"
+"of \"session tags\" - random 32 byte nonces. The next time the sender "
+"wants \n"
+"to encrypt a garlic message to another router, rather than ElGamal "
+"encrypt \n"
+"a new session key they simply pick one of the previously delivered "
+"session \n"
+"tags and AES encrypt the payload like before, using the session key used "
+"with \n"
+"that session tag, prepended with the session tag itself. When a router "
+"receives \n"
+"a garlic encrypted message, they check the first 32 bytes to see if it "
+"matches \n"
+"an available session tag - if it does, they simply AES decrypt the "
+"message, \n"
"but if it does not, they ElGamal decrypt the first block."
-msgstr "La primera vez que un ruter quiere cifrar un mensaje para otro ruter,\nestos cifran las claves para una clave de sesión AES256 con ElGamal y\nadjunta la payload ya cifrado AES256/CBC después del bloque cifrado ElGamal. Además del payload cifrado, las sección del cifrado AES contiene el \ntamaño de la carga, el hash SHA256 del payload no cifrado, así como el número\nde \"etiquetas de sesión\" - nonces aleatorios de 32 bits. La siguiente vez que el remitente desea cifrar un mensaje garlic para otro ruter, en vez de de cifrar una nueva clave de sesión con ElGamal, simplemente elijen una de las etiquetas enviadas de la sesión anterior y cifran con AES el payload como anteriormente, usando la clave de sesión usada con\nla etiqueta de la sesión, antepuesto con la misma etiqueta de sesión. Cuando un ruter recibe\n un mensaje cifrado garlic, comprueba los primeros 32 bytes para ver si coinciden \ncon una etiqueta de sesión disponible - si lo hace, simplemente descifran el mensaje con AES, pero si no, descifran el primer bloque con ElGamal"
+msgstr ""
+"La primera vez que un ruter quiere cifrar un mensaje para otro ruter,\n"
+"estos cifran las claves para una clave de sesión AES256 con ElGamal y\n"
+"adjunta la payload ya cifrado AES256/CBC después del bloque cifrado "
+"ElGamal. Además del payload cifrado, las sección del cifrado AES contiene"
+" el \n"
+"tamaño de la carga, el hash SHA256 del payload no cifrado, así como el "
+"número\n"
+"de \"etiquetas de sesión\" - nonces aleatorios de 32 bits. La siguiente "
+"vez que el remitente desea cifrar un mensaje garlic para otro ruter, en "
+"vez de de cifrar una nueva clave de sesión con ElGamal, simplemente "
+"elijen una de las etiquetas enviadas de la sesión anterior y cifran con "
+"AES el payload como anteriormente, usando la clave de sesión usada con\n"
+"la etiqueta de la sesión, antepuesto con la misma etiqueta de sesión. "
+"Cuando un ruter recibe\n"
+" un mensaje cifrado garlic, comprueba los primeros 32 bytes para ver si "
+"coinciden \n"
+"con una etiqueta de sesión disponible - si lo hace, simplemente descifran"
+" el mensaje con AES, pero si no, descifran el primer bloque con ElGamal"
#: i2p2www/pages/site/docs/how/elgamal-aes.html:35
#: i2p2www/pages/site/docs/how/tech-intro.html:528
msgid ""
-"Each session tag can be used only once so as to prevent internal adversaries \n"
-"from unnecessarily correlating different messages as being between the same \n"
-"routers. The sender of an ElGamal/AES+SessionTag encrypted message chooses \n"
-"when and how many tags to deliver, prestocking the recipient with enough tags \n"
-"to cover a volley of messages. Garlic messages may detect the successful tag \n"
-"delivery by bundling a small additional message as a clove (a \"delivery status \n"
-"message\") - when the garlic message arrives at the intended recipient and \n"
-"is decrypted successfully, this small delivery status message is one of the \n"
-"cloves exposed and has instructions for the recipient to send the clove back \n"
-"to the original sender (through an inbound tunnel, of course). When the original \n"
-"sender receives this delivery status message, they know that the session tags \n"
+"Each session tag can be used only once so as to prevent internal "
+"adversaries \n"
+"from unnecessarily correlating different messages as being between the "
+"same \n"
+"routers. The sender of an ElGamal/AES+SessionTag encrypted message "
+"chooses \n"
+"when and how many tags to deliver, prestocking the recipient with enough "
+"tags \n"
+"to cover a volley of messages. Garlic messages may detect the successful "
+"tag \n"
+"delivery by bundling a small additional message as a clove (a \"delivery "
+"status \n"
+"message\") - when the garlic message arrives at the intended recipient "
+"and \n"
+"is decrypted successfully, this small delivery status message is one of "
+"the \n"
+"cloves exposed and has instructions for the recipient to send the clove "
+"back \n"
+"to the original sender (through an inbound tunnel, of course). When the "
+"original \n"
+"sender receives this delivery status message, they know that the session "
+"tags \n"
"bundled in the garlic message were successfully delivered."
-msgstr "Cada etiqueta de sesión puede usarse sólo una vez para evitar que adversarios internos\npuedan relacionar diferentes mensajes al enviarse estos entre los mismos ruters. El remitente de un mensaje cifrado con etiqueta de sesión + ElGamal/AES elije cuando y cuantas etiquetas a enviar, poniendo a disposición del que recibe suficientes etiquetas para trabajar con un buen número de mensajes. Los mensajes Garlic pueden detectar la llegada exitosas de las etiquetas construyendo un mensaje adicional tipo clove (un \"mensaje de estado de entrega\") - cuando el mensaje llega al destinatario elegido y es descifrado correctamente, este pequeño mensaje de estado de entrega es uno de los dientes expuestos y tiene instrucciones para el destinatario para que retorne al remitente original (a través de un túnel de entrada, claro). Cuando el remitente original \nrecibe el mensaje de estado de envío, sabe que la etiqueta de sesión incluida en el mensaje garlic ha sido enviada exitosamente."
+msgstr ""
+"Cada etiqueta de sesión puede usarse sólo una vez para evitar que "
+"adversarios internos\n"
+"puedan relacionar diferentes mensajes al enviarse estos entre los mismos "
+"ruters. El remitente de un mensaje cifrado con etiqueta de sesión + "
+"ElGamal/AES elije cuando y cuantas etiquetas a enviar, poniendo a "
+"disposición del que recibe suficientes etiquetas para trabajar con un "
+"buen número de mensajes. Los mensajes Garlic pueden detectar la llegada "
+"exitosas de las etiquetas construyendo un mensaje adicional tipo clove "
+"(un \"mensaje de estado de entrega\") - cuando el mensaje llega al "
+"destinatario elegido y es descifrado correctamente, este pequeño mensaje "
+"de estado de entrega es uno de los dientes expuestos y tiene "
+"instrucciones para el destinatario para que retorne al remitente original"
+" (a través de un túnel de entrada, claro). Cuando el remitente original"
+" \n"
+"recibe el mensaje de estado de envío, sabe que la etiqueta de sesión "
+"incluida en el mensaje garlic ha sido enviada exitosamente."
#: i2p2www/pages/site/docs/how/elgamal-aes.html:50
msgid ""
"Session tags themselves have a short lifetime, after which they are \n"
-"discarded if not used. In addition, the quantity stored for each key is limited, \n"
-"as are the number of keys themselves - if too many arrive, either new or old \n"
-"messages may be dropped. The sender keeps track whether messages using session \n"
-"tags are getting through, and if there isn't sufficient communication it may \n"
-"drop the ones previously assumed to be properly delivered, reverting back \n"
+"discarded if not used. In addition, the quantity stored for each key is "
+"limited, \n"
+"as are the number of keys themselves - if too many arrive, either new or "
+"old \n"
+"messages may be dropped. The sender keeps track whether messages using "
+"session \n"
+"tags are getting through, and if there isn't sufficient communication it "
+"may \n"
+"drop the ones previously assumed to be properly delivered, reverting back"
+" \n"
"to the full expensive ElGamal encryption.\n"
-"A session will continue to exist until all its tags are exhausted or expire."
-msgstr "Las etiquetas de sesión tienen un vida muy corta, después de la cual son descartadas y no se usan más. Además, el número almacenado de ellas por cada clave es limitado, como también está limitado el número de claves - si llegan demasiadas, serán descartados los mensajes nuevos o los viejos. El remitente lleva el seguimiento de los mensajes con etiquetas de sesión que pasan a través suyo, y si no hay comunicación suficiente podría descartar los mensajes supuestamente enviados correctamente, volviendo al costoso cifrado ElGamal. Una sesión continuará existiendo hasta que todas las etiquetas hayan expirado."
+"A session will continue to exist until all its tags are exhausted or "
+"expire."
+msgstr ""
+"Las etiquetas de sesión tienen un vida muy corta, después de la cual son "
+"descartadas y no se usan más. Además, el número almacenado de ellas por "
+"cada clave es limitado, como también está limitado el número de claves - "
+"si llegan demasiadas, serán descartados los mensajes nuevos o los viejos."
+" El remitente lleva el seguimiento de los mensajes con etiquetas de "
+"sesión que pasan a través suyo, y si no hay comunicación suficiente "
+"podría descartar los mensajes supuestamente enviados correctamente, "
+"volviendo al costoso cifrado ElGamal. Una sesión continuará existiendo "
+"hasta que todas las etiquetas hayan expirado."
#: i2p2www/pages/site/docs/how/elgamal-aes.html:61
msgid ""
"Sessions are unidirectional. Tags are delivered from Alice to Bob,\n"
"and Alice then uses the tags, one by one, in subsequent messages to Bob."
-msgstr "Las sesiones son unidireccionales. Las etiquetas son enviadas desde Alice a Bob, y Alice entonces utiliza las etiquetas, una a una, en los siguientes mensajes hacia Bob."
+msgstr ""
+"Las sesiones son unidireccionales. Las etiquetas son enviadas desde Alice"
+" a Bob, y Alice entonces utiliza las etiquetas, una a una, en los "
+"siguientes mensajes hacia Bob."
#: i2p2www/pages/site/docs/how/elgamal-aes.html:66
msgid ""
@@ -5609,9 +8624,17 @@ msgid ""
"between a Router and a Destination.\n"
"Each Router and Destination maintains its own Session Key Manager to\n"
"keep track of Session Keys and Session Tags.\n"
-"Separate Session Key Managers prevents correlation of multiple Destinations\n"
+"Separate Session Key Managers prevents correlation of multiple "
+"Destinations\n"
"to each other or a Router by adversaries."
-msgstr "Las sesiones puede establecerse entre Destinaciones, entre Ruters o entre Ruters y Destinaciones. Cada ruter y destinación mantiene su administrador de claves de sesión para hacer el seguimiento de las claves de sesión y las etiquetas de sesión. Al haber administradores de claves de sesión separados se previene que los adversarios puedan hacer correlación de las múltiples destinaciones que hay entre cada uno o entre ruters."
+msgstr ""
+"Las sesiones puede establecerse entre Destinaciones, entre Ruters o entre"
+" Ruters y Destinaciones. Cada ruter y destinación mantiene su "
+"administrador de claves de sesión para hacer el seguimiento de las claves"
+" de sesión y las etiquetas de sesión. Al haber administradores de claves "
+"de sesión separados se previene que los adversarios puedan hacer "
+"correlación de las múltiples destinaciones que hay entre cada uno o entre"
+" ruters."
#: i2p2www/pages/site/docs/how/elgamal-aes.html:77
msgid "Message Reception"
@@ -5627,20 +8650,26 @@ msgstr "Cada mensaje recibido tiene una de estas dos posibles condiciones:"
msgid ""
"It is part of an existing session and contains a Session Tag and an AES "
"encrypted block"
-msgstr "Es parte de una sesión ya existente y contiene una etiqueta de sesión y un bloque cifrado AES."
+msgstr ""
+"Es parte de una sesión ya existente y contiene una etiqueta de sesión y "
+"un bloque cifrado AES."
#: i2p2www/pages/site/docs/how/elgamal-aes.html:85
-msgid ""
-"It is for a new session and contains both ElGamal and AES encrypted blocks"
+msgid "It is for a new session and contains both ElGamal and AES encrypted blocks"
msgstr "Es para una nueva sesión y contiene los bloques cifrados ElGamal y AES."
#: i2p2www/pages/site/docs/how/elgamal-aes.html:88
msgid ""
"When a router receives a message, it will first assume it is from\n"
-"an existing session and attempt to look up the Session Tag and decrypt the following data using AES.\n"
+"an existing session and attempt to look up the Session Tag and decrypt "
+"the following data using AES.\n"
"If that fails, it will assume it is for a new session and attempt to\n"
"decrypt it using ElGamal."
-msgstr "Cuando un ruter recibe un mensaje, primero asumirá que es de una sesión ya existente e intentará buscar la etiqueta de sesión y descifrar los datos usando AES. Si esto falla, asumirá que es para una nueva sesión e intentará descifrarlo usando ElGamal."
+msgstr ""
+"Cuando un ruter recibe un mensaje, primero asumirá que es de una sesión "
+"ya existente e intentará buscar la etiqueta de sesión y descifrar los "
+"datos usando AES. Si esto falla, asumirá que es para una nueva sesión e "
+"intentará descifrarlo usando ElGamal."
#: i2p2www/pages/site/docs/how/elgamal-aes.html:97
msgid "New Session Message Specification"
@@ -5648,9 +8677,12 @@ msgstr "Especificaciones de los mensajes de nueva sesión."
#: i2p2www/pages/site/docs/how/elgamal-aes.html:98
msgid ""
-"A New Session ElGamal Message contains two parts, an encrypted ElGamal block\n"
+"A New Session ElGamal Message contains two parts, an encrypted ElGamal "
+"block\n"
"and an encrypted AES block."
-msgstr "Un mensaje de nueva sesión ElGamal contiene dos partes, un bloque cifrado ElGamal y un bloque cifrado AES."
+msgstr ""
+"Un mensaje de nueva sesión ElGamal contiene dos partes, un bloque cifrado"
+" ElGamal y un bloque cifrado AES."
#: i2p2www/pages/site/docs/how/elgamal-aes.html:103
msgid "The encrypted message contains:"
@@ -5674,9 +8706,14 @@ msgid ""
"The 32-byte\n"
"Session Key\n"
"is the identifier for the session.\n"
-"The 32-byte Pre-IV will be used to generate the IV for the AES block that follows;\n"
+"The 32-byte Pre-IV will be used to generate the IV for the AES block that"
+" follows;\n"
"the IV is the first 16 bytes of the SHA-256 Hash of the Pre-IV."
-msgstr "La clave de sesión de 32 bytes es el identificador de sesión. El Pre-IV de 32 bytes es usado para generar el IV para el bloque AES siguiente; el IV son los primeros 16 bytes del Hash SHA-256 del Pre-IV."
+msgstr ""
+"La clave de sesión "
+"de 32 bytes es el identificador de sesión. El Pre-IV de 32 bytes es usado"
+" para generar el IV para el bloque AES siguiente; el IV son los primeros "
+"16 bytes del Hash SHA-256 del Pre-IV."
#: i2p2www/pages/site/docs/how/elgamal-aes.html:172
#, python-format
@@ -5685,7 +8722,10 @@ msgid ""
"using ElGamal\n"
"and the encrypted block is 514 bytes long.\n"
""
-msgstr "El payload de 222 bytes es cifrado usando ElGamal y el bloque cifrado es de 514 bytes de largo."
+msgstr ""
+"El payload de 222 bytes es cifrado usando ElGamal y el bloque cifrado "
+"es de 514 bytes de largo."
#: i2p2www/pages/site/docs/how/elgamal-aes.html:179
msgid "AES Block"
@@ -5698,14 +8738,18 @@ msgstr "Los datos sin cifrar en el bloque AES contienen los siguiente:"
#: i2p2www/pages/site/docs/how/elgamal-aes.html:224
#, python-format
msgid "2-byte Integer, 0-200"
-msgstr "Un entero de 2 bytes, 0-200"
+msgstr ""
+"Un entero de 2 bytes, "
+"0-200"
#: i2p2www/pages/site/docs/how/elgamal-aes.html:228
#, python-format
msgid ""
-"That many 32-byte Session "
-"Tags"
-msgstr "Muchas etiquetas de sesión de 32 bytes"
+"That many 32-byte Session Tags"
+msgstr ""
+"Muchas etiquetas de "
+"sesión de 32 bytes"
#: i2p2www/pages/site/docs/how/elgamal-aes.html:232
#, python-format
@@ -5715,20 +8759,29 @@ msgstr "Un entero de 4 bytes"
#: i2p2www/pages/site/docs/how/elgamal-aes.html:236
#, python-format
msgid ""
-"The 32-byte SHA256 Hash of "
-"the payload"
-msgstr "El Hash SHA256 de 32 bytes del payload"
+"The 32-byte SHA256 Hash of"
+" the payload"
+msgstr ""
+"El Hash SHA256 de 32 bytes"
+" del payload"
#: i2p2www/pages/site/docs/how/elgamal-aes.html:240
msgid "A one-byte value. Normally == 0. If == 0x01, a Session Key follows"
-msgstr "Un valor de 1 byte. Normalmente == 0. Si == 0x01, lo siguiente es una clave de sesión"
+msgstr ""
+"Un valor de 1 byte. Normalmente == 0. Si == 0x01, lo siguiente es una "
+"clave de sesión"
#: i2p2www/pages/site/docs/how/elgamal-aes.html:244
#, python-format
msgid ""
-"A 32-byte Session Key,\n"
-" to replace the old key, and is only present if preceding flag is 0x01"
-msgstr "Una clave de sesión de 32 bytes, para reemplazar la clave vieja, y sólo está presente si la bandera precedente es 0x01"
+"A 32-byte Session "
+"Key,\n"
+" to replace the old key, and is only present if preceding"
+" flag is 0x01"
+msgstr ""
+"Una clave de sesión "
+"de 32 bytes, para reemplazar la clave vieja, y sólo está presente si la "
+"bandera precedente es 0x01"
#: i2p2www/pages/site/docs/how/elgamal-aes.html:249
msgid "the data"
@@ -5738,7 +8791,9 @@ msgstr "los datos"
msgid ""
"Random data to a multiple of 16 bytes for the total length.\n"
" May contain more than the minimum required padding."
-msgstr "Datos aleatorios múltiplos de 16 bytes hasta el tamaño total. Puede contener más que el relleno mínimo requerido."
+msgstr ""
+"Datos aleatorios múltiplos de 16 bytes hasta el tamaño total. Puede "
+"contener más que el relleno mínimo requerido."
#: i2p2www/pages/site/docs/how/elgamal-aes.html:256
msgid "Minimum length: 48 bytes"
@@ -5748,17 +8803,27 @@ msgstr "Tamaño mínimo : 48 bytes"
#, python-format
msgid ""
"The data is then AES Encrypted,\n"
-"using the session key and IV (calculated from the pre-IV) from the ElGamal section.\n"
-"The encrypted AES Block length is variable but is always a multiple of 16 bytes.\n"
+"using the session key and IV (calculated from the pre-IV) from the "
+"ElGamal section.\n"
+"The encrypted AES Block length is variable but is always a multiple of 16"
+" bytes.\n"
""
-msgstr "Los datos están entonces Cifrados con AES, usando \nla clave de sesión y el IV (Vector de Inicialización, calculado con el pre-IV) \ndesde la sección ElGamal. El tamaño del bloque cifrado con AES \nes variable, pero siempre es un múltiplo de 16 bytes."
+msgstr ""
+"Los datos están entonces Cifrados con "
+"AES, usando \n"
+"la clave de sesión y el IV (Vector de Inicialización, calculado con el "
+"pre-IV) \n"
+"desde la sección ElGamal. El tamaño del bloque cifrado con AES \n"
+"es variable, pero siempre es un múltiplo de 16 bytes."
#: i2p2www/pages/site/docs/how/elgamal-aes.html:269
#, python-format
msgid ""
-"Actual max payload length, and max block length, is less than 64 KB; see the"
-" I2NP Overview."
-msgstr "El tamaño de las actuales carga máxima, y tamaño máximo del bloque, es menor de 64 KB; vea la Introducción a I2NP."
+"Actual max payload length, and max block length, is less than 64 KB; see "
+"the I2NP Overview."
+msgstr ""
+"El tamaño de las actuales carga máxima, y tamaño máximo del bloque, es "
+"menor de 64 KB; vea la Introducción a I2NP."
#: i2p2www/pages/site/docs/how/elgamal-aes.html:272
msgid "New Session Key is currently unused and is never present."
@@ -5775,7 +8840,12 @@ msgid ""
"A tag is used by packaging one in an Existing Session Message that\n"
"contains only an AES encrypted block, and is not preceded by an\n"
"ElGamal block."
-msgstr "Las etiquetas de sesión entregadas exitosamente son recordadas durante \nun periodo breve (actualmente 15 minutos) hasta que se usan o se \ndescartan. Se usa una etiqueta empaquetándola en un mensaje de sesión \nexistente que sólo contiene un bloque cifrado con AES, y no está precedido por un bloque ElGamal."
+msgstr ""
+"Las etiquetas de sesión entregadas exitosamente son recordadas durante \n"
+"un periodo breve (actualmente 15 minutos) hasta que se usan o se \n"
+"descartan. Se usa una etiqueta empaquetándola en un mensaje de sesión \n"
+"existente que sólo contiene un bloque cifrado con AES, y no está "
+"precedido por un bloque ElGamal."
#: i2p2www/pages/site/docs/how/elgamal-aes.html:286
msgid ""
@@ -5786,9 +8856,13 @@ msgstr "El mensaje de sesión existente es como sigue: "
#: i2p2www/pages/site/docs/how/elgamal-aes.html:309
#, python-format
msgid ""
-"A 32-byte Session Tag\n"
+"A 32-byte Session "
+"Tag\n"
" previously delivered in an AES block"
-msgstr "Una etiqueta de sesión de 32-bytes previamente entregada \nen un bloque AES."
+msgstr ""
+"Una etiqueta de "
+"sesión de 32-bytes previamente entregada \n"
+"en un bloque AES."
#: i2p2www/pages/site/docs/how/elgamal-aes.html:314
msgid "As specified above."
@@ -5797,15 +8871,29 @@ msgstr "Como se especificó arriba."
#: i2p2www/pages/site/docs/how/elgamal-aes.html:318
msgid ""
"The session tag also serves as\n"
-"the pre-IV. The IV is the first 16 bytes of the SHA-256 Hash of the sessionTag."
-msgstr "La etiqueta de sesión también sirve como pre-IV. El IV (Vector de \nInicialización) son los primeros 16 bytes del hash SHA-256 de la \nsessionTag (etiqueta de sesión)."
+"the pre-IV. The IV is the first 16 bytes of the SHA-256 Hash of the "
+"sessionTag."
+msgstr ""
+"La etiqueta de sesión también sirve como pre-IV. El IV (Vector de \n"
+"Inicialización) son los primeros 16 bytes del hash SHA-256 de la \n"
+"sessionTag (etiqueta de sesión)."
#: i2p2www/pages/site/docs/how/elgamal-aes.html:323
msgid ""
-"To decode a message from an existing session, a router looks up the Session Tag to find an\n"
-"associated Session Key. If the Session Tag is found, the AES block is decrypted using the associated Session Key.\n"
-"If the tag is not found, the message is assumed to be a New Session Message."
-msgstr "Para decodificar un mensaje desde una sesión existente, un router consulta \nla etiqueta de sesión para encontrar una clave de sesión asociada. Si se \nencuentra la etiqueta de sesión, el bloque AES es descifrado usando la clave de sesión asociada. Si no se encuentra la etiqueta, se asume que el mensaje es un nuevo mensaje de sesión."
+"To decode a message from an existing session, a router looks up the "
+"Session Tag to find an\n"
+"associated Session Key. If the Session Tag is found, the AES block is "
+"decrypted using the associated Session Key.\n"
+"If the tag is not found, the message is assumed to be a New Session Message."
+msgstr ""
+"Para decodificar un mensaje desde una sesión existente, un router "
+"consulta \n"
+"la etiqueta de sesión para encontrar una clave de sesión asociada. Si se"
+" \n"
+"encuentra la etiqueta de sesión, el bloque AES es descifrado usando la "
+"clave de sesión asociada. Si no se encuentra la etiqueta, se asume que el"
+" mensaje es un nuevo mensaje de sesión."
#: i2p2www/pages/site/docs/how/elgamal-aes.html:331
msgid "Session Tag Configuration Options"
@@ -5814,72 +8902,127 @@ msgstr "Opciones de configuración de identificador de sesión"
#: i2p2www/pages/site/docs/how/elgamal-aes.html:332
#, python-format
msgid ""
-"As of release 0.9.2, the client may configure the default number of Session Tags to send\n"
+"As of release 0.9.2, the client may configure the default number of "
+"Session Tags to send\n"
"and the low tag threshold for the current session.\n"
-"For brief streaming connections or datagrams, these options may be used to significantly reduce bandwidth.\n"
-"See the I2CP options specification for details.\n"
+"For brief streaming connections or datagrams, these options may be used "
+"to significantly reduce bandwidth.\n"
+"See the I2CP options specification for "
+"details.\n"
"The session settings may also be overridden on a per-message basis.\n"
-"See the I2CP Send Message Expires specification for details."
-msgstr "Desde la versión 0.9.2, el cliente puede configurar el número de etiquetas de sesión (SessionTags) a enviar,\ny el umbral de bajo número de etiquetas para la sesión actual.\nPara conexiones de transporte streaming breves o datagramas, estas opciones pueden usarse para\nreducir significativamente el consumo de ancho de banda.\nVea la especificación de opciones I2CP para más detalles.\nLas preferencias de sesión también pueden ser sustituidas por cada mensaje.\nVea la especificación de expiración de envío de mensaje I2CP para más detalles."
+"See the I2CP Send Message"
+" Expires specification for details."
+msgstr ""
+"Desde la versión 0.9.2, el cliente puede configurar el número de "
+"etiquetas de sesión (SessionTags) a enviar,\n"
+"y el umbral de bajo número de etiquetas para la sesión actual.\n"
+"Para conexiones de transporte streaming breves o datagramas, estas "
+"opciones pueden usarse para\n"
+"reducir significativamente el consumo de ancho de banda.\n"
+"Vea la especificación de opciones I2CP "
+"para más detalles.\n"
+"Las preferencias de sesión también pueden ser sustituidas por cada "
+"mensaje.\n"
+"Vea la especificación de "
+"expiración de envío de mensaje I2CP para más detalles."
#: i2p2www/pages/site/docs/how/elgamal-aes.html:345
msgid ""
-"There are many possible areas to tune the Session Key Manager's algorithms;\n"
-"some may interact with the streaming library behavior, or have significant\n"
+"There are many possible areas to tune the Session Key Manager's "
+"algorithms;\n"
+"some may interact with the streaming library behavior, or have "
+"significant\n"
"impact on overall performance."
-msgstr "Hay muchas áreas posibles para ajustar los algoritmos del administrador \nde claves de sesión; algunos pueden interactuar con el comportamiento de \nla librería streaming, o tener un impacto significativo en el rendimiento conjunto."
+msgstr ""
+"Hay muchas áreas posibles para ajustar los algoritmos del administrador \n"
+"de claves de sesión; algunos pueden interactuar con el comportamiento de"
+" \n"
+"la librería streaming, o tener un impacto significativo en el rendimiento"
+" conjunto."
#: i2p2www/pages/site/docs/how/elgamal-aes.html:352
msgid ""
-"The number of tags delivered could depend on message size, keeping in mind\n"
+"The number of tags delivered could depend on message size, keeping in "
+"mind\n"
"the eventual padding to 1KB at the tunnel message layer."
-msgstr "El número de etiquetas entregadas podría depender del tamaño del \nmensaje, teniendo en cuenta el eventual esquema de relleno de 1KB en la \ncapa de mensaje de túnel."
+msgstr ""
+"El número de etiquetas entregadas podría depender del tamaño del \n"
+"mensaje, teniendo en cuenta el eventual esquema de relleno de 1KB en la \n"
+"capa de mensaje de túnel."
#: i2p2www/pages/site/docs/how/elgamal-aes.html:357
msgid ""
-"Clients could send an estimate of session lifetime to the router, as an advisory\n"
+"Clients could send an estimate of session lifetime to the router, as an "
+"advisory\n"
"on the number of tags required."
-msgstr "Los clientes podrían enviar una estimación del tiempo de vida de la sesión al router, a modo de aviso del número de etiquetas solicitado."
+msgstr ""
+"Los clientes podrían enviar una estimación del tiempo de vida de la "
+"sesión al router, a modo de aviso del número de etiquetas solicitado."
#: i2p2www/pages/site/docs/how/elgamal-aes.html:362
msgid ""
"Delivery of too few tags causes the router to fall back to an expensive "
"ElGamal encryption."
-msgstr "La entrega de demasiado pocas etiquetas provoca que el ruter regrese al costoso cifrado de respaldo ElGamal."
+msgstr ""
+"La entrega de demasiado pocas etiquetas provoca que el ruter regrese al "
+"costoso cifrado de respaldo ElGamal."
#: i2p2www/pages/site/docs/how/elgamal-aes.html:366
msgid ""
-"The router may assume delivery of Session Tags, or await acknowledgement before using them;\n"
+"The router may assume delivery of Session Tags, or await acknowledgement "
+"before using them;\n"
"there are tradeoffs for each strategy."
-msgstr "El router puede asumir como un hecho la entrega de etiquetas de sesión, o esperar acuse de recibo ('acknowledgement') antes de usarlas; cada estrategia tiene sus propios sacrificios."
+msgstr ""
+"El router puede asumir como un hecho la entrega de etiquetas de sesión, o"
+" esperar acuse de recibo ('acknowledgement') antes de usarlas; cada "
+"estrategia tiene sus propios sacrificios."
#: i2p2www/pages/site/docs/how/elgamal-aes.html:371
msgid ""
-"For very brief messages, almost the full 222 bytes of the pre-IV and padding fields in the ElGamal block\n"
+"For very brief messages, almost the full 222 bytes of the pre-IV and "
+"padding fields in the ElGamal block\n"
"could be used for the entire message, instead of establishing a session."
-msgstr "Para mensajes muy breves, casi la totalidad de los 222 bytes del pre-IV \n(pre-Vector de Inicialización) y los campos de esquemas de relleno en el bloque ElGamal podrían usarse para el mensaje completo, en lugar de \npara establecer una sesión."
+msgstr ""
+"Para mensajes muy breves, casi la totalidad de los 222 bytes del pre-IV \n"
+"(pre-Vector de Inicialización) y los campos de esquemas de relleno en el "
+"bloque ElGamal podrían usarse para el mensaje completo, en lugar de \n"
+"para establecer una sesión."
#: i2p2www/pages/site/docs/how/elgamal-aes.html:376
msgid ""
"Evaluate padding strategy; currently we pad to a minimum of 128 bytes.\n"
"Would be better to add a few tags to small messages than pad."
-msgstr "Evaluar la estrategia de esquema de relleno; actualmente rellenamos hasta \nun mínimo de 128 bytes. Para los mensajes pequeños sería mejor añadirles unas pocas etiquetas que rellenarlos."
+msgstr ""
+"Evaluar la estrategia de esquema de relleno; actualmente rellenamos hasta"
+" \n"
+"un mínimo de 128 bytes. Para los mensajes pequeños sería mejor añadirles "
+"unas pocas etiquetas que rellenarlos."
#: i2p2www/pages/site/docs/how/elgamal-aes.html:381
msgid ""
-"Perhaps things could be more efficient if the Session Tag system was bidirectional,\n"
-"so tags delivered in the 'forward' path could be used in the 'reverse' path,\n"
+"Perhaps things could be more efficient if the Session Tag system was "
+"bidirectional,\n"
+"so tags delivered in the 'forward' path could be used in the 'reverse' "
+"path,\n"
"thus avoiding ElGamal in the initial response.\n"
"The router currently plays some tricks like this when sending\n"
"tunnel test messages to itself."
-msgstr "Quizá las cosas podrían ser más eficientes si el sistema de etiqueta de sesión fuera bidireccional, así las etiquetas entregadas en la ruta 'forward' (directa) podrían usarse en la ruta 'reverse' (inversa), evitando así ElGamal en la respuesta inicial. El router actualmente usa algunos trucos como este cuando se envían mensajes de prueba de túnel a si mismo."
+msgstr ""
+"Quizá las cosas podrían ser más eficientes si el sistema de etiqueta de "
+"sesión fuera bidireccional, así las etiquetas entregadas en la ruta "
+"'forward' (directa) podrían usarse en la ruta 'reverse' (inversa), "
+"evitando así ElGamal en la respuesta inicial. El router actualmente usa "
+"algunos trucos como este cuando se envían mensajes de prueba de túnel a "
+"si mismo."
#: i2p2www/pages/site/docs/how/elgamal-aes.html:389
#, python-format
msgid ""
"Change from Session Tags to\n"
"a synchronized PRNG."
-msgstr "Cambiar de las etiquetas de sesión a un PRNG (generador de números pseudo aleatorios) sincronizado."
+msgstr ""
+"Cambiar de las etiquetas de sesión a un "
+"PRNG (generador de números pseudo aleatorios) sincronizado."
#: i2p2www/pages/site/docs/how/elgamal-aes.html:394
#, python-format
@@ -5888,8 +9031,17 @@ msgid ""
"set a flag in the\n"
"Delivery Instructions,\n"
"or set a magic number in the first few bytes of the Session Key field\n"
-"and accept a small risk of the random Session Key matching the magic number."
-msgstr "Varias de estas ideas pueden requerir un nuevo tipo de mensaje I2NP (Protocolo de Red I2P), o establecer un distintivo en las instrucciones de entrega, o establecer un número mágico en los primeros pocos bytes del campo de la clave \nde sesión y aceptar un pequeño riesgo de que la clave de sesión aleatoria \ncoincida con el número mágico."
+"and accept a small risk of the random Session Key matching the magic "
+"number."
+msgstr ""
+"Varias de estas ideas pueden requerir un nuevo tipo de mensaje I2NP "
+"(Protocolo de Red I2P), o establecer un distintivo en las instrucciones de entrega, o "
+"establecer un número mágico en los primeros pocos bytes del campo de la "
+"clave \n"
+"de sesión y aceptar un pequeño riesgo de que la clave de sesión aleatoria"
+" \n"
+"coincida con el número mágico."
#: i2p2www/pages/site/docs/how/garlic-routing.html:2
msgid "Garlic Routing"
@@ -5901,27 +9053,47 @@ msgstr "Garlic Routing y terminología \"Garlic\""
#: i2p2www/pages/site/docs/how/garlic-routing.html:7
msgid ""
-"The terms \"garlic routing\" and \"garlic encryption\" are often used rather loosely when referring to I2P's technology.\n"
+"The terms \"garlic routing\" and \"garlic encryption\" are often used "
+"rather loosely when referring to I2P's technology.\n"
"Here, we explain the history of the terms, the various meanings, and\n"
"the usage of \"garlic\" methods in I2P."
-msgstr "Los términos \"garlic routing, enrutado garlic\" y \"garlic encryption, cifrado garlic\"son usados a menudo imprecisamente para designar la tecnología de I2P.\nAquí vamos a explicar la historia de estos términos, su significados,y el uso de los métodos \"garlic\" en I2P."
+msgstr ""
+"Los términos \"garlic routing, enrutado garlic\" y \"garlic encryption, "
+"cifrado garlic\"son usados a menudo imprecisamente para designar la "
+"tecnología de I2P.\n"
+"Aquí vamos a explicar la historia de estos términos, su significados,y el"
+" uso de los métodos \"garlic\" en I2P."
#: i2p2www/pages/site/docs/how/garlic-routing.html:13
msgid ""
"\"Garlic routing\" was first coined by\n"
"Michael J. Freedman\n"
"in Roger Dingledine's Free Haven \n"
-"Master's thesis Section 8.1.1 (June 2000), as derived from \n"
+"Master's thesis "
+"Section 8.1.1 (June 2000), as derived from \n"
"Onion Routing."
-msgstr "\"Garlic Routing\" fue acuñado por Michael J. Freedman en la Master's thesis de Roger Dingledine en Free Haven. Sección 8.1.1 (Junio 2000), derivado de Onion Routing."
+msgstr ""
+"\"Garlic Routing\" fue acuñado por Michael J. Freedman en "
+"la Master's thesis "
+"de Roger Dingledine en Free Haven. Sección 8.1.1 (Junio 2000), derivado "
+"de Onion Routing."
#: i2p2www/pages/site/docs/how/garlic-routing.html:21
msgid ""
-"\"Garlic\" may have been used originally by I2P developers because I2P implements a form of\n"
-"bundling as Freedman describes, or simply to emphasize general differences from Tor.\n"
+"\"Garlic\" may have been used originally by I2P developers because I2P "
+"implements a form of\n"
+"bundling as Freedman describes, or simply to emphasize general "
+"differences from Tor.\n"
"The specific reasoning may be lost to history.\n"
-"Generally, when referring to I2P, the term \"garlic\" may mean one of three things:"
-msgstr "\"Garlic\" fue quizás usado por los desarrolladores originales de I2P porque implementa un forma de agrupación tal y como Freedman describió, o simplemente para enfatizar las diferencias con Tor. La razón exacta puede haberse perdido en el tiempo. Generalmente, cuando nos referimos al término \"garlic\", puede significar una de estas tres cosas:"
+"Generally, when referring to I2P, the term \"garlic\" may mean one of "
+"three things:"
+msgstr ""
+"\"Garlic\" fue quizás usado por los desarrolladores originales de I2P "
+"porque implementa un forma de agrupación tal y como Freedman describió, o"
+" simplemente para enfatizar las diferencias con Tor. La razón exacta "
+"puede haberse perdido en el tiempo. Generalmente, cuando nos referimos al"
+" término \"garlic\", puede significar una de estas tres cosas:"
#: i2p2www/pages/site/docs/how/garlic-routing.html:28
#: i2p2www/pages/site/docs/how/garlic-routing.html:39
@@ -5939,40 +9111,81 @@ msgstr "Cifrado ElGamal/AES "
#: i2p2www/pages/site/docs/how/garlic-routing.html:33
msgid ""
-"Unfortunately, I2P's usage of \"garlic\" terminology over the past seven years has not always been precise; therefore the reader is\n"
+"Unfortunately, I2P's usage of \"garlic\" terminology over the past seven "
+"years has not always been precise; therefore the reader is\n"
"cautioned when encountering the term.\n"
"Hopefully, the explanation below will make things clear."
-msgstr "Desafortunadamente, el uso del término \"garlic\" por parte de I2P en los pasados siete años no ha sido siempre preciso; por lo tanto los usuarios están avisados para cuando se topen con el término. Esperemos que la siguiente explicación dejará las cosas más claras."
+msgstr ""
+"Desafortunadamente, el uso del término \"garlic\" por parte de I2P en los"
+" pasados siete años no ha sido siempre preciso; por lo tanto los usuarios"
+" están avisados para cuando se topen con el término. Esperemos que la "
+"siguiente explicación dejará las cosas más claras."
#: i2p2www/pages/site/docs/how/garlic-routing.html:40
msgid ""
-"Onion routing is a technique for building paths, or tunnels, through a series of peers,\n"
+"Onion routing is a technique for building paths, or tunnels, through a "
+"series of peers,\n"
"and then using that tunnel.\n"
-"Messages are repeatedly encrypted by the originator, and then decrypted by each hop.\n"
-"During the building phase, only the routing instructions for the next hop are exposed to each peer.\n"
-"During the operating phase, messages are passed through the tunnel, and the\n"
-"message and its routing instructions are only exposed to the endpoint of the tunnel."
-msgstr "El enrutado Onion es una técnica para construir caminos, o túneles, a través de una serie de pares, y después usar ese túnel. Los mensajes son repetidamente cifrados por el creador, y después descifrados por cada salto. Durante la fase de construcción sólo las instrucciones de enrutado para el siguiente salto son expuestas a cada par. Durante la fase de operación los mensajes se pasan a través del túnel, y el mensaje y sus instrucciones de enrutado sólo son mostradas en el punto final del túnel."
+"Messages are repeatedly encrypted by the originator, and then decrypted "
+"by each hop.\n"
+"During the building phase, only the routing instructions for the next hop"
+" are exposed to each peer.\n"
+"During the operating phase, messages are passed through the tunnel, and "
+"the\n"
+"message and its routing instructions are only exposed to the endpoint of "
+"the tunnel."
+msgstr ""
+"El enrutado Onion es una técnica para construir caminos, o túneles, a "
+"través de una serie de pares, y después usar ese túnel. Los mensajes son "
+"repetidamente cifrados por el creador, y después descifrados por cada "
+"salto. Durante la fase de construcción sólo las instrucciones de enrutado"
+" para el siguiente salto son expuestas a cada par. Durante la fase de "
+"operación los mensajes se pasan a través del túnel, y el mensaje y sus "
+"instrucciones de enrutado sólo son mostradas en el punto final del túnel."
#: i2p2www/pages/site/docs/how/garlic-routing.html:49
#, python-format
msgid ""
"This is similar to the way Mixmaster\n"
-"(see network comparisons) sends messages - taking a message, encrypting it\n"
-"to the recipient's public key, taking that encrypted message and encrypting\n"
-"it (along with instructions specifying the next hop), and then taking that\n"
-"resulting encrypted message and so on, until it has one layer of encryption\n"
+"(see network comparisons) sends messages "
+"- taking a message, encrypting it\n"
+"to the recipient's public key, taking that encrypted message and "
+"encrypting\n"
+"it (along with instructions specifying the next hop), and then taking "
+"that\n"
+"resulting encrypted message and so on, until it has one layer of "
+"encryption\n"
"per hop along the path."
-msgstr "Esto es similar a como Mixmaster (ver comparación entre redes) envía mensajes - toma un mensaje, lo cifra con la clave pública del destinatario, toma ese mensaje cifrado y lo cifra (junto con instrucciones indicando el siguiente salto) de nuevo, y así sucesivamente hasta que tiene una capa de cifrado por salto a lo largo de todo el camino."
+msgstr ""
+"Esto es similar a como Mixmaster (ver comparación entre redes) envía mensajes - "
+"toma un mensaje, lo cifra con la clave pública del destinatario, toma ese"
+" mensaje cifrado y lo cifra (junto con instrucciones indicando el "
+"siguiente salto) de nuevo, y así sucesivamente hasta que tiene una capa "
+"de cifrado por salto a lo largo de todo el camino."
#: i2p2www/pages/site/docs/how/garlic-routing.html:58
msgid ""
-"In this sense, \"garlic routing\" as a general concept is identical to \"onion routing\".\n"
-"As implemented in I2P, of course, there are several differences from the implementation in Tor; see below.\n"
-"Even so, there are substantial similarities such that I2P benefits from a\n"
-"large amount of academic research on onion routing,\n"
-"Tor, and similar mixnets."
-msgstr "En este senido, \"garlic routing\" como concepto general es idéntico a \"onion routing\". Aunque tal y como se ha implementado en I2P tiene varias diferencias con la implementación de Tor; ver más abajo.\nAun así, hay similitudes substanciales, como algunas de las que se beneficia I2P gracias al gran número de estudios académicos sobre la onion routing, Tor, y mixnets similares. "
+"In this sense, \"garlic routing\" as a general concept is identical to "
+"\"onion routing\".\n"
+"As implemented in I2P, of course, there are several differences from the "
+"implementation in Tor; see below.\n"
+"Even so, there are substantial similarities such that I2P benefits from a"
+"\n"
+"large amount of"
+" academic research on onion routing,\n"
+"Tor, and similar "
+"mixnets."
+msgstr ""
+"En este senido, \"garlic routing\" como concepto general es idéntico a "
+"\"onion routing\". Aunque tal y como se ha implementado en I2P tiene "
+"varias diferencias con la implementación de Tor; ver más abajo.\n"
+"Aun así, hay similitudes substanciales, como algunas de las que se "
+"beneficia I2P gracias al gran número de estudios académicos "
+"sobre la onion routing, Tor, y mixnets "
+"similares. "
#: i2p2www/pages/site/docs/how/garlic-routing.html:67
msgid "Bundling Multiple Messages"
@@ -5980,13 +9193,22 @@ msgstr "Construyendo múltiples mensajes"
#: i2p2www/pages/site/docs/how/garlic-routing.html:68
msgid ""
-"Michael Freedman defined \"garlic routing\" as an extension to onion routing,\n"
+"Michael Freedman defined \"garlic routing\" as an extension to onion "
+"routing,\n"
"in which multiple messages are bundled together.\n"
"He called each message a \"bulb\".\n"
-"All the messages, each with its own delivery instructions, are exposed at the\n"
+"All the messages, each with its own delivery instructions, are exposed at"
+" the\n"
"endpoint.\n"
-"This allows the efficient bundling of an onion routing \"reply block\" with the original message."
-msgstr "Michael Freedman definión \"garlic routing\" como una extensión de onion routing, en la cual varios mensajes son agrupados juntos. El llamó a cada mensaje \"bulb, bulbo\". Todos los mensajes, cada uno con sus instrucciones de envío, son expuestos en el punto final. Esto permite una agrupación eficiente del \"bloque de respuesta\" de una una ruta onion con el mensaje original."
+"This allows the efficient bundling of an onion routing \"reply block\" "
+"with the original message."
+msgstr ""
+"Michael Freedman definión \"garlic routing\" como una extensión de onion "
+"routing, en la cual varios mensajes son agrupados juntos. El llamó a cada"
+" mensaje \"bulb, bulbo\". Todos los mensajes, cada uno con sus "
+"instrucciones de envío, son expuestos en el punto final. Esto permite una"
+" agrupación eficiente del \"bloque de respuesta\" de una una ruta onion "
+"con el mensaje original."
#: i2p2www/pages/site/docs/how/garlic-routing.html:77
msgid ""
@@ -5994,19 +9216,33 @@ msgid ""
"Our term for garlic \"bulbs\" is \"cloves\".\n"
"Any number of messages can be\n"
"contained, instead of just a single message.\n"
-"This is a significant distinction from the onion routing implemented in Tor.\n"
-"However, it is only one of many major architectural differences between I2P and Tor;\n"
+"This is a significant distinction from the onion routing implemented in "
+"Tor.\n"
+"However, it is only one of many major architectural differences between "
+"I2P and Tor;\n"
"perhaps it is not, by itself, enough to justify a change in terminology."
-msgstr "Este concepto ha sido implementado en I2p como se describe más abajo.\nNuestro término para \"bulbs, bulbos\" garlic es \"cloves, dientes del ajo\". Puede contener cualquier número de mensajes, en vez de un solo mensaje. Esta es una gran diferencia con la implementación de Tor. Aun así, es sólo una de las diferencias entre I2P y Tor; quizás por si misma no sea suficiente para justificar un cambio de terminología."
+msgstr ""
+"Este concepto ha sido implementado en I2p como se describe más abajo.\n"
+"Nuestro término para \"bulbs, bulbos\" garlic es \"cloves, dientes del "
+"ajo\". Puede contener cualquier número de mensajes, en vez de un solo "
+"mensaje. Esta es una gran diferencia con la implementación de Tor. Aun "
+"así, es sólo una de las diferencias entre I2P y Tor; quizás por si misma "
+"no sea suficiente para justificar un cambio de terminología."
#: i2p2www/pages/site/docs/how/garlic-routing.html:87
msgid ""
"Another difference\n"
"from the method described by Freedman\n"
-"is that the path is unidirectional - there is no \"turning point\" as seen in onion routing\n"
-"or mixmaster reply blocks, which greatly simplifies the algorithm and allows for more flexible\n"
+"is that the path is unidirectional - there is no \"turning point\" as "
+"seen in onion routing\n"
+"or mixmaster reply blocks, which greatly simplifies the algorithm and "
+"allows for more flexible\n"
"and reliable delivery."
-msgstr "Otra diferencia con el método descrito por Freedman es que el camino es unidireccional - no existe un \"punto de retorno\" como en el enrutado onion o en los bloques de respuesta mixmaster, lo que simplifica mucho el algoritmo y permite una entrega segura."
+msgstr ""
+"Otra diferencia con el método descrito por Freedman es que el camino es "
+"unidireccional - no existe un \"punto de retorno\" como en el enrutado "
+"onion o en los bloques de respuesta mixmaster, lo que simplifica mucho el"
+" algoritmo y permite una entrega segura."
#: i2p2www/pages/site/docs/how/garlic-routing.html:97
#, python-format
@@ -6014,7 +9250,9 @@ msgid ""
"In some cases, \"garlic encryption\" may simply mean\n"
"ElGamal/AES+SessionTag encryption\n"
"(without multiple layers)."
-msgstr "En algunos casos el \"cifrado garlic\" simplemente significa cifrado ElGamal/AES+SessionTag (sin múltiples capas)."
+msgstr ""
+"En algunos casos el \"cifrado garlic\" simplemente significa cifrado ElGamal/AES+SessionTag (sin múltiples capas)."
#: i2p2www/pages/site/docs/how/garlic-routing.html:105
msgid "\"Garlic\" Methods in I2P"
@@ -6024,29 +9262,44 @@ msgstr "Métodos \"Garlic\" en I2P"
msgid ""
"Now that we've defined various \"garlic\" terms, we can say that\n"
"I2P uses garlic routing, bundling and encryption in three places:"
-msgstr "Ahora que hemos definido varios términos \"garlic\", podemos decir que I2P usa rutado garlic, agrupación y cifrado en tres partes:"
+msgstr ""
+"Ahora que hemos definido varios términos \"garlic\", podemos decir que "
+"I2P usa rutado garlic, agrupación y cifrado en tres partes:"
#: i2p2www/pages/site/docs/how/garlic-routing.html:111
msgid "For building and routing through tunnels (layered encryption)"
-msgstr "Para la construcción y enrutado a través de los túneles (cifrado por capas)"
+msgstr ""
+"Para la construcción y enrutado a través de los túneles (cifrado por "
+"capas)"
#: i2p2www/pages/site/docs/how/garlic-routing.html:112
msgid ""
"For determining the success or failure of end to end message delivery "
"(bundling)"
-msgstr "Para determinar el éxito o fallo del envío de un mensaje de fin a fin (agrupamiento)"
+msgstr ""
+"Para determinar el éxito o fallo del envío de un mensaje de fin a fin "
+"(agrupamiento)"
#: i2p2www/pages/site/docs/how/garlic-routing.html:113
msgid ""
-"For publishing some network database entries (dampening the probability of a"
-" successful traffic analysis attack) (ElGamal/AES)"
-msgstr "Para publicar algunas entradas en la base de datos de la red (amortiguando la posibilidad de un ataque de análisis exitoso) (ElGamal/AES)"
+"For publishing some network database entries (dampening the probability "
+"of a successful traffic analysis attack) (ElGamal/AES)"
+msgstr ""
+"Para publicar algunas entradas en la base de datos de la red "
+"(amortiguando la posibilidad de un ataque de análisis exitoso) "
+"(ElGamal/AES)"
#: i2p2www/pages/site/docs/how/garlic-routing.html:116
msgid ""
-"There are also significant ways that this technique can be used to improve the performance of the network, \n"
-"exploiting transport latency/throughput tradeoffs, and branching data through redundant paths to increase reliability."
-msgstr "Hay muchas otras formas de usar esta técnica para mejorar el rendimiento de la red, aprovechando las compensaciones de la latencia del transporte, y derivando datos a través de caminos redundantes para incrementar la seguridad."
+"There are also significant ways that this technique can be used to "
+"improve the performance of the network, \n"
+"exploiting transport latency/throughput tradeoffs, and branching data "
+"through redundant paths to increase reliability."
+msgstr ""
+"Hay muchas otras formas de usar esta técnica para mejorar el rendimiento "
+"de la red, aprovechando las compensaciones de la latencia del transporte,"
+" y derivando datos a través de caminos redundantes para incrementar la "
+"seguridad."
#: i2p2www/pages/site/docs/how/garlic-routing.html:122
msgid "Tunnel Building and Routing"
@@ -6056,8 +9309,13 @@ msgstr "Rutado y construcción de los túneles"
msgid ""
"In I2P, tunnels are unidirectional. Each party builds two tunnels,\n"
"one for outbound and one for inbound traffic.\n"
-"Therefore, four tunnels are required for a single round-trip message and reply."
-msgstr "En I2P los túneles son unidireccionales. Cada parte construye dos túneles, uno para el tráfico de salida y otro para el de entrada. Por lo tanto se necesitan cuatro túneles para una vuelta completa de un mensaje y su respuesta."
+"Therefore, four tunnels are required for a single round-trip message and "
+"reply."
+msgstr ""
+"En I2P los túneles son unidireccionales. Cada parte construye dos "
+"túneles, uno para el tráfico de salida y otro para el de entrada. Por lo "
+"tanto se necesitan cuatro túneles para una vuelta completa de un mensaje "
+"y su respuesta."
#: i2p2www/pages/site/docs/how/garlic-routing.html:129
#, python-format
@@ -6069,19 +9327,33 @@ msgid ""
"this page.\n"
"We use\n"
"ElGamal/AES+SessionTag for the encryption."
-msgstr "Los túneles son usados y creados con un cifrado por capas. Esto se describe en página de implementación de los túneles. La construcción de los túneles es definida en esta página. Para el cifrado usamos ElGamal/AES+SessionTag "
+msgstr ""
+"Los túneles son usados y creados con un cifrado por capas. Esto se "
+"describe en página de implementación de los "
+"túneles. La construcción de los túneles es definida en esta página. Para el cifrado usamos ElGamal/AES+SessionTag "
#: i2p2www/pages/site/docs/how/garlic-routing.html:141
#, python-format
msgid ""
"Tunnels are a general-purpose mechanism to transport all\n"
"I2NP messages, and\n"
-"Garlic Messages are not used to build tunnels.\n"
+"Garlic Messages are not used to "
+"build tunnels.\n"
"We do not bundle multiple\n"
"I2NP messages into a single\n"
-"Garlic Message for unwrapping at the outbound tunnel endpoint;\n"
+"Garlic Message for unwrapping at "
+"the outbound tunnel endpoint;\n"
"the tunnel encryption is sufficient."
-msgstr "Los túneles son un mecanismo de propósito general para transportar todos los mensajes I2NP, y los mensajes Garlic no se usan para construir túneles. No agrupamos múltiples mensajes I2NP dentro de un solo mensaje Garlic para desenvolver en el punto funal del túnel de salida, el cifrado del túnel es suficiente. "
+msgstr ""
+"Los túneles son un mecanismo de propósito general para transportar todos "
+"los mensajes I2NP, y los mensajes Garlic no se usan para "
+"construir túneles. No agrupamos múltiples mensajes "
+"I2NP dentro de un solo mensaje "
+"Garlic para desenvolver en el punto funal del túnel de salida, el "
+"cifrado del túnel es suficiente. "
#: i2p2www/pages/site/docs/how/garlic-routing.html:152
msgid "End-to-End Message Bundling"
@@ -6093,7 +9365,8 @@ msgid ""
"At the layer above tunnels, I2P delivers end-to-end messages between\n"
"Destinations.\n"
"Just as within a single tunnel, we use\n"
-"ElGamal/AES+SessionTag for the encryption.\n"
+"ElGamal/AES+SessionTag for the encryption."
+"\n"
"Each client message as delivered to the router through the\n"
"I2CP interface becomes a single\n"
"Garlic Clove\n"
@@ -6102,14 +9375,28 @@ msgid ""
"inside a\n"
"Garlic Message.\n"
"Delivery Instructions may specify a Destination, Router, or Tunnel."
-msgstr "En la capa por encima de los túneles, I2P envía mensajes de fin a fin entre destinaciones. Dentro de un único túnel usamos ElGamal/AES+SessionTag para el cifrado. Cada mensaje cliente enviado al router a través del interfaz I2CP se convierte un solo Garlic Clove con su propias instrucciones de envío, dentro de un mensaje Garlic. Las instrucciones de envío pueden indicar una destinación, un router o un túnel."
+msgstr ""
+"En la capa por encima de los túneles, I2P envía mensajes de fin a fin "
+"entre destinaciones. "
+"Dentro de un único túnel usamos ElGamal/AES+SessionTag para el cifrado. Cada "
+"mensaje cliente enviado al router a través del interfaz I2CP se convierte un solo Garlic Clove con su propias "
+"instrucciones de envío, dentro"
+" de un mensaje Garlic. Las "
+"instrucciones de envío pueden indicar una destinación, un router o un "
+"túnel."
#: i2p2www/pages/site/docs/how/garlic-routing.html:172
msgid ""
"Generally, a Garlic Message will contain only one clove.\n"
"However, the router will periodically bundle two additional\n"
"cloves in the Garlic Message:"
-msgstr "Generalmente, un mensaje Garlic sólo contiene un clove. Aun así, el ruter agrupa periódicamente dos dientes adicionales en el mensaje Garlic:"
+msgstr ""
+"Generalmente, un mensaje Garlic sólo contiene un clove. Aun así, el ruter"
+" agrupa periódicamente dos dientes adicionales en el mensaje Garlic:"
#: i2p2www/pages/site/docs/how/garlic-routing.html:177
msgid "Garlic Message Cloves"
@@ -6122,14 +9409,27 @@ msgid ""
"Delivery Status Message,\n"
"with\n"
"Delivery Instructions\n"
-"specifying that it be sent back to the originating router as an acknowledgment.\n"
+"specifying that it be sent back to the originating router as an "
+"acknowledgment.\n"
"This is similar to the \"reply block\" or \"reply onion\"\n"
"described in the references.\n"
-"It is used for determining the success or failure of end to end message delivery.\n"
-"The originating router may, upon failure to receive the Delivery Status Message\n"
-"within the expected time period, modify the routing to the far-end Destination,\n"
+"It is used for determining the success or failure of end to end message "
+"delivery.\n"
+"The originating router may, upon failure to receive the Delivery Status "
+"Message\n"
+"within the expected time period, modify the routing to the far-end "
+"Destination,\n"
"or take other actions."
-msgstr "Un mensaje de estado de envío con las instrucciones de envío especificando que se envíe de vuelta al ruter original como confirmación. Esto es similar al \"reply block, bloque de respuesta\" o \"reply onion\" descritos en las referencias. Se usa para determinar el fallo o éxito del envío del mensaje de fin a fin. El ruter original, tras el fallo de no recibir el mensaje de estado de envío en el tiempo esperado, puede modificar la ruta a una destinación lejana, o tomar otras acciones."
+msgstr ""
+"Un mensaje de estado de "
+"envío con las instrucciones de"
+" envío especificando que se envíe de vuelta al ruter original como "
+"confirmación. Esto es similar al \"reply block, bloque de respuesta\" o "
+"\"reply onion\" descritos en las referencias. Se usa para determinar el "
+"fallo o éxito del envío del mensaje de fin a fin. El ruter original, "
+"tras el fallo de no recibir el mensaje de estado de envío en el tiempo "
+"esperado, puede modificar la ruta a una destinación lejana, o tomar otras"
+" acciones."
#: i2p2www/pages/site/docs/how/garlic-routing.html:194
#, python-format
@@ -6141,12 +9441,27 @@ msgid ""
"for the originating Destination, with\n"
"Delivery Instructions\n"
"specifying the far-end destination's router.\n"
-"By periodically bundling a LeaseSet, the router ensures that the far-end will be able\n"
+"By periodically bundling a LeaseSet, the router ensures that the far-end "
+"will be able\n"
"to maintain communications.\n"
-"Otherwise the far-end would have to query a floodfill router for the network database entry,\n"
-"and all LeaseSets would have to be published to the network database, as explained on the\n"
+"Otherwise the far-end would have to query a floodfill router for the "
+"network database entry,\n"
+"and all LeaseSets would have to be published to the network database, as "
+"explained on the\n"
"network database page."
-msgstr "Un mensaje de almacenamiento de la base de datos con un LeaseSet para la destinación original, con instrucciones de envío especificando el ruter con destinación remota. Agrupando un LeaseSet periódicamente, el ruter se asegura de que la destinación lejana será capaz de mantener las comunicaciones. De otra forma el ruter lejano tendría que consultar a un ruter floodfill por un registro en la base de datos , y todos los LeaseSets tendrían que ser publicados en la base de datos de la red, como se explica en la página de la base de datos de la red."
+msgstr ""
+"Un mensaje de almacenamiento "
+"de la base de datos con un LeaseSet para la "
+"destinación original, con instrucciones de envío "
+"especificando el ruter con destinación remota. Agrupando un LeaseSet "
+"periódicamente, el ruter se asegura de que la destinación lejana será "
+"capaz de mantener las comunicaciones. De otra forma el ruter lejano "
+"tendría que consultar a un ruter floodfill por un registro en la base de "
+"datos , y todos los LeaseSets tendrían que ser publicados en la base de "
+"datos de la red, como se explica en la página de la"
+" base de datos de la red."
#: i2p2www/pages/site/docs/how/garlic-routing.html:213
#, python-format
@@ -6154,25 +9469,55 @@ msgid ""
"By default, the Delivery Status and Database Store Messages\n"
"are bundled when the local LeaseSet changes, when additional\n"
"Session Tags\n"
-"are delivered, or if the messages have not been bundled in the previous minute.\n"
-"As of release 0.9.2, the client may configure the default number of Session Tags to send\n"
+"are delivered, or if the messages have not been bundled in the previous "
+"minute.\n"
+"As of release 0.9.2, the client may configure the default number of "
+"Session Tags to send\n"
"and the low tag threshold for the current session.\n"
-"See the I2CP options specification for details.\n"
+"See the I2CP options specification for "
+"details.\n"
"The session settings may also be overridden on a per-message basis.\n"
-"See the I2CP Send Message Expires specification for details."
-msgstr "Por defecto, los mensajes de estado de entrega (Delivery Status) y almacenado en base de datos (Database Store)\nson empaquetados cuando el LeaseSet local (conjunto de túneles al destino local) cambia,\ncuando se entregan etiquetas de sesión (Session Tags) adicionales, \no si los mensajes no han sido empaquetados en el minuto anterior.\nDesde la versión 0.9.2, el cliente puede configurar el número de etiquetas de sesión predeterminado a enviar\ny el umbral de bajo número de etiquetas para la sesión actual.\nVea la especificación de opciones I2CP para más detalles.\nLas preferencias de sesión también pueden ser sustituidas para cada mensaje.\nVea la especificación de Expiración de envio de mensaje I2CP para más detalles."
+"See the I2CP Send Message"
+" Expires specification for details."
+msgstr ""
+"Por defecto, los mensajes de estado de entrega (Delivery Status) y "
+"almacenado en base de datos (Database Store)\n"
+"son empaquetados cuando el LeaseSet local (conjunto de túneles al destino"
+" local) cambia,\n"
+"cuando se entregan etiquetas de sesión "
+"(Session Tags) adicionales, \n"
+"o si los mensajes no han sido empaquetados en el minuto anterior.\n"
+"Desde la versión 0.9.2, el cliente puede configurar el número de "
+"etiquetas de sesión predeterminado a enviar\n"
+"y el umbral de bajo número de etiquetas para la sesión actual.\n"
+"Vea la especificación de opciones I2CP "
+"para más detalles.\n"
+"Las preferencias de sesión también pueden ser sustituidas para cada "
+"mensaje.\n"
+"Vea la especificación de "
+"Expiración de envio de mensaje I2CP para más detalles."
#: i2p2www/pages/site/docs/how/garlic-routing.html:227
msgid ""
-"Obviously, the additional messages are currently bundled for specific purposes,\n"
+"Obviously, the additional messages are currently bundled for specific "
+"purposes,\n"
"and not part of a general-purpose routing scheme."
-msgstr "Obviamente, los mensajes adicionales son agrupados por un propósito específico, y no son parte del esquema general de rutado."
+msgstr ""
+"Obviamente, los mensajes adicionales son agrupados por un propósito "
+"específico, y no son parte del esquema general de rutado."
#: i2p2www/pages/site/docs/how/garlic-routing.html:232
msgid ""
-"As of release 0.9.12, the Delivery Status Message is wrapped in another Garlic Message\n"
-"by the originator so that the contents are encrypted and not visible to routers on the return path."
-msgstr "Desde la versión 0.9.12, el mensaje de estado de entrega está encapsulado en otro mensaje ajo (garlic)\npor el originador, así que los contenidos están cifrados y no son visibles para los routers I2P en la ruta de retorno."
+"As of release 0.9.12, the Delivery Status Message is wrapped in another "
+"Garlic Message\n"
+"by the originator so that the contents are encrypted and not visible to "
+"routers on the return path."
+msgstr ""
+"Desde la versión 0.9.12, el mensaje de estado de entrega está encapsulado"
+" en otro mensaje ajo (garlic)\n"
+"por el originador, así que los contenidos están cifrados y no son "
+"visibles para los routers I2P en la ruta de retorno."
#: i2p2www/pages/site/docs/how/garlic-routing.html:238
msgid "Storage to the Floodfill Network Database"
@@ -6190,32 +9535,64 @@ msgid ""
"wrapped in a\n"
"Garlic Message\n"
"so it is not visible to the tunnel's outbound gateway."
-msgstr "Como se ha explicado en la página de la base de datos de la red, los LeaseSets locales son enviados a los ruters FloodFill en un mensaje de almacenamiento de la base de datos envuelto en un mensaje Garlic, con lo cual no es visible para la puerta de salida del túnel de salida."
+msgstr ""
+"Como se ha explicado en la página de la "
+"base de datos de la red, los LeaseSets locales son "
+"enviados a los ruters FloodFill en un mensaje de almacenamiento de la "
+"base de datos envuelto en un mensaje Garlic, con lo cual no es "
+"visible para la puerta de salida del túnel de salida."
#: i2p2www/pages/site/docs/how/garlic-routing.html:255
#, python-format
msgid ""
-"The Garlic Message mechanism is very flexible and provides a structure for\n"
+"The Garlic Message mechanism is very flexible and provides a structure "
+"for\n"
"implementing many types of mixnet delivery methods.\n"
"Together with the unused delay option in the\n"
-"tunnel message Delivery Instructions,\n"
-"a wide spectrum of batching, delay, mixing, and routing strategies are possible."
-msgstr "El mecanismo de los mensajes Garlic es muy flexible y proporciona una estructura para implementar muchos tipos de envíos mixnet. Junto con la opción de retardo no usada en las instrucciones de envío del mensaje del túnel, son posibles una gran cantidad de estrategias de retardo, mezclado, rutado y lotes."
+"tunnel message Delivery "
+"Instructions,\n"
+"a wide spectrum of batching, delay, mixing, and routing strategies are "
+"possible."
+msgstr ""
+"El mecanismo de los mensajes Garlic es muy flexible y proporciona una "
+"estructura para implementar muchos tipos de envíos mixnet. Junto con la "
+"opción de retardo no usada en las instrucciones de envío del mensaje "
+"del túnel, son posibles una gran cantidad de estrategias de retardo, "
+"mezclado, rutado y lotes."
#: i2p2www/pages/site/docs/how/garlic-routing.html:263
msgid ""
-"In particular, there is potential for much more flexibility at the outbound tunnel endpoint.\n"
+"In particular, there is potential for much more flexibility at the "
+"outbound tunnel endpoint.\n"
"Messages could possibly be routed from there to one of several tunnels\n"
-"(thus minimizing point-to-point connections), or multicast to several tunnels\n"
+"(thus minimizing point-to-point connections), or multicast to several "
+"tunnels\n"
"for redundancy, or streaming audio and video."
-msgstr "En particular, hay potencial para mucha más flexibilidad en el punto final del túnel de salida. Los mensajes podrían ser rutados desde ahí a uno o varios túneles (con lo cual se minimizarían las conexiones de punto a punto), o enviar a varios túneles para hacerlo redundante, o hacer streming de audio o vídeo."
+msgstr ""
+"En particular, hay potencial para mucha más flexibilidad en el punto "
+"final del túnel de salida. Los mensajes podrían ser rutados desde ahí a "
+"uno o varios túneles (con lo cual se minimizarían las conexiones de punto"
+" a punto), o enviar a varios túneles para hacerlo redundante, o hacer "
+"streming de audio o vídeo."
#: i2p2www/pages/site/docs/how/garlic-routing.html:270
msgid ""
-"Such experiments may conflict with the need to ensure security and anonymity, such\n"
-"as limiting certain routing paths, restricting the types of I2NP messages that may\n"
-"be forwarded along various paths, and enforcing certain message expiration times."
-msgstr "Estos experimentos pudrían entrar en conflicto con la necesidad de seguridad y anonimato, ya sea limitando ciertos caminos de enrutado, restringiendo los mensajes I2NP que puedan ser enviados a través de varios caminos, e imponiendo ciertos tiempos de espiración a los mensajes."
+"Such experiments may conflict with the need to ensure security and "
+"anonymity, such\n"
+"as limiting certain routing paths, restricting the types of I2NP messages"
+" that may\n"
+"be forwarded along various paths, and enforcing certain message "
+"expiration times."
+msgstr ""
+"Estos experimentos pudrían entrar en conflicto con la necesidad de "
+"seguridad y anonimato, ya sea limitando ciertos caminos de enrutado, "
+"restringiendo los mensajes I2NP que puedan ser enviados a través de "
+"varios caminos, e imponiendo ciertos tiempos de espiración a los "
+"mensajes."
#: i2p2www/pages/site/docs/how/garlic-routing.html:276
#, python-format
@@ -6223,25 +9600,40 @@ msgid ""
"As a part of\n"
"ElGamal/AES encryption,\n"
"a garlic message contains a sender\n"
-"specified amount of padding data, allowing the sender to take active countermeasures \n"
+"specified amount of padding data, allowing the sender to take active "
+"countermeasures \n"
"against traffic analysis.\n"
-"This is not currently used, beyond the requirement to pad to a multiple of 16 bytes."
-msgstr "Como parte de un cifrado ElGamal/AES, un mensaje Garlic contiene una cantidad especificada de datos de relleno, que permiten al transmisor tomar ciertas contramedidas activas contra el análisis de tráfico. Esto no se usa actualmente, mas allá de la necesidad de rellenar a un múltiplo de 16 bytes."
+"This is not currently used, beyond the requirement to pad to a multiple "
+"of 16 bytes."
+msgstr ""
+"Como parte de un cifrado ElGamal/AES, un "
+"mensaje Garlic contiene una cantidad especificada de datos de relleno, "
+"que permiten al transmisor tomar ciertas contramedidas activas contra el "
+"análisis de tráfico. Esto no se usa actualmente, mas allá de la necesidad"
+" de rellenar a un múltiplo de 16 bytes."
#: i2p2www/pages/site/docs/how/garlic-routing.html:285
#, python-format
msgid ""
"Encryption of additional messages to and from the\n"
"floodfill routers."
-msgstr "El cifrado de mensajes adicionales hacia y desde los ruters floodfill."
+msgstr ""
+"El cifrado de mensajes adicionales hacia y desde los ruters floodfill."
#: i2p2www/pages/site/docs/how/garlic-routing.html:295
msgid ""
-"The term garlic routing was first coined in Roger Dingledine's Free Haven \n"
-"Master's thesis (June 2000),\n"
+"The term garlic routing was first coined in Roger Dingledine's Free Haven"
+" \n"
+"Master's thesis "
+"(June 2000),\n"
"see Section 8.1.1 authored by\n"
"Michael J. Freedman."
-msgstr "El término de garlic routing, rutado de ajo, fue acuñado en la Master's thesis en Free Haven de Roger Dingledine (June 2000), ver sección 8.1.1 de Michael J. Freedman."
+msgstr ""
+"El término de garlic routing, rutado de ajo, fue acuñado en la Master's thesis en Free"
+" Haven de Roger Dingledine (June 2000), ver sección 8.1.1 de Michael J. Freedman."
#: i2p2www/pages/site/docs/how/garlic-routing.html:302
msgid "Onion router publications"
@@ -6260,7 +9652,9 @@ msgstr "Rutado Garlic en la Wikipedia"
msgid ""
"I2P Meeting 58 (2003) discussing the "
"implementation of garlic routing"
-msgstr "Reunión 58 de I2P (2003) discutiendo la implementación del rutado Garlic"
+msgstr ""
+"Reunión 58 de I2P (2003) discutiendo la "
+"implementación del rutado Garlic"
#: i2p2www/pages/site/docs/how/garlic-routing.html:314
msgid "Free Haven publications"
@@ -6268,9 +9662,14 @@ msgstr "Publicaciones en Free Heaven"
#: i2p2www/pages/site/docs/how/garlic-routing.html:316
msgid ""
-"Onion routing was first described in Hiding Routing Information\n"
+"Onion routing was first described in Hiding Routing Information\n"
"by David M. Goldschlag, Michael G. Reed, and Paul F. Syverson in 1996."
-msgstr "El rutado Onion fue descrito por primera vez en 1996 por David M. Goldschlag, Michael G. Reed, and Paul F. Syverson en Hiding Routing Information."
+msgstr ""
+"El rutado Onion fue descrito por primera vez en 1996 por David M. "
+"Goldschlag, Michael G. Reed, and Paul F. Syverson en Hiding Routing "
+"Information."
#: i2p2www/pages/site/docs/how/intro.html:2
msgid "A Gentle Introduction to How I2P Works"
@@ -6278,53 +9677,128 @@ msgstr "Una breve introducción de cómo funciona I2P"
#: i2p2www/pages/site/docs/how/intro.html:4
msgid ""
-"I2P is a project to build, deploy, and maintain a network supporting secure and anonymous\n"
-"communication. People using I2P are in control of the tradeoffs between anonymity, reliability,\n"
-"bandwidth usage, and latency. There is no central point in the network on which pressure can be\n"
-"exerted to compromise the integrity, security, or anonymity of the system. The network supports\n"
-"dynamic reconfiguration in response to various attacks, and has been designed to make use of\n"
-"additional resources as they become available. Of course, all aspects of the network are open and\n"
+"I2P is a project to build, deploy, and maintain a network supporting "
+"secure and anonymous\n"
+"communication. People using I2P are in control of the tradeoffs between "
+"anonymity, reliability,\n"
+"bandwidth usage, and latency. There is no central point in the network on"
+" which pressure can be\n"
+"exerted to compromise the integrity, security, or anonymity of the "
+"system. The network supports\n"
+"dynamic reconfiguration in response to various attacks, and has been "
+"designed to make use of\n"
+"additional resources as they become available. Of course, all aspects of "
+"the network are open and\n"
"freely available."
-msgstr "I2P es un proyecto para construir, desplegar y mantener una red que soporte comunicación segura y anónima. Los usuarios de I2P pueden administrar el balance entre el anonimato, fiabilidad, uso de ancho de banda y latencia. No hay un punto central en la red sobre el cual se pueda ejercer presión para comprometer la integridad, seguridad y anonimato del sistema. La red soporta reconfiguración dinámica en respuesta a diversos ataques, y ha sido diseñada para hacer uso de recursos adicionales según vayan estando disponibles. Por supuesto, todos los aspectos de la red son abiertos y están a libre disposición."
+msgstr ""
+"I2P es un proyecto para construir, desplegar y mantener una red que "
+"soporte comunicación segura y anónima. Los usuarios de I2P pueden "
+"administrar el balance entre el anonimato, fiabilidad, uso de ancho de "
+"banda y latencia. No hay un punto central en la red sobre el cual se "
+"pueda ejercer presión para comprometer la integridad, seguridad y "
+"anonimato del sistema. La red soporta reconfiguración dinámica en "
+"respuesta a diversos ataques, y ha sido diseñada para hacer uso de "
+"recursos adicionales según vayan estando disponibles. Por supuesto, todos"
+" los aspectos de la red son abiertos y están a libre disposición."
#: i2p2www/pages/site/docs/how/intro.html:14
msgid ""
-"Unlike many other anonymizing networks, I2P doesn't try to provide anonymity by hiding the\n"
-"originator of some communication and not the recipient, or the other way around. I2P is designed to\n"
-"allow peers using I2P to communicate with each other anonymously — both sender and recipient\n"
-"are unidentifiable to each other as well as to third parties. For example, today there are both\n"
-"in-I2P web sites (allowing anonymous publishing / hosting) as well as HTTP proxies to the normal web\n"
-"(allowing anonymous web browsing). Having the ability to run servers within I2P is essential, as it\n"
-"is quite likely that any outbound proxies to the normal Internet will be monitored, disabled, or\n"
+"Unlike many other anonymizing networks, I2P doesn't try to provide "
+"anonymity by hiding the\n"
+"originator of some communication and not the recipient, or the other way "
+"around. I2P is designed to\n"
+"allow peers using I2P to communicate with each other anonymously — "
+"both sender and recipient\n"
+"are unidentifiable to each other as well as to third parties. For "
+"example, today there are both\n"
+"in-I2P web sites (allowing anonymous publishing / hosting) as well as "
+"HTTP proxies to the normal web\n"
+"(allowing anonymous web browsing). Having the ability to run servers "
+"within I2P is essential, as it\n"
+"is quite likely that any outbound proxies to the normal Internet will be "
+"monitored, disabled, or\n"
"even taken over to attempt more malicious attacks."
-msgstr "A diferencia de la mayoría de las redes anónimas, I2P no intenta proporcionar anonimato ocultando al autor de una comunicación y no al destinatario, o vice versa. Al contrario: I2P está diseñada para permitir a los pares comunicarse unos con otros anónimamente - ambos, quien envía y quien recibe, no son identificables entre ellos y tampoco por terceras partes. Por ejemplo, actualmente hay sitios web I2P internos (permitiendo publicación y hospedaje anónimo) además de proxies HTTP hacia la web normal (permitiendo navegación anónima). Disponer de la posibilidad de correr servidores internamente en I2p es esencial, ya que es bastante probable que cualquier proxy de salida hacia el Internet normal pueda ser monitorizado, desactivado o incluso comprometido para luego intentar más ataques maliciosos."
+msgstr ""
+"A diferencia de la mayoría de las redes anónimas, I2P no intenta "
+"proporcionar anonimato ocultando al autor de una comunicación y no al "
+"destinatario, o vice versa. Al contrario: I2P está diseñada para permitir"
+" a los pares comunicarse unos con otros anónimamente - ambos, quien envía"
+" y quien recibe, no son identificables entre ellos y tampoco por terceras"
+" partes. Por ejemplo, actualmente hay sitios web I2P internos "
+"(permitiendo publicación y hospedaje anónimo) además de proxies HTTP "
+"hacia la web normal (permitiendo navegación anónima). Disponer de la "
+"posibilidad de correr servidores internamente en I2p es esencial, ya que"
+" es bastante probable que cualquier proxy de salida hacia el Internet "
+"normal pueda ser monitorizado, desactivado o incluso comprometido para "
+"luego intentar más ataques maliciosos."
#: i2p2www/pages/site/docs/how/intro.html:25
#, python-format
msgid ""
-"The network itself is message oriented - it is essentially a secure and anonymous IP layer, where\n"
-"messages are addressed to cryptographic keys (Destinations) and can be significantly larger than IP\n"
-"packets. Some example uses of the network include \"eepsites\" (webservers hosting normal web\n"
-"applications within I2P), a BitTorrent client (\"I2PSnark\"), or a distributed data store. With the\n"
-"help of the I2PTunnel application, we are able to stream traditional\n"
-"TCP/IP applications over I2P, such as SSH, IRC, a squid proxy, and even streaming audio. Most people\n"
-"will not use I2P directly, or even need to know they're using it. Instead their view will be of one\n"
-"of the I2P enabled applications, or perhaps as a little controller app to turn on and off various\n"
+"The network itself is message oriented - it is essentially a secure and "
+"anonymous IP layer, where\n"
+"messages are addressed to cryptographic keys (Destinations) and can be "
+"significantly larger than IP\n"
+"packets. Some example uses of the network include \"eepsites\" "
+"(webservers hosting normal web\n"
+"applications within I2P), a BitTorrent client (\"I2PSnark\"), or a "
+"distributed data store. With the\n"
+"help of the I2PTunnel application, we are "
+"able to stream traditional\n"
+"TCP/IP applications over I2P, such as SSH, IRC, a squid proxy, and even "
+"streaming audio. Most people\n"
+"will not use I2P directly, or even need to know they're using it. Instead"
+" their view will be of one\n"
+"of the I2P enabled applications, or perhaps as a little controller app to"
+" turn on and off various\n"
"proxies to enable the anonymizing functionality."
-msgstr "La red es en sí misma está orientada a mensajes - es en esencia una capa IP segura y anónima donde los mensajes son direccionados hacia claves criptográficas (Destinos) y pueden ser considerablemente más largos que los paquetes IP. Algunos ejemplos del uso de la red incluyen \"eepsites\" (servidores web hospedando aplicaciones web normales dentro de I2P), un cliente BitTorrent (\"I2PSnark\"), o un sistema de almacenaje de datos distribuido. Con la ayuda de la aplicación I2PTunnel, somos capaces de correr aplicaciones TCP/IP tradicionales sobre I2P, como SSH, IRC, un proxy Squid, e igualmente streaming de audio. Mucha gente no usará I2P directamente, o mismamente no necesitarán saber que lo están usando. En vez de eso, su percepción será la de una de las aplicaciones I2P habilitadas, o quizá la de una pequeña aplicación de control para activar y desactivar varios proxies que permitan funcionalidades de anonimato."
+msgstr ""
+"La red es en sí misma está orientada a mensajes - es en esencia una capa "
+"IP segura y anónima donde los mensajes son direccionados hacia claves "
+"criptográficas (Destinos) y pueden ser considerablemente más largos que "
+"los paquetes IP. Algunos ejemplos del uso de la red incluyen \"eepsites\""
+" (servidores web hospedando aplicaciones web normales dentro de I2P), un"
+" cliente BitTorrent (\"I2PSnark\"), o un sistema de almacenaje de datos "
+"distribuido. Con la ayuda de la aplicación "
+"I2PTunnel, somos capaces de correr aplicaciones TCP/IP tradicionales "
+"sobre I2P, como SSH, IRC, un proxy Squid, e igualmente streaming de "
+"audio. Mucha gente no usará I2P directamente, o mismamente no necesitarán"
+" saber que lo están usando. En vez de eso, su percepción será la de una "
+"de las aplicaciones I2P habilitadas, o quizá la de una pequeña aplicación"
+" de control para activar y desactivar varios proxies que permitan "
+"funcionalidades de anonimato."
#: i2p2www/pages/site/docs/how/intro.html:37
#, python-format
msgid ""
-"An essential part of designing, developing, and testing an anonymizing network is to define the threat model, since there is no such thing as \"true\" anonymity, just\n"
-"increasingly expensive costs to identify someone. Briefly, I2P's intent is to allow people to\n"
-"communicate in arbitrarily hostile environments by providing good anonymity, mixed in with\n"
-"sufficient cover traffic provided by the activity of people who require less anonymity. This way,\n"
-"some users can avoid detection by a very powerful adversary, while others will try to evade a weaker\n"
-"entity, all on the same network, where each one's messages are essentially indistinguishable\n"
+"An essential part of designing, developing, and testing an anonymizing "
+"network is to define the threat model, since there is no such thing "
+"as \"true\" anonymity, just\n"
+"increasingly expensive costs to identify someone. Briefly, I2P's intent "
+"is to allow people to\n"
+"communicate in arbitrarily hostile environments by providing good "
+"anonymity, mixed in with\n"
+"sufficient cover traffic provided by the activity of people who require "
+"less anonymity. This way,\n"
+"some users can avoid detection by a very powerful adversary, while others"
+" will try to evade a weaker\n"
+"entity, all on the same network, where each one's messages are "
+"essentially indistinguishable\n"
"from the others."
-msgstr "Una parte esencial de diseñar, desarrollar y probar una red anónima es definir el modelo de amenaza, si partimos de que no existe lo que podría ser considerado anonimato auténtico, solamente se puede hacer más costoso el identificar a alguien. Brevemente, el propósito de I2P es permitir comunicarse a la gente en ambientes arbitrariamente hostiles suministrando buen anonimato, mezclado con suficiente tráfico de cobertura proporcionado por la actividad de gente que requiere menos anonimato. De esta forma algunos usuarios pueden evitar ser detectados por poderosos adversarios, mientras otros intentarán ocultar su identidad de forma más débil, todo en la misma red, donde los mensajes de cada uno son esencialmente indistinguibles de los del resto."
+msgstr ""
+"Una parte esencial de diseñar, desarrollar y probar una red anónima es "
+"definir el modelo de amenaza, si partimos"
+" de que no existe lo que podría ser considerado anonimato auténtico, "
+"solamente se puede hacer más costoso el identificar a alguien. "
+"Brevemente, el propósito de I2P es permitir comunicarse a la gente en "
+"ambientes arbitrariamente hostiles suministrando buen anonimato, mezclado"
+" con suficiente tráfico de cobertura proporcionado por la actividad de "
+"gente que requiere menos anonimato. De esta forma algunos usuarios pueden"
+" evitar ser detectados por poderosos adversarios, mientras otros "
+"intentarán ocultar su identidad de forma más débil, todo en la misma "
+"red, donde los mensajes de cada uno son esencialmente indistinguibles"
+" de los del resto."
#: i2p2www/pages/site/docs/how/intro.html:48
msgid "Why?"
@@ -6333,11 +9807,20 @@ msgstr "¿Por qué?"
#: i2p2www/pages/site/docs/how/intro.html:49
#, python-format
msgid ""
-"There are a multitude of reasons why we need a system to support anonymous communication, and\n"
-"everyone has their own personal rationale. There are many other\n"
-"efforts working on finding ways to provide varying degrees of anonymity to people through the\n"
+"There are a multitude of reasons why we need a system to support "
+"anonymous communication, and\n"
+"everyone has their own personal rationale. There are many other\n"
+"efforts working on finding ways to provide varying degrees of "
+"anonymity to people through the\n"
"Internet, but we could not find any that met our needs or threat model."
-msgstr "Hay múltiples razones por las que necesitamos un sistema que soporte comunicaciones anónimas, y además cada uno tiene si propias razones. Hay muchos otros proyectos en Internet trabajando para encontrar formas de ofrecer varios niveles de anonimato para la gente, pero no habíamos encontrado ninguno que cumpliera nuestras necesidades o el modelo de amenazas."
+msgstr ""
+"Hay múltiples razones por las que necesitamos un sistema que soporte "
+"comunicaciones anónimas, y además cada uno tiene si propias razones. Hay "
+"muchos otros proyectos en Internet "
+"trabajando para encontrar formas de ofrecer varios niveles de anonimato "
+"para la gente, pero no habíamos encontrado ninguno que cumpliera nuestras"
+" necesidades o el modelo de amenazas."
#: i2p2www/pages/site/docs/how/intro.html:56
msgid "How?"
@@ -6346,16 +9829,40 @@ msgstr "¿Cómo?"
#: i2p2www/pages/site/docs/how/intro.html:58
#, python-format
msgid ""
-"The network at a glance is made up of a set of nodes (\"routers\") with a number of unidirectional\n"
-"inbound and outbound virtual paths (\"tunnels\", as outlined on the tunnel routing page). Each router is identified by a cryptographic RouterIdentity which is\n"
-"typically long lived. These routers communicate with each other through existing transport\n"
-"mechanisms (TCP, UDP, etc), passing various messages. Client applications have their own\n"
-"cryptographic identifier (\"Destination\") which enables it to send and receive messages. These\n"
-"clients can connect to any router and authorize the temporary allocation (\"lease\") of some tunnels\n"
-"that will be used for sending and receiving messages through the network. I2P has its own internal\n"
-"network database (using a modification of the Kademlia algorithm) for\n"
+"The network at a glance is made up of a set of nodes (\"routers\") with a"
+" number of unidirectional\n"
+"inbound and outbound virtual paths (\"tunnels\", as outlined on the tunnel routing page). Each router is "
+"identified by a cryptographic RouterIdentity which is\n"
+"typically long lived. These routers communicate with each other through "
+"existing transport\n"
+"mechanisms (TCP, UDP, etc), passing various messages. Client applications"
+" have their own\n"
+"cryptographic identifier (\"Destination\") which enables it to send and "
+"receive messages. These\n"
+"clients can connect to any router and authorize the temporary allocation "
+"(\"lease\") of some tunnels\n"
+"that will be used for sending and receiving messages through the network."
+" I2P has its own internal\n"
+"network database (using a modification of the "
+"Kademlia algorithm) for\n"
"distributing routing and contact information securely."
-msgstr "Un vistazo a la red muestra que se compone de una instalación de nodos (\"ruters\") con un número de rutas virtuales unidireccionales entrantes y salientes (Túneles, como se describen en la página tunnel routing). Cada ruter está identificado por una RouterIdentity cifrada que es e normalmente permanente. Estos ruters se comunican entre ellos a través de mecanismos de transporte existentes (TCP, UDP, etc) enviándose distintos mensajes. Las aplicaciones clientes tienen su propio identificador criptográfico (\"Destino\") que las habilita para enviar y recibir mensajes. Estos clientes pueden conectarse a cualquier ruter y autorizar la asignación temporal (\"arrendamiento\") de varios túneles que serán usados para enviar y recibir mensaje a través de la red. I2P tiene su propia base de datos de red (utilizando una modificación del algoritmo Kademlia) para distribuir información de\nrutas y contactos de forma segura."
+msgstr ""
+"Un vistazo a la red muestra que se compone de una instalación de nodos "
+"(\"ruters\") con un número de rutas virtuales unidireccionales entrantes "
+"y salientes (Túneles, como se describen en la página tunnel routing). Cada ruter está "
+"identificado por una RouterIdentity cifrada que es e normalmente "
+"permanente. Estos ruters se comunican entre ellos a través de mecanismos "
+"de transporte existentes (TCP, UDP, etc) enviándose distintos mensajes. "
+"Las aplicaciones clientes tienen su propio identificador criptográfico "
+"(\"Destino\") que las habilita para enviar y recibir mensajes. Estos "
+"clientes pueden conectarse a cualquier ruter y autorizar la asignación "
+"temporal (\"arrendamiento\") de varios túneles que serán usados para "
+"enviar y recibir mensaje a través de la red. I2P tiene su propia base de datos de red (utilizando una modificación "
+"del algoritmo Kademlia) para distribuir información de\n"
+"rutas y contactos de forma segura."
#: i2p2www/pages/site/docs/how/intro.html:71
msgid "Network topology example"
@@ -6363,64 +9870,146 @@ msgstr "Ejemplo de topología de red"
#: i2p2www/pages/site/docs/how/intro.html:73
msgid ""
-"In the above, Alice, Bob, Charlie, and Dave are all running routers with a single Destination on\n"
-"their local router. They each have a pair of 2-hop inbound tunnels per destination (labeled 1, 2, 3,\n"
-"4, 5 and 6), and a small subset of each of those router's outbound tunnel pool is shown with 2-hop\n"
-"outbound tunnels. For simplicity, Charlie's inbound tunnels and Dave's outbound tunnels are not\n"
-"shown, nor are the rest of each router's outbound tunnel pool (typically stocked with a few tunnels\n"
-"at a time). When Alice and Bob talk to each other, Alice sends a message out one of her (pink)\n"
-"outbound tunnels targeting one of Bob's (green) inbound tunnels (tunnel 3 or 4). She knows to send\n"
-"to those tunnels on the correct router by querying the network database, which is constantly updated\n"
+"In the above, Alice, Bob, Charlie, and Dave are all running routers with "
+"a single Destination on\n"
+"their local router. They each have a pair of 2-hop inbound tunnels per "
+"destination (labeled 1, 2, 3,\n"
+"4, 5 and 6), and a small subset of each of those router's outbound tunnel"
+" pool is shown with 2-hop\n"
+"outbound tunnels. For simplicity, Charlie's inbound tunnels and Dave's "
+"outbound tunnels are not\n"
+"shown, nor are the rest of each router's outbound tunnel pool (typically "
+"stocked with a few tunnels\n"
+"at a time). When Alice and Bob talk to each other, Alice sends a message "
+"out one of her (pink)\n"
+"outbound tunnels targeting one of Bob's (green) inbound tunnels (tunnel 3"
+" or 4). She knows to send\n"
+"to those tunnels on the correct router by querying the network database, "
+"which is constantly updated\n"
"as new leases are authorized and old ones expire."
-msgstr "En la imagen, Alice, Bob, Charlie y Dave están corriendo ruters con una simple Destinación en su ruter local. Cada uno de ellos tiene un par de túneles de dos saltos entrantes por destino (etiquetados como 1, 2, 3, 4, 5 y 6), y una pequeña parte del grupo de los túneles de salida de esos ruters se representa con túneles de salida de dos saltos. Para simplificar, los túneles entrantes de Charlie y los de salida de Dave no se muestran, tampoco está el resto del grupo de túneles de salida de cada ruter (típicamente compuesto por varios túneles a la vez). Cuando Alice y Bob se comunican entre ellos, Alice envía un mensaje por uno de sus túneles de salida (rosa) en dirección a uno de los túneles entrantes (verde) de Bob (túnel 3 o 4). Ella sabe cómo enviar a los túneles del ruter correcto mediante consultas a la base de datos de red, que está\nconstantemente actualizándose tan pronto cómo son autorizados nuevos contactos y expiran los viejos."
+msgstr ""
+"En la imagen, Alice, Bob, Charlie y Dave están corriendo ruters con una "
+"simple Destinación en su ruter local. Cada uno de ellos tiene un par de "
+"túneles de dos saltos entrantes por destino (etiquetados como 1, 2, 3, 4,"
+" 5 y 6), y una pequeña parte del grupo de los túneles de salida de esos "
+"ruters se representa con túneles de salida de dos saltos. Para "
+"simplificar, los túneles entrantes de Charlie y los de salida de Dave no "
+"se muestran, tampoco está el resto del grupo de túneles de salida de cada"
+" ruter (típicamente compuesto por varios túneles a la vez). Cuando Alice "
+"y Bob se comunican entre ellos, Alice envía un mensaje por uno de sus "
+"túneles de salida (rosa) en dirección a uno de los túneles entrantes "
+"(verde) de Bob (túnel 3 o 4). Ella sabe cómo enviar a los túneles del "
+"ruter correcto mediante consultas a la base de datos de red, que está\n"
+"constantemente actualizándose tan pronto cómo son autorizados nuevos "
+"contactos y expiran los viejos."
#: i2p2www/pages/site/docs/how/intro.html:85
#, python-format
msgid ""
-"If Bob wants to reply to Alice, he simply goes through the same process - send a message out one of\n"
-"his outbound tunnels targeting one of Alice's inbound tunnels (tunnel 1 or 2). To make things\n"
-"easier, most messages sent between Alice and Bob are garlic\n"
-"wrapped, bundling the sender's own current lease information so that the recipient can reply\n"
-"immediately without having to look in the network database for the current data."
-msgstr "Si Bob quiere contestar a Alice, simplemente utilizará el mismo proceso - envía un mensaje por uno de sus túneles de salida en dirección hacia uno de los túneles de entrada de Alice (túnel 1 o 2). Para hacer las cosas más sencillas, la mayor parte de los mensajes enviados entre Alice y Bob usan el envoltorio de ajo, garlic, incluyendo la información del contrato, lease, del propio remitente para que el receptor pueda responder inmediatamente sin tener que mirar en la base de datos de la red por ellos."
+"If Bob wants to reply to Alice, he simply goes through the same process -"
+" send a message out one of\n"
+"his outbound tunnels targeting one of Alice's inbound tunnels (tunnel 1 "
+"or 2). To make things\n"
+"easier, most messages sent between Alice and Bob are garlic\n"
+"wrapped, bundling the sender's own current lease information so that the "
+"recipient can reply\n"
+"immediately without having to look in the network database for the "
+"current data."
+msgstr ""
+"Si Bob quiere contestar a Alice, simplemente utilizará el mismo proceso -"
+" envía un mensaje por uno de sus túneles de salida en dirección hacia uno"
+" de los túneles de entrada de Alice (túnel 1 o 2). Para hacer las cosas "
+"más sencillas, la mayor parte de los mensajes enviados entre Alice y Bob "
+"usan el envoltorio de ajo, garlic, "
+"incluyendo la información del contrato, lease, del propio remitente para "
+"que el receptor pueda responder inmediatamente sin tener que mirar en la "
+"base de datos de la red por ellos."
#: i2p2www/pages/site/docs/how/intro.html:93
#, python-format
msgid ""
-"To deal with a wide range of attacks, I2P is fully distributed with no centralized resources - and\n"
-"hence there are no directory servers keeping statistics regarding the performance and reliability of\n"
-"routers within the network. As such, each router must keep and maintain profiles of various routers\n"
-"and is responsible for selecting appropriate peers to meet the anonymity, performance, and\n"
-"reliability needs of the users, as described in the peer selection\n"
+"To deal with a wide range of attacks, I2P is fully distributed with no "
+"centralized resources - and\n"
+"hence there are no directory servers keeping statistics regarding the "
+"performance and reliability of\n"
+"routers within the network. As such, each router must keep and maintain "
+"profiles of various routers\n"
+"and is responsible for selecting appropriate peers to meet the anonymity,"
+" performance, and\n"
+"reliability needs of the users, as described in the peer selection\n"
"page."
-msgstr "Para tratar con un amplio rango de ataques, I2P es completamente distribuida sin recursos centralizados - no hay servidores manteniendo estadísticas sobre el rendimiento y fiabilidad de los ruters dentro de la red. De esta forma cada ruter debe guardar y mantener los perfiles de varios ruters y es responsable de seleccionar los pares apropiados para satisfacer el anonimato, rendimiento y fiabilidad requeridos por los usuarios tal y como se describe en la página de selección de pares."
+msgstr ""
+"Para tratar con un amplio rango de ataques, I2P es completamente "
+"distribuida sin recursos centralizados - no hay servidores manteniendo "
+"estadísticas sobre el rendimiento y fiabilidad de los ruters dentro de la"
+" red. De esta forma cada ruter debe guardar y mantener los perfiles de "
+"varios ruters y es responsable de seleccionar los pares apropiados para "
+"satisfacer el anonimato, rendimiento y fiabilidad requeridos por los "
+"usuarios tal y como se describe en la página de selección de pares."
#: i2p2www/pages/site/docs/how/intro.html:102
#, python-format
msgid ""
-"The network itself makes use of a significant number of cryptographic\n"
-"techniques and algorithms - a full laundry list includes 2048bit ElGamal encryption, 256bit AES\n"
-"in CBC mode with PKCS#5 padding, 1024bit DSA signatures, SHA256 hashes, 2048bit Diffie-Hellman\n"
-"negotiated connections with station to station authentication, and ElGamal / AES+SessionTag."
-msgstr "La red hace uso de un gran número de técnicas criptográficas y algoritmos - una lista completa incluye el cifrado El Gamal de 2048 bits, AES de 256 bits en modo CBC con relleno PKCS#5, firmas DSA de 1024 bits, hashes SHA256, negociación de conexiones Diffie-Hellman de 2048 bits con autenticación estación a estación y ElGamal / AES+SessionTag."
+"The network itself makes use of a significant number of cryptographic\n"
+"techniques and algorithms - a full laundry list includes 2048bit "
+"ElGamal encryption, 256bit AES\n"
+"in CBC mode with PKCS#5 padding, 1024bit DSA signatures, SHA256 hashes, "
+"2048bit Diffie-Hellman\n"
+"negotiated connections with station to station authentication, and ElGamal / AES+SessionTag."
+msgstr ""
+"La red hace uso de un gran número de técnicas criptográficas y algoritmos - una "
+"lista completa incluye el cifrado El Gamal de 2048 bits, AES de 256 bits "
+"en modo CBC con relleno PKCS#5, firmas DSA de 1024 bits, hashes SHA256, "
+"negociación de conexiones Diffie-Hellman de 2048 bits con autenticación "
+"estación a estación y ElGamal / "
+"AES+SessionTag."
#: i2p2www/pages/site/docs/how/intro.html:110
msgid ""
-"Content sent over I2P is encrypted through three layers garlic encryption (used to verify the\n"
-"delivery of the message to the recipient), tunnel encryption (all messages passing through a tunnel\n"
-"is encrypted by the tunnel gateway to the tunnel endpoint), and inter router transport layer\n"
+"Content sent over I2P is encrypted through three layers garlic encryption"
+" (used to verify the\n"
+"delivery of the message to the recipient), tunnel encryption (all "
+"messages passing through a tunnel\n"
+"is encrypted by the tunnel gateway to the tunnel endpoint), and inter "
+"router transport layer\n"
"encryption (e.g. the TCP transport uses AES256 with ephemeral keys)."
-msgstr "El contenido enviado sobre I2P está cifrado a través del cifrado garlic de tres capas (usado para verificar la entrega del mensaje a destinatario), cifrado de túnel (todos los mensajes cruzando a través de un túnel están cifrados desde el túnel de salida hasta el túnel de destino final) y cifrado de la capa de transporte inter-router (e. g. el transporte TCP usa AES256 con claves efímeras)."
+msgstr ""
+"El contenido enviado sobre I2P está cifrado a través del cifrado garlic "
+"de tres capas (usado para verificar la entrega del mensaje a "
+"destinatario), cifrado de túnel (todos los mensajes cruzando a través de "
+"un túnel están cifrados desde el túnel de salida hasta el túnel de "
+"destino final) y cifrado de la capa de transporte inter-router (e. g. el "
+"transporte TCP usa AES256 con claves efímeras)."
#: i2p2www/pages/site/docs/how/intro.html:117
msgid ""
-"End-to-end (I2CP) encryption (client application to server application) was disabled in I2P release\n"
-"0.6; end-to-end (garlic) encryption (I2P client router to I2P server router) from Alice's router \"a\"\n"
-"to Bob's router \"h\" remains. Notice the different use of terms! All data from a to h is end-to-end\n"
-"encrypted, but the I2CP connection between the I2P router and the applications is not end-to-end\n"
-"encrypted! A and h are the routers of Alice and Bob, while Alice and Bob in following chart are the\n"
+"End-to-end (I2CP) encryption (client application to server application) "
+"was disabled in I2P release\n"
+"0.6; end-to-end (garlic) encryption (I2P client router to I2P server "
+"router) from Alice's router \"a\"\n"
+"to Bob's router \"h\" remains. Notice the different use of terms! All "
+"data from a to h is end-to-end\n"
+"encrypted, but the I2CP connection between the I2P router and the "
+"applications is not end-to-end\n"
+"encrypted! A and h are the routers of Alice and Bob, while Alice and Bob "
+"in following chart are the\n"
"applications running atop of I2P."
-msgstr "El cifrado (I2CP) punto a punto (aplicación cliente hacia aplicación servidor) fue deshabilitado en la versión 0.6 de I2P; el cifrado (garlic) punto a punto (ruter cliente I2P hacia ruter servidor I2P) desde el ruter de Alice \"a\" hasta el ruter de Bob \"h\" aún permanece. ¡Observe el uso diferente de los términos! Todos los datos desde \"a\" hasta \"h\" están cifrados punto a punto, pero las conexiones I2CP entre el ruter I2P y las aplicaciones no son cifradas punto a punto. \"A\" y \"h\" son los ruters de Alice y Bob, mientras que, y siguiendo el diagrama, Alice y Bob son las aplicaciones corriendo sobre I2P."
+msgstr ""
+"El cifrado (I2CP) punto a punto (aplicación cliente hacia aplicación "
+"servidor) fue deshabilitado en la versión 0.6 de I2P; el cifrado (garlic)"
+" punto a punto (ruter cliente I2P hacia ruter servidor I2P) desde el "
+"ruter de Alice \"a\" hasta el ruter de Bob \"h\" aún permanece. ¡Observe "
+"el uso diferente de los términos! Todos los datos desde \"a\" hasta "
+"\"h\" están cifrados punto a punto, pero las conexiones I2CP entre el "
+"ruter I2P y las aplicaciones no son cifradas punto a punto. \"A\" y \"h\""
+" son los ruters de Alice y Bob, mientras que, y siguiendo el diagrama, "
+"Alice y Bob son las aplicaciones corriendo sobre I2P."
#: i2p2www/pages/site/docs/how/intro.html:126
msgid "End to end layered encryption"
@@ -6431,28 +10020,57 @@ msgstr "Cifrado por capas de punto a punto"
msgid ""
"The specific use of these algorithms are outlined elsewhere."
-msgstr "El uso específico de estos algoritmos está descrito en otra parte."
+msgstr ""
+"El uso específico de estos algoritmos está descrito en otra parte."
#: i2p2www/pages/site/docs/how/intro.html:132
msgid ""
-"The two main mechanisms for allowing people who need strong anonymity to use the network are\n"
-"explicitly delayed garlic routed messages and more comprehensive tunnels to include support for\n"
-"pooling and mixing messages. These are currently planned for release 3.0, but garlic routed messages\n"
-"with no delays and FIFO tunnels are currently in place. Additionally, the 2.0 release will allow\n"
-"people to set up and operate behind restricted routes (perhaps with trusted peers), as well as the\n"
+"The two main mechanisms for allowing people who need strong anonymity to "
+"use the network are\n"
+"explicitly delayed garlic routed messages and more comprehensive tunnels "
+"to include support for\n"
+"pooling and mixing messages. These are currently planned for release 3.0,"
+" but garlic routed messages\n"
+"with no delays and FIFO tunnels are currently in place. Additionally, the"
+" 2.0 release will allow\n"
+"people to set up and operate behind restricted routes (perhaps with "
+"trusted peers), as well as the\n"
"deployment of more flexible and anonymous transports."
-msgstr "Los dos mecanismos principales que permiten usar la red a gente que necesita un fuerte anonimato son explícitamente mensajes enrutados garlic con retardo y túneles más completos que incluyan agrupamiento y mezcla de mensajes. Estos están actualmente planeados para la release 3.0, pero los mensajes enrutados garlic sin retardo y túneles FIFO están ya implementados. Adicionalmente la versión 2.0 permitirá a los usuarios establecerse y operar detrás de ruters restrictivos (puede que con pares de confianza), así como el despliegue de transportes más flexibles y anónimos."
+msgstr ""
+"Los dos mecanismos principales que permiten usar la red a gente que "
+"necesita un fuerte anonimato son explícitamente mensajes enrutados garlic"
+" con retardo y túneles más completos que incluyan agrupamiento y mezcla "
+"de mensajes. Estos están actualmente planeados para la release 3.0, pero "
+"los mensajes enrutados garlic sin retardo y túneles FIFO están ya "
+"implementados. Adicionalmente la versión 2.0 permitirá a los usuarios "
+"establecerse y operar detrás de ruters restrictivos (puede que con pares "
+"de confianza), así como el despliegue de transportes más flexibles y "
+"anónimos."
#: i2p2www/pages/site/docs/how/intro.html:141
#, python-format
msgid ""
-"Some questions have been raised with regards to the scalability of I2P, and reasonably so. There\n"
-"will certainly be more analysis over time, but peer lookup and integration should be bounded by\n"
-"O(log(N))
due to the network database's algorithm, while end\n"
-"to end messages should be O(1)
(scale free), since messages go out K hops through the\n"
-"outbound tunnel and another K hops through the inbound tunnel, with K no longer than 3. The size of\n"
+"Some questions have been raised with regards to the scalability of I2P, "
+"and reasonably so. There\n"
+"will certainly be more analysis over time, but peer lookup and "
+"integration should be bounded by\n"
+"O(log(N))
due to the network "
+"database's algorithm, while end\n"
+"to end messages should be O(1)
(scale free), since messages "
+"go out K hops through the\n"
+"outbound tunnel and another K hops through the inbound tunnel, with K no "
+"longer than 3. The size of\n"
"the network (N) bears no impact."
-msgstr "Han surgido algunas preguntas referentes a la escalabilidad de I2P. Habrá ciertamente más análisis con el tiempo, pero la búsqueda e integración de pares debería ser limitado por O(log(N))
debido al algoritmo de base de datos de red, mientras que los mensajes punto a punto serían O(1)
(escala libre), puesto que los mensajes pasan por K saltos a través del túnel de salida y otros K saltos por el túnel de entrada, donde K no es mayor de 3. El tamaño de la red (N) no acarrea impacto."
+msgstr ""
+"Han surgido algunas preguntas referentes a la escalabilidad de I2P. Habrá"
+" ciertamente más análisis con el tiempo, pero la búsqueda e integración "
+"de pares debería ser limitado por O(log(N))
debido al "
+"algoritmo de base de datos de red, mientras que"
+" los mensajes punto a punto serían O(1)
(escala libre), "
+"puesto que los mensajes pasan por K saltos a través del túnel de salida y"
+" otros K saltos por el túnel de entrada, donde K no es mayor de 3. El "
+"tamaño de la red (N) no acarrea impacto."
#: i2p2www/pages/site/docs/how/intro.html:150
msgid "When?"
@@ -6462,11 +10080,24 @@ msgstr "¿Cuándo?"
#, python-format
msgid ""
"I2P initially began in Feb 2003 as a proposed modification to Freenet to allow it to use alternate transports, such as Freenet to allow it to use "
+"alternate transports, such as JMS, then grew into its own as an\n"
-"'anonCommFramework' in April 2003, turning into I2P in July, with code being written in earnest\n"
-"starting in August '03. I2P is currently under development, following the roadmap."
-msgstr "I2P comenzó inicialmente en 2003 como una propuesta de modificar\nFreenet para permitir el uso de transportes alternativos, como puede ser JMS , después\nse desarrolló con identidad propia como una 'anonCommFramework' en Abril de 2003,\nconvirtiéndose en I2P en Julio y comenzando a escribir código seriamente en Agosto de 2003.\nI2P está actualmente bajo desarrollo siguendo la hoja de ruta."
+"'anonCommFramework' in April 2003, turning into I2P in July, with code "
+"being written in earnest\n"
+"starting in August '03. I2P is currently under development, following the"
+" roadmap."
+msgstr ""
+"I2P comenzó inicialmente en 2003 como una propuesta de modificar\n"
+"Freenet para permitir el uso de"
+" transportes alternativos, como puede ser JMS , después\n"
+"se desarrolló con identidad propia como una 'anonCommFramework' en Abril "
+"de 2003,\n"
+"convirtiéndose en I2P en Julio y comenzando a escribir código seriamente "
+"en Agosto de 2003.\n"
+"I2P está actualmente bajo desarrollo siguendo la hoja de ruta."
#: i2p2www/pages/site/docs/how/intro.html:161
msgid "Who?"
@@ -6475,15 +10106,36 @@ msgstr "¿Quiénes?"
#: i2p2www/pages/site/docs/how/intro.html:162
#, python-format
msgid ""
-"We have a small team spread around several continents, working to advance\n"
-"different aspects of the project. We are very open to other developers who want to get involved and\n"
-"anyone else who would like to contribute in other ways, such as critiques, peer review, testing,\n"
-"writing I2P enabled applications, or documentation. The entire system is open source - the router\n"
-"and most of the SDK are outright public domain with some BSD and Cryptix licensed code, while some\n"
-"applications like I2PTunnel and I2PSnark are GPL. Almost everything is written in Java (1.5+),\n"
-"though some third party applications are being written in Python and other languages. The code works\n"
-"on Sun Java SE and other Java Virtual Machines."
-msgstr "Tenemos un pequeño equipo desperdigado por varios continentes y trabajando en el avance de diferentes aspectos del proyecto. Estamos abiertos a otros desarrolladores que deseen involucrarse en el proyecto, y a cualquier otra persona que quiera contribuir de cualquier forma, como críticas, revisión de pares, pruebas, programación de aplicaciones compatibles I2P, o documentación. El sistema completo es código abierto - el ruter y la mayor parte del SDK tienen licencia de dominio público con algo de código licenciado con BSD y Cryptix, mientras que aplicaciones como I2PTunnel e I2PSnark son GPL. Casi todo está escrito en Java (1.5+), aunque algunas aplicaciones de terceros están siendo escritas en Python u otros lenguajes. El código funciona en Sun Java SE\ny otras máquinas virtuales Java."
+"We have a small team spread around several "
+"continents, working to advance\n"
+"different aspects of the project. We are very open to other developers "
+"who want to get involved and\n"
+"anyone else who would like to contribute in other ways, such as "
+"critiques, peer review, testing,\n"
+"writing I2P enabled applications, or documentation. The entire system is "
+"open source - the router\n"
+"and most of the SDK are outright public domain with some BSD and Cryptix "
+"licensed code, while some\n"
+"applications like I2PTunnel and I2PSnark are GPL. Almost everything is "
+"written in Java (1.5+),\n"
+"though some third party applications are being written in Python and "
+"other languages. The code works\n"
+"on Sun Java SE and other Java Virtual"
+" Machines."
+msgstr ""
+"Tenemos un pequeño equipo desperdigado por "
+"varios continentes y trabajando en el avance de diferentes aspectos del "
+"proyecto. Estamos abiertos a otros desarrolladores que deseen "
+"involucrarse en el proyecto, y a cualquier otra persona que quiera "
+"contribuir de cualquier forma, como críticas, revisión de pares, pruebas,"
+" programación de aplicaciones compatibles I2P, o documentación. El "
+"sistema completo es código abierto - el ruter y la mayor parte del SDK "
+"tienen licencia de dominio público con algo de código licenciado con BSD "
+"y Cryptix, mientras que aplicaciones como I2PTunnel e I2PSnark son GPL. "
+"Casi todo está escrito en Java (1.5+), aunque algunas aplicaciones de "
+"terceros están siendo escritas en Python u otros lenguajes. El código "
+"funciona en Sun Java SE\n"
+"y otras máquinas virtuales Java."
#: i2p2www/pages/site/docs/how/intro.html:173
msgid "Where?"
@@ -6492,10 +10144,19 @@ msgstr "¿Dónde?"
#: i2p2www/pages/site/docs/how/intro.html:174
#, python-format
msgid ""
-"Anyone interested should join us on the IRC channel #i2p-dev (hosted concurrently on irc.freenode.net,\n"
-"irc.postman.i2p, irc.echelon.i2p, irc.dg.i2p and irc.oftc.net). There are currently no\n"
-"scheduled development meetings, however archives are available."
-msgstr "Cualquier interesado debe unirse a nosotros en el IRC en el canal #i2p-dev (alojado concurrentemente en irc.freenode.net,\nirc.postman.i2p, irc.echelon.i2p, irc.dg.i2p and irc.oftc.net). Actualmente no hay\nreuniones de desarrollo programadas, sin embargo los archivos están disponibles."
+"Anyone interested should join us on the IRC channel #i2p-dev (hosted "
+"concurrently on irc.freenode.net,\n"
+"irc.postman.i2p, irc.echelon.i2p, irc.dg.i2p and irc.oftc.net). There are"
+" currently no\n"
+"scheduled development meetings, however archives"
+" are available."
+msgstr ""
+"Cualquier interesado debe unirse a nosotros en el IRC en el canal #i2p-"
+"dev (alojado concurrentemente en irc.freenode.net,\n"
+"irc.postman.i2p, irc.echelon.i2p, irc.dg.i2p and irc.oftc.net). "
+"Actualmente no hay\n"
+"reuniones de desarrollo programadas, sin embargo los archivos están disponibles."
#: i2p2www/pages/site/docs/how/intro.html:180
#, python-format
@@ -6518,38 +10179,66 @@ msgstr "Octubre de 2014"
#: i2p2www/pages/site/docs/how/network-database.html:8
msgid ""
"I2P's netDb is a specialized distributed database, containing \n"
-"just two types of data - router contact information (RouterInfos) and destination contact\n"
-"information (LeaseSets). Each piece of data is signed by the appropriate party and verified\n"
-"by anyone who uses or stores it. In addition, the data has liveliness information\n"
-"within it, allowing irrelevant entries to be dropped, newer entries to replace\n"
+"just two types of data - router contact information (RouterInfos) "
+"and destination contact\n"
+"information (LeaseSets). Each piece of data is signed by the "
+"appropriate party and verified\n"
+"by anyone who uses or stores it. In addition, the data has liveliness "
+"information\n"
+"within it, allowing irrelevant entries to be dropped, newer entries to "
+"replace\n"
"older ones, and protection against certain classes of attack."
-msgstr "La netDb de I2P es una base de datos distribuida especializada que contiene 2 tipos de datos - información de contacto del ruter y la información de contacto de la destinación. Cada parte de los datos es firmada por la parte apropiada y verificada por cualquiera que las use o las almacene. Además, los datos tienen información cambiante, permitiendo que las entradas irrelevantes sean desechadas, que nuevas entradas puedan reemplazar las antiguas y protección contra cierto tipos de ataques."
+msgstr ""
+"La netDb de I2P es una base de datos distribuida especializada que "
+"contiene 2 tipos de datos - información de contacto del ruter y la "
+"información de contacto de la destinación. Cada parte de los datos es "
+"firmada por la parte apropiada y verificada por cualquiera que las use o "
+"las almacene. Además, los datos tienen información cambiante, permitiendo"
+" que las entradas irrelevantes sean desechadas, que nuevas entradas "
+"puedan reemplazar las antiguas y protección contra cierto tipos de "
+"ataques."
#: i2p2www/pages/site/docs/how/network-database.html:17
msgid ""
"The netDb is distributed with a simple technique called \"floodfill\",\n"
-"where a subset of all routers, called \"floodfill routers\", maintains the distributed database."
-msgstr "La netDb se distribuye con una técnica simple llamada \"FloodFill\", donde un subconjunto de ruters, llamados ruters \"floodfill\", mantienen la base de datos distribuida."
+"where a subset of all routers, called \"floodfill routers\", maintains "
+"the distributed database."
+msgstr ""
+"La netDb se distribuye con una técnica simple llamada \"FloodFill\", "
+"donde un subconjunto de ruters, llamados ruters \"floodfill\", mantienen "
+"la base de datos distribuida."
#: i2p2www/pages/site/docs/how/network-database.html:25
msgid ""
-"When an I2P router wants to contact another router, they need to know some \n"
-"key pieces of data - all of which are bundled up and signed by the router into\n"
-"a structure called the \"RouterInfo\", which is distributed with the SHA256 of the router's identity\n"
+"When an I2P router wants to contact another router, they need to know "
+"some \n"
+"key pieces of data - all of which are bundled up and signed by the router"
+" into\n"
+"a structure called the \"RouterInfo\", which is distributed with the "
+"SHA256 of the router's identity\n"
"as the key. The structure itself contains:"
-msgstr "Cuando un ruter I2P quiere contactar con otro ruter, necesitan conocer algunas partes claves de los datos - estas partes están agrupadas y firmadas por el ruter dentro de una estructura llamda \"RouterInfo\", que es distribuida con el hash SHA256 de la identidad del ruter como una clave de cifrado. La estructura en sí misma contiene:"
+msgstr ""
+"Cuando un ruter I2P quiere contactar con otro ruter, necesitan conocer "
+"algunas partes claves de los datos - estas partes están agrupadas y "
+"firmadas por el ruter dentro de una estructura llamda \"RouterInfo\", que"
+" es distribuida con el hash SHA256 de la identidad del ruter como una "
+"clave de cifrado. La estructura en sí misma contiene:"
#: i2p2www/pages/site/docs/how/network-database.html:32
msgid ""
"The router's identity (a 2048bit ElGamal encryption key, a 1024bit DSA "
"signing key, and a certificate)"
-msgstr "La identidad del ruter (una calve de cifrado ElGamal de 2048 bits, una clave de firmado DSA de 1024 bits y un certificado)"
+msgstr ""
+"La identidad del ruter (una calve de cifrado ElGamal de 2048 bits, una "
+"clave de firmado DSA de 1024 bits y un certificado)"
#: i2p2www/pages/site/docs/how/network-database.html:33
msgid ""
-"The contact addresses at which it can be reached (e.g. TCP: example.org port"
-" 4108)"
-msgstr "La dirección de contacto en la que puede ser accedida (por ejemplo TCP: example.org puerto 4108)"
+"The contact addresses at which it can be reached (e.g. TCP: example.org "
+"port 4108)"
+msgstr ""
+"La dirección de contacto en la que puede ser accedida (por ejemplo TCP: "
+"example.org puerto 4108)"
#: i2p2www/pages/site/docs/how/network-database.html:34
msgid "When this was published"
@@ -6560,21 +10249,26 @@ msgid "A set of arbitrary text options"
msgstr "Un conjunto de opciones de texto arbitrarias"
#: i2p2www/pages/site/docs/how/network-database.html:36
-msgid ""
-"The signature of the above, generated by the identity's DSA signing key"
-msgstr "La firma de todo lo anterior, generada por clave de firma DSA de la identidad."
+msgid "The signature of the above, generated by the identity's DSA signing key"
+msgstr ""
+"La firma de todo lo anterior, generada por clave de firma DSA de la "
+"identidad."
#: i2p2www/pages/site/docs/how/network-database.html:39
msgid ""
"The following text options, while not strictly required, are expected\n"
"to be present:"
-msgstr "Las siguientes opciones de texto, que aunque no son requeridas explicitamente se espera que esten presentes:"
+msgstr ""
+"Las siguientes opciones de texto, que aunque no son requeridas "
+"explicitamente se espera que esten presentes:"
#: i2p2www/pages/site/docs/how/network-database.html:45
msgid ""
-"Capabilities flags - used to indicate floodfill participation, approximate "
-"bandwidth, and perceived reachability"
-msgstr "Datos de capacidad - usados para indicar si se participa como floodfill, ancho de banda aproximado y la accesibilidad observada."
+"Capabilities flags - used to indicate floodfill participation, "
+"approximate bandwidth, and perceived reachability"
+msgstr ""
+"Datos de capacidad - usados para indicar si se participa como floodfill, "
+"ancho de banda aproximado y la accesibilidad observada."
#: i2p2www/pages/site/docs/how/network-database.html:47
#: i2p2www/pages/site/docs/how/network-database.html:250
@@ -6616,50 +10310,85 @@ msgstr "No alcanzable"
#: i2p2www/pages/site/docs/how/network-database.html:60
msgid "The core library version, always the same as the router version"
-msgstr "La versión de la librería del núcleo, siempre la misma que la versión del ruter"
+msgstr ""
+"La versión de la librería del núcleo, siempre la misma que la versión del"
+" ruter"
#: i2p2www/pages/site/docs/how/network-database.html:64
msgid ""
"Basic network compatibility - A router will refuse to communicate with a "
"peer having a different netId"
-msgstr "Compatibilidad básica de la red - Un ruter no se comunicará con un par que tenga un netId diferente"
+msgstr ""
+"Compatibilidad básica de la red - Un ruter no se comunicará con un par "
+"que tenga un netId diferente"
#: i2p2www/pages/site/docs/how/network-database.html:67
msgid "Used to determine compatibility with newer features and messages"
-msgstr "Se utiliza para determinar la compatibilidad con las nuevas características y mensajes."
+msgstr ""
+"Se utiliza para determinar la compatibilidad con las nuevas "
+"características y mensajes."
#: i2p2www/pages/site/docs/how/network-database.html:70
msgid ""
-"Always sent as 90m, for compatibility with an older scheme where routers published their actual uptime,\n"
+"Always sent as 90m, for compatibility with an older scheme where routers "
+"published their actual uptime,\n"
"and only sent tunnel requests to peers whose was more than 60m"
-msgstr "Siempre a 90 min, para mantener la compatibilidad con el viejo esquema donde los ruters publican su tiempo encendidos actual, y sólo envían peticiones de túneles a pares con mas de 60 min."
+msgstr ""
+"Siempre a 90 min, para mantener la compatibilidad con el viejo esquema "
+"donde los ruters publican su tiempo encendidos actual, y sólo envían "
+"peticiones de túneles a pares con mas de 60 min."
#: i2p2www/pages/site/docs/how/network-database.html:76
msgid ""
"These values are used by other routers for basic decisions.\n"
-"Should we connect to this router? Should we attempt to route a tunnel through this router?\n"
-"The bandwidth capability flag, in particular, is used only to determine whether\n"
+"Should we connect to this router? Should we attempt to route a tunnel "
+"through this router?\n"
+"The bandwidth capability flag, in particular, is used only to determine "
+"whether\n"
"the router meets a minimum threshold for routing tunnels.\n"
-"Above the minimum threshold, the advertised bandwidth is not used or trusted anywhere\n"
-"in the router, except for display in the user interface and for debugging and network analysis."
-msgstr "Estos valores pueden ser usados por otros ruters para tomar decisiones básicas. ¿Deberíamos conectar con este ruter? ¿Deberíamos intentar rutar un túnel a través de ese ruter?\nEn particular, la opción de la capacidad de ancho de banda sólo se usa para determinar cuando el ruter cumple un umbral para poder rutar túneles. Por encima del umbral mínimo el ancho de banda anunciado no es usado o confiable en ningún sitio del ruter, excepto para mostrar en el interfaz del usuario para depurar y para el análisis de tráfico."
+"Above the minimum threshold, the advertised bandwidth is not used or "
+"trusted anywhere\n"
+"in the router, except for display in the user interface and for debugging"
+" and network analysis."
+msgstr ""
+"Estos valores pueden ser usados por otros ruters para tomar decisiones "
+"básicas. ¿Deberíamos conectar con este ruter? ¿Deberíamos intentar rutar "
+"un túnel a través de ese ruter?\n"
+"En particular, la opción de la capacidad de ancho de banda sólo se usa "
+"para determinar cuando el ruter cumple un umbral para poder rutar "
+"túneles. Por encima del umbral mínimo el ancho de banda anunciado no es "
+"usado o confiable en ningún sitio del ruter, excepto para mostrar en el "
+"interfaz del usuario para depurar y para el análisis de tráfico."
#: i2p2www/pages/site/docs/how/network-database.html:86
#, python-format
msgid ""
"Additional text options include\n"
-"a small number of statistics about the router's health, which are aggregated by\n"
+"a small number of statistics about the router's health, which are "
+"aggregated by\n"
"sites such as %(stats)s\n"
"for network performance analysis and debugging.\n"
"These statistics were chosen to provide data crucial to the developers,\n"
-"such as tunnel build success rates, while balancing the need for such data\n"
+"such as tunnel build success rates, while balancing the need for such "
+"data\n"
"with the side-effects that could result from revealing this data.\n"
"Current statistics are limited to:"
-msgstr "La opciones de texto adicionales incluyen un pequeño número de estadísticas sobre la salud de los ruters, que son añadidas por las webs como %(stats)s, estadísticas, para el análisis del rendimiento de la red y su depuración. Estas estadísticas fueron elegidas para proporcionar datos importantes a los desarrolladores, como la tasa de éxito al construir los túneles, mientras se hace un balanceo de los posibles daños causados por la revelación de estos datos y necesidad de obtenerlos. Estas estadísticas están limitadas a:"
+msgstr ""
+"La opciones de texto adicionales incluyen un pequeño número de "
+"estadísticas sobre la salud de los ruters, que son añadidas por las webs "
+"como %(stats)s, estadísticas, para el "
+"análisis del rendimiento de la red y su depuración. Estas estadísticas "
+"fueron elegidas para proporcionar datos importantes a los "
+"desarrolladores, como la tasa de éxito al construir los túneles, mientras"
+" se hace un balanceo de los posibles daños causados por la revelación de "
+"estos datos y necesidad de obtenerlos. Estas estadísticas están limitadas"
+" a:"
#: i2p2www/pages/site/docs/how/network-database.html:97
msgid "Exploratory tunnel build success, reject, and timeout rates"
-msgstr "Tasas de creación de túneles exploratorios exitosos, rechazados y con periodo de espera agotado"
+msgstr ""
+"Tasas de creación de túneles exploratorios exitosos, rechazados y con "
+"periodo de espera agotado"
#: i2p2www/pages/site/docs/how/network-database.html:98
msgid "1 hour average number of participating tunnels"
@@ -6667,17 +10396,25 @@ msgstr "Media del número de túneles participantes en 1 hora"
#: i2p2www/pages/site/docs/how/network-database.html:101
msgid ""
-"Floodfill routers publish additional data on the number of entries in their "
-"network database."
-msgstr "Los routers de inundación (floodfill) publican datos adicionales sobre el número de entradas en sus base de datos de red."
+"Floodfill routers publish additional data on the number of entries in "
+"their network database."
+msgstr ""
+"Los routers de inundación (floodfill) publican datos adicionales sobre el"
+" número de entradas en sus base de datos de red."
#: i2p2www/pages/site/docs/how/network-database.html:105
msgid ""
"The data published can be seen in the router's user interface,\n"
"but is not used or trusted within the router.\n"
-"As the network has matured, we have gradually removed most of the published\n"
-"statistics to improve anonymity, and we plan to remove more in future releases."
-msgstr "Los datos publicados pueden verse en en interfaz del ruter,, pero el ruter no los usa ni confía en ellos. Según madura la red, hemos eliminado la mayoría de las estadísticas publicadas para mejorar el anonimato, y tenemos planeado eliminar más en las próximas versiones."
+"As the network has matured, we have gradually removed most of the "
+"published\n"
+"statistics to improve anonymity, and we plan to remove more in future "
+"releases."
+msgstr ""
+"Los datos publicados pueden verse en en interfaz del ruter,, pero el "
+"ruter no los usa ni confía en ellos. Según madura la red, hemos eliminado"
+" la mayoría de las estadísticas publicadas para mejorar el anonimato, y "
+"tenemos planeado eliminar más en las próximas versiones."
#: i2p2www/pages/site/docs/how/network-database.html:113
msgid "RouterInfo specification"
@@ -6694,16 +10431,23 @@ msgstr "Caducidad de RouterInfo"
#: i2p2www/pages/site/docs/how/network-database.html:120
msgid ""
"RouterInfos have no set expiration time.\n"
-"Each router is free to maintain its own local policy to trade off the frequency of RouterInfo lookups\n"
+"Each router is free to maintain its own local policy to trade off the "
+"frequency of RouterInfo lookups\n"
"with memory or disk usage.\n"
"In the current implementation, there are the following general policies:"
-msgstr "RouterInfo no tienen tiempo de caducidad. Cada ruter puede mantener su propia política local a la hora de controlar la frecuencia de las búsquedas de RouterInfo y el uso de memoria y espacio en le disco. En la implementación actual, estas son las políticas generales:"
+msgstr ""
+"RouterInfo no tienen tiempo de caducidad. Cada ruter puede mantener su "
+"propia política local a la hora de controlar la frecuencia de las "
+"búsquedas de RouterInfo y el uso de memoria y espacio en le disco. En la "
+"implementación actual, estas son las políticas generales:"
#: i2p2www/pages/site/docs/how/network-database.html:127
msgid ""
-"There is no expiration during the first hour of uptime, as the persistent "
-"stored data may be old."
-msgstr "No existe vencimiento durante la primera hora encendido, ya que los datos almacenados podrían ser viejos."
+"There is no expiration during the first hour of uptime, as the persistent"
+" stored data may be old."
+msgstr ""
+"No existe vencimiento durante la primera hora encendido, ya que los datos"
+" almacenados podrían ser viejos."
#: i2p2www/pages/site/docs/how/network-database.html:130
msgid "There is no expiration if there are 25 or less RouterInfos."
@@ -6711,23 +10455,37 @@ msgstr "No existe vencimiento si hay 25 o menos menos routerInfos"
#: i2p2www/pages/site/docs/how/network-database.html:133
msgid ""
-"As the number of local RouterInfos grows, the expiration time shrinks, in an attempt to maintain\n"
-"a reasonable number RouterInfos. The expiration time with less than 120 routers is 72 hours,\n"
+"As the number of local RouterInfos grows, the expiration time shrinks, in"
+" an attempt to maintain\n"
+"a reasonable number RouterInfos. The expiration time with less than 120 "
+"routers is 72 hours,\n"
"while expiration time with 300 routers is around 30 hours."
-msgstr "Según aumenta el número de RouterInfos, el tiempo de espiración disminuye, en el intento de mantener un número razonable de RouterInfos . El número de espiración con menos de 120 ruters es de 72 horas, mientras que el tiempo de caducidad con 300 ruters es de 30 horas."
+msgstr ""
+"Según aumenta el número de RouterInfos, el tiempo de espiración "
+"disminuye, en el intento de mantener un número razonable de RouterInfos ."
+" El número de espiración con menos de 120 ruters es de 72 horas, mientras"
+" que el tiempo de caducidad con 300 ruters es de 30 horas."
#: i2p2www/pages/site/docs/how/network-database.html:138
#, python-format
msgid ""
-"RouterInfos containing SSU introducers expire in about an hour, as\n"
+"RouterInfos containing SSU introducers expire in "
+"about an hour, as\n"
"the introducer list expires in about that time."
-msgstr "Los RoutersInfos que contienen introductores SSU expiran en 1 hora más o menos, ya que la lista del introductor expiran en ese mismo tiempo."
+msgstr ""
+"Los RoutersInfos que contienen introductores SSU "
+"expiran en 1 hora más o menos, ya que la lista del introductor expiran en"
+" ese mismo tiempo."
#: i2p2www/pages/site/docs/how/network-database.html:142
msgid ""
-"Floodfills use a short expiration time (1 hour) for all local RouterInfos, as valid RouterInfos will\n"
+"Floodfills use a short expiration time (1 hour) for all local "
+"RouterInfos, as valid RouterInfos will\n"
"be frequently republished to them."
-msgstr "Los FloodFills tienen un tiempo de expiración corto (1 hora) para todos los RoutersInfos locales, ya que como RoutersInfos válidos serán re publicados."
+msgstr ""
+"Los FloodFills tienen un tiempo de expiración corto (1 hora) para todos "
+"los RoutersInfos locales, ya que como RoutersInfos válidos serán re "
+"publicados."
#: i2p2www/pages/site/docs/how/network-database.html:148
msgid "RouterInfo Persistent Storage"
@@ -6737,14 +10495,22 @@ msgstr "Almacenamiento persistente de RouterInfo"
msgid ""
"RouterInfos are periodically written to disk so that they are available "
"after a restart."
-msgstr "Los RoutersInfos son periodicamente escritos en el disco duro para que estén disponibles después de reiniciar."
+msgstr ""
+"Los RoutersInfos son periodicamente escritos en el disco duro para que "
+"estén disponibles después de reiniciar."
#: i2p2www/pages/site/docs/how/network-database.html:157
msgid ""
-"The second piece of data distributed in the netDb is a \"LeaseSet\" - documenting\n"
-"a group of tunnel entry points (leases) for a particular client destination.\n"
+"The second piece of data distributed in the netDb is a \"LeaseSet\" - "
+"documenting\n"
+"a group of tunnel entry points (leases) for a particular client "
+"destination.\n"
"Each of these leases specify the following information:"
-msgstr "La segunda parte de los datos distribuidos en la netDb es un \"LeaseSet\" - el cual documenta un conjunto de puntos de entradas de túnel (leases o contratos) para una destinación de un cliente en particular. Cada uno de estos leases especifica la siguiente información:"
+msgstr ""
+"La segunda parte de los datos distribuidos en la netDb es un \"LeaseSet\""
+" - el cual documenta un conjunto de puntos de entradas de túnel "
+"(leases o contratos) para una destinación de un cliente en "
+"particular. Cada uno de estos leases especifica la siguiente información:"
#: i2p2www/pages/site/docs/how/network-database.html:163
msgid "The tunnel gateway router (by specifying its identity)"
@@ -6762,7 +10528,9 @@ msgstr "Cuando expirará ese túnel."
msgid ""
"The LeaseSet itself is stored in the netDb under\n"
"the key derived from the SHA256 of the destination."
-msgstr "El propio LeaseSet es almacenado en la netDb bajo la clave derivada del hash SHA256 de la destinación."
+msgstr ""
+"El propio LeaseSet es almacenado en la netDb bajo la clave derivada del "
+"hash SHA256 de la destinación."
#: i2p2www/pages/site/docs/how/network-database.html:172
msgid "In addition to these leases, the LeaseSet includes:"
@@ -6772,25 +10540,33 @@ msgstr "Además de estos leases, el LeaseSet incluye:"
msgid ""
"The destination itself (a 2048bit ElGamal encryption key, 1024bit DSA "
"signing key and a certificate)"
-msgstr "La destinación en sí misma (una clave de 2048 bits ElGamal, una clave de firmado DSA de 1024 bits y un certificado)"
+msgstr ""
+"La destinación en sí misma (una clave de 2048 bits ElGamal, una clave de "
+"firmado DSA de 1024 bits y un certificado)"
#: i2p2www/pages/site/docs/how/network-database.html:177
msgid ""
-"Additional encryption public key: used for end-to-end encryption of garlic "
-"messages"
-msgstr "Una clave pública de cifrado adicional: usada para el cifrado de fin a fin de los mensajes garlic"
+"Additional encryption public key: used for end-to-end encryption of "
+"garlic messages"
+msgstr ""
+"Una clave pública de cifrado adicional: usada para el cifrado de fin a "
+"fin de los mensajes garlic"
#: i2p2www/pages/site/docs/how/network-database.html:178
msgid ""
"Additional signing public key: intended for LeaseSet revocation, but is "
"currently unused."
-msgstr "Una clave de firma pública adicional: para la revocación del LeaseSet, pero actualmente no se usa."
+msgstr ""
+"Una clave de firma pública adicional: para la revocación del LeaseSet, "
+"pero actualmente no se usa."
#: i2p2www/pages/site/docs/how/network-database.html:179
msgid ""
-"Signature of all the LeaseSet data, to make sure the Destination published "
-"the LeaseSet."
-msgstr "La firma de toda la información del LeaseSet, para asegurarse de que la Destinación publicó ese LeaseSet."
+"Signature of all the LeaseSet data, to make sure the Destination "
+"published the LeaseSet."
+msgstr ""
+"La firma de toda la información del LeaseSet, para asegurarse de que la "
+"Destinación publicó ese LeaseSet."
#: i2p2www/pages/site/docs/how/network-database.html:183
msgid "Lease specification"
@@ -6814,12 +10590,22 @@ msgstr "LeaseSets no publicados"
#: i2p2www/pages/site/docs/how/network-database.html:195
msgid ""
-"A LeaseSet for a destination used only for outgoing connections is unpublished.\n"
+"A LeaseSet for a destination used only for outgoing connections is "
+"unpublished.\n"
"It is never sent for publication to a floodfill router.\n"
-"\"Client\" tunnels, such as those for web browsing and IRC clients, are unpublished.\n"
-"Servers will still be able to send messages back to those unpublished destinations,\n"
+"\"Client\" tunnels, such as those for web browsing and IRC clients, are "
+"unpublished.\n"
+"Servers will still be able to send messages back to those unpublished "
+"destinations,\n"
"because of I2NP storage messages."
-msgstr "Una destinación LeaseSet sólo usada para conexiones de salida que no será publicada. Nunca será enviada para publicarse en los ruters floodfill. Los túneles \"Cliente\", como aquellos que se usan para navegarse o para los clientes IRC, nunca se publican. Los servidores podrán todavía enviar mensajes a esas destinaciones no publicadas, gracias a los mensajes de almacenamiento I2NP."
+msgstr ""
+"Una destinación LeaseSet sólo usada para conexiones de salida que no "
+"será publicada. Nunca será enviada para publicarse en los ruters "
+"floodfill. Los túneles \"Cliente\", como aquellos que se usan para "
+"navegarse o para los clientes IRC, nunca se publican. Los servidores "
+"podrán todavía enviar mensajes a esas destinaciones no publicadas, "
+"gracias a los mensajes de "
+"almacenamiento I2NP."
#: i2p2www/pages/site/docs/how/network-database.html:205
msgid "Revoked LeaseSets"
@@ -6827,11 +10613,20 @@ msgstr "LeaseSets Revocados"
#: i2p2www/pages/site/docs/how/network-database.html:206
msgid ""
-"A LeaseSet may be revoked by publishing a new LeaseSet with zero leases.\n"
-"Revocations must be signed by the additional signing key in the LeaseSet.\n"
-"Revocations are not fully implemented, and it is unclear if they have any practical use.\n"
-"This is the only planned use for that signing key, so it is currently unused."
-msgstr "Un LeaseSet puede ser revocado publicando un nuevo LeaseSet sin leases. Las revocaciones tienen que ser firmadas por la clave de firmado adicional del LeaseSet. La revocación no está completamente implementada, y no está claro si tiene algún uso práctico. Este es el único uso planeado para la clave de firmado, por lo cual no se usa."
+"A LeaseSet may be revoked by publishing a new LeaseSet with zero "
+"leases.\n"
+"Revocations must be signed by the additional signing key in the LeaseSet."
+"\n"
+"Revocations are not fully implemented, and it is unclear if they have any"
+" practical use.\n"
+"This is the only planned use for that signing key, so it is currently "
+"unused."
+msgstr ""
+"Un LeaseSet puede ser revocado publicando un nuevo LeaseSet sin "
+"leases. Las revocaciones tienen que ser firmadas por la clave de firmado "
+"adicional del LeaseSet. La revocación no está completamente implementada,"
+" y no está claro si tiene algún uso práctico. Este es el único uso "
+"planeado para la clave de firmado, por lo cual no se usa."
#: i2p2www/pages/site/docs/how/network-database.html:213
msgid "Encrypted LeaseSets"
@@ -6839,13 +10634,25 @@ msgstr "LeaseSets Cifrados"
#: i2p2www/pages/site/docs/how/network-database.html:214
msgid ""
-"In an encrypted LeaseSet, all Leases are encrypted with a separate DSA key.\n"
-"The leases may only be decoded, and thus the destination may only be contacted,\n"
+"In an encrypted LeaseSet, all Leases are encrypted with a separate"
+" DSA key.\n"
+"The leases may only be decoded, and thus the destination may only be "
+"contacted,\n"
"by those with the key.\n"
-"There is no flag or other direct indication that the LeaseSet is encrypted.\n"
-"Encrypted LeaseSets are not widely used, and it is a topic for future work to\n"
-"research whether the user interface and implementation of encrypted LeaseSets could be improved."
-msgstr "En un LeaseSet cifrado, todos los Leases están cifrados con una clave DSA separada. Estos Leases sólo se decodificaran, y entonces se podrá contactar con la destinación, por aquellos que posean la clave. No hay ninguna marca u otra indicación directa de que un LeaseSer vaya cifrado. Los LEaseSets no son usados extensamente, y es un tema para trabajar en el futuro, cuando el interfaz de usuario y la implementación de los LeaseSets cifrados sean mejores."
+"There is no flag or other direct indication that the LeaseSet is "
+"encrypted.\n"
+"Encrypted LeaseSets are not widely used, and it is a topic for future "
+"work to\n"
+"research whether the user interface and implementation of encrypted "
+"LeaseSets could be improved."
+msgstr ""
+"En un LeaseSet cifrado, todos los Leases están cifrados con una clave DSA"
+" separada. Estos Leases sólo se decodificaran, y entonces se podrá "
+"contactar con la destinación, por aquellos que posean la clave. No hay "
+"ninguna marca u otra indicación directa de que un LeaseSer vaya cifrado. "
+"Los LEaseSets no son usados extensamente, y es un tema para trabajar en "
+"el futuro, cuando el interfaz de usuario y la implementación de los "
+"LeaseSets cifrados sean mejores."
#: i2p2www/pages/site/docs/how/network-database.html:223
msgid "LeaseSet Expiration"
@@ -6853,9 +10660,13 @@ msgstr "Expiración del LeaseSet"
#: i2p2www/pages/site/docs/how/network-database.html:224
msgid ""
-"All Leases (tunnels) are valid for 10 minutes; therefore, a LeaseSet expires\n"
+"All Leases (tunnels) are valid for 10 minutes; therefore, a LeaseSet "
+"expires\n"
"10 minutes after the earliest creation time of all its Leases."
-msgstr "Todos los Leases (túneles) son válidos sólo durante 10 minutos; por lo tanto, un LeaseSet expira 10 minutos más tarde que el tiempo de creación de todos sus Leases."
+msgstr ""
+"Todos los Leases (túneles) son válidos sólo durante 10 minutos; por lo "
+"tanto, un LeaseSet expira 10 minutos más tarde que el tiempo de creación "
+"de todos sus Leases."
#: i2p2www/pages/site/docs/how/network-database.html:229
msgid "LeaseSet Persistent Storage"
@@ -6865,7 +10676,9 @@ msgstr "Almacenamiento persistente del LeaseSet"
msgid ""
"There is no persistent storage of LeaseSet data since they expire so "
"quickly."
-msgstr "No existe el almacenamiento persistente de LeaseSets ya que expiran muy rápido."
+msgstr ""
+"No existe el almacenamiento persistente de LeaseSets ya que expiran muy "
+"rápido."
#: i2p2www/pages/site/docs/how/network-database.html:235
msgid "Bootstrapping"
@@ -6875,40 +10688,80 @@ msgstr "Secuencia de arranque"
msgid ""
"The netDb is decentralized, however you do need at\n"
"least one reference to a peer so that the integration process\n"
-"ties you in. This is accomplished by \"reseeding\" your router with the RouterInfo\n"
-"of an active peer - specifically, by retrieving their routerInfo-$hash.dat
\n"
-"file and storing it in your netDb/
directory. Anyone can provide\n"
-"you with those files - you can even provide them to others by exposing your own\n"
+"ties you in. This is accomplished by \"reseeding\" your router with the "
+"RouterInfo\n"
+"of an active peer - specifically, by retrieving their "
+"routerInfo-$hash.dat
\n"
+"file and storing it in your netDb/
directory. Anyone can "
+"provide\n"
+"you with those files - you can even provide them to others by exposing "
+"your own\n"
"netDb directory. To simplify the process,\n"
-"volunteers publish their netDb directories (or a subset) on the regular (non-i2p) network,\n"
+"volunteers publish their netDb directories (or a subset) on the regular "
+"(non-i2p) network,\n"
"and the URLs of these directories are hardcoded in I2P.\n"
-"When the router starts up for the first time, it automatically fetches from\n"
+"When the router starts up for the first time, it automatically fetches "
+"from\n"
"one of these URLs, selected at random."
-msgstr "La netDb es descentralizada, aún así se necesita al menos un par de referencia para que el proceso de integración nos una a la red. Esto se consigue \"resembrando\" el ruter con la RouterInfo de un par activo - específicamente, obteniendo el archivo routerInfo-$hash.dat
y almacenándolo en su directorio netDb/
. Cualquiera puede proporcionarle estos archivos - incluso se pueden proporcionar a otros exponiendo su propia directorio netDb. Esto simplifica el proceso, algunos voluntarios publican sus directorios netDb (o un subconjunto) en el Internet normal (fuera de I2P), y las URL de estos directorios están codificadas dentro de I2P. Cuando el ruter se arranca por primera vez, automáticamente se conecta a estas URLs aleatoriamente para obtenerlos."
+msgstr ""
+"La netDb es descentralizada, aún así se necesita al menos un par de "
+"referencia para que el proceso de integración nos una a la red. Esto se "
+"consigue \"resembrando\" el ruter con la RouterInfo de un par activo - "
+"específicamente, obteniendo el archivo routerInfo-$hash.dat
"
+"y almacenándolo en su directorio netDb/
. Cualquiera puede "
+"proporcionarle estos archivos - incluso se pueden proporcionar a otros "
+"exponiendo su propia directorio netDb. Esto simplifica el proceso, "
+"algunos voluntarios publican sus directorios netDb (o un subconjunto) en "
+"el Internet normal (fuera de I2P), y las URL de estos directorios están "
+"codificadas dentro de I2P. Cuando el ruter se arranca por primera vez, "
+"automáticamente se conecta a estas URLs aleatoriamente para obtenerlos."
#: i2p2www/pages/site/docs/how/network-database.html:251
msgid ""
"The floodfill netDb is a simple distributed storage mechanism.\n"
-"The storage algorithm is simple: send the data to the closest peer that has advertised itself\n"
-"as a floodfill router. Then wait 10 seconds, pick another floodfill router and ask them \n"
-"for the entry to be sent, verifying its proper insertion / distribution. If the \n"
-"verification peer doesn't reply, or they don't have the entry, the sender \n"
-"repeats the process. When the peer in the floodfill netDb receives a netDb \n"
-"store from a peer not in the floodfill netDb, they send it to a subset of the floodfill netDb-peers.\n"
-"The peers selected are the ones closest (according to the XOR-metric) to a specific key."
-msgstr "El floodfill netDb is simplemente un mecanismo de almacenamiento distribuido. El algoritmo de almacenamiento es simple: envía los datos al par más cercano que se haya anunciado como floodfill. Espera 10 segundos, alije otro ruter floodfill y le pregunta por la entrada a enviar, verificando su propia introducción / distribución. Si el par de verificación no responde, o no tienen la entrada pedida, el transmisor repite el proceso. Cuando un par de la netDb floodfill recibe un almacenamiento netDb de un par que no está en la netDb floodfill, lo envía a un subconjunto del los pares floodfill netDb. Los pares seleccionados son los más cercanos a una clave especificada (de acuerdo con el XOR-metric)."
+"The storage algorithm is simple: send the data to the closest peer that "
+"has advertised itself\n"
+"as a floodfill router. Then wait 10 seconds, pick another floodfill "
+"router and ask them \n"
+"for the entry to be sent, verifying its proper insertion / distribution. "
+"If the \n"
+"verification peer doesn't reply, or they don't have the entry, the sender"
+" \n"
+"repeats the process. When the peer in the floodfill netDb receives a "
+"netDb \n"
+"store from a peer not in the floodfill netDb, they send it to a subset of"
+" the floodfill netDb-peers.\n"
+"The peers selected are the ones closest (according to the XOR-metric) to a specific key."
+msgstr ""
+"El floodfill netDb is simplemente un mecanismo de almacenamiento "
+"distribuido. El algoritmo de almacenamiento es simple: envía los datos al"
+" par más cercano que se haya anunciado como floodfill. Espera 10 "
+"segundos, alije otro ruter floodfill y le pregunta por la entrada a "
+"enviar, verificando su propia introducción / distribución. Si el par de "
+"verificación no responde, o no tienen la entrada pedida, el transmisor "
+"repite el proceso. Cuando un par de la netDb floodfill recibe un "
+"almacenamiento netDb de un par que no está en la netDb floodfill, lo "
+"envía a un subconjunto del los pares floodfill netDb. Los pares "
+"seleccionados son los más cercanos a una clave especificada (de acuerdo "
+"con el XOR-metric)."
#: i2p2www/pages/site/docs/how/network-database.html:262
msgid ""
-"Determining who is part of the floodfill netDb is trivial - it is exposed in each \n"
+"Determining who is part of the floodfill netDb is trivial - it is exposed"
+" in each \n"
"router's published routerInfo as a capability."
-msgstr "Determinar quien es parte del floodfill netDb es algo trivial - se muestra en el routerinfo publicado de cada ruter como una capacidad."
+msgstr ""
+"Determinar quien es parte del floodfill netDb es algo trivial - se "
+"muestra en el routerinfo publicado de cada ruter como una capacidad."
#: i2p2www/pages/site/docs/how/network-database.html:267
msgid ""
"Floodfills have no central authority and do not form a \"consensus\" -\n"
"they only implement a simple DHT overlay."
-msgstr "Los flodfill no tienen inguna autoridad central y no forman ningún \"consenso\" - sólo implementan una capa DHT."
+msgstr ""
+"Los flodfill no tienen inguna autoridad central y no forman ningún "
+"\"consenso\" - sólo implementan una capa DHT."
#: i2p2www/pages/site/docs/how/network-database.html:274
msgid "Floodfill Router Opt-in"
@@ -6920,7 +10773,11 @@ msgid ""
"and operated by known entities,\n"
"the members of the I2P floodfill peer set need not be trusted, and\n"
"change over time."
-msgstr "Al contrario que en Tor, donde los servidores están incluidos y son de confianza, y operados por identidades conocidas, los miembros de los pares floodfill de I2P no necesitas ser de confianza, y cambian con el tiempo."
+msgstr ""
+"Al contrario que en Tor, donde los servidores están incluidos y son de "
+"confianza, y operados por identidades conocidas, los miembros de los "
+"pares floodfill de I2P no necesitas ser de confianza, y cambian con el "
+"tiempo."
#: i2p2www/pages/site/docs/how/network-database.html:283
msgid ""
@@ -6930,21 +10787,37 @@ msgid ""
"Routers with high bandwidth limits (which must be manually configured,\n"
"as the default is much lower) are presumed to be on lower-latency\n"
"connections, and are more likely to be available 24/7.\n"
-"The current minimum share bandwidth for a floodfill router is 128 KBytes/sec."
-msgstr "Para incrementar la seguridad de la netDb, y minimizar el impacto del tráfico de la netDb en un ruter, floodfill solo está activo por defecto en los ruters configurados para compartir un gran ancho de banda. Los ruters con límites grandes de compartición de ancho de banda (lo que se puede configurar manualmente, ya que por defecto es mucho más bajo) presuntamente tienen conexiones de baja latencia, y es más probable que estén disponibles 24/7. El ancho de banda mínimo a compartir para convertirse en floodfill es de 128 KBytes/sec. "
+"The current minimum share bandwidth for a floodfill router is 128 "
+"KBytes/sec."
+msgstr ""
+"Para incrementar la seguridad de la netDb, y minimizar el impacto del "
+"tráfico de la netDb en un ruter, floodfill solo está activo por defecto "
+"en los ruters configurados para compartir un gran ancho de banda. Los "
+"ruters con límites grandes de compartición de ancho de banda (lo que se "
+"puede configurar manualmente, ya que por defecto es mucho más bajo) "
+"presuntamente tienen conexiones de baja latencia, y es más probable que "
+"estén disponibles 24/7. El ancho de banda mínimo a compartir para "
+"convertirse en floodfill es de 128 KBytes/sec. "
#: i2p2www/pages/site/docs/how/network-database.html:293
msgid ""
"In addition, a router must pass several additional tests for health\n"
-"(outbound message queue time, job lag, etc.) before floodfill operation is\n"
+"(outbound message queue time, job lag, etc.) before floodfill operation "
+"is\n"
"automatically enabled."
-msgstr "Además, un ruter debe pasar varios pruebas adiciones para comprobar su salud (tiempo de espera de los mensajes de salida, retraso de los trabajos, etc) antes de que se active automáticamente como un floodfill."
+msgstr ""
+"Además, un ruter debe pasar varios pruebas adiciones para comprobar su "
+"salud (tiempo de espera de los mensajes de salida, retraso de los "
+"trabajos, etc) antes de que se active automáticamente como un floodfill."
#: i2p2www/pages/site/docs/how/network-database.html:299
msgid ""
"With the current rules for automatic opt-in, approximately 6% of\n"
"the routers in the network are floodfill routers."
-msgstr "Con las reglas actuales para la aceptación automática, aproximadamente el \n6% de los routers en la red son routers floodfill."
+msgstr ""
+"Con las reglas actuales para la aceptación automática, aproximadamente el"
+" \n"
+"6% de los routers en la red son routers floodfill."
#: i2p2www/pages/site/docs/how/network-database.html:304
msgid ""
@@ -6955,7 +10828,14 @@ msgid ""
"floodfills to an attack.\n"
"In turn, these peers will un-floodfill themselves when there are\n"
"too many floodfills outstanding."
-msgstr "Mientras que algunos pares se configuran manualmente para ser floodfill, otros son simplemente ruters con gran ancho de banda que son automáticamente convertidos en floodfill cuando el número de pares floodfill baja de un límite. Esto evita el daño por un tiempo largo cuando se pierden la mayoría de los ruters floodfill a causa de un ataque. A su vez, estos pares dejarán de ser floodfill cuando ya haya suficientes floodfills activos."
+msgstr ""
+"Mientras que algunos pares se configuran manualmente para ser floodfill, "
+"otros son simplemente ruters con gran ancho de banda que son "
+"automáticamente convertidos en floodfill cuando el número de pares "
+"floodfill baja de un límite. Esto evita el daño por un tiempo largo "
+"cuando se pierden la mayoría de los ruters floodfill a causa de un "
+"ataque. A su vez, estos pares dejarán de ser floodfill cuando ya haya "
+"suficientes floodfills activos."
#: i2p2www/pages/site/docs/how/network-database.html:314
msgid "Floodfill Router Roles"
@@ -6963,11 +10843,21 @@ msgstr "El papel del ruter floodfill"
#: i2p2www/pages/site/docs/how/network-database.html:315
msgid ""
-"A floodfill router's only services that are in addition to those of non-floodfill routers\n"
+"A floodfill router's only services that are in addition to those of non-"
+"floodfill routers\n"
"are in accepting netDb stores and responding to netDb queries.\n"
-"Since they are generally high-bandwidth, they are more likely to participate in a high number of tunnels\n"
-"(i.e. be a \"relay\" for others), but this is not directly related to their distributed database services."
-msgstr "Los únicos servicios que tienen de más los ruters floodfill que no tienen los ruters no floodfill es aceptar almacenamientos en la netDb y el responder a las solicitudes de la netDb. Ya que normalmente tienen un gran ancho de banda, es más usual que participen en un gran número de túneles (por ejemplo como un \"relay\" para otros), pero esto no está relacionado directamente con sus servicios distribuidos de la base de datos."
+"Since they are generally high-bandwidth, they are more likely to "
+"participate in a high number of tunnels\n"
+"(i.e. be a \"relay\" for others), but this is not directly related to "
+"their distributed database services."
+msgstr ""
+"Los únicos servicios que tienen de más los ruters floodfill que no tienen"
+" los ruters no floodfill es aceptar almacenamientos en la netDb y el "
+"responder a las solicitudes de la netDb. Ya que normalmente tienen un "
+"gran ancho de banda, es más usual que participen en un gran número de "
+"túneles (por ejemplo como un \"relay\" para otros), pero esto no está "
+"relacionado directamente con sus servicios distribuidos de la base de "
+"datos."
#: i2p2www/pages/site/docs/how/network-database.html:323
msgid "Kademlia Closeness Metric"
@@ -6975,23 +10865,53 @@ msgstr "Medida de cercanía Kademlia"
#: i2p2www/pages/site/docs/how/network-database.html:324
msgid ""
-"The netDb uses a simple Kademlia-style XOR metric to determine closeness.\n"
+"The netDb uses a simple Kademlia-style XOR metric to determine closeness."
+"\n"
"The SHA256 hash of the key being looked up or stored is XOR-ed with\n"
"the hash of the router in question to determine closeness.\n"
-"A modification to this algorithm is done to increase the costs of Sybil attacks.\n"
-"Instead of the SHA256 hash of the key being looked up of stored, the SHA256 hash is taken\n"
-"of the 32-byte binary search key appended with the UTC date represented as an 8-byte ASCII string yyyyMMdd, i.e. SHA256(key + yyyyMMdd).\n"
-"This is called the \"routing key\", and it changes every day at midnight UTC.\n"
-"Only the search key is modified in this way, not the floodfill router hashes.\n"
-"The daily transformation of the DHT is sometimes called \"keyspace rotation\",\n"
+"A modification to this algorithm is done to increase the costs of Sybil attacks.\n"
+"Instead of the SHA256 hash of the key being looked up of stored, the "
+"SHA256 hash is taken\n"
+"of the 32-byte binary search key appended with the UTC date represented "
+"as an 8-byte ASCII string yyyyMMdd, i.e. SHA256(key + yyyyMMdd).\n"
+"This is called the \"routing key\", and it changes every day at midnight "
+"UTC.\n"
+"Only the search key is modified in this way, not the floodfill router "
+"hashes.\n"
+"The daily transformation of the DHT is sometimes called \"keyspace "
+"rotation\",\n"
"although it isn't strictly a rotation."
-msgstr "La base de datos de red (netDb) utiliza una métrica XOR estilo-Kademlia sencilla para determinar la cercanía.\nEl identificador criptográfico (hash) SHA256 de la clave que se está buscando, o almacenando XOReada con\nel identificador criptográfico del router en cuestión para determinar la cercanía.\nSe ha realizado una modificación en este algoritmo para incrementar el coste de los ataques Sybil.\nEn lugar del hash SHA256 de la clave que se está buscando o almacenando, el identificador criptográfico SHA256 se toma\nde la clave de búsqueda binaria de 32-bytes sufijada con la fecha UTC representada como una cadena ASCII de 8-bytes aaaaMMdd, es decir SHA256(clave + aaaaMMdd).\nA esto se le llama \"clave de enrutado\", y cambia cada día a la medianoche UTC.\nSólo la clave de búsqueda es modificada de esta forma, no los identificadores criptográficos de los routers de inundación.\nA la transformación diaria de la DHT (tabla dinámica de hashes) a veces se le llama \"rotación del espacio de claves\" (keyspace rotation),\naunque no es estrictamente una rotación."
+msgstr ""
+"La base de datos de red (netDb) utiliza una métrica XOR estilo-Kademlia "
+"sencilla para determinar la cercanía.\n"
+"El identificador criptográfico (hash) SHA256 de la clave que se está "
+"buscando, o almacenando XOReada con\n"
+"el identificador criptográfico del router en cuestión para determinar la "
+"cercanía.\n"
+"Se ha realizado una modificación en este algoritmo para incrementar el "
+"coste de los ataques Sybil.\n"
+"En lugar del hash SHA256 de la clave que se está buscando o almacenando, "
+"el identificador criptográfico SHA256 se toma\n"
+"de la clave de búsqueda binaria de 32-bytes sufijada con la fecha UTC "
+"representada como una cadena ASCII de 8-bytes aaaaMMdd, es decir "
+"SHA256(clave + aaaaMMdd).\n"
+"A esto se le llama \"clave de enrutado\", y cambia cada día a la "
+"medianoche UTC.\n"
+"Sólo la clave de búsqueda es modificada de esta forma, no los "
+"identificadores criptográficos de los routers de inundación.\n"
+"A la transformación diaria de la DHT (tabla dinámica de hashes) a veces "
+"se le llama \"rotación del espacio de claves\" (keyspace rotation),\n"
+"aunque no es estrictamente una rotación."
#: i2p2www/pages/site/docs/how/network-database.html:337
msgid ""
-"Routing keys are never sent on-the-wire in any I2NP message, they are only used locally for\n"
+"Routing keys are never sent on-the-wire in any I2NP message, they are "
+"only used locally for\n"
"determination of distance."
-msgstr "Las claves de enrutado nunca se envían por-el-cable en ninguno de los \nmensajes I2NP, sólo se usan localmente para determinar la distancia."
+msgstr ""
+"Las claves de enrutado nunca se envían por-el-cable en ninguno de los \n"
+"mensajes I2NP, sólo se usan localmente para determinar la distancia."
#: i2p2www/pages/site/docs/how/network-database.html:344
msgid "Storage, Verification, and Lookup Mechanics"
@@ -7004,10 +10924,15 @@ msgstr "Almacenamiento del RouterInfo en los pares"
#: i2p2www/pages/site/docs/how/network-database.html:347
#, python-format
msgid ""
-"I2NP DatabaseStoreMessages containing the local RouterInfo are exchanged with peers\n"
+"I2NP DatabaseStoreMessages containing the local "
+"RouterInfo are exchanged with peers\n"
"as a part of the initialization of a NTCP\n"
"or SSU transport connection."
-msgstr "Los mensajes I2NP DatabaseStoreMessages que contienen el RouterInfo local son intercambiados con pares como parte de la inicialización de una conexión de transporte NTCP o SSU."
+msgstr ""
+"Los mensajes I2NP DatabaseStoreMessages que "
+"contienen el RouterInfo local son intercambiados con pares como parte de "
+"la inicialización de una conexión de transporte NTCP o SSU."
#: i2p2www/pages/site/docs/how/network-database.html:354
msgid "LeaseSet Storage to Peers"
@@ -7016,34 +10941,83 @@ msgstr "Almacenamiento del LeaseSet en los pares"
#: i2p2www/pages/site/docs/how/network-database.html:355
#, python-format
msgid ""
-"I2NP DatabaseStoreMessages containing the local LeaseSet are periodically exchanged with peers\n"
-"by bundling them in a garlic message along with normal traffic from the related Destination.\n"
-"This allows an initial response, and later responses, to be sent to an appropriate Lease,\n"
-"without requiring any LeaseSet lookups, or requiring the communicating Destinations to have published LeaseSets at all."
-msgstr "Los mensajes I2NP DatabaseStoreMessages que contienen el LeaseSet local son intercambiados periódicamente con pares agrupándolos en un mensaje garlic junto con el tráfico normal desde la Destinación relacionada. Esto permite enviar una respuesta inicial, y una respuesta posterior, al Lease apropiado, sin necesidad de hacer búsquedas de LeaseSet, o tener que comunicarse con las Destinaciones para publicar los LeaseSets."
+"I2NP DatabaseStoreMessages containing the local "
+"LeaseSet are periodically exchanged with peers\n"
+"by bundling them in a garlic message along with normal traffic from the "
+"related Destination.\n"
+"This allows an initial response, and later responses, to be sent to an "
+"appropriate Lease,\n"
+"without requiring any LeaseSet lookups, or requiring the communicating "
+"Destinations to have published LeaseSets at all."
+msgstr ""
+"Los mensajes I2NP DatabaseStoreMessages que "
+"contienen el LeaseSet local son intercambiados periódicamente con pares "
+"agrupándolos en un mensaje garlic junto con el tráfico normal desde la "
+"Destinación relacionada. Esto permite enviar una respuesta inicial, y una"
+" respuesta posterior, al Lease apropiado, sin necesidad de hacer "
+"búsquedas de LeaseSet, o tener que comunicarse con las Destinaciones para"
+" publicar los LeaseSets."
#: i2p2www/pages/site/docs/how/network-database.html:363
msgid ""
"The DatabaseStoreMessage should be sent to the floodfill that is closest\n"
"to the current routing key for the RouterInfo or LeaseSet being stored.\n"
-"Currently, the closest floodfill is found by a search in the local database.\n"
-"Even if that floodfill is not actually closest, it will flood it \"closer\" by\n"
+"Currently, the closest floodfill is found by a search in the local "
+"database.\n"
+"Even if that floodfill is not actually closest, it will flood it "
+"\"closer\" by\n"
"sending it to multiple other floodfills.\n"
"This provides a high degree of fault-tolerance."
-msgstr "El DatabaseStoreMessage (mensaje de almacén de base de datos) debe \nenviarse al router de inundación (`floodfill`, extienden la red I2P al \ndesplegarse en inundación portando la base de datos distribuida netDb) \nmás cercano al lugar donde se esté guardando la clave de enrutado actual \npara el RouterInfo o el LeaseSet. Actualmente el router floodfill más \ncercano se obtiene mediante una búsqueda en la base de datos local. \nIncluso si ese router floodfill no es en realidad el más cercano, lo \ninundará \"hacia si\" enviándo el mensaje a otros múltiples routers de \ninundación. Esto proporciona un alto grado de tolerencia a fallos."
+msgstr ""
+"El DatabaseStoreMessage (mensaje de almacén de base de datos) debe \n"
+"enviarse al router de inundación (`floodfill`, extienden la red I2P al \n"
+"desplegarse en inundación portando la base de datos distribuida netDb) \n"
+"más cercano al lugar donde se esté guardando la clave de enrutado actual"
+" \n"
+"para el RouterInfo o el LeaseSet. Actualmente el router floodfill más \n"
+"cercano se obtiene mediante una búsqueda en la base de datos local. \n"
+"Incluso si ese router floodfill no es en realidad el más cercano, lo \n"
+"inundará \"hacia si\" enviándo el mensaje a otros múltiples routers de \n"
+"inundación. Esto proporciona un alto grado de tolerencia a fallos."
#: i2p2www/pages/site/docs/how/network-database.html:372
msgid ""
-"In traditional Kademlia, a peer would do a \"find-closest\" search before inserting\n"
-"an item in the DHT to the closest target. As the verify operation will tend to\n"
-"discover closer floodfills if they are present, a router will quickly improve\n"
-"its knowledge of the DHT \"neighborhood\" for the RouterInfo and LeaseSets it regularly publishes.\n"
-"While I2NP does not define a \"find-closest\" message, if it becomes necessary,\n"
-"a router may simply do an iterative search for a key with the least significant bit flipped\n"
-"(i.e. key ^ 0x01) until no closer peers are received in the DatabaseSearchReplyMessages.\n"
-"This ensures that the true closest peer will be found even if a more-distant peer had\n"
+"In traditional Kademlia, a peer would do a \"find-closest\" search before"
+" inserting\n"
+"an item in the DHT to the closest target. As the verify operation will "
+"tend to\n"
+"discover closer floodfills if they are present, a router will quickly "
+"improve\n"
+"its knowledge of the DHT \"neighborhood\" for the RouterInfo and "
+"LeaseSets it regularly publishes.\n"
+"While I2NP does not define a \"find-closest\" message, if it becomes "
+"necessary,\n"
+"a router may simply do an iterative search for a key with the least "
+"significant bit flipped\n"
+"(i.e. key ^ 0x01) until no closer peers are received in the "
+"DatabaseSearchReplyMessages.\n"
+"This ensures that the true closest peer will be found even if a more-"
+"distant peer had\n"
"the netdb item."
-msgstr "En el Kademlia tradicional, un par (`peer`) haría una búsqueda \"find-closest\" \n(encuentra al más cercano) antes de insertar un elemento en la DHT (tabla de hash dinámica) hacia el objetivo más cercano. Como la operación de \nverificación tenderá a descubrir los routers floodfills más \ncercanos si están presentes, un router mejorará rápidamente su \nconocimiento del \"vecindario\" de la DHT para el RouterInfo (información para \ncontactar routers) y los LeaseSets (información para contactar destinos) \nque publica regularmente. Aunque I2NP no define un mensaje \"find-closest\", \nsi fuera necesario un router simplemente podría hacer una búsqueda iterativa de la clave con el bit menos significativo invertido (es decir, la clave ^ 0x01) hasta que no se reciban pares más cercanos en los DatabaseSearchReplyMessages (mensajes de respuesta de búsqueda de la base de datos). Esto asegura que se encontrará al verdadero par más cercano incluso si un par más-distante tiene el elemento netDb."
+msgstr ""
+"En el Kademlia tradicional, un par (`peer`) haría una búsqueda \"find-"
+"closest\" \n"
+"(encuentra al más cercano) antes de insertar un elemento en la DHT (tabla"
+" de hash dinámica) hacia el objetivo más cercano. Como la operación de \n"
+"verificación tenderá a descubrir los routers floodfills más \n"
+"cercanos si están presentes, un router mejorará rápidamente su \n"
+"conocimiento del \"vecindario\" de la DHT para el RouterInfo (información"
+" para \n"
+"contactar routers) y los LeaseSets (información para contactar destinos)"
+" \n"
+"que publica regularmente. Aunque I2NP no define un mensaje \"find-"
+"closest\", \n"
+"si fuera necesario un router simplemente podría hacer una búsqueda "
+"iterativa de la clave con el bit menos significativo invertido (es decir,"
+" la clave ^ 0x01) hasta que no se reciban pares más cercanos en los "
+"DatabaseSearchReplyMessages (mensajes de respuesta de búsqueda de la base"
+" de datos). Esto asegura que se encontrará al verdadero par más cercano "
+"incluso si un par más-distante tiene el elemento netDb."
#: i2p2www/pages/site/docs/how/network-database.html:385
msgid "RouterInfo Storage to Floodfills"
@@ -7052,15 +11026,25 @@ msgstr "Almacenamiento de RouterInfo en los Floodfills"
#: i2p2www/pages/site/docs/how/network-database.html:386
#, python-format
msgid ""
-"A router publishes its own RouterInfo by directly connecting to a floodfill router\n"
+"A router publishes its own RouterInfo by directly connecting to a "
+"floodfill router\n"
"and sending it a I2NP DatabaseStoreMessage\n"
-"with a nonzero Reply Token. The message is not end-to-end garlic encrypted,\n"
+"with a nonzero Reply Token. The message is not end-to-end garlic "
+"encrypted,\n"
"as this is a direct connection, so there are no intervening routers\n"
"(and no need to hide this data anyway).\n"
"The floodfill router replies with a\n"
"I2NP DeliveryStatusMessage,\n"
"with the Message ID set to the value of the Reply Token."
-msgstr "Un ruter publica su propia RouterInfo conectándose directamente a un ruter Floodfill y enviando un I2NP DatabaseStoreMessage con un token de respuesta no vacío. Este mensaje está cifrado de fin a fin como Garlic, y es una conexión directa, con lo cual no hay ruters en medio (no se necesita ocultar ninguna información). El ruter floodfill responde con un \nI2NP DeliveryStatusMessage, con el ID del mensaje puesto en el valor del token de respuesta."
+msgstr ""
+"Un ruter publica su propia RouterInfo conectándose directamente a un "
+"ruter Floodfill y enviando un I2NP "
+"DatabaseStoreMessage con un token de respuesta no vacío. Este mensaje "
+"está cifrado de fin a fin como Garlic, y es una conexión directa, con lo "
+"cual no hay ruters en medio (no se necesita ocultar ninguna información)."
+" El ruter floodfill responde con un \n"
+"I2NP DeliveryStatusMessage, con el ID del "
+"mensaje puesto en el valor del token de respuesta."
#: i2p2www/pages/site/docs/how/network-database.html:400
msgid "LeaseSet Storage to Floodfills"
@@ -7068,23 +11052,38 @@ msgstr "Almacenamiento de LeaseSet en los Floodfills"
#: i2p2www/pages/site/docs/how/network-database.html:401
msgid ""
-"Storage of LeaseSets is much more sensitive than for RouterInfos, as a router\n"
+"Storage of LeaseSets is much more sensitive than for RouterInfos, as a "
+"router\n"
"must take care that the LeaseSet cannot be associated with the router."
-msgstr "El almacenamiento de los LeaseSets es mucho más sensible que el de los RouterInfos, ya que un ruter debe de tener cuidad de que el LeaseSet no pueda ser asociado con el ruter."
+msgstr ""
+"El almacenamiento de los LeaseSets es mucho más sensible que el de los "
+"RouterInfos, ya que un ruter debe de tener cuidad de que el LeaseSet no "
+"pueda ser asociado con el ruter."
#: i2p2www/pages/site/docs/how/network-database.html:406
#, python-format
msgid ""
"A router publishes a local LeaseSet by\n"
"sending a I2NP DatabaseStoreMessage\n"
-"with a nonzero Reply Token over an outbound client tunnel for that Destination.\n"
-"The message is end-to-end garlic encrypted using the Destination's Session Key Manager,\n"
+"with a nonzero Reply Token over an outbound client tunnel for that "
+"Destination.\n"
+"The message is end-to-end garlic encrypted using the Destination's "
+"Session Key Manager,\n"
"to hide the message from the tunnel's outbound endpoint.\n"
"The floodfill router replies with a\n"
"I2NP DeliveryStatusMessage,\n"
"with the Message ID set to the value of the Reply Token.\n"
"This message is sent back to one of the client's inbound tunnels."
-msgstr "Un ruter publica un LeaseSet local enviando un I2NP DatabaseStoreMessage con un token de respuesta no vacío sobre un túnel cliente de salida desde esa Destinación. Este mensaje es cifrado de fin a fin con Garlic usando el administrador de claves de la sesión de la Destinación, para ocultar el mensaje en el punto final del túnel de salida. El ruter floodfill responde con un I2NP DeliveryStatusMessage, con el ID del mensaje puesto como el token de respuesta. Este mensaje es enviado de vuelta a los túneles de entrada del cliente."
+msgstr ""
+"Un ruter publica un LeaseSet local enviando un I2NP DatabaseStoreMessage con un token de respuesta"
+" no vacío sobre un túnel cliente de salida desde esa Destinación. Este "
+"mensaje es cifrado de fin a fin con Garlic usando el administrador de "
+"claves de la sesión de la Destinación, para ocultar el mensaje en el "
+"punto final del túnel de salida. El ruter floodfill responde con un I2NP DeliveryStatusMessage, con el ID del mensaje "
+"puesto como el token de respuesta. Este mensaje es enviado de vuelta a "
+"los túneles de entrada del cliente."
#: i2p2www/pages/site/docs/how/network-database.html:419
msgid "Flooding"
@@ -7094,14 +11093,40 @@ msgstr "Inundación"
#, python-format
msgid ""
"After a floodfill router receives a DatabaseStoreMessage containing a\n"
-"valid RouterInfo or LeaseSet which is newer than that previously stored in its\n"
+"valid RouterInfo or LeaseSet which is newer than that previously stored "
+"in its\n"
"local NetDb, it \"floods\" it.\n"
-"To flood a NetDb entry, it looks up several (currently %(floodsize)s) floodfill routers closest to the routing key\n"
-"of the NetDb entry. (The routing key is the SHA256 Hash of the RouterIdentity or Destination with the date (yyyyMMdd) appended.)\n"
-"By flooding to those closest to the key, not closest to itself, the floodfill ensures that the storage\n"
-"gets to the right place, even if the storing router did not have good knowledge of the\n"
+"To flood a NetDb entry, it looks up several (currently %(floodsize)s) "
+"floodfill routers closest to the routing key\n"
+"of the NetDb entry. (The routing key is the SHA256 Hash of the "
+"RouterIdentity or Destination with the date (yyyyMMdd) appended.)\n"
+"By flooding to those closest to the key, not closest to itself, the "
+"floodfill ensures that the storage\n"
+"gets to the right place, even if the storing router did not have good "
+"knowledge of the\n"
"DHT \"neighborhood\" for the routing key."
-msgstr "Después de que un router floodfill (de inundación) reciba un DatabaseStoreMessage\nconteniendo un RouterInfo (información para contactar con un router) o LeaseSet\n(información para contactar con un Destino) que esté más actualizado que el guardado\npreviamente en su NetDb local, lo \"inunda\". Para inundar una entrada NetDb, busca\nvarios (actualmente %(floodsize)s) routers floodfill más próximos a la clave de enrutamiento\nde la entrada NetDb. (La clave de enrutamiento es el (identificador criptográfico)\nHash SHA256 de la RouterIdentity o Destino con la fecha (aaaaMMdd) como sufijo).\nMediante la inundación a aquellos más próximos a la clave, no los más próximos a\nsi mismos, el router flloodfill asegura que el almacenamiento llega al lugar adecuado,\nincluso si el router almacenante no tenía un buen conocimiento del \"vecindario\"\nDHT (tabla de hash distribuida) de la clave de enrutamiento."
+msgstr ""
+"Después de que un router floodfill (de inundación) reciba un "
+"DatabaseStoreMessage\n"
+"conteniendo un RouterInfo (información para contactar con un router) o "
+"LeaseSet\n"
+"(información para contactar con un Destino) que esté más actualizado que "
+"el guardado\n"
+"previamente en su NetDb local, lo \"inunda\". Para inundar una entrada "
+"NetDb, busca\n"
+"varios (actualmente %(floodsize)s) routers floodfill más próximos a la "
+"clave de enrutamiento\n"
+"de la entrada NetDb. (La clave de enrutamiento es el (identificador "
+"criptográfico)\n"
+"Hash SHA256 de la RouterIdentity o Destino con la fecha (aaaaMMdd) como "
+"sufijo).\n"
+"Mediante la inundación a aquellos más próximos a la clave, no los más "
+"próximos a\n"
+"si mismos, el router flloodfill asegura que el almacenamiento llega al "
+"lugar adecuado,\n"
+"incluso si el router almacenante no tenía un buen conocimiento del "
+"\"vecindario\"\n"
+"DHT (tabla de hash distribuida) de la clave de enrutamiento."
#: i2p2www/pages/site/docs/how/network-database.html:431
#, python-format
@@ -7112,7 +11137,18 @@ msgid ""
"as this is a direct connection, so there are no intervening routers\n"
"(and no need to hide this data anyway).\n"
"The other routers do not reply or re-flood, as the Reply Token is zero."
-msgstr "El router floodfill conecta entonces directamente a cada uno de esos \npares y les envía un DatabaseStoreMessage I2NP con una \ncredencial (`token`) de respueta cero. El mensaje no está cifrado \nextremo-a-extremo con garlic (ajo), ya que esta es una conexión directa, \nasí que no hay routers intervinientes (y de todas formas no hay necesidad \nde esconder este dato). Los otros routers no responden ni re-inundan, ya \nque la credencial de respuesta es cero."
+msgstr ""
+"El router floodfill conecta entonces directamente a cada uno de esos \n"
+"pares y les envía un DatabaseStoreMessage I2NP "
+"con una \n"
+"credencial (`token`) de respueta cero. El mensaje no está cifrado \n"
+"extremo-a-extremo con garlic (ajo), ya que esta es una conexión directa,"
+" \n"
+"así que no hay routers intervinientes (y de todas formas no hay necesidad"
+" \n"
+"de esconder este dato). Los otros routers no responden ni re-inundan, ya"
+" \n"
+"que la credencial de respuesta es cero."
#: i2p2www/pages/site/docs/how/network-database.html:441
msgid "RouterInfo and LeaseSet Lookup"
@@ -7121,82 +11157,179 @@ msgstr "Búsquedas de RouterInfo y LeaseSet"
#: i2p2www/pages/site/docs/how/network-database.html:442
#, python-format
msgid ""
-"The I2NP DatabaseLookupMessage is used to request a netdb entry from a floodfill router.\n"
+"The I2NP DatabaseLookupMessage is used to "
+"request a netdb entry from a floodfill router.\n"
"Lookups are sent out one of the router's outbound exploratory tunnels.\n"
-"The replies are specified to return via one of the router's inbound exploratory tunnels."
-msgstr "El DatabaseLookupMessage (mensaje de consulta a la base de datos) de \nI2NP se usa para solicitar una entrada netDb \ndesde un router floodfill. \nLas consultas se transmiten por uno de los túneles exploratorios de salida del router. Las respuestas están definidas para volver a través de uno de los túneles exploratorios de entrada del router."
+"The replies are specified to return via one of the router's inbound "
+"exploratory tunnels."
+msgstr ""
+"El DatabaseLookupMessage (mensaje de consulta a la base de datos) de \n"
+"I2NP se usa para solicitar una entrada netDb \n"
+"desde un router floodfill. \n"
+"Las consultas se transmiten por uno de los túneles exploratorios de "
+"salida del router. Las respuestas están definidas para volver a través de"
+" uno de los túneles exploratorios de entrada del router."
#: i2p2www/pages/site/docs/how/network-database.html:448
msgid ""
-"Lookups are generally sent to the two \"good\" (the connection doesn't fail)"
-" floodfill routers closest to the requested key, in parallel."
-msgstr "Las consultas generalmente se envían a los dos routers floodfill \n\"buenos\" (en los que la conexión no falla) más próximos a la clave \nsolicitada, en paralelo."
+"Lookups are generally sent to the two \"good\" (the connection doesn't "
+"fail) floodfill routers closest to the requested key, in parallel."
+msgstr ""
+"Las consultas generalmente se envían a los dos routers floodfill \n"
+"\"buenos\" (en los que la conexión no falla) más próximos a la clave \n"
+"solicitada, en paralelo."
#: i2p2www/pages/site/docs/how/network-database.html:452
#, python-format
msgid ""
"If the key is found locally by the floodfill router, it responds with a\n"
"I2NP DatabaseStoreMessage.\n"
-"If the key is not found locally by the floodfill router, it responds with a\n"
+"If the key is not found locally by the floodfill router, it responds with"
+" a\n"
"I2NP DatabaseSearchReplyMessage\n"
"containing a list of other floodfill routers close to the key."
-msgstr "Si el router floodfill encuentra la clave localmente, \nresponde con un DatabaseStoreMessage (mensaje de almacenaje en la \nbase de datos) de I2NP. Si el router floodfill no encontró la clave \nlocalmente, responde con un DatabaseSearchReplyMessage (mensaje de \nrespuesta a búsqueda en la base de datos) de I2NP conteniendo una \nlista de otros routers floodfill próximos a la clave."
+msgstr ""
+"Si el router floodfill encuentra la clave localmente, \n"
+"responde con un DatabaseStoreMessage (mensaje de almacenaje en la \n"
+"base de datos) de I2NP. Si el router floodfill "
+"no encontró la clave \n"
+"localmente, responde con un DatabaseSearchReplyMessage (mensaje de \n"
+"respuesta a búsqueda en la base de datos) de I2NP conteniendo una \n"
+"lista de otros routers floodfill próximos a la clave."
#: i2p2www/pages/site/docs/how/network-database.html:460
msgid ""
"LeaseSet lookups are garlic encrypted end-to-end as of release 0.9.5.\n"
-"RouterInfo lookups are not encrypted and thus are vulnerable to snooping by the outbound endpoint\n"
-"(OBEP) of the client tunnel. This is due to the expense of the ElGamal encryption.\n"
+"RouterInfo lookups are not encrypted and thus are vulnerable to snooping "
+"by the outbound endpoint\n"
+"(OBEP) of the client tunnel. This is due to the expense of the ElGamal "
+"encryption.\n"
"RouterInfo lookup encryption may be enabled in a future release."
-msgstr "Las consultas de LeaseSet (información para contactar destinos) están cifradas extremo-a-extremo con garlic (ajo) desde la versión 0.9.5. Las consultas de RouterInfo (información para contactar routers) no están \ncifradas y por tanto son vulnerables a espionaje por el extremo exterior \n(outbound endpoint, OBEP) del túnel cliente. Esto es debido a lo caro del cifrado ElGamal. El cifrado de la consulta RouterInfo puede que sea habilitado en una futura versión."
+msgstr ""
+"Las consultas de LeaseSet (información para contactar destinos) están "
+"cifradas extremo-a-extremo con garlic (ajo) desde la versión 0.9.5. Las "
+"consultas de RouterInfo (información para contactar routers) no están \n"
+"cifradas y por tanto son vulnerables a espionaje por el extremo exterior"
+" \n"
+"(outbound endpoint, OBEP) del túnel cliente. Esto es debido a lo caro del"
+" cifrado ElGamal. El cifrado de la consulta RouterInfo puede que sea "
+"habilitado en una futura versión."
#: i2p2www/pages/site/docs/how/network-database.html:467
msgid ""
-"As of release 0.9.7, replies to a LeaseSet lookup (a DatabaseStoreMessage or a DatabaseSearchReplyMessage)\n"
+"As of release 0.9.7, replies to a LeaseSet lookup (a DatabaseStoreMessage"
+" or a DatabaseSearchReplyMessage)\n"
"will be encrypted by including the session key and tag in the lookup.\n"
-"This hides the reply from the inbound gateway (IBGW) of the reply tunnel.\n"
-"Responses to RouterInfo lookups will be encrypted if we enable the lookup encryption."
-msgstr "Desde la versión 0.9.7 las respuestas a una consulta de LeaseSet (un \nDatabaseStoreMessage o un DatabaseSearchReplyMessage) estarán \ncifradas mediante la inclusión de la clave de sesión y la etiqueta en la \nconsulta. Esto esconde la respuesta desde la pasarela de entrada (inbound \ngateway, IBGW) del túnel de respuesta. Las respuestas a consultas a de \nRouterInfo serán cifradas si se habilita el cifrado de consultas."
+"This hides the reply from the inbound gateway (IBGW) of the reply tunnel."
+"\n"
+"Responses to RouterInfo lookups will be encrypted if we enable the lookup"
+" encryption."
+msgstr ""
+"Desde la versión 0.9.7 las respuestas a una consulta de LeaseSet (un \n"
+"DatabaseStoreMessage o un DatabaseSearchReplyMessage) estarán \n"
+"cifradas mediante la inclusión de la clave de sesión y la etiqueta en la"
+" \n"
+"consulta. Esto esconde la respuesta desde la pasarela de entrada (inbound"
+" \n"
+"gateway, IBGW) del túnel de respuesta. Las respuestas a consultas a de \n"
+"RouterInfo serán cifradas si se habilita el cifrado de consultas."
#: i2p2www/pages/site/docs/how/network-database.html:474
#, python-format
msgid ""
"(Reference: Hashing it out in Public Sections "
"2.2-2.3 for terms below in italics)"
-msgstr "(Referencia: Hashing it out in Public (Discutiéndolo en público [juego de palabras]) Secciones 2.2-2.3 para los términos en itálica de debajo)"
+msgstr ""
+"(Referencia: Hashing it out in Public "
+"(Discutiéndolo en público [juego de palabras]) Secciones 2.2-2.3 para los"
+" términos en itálica de debajo)"
#: i2p2www/pages/site/docs/how/network-database.html:478
msgid ""
-"Due to the relatively small size of the network and the flooding redundancy of 8x,\n"
+"Due to the relatively small size of the network and the flooding "
+"redundancy of 8x,\n"
"lookups are usually O(1) rather than O(log n) --\n"
-"a router is highly likely to know a floodfill router close enough to the key to get the answer on the first try.\n"
+"a router is highly likely to know a floodfill router close enough to the "
+"key to get the answer on the first try.\n"
"In releases prior to 0.8.9, routers used a lookup redundancy of two\n"
-"(that is, two lookups were performed in parallel to different peers), and\n"
-"neither recursive nor iterative routing for lookups was implemented.\n"
+"(that is, two lookups were performed in parallel to different peers), and"
+"\n"
+"neither recursive nor iterative routing for lookups was "
+"implemented.\n"
"Queries were sent through multiple routes simultaneously\n"
"to reduce the chance of query failure."
-msgstr "Debido al relativamente pequeño tamaño de la red y la redundancia de la \ninundación por un factor 8x, las consultas son habitualmente O(1) más bien que O(log n) -- un router es altamente probable que conozca un router floodfill suficientemente cercano a la clave para obtener la respuesta \nen el primer intento. En versiones anteriores a la 0.8.9, los routers usaban \nuna redundancia de consulta de dos (esto es, se realizaban dos consultas \nen paralelo a direferentes pares), y ni el enrutado recursivo ni el \niterativo estaba implementado para las consultas. Las peticiones se \nenviaban a través de múltiples rutas simultáneamente para reducir la posibilidad de fallo de consulta."
+msgstr ""
+"Debido al relativamente pequeño tamaño de la red y la redundancia de la \n"
+"inundación por un factor 8x, las consultas son habitualmente O(1) más "
+"bien que O(log n) -- un router es altamente probable que conozca un "
+"router floodfill suficientemente cercano a la clave para obtener la "
+"respuesta \n"
+"en el primer intento. En versiones anteriores a la 0.8.9, los routers "
+"usaban \n"
+"una redundancia de consulta de dos (esto es, se realizaban dos consultas"
+" \n"
+"en paralelo a direferentes pares), y ni el enrutado recursivo ni "
+"el \n"
+"iterativo estaba implementado para las consultas. Las peticiones "
+"se \n"
+"enviaban a través de múltiples rutas simultáneamente para "
+"reducir la posibilidad de fallo de consulta."
#: i2p2www/pages/site/docs/how/network-database.html:489
msgid ""
-"As of release 0.8.9, iterative lookups are implemented with no lookup redundancy.\n"
+"As of release 0.8.9, iterative lookups are implemented with no "
+"lookup redundancy.\n"
"This is a more efficient and reliable lookup that will work much better\n"
"when not all floodfill peers are known, and it removes a serious\n"
-"limitation to network growth. As the network grows and each router knows only a small\n"
+"limitation to network growth. As the network grows and each router knows "
+"only a small\n"
"subset of the floodfill peers, lookups will become O(log n).\n"
-"Even if the peer does not return references closer to the key, the lookup continues with\n"
-"the next-closest peer, for added robustness, and to prevent a malicious floodfill from\n"
-"black-holing a part of the key space. Lookups continue until a total lookup timeout is reached,\n"
+"Even if the peer does not return references closer to the key, the lookup"
+" continues with\n"
+"the next-closest peer, for added robustness, and to prevent a malicious "
+"floodfill from\n"
+"black-holing a part of the key space. Lookups continue until a total "
+"lookup timeout is reached,\n"
"or the maximum number of peers is queried."
-msgstr "Desede la versión 0.8.9 las consultas iterativas se implementaron sin \nredundancia en la consulta. Esta es una consulta más eficiente y fiable, que \nfuncionará mucho mejor cuando no sean conocidos todos los pares de \ninundación (`floodfill peers`), y elimina una seria limitación al crecimiento de \nla red. Al crecer la red y que cada router conozca sólo un pequeño \nsubconjunto de los pares de inundación, las consultas llegarán a ser O(log n). Incluso si los pares no devuelven referencias más cercanas a la clave, la \nconsulta continúa con el par más-próximo-a-continuación, para añadir \nrobustez, y para prevenir que un par de inundación malicioso acapare (`black-holing`) una parte del espacio de la clave. Las consultas continúan \nhasta que se alcance el total del tiempo límite de la consulta o se haya consultado al número de pares máximo."
+msgstr ""
+"Desede la versión 0.8.9 las consultas iterativas se implementaron "
+"sin \n"
+"redundancia en la consulta. Esta es una consulta más eficiente y fiable, "
+"que \n"
+"funcionará mucho mejor cuando no sean conocidos todos los pares de \n"
+"inundación (`floodfill peers`), y elimina una seria limitación al "
+"crecimiento de \n"
+"la red. Al crecer la red y que cada router conozca sólo un pequeño \n"
+"subconjunto de los pares de inundación, las consultas llegarán a ser "
+"O(log n). Incluso si los pares no devuelven referencias más cercanas a la"
+" clave, la \n"
+"consulta continúa con el par más-próximo-a-continuación, para añadir \n"
+"robustez, y para prevenir que un par de inundación malicioso acapare "
+"(`black-holing`) una parte del espacio de la clave. Las consultas "
+"continúan \n"
+"hasta que se alcance el total del tiempo límite de la consulta o se haya "
+"consultado al número de pares máximo."
#: i2p2www/pages/site/docs/how/network-database.html:501
msgid ""
-"Node IDs are verifiable in that we use the router hash directly as both the node ID and the Kademlia key.\n"
-"Incorrect responses that are not closer to the search key are generally ignored.\n"
+"Node IDs are verifiable in that we use the router hash "
+"directly as both the node ID and the Kademlia key.\n"
+"Incorrect responses that are not closer to the search key are generally "
+"ignored.\n"
"Given the current size of the network, a router has\n"
"detailed knowledge of the neighborhood of the destination ID space."
-msgstr "Los identificadores (`IDs`) de nodos son verificables en aquellos [nodos] en los que usamos el identificador criptográfico del router (`hash`) directamente tanto como identificador (`ID`) de nodo y como clave \nKademlia. Las respuestas incorrectas que no sean más cercanas a la clave \nde búsqueda son ignoradas por lo general. Dado el actual tamaño de la red, \nun router tiene conocimiento detallado del vecindario del espacio del identicador (`ID`) del destino."
+msgstr ""
+"Los identificadores (`IDs`) de nodos son verificables en "
+"aquellos [nodos] en los que usamos el identificador criptográfico del "
+"router (`hash`) directamente tanto como identificador (`ID`) de nodo y "
+"como clave \n"
+"Kademlia. Las respuestas incorrectas que no sean más cercanas a la clave"
+" \n"
+"de búsqueda son ignoradas por lo general. Dado el actual tamaño de la "
+"red, \n"
+"un router tiene conocimiento detallado del vecindario del espacio del "
+"identicador (`ID`) del destino."
#: i2p2www/pages/site/docs/how/network-database.html:510
msgid "RouterInfo Storage Verification"
@@ -7205,20 +11338,37 @@ msgstr "Verificación del almacenamiento de la RouterInfo"
#: i2p2www/pages/site/docs/how/network-database.html:511
#, python-format
msgid ""
-"Note: RouterInfo verification is disabled as of release 0.9.7.1 to prevent\n"
+"Note: RouterInfo verification is disabled as of release 0.9.7.1 to "
+"prevent\n"
"the attack described in the paper\n"
"Practical Attacks Against the I2P Network.\n"
"It is not clear if verification can be redesigned to be done safely."
-msgstr "Nota: La verificación del RouterInfo (información para contactar con un\nrouter) está deshabilitada desde la versión 0.9.7.1 para prevenir el\nataque descrito en el ensayo (ataques prácticos contra la red I2P)\nPractical Attacks Against the I2P Network.\nNo está claro si la verificación puede rediseñarse para ser realizada de forma segura."
+msgstr ""
+"Nota: La verificación del RouterInfo (información para contactar con un\n"
+"router) está deshabilitada desde la versión 0.9.7.1 para prevenir el\n"
+"ataque descrito en el ensayo (ataques prácticos contra la red I2P)\n"
+"Practical Attacks Against the I2P Network.\n"
+"No está claro si la verificación puede rediseñarse para ser realizada de "
+"forma segura."
#: i2p2www/pages/site/docs/how/network-database.html:518
msgid ""
-"To verify a storage was successful, a router simply waits about 10 seconds,\n"
+"To verify a storage was successful, a router simply waits about 10 "
+"seconds,\n"
"then sends a lookup to another floodfill router close to the key\n"
"(but not the one the store was sent to).\n"
"Lookups sent out one of the router's outbound exploratory tunnels.\n"
-"Lookups are end-to-end garlic encrypted to prevent snooping by the outbound endpoint(OBEP)."
-msgstr "Para verificar que un almacenamiento fue exitoso, un router simplemente espera cerca de 10 segundos, entonces envía una consulta a otro router de \ninundación (`floodfill`) cercano a la clave (pero no al que se envió el \nalmacenamiento). Las consultas establecieron uno de los túneles \nexploratorios de salida del router. Las consultas están cifradas \nextremo-a-extremo con garlic (ajo) para prevenir la vigilancia en el extremo exterior (OutBound End Point, OBEP)."
+"Lookups are end-to-end garlic encrypted to prevent snooping by the "
+"outbound endpoint(OBEP)."
+msgstr ""
+"Para verificar que un almacenamiento fue exitoso, un router simplemente "
+"espera cerca de 10 segundos, entonces envía una consulta a otro router de"
+" \n"
+"inundación (`floodfill`) cercano a la clave (pero no al que se envió el \n"
+"almacenamiento). Las consultas establecieron uno de los túneles \n"
+"exploratorios de salida del router. Las consultas están cifradas \n"
+"extremo-a-extremo con garlic (ajo) para prevenir la vigilancia en el "
+"extremo exterior (OutBound End Point, OBEP)."
#: i2p2www/pages/site/docs/how/network-database.html:526
msgid "LeaseSet Storage Verification"
@@ -7226,21 +11376,39 @@ msgstr "Verificación del almacenamiento del LeaseSet"
#: i2p2www/pages/site/docs/how/network-database.html:527
msgid ""
-"To verify a storage was successful, a router simply waits about 10 seconds,\n"
+"To verify a storage was successful, a router simply waits about 10 "
+"seconds,\n"
"then sends a lookup to another floodfill router close to the key\n"
"(but not the one the store was sent to).\n"
-"Lookups sent out one of the outbound client tunnels for the destination of the LeaseSet being verified.\n"
+"Lookups sent out one of the outbound client tunnels for the destination "
+"of the LeaseSet being verified.\n"
"To prevent snooping by the OBEP of the outbound tunnel,\n"
"lookups are end-to-end garlic encrypted.\n"
-"The replies are specified to return via one of the client's inbound tunnels."
-msgstr "Para verificar que el almacenamiento fue exitoso, un router simplemente \nespera cerca de 10 segundos, y luego envía una consulta a otro router de inundación (`floodfill`) cercano a la clave (pero no al que se envió el almacenamiento). Las consultas establecieron uno de los túneles de salida del cliente para el destino del LeaseSet (grupo de túneles para un destino) que se está verificando. Para prevenir la vigilancia en el OBEP (extremo exterior) del túnel de salida, las consultas están cifradas\nextremo-a-extremo con garlic (ajo). Se especifica a las respuestas que vuelvan a través de uno de los túneles de entrada del cliente."
+"The replies are specified to return via one of the client's inbound "
+"tunnels."
+msgstr ""
+"Para verificar que el almacenamiento fue exitoso, un router simplemente \n"
+"espera cerca de 10 segundos, y luego envía una consulta a otro router de "
+"inundación (`floodfill`) cercano a la clave (pero no al que se envió el "
+"almacenamiento). Las consultas establecieron uno de los túneles de salida"
+" del cliente para el destino del LeaseSet (grupo de túneles para un "
+"destino) que se está verificando. Para prevenir la vigilancia en el OBEP "
+"(extremo exterior) del túnel de salida, las consultas están cifradas\n"
+"extremo-a-extremo con garlic (ajo). Se especifica a las respuestas que "
+"vuelvan a través de uno de los túneles de entrada del cliente."
#: i2p2www/pages/site/docs/how/network-database.html:537
msgid ""
-"As of release 0.9.7, replies for both RouterInfo and LeaseSet lookups (a DatabaseStoreMessage or a DatabaseSearchReplyMessage)\n"
+"As of release 0.9.7, replies for both RouterInfo and LeaseSet lookups (a "
+"DatabaseStoreMessage or a DatabaseSearchReplyMessage)\n"
"will be encrypted,\n"
"to hide the reply from the inbound gateway (IBGW) of the reply tunnel."
-msgstr "Desde la versión 0.9.7, las respuestas tanto para las consultas de RouterInfo como de LeaseSet (un DatabaseStoreMessage o un \nDatabaseSearchReplyMessage) estarán cifradas para ocultar la respuesta desde la pasarela de entrada (`inbound gateway`, IBGW) del túnel de respuesta."
+msgstr ""
+"Desde la versión 0.9.7, las respuestas tanto para las consultas de "
+"RouterInfo como de LeaseSet (un DatabaseStoreMessage o un \n"
+"DatabaseSearchReplyMessage) estarán cifradas para ocultar la respuesta "
+"desde la pasarela de entrada (`inbound gateway`, IBGW) del túnel de "
+"respuesta."
#: i2p2www/pages/site/docs/how/network-database.html:545
msgid "Exploration"
@@ -7249,17 +11417,44 @@ msgstr "Exploración"
#: i2p2www/pages/site/docs/how/network-database.html:546
#, python-format
msgid ""
-"Exploration is a special form of netdb lookup, where a router attempts to learn about\n"
+"Exploration is a special form of netdb lookup, where a router "
+"attempts to learn about\n"
"new routers.\n"
-"It does this by sending a floodfill router a I2NP DatabaseLookupMessage, looking for a random key.\n"
+"It does this by sending a floodfill router a I2NP DatabaseLookupMessage, looking for a random "
+"key.\n"
"As this lookup will fail, the floodfill would normally respond with a\n"
-"I2NP DatabaseSearchReplyMessage containing hashes of floodfill routers close to the key.\n"
-"This would not be helpful, as the requesting router probably already knows those floodfills,\n"
-"and it would be impractical to add ALL floodfill routers to the \"don't include\" field of the lookup.\n"
-"For an exploration query, the requesting router adds a router hash of all zeros to the\n"
+"I2NP DatabaseSearchReplyMessage containing "
+"hashes of floodfill routers close to the key.\n"
+"This would not be helpful, as the requesting router probably already "
+"knows those floodfills,\n"
+"and it would be impractical to add ALL floodfill routers to the \"don't "
+"include\" field of the lookup.\n"
+"For an exploration query, the requesting router adds a router hash of all"
+" zeros to the\n"
"\"don't include\" field of the DatabaseLookupMessage.\n"
-"The floodfill will then respond only with non-floodfill routers close to the requested key."
-msgstr "La exploración es una forma especial de consulta netDb, donde un \nrouter intenta aprender sobre nuevos routers. Esto lo hace enviando a un router de inundación (`floodfill`) un DatabaseLookupMessage I2NP, \nen busca de una clave aleatoria. Como esta consulta fallará, el router de inundación normalmente respondería con un DatabaseSearchReplyMessage \nI2NP conteniendo los identificacadores criptográficos (`hashes`) \nde routers de inundación cercanos a la clave. Esto no sería de ayuda ya \nque el router solicitante probablemente ya conoce esos routers de \ninundación, y no sería práctico añadirlos a TODOS al campo \"no incluir\" de \nla consulta. Para una petición de exploración, el router solicitante añade un \nidentificador criptográfico (`hash`) de router, con todo ceros, al campo \n\"no incluir\" del DatabaseLookupMessage de la consulta. El router de \ninundación entonces responderá sólo con routers no-de-inundación \ncercanos a la clave solicitada."
+"The floodfill will then respond only with non-floodfill routers close to "
+"the requested key."
+msgstr ""
+"La exploración es una forma especial de consulta netDb, donde un \n"
+"router intenta aprender sobre nuevos routers. Esto lo hace enviando a un "
+"router de inundación (`floodfill`) un DatabaseLookupMessage I2NP, \n"
+"en busca de una clave aleatoria. Como esta consulta fallará, el router de"
+" inundación normalmente respondería con un DatabaseSearchReplyMessage \n"
+"I2NP conteniendo los identificacadores "
+"criptográficos (`hashes`) \n"
+"de routers de inundación cercanos a la clave. Esto no sería de ayuda ya \n"
+"que el router solicitante probablemente ya conoce esos routers de \n"
+"inundación, y no sería práctico añadirlos a TODOS al campo \"no incluir\""
+" de \n"
+"la consulta. Para una petición de exploración, el router solicitante "
+"añade un \n"
+"identificador criptográfico (`hash`) de router, con todo ceros, al campo"
+" \n"
+"\"no incluir\" del DatabaseLookupMessage de la consulta. El router de \n"
+"inundación entonces responderá sólo con routers no-de-inundación \n"
+"cercanos a la clave solicitada."
#: i2p2www/pages/site/docs/how/network-database.html:560
msgid "Notes on Lookup Responses"
@@ -7267,13 +11462,26 @@ msgstr "Notas sobre las respuestas a consultas"
#: i2p2www/pages/site/docs/how/network-database.html:561
msgid ""
-"The response to a lookup request is either a Database Store Message (on success) or a\n"
-"Database Search Reply Message (on failure). The DSRM contains a 'from' router hash field\n"
+"The response to a lookup request is either a Database Store Message (on "
+"success) or a\n"
+"Database Search Reply Message (on failure). The DSRM contains a 'from' "
+"router hash field\n"
"to indicate the source of the reply; the DSM does not.\n"
"The DSRM 'from' field is unauthenticated and may be spoofed or invalid.\n"
-"There are no other response tags. Therefore, when making multiple requests in parallel, it is\n"
+"There are no other response tags. Therefore, when making multiple "
+"requests in parallel, it is\n"
"difficult to monitor the performance of the various floodfill routers."
-msgstr "La respuesta a una solicitud de consulta es o bien (si tiene éxito) un mensaje de alcemacenamiento en la base de datos (DSM), o (si falla) un mensaje de respuesta de búsqueda en la base de datos (DSRM). El DSRM \ncontiene un campo 'from' (desde) en el hash del router para indicar la fuente de la respueta; el DSM no. El campo 'from' (desde) del DSRM no está \nautentificado y pude ser vigilado o inválido. No hay otras etiquetas de respuesta. Por lo tanto, cuando se hacen múltiples solicitudes en paralelo, es difícill monitorizar el rendimiento de los diferentes routers de inundación."
+msgstr ""
+"La respuesta a una solicitud de consulta es o bien (si tiene éxito) un "
+"mensaje de alcemacenamiento en la base de datos (DSM), o (si falla) un "
+"mensaje de respuesta de búsqueda en la base de datos (DSRM). El DSRM \n"
+"contiene un campo 'from' (desde) en el hash del router para indicar la "
+"fuente de la respueta; el DSM no. El campo 'from' (desde) del DSRM no "
+"está \n"
+"autentificado y pude ser vigilado o inválido. No hay otras etiquetas de "
+"respuesta. Por lo tanto, cuando se hacen múltiples solicitudes en "
+"paralelo, es difícill monitorizar el rendimiento de los diferentes "
+"routers de inundación."
#: i2p2www/pages/site/docs/how/network-database.html:571
msgid "MultiHoming"
@@ -7281,14 +11489,29 @@ msgstr "MultiHoming, multihospedaje"
#: i2p2www/pages/site/docs/how/network-database.html:573
msgid ""
-"Destinations may be hosted on multiple routers simultaneously, by using the same\n"
+"Destinations may be hosted on multiple routers simultaneously, by using "
+"the same\n"
"private and public keys (traditionally stored in eepPriv.dat files).\n"
-"As both instances will periodically publish their signed LeaseSets to the floodfill peers,\n"
-"the most recently published LeaseSet will be returned to a peer requesting a database lookup.\n"
-"As LeaseSets have (at most) a 10 minute lifetime, should a particular instance go down,\n"
-"the outage will be 10 minutes at most, and generally much less than that.\n"
-"The multihoming function has been verified and is in use by several services on the network."
-msgstr "Las Destinaciones pueden ser alojadas simultáneamente en múltiples ruters, usando las mismas claves privadas y públicas (normalmente almacenadas en los archivos eepPriv.dat). Ya que ambas instancias publicarán periódicamente sus LeaseSets firmados a los pares floodfill, el LeaseSet publicado más recientemente será devuelto al par que hizo la búsqueda en la base de datos. Ya que los LeaseSets tienen (como mucho) 10 minutos de vida, si alguno de los ruters se cae, el corte será como mucho de 10 minutos, y normalmente mucho menos tiempo. El sistema de multihoming ha sido verificado y se usa en varios servicios de la red."
+"As both instances will periodically publish their signed LeaseSets to the"
+" floodfill peers,\n"
+"the most recently published LeaseSet will be returned to a peer "
+"requesting a database lookup.\n"
+"As LeaseSets have (at most) a 10 minute lifetime, should a particular "
+"instance go down,\n"
+"the outage will be 10 minutes at most, and generally much less than that."
+"\n"
+"The multihoming function has been verified and is in use by several "
+"services on the network."
+msgstr ""
+"Las Destinaciones pueden ser alojadas simultáneamente en múltiples "
+"ruters, usando las mismas claves privadas y públicas (normalmente "
+"almacenadas en los archivos eepPriv.dat). Ya que ambas instancias "
+"publicarán periódicamente sus LeaseSets firmados a los pares floodfill, "
+"el LeaseSet publicado más recientemente será devuelto al par que hizo la "
+"búsqueda en la base de datos. Ya que los LeaseSets tienen (como mucho) "
+"10 minutos de vida, si alguno de los ruters se cae, el corte será como "
+"mucho de 10 minutos, y normalmente mucho menos tiempo. El sistema de "
+"multihoming ha sido verificado y se usa en varios servicios de la red."
#: i2p2www/pages/site/docs/how/network-database.html:583
msgid "Threat Analysis"
@@ -7299,7 +11522,9 @@ msgstr "Análisis de amenazas"
msgid ""
"Also discussed on the threat model "
"page."
-msgstr "También se debate en la web de los modelos de amenazas."
+msgstr ""
+"También se debate en la web de los "
+"modelos de amenazas."
#: i2p2www/pages/site/docs/how/network-database.html:588
msgid ""
@@ -7307,7 +11532,10 @@ msgid ""
"creating one or more floodfill routers and crafting them to offer\n"
"bad, slow, or no responses.\n"
"Some scenarios are discussed below."
-msgstr "Un usuario hostil puede intentar dañar la red creando uno o más ruters floodfill y configurándolos para ofrecer respuestas malas, lentas o incluso no ofrecerlas. Algunos escenarios se discuten más abajo."
+msgstr ""
+"Un usuario hostil puede intentar dañar la red creando uno o más ruters "
+"floodfill y configurándolos para ofrecer respuestas malas, lentas o "
+"incluso no ofrecerlas. Algunos escenarios se discuten más abajo."
#: i2p2www/pages/site/docs/how/network-database.html:595
msgid "General Mitigation Through Growth"
@@ -7317,9 +11545,16 @@ msgstr "Mitigación general a través del crecimiento"
#, python-format
msgid ""
"There are currently around %(ffcount)s floodfill routers in the network.\n"
-"Most of the following attacks will become more difficult, or have less impact,\n"
+"Most of the following attacks will become more difficult, or have less "
+"impact,\n"
"as the network size and number of floodfill routers increase."
-msgstr "Actualmente hay alrededor de %(ffcount)s routers floodfill (de inundación) en la red.\nLa mayoría de los ataques siguientes se harán más difíciles, o tendrán menos impacto,\nal incrementarse el tamaño de la red e incrementarse el número de routers floodfill."
+msgstr ""
+"Actualmente hay alrededor de %(ffcount)s routers floodfill (de "
+"inundación) en la red.\n"
+"La mayoría de los ataques siguientes se harán más difíciles, o tendrán "
+"menos impacto,\n"
+"al incrementarse el tamaño de la red e incrementarse el número de routers"
+" floodfill."
#: i2p2www/pages/site/docs/how/network-database.html:603
msgid "General Mitigation Through Redundancy"
@@ -7328,9 +11563,11 @@ msgstr "Mitigación general a través de la redundancia"
#: i2p2www/pages/site/docs/how/network-database.html:604
#, python-format
msgid ""
-"Via flooding, all netdb entries are stored on the %(floodsize)s floodfill "
-"routers closest to the key."
-msgstr "Mediante la inundación, todas las entradas NetDb se almacenan en los\n%(floodsize)s routers floodfill (de inundación ) más próximos a la clave."
+"Via flooding, all netdb entries are stored on the %(floodsize)s floodfill"
+" routers closest to the key."
+msgstr ""
+"Mediante la inundación, todas las entradas NetDb se almacenan en los\n"
+"%(floodsize)s routers floodfill (de inundación ) más próximos a la clave."
#: i2p2www/pages/site/docs/how/network-database.html:609
msgid "Forgeries"
@@ -7340,7 +11577,9 @@ msgstr "Falsificaciones"
msgid ""
"All netdb entries are signed by their creators, so no router may forge a\n"
"RouterInfo or LeaseSet."
-msgstr "Todas las entradas de la netdb están firmadas por sus creadores, por lo que ningún ruter puede crear un RouterInfo o un LeaseSet."
+msgstr ""
+"Todas las entradas de la netdb están firmadas por sus creadores, por lo "
+"que ningún ruter puede crear un RouterInfo o un LeaseSet."
#: i2p2www/pages/site/docs/how/network-database.html:615
msgid "Slow or Unresponsive"
@@ -7350,10 +11589,15 @@ msgstr "Lento o sin respuestas"
#, python-format
msgid ""
"Each router maintains an expanded set of statistics in the\n"
-"peer profile for each floodfill router,\n"
+"peer profile for each floodfill router,"
+"\n"
"covering various quality metrics for that peer.\n"
"The set includes:"
-msgstr "Cada ruter mantiene un dilatado conjunto de estadísticas en el perfil del par por cada ruter floodfill, con información sobre varias medidas de calidad de ese par. Este conjunto incluye:"
+msgstr ""
+"Cada ruter mantiene un dilatado conjunto de estadísticas en el perfil del par por cada ruter floodfill, "
+"con información sobre varias medidas de calidad de ese par. Este conjunto"
+" incluye:"
#: i2p2www/pages/site/docs/how/network-database.html:623
msgid "Average response time"
@@ -7365,7 +11609,9 @@ msgstr "Porcentaje de consultas respondidas con los datos solicitados"
#: i2p2www/pages/site/docs/how/network-database.html:625
msgid "Percentage of stores that were successfully verified"
-msgstr "Porcentaje de los almacenamientos que fueron verificados satisfactoriamente"
+msgstr ""
+"Porcentaje de los almacenamientos que fueron verificados "
+"satisfactoriamente"
#: i2p2www/pages/site/docs/how/network-database.html:626
msgid "Last successful store"
@@ -7381,13 +11627,23 @@ msgstr "Última respuesta"
#: i2p2www/pages/site/docs/how/network-database.html:631
msgid ""
-"Each time a router needs to make a determination on which floodfill router is closest to a key,\n"
+"Each time a router needs to make a determination on which floodfill "
+"router is closest to a key,\n"
"it uses these metrics to determine which floodfill routers are \"good\".\n"
-"The methods, and thresholds, used to determine \"goodness\" are relatively new, and\n"
+"The methods, and thresholds, used to determine \"goodness\" are "
+"relatively new, and\n"
"are subject to further analysis and improvement.\n"
-"While a completely unresponsive router will quickly be identified and avoided,\n"
+"While a completely unresponsive router will quickly be identified and "
+"avoided,\n"
"routers that are only sometimes malicious may be much harder to deal with."
-msgstr "Cada vez que un ruter necesita determinar cual ruter floodfill está más cercano a cierta clave, utiliza estas medidas para determinar que floodfills son \"buenos\". Estos métodos, y umbrales, usados para determinar \"lo bueno que es\" son relativamente nuevos, y pueden ser revisados y mejorados. Mientras que un ruter que no responda será identificado y evitado rápidamente, los ruters que sólo son maliciosos a veces pueden ser mucho más difíciles de manejar."
+msgstr ""
+"Cada vez que un ruter necesita determinar cual ruter floodfill está más "
+"cercano a cierta clave, utiliza estas medidas para determinar que "
+"floodfills son \"buenos\". Estos métodos, y umbrales, usados para "
+"determinar \"lo bueno que es\" son relativamente nuevos, y pueden ser "
+"revisados y mejorados. Mientras que un ruter que no responda será "
+"identificado y evitado rápidamente, los ruters que sólo son maliciosos a "
+"veces pueden ser mucho más difíciles de manejar."
#: i2p2www/pages/site/docs/how/network-database.html:641
msgid "Sybil Attack (Full Keyspace)"
@@ -7397,63 +11653,105 @@ msgstr "Ataque Sybil (espacio de claves completo)"
#, python-format
msgid ""
"An attacker may mount a Sybil attack\n"
-"by creating a large number of floodfill routers spread throughout the keyspace."
-msgstr "Un atacante puede crear un ataque Sybil creando un gran número de ruters floodfill repartidos a través del espacio de claves, keyspace."
+"by creating a large number of floodfill routers spread throughout the "
+"keyspace."
+msgstr ""
+"Un atacante puede crear un ataque Sybil creando "
+"un gran número de ruters floodfill repartidos a través del espacio de "
+"claves, keyspace."
#: i2p2www/pages/site/docs/how/network-database.html:647
#, python-format
msgid ""
"(In a related example, a researcher recently created a\n"
"large number of Tor relays.)\n"
-"If successful, this could be an effective DOS attack on the entire network."
-msgstr "(Como ejemplo relacionado, recientemente un investigador creó un gran número de relays Tor.) Si es exitoso, podría ser un ataque DOS efectivo en toda la red."
+"If successful, this could be an effective DOS attack on the entire "
+"network."
+msgstr ""
+"(Como ejemplo relacionado, recientemente un investigador creó un gran número de relays Tor.) Si es exitoso, podría "
+"ser un ataque DOS efectivo en toda la red."
#: i2p2www/pages/site/docs/how/network-database.html:653
msgid ""
-"If the floodfills are not sufficiently misbehaving to be marked as \"bad\" using the peer profile\n"
+"If the floodfills are not sufficiently misbehaving to be marked as "
+"\"bad\" using the peer profile\n"
"metrics described above, this is a difficult scenario to handle.\n"
-"Tor's response can be much more nimble in the relay case, as the suspicious relays\n"
+"Tor's response can be much more nimble in the relay case, as the "
+"suspicious relays\n"
"can be manually removed from the consensus.\n"
-"Some possible responses for the I2P network are listed below, however none of them is completely satisfactory:"
-msgstr "Si los floodfills no se comportan suficientemente mal para ser marcados como \"malos\" usando las medidas del perfil del par descritas antes, sería un escenario muy difícil de manejar. Las respuestas de la red Tor pueden ser mucho más ágiles en el caso de los relays, ya que los relays maliciosos pueden ser eliminados manualmente del consenso. Algunas respuestas factibles para la red I2P son listadas debajo, aunque ninguna de ellas es totalmente satisfactoria:"
+"Some possible responses for the I2P network are listed below, however "
+"none of them is completely satisfactory:"
+msgstr ""
+"Si los floodfills no se comportan suficientemente mal para ser marcados "
+"como \"malos\" usando las medidas del perfil del par descritas antes, "
+"sería un escenario muy difícil de manejar. Las respuestas de la red Tor "
+"pueden ser mucho más ágiles en el caso de los relays, ya que los relays "
+"maliciosos pueden ser eliminados manualmente del consenso. Algunas "
+"respuestas factibles para la red I2P son listadas debajo, aunque ninguna "
+"de ellas es totalmente satisfactoria:"
#: i2p2www/pages/site/docs/how/network-database.html:661
msgid ""
-"Compile a list of bad router hashes or IPs, and announce the list through various means\n"
-"(console news, website, forum, etc.); users would have to manually download the list and\n"
+"Compile a list of bad router hashes or IPs, and announce the list through"
+" various means\n"
+"(console news, website, forum, etc.); users would have to manually "
+"download the list and\n"
"add it to their local \"blacklist\"."
-msgstr "Crear una lista de hashes de ruters malos o IPs, y anunciar la lista de varias formas (noticias en la consola, web, forums, etc.); los usuarios tendrían que descargar la lista manualmente y añadirla a \"lista negra\" local."
+msgstr ""
+"Crear una lista de hashes de ruters malos o IPs, y anunciar la lista de "
+"varias formas (noticias en la consola, web, forums, etc.); los usuarios "
+"tendrían que descargar la lista manualmente y añadirla a \"lista negra\" "
+"local."
#: i2p2www/pages/site/docs/how/network-database.html:666
msgid ""
-"Ask everyone in the network to enable floodfill manually (fight Sybil with "
-"more Sybil)"
-msgstr "Pedir a todos los usuarios de la red el activar el floodfill manualmente (luchar contra Sybil con más Sybil)"
+"Ask everyone in the network to enable floodfill manually (fight Sybil "
+"with more Sybil)"
+msgstr ""
+"Pedir a todos los usuarios de la red el activar el floodfill manualmente "
+"(luchar contra Sybil con más Sybil)"
#: i2p2www/pages/site/docs/how/network-database.html:667
msgid "Release a new software version that includes the hardcoded \"bad\" list"
-msgstr "Liberar una nueva versión del software que incluya la lista \"mala\" inscrustada en el código"
+msgstr ""
+"Liberar una nueva versión del software que incluya la lista \"mala\" "
+"inscrustada en el código"
#: i2p2www/pages/site/docs/how/network-database.html:668
msgid ""
-"Release a new software version that improves the peer profile metrics and thresholds,\n"
+"Release a new software version that improves the peer profile metrics and"
+" thresholds,\n"
"in an attempt to automatically identify the \"bad\" peers."
-msgstr "Liberar una versión del software nueva que mejore los umbrales y las medidas del perfil de los pares, para intentar identificar los pares \"malos\" automáticamente."
+msgstr ""
+"Liberar una versión del software nueva que mejore los umbrales y las "
+"medidas del perfil de los pares, para intentar identificar los pares "
+"\"malos\" automáticamente."
#: i2p2www/pages/site/docs/how/network-database.html:672
msgid ""
"Add software that disqualifies floodfills if too many of them are in a "
"single IP block"
-msgstr "Añadir una ampliación que descalifique floodfills si hay demasiados de ellos en un único bloque de IPs"
+msgstr ""
+"Añadir una ampliación que descalifique floodfills si hay demasiados de "
+"ellos en un único bloque de IPs"
#: i2p2www/pages/site/docs/how/network-database.html:673
msgid ""
-"Implement an automatic subscription-based blacklist controlled by a single individual or group.\n"
-"This would essentially implement a portion of the Tor \"consensus\" model.\n"
-"Unfortunately it would also give a single individual or group the power to\n"
+"Implement an automatic subscription-based blacklist controlled by a "
+"single individual or group.\n"
+"This would essentially implement a portion of the Tor \"consensus\" "
+"model.\n"
+"Unfortunately it would also give a single individual or group the power "
+"to\n"
"block participation of any particular router or IP in the network,\n"
"or even to completely shutdown or destroy the entire network."
-msgstr "Implementar una lista negra automática basada en suscripciones controlada por un único grupo individual. Esto esencialmente implementaría una parte del modelo de \"consenso\" de Tor. Desafortunadamente le daría a un solo grupo el poder de bloquear la participación de cualquier ruter o IP en la red, o incluso apagar o destruir la red entera."
+msgstr ""
+"Implementar una lista negra automática basada en suscripciones controlada"
+" por un único grupo individual. Esto esencialmente implementaría una "
+"parte del modelo de \"consenso\" de Tor. Desafortunadamente le daría a un"
+" solo grupo el poder de bloquear la participación de cualquier ruter o IP"
+" en la red, o incluso apagar o destruir la red entera."
#: i2p2www/pages/site/docs/how/network-database.html:682
msgid "This attack becomes more difficult as the network size grows."
@@ -7467,53 +11765,101 @@ msgstr "Ataque Sybil (espacio de claves parcial)"
#, python-format
msgid ""
"An attacker may mount a Sybil attack\n"
-"by creating a small number (8-15) of floodfill routers clustered closely in the keyspace,\n"
+"by creating a small number (8-15) of floodfill routers clustered closely "
+"in the keyspace,\n"
"and distribute the RouterInfos for these routers widely.\n"
-"Then, all lookups and stores for a key in that keyspace would be directed\n"
+"Then, all lookups and stores for a key in that keyspace would be directed"
+"\n"
"to one of the attacker's routers.\n"
-"If successful, this could be an effective DOS attack on a particular eepsite, for example."
-msgstr "Un atacante puede montar un ataque Sybil creando un pequeño número de ruters floodfill (8-15) cercanos en el espacio de claves, y distribuir los RouterInfos de esos ruters extensamente. Entonces, todas las búsquedas y almacenamientos de una clave en ese espacio de claves serán dirigidod a uno de los ruters del atacante. Si ha tenido éxito, esto podía provocar un ataque DOS efectivo sobre un eepsite en particular, por ejemplo."
+"If successful, this could be an effective DOS attack on a particular "
+"eepsite, for example."
+msgstr ""
+"Un atacante puede montar un ataque Sybil creando "
+"un pequeño número de ruters floodfill (8-15) cercanos en el espacio de "
+"claves, y distribuir los RouterInfos de esos ruters extensamente. "
+"Entonces, todas las búsquedas y almacenamientos de una clave en ese "
+"espacio de claves serán dirigidod a uno de los ruters del atacante. Si ha"
+" tenido éxito, esto podía provocar un ataque DOS efectivo sobre un "
+"eepsite en particular, por ejemplo."
#: i2p2www/pages/site/docs/how/network-database.html:698
msgid ""
-"As the keyspace is indexed by the cryptographic (SHA256) Hash of the key,\n"
-"an attacker must use a brute-force method to repeatedly generate router hashes\n"
+"As the keyspace is indexed by the cryptographic (SHA256) Hash of the key,"
+"\n"
+"an attacker must use a brute-force method to repeatedly generate router "
+"hashes\n"
"until he has enough that are sufficiently close to the key.\n"
-"The amount of computational power required for this, which is dependent on network\n"
+"The amount of computational power required for this, which is dependent "
+"on network\n"
"size, is unknown."
-msgstr "Ya que el espacio de claves está indexado por el hash criptográfico (SHA256) de la clave, un atacante tiene que usar la fuerza bruta para generar repetidamente hashes de routers hasta que tenga suficientes que estén suficientemente cerca de la clave. La cantidad de potencia de cálculo requerida para esto, la cual depende del tamaño de la red, es desconocida. "
+msgstr ""
+"Ya que el espacio de claves está indexado por el hash criptográfico "
+"(SHA256) de la clave, un atacante tiene que usar la fuerza bruta para "
+"generar repetidamente hashes de routers hasta que tenga suficientes que "
+"estén suficientemente cerca de la clave. La cantidad de potencia de "
+"cálculo requerida para esto, la cual depende del tamaño de la red, es "
+"desconocida. "
#: i2p2www/pages/site/docs/how/network-database.html:706
msgid ""
"As a partial defense against this attack,\n"
"the algorithm used to determine Kademlia \"closeness\" varies over time.\n"
-"Rather than using the Hash of the key (i.e. H(k)) to determine closeness,\n"
-"we use the Hash of the key appended with the current date string, i.e. H(k + YYYYMMDD).\n"
-"A function called the \"routing key generator\" does this, which transforms the original key into a \"routing key\".\n"
-"In other words, the entire netdb keyspace \"rotates\" every day at UTC midnight.\n"
+"Rather than using the Hash of the key (i.e. H(k)) to determine closeness,"
+"\n"
+"we use the Hash of the key appended with the current date string, i.e. "
+"H(k + YYYYMMDD).\n"
+"A function called the \"routing key generator\" does this, which "
+"transforms the original key into a \"routing key\".\n"
+"In other words, the entire netdb keyspace \"rotates\" every day at UTC "
+"midnight.\n"
"Any partial-keyspace attack would have to be regenerated every day, for\n"
"after the rotation, the attacking routers would no longer be close\n"
"to the target key, or to each other."
-msgstr "Como una defensa parcial contra este ataque, el algoritmo usado para determinar la \"cercanía\" Kademlia varía con el tiempo. En vez de usar el hash de la clave (por ejemplo H(k)) para determinar la cercanía, usamos el Hash de la clave añadido a la cadena de datos actuales, por ejemplo H(k + YYYYMMDD). En otras palabras, el espacio de claves completo de la netdb \"rota\" cada día a la media noche UTC. Cualquier ataque parcial al espacio de claves tendría que regenerarse cada día, después de cada rotación los ruters atacantes no estarán ya cerca de la clave del objetivo."
+msgstr ""
+"Como una defensa parcial contra este ataque, el algoritmo usado para "
+"determinar la \"cercanía\" Kademlia varía con el tiempo. En vez de usar "
+"el hash de la clave (por ejemplo H(k)) para determinar la cercanía, "
+"usamos el Hash de la clave añadido a la cadena de datos actuales, por "
+"ejemplo H(k + YYYYMMDD). En otras palabras, el espacio de claves completo"
+" de la netdb \"rota\" cada día a la media noche UTC. Cualquier ataque "
+"parcial al espacio de claves tendría que regenerarse cada día, después de"
+" cada rotación los ruters atacantes no estarán ya cerca de la clave del "
+"objetivo."
#: i2p2www/pages/site/docs/how/network-database.html:718
msgid ""
"This attack becomes more difficult as the network size grows.\n"
-"However, recent research demonstrates that the keyspace rotation is not particularly effective.\n"
+"However, recent research demonstrates that the keyspace rotation is not "
+"particularly effective.\n"
"An attacker can precompute numerous router hashes in advance,\n"
"and only a few routers are sufficient to \"eclipse\" a portion\n"
"of the keyspace within a half hour after rotation."
-msgstr "Este ataque se hace más difícil según crece la red. Aunque estudios recientes han demostrado que la rotación del espacio de claves no es particularmente efectiva. Un atacante podría pre-calcular numerosos hashes de ruters de antemano, y sólo son necesarios unos pocos ruters para \"eclipsar\" una parte del espacio de claves en sólo media hora después de la rotación."
+msgstr ""
+"Este ataque se hace más difícil según crece la red. Aunque estudios "
+"recientes han demostrado que la rotación del espacio de claves no es "
+"particularmente efectiva. Un atacante podría pre-calcular numerosos "
+"hashes de ruters de antemano, y sólo son necesarios unos pocos ruters "
+"para \"eclipsar\" una parte del espacio de claves en sólo media hora "
+"después de la rotación."
#: i2p2www/pages/site/docs/how/network-database.html:726
msgid ""
-"One consequence of daily keyspace rotation is that the distributed network database\n"
+"One consequence of daily keyspace rotation is that the distributed "
+"network database\n"
"may become unreliable for a few minutes after the rotation --\n"
-"lookups will fail because the new \"closest\" router has not received a store yet.\n"
+"lookups will fail because the new \"closest\" router has not received a "
+"store yet.\n"
"The extent of the issue, and methods for mitigation\n"
"(for example netdb \"handoffs\" at midnight)\n"
"are a topic for further study."
-msgstr "Una de las consecuencias de la rotación diaria del espacio de claves es que la base de datos de la red distribuida se queda inaccesible durante unos minutos tras la rotación -- las búsquedas fallarán porque los nuevos ruters \"más cercanos\" no han recibido aún un almacenamiento. El alcance del problema, y los métodos para mitigarlo (por ejemplo con \"handoffs, manos fuera\" de la netdb a media noche) es un tema para futuros estudios."
+msgstr ""
+"Una de las consecuencias de la rotación diaria del espacio de claves es "
+"que la base de datos de la red distribuida se queda inaccesible durante "
+"unos minutos tras la rotación -- las búsquedas fallarán porque los nuevos"
+" ruters \"más cercanos\" no han recibido aún un almacenamiento. El "
+"alcance del problema, y los métodos para mitigarlo (por ejemplo con "
+"\"handoffs, manos fuera\" de la netdb a media noche) es un tema para "
+"futuros estudios."
#: i2p2www/pages/site/docs/how/network-database.html:736
msgid "Bootstrap Attacks"
@@ -7525,7 +11871,11 @@ msgid ""
"or majority-controlled network by taking over a reseed website,\n"
"or tricking the developers into adding his reseed website\n"
"to the hardcoded list in the router."
-msgstr "Un atacante podría intentar arrancar nuevos ruters dentro de una red aislada o controlada en su mayoría por él tomando control de una web de resiembra, o engañando a los desarrolladores para que añadan su web de resembrado dentro del código del ruter."
+msgstr ""
+"Un atacante podría intentar arrancar nuevos ruters dentro de una red "
+"aislada o controlada en su mayoría por él tomando control de una web de "
+"resiembra, o engañando a los desarrolladores para que añadan su web de "
+"resembrado dentro del código del ruter."
#: i2p2www/pages/site/docs/how/network-database.html:744
msgid "Several defenses are possible, and most of these are planned:"
@@ -7535,7 +11885,10 @@ msgstr "Existen varias defensas posibles, y la mayoría ya están planeadas:"
msgid ""
"Disallow fallback from HTTPS to HTTP for reseeding.\n"
"A MITM attacker could simply block HTTPS, then respond to the HTTP."
-msgstr "Desactivar el cambio de HTTPS a HTTP para el resembrado. Un atacante haciendo un MITM podría simplemente bloquear el HTTPS, y entonces responder al HTTP."
+msgstr ""
+"Desactivar el cambio de HTTPS a HTTP para el resembrado. Un atacante "
+"haciendo un MITM podría simplemente bloquear el HTTPS, y entonces "
+"responder al HTTP."
#: i2p2www/pages/site/docs/how/network-database.html:752
msgid "Bundling reseed data in the installer"
@@ -7549,20 +11902,27 @@ msgstr "Defensas que están implementadas:"
msgid ""
"Changing the reseed task to fetch a subset of RouterInfos from\n"
"each of several reseed sites rather than using only a single site"
-msgstr "Cambiar la tarea de resembrado para obtener un subconjunto de RouterInfos desde varias webs de resiembra en vez de usar una única web."
+msgstr ""
+"Cambiar la tarea de resembrado para obtener un subconjunto de RouterInfos"
+" desde varias webs de resiembra en vez de usar una única web."
#: i2p2www/pages/site/docs/how/network-database.html:763
msgid ""
"Creating an out-of-network reseed monitoring service that\n"
"periodically polls reseed websites and verifies that the\n"
"data are not stale or inconsistent with other views of the network"
-msgstr "Creando un servicio de monitoreo de resiembras fuera de la red, que periódicamente pregunte a las webs de resiembra y verifique que los datos no están corruptos o son inconsistentes con otras vistas de la red."
+msgstr ""
+"Creando un servicio de monitoreo de resiembras fuera de la red, que "
+"periódicamente pregunte a las webs de resiembra y verifique que los datos"
+" no están corruptos o son inconsistentes con otras vistas de la red."
#: i2p2www/pages/site/docs/how/network-database.html:768
msgid ""
"As of release 0.9.14, reseed data is bundled into a signed zip file and\n"
"the signature is verified when downloaded."
-msgstr "Desde la versión 0.9.14, los datos de resembrado están empaquetados en\nun fichero zip firmado, y la firma se verifica cuando es descargado."
+msgstr ""
+"Desde la versión 0.9.14, los datos de resembrado están empaquetados en\n"
+"un fichero zip firmado, y la firma se verifica cuando es descargado."
#: i2p2www/pages/site/docs/how/network-database.html:776
msgid "Query Capture"
@@ -7572,22 +11932,39 @@ msgstr "Captura de peticiones"
#, python-format
msgid ""
"See also lookup\n"
-"(Reference: Hashing it out in Public Sections 2.2-2.3 for terms below in italics)"
-msgstr "Vea también búsquedas (Referencia: Hashing it out in Public Secciones 2.2-2.3 para los términos en cursiva de abajo)"
+"(Reference: Hashing it out in Public Sections "
+"2.2-2.3 for terms below in italics)"
+msgstr ""
+"Vea también búsquedas (Referencia: Hashing it out in Public Secciones 2.2-2.3 para los "
+"términos en cursiva de abajo)"
#: i2p2www/pages/site/docs/how/network-database.html:782
msgid ""
-"Similar to a bootstrap attack, an attacker using a floodfill router could attempt to \"steer\"\n"
-"peers to a subset of routers controlled by him by returning their references."
-msgstr "Similar a un ataque bootstrap, un atacante usando un ruter floodfill podría intentar \"dirigir\" a los pares a un subconjunto de ruters controlados por él devolviendo sus referencias."
+"Similar to a bootstrap attack, an attacker using a floodfill router could"
+" attempt to \"steer\"\n"
+"peers to a subset of routers controlled by him by returning their "
+"references."
+msgstr ""
+"Similar a un ataque bootstrap, un atacante usando un ruter floodfill "
+"podría intentar \"dirigir\" a los pares a un subconjunto de ruters "
+"controlados por él devolviendo sus referencias."
#: i2p2www/pages/site/docs/how/network-database.html:787
msgid ""
-"This is unlikely to work via exploration, because exploration is a low-frequency task.\n"
-"Routers acquire a majority of their peer references through normal tunnel building activity.\n"
+"This is unlikely to work via exploration, because exploration is a low-"
+"frequency task.\n"
+"Routers acquire a majority of their peer references through normal tunnel"
+" building activity.\n"
"Exploration results are generally limited to a few router hashes,\n"
"and each exploration query is directed to a random floodfill router."
-msgstr "Esto es raro que funcione vía exploración, porque la exploración es una tarea de baja frecuencia. Los ruters obtienen la mayoría de sus referencias sobre los pares cuando crean los túneles normales. Los resultados de exploración están generalmente limitados a unos pocos hashes de ruters, y cada petición de exploración es dirigida a un ruter floodfill aleatorio. "
+msgstr ""
+"Esto es raro que funcione vía exploración, porque la exploración es una "
+"tarea de baja frecuencia. Los ruters obtienen la mayoría de sus "
+"referencias sobre los pares cuando crean los túneles normales. Los "
+"resultados de exploración están generalmente limitados a unos pocos "
+"hashes de ruters, y cada petición de exploración es dirigida a un ruter "
+"floodfill aleatorio. "
#: i2p2www/pages/site/docs/how/network-database.html:794
#, python-format
@@ -7596,18 +11973,39 @@ msgid ""
"For floodfill router references returned in a\n"
"I2NP DatabaseSearchReplyMessage\n"
"response to a lookup,\n"
-"these references are followed if they are closer (or the next closest) to the lookup key.\n"
+"these references are followed if they are closer (or the next closest) to"
+" the lookup key.\n"
"The requesting router does not trust that the references are\n"
"closer to the key (i.e. they are verifiably correct.\n"
-"The lookup also does not stop when no closer key is found, but continues by querying the\n"
-"next-closet node, until the timeout or maximum number of queries is reached.\n"
-"This prevents a malicious floodfill from black-holing a part of the key space.\n"
-"Also, the daily keyspace rotation requires an attacker to regenerate a router info\n"
+"The lookup also does not stop when no closer key is found, but continues "
+"by querying the\n"
+"next-closet node, until the timeout or maximum number of queries is "
+"reached.\n"
+"This prevents a malicious floodfill from black-holing a part of the key "
+"space.\n"
+"Also, the daily keyspace rotation requires an attacker to regenerate a "
+"router info\n"
"within the desired key space region.\n"
"This design ensures that the query capture attack described in\n"
"Hashing it out in Public\n"
"is much more difficult."
-msgstr "A partir de la versión 0.8.9, se han implementado las búsquedas iterativas. Las referencias de los ruters floodfill devueltas en una respuesta de búsqueda I2NP DatabaseSearchReplyMessage, son seguidas si están más cerca (o la siguiente más cerca) a la clave de búsqueda. El ruter que hace la petición no confía en que las referencias estén más cerca a la clave (por ejemplo, son verificablemente correctas). Además la búsqueda no termina cuando la clave más cercana es encontrada, continúa haciendo peticiones al siguiente nodo más cercano, hasta que termine su tiempo o el número de peticiones. Esto previene que un floodfill malicioso haga un 'agujero negro' a una parte del espacio de claves. Además, la rotación diaria del espacio de claves requiere que el atacante regenere la información de un ruter dentro de la región del espacio de claves deseada. Este diseño asegura que el ataque de captura de peticiones descrito en Hashing it out in Public sea mucho más difícil."
+msgstr ""
+"A partir de la versión 0.8.9, se han implementado las búsquedas "
+"iterativas. Las referencias de los ruters floodfill devueltas en una "
+"respuesta de búsqueda I2NP "
+"DatabaseSearchReplyMessage, son seguidas si están más cerca (o la "
+"siguiente más cerca) a la clave de búsqueda. El ruter que hace la "
+"petición no confía en que las referencias estén más cerca a la clave (por"
+" ejemplo, son verificablemente correctas). Además la búsqueda no "
+"termina cuando la clave más cercana es encontrada, continúa haciendo "
+"peticiones al siguiente nodo más cercano, hasta que termine su tiempo o "
+"el número de peticiones. Esto previene que un floodfill malicioso haga un"
+" 'agujero negro' a una parte del espacio de claves. Además, la rotación "
+"diaria del espacio de claves requiere que el atacante regenere la "
+"información de un ruter dentro de la región del espacio de claves "
+"deseada. Este diseño asegura que el ataque de captura de peticiones "
+"descrito en Hashing it out in Public sea mucho "
+"más difícil."
#: i2p2www/pages/site/docs/how/network-database.html:813
msgid "DHT-Based Relay Selection"
@@ -7624,7 +12022,11 @@ msgid ""
"This doesn't have much to do with floodfill, but see\n"
"the peer selection page\n"
"for a discussion of the vulnerabilities of peer selection for tunnels."
-msgstr "Esto no tiene mucho que ver con los floodfill, pero vea la página de selección de pares para ver una discusión de las vulnerabilidades de la selección de los pares para los túneles."
+msgstr ""
+"Esto no tiene mucho que ver con los floodfill, pero vea la página de selección de pares para ver una "
+"discusión de las vulnerabilidades de la selección de los pares para los "
+"túneles."
#: i2p2www/pages/site/docs/how/network-database.html:824
msgid "Information Leaks"
@@ -7635,41 +12037,84 @@ msgstr "Fugas de información"
msgid ""
"(Reference: In Search of an Anonymous and Secure "
"Lookup Section 3)"
-msgstr "(Referencia: In Search of an Anonymous and Secure Lookup Sección 3)"
+msgstr ""
+"(Referencia: In Search of an Anonymous and Secure "
+"Lookup Sección 3)"
#: i2p2www/pages/site/docs/how/network-database.html:829
#, python-format
msgid ""
-"This paper addresses weaknesses in the \"Finger Table\" DHT lookups used by Torsk and NISAN.\n"
-"At first glance, these do not appear to apply to I2P. First, the use of DHT by Torsk and NISAN\n"
-"is significantly different from that in I2P. Second, I2P's network database lookups are only\n"
-"loosely correlated to the peer selection and\n"
-"tunnel building processes; only previously-known peers\n"
+"This paper addresses weaknesses in the \"Finger Table\" DHT lookups used "
+"by Torsk and NISAN.\n"
+"At first glance, these do not appear to apply to I2P. First, the use of "
+"DHT by Torsk and NISAN\n"
+"is significantly different from that in I2P. Second, I2P's network "
+"database lookups are only\n"
+"loosely correlated to the peer "
+"selection and\n"
+"tunnel building processes; only "
+"previously-known peers\n"
"are used for tunnels.\n"
"Also, peer selection is unrelated to any notion of DHT key-closeness."
-msgstr "Este estudio soluciona la debilidad en las búsquedas DHT \"Finger Table\" usadas por Torks y NISAN. A primera vista, estos parecen que no se apliquen a I2P. Primero, el uso que hacen Torks y NISAN del DHT es bastante diferente que su uso en I2P. Segundo, las búsquedas en la base de datos de red de I2P sólo están un poco relacionadas con los procesos de selección de pares y de construcción de túneles; sólo los pares previamente conocidos son usados para los túneles. Además, la selección de pares no tiene relación con la noción de cercanía de claves DHT."
+msgstr ""
+"Este estudio soluciona la debilidad en las búsquedas DHT \"Finger Table\""
+" usadas por Torks y NISAN. A primera vista, estos parecen que no se "
+"apliquen a I2P. Primero, el uso que hacen Torks y NISAN del DHT es "
+"bastante diferente que su uso en I2P. Segundo, las búsquedas en la base "
+"de datos de red de I2P sólo están un poco relacionadas con los procesos "
+"de selección de pares y de construcción de túneles; sólo los pares "
+"previamente conocidos son usados para los túneles. Además, la selección "
+"de pares no tiene relación con la noción de cercanía de claves DHT."
#: i2p2www/pages/site/docs/how/network-database.html:840
msgid ""
-"Some of this may actually be more interesting when the I2P network gets much larger.\n"
-"Right now, each router knows a large proportion of the network, so looking up a particular\n"
-"Router Info in the network database is not strongly indicative of a future intent to use\n"
-"that router in a tunnel. Perhaps when the network is 100 times larger, the lookup may be\n"
-"more correlative. Of course, a larger network makes a Sybil attack that much harder."
-msgstr "Algunos de estos serán más interesantes cuando la red I2P sea mucho más grande. Ahora mismo, cada ruter conoce una gran porción de la red, con lo que mirando por un RouterInfo en particular en la base de datos de la red no indica que ese ruter se vaya a usar en un túnel. Quizás cuando la red sea 100 veces más grande, la búsqueda sea correlativa. Por supuesto, una red más grande hace que un ataque Sybil sea mucho más difícil."
+"Some of this may actually be more interesting when the I2P network gets "
+"much larger.\n"
+"Right now, each router knows a large proportion of the network, so "
+"looking up a particular\n"
+"Router Info in the network database is not strongly indicative of a "
+"future intent to use\n"
+"that router in a tunnel. Perhaps when the network is 100 times larger, "
+"the lookup may be\n"
+"more correlative. Of course, a larger network makes a Sybil attack that "
+"much harder."
+msgstr ""
+"Algunos de estos serán más interesantes cuando la red I2P sea mucho más "
+"grande. Ahora mismo, cada ruter conoce una gran porción de la red, con lo"
+" que mirando por un RouterInfo en particular en la base de datos de la "
+"red no indica que ese ruter se vaya a usar en un túnel. Quizás cuando la "
+"red sea 100 veces más grande, la búsqueda sea correlativa. Por supuesto, "
+"una red más grande hace que un ataque Sybil sea mucho más difícil."
#: i2p2www/pages/site/docs/how/network-database.html:848
#, python-format
msgid ""
-"However, the general issue of DHT information leakage in I2P needs further investigation.\n"
-"The floodfill routers are in a position to observe queries and gather information.\n"
-"Certainly, at a level of f = 0.2 (20% malicious nodes, as specifed in the paper)\n"
+"However, the general issue of DHT information leakage in I2P needs "
+"further investigation.\n"
+"The floodfill routers are in a position to observe queries and gather "
+"information.\n"
+"Certainly, at a level of f = 0.2 (20% malicious nodes, as "
+"specifed in the paper)\n"
"we expect that many of the Sybil threats we describe\n"
"(here,\n"
"here and\n"
"here)\n"
"become problematic for several reasons."
-msgstr "Sin embargo, el problema general de la filtración de información DHT (tabla \nde identificadores criptográficos (hash) dinámica) en I2P necesita posterior \ninvestigación. Los routers de inundacion (`floodfill`) están en posición de \nobservar peticiones y reunir información. Ciertamente, a un nivel de \nf = 0.2 (20% nodos maliciosos, tal como detalla la especificación) \nesperamos que muchas de las amenazas Sybil que describimos (aquí, \naquí y aquí) se volverán problemáticas por varios motivos."
+msgstr ""
+"Sin embargo, el problema general de la filtración de información DHT "
+"(tabla \n"
+"de identificadores criptográficos (hash) dinámica) en I2P necesita "
+"posterior \n"
+"investigación. Los routers de inundacion (`floodfill`) están en posición "
+"de \n"
+"observar peticiones y reunir información. Ciertamente, a un nivel de \n"
+"f = 0.2 (20% nodos maliciosos, tal como detalla la "
+"especificación) \n"
+"esperamos que muchas de las amenazas Sybil que describimos (aquí, \n"
+"aquí y aquí) se "
+"volverán problemáticas por varios motivos."
#: i2p2www/pages/site/docs/how/network-database.html:862
msgid "Moved to the netdb discussion page"
@@ -7677,7 +12122,9 @@ msgstr "Movido a la página de discusión de la netdb"
#: i2p2www/pages/site/docs/how/network-database.html:866
msgid "End-to-end encryption of additional netDb lookups and responses."
-msgstr "Cifrado de fin a fin de las búsquedas y respuestas adicionales en la netDb."
+msgstr ""
+"Cifrado de fin a fin de las búsquedas y respuestas adicionales en la "
+"netDb."
#: i2p2www/pages/site/docs/how/network-database.html:870
msgid "Better methods for tracking lookup responses."
@@ -7698,11 +12145,18 @@ msgstr "Perfiles de los pares"
#: i2p2www/pages/site/docs/how/peer-selection.html:10
#, python-format
msgid ""
-"Peer profiling is the process of collecting data based on the observed performance\n"
+"Peer profiling is the process of collecting data based on the "
+"observed performance\n"
"of other routers or peers, and classifying those peers into groups.\n"
-"Profiling does not use any claimed performance data published by the peer itself\n"
+"Profiling does not use any claimed performance data published by "
+"the peer itself\n"
"in the network database."
-msgstr "La creación de perfiles de los pares, profiling es el proceso de recolectar datos basados en el rendimiento observado de otros ruters o pares. La creación de estos perfiles no usa los datos de rendimiento publicados por el par mismo en la base de datos de la red."
+msgstr ""
+"La creación de perfiles de los pares, profiling es el proceso de "
+"recolectar datos basados en el rendimiento observado de otros "
+"ruters o pares. La creación de estos perfiles no usa los datos de "
+"rendimiento publicados por el par mismo en la base "
+"de datos de la red."
#: i2p2www/pages/site/docs/how/peer-selection.html:17
msgid "Profiles are used for two purposes:"
@@ -7710,14 +12164,21 @@ msgstr "Los perfiles se usan con dos fines:"
#: i2p2www/pages/site/docs/how/peer-selection.html:19
msgid "Selecting peers to relay our traffic through, which is discussed below"
-msgstr "Para seleccionar pares para enviar nuestro tráfico a través, lo que se discute más abajo."
+msgstr ""
+"Para seleccionar pares para enviar nuestro tráfico a través, lo que se "
+"discute más abajo."
#: i2p2www/pages/site/docs/how/peer-selection.html:20
#, python-format
msgid ""
-"Choosing peers from the set of floodfill routers to use for network database storage and queries,\n"
+"Choosing peers from the set of floodfill routers to use for network "
+"database storage and queries,\n"
"which is discussed on the network database page"
-msgstr "Para elegir pares de un conjunto de ruters floodfill para usar los servicios de almacenamiento y consultas de la base de datos de la red, lo que se discute en la página de la base de datos de la red"
+msgstr ""
+"Para elegir pares de un conjunto de ruters floodfill para usar los "
+"servicios de almacenamiento y consultas de la base de datos de la red, lo"
+" que se discute en la página de la base de datos de"
+" la red"
#: i2p2www/pages/site/docs/how/peer-selection.html:27
#: i2p2www/pages/site/docs/how/peer-selection.html:187
@@ -7728,19 +12189,30 @@ msgstr "Selección de pares"
#: i2p2www/pages/site/docs/how/peer-selection.html:28
msgid ""
"Peer selection is the process of choosing which routers\n"
-"on the network we want to relay our messages to go through (which peers will we \n"
+"on the network we want to relay our messages to go through (which peers "
+"will we \n"
"ask to join our tunnels). To accomplish this, we keep track of how each\n"
-"peer performs (the peer's \"profile\") and use that data to estimate how \n"
+"peer performs (the peer's \"profile\") and use that data to estimate how"
+" \n"
"fast they are, how often they will be able to accept our requests, and \n"
"whether they seem to be overloaded or otherwise unable to perform what\n"
"they agree to reliably."
-msgstr "La selección de pares es el proceso de escoger qué ruters de la red queremos para pasar nuestros mensajes a través (o a cuales pares les pedimos permiso para unir nuestros túneles). Para llevar esto acabo, llevamos el seguimiento de como funciona cada par (el \"perfil\" del par) y usamos estos datos para estimar cómo son de rápidos, cuando serán capaces de aceptar nuestras peticiones y de saber cuando están sobrecargados o cuando no son capaces de hacer con fiabilidad lo que acordaron."
+msgstr ""
+"La selección de pares es el proceso de escoger qué ruters de la "
+"red queremos para pasar nuestros mensajes a través (o a cuales pares les "
+"pedimos permiso para unir nuestros túneles). Para llevar esto acabo, "
+"llevamos el seguimiento de como funciona cada par (el \"perfil\" del par)"
+" y usamos estos datos para estimar cómo son de rápidos, cuando serán "
+"capaces de aceptar nuestras peticiones y de saber cuando están "
+"sobrecargados o cuando no son capaces de hacer con fiabilidad lo que "
+"acordaron."
#: i2p2www/pages/site/docs/how/peer-selection.html:38
#, python-format
msgid ""
"Unlike some other anonymous networks, in I2P,\n"
-"claimed bandwidth is untrusted and is only used to avoid those peers\n"
+"claimed bandwidth is untrusted and is only used to avoid those "
+"peers\n"
"advertising very low bandwidth insufficient for routing tunnels.\n"
"All peer selection is done through profiling.\n"
"This prevents simple attacks based on peers claiming high bandwidth\n"
@@ -7748,13 +12220,25 @@ msgid ""
"It also makes\n"
"timing attacks\n"
"more difficult."
-msgstr "A diferencia de otras redes anónimas, en I2P el ancho de banda indicado no es de fiar y es sólo usado para evitar que esos pares anuncien anchos de banda insuficientes para rutar los túneles. Toda la selección de los pares se hace a través de lso perfiles. Esto evita ataques simples basados en pares que indican un gran ancho de banda para intentar capturar un gran número de túneles. También hace más difíciles los ataques de sincronización."
+msgstr ""
+"A diferencia de otras redes anónimas, en I2P el ancho de banda indicado "
+"no es de fiar y es sólo usado para evitar que esos pares anuncien "
+"anchos de banda insuficientes para rutar los túneles. Toda la selección "
+"de los pares se hace a través de lso perfiles. Esto evita ataques simples"
+" basados en pares que indican un gran ancho de banda para intentar "
+"capturar un gran número de túneles. También hace más difíciles los ataques de sincronización."
#: i2p2www/pages/site/docs/how/peer-selection.html:50
msgid ""
-"Peer selection is done quite frequently, as a router may maintain a large number\n"
-"of client and exploratory tunnels, and a tunnel lifetime is only 10 minutes."
-msgstr "La selección de pares se hace frecuentemente, ya que el ruter mantiene un gran número de túneles clientes y exploratorios, y la vida de un túnel es de sólo 10 minutos."
+"Peer selection is done quite frequently, as a router may maintain a large"
+" number\n"
+"of client and exploratory tunnels, and a tunnel lifetime is only 10 "
+"minutes."
+msgstr ""
+"La selección de pares se hace frecuentemente, ya que el ruter mantiene un"
+" gran número de túneles clientes y exploratorios, y la vida de un túnel "
+"es de sólo 10 minutos."
#: i2p2www/pages/site/docs/how/peer-selection.html:56
msgid "Further Information"
@@ -7764,10 +12248,17 @@ msgstr "Información futura"
#, python-format
msgid ""
"For more information see the paper\n"
-"Peer Profiling and Selection in the I2P Anonymous Network\n"
+"Peer Profiling and Selection in the I2P Anonymous "
+"Network\n"
"presented at PET-CON 2009.1.\n"
-"See below for notes on minor changes since the paper was published."
-msgstr "Para más información vea el artículo Peer Profiling and Selection in the I2P Anonymous Network presentado en el PET-CON 2009.1. Mire más abajo para ver los cambios menores o las notas desde que el artículo fue publicado."
+"See below for notes on minor changes since the "
+"paper was published."
+msgstr ""
+"Para más información vea el artículo Peer Profiling "
+"and Selection in the I2P Anonymous Network presentado en el PET-CON 2009.1. Mire más "
+"abajo para ver los cambios menores o las notas desde que el artículo "
+"fue publicado."
#: i2p2www/pages/site/docs/how/peer-selection.html:65
msgid "Profiles"
@@ -7776,22 +12267,45 @@ msgstr "Perfiles"
#: i2p2www/pages/site/docs/how/peer-selection.html:66
#, python-format
msgid ""
-"Each peer has a set of data points collected about them, including statistics \n"
-"about how long it takes for them to reply to a network database query, how \n"
-"often their tunnels fail, and how many new peers they are able to introduce \n"
-"us to, as well as simple data points such as when we last heard from them or\n"
-"when the last communication error occurred. The specific data points gathered\n"
+"Each peer has a set of data points collected about them, including "
+"statistics \n"
+"about how long it takes for them to reply to a network database query, "
+"how \n"
+"often their tunnels fail, and how many new peers they are able to "
+"introduce \n"
+"us to, as well as simple data points such as when we last heard from them"
+" or\n"
+"when the last communication error occurred. The specific data points "
+"gathered\n"
"can be found in the code."
-msgstr "Cada par tiene un conjunto de datos recogidos sobre ellos, incluyendo estadísticas sobre cuánto tardan en responder a una petición a la base de datos de la red, con qué frecuencia fallan sus túneles, y cuántos nuevos pares son capaces de presentarnos, y también datos simples como cuándo supimos de ellos por última vez o cuándo fue el uĺtimo error de comunicación. Los datos obtenidos específicos pueden encontrarse en el código."
+msgstr ""
+"Cada par tiene un conjunto de datos recogidos sobre ellos, incluyendo "
+"estadísticas sobre cuánto tardan en responder a una petición a la base de"
+" datos de la red, con qué frecuencia fallan sus túneles, y cuántos nuevos"
+" pares son capaces de presentarnos, y también datos simples como cuándo "
+"supimos de ellos por última vez o cuándo fue el uĺtimo error de "
+"comunicación. Los datos obtenidos específicos pueden encontrarse en el código."
#: i2p2www/pages/site/docs/how/peer-selection.html:75
msgid ""
-"Profiles are fairly small, a few KB. To control memory usage, the profile expiration time\n"
+"Profiles are fairly small, a few KB. To control memory usage, the profile"
+" expiration time\n"
"lessens as the number of profiles grows.\n"
-"Profiles are kept in memory until router shutdown, when they are written to disk.\n"
-"At startup, the profiles are read so the router need not reinitialize all profiles,\n"
-"thus allowing a router to quickly re-integrate into the network after startup."
-msgstr "Los perfiles son bastante pequeños, unos pocos KB. Para controlar el uso de la memoria usada, el tiempo de expiración de los perfiles disminuye cuando el número de perfiles aumenta. Los perfiles se mantienen en la memoria hasta que el ruter se apaga, entonces se escriben al disco duro. Al inicio, los perfiles son leídos para que el ruter no necesite reiniciar todos los perfiles, permitiendo al ruter integrarse rápidamente en la red después del arranque."
+"Profiles are kept in memory until router shutdown, when they are written "
+"to disk.\n"
+"At startup, the profiles are read so the router need not reinitialize all"
+" profiles,\n"
+"thus allowing a router to quickly re-integrate into the network after "
+"startup."
+msgstr ""
+"Los perfiles son bastante pequeños, unos pocos KB. Para controlar el uso "
+"de la memoria usada, el tiempo de expiración de los perfiles disminuye "
+"cuando el número de perfiles aumenta. Los perfiles se mantienen en la "
+"memoria hasta que el ruter se apaga, entonces se escriben al disco duro. "
+"Al inicio, los perfiles son leídos para que el ruter no necesite "
+"reiniciar todos los perfiles, permitiendo al ruter integrarse rápidamente"
+" en la red después del arranque."
#: i2p2www/pages/site/docs/how/peer-selection.html:85
msgid "Peer Summaries"
@@ -7800,10 +12314,17 @@ msgstr "Resúmenes de los pares"
#: i2p2www/pages/site/docs/how/peer-selection.html:86
msgid ""
"While the profiles themselves can be considered a summary of a peer's \n"
-"performance, to allow for effective peer selection we break each summary down \n"
-"into four simple values, representing the peer's speed, its capacity, how well \n"
+"performance, to allow for effective peer selection we break each summary "
+"down \n"
+"into four simple values, representing the peer's speed, its capacity, how"
+" well \n"
"integrated into the network it is, and whether it is failing."
-msgstr "Aunque los perfiles por sí mismos puede considerarse un resumen del rendimiento de los pares, para tener una selección efectiva de los pares partimos cada resumen en cuatro valores simples, indicando la velocidad del par, su capacidad, cómo de bien está integrado en la red y cuándo fallan."
+msgstr ""
+"Aunque los perfiles por sí mismos puede considerarse un resumen del "
+"rendimiento de los pares, para tener una selección efectiva de los pares "
+"partimos cada resumen en cuatro valores simples, indicando la velocidad "
+"del par, su capacidad, cómo de bien está integrado en la red y cuándo "
+"fallan."
#: i2p2www/pages/site/docs/how/peer-selection.html:93
msgid "Speed"
@@ -7813,9 +12334,14 @@ msgstr "Velocidad"
msgid ""
"The speed calculation\n"
"simply goes through the profile and estimates how much data we can\n"
-"send or receive on a single tunnel through the peer in a minute. For this estimate it just looks at\n"
+"send or receive on a single tunnel through the peer in a minute. For "
+"this estimate it just looks at\n"
"performance in the previous minute."
-msgstr "El cálculo de la velocidad se hace simplemente mirando el perfil y calculando cuantos datos podemos enviar o recibir a través de túnel de un par durante un minuto. Para esta estimación simplemente mira el rendimiento en el minuto anterior."
+msgstr ""
+"El cálculo de la velocidad se hace simplemente mirando el perfil y "
+"calculando cuantos datos podemos enviar o recibir a través de túnel de un"
+" par durante un minuto. Para esta estimación simplemente mira el "
+"rendimiento en el minuto anterior."
#: i2p2www/pages/site/docs/how/peer-selection.html:101
msgid "Capacity"
@@ -7825,24 +12351,42 @@ msgstr "Capacidad"
msgid ""
"The capacity calculation\n"
"simply goes through the profile and estimates how many tunnels the peer\n"
-"would agree to participate in over a given time period. For this estimate it looks at \n"
+"would agree to participate in over a given time period. For this "
+"estimate it looks at \n"
"how many tunnel build requests\n"
"the peer has accepted, rejected, and dropped, and how many\n"
"of the agreed-to tunnels later failed.\n"
-"While the calculation is time-weighted so that recent activity counts more than later activity,\n"
+"While the calculation is time-weighted so that recent activity counts "
+"more than later activity,\n"
"statistics up to 48 hours old may be included."
-msgstr "El cálculo de la capacidad simplemente mira en el perfil y estima el número de túneles en los que aceptará participar en un periodo de tiempo dado. Para esta estimación mira cuantos peticiones de construcción de túneles ha aceptado, denegado y tirado, y cuantos túneles de los aceptados han fallado después. Las actividades recientes importan más que las demás, pueden ser incluidas hasta estadísticas de hasta 48 horas de viejas."
+msgstr ""
+"El cálculo de la capacidad simplemente mira en el perfil y estima el "
+"número de túneles en los que aceptará participar en un periodo de tiempo "
+"dado. Para esta estimación mira cuantos peticiones de construcción de "
+"túneles ha aceptado, denegado y tirado, y cuantos túneles de los "
+"aceptados han fallado después. Las actividades recientes importan más que"
+" las demás, pueden ser incluidas hasta estadísticas de hasta 48 horas de "
+"viejas."
#: i2p2www/pages/site/docs/how/peer-selection.html:113
msgid ""
"Recognizing and avoiding unreliable and unreachable\n"
"peers is critically important.\n"
-"Unfortunately, as the tunnel building and testing require the participation of several peers,\n"
-"it is difficult to positively identify the cause of a dropped build request or test failure.\n"
+"Unfortunately, as the tunnel building and testing require the "
+"participation of several peers,\n"
+"it is difficult to positively identify the cause of a dropped build "
+"request or test failure.\n"
"The router assigns a probability of failure to each of the\n"
"peers, and uses that probability in the capacity calculation.\n"
"Drops and test failures are weighted much higher than rejections."
-msgstr "Reconocer y evitar los pares no fiables e inalcanzables es de importancia crítica. Desafortunadamente, ya que la creación de los túneles requiere la participación de varios pares, es difícil identificar positivamente la causa de una petición caída o un fallo en la prueba. El ruter asigna una probabilidad de fallo a cada par, y usa esa probabilidad en el cálculo de la capacidad. Las caídas y los fallos de prueba pesan mucho más que las denegaciones."
+msgstr ""
+"Reconocer y evitar los pares no fiables e inalcanzables es de importancia"
+" crítica. Desafortunadamente, ya que la creación de los túneles requiere "
+"la participación de varios pares, es difícil identificar positivamente la"
+" causa de una petición caída o un fallo en la prueba. El ruter asigna una"
+" probabilidad de fallo a cada par, y usa esa probabilidad en el cálculo "
+"de la capacidad. Las caídas y los fallos de prueba pesan mucho más que "
+"las denegaciones."
#: i2p2www/pages/site/docs/how/peer-selection.html:123
msgid "Peer organization"
@@ -7850,10 +12394,15 @@ msgstr "Organización de los pares"
#: i2p2www/pages/site/docs/how/peer-selection.html:124
msgid ""
-"As mentioned above, we drill through each peer's profile to come up with a \n"
-"few key calculations, and based upon those, we organize each peer into three\n"
+"As mentioned above, we drill through each peer's profile to come up with "
+"a \n"
+"few key calculations, and based upon those, we organize each peer into "
+"three\n"
"groups - fast, high capacity, and standard."
-msgstr "Como se ha mencionado arriba, nos sumergimos en el perfil de cada par para hacer unos pocos cálculos, y basado en esos cálculos, organizamos cada par dentro de estos tres grupos - rápido, con capacidad y estándar."
+msgstr ""
+"Como se ha mencionado arriba, nos sumergimos en el perfil de cada par "
+"para hacer unos pocos cálculos, y basado en esos cálculos, organizamos "
+"cada par dentro de estos tres grupos - rápido, con capacidad y estándar."
#: i2p2www/pages/site/docs/how/peer-selection.html:130
msgid "The groupings are not mutually exclusive, nor are they unrelated:"
@@ -7861,15 +12410,21 @@ msgstr "Los grupos no se excluyen mutuamente, y están relacionados entre ellos:
#: i2p2www/pages/site/docs/how/peer-selection.html:134
msgid ""
-"A peer is considered \"high capacity\" if its capacity calculation meets or \n"
+"A peer is considered \"high capacity\" if its capacity calculation meets "
+"or \n"
"exceeds the median of all peers."
-msgstr "Un par es considerado de \"alta capacidad\" si los cálculos cumplen o exceden la media de todos los pares."
+msgstr ""
+"Un par es considerado de \"alta capacidad\" si los cálculos cumplen o "
+"exceden la media de todos los pares."
#: i2p2www/pages/site/docs/how/peer-selection.html:138
msgid ""
-"A peer is considered \"fast\" if they are already \"high capacity\" and their \n"
+"A peer is considered \"fast\" if they are already \"high capacity\" and "
+"their \n"
"speed calculation meets or exceeds the median of all peers."
-msgstr "Un par es considerado \"rápido\" si ya es de \"alta capacidad\", y los cálculos de velocidad cumplen o exceden la media de todos los pares."
+msgstr ""
+"Un par es considerado \"rápido\" si ya es de \"alta capacidad\", y los "
+"cálculos de velocidad cumplen o exceden la media de todos los pares."
#: i2p2www/pages/site/docs/how/peer-selection.html:142
msgid "A peer is considered \"standard\" if it is not \"high capacity\""
@@ -7880,7 +12435,9 @@ msgstr "Un par es considerado \"estándar/normal\" si no es de \"alta capacidad\
msgid ""
"These groupings are implemented in the router's\n"
"ProfileOrganizer."
-msgstr "Estas agrupaciones están implementadas en el ProfileOrganizer del ruter."
+msgstr ""
+"Estas agrupaciones están implementadas en el ProfileOrganizer del ruter."
#: i2p2www/pages/site/docs/how/peer-selection.html:150
msgid "Group size limits"
@@ -7893,22 +12450,37 @@ msgstr "El tamaño de los grupos puede estar limitado."
#: i2p2www/pages/site/docs/how/peer-selection.html:156
msgid ""
"The fast group is limited to 30 peers.\n"
-"If there would be more, only the ones with the highest speed rating are placed in the group."
-msgstr "El grupo rápido está limitado a 30 pares. Si hubiese más, sólo los que tuviesen las mayores velocidades permanecerían en el grupo."
+"If there would be more, only the ones with the highest speed rating are "
+"placed in the group."
+msgstr ""
+"El grupo rápido está limitado a 30 pares. Si hubiese más, sólo los que "
+"tuviesen las mayores velocidades permanecerían en el grupo."
#: i2p2www/pages/site/docs/how/peer-selection.html:160
msgid ""
-"The high capacity group is limited to 75 peers (including the fast group)\n"
-"If there would be more, only the ones with the highest capacity rating are placed in the group."
-msgstr "El grupo de alta capacidad está limitado a 75 pares (incluido el grupo rápido). Si hubiese más, sólo los que tuviesen las mayores capacidades permanecerían en el grupo."
+"The high capacity group is limited to 75 peers (including the fast group)"
+"\n"
+"If there would be more, only the ones with the highest capacity rating "
+"are placed in the group."
+msgstr ""
+"El grupo de alta capacidad está limitado a 75 pares (incluido el grupo "
+"rápido). Si hubiese más, sólo los que tuviesen las mayores capacidades "
+"permanecerían en el grupo."
#: i2p2www/pages/site/docs/how/peer-selection.html:164
msgid ""
-"The standard group has no fixed limit, but is somewhat smaller than the number of RouterInfos\n"
+"The standard group has no fixed limit, but is somewhat smaller than the "
+"number of RouterInfos\n"
"stored in the local network database.\n"
-"On an active router in today's network, there may be about 1000 RouterInfos and 500 peer profiles\n"
+"On an active router in today's network, there may be about 1000 "
+"RouterInfos and 500 peer profiles\n"
"(including those in the fast and high capacity groups)"
-msgstr "El grupo estándar no tiene un límite fijado, pero de alguna forma es menor que el número de RouterInfos almacenados en la base de datos de la red local. En un ruter activo de la red actual, puede haber como 1000 RouterInfoes y 500 perfiles de pares (incluyendo auqellos en los grupos rápidos y de alta capacidad)"
+msgstr ""
+"El grupo estándar no tiene un límite fijado, pero de alguna forma es "
+"menor que el número de RouterInfos almacenados en la base de datos de la "
+"red local. En un ruter activo de la red actual, puede haber como 1000 "
+"RouterInfoes y 500 perfiles de pares (incluyendo auqellos en los grupos "
+"rápidos y de alta capacidad)"
#: i2p2www/pages/site/docs/how/peer-selection.html:172
msgid "Recalculation and Stability"
@@ -7918,20 +12490,27 @@ msgstr "Nuevos cálculos y estabilidad"
msgid ""
"Summaries are recalculated, and peers are resorted into groups, every 45 "
"seconds."
-msgstr "Cada 45 segundos, los resúmenes son re-calculados, y los pares son recolocados en grupos. "
+msgstr ""
+"Cada 45 segundos, los resúmenes son re-calculados, y los pares son "
+"recolocados en grupos. "
#: i2p2www/pages/site/docs/how/peer-selection.html:177
msgid ""
-"The groups tend to be fairly stable, that is, there is not much \"churn\" in the rankings\n"
+"The groups tend to be fairly stable, that is, there is not much \"churn\""
+" in the rankings\n"
"at each recalculation.\n"
-"Peers in the fast and high capacity groups get more tunnels build through them, which increases their speed and capacity ratings,\n"
+"Peers in the fast and high capacity groups get more tunnels build through"
+" them, which increases their speed and capacity ratings,\n"
"which reinforces their presence in the group."
-msgstr "Los grupos tienden a ser bastante estables, esto es, no hay mucha \"agitación\" en las clasificaciones tras cada nuevo cálculo."
+msgstr ""
+"Los grupos tienden a ser bastante estables, esto es, no hay mucha "
+"\"agitación\" en las clasificaciones tras cada nuevo cálculo."
#: i2p2www/pages/site/docs/how/peer-selection.html:188
-msgid ""
-"The router selects peers from the above groups to build tunnels through."
-msgstr "Los ruters seleccionan pares de los grupos anteriores para construir túneles a través de ellos."
+msgid "The router selects peers from the above groups to build tunnels through."
+msgstr ""
+"Los ruters seleccionan pares de los grupos anteriores para construir "
+"túneles a través de ellos."
#: i2p2www/pages/site/docs/how/peer-selection.html:193
msgid "Peer Selection for Client Tunnels"
@@ -7939,17 +12518,28 @@ msgstr "Selección de pares para los túneles cliente"
#: i2p2www/pages/site/docs/how/peer-selection.html:194
msgid ""
-"Client tunnels are used for application traffic, such as for HTTP proxies "
-"and web servers."
-msgstr "Los túneles cliente se usan para el tráfico de las aplicaciones, como los proxies HTTP y los servidores web."
+"Client tunnels are used for application traffic, such as for HTTP proxies"
+" and web servers."
+msgstr ""
+"Los túneles cliente se usan para el tráfico de las aplicaciones, como los"
+" proxies HTTP y los servidores web."
#: i2p2www/pages/site/docs/how/peer-selection.html:198
msgid ""
-"To reduce the susceptibility to some attacks,\n"
+"To reduce the susceptibility to some attacks,\n"
"and increase performance,\n"
-"peers for building client tunnels are chosen randomly from the smallest group, which is the \"fast\" group.\n"
-"There is no bias toward selecting peers that were previously participants in a tunnel for the same client."
-msgstr "Para reducir la propensión a algunos ataques, e incrementar el rendimiento, los pares para la construcción de los túneles cliente se eligen aleatoriamente del grupo más pequeño, el cual es el grupo \"rápido\". No existe una tendencia hacia la selección de pares que anteriormente hayan participado en un túnel para el mismo cliente."
+"peers for building client tunnels are chosen randomly from the smallest "
+"group, which is the \"fast\" group.\n"
+"There is no bias toward selecting peers that were previously participants"
+" in a tunnel for the same client."
+msgstr ""
+"Para reducir la propensión a algunos ataques, e incrementar el rendimiento, los"
+" pares para la construcción de los túneles cliente se eligen "
+"aleatoriamente del grupo más pequeño, el cual es el grupo \"rápido\". No "
+"existe una tendencia hacia la selección de pares que anteriormente hayan "
+"participado en un túnel para el mismo cliente."
#: i2p2www/pages/site/docs/how/peer-selection.html:206
msgid "Peer Selection for Exploratory Tunnels"
@@ -7957,28 +12547,51 @@ msgstr "Selección de pares para los túneles exploratorios"
#: i2p2www/pages/site/docs/how/peer-selection.html:207
msgid ""
-"Exploratory tunnels are used for router administrative purposes, such as network database traffic\n"
+"Exploratory tunnels are used for router administrative purposes, such as "
+"network database traffic\n"
"and testing client tunnels.\n"
-"Exploratory tunnels are also used to contact previously unconnected routers, which is why\n"
+"Exploratory tunnels are also used to contact previously unconnected "
+"routers, which is why\n"
"they are called \"exploratory\".\n"
"These tunnels are usually low-bandwidth."
-msgstr "Los túneles exploratorios son usados para propósitos administrativos del ruter, como el tráfico de la base de datos de la red y los túneles cliente de prueba. También son usados para contactar con ruters anteriormente no contactados, que es por lo que se llaman \"exploratorios\". Estos túneles son normalmente de bajo ancho de banda."
+msgstr ""
+"Los túneles exploratorios son usados para propósitos administrativos del "
+"ruter, como el tráfico de la base de datos de la red y los túneles "
+"cliente de prueba. También son usados para contactar con ruters "
+"anteriormente no contactados, que es por lo que se llaman "
+"\"exploratorios\". Estos túneles son normalmente de bajo ancho de banda."
#: i2p2www/pages/site/docs/how/peer-selection.html:215
msgid ""
-"Peers for building exploratory tunnels are generally chosen randomly from the standard group.\n"
-"If the success rate of these build attempts is low compared to the client tunnel build success rate,\n"
-"the router will select a weighted average of peers randomly from the high capacity group instead.\n"
-"This helps maintain a satisfactory build success rate even when network performance is poor.\n"
-"There is no bias toward selecting peers that were previously participants in an exploratory tunnel."
-msgstr "Los pares para construir los túneles exploratorios son elegidos normalmente aleatoriamente del grupo estándar. En su lugar, si la tasa de éxito de esos intentos de construcción es baja comparada con la tasa de éxito exitosa de construcción, el ruter seleccionará un promedio balanceado aleatoriamente de pares del grupo de alta capacidad."
+"Peers for building exploratory tunnels are generally chosen randomly from"
+" the standard group.\n"
+"If the success rate of these build attempts is low compared to the client"
+" tunnel build success rate,\n"
+"the router will select a weighted average of peers randomly from the high"
+" capacity group instead.\n"
+"This helps maintain a satisfactory build success rate even when network "
+"performance is poor.\n"
+"There is no bias toward selecting peers that were previously participants"
+" in an exploratory tunnel."
+msgstr ""
+"Los pares para construir los túneles exploratorios son elegidos "
+"normalmente aleatoriamente del grupo estándar. En su lugar, si la tasa de"
+" éxito de esos intentos de construcción es baja comparada con la tasa de "
+"éxito exitosa de construcción, el ruter seleccionará un promedio "
+"balanceado aleatoriamente de pares del grupo de alta capacidad."
#: i2p2www/pages/site/docs/how/peer-selection.html:223
msgid ""
-"As the standard group includes a very large subset of all peers the router knows about,\n"
-"exploratory tunnels are essentially built through a random selection of all peers,\n"
+"As the standard group includes a very large subset of all peers the "
+"router knows about,\n"
+"exploratory tunnels are essentially built through a random selection of "
+"all peers,\n"
"until the build success rate becomes too low."
-msgstr "Ya que el grupo estándar incluye una gran parte de todos los pares que el ruter conoce, los túneles exploratorios son construidos esencialmente a través de una selección aleatoria de todos los pares, hasta que la tasa de éxito de construcción sea demasiada baja."
+msgstr ""
+"Ya que el grupo estándar incluye una gran parte de todos los pares que el"
+" ruter conoce, los túneles exploratorios son construidos esencialmente a "
+"través de una selección aleatoria de todos los pares, hasta que la tasa "
+"de éxito de construcción sea demasiada baja."
#: i2p2www/pages/site/docs/how/peer-selection.html:231
msgid "Restrictions"
@@ -7986,9 +12599,11 @@ msgstr "Restricciones"
#: i2p2www/pages/site/docs/how/peer-selection.html:232
msgid ""
-"To prevent some simple attacks, and for performance, there are the following"
-" restrictions:"
-msgstr "Para prevenir algunos ataques simples, y para mejorar el rendimiento, existen las siguientes restricciones:"
+"To prevent some simple attacks, and for performance, there are the "
+"following restrictions:"
+msgstr ""
+"Para prevenir algunos ataques simples, y para mejorar el rendimiento, "
+"existen las siguientes restricciones:"
#: i2p2www/pages/site/docs/how/peer-selection.html:236
msgid "Two peers from the same /16 IP space may not be in the same tunnel."
@@ -7996,9 +12611,11 @@ msgstr "Dos pares en el mismo espacio de IPs /16 no deben estar en el mismo tún
#: i2p2www/pages/site/docs/how/peer-selection.html:239
msgid ""
-"A peer may participate in a maximum of 33% of all tunnels created by the"
-" router."
-msgstr "Un par (`peer`) puede participar en un máximo de 33% \nde todos los túneles creados por el router."
+"A peer may participate in a maximum of 33% of all tunnels created by "
+"the router."
+msgstr ""
+"Un par (`peer`) puede participar en un máximo de 33% \n"
+"de todos los túneles creados por el router."
#: i2p2www/pages/site/docs/how/peer-selection.html:242
msgid "Peers with extremely low bandwidth are not used."
@@ -8006,7 +12623,9 @@ msgstr "Los pares con el ancho de banda extremadamente bajo no son usados."
#: i2p2www/pages/site/docs/how/peer-selection.html:245
msgid "Peers for which a recent connection attempt failed are not used."
-msgstr "Los pares para los que un intento de conexión reciente ha fallado no son usados."
+msgstr ""
+"Los pares para los que un intento de conexión reciente ha fallado no son "
+"usados."
#: i2p2www/pages/site/docs/how/peer-selection.html:252
msgid "Peer Ordering in Tunnels"
@@ -8018,19 +12637,27 @@ msgid ""
"Peers are ordered within tunnels to\n"
"to deal with the predecessor attack\n"
"(2008 update).\n"
-"More information is on the tunnel page."
-msgstr "Los pares son ordenados dentro de los túneles para hacer frente al ataque del predecesor (actualización del 2008). Hay más información en la página del túnel."
+"More information is on the tunnel "
+"page."
+msgstr ""
+"Los pares son ordenados dentro de los túneles para hacer frente al ataque del predecesor (actualización del 2008). Hay más información en"
+" la página del túnel."
#: i2p2www/pages/site/docs/how/peer-selection.html:268
-msgid ""
-"Continue to analyze an tune speed and capacity calculations as necessary"
-msgstr "Continuar analizando y afinando los cálculos de capacidad y velocidad según las necesidades."
+msgid "Continue to analyze an tune speed and capacity calculations as necessary"
+msgstr ""
+"Continuar analizando y afinando los cálculos de capacidad y velocidad "
+"según las necesidades."
#: i2p2www/pages/site/docs/how/peer-selection.html:271
msgid ""
-"Implement a more aggressive ejection strategy if necessary to control memory"
-" usage as the network grows"
-msgstr "Implementar una estrategia de expulsión más agresiva si se necesita para controlar el uso de memoria según crezca la red."
+"Implement a more aggressive ejection strategy if necessary to control "
+"memory usage as the network grows"
+msgstr ""
+"Implementar una estrategia de expulsión más agresiva si se necesita para "
+"controlar el uso de memoria según crezca la red."
#: i2p2www/pages/site/docs/how/peer-selection.html:274
msgid "Evaluate group size limits"
@@ -8044,9 +12671,15 @@ msgstr "Usar datos GeoIP para incluir o excluir ciertos pares, si se configura"
#, python-format
msgid ""
"For those reading the paper\n"
-"Peer Profiling and Selection in the I2P Anonymous Network,\n"
-"please keep in mind the following minor changes in I2P since the paper's publication:"
-msgstr "Para aquellos leyendo el estudio Peer Profiling and Selection in the I2P Anonymous Network, por favor, tengan en cuenta los siguientes cambios menores en I2P desde la publicación de dicho estudio."
+"Peer Profiling and Selection in the I2P Anonymous "
+"Network,\n"
+"please keep in mind the following minor changes in I2P since the paper's "
+"publication:"
+msgstr ""
+"Para aquellos leyendo el estudio Peer Profiling and "
+"Selection in the I2P Anonymous Network, por favor, tengan en cuenta "
+"los siguientes cambios menores en I2P desde la publicación de dicho "
+"estudio."
#: i2p2www/pages/site/docs/how/peer-selection.html:289
msgid "The Integration calculation is still not used"
@@ -8119,19 +12752,37 @@ msgstr "Cifrado"
#: i2p2www/pages/site/docs/how/tech-intro.html:25
msgid ""
"I2P is a scalable, self organizing, resilient packet switched anonymous \n"
-"network layer, upon which any number of different anonymity or security conscious \n"
-"applications can operate. Each of these applications may make their own anonymity, \n"
-"latency, and throughput tradeoffs without worrying about the proper implementation \n"
-"of a free route mixnet, allowing them to blend their activity with the larger \n"
+"network layer, upon which any number of different anonymity or security "
+"conscious \n"
+"applications can operate. Each of these applications may make their own "
+"anonymity, \n"
+"latency, and throughput tradeoffs without worrying about the proper "
+"implementation \n"
+"of a free route mixnet, allowing them to blend their activity with the "
+"larger \n"
"anonymity set of users already running on top of I2P."
-msgstr "I2P es una capa de red auto organizada, resistente, anónima, dentro de la cual pueden funcionar un gran número de aplicaciones con diferentes modelos de seguridad y anonimato. Cada una de estas aplicaciones pueden usar sus propios niveles de seguridad y sus propios niveles de rendimiento, sin preocuparse por crear una implementación apropiada de una red libre, permitiendoles mezclar sus actividades con un gran número de usuarios anónimos que ya utilizan I2P."
+msgstr ""
+"I2P es una capa de red auto organizada, resistente, anónima, dentro de la"
+" cual pueden funcionar un gran número de aplicaciones con diferentes "
+"modelos de seguridad y anonimato. Cada una de estas aplicaciones pueden "
+"usar sus propios niveles de seguridad y sus propios niveles de "
+"rendimiento, sin preocuparse por crear una implementación apropiada de "
+"una red libre, permitiendoles mezclar sus actividades con un gran número "
+"de usuarios anónimos que ya utilizan I2P."
#: i2p2www/pages/site/docs/how/tech-intro.html:34
msgid ""
-"Applications available already provide the full range of typical Internet activities -\n"
+"Applications available already provide the full range of typical Internet"
+" activities -\n"
"anonymous web browsing, web hosting, chat, file sharing, e-mail,\n"
-"blogging and content syndication, newsgroups, as well as several other applications under development."
-msgstr "Las aplicaciones ya disponibles proveen con un gran número de las aplicaciones usadas normalmente en Interenet - navegación web anónima, alojamiento web, chat, compartir de archivos, email, blogs y sindicación de contenidos, grupos de noticias, así como otras muchas aplicaciones en desarrollo."
+"blogging and content syndication, newsgroups, as well as several other "
+"applications under development."
+msgstr ""
+"Las aplicaciones ya disponibles proveen con un gran número de las "
+"aplicaciones usadas normalmente en Interenet - navegación web "
+"anónima, alojamiento web, chat, compartir de archivos, email, "
+"blogs y sindicación de contenidos, grupos de noticias, así como otras "
+"muchas aplicaciones en desarrollo."
#: i2p2www/pages/site/docs/how/tech-intro.html:40
msgid "Web browsing: using any existing browser that supports using a proxy."
@@ -8143,79 +12794,161 @@ msgstr "Chat: IRC, Jabber. VOIP, I2P-Messenger
#: i2p2www/pages/site/docs/how/tech-intro.html:42
msgid ""
-"File sharing: I2PSnark, Robert, iMule, \n"
-"I2Phex, PyBit, I2P-bt\n"
+"File sharing: I2PSnark, Robert, iMule, \n"
+"I2Phex, PyBit, I2P-bt\n"
"and others."
-msgstr "Compartir archivos: I2PSnark, Robert, iMule, I2Phex, PyBit, I2P-bt y otros"
+msgstr ""
+"Compartir archivos: I2PSnark, Robert, iMule, I2Phex, PyBit, I2P-bt y otros"
#: i2p2www/pages/site/docs/how/tech-intro.html:47
msgid ""
"E-mail: susimail and I2P-Bote."
-msgstr "Email: susimail and I2P-Bote. "
+msgstr ""
+"Email: susimail and I2P-Bote. "
#: i2p2www/pages/site/docs/how/tech-intro.html:48
msgid ""
-"Blog: using e.g. the pebble plugin or the distributed blogging software Syndie."
+"Blog: using e.g. the pebble plugin or the distributed blogging software "
+"Syndie."
msgstr "Blogs: usando el pluguin pebble o la aplicación distribuida "
#: i2p2www/pages/site/docs/how/tech-intro.html:49
msgid ""
-"Distributed Data Store: Save your data redundantly in the Tahoe-LAFS cloud "
-"over I2P."
-msgstr "Almacenamiento de datos distribuido: Guarde sus datos redundantemente en Tahoe-LAFS sobre I2P."
+"Distributed Data Store: Save your data redundantly in the Tahoe-LAFS "
+"cloud over I2P."
+msgstr ""
+"Almacenamiento de datos distribuido: Guarde sus datos redundantemente en "
+"Tahoe-LAFS sobre I2P."
#: i2p2www/pages/site/docs/how/tech-intro.html:50
msgid "Newsgroups: using any newsgroup reader that supports using a proxy."
-msgstr "Grupos de noticias: usando cualquier lector de grupos de noticias que soporte proxy."
+msgstr ""
+"Grupos de noticias: usando cualquier lector de grupos de noticias que "
+"soporte proxy."
#: i2p2www/pages/site/docs/how/tech-intro.html:53
msgid ""
-"Unlike web sites hosted within content distribution networks like Freenet \n"
-"or GNUnet, the services hosted on \n"
-"I2P are fully interactive - there are traditional web-style search engines, \n"
-"bulletin boards, blogs you can comment on, database driven sites, and bridges \n"
-"to query static systems like Freenet without needing to install it locally."
-msgstr "Al contrario que las webs alojadas en redes de distribución de contenido como Freenet o GNUnet, los servicios hospedados en I2P son totalmente interactivos - hay motores de búsquedas tradicionales, tablones de anuncios, blogs en los que comentar, webs funcionando con bases de datos, y puentes para obtener contenido estático por ejemplo de Freenet sin tener que instalarlo localmente."
+"Unlike web sites hosted within content distribution networks like Freenet \n"
+"or GNUnet, the services "
+"hosted on \n"
+"I2P are fully interactive - there are traditional web-style search "
+"engines, \n"
+"bulletin boards, blogs you can comment on, database driven sites, and "
+"bridges \n"
+"to query static systems like Freenet without needing to install it "
+"locally."
+msgstr ""
+"Al contrario que las webs alojadas en redes de distribución de contenido "
+"como Freenet o GNUnet, los servicios hospedados"
+" en I2P son totalmente interactivos - hay motores de búsquedas "
+"tradicionales, tablones de anuncios, blogs en los que comentar, webs "
+"funcionando con bases de datos, y puentes para obtener contenido estático"
+" por ejemplo de Freenet sin tener que instalarlo localmente."
#: i2p2www/pages/site/docs/how/tech-intro.html:61
msgid ""
"With all of these anonymity enabled applications, I2P takes on the role \n"
-"of the message oriented middleware - applications say that they want to send \n"
-"some data to a cryptographic identifier (a \"destination\") and I2P takes care \n"
-"of making sure it gets there securely and anonymously. I2P also bundles a \n"
-"simple streaming library to allow I2P's anonymous \n"
-"best-effort messages to transfer as reliable, in-order streams, transparently \n"
-"offering a TCP based congestion control algorithm tuned for the high bandwidth \n"
-"delay product of the network. While there have been several simple SOCKS proxies \n"
-"available to tie existing applications into the network, their value has been \n"
-"limited as nearly every application routinely exposes what, in an anonymous \n"
-"context, is sensitive information. The only safe way to go is to fully audit \n"
-"an application to ensure proper operation and to assist in that we provide \n"
-"a series of APIs in various languages which can be used to make the most out \n"
+"of the message oriented middleware - applications say that they want to "
+"send \n"
+"some data to a cryptographic identifier (a \"destination\") and I2P takes"
+" care \n"
+"of making sure it gets there securely and anonymously. I2P also bundles a"
+" \n"
+"simple streaming library to allow I2P's "
+"anonymous \n"
+"best-effort messages to transfer as reliable, in-order streams, "
+"transparently \n"
+"offering a TCP based congestion control algorithm tuned for the high "
+"bandwidth \n"
+"delay product of the network. While there have been several simple SOCKS "
+"proxies \n"
+"available to tie existing applications into the network, their value has "
+"been \n"
+"limited as nearly every application routinely exposes what, in an "
+"anonymous \n"
+"context, is sensitive information. The only safe way to go is to fully "
+"audit \n"
+"an application to ensure proper operation and to assist in that we "
+"provide \n"
+"a series of APIs in various languages which can be used to make the most "
+"out \n"
"of the network."
-msgstr "Con todos estas aplicaciones anónimas habilitadas, I2P toma el rol de aplicación mensajera, una aplicación, por ejemplo, dice que quiere enviar datos a un identificador criptográfico (una \"destinación\") e I2P se encarga de asegurarse de que lleguen seguros y anónimos. I2P también ofrece un librería simple de streaming que permite que los mensajes sean enviados seguros y ordenados, ofreciendo transparentemente algoritmos de controles de congestión TCP optimizados para redes con retraso y con grandes anchos de banda. Aunque hay proxies SOCKS para usar casi cualquier aplicación con I2P estas se han limitado, ya que la mayoría de las aplicaciones muestran, lo que se llama en el contexto anónimo, información sensible. La única forma segura de usar aplicaciones externas sería comprobar completamente la aplicación para asegurarse que funciona bien, y para ayudar con este problema proporcionamos una serie de APIs en varios idiomas que pueden usarse para sacarle el mayor provecho a la red."
+msgstr ""
+"Con todos estas aplicaciones anónimas habilitadas, I2P toma el rol de "
+"aplicación mensajera, una aplicación, por ejemplo, dice que quiere enviar"
+" datos a un identificador criptográfico (una \"destinación\") e I2P se "
+"encarga de asegurarse de que lleguen seguros y anónimos. I2P también "
+"ofrece un librería simple de streaming que"
+" permite que los mensajes sean enviados seguros y ordenados, ofreciendo "
+"transparentemente algoritmos de controles de congestión TCP optimizados "
+"para redes con retraso y con grandes anchos de banda. Aunque hay proxies "
+"SOCKS para usar casi cualquier aplicación con I2P estas se han limitado, "
+"ya que la mayoría de las aplicaciones muestran, lo que se llama en el "
+"contexto anónimo, información sensible. La única forma segura de usar "
+"aplicaciones externas sería comprobar completamente la aplicación para "
+"asegurarse que funciona bien, y para ayudar con este problema "
+"proporcionamos una serie de APIs en varios idiomas que pueden usarse para"
+" sacarle el mayor provecho a la red."
#: i2p2www/pages/site/docs/how/tech-intro.html:78
#, python-format
msgid ""
-"I2P is not a research project - academic, commercial, or governmental, but \n"
-"is instead an engineering effort aimed at doing whatever is necessary to provide \n"
-"a sufficient level of anonymity to those who need it. It has been in active \n"
-"development since early 2003 with one full time developer and a dedicated \n"
-"group of part time contributors from all over the world. All of the work done \n"
-"on I2P is open source and freely available on the website, \n"
-"with the majority of the code released outright into the public domain, though \n"
-"making use of a few cryptographic routines under BSD-style licenses. The people \n"
-"working on I2P do not control what people release client applications under, \n"
-"and there are several GPL'ed applications available (I2PTunnel, \n"
-"susimail, I2PSnark, I2P-Bote, \n"
+"I2P is not a research project - academic, commercial, or governmental, "
+"but \n"
+"is instead an engineering effort aimed at doing whatever is necessary to "
+"provide \n"
+"a sufficient level of anonymity to those who need it. It has been in "
+"active \n"
+"development since early 2003 with one full time developer and a dedicated"
+" \n"
+"group of part time contributors from all over the world. All of the work "
+"done \n"
+"on I2P is open source and freely available on the website, \n"
+"with the majority of the code released outright into the public domain, "
+"though \n"
+"making use of a few cryptographic routines under BSD-style licenses. The "
+"people \n"
+"working on I2P do not control what people release client applications "
+"under, \n"
+"and there are several GPL'ed applications available (I2PTunnel, \n"
+"susimail, I2PSnark, I2P-"
+"Bote, \n"
"I2Phex and others.).\n"
-"Funding for I2P comes entirely from donations,\n"
+"Funding for I2P comes entirely from "
+"donations,\n"
"and does not receive any tax breaks in any jurisdiction at this time,\n"
"as many of the developers are themselves anonymous."
-msgstr "I2P no es un proyecto de investigación - académico, comercial o gubernamental. En cambio es un esfuerzo de ingeniaría enfocado en hacer lo posible para ofrecer un nivel decente de anonimato para aquellos que lo necesitan. Lleva en desarrollo activo desde el 2003 con un programador a tiempo completo y un grupo de contribuidores a tiempo parcial de todo el mundo. Todo el trabajo realizado es software libre y disponible gratuitamente en la web. La mayoría del código es de dominio público, excepto algunas rutinas de cifrado que usan licencias del estilo BSD. La gente trabajando en I2P no controla bajo qué licencias libera la gente sus aplicaciones clientes, y hay varias aplicaciones GPL disponibles (I2PTunnel, susimail, I2PSnark, I2P-Bote, I2Phex y otras.). El financiamiento viene en su totalidad de donaciones, y por el momento no recibe ninguna rebaja de impuestos en ninguna jurisdicción, ya que la mayoría de los programadores son anónimos."
+msgstr ""
+"I2P no es un proyecto de investigación - académico, comercial o "
+"gubernamental. En cambio es un esfuerzo de ingeniaría enfocado en hacer "
+"lo posible para ofrecer un nivel decente de anonimato para aquellos que "
+"lo necesitan. Lleva en desarrollo activo desde el 2003 con un programador"
+" a tiempo completo y un grupo de contribuidores a tiempo parcial de todo "
+"el mundo. Todo el trabajo realizado es software libre y disponible "
+"gratuitamente en la web. La mayoría del código "
+"es de dominio público, excepto algunas rutinas de cifrado que usan "
+"licencias del estilo BSD. La gente trabajando en I2P no controla bajo qué"
+" licencias libera la gente sus aplicaciones clientes, y hay varias "
+"aplicaciones GPL disponibles (I2PTunnel, "
+"susimail, I2PSnark, I2P-"
+"Bote, I2Phex y otras.). El financiamiento viene en su totalidad de "
+"donaciones, y por el momento no recibe ninguna rebaja de impuestos en "
+"ninguna jurisdicción, ya que la mayoría de los programadores son "
+"anónimos."
#: i2p2www/pages/site/docs/how/tech-intro.html:96
msgid "Operation"
@@ -8223,29 +12956,61 @@ msgstr "Cómo funciona"
#: i2p2www/pages/site/docs/how/tech-intro.html:98
msgid ""
-"To understand I2P's operation, it is essential to understand a few key concepts. \n"
-"First, I2P makes a strict separation between the software participating in \n"
-"the network (a \"router\") and the anonymous endpoints (\"destinations\") associated \n"
-"with individual applications. The fact that someone is running I2P is not \n"
-"usually a secret. What is hidden is information on what the user is doing, \n"
-"if anything at all, as well as what router a particular destination is connected \n"
-"to. End users will typically have several local destinations on their router \n"
-"- for instance, one proxying in to IRC servers, another supporting the user's \n"
-"anonymous webserver (\"eepsite\"), another for an I2Phex instance, another for \n"
+"To understand I2P's operation, it is essential to understand a few key "
+"concepts. \n"
+"First, I2P makes a strict separation between the software participating "
+"in \n"
+"the network (a \"router\") and the anonymous endpoints (\"destinations\")"
+" associated \n"
+"with individual applications. The fact that someone is running I2P is not"
+" \n"
+"usually a secret. What is hidden is information on what the user is "
+"doing, \n"
+"if anything at all, as well as what router a particular destination is "
+"connected \n"
+"to. End users will typically have several local destinations on their "
+"router \n"
+"- for instance, one proxying in to IRC servers, another supporting the "
+"user's \n"
+"anonymous webserver (\"eepsite\"), another for an I2Phex instance, "
+"another for \n"
"torrents, etc."
-msgstr "Para entender como funciona I2p es esencial entender varios conceptos. Primero, I2P hace una separación completa entre las aplicaciones usadas en la red (un \"ruter\") y los puntos finales anónimos (\"destinaciones\") asociados a las aplicaciones individuales. El hecho de que alguien ejecute I2P normalmente no es un secreto. Lo que se oculta es la información y lo que hace el usuario, así como las destinaciones particulares a la que se conecta el ruter. Los usuarios finales tendrán normalmente varias destinaciones locales en su ruter - por ejemplo, una destinación conectando con servidores IRC, otras para las webs anónimas (eepsites), otra para I2Phex, otra para los torrets, etc."
+msgstr ""
+"Para entender como funciona I2p es esencial entender varios conceptos. "
+"Primero, I2P hace una separación completa entre las aplicaciones usadas "
+"en la red (un \"ruter\") y los puntos finales anónimos "
+"(\"destinaciones\") asociados a las aplicaciones individuales. El hecho "
+"de que alguien ejecute I2P normalmente no es un secreto. Lo que se oculta"
+" es la información y lo que hace el usuario, así como las destinaciones "
+"particulares a la que se conecta el ruter. Los usuarios finales tendrán "
+"normalmente varias destinaciones locales en su ruter - por ejemplo, una "
+"destinación conectando con servidores IRC, otras para las webs anónimas "
+"(eepsites), otra para I2Phex, otra para los torrets, etc."
#: i2p2www/pages/site/docs/how/tech-intro.html:111
msgid ""
"Another critical concept to understand is the \"tunnel\".\n"
-"A tunnel is a directed path through an explicitly selected list of routers.\n"
-"Layered encryption is used, so each of the routers can only decrypt a single layer.\n"
+"A tunnel is a directed path through an explicitly selected list of "
+"routers.\n"
+"Layered encryption is used, so each of the routers can only decrypt a "
+"single layer.\n"
"The decrypted information contains the IP of the next router, along with\n"
"the encrypted information to be forwarded.\n"
-"Each tunnel has a starting point (the first router, also known as \"gateway\")\n"
-"and an end point. Messages can be sent only in one way. To send messages back,\n"
+"Each tunnel has a starting point (the first router, also known as "
+"\"gateway\")\n"
+"and an end point. Messages can be sent only in one way. To send messages "
+"back,\n"
"another tunnel is required."
-msgstr "Otro concepto crítico a entender es el concepto de \"túnel\". Un túnel es un camino directo a través de una lista seleccionada y explícita de ruters. Se usa un cifrado por capas, por lo cual cada ruter sólo puede descifrar una capa.\nLa información descifrada contiene la IP del ruter siguiente, así como la información cifrada para ser enviada. Cada túnel tiene un punto de inicio (el primer ruter, también conocido como \"gateway\") y un punto final. Los mensajes sólo se pueden enviar en una dirección. Para enviar un mensaje de respuesta se debe crear un nuevo túnel."
+msgstr ""
+"Otro concepto crítico a entender es el concepto de \"túnel\". Un túnel es"
+" un camino directo a través de una lista seleccionada y explícita de "
+"ruters. Se usa un cifrado por capas, por lo cual cada ruter sólo puede "
+"descifrar una capa.\n"
+"La información descifrada contiene la IP del ruter siguiente, así como la"
+" información cifrada para ser enviada. Cada túnel tiene un punto de "
+"inicio (el primer ruter, también conocido como \"gateway\") y un punto "
+"final. Los mensajes sólo se pueden enviar en una dirección. Para enviar "
+"un mensaje de respuesta se debe crear un nuevo túnel."
#: i2p2www/pages/site/docs/how/tech-intro.html:122
#: i2p2www/pages/site/docs/tunnels/implementation.html:105
@@ -8263,33 +13028,71 @@ msgid ""
"while \"inbound\" tunnels bring messages to the tunnel creator.\n"
"Combining these two tunnels allows users to send messages to each other.\n"
"The sender (\"Alice\" in the above image) sets up an outbound tunnel,\n"
-"while the receiver (\"Bob\" in the above image) creates an inbound tunnel.\n"
-"The gateway of an inbound tunnel can receive messages from any other user\n"
+"while the receiver (\"Bob\" in the above image) creates an inbound "
+"tunnel.\n"
+"The gateway of an inbound tunnel can receive messages from any other user"
+"\n"
"and will send them on until the endpoint (\"Bob\").\n"
"The endpoint of the outbound tunnel will need to send the message\n"
"on to the gateway of the inbound tunnel.\n"
-"To do this, the sender (\"Alice\") adds instructions to her encrypted message.\n"
+"To do this, the sender (\"Alice\") adds instructions to her encrypted "
+"message.\n"
"Once the endpoint of the outbound tunnel decrypts the message,\n"
"it will have instructions to forward the message to the correct\n"
"inbound gateway (the gateway to \"Bob\")."
-msgstr "Existen 2 tipos de túneles:\ntúneles \"outbound\", de salida envían mensajes hacia fuera desde el creador de túneles, mientras que túneles \"inbound\", de entrada llevan los mensajes hasta el creador de túneles . Combinando estos 2 túneles los usuarios pueden enviar mensajes a otros usuarios. El remitente (\"Alice\" en la imagen anterior) crea un túnel de salida, mientras que el receptor (\"Bob\" en la imagen de arriba) crea un túnel entrante. La puerta de salida de un túnel de entrada puede recibir mensajes de cualquier usuario que serán enviados hasta en punto final (\"Bob\").\nEl punto final del túnel de salida necesita enviar el mensaje a la puerta de salida del túnel de entrada.\nPara conseguir esto, el remitente (\"Alice\") añade instrucciones al mensaje cifrado. Una vez que el punto final y el túnel de salida descifran el mensaje, tendrán las instrucciones para poder enviar el mensaje la puerta de salida de entrada correcta (la puerta de salida hacia \"Bob\")."
+msgstr ""
+"Existen 2 tipos de túneles:\n"
+"túneles \"outbound\", de salida envían mensajes hacia fuera desde "
+"el creador de túneles, mientras que túneles \"inbound\", de "
+"entrada llevan los mensajes hasta el creador de túneles . Combinando "
+"estos 2 túneles los usuarios pueden enviar mensajes a otros usuarios. El "
+"remitente (\"Alice\" en la imagen anterior) crea un túnel de salida, "
+"mientras que el receptor (\"Bob\" en la imagen de arriba) crea un túnel "
+"entrante. La puerta de salida de un túnel de entrada puede recibir "
+"mensajes de cualquier usuario que serán enviados hasta en punto final "
+"(\"Bob\").\n"
+"El punto final del túnel de salida necesita enviar el mensaje a la puerta"
+" de salida del túnel de entrada.\n"
+"Para conseguir esto, el remitente (\"Alice\") añade instrucciones al "
+"mensaje cifrado. Una vez que el punto final y el túnel de salida "
+"descifran el mensaje, tendrán las instrucciones para poder enviar el "
+"mensaje la puerta de salida de entrada correcta (la puerta de salida "
+"hacia \"Bob\")."
#: i2p2www/pages/site/docs/how/tech-intro.html:144
msgid ""
-"A third critical concept to understand is I2P's \"network database\" (or \"netDb\") \n"
-"- a pair of algorithms used to share network metadata. The two types of metadata \n"
-"carried are \"routerInfo\" and \"leaseSets\" - the routerInfo gives routers the \n"
-"data necessary for contacting a particular router (their public keys, transport \n"
-"addresses, etc), while the leaseSet gives routers the information necessary \n"
-"for contacting a particular destination. A leaseSet contains a number of \"leases\".\n"
-"Each of this leases specifies a tunnel gateway, which allows reaching a specific destination.\n"
+"A third critical concept to understand is I2P's \"network "
+"database\" (or \"netDb\") \n"
+"- a pair of algorithms used to share network metadata. The two types of "
+"metadata \n"
+"carried are \"routerInfo\" and \"leaseSets\" - the "
+"routerInfo gives routers the \n"
+"data necessary for contacting a particular router (their public keys, "
+"transport \n"
+"addresses, etc), while the leaseSet gives routers the information "
+"necessary \n"
+"for contacting a particular destination. A leaseSet contains a number of "
+"\"leases\".\n"
+"Each of this leases specifies a tunnel gateway, which allows reaching a "
+"specific destination.\n"
"The full information contained in a lease:"
-msgstr "Un tercer concepto crítico es el de la \"base de datos de la red\" (o \"netDb\") - un par de algoritmos hechos para compartir los datos de la red. Los 2 tipos de datos compartidos son \"routerInfo\" y \"leaseSets\" - la información del ruter, ruterinfo, da a los ruters la información necesaria para poder contactar con un ruter en particular (sus claves públicas, dirección de transporte, etc), mientras que el leaseSet le da a los ruters un número de \"leases\", asignaciones. Cada una de estas asignaciones especifica una puerta de salida de un túnel, la cual permite alcanzar una destinación específica. La información completa en un lease es:"
+msgstr ""
+"Un tercer concepto crítico es el de la \"base de datos de la red\""
+" (o \"netDb\") - un par de algoritmos hechos para compartir los datos de "
+"la red. Los 2 tipos de datos compartidos son \"routerInfo\" y "
+"\"leaseSets\" - la información del ruter, ruterinfo, da a los "
+"ruters la información necesaria para poder contactar con un ruter en "
+"particular (sus claves públicas, dirección de transporte, etc), mientras "
+"que el leaseSet le da a los ruters un número de \"leases\", asignaciones."
+" Cada una de estas asignaciones especifica una puerta de salida de un "
+"túnel, la cual permite alcanzar una destinación específica. La "
+"información completa en un lease es:"
#: i2p2www/pages/site/docs/how/tech-intro.html:155
-msgid ""
-"Inbound gateway for a tunnel that allows reaching a specific destination."
-msgstr "Gateway de entrada para un túnel que permite alcanzar una destinación específica."
+msgid "Inbound gateway for a tunnel that allows reaching a specific destination."
+msgstr ""
+"Gateway de entrada para un túnel que permite alcanzar una destinación "
+"específica."
#: i2p2www/pages/site/docs/how/tech-intro.html:156
msgid "Time when a tunnel expires."
@@ -8299,27 +13102,46 @@ msgstr "Tiempo de espiración del túnel."
msgid ""
"Pair of public keys to be able to encrypt messages (to send through the "
"tunnel and reach the destination)."
-msgstr "Par de claves públicas para poder cifrar el mensaje (para enviarlo a través del túnel y alcanzar su destino)."
+msgstr ""
+"Par de claves públicas para poder cifrar el mensaje (para enviarlo a "
+"través del túnel y alcanzar su destino)."
#: i2p2www/pages/site/docs/how/tech-intro.html:159
msgid ""
-"Routers themselves send their routerInfo to the netDb directly, while leaseSets are sent through outbound tunnels\n"
-"(leaseSets need to be sent anonymously, to avoid correlating a router with his leaseSets)."
-msgstr "Los ruters envían su routerInfo directamente a la netDB, mientras que los leaseSets son enviados a través de los túneles de salida (los leaseSets tienen que ser enviados anónimamente para evitar la correlación del ruter con sus leaseSets)"
+"Routers themselves send their routerInfo to the netDb directly, while "
+"leaseSets are sent through outbound tunnels\n"
+"(leaseSets need to be sent anonymously, to avoid correlating a router "
+"with his leaseSets)."
+msgstr ""
+"Los ruters envían su routerInfo directamente a la netDB, mientras que los"
+" leaseSets son enviados a través de los túneles de salida (los leaseSets "
+"tienen que ser enviados anónimamente para evitar la correlación del ruter"
+" con sus leaseSets)"
#: i2p2www/pages/site/docs/how/tech-intro.html:164
msgid ""
"We can combine the above concepts to build successful connections in the "
"network."
-msgstr "Podemos combinar los anteriores conceptos para construir conexiones dentro de la red."
+msgstr ""
+"Podemos combinar los anteriores conceptos para construir conexiones "
+"dentro de la red."
#: i2p2www/pages/site/docs/how/tech-intro.html:168
msgid ""
-"To build up her own inbound and outbound tunnels, Alice does a lookup in the netDb to collect routerInfo.\n"
+"To build up her own inbound and outbound tunnels, Alice does a lookup in "
+"the netDb to collect routerInfo.\n"
"This way, she gathers lists of peers she can use as hops in her tunnels.\n"
-"She can then send a build message to the first hop, requesting the construction of a tunnel and asking\n"
-"that router to send the construction message onward, until the tunnel has been constructed."
-msgstr "Para crear sus propios tuneles de entrada y salida, Alice no mira en la netDB para obtener la información. Ella obtiene listas de pares que puede usar como saltos en sus túneles. Entonces puede enviar un mensaje de construcción al primer salto, solicitando la construcción de un túnel y pidiendo a ese ruter que siga adelante con la construcción del mensaje, hasta que el túnel ha sido construido."
+"She can then send a build message to the first hop, requesting the "
+"construction of a tunnel and asking\n"
+"that router to send the construction message onward, until the tunnel has"
+" been constructed."
+msgstr ""
+"Para crear sus propios tuneles de entrada y salida, Alice no mira en la "
+"netDB para obtener la información. Ella obtiene listas de pares que puede"
+" usar como saltos en sus túneles. Entonces puede enviar un mensaje de "
+"construcción al primer salto, solicitando la construcción de un túnel y "
+"pidiendo a ese ruter que siga adelante con la construcción del mensaje, "
+"hasta que el túnel ha sido construido."
#: i2p2www/pages/site/docs/how/tech-intro.html:175
msgid "Request information on other routers"
@@ -8335,21 +13157,48 @@ msgstr "Figura 2: La información del ruter es usada para construir túneles."
#: i2p2www/pages/site/docs/how/tech-intro.html:182
msgid ""
-"When Alice wants to send a message to Bob, she first does a lookup in the \n"
-"netDb to find Bob's leaseSet, giving her his current inbound tunnel gateways. \n"
-"She then picks one of her outbound tunnels and sends the message down it with \n"
-"instructions for the outbound tunnel's endpoint to forward the message on \n"
-"to one of Bob's inbound tunnel gateways. When the outbound tunnel endpoint \n"
-"receives those instructions, it forwards the message as requested, and when \n"
-"Bob's inbound tunnel gateway receives it, it is forwarded down the tunnel \n"
-"to Bob's router. If Alice wants Bob to be able to reply to the message, she \n"
-"needs to transmit her own destination explicitly as part of the message itself.\n"
-"This can be done by introducing a higher-level layer, which is done in the\n"
+"When Alice wants to send a message to Bob, she first does a lookup in the"
+" \n"
+"netDb to find Bob's leaseSet, giving her his current inbound tunnel "
+"gateways. \n"
+"She then picks one of her outbound tunnels and sends the message down it "
+"with \n"
+"instructions for the outbound tunnel's endpoint to forward the message on"
+" \n"
+"to one of Bob's inbound tunnel gateways. When the outbound tunnel "
+"endpoint \n"
+"receives those instructions, it forwards the message as requested, and "
+"when \n"
+"Bob's inbound tunnel gateway receives it, it is forwarded down the tunnel"
+" \n"
+"to Bob's router. If Alice wants Bob to be able to reply to the message, "
+"she \n"
+"needs to transmit her own destination explicitly as part of the message "
+"itself.\n"
+"This can be done by introducing a higher-level layer, which is done in "
+"the\n"
"streaming library.\n"
"Alice may also cut down on the response time by bundling her most \n"
-"recent LeaseSet with the message so that Bob doesn't need to do a netDb lookup \n"
+"recent LeaseSet with the message so that Bob doesn't need to do a netDb "
+"lookup \n"
"for it when he wants to reply, but this is optional."
-msgstr "Cuando Alice quiere enviar un mensaje a Bob, primero mira en la netDB hasta encontrar la leaseSet de Bob, dando sus propias gateways de entrada.\nEntonces ella elije uno de los túneles de salida y envía su mensaje con instrucciones para que el punto final de túnel de salida reenvíe el mensaje a unos de las gateways de entrada de BoB. Cuando el punto final del túnel de salida recibe estas instrucciones, reenvía el mensaje como se ha pedido, y cuando el la gateway del túnel de entrada de Bob lo recibe, es enviado hasta el ruter de Bob. Si Alice quiere que Bob pueda responder al mensaje necesita transmitir explícitamente su propia destinación como parte del mensaje. Esto puede hacerse introduciendo una capa de nivel superior, lo cual se hace en la librearía de streaming. Alice también puede acortar el tiempo de respuesta construyendo su LeaseSet mas reciente con el mensaje, con lo cual Bob no necesita mirar en la netDB para responder, pero esto es opcional."
+msgstr ""
+"Cuando Alice quiere enviar un mensaje a Bob, primero mira en la netDB "
+"hasta encontrar la leaseSet de Bob, dando sus propias gateways de "
+"entrada.\n"
+"Entonces ella elije uno de los túneles de salida y envía su mensaje con "
+"instrucciones para que el punto final de túnel de salida reenvíe el "
+"mensaje a unos de las gateways de entrada de BoB. Cuando el punto final "
+"del túnel de salida recibe estas instrucciones, reenvía el mensaje como "
+"se ha pedido, y cuando el la gateway del túnel de entrada de Bob lo "
+"recibe, es enviado hasta el ruter de Bob. Si Alice quiere que Bob pueda "
+"responder al mensaje necesita transmitir explícitamente su propia "
+"destinación como parte del mensaje. Esto puede hacerse introduciendo una "
+"capa de nivel superior, lo cual se hace en la librearía de streaming. Alice también puede acortar el "
+"tiempo de respuesta construyendo su LeaseSet mas reciente con el mensaje,"
+" con lo cual Bob no necesita mirar en la netDB para responder, pero esto "
+"es opcional."
#: i2p2www/pages/site/docs/how/tech-intro.html:199
msgid "Connect tunnels using LeaseSets"
@@ -8361,141 +13210,344 @@ msgstr "Conectando túneles usando LeaseSets"
#: i2p2www/pages/site/docs/how/tech-intro.html:201
msgid "Figure 3: LeaseSets are used to connect outbound and inbound tunnels."
-msgstr "Figura 3: Los LeaseSets son usados para conectar los túneles de entrada y salida."
+msgstr ""
+"Figura 3: Los LeaseSets son usados para conectar los túneles de entrada y"
+" salida."
#: i2p2www/pages/site/docs/how/tech-intro.html:204
msgid ""
-"While the tunnels themselves have layered encryption to prevent unauthorized \n"
-"disclosure to peers inside the network (as the transport layer itself does \n"
-"to prevent unauthorized disclosure to peers outside the network), it is necessary \n"
-"to add an additional end to end layer of encryption to hide the message from \n"
-"the outbound tunnel endpoint and the inbound tunnel gateway. This \"garlic \n"
-"encryption\" lets Alice's router wrap up multiple messages into a single \n"
-"\"garlic message\", encrypted to a particular public key so that intermediary \n"
-"peers cannot determine either how many messages are within the garlic, what \n"
-"those messages say, or where those individual cloves are destined. For typical \n"
-"end to end communication between Alice and Bob, the garlic will be encrypted \n"
-"to the public key published in Bob's leaseSet, allowing the message to be \n"
+"While the tunnels themselves have layered encryption to prevent "
+"unauthorized \n"
+"disclosure to peers inside the network (as the transport layer itself "
+"does \n"
+"to prevent unauthorized disclosure to peers outside the network), it is "
+"necessary \n"
+"to add an additional end to end layer of encryption to hide the message "
+"from \n"
+"the outbound tunnel endpoint and the inbound tunnel gateway. This \"garlic \n"
+"encryption\" lets Alice's router wrap up multiple messages into a "
+"single \n"
+"\"garlic message\", encrypted to a particular public key so that "
+"intermediary \n"
+"peers cannot determine either how many messages are within the garlic, "
+"what \n"
+"those messages say, or where those individual cloves are destined. For "
+"typical \n"
+"end to end communication between Alice and Bob, the garlic will be "
+"encrypted \n"
+"to the public key published in Bob's leaseSet, allowing the message to be"
+" \n"
"encrypted without giving out the public key to Bob's own router."
-msgstr "Mientras que los túneles están cifrados en capas para prevenir ser revelados sin permiso a otros pares de la red (ya que la capa de transporte en sí misma no previene la muestra no autorizada a pares fuera de la red), es necesario añadir un final adicional a la capa de cifrado final para ocultar el mensaje del punto final del túnel de salida y de la puerta de salida del túnel de entrada. Este \"cifrado garlic\" permite al ruter de Alice envolver varios mensajes en un simple \"mensaje garlic\", cifrado para una calve pública en particular y así los pares intermediarios no pueden determinar cuantos mensajes hay dentro del mensaje garlic, que dicen esos mensajes, o a donde están destinados los mensajes individuales. Para una comunicación típica entre Alice y Bob, el garlic será cifrado con la clave pública publicada en el leaseSet de bob, permitiendo que el mensaje sea cifrado sin dar la clave pública al dueño del ruter de Bob."
+msgstr ""
+"Mientras que los túneles están cifrados en capas para prevenir ser "
+"revelados sin permiso a otros pares de la red (ya que la capa de "
+"transporte en sí misma no previene la muestra no autorizada a pares fuera"
+" de la red), es necesario añadir un final adicional a la capa de cifrado "
+"final para ocultar el mensaje del punto final del túnel de salida y de la"
+" puerta de salida del túnel de entrada. Este \"cifrado garlic\" permite al ruter de Alice "
+"envolver varios mensajes en un simple \"mensaje garlic\", cifrado para "
+"una calve pública en particular y así los pares intermediarios no pueden "
+"determinar cuantos mensajes hay dentro del mensaje garlic, que dicen esos"
+" mensajes, o a donde están destinados los mensajes individuales. Para una"
+" comunicación típica entre Alice y Bob, el garlic será cifrado con la "
+"clave pública publicada en el leaseSet de bob, permitiendo que el mensaje"
+" sea cifrado sin dar la clave pública al dueño del ruter de Bob."
#: i2p2www/pages/site/docs/how/tech-intro.html:219
msgid ""
-"Another important fact to keep in mind is that I2P is entirely message based \n"
-"and that some messages may be lost along the way. Applications using I2P can \n"
-"use the message oriented interfaces and take care of their own congestion \n"
-"control and reliability needs, but most would be best served by reusing the \n"
-"provided streaming library to view I2P as a streams \n"
+"Another important fact to keep in mind is that I2P is entirely message "
+"based \n"
+"and that some messages may be lost along the way. Applications using I2P "
+"can \n"
+"use the message oriented interfaces and take care of their own congestion"
+" \n"
+"control and reliability needs, but most would be best served by reusing "
+"the \n"
+"provided streaming library to view I2P as "
+"a streams \n"
"based network."
-msgstr "Otra cosa importante a tener en cuenta es que I2P esta totalmente basado en mensajes y que algunos mensajes se pueden perder a lo largo del camino. Las aplicaciones que usan I2P pueden usar el interfaz orientado a mensajes y tomar el control sobre la congestión y las necesidades de seguridad, pero la mayoría tienen suficiente usando la librería de streaming que proveemos y ver I2P como una red basada en streams."
+msgstr ""
+"Otra cosa importante a tener en cuenta es que I2P esta totalmente basado "
+"en mensajes y que algunos mensajes se pueden perder a lo largo del "
+"camino. Las aplicaciones que usan I2P pueden usar el interfaz orientado a"
+" mensajes y tomar el control sobre la congestión y las necesidades de "
+"seguridad, pero la mayoría tienen suficiente usando la librería de streaming que proveemos y ver I2P como una "
+"red basada en streams."
#: i2p2www/pages/site/docs/how/tech-intro.html:229
msgid ""
"Both inbound and outbound tunnels work along similar principles.\n"
-"The tunnel gateway accumulates a number of tunnel messages, eventually preprocessing \n"
-"them into something for tunnel delivery. Next, the gateway encrypts that preprocessed \n"
-"data and forwards it to the first hop. That peer and subsequent tunnel participants \n"
-"add on a layer of encryption after verifying that it isn't a duplicate before \n"
-"forward it on to the next peer. Eventually, the message arrives at the endpoint \n"
-"where the messages are split out again and forwarded on as requested. The \n"
-"difference arises in what the tunnel's creator does - for inbound tunnels, \n"
-"the creator is the endpoint and they simply decrypt all of the layers added, \n"
-"while for outbound tunnels, the creator is the gateway and they pre-decrypt \n"
-"all of the layers so that after all of the layers of per-hop encryption are \n"
+"The tunnel gateway accumulates a number of tunnel messages, eventually "
+"preprocessing \n"
+"them into something for tunnel delivery. Next, the gateway encrypts that "
+"preprocessed \n"
+"data and forwards it to the first hop. That peer and subsequent tunnel "
+"participants \n"
+"add on a layer of encryption after verifying that it isn't a duplicate "
+"before \n"
+"forward it on to the next peer. Eventually, the message arrives at the "
+"endpoint \n"
+"where the messages are split out again and forwarded on as requested. The"
+" \n"
+"difference arises in what the tunnel's creator does - for inbound "
+"tunnels, \n"
+"the creator is the endpoint and they simply decrypt all of the layers "
+"added, \n"
+"while for outbound tunnels, the creator is the gateway and they pre-"
+"decrypt \n"
+"all of the layers so that after all of the layers of per-hop encryption "
+"are \n"
"added, the message arrives in the clear at the tunnel endpoint."
-msgstr "Ambos túneles, de entrada y de salida funcionan con los mismos principios. La puerta de salida del túnel acumula un número de mensajes, eventualmente pre procesandolos para poder ser entregados. Después, la puerta de salida cifra esa información pre procesada y la envía al primer salto. El par y los siguientes túneles participantes añaden una capa de cifrado después de verificar que no es duplicado y antes de enviarlo al siguiente par. Eventualmente, este mensaje llega al punto final, donde el mensaje es dividido de nuevo y enviado conforme a lo solicitado. La diferencia surge en lo que hace el creador del túnel - para los túneles de entrada, el creador es el punto final y simplemente descifra todas las capas añadidas, mientras que para los túneles de salida, el creador es la puerta de salida y pre descifra todas las capas con lo que después de que todos las capas de cifrado por salto son añadidas, el mensaje llega en claro al túnel de punto final."
+msgstr ""
+"Ambos túneles, de entrada y de salida funcionan con los mismos "
+"principios. La puerta de salida del túnel acumula un número de mensajes, "
+"eventualmente pre procesandolos para poder ser entregados. Después, la "
+"puerta de salida cifra esa información pre procesada y la envía al primer"
+" salto. El par y los siguientes túneles participantes añaden una capa de "
+"cifrado después de verificar que no es duplicado y antes de enviarlo al "
+"siguiente par. Eventualmente, este mensaje llega al punto final, donde el"
+" mensaje es dividido de nuevo y enviado conforme a lo solicitado. La "
+"diferencia surge en lo que hace el creador del túnel - para los túneles "
+"de entrada, el creador es el punto final y simplemente descifra todas las"
+" capas añadidas, mientras que para los túneles de salida, el creador es "
+"la puerta de salida y pre descifra todas las capas con lo que después de "
+"que todos las capas de cifrado por salto son añadidas, el mensaje llega "
+"en claro al túnel de punto final."
#: i2p2www/pages/site/docs/how/tech-intro.html:244
msgid ""
-"The choice of specific peers to pass on messages as well as their particular \n"
-"ordering is important to understanding both I2P's anonymity and performance \n"
-"characteristics. While the network database (below) has its own criteria for \n"
-"picking what peers to query and store entries on, tunnel creators may use any peers \n"
-"in the network in any order (and even any number of times) in a single tunnel. \n"
-"If perfect latency and capacity data were globally known, selection and ordering \n"
-"would be driven by the particular needs of the client in tandem with their \n"
-"threat model. Unfortunately, latency and capacity data is not trivial to gather \n"
-"anonymously, and depending upon untrusted peers to provide this information \n"
+"The choice of specific peers to pass on messages as well as their "
+"particular \n"
+"ordering is important to understanding both I2P's anonymity and "
+"performance \n"
+"characteristics. While the network database (below) has its own criteria "
+"for \n"
+"picking what peers to query and store entries on, tunnel creators may use"
+" any peers \n"
+"in the network in any order (and even any number of times) in a single "
+"tunnel. \n"
+"If perfect latency and capacity data were globally known, selection and "
+"ordering \n"
+"would be driven by the particular needs of the client in tandem with "
+"their \n"
+"threat model. Unfortunately, latency and capacity data is not trivial to "
+"gather \n"
+"anonymously, and depending upon untrusted peers to provide this "
+"information \n"
"has its own serious anonymity implications."
-msgstr "La elección de los pares específicos par pasar los mensajes al igual que su orden es importante para entender el anonimato y el rendimiento de I2P. Mientras que la base de datos de la red (debajo) tiene su propio criterio al elegir en qué pares consultar y almacenar entradas, los creadores de los túneles pueden usar cualquier par en la red y en cualquier orden (e incluso cualquier número de veces) en un solo túnel. Si se conocen globalmente la latencia exacta y capacidad de datos, la selección del orden vendrá dada por las necesidades particulares del cliente y su modelo de seguridad. Desafortunadamente, no es trivial obtener anónimamente la latencia y la capacidad de datos, y al dependerse de pares no confiables para obtener esta información crea serios problemas en el anonimato."
+msgstr ""
+"La elección de los pares específicos par pasar los mensajes al igual que "
+"su orden es importante para entender el anonimato y el rendimiento de "
+"I2P. Mientras que la base de datos de la red (debajo) tiene su propio "
+"criterio al elegir en qué pares consultar y almacenar entradas, los "
+"creadores de los túneles pueden usar cualquier par en la red y en "
+"cualquier orden (e incluso cualquier número de veces) en un solo túnel. "
+"Si se conocen globalmente la latencia exacta y capacidad de datos, la "
+"selección del orden vendrá dada por las necesidades particulares del "
+"cliente y su modelo de seguridad. Desafortunadamente, no es trivial "
+"obtener anónimamente la latencia y la capacidad de datos, y al dependerse"
+" de pares no confiables para obtener esta información crea serios "
+"problemas en el anonimato."
#: i2p2www/pages/site/docs/how/tech-intro.html:257
msgid ""
-"From an anonymity perspective, the simplest technique would be to pick peers \n"
-"randomly from the entire network, order them randomly and use those peers \n"
-"in that order for all eternity. From a performance perspective, the simplest \n"
-"technique would be to pick the fastest peers with the necessary spare capacity, \n"
-"spreading the load across different peers to handle transparent failover, \n"
-"and to rebuild the tunnel whenever capacity information changes. While the \n"
-"former is both brittle and inefficient, the later requires inaccessible information \n"
-"and offers insufficient anonymity. I2P is instead working on offering a range \n"
-"of peer selection strategies, coupled with anonymity aware measurement code \n"
+"From an anonymity perspective, the simplest technique would be to pick "
+"peers \n"
+"randomly from the entire network, order them randomly and use those peers"
+" \n"
+"in that order for all eternity. From a performance perspective, the "
+"simplest \n"
+"technique would be to pick the fastest peers with the necessary spare "
+"capacity, \n"
+"spreading the load across different peers to handle transparent failover,"
+" \n"
+"and to rebuild the tunnel whenever capacity information changes. While "
+"the \n"
+"former is both brittle and inefficient, the later requires inaccessible "
+"information \n"
+"and offers insufficient anonymity. I2P is instead working on offering a "
+"range \n"
+"of peer selection strategies, coupled with anonymity aware measurement "
+"code \n"
"to organize the peers by their profiles."
-msgstr "Desde la perspectiva del anonimato, la técnica más simple sería elegir pares aleatoriamente de toda la red, ordenarlos aleatoriamente y usar esos pares en ese orden eternamente. Desde la perspectiva del rendimiento, la técnica más simple sería elegir los pares más rápidos con la capacidad necesaria, repartiendo la carga entre varios pares para manejar transparentemente los fallos, y para reconstruir el túnel cuando cambie la información sobre la capacidad disponible. Mientras que el primer modelo es frágil y deficiente, el segundo necesita información no accesible y no ofrece suficiente anonimato. I2P en cambio funciona ofreciendo un amplio abanico de estrategias de selección de pares, junto con código que tienen en cuenta el nivel de anonimato para organizar los pares y sus perfiles."
+msgstr ""
+"Desde la perspectiva del anonimato, la técnica más simple sería elegir "
+"pares aleatoriamente de toda la red, ordenarlos aleatoriamente y usar "
+"esos pares en ese orden eternamente. Desde la perspectiva del "
+"rendimiento, la técnica más simple sería elegir los pares más rápidos con"
+" la capacidad necesaria, repartiendo la carga entre varios pares para "
+"manejar transparentemente los fallos, y para reconstruir el túnel cuando "
+"cambie la información sobre la capacidad disponible. Mientras que el "
+"primer modelo es frágil y deficiente, el segundo necesita información no "
+"accesible y no ofrece suficiente anonimato. I2P en cambio funciona "
+"ofreciendo un amplio abanico de estrategias de selección de pares, junto "
+"con código que tienen en cuenta el nivel de anonimato para organizar los "
+"pares y sus perfiles."
#: i2p2www/pages/site/docs/how/tech-intro.html:270
msgid ""
-"As a base, I2P is constantly profiling the peers with which it interacts \n"
-"with by measuring their indirect behavior - for instance, when a peer responds \n"
-"to a netDb lookup in 1.3 seconds, that round trip latency is recorded in the \n"
-"profiles for all of the routers involved in the two tunnels (inbound and outbound) \n"
-"through which the request and response passed, as well as the queried peer's \n"
-"profile. Direct measurement, such as transport layer latency or congestion, \n"
-"is not used as part of the profile, as it can be manipulated and associated \n"
-"with the measuring router, exposing them to trivial attacks. While gathering \n"
-"these profiles, a series of calculations are run on each to summarize its \n"
-"performance - its latency, capacity to handle lots of activity, whether they \n"
-"are currently overloaded, and how well integrated into the network they seem \n"
-"to be. These calculations are then compared for active peers to organize the \n"
-"routers into four tiers - fast and high capacity, high capacity, not failing, \n"
-"and failing. The thresholds for those tiers are determined dynamically, and \n"
+"As a base, I2P is constantly profiling the peers with which it interacts"
+" \n"
+"with by measuring their indirect behavior - for instance, when a peer "
+"responds \n"
+"to a netDb lookup in 1.3 seconds, that round trip latency is recorded in "
+"the \n"
+"profiles for all of the routers involved in the two tunnels (inbound and "
+"outbound) \n"
+"through which the request and response passed, as well as the queried "
+"peer's \n"
+"profile. Direct measurement, such as transport layer latency or "
+"congestion, \n"
+"is not used as part of the profile, as it can be manipulated and "
+"associated \n"
+"with the measuring router, exposing them to trivial attacks. While "
+"gathering \n"
+"these profiles, a series of calculations are run on each to summarize its"
+" \n"
+"performance - its latency, capacity to handle lots of activity, whether "
+"they \n"
+"are currently overloaded, and how well integrated into the network they "
+"seem \n"
+"to be. These calculations are then compared for active peers to organize "
+"the \n"
+"routers into four tiers - fast and high capacity, high capacity, not "
+"failing, \n"
+"and failing. The thresholds for those tiers are determined dynamically, "
+"and \n"
"while they currently use fairly simple algorithms, alternatives exist."
-msgstr "Por defecto I2P está constantemente comprobando los pares con los que interactúa y midiendo su comportamiento - por ejemplo, cuando un par responde a una búsqueda de netBD en 1,3 segundos, la latencia de vuelta es guardada en los perfiles de todos los ruters implicados en los 2 túneles (de entrada y de salida) por los que la respuesta ha pasado, así como el perfil del par consultado. Las mediciones directas, como el retardo de la capa de transporte o la congestión, no se usan como parte del perfil, ya que puede manipularse y ser asociada con el ruter que está midiendo, exponiéndolo a ataques triviales. Mientras se calculan estos perfiles, una serie de cálculos se ejecutan en cada uno para resumir su rendimiento - su latencia, su capacidad para manejar la pérdida de actividad, si está saturado, y cómo de bien está integrado dentro de la red. Estos cálculos son entonces comparados por los pares activos para organizar los ruters en 4 niveles - rápido y con gran capacidad, gran capacidad, sin caídas y con caídas. Los umbrales de estos niveles son determinados dinámicamente, y mientras que se usan algoritmos bastantes sencillos también existen otras alternativas."
+msgstr ""
+"Por defecto I2P está constantemente comprobando los pares con los que "
+"interactúa y midiendo su comportamiento - por ejemplo, cuando un par "
+"responde a una búsqueda de netBD en 1,3 segundos, la latencia de vuelta "
+"es guardada en los perfiles de todos los ruters implicados en los 2 "
+"túneles (de entrada y de salida) por los que la respuesta ha pasado, así "
+"como el perfil del par consultado. Las mediciones directas, como el "
+"retardo de la capa de transporte o la congestión, no se usan como parte "
+"del perfil, ya que puede manipularse y ser asociada con el ruter que está"
+" midiendo, exponiéndolo a ataques triviales. Mientras se calculan estos "
+"perfiles, una serie de cálculos se ejecutan en cada uno para resumir su "
+"rendimiento - su latencia, su capacidad para manejar la pérdida de "
+"actividad, si está saturado, y cómo de bien está integrado dentro de la "
+"red. Estos cálculos son entonces comparados por los pares activos para "
+"organizar los ruters en 4 niveles - rápido y con gran capacidad, gran "
+"capacidad, sin caídas y con caídas. Los umbrales de estos niveles son "
+"determinados dinámicamente, y mientras que se usan algoritmos bastantes "
+"sencillos también existen otras alternativas."
#: i2p2www/pages/site/docs/how/tech-intro.html:288
msgid ""
-"Using this profile data, the simplest reasonable peer selection strategy \n"
-"is to pick peers randomly from the top tier (fast and high capacity), and \n"
-"this is currently deployed for client tunnels. Exploratory tunnels (used for \n"
-"netDb and tunnel management) pick peers randomly from the \"not failing\" tier \n"
-"(which includes routers in 'better' tiers as well), allowing the peer to sample \n"
-"routers more widely, in effect optimizing the peer selection through randomized \n"
-"hill climbing. These strategies alone do however leak information regarding \n"
-"the peers in the router's top tier through predecessor and netDb harvesting \n"
-"attacks. In turn, several alternatives exist which, while not balancing the \n"
-"load as evenly, will address the attacks mounted by particular classes of \n"
+"Using this profile data, the simplest reasonable peer selection strategy"
+" \n"
+"is to pick peers randomly from the top tier (fast and high capacity), and"
+" \n"
+"this is currently deployed for client tunnels. Exploratory tunnels (used "
+"for \n"
+"netDb and tunnel management) pick peers randomly from the \"not failing\""
+" tier \n"
+"(which includes routers in 'better' tiers as well), allowing the peer to "
+"sample \n"
+"routers more widely, in effect optimizing the peer selection through "
+"randomized \n"
+"hill climbing. These strategies alone do however leak information "
+"regarding \n"
+"the peers in the router's top tier through predecessor and netDb "
+"harvesting \n"
+"attacks. In turn, several alternatives exist which, while not balancing "
+"the \n"
+"load as evenly, will address the attacks mounted by particular classes of"
+" \n"
"adversaries."
-msgstr "Usando este perfil, la estrategia de selección de par más razonable es coger los pares aleatoriamente del nivel más alto (rápido y con gran capacidad), que es los que se hace para los túneles clientes. Para los túneles de exploración (usados por netDB y la administración de túneles) se toman túneles aleatorios del nivel \"sin fallos\" (lo que incluye también a los túneles en los \"mejores\" niveles), permitiendo a los ruters tomar muestras más ampliamente, lo que tiene el efecto de optimizar la selección de pares a través de la escalada aleatoria. Sin embargo estas estrategias solas filtran información de los pares que están en el nivel más alto a causa de sus predecesores y a causa de ataques de 'cosechado' en la netDB. A su vez, existen otras alternativas, las cuales, aunque no reparten la carga igualitariamente, resistirán ciertos ataques usados habitualmente."
+msgstr ""
+"Usando este perfil, la estrategia de selección de par más razonable es "
+"coger los pares aleatoriamente del nivel más alto (rápido y con gran "
+"capacidad), que es los que se hace para los túneles clientes. Para los "
+"túneles de exploración (usados por netDB y la administración de túneles) "
+"se toman túneles aleatorios del nivel \"sin fallos\" (lo que incluye "
+"también a los túneles en los \"mejores\" niveles), permitiendo a los "
+"ruters tomar muestras más ampliamente, lo que tiene el efecto de "
+"optimizar la selección de pares a través de la escalada aleatoria. Sin "
+"embargo estas estrategias solas filtran información de los pares que "
+"están en el nivel más alto a causa de sus predecesores y a causa de "
+"ataques de 'cosechado' en la netDB. A su vez, existen otras alternativas,"
+" las cuales, aunque no reparten la carga igualitariamente, resistirán "
+"ciertos ataques usados habitualmente."
#: i2p2www/pages/site/docs/how/tech-intro.html:302
msgid ""
-"By picking a random key and ordering the peers according to their XOR distance \n"
-"from it, the information leaked is reduced in predecessor and harvesting attacks \n"
-"according to the peers' failure rate and the tier's churn. Another simple \n"
-"strategy for dealing with netDb harvesting attacks is to simply fix the inbound \n"
-"tunnel gateway(s) yet randomize the peers further on in the tunnels. To deal \n"
-"with predecessor attacks for adversaries which the client contacts, the outbound \n"
-"tunnel endpoints would also remain fixed. The selection of which peer to fix \n"
-"on the most exposed point would of course need to have a limit to the duration, \n"
-"as all peers fail eventually, so it could either be reactively adjusted or \n"
-"proactively avoided to mimic a measured mean time between failures of other \n"
-"routers. These two strategies can in turn be combined, using a fixed exposed \n"
-"peer and an XOR based ordering within the tunnels themselves. A more rigid \n"
-"strategy would fix the exact peers and ordering of a potential tunnel, only \n"
-"using individual peers if all of them agree to participate in the same way \n"
-"each time. This varies from the XOR based ordering in that the predecessor \n"
-"and successor of each peer is always the same, while the XOR only makes sure \n"
+"By picking a random key and ordering the peers according to their XOR "
+"distance \n"
+"from it, the information leaked is reduced in predecessor and harvesting "
+"attacks \n"
+"according to the peers' failure rate and the tier's churn. Another simple"
+" \n"
+"strategy for dealing with netDb harvesting attacks is to simply fix the "
+"inbound \n"
+"tunnel gateway(s) yet randomize the peers further on in the tunnels. To "
+"deal \n"
+"with predecessor attacks for adversaries which the client contacts, the "
+"outbound \n"
+"tunnel endpoints would also remain fixed. The selection of which peer to "
+"fix \n"
+"on the most exposed point would of course need to have a limit to the "
+"duration, \n"
+"as all peers fail eventually, so it could either be reactively adjusted "
+"or \n"
+"proactively avoided to mimic a measured mean time between failures of "
+"other \n"
+"routers. These two strategies can in turn be combined, using a fixed "
+"exposed \n"
+"peer and an XOR based ordering within the tunnels themselves. A more "
+"rigid \n"
+"strategy would fix the exact peers and ordering of a potential tunnel, "
+"only \n"
+"using individual peers if all of them agree to participate in the same "
+"way \n"
+"each time. This varies from the XOR based ordering in that the "
+"predecessor \n"
+"and successor of each peer is always the same, while the XOR only makes "
+"sure \n"
"their order doesn't change."
-msgstr "Tomando una clave aleatoria y ordenando los pares de acuerdo a su distancia XOR de ella, la información expuesta es reducida en los ataques del predecesor y de cosechado conforme a la velocidad de fallo del par y de su mezcla de niveles. Otra estrategia simple para tratar con el ataque del cosechado de la netDB es simplemente fijando la puerta de salida(s) de túnel de entrada, ya sea aleatorizando los pares más lejos o en los túneles. Para tratar con el ataque del predecesor por adversarios con los que contacta el cliente, los puntos finales del túnel de salida deberían permanecer también fijos. Para seleccionar que par fijar en el punto más expuesto se necesitará, por supuesto, un límite de duración ya que todos los pares fallan más tarde o más temprano, con lo cual podría ser ajustado de manera reactiva o evitado de manera activa, para imitar el tiempo medio de los fallos de otros ruters. Estas 2 estrategias pueden ser combinadas en turnos, usando un par expuesto fijo y un orden basado en XOR dentro de los propios túneles. Una estrategia más rígida sería fijar los pares justos y ordenarlos en un túnel potencial, sólo usando pares individuales si todos están de acuerdo en participar de la misma forma cada vez. Esto varía del ordenado basado en XOR en que el predecesor y sucesor de cada par es siempre el mismo, mientras que el XOR asegura que el orden no cambie. "
+msgstr ""
+"Tomando una clave aleatoria y ordenando los pares de acuerdo a su "
+"distancia XOR de ella, la información expuesta es reducida en los ataques"
+" del predecesor y de cosechado conforme a la velocidad de fallo del par y"
+" de su mezcla de niveles. Otra estrategia simple para tratar con el "
+"ataque del cosechado de la netDB es simplemente fijando la puerta de "
+"salida(s) de túnel de entrada, ya sea aleatorizando los pares más lejos o"
+" en los túneles. Para tratar con el ataque del predecesor por adversarios"
+" con los que contacta el cliente, los puntos finales del túnel de salida "
+"deberían permanecer también fijos. Para seleccionar que par fijar en el "
+"punto más expuesto se necesitará, por supuesto, un límite de duración ya "
+"que todos los pares fallan más tarde o más temprano, con lo cual podría "
+"ser ajustado de manera reactiva o evitado de manera activa, para imitar "
+"el tiempo medio de los fallos de otros ruters. Estas 2 estrategias pueden"
+" ser combinadas en turnos, usando un par expuesto fijo y un orden basado "
+"en XOR dentro de los propios túneles. Una estrategia más rígida sería "
+"fijar los pares justos y ordenarlos en un túnel potencial, sólo usando "
+"pares individuales si todos están de acuerdo en participar de la misma "
+"forma cada vez. Esto varía del ordenado basado en XOR en que el "
+"predecesor y sucesor de cada par es siempre el mismo, mientras que el XOR"
+" asegura que el orden no cambie. "
#: i2p2www/pages/site/docs/how/tech-intro.html:322
#, python-format
msgid ""
"As mentioned before, I2P currently (release 0.8) includes the tiered \n"
"random strategy above, with XOR-based ordering. A \n"
-"more detailed discussion of the mechanics involved in tunnel operation, management, \n"
-"and peer selection can be found in the tunnel spec."
-msgstr "Como se ha mencionado anteriormente, actualmente I2P (versión 0.8) incluye la estrategia anterior de nivelado aleatorio, con ordenado basado en XOR. Una discusión más detallada en los mecanismos de la utilización, administración y selección de los pares de los túneles puede ser encontrada en las especificaciones del túnel."
+"more detailed discussion of the mechanics involved in tunnel operation, "
+"management, \n"
+"and peer selection can be found in the tunnel "
+"spec."
+msgstr ""
+"Como se ha mencionado anteriormente, actualmente I2P (versión 0.8) "
+"incluye la estrategia anterior de nivelado aleatorio, con ordenado basado"
+" en XOR. Una discusión más detallada en los mecanismos de la utilización,"
+" administración y selección de los pares de los túneles puede ser "
+"encontrada en las especificaciones del "
+"túnel."
#: i2p2www/pages/site/docs/how/tech-intro.html:330
#, python-format
@@ -8503,27 +13555,52 @@ msgid ""
"As mentioned earlier, I2P's netDb works to share the network's metadata.\n"
"This is detailed in the network database page,\n"
"but a basic explanation is available below."
-msgstr "Como se ha dicho antes, las netDB de I2P trabaja para compartir los metadatos de la red. Esto se detalla en the network database, pero una explicación básica está disponible debajo."
+msgstr ""
+"Como se ha dicho antes, las netDB de I2P trabaja para compartir los "
+"metadatos de la red. Esto se detalla en the network"
+" database, pero una explicación básica está disponible debajo."
#: i2p2www/pages/site/docs/how/tech-intro.html:336
msgid ""
"A percentage of I2P users are appointed as 'floodfill peers'.\n"
-"Currently, I2P installations that have a lot of bandwidth and are fast enough,\n"
-"will appoint themselves as floodfill as soon as the number of existing floodfill routers\n"
+"Currently, I2P installations that have a lot of bandwidth and are fast "
+"enough,\n"
+"will appoint themselves as floodfill as soon as the number of existing "
+"floodfill routers\n"
"drops too low."
-msgstr "Un porcentaje de los usuarios de I2P son designados como 'pares floodfill'. Actualmente, las instalaciones de I2P que tienen un gran ancho de banda y son suficientemente rápidas se designarán ellas mismas como floodfills tan pronto como el número de de ruters floodfill existentes decrezca demasiado."
+msgstr ""
+"Un porcentaje de los usuarios de I2P son designados como 'pares "
+"floodfill'. Actualmente, las instalaciones de I2P que tienen un gran "
+"ancho de banda y son suficientemente rápidas se designarán ellas mismas "
+"como floodfills tan pronto como el número de de ruters floodfill "
+"existentes decrezca demasiado."
#: i2p2www/pages/site/docs/how/tech-intro.html:343
#, python-format
msgid ""
-"Other I2P routers will store their data and lookup data by sending simple 'store' and 'lookup' queries to the floodfills.\n"
-"If a floodfill router receives a 'store' query, it will spread the information to other floodfill routers\n"
-"using the Kademlia algorithm.\n"
-"The 'lookup' queries currently function differently, to avoid an important\n"
+"Other I2P routers will store their data and lookup data by sending simple"
+" 'store' and 'lookup' queries to the floodfills.\n"
+"If a floodfill router receives a 'store' query, it will spread the "
+"information to other floodfill routers\n"
+"using the Kademlia "
+"algorithm.\n"
+"The 'lookup' queries currently function differently, to avoid an "
+"important\n"
"security issue.\n"
-"When a lookup is done, the floodfill router will not forward the lookup to other peers,\n"
+"When a lookup is done, the floodfill router will not forward the lookup "
+"to other peers,\n"
"but will always answer by itself (if it has the requested data)."
-msgstr "Otros rutes I2P almacenarán sus datos y sus datos de búsqueda simplemente enviando consultas 'store' y 'lookup' a los floodfills. Si un floodfill recibe una consulta 'store', este difundirá la información a otros ruters floodfill usando el algoritmo Kademlia. Las consultas 'lookup' funcionan de manera diferente para evitar un problema de seguridad importante. Cuando se hace una búsqueda, el ruter floodfill no re enviará la búsqueda a otros pares, pero siempre responderá él mismo (si tiene la información requerida)."
+msgstr ""
+"Otros rutes I2P almacenarán sus datos y sus datos de búsqueda simplemente"
+" enviando consultas 'store' y 'lookup' a los floodfills. Si un floodfill "
+"recibe una consulta 'store', este difundirá la información a otros ruters"
+" floodfill usando el algoritmo Kademlia. "
+"Las consultas 'lookup' funcionan de manera diferente para evitar un problema de seguridad importante. Cuando se"
+" hace una búsqueda, el ruter floodfill no re enviará la búsqueda a otros "
+"pares, pero siempre responderá él mismo (si tiene la información "
+"requerida)."
#: i2p2www/pages/site/docs/how/tech-intro.html:353
msgid "Two types of information are stored in the network database."
@@ -8531,24 +13608,40 @@ msgstr "En la base de datos de la red se almacenan dos tipos de información."
#: i2p2www/pages/site/docs/how/tech-intro.html:357
msgid ""
-"A RouterInfo stores information on a specific I2P router and how to "
-"contact it"
-msgstr "RouterInfo almacena información sobre un ruter I2P determinado y como contactar con él. "
+"A RouterInfo stores information on a specific I2P router and how "
+"to contact it"
+msgstr ""
+"RouterInfo almacena información sobre un ruter I2P determinado y "
+"como contactar con él. "
#: i2p2www/pages/site/docs/how/tech-intro.html:358
msgid ""
"A LeaseSet stores information on a specific destination (e.g. I2P "
"website, e-mail server...)"
-msgstr "LeaseSet almacena información sobre una destinación específica (e.g. web I2P, servidor de correo...)"
+msgstr ""
+"LeaseSet almacena información sobre una destinación específica "
+"(e.g. web I2P, servidor de correo...)"
#: i2p2www/pages/site/docs/how/tech-intro.html:360
msgid ""
-"All of this information is signed by the publishing party and verified by any I2P router using or storing the information.\n"
-"In addition, the data contains timing information, to avoid storage of old entries and possible attacks.\n"
-"This is also why I2P bundles the necessary code for maintaining the correct time, occasionally querying some SNTP servers \n"
-"(the pool.ntp.org round robin by default)\n"
+"All of this information is signed by the publishing party and verified by"
+" any I2P router using or storing the information.\n"
+"In addition, the data contains timing information, to avoid storage of "
+"old entries and possible attacks.\n"
+"This is also why I2P bundles the necessary code for maintaining the "
+"correct time, occasionally querying some SNTP servers \n"
+"(the pool.ntp.org round robin by"
+" default)\n"
"and detecting skew between routers at the transport layer."
-msgstr "Toda esta información es firmada par la parte publicadora y verificada por cualquier ruter I2P que use o almacene la información. Además, los datos contienen información de la hora para evitar el almacenamiento de entradas antiguas y posibles ataques. Esto es por que I2P empaqueta el código necesario para mantener la fecha correcta, a veces consultando algunos servidores SNTP (por defecto pool.ntp.org) y detectando diferencias entre los ruters y la capa de transporte."
+msgstr ""
+"Toda esta información es firmada par la parte publicadora y verificada "
+"por cualquier ruter I2P que use o almacene la información. Además, los "
+"datos contienen información de la hora para evitar el almacenamiento de "
+"entradas antiguas y posibles ataques. Esto es por que I2P empaqueta el "
+"código necesario para mantener la fecha correcta, a veces consultando "
+"algunos servidores SNTP (por defecto pool.ntp.org) y detectando "
+"diferencias entre los ruters y la capa de transporte."
#: i2p2www/pages/site/docs/how/tech-intro.html:368
msgid "Some additional remarks are also important."
@@ -8561,9 +13654,16 @@ msgstr "Leasesets cifrados y no publicados:"
#: i2p2www/pages/site/docs/how/tech-intro.html:374
msgid ""
"One could only want specific people to be able to reach a destination.\n"
-"This is possible by not publishing the destination in the netDb. You will however have to transmit the destination by other means.\n"
-"An alternative are the 'encrypted leaseSets'. These leaseSets can only be decoded by people with access to the decryption key."
-msgstr "Uno puede desear que sólo determinada gente sea capaz de alcanzar una destinación. Esto es posible si no publica su destinación en la netDB. Pero entonces deberá transmitir la destinación de alguna otra forma. Una alternativa son los 'leaseSets' cifrados. Estos leaseSets' sólo pueden ser decodificados por la gente con acceso a la clave de descrifrado."
+"This is possible by not publishing the destination in the netDb. You will"
+" however have to transmit the destination by other means.\n"
+"An alternative are the 'encrypted leaseSets'. These leaseSets can only be"
+" decoded by people with access to the decryption key."
+msgstr ""
+"Uno puede desear que sólo determinada gente sea capaz de alcanzar una "
+"destinación. Esto es posible si no publica su destinación en la netDB. "
+"Pero entonces deberá transmitir la destinación de alguna otra forma. Una "
+"alternativa son los 'leaseSets' cifrados. Estos leaseSets' sólo pueden "
+"ser decodificados por la gente con acceso a la clave de descrifrado."
#: i2p2www/pages/site/docs/how/tech-intro.html:381
msgid "Bootstrapping:"
@@ -8571,11 +13671,21 @@ msgstr "Obteniendo los pares iniciales o Bootstrapping:"
#: i2p2www/pages/site/docs/how/tech-intro.html:382
msgid ""
-"Bootstrapping the netDb is quite simple. Once a router manages to receive a single routerInfo of a reachable peer,\n"
+"Bootstrapping the netDb is quite simple. Once a router manages to receive"
+" a single routerInfo of a reachable peer,\n"
"it can query that router for references to other routers in the network.\n"
-"Currently, a number of users post their routerInfo files to a website to make this information available.\n"
-"I2P automatically connects to one of these websites to gather routerInfo files and bootstrap."
-msgstr "Bootstrapping en la netDB es muy simple. Una vez que un ruter recibe un routerInfo de un par accesible, puede consultar a ese ruter por referencias de otros ruters en la red. Actualmente varios usuarios comparten sus archivos routerInfo en una web para hacer que la información esté disponible. I2P se conecta automáticamente a una de estas webs para obtener los archivos routerInfo y obtener los primeros pares, bootstrap."
+"Currently, a number of users post their routerInfo files to a website to "
+"make this information available.\n"
+"I2P automatically connects to one of these websites to gather routerInfo "
+"files and bootstrap."
+msgstr ""
+"Bootstrapping en la netDB es muy simple. Una vez que un ruter recibe un "
+"routerInfo de un par accesible, puede consultar a ese ruter por "
+"referencias de otros ruters en la red. Actualmente varios usuarios "
+"comparten sus archivos routerInfo en una web para hacer que la "
+"información esté disponible. I2P se conecta automáticamente a una de "
+"estas webs para obtener los archivos routerInfo y obtener los primeros "
+"pares, bootstrap."
#: i2p2www/pages/site/docs/how/tech-intro.html:390
msgid "Lookup scalability:"
@@ -8584,30 +13694,59 @@ msgstr "Escalabilidad de las búsquedas:"
#: i2p2www/pages/site/docs/how/tech-intro.html:391
msgid ""
"Lookups in the I2P network are not forwarded to other netDb routers.\n"
-"Currently, this is not a major problem, since the network is not very large.\n"
-"However, as the network grows, not all routerInfo and leaseSet files will be present\n"
-"on each netDb router. This will cause a deterioration of the percentage of successful lookups.\n"
-"Because of this, refinements to the netDb will be done in the next releases."
-msgstr "Las búsquedas en la red I2P no son enviadas a otras netDBs de otros ruters. Actualmente no hay ningún problema ya que la red no es muy grande. Aún así, según vaya creciendo la red no todos los routerInfos y leaseSets estarán presentes en cada netDB de cada ruter. Esto causaría un deterioro en el porcentaje de búsquedas con éxito. A causa de esto en las prósimas versiones se mejorará la netDB."
+"Currently, this is not a major problem, since the network is not very "
+"large.\n"
+"However, as the network grows, not all routerInfo and leaseSet files will"
+" be present\n"
+"on each netDb router. This will cause a deterioration of the percentage "
+"of successful lookups.\n"
+"Because of this, refinements to the netDb will be done in the next "
+"releases."
+msgstr ""
+"Las búsquedas en la red I2P no son enviadas a otras netDBs de otros "
+"ruters. Actualmente no hay ningún problema ya que la red no es muy "
+"grande. Aún así, según vaya creciendo la red no todos los routerInfos y "
+"leaseSets estarán presentes en cada netDB de cada ruter. Esto causaría un"
+" deterioro en el porcentaje de búsquedas con éxito. A causa de esto en "
+"las prósimas versiones se mejorará la netDB."
#: i2p2www/pages/site/docs/how/tech-intro.html:402
msgid ""
-"Communication between routers needs to provide confidentiality and integrity \n"
-"against external adversaries while authenticating that the router contacted \n"
-"is the one who should receive a given message. The particulars of how routers \n"
-"communicate with other routers aren't critical - three separate protocols \n"
+"Communication between routers needs to provide confidentiality and "
+"integrity \n"
+"against external adversaries while authenticating that the router "
+"contacted \n"
+"is the one who should receive a given message. The particulars of how "
+"routers \n"
+"communicate with other routers aren't critical - three separate protocols"
+" \n"
"have been used at different points to provide those bare necessities."
-msgstr "La comunicación entre ruters necesita proporcionar confidencialidad e integridad contra cualquier adversario externo mientras se autentifica que el ruter contactado es el que debe recibir el mensaje. Los detalles de como se comunican los ruters con otros ruters no son críticos - se han usado tres protocolos diferentes en varios puntos para suplir estas necesidades."
+msgstr ""
+"La comunicación entre ruters necesita proporcionar confidencialidad e "
+"integridad contra cualquier adversario externo mientras se autentifica "
+"que el ruter contactado es el que debe recibir el mensaje. Los detalles "
+"de como se comunican los ruters con otros ruters no son críticos - se han"
+" usado tres protocolos diferentes en varios puntos para suplir estas "
+"necesidades."
#: i2p2www/pages/site/docs/how/tech-intro.html:410
#, python-format
msgid ""
"I2P started with a TCP-based protocol which \n"
-"has since been disabled. Then, to accommodate the need for high degree communication \n"
-"(as a number of routers will end up speaking with many others), I2P moved \n"
-"from a TCP based transport to a UDP-based one - \"Secure \n"
+"has since been disabled. Then, to accommodate the need for high degree "
+"communication \n"
+"(as a number of routers will end up speaking with many others), I2P moved"
+" \n"
+"from a TCP based transport to a UDP-based one - "
+"\"Secure \n"
"Semireliable UDP\", or \"SSU\"."
-msgstr "I2P comenzó con un protocolo basado en TCP que ha sido deshabilitado. Entonces, para adaptarse a las necesidades de comunicaciones de alto nivel (ya que los ruters terminarán hablando con muchos otros ruters), I2P cambió de un transporte basado en TCP a uno basado en UDP - \"Secure Semireliable UDP\", \"UDP seguro semi fiable o \"SSU\"."
+msgstr ""
+"I2P comenzó con un protocolo basado en TCP que ha sido deshabilitado. "
+"Entonces, para adaptarse a las necesidades de comunicaciones de alto "
+"nivel (ya que los ruters terminarán hablando con muchos otros ruters), "
+"I2P cambió de un transporte basado en TCP a uno basado en UDP - \"Secure Semireliable UDP\", \"UDP "
+"seguro semi fiable o \"SSU\"."
#: i2p2www/pages/site/docs/how/tech-intro.html:418
#, python-format
@@ -8617,60 +13756,129 @@ msgstr "Como se describe en la especificación de SSU:"
#: i2p2www/pages/site/docs/how/tech-intro.html:422
msgid ""
"The goal of this protocol is to provide secure, authenticated, \n"
-"semireliable and unordered message delivery, exposing only a minimal amount \n"
-"of data easily discernible to third parties. It should support high degree \n"
-"communication as well as TCP-friendly congestion control and may include \n"
-"PMTU detection. It should be capable of efficiently moving bulk data at rates \n"
-"sufficient for home users. In addition, it should support techniques for addressing \n"
+"semireliable and unordered message delivery, exposing only a minimal "
+"amount \n"
+"of data easily discernible to third parties. It should support high "
+"degree \n"
+"communication as well as TCP-friendly congestion control and may include"
+" \n"
+"PMTU detection. It should be capable of efficiently moving bulk data at "
+"rates \n"
+"sufficient for home users. In addition, it should support techniques for "
+"addressing \n"
"network obstacles, like most NATs or firewalls."
-msgstr "El fin de este protocolo es proporcionar el envío seguro de mensajes, autentificado, semi fiable y no ordenado, revelando sólo una pequeña cantidad de datos fácilmente discernible para terceras partes. Debe soportar sólo comunicaciones de alto nivel así como sistemas de control de congestión amigables con TCP y debe incluir también detección PMTU. Debe ser capaz de mover eficientemente un gran volumen de datos a velocidades apropiadas para los usuarios domésticos. Además debe soportar técnicas para lidiar con los obstáculos en la red, como NATs o firewalls."
+msgstr ""
+"El fin de este protocolo es proporcionar el envío seguro de mensajes, "
+"autentificado, semi fiable y no ordenado, revelando sólo una pequeña "
+"cantidad de datos fácilmente discernible para terceras partes. Debe "
+"soportar sólo comunicaciones de alto nivel así como sistemas de control "
+"de congestión amigables con TCP y debe incluir también detección PMTU. "
+"Debe ser capaz de mover eficientemente un gran volumen de datos a "
+"velocidades apropiadas para los usuarios domésticos. Además debe soportar"
+" técnicas para lidiar con los obstáculos en la red, como NATs o "
+"firewalls."
#: i2p2www/pages/site/docs/how/tech-intro.html:432
#, python-format
msgid ""
-"Following the introduction of SSU, after issues with congestion collapse \n"
-"appeared, a new NIO-based TCP transport called NTCP \n"
-"was implemented. It is enabled by default for outbound connections only. Those \n"
-"who configure their NAT/firewall to allow inbound connections and specify \n"
-"the external host and port (dyndns/etc is ok) on /config.jsp can receive inbound \n"
-"connections. As NTCP is NIO based, so it doesn't suffer from the 1 thread \n"
+"Following the introduction of SSU, after issues with congestion collapse"
+" \n"
+"appeared, a new NIO-based TCP transport called NTCP \n"
+"was implemented. It is enabled by default for outbound connections only. "
+"Those \n"
+"who configure their NAT/firewall to allow inbound connections and specify"
+" \n"
+"the external host and port (dyndns/etc is ok) on /config.jsp can receive "
+"inbound \n"
+"connections. As NTCP is NIO based, so it doesn't suffer from the 1 thread"
+" \n"
"per connection issues of the old TCP transport."
-msgstr "Tras la introducción de SSU, y después de aparecer algunos problemas de congestión, se implementó un nuevo transporte TCP basado en NIO llamado NTCP. Está activado por defecto sólo para las conexiones de salida. Aquellos que configuran sus NAT/firewall para permitir conexiones de entrada y especifican el puerto y host externo (dyndns/etc es válido) en /config.jsp pueden recibir conexiones de entrada. Al estar NTPC basado en NIO no sufre del problema de \"1 hilo por conexión\" del viejo protocolo de transporte TCP."
+msgstr ""
+"Tras la introducción de SSU, y después de aparecer algunos problemas de "
+"congestión, se implementó un nuevo transporte TCP basado en NIO llamado "
+"NTCP. Está activado por defecto sólo para las "
+"conexiones de salida. Aquellos que configuran sus NAT/firewall para "
+"permitir conexiones de entrada y especifican el puerto y host externo "
+"(dyndns/etc es válido) en /config.jsp pueden recibir conexiones de "
+"entrada. Al estar NTPC basado en NIO no sufre del problema de \"1 hilo "
+"por conexión\" del viejo protocolo de transporte TCP."
#: i2p2www/pages/site/docs/how/tech-intro.html:442
msgid ""
"I2P supports multiple transports simultaneously. A particular transport \n"
-"for an outbound connection is selected with \"bids\". Each transport bids for \n"
-"the connection and the relative value of these bids assigns the priority. \n"
-"Transports may reply with different bids, depending on whether there is already \n"
+"for an outbound connection is selected with \"bids\". Each transport bids"
+" for \n"
+"the connection and the relative value of these bids assigns the priority."
+" \n"
+"Transports may reply with different bids, depending on whether there is "
+"already \n"
"an established connection to the peer."
-msgstr "I2P soporta simultáneamente varios tipos de transportes. Para conexiones de salida se selecciona un determinado tipo de transporte a través de \"pujas\". Cada tipo de transporte puja por la conexión y el valor relativo de esa puja asignará la prioridad. Los transportes pueden responder con varias apuestas, dependiendo de si ya hay una conexión establecida con el par."
+msgstr ""
+"I2P soporta simultáneamente varios tipos de transportes. Para conexiones "
+"de salida se selecciona un determinado tipo de transporte a través de "
+"\"pujas\". Cada tipo de transporte puja por la conexión y el valor "
+"relativo de esa puja asignará la prioridad. Los transportes pueden "
+"responder con varias apuestas, dependiendo de si ya hay una conexión "
+"establecida con el par."
#: i2p2www/pages/site/docs/how/tech-intro.html:450
#, python-format
msgid ""
"The current implementation ranks NTCP as the highest-priority transport \n"
-"for outbound connections in most situations. SSU is enabled for both outbound \n"
-"and inbound connections. Your firewall and your I2P router must be configured \n"
-"to allow inbound NTCP connections. For further information see the NTCP \n"
+"for outbound connections in most situations. SSU is enabled for both "
+"outbound \n"
+"and inbound connections. Your firewall and your I2P router must be "
+"configured \n"
+"to allow inbound NTCP connections. For further information see the NTCP \n"
"page."
-msgstr "La implementación actual clasifica en la mayoría de las situaciones a NTPC como el sistema de transporte de mayor prioridad para conexiones de salida. SSU está activo para las conexiones de entrada y de salida. Su cortafuegos y su ruter I2P tienen estar configurados para permitir conexiones de entrada NTCP. Para más información vea la ṕagina de NTCP."
+msgstr ""
+"La implementación actual clasifica en la mayoría de las situaciones a "
+"NTPC como el sistema de transporte de mayor prioridad para conexiones de "
+"salida. SSU está activo para las conexiones de entrada y de salida. Su "
+"cortafuegos y su ruter I2P tienen estar configurados para permitir "
+"conexiones de entrada NTCP. Para más información vea la ṕagina de NTCP."
#: i2p2www/pages/site/docs/how/tech-intro.html:459
msgid ""
"A bare minimum set of cryptographic primitives are combined together to \n"
-"provide I2P's layered defenses against a variety of adversaries. At the lowest \n"
-"level, inter router communication is protected by the transport layer security \n"
-"- SSU encrypts each packet with AES256/CBC with both an explicit IV and MAC \n"
-"(HMAC-MD5-128) after agreeing upon an ephemeral session key through a 2048bit \n"
-"Diffie-Hellman exchange, station-to-station authentication with the other \n"
-"router's DSA key, plus each network message has their own hash for local integrity \n"
-"checking. Tunnel messages passed over the transports \n"
-"have their own layered AES256/CBC encryption with an explicit IV and verified \n"
-"at the tunnel endpoint with an additional SHA256 hash. Various other messages \n"
-"are passed along inside \"garlic messages\", which are encrypted with ElGamal/AES+SessionTags \n"
+"provide I2P's layered defenses against a variety of adversaries. At the "
+"lowest \n"
+"level, inter router communication is protected by the transport layer "
+"security \n"
+"- SSU encrypts each packet with AES256/CBC with both an explicit IV and "
+"MAC \n"
+"(HMAC-MD5-128) after agreeing upon an ephemeral session key through a "
+"2048bit \n"
+"Diffie-Hellman exchange, station-to-station authentication with the other"
+" \n"
+"router's DSA key, plus each network message has their own hash for local "
+"integrity \n"
+"checking. Tunnel messages passed over the "
+"transports \n"
+"have their own layered AES256/CBC encryption with an explicit IV and "
+"verified \n"
+"at the tunnel endpoint with an additional SHA256 hash. Various other "
+"messages \n"
+"are passed along inside \"garlic messages\", which are encrypted with "
+"ElGamal/AES+SessionTags \n"
"(explained below)."
-msgstr "Un conjunto mínimo de cifrados son combinados para proveer a I2P defensas contra varios adversarios. En el nivel más bajo la comunicación entre ruters es protegida por la capa de seguridad de transporte - SSU cifra cada paquete con AES256/CBC incluyendo un IV explícito y MAC (HMAC-MD5-128), después de haber acordado una clave de sesión efímera a través de un intercambio Diffie-Hellman de 2048bit, autenticación de estación a estación con la clave DSA de los otros ruters, y además cada mensaje de red tiene su propio hash para comprobar la integridad local. Los mensajes de túnel ya transportados tienen su propio cifrado por capas AES256/CBC con un IV explícito verificado en el punto final del túnel con un hash adicional SHA256. Otros ciertos mensajes son pasados dentro del \"mensaje garlic\" y son cifrados con ElGamal/AES+Etiquetas de sesión (explicado más abajo)."
+msgstr ""
+"Un conjunto mínimo de cifrados son combinados para proveer a I2P defensas"
+" contra varios adversarios. En el nivel más bajo la comunicación entre "
+"ruters es protegida por la capa de seguridad de transporte - SSU cifra "
+"cada paquete con AES256/CBC incluyendo un IV explícito y MAC (HMAC-"
+"MD5-128), después de haber acordado una clave de sesión efímera a través "
+"de un intercambio Diffie-Hellman de 2048bit, autenticación de estación a "
+"estación con la clave DSA de los otros ruters, y además cada mensaje de "
+"red tiene su propio hash para comprobar la integridad local. Los mensajes"
+" de túnel ya transportados tienen su propio "
+"cifrado por capas AES256/CBC con un IV explícito verificado en el punto "
+"final del túnel con un hash adicional SHA256. Otros ciertos mensajes son "
+"pasados dentro del \"mensaje garlic\" y son cifrados con "
+"ElGamal/AES+Etiquetas de sesión (explicado más abajo)."
#: i2p2www/pages/site/docs/how/tech-intro.html:474
msgid "Garlic messages"
@@ -8678,33 +13886,78 @@ msgstr "Mensajes Garlic"
#: i2p2www/pages/site/docs/how/tech-intro.html:475
msgid ""
-"Garlic messages are an extension of \"onion\" layered encryption, allowing \n"
-"the contents of a single message to contain multiple \"cloves\" - fully formed \n"
-"messages alongside their own instructions for delivery. Messages are wrapped \n"
-"into a garlic message whenever the message would otherwise be passing in cleartext \n"
-"through a peer who should not have access to the information - for instance, \n"
-"when a router wants to ask another router to participate in a tunnel, they \n"
-"wrap the request inside a garlic, encrypt that garlic to the receiving router's \n"
-"2048bit ElGamal public key, and forward it through a tunnel. Another example \n"
-"is when a client wants to send a message to a destination - the sender's router \n"
-"will wrap up that data message (alongside some other messages) into a garlic, \n"
-"encrypt that garlic to the 2048bit ElGamal public key published in the recipient's \n"
+"Garlic messages are an extension of \"onion\" layered encryption, "
+"allowing \n"
+"the contents of a single message to contain multiple \"cloves\" - fully "
+"formed \n"
+"messages alongside their own instructions for delivery. Messages are "
+"wrapped \n"
+"into a garlic message whenever the message would otherwise be passing in "
+"cleartext \n"
+"through a peer who should not have access to the information - for "
+"instance, \n"
+"when a router wants to ask another router to participate in a tunnel, "
+"they \n"
+"wrap the request inside a garlic, encrypt that garlic to the receiving "
+"router's \n"
+"2048bit ElGamal public key, and forward it through a tunnel. Another "
+"example \n"
+"is when a client wants to send a message to a destination - the sender's "
+"router \n"
+"will wrap up that data message (alongside some other messages) into a "
+"garlic, \n"
+"encrypt that garlic to the 2048bit ElGamal public key published in the "
+"recipient's \n"
"leaseSet, and forward it through the appropriate tunnels."
-msgstr "Los mensajes Garlic son una extensión de la capa de cifrado \"onion\", permitiendo que el contenido de un simple mensaje contenga múltiples \"dientes\" - mensajes formados completamente y con sus propias instrucciones para el envío. Los mensajes son envueltos dentro de un mensaje Garlic ya que de otra forma deberían enviarse en texto plano a través de un par que no tiene que por que tener acceso a esa información - por ejemplo, cuando un ruter quiere preguntar a otro ruter si participa en un túnel, envuelven la solicitud dentro del garlic, y lo envían a través de un túnel. Otro ejemplo es cuando un cliente quiere enviar un mensaje a una destinación - el ruter del remitente envolverá los datos del mensaje (junto con otros mensajes) dentro de un garlic, cifrará ese garlic con la clave pública de 2048bit ElGamal publicada en el leaseSet del beneficiario, y lo enviará a través de los túneles apropiados."
+msgstr ""
+"Los mensajes Garlic son una extensión de la capa de cifrado \"onion\", "
+"permitiendo que el contenido de un simple mensaje contenga múltiples "
+"\"dientes\" - mensajes formados completamente y con sus propias "
+"instrucciones para el envío. Los mensajes son envueltos dentro de un "
+"mensaje Garlic ya que de otra forma deberían enviarse en texto plano a "
+"través de un par que no tiene que por que tener acceso a esa información "
+"- por ejemplo, cuando un ruter quiere preguntar a otro ruter si participa"
+" en un túnel, envuelven la solicitud dentro del garlic, y lo envían a "
+"través de un túnel. Otro ejemplo es cuando un cliente quiere enviar un "
+"mensaje a una destinación - el ruter del remitente envolverá los datos "
+"del mensaje (junto con otros mensajes) dentro de un garlic, cifrará ese "
+"garlic con la clave pública de 2048bit ElGamal publicada en el leaseSet "
+"del beneficiario, y lo enviará a través de los túneles apropiados."
#: i2p2www/pages/site/docs/how/tech-intro.html:490
msgid ""
-"The \"instructions\" attached to each clove inside the encryption layer includes \n"
-"the ability to request that the clove be forwarded locally, to a remote router, \n"
-"or to a remote tunnel on a remote router. There are fields in those instructions \n"
-"allowing a peer to request that the delivery be delayed until a certain time \n"
-"or condition has been met, though they won't be honored until the nontrivial \n"
-"delays are deployed. It is possible to explicitly route garlic messages \n"
-"any number of hops without building tunnels, or even to reroute tunnel messages \n"
-"by wrapping them in garlic messages and forwarding them a number of hops prior \n"
-"to delivering them to the next hop in the tunnel, but those techniques are \n"
+"The \"instructions\" attached to each clove inside the encryption layer "
+"includes \n"
+"the ability to request that the clove be forwarded locally, to a remote "
+"router, \n"
+"or to a remote tunnel on a remote router. There are fields in those "
+"instructions \n"
+"allowing a peer to request that the delivery be delayed until a certain "
+"time \n"
+"or condition has been met, though they won't be honored until the nontrivial \n"
+"delays are deployed. It is possible to explicitly route garlic "
+"messages \n"
+"any number of hops without building tunnels, or even to reroute tunnel "
+"messages \n"
+"by wrapping them in garlic messages and forwarding them a number of hops "
+"prior \n"
+"to delivering them to the next hop in the tunnel, but those techniques "
+"are \n"
"not currently used in the existing implementation."
-msgstr "Las \"instrucciones\" adjuntas a cada diente, 'clove', dentro de la capa de cifrado incluyen la habilidad de solicitar que el diente sea enviado localmente a un ruter remoto, o a un túnel remoto en un ruter remoto. Hay campos en esas instrucciones que permiten a un par solicitar que el envío sea retrasado un cierto tiempo o hasta que se cumpla cierta condición, pero no funcionará hasta que los retardos no triviales funcionen en estas versiones. Es posible enrutar explícitamente mensajes garlic de cualquier número de saltos sin construir túneles, o incluso re enrutar mensajes de túnel envolviéndolos en un mensaje garlic y enviándolos por unos cuantos saltos antes de enviarlos al siguiente salto en el túnel, pero estas técnicas no se usan en en las implementaciones existentes."
+msgstr ""
+"Las \"instrucciones\" adjuntas a cada diente, 'clove', dentro de la capa "
+"de cifrado incluyen la habilidad de solicitar que el diente sea enviado "
+"localmente a un ruter remoto, o a un túnel remoto en un ruter remoto. Hay"
+" campos en esas instrucciones que permiten a un par solicitar que el "
+"envío sea retrasado un cierto tiempo o hasta que se cumpla cierta "
+"condición, pero no funcionará hasta que los retardos no triviales funcionen en "
+"estas versiones. Es posible enrutar explícitamente mensajes garlic de "
+"cualquier número de saltos sin construir túneles, o incluso re enrutar "
+"mensajes de túnel envolviéndolos en un mensaje garlic y enviándolos por "
+"unos cuantos saltos antes de enviarlos al siguiente salto en el túnel, "
+"pero estas técnicas no se usan en en las implementaciones existentes."
#: i2p2www/pages/site/docs/how/tech-intro.html:503
msgid "Session tags"
@@ -8712,37 +13965,82 @@ msgstr "Etiquetas de sesión"
#: i2p2www/pages/site/docs/how/tech-intro.html:504
msgid ""
-"As an unreliable, unordered, message based system, I2P uses a simple combination \n"
-"of asymmetric and symmetric encryption algorithms to provide data confidentiality \n"
-"and integrity to garlic messages. As a whole, the combination is referred \n"
-"to as ElGamal/AES+SessionTags, but that is an excessively verbose way to describe \n"
+"As an unreliable, unordered, message based system, I2P uses a simple "
+"combination \n"
+"of asymmetric and symmetric encryption algorithms to provide data "
+"confidentiality \n"
+"and integrity to garlic messages. As a whole, the combination is referred"
+" \n"
+"to as ElGamal/AES+SessionTags, but that is an excessively verbose way to "
+"describe \n"
"the simple use of 2048bit ElGamal, AES256, SHA256 and 32 byte nonces."
-msgstr "Como un sistema basado en mensajes no ordenados y no fiables , I2P usa una simple combinación de algoritmos de cifrado simétricos y asimétricos para proporcionar la confidencialidad de los datos y la integridad de los mensajes garlic. En conjunto, a la combinación se le llama ElGamal/AES+Etiquetas de sesión, pero es una forma excesivamente larga de describir el uso del 2048bit ElGamal, AES256, SHA256 y nonces de 32 bytes."
+msgstr ""
+"Como un sistema basado en mensajes no ordenados y no fiables , I2P usa "
+"una simple combinación de algoritmos de cifrado simétricos y asimétricos "
+"para proporcionar la confidencialidad de los datos y la integridad de los"
+" mensajes garlic. En conjunto, a la combinación se le llama "
+"ElGamal/AES+Etiquetas de sesión, pero es una forma excesivamente larga de"
+" describir el uso del 2048bit ElGamal, AES256, SHA256 y nonces de 32 "
+"bytes."
#: i2p2www/pages/site/docs/how/tech-intro.html:543
msgid ""
-"Session tags themselves have a very short lifetime, after which they are \n"
-"discarded if not used. In addition, the quantity stored for each key is limited, \n"
-"as are the number of keys themselves - if too many arrive, either new or old \n"
-"messages may be dropped. The sender keeps track whether messages using session \n"
-"tags are getting through, and if there isn't sufficient communication it may \n"
-"drop the ones previously assumed to be properly delivered, reverting back \n"
+"Session tags themselves have a very short lifetime, after which they are"
+" \n"
+"discarded if not used. In addition, the quantity stored for each key is "
+"limited, \n"
+"as are the number of keys themselves - if too many arrive, either new or "
+"old \n"
+"messages may be dropped. The sender keeps track whether messages using "
+"session \n"
+"tags are getting through, and if there isn't sufficient communication it "
+"may \n"
+"drop the ones previously assumed to be properly delivered, reverting back"
+" \n"
"to the full expensive ElGamal encryption."
-msgstr "Las etiquetas de sesión tienen un vida muy corta, después de la cual son descartadas y no se usan más. Además, el número almacenado de ellas por cada clave es limitado, como también está limitado el número de claves - si llegan demasiadas, serán descartados los mensajes nuevos o los viejos. El remitente lleva el seguimiento de los mensajes con etiquetas de sesión que pasan a través suyo, y si no hay comunicación suficiente podría descartar los mensajes supuestamente enviados correctamente, volviendo al costoso cifrado ElGamal."
+msgstr ""
+"Las etiquetas de sesión tienen un vida muy corta, después de la cual son "
+"descartadas y no se usan más. Además, el número almacenado de ellas por "
+"cada clave es limitado, como también está limitado el número de claves - "
+"si llegan demasiadas, serán descartados los mensajes nuevos o los viejos."
+" El remitente lleva el seguimiento de los mensajes con etiquetas de "
+"sesión que pasan a través suyo, y si no hay comunicación suficiente "
+"podría descartar los mensajes supuestamente enviados correctamente, "
+"volviendo al costoso cifrado ElGamal."
#: i2p2www/pages/site/docs/how/tech-intro.html:553
msgid ""
-"One alternative is to transmit only a single session tag, and from that, \n"
-"seed a deterministic PRNG for determining what tags to use or expect. By keeping \n"
-"this PRNG roughly synchronized between the sender and recipient (the recipient \n"
-"precomputes a window of the next e.g. 50 tags), the overhead of periodically \n"
-"bundling a large number of tags is removed, allowing more options in the space/time \n"
-"tradeoff, and perhaps reducing the number of ElGamal encryptions necessary. \n"
-"However, it would depend upon the strength of the PRNG to provide the necessary \n"
-"cover against internal adversaries, though perhaps by limiting the amount \n"
-"of times each PRNG is used, any weaknesses can be minimized. At the moment, \n"
+"One alternative is to transmit only a single session tag, and from that,"
+" \n"
+"seed a deterministic PRNG for determining what tags to use or expect. By "
+"keeping \n"
+"this PRNG roughly synchronized between the sender and recipient (the "
+"recipient \n"
+"precomputes a window of the next e.g. 50 tags), the overhead of "
+"periodically \n"
+"bundling a large number of tags is removed, allowing more options in the "
+"space/time \n"
+"tradeoff, and perhaps reducing the number of ElGamal encryptions "
+"necessary. \n"
+"However, it would depend upon the strength of the PRNG to provide the "
+"necessary \n"
+"cover against internal adversaries, though perhaps by limiting the amount"
+" \n"
+"of times each PRNG is used, any weaknesses can be minimized. At the "
+"moment, \n"
"there are no immediate plans to move towards these synchronized PRNGs."
-msgstr "Una alternativa sería transmitir sólo una etiqueta de sesión, y desde ahí sembrar un PRNG determinista para determinar que etiquetas usar o esperar. Manteniendo este PRNG bien sincronizado entre el remitente y el receptor (el receptor precalcula por ejemplo las siguiente 50 etiquetas) se evita la saturación de tener que calcular un gran número de etiquetas, permitiendo más opciones en ese espacio/tiempo de intercambio, y quizás reduciendo el número de cifrados necesarios de ElGamal. Sin embargo, dependerá de la fortaleza de PRNG de proteger contra adversarios internos, quizás limitando las veces que se usa cada PRNG se podrían limitar las debilidades. Hasta el momento no hay planes inmediatos para cambiar a estos PRNGs sincronizados."
+msgstr ""
+"Una alternativa sería transmitir sólo una etiqueta de sesión, y desde ahí"
+" sembrar un PRNG determinista para determinar que etiquetas usar o "
+"esperar. Manteniendo este PRNG bien sincronizado entre el remitente y el "
+"receptor (el receptor precalcula por ejemplo las siguiente 50 etiquetas) "
+"se evita la saturación de tener que calcular un gran número de etiquetas,"
+" permitiendo más opciones en ese espacio/tiempo de intercambio, y quizás "
+"reduciendo el número de cifrados necesarios de ElGamal. Sin embargo, "
+"dependerá de la fortaleza de PRNG de proteger contra adversarios "
+"internos, quizás limitando las veces que se usa cada PRNG se podrían "
+"limitar las debilidades. Hasta el momento no hay planes inmediatos para "
+"cambiar a estos PRNGs sincronizados."
#: i2p2www/pages/site/docs/how/tech-intro.html:566
msgid "Future"
@@ -8750,10 +14048,17 @@ msgstr "El futuro"
#: i2p2www/pages/site/docs/how/tech-intro.html:567
msgid ""
-"While I2P is currently functional and sufficient for many scenarios, there \n"
-"are several areas which require further improvement to meet the needs of those \n"
-"facing more powerful adversaries as well as substantial user experience optimization."
-msgstr "Mientras que I2P es suficientemente funcional en mucho escenarios, hay varias áreas en las que requiere mejoras, como cubrir las necesidades de aquellos que se enfrentan a adversarios poderosos o mejorar la experiencia del usuario."
+"While I2P is currently functional and sufficient for many scenarios, "
+"there \n"
+"are several areas which require further improvement to meet the needs of "
+"those \n"
+"facing more powerful adversaries as well as substantial user experience "
+"optimization."
+msgstr ""
+"Mientras que I2P es suficientemente funcional en mucho escenarios, hay "
+"varias áreas en las que requiere mejoras, como cubrir las necesidades de "
+"aquellos que se enfrentan a adversarios poderosos o mejorar la "
+"experiencia del usuario."
#: i2p2www/pages/site/docs/how/tech-intro.html:573
msgid "Restricted route operation"
@@ -8761,66 +14066,159 @@ msgstr "Funcionamiento restringido del ruter"
#: i2p2www/pages/site/docs/how/tech-intro.html:574
msgid ""
-"I2P is an overlay network designed to be run on top of a functional packet \n"
-"switched network, exploiting the end to end principle to offer anonymity and \n"
-"security. While the Internet no longer fully embraces the end to end principle\n"
+"I2P is an overlay network designed to be run on top of a functional "
+"packet \n"
+"switched network, exploiting the end to end principle to offer anonymity "
+"and \n"
+"security. While the Internet no longer fully embraces the end to end "
+"principle\n"
"(due to the usage of NAT), \n"
-"I2P does require a substantial portion of the network to be reachable - there \n"
-"may be a number of peers along the edges running using restricted routes, \n"
-"but I2P does not include an appropriate routing algorithm for the degenerate \n"
-"case where most peers are unreachable. It would, however work on top of a \n"
+"I2P does require a substantial portion of the network to be reachable - "
+"there \n"
+"may be a number of peers along the edges running using restricted routes,"
+" \n"
+"but I2P does not include an appropriate routing algorithm for the "
+"degenerate \n"
+"case where most peers are unreachable. It would, however work on top of a"
+" \n"
"network employing such an algorithm."
-msgstr "I2P es una red designada para ejecutarse sobre una red conmutada de paquetes funcionales, usando el principio de fin a fin para ofrecer anonimato y seguridad. Mientras que Internet ya no abraza el principio de fin a fin (por el uso de NAT), I2P necesita tener a su disposición una gran parte de la red - puede haber algunos pares ejecutándose en los bordes usando ruters restringidos no accesibles, pero I2P no incluye un algoritmo apropiado de enrutamiento para el extraño caso de que la mayoría de los pares no sean accesibles. Aún así podría funcionar sobre una red que utilizase dicho algoritmo."
+msgstr ""
+"I2P es una red designada para ejecutarse sobre una red conmutada de "
+"paquetes funcionales, usando el principio de fin a fin para ofrecer "
+"anonimato y seguridad. Mientras que Internet ya no abraza el principio de"
+" fin a fin (por el uso de NAT), I2P necesita tener a su disposición una "
+"gran parte de la red - puede haber algunos pares ejecutándose en los "
+"bordes usando ruters restringidos no accesibles, pero I2P no incluye un "
+"algoritmo apropiado de enrutamiento para el extraño caso de que la "
+"mayoría de los pares no sean accesibles. Aún así podría funcionar sobre "
+"una red que utilizase dicho algoritmo."
#: i2p2www/pages/site/docs/how/tech-intro.html:586
msgid ""
-"Restricted route operation, where there are limits to what peers are reachable \n"
-"directly, has several different functional and anonymity implications, dependent \n"
-"upon how the restricted routes are handled. At the most basic level, restricted \n"
-"routes exist when a peer is behind a NAT or firewall which does not allow \n"
-"inbound connections. This was largely addressed in I2P 0.6.0.6 by integrating \n"
-"distributed hole punching into the transport layer, allowing people behind \n"
-"most NATs and firewalls to receive unsolicited connections without any configuration. \n"
-"However, this does not limit the exposure of the peer's IP address to routers \n"
-"inside the network, as they can simply get introduced to the peer through \n"
+"Restricted route operation, where there are limits to what peers are "
+"reachable \n"
+"directly, has several different functional and anonymity implications, "
+"dependent \n"
+"upon how the restricted routes are handled. At the most basic level, "
+"restricted \n"
+"routes exist when a peer is behind a NAT or firewall which does not allow"
+" \n"
+"inbound connections. This was largely addressed in I2P 0.6.0.6 by "
+"integrating \n"
+"distributed hole punching into the transport layer, allowing people "
+"behind \n"
+"most NATs and firewalls to receive unsolicited connections without any "
+"configuration. \n"
+"However, this does not limit the exposure of the peer's IP address to "
+"routers \n"
+"inside the network, as they can simply get introduced to the peer through"
+" \n"
"the published introducer."
-msgstr "El funcionamiento restringido del ruter, donde hay límites en el número de ruters que son accesibles directamente, tiene varias funciones e implicaciones en el anonimato dependiendo do como sean manejados los ruters restringidos. En el nivel más básico los ruters restringidos existen cuando un par está tras un NAT o cortafuegos que no permiten conexiones entrantes. Esto fue solucionado en I2P 0.6.0.6 al integrar \"perforación\" distribuida en la capa de transporte, permitiendo a la gente tras NATs o cortafuegos recibir conexiones no solicitadas sin ninguna configuración. Aún así esto no limita la exposición de la IP de lo pares a los ruters dentro de la red, ya que estos pueden presentarse a sí mismos al par a través del introductor ya publicado."
+msgstr ""
+"El funcionamiento restringido del ruter, donde hay límites en el número "
+"de ruters que son accesibles directamente, tiene varias funciones e "
+"implicaciones en el anonimato dependiendo do como sean manejados los "
+"ruters restringidos. En el nivel más básico los ruters restringidos "
+"existen cuando un par está tras un NAT o cortafuegos que no permiten "
+"conexiones entrantes. Esto fue solucionado en I2P 0.6.0.6 al integrar "
+"\"perforación\" distribuida en la capa de transporte, permitiendo a la "
+"gente tras NATs o cortafuegos recibir conexiones no solicitadas sin "
+"ninguna configuración. Aún así esto no limita la exposición de la IP de "
+"lo pares a los ruters dentro de la red, ya que estos pueden presentarse a"
+" sí mismos al par a través del introductor ya publicado."
#: i2p2www/pages/site/docs/how/tech-intro.html:599
msgid ""
-"Beyond the functional handling of restricted routes, there are two levels \n"
-"of restricted operation that can be used to limit the exposure of one's IP \n"
-"address - using router-specific tunnels for communication, and offering 'client \n"
-"routers'. For the former, routers can either build a new pool of tunnels or \n"
-"reuse their exploratory pool, publishing the inbound gateways to some of them \n"
-"as part of their routerInfo in place of their transport addresses. When a \n"
-"peer wants to get in touch with them, they see those tunnel gateways in the \n"
-"netDb and simply send the relevant message to them through one of the published \n"
-"tunnels. If the peer behind the restricted route wants to reply, it may do \n"
-"so either directly (if they are willing to expose their IP to the peer) or \n"
-"indirectly through their outbound tunnels. When the routers that the peer \n"
-"has direct connections to want to reach it (to forward tunnel messages, for \n"
-"instance), they simply prioritize their direct connection over the published \n"
-"tunnel gateway. The concept of 'client routers' simply extends the restricted \n"
-"route by not publishing any router addresses. Such a router would not even \n"
-"need to publish their routerInfo in the netDb, merely providing their self \n"
-"signed routerInfo to the peers that it contacts (necessary to pass the router's \n"
-"public keys). Both levels of restricted route operation are planned for I2P \n"
+"Beyond the functional handling of restricted routes, there are two levels"
+" \n"
+"of restricted operation that can be used to limit the exposure of one's "
+"IP \n"
+"address - using router-specific tunnels for communication, and offering "
+"'client \n"
+"routers'. For the former, routers can either build a new pool of tunnels "
+"or \n"
+"reuse their exploratory pool, publishing the inbound gateways to some of "
+"them \n"
+"as part of their routerInfo in place of their transport addresses. When a"
+" \n"
+"peer wants to get in touch with them, they see those tunnel gateways in "
+"the \n"
+"netDb and simply send the relevant message to them through one of the "
+"published \n"
+"tunnels. If the peer behind the restricted route wants to reply, it may "
+"do \n"
+"so either directly (if they are willing to expose their IP to the peer) "
+"or \n"
+"indirectly through their outbound tunnels. When the routers that the peer"
+" \n"
+"has direct connections to want to reach it (to forward tunnel messages, "
+"for \n"
+"instance), they simply prioritize their direct connection over the "
+"published \n"
+"tunnel gateway. The concept of 'client routers' simply extends the "
+"restricted \n"
+"route by not publishing any router addresses. Such a router would not "
+"even \n"
+"need to publish their routerInfo in the netDb, merely providing their "
+"self \n"
+"signed routerInfo to the peers that it contacts (necessary to pass the "
+"router's \n"
+"public keys). Both levels of restricted route operation are planned for "
+"I2P \n"
"2.0."
-msgstr "Más allá del manejo funcional de ruters restringidos hay 2 niveles de operaciones restringidas que pueden usarse para limitar la exposición de la dirección IP - usando túneles específicos para la comunicación y ofreciendo 'ruters cliente'. En el primer caso, los ruters pueden, o construir un nuevo conjunto de túneles o reutilizar su conjunto de túneles publicando la gateway de entrada a algunos de ellos como parte de su routerInfo en lugar de su dirección de transporte. Cuando un par quiere ponerse en contacto con él, puede ver esas puertas de salida de los túneles en la netDb y simplemente enviar el mensaje a través de uno de los túneles publicados. Si el par detrás del ruter restringido quiere conectarse, puede hacerlo directamente (si desea exponer su IP al otro par) o indirectamente a trabés de sus túneles de salida. Cuando los ruters con los tienen conexión directa quieren contactarlo (por ejemplo para enviar mensajes de túnel), simplemente prioriza su conexión directa sobre la puerta la puerta de salida del túnel ya publicada. El concepto de 'ruters cliente' simplemente amplía la ruta restringida no publicando ninguna dirección de ruter. Este tipo de ruters ni siquiera necesita publicar si routerInfo en la netDb, simplemente proveyendo su routerInfo firmado por sí mismo al par con el que contacta (esto es necesario para pasar las claves públicas del ruter). Ambos niveles de operaciones restringidas del ruter están planeadas para la versión 2.0 de I2P."
+msgstr ""
+"Más allá del manejo funcional de ruters restringidos hay 2 niveles de "
+"operaciones restringidas que pueden usarse para limitar la exposición de "
+"la dirección IP - usando túneles específicos para la comunicación y "
+"ofreciendo 'ruters cliente'. En el primer caso, los ruters pueden, o "
+"construir un nuevo conjunto de túneles o reutilizar su conjunto de "
+"túneles publicando la gateway de entrada a algunos de ellos como parte de"
+" su routerInfo en lugar de su dirección de transporte. Cuando un par "
+"quiere ponerse en contacto con él, puede ver esas puertas de salida de "
+"los túneles en la netDb y simplemente enviar el mensaje a través de uno "
+"de los túneles publicados. Si el par detrás del ruter restringido quiere "
+"conectarse, puede hacerlo directamente (si desea exponer su IP al otro "
+"par) o indirectamente a trabés de sus túneles de salida. Cuando los "
+"ruters con los tienen conexión directa quieren contactarlo (por ejemplo "
+"para enviar mensajes de túnel), simplemente prioriza su conexión directa "
+"sobre la puerta la puerta de salida del túnel ya publicada. El concepto "
+"de 'ruters cliente' simplemente amplía la ruta restringida no publicando "
+"ninguna dirección de ruter. Este tipo de ruters ni siquiera necesita "
+"publicar si routerInfo en la netDb, simplemente proveyendo su routerInfo "
+"firmado por sí mismo al par con el que contacta (esto es necesario para "
+"pasar las claves públicas del ruter). Ambos niveles de operaciones "
+"restringidas del ruter están planeadas para la versión 2.0 de I2P."
#: i2p2www/pages/site/docs/how/tech-intro.html:621
msgid ""
-"There are tradeoffs for those behind restricted routes, as they would likely \n"
-"participate in other people's tunnels less frequently, and the routers which \n"
-"they are connected to would be able to infer traffic patterns that would not \n"
-"otherwise be exposed. On the other hand, if the cost of that exposure is less \n"
-"than the cost of an IP being made available, it may be worthwhile. This, of \n"
-"course, assumes that the peers that the router behind a restricted route contacts \n"
-"are not hostile - either the network is large enough that the probability \n"
-"of using a hostile peer to get connected is small enough, or trusted (and \n"
+"There are tradeoffs for those behind restricted routes, as they would "
+"likely \n"
+"participate in other people's tunnels less frequently, and the routers "
+"which \n"
+"they are connected to would be able to infer traffic patterns that would "
+"not \n"
+"otherwise be exposed. On the other hand, if the cost of that exposure is "
+"less \n"
+"than the cost of an IP being made available, it may be worthwhile. This, "
+"of \n"
+"course, assumes that the peers that the router behind a restricted route "
+"contacts \n"
+"are not hostile - either the network is large enough that the probability"
+" \n"
+"of using a hostile peer to get connected is small enough, or trusted (and"
+" \n"
"perhaps temporary) peers are used instead."
-msgstr "Existen inconvenientes para aquellos detrás de ruters restringidos ya que participarán menos frecuentemente en los túneles de otra gente, y los ruters a los que está conectado podrían ser capaces de descubrir patrones en el tráfico que de otra forma no podrían verse. Por otro lado, si el coste de exponer esos patrones es menor que el coste de de hacer que la IP esté disponible, puede valer la pena. Esto, por supuesto, suponiendo que los pares de los ruters con los que contacta el ruter restringido no son hostiles - o por que la red es suficientemente grande como para que la probabilidad de conectarse a un ruter hostil sea muy pequela, o porque se usan pares de confianza (y quizás temporales)."
+msgstr ""
+"Existen inconvenientes para aquellos detrás de ruters restringidos ya que"
+" participarán menos frecuentemente en los túneles de otra gente, y los "
+"ruters a los que está conectado podrían ser capaces de descubrir patrones"
+" en el tráfico que de otra forma no podrían verse. Por otro lado, si el "
+"coste de exponer esos patrones es menor que el coste de de hacer que la "
+"IP esté disponible, puede valer la pena. Esto, por supuesto, suponiendo "
+"que los pares de los ruters con los que contacta el ruter restringido no "
+"son hostiles - o por que la red es suficientemente grande como para que "
+"la probabilidad de conectarse a un ruter hostil sea muy pequela, o porque"
+" se usan pares de confianza (y quizás temporales)."
#: i2p2www/pages/site/docs/how/tech-intro.html:633
msgid "Variable latency"
@@ -8828,30 +14226,68 @@ msgstr "Latencia variable"
#: i2p2www/pages/site/docs/how/tech-intro.html:634
msgid ""
-"Even though the bulk of I2P's initial efforts have been on low latency communication, \n"
-"it was designed with variable latency services in mind from the beginning. \n"
-"At the most basic level, applications running on top of I2P can offer the \n"
-"anonymity of medium and high latency communication while still blending their \n"
-"traffic patterns in with low latency traffic. Internally though, I2P can offer \n"
-"its own medium and high latency communication through the garlic encryption \n"
-"- specifying that the message should be sent after a certain delay, at a certain \n"
-"time, after a certain number of messages have passed, or another mix strategy. \n"
-"With the layered encryption, only the router that the clove exposed the delay \n"
-"request would know that the message requires high latency, allowing the traffic \n"
-"to blend in further with the low latency traffic. Once the transmission precondition \n"
-"is met, the router holding on to the clove (which itself would likely be a \n"
-"garlic message) simply forwards it as requested - to a router, to a tunnel, \n"
+"Even though the bulk of I2P's initial efforts have been on low latency "
+"communication, \n"
+"it was designed with variable latency services in mind from the "
+"beginning. \n"
+"At the most basic level, applications running on top of I2P can offer the"
+" \n"
+"anonymity of medium and high latency communication while still blending "
+"their \n"
+"traffic patterns in with low latency traffic. Internally though, I2P can "
+"offer \n"
+"its own medium and high latency communication through the garlic "
+"encryption \n"
+"- specifying that the message should be sent after a certain delay, at a "
+"certain \n"
+"time, after a certain number of messages have passed, or another mix "
+"strategy. \n"
+"With the layered encryption, only the router that the clove exposed the "
+"delay \n"
+"request would know that the message requires high latency, allowing the "
+"traffic \n"
+"to blend in further with the low latency traffic. Once the transmission "
+"precondition \n"
+"is met, the router holding on to the clove (which itself would likely be "
+"a \n"
+"garlic message) simply forwards it as requested - to a router, to a "
+"tunnel, \n"
"or, most likely, to a remote client destination."
-msgstr "Incluso aunque la mayoría de los esfuerzos iniciales han sido para que I2P tenga una comunicación de baja latencia, fue diseñado desde el principio para servicios de latencia variable. Al nivel más básico, las aplicaciones corriendo sobre I2P pueden ofrecer anonimato en comunicaciones de media y alta latencia mientras mezcla su tráfico con tráfico de baja latencia. Sin embargo, internamente I2P puede ofrecer sus comunicaciones de media y alta latencia a través de su cifrado garlic - especificando que el mensaje debe ser enviado después de un cierto retraso, en un determinado momento, después de que hayan pasado cierto número de mensajes o cualquier otra estrategia de mezclado. Con el cifrado por capas sólo el ruter que hizo la petición de retraso sabrá que el mensaje requiere alta latencia, permitiendo que el tráfico se mezcle más con el tráfico de baja latencia. Una vez que la condición de transmisión se cumple, el ruter que mantiene el 'clove' (que en sí mismo podría ser como un mensaje garlic) simplemente envía su petición - a un ruter, a un túnel, o, lo más probable, a una destinación cliente remota."
+msgstr ""
+"Incluso aunque la mayoría de los esfuerzos iniciales han sido para que "
+"I2P tenga una comunicación de baja latencia, fue diseñado desde el "
+"principio para servicios de latencia variable. Al nivel más básico, las "
+"aplicaciones corriendo sobre I2P pueden ofrecer anonimato en "
+"comunicaciones de media y alta latencia mientras mezcla su tráfico con "
+"tráfico de baja latencia. Sin embargo, internamente I2P puede ofrecer sus"
+" comunicaciones de media y alta latencia a través de su cifrado garlic - "
+"especificando que el mensaje debe ser enviado después de un cierto "
+"retraso, en un determinado momento, después de que hayan pasado cierto "
+"número de mensajes o cualquier otra estrategia de mezclado. Con el "
+"cifrado por capas sólo el ruter que hizo la petición de retraso sabrá que"
+" el mensaje requiere alta latencia, permitiendo que el tráfico se mezcle "
+"más con el tráfico de baja latencia. Una vez que la condición de "
+"transmisión se cumple, el ruter que mantiene el 'clove' (que en sí mismo "
+"podría ser como un mensaje garlic) simplemente envía su petición - a un "
+"ruter, a un túnel, o, lo más probable, a una destinación cliente remota."
#: i2p2www/pages/site/docs/how/tech-intro.html:651
msgid ""
-"There are a substantial number of ways to exploit this capacity for high \n"
-"latency comm in I2P, but for the moment, doing so has been scheduled for the \n"
-"I2P 3.0 release. In the meantime, those requiring the anonymity that high \n"
-"latency comm can offer should look towards the application layer to provide \n"
+"There are a substantial number of ways to exploit this capacity for high"
+" \n"
+"latency comm in I2P, but for the moment, doing so has been scheduled for "
+"the \n"
+"I2P 3.0 release. In the meantime, those requiring the anonymity that high"
+" \n"
+"latency comm can offer should look towards the application layer to "
+"provide \n"
"it."
-msgstr "Hay un número bastante grande de formas de explotar esta capacidad de comunicación de alta latencia en I2P, por el momento, hacerlo se ha postergado hasta la versión 3.0 de I2P. Mientras tanto, aquellos que requieran el anonimato que las comunicaciones de alta latencia pueden ofrecer deben mirar en la capa de aplicación para obtenerlo. "
+msgstr ""
+"Hay un número bastante grande de formas de explotar esta capacidad de "
+"comunicación de alta latencia en I2P, por el momento, hacerlo se ha "
+"postergado hasta la versión 3.0 de I2P. Mientras tanto, aquellos que "
+"requieran el anonimato que las comunicaciones de alta latencia pueden "
+"ofrecer deben mirar en la capa de aplicación para obtenerlo. "
#: i2p2www/pages/site/docs/how/tech-intro.html:659
msgid "Open questions"
@@ -8869,13 +14305,17 @@ msgstr "¿Podemos manejar más eficientemente las etiquetas de sesión?"
msgid ""
"What, if any, batching/mixing strategies should be made available on the "
"tunnels?"
-msgstr "¿Cuales, si hay alguna, estrategias de mezclado deberían estar disponibles en los túneles?"
+msgstr ""
+"¿Cuales, si hay alguna, estrategias de mezclado deberían estar "
+"disponibles en los túneles?"
#: i2p2www/pages/site/docs/how/tech-intro.html:664
msgid ""
"What other tunnel peer selection and ordering strategies should be "
"available?"
-msgstr "¿Qué otras estrategias de selección de túneles de pares deberian estar disponibles?"
+msgstr ""
+"¿Qué otras estrategias de selección de túneles de pares deberian estar "
+"disponibles?"
#: i2p2www/pages/site/docs/how/tech-intro.html:667
msgid "Similar systems"
@@ -8883,19 +14323,35 @@ msgstr "Sistemas similares"
#: i2p2www/pages/site/docs/how/tech-intro.html:669
msgid ""
-"I2P's architecture builds on the concepts of message oriented middleware, \n"
-"the topology of DHTs, the anonymity and cryptography of free route mixnets, \n"
-"and the adaptability of packet switched networking. The value comes not from \n"
-"novel concepts of algorithms though, but from careful engineering combining \n"
-"the research results of existing systems and papers. While there are a few \n"
-"similar efforts worth reviewing, both for technical and functional comparisons, \n"
+"I2P's architecture builds on the concepts of message oriented middleware,"
+" \n"
+"the topology of DHTs, the anonymity and cryptography of free route "
+"mixnets, \n"
+"and the adaptability of packet switched networking. The value comes not "
+"from \n"
+"novel concepts of algorithms though, but from careful engineering "
+"combining \n"
+"the research results of existing systems and papers. While there are a "
+"few \n"
+"similar efforts worth reviewing, both for technical and functional "
+"comparisons, \n"
"two in particular are pulled out here - Tor and Freenet."
-msgstr "La arquitectura de I2P está basada en el concepto de software orientado a mensajes, la topología de DHTs, el cifrado y anonimato de redes de mezcla libres, y la adaptabilidad de las redes conmutadas de paquetes. Su valor no reside en nuevos conceptos o algoritmos, sino en la cuidadosa combinación de resultados de investigación de trabajos y sistemas ya existentes. Mientras que hay varios esfuerzos similares a los que vale la pena echar un ojo, se han elegido 2 en particular para comparaciones técnicas y funcionales - Tor y Freenet."
+msgstr ""
+"La arquitectura de I2P está basada en el concepto de software orientado a"
+" mensajes, la topología de DHTs, el cifrado y anonimato de redes de "
+"mezcla libres, y la adaptabilidad de las redes conmutadas de paquetes. Su"
+" valor no reside en nuevos conceptos o algoritmos, sino en la cuidadosa "
+"combinación de resultados de investigación de trabajos y sistemas ya "
+"existentes. Mientras que hay varios esfuerzos similares a los que vale la"
+" pena echar un ojo, se han elegido 2 en particular para comparaciones "
+"técnicas y funcionales - Tor y Freenet."
#: i2p2www/pages/site/docs/how/tech-intro.html:679
#, python-format
msgid "See also the Network Comparisons Page."
-msgstr "Ver también la web de comparación entre redes."
+msgstr ""
+"Ver también la web de comparación entre "
+"redes."
#: i2p2www/pages/site/docs/how/tech-intro.html:684
#: i2p2www/pages/site/docs/how/tech-intro.html:749
@@ -8905,129 +14361,320 @@ msgstr "página web"
#: i2p2www/pages/site/docs/how/tech-intro.html:686
msgid ""
"At first glance, Tor and I2P have many functional and anonymity related \n"
-"similarities. While I2P's development began before we were aware of the early \n"
-"stage efforts on Tor, many of the lessons of the original onion routing and \n"
-"ZKS efforts were integrated into I2P's design. Rather than building an essentially \n"
-"trusted, centralized system with directory servers, I2P has a self organizing \n"
-"network database with each peer taking on the responsibility of profiling \n"
-"other routers to determine how best to exploit available resources. Another \n"
-"key difference is that while both I2P and Tor use layered and ordered paths \n"
-"(tunnels and circuits/streams), I2P is fundamentally a packet switched network, \n"
-"while Tor is fundamentally a circuit switched one, allowing I2P to transparently \n"
-"route around congestion or other network failures, operate redundant pathways, \n"
-"and load balance the data across available resources. While Tor offers the \n"
-"useful outproxy functionality by offering integrated outproxy discovery and \n"
-"selection, I2P leaves such application layer decisions up to applications \n"
-"running on top of I2P - in fact, I2P has even externalized the TCP-like streaming \n"
-"library itself to the application layer, allowing developers to experiment \n"
-"with different strategies, exploiting their domain specific knowledge to offer \n"
+"similarities. While I2P's development began before we were aware of the "
+"early \n"
+"stage efforts on Tor, many of the lessons of the original onion routing "
+"and \n"
+"ZKS efforts were integrated into I2P's design. Rather than building an "
+"essentially \n"
+"trusted, centralized system with directory servers, I2P has a self "
+"organizing \n"
+"network database with each peer taking on the responsibility of profiling"
+" \n"
+"other routers to determine how best to exploit available resources. "
+"Another \n"
+"key difference is that while both I2P and Tor use layered and ordered "
+"paths \n"
+"(tunnels and circuits/streams), I2P is fundamentally a packet switched "
+"network, \n"
+"while Tor is fundamentally a circuit switched one, allowing I2P to "
+"transparently \n"
+"route around congestion or other network failures, operate redundant "
+"pathways, \n"
+"and load balance the data across available resources. While Tor offers "
+"the \n"
+"useful outproxy functionality by offering integrated outproxy discovery "
+"and \n"
+"selection, I2P leaves such application layer decisions up to applications"
+" \n"
+"running on top of I2P - in fact, I2P has even externalized the TCP-like "
+"streaming \n"
+"library itself to the application layer, allowing developers to "
+"experiment \n"
+"with different strategies, exploiting their domain specific knowledge to "
+"offer \n"
"better performance."
-msgstr "A primera vista, Tor e I2P tienen muchas similitudes en lo que se refiere a funcionamiento y anonimato. Aunque I2P se empezó a desarrollar antes eramos conscientes de los esfuerzos hechos al inicio de Tor, muchas de las lecciones aprendidas de la red onion original y ZKS fueron integradas en el diseño de I2P. En vez de construir un sistema centralizado y de confianza con servidores de directorios, I2P tiene su propia base de datos de red auto organizable en la que cada par toma la responsabilidad de acceder al perfil de otros ruters para determinar como aprovechar los recursos disponibles. Otra diferencia básica es que mitras I2P y Tor usan rutas ordenadas y en capas (túneles y circuitos/streams), I2P es fundamentalmente una red conmutada de paquetes, mientras que Tor es fundamentalmente un circuito conmutado, permitiendo a I2P enrutar evitando congestiones y otros fallos de la red transparentemente , operar en vías redundantes, y hacer balance de carga de los datos a través de los recursos disponibles. Mientras que Tor ofrece una funcionalidad tan útil como el outproxy ofreciendo el descubrimiento y selección de outproxy integrado, I2P deja esas decisiones sobre la capa de aplicación a las aplicaciones ejecutándose sobre I2P - de hecho, I2P incluso ha exteriorizado la librería de streaming tipo TCP a la capa de aplicación, permitiendo a los desarrolladores el experimentar con diferentes estrategias, usando el conocimiento específico de dominio para ofrecer mejores rendimientos."
+msgstr ""
+"A primera vista, Tor e I2P tienen muchas similitudes en lo que se refiere"
+" a funcionamiento y anonimato. Aunque I2P se empezó a desarrollar antes "
+"eramos conscientes de los esfuerzos hechos al inicio de Tor, muchas de "
+"las lecciones aprendidas de la red onion original y ZKS fueron integradas"
+" en el diseño de I2P. En vez de construir un sistema centralizado y de "
+"confianza con servidores de directorios, I2P tiene su propia base de "
+"datos de red auto organizable en la que cada par toma la responsabilidad "
+"de acceder al perfil de otros ruters para determinar como aprovechar los "
+"recursos disponibles. Otra diferencia básica es que mitras I2P y Tor usan"
+" rutas ordenadas y en capas (túneles y circuitos/streams), I2P es "
+"fundamentalmente una red conmutada de paquetes, mientras que Tor es "
+"fundamentalmente un circuito conmutado, permitiendo a I2P enrutar "
+"evitando congestiones y otros fallos de la red transparentemente , operar"
+" en vías redundantes, y hacer balance de carga de los datos a través de "
+"los recursos disponibles. Mientras que Tor ofrece una funcionalidad tan "
+"útil como el outproxy ofreciendo el descubrimiento y selección de "
+"outproxy integrado, I2P deja esas decisiones sobre la capa de aplicación "
+"a las aplicaciones ejecutándose sobre I2P - de hecho, I2P incluso ha "
+"exteriorizado la librería de streaming tipo TCP a la capa de aplicación, "
+"permitiendo a los desarrolladores el experimentar con diferentes "
+"estrategias, usando el conocimiento específico de dominio para ofrecer "
+"mejores rendimientos."
#: i2p2www/pages/site/docs/how/tech-intro.html:707
msgid ""
-"From an anonymity perspective, there is much similarity when the core networks \n"
-"are compared. However, there are a few key differences. When dealing with \n"
-"an internal adversary or most external adversaries, I2P's simplex tunnels \n"
-"expose half as much traffic data than would be exposed with Tor's duplex circuits \n"
-"by simply looking at the flows themselves - an HTTP request and response would \n"
-"follow the same path in Tor, while in I2P the packets making up the request \n"
-"would go out through one or more outbound tunnels and the packets making up \n"
-"the response would come back through one or more different inbound tunnels. \n"
-"While I2P's peer selection and ordering strategies should sufficiently address \n"
-"predecessor attacks, should a switch to bidirectional tunnels be necessary,\n"
-"we could simply build an inbound and outbound tunnel along the same routers."
-msgstr "Desde el punto de vista del anonimato, cuando comparamos el núcleo de las redes hay muchas similaridades entre ellos. Pero hay unas cuantas diferencias claves. Cuando se trata de lidiar con adversario interno o varios adversarios externos observando los propios flujos de datos, los túneles simples de I2P exponen la mitad de información en el tráfico de lo que exponen los circuitos dobles de Tor - una petición y respuesta HTTP seguirían el mismo camino en Tor, mientras que I2P el paquete que hace la consulta iría a través de uno o más túneles y el paquete con la respuesta regresarían a través de otro o más túneles de entrada diferentes. Mientras que la selección del orden y estrategias por parte del par deberían ser suficientes para enfrentarse a los ataques de predecesor, podríamos simplemente construir un túnel de entrada y de salida a través de los mismos ruters."
+"From an anonymity perspective, there is much similarity when the core "
+"networks \n"
+"are compared. However, there are a few key differences. When dealing with"
+" \n"
+"an internal adversary or most external adversaries, I2P's simplex tunnels"
+" \n"
+"expose half as much traffic data than would be exposed with Tor's duplex "
+"circuits \n"
+"by simply looking at the flows themselves - an HTTP request and response "
+"would \n"
+"follow the same path in Tor, while in I2P the packets making up the "
+"request \n"
+"would go out through one or more outbound tunnels and the packets making "
+"up \n"
+"the response would come back through one or more different inbound "
+"tunnels. \n"
+"While I2P's peer selection and ordering strategies should sufficiently "
+"address \n"
+"predecessor attacks, should a switch to bidirectional tunnels be "
+"necessary,\n"
+"we could simply build an inbound and outbound tunnel along the same "
+"routers."
+msgstr ""
+"Desde el punto de vista del anonimato, cuando comparamos el núcleo de las"
+" redes hay muchas similaridades entre ellos. Pero hay unas cuantas "
+"diferencias claves. Cuando se trata de lidiar con adversario interno o "
+"varios adversarios externos observando los propios flujos de datos, los "
+"túneles simples de I2P exponen la mitad de información en el tráfico de "
+"lo que exponen los circuitos dobles de Tor - una petición y respuesta "
+"HTTP seguirían el mismo camino en Tor, mientras que I2P el paquete que "
+"hace la consulta iría a través de uno o más túneles y el paquete con la "
+"respuesta regresarían a través de otro o más túneles de entrada "
+"diferentes. Mientras que la selección del orden y estrategias por parte "
+"del par deberían ser suficientes para enfrentarse a los ataques de "
+"predecesor, podríamos simplemente construir un túnel de entrada y de "
+"salida a través de los mismos ruters."
#: i2p2www/pages/site/docs/how/tech-intro.html:721
msgid ""
-"Another anonymity issue comes up in Tor's use of telescopic tunnel creation, \n"
-"as simple packet counting and timing measurements as the cells in a circuit \n"
-"pass through an adversary's node exposes statistical information regarding \n"
-"where the adversary is within the circuit. I2P's unidirectional tunnel creation \n"
-"with a single message so that this data is not exposed. Protecting the position \n"
-"in a tunnel is important, as an adversary would otherwise be able to mount \n"
-"a series of powerful predecessor, intersection, and traffic confirmation attacks."
-msgstr "Otro problema para el anonimato aparece en el uso por parte de Tor de la creación telescópica de túnel, un simple contador y medidor de tiempo de los paquetes que pasan a través de un nodo enemigo puede obtener información estadística sobre la posición de la víctima en el circuito. La creación unidireccional para cada mensaje en I2P hace que esta información no sea expuesta. Ocultar la posición de un túnel es importante, ya que un adversario podría montar una serie de potentes ataques como el de predecesores, intersección y confirmación de tráfico."
+"Another anonymity issue comes up in Tor's use of telescopic tunnel "
+"creation, \n"
+"as simple packet counting and timing measurements as the cells in a "
+"circuit \n"
+"pass through an adversary's node exposes statistical information "
+"regarding \n"
+"where the adversary is within the circuit. I2P's unidirectional tunnel "
+"creation \n"
+"with a single message so that this data is not exposed. Protecting the "
+"position \n"
+"in a tunnel is important, as an adversary would otherwise be able to "
+"mount \n"
+"a series of powerful predecessor, intersection, and traffic confirmation "
+"attacks."
+msgstr ""
+"Otro problema para el anonimato aparece en el uso por parte de Tor de la "
+"creación telescópica de túnel, un simple contador y medidor de tiempo de "
+"los paquetes que pasan a través de un nodo enemigo puede obtener "
+"información estadística sobre la posición de la víctima en el circuito. "
+"La creación unidireccional para cada mensaje en I2P hace que esta "
+"información no sea expuesta. Ocultar la posición de un túnel es "
+"importante, ya que un adversario podría montar una serie de potentes "
+"ataques como el de predecesores, intersección y confirmación de tráfico."
#: i2p2www/pages/site/docs/how/tech-intro.html:731
msgid ""
-"Tor's support for a second tier of \"onion proxies\" does offer a non-trivial \n"
-"degree of anonymity while requiring a low cost of entry, while I2P will not \n"
+"Tor's support for a second tier of \"onion proxies\" does offer a non-"
+"trivial \n"
+"degree of anonymity while requiring a low cost of entry, while I2P will "
+"not \n"
"offer this topology until 2.0."
-msgstr "El soporte de Tor de un segundo nivel de \"onion proxies\" ofrece un grado de anonimato nada trivial, mientras que requiere un bajo coste de entrada, mientras que I2P no ofrecerá este tipo de topoligía hasta la versión 2.0."
+msgstr ""
+"El soporte de Tor de un segundo nivel de \"onion proxies\" ofrece un "
+"grado de anonimato nada trivial, mientras que requiere un bajo coste de "
+"entrada, mientras que I2P no ofrecerá este tipo de topoligía hasta la "
+"versión 2.0."
#: i2p2www/pages/site/docs/how/tech-intro.html:737
msgid ""
-"On the whole, Tor and I2P complement each other in their focus - Tor works \n"
-"towards offering high speed anonymous Internet outproxying, while I2P works \n"
-"towards offering a decentralized resilient network in itself. In theory, both \n"
-"can be used to achieve both purposes, but given limited development resources, \n"
-"they both have their strengths and weaknesses. The I2P developers have considered \n"
-"the steps necessary to modify Tor to take advantage of I2P's design, but concerns \n"
-"of Tor's viability under resource scarcity suggest that I2P's packet switching \n"
+"On the whole, Tor and I2P complement each other in their focus - Tor "
+"works \n"
+"towards offering high speed anonymous Internet outproxying, while I2P "
+"works \n"
+"towards offering a decentralized resilient network in itself. In theory, "
+"both \n"
+"can be used to achieve both purposes, but given limited development "
+"resources, \n"
+"they both have their strengths and weaknesses. The I2P developers have "
+"considered \n"
+"the steps necessary to modify Tor to take advantage of I2P's design, but "
+"concerns \n"
+"of Tor's viability under resource scarcity suggest that I2P's packet "
+"switching \n"
"architecture will be able to exploit scarce resources more effectively."
-msgstr "En conjunto, Tor e I2P se complementan el uno al otro - Tor funciona ofreciendo outproxing a Internet de alta velocidad y anónimo, mientras que I2P ofrece una red resistente y descentralizada dentro de sí mismo. En teoría se pueden usar los 2 para obtener los mismos fines, pero dados los limitados recursos de desarrollo, ambos tienen sus ventajas e inconvenientes. Los desarrolladores de I2P han considerado los pasos necesarios para modificar Tor para para la mejora del diseño de I2P, pero preocupaciones sobre la viabilidad de Tor con bajo escasos recursos sugiere que la arquitectura de enrutamiento de paquetes de I2P será capaz de funcionar más eficientemente con recursos escasos."
+msgstr ""
+"En conjunto, Tor e I2P se complementan el uno al otro - Tor funciona "
+"ofreciendo outproxing a Internet de alta velocidad y anónimo, mientras "
+"que I2P ofrece una red resistente y descentralizada dentro de sí mismo. "
+"En teoría se pueden usar los 2 para obtener los mismos fines, pero dados "
+"los limitados recursos de desarrollo, ambos tienen sus ventajas e "
+"inconvenientes. Los desarrolladores de I2P han considerado los pasos "
+"necesarios para modificar Tor para para la mejora del diseño de I2P, pero"
+" preocupaciones sobre la viabilidad de Tor con bajo escasos recursos "
+"sugiere que la arquitectura de enrutamiento de paquetes de I2P será capaz"
+" de funcionar más eficientemente con recursos escasos."
#: i2p2www/pages/site/docs/how/tech-intro.html:751
msgid ""
-"Freenet played a large part in the initial stages of I2P's design - giving \n"
-"proof to the viability of a vibrant pseudonymous community completely contained \n"
-"within the network, demonstrating that the dangers inherent in outproxies \n"
-"could be avoided. The first seed of I2P began as a replacement communication \n"
-"layer for Freenet, attempting to factor out the complexities of a scalable, \n"
-"anonymous and secure point to point communication from the complexities of \n"
-"a censorship resistant distributed data store. Over time however, some of \n"
-"the anonymity and scalability issues inherent in Freenet's algorithms made \n"
-"it clear that I2P's focus should stay strictly on providing a generic anonymous \n"
-"communication layer, rather than as a component of Freenet. Over the years, \n"
-"the Freenet developers have come to see the weaknesses in the older design, \n"
-"prompting them to suggest that they will require a \"premix\" layer to offer \n"
-"substantial anonymity. In other words, Freenet needs to run on top of a mixnet \n"
-"such as I2P or Tor, with \"client nodes\" requesting and publishing data through \n"
-"the mixnet to the \"server nodes\" which then fetch and store the data according \n"
+"Freenet played a large part in the initial stages of I2P's design - "
+"giving \n"
+"proof to the viability of a vibrant pseudonymous community completely "
+"contained \n"
+"within the network, demonstrating that the dangers inherent in outproxies"
+" \n"
+"could be avoided. The first seed of I2P began as a replacement "
+"communication \n"
+"layer for Freenet, attempting to factor out the complexities of a "
+"scalable, \n"
+"anonymous and secure point to point communication from the complexities "
+"of \n"
+"a censorship resistant distributed data store. Over time however, some of"
+" \n"
+"the anonymity and scalability issues inherent in Freenet's algorithms "
+"made \n"
+"it clear that I2P's focus should stay strictly on providing a generic "
+"anonymous \n"
+"communication layer, rather than as a component of Freenet. Over the "
+"years, \n"
+"the Freenet developers have come to see the weaknesses in the older "
+"design, \n"
+"prompting them to suggest that they will require a \"premix\" layer to "
+"offer \n"
+"substantial anonymity. In other words, Freenet needs to run on top of a "
+"mixnet \n"
+"such as I2P or Tor, with \"client nodes\" requesting and publishing data "
+"through \n"
+"the mixnet to the \"server nodes\" which then fetch and store the data "
+"according \n"
"to Freenet's heuristic distributed data storage algorithms."
-msgstr "Freenet jugó un rol importante en los primeros pasos del diseño de I2P - mostrando pruebas de la viabilidad de una comunidad vibrante completamente dentro de la red, mostrando que los peligros inherentes de los outproxies podían ser evitados. La primera semilla de I2P comenzó como el remplazo de una capa de comunicación para Freenet, al intentar extraer la complejidad de una comunicación de punto a punto segura y anónima de las complicaciones del almacenamiento distribuido resistente a la censura. Aunque la final, algunos de los problemas de escalabilidad y anonimato inherentes a los algoritmos de Freenet dejó claro que debería enfocarse I2P para proveer una capa de comunicación anónima por sí misma en vez de ser un componente de Freenet. A través de los años, los desarrolladores de Freenet se han dado cuenta de las debilidades del viejo diseño, provocando que sugiriese la necesidad de una capa de \"pre mezcla\" para ofrecer el suficiente anonimato. En otras palabras, Freenet debe ejecutarse sobre una mixnet como I2P o Tor, con \"nodos cliente\" solicitando y publicando datos a través de la mixnet a los \"nodos servidores\" los cuales entonces almacenan los datos de acuerdo con la heurística de los algoritmos de almacenamiento de datos distribuidos de Freenet."
+msgstr ""
+"Freenet jugó un rol importante en los primeros pasos del diseño de I2P - "
+"mostrando pruebas de la viabilidad de una comunidad vibrante "
+"completamente dentro de la red, mostrando que los peligros inherentes de "
+"los outproxies podían ser evitados. La primera semilla de I2P comenzó "
+"como el remplazo de una capa de comunicación para Freenet, al intentar "
+"extraer la complejidad de una comunicación de punto a punto segura y "
+"anónima de las complicaciones del almacenamiento distribuido resistente a"
+" la censura. Aunque la final, algunos de los problemas de escalabilidad y"
+" anonimato inherentes a los algoritmos de Freenet dejó claro que debería "
+"enfocarse I2P para proveer una capa de comunicación anónima por sí misma "
+"en vez de ser un componente de Freenet. A través de los años, los "
+"desarrolladores de Freenet se han dado cuenta de las debilidades del "
+"viejo diseño, provocando que sugiriese la necesidad de una capa de \"pre "
+"mezcla\" para ofrecer el suficiente anonimato. En otras palabras, Freenet"
+" debe ejecutarse sobre una mixnet como I2P o Tor, con \"nodos cliente\" "
+"solicitando y publicando datos a través de la mixnet a los \"nodos "
+"servidores\" los cuales entonces almacenan los datos de acuerdo con la "
+"heurística de los algoritmos de almacenamiento de datos distribuidos de "
+"Freenet."
#: i2p2www/pages/site/docs/how/tech-intro.html:770
msgid ""
-"Freenet's functionality is very complementary to I2P's, as Freenet natively \n"
-"provides many of the tools for operating medium and high latency systems, \n"
-"while I2P natively provides the low latency mix network suitable for offering \n"
-"adequate anonymity. The logic of separating the mixnet from the censorship-\n"
-"resistant distributed data store still seems self-evident from an engineering, \n"
-"anonymity, security, and resource allocation perspective, so hopefully the \n"
-"Freenet team will pursue efforts in that direction, if not simply reusing \n"
+"Freenet's functionality is very complementary to I2P's, as Freenet "
+"natively \n"
+"provides many of the tools for operating medium and high latency systems,"
+" \n"
+"while I2P natively provides the low latency mix network suitable for "
+"offering \n"
+"adequate anonymity. The logic of separating the mixnet from the "
+"censorship-\n"
+"resistant distributed data store still seems self-evident from an "
+"engineering, \n"
+"anonymity, security, and resource allocation perspective, so hopefully "
+"the \n"
+"Freenet team will pursue efforts in that direction, if not simply reusing"
+" \n"
"(or helping to improve, as necessary) existing mixnets like I2P or Tor."
-msgstr "Las funcionalidades de Freenet son muy complementarias a las de I2P, ya que Freenet provee nativamente muchas herramientas para operar en sistemas de media y alta latencia, mientras que I2P provee nativamente una red de baja latencia adecuada para ofrecer anonimato. La lógica para separar la mixnet de los datos distribuidos resistentes a censura, son muy evidentes desde la perspectiva del anonimato, seguridad y de la asignación de los recursos, con lo que esperamos que el equipo de Freenet ponga sus esfuerzos en esta dirección, aunque sea reutilizando (o ayudando a mejorar, si es necesario) las redes existentes como I2P y Tor."
+msgstr ""
+"Las funcionalidades de Freenet son muy complementarias a las de I2P, ya "
+"que Freenet provee nativamente muchas herramientas para operar en "
+"sistemas de media y alta latencia, mientras que I2P provee nativamente "
+"una red de baja latencia adecuada para ofrecer anonimato. La lógica para "
+"separar la mixnet de los datos distribuidos resistentes a censura, son "
+"muy evidentes desde la perspectiva del anonimato, seguridad y de la "
+"asignación de los recursos, con lo que esperamos que el equipo de "
+"Freenet ponga sus esfuerzos en esta dirección, aunque sea reutilizando (o"
+" ayudando a mejorar, si es necesario) las redes existentes como I2P y "
+"Tor."
#: i2p2www/pages/site/docs/how/tech-intro.html:781
msgid ""
"It is worth mentioning that there has recently been discussion and work \n"
-"by the Freenet developers on a \"globally scalable darknet\" using restricted \n"
-"routes between peers of various trust. While insufficient information has \n"
-"been made publicly available regarding how such a system would operate for \n"
-"a full review, from what has been said the anonymity and scalability claims \n"
-"seem highly dubious. In particular, the appropriateness for use in hostile \n"
-"regimes against state level adversaries has been tremendously overstated, \n"
-"and any analysis on the implications of resource scarcity upon the scalability \n"
-"of the network has seemingly been avoided. Further questions regarding susceptibility \n"
-"to traffic analysis, trust and other topics do exist, but a more in-depth \n"
-"review of this \"globally scalable darknet\" will have to wait until the Freenet \n"
+"by the Freenet developers on a \"globally scalable darknet\" using "
+"restricted \n"
+"routes between peers of various trust. While insufficient information has"
+" \n"
+"been made publicly available regarding how such a system would operate "
+"for \n"
+"a full review, from what has been said the anonymity and scalability "
+"claims \n"
+"seem highly dubious. In particular, the appropriateness for use in "
+"hostile \n"
+"regimes against state level adversaries has been tremendously overstated,"
+" \n"
+"and any analysis on the implications of resource scarcity upon the "
+"scalability \n"
+"of the network has seemingly been avoided. Further questions regarding "
+"susceptibility \n"
+"to traffic analysis, trust and other topics do exist, but a more in-depth"
+" \n"
+"review of this \"globally scalable darknet\" will have to wait until the "
+"Freenet \n"
"team makes more information available."
-msgstr "Vale la pena mencionar que recientemente ha habido discusiones y trabajos realizados por los desarrolladores de Freenet sobre una \"darknet escalable global\" usando pares restringidos entre pares de varias confianzas. Mientras que no se ha hecho pública suficiente información sobre como funcionará ese sistema para una revisión completa, pero lo que se ha dicho del anonimato y la escalabilidad parecen ser muy dudoso. En particular, el uso apropiado de su uso contra regímenes hostiles ha sido exagerado, y cualquier análisis de las implicaciones sobre la escasez de recursos sobre la escalabilidad de la red han sido aparentemente evitados. Existen otras preguntas sobre la posibilidad de análisis del tráfico, confianza y otros temas, pero hace falta una revisión más profunda de esta \"darknet escalable global\", pero deberán esperar hasta que el equipo de Freenet ponga más información a disposición."
+msgstr ""
+"Vale la pena mencionar que recientemente ha habido discusiones y trabajos"
+" realizados por los desarrolladores de Freenet sobre una \"darknet "
+"escalable global\" usando pares restringidos entre pares de varias "
+"confianzas. Mientras que no se ha hecho pública suficiente información "
+"sobre como funcionará ese sistema para una revisión completa, pero lo que"
+" se ha dicho del anonimato y la escalabilidad parecen ser muy dudoso. En "
+"particular, el uso apropiado de su uso contra regímenes hostiles ha sido "
+"exagerado, y cualquier análisis de las implicaciones sobre la escasez de "
+"recursos sobre la escalabilidad de la red han sido aparentemente "
+"evitados. Existen otras preguntas sobre la posibilidad de análisis del "
+"tráfico, confianza y otros temas, pero hace falta una revisión más "
+"profunda de esta \"darknet escalable global\", pero deberán esperar "
+"hasta que el equipo de Freenet ponga más información a disposición."
#: i2p2www/pages/site/docs/how/tech-intro.html:797
msgid ""
-"I2P itself doesn't really do much - it simply sends messages to remote destinations \n"
-"and receives messages targeting local destinations - most of the interesting \n"
-"work goes on at the layers above it. By itself, I2P could be seen as an anonymous \n"
-"and secure IP layer, and the bundled streaming library \n"
-"as an implementation of an anonymous and secure TCP layer on top of it. Beyond \n"
-"that, I2PTunnel exposes a generic TCP proxying \n"
-"system for either getting into or out of the I2P network, plus a variety of \n"
+"I2P itself doesn't really do much - it simply sends messages to remote "
+"destinations \n"
+"and receives messages targeting local destinations - most of the "
+"interesting \n"
+"work goes on at the layers above it. By itself, I2P could be seen as an "
+"anonymous \n"
+"and secure IP layer, and the bundled streaming"
+" library \n"
+"as an implementation of an anonymous and secure TCP layer on top of it. "
+"Beyond \n"
+"that, I2PTunnel exposes a generic TCP "
+"proxying \n"
+"system for either getting into or out of the I2P network, plus a variety "
+"of \n"
"network applications provide further functionality for end users."
-msgstr "En sí, I2p no hace mucho - simplemente envía mensajes a destinaciones remotas y recibe mensajes hacia destinaciones locales - la mayoría del trabajo interesante es sobre las capas que hay sobre I2P. Por sí mismo I2P puede verse como una capa de IP anónima y segura, y la librería streaming incluida como una implementación de una capa TCP segura y anónima sobre I2P. Más allá de esto, el I2PTunnel expone un sistema genérico TCP para entrar dentro o salir de la red I2P, más una gran variedad de aplicaciones para proveer más funcionalidades a los usuarios finales."
+msgstr ""
+"En sí, I2p no hace mucho - simplemente envía mensajes a destinaciones "
+"remotas y recibe mensajes hacia destinaciones locales - la mayoría del "
+"trabajo interesante es sobre las capas que hay sobre I2P. Por sí mismo "
+"I2P puede verse como una capa de IP anónima y segura, y la librería streaming incluida como una "
+"implementación de una capa TCP segura y anónima sobre I2P. Más allá de "
+"esto, el I2PTunnel expone un sistema "
+"genérico TCP para entrar dentro o salir de la red I2P, más una gran "
+"variedad de aplicaciones para proveer más funcionalidades a los usuarios "
+"finales."
#: i2p2www/pages/site/docs/how/tech-intro.html:808
msgid "Streaming library"
@@ -9035,36 +14682,76 @@ msgstr "Librería de transmisión"
#: i2p2www/pages/site/docs/how/tech-intro.html:809
msgid ""
-"The I2P streaming library can be viewed as a generic streaming interface (mirroring TCP sockets),\n"
-"and the implementation supports a sliding window protocol\n"
-"with several optimizations, to take into account the high delay over I2P.\n"
+"The I2P streaming library can be viewed as a generic streaming interface "
+"(mirroring TCP sockets),\n"
+"and the implementation supports a sliding "
+"window protocol\n"
+"with several optimizations, to take into account the high delay over I2P."
+"\n"
"Individual streams may adjust the maximum packet size and \n"
-"other options, though the default of 4KB compressed seems a reasonable tradeoff \n"
-"between the bandwidth costs of retransmitting lost messages and the latency \n"
+"other options, though the default of 4KB compressed seems a reasonable "
+"tradeoff \n"
+"between the bandwidth costs of retransmitting lost messages and the "
+"latency \n"
"of multiple messages."
-msgstr "La librería de streaming de I2P puede verse como un interfaz genérico de streaming (reflejando sockets TCP), y la implementación soporta el protocolo sliding window con varias optimizaciones, para tener en cuenta los altos retardos en I2P. Los streams individuales pueden ajustar el tamaño máximo de paquetes y otras opciones, aunque la compresión por defecto de 4KB parece una compensación razonable entre el coste de ancho de banda de reenviar los mensajes perdidos y la latencia de múltiples mensajes."
+msgstr ""
+"La librería de streaming de I2P puede verse como un interfaz genérico de "
+"streaming (reflejando sockets TCP), y la implementación soporta el protocolo "
+"sliding window con varias optimizaciones, para tener en cuenta los "
+"altos retardos en I2P. Los streams individuales pueden ajustar el tamaño "
+"máximo de paquetes y otras opciones, aunque la compresión por defecto de "
+"4KB parece una compensación razonable entre el coste de ancho de banda de"
+" reenviar los mensajes perdidos y la latencia de múltiples mensajes."
#: i2p2www/pages/site/docs/how/tech-intro.html:819
msgid ""
"In addition, in consideration of the relatively high cost of subsequent \n"
-"messages, the streaming library's protocol for scheduling and delivering messages \n"
-"has been optimized to allow individual messages passed to contain as much \n"
-"information as is available. For instance, a small HTTP transaction proxied \n"
-"through the streaming library can be completed in a single round trip - the \n"
-"first message bundles a SYN, FIN and the small payload (an HTTP request typically \n"
-"fits) and the reply bundles the SYN, FIN, ACK and the small payload (many \n"
-"HTTP responses fit). While an additional ACK must be transmitted to tell the \n"
-"HTTP server that the SYN/FIN/ACK has been received, the local HTTP proxy can \n"
+"messages, the streaming library's protocol for scheduling and delivering "
+"messages \n"
+"has been optimized to allow individual messages passed to contain as much"
+" \n"
+"information as is available. For instance, a small HTTP transaction "
+"proxied \n"
+"through the streaming library can be completed in a single round trip - "
+"the \n"
+"first message bundles a SYN, FIN and the small payload (an HTTP request "
+"typically \n"
+"fits) and the reply bundles the SYN, FIN, ACK and the small payload (many"
+" \n"
+"HTTP responses fit). While an additional ACK must be transmitted to tell "
+"the \n"
+"HTTP server that the SYN/FIN/ACK has been received, the local HTTP proxy "
+"can \n"
"deliver the full response to the browser immediately."
-msgstr "Además, considerando el alto coste de un mensaje, la librería de streaming para programar y enviar mensajes ha sido optimizada para permitir que los mensajes individuales enviados contengan tanta información como esté disponible. Por ejemplo, una pequeña transacción HTTP enviada a través de la librería de streaming puede ser completada en una simple vuelta - el primer mensaje empaqueta a SYN, FIN y un pequeña carga (normalmente encaja una solicitud HTTP) y la respuesta empaqueta el SYN, FIN, ACK y una pequeña carga (muchas respuestas HTTP encajan). Mientras que el ACK adicional debe ser transmitido para decirle al servido HTTP que el SYN/FIN/ACK ha llegado, el proxy HTTP local puede enviar al navegador inmediatamente la respuesta completa."
+msgstr ""
+"Además, considerando el alto coste de un mensaje, la librería de "
+"streaming para programar y enviar mensajes ha sido optimizada para "
+"permitir que los mensajes individuales enviados contengan tanta "
+"información como esté disponible. Por ejemplo, una pequeña transacción "
+"HTTP enviada a través de la librería de streaming puede ser completada en"
+" una simple vuelta - el primer mensaje empaqueta a SYN, FIN y un pequeña"
+" carga (normalmente encaja una solicitud HTTP) y la respuesta empaqueta "
+"el SYN, FIN, ACK y una pequeña carga (muchas respuestas HTTP encajan). "
+"Mientras que el ACK adicional debe ser transmitido para decirle al "
+"servido HTTP que el SYN/FIN/ACK ha llegado, el proxy HTTP local puede "
+"enviar al navegador inmediatamente la respuesta completa."
#: i2p2www/pages/site/docs/how/tech-intro.html:832
msgid ""
-"On the whole, however, the streaming library bears much resemblance to an \n"
-"abstraction of TCP, with its sliding windows, congestion control algorithms \n"
-"(both slow start and congestion avoidance), and general packet behavior (ACK, \n"
+"On the whole, however, the streaming library bears much resemblance to an"
+" \n"
+"abstraction of TCP, with its sliding windows, congestion control "
+"algorithms \n"
+"(both slow start and congestion avoidance), and general packet behavior "
+"(ACK, \n"
"SYN, FIN, RST, etc)."
-msgstr "En conjunto, la librería de streaming se parece mucho a una abstracción de TCP, con sus sliding windows, algoritmos de control de congestión (inicio lento e impedimento de congestiones), y comportamiento general de paquetes (ACK, SYN, FIN, RST, etc)."
+msgstr ""
+"En conjunto, la librería de streaming se parece mucho a una abstracción "
+"de TCP, con sus sliding windows, algoritmos de control de congestión "
+"(inicio lento e impedimento de congestiones), y comportamiento general de"
+" paquetes (ACK, SYN, FIN, RST, etc)."
#: i2p2www/pages/site/docs/how/tech-intro.html:839
msgid "Naming library and addressbook"
@@ -9075,7 +14762,9 @@ msgstr "Librería de dominios y libreta de direcciones"
msgid ""
"For more information see the Naming and "
"Addressbook page."
-msgstr "Para más información vea la web librería de dominios y libreta de direcciones ."
+msgstr ""
+"Para más información vea la web librería de "
+"dominios y libreta de direcciones ."
#: i2p2www/pages/site/docs/how/tech-intro.html:844
#: i2p2www/pages/site/docs/how/tech-intro.html:918
@@ -9092,224 +14781,501 @@ msgstr "Desarrolado por: %(dev)s"
#: i2p2www/pages/site/docs/how/tech-intro.html:846
msgid ""
-"Naming within I2P has been an oft-debated topic since the very beginning \n"
-"with advocates across the spectrum of possibilities. However, given I2P's \n"
-"inherent demand for secure communication and decentralized operation, the \n"
-"traditional DNS-style naming system is clearly out, as are \"majority rules\" \n"
-"voting systems. Instead, I2P ships with a generic naming library and a base \n"
-"implementation designed to work off a local name to destination mapping, as \n"
-"well as an optional add-on application called the \"addressbook\". The addressbook \n"
-"is a web-of-trust-driven secure, distributed, and human readable naming system, \n"
-"sacrificing only the call for all human readable names to be globally unique \n"
-"by mandating only local uniqueness. While all messages in I2P are cryptographically \n"
-"addressed by their destination, different people can have local addressbook \n"
-"entries for \"Alice\" which refer to different destinations. People can still \n"
-"discover new names by importing published addressbooks of peers specified \n"
-"in their web of trust, by adding in the entries provided through a third party, \n"
-"or (if some people organize a series of published addressbooks using a first \n"
-"come first serve registration system) people can choose to treat these addressbooks \n"
+"Naming within I2P has been an oft-debated topic since the very beginning"
+" \n"
+"with advocates across the spectrum of possibilities. However, given I2P's"
+" \n"
+"inherent demand for secure communication and decentralized operation, the"
+" \n"
+"traditional DNS-style naming system is clearly out, as are \"majority "
+"rules\" \n"
+"voting systems. Instead, I2P ships with a generic naming library and a "
+"base \n"
+"implementation designed to work off a local name to destination mapping, "
+"as \n"
+"well as an optional add-on application called the \"addressbook\". The "
+"addressbook \n"
+"is a web-of-trust-driven secure, distributed, and human readable naming "
+"system, \n"
+"sacrificing only the call for all human readable names to be globally "
+"unique \n"
+"by mandating only local uniqueness. While all messages in I2P are "
+"cryptographically \n"
+"addressed by their destination, different people can have local "
+"addressbook \n"
+"entries for \"Alice\" which refer to different destinations. People can "
+"still \n"
+"discover new names by importing published addressbooks of peers specified"
+" \n"
+"in their web of trust, by adding in the entries provided through a third "
+"party, \n"
+"or (if some people organize a series of published addressbooks using a "
+"first \n"
+"come first serve registration system) people can choose to treat these "
+"addressbooks \n"
"as name servers, emulating traditional DNS."
-msgstr "Los nombres de dominio en I2P han sido debatidos a menudo desde el principio, con defensores para todos los tipos de posibilidades. Sin embargo, y dada la necesidad de comunicaciones seguras y descentralizadas, el sistema tradicional al estilo DNS no es viable, al igual que no lo son los sistemas de votos en los que la \"mayoría manda\". Por el contrario, I2P incluye una librería genérica para nombres de dominios y una implementación básica diseñados para trabajar con nombres locales y mapearlos, así como un pluguin opcional llamado \"addressbook\", lista de direcciones. La lista de direcciones es un sistema de dominios distribuido, basado en un sistema de confianza seguro basado en web y legible, sólo sacrificando el hecho de que los dominios puedan ser leídos por los humanos globalmente para ser sólo entendibles localmente. Ya que todos los mensajes en I2P están dirigidos criptográficamente por su destinación, diferentes personas pueden tener entradas en la lista de direcciones para \"Alice\", pero refiriéndose a destinaciones diferentes. La gente puede descubrir nuevos nombres importando lista de direcciones publicadas por pares específicos de su web de confianza, añadiendo estas entradas a través de una tercera parte, o (si alguien organiza listas de direcciones usando sistema de registro tipo el primero que entra el primero es servido) la gente puede escoger tratar estas lista de direcciones como servidores de dominio, emulando los DNS tradicionales."
+msgstr ""
+"Los nombres de dominio en I2P han sido debatidos a menudo desde el "
+"principio, con defensores para todos los tipos de posibilidades. Sin "
+"embargo, y dada la necesidad de comunicaciones seguras y "
+"descentralizadas, el sistema tradicional al estilo DNS no es viable, al "
+"igual que no lo son los sistemas de votos en los que la \"mayoría "
+"manda\". Por el contrario, I2P incluye una librería genérica para nombres"
+" de dominios y una implementación básica diseñados para trabajar con "
+"nombres locales y mapearlos, así como un pluguin opcional llamado "
+"\"addressbook\", lista de direcciones. La lista de direcciones es un "
+"sistema de dominios distribuido, basado en un sistema de confianza seguro"
+" basado en web y legible, sólo sacrificando el hecho de que los dominios "
+"puedan ser leídos por los humanos globalmente para ser sólo entendibles "
+"localmente. Ya que todos los mensajes en I2P están dirigidos "
+"criptográficamente por su destinación, diferentes personas pueden tener "
+"entradas en la lista de direcciones para \"Alice\", pero refiriéndose a "
+"destinaciones diferentes. La gente puede descubrir nuevos nombres "
+"importando lista de direcciones publicadas por pares específicos de su "
+"web de confianza, añadiendo estas entradas a través de una tercera parte,"
+" o (si alguien organiza listas de direcciones usando sistema de registro "
+"tipo el primero que entra el primero es servido) la gente puede escoger "
+"tratar estas lista de direcciones como servidores de dominio, emulando "
+"los DNS tradicionales."
#: i2p2www/pages/site/docs/how/tech-intro.html:866
msgid ""
"I2P does not promote the use of DNS-like services though, as the damage \n"
-"done by hijacking a site can be tremendous - and insecure destinations have \n"
-"no value. DNSsec itself still falls back on registrars and certificate authorities, \n"
-"while with I2P, requests sent to a destination cannot be intercepted or the \n"
-"reply spoofed, as they are encrypted to the destination's public keys, and \n"
-"a destination itself is just a pair of public keys and a certificate. DNS-style \n"
-"systems on the other hand allow any of the name servers on the lookup path \n"
-"to mount simple denial of service and spoofing attacks. Adding on a certificate \n"
-"authenticating the responses as signed by some centralized certificate authority \n"
-"would address many of the hostile nameserver issues but would leave open replay \n"
+"done by hijacking a site can be tremendous - and insecure destinations "
+"have \n"
+"no value. DNSsec itself still falls back on registrars and certificate "
+"authorities, \n"
+"while with I2P, requests sent to a destination cannot be intercepted or "
+"the \n"
+"reply spoofed, as they are encrypted to the destination's public keys, "
+"and \n"
+"a destination itself is just a pair of public keys and a certificate. "
+"DNS-style \n"
+"systems on the other hand allow any of the name servers on the lookup "
+"path \n"
+"to mount simple denial of service and spoofing attacks. Adding on a "
+"certificate \n"
+"authenticating the responses as signed by some centralized certificate "
+"authority \n"
+"would address many of the hostile nameserver issues but would leave open "
+"replay \n"
"attacks as well as hostile certificate authority attacks."
-msgstr "I2P no recomienda el uso de servicios tipo DNS, ya que el daño hecho por una web maliciosas puede ser enorme - una destinación insegura no tiene valor. DNSsec sigue apoyándose en autoridades certificadas, mientras que con I2P las solicitudes a una destinación no pueden ser interceptadas o la respuesta suplantada ya que están cifradas con la clave pública de la destinación, y una destinación en sí misma no es más que un par de claves y un certificado. Por otra parte, los sistemas del tipo DNS permiten que cualquiera de los servidores en el camino de búsqueda pueda montar ataques de denegación de servicio o ataques de suplantación. Añadiendo sobre un certificado autentificándose la respuesta firmada por alguna autoridad centralizada de certificados, podría solucionar muchos de los problemas con los servidores de dominio hostiles, pero lo dejaría abierto a ataques de respuesta y a ataques de autoridad certificada hostil."
+msgstr ""
+"I2P no recomienda el uso de servicios tipo DNS, ya que el daño hecho por "
+"una web maliciosas puede ser enorme - una destinación insegura no tiene "
+"valor. DNSsec sigue apoyándose en autoridades certificadas, mientras que "
+"con I2P las solicitudes a una destinación no pueden ser interceptadas o "
+"la respuesta suplantada ya que están cifradas con la clave pública de la "
+"destinación, y una destinación en sí misma no es más que un par de claves"
+" y un certificado. Por otra parte, los sistemas del tipo DNS permiten que"
+" cualquiera de los servidores en el camino de búsqueda pueda montar "
+"ataques de denegación de servicio o ataques de suplantación. Añadiendo "
+"sobre un certificado autentificándose la respuesta firmada por alguna "
+"autoridad centralizada de certificados, podría solucionar muchos de los "
+"problemas con los servidores de dominio hostiles, pero lo dejaría abierto"
+" a ataques de respuesta y a ataques de autoridad certificada hostil."
#: i2p2www/pages/site/docs/how/tech-intro.html:880
msgid ""
-"Voting style naming is dangerous as well, especially given the effectiveness \n"
-"of Sybil attacks in anonymous systems - the attacker can simply create an \n"
-"arbitrarily high number of peers and \"vote\" with each to take over a given \n"
-"name. Proof-of-work methods can be used to make identity non-free, but as \n"
-"the network grows the load required to contact everyone to conduct online \n"
-"voting is implausible, or if the full network is not queried, different sets \n"
+"Voting style naming is dangerous as well, especially given the "
+"effectiveness \n"
+"of Sybil attacks in anonymous systems - the attacker can simply create an"
+" \n"
+"arbitrarily high number of peers and \"vote\" with each to take over a "
+"given \n"
+"name. Proof-of-work methods can be used to make identity non-free, but as"
+" \n"
+"the network grows the load required to contact everyone to conduct online"
+" \n"
+"voting is implausible, or if the full network is not queried, different "
+"sets \n"
"of answers may be reachable."
-msgstr "El sistema de dominios por votos también es peligroso, sobre todo por la efectividad de los ataques Sybil en sistemas anónimos- el atacante puede simplemente crear un número aleatorio muy grande de pares y \"votar\" con cada uno para apoderarse de un dominio cualquiera. Existen métodos que pueden usarse para hacer que crear una identidad no sea gratis, pero a medida que la red crece la carga que se necesita para contactar a todos y hacer votación online es enorme, o si no hace falta la red completa, se podrían encontrar otras soluciones."
+msgstr ""
+"El sistema de dominios por votos también es peligroso, sobre todo por la "
+"efectividad de los ataques Sybil en sistemas anónimos- el atacante puede "
+"simplemente crear un número aleatorio muy grande de pares y \"votar\" con"
+" cada uno para apoderarse de un dominio cualquiera. Existen métodos que "
+"pueden usarse para hacer que crear una identidad no sea gratis, pero a "
+"medida que la red crece la carga que se necesita para contactar a todos y"
+" hacer votación online es enorme, o si no hace falta la red completa, se "
+"podrían encontrar otras soluciones."
#: i2p2www/pages/site/docs/how/tech-intro.html:890
msgid ""
-"As with the Internet however, I2P is keeping the design and operation of \n"
-"a naming system out of the (IP-like) communication layer. The bundled naming \n"
-"library includes a simple service provider interface which alternate naming \n"
-"systems can plug into, allowing end users to drive what sort of naming tradeoffs \n"
+"As with the Internet however, I2P is keeping the design and operation of"
+" \n"
+"a naming system out of the (IP-like) communication layer. The bundled "
+"naming \n"
+"library includes a simple service provider interface which alternate "
+"naming \n"
+"systems can plug into, allowing end users to drive what sort of naming "
+"tradeoffs \n"
"they prefer."
-msgstr "Aún así, al igual que con Internet, I2P mantiene el diseño y funcionamiento de un sistema de dominios aparte de la capa de comunicación (como IP). La librería de dominios incluye un interfaz simple de servicio al cual puede conectarse cualquier sistema de dominios, permitiendo a los usuarios finales elegir qué tipo de sistema de dominios prefieren."
+msgstr ""
+"Aún así, al igual que con Internet, I2P mantiene el diseño y "
+"funcionamiento de un sistema de dominios aparte de la capa de "
+"comunicación (como IP). La librería de dominios incluye un interfaz "
+"simple de servicio al cual puede conectarse cualquier sistema de "
+"dominios, permitiendo a los usuarios finales elegir qué tipo de sistema "
+"de dominios prefieren."
#: i2p2www/pages/site/docs/how/tech-intro.html:899
msgid ""
-"The old Syndie bundled with I2P has been replaced by the new Syndie which\n"
-"is distributed separately. For more information see the Syndie\n"
+"The old Syndie bundled with I2P has been replaced by the new Syndie which"
+"\n"
+"is distributed separately. For more information see the Syndie\n"
"pages."
-msgstr "El viejo Syndie incluido con I2P ha sido reemplazado con un nuevo Syndie, el cual es distribuido aparte. Para más información vea la web de Syndie."
+msgstr ""
+"El viejo Syndie incluido con I2P ha sido reemplazado con un nuevo Syndie,"
+" el cual es distribuido aparte. Para más información vea la web de Syndie."
#: i2p2www/pages/site/docs/how/tech-intro.html:905
msgid ""
-"Syndie is a safe, anonymous blogging / content publication / content aggregation \n"
-"system. It lets you create information, share it with others, and read posts \n"
-"from those you're interested in, all while taking into consideration your \n"
-"needs for security and anonymity. Rather than building its own content distribution \n"
-"network, Syndie is designed to run on top of existing networks, syndicating \n"
-"content through eepsites, Tor hidden services, Freenet freesites, normal websites, \n"
-"usenet newsgroups, email lists, RSS feeds, etc. Data published with Syndie \n"
-"is done so as to offer pseudonymous authentication to anyone reading or archiving \n"
+"Syndie is a safe, anonymous blogging / content publication / content "
+"aggregation \n"
+"system. It lets you create information, share it with others, and read "
+"posts \n"
+"from those you're interested in, all while taking into consideration your"
+" \n"
+"needs for security and anonymity. Rather than building its own content "
+"distribution \n"
+"network, Syndie is designed to run on top of existing networks, "
+"syndicating \n"
+"content through eepsites, Tor hidden services, Freenet freesites, normal "
+"websites, \n"
+"usenet newsgroups, email lists, RSS feeds, etc. Data published with "
+"Syndie \n"
+"is done so as to offer pseudonymous authentication to anyone reading or "
+"archiving \n"
"it."
-msgstr "Syndie es un sistema seguro y anónimo para blogging / publicación de contenido / agregación de contenidos. Le permite crear información, compartirla con otros, y leer los mensajes de las personas en las que está interesado, y todo mientras se toma en consideración sus necesidades de anonimato y seguridad. En vez de construir su propia red de contenidos, Syndie está diseñado para ejecutarse sobre redes ya existentes, sindicando el contenido a través de eepsites, servicios ocultos en Tor, webs de Freenet, webs normales, grupos de usenet, listas de email, RSS, etc. Los datos publicados con Syndie ofrecen autenticación seudo anónima para cualquiera leyendo o enviando datos."
+msgstr ""
+"Syndie es un sistema seguro y anónimo para blogging / publicación de "
+"contenido / agregación de contenidos. Le permite crear información, "
+"compartirla con otros, y leer los mensajes de las personas en las que "
+"está interesado, y todo mientras se toma en consideración sus necesidades"
+" de anonimato y seguridad. En vez de construir su propia red de "
+"contenidos, Syndie está diseñado para ejecutarse sobre redes ya "
+"existentes, sindicando el contenido a través de eepsites, servicios "
+"ocultos en Tor, webs de Freenet, webs normales, grupos de usenet, listas "
+"de email, RSS, etc. Los datos publicados con Syndie ofrecen autenticación"
+" seudo anónima para cualquiera leyendo o enviando datos."
#: i2p2www/pages/site/docs/how/tech-intro.html:920
msgid ""
-"I2PTunnel is probably I2P's most popular and versatile client application, \n"
-"allowing generic proxying both into and out of the I2P network. I2PTunnel \n"
-"can be viewed as four separate proxying applications - a \"client\" which receives \n"
-"inbound TCP connections and forwards them to a given I2P destination, an \"httpclient\" \n"
-"(aka \"eepproxy\") which acts like an HTTP proxy and forwards the requests to \n"
-"the appropriate I2P destination (after querying the naming service if necessary), \n"
-"a \"server\" which receives inbound I2P streaming connections on a destination \n"
-"and forwards them to a given TCP host+port, and an \"httpserver\" which extends \n"
-"the \"server\" by parsing the HTTP request and responses to allow safer operation. \n"
-"There is an additional \"socksclient\" application, but its use is not encouraged \n"
+"I2PTunnel is probably I2P's most popular and versatile client "
+"application, \n"
+"allowing generic proxying both into and out of the I2P network. I2PTunnel"
+" \n"
+"can be viewed as four separate proxying applications - a \"client\" which"
+" receives \n"
+"inbound TCP connections and forwards them to a given I2P destination, an "
+"\"httpclient\" \n"
+"(aka \"eepproxy\") which acts like an HTTP proxy and forwards the "
+"requests to \n"
+"the appropriate I2P destination (after querying the naming service if "
+"necessary), \n"
+"a \"server\" which receives inbound I2P streaming connections on a "
+"destination \n"
+"and forwards them to a given TCP host+port, and an \"httpserver\" which "
+"extends \n"
+"the \"server\" by parsing the HTTP request and responses to allow safer "
+"operation. \n"
+"There is an additional \"socksclient\" application, but its use is not "
+"encouraged \n"
"for reasons previously mentioned."
-msgstr "I2pTunnel es probablemente la aplicación más versátil y popular de I2P, permitiendo 'proxificar' dentro y fuera de la red I2P. Se puede ver I2PTunnel como cuatro aplicaciones de proxy diferentes - un cliente que recibe conexiones TCP de entrada y las envía a una destinación I2P, un \"cliente http\" (\"eeproxy) que funciona con un proxy HTTP y envía las peticiones a la destinación I2P apropiada (Después de preguntar a un servicio de dominios si es necesario), un \"servidor\" el cual recibe conexiones de entrada de I2P en una destinación y los envía a un host+puerto TCP dado, y un \"servidor http\" el cual amplía el \"servidor\" pasando las solicitudes y respuestas HTTP para permitir un funcionamiento seguro. Hay una aplicación adicional \"socksclient\", pero su uso no se fomenta por razones mencionadas anteriormente."
+msgstr ""
+"I2pTunnel es probablemente la aplicación más versátil y popular de I2P, "
+"permitiendo 'proxificar' dentro y fuera de la red I2P. Se puede ver "
+"I2PTunnel como cuatro aplicaciones de proxy diferentes - un cliente que "
+"recibe conexiones TCP de entrada y las envía a una destinación I2P, un "
+"\"cliente http\" (\"eeproxy) que funciona con un proxy HTTP y envía las "
+"peticiones a la destinación I2P apropiada (Después de preguntar a un "
+"servicio de dominios si es necesario), un \"servidor\" el cual recibe "
+"conexiones de entrada de I2P en una destinación y los envía a un "
+"host+puerto TCP dado, y un \"servidor http\" el cual amplía el "
+"\"servidor\" pasando las solicitudes y respuestas HTTP para permitir un "
+"funcionamiento seguro. Hay una aplicación adicional \"socksclient\", pero"
+" su uso no se fomenta por razones mencionadas anteriormente."
#: i2p2www/pages/site/docs/how/tech-intro.html:934
msgid ""
-"I2P itself is not an outproxy network - the anonymity and security concerns \n"
-"inherent in a mix net which forwards data into and out of the mix have kept \n"
-"I2P's design focused on providing an anonymous network which capable of meeting \n"
-"the user's needs without requiring external resources. However, the I2PTunnel \n"
-"\"httpclient\" application offers a hook for outproxying - if the hostname requested \n"
-"doesn't end in \".i2p\", it picks a random destination from a user-provided \n"
-"set of outproxies and forwards the request to them. These destinations are \n"
-"simply I2PTunnel \"server\" instances run by volunteers who have explicitly \n"
-"chosen to run outproxies - no one is an outproxy by default, and running an \n"
-"outproxy doesn't automatically tell other people to proxy through you. While \n"
-"outproxies do have inherent weaknesses, they offer a simple proof of concept \n"
-"for using I2P and provide some functionality under a threat model which may \n"
+"I2P itself is not an outproxy network - the anonymity and security "
+"concerns \n"
+"inherent in a mix net which forwards data into and out of the mix have "
+"kept \n"
+"I2P's design focused on providing an anonymous network which capable of "
+"meeting \n"
+"the user's needs without requiring external resources. However, the "
+"I2PTunnel \n"
+"\"httpclient\" application offers a hook for outproxying - if the "
+"hostname requested \n"
+"doesn't end in \".i2p\", it picks a random destination from a user-"
+"provided \n"
+"set of outproxies and forwards the request to them. These destinations "
+"are \n"
+"simply I2PTunnel \"server\" instances run by volunteers who have "
+"explicitly \n"
+"chosen to run outproxies - no one is an outproxy by default, and running "
+"an \n"
+"outproxy doesn't automatically tell other people to proxy through you. "
+"While \n"
+"outproxies do have inherent weaknesses, they offer a simple proof of "
+"concept \n"
+"for using I2P and provide some functionality under a threat model which "
+"may \n"
"be sufficient for some users."
-msgstr "En sí mismo I2P no es una red creada para outproxy - los problemas de seguridad de una red que envía datos dentro y fuera de esta han hecho que el diseño de I2P se haya centrado en crear una red anónima con capacidad para cubrir las necesidades de los usuarios sin necesitar recursos externos. Aún así la aplicación de \"httpclient\" I2PTunnel ofrece la posibilidad de 'outproxying' - si el nombre de dominio no termina en .i2p, elije una destinación aleatoria de una lista de outproxies para el usuario dado y se lo envía. Estas destinaciones son simplemente \"servidores\" I2PTunnels ejecutados por voluntarios que han decidido explícitamente ejecutar outproxies - nadie es un outproxy por defecto, y ejecutar un outproxy no hace que nadie pase automáticamente a través de su ruter. Aunque los outproxys tienen debilidades inherentes, ofrecen un servicio para I2P que tiene un modelo de seguridad que puede ser suficiente para algunos usuarios."
+msgstr ""
+"En sí mismo I2P no es una red creada para outproxy - los problemas de "
+"seguridad de una red que envía datos dentro y fuera de esta han hecho que"
+" el diseño de I2P se haya centrado en crear una red anónima con capacidad"
+" para cubrir las necesidades de los usuarios sin necesitar recursos "
+"externos. Aún así la aplicación de \"httpclient\" I2PTunnel ofrece la "
+"posibilidad de 'outproxying' - si el nombre de dominio no termina en "
+".i2p, elije una destinación aleatoria de una lista de outproxies para el "
+"usuario dado y se lo envía. Estas destinaciones son simplemente "
+"\"servidores\" I2PTunnels ejecutados por voluntarios que han decidido "
+"explícitamente ejecutar outproxies - nadie es un outproxy por defecto, y"
+" ejecutar un outproxy no hace que nadie pase automáticamente a través de "
+"su ruter. Aunque los outproxys tienen debilidades inherentes, ofrecen un "
+"servicio para I2P que tiene un modelo de seguridad que puede ser "
+"suficiente para algunos usuarios."
#: i2p2www/pages/site/docs/how/tech-intro.html:950
msgid ""
-"I2PTunnel enables most of the applications in use. An \"httpserver\" pointing \n"
-"at a webserver lets anyone run their own anonymous website (or \"eepsite\") \n"
-"- a webserver is bundled with I2P for this purpose, but any webserver can \n"
-"be used. Anyone may run a \"client\" pointing at one of the anonymously hosted \n"
-"IRC servers, each of which are running a \"server\" pointing at their local \n"
-"IRCd and communicating between IRCds over their own \"client\" tunnels. End \n"
-"users also have \"client\" tunnels pointing at I2Pmail's \n"
-"POP3 and SMTP destinations (which in turn are simply \"server\" instances pointing \n"
-"at POP3 and SMTP servers), as well as \"client\" tunnels pointing at I2P's CVS \n"
-"server, allowing anonymous development. At times people have even run \"client\" \n"
+"I2PTunnel enables most of the applications in use. An \"httpserver\" "
+"pointing \n"
+"at a webserver lets anyone run their own anonymous website (or "
+"\"eepsite\") \n"
+"- a webserver is bundled with I2P for this purpose, but any webserver can"
+" \n"
+"be used. Anyone may run a \"client\" pointing at one of the anonymously "
+"hosted \n"
+"IRC servers, each of which are running a \"server\" pointing at their "
+"local \n"
+"IRCd and communicating between IRCds over their own \"client\" tunnels. "
+"End \n"
+"users also have \"client\" tunnels pointing at I2Pmail's \n"
+"POP3 and SMTP destinations (which in turn are simply \"server\" instances"
+" pointing \n"
+"at POP3 and SMTP servers), as well as \"client\" tunnels pointing at "
+"I2P's CVS \n"
+"server, allowing anonymous development. At times people have even run "
+"\"client\" \n"
"proxies to access the \"server\" instances pointing at an NNTP server."
-msgstr "I2PTunnel es el que permite el funcionamiento de la mayoría de las aplicaciones. Un \"servidor http\" apuntando a un servidor web permite a cualquiera tener su propia web anónima ( o \"eepsite\") - un servidor web se incluye por defecto en I2P para este propósito, pero se puede utilizar cualquier servidor web. Cualquiera puede ejecutar un \"cliente\" apuntando a cualquiera de los servidores IRC, todos ellos ejecutan un \"servidor\" apuntando a su demonio IRCd local y comunicándose entre servidores IRCd a través de sus propios túneles \"cliente\". Los usuarios finales también tienen túneles clientes apuntando a las destinaciones POP3 y SMTP de I2Pmail ( que realmente sólo son simples instancias \"servidores\" apuntando a servidores POP3 y SMTP), también hay túneles apuntando al servidor CVS de I2P, permitiendo el desarrollo anónimo. Incluso a veces hay gente que ha ejecutado proxies \"clientes\" para acceder instancias de \"servidores\" apuntando a servidores NNTP."
+msgstr ""
+"I2PTunnel es el que permite el funcionamiento de la mayoría de las "
+"aplicaciones. Un \"servidor http\" apuntando a un servidor web permite a "
+"cualquiera tener su propia web anónima ( o \"eepsite\") - un servidor web"
+" se incluye por defecto en I2P para este propósito, pero se puede "
+"utilizar cualquier servidor web. Cualquiera puede ejecutar un \"cliente\""
+" apuntando a cualquiera de los servidores IRC, todos ellos ejecutan un "
+"\"servidor\" apuntando a su demonio IRCd local y comunicándose entre "
+"servidores IRCd a través de sus propios túneles \"cliente\". Los usuarios"
+" finales también tienen túneles clientes apuntando a las destinaciones "
+"POP3 y SMTP de I2Pmail ( que realmente sólo "
+"son simples instancias \"servidores\" apuntando a servidores POP3 y "
+"SMTP), también hay túneles apuntando al servidor CVS de I2P, permitiendo "
+"el desarrollo anónimo. Incluso a veces hay gente que ha ejecutado proxies"
+" \"clientes\" para acceder instancias de \"servidores\" apuntando a "
+"servidores NNTP."
#: i2p2www/pages/site/docs/how/tech-intro.html:967
msgid ""
-"i2p-bt is a port of the mainline python BitTorrent client to run both the \n"
-"tracker and peer communication over I2P. Tracker requests are forwarded through \n"
-"the eepproxy to eepsites specified in the torrent file while tracker responses \n"
-"refer to peers by their destination explicitly, allowing i2p-bt to open up \n"
-"a streaming lib connection to query them for \n"
+"i2p-bt is a port of the mainline python BitTorrent client to run both the"
+" \n"
+"tracker and peer communication over I2P. Tracker requests are forwarded "
+"through \n"
+"the eepproxy to eepsites specified in the torrent file while tracker "
+"responses \n"
+"refer to peers by their destination explicitly, allowing i2p-bt to open "
+"up \n"
+"a streaming lib connection to query them "
+"for \n"
"blocks."
-msgstr "I2p-bt es un port del cliente principal de BitTorrent en python para usarse como par y tracker sobre I2P. Las peticiones del tracker son enviadas a través del eepproxy a las eepsites especificadas en el archivo torrent, mientras que las respuestas del tracker se refieren a los pares explícitamente por su destinación, permitiendo a i2p-bt abrir una conexión a la librería de streaming para preguntar por los bloques."
+msgstr ""
+"I2p-bt es un port del cliente principal de BitTorrent en python para "
+"usarse como par y tracker sobre I2P. Las peticiones del tracker son "
+"enviadas a través del eepproxy a las eepsites especificadas en el archivo"
+" torrent, mientras que las respuestas del tracker se refieren a los pares"
+" explícitamente por su destinación, permitiendo a i2p-bt abrir una "
+"conexión a la librería de streaming para "
+"preguntar por los bloques."
#: i2p2www/pages/site/docs/how/tech-intro.html:976
msgid ""
-"In addition to i2p-bt, a port of bytemonsoon has been made to I2P, making \n"
-"a few modifications as necessary to strip any anonymity-compromising information \n"
-"from the application and to take into consideration the fact that IPs cannot \n"
+"In addition to i2p-bt, a port of bytemonsoon has been made to I2P, making"
+" \n"
+"a few modifications as necessary to strip any anonymity-compromising "
+"information \n"
+"from the application and to take into consideration the fact that IPs "
+"cannot \n"
"be used for identifying peers."
-msgstr "Ademas de i2p-bt, se ha creado un port de bytemonsoon para I2P, haciendo las modificaciones necesarias para separar las información comprometedora de la aplicación y tomar en consideración el hecho de que las IPs no pueden usarse para identificar los pares."
+msgstr ""
+"Ademas de i2p-bt, se ha creado un port de bytemonsoon para I2P, haciendo "
+"las modificaciones necesarias para separar las información comprometedora"
+" de la aplicación y tomar en consideración el hecho de que las IPs no "
+"pueden usarse para identificar los pares."
#: i2p2www/pages/site/docs/how/tech-intro.html:984
msgid ""
"I2PSnark developed: jrandom, et al, ported from mjw's Snark client"
-msgstr "I2Psnark es programado por jrandom y otros, portado desde el cliente Snark de mjw."
+msgstr ""
+"I2Psnark es programado por jrandom y otros, portado desde el cliente Snark de mjw."
#: i2p2www/pages/site/docs/how/tech-intro.html:990
msgid ""
-"Bundled with the I2P install, I2PSnark offers a simple anonymous BitTorrent \n"
-"client with multitorrent capabilities, exposing all of the functionality through \n"
+"Bundled with the I2P install, I2PSnark offers a simple anonymous "
+"BitTorrent \n"
+"client with multitorrent capabilities, exposing all of the functionality "
+"through \n"
"a plain HTML web interface."
-msgstr "Incluido en la instalación de I2P, I2PSnark ofrece un cliente anónimo de BitTorrent con capacidades para multitorrents, mostrando todas sus funcionaliudades a través de in unterfaz web HTML."
+msgstr ""
+"Incluido en la instalación de I2P, I2PSnark ofrece un cliente anónimo de "
+"BitTorrent con capacidades para multitorrents, mostrando todas sus "
+"funcionaliudades a través de in unterfaz web HTML."
#: i2p2www/pages/site/docs/how/tech-intro.html:999
#, python-format
msgid ""
"Robert is a Bittorrent client written in Python.\n"
-"It is hosted on http://%(bob)s/Robert.html "
-msgstr "Robert es un cliente Bittorrent escrito en Python. Se aloja en http://%(bob)s/Robert.html "
+"It is hosted on http://%(bob)s/Robert.html "
+msgstr ""
+"Robert es un cliente Bittorrent escrito en Python. Se aloja en http://%(bob)s/Robert.html "
#: i2p2www/pages/site/docs/how/tech-intro.html:1007
#, python-format
msgid ""
"PyBit is a Bittorrent client written in Python.\n"
"It is hosted on %(pybit)s "
-msgstr "PyBit es un cliente Bittorrent escrito en Python. Está hospedado en %(pybit)s "
+msgstr ""
+"PyBit es un cliente Bittorrent escrito en Python. Está hospedado en %(pybit)s "
#: i2p2www/pages/site/docs/how/tech-intro.html:1015
msgid ""
-"I2Phex is a fairly direct port of the Phex Gnutella filesharing client to \n"
-"run entirely on top of I2P. While it has disabled some of Phex's functionality, \n"
-"such as integration with Gnutella webcaches, the basic file sharing and chatting \n"
+"I2Phex is a fairly direct port of the Phex Gnutella filesharing client to"
+" \n"
+"run entirely on top of I2P. While it has disabled some of Phex's "
+"functionality, \n"
+"such as integration with Gnutella webcaches, the basic file sharing and "
+"chatting \n"
"system is fully functional."
-msgstr "I2Phex es un port de Phex, el cliente de para compartir archivos Gnutella, para ser ejecutado en I2P. Aunque se han deshabilitado algunas funciones de Phex, como la integración los los webcaches de GNUtella, los sistemas básicos de compartición y chateo son funcionales."
+msgstr ""
+"I2Phex es un port de Phex, el cliente de para compartir archivos "
+"Gnutella, para ser ejecutado en I2P. Aunque se han deshabilitado algunas "
+"funciones de Phex, como la integración los los webcaches de GNUtella, los"
+" sistemas básicos de compartición y chateo son funcionales."
#: i2p2www/pages/site/docs/how/tech-intro.html:1025
msgid ""
"iMule is a fairly direct port of the aMule filesharing client \n"
"running entirely inside I2P."
-msgstr "iMule es un port del cliente p2p aMule, que funciona completamente dentro de I2P."
+msgstr ""
+"iMule es un port del cliente p2p aMule, que funciona completamente dentro"
+" de I2P."
#: i2p2www/pages/site/docs/how/tech-intro.html:1033
#, python-format
msgid ""
-"I2Pmail is more a service than an application - postman offers both internal \n"
-"and external email with POP3 and SMTP service through I2PTunnel instances \n"
-"accessing a series of components developed with mastiejaner, allowing people \n"
-"to use their preferred mail clients to send and receive mail pseudonymously. \n"
-"However, as most mail clients expose substantial identifying information, \n"
-"I2P bundles susi23's web based susimail client which has been built specifically \n"
-"with I2P's anonymity needs in mind. The I2Pmail/mail.i2p service offers transparent \n"
-"virus filtering as well as denial of service prevention with hashcash augmented \n"
-"quotas. In addition, each user has control of their batching strategy prior \n"
-"to delivery through the mail.i2p outproxies, which are separate from the mail.i2p \n"
-"SMTP and POP3 servers - both the outproxies and inproxies communicate with \n"
-"the mail.i2p SMTP and POP3 servers through I2P itself, so compromising those \n"
-"non-anonymous locations does not give access to the mail accounts or activity \n"
-"patterns of the user. At the moment the developers work on a decentralized \n"
-"mailsystem, called \"v2mail\". More information can be found on the eepsite \n"
+"I2Pmail is more a service than an application - postman offers both "
+"internal \n"
+"and external email with POP3 and SMTP service through I2PTunnel instances"
+" \n"
+"accessing a series of components developed with mastiejaner, allowing "
+"people \n"
+"to use their preferred mail clients to send and receive mail "
+"pseudonymously. \n"
+"However, as most mail clients expose substantial identifying information,"
+" \n"
+"I2P bundles susi23's web based susimail client which has been built "
+"specifically \n"
+"with I2P's anonymity needs in mind. The I2Pmail/mail.i2p service offers "
+"transparent \n"
+"virus filtering as well as denial of service prevention with hashcash "
+"augmented \n"
+"quotas. In addition, each user has control of their batching strategy "
+"prior \n"
+"to delivery through the mail.i2p outproxies, which are separate from the "
+"mail.i2p \n"
+"SMTP and POP3 servers - both the outproxies and inproxies communicate "
+"with \n"
+"the mail.i2p SMTP and POP3 servers through I2P itself, so compromising "
+"those \n"
+"non-anonymous locations does not give access to the mail accounts or "
+"activity \n"
+"patterns of the user. At the moment the developers work on a "
+"decentralized \n"
+"mailsystem, called \"v2mail\". More information can be found on the "
+"eepsite \n"
"%(postman)s."
-msgstr "I2Pmail es más un servicio que una aplicación - postman ofrece correos internos y externos con servicios POP3 y SMTP a través de instancias de I2PTunnel que acceden a una serie de componentes desarrollados con mastiejaner, permitiendo a la gente usar su cliente de correo favorito para enviar y recibir seudoanónimamente. Ya que la mayoría de los clientes de mail muestran demasiado información identificativa, I2P incluye el cliente susimail basado en web de susi23 construido específicamente para las necesidades de anonimato de I2P. El servicio de I2Pmail/mail.i2p ofrece filtrado transparente de virus así como protección contra ataques DOS con cuotas de hashcash. Además, cada usuario tiene control de su estrategia de lotes antes de enviar a través de los outproxies de mail.i2p, que están separados de los servidores de SMTP y POP3 de mail.i2p - los inproxies y outproxies se comunican con los servidores SMTP y POP3 a través de I2P, con lo cual si se comprometen localizaciones no anónimas no se da acceso a la actividad de las cuentas de correo o las pautas del usuario. En este momento los desarrolladores trabajan en un sistema de correo descentralizado, llamado \"v2mail\". Se puede encontrar más información en %(postman)s."
+msgstr ""
+"I2Pmail es más un servicio que una aplicación - postman ofrece correos "
+"internos y externos con servicios POP3 y SMTP a través de instancias de "
+"I2PTunnel que acceden a una serie de componentes desarrollados con "
+"mastiejaner, permitiendo a la gente usar su cliente de correo favorito "
+"para enviar y recibir seudoanónimamente. Ya que la mayoría de los "
+"clientes de mail muestran demasiado información identificativa, I2P "
+"incluye el cliente susimail basado en web de susi23 construido "
+"específicamente para las necesidades de anonimato de I2P. El servicio de "
+"I2Pmail/mail.i2p ofrece filtrado transparente de virus así como "
+"protección contra ataques DOS con cuotas de hashcash. Además, cada "
+"usuario tiene control de su estrategia de lotes antes de enviar a través "
+"de los outproxies de mail.i2p, que están separados de los servidores de "
+"SMTP y POP3 de mail.i2p - los inproxies y outproxies se comunican con los"
+" servidores SMTP y POP3 a través de I2P, con lo cual si se comprometen "
+"localizaciones no anónimas no se da acceso a la actividad de las cuentas "
+"de correo o las pautas del usuario. En este momento los desarrolladores "
+"trabajan en un sistema de correo descentralizado, llamado \"v2mail\". Se "
+"puede encontrar más información en %(postman)s."
#: i2p2www/pages/site/docs/how/tech-intro.html:1055
msgid ""
-"I2P-Bote is a distributed e-mail application. It does not use the traditional\n"
-"e-mail concept of sending an e-mail to a server and retrieving it from a server.\n"
+"I2P-Bote is a distributed e-mail application. It does not use the "
+"traditional\n"
+"e-mail concept of sending an e-mail to a server and retrieving it from a "
+"server.\n"
"Instead, it uses a Kademlia Distributed Hash Table to store mails.\n"
-"One user can push a mail into the DHT, while another can request the e-mail from the DHT.\n"
-"And all the mails sent within the I2P-Bote network are automatically encrypted end-to-end. X = g^x mod "
+"Alice generates a secret integer x. She then calculates X = g^x mod"
+" p
."
+msgstr ""
+"Alice genera un entero secreto . Ella entonces calcula X = g^x mod "
"p
."
-msgstr "Alice genera un entero secreto . Ella entonces calcula X = g^x mod p
."
#: i2p2www/pages/site/docs/transport/ntcp.html:166
msgid "Alice sends X to Bob (Message 1)."
@@ -13648,7 +22021,9 @@ msgstr "Alice envía X a Bob (mensaje 1)."
msgid ""
"Bob generates a secret integer y. He then calculates Y = g^y mod "
"p
."
-msgstr "Bob genera un entero secreto y. Él entonces calcula Y = g^y mod p
."
+msgstr ""
+"Bob genera un entero secreto y. Él entonces calcula Y = g^y mod "
+"p
."
#: i2p2www/pages/site/docs/transport/ntcp.html:168
msgid "Bob sends Y to Alice.(Message 2)"
@@ -13666,15 +22041,24 @@ msgstr "Bob puede ahora calcular sessionKey = X^y mod p
."
msgid ""
"Both Alice and Bob now have a shared key sessionKey = g^(x*y) mod "
"p
."
-msgstr "Ambos, Alice y Bob, tienen una clave compartida sessionKey = g^(x*y) mod p
."
+msgstr ""
+"Ambos, Alice y Bob, tienen una clave compartida sessionKey = "
+"g^(x*y) mod p
."
#: i2p2www/pages/site/docs/transport/ntcp.html:173
#, python-format
msgid ""
-"The sessionKey is then used to exchange identities in Message 3 and Message 4.\n"
+"The sessionKey is then used to exchange identities in Message 3 "
+"and Message 4.\n"
"The exponent (x and y) length for the DH exchange is documented on the\n"
"cryptography page."
-msgstr "La sessionKey (clave de sesión) se usa entonces para intercambiar identidades \nen Mensaje 3 y Mensaje 4. El exponente de tamaño (x AND y) para \nel intercambio Diffie-Hellman (DH) está documentado en la página de crifrado."
+msgstr ""
+"La sessionKey (clave de sesión) se usa entonces para intercambiar "
+"identidades \n"
+"en Mensaje 3 y Mensaje 4. El exponente de tamaño (x AND y) "
+"para \n"
+"el intercambio Diffie-Hellman (DH) está documentado en la página de crifrado."
#: i2p2www/pages/site/docs/transport/ntcp.html:193
msgid "Message 1 (Session Request)"
@@ -13684,13 +22068,21 @@ msgstr "Mensaje 1 (solicitud de sesión)"
#, python-format
msgid ""
"This is the DH request. Alice already has Bob's\n"
-"Router Identity,\n"
+"Router "
+"Identity,\n"
"IP address, and port, as contained in his\n"
"Router Info,\n"
"which was published to the\n"
"network database.\n"
"Alice sends Bob:"
-msgstr "Esta es la solicitud DH. Alice tiene ya la RouterIdentity (identidad del \nrouter) de Bob, la dirección IP, y el puerto, tal como los contiene su \nRouterInfo (información del router), que estaba publicada en la \nbase de datos de red. Alice envía a Bob:"
+msgstr ""
+"Esta es la solicitud DH. Alice tiene ya la RouterIdentity "
+"(identidad del \n"
+"router) de Bob, la dirección IP, y el puerto, tal como los contiene su \n"
+"RouterInfo "
+"(información del router), que estaba publicada en la \n"
+"base de datos de red. Alice envía a Bob:"
#: i2p2www/pages/site/docs/transport/ntcp.html:207
#: i2p2www/pages/site/docs/transport/ntcp.html:250
@@ -13721,7 +22113,9 @@ msgstr "Notas:"
msgid ""
"Bob verifies HXxorHI using his own router hash. If it does not verify,\n"
"Alice has contacted the wrong router, and Bob drops the connection."
-msgstr "Bob verifica HXxorHI usando su propio hash de router. Si no se verifica, Alice ha contactado el router equivocado, y Bob corta la conexión."
+msgstr ""
+"Bob verifica HXxorHI usando su propio hash de router. Si no se verifica, "
+"Alice ha contactado el router equivocado, y Bob corta la conexión."
#: i2p2www/pages/site/docs/transport/ntcp.html:243
msgid "Message 2 (Session Created)"
@@ -13749,7 +22143,9 @@ msgstr "SHA256 Hash(X concatenado con Y)."
#: i2p2www/pages/site/docs/transport/ntcp.html:279
#: i2p2www/pages/site/docs/transport/ntcp.html:364
msgid "4 byte timestamp (seconds since the epoch)"
-msgstr "Marca de tiempo de 4 bytes (segundos desde epoch (época, origen de tiempo UNIX))"
+msgstr ""
+"Marca de tiempo de 4 bytes (segundos desde epoch (época, origen de tiempo"
+" UNIX))"
#: i2p2www/pages/site/docs/transport/ntcp.html:281
msgid "12 bytes random data"
@@ -13764,15 +22160,21 @@ msgstr "Contenidos cifrados:"
#: i2p2www/pages/site/docs/transport/ntcp.html:312
#, python-format
msgid ""
-"48 bytes AES encrypted using the DH session key and\n"
+"48 bytes AES encrypted using the DH "
+"session key and\n"
" the last 16 bytes of Y as the IV"
-msgstr "48 bytes cifrados con AES usando la clave de sesión DH \ny los últimos 16 bytes de Y usados como el IV (vector de inicialización)"
+msgstr ""
+"48 bytes cifrados con AES usando la "
+"clave de sesión DH \n"
+"y los últimos 16 bytes de Y usados como el IV (vector de inicialización)"
#: i2p2www/pages/site/docs/transport/ntcp.html:320
msgid ""
"Alice may drop the connection if the clock skew with Bob is too high as "
"calculated using tsB."
-msgstr "Alice puede denegar la conexión si el desfase horario con el relog de Bob es demasiado alto al calcularse usando tsB."
+msgstr ""
+"Alice puede denegar la conexión si el desfase horario con el relog de Bob"
+" es demasiado alto al calcularse usando tsB."
#: i2p2www/pages/site/docs/transport/ntcp.html:325
msgid "Message 3 (Session Confirm A)"
@@ -13780,13 +22182,17 @@ msgstr "Mensaje 3 (Confirmar Sesión A)"
#: i2p2www/pages/site/docs/transport/ntcp.html:326
msgid ""
-"This contains Alice's router identity, and a signature of the critical data."
-" Alice sends Bob:"
-msgstr "Esto contiene la identificación del router I2P de Alice, y una firma de los datos críticos. Alice le envía a Bob:"
+"This contains Alice's router identity, and a signature of the critical "
+"data. Alice sends Bob:"
+msgstr ""
+"Esto contiene la identificación del router I2P de Alice, y una firma de "
+"los datos críticos. Alice le envía a Bob:"
#: i2p2www/pages/site/docs/transport/ntcp.html:360
msgid "2 byte size of Alice's router identity to follow (387+)"
-msgstr "2 bytes de tamaño de la identificación del router I2P de Alice a seguir (387+)"
+msgstr ""
+"2 bytes de tamaño de la identificación del router I2P de Alice a seguir "
+"(387+)"
#: i2p2www/pages/site/docs/transport/ntcp.html:362
msgid "Alice's 387+ byte `RouterIdentity`"
@@ -13801,15 +22207,27 @@ msgstr "0-15 bytes de datos aleatorios"
msgid ""
"the `Signature` of the following concatenated data:\n"
" X, Y, Bob's `RouterIdentity`, tsA, tsB.\n"
-" Alice signs it with the `SigningPrivateKey` associated with the `SigningPublicKey` in her `RouterIdentity`"
-msgstr "la `Signature` (firma) de los siguientes datos concatenados:\nX, Y, `RouterIdentity` (identificación de router I2P) de Bob, tsA, tsB (marcas de tiempo A y B).\nAlice los firma con la `SigningPrivateKey` (clave privada de firmante) asociada con la `SigningPublicKey` (clave pública firmante) en su `RouterIdentity`"
+" Alice signs it with the `SigningPrivateKey` associated with "
+"the `SigningPublicKey` in her `RouterIdentity`"
+msgstr ""
+"la `Signature` (firma) de los siguientes datos concatenados:\n"
+"X, Y, `RouterIdentity` (identificación de router I2P) de Bob, tsA, tsB "
+"(marcas de tiempo A y B).\n"
+"Alice los firma con la `SigningPrivateKey` (clave privada de firmante) "
+"asociada con la `SigningPublicKey` (clave pública firmante) en su "
+"`RouterIdentity`"
#: i2p2www/pages/site/docs/transport/ntcp.html:389
#, python-format
msgid ""
-"448 bytes AES encrypted using the DH session key and\n"
-" the last 16 bytes of HXxorHI (i.e., the last 16 bytes of message #1) as the IV"
-msgstr "448 bytes cifrados con AES usando la clave de sesión DH y los últimos 16 bytes de HXxorHI ( por ejemplo, los últimos 16 bytes del mensaje #1) como el IV"
+"448 bytes AES encrypted using the DH"
+" session key and\n"
+" the last 16 bytes of HXxorHI (i.e., the last 16 bytes "
+"of message #1) as the IV"
+msgstr ""
+"448 bytes cifrados con AES usando la"
+" clave de sesión DH y los últimos 16 bytes de HXxorHI ( por ejemplo, los "
+"últimos 16 bytes del mensaje #1) como el IV"
#: i2p2www/pages/site/docs/transport/ntcp.html:400
msgid "Bob verifies the signature, and on failure, drops the connection."
@@ -13819,13 +22237,17 @@ msgstr "Bob verifica la firma, y si falla, rechaza la conexión."
msgid ""
"Bob may drop the connection if the clock skew with Alice is too high as "
"calculated using tsA."
-msgstr "Bob puede rechazar la conexión si si el desfase horario con el reloj de Alice es demasiado alto al calcularse usando tsA."
+msgstr ""
+"Bob puede rechazar la conexión si si el desfase horario con el reloj de "
+"Alice es demasiado alto al calcularse usando tsA."
#: i2p2www/pages/site/docs/transport/ntcp.html:406
msgid ""
-"Alice will use the last 16 bytes of the encrypted contents of this message "
-"as the IV for the next message."
-msgstr "Alice usará los últimos 16 bytes de los contenidos cifrados de este mensaje como IV (vector de inicialización) para el siguiente mensaje."
+"Alice will use the last 16 bytes of the encrypted contents of this "
+"message as the IV for the next message."
+msgstr ""
+"Alice usará los últimos 16 bytes de los contenidos cifrados de este "
+"mensaje como IV (vector de inicialización) para el siguiente mensaje."
#: i2p2www/pages/site/docs/transport/ntcp.html:430
msgid "Message 4 (Session Confirm B)"
@@ -13839,16 +22261,31 @@ msgstr "Esta es una firma de los datos críticos. Bob le envía a Alice:"
msgid ""
"the `Signature` of the following concatenated data:\n"
" X, Y, Alice's `RouterIdentity`, tsA, tsB.\n"
-" Bob signs it with the `SigningPrivateKey` associated with the `SigningPublicKey` in his `RouterIdentity`"
-msgstr "la `Signature` (firma) de los siguientes datos concatenados:\nX, Y, `RouterIdentity` (identificación de router I2P) de Alice, tsA, tsB (marcas de tiempo A y B).\nBob lo firma con la `SigningPrivateKey` (clave privada firmante) asociada con la `SigningPublicKey` (clave pública firmante) en su `RouterIdentity`"
+" Bob signs it with the `SigningPrivateKey` associated with "
+"the `SigningPublicKey` in his `RouterIdentity`"
+msgstr ""
+"la `Signature` (firma) de los siguientes datos concatenados:\n"
+"X, Y, `RouterIdentity` (identificación de router I2P) de Alice, tsA, tsB "
+"(marcas de tiempo A y B).\n"
+"Bob lo firma con la `SigningPrivateKey` (clave privada firmante) asociada"
+" con la `SigningPublicKey` (clave pública firmante) en su "
+"`RouterIdentity`"
#: i2p2www/pages/site/docs/transport/ntcp.html:479
#, python-format
msgid ""
-"Data AES encrypted using the DH session key and\n"
-" the last 16 bytes of the encrypted contents of message #2 as the IV\n"
-" 48 bytes for a DSA signature, may vary for other signature types"
-msgstr "Los datos cifrados con AES usando la clave de sesión DH (Diffie-Hellman), y\nlos últimos 16 bytes de contenidos cifrados del mensaje #2 como IV (vector de inicialización)\nde 48 bytes para una firma DSA, pueden variar para otros tipos de firmas"
+"Data AES encrypted using the DH "
+"session key and\n"
+" the last 16 bytes of the encrypted contents of message "
+"#2 as the IV\n"
+" 48 bytes for a DSA signature, may vary for other "
+"signature types"
+msgstr ""
+"Los datos cifrados con AES usando la"
+" clave de sesión DH (Diffie-Hellman), y\n"
+"los últimos 16 bytes de contenidos cifrados del mensaje #2 como IV "
+"(vector de inicialización)\n"
+"de 48 bytes para una firma DSA, pueden variar para otros tipos de firmas"
#: i2p2www/pages/site/docs/transport/ntcp.html:488
msgid "Alice verifies the signature, and on failure, drops the connection."
@@ -13856,9 +22293,11 @@ msgstr "Alice verifica la firma, y en caso de fallo, rechaza la conexión."
#: i2p2www/pages/site/docs/transport/ntcp.html:491
msgid ""
-"Bob will use the last 16 bytes of the encrypted contents of this message as "
-"the IV for the next message."
-msgstr "Bob usará los últimos 16 bytes de los contenidos cifrados de este mensaje como IV (vector de inicialización) para el siguiente mensaje."
+"Bob will use the last 16 bytes of the encrypted contents of this message "
+"as the IV for the next message."
+msgstr ""
+"Bob usará los últimos 16 bytes de los contenidos cifrados de este mensaje"
+" como IV (vector de inicialización) para el siguiente mensaje."
#: i2p2www/pages/site/docs/transport/ntcp.html:506
msgid "After Establishment"
@@ -13866,11 +22305,21 @@ msgstr "Después del establecimiento"
#: i2p2www/pages/site/docs/transport/ntcp.html:507
msgid ""
-"The connection is established, and standard or time sync messages may be exchanged.\n"
-"All subsequent messages are AES encrypted using the negotiated DH session key.\n"
-"Alice will use the last 16 bytes of the encrypted contents of message #3 as the next IV.\n"
-"Bob will use the last 16 bytes of the encrypted contents of message #4 as the next IV."
-msgstr "La conexión está establecida, y pueden intercambiarse mensajes normales o mensajes de sincronización de tiempo. Todos los mensajes siguientes están cifrados con AES usado la clave de sesión DH antes acordada. Alice usará los últimos 16 bytes del contenido cifrado del mensaje #3 como el siguiente IV. Bob usará los últimos 16 bytes del contenido cifrado del mensaje #4 como el siguiente IV."
+"The connection is established, and standard or time sync messages may be "
+"exchanged.\n"
+"All subsequent messages are AES encrypted using the negotiated DH session"
+" key.\n"
+"Alice will use the last 16 bytes of the encrypted contents of message #3 "
+"as the next IV.\n"
+"Bob will use the last 16 bytes of the encrypted contents of message #4 as"
+" the next IV."
+msgstr ""
+"La conexión está establecida, y pueden intercambiarse mensajes normales o"
+" mensajes de sincronización de tiempo. Todos los mensajes siguientes "
+"están cifrados con AES usado la clave de sesión DH antes acordada. Alice "
+"usará los últimos 16 bytes del contenido cifrado del mensaje #3 como el "
+"siguiente IV. Bob usará los últimos 16 bytes del contenido cifrado del "
+"mensaje #4 como el siguiente IV."
#: i2p2www/pages/site/docs/transport/ntcp.html:516
msgid "Check Connection Message"
@@ -13884,7 +22333,13 @@ msgid ""
"Check Connection is not currently used.\n"
"However, for the record, check connections are formatted as follows.\n"
"A check info connection will receive 256 bytes containing:"
-msgstr "Alternativamente, cuando Bob recibe una conexión, puede ser una conexión de prueba (quizás mostrada por Bob al preguntar a alguien para verificar a su interlocutor). Las conexiones de prueba no se usan actualmente. Aunque, para que quede en el registro, las conexiones de prueba son formateadas como sigue. Una conexión de prueba de información recibirá 256 bytes que contienen:"
+msgstr ""
+"Alternativamente, cuando Bob recibe una conexión, puede ser una conexión "
+"de prueba (quizás mostrada por Bob al preguntar a alguien para verificar "
+"a su interlocutor). Las conexiones de prueba no se usan actualmente. "
+"Aunque, para que quede en el registro, las conexiones de prueba son "
+"formateadas como sigue. Una conexión de prueba de información recibirá "
+"256 bytes que contienen:"
#: i2p2www/pages/site/docs/transport/ntcp.html:526
msgid "32 bytes of uninterpreted, ignored data"
@@ -13896,9 +22351,11 @@ msgstr "tamaño de 1 byte"
#: i2p2www/pages/site/docs/transport/ntcp.html:528
msgid ""
-"that many bytes making up the local router's IP address (as reached by the "
-"remote side)"
-msgstr "el número de bytes que componen la dirección IP del ruter local (como haya sido contactado por la parte remota)"
+"that many bytes making up the local router's IP address (as reached by "
+"the remote side)"
+msgstr ""
+"el número de bytes que componen la dirección IP del ruter local (como "
+"haya sido contactado por la parte remota)"
#: i2p2www/pages/site/docs/transport/ntcp.html:529
msgid "2 byte port number that the local router was reached on"
@@ -13908,7 +22365,9 @@ msgstr "el número de puerto de 2 bytes, en donde ha sido contactado el ruter lo
msgid ""
"4 byte i2p network time as known by the remote side (seconds since the "
"epoch)"
-msgstr "la hora de la red i2p de 4 bytes según la parte remota (segundos desde la 'época')"
+msgstr ""
+"la hora de la red i2p de 4 bytes según la parte remota (segundos desde la"
+" 'época')"
#: i2p2www/pages/site/docs/transport/ntcp.html:531
msgid "uninterpreted padding data, up to byte 223"
@@ -13916,13 +22375,17 @@ msgstr "datos de relleno sin interpretar, hasta 223 bytes"
#: i2p2www/pages/site/docs/transport/ntcp.html:532
msgid ""
-"xor of the local router's identity hash and the SHA256 of bytes 32 through "
-"bytes 223"
-msgstr "xor del hash de la identidad del ruter local y el SHA256 de los bytes desde el 32 hasta el 223"
+"xor of the local router's identity hash and the SHA256 of bytes 32 "
+"through bytes 223"
+msgstr ""
+"xor del hash de la identidad del ruter local y el SHA256 de los bytes "
+"desde el 32 hasta el 223"
#: i2p2www/pages/site/docs/transport/ntcp.html:535
msgid "Check connection is completely disabled as of release 0.9.12."
-msgstr "La comprobación de la conexión está completamente deshabilitada desde la versión 0.9.12."
+msgstr ""
+"La comprobación de la conexión está completamente deshabilitada desde la "
+"versión 0.9.12."
#: i2p2www/pages/site/docs/transport/ntcp.html:539
msgid "Discussion"
@@ -13935,28 +22398,43 @@ msgstr "Ahora en al Página de discusión de NTCP."
#: i2p2www/pages/site/docs/transport/ntcp.html:546
msgid "The maximum message size should be increased to approximately 32 KB."
-msgstr "El tamaño máximo del mensaje debería aumentarse hasta aproximadamente 32 KB"
+msgstr ""
+"El tamaño máximo del mensaje debería aumentarse hasta aproximadamente 32 "
+"KB"
#: i2p2www/pages/site/docs/transport/ntcp.html:550
msgid ""
"A set of fixed packet sizes may be appropriate to further hide the data \n"
-"fragmentation to external adversaries, but the tunnel, garlic, and end to \n"
+"fragmentation to external adversaries, but the tunnel, garlic, and end to"
+" \n"
"end padding should be sufficient for most needs until then.\n"
-"However, there is currently no provision for padding beyond the next 16-byte boundary,\n"
+"However, there is currently no provision for padding beyond the next "
+"16-byte boundary,\n"
"to create a limited number of message sizes."
-msgstr "Un conjunto de tamaños de paquetes fijos podría ser apropiado para ocultar aún más la fragmentación de los datos a adversarios externos, pero el túnel garlic y el relleno de fin a fin deberían ser suficientes para la mayoría de las necesidades hasta entonces. Sin embargo, actualmente no se realiza el relleno más allá del límite de 16 bytes, para crear un número limitado de tamaños de mensajes."
+msgstr ""
+"Un conjunto de tamaños de paquetes fijos podría ser apropiado para "
+"ocultar aún más la fragmentación de los datos a adversarios externos, "
+"pero el túnel garlic y el relleno de fin a fin deberían ser suficientes "
+"para la mayoría de las necesidades hasta entonces. Sin embargo, "
+"actualmente no se realiza el relleno más allá del límite de 16 bytes, "
+"para crear un número limitado de tamaños de mensajes."
#: i2p2www/pages/site/docs/transport/ntcp.html:558
msgid ""
"Memory utilization (including that of the kernel) for NTCP should be "
"compared to that for SSU."
-msgstr "La utilización de la memoria (incluyendo la del kerne) para NTCP debería compararse con la del SSU."
+msgstr ""
+"La utilización de la memoria (incluyendo la del kerne) para NTCP debería "
+"compararse con la del SSU."
#: i2p2www/pages/site/docs/transport/ntcp.html:562
msgid ""
"Can the establishment messages be randomly padded somehow, to frustrate\n"
"identification of I2P traffic based on initial packet sizes?"
-msgstr "¿Pueden ser rellenado aleatoriamente de alguna forma el mensaje establecido, para evitar la identificación del tráfico I2P basado en el tamaño del paquete inicial?"
+msgstr ""
+"¿Pueden ser rellenado aleatoriamente de alguna forma el mensaje "
+"establecido, para evitar la identificación del tráfico I2P basado en el "
+"tamaño del paquete inicial?"
#: i2p2www/pages/site/docs/transport/ssu.html:2
msgid "Secure Semireliable UDP"
@@ -13965,24 +22443,42 @@ msgstr "UDP seguro sem-ifiable "
#: i2p2www/pages/site/docs/transport/ssu.html:7
#, python-format
msgid ""
-"SSU (also called \"UDP\" in much of the I2P documentation and user interfaces)\n"
-"is one of two transports currently implemented in I2P.\n"
+"SSU (also called \"UDP\" in much of the I2P documentation and user "
+"interfaces)\n"
+"is one of two transports currently "
+"implemented in I2P.\n"
"The other is NTCP."
-msgstr "SSU (también llamado \"UDP\" en gran parte de la documentación de I2P y de los interfaces de usuario) es uno de los dos transportes actualmente implementados en I2P. El otro es NTCP."
+msgstr ""
+"SSU (también llamado \"UDP\" en gran parte de la documentación de I2P y "
+"de los interfaces de usuario) es uno de los dos transportes actualmente implementados en I2P."
+" El otro es NTCP."
#: i2p2www/pages/site/docs/transport/ssu.html:13
msgid ""
"SSU is the newer of the two transports,\n"
"introduced in I2P release 0.6.\n"
-"In a standard I2P installation, the router uses both NTCP and SSU for outbound connections.\n"
+"In a standard I2P installation, the router uses both NTCP and SSU for "
+"outbound connections.\n"
"SSU-over-IPv6 is supported as of version 0.9.8."
-msgstr "SSU es el más reciente de los dos transportes,\nintroducidos en la versión 0.6 de I2P.\nEn una instalación I2P standard, el router usa tanto NTCP como SSU para conexiones salientes.\nSSU-sobre-IPv6 está soportado desde la versión 0.9.8."
+msgstr ""
+"SSU es el más reciente de los dos transportes,\n"
+"introducidos en la versión 0.6 de I2P.\n"
+"En una instalación I2P standard, el router usa tanto NTCP como SSU para "
+"conexiones salientes.\n"
+"SSU-sobre-IPv6 está soportado desde la versión 0.9.8."
#: i2p2www/pages/site/docs/transport/ssu.html:20
msgid ""
-"SSU is called \"semireliable\" because it will repeatedly retransmit unacknowledged messages,\n"
-"but only up to a maximum number of times. After that, the message is dropped."
-msgstr "SSU (UDP seguro semiconfiable) se llama \"semiconfiable\" porque retransmitirá repetidamente mensajes\nde no recepción, pero sólo hasta un número máximo de veces. Después de eso, el mensaje es abandonado."
+"SSU is called \"semireliable\" because it will repeatedly retransmit "
+"unacknowledged messages,\n"
+"but only up to a maximum number of times. After that, the message is "
+"dropped."
+msgstr ""
+"SSU (UDP seguro semiconfiable) se llama \"semiconfiable\" porque "
+"retransmitirá repetidamente mensajes\n"
+"de no recepción, pero sólo hasta un número máximo de veces. Después de "
+"eso, el mensaje es abandonado."
#: i2p2www/pages/site/docs/transport/ssu.html:25
msgid "SSU Services"
@@ -13990,26 +22486,39 @@ msgstr "Servicios SSU"
#: i2p2www/pages/site/docs/transport/ssu.html:27
msgid ""
-"Like the NTCP transport, SSU provides reliable, encrypted, connection-oriented, point-to-point data transport.\n"
-"Unique to SSU, it also provides IP detection and NAT traversal services, including:"
-msgstr "Al igual que el transporte NTCP, SSU proporciona un transporte de datos de punto apunto cifrado y seguro orientado a conexión. A diferencia de SSU, también proporciona detección de servicios de NAT trasversales, incluyendo:"
+"Like the NTCP transport, SSU provides reliable, encrypted, connection-"
+"oriented, point-to-point data transport.\n"
+"Unique to SSU, it also provides IP detection and NAT traversal services, "
+"including:"
+msgstr ""
+"Al igual que el transporte NTCP, SSU proporciona un transporte de datos "
+"de punto apunto cifrado y seguro orientado a conexión. A diferencia de "
+"SSU, también proporciona detección de servicios de NAT trasversales, "
+"incluyendo:"
#: i2p2www/pages/site/docs/transport/ssu.html:33
msgid ""
"Cooperative NAT/Firewall traversal using introducers"
-msgstr "NAT/cortafuego trasversal cooperativo usando introductores"
+msgstr ""
+"NAT/cortafuego trasversal cooperativo usando introductores"
#: i2p2www/pages/site/docs/transport/ssu.html:34
msgid ""
"Local IP detection by inspection of incoming packets and peer testing"
-msgstr "Detección de la IP local inspeccionado los paquetes de entrada y la prueba de pares "
+msgstr ""
+"Detección de la IP local inspeccionado los paquetes de entrada y la prueba de pares "
#: i2p2www/pages/site/docs/transport/ssu.html:35
msgid ""
-"Communication of firewall status and local IP, and changes to either to NTCP"
-msgstr "Comunicación del estado del cortafuegos y de la IP local, y los cambios en cualquiera de ellos a NTCP "
+"Communication of firewall status and local IP, and changes to either to "
+"NTCP"
+msgstr ""
+"Comunicación del estado del cortafuegos y de la IP local, y los cambios "
+"en cualquiera de ellos a NTCP "
#: i2p2www/pages/site/docs/transport/ssu.html:47
#: i2p2www/pages/site/docs/transport/ssu.html:54
@@ -14035,73 +22544,125 @@ msgid ""
"and the capacity for high throughput allows a great deal of latitude in\n"
"congestion control. The congestion control algorithm outlined below is\n"
"meant to be both efficient in bandwidth as well as simple to implement."
-msgstr "Gracias a sólo necesitar SSU el envío semi fiable, a las conexiones amigables con TCP, y al haber capacidad para un gran rendimiento, se permite un amplio abanico de posibilidades en el control de gestión. El algoritmo de control de gestión esbozado abajo se supone eficiente en el gasto de ancho de banda y simple de implementar."
+msgstr ""
+"Gracias a sólo necesitar SSU el envío semi fiable, a las conexiones "
+"amigables con TCP, y al haber capacidad para un gran rendimiento, se "
+"permite un amplio abanico de posibilidades en el control de gestión. El "
+"algoritmo de control de gestión esbozado abajo se supone eficiente en el "
+"gasto de ancho de banda y simple de implementar."
#: i2p2www/pages/site/docs/transport/ssu.html:84
msgid ""
"Packets are scheduled according to the router's policy, taking care\n"
"not to exceed the router's outbound capacity or to exceed the measured \n"
"capacity of the remote peer. The measured capacity operates along the\n"
-"lines of TCP's slow start and congestion avoidance, with additive increases\n"
-"to the sending capacity and multiplicative decreases in face of congestion.\n"
+"lines of TCP's slow start and congestion avoidance, with additive "
+"increases\n"
+"to the sending capacity and multiplicative decreases in face of "
+"congestion.\n"
"Unlike for TCP, routers may give up on some messages after\n"
-"a given period or number of retransmissions while continuing to transmit \n"
+"a given period or number of retransmissions while continuing to transmit"
+" \n"
"other messages."
-msgstr "Los paquetes son programados de acuerdo con la política del ruter, teniendo cuidado de no exceder la capacidad de salida del ruter o de exceder la capacidad medida en el par remoto. La capacidad medida opera según el inicio lento y la prevención de la congestión de TCP, con aumentos que se suman a la capacidad de envío y disminuciones en caso de congestión. Al contrario que TCP, algunos ruters pueden renunciar a algunos mensajes despues de un periodo indicado o un número de retransmisiones, mientras que continúa transmitiendo otros mensajes."
+msgstr ""
+"Los paquetes son programados de acuerdo con la política del ruter, "
+"teniendo cuidado de no exceder la capacidad de salida del ruter o de "
+"exceder la capacidad medida en el par remoto. La capacidad medida opera "
+"según el inicio lento y la prevención de la congestión de TCP, con "
+"aumentos que se suman a la capacidad de envío y disminuciones en caso de "
+"congestión. Al contrario que TCP, algunos ruters pueden renunciar a "
+"algunos mensajes despues de un periodo indicado o un número de "
+"retransmisiones, mientras que continúa transmitiendo otros mensajes."
#: i2p2www/pages/site/docs/transport/ssu.html:95
msgid ""
"The congestion detection techniques vary from TCP as well, since each \n"
-"message has its own unique and nonsequential identifier, and each message\n"
-"has a limited size - at most, 32KB. To efficiently transmit this feedback\n"
+"message has its own unique and nonsequential identifier, and each message"
+"\n"
+"has a limited size - at most, 32KB. To efficiently transmit this "
+"feedback\n"
"to the sender, the receiver periodically includes a list of fully ACKed \n"
-"message identifiers and may also include bitfields for partially received\n"
+"message identifiers and may also include bitfields for partially received"
+"\n"
"messages, where each bit represents the reception of a fragment. If \n"
"duplicate fragments arrive, the message should be ACKed again, or if the\n"
"message has still not been fully received, the bitfield should be \n"
"retransmitted with any new updates."
-msgstr "Las técnicas de detección de congestión tampoco son iguales a las de TCP, ya que cada mensaje tiene su identificador único y no secuencial, y cada mensaje tiene un tamaño limitado - como máximo, 32 KB. Para transmitir eficientemente esta respuesta al remitente, el receptor periódicamente incluye una lista de identificadores de mensaje totalmente 'ACKed' y también puede incluir campos de bits, 'bitfields', para los mensajes recibidos parcialmente, donde cada bit representa la recogida de un fragmento. Si llegan fragmentos duplicados, el mensaje deber ser 'ACKed' de nuevo, o si el mensaje aún no ha sido recibido en su totalidad, el bitfield debería ser retransmitido con cualquier nuevo cambio."
+msgstr ""
+"Las técnicas de detección de congestión tampoco son iguales a las de TCP,"
+" ya que cada mensaje tiene su identificador único y no secuencial, y cada"
+" mensaje tiene un tamaño limitado - como máximo, 32 KB. Para transmitir "
+"eficientemente esta respuesta al remitente, el receptor periódicamente "
+"incluye una lista de identificadores de mensaje totalmente 'ACKed' y "
+"también puede incluir campos de bits, 'bitfields', para los mensajes "
+"recibidos parcialmente, donde cada bit representa la recogida de un "
+"fragmento. Si llegan fragmentos duplicados, el mensaje deber ser 'ACKed' "
+"de nuevo, o si el mensaje aún no ha sido recibido en su totalidad, el "
+"bitfield debería ser retransmitido con cualquier nuevo cambio."
#: i2p2www/pages/site/docs/transport/ssu.html:107
msgid ""
"The current implementation does not pad the packets to\n"
-"any particular size, but instead just places a single message fragment into\n"
+"any particular size, but instead just places a single message fragment "
+"into\n"
"a packet and sends it off (careful not to exceed the MTU)."
-msgstr "La implementación actual no rellena los paquetes a un tamaño en particular, en cambio simplemente coloca un solo fragmento de un mensaje dentro de un paquete y lo envía para fuera (con cuidado de no exceder el MTU)."
+msgstr ""
+"La implementación actual no rellena los paquetes a un tamaño en "
+"particular, en cambio simplemente coloca un solo fragmento de un mensaje "
+"dentro de un paquete y lo envía para fuera (con cuidado de no exceder el "
+"MTU)."
#: i2p2www/pages/site/docs/transport/ssu.html:114
msgid ""
"As of router version 0.8.12,\n"
"two MTU values are used for IPv4: 620 and 1484.\n"
-"The MTU value is adjusted based on the percentage of packets that are retransmitted."
-msgstr "A partir de la versión del ruter 0.8.12 se usan dos valores de MTU para IPv4: 620 y 1484. El valor del MTU es reajustado dependiendo del porcentaje de paquetes que es retrasnmitido."
+"The MTU value is adjusted based on the percentage of packets that are "
+"retransmitted."
+msgstr ""
+"A partir de la versión del ruter 0.8.12 se usan dos valores de MTU para "
+"IPv4: 620 y 1484. El valor del MTU es reajustado dependiendo del "
+"porcentaje de paquetes que es retrasnmitido."
#: i2p2www/pages/site/docs/transport/ssu.html:120
msgid ""
"For both MTU values, it is desirable that (MTU % 16) == 12, so that\n"
"the payload portion after the 28-byte IP/UDP header is a multiple of\n"
"16 bytes, for encryption purposes."
-msgstr "Para ambos valores MTU (unidad máxima de transmisión), es deseable que (MTU % 16 == 12), así que la porción de la carga tras la cabecera \nde 28-bytes IP/UDP es un múltiplo de 16 bytes, para propositos de cifrado."
+msgstr ""
+"Para ambos valores MTU (unidad máxima de transmisión), es deseable que "
+"(MTU % 16 == 12), así que la porción de la carga tras la cabecera \n"
+"de 28-bytes IP/UDP es un múltiplo de 16 bytes, para propositos de cifrado."
#: i2p2www/pages/site/docs/transport/ssu.html:126
msgid ""
"For the small MTU value, it is desirable to pack a 2646-byte\n"
"Variable Tunnel Build Message efficiently into multiple packets;\n"
"with a 620-byte MTU, it fits into 5 packets with nicely."
-msgstr "Para el valor más pequeño de MTU, es preferible empaquetar un mensaje de construcción de túnel variable de 2646 bytes eficientemente dentro de múltiples paquetes; el MTU de 620 bytes encaja bien dentro de 5 paquetes."
+msgstr ""
+"Para el valor más pequeño de MTU, es preferible empaquetar un mensaje de "
+"construcción de túnel variable de 2646 bytes eficientemente dentro de "
+"múltiples paquetes; el MTU de 620 bytes encaja bien dentro de 5 paquetes."
#: i2p2www/pages/site/docs/transport/ssu.html:132
msgid ""
-"Based on measurements, 1492 fits nearly all reasonably small I2NP messages\n"
-"(larger I2NP messages may be up to 1900 to 4500 bytes, which isn't going to fit\n"
+"Based on measurements, 1492 fits nearly all reasonably small I2NP "
+"messages\n"
+"(larger I2NP messages may be up to 1900 to 4500 bytes, which isn't going "
+"to fit\n"
"into a live network MTU anyway)."
-msgstr "Basado en las mediciones, 1492 encaja en casi todos los mensajes I2NP razonablemente pequeños (los mensajes I2NP más grandes pueden ser desde 1900 hasta 4500 bytes, que de todas formas no encajarían dentro del MTU de la red)."
+msgstr ""
+"Basado en las mediciones, 1492 encaja en casi todos los mensajes I2NP "
+"razonablemente pequeños (los mensajes I2NP más grandes pueden ser desde "
+"1900 hasta 4500 bytes, que de todas formas no encajarían dentro del MTU "
+"de la red)."
#: i2p2www/pages/site/docs/transport/ssu.html:138
msgid ""
"The MTU values were 608 and 1492 for releases 0.8.9 - 0.8.11.\n"
"The large MTU was 1350 prior to release 0.8.9."
-msgstr "Los valores del MTU eran 608 y 1492 para las versiones 0.8.9 - 0.8.11. El MTU largo era de 1350 en las versiones anteriores a la 0.8.9."
+msgstr ""
+"Los valores del MTU eran 608 y 1492 para las versiones 0.8.9 - 0.8.11. El"
+" MTU largo era de 1350 en las versiones anteriores a la 0.8.9."
#: i2p2www/pages/site/docs/transport/ssu.html:143
msgid ""
@@ -14109,21 +22670,32 @@ msgid ""
"is 1571 bytes as of release 0.8.12.\n"
"For releases 0.8.9 - 0.8.11 it was 1535 bytes.\n"
"Prior to release 0.8.9 it was 2048 bytes."
-msgstr "Para la versión 0.8.12 el tamaño máximo del paquete recibido es de 1571 bytes. Para las versiones 0.8.9 - 0.8.11 era de 1535 bytes. Para las versiones anteriores a 0.8.9 era de 2048 bytes. "
+msgstr ""
+"Para la versión 0.8.12 el tamaño máximo del paquete recibido es de 1571 "
+"bytes. Para las versiones 0.8.9 - 0.8.11 era de 1535 bytes. Para las "
+"versiones anteriores a 0.8.9 era de 2048 bytes. "
#: i2p2www/pages/site/docs/transport/ssu.html:150
msgid ""
-"As of release 0.9.2, if a router's network interface MTU is less than 1484,\n"
+"As of release 0.9.2, if a router's network interface MTU is less than "
+"1484,\n"
"it will publish that in the network database, and other routers should\n"
"honor that when a connection is established."
-msgstr "A partir de la versión 0.9.2, si el MTU del interfaz de red del ruter es menor de 1484, esto será publicado en la base de datos de la red, y los otros ruters deberían respetarlo cuando una conexión es establecida."
+msgstr ""
+"A partir de la versión 0.9.2, si el MTU del interfaz de red del ruter es "
+"menor de 1484, esto será publicado en la base de datos de la red, y los "
+"otros ruters deberían respetarlo cuando una conexión es establecida."
#: i2p2www/pages/site/docs/transport/ssu.html:156
msgid ""
"For IPv6, the minimum MTU is 1280. The IPv6 IP/UDP header is 48 bytes,\n"
"so we use an MTU where (MTN % 16 == 0), which is true for 1280.\n"
"The maximum IPv6 MTU is 1472."
-msgstr "Para IPv6, la mínima MTU (unidad de transmisión máxima) es 1280.\nLa cabecera IP/UDP IPv6 es de 48 bytes, así que usamos una MTU\ndonde (MTN % 16 == 0), lo que es cierto para 1280.\nLa máxima MTU IPv6 es 1472."
+msgstr ""
+"Para IPv6, la mínima MTU (unidad de transmisión máxima) es 1280.\n"
+"La cabecera IP/UDP IPv6 es de 48 bytes, así que usamos una MTU\n"
+"donde (MTN % 16 == 0), lo que es cierto para 1280.\n"
+"La máxima MTU IPv6 es 1472."
#: i2p2www/pages/site/docs/transport/ssu.html:162
msgid "Message Size Limits"
@@ -14132,14 +22704,26 @@ msgstr "Límites de los tamaños de mensaje"
#: i2p2www/pages/site/docs/transport/ssu.html:163
msgid ""
"While the maximum message size is nominally 32KB, the practical\n"
-"limit differs. The protocol limits the number of fragments to 7 bits, or 128.\n"
-"The current implementation, however, limits each message to a maximum of 64 fragments,\n"
+"limit differs. The protocol limits the number of fragments to 7 bits, or "
+"128.\n"
+"The current implementation, however, limits each message to a maximum of "
+"64 fragments,\n"
"which is sufficient for 64 * 534 = 33.3 KB when using the 608 MTU.\n"
-"Due to overhead for bundled LeaseSets and session keys, the practical limit\n"
+"Due to overhead for bundled LeaseSets and session keys, the practical "
+"limit\n"
"at the application level is about 6KB lower, or about 26KB.\n"
"Further work is necessary to raise the UDP transport limit above 32KB.\n"
"For connections using the larger MTU, larger messages are possible."
-msgstr "Mientras que normalmente el tamaño máximo de un mensaje es de 32KB, los límites prácticos difieren. El protocolo limita el número de fragmentos a 7 bits, o 128. La implementación actual limita cada mensaje a un máximo de 64 fragmentos, lo cual es suficiente para, 64 * 534 = 33.3 KB, cuando se usa el MTU de 608. Debido al gasto de las claves de sesión y los LeaseSets incluidos, el límite práctico en el nivel de aplicación es alrededor de 6KB menos, o alrededor de 26KB. Se necesita más trabajo para poder aumentar el límite del transporte UDP por encima de 32KB. Para las conexiones que usan un MTU más largo, son posibles mensajes más largos."
+msgstr ""
+"Mientras que normalmente el tamaño máximo de un mensaje es de 32KB, los "
+"límites prácticos difieren. El protocolo limita el número de fragmentos a"
+" 7 bits, o 128. La implementación actual limita cada mensaje a un máximo "
+"de 64 fragmentos, lo cual es suficiente para, 64 * 534 = 33.3 KB, cuando "
+"se usa el MTU de 608. Debido al gasto de las claves de sesión y los "
+"LeaseSets incluidos, el límite práctico en el nivel de aplicación es "
+"alrededor de 6KB menos, o alrededor de 26KB. Se necesita más trabajo para"
+" poder aumentar el límite del transporte UDP por encima de 32KB. Para las"
+" conexiones que usan un MTU más largo, son posibles mensajes más largos."
#: i2p2www/pages/site/docs/transport/ssu.html:185
msgid "Keys"
@@ -14149,10 +22733,21 @@ msgstr "Claves"
msgid ""
"All encryption used is AES256/CBC with 32 byte keys and 16 byte IVs.\n"
"When Alice originates a session with Bob,\n"
-"the MAC and session keys are negotiated as part of the DH exchange, and are then used\n"
+"the MAC and session keys are negotiated as part of the DH exchange, and "
+"are then used\n"
"for the HMAC and encryption, respectively. During the DH exchange, \n"
"Bob's publicly knowable introKey is used for the MAC and encryption."
-msgstr "Todo el cifrado que se usa es AES256/CBC con claves de 32 bytes e IVs (vectores de inicialización) de 16 bytes.\nCuando Alice origina una sesión con Bob, el MAC (código de autentificación de mensaje) y \nlas claves de sesión se negocian como parte de un intercambio DH (Diffie-Hellman), y luego se usan\nrespectivamente para el HMAC (MAC en un hash cifrado) y el cifrado (de la comunicación). Durante el intercambio DH, \nla introKey (clave de entrada) públicamente accesible de Bob se usa para el MAC y el cifrado (de la comunicación)."
+msgstr ""
+"Todo el cifrado que se usa es AES256/CBC con claves de 32 bytes e IVs "
+"(vectores de inicialización) de 16 bytes.\n"
+"Cuando Alice origina una sesión con Bob, el MAC (código de "
+"autentificación de mensaje) y \n"
+"las claves de sesión se negocian como parte de un intercambio DH (Diffie-"
+"Hellman), y luego se usan\n"
+"respectivamente para el HMAC (MAC en un hash cifrado) y el cifrado (de la"
+" comunicación). Durante el intercambio DH, \n"
+"la introKey (clave de entrada) públicamente accesible de Bob se usa para "
+"el MAC y el cifrado (de la comunicación)."
#: i2p2www/pages/site/docs/transport/ssu.html:195
msgid ""
@@ -14162,11 +22757,19 @@ msgid ""
"signing key used by Bob should already be known to Alice when she \n"
"contacts him, though Alice's DSA key may not already be known by \n"
"Bob."
-msgstr "Tanto el mensaje inicial como la subsiguiente respuesta usan\nla introKey (clave de introducción) de quien responde - quien responde no\nnecesita conocer la introKey del solicitante (Alice). La clave de firmado DSA\nusada por Bob ya debería ser conocida por Alice cuando ella contacte con\nél, aunque la clave DSA de Alice puede que aún no sea concocida por Bob."
+msgstr ""
+"Tanto el mensaje inicial como la subsiguiente respuesta usan\n"
+"la introKey (clave de introducción) de quien responde - quien responde no"
+"\n"
+"necesita conocer la introKey del solicitante (Alice). La clave de firmado"
+" DSA\n"
+"usada por Bob ya debería ser conocida por Alice cuando ella contacte con\n"
+"él, aunque la clave DSA de Alice puede que aún no sea concocida por Bob."
#: i2p2www/pages/site/docs/transport/ssu.html:204
msgid ""
-"Upon receiving a message, the receiver checks the \"from\" IP address and port\n"
+"Upon receiving a message, the receiver checks the \"from\" IP address and"
+" port\n"
"with all established sessions - if there are matches,\n"
"that session's MAC keys are tested in the HMAC. If none\n"
"of those verify or if there are no matching IP addresses, the \n"
@@ -14174,7 +22777,15 @@ msgid ""
"the packet is dropped. If it does verify, it is interpreted \n"
"according to the message type, though if the receiver is overloaded,\n"
"it may be dropped anyway."
-msgstr "Tras recibir un mensaje, el destinatario comprueba la dirección IP y el puerto \"desde\" de todas las sesiones establecidas - si hay coincidencias, las claves MAC de sesión son probadas en el HMAC. Si ninguna de esas se verifican, o si no coinciden con la IP, el receptor prueba su introKey en el MAC, si esta no se verifica, el paquete es denegado. Si se verifica, es interpretado de acuerdo el tipo de mensaje, aunque si el destinatario está sobrecargado, puede que también sea desechado."
+msgstr ""
+"Tras recibir un mensaje, el destinatario comprueba la dirección IP y el "
+"puerto \"desde\" de todas las sesiones establecidas - si hay "
+"coincidencias, las claves MAC de sesión son probadas en el HMAC. Si "
+"ninguna de esas se verifican, o si no coinciden con la IP, el receptor "
+"prueba su introKey en el MAC, si esta no se verifica, el paquete es "
+"denegado. Si se verifica, es interpretado de acuerdo el tipo de mensaje, "
+"aunque si el destinatario está sobrecargado, puede que también sea "
+"desechado."
#: i2p2www/pages/site/docs/transport/ssu.html:215
msgid ""
@@ -14186,7 +22797,13 @@ msgid ""
"DataMessage with the wantReply flag set, and if Bob continually \n"
"fails to reply, she will assume the key is lost and reestablish a \n"
"new one."
-msgstr "Si Alice y Bob tienen una sesión establecida, pero Alice pierde las claves por alguna razón y quiere contactar con Bob, ella puede simplemente establecer una nueva sesión a través del SessionRequest y los mensajes relacionados. Si Bob ha perdido la clave pero Alice no lo sabe, ella primero intentará que le responda, y si Bob continúa sin responder, ella asumirá que la clave se perdió y restablecerá una nueva."
+msgstr ""
+"Si Alice y Bob tienen una sesión establecida, pero Alice pierde las "
+"claves por alguna razón y quiere contactar con Bob, ella puede "
+"simplemente establecer una nueva sesión a través del SessionRequest y los"
+" mensajes relacionados. Si Bob ha perdido la clave pero Alice no lo sabe,"
+" ella primero intentará que le responda, y si Bob continúa sin responder,"
+" ella asumirá que la clave se perdió y restablecerá una nueva."
#: i2p2www/pages/site/docs/transport/ssu.html:226
#, python-format
@@ -14194,14 +22811,18 @@ msgid ""
"For the DH key agreement,\n"
"RFC3526 2048bit\n"
"MODP group (#14) is used:"
-msgstr "Para el acuerdo de la clave DH, RFC3526 grupo MODP de 2048bit (#14) se utiliza:"
+msgstr ""
+"Para el acuerdo de la clave DH, RFC3526 grupo"
+" MODP de 2048bit (#14) se utiliza:"
#: i2p2www/pages/site/docs/transport/ssu.html:236
#, python-format
msgid ""
"These are the same p and g used for I2P's\n"
"ElGamal encryption."
-msgstr "Estos son los mismos p y g usados por el cifrado ElGamal de I2P."
+msgstr ""
+"Estos son los mismos p y g usados por el cifrado ElGamal de I2P."
#: i2p2www/pages/site/docs/transport/ssu.html:241
msgid "Replay prevention"
@@ -14213,7 +22834,11 @@ msgid ""
"with exceedingly old timestamps or those which reuse an IV. To\n"
"detect duplicate IVs, a sequence of Bloom filters are employed to\n"
"\"decay\" periodically so that only recently added IVs are detected."
-msgstr "La prevención de respuesta en la capa SSU ocurre denegando paquetes excesivamente viejos o aquellos que reutilizan un IV. Para detectar IVs duplicados, se utilizan una secuencia de filtros Bloom para \"destruirlos\", y así sólo se detecten los IVs añadidos recientemente."
+msgstr ""
+"La prevención de respuesta en la capa SSU ocurre denegando paquetes "
+"excesivamente viejos o aquellos que reutilizan un IV. Para detectar IVs "
+"duplicados, se utilizan una secuencia de filtros Bloom para "
+"\"destruirlos\", y así sólo se detecten los IVs añadidos recientemente."
#: i2p2www/pages/site/docs/transport/ssu.html:250
msgid ""
@@ -14222,7 +22847,13 @@ msgid ""
"are not in any particular order - in fact, they are likely to be\n"
"entirely random. The SSU layer makes no attempt at messageId \n"
"replay prevention - higher layers should take that into account."
-msgstr "Los mensajesId usados en los DataMessages son definidos en capas por encima del transporte SSU y son pasados a través transparentemente. Estos IDs no están en un orden en particular - de hecho, es probable que sean totalmente aleatorios. La capa SSU no intenta hacer prevención de respuesta en los messageId - las capas superiores deberían tener esto en cuenta."
+msgstr ""
+"Los mensajesId usados en los DataMessages son definidos en capas por "
+"encima del transporte SSU y son pasados a través transparentemente. Estos"
+" IDs no están en un orden en particular - de hecho, es probable que sean "
+"totalmente aleatorios. La capa SSU no intenta hacer prevención de "
+"respuesta en los messageId - las capas superiores deberían tener esto en "
+"cuenta."
#: i2p2www/pages/site/docs/transport/ssu.html:258
msgid "Addressing"
@@ -14234,21 +22865,30 @@ msgid ""
"a direct address, for when the peer is publicly reachable, or an\n"
"indirect address, for using a third party to introduce the peer.\n"
"There is no restriction on the number of addresses a peer may have."
-msgstr "Para contactar un par SSU, se necesita uno de estos datos: una dirección directa, para cuando el par sea accesible públicamente, o una dirección indirecta, para usar a un tercero para que introduzca al par. No hay restricción en el número de direcciones que un par puede tener."
+msgstr ""
+"Para contactar un par SSU, se necesita uno de estos datos: una dirección "
+"directa, para cuando el par sea accesible públicamente, o una dirección "
+"indirecta, para usar a un tercero para que introduzca al par. No hay "
+"restricción en el número de direcciones que un par puede tener."
#: i2p2www/pages/site/docs/transport/ssu.html:272
msgid ""
"Each of the addresses may also expose a series of options - special\n"
"capabilities of that particular peer. For a list of available\n"
"capabilities, see below."
-msgstr "Cada una de las direcciones puede mostrar una serie de opciones - capacidades especiales para un par en particular. Para una lista de capacidades disponibles, vea más abajo."
+msgstr ""
+"Cada una de las direcciones puede mostrar una serie de opciones - "
+"capacidades especiales para un par en particular. Para una lista de "
+"capacidades disponibles, vea más abajo."
#: i2p2www/pages/site/docs/transport/ssu.html:278
#, python-format
msgid ""
"The addresses, options, and capabilities are published in the network database."
-msgstr "Las direcciones, opciones y capacidades son publicadas en la base de datos de la red."
+msgstr ""
+"Las direcciones, opciones y capacidades son publicadas en la base de datos de la red."
#: i2p2www/pages/site/docs/transport/ssu.html:283
msgid "Direct Session Establishment"
@@ -14256,9 +22896,12 @@ msgstr "Establecimiento de una sesión directa"
#: i2p2www/pages/site/docs/transport/ssu.html:284
msgid ""
-"Direct session establishment is used when no third party is required for NAT traversal.\n"
+"Direct session establishment is used when no third party is required for "
+"NAT traversal.\n"
"The message sequence is as follows:"
-msgstr "El establecimiento de una sesión directa se usa cuando no hace falta un tercero para el NAT trasversal. La secuencia del mensaje es como sigue:"
+msgstr ""
+"El establecimiento de una sesión directa se usa cuando no hace falta un "
+"tercero para el NAT trasversal. La secuencia del mensaje es como sigue:"
#: i2p2www/pages/site/docs/transport/ssu.html:289
msgid "Connection establishment (direct)"
@@ -14268,7 +22911,9 @@ msgstr "Establecimiento de la conexión (directa)"
msgid ""
"Alice connects directly to Bob.\n"
"IPv6 is supported as of version 0.9.8."
-msgstr "Alice conecta directamente con Bob.\nIPv6 está soportado desde la versión 0.9.8."
+msgstr ""
+"Alice conecta directamente con Bob.\n"
+"IPv6 está soportado desde la versión 0.9.8."
#: i2p2www/pages/site/docs/transport/ssu.html:305
#, python-format
@@ -14276,10 +22921,17 @@ msgid ""
"After the SessionConfirmed message is received, Bob sends a small\n"
"DeliveryStatus message\n"
"as a confirmation.\n"
-"In this message, the 4-byte message ID is set to a random number, and the\n"
-"8-byte \"arrival time\" is set to the current network-wide ID, which is 2\n"
+"In this message, the 4-byte message ID is set to a random number, and the"
+"\n"
+"8-byte \"arrival time\" is set to the current network-wide ID, which is 2"
+"\n"
"(i.e. 0x0000000000000002)."
-msgstr "Después de que se haya recibido el SessionConfirmed, Bob envía un pequeño mensaje DeliveryStatus como confirmación. En este mensaje, el ID de 4 bytes es aleatorio, y el \"tiempo de llegada\" de 8 bytes es el ID de toda la red actual, el cual es 2 (por ejemplo 0x0000000000000002)."
+msgstr ""
+"Después de que se haya recibido el SessionConfirmed, Bob envía un pequeño"
+" mensaje DeliveryStatus "
+"como confirmación. En este mensaje, el ID de 4 bytes es aleatorio, y el "
+"\"tiempo de llegada\" de 8 bytes es el ID de toda la red actual, el cual "
+"es 2 (por ejemplo 0x0000000000000002)."
#: i2p2www/pages/site/docs/transport/ssu.html:314
#, python-format
@@ -14288,20 +22940,30 @@ msgid ""
"DatabaseStore messages\n"
"containing their\n"
"RouterInfos."
-msgstr "Después de ser enviado el mensaje, los pares intercambia mensajes DatabaseStore conteniendo sus RouterInfos. "
+msgstr ""
+"Después de ser enviado el mensaje, los pares intercambia mensajes DatabaseStore "
+"conteniendo sus RouterInfos. "
#: i2p2www/pages/site/docs/transport/ssu.html:322
msgid ""
-"It does not appear that the type of the status message or its contents matters.\n"
+"It does not appear that the type of the status message or its contents "
+"matters.\n"
"It was originally added becasue the DatabaseStore message was delayed\n"
"several seconds; since the store is now sent immediately, perhaps\n"
"the status message can be eliminated."
-msgstr "No parece que importe el tipo del mensaje de estado o su contenidos . Se añadió originalmente porque el mensaje DatabaseStore era retardado varios segundos, desde que el mensaje es enviado inmediatamente, quizás el mensaje de estado se pueda eliminar."
+msgstr ""
+"No parece que importe el tipo del mensaje de estado o su contenidos . Se "
+"añadió originalmente porque el mensaje DatabaseStore era retardado varios"
+" segundos, desde que el mensaje es enviado inmediatamente, quizás el "
+"mensaje de estado se pueda eliminar."
#: i2p2www/pages/site/docs/transport/ssu.html:331
msgid ""
"Introduction keys are delivered through an external channel \n"
-"(the network database, where they are identical to the router Hash for now)\n"
+"(the network database, where they are identical to the router Hash for "
+"now)\n"
"and must be used when establishing a session key. For the indirect\n"
"address, the peer must first contact the relayhost and ask them for\n"
"an introduction to the peer known at that relayhost under the given\n"
@@ -14311,7 +22973,19 @@ msgid ""
"located. In addition, the peer establishing the connection must \n"
"already know the public keys of the peer they are connecting to (but\n"
"not necessary to any intermediary relay peer)."
-msgstr "Las claves introductorias son enviadas a través de un canal externo (la base de datos de la red, donde son idénticos al Hash del ruter, por ahora) y tienen que ser usados cuando se establece la clave de sesión. Para la dirección indirecta, el par primero tiene que contactar un relayhost y preguntar por una introducción para el par conocido en el relayhost bajo la etiqueta dada. Si es posible, el relayhost envía un mensaje al par direccionado diciéndole que contacte el par que está solicitando, y también indica al par solicitante la IP y el puerto den donde se encuentra el par direccionado. Además, el par que está estableciendo la conexión ya tiene que conocer las claves públicas del par con el que está conectando (pero no necesariamente a ninguno de los pares intermediarios)."
+msgstr ""
+"Las claves introductorias son enviadas a través de un canal externo (la "
+"base de datos de la red, donde son idénticos al Hash del ruter, por "
+"ahora) y tienen que ser usados cuando se establece la clave de sesión. "
+"Para la dirección indirecta, el par primero tiene que contactar un "
+"relayhost y preguntar por una introducción para el par conocido en el "
+"relayhost bajo la etiqueta dada. Si es posible, el relayhost envía un "
+"mensaje al par direccionado diciéndole que contacte el par que está "
+"solicitando, y también indica al par solicitante la IP y el puerto den "
+"donde se encuentra el par direccionado. Además, el par que está "
+"estableciendo la conexión ya tiene que conocer las claves públicas del "
+"par con el que está conectando (pero no necesariamente a ninguno de los "
+"pares intermediarios)."
#: i2p2www/pages/site/docs/transport/ssu.html:345
msgid ""
@@ -14319,34 +22993,62 @@ msgid ""
"is necessary for efficient NAT traversal. Charlie, a router behind a\n"
"NAT or firewall which does not allow unsolicited inbound UDP packets,\n"
"first contacts a few peers, choosing some to serve as introducers. Each\n"
-"of these peers (Bob, Bill, Betty, etc) provide Charlie with an introduction\n"
-"tag - a 4 byte random number - which he then makes available to the public\n"
-"as methods of contacting him. Alice, a router who has Charlie's published\n"
-"contact methods, first sends a RelayRequest packet to one or more of the \n"
+"of these peers (Bob, Bill, Betty, etc) provide Charlie with an "
+"introduction\n"
+"tag - a 4 byte random number - which he then makes available to the "
+"public\n"
+"as methods of contacting him. Alice, a router who has Charlie's "
+"published\n"
+"contact methods, first sends a RelayRequest packet to one or more of the"
+" \n"
"introducers, asking each to introduce her to Charlie (offering the \n"
"introduction tag to identify Charlie). Bob then forwards a RelayIntro\n"
-"packet to Charlie including Alice's public IP and port number, then sends\n"
-"Alice back a RelayResponse packet containing Charlie's public IP and port\n"
-"number. When Charlie receives the RelayIntro packet, he sends off a small\n"
-"random packet to Alice's IP and port (poking a hole in his NAT/firewall),\n"
+"packet to Charlie including Alice's public IP and port number, then sends"
+"\n"
+"Alice back a RelayResponse packet containing Charlie's public IP and port"
+"\n"
+"number. When Charlie receives the RelayIntro packet, he sends off a "
+"small\n"
+"random packet to Alice's IP and port (poking a hole in his NAT/firewall),"
+"\n"
"and when Alice receives Bob's RelayResponse packet, she begins a new \n"
"full direction session establishment with the specified IP and port."
-msgstr "El establecimiento de sesiones indirectas por parte de un tercero es necesario para el funcionamiento eficiente del NAT trasversal. Charlie, un ruter tras un NAT o cortafuegos que no permite paquetes UDP no solicitados de entrada, primero contacta con unos pocos pares, eligiendo algunos para usarlos como introductores. Cada uno de estos pares (Bob, Bill, Betty, etc) proporcionan a Charlie una etiqueta de introducción - un número aleatorio de 4 bytes -la cual él después hace público como una forma de contactarlo. Alice, un ruter que tiene publicado los métodos para contactar con Charlie, primero envía un paquete RelayReques a uno o más de los introductores, preguntando a cada uno para que le introduzca a Charlie (ofreciendo la etiqueta de introducción para identificar a Charlie). Bob entonces envía un paquete RelayIntro a Charlie incluyendo el puerto y la IP pública de Charlie. Cuando Charlie recibe el paquete RelayIntro, envía un pequeño paquete aleatorio al puerto e IP de Alice (creando un agujero en su NAT/cortafuegos), y cuando Alice recibe el paquete RelayResponse de Bob, ella empieza una establecimiento de sesión completamente nuevo con el puerto y la IP especificados. "
+msgstr ""
+"El establecimiento de sesiones indirectas por parte de un tercero es "
+"necesario para el funcionamiento eficiente del NAT trasversal. Charlie, "
+"un ruter tras un NAT o cortafuegos que no permite paquetes UDP no "
+"solicitados de entrada, primero contacta con unos pocos pares, eligiendo "
+"algunos para usarlos como introductores. Cada uno de estos pares (Bob, "
+"Bill, Betty, etc) proporcionan a Charlie una etiqueta de introducción - "
+"un número aleatorio de 4 bytes -la cual él después hace público como una "
+"forma de contactarlo. Alice, un ruter que tiene publicado los métodos "
+"para contactar con Charlie, primero envía un paquete RelayReques a uno o "
+"más de los introductores, preguntando a cada uno para que le introduzca a"
+" Charlie (ofreciendo la etiqueta de introducción para identificar a "
+"Charlie). Bob entonces envía un paquete RelayIntro a Charlie incluyendo "
+"el puerto y la IP pública de Charlie. Cuando Charlie recibe el paquete "
+"RelayIntro, envía un pequeño paquete aleatorio al puerto e IP de Alice "
+"(creando un agujero en su NAT/cortafuegos), y cuando Alice recibe el "
+"paquete RelayResponse de Bob, ella empieza una establecimiento de sesión "
+"completamente nuevo con el puerto y la IP especificados. "
#: i2p2www/pages/site/docs/transport/ssu.html:372
msgid "Connection establishment (indirect using an introducer)"
msgstr "Establecimiento de la conexión (usando un introductor indirecto)"
#: i2p2www/pages/site/docs/transport/ssu.html:374
-msgid ""
-"Alice first connects to introducer Bob, who relays the request to Charlie."
-msgstr "Alice primero se conecta al Bob introductor, que reenvía la petición a Charlie."
+msgid "Alice first connects to introducer Bob, who relays the request to Charlie."
+msgstr ""
+"Alice primero se conecta al Bob introductor, que reenvía la petición a "
+"Charlie."
#: i2p2www/pages/site/docs/transport/ssu.html:392
msgid ""
-"After the hole punch, the session is established between Alice and Charlie "
-"as in a direct establishment."
-msgstr "Después de la creación del agujero en el NAT, la sesión es establecida entre Alice y Charlie como si fuese directa."
+"After the hole punch, the session is established between Alice and "
+"Charlie as in a direct establishment."
+msgstr ""
+"Después de la creación del agujero en el NAT, la sesión es establecida "
+"entre Alice y Charlie como si fuese directa."
#: i2p2www/pages/site/docs/transport/ssu.html:404
msgid "Peer testing"
@@ -14359,7 +23061,12 @@ msgid ""
"execution, a peer will be able to determine their own reachability\n"
"and may update its behavior accordingly. The testing process is \n"
"quite simple:"
-msgstr "La automatización del las pruebas colaborativas de accesibilidad de un par es habilitada por una secuencia de mensajes PeerTest. Con su buen funcionamiento, el par será capaz de determinar su estado de accesibilidad y puede actualizar su comportamiento de acuerdo con ello. El proceso de prueba es bastante simple:"
+msgstr ""
+"La automatización del las pruebas colaborativas de accesibilidad de un "
+"par es habilitada por una secuencia de mensajes PeerTest. Con su buen "
+"funcionamiento, el par será capaz de determinar su estado de "
+"accesibilidad y puede actualizar su comportamiento de acuerdo con ello. "
+"El proceso de prueba es bastante simple:"
#: i2p2www/pages/site/docs/transport/ssu.html:425
msgid ""
@@ -14369,7 +23076,13 @@ msgid ""
"accordingly, and based upon the data received or the messages\n"
"missing, she will know her reachability. The various end states\n"
"that may be reached are as follows:"
-msgstr "Cada uno de los mensajes PeerTest lleva un nonce identificando las series de pruebas, como fueron inicializadas por Alice. Si Alice no recibe un mensaje en particular que estuviese esperando, ella retransmitirá de acuerdo con ello, y basándose en los datos recibidos o en los mensajes perdidos, ella conocerá su estado de accesibilidad. Los estados a los que puede llegar son:"
+msgstr ""
+"Cada uno de los mensajes PeerTest lleva un nonce identificando las series"
+" de pruebas, como fueron inicializadas por Alice. Si Alice no recibe un "
+"mensaje en particular que estuviese esperando, ella retransmitirá de "
+"acuerdo con ello, y basándose en los datos recibidos o en los mensajes "
+"perdidos, ella conocerá su estado de accesibilidad. Los estados a los que"
+" puede llegar son:"
#: i2p2www/pages/site/docs/transport/ssu.html:435
msgid ""
@@ -14379,7 +23092,13 @@ msgid ""
"rejecting all inbound UDP packets even in direct response to an\n"
"outbound packet. Alternately, Bob may be down or unable to get \n"
"Charlie to reply."
-msgstr "Si no recibe una respuesta de Bob, ella retransmitirá un número de veces dado, pero si nunca llega una respuesta, ella sabrá que su cortafuegos o NAT están desconfigurados de alguna forma, denegando todos los paquetes UDP de entrada incluso con una respuesta directa a un paquete de salida. Alternativamente, Bob puede estar caído o incapaz de hacer que Charlie responda."
+msgstr ""
+"Si no recibe una respuesta de Bob, ella retransmitirá un número de veces "
+"dado, pero si nunca llega una respuesta, ella sabrá que su cortafuegos o "
+"NAT están desconfigurados de alguna forma, denegando todos los paquetes "
+"UDP de entrada incluso con una respuesta directa a un paquete de salida. "
+"Alternativamente, Bob puede estar caído o incapaz de hacer que Charlie "
+"responda."
#: i2p2www/pages/site/docs/transport/ssu.html:444
msgid ""
@@ -14391,7 +23110,15 @@ msgid ""
"behind a NAT or firewall that is rejecting unsolicited connection\n"
"attempts and that port forwarding is not operating properly (the\n"
"IP and port that Bob offered up should be forwarded)."
-msgstr "Si Alice no recibe un mensaje PeerTest con el nonce esperado de una tercera parte (Charlie), retransmitirá su petición inicial a Bob un cierto número de veces, incluso si ya ha recibido la respuesta de Bob. Si el primer mensaje de Charlie no pasa a través, pero el de Bob sí, ella sabe que está tras un NAT o cortafuegos que deniega los intentos de conexiones no solicitadas y que el reenvío de ese puerto no funciona correctamente (la IP y el puerto que Bob ofrece deberían estar reenviados/forwarded)."
+msgstr ""
+"Si Alice no recibe un mensaje PeerTest con el nonce esperado de una "
+"tercera parte (Charlie), retransmitirá su petición inicial a Bob un "
+"cierto número de veces, incluso si ya ha recibido la respuesta de Bob. Si"
+" el primer mensaje de Charlie no pasa a través, pero el de Bob sí, ella "
+"sabe que está tras un NAT o cortafuegos que deniega los intentos de "
+"conexiones no solicitadas y que el reenvío de ese puerto no funciona "
+"correctamente (la IP y el puerto que Bob ofrece deberían estar "
+"reenviados/forwarded)."
#: i2p2www/pages/site/docs/transport/ssu.html:455
msgid ""
@@ -14402,7 +23129,14 @@ msgid ""
"different 'from' ports for each peer contacted. She will need to\n"
"explicitly forward a port and always have that port exposed for \n"
"remote connectivity, ignoring further port discovery."
-msgstr "Si Alice recibe el mensaje PeerTest de Bob y los dos mensajes PeerTest de Charle, pero la IP y el puerto de Bob adjuntos y el segundo mensaje de Charlie no coinciden, ella sabe que está bajo un NAT simétrico que está reescribiendo todos sus paquetes de salida con los puertos 'desde' cambiados para cada uno de los pares contactados. Ella necesitará abrir explícitamente un puerto y tener ese puesto expuesto siempre a las conexiones remotas, ignorando cualquier búsqueda de puertos futura."
+msgstr ""
+"Si Alice recibe el mensaje PeerTest de Bob y los dos mensajes PeerTest de"
+" Charle, pero la IP y el puerto de Bob adjuntos y el segundo mensaje de "
+"Charlie no coinciden, ella sabe que está bajo un NAT simétrico que está "
+"reescribiendo todos sus paquetes de salida con los puertos 'desde' "
+"cambiados para cada uno de los pares contactados. Ella necesitará abrir "
+"explícitamente un puerto y tener ese puesto expuesto siempre a las "
+"conexiones remotas, ignorando cualquier búsqueda de puertos futura."
#: i2p2www/pages/site/docs/transport/ssu.html:465
msgid ""
@@ -14410,7 +23144,11 @@ msgid ""
"she will retransmit her PeerTest message to Charlie up to a \n"
"certain number of times, but if no response is received she knows\n"
"that Charlie is either confused or no longer online."
-msgstr "Si Alice recibe el primer mensaje de Charlie pero no el segundo, ella retransmitirá su mensaje PeerTest a Charlie un cierto número de veces, pero si no se recibe ninguna respuesta sabrá que o Charlie está confundido o no está encendido."
+msgstr ""
+"Si Alice recibe el primer mensaje de Charlie pero no el segundo, ella "
+"retransmitirá su mensaje PeerTest a Charlie un cierto número de veces, "
+"pero si no se recibe ninguna respuesta sabrá que o Charlie está "
+"confundido o no está encendido."
#: i2p2www/pages/site/docs/transport/ssu.html:473
msgid ""
@@ -14421,7 +23159,15 @@ msgid ""
"IP from both Bob and Alice. If the first error condition occurs\n"
"(Alice doesn't get PeerTest messages from Bob), Alice may decide\n"
"to designate a new peer as Bob and try again with a different nonce."
-msgstr "Alice debería elegir a Bob arbitrariamente entre los pares conocidos que parezcan ser capaces de participar el las pruebas de pares. Bob a su vez debería elegir a Charlie arbitrariamente entre los pares conocidos que parezcan ser capaces de participar el las pruebas de pares y que están en una IP diferente a la de Bob y Alice. Si ocurre la primera condición de error (Alice no recibe el mensaje PeerTest de Bob), Alice puede decidir designar un nuevo par como Bob e intentar de nuevo con un nonce diferente."
+msgstr ""
+"Alice debería elegir a Bob arbitrariamente entre los pares conocidos que "
+"parezcan ser capaces de participar el las pruebas de pares. Bob a su vez "
+"debería elegir a Charlie arbitrariamente entre los pares conocidos que "
+"parezcan ser capaces de participar el las pruebas de pares y que están en"
+" una IP diferente a la de Bob y Alice. Si ocurre la primera condición de "
+"error (Alice no recibe el mensaje PeerTest de Bob), Alice puede decidir "
+"designar un nuevo par como Bob e intentar de nuevo con un nonce "
+"diferente."
#: i2p2www/pages/site/docs/transport/ssu.html:483
msgid ""
@@ -14430,7 +23176,12 @@ msgid ""
"session with Bob and so that Charlie can contact her without knowing\n"
"any additional information. Alice may go on to establish a session\n"
"with either Bob or Charlie, but it is not required."
-msgstr "La clave de introducción de Alice es incluida en todos los mensajes PeerTest para que no necesite una conexión ya establecida con Bob y para que Charlie pueda contactar con ella sin necesidad de tener más datos. Alice puede establecer una sesión con Bob o Charlie, pero no es necesario."
+msgstr ""
+"La clave de introducción de Alice es incluida en todos los mensajes "
+"PeerTest para que no necesite una conexión ya establecida con Bob y para "
+"que Charlie pueda contactar con ella sin necesidad de tener más datos. "
+"Alice puede establecer una sesión con Bob o Charlie, pero no es "
+"necesario."
#: i2p2www/pages/site/docs/transport/ssu.html:501
msgid "Transmission window, ACKs and Retransmissions"
@@ -14444,20 +23195,34 @@ msgid ""
"the data message section of\n"
"the protocol specification page\n"
"for details."
-msgstr "El mensaje de DATOS puede contener ACKs de mensajes completos y ACKs parciales de fragmentos individuales de un mensaje. Vea la sección de los mensajes de datos de la página de especificación del protocolo para más detalles."
+msgstr ""
+"El mensaje de DATOS puede contener ACKs de mensajes completos y ACKs "
+"parciales de fragmentos individuales de un mensaje. Vea la sección de los"
+" mensajes de datos de la página de especificación"
+" del protocolo para más detalles."
#: i2p2www/pages/site/docs/transport/ssu.html:510
#, python-format
msgid ""
-"The details of windowing, ACK, and retransmission strategies are not specified\n"
+"The details of windowing, ACK, and retransmission strategies are not "
+"specified\n"
"here. See the Java code for the current implementation.\n"
"During the establishment phase, and for peer testing, routers\n"
"should implement exponential backoff for retransmission.\n"
"For an established connection, routers should implement\n"
-"an adjustable transmission window, RTT estimate and timeout, similar to TCP\n"
+"an adjustable transmission window, RTT estimate and timeout, similar to "
+"TCP\n"
"or streaming.\n"
"See the code for initial, min and max parameters."
-msgstr "Los detalles de las Windows, ACKS y las estrategias de retransmisión no se especifican aquí. Vea el código de Java para ver la implementación actual. Durante la fase de establecimiento, y para las pruebas de pares, los ruters deberían implementar backoff exponencial para la retransmisión. Para una conexión establecida, los ruters deberían implementar una ventana de retransmisión ajustable, RTT estimado y tiempo de espera, similar al TCP o streaming. Vea el código para los valores iniciales, mínimos y máximos."
+msgstr ""
+"Los detalles de las Windows, ACKS y las estrategias de retransmisión no "
+"se especifican aquí. Vea el código de Java para ver la implementación "
+"actual. Durante la fase de establecimiento, y para las pruebas de pares, "
+"los ruters deberían implementar backoff exponencial para la "
+"retransmisión. Para una conexión establecida, los ruters deberían "
+"implementar una ventana de retransmisión ajustable, RTT estimado y tiempo"
+" de espera, similar al TCP o streaming. Vea"
+" el código para los valores iniciales, mínimos y máximos."
#: i2p2www/pages/site/docs/transport/ssu.html:522
msgid "Security"
@@ -14470,13 +23235,20 @@ msgid ""
"SSU messages (RelayRequest, RelayResponse, RelayIntro, PeerTest)\n"
"may not be legitimate.\n"
"Also, certain actions and responses may need to be rate-limited."
-msgstr "La dirección de la fuente UDP puede, por supuesto, ser falseada. Adicionalmente, las IPs y los puertos contenidos en los mensajes SSU específicos (RelayRequest, RelayResponse, RelayIntro, PeerTest) puede que no sean legítimos. Además, algunas acciones y respuestas pueden necesitar de ser vueltas a limitar."
+msgstr ""
+"La dirección de la fuente UDP puede, por supuesto, ser falseada. "
+"Adicionalmente, las IPs y los puertos contenidos en los mensajes SSU "
+"específicos (RelayRequest, RelayResponse, RelayIntro, PeerTest) puede que"
+" no sean legítimos. Además, algunas acciones y respuestas pueden "
+"necesitar de ser vueltas a limitar."
#: i2p2www/pages/site/docs/transport/ssu.html:531
msgid ""
"The details of validation are not specified\n"
"here. Implementers should add defenses where appropriate."
-msgstr "Los detalles de validación no están especificados aquí. Los desarrolladores deberían añadir defensas donde sea apropiado."
+msgstr ""
+"Los detalles de validación no están especificados aquí. Los "
+"desarrolladores deberían añadir defensas donde sea apropiado."
#: i2p2www/pages/site/docs/transport/ssu.html:537
msgid "Peer capabilities"
@@ -14487,38 +23259,61 @@ msgid ""
"If the peer address contains the 'B' capability, that means \n"
"they are willing and able to participate in peer tests as\n"
"a 'Bob' or 'Charlie'."
-msgstr "Si la dirección del par contiene la capacidad 'B', esto significa que desea y puede participar en una prueba de par como un 'Bob' o como un 'Charlie'."
+msgstr ""
+"Si la dirección del par contiene la capacidad 'B', esto significa que "
+"desea y puede participar en una prueba de par como un 'Bob' o como un "
+"'Charlie'."
#: i2p2www/pages/site/docs/transport/ssu.html:547
msgid ""
"If the peer address contains the 'C' capability, that means\n"
"they are willing and able to serve as an introducer - serving\n"
"as a Bob for an otherwise unreachable Alice."
-msgstr "Si la dirección del par contiene la capacidad 'C', esto significa que desea y puede servir como un introductor - funcionando como un Bob para un Alice, que de otra forma dería inaccesible."
+msgstr ""
+"Si la dirección del par contiene la capacidad 'C', esto significa que "
+"desea y puede servir como un introductor - funcionando como un Bob para "
+"un Alice, que de otra forma dería inaccesible."
#: i2p2www/pages/site/docs/transport/ssu.html:556
msgid ""
-"Analysis of current SSU performance, including assessment of window size adjustment\n"
-"and other parameters, and adjustment of the protocol implementation to improve\n"
+"Analysis of current SSU performance, including assessment of window size "
+"adjustment\n"
+"and other parameters, and adjustment of the protocol implementation to "
+"improve\n"
"performance, is a topic for future work."
-msgstr "El análisis del rendimiento actual del SSU es un tema para un trabajo futuro, incluyendo la valoración del ajuste del tamaño de ventana y otros parámetros, y el ajuste de la implementación del protocolo para mejorar el rendimiento."
+msgstr ""
+"El análisis del rendimiento actual del SSU es un tema para un trabajo "
+"futuro, incluyendo la valoración del ajuste del tamaño de ventana y otros"
+" parámetros, y el ajuste de la implementación del protocolo para mejorar "
+"el rendimiento."
#: i2p2www/pages/site/docs/transport/ssu.html:562
msgid ""
-"The current implementation repeatedly sends acknowledgments for the same packets,\n"
+"The current implementation repeatedly sends acknowledgments for the same "
+"packets,\n"
"which unnecessarily increases overhead."
-msgstr "La implementación actual envía repetidamente reconocimientos para los mismos paquetes, lo que aumenta la sobrecarga innecesariamente."
+msgstr ""
+"La implementación actual envía repetidamente reconocimientos para los "
+"mismos paquetes, lo que aumenta la sobrecarga innecesariamente."
#: i2p2www/pages/site/docs/transport/ssu.html:567
msgid ""
-"The default small MTU value of 620 should be analyzed and possibly increased.\n"
+"The default small MTU value of 620 should be analyzed and possibly "
+"increased.\n"
"The current MTU adjustment strategy should be evaluated.\n"
-"Does a streaming lib 1730-byte packet fit in 3 small SSU packets? Probably not."
-msgstr "El pequeño valor por defecto del MTU de 620 debería ser analizado y probablemente aumentado. La estrategia actual de adaptación del MTU debería ser evaluada. ¿Cabe un paquete de streaming de 1730 bytes en 3 paquetes pequeños SSU? Probablemente no."
+"Does a streaming lib 1730-byte packet fit in 3 small SSU packets? "
+"Probably not."
+msgstr ""
+"El pequeño valor por defecto del MTU de 620 debería ser analizado y "
+"probablemente aumentado. La estrategia actual de adaptación del MTU "
+"debería ser evaluada. ¿Cabe un paquete de streaming de 1730 bytes en 3 "
+"paquetes pequeños SSU? Probablemente no."
#: i2p2www/pages/site/docs/transport/ssu.html:573
msgid "The protocol should be extended to exchange MTUs during the setup."
-msgstr "El protocolo debería ser ampliado para intercambiar MTUs durante la configuración."
+msgstr ""
+"El protocolo debería ser ampliado para intercambiar MTUs durante la "
+"configuración."
#: i2p2www/pages/site/docs/transport/ssu.html:577
msgid "Rekeying is currently unimplemented and may never be."
@@ -14526,29 +23321,45 @@ msgstr "Rekeying no está implementado y puede que nunca lo esté."
#: i2p2www/pages/site/docs/transport/ssu.html:581
msgid ""
-"The potential use of the 'challenge' fields in RelayIntro and RelayResponse,\n"
-"and use of the padding field in SessionRequest and SessionCreated, is undocumented."
-msgstr "El uso potencial de los campos \"desafío\" en el RelayIntro y en el RelayResponse, y el uso del campo de relleno en el SessionRequest en el SessionCreated, no están documentados."
+"The potential use of the 'challenge' fields in RelayIntro and "
+"RelayResponse,\n"
+"and use of the padding field in SessionRequest and SessionCreated, is "
+"undocumented."
+msgstr ""
+"El uso potencial de los campos \"desafío\" en el RelayIntro y en el "
+"RelayResponse, y el uso del campo de relleno en el SessionRequest en el "
+"SessionCreated, no están documentados."
#: i2p2www/pages/site/docs/transport/ssu.html:586
msgid ""
"Instead of a single fragment per packet, a more efficient\n"
-"strategy may be to bundle multiple message fragments into the same packet,\n"
+"strategy may be to bundle multiple message fragments into the same "
+"packet,\n"
"so long as it doesn't exceed the MTU."
-msgstr "En vez de un sólo fragmento por paquete, una estrategia más eficiente podría ser el juntar varios fragmentos de mensajes dentro del mismo paquete, mientras no exceda el MTU."
+msgstr ""
+"En vez de un sólo fragmento por paquete, una estrategia más eficiente "
+"podría ser el juntar varios fragmentos de mensajes dentro del mismo "
+"paquete, mientras no exceda el MTU."
#: i2p2www/pages/site/docs/transport/ssu.html:592
msgid ""
"A set of fixed packet sizes may be appropriate to further hide the data \n"
-"fragmentation to external adversaries, but the tunnel, garlic, and end to \n"
+"fragmentation to external adversaries, but the tunnel, garlic, and end to"
+" \n"
"end padding should be sufficient for most needs until then."
-msgstr "Un conjunto de tamaños de paquetes podría ser apropiado para la ocultación futura de la fragmentación de los datos a adversarios externos, pero el túnel, garlic, y un relleno de fin a fin deberían ser suficiente para la mayoría de las necesidades hasta entonces."
+msgstr ""
+"Un conjunto de tamaños de paquetes podría ser apropiado para la "
+"ocultación futura de la fragmentación de los datos a adversarios "
+"externos, pero el túnel, garlic, y un relleno de fin a fin deberían ser "
+"suficiente para la mayoría de las necesidades hasta entonces."
#: i2p2www/pages/site/docs/transport/ssu.html:598
msgid ""
-"Why are introduction keys the same as the router hash, should it be changed,"
-" would there be any benefit?"
-msgstr "¿Por qué son las claves de introducción las mismas que el hash del ruter, deberían cambiarse, habría algún beneficio?"
+"Why are introduction keys the same as the router hash, should it be "
+"changed, would there be any benefit?"
+msgstr ""
+"¿Por qué son las claves de introducción las mismas que el hash del ruter,"
+" deberían cambiarse, habría algún beneficio?"
#: i2p2www/pages/site/docs/transport/ssu.html:602
msgid "Capacities appear to be unused."
@@ -14556,9 +23367,11 @@ msgstr "Las capacidades parecen estar sin usar."
#: i2p2www/pages/site/docs/transport/ssu.html:606
msgid ""
-"Signed-on times in SessionCreated and SessionConfirmed appear to be unused "
-"or unverified."
-msgstr "Los tiempos acordados en SessionCreated (sesión creada) y SessionConfirmed (sesión confirmada) parecen estar sin usar o verificar."
+"Signed-on times in SessionCreated and SessionConfirmed appear to be "
+"unused or unverified."
+msgstr ""
+"Los tiempos acordados en SessionCreated (sesión creada) y "
+"SessionConfirmed (sesión confirmada) parecen estar sin usar o verificar."
#: i2p2www/pages/site/docs/transport/ssu.html:611
msgid "Implementation Diagram"
@@ -14567,12 +23380,17 @@ msgstr "Diagrama de implementación"
#: i2p2www/pages/site/docs/transport/ssu.html:612
msgid ""
"This diagram\n"
-"should accurately reflect the current implementation, however there may be small differences."
-msgstr "El diagrama debe reflejar con exactitud la implementación actual, sin embargo puede haber muchas diferencias pequeñas."
+"should accurately reflect the current implementation, however there may "
+"be small differences."
+msgstr ""
+"El diagrama debe reflejar con exactitud la implementación actual, sin "
+"embargo puede haber muchas diferencias pequeñas."
#: i2p2www/pages/site/docs/transport/ssu.html:620
msgid "Now on the SSU specification page"
-msgstr "En la actualidad en la página de especificación SSU (UDP seguro semiconfiable)"
+msgstr ""
+"En la actualidad en la página de especificación SSU (UDP seguro "
+"semiconfiable)"
#: i2p2www/pages/site/docs/tunnels/implementation.html:2
msgid "Tunnel Implementation"
@@ -14595,13 +23413,33 @@ msgid ""
"Within I2P, messages are passed in one direction through a virtual\n"
"tunnel of peers, using whatever means are available to pass the \n"
"message on to the next hop. Messages arrive at the tunnel's \n"
-"gateway, get bundled up and/or fragmented into fixed-size tunnel messages, \n"
-"and are forwarded on to the next hop in the tunnel, which processes and verifies\n"
-"the validity of the message and sends it on to the next hop, and so on, until\n"
+"gateway, get bundled up and/or fragmented into fixed-size tunnel "
+"messages, \n"
+"and are forwarded on to the next hop in the tunnel, which processes and "
+"verifies\n"
+"the validity of the message and sends it on to the next hop, and so on, "
+"until\n"
"it reaches the tunnel endpoint. That endpoint takes the messages\n"
"bundled up by the gateway and forwards them as instructed - either\n"
"to another router, to another tunnel on another router, or locally."
-msgstr "Dentro de I2P, los mensajes se pasan en una dirección a través de un túnel \nvirtual de pares (`peers`), usando cualquier medio que esté disponible para \npasar el mensaje al siguiente salto. Los mensajes llegan a la pasarela \n(`gateway`) del túnel, son empaquetados y/o fragmentados en mensajes de \ntúnel de tamaño-fijo, y son reenviados hacia el siguiente salto en el túnel, \nque procesa y verifica la validez del mensaje y lo envía al siguiente salto, y \nasí sucesivamente, hasta que alcanza el extremo del túnel. Ese extremo \ntoma los mensajes empaquetados por la pasarela y los reenvía como se \nse le ha indicado - bien hacia otro router, bien hacia otro túnel en otro router, \no bien localmente."
+msgstr ""
+"Dentro de I2P, los mensajes se pasan en una dirección a través de un "
+"túnel \n"
+"virtual de pares (`peers`), usando cualquier medio que esté disponible "
+"para \n"
+"pasar el mensaje al siguiente salto. Los mensajes llegan a la "
+"pasarela \n"
+"(`gateway`) del túnel, son empaquetados y/o fragmentados en mensajes de \n"
+"túnel de tamaño-fijo, y son reenviados hacia el siguiente salto en el "
+"túnel, \n"
+"que procesa y verifica la validez del mensaje y lo envía al siguiente "
+"salto, y \n"
+"así sucesivamente, hasta que alcanza el extremo del túnel. Ese "
+"extremo \n"
+"toma los mensajes empaquetados por la pasarela y los reenvía como se \n"
+"se le ha indicado - bien hacia otro router, bien hacia otro túnel en otro"
+" router, \n"
+"o bien localmente."
#: i2p2www/pages/site/docs/tunnels/implementation.html:23
msgid ""
@@ -14611,7 +23449,15 @@ msgid ""
"tunnel creator, which serves as the tunnel endpoint. For outbound \n"
"tunnels, the tunnel creator serves as the gateway, passing messages\n"
"out to the remote endpoint."
-msgstr "Los túneles funcionan todos de la misma forma, pero pueden estar \nsegmentados en dos diferentes grupos - túneles de entrada o túneles de \nsalida. Los túneles de entrada tienen una pasarela (`gateway`) no confiable \nque pasa mensajes hacia el creador del túnel, que sirve como extremo del túnel. Para túneles de salida, el creador del túnel hace de pasarela pasando \nmensajes al exterior hacia el extremo remoto."
+msgstr ""
+"Los túneles funcionan todos de la misma forma, pero pueden estar \n"
+"segmentados en dos diferentes grupos - túneles de entrada o túneles de \n"
+"salida. Los túneles de entrada tienen una pasarela (`gateway`) no "
+"confiable \n"
+"que pasa mensajes hacia el creador del túnel, que sirve como extremo del "
+"túnel. Para túneles de salida, el creador del túnel hace de pasarela "
+"pasando \n"
+"mensajes al exterior hacia el extremo remoto."
#: i2p2www/pages/site/docs/tunnels/implementation.html:32
msgid ""
@@ -14619,11 +23465,26 @@ msgid ""
"in the tunnel, and provides each with the necessary configuration\n"
"data. They may have any number of hops.\n"
"It is the intent to make\n"
-"it hard for either participants or third parties to determine the length of \n"
-"a tunnel, or even for colluding participants to determine whether they are a\n"
-"part of the same tunnel at all (barring the situation where colluding peers are\n"
+"it hard for either participants or third parties to determine the length "
+"of \n"
+"a tunnel, or even for colluding participants to determine whether they "
+"are a\n"
+"part of the same tunnel at all (barring the situation where colluding "
+"peers are\n"
"next to each other in the tunnel)."
-msgstr "El creador del túnel selecciona exactamente qué pares (`peers`) participarán \nen el túnel, y proporciona a cada uno los datos de configuración necesarios. \nPueden tener cualquier número de saltos. La intención es hacer difícil, tanto \na los partícipantes en el túnel como a terceros, determinar la longitud de un \ntúnel, o incluso que unos participantes compinchados determinen si ellos \nforman parte de un mismo túnel (impidiendo la situación en la que pares compinchados estén próximos unos de otros en el túnel)."
+msgstr ""
+"El creador del túnel selecciona exactamente qué pares (`peers`) "
+"participarán \n"
+"en el túnel, y proporciona a cada uno los datos de configuración "
+"necesarios. \n"
+"Pueden tener cualquier número de saltos. La intención es hacer difícil, "
+"tanto \n"
+"a los partícipantes en el túnel como a terceros, determinar la longitud "
+"de un \n"
+"túnel, o incluso que unos participantes compinchados determinen si ellos"
+" \n"
+"forman parte de un mismo túnel (impidiendo la situación en la que pares "
+"compinchados estén próximos unos de otros en el túnel)."
#: i2p2www/pages/site/docs/tunnels/implementation.html:43
msgid ""
@@ -14633,7 +23494,15 @@ msgid ""
"performance needs. In addition, the router itself maintains a series\n"
"of pools for participating in the network database and for managing\n"
"the tunnels themselves."
-msgstr "En la práctica, una serie de depósitos (`pools`) de túneles se usan para diferentes propósitos - cada destino de cliente local tiene su propio \nconjunto de túneles de entrada configurados para alcanzar sus necesidades \nde anonimato y rendimiento. Además, el propio router mantiene una serie de depósitos para participar en la base de datos de red y para administrar \nlos propios túneles."
+msgstr ""
+"En la práctica, una serie de depósitos (`pools`) de túneles se usan para "
+"diferentes propósitos - cada destino de cliente local tiene su propio \n"
+"conjunto de túneles de entrada configurados para alcanzar sus necesidades"
+" \n"
+"de anonimato y rendimiento. Además, el propio router mantiene una serie "
+"de depósitos para participar en la base de datos de red y para "
+"administrar \n"
+"los propios túneles."
#: i2p2www/pages/site/docs/tunnels/implementation.html:52
msgid ""
@@ -14643,14 +23512,25 @@ msgid ""
"the core I2P layer, there is an optional end to end streaming library \n"
"available for client applications, exposing TCP-esque operation,\n"
"including message reordering, retransmission, congestion control, etc."
-msgstr "I2P es inherentemente una red de paquetes conmutados, incluso con estos \ntúneles, lo que le permite aprovechar la ventaja de múltiples túneles \nejecutándose en paralelo, incrementando la flexibilidad y el equilibrado de la\ncarga. Fuera del núcleo de la capa I2P, hay una librería streaming (de flujo) \nextremo a extremo opcional disponible para aplicaciones cliente, que \nofrece operaciones estilo-TCP, incluyendo reordenamiento de mensajes, \nretransmisión, control de congestión, etc."
+msgstr ""
+"I2P es inherentemente una red de paquetes conmutados, incluso con estos \n"
+"túneles, lo que le permite aprovechar la ventaja de múltiples túneles \n"
+"ejecutándose en paralelo, incrementando la flexibilidad y el equilibrado "
+"de la\n"
+"carga. Fuera del núcleo de la capa I2P, hay una librería streaming (de "
+"flujo) \n"
+"extremo a extremo opcional disponible para aplicaciones cliente, que \n"
+"ofrece operaciones estilo-TCP, incluyendo reordenamiento de mensajes, \n"
+"retransmisión, control de congestión, etc."
#: i2p2www/pages/site/docs/tunnels/implementation.html:61
#, python-format
msgid ""
"An overview of I2P tunnel terminology is\n"
"on the tunnel overview page."
-msgstr "Encontrará una introducción a la terminología de túneles I2P en la página de introducción a los túneles."
+msgstr ""
+"Encontrará una introducción a la terminología de túneles I2P en la página de introducción a los túneles."
#: i2p2www/pages/site/docs/tunnels/implementation.html:66
msgid "Tunnel Operation (Message Processing)"
@@ -14659,37 +23539,55 @@ msgstr "Operaciones de los túneles (procesamiento de mensajes)"
#: i2p2www/pages/site/docs/tunnels/implementation.html:69
#, python-format
msgid ""
-"After a tunnel is built, I2NP messages are processed and passed through it.\n"
+"After a tunnel is built, I2NP messages are "
+"processed and passed through it.\n"
"Tunnel operation has four distinct processes, taken on by various \n"
"peers in the tunnel."
-msgstr "Después de que un túnel sea erigido, los mensajes I2NP (protocolo de red I2P) se procesan y se pasan a través de él. Las operaciones de los túneles comprenden cuatro procesos diferentes, llevados \na cabo por diferentes pares (`peers`) en el túnel."
+msgstr ""
+"Después de que un túnel sea erigido, los mensajes "
+"I2NP (protocolo de red I2P) se procesan y se pasan a través de él. "
+"Las operaciones de los túneles comprenden cuatro procesos diferentes, "
+"llevados \n"
+"a cabo por diferentes pares (`peers`) en el túnel."
#: i2p2www/pages/site/docs/tunnels/implementation.html:75
msgid ""
"First, the tunnel gateway accumulates a number\n"
"of I2NP messages and preprocesses them into tunnel messages for\n"
"delivery."
-msgstr "Primero, la pasarela (`gateway`) del túnel acumula un número de mensajes I2NP y los preprocesa en mensajes de túnel para su entrega."
+msgstr ""
+"Primero, la pasarela (`gateway`) del túnel acumula un número de mensajes "
+"I2NP y los preprocesa en mensajes de túnel para su entrega."
#: i2p2www/pages/site/docs/tunnels/implementation.html:80
msgid ""
"Next, that gateway encrypts that preprocessed data, then\n"
"forwards it to the first hop."
-msgstr "Después, esa pasarela cifra los datos preprocesados, luego los reenvía al primer salto."
+msgstr ""
+"Después, esa pasarela cifra los datos preprocesados, luego los reenvía al"
+" primer salto."
#: i2p2www/pages/site/docs/tunnels/implementation.html:84
msgid ""
"That peer, and subsequent tunnel \n"
"participants, unwrap a layer of the encryption, verifying that it isn't\n"
"a duplicate, then forward it on to the next peer."
-msgstr "Ese par (`peer`), y los subsiguientes participantes en el túnel, desenvuelven \nuna capa del cifrado, verificando que no esté duplicada, y luego la \nreenvían hacia el siguiente par."
+msgstr ""
+"Ese par (`peer`), y los subsiguientes participantes en el túnel, "
+"desenvuelven \n"
+"una capa del cifrado, verificando que no esté duplicada, y luego la \n"
+"reenvían hacia el siguiente par."
#: i2p2www/pages/site/docs/tunnels/implementation.html:89
msgid ""
-"Eventually, the tunnel messages arrive at the endpoint where the I2NP messages\n"
+"Eventually, the tunnel messages arrive at the endpoint where the I2NP "
+"messages\n"
"originally bundled by the gateway are reassembled and forwarded on as \n"
"requested."
-msgstr "Eventualmente, los mensajes de túnel llegan al extremo donde los mensajes I2NP fueron originalmente empaquetados por la pasarela, \nentonces son reensamblados y reenviados de la forma requerida."
+msgstr ""
+"Eventualmente, los mensajes de túnel llegan al extremo donde los mensajes"
+" I2NP fueron originalmente empaquetados por la pasarela, \n"
+"entonces son reensamblados y reenviados de la forma requerida."
#: i2p2www/pages/site/docs/tunnels/implementation.html:96
msgid ""
@@ -14698,7 +23596,16 @@ msgid ""
"Therefore, we take advantage of symmetric AES encryption\n"
"to \"decrypt\" at the outbound tunnel gateway,\n"
"so that the plaintext is revealed at the outbound endpoint."
-msgstr "Los participantes intermedios del túnel no saben si ellos están en un túnel\nde entrada o de salida; ellos siempre \"cifran\" para el siguiente salto. Por lo \ntanto, aprovechamos la ventaja del cifrado AES simétrico para \"descifrar\" en \nla pasarela (`gateway`) del túnel de salida, así que el texto plano se revela \nen el extremo de salida."
+msgstr ""
+"Los participantes intermedios del túnel no saben si ellos están en un "
+"túnel\n"
+"de entrada o de salida; ellos siempre \"cifran\" para el siguiente salto."
+" Por lo \n"
+"tanto, aprovechamos la ventaja del cifrado AES simétrico para "
+"\"descifrar\" en \n"
+"la pasarela (`gateway`) del túnel de salida, así que el texto plano se "
+"revela \n"
+"en el extremo de salida."
#: i2p2www/pages/site/docs/tunnels/implementation.html:110
msgid "Role"
@@ -14746,14 +23653,16 @@ msgid "Decrypt (using an encryption operation)"
msgstr "Descifrar (usando una operación de cifrado)"
#: i2p2www/pages/site/docs/tunnels/implementation.html:133
-msgid ""
-"Decrypt (using an encryption operation) to reveal plaintext tunnel message"
-msgstr "Descifrar (usando una operación de cifrado) para revelar el mensaje de túnel de texto plano"
+msgid "Decrypt (using an encryption operation) to reveal plaintext tunnel message"
+msgstr ""
+"Descifrar (usando una operación de cifrado) para revelar el mensaje de "
+"túnel de texto plano"
#: i2p2www/pages/site/docs/tunnels/implementation.html:134
-msgid ""
-"Reassemble Fragments, Forward as instructed to Inbound Gateway or Router"
-msgstr "Reensamblar fragmentos, reenviar hacia la pasarela (`gateway`) o router entrante tal como se indicó"
+msgid "Reassemble Fragments, Forward as instructed to Inbound Gateway or Router"
+msgstr ""
+"Reensamblar fragmentos, reenviar hacia la pasarela (`gateway`) o router "
+"entrante tal como se indicó"
#: i2p2www/pages/site/docs/tunnels/implementation.html:142
#: i2p2www/pages/site/docs/tunnels/implementation.html:149
@@ -14788,7 +23697,12 @@ msgid ""
"tunnel messages\n"
"and encrypt the tunnel messages.\n"
"Tunnel messages contain the following:"
-msgstr "Una función de la pasarela (`gateway`) del túnel es fragmentar y empaquetar \nmensajes I2NP (protocolo de red I2P) en mensajes de túnel de tamaño-fijo y cifrar los mensajes de túnel. Los mensajes de túnel contienen lo siguiente: "
+msgstr ""
+"Una función de la pasarela (`gateway`) del túnel es fragmentar y "
+"empaquetar \n"
+"mensajes I2NP (protocolo de red I2P) en mensajes de túnel de tamaño-fijo y cifrar "
+"los mensajes de túnel. Los mensajes de túnel contienen lo siguiente: "
#: i2p2www/pages/site/docs/tunnels/implementation.html:174
msgid "A 4 byte Tunnel ID"
@@ -14804,7 +23718,9 @@ msgstr "Un identificador criptográfico (`checksum`)"
#: i2p2www/pages/site/docs/tunnels/implementation.html:177
msgid "Padding, if necessary"
-msgstr "Relleno (datos inútiles desechables criptográficamente), si fuera necesario"
+msgstr ""
+"Relleno (datos inútiles desechables criptográficamente), si fuera "
+"necesario"
#: i2p2www/pages/site/docs/tunnels/implementation.html:178
msgid "One or more { delivery instruction, I2NP message fragment } pairs"
@@ -14813,29 +23729,62 @@ msgstr "Uno o más pares { instrucción de entrega, fragmento de mensaje I2NP }"
#: i2p2www/pages/site/docs/tunnels/implementation.html:181
msgid ""
"Tunnel IDs are 4 byte numbers used at each hop - participants know what\n"
-"tunnel ID to listen for messages with and what tunnel ID they should be forwarded\n"
-"on as to the next hop, and each hop chooses the tunnel ID which they receive messages\n"
+"tunnel ID to listen for messages with and what tunnel ID they should be "
+"forwarded\n"
+"on as to the next hop, and each hop chooses the tunnel ID which they "
+"receive messages\n"
"on. Tunnels themselves are short-lived (10 minutes).\n"
"Even if subsequent tunnels are built using the same sequence of \n"
"peers, each hop's tunnel ID will change."
-msgstr "Los identificadores (`IDs`) de túnel tienen números de 4 bytes usados en \ncada salto - los participantes saben con qué identificadores (`ID`) de túnel escuchar mensajes y sobre qué túneles deben ser reenviados hacia el siguiente salto, y cada salto elije el identificador (`ID`) de túnel sobre el cual \nrecibe los mensajes. Los propios túneles son de vida-corta (10 minutos). \nIncluso si los subsiguientes túneles se erigen usando la misma secuencia \nde pares (`peers`), el identificador (`ID`) de túnel de cada salto cambiará."
+msgstr ""
+"Los identificadores (`IDs`) de túnel tienen números de 4 bytes usados en"
+" \n"
+"cada salto - los participantes saben con qué identificadores (`ID`) de "
+"túnel escuchar mensajes y sobre qué túneles deben ser reenviados hacia el"
+" siguiente salto, y cada salto elije el identificador (`ID`) de túnel "
+"sobre el cual \n"
+"recibe los mensajes. Los propios túneles son de vida-corta (10 minutos)."
+" \n"
+"Incluso si los subsiguientes túneles se erigen usando la misma secuencia"
+" \n"
+"de pares (`peers`), el identificador (`ID`) de túnel de cada salto "
+"cambiará."
#: i2p2www/pages/site/docs/tunnels/implementation.html:190
msgid ""
-"To prevent adversaries from tagging the messages along the path by adjusting\n"
-"the message size, all tunnel messages are a fixed 1024 bytes in size. To accommodate \n"
-"larger I2NP messages as well as to support smaller ones more efficiently, the\n"
-"gateway splits up the larger I2NP messages into fragments contained within each\n"
-"tunnel message. The endpoint will attempt to rebuild the I2NP message from the\n"
+"To prevent adversaries from tagging the messages along the path by "
+"adjusting\n"
+"the message size, all tunnel messages are a fixed 1024 bytes in size. To"
+" accommodate \n"
+"larger I2NP messages as well as to support smaller ones more efficiently,"
+" the\n"
+"gateway splits up the larger I2NP messages into fragments contained "
+"within each\n"
+"tunnel message. The endpoint will attempt to rebuild the I2NP message "
+"from the\n"
"fragments for a short period of time, but will discard them as necessary."
-msgstr "Para evitar que los adversarios marquen los mensajes a través de la ruta \najustando el tamaño del mensaje, todos los mensajes de túnel tienen un \ntamaño fijo de 1024 bytes. Para acomodar mensajes I2NP (protocolo de red \nI2P) más grandes así como para dar soporte a los más pequeños de forma \nmás eficiente, la pasarela (`gateway`) divide los mensajes I2NP más \ngrandes en fragmentos contenibles en cada mensaje de túnel. El extremo \ndel túnel intentará reconstruir el mensaje I2NP partiendo de los fragmentos \ndurante un corto periodo de tiempo, pero los descartará cuando sea necesario."
+msgstr ""
+"Para evitar que los adversarios marquen los mensajes a través de la ruta"
+" \n"
+"ajustando el tamaño del mensaje, todos los mensajes de túnel tienen un \n"
+"tamaño fijo de 1024 bytes. Para acomodar mensajes I2NP (protocolo de red"
+" \n"
+"I2P) más grandes así como para dar soporte a los más pequeños de forma \n"
+"más eficiente, la pasarela (`gateway`) divide los mensajes I2NP más \n"
+"grandes en fragmentos contenibles en cada mensaje de túnel. El extremo \n"
+"del túnel intentará reconstruir el mensaje I2NP partiendo de los "
+"fragmentos \n"
+"durante un corto periodo de tiempo, pero los descartará cuando sea "
+"necesario."
#: i2p2www/pages/site/docs/tunnels/implementation.html:199
#, python-format
msgid ""
"Details are in the\n"
"tunnel message specification."
-msgstr "Los detalles están en la especificación de mensaje de túnel."
+msgstr ""
+"Los detalles están en la especificación de "
+"mensaje de túnel."
#: i2p2www/pages/site/docs/tunnels/implementation.html:205
msgid "Gateway Encryption"
@@ -14843,22 +23792,55 @@ msgstr "Cifrado de la pasarela (`gateway`)"
#: i2p2www/pages/site/docs/tunnels/implementation.html:207
msgid ""
-"After the preprocessing of messages into a padded payload, the gateway builds\n"
-"a random 16 byte IV value, iteratively encrypting it and the tunnel message as\n"
-"necessary, and forwards the tuple {tunnelID, IV, encrypted tunnel message} to the next hop."
-msgstr "Después del preprocesado de mensajes hacia una carga con datos de relleno, \nla pasarela (`gateway`) construye un valor de IV (vector de inicialización) \naleatorio de 16 bytes, cifrando a este y al mensaje de túnel iterativamente tanto como se necesite, y reenvía la tupla { tunnelID, IV, mensaje de túnel \ncifrado } al siguiente salto."
+"After the preprocessing of messages into a padded payload, the gateway "
+"builds\n"
+"a random 16 byte IV value, iteratively encrypting it and the tunnel "
+"message as\n"
+"necessary, and forwards the tuple {tunnelID, IV, encrypted tunnel "
+"message} to the next hop."
+msgstr ""
+"Después del preprocesado de mensajes hacia una carga con datos de "
+"relleno, \n"
+"la pasarela (`gateway`) construye un valor de IV (vector de "
+"inicialización) \n"
+"aleatorio de 16 bytes, cifrando a este y al mensaje de túnel "
+"iterativamente tanto como se necesite, y reenvía la tupla { tunnelID, IV,"
+" mensaje de túnel \n"
+"cifrado } al siguiente salto."
#: i2p2www/pages/site/docs/tunnels/implementation.html:213
msgid ""
-"How encryption at the gateway is done depends on whether the tunnel is an\n"
-"inbound or an outbound tunnel. For inbound tunnels, they simply select a random\n"
-"IV, postprocessing and updating it to generate the IV for the gateway and using \n"
-"that IV along side their own layer key to encrypt the preprocessed data. For outbound \n"
-"tunnels they must iteratively decrypt the (unencrypted) IV and preprocessed \n"
-"data with the IV and layer keys for all hops in the tunnel. The result of the outbound\n"
-"tunnel encryption is that when each peer encrypts it, the endpoint will recover \n"
+"How encryption at the gateway is done depends on whether the tunnel is an"
+"\n"
+"inbound or an outbound tunnel. For inbound tunnels, they simply select a"
+" random\n"
+"IV, postprocessing and updating it to generate the IV for the gateway and"
+" using \n"
+"that IV along side their own layer key to encrypt the preprocessed data."
+" For outbound \n"
+"tunnels they must iteratively decrypt the (unencrypted) IV and "
+"preprocessed \n"
+"data with the IV and layer keys for all hops in the tunnel. The result "
+"of the outbound\n"
+"tunnel encryption is that when each peer encrypts it, the endpoint will "
+"recover \n"
"the initial preprocessed data."
-msgstr "Cómo se hace el cifrado en la pasarela (`gateway`) depende de si el túnel \nes de entrada o de salida. Para los túneles entrantes, simplemente eligen \nun IV (vector de inicialización) aleatorio, posprocesándolo y actualizándolo \npara generar el IV para la pasarela y usar ese IV junto con su propia clave \nde capa para cifrar los datos preprocesados. Para túneles salientes deben descifrar iterativamente el (no cifrado) IV y los datos preprocesados, con el IV y las claves de capa para todos los saltos en el túnel. El resultado \ndel cifrado del túnel de salida es que cuando cada par (`peer`) lo cifra, el \nextremo recuperará los datos preprocesados iniciales."
+msgstr ""
+"Cómo se hace el cifrado en la pasarela (`gateway`) depende de si el túnel"
+" \n"
+"es de entrada o de salida. Para los túneles entrantes, simplemente eligen"
+" \n"
+"un IV (vector de inicialización) aleatorio, posprocesándolo y "
+"actualizándolo \n"
+"para generar el IV para la pasarela y usar ese IV junto con su propia "
+"clave \n"
+"de capa para cifrar los datos preprocesados. Para túneles salientes deben"
+" descifrar iterativamente el (no cifrado) IV y los datos preprocesados, "
+"con el IV y las claves de capa para todos los saltos en el túnel. El "
+"resultado \n"
+"del cifrado del túnel de salida es que cuando cada par (`peer`) lo cifra,"
+" el \n"
+"extremo recuperará los datos preprocesados iniciales."
#: i2p2www/pages/site/docs/tunnels/implementation.html:225
msgid "Participant Processing"
@@ -14866,30 +23848,80 @@ msgstr "Procesado de los participantes"
#: i2p2www/pages/site/docs/tunnels/implementation.html:227
msgid ""
-"When a peer receives a tunnel message, it checks that the message came from\n"
-"the same previous hop as before (initialized when the first message comes through\n"
-"the tunnel). If the previous peer is a different router, or if the message has\n"
-"already been seen, the message is dropped. The participant then encrypts the \n"
-"received IV with AES256/ECB using their IV key to determine the current IV, uses \n"
-"that IV with the participant's layer key to encrypt the data, encrypts the \n"
-"current IV with AES256/ECB using their IV key again, then forwards the tuple \n"
-"{nextTunnelId, nextIV, encryptedData} to the next hop. This double encryption\n"
+"When a peer receives a tunnel message, it checks that the message came "
+"from\n"
+"the same previous hop as before (initialized when the first message comes"
+" through\n"
+"the tunnel). If the previous peer is a different router, or if the "
+"message has\n"
+"already been seen, the message is dropped. The participant then encrypts"
+" the \n"
+"received IV with AES256/ECB using their IV key to determine the current "
+"IV, uses \n"
+"that IV with the participant's layer key to encrypt the data, encrypts "
+"the \n"
+"current IV with AES256/ECB using their IV key again, then forwards the "
+"tuple \n"
+"{nextTunnelId, nextIV, encryptedData} to the next hop. This double "
+"encryption\n"
"of the IV (both before and after use) help address a certain class of\n"
"confirmation attacks."
-msgstr "Cuando un par (`peer`) recibe un mensaje de túnel, comprueba que el \nmensaje venga desde el mismo salto previo que antes (inicializado cuando \nel primer mensaje atraviesa el túnel). Si el par previo está en un router \ndiferente, o si el mensaje ha sido visto ya, el mensaje es descartado. \nEntonces el participante cifra el IV (vector de inicialización) recibido con \nAES256/ECB usando su clave IV para determinar el IV actual, usa ese \nIV con la clave de capa del participante para cifrar los datos, cifra el actual \nIV con AES256/ECB usando la clave IV otra vez, y luego reenvía la tupla \n{nextTunnelId, nextIV, encryptedData} (siguiente identificador de túnel, siguiente IV, datos cifrados) al siguiente salto. Este doble cifrado del IV \n(tanto antes como después de su uso) ayuda a afrontar una cierta clase de \nataques de confirmación."
+msgstr ""
+"Cuando un par (`peer`) recibe un mensaje de túnel, comprueba que el \n"
+"mensaje venga desde el mismo salto previo que antes (inicializado cuando"
+" \n"
+"el primer mensaje atraviesa el túnel). Si el par previo está en un router"
+" \n"
+"diferente, o si el mensaje ha sido visto ya, el mensaje es descartado. \n"
+"Entonces el participante cifra el IV (vector de inicialización) recibido "
+"con \n"
+"AES256/ECB usando su clave IV para determinar el IV actual, usa ese \n"
+"IV con la clave de capa del participante para cifrar los datos, cifra el "
+"actual \n"
+"IV con AES256/ECB usando la clave IV otra vez, y luego reenvía la tupla \n"
+"{nextTunnelId, nextIV, encryptedData} (siguiente identificador de túnel, "
+"siguiente IV, datos cifrados) al siguiente salto. Este doble cifrado del "
+"IV \n"
+"(tanto antes como después de su uso) ayuda a afrontar una cierta clase de"
+" \n"
+"ataques de confirmación."
#: i2p2www/pages/site/docs/tunnels/implementation.html:243
msgid ""
-"Duplicate message detection is handled by a decaying Bloom filter on message\n"
-"IVs. Each router maintains a single Bloom filter to contain the XOR of the IV and\n"
-"the first block of the message received for all of the tunnels it is participating\n"
-"in, modified to drop seen entries after 10-20 minutes (when the tunnels will have\n"
-"expired). The size of the bloom filter and the parameters used are sufficient to\n"
-"more than saturate the router's network connection with a negligible chance of \n"
-"false positive. The unique value fed into the Bloom filter is the XOR of the IV \n"
-"and the first block so as to prevent nonsequential colluding peers in the tunnel \n"
-"from tagging a message by resending it with the IV and first block switched."
-msgstr "La detección de mensajes duplicados es gestionada por un filtro Bloom \ndecadente (en el tiempo) sobre los IVs (vectores de inicialización) de los \nmensajes. Cada router mantiene un único filtro Bloom para guardar el XOR \ndel IV con el primer bloque del mensaje recibido para todos los túneles en los que está participando, modificado (decadencia) para descartar entradas vistas después de 10-20 minutos (cuando los túneles habrán expirado). \nEl tamaño del filtro Bloom y los parámetros usados son suficientes para más que saturar la conexión de red del router con una insignificante posibilidad de falso positivo. El único valor añadido en el filtro Bloom es el XOR del IV y el primer bloque como forma de prevenir que pares (`peers`) compinchados no secuenciales en el túnel, marquen un mensaje reenviándolo con el IV y el primer bloque cambiados."
+"Duplicate message detection is handled by a decaying Bloom filter on "
+"message\n"
+"IVs. Each router maintains a single Bloom filter to contain the XOR of "
+"the IV and\n"
+"the first block of the message received for all of the tunnels it is "
+"participating\n"
+"in, modified to drop seen entries after 10-20 minutes (when the tunnels "
+"will have\n"
+"expired). The size of the bloom filter and the parameters used are "
+"sufficient to\n"
+"more than saturate the router's network connection with a negligible "
+"chance of \n"
+"false positive. The unique value fed into the Bloom filter is the XOR of"
+" the IV \n"
+"and the first block so as to prevent nonsequential colluding peers in the"
+" tunnel \n"
+"from tagging a message by resending it with the IV and first block "
+"switched."
+msgstr ""
+"La detección de mensajes duplicados es gestionada por un filtro Bloom \n"
+"decadente (en el tiempo) sobre los IVs (vectores de inicialización) de "
+"los \n"
+"mensajes. Cada router mantiene un único filtro Bloom para guardar el XOR"
+" \n"
+"del IV con el primer bloque del mensaje recibido para todos los túneles "
+"en los que está participando, modificado (decadencia) para descartar "
+"entradas vistas después de 10-20 minutos (cuando los túneles habrán "
+"expirado). \n"
+"El tamaño del filtro Bloom y los parámetros usados son suficientes para "
+"más que saturar la conexión de red del router con una insignificante "
+"posibilidad de falso positivo. El único valor añadido en el filtro Bloom "
+"es el XOR del IV y el primer bloque como forma de prevenir que pares "
+"(`peers`) compinchados no secuenciales en el túnel, marquen un mensaje "
+"reenviándolo con el IV y el primer bloque cambiados."
#: i2p2www/pages/site/docs/tunnels/implementation.html:256
msgid "Endpoint Processing"
@@ -14897,21 +23929,47 @@ msgstr "Procesado en el extremo"
#: i2p2www/pages/site/docs/tunnels/implementation.html:258
msgid ""
-"After receiving and validating a tunnel message at the last hop in the tunnel,\n"
-"how the endpoint recovers the data encoded by the gateway depends upon whether \n"
-"the tunnel is an inbound or an outbound tunnel. For outbound tunnels, the \n"
-"endpoint encrypts the message with its layer key just like any other participant, \n"
-"exposing the preprocessed data. For inbound tunnels, the endpoint is also the \n"
-"tunnel creator so they can merely iteratively decrypt the IV and message, using the \n"
+"After receiving and validating a tunnel message at the last hop in the "
+"tunnel,\n"
+"how the endpoint recovers the data encoded by the gateway depends upon "
+"whether \n"
+"the tunnel is an inbound or an outbound tunnel. For outbound tunnels, "
+"the \n"
+"endpoint encrypts the message with its layer key just like any other "
+"participant, \n"
+"exposing the preprocessed data. For inbound tunnels, the endpoint is "
+"also the \n"
+"tunnel creator so they can merely iteratively decrypt the IV and message,"
+" using the \n"
"layer and IV keys of each step in reverse order."
-msgstr "Después de recibir y validar un mensaje de túnel en el último salto del túnel, la forma en la que el extremo recupera los datos codificados por la pasarela \n(`gateway`) depende de si el túnel es de entrada o de salida. Para túneles salientes, el extremo cifra el mensaje con su clave de capa tal como lo hace cualquier otro participante (en el túnel), exponiendo los datos \npreprocesados. Para túneles entrantes, el extremo también es el creador \ndel túnel, así que pueden meramente descifrar iterativamente el IV (vector de \ninicialización) y el mensaje usando las claves de capa e IV de cada paso \nen orden inverso."
+msgstr ""
+"Después de recibir y validar un mensaje de túnel en el último salto del "
+"túnel, la forma en la que el extremo recupera los datos codificados por "
+"la pasarela \n"
+"(`gateway`) depende de si el túnel es de entrada o de salida. Para "
+"túneles salientes, el extremo cifra el mensaje con su clave de capa tal "
+"como lo hace cualquier otro participante (en el túnel), exponiendo los "
+"datos \n"
+"preprocesados. Para túneles entrantes, el extremo también es el creador \n"
+"del túnel, así que pueden meramente descifrar iterativamente el IV "
+"(vector de \n"
+"inicialización) y el mensaje usando las claves de capa e IV de cada paso"
+" \n"
+"en orden inverso."
#: i2p2www/pages/site/docs/tunnels/implementation.html:268
msgid ""
-"At this point, the tunnel endpoint has the preprocessed data sent by the gateway,\n"
-"which it may then parse out into the included I2NP messages and forwards them as\n"
+"At this point, the tunnel endpoint has the preprocessed data sent by the "
+"gateway,\n"
+"which it may then parse out into the included I2NP messages and forwards "
+"them as\n"
"requested in their delivery instructions."
-msgstr "En este punto, el extremo del túnel tiene los datos preprocesados enviados por la pasarela (`gateway`), que pueden entonces ser separados en los mensajes I2NP incluidos, y reenviarlos tal como se requería en sus \ninstrucciones de entrega."
+msgstr ""
+"En este punto, el extremo del túnel tiene los datos preprocesados "
+"enviados por la pasarela (`gateway`), que pueden entonces ser separados "
+"en los mensajes I2NP incluidos, y reenviarlos tal como se requería en sus"
+" \n"
+"instrucciones de entrega."
#: i2p2www/pages/site/docs/tunnels/implementation.html:275
msgid "Tunnel Building"
@@ -14919,23 +23977,50 @@ msgstr "Construcción del túnel"
#: i2p2www/pages/site/docs/tunnels/implementation.html:277
msgid ""
-"When building a tunnel, the creator must send a request with the necessary\n"
-"configuration data to each of the hops and wait for all of them to agree before\n"
-"enabling the tunnel. The requests are encrypted so that only the peers who need\n"
-"to know a piece of information (such as the tunnel layer or IV key) has that\n"
-"data. In addition, only the tunnel creator will have access to the peer's\n"
-"reply. There are three important dimensions to keep in mind when producing\n"
-"the tunnels: what peers are used (and where), how the requests are sent (and \n"
+"When building a tunnel, the creator must send a request with the "
+"necessary\n"
+"configuration data to each of the hops and wait for all of them to agree "
+"before\n"
+"enabling the tunnel. The requests are encrypted so that only the peers "
+"who need\n"
+"to know a piece of information (such as the tunnel layer or IV key) has "
+"that\n"
+"data. In addition, only the tunnel creator will have access to the "
+"peer's\n"
+"reply. There are three important dimensions to keep in mind when "
+"producing\n"
+"the tunnels: what peers are used (and where), how the requests are sent "
+"(and \n"
"replies received), and how they are maintained."
-msgstr "Cuando se construye un túnel, el creador debe enviar una solicitud con los \ndatos de configuración necesarios a cada uno de los saltos, y esperar \nque todos ellos accedan antes de habilitar el túnel. Las solicitudes se cifran de forma que sólo los pares (`peers`) que necesiten conocer un \npedazo de la información (tales como las claves de capa del túnel o de IV (vector de inicialización)) tienen esos datos. Además, sólo el creador del \ntúnel tendrá acceso a la respuesta del par. Hay tres dimensiones importantes a tener en cuenta al generar los túneles: qué pares se usan (y dónde), cómo se envían las solicitudes (y las respuestas recibidas), y cómo son mantenidas."
+msgstr ""
+"Cuando se construye un túnel, el creador debe enviar una solicitud con "
+"los \n"
+"datos de configuración necesarios a cada uno de los saltos, y esperar \n"
+"que todos ellos accedan antes de habilitar el túnel. Las solicitudes se "
+"cifran de forma que sólo los pares (`peers`) que necesiten conocer un \n"
+"pedazo de la información (tales como las claves de capa del túnel o de IV"
+" (vector de inicialización)) tienen esos datos. Además, sólo el creador "
+"del \n"
+"túnel tendrá acceso a la respuesta del par. Hay tres dimensiones "
+"importantes a tener en cuenta al generar los túneles: qué pares se usan "
+"(y dónde), cómo se envían las solicitudes (y las respuestas recibidas), y"
+" cómo son mantenidas."
#: i2p2www/pages/site/docs/tunnels/implementation.html:291
msgid ""
-"Beyond the two types of tunnels - inbound and outbound - there are two styles\n"
+"Beyond the two types of tunnels - inbound and outbound - there are two "
+"styles\n"
"of peer selection used for different tunnels - exploratory and client.\n"
-"Exploratory tunnels are used for both network database maintenance and tunnel\n"
+"Exploratory tunnels are used for both network database maintenance and "
+"tunnel\n"
"maintenance, while client tunnels are used for end to end client messages."
-msgstr "Más allá de los dos tipos de túneles - entrante y saliente - hay dos estilos de selección del par (`peer`) usados por diferentes túneles - exploratorio y cliente. Los túneles exploratorios se usan tanto para el mantenimiento de la \nbase de datos de red como para el mantenimiento del túnel, mientras los \ntúneles de cliente se usan para mensajes de cliente extremo-a-extremo."
+msgstr ""
+"Más allá de los dos tipos de túneles - entrante y saliente - hay dos "
+"estilos de selección del par (`peer`) usados por diferentes túneles - "
+"exploratorio y cliente. Los túneles exploratorios se usan tanto para el "
+"mantenimiento de la \n"
+"base de datos de red como para el mantenimiento del túnel, mientras los \n"
+"túneles de cliente se usan para mensajes de cliente extremo-a-extremo."
#: i2p2www/pages/site/docs/tunnels/implementation.html:299
msgid "Exploratory tunnel peer selection"
@@ -14943,21 +24028,37 @@ msgstr "Selección de par de túnel exploratorio"
#: i2p2www/pages/site/docs/tunnels/implementation.html:301
msgid ""
-"Exploratory tunnels are built out of a random selection of peers from a subset\n"
-"of the network. The particular subset varies on the local router and on what their\n"
-"tunnel routing needs are. In general, the exploratory tunnels are built out of\n"
-"randomly selected peers who are in the peer's \"not failing but active\" profile\n"
-"category. The secondary purpose of the tunnels, beyond merely tunnel routing,\n"
-"is to find underutilized high capacity peers so that they can be promoted for\n"
+"Exploratory tunnels are built out of a random selection of peers from a "
+"subset\n"
+"of the network. The particular subset varies on the local router and on "
+"what their\n"
+"tunnel routing needs are. In general, the exploratory tunnels are built "
+"out of\n"
+"randomly selected peers who are in the peer's \"not failing but active\" "
+"profile\n"
+"category. The secondary purpose of the tunnels, beyond merely tunnel "
+"routing,\n"
+"is to find underutilized high capacity peers so that they can be promoted"
+" for\n"
"use in client tunnels."
-msgstr "Los túneles exploratorios son construidos de una selección de pares aleatorios de un subconjunto de la red. Los subconjuntos varían en cada ruter local y según sean las necesidades de ese túnel. En general, los túneles exploratorios se construyen a partir de pares seleccionados aleatoriamente que están en categoría del perfil de par 'no se cae, está activo' . El segundo fin de los túneles, además de simplemente enrutar, es encontrar pares de alta capacidad libres para poder usarlos para los túneles clientes."
+msgstr ""
+"Los túneles exploratorios son construidos de una selección de pares "
+"aleatorios de un subconjunto de la red. Los subconjuntos varían en cada "
+"ruter local y según sean las necesidades de ese túnel. En general, los "
+"túneles exploratorios se construyen a partir de pares seleccionados "
+"aleatoriamente que están en categoría del perfil de par 'no se cae, está "
+"activo' . El segundo fin de los túneles, además de simplemente enrutar, "
+"es encontrar pares de alta capacidad libres para poder usarlos para los "
+"túneles clientes."
#: i2p2www/pages/site/docs/tunnels/implementation.html:311
#, python-format
msgid ""
"Exploratory peer selection is discussed further on the\n"
"Peer Profiling and Selection page."
-msgstr "La selección de pares exploratorios se discute más en la página de perfil del par y selección."
+msgstr ""
+"La selección de pares exploratorios se discute más en la página de perfil del par y selección."
#: i2p2www/pages/site/docs/tunnels/implementation.html:317
msgid "Client tunnel peer selection"
@@ -14965,19 +24066,32 @@ msgstr "Selección del par para el túnel cliente"
#: i2p2www/pages/site/docs/tunnels/implementation.html:319
msgid ""
-"Client tunnels are built with a more stringent set of requirements - the local\n"
-"router will select peers out of its \"fast and high capacity\" profile category so\n"
-"that performance and reliability will meet the needs of the client application.\n"
-"However, there are several important details beyond that basic selection that \n"
+"Client tunnels are built with a more stringent set of requirements - the "
+"local\n"
+"router will select peers out of its \"fast and high capacity\" profile "
+"category so\n"
+"that performance and reliability will meet the needs of the client "
+"application.\n"
+"However, there are several important details beyond that basic selection "
+"that \n"
"should be adhered to, depending upon the client's anonymity needs."
-msgstr "Los túneles cliente son construidos con unos requerimientos más rigurosos - el ruter local selecciona los pares de la categoría de perfil \"rápidos y de gran capacidad\" para que el rendimiento y la seguridad se ajusten a las necesidades de la aplicación cliente. Aunque hay varios detalles importantes más allá de la selección básica que deben ser tomados en cuenta, dependiendo de las necesidades de anonimato que necesite el cliente."
+msgstr ""
+"Los túneles cliente son construidos con unos requerimientos más rigurosos"
+" - el ruter local selecciona los pares de la categoría de perfil "
+"\"rápidos y de gran capacidad\" para que el rendimiento y la seguridad se"
+" ajusten a las necesidades de la aplicación cliente. Aunque hay varios "
+"detalles importantes más allá de la selección básica que deben ser "
+"tomados en cuenta, dependiendo de las necesidades de anonimato que "
+"necesite el cliente."
#: i2p2www/pages/site/docs/tunnels/implementation.html:327
#, python-format
msgid ""
"Client peer selection is discussed further on the\n"
"Peer Profiling and Selection page."
-msgstr "La selección del par cliente se discute más profundamente en la página de perfil del par y selección."
+msgstr ""
+"La selección del par cliente se discute más profundamente en la página de perfil del par y selección."
#: i2p2www/pages/site/docs/tunnels/implementation.html:332
msgid "Peer Ordering within Tunnels"
@@ -14989,33 +24103,54 @@ msgid ""
"Peers are ordered within tunnels to deal with the\n"
"predecessor attack\n"
"(2008 update)."
-msgstr "Los pares son ordenados dentro de los túneles para evitar el ataque del predecesor (2008 update). "
+msgstr ""
+"Los pares son ordenados dentro de los túneles para evitar el ataque del predecesor (2008 "
+"update). "
#: i2p2www/pages/site/docs/tunnels/implementation.html:341
msgid ""
"To frustrate the predecessor \n"
-"attack, the tunnel selection keeps the peers selected in a strict order -\n"
-"if A, B, and C are in a tunnel for a particular tunnel pool, the hop after A is always B, and the hop after\n"
+"attack, the tunnel selection keeps the peers selected in a strict order -"
+"\n"
+"if A, B, and C are in a tunnel for a particular tunnel pool, the hop "
+"after A is always B, and the hop after\n"
"B is always C."
-msgstr "Para evitar el ataque del predecesor, la selección del túnel mantiene a los pares seleccionados en estricto orden - si A, B, y C están en un túnel determinado para un grupo de túneles en particular, el salto después de A es siempre B, y el salto después de B siempre es C. "
+msgstr ""
+"Para evitar el ataque del predecesor, la selección del túnel mantiene a "
+"los pares seleccionados en estricto orden - si A, B, y C están en un "
+"túnel determinado para un grupo de túneles en particular, el salto "
+"después de A es siempre B, y el salto después de B siempre es C. "
#: i2p2www/pages/site/docs/tunnels/implementation.html:348
msgid ""
"Ordering is implemented by generating a random 32-byte key for each\n"
"tunnel pool at startup.\n"
"Peers should not be able to guess the ordering, or an attacker could\n"
-"craft two router hashes far apart to maximize the chance of being at both\n"
+"craft two router hashes far apart to maximize the chance of being at both"
+"\n"
"ends of a tunnel.\n"
"Peers are sorted by XOR distance of the\n"
-"SHA256 Hash of (the peer's hash concatenated with the random key) from the random key"
-msgstr "El orden está implementado generando una clave aleatoria de 32 bytes para cada grupo de túneles al inicio. Los pares no deberían ser capaces de adivinar el orden, un atacante podría elaborar aparte dos hashes de ruter para maximizar las posibilidades de ser las dos puntas del túnel. Los pares están ordenados por la distancia XOR del hash SHA256 de (el hash del par concatenado con la clave aleatoria) de la clave aleatoria . "
+"SHA256 Hash of (the peer's hash concatenated with the random key) from "
+"the random key"
+msgstr ""
+"El orden está implementado generando una clave aleatoria de 32 bytes para"
+" cada grupo de túneles al inicio. Los pares no deberían ser capaces de "
+"adivinar el orden, un atacante podría elaborar aparte dos hashes de ruter"
+" para maximizar las posibilidades de ser las dos puntas del túnel. Los "
+"pares están ordenados por la distancia XOR del hash SHA256 de (el hash "
+"del par concatenado con la clave aleatoria) de la clave aleatoria . "
#: i2p2www/pages/site/docs/tunnels/implementation.html:363
msgid ""
-"Because each tunnel pool uses a different random key, ordering is consistent\n"
+"Because each tunnel pool uses a different random key, ordering is "
+"consistent\n"
"within a single pool but not between different pools.\n"
"New keys are generated at each router restart."
-msgstr "Ya que cada grupo de túneles utiliza una clave aleatoria diferente, el orden es consistente dentro de un mismo grupo pero no entre grupos. Las claves son generadas al reinicio de cada ruter."
+msgstr ""
+"Ya que cada grupo de túneles utiliza una clave aleatoria diferente, el "
+"orden es consistente dentro de un mismo grupo pero no entre grupos. Las "
+"claves son generadas al reinicio de cada ruter."
#: i2p2www/pages/site/docs/tunnels/implementation.html:370
msgid "Request delivery"
@@ -15024,48 +24159,82 @@ msgstr "Solicitud de entrega"
#: i2p2www/pages/site/docs/tunnels/implementation.html:372
#, python-format
msgid ""
-"A multi-hop tunnel is built using a single build message which is repeatedly\n"
+"A multi-hop tunnel is built using a single build message which is "
+"repeatedly\n"
"decrypted and forwarded. In the terminology of\n"
"Hashing it out in Public,\n"
"this is \"non-interactive\" telescopic tunnel building."
-msgstr "Un túnel multi-salto es construido usando un solo mensaje de construcción que es descifrado y enviado repetidamente. En la terminología de Hashing it out in Public, esto es una construcción de túnel telescópica \"no interactiva\"."
+msgstr ""
+"Un túnel multi-salto es construido usando un solo mensaje de construcción"
+" que es descifrado y enviado repetidamente. En la terminología de Hashing it out in Public, esto es una construcción "
+"de túnel telescópica \"no interactiva\"."
#: i2p2www/pages/site/docs/tunnels/implementation.html:379
#, python-format
msgid ""
"This tunnel request preparation, delivery, and response method is\n"
"designed to reduce the number of\n"
-"predecessors exposed, cuts the number of messages transmitted, verifies proper\n"
-"connectivity, and avoids the message counting attack of traditional telescopic\n"
+"predecessors exposed, cuts the number of messages transmitted, verifies "
+"proper\n"
+"connectivity, and avoids the message counting attack of traditional "
+"telescopic\n"
"tunnel creation.\n"
-"(This method, which sends messages to extend a tunnel through the already-established\n"
-"part of the tunnel, is termed \"interactive\" telescopic tunnel building in\n"
+"(This method, which sends messages to extend a tunnel through the "
+"already-established\n"
+"part of the tunnel, is termed \"interactive\" telescopic tunnel building "
+"in\n"
"the \"Hashing it out\" paper.)"
-msgstr "Este método de preparación, envío y respuesta de la solicitud de túnel está diseñado para reducir el número de predecesores expuestos, cortar el número de mensajes transmitidos, verificar que la conectividad es apropiada y evitar el ataque clásico de conteo en la creación telescópica de los túneles tradicionales. (Este método, que envía mensajes para extender un túnel a través de la parte del túnel ya establecido, es llamado construcción de túnel telescópico \"interactivo\" en el estudio \"Hashing it out\")"
+msgstr ""
+"Este método de preparación, envío y respuesta de la solicitud de túnel "
+"está diseñado para reducir el número "
+"de predecesores expuestos, cortar el número de mensajes transmitidos, "
+"verificar que la conectividad es apropiada y evitar el ataque clásico de "
+"conteo en la creación telescópica de los túneles tradicionales. (Este "
+"método, que envía mensajes para extender un túnel a través de la parte "
+"del túnel ya establecido, es llamado construcción de túnel telescópico "
+"\"interactivo\" en el estudio \"Hashing it out\")"
#: i2p2www/pages/site/docs/tunnels/implementation.html:390
#, python-format
msgid ""
-"The details of tunnel request and response messages, and their encryption,\n"
+"The details of tunnel request and response messages, and their "
+"encryption,\n"
"are specified here."
-msgstr "Los detalles de los mensajes de peticiones y respuestas, y su cifrado, se especifican aquí."
+msgstr ""
+"Los detalles de los mensajes de peticiones y respuestas, y su cifrado, se especifican aquí."
#: i2p2www/pages/site/docs/tunnels/implementation.html:395
msgid ""
-"Peers may reject tunnel creation requests for a variety of reasons, though\n"
-"a series of four increasingly severe rejections are known: probabilistic rejection\n"
-"(due to approaching the router's capacity, or in response to a flood of requests), \n"
-"transient overload, bandwidth overload, and critical failure. When received, \n"
-"those four are interpreted by the tunnel creator to help adjust their profile of\n"
+"Peers may reject tunnel creation requests for a variety of reasons, "
+"though\n"
+"a series of four increasingly severe rejections are known: probabilistic "
+"rejection\n"
+"(due to approaching the router's capacity, or in response to a flood of "
+"requests), \n"
+"transient overload, bandwidth overload, and critical failure. When "
+"received, \n"
+"those four are interpreted by the tunnel creator to help adjust their "
+"profile of\n"
"the router in question."
-msgstr "Los pares pueden denegar las peticiones de creación de túnel por varias razones, a través de una serie de cuatro rechazos cada vez más graves: rechazo propabilístico (debido a que le ruter se acerca al límite de su capacidad, o en respuesta de una riada de peticiones), sobrecarga transitoria, sobrecarga del ancho de banda, y fallo crítico. Cundo son recibidos, estos cuatro son interpretados por el creador del túnel para ayudar a ajustar su perfil a la petición del ruter."
+msgstr ""
+"Los pares pueden denegar las peticiones de creación de túnel por varias "
+"razones, a través de una serie de cuatro rechazos cada vez más graves: "
+"rechazo propabilístico (debido a que le ruter se acerca al límite de su "
+"capacidad, o en respuesta de una riada de peticiones), sobrecarga "
+"transitoria, sobrecarga del ancho de banda, y fallo crítico. Cundo son "
+"recibidos, estos cuatro son interpretados por el creador del túnel para "
+"ayudar a ajustar su perfil a la petición del ruter."
#: i2p2www/pages/site/docs/tunnels/implementation.html:404
#, python-format
msgid ""
"For more information on peer profiling, see the\n"
"Peer Profiling and Selection page."
-msgstr "Para más información sobre los perfiles del par, vea la página de perfil del par y selección."
+msgstr ""
+"Para más información sobre los perfiles del par, vea la página de perfil del par y selección."
#: i2p2www/pages/site/docs/tunnels/implementation.html:410
msgid "Tunnel Pools"
@@ -15074,27 +24243,55 @@ msgstr "Grupos de túneles"
#: i2p2www/pages/site/docs/tunnels/implementation.html:412
#, python-format
msgid ""
-"To allow efficient operation, the router maintains a series of tunnel pools,\n"
-"each managing a group of tunnels used for a specific purpose with their own\n"
-"configuration. When a tunnel is needed for that purpose, the router selects one\n"
-"out of the appropriate pool at random. Overall, there are two exploratory tunnel\n"
-"pools - one inbound and one outbound - each using the router's default configuration.\n"
+"To allow efficient operation, the router maintains a series of tunnel "
+"pools,\n"
+"each managing a group of tunnels used for a specific purpose with their "
+"own\n"
+"configuration. When a tunnel is needed for that purpose, the router "
+"selects one\n"
+"out of the appropriate pool at random. Overall, there are two "
+"exploratory tunnel\n"
+"pools - one inbound and one outbound - each using the router's default "
+"configuration.\n"
"In addition, there is a pair of pools for each local destination -\n"
-"one inbound and one outbound tunnel pool. Those pools use the configuration specified\n"
-"when the local destination connects to the router via I2CP, or the router's defaults if\n"
+"one inbound and one outbound tunnel pool. Those pools use the "
+"configuration specified\n"
+"when the local destination connects to the router via I2CP, or the router's defaults if\n"
"not specified."
-msgstr "Para permitir un funcionamiento eficiente, el ruter mantiene una serie de grupos de túneles, cada uno manteniendo un conjunto de túneles usados para un fin específico con su propia configuración. Cuando un túnel se necesita para ese fin, el ruter selecciona aleatoriamente uno del grupo apropiado. En total, hay dos grupos de túneles exploratorios - uno de entrada y uno de salida - cada uno usando la configuración por defecto del túnel. Además, hay un par de grupos para cada destinación local - un grupo de entrada y un grupo de salida. Estos grupos usan la configuración especificada elegida cuando la destinación local conecta al ruter vía I2CP, o si el ruter no especifica una por defecto."
+msgstr ""
+"Para permitir un funcionamiento eficiente, el ruter mantiene una serie de"
+" grupos de túneles, cada uno manteniendo un conjunto de túneles usados "
+"para un fin específico con su propia configuración. Cuando un túnel se "
+"necesita para ese fin, el ruter selecciona aleatoriamente uno del grupo "
+"apropiado. En total, hay dos grupos de túneles exploratorios - uno de "
+"entrada y uno de salida - cada uno usando la configuración por defecto "
+"del túnel. Además, hay un par de grupos para cada destinación local - un "
+"grupo de entrada y un grupo de salida. Estos grupos usan la configuración"
+" especificada elegida cuando la destinación local conecta al ruter vía I2CP, o si el ruter no especifica una por defecto."
#: i2p2www/pages/site/docs/tunnels/implementation.html:424
#, python-format
msgid ""
-"Each pool has within its configuration a few key settings, defining how many\n"
-"tunnels to keep active, how many backup tunnels to maintain in case of failure,\n"
+"Each pool has within its configuration a few key settings, defining how "
+"many\n"
+"tunnels to keep active, how many backup tunnels to maintain in case of "
+"failure,\n"
"how long the tunnels should be, whether those\n"
"lengths should be randomized, as \n"
-"well as any of the other settings allowed when configuring individual tunnels.\n"
-"Configuration options are specified on the I2CP page."
-msgstr "Cada grupo tiene dentro de su configuración unas pocas opciones clave, que definen cuantos túneles se mantienen activos, cuantos túneles de respaldo se mantienen en caso de fallo, cuanto debe durar el túnel, si esos tamaños deben ser aleatorrizados, y también definen cualquier otra configuración permitida cuando se configuran los túneles individuales. Las opciones de configuración son especificadas en la página de I2CP."
+"well as any of the other settings allowed when configuring individual "
+"tunnels.\n"
+"Configuration options are specified on the I2CP "
+"page."
+msgstr ""
+"Cada grupo tiene dentro de su configuración unas pocas opciones clave, "
+"que definen cuantos túneles se mantienen activos, cuantos túneles de "
+"respaldo se mantienen en caso de fallo, cuanto debe durar el túnel, si "
+"esos tamaños deben ser aleatorrizados, y también definen cualquier otra "
+"configuración permitida cuando se configuran los túneles individuales. "
+"Las opciones de configuración son especificadas en la página de I2CP."
#: i2p2www/pages/site/docs/tunnels/implementation.html:434
msgid "Tunnel Lengths and Defaults"
@@ -15110,27 +24307,50 @@ msgstr "Estrategia de construcción anticipatoria y prioridad"
#: i2p2www/pages/site/docs/tunnels/implementation.html:440
msgid ""
-"Tunnel building is expensive, and tunnels expire a fixed time after they are built.\n"
-"However, when a pool that runs out of tunnels, the Destination is essentially dead.\n"
-"In addition, tunnel build success rate may vary greatly with both local and global\n"
+"Tunnel building is expensive, and tunnels expire a fixed time after they "
+"are built.\n"
+"However, when a pool that runs out of tunnels, the Destination is "
+"essentially dead.\n"
+"In addition, tunnel build success rate may vary greatly with both local "
+"and global\n"
"network conditions.\n"
-"Therefore, it is important to maintain an anticipatory, adaptive build strategy\n"
-"to ensure that new tunnels are successfully built before they are needed,\n"
+"Therefore, it is important to maintain an anticipatory, adaptive build "
+"strategy\n"
+"to ensure that new tunnels are successfully built before they are needed,"
+"\n"
"without building an excess of tunnels, building them too soon,\n"
-"or consuming too much CPU or bandwidth creating and sending the encrypted build messages."
-msgstr "La construcción de un túnel es cara, y los túneles expiran después de un tiempo fijo de haber sido creados. Sin embargo, el éxito de construcción de túnel puede variar enormemente según las condiciones de la red local y global. Por esto, es importante mantener una estrategia de construcción anticipatoria y adaptativa para asegurarse de que los túneles nuevos, antes de ser usados, son construidos exitosamente, no se construyen en exceso, no se construyen demasiado pronto, o consumen demasiada CPU o ancho de banda al crear y enviar los mensajes de construcción cifrados."
+"or consuming too much CPU or bandwidth creating and sending the encrypted"
+" build messages."
+msgstr ""
+"La construcción de un túnel es cara, y los túneles expiran después de un "
+"tiempo fijo de haber sido creados. Sin embargo, el éxito de construcción "
+"de túnel puede variar enormemente según las condiciones de la red local y"
+" global. Por esto, es importante mantener una estrategia de construcción "
+"anticipatoria y adaptativa para asegurarse de que los túneles nuevos, "
+"antes de ser usados, son construidos exitosamente, no se construyen en "
+"exceso, no se construyen demasiado pronto, o consumen demasiada CPU o "
+"ancho de banda al crear y enviar los mensajes de construcción cifrados."
#: i2p2www/pages/site/docs/tunnels/implementation.html:451
msgid ""
"For each tuple {exploratory/client, in/out, length, length variance}\n"
"the router maintains statistics on the time required for a successful\n"
"tunnel build.\n"
-"Using these statistics, it calculates how long before a tunnel's expiration\n"
+"Using these statistics, it calculates how long before a tunnel's "
+"expiration\n"
"it should start attempting to build a replacement.\n"
"As the expiration time approaches without a successful replacement,\n"
"it starts multiple build attempts in parallel, and then\n"
"will increase the number of parallel attempts if necessary."
-msgstr "Por cada tupla {esploratorio/cliente, entrada/salida, longitud, diferencia de longitud} el ruter mantiene estadísticas del tiempo necesario para la construcción con éxito de un túnel. Usando estas estadísticas, calcula cuando debe comenzar a intentar crear un reemplazo antes de la expiración del túnel. Cuando el tiempo de expiración se acerca sin un reemplazo exitoso, comienza a hacer múltiples intentos de construcción en paralelo, y entonces aumentará el número de intentos en paralelo si es necesario."
+msgstr ""
+"Por cada tupla {esploratorio/cliente, entrada/salida, longitud, "
+"diferencia de longitud} el ruter mantiene estadísticas del tiempo "
+"necesario para la construcción con éxito de un túnel. Usando estas "
+"estadísticas, calcula cuando debe comenzar a intentar crear un reemplazo "
+"antes de la expiración del túnel. Cuando el tiempo de expiración se "
+"acerca sin un reemplazo exitoso, comienza a hacer múltiples intentos de "
+"construcción en paralelo, y entonces aumentará el número de intentos en "
+"paralelo si es necesario."
#: i2p2www/pages/site/docs/tunnels/implementation.html:462
msgid ""
@@ -15139,7 +24359,12 @@ msgid ""
"across all pools.\n"
"Critical builds (those for exploratory tunnels, and for pools that have\n"
"run out of tunnels) are prioritized."
-msgstr "Para limitar el uso de CPU y ancho de banda, el ruter también limita el número máximo de intentos de construcción pendientes a través de todos los grupos. Las construcciones críticas (aquellas para los túneles exploratorios, y para los grupos que se han quedado sin túneles) son priorizadas."
+msgstr ""
+"Para limitar el uso de CPU y ancho de banda, el ruter también limita el "
+"número máximo de intentos de construcción pendientes a través de todos "
+"los grupos. Las construcciones críticas (aquellas para los túneles "
+"exploratorios, y para los grupos que se han quedado sin túneles) son "
+"priorizadas."
#: i2p2www/pages/site/docs/tunnels/implementation.html:471
msgid "Tunnel Message Throttling"
@@ -15147,37 +24372,85 @@ msgstr "Límites de los mensajes de túnel"
#: i2p2www/pages/site/docs/tunnels/implementation.html:473
msgid ""
-"Even though the tunnels within I2P bear a resemblance to a circuit switched\n"
-"network, everything within I2P is strictly message based - tunnels are merely\n"
-"accounting tricks to help organize the delivery of messages. No assumptions are\n"
-"made regarding reliability or ordering of messages, and retransmissions are left\n"
-"to higher levels (e.g. I2P's client layer streaming library). This allows I2P\n"
-"to take advantage of throttling techniques available to both packet switched and\n"
-"circuit switched networks. For instance, each router may keep track of the \n"
-"moving average of how much data each tunnel is using, combine that with all of \n"
-"the averages used by other tunnels the router is participating in, and be able\n"
-"to accept or reject additional tunnel participation requests based on its \n"
-"capacity and utilization. On the other hand, each router can simply drop \n"
-"messages that are beyond its capacity, exploiting the research used on the \n"
+"Even though the tunnels within I2P bear a resemblance to a circuit "
+"switched\n"
+"network, everything within I2P is strictly message based - tunnels are "
+"merely\n"
+"accounting tricks to help organize the delivery of messages. No "
+"assumptions are\n"
+"made regarding reliability or ordering of messages, and retransmissions "
+"are left\n"
+"to higher levels (e.g. I2P's client layer streaming library). This "
+"allows I2P\n"
+"to take advantage of throttling techniques available to both packet "
+"switched and\n"
+"circuit switched networks. For instance, each router may keep track of "
+"the \n"
+"moving average of how much data each tunnel is using, combine that with "
+"all of \n"
+"the averages used by other tunnels the router is participating in, and be"
+" able\n"
+"to accept or reject additional tunnel participation requests based on its"
+" \n"
+"capacity and utilization. On the other hand, each router can simply drop"
+" \n"
+"messages that are beyond its capacity, exploiting the research used on "
+"the \n"
"normal Internet."
-msgstr "Aunque los túneles dentro de I2P son parecidos a una red conmutada de circuito, todo dentro de I2P está basado en mensajes - los túneles no son más que trucos contables para ayudar a organizar el envío de mensajes. No se toman suposiciones con respecto a el orden o fiabilidad de los mensajes, y la retransmisiones son dejadas para los niveles superiores (por ejemplo para la capa cliente de la librería de streaming de I2P) . Esto permite a I2P aprovechar las técnicas de limitaciones disponibles en las redes conmutadas de paquetes y en las redes conmutadas de circuito. Por ejemplo, cada ruter puede hacer un seguimiento de la media cambiante de cuantos datos usa cada túnel, combinar eso con todas medias usadas poro otros túneles en los que participa el ruter, y ser capaz de aceptar o denegar las peticiones de participación adicional de túnel basándose en su capacidad y utilización. Por otro lado, cada ruter puede simplemente denegar los mensajes que están más allá de su capacidad."
+msgstr ""
+"Aunque los túneles dentro de I2P son parecidos a una red conmutada de "
+"circuito, todo dentro de I2P está basado en mensajes - los túneles no son"
+" más que trucos contables para ayudar a organizar el envío de mensajes. "
+"No se toman suposiciones con respecto a el orden o fiabilidad de los "
+"mensajes, y la retransmisiones son dejadas para los niveles superiores "
+"(por ejemplo para la capa cliente de la librería de streaming de I2P) . "
+"Esto permite a I2P aprovechar las técnicas de limitaciones disponibles en"
+" las redes conmutadas de paquetes y en las redes conmutadas de circuito. "
+"Por ejemplo, cada ruter puede hacer un seguimiento de la media cambiante "
+"de cuantos datos usa cada túnel, combinar eso con todas medias usadas "
+"poro otros túneles en los que participa el ruter, y ser capaz de aceptar "
+"o denegar las peticiones de participación adicional de túnel basándose en"
+" su capacidad y utilización. Por otro lado, cada ruter puede simplemente "
+"denegar los mensajes que están más allá de su capacidad."
#: i2p2www/pages/site/docs/tunnels/implementation.html:489
msgid ""
"In the current implementation, routers implement a\n"
"weighted random early discard (WRED) strategy.\n"
-"For all participating routers (internal participant, inbound gateway, and outbound endpoint),\n"
+"For all participating routers (internal participant, inbound gateway, and"
+" outbound endpoint),\n"
"the router will start randomly dropping a portion of messages as the\n"
"bandwidth limits are approached.\n"
-"As traffic gets closer to, or exceeds, the limits, more messages are dropped.\n"
-"For an internal participant, all messages are fragmented and padded and therefore are the same size.\n"
-"At the inbound gateway and outbound endpoint, however, the dropping decision is made\n"
-"on the full (coalesced) message, and the message size is taken into account.\n"
+"As traffic gets closer to, or exceeds, the limits, more messages are "
+"dropped.\n"
+"For an internal participant, all messages are fragmented and padded and "
+"therefore are the same size.\n"
+"At the inbound gateway and outbound endpoint, however, the dropping "
+"decision is made\n"
+"on the full (coalesced) message, and the message size is taken into "
+"account.\n"
"Larger messages are more likely to be dropped.\n"
-"Also, messages are more likely to be dropped at the outbound endpoint than the inbound gateway,\n"
-"as those messages are not as \"far along\" in their journey and thus the network cost of\n"
+"Also, messages are more likely to be dropped at the outbound endpoint "
+"than the inbound gateway,\n"
+"as those messages are not as \"far along\" in their journey and thus the "
+"network cost of\n"
"dropping those messages is lower."
-msgstr "En la implementación actual, los ruters implementan una estrategia de rechazo temprano ponderada aleatoria, weighted random early discard (WRED) strategy. Para todos los túneles participantes (participante interno, puerta de salida de entrada y punto final de salida), el ruter empezará a denegar una parte de los mensajes según llegue a los límites del ancho de banda. Cuando el tráfico llega cerca, o excede los límites, se rechazan más mensajes. Para un participante interno, todos los mensajes están fragmentados y rellenados y por lo tanto son del mismo tamaño. En la puerta de salida de entrara y en el punto final de salida, sin embargo, la decisión de rechazo se hace en el mensaje completo (junto), y el tamaño del mensaje es tomado en cuenta. Es más fácil que sean eliminados los mensajes más largos. Además, es más fácil que los mensajes sean rechazados en el punto final de salida que en la puerta de salida de entrada, ya que esos mensajes no están tan \"a lo lejos\" en su camino y el coste del rechazo de esos mensajes es menor."
+msgstr ""
+"En la implementación actual, los ruters implementan una estrategia de "
+"rechazo temprano ponderada aleatoria, weighted random early discard "
+"(WRED) strategy. Para todos los túneles participantes (participante "
+"interno, puerta de salida de entrada y punto final de salida), el ruter "
+"empezará a denegar una parte de los mensajes según llegue a los límites "
+"del ancho de banda. Cuando el tráfico llega cerca, o excede los límites, "
+"se rechazan más mensajes. Para un participante interno, todos los "
+"mensajes están fragmentados y rellenados y por lo tanto son del mismo "
+"tamaño. En la puerta de salida de entrara y en el punto final de salida, "
+"sin embargo, la decisión de rechazo se hace en el mensaje completo "
+"(junto), y el tamaño del mensaje es tomado en cuenta. Es más fácil que "
+"sean eliminados los mensajes más largos. Además, es más fácil que los "
+"mensajes sean rechazados en el punto final de salida que en la puerta de "
+"salida de entrada, ya que esos mensajes no están tan \"a lo lejos\" en su"
+" camino y el coste del rechazo de esos mensajes es menor."
#: i2p2www/pages/site/docs/tunnels/implementation.html:507
msgid "Mixing/batching"
@@ -15185,12 +24458,23 @@ msgstr "Mezcla/lotes"
#: i2p2www/pages/site/docs/tunnels/implementation.html:509
msgid ""
-"What strategies could be used at the gateway and at each hop for delaying,\n"
-"reordering, rerouting, or padding messages? To what extent should this be done\n"
-"automatically, how much should be configured as a per tunnel or per hop setting,\n"
-"and how should the tunnel's creator (and in turn, user) control this operation?\n"
-"All of this is left as unknown, to be worked out for a distant future release."
-msgstr "¿Qué estrategias pueden usarse en la puerta de salida y en cada salto para retrasar, re-ordenar, re-enrutar o rellenar los mensajes? ¿En qué medida debe hacerse esto automáticamente, que configuraciones debemos poner por túnel o por salto, y cómo debe controlar esta operación el creador del túnel (y por lo tanto el usuario)? Todo esto se queda en el aire, para ser estudiado en una versión futura distante."
+"What strategies could be used at the gateway and at each hop for "
+"delaying,\n"
+"reordering, rerouting, or padding messages? To what extent should this "
+"be done\n"
+"automatically, how much should be configured as a per tunnel or per hop "
+"setting,\n"
+"and how should the tunnel's creator (and in turn, user) control this "
+"operation?\n"
+"All of this is left as unknown, to be worked out for a distant future "
+"release."
+msgstr ""
+"¿Qué estrategias pueden usarse en la puerta de salida y en cada salto "
+"para retrasar, re-ordenar, re-enrutar o rellenar los mensajes? ¿En qué "
+"medida debe hacerse esto automáticamente, que configuraciones debemos "
+"poner por túnel o por salto, y cómo debe controlar esta operación el "
+"creador del túnel (y por lo tanto el usuario)? Todo esto se queda en el "
+"aire, para ser estudiado en una versión futura distante."
#: i2p2www/pages/site/docs/tunnels/implementation.html:518
msgid "Padding"
@@ -15198,19 +24482,31 @@ msgstr "Relleno"
#: i2p2www/pages/site/docs/tunnels/implementation.html:519
msgid ""
-"The padding strategies can be used on a variety of levels, addressing the\n"
+"The padding strategies can be used on a variety of levels, addressing the"
+"\n"
"exposure of message size information to different adversaries.\n"
-"The current fixed tunnel message size is 1024 bytes. Within this however, the fragmented\n"
-"messages themselves are not padded by the tunnel at all, though for end to end \n"
+"The current fixed tunnel message size is 1024 bytes. Within this "
+"however, the fragmented\n"
+"messages themselves are not padded by the tunnel at all, though for end "
+"to end \n"
"messages, they may be padded as part of the garlic wrapping."
-msgstr "Las estrategias de relleno pueden ser usadas en varios niveles, evitando la exposición del tamaño de los mensajes a los adversarios. El tamaño actual fijo del túnel es de 1024 bytes. Pero los propios mensajes fragmentados no están rellenados por el túnel, por lo que en lo mensajes de fin a fin, deben ser rellenados como parte del envase garlic."
+msgstr ""
+"Las estrategias de relleno pueden ser usadas en varios niveles, evitando "
+"la exposición del tamaño de los mensajes a los adversarios. El tamaño "
+"actual fijo del túnel es de 1024 bytes. Pero los propios mensajes "
+"fragmentados no están rellenados por el túnel, por lo que en lo mensajes "
+"de fin a fin, deben ser rellenados como parte del envase garlic."
#: i2p2www/pages/site/docs/tunnels/implementation.html:529
msgid ""
"WRED strategies have a significant impact on end-to-end performance,\n"
"and prevention of network congestion collapse.\n"
"The current WRED strategy should be carefully evaluated and improved."
-msgstr "Las estrategias WRED tienen un impacto importante en el rendimiento de fin a fin, y en la prevención del colapso de la congestión de la red. Esta estrategia WRED actual debería ser evaluada cuidadosamente y mejorada."
+msgstr ""
+"Las estrategias WRED tienen un impacto importante en el rendimiento de "
+"fin a fin, y en la prevención del colapso de la congestión de la red. "
+"Esta estrategia WRED actual debería ser evaluada cuidadosamente y "
+"mejorada."
#: i2p2www/pages/site/docs/tunnels/old-implementation.html:2
msgid "Old Tunnel Implementation"
@@ -15221,13 +24517,18 @@ msgstr "Implementación vieja del túnel"
msgid ""
"Note: Obsolete - NOT used! Replaced in 0.6.1.10 - see here for the current implementation"
-msgstr "Nota: Obsoleta - ¡NO se usa! Reemplazada en la versión 0.6.1.10 - vea esto para la implementación actual."
+msgstr ""
+"Nota: Obsoleta - ¡NO se usa! Reemplazada en la versión 0.6.1.10 - vea esto para la implementación actual."
#: i2p2www/pages/site/docs/tunnels/unidirectional.html:7
msgid ""
-"This page describes the origins and design of I2P's unidirectional tunnels.\n"
+"This page describes the origins and design of I2P's unidirectional "
+"tunnels.\n"
"For further infomrmation see:"
-msgstr "Esta página describe el origen y el diseño de los túneles unidireccionales de I2P. Para más información vea:"
+msgstr ""
+"Esta página describe el origen y el diseño de los túneles "
+"unidireccionales de I2P. Para más información vea:"
#: i2p2www/pages/site/docs/tunnels/unidirectional.html:13
msgid "Tunnel overview page"
@@ -15259,40 +24560,108 @@ msgid ""
"Several apps and protocols, notably HTTP,\n"
"do transfer data in such manner. Having the traffic follow the same \n"
"route to its destination and back could make it easier for an \n"
-"attacker who has only timing and traffic volume data to infer the path a \n"
+"attacker who has only timing and traffic volume data to infer the path a"
+" \n"
"tunnel is taking.\n"
"Having the response come back along a different path arguably \n"
"makes it harder."
-msgstr "Aunque no estamos al tanto de investigación publicada alguna sobre las \nventajas de túneles unidireccionales, estos parece que hacen más difícil \ndetectar un patrón de solicitud/respuesta, lo cual es bastante posible que\nse detecte sobre un túnel bidireccional. Varias aplicaciones y protocolos, \nnotablemente HTTP, transfieren datos de esta manera. Hacer que el tráfico\nsiga la misma ruta hacia su destino y de vuelta puede ponerlo más fácil \npara un atacante que sólo disponga de datos tiempo y de volumen de tráfico \npara inferir la ruta que está tomando un túnel. Hacer que la respuesta vuelva \na través de otra ruta es razonable que lo haga más difícil."
+msgstr ""
+"Aunque no estamos al tanto de investigación publicada alguna sobre las \n"
+"ventajas de túneles unidireccionales, estos parece que hacen más difícil"
+" \n"
+"detectar un patrón de solicitud/respuesta, lo cual es bastante posible "
+"que\n"
+"se detecte sobre un túnel bidireccional. Varias aplicaciones y "
+"protocolos, \n"
+"notablemente HTTP, transfieren datos de esta manera. Hacer que el tráfico"
+"\n"
+"siga la misma ruta hacia su destino y de vuelta puede ponerlo más fácil \n"
+"para un atacante que sólo disponga de datos tiempo y de volumen de "
+"tráfico \n"
+"para inferir la ruta que está tomando un túnel. Hacer que la respuesta "
+"vuelva \n"
+"a través de otra ruta es razonable que lo haga más difícil."
#: i2p2www/pages/site/docs/tunnels/unidirectional.html:45
msgid ""
"When dealing with \n"
-"an internal adversary or most external adversaries, I2P's undirectional tunnels\n"
-"expose half as much traffic data than would be exposed with bidirectional circuits\n"
-"by simply looking at the flows themselves - an HTTP request and response would \n"
-"follow the same path in Tor, while in I2P the packets making up the request \n"
-"would go out through one or more outbound tunnels and the packets making up \n"
-"the response would come back through one or more different inbound tunnels."
-msgstr "Cuando tratamos con un adversario interno o con la mayoría de adversarios \nexternos, los túneles unidireccionales de I2P exponen como mucho la mitad \nde los datos de tráfico que se expondrían con circuitos bidireccionales \nsimplemente observando los propios flujos - una solicitud y respuesta HTTP \nseguiría la misma ruta en Tor, mientras que en I2P los paquetes que \ncomponen la solicitud saldrían a través de uno o más túneles de salida, y \nlos paquetes que componen la respuesta retornarían a traves de uno o más \ntúneles de entrada diferentes."
+"an internal adversary or most external adversaries, I2P's undirectional "
+"tunnels\n"
+"expose half as much traffic data than would be exposed with bidirectional"
+" circuits\n"
+"by simply looking at the flows themselves - an HTTP request and response "
+"would \n"
+"follow the same path in Tor, while in I2P the packets making up the "
+"request \n"
+"would go out through one or more outbound tunnels and the packets making "
+"up \n"
+"the response would come back through one or more different inbound "
+"tunnels."
+msgstr ""
+"Cuando tratamos con un adversario interno o con la mayoría de adversarios"
+" \n"
+"externos, los túneles unidireccionales de I2P exponen como mucho la mitad"
+" \n"
+"de los datos de tráfico que se expondrían con circuitos bidireccionales \n"
+"simplemente observando los propios flujos - una solicitud y respuesta "
+"HTTP \n"
+"seguiría la misma ruta en Tor, mientras que en I2P los paquetes que \n"
+"componen la solicitud saldrían a través de uno o más túneles de salida, y"
+" \n"
+"los paquetes que componen la respuesta retornarían a traves de uno o más"
+" \n"
+"túneles de entrada diferentes."
#: i2p2www/pages/site/docs/tunnels/unidirectional.html:55
msgid ""
"The strategy of using two separate tunnels for inbound and outbound\n"
-"communication is not the only technique available, and it does have anonymity\n"
-"implications. On the positive side, by using separate tunnels it lessens the\n"
-"traffic data exposed for analysis to participants in a tunnel - for instance,\n"
-"peers in an outbound tunnel from a web browser would only see the traffic of\n"
+"communication is not the only technique available, and it does have "
+"anonymity\n"
+"implications. On the positive side, by using separate tunnels it lessens"
+" the\n"
+"traffic data exposed for analysis to participants in a tunnel - for "
+"instance,\n"
+"peers in an outbound tunnel from a web browser would only see the traffic"
+" of\n"
"an HTTP GET, while the peers in an inbound tunnel would see the payload \n"
-"delivered along the tunnel. With bidirectional tunnels, all participants would\n"
-"have access to the fact that e.g. 1KB was sent in one direction, then 100KB\n"
-"in the other. On the negative side, using unidirectional tunnels means that\n"
-"there are two sets of peers which need to be profiled and accounted for, and\n"
-"additional care must be taken to address the increased speed of predecessor\n"
+"delivered along the tunnel. With bidirectional tunnels, all participants"
+" would\n"
+"have access to the fact that e.g. 1KB was sent in one direction, then "
+"100KB\n"
+"in the other. On the negative side, using unidirectional tunnels means "
+"that\n"
+"there are two sets of peers which need to be profiled and accounted for, "
+"and\n"
+"additional care must be taken to address the increased speed of "
+"predecessor\n"
"attacks. The tunnel pooling and building process\n"
"(peer selection and ordering strategies)\n"
"should minimize the worries of the predecessor attack."
-msgstr "La estrategia de usar dos túneles separados para la comunicación de \nentrada y de salida no es la única técnica disponible, y tiene implicaciones \nen el anonimato. En el lado positivo, al usar túneles separados se reducen \nlos datos de tráfico expuestos al análisis de los participantes en un túnel - \npor ejemplo, los pares (`peers´) en un túnel de entrada desde un navegador \nweb sólo verían el tráfico de un HTTP GET, mientras que los pares en un \ntúnel de entrada verían la carga entregada a través del túnel. Con túneles \nbidireccionales, todos los participantes tendrían acceso al hecho de que, \npor ejemplo, 1 KB fuera enviado en una dirección, y después 100 KB en la \notra. En el lado negativo, usar túneles unidireccionales significa que hay dos \nconjuntos de pares (`peers`) precisan ser perfilados y fiscalizados, y que se debe tener una precaución adicional para afrontar el incremento de velocidad que se ha producido en los ataques de predecesor. El proceso de depositado (`pooling`) y erigido (selección de pares y estrategias de ordenación) debería minimizar las preocupaciones por los ataques de predecesor."
+msgstr ""
+"La estrategia de usar dos túneles separados para la comunicación de \n"
+"entrada y de salida no es la única técnica disponible, y tiene "
+"implicaciones \n"
+"en el anonimato. En el lado positivo, al usar túneles separados se "
+"reducen \n"
+"los datos de tráfico expuestos al análisis de los participantes en un "
+"túnel - \n"
+"por ejemplo, los pares (`peers´) en un túnel de entrada desde un "
+"navegador \n"
+"web sólo verían el tráfico de un HTTP GET, mientras que los pares en un \n"
+"túnel de entrada verían la carga entregada a través del túnel. Con "
+"túneles \n"
+"bidireccionales, todos los participantes tendrían acceso al hecho de que,"
+" \n"
+"por ejemplo, 1 KB fuera enviado en una dirección, y después 100 KB en la"
+" \n"
+"otra. En el lado negativo, usar túneles unidireccionales significa que "
+"hay dos \n"
+"conjuntos de pares (`peers`) precisan ser perfilados y fiscalizados, y "
+"que se debe tener una precaución adicional para afrontar el incremento de"
+" velocidad que se ha producido en los ataques de predecesor. El proceso "
+"de depositado (`pooling`) y erigido (selección de pares y estrategias de "
+"ordenación) debería minimizar las preocupaciones por los ataques de "
+"predecesor."
#: i2p2www/pages/site/docs/tunnels/unidirectional.html:73
msgid "Anonymity"
@@ -15302,71 +24671,139 @@ msgstr "Anonimato"
#, python-format
msgid ""
"A recent paper by Hermann and Grothoff\n"
-"declared that I2P's unidirectional tunnels \"seems to be a bad design decision\"."
-msgstr "Un estudio reciente de Hermann and Grothoff decía que los túneles unidireccionales de I2p \"parecían ser una mala decisión de diseño\""
+"declared that I2P's unidirectional tunnels \"seems to be a bad design "
+"decision\"."
+msgstr ""
+"Un estudio reciente de Hermann and Grothoff decía"
+" que los túneles unidireccionales de I2p \"parecían ser una mala decisión"
+" de diseño\""
#: i2p2www/pages/site/docs/tunnels/unidirectional.html:80
msgid ""
"The paper's main point is that\n"
-"deanonymizations on unidirectional tunnels take a longer time, which is an \n"
-"advantage, but that an attacker can be more certain in the unidirectional case. \n"
-"Therefore, the paper claims it isn't an advantage at all, but a disadvantage, at least\n"
+"deanonymizations on unidirectional tunnels take a longer time, which is "
+"an \n"
+"advantage, but that an attacker can be more certain in the unidirectional"
+" case. \n"
+"Therefore, the paper claims it isn't an advantage at all, but a "
+"disadvantage, at least\n"
"with long-living eepsites."
-msgstr "El punto principal del estudio es que de-anonimizar los túneles unidireccionales toma más tiempo, lo que es una ventaja, pero que el atacante puede estar más seguro en el caso unidireccional. Por lo tanto, el estudio dice que no es ninguna ventaja, sino una desventaja, al menos para las eepsites de vida larga."
+msgstr ""
+"El punto principal del estudio es que de-anonimizar los túneles "
+"unidireccionales toma más tiempo, lo que es una ventaja, pero que el "
+"atacante puede estar más seguro en el caso unidireccional. Por lo tanto, "
+"el estudio dice que no es ninguna ventaja, sino una desventaja, al menos "
+"para las eepsites de vida larga."
#: i2p2www/pages/site/docs/tunnels/unidirectional.html:88
msgid ""
-"This conclusion is not fully supported by the paper. Unidirectional tunnels clearly \n"
-"mitigate other attacks and it's not clear how to trade off the risk of the \n"
+"This conclusion is not fully supported by the paper. Unidirectional "
+"tunnels clearly \n"
+"mitigate other attacks and it's not clear how to trade off the risk of "
+"the \n"
"attack in the paper\n"
"with attacks on a bidirectional tunnel architecture."
-msgstr "Esta conclusión no está totalmente confirmada en el estudio. Los túneles unidireccionales mitigan claramente otros ataques y no está claro si es inteligente sacrificar el riesgo del ataque del estudio por los riesgos de la arquitectura de túneles bidireccionales."
+msgstr ""
+"Esta conclusión no está totalmente confirmada en el estudio. Los túneles "
+"unidireccionales mitigan claramente otros ataques y no está claro si es "
+"inteligente sacrificar el riesgo del ataque del estudio por los riesgos "
+"de la arquitectura de túneles bidireccionales."
#: i2p2www/pages/site/docs/tunnels/unidirectional.html:95
msgid ""
"This conclusion is based on an arbitrary certainty vs. time weighting \n"
"(tradeoff) that may not be applicable in all cases. For \n"
-"example, somebody could make a list of possible IPs then issue subpoenas to \n"
+"example, somebody could make a list of possible IPs then issue subpoenas "
+"to \n"
"each. Or the attacker could DDoS each in turn and via a simple \n"
-"intersection attack see if the eepsite goes down or is slowed down. So close \n"
+"intersection attack see if the eepsite goes down or is slowed down. So "
+"close \n"
"may be good enough, or time may be more important."
-msgstr "Esta conclusión está basada en una certeza arbitraria vs. la medición del tiempo (compensación) que no es apreciable en la mayoría de los casos. Por ejemplo, alguien podría hacer una lista de IPs y entonces expedir citaciones a cada uno. O el atacante podría hacer DDos a cada uno por turnos y a través de un simple ataque de intersección ver si la eepsite se cae o si se ralentiza. Estar cerca puede ser lo suficientemente bueno, o el tiempo puede ser más importante."
+msgstr ""
+"Esta conclusión está basada en una certeza arbitraria vs. la medición del"
+" tiempo (compensación) que no es apreciable en la mayoría de los casos. "
+"Por ejemplo, alguien podría hacer una lista de IPs y entonces expedir "
+"citaciones a cada uno. O el atacante podría hacer DDos a cada uno por "
+"turnos y a través de un simple ataque de intersección ver si la eepsite "
+"se cae o si se ralentiza. Estar cerca puede ser lo suficientemente bueno,"
+" o el tiempo puede ser más importante."
#: i2p2www/pages/site/docs/tunnels/unidirectional.html:104
msgid ""
-"The conclusion is based on a specific weighting of the importance of certainty \n"
-"vs. time, and that weighting may be wrong, and it's definitely debatable, \n"
-"especially in a real world with subpoenas, search warrants, and other methods \n"
+"The conclusion is based on a specific weighting of the importance of "
+"certainty \n"
+"vs. time, and that weighting may be wrong, and it's definitely debatable,"
+" \n"
+"especially in a real world with subpoenas, search warrants, and other "
+"methods \n"
"available for final confirmation."
-msgstr "La conclusión está basada en una forma de medir específica de la importancia de la certeza vs. el tiempo, y esa medida puede estar equivocada, y es definitivamente discutible, especialmente en el mundo real con citaciones, órdenes de registro y otros métodos disponibles."
+msgstr ""
+"La conclusión está basada en una forma de medir específica de la "
+"importancia de la certeza vs. el tiempo, y esa medida puede estar "
+"equivocada, y es definitivamente discutible, especialmente en el mundo "
+"real con citaciones, órdenes de registro y otros métodos disponibles."
#: i2p2www/pages/site/docs/tunnels/unidirectional.html:111
msgid ""
"A full analysis of the tradeoffs of unidirectional vs. bidirectional \n"
-"tunnels is clearly outside the scope of the paper, and has not been done \n"
-"elsewhere. For example, how does this attack compare to the numerous possible \n"
-"timing attacks published about onion-routed networks? Clearly the authors have not\n"
+"tunnels is clearly outside the scope of the paper, and has not been done"
+" \n"
+"elsewhere. For example, how does this attack compare to the numerous "
+"possible \n"
+"timing attacks published about onion-routed networks? Clearly the authors"
+" have not\n"
"done that analysis, if it's even possible to do it\n"
"effectively."
-msgstr "Un análisis completo de las compensaciones de los túneles unidireccionales vs. bidireccionales está claramente fuera del alcance del estudio, y no se ha hecho en ningún sitio. Por ejemplo, ¿cómo se compara este ataque con los numerosos posibles ataques publicados sobre la red onion? Claramente los autores no han hecho ese análisis, si pudiese ser posible hacerlo efectivamente."
+msgstr ""
+"Un análisis completo de las compensaciones de los túneles "
+"unidireccionales vs. bidireccionales está claramente fuera del alcance "
+"del estudio, y no se ha hecho en ningún sitio. Por ejemplo, ¿cómo se "
+"compara este ataque con los numerosos posibles ataques publicados sobre "
+"la red onion? Claramente los autores no han hecho ese análisis, si "
+"pudiese ser posible hacerlo efectivamente."
#: i2p2www/pages/site/docs/tunnels/unidirectional.html:120
msgid ""
-"Tor uses bidirectional tunnels and has had a lot of academic review. I2P \n"
-"uses unidirectional tunnels and has had very little review. Does the lack of a \n"
-"research paper defending unidirectional tunnels mean that it is a poor design \n"
+"Tor uses bidirectional tunnels and has had a lot of academic review. I2P"
+" \n"
+"uses unidirectional tunnels and has had very little review. Does the lack"
+" of a \n"
+"research paper defending unidirectional tunnels mean that it is a poor "
+"design \n"
"choice, or just that it needs more study? Timing attacks and \n"
-"distributed attacks are difficult to defend against in both I2P and Tor. The \n"
-"design intent (see references above) was that unidirectional tunnels are more \n"
-"resistant to timing attacks. However, the paper presents a somewhat different type of timing \n"
+"distributed attacks are difficult to defend against in both I2P and Tor. "
+"The \n"
+"design intent (see references above) was that unidirectional tunnels are "
+"more \n"
+"resistant to timing attacks. However, the paper presents a somewhat "
+"different type of timing \n"
"attack. Is this attack, innovative as it is, sufficient to label I2P's \n"
"tunnel architecture (and thus I2P as a whole) a \"bad design\", and by \n"
-"implication clearly inferior to Tor, or is it just a design alternative that \n"
-"clearly needs further investigation and analysis? There are several other reasons \n"
-"to consider I2P currently inferior to Tor and other projects (small network \n"
-"size, lack of funding, lack of review) but is unidirectional tunnels really a \n"
+"implication clearly inferior to Tor, or is it just a design alternative "
+"that \n"
+"clearly needs further investigation and analysis? There are several other"
+" reasons \n"
+"to consider I2P currently inferior to Tor and other projects (small "
+"network \n"
+"size, lack of funding, lack of review) but is unidirectional tunnels "
+"really a \n"
"reason?"
-msgstr "Tor utiliza túneles bidireccionales y tiene mucha revisión académica. I2P usa túneles unidireccionales y tiene muy poca revisión. ¿Significa la falta de estudios defendiendo los túneles unidireccionales que son una mala elección de diseño, o sólo necesita más estudio? Contra los ataques de tiempo y los ataques distribuidos para I2P y tor es difícil defenderse para ambos. El intento de diseño (vea las referencias arriba) era que los túneles de diseño eran más resistentes a los ataques de tiempo. Sin embargo, el estudio presenta un tipo diferente de ataque de tiempo. ¿Es este ataque, innovador, suficiente para calificar la arquitectura de túneles de I2P (y por lo tanto a I2P al completo) de un \"mal diseño\", y por implicación, claramente inferior a Tor, o simplemente es una alternativa de diseño que claramente necesita más investigación y análisis? Hay otras razones para considerar a I2p inferior a Tor y a otros proyectos (el pequeño tamaño de la red, falta de fondos, falta de revisión) ¿pero son los túneles unidireccionales de verdad una razón?"
+msgstr ""
+"Tor utiliza túneles bidireccionales y tiene mucha revisión académica. I2P"
+" usa túneles unidireccionales y tiene muy poca revisión. ¿Significa la "
+"falta de estudios defendiendo los túneles unidireccionales que son una "
+"mala elección de diseño, o sólo necesita más estudio? Contra los ataques "
+"de tiempo y los ataques distribuidos para I2P y tor es difícil defenderse"
+" para ambos. El intento de diseño (vea las referencias arriba) era que "
+"los túneles de diseño eran más resistentes a los ataques de tiempo. Sin "
+"embargo, el estudio presenta un tipo diferente de ataque de tiempo. ¿Es "
+"este ataque, innovador, suficiente para calificar la arquitectura de "
+"túneles de I2P (y por lo tanto a I2P al completo) de un \"mal diseño\", y"
+" por implicación, claramente inferior a Tor, o simplemente es una "
+"alternativa de diseño que claramente necesita más investigación y "
+"análisis? Hay otras razones para considerar a I2p inferior a Tor y a "
+"otros proyectos (el pequeño tamaño de la red, falta de fondos, falta de "
+"revisión) ¿pero son los túneles unidireccionales de verdad una razón?"
#: i2p2www/pages/site/docs/tunnels/unidirectional.html:137
msgid ""
@@ -15374,4 +24811,10 @@ msgid ""
"not label bidirectional tunnels \"bad\") shorthand for \"unidirectional \n"
"tunnels are unequivocally inferior to bidirectional tunnels\", yet this \n"
"conclusion is not supported by the paper."
-msgstr "En resumen, la \"mala decisión de diseño\" parece (ya que el estudio no califica a los túneles bidireccionales de \"malos\") otra forma de decir que los túneles \"unidireccionales son inequívocamente inferiores a los túneles bidireccionales\", aunque esta conclusión no está demostrada en el estudio."
+msgstr ""
+"En resumen, la \"mala decisión de diseño\" parece (ya que el estudio no "
+"califica a los túneles bidireccionales de \"malos\") otra forma de decir "
+"que los túneles \"unidireccionales son inequívocamente inferiores a los "
+"túneles bidireccionales\", aunque esta conclusión no está demostrada en "
+"el estudio."
+
diff --git a/i2p2www/translations/es/LC_MESSAGES/get-involved.po b/i2p2www/translations/es/LC_MESSAGES/get-involved.po
index 42ee5e81..8d6a3150 100644
--- a/i2p2www/translations/es/LC_MESSAGES/get-involved.po
+++ b/i2p2www/translations/es/LC_MESSAGES/get-involved.po
@@ -1,7 +1,7 @@
-# Translations template for I2P.
+# Spanish translations for I2P.
# Copyright (C) 2014 ORGANIZATION
# This file is distributed under the same license as the I2P project.
-#
+#
# Translators:
# Adolfo Jayme Barrientos , 2013
# Daniel Mustieles , 2013
@@ -12,21 +12,20 @@
# strel, 2013
# trolly, 2013
# Trolly, 2013
-# Trolly, 2013
msgid ""
msgstr ""
-"Project-Id-Version: I2P\n"
+"Project-Id-Version: I2P\n"
"Report-Msgid-Bugs-To: http://trac.i2p2.de\n"
"POT-Creation-Date: 2014-11-27 12:12+0000\n"
"PO-Revision-Date: 2014-11-27 12:15+0000\n"
"Last-Translator: str4d \n"
-"Language-Team: Spanish (http://www.transifex.com/projects/p/I2P/language/es/)\n"
+"Language-Team: Spanish "
+"(http://www.transifex.com/projects/p/I2P/language/es/)\n"
+"Plural-Forms: nplurals=2; plural=(n != 1)\n"
"MIME-Version: 1.0\n"
-"Content-Type: text/plain; charset=UTF-8\n"
+"Content-Type: text/plain; charset=utf-8\n"
"Content-Transfer-Encoding: 8bit\n"
"Generated-By: Babel 1.3\n"
-"Language: es\n"
-"Plural-Forms: nplurals=2; plural=(n != 1);\n"
#: i2p2www/pages/site/get-involved/donate.html:2
#: i2p2www/pages/site/get-involved/index.html:77
@@ -38,7 +37,9 @@ msgid ""
"Thank you for your interest in contributing to I2P!\n"
"The details of how you\n"
"can make your contribution are provided below."
-msgstr "¡Gracias por su interés en contribuir a I2P! Los detalles de como puede hacer una contribución se indican más abajo."
+msgstr ""
+"¡Gracias por su interés en contribuir a I2P! Los detalles de como puede "
+"hacer una contribución se indican más abajo."
#: i2p2www/pages/site/get-involved/donate.html:10
msgid "Tax Status"
@@ -49,7 +50,11 @@ msgid ""
"I2P is not incorporated.\n"
"Your contributions are probably not tax-deductible.\n"
"If you would like to discuss a large contribution, please contact eche|on."
-msgstr "I2P no es una corporación.\nSus contribuciones probablemente no son deducibles.\nSi quisiese discutir acerca de la realización de una gran contribución, por favor contacte con eche|on."
+msgstr ""
+"I2P no es una corporación.\n"
+"Sus contribuciones probablemente no son deducibles.\n"
+"Si quisiese discutir acerca de la realización de una gran contribución, "
+"por favor contacte con eche|on."
#: i2p2www/pages/site/get-involved/donate.html:17
msgid "Stickers"
@@ -59,10 +64,22 @@ msgstr "Pegatinas"
msgid ""
"While supplies last, we offer I2P stickers to those who donate enough\n"
"to cover PayPal fees and postage from the U.S.\n"
-"You must include \"stickers please\" and your address in the Paypal comments.\n"
+"You must include \"stickers please\" and your address in the Paypal "
+"comments.\n"
"For other payment methods, follow up with an email to eche|on\n"
-"with the subject \"stickers please\", your payment information, and your address."
-msgstr "Aunque la provisión aún dura, ofrecemos pegatinas de I2P a aquellos que donen\nlo suficiente para cubir las tasas de PayPal y el servicio postal desde EEUU.\nDebe incluir \"stickers please\" (pegatinas por favor) y su dirección física\nen los comentarios de PayPal.\nPara otros métodos de pago, remita un correo electrónico a eche|on con el \nasunto \"stickers please\", su información de pago, y su dirección física."
+"with the subject \"stickers please\", your payment information, and your "
+"address."
+msgstr ""
+"Aunque la provisión aún dura, ofrecemos pegatinas de I2P a aquellos que "
+"donen\n"
+"lo suficiente para cubir las tasas de PayPal y el servicio postal desde "
+"EEUU.\n"
+"Debe incluir \"stickers please\" (pegatinas por favor) y su dirección "
+"física\n"
+"en los comentarios de PayPal.\n"
+"Para otros métodos de pago, remita un correo electrónico a eche|on con el"
+" \n"
+"asunto \"stickers please\", su información de pago, y su dirección física."
#: i2p2www/pages/site/get-involved/donate.html:27
#, python-format
@@ -74,7 +91,14 @@ msgid ""
"desired amount of coins to the account %(account)s\n"
"and leave eche|on a note if you'd like your donation to be\n"
"mentioned on the I2P webpage."
-msgstr "Desde %(date)s, eche|on ha estado ha estado llevando una\ncuenta en %(cointype)s para el proyecto I2P.\n¡ATENCIÓN! La dirección cambió el 20-02-2014. ¡ATENCIÓN!\nSi desea donar usando %(cointype)s, simplemente transfiera la\ncantidad que desee a la cuenta %(account)s\ny deje a eche|on una nota si quiere que su donación sea\nmencionada en la página de I2P."
+msgstr ""
+"Desde %(date)s, eche|on ha estado ha estado llevando una\n"
+"cuenta en %(cointype)s para el proyecto I2P.\n"
+"¡ATENCIÓN! La dirección cambió el 20-02-2014. ¡ATENCIÓN!\n"
+"Si desea donar usando %(cointype)s, simplemente transfiera la\n"
+"cantidad que desee a la cuenta %(account)s\n"
+"y deje a eche|on una nota si quiere que su donación sea\n"
+"mencionada en la página de I2P."
#: i2p2www/pages/site/get-involved/donate.html:39
#: i2p2www/pages/site/get-involved/donate.html:56
@@ -92,7 +116,14 @@ msgid ""
"desired amount of coins to the account %(account)s\n"
"and leave eche|on a note if you'd like your donation to be\n"
"mentioned on the I2P webpage."
-msgstr "Desde %(date)s, eche|on ha estado ha estado llevando una\ncuenta en %(cointype)s para el proyecto I2P.\n¡ATENCIÓN! La dirección cambió el 20-02-2014. ¡ATENCIÓN!\nSi desea donar usando %(cointype)s, simplemente transfiera la\ncantidad que desee a la cuenta %(account)s\ny deje a eche|on una nota si quiere que su donación sea\nmencionada en la página de I2P."
+msgstr ""
+"Desde %(date)s, eche|on ha estado ha estado llevando una\n"
+"cuenta en %(cointype)s para el proyecto I2P.\n"
+"¡ATENCIÓN! La dirección cambió el 20-02-2014. ¡ATENCIÓN!\n"
+"Si desea donar usando %(cointype)s, simplemente transfiera la\n"
+"cantidad que desee a la cuenta %(account)s\n"
+"y deje a eche|on una nota si quiere que su donación sea\n"
+"mencionada en la página de I2P."
#: i2p2www/pages/site/get-involved/donate.html:61
#, python-format
@@ -103,15 +134,25 @@ msgid ""
"desired amount of coins to the account %(account)s\n"
"and leave Meeh a note if you'd like your donation to be\n"
"mentioned on the I2P webpage."
-msgstr "Desde %(date)s, Meeh ha estado llevando una\ncuenta de %(cointype)s para el proyecto I2P.\nSi desea donar usando %(cointype)s, simplemente tranfiera la\ncantidad de moneda que desee a la cuenta %(account)s\ny deje una nota a Meeh si quiere que su donación se mencione\nen la página web de I2P.."
+msgstr ""
+"Desde %(date)s, Meeh ha estado llevando una\n"
+"cuenta de %(cointype)s para el proyecto I2P.\n"
+"Si desea donar usando %(cointype)s, simplemente tranfiera la\n"
+"cantidad de moneda que desee a la cuenta %(account)s\n"
+"y deje una nota a Meeh si quiere que su donación se mencione\n"
+"en la página web de I2P.."
#: i2p2www/pages/site/get-involved/donate.html:77
#, python-format
msgid ""
-"We accept most altcoins, just ask Meeh. Other altcoins can be converted and "
-"exchanged for a crypto currency we currently support. Please send a mail to "
-"\"%(account)s\" for a such donation."
-msgstr "Aceptamos la mayoría de monedas alternativas (altcoins), tan sólo pregunte a Meeh. Otras monedas alternativas pueden ser convertidas e intercambiadas por una cripto-moneda que soportemos actualmente. Por favor envíenos un correo a \"%(account)s\" para una donación como esa."
+"We accept most altcoins, just ask Meeh. Other altcoins can be converted "
+"and exchanged for a crypto currency we currently support. Please send a "
+"mail to \"%(account)s\" for a such donation."
+msgstr ""
+"Aceptamos la mayoría de monedas alternativas (altcoins), tan sólo "
+"pregunte a Meeh. Otras monedas alternativas pueden ser convertidas e "
+"intercambiadas por una cripto-moneda que soportemos actualmente. Por "
+"favor envíenos un correo a \"%(account)s\" para una donación como esa."
#: i2p2www/pages/site/get-involved/donate.html:84
#, python-format
@@ -151,23 +192,37 @@ msgstr "Donar con "
#: i2p2www/pages/site/get-involved/donate.html:162
msgid ""
-"If you want to keep more or less anonymous, the option to send money via mail is also available. But it is less secure\n"
+"If you want to keep more or less anonymous, the option to send money via "
+"mail is also available. But it is less secure\n"
"as the envelope can be lost on the way to us."
-msgstr "Si desea permanecer más o menos anónimo, puede enviar el dinero por correo. Pero es menos seguro ya que la carta puede perderse en el camino."
+msgstr ""
+"Si desea permanecer más o menos anónimo, puede enviar el dinero por "
+"correo. Pero es menos seguro ya que la carta puede perderse en el camino."
#: i2p2www/pages/site/get-involved/donate.html:166
#, python-format
msgid ""
-"If you'd like to donate via snail mail, send an email to %(email)s\n"
+"If you'd like to donate via snail mail, send an email to %(email)s\n"
" and you'll receive an email with instructions detailing how to proceed."
-msgstr "Si desea donar a través de correo caracol, snail mail, envíe un email a %(email)s y recibirá un email con las instrucciones de como debe proceder."
+msgstr ""
+"Si desea donar a través de correo caracol, snail mail, envíe un email a "
+"%(email)s y recibirá un email con las instrucciones de "
+"como debe proceder."
#: i2p2www/pages/site/get-involved/donate.html:171
#, python-format
msgid ""
-"In the meantime, feel free to take a look at the generous donations that have been\n"
-"given in support of the I2P Project at the hall of fame."
-msgstr "Mientras tanto, puede echar una ojeada a las generosas donaciones que han sido dadas para el soporte del proyecto I2P en el salón de la fama."
+"In the meantime, feel free to take a look at the generous donations that "
+"have been\n"
+"given in support of the I2P Project at the hall of fame."
+msgstr ""
+"Mientras tanto, puede echar una ojeada a las generosas donaciones que han"
+" sido dadas para el soporte del proyecto I2P en el salón de la fama."
#: i2p2www/pages/site/get-involved/index.html:2
msgid "Get Involved!"
@@ -179,22 +234,35 @@ msgstr "¡Necesitamos su ayuda!"
#: i2p2www/pages/site/get-involved/index.html:5
msgid ""
-"To get involved, please feel free to join us on the #i2p-dev IRC channel (on\n"
-"irc.freenode.net, irc.oftc.net, or within I2P on irc.echelon.i2p, irc.dg.i2p or irc.postman.i2p)."
-msgstr "Para involucrarse, por favor libremente únase a nosotros en el canal de IRC #i2p-dev (en\nirc.freenode.net, irc.oftc.net, o dentro de I2P en irc.echelon.i2p, irc.dg.i2p o irc.postman.i2p)."
+"To get involved, please feel free to join us on the #i2p-dev IRC channel "
+"(on\n"
+"irc.freenode.net, irc.oftc.net, or within I2P on irc.echelon.i2p, "
+"irc.dg.i2p or irc.postman.i2p)."
+msgstr ""
+"Para involucrarse, por favor libremente únase a nosotros en el canal de "
+"IRC #i2p-dev (en\n"
+"irc.freenode.net, irc.oftc.net, o dentro de I2P en irc.echelon.i2p, "
+"irc.dg.i2p o irc.postman.i2p)."
#: i2p2www/pages/site/get-involved/index.html:9
#, python-format
msgid ""
-"If you're interested in joining our team, please get in\n"
+"If you're interested in joining our team, please"
+" get in\n"
"touch as we're always looking for eager contributors!"
-msgstr "¡Si está interesado en unirse a nuestro equipo, por favor póngase en contacto con nosotros, ya que siempre estamos buscando ayudantes entusiastas!"
+msgstr ""
+"¡Si está interesado en unirse a nuestro equipo, "
+"por favor póngase en contacto con nosotros, ya que siempre estamos "
+"buscando ayudantes entusiastas!"
#: i2p2www/pages/site/get-involved/index.html:13
msgid ""
-"We need help in many areas, and you don't need to know Java to contribute!\n"
+"We need help in many areas, and you don't need to know Java to "
+"contribute!\n"
"Here's a list to help you get started!"
-msgstr "¡Necesitamos ayuda en muchas áreas, y no necesita saber Java para contribuir! ¡Aquí hay una lista para ayudarle a decidirse!"
+msgstr ""
+"¡Necesitamos ayuda en muchas áreas, y no necesita saber Java para "
+"contribuir! ¡Aquí hay una lista para ayudarle a decidirse!"
#: i2p2www/pages/site/get-involved/index.html:18
msgid "Spread the Word!"
@@ -205,7 +273,10 @@ msgid ""
"Tell people about I2P on forums, blogs, and comments to articles.\n"
"Fix up the Wikipedia article about I2P in your language.\n"
"Tell your friends."
-msgstr "Háblele a la gente sobre I2P en foros, blogs y comentarios de artículos. Mejore la entrada en la Wikipedia sobre I2P en su idioma. Dígaselo a sus amigos."
+msgstr ""
+"Háblele a la gente sobre I2P en foros, blogs y comentarios de artículos."
+" Mejore la entrada en la Wikipedia sobre I2P en su idioma. Dígaselo a sus"
+" amigos."
#: i2p2www/pages/site/get-involved/index.html:24
msgid "Testing"
@@ -216,7 +287,10 @@ msgstr "Pruebas"
msgid ""
"Run the latest builds from monotone\n"
"and report results on #i2p or as bugs on Trac."
-msgstr "Ejecute las últimas versiones de monotone e informe de los resultados en #i2p o los fallos en el Trac."
+msgstr ""
+"Ejecute las últimas versiones de monotone e "
+"informe de los resultados en #i2p o los fallos en el Trac."
#: i2p2www/pages/site/get-involved/index.html:30
msgid "Documentation"
@@ -226,7 +300,9 @@ msgstr "Documentación"
msgid ""
"Help fix the parts of the website that are outdated or incomplete.\n"
"Translate pages into other languages."
-msgstr "Ayude a mejorar las partes de la web que están anticuadas o incompletas. Traduzca las páginas a otros idiomas."
+msgstr ""
+"Ayude a mejorar las partes de la web que están anticuadas o incompletas. "
+"Traduzca las páginas a otros idiomas."
#: i2p2www/pages/site/get-involved/index.html:35
msgid "Pictures"
@@ -253,7 +329,10 @@ msgid ""
"Run a service on an eepsite. It could be a proxy, a forum, a tracker,\n"
"a naming service, a search engine, an eepsite monitor... many of these\n"
"aren't that hard."
-msgstr "Ejecute algún servicio en su eepsite. Puede ser un proxy, un foro, un tracker, un servidor de dominios, una motor de búsquedas, un monitor de eepsites... muchos de estos no son tan difíciles."
+msgstr ""
+"Ejecute algún servicio en su eepsite. Puede ser un proxy, un foro, un "
+"tracker, un servidor de dominios, una motor de búsquedas, un monitor de "
+"eepsites... muchos de estos no son tan difíciles."
#: i2p2www/pages/site/get-involved/index.html:49
msgid "Applications"
@@ -264,7 +343,9 @@ msgstr "Aplicaciones"
msgid ""
"Write or port applications for I2P! There's some guidelines and\n"
"a list of ideas on the applications page."
-msgstr "¡Escriba o porte aplicaciones para I2P! Hay algunas guías y una lista de ideas en la página de aplicaciones."
+msgstr ""
+"¡Escriba o porte aplicaciones para I2P! Hay algunas guías y una lista de "
+"ideas en la página de aplicaciones."
#: i2p2www/pages/site/get-involved/index.html:54
msgid "Coding"
@@ -278,7 +359,12 @@ msgid ""
"or the TODO list on %(zzz)s for\n"
"some ideas on where to start.\n"
"See the new developer's guide for details."
-msgstr "Hay mucho que hacer si conoce Java o está listo para aprenderlo. Compruebe los tickets abiertos en el Trac o la lista TODO en %(zzz)s para hacerse una idea de dónde empezar. Para más detalles vea la guía de los nuevos desarrolladores"
+msgstr ""
+"Hay mucho que hacer si conoce Java o está listo para aprenderlo. "
+"Compruebe los tickets abiertos en el Trac o la "
+"lista TODO en %(zzz)s para hacerse una "
+"idea de dónde empezar. Para más detalles vea la guía de los nuevos desarrolladores"
#: i2p2www/pages/site/get-involved/index.html:64
msgid "Translation"
@@ -289,7 +375,10 @@ msgstr "Traducciones"
msgid ""
"Help translate the website and the software into your language.\n"
"See the new translator's guide for details."
-msgstr "Ayude a traducir la página web y las aplicaciones a su lenguaje. Vea la guía de nuevos traductores para más información."
+msgstr ""
+"Ayude a traducir la página web y las aplicaciones a su lenguaje. Vea la "
+"guía de nuevos traductores para más "
+"información."
#: i2p2www/pages/site/get-involved/index.html:69
msgid "Analysis"
@@ -303,7 +392,11 @@ msgid ""
"threat models,\n"
"and DOS and other weaknesses due to securities holes,\n"
"need researching."
-msgstr "Estudie o pruebe el código buscando vulnerabilidades. Se necesita estudiar tanto las vulnerabilidades del anonimato de varios modelos de amenazas, como los ataques DOS y otras debilidades debidas a errores en la seguridad."
+msgstr ""
+"Estudie o pruebe el código buscando vulnerabilidades. Se necesita "
+"estudiar tanto las vulnerabilidades del anonimato de varios modelos de amenazas, como los ataques DOS y "
+"otras debilidades debidas a errores en la seguridad."
#: i2p2www/pages/site/get-involved/roadmap.html:2
msgid "Roadmap"
@@ -313,14 +406,19 @@ msgstr "Hoja de ruta"
msgid ""
"Include some seed data in the distribution so a central reseed location "
"isn't required?"
-msgstr "¿Asegurarnos de que I2P en la instalación automáticamente se una a la red y así no haría falta ninguna localización central para esto?"
+msgstr ""
+"¿Asegurarnos de que I2P en la instalación automáticamente se una a la red"
+" y así no haría falta ninguna localización central para esto?"
#: i2p2www/pages/site/get-involved/roadmap.html:10
#, python-format
msgid ""
"Reachability Mapping / handle peers partially reachable / enhanced restricted routes"
-msgstr "Mapeado de accesibilidad / manejar los pares parcialmente accesibles / mejorar los ruters restringidos"
+msgstr ""
+"Mapeado de accesibilidad / manejar los pares parcialmente accesibles / "
+"mejorar los ruters "
+"restringidos"
#: i2p2www/pages/site/get-involved/roadmap.html:13
msgid "Improve help pages and website"
@@ -344,9 +442,11 @@ msgstr "Examen completo de las vulnerabilidades y problemas de anonimato."
#: i2p2www/pages/site/get-involved/roadmap.html:22
msgid ""
-"Reduce memory usage, remove debugging overhead, make it run better on slow "
-"and embedded machines"
-msgstr "Reducción del uso de memoria, eliminar el gasto superfluo de la depuración, hacer que corra más ligero en hardware pequeño y lento. "
+"Reduce memory usage, remove debugging overhead, make it run better on "
+"slow and embedded machines"
+msgstr ""
+"Reducción del uso de memoria, eliminar el gasto superfluo de la "
+"depuración, hacer que corra más ligero en hardware pequeño y lento. "
#: i2p2www/pages/site/get-involved/roadmap.html:25
msgid "Docs"
@@ -369,7 +469,9 @@ msgstr "Mensajes con el retraso definido por los usuarios"
msgid ""
"Please see the TODO list for more detailed info "
"about some of these tasks."
-msgstr "Por favor, vea la lista TODO , por hacer, para obtener información mas detallada sobre estas tareas."
+msgstr ""
+"Por favor, vea la lista TODO , por hacer, para "
+"obtener información mas detallada sobre estas tareas."
#: i2p2www/pages/site/get-involved/todo.html:2
msgid "I2P Project Targets"
@@ -378,15 +480,31 @@ msgstr "Objetivos del proyecto I2P"
#: i2p2www/pages/site/get-involved/todo.html:4
#, python-format
msgid ""
-"Below is a more detailed (yet still incomplete) discussion of the major areas\n"
-"of future development on the core I2P network, spanning the plausibly planned\n"
-"releases. This does not include stego transports, porting to wireless devices,\n"
-"or tools to secure the local machine, nor does it include client applications\n"
-"that will be essential in I2P's success. There are probably other things that\n"
-"will come up, especially as I2P gets more peer review, but these are the main\n"
-"'big things'. See also the roadmap. Want to help?\n"
+"Below is a more detailed (yet still incomplete) discussion of the major "
+"areas\n"
+"of future development on the core I2P network, spanning the plausibly "
+"planned\n"
+"releases. This does not include stego transports, porting to wireless "
+"devices,\n"
+"or tools to secure the local machine, nor does it include client "
+"applications\n"
+"that will be essential in I2P's success. There are probably other things "
+"that\n"
+"will come up, especially as I2P gets more peer review, but these are the "
+"main\n"
+"'big things'. See also the roadmap. Want to "
+"help?\n"
"Get involved!"
-msgstr "Más abajo hay una discusión detallada (aunque aún no completa) de las áreas más importantes del futuro desarrollo del núcleo de I2P, que abarca los posibles planes de desarrollo. Esto no incluye transporte oculto, portarlo a dispositivos Wireless o herramientas para asegurar la máquina local, tampoco incluye otras aplicaciones cliente que serían esenciales para el éxito de I2P. Probablemente aparecerán otros temas, especialmente si I2P recibe mas atención, pero estas son ls 'cosas importantes'. Vea también la hoja de ruta. ¿Quiere ayudar? ¡Únete!"
+msgstr ""
+"Más abajo hay una discusión detallada (aunque aún no completa) de las "
+"áreas más importantes del futuro desarrollo del núcleo de I2P, que abarca"
+" los posibles planes de desarrollo. Esto no incluye transporte oculto, "
+"portarlo a dispositivos Wireless o herramientas para asegurar la máquina "
+"local, tampoco incluye otras aplicaciones cliente que serían esenciales "
+"para el éxito de I2P. Probablemente aparecerán otros temas, especialmente"
+" si I2P recibe mas atención, pero estas son ls 'cosas importantes'. Vea "
+"también la hoja de ruta. ¿Quiere ayudar? ¡Únete!"
#: i2p2www/pages/site/get-involved/todo.html:15
#: i2p2www/pages/site/get-involved/todo.html:38
@@ -402,7 +520,9 @@ msgstr "enlace"
#: i2p2www/pages/site/get-involved/todo.html:17
#: i2p2www/pages/site/get-involved/todo.html:41
msgid "NetworkDB and profile tuning and ejection policy for large nets"
-msgstr "Base de datos de la red, NetworkDB, y ajustes del perfil y política de expulsión para grandes redes. "
+msgstr ""
+"Base de datos de la red, NetworkDB, y ajustes del perfil y política de "
+"expulsión para grandes redes. "
#: i2p2www/pages/site/get-involved/todo.html:21
#: i2p2www/pages/site/get-involved/todo.html:65
@@ -412,22 +532,30 @@ msgstr "Seguridad / anonimato"
#: i2p2www/pages/site/get-involved/todo.html:23
#: i2p2www/pages/site/get-involved/todo.html:68
msgid "Full blown n-hop restricted routes with optional trusted links"
-msgstr "Mejor personalización de los ruters y un mejor control de los ruters usados."
+msgstr ""
+"Mejor personalización de los ruters y un mejor control de los ruters "
+"usados."
#: i2p2www/pages/site/get-involved/todo.html:26
#: i2p2www/pages/site/get-involved/todo.html:87
msgid "Hashcash for routerIdentity, destination, and tunnel request"
-msgstr "Añadir Hashcash a la identidad del ruter, destinación y solicitud de respuesta."
+msgstr ""
+"Añadir Hashcash a la identidad del ruter, destinación y solicitud de "
+"respuesta."
#: i2p2www/pages/site/get-involved/todo.html:29
#: i2p2www/pages/site/get-involved/todo.html:116
msgid "Advanced tunnel operation (batching/mixing/throttling/padding)"
-msgstr "Control avanzado del funcionamiento del ruter (procesamiento por lotes/mezclado/control de velocidad)"
+msgstr ""
+"Control avanzado del funcionamiento del ruter (procesamiento por "
+"lotes/mezclado/control de velocidad)"
#: i2p2www/pages/site/get-involved/todo.html:32
#: i2p2www/pages/site/get-involved/todo.html:153
msgid "Stop & go mix w/ garlics & tunnels"
-msgstr "Configuración avanzada del enrutamiento de los túneles y opciones para crear túneles de usar y tirar para su uso a corto plazo."
+msgstr ""
+"Configuración avanzada del enrutamiento de los túneles y opciones para "
+"crear túneles de usar y tirar para su uso a corto plazo."
#: i2p2www/pages/site/get-involved/todo.html:36
#: i2p2www/pages/site/get-involved/todo.html:167
@@ -436,134 +564,255 @@ msgstr "Rendimiento"
#: i2p2www/pages/site/get-involved/todo.html:44
msgid ""
-"Within the current network database and profile management implementation, \n"
+"Within the current network database and profile management "
+"implementation, \n"
"we have taken the liberty of some practical shortcuts. For instance, we \n"
"don't have the code to drop peer references from the K-buckets, as we \n"
"don't have enough peers to even plausibly fill any of them, so instead, \n"
-"we just keep the peers in whatever bucket is appropriate. Another example \n"
-"deals with the peer profiles - the memory required to maintain each peer's \n"
-"profile is small enough that we can keep thousands of full blown profiles \n"
+"we just keep the peers in whatever bucket is appropriate. Another example"
+" \n"
+"deals with the peer profiles - the memory required to maintain each "
+"peer's \n"
+"profile is small enough that we can keep thousands of full blown profiles"
+" \n"
"in memory without problems. While we have the capacity to use trimmed \n"
"down profiles (which we can maintain 100s of thousands in memory), we \n"
-"don't have any code to deal with moving a profile from a \"minimal profile\" \n"
-"to a \"full profile\", a \"full profile\" to a \"minimal profile\", or to simply \n"
+"don't have any code to deal with moving a profile from a \"minimal "
+"profile\" \n"
+"to a \"full profile\", a \"full profile\" to a \"minimal profile\", or to"
+" simply \n"
"eject a profile altogether. It just wouldn't be practical to write that \n"
"code yet, since we aren't going to need it for a while."
-msgstr "Nos hemos tomado la libertad de usar unos atajos prácticos dentro de la base de datos de la red y la implementación de la gestión del perfil. Por ejemplo, no tenemos el código para sacar los perfiles de los pares de K-buckets, al igual que no tenemos suficientes pares para llenar ninguno de ellos, en lugar de eso mantenemos los pares en cualquier cubo que pueda ser apropiado. Otro ejemplo tiene que ver con los perfiles de los pares - la memoria requerida para mantener cada perfil del par es suficientemente pequeña como para poder tener todos los perfiles en la memoria sin problemas (con lo que podemos mantener cientos de miles en la memoria), no tenemos ningún código para lidiar con el problema de mover un perfil de un \"perfil mínimo\" a un \"perfil completo\", de un \"perfil completo\" a un \"perfil mínimo\", o simplemente desechar un perfil completo. Simplemente no sería práctico escribir el código ya que no lo vamos a necesitar por un tiempo."
+msgstr ""
+"Nos hemos tomado la libertad de usar unos atajos prácticos dentro de la "
+"base de datos de la red y la implementación de la gestión del perfil. Por"
+" ejemplo, no tenemos el código para sacar los perfiles de los pares de "
+"K-buckets, al igual que no tenemos suficientes pares para llenar ninguno "
+"de ellos, en lugar de eso mantenemos los pares en cualquier cubo que "
+"pueda ser apropiado. Otro ejemplo tiene que ver con los perfiles de los "
+"pares - la memoria requerida para mantener cada perfil del par es "
+"suficientemente pequeña como para poder tener todos los perfiles en la "
+"memoria sin problemas (con lo que podemos mantener cientos de miles en la"
+" memoria), no tenemos ningún código para lidiar con el problema de mover "
+"un perfil de un \"perfil mínimo\" a un \"perfil completo\", de un "
+"\"perfil completo\" a un \"perfil mínimo\", o simplemente desechar un "
+"perfil completo. Simplemente no sería práctico escribir el código ya que "
+"no lo vamos a necesitar por un tiempo."
#: i2p2www/pages/site/get-involved/todo.html:59
msgid ""
-"That said, as the network grows we are going to want to keep these considerations \n"
+"That said, as the network grows we are going to want to keep these "
+"considerations \n"
"in mind. We will have some work to do, but we can put it off for later."
-msgstr "Como ya hemos dicho, según siga creciendo la red volveremos a retomar estas consideraciones. Tendremos algún trabajo por hacer, pero se puede dejar para mas tarde."
+msgstr ""
+"Como ya hemos dicho, según siga creciendo la red volveremos a retomar "
+"estas consideraciones. Tendremos algún trabajo por hacer, pero se puede "
+"dejar para mas tarde."
#: i2p2www/pages/site/get-involved/todo.html:71
msgid ""
-"The restricted route functionality described before was simply a functional \n"
+"The restricted route functionality described before was simply a "
+"functional \n"
"issue - how to let peers who would not otherwise be able to communicate \n"
-"do so. However, the concept of allowing restricted routes includes additional \n"
-"capabilities. For instance, if a router absolutely cannot risk communicating \n"
-"directly with any untrusted peers, they can set up trusted links through \n"
+"do so. However, the concept of allowing restricted routes includes "
+"additional \n"
+"capabilities. For instance, if a router absolutely cannot risk "
+"communicating \n"
+"directly with any untrusted peers, they can set up trusted links through"
+" \n"
"those peers, using them to both send and receive all of its messages. \n"
"Those hidden peers who want to be completely isolated would also refuse \n"
"to connect to peers who attempt to get them to (as demonstrated by the \n"
-"garlic routing technique outlined before) - they can simply take the garlic \n"
+"garlic routing technique outlined before) - they can simply take the "
+"garlic \n"
"clove that has a request for delivery to a particular peer and tunnel \n"
-"route that message out one of the hidden peer's trusted links with instructions \n"
+"route that message out one of the hidden peer's trusted links with "
+"instructions \n"
"to forward it as requested."
-msgstr "La funcionalidad restringida del ruter descrita antes era simplemente un problema funcional - cómo hacer que dos pares que de otra forma no estrían comunicados se comuniquen. Sin embargo, el concepto de permitir ruters restringidos incluye capacidades adicionales. Por ejemplo, si un ruter no puede arriesgarse de ninguna forma a una comunicación directa con un par sin confianza, pueden configurar enlaces seguros a través de esos pares, usándolos para enviar y recibir todos sus mensajes. Esos pares ocultos que desean estar totalmente aislados pueden también negarse a conectar con pares que intenten alcanzarles (como se demuestra en la técnica de ruteado 'garlic' esbozada anteriormente)"
+msgstr ""
+"La funcionalidad restringida del ruter descrita antes era simplemente un "
+"problema funcional - cómo hacer que dos pares que de otra forma no "
+"estrían comunicados se comuniquen. Sin embargo, el concepto de permitir "
+"ruters restringidos incluye capacidades adicionales. Por ejemplo, si un "
+"ruter no puede arriesgarse de ninguna forma a una comunicación directa "
+"con un par sin confianza, pueden configurar enlaces seguros a través de "
+"esos pares, usándolos para enviar y recibir todos sus mensajes. Esos "
+"pares ocultos que desean estar totalmente aislados pueden también negarse"
+" a conectar con pares que intenten alcanzarles (como se demuestra en la "
+"técnica de ruteado 'garlic' esbozada anteriormente)"
#: i2p2www/pages/site/get-involved/todo.html:90
#, python-format
msgid ""
-"Within the network, we will want some way to deter people from consuming \n"
-"too many resources or from creating so many peers to mount a Sybil \n"
-"attack. Traditional techniques such as having a peer see who is requesting \n"
+"Within the network, we will want some way to deter people from consuming"
+" \n"
+"too many resources or from creating so many peers to mount a Sybil \n"
+"attack. Traditional techniques such as having a peer see who is "
+"requesting \n"
"a resource or running a peer aren't appropriate for use within I2P, as \n"
"doing so would compromise the anonymity of the system. Instead, we want \n"
"to make certain requests \"expensive\"."
-msgstr "Dentro de la red necesitaremos una forma de disuadir al a gente de consumir demasiados recursos o de crear demasiados pares como para montar un ataque Sybil. Las técnicas tradicionales como dejar que un par vea quien solicita un recurso o quien ejecuta cierto par, no son apropiadas para I2P, ya que eso comprometería el anonimato del sistema. En su lugar queremos hacer que ciertas peticiones sean muy \"caras\"."
+msgstr ""
+"Dentro de la red necesitaremos una forma de disuadir al a gente de "
+"consumir demasiados recursos o de crear demasiados pares como para montar"
+" un ataque Sybil. Las técnicas tradicionales "
+"como dejar que un par vea quien solicita un recurso o quien ejecuta "
+"cierto par, no son apropiadas para I2P, ya que eso comprometería el "
+"anonimato del sistema. En su lugar queremos hacer que ciertas peticiones "
+"sean muy \"caras\"."
#: i2p2www/pages/site/get-involved/todo.html:98
msgid ""
"Hashcash is one technique that \n"
-"we can use to anonymously increase the \"cost\" of doing certain activities, \n"
-"such as creating a new router identity (done only once on installation), \n"
+"we can use to anonymously increase the \"cost\" of doing certain "
+"activities, \n"
+"such as creating a new router identity (done only once on installation),"
+" \n"
"creating a new destination (done only once when creating a service), or \n"
-"requesting that a peer participate in a tunnel (done often, perhaps 2-300 \n"
-"times per hour). We don't know the \"correct\" cost of each type of certificate \n"
-"yet, but with some research and experimentation, we could set a base level \n"
+"requesting that a peer participate in a tunnel (done often, perhaps 2-300"
+" \n"
+"times per hour). We don't know the \"correct\" cost of each type of "
+"certificate \n"
+"yet, but with some research and experimentation, we could set a base "
+"level \n"
"that is sufficiently expensive while not an excessive burden for people \n"
"with few resources."
-msgstr "Hashcash es una técnica que podemos usar anónimamente para incrementar el \"costo\" de hacer ciertas acciones., como crear una nueva identidad de ruter (se hace sólo cuando se instala por primera vez), crear una nueva destinación (se hace sólo cuando se crea un nuevo servicio), o solicitar que un par participe en un túnel (se hace a menudo, quizás 2-300 veces a la hora). No conocemos todavía el coste \"correcto\" de cada tipo de certificado, pero con algo de investigación y estudio, podemos crear un nivel básico que sea lo suficientemente caro pero no tan caro como para que agobie a la gente con pocos recursos."
+msgstr ""
+"Hashcash es una técnica que "
+"podemos usar anónimamente para incrementar el \"costo\" de hacer ciertas "
+"acciones., como crear una nueva identidad de ruter (se hace sólo cuando "
+"se instala por primera vez), crear una nueva destinación (se hace sólo "
+"cuando se crea un nuevo servicio), o solicitar que un par participe en un"
+" túnel (se hace a menudo, quizás 2-300 veces a la hora). No conocemos "
+"todavía el coste \"correcto\" de cada tipo de certificado, pero con algo "
+"de investigación y estudio, podemos crear un nivel básico que sea lo "
+"suficientemente caro pero no tan caro como para que agobie a la gente con"
+" pocos recursos."
#: i2p2www/pages/site/get-involved/todo.html:109
msgid ""
"There are a few other algorithms that we can explore for making those \n"
-"requests for resources \"nonfree\", and further research on that front is \n"
+"requests for resources \"nonfree\", and further research on that front is"
+" \n"
"appropriate."
-msgstr "Hay varios algoritmos que podemos explorar para hacer que esas peticiones de recursos \"tengan un costo\", sería conveniente seguir investigando sobre este tema."
+msgstr ""
+"Hay varios algoritmos que podemos explorar para hacer que esas peticiones"
+" de recursos \"tengan un costo\", sería conveniente seguir investigando "
+"sobre este tema."
#: i2p2www/pages/site/get-involved/todo.html:119
#, python-format
msgid ""
-"To powerful passive external observers as well as large colluding internal \n"
-"observers, standard tunnel routing is vulnerable to traffic analysis attacks \n"
-"- simply watching the size and frequency of messages being passed between \n"
+"To powerful passive external observers as well as large colluding "
+"internal \n"
+"observers, standard tunnel routing is vulnerable to traffic analysis "
+"attacks \n"
+"- simply watching the size and frequency of messages being passed between"
+" \n"
"routers. To defend against these, we will want to essentially turn some \n"
"of the tunnels into its own mix cascade - delaying messages received at \n"
"the gateway and passing them in batches, reordering them as necessary, \n"
-"and injecting dummy messages (indistinguishable from other \"real\" tunnel \n"
+"and injecting dummy messages (indistinguishable from other \"real\" "
+"tunnel \n"
"messages by peers in the path). There has been a significant amount of \n"
"research \n"
-"on these algorithms that we can lean on prior to implementing the various \n"
+"on these algorithms that we can lean on prior to implementing the various"
+" \n"
"tunnel mixing strategies."
-msgstr "El rutado estándar de túneles es vulnerable al análisis de tráfico para los observadores externos pasivos con muchos medios y para un gran número de observadores internos si están confabulados, simplemente observando el tamaño y la frecuencia de los mensajes que pasan a través de los ruters. Para defendernos de esto, queremos simplemente convertir algunos túneles en su propia mezcla de cascada - retrasando los mensajes recibidos en la puerta de salida y pasándolos en lotes, reordenándolas como sea necesario, e inyectando mensajes de relleno (indistinguibles de los túneles \"reales\" para los pares). Ha habido un gran número de estudios sobre estos algoritmos que podríamos utilizar para implementar varias estrategias de mezclado de túneles."
+msgstr ""
+"El rutado estándar de túneles es vulnerable al análisis de tráfico para "
+"los observadores externos pasivos con muchos medios y para un gran número"
+" de observadores internos si están confabulados, simplemente observando "
+"el tamaño y la frecuencia de los mensajes que pasan a través de los "
+"ruters. Para defendernos de esto, queremos simplemente convertir algunos"
+" túneles en su propia mezcla de cascada - retrasando los mensajes "
+"recibidos en la puerta de salida y pasándolos en lotes, reordenándolas "
+"como sea necesario, e inyectando mensajes de relleno (indistinguibles de "
+"los túneles \"reales\" para los pares). Ha habido un gran número de estudios sobre estos algoritmos que podríamos "
+"utilizar para implementar varias estrategias de mezclado de túneles."
#: i2p2www/pages/site/get-involved/todo.html:132
msgid ""
"In addition to the anonymity aspects of more varied tunnel operation, \n"
"there is a functional dimension as well. Each peer only has a certain \n"
-"amount of data they can route for the network, and to keep any particular \n"
+"amount of data they can route for the network, and to keep any particular"
+" \n"
"tunnel from consuming an unreasonable portion of that bandwidth, they \n"
-"will want to include some throttles on the tunnel. For instance, a tunnel \n"
+"will want to include some throttles on the tunnel. For instance, a tunnel"
+" \n"
"may be configured to throttle itself after passing 600 messages (1 per \n"
"second), 2.4MB (4KBps), or exceeding some moving average (8KBps for the \n"
"last minute). Excess messages may be delayed or summarily dropped. With \n"
-"this sort of throttling, peers can provide ATM-like QoS support for their \n"
+"this sort of throttling, peers can provide ATM-like QoS support for their"
+" \n"
"tunnels, refusing to agree to allocate more bandwidth than the peer has \n"
"available."
-msgstr "Además de los aspectos del anonimato en las operaciones de los túneles, hay una dimensión funcional extra. Cada par sólo tiene cierto número de datos que pueden rutar por la red, y para evitar que un túnel en particular consuma una gran parte del ancho de banda, necesitarán añadir algunas regulaciones en el túnel. Por ejemplo, un túnel puede estar configurado para pararse a sí mismo después de pasar 600 mensajes (1 par por segundo), 2.4MB (4KBps), o tras haber excedido algún promedio variable (8KBps en el último minuto). Los mensajes sobrantes pueden ser retardados o desechados. Con este tipo de control, los pares pueden ofrecer un soporte parecido al QoS en sus túneles, negándose a asignar más ancho de banda de la que el par tiene disponible."
+msgstr ""
+"Además de los aspectos del anonimato en las operaciones de los túneles, "
+"hay una dimensión funcional extra. Cada par sólo tiene cierto número de "
+"datos que pueden rutar por la red, y para evitar que un túnel en "
+"particular consuma una gran parte del ancho de banda, necesitarán añadir "
+"algunas regulaciones en el túnel. Por ejemplo, un túnel puede estar "
+"configurado para pararse a sí mismo después de pasar 600 mensajes (1 par "
+"por segundo), 2.4MB (4KBps), o tras haber excedido algún promedio "
+"variable (8KBps en el último minuto). Los mensajes sobrantes pueden ser "
+"retardados o desechados. Con este tipo de control, los pares pueden "
+"ofrecer un soporte parecido al QoS en sus túneles, negándose a asignar "
+"más ancho de banda de la que el par tiene disponible."
#: i2p2www/pages/site/get-involved/todo.html:145
msgid ""
-"In addition, we may want to implement code to dynamically reroute tunnels \n"
+"In addition, we may want to implement code to dynamically reroute tunnels"
+" \n"
"to avoid failed peers or to inject additional hops into the path. This \n"
-"can be done by garlic routing a message to any particular peer in a tunnel \n"
+"can be done by garlic routing a message to any particular peer in a "
+"tunnel \n"
"with instructions to redefine the next-hop in the tunnel."
-msgstr "Además, queremos implementar el código para re-rutar los túneles dinámicamente, y así evitar que los pares fallidos añadan saltos adicionales en el camino. Esto lo puede hacer la red garlic rutando un mensaje a un par en particular con las instrucciones para redefinir el siguiente salto del túnel."
+msgstr ""
+"Además, queremos implementar el código para re-rutar los túneles "
+"dinámicamente, y así evitar que los pares fallidos añadan saltos "
+"adicionales en el camino. Esto lo puede hacer la red garlic rutando un "
+"mensaje a un par en particular con las instrucciones para redefinir el "
+"siguiente salto del túnel."
#: i2p2www/pages/site/get-involved/todo.html:156
msgid ""
"Beyond the per-tunnel batching and mixing strategy, there are further \n"
-"capabilities for protecting against powerful attackers, such as allowing \n"
+"capabilities for protecting against powerful attackers, such as allowing"
+" \n"
"each step in a garlic routed path to define a delay or window in which \n"
-"it should be forwarded on. This would enable protections against the long \n"
-"term intersection attack, as a peer could send a message that looks perfectly \n"
-"standard to most peers that pass it along, except at any peers where the \n"
+"it should be forwarded on. This would enable protections against the long"
+" \n"
+"term intersection attack, as a peer could send a message that looks "
+"perfectly \n"
+"standard to most peers that pass it along, except at any peers where the"
+" \n"
"clove exposed includes delay instructions."
-msgstr "Además de las estrategias de mezclado y de procesado por lotes de cada túnel, hay más formas de protegernos contra atacantes poderosos, como permitir crear un retraso en cada paso dentro de un camino de rutado garlic. Esto crearía protecciones contra un ataque largo de intersección, ya que un par podría enviar mensajes que parecen normales a la mayoría de los pares, excepto a cualquier par donde se hayan dado instrucciones de retardo."
+msgstr ""
+"Además de las estrategias de mezclado y de procesado por lotes de cada "
+"túnel, hay más formas de protegernos contra atacantes poderosos, como "
+"permitir crear un retraso en cada paso dentro de un camino de rutado "
+"garlic. Esto crearía protecciones contra un ataque largo de intersección,"
+" ya que un par podría enviar mensajes que parecen normales a la mayoría "
+"de los pares, excepto a cualquier par donde se hayan dado instrucciones "
+"de retardo."
#: i2p2www/pages/site/get-involved/todo.html:168
#, python-format
msgid ""
"Performance related improvements are listed on the\n"
"Performance page."
-msgstr "Las mejoras en el rendimiento se listan en la página de rendimiento ."
+msgstr ""
+"Las mejoras en el rendimiento se listan en la página de rendimiento ."
#: i2p2www/pages/site/get-involved/bounties/arabic-trans.html:2
msgid "Bounty Arabic translation of webpage and router console"
-msgstr "Recompensa por la traducción al árabe de la página web y la consola de ruter."
+msgstr ""
+"Recompensa por la traducción al árabe de la página web y la consola de "
+"ruter."
#: i2p2www/pages/site/get-involved/bounties/arabic-trans.html:3
#: i2p2www/pages/site/get-involved/bounties/index.html:118
@@ -575,7 +824,10 @@ msgid ""
"To improve I2P usage and attract more people\n"
"into I2P echelon set out this bounty for translation\n"
"of the I2P web page and I2P router console into Arabic."
-msgstr "Para mejorar el uso de I2P y atraer más gente, echelon propone esta recompensa por la traducción al árabe de la web de I2P y la consola del ruter."
+msgstr ""
+"Para mejorar el uso de I2P y atraer más gente, echelon propone esta "
+"recompensa por la traducción al árabe de la web de I2P y la consola del "
+"ruter."
#: i2p2www/pages/site/get-involved/bounties/arabic-trans.html:12
#: i2p2www/pages/site/get-involved/bounties/russian-trans.html:12
@@ -591,18 +843,23 @@ msgstr "La parte 1 es la traducción de la página web."
msgid ""
"For collecting the bounty of 20 BTC you need to translate the following "
"pages:"
-msgstr "Para recibir la recompensa de 20 BTC necesita traducir las siguientes páginas:"
+msgstr ""
+"Para recibir la recompensa de 20 BTC necesita traducir las siguientes "
+"páginas:"
#: i2p2www/pages/site/get-involved/bounties/arabic-trans.html:25
-msgid ""
-"This job was done by hamada and the bounty of 20 BTC was paid to hamada."
-msgstr "El trabajo fue hecho por Amanda y la recompensa de 20 BTC fue pagada a Amanda."
+msgid "This job was done by hamada and the bounty of 20 BTC was paid to hamada."
+msgstr ""
+"El trabajo fue hecho por Amanda y la recompensa de 20 BTC fue pagada a "
+"Amanda."
#: i2p2www/pages/site/get-involved/bounties/arabic-trans.html:27
msgid ""
"Part 2 is the translation of the router console. The router console was\n"
"partly translated and the bounty of 80 BTC was paid to hamada."
-msgstr "La parte 2 es la traducción de la consola del ruter. La consola del ruter fue parcialmente traducida y la recompensa de 80 BTC se pagó a hamada."
+msgstr ""
+"La parte 2 es la traducción de la consola del ruter. La consola del ruter"
+" fue parcialmente traducida y la recompensa de 80 BTC se pagó a hamada."
#: i2p2www/pages/site/get-involved/bounties/arabic-trans.html:34
msgid "Judge is echelon."
@@ -620,16 +877,29 @@ msgstr "Cliente nativo BTC para I2P"
msgid ""
"For a future of I2P and attract more people\n"
"into I2P this bounty is to create a I2P native Bitcoin client. \n"
-"It should integrate with other client via the I2P network and via gateways to\n"
+"It should integrate with other client via the I2P network and via "
+"gateways to\n"
"the existant bitcoin network."
-msgstr "Para el futuro de I2P y para atraer más gente a I2P esta recompensa se pensó para crear un cliente de Bitcoin para I2P. Debería integrarse con otros clientes dentro de la red de I2P y vía las salidas, con la red de Bitcoin actual."
+msgstr ""
+"Para el futuro de I2P y para atraer más gente a I2P esta recompensa se "
+"pensó para crear un cliente de Bitcoin para I2P. Debería integrarse con "
+"otros clientes dentro de la red de I2P y vía las salidas, con la red de "
+"Bitcoin actual."
#: i2p2www/pages/site/get-involved/bounties/btc-client.html:15
msgid ""
"Judge is psychonaut who donated the first 30 € to this bounty.\n"
-"Bounty was almost fullfilled with btci2p, only a small\n"
-"part of creating a plugin is leftover. User giv has been paid for the work."
-msgstr "Judge es un psiconauta que donó los primeros 30 € a esta recompensa.\nLa recompensa casi se completó con btci2p, sólo falta una pequeña\nparte de la creación de un complemento. El usuario giv ha sido recompensado por el trabajo."
+"Bounty was almost fullfilled with btci2p, only a small\n"
+"part of creating a plugin is leftover. User giv has been paid for the "
+"work."
+msgstr ""
+"Judge es un psiconauta que donó los primeros 30 € a esta recompensa."
+"\n"
+"La recompensa casi se completó con btci2p, sólo falta una pequeña\n"
+"parte de la creación de un complemento. El usuario giv ha sido "
+"recompensado por el trabajo."
#: i2p2www/pages/site/get-involved/bounties/datastore.html:2
msgid "Bounty datastorage"
@@ -650,36 +920,70 @@ msgid ""
"As it is a extra application, it should work flawless within I2P and\n"
"cooperate nice with the I2P router. Maybe a integration within the\n"
"webpage/router could be done."
-msgstr "Para mejorar el uso de I2P y ser independiente del estados de los ruters en funcionamiento queremos un sistema de almacenamiento de datos como una extensión de I2P. Como en Freenet, el almacenamiento de información debería ser distribuido y cada nodo participante debería poder configurar sus propias opciones. Los archivos deberían ser guardados en trozos y al menos 2-3 veces para obtener redundancia. El uso del espacio de almacenamiento debería ser auto balanceado. Y aunque sea una aplicación extra, debería funcionar perfectamente dentro de I2P y cooperar bien con el ruter I2P. Quizás se puede hacer una integración dentro de la página web o del ruter."
+msgstr ""
+"Para mejorar el uso de I2P y ser independiente del estados de los ruters "
+"en funcionamiento queremos un sistema de almacenamiento de datos como una"
+" extensión de I2P. Como en Freenet, el almacenamiento de información "
+"debería ser distribuido y cada nodo participante debería poder configurar"
+" sus propias opciones. Los archivos deberían ser guardados en trozos y al"
+" menos 2-3 veces para obtener redundancia. El uso del espacio de "
+"almacenamiento debería ser auto balanceado. Y aunque sea una aplicación "
+"extra, debería funcionar perfectamente dentro de I2P y cooperar bien con "
+"el ruter I2P. Quizás se puede hacer una integración dentro de la página "
+"web o del ruter."
#: i2p2www/pages/site/get-involved/bounties/datastore.html:17
msgid ""
"This bounty cooperates with the 2 other bounties \"frost for I2P\" and \n"
"\"eepsites in datastorage\"."
-msgstr "Esta recompensa está unida con otras 2 recompensas, \"frost para I2P\" y \"eepsites en el almacenamiento de datos\""
+msgstr ""
+"Esta recompensa está unida con otras 2 recompensas, \"frost para I2P\" y "
+"\"eepsites en el almacenamiento de datos\""
#: i2p2www/pages/site/get-involved/bounties/datastore.html:21
msgid ""
"The frost for I2P datastorage bounty is paid for a frost like program \n"
-"with which files/messages are stored into database and got from database.\n"
+"with which files/messages are stored into database and got from database."
+"\n"
"It needs to work with a GUI."
-msgstr "La recompensa por frost para el almacenamiento de datos de I2P es pagada por un programa tipo frost en donde los archivos o mensajes son almacenados dentro de una base de datos y obtenidos de la base de datos. Debe funcionar con GUI, entorno gráfico."
+msgstr ""
+"La recompensa por frost para el almacenamiento de datos de I2P es pagada "
+"por un programa tipo frost en donde los archivos o mensajes son "
+"almacenados dentro de una base de datos y obtenidos de la base de datos. "
+"Debe funcionar con GUI, entorno gráfico."
#: i2p2www/pages/site/get-involved/bounties/datastore.html:26
msgid ""
"The eepsite served out of I2P datastorage extends a I2P router to send\n"
-"out eepsites out of the I2P datastorage. All files for eepsites need to be\n"
+"out eepsites out of the I2P datastorage. All files for eepsites need to "
+"be\n"
"saved inside of datastorage and are taken from it.\n"
"Extension:\n"
-"For better integration all datastorage participants could serve that eepsite."
-msgstr "El eepsite servido desde el almacén de datos de I2P despliega un enrutador\n('router') I2P para enviar eepsites desde el almacén de datos I2P. Todos los\nficheros para los eepsites han de ser guardados dentro del almacén de datos\ny son tomados desde este.\nExtensión:\nPara mayor integración todos los participes del almacen de datos podrían\nservier ese eepsite."
+"For better integration all datastorage participants could serve that "
+"eepsite."
+msgstr ""
+"El eepsite servido desde el almacén de datos de I2P despliega un "
+"enrutador\n"
+"('router') I2P para enviar eepsites desde el almacén de datos I2P. Todos "
+"los\n"
+"ficheros para los eepsites han de ser guardados dentro del almacén de "
+"datos\n"
+"y son tomados desde este.\n"
+"Extensión:\n"
+"Para mayor integración todos los participes del almacen de datos podrían\n"
+"servier ese eepsite."
#: i2p2www/pages/site/get-involved/bounties/datastore.html:36
msgid ""
-"For bounties to be declared done and paid, we need the program AND the source.\n"
-"Source and code need to be licensed under a free license (free to change and \n"
+"For bounties to be declared done and paid, we need the program AND the "
+"source.\n"
+"Source and code need to be licensed under a free license (free to change "
+"and \n"
"free to distribute)."
-msgstr "Para que una recompensa sea declarada pagada, necesitamos la aplicación y el código. El código debe estar bajo una licencia libre (libre de cambiar y de distribuir el código)."
+msgstr ""
+"Para que una recompensa sea declarada pagada, necesitamos la aplicación y"
+" el código. El código debe estar bajo una licencia libre (libre de "
+"cambiar y de distribuir el código)."
#: i2p2www/pages/site/get-involved/bounties/deb-pack.html:2
msgid "Bounty I2P package in Debian and Ubuntu mirrors"
@@ -692,13 +996,21 @@ msgstr "Paquetes I2P para Ubuntu/Debian"
#: i2p2www/pages/site/get-involved/bounties/deb-pack.html:6
msgid ""
"For the future of I2P and in order to attract more people\n"
-"to I2P, this bounty was set for including an I2P package into the Ubuntu and Debian \n"
+"to I2P, this bounty was set for including an I2P package into the Ubuntu "
+"and Debian \n"
"archive mirrors.\n"
"To claim this bounty, the I2P router package needs to be available from\n"
"Ubuntu and Debian archive mirrors and Debian bug \n"
-"448638 \n"
+"448638 \n"
"needs to be closed successfully."
-msgstr "Para el futuro y para atraer más gente a I2P, esta recompensa se creó para incluir los paquetes de I2P dentro de los repositorios de Ubuntu y Debian. Para reclamar esta recompensa, el paquete del ruter de I2P debe estar disponible desde los repositorios de Ubuntu y Debian y el bug 448638 debe cerrarse exitosamente."
+msgstr ""
+"Para el futuro y para atraer más gente a I2P, esta recompensa se creó "
+"para incluir los paquetes de I2P dentro de los repositorios de Ubuntu y "
+"Debian. Para reclamar esta recompensa, el paquete del ruter de I2P debe "
+"estar disponible desde los repositorios de Ubuntu y Debian y el bug 448638 debe cerrarse exitosamente."
#: i2p2www/pages/site/get-involved/bounties/i2phex.html:2
msgid "Bounty I2PHex code implementation"
@@ -713,7 +1025,9 @@ msgid ""
"To improve I2P usage and attract more people\n"
"into I2PHex P2P ArneBab setout the bounty for implementing actual\n"
"Phex code onto I2PHex."
-msgstr "Para mejorar el uso de I2P y atraer más gente a I2PHex P2P, ArneBab creó la recompensa por implementar el código actual de Phex dentro de I2PHex."
+msgstr ""
+"Para mejorar el uso de I2P y atraer más gente a I2PHex P2P, ArneBab creó "
+"la recompensa por implementar el código actual de Phex dentro de I2PHex."
#: i2p2www/pages/site/get-involved/bounties/index.html:2
msgid "Bounties for I2P"
@@ -723,24 +1037,44 @@ msgstr "Recompensas por I2P"
msgid ""
"While we always gratefully accept any contributions of code, \n"
"documentation, and the like, there are other ways to help I2P move \n"
-"forward. As with any open source project, our goals would be achieved more \n"
+"forward. As with any open source project, our goals would be achieved "
+"more \n"
"rapidly if we were able to support all of our contributors to work on \n"
"I2P full time. However, as with any open source project, that's not a \n"
"possibility. Instead, we are making use of a bounty system, whereby \n"
"anyone can get support for working on something that people want \n"
-"implemented, and people who want to contribute to I2P can be assured that \n"
+"implemented, and people who want to contribute to I2P can be assured that"
+" \n"
"their support goes to what they care about."
-msgstr "Aunque siempre aceptamos con agradecimiento cualquier contribución al código, documentación, y de ese tipo, hay otras formas de hacer que I2P siga adelante. Al igual que con otros proyectos libres nuestros fines se podrían conseguir más rápido si fuésemos capaces de compensar a todos los ayudantes para que trabajasen en I2P a jornada completa. Pero, y al igual que con cualquier otro proyecto libre, esto no es posible. En lugar de eso, estamos utilizando un sistema de recompensas en donde cualquiera pude tener compensación por trabajar en algo que desea implementar, y la gente que ayuda a I2P puede estar segura que su apoyo va dirigido a lo que a ellos les interesa."
+msgstr ""
+"Aunque siempre aceptamos con agradecimiento cualquier contribución al "
+"código, documentación, y de ese tipo, hay otras formas de hacer que I2P "
+"siga adelante. Al igual que con otros proyectos libres nuestros fines se "
+"podrían conseguir más rápido si fuésemos capaces de compensar a todos los"
+" ayudantes para que trabajasen en I2P a jornada completa. Pero, y al "
+"igual que con cualquier otro proyecto libre, esto no es posible. En lugar"
+" de eso, estamos utilizando un sistema de recompensas en donde cualquiera"
+" pude tener compensación por trabajar en algo que desea implementar, y la"
+" gente que ayuda a I2P puede estar segura que su apoyo va dirigido a lo "
+"que a ellos les interesa."
#: i2p2www/pages/site/get-involved/bounties/index.html:17
msgid ""
"We are also keeping open the ability for people who want to support I2P \n"
-"but don't have strong feelings about the bounties available. Those people\n"
+"but don't have strong feelings about the bounties available. Those "
+"people\n"
"can simply put their trust in the I2P team to do what we feel is best by\n"
"donating to a catch-all general fund that will be used as deemed \n"
-"necessary - allocated to various bounties, covering incidentals (hosting, \n"
+"necessary - allocated to various bounties, covering incidentals (hosting,"
+" \n"
"etc), and the like."
-msgstr "También mantenemos abierta una posibilidad para la gente que quiere ayudar a I2P pero no está convencida de las recompensas disponibles. Esta gente simplemente puede poner su confianza en el equipo de I2P para que este haga lo que piense que es mejor, donando a un fondo general que será usado en lo que se considere necesario - usado para las recompensas, cubrir imprevistos (alojamiento, etc), y cosas de ese tipo."
+msgstr ""
+"También mantenemos abierta una posibilidad para la gente que quiere "
+"ayudar a I2P pero no está convencida de las recompensas disponibles. Esta"
+" gente simplemente puede poner su confianza en el equipo de I2P para que "
+"este haga lo que piense que es mejor, donando a un fondo general que será"
+" usado en lo que se considere necesario - usado para las recompensas, "
+"cubrir imprevistos (alojamiento, etc), y cosas de ese tipo."
#: i2p2www/pages/site/get-involved/bounties/index.html:26
msgid "Current bounties"
@@ -878,10 +1212,15 @@ msgstr "Unit tests (parte 1)"
#: i2p2www/pages/site/get-involved/bounties/index.html:160
msgid ""
-"Dev lists anyone who may already be working on the bounty - collaboration is\n"
-"preferred, so if you're interested in working on it, please contact one of the\n"
+"Dev lists anyone who may already be working on the bounty - collaboration"
+" is\n"
+"preferred, so if you're interested in working on it, please contact one "
+"of the\n"
"people listed!"
-msgstr "Los desarrolladores listan a cualquier persona que haya podido trabajar en la recompensa - por lo cual si está interesado en trabajar en ello, ¡por favor contacte con una de las personas listadas!"
+msgstr ""
+"Los desarrolladores listan a cualquier persona que haya podido trabajar "
+"en la recompensa - por lo cual si está interesado en trabajar en ello, "
+"¡por favor contacte con una de las personas listadas!"
#: i2p2www/pages/site/get-involved/bounties/ipv6.html:2
msgid "Bounty I2P IPv6 native"
@@ -897,15 +1236,24 @@ msgid ""
"into I2P I withdrawal the vuze bounty and offer a IPv6 bounty.\n"
"To claim this bounty, the I2P router needs to run full on native\n"
"IPv6 connections like it does on IPv4."
-msgstr "Por el futuro de I2P y para atraer a más gente a I2P, yo ofrezco una recompensa por el soporte IPv6 en I2P. Para obtener esta recompensa, los ruters de I2P deben funcionar nativa y completamente con conexiones IPv6 como lo hacen con conexiones IPv4."
+msgstr ""
+"Por el futuro de I2P y para atraer a más gente a I2P, yo ofrezco una "
+"recompensa por el soporte IPv6 en I2P. Para obtener esta recompensa, los "
+"ruters de I2P deben funcionar nativa y completamente con conexiones IPv6 "
+"como lo hacen con conexiones IPv4."
#: i2p2www/pages/site/get-involved/bounties/ipv6.html:23
#: i2p2www/pages/site/get-involved/bounties/vuze-plugin.html:20
msgid ""
-"For bounties to be declared done and paid, we need the plugin AND the source.\n"
-"Source and code need to be licensed under a free license (free to change and \n"
+"For bounties to be declared done and paid, we need the plugin AND the "
+"source.\n"
+"Source and code need to be licensed under a free license (free to change "
+"and \n"
"free to distribute)."
-msgstr "Para que las recompensas sean declaradas hechas y pagadas, necesitamos el pluguin y las fuentes. El código y las fuentes tienen que ser liberados con licencias libres (libre para ser cambiado y distribuido)."
+msgstr ""
+"Para que las recompensas sean declaradas hechas y pagadas, necesitamos el"
+" pluguin y las fuentes. El código y las fuentes tienen que ser liberados "
+"con licencias libres (libre para ser cambiado y distribuido)."
#: i2p2www/pages/site/get-involved/bounties/netdb.html:2
msgid "NetDB Backend"
@@ -921,7 +1269,11 @@ msgid ""
"needs to be extended with another backend to improve reliability,\n"
"reduce attack surface and solve the scalability issue for the \n"
"coming years."
-msgstr "La implementación actual de NetDB (llamada sistema Floodfill) necesita ser extendida con otro sistema para mejorar la seguridad, reducir los ataques de superficie u arreglar los problemas de escalabilidad para los próximos años."
+msgstr ""
+"La implementación actual de NetDB (llamada sistema Floodfill) necesita "
+"ser extendida con otro sistema para mejorar la seguridad, reducir los "
+"ataques de superficie u arreglar los problemas de escalabilidad para los "
+"próximos años."
#: i2p2www/pages/site/get-involved/bounties/netdb.html:14
msgid ""
@@ -931,26 +1283,36 @@ msgstr "Se investigará e y finalmente implementará una solución basada en DHT
#: i2p2www/pages/site/get-involved/bounties/russian-trans.html:2
msgid "Bounty russian translation of webpage and router console"
-msgstr "Recompensa por la traducción al ruso de la página web y la consola del ruter."
+msgstr ""
+"Recompensa por la traducción al ruso de la página web y la consola del "
+"ruter."
#: i2p2www/pages/site/get-involved/bounties/russian-trans.html:6
msgid ""
"To improve I2P usage and attract more people\n"
"into I2P a anonymous donator set out the bounty for translation\n"
"of the I2P web page and I2P router console into russian language."
-msgstr "Para mejorar el uso de I2P y atraer más gente a I2P, un donante anónimo ha creado una recompensa para la traducción al ruso de la web de I2P y la consola del ruter."
+msgstr ""
+"Para mejorar el uso de I2P y atraer más gente a I2P, un donante anónimo "
+"ha creado una recompensa para la traducción al ruso de la web de I2P y la"
+" consola del ruter."
#: i2p2www/pages/site/get-involved/bounties/russian-trans.html:17
msgid ""
-"For collecting the bounty of $115 USD you need to translate the following "
-"pages:"
-msgstr "Para recibir la recompensa de 115 dólares tiene que traducir estas páginas:"
+"For collecting the bounty of $115 USD you need to translate the following"
+" pages:"
+msgstr ""
+"Para recibir la recompensa de 115 dólares tiene que traducir estas "
+"páginas:"
#: i2p2www/pages/site/get-involved/bounties/russian-trans.html:30
msgid ""
-"Part 2 is the translation of the router console. The whole router console needs\n"
+"Part 2 is the translation of the router console. The whole router console"
+" needs\n"
"to be translated to collect the bounty of $115 USD."
-msgstr "La parte 2 es la traducción del a consola del ruter. Tiene que traducir la consola del ruter completa para recibir la recompensa de 115 dólares."
+msgstr ""
+"La parte 2 es la traducción del a consola del ruter. Tiene que traducir "
+"la consola del ruter completa para recibir la recompensa de 115 dólares."
#: i2p2www/pages/site/get-involved/bounties/russian-trans.html:37
msgid "Judge is the russian donor."
@@ -968,19 +1330,31 @@ msgstr "Servidor I2P silc"
msgid ""
"For a future of I2P and attract more people\n"
"into I2P this bounty is to setup and host a I2P SILC server. \n"
-"This will allow people to send files over their messaging servers and have intrinsic security built into the protocol."
-msgstr "Para el futuro y para atraer a más gente a I2P, se ha creado una recompensa para configurar y mantener un servidor SILC I2P. Esto permitirá a la gente enviar archivos sobre los servidores de mensajes y tener asegurada la privacidad dentro del propio protocolo."
+"This will allow people to send files over their messaging servers and "
+"have intrinsic security built into the protocol."
+msgstr ""
+"Para el futuro y para atraer a más gente a I2P, se ha creado una "
+"recompensa para configurar y mantener un servidor SILC I2P. Esto "
+"permitirá a la gente enviar archivos sobre los servidores de mensajes y "
+"tener asegurada la privacidad dentro del propio protocolo."
#: i2p2www/pages/site/get-involved/bounties/silc.html:12
msgid ""
-"A silc server needs to be set up and run for at least 3 month time to get payed. \n"
+"A silc server needs to be set up and run for at least 3 month time to get"
+" payed. \n"
"A second server should be set up, too."
-msgstr "Un servidor SILC ha de ser instalado y ejecutado durante un periodo de al menos 3 meses para obtener el pago.\nUn sergundo servidor también debe ser instalado."
+msgstr ""
+"Un servidor SILC ha de ser instalado y ejecutado durante un periodo de al"
+" menos 3 meses para obtener el pago.\n"
+"Un sergundo servidor también debe ser instalado."
#: i2p2www/pages/site/get-involved/bounties/silc.html:16
msgid ""
-"Bounty was withdrawn and money donated to returningnovice and general fund."
-msgstr "La recompensa ha sido retirada y donada a returningnovice y al fondo general."
+"Bounty was withdrawn and money donated to returningnovice and general "
+"fund."
+msgstr ""
+"La recompensa ha sido retirada y donada a returningnovice y al fondo "
+"general."
#: i2p2www/pages/site/get-involved/bounties/silc.html:22
msgid "Judge is An Anonymous Secret Society, society@mail.i2p."
@@ -998,7 +1372,11 @@ msgid ""
"latency network with its natural limits, the software SYNDIE\n"
"can overcome some of these limits and provide better anonymity\n"
"for people who really need it."
-msgstr "Además de usar I2P, queremos fomentar que los usuarios tengan más en cuenta el anonimato y la privacidad. Ya que I2P es una red baja latencia con límites naturales, el software SYNDIE puede vencer esos límites y provver más anonimato para la gente que relamente lo necesita."
+msgstr ""
+"Además de usar I2P, queremos fomentar que los usuarios tengan más en "
+"cuenta el anonimato y la privacidad. Ya que I2P es una red baja latencia "
+"con límites naturales, el software SYNDIE puede vencer esos límites y "
+"provver más anonimato para la gente que relamente lo necesita."
#: i2p2www/pages/site/get-involved/bounties/syndie-2012.html:14
msgid ""
@@ -1007,7 +1385,12 @@ msgid ""
"with needed bugfixes we set out this bounty. Also syndie needs\n"
"some enhancements and a better GUI for users to work with it.\n"
"Current bounty sum is 50 Bitcoin."
-msgstr "El proyecto syndie ha estado en desarrollo por demasiado tiempo (5 años). Para conseguir una nueva y fresca versión con los errores arreglados hemos creado esta recompensa. Además Syndie necesita algunas mejoras y una GUI mejor con la que trabajar. La recompensa actual es de 50 bitcoins."
+msgstr ""
+"El proyecto syndie ha estado en desarrollo por demasiado tiempo (5 años)."
+" Para conseguir una nueva y fresca versión con los errores arreglados "
+"hemos creado esta recompensa. Además Syndie necesita algunas mejoras y "
+"una GUI mejor con la que trabajar. La recompensa actual es de 50 "
+"bitcoins."
#: i2p2www/pages/site/get-involved/bounties/syndie-2012.html:22
msgid ""
@@ -1016,7 +1399,12 @@ msgid ""
"was created and made available on different webpages.\n"
"As a result of this work, the bounty sum was reduced and\n"
"the withdrawn money moved to the IPv6 bounty."
-msgstr "Las últimas mejoras de Syndie en el código han mejorado dramáticamente la mejora de la aplicación. Se ha creado un nuevo paquete con arreglos y se ha puesto a disposición en varias páginas. Como resultado de este trabajo, la cantidad de la recompensa fue reducida y el dinero retirado se movido a la recompensa de IPv6."
+msgstr ""
+"Las últimas mejoras de Syndie en el código han mejorado dramáticamente la"
+" mejora de la aplicación. Se ha creado un nuevo paquete con arreglos y se"
+" ha puesto a disposición en varias páginas. Como resultado de este "
+"trabajo, la cantidad de la recompensa fue reducida y el dinero retirado "
+"se movido a la recompensa de IPv6."
#: i2p2www/pages/site/get-involved/bounties/unit-tests.html:2
msgid "Bounty unittests"
@@ -1039,13 +1427,26 @@ msgid ""
"As this needs some reading of code, it is the best start point for\n"
"new devs to get a good overview of I2P code and coding. A good job\n"
"for college students, interns or anyone who is just interested."
-msgstr "Para mejorar el mantenimiento de I2P, queremos un conjunto de unit tests automáticos para el código crítico. Aunque ya tenemos algunos unit tests, son ad-hoc y están parcialmente sin terminar. Esta recompensa es para alguien que compruebe los tests existentes y los mueva a jUnit, automatice su ejecución, los amplíe para mejorar la cobertura sobre el código, y lo publique el reporte online. Es un esfuerzo enorme, pero puede romperse en fases, listadas más abajo (la fase 2 debe hacerse primero, pero las demás fases pueden hacerse en cualquier orden). Ya que este trabajo necesita leer el código, es un buen punto de inicio para los nuevos desarrolladores echarle el ojo al código de I2P. Es un buen trabajo para estudiantes o cualquiera interesado."
+msgstr ""
+"Para mejorar el mantenimiento de I2P, queremos un conjunto de unit tests "
+"automáticos para el código crítico. Aunque ya tenemos algunos unit tests,"
+" son ad-hoc y están parcialmente sin terminar. Esta recompensa es para "
+"alguien que compruebe los tests existentes y los mueva a jUnit, "
+"automatice su ejecución, los amplíe para mejorar la cobertura sobre el "
+"código, y lo publique el reporte online. Es un esfuerzo enorme, pero "
+"puede romperse en fases, listadas más abajo (la fase 2 debe hacerse "
+"primero, pero las demás fases pueden hacerse en cualquier orden). Ya que "
+"este trabajo necesita leer el código, es un buen punto de inicio para los"
+" nuevos desarrolladores echarle el ojo al código de I2P. Es un buen "
+"trabajo para estudiantes o cualquiera interesado."
#: i2p2www/pages/site/get-involved/bounties/unit-tests.html:20
msgid ""
"Take care! Jobs and bounties shuffled a bit!\n"
"Phase 6,7 and 8 are still open!"
-msgstr "¡Tenga cuidad! ¡Los trabajos y recompensas han cambiado un poco! ¡Las fases 6,7 y 8 están aun abiertas!"
+msgstr ""
+"¡Tenga cuidad! ¡Los trabajos y recompensas han cambiado un poco! ¡Las "
+"fases 6,7 y 8 están aun abiertas!"
#: i2p2www/pages/site/get-involved/bounties/unit-tests.html:26
#: i2p2www/pages/site/get-involved/bounties/unit-tests.html:40
@@ -1086,7 +1487,12 @@ msgid ""
"to set up in the channel #i2p-dev on IRC2p network to print out\n"
"results of build tests.
\n"
"The server needs to be run long term."
-msgstr "Para obtener esta recompensa, un servidor de integración continuo (Jenkins, antes se llamaba Hudson) debe configurarse y un bot IRC debe configurarse y conectarse al canal #i2p-dev en la red IRC2p para poder mostrar los resultados de las pruebas de compilación.
\nEste servidor debe ejecutarse por largo tiempo."
+msgstr ""
+"Para obtener esta recompensa, un servidor de integración continuo "
+"(Jenkins, antes se llamaba Hudson) debe configurarse y un bot IRC debe "
+"configurarse y conectarse al canal #i2p-dev en la red IRC2p para poder "
+"mostrar los resultados de las pruebas de compilación.
\n"
+"Este servidor debe ejecutarse por largo tiempo."
#: i2p2www/pages/site/get-involved/bounties/unit-tests.html:41
msgid "Check existing SDK tests"
@@ -1102,11 +1508,18 @@ msgstr "pagado a str4d"
msgid ""
"To collect this bounty, the existing SDK tests must be checked \n"
"and made to work again. The need to be integrated into the ant \n"
-"build scripts (\"ant test\"), and tied in with a code coverage tool (e.g. \n"
+"build scripts (\"ant test\"), and tied in with a code coverage tool (e.g."
+" \n"
"Clover). The ant script\n"
"must be capable of generating test status results as a web page, \n"
"which will be published online."
-msgstr "Para obtener esta recompensa el SDK debe ser comprobado y hacer que funcione de nuevo. Debe ser integrado dentro de los scripts de compilación de ant (\"ant test\") y unido con una herramienta de cobertura (por ejemplo Clover). El script ant debe ser capaz de generar resultados de pruebas de estado como una página web, que se publicará online."
+msgstr ""
+"Para obtener esta recompensa el SDK debe ser comprobado y hacer que "
+"funcione de nuevo. Debe ser integrado dentro de los scripts de "
+"compilación de ant (\"ant test\") y unido con una herramienta de "
+"cobertura (por ejemplo Clover). El script ant "
+"debe ser capaz de generar resultados de pruebas de estado como una página"
+" web, que se publicará online."
#: i2p2www/pages/site/get-involved/bounties/unit-tests.html:56
msgid "SDK test coverage"
@@ -1121,7 +1534,9 @@ msgstr "pagado al grupo de desarrollo de unittests"
msgid ""
"To collect this bounty, the automated unit tests of the SDK \n"
"(i2p/core/java/src) must work again."
-msgstr "Para obtener esta recompensa, los unit tests automáticos del SDK (i2p/core/java/src) tienen que funcionar de nuevo."
+msgstr ""
+"Para obtener esta recompensa, los unit tests automáticos del SDK "
+"(i2p/core/java/src) tienen que funcionar de nuevo."
#: i2p2www/pages/site/get-involved/bounties/unit-tests.html:67
msgid "Router test migration"
@@ -1131,7 +1546,9 @@ msgstr "Migración de las pruebas del ruter"
msgid ""
"As with phase 2, the existing unit tests for the router must be\n"
"moved over to the automated system."
-msgstr "Como en la fase 2, los unit tests existentes del ruter tienen que ser movidos a un sistema automático."
+msgstr ""
+"Como en la fase 2, los unit tests existentes del ruter tienen que ser "
+"movidos a un sistema automático."
#: i2p2www/pages/site/get-involved/bounties/unit-tests.html:78
msgid "Router test coverage"
@@ -1141,7 +1558,9 @@ msgstr "Covertura para los tests del ruter."
msgid ""
"To collect this bounty, the automated unit tests of the router \n"
"(i2p/router/java/src) must work again."
-msgstr "Para obtener esta recompensa, los unit tests automáticos del ruter (i2p/core/java/src) tienen que funcionar de nuevo."
+msgstr ""
+"Para obtener esta recompensa, los unit tests automáticos del ruter "
+"(i2p/core/java/src) tienen que funcionar de nuevo."
#: i2p2www/pages/site/get-involved/bounties/unit-tests.html:89
msgid "Streaming lib tests"
@@ -1152,7 +1571,10 @@ msgid ""
"To collect this bounty, a new set of unit tests must meet a \n"
"measured code coverage of 90% of the streaming lib \n"
"(i2p/apps/ministreaming/ and i2p/apps/streaming/)."
-msgstr "Para hacerse con esta recompensa, un nuevo grupo de tests de unidad \ndebe satisfacer una covertura de código determinada de 90% de la \nlibrería streaming (i2p/apps/ministreaming/ y i2p/apps/streaming/)."
+msgstr ""
+"Para hacerse con esta recompensa, un nuevo grupo de tests de unidad \n"
+"debe satisfacer una covertura de código determinada de 90% de la \n"
+"librería streaming (i2p/apps/ministreaming/ y i2p/apps/streaming/)."
#: i2p2www/pages/site/get-involved/bounties/unit-tests.html:102
msgid "Unit tests coverage"
@@ -1162,7 +1584,10 @@ msgstr "Covertura de unit tests"
msgid ""
"To collect this bounty, all above unit tests must meet the 100%\n"
"coverage marker (except for log statements)."
-msgstr "Para hacerse con esta recompensa, todos los tests de unidad \nanteriores deben satisfacer la marca de covertura 100% \n(excepto para las entradas de registro (`log`)."
+msgstr ""
+"Para hacerse con esta recompensa, todos los tests de unidad \n"
+"anteriores deben satisfacer la marca de covertura 100% \n"
+"(excepto para las entradas de registro (`log`)."
#: i2p2www/pages/site/get-involved/bounties/unit-tests.html:113
msgid "MultiRouter simulation"
@@ -1178,13 +1603,19 @@ msgid ""
"simulation must be checked, made work again and extend to simulate\n"
"lots of routers in memory on a single machine. This bounty will\n"
"be split in more fine grained subworks."
-msgstr "Para obtener esta recompensa, debe comprobarse y hacer funcionar de nuevo la ya existente simulación multi-ruter en la memoria, además de poder simular muchos ruters en la memoria de una única máquina. Esta recompensa se partirá en otros trabajos menores."
+msgstr ""
+"Para obtener esta recompensa, debe comprobarse y hacer funcionar de nuevo"
+" la ya existente simulación multi-ruter en la memoria, además de poder "
+"simular muchos ruters en la memoria de una única máquina. Esta recompensa"
+" se partirá en otros trabajos menores."
#: i2p2www/pages/site/get-involved/bounties/unit-tests.html:126
msgid ""
"Judge on all these works is the donor and donor decides if a phase is\n"
"called succesfull done and money can be paid."
-msgstr "El jurado de estas donaciones es el que decide, y el que dona decide si la fase se ha hecho exitosamente y el dinero puede pagarse."
+msgstr ""
+"El jurado de estas donaciones es el que decide, y el que dona decide si "
+"la fase se ha hecho exitosamente y el dinero puede pagarse."
#: i2p2www/pages/site/get-involved/bounties/vuze-plugin.html:2
msgid "Bounty I2P vuze plugin"
@@ -1202,10 +1633,18 @@ msgid ""
"The plugin needs to be official and submitted to vuze for publication\n"
"on their webpage/repository for plugins.\n"
"It should be easy to install and configured, work smooth and flawless.\n"
-"Configuration should be friendly to starters and made easy to be anonymous.\n"
+"Configuration should be friendly to starters and made easy to be "
+"anonymous.\n"
"It should work with *.b32.i2p destinations as with signed (516++ bits) \n"
"destinations."
-msgstr "Para mejorar el suso de I2P y atraer a más usuarios al uso de torrents en I2P creo una recompensa por un pluguin de vuze que funcione. El pluguin tiene que ser oficial y debe aparecer en la web oficial de de vuze. Debe ser fácil de instalar y utilizar, y funcionar suave y sin problemas. La configuración debe ser sencillas para la gente nueva y debe proveer anonimato fácilmente. Debe funcionar con destinaciones b32 y con destinaciones firmadas (516++ bits)."
+msgstr ""
+"Para mejorar el suso de I2P y atraer a más usuarios al uso de torrents en"
+" I2P creo una recompensa por un pluguin de vuze que funcione. El pluguin "
+"tiene que ser oficial y debe aparecer en la web oficial de de vuze. Debe "
+"ser fácil de instalar y utilizar, y funcionar suave y sin problemas. La "
+"configuración debe ser sencillas para la gente nueva y debe proveer "
+"anonimato fácilmente. Debe funcionar con destinaciones b32 y con "
+"destinaciones firmadas (516++ bits)."
#: i2p2www/pages/site/get-involved/develop/applications.html:2
msgid "Application Development"
@@ -1248,53 +1687,110 @@ msgstr "Empiece a programar - una guía simple"
msgid ""
"There are multiple ways to use applications in I2P.\n"
"Using I2PTunnel,\n"
-"you can use regular applications without needing to program explicit I2P support.\n"
+"you can use regular applications without needing to program explicit I2P "
+"support.\n"
"This is very effective for client-server scenario's,\n"
"where you need to connect to a single website.\n"
-"You can simply create a tunnel using I2PTunnel to connect to that website, as shown in Figure 1."
-msgstr "Hay múltiples formas de usar aplicaciones en I2P. Usando los I2PTunnel puede utilizar aplicaciones normales sin que los programas tengan que tener soporte explícito para i2P. Esto es muy eficiente en escenarios cliente-servidor, cuando se necesita conectar con una sola web. Simplemente puede crear un túnel usando I2PTunnel para conectarse a la web, como se puede ver en la Figura 1."
+"You can simply create a tunnel using I2PTunnel to connect to that "
+"website, as shown in Figure 1."
+msgstr ""
+"Hay múltiples formas de usar aplicaciones en I2P. Usando los I2PTunnel puede utilizar aplicaciones normales"
+" sin que los programas tengan que tener soporte explícito para i2P. Esto "
+"es muy eficiente en escenarios cliente-servidor, cuando se necesita "
+"conectar con una sola web. Simplemente puede crear un túnel usando "
+"I2PTunnel para conectarse a la web, como se puede ver en la Figura 1."
#: i2p2www/pages/site/get-involved/develop/applications.html:26
msgid ""
-"If your application is distributed, it will require connections to a large amount of peers.\n"
-"Using I2PTunnel, you will need to create a new tunnel for each peer you want to contact,\n"
+"If your application is distributed, it will require connections to a "
+"large amount of peers.\n"
+"Using I2PTunnel, you will need to create a new tunnel for each peer you "
+"want to contact,\n"
"as shown in Figure 2.\n"
-"This process can of course be automated, but running a lot of I2PTunnel instances creates a large amount of overhead.\n"
+"This process can of course be automated, but running a lot of I2PTunnel "
+"instances creates a large amount of overhead.\n"
"In addition, with many protocols you will need to force everyone to \n"
-"use the same set of ports for all peers - e.g. if you want to reliably run DCC \n"
-"chat, everyone needs to agree that port 10001 is Alice, port 10002 is Bob, port \n"
-"10003 is Charlie, and so on, since the protocol includes TCP/IP specific information\n"
+"use the same set of ports for all peers - e.g. if you want to reliably "
+"run DCC \n"
+"chat, everyone needs to agree that port 10001 is Alice, port 10002 is "
+"Bob, port \n"
+"10003 is Charlie, and so on, since the protocol includes TCP/IP specific "
+"information\n"
"(host and port)."
-msgstr "Si su aplicación es distribuida, requerirá la conexión de un gran número de pares. Usando un I2PTunnel necesitaría crear un túnel por cada para que quiera conectar, como se ve en la Figura 2. Este procese puede ser automatizado, por supuesto, pero ejecutar muchas instancias de I2PTunnel crea mucha sobrecarga. Además, con muchos protocolos tendría que forzar a todos a usar los mismos puertos para todos los pares - por ejemplo, si desea habilitar DCC, todos necesitarían llegar al acuerdo de que el puerto 10001 es para Alice, el puerto 10002 para Bob, el puerto 10003 para Charlie, y así, ya que el protocolo incluye información específica TCP/IP (servidor y puerto)."
+msgstr ""
+"Si su aplicación es distribuida, requerirá la conexión de un gran número "
+"de pares. Usando un I2PTunnel necesitaría crear un túnel por cada para "
+"que quiera conectar, como se ve en la Figura 2. Este procese puede ser "
+"automatizado, por supuesto, pero ejecutar muchas instancias de I2PTunnel "
+"crea mucha sobrecarga. Además, con muchos protocolos tendría que forzar a"
+" todos a usar los mismos puertos para todos los pares - por ejemplo, si "
+"desea habilitar DCC, todos necesitarían llegar al acuerdo de que el "
+"puerto 10001 es para Alice, el puerto 10002 para Bob, el puerto 10003 "
+"para Charlie, y así, ya que el protocolo incluye información específica "
+"TCP/IP (servidor y puerto)."
#: i2p2www/pages/site/get-involved/develop/applications.html:37
msgid ""
-"General network applications often send a lot of additional data that could be used to identify users.\n"
-"Hostnames, port numbers, time zones, character sets, etc. are often sent without informing the user.\n"
-"As such, designing the network protocol specifically with anonymity in mind\n"
+"General network applications often send a lot of additional data that "
+"could be used to identify users.\n"
+"Hostnames, port numbers, time zones, character sets, etc. are often sent "
+"without informing the user.\n"
+"As such, designing the network protocol specifically with anonymity in "
+"mind\n"
"can avoid compromising user identities."
-msgstr "Las aplicaciones de red habitualmente envían mucha información adicional que puede identificar a los usuarios. Los nombres de los hosts, puertos, horarios, etc, a veces son enviados sin informar al usuario. Por lo que el diseñar los protocolos de red con el anonimato en mente puede evitar comprometer las identidades de los usuarios."
+msgstr ""
+"Las aplicaciones de red habitualmente envían mucha información adicional"
+" que puede identificar a los usuarios. Los nombres de los hosts, puertos,"
+" horarios, etc, a veces son enviados sin informar al usuario. Por lo que "
+"el diseñar los protocolos de red con el anonimato en mente puede evitar "
+"comprometer las identidades de los usuarios."
#: i2p2www/pages/site/get-involved/develop/applications.html:43
msgid ""
-"There are also efficiency considerations to review when determining how to \n"
-"interact on top of I2P. The streaming library and things built on top of it\n"
-"operate with handshakes similar to TCP, while the core I2P protocols (I2NP and I2CP)\n"
-"are strictly message based (like UDP or in some instances raw IP). The important\n"
-"distinction is that with I2P, communication is operating over a long fat network - \n"
-"each end to end message will have nontrivial latencies, but may contain payloads \n"
-"of up to several KB. An application that needs a simple request and response can get rid\n"
-"of any state and drop the latency incurred by the startup and teardown handshakes\n"
-"by using (best effort) datagrams without having to worry about MTU detection or \n"
+"There are also efficiency considerations to review when determining how "
+"to \n"
+"interact on top of I2P. The streaming library and things built on top of"
+" it\n"
+"operate with handshakes similar to TCP, while the core I2P protocols "
+"(I2NP and I2CP)\n"
+"are strictly message based (like UDP or in some instances raw IP). The "
+"important\n"
+"distinction is that with I2P, communication is operating over a long fat "
+"network - \n"
+"each end to end message will have nontrivial latencies, but may contain "
+"payloads \n"
+"of up to several KB. An application that needs a simple request and "
+"response can get rid\n"
+"of any state and drop the latency incurred by the startup and teardown "
+"handshakes\n"
+"by using (best effort) datagrams without having to worry about MTU "
+"detection or \n"
"fragmentation of messages."
-msgstr "También hay que tomar consideraciones sobre la eficiencia cuando se determina como funcionar sobre I2P. La librería de streaming y las cosas construidas sobre ellas funcionan con handshakes similares a los de TCP, mientras que los protocolos del núcleo de I2P (I2NP e I2CP) son estrictamente basados en mensajes (como UDP). La diferencia más importante es que con I2P las comunicaciones funcionan sobre una red grande y gorda, cada mensaje de fin a fin tendrá latencias no triviales, y puede contener cargas de varios KB. Una aplicación que necesite una simple petición y respuesta puede evitar cualquier estado y evitar los retardos con los handshakes de inicio usando (mejor esfuerzo) datagramas sin tener que preocuparse sobre la detección de MTU o la fragmentación de los mensajes."
+msgstr ""
+"También hay que tomar consideraciones sobre la eficiencia cuando se "
+"determina como funcionar sobre I2P. La librería de streaming y las cosas "
+"construidas sobre ellas funcionan con handshakes similares a los de TCP, "
+"mientras que los protocolos del núcleo de I2P (I2NP e I2CP) son "
+"estrictamente basados en mensajes (como UDP). La diferencia más "
+"importante es que con I2P las comunicaciones funcionan sobre una red "
+"grande y gorda, cada mensaje de fin a fin tendrá latencias no triviales, "
+"y puede contener cargas de varios KB. Una aplicación que necesite una "
+"simple petición y respuesta puede evitar cualquier estado y evitar los "
+"retardos con los handshakes de inicio usando (mejor esfuerzo) datagramas "
+"sin tener que preocuparse sobre la detección de MTU o la fragmentación de"
+" los mensajes."
#: i2p2www/pages/site/get-involved/develop/applications.html:57
#: i2p2www/pages/site/get-involved/develop/applications.html:59
msgid ""
-"Creating a server-client connection using I2PTunnel only requires creating a"
-" single tunnel."
-msgstr "Crear una conexión servidor-cliente usando un I2PTunnel sólo requiere crear un solo túnel."
+"Creating a server-client connection using I2PTunnel only requires "
+"creating a single tunnel."
+msgstr ""
+"Crear una conexión servidor-cliente usando un I2PTunnel sólo requiere "
+"crear un solo túnel."
#: i2p2www/pages/site/get-involved/develop/applications.html:59
msgid "Figure 1:"
@@ -1303,9 +1799,11 @@ msgstr "Figura 1:"
#: i2p2www/pages/site/get-involved/develop/applications.html:64
#: i2p2www/pages/site/get-involved/develop/applications.html:66
msgid ""
-"Setting up connections for a peer-to-peer applications requires a very large"
-" amount of tunnels."
-msgstr "Configurar conexiones para aplicaciones p2p requiere un gran número de túneles."
+"Setting up connections for a peer-to-peer applications requires a very "
+"large amount of tunnels."
+msgstr ""
+"Configurar conexiones para aplicaciones p2p requiere un gran número de "
+"túneles."
#: i2p2www/pages/site/get-involved/develop/applications.html:66
msgid "Figure 2:"
@@ -1313,40 +1811,64 @@ msgstr "Fugura 2:"
#: i2p2www/pages/site/get-involved/develop/applications.html:70
msgid "In summary, a number of reasons to write I2P-specific code:"
-msgstr "En resumen, hay bastantes razones para escribir el código específico para I2P:"
+msgstr ""
+"En resumen, hay bastantes razones para escribir el código específico para"
+" I2P:"
#: i2p2www/pages/site/get-involved/develop/applications.html:74
msgid ""
-"Creating a large amount of I2PTunnel instances consumes a non-trivial amount of resources,\n"
-"which is problematic for distributed applications (a new tunnel is required for each peer)."
-msgstr "Crear un gran número de I2PTunnles consume una cantidad de recursos nada triviales, lo cual es problemático para las aplicaciones distribuidas (hace falta un nuevo túnel por cada par)."
+"Creating a large amount of I2PTunnel instances consumes a non-trivial "
+"amount of resources,\n"
+"which is problematic for distributed applications (a new tunnel is "
+"required for each peer)."
+msgstr ""
+"Crear un gran número de I2PTunnles consume una cantidad de recursos nada "
+"triviales, lo cual es problemático para las aplicaciones distribuidas "
+"(hace falta un nuevo túnel por cada par)."
#: i2p2www/pages/site/get-involved/develop/applications.html:78
msgid ""
-"General network protocols often send a lot of additional data that can be used to identify users.\n"
-"Programming specifically for I2P allows the creation of a network protocol\n"
+"General network protocols often send a lot of additional data that can be"
+" used to identify users.\n"
+"Programming specifically for I2P allows the creation of a network "
+"protocol\n"
"that does not leak such information, keeping users anonymous and secure."
-msgstr "Los protocolos de red generales a menudo envían mucha información adicional que puede usarse para identificar a los usuarios. Programar específicamente para I2P permite la creación de protocolos de red que no filtran dicha información no deseada, permitiendo que los usuarios permanezcan seguros y anónimos."
+msgstr ""
+"Los protocolos de red generales a menudo envían mucha información "
+"adicional que puede usarse para identificar a los usuarios. Programar "
+"específicamente para I2P permite la creación de protocolos de red que no "
+"filtran dicha información no deseada, permitiendo que los usuarios "
+"permanezcan seguros y anónimos."
#: i2p2www/pages/site/get-involved/develop/applications.html:83
msgid ""
-"Network protocols designed for use on the regular internet can be inefficient\n"
+"Network protocols designed for use on the regular internet can be "
+"inefficient\n"
"on I2P, which is a network with a much higher latency."
-msgstr "Los protocolos de red diseñados para el Internet normal pueden ser ineficientes sobre I2P, que es una red con una latencia mayor."
+msgstr ""
+"Los protocolos de red diseñados para el Internet normal pueden ser "
+"ineficientes sobre I2P, que es una red con una latencia mayor."
#: i2p2www/pages/site/get-involved/develop/applications.html:90
#, python-format
msgid ""
-"I2P supports a standard plugins interface for developers\n"
+"I2P supports a standard plugins interface for"
+" developers\n"
"so that applications may be easily integrated and distributed."
-msgstr "I2P soporta un interfaz de plugins estándar para los desarrolladores, con lo que las aplicaciones pueden ser integradas y distribuidas más fácilmente."
+msgstr ""
+"I2P soporta un interfaz de plugins estándar "
+"para los desarrolladores, con lo que las aplicaciones pueden ser "
+"integradas y distribuidas más fácilmente."
#: i2p2www/pages/site/get-involved/develop/applications.html:96
msgid ""
"Applications written in Java and accessible/runnable\n"
"using an HTML interface via the standard webapps/app.war\n"
"may be considered for inclusion in the i2p distribution."
-msgstr "Las aplicaciones escritas en Java y accesibles/ejecutables usando un interfaz HTML a través de aplicaciones web estándar pueden considerarse para incluirse en la distribución I2P."
+msgstr ""
+"Las aplicaciones escritas en Java y accesibles/ejecutables usando un "
+"interfaz HTML a través de aplicaciones web estándar pueden considerarse "
+"para incluirse en la distribución I2P."
#: i2p2www/pages/site/get-involved/develop/applications.html:104
msgid "There are a few changes that require adjusting to when using I2P:"
@@ -1358,58 +1880,113 @@ msgstr "Destinación ~= host+puerto"
#: i2p2www/pages/site/get-involved/develop/applications.html:110
msgid ""
-"An application running on I2P sends messages from and receives messages to a\n"
-"unique cryptographically secure end point - a \"destination\". In TCP or UDP\n"
-"terms, a destination could (largely) be considered the equivalent of a hostname\n"
+"An application running on I2P sends messages from and receives messages "
+"to a\n"
+"unique cryptographically secure end point - a \"destination\". In TCP or"
+" UDP\n"
+"terms, a destination could (largely) be considered the equivalent of a "
+"hostname\n"
"plus port number pair, though there are a few differences."
-msgstr "Una aplicación ejecutándose sobre I2P envía un mensaje desde, y recibe mensajes hacia un único punto seguro criptográfico. - una \"destinación\". En términos de TCP y UDP una destinación puede ser considerada (en gran parte) el equivalente a un hostname más el par de números de puertos, aunque hay unas pocas diferencias."
+msgstr ""
+"Una aplicación ejecutándose sobre I2P envía un mensaje desde, y recibe "
+"mensajes hacia un único punto seguro criptográfico. - una "
+"\"destinación\". En términos de TCP y UDP una destinación puede ser "
+"considerada (en gran parte) el equivalente a un hostname más el par de "
+"números de puertos, aunque hay unas pocas diferencias."
#: i2p2www/pages/site/get-involved/develop/applications.html:118
msgid ""
-"An I2P destination itself is a cryptographic construct - all data sent to one is \n"
-"encrypted as if there were universal deployment of IPsec with the (anonymized)\n"
-"location of the end point signed as if there were universal deployment of DNSSEC."
-msgstr "Una destinación I2P es en sí misma una construcción criptográfica - toda la información enviada es cifrada tal y como si hubiera una implementación mundial de IPsec con la localización (anónima) del punto final firmado como si existiera una implementación universal de DNSSEC."
+"An I2P destination itself is a cryptographic construct - all data sent to"
+" one is \n"
+"encrypted as if there were universal deployment of IPsec with the "
+"(anonymized)\n"
+"location of the end point signed as if there were universal deployment of"
+" DNSSEC."
+msgstr ""
+"Una destinación I2P es en sí misma una construcción criptográfica - toda"
+" la información enviada es cifrada tal y como si hubiera una "
+"implementación mundial de IPsec con la localización (anónima) del punto "
+"final firmado como si existiera una implementación universal de DNSSEC."
#: i2p2www/pages/site/get-involved/develop/applications.html:123
msgid ""
-"I2P destinations are mobile identifiers - they can be moved from one I2P router\n"
-"to another (or it can even \"multihome\" - operate on multiple routers at\n"
-"once). This is quite different from the TCP or UDP world where a single end point (port)\n"
+"I2P destinations are mobile identifiers - they can be moved from one I2P "
+"router\n"
+"to another (or it can even \"multihome\" - operate on multiple routers at"
+"\n"
+"once). This is quite different from the TCP or UDP world where a single "
+"end point (port)\n"
"must stay on a single host."
-msgstr "Las destinaciones de I2P son identificadores móviles - pueden ser movidas de un ruter I2P a otro ( o incluso pueden ser \"multi-hogar\" - funcionar en varios ruters a la vez). Esto es bastante diferente a como funcionan TCP y UDP, donde un un solo punto final (puerto) tiene que estar en un solo host."
+msgstr ""
+"Las destinaciones de I2P son identificadores móviles - pueden ser movidas"
+" de un ruter I2P a otro ( o incluso pueden ser \"multi-hogar\" - "
+"funcionar en varios ruters a la vez). Esto es bastante diferente a como "
+"funcionan TCP y UDP, donde un un solo punto final (puerto) tiene que "
+"estar en un solo host."
#: i2p2www/pages/site/get-involved/develop/applications.html:130
msgid ""
-"I2P destinations are ugly and large - behind the scenes, they contain a 2048 bit ElGamal\n"
-"public key for encryption, a 1024 bit DSA public key for signing, and a variable size \n"
+"I2P destinations are ugly and large - behind the scenes, they contain a "
+"2048 bit ElGamal\n"
+"public key for encryption, a 1024 bit DSA public key for signing, and a "
+"variable size \n"
"certificate, which may contain proof of work or blinded data."
-msgstr "Las destinaciones I2P son largas y feas - en el fondo contienen un clave pública ElGamal de 2048 bits para el cifrado, una calve pública DSA de 1024 bits para firmar, y un certificado de tamaño variable, que puede contener una prueba de trabajo realizado o información blindada."
+msgstr ""
+"Las destinaciones I2P son largas y feas - en el fondo contienen un clave "
+"pública ElGamal de 2048 bits para el cifrado, una calve pública DSA de "
+"1024 bits para firmar, y un certificado de tamaño variable, que puede "
+"contener una prueba de trabajo realizado o información blindada."
#: i2p2www/pages/site/get-involved/develop/applications.html:135
#, python-format
msgid ""
-"There are existing ways to refer to these large and ugly destinations by short\n"
-"and pretty names (e.g. \"irc.duck.i2p\"), but those techniques do not guarantee\n"
-"globally uniqueness (since they're stored locally in a database on each person's machine)\n"
-"and the current mechanism is not especially scalable nor secure (updates to the host list are\n"
+"There are existing ways to refer to these large and ugly destinations by "
+"short\n"
+"and pretty names (e.g. \"irc.duck.i2p\"), but those techniques do not "
+"guarantee\n"
+"globally uniqueness (since they're stored locally in a database on each "
+"person's machine)\n"
+"and the current mechanism is not especially scalable nor secure (updates "
+"to the host list are\n"
"managed using \"subscriptions\" to naming services).\n"
"There may be some secure, human readable, scalable, and globally \n"
-"unique, naming system some day, but applications shouldn't depend upon it being in place,\n"
+"unique, naming system some day, but applications shouldn't depend upon it"
+" being in place,\n"
"since there are those who don't think such a beast is possible.\n"
-"Further information on the naming system is available."
-msgstr "Hay formas de referirse a esa larga y fea destinación acortándola con nombres bonitos (por ejemplo \"irc.duck.i2p\"), pero estas técnicas no garantizan una unicidad global (ya que están almacenadas localmente en la base de datos de la máquina de cada persona) y el mecanismo actual no es especialmente escalable o seguro (las actualizaciones de la lista de hosts son manejadas usando \"suscripciones\" a servicios de nombres). Quizás algún día habrá un sistema más seguro, legible por humanos, escalable y con unicidad global, pero las aplicaciones no deberían depender de su existencia, ya que hay gente que piensa que ese tipo de bestia no es posible. Hay disponible más información sobre el sistema de nombres."
+"Further information on the naming system is "
+"available."
+msgstr ""
+"Hay formas de referirse a esa larga y fea destinación acortándola con "
+"nombres bonitos (por ejemplo \"irc.duck.i2p\"), pero estas técnicas no "
+"garantizan una unicidad global (ya que están almacenadas localmente en la"
+" base de datos de la máquina de cada persona) y el mecanismo actual no es"
+" especialmente escalable o seguro (las actualizaciones de la lista de "
+"hosts son manejadas usando \"suscripciones\" a servicios de nombres). "
+"Quizás algún día habrá un sistema más seguro, legible por humanos, "
+"escalable y con unicidad global, pero las aplicaciones no deberían "
+"depender de su existencia, ya que hay gente que piensa que ese tipo de "
+"bestia no es posible. Hay disponible más "
+"información sobre el sistema de nombres."
#: i2p2www/pages/site/get-involved/develop/applications.html:149
#, python-format
msgid ""
"While most applications do not need to distinguish protocols and ports,\n"
-"I2P does support them. Complex applications may specify a protocol,\n"
+"I2P does support them. Complex applications may specify a "
+"protocol,\n"
"from port, and to port, on a per-message basis, to multiplex traffic on\n"
"a single destination.\n"
"See the datagram page for details.\n"
-"Simple applications operate by listening for \"all protocols\" on \"all ports\" of a destination."
-msgstr "Mientras que la mayoría de las aplicaciones no necesitan distinguir protocolos o puertos, I2P si los soporta. Las aplicaciones complejas pueden especificar un protocolo, desde un puerto, y hacia un puerto, en un mensaje, hacia tráfico múltiple o sobre una sola destinación. Vea la página de datagrama para más detalles. Las aplicaciones simples funciona escuchando por \"todos los protocolos\" sobre \"todos los puertos\" de una destinación."
+"Simple applications operate by listening for \"all protocols\" on \"all "
+"ports\" of a destination."
+msgstr ""
+"Mientras que la mayoría de las aplicaciones no necesitan distinguir "
+"protocolos o puertos, I2P si los soporta. Las aplicaciones "
+"complejas pueden especificar un protocolo, desde un puerto, y hacia un "
+"puerto, en un mensaje, hacia tráfico múltiple o sobre una sola "
+"destinación. Vea la página de datagrama "
+"para más detalles. Las aplicaciones simples funciona escuchando por "
+"\"todos los protocolos\" sobre \"todos los puertos\" de una destinación."
#: i2p2www/pages/site/get-involved/develop/applications.html:158
msgid "Anonymity and confidentiality"
@@ -1418,20 +1995,39 @@ msgstr "Anonimato y confidencialidad."
#: i2p2www/pages/site/get-involved/develop/applications.html:160
msgid ""
"I2P has transparent end to end encryption\n"
-"and authentication for all data passed over the network - if Bob sends to Alice's destination,\n"
-"only Alice's destination can receive it, and if Bob is using the datagrams or streaming \n"
-"library, Alice knows for certain that Bob's destination is the one who sent the data."
-msgstr "I2P tiene cifrado transparente y autenticación transparente de todos los datos que pasan por la red - si Bob envía a la destinación de Alice, sólo la destinación de Alice puede recibirlo, y si Bob está usando la librería de datagramas o streaming, Alice sabe seguro que la destinación de Bob es la que envió los datos."
+"and authentication for all data passed over the network - if Bob sends to"
+" Alice's destination,\n"
+"only Alice's destination can receive it, and if Bob is using the "
+"datagrams or streaming \n"
+"library, Alice knows for certain that Bob's destination is the one who "
+"sent the data."
+msgstr ""
+"I2P tiene cifrado transparente y autenticación transparente de todos los "
+"datos que pasan por la red - si Bob envía a la destinación de Alice, sólo"
+" la destinación de Alice puede recibirlo, y si Bob está usando la "
+"librería de datagramas o streaming, Alice sabe seguro que la destinación "
+"de Bob es la que envió los datos."
#: i2p2www/pages/site/get-involved/develop/applications.html:167
msgid ""
"Of course, I2P transparently anonymizes the\n"
-"data sent between Alice and Bob, but it does nothing to anonymize the content of what they\n"
-"send. For instance, if Alice sends Bob a form with her full name, government IDs, and \n"
-"credit card numbers, there is nothing I2P can do. As such, protocols and applications should \n"
-"keep in mind what information they are trying to protect and what information they are willing\n"
+"data sent between Alice and Bob, but it does nothing to anonymize the "
+"content of what they\n"
+"send. For instance, if Alice sends Bob a form with her full name, "
+"government IDs, and \n"
+"credit card numbers, there is nothing I2P can do. As such, protocols and"
+" applications should \n"
+"keep in mind what information they are trying to protect and what "
+"information they are willing\n"
"to expose."
-msgstr "Por supuesto, I2P anonimiza transparentemente los datos enviados entre Alice y Bob, pero no hace nada para anonimizar el contenido de lo que envían. Por ejemplo, si Alice envía a Bob un formulario con su nombre completo, ID del gobierno, y los números de sus tarjetas de crédito, no hay nada que I2P pueda hacer. Por eso, los protocolos y las aplicaciones deben tener en cuenta qué información están intentando proteger y qué información desean exponer."
+msgstr ""
+"Por supuesto, I2P anonimiza transparentemente los datos enviados entre "
+"Alice y Bob, pero no hace nada para anonimizar el contenido de lo que "
+"envían. Por ejemplo, si Alice envía a Bob un formulario con su nombre "
+"completo, ID del gobierno, y los números de sus tarjetas de crédito, no "
+"hay nada que I2P pueda hacer. Por eso, los protocolos y las aplicaciones "
+"deben tener en cuenta qué información están intentando proteger y qué "
+"información desean exponer."
#: i2p2www/pages/site/get-involved/develop/applications.html:176
msgid "I2P datagrams can be up to several KB"
@@ -1440,22 +2036,45 @@ msgstr "Los datagramas I2P pueden ser hasta de varios KB"
#: i2p2www/pages/site/get-involved/develop/applications.html:178
#, python-format
msgid ""
-"Applications that use I2P datagrams (either raw or repliable ones) can essentially be thought\n"
-"of in terms of UDP - the datagrams are unordered, best effort, and connectionless - but unlike\n"
-"UDP, applications don't need to worry about MTU detection and can simply fire off large datagrams.\n"
-"While the upper limit is nominally 32 KB, the message is fragmented for transport, thus dropping\n"
-"the reliability of the whole. Datagrams over about 10 KB are not currently recommended.\n"
+"Applications that use I2P datagrams (either raw or repliable ones) can "
+"essentially be thought\n"
+"of in terms of UDP - the datagrams are unordered, best effort, and "
+"connectionless - but unlike\n"
+"UDP, applications don't need to worry about MTU detection and can simply "
+"fire off large datagrams.\n"
+"While the upper limit is nominally 32 KB, the message is fragmented for "
+"transport, thus dropping\n"
+"the reliability of the whole. Datagrams over about 10 KB are not "
+"currently recommended.\n"
"See the datagram page for details.\n"
"For many applications, 10 KB of data is sufficient for an\n"
-"entire request or response, allowing them to transparently operate in I2P as a UDP-like \n"
+"entire request or response, allowing them to transparently operate in I2P"
+" as a UDP-like \n"
"application without having to write fragmentation, resends, etc."
-msgstr "Las aplicaciones que usan datagramas I2P (ya sean en bruto o respondibles) pueden entenderse en términos de UDP - los datagramas no están ordenados, mejor esfuerzo, y sin-conexión - pero al contrario que UDP, las aplicaciones no tienen que preocuparse de la detección MTU y pueden simplemente enviar datagramas grandes. Cuando normalmente el límite superior es de 32 KB, el mensaje es troceado para el transporte, bajando la confiabilidad del todo. No se recomiendan datagramas de más de 10 KB. Ve la página de los datagramas para más detalles. Para muchas aplicaciones, esos 10 KB de datos es suficiente para una petición o respuesta completa, permitiendoles operar transparentemente en I2P como una aplicación tipo UDP si tener que crear fragmentaciones, re-eenvíos, etc."
+msgstr ""
+"Las aplicaciones que usan datagramas I2P (ya sean en bruto o "
+"respondibles) pueden entenderse en términos de UDP - los datagramas no "
+"están ordenados, mejor esfuerzo, y sin-conexión - pero al contrario que "
+"UDP, las aplicaciones no tienen que preocuparse de la detección MTU y "
+"pueden simplemente enviar datagramas grandes. Cuando normalmente el "
+"límite superior es de 32 KB, el mensaje es troceado para el transporte, "
+"bajando la confiabilidad del todo. No se recomiendan datagramas de más de"
+" 10 KB. Ve la página de los datagramas para"
+" más detalles. Para muchas aplicaciones, esos 10 KB de datos es "
+"suficiente para una petición o respuesta completa, permitiendoles operar "
+"transparentemente en I2P como una aplicación tipo UDP si tener que crear "
+"fragmentaciones, re-eenvíos, etc."
#: i2p2www/pages/site/get-involved/develop/applications.html:192
msgid ""
-"There are several means of sending data over I2P, each with their own pros and cons.\n"
-"The streaming lib is the recommended interface, used by the majority of I2P applications."
-msgstr "Hay varias formas de enviar datos sobre I2P, cada una con sus ventajas e inconvenientes. La librería de streaming es el interfaz recomendado, usado por la mayoría de las aplicaciones de I2P."
+"There are several means of sending data over I2P, each with their own "
+"pros and cons.\n"
+"The streaming lib is the recommended interface, used by the majority of "
+"I2P applications."
+msgstr ""
+"Hay varias formas de enviar datos sobre I2P, cada una con sus ventajas e "
+"inconvenientes. La librería de streaming es el interfaz recomendado, "
+"usado por la mayoría de las aplicaciones de I2P."
#: i2p2www/pages/site/get-involved/develop/applications.html:197
msgid "Streaming Lib"
@@ -1464,21 +2083,39 @@ msgstr "Librería Streaming"
#: i2p2www/pages/site/get-involved/develop/applications.html:198
#, python-format
msgid ""
-"The full streaming library is now the standard\n"
-"interface. It allows programming using TCP-like sockets, as explained in the Streaming development guide."
-msgstr "La librería de streaming completa es ahora mismo el interfaz estándar. Permite programar usando sockets al estilo TCP, como se explica en la guía de desarrollo de Streaming."
+"The full streaming library is now the "
+"standard\n"
+"interface. It allows programming using TCP-like sockets, as explained in "
+"the Streaming development guide."
+msgstr ""
+"La librería de streaming completa es ahora "
+"mismo el interfaz estándar. Permite programar usando sockets al estilo "
+"TCP, como se explica en la guía de "
+"desarrollo de Streaming."
#: i2p2www/pages/site/get-involved/develop/applications.html:204
#, python-format
msgid ""
"BOB is the Basic Open Bridge,\n"
"allowing an application in any language to make streaming connections \n"
-"to and from I2P. At this point in time it lacks UDP support, but UDP support\n"
+"to and from I2P. At this point in time it lacks UDP support, but UDP "
+"support\n"
"is planned in the near future. BOB also contains several tools, such as \n"
-"destination key generation, and verification that an address conforms to \n"
-"I2P specifications. Up to date info and applications that use BOB can be \n"
+"destination key generation, and verification that an address conforms to"
+" \n"
+"I2P specifications. Up to date info and applications that use BOB can be"
+" \n"
"found at this eepsite."
-msgstr "BOB es el Basic Open Bridge, puente básico abierto/libre, permite a cualquier aplicación en cualquier lenguaje hacer conexiones de streaming hacia y desde I2P. En este momento aún le falta el soporte UDP, pero el soporte UDP está planeado para un futuro cercano. BOB además contiene varias herramientas, como el generar claves de destino, y el verificar que una dirección se ajusta a las especificaciones de I2P. Información actualizada y una lista de aplicaciones que usan BOB pueden encontrarse en esta eepsite."
+msgstr ""
+"BOB es el Basic Open Bridge, puente básico "
+"abierto/libre, permite a cualquier aplicación en cualquier lenguaje "
+"hacer conexiones de streaming hacia y desde I2P. En este momento aún le "
+"falta el soporte UDP, pero el soporte UDP está planeado para un futuro "
+"cercano. BOB además contiene varias herramientas, como el generar claves "
+"de destino, y el verificar que una dirección se ajusta a las "
+"especificaciones de I2P. Información actualizada y una lista de "
+"aplicaciones que usan BOB pueden encontrarse en esta eepsite."
#: i2p2www/pages/site/get-involved/develop/applications.html:217
msgid "SAM is not recommended. SAM V2 is okay, SAM V3 is recommended."
@@ -1487,38 +2124,67 @@ msgstr "No se recomienda SAM, SAM v2 vale, pero se recomienda SAM v3"
#: i2p2www/pages/site/get-involved/develop/applications.html:218
#, python-format
msgid ""
-"SAM is the Simple Anonymous Messaging protocol, allowing an\n"
-"application written in any language to talk to a SAM bridge through a plain TCP socket and have\n"
-"that bridge multiplex all of its I2P traffic, transparently coordinating the encryption/decryption\n"
+"SAM is the Simple Anonymous Messaging protocol, "
+"allowing an\n"
+"application written in any language to talk to a SAM bridge through a "
+"plain TCP socket and have\n"
+"that bridge multiplex all of its I2P traffic, transparently coordinating "
+"the encryption/decryption\n"
"and event based handling. SAM supports three styles of operation:"
-msgstr "SAM es el protocolo de Simple Anonymous Messaging, mensajería anónima simple, que permite a una aplicación escrita en cualquier lenguaje entenderse con el puente SAM a través de sockets TCP y en donde ese puente multiplexa todo su tráfico I2P, coordinando el cifrado/descifrado transparentemente y el manejo de los eventos. SAM soporta tres tipos de operaciones:"
+msgstr ""
+"SAM es el protocolo de Simple Anonymous Messaging, "
+"mensajería anónima simple, que permite a una aplicación escrita en "
+"cualquier lenguaje entenderse con el puente SAM a través de sockets TCP y"
+" en donde ese puente multiplexa todo su tráfico I2P, coordinando el "
+"cifrado/descifrado transparentemente y el manejo de los eventos. SAM "
+"soporta tres tipos de operaciones:"
#: i2p2www/pages/site/get-involved/develop/applications.html:225
msgid ""
-"streams, for when Alice and Bob want to send data to each other reliably and"
-" in order"
-msgstr "streams, para cuando Alice y Bob quieren enviar datos de uno a otro seguramente y en orden"
+"streams, for when Alice and Bob want to send data to each other reliably "
+"and in order"
+msgstr ""
+"streams, para cuando Alice y Bob quieren enviar datos de uno a otro "
+"seguramente y en orden"
#: i2p2www/pages/site/get-involved/develop/applications.html:228
msgid ""
-"repliable datagrams, for when Alice wants to send Bob a message that Bob can"
-" reply to"
-msgstr "datagramas respondibles, para cuando Alice quiere enviar a Bob un mensaje al que Bob puede responder."
+"repliable datagrams, for when Alice wants to send Bob a message that Bob "
+"can reply to"
+msgstr ""
+"datagramas respondibles, para cuando Alice quiere enviar a Bob un mensaje"
+" al que Bob puede responder."
#: i2p2www/pages/site/get-involved/develop/applications.html:231
msgid ""
-"raw datagrams, for when Alice wants to squeeze the most bandwidth and performance as possible,\n"
-"and Bob doesn't care whether the data's sender is authenticated or not (e.g. the data transferred\n"
+"raw datagrams, for when Alice wants to squeeze the most bandwidth and "
+"performance as possible,\n"
+"and Bob doesn't care whether the data's sender is authenticated or not "
+"(e.g. the data transferred\n"
"is self authenticating)"
-msgstr "datagramas en bruto, para cuando Alice quiere ahorrar el máximo ancho de banda y obtener el mejor rendimiento, y a Bob no le importa si la información del remitente está autentificada o no (por ejemplo cuando los datos transferidos ya son auto autentificables)"
+msgstr ""
+"datagramas en bruto, para cuando Alice quiere ahorrar el máximo ancho de "
+"banda y obtener el mejor rendimiento, y a Bob no le importa si la "
+"información del remitente está autentificada o no (por ejemplo cuando los"
+" datos transferidos ya son auto autentificables)"
#: i2p2www/pages/site/get-involved/develop/applications.html:237
msgid ""
"SAM V3 aims at the same goal as SAM and SAM V2, but does not require\n"
-"multiplexing/demultiplexing. Each I2P stream is handled by its own socket between the application\n"
-"and the SAM bridge. Besides, datagrams can be sent and received by the application through datagram\n"
+"multiplexing/demultiplexing. Each I2P stream is handled by its own socket"
+" between the application\n"
+"and the SAM bridge. Besides, datagrams can be sent and received by the "
+"application through datagram\n"
"communications with the SAM bridge."
-msgstr "SAM V3 apunta hacia la misma meta que SAM y SAM V2, pero no requiere \nmultiplexado/demultiplexado. Cada flujo (`stream`) I2P es gestionado por su propio socket \nentre la aplicación y la pasarela (`bridge`) SAM. Además, pueden ser enviados y \nrecibidos datagramas mediante la aplicación a través de comunicaciones de datagrama con\nla pasarela SAM."
+msgstr ""
+"SAM V3 apunta hacia la misma meta que SAM y SAM V2, pero no requiere \n"
+"multiplexado/demultiplexado. Cada flujo (`stream`) I2P es gestionado por "
+"su propio socket \n"
+"entre la aplicación y la pasarela (`bridge`) SAM. Además, pueden ser "
+"enviados y \n"
+"recibidos datagramas mediante la aplicación a través de comunicaciones de"
+" datagrama con\n"
+"la pasarela SAM."
#: i2p2www/pages/site/get-involved/develop/applications.html:244
#, python-format
@@ -1527,26 +2193,60 @@ msgid ""
"that fixes some of the problems in SAM.\n"
"
\n"
"SAM V3 is used by imule since version 1.4.0."
-msgstr "SAM V2 es una nueva versión usada por imule que\nresuelve alguno de los problemas en SAM.\n
\nSAM V3 es usado desde la versión 1.4.0 de imule."
+msgstr ""
+"SAM V2 es una nueva versión usada por imule que"
+"\n"
+"resuelve alguno de los problemas en SAM.\n"
+"
\n"
+"SAM V3 es usado desde la versión 1.4.0 de imule."
#: i2p2www/pages/site/get-involved/develop/applications.html:252
msgid ""
-"The I2PTunnel application allows applications to build specific TCP-like tunnels to peers \n"
-"by creating either I2PTunnel 'client' applications (which listen on a specific port and connect\n"
-"to a specific I2P destination whenever a socket to that port is opened) or I2PTunnel 'server'\n"
-"applications (which listen to a specific I2P destination and whenever it gets a new I2P \n"
-"connection it outproxies to a specific TCP host/port). These streams are 8-bit clean, and are\n"
-"authenticated and secured through the same streaming library that SAM uses, but there is a \n"
-"nontrivial overhead involved with creating multiple unique I2PTunnel instances, since each have\n"
+"The I2PTunnel application allows applications to build specific TCP-like "
+"tunnels to peers \n"
+"by creating either I2PTunnel 'client' applications (which listen on a "
+"specific port and connect\n"
+"to a specific I2P destination whenever a socket to that port is opened) "
+"or I2PTunnel 'server'\n"
+"applications (which listen to a specific I2P destination and whenever it "
+"gets a new I2P \n"
+"connection it outproxies to a specific TCP host/port). These streams are"
+" 8-bit clean, and are\n"
+"authenticated and secured through the same streaming library that SAM "
+"uses, but there is a \n"
+"nontrivial overhead involved with creating multiple unique I2PTunnel "
+"instances, since each have\n"
"their own unique I2P destination and their own set of tunnels, keys, etc."
-msgstr "La aplicación I2PTunnel permite a otras aplicaciones establecer túneles específicos\ntipo-TCP hacia los pares ('peers'), creando tanto aplicaciones I2PTunnel 'cliente' (que escuchan\nen un puerto específico y se conectan a un destino I2P específico cuando un socket\nhacia ese puerto se abre) como aplicaciones I2PTunnel 'servidor' (que escuchan un destino\nI2P específico y cuando reciben una nueva conexión I2P se interponen repitiéndola\nhacia un anfitrión('host')/puerto específico). Estos flujos ('streams') son puros de 8-bits\n('8-bit clean') y son autentificados y asegurados a través de la misma librería que usa SAM,\npero crear múltiples instancias I2PTunnel únicas reviste una sobrecarga no trivial, ya que\ncada una tiene su propio destino único I2P y su propio grupo de túneles, claves, etc."
+msgstr ""
+"La aplicación I2PTunnel permite a otras aplicaciones establecer túneles "
+"específicos\n"
+"tipo-TCP hacia los pares ('peers'), creando tanto aplicaciones I2PTunnel "
+"'cliente' (que escuchan\n"
+"en un puerto específico y se conectan a un destino I2P específico cuando "
+"un socket\n"
+"hacia ese puerto se abre) como aplicaciones I2PTunnel 'servidor' (que "
+"escuchan un destino\n"
+"I2P específico y cuando reciben una nueva conexión I2P se interponen "
+"repitiéndola\n"
+"hacia un anfitrión('host')/puerto específico). Estos flujos ('streams') "
+"son puros de 8-bits\n"
+"('8-bit clean') y son autentificados y asegurados a través de la misma "
+"librería que usa SAM,\n"
+"pero crear múltiples instancias I2PTunnel únicas reviste una sobrecarga "
+"no trivial, ya que\n"
+"cada una tiene su propio destino único I2P y su propio grupo de túneles, "
+"claves, etc."
#: i2p2www/pages/site/get-involved/develop/applications.html:264
msgid ""
"I2P supports a SOCKS V4 and V5 proxy.\n"
-"Outbound connections work well. Inbound (server) and UDP functionality may be incomplete\n"
+"Outbound connections work well. Inbound (server) and UDP functionality "
+"may be incomplete\n"
"and untested."
-msgstr "I2P soporta un proxy SOCKS V4 y V5.\nLas conexiones salientes funcionan bien. La funcionalidad de las\nconexiones entrantes (servidor) y UDP puede ser incompleta y no testada."
+msgstr ""
+"I2P soporta un proxy SOCKS V4 y V5.\n"
+"Las conexiones salientes funcionan bien. La funcionalidad de las\n"
+"conexiones entrantes (servidor) y UDP puede ser incompleta y no testada."
#: i2p2www/pages/site/get-involved/develop/applications.html:271
msgid "Removed"
@@ -1555,8 +2255,12 @@ msgstr "Eliminado"
#: i2p2www/pages/site/get-involved/develop/applications.html:272
msgid ""
"There used to be a simple \"ministreaming\" library,\n"
-"but now ministreaming.jar contains only the interfaces for the full streaming library."
-msgstr "Suele haber una librería sencilla \"ministreaming\", pero ministreaming.jar\nahora contiene sólo las interfaces para la librería streaming completa."
+"but now ministreaming.jar contains only the interfaces for the full "
+"streaming library."
+msgstr ""
+"Suele haber una librería sencilla \"ministreaming\", pero "
+"ministreaming.jar\n"
+"ahora contiene sólo las interfaces para la librería streaming completa."
#: i2p2www/pages/site/get-involved/develop/applications.html:277
msgid "Datagrams"
@@ -1569,9 +2273,13 @@ msgstr "Recomendado para aplicaciones tipo-UDP"
#: i2p2www/pages/site/get-involved/develop/applications.html:279
#, python-format
msgid ""
-"The Datagram library allows sending UDP-like packets.\n"
+"The Datagram library allows sending UDP-"
+"like packets.\n"
"It's possible to use:"
-msgstr "La librería Datagram permite enviar paquetes tipo-UDP.\nEs posible usar:"
+msgstr ""
+"La librería Datagram permite enviar "
+"paquetes tipo-UDP.\n"
+"Es posible usar:"
#: i2p2www/pages/site/get-involved/develop/applications.html:284
msgid "Repliable datagrams"
@@ -1588,11 +2296,24 @@ msgstr "No recomendado"
#: i2p2www/pages/site/get-involved/develop/applications.html:290
#, python-format
msgid ""
-"I2CP itself is a language independent protocol, but to implement an I2CP library \n"
-"in something other than Java there is a significant amount of code to be written (encryption routines, \n"
-"object marshalling, asynchronous message handling, etc). While someone could write an I2CP library in \n"
-"C or something else, it would most likely be more useful to use the C SAM library instead."
-msgstr "I2CP en si mismo es un protocolo independiente del lenguaje, pero para implementar\nuna librería I2CP en cualquier otra cosa que no sea Java hay una cantidad de código significativa a escribir\n(rutinas de cifrado, serialización ('marshalling') de objetos, gestión de mensajes asíncronos, etc.). Aunque\ncualquiera pueda escribir una librería I2CP en C o algún otro lenguaje, probablemente sería más útil usar\nla librería C SAM en su lugar."
+"I2CP itself is a language independent protocol, "
+"but to implement an I2CP library \n"
+"in something other than Java there is a significant amount of code to be "
+"written (encryption routines, \n"
+"object marshalling, asynchronous message handling, etc). While someone "
+"could write an I2CP library in \n"
+"C or something else, it would most likely be more useful to use the C SAM"
+" library instead."
+msgstr ""
+"I2CP en si mismo es un protocolo independiente "
+"del lenguaje, pero para implementar\n"
+"una librería I2CP en cualquier otra cosa que no sea Java hay una cantidad"
+" de código significativa a escribir\n"
+"(rutinas de cifrado, serialización ('marshalling') de objetos, gestión de"
+" mensajes asíncronos, etc.). Aunque\n"
+"cualquiera pueda escribir una librería I2CP en C o algún otro lenguaje, "
+"probablemente sería más útil usar\n"
+"la librería C SAM en su lugar."
#: i2p2www/pages/site/get-involved/develop/applications.html:297
msgid "Web Applications"
@@ -1600,16 +2321,28 @@ msgstr "Aplicaciones web"
#: i2p2www/pages/site/get-involved/develop/applications.html:298
msgid ""
-"I2P comes with the Jetty webserver, and configuring to use the Apache server instead is straightforward.\n"
+"I2P comes with the Jetty webserver, and configuring to use the Apache "
+"server instead is straightforward.\n"
"Any standard web app technology should work."
-msgstr "I2P viene con el servidor web Jetty, pero configurar el servidor Apache para usarlo en su lugar también es apropiado.\nCualquier tecnología de aplicaciones web estandar debería funcionar."
+msgstr ""
+"I2P viene con el servidor web Jetty, pero configurar el servidor Apache "
+"para usarlo en su lugar también es apropiado.\n"
+"Cualquier tecnología de aplicaciones web estandar debería funcionar."
#: i2p2www/pages/site/get-involved/develop/applications.html:304
msgid ""
-"Developing using I2P requires a working I2P installation and a development environment of your own choice.\n"
-"If you are using Java, you can start development with the streaming library or datagram library.\n"
+"Developing using I2P requires a working I2P installation and a "
+"development environment of your own choice.\n"
+"If you are using Java, you can start development with the streaming library or datagram library.\n"
"Using another programming language, SAM or BOB can be used."
-msgstr "Desarrollar usando I2P requiere una instalación I2P funcional y un entorno de desarrollo de su\npropia elección. Si esta usando Java puede iniciar el desarrollo con la librería streaming\no la librería datagram. Usando otro lenguaje de programación, se puede\nusar SAM o BOB."
+msgstr ""
+"Desarrollar usando I2P requiere una instalación I2P funcional y un "
+"entorno de desarrollo de su\n"
+"propia elección. Si esta usando Java puede iniciar el desarrollo con la "
+"librería streaming\n"
+"o la librería datagram. Usando otro lenguaje de programación, se puede\n"
+"usar SAM o BOB."
#: i2p2www/pages/site/get-involved/develop/applications.html:310
msgid "Developing with the streaming library"
@@ -1617,13 +2350,19 @@ msgstr "Desarrollo con la librería streaming"
#: i2p2www/pages/site/get-involved/develop/applications.html:312
msgid ""
-"The following example shows how to create TCP-like client and server applications\n"
+"The following example shows how to create TCP-like client and server "
+"applications\n"
"using the streaming library."
-msgstr "El siguiente ejemplo muestra como crear aplicaciones cliente y servidor tipo-TCP\nusando la librería streaming."
+msgstr ""
+"El siguiente ejemplo muestra como crear aplicaciones cliente y servidor "
+"tipo-TCP\n"
+"usando la librería streaming."
#: i2p2www/pages/site/get-involved/develop/applications.html:317
msgid "This will require the following libraries in your classpath:"
-msgstr "Esto requerirá las siguientes librerías en su ruta de clases ('classpath'):"
+msgstr ""
+"Esto requerirá las siguientes librerías en su ruta de clases "
+"('classpath'):"
#: i2p2www/pages/site/get-involved/develop/applications.html:321
msgid "The streaming library itself"
@@ -1640,19 +2379,42 @@ msgstr "Clases I2P estandar, estructuras de datos, API y utilidades."
#: i2p2www/pages/site/get-involved/develop/applications.html:326
msgid ""
"Network communication requires the usage of I2P network sockets.\n"
-"To demonstrate this, we will create an application where a client can send text messages to a server,\n"
-"who will print the messages and send them back to the client. In other words, the server will function as an echo."
-msgstr "La comunicación de red requiere el uso de sockets de red I2P.\nPara demostrar esto, crearemos una aplicación donde un cliente pueda enviar mensajes de texto a un servidor,\nque imprimirá los mensajes y los enviará de vuelta al cliente. En otras palabras, el servidor funcionará como un eco."
+"To demonstrate this, we will create an application where a client can "
+"send text messages to a server,\n"
+"who will print the messages and send them back to the client. In other "
+"words, the server will function as an echo."
+msgstr ""
+"La comunicación de red requiere el uso de sockets de red I2P.\n"
+"Para demostrar esto, crearemos una aplicación donde un cliente pueda "
+"enviar mensajes de texto a un servidor,\n"
+"que imprimirá los mensajes y los enviará de vuelta al cliente. En otras "
+"palabras, el servidor funcionará como un eco."
#: i2p2www/pages/site/get-involved/develop/applications.html:331
msgid ""
-"We will start by initializing the server application. This requires getting an I2PSocketManager\n"
+"We will start by initializing the server application. This requires "
+"getting an I2PSocketManager\n"
"and creating an I2PServerSocket.\n"
-"We will not provide the I2PSocketManagerFactory with the saved keys for an existing Destination,\n"
+"We will not provide the I2PSocketManagerFactory with the saved keys for "
+"an existing Destination,\n"
"so it will create a new Destination for us.\n"
-"So we will ask the I2PSocketManager for an I2PSession, so we can find out the Destination that\n"
-"was created, as we will need to copy and paste that information later so the client can connect to us."
-msgstr "Comenzaremos por inicializar la aplicación servidor. Esto requiere obtener un gestor de socket I2P\n('I2PSocketManager') y crear un socket de servidor I2P ('I2PServerSocket').\nNo proporcionaremos el patrón I2PSocketManagerFactory con las claves guardadas para un\nDestino existente, por lo que creará un nuevo Destino para nosotros.\nAsí que pediremos al gestor de socket I2P ('I2PSocketManager') una sesión I2P ('I2PSession'), para\nque podamos averiguar el Destino que fue creado, ya que necesitaremos copiar y pegar esa información\nmás adelante para que el cliente pueda conectarse con nosotros."
+"So we will ask the I2PSocketManager for an I2PSession, so we can find out"
+" the Destination that\n"
+"was created, as we will need to copy and paste that information later so "
+"the client can connect to us."
+msgstr ""
+"Comenzaremos por inicializar la aplicación servidor. Esto requiere "
+"obtener un gestor de socket I2P\n"
+"('I2PSocketManager') y crear un socket de servidor I2P "
+"('I2PServerSocket').\n"
+"No proporcionaremos el patrón I2PSocketManagerFactory con las claves "
+"guardadas para un\n"
+"Destino existente, por lo que creará un nuevo Destino para nosotros.\n"
+"Así que pediremos al gestor de socket I2P ('I2PSocketManager') una sesión"
+" I2P ('I2PSession'), para\n"
+"que podamos averiguar el Destino que fue creado, ya que necesitaremos "
+"copiar y pegar esa información\n"
+"más adelante para que el cliente pueda conectarse con nosotros."
#: i2p2www/pages/site/get-involved/develop/applications.html:362
msgid "Code example 1: initializing the server application."
@@ -1660,54 +2422,106 @@ msgstr "Ejemplo de código 1: inicialización de la aplicación servidor."
#: i2p2www/pages/site/get-involved/develop/applications.html:364
msgid ""
-"Once we have an I2PServerSocket, we can create I2PSocket instances to accept connections from clients.\n"
-"In this example, we will create a single I2PSocket instance, that can only handle one client at a time.\n"
+"Once we have an I2PServerSocket, we can create I2PSocket instances to "
+"accept connections from clients.\n"
+"In this example, we will create a single I2PSocket instance, that can "
+"only handle one client at a time.\n"
"A real server would have to be able to handle multiple clients.\n"
-"To do this, multiple I2PSocket instances would have to be created, each in separate threads.\n"
-"Once we have created the I2PSocket instance, we read data, print it and send it back to the client.\n"
+"To do this, multiple I2PSocket instances would have to be created, each "
+"in separate threads.\n"
+"Once we have created the I2PSocket instance, we read data, print it and "
+"send it back to the client.\n"
"The bold code is the new code we add."
-msgstr "Una vez que tengamos un socket de servidor I2P ('I2PServerSocket'), podemos crear instancias\nde socket I2P ('I2PSocket') para aceptar conexiones desde los clientes. En este ejemplo crearemos\nuna única instancia I2PSocket, que sólo puede gestionar un cliente cada vez.\nUn servidor real tendría que ser capaz de gestionar múltiples clientes.\nPara hacer esto, múltiples instancias I2PSocket tendrían que ser creadas, en hilos separados cada una.\nUna vez hayamos creado la instancia I2PSocket, leemos los datos y los imprimimos y enviamos de vuelta al cliente.\nEl código en negrita es el código nuevo que añadimos."
+msgstr ""
+"Una vez que tengamos un socket de servidor I2P ('I2PServerSocket'), "
+"podemos crear instancias\n"
+"de socket I2P ('I2PSocket') para aceptar conexiones desde los clientes. "
+"En este ejemplo crearemos\n"
+"una única instancia I2PSocket, que sólo puede gestionar un cliente cada "
+"vez.\n"
+"Un servidor real tendría que ser capaz de gestionar múltiples clientes.\n"
+"Para hacer esto, múltiples instancias I2PSocket tendrían que ser creadas,"
+" en hilos separados cada una.\n"
+"Una vez hayamos creado la instancia I2PSocket, leemos los datos y los "
+"imprimimos y enviamos de vuelta al cliente.\n"
+"El código en negrita es el código nuevo que añadimos."
#: i2p2www/pages/site/get-involved/develop/applications.html:448
-msgid ""
-"Code example 2: accepting connections from clients and handling messages."
-msgstr "Ejemplo de código 2: aceptar conexiones desde clientes y gestionar mensajes."
+msgid "Code example 2: accepting connections from clients and handling messages."
+msgstr ""
+"Ejemplo de código 2: aceptar conexiones desde clientes y gestionar "
+"mensajes."
#: i2p2www/pages/site/get-involved/develop/applications.html:452
msgid ""
-"When you run the above server code, it should print something like this (but without the line endings, it should just be\n"
+"When you run the above server code, it should print something like this "
+"(but without the line endings, it should just be\n"
"one huge block of characters):"
-msgstr "Cuando ejecute el código servidor de arriba, debería imprimir algo como esto (pero sin los finales de línea,\ndebería ser sólo un enorme bloque de caracteres):"
+msgstr ""
+"Cuando ejecute el código servidor de arriba, debería imprimir algo como "
+"esto (pero sin los finales de línea,\n"
+"debería ser sólo un enorme bloque de caracteres):"
#: i2p2www/pages/site/get-involved/develop/applications.html:466
msgid ""
-"This is the base64-representation of the server Destination. The client will"
-" need this string to reach the server."
-msgstr "Esta es la representación-base64 del servidor Destino. El cliente necesitará esta cadena para alcanzar el servidor."
+"This is the base64-representation of the server Destination. The client "
+"will need this string to reach the server."
+msgstr ""
+"Esta es la representación-base64 del servidor Destino. El cliente "
+"necesitará esta cadena para alcanzar el servidor."
#: i2p2www/pages/site/get-involved/develop/applications.html:470
msgid ""
-"Now, we will create the client application. Again, a number of steps are required for initialization.\n"
+"Now, we will create the client application. Again, a number of steps are "
+"required for initialization.\n"
"Again, we will need to start by getting an I2PSocketManager.\n"
"We won't use an I2PSession and an I2PServerSocket this time.\n"
-"Instead, we will use the server Destination string to start our connection.\n"
-"We will ask the user for the Destination string, and create an I2PSocket using this string.\n"
-"Once we have an I2PSocket, we can start sending and receiving data to and from the server."
-msgstr "Ahora crearemos la aplicación cliente. Otra vez se requiere un determinado número de pasos para la inicialización.\nDe nuevo, necesitaremos comenzar obteniendo un gestor de socket I2P ('I2PSocketManager').\nNo usaremos una sesión I2P ('I2PSession') ni un socket de servidor I2P ('I2PServerSocket') esta vez.\nEn su lugar usaremos la cadena del servidor Destino para iniciar nuestra conexión.\nPreguntaremos al usuario por la cadena Destino, y crearemos un socket I2P ('I2PSocket') usando esta cadena.\nUna vez que tengamos el I2PSocket podemos comenzar a enviar y recibir datos hacia y desde el servidor."
+"Instead, we will use the server Destination string to start our "
+"connection.\n"
+"We will ask the user for the Destination string, and create an I2PSocket "
+"using this string.\n"
+"Once we have an I2PSocket, we can start sending and receiving data to and"
+" from the server."
+msgstr ""
+"Ahora crearemos la aplicación cliente. Otra vez se requiere un "
+"determinado número de pasos para la inicialización.\n"
+"De nuevo, necesitaremos comenzar obteniendo un gestor de socket I2P "
+"('I2PSocketManager').\n"
+"No usaremos una sesión I2P ('I2PSession') ni un socket de servidor I2P "
+"('I2PServerSocket') esta vez.\n"
+"En su lugar usaremos la cadena del servidor Destino para iniciar nuestra "
+"conexión.\n"
+"Preguntaremos al usuario por la cadena Destino, y crearemos un socket I2P"
+" ('I2PSocket') usando esta cadena.\n"
+"Una vez que tengamos el I2PSocket podemos comenzar a enviar y recibir "
+"datos hacia y desde el servidor."
#: i2p2www/pages/site/get-involved/develop/applications.html:554
msgid ""
"Code example 3: starting the client and connecting it to the server "
"application."
-msgstr "Ejemplo de código 3: iniciar el cliente y conectarlo a la aplicación servidor."
+msgstr ""
+"Ejemplo de código 3: iniciar el cliente y conectarlo a la aplicación "
+"servidor."
#: i2p2www/pages/site/get-involved/develop/applications.html:556
msgid ""
"Finally, you can run both the server and the client application.\n"
-"First, start the server application. It will print a Destination string (like shown above).\n"
-"Next, start the client application. When it requests a Destination string, you can enter the string printed by the server.\n"
-"The client will then send 'Hello I2P!' (along with a newline) to the server, who will print the message and send it back to the client."
-msgstr "Finalmente puede ejecutar ambas aplicaciones cliente y servidor.\nPrimero, inicie la aplicación servidor. Imprimirá una cadena Destino (como la mostrada arriba).\nDespués inicie la aplicación cliente. Cuando esta solicite una cadena Destino, puede introducir la cadena impresa por el servidor.\nEntonces el cliente enviará 'Hello I2P!' (junto con un caracter de nueva línea ('newline')) al servidor, que imprimirá el mensaje\ny lo enviará de vuelta al cliente."
+"First, start the server application. It will print a Destination string "
+"(like shown above).\n"
+"Next, start the client application. When it requests a Destination "
+"string, you can enter the string printed by the server.\n"
+"The client will then send 'Hello I2P!' (along with a newline) to the "
+"server, who will print the message and send it back to the client."
+msgstr ""
+"Finalmente puede ejecutar ambas aplicaciones cliente y servidor.\n"
+"Primero, inicie la aplicación servidor. Imprimirá una cadena Destino "
+"(como la mostrada arriba).\n"
+"Después inicie la aplicación cliente. Cuando esta solicite una cadena "
+"Destino, puede introducir la cadena impresa por el servidor.\n"
+"Entonces el cliente enviará 'Hello I2P!' (junto con un caracter de nueva "
+"línea ('newline')) al servidor, que imprimirá el mensaje\n"
+"y lo enviará de vuelta al cliente."
#: i2p2www/pages/site/get-involved/develop/applications.html:562
msgid "Congratulations, you have successfully communicated over I2P!"
@@ -1731,9 +2545,11 @@ msgstr "Servidor NNTP - ha habido algunos en el pasado, ninguno en este momento"
#: i2p2www/pages/site/get-involved/develop/applications.html:593
msgid ""
-"Jabber server - there have been some in the past, and there is one at the "
-"moment, with access to the public internet"
-msgstr "Servidor Jabber - ha habido algunos en el pasado, y hay uno en este momento con acceso a la Internet pública"
+"Jabber server - there have been some in the past, and there is one at the"
+" moment, with access to the public internet"
+msgstr ""
+"Servidor Jabber - ha habido algunos en el pasado, y hay uno en este "
+"momento con acceso a la Internet pública"
#: i2p2www/pages/site/get-involved/develop/applications.html:596
msgid "PGP Key server and/or proxy"
@@ -1743,7 +2559,9 @@ msgstr "Servidor de claves PGP y/o proxy"
msgid ""
"Content Distribution / DHT applications - resurrect feedspace,\n"
"port dijjer, look for alternatives"
-msgstr "Distribución de contenidos / Aplicaciones DHT - resucite Feedspace,\nporte Dijjer, busque alternativas"
+msgstr ""
+"Distribución de contenidos / Aplicaciones DHT - resucite Feedspace,\n"
+"porte Dijjer, busque alternativas"
#: i2p2www/pages/site/get-involved/develop/applications.html:603
msgid "Help out with Syndie development"
@@ -1751,16 +2569,25 @@ msgstr "Contribuya al desarrollo de SyndieCommit Keys to sign changes checked-in to the "
"respository; and"
-msgstr "Claves de consignación ('commit') para firmar cambios registrados en el repositorio; y"
+msgstr ""
+"Claves de consignación ('commit') para firmar "
+"cambios registrados en el repositorio; y"
#: i2p2www/pages/site/get-involved/develop/developers-keys.html:9
msgid ""
-"Transport Keys to push changes to remote servers."
-msgstr "Claves de transporte para impulsar cambios en servidores remotos."
+"Transport Keys to push changes to remote "
+"servers."
+msgstr ""
+"Claves de transporte para impulsar cambios en "
+"servidores remotos."
#: i2p2www/pages/site/get-involved/develop/developers-keys.html:12
#, python-format
msgid ""
"Everyone that uses Monotone to checkout the I2P codebase will need to\n"
-"import the\n"
-"developer commit keys, but only Monotone \n"
-"server operators will need to import the transport keys."
-msgstr "Cualquiera que use Monotone para revisar el código fuente de I2P\nnecesitará importar las claves de consignación ('commit') de\ndesarrollador, pero sólo los operadores de servidor Monotone\nnecesitarán importar las claves de transporte."
+"import the\n"
+"developer commit keys, but only Monotone \n"
+"server operators will need to import the transport keys."
+msgstr ""
+"Cualquiera que use Monotone para revisar el código fuente de I2P\n"
+"necesitará importar las claves de consignación ('commit') de\n"
+"desarrollador, pero sólo los operadores de servidor Monotone\n"
+"necesitarán importar las claves de transporte."
#: i2p2www/pages/site/get-involved/develop/developers-keys.html:19
msgid "Developer Commit keys"
@@ -1805,7 +2648,11 @@ msgstr "Claves de transporte de desarrollador"
msgid ""
"Note: Transport keys are only needed for setting up a\n"
"Monotone server."
-msgstr "Nota: Las claves de transporte sólo son necesarias para configurar\nun servidor Monotone."
+msgstr ""
+"Nota: Las claves de transporte sólo son necesarias para configurar"
+"\n"
+"un servidor "
+"Monotone."
#: i2p2www/pages/site/get-involved/develop/license-agreements.html:2
msgid "License Agreements"
@@ -1814,14 +2661,20 @@ msgstr "Acuerdos de licencia"
#: i2p2www/pages/site/get-involved/develop/license-agreements.html:5
#, python-format
msgid "For more information see the licenses page."
-msgstr "Para mayor información vea la página de licencias."
+msgstr ""
+"Para mayor información vea la página de "
+"licencias."
#: i2p2www/pages/site/get-involved/develop/license-agreements.html:8
msgid ""
"Following is a monotonerc file defining the current trust list.\n"
"Developers must use this file in ~/.monotone/monotonerc or\n"
"_MTN/montonerc in their i2p.i2p workspace."
-msgstr "A continuación está un archivo `monotonerc` que define el listado actual \nde confianza. Los desarrolladores deben usar este fichero en \n~/.monotone/monotonerc o _MTN/montonerc en sus espacio de trabajo i2p.i2p "
+msgstr ""
+"A continuación está un archivo `monotonerc` que define el listado actual"
+" \n"
+"de confianza. Los desarrolladores deben usar este fichero en \n"
+"~/.monotone/monotonerc o _MTN/montonerc en sus espacio de trabajo i2p.i2p "
#: i2p2www/pages/site/get-involved/develop/license-agreements.html:17
msgid "Agreements"
@@ -1842,14 +2695,30 @@ msgid ""
"a variety of legal and software engineering techniques so\n"
"as to remove as many barriers to entry for those considering\n"
"making use of or contributing to the I2P effort."
-msgstr "Como requiere nuestro modelo de amenaza \n(entre otras razones), el software\ndesarrollado para soportar la red de comunicación anónima que llamamos I2P, debe \nser accesible libremente, de código abierto, y modificable por el usuario. Para alcanzar \nestos criterios hacemos uso de una variedad de técnicas legales y de ingeniería \nde software, además eliminamos cuantas barreras de entrada haya para aquellos que\nconsideren hacer uso de, o contribuír al esfuerzo de I2P."
+msgstr ""
+"Como requiere nuestro modelo de amenaza \n"
+"(entre otras razones), el software\n"
+"desarrollado para soportar la red de comunicación anónima que llamamos "
+"I2P, debe \n"
+"ser accesible libremente, de código abierto, y modificable por el "
+"usuario. Para alcanzar \n"
+"estos criterios hacemos uso de una variedad de técnicas legales y de "
+"ingeniería \n"
+"de software, además eliminamos cuantas barreras de entrada haya para "
+"aquellos que\n"
+"consideren hacer uso de, o contribuír al esfuerzo de I2P."
#: i2p2www/pages/site/get-involved/develop/licenses.html:15
msgid ""
"While the information below may be more confusing than just simply \n"
"stating \"I2P is BSD\", \"I2P is GPL\", or \"I2P is public domain\",\n"
"the short answer to the question \"How is I2P licensed?\" is this:"
-msgstr "Aunque la información de debajo puede ser más bien confusa que sencilla, \nestableciendo que \"I2P es BSD\", \"I2P es GPL\", o \"I2P es dominio público\", \nla respuesta corta a la pregunta \"¿Cómo está licenciado I2P?\" es esta: "
+msgstr ""
+"Aunque la información de debajo puede ser más bien confusa que sencilla,"
+" \n"
+"estableciendo que \"I2P es BSD\", \"I2P es GPL\", o \"I2P es dominio "
+"público\", \n"
+"la respuesta corta a la pregunta \"¿Cómo está licenciado I2P?\" es esta: "
#: i2p2www/pages/site/get-involved/develop/licenses.html:21
msgid "All software bundled in the I2P distributions will allow:"
@@ -1861,8 +2730,12 @@ msgstr "uso libre de cargo"
#: i2p2www/pages/site/get-involved/develop/licenses.html:24
msgid ""
-"use with no restrictions on how, when, where, why, or by whom is running it"
-msgstr "uso sin restricciones acerca de cómo, cuándo, dónde, por qué o por quién \nse está ejecutando."
+"use with no restrictions on how, when, where, why, or by whom is running "
+"it"
+msgstr ""
+"uso sin restricciones acerca de cómo, cuándo, dónde, por qué o por quién"
+" \n"
+"se está ejecutando."
#: i2p2www/pages/site/get-involved/develop/licenses.html:25
msgid "access to the source code without fee"
@@ -1874,17 +2747,42 @@ msgstr "modificaciones del código fuente"
#: i2p2www/pages/site/get-involved/develop/licenses.html:29
msgid ""
-"Most of the software guarantees much more - the ability of anyone to \n"
-"distribute the modified source however they choose. However, not all of the \n"
-"software bundled provides this freedom - the GPL restricts the ability of \n"
-"developers who wish to integrate I2P with their own applications that are not \n"
-"themselves open source applications. While we applaud the noble goals of \n"
-"increasing the resources in the commons, I2P is best served by removing any\n"
-"barriers that stand in the way of its adoption - if a developer considering whether\n"
-"they can integrate I2P with their application has to stop and check with their lawyer,\n"
-"or conduct a code audit to make sure their own source can be released as GPL-compatible,\n"
+"Most of the software guarantees much more - the ability of anyone "
+"to \n"
+"distribute the modified source however they choose. However, not all of "
+"the \n"
+"software bundled provides this freedom - the GPL restricts the ability of"
+" \n"
+"developers who wish to integrate I2P with their own applications that are"
+" not \n"
+"themselves open source applications. While we applaud the noble goals of"
+" \n"
+"increasing the resources in the commons, I2P is best served by removing "
+"any\n"
+"barriers that stand in the way of its adoption - if a developer "
+"considering whether\n"
+"they can integrate I2P with their application has to stop and check with "
+"their lawyer,\n"
+"or conduct a code audit to make sure their own source can be released as "
+"GPL-compatible,\n"
"we lose out."
-msgstr "La mayoría del software garantiza expresamente - la capacidad \nde cualquiera de distribuír el código fuente modificado de la manera que escoja. Sin embargo no todos los paquetes de software otorgan esta libertad - la GPL restringe la capacidad de los desarrolladores que deseen integrar I2P en sus propias aplicaciones si estas mismas no son \naplicaciones de código abierto. Aunque aplaudimos las nobles metas de incrementar los recursos abiertos al público, se sirve mejor a I2P eliminando \ncualquier barrera que se encuentre en el camino de su adopción - si un desarrollador\nque considerando si puede o no integrar I2P con sus aplicaciones, tiene que parar \na hacer comprobaciones con su abogado o realizar una aditoría para asegurarse \nde que su propio código puede ser liberado de forma compatible-con-GPL, lo estamos haciendo mal."
+msgstr ""
+"La mayoría del software garantiza expresamente - la capacidad \n"
+"de cualquiera de distribuír el código fuente modificado de la "
+"manera que escoja. Sin embargo no todos los paquetes de software otorgan "
+"esta libertad - la GPL restringe la capacidad de los desarrolladores que "
+"deseen integrar I2P en sus propias aplicaciones si estas mismas no son \n"
+"aplicaciones de código abierto. Aunque aplaudimos las nobles metas de "
+"incrementar los recursos abiertos al público, se sirve mejor a I2P "
+"eliminando \n"
+"cualquier barrera que se encuentre en el camino de su adopción - si un "
+"desarrollador\n"
+"que considerando si puede o no integrar I2P con sus aplicaciones, tiene "
+"que parar \n"
+"a hacer comprobaciones con su abogado o realizar una aditoría para "
+"asegurarse \n"
+"de que su propio código puede ser liberado de forma compatible-con-GPL, "
+"lo estamos haciendo mal."
#: i2p2www/pages/site/get-involved/develop/licenses.html:42
msgid "Component licenses"
@@ -1892,15 +2790,40 @@ msgstr "Licencias de componentes"
#: i2p2www/pages/site/get-involved/develop/licenses.html:43
msgid ""
-"The I2P distribution contains several resources, reflecting the partitioning of \n"
-"the source code into components. Each component has its own license, which all \n"
-"developers who contribute to it agree to - either by explicitly declaring the release\n"
-"of code committed under a license compatible with that component, or by implicitly\n"
-"releasing the code committed under the component's primary license. Each of these \n"
-"components has a lead developer who has the final say as to what license is compatible\n"
-"with the component's primary license, and the I2P project manager has the final say as\n"
-"to what licenses meet the above four guarantees for inclusion in the I2P distribution."
-msgstr "La distribución I2P contiene varios recursos, que reflejan la fragmentación \ndel código fuente en sus diferentes componentes. Cada componente tiene \nsu propia licencia, que todos los desarrolladores que contribuyan con él \ntienen que aceptar - bien explícitamente declarando la versión del código \nconsignada (`committed`) bajo una licencia compatible con ese componente,\no implícitamente publicando el código consignado bajo la licencia primaria del componente. Cada uno de estos componentes tiene un desarrollador\nprincipal que tiene la última palabra acerca de si una licencia es compatible con la licencia primaria del compente, y el administrador del proyecto I2P \ntiene la última palabra acerca de qué licencias satisfacen las cuatro \ngarantías anteriores para su inclusión en la distribución I2P."
+"The I2P distribution contains several resources, reflecting the "
+"partitioning of \n"
+"the source code into components. Each component has its own license, "
+"which all \n"
+"developers who contribute to it agree to - either by explicitly declaring"
+" the release\n"
+"of code committed under a license compatible with that component, or by "
+"implicitly\n"
+"releasing the code committed under the component's primary license. Each"
+" of these \n"
+"components has a lead developer who has the final say as to what license "
+"is compatible\n"
+"with the component's primary license, and the I2P project manager has the"
+" final say as\n"
+"to what licenses meet the above four guarantees for inclusion in the I2P "
+"distribution."
+msgstr ""
+"La distribución I2P contiene varios recursos, que reflejan la "
+"fragmentación \n"
+"del código fuente en sus diferentes componentes. Cada componente tiene \n"
+"su propia licencia, que todos los desarrolladores que contribuyan con él"
+" \n"
+"tienen que aceptar - bien explícitamente declarando la versión del código"
+" \n"
+"consignada (`committed`) bajo una licencia compatible con ese componente,"
+"\n"
+"o implícitamente publicando el código consignado bajo la licencia "
+"primaria del componente. Cada uno de estos componentes tiene un "
+"desarrollador\n"
+"principal que tiene la última palabra acerca de si una licencia es "
+"compatible con la licencia primaria del compente, y el administrador del "
+"proyecto I2P \n"
+"tiene la última palabra acerca de qué licencias satisfacen las cuatro \n"
+"garantías anteriores para su inclusión en la distribución I2P."
#: i2p2www/pages/site/get-involved/develop/licenses.html:56
msgid "Component"
@@ -1935,18 +2858,39 @@ msgstr "GPL + excepción java"
msgid ""
"While it may be redundant, just for clarity the\n"
"GPL'ed code included within\n"
-"I2PTunnel and other apps must be released under the GPL with an additional \"exception\"\n"
+"I2PTunnel and other apps must be released under the GPL with an "
+"additional \"exception\"\n"
"explicitly authorizing the use of Java's standard libraries:"
-msgstr "Aunque puede ser redundante, y sólo para dejarlo claro,\nel código bajo GPL incluído con I2PTunnel\ny otras aplicaciones, debe ser publicado bajo la GPL con \nuna \"excepción\" adicional explícita autorizando el uso de \nlas librerías estándar de Java:"
+msgstr ""
+"Aunque puede ser redundante, y sólo para dejarlo claro,\n"
+"el código bajo GPL incluído con I2PTunnel\n"
+"y otras aplicaciones, debe ser publicado bajo la GPL con \n"
+"una \"excepción\" adicional explícita autorizando el uso de \n"
+"las librerías estándar de Java:"
#: i2p2www/pages/site/get-involved/develop/licenses.html:287
msgid ""
-"All source code under each component will by default be licensed under the\n"
-"primary license, unless marked otherwise in the code. All of the above is\n"
-"summary of the license terms - please see the specific license for the component\n"
-"or source code in question for authoritative terms. Component source locations and\n"
+"All source code under each component will by default be licensed under "
+"the\n"
+"primary license, unless marked otherwise in the code. All of the above "
+"is\n"
+"summary of the license terms - please see the specific license for the "
+"component\n"
+"or source code in question for authoritative terms. Component source "
+"locations and\n"
"resource packaging may be changed if the repository is reorganized."
-msgstr "Todo código fuente bajo cada componente será licenciado por defecto bajo \nla licencia primaria, a menos que otra cosa esté establecida en el código. \nTodo lo anterior resume los términos de la licencia - por favor revise la licencia\nespecífica para el componente, o el código fuente en cuestión en busca de cláusulas \nautorizativas. Los emplazamientos de los recursos del código de los componentes \ny los paquetes podrían cambiar si el repositorio es reorganizado."
+msgstr ""
+"Todo código fuente bajo cada componente será licenciado por defecto bajo"
+" \n"
+"la licencia primaria, a menos que otra cosa esté establecida en el "
+"código. \n"
+"Todo lo anterior resume los términos de la licencia - por favor revise la"
+" licencia\n"
+"específica para el componente, o el código fuente en cuestión en busca de"
+" cláusulas \n"
+"autorizativas. Los emplazamientos de los recursos del código de los "
+"componentes \n"
+"y los paquetes podrían cambiar si el repositorio es reorganizado."
#: i2p2www/pages/site/get-involved/develop/licenses.html:295
msgid "Commit privileges"
@@ -1958,42 +2902,70 @@ msgid ""
"Developers may push changes to a distributed monotone repository if you\n"
"receive permission from the person running that repository.\n"
"See the Monotone Page for details."
-msgstr "Los desarrolladores pueden impulsar cambios en un repositorio Monotone\nsi reciben permiso de la persona que mantiene ese repositorio.\nVea la página de Monotone para mayor detalle."
+msgstr ""
+"Los desarrolladores pueden impulsar cambios en un repositorio Monotone\n"
+"si reciben permiso de la persona que mantiene ese repositorio.\n"
+"Vea la página de Monotone para mayor detalle."
#: i2p2www/pages/site/get-involved/develop/licenses.html:302
msgid ""
"However, to have changes included in a release, developers\n"
"must be trusted by the release manager (currently zzz).\n"
-"In addition, they must explicitly agree with the above terms to be trusted.\n"
-"That means that they must send one of the release managers a signed message affirming that:"
-msgstr "Sin embargo, para poder incluír los cambios en una versión, los \ndesarrolladores deben recibir confianza por parte del administrador\nde versiones (actualmente `zzz`). Además, deben aceptar explícitamente\nlos téminos anteriores para recibir confianza. Eso significa que deben \nenviar a uno de los administradores de versiones un mensaje firmado \nafirmando que:"
+"In addition, they must explicitly agree with the above terms to be "
+"trusted.\n"
+"That means that they must send one of the release managers a signed "
+"message affirming that:"
+msgstr ""
+"Sin embargo, para poder incluír los cambios en una versión, los \n"
+"desarrolladores deben recibir confianza por parte del administrador\n"
+"de versiones (actualmente `zzz`). Además, deben aceptar explícitamente\n"
+"los téminos anteriores para recibir confianza. Eso significa que deben \n"
+"enviar a uno de los administradores de versiones un mensaje firmado \n"
+"afirmando que:"
#: i2p2www/pages/site/get-involved/develop/licenses.html:309
msgid ""
"Unless marked otherwise, all code I commit is implicitly licensed under\n"
"the component's primary license"
-msgstr "A menos que se establezca de otra manera, todo el código que \nyo consigne está implícitamente licenciado bajo la licencia primaria \ndel componente."
+msgstr ""
+"A menos que se establezca de otra manera, todo el código que \n"
+"yo consigne está implícitamente licenciado bajo la licencia primaria \n"
+"del componente."
#: i2p2www/pages/site/get-involved/develop/licenses.html:313
msgid ""
-"If specified in the source, the code may be explicitly licensed under one\n"
+"If specified in the source, the code may be explicitly licensed under one"
+"\n"
"of the component's alternate licenses"
-msgstr "Si se especifica en el código fuente, el código puede estar explícitamente \nlicenciado bajo una de las licencias alternativas del componente."
+msgstr ""
+"Si se especifica en el código fuente, el código puede estar "
+"explícitamente \n"
+"licenciado bajo una de las licencias alternativas del componente."
#: i2p2www/pages/site/get-involved/develop/licenses.html:317
msgid ""
"I have the right to release the code I commit under the terms I\n"
"am committing it"
-msgstr "Tengo derecho a publicar el código que consigne ('commit') bajo los \ntérminos con los que lo estoy consignando."
+msgstr ""
+"Tengo derecho a publicar el código que consigne ('commit') bajo los \n"
+"términos con los que lo estoy consignando."
#: i2p2www/pages/site/get-involved/develop/licenses.html:323
#, python-format
msgid ""
-"If anyone is aware of any instances where the above conditions are not met,\n"
-"please contact the component lead and/or an I2P release manager with further\n"
+"If anyone is aware of any instances where the above conditions are not "
+"met,\n"
+"please contact the component lead and/or an I2P release manager with "
+"further\n"
"information.\n"
"See developers' license agreements."
-msgstr "Si alguien advierte alguna instancia donde las condiciones anteriores no se \ncumplen, por favor contacte con el encargado del componente y/o con el \nadministrador de versiones de I2P con información detallada. \nVea los acuerdos de licencia del desarrollador."
+msgstr ""
+"Si alguien advierte alguna instancia donde las condiciones anteriores no "
+"se \n"
+"cumplen, por favor contacte con el encargado del componente y/o con el \n"
+"administrador de versiones de I2P con información detallada. \n"
+"Vea los acuerdos de licencia del "
+"desarrollador."
#: i2p2www/pages/site/get-involved/develop/release-signing-key.html:2
msgid "Release Signing Key"
@@ -2001,18 +2973,24 @@ msgstr "Clave de firmado de la versión"
#: i2p2www/pages/site/get-involved/develop/release-signing-key.html:4
msgid "Releases 0.7.6 and later are signed by zzz. His current public key is:"
-msgstr "Las versiones 0.7.6 y posteriores están firmadas por zzz. Su clave pública actual es:"
+msgstr ""
+"Las versiones 0.7.6 y posteriores están firmadas por zzz. Su clave "
+"pública actual es:"
#: i2p2www/pages/site/get-involved/develop/release-signing-key.html:190
-msgid ""
-"Releases 0.7.6 through 0.9.12 were signed by zzz with the following key:"
-msgstr "Las versiones de la 0.7.6 a la 0.9.12 fueron firmadas por zzz con la siguiente clave:"
+msgid "Releases 0.7.6 through 0.9.12 were signed by zzz with the following key:"
+msgstr ""
+"Las versiones de la 0.7.6 a la 0.9.12 fueron firmadas por zzz con la "
+"siguiente clave:"
#: i2p2www/pages/site/get-involved/develop/release-signing-key.html:226
msgid ""
-"Releases 0.6.1.31 through 0.7.5 were signed by Complication. His public key "
-"is:"
-msgstr "Las versiones de la 0.6.1.31 a la 0.7.5 fueron firmadas por `Complication`. \nSu clave pública es:"
+"Releases 0.6.1.31 through 0.7.5 were signed by Complication. His public "
+"key is:"
+msgstr ""
+"Las versiones de la 0.6.1.31 a la 0.7.5 fueron firmadas por "
+"`Complication`. \n"
+"Su clave pública es:"
#: i2p2www/pages/site/get-involved/develop/security-key.html:2
msgid "Security GPG Key"
@@ -2020,7 +2998,9 @@ msgstr "Clave GPG de seguridad"
#: i2p2www/pages/site/get-involved/develop/security-key.html:4
msgid "Following is the GPG key for the security@geti2p.net email address:"
-msgstr "A continuación tiene la clave GPG para la dirección security@geti2p.net de correo electrónico:"
+msgstr ""
+"A continuación tiene la clave GPG para la dirección security@geti2p.net "
+"de correo electrónico:"
#: i2p2www/pages/site/get-involved/develop/signed-keys.html:2
msgid "Signed Developer Keys"
@@ -2028,10 +3008,18 @@ msgstr "Claves firmadas de desarrollador"
#: i2p2www/pages/site/get-involved/develop/signed-keys.html:4
msgid ""
-"Keys for zzz, Complication and welterde are provided clearsigned. The key for jrandom must be\n"
+"Keys for zzz, Complication and welterde are provided clearsigned. The key"
+" for jrandom must be\n"
"verified differently, since he's away, and only left a binary detached\n"
"signature for his key."
-msgstr "Las claves para `zzz`, `Complication` y `welterde` se proporcionan firmadas de forma \ntransparente (`clearsigned`). La clave para `jrandom` debe ser verificada de forma diferente, \nya que él está fuera y sólo dejó una firma adosada (`detached signature`) \nbinaria para su clave."
+msgstr ""
+"Las claves para `zzz`, `Complication` y `welterde` se proporcionan "
+"firmadas de forma \n"
+"transparente (`clearsigned`). La clave para `jrandom` debe ser verificada"
+" de forma diferente, \n"
+"ya que él está fuera y sólo dejó una firma adosada (`detached signature`)"
+" \n"
+"binaria para su clave."
#: i2p2www/pages/site/get-involved/develop/signed-keys.html:10
#: i2p2www/pages/site/get-involved/develop/signed-keys.html:16
@@ -2060,62 +3048,114 @@ msgstr "Otros"
#: i2p2www/pages/site/get-involved/develop/signed-keys.html:17
msgid ""
-"Tip: To find zzz's GPG key, on his eepsite locate the key `0xA76E0BED`, with\n"
-"the name `zzz@mail.i2p` and the fingerprint `4456 EBBE C805 63FE 57E6 B310 4155\n"
+"Tip: To find zzz's GPG key, on his eepsite locate the key "
+"`0xA76E0BED`, with\n"
+"the name `zzz@mail.i2p` and the fingerprint `4456 EBBE C805 63FE 57E6 "
+"B310 4155\n"
"76BA A76E 0BED`."
-msgstr "Consejo: Para encontrar la clave GPG de `zzz`, localice en su \neepsite la clave `0xA76E0BED`, con el nombre `zzz@mail.i2p` y la \nhuella de validación de clave (`fingerprint`) \n`4456 EBBE C805 63FE 57E6 B310 4155 76BA A76E 0BED`."
+msgstr ""
+"Consejo: Para encontrar la clave GPG de `zzz`, localice en su \n"
+"eepsite la clave `0xA76E0BED`, con el nombre `zzz@mail.i2p` y la \n"
+"huella de validación de clave (`fingerprint`) \n"
+"`4456 EBBE C805 63FE 57E6 B310 4155 76BA A76E 0BED`."
#: i2p2www/pages/site/get-involved/develop/signed-keys.html:49
msgid ""
-"Tip: To find welterde's GPG key, on public keyservers locate the key\n"
-"`0x62E011A1`, with the name `welterde@arcor.de` and the fingerprint `6720 FD81\n"
+"Tip: To find welterde's GPG key, on public keyservers locate the "
+"key\n"
+"`0x62E011A1`, with the name `welterde@arcor.de` and the fingerprint `6720"
+" FD81\n"
"3872 6DFC 6016 64D1 EBBC 0374 62E0 11A1`."
-msgstr "Consejo: Para encontrar la clave GPG de `welterde`, localice en \nlos servidores públicos de claves la clave `0x62E011A1`, con el nombre\n`welterde@arcor.de` y la huella de validación de clave (`fingerprint`) \n`6720 FD81 3872 6DFC 6016 64D1 EBBC 0374 62E0 11A1`."
+msgstr ""
+"Consejo: Para encontrar la clave GPG de `welterde`, localice en \n"
+"los servidores públicos de claves la clave `0x62E011A1`, con el nombre\n"
+"`welterde@arcor.de` y la huella de validación de clave (`fingerprint`) \n"
+"`6720 FD81 3872 6DFC 6016 64D1 EBBC 0374 62E0 11A1`."
#: i2p2www/pages/site/get-involved/develop/signed-keys.html:81
msgid ""
-"Tip: To find Complication's GPG key, on his eepsite locate the key\n"
-"`0x79FCCE33`, with the name `complication@mail.i2p` and the fingerprint `73CF\n"
+"Tip: To find Complication's GPG key, on his eepsite locate the key"
+"\n"
+"`0x79FCCE33`, with the name `complication@mail.i2p` and the fingerprint "
+"`73CF\n"
"2862 87A7 E7D2 19FF DB66 FA1D FC6B 79FC CE33`."
-msgstr "Consejo: Para encontrar la clave GPG de `Complication`, localice \nen su eepsite la clave `0x79FCCE33`, con el nombre `complication@mail.i2p` \ny la huella de validación de clave (`fingerprint`) \n`73CF 2862 87A7 E7D2 19FF DB66 FA1D FC6B 79FC CE33`."
+msgstr ""
+"Consejo: Para encontrar la clave GPG de `Complication`, localice \n"
+"en su eepsite la clave `0x79FCCE33`, con el nombre "
+"`complication@mail.i2p` \n"
+"y la huella de validación de clave (`fingerprint`) \n"
+"`73CF 2862 87A7 E7D2 19FF DB66 FA1D FC6B 79FC CE33`."
#: i2p2www/pages/site/get-involved/develop/signed-keys.html:116
msgid ""
-"Tip: To find jrandom's GPG key for Syndie releases, on public keyservers locate\n"
+"Tip: To find jrandom's GPG key for Syndie releases, on public "
+"keyservers locate\n"
"the key `0x393F2DF9`, with the name `syndie-dist-key@i2p.net` and the\n"
"fingerprint `AE89 D080 0E85 72F0 B777 B2ED C2FA 68C0 393F 2DF9`."
-msgstr "Consejo: Para encontrar la clave GPG de `jrandom` para versiones \nde Syndie, localice en los servidores públicos de claves la clave `0x393F2DF9`, \ncon el nombre `syndie-dist-key@i2p.net` y la huella de validación de clave (`fingerprint`) \n`AE89 D080 0E85 72F0 B777 B2ED C2FA 68C0 393F 2DF9`."
+msgstr ""
+"Consejo: Para encontrar la clave GPG de `jrandom` para versiones \n"
+"de Syndie, localice en los servidores públicos de claves la clave "
+"`0x393F2DF9`, \n"
+"con el nombre `syndie-dist-key@i2p.net` y la huella de validación de "
+"clave (`fingerprint`) \n"
+"`AE89 D080 0E85 72F0 B777 B2ED C2FA 68C0 393F 2DF9`."
#: i2p2www/pages/site/get-involved/develop/signed-keys.html:122
msgid ""
"Jrandom had to leave unexpectedly in the end of 2007. His commit key was\n"
-"deployed in the Syndie Monotone repository, in a file named `mtn-committers`.\n"
-"That file also had a GPG signature, `mtn-committers.sig`, but it was a binary\n"
-"detached signature. I am going to supply both files in GPG ASCII-armoured form\n"
+"deployed in the Syndie Monotone repository, in a file named `mtn-"
+"committers`.\n"
+"That file also had a GPG signature, `mtn-committers.sig`, but it was a "
+"binary\n"
+"detached signature. I am going to supply both files in GPG ASCII-armoured"
+" form\n"
"below."
-msgstr "`jrandom` tuvo que abandonar inesperadamente al final de 2007. Su clave de \nconsignación (`commit`) fue desplegada en el repositorio Monotone de \nSyndie, en un fichero llamado `mtn-committers`. Ese fichero también tuvo \nuna firma GPG, `mtn-committers.sig`, pero era una firma adosada \n(`detached signature`) binaria. Voy a suministrar ambos ficheros en la forma \nGPG con-armadura-ASCII (`ASCII-armoured`) siguiente."
+msgstr ""
+"`jrandom` tuvo que abandonar inesperadamente al final de 2007. Su clave "
+"de \n"
+"consignación (`commit`) fue desplegada en el repositorio Monotone de \n"
+"Syndie, en un fichero llamado `mtn-committers`. Ese fichero también tuvo"
+" \n"
+"una firma GPG, `mtn-committers.sig`, pero era una firma adosada \n"
+"(`detached signature`) binaria. Voy a suministrar ambos ficheros en la "
+"forma \n"
+"GPG con-armadura-ASCII (`ASCII-armoured`) siguiente."
#: i2p2www/pages/site/get-involved/develop/signed-keys.html:130
msgid ""
-"First, the file `mtn-committers` containing jrandom's Monotone key. Save as\n"
-"`mtn-committers.asc` and unpack it using `gpg --output mtn-committers --dearmor\n"
+"First, the file `mtn-committers` containing jrandom's Monotone key. Save "
+"as\n"
+"`mtn-committers.asc` and unpack it using `gpg --output mtn-committers "
+"--dearmor\n"
"mtn-committers.asc`:"
-msgstr "Primero, el fichero `mtn-committers` conteniendo la clave Monotone de \n`jrandom`. Guárdelo como `mtn-committers.asc` y desempaquételo usando \n`gpg --output mtn-committers --dearmor mtn-committers.asc`:"
+msgstr ""
+"Primero, el fichero `mtn-committers` conteniendo la clave Monotone de \n"
+"`jrandom`. Guárdelo como `mtn-committers.asc` y desempaquételo usando \n"
+"`gpg --output mtn-committers --dearmor mtn-committers.asc`:"
#: i2p2www/pages/site/get-involved/develop/signed-keys.html:151
msgid ""
"Now the file `mtn-committers.sig`, containing the GPG signature. Save as\n"
-"`mtn-committers.sig.asc` and unpack it using `gpg --output mtn-committers.sig\n"
+"`mtn-committers.sig.asc` and unpack it using `gpg --output mtn-"
+"committers.sig\n"
"--dearmor mtn-committers.sig.asc`. Use it to verify the above supplied\n"
"`mtn-committers` file:"
-msgstr "Ahora el fichero `mtn-committers.sig`, que contiene la firma GPG. Guárdelo \ncomo `mtn-committers.sig.asc` y desempaquételo usando \n`gpg --output mtn-committers.sig --dearmor mtn-committers.sig.asc`. \nÚselo para verificar el fichero `mtn-committers` suministrado anteriormente."
+msgstr ""
+"Ahora el fichero `mtn-committers.sig`, que contiene la firma GPG. "
+"Guárdelo \n"
+"como `mtn-committers.sig.asc` y desempaquételo usando \n"
+"`gpg --output mtn-committers.sig --dearmor mtn-committers.sig.asc`. \n"
+"Úselo para verificar el fichero `mtn-committers` suministrado "
+"anteriormente."
#: i2p2www/pages/site/get-involved/develop/signed-keys.html:170
#, python-format
msgid ""
"Some of the developers have included their Monotone keys in their signed license agreement."
-msgstr "Alguno de los desarrolladores ha incluído sus claves Monotone en sus acuerdos de licencia firmados."
+msgstr ""
+"Alguno de los desarrolladores ha incluído sus claves Monotone en sus acuerdos de licencia firmados."
#: i2p2www/pages/site/get-involved/guides/dev-guidelines.html:2
msgid "Developer Guidelines and Coding Style"
@@ -2132,12 +3172,20 @@ msgstr "Pautas básicas y estilo del código"
#: i2p2www/pages/site/get-involved/guides/dev-guidelines.html:10
msgid ""
-"Most of the following should be common sense for anybody who has worked on open source or in a commercial\n"
+"Most of the following should be common sense for anybody who has worked "
+"on open source or in a commercial\n"
"programming envrionment.\n"
"The following applies mostly to the main development branch i2p.i2p.\n"
-"Guidelines for other branches, plugins, and external apps may be substantially different;\n"
+"Guidelines for other branches, plugins, and external apps may be "
+"substantially different;\n"
"check with the appropriate developer for guidance."
-msgstr "La mayor parte de lo siguiente debería ser de sentido común para cualquiera que haya trabajado para proyectos de código libre o en ambientes de desarrollo comerciales. Lo siguiente se aplica sobre todo para el desarrollo de la rama principal i2p.i2p. Las guías para otras ramas, pluguins y aplicaciones externas pueden ser bastante diferentes, pregúntele al desarrollador indicado en tal caso."
+msgstr ""
+"La mayor parte de lo siguiente debería ser de sentido común para "
+"cualquiera que haya trabajado para proyectos de código libre o en "
+"ambientes de desarrollo comerciales. Lo siguiente se aplica sobre todo "
+"para el desarrollo de la rama principal i2p.i2p. Las guías para otras "
+"ramas, pluguins y aplicaciones externas pueden ser bastante diferentes, "
+"pregúntele al desarrollador indicado en tal caso."
#: i2p2www/pages/site/get-involved/guides/dev-guidelines.html:18
msgid "Community"
@@ -2145,10 +3193,16 @@ msgstr "Comunidad"
#: i2p2www/pages/site/get-involved/guides/dev-guidelines.html:20
msgid ""
-"Please don't just \"write code\". If you can, participate in other development activities, including:\n"
-"development discussions and support on IRC, zzz.i2p, and forum.i2p; testing;\n"
+"Please don't just \"write code\". If you can, participate in other "
+"development activities, including:\n"
+"development discussions and support on IRC, zzz.i2p, and forum.i2p; "
+"testing;\n"
"bug reporting and responses; documentation; code reviews; etc."
-msgstr "Por favor no sólo \"escriba código\". Si puede, participe en otras actividades de desarrollo como: discusiones sobre el desarrollo y soporte en el IRC, zzz.i2p, y el foro de.i2p; reporte y solución de errores; documentación, revisión del código, etc."
+msgstr ""
+"Por favor no sólo \"escriba código\". Si puede, participe en otras "
+"actividades de desarrollo como: discusiones sobre el desarrollo y soporte"
+" en el IRC, zzz.i2p, y el foro de.i2p; reporte y solución de errores; "
+"documentación, revisión del código, etc."
#: i2p2www/pages/site/get-involved/guides/dev-guidelines.html:25
msgid ""
@@ -2156,16 +3210,25 @@ msgid ""
"Be aware of the current release cycle.\n"
"Adhere to release milestones such as feature freeze, tag freeze, and\n"
"the checkin deadline for a release."
-msgstr "Los programadores activos deberían estar disponibles periódicamente en el canal #i2p-dev del IRC. Tenga en cuenta el ciclo de liberación de versiones actual. Fix this! not translated all yet!!! "
+msgstr ""
+"Los programadores activos deberían estar disponibles periódicamente en el"
+" canal #i2p-dev del IRC. Tenga en cuenta el ciclo de liberación de "
+"versiones actual. Fix this! not translated all yet!!! "
#: i2p2www/pages/site/get-involved/guides/dev-guidelines.html:35
msgid ""
-"Have a basic understanding of distributed source control systems, even if you haven't\n"
+"Have a basic understanding of distributed source control systems, even if"
+" you haven't\n"
"used monotone before. Ask for help if you need it.\n"
"Once pushed, checkins are forever, there is no undo. Please be careful.\n"
"If you have not used monotone before, start with baby steps.\n"
"Check in some small changes and see how it goes."
-msgstr "Debe tener conocimientos básicos del funcionamiento de sistemas de control de código, incluso si nunca ha usado monotone antes. Pida ayuda si lo necesita. Una vez subido algo no hay vuelta atrás, no se puede deshacer, por favor tenga cuidado. Si nunca ha usado monotone antes empiece con mucho cuidado. Suba pequeños cambios y observe como funciona."
+msgstr ""
+"Debe tener conocimientos básicos del funcionamiento de sistemas de "
+"control de código, incluso si nunca ha usado monotone antes. Pida ayuda "
+"si lo necesita. Una vez subido algo no hay vuelta atrás, no se puede "
+"deshacer, por favor tenga cuidado. Si nunca ha usado monotone antes "
+"empiece con mucho cuidado. Suba pequeños cambios y observe como funciona."
#: i2p2www/pages/site/get-involved/guides/dev-guidelines.html:42
msgid ""
@@ -2174,22 +3237,37 @@ msgid ""
"use your own development branch (e.g. i2p.i2p.yourname.test)\n"
"and propagate back to i2p.i2p once it is working well.\n"
"Do not break the build. Do not cause regressions.\n"
-"In case you do (it happens), please do not vanish for a long period after\n"
+"In case you do (it happens), please do not vanish for a long period after"
+"\n"
"you push your change."
-msgstr "Pruebe los cambios antes de subirlos. Si prefiere el modelo de desarrollo subir-antes-de-probar use su propia rama de desarrollo (por ejemplo i2p.i2p.yourname.test) y envíelo de vuelta a i2p.i2p una vez que funcione correctamente. No rompa la compilación. No cree regresiones. En caso de que lo haga (a veces ocurre), no desaparezca por mucho tiempo antes de subir el cambio."
+msgstr ""
+"Pruebe los cambios antes de subirlos. Si prefiere el modelo de desarrollo"
+" subir-antes-de-probar use su propia rama de desarrollo (por ejemplo "
+"i2p.i2p.yourname.test) y envíelo de vuelta a i2p.i2p una vez que funcione"
+" correctamente. No rompa la compilación. No cree regresiones. En caso de "
+"que lo haga (a veces ocurre), no desaparezca por mucho tiempo antes de "
+"subir el cambio."
#: i2p2www/pages/site/get-involved/guides/dev-guidelines.html:51
msgid ""
-"If your change is non-trivial, or you want people to test it and need good test reports\n"
-"to know whether your change was tested or not, add a checkin comment to history.txt\n"
+"If your change is non-trivial, or you want people to test it and need "
+"good test reports\n"
+"to know whether your change was tested or not, add a checkin comment to "
+"history.txt\n"
"and increment the build revision in RouterVersion.java."
-msgstr "Si su cambio no es trivial, o desea que otra gente lo pruebe y necesita reportes fiables para saber si su cambio ha sido probado o no, añada un comentario de confirmación en history.txt e incremente la versión de compilación en RouterVersion.java."
+msgstr ""
+"Si su cambio no es trivial, o desea que otra gente lo pruebe y necesita "
+"reportes fiables para saber si su cambio ha sido probado o no, añada un "
+"comentario de confirmación en history.txt e incremente la versión de "
+"compilación en RouterVersion.java."
#: i2p2www/pages/site/get-involved/guides/dev-guidelines.html:56
msgid ""
"Ensure that you have the latest monotonerc file in _MTN.\n"
"Do not check in on top of untrusted revisions."
-msgstr "Asegúrese de que tiene la última versión del archivo monotonerc en _MTN. No lo sobrescriba con versiones no confiables."
+msgstr ""
+"Asegúrese de que tiene la última versión del archivo monotonerc en _MTN."
+" No lo sobrescriba con versiones no confiables."
#: i2p2www/pages/site/get-involved/guides/dev-guidelines.html:60
msgid ""
@@ -2197,16 +3275,29 @@ msgid ""
"If you inadvertently diverge, merge and push as soon as possible.\n"
"Don't routinely make others merge for you.\n"
"Yes, we know that monotone says you should push and then merge,\n"
-"but in our experience, in-workspace merge works just as well as in-database merge,\n"
+"but in our experience, in-workspace merge works just as well as in-"
+"database merge,\n"
"without creating a merge revision."
-msgstr "asegúrese que ha descargado la última revisión antes de subir los cambios. Si crea un divergencia accidentalmente, una y suba tan pronto como sea posible. No haga que otros lo fusionen rutinariamente por usted. Si, sabemos que monotone indica que debe subir y unir, pero por nuestra experiencia sabemos que funciona tan bien la unión in-workspace como la unión n-database si crear una revisión de unión."
+msgstr ""
+"asegúrese que ha descargado la última revisión antes de subir los "
+"cambios. Si crea un divergencia accidentalmente, una y suba tan pronto "
+"como sea posible. No haga que otros lo fusionen rutinariamente por usted."
+" Si, sabemos que monotone indica que debe subir y unir, pero por nuestra "
+"experiencia sabemos que funciona tan bien la unión in-workspace como la "
+"unión n-database si crear una revisión de unión."
#: i2p2www/pages/site/get-involved/guides/dev-guidelines.html:68
msgid ""
-"Do not check in major changes into the main i2p.i2p branch late in the release cycle.\n"
-"If a project will take you more than a couple days, create your own branch in monotone\n"
+"Do not check in major changes into the main i2p.i2p branch late in the "
+"release cycle.\n"
+"If a project will take you more than a couple days, create your own "
+"branch in monotone\n"
"and do the development there so you do not block releases."
-msgstr "No suba cambios grandes a la rama principal i2p.i2p al final del ciclo de versión. Si un proyecto va a tardar más de varios días, cree su propia rama de monotone y programe allí para no no bloquear la salida de nueva versiones."
+msgstr ""
+"No suba cambios grandes a la rama principal i2p.i2p al final del ciclo de"
+" versión. Si un proyecto va a tardar más de varios días, cree su propia "
+"rama de monotone y programe allí para no no bloquear la salida de nueva "
+"versiones."
#: i2p2www/pages/site/get-involved/guides/dev-guidelines.html:75
msgid "Coding Style"
@@ -2214,55 +3305,98 @@ msgstr "Estilo de programación"
#: i2p2www/pages/site/get-involved/guides/dev-guidelines.html:77
msgid ""
-"Coding style throughout most of the code is 4-spaces for indentation. Do not use tabs.\n"
-"Do not reformat code. If your IDE or editor wants to reformat everything, get control of it.\n"
-"Yes, we know 4 spaces is a pain, but perhaps you can configure your editor appropriately.\n"
+"Coding style throughout most of the code is 4-spaces for indentation. Do "
+"not use tabs.\n"
+"Do not reformat code. If your IDE or editor wants to reformat everything,"
+" get control of it.\n"
+"Yes, we know 4 spaces is a pain, but perhaps you can configure your "
+"editor appropriately.\n"
"In some places, the coding style is different.\n"
"Use common sense. Emulate the style in the file you are modifying."
-msgstr "El código de estilo en la mayoría de los casos es de usar la sangría de 4 espacios. No use tabulación. No cambie el formato del código. Si su editor o IDE quiere cambiar el formato configúrelo para que no lo haga. Sí, sabemos que usar 4 espacios es doloroso, pero probablemente pueda configurar su editor apropiadamente. En algunos casos el estilo de programar es diferente, use el sentido común, emule el estilo del archivo que está modificando."
+msgstr ""
+"El código de estilo en la mayoría de los casos es de usar la sangría de"
+" 4 espacios. No use tabulación. No cambie el formato del código. Si su "
+"editor o IDE quiere cambiar el formato configúrelo para que no lo haga. "
+"Sí, sabemos que usar 4 espacios es doloroso, pero probablemente pueda "
+"configurar su editor apropiadamente. En algunos casos el estilo de "
+"programar es diferente, use el sentido común, emule el estilo del archivo"
+" que está modificando."
#: i2p2www/pages/site/get-involved/guides/dev-guidelines.html:84
msgid ""
-"New classes and methods require at least brief javadocs. Add @since release-"
-"number."
-msgstr "Las nuevas clases y métodos necesitan al menos un javadocs básico. Añada @since numero-versión."
+"New classes and methods require at least brief javadocs. Add @since "
+"release-number."
+msgstr ""
+"Las nuevas clases y métodos necesitan al menos un javadocs básico. Añada "
+"@since numero-versión."
#: i2p2www/pages/site/get-involved/guides/dev-guidelines.html:87
msgid ""
-"Classes in core/ (i2p.jar) and portions of i2ptunnel are part of our official API.\n"
-"There are several out-of-tree plugins and other applications that rely on this API.\n"
+"Classes in core/ (i2p.jar) and portions of i2ptunnel are part of our "
+"official API.\n"
+"There are several out-of-tree plugins and other applications that rely on"
+" this API.\n"
"Be careful not to make any changes that break compatibility.\n"
"Don't add methods to the API unless they are of general utility.\n"
"Javadocs for API methods should be clear and complete.\n"
-"If you add or change the API, also update the documentation on the website (i2p.www branch)."
-msgstr "Las clases del núcleo/ (i2p.jar) y partes de i2ptunnel están incluidas en el API oficial. \nHay varios pluguins y otras aplicaciones que dependen de este API.\nTenga cuidado de no hacer cambios que rompan la compatibilidad.\nNo añada métodos al API a no ser que sean de utilidad general.\nLos Javadocs de los métodos del API deben ser claros y completos.\nSi añade cambios al API, debe también actualizar la documentación en la web (i2p.www branch)."
+"If you add or change the API, also update the documentation on the "
+"website (i2p.www branch)."
+msgstr ""
+"Las clases del núcleo/ (i2p.jar) y partes de i2ptunnel están incluidas en"
+" el API oficial. \n"
+"Hay varios pluguins y otras aplicaciones que dependen de este API.\n"
+"Tenga cuidado de no hacer cambios que rompan la compatibilidad.\n"
+"No añada métodos al API a no ser que sean de utilidad general.\n"
+"Los Javadocs de los métodos del API deben ser claros y completos.\n"
+"Si añade cambios al API, debe también actualizar la documentación en la "
+"web (i2p.www branch)."
#: i2p2www/pages/site/get-involved/guides/dev-guidelines.html:95
msgid ""
"Tag strings for translation where appropriate.\n"
-"Don't change existing tagged strings unless really necessary, as it will break existing translations.\n"
-"Do not add or change tagged strings after the \"tag freeze\" in the release cycle so that\n"
+"Don't change existing tagged strings unless really necessary, as it will "
+"break existing translations.\n"
+"Do not add or change tagged strings after the \"tag freeze\" in the "
+"release cycle so that\n"
"translators have a chance to update before the release."
-msgstr "Incluya cadenas de texto para la traducción cuando sea apropiado.\nNo cambie las cadenas ya etiquetadas a no ser que sea necesario ya que rompería las traducciones existentes.\nNo añada o cambie las cadenas después del \"tag freeze\" durante la liberación de la versión,\nasí los programadores tienen la oportunidad de actualizarlo antes de su liberación"
+msgstr ""
+"Incluya cadenas de texto para la traducción cuando sea apropiado.\n"
+"No cambie las cadenas ya etiquetadas a no ser que sea necesario ya que "
+"rompería las traducciones existentes.\n"
+"No añada o cambie las cadenas después del \"tag freeze\" durante la "
+"liberación de la versión,\n"
+"así los programadores tienen la oportunidad de actualizarlo antes de su "
+"liberación"
#: i2p2www/pages/site/get-involved/guides/dev-guidelines.html:101
msgid ""
-"Use generics and concurrent classes where possible. I2P is a highly multi-"
-"threaded application."
-msgstr "Siempre que pueda use clases genéricas y concurrentes. I2P es una aplicación multi-hilos."
+"Use generics and concurrent classes where possible. I2P is a highly "
+"multi-threaded application."
+msgstr ""
+"Siempre que pueda use clases genéricas y concurrentes. I2P es una "
+"aplicación multi-hilos."
#: i2p2www/pages/site/get-involved/guides/dev-guidelines.html:104
msgid ""
"We require Java 6 to build but only Java 5 to run I2P.\n"
-"Do not use Java 6 classes or methods without handling the class not found exceptions\n"
-"and providing alternate Java 5 code. See classes in net.i2p.util for examples."
-msgstr "Necesita Java 6 para compilar I2P, pero sólo Java 5 para ejecutarlo.\nNo use las clases o métodos de Java 6 sin encargase antes de las clases de excepciones not found\ny de proporcionar el código alternativo para Java 5. Vea los ejemplos de clases en net.i2p.util."
+"Do not use Java 6 classes or methods without handling the class not found"
+" exceptions\n"
+"and providing alternate Java 5 code. See classes in net.i2p.util for "
+"examples."
+msgstr ""
+"Necesita Java 6 para compilar I2P, pero sólo Java 5 para ejecutarlo.\n"
+"No use las clases o métodos de Java 6 sin encargase antes de las clases "
+"de excepciones not found\n"
+"y de proporcionar el código alternativo para Java 5. Vea los ejemplos de "
+"clases en net.i2p.util."
#: i2p2www/pages/site/get-involved/guides/dev-guidelines.html:109
msgid ""
"Explicitly convert between primitive types and classes;\n"
"don't rely on autoboxing/unboxing."
-msgstr "Convierta explícitamente entre tipos primitivos y clases;\nno confíe en autoboxing/unboxing."
+msgstr ""
+"Convierta explícitamente entre tipos primitivos y clases;\n"
+"no confíe en autoboxing/unboxing."
#: i2p2www/pages/site/get-involved/guides/dev-guidelines.html:115
msgid "Licenses"
@@ -2275,14 +3409,22 @@ msgid ""
"justify why it is necessary,\n"
"verify the license is compatible,\n"
"and obtain approval from the lead developer."
-msgstr "Sólo suba el código que ha escrito usted.\nAntes de subir el código o librerías de otras fuentes,\nverifique que la licencia es compatible,\ny obtenga permiso del desarrollador."
+msgstr ""
+"Sólo suba el código que ha escrito usted.\n"
+"Antes de subir el código o librerías de otras fuentes,\n"
+"verifique que la licencia es compatible,\n"
+"y obtenga permiso del desarrollador."
#: i2p2www/pages/site/get-involved/guides/dev-guidelines.html:124
msgid ""
"For any images checked in from external sources,\n"
"it is your responsibility to first verify the license is compatible.\n"
"Include the license and source information in the checkin comment."
-msgstr "Para cualquier imagen subida de fuentes externas,\nes su responsabilidad verificar primero si la licencia es compatible.\nIncluya la licencia y la información de la fuente en el comentario de subida."
+msgstr ""
+"Para cualquier imagen subida de fuentes externas,\n"
+"es su responsabilidad verificar primero si la licencia es compatible.\n"
+"Incluya la licencia y la información de la fuente en el comentario de "
+"subida."
#: i2p2www/pages/site/get-involved/guides/dev-guidelines.html:131
msgid "Bugs"
@@ -2294,7 +3436,12 @@ msgid ""
"Managing Trac tickets is everybody's job, please help.\n"
"Monitor %(trac)s for tickets you have been assigned or can help with.\n"
"Assign, categorize, comment on, fix, or close tickets if you can."
-msgstr "Mantener las entradas del Trac es trabajo de todos, por favor denos su ayuda.\nObserve el %(trac)s por entradas que le hayan sido asignadas o en las que pueda ayudar.\nAsigne, categorice, comente, arregle, o cierre entradas si puede."
+msgstr ""
+"Mantener las entradas del Trac es trabajo de todos, por favor denos su "
+"ayuda.\n"
+"Observe el %(trac)s por entradas que le hayan sido asignadas o en las que"
+" pueda ayudar.\n"
+"Asigne, categorice, comente, arregle, o cierre entradas si puede."
#: i2p2www/pages/site/get-involved/guides/dev-guidelines.html:138
msgid ""
@@ -2304,7 +3451,15 @@ msgid ""
"\"I think I fixed it, please test and reopen if it's still broken\".\n"
"Add a comment with the dev build number or revision and set\n"
"the milestone to the next release."
-msgstr "Cierre la entrada cuando piense que la ha arreglado.\nNo tenemos un departamento de pruebas para verificar las entradas cerradas.\nSi no está seguro de haberlo solucionado, ciérrela y añada una nota diciendo \"I think I fixed it, please test and reopen if it's still broken\".\nAñada un comentario con el número de compilación o la revisión y establezca el hito para la siguiente versión."
+msgstr ""
+"Cierre la entrada cuando piense que la ha arreglado.\n"
+"No tenemos un departamento de pruebas para verificar las entradas "
+"cerradas.\n"
+"Si no está seguro de haberlo solucionado, ciérrela y añada una nota "
+"diciendo \"I think I fixed it, please test and reopen if it's still "
+"broken\".\n"
+"Añada un comentario con el número de compilación o la revisión y "
+"establezca el hito para la siguiente versión."
#: i2p2www/pages/site/get-involved/guides/ides.html:2
msgid "Using an IDE with I2P"
@@ -2312,41 +3467,55 @@ msgstr "Usando un IDE con I2P"
#: i2p2www/pages/site/get-involved/guides/ides.html:4
msgid ""
-"The main I2P development branch (i2p.i2p
) has been set up to "
-"enable developers to easily set up two of the commonly-used IDEs for Java "
-"development: Eclipse and NetBeans."
-msgstr "La rama principal de desarrollo de I2P (i2p.i2p
) ha sido configurada para permitir a los desarrolladores configurar fácilmente los dos IDEs de desarrollo de JAVA más usados: Eclipse y NetBeans."
+"The main I2P development branch (i2p.i2p
) has been set up to"
+" enable developers to easily set up two of the commonly-used IDEs for "
+"Java development: Eclipse and NetBeans."
+msgstr ""
+"La rama principal de desarrollo de I2P (i2p.i2p
) ha sido "
+"configurada para permitir a los desarrolladores configurar fácilmente los"
+" dos IDEs de desarrollo de JAVA más usados: Eclipse y NetBeans."
#: i2p2www/pages/site/get-involved/guides/ides.html:10
msgid ""
-"The main I2P development branches (i2p.i2p
and branches from "
-"it) contain .project and .classpath Eclipse files, to enable the branch to "
-"be easily set up in Eclipse."
-msgstr "Las ramas principales de desarrollo de I2P (i2p.i2p
y sus ramas) contienen los archivos para Eclipse .project y .classpath, para permitir una configuración fácil de I2P en eclipse."
+"The main I2P development branches (i2p.i2p
and branches from"
+" it) contain .project and .classpath Eclipse files, to enable the branch "
+"to be easily set up in Eclipse."
+msgstr ""
+"Las ramas principales de desarrollo de I2P (i2p.i2p
y sus "
+"ramas) contienen los archivos para Eclipse .project y .classpath, para "
+"permitir una configuración fácil de I2P en eclipse."
#: i2p2www/pages/site/get-involved/guides/ides.html:16
msgid ""
"Check out the I2P branch into some directory (e.g. "
"$HOME/dev/i2p.i2p
)."
-msgstr "Descargue la rama de I2P a algún directorio ( por ejemplo $HOME/dev/i2p.i2p
)."
+msgstr ""
+"Descargue la rama de I2P a algún directorio ( por ejemplo "
+"$HOME/dev/i2p.i2p
)."
#: i2p2www/pages/site/get-involved/guides/ides.html:20
msgid ""
-"Open Eclipse and create a new Workspace, based in the directory that the I2P"
-" branch was checked out to."
-msgstr "Abra Eclipse y cree un nuevo Espacio de Trabajo, Workspace, basado en el directorio donde se ha descargado la rama de I2P."
+"Open Eclipse and create a new Workspace, based in the directory that the "
+"I2P branch was checked out to."
+msgstr ""
+"Abra Eclipse y cree un nuevo Espacio de Trabajo, Workspace, basado en el "
+"directorio donde se ha descargado la rama de I2P."
#: i2p2www/pages/site/get-involved/guides/ides.html:24
msgid ""
"Select \"File - Import...\" and then under \"General\" select \"Existing "
"Projects into Workspace\"."
-msgstr "Seleccione \"Archivo - Importar...\" y entonces en \"General\" seleccione \"Proyectos existentes al Espacio de Trabajo\""
+msgstr ""
+"Seleccione \"Archivo - Importar...\" y entonces en \"General\" seleccione"
+" \"Proyectos existentes al Espacio de Trabajo\""
#: i2p2www/pages/site/get-involved/guides/ides.html:28
msgid ""
-"For \"Select root directory:\" choose the directory that the I2P branch was "
-"checked out to."
-msgstr "Para \"Seleccionar el directorio raíz:\" elija la carpeta donde ha descargado la rama de I2P."
+"For \"Select root directory:\" choose the directory that the I2P branch "
+"was checked out to."
+msgstr ""
+"Para \"Seleccionar el directorio raíz:\" elija la carpeta donde ha "
+"descargado la rama de I2P."
#: i2p2www/pages/site/get-involved/guides/ides.html:32
msgid "If necessary, click \"Refresh\" to refresh the list of projects."
@@ -2358,15 +3527,20 @@ msgstr "Seleccione cada proyecto de la lista y pulse \"Terminar\"."
#: i2p2www/pages/site/get-involved/guides/ides.html:40
msgid ""
-"Done! Your workspace should now contain all projects within the I2P branch, "
-"and their build dependencies should be correctly set up."
-msgstr "¡Listo! Su espacio de trabajo debería incluir todos los proyectos de la rama de I2P, y sus dependencias deberían estar correctamente configuradas."
+"Done! Your workspace should now contain all projects within the I2P "
+"branch, and their build dependencies should be correctly set up."
+msgstr ""
+"¡Listo! Su espacio de trabajo debería incluir todos los proyectos de la "
+"rama de I2P, y sus dependencias deberían estar correctamente "
+"configuradas."
#: i2p2www/pages/site/get-involved/guides/ides.html:48
msgid ""
-"The main I2P development branches (i2p.i2p
and branches from "
-"it) contain NetBeans project files."
-msgstr "Las ramas principales del proyecto de I2P (i2p.i2p
y sus ramas) contienen los archivos del proyecto necesarios para NetBeans."
+"The main I2P development branches (i2p.i2p
and branches from"
+" it) contain NetBeans project files."
+msgstr ""
+"Las ramas principales del proyecto de I2P (i2p.i2p
y sus "
+"ramas) contienen los archivos del proyecto necesarios para NetBeans."
#: i2p2www/pages/site/get-involved/guides/monotone.html:2
msgid "Monotone Guide"
@@ -2400,7 +3574,9 @@ msgstr "Establecer enganches ('hooks') de evaluación de confianza"
msgid ""
"Pulling the i2p.i2p
, i2p.www
and "
"i2p.syndie
branches"
-msgstr "Descargar las ramas de i2p.i2p
, i2p.www
y i2p.syndie
"
+msgstr ""
+"Descargar las ramas de i2p.i2p
, i2p.www
y "
+"i2p.syndie
"
#: i2p2www/pages/site/get-involved/guides/monotone.html:14
#: i2p2www/pages/site/get-involved/guides/monotone.html:312
@@ -2444,28 +3620,51 @@ msgstr "Diferencias en Debian GNU/Linux"
#: i2p2www/pages/site/get-involved/guides/monotone.html:32
#, python-format
msgid ""
-"This is a revised version of Complication's original\n"
+"This is a revised version of Complication's original\n"
" guide detailing the use of Monotone in I2P development.\n"
-" For basic instructions see the quick-start guide."
-msgstr "Esto es una versión revisada de la guía original de Complication detallando el uso de Monotone en el desarrollo de I2P. Para obtener instrucciones básicas vea la guía rápida."
+" For basic instructions see the quick-start "
+"guide."
+msgstr ""
+"Esto es una versión revisada de la guía "
+"original de Complication detallando el uso de Monotone en el "
+"desarrollo de I2P. Para obtener instrucciones básicas vea la guía rápida."
#: i2p2www/pages/site/get-involved/guides/monotone.html:40
#, python-format
msgid ""
-"I2P has a distributed development model. The source code is replicated across\n"
-" independently administered Monotone (\"MTN\") repositories.\n"
-" Developers with commit rights are able to push their changes to the repository\n"
-" (a license agreement needs to be signed\n"
+"I2P has a distributed development model. The source code is replicated "
+"across\n"
+" independently administered Monotone (\"MTN\") repositories.\n"
+" Developers with commit rights are able to push their changes to the "
+"repository\n"
+" (a license agreement needs to be "
+"signed\n"
" before commit rights are granted)."
-msgstr "I2P usa un modelo distribuido de desarrollo. El código es replicado por administradores independientes en repositorios Monotone (\"MTN\"). Los desarrolladores con derechos para ello pueden subir sus cambios al repositorio (deben firmar un acuerdo de licencia antes de obtener estos derechos)"
+msgstr ""
+"I2P usa un modelo distribuido de desarrollo. El código es replicado por "
+"administradores independientes en repositorios Monotone (\"MTN\"). Los "
+"desarrolladores con derechos para ello pueden subir sus cambios al "
+"repositorio (deben firmar un acuerdo de "
+"licencia antes de obtener estos derechos)"
#: i2p2www/pages/site/get-involved/guides/monotone.html:50
msgid ""
"Some of Monotone's noteworthy qualities are: distributed\n"
-" version control, cryptographic authentication, access control, its small size, having few\n"
-" dependencies, storage of projects in a compressed SQLite database file, and\n"
+" version control, cryptographic authentication, access control, its "
+"small size, having few\n"
+" dependencies, storage of projects in a compressed SQLite database file,"
+" and\n"
" having the ability to resume interrupted synchronization attempts."
-msgstr "Algunas de las notables cualidades de Monotone son: control de versiones distribuido, autenticación con cifrados, acceso de control, su pequeño tamaño, tiene pocas dependencias, el almacenamiento de los proyectos usa una base de datos SQLite comprimida, y además tiene la capacidad de reanudar los intentos de sincronización interrumpidos."
+msgstr ""
+"Algunas de las notables cualidades de Monotone son: control de versiones "
+"distribuido, autenticación con cifrados, acceso de control, su pequeño "
+"tamaño, tiene pocas dependencias, el almacenamiento de los proyectos usa "
+"una base de datos SQLite comprimida, y además tiene la capacidad de "
+"reanudar los intentos de sincronización interrumpidos."
#: i2p2www/pages/site/get-involved/guides/monotone.html:59
msgid "Operating a Monotone Client"
@@ -2473,20 +3672,36 @@ msgstr "Usando un cliente Monotone"
#: i2p2www/pages/site/get-involved/guides/monotone.html:64
msgid ""
-"A transport key grants you the ability to push your changes to a Monotone repository server.\n"
-" In order to commit code into Monotone (in essence signing your code), a commit key is also needed.\n"
-" None of the public Monotone servers on I2P currently require a key in order to read (or pull) the source code."
-msgstr "Una clave de transporte le permite subir sus cambios al repositorio del servidor Monotone. Para poder subir código a Monotone (firmando su código), es necesaria una clave de subida. Ninguno de los servidores públicos de Monotone en I2P necesita claves para poder leer (o descargar) el código."
+"A transport key grants you the ability to push your changes to a Monotone"
+" repository server.\n"
+" In order to commit code into Monotone (in essence signing your code), a"
+" commit key is also needed.\n"
+" None of the public Monotone servers on I2P currently require a key in "
+"order to read (or pull) the source code."
+msgstr ""
+"Una clave de transporte le permite subir sus cambios al repositorio del "
+"servidor Monotone. Para poder subir código a Monotone (firmando su "
+"código), es necesaria una clave de subida. Ninguno de los servidores "
+"públicos de Monotone en I2P necesita claves para poder leer (o descargar)"
+" el código."
#: i2p2www/pages/site/get-involved/guides/monotone.html:72
msgid ""
"Without a transport key, one cannot:\n"
" \n"
-" - pull code from a server which doesn't allow global read access
\n"
+" - pull code from a server which doesn't allow global read "
+"access
\n"
" - push code to any server
\n"
" - run a Monotone server
\n"
"
"
-msgstr "Sin una clave de transporte no se puede:\n\n- descargar el código de un servidor que no permita acceso global de lectura
\n- subir código a cualquier servidor
\n- ejecutar un servidor Monotone
\n
"
+msgstr ""
+"Sin una clave de transporte no se puede:\n"
+"\n"
+"- descargar el código de un servidor que no permita acceso global de "
+"lectura
\n"
+"- subir código a cualquier servidor
\n"
+"- ejecutar un servidor Monotone
\n"
+"
"
#: i2p2www/pages/site/get-involved/guides/monotone.html:83
msgid ""
@@ -2494,39 +3709,63 @@ msgid ""
" \n"
" - commit any code
\n"
"
"
-msgstr "Sin una clave de subida no se puede:\n\n- subir ningún código
\n
"
+msgstr ""
+"Sin una clave de subida no se puede:\n"
+"\n"
+"- subir ningún código
\n"
+"
"
#: i2p2www/pages/site/get-involved/guides/monotone.html:92
msgid ""
"If you only intend to retrieve code from MTN, feel free to skip to the\n"
-" next section. If you want\n"
+" next section. "
+"If you want\n"
" to generate keys, read the following."
-msgstr "So sólo desea obtener el código de MTN salte a la siguiente sección. Si desea generar las claves siga leyendo aquí."
+msgstr ""
+"So sólo desea obtener el código de MTN salte a la siguiente sección. Si desea generar "
+"las claves siga leyendo aquí."
#: i2p2www/pages/site/get-involved/guides/monotone.html:100
msgid ""
-"By convention keys are named like an e-mail addresses, but a corresponding e-mail\n"
+"By convention keys are named like an e-mail addresses, but a "
+"corresponding e-mail\n"
" address does not need to exist. For example, your keys might be named:"
-msgstr "Por convenio las claves son nombradas como una dirección de email, pero no es necesario que exista un email correspondiente. Por ejemplo, sus claves podrían llamarse:"
+msgstr ""
+"Por convenio las claves son nombradas como una dirección de email, pero "
+"no es necesario que exista un email correspondiente. Por ejemplo, sus "
+"claves podrían llamarse:"
#: i2p2www/pages/site/get-involved/guides/monotone.html:111
msgid ""
-"Monotone stores keys under $HOME/.monotone/keys
in text files which\n"
+"Monotone stores keys under $HOME/.monotone/keys
in "
+"text files which\n"
" are named identically to the keys. For example:"
-msgstr "Monotone guarda las claves en $HOME/.monotone/keys
en archivos de texto que se llaman exactamente igual que la clave. Por ejemplo:"
+msgstr ""
+"Monotone guarda las claves en $HOME/.monotone/keys
en"
+" archivos de texto que se llaman exactamente igual que la clave. Por "
+"ejemplo:"
#: i2p2www/pages/site/get-involved/guides/monotone.html:121
msgid ""
"To generate transport and commit keys, enter the following commands at a "
"prompt:"
-msgstr "Para generar las claves de transporte y subida ejecute los siguientes comandos en la terminal:"
+msgstr ""
+"Para generar las claves de transporte y subida ejecute los siguientes "
+"comandos en la terminal:"
#: i2p2www/pages/site/get-involved/guides/monotone.html:131
msgid ""
-"Monotone will prompt you for a password to protect your keys. You are very strongly encouraged to set a password\n"
-" for the commit key. Many users will leave an empty password for the transport key, especially those running a\n"
+"Monotone will prompt you for a password to protect your keys. You are "
+"very strongly encouraged to set a password\n"
+" for the commit key. Many users will leave an empty password for the "
+"transport key, especially those running a\n"
" Monotone server."
-msgstr "Monotone le pedirá una contraseña para proteger sus claves. Se recomienda encarecidamente usar una contraseña para la clave de subida. Muchos usuarios dejan la contraseña de transporte en blanco, sobre todo los que ejecutan un servidor Monotone."
+msgstr ""
+"Monotone le pedirá una contraseña para proteger sus claves. Se recomienda"
+" encarecidamente usar una contraseña para la clave de subida. Muchos "
+"usuarios dejan la contraseña de transporte en blanco, sobre todo los que "
+"ejecutan un servidor Monotone."
#: i2p2www/pages/site/get-involved/guides/monotone.html:139
msgid "Trust, and initializing your repository"
@@ -2534,32 +3773,59 @@ msgstr "Confianza e iniciando su repositorio"
#: i2p2www/pages/site/get-involved/guides/monotone.html:143
msgid ""
-"Monotone's security model helps to ensure that nobody can easily impersonate a developer without\n"
-" it being noticed. Since developers can make mistakes and become compromised,only manual review can\n"
-" ensure quality of code. Monotone's trust model will ensure that you read the right diffs. It does\n"
+"Monotone's security model helps to ensure that nobody can easily "
+"impersonate a developer without\n"
+" it being noticed. Since developers can make mistakes and become "
+"compromised,only manual review can\n"
+" ensure quality of code. Monotone's trust model will ensure that you "
+"read the right diffs. It does\n"
" not replace reading diffs."
-msgstr "El modelo de seguridad de Monotone ayuda a asegurar que nadie puede suplantar a un programador fácilmente si ser detectado. Ya que los programadores pueden cometer errores y pueden ser comprometidos, sólo una revisión manual puede asegurar la calidad del código. El modelo de confianza de Monotone se asegura de que usted sólo lea los cambios correctos. No reemplaza los cambios de lectura."
+msgstr ""
+"El modelo de seguridad de Monotone ayuda a asegurar que nadie puede "
+"suplantar a un programador fácilmente si ser detectado. Ya que los "
+"programadores pueden cometer errores y pueden ser comprometidos, sólo una"
+" revisión manual puede asegurar la calidad del código. El modelo de "
+"confianza de Monotone se asegura de que usted sólo lea los cambios "
+"correctos. No reemplaza los cambios de lectura."
#: i2p2www/pages/site/get-involved/guides/monotone.html:153
msgid ""
-"A Monotone repository is a single file (a compressed SQLite database) which "
-"contains all of the project's source code and history."
-msgstr "Un repositorio Monotono es un solo archivo (comprimido en una base de datos SQLite) que contiene todo el código del proyecto y su historial."
+"A Monotone repository is a single file (a compressed SQLite database) "
+"which contains all of the project's source code and history."
+msgstr ""
+"Un repositorio Monotono es un solo archivo (comprimido en una base de "
+"datos SQLite) que contiene todo el código del proyecto y su historial."
#: i2p2www/pages/site/get-involved/guides/monotone.html:159
msgid ""
-"After importing the developers' keys into Monotone and\n"
-" setting up trust evaluation hooks,\n"
-" Monotone will prevent untrusted code from being checked out into your workspace.\n"
-" There are commands available to clean untrusted code from your workspace but in practice they've not been\n"
+"After importing the "
+"developers' keys into Monotone and\n"
+" setting up trust "
+"evaluation hooks,\n"
+" Monotone will prevent untrusted code from being checked out into your "
+"workspace.\n"
+" There are commands available to clean untrusted code from your "
+"workspace but in practice they've not been\n"
" needed due to the push access policies in place."
-msgstr "Después de importar las claves de los desarrolladores hacia Monotone y de Establecer enganches ('hooks') de evaluación de confianza, mediante esta monitorización Monotone evitará que cualquier código que no sea de confianza sea subido a su espacio de trabajo.\nExisten comandos disponibles para eliminar el código no confiable de su espacio de trabajo, pero en la práctica no se han necesitado debido a las políticas acceso a actualizaciones activas ('push') que se aplican."
+msgstr ""
+"Después de importar "
+"las claves de los desarrolladores hacia Monotone y de Establecer enganches ('hooks') de"
+" evaluación de confianza, mediante esta monitorización Monotone "
+"evitará que cualquier código que no sea de confianza sea subido a su "
+"espacio de trabajo.\n"
+"Existen comandos disponibles para eliminar el código no confiable de su "
+"espacio de trabajo, pero en la práctica no se han necesitado debido a las"
+" políticas acceso a actualizaciones activas ('push') que se aplican."
#: i2p2www/pages/site/get-involved/guides/monotone.html:169
msgid ""
-"A repository can hold many branches. For example, our repository holds the\n"
+"A repository can hold many branches. For example, our repository holds "
+"the\n"
" following main branches:"
-msgstr "Un repositorio puede almacenar muchas ramas. Por ejemplo, nuestro repositorio almacena las siguientes ramas principales:"
+msgstr ""
+"Un repositorio puede almacenar muchas ramas. Por ejemplo, nuestro "
+"repositorio almacena las siguientes ramas principales:"
#: i2p2www/pages/site/get-involved/guides/monotone.html:174
msgid "The I2P router and associated programs"
@@ -2575,85 +3841,155 @@ msgstr "Syndie, una herramienta de forums distribuídos."
#: i2p2www/pages/site/get-involved/guides/monotone.html:181
msgid ""
-"By convention, the I2P Monotone repository is named i2p.mtn
. Before pulling\n"
-" source code from servers, a database for your repository will need to be initialized.\n"
-" To initialize your local repository, change into the directory that you want the\n"
-" i2p.mtn
file and branch directories to be stored and issue the following\n"
+"By convention, the I2P Monotone repository is named i2p.mtn
."
+" Before pulling\n"
+" source code from servers, a database for your repository will need to "
+"be initialized.\n"
+" To initialize your local repository, change into the directory that you"
+" want the\n"
+" i2p.mtn
file and branch directories to be stored and issue"
+" the following\n"
" command:"
-msgstr "Por convención, el repositorio de I2P Monotone se llama i2p.mtn
. Antes de obtener\ncódigo fuente desde los servidores, es necesario que sea inicializada una\nbase de datos para su repositorio. Para inicializar su repositorio local vaya al directorio donde quiera que el fichero i2p.mtn
y los \nsubdirectorios sean guardados, y use el siguiente comando:"
+msgstr ""
+"Por convención, el repositorio de I2P Monotone se llama "
+"i2p.mtn
. Antes de obtener\n"
+"código fuente desde los servidores, es necesario que sea inicializada una"
+"\n"
+"base de datos para su repositorio. Para inicializar su repositorio local "
+"vaya al directorio donde quiera que el fichero i2p.mtn
y los"
+" \n"
+"subdirectorios sean guardados, y use el siguiente comando:"
#: i2p2www/pages/site/get-involved/guides/monotone.html:197
msgid ""
-"Keys which developers use to commit code are essential for trust evaluation in\n"
-" Monotone. The other developers' transport keys are only required for Monotone server operators.\n"
+"Keys which developers use to commit code are essential for trust "
+"evaluation in\n"
+" Monotone. The other developers' transport keys are only required for "
+"Monotone server operators.\n"
" "
-msgstr "Las claves que los desarrolladores usan para consignar ('commit') código son esenciales para la evaluación de confianza en Monotone. Las otras claves de transporte de desarrolladores sólo son requeridas para operadores de servidor Monotone."
+msgstr ""
+"Las claves que los desarrolladores usan para consignar ('commit') código "
+"son esenciales para la evaluación de confianza en Monotone. Las otras "
+"claves de transporte de desarrolladores sólo son requeridas para "
+"operadores de servidor Monotone."
#: i2p2www/pages/site/get-involved/guides/monotone.html:204
#, python-format
msgid ""
"Developers' commit keys are provided GPG-signed on another page."
-msgstr "Las claves de consignación ('commit') de desarrolladores se proporcionan firmadas-con-GPG en otra página."
+msgstr ""
+"Las claves de consignación ('commit') de desarrolladores se proporcionan "
+"firmadas-con-GPG en otra página."
#: i2p2www/pages/site/get-involved/guides/monotone.html:210
#, python-format
msgid ""
-"To import developers' keys after verifying their authenticity, copy all of the keys into a new\n"
-" file. Create this file (e.g. keys.txt
) in the same directory where i2p.mtn
is located. Import the keys with the command:"
-msgstr "Para importar claves de desarrollador tras verificar sus autenticidades, copie todas las claves\nen un nuevo fichero. Cree este fichero (ej. keys.txt
) en el mismo directorio\ndonde i2p.mtn
resida. Luego importe las claves con el comando:"
+"To import developers' keys after verifying their authenticity, copy all of the keys into a new\n"
+" file. Create this file (e.g. keys.txt
) in the same "
+"directory where i2p.mtn
is located. Import the keys with the"
+" command:"
+msgstr ""
+"Para importar claves de desarrollador tras verificar sus autenticidades, "
+"copie todas las claves\n"
+"en un nuevo fichero. Cree este fichero (ej. keys.txt
)"
+" en el mismo directorio\n"
+"donde i2p.mtn
resida. Luego importe las claves con el "
+"comando:"
#: i2p2www/pages/site/get-involved/guides/monotone.html:220
msgid ""
"Note: Never add keys to "
"$HOME/.monotone/keys
manually."
-msgstr "Nota: Nunca añada claves a $HOME/.monotone/keys
manualmente."
+msgstr ""
+"Nota: Nunca añada claves a "
+"$HOME/.monotone/keys
manualmente."
#: i2p2www/pages/site/get-involved/guides/monotone.html:228
msgid ""
-"The default Monotone trust policy is way too lax for our requirements: every committer is trusted by default.\n"
+"The default Monotone trust policy is way too lax for our requirements: "
+"every committer is trusted by default.\n"
" That is not acceptable for I2P development."
-msgstr "La política de confianza de monotone es demasiada relajada para nuestras necesidades: todos los colaboradores son de confianza por defecto. Esto no es aceptable para el desarrollo de I2P."
+msgstr ""
+"La política de confianza de monotone es demasiada relajada para nuestras "
+"necesidades: todos los colaboradores son de confianza por defecto. Esto "
+"no es aceptable para el desarrollo de I2P."
#: i2p2www/pages/site/get-involved/guides/monotone.html:235
msgid ""
-"Change into the directory $HOME/.monotone
and open the file\n"
-" monotonerc
with a text editor. Copy and paste the following two functions into this file:"
-msgstr "Vaya al directorio $HOME/.monotone
y abra el fichero monotonerc
con un\neditor de texto. Copie y pegue las dos siguientes funciones en este fichero:"
+"Change into the directory $HOME/.monotone
and open "
+"the file\n"
+" monotonerc
with a text editor. Copy and paste the "
+"following two functions into this file:"
+msgstr ""
+"Vaya al directorio $HOME/.monotone
y abra el fichero "
+"monotonerc
con un\n"
+"editor de texto. Copie y pegue las dos siguientes funciones en este "
+"fichero:"
#: i2p2www/pages/site/get-involved/guides/monotone.html:244
msgid ""
-"The first function determines an intersection between two sets, in our case a\n"
+"The first function determines an intersection between two sets, in our "
+"case a\n"
" revision's signers and trusted signers."
-msgstr "La primera función determina una intersección entre dos grupos, en nuestro caso los firmantes de la revisión y los firmantes de confianza."
+msgstr ""
+"La primera función determina una intersección entre dos grupos, en "
+"nuestro caso los firmantes de la revisión y los firmantes de confianza."
#: i2p2www/pages/site/get-involved/guides/monotone.html:251
msgid ""
-"The second function determines trust in a given revision, by calling the first\n"
-" function with \"signers\" and \"trusted\" as arguments. If the intersection is\n"
-" null, the revision is not trusted. If the intersection is not empty, the\n"
+"The second function determines trust in a given revision, by calling the "
+"first\n"
+" function with \"signers\" and \"trusted\" as arguments. If the "
+"intersection is\n"
+" null, the revision is not trusted. If the intersection is not empty, "
+"the\n"
" revision is trusted. Otherwise, the revision is not trusted."
-msgstr "La segunda función determina la confianza en una revisión dada, mediante una llamada a la primera con \"signers\" (firmantes) y \"trusted\" (confiables) como argumentos. Si la intersección de ambos \nes nula, no es confiable. Si la intersección no está vacía, la revisión \nes confiable. De otra manera, la revisión no es confiable."
+msgstr ""
+"La segunda función determina la confianza en una revisión dada, mediante "
+"una llamada a la primera con \"signers\" (firmantes) y \"trusted\" "
+"(confiables) como argumentos. Si la intersección de ambos \n"
+"es nula, no es confiable. Si la intersección no está vacía, la revisión \n"
+"es confiable. De otra manera, la revisión no es confiable."
#: i2p2www/pages/site/get-involved/guides/monotone.html:260
msgid ""
"More information about Trust Evaluation Hooks can be found in the official Monotone "
"documentation."
-msgstr "Más información acerca de enganches ('hooks') de evaluación de confianza puede encontrarse documentación oficial de Monotone."
+msgstr ""
+"Más información acerca de enganches ('hooks') de evaluación de confianza "
+"puede encontrarse documentación oficial de "
+"Monotone."
#: i2p2www/pages/site/get-involved/guides/monotone.html:268
msgid ""
-"I2P is shipped with a pre-configured tunnel pointing to the project Monotone server. Ensure that the tunnel has been started\n"
-" within I2PTunnel before attempting to pull the source code from 127.0.0.1:8998."
-msgstr "I2P se entrega con un túnel preconfigurado apuntando al servidor del proyecto Monotone. Asegúrese de que el túnel ha sido iniciado\ndentro de I2PTunnel antes de intentar obtener (pull) el código fuente desde 127.0.0.1:8998"
+"I2P is shipped with a pre-configured tunnel pointing to the project "
+"Monotone server. Ensure that the tunnel has been started\n"
+" within I2PTunnel before"
+" attempting to pull the source code from 127.0.0.1:8998."
+msgstr ""
+"I2P se entrega con un túnel preconfigurado apuntando al servidor del "
+"proyecto Monotone. Asegúrese de que el túnel ha sido iniciado\n"
+"dentro de I2PTunnel antes"
+" de intentar obtener (pull) el código fuente desde 127.0.0.1:8998"
#: i2p2www/pages/site/get-involved/guides/monotone.html:275
msgid ""
-"Enter the directory where you initialized i2p.mtn
. Depending on whether you\n"
-" want only I2P sources, or also sources for the I2P website and Syndie, you can\n"
+"Enter the directory where you initialized i2p.mtn
. Depending"
+" on whether you\n"
+" want only I2P sources, or also sources for the I2P website and Syndie, "
+"you can\n"
" perform the pull
operation in different ways."
-msgstr "Entre en el directorio donde inicializó i2p.mtn
. Dependiendo de si\nquiere sólo el código fuente de I2P, o también quiere el código del sitio web\nde I2P y Syndie, puede realizar pull
(obtención)\nde diferentes maneras."
+msgstr ""
+"Entre en el directorio donde inicializó i2p.mtn
. Dependiendo"
+" de si\n"
+"quiere sólo el código fuente de I2P, o también quiere el código del sitio"
+" web\n"
+"de I2P y Syndie, puede realizar pull
(obtención)\n"
+"de diferentes maneras."
#: i2p2www/pages/site/get-involved/guides/monotone.html:283
msgid "If you only want I2P sources:"
@@ -2665,16 +4001,26 @@ msgstr "Si quiere todas las ramas de desarrollo (`branches`): "
#: i2p2www/pages/site/get-involved/guides/monotone.html:298
msgid ""
-"If the transfer aborts before completing sucessfully, simply repeating the "
-"pull command will resume the transfer."
-msgstr "Si la transferencia se interrumpe antes de completarse con éxito, \nsimplemente repitiendo el comando pull se retomará la transferencia."
+"If the transfer aborts before completing sucessfully, simply repeating "
+"the pull command will resume the transfer."
+msgstr ""
+"Si la transferencia se interrumpe antes de completarse con éxito, \n"
+"simplemente repitiendo el comando pull se retomará la transferencia."
#: i2p2www/pages/site/get-involved/guides/monotone.html:304
msgid ""
-"Pulling in the above examples is done anonymously by specifying an empty transport key.\n"
-" If everyone pulls anonymously it will be harder for an attacker who gains control of the server\n"
+"Pulling in the above examples is done anonymously by specifying an empty "
+"transport key.\n"
+" If everyone pulls anonymously it will be harder for an attacker who "
+"gains control of the server\n"
" to selectively provide some people with tampered data."
-msgstr "La obtención (`pulling`) en los ejemplos anteriores se realiza anónimamente \nespecificando una clave de transporte vacía. Si todos realizaran obtenciones anónimas\nserá más difícil para un atacante que gane control en el servidor, proporcionar datos falsos selectivamente a algunas personas."
+msgstr ""
+"La obtención (`pulling`) en los ejemplos anteriores se realiza "
+"anónimamente \n"
+"especificando una clave de transporte vacía. Si todos realizaran "
+"obtenciones anónimas\n"
+"será más difícil para un atacante que gane control en el servidor, "
+"proporcionar datos falsos selectivamente a algunas personas."
#: i2p2www/pages/site/get-involved/guides/monotone.html:315
msgid "To verify that trust evaluation works:"
@@ -2688,63 +4034,103 @@ msgstr "Haga una copia de respaldo de su fichero monotonerc
."
msgid ""
"Modify monotonerc
by setting the trusted_signers "
"variable in the following way:"
-msgstr "Modifique monotonerc
estableciendo la variable trusted_signers (firmantes confiables) de la siguiente manera:"
+msgstr ""
+"Modifique monotonerc
estableciendo la variable "
+"trusted_signers (firmantes confiables) de la siguiente manera:"
#: i2p2www/pages/site/get-involved/guides/monotone.html:326
msgid ""
-"With monotonerc
configured as above, Monotone will no longer trust any committers. Confirm this by changing into the\n"
-"directory where i2p.mtn
was created and attempt a checkout of the I2P branch:"
-msgstr "Con monotonerc
configurado de la forma previa, Monotone no confiará en adelante en ninguno de los consignadores (`committers`). Confirme esto llendo al directorio donde i2p.mtn
fue creado, e intente una revisión de la rama de I2P:"
+"With monotonerc
configured as above, Monotone will no"
+" longer trust any committers. Confirm this by changing into the\n"
+"directory where i2p.mtn
was created and attempt a checkout "
+"of the I2P branch:"
+msgstr ""
+"Con monotonerc
configurado de la forma previa, "
+"Monotone no confiará en adelante en ninguno de los consignadores "
+"(`committers`). Confirme esto llendo al directorio donde "
+"i2p.mtn
fue creado, e intente una revisión de la rama de "
+"I2P:"
#: i2p2www/pages/site/get-involved/guides/monotone.html:336
msgid ""
-"A directory named i2p.i2p
should not appear. You should encounter many\n"
+"A directory named i2p.i2p
should not appear. You "
+"should encounter many\n"
" error messages like:"
-msgstr "Un directorio llamado i2p.i2p
no debería aparecer. Debería encontrar muchos mensajes de error como: "
+msgstr ""
+"Un directorio llamado i2p.i2p
no debería aparecer. "
+"Debería encontrar muchos mensajes de error como: "
#: i2p2www/pages/site/get-involved/guides/monotone.html:353
msgid ""
"If you are satisfied with results, restore the backup of\n"
-" monotonerc
that was created above. If you didn't create a backup\n"
-" as advised, re-read Setting up trust evaluation hooks."
-msgstr "Si está satisfecho con el resultado, restaure monotonerc
desde la copia de seguridad que fue creada antes. Si no creó una copia de seguridad como se le aconsejó, vuelva a leer Establecer enganches ('hooks') de evaluación de confianza (monitorización)."
+" monotonerc
that was created above. If you didn't create a "
+"backup\n"
+" as advised, re-read Setting up trust evaluation hooks."
+msgstr ""
+"Si está satisfecho con el resultado, restaure monotonerc
"
+"desde la copia de seguridad que fue creada antes. Si no creó una copia de"
+" seguridad como se le aconsejó, vuelva a leer Establecer enganches ('hooks') de evaluación de "
+"confianza (monitorización)."
#: i2p2www/pages/site/get-involved/guides/monotone.html:364
msgid ""
-"If you already have a branch checked out, skip to the next\n"
+"If you already have a branch checked out, skip to the next\n"
" section."
-msgstr "Si ya ha comprobado (`checkout`) un ramal de desarrollo (`branch`),\npase a la siguiente sección."
+msgstr ""
+"Si ya ha comprobado (`checkout`) un ramal de desarrollo (`branch`),\n"
+"pase a la siguiente sección."
#: i2p2www/pages/site/get-involved/guides/monotone.html:371
msgid ""
-"Change into the directory where i2p.mtn
is located. Over there "
-"issue:"
+"Change into the directory where i2p.mtn
is located. Over "
+"there issue:"
msgstr "Cambie al directorio donde se emplace i2p.mtn
. Allí ejecute:"
#: i2p2www/pages/site/get-involved/guides/monotone.html:380
msgid ""
-"The checkout should complete without error messages and a directory named\n"
-" i2p.i2p
should appear in the current directory. Congratulations! You have\n"
+"The checkout should complete without error messages and a directory named"
+"\n"
+" i2p.i2p
should appear in the current directory. "
+"Congratulations! You have\n"
" successfully checked out the latest I2P sources, ready to be compiled."
-msgstr "La comprobacion (`checkout`) debería completarse sin mensajes de error, y un \ndirectorio llamado i2p.i2p
debería aparecer en el directorio actual. \n¡Felicidades! Ha comprobado el último código fuente de I2P con éxito. está listo \npara ser compilado."
+msgstr ""
+"La comprobacion (`checkout`) debería completarse sin mensajes de error, y"
+" un \n"
+"directorio llamado i2p.i2p
debería aparecer en el directorio"
+" actual. \n"
+"¡Felicidades! Ha comprobado el último código fuente de I2P con éxito. "
+"está listo \n"
+"para ser compilado."
#: i2p2www/pages/site/get-involved/guides/monotone.html:391
msgid ""
-"If you haven't done this already, pull fresh code from the server to your local\n"
-" Monotone repository. To accomplish this, change into the directory where\n"
+"If you haven't done this already, pull fresh code from the server to your"
+" local\n"
+" Monotone repository. To accomplish this, change into the directory "
+"where\n"
" i2p.mtn
is located and issue:"
-msgstr "Si no ha hecho esto ya, sincronice su repositorio local con código\nfresco desde el servidor. Para lograr esto, vaya al directorio donde se\nemplace i2p.mtn
y ejecute:"
+msgstr ""
+"Si no ha hecho esto ya, sincronice su repositorio local con código\n"
+"fresco desde el servidor. Para lograr esto, vaya al directorio donde se\n"
+"emplace i2p.mtn
y ejecute:"
#: i2p2www/pages/site/get-involved/guides/monotone.html:402
-msgid ""
-"Now change into your i2p.i2p
directory, and over there issue:"
+msgid "Now change into your i2p.i2p
directory, and over there issue:"
msgstr "Ahora vaya a su directorio i2p.i2p
, y allí ejecute:"
#: i2p2www/pages/site/get-involved/guides/monotone.html:411
msgid ""
-"As long as there were no errors…Congratulations! You have successfully updated to the latest I2P sources. They\n"
+"As long as there were no errors…Congratulations! You have "
+"successfully updated to the latest I2P sources. They\n"
" should be ready to compile."
-msgstr "En tanto no haya errores…¡Felicidades! Ha realizado la actualización \nal último código fuente de I2P con éxito. Debe estar listo para compilar."
+msgstr ""
+"En tanto no haya errores…¡Felicidades! Ha realizado la "
+"actualización \n"
+"al último código fuente de I2P con éxito. Debe estar listo para compilar."
#: i2p2www/pages/site/get-involved/guides/monotone.html:420
msgid "Obtaining and deploying developers' transport keys"
@@ -2754,7 +4140,9 @@ msgstr "Obtención y despliegue de claves de transporte de desarrolladores"
msgid ""
"As a server operator you may want to grant push access to certain "
"developers."
-msgstr "Como operador de servidor, podría querer otorgar acceso a modificación\n(`push`) del código a ciertos desarrolladores."
+msgstr ""
+"Como operador de servidor, podría querer otorgar acceso a modificación\n"
+"(`push`) del código a ciertos desarrolladores."
#: i2p2www/pages/site/get-involved/guides/monotone.html:431
msgid "By default the Monotone server denies all access."
@@ -2762,13 +4150,18 @@ msgstr "El servidor Monotone deniega todo acceso por defecto."
#: i2p2www/pages/site/get-involved/guides/monotone.html:437
msgid "To grant pull access to all clients, set the following in"
-msgstr "Para garantizar acceso de sincronización local (`pull`) a todos los clientes, \nconfigure lo siguiente en "
+msgstr ""
+"Para garantizar acceso de sincronización local (`pull`) a todos los "
+"clientes, \n"
+"configure lo siguiente en "
#: i2p2www/pages/site/get-involved/guides/monotone.html:449
msgid ""
-"No one will not be able to push code to your server without permission being"
-" explicitly granted. To grant push access:"
-msgstr "Nadie será capaz de modificar código en su servidor (`push`) sin serle \notorgado permiso explícito. Para otorgar acceso de modificación:"
+"No one will not be able to push code to your server without permission "
+"being explicitly granted. To grant push access:"
+msgstr ""
+"Nadie será capaz de modificar código en su servidor (`push`) sin serle \n"
+"otorgado permiso explícito. Para otorgar acceso de modificación:"
#: i2p2www/pages/site/get-involved/guides/monotone.html:455
msgid ""
@@ -2779,48 +4172,99 @@ msgid ""
" complication-transport@mail.i2p\n"
"
\n"
"with one key per line."
-msgstr "Añada el nombre de la clave de transporte del usuario en \n$HOME/.monotone/write-permissions
como\n\nzzz-transport@mail.i2p\ncomplication-transport@mail.i2p\n
\ncon una clave por línea."
+msgstr ""
+"Añada el nombre de la clave de transporte del usuario en \n"
+"$HOME/.monotone/write-permissions
como\n"
+"\n"
+"zzz-transport@mail.i2p\n"
+"complication-transport@mail.i2p\n"
+"
\n"
+"con una clave por línea."
#: i2p2www/pages/site/get-involved/guides/monotone.html:466
msgid ""
-"Import the transport key(s) into your database. The procedure for importing transport keys is the same as for\n"
-"importing commit keys, which is described in the section Obtaining and deploying developers' keys."
-msgstr "Importe la(s) clave(s) de transporte a su base de datos. El procedimiento \npara importar claves \nde transporte es el mismo que para importar claves de consignación (`commit`), que se describe en \nla sección Obtención y despliegue de claves de transporte de desarrolladores."
+"Import the transport key(s) into your database. The procedure for "
+"importing transport keys is the same as for\n"
+"importing commit keys, which is described in the section Obtaining and deploying "
+"developers' keys."
+msgstr ""
+"Importe la(s) clave(s) de transporte a su base de datos. El procedimiento"
+" \n"
+"para importar claves \n"
+"de transporte es el mismo que para importar claves de consignación "
+"(`commit`), que se describe en \n"
+"la sección Obtención"
+" y despliegue de claves de transporte de desarrolladores."
#: i2p2www/pages/site/get-involved/guides/monotone.html:476
msgid ""
-"A separate database should be used for your Monotone server because monotone will lock the database while it is served to others.\n"
+"A separate database should be used for your Monotone server because "
+"monotone will lock the database while it is served to others.\n"
" Make a copy of your development database, then start the server with:"
-msgstr "Se debe usar una base de datos aparte para su servidor Monotone porque Monotone bloqueará la base de datos mientras sea servida a otros. \nHaga una copia de su base de datos de desarrollo, y luego inicie el servidor con: "
+msgstr ""
+"Se debe usar una base de datos aparte para su servidor Monotone porque "
+"Monotone bloqueará la base de datos mientras sea servida a otros. \n"
+"Haga una copia de su base de datos de desarrollo, y luego inicie el "
+"servidor con: "
#: i2p2www/pages/site/get-involved/guides/monotone.html:483
msgid ""
-"If your key is protected with a passphrase, Monotone may request the passphrase\n"
-" when the first client connects. You can work around this by connecting making the first client connection to your server\n"
+"If your key is protected with a passphrase, Monotone may request the "
+"passphrase\n"
+" when the first client connects. You can work around this by connecting "
+"making the first client connection to your server\n"
" (or by clearing the password for your transport key)."
-msgstr "Si su clave está protegida con una frase-contraseña, Monotone puede requerir\nla frase-contraseña cuando conecte el primer cliente. Puede evitar esto realizando \nusted la primera conexión de cliente a su servidor (o eliminando la contraseña \npara su clave de transporte)."
+msgstr ""
+"Si su clave está protegida con una frase-contraseña, Monotone puede "
+"requerir\n"
+"la frase-contraseña cuando conecte el primer cliente. Puede evitar esto "
+"realizando \n"
+"usted la primera conexión de cliente a su servidor (o eliminando la "
+"contraseña \n"
+"para su clave de transporte)."
#: i2p2www/pages/site/get-involved/guides/monotone.html:491
msgid ""
-"For your server to be accessible for others over I2P, you will need to create a\n"
-" server tunnel for it. Use the \"Standard\" tunnel type and \"Bulk\" profile."
-msgstr "Para que su servidor sea accesible para otros sobre I2P, tendrá que crear un \ntúnel de servidor para él. Use el tipo de túnel \"Standard\" y el perfil \"Bulk\" (masivo)."
+"For your server to be accessible for others over I2P, you will need to "
+"create a\n"
+" server tunnel for it. Use the \"Standard\" tunnel type and \"Bulk\" "
+"profile."
+msgstr ""
+"Para que su servidor sea accesible para otros sobre I2P, tendrá que crear"
+" un \n"
+"túnel de servidor para él. Use el tipo de túnel \"Standard\" y el perfil "
+"\"Bulk\" (masivo)."
#: i2p2www/pages/site/get-involved/guides/monotone.html:501
msgid ""
"Debian (amongst other distributions) has integrated Monotone into their\n"
-" framework of daemons/services. Although Monotone servers can still be run\n"
-" \"the ordinary way\" on Debian systems, doing it the \"Debian way\" may be more straightforward."
-msgstr "Debian (entre otras distribuciones) tiene integrado Monotone en sus \nestructuras demonios/servicios. Aunque los servidores Monotone aún\nse pueden ejecutar \"de la forma corriente\" en sistemas Debian, hacerlo\n\"de la forma Debian\" podría ser más apropiado."
+" framework of daemons/services. Although Monotone servers can still be "
+"run\n"
+" \"the ordinary way\" on Debian systems, doing it the \"Debian way\" may"
+" be more straightforward."
+msgstr ""
+"Debian (entre otras distribuciones) tiene integrado Monotone en sus \n"
+"estructuras demonios/servicios. Aunque los servidores Monotone aún\n"
+"se pueden ejecutar \"de la forma corriente\" en sistemas Debian, hacerlo\n"
+"\"de la forma Debian\" podría ser más apropiado."
#: i2p2www/pages/site/get-involved/guides/monotone.html:509
msgid ""
"Permissions are granted by editing the files\n"
" /etc/monotone/read-permissions
and\n"
" /etc/monotone/write-permissions
. You'll also need to edit\n"
-" /etc/default/monotone
to enable monotone to start at boot or to\n"
+" /etc/default/monotone
to enable monotone to start at boot "
+"or to\n"
" customize the host, port, or database location."
-msgstr "Los permisos se otorgan editando los ficheros\n/etc/monotone/read-permissions
y \n/etc/monotone/write-permissions
. También tendrá que editar \n/etc/default/monotone
para hacer que Monotone se inicie \nen el arranque o para ajustar anfitrión (`host`), puerto, o emplazamiento \nde la base de datos."
+msgstr ""
+"Los permisos se otorgan editando los ficheros\n"
+"/etc/monotone/read-permissions
y \n"
+"/etc/monotone/write-permissions
. También tendrá que editar \n"
+"/etc/default/monotone
para hacer que Monotone se inicie \n"
+"en el arranque o para ajustar anfitrión (`host`), puerto, o emplazamiento"
+" \n"
+"de la base de datos."
#: i2p2www/pages/site/get-involved/guides/new-developers.html:2
msgid "New Developer's Guide"
@@ -2831,8 +4275,13 @@ msgid ""
"\n"
"So you want to start work on I2P? Great!\n"
"Here's a quick guide to getting started\n"
-"on contributing to the website or the software, doing development or creating translations."
-msgstr "\n¿Entonces, quiere empezar a trabajar en I2P? ¡Bien! Aquí tiene una pequeña guía de como empezar contribuyendo, con la web o con el software, programando código o traduciendo."
+"on contributing to the website or the software, doing development or "
+"creating translations."
+msgstr ""
+"\n"
+"¿Entonces, quiere empezar a trabajar en I2P? ¡Bien! Aquí tiene una "
+"pequeña guía de como empezar contribuyendo, con la web o con el software,"
+" programando código o traduciendo."
#: i2p2www/pages/site/get-involved/guides/new-developers.html:9
#, python-format
@@ -2840,7 +4289,10 @@ msgid ""
"\n"
"Not quite ready for coding?\n"
"Try getting involved first."
-msgstr "\n¿Aún no está listo para programar? Pruebe primero a involucrarse en el proyecto."
+msgstr ""
+"\n"
+"¿Aún no está listo para programar? Pruebe primero a involucrarse en el proyecto."
#: i2p2www/pages/site/get-involved/guides/new-developers.html:16
#: i2p2www/pages/site/get-involved/guides/new-developers.html:27
@@ -2884,9 +4336,15 @@ msgstr "Herramientas"
#: i2p2www/pages/site/get-involved/guides/new-developers.html:29
msgid ""
-"Basic development on the I2P router or the embedded applications uses Java as the main development language.\n"
-"If you don't have experience with Java, you can always have a look at Thinking in Java."
-msgstr "El desarrollo básico del ruter de I2P y de las aplicaciones del núcleo utilizan Java como lenguaje de programación. Si no tiene experiencia con Java, siempre puede echarle un ojo a Thinking in Java."
+"Basic development on the I2P router or the embedded applications uses "
+"Java as the main development language.\n"
+"If you don't have experience with Java, you can always have a look at Thinking in Java."
+msgstr ""
+"El desarrollo básico del ruter de I2P y de las aplicaciones del núcleo "
+"utilizan Java como lenguaje de programación. Si no tiene experiencia con "
+"Java, siempre puede echarle un ojo a Thinking in Java."
#: i2p2www/pages/site/get-involved/guides/new-developers.html:33
#, python-format
@@ -2895,66 +4353,102 @@ msgid ""
"the other \"how\" documents,\n"
"the tech intro,\n"
"and associated documents.\n"
-"These will give you a good overview of how I2P is structured and what different things it does."
-msgstr "Estudie la introducción de cómo, los otros \"como\" documentos, la introducción técnica, y los documentos asociados. Esto le dará una buena vista general de como está estructurado y de qué otras cosas hace I2P."
+"These will give you a good overview of how I2P is structured and what "
+"different things it does."
+msgstr ""
+"Estudie la introducción de cómo, los otros \"como\" documentos, la introducción técnica, y los documentos "
+"asociados. Esto le dará una buena vista general de como está estructurado"
+" y de qué otras cosas hace I2P."
#: i2p2www/pages/site/get-involved/guides/new-developers.html:43
msgid ""
"For development on the i2p router or the embedded applications,\n"
"get the monotone source repository installed - short instructions:"
-msgstr "Para programar la consola de I2P o las aplicaciones principales, instale el código del repositorio de monotone - instrucciones rápidas:"
+msgstr ""
+"Para programar la consola de I2P o las aplicaciones principales, instale "
+"el código del repositorio de monotone - instrucciones rápidas:"
#: i2p2www/pages/site/get-involved/guides/new-developers.html:48
msgid ""
"Install monotone.\n"
"Monotone is a version control system.\n"
-"We use it because it allows us to keep track of who does what changes to the source code (and for a lot of complicated things, but 'keeping track of changes' is the basic idea)."
-msgstr "Instale monotone. Monotone es un sistema de control de versiones. Lo utilizamos porque nos permite llevar el control de quien cambia el código (y muchas cosas complicadas más, pero el control de los cambios es el motivo principal)"
+"We use it because it allows us to keep track of who does what changes to "
+"the source code (and for a lot of complicated things, but 'keeping track "
+"of changes' is the basic idea)."
+msgstr ""
+"Instale monotone. Monotone es un "
+"sistema de control de versiones. Lo utilizamos porque nos permite llevar "
+"el control de quien cambia el código (y muchas cosas complicadas más, "
+"pero el control de los cambios es el motivo principal)"
#: i2p2www/pages/site/get-involved/guides/new-developers.html:53
msgid ""
-"Skim over the monotone"
-" tutorial, to make sure you understand the concepts."
-msgstr "Eche una ojeada al tutorial de monotone para asegurarse de que entiende los conceptos"
+"Skim over the monotone tutorial,"
+" to make sure you understand the concepts."
+msgstr ""
+"Eche una ojeada al tutorial de "
+"monotone para asegurarse de que entiende los conceptos"
#: i2p2www/pages/site/get-involved/guides/new-developers.html:57
msgid ""
-"If you want to remain anonymous, you need to do an additional step, to set "
-"up a connection to a monotone server over I2P:"
-msgstr "Si desea permanecer anónimo necesita un paso adicional, configurar una conexión al servidor de monotone a través de I2P:"
+"If you want to remain anonymous, you need to do an additional step, to "
+"set up a connection to a monotone server over I2P:"
+msgstr ""
+"Si desea permanecer anónimo necesita un paso adicional, configurar una "
+"conexión al servidor de monotone a través de I2P:"
#: i2p2www/pages/site/get-involved/guides/new-developers.html:60
#, python-format
msgid ""
"Enable the i2ptunnel client tunnel on port "
"8998 pointing to mtn.i2p2.i2p."
-msgstr "Habilite el túnel cliente i2ptunnel en e puerto 8998 apuntando a mtn.i2p2.i2p."
+msgstr ""
+"Habilite el túnel cliente i2ptunnel en e "
+"puerto 8998 apuntando a mtn.i2p2.i2p."
#: i2p2www/pages/site/get-involved/guides/new-developers.html:64
msgid ""
"Pick a directory where you want to put all your I2P files, and create a "
"monotone database:"
-msgstr "Elija un directorio donde quiera poner todos los archivos de I2P, y cree una base de datos para monotone:"
+msgstr ""
+"Elija un directorio donde quiera poner todos los archivos de I2P, y cree "
+"una base de datos para monotone:"
#: i2p2www/pages/site/get-involved/guides/new-developers.html:67
msgid ""
-"Define the trust list by creating ~/.monotone/monotonerc
(or "
-"_MTN/monotonerc
in the i2p.i2p workspace) with the following "
-"contents:"
-msgstr "Defina la lista de confianza creando ~/.monotone/monotonerc
(o _MTN/monotonerc
en el área de trabajo de i2p.i2p ) con el siguiente contenido:"
+"Define the trust list by creating ~/.monotone/monotonerc
(or"
+" _MTN/monotonerc
in the i2p.i2p workspace) with the "
+"following contents:"
+msgstr ""
+"Defina la lista de confianza creando ~/.monotone/monotonerc
"
+"(o _MTN/monotonerc
en el área de trabajo de i2p.i2p ) con el"
+" siguiente contenido:"
#: i2p2www/pages/site/get-involved/guides/new-developers.html:72
#, python-format
msgid ""
-"Copy and paste the developer's commit keys into a new file (e.g. keys.txt
) in the same directory\n"
-" that i2p.mtn
is in. Import the keys into your database with mtn -d i2p.mtn read < keys.txt
"
-msgstr "Copie y pegue las claves de los desarrolladores en un nuevo archivo (por ejemplo keys.txt
) en el mismo directorio que está i2p.mtn
. Importe las claves a su base de datos con mtn -d i2p.mtn read < keys.txt
"
+"Copy and paste the developer's commit keys "
+"into a new file (e.g. keys.txt
) in the same directory\n"
+" that i2p.mtn
is in. Import the keys into your database "
+"with mtn -d i2p.mtn read < keys.txt
"
+msgstr ""
+"Copie y pegue las claves de los "
+"desarrolladores en un nuevo archivo (por ejemplo "
+"keys.txt
) en el mismo directorio que está "
+"i2p.mtn
. Importe las claves a su base de datos con "
+" mtn -d i2p.mtn read < keys.txt
"
#: i2p2www/pages/site/get-involved/guides/new-developers.html:76
msgid ""
-"Pull the I2P sources to your machine. This may take a long time, especially "
-"if you are doing this over I2P!"
-msgstr "Descargue el código de I2P a su ordenador. ¡Puede tardar bastante, sobre todo si lo hace a través de I2P!"
+"Pull the I2P sources to your machine. This may take a long time, "
+"especially if you are doing this over I2P!"
+msgstr ""
+"Descargue el código de I2P a su ordenador. ¡Puede tardar bastante, sobre "
+"todo si lo hace a través de I2P!"
#: i2p2www/pages/site/get-involved/guides/new-developers.html:78
msgid "Anonymously:"
@@ -2966,21 +4460,27 @@ msgstr "Sin anonimato:"
#: i2p2www/pages/site/get-involved/guides/new-developers.html:83
msgid ""
-"Alternatively, instead of 'mtn.i2p2.de', you can also download from mtn.i2p-"
-"projekt.de."
-msgstr "También puede descargarlo desde mtn.i2p-projekt.de además de 'mtn.i2p2.de'."
+"Alternatively, instead of 'mtn.i2p2.de', you can also download from mtn"
+".i2p-projekt.de."
+msgstr ""
+"También puede descargarlo desde mtn.i2p-projekt.de además de "
+"'mtn.i2p2.de'."
#: i2p2www/pages/site/get-involved/guides/new-developers.html:90
msgid ""
-"All the sources are now present on your machine, in the database file. To "
-"make them available in a directory, you need to check them out:"
-msgstr "Todo el código esta ahora en su ordenador, en al archivo de la base de datos. Para hacerlo accesible en el directorio necesita ejecutar:"
+"All the sources are now present on your machine, in the database file. To"
+" make them available in a directory, you need to check them out:"
+msgstr ""
+"Todo el código esta ahora en su ordenador, en al archivo de la base de "
+"datos. Para hacerlo accesible en el directorio necesita ejecutar:"
#: i2p2www/pages/site/get-involved/guides/new-developers.html:92
msgid ""
-"The above command creates a directory i2p.i2p, which contains all of the I2P"
-" sources."
-msgstr "El comando anterior crea el directorio i2p.i2p, el cual contiene todo el código de I2P."
+"The above command creates a directory i2p.i2p, which contains all of the "
+"I2P sources."
+msgstr ""
+"El comando anterior crea el directorio i2p.i2p, el cual contiene todo el "
+"código de I2P."
#: i2p2www/pages/site/get-involved/guides/new-developers.html:96
msgid "Remarks"
@@ -2989,53 +4489,78 @@ msgstr "Notas"
#: i2p2www/pages/site/get-involved/guides/new-developers.html:97
msgid ""
"\n"
-"To download the website files instead of the I2P source files, use 'i2p.www' instead of 'i2p.i2p'."
-msgstr "\nPara descargar la página web en vez del código use 'i2p.www' en vez de 'i2p.i2p'."
+"To download the website files instead of the I2P source files, use "
+"'i2p.www' instead of 'i2p.i2p'."
+msgstr ""
+"\n"
+"Para descargar la página web en vez del código use 'i2p.www' en vez de "
+"'i2p.i2p'."
#: i2p2www/pages/site/get-involved/guides/new-developers.html:100
msgid ""
"The initial pull may take several hours using the tunnel.\n"
-"If it fails after a partial pull, simply rerun it, it will start where it left off.\n"
+"If it fails after a partial pull, simply rerun it, it will start where it"
+" left off.\n"
"If you are in a hurry, use the non-anonymous access."
-msgstr "La descarga inicial puede tardar varias horas. Si falla después de una descarga parcial, simplemente vuelva a ejecutar el mismo comando y empezará donde lo dejó. Si tiene prisa use el sistema de acceso no anónimo"
+msgstr ""
+"La descarga inicial puede tardar varias horas. Si falla después de una "
+"descarga parcial, simplemente vuelva a ejecutar el mismo comando y "
+"empezará donde lo dejó. Si tiene prisa use el sistema de acceso no "
+"anónimo"
#: i2p2www/pages/site/get-involved/guides/new-developers.html:105
#, python-format
msgid ""
-"A full list of branches, including i2p.i2p and i2p.www can be found on viewmtn."
-msgstr "Una lista completa de servidores de descarga, incluyendo i2p.i2p y i2p.www puede encontrarse en viewmtn."
+"A full list of branches, including i2p.i2p and i2p.www can be found on viewmtn."
+msgstr ""
+"Una lista completa de servidores de descarga, incluyendo i2p.i2p y "
+"i2p.www puede encontrarse en viewmtn."
#: i2p2www/pages/site/get-involved/guides/new-developers.html:108
#, python-format
msgid ""
"A long explanation about using monotone is available on the monotone page."
-msgstr "Una explicación completa de cómo usar monotone está disponible en la web de monotone."
+msgstr ""
+"Una explicación completa de cómo usar monotone está disponible en la web de monotone."
#: i2p2www/pages/site/get-involved/guides/new-developers.html:114
#, python-format
msgid ""
-"To compile the code, you need the Sun Java Development Kit 6 or higher, or equivalent JDK\n"
+"To compile the code, you need the Sun Java Development Kit 6 or higher, "
+"or equivalent JDK\n"
"(Sun JDK 6 strongly recommended) and\n"
"Apache ant\n"
"version 1.7.0 or higher.\n"
-"If you go are working on the main I2P code, you can go into the i2p.i2p directory and run 'ant' to see the build options."
-msgstr "Para compilar el código necesita Sun Java Development Kit 6 o mayor, o el JDK equivalente (Sun JDK 6 recomendado) y Apache ant versión 1.7.0 o mayor. Si va a trabajar en al código principal de I2P puede entrar al directorio i2p.i2p y ejecutar 'ant' para ver las opciones de compilación."
+"If you go are working on the main I2P code, you can go into the i2p.i2p "
+"directory and run 'ant' to see the build options."
+msgstr ""
+"Para compilar el código necesita Sun Java Development Kit 6 o mayor, o el"
+" JDK equivalente (Sun JDK 6 recomendado) y Apache ant versión 1.7.0 o mayor. Si"
+" va a trabajar en al código principal de I2P puede entrar al directorio "
+"i2p.i2p y ejecutar 'ant' para ver las opciones de compilación."
#: i2p2www/pages/site/get-involved/guides/new-developers.html:122
msgid ""
"To build or work on console translations, you need\n"
"the xgettext, msgfmt, and msgmerge tools from the\n"
"GNU gettext package."
-msgstr "Para trabajar en la traducción de la consola necesita las herramientas gettext, msgfmt, y msgmerge del paquete GNU gettext."
+msgstr ""
+"Para trabajar en la traducción de la consola necesita las herramientas "
+"gettext, msgfmt, y msgmerge del paquete GNU gettext."
#: i2p2www/pages/site/get-involved/guides/new-developers.html:128
#, python-format
msgid ""
"For development on new applications,\n"
"see the application development guide."
-msgstr "Para programar nuevas aplicaciones vea la guía de desarrollo de aplicaciones."
+msgstr ""
+"Para programar nuevas aplicaciones vea la guía de "
+"desarrollo de aplicaciones."
#: i2p2www/pages/site/get-involved/guides/new-developers.html:134
#, python-format
@@ -3044,18 +4569,29 @@ msgid ""
"this website's TODO list or\n"
"Trac\n"
"for ideas."
-msgstr "Para hacerse una idea vea la listaTODO, por hacer, de zzz, el TODO de esta web o el Trac."
+msgstr ""
+"Para hacerse una idea vea la listaTODO, por hacer, de zzz, el TODO de esta web o el Trac."
#: i2p2www/pages/site/get-involved/guides/new-developers.html:143
#, python-format
msgid ""
-"See the bottom of the licenses page for\n"
-"commit privilege requirements. You need these to put code into i2p.i2p (not required for the website!)."
-msgstr "Mira en la parte de abajo de la página de licencias para conocer los requisitos. Los necesita para poder aportar código a i2p.i2p (¡pero no para la página web!)"
+"See the bottom of the licenses page "
+"for\n"
+"commit privilege requirements. You need these to put code into i2p.i2p "
+"(not required for the website!)."
+msgstr ""
+"Mira en la parte de abajo de la página "
+"de licencias para conocer los requisitos. Los necesita para poder "
+"aportar código a i2p.i2p (¡pero no para la página web!)"
#: i2p2www/pages/site/get-involved/guides/new-developers.html:148
msgid "Short version of how to generate and use keys if you plan to commit:"
-msgstr "Versión corta de cómo generar y usar las claves si tiene planeado hacer aportes:"
+msgstr ""
+"Versión corta de cómo generar y usar las claves si tiene planeado hacer "
+"aportes:"
#: i2p2www/pages/site/get-involved/guides/new-developers.html:150
msgid "use an empty passphrase"
@@ -3070,14 +4606,19 @@ msgstr "escriba una contraseña"
msgid ""
"send this to a mtn repo operator to get "
"push privileges"
-msgstr "envíe esto al administrador del repositorio de mtn para tener permisos para aportar:"
+msgstr ""
+"envíe esto al administrador del "
+"repositorio de mtn para tener permisos para aportar:"
#: i2p2www/pages/site/get-involved/guides/new-developers.html:153
#, python-format
msgid ""
"send this to a release manager to get "
"commit privileges - not required for website"
-msgstr "envíe esto al encargado de las versiones para obtener los permisos para aportar - no se requiere para la página web"
+msgstr ""
+"envíe esto al encargado de las versiones"
+" para obtener los permisos para aportar - no se requiere para la página "
+"web"
#: i2p2www/pages/site/get-involved/guides/new-developers.html:154
msgid "check in with this key"
@@ -3095,35 +4636,62 @@ msgstr "Versión completa: vea la web de monotone."
#: i2p2www/pages/site/get-involved/guides/new-developers.html:163
#, python-format
msgid ""
-"The developers hang around on IRC. They can be reached on the Freenode network, OFTC, and on the I2P internal networks. The usual place to look is #i2p-dev. Join the channel and say hi!\n"
-"We also have additional guidelines for regular developers."
-msgstr "Los desarrolladores suelen estar en el IRC. Puede contactar con ellos en la red Freenode, OFTC, y en la en el IRC de I2P. El lugar usual es #i2p-dev. ¡Únase al canal y diga hola!. También hay guías adicionales para desarrolladores."
+"The developers hang around on IRC. They can be reached on the Freenode "
+"network, OFTC, and on the I2P internal networks. The usual place to look "
+"is #i2p-dev. Join the channel and say hi!\n"
+"We also have additional guidelines for regular"
+" developers."
+msgstr ""
+"Los desarrolladores suelen estar en el IRC. Puede contactar con ellos en "
+"la red Freenode, OFTC, y en la en el IRC de I2P. El lugar usual es #i2p-"
+"dev. ¡Únase al canal y diga hola!. También hay guías adicionales para desarrolladores."
#: i2p2www/pages/site/get-involved/guides/new-developers.html:169
#, python-format
msgid ""
-"Website and router console translators: See the New Translator's Guide\n"
+"Website and router console translators: See the New Translator's Guide\n"
"for next steps."
-msgstr "Traductores de la consola del ruter y la página web: Vea la guía de nuevos traductores."
+msgstr ""
+"Traductores de la consola del ruter y la página web: Vea la guía de nuevos traductores."
#: i2p2www/pages/site/get-involved/guides/new-developers.html:175
msgid ""
"I2P is open source software that is mostly developed using open sourced\n"
-"toolkits. The I2P project recently acquired a license for the YourKit Java\n"
-"Profiler. Open source projects are eligible to receive a free license provided\n"
-"that YourKit is referenced on the project web site. Please get in touch if you\n"
+"toolkits. The I2P project recently acquired a license for the YourKit "
+"Java\n"
+"Profiler. Open source projects are eligible to receive a free license "
+"provided\n"
+"that YourKit is referenced on the project web site. Please get in touch "
+"if you\n"
"are interested in profiling the I2P codebase."
-msgstr "I2P es una aplicación de código libre y es desarrollada usando herramientas libres. El proyecto I2P ha adquirido recientemente una licencia para YourKit Java Profiler. Los proyectos libres pueden obtener una licencia gratis mientras se haga referencia a YourKit en las webs del proyecto. Por favor pónganse en contacto su está interesado en la depuración y optimización del código base de I2P."
+msgstr ""
+"I2P es una aplicación de código libre y es desarrollada usando "
+"herramientas libres. El proyecto I2P ha adquirido recientemente una "
+"licencia para YourKit Java Profiler. Los proyectos libres pueden obtener "
+"una licencia gratis mientras se haga referencia a YourKit en las webs del"
+" proyecto. Por favor pónganse en contacto su está interesado en la "
+"depuración y optimización del código base de I2P."
#: i2p2www/pages/site/get-involved/guides/new-developers.html:183
#, python-format
msgid ""
-"YourKit is kindly supporting open source projects with its full-featured Java Profiler.\n"
-"YourKit, LLC is the creator of innovative and intelligent tools for profiling\n"
-"Java and .NET applications. Take a look at YourKit's leading software products:\n"
+"YourKit is kindly supporting open source projects with its full-featured "
+"Java Profiler.\n"
+"YourKit, LLC is the creator of innovative and intelligent tools for "
+"profiling\n"
+"Java and .NET applications. Take a look at YourKit's leading software "
+"products:\n"
"YourKit Java Profiler and\n"
"YourKit .NET Profiler."
-msgstr "YourKit está apoyando amablemente a los proyectos libres con el Java Profiler completo. LLC es el creador de inteligentes e innovadoras herramientas para el desarrollo de aplicaciones JAVA y .NET. Échele un ojo a los productos principales de YourKit: YourKit Java Profiler y YourKit .NET Profiler."
+msgstr ""
+"YourKit está apoyando amablemente a los proyectos libres con el Java "
+"Profiler completo. LLC es el creador de inteligentes e innovadoras "
+"herramientas para el desarrollo de aplicaciones JAVA y .NET. Échele un "
+"ojo a los productos principales de YourKit: YourKit "
+"Java Profiler y YourKit .NET Profiler."
#: i2p2www/pages/site/get-involved/guides/new-translators.html:2
msgid "New Translator's Guide"
@@ -3140,11 +4708,18 @@ msgstr "Cómo traducir la página web"
#: i2p2www/pages/site/get-involved/guides/new-translators.html:8
#, python-format
msgid ""
-"Translation of the website is done with .po files. The easiest way by far to\n"
+"Translation of the website is done with .po files. The easiest way by far"
+" to\n"
"translate the website is to sign up for an account at \n"
-"Transifex and request to join a translation team. \n"
+"Transifex and request to join a translation"
+" team. \n"
"Alternatively it can be done \"the old way\" as outlined below."
-msgstr "La traducción de las páginas web se hace con archivos .po. La forma mas fácil con diferencia para traducir una página web es crearse una cuenta en Transifex y solicitar unirse aun grupo de traducción. Alternativamente se puede hacer a la \"forma antigua \" como se muestra debajo."
+msgstr ""
+"La traducción de las páginas web se hace con archivos .po. La forma mas "
+"fácil con diferencia para traducir una página web es crearse una cuenta "
+"en Transifex y solicitar unirse aun grupo "
+"de traducción. Alternativamente se puede hacer a la \"forma antigua \" "
+"como se muestra debajo."
#: i2p2www/pages/site/get-involved/guides/new-translators.html:17
#: i2p2www/pages/site/get-involved/guides/new-translators.html:82
@@ -3157,9 +4732,18 @@ msgstr "Preparación"
msgid ""
"Come to #i2p-dev on irc and talk to people.\n"
"Claim the language -\n"
-"To make sure other coworkers don't bump onto the files you are working on,\n"
-"please update the translation status on this wiki page."
-msgstr "Venga a #i2p-dev en el IRC para hablar con la gente.\nReclame el idioma - \nPara asegurarse de que otros colaboradores no trabajen sobre los ficheros \nsobre los que usted está trabajando, actualice el estatus de la traducción \nen esta página wiki."
+"To make sure other coworkers don't bump onto the files you are working "
+"on,\n"
+"please update the translation status on this wiki "
+"page."
+msgstr ""
+"Venga a #i2p-dev en el IRC para hablar con la gente.\n"
+"Reclame el idioma - \n"
+"Para asegurarse de que otros colaboradores no trabajen sobre los ficheros"
+" \n"
+"sobre los que usted está trabajando, actualice el estatus de la "
+"traducción \n"
+"en esta página wiki."
#: i2p2www/pages/site/get-involved/guides/new-translators.html:25
#, python-format
@@ -3168,53 +4752,95 @@ msgid ""
"Including the installation of monotone,\n"
"checking out i2p.www branch, and generate your own monotone keys.\n"
"It is not required that you sign a dev agreement."
-msgstr "Siga la Guía para el nuevo desarrollador,\nque incluye la instalación de monotone, comprobación (`checkout`) del\nramal de desarrollo (`branch`) i2p.www, y la generación de sus propias \nclaves monotone. No se requiere que firme un nuevo acuerdo de desarrollador."
+msgstr ""
+"Siga la Guía para el nuevo desarrollador,\n"
+"que incluye la instalación de monotone, comprobación (`checkout`) del\n"
+"ramal de desarrollo (`branch`) i2p.www, y la generación de sus propias \n"
+"claves monotone. No se requiere que firme un nuevo acuerdo de "
+"desarrollador."
#: i2p2www/pages/site/get-involved/guides/new-translators.html:33
msgid ""
"Create files:\n"
"If the file for your language does not exist yet:"
-msgstr "Cree ficheros \nsi el fichero para su idioma no existe aún: "
+msgstr ""
+"Cree ficheros \n"
+"si el fichero para su idioma no existe aún: "
#: i2p2www/pages/site/get-involved/guides/new-translators.html:38
msgid ""
-"Run \"./extract-messages.sh
\" to generate a messages.pot
in the base directory.\n"
-"Edit the header of this file, then run \"./init-new-po.sh locale
\" to generate the file\n"
-"i2p2www/translations/locale/LC_MESSAGES/messages.po
. \"mtn add
\" this file."
-msgstr "Ejecute \"./extract-messages.sh
\" para generar messages.pot
en el directorio base. Edite la cabecera de este archivo, y entonces ejecute \"./init-new-po.sh locale
\" para generar el archivo i2p2www/translations/locale/LC_MESSAGES/messages.po
. \"mtn add
\" este archivo."
+"Run \"./extract-messages.sh
\" to generate a "
+"messages.pot
in the base directory.\n"
+"Edit the header of this file, then run \"./init-new-po.sh "
+"locale
\" to generate the file\n"
+"i2p2www/translations/locale/LC_MESSAGES/messages.po
. "
+"\"mtn add
\" this file."
+msgstr ""
+"Ejecute \"./extract-messages.sh
\" para generar "
+"messages.pot
en el directorio base. Edite la cabecera de "
+"este archivo, y entonces ejecute \"./init-new-po.sh locale
\""
+" para generar el archivo "
+"i2p2www/translations/locale/LC_MESSAGES/messages.po
. "
+"\"mtn add
\" este archivo."
#: i2p2www/pages/site/get-involved/guides/new-translators.html:43
msgid ""
"Edit i2p2www/pages/global/lang.html
and add a line for your "
"language (copy an existing line)."
-msgstr "Edite i2p2www/pages/global/lang.html
y añada una línea para su idioma (replique una existente)."
+msgstr ""
+"Edite i2p2www/pages/global/lang.html
y añada una línea para "
+"su idioma (replique una existente)."
#: i2p2www/pages/site/get-involved/guides/new-translators.html:46
msgid ""
-"Add a flag image file to i2p2www/static/images/flags/
for the "
-"menu (copy from the router)."
-msgstr "Añada un archivo de imagen con una bandera a i2p2www/static/images/flags/
para el menú (cópielo desde el enrutador (`router`))."
+"Add a flag image file to i2p2www/static/images/flags/
for "
+"the menu (copy from the router)."
+msgstr ""
+"Añada un archivo de imagen con una bandera a "
+"i2p2www/static/images/flags/
para el menú (cópielo desde el "
+"enrutador (`router`))."
#: i2p2www/pages/site/get-involved/guides/new-translators.html:52
msgid ""
"Edit files:\n"
"Edit i2p2www/translations/locale/LC_MESSAGES/messages.po
.\n"
-"To work with .po files efficiently, you may wish to use POEdit"
-msgstr "Edite los ficheros: \nEdite i2p2www/translations/locale/LC_MESSAGES/messages.po
. \nPara trabajar con ficheros .po eficientemente, podría querer usar POEdit"
+"To work with .po files efficiently, you may wish to use POEdit"
+msgstr ""
+"Edite los ficheros: \n"
+"Edite i2p2www/translations/locale/LC_MESSAGES/messages.po
. \n"
+"Para trabajar con ficheros .po eficientemente, podría querer usar POEdit"
#: i2p2www/pages/site/get-involved/guides/new-translators.html:58
#: i2p2www/pages/site/get-involved/guides/new-translators.html:151
msgid ""
"Check in:\n"
-"\"mtn pull
\", \"mtn update
\". Then check in by \"mtn ci -k yourname@mail.i2p file1 file2 ...
\"\n"
-"This collects the diff info of your changed file into your local repo. Then \"mtn sync mtn.i2p2.de -k yourname-transport@mail.i2p i2p.i2p
\".\n"
+"\"mtn pull
\", \"mtn update
\". Then check in by "
+"\"mtn ci -k yourname@mail.i2p file1 file2 ...
\"\n"
+"This collects the diff info of your changed file into your local repo. "
+"Then \"mtn sync mtn.i2p2.de -k yourname-transport@mail.i2p "
+"i2p.i2p
\".\n"
"This synchronizes your local repo with the repo on the target machine."
-msgstr "Regístrelos:\nHaga \"mtn pull
\", \"mtn update
\". Luego regístrelos como \"mtn ci -k yourname@mail.i2p file1 file2 ...
\".\nEsto recopila la información de diferencias (diff) de su archivo modificado en \nsu repositorio local.\nEntonces haga \"mtn sync mtn.i2p2.de -k yourname-transport@mail.i2p i2p.i2p
\".\nEsto sincroniza su repositorio local con el respositorio en la máquina objetivo."
+msgstr ""
+"Regístrelos:\n"
+"Haga \"mtn pull
\", \"mtn update
\". Luego "
+"regístrelos como \"mtn ci -k yourname@mail.i2p file1 file2 "
+"...
\".\n"
+"Esto recopila la información de diferencias (diff) de su archivo "
+"modificado en \n"
+"su repositorio local.\n"
+"Entonces haga \"mtn sync mtn.i2p2.de -k yourname-transport@mail.i2p"
+" i2p.i2p
\".\n"
+"Esto sincroniza su repositorio local con el respositorio en la máquina "
+"objetivo."
#: i2p2www/pages/site/get-involved/guides/new-translators.html:65
#: i2p2www/pages/site/get-involved/guides/new-translators.html:158
msgid "Repeat. Check in often. Don't wait until it is perfect."
-msgstr "Repita. Registre traducciones con frecuencia. No espere hasta que estén perfectas."
+msgstr ""
+"Repita. Registre traducciones con frecuencia. No espere hasta que estén "
+"perfectas."
#: i2p2www/pages/site/get-involved/guides/new-translators.html:72
msgid "How to Translate the Router Console"
@@ -3223,10 +4849,18 @@ msgstr "Cómo traducir la consola del enrutador (`router`)"
#: i2p2www/pages/site/get-involved/guides/new-translators.html:74
#, python-format
msgid ""
-"The easiest way by far to translate the router console is to sign up for an account at \n"
-"Transifex and request to join a translation team. \n"
+"The easiest way by far to translate the router console is to sign up for "
+"an account at \n"
+"Transifex and request to join a translation"
+" team. \n"
"Alternatively it can be done \"the old way\" as outlined below."
-msgstr "La forma más fácil de largo para traducir la consola del enrutador (`router`) \nes abrir una cuenta en Transifex y solicitar \nunirse a un equipo de traducción. Alternativamente puede hacerse \n\"a la vieja usanza\" como se describe debajo."
+msgstr ""
+"La forma más fácil de largo para traducir la consola del enrutador "
+"(`router`) \n"
+"es abrir una cuenta en Transifex y "
+"solicitar \n"
+"unirse a un equipo de traducción. Alternativamente puede hacerse \n"
+"\"a la vieja usanza\" como se describe debajo."
#: i2p2www/pages/site/get-involved/guides/new-translators.html:90
#, python-format
@@ -3234,7 +4868,11 @@ msgid ""
"Follow the new developer's guide,\n"
"including the installation of monotone and the gettext tools,\n"
"checking out i2p.i2p branch, and generate your own monotone keys."
-msgstr "Siga la Guía para el nuevo desarrollador, \nque incluye la instalación de monotone y las herramientas gettext, la \ncomprobación (`checkout`) del ramal de desarrollo (`branch`) i2p.i2p , \ny genere sus propias claves monotone."
+msgstr ""
+"Siga la Guía para el nuevo desarrollador, \n"
+"que incluye la instalación de monotone y las herramientas gettext, la \n"
+"comprobación (`checkout`) del ramal de desarrollo (`branch`) i2p.i2p , \n"
+"y genere sus propias claves monotone."
#: i2p2www/pages/site/get-involved/guides/new-translators.html:95
msgid "Generate your own gpg key and sign the dev agreement."
@@ -3242,43 +4880,74 @@ msgstr "Genere su propia clave GPG y firme el acuerdo de desarrollador."
#: i2p2www/pages/site/get-involved/guides/new-translators.html:101
msgid ""
-"Before starting a console translation, better help translate some i2p webpages first.\n"
+"Before starting a console translation, better help translate some i2p "
+"webpages first.\n"
"At least an i2p homepage in your language would be great."
-msgstr "Antes de inciar una traducción de la consola, mejor ayude primero a \ntraducir alguna de las páginas web de I2P. Sería genial si al menos\ntradujera la página principal de I2P a su idioma."
+msgstr ""
+"Antes de inciar una traducción de la consola, mejor ayude primero a \n"
+"traducir alguna de las páginas web de I2P. Sería genial si al menos\n"
+"tradujera la página principal de I2P a su idioma."
#: i2p2www/pages/site/get-involved/guides/new-translators.html:106
msgid ""
"What to translate:\n"
"There are about 15 files in the i2p.i2p branch that needs translation:"
-msgstr "Qué traducir: \nHay cerca de 15 ficheros en el ramal de desarrollo (`branch`) i2p.i2p\nque precisan traducción:"
+msgstr ""
+"Qué traducir: \n"
+"Hay cerca de 15 ficheros en el ramal de desarrollo (`branch`) i2p.i2p\n"
+"que precisan traducción:"
#: i2p2www/pages/site/get-involved/guides/new-translators.html:132
msgid ""
"Where xx is your language code like fr/de/ch/zh/...\n"
-"There may be or may not be files with your lang code. If not, you can create your own. by copying and renaming other language files you know with your own lang code."
-msgstr "Donde xx es su código de idioma como fr/de/ch/zh...\nPodría o no haber archivos con su código de idioma. Si no, puede crear los suyos propios copiando y renombrando otros ficheros de idiomas con su propio código de idioma."
+"There may be or may not be files with your lang code. If not, you can "
+"create your own. by copying and renaming other language files you know "
+"with your own lang code."
+msgstr ""
+"Donde xx es su código de idioma como fr/de/ch/zh...\n"
+"Podría o no haber archivos con su código de idioma. Si no, puede crear "
+"los suyos propios copiando y renombrando otros ficheros de idiomas con su"
+" propio código de idioma."
#: i2p2www/pages/site/get-involved/guides/new-translators.html:137
msgid ""
"Create files:\n"
-"If the file for your language does not exist yet, copy another language file to a new file foo_xx.bar
for your language.\n"
+"If the file for your language does not exist yet, copy another language "
+"file to a new file foo_xx.bar
for your language.\n"
"Then \"mtn add
\" the file.\n"
-"After creating a .po file, edit the headers. Then run \"ant distclean poupdate
\"."
-msgstr "Cree los ficheros:\nSi el fichero para su idioma no existe aún, copie otro fichero de idioma a un nuevo fichero foo_xx.bar
para su idioma.\nEntonces haga \"mtn add
\" sobre el fichero.\nDespués de crear un fichero .po, edite las cabeceras. Luego ejecute ant distclean poupdate
\"."
+"After creating a .po file, edit the headers. Then run \"ant "
+"distclean poupdate
\"."
+msgstr ""
+"Cree los ficheros:\n"
+"Si el fichero para su idioma no existe aún, copie otro fichero de idioma "
+"a un nuevo fichero foo_xx.bar
para su idioma.\n"
+"Entonces haga \"mtn add
\" sobre el fichero.\n"
+"Después de crear un fichero .po, edite las cabeceras. Luego ejecute "
+"ant distclean poupdate
\"."
#: i2p2www/pages/site/get-involved/guides/new-translators.html:144
msgid ""
"Start to work:\n"
"Edit the HTML files with any text editor.\n"
"Be sure not to use an editor in HTML mode that reformats everything.\n"
-"To work with .po files efficiently, you may wish to use POEdit"
-msgstr "Comience a trabajar:\nEdite los ficheros HTML con cualquier editor de texto.\nAsegúrese de no usar un editor en modo HTML que reformatee todo.\nPara trabajar con ficheros .po eficientemente, podría querer usar POEdit"
+"To work with .po files efficiently, you may wish to use POEdit"
+msgstr ""
+"Comience a trabajar:\n"
+"Edite los ficheros HTML con cualquier editor de texto.\n"
+"Asegúrese de no usar un editor en modo HTML que reformatee todo.\n"
+"Para trabajar con ficheros .po eficientemente, podría querer usar POEdit"
#: i2p2www/pages/site/get-involved/guides/new-translators.html:163
msgid ""
"As you can see, it's not that difficult.\n"
-"If you have questions about the meaning of the terms in the console, ask in #i2p-dev
on IRC."
-msgstr "Como puede ver, no es tan difícil.\nSi tiene preguntas acerca del significado de los términos en la consola, pregunte en #i2p-dev
en el IRC."
+"If you have questions about the meaning of the terms in the console, ask "
+"in #i2p-dev
on IRC."
+msgstr ""
+"Como puede ver, no es tan difícil.\n"
+"Si tiene preguntas acerca del significado de los términos en la consola, "
+"pregunte en #i2p-dev
en el IRC."
#: i2p2www/pages/site/get-involved/guides/new-translators.html:169
msgid "FAQ"
@@ -3286,9 +4955,12 @@ msgstr "Preguntas frecuentes"
#: i2p2www/pages/site/get-involved/guides/new-translators.html:171
msgid ""
-"Q: Why do I have to install monotone, Java, jsp, learn about .po files and "
-"html, etc.? Why can't I just do a translation and email it to you?"
-msgstr "P: ¿Por qué tengo que instalar Monotone, Java, JSP, aprender acerca de los ficheros .po y HTML, etc.? ¿Por qué no puedo simplemente hacer una traducción y enviársela vía email?"
+"Q: Why do I have to install monotone, Java, jsp, learn about .po files "
+"and html, etc.? Why can't I just do a translation and email it to you?"
+msgstr ""
+"P: ¿Por qué tengo que instalar Monotone, Java, JSP, aprender acerca de "
+"los ficheros .po y HTML, etc.? ¿Por qué no puedo simplemente hacer una "
+"traducción y enviársela vía email?"
#: i2p2www/pages/site/get-involved/guides/new-translators.html:175
msgid "A: Several reasons:"
@@ -3299,70 +4971,105 @@ msgstr "R: Por diferentes razones:"
msgid ""
"You might be interested in translating via Transifex. Request to join a "
"translation team here."
-msgstr "Podría estar interesado en traducir a través de Transifex. Solicite unirse a un equipo de traducción aquí."
+msgstr ""
+"Podría estar interesado en traducir a través de Transifex. Solicite "
+"unirse a un equipo de traducción aquí."
#: i2p2www/pages/site/get-involved/guides/new-translators.html:182
msgid ""
-"We don't have anybody who has time to accept manual contributions and submit"
-" them to our source control system on your behalf. Even if we did, it "
-"doesn't scale."
-msgstr "No tenemos a nadie que tenga tiempo para aceptar contribuciones manuales y las entregue a nuestro sistema de control de código fuente \nen su lugar. Incluso si lo hicieramos, no sería adecuado."
+"We don't have anybody who has time to accept manual contributions and "
+"submit them to our source control system on your behalf. Even if we did, "
+"it doesn't scale."
+msgstr ""
+"No tenemos a nadie que tenga tiempo para aceptar contribuciones manuales "
+"y las entregue a nuestro sistema de control de código fuente \n"
+"en su lugar. Incluso si lo hicieramos, no sería adecuado."
#: i2p2www/pages/site/get-involved/guides/new-translators.html:186
msgid ""
"Maybe you are thinking translation is a one-step process. It isn't. You "
"can't do it all at once. You will make mistakes. You need to test it and "
-"tweak it to make it look right before you submit it. Developers will "
-"update or add to the English text, thus requiring a translation update."
-msgstr "Quizá esté pensando que la traducción es un proceso de un sólo paso. No lo es. No puede hacerlo todo de una vez. Cometerá errores. Ha de probarla y ajustarla para hacer que luzca correcta antes de entregarla. Los desarrolladores actualizarán o añadirán sobre el texto en Inglés, y así será como soliciten una actualización de la traducción."
+"tweak it to make it look right before you submit it. Developers "
+"will update or add to the English text, thus requiring a translation "
+"update."
+msgstr ""
+"Quizá esté pensando que la traducción es un proceso de un sólo paso. No "
+"lo es. No puede hacerlo todo de una vez. Cometerá errores. Ha de probarla"
+" y ajustarla para hacer que luzca correcta antes de entregarla. "
+"Los desarrolladores actualizarán o añadirán sobre el texto en Inglés, y "
+"así será como soliciten una actualización de la traducción."
#: i2p2www/pages/site/get-involved/guides/new-translators.html:190
msgid ""
"Having translators use a source control system directly provides "
-"authentication and accountablility - we know who is doing what, and we can "
-"track changes, and revert them if necessary."
-msgstr "Hacer que los traductores usen directamente un sistema de control de código fuente proporciona autentificación y registrabilidad - conocemos quién está haciendo qué, y podemos seguir los cambios y revertirlos si fuese necesario."
+"authentication and accountablility - we know who is doing what, and we "
+"can track changes, and revert them if necessary."
+msgstr ""
+"Hacer que los traductores usen directamente un sistema de control de "
+"código fuente proporciona autentificación y registrabilidad - conocemos "
+"quién está haciendo qué, y podemos seguir los cambios y revertirlos si "
+"fuese necesario."
#: i2p2www/pages/site/get-involved/guides/new-translators.html:194
msgid ""
-".po files are not difficult. If you don't want to work directly with them, "
-"we recommend 'poedit'."
-msgstr "Los ficheros .po no son difíciles. Si no quiere trabajar directamente con ellos, le recomendamos 'poedit'."
+".po files are not difficult. If you don't want to work directly with "
+"them, we recommend 'poedit'."
+msgstr ""
+"Los ficheros .po no son difíciles. Si no quiere trabajar directamente con"
+" ellos, le recomendamos 'poedit'."
#: i2p2www/pages/site/get-involved/guides/new-translators.html:198
msgid ""
-"HTML files are not difficult. Just ignore the html stuff and translate the "
-"text."
-msgstr "Los ficheros HTML no son difíciles. Tan sólo ignore todo el material HTML y traduzca el texto."
+"HTML files are not difficult. Just ignore the html stuff and translate "
+"the text."
+msgstr ""
+"Los ficheros HTML no son difíciles. Tan sólo ignore todo el material HTML"
+" y traduzca el texto."
#: i2p2www/pages/site/get-involved/guides/new-translators.html:202
msgid ""
"Installing and using monotone is not that difficult. Several of the "
-"translators and other contributors to I2P are non-programmers, and they use "
-"monotone regularly. Monotone is simply a source control system, it is not "
-"about \"coding\"."
-msgstr "Instalar y usar Monotone no es tan difícil. Varios de los traductores y otros contribuidores a I2P son no-programadores, y usan Monotone regularmente. Monotone es sencillamente un sistema de control de código fuente, no tiene que ver con la \"programación\"."
+"translators and other contributors to I2P are non-programmers, and they "
+"use monotone regularly. Monotone is simply a source control system, it is"
+" not about \"coding\"."
+msgstr ""
+"Instalar y usar Monotone no es tan difícil. Varios de los traductores y "
+"otros contribuidores a I2P son no-programadores, y usan Monotone "
+"regularmente. Monotone es sencillamente un sistema de control de código "
+"fuente, no tiene que ver con la \"programación\"."
#: i2p2www/pages/site/get-involved/guides/new-translators.html:206
msgid ""
"Our items to translate are not \"documents\". They are html files and po "
-"files, with a specific format and character encoding (UTF-8) that must be "
-"maintained, and not corrupted by email programs or other methods of "
+"files, with a specific format and character encoding (UTF-8) that must be"
+" maintained, and not corrupted by email programs or other methods of "
"transfer."
-msgstr "Nuestros elementos a traducir no son \"documentos\". Son ficheros HTML y ficheros .po, con un formato específico y una codificación de caracteres (UTF-8), que debe mantenerse y no corromperse por programas de email u otros métodos de transferencia."
+msgstr ""
+"Nuestros elementos a traducir no son \"documentos\". Son ficheros HTML y "
+"ficheros .po, con un formato específico y una codificación de caracteres "
+"(UTF-8), que debe mantenerse y no corromperse por programas de email u "
+"otros métodos de transferencia."
#: i2p2www/pages/site/get-involved/guides/new-translators.html:210
msgid ""
-"We looked at 'pootle' as a front-end for translators. It didn't work well, "
-"needed an administrator, and a pootle-based process would suffer from a "
-"number of the above flaws."
-msgstr "Nos fijamos en 'pootle' como una herramienta intermedia para traductores. No funcionó bien, necesitaba un administrador, y un proceso basado-en-pootle adolecería de algunos de los defectos anteriores."
+"We looked at 'pootle' as a front-end for translators. It didn't work "
+"well, needed an administrator, and a pootle-based process would suffer "
+"from a number of the above flaws."
+msgstr ""
+"Nos fijamos en 'pootle' como una herramienta intermedia para traductores."
+" No funcionó bien, necesitaba un administrador, y un proceso basado-en-"
+"pootle adolecería de algunos de los defectos anteriores."
#: i2p2www/pages/site/get-involved/guides/new-translators.html:215
msgid ""
"In summary:\n"
-"Yes, we know it is somewhat of a hurdle to get started. It's really the only possible way we can do it. Give it a try, it really isn't that hard."
-msgstr "En resumen: \nSí, sabemos que comenzar es como una carrera de obstáculos. En realidad es la única forma posible de la que podemos hacerlo. Inténtelo, realmente no es tan difícil."
+"Yes, we know it is somewhat of a hurdle to get started. It's really the "
+"only possible way we can do it. Give it a try, it really isn't that hard."
+msgstr ""
+"En resumen: \n"
+"Sí, sabemos que comenzar es como una carrera de obstáculos. En realidad "
+"es la única forma posible de la que podemos hacerlo. Inténtelo, realmente"
+" no es tan difícil."
#: i2p2www/pages/site/get-involved/guides/new-translators.html:220
msgid "More Information"
@@ -3373,4 +5080,7 @@ msgstr "Más información"
msgid ""
"The #i2p-dev channel on IRC, or the translation forum on %(zzz)s."
-msgstr "El canal #i2p-dev del IRC, o el forum de traducción en %(zzz)s."
+msgstr ""
+"El canal #i2p-dev del IRC, o el forum de traducción en %(zzz)s."
+
diff --git a/i2p2www/translations/fr/LC_MESSAGES/blog.po b/i2p2www/translations/fr/LC_MESSAGES/blog.po
index 09b73f19..241a6587 100644
--- a/i2p2www/translations/fr/LC_MESSAGES/blog.po
+++ b/i2p2www/translations/fr/LC_MESSAGES/blog.po
@@ -1,27 +1,26 @@
-# Translations template for I2P.
+# French translations for I2P.
# Copyright (C) 2014 ORGANIZATION
# This file is distributed under the same license as the I2P project.
-#
+#
# Translators:
# bassmax, 2014
-# bassmax, 2014
# Boxoa590, 2013
# magma http://i2p-projekt.i2p/hosts.txt (http://udhdrtrcetjm5sxzskjyr5ztpeszydbh4dpl3pl4utgqqw2v4jna.b32.i2p/hosts.txt)
, \n"
+"default is http://i2p-projekt.i2p/hosts.txt "
+"(http://udhdrtrcetjm5sxzskjyr5ztpeszydbh4dpl3pl4utgqqw2v4jna.b32.i2p/hosts.txt)
,"
+" \n"
"which contains a copy of the hosts.txt included\n"
"in the I2P release.\n"
"Users must configure additional subscriptions in their\n"
-"local addressbook application (via subscriptions.txt or SusiDNS)."
+"local addressbook application (via subscriptions.txt or SusiDNS)."
msgstr ""
#: i2p2www/pages/site/docs/naming.html:211
@@ -806,9 +1000,13 @@ msgstr "Quelques autres liens d'abonnement à des carnets d'adresses publics :"
#: i2p2www/pages/site/docs/naming.html:218
msgid ""
-"The operators of these services may have various policies for listing hosts.\n"
+"The operators of these services may have various policies for listing "
+"hosts.\n"
"Presence on this list does not imply endorsement."
-msgstr "Les opérateurs de ces services peuvent avoir des politiques diverses pour inscrire des hôtes.\nLa présence dans cette liste n'implique pas approbation."
+msgstr ""
+"Les opérateurs de ces services peuvent avoir des politiques diverses pour"
+" inscrire des hôtes.\n"
+"La présence dans cette liste n'implique pas approbation."
#: i2p2www/pages/site/docs/naming.html:223
#: i2p2www/pages/site/docs/naming.html:235
@@ -817,15 +1015,28 @@ msgstr "Règles de nommage"
#: i2p2www/pages/site/docs/naming.html:224
msgid ""
-"While there are hopefully not any technical limitations within I2P on host names,\n"
+"While there are hopefully not any technical limitations within I2P on "
+"host names,\n"
"the addressbook enforces several restrictions on host names\n"
"imported from subscriptions.\n"
-"It does this for basic typographical sanity and compatibility with browsers,\n"
+"It does this for basic typographical sanity and compatibility with "
+"browsers,\n"
"and for security.\n"
"The rules are essentially the same as those in RFC2396 Section 3.2.2.\n"
"Any hostnames violating these rules may not be propagated\n"
"to other routers."
-msgstr "Tandis qu'il n'y a par chance pas de limitations techniques dans I2P sur les noms hôtes\nle carnet d'adresses fait respecter plusieurs restrictions de noms hôtes\nimportés depuis des abonnements.\nIl fait ceci pour la santé typographique basique et la compatibilité avec les navigateurs,\net pour la sécurité.\nLes règles sont essentiellement les mêmes que celles dans la RFC2396 section 3.2.2.\nQuelconque nom d'hôte violant ces règles ne peut pas être propagé\nà d'autres routeurs."
+msgstr ""
+"Tandis qu'il n'y a par chance pas de limitations techniques dans I2P sur "
+"les noms hôtes\n"
+"le carnet d'adresses fait respecter plusieurs restrictions de noms hôtes\n"
+"importés depuis des abonnements.\n"
+"Il fait ceci pour la santé typographique basique et la compatibilité avec"
+" les navigateurs,\n"
+"et pour la sécurité.\n"
+"Les règles sont essentiellement les mêmes que celles dans la RFC2396 "
+"section 3.2.2.\n"
+"Quelconque nom d'hôte violant ces règles ne peut pas être propagé\n"
+"à d'autres routeurs."
#: i2p2www/pages/site/docs/naming.html:239
msgid "Names are converted to lower case on import."
@@ -833,14 +1044,19 @@ msgstr "Les noms sont convertis en minuscule lors de l'importation."
#: i2p2www/pages/site/docs/naming.html:243
msgid ""
-"Names are checked for conflict with existing names in the existing userhosts.txt and hosts.txt\n"
+"Names are checked for conflict with existing names in the existing "
+"userhosts.txt and hosts.txt\n"
"(but not privatehosts.txt) after conversion to lower case."
-msgstr "Les noms sont vérifiés contre le conflit avec des noms existants dans userhosts.txt existant et hosts.txt\n(mais pas privatehosts.txt) après conversion en minuscule."
+msgstr ""
+"Les noms sont vérifiés contre le conflit avec des noms existants dans "
+"userhosts.txt existant et hosts.txt\n"
+"(mais pas privatehosts.txt) après conversion en minuscule."
#: i2p2www/pages/site/docs/naming.html:248
-msgid ""
-"Must contain only [a-z] [0-9] '.' and '-' after conversion to lower case."
-msgstr "Doivent contenir seulement [a-z] [0-9] '.' et '-' après conversion en minuscules."
+msgid "Must contain only [a-z] [0-9] '.' and '-' after conversion to lower case."
+msgstr ""
+"Doivent contenir seulement [a-z] [0-9] '.' et '-' après conversion en "
+"minuscules."
#: i2p2www/pages/site/docs/naming.html:252
msgid "Must not start with '.' or '-'."
@@ -875,8 +1091,13 @@ msgstr ""
#: i2p2www/pages/site/docs/naming.html:280
msgid ""
"Certain hostnames reserved for project use are not allowed\n"
-"(proxy.i2p, router.i2p, console.i2p, *.proxy.i2p, *.router.i2p, *.console.i2p, and others)"
-msgstr "Certains noms d'hôtes réservés pour l'usage du projet ne sont pas autorisés\n(proxy.i2p, router.i2p, console.i2p, *.proxy.i2p, *.router.i2p, *.console.i2p, et autres)"
+"(proxy.i2p, router.i2p, console.i2p, *.proxy.i2p, *.router.i2p, "
+"*.console.i2p, and others)"
+msgstr ""
+"Certains noms d'hôtes réservés pour l'usage du projet ne sont pas "
+"autorisés\n"
+"(proxy.i2p, router.i2p, console.i2p, *.proxy.i2p, *.router.i2p, "
+"*.console.i2p, et autres)"
#: i2p2www/pages/site/docs/naming.html:285
msgid "Keys are checked for base64 validity."
@@ -886,7 +1107,9 @@ msgstr "Les clés sont vérifiées concernant la validité base64."
msgid ""
"Keys are checked for conflict with existing keys in hosts.txt (but not "
"privatehosts.txt)."
-msgstr "Les clés sont vérifiées contre le conflit avec des clés existantes dans hosts.txt (mais pas privatehosts.txt)."
+msgstr ""
+"Les clés sont vérifiées contre le conflit avec des clés existantes dans "
+"hosts.txt (mais pas privatehosts.txt)."
#: i2p2www/pages/site/docs/naming.html:293
msgid "Minimum key length 516 bytes."
@@ -894,12 +1117,14 @@ msgstr "Longueur minimum de clé : 516 octets."
#: i2p2www/pages/site/docs/naming.html:297
msgid "Maximum key length 616 bytes (to account for certs up to 100 bytes)."
-msgstr "Longueur maximum de clé : 616 octets (pour tenir compte des certs jusqu'à 100 octets)."
+msgstr ""
+"Longueur maximum de clé : 616 octets (pour tenir compte des certs jusqu'à"
+" 100 octets)."
#: i2p2www/pages/site/docs/naming.html:302
msgid ""
-"Any name received via subscription that passes all the checks is added via "
-"the local naming service."
+"Any name received via subscription that passes all the checks is added "
+"via the local naming service."
msgstr ""
#: i2p2www/pages/site/docs/naming.html:306
@@ -912,21 +1137,45 @@ msgid ""
"Methods to deny subdomains to non-domain 'owners' (certificates?),\n"
"and the desirability and feasibility of these methods,\n"
"are topics for future discussion."
-msgstr "Notez que les symboles '.' dans un nom hôte n'ont aucune signification\net ne dénotent pas de hiérarchie de nommage ni de confiance.\nSi le nom 'host.i2p' existe déjà, il n'y a rien\npour empêcher quelqu'un d'ajouter un nom 'a.host.i2p' à son hosts.txt,\net ce nom pourra être importé par les carnets d'adresses d'autres personnes.\nDes méthodes pour refuser des sous-domaines aux 'propriétaires' de non-domaines (des certificats ?)\net la désirabilité et la faisabilité de ces méthodes\nsont sujets de discussions futures."
+msgstr ""
+"Notez que les symboles '.' dans un nom hôte n'ont aucune signification\n"
+"et ne dénotent pas de hiérarchie de nommage ni de confiance.\n"
+"Si le nom 'host.i2p' existe déjà, il n'y a rien\n"
+"pour empêcher quelqu'un d'ajouter un nom 'a.host.i2p' à son hosts.txt,\n"
+"et ce nom pourra être importé par les carnets d'adresses d'autres "
+"personnes.\n"
+"Des méthodes pour refuser des sous-domaines aux 'propriétaires' de non-"
+"domaines (des certificats ?)\n"
+"et la désirabilité et la faisabilité de ces méthodes\n"
+"sont sujets de discussions futures."
#: i2p2www/pages/site/docs/naming.html:317
msgid ""
-"International Domain Names (IDN) also work in i2p (using punycode 'xn--' form).\n"
-"To see IDN .i2p domain names rendered correctly in Firefox's location bar,\n"
+"International Domain Names (IDN) also work in i2p (using punycode 'xn--' "
+"form).\n"
+"To see IDN .i2p domain names rendered correctly in Firefox's location "
+"bar,\n"
"add 'network.IDN.whitelist.i2p (boolean) = true' in about:config."
-msgstr "Les noms de domaine internationaux (IDN) marchent aussi dans i2p (utilisant le punycode de forme 'xn--').\nPour voir les noms de domaine IDN .i2p rendus correctement dans la barre d'adresse de Firefox,\najoutez 'network.IDN.whitelist.i2p (boolean) = true' dans about:config."
+msgstr ""
+"Les noms de domaine internationaux (IDN) marchent aussi dans i2p "
+"(utilisant le punycode de forme 'xn--').\n"
+"Pour voir les noms de domaine IDN .i2p rendus correctement dans la barre "
+"d'adresse de Firefox,\n"
+"ajoutez 'network.IDN.whitelist.i2p (boolean) = true' dans about:config."
#: i2p2www/pages/site/docs/naming.html:323
msgid ""
-"As the addressbook application does not use privatehosts.txt at all, in practice\n"
-"this file is the only place where it is appropriate to place private aliases or\n"
+"As the addressbook application does not use privatehosts.txt at all, in "
+"practice\n"
+"this file is the only place where it is appropriate to place private "
+"aliases or\n"
"\"pet names\" for sites already in hosts.txt."
-msgstr "Comme l'application carnet d'adresses n'utilise pas du tout privatehosts.txt, en pratique\nce fichier est le seul endroit où il est approprié de placer des alias privés ou\n\"pet names\" pour des sites déjà présents dans hosts.txt."
+msgstr ""
+"Comme l'application carnet d'adresses n'utilise pas du tout "
+"privatehosts.txt, en pratique\n"
+"ce fichier est le seul endroit où il est approprié de placer des alias "
+"privés ou\n"
+"\"pet names\" pour des sites déjà présents dans hosts.txt."
#: i2p2www/pages/site/docs/naming.html:329
msgid "Outgoing Subscriptions"
@@ -935,34 +1184,59 @@ msgstr "Abonnements sortants"
#: i2p2www/pages/site/docs/naming.html:330
msgid ""
"Addressbook will publish the merged hosts.txt to a location\n"
-"(traditionally hosts.txt in the local eepsite's home directory) to be accessed by others\n"
+"(traditionally hosts.txt in the local eepsite's home directory) to be "
+"accessed by others\n"
"for their subscriptions.\n"
"This step is optional and is disabled by default."
-msgstr "Addressbook publiera les hosts.txt fusionnés à un emplacement\n(traditionnellement hosts.txt dans le répertoire home de l'eepsite's local) afin qu'il soit accessible par d'autres \npour leurs abonnements. \nCette étape est facultative et est désactivée par défaut."
+msgstr ""
+"Addressbook publiera les hosts.txt fusionnés à un emplacement\n"
+"(traditionnellement hosts.txt dans le répertoire home de l'eepsite's "
+"local) afin qu'il soit accessible par d'autres \n"
+"pour leurs abonnements. \n"
+"Cette étape est facultative et est désactivée par défaut."
#: i2p2www/pages/site/docs/naming.html:338
msgid ""
-"The addressbook application, together with eepget, saves the Etag and/or Last-Modified\n"
+"The addressbook application, together with eepget, saves the Etag and/or "
+"Last-Modified\n"
"information returned by the web server of the subscription.\n"
"This greatly reduces the bandwidth required, as the web server will\n"
"return a '304 Not Modified' on the next fetch if nothing has changed."
-msgstr "L'application carnet d'adresses, ensemble avec eepget, sauve l'Etag et-ou l'informations de dernière-modication rendues par le serveur Web de l'abonnement.\nCeci réduit grandement la bande passante exigée, car le serveur Web\nva retourner un '304 non modifié' sur la prochaine récupération si rien n'a changé."
+msgstr ""
+"L'application carnet d'adresses, ensemble avec eepget, sauve l'Etag et-ou"
+" l'informations de dernière-modication rendues par le serveur Web de "
+"l'abonnement.\n"
+"Ceci réduit grandement la bande passante exigée, car le serveur Web\n"
+"va retourner un '304 non modifié' sur la prochaine récupération si rien "
+"n'a changé."
#: i2p2www/pages/site/docs/naming.html:345
msgid ""
"However the entire hosts.txt is downloaded if it has changed.\n"
"See below for discussion on this issue."
-msgstr "Cependant hosts.txt est téléchargé en entier si il a changé.\nVoir ci-dessous pour la discussion sur cette question."
+msgstr ""
+"Cependant hosts.txt est téléchargé en entier si il a changé.\n"
+"Voir ci-dessous pour la discussion sur cette question."
#: i2p2www/pages/site/docs/naming.html:350
msgid ""
"Hosts serving a static hosts.txt or an equivalent CGI application\n"
"are strongly encouraged to deliver\n"
"a Content-Length header, and either an Etag or Last-Modified header.\n"
-"Also ensure that the server delivers a '304 Not Modified' when appropriate.\n"
+"Also ensure that the server delivers a '304 Not Modified' when "
+"appropriate.\n"
"This will dramatically reduce the network bandwidth, and\n"
"reduce chances of corruption."
-msgstr "Les hôtes servant un hosts.txt statique ou une application CGI équivalente\nsont fortement encouragés à livrer\nun en-tête de longueur de contenu, et soit une Etag ou une en-tête de derniere modification.\nAssurez aussi que le serveur livre 'un '304 non modifié' quand c'est nécessaire.\nCeci réduira radicalement la bande passante de réseau et \nréduira les risques de corruption."
+msgstr ""
+"Les hôtes servant un hosts.txt statique ou une application CGI "
+"équivalente\n"
+"sont fortement encouragés à livrer\n"
+"un en-tête de longueur de contenu, et soit une Etag ou une en-tête de "
+"derniere modification.\n"
+"Assurez aussi que le serveur livre 'un '304 non modifié' quand c'est "
+"nécessaire.\n"
+"Ceci réduira radicalement la bande passante de réseau et \n"
+"réduira les risques de corruption."
#: i2p2www/pages/site/docs/naming.html:359
msgid "Host Add Services"
@@ -970,17 +1244,31 @@ msgstr "Services d'ajout d'hôtes"
#: i2p2www/pages/site/docs/naming.html:360
msgid ""
-"A host add service is a simple CGI application that takes a hostname and a Base64 key as parameters\n"
+"A host add service is a simple CGI application that takes a hostname and "
+"a Base64 key as parameters\n"
"and adds that to its local hosts.txt.\n"
"If other routers subscribe to that hosts.txt, the new hostname/key\n"
"will be propagated through the network."
-msgstr "Un service d'ajout d'hôte est une simple application CGI qui prend un nom d'hôte et une clé en Base64 comme paramètres et ajoute cela à son hosts.txt local.\nSi d'autres routeurs s'abonnent à ce hosts.txt, le nouveau nom d'hôte ou clé\nseront propagés à travers le réseau."
+msgstr ""
+"Un service d'ajout d'hôte est une simple application CGI qui prend un nom"
+" d'hôte et une clé en Base64 comme paramètres et ajoute cela à son "
+"hosts.txt local.\n"
+"Si d'autres routeurs s'abonnent à ce hosts.txt, le nouveau nom d'hôte ou "
+"clé\n"
+"seront propagés à travers le réseau."
#: i2p2www/pages/site/docs/naming.html:367
msgid ""
-"It is recommended that host add services impose, at a minimum, the restrictions imposed by the addressbook application listed above.\n"
-"Host add services may impose additional restrictions on hostnames and keys, for example:"
-msgstr "Il est recommandé que les services de nom d'hôte imposent, au minimum, les restrictions imposées par la l'application carnet d'adresses inscrite ci-dessus.\nLes services d'ajout d'hôtes peuvent imposer des restrictions supplémentaires de nom d'hôtes et de clés, par exemple :"
+"It is recommended that host add services impose, at a minimum, the "
+"restrictions imposed by the addressbook application listed above.\n"
+"Host add services may impose additional restrictions on hostnames and "
+"keys, for example:"
+msgstr ""
+"Il est recommandé que les services de nom d'hôte imposent, au minimum, "
+"les restrictions imposées par la l'application carnet d'adresses inscrite"
+" ci-dessus.\n"
+"Les services d'ajout d'hôtes peuvent imposer des restrictions "
+"supplémentaires de nom d'hôtes et de clés, par exemple :"
#: i2p2www/pages/site/docs/naming.html:372
msgid "A limit on number of 'subdomains'."
@@ -1032,41 +1320,71 @@ msgstr "Services de saut"
#: i2p2www/pages/site/docs/naming.html:418
msgid ""
-"A jump service is a simple CGI application that takes a hostname as a parameter\n"
-"and returns a 301 redirect to the proper URL with a ?i2paddresshelper=key
\n"
+"A jump service is a simple CGI application that takes a hostname as a "
+"parameter\n"
+"and returns a 301 redirect to the proper URL with a "
+"?i2paddresshelper=key
\n"
"string appended.\n"
"The HTTP proxy will interpret the appended string and\n"
"use that key as the actual destination.\n"
"In addition, the proxy will cache that key so the\n"
"address helper is not necessary until restart."
-msgstr "Un service de saut est une simple application CGI qui prend un nom d'hôte comme paramètre\net retourne une redirection 301 redirigeant vers l'URL appropriée avec une chaîne ?i2paddresshelper=key
ajoutée.\nLe proxy HTTP va interpréter la chaîne ajoutée et\nutiliser cette clé en tant que destination réelle.\nDe plus, le proxy va mettre cette clé en cache afin que\nle carnet d'adresses ne soit plus nécessaire jusqu'au redémarrage."
+msgstr ""
+"Un service de saut est une simple application CGI qui prend un nom d'hôte"
+" comme paramètre\n"
+"et retourne une redirection 301 redirigeant vers l'URL appropriée avec "
+"une chaîne ?i2paddresshelper=key
ajoutée.\n"
+"Le proxy HTTP va interpréter la chaîne ajoutée et\n"
+"utiliser cette clé en tant que destination réelle.\n"
+"De plus, le proxy va mettre cette clé en cache afin que\n"
+"le carnet d'adresses ne soit plus nécessaire jusqu'au redémarrage."
#: i2p2www/pages/site/docs/naming.html:428
msgid ""
"Note that, like with subscriptions, using a jump service\n"
"implies a certain amount of trust, as a jump service could maliciously\n"
"redirect a user to an incorrect destination."
-msgstr "Notez que, comme avec les abonnements, utiliser un service de saut\nimplique une certaine quantité de confiance, car le un service de saut pourrait\nde façon malveillante rediriger un utilisateur vers une destination incorrecte."
+msgstr ""
+"Notez que, comme avec les abonnements, utiliser un service de saut\n"
+"implique une certaine quantité de confiance, car le un service de saut "
+"pourrait\n"
+"de façon malveillante rediriger un utilisateur vers une destination "
+"incorrecte."
#: i2p2www/pages/site/docs/naming.html:434
msgid ""
"To provide the best service, a jump service should be subscribed to\n"
"several hosts.txt providers so that its local host list is current."
-msgstr "Pour fournir le meilleur service, un service de saut devrait être abonné à\nplusieurs fournisseurs hosts.txt afin que sa liste d'hôtes locaux soit actuelle."
+msgstr ""
+"Pour fournir le meilleur service, un service de saut devrait être abonné "
+"à\n"
+"plusieurs fournisseurs hosts.txt afin que sa liste d'hôtes locaux soit "
+"actuelle."
#: i2p2www/pages/site/docs/naming.html:440
msgid ""
-"SusiDNS is simply a web interface front-end to configuring addressbook subscriptions\n"
+"SusiDNS is simply a web interface front-end to configuring addressbook "
+"subscriptions\n"
"and accessing the four addressbook files.\n"
"All the real work is done by the 'addressbook' application."
-msgstr "SusiDNS est simplement une interface Web frontale pour configurer les abonnements de carnet d'adresses\net accéder aux quatre fichiers de carnet d'adresses.\nTout le travail réel est fait par l'application 'carnet d'adresses'."
+msgstr ""
+"SusiDNS est simplement une interface Web frontale pour configurer les "
+"abonnements de carnet d'adresses\n"
+"et accéder aux quatre fichiers de carnet d'adresses.\n"
+"Tout le travail réel est fait par l'application 'carnet d'adresses'."
#: i2p2www/pages/site/docs/naming.html:446
msgid ""
-"Currently, there is little enforcement of addressbook naming rules within SusiDNS,\n"
+"Currently, there is little enforcement of addressbook naming rules within"
+" SusiDNS,\n"
"so a user may enter hostnames locally that would be rejected by\n"
"the addressbook subscription rules."
-msgstr "Actuellement, il y a peu d'exécutions des règles de nommage de carnet d'adresses dans SusiDNS,\ndonc un utilisateur peut entrer des noms d'hôtes localement qui seraient rejetés par\nles règles d'abonnement de carnet d'adresses."
+msgstr ""
+"Actuellement, il y a peu d'exécutions des règles de nommage de carnet "
+"d'adresses dans SusiDNS,\n"
+"donc un utilisateur peut entrer des noms d'hôtes localement qui seraient "
+"rejetés par\n"
+"les règles d'abonnement de carnet d'adresses."
#: i2p2www/pages/site/docs/naming.html:452
msgid "Base32 Names"
@@ -1077,33 +1395,52 @@ msgid ""
"I2P supports Base32 hostnames similar to Tor's .onion addresses.\n"
"Base32 addresses are much shorter and easier to handle than the\n"
"full 516-character Base64 Destinations or addresshelpers.\n"
-"Example: ukeu3k5oycgaauneqgtnvselmt4yemvoilkln7jpvamvfx7dnkdq.b32.i2p
"
-msgstr "I2P supporte les noms d'hôte en Base32 semblables aux adresses .onion de Tor.\nLes adresses Base32 sont beaucoup plus courtes et plus faciles à manipuler que les\ndestinations Base64 pleines à 516 caractères ou les aides d'adresse.\nExemple : ukeu3k5oycgaauneqgtnvselmt4yemvoilkln7jpvamvfx7dnkdq.b32.i2p
"
+"Example: "
+"ukeu3k5oycgaauneqgtnvselmt4yemvoilkln7jpvamvfx7dnkdq.b32.i2p
"
+msgstr ""
+"I2P supporte les noms d'hôte en Base32 semblables aux adresses .onion de "
+"Tor.\n"
+"Les adresses Base32 sont beaucoup plus courtes et plus faciles à "
+"manipuler que les\n"
+"destinations Base64 pleines à 516 caractères ou les aides d'adresse.\n"
+"Exemple : "
+"ukeu3k5oycgaauneqgtnvselmt4yemvoilkln7jpvamvfx7dnkdq.b32.i2p
"
#: i2p2www/pages/site/docs/naming.html:460
#, python-format
msgid ""
-"In Tor, the address is 16 characters (80 bits), or half of the SHA-1 hash.\n"
+"In Tor, the address is 16 characters (80 bits), or half of the SHA-1 "
+"hash.\n"
"I2P uses 52 characters (256 bits) to represent the full SHA-256 hash.\n"
"The form is {52 chars}.b32.i2p.\n"
"Tor has recently published a\n"
-"proposal\n"
-"to convert to an identical format of {52 chars}.onion for their hidden services.\n"
+"proposal\n"
+"to convert to an identical format of {52 chars}.onion for their hidden "
+"services.\n"
"Base32 is implemented in the naming service, which queries the\n"
"router over I2CP to lookup the LeaseSet to get the full Destination.\n"
-"Base32 lookups will only be successful when the Destination is up and publishing\n"
+"Base32 lookups will only be successful when the Destination is up and "
+"publishing\n"
"a LeaseSet.\n"
-"Because resolution may require a network database lookup, it may take significantly\n"
+"Because resolution may require a network database lookup, it may take "
+"significantly\n"
"longer than a local address book lookup."
msgstr ""
#: i2p2www/pages/site/docs/naming.html:475
msgid ""
-"Base32 addresses can be used in most places where hostnames or full destinations\n"
+"Base32 addresses can be used in most places where hostnames or full "
+"destinations\n"
"are used, however there are some exceptions where they may fail if the\n"
"name does not immediately resolve. I2PTunnel will fail, for example, if\n"
"the name does not resolve to a destination."
-msgstr "Les adresses Base32 peuvent être utilisées dans la plupart des endroits où noms d'hôte ou des destinations pleines sont utilisées, cependant il y a quelques exceptions où elles peuvent échouer si le\nnom n'est pas résolu immédiatement . I2PTunnel échouera, par exemple, si\nle nom ne résout pas à une destination."
+msgstr ""
+"Les adresses Base32 peuvent être utilisées dans la plupart des endroits "
+"où noms d'hôte ou des destinations pleines sont utilisées, cependant il y"
+" a quelques exceptions où elles peuvent échouer si le\n"
+"nom n'est pas résolu immédiatement . I2PTunnel échouera, par exemple, si\n"
+"le nom ne résout pas à une destination."
#: i2p2www/pages/site/docs/plugins.html:2
#: i2p2www/pages/site/docs/spec/configuration.html:152
@@ -1122,13 +1459,20 @@ msgstr "Information générale"
msgid ""
"I2P includes a plugin architecture\n"
"to support easy development and installation of additional software."
-msgstr "I2P inclut une architecture de plugin\npour soutenir le développement facile et l'installation de logiciel supplémentaire."
+msgstr ""
+"I2P inclut une architecture de plugin\n"
+"pour soutenir le développement facile et l'installation de logiciel "
+"supplémentaire."
#: i2p2www/pages/site/docs/plugins.html:12
msgid ""
-"There are now plugins available that support distributed email, blogs, IRC\n"
+"There are now plugins available that support distributed email, blogs, "
+"IRC\n"
"clients, distributed file storage, wikis, and more."
-msgstr "Il y a maintenant des plug-ins disponibles qui soutiennent courrier électronique distribué, blogs, clients IRC,\nstockage de fichiers distribué, wikis, et plus."
+msgstr ""
+"Il y a maintenant des plug-ins disponibles qui soutiennent courrier "
+"électronique distribué, blogs, clients IRC,\n"
+"stockage de fichiers distribué, wikis, et plus."
#: i2p2www/pages/site/docs/plugins.html:17
msgid "Benefits to i2p users and app developers:"
@@ -1142,13 +1486,20 @@ msgstr "Distribution facile d'applications"
msgid ""
"Allows innovation and use of additional libraries without worrying about\n"
"increasing the size of i2pupdate.sud
"
-msgstr "Permet l'innovation et l'utilisation de bibliothèques supplémentaires sans s'inquiéter de\nl'augmentation de la taille de i2pupdate.sud
"
+msgstr ""
+"Permet l'innovation et l'utilisation de bibliothèques supplémentaires "
+"sans s'inquiéter de\n"
+"l'augmentation de la taille de i2pupdate.sud
"
#: i2p2www/pages/site/docs/plugins.html:31
msgid ""
-"Support large or special-purpose applications that would never be bundled\n"
+"Support large or special-purpose applications that would never be bundled"
+"\n"
"with the I2P installation"
-msgstr "Soutient les grandes applications ou à but particulier qui ne seraient jamais empaquetées\navec l'installation I2P"
+msgstr ""
+"Soutient les grandes applications ou à but particulier qui ne seraient "
+"jamais empaquetées\n"
+"avec l'installation I2P"
#: i2p2www/pages/site/docs/plugins.html:36
msgid "Cryptographically signed and verified applications"
@@ -1160,15 +1511,20 @@ msgstr "Mises à jour automatiques d'applications, comme pour le routeur"
#: i2p2www/pages/site/docs/plugins.html:44
msgid ""
-"Separate initial install and update packages, if desired, for smaller update"
-" downloads"
-msgstr "Sépare l'installation initiale et les paquets de mise à jour, si vous le souhaitez, pour de plus petits téléchargements de mise à jour"
+"Separate initial install and update packages, if desired, for smaller "
+"update downloads"
+msgstr ""
+"Sépare l'installation initiale et les paquets de mise à jour, si vous le "
+"souhaitez, pour de plus petits téléchargements de mise à jour"
#: i2p2www/pages/site/docs/plugins.html:48
msgid ""
"One-click installation of applications. No more asking users to modify\n"
"wrapper.config
or clients.config
"
-msgstr "Installation d'applications en un clic. Il n'est plus demandé aux utilisateurs de modifier\nwrapper.config
ou clients.config
"
+msgstr ""
+"Installation d'applications en un clic. Il n'est plus demandé aux "
+"utilisateurs de modifier\n"
+"wrapper.config
ou clients.config
"
#: i2p2www/pages/site/docs/plugins.html:53
msgid "Isolate applications from the base $I2P
installation"
@@ -1178,7 +1534,10 @@ msgstr "Isole les applications de l'installation $I2P
de base"
msgid ""
"Automatic compatibility checking for I2P version, Java version, Jetty\n"
"version, and previous installed application version"
-msgstr "Vérification de compatibilité automatique de la version I2P, version Java, version\nJetty, et de la version de l'application précédemment installée"
+msgstr ""
+"Vérification de compatibilité automatique de la version I2P, version "
+"Java, version\n"
+"Jetty, et de la version de l'application précédemment installée"
#: i2p2www/pages/site/docs/plugins.html:62
msgid "Automatic link addition in console"
@@ -1188,19 +1547,24 @@ msgstr "Addition automatique de lien dans la console"
msgid ""
"Automatic startup of application, including modifying classpath, without "
"requiring a restart"
-msgstr "Démarrage automatique de l'application, y compris modification classpath, sans exiger un redémarrage"
+msgstr ""
+"Démarrage automatique de l'application, y compris modification classpath,"
+" sans exiger un redémarrage"
#: i2p2www/pages/site/docs/plugins.html:70
-msgid ""
-"Automatic integration and startup of webapps into console Jetty instance"
-msgstr "Intégration automatique et démarrage de webapps dans l'instance de la console Jetty"
+msgid "Automatic integration and startup of webapps into console Jetty instance"
+msgstr ""
+"Intégration automatique et démarrage de webapps dans l'instance de la "
+"console Jetty"
#: i2p2www/pages/site/docs/plugins.html:74
#, python-format
msgid ""
"Facilitate creation of 'app stores' like the one at\n"
"%(pluginsite)s"
-msgstr "Facilite la création d' 'App Stores' comme celui-ci\n%(pluginsite)s"
+msgstr ""
+"Facilite la création d' 'App Stores' comme celui-ci\n"
+"%(pluginsite)s"
#: i2p2www/pages/site/docs/plugins.html:79
msgid "One-click uninstall"
@@ -1232,23 +1596,56 @@ msgstr "Installation"
#: i2p2www/pages/site/docs/plugins.html:101
msgid ""
-"To install and start a plugin, copy the .xpi2p
install link to\n"
+"To install and start a plugin, copy the .xpi2p
install link "
+"to\n"
"the form at the bottom of\n"
-"configclients.jsp in\n"
-"your router console and click the \"install plugin\" button. After a\n"
-"plugin is installed and started, a link to the plugin will usually appear at\n"
+"configclients.jsp"
+" in\n"
+"your router console and click the \"install plugin\" button. After a"
+"\n"
+"plugin is installed and started, a link to the plugin will usually appear"
+" at\n"
"the top of your summary bar."
-msgstr "Pour installer et démarrer un plug-in, copiez le lien d'installation .xpi2p
vers\nle formulaire au bas de \nconfigclients.jsp dans\nvotre console routeur et cliquez le bouton \"installer le plug-in\". Après que\nle plug-in soit installé et démarré, un lien vers le plug-in apparaîtra d'habitude en\nhaut de votre barre de sommaire."
+msgstr ""
+"Pour installer et démarrer un plug-in, copiez le lien d'installation "
+".xpi2p
vers\n"
+"le formulaire au bas de \n"
+"configclients.jsp"
+" dans\n"
+"votre console routeur et cliquez le bouton \"installer le plug-in\". "
+"Après que\n"
+"le plug-in soit installé et démarré, un lien vers le plug-in apparaîtra "
+"d'habitude en\n"
+"haut de votre barre de sommaire."
#: i2p2www/pages/site/docs/plugins.html:110
msgid ""
-"To update a plugin to the latest version, just click the update button on\n"
-"configclients.jsp.\n"
-"There is also a button to check if the plugin has a more recent version, as\n"
-"well as a button to check for updates for all plugins. Plugins will be checked\n"
-"for updates automatically when updating to a new I2P release (not including dev\n"
+"To update a plugin to the latest version, just click the update button on"
+"\n"
+"configclients.jsp."
+"\n"
+"There is also a button to check if the plugin has a more recent version, "
+"as\n"
+"well as a button to check for updates for all plugins. Plugins will be "
+"checked\n"
+"for updates automatically when updating to a new I2P release (not "
+"including dev\n"
"builds)."
-msgstr "Pour mettre à jour un plug-in vers la dernière version, cliquez juste sur le bouton de mise à jour situé dans\nconfigclients.jsp.\nIl y a aussi un bouton pour vérifier si le plug-in a une version plus récente, ainsi\nqu'un bouton pour vérifier les mises à jour de tous les plug-ins. Concernant les mises à jour\nles plug-ins seront vérifiés automatiquement lors de la mise à jour vers une nouvelle version d'I2P (n'incluant pas les builds de dév)."
+msgstr ""
+"Pour mettre à jour un plug-in vers la dernière version, cliquez juste sur"
+" le bouton de mise à jour situé dans\n"
+"configclients.jsp."
+"\n"
+"Il y a aussi un bouton pour vérifier si le plug-in a une version plus "
+"récente, ainsi\n"
+"qu'un bouton pour vérifier les mises à jour de tous les plug-ins. "
+"Concernant les mises à jour\n"
+"les plug-ins seront vérifiés automatiquement lors de la mise à jour vers "
+"une nouvelle version d'I2P (n'incluant pas les builds de dév)."
#: i2p2www/pages/site/docs/plugins.html:120
msgid "Development"
@@ -1257,23 +1654,38 @@ msgstr "Développement"
#: i2p2www/pages/site/docs/plugins.html:121
#, python-format
msgid ""
-"See the latest plugin specification and the\n"
+"See the latest plugin specification and "
+"the\n"
"plugin forum on %(zzz)s."
-msgstr "Voyez la plus récent spécification de plugin et le\nforum plugin sur %(zzz)s."
+msgstr ""
+"Voyez la plus récent spécification de "
+"plugin et le\n"
+"forum plugin sur %(zzz)s."
#: i2p2www/pages/site/docs/plugins.html:126
#, python-format
msgid ""
-"See also the sources for plugins developed by various people. Some plugins, such\n"
-"as snowman, were developed\n"
+"See also the sources for plugins developed by various people. Some "
+"plugins, such\n"
+"as snowman, were "
+"developed\n"
"specifically as examples."
-msgstr "Voir aussi les sources de plug-ins développése par diverses personnes. Quelques plug-ins, tel\nque snowman, ont été développés\nspécifiquement comme exemples."
+msgstr ""
+"Voir aussi les sources de plug-ins développése par diverses personnes. "
+"Quelques plug-ins, tel\n"
+"que snowman, ont "
+"été développés\n"
+"spécifiquement comme exemples."
#: i2p2www/pages/site/docs/plugins.html:132
msgid ""
-"Developers wanted! Plugins are a great way to learn more about I2P\n"
+"Developers wanted! Plugins are a great way to learn more about I2P"
+"\n"
"or easily add some feature."
-msgstr "Développeurs recherchés ! Les plug-ins sont une super façon d'apprendre au sujet d'I2P\nou d'ajouter facilement une fonctionnalité."
+msgstr ""
+"Développeurs recherchés ! Les plug-ins sont une super façon "
+"d'apprendre au sujet d'I2P\n"
+"ou d'ajouter facilement une fonctionnalité."
#: i2p2www/pages/site/docs/plugins.html:137
msgid "Getting Started"
@@ -1283,8 +1695,13 @@ msgstr "Commencer"
#, python-format
msgid ""
"To create a plugin from an existing binary package you will need to get\n"
-"makeplugin.sh from the i2p.scripts branch in monotone."
-msgstr "Pour créer un plug-in à partir d'un paquet de fichier binaire existant vous aurez besoin d'obtenir\nmakeplugin.sh depuis la branche i2p.scripts dans monotone."
+"makeplugin.sh from the i2p.scripts branch in "
+"monotone."
+msgstr ""
+"Pour créer un plug-in à partir d'un paquet de fichier binaire existant "
+"vous aurez besoin d'obtenir\n"
+"makeplugin.sh depuis la branche i2p.scripts dans "
+"monotone."
#: i2p2www/pages/site/docs/plugins.html:144
msgid "Known Issues"
@@ -1294,14 +1711,24 @@ msgstr "Anomalies connues"
msgid ""
"Note that the router's plugin architecture does NOT currently\n"
"provide any additional security isolation or sandboxing of plugins."
-msgstr "Notez que l'architecture de plug-in du routeur ne fournit actuellement PAS\nde quelconque isolement de sécurité supplémentaire ni sandboxing de plug-ins."
+msgstr ""
+"Notez que l'architecture de plug-in du routeur ne fournit actuellement "
+"PAS\n"
+"de quelconque isolement de sécurité supplémentaire ni sandboxing de plug-"
+"ins."
#: i2p2www/pages/site/docs/plugins.html:151
msgid ""
"Updates of a plugin with included jars (not wars) won't be recognized if\n"
-"the plugin was already run, as it requires class loader trickery to flush the\n"
+"the plugin was already run, as it requires class loader trickery to flush"
+" the\n"
"class cache; a full router restart is required."
-msgstr "Les mises à jour d'un plug-in avec des jars (pas des wars) inclus ne seront pas reconnues si\nle plug-in était déjà en cours d'exécution, car il exige que l'astuce de tromperie de classe chargeur vide la\nclasse cache; une redémarrage complet du routeur est exigé."
+msgstr ""
+"Les mises à jour d'un plug-in avec des jars (pas des wars) inclus ne "
+"seront pas reconnues si\n"
+"le plug-in était déjà en cours d'exécution, car il exige que l'astuce de "
+"tromperie de classe chargeur vide la\n"
+"classe cache; une redémarrage complet du routeur est exigé."
#: i2p2www/pages/site/docs/plugins.html:157
msgid "The stop button may be displayed even if there is nothing to stop."
@@ -1309,28 +1736,49 @@ msgstr "Le bouton d'arrêt peut être affiché même s'il n'y a rien à arrêter
#: i2p2www/pages/site/docs/plugins.html:161
msgid ""
-"Plugins running in a separate JVM create a logs/
directory in\n"
+"Plugins running in a separate JVM create a logs/
directory "
+"in\n"
+"$CWD
."
+msgstr ""
+"Les plug-ins exécutés dans une JVM séparée créent un répertorie "
+"logs/
dans\n"
"$CWD
."
-msgstr "Les plug-ins exécutés dans une JVM séparée créent un répertorie logs/
dans\n$CWD
."
#: i2p2www/pages/site/docs/plugins.html:166
msgid ""
-"No initial keys are present, except for those of jrandom and zzz (using the\n"
+"No initial keys are present, except for those of jrandom and zzz (using "
+"the\n"
"same keys as for router update), so the first key seen for a signer is\n"
"automatically accepted—there is no signing key authority."
-msgstr "Aucune clés initiales ne sont présentes, à part celles de jrandom et de zzz (utilisant la\nmême clé que pour la mise à jour de routeur), ainsi la première clé vue pour un signataire sera\nautomatiquement acceptée—il n'y a aucune autorité de signature de clé."
+msgstr ""
+"Aucune clés initiales ne sont présentes, à part celles de jrandom et de "
+"zzz (utilisant la\n"
+"même clé que pour la mise à jour de routeur), ainsi la première clé vue "
+"pour un signataire sera\n"
+"automatiquement acceptée—il n'y a aucune autorité de signature de "
+"clé."
#: i2p2www/pages/site/docs/plugins.html:172
msgid ""
-"When deleting a plugin, the directory is not always deleted, especially on\n"
+"When deleting a plugin, the directory is not always deleted, especially "
+"on\n"
+"Windows."
+msgstr ""
+"Lors de la suppression d'un plug-in, le répertoire n'est pas toujours "
+"supprimé, en particulier sur\n"
"Windows."
-msgstr "Lors de la suppression d'un plug-in, le répertoire n'est pas toujours supprimé, en particulier sur\nWindows."
#: i2p2www/pages/site/docs/plugins.html:177
msgid ""
-"Installing a plugin requiring Java 1.6 on a Java 1.5 machine will result in a\n"
-"\"plugin is corrupt\" message if pack200 compression of the plugin file is used."
-msgstr "Installer un plug-in exigeant Java 1.6 sur une machine Java 1.5 aboutira à\nau message \"le plug-in est corrompu\" si le fichier est compressé en pack200."
+"Installing a plugin requiring Java 1.6 on a Java 1.5 machine will result "
+"in a\n"
+"\"plugin is corrupt\" message if pack200 compression of the plugin file "
+"is used."
+msgstr ""
+"Installer un plug-in exigeant Java 1.6 sur une machine Java 1.5 aboutira "
+"à\n"
+"au message \"le plug-in est corrompu\" si le fichier est compressé en "
+"pack200."
#: i2p2www/pages/site/docs/plugins.html:182
msgid "Theme and translation plugins are untested."
@@ -1350,10 +1798,15 @@ msgstr "Mai 2013"
#: i2p2www/pages/site/docs/ports.html:7
msgid ""
-"These are the ports used or reserved by I2P, including those for known plugins,\n"
+"These are the ports used or reserved by I2P, including those for known "
+"plugins,\n"
"common alternates,\n"
"and some typical related applications."
-msgstr "Ce sont les ports utilisés ou réservés par I2P, y compris ceux pour les plugins connus, \nalternatifs communs,\net certaines applications liées typiques."
+msgstr ""
+"Ce sont les ports utilisés ou réservés par I2P, y compris ceux pour les "
+"plugins connus, \n"
+"alternatifs communs,\n"
+"et certaines applications liées typiques."
#: i2p2www/pages/site/docs/ports.html:13
#, python-format
@@ -1364,7 +1817,15 @@ msgid ""
"Plugin authors please add any ports you use here.\n"
"For new plugins, we recommend using the next available port\n"
"in the 766x range."
-msgstr "Notez que la plupart d'entre eux ne sont pas activés par défaut.\nIl y a davantage d'informations dans la FAQ .\nVoir aussi la documentation individuelle des plugins.\nAuteurs de plugins veuillez ajouter dedans les ports que vous utilisez.\nPour les nouveaux plugins, nous vous recommandons d'utiliser le port disponible suivant\nau sein de la plage 766x."
+msgstr ""
+"Notez que la plupart d'entre eux ne sont pas activés par défaut.\n"
+"Il y a davantage d'informations dans la FAQ "
+".\n"
+"Voir aussi la documentation individuelle des plugins.\n"
+"Auteurs de plugins veuillez ajouter dedans les ports que vous utilisez.\n"
+"Pour les nouveaux plugins, nous vous recommandons d'utiliser le port "
+"disponible suivant\n"
+"au sein de la plage 766x."
#: i2p2www/pages/site/docs/ports.html:53
msgid "recommended spot for new plugins/applications"
@@ -1392,21 +1853,40 @@ msgid ""
"The command channel is only needed for making or setting the initial\n"
"destination key, and to set the destination key to port bindings. \n"
"All connections run in parallel."
-msgstr "BOB a des canaux séparés pour les commandes et les données.\nL'un, une douille canal commande d'application vers le routeur pour configurer.\nLe deuxième, les douilles de données d'application vers/depuis le routeur qui transportent seulement des données.\nLe canal de commandes est seulement nécessaire pour faire ou mettre la clé\ninitiale de destination, et pour mettre la clé de destination vers les attaches de port.\nTous les connexions sont exécutées en parallèle."
+msgstr ""
+"BOB a des canaux séparés pour les commandes et les données.\n"
+"L'un, une douille canal commande d'application vers le routeur pour "
+"configurer.\n"
+"Le deuxième, les douilles de données d'application vers/depuis le routeur"
+" qui transportent seulement des données.\n"
+"Le canal de commandes est seulement nécessaire pour faire ou mettre la "
+"clé\n"
+"initiale de destination, et pour mettre la clé de destination vers les "
+"attaches de port.\n"
+"Tous les connexions sont exécutées en parallèle."
#: i2p2www/pages/site/docs/api/bob.html:23
msgid ""
"SAM has one connection that does everything, and you need to parse every "
"packet."
-msgstr "SAM a un connexion qui fait tout et vous devez faire l'analyse syntaxique de chaque paquet."
+msgstr ""
+"SAM a un connexion qui fait tout et vous devez faire l'analyse syntaxique"
+" de chaque paquet."
#: i2p2www/pages/site/docs/api/bob.html:27
msgid ""
"BOB does not hold keypair values, nor does the router.\n"
"Your application holds the keypair values. \n"
-"This is to reduce any extra complexity in the router code, it also adds to\n"
+"This is to reduce any extra complexity in the router code, it also adds "
+"to\n"
"your privacy."
-msgstr "BOB ne retient pas de valeurs de paires de clés, ni non plus le routeur. \nVotre application détient les valeurs de paires de clés.\nCeci est fait pour éviter une complexité supplémentaire dans le code de routeur, cela ajoute aussi\nà votre vie privée."
+msgstr ""
+"BOB ne retient pas de valeurs de paires de clés, ni non plus le routeur."
+" \n"
+"Votre application détient les valeurs de paires de clés.\n"
+"Ceci est fait pour éviter une complexité supplémentaire dans le code de "
+"routeur, cela ajoute aussi\n"
+"à votre vie privée."
#: i2p2www/pages/site/docs/api/bob.html:34
msgid "SAM router stores every keypair you ever make."
@@ -1427,41 +1907,66 @@ msgstr "KEY
= clé publique, aussi en BASE64"
#: i2p2www/pages/site/docs/api/bob.html:48
msgid ""
"ERROR
as is implied returns the message \"ERROR "
-"\"+DESCRIPTION+\"\\n\"
, where the DESCRIPTION
is what "
-"went wrong."
-msgstr "ERROR
comme elle l'implique retourne le message \"ERROR \"+DESCRIPTION+\"\\n\"
, où la DESCRIPTION
est ce qui s'est mal passé."
+"\"+DESCRIPTION+\"\\n\", where the DESCRIPTION
is what"
+" went wrong."
+msgstr ""
+"ERROR
comme elle l'implique retourne le message "
+"\"ERROR \"+DESCRIPTION+\"\\n\"
, où la "
+"DESCRIPTION
est ce qui s'est mal passé."
#: i2p2www/pages/site/docs/api/bob.html:51
msgid ""
-"OK
returns \"OK\"
, and if data is to be returned, "
-"it is on the same line. OK
means the command is finished."
-msgstr "OK
retourne \"OK\"
, et si les données doivent être rendues, il est sur la même ligne.OK
signifie que la commande est finie."
+"OK
returns \"OK\"
, and if data is to be "
+"returned, it is on the same line. OK
means the command is "
+"finished."
+msgstr ""
+"OK
retourne \"OK\"
, et si les données doivent "
+"être rendues, il est sur la même ligne.OK
signifie que la "
+"commande est finie."
#: i2p2www/pages/site/docs/api/bob.html:54
msgid ""
-"DATA
lines contain information that you requested. There may be"
-" multiple DATA
lines per request."
-msgstr "DATA
ces lignes contiennent les informations que vous avez demandé. Il peut y avoir de multiples lignes DATA
par requête."
+"DATA
lines contain information that you requested. There may"
+" be multiple DATA
lines per request."
+msgstr ""
+"DATA
ces lignes contiennent les informations que vous avez "
+"demandé. Il peut y avoir de multiples lignes DATA
par "
+"requête."
#: i2p2www/pages/site/docs/api/bob.html:58
msgid ""
-"NOTE: The help command is the ONLY command that has an exception to\n"
+"NOTE: The help command is the ONLY command that has an exception "
+"to\n"
"the rules... it can actually return nothing! This is intentional, since\n"
"help is a HUMAN and not an APPLICATION command."
-msgstr "NOTE : la commande d'aide est la SEULE commande qui a une exception aux\nrègles ... elle peut en réalité ne rien retourner ! Ceci est intentionnel, sachant\nque l'aide est un HUMAIN et pas une commande d'APPLICATION."
+msgstr ""
+"NOTE : la commande d'aide est la SEULE commande qui a une "
+"exception aux\n"
+"règles ... elle peut en réalité ne rien retourner ! Ceci est "
+"intentionnel, sachant\n"
+"que l'aide est un HUMAIN et pas une commande d'APPLICATION."
#: i2p2www/pages/site/docs/api/bob.html:64
msgid ""
"PLEASE NOTE:\n"
-"For CURRENT details on the commands PLEASE use the built-in help command. \n"
-"Just telnet to localhost 2827 and type help and you can get full documentation on each command."
-msgstr "VEUILLEZ PRENDRE NOTE : \nPour des détails ACTUELS sur les commandes VEILLEZ utiliser la commande d'aide incorporée.\nJuste telnet à localhost 2827 et tapez help et vous pourrez obtenir la documentation complète sur chaque commande."
+"For CURRENT details on the commands PLEASE use the built-in help command."
+" \n"
+"Just telnet to localhost 2827 and type help and you can get full "
+"documentation on each command."
+msgstr ""
+"VEUILLEZ PRENDRE NOTE : \n"
+"Pour des détails ACTUELS sur les commandes VEILLEZ utiliser la commande "
+"d'aide incorporée.\n"
+"Juste telnet à localhost 2827 et tapez help et vous pourrez obtenir la "
+"documentation complète sur chaque commande."
#: i2p2www/pages/site/docs/api/bob.html:70
msgid ""
-"Commands never get obsoleted or changed, however new commands do get added "
-"from time to time."
-msgstr "Les commandes ne seront jamais obsolètes ni changées, cependant de nouvelles commandes sont ajoutées de temps en temps."
+"Commands never get obsoleted or changed, however new commands do get "
+"added from time to time."
+msgstr ""
+"Les commandes ne seront jamais obsolètes ni changées, cependant de "
+"nouvelles commandes sont ajoutées de temps en temps."
#: i2p2www/pages/site/docs/api/bob.html:74
msgid "Here are the commands we have as of this writing:"
@@ -1481,32 +1986,78 @@ msgstr "RETURNS"
#: i2p2www/pages/site/docs/api/bob.html:106
msgid ""
-"Once set up, all TCP sockets can and will block as needed, and there is no need for any \n"
-"additional messages to/from the command channel. This allows the router to pace the\n"
-"stream without exploding with OOM like SAM does as it chokes on attempting to shove \n"
-"many streams in or out one socket -- that can't scale when you have alot of connections!"
-msgstr "Une configuré, toutes les douilles TCP peuvent et vont bloquer comme nécessaire, et il n'y a aucun besoin de messages supplémentaires vers/depuis le canal de commande. Ceci permet au routeur de marcher à pas mesurés le flux sans exploser avec OOM comme SAM le fait si il s'étrangle en tentant de pousser\nbeaucoup de flux dans ou hors d'une douille -- cela ne peut pas se mettre à l'échelle quand vous avez beaucoup de connexions !"
+"Once set up, all TCP sockets can and will block as needed, and there is "
+"no need for any \n"
+"additional messages to/from the command channel. This allows the router "
+"to pace the\n"
+"stream without exploding with OOM like SAM does as it chokes on "
+"attempting to shove \n"
+"many streams in or out one socket -- that can't scale when you have alot "
+"of connections!"
+msgstr ""
+"Une configuré, toutes les douilles TCP peuvent et vont bloquer comme "
+"nécessaire, et il n'y a aucun besoin de messages supplémentaires "
+"vers/depuis le canal de commande. Ceci permet au routeur de marcher à pas"
+" mesurés le flux sans exploser avec OOM comme SAM le fait si il "
+"s'étrangle en tentant de pousser\n"
+"beaucoup de flux dans ou hors d'une douille -- cela ne peut pas se mettre"
+" à l'échelle quand vous avez beaucoup de connexions !"
#: i2p2www/pages/site/docs/api/bob.html:113
msgid ""
-"What is also nice about this particular interface is that writing anything to interface \n"
-"to it, is much much easier than SAM. There is no other processing to do after the set up.\n"
-"It's configuration is so simple, that very simple tools, such as nc (netcat) can be used \n"
-"to point to some application. The value there is that one could schedule up and down times \n"
-"for an application, and not have to change the application to do that, or to even have \n"
-"to stop that application. Instead, you can literally \"unplug\" the destination, and \n"
-"\"plug it in\" again. As long as the same IP/port addresses and destination keys are used \n"
-"when bringing the bridge up, the normal TCP application won't care, and won't notice.\n"
-"It will simply be fooled -- the destinations are not reachable, and that nothing is coming in."
-msgstr "Ce qui est aussi agréable au sujet de cette interface particulière est que écrire quoi que ce soit à l'interface,\nest beaucoup beaucoup plus facile que SAM. Il n'y a aucun autre traitement à faire après la configuration.\nSa configuration est si simple, que des outils très simples, comme nc (netcat) peuvent être utilisés \npour pointer vers une certaine application. La valeur est là que l'on pourrait prévoir en haut et en bas pour une application, et ne pas avoir à changer l'application pour le faire, ou même avoir\nà arrêter cette application. Au lieu de cela, vous pouvez littéralement \"déconnecter\" la destination, et \nquand vous rebrancherez de nouveau, l'application TCP normale ne s'en souciera pas et ne le remarquera pas.\nElle sera simplement trompée -- les destinations ne sont pas accessibles, et que rien n'entre."
+"What is also nice about this particular interface is that writing "
+"anything to interface \n"
+"to it, is much much easier than SAM. There is no other processing to do "
+"after the set up.\n"
+"It's configuration is so simple, that very simple tools, such as nc "
+"(netcat) can be used \n"
+"to point to some application. The value there is that one could schedule "
+"up and down times \n"
+"for an application, and not have to change the application to do that, or"
+" to even have \n"
+"to stop that application. Instead, you can literally \"unplug\" the "
+"destination, and \n"
+"\"plug it in\" again. As long as the same IP/port addresses and "
+"destination keys are used \n"
+"when bringing the bridge up, the normal TCP application won't care, and "
+"won't notice.\n"
+"It will simply be fooled -- the destinations are not reachable, and that "
+"nothing is coming in."
+msgstr ""
+"Ce qui est aussi agréable au sujet de cette interface particulière est "
+"que écrire quoi que ce soit à l'interface,\n"
+"est beaucoup beaucoup plus facile que SAM. Il n'y a aucun autre "
+"traitement à faire après la configuration.\n"
+"Sa configuration est si simple, que des outils très simples, comme nc "
+"(netcat) peuvent être utilisés \n"
+"pour pointer vers une certaine application. La valeur est là que l'on "
+"pourrait prévoir en haut et en bas pour une application, et ne pas avoir "
+"à changer l'application pour le faire, ou même avoir\n"
+"à arrêter cette application. Au lieu de cela, vous pouvez littéralement "
+"\"déconnecter\" la destination, et \n"
+"quand vous rebrancherez de nouveau, l'application TCP normale ne s'en "
+"souciera pas et ne le remarquera pas.\n"
+"Elle sera simplement trompée -- les destinations ne sont pas accessibles,"
+" et que rien n'entre."
#: i2p2www/pages/site/docs/api/bob.html:125
msgid ""
-"For the following example, we'll setup a very simple local loopback connection, \n"
-"with two destinations. Destination \"mouth\" will be the CHARGEN service from \n"
-"the INET superserver daemon. Destination \"ear\" will be a local port that you\n"
+"For the following example, we'll setup a very simple local loopback "
+"connection, \n"
+"with two destinations. Destination \"mouth\" will be the CHARGEN service "
+"from \n"
+"the INET superserver daemon. Destination \"ear\" will be a local port "
+"that you\n"
"can telnet into, and watch the pretty ASCII test puke forth."
-msgstr "Pour l'exemple suivant, nous ferons une configuration très simple de connexion loopback,\navec deux destinations. La destination \"bouche\" sera le service CHARGEN depuis\nle démon superserveur INET. La destination \"oreille\" sera un port local auquel vous\npouvez vous connecter via telnet, et observer le joli dégueulis de test d'ASCII."
+msgstr ""
+"Pour l'exemple suivant, nous ferons une configuration très simple de "
+"connexion loopback,\n"
+"avec deux destinations. La destination \"bouche\" sera le service CHARGEN"
+" depuis\n"
+"le démon superserveur INET. La destination \"oreille\" sera un port local"
+" auquel vous\n"
+"pouvez vous connecter via telnet, et observer le joli dégueulis de test "
+"d'ASCII."
#: i2p2www/pages/site/docs/api/bob.html:133
msgid "EXAMPLE SESSION DIALOGUE -- simple telnet 127.0.0.1 2827 works"
@@ -1553,33 +2104,53 @@ msgstr "PRENEZ NOTE DE LA CLÉ DE DESTINATION CI-DESSUS, LA VÔTRE SERA DIFFÉRE
#: i2p2www/pages/site/docs/api/bob.html:158
msgid ""
-"At this point, there was no error, a destination with a nickname of \"mouth\" \n"
-"is set up. When you contact the destination provided, you actually connect \n"
+"At this point, there was no error, a destination with a nickname of "
+"\"mouth\" \n"
+"is set up. When you contact the destination provided, you actually "
+"connect \n"
"to the CHARGEN
service on 19/TCP
."
-msgstr "À ce point, il n'y a pas eu d'erreur, une destination avec le surnom \"bouche\"\nest configurée. Quand vous contactez la destination fournie, vous vous connectez en réalité\nau service CHARGEN
sur le 19/TCP
."
+msgstr ""
+"À ce point, il n'y a pas eu d'erreur, une destination avec le surnom "
+"\"bouche\"\n"
+"est configurée. Quand vous contactez la destination fournie, vous vous "
+"connectez en réalité\n"
+"au service CHARGEN
sur le 19/TCP
."
#: i2p2www/pages/site/docs/api/bob.html:164
-msgid ""
-"Now for the other half, so that we can actually contact this destination."
-msgstr "Maintenant pour l'autre moitié, afin que nous puissions réellement contacter cette destination."
+msgid "Now for the other half, so that we can actually contact this destination."
+msgstr ""
+"Maintenant pour l'autre moitié, afin que nous puissions réellement "
+"contacter cette destination."
#: i2p2www/pages/site/docs/api/bob.html:184
msgid ""
"Now all we need to do is telnet into 127.0.0.1, port 37337,\n"
-"send the destination key or host address from addressbook we want to contact.\n"
+"send the destination key or host address from addressbook we want to "
+"contact.\n"
"In this case, we want to contact \"mouth\", all we do is paste in the\n"
"key and it goes."
-msgstr "Maintenant tout que nous avons à faire est d'utiliser telnet vers 127.0.0.1, port 37337\nenvoyer la clé de destination ou l'adresse d'hôte du carnet d'adresses que nous voulons contacter.\nDans ce cas, nous voulons contacter la \"bouche\", tout ce que nous faisons est de coller dedans\nla clé et c'est parti."
+msgstr ""
+"Maintenant tout que nous avons à faire est d'utiliser telnet vers "
+"127.0.0.1, port 37337\n"
+"envoyer la clé de destination ou l'adresse d'hôte du carnet d'adresses "
+"que nous voulons contacter.\n"
+"Dans ce cas, nous voulons contacter la \"bouche\", tout ce que nous "
+"faisons est de coller dedans\n"
+"la clé et c'est parti."
#: i2p2www/pages/site/docs/api/bob.html:191
msgid ""
-"NOTE: The \"quit\" command in the command channel does NOT disconnect"
-" the tunnels like SAM."
-msgstr "NOTE : la commande \"quit\" dans le canal de commande ne débranche PAS les tunnels comme le fait SAM."
+"NOTE: The \"quit\" command in the command channel does NOT "
+"disconnect the tunnels like SAM."
+msgstr ""
+"NOTE : la commande \"quit\" dans le canal de commande ne débranche"
+" PAS les tunnels comme le fait SAM."
#: i2p2www/pages/site/docs/api/bob.html:208
msgid "After a few virtual miles of this spew, press Control-]
"
-msgstr "Après quelques km virtuels de ce vomissement, pressez Control-]
"
+msgstr ""
+"Après quelques km virtuels de ce vomissement, pressez "
+"Control-]
"
#: i2p2www/pages/site/docs/api/bob.html:220
msgid "Here is what happened..."
@@ -1591,15 +2162,29 @@ msgstr "Vous pouvez connecter aux EEPSITES aussi !"
#: i2p2www/pages/site/docs/api/bob.html:261
msgid ""
-"Pretty cool isn't it? Try some other well known EEPSITES if you like, nonexistent ones, \n"
-"etc, to get a feel for what kind of output to expect in different situations. \n"
-"For the most part, it is suggested that you ignore any of the error messages. \n"
-"They would be meaningless to the application, and are only presented for human debugging."
-msgstr "Assez cool n'est-ce pas ? Essayez aussi d'autres sites EEP bien connus si vous voulez, des inexistants,\netc, pour obtenir une sensation de quel genre de sortie auquel s'attendre selon des situations différentes.\nPour la plupart, il est vous est suggéré d'ignorer tous les messages d'erreur.\nIls seraient vides de sens à l'application et sont seulement présentés pour le débogage humain."
+"Pretty cool isn't it? Try some other well known EEPSITES if you like, "
+"nonexistent ones, \n"
+"etc, to get a feel for what kind of output to expect in different "
+"situations. \n"
+"For the most part, it is suggested that you ignore any of the error "
+"messages. \n"
+"They would be meaningless to the application, and are only presented for "
+"human debugging."
+msgstr ""
+"Assez cool n'est-ce pas ? Essayez aussi d'autres sites EEP bien connus si"
+" vous voulez, des inexistants,\n"
+"etc, pour obtenir une sensation de quel genre de sortie auquel s'attendre"
+" selon des situations différentes.\n"
+"Pour la plupart, il est vous est suggéré d'ignorer tous les messages "
+"d'erreur.\n"
+"Ils seraient vides de sens à l'application et sont seulement présentés "
+"pour le débogage humain."
#: i2p2www/pages/site/docs/api/bob.html:268
msgid "Let's put down our destinations now that we are all done with them."
-msgstr "Allons poser nos destinations maintenant que nous avons terminé avec elles."
+msgstr ""
+"Allons poser nos destinations maintenant que nous avons terminé avec "
+"elles."
#: i2p2www/pages/site/docs/api/bob.html:272
msgid "First, lets see what destination nicknames we have."
@@ -1611,16 +2196,25 @@ msgstr "Bien, les voilà. D'abord, enlevons \"bouche\"."
#: i2p2www/pages/site/docs/api/bob.html:298
msgid ""
-"Now to remove \"ear\", note that this is what happens when you type too fast,\n"
+"Now to remove \"ear\", note that this is what happens when you type too "
+"fast,\n"
"and shows you what typical ERROR messages looks like."
-msgstr "Maintenant enlevons \"oreille\", notez que c'est ce qui arrive quand vous tapez trop vite,\net vous affiche ce à quoi ressemble un message ERROR typique."
+msgstr ""
+"Maintenant enlevons \"oreille\", notez que c'est ce qui arrive quand vous"
+" tapez trop vite,\n"
+"et vous affiche ce à quoi ressemble un message ERROR typique."
#: i2p2www/pages/site/docs/api/bob.html:317
msgid ""
"I won't bother to show an example of the receiver end of a bridge\n"
"because it is very simple. There are two possible settings for it, and\n"
"it is toggled with the \"quiet\" command."
-msgstr "Je vous embêterais pas à vous montrer un exemple de récepteur de fin d'un pont\nparce que c'est très simple. Il y a deux réglages possibles pour cela, et\non les bascule avec la commande \"quiet\"."
+msgstr ""
+"Je vous embêterais pas à vous montrer un exemple de récepteur de fin d'un"
+" pont\n"
+"parce que c'est très simple. Il y a deux réglages possibles pour cela, et"
+"\n"
+"on les bascule avec la commande \"quiet\"."
#: i2p2www/pages/site/docs/api/bob.html:323
msgid ""
@@ -1628,7 +2222,13 @@ msgid ""
"listening socket is the destination that is making the contact. It is a\n"
"single line consisting of the BASE64 address followed by a newline.\n"
"Everything after that is for the application to actually consume."
-msgstr "Le par défaut n'est PAS calme, et la première donnée à entrer dans votre\ndouille d'écoute est la destination qui fait le contact. C'est une\nsimple ligne consistant de l'adresse BASE64 suivie par un retour à la ligne.\nTout ce qui arrive après cela est pour l'application pour consommer en réalité."
+msgstr ""
+"Le par défaut n'est PAS calme, et la première donnée à entrer dans votre\n"
+"douille d'écoute est la destination qui fait le contact. C'est une\n"
+"simple ligne consistant de l'adresse BASE64 suivie par un retour à la "
+"ligne.\n"
+"Tout ce qui arrive après cela est pour l'application pour consommer en "
+"réalité."
#: i2p2www/pages/site/docs/api/bob.html:330
msgid ""
@@ -1638,7 +2238,18 @@ msgid ""
"is available on the router console tunnel settings pages, so that you\n"
"can use BOB to point a destination at a web server, for example, and\n"
"you would not have to modify the web server at all."
-msgstr "En mode calme, pensez à cela comme une connexion régulière à Internet. Pas\ndu tout de données supplémentaires n'entrent. C'est comme si vous étiez connectés pleinement à\nl'Internet régulier. Ce mode permet une forme de transparence semblable à ce\nqui est disponible sur les pages de paramètres de tunnel dans la console routeur, afin que vous\npuissiez utiliser BOB pour le diriger vers la destination d'un serveur Web, par exemple, et\nque vous n'ayez pas à modifier du tout le serveur Web."
+msgstr ""
+"En mode calme, pensez à cela comme une connexion régulière à Internet. "
+"Pas\n"
+"du tout de données supplémentaires n'entrent. C'est comme si vous étiez "
+"connectés pleinement à\n"
+"l'Internet régulier. Ce mode permet une forme de transparence semblable à"
+" ce\n"
+"qui est disponible sur les pages de paramètres de tunnel dans la console "
+"routeur, afin que vous\n"
+"puissiez utiliser BOB pour le diriger vers la destination d'un serveur "
+"Web, par exemple, et\n"
+"que vous n'ayez pas à modifier du tout le serveur Web."
#: i2p2www/pages/site/docs/api/bob.html:339
msgid ""
@@ -1653,7 +2264,26 @@ msgid ""
"and point to a different machine on your LAN while you do updates, or\n"
"point to a set of backup machines depending on what is running, etc,\n"
"etc. Only your imagination limits what you could do with BOB."
-msgstr "L'avantage avec l'utilisation de BOB pour ceci est comme discuté\nprécédemment. Vous pourriez planifier des périodes de fonctionnement aléatoires pour l'application,\nrediriger vers une machine différente, etc. Une utilisation de ceci peut être quelque chose\ncomme vouloir essayer de faire une gaffe router-to-destination upness guessing.\nVous pourriez arrêter et démarrer la destination avec un processus totalement différent\npour faire aléatoire des mises en service et hors service. De cette façon vous\narrêteriez seulement la capacité de contacter un tel service, et ne pas\navoir à se déranger à l'arrêter et le redémarrer. Vous pourriez rediriger\net pointer vers une machine différente sur votre réseau local tandis que vous faites des mises à jour, ou\npointez vers un ensemble de machines de secours selon ce qui fonctionne, etc,\netc. Seule votre imagination limite ce que vous pourriez faire avec BOB."
+msgstr ""
+"L'avantage avec l'utilisation de BOB pour ceci est comme discuté\n"
+"précédemment. Vous pourriez planifier des périodes de fonctionnement "
+"aléatoires pour l'application,\n"
+"rediriger vers une machine différente, etc. Une utilisation de ceci peut "
+"être quelque chose\n"
+"comme vouloir essayer de faire une gaffe router-to-destination upness "
+"guessing.\n"
+"Vous pourriez arrêter et démarrer la destination avec un processus "
+"totalement différent\n"
+"pour faire aléatoire des mises en service et hors service. De cette façon"
+" vous\n"
+"arrêteriez seulement la capacité de contacter un tel service, et ne pas\n"
+"avoir à se déranger à l'arrêter et le redémarrer. Vous pourriez rediriger"
+"\n"
+"et pointer vers une machine différente sur votre réseau local tandis que "
+"vous faites des mises à jour, ou\n"
+"pointez vers un ensemble de machines de secours selon ce qui fonctionne, "
+"etc,\n"
+"etc. Seule votre imagination limite ce que vous pourriez faire avec BOB."
#: i2p2www/pages/site/docs/api/datagrams.html:6
msgid "Datagram Overview"
@@ -1662,23 +2292,48 @@ msgstr "Vue d'ensemble datagramme"
#: i2p2www/pages/site/docs/api/datagrams.html:7
#, python-format
msgid ""
-"Datagrams build upon the base I2CP to provide authenticated\n"
-"and repliable messages in a standard format. This lets applications reliably read\n"
-"the \"from\" address out of a datagram and know that the address really sent the\n"
-"message. This is necessary for some applications since the base I2P message is\n"
-"completely raw - it has no \"from\" address (unlike IP packets). In addition, the\n"
+"Datagrams build upon the base I2CP to provide "
+"authenticated\n"
+"and repliable messages in a standard format. This lets applications "
+"reliably read\n"
+"the \"from\" address out of a datagram and know that the address really "
+"sent the\n"
+"message. This is necessary for some applications since the base I2P "
+"message is\n"
+"completely raw - it has no \"from\" address (unlike IP packets). In "
+"addition, the\n"
"message and sender are authenticated by signing the payload."
-msgstr "Les datagrammes sont construits sur la base I2CP pour des messages\nauthentifiés et réflexibles dans un format standard. Ceci laisse les applications lire de façon fiable\nles adresses \"from\" à partir d'un datagramme et savoir que l'adresse a vraiment envoyé le\nmessage. Ceci est nécessaire pour quelques applications sachant que le message base I2P est\ncomplètement brut - il n'a pas d'adresse \"from\" (contrairement aux paquets IP). De plus, le\nmessage et l'expéditeur sont authentifiés en signant la charge utile."
+msgstr ""
+"Les datagrammes sont construits sur la base I2CP"
+" pour des messages\n"
+"authentifiés et réflexibles dans un format standard. Ceci laisse les "
+"applications lire de façon fiable\n"
+"les adresses \"from\" à partir d'un datagramme et savoir que l'adresse a "
+"vraiment envoyé le\n"
+"message. Ceci est nécessaire pour quelques applications sachant que le "
+"message base I2P est\n"
+"complètement brut - il n'a pas d'adresse \"from\" (contrairement aux "
+"paquets IP). De plus, le\n"
+"message et l'expéditeur sont authentifiés en signant la charge utile."
#: i2p2www/pages/site/docs/api/datagrams.html:16
#, python-format
msgid ""
"Datagrams, like streaming library packets,\n"
"are an application-level construct.\n"
-"These protocols are independent of the low-level transports;\n"
+"These protocols are independent of the low-level transports;\n"
"the protocols are converted to I2NP messages by the router, and\n"
"either protocol may be carried by either transport."
-msgstr "Les datagrammes, tels que streaming library packets,\nsont consruits au niveau application.\nCes protocoles sont indépendants des transports de bas niveau; \nles protocoles sont convertis en messages I2NP par le routeur, et\nl'un ou l'autre protocole peut être transporté par l'un ou l'autre transport."
+msgstr ""
+"Les datagrammes, tels que streaming library "
+"packets,\n"
+"sont consruits au niveau application.\n"
+"Ces protocoles sont indépendants des transports de bas niveau; \n"
+"les protocoles sont convertis en messages I2NP par le routeur, et\n"
+"l'un ou l'autre protocole peut être transporté par l'un ou l'autre "
+"transport."
#: i2p2www/pages/site/docs/api/datagrams.html:25
msgid "Application Guide"
@@ -1691,9 +2346,17 @@ msgid ""
"datagram API,\n"
"while applications in other languages \n"
"can use SAM's datagram support.\n"
-"There is also limited support in i2ptunnel in the SOCKS proxy,\n"
+"There is also limited support in i2ptunnel in the SOCKS proxy,\n"
"the 'streamr' tunnel types, and udpTunnel classes."
-msgstr "Les applications écrites en Java peuvent utiliser\nl'API datagramme,\ntandis que les applications dans d'autres langages\npeuvent utiliser le support datagramme de SAM.\nIl y a aussi un support limité dans i2ptunnel dans le proxy SOCKS,\nles types de tunnel 'streamr', et classes udpTunnel."
+msgstr ""
+"Les applications écrites en Java peuvent utiliser\n"
+"l'API datagramme,\n"
+"tandis que les applications dans d'autres langages\n"
+"peuvent utiliser le support datagramme de SAM.\n"
+"Il y a aussi un support limité dans i2ptunnel dans le proxy SOCKS,\n"
+"les types de tunnel 'streamr', et classes udpTunnel."
#: i2p2www/pages/site/docs/api/datagrams.html:37
msgid "Datagram Length"
@@ -1701,25 +2364,56 @@ msgstr "Longueur de datagramme"
#: i2p2www/pages/site/docs/api/datagrams.html:38
msgid ""
-"The application designer should carefully consider the tradeoff of repliable vs. non-repliable\n"
-"datagrams. Also, the datagram size will affect reliability, due to tunnel fragmentation into 1KB\n"
-"tunnel messages. The more message fragments, the more likely that one of them will be dropped\n"
-"by an intermediate hop. Messages larger than a few KB are not recommended.\n"
+"The application designer should carefully consider the tradeoff of "
+"repliable vs. non-repliable\n"
+"datagrams. Also, the datagram size will affect reliability, due to tunnel"
+" fragmentation into 1KB\n"
+"tunnel messages. The more message fragments, the more likely that one of "
+"them will be dropped\n"
+"by an intermediate hop. Messages larger than a few KB are not "
+"recommended.\n"
"Over about 10 KB, the delivery probablility drops dramatically.\n"
-"Messages over 16 KB cannot be delivered over NTCP, dropping delivery chances even more."
-msgstr "Le concepteur d'application devrait considérer soigneusement la différence entre des datagrammes réflexibles et non-réflexibles. Aussi, la taille de datagramme affectera la fiabilité, en raison de la fragmentation des messages de tunnel en taille de 1 Ko. Plus il y a de fragments de message, plus il est probable que l'un d'entre eux sera laissé tombé par une étape intermédiaire. On recommande des messages pas plus grand que quelques KO. Au delà de 10 KO, la probabilité de livraison diminue radicalement. Les messages de plus de 16 KO ne peuvent pas être livrés via NTCP, laissant tomber encore davantage les chances de livraison."
+"Messages over 16 KB cannot be delivered over NTCP, dropping delivery "
+"chances even more."
+msgstr ""
+"Le concepteur d'application devrait considérer soigneusement la "
+"différence entre des datagrammes réflexibles et non-réflexibles. Aussi, "
+"la taille de datagramme affectera la fiabilité, en raison de la "
+"fragmentation des messages de tunnel en taille de 1 Ko. Plus il y a de "
+"fragments de message, plus il est probable que l'un d'entre eux sera "
+"laissé tombé par une étape intermédiaire. On recommande des messages pas "
+"plus grand que quelques KO. Au delà de 10 KO, la probabilité de livraison"
+" diminue radicalement. Les messages de plus de 16 KO ne peuvent pas être"
+" livrés via NTCP, laissant tomber encore davantage les chances de "
+"livraison."
#: i2p2www/pages/site/docs/api/datagrams.html:47
#, python-format
msgid ""
-"Also note that the various overheads added by lower layers, in particular asymmetric\n"
-"ElGamal/AES, place a large burden on intermittent messages\n"
-"such as used by a Kademlia-over-UDP application. The implementations are currently tuned\n"
-"for frequent traffic using the streaming library. There are a high number\n"
-"of session tags delivered, and a short session tag lifetime, for example.\n"
-"There are currently no configuration parameters available within I2CP to tune\n"
+"Also note that the various overheads added by lower layers, in particular"
+" asymmetric\n"
+"ElGamal/AES, place a large burden on "
+"intermittent messages\n"
+"such as used by a Kademlia-over-UDP application. The implementations are "
+"currently tuned\n"
+"for frequent traffic using the streaming library. There are a high number"
+"\n"
+"of session tags delivered, and a short session tag lifetime, for example."
+"\n"
+"There are currently no configuration parameters available within I2CP to "
+"tune\n"
"the ElGamal Session Tag parameters."
-msgstr "Notez aussi que les diverses en-têtes ajoutées par des couches inférieures, en particulier ElGamal/AES asymétrique, placent un grand fardeau sur les messages intermittents tels que ceux utilisés par une application Kademlia-par-dessus-UDP. Les mises en œuvre sont actuellement ajustées pour du trafic fréquent utilisant la bibliothèque streaming. Il y a un large nombre d'étiquettes de session livrées, et l'étiquette de session a une courte durée de vie, par exemple. Il n'y a actuellement aucun paramètre de configuration disponible dans I2CP qui permettrait d'ajuster les paramètres d'étiquette de session ElGamal."
+msgstr ""
+"Notez aussi que les diverses en-têtes ajoutées par des couches "
+"inférieures, en particulier ElGamal/AES "
+"asymétrique, placent un grand fardeau sur les messages intermittents tels"
+" que ceux utilisés par une application Kademlia-par-dessus-UDP. Les mises"
+" en œuvre sont actuellement ajustées pour du trafic fréquent utilisant la"
+" bibliothèque streaming. Il y a un large nombre d'étiquettes de session "
+"livrées, et l'étiquette de session a une courte durée de vie, par "
+"exemple. Il n'y a actuellement aucun paramètre de configuration "
+"disponible dans I2CP qui permettrait d'ajuster les paramètres d'étiquette"
+" de session ElGamal."
#: i2p2www/pages/site/docs/api/datagrams.html:57
msgid "I2CP Protocol Number and Ports"
@@ -1730,32 +2424,65 @@ msgid ""
"The standard I2CP protocol number for datagrams is PROTO_DATAGRAM (17).\n"
"Applications may or may not choose to set the\n"
"protocol in the I2CP header. It is not set by default.\n"
-"It must be set to demultiplex datagram and streaming traffic received on the same Destination."
-msgstr "Le numéro standard du protocole I2CP pour les datagrammes est PROTO_DATAGRAM (17).\nLes applications peuvent ou peuvent ne pas vouloir mettre le\nprotocole dans l'en-tête I2CP. Il n'est pas mis par défaut.\nIl doit être mis pour dé-multiplexer le datagramme et le trafic streaming reçu sur la même Destination."
+"It must be set to demultiplex datagram and streaming traffic received on "
+"the same Destination."
+msgstr ""
+"Le numéro standard du protocole I2CP pour les datagrammes est "
+"PROTO_DATAGRAM (17).\n"
+"Les applications peuvent ou peuvent ne pas vouloir mettre le\n"
+"protocole dans l'en-tête I2CP. Il n'est pas mis par défaut.\n"
+"Il doit être mis pour dé-multiplexer le datagramme et le trafic streaming"
+" reçu sur la même Destination."
#: i2p2www/pages/site/docs/api/datagrams.html:65
#, python-format
msgid ""
"As datagrams are not connection-oriented, the application may require\n"
-"port numbers to correlate datagrams with particular peers or communications sessions,\n"
+"port numbers to correlate datagrams with particular peers or "
+"communications sessions,\n"
"as is traditional with UDP over IP.\n"
-"Applications may add 'from' and 'to' ports to the I2CP (gzip) header as described in\n"
+"Applications may add 'from' and 'to' ports to the I2CP (gzip) header as "
+"described in\n"
"the I2CP page."
-msgstr "Comme les datagrammes ne sont pas orientés-connexion, les applications peuvent nécessiter\ndes numéros de port pour corréler des datagrammes avec des pairs particuliers ou des sessions de communications,\ncomme c'est traditionnel avec UDP sur IP.\nLes applications peuvent ajouter les ports 'from' et 'to' à l'en-tête d'I2CP (gzip) comme décrit dans\nla page I2CP."
+msgstr ""
+"Comme les datagrammes ne sont pas orientés-connexion, les applications "
+"peuvent nécessiter\n"
+"des numéros de port pour corréler des datagrammes avec des pairs "
+"particuliers ou des sessions de communications,\n"
+"comme c'est traditionnel avec UDP sur IP.\n"
+"Les applications peuvent ajouter les ports 'from' et 'to' à l'en-tête "
+"d'I2CP (gzip) comme décrit dans\n"
+"la page I2CP."
#: i2p2www/pages/site/docs/api/datagrams.html:73
#, python-format
msgid ""
-"There is no method within the datagram API to specify whether it is non-repliable (raw)\n"
-"or repliable. The application should be designed to expect the appropriate type.\n"
+"There is no method within the datagram API to specify whether it is non-"
+"repliable (raw)\n"
+"or repliable. The application should be designed to expect the "
+"appropriate type.\n"
"The I2CP protocol number or port should be used by the application to\n"
"indicate datagram type.\n"
-"The I2CP protocol numbers PROTO_DATAGRAM (signed) and PROTO_DATAGRAM_RAW are defined in the\n"
+"The I2CP protocol numbers PROTO_DATAGRAM (signed) and PROTO_DATAGRAM_RAW "
+"are defined in the\n"
"I2PSession API\n"
-"for this purpose. A common design pattern in client/server datagram applications is to\n"
-"use signed datagrams for a request which includes a nonce, and use a raw datagram\n"
+"for this purpose. A common design pattern in client/server datagram "
+"applications is to\n"
+"use signed datagrams for a request which includes a nonce, and use a raw "
+"datagram\n"
"for the reply, returning the nonce from the request."
-msgstr "Il n'y a aucune méthode dans l'API de datagramme pour spécifier si c'est un réflexible ou un non-réflexible (brut). L'application devrait être conçue pour s'attendre au type approprié. Le numéro de protocole I2CP et le port devraient être utilisés par l'application pour indiquer le type de datagramme. Les numéros de protocole PROTO_DATAGRAM (signé) et PROTO_DATAGRAM_RAW sont définis dans l'l'API I2PSession à cette fin. Un modèle de design commun dans les applications de datagramme client/serveur est d'utiliser des datagrammes signés pour une requête qui inclue une occasion, et utiliser un datagramme brut pour la réponse, retournant l'occasion depuis la requête."
+msgstr ""
+"Il n'y a aucune méthode dans l'API de datagramme pour spécifier si c'est "
+"un réflexible ou un non-réflexible (brut). L'application devrait être "
+"conçue pour s'attendre au type approprié. Le numéro de protocole I2CP et "
+"le port devraient être utilisés par l'application pour indiquer le type "
+"de datagramme. Les numéros de protocole PROTO_DATAGRAM (signé) et "
+"PROTO_DATAGRAM_RAW sont définis dans l'l'API "
+"I2PSession à cette fin. Un modèle de design commun dans les "
+"applications de datagramme client/serveur est d'utiliser des datagrammes "
+"signés pour une requête qui inclue une occasion, et utiliser un "
+"datagramme brut pour la réponse, retournant l'occasion depuis la "
+"requête."
#: i2p2www/pages/site/docs/api/datagrams.html:85
#, python-format
@@ -1764,7 +2491,11 @@ msgid ""
"I2PSession API,\n"
"as implemented in\n"
"I2PSessionMuxedImpl."
-msgstr "Les protocoles et les ports peuvent être mis dans l'\nAPI I2PSession d'I2CP,\ncomme implémenté dans\nI2PSessionMuxedImpl."
+msgstr ""
+"Les protocoles et les ports peuvent être mis dans l'\n"
+"API I2PSession d'I2CP,\n"
+"comme implémenté dans\n"
+"I2PSessionMuxedImpl."
#: i2p2www/pages/site/docs/api/datagrams.html:93
#: i2p2www/pages/site/docs/api/streaming.html:381
@@ -1777,7 +2508,11 @@ msgid ""
"Data integrity is assured by the gzip CRC-32 checksum implemented in\n"
"the I2CP layer.\n"
"There is no checksum field in the datagram protocol."
-msgstr "L'intégrité des données est assurée par la somme de contrôle gzip CRC-32 mise en œuvre dans \nla couche I2CP.\nIl n'y a aucun champ de somme de contrôle dans le protocole de datagramme."
+msgstr ""
+"L'intégrité des données est assurée par la somme de contrôle gzip CRC-32 "
+"mise en œuvre dans \n"
+"la couche I2CP.\n"
+"Il n'y a aucun champ de somme de contrôle dans le protocole de datagramme."
#: i2p2www/pages/site/docs/api/datagrams.html:100
#: i2p2www/pages/site/docs/api/streaming.html:389
@@ -1787,14 +2522,26 @@ msgstr "Encapsulation de paquet"
#: i2p2www/pages/site/docs/api/datagrams.html:101
#, python-format
msgid ""
-"Each datagram is sent through I2P as a single message (or as an individual clove in a\n"
+"Each datagram is sent through I2P as a single message (or as an "
+"individual clove in a\n"
"Garlic Message).\n"
"Message encapsulation is implemented in the underlying\n"
"I2CP,\n"
"I2NP, and\n"
"tunnel message layers.\n"
-"There is no packet delimiter mechanism or length field in the datagram protocol."
-msgstr "Chaque datagramme est envoyé à travers I2P comme un simple message (ou comme un clou de girofle individuel dans un\nMessage Ail).\nL'encapsulation de message est mise en œuvre dans les couches sous-jacentes\nI2CP,\nI2NP, et\nmessage tunnel.\nIl n'y a aucun mécanisme délimiteur de paquet ni de longueur de champ dans le protocole de datagramme."
+"There is no packet delimiter mechanism or length field in the datagram "
+"protocol."
+msgstr ""
+"Chaque datagramme est envoyé à travers I2P comme un simple message (ou "
+"comme un clou de girofle individuel dans un\n"
+"Message Ail).\n"
+"L'encapsulation de message est mise en œuvre dans les couches sous-"
+"jacentes\n"
+"I2CP,\n"
+"I2NP, et\n"
+"message tunnel.\n"
+"Il n'y a aucun mécanisme délimiteur de paquet ni de longueur de champ "
+"dans le protocole de datagramme."
#: i2p2www/pages/site/docs/api/datagrams.html:114
#: i2p2www/pages/site/docs/spec/datagrams.html:10
@@ -1813,11 +2560,31 @@ msgstr "I2PControl - Service de contrôle à distance"
#: i2p2www/pages/site/docs/api/i2pcontrol.html:4
#, python-format
msgid ""
-"I2P enables a JSONRPC2 interface via the plugin I2PControl.\n"
-"The aim of the interface is to provide simple way to interface with a running I2P node. A client, itoopie, has been developed in parallel.\n"
-"The JSONRPC2 implementation for the client as well as the plugin is provided by the java libraries JSON-RPC 2.0. \n"
-"A list of implementations of JSON-RPC for various languages can be found at the JSON-RPC wiki."
-msgstr "I2P permet une interface JSONRPC2 via le plugin I2PControl.\nLe but de l'interface est de fournir une façon simple d'interfacer avec une noeud I2P en cours de fonctionnement. Un client, itoopie, a été développé en parallèle.\nL'implémentation JSONRPC2 pour le client ainsi que le plugin sont fournies par les bibliothèques Java JSON-RPC 2.0.\nUne liste des implémentations de JSON-RPC pour divers langages peut être trouvée sur le wiki JSON-RPC."
+"I2P enables a JSONRPC2 interface via the plugin I2PControl.\n"
+"The aim of the interface is to provide simple way to interface with a "
+"running I2P node. A client, itoopie, has been developed in parallel.\n"
+"The JSONRPC2 implementation for the client as well as the plugin is "
+"provided by the java libraries JSON-RPC 2.0. \n"
+"A list of implementations of JSON-RPC for various languages can be found "
+"at the JSON-RPC "
+"wiki."
+msgstr ""
+"I2P permet une interface JSONRPC2 via le plugin I2PControl."
+"\n"
+"Le but de l'interface est de fournir une façon simple d'interfacer avec "
+"une noeud I2P en cours de fonctionnement. Un client, itoopie, a été "
+"développé en parallèle.\n"
+"L'implémentation JSONRPC2 pour le client ainsi que le plugin sont "
+"fournies par les bibliothèques Java JSON-RPC "
+"2.0.\n"
+"Une liste des implémentations de JSON-RPC pour divers langages peut être "
+"trouvée sur le wiki "
+"JSON-RPC."
#: i2p2www/pages/site/docs/api/i2pcontrol.html:11
msgid "I2PControl is by default listening on localhost:7650"
@@ -1892,9 +2659,11 @@ msgstr "Description"
#: i2p2www/pages/site/docs/api/i2pcontrol.html:29
msgid ""
-"Token used for authenticating every request (excluding the 'Authenticate' "
-"RPC method)"
-msgstr "Le jeton utilisé pour authentifier chaque requête (excluant la méthode 'Authenticate' de RPC)"
+"Token used for authenticating every request (excluding the 'Authenticate'"
+" RPC method)"
+msgstr ""
+"Le jeton utilisé pour authentifier chaque requête (excluant la méthode "
+"'Authenticate' de RPC)"
#: i2p2www/pages/site/docs/api/i2pcontrol.html:37
msgid "Implemented methods"
@@ -1902,8 +2671,11 @@ msgstr "Méthodes implémentées"
#: i2p2www/pages/site/docs/api/i2pcontrol.html:38
msgid ""
-"Creates and returns an authentication token used for further communication."
-msgstr "Crée et retourne un jeton d'identification utilisé pour une future communication."
+"Creates and returns an authentication token used for further "
+"communication."
+msgstr ""
+"Crée et retourne un jeton d'identification utilisé pour une future "
+"communication."
#: i2p2www/pages/site/docs/api/i2pcontrol.html:40
msgid "The version of the I2PControl API used by the client."
@@ -1923,7 +2695,9 @@ msgstr "Le jeton utilisé pour une future communication."
#: i2p2www/pages/site/docs/api/i2pcontrol.html:48
msgid "Echoes the value of the echo key, used for debugging and testing."
-msgstr "Renvoie en écho la valeur de la clé echo, utilisée pour déboguer et tester."
+msgstr ""
+"Renvoie en écho la valeur de la clé echo, utilisée pour déboguer et "
+"tester."
#: i2p2www/pages/site/docs/api/i2pcontrol.html:50
msgid "Value will be returned in response."
@@ -1935,9 +2709,11 @@ msgstr "La valeur sera rendue en réponse."
#: i2p2www/pages/site/docs/api/i2pcontrol.html:98
#: i2p2www/pages/site/docs/api/i2pcontrol.html:142
msgid ""
-"Token used for authenticating the client. Is provided by the server via the "
-"'Authenticate' RPC method."
-msgstr "Jeton utilisé pour authentifier le client. Il est fournit par le serveur via la méthode RPC 'Authenticate'."
+"Token used for authenticating the client. Is provided by the server via "
+"the 'Authenticate' RPC method."
+msgstr ""
+"Jeton utilisé pour authentifier le client. Il est fournit par le serveur "
+"via la méthode RPC 'Authenticate'."
#: i2p2www/pages/site/docs/api/i2pcontrol.html:54
msgid "Value of the key 'echo' in the request."
@@ -1947,14 +2723,18 @@ msgstr "Valeur de la clé 'echo' dans la requête."
msgid ""
"Fetches rateStat from router statManager. Creates stat if not already "
"created."
-msgstr "Va chercher rateStat depuis le statManager du routeur. Crée stat s'il n'est pas déjà créé."
+msgstr ""
+"Va chercher rateStat depuis le statManager du routeur. Crée stat s'il "
+"n'est pas déjà créé."
#: i2p2www/pages/site/docs/api/i2pcontrol.html:59
#, python-format
msgid ""
"Determines which rateStat to fetch, see ratestats."
-msgstr "Détermine à quel rateStat récupérer, voir ratestats."
+msgstr ""
+"Détermine à quel rateStat récupérer, voir ratestats."
#: i2p2www/pages/site/docs/api/i2pcontrol.html:60
msgid "Determines which period a stat is fetched for. Measured in ms."
@@ -1972,13 +2752,17 @@ msgstr "Gère I2PControl. Ports, mots de passe et d'autres de ce genre"
msgid ""
"Sets a new listen address for I2PControl (only 127.0.0.1 and 0.0.0.0 are "
"implemented in I2PControl currently)."
-msgstr "Met en place une nouvelle adresse d'écoute pour I2PControl (seules 127.0.0.1 et 0.0.0.0 est actuellement mises en œuvre dans I2PControl)."
+msgstr ""
+"Met en place une nouvelle adresse d'écoute pour I2PControl (seules "
+"127.0.0.1 et 0.0.0.0 est actuellement mises en œuvre dans I2PControl)."
#: i2p2www/pages/site/docs/api/i2pcontrol.html:70
msgid ""
"Sets a new password for I2PControl, all Authentication tokens will be "
"revoked."
-msgstr "Met un nouveau mot de passe à I2PControl, tous les jetons d'authentification seront révoqués."
+msgstr ""
+"Met un nouveau mot de passe à I2PControl, tous les jetons "
+"d'authentification seront révoqués."
#: i2p2www/pages/site/docs/api/i2pcontrol.html:71
msgid "Switches which port I2PControl will listen for connections on."
@@ -1998,13 +2782,16 @@ msgid "Returns true if any changes were made."
msgstr "Retourne vrai si un quelconque changement a été fait."
#: i2p2www/pages/site/docs/api/i2pcontrol.html:79
-msgid ""
-"Returns true if any changes requiring a restart to take effect were made."
-msgstr "Retourne vrai si un quelconque changement nécessitant un redémarrage pour prendre effet a été fait. "
+msgid "Returns true if any changes requiring a restart to take effect were made."
+msgstr ""
+"Retourne vrai si un quelconque changement nécessitant un redémarrage pour"
+" prendre effet a été fait. "
#: i2p2www/pages/site/docs/api/i2pcontrol.html:82
msgid "Fetches basic information about the I2P router. Uptime, version etc."
-msgstr "Va chercher des informations de base au sujet du routeur I2P. Temps de fonctionnement, version etc."
+msgstr ""
+"Va chercher des informations de base au sujet du routeur I2P. Temps de "
+"fonctionnement, version etc."
#: i2p2www/pages/site/docs/api/i2pcontrol.html:101
msgid "What the status of the router is."
@@ -2068,8 +2855,11 @@ msgstr "Gère le redémarrage/arrêt du routeur I2P."
#: i2p2www/pages/site/docs/api/i2pcontrol.html:137
msgid ""
-"Initiates a router reseed, fetching peers into our NetDB from a remote host."
-msgstr "Amorce un ré-essaimage de routeur, en récupérant des pairs depuis un hôte distant vers notre NetDB."
+"Initiates a router reseed, fetching peers into our NetDB from a remote "
+"host."
+msgstr ""
+"Amorce un ré-essaimage de routeur, en récupérant des pairs depuis un hôte"
+" distant vers notre NetDB."
#: i2p2www/pages/site/docs/api/i2pcontrol.html:138
msgid "Restarts the router."
@@ -2077,8 +2867,11 @@ msgstr "Redémarre le routeur."
#: i2p2www/pages/site/docs/api/i2pcontrol.html:139
msgid ""
-"Restarts the router gracefully (waits for participating tunnels to expire)."
-msgstr "Redémarre le routeur gracieusement (attend l'expiration des tunnels de participation)."
+"Restarts the router gracefully (waits for participating tunnels to "
+"expire)."
+msgstr ""
+"Redémarre le routeur gracieusement (attend l'expiration des tunnels de "
+"participation)."
#: i2p2www/pages/site/docs/api/i2pcontrol.html:140
msgid "Shuts down the router."
@@ -2088,7 +2881,9 @@ msgstr "Arrête le routeur."
msgid ""
"Shuts down the router gracefully (waits for participating tunnels to "
"expire)."
-msgstr "Arrête le routeur gracieusement (attend l'expiration des tunnels de participation)."
+msgstr ""
+"Arrête le routeur gracieusement (attend l'expiration des tunnels de "
+"participation)."
#: i2p2www/pages/site/docs/api/i2pcontrol.html:145
msgid "If requested, verifies that a reseed has been initiated."
@@ -2111,21 +2906,24 @@ msgid "If requested, verifies that a graceful shutdown has been initiated"
msgstr "Si demandé, vérifie qu'un arrêt gracieux a été amorcé."
#: i2p2www/pages/site/docs/api/i2pcontrol.html:152
-msgid ""
-"Fetches or sets various network related settings. Ports, addresses etc."
+msgid "Fetches or sets various network related settings. Ports, addresses etc."
msgstr "Récupère ou met divers paramètres liés au réseau. Ports, adresses etc."
#: i2p2www/pages/site/docs/api/i2pcontrol.html:154
msgid ""
"What port is used for the TCP transport. If null is submitted, current "
"setting will be returned."
-msgstr "Quel port est utilisé pour le transport de TCP. Si nul est soumis, le réglage actuel sera rendu."
+msgstr ""
+"Quel port est utilisé pour le transport de TCP. Si nul est soumis, le "
+"réglage actuel sera rendu."
#: i2p2www/pages/site/docs/api/i2pcontrol.html:155
msgid ""
-"What hostname is used for the TCP transport. If null is submitted, current "
-"setting will be returned."
-msgstr "Quel nom d'hôte est utilisé pour le transport de TCP. Si nul est soumis, le réglage courant sera rendu."
+"What hostname is used for the TCP transport. If null is submitted, "
+"current setting will be returned."
+msgstr ""
+"Quel nom d'hôte est utilisé pour le transport de TCP. Si nul est soumis, "
+"le réglage courant sera rendu."
#: i2p2www/pages/site/docs/api/i2pcontrol.html:156
msgid ""
@@ -2141,8 +2939,8 @@ msgstr ""
#: i2p2www/pages/site/docs/api/i2pcontrol.html:158
msgid ""
-"What hostname is used for the UDP transport. If null is submitted, current "
-"setting will be returned."
+"What hostname is used for the UDP transport. If null is submitted, "
+"current setting will be returned."
msgstr ""
#: i2p2www/pages/site/docs/api/i2pcontrol.html:159
@@ -2156,20 +2954,19 @@ msgid "What ip has been detected by the UDP transport."
msgstr ""
#: i2p2www/pages/site/docs/api/i2pcontrol.html:161
-msgid ""
-"Is UPnP enabled. If null is submitted, current setting will be returned."
+msgid "Is UPnP enabled. If null is submitted, current setting will be returned."
msgstr ""
#: i2p2www/pages/site/docs/api/i2pcontrol.html:162
msgid ""
-"How many percent of bandwidth is usable for participating tunnels. If null "
-"is submitted, current setting will be returned."
+"How many percent of bandwidth is usable for participating tunnels. If "
+"null is submitted, current setting will be returned."
msgstr ""
#: i2p2www/pages/site/docs/api/i2pcontrol.html:163
msgid ""
-"How many KB/s of inbound bandwidth is allowed. If null is submitted, current"
-" setting will be returned."
+"How many KB/s of inbound bandwidth is allowed. If null is submitted, "
+"current setting will be returned."
msgstr ""
#: i2p2www/pages/site/docs/api/i2pcontrol.html:164
@@ -2180,15 +2977,15 @@ msgstr ""
#: i2p2www/pages/site/docs/api/i2pcontrol.html:165
msgid ""
-"Is laptop mode enabled (change router identity and UDP port when IP changes "
-"). If null is submitted, current setting will be returned."
+"Is laptop mode enabled (change router identity and UDP port when IP "
+"changes ). If null is submitted, current setting will be returned."
msgstr ""
#: i2p2www/pages/site/docs/api/i2pcontrol.html:166
msgid ""
-"Token used for authenticating the client. Is provided by the server via the "
-"'Authenticate' RPC method. If null is submitted, current setting will be "
-"returned."
+"Token used for authenticating the client. Is provided by the server via "
+"the 'Authenticate' RPC method. If null is submitted, current setting will"
+" be returned."
msgstr ""
#: i2p2www/pages/site/docs/api/i2pcontrol.html:169
@@ -2201,8 +2998,8 @@ msgstr ""
#: i2p2www/pages/site/docs/api/i2pcontrol.html:171
msgid ""
-"If requested, returns the method used for automatically detecting ip for the"
-" TCP transport."
+"If requested, returns the method used for automatically detecting ip for "
+"the TCP transport."
msgstr ""
#: i2p2www/pages/site/docs/api/i2pcontrol.html:172
@@ -2215,8 +3012,8 @@ msgstr ""
#: i2p2www/pages/site/docs/api/i2pcontrol.html:174
msgid ""
-"If requested, returns methods used for detecting the ip address of the UDP "
-"transport."
+"If requested, returns methods used for detecting the ip address of the "
+"UDP transport."
msgstr ""
#: i2p2www/pages/site/docs/api/i2pcontrol.html:175
@@ -2311,27 +3108,34 @@ msgstr ""
#: i2p2www/pages/site/docs/api/i2pcontrol.html:201
msgid ""
-"The version of the I2PControl API used wasn't specified, but is required to "
-"be specified."
+"The version of the I2PControl API used wasn't specified, but is required "
+"to be specified."
msgstr ""
#: i2p2www/pages/site/docs/api/i2pcontrol.html:202
msgid ""
-"The version of the I2PControl API specified is not supported by I2PControl."
+"The version of the I2PControl API specified is not supported by "
+"I2PControl."
msgstr ""
#: i2p2www/pages/site/docs/api/i2ptunnel.html:12
#, python-format
msgid ""
"I2PTunnel is a tool for interfacing with and providing services on I2P.\n"
-"Destination of an I2PTunnel can be defined using a hostname,\n"
-"Base32, or a full 516-byte destination key.\n"
-"An established I2PTunnel will be available on your client machine as localhost:port.\n"
-"If you wish to provide a service on I2P network, you simply create I2PTunnel to the\n"
-"appropriate ip_address:port. A corresponding 516-byte destination key will be generated\n"
+"Destination of an I2PTunnel can be defined using a hostname,\n"
+"Base32, or a full 516-byte destination "
+"key.\n"
+"An established I2PTunnel will be available on your client machine as "
+"localhost:port.\n"
+"If you wish to provide a service on I2P network, you simply create "
+"I2PTunnel to the\n"
+"appropriate ip_address:port. A corresponding 516-byte destination key "
+"will be generated\n"
"for the service and it will become avaliable throughout I2P.\n"
"A web interface for I2PTunnel management is avaliable on\n"
-"localhost:7657/i2ptunnel/."
+"localhost:7657/i2ptunnel/."
msgstr ""
#: i2p2www/pages/site/docs/api/i2ptunnel.html:24
@@ -2345,9 +3149,15 @@ msgstr "Tunnels de serveur"
#: i2p2www/pages/site/docs/api/i2ptunnel.html:27
msgid ""
"I2P Webserver - A tunnel pointed to a Jetty webserver run\n"
-"on localhost:7658 for convenient and quick hosting on I2P.\n"
+"on localhost:7658 for convenient "
+"and quick hosting on I2P.\n"
"1/(windowSize*factor)
. In standard TCP, window sizes are in bytes,\n"
+"of 1/(windowSize*factor)
. In standard TCP, window sizes are"
+" in bytes,\n"
"while in I2P, window sizes are in messages.\n"
"A higher number means slower growth."
msgstr ""
@@ -2882,15 +3826,16 @@ msgstr ""
msgid ""
"How long to wait after instantiating a new con \n"
"before actually attempting to connect. If this is\n"
-"<= 0, connect immediately with no initial data. If greater than 0, wait\n"
+"<= 0, connect immediately with no initial data. If greater than 0, "
+"wait\n"
"until the output stream is flushed, the buffer fills, \n"
"or that many milliseconds pass, and include any initial data with the SYN."
msgstr ""
#: i2p2www/pages/site/docs/api/streaming.html:186
msgid ""
-"How long to block on connect, in milliseconds. Negative means indefinitely. "
-"Default is 5 minutes."
+"How long to block on connect, in milliseconds. Negative means "
+"indefinitely. Default is 5 minutes."
msgstr ""
#: i2p2www/pages/site/docs/api/streaming.html:190
@@ -2902,19 +3847,23 @@ msgstr ""
#: i2p2www/pages/site/docs/api/streaming.html:196
msgid ""
"Whether to listen only for the streaming protocol.\n"
-"Setting to true will prohibit communication with Destinations earlier than release 0.7.1\n"
-"(released March 2009). Set to true if running multiple protocols on this Destination."
+"Setting to true will prohibit communication with Destinations earlier "
+"than release 0.7.1\n"
+"(released March 2009). Set to true if running multiple protocols on this "
+"Destination."
msgstr ""
#: i2p2www/pages/site/docs/api/streaming.html:204
msgid ""
"(0=noop, 1=disconnect)\n"
-"What to do on an inactivity timeout - do nothing, disconnect, or send a duplicate ack."
+"What to do on an inactivity timeout - do nothing, disconnect, or send a "
+"duplicate ack."
msgstr ""
#: i2p2www/pages/site/docs/api/streaming.html:212
msgid ""
-"The initial value of the resend delay field in the packet header, times 1000.\n"
+"The initial value of the resend delay field in the packet header, times "
+"1000.\n"
"Not fully implemented; see below."
msgstr ""
@@ -2937,8 +3886,8 @@ msgstr ""
#: i2p2www/pages/site/docs/api/streaming.html:230
msgid ""
-"In standard TCP, window sizes are in bytes, while in I2P, window sizes are "
-"in messages."
+"In standard TCP, window sizes are in bytes, while in I2P, window sizes "
+"are in messages."
msgstr ""
#: i2p2www/pages/site/docs/api/streaming.html:242
@@ -2978,12 +3927,12 @@ msgstr ""
#: i2p2www/pages/site/docs/api/streaming.html:295
msgid ""
"(2=interactive not supported)\n"
-"This doesn't currently do anything, but setting it to a value other than 1 will cause an error."
+"This doesn't currently do anything, but setting it to a value other than "
+"1 will cause an error."
msgstr ""
#: i2p2www/pages/site/docs/api/streaming.html:300
-msgid ""
-"How long to block on read, in milliseconds. Negative means indefinitely."
+msgid "How long to block on read, in milliseconds. Negative means indefinitely."
msgstr ""
#: i2p2www/pages/site/docs/api/streaming.html:304
@@ -3027,15 +3976,19 @@ msgstr "Paramétrage"
#: i2p2www/pages/site/docs/api/streaming.html:349
msgid ""
-"The initiator sends a packet with the SYNCHRONIZE flag set. This packet may contain the initial data as well.\n"
-"The peer replies with a packet with the SYNCHRONIZE flag set. This packet may contain the initial response data as well."
+"The initiator sends a packet with the SYNCHRONIZE flag set. This packet "
+"may contain the initial data as well.\n"
+"The peer replies with a packet with the SYNCHRONIZE flag set. This packet"
+" may contain the initial response data as well."
msgstr ""
#: i2p2www/pages/site/docs/api/streaming.html:354
msgid ""
-"The initiator may send additional data packets, up to the initial window size, before receiving the SYNCHRONIZE response.\n"
+"The initiator may send additional data packets, up to the initial window "
+"size, before receiving the SYNCHRONIZE response.\n"
"These packets will also have the send Stream ID field set to 0.\n"
-"Recipients must buffer packets received on unknown streams for a short period of time, as they may\n"
+"Recipients must buffer packets received on unknown streams for a short "
+"period of time, as they may\n"
"arrive out of order, in advance of the SYNCHRONIZE packet."
msgstr ""
@@ -3045,23 +3998,33 @@ msgstr ""
#: i2p2www/pages/site/docs/api/streaming.html:362
msgid ""
-"The maximum message size (also called the MTU / MRU) is negotiated to the lower value supported by\n"
-"the two peers. As tunnel messages are padded to 1KB, a poor MTU selection will lead to\n"
+"The maximum message size (also called the MTU / MRU) is negotiated to the"
+" lower value supported by\n"
+"the two peers. As tunnel messages are padded to 1KB, a poor MTU selection"
+" will lead to\n"
"a large amount of overhead.\n"
"The MTU is specified by the option i2p.streaming.maxMessageSize.\n"
-"The current default MTU of 1730 was chosen to fit precisely into two 1K I2NP tunnel messages,\n"
+"The current default MTU of 1730 was chosen to fit precisely into two 1K "
+"I2NP tunnel messages,\n"
"including overhead for the typical case."
msgstr ""
#: i2p2www/pages/site/docs/api/streaming.html:371
msgid ""
-"The first message in a connection includes a 387 byte (typical) Destination added by the streaming layer,\n"
-"and usually a 898 byte (typical) LeaseSet, and Session keys, bundled in the Garlic message by the router.\n"
-"(The LeaseSet and Session Keys will not be bundled if an ElGamal Session was previously established).\n"
-"Therefore, the goal of fitting a complete HTTP request in a single 1KB I2NP message is not always attainable.\n"
-"However, the selection of the MTU, together with careful implementation of fragmentation\n"
-"and batching strategies in the tunnel gateway processor, are important factors in network bandwidth,\n"
-"latency, reliability, and efficiency, especially for long-lived connections."
+"The first message in a connection includes a 387 byte (typical) "
+"Destination added by the streaming layer,\n"
+"and usually a 898 byte (typical) LeaseSet, and Session keys, bundled in "
+"the Garlic message by the router.\n"
+"(The LeaseSet and Session Keys will not be bundled if an ElGamal Session "
+"was previously established).\n"
+"Therefore, the goal of fitting a complete HTTP request in a single 1KB "
+"I2NP message is not always attainable.\n"
+"However, the selection of the MTU, together with careful implementation "
+"of fragmentation\n"
+"and batching strategies in the tunnel gateway processor, are important "
+"factors in network bandwidth,\n"
+"latency, reliability, and efficiency, especially for long-lived "
+"connections."
msgstr ""
#: i2p2www/pages/site/docs/api/streaming.html:382
@@ -3075,10 +4038,14 @@ msgstr ""
#: i2p2www/pages/site/docs/api/streaming.html:390
#, python-format
msgid ""
-"Each packet is sent through I2P as a single message (or as an individual clove in a\n"
-"Garlic Message). Message encapsulation is implemented\n"
-"in the underlying I2CP, I2NP, and\n"
-"tunnel message layers. There is no packet delimiter\n"
+"Each packet is sent through I2P as a single message (or as an individual "
+"clove in a\n"
+"Garlic Message). Message encapsulation "
+"is implemented\n"
+"in the underlying I2CP, I2NP, and\n"
+"tunnel message layers. There is no "
+"packet delimiter\n"
"mechanism or payload length field in the streaming protocol."
msgstr ""
@@ -3088,7 +4055,8 @@ msgstr ""
#: i2p2www/pages/site/docs/api/streaming.html:401
msgid ""
-"The streaming lib uses standard slow-start (exponential window growth) and congestion avoidance (linear window growth)\n"
+"The streaming lib uses standard slow-start (exponential window growth) "
+"and congestion avoidance (linear window growth)\n"
"phases, with exponential backoff.\n"
"Windowing and acknowledgments use packet count, not byte count."
msgstr ""
@@ -3099,38 +4067,46 @@ msgstr ""
#: i2p2www/pages/site/docs/api/streaming.html:409
msgid ""
-"Any packet, including one with the SYNCHRONIZE flag set, may have the CLOSE flag sent as well.\n"
-"The connection is not closed until the peer responds with the CLOSE flag.\n"
+"Any packet, including one with the SYNCHRONIZE flag set, may have the "
+"CLOSE flag sent as well.\n"
+"The connection is not closed until the peer responds with the CLOSE flag."
+"\n"
"CLOSE packets may contain data as well."
msgstr ""
#: i2p2www/pages/site/docs/api/streaming.html:417
msgid ""
-"There is no ping function at the I2CP layer (equivalent to ICMP echo) or in datagrams.\n"
+"There is no ping function at the I2CP layer (equivalent to ICMP echo) or "
+"in datagrams.\n"
"This function is provided in streaming.\n"
"Pings and pongs may not be combined with a standard streaming packet;\n"
"if the ECHO option is set, then\n"
-"most other flags, options, ackThrough, sequenceNum, NACKs, payload, etc. are ignored."
+"most other flags, options, ackThrough, sequenceNum, NACKs, payload, etc. "
+"are ignored."
msgstr ""
#: i2p2www/pages/site/docs/api/streaming.html:425
msgid ""
-"A ping packet must have the ECHO, SIGNATURE_INCLUDED, and FROM_INCLUDED flags set.\n"
-"The sendStreamId must be greater than zero, and the receiveStreamId is ignored.\n"
+"A ping packet must have the ECHO, SIGNATURE_INCLUDED, and FROM_INCLUDED "
+"flags set.\n"
+"The sendStreamId must be greater than zero, and the receiveStreamId is "
+"ignored.\n"
"The sendStreamId may or may not correspond to an existing connection."
msgstr ""
#: i2p2www/pages/site/docs/api/streaming.html:431
msgid ""
"A pong packet must have the ECHO flag set.\n"
-"The sendStreamId must be zero, and the receiveStreamId is the sendStreamId from the ping.\n"
-"The pong packet does not include any payload that was contained in the ping."
+"The sendStreamId must be zero, and the receiveStreamId is the "
+"sendStreamId from the ping.\n"
+"The pong packet does not include any payload that was contained in the "
+"ping."
msgstr ""
#: i2p2www/pages/site/docs/api/streaming.html:437
msgid ""
-"Streaming may be configured to disable sending pongs with the configuration "
-"i2p.streaming.answerPings=false."
+"Streaming may be configured to disable sending pongs with the "
+"configuration i2p.streaming.answerPings=false."
msgstr ""
#: i2p2www/pages/site/docs/api/streaming.html:442
@@ -3146,7 +4122,8 @@ msgid ""
"This is used for \"temporal\" sharing at connection open/close time,\n"
"not \"ensemble\" sharing during a connection (See\n"
"RFC 2140).\n"
-"There is a separate share per ConnectionManager (i.e. per local Destination)\n"
+"There is a separate share per ConnectionManager (i.e. per local "
+"Destination)\n"
"so that there is no information leakage to other Destinations on the\n"
"same router.\n"
"The share data for a given peer expires after a few minutes.\n"
@@ -3159,8 +4136,11 @@ msgstr "Autres paramètres"
#: i2p2www/pages/site/docs/api/streaming.html:465
msgid ""
-"The following parameters are hardcoded, but may be of interest for analysis:"
-msgstr "Les paramètres suivants sont codés en dur, mais peuvent être intéressants pour analyse :"
+"The following parameters are hardcoded, but may be of interest for "
+"analysis:"
+msgstr ""
+"Les paramètres suivants sont codés en dur, mais peuvent être intéressants"
+" pour analyse :"
#: i2p2www/pages/site/docs/api/streaming.html:484
#: i2p2www/pages/site/docs/how/network-database.html:860
@@ -3169,16 +4149,25 @@ msgstr ""
#: i2p2www/pages/site/docs/api/streaming.html:485
msgid ""
-"The streaming library has grown organically for I2P - first mihi implemented the\n"
-"\"mini streaming library\" as part of I2PTunnel, which was limited to a window\n"
-"size of 1 message (requiring an ACK before sending the next one), and then it was\n"
-"refactored out into a generic streaming interface (mirroring TCP sockets) and the\n"
-"full streaming implementation was deployed with a sliding window protocol and \n"
-"optimizations to take into account the high bandwidth x delay product. Individual\n"
-"streams may adjust the maximum packet size and other options. The default\n"
-"message size is selected to fit precisely in two 1K I2NP tunnel messages,\n"
+"The streaming library has grown organically for I2P - first mihi "
+"implemented the\n"
+"\"mini streaming library\" as part of I2PTunnel, which was limited to a "
+"window\n"
+"size of 1 message (requiring an ACK before sending the next one), and "
+"then it was\n"
+"refactored out into a generic streaming interface (mirroring TCP sockets)"
+" and the\n"
+"full streaming implementation was deployed with a sliding window protocol"
+" and \n"
+"optimizations to take into account the high bandwidth x delay product. "
+"Individual\n"
+"streams may adjust the maximum packet size and other options. The default"
+"\n"
+"message size is selected to fit precisely in two 1K I2NP tunnel messages,"
+"\n"
"and is a reasonable tradeoff between the bandwidth costs of \n"
-"retransmitting lost messages, and the latency and overhead of multiple messages."
+"retransmitting lost messages, and the latency and overhead of multiple "
+"messages."
msgstr ""
#: i2p2www/pages/site/docs/api/streaming.html:499
@@ -3210,16 +4199,20 @@ msgstr ""
#: i2p2www/pages/site/docs/api/streaming.html:509
#, python-format
msgid ""
-"Another area for research is the interaction of the streaming lib with the\n"
+"Another area for research is the interaction of the streaming lib with "
+"the\n"
"NTCP and SSU transport layers.\n"
"See the NTCP discussion page for details."
msgstr ""
#: i2p2www/pages/site/docs/api/streaming.html:514
msgid ""
-"The interaction of the routing algorithms with the streaming lib strongly affects performance.\n"
-"In particular, random distribution of messages to multiple tunnels in a pool\n"
-"leads to a high degree of out-of-order delivery which results in smaller window\n"
+"The interaction of the routing algorithms with the streaming lib strongly"
+" affects performance.\n"
+"In particular, random distribution of messages to multiple tunnels in a "
+"pool\n"
+"leads to a high degree of out-of-order delivery which results in smaller "
+"window\n"
"sizes than would otherwise be the case. The router currently routes \n"
"messages for a single from/to destination pair through a consistent set \n"
"of tunnels, until tunnel expiration or delivery failure. The router's \n"
@@ -3254,9 +4247,11 @@ msgstr ""
#: i2p2www/pages/site/docs/api/streaming.html:541
msgid ""
-"zzz has added debug code to the streaming library to log packets in a wireshark-compatible\n"
+"zzz has added debug code to the streaming library to log packets in a "
+"wireshark-compatible\n"
"(pcap) format; Use this to further analyze performance.\n"
-"The format may require enhancement to map more streaming lib parameters to TCP fields."
+"The format may require enhancement to map more streaming lib parameters "
+"to TCP fields."
msgstr ""
#: i2p2www/pages/site/docs/api/streaming.html:546
@@ -3275,15 +4270,18 @@ msgstr ""
msgid ""
"There are several bittorrent clients and trackers on I2P.\n"
"As I2P addressing uses a Destination instead of an IP and port, minor\n"
-"changes are required to tracker and client software for operation on I2P.\n"
+"changes are required to tracker and client software for operation on I2P."
+"\n"
"These changes are specified below.\n"
-"Note carefully the guidelines for compatibility with older I2P clients and trackers."
+"Note carefully the guidelines for compatibility with older I2P clients "
+"and trackers."
msgstr ""
#: i2p2www/pages/site/docs/applications/bittorrent.html:15
msgid ""
"This page specifies protocol details common to all clients and trackers.\n"
-"Specific clients and trackers may implement other unique features or protocols."
+"Specific clients and trackers may implement other unique features or "
+"protocols."
msgstr ""
#: i2p2www/pages/site/docs/applications/bittorrent.html:20
@@ -3296,7 +4294,8 @@ msgstr ""
#: i2p2www/pages/site/docs/applications/bittorrent.html:27
msgid ""
-"Clients generally include a fake port=6881 parameter in the announce, for compatibility with older trackers.\n"
+"Clients generally include a fake port=6881 parameter in the announce, for"
+" compatibility with older trackers.\n"
"Trackers may ignore the port parameter, and should not require it."
msgstr ""
@@ -3308,7 +4307,8 @@ msgid ""
"using the I2P Base 64 alphabet [A-Z][a-z][0-9]-~.\n"
"Destinations\n"
"are 387+ bytes, so the Base 64 is 516+ bytes.\n"
-"Clients generally append \".i2p\" to the Base 64 Destination for compatibility with older trackers.\n"
+"Clients generally append \".i2p\" to the Base 64 Destination for "
+"compatibility with older trackers.\n"
"Trackers should not require an appended \".i2p\"."
msgstr ""
@@ -3318,15 +4318,19 @@ msgstr ""
#: i2p2www/pages/site/docs/applications/bittorrent.html:46
msgid ""
-"While all current Destinations for clients are exactly 387 bytes, a tracker should not\n"
-"presume that will always be so. A reasonable maximum to assume, for now, is 475 bytes.\n"
-"As the tracker must decode the Base64 to deliver compact responses (see below),\n"
+"While all current Destinations for clients are exactly 387 bytes, a "
+"tracker should not\n"
+"presume that will always be so. A reasonable maximum to assume, for now, "
+"is 475 bytes.\n"
+"As the tracker must decode the Base64 to deliver compact responses (see "
+"below),\n"
"the tracker should probably decode and reject bad Base64 when announced."
msgstr ""
#: i2p2www/pages/site/docs/applications/bittorrent.html:53
msgid ""
-"The default response type is non-compact. Clients may request a compact response with\n"
+"The default response type is non-compact. Clients may request a compact "
+"response with\n"
"the parameter compact=1. A tracker may, but is not required to, return\n"
"a compact response when requested."
msgstr ""
@@ -3334,8 +4338,10 @@ msgstr ""
#: i2p2www/pages/site/docs/applications/bittorrent.html:59
msgid ""
"Developers of new I2P clients\n"
-"are strongly encouraged to implemenent announces over their own tunnel rather than\n"
-"the HTTP client proxy at port 4444. Doing so is both more efficient and it allows\n"
+"are strongly encouraged to implemenent announces over their own tunnel "
+"rather than\n"
+"the HTTP client proxy at port 4444. Doing so is both more efficient and "
+"it allows\n"
"destination enforcement by the tracker (see below)."
msgstr ""
@@ -3357,7 +4363,8 @@ msgstr ""
#: i2p2www/pages/site/docs/applications/bittorrent.html:76
msgid ""
-"Trackers generally include a fake port key, or use the port from the announce, for compatibility with older clients.\n"
+"Trackers generally include a fake port key, or use the port from the "
+"announce, for compatibility with older clients.\n"
"Clients must ignore the port parameter, and should not require it."
msgstr ""
@@ -3365,8 +4372,10 @@ msgstr ""
#, python-format
msgid ""
"The value of the ip key is the base 64 of the client's\n"
-"Destination, as described above.\n"
-"Trackers generally append \".i2p\" to the Base 64 Destination if it wasn't in the announce ip, for compatibility with older clients.\n"
+"Destination, as "
+"described above.\n"
+"Trackers generally append \".i2p\" to the Base 64 Destination if it "
+"wasn't in the announce ip, for compatibility with older clients.\n"
"Clients should not require an appended \".i2p\" in the responses."
msgstr ""
@@ -3381,22 +4390,26 @@ msgstr ""
#: i2p2www/pages/site/docs/applications/bittorrent.html:95
#, python-format
msgid ""
-"In the compact response, the value of the \"peers\" dictionary key is a single byte string,\n"
+"In the compact response, the value of the \"peers\" dictionary key is a "
+"single byte string,\n"
"whose length is a multiple of 32 bytes.\n"
"This string contains the concatenated\n"
"32-byte SHA-256 Hashes\n"
"of the binary\n"
"Destinations\n"
"of the peers.\n"
-"This hash must be computed by the tracker, unless destination enforcement\n"
-"(see below) is used, in which case the hash delivered in the X-I2P-DestHash\n"
+"This hash must be computed by the tracker, unless destination enforcement"
+"\n"
+"(see below) is used, in which case the hash delivered in the X-I2P-"
+"DestHash\n"
"or X-I2P-DestB32 HTTP headers may be converted to binary and stored.\n"
"The peers key may be absent, or the peers value may be zero-length."
msgstr ""
#: i2p2www/pages/site/docs/applications/bittorrent.html:109
msgid ""
-"While compact response support is optional for both clients and trackers, it is highly\n"
+"While compact response support is optional for both clients and trackers,"
+" it is highly\n"
"recommended as it reduces the nominal response size by over 90%."
msgstr ""
@@ -3407,27 +4420,34 @@ msgstr ""
#: i2p2www/pages/site/docs/applications/bittorrent.html:117
#, python-format
msgid ""
-"Some, but not all, I2P bittorrent clients announce over their own tunnels.\n"
-"Trackers may choose to prevent spoofing by requiring this, and verifying the\n"
+"Some, but not all, I2P bittorrent clients announce over their own "
+"tunnels.\n"
+"Trackers may choose to prevent spoofing by requiring this, and verifying "
+"the\n"
"client's\n"
"Destination\n"
"using HTTP headers added by the I2PTunnel HTTP Server tunnel.\n"
-"The headers are X-I2P-DestHash, X-I2P-DestB64, and X-I2P-DestB32, which are\n"
+"The headers are X-I2P-DestHash, X-I2P-DestB64, and X-I2P-DestB32, which "
+"are\n"
"different formats for the same information.\n"
"These headers cannot be spoofed by the client.\n"
-"A tracker enforcing destinations need not require the ip announce parameter at all."
+"A tracker enforcing destinations need not require the ip announce "
+"parameter at all."
msgstr ""
#: i2p2www/pages/site/docs/applications/bittorrent.html:129
msgid ""
-"As several clients use the HTTP proxy instead of their own tunnel for announces,\n"
-"destination enforcement will prevent usage by those clients unless or until\n"
+"As several clients use the HTTP proxy instead of their own tunnel for "
+"announces,\n"
+"destination enforcement will prevent usage by those clients unless or "
+"until\n"
"those clients are converted to announcing over their own tunnel."
msgstr ""
#: i2p2www/pages/site/docs/applications/bittorrent.html:135
msgid ""
-"Unfortunately, as the network grows, so will the amount of maliciousness,\n"
+"Unfortunately, as the network grows, so will the amount of maliciousness,"
+"\n"
"so we expect that all trackers will eventually enforce destinations.\n"
"Both tracker and client developers should anticipate it."
msgstr ""
@@ -3441,9 +4461,12 @@ msgstr ""
msgid ""
"Announce URL host names in torrent files generally follow the\n"
"I2P naming standards.\n"
-"In addition to host names from address books and \".b32.i2p\" Base 32 hostnames,\n"
-"the full Base 64 Destination (with [or without?] \".i2p\" appended) should be supported.\n"
-"Non-open trackers should recognize their own host name in any of these formats."
+"In addition to host names from address books and \".b32.i2p\" Base 32 "
+"hostnames,\n"
+"the full Base 64 Destination (with [or without?] \".i2p\" appended) "
+"should be supported.\n"
+"Non-open trackers should recognize their own host name in any of these "
+"formats."
msgstr ""
#: i2p2www/pages/site/docs/applications/bittorrent.html:152
@@ -3465,22 +4488,27 @@ msgstr ""
#: i2p2www/pages/site/docs/applications/bittorrent.html:165
#, python-format
msgid ""
-"I2P uses 387+ byte Destinations\n"
+"I2P uses 387+ byte Destinations\n"
"for addresses, as explained above."
msgstr ""
#: i2p2www/pages/site/docs/applications/bittorrent.html:170
msgid ""
-"If the client has only the hash of the destination (such as from a compact response or PEX), it must perform a lookup\n"
-"by encoding it with Base 32, appending \".b32.i2p\", and querying the Naming Service,\n"
+"If the client has only the hash of the destination (such as from a "
+"compact response or PEX), it must perform a lookup\n"
+"by encoding it with Base 32, appending \".b32.i2p\", and querying the "
+"Naming Service,\n"
"which will return the full Destination if available."
msgstr ""
#: i2p2www/pages/site/docs/applications/bittorrent.html:176
msgid ""
-"If the client has a peer's full Destination it received in a non-compact response, it should use it\n"
+"If the client has a peer's full Destination it received in a non-compact "
+"response, it should use it\n"
"directly in the connection setup.\n"
-"Do not convert a Destination back to a Base 32 hash for lookup, this is quite inefficient."
+"Do not convert a Destination back to a Base 32 hash for lookup, this is "
+"quite inefficient."
msgstr ""
#: i2p2www/pages/site/docs/applications/bittorrent.html:183
@@ -3490,32 +4518,40 @@ msgstr ""
#: i2p2www/pages/site/docs/applications/bittorrent.html:184
msgid ""
"To preserve anonymity,\n"
-"I2P bittorrent clients generally do not support non-I2P announces or peer connections.\n"
+"I2P bittorrent clients generally do not support non-I2P announces or peer"
+" connections.\n"
"I2P HTTP outproxies often block announces.\n"
"There are no known SOCKS outproxies supporting bittorrent traffic."
msgstr ""
#: i2p2www/pages/site/docs/applications/bittorrent.html:191
msgid ""
-"To prevent usage by non-I2P clients via an HTTP inproxy, I2P trackers often\n"
+"To prevent usage by non-I2P clients via an HTTP inproxy, I2P trackers "
+"often\n"
"block accesses or announces that contain an X-Forwarded-For HTTP header.\n"
-"Trackers should reject standard network announces with IPv4 or IPv6 IPs, and not deliver them in responses."
+"Trackers should reject standard network announces with IPv4 or IPv6 IPs, "
+"and not deliver them in responses."
msgstr ""
#: i2p2www/pages/site/docs/applications/bittorrent.html:200
#, python-format
msgid ""
"I2P PEX is based on ut_pex.\n"
-"As there does not appear to be a formal specification of ut_pex available,\n"
+"As there does not appear to be a formal specification of ut_pex "
+"available,\n"
"it may be necessary to review the libtorrent source for assistance.\n"
"It is an extension message, identified as \"i2p_pex\" in\n"
-"the extension handshake.\n"
-"It contains a bencoded dictionary with up to 3 keys, \"added\", \"added.f\", and \"dropped\".\n"
-"The added and dropped values are each a single byte string, whose length is a multiple of 32 bytes.\n"
+"the extension "
+"handshake.\n"
+"It contains a bencoded dictionary with up to 3 keys, \"added\", "
+"\"added.f\", and \"dropped\".\n"
+"The added and dropped values are each a single byte string, whose length "
+"is a multiple of 32 bytes.\n"
"These byte strings are the concatenated SHA-256 Hashes of the binary\n"
"Destinations\n"
"of the peers.\n"
-"This is the same format as the peers dictionary value in the i2p compact response format specified above.\n"
+"This is the same format as the peers dictionary value in the i2p compact "
+"response format specified above.\n"
"The added.f value, if present, is the same as in ut_pex."
msgstr ""
@@ -3530,10 +4566,13 @@ msgstr ""
#: i2p2www/pages/site/docs/applications/bittorrent.html:226
msgid ""
-"Unlike standard DHT, I2P DHT does not use a bit in the options handshake, or the PORT message.\n"
+"Unlike standard DHT, I2P DHT does not use a bit in the options handshake,"
+" or the PORT message.\n"
"It is advertised with an extension message, identified as \"i2p_dht\" in\n"
-"the extension handshake.\n"
-"It contains a bencoded dictionary with two keys, \"port\" and \"rport\", both integers."
+"the extension "
+"handshake.\n"
+"It contains a bencoded dictionary with two keys, \"port\" and \"rport\", "
+"both integers."
msgstr ""
#: i2p2www/pages/site/docs/applications/bittorrent.html:233
@@ -3563,12 +4602,14 @@ msgstr ""
msgid ""
"Compact peer info is 32 bytes (32 byte SHA256 Hash)\n"
"instead of 4 byte IP + 2 byte port. There is no peer port.\n"
-"In a response, the \"values\" key is a list of strings, each containing a single compact peer info."
+"In a response, the \"values\" key is a list of strings, each containing a"
+" single compact peer info."
msgstr ""
#: i2p2www/pages/site/docs/applications/bittorrent.html:260
msgid ""
-"Compact node info is 54 bytes (20 byte SHA1 Hash + 32 byte SHA256 Hash + 2 byte port)\n"
+"Compact node info is 54 bytes (20 byte SHA1 Hash + 32 byte SHA256 Hash + "
+"2 byte port)\n"
"instead of 20 byte SHA1 Hash + 4 byte IP + 2 byte port.\n"
"In a response, the \"nodes\" key is a\n"
"single byte string with concatenated compact node info."
@@ -3577,8 +4618,10 @@ msgstr ""
#: i2p2www/pages/site/docs/applications/bittorrent.html:267
msgid ""
"Secure node ID requirement: To make various DHT attacks more difficult,\n"
-"the first 4 bytes of the Node ID must match the first 4 bytes of the destination Hash,\n"
-"and the next two bytes of the Node ID must match the next two bytes of the\n"
+"the first 4 bytes of the Node ID must match the first 4 bytes of the "
+"destination Hash,\n"
+"and the next two bytes of the Node ID must match the next two bytes of "
+"the\n"
"destination hash exclusive-ORed with the port."
msgstr ""
@@ -3603,38 +4646,51 @@ msgid ""
"Preliminary differences from\n"
"BEP 15\n"
"are described below, and are subject to change.\n"
-"Contact the I2P developers if you wish to develop a client or tracker supporting datagram announces."
+"Contact the I2P developers if you wish to develop a client or tracker "
+"supporting datagram announces."
msgstr ""
#: i2p2www/pages/site/docs/applications/bittorrent.html:295
msgid ""
"A UDP tracker listens on two ports.\n"
-"The \"query port\" is the advertised port, and is used to receive repliable (signed) datagrams, for the connect request only.\n"
-"The \"response port\" is used to receive unsigned (raw) datagrams, and is the source port for all replies.\n"
+"The \"query port\" is the advertised port, and is used to receive "
+"repliable (signed) datagrams, for the connect request only.\n"
+"The \"response port\" is used to receive unsigned (raw) datagrams, and is"
+" the source port for all replies.\n"
"The response port is arbitrary.\n"
"A client sends and receives on a single port only.\n"
"It receives only unsigned (raw) datagrams.\n"
-"Raw datagrams provides increased efficiency for replies since they contain tokens sent in the query, and need not be signed."
+"Raw datagrams provides increased efficiency for replies since they "
+"contain tokens sent in the query, and need not be signed."
msgstr ""
#: i2p2www/pages/site/docs/applications/bittorrent.html:305
msgid ""
-"In the announce request, the 4-byte IP is replaced by a 32-byte hash, and the port is still present,\n"
+"In the announce request, the 4-byte IP is replaced by a 32-byte hash, and"
+" the port is still present,\n"
"although it may be ignored by the tracker.\n"
-"In the announce response, each 4-byte IP and 2-byte port is replaced by a 32-byte hash (compact peer info), and no port is present.\n"
-"The client sends the announce request and scrape request to the source port in the announce response packet.\n"
-"The connect request, connect response, scrape request, scrape response, and error response are the same as in BEP 15."
+"In the announce response, each 4-byte IP and 2-byte port is replaced by a"
+" 32-byte hash (compact peer info), and no port is present.\n"
+"The client sends the announce request and scrape request to the source "
+"port in the announce response packet.\n"
+"The connect request, connect response, scrape request, scrape response, "
+"and error response are the same as in BEP 15."
msgstr ""
#: i2p2www/pages/site/docs/applications/bittorrent.html:313
msgid ""
-"Source addresses in I2P cannot be spoofed, so it is possible to use a simplified protocol\n"
+"Source addresses in I2P cannot be spoofed, so it is possible to use a "
+"simplified protocol\n"
"with 2 packets instead of 4, omitting the connect request and response.\n"
-"In this case, the announce request would be a repliable datagram sent to the tracker's query port,\n"
+"In this case, the announce request would be a repliable datagram sent to "
+"the tracker's query port,\n"
"and the tracker would not require a response port.\n"
-"While this is more efficient, it would be more difficult to modify an existing tracker to support this mode.\n"
-"The URL for the 4-packet-mode tracker would use standard \"udp://\" prefix. \n"
-"The URL for a modified 2-packet-mode tracker would require a different prefix if both modes are supported in I2P."
+"While this is more efficient, it would be more difficult to modify an "
+"existing tracker to support this mode.\n"
+"The URL for the 4-packet-mode tracker would use standard \"udp://\" "
+"prefix. \n"
+"The URL for a modified 2-packet-mode tracker would require a different "
+"prefix if both modes are supported in I2P."
msgstr ""
#: i2p2www/pages/site/docs/applications/bittorrent.html:326
@@ -3654,14 +4710,18 @@ msgstr ""
msgid ""
"A chart of current tracker software capabilities is also available there."
-msgstr "Un diagramme des capacités du logiciel traqueur actuel est aussi disponible ici."
+msgstr ""
+"Un diagramme des capacités du logiciel traqueur actuel est aussi disponible ici."
#: i2p2www/pages/site/docs/applications/bittorrent.html:334
#, python-format
msgid ""
"The\n"
"I2P bittorrent FAQ"
-msgstr "La\nFAQ bittorrent I2P"
+msgstr ""
+"La\n"
+"FAQ bittorrent I2P"
#: i2p2www/pages/site/docs/applications/bittorrent.html:338
#, python-format
@@ -3674,15 +4734,19 @@ msgstr ""
#: i2p2www/pages/site/docs/applications/embedding.html:8
msgid ""
-"This page is about bundling the entire I2P router binary with your application.\n"
-"It is not about writing an application to work with I2P (either bundled or external)."
+"This page is about bundling the entire I2P router binary with your "
+"application.\n"
+"It is not about writing an application to work with I2P (either bundled "
+"or external)."
msgstr ""
#: i2p2www/pages/site/docs/applications/embedding.html:13
msgid ""
-"Lots of projects are bundling, or talking about bundling, I2P. That's great if done right.\n"
+"Lots of projects are bundling, or talking about bundling, I2P. That's "
+"great if done right.\n"
"If done wrong, it could cause real harm to our network.\n"
-"The I2P router is complex, and it can be a challenge to hide all the complexity from your users.\n"
+"The I2P router is complex, and it can be a challenge to hide all the "
+"complexity from your users.\n"
"This page discusses some general guidelines."
msgstr ""
@@ -3692,8 +4756,10 @@ msgstr ""
#: i2p2www/pages/site/docs/applications/embedding.html:24
msgid ""
-"Start a dialog. We're here to help. Applications that embed I2P are the most promising - and exciting -\n"
-"opportunities for us to grow the network and improve anonymity for everyone."
+"Start a dialog. We're here to help. Applications that embed I2P are the "
+"most promising - and exciting -\n"
+"opportunities for us to grow the network and improve anonymity for "
+"everyone."
msgstr ""
#: i2p2www/pages/site/docs/applications/embedding.html:30
@@ -3702,9 +4768,11 @@ msgstr ""
#: i2p2www/pages/site/docs/applications/embedding.html:31
msgid ""
-"If your application is in Java or Scala, it's an easy choice - use the Java router.\n"
+"If your application is in Java or Scala, it's an easy choice - use the "
+"Java router.\n"
"If in C/C++, we recommend i2pd. The development of i2pcpp has stopped.\n"
-"For apps in other languages, best to use SAM or BOB or SOCKS and bundle the Java router as a separate process.\n"
+"For apps in other languages, best to use SAM or BOB or SOCKS and bundle "
+"the Java router as a separate process.\n"
"Some of the following only applies to the Java router."
msgstr ""
@@ -3713,8 +4781,7 @@ msgid "Licensing"
msgstr ""
#: i2p2www/pages/site/docs/applications/embedding.html:40
-msgid ""
-"Ensure you meet the license requirements of the software you are bundling."
+msgid "Ensure you meet the license requirements of the software you are bundling."
msgstr ""
#: i2p2www/pages/site/docs/applications/embedding.html:45
@@ -3723,22 +4790,29 @@ msgstr ""
#: i2p2www/pages/site/docs/applications/embedding.html:46
msgid ""
-"A correct default configuration is crucial. Most users will not change the defaults.\n"
-"The defaults for your application may need to be different than the defaults for the router you are bundling.\n"
+"A correct default configuration is crucial. Most users will not change "
+"the defaults.\n"
+"The defaults for your application may need to be different than the "
+"defaults for the router you are bundling.\n"
"Override the router defaults if necessary."
msgstr ""
#: i2p2www/pages/site/docs/applications/embedding.html:51
msgid ""
-"Some important defaults to review: Max bandwidth, tunnel quantity and length, max participating tunnels.\n"
-"A lot of this depends on the expected bandwidth and usage patterns of your app."
+"Some important defaults to review: Max bandwidth, tunnel quantity and "
+"length, max participating tunnels.\n"
+"A lot of this depends on the expected bandwidth and usage patterns of "
+"your app."
msgstr ""
#: i2p2www/pages/site/docs/applications/embedding.html:55
msgid ""
-"Configure enough bandwidth and tunnels to allow your users to contribute to the network.\n"
-"Consider disabling external I2CP, as you probably don't need it and it would conflict with any other running I2P instance.\n"
-"Also look at the configs for disabling killing of the JVM on exit, for example."
+"Configure enough bandwidth and tunnels to allow your users to contribute "
+"to the network.\n"
+"Consider disabling external I2CP, as you probably don't need it and it "
+"would conflict with any other running I2P instance.\n"
+"Also look at the configs for disabling killing of the JVM on exit, for "
+"example."
msgstr ""
#: i2p2www/pages/site/docs/applications/embedding.html:62
@@ -3748,25 +4822,32 @@ msgstr ""
#: i2p2www/pages/site/docs/applications/embedding.html:63
msgid ""
"It may be tempting for you to disable participating traffic.\n"
-"There's several ways to do this (hidden mode, setting max tunnels to 0, setting shared bandwidth below 12 KBytes/sec).\n"
-"Without participating traffic, you don't have to worry about graceful shutdown,\n"
+"There's several ways to do this (hidden mode, setting max tunnels to 0, "
+"setting shared bandwidth below 12 KBytes/sec).\n"
+"Without participating traffic, you don't have to worry about graceful "
+"shutdown,\n"
"your users don't see bandwidth usage not generated by them, etc.\n"
-"However, there's lots of reasons why you should allow participating tunnels."
+"However, there's lots of reasons why you should allow participating "
+"tunnels."
msgstr ""
#: i2p2www/pages/site/docs/applications/embedding.html:70
msgid ""
-"First of all, the router doesn't work that well if it doesn't have a chance to \"integrate\" with the network,\n"
+"First of all, the router doesn't work that well if it doesn't have a "
+"chance to \"integrate\" with the network,\n"
"which is helped tremendously by others building tunnels through you."
msgstr ""
#: i2p2www/pages/site/docs/applications/embedding.html:74
msgid ""
-"Secondly, over 90% of the routers in the current network allow participating traffic.\n"
+"Secondly, over 90% of the routers in the current network allow "
+"participating traffic.\n"
"It's the default in the Java router.\n"
-"If your application doesn't route for others and it gets really popular, then it's a leech on the network,\n"
+"If your application doesn't route for others and it gets really popular, "
+"then it's a leech on the network,\n"
"and it upsets the balance we have now.\n"
-"If it gets really big, then we become Tor, and spend our time begging for people to enable relaying."
+"If it gets really big, then we become Tor, and spend our time begging for"
+" people to enable relaying."
msgstr ""
#: i2p2www/pages/site/docs/applications/embedding.html:81
@@ -3777,8 +4858,10 @@ msgstr ""
#: i2p2www/pages/site/docs/applications/embedding.html:84
msgid ""
-"We strongly discourage you from disabling participating traffic by default.\n"
-"If you do this and your application gets hugely popular, it could break the network."
+"We strongly discourage you from disabling participating traffic by "
+"default.\n"
+"If you do this and your application gets hugely popular, it could break "
+"the network."
msgstr ""
#: i2p2www/pages/site/docs/applications/embedding.html:90
@@ -3787,9 +4870,12 @@ msgstr ""
#: i2p2www/pages/site/docs/applications/embedding.html:91
msgid ""
-"You must save the router's data (netdb, configuration, etc.) between runs of the router.\n"
-"I2P does not work well if you must reseed each startup, and that's a huge load on our reseed servers, and not very good for anonymity either.\n"
-"Even if you bundle router infos, I2P needs saved profile data for best performance."
+"You must save the router's data (netdb, configuration, etc.) between runs"
+" of the router.\n"
+"I2P does not work well if you must reseed each startup, and that's a huge"
+" load on our reseed servers, and not very good for anonymity either.\n"
+"Even if you bundle router infos, I2P needs saved profile data for best "
+"performance."
msgstr ""
#: i2p2www/pages/site/docs/applications/embedding.html:99
@@ -3798,9 +4884,12 @@ msgstr ""
#: i2p2www/pages/site/docs/applications/embedding.html:100
msgid ""
-"Give your users a way to change the configuration of the important settings.\n"
-"We understand that you will probably want to hide most of I2P's complexity, but it's important to show some basic settings.\n"
-"In addition to the defaults above, some network settings such as UPnP, IP/port may be helpful."
+"Give your users a way to change the configuration of the important "
+"settings.\n"
+"We understand that you will probably want to hide most of I2P's "
+"complexity, but it's important to show some basic settings.\n"
+"In addition to the defaults above, some network settings such as UPnP, "
+"IP/port may be helpful."
msgstr ""
#: i2p2www/pages/site/docs/applications/embedding.html:108
@@ -3809,9 +4898,12 @@ msgstr ""
#: i2p2www/pages/site/docs/applications/embedding.html:109
msgid ""
-"Above a certain bandwidth setting, and meeting other health criteria, your router will become floodfill,\n"
-"which may cause a large increase in connections and memory usage (at least with the Java router).\n"
-"Think about whether that's OK. You can disable floodfill, but then your fastest users aren't contributing what they could.\n"
+"Above a certain bandwidth setting, and meeting other health criteria, "
+"your router will become floodfill,\n"
+"which may cause a large increase in connections and memory usage (at "
+"least with the Java router).\n"
+"Think about whether that's OK. You can disable floodfill, but then your "
+"fastest users aren't contributing what they could.\n"
"It also depends on the typical uptime for your application."
msgstr ""
@@ -3822,7 +4914,8 @@ msgstr ""
#: i2p2www/pages/site/docs/applications/embedding.html:120
msgid ""
"Decide if you are bundling router infos or using our reseed hosts.\n"
-"The Java reseed host list is in the source code, so if you keep your source up to date, the host list will be also.\n"
+"The Java reseed host list is in the source code, so if you keep your "
+"source up to date, the host list will be also.\n"
"Be aware of possible blocking by hostile governments."
msgstr ""
@@ -3832,9 +4925,12 @@ msgstr ""
#: i2p2www/pages/site/docs/applications/embedding.html:130
msgid ""
-"Consider setting your application tunnels to delay-open, reduce-on-idle and/or close-on-idle.\n"
-"This is straightforward if using i2ptunnel but you'll have to implement some of it yourself if using I2CP directly.\n"
-"See i2psnark for code that reduces tunnel count and then closes the tunnel, even in the presence of some background DHT activity."
+"Consider setting your application tunnels to delay-open, reduce-on-idle "
+"and/or close-on-idle.\n"
+"This is straightforward if using i2ptunnel but you'll have to implement "
+"some of it yourself if using I2CP directly.\n"
+"See i2psnark for code that reduces tunnel count and then closes the "
+"tunnel, even in the presence of some background DHT activity."
msgstr ""
#: i2p2www/pages/site/docs/applications/embedding.html:138
@@ -3843,11 +4939,16 @@ msgstr ""
#: i2p2www/pages/site/docs/applications/embedding.html:139
msgid ""
-"Have an auto-update feature if at all possible, or at least auto-notification of a new version.\n"
-"Our biggest fear is a huge number of routers out there that can't be updated.\n"
-"We have about 6-8 releases a year of the Java router, and it's critical to the health of the network that the users keep up.\n"
-"We usually have over 80% of the network on the latest release within 6 weeks after the release, and we'd like to keep it that way.\n"
-"You don't need to worry about disabling the router's built-in auto-update function, as that code is in the router console,\n"
+"Have an auto-update feature if at all possible, or at least auto-"
+"notification of a new version.\n"
+"Our biggest fear is a huge number of routers out there that can't be "
+"updated.\n"
+"We have about 6-8 releases a year of the Java router, and it's critical "
+"to the health of the network that the users keep up.\n"
+"We usually have over 80% of the network on the latest release within "
+"6 weeks after the release, and we'd like to keep it that way.\n"
+"You don't need to worry about disabling the router's built-in auto-update"
+" function, as that code is in the router console,\n"
"which you presumably are not bundling."
msgstr ""
@@ -3858,12 +4959,17 @@ msgstr ""
#: i2p2www/pages/site/docs/applications/embedding.html:151
msgid ""
"Have a gradual rollout plan. Don't overwhelm the network all at once.\n"
-"We currently have approximately 25K unique users per day and 40K uniques per month.\n"
-"We are probably able to handle growth of 2-3X per year without too much issue.\n"
-"If you anticipate a faster rampup than that, OR the bandwidth distribution (or uptime distribution,\n"
-"or any other significant characteristic) of your userbase is significantly different from our current userbase,\n"
+"We currently have approximately 25K unique users per day and 40K uniques "
+"per month.\n"
+"We are probably able to handle growth of 2-3X per year without too much "
+"issue.\n"
+"If you anticipate a faster rampup than that, OR the bandwidth "
+"distribution (or uptime distribution,\n"
+"or any other significant characteristic) of your userbase is "
+"significantly different from our current userbase,\n"
"we really need to have a discussion.\n"
-"The bigger your growth plans, the more important everthing else in this checklist is."
+"The bigger your growth plans, the more important everthing else in this "
+"checklist is."
msgstr ""
#: i2p2www/pages/site/docs/applications/embedding.html:163
@@ -3873,8 +4979,10 @@ msgstr ""
#: i2p2www/pages/site/docs/applications/embedding.html:164
msgid ""
"Tell your users that I2P works best if it keeps running.\n"
-"It may be several minutes after startup before it works well, and even more after first install.\n"
-"If your average uptime is less than an hour, I2P is probably the wrong solution."
+"It may be several minutes after startup before it works well, and even "
+"more after first install.\n"
+"If your average uptime is less than an hour, I2P is probably the wrong "
+"solution."
msgstr ""
#: i2p2www/pages/site/docs/applications/embedding.html:172
@@ -3883,8 +4991,8 @@ msgstr ""
#: i2p2www/pages/site/docs/applications/embedding.html:173
msgid ""
-"Provide some indication to the user that the application tunnels are ready. "
-"Encourage patience."
+"Provide some indication to the user that the application tunnels are "
+"ready. Encourage patience."
msgstr ""
#: i2p2www/pages/site/docs/applications/embedding.html:178
@@ -3894,7 +5002,8 @@ msgstr ""
#: i2p2www/pages/site/docs/applications/embedding.html:179
msgid ""
"If possible, delay the shutdown until your participating tunnels expire.\n"
-"Don't let your users break tunnels easily, or at least ask them to confirm."
+"Don't let your users break tunnels easily, or at least ask them to "
+"confirm."
msgstr ""
#: i2p2www/pages/site/docs/applications/embedding.html:185
@@ -3903,8 +5012,8 @@ msgstr ""
#: i2p2www/pages/site/docs/applications/embedding.html:186
msgid ""
-"It would be nice if you give your users links to learn more about I2P and to"
-" donate."
+"It would be nice if you give your users links to learn more about I2P and"
+" to donate."
msgstr ""
#: i2p2www/pages/site/docs/applications/embedding.html:192
@@ -3914,7 +5023,8 @@ msgstr ""
#: i2p2www/pages/site/docs/applications/embedding.html:193
msgid ""
"Depending on your user base and application,\n"
-"it may be helpful to provide an option or a separate package to use an external router."
+"it may be helpful to provide an option or a separate package to use an "
+"external router."
msgstr ""
#: i2p2www/pages/site/docs/applications/embedding.html:200
@@ -3923,7 +5033,8 @@ msgstr ""
#: i2p2www/pages/site/docs/applications/embedding.html:201
msgid ""
-"If you plan to use or link to other common I2P services (news feeds, hosts.txt subscriptions, trackers, outproxies, etc.),\n"
+"If you plan to use or link to other common I2P services (news feeds, "
+"hosts.txt subscriptions, trackers, outproxies, etc.),\n"
"make sure you aren't overloading them,\n"
"and talk to the people who are running them to make sure it's ok."
msgstr ""
@@ -3935,8 +5046,10 @@ msgstr ""
#: i2p2www/pages/site/docs/applications/embedding.html:210
msgid ""
"I2P includes an SNTP client. I2P requires correct time to operate.\n"
-"It will compensate for a skewed system clock but this may delay startup. You may disable I2P's SNTP queries,\n"
-"but this isn't advised unless your application makes sure the system clock is correct."
+"It will compensate for a skewed system clock but this may delay startup. "
+"You may disable I2P's SNTP queries,\n"
+"but this isn't advised unless your application makes sure the system "
+"clock is correct."
msgstr ""
#: i2p2www/pages/site/docs/applications/embedding.html:218
@@ -3945,15 +5058,20 @@ msgstr ""
#: i2p2www/pages/site/docs/applications/embedding.html:219
msgid ""
-"At a minimum you will need i2p.jar, router.jar, streaming.jar, and mstreaming.jar.\n"
+"At a minimum you will need i2p.jar, router.jar, streaming.jar, and "
+"mstreaming.jar.\n"
"You may omit the two straming jars for a datagram-only app.\n"
"Some apps may need more, e.g. i2ptunnel.jar or addressbook.jar.\n"
-"Don't forget jbigi.jar, or a subset of it for the platforms you support, to make the crypto much faster.\n"
-"We are currently building them for Java 6, as of 0.9.14. The source is mostly compatible with Java 5 if you want to do your own compile,\n"
+"Don't forget jbigi.jar, or a subset of it for the platforms you support, "
+"to make the crypto much faster.\n"
+"We are currently building them for Java 6, as of 0.9.14. The source is "
+"mostly compatible with Java 5 if you want to do your own compile,\n"
"but we may start using Java 6 features at any time without notice.\n"
"We plan to migrate to Java 7 in 2015.\n"
-"If you're building Debian / Ubuntu packages, you should require the I2P package from our PPA instead of bundling it.\n"
-"You almost certainly do not need susimail, susidns, the router console, and i2psnark, for example."
+"If you're building Debian / Ubuntu packages, you should require the I2P "
+"package from our PPA instead of bundling it.\n"
+"You almost certainly do not need susimail, susidns, the router console, "
+"and i2psnark, for example."
msgstr ""
#: i2p2www/pages/site/docs/applications/embedding.html:233
@@ -3971,13 +5089,17 @@ msgstr ""
#: i2p2www/pages/site/docs/applications/embedding.html:245
msgid ""
"If your application is using I2P datagrams, e.g. for a DHT,\n"
-"there's lots of advanced options available to reduce overhead and increase reliability.\n"
+"there's lots of advanced options available to reduce overhead and "
+"increase reliability.\n"
"This may take some time and experimentation to get working well.\n"
"Be aware of size/reliability tradeoffs. Talk to us for help.\n"
-"It is possible - and recommended - to use Datagrams and Streaming on the same Destination.\n"
+"It is possible - and recommended - to use Datagrams and Streaming on the "
+"same Destination.\n"
"Don't create separate Destinations for this.\n"
-"Don't try to store your unrelated data in the existing network DHTs (iMule, bote, bittorrent, and router).\n"
-"Build your own. If you are hardcoding seed nodes, we recommend that you have several."
+"Don't try to store your unrelated data in the existing network DHTs "
+"(iMule, bote, bittorrent, and router).\n"
+"Build your own. If you are hardcoding seed nodes, we recommend that you "
+"have several."
msgstr ""
#: i2p2www/pages/site/docs/applications/embedding.html:258
@@ -3987,7 +5109,8 @@ msgstr ""
#: i2p2www/pages/site/docs/applications/embedding.html:259
msgid ""
"Let's work together. Don't wait until it's done.\n"
-"Give us your Twitter handle and start tweeting about it, we will return the favor."
+"Give us your Twitter handle and start tweeting about it, we will return "
+"the favor."
msgstr ""
#: i2p2www/pages/site/docs/applications/embedding.html:265
@@ -4006,7 +5129,8 @@ msgstr ""
#: i2p2www/pages/site/docs/applications/embedding.html:273
msgid ""
-"This may be obvious, but join the community. Run I2P 24/7. Start an eepsite about your project.\n"
+"This may be obvious, but join the community. Run I2P 24/7. Start an "
+"eepsite about your project.\n"
"Hang out in IRC #i2p-dev. Post on the forums. Spread the word.\n"
"We can help get you users, testers, translators, or even coders."
msgstr ""
@@ -4017,10 +5141,12 @@ msgstr ""
#: i2p2www/pages/site/docs/applications/embedding.html:282
msgid ""
-"You may wish to install and play with the I2P Android app, and look at its code, for an example of an application that bundles the router.\n"
+"You may wish to install and play with the I2P Android app, and look at "
+"its code, for an example of an application that bundles the router.\n"
"See what we expose to the user and what we hide.\n"
"Look at the state machine we use to start and stop the router.\n"
-"Other examples are: Vuze, the Nightweb Android app, iMule, TAILS, iCloak, and Monero."
+"Other examples are: Vuze, the Nightweb Android app, iMule, TAILS, iCloak,"
+" and Monero."
msgstr ""
#: i2p2www/pages/site/docs/applications/embedding.html:290
@@ -4035,8 +5161,10 @@ msgstr ""
#: i2p2www/pages/site/docs/applications/embedding.html:306
msgid ""
-"This code is for the case where your application starts the router, as in our Android app.\n"
-"You could also have the router start the applictaion via the clients.config and i2ptunnel.config files,\n"
+"This code is for the case where your application starts the router, as in"
+" our Android app.\n"
+"You could also have the router start the applictaion via the "
+"clients.config and i2ptunnel.config files,\n"
"together with Jetty webapps,\n"
"as is done in our Java packages.\n"
"As always, state management is the difficult part."
@@ -4063,18 +5191,24 @@ msgstr ""
msgid ""
"As of release 0.9.4, the router supports managed clients.\n"
"Managed clients are instantiated and started by the ClientAppManager.\n"
-"The ClientAppManager maintains a reference to the client and receives updates on the client's state.\n"
-"Managed clients are preferred, as it is much easier to implement state tracking\n"
-"and to start and stop a client. It also is much easier to avoid static references in the client code\n"
+"The ClientAppManager maintains a reference to the client and receives "
+"updates on the client's state.\n"
+"Managed clients are preferred, as it is much easier to implement state "
+"tracking\n"
+"and to start and stop a client. It also is much easier to avoid static "
+"references in the client code\n"
"which could lead to excessive memory usage after a client is stopped.\n"
-"Managed clients may be started and stopped by the user in the router console,\n"
+"Managed clients may be started and stopped by the user in the router "
+"console,\n"
"and are stopped at router shutdown."
msgstr ""
#: i2p2www/pages/site/docs/applications/managed-clients.html:31
msgid ""
-"Managed clients implement either the net.i2p.app.ClientApp or net.i2p.router.app.RouterApp interface.\n"
-"Clients implementing the ClientApp interface must provide the following constructor:"
+"Managed clients implement either the net.i2p.app.ClientApp or "
+"net.i2p.router.app.RouterApp interface.\n"
+"Clients implementing the ClientApp interface must provide the following "
+"constructor:"
msgstr ""
#: i2p2www/pages/site/docs/applications/managed-clients.html:38
@@ -4093,10 +5227,12 @@ msgstr ""
#: i2p2www/pages/site/docs/applications/managed-clients.html:49
msgid ""
-"If the main class specified in the clients.config file does not implement a managed interface,\n"
+"If the main class specified in the clients.config file does not implement"
+" a managed interface,\n"
"it will be started with main() with the arguments specified,\n"
"and stopped with main() with the arguments specified.\n"
-"The router does not maintain a reference, since all interactions are via the static main() method.\n"
+"The router does not maintain a reference, since all interactions are via "
+"the static main() method.\n"
"The console cannot provide accurate state information to the user."
msgstr ""
@@ -4106,7 +5242,8 @@ msgstr ""
#: i2p2www/pages/site/docs/applications/managed-clients.html:58
msgid ""
-"Clients, whether managed or unmanaged, may register with the ClientAppManager\n"
+"Clients, whether managed or unmanaged, may register with the "
+"ClientAppManager\n"
"so that other clients may retrieve a reference to them.\n"
"Registration is by name.\n"
"Known registered clients are:"
@@ -4118,10 +5255,12 @@ msgstr ""
#: i2p2www/pages/site/docs/applications/managed-clients.html:69
msgid ""
-"The router also provides a simple mechanism for clients to find an internal socket service,\n"
+"The router also provides a simple mechanism for clients to find an "
+"internal socket service,\n"
"such as the HTTP proxy. This is provided by the Port Mapper.\n"
"Registration is by name.\n"
-"Clients that register generally provide an internal emulated socket on that port."
+"Clients that register generally provide an internal emulated socket on "
+"that port."
msgstr ""
#: i2p2www/pages/site/docs/applications/supported.html:2
@@ -4246,13 +5385,23 @@ msgid ""
"I2P. If you know of something that's missing please submit a ticket on\n"
"Trac, and be sure to select the\n"
"“www” component in the submission form."
-msgstr "Ceci est destiné à être une liste complète des applications utilisées avec\nI2P. Si vous connaissez quelque chose qui manque veuillez soumettre un billet sur \nTrac, et dans le formulaire de soumission assurez-vous de choisir le\ncomposant \"www\"."
+msgstr ""
+"Ceci est destiné à être une liste complète des applications utilisées "
+"avec\n"
+"I2P. Si vous connaissez quelque chose qui manque veuillez soumettre un "
+"billet sur \n"
+"Trac, et dans le formulaire de soumission "
+"assurez-vous de choisir le\n"
+"composant \"www\"."
#: i2p2www/pages/site/docs/applications/supported.html:92
msgid ""
"\n"
"Supported applications are tagged with one or more of the following:"
-msgstr "\nLes applications supportées sont étiquetées avec une ou davantage des choses suivantes :"
+msgstr ""
+"\n"
+"Les applications supportées sont étiquetées avec une ou davantage des "
+"choses suivantes :"
#: i2p2www/pages/site/docs/applications/supported.html:97
#: i2p2www/pages/site/docs/applications/supported.html:279
@@ -4267,7 +5416,11 @@ msgid ""
"Bundled application — I2P ships with a few officially\n"
"supported applications that let new users take immediate advantage of\n"
"some of I2P's more useful capabilities."
-msgstr "Application bundled - I2P est livré avec quelques\napplications officiellement supportées qui laissent les nouveaux utilisateurs prendre avantage immédiat de\ncertaines des capacités les plus utiles de I2P."
+msgstr ""
+"Application bundled - I2P est livré avec quelques\n"
+"applications officiellement supportées qui laissent les nouveaux "
+"utilisateurs prendre avantage immédiat de\n"
+"certaines des capacités les plus utiles de I2P."
#: i2p2www/pages/site/docs/applications/supported.html:107
#: i2p2www/pages/site/docs/applications/supported.html:195
@@ -4291,7 +5444,15 @@ msgid ""
"with the router. Plugins are [reviewed by the community](http://%(plugins)s) to identify security and\n"
"anonymity issues."
-msgstr "Plug-in tiers - Le système de plugin de I2P fournit un commode\ndéploiement des applications I2P-enabled et permet l'intégration plus étroite\navec le routeur. Les plug-ins sont [passés en revue par la communauté] (http://%(plugins)s) afin d'identifier les anomalies\nde sécurité et d'anonymat."
+msgstr ""
+"Plug-in tiers - Le système de plugin de I2P fournit un commode\n"
+"déploiement des applications I2P-enabled et permet l'intégration plus "
+"étroite\n"
+"avec le routeur. Les plug-ins sont [passés en revue par la communauté] "
+"(http://%(plugins)s) afin d'identifier les "
+"anomalies\n"
+"de sécurité et d'anonymat."
#: i2p2www/pages/site/docs/applications/supported.html:121
#: i2p2www/pages/site/docs/applications/supported.html:220
@@ -4349,7 +5510,20 @@ msgid ""
"function properly over I2P or to prevent inadvertent disclosure of\n"
"identifying information such as the user's hostname or external IP\n"
"address."
-msgstr "Application autonome tierce - Beaucoup d'applications réseau standard\nexigent seulement de la configuration prudente et de la configuration pour communiquer\nanonymement sur I2P. Celles-ci sont étiquetées avec autonome. Certaines\napplications, étiquetées avec standalone/mod/, exigent du rapiéçage - patching - pour\nfonctionner correctement sur I2P ou pour empêcher la révélation négligente\nd'informations d'identification telles que le nom de l'hôte de l'utilisateur ou l'adresse\nIP externe."
+msgstr ""
+"Application autonome tierce - Beaucoup d'applications réseau "
+"standard\n"
+"exigent seulement de la configuration prudente et de la configuration "
+"pour communiquer\n"
+"anonymement sur I2P. Celles-ci sont étiquetées avec autonome. "
+"Certaines\n"
+"applications, étiquetées avec standalone/mod/, exigent du "
+"rapiéçage - patching - pour\n"
+"fonctionner correctement sur I2P ou pour empêcher la révélation "
+"négligente\n"
+"d'informations d'identification telles que le nom de l'hôte de "
+"l'utilisateur ou l'adresse\n"
+"IP externe."
#: i2p2www/pages/site/docs/applications/supported.html:135
#: i2p2www/pages/site/docs/applications/supported.html:302
@@ -4374,7 +5548,17 @@ msgid ""
"services, search engines, email, DNS-style name services, hosting,\n"
"proxies, etc. These services focus on boosting the usefulness of the\n"
"network as a whole, and making network content more discoverable."
-msgstr "Service réseau essentiellement tiers - Services qui sur\nle réseau I2P sont analogue à ceux founis sur l'internet public\npar les fournisseurs d'hébergement, fournisseurs d'accès Internet, et Google : index d'eepsites et\nservices de saut, moteurs de recherche, courrier électronique, services de nommage style DNS, hébergement,\nproxies, etc. Ces services mettent l'accent sur l'augmentation de l'utilité du\nréseau dans son ensemble, et rendent le contenu du réseau plus susceptible d'être découvert."
+msgstr ""
+"Service réseau essentiellement tiers - Services qui sur\n"
+"le réseau I2P sont analogue à ceux founis sur l'internet public\n"
+"par les fournisseurs d'hébergement, fournisseurs d'accès Internet, et "
+"Google : index d'eepsites et\n"
+"services de saut, moteurs de recherche, courrier électronique, services "
+"de nommage style DNS, hébergement,\n"
+"proxies, etc. Ces services mettent l'accent sur l'augmentation de "
+"l'utilité du\n"
+"réseau dans son ensemble, et rendent le contenu du réseau plus "
+"susceptible d'être découvert."
#: i2p2www/pages/site/docs/applications/supported.html:148
#: i2p2www/pages/site/docs/applications/supported.html:220
@@ -4387,38 +5571,78 @@ msgid ""
"Unmaintained — This is used to tag plugins, applications,\n"
"and services which appear to be unmaintained and may be removed from\n"
"this listing in the future."
-msgstr "Non maintenu — Ceci est utilisé pour étiquetter les plugins, applications,\net les services qui semblent être non maintenus et pourraient être enlevés de\ncette liste dans l'avenir."
+msgstr ""
+"Non maintenu — Ceci est utilisé pour étiquetter les plugins, "
+"applications,\n"
+"et les services qui semblent être non maintenus et pourraient être "
+"enlevés de\n"
+"cette liste dans l'avenir."
#: i2p2www/pages/site/docs/applications/supported.html:159
#, python-format
msgid ""
"Warning: Using an application, plugin, or service with I2P\n"
-"doesn't automatically protect your anonymity. I2P is merely a set of tools\n"
-"which can help you mitigate certain identified\n"
-"threats to anonymity. We do not and cannot make any guarantees about the\n"
+"doesn't automatically protect your anonymity. I2P is merely a set of "
+"tools\n"
+"which can help you mitigate certain identified\n"
+"threats to anonymity. We do not and cannot make any guarantees about "
+"the\n"
"safety of the applications, plugins, and services listed below. Most\n"
-"applications and plugins must be properly configured, and some will need to\n"
-"be patched — and even then your anonymity might not be assured. Similarly,\n"
+"applications and plugins must be properly configured, and some will need "
+"to\n"
+"be patched — and even then your anonymity might not be assured. "
+"Similarly,\n"
"services could put your anonymity at risk, either by design or through\n"
"carelessness on their part or your own."
-msgstr "Avertissement : utiliser une application, plug-in, ou service avec I2P \nne protège pas automatiquement votre anonymat. I2P est simplement un ensemble d'outils qui peuvent vous aider à atténuer certaines Menaces identifiées de l'anonymat. Nous ne faisons et ne pouvons pas faire de garanties concernant la\nsécurité des applications, plug-ins et services listés ci-dessous. La plupart\ndes applications et des plug-ins doivent être correctement configurés et certains auront besoin d'être\nrapiécés (patched) - et même ensuite votre anonymat pourrait ne pas être assuré. De même,\ndes services pourraient mettre votre anonymat en danger, soit par leur conception ou par négligence de leur part ou de la votre."
+msgstr ""
+"Avertissement : utiliser une application, plug-in, ou service avec I2P \n"
+"ne protège pas automatiquement votre anonymat. I2P est simplement un "
+"ensemble d'outils qui peuvent vous aider à atténuer certaines Menaces identifiées de l'anonymat. Nous ne "
+"faisons et ne pouvons pas faire de garanties concernant la\n"
+"sécurité des applications, plug-ins et services listés ci-dessous. La "
+"plupart\n"
+"des applications et des plug-ins doivent être correctement configurés et "
+"certains auront besoin d'être\n"
+"rapiécés (patched) - et même ensuite votre anonymat pourrait ne pas être "
+"assuré. De même,\n"
+"des services pourraient mettre votre anonymat en danger, soit par leur "
+"conception ou par négligence de leur part ou de la votre."
#: i2p2www/pages/site/docs/applications/supported.html:171
msgid ""
"If you have doubts about the suitability of an application,\n"
-"plugin, or service for use with I2P, you are urged to inquire about privacy\n"
-"issues with its maintainers, to search its mailing lists and bug tracker if\n"
+"plugin, or service for use with I2P, you are urged to inquire about "
+"privacy\n"
+"issues with its maintainers, to search its mailing lists and bug tracker "
+"if\n"
"one exists, and consult trusted, knowledgeable members of the I2P\n"
"community."
-msgstr "Si vous avez des doutes concernant la pertinence d'une application,\nplug-in, ou service à utiliser avec I2P, vous êtes pressés de vous informer\ndes questions de vie privée avec ses mainteneurs, chercher dans ses listes de diffusion et traqueur de bug si l'un existe, et consulter les membres éprouvés, bien informés\nconcernant la communauté I2P."
+msgstr ""
+"Si vous avez des doutes concernant la pertinence d'une application,\n"
+"plug-in, ou service à utiliser avec I2P, vous êtes pressés de vous "
+"informer\n"
+"des questions de vie privée avec ses mainteneurs, chercher dans ses "
+"listes de diffusion et traqueur de bug si l'un existe, et consulter les "
+"membres éprouvés, bien informés\n"
+"concernant la communauté I2P."
#: i2p2www/pages/site/docs/applications/supported.html:179
msgid ""
"Take responsibility for your own anonymity and safety — always\n"
-"seek expert advice, educate yourself, practice good judgment, be mindful of\n"
+"seek expert advice, educate yourself, practice good judgment, be mindful "
+"of\n"
"disclosing personally identifying information, and don't take\n"
"shortcuts."
-msgstr "Prenez la responsabilité de votre propre anonymat et de votre sécurité - cherchez toujours\nle conseil d'experts, instruisez vous, pratiquez le bon jugement, soyez attentif à\nne pas révéler d'informations personnelles vous identifiant, et ne prenez pas\nde raccourcis."
+msgstr ""
+"Prenez la responsabilité de votre propre anonymat et de votre sécurité - "
+"cherchez toujours\n"
+"le conseil d'experts, instruisez vous, pratiquez le bon jugement, soyez "
+"attentif à\n"
+"ne pas révéler d'informations personnelles vous identifiant, et ne prenez"
+" pas\n"
+"de raccourcis."
#: i2p2www/pages/site/docs/applications/supported.html:201
msgid "Lightweight forum software."
@@ -4441,15 +5665,22 @@ msgstr "Logiciel de forums distribués, développé à l'origine par jrandom."
msgid ""
"A Java-based MediaWiki clone. No external database needed.\n"
"Plugin available here."
-msgstr "A clone de MediaWiki basé-Java. Pas de base de données externe requise.\nPlug-in disponible ici."
+msgstr ""
+"A clone de MediaWiki basé-Java. Pas de base de données externe requise.\n"
+"Plug-in disponible ici."
#: i2p2www/pages/site/docs/applications/supported.html:236
#, python-format
msgid ""
-"Port of the Tahoe-LAFS\n"
+"Port of the Tahoe-"
+"LAFS\n"
"distributed file system to the I2P network. Controller plugin here."
-msgstr "Portage du système de fichiers distribués Tahoe-LAFS\nsur le réseau I2P. Plug-in contrôleur ici."
+msgstr ""
+"Portage du système de fichiers distribués Tahoe-LAFS\n"
+"sur le réseau I2P. Plug-in contrôleur ici."
#: i2p2www/pages/site/docs/applications/supported.html:251
msgid "Most popular distributed version control system."
@@ -4460,7 +5691,10 @@ msgstr "Le plus populaire logiciel distribué de système de contrôle de versio
msgid ""
"Another distributed version control system. Currently\n"
"used in I2P development."
-msgstr "Une autre version distribuée du système de contrôle de version. Actuellement\nutilisé pour le développement de I2P."
+msgstr ""
+"Une autre version distribuée du système de contrôle de version. "
+"Actuellement\n"
+"utilisé pour le développement de I2P."
#: i2p2www/pages/site/docs/applications/supported.html:269
#, python-format
@@ -4468,31 +5702,57 @@ msgid ""
"Provides management of addressbooks, which are part of a simple,\n"
"user-controlled I2P naming system somewhat\n"
"analogous to the Internet's Domain Name System (DNS). Addressbooks map\n"
-"Base64 destinations to short, usually human-readable “domain” names ending\n"
-"with a .i2p suffix which the I2P router's HTTP client can resolve back to\n"
+"Base64 destinations to short, usually human-readable “domain” names "
+"ending\n"
+"with a .i2p suffix which the I2P router's HTTP client can resolve back to"
+"\n"
"Base64 addresses. (Note: While Base64 destinations are globally\n"
"unique, addressbook “domain” names only resolve to unique destinations\n"
"locally.)"
-msgstr "Fournit la gestion des carnets d'adresses, qui font partie du simple système de nommage I2P contrôlé par l'utilisateur, quelque peu \nanalogue au Système de Nom de Domaine (DNS) d'Internet. Les carnets d'adresses\ndresseent la carte des destinations Base64 en de courts, habituellement lisibles par êtres humain noms de \"domaine\", ayant le suffixe .i2p que le client HTTP du routeur I2P peut résoudre en retour en adresses Base64. (Note : tandis que les destinations Base64 sont globalement unique, les noms de \"domaine\" du carnet d'adresses nomment seulement localement la résolution vers des destinations uniques.)"
+msgstr ""
+"Fournit la gestion des carnets d'adresses, qui font partie du simple système de nommage I2P contrôlé par "
+"l'utilisateur, quelque peu \n"
+"analogue au Système de Nom de Domaine (DNS) d'Internet. Les carnets "
+"d'adresses\n"
+"dresseent la carte des destinations Base64 en de courts, habituellement "
+"lisibles par êtres humain noms de \"domaine\", ayant le suffixe .i2p que "
+"le client HTTP du routeur I2P peut résoudre en retour en adresses Base64."
+" (Note : tandis que les destinations Base64 sont globalement "
+"unique, les noms de \"domaine\" du carnet d'adresses nomment seulement "
+"localement la résolution vers des destinations uniques.)"
#: i2p2www/pages/site/docs/applications/supported.html:288
msgid ""
"Serverless peer-to-peer email application using a distributed hash table\n"
"(DHT) for secure mail storage."
-msgstr "Application de courrier électronique pair-à-pair sans serveur, utilisant une table de hachage distribuée\n(DHT) pour stocker le courrier de façon sécurisée."
+msgstr ""
+"Application de courrier électronique pair-à-pair sans serveur, utilisant "
+"une table de hachage distribuée\n"
+"(DHT) pour stocker le courrier de façon sécurisée."
#: i2p2www/pages/site/docs/applications/supported.html:297
msgid ""
"Provides email service within the I2P network via @mail.i2p addresses,\n"
-"and email gateway service between the I2P network and the public Internet\n"
+"and email gateway service between the I2P network and the public Internet"
+"\n"
"via @i2pmail.org addresses. One of the oldest continuous services on I2P."
-msgstr "Fournit un service de courrier électronique dans le réseau I2P via des adresses @mail.i2p ,\net un service de passerelle de courrier électronique entre le réseau I2P et l'internet public\nvia des adresses @i2pmail.org . Un des plus anciens en service continu sur I2P."
+msgstr ""
+"Fournit un service de courrier électronique dans le réseau I2P via des "
+"adresses @mail.i2p ,\n"
+"et un service de passerelle de courrier électronique entre le réseau I2P "
+"et l'internet public\n"
+"via des adresses @i2pmail.org . Un des plus anciens en service continu "
+"sur I2P."
#: i2p2www/pages/site/docs/applications/supported.html:307
msgid ""
"Simple web browser-based email interface. Configured to use Postman's\n"
"email service by default."
-msgstr "Simple interface de courrier électronique à base de navigateur web. Configurée pour utiliser d'origine le service de courrier électronique de Postman."
+msgstr ""
+"Simple interface de courrier électronique à base de navigateur web. "
+"Configurée pour utiliser d'origine le service de courrier électronique de"
+" Postman."
#: i2p2www/pages/site/docs/applications/supported.html:316
#, python-format
@@ -4518,13 +5778,23 @@ msgid ""
"improvements, including using the latest wxwidgets and python. It also\n"
"supports use of seedless if installed for trackerless torrents and\n"
"magnet-link like fetching of torrents within I2P.\n"
-msgstr "\nUne fourche de rufus qui utilise le pont ouvert de base (BOB) et a beaucoup \nd'améliorations, y compris l'utilisation des plus récents wxwidgets et python. Il permet\naussi l'utilisation de seedless si installé pour faire des torrents sans traqueur et\nde la récupération de liens magnet de torrents au sein d'I2P.\n"
+msgstr ""
+"\n"
+"Une fourche de rufus qui utilise le pont ouvert de base (BOB) et a "
+"beaucoup \n"
+"d'améliorations, y compris l'utilisation des plus récents wxwidgets et "
+"python. Il permet\n"
+"aussi l'utilisation de seedless si installé pour faire des torrents sans "
+"traqueur et\n"
+"de la récupération de liens magnet de torrents au sein d'I2P.\n"
#: i2p2www/pages/site/docs/applications/supported.html:358
msgid ""
"Clean, full-featured cross-platform BitTorrent client with official\n"
"ports for several GUI toolkits."
-msgstr "Client BitTorrent multiplate-forme, propre, toutes options, avec portages officiels pour plusieurs boîtes à outils GUI."
+msgstr ""
+"Client BitTorrent multiplate-forme, propre, toutes options, avec portages"
+" officiels pour plusieurs boîtes à outils GUI."
#: i2p2www/pages/site/docs/applications/supported.html:367
msgid "Has a plugin providing I2P support."
@@ -4535,27 +5805,39 @@ msgstr "Possède un plug-in fournissant le support d'I2P."
msgid ""
"For a detailed feature comparison of I2P-enabled trackers/indexers, see\n"
"here."
-msgstr "Pour une comparaison détaillée des caractéristiques des traqueurs/indexeurs compatibles I2P, voir\nici."
+msgstr ""
+"Pour une comparaison détaillée des caractéristiques des "
+"traqueurs/indexeurs compatibles I2P, voir\n"
+"ici."
#: i2p2www/pages/site/docs/applications/supported.html:382
msgid ""
-"The code that powered one of the first major tracker/indexer sites on the\n"
+"The code that powered one of the first major tracker/indexer sites on the"
+"\n"
"Internet. Patched for I2P."
-msgstr "Le code qui a actionné un des premiers sites traqueurs/indexeurs majeurs sur l'Internet. Rapiécé (patched) pour I2P."
+msgstr ""
+"Le code qui a actionné un des premiers sites traqueurs/indexeurs majeurs "
+"sur l'Internet. Rapiécé (patched) pour I2P."
#: i2p2www/pages/site/docs/applications/supported.html:391
#, python-format
msgid ""
"Lightweight tracker/indexer. I2P mod available in the i2p.opentracker\n"
"branch of the I2P Monotone repository."
-msgstr "Traqueur/indexeur poids-léger. Mod I2P disponible dans la branche i2p.opentracker\ndu dépôt Monotone I2P."
+msgstr ""
+"Traqueur/indexeur poids-léger. Mod I2P disponible dans la branche "
+"i2p.opentracker\n"
+"du dépôt Monotone I2P."
#: i2p2www/pages/site/docs/applications/supported.html:400
#, python-format
msgid ""
"zzz's Java-based open tracker. More info\n"
"here."
-msgstr "zzz's Traqueur ouvert basé sur Java. Plus d'infos\nici."
+msgstr ""
+"zzz's Traqueur ouvert basé sur Java. Plus"
+" d'infos\n"
+"ici."
#: i2p2www/pages/site/docs/applications/supported.html:413
msgid "I2P port of the aMule ED2K client."
@@ -4564,22 +5846,31 @@ msgstr "Portage I2P du client ED2K aMule."
#: i2p2www/pages/site/docs/applications/supported.html:422
#, python-format
msgid ""
-"Port of the Phex Gnutella client. Website\n"
+"Port of the Phex Gnutella "
+"client. Website\n"
"for plugin version here."
-msgstr "Portage du client Gnutella Phex. Site web pour la version plug-in ici."
+msgstr ""
+"Portage du client Gnutella Phex. Site web pour la version "
+"plug-in ici."
#: i2p2www/pages/site/docs/applications/supported.html:431
#, python-format
msgid ""
"Cache for Gnutella peers on I2P. Website for plugin version\n"
"here."
-msgstr "Cache pour les pairs Gnutella dans I2P. Site web pour la version\nplug-in ici."
+msgstr ""
+"Cache pour les pairs Gnutella dans I2P. Site web pour la version\n"
+"plug-in ici."
#: i2p2www/pages/site/docs/applications/supported.html:446
msgid ""
"Unix standard tool for socket relaying. Several clones, ports, and forks\n"
"have appeared over the years."
-msgstr "Outil standard d'Unix pour le relayage de douilles (sockets). Plusieurs clones, portages, et fourches\nsont apparus au fil des ans."
+msgstr ""
+"Outil standard d'Unix pour le relayage de douilles (sockets). Plusieurs "
+"clones, portages, et fourches\n"
+"sont apparus au fil des ans."
#: i2p2www/pages/site/docs/applications/supported.html:455
msgid "Like netcat but more powerful."
@@ -4587,14 +5878,17 @@ msgstr "Comme netcat mais plus puissant."
#: i2p2www/pages/site/docs/applications/supported.html:461
msgid ""
-"Proxy providing simple, transparent SOCKS-ification of network applications."
+"Proxy providing simple, transparent SOCKS-ification of network "
+"applications."
msgstr ""
#: i2p2www/pages/site/docs/applications/supported.html:471
msgid ""
-"Most popular implementation of the Secure Shell (SSH) protocol and related "
-"tools."
-msgstr "Implémentation la plus populaire du protocole Secure Shell (SSH) et outils liés."
+"Most popular implementation of the Secure Shell (SSH) protocol and "
+"related tools."
+msgstr ""
+"Implémentation la plus populaire du protocole Secure Shell (SSH) et "
+"outils liés."
#: i2p2www/pages/site/docs/applications/supported.html:477
msgid "Open source Secure Shell (SSH) client for Windows."
@@ -4607,21 +5901,29 @@ msgstr "Client IM (messagerie instantanée) avec incarnations multiples."
#: i2p2www/pages/site/docs/applications/supported.html:496
msgid ""
"Many IRC clients leak identifying information to servers or other\n"
-"clients, so I2P's IRC and SOCKS IRC client tunnels filter certain inbound\n"
-"and outbound messages to scrub data such as LAN IP addresses, external IP\n"
-"addresses, local hostnames, and the name and version of the IRC client. Two\n"
-"message types in particular, DCC and CTCP, can't be sufficiently anonymized\n"
-"without changes to the protocols or to IRC client/server code, so they are\n"
+"clients, so I2P's IRC and SOCKS IRC client tunnels filter certain inbound"
+"\n"
+"and outbound messages to scrub data such as LAN IP addresses, external IP"
+"\n"
+"addresses, local hostnames, and the name and version of the IRC client. "
+"Two\n"
+"message types in particular, DCC and CTCP, can't be sufficiently "
+"anonymized\n"
+"without changes to the protocols or to IRC client/server code, so they "
+"are\n"
"completely blocked, except for CTCP ACTION (the message emitted by the\n"
"/me
command) which isn't inherently dangerous."
msgstr ""
#: i2p2www/pages/site/docs/applications/supported.html:507
msgid ""
-"I2P's IRC filtering may not cover every possible leak — users should also\n"
-"check if their client is sending their real name or local username. Packet\n"
+"I2P's IRC filtering may not cover every possible leak — users should also"
+"\n"
+"check if their client is sending their real name or local username. "
+"Packet\n"
"sniffers such as Wireshark are\n"
-"useful here. Eliminating remaining leaks may be as simple as changing the\n"
+"useful here. Eliminating remaining leaks may be as simple as changing the"
+"\n"
"client's default configuration. If that doesn't help, inform the I2P\n"
"developers; they may be able to solve it via additional filtering."
msgstr ""
@@ -4631,7 +5933,9 @@ msgstr ""
msgid ""
"Small Java-based IRC client. Plugin available here."
-msgstr "Petit client IRC basé sur Java. Plug-in disponible ici."
+msgstr ""
+"Petit client IRC basé sur Java. Plug-in disponible ici."
#: i2p2www/pages/site/docs/applications/supported.html:528
msgid "Cross-platform graphical IRC client."
@@ -4655,23 +5959,32 @@ msgstr "Serveur IRC le plus populaire."
#: i2p2www/pages/site/docs/applications/supported.html:568
msgid ""
-"Any website hosted anonymously on I2P, reachable through the I2P router's "
-"HTTP proxy."
-msgstr "N'importe quel site Web hébergé anonymement dans I2P, accessible à travers le proxy HTTP du routeur I2P."
+"Any website hosted anonymously on I2P, reachable through the I2P router's"
+" HTTP proxy."
+msgstr ""
+"N'importe quel site Web hébergé anonymement dans I2P, accessible à "
+"travers le proxy HTTP du routeur I2P."
#: i2p2www/pages/site/docs/applications/supported.html:576
msgid ""
"Distributed anonymous websites hosted\n"
"using Tahoe-LAFS-I2P, currently only reachable with Tahoe-LAFS-I2P\n"
"clients or through the Tahoe-LAFS-I2P HTTP proxy."
-msgstr "Sites web anonymes distribués, hébergés\nen utilisant Tahoe-LAFS-I2P, actuellement seulement accessibles avec les clients Tahoe-LAFS-I2P\nou à travers le proxy HTTP Tahoe-LAFS-I2P."
+msgstr ""
+"Sites web anonymes distribués, hébergés\n"
+"en utilisant Tahoe-LAFS-I2P, actuellement seulement accessibles avec les "
+"clients Tahoe-LAFS-I2P\n"
+"ou à travers le proxy HTTP Tahoe-LAFS-I2P."
#: i2p2www/pages/site/docs/applications/supported.html:586
#, python-format
msgid ""
"Website for sponge's jump service.\n"
"Source code available."
-msgstr "Site web pour le service de saut desponge.\nCode source disponible."
+msgstr ""
+"Site web pour le service de saut desponge.\n"
+"Code source disponible."
#: i2p2www/pages/site/docs/applications/supported.html:595
msgid "Another jump service."
@@ -4716,19 +6029,27 @@ msgstr ""
#: i2p2www/pages/site/docs/applications/supported.html:671
msgid ""
-"Gateways allowing I2P users to access content hosted on the public Internet."
-msgstr "Passerelles permettant aux utilisateurs d'I2P d'avoir accès au contenu hébergé sur l'Internet public."
+"Gateways allowing I2P users to access content hosted on the public "
+"Internet."
+msgstr ""
+"Passerelles permettant aux utilisateurs d'I2P d'avoir accès au contenu "
+"hébergé sur l'Internet public."
#: i2p2www/pages/site/docs/applications/supported.html:678
msgid "Publicly advertised outproxy running Squid, located in Germany."
-msgstr "Proxy sortant (outproxy) annoncé publiquement, fonctionnant avec Squid, situé en Allemagne."
+msgstr ""
+"Proxy sortant (outproxy) annoncé publiquement, fonctionnant avec Squid, "
+"situé en Allemagne."
#: i2p2www/pages/site/docs/applications/supported.html:688
msgid ""
"Lightweight web server and Java servlet container. I2P is tightly\n"
-"integrated with a bundled copy of Jetty which by default is configured to\n"
-"host the user's eepsite. The bundled\n"
-"Jetty also serves the I2P router console and web applications bundled with\n"
+"integrated with a bundled copy of Jetty which by default is configured to"
+"\n"
+"host the user's eepsite. The "
+"bundled\n"
+"Jetty also serves the I2P router console and web applications bundled "
+"with\n"
"I2P."
msgstr ""
@@ -4745,7 +6066,9 @@ msgstr "Serveur web le plus populaire dans le WWW public."
#: i2p2www/pages/site/docs/applications/supported.html:715
msgid "Web server and Java servlet container. More features than Jetty."
-msgstr "Serveur Web et conteneur de servlets Java. Davantage de fonctions que Jetty."
+msgstr ""
+"Serveur Web et conteneur de servlets Java. Davantage de fonctions que "
+"Jetty."
#: i2p2www/pages/site/docs/applications/supported.html:721
msgid "Fast lightweight web server."
@@ -4762,10 +6085,16 @@ msgstr "Discussion nommage"
#: i2p2www/pages/site/docs/discussions/naming.html:4
#, python-format
msgid ""
-"NOTE: The following is a discussion of the reasons behind the I2P naming system,\n"
+"NOTE: The following is a discussion of the reasons behind the I2P naming "
+"system,\n"
"common arguments and possible alternatives.\n"
"See the naming page for current documentation."
-msgstr "NOTE : ce qui suit est une discussion concernant les raisons derrière le système de nommage d'I2P,\nles arguments courants et alternatives possibles.\nPour la documentation actuelle, voir la page nommage."
+msgstr ""
+"NOTE : ce qui suit est une discussion concernant les raisons derrière le "
+"système de nommage d'I2P,\n"
+"les arguments courants et alternatives possibles.\n"
+"Pour la documentation actuelle, voir la page "
+"nommage."
#: i2p2www/pages/site/docs/discussions/naming.html:10
msgid "Discarded alternatives"
@@ -4773,49 +6102,72 @@ msgstr ""
#: i2p2www/pages/site/docs/discussions/naming.html:12
msgid ""
-"Naming within I2P has been an oft-debated topic since the very beginning with\n"
-"advocates across the spectrum of possibilities. However, given I2P's inherent\n"
-"demand for secure communication and decentralized operation, the traditional\n"
-"DNS-style naming system is clearly out, as are \"majority rules\" voting systems."
+"Naming within I2P has been an oft-debated topic since the very beginning "
+"with\n"
+"advocates across the spectrum of possibilities. However, given I2P's "
+"inherent\n"
+"demand for secure communication and decentralized operation, the "
+"traditional\n"
+"DNS-style naming system is clearly out, as are \"majority rules\" voting "
+"systems."
msgstr ""
#: i2p2www/pages/site/docs/discussions/naming.html:19
msgid ""
-"I2P does not promote the use of DNS-like services though, as the damage done\n"
-"by hijacking a site can be tremendous - and insecure destinations have no\n"
-"value. DNSsec itself still falls back on registrars and certificate authorities,\n"
-"while with I2P, requests sent to a destination cannot be intercepted or the reply\n"
-"spoofed, as they are encrypted to the destination's public keys, and a destination\n"
-"itself is just a pair of public keys and a certificate. DNS-style systems on the\n"
-"other hand allow any of the name servers on the lookup path to mount simple denial\n"
-"of service and spoofing attacks. Adding on a certificate authenticating the\n"
-"responses as signed by some centralized certificate authority would address many of\n"
-"the hostile nameserver issues but would leave open replay attacks as well as \n"
+"I2P does not promote the use of DNS-like services though, as the damage "
+"done\n"
+"by hijacking a site can be tremendous - and insecure destinations have no"
+"\n"
+"value. DNSsec itself still falls back on registrars and certificate "
+"authorities,\n"
+"while with I2P, requests sent to a destination cannot be intercepted or "
+"the reply\n"
+"spoofed, as they are encrypted to the destination's public keys, and a "
+"destination\n"
+"itself is just a pair of public keys and a certificate. DNS-style "
+"systems on the\n"
+"other hand allow any of the name servers on the lookup path to mount "
+"simple denial\n"
+"of service and spoofing attacks. Adding on a certificate authenticating "
+"the\n"
+"responses as signed by some centralized certificate authority would "
+"address many of\n"
+"the hostile nameserver issues but would leave open replay attacks as well"
+" as \n"
"hostile certificate authority attacks."
msgstr ""
#: i2p2www/pages/site/docs/discussions/naming.html:33
msgid ""
-"Voting style naming is dangerous as well, especially given the effectiveness of\n"
-"Sybil attacks in anonymous systems - the attacker can simply create an arbitrarily\n"
-"high number of peers and \"vote\" with each to take over a given name. Proof-of-work\n"
-"methods can be used to make identity non-free, but as the network grows the load\n"
-"required to contact everyone to conduct online voting is implausible, or if the\n"
+"Voting style naming is dangerous as well, especially given the "
+"effectiveness of\n"
+"Sybil attacks in anonymous systems - the attacker can simply create an "
+"arbitrarily\n"
+"high number of peers and \"vote\" with each to take over a given name. "
+"Proof-of-work\n"
+"methods can be used to make identity non-free, but as the network grows "
+"the load\n"
+"required to contact everyone to conduct online voting is implausible, or "
+"if the\n"
"full network is not queried, different sets of answers may be reachable."
msgstr ""
#: i2p2www/pages/site/docs/discussions/naming.html:42
msgid ""
-"As with the Internet however, I2P is keeping the design and operation of a \n"
-"naming system out of the (IP-like) communication layer. The bundled naming library\n"
-"includes a simple service provider interface which alternate naming systems can\n"
-"plug into, allowing end users to drive what sort of naming tradeoffs they prefer."
+"As with the Internet however, I2P is keeping the design and operation of "
+"a \n"
+"naming system out of the (IP-like) communication layer. The bundled "
+"naming library\n"
+"includes a simple service provider interface which alternate naming systems can\n"
+"plug into, allowing end users to drive what sort of naming tradeoffs they"
+" prefer."
msgstr ""
#: i2p2www/pages/site/docs/discussions/naming.html:50
msgid ""
-"See also Names: Decentralized, "
-"Secure, Human-Meaningful: Choose Two."
+"See also Names: "
+"Decentralized, Secure, Human-Meaningful: Choose Two."
msgstr ""
#: i2p2www/pages/site/docs/discussions/naming.html:55
@@ -4826,31 +6178,43 @@ msgstr ""
msgid ""
"Q:\n"
"What to do if some hosts \n"
-"do not agree on one address and if some addresses are working, others are not? \n"
+"do not agree on one address and if some addresses are working, others are"
+" not? \n"
"Who is the right source of a name?"
msgstr ""
#: i2p2www/pages/site/docs/discussions/naming.html:64
msgid ""
"A:\n"
-"You don't. This is actually a critical difference between names on I2P and how \n"
-"DNS works - names in I2P are human readable, secure, but not globally \n"
-"unique. This is by design, and an inherent part of our need for security."
+"You don't. This is actually a critical difference between names on I2P "
+"and how \n"
+"DNS works - names in I2P are human readable, secure, but not globally"
+" \n"
+"unique. This is by design, and an inherent part of our need for "
+"security."
msgstr ""
#: i2p2www/pages/site/docs/discussions/naming.html:70
msgid ""
-"If I could somehow convince you to change the destination associated with some \n"
-"name, I'd successfully \"take over\" the site, and under no circumstances is that \n"
-"acceptable. Instead, what we do is make names locally unique: they are \n"
-"what you use to call a site, just as how you can call things whatever \n"
-"you want when you add them to your browser's bookmarks, or your IM client's \n"
-"buddy list. Who you call \"Boss\" may be who someone else calls \"Sally\"."
+"If I could somehow convince you to change the destination associated with"
+" some \n"
+"name, I'd successfully \"take over\" the site, and under no circumstances"
+" is that \n"
+"acceptable. Instead, what we do is make names locally unique: "
+"they are \n"
+"what you use to call a site, just as how you can call things "
+"whatever \n"
+"you want when you add them to your browser's bookmarks, or your IM "
+"client's \n"
+"buddy list. Who you call \"Boss\" may be who someone else calls "
+"\"Sally\"."
msgstr ""
#: i2p2www/pages/site/docs/discussions/naming.html:78
msgid "Names will not, ever, be securely human readable and globally unique."
-msgstr "Les noms ne seront pas, jamais, sécurisés, lisibles par être humain, et globalement uniques."
+msgstr ""
+"Les noms ne seront pas, jamais, sécurisés, lisibles par être humain, et "
+"globalement uniques."
#: i2p2www/pages/site/docs/discussions/naming.html:83
msgid ""
@@ -4861,33 +6225,44 @@ msgstr ""
#: i2p2www/pages/site/docs/discussions/naming.html:89
msgid ""
"Inefficiency:\n"
-"The whole hosts.txt is downloaded (if it has changed, since eepget uses the etag and last-modified headers).\n"
+"The whole hosts.txt is downloaded (if it has changed, since eepget uses "
+"the etag and last-modified headers).\n"
"It's about 400K right now for almost 800 hosts."
msgstr ""
#: i2p2www/pages/site/docs/discussions/naming.html:94
msgid ""
-"True, but this isn't a lot of traffic in the context of i2p, which is itself wildly inefficient\n"
-"(floodfill databases, huge encryption overhead and padding, garlic routing, etc.).\n"
-"If you downloaded a hosts.txt file from someone every 12 hours it averages out to about 10 bytes/sec."
+"True, but this isn't a lot of traffic in the context of i2p, which is "
+"itself wildly inefficient\n"
+"(floodfill databases, huge encryption overhead and padding, garlic "
+"routing, etc.).\n"
+"If you downloaded a hosts.txt file from someone every 12 hours it "
+"averages out to about 10 bytes/sec."
msgstr ""
#: i2p2www/pages/site/docs/discussions/naming.html:99
msgid ""
-"As is usually the case in i2p, there is a fundamental tradeoff here between anonymity and efficiency.\n"
-"Some would say that using the etag and last-modified headers is hazardous because it exposes when you\n"
+"As is usually the case in i2p, there is a fundamental tradeoff here "
+"between anonymity and efficiency.\n"
+"Some would say that using the etag and last-modified headers is hazardous"
+" because it exposes when you\n"
"last requested the data.\n"
-"Others have suggested asking for specific keys only (similar to what jump services do, but\n"
+"Others have suggested asking for specific keys only (similar to what jump"
+" services do, but\n"
"in a more automated fashion), possibly at a further cost in anonymity."
msgstr ""
#: i2p2www/pages/site/docs/discussions/naming.html:106
#, python-format
msgid ""
-"Possible improvements would be a replacement or supplement to addressbook (see %(i2host)sp),\n"
-"or something simple like subscribing to http://example.i2p/cgi-bin/recenthosts.cgi rather than http://example.i2p/hosts.txt.\n"
-"If a hypothetical recenthosts.cgi distributed all hosts from the last 24 hours, for example,\n"
-"that could be both more efficient and more anonymous than the current hosts.txt with last-modified and etag."
+"Possible improvements would be a replacement or supplement to addressbook"
+" (see %(i2host)sp),\n"
+"or something simple like subscribing to http://example.i2p/cgi-"
+"bin/recenthosts.cgi rather than http://example.i2p/hosts.txt.\n"
+"If a hypothetical recenthosts.cgi distributed all hosts from the last 24 "
+"hours, for example,\n"
+"that could be both more efficient and more anonymous than the current "
+"hosts.txt with last-modified and etag."
msgstr ""
#: i2p2www/pages/site/docs/discussions/naming.html:112
@@ -4897,14 +6272,17 @@ msgid ""
"%(url)s.\n"
"This script returns an Etag with a timestamp.\n"
"When a request comes in with the If-None-Match etag,\n"
-"the script ONLY returns new hosts since that timestamp, or 304 Not Modified if there are none.\n"
-"In this way, the script efficiently returns only the hosts the subscriber\n"
+"the script ONLY returns new hosts since that timestamp, or 304 Not "
+"Modified if there are none.\n"
+"In this way, the script efficiently returns only the hosts the subscriber"
+"\n"
"does not know about, in an addressbook-compatible manner."
msgstr ""
#: i2p2www/pages/site/docs/discussions/naming.html:121
msgid ""
-"So the inefficiency is not a big issue and there are several ways to improve things without\n"
+"So the inefficiency is not a big issue and there are several ways to "
+"improve things without\n"
"radical change."
msgstr ""
@@ -4918,30 +6296,37 @@ msgstr ""
#: i2p2www/pages/site/docs/discussions/naming.html:132
msgid ""
"As far as network traffic see above.\n"
-"But unless you're going to do a slow real-time query over the network for\n"
-"a key, you need to have the whole set of keys stored locally, at a cost of about 500 bytes per key."
+"But unless you're going to do a slow real-time query over the network for"
+"\n"
+"a key, you need to have the whole set of keys stored locally, at a cost "
+"of about 500 bytes per key."
msgstr ""
#: i2p2www/pages/site/docs/discussions/naming.html:139
msgid ""
"Requires configuration and \"trust\":\n"
-"Out-of-the-box addressbook is only subscribed to http://www.i2p2.i2p/hosts.txt, which is rarely updated,\n"
+"Out-of-the-box addressbook is only subscribed to "
+"http://www.i2p2.i2p/hosts.txt, which is rarely updated,\n"
"leading to poor new-user experience."
msgstr ""
#: i2p2www/pages/site/docs/discussions/naming.html:144
msgid ""
-"This is very much intentional. jrandom wants a user to \"trust\" a hosts.txt\n"
+"This is very much intentional. jrandom wants a user to \"trust\" a "
+"hosts.txt\n"
"provider, and as he likes to say, \"trust is not a boolean\".\n"
-"The configuration step attempts to force users to think about issues of trust in an anonymous network."
+"The configuration step attempts to force users to think about issues of "
+"trust in an anonymous network."
msgstr ""
#: i2p2www/pages/site/docs/discussions/naming.html:149
msgid ""
"As another example, the \"Eepsite Unknown\" error page in the HTTP Proxy\n"
-"lists some jump services, but doesn't \"recommend\" any one in particular,\n"
+"lists some jump services, but doesn't \"recommend\" any one in "
+"particular,\n"
"and it's up to the user to pick one (or not).\n"
-"jrandom would say we trust the listed providers enough to list them but not enough to\n"
+"jrandom would say we trust the listed providers enough to list them but "
+"not enough to\n"
"automatically go fetch the key from them."
msgstr ""
@@ -4958,13 +6343,14 @@ msgstr ""
#: i2p2www/pages/site/docs/discussions/naming.html:166
msgid ""
-"Unfortunately real-time lookups over i2p would significantly slow down web "
-"browsing."
+"Unfortunately real-time lookups over i2p would significantly slow down "
+"web browsing."
msgstr ""
#: i2p2www/pages/site/docs/discussions/naming.html:169
msgid ""
-"Also, DNS is based on lookups with limited caching and time-to-live, while i2p\n"
+"Also, DNS is based on lookups with limited caching and time-to-live, "
+"while i2p\n"
"keys are permanent."
msgstr ""
@@ -4983,21 +6369,26 @@ msgid ""
"Yes it depends on a few servers that you have configured.\n"
"Within i2p, servers and services come and go.\n"
"Any other centralized system (for example DNS root servers) would\n"
-"have the same problem. A completely decentralized system (everybody is authoritative)\n"
-"is possible by implementing an \"everybody is a root DNS server\" solution, or by\n"
-"something even simpler, like a script that adds everybody in your hosts.txt to your addressbook."
+"have the same problem. A completely decentralized system (everybody is "
+"authoritative)\n"
+"is possible by implementing an \"everybody is a root DNS server\" "
+"solution, or by\n"
+"something even simpler, like a script that adds everybody in your "
+"hosts.txt to your addressbook."
msgstr ""
#: i2p2www/pages/site/docs/discussions/naming.html:190
msgid ""
-"People advocating all-authoritative solutions generally haven't thought through\n"
+"People advocating all-authoritative solutions generally haven't thought "
+"through\n"
"the issues of conflicts and hijacking, however."
msgstr ""
#: i2p2www/pages/site/docs/discussions/naming.html:196
msgid ""
"Awkward, not real-time:\n"
-"It's a patchwork of hosts.txt providers, key-add web form providers, jump service providers,\n"
+"It's a patchwork of hosts.txt providers, key-add web form providers, jump"
+" service providers,\n"
"eepsite status reporters.\n"
"Jump servers and subscriptions are a pain, it should just work like DNS."
msgstr ""
@@ -5008,7 +6399,8 @@ msgstr ""
#: i2p2www/pages/site/docs/discussions/naming.html:207
msgid ""
-"So, in summary, the current system is not horribly broken, inefficient, or un-scalable,\n"
+"So, in summary, the current system is not horribly broken, inefficient, "
+"or un-scalable,\n"
"and proposals to \"just use DNS\" aren't well thought-through."
msgstr ""
@@ -5018,7 +6410,8 @@ msgstr ""
#: i2p2www/pages/site/docs/discussions/naming.html:213
msgid ""
-"The I2P source contains several pluggable naming systems and supports configuration options\n"
+"The I2P source contains several pluggable naming systems and supports "
+"configuration options\n"
"to enable experimentation with naming systems."
msgstr ""
@@ -5040,8 +6433,8 @@ msgstr ""
#: i2p2www/pages/site/docs/discussions/naming.html:234
msgid ""
-"AddressDB - Each host is listed in a separate file in a addressDb/ "
-"directory."
+"AddressDB - Each host is listed in a separate file in a addressDb/"
+" directory."
msgstr ""
#: i2p2www/pages/site/docs/discussions/naming.html:237
@@ -5066,7 +6459,8 @@ msgstr ""
#: i2p2www/pages/site/docs/discussions/naming.html:253
msgid ""
-"The current naming system can be changed with the advanced config option 'i2p.naming.impl'\n"
+"The current naming system can be changed with the advanced config option "
+"'i2p.naming.impl'\n"
"(restart required).\n"
"See core/java/src/net/i2p/client/naming for details."
msgstr ""
@@ -5074,7 +6468,8 @@ msgstr ""
#: i2p2www/pages/site/docs/discussions/naming.html:258
msgid ""
"Any new system should be stacked with HostsTxt, or should\n"
-"implement local storage and/or the addressbook subscription functions, since addressbook\n"
+"implement local storage and/or the addressbook subscription functions, "
+"since addressbook\n"
"only knows about the hosts.txt files and format."
msgstr ""
@@ -5084,40 +6479,50 @@ msgstr ""
#: i2p2www/pages/site/docs/discussions/naming.html:265
msgid ""
-"I2P destinations contain a certificate, however at the moment that certificate\n"
+"I2P destinations contain a certificate, however at the moment that "
+"certificate\n"
"is always null.\n"
-"With a null certificate, base64 destinations are always 516 bytes ending in \"AAAA\",\n"
-"and this is checked in the addressbook merge mechanism, and possibly other places.\n"
-"Also, there is no method available to generate a certificate or add it to a\n"
+"With a null certificate, base64 destinations are always 516 bytes ending "
+"in \"AAAA\",\n"
+"and this is checked in the addressbook merge mechanism, and possibly "
+"other places.\n"
+"Also, there is no method available to generate a certificate or add it to"
+" a\n"
"destination. So these will have to be updated to implement certificates."
msgstr ""
#: i2p2www/pages/site/docs/discussions/naming.html:273
#, python-format
msgid ""
-"One possible use of certificates is for proof "
-"of work."
+"One possible use of certificates is for proof of work."
msgstr ""
#: i2p2www/pages/site/docs/discussions/naming.html:276
msgid ""
-"Another is for \"subdomains\" (in quotes because there is really no such thing,\n"
-"i2p uses a flat naming system) to be signed by the 2nd level domain's keys."
+"Another is for \"subdomains\" (in quotes because there is really no such "
+"thing,\n"
+"i2p uses a flat naming system) to be signed by the 2nd level domain's "
+"keys."
msgstr ""
#: i2p2www/pages/site/docs/discussions/naming.html:280
msgid ""
-"With any certificate implementation must come the method for verifying the\n"
+"With any certificate implementation must come the method for verifying "
+"the\n"
"certificates.\n"
"Presumably this would happen in the addressbook merge code.\n"
-"Is there a method for multiple types of certificates, or multiple certificates?"
+"Is there a method for multiple types of certificates, or multiple "
+"certificates?"
msgstr ""
#: i2p2www/pages/site/docs/discussions/naming.html:286
msgid ""
"Adding on a certificate authenticating the\n"
-"responses as signed by some centralized certificate authority would address many of\n"
-"the hostile nameserver issues but would leave open replay attacks as well as \n"
+"responses as signed by some centralized certificate authority would "
+"address many of\n"
+"the hostile nameserver issues but would leave open replay attacks as well"
+" as \n"
"hostile certificate authority attacks."
msgstr ""
@@ -5132,13 +6537,20 @@ msgstr ""
#: i2p2www/pages/site/docs/how/cryptography.html:10
#, python-format
msgid ""
-"There are a handful of cryptographic algorithms in use within I2P, but we have\n"
-"reduced them to a bare minimum to deal with our needs - one symmetric algorithm\n"
-"one asymmetric algorithm, one signing algorithm, and one hashing algorithm. However, \n"
-"we do combine them in some particular ways to provide message integrity (rather than\n"
-"relying on a MAC). In addition, as much as we hate doing anything new in regards to \n"
-"cryptography, we can't seem to find a reference discussing (or even naming) the \n"
-"technique used in ElGamal/AES+SessionTag (but we're sure others have done it)."
+"There are a handful of cryptographic algorithms in use within I2P, but we"
+" have\n"
+"reduced them to a bare minimum to deal with our needs - one symmetric "
+"algorithm\n"
+"one asymmetric algorithm, one signing algorithm, and one hashing "
+"algorithm. However, \n"
+"we do combine them in some particular ways to provide message integrity "
+"(rather than\n"
+"relying on a MAC). In addition, as much as we hate doing anything new in"
+" regards to \n"
+"cryptography, we can't seem to find a reference discussing (or even "
+"naming) the \n"
+"technique used in ElGamal/AES+SessionTag "
+"(but we're sure others have done it)."
msgstr ""
#: i2p2www/pages/site/docs/how/cryptography.html:20
@@ -5150,35 +6562,50 @@ msgid ""
"\n"
"ElGamal is used for asymmetric encryption.\n"
"ElGamal is used in several places in I2P:"
-msgstr "\nElGamal est utilisé pour le chiffrage asymétrique. \nElGamal est utilisé en plusieurs endroits dans I2P :"
+msgstr ""
+"\n"
+"ElGamal est utilisé pour le chiffrage asymétrique. \n"
+"ElGamal est utilisé en plusieurs endroits dans I2P :"
#: i2p2www/pages/site/docs/how/cryptography.html:27
#, python-format
msgid ""
"To encrypt router-to-router Tunnel Build "
"Messages"
-msgstr "Pour chiffrer les messages de construction de tunnel routeur-à-routeur"
+msgstr ""
+"Pour chiffrer les messages de construction"
+" de tunnel routeur-à-routeur"
#: i2p2www/pages/site/docs/how/cryptography.html:30
#, python-format
msgid ""
-"For end-to-end (destination-to-destination) encryption as a part of ElGamal/AES+SessionTag\n"
-"using the encryption key in the LeaseSet"
-msgstr "Pour le chiffrement bout à bout (destination-à-destination) en tant qu'une partie de\nElGamal/AES+SessionTag\nutilisant la clé de chiffrement dans le jeu de bail"
+"For end-to-end (destination-to-destination) encryption as a part of ElGamal/AES+SessionTag\n"
+"using the encryption key in the LeaseSet"
+msgstr ""
+"Pour le chiffrement bout à bout (destination-à-destination) en tant "
+"qu'une partie de\n"
+"ElGamal/AES+SessionTag\n"
+"utilisant la clé de chiffrement dans le jeu de bail"
#: i2p2www/pages/site/docs/how/cryptography.html:34
#: i2p2www/pages/site/docs/how/cryptography.html:198
#, python-format
msgid ""
-"For encryption of some netDb stores and queries sent to floodfill routers\n"
+"For encryption of some netDb stores and "
+"queries sent to floodfill routers\n"
"as a part of ElGamal/AES+SessionTag\n"
"(destination-to-router or router-to-router)."
msgstr ""
#: i2p2www/pages/site/docs/how/cryptography.html:41
msgid ""
-"We use common primes for 2048 ElGamal encryption and decryption, as given by IETF RFC-3526.\n"
-"We currently only use ElGamal to encrypt the IV and session key in a single block, followed by the \n"
+"We use common primes for 2048 ElGamal encryption and decryption, as given"
+" by IETF RFC-3526.\n"
+"We currently only use ElGamal to encrypt the IV and session key in a "
+"single block, followed by the \n"
"AES encrypted payload using that key and IV."
msgstr ""
@@ -5188,13 +6615,15 @@ msgstr ""
#: i2p2www/pages/site/docs/how/cryptography.html:64
msgid ""
-"The H(data) is the SHA256 of the data that is encrypted in the ElGamal block,\n"
+"The H(data) is the SHA256 of the data that is encrypted in the ElGamal "
+"block,\n"
"and is preceded by a nonzero byte. \n"
"This byte could be random, but as implemented it is always 0xFF.\n"
"It could possibly be used for flags in the future.\n"
"The data encrypted in the block may be up to 222 bytes long.\n"
"As the encrypted data may contain a substantial number of zeros if the\n"
-"cleartext is smaller than 222 bytes, it is recommended that higher layers pad\n"
+"cleartext is smaller than 222 bytes, it is recommended that higher layers"
+" pad\n"
"the cleartext to 222 bytes with random data.\n"
"Total length: typically 255 bytes."
msgstr ""
@@ -5205,7 +6634,8 @@ msgstr ""
#: i2p2www/pages/site/docs/how/cryptography.html:102
msgid ""
-"Each encrypted part is prepended with zeros to a size of exactly 257 bytes.\n"
+"Each encrypted part is prepended with zeros to a size of exactly 257 "
+"bytes.\n"
"Total length: 514 bytes.\n"
"In typical usage, higher layers pad the cleartext data to 222 bytes,\n"
"resulting in an unencrypted block of 255 bytes.\n"
@@ -5221,7 +6651,8 @@ msgstr ""
#: i2p2www/pages/site/docs/how/cryptography.html:115
msgid ""
"The shared prime is the \n"
-"[Oakley prime for 2048 bit keys]"
+"[Oakley prime "
+"for 2048 bit keys]"
msgstr ""
#: i2p2www/pages/site/docs/how/cryptography.html:122
@@ -5249,17 +6680,23 @@ msgstr ""
#, python-format
msgid ""
"This should be safe for use with the Oakley primes, per\n"
-"On Diffie-Hellman Key Agreement with Short Exponents - van Oorschot, Weiner\n"
-"at EuroCrypt 96, and crypto++'s benchmarks.\n"
-"Benchmarks originally at this link, now dead,\n"
-"rescued from the wayback machine, dated Apr 23, 2008."
+"On Diffie-Hellman Key Agreement with Short Exponents "
+"- van Oorschot, Weiner\n"
+"at EuroCrypt 96, and crypto++'s "
+"benchmarks.\n"
+"Benchmarks originally at this link, now dead,\n"
+"rescued from the wayback machine,"
+" dated Apr 23, 2008."
msgstr ""
#: i2p2www/pages/site/docs/how/cryptography.html:160
#, python-format
msgid ""
-"Also, Koshiba & Kurosawa: Short Exponent Diffie-Hellman Problems (PKC 2004, LNCS 2947, pp. 173-186)\n"
-"(full text on Google Books) apparently supports this, according to\n"
+"Also, Koshiba & Kurosawa: Short Exponent Diffie-"
+"Hellman Problems (PKC 2004, LNCS 2947, pp. 173-186)\n"
+"(full text on Google Books) apparently "
+"supports this, according to\n"
"this sci.crypt thread.\n"
"The remainder of the PrivateKey is padded with zeroes."
msgstr ""
@@ -5268,8 +6705,10 @@ msgstr ""
msgid ""
"Prior to release 0.9.8, all routers used the short exponent.\n"
"As of release 0.9.8, 64-bit x86 routers use a full 2048-bit exponent.\n"
-"Other routers continue to use the short exponent due to concerns about processor load.\n"
-"The transition to a longer exponent for these platforms is a topic for further study."
+"Other routers continue to use the short exponent due to concerns about "
+"processor load.\n"
+"The transition to a longer exponent for these platforms is a topic for "
+"further study."
msgstr ""
#: i2p2www/pages/site/docs/how/cryptography.html:176
@@ -5281,7 +6720,8 @@ msgstr ""
#: i2p2www/pages/site/docs/how/cryptography.html:177
msgid ""
-"The vulnerability of the network to an ElGamal attack and the impact of transitioning to a longer bit length is to be studied.\n"
+"The vulnerability of the network to an ElGamal attack and the impact of "
+"transitioning to a longer bit length is to be studied.\n"
"It may be quite difficult to make any change backward-compatible."
msgstr ""
@@ -5303,24 +6743,30 @@ msgstr ""
#: i2p2www/pages/site/docs/how/cryptography.html:204
#, python-format
msgid ""
-"For encryption of periodic tunnel test"
-" messages sent from the router to itself, through its own tunnels."
+"For encryption of periodic tunnel "
+"test messages sent from the router to itself, through its own "
+"tunnels."
msgstr ""
#: i2p2www/pages/site/docs/how/cryptography.html:209
#, python-format
msgid ""
"We use AES with 256 bit keys and 128 bit blocks in CBC mode.\n"
-"The padding used is specified in IETF RFC-2313 (PKCS#5 1.5, section 8.1 (for block type 02)).\n"
-"In this case, padding exists of pseudorandomly generated octets to match 16 byte blocks.\n"
-"Specifically, see [the CBC code] and the Cryptix AES\n"
-"[implementation], as well as the padding, found in the\n"
+"The padding used is specified in IETF RFC-2313 "
+"(PKCS#5 1.5, section 8.1 (for block type 02)).\n"
+"In this case, padding exists of pseudorandomly generated octets to match "
+"16 byte blocks.\n"
+"Specifically, see [the CBC code] and the "
+"Cryptix AES\n"
+"[implementation], as well as the padding, found"
+" in the\n"
"ElGamalAESEngine.getPadding function."
msgstr ""
#: i2p2www/pages/site/docs/how/cryptography.html:274
msgid ""
-"The vulnerability of the network to an AES attack and the impact of transitioning to a longer bit length is to be studied.\n"
+"The vulnerability of the network to an AES attack and the impact of "
+"transitioning to a longer bit length is to be studied.\n"
"It may be quite difficult to make any change backward-compatible."
msgstr ""
@@ -5350,7 +6796,8 @@ msgstr ""
#: i2p2www/pages/site/docs/how/cryptography.html:295
#, python-format
msgid ""
-"Signatures are generated and verified with 1024 bit DSA (L=1024, N=160), as implemented in\n"
+"Signatures are generated and verified with 1024 bit DSA (L=1024, N=160), "
+"as implemented in\n"
"[DSAEngine].\n"
"DSA was chosen because it is much faster for signatures than ElGamal."
msgstr ""
@@ -5358,8 +6805,10 @@ msgstr ""
#: i2p2www/pages/site/docs/how/cryptography.html:350
#, python-format
msgid ""
-"The Signing Public Key is 1024 bits.\n"
-"The Signing Private Key is 160 bits."
+"The Signing Public"
+" Key is 1024 bits.\n"
+"The Signing "
+"Private Key is 160 bits."
msgstr ""
#: i2p2www/pages/site/docs/how/cryptography.html:357
@@ -5367,15 +6816,18 @@ msgstr ""
msgid ""
"NIST 800-57\n"
"recommends a minimum of (L=2048, N=224) for usage beyond 2010.\n"
-"This may be mitigated somewhat by the \"cryptoperiod\", or lifespan of a given key."
+"This may be mitigated somewhat by the \"cryptoperiod\", or lifespan of a "
+"given key."
msgstr ""
#: i2p2www/pages/site/docs/how/cryptography.html:363
msgid ""
"The prime number was chosen in 2003,\n"
-"and the person that chose the number (TheCrypto) is currently no longer an I2P developer.\n"
+"and the person that chose the number (TheCrypto) is currently no longer "
+"an I2P developer.\n"
"As such, we do not know if the prime chosen is a 'strong prime'.\n"
-"If a larger prime is chosen for future purposes, this should be a strong prime, and we will document the construction process."
+"If a larger prime is chosen for future purposes, this should be a strong "
+"prime, and we will document the construction process."
msgstr ""
#: i2p2www/pages/site/docs/how/cryptography.html:374
@@ -5394,10 +6846,14 @@ msgstr ""
#: i2p2www/pages/site/docs/how/cryptography.html:386
msgid ""
-"As of release 0.9.12, the router supports additional signature algorithms that are more secure than 1024-bit DSA.\n"
-"The first usage is for Destinations; support for Router Identities was added in release 0.9.16.\n"
-"Support for migrating existing Destinations from old to new signatures will be added in a future release.\n"
-"Signature type is encoded in the Destination and Router Identity, so that new signature algorithms\n"
+"As of release 0.9.12, the router supports additional signature algorithms"
+" that are more secure than 1024-bit DSA.\n"
+"The first usage is for Destinations; support for Router Identities was "
+"added in release 0.9.16.\n"
+"Support for migrating existing Destinations from old to new signatures "
+"will be added in a future release.\n"
+"Signature type is encoded in the Destination and Router Identity, so that"
+" new signature algorithms\n"
"or curves may be added at any time.\n"
"The current supported signature types are as follows:"
msgstr ""
@@ -5405,24 +6861,30 @@ msgstr ""
#: i2p2www/pages/site/docs/how/cryptography.html:407
msgid ""
"ECDSA uses the standard NIST curves and standard SHA-2 hashes.\n"
-"We will migrate new destinations to ECDSA-SHA256-P256 in the 0.9.16 - 0.9.19 release time frame.\n"
-"Usage for Router Identities is supported as of release 0.9.16 and migration may occur in early 2015."
+"We will migrate new destinations to ECDSA-SHA256-P256 in the 0.9.16 - "
+"0.9.19 release time frame.\n"
+"Usage for Router Identities is supported as of release 0.9.16 and "
+"migration may occur in early 2015."
msgstr ""
#: i2p2www/pages/site/docs/how/cryptography.html:416
msgid ""
"Standard RSA with the public exponent F4 = 65537.\n"
-"RSA is now used for signing all out-of-band trusted content, including router updates, reseeding, plugins, and news.\n"
-"The signatures are embedded in the \"su3\" format documented on the router updates page.\n"
+"RSA is now used for signing all out-of-band trusted content, including "
+"router updates, reseeding, plugins, and news.\n"
+"The signatures are embedded in the \"su3\" format documented on the "
+"router updates page.\n"
"4096-bit keys are recommended and used by all known signers.\n"
-"RSA is not used, or planned for use, in any in-network Destinations or Router Identities."
+"RSA is not used, or planned for use, in any in-network Destinations or "
+"Router Identities."
msgstr ""
#: i2p2www/pages/site/docs/how/cryptography.html:427
msgid ""
"Standard EdDSA using curve 25519 and standard 512-bit SHA-2 hashes.\n"
"Supported as of release 0.9.15.\n"
-"Migration for Destinations and Router Identities is scheduled for mid-2015."
+"Migration for Destinations and Router Identities is scheduled for "
+"mid-2015."
msgstr ""
#: i2p2www/pages/site/docs/how/cryptography.html:437
@@ -5434,7 +6896,8 @@ msgstr ""
#: i2p2www/pages/site/docs/how/cryptography.html:443
msgid ""
-"The vulnerability of the network to a SHA-256 attack and the impact of transitioning to a longer hash is to be studied.\n"
+"The vulnerability of the network to a SHA-256 attack and the impact of "
+"transitioning to a longer hash is to be studied.\n"
"It may be quite difficult to make any change backward-compatible."
msgstr ""
@@ -5445,13 +6908,16 @@ msgstr "Transports"
#: i2p2www/pages/site/docs/how/cryptography.html:455
msgid ""
"At the lowest protocol layer,\n"
-"point-to-point inter-router communication is protected by the transport layer security.\n"
+"point-to-point inter-router communication is protected by the transport "
+"layer security.\n"
"Both transports use 256 byte (2048 bit) Diffie-Hellman key exchange\n"
"using\n"
-"the same shared prime and generator as specified above for ElGamal,\n"
+"the same shared prime and generator as specified "
+"above for ElGamal,\n"
"followed by symmetric AES encryption as described above.\n"
"This provides\n"
-"perfect forward secrecy\n"
+"perfect "
+"forward secrecy\n"
"on the transport links."
msgstr ""
@@ -5462,17 +6928,24 @@ msgstr ""
#: i2p2www/pages/site/docs/how/cryptography.html:469
#, python-format
msgid ""
-"NTCP connections are negotiated with a 2048 Diffie-Hellman implementation,\n"
-"using the router's identity to proceed with a station to station agreement, followed by\n"
-"some encrypted protocol specific fields, with all subsequent data encrypted with AES\n"
+"NTCP connections are negotiated with a 2048 Diffie-Hellman "
+"implementation,\n"
+"using the router's identity to proceed with a station to station "
+"agreement, followed by\n"
+"some encrypted protocol specific fields, with all subsequent data "
+"encrypted with AES\n"
"(as above).\n"
-"The primary reason to do the DH negotiation instead of using ElGamalAES+SessionTag is that it provides '(perfect) forward secrecy', while ElGamalAES+SessionTag does not."
+"The primary reason to do the DH negotiation instead of using ElGamalAES+SessionTag is that it provides '(perfect) "
+"forward secrecy', while ElGamalAES+SessionTag does not."
msgstr ""
#: i2p2www/pages/site/docs/how/cryptography.html:477
msgid ""
-"In order to migrate to a more standardized implementation (TLS/SSL or even "
-"SSH), the following issues must be addressed:"
+"In order to migrate to a more standardized implementation (TLS/SSL or "
+"even SSH), the following issues must be addressed:"
msgstr ""
#: i2p2www/pages/site/docs/how/cryptography.html:481
@@ -5483,7 +6956,8 @@ msgstr ""
#: i2p2www/pages/site/docs/how/cryptography.html:484
msgid ""
-"Can we simplify/avoid the x509 or other certificate formats and use our own RouterInfo structure (which \n"
+"Can we simplify/avoid the x509 or other certificate formats and use our "
+"own RouterInfo structure (which \n"
"contains the ElGamal and DSA keys)?"
msgstr ""
@@ -5498,10 +6972,14 @@ msgstr "Connections UDP"
#: i2p2www/pages/site/docs/how/cryptography.html:494
msgid ""
-"SSU (the UDP transport) encrypts each packet with AES256/CBC with both an explicit IV and MAC \n"
-"(HMAC-MD5-128) after agreeing upon an ephemeral session key through a 2048 bit \n"
-"Diffie-Hellman exchange, station-to-station authentication with the other \n"
-"router's DSA key, plus each network message has their own hash for local integrity \n"
+"SSU (the UDP transport) encrypts each packet with AES256/CBC with both an"
+" explicit IV and MAC \n"
+"(HMAC-MD5-128) after agreeing upon an ephemeral session key through a "
+"2048 bit \n"
+"Diffie-Hellman exchange, station-to-station authentication with the other"
+" \n"
+"router's DSA key, plus each network message has their own hash for local "
+"integrity \n"
"checking."
msgstr ""
@@ -5514,8 +6992,10 @@ msgstr "Voyez la spécification SSU pour des détai
#, python-format
msgid ""
"WARNING - I2P's HMAC-MD5-128 used in SSU is apparently non-standard.\n"
-"Apparently, an early version of SSU used HMAC-SHA256, and then it was switched\n"
-"to MD5-128 for performance reasons, but left the 32-byte buffer size intact.\n"
+"Apparently, an early version of SSU used HMAC-SHA256, and then it was "
+"switched\n"
+"to MD5-128 for performance reasons, but left the 32-byte buffer size "
+"intact.\n"
"See HMACGenerator.java and\n"
"the 2005-07-05 status notes\n"
"for details."
@@ -5536,58 +7016,91 @@ msgstr ""
#: i2p2www/pages/site/docs/how/elgamal-aes.html:11
msgid ""
-"As an unreliable, unordered, message based system, I2P uses a simple combination \n"
-"of asymmetric and symmetric encryption algorithms to provide data confidentiality \n"
-"and integrity to garlic messages. As a whole, the combination is referred \n"
-"to as ElGamal/AES+SessionTags, but that is an excessively verbose way to describe \n"
+"As an unreliable, unordered, message based system, I2P uses a simple "
+"combination \n"
+"of asymmetric and symmetric encryption algorithms to provide data "
+"confidentiality \n"
+"and integrity to garlic messages. As a whole, the combination is referred"
+" \n"
+"to as ElGamal/AES+SessionTags, but that is an excessively verbose way to "
+"describe \n"
"the use of 2048bit ElGamal, AES256, SHA256, and 32 byte nonces."
msgstr ""
#: i2p2www/pages/site/docs/how/elgamal-aes.html:19
#: i2p2www/pages/site/docs/how/tech-intro.html:512
msgid ""
-"The first time a router wants to encrypt a garlic message to another router, \n"
-"they encrypt the keying material for an AES256 session key with ElGamal and \n"
-"append the AES256/CBC encrypted payload after that encrypted ElGamal block. \n"
-"In addition to the encrypted payload, the AES encrypted section contains the \n"
-"payload length, the SHA256 hash of the unencrypted payload, as well as a number \n"
-"of \"session tags\" - random 32 byte nonces. The next time the sender wants \n"
-"to encrypt a garlic message to another router, rather than ElGamal encrypt \n"
-"a new session key they simply pick one of the previously delivered session \n"
-"tags and AES encrypt the payload like before, using the session key used with \n"
-"that session tag, prepended with the session tag itself. When a router receives \n"
-"a garlic encrypted message, they check the first 32 bytes to see if it matches \n"
-"an available session tag - if it does, they simply AES decrypt the message, \n"
+"The first time a router wants to encrypt a garlic message to another "
+"router, \n"
+"they encrypt the keying material for an AES256 session key with ElGamal "
+"and \n"
+"append the AES256/CBC encrypted payload after that encrypted ElGamal "
+"block. \n"
+"In addition to the encrypted payload, the AES encrypted section contains "
+"the \n"
+"payload length, the SHA256 hash of the unencrypted payload, as well as a "
+"number \n"
+"of \"session tags\" - random 32 byte nonces. The next time the sender "
+"wants \n"
+"to encrypt a garlic message to another router, rather than ElGamal "
+"encrypt \n"
+"a new session key they simply pick one of the previously delivered "
+"session \n"
+"tags and AES encrypt the payload like before, using the session key used "
+"with \n"
+"that session tag, prepended with the session tag itself. When a router "
+"receives \n"
+"a garlic encrypted message, they check the first 32 bytes to see if it "
+"matches \n"
+"an available session tag - if it does, they simply AES decrypt the "
+"message, \n"
"but if it does not, they ElGamal decrypt the first block."
msgstr ""
#: i2p2www/pages/site/docs/how/elgamal-aes.html:35
#: i2p2www/pages/site/docs/how/tech-intro.html:528
msgid ""
-"Each session tag can be used only once so as to prevent internal adversaries \n"
-"from unnecessarily correlating different messages as being between the same \n"
-"routers. The sender of an ElGamal/AES+SessionTag encrypted message chooses \n"
-"when and how many tags to deliver, prestocking the recipient with enough tags \n"
-"to cover a volley of messages. Garlic messages may detect the successful tag \n"
-"delivery by bundling a small additional message as a clove (a \"delivery status \n"
-"message\") - when the garlic message arrives at the intended recipient and \n"
-"is decrypted successfully, this small delivery status message is one of the \n"
-"cloves exposed and has instructions for the recipient to send the clove back \n"
-"to the original sender (through an inbound tunnel, of course). When the original \n"
-"sender receives this delivery status message, they know that the session tags \n"
+"Each session tag can be used only once so as to prevent internal "
+"adversaries \n"
+"from unnecessarily correlating different messages as being between the "
+"same \n"
+"routers. The sender of an ElGamal/AES+SessionTag encrypted message "
+"chooses \n"
+"when and how many tags to deliver, prestocking the recipient with enough "
+"tags \n"
+"to cover a volley of messages. Garlic messages may detect the successful "
+"tag \n"
+"delivery by bundling a small additional message as a clove (a \"delivery "
+"status \n"
+"message\") - when the garlic message arrives at the intended recipient "
+"and \n"
+"is decrypted successfully, this small delivery status message is one of "
+"the \n"
+"cloves exposed and has instructions for the recipient to send the clove "
+"back \n"
+"to the original sender (through an inbound tunnel, of course). When the "
+"original \n"
+"sender receives this delivery status message, they know that the session "
+"tags \n"
"bundled in the garlic message were successfully delivered."
msgstr ""
#: i2p2www/pages/site/docs/how/elgamal-aes.html:50
msgid ""
"Session tags themselves have a short lifetime, after which they are \n"
-"discarded if not used. In addition, the quantity stored for each key is limited, \n"
-"as are the number of keys themselves - if too many arrive, either new or old \n"
-"messages may be dropped. The sender keeps track whether messages using session \n"
-"tags are getting through, and if there isn't sufficient communication it may \n"
-"drop the ones previously assumed to be properly delivered, reverting back \n"
+"discarded if not used. In addition, the quantity stored for each key is "
+"limited, \n"
+"as are the number of keys themselves - if too many arrive, either new or "
+"old \n"
+"messages may be dropped. The sender keeps track whether messages using "
+"session \n"
+"tags are getting through, and if there isn't sufficient communication it "
+"may \n"
+"drop the ones previously assumed to be properly delivered, reverting back"
+" \n"
"to the full expensive ElGamal encryption.\n"
-"A session will continue to exist until all its tags are exhausted or expire."
+"A session will continue to exist until all its tags are exhausted or "
+"expire."
msgstr ""
#: i2p2www/pages/site/docs/how/elgamal-aes.html:61
@@ -5602,7 +7115,8 @@ msgid ""
"between a Router and a Destination.\n"
"Each Router and Destination maintains its own Session Key Manager to\n"
"keep track of Session Keys and Session Tags.\n"
-"Separate Session Key Managers prevents correlation of multiple Destinations\n"
+"Separate Session Key Managers prevents correlation of multiple "
+"Destinations\n"
"to each other or a Router by adversaries."
msgstr ""
@@ -5614,26 +7128,38 @@ msgstr ""
msgid ""
"Each message received has one of two\n"
"the two possible conditions:"
-msgstr "Chaque message reçu a une des deux\ndes deux conditions possibles :"
+msgstr ""
+"Chaque message reçu a une des deux\n"
+"des deux conditions possibles :"
#: i2p2www/pages/site/docs/how/elgamal-aes.html:84
msgid ""
"It is part of an existing session and contains a Session Tag and an AES "
"encrypted block"
-msgstr "Il fait partie d'une session existante et contient une étiquette de session et un bloc AES crypté"
+msgstr ""
+"Il fait partie d'une session existante et contient une étiquette de "
+"session et un bloc AES crypté"
#: i2p2www/pages/site/docs/how/elgamal-aes.html:85
-msgid ""
-"It is for a new session and contains both ElGamal and AES encrypted blocks"
-msgstr "Il est pour une nouvelle session et contient à la fois des blocs cryptés en ElGamal et en AES"
+msgid "It is for a new session and contains both ElGamal and AES encrypted blocks"
+msgstr ""
+"Il est pour une nouvelle session et contient à la fois des blocs cryptés "
+"en ElGamal et en AES"
#: i2p2www/pages/site/docs/how/elgamal-aes.html:88
msgid ""
"When a router receives a message, it will first assume it is from\n"
-"an existing session and attempt to look up the Session Tag and decrypt the following data using AES.\n"
+"an existing session and attempt to look up the Session Tag and decrypt "
+"the following data using AES.\n"
"If that fails, it will assume it is for a new session and attempt to\n"
"decrypt it using ElGamal."
-msgstr "Quand un routeur reçoit un message, il supposera d'abord qu'il est issu\nd'une session existante et tentera de chercher l'étiquette de session et décrypter les données suivantes utilisant AES.\nSi cela échoue, il supposera qu'il est pour une nouvelle session et tentera de\nle décrypter en utilisant ElGamal."
+msgstr ""
+"Quand un routeur reçoit un message, il supposera d'abord qu'il est issu\n"
+"d'une session existante et tentera de chercher l'étiquette de session et "
+"décrypter les données suivantes utilisant AES.\n"
+"Si cela échoue, il supposera qu'il est pour une nouvelle session et "
+"tentera de\n"
+"le décrypter en utilisant ElGamal."
#: i2p2www/pages/site/docs/how/elgamal-aes.html:97
msgid "New Session Message Specification"
@@ -5641,9 +7167,13 @@ msgstr ""
#: i2p2www/pages/site/docs/how/elgamal-aes.html:98
msgid ""
-"A New Session ElGamal Message contains two parts, an encrypted ElGamal block\n"
+"A New Session ElGamal Message contains two parts, an encrypted ElGamal "
+"block\n"
"and an encrypted AES block."
-msgstr "Un message de nouvelle session ElGamal contient deux parties, un bloc chiffré en ElGamal\net un bloc chiffré en AES."
+msgstr ""
+"Un message de nouvelle session ElGamal contient deux parties, un bloc "
+"chiffré en ElGamal\n"
+"et un bloc chiffré en AES."
#: i2p2www/pages/site/docs/how/elgamal-aes.html:103
msgid "The encrypted message contains:"
@@ -5667,9 +7197,17 @@ msgid ""
"The 32-byte\n"
"Session Key\n"
"is the identifier for the session.\n"
-"The 32-byte Pre-IV will be used to generate the IV for the AES block that follows;\n"
+"The 32-byte Pre-IV will be used to generate the IV for the AES block that"
+" follows;\n"
"the IV is the first 16 bytes of the SHA-256 Hash of the Pre-IV."
-msgstr "La\nclé de session de 32-octets\nest l'identifiant pour la session.\nLes 32 octets Pre-IV seront utilisés pour produire les IV du bloc d'AES qui suit;\nles IV sont les 16 premiers octets du hash SHA-256 du Pre-IV."
+msgstr ""
+"La\n"
+"clé de session de "
+"32-octets\n"
+"est l'identifiant pour la session.\n"
+"Les 32 octets Pre-IV seront utilisés pour produire les IV du bloc d'AES "
+"qui suit;\n"
+"les IV sont les 16 premiers octets du hash SHA-256 du Pre-IV."
#: i2p2www/pages/site/docs/how/elgamal-aes.html:172
#, python-format
@@ -5678,7 +7216,11 @@ msgid ""
"using ElGamal\n"
"and the encrypted block is 514 bytes long.\n"
""
-msgstr "La charge utile de 222 octets est chiffrée\nen utilisant ElGamal\net le bloc chiffrée a 514 octets de long.\n"
+msgstr ""
+"La charge utile de 222 octets est chiffrée\n"
+"en utilisant ElGamal\n"
+"et le bloc chiffrée a 514 octets de long.\n"
+""
#: i2p2www/pages/site/docs/how/elgamal-aes.html:179
msgid "AES Block"
@@ -5686,7 +7228,9 @@ msgstr "Bloc AES"
#: i2p2www/pages/site/docs/how/elgamal-aes.html:180
msgid "The unencrypted data in the AES block contains the following:"
-msgstr "Les données non chiffrées dans le bloc en AES contiennent les choses suivantes :"
+msgstr ""
+"Les données non chiffrées dans le bloc en AES contiennent les choses "
+"suivantes :"
#: i2p2www/pages/site/docs/how/elgamal-aes.html:224
#, python-format
@@ -5696,9 +7240,11 @@ msgstr "2-octets Entier, 0-200
#: i2p2www/pages/site/docs/how/elgamal-aes.html:228
#, python-format
msgid ""
-"That many 32-byte Session "
-"Tags"
-msgstr "Ces nombreux 32 octets étiquettes de session"
+"That many 32-byte Session Tags"
+msgstr ""
+"Ces nombreux 32 octets étiquettes de session"
#: i2p2www/pages/site/docs/how/elgamal-aes.html:232
#, python-format
@@ -5708,19 +7254,25 @@ msgstr "4-octet Entier"
#: i2p2www/pages/site/docs/how/elgamal-aes.html:236
#, python-format
msgid ""
-"The 32-byte SHA256 Hash of "
-"the payload"
-msgstr "Les 32-octets Hash SHA256 de la charge utile"
+"The 32-byte SHA256 Hash of"
+" the payload"
+msgstr ""
+"Les 32-octets Hash "
+"SHA256 de la charge utile"
#: i2p2www/pages/site/docs/how/elgamal-aes.html:240
msgid "A one-byte value. Normally == 0. If == 0x01, a Session Key follows"
-msgstr "Une valeur d'un octet. Normalement == 0. Si == 0x01, une clé de session suit"
+msgstr ""
+"Une valeur d'un octet. Normalement == 0. Si == 0x01, une clé de session "
+"suit"
#: i2p2www/pages/site/docs/how/elgamal-aes.html:244
#, python-format
msgid ""
-"A 32-byte Session Key,\n"
-" to replace the old key, and is only present if preceding flag is 0x01"
+"A 32-byte Session "
+"Key,\n"
+" to replace the old key, and is only present if preceding"
+" flag is 0x01"
msgstr ""
#: i2p2www/pages/site/docs/how/elgamal-aes.html:249
@@ -5731,7 +7283,10 @@ msgstr "la donnée"
msgid ""
"Random data to a multiple of 16 bytes for the total length.\n"
" May contain more than the minimum required padding."
-msgstr "Données aléatoires vers un multiple de 16 octets pour la longueur totale.\nPeut contenir davantage que le padding minimum exigé."
+msgstr ""
+"Données aléatoires vers un multiple de 16 octets pour la longueur totale."
+"\n"
+"Peut contenir davantage que le padding minimum exigé."
#: i2p2www/pages/site/docs/how/elgamal-aes.html:256
msgid "Minimum length: 48 bytes"
@@ -5741,21 +7296,34 @@ msgstr "Longueur minimale : 48 octets"
#, python-format
msgid ""
"The data is then AES Encrypted,\n"
-"using the session key and IV (calculated from the pre-IV) from the ElGamal section.\n"
-"The encrypted AES Block length is variable but is always a multiple of 16 bytes.\n"
+"using the session key and IV (calculated from the pre-IV) from the "
+"ElGamal section.\n"
+"The encrypted AES Block length is variable but is always a multiple of 16"
+" bytes.\n"
+""
+msgstr ""
+"La donnée est ensuite alors chiffrée en AES "
+"Encrypted,\n"
+"en utilisant la session indexe et l'IV (calculée à partir de la Pre-IV) "
+"depuis la section ElGamal.\n"
+"La longueur du bloc chiffré en AES est variable, mais est toujours une "
+"multiple de 16 octets.\n"
""
-msgstr "La donnée est ensuite alors chiffrée en AES Encrypted,\nen utilisant la session indexe et l'IV (calculée à partir de la Pre-IV) depuis la section ElGamal.\nLa longueur du bloc chiffré en AES est variable, mais est toujours une multiple de 16 octets.\n"
#: i2p2www/pages/site/docs/how/elgamal-aes.html:269
#, python-format
msgid ""
-"Actual max payload length, and max block length, is less than 64 KB; see the"
-" I2NP Overview."
-msgstr "La longueur de charge utile actuelle, et la longueur de bloc max, sont de moins de 64 KO; voir la vue d'ensemble d'I2NP."
+"Actual max payload length, and max block length, is less than 64 KB; see "
+"the I2NP Overview."
+msgstr ""
+"La longueur de charge utile actuelle, et la longueur de bloc max, sont de"
+" moins de 64 KO; voir la vue d'ensemble d'I2NP."
#: i2p2www/pages/site/docs/how/elgamal-aes.html:272
msgid "New Session Key is currently unused and is never present."
-msgstr "La clé de nouvelle session est actuellement inutilisée et n'est jamais présente."
+msgstr ""
+"La clé de nouvelle session est actuellement inutilisée et n'est jamais "
+"présente."
#: i2p2www/pages/site/docs/how/elgamal-aes.html:277
msgid "Existing Session Message Specification"
@@ -5779,7 +7347,8 @@ msgstr ""
#: i2p2www/pages/site/docs/how/elgamal-aes.html:309
#, python-format
msgid ""
-"A 32-byte Session Tag\n"
+"A 32-byte Session "
+"Tag\n"
" previously delivered in an AES block"
msgstr ""
@@ -5790,14 +7359,18 @@ msgstr ""
#: i2p2www/pages/site/docs/how/elgamal-aes.html:318
msgid ""
"The session tag also serves as\n"
-"the pre-IV. The IV is the first 16 bytes of the SHA-256 Hash of the sessionTag."
+"the pre-IV. The IV is the first 16 bytes of the SHA-256 Hash of the "
+"sessionTag."
msgstr ""
#: i2p2www/pages/site/docs/how/elgamal-aes.html:323
msgid ""
-"To decode a message from an existing session, a router looks up the Session Tag to find an\n"
-"associated Session Key. If the Session Tag is found, the AES block is decrypted using the associated Session Key.\n"
-"If the tag is not found, the message is assumed to be a New Session Message."
+"To decode a message from an existing session, a router looks up the "
+"Session Tag to find an\n"
+"associated Session Key. If the Session Tag is found, the AES block is "
+"decrypted using the associated Session Key.\n"
+"If the tag is not found, the message is assumed to be a New Session Message."
msgstr ""
#: i2p2www/pages/site/docs/how/elgamal-aes.html:331
@@ -5807,30 +7380,38 @@ msgstr ""
#: i2p2www/pages/site/docs/how/elgamal-aes.html:332
#, python-format
msgid ""
-"As of release 0.9.2, the client may configure the default number of Session Tags to send\n"
+"As of release 0.9.2, the client may configure the default number of "
+"Session Tags to send\n"
"and the low tag threshold for the current session.\n"
-"For brief streaming connections or datagrams, these options may be used to significantly reduce bandwidth.\n"
-"See the I2CP options specification for details.\n"
+"For brief streaming connections or datagrams, these options may be used "
+"to significantly reduce bandwidth.\n"
+"See the I2CP options specification for "
+"details.\n"
"The session settings may also be overridden on a per-message basis.\n"
-"See the I2CP Send Message Expires specification for details."
+"See the I2CP Send Message"
+" Expires specification for details."
msgstr ""
#: i2p2www/pages/site/docs/how/elgamal-aes.html:345
msgid ""
-"There are many possible areas to tune the Session Key Manager's algorithms;\n"
-"some may interact with the streaming library behavior, or have significant\n"
+"There are many possible areas to tune the Session Key Manager's "
+"algorithms;\n"
+"some may interact with the streaming library behavior, or have "
+"significant\n"
"impact on overall performance."
msgstr ""
#: i2p2www/pages/site/docs/how/elgamal-aes.html:352
msgid ""
-"The number of tags delivered could depend on message size, keeping in mind\n"
+"The number of tags delivered could depend on message size, keeping in "
+"mind\n"
"the eventual padding to 1KB at the tunnel message layer."
msgstr ""
#: i2p2www/pages/site/docs/how/elgamal-aes.html:357
msgid ""
-"Clients could send an estimate of session lifetime to the router, as an advisory\n"
+"Clients could send an estimate of session lifetime to the router, as an "
+"advisory\n"
"on the number of tags required."
msgstr ""
@@ -5842,13 +7423,15 @@ msgstr ""
#: i2p2www/pages/site/docs/how/elgamal-aes.html:366
msgid ""
-"The router may assume delivery of Session Tags, or await acknowledgement before using them;\n"
+"The router may assume delivery of Session Tags, or await acknowledgement "
+"before using them;\n"
"there are tradeoffs for each strategy."
msgstr ""
#: i2p2www/pages/site/docs/how/elgamal-aes.html:371
msgid ""
-"For very brief messages, almost the full 222 bytes of the pre-IV and padding fields in the ElGamal block\n"
+"For very brief messages, almost the full 222 bytes of the pre-IV and "
+"padding fields in the ElGamal block\n"
"could be used for the entire message, instead of establishing a session."
msgstr ""
@@ -5860,8 +7443,10 @@ msgstr ""
#: i2p2www/pages/site/docs/how/elgamal-aes.html:381
msgid ""
-"Perhaps things could be more efficient if the Session Tag system was bidirectional,\n"
-"so tags delivered in the 'forward' path could be used in the 'reverse' path,\n"
+"Perhaps things could be more efficient if the Session Tag system was "
+"bidirectional,\n"
+"so tags delivered in the 'forward' path could be used in the 'reverse' "
+"path,\n"
"thus avoiding ElGamal in the initial response.\n"
"The router currently plays some tricks like this when sending\n"
"tunnel test messages to itself."
@@ -5881,7 +7466,8 @@ msgid ""
"set a flag in the\n"
"Delivery Instructions,\n"
"or set a magic number in the first few bytes of the Session Key field\n"
-"and accept a small risk of the random Session Key matching the magic number."
+"and accept a small risk of the random Session Key matching the magic "
+"number."
msgstr ""
#: i2p2www/pages/site/docs/how/garlic-routing.html:2
@@ -5894,26 +7480,36 @@ msgstr "Cheminement en Ail et terminologie \"Ail\""
#: i2p2www/pages/site/docs/how/garlic-routing.html:7
msgid ""
-"The terms \"garlic routing\" and \"garlic encryption\" are often used rather loosely when referring to I2P's technology.\n"
+"The terms \"garlic routing\" and \"garlic encryption\" are often used "
+"rather loosely when referring to I2P's technology.\n"
"Here, we explain the history of the terms, the various meanings, and\n"
"the usage of \"garlic\" methods in I2P."
-msgstr "Les termes \"routage en ail\" et \"chiffrement en ail\" sont souvent utilisés plutôt lâchement quand renvoyant à la technologie I2P's.\nIci, nous expliquons l'histoire des termes, les significations diverses et\nl'utilisation des méthodes \"ail\" dans I2P."
+msgstr ""
+"Les termes \"routage en ail\" et \"chiffrement en ail\" sont souvent "
+"utilisés plutôt lâchement quand renvoyant à la technologie I2P's.\n"
+"Ici, nous expliquons l'histoire des termes, les significations diverses "
+"et\n"
+"l'utilisation des méthodes \"ail\" dans I2P."
#: i2p2www/pages/site/docs/how/garlic-routing.html:13
msgid ""
"\"Garlic routing\" was first coined by\n"
"Michael J. Freedman\n"
"in Roger Dingledine's Free Haven \n"
-"Master's thesis Section 8.1.1 (June 2000), as derived from \n"
+"Master's thesis "
+"Section 8.1.1 (June 2000), as derived from \n"
"Onion Routing."
msgstr ""
#: i2p2www/pages/site/docs/how/garlic-routing.html:21
msgid ""
-"\"Garlic\" may have been used originally by I2P developers because I2P implements a form of\n"
-"bundling as Freedman describes, or simply to emphasize general differences from Tor.\n"
+"\"Garlic\" may have been used originally by I2P developers because I2P "
+"implements a form of\n"
+"bundling as Freedman describes, or simply to emphasize general "
+"differences from Tor.\n"
"The specific reasoning may be lost to history.\n"
-"Generally, when referring to I2P, the term \"garlic\" may mean one of three things:"
+"Generally, when referring to I2P, the term \"garlic\" may mean one of "
+"three things:"
msgstr ""
#: i2p2www/pages/site/docs/how/garlic-routing.html:28
@@ -5932,39 +7528,54 @@ msgstr ""
#: i2p2www/pages/site/docs/how/garlic-routing.html:33
msgid ""
-"Unfortunately, I2P's usage of \"garlic\" terminology over the past seven years has not always been precise; therefore the reader is\n"
+"Unfortunately, I2P's usage of \"garlic\" terminology over the past seven "
+"years has not always been precise; therefore the reader is\n"
"cautioned when encountering the term.\n"
"Hopefully, the explanation below will make things clear."
msgstr ""
#: i2p2www/pages/site/docs/how/garlic-routing.html:40
msgid ""
-"Onion routing is a technique for building paths, or tunnels, through a series of peers,\n"
+"Onion routing is a technique for building paths, or tunnels, through a "
+"series of peers,\n"
"and then using that tunnel.\n"
-"Messages are repeatedly encrypted by the originator, and then decrypted by each hop.\n"
-"During the building phase, only the routing instructions for the next hop are exposed to each peer.\n"
-"During the operating phase, messages are passed through the tunnel, and the\n"
-"message and its routing instructions are only exposed to the endpoint of the tunnel."
+"Messages are repeatedly encrypted by the originator, and then decrypted "
+"by each hop.\n"
+"During the building phase, only the routing instructions for the next hop"
+" are exposed to each peer.\n"
+"During the operating phase, messages are passed through the tunnel, and "
+"the\n"
+"message and its routing instructions are only exposed to the endpoint of "
+"the tunnel."
msgstr ""
#: i2p2www/pages/site/docs/how/garlic-routing.html:49
#, python-format
msgid ""
"This is similar to the way Mixmaster\n"
-"(see network comparisons) sends messages - taking a message, encrypting it\n"
-"to the recipient's public key, taking that encrypted message and encrypting\n"
-"it (along with instructions specifying the next hop), and then taking that\n"
-"resulting encrypted message and so on, until it has one layer of encryption\n"
+"(see network comparisons) sends messages "
+"- taking a message, encrypting it\n"
+"to the recipient's public key, taking that encrypted message and "
+"encrypting\n"
+"it (along with instructions specifying the next hop), and then taking "
+"that\n"
+"resulting encrypted message and so on, until it has one layer of "
+"encryption\n"
"per hop along the path."
msgstr ""
#: i2p2www/pages/site/docs/how/garlic-routing.html:58
msgid ""
-"In this sense, \"garlic routing\" as a general concept is identical to \"onion routing\".\n"
-"As implemented in I2P, of course, there are several differences from the implementation in Tor; see below.\n"
-"Even so, there are substantial similarities such that I2P benefits from a\n"
-"large amount of academic research on onion routing,\n"
-"Tor, and similar mixnets."
+"In this sense, \"garlic routing\" as a general concept is identical to "
+"\"onion routing\".\n"
+"As implemented in I2P, of course, there are several differences from the "
+"implementation in Tor; see below.\n"
+"Even so, there are substantial similarities such that I2P benefits from a"
+"\n"
+"large amount of"
+" academic research on onion routing,\n"
+"Tor, and similar "
+"mixnets."
msgstr ""
#: i2p2www/pages/site/docs/how/garlic-routing.html:67
@@ -5973,12 +7584,15 @@ msgstr ""
#: i2p2www/pages/site/docs/how/garlic-routing.html:68
msgid ""
-"Michael Freedman defined \"garlic routing\" as an extension to onion routing,\n"
+"Michael Freedman defined \"garlic routing\" as an extension to onion "
+"routing,\n"
"in which multiple messages are bundled together.\n"
"He called each message a \"bulb\".\n"
-"All the messages, each with its own delivery instructions, are exposed at the\n"
+"All the messages, each with its own delivery instructions, are exposed at"
+" the\n"
"endpoint.\n"
-"This allows the efficient bundling of an onion routing \"reply block\" with the original message."
+"This allows the efficient bundling of an onion routing \"reply block\" "
+"with the original message."
msgstr ""
#: i2p2www/pages/site/docs/how/garlic-routing.html:77
@@ -5987,8 +7601,10 @@ msgid ""
"Our term for garlic \"bulbs\" is \"cloves\".\n"
"Any number of messages can be\n"
"contained, instead of just a single message.\n"
-"This is a significant distinction from the onion routing implemented in Tor.\n"
-"However, it is only one of many major architectural differences between I2P and Tor;\n"
+"This is a significant distinction from the onion routing implemented in "
+"Tor.\n"
+"However, it is only one of many major architectural differences between "
+"I2P and Tor;\n"
"perhaps it is not, by itself, enough to justify a change in terminology."
msgstr ""
@@ -5996,8 +7612,10 @@ msgstr ""
msgid ""
"Another difference\n"
"from the method described by Freedman\n"
-"is that the path is unidirectional - there is no \"turning point\" as seen in onion routing\n"
-"or mixmaster reply blocks, which greatly simplifies the algorithm and allows for more flexible\n"
+"is that the path is unidirectional - there is no \"turning point\" as "
+"seen in onion routing\n"
+"or mixmaster reply blocks, which greatly simplifies the algorithm and "
+"allows for more flexible\n"
"and reliable delivery."
msgstr ""
@@ -6031,14 +7649,16 @@ msgstr ""
#: i2p2www/pages/site/docs/how/garlic-routing.html:113
msgid ""
-"For publishing some network database entries (dampening the probability of a"
-" successful traffic analysis attack) (ElGamal/AES)"
+"For publishing some network database entries (dampening the probability "
+"of a successful traffic analysis attack) (ElGamal/AES)"
msgstr ""
#: i2p2www/pages/site/docs/how/garlic-routing.html:116
msgid ""
-"There are also significant ways that this technique can be used to improve the performance of the network, \n"
-"exploiting transport latency/throughput tradeoffs, and branching data through redundant paths to increase reliability."
+"There are also significant ways that this technique can be used to "
+"improve the performance of the network, \n"
+"exploiting transport latency/throughput tradeoffs, and branching data "
+"through redundant paths to increase reliability."
msgstr ""
#: i2p2www/pages/site/docs/how/garlic-routing.html:122
@@ -6049,7 +7669,8 @@ msgstr ""
msgid ""
"In I2P, tunnels are unidirectional. Each party builds two tunnels,\n"
"one for outbound and one for inbound traffic.\n"
-"Therefore, four tunnels are required for a single round-trip message and reply."
+"Therefore, four tunnels are required for a single round-trip message and "
+"reply."
msgstr ""
#: i2p2www/pages/site/docs/how/garlic-routing.html:129
@@ -6069,10 +7690,12 @@ msgstr ""
msgid ""
"Tunnels are a general-purpose mechanism to transport all\n"
"I2NP messages, and\n"
-"Garlic Messages are not used to build tunnels.\n"
+"Garlic Messages are not used to "
+"build tunnels.\n"
"We do not bundle multiple\n"
"I2NP messages into a single\n"
-"Garlic Message for unwrapping at the outbound tunnel endpoint;\n"
+"Garlic Message for unwrapping at "
+"the outbound tunnel endpoint;\n"
"the tunnel encryption is sufficient."
msgstr ""
@@ -6086,7 +7709,8 @@ msgid ""
"At the layer above tunnels, I2P delivers end-to-end messages between\n"
"Destinations.\n"
"Just as within a single tunnel, we use\n"
-"ElGamal/AES+SessionTag for the encryption.\n"
+"ElGamal/AES+SessionTag for the encryption."
+"\n"
"Each client message as delivered to the router through the\n"
"I2CP interface becomes a single\n"
"Garlic Clove\n"
@@ -6115,12 +7739,16 @@ msgid ""
"Delivery Status Message,\n"
"with\n"
"Delivery Instructions\n"
-"specifying that it be sent back to the originating router as an acknowledgment.\n"
+"specifying that it be sent back to the originating router as an "
+"acknowledgment.\n"
"This is similar to the \"reply block\" or \"reply onion\"\n"
"described in the references.\n"
-"It is used for determining the success or failure of end to end message delivery.\n"
-"The originating router may, upon failure to receive the Delivery Status Message\n"
-"within the expected time period, modify the routing to the far-end Destination,\n"
+"It is used for determining the success or failure of end to end message "
+"delivery.\n"
+"The originating router may, upon failure to receive the Delivery Status "
+"Message\n"
+"within the expected time period, modify the routing to the far-end "
+"Destination,\n"
"or take other actions."
msgstr ""
@@ -6134,10 +7762,13 @@ msgid ""
"for the originating Destination, with\n"
"Delivery Instructions\n"
"specifying the far-end destination's router.\n"
-"By periodically bundling a LeaseSet, the router ensures that the far-end will be able\n"
+"By periodically bundling a LeaseSet, the router ensures that the far-end "
+"will be able\n"
"to maintain communications.\n"
-"Otherwise the far-end would have to query a floodfill router for the network database entry,\n"
-"and all LeaseSets would have to be published to the network database, as explained on the\n"
+"Otherwise the far-end would have to query a floodfill router for the "
+"network database entry,\n"
+"and all LeaseSets would have to be published to the network database, as "
+"explained on the\n"
"network database page."
msgstr ""
@@ -6147,24 +7778,31 @@ msgid ""
"By default, the Delivery Status and Database Store Messages\n"
"are bundled when the local LeaseSet changes, when additional\n"
"Session Tags\n"
-"are delivered, or if the messages have not been bundled in the previous minute.\n"
-"As of release 0.9.2, the client may configure the default number of Session Tags to send\n"
+"are delivered, or if the messages have not been bundled in the previous "
+"minute.\n"
+"As of release 0.9.2, the client may configure the default number of "
+"Session Tags to send\n"
"and the low tag threshold for the current session.\n"
-"See the I2CP options specification for details.\n"
+"See the I2CP options specification for "
+"details.\n"
"The session settings may also be overridden on a per-message basis.\n"
-"See the I2CP Send Message Expires specification for details."
+"See the I2CP Send Message"
+" Expires specification for details."
msgstr ""
#: i2p2www/pages/site/docs/how/garlic-routing.html:227
msgid ""
-"Obviously, the additional messages are currently bundled for specific purposes,\n"
+"Obviously, the additional messages are currently bundled for specific "
+"purposes,\n"
"and not part of a general-purpose routing scheme."
msgstr ""
#: i2p2www/pages/site/docs/how/garlic-routing.html:232
msgid ""
-"As of release 0.9.12, the Delivery Status Message is wrapped in another Garlic Message\n"
-"by the originator so that the contents are encrypted and not visible to routers on the return path."
+"As of release 0.9.12, the Delivery Status Message is wrapped in another "
+"Garlic Message\n"
+"by the originator so that the contents are encrypted and not visible to "
+"routers on the return path."
msgstr ""
#: i2p2www/pages/site/docs/how/garlic-routing.html:238
@@ -6188,26 +7826,34 @@ msgstr ""
#: i2p2www/pages/site/docs/how/garlic-routing.html:255
#, python-format
msgid ""
-"The Garlic Message mechanism is very flexible and provides a structure for\n"
+"The Garlic Message mechanism is very flexible and provides a structure "
+"for\n"
"implementing many types of mixnet delivery methods.\n"
"Together with the unused delay option in the\n"
-"tunnel message Delivery Instructions,\n"
-"a wide spectrum of batching, delay, mixing, and routing strategies are possible."
+"tunnel message Delivery "
+"Instructions,\n"
+"a wide spectrum of batching, delay, mixing, and routing strategies are "
+"possible."
msgstr ""
#: i2p2www/pages/site/docs/how/garlic-routing.html:263
msgid ""
-"In particular, there is potential for much more flexibility at the outbound tunnel endpoint.\n"
+"In particular, there is potential for much more flexibility at the "
+"outbound tunnel endpoint.\n"
"Messages could possibly be routed from there to one of several tunnels\n"
-"(thus minimizing point-to-point connections), or multicast to several tunnels\n"
+"(thus minimizing point-to-point connections), or multicast to several "
+"tunnels\n"
"for redundancy, or streaming audio and video."
msgstr ""
#: i2p2www/pages/site/docs/how/garlic-routing.html:270
msgid ""
-"Such experiments may conflict with the need to ensure security and anonymity, such\n"
-"as limiting certain routing paths, restricting the types of I2NP messages that may\n"
-"be forwarded along various paths, and enforcing certain message expiration times."
+"Such experiments may conflict with the need to ensure security and "
+"anonymity, such\n"
+"as limiting certain routing paths, restricting the types of I2NP messages"
+" that may\n"
+"be forwarded along various paths, and enforcing certain message "
+"expiration times."
msgstr ""
#: i2p2www/pages/site/docs/how/garlic-routing.html:276
@@ -6216,9 +7862,11 @@ msgid ""
"As a part of\n"
"ElGamal/AES encryption,\n"
"a garlic message contains a sender\n"
-"specified amount of padding data, allowing the sender to take active countermeasures \n"
+"specified amount of padding data, allowing the sender to take active "
+"countermeasures \n"
"against traffic analysis.\n"
-"This is not currently used, beyond the requirement to pad to a multiple of 16 bytes."
+"This is not currently used, beyond the requirement to pad to a multiple "
+"of 16 bytes."
msgstr ""
#: i2p2www/pages/site/docs/how/garlic-routing.html:285
@@ -6230,8 +7878,10 @@ msgstr ""
#: i2p2www/pages/site/docs/how/garlic-routing.html:295
msgid ""
-"The term garlic routing was first coined in Roger Dingledine's Free Haven \n"
-"Master's thesis (June 2000),\n"
+"The term garlic routing was first coined in Roger Dingledine's Free Haven"
+" \n"
+"Master's thesis "
+"(June 2000),\n"
"see Section 8.1.1 authored by\n"
"Michael J. Freedman."
msgstr ""
@@ -6261,7 +7911,8 @@ msgstr ""
#: i2p2www/pages/site/docs/how/garlic-routing.html:316
msgid ""
-"Onion routing was first described in Hiding Routing Information\n"
+"Onion routing was first described in Hiding Routing Information\n"
"by David M. Goldschlag, Michael G. Reed, and Paul F. Syverson in 1996."
msgstr ""
@@ -6271,53 +7922,145 @@ msgstr "Une présentation allégée du fonctionnement d'I2P"
#: i2p2www/pages/site/docs/how/intro.html:4
msgid ""
-"I2P is a project to build, deploy, and maintain a network supporting secure and anonymous\n"
-"communication. People using I2P are in control of the tradeoffs between anonymity, reliability,\n"
-"bandwidth usage, and latency. There is no central point in the network on which pressure can be\n"
-"exerted to compromise the integrity, security, or anonymity of the system. The network supports\n"
-"dynamic reconfiguration in response to various attacks, and has been designed to make use of\n"
-"additional resources as they become available. Of course, all aspects of the network are open and\n"
+"I2P is a project to build, deploy, and maintain a network supporting "
+"secure and anonymous\n"
+"communication. People using I2P are in control of the tradeoffs between "
+"anonymity, reliability,\n"
+"bandwidth usage, and latency. There is no central point in the network on"
+" which pressure can be\n"
+"exerted to compromise the integrity, security, or anonymity of the "
+"system. The network supports\n"
+"dynamic reconfiguration in response to various attacks, and has been "
+"designed to make use of\n"
+"additional resources as they become available. Of course, all aspects of "
+"the network are open and\n"
"freely available."
-msgstr "I2P est un projet dont le but est de construire, déployer, et maintenir un réseau fournissant\ndes communications sécurisées et anonymes.\nLes gens utilisant I2P ont le contrôle de l'arbitrage entre l'anonymat, la fiabilité,\nl'utilisation de la bande passante, et la latence. Il n'y a dans ce réseau, pas de centre sur lequel pourrait\nêtre exercée une pression en vue de compromettre l'intégrité, la sécurité, ou l'anonymat du système.\nLe réseau intègre sa propre reconfiguration dynamique en réponse aux diverses attaques,\net a été conçu pour utiliser de nouvelles ressources au fur et à mesure de leur disponibilité.\nBien entendu, tous les aspects du réseau sont publics et disponibles gratuitement."
+msgstr ""
+"I2P est un projet dont le but est de construire, déployer, et maintenir "
+"un réseau fournissant\n"
+"des communications sécurisées et anonymes.\n"
+"Les gens utilisant I2P ont le contrôle de l'arbitrage entre l'anonymat, "
+"la fiabilité,\n"
+"l'utilisation de la bande passante, et la latence. Il n'y a dans ce "
+"réseau, pas de centre sur lequel pourrait\n"
+"être exercée une pression en vue de compromettre l'intégrité, la "
+"sécurité, ou l'anonymat du système.\n"
+"Le réseau intègre sa propre reconfiguration dynamique en réponse aux "
+"diverses attaques,\n"
+"et a été conçu pour utiliser de nouvelles ressources au fur et à mesure "
+"de leur disponibilité.\n"
+"Bien entendu, tous les aspects du réseau sont publics et disponibles "
+"gratuitement."
#: i2p2www/pages/site/docs/how/intro.html:14
msgid ""
-"Unlike many other anonymizing networks, I2P doesn't try to provide anonymity by hiding the\n"
-"originator of some communication and not the recipient, or the other way around. I2P is designed to\n"
-"allow peers using I2P to communicate with each other anonymously — both sender and recipient\n"
-"are unidentifiable to each other as well as to third parties. For example, today there are both\n"
-"in-I2P web sites (allowing anonymous publishing / hosting) as well as HTTP proxies to the normal web\n"
-"(allowing anonymous web browsing). Having the ability to run servers within I2P is essential, as it\n"
-"is quite likely that any outbound proxies to the normal Internet will be monitored, disabled, or\n"
+"Unlike many other anonymizing networks, I2P doesn't try to provide "
+"anonymity by hiding the\n"
+"originator of some communication and not the recipient, or the other way "
+"around. I2P is designed to\n"
+"allow peers using I2P to communicate with each other anonymously — "
+"both sender and recipient\n"
+"are unidentifiable to each other as well as to third parties. For "
+"example, today there are both\n"
+"in-I2P web sites (allowing anonymous publishing / hosting) as well as "
+"HTTP proxies to the normal web\n"
+"(allowing anonymous web browsing). Having the ability to run servers "
+"within I2P is essential, as it\n"
+"is quite likely that any outbound proxies to the normal Internet will be "
+"monitored, disabled, or\n"
"even taken over to attempt more malicious attacks."
-msgstr "Contrairement à de nombreux autres réseaux anonymisants, I2P ne tente pas de procurer l'anonymat en masquant\nl'initiateur d'une communication et pas le destinataire, ou le contraire. I2P est conçu pour permettre\naux pairs l'utilisant de communiquer anonymement — à la fois l'émetteur et le récepteur sont non-identifiables à l'un par l'autre comme par un tiers. Par exemple, il y a aujourd'hui des sites web intra-I2P\n(permettant la publication / hébergement anonyme) tout comme des serveurs proxy HTTP vers le web normal\n(permettant la navigation anonyme). La possibilité d'avoir des serveurs dans I2P est essentielle,\ncar il est plus que certain que n'importe quel proxy sortant vers l'Internet sera surveillé, désactivé,\nou même piraté pour tenter des attaques encore plus pernicieuses."
+msgstr ""
+"Contrairement à de nombreux autres réseaux anonymisants, I2P ne tente pas"
+" de procurer l'anonymat en masquant\n"
+"l'initiateur d'une communication et pas le destinataire, ou le contraire."
+" I2P est conçu pour permettre\n"
+"aux pairs l'utilisant de communiquer anonymement — à la fois "
+"l'émetteur et le récepteur sont non-identifiables à l'un par l'autre "
+"comme par un tiers. Par exemple, il y a aujourd'hui des sites web intra-"
+"I2P\n"
+"(permettant la publication / hébergement anonyme) tout comme des serveurs"
+" proxy HTTP vers le web normal\n"
+"(permettant la navigation anonyme). La possibilité d'avoir des serveurs "
+"dans I2P est essentielle,\n"
+"car il est plus que certain que n'importe quel proxy sortant vers "
+"l'Internet sera surveillé, désactivé,\n"
+"ou même piraté pour tenter des attaques encore plus pernicieuses."
#: i2p2www/pages/site/docs/how/intro.html:25
#, python-format
msgid ""
-"The network itself is message oriented - it is essentially a secure and anonymous IP layer, where\n"
-"messages are addressed to cryptographic keys (Destinations) and can be significantly larger than IP\n"
-"packets. Some example uses of the network include \"eepsites\" (webservers hosting normal web\n"
-"applications within I2P), a BitTorrent client (\"I2PSnark\"), or a distributed data store. With the\n"
-"help of the I2PTunnel application, we are able to stream traditional\n"
-"TCP/IP applications over I2P, such as SSH, IRC, a squid proxy, and even streaming audio. Most people\n"
-"will not use I2P directly, or even need to know they're using it. Instead their view will be of one\n"
-"of the I2P enabled applications, or perhaps as a little controller app to turn on and off various\n"
+"The network itself is message oriented - it is essentially a secure and "
+"anonymous IP layer, where\n"
+"messages are addressed to cryptographic keys (Destinations) and can be "
+"significantly larger than IP\n"
+"packets. Some example uses of the network include \"eepsites\" "
+"(webservers hosting normal web\n"
+"applications within I2P), a BitTorrent client (\"I2PSnark\"), or a "
+"distributed data store. With the\n"
+"help of the I2PTunnel application, we are "
+"able to stream traditional\n"
+"TCP/IP applications over I2P, such as SSH, IRC, a squid proxy, and even "
+"streaming audio. Most people\n"
+"will not use I2P directly, or even need to know they're using it. Instead"
+" their view will be of one\n"
+"of the I2P enabled applications, or perhaps as a little controller app to"
+" turn on and off various\n"
"proxies to enable the anonymizing functionality."
-msgstr "Le réseau lui-même est \"orienté messages\" : il est principalement constitué d'une couche IP sécurisée\net anonyme, dans laquelle les messages sont adressés à des clés cryptographiques (Destinations) et\npeuvent être sensiblement plus gros que des paquets IP. Comme exemples d'utilisation du réseau\ncitons les \"eepsites\" (serveurs web hébergeant des applications Internet normales au sein d'I2P), un\nclient BitTorrent (\"I2PSnark\"), ou un système de stockage distribué. Grâce à l'application\nI2PTunnel, nous pouvons utiliser des applications TCP/IP traditionnelles\nsur I2P, telles que SSH, IRC, un proxy squid, et même du flux audio. La plupart des gens n'utilisent pas\nI2P directement, ou ne ressentent même pas le besoin de savoir qu'ils l'utilisent. Au lieu de ça ils verront\nune des application compatibles avec I2P, ou peut-être une petite application de contrôle qui va activer\nou désactiver divers proxies pour piloter la fonctionnalité d'anonymisation."
+msgstr ""
+"Le réseau lui-même est \"orienté messages\" : il est principalement "
+"constitué d'une couche IP sécurisée\n"
+"et anonyme, dans laquelle les messages sont adressés à des clés "
+"cryptographiques (Destinations) et\n"
+"peuvent être sensiblement plus gros que des paquets IP. Comme exemples "
+"d'utilisation du réseau\n"
+"citons les \"eepsites\" (serveurs web hébergeant des applications "
+"Internet normales au sein d'I2P), un\n"
+"client BitTorrent (\"I2PSnark\"), ou un système de stockage distribué. "
+"Grâce à l'application\n"
+"I2PTunnel, nous pouvons utiliser des "
+"applications TCP/IP traditionnelles\n"
+"sur I2P, telles que SSH, IRC, un proxy squid, et même du flux audio. La "
+"plupart des gens n'utilisent pas\n"
+"I2P directement, ou ne ressentent même pas le besoin de savoir qu'ils "
+"l'utilisent. Au lieu de ça ils verront\n"
+"une des application compatibles avec I2P, ou peut-être une petite "
+"application de contrôle qui va activer\n"
+"ou désactiver divers proxies pour piloter la fonctionnalité "
+"d'anonymisation."
#: i2p2www/pages/site/docs/how/intro.html:37
#, python-format
msgid ""
-"An essential part of designing, developing, and testing an anonymizing network is to define the threat model, since there is no such thing as \"true\" anonymity, just\n"
-"increasingly expensive costs to identify someone. Briefly, I2P's intent is to allow people to\n"
-"communicate in arbitrarily hostile environments by providing good anonymity, mixed in with\n"
-"sufficient cover traffic provided by the activity of people who require less anonymity. This way,\n"
-"some users can avoid detection by a very powerful adversary, while others will try to evade a weaker\n"
-"entity, all on the same network, where each one's messages are essentially indistinguishable\n"
+"An essential part of designing, developing, and testing an anonymizing "
+"network is to define the threat model, since there is no such thing "
+"as \"true\" anonymity, just\n"
+"increasingly expensive costs to identify someone. Briefly, I2P's intent "
+"is to allow people to\n"
+"communicate in arbitrarily hostile environments by providing good "
+"anonymity, mixed in with\n"
+"sufficient cover traffic provided by the activity of people who require "
+"less anonymity. This way,\n"
+"some users can avoid detection by a very powerful adversary, while others"
+" will try to evade a weaker\n"
+"entity, all on the same network, where each one's messages are "
+"essentially indistinguishable\n"
"from the others."
-msgstr "Un des points clés de la conception, du développement, et du test d'un réseau anonyme est la définition de son\nmodèle de sécurité, car il n'existe nulle part un \"vrai\" anonymat, mais uniquement\ndes moyens d'augmenter les coûts d'identification de quelqu'un. Succinctement, le but d'I2P est de permettre de\ncommuniquer dans des environnements hostiles en procurant un bon anonymat, mélangé à un trafic de camouflage\nsuffisant fourni par l'activité de ceux qui ont besoin de moins d'anonymat, de sorte que certains utilisateurs puissent\nse soustraire à la détection par un adversaire très puissant, quand d'autres pourront esquiver une entité plus faible,\ntout ceci sur le même réseau dans lequel les messages des uns sont fondamentalement indistinguables de ceux des autres."
+msgstr ""
+"Un des points clés de la conception, du développement, et du test d'un "
+"réseau anonyme est la définition de son\n"
+"modèle de sécurité, car il n'existe nulle"
+" part un \"vrai\" anonymat, mais uniquement\n"
+"des moyens d'augmenter les coûts d'identification de quelqu'un. "
+"Succinctement, le but d'I2P est de permettre de\n"
+"communiquer dans des environnements hostiles en procurant un bon "
+"anonymat, mélangé à un trafic de camouflage\n"
+"suffisant fourni par l'activité de ceux qui ont besoin de moins "
+"d'anonymat, de sorte que certains utilisateurs puissent\n"
+"se soustraire à la détection par un adversaire très puissant, quand "
+"d'autres pourront esquiver une entité plus faible,\n"
+"tout ceci sur le même réseau dans lequel les messages des uns sont"
+" fondamentalement indistinguables de ceux des autres."
#: i2p2www/pages/site/docs/how/intro.html:48
msgid "Why?"
@@ -6326,11 +8069,22 @@ msgstr "Pourquoi?"
#: i2p2www/pages/site/docs/how/intro.html:49
#, python-format
msgid ""
-"There are a multitude of reasons why we need a system to support anonymous communication, and\n"
-"everyone has their own personal rationale. There are many other\n"
-"efforts working on finding ways to provide varying degrees of anonymity to people through the\n"
+"There are a multitude of reasons why we need a system to support "
+"anonymous communication, and\n"
+"everyone has their own personal rationale. There are many other\n"
+"efforts working on finding ways to provide varying degrees of "
+"anonymity to people through the\n"
"Internet, but we could not find any that met our needs or threat model."
-msgstr "Il y a une multitude de raisons pour lesquelles nous avons besoin d'un système pour soutenir la communication anonyme, et chacun a son propre raisonnement personnel. Il y a beaucoup d'autres\nefforts travaillant à découvrir des façons de fournir des degrés variables d'anonymat aux gens à travers\nl'Internet, mais nous n'avons pu en trouver aucun qui réponde à nos besoins ou à notre modèle de menace."
+msgstr ""
+"Il y a une multitude de raisons pour lesquelles nous avons besoin d'un "
+"système pour soutenir la communication anonyme, et chacun a son propre "
+"raisonnement personnel. Il y a beaucoup d'autres\n"
+"efforts travaillant à découvrir des façons de fournir des degrés "
+"variables d'anonymat aux gens à travers\n"
+"l'Internet, mais nous n'avons pu en trouver aucun qui réponde à nos "
+"besoins ou à notre modèle de menace."
#: i2p2www/pages/site/docs/how/intro.html:56
msgid "How?"
@@ -6339,16 +8093,45 @@ msgstr "Comment?"
#: i2p2www/pages/site/docs/how/intro.html:58
#, python-format
msgid ""
-"The network at a glance is made up of a set of nodes (\"routers\") with a number of unidirectional\n"
-"inbound and outbound virtual paths (\"tunnels\", as outlined on the tunnel routing page). Each router is identified by a cryptographic RouterIdentity which is\n"
-"typically long lived. These routers communicate with each other through existing transport\n"
-"mechanisms (TCP, UDP, etc), passing various messages. Client applications have their own\n"
-"cryptographic identifier (\"Destination\") which enables it to send and receive messages. These\n"
-"clients can connect to any router and authorize the temporary allocation (\"lease\") of some tunnels\n"
-"that will be used for sending and receiving messages through the network. I2P has its own internal\n"
-"network database (using a modification of the Kademlia algorithm) for\n"
+"The network at a glance is made up of a set of nodes (\"routers\") with a"
+" number of unidirectional\n"
+"inbound and outbound virtual paths (\"tunnels\", as outlined on the tunnel routing page). Each router is "
+"identified by a cryptographic RouterIdentity which is\n"
+"typically long lived. These routers communicate with each other through "
+"existing transport\n"
+"mechanisms (TCP, UDP, etc), passing various messages. Client applications"
+" have their own\n"
+"cryptographic identifier (\"Destination\") which enables it to send and "
+"receive messages. These\n"
+"clients can connect to any router and authorize the temporary allocation "
+"(\"lease\") of some tunnels\n"
+"that will be used for sending and receiving messages through the network."
+" I2P has its own internal\n"
+"network database (using a modification of the "
+"Kademlia algorithm) for\n"
"distributing routing and contact information securely."
-msgstr "Au premier coup d'oeil le réseau est constitué d'un tas de noeuds (\"routeurs\") dotés d'un certain nombre\nde chemins virtuels entrants et sortants unidirectionnels (appelés \"tunnels\", expliqués sur la page\nroutage en tunnel). Chaque routeur est identifié par l'identifiant\ncryptographique \"RouterIdentity\", typiquement à longue durée de vie. Ces routeurs communiquent\npar des mécanismes existants (TCP, UDP, etc). Les applications clientes ont leur propre identifiant\ncryptographique (\"Destination\") qui leur permet d'envoyer et de recevoir des messages. Ces clients peuvent\nse connecter à n'importe quel routeur et autoriser l'allocation temporaire (\"lease\") de quelques tunnels\nqui seront utilisés pour l'envoi et la réception à travers le réseau. I2P dispose de sa propre\nbase de donnée réseau interne (utilisant une modification de l'algorithme Kademlia)\npour une distribution sécurisée des informations de routage et de contacts."
+msgstr ""
+"Au premier coup d'oeil le réseau est constitué d'un tas de noeuds "
+"(\"routeurs\") dotés d'un certain nombre\n"
+"de chemins virtuels entrants et sortants unidirectionnels (appelés "
+"\"tunnels\", expliqués sur la page\n"
+"routage en tunnel). Chaque routeur est "
+"identifié par l'identifiant\n"
+"cryptographique \"RouterIdentity\", typiquement à longue durée de vie. "
+"Ces routeurs communiquent\n"
+"par des mécanismes existants (TCP, UDP, etc). Les applications clientes "
+"ont leur propre identifiant\n"
+"cryptographique (\"Destination\") qui leur permet d'envoyer et de "
+"recevoir des messages. Ces clients peuvent\n"
+"se connecter à n'importe quel routeur et autoriser l'allocation "
+"temporaire (\"lease\") de quelques tunnels\n"
+"qui seront utilisés pour l'envoi et la réception à travers le réseau. I2P"
+" dispose de sa propre\n"
+"base de donnée réseau interne (utilisant une "
+"modification de l'algorithme Kademlia)\n"
+"pour une distribution sécurisée des informations de routage et de "
+"contacts."
#: i2p2www/pages/site/docs/how/intro.html:71
msgid "Network topology example"
@@ -6356,64 +8139,157 @@ msgstr "Exemple de topologie du réseau"
#: i2p2www/pages/site/docs/how/intro.html:73
msgid ""
-"In the above, Alice, Bob, Charlie, and Dave are all running routers with a single Destination on\n"
-"their local router. They each have a pair of 2-hop inbound tunnels per destination (labeled 1, 2, 3,\n"
-"4, 5 and 6), and a small subset of each of those router's outbound tunnel pool is shown with 2-hop\n"
-"outbound tunnels. For simplicity, Charlie's inbound tunnels and Dave's outbound tunnels are not\n"
-"shown, nor are the rest of each router's outbound tunnel pool (typically stocked with a few tunnels\n"
-"at a time). When Alice and Bob talk to each other, Alice sends a message out one of her (pink)\n"
-"outbound tunnels targeting one of Bob's (green) inbound tunnels (tunnel 3 or 4). She knows to send\n"
-"to those tunnels on the correct router by querying the network database, which is constantly updated\n"
+"In the above, Alice, Bob, Charlie, and Dave are all running routers with "
+"a single Destination on\n"
+"their local router. They each have a pair of 2-hop inbound tunnels per "
+"destination (labeled 1, 2, 3,\n"
+"4, 5 and 6), and a small subset of each of those router's outbound tunnel"
+" pool is shown with 2-hop\n"
+"outbound tunnels. For simplicity, Charlie's inbound tunnels and Dave's "
+"outbound tunnels are not\n"
+"shown, nor are the rest of each router's outbound tunnel pool (typically "
+"stocked with a few tunnels\n"
+"at a time). When Alice and Bob talk to each other, Alice sends a message "
+"out one of her (pink)\n"
+"outbound tunnels targeting one of Bob's (green) inbound tunnels (tunnel 3"
+" or 4). She knows to send\n"
+"to those tunnels on the correct router by querying the network database, "
+"which is constantly updated\n"
"as new leases are authorized and old ones expire."
-msgstr "Ci-dessus, Alice, Bob, Charlie, et Dave ont tous leur routeur, avec une seule Destination locale.\nIls ont chacun une paire de tunnels entrants ayant deux sauts par destination (repérés 1, 2, 3, 4, 5 et 6),\net une petite partie des tunnels sortants de chacun de ces routeurs est montré avec des tunnels sortants ayant deux sauts.\nPour simplifier, ne sont représentés ni les tunnels entrants de Charlie et les tunnels sortants de Dave,\nni le reste du groupe de tunnels sortants de chaque routeur (fourni par défaut avec quelques tunnels).\nQuand Alice et Bob discutent ensemble, Alice envoie un message vers un de ses tunnels sortants (en rose)\navec pour cible un des tunnels entrants de Bob (3 ou 4, en vert). Elle sait qu'elle doit envoyer vers ces tunnels\nsur le bon routeur en interrogeant la base de donnée du réseau qui est actualisée en permanence\nau fur et à mesure que les nouveaux baux sont autorisés et que les anciens expirent."
+msgstr ""
+"Ci-dessus, Alice, Bob, Charlie, et Dave ont tous leur routeur, avec une "
+"seule Destination locale.\n"
+"Ils ont chacun une paire de tunnels entrants ayant deux sauts par "
+"destination (repérés 1, 2, 3, 4, 5 et 6),\n"
+"et une petite partie des tunnels sortants de chacun de ces routeurs est "
+"montré avec des tunnels sortants ayant deux sauts.\n"
+"Pour simplifier, ne sont représentés ni les tunnels entrants de Charlie "
+"et les tunnels sortants de Dave,\n"
+"ni le reste du groupe de tunnels sortants de chaque routeur (fourni par "
+"défaut avec quelques tunnels).\n"
+"Quand Alice et Bob discutent ensemble, Alice envoie un message vers un de"
+" ses tunnels sortants (en rose)\n"
+"avec pour cible un des tunnels entrants de Bob (3 ou 4, en vert). Elle "
+"sait qu'elle doit envoyer vers ces tunnels\n"
+"sur le bon routeur en interrogeant la base de donnée du réseau qui est "
+"actualisée en permanence\n"
+"au fur et à mesure que les nouveaux baux sont autorisés et que les "
+"anciens expirent."
#: i2p2www/pages/site/docs/how/intro.html:85
#, python-format
msgid ""
-"If Bob wants to reply to Alice, he simply goes through the same process - send a message out one of\n"
-"his outbound tunnels targeting one of Alice's inbound tunnels (tunnel 1 or 2). To make things\n"
-"easier, most messages sent between Alice and Bob are garlic\n"
-"wrapped, bundling the sender's own current lease information so that the recipient can reply\n"
-"immediately without having to look in the network database for the current data."
-msgstr "Si Bob veut répondre à Alice, il utilise simplement la même procédure : envoyer un message via un de ses\ntunnels sortants en ciblant un des tunnels entrants d'Alice (tunnel 1 ou 2). Pour rendre les choses plus faciles,\nla plupart des messages circulant entre Alice et Bob sont empaquetés en oignon,\nembarquant les informations sur le bail actuel de l'expéditeur, de sorte que le destinataire puisse répondre\nimmédiatement sans avoir à interroger la base de données."
+"If Bob wants to reply to Alice, he simply goes through the same process -"
+" send a message out one of\n"
+"his outbound tunnels targeting one of Alice's inbound tunnels (tunnel 1 "
+"or 2). To make things\n"
+"easier, most messages sent between Alice and Bob are garlic\n"
+"wrapped, bundling the sender's own current lease information so that the "
+"recipient can reply\n"
+"immediately without having to look in the network database for the "
+"current data."
+msgstr ""
+"Si Bob veut répondre à Alice, il utilise simplement la même procédure : "
+"envoyer un message via un de ses\n"
+"tunnels sortants en ciblant un des tunnels entrants d'Alice (tunnel 1 ou "
+"2). Pour rendre les choses plus faciles,\n"
+"la plupart des messages circulant entre Alice et Bob sont empaquetés en "
+"oignon,\n"
+"embarquant les informations sur le bail actuel de l'expéditeur, de sorte "
+"que le destinataire puisse répondre\n"
+"immédiatement sans avoir à interroger la base de données."
#: i2p2www/pages/site/docs/how/intro.html:93
#, python-format
msgid ""
-"To deal with a wide range of attacks, I2P is fully distributed with no centralized resources - and\n"
-"hence there are no directory servers keeping statistics regarding the performance and reliability of\n"
-"routers within the network. As such, each router must keep and maintain profiles of various routers\n"
-"and is responsible for selecting appropriate peers to meet the anonymity, performance, and\n"
-"reliability needs of the users, as described in the peer selection\n"
+"To deal with a wide range of attacks, I2P is fully distributed with no "
+"centralized resources - and\n"
+"hence there are no directory servers keeping statistics regarding the "
+"performance and reliability of\n"
+"routers within the network. As such, each router must keep and maintain "
+"profiles of various routers\n"
+"and is responsible for selecting appropriate peers to meet the anonymity,"
+" performance, and\n"
+"reliability needs of the users, as described in the peer selection\n"
"page."
-msgstr "Pour gérer une grande gamme d'attaques, I2P est entièrement décentralisé et en conséquence\nil n'y a pas de serveur d'annuaire conservant des statistiques de performances et de fiabilité Donc chaque routeur doit garder et entretenir les profils de divers routeurs\net est responsable de la sélection de pairs appropriés aux besoins d'anonymat, de performance et de fiabilité\ndes utilisateurs, comme expliqué sur la page sélection de pairs."
+msgstr ""
+"Pour gérer une grande gamme d'attaques, I2P est entièrement "
+"décentralisé et en conséquence\n"
+"il n'y a pas de serveur d'annuaire conservant des statistiques de "
+"performances et de fiabilité Donc chaque routeur doit garder et "
+"entretenir les profils de divers routeurs\n"
+"et est responsable de la sélection de pairs appropriés aux besoins "
+"d'anonymat, de performance et de fiabilité\n"
+"des utilisateurs, comme expliqué sur la page sélection de pairs."
#: i2p2www/pages/site/docs/how/intro.html:102
#, python-format
msgid ""
-"The network itself makes use of a significant number of cryptographic\n"
-"techniques and algorithms - a full laundry list includes 2048bit ElGamal encryption, 256bit AES\n"
-"in CBC mode with PKCS#5 padding, 1024bit DSA signatures, SHA256 hashes, 2048bit Diffie-Hellman\n"
-"negotiated connections with station to station authentication, and ElGamal / AES+SessionTag."
-msgstr "Le réseau fait usage d'un nombre significatif de techniques et algorithmes\ncryptographiques : la liste complète est constituée des cryptages ElGamal 2048bits, AES 256bits\nen mode CBC avec bourrage PKCS#5, des signatures DSA à 1024bits, des hachages SHA256, de\nl'authentification de connexions station à station négociée en Diffie-Hellman 2048bit, et\nElGamal / AES+SessionTag."
+"The network itself makes use of a significant number of cryptographic\n"
+"techniques and algorithms - a full laundry list includes 2048bit "
+"ElGamal encryption, 256bit AES\n"
+"in CBC mode with PKCS#5 padding, 1024bit DSA signatures, SHA256 hashes, "
+"2048bit Diffie-Hellman\n"
+"negotiated connections with station to station authentication, and ElGamal / AES+SessionTag."
+msgstr ""
+"Le réseau fait usage d'un nombre significatif de techniques et algorithmes\n"
+"cryptographiques : la liste complète est constituée des cryptages "
+"ElGamal 2048bits, AES 256bits\n"
+"en mode CBC avec bourrage PKCS#5, des signatures DSA à 1024bits, des "
+"hachages SHA256, de\n"
+"l'authentification de connexions station à station négociée en Diffie-"
+"Hellman 2048bit, et\n"
+"ElGamal / AES+SessionTag."
#: i2p2www/pages/site/docs/how/intro.html:110
msgid ""
-"Content sent over I2P is encrypted through three layers garlic encryption (used to verify the\n"
-"delivery of the message to the recipient), tunnel encryption (all messages passing through a tunnel\n"
-"is encrypted by the tunnel gateway to the tunnel endpoint), and inter router transport layer\n"
+"Content sent over I2P is encrypted through three layers garlic encryption"
+" (used to verify the\n"
+"delivery of the message to the recipient), tunnel encryption (all "
+"messages passing through a tunnel\n"
+"is encrypted by the tunnel gateway to the tunnel endpoint), and inter "
+"router transport layer\n"
"encryption (e.g. the TCP transport uses AES256 with ephemeral keys)."
-msgstr "Les contenus envoyés sur I2P sont chiffrés à travers trois couches de chiffrement en oignon (utilisées pour vérifier la réception du message par le destinataire), par le chiffrement de tunnel (tous les messages\ntraversant un tunnel sont chiffrés par la passerelle du tunnel jusqu'au point de sortie du tunnel),\net par un chiffrement de la couche de transport inter routeurs (p.e. le transport TCP utilise des clés AES256 éphémères)."
+msgstr ""
+"Les contenus envoyés sur I2P sont chiffrés à travers trois couches de "
+"chiffrement en oignon (utilisées pour vérifier la réception du message "
+"par le destinataire), par le chiffrement de tunnel (tous les messages\n"
+"traversant un tunnel sont chiffrés par la passerelle du tunnel jusqu'au "
+"point de sortie du tunnel),\n"
+"et par un chiffrement de la couche de transport inter routeurs (p.e. le "
+"transport TCP utilise des clés AES256 éphémères)."
#: i2p2www/pages/site/docs/how/intro.html:117
msgid ""
-"End-to-end (I2CP) encryption (client application to server application) was disabled in I2P release\n"
-"0.6; end-to-end (garlic) encryption (I2P client router to I2P server router) from Alice's router \"a\"\n"
-"to Bob's router \"h\" remains. Notice the different use of terms! All data from a to h is end-to-end\n"
-"encrypted, but the I2CP connection between the I2P router and the applications is not end-to-end\n"
-"encrypted! A and h are the routers of Alice and Bob, while Alice and Bob in following chart are the\n"
+"End-to-end (I2CP) encryption (client application to server application) "
+"was disabled in I2P release\n"
+"0.6; end-to-end (garlic) encryption (I2P client router to I2P server "
+"router) from Alice's router \"a\"\n"
+"to Bob's router \"h\" remains. Notice the different use of terms! All "
+"data from a to h is end-to-end\n"
+"encrypted, but the I2CP connection between the I2P router and the "
+"applications is not end-to-end\n"
+"encrypted! A and h are the routers of Alice and Bob, while Alice and Bob "
+"in following chart are the\n"
"applications running atop of I2P."
-msgstr "Le chiffrement de bout en bout (I2CP) (application cliente vers l'application serveur) a été désactivé dans\nla version 0.6; Le chiffrement (oignon) de bout en bout (routeur I2P client vers routeur I2P serveur) depuis\nle routeur \"a\" d'Alice vers le \"h\" de Bob est resté. Remarquez l'utilisation différente des termes ! Toutes\nles données transitant de \"a\" vers \"h\" sont cryptées de bout en bout, mais la connexion I2CP entre le\nrouteur et les applications ne l'est pas ! \"a\" et \"h\" sont les routeurs d'Alice et Bob, alors qu'Alice et Bob\ndans le schéma suivant sont les applications qui tournent sur I2P."
+msgstr ""
+"Le chiffrement de bout en bout (I2CP) (application cliente vers "
+"l'application serveur) a été désactivé dans\n"
+"la version 0.6; Le chiffrement (oignon) de bout en bout (routeur I2P "
+"client vers routeur I2P serveur) depuis\n"
+"le routeur \"a\" d'Alice vers le \"h\" de Bob est resté. Remarquez "
+"l'utilisation différente des termes ! Toutes\n"
+"les données transitant de \"a\" vers \"h\" sont cryptées de bout en bout,"
+" mais la connexion I2CP entre le\n"
+"routeur et les applications ne l'est pas ! \"a\" et \"h\" sont les "
+"routeurs d'Alice et Bob, alors qu'Alice et Bob\n"
+"dans le schéma suivant sont les applications qui tournent sur I2P."
#: i2p2www/pages/site/docs/how/intro.html:126
msgid "End to end layered encryption"
@@ -6424,28 +8300,61 @@ msgstr "Cryptage en couches de bout en bout"
msgid ""
"The specific use of these algorithms are outlined elsewhere."
-msgstr "Les utilisations spécifiques de ces algorithmes sont précisées ailleurs."
+msgstr ""
+"Les utilisations spécifiques de ces algorithmes sont précisées ailleurs."
#: i2p2www/pages/site/docs/how/intro.html:132
msgid ""
-"The two main mechanisms for allowing people who need strong anonymity to use the network are\n"
-"explicitly delayed garlic routed messages and more comprehensive tunnels to include support for\n"
-"pooling and mixing messages. These are currently planned for release 3.0, but garlic routed messages\n"
-"with no delays and FIFO tunnels are currently in place. Additionally, the 2.0 release will allow\n"
-"people to set up and operate behind restricted routes (perhaps with trusted peers), as well as the\n"
+"The two main mechanisms for allowing people who need strong anonymity to "
+"use the network are\n"
+"explicitly delayed garlic routed messages and more comprehensive tunnels "
+"to include support for\n"
+"pooling and mixing messages. These are currently planned for release 3.0,"
+" but garlic routed messages\n"
+"with no delays and FIFO tunnels are currently in place. Additionally, the"
+" 2.0 release will allow\n"
+"people to set up and operate behind restricted routes (perhaps with "
+"trusted peers), as well as the\n"
"deployment of more flexible and anonymous transports."
-msgstr "Les deux mécanismes principaux permettant l'usage du réseau par ceux qui ont besoin d'un anonymat fort\nsont très explicitement le routage \"oignon\" retardé et des tunnels plus évolués incluant la possibilité d'appeler et\nde croiser les messages. Ils sont actuellement planifiés pour la version 3.0, mais le routage \"oignon\" instantané et\nles tunnels FIFO sont d'ores et déjà opérationnels. La version 2.0 permettra de mettre en place des routes réservées\n(peut-être avec des pairs de confiance), ainsi que des transports plus souples et plus anonymes."
+msgstr ""
+"Les deux mécanismes principaux permettant l'usage du réseau par ceux qui "
+"ont besoin d'un anonymat fort\n"
+"sont très explicitement le routage \"oignon\" retardé et des tunnels plus"
+" évolués incluant la possibilité d'appeler et\n"
+"de croiser les messages. Ils sont actuellement planifiés pour la version "
+"3.0, mais le routage \"oignon\" instantané et\n"
+"les tunnels FIFO sont d'ores et déjà opérationnels. La version 2.0 "
+"permettra de mettre en place des routes réservées\n"
+"(peut-être avec des pairs de confiance), ainsi que des transports plus "
+"souples et plus anonymes."
#: i2p2www/pages/site/docs/how/intro.html:141
#, python-format
msgid ""
-"Some questions have been raised with regards to the scalability of I2P, and reasonably so. There\n"
-"will certainly be more analysis over time, but peer lookup and integration should be bounded by\n"
-"O(log(N))
due to the network database's algorithm, while end\n"
-"to end messages should be O(1)
(scale free), since messages go out K hops through the\n"
-"outbound tunnel and another K hops through the inbound tunnel, with K no longer than 3. The size of\n"
+"Some questions have been raised with regards to the scalability of I2P, "
+"and reasonably so. There\n"
+"will certainly be more analysis over time, but peer lookup and "
+"integration should be bounded by\n"
+"O(log(N))
due to the network "
+"database's algorithm, while end\n"
+"to end messages should be O(1)
(scale free), since messages "
+"go out K hops through the\n"
+"outbound tunnel and another K hops through the inbound tunnel, with K no "
+"longer than 3. The size of\n"
"the network (N) bears no impact."
-msgstr "Des questions ont surgit à juste titre concernant l'évolutivité d'I2P en terme d'échelle. Il y aura certainement davantage d'analyse avec le temps, mais l'intégration et la recherche des pairs devraient répondre via\nO(log(N))
grâce à l'algorithme de la base de données,\ntandis que les messages seraient plutôt liés à O(1)
(non dépendant de l'échelle),\ncar les messages passent par K sauts du tunnel sortant puis encore K sauts via le tunnel entrant, avec K\ninférieur ou égal à 3. La taille du réseau (N) n'a pas d'impact."
+msgstr ""
+"Des questions ont surgit à juste titre concernant l'évolutivité d'I2P en "
+"terme d'échelle. Il y aura certainement davantage d'analyse avec le "
+"temps, mais l'intégration et la recherche des pairs devraient répondre "
+"via\n"
+"O(log(N))
grâce à l'algorithme de la base de données,\n"
+"tandis que les messages seraient plutôt liés à O(1)
"
+"(non dépendant de l'échelle),\n"
+"car les messages passent par K sauts du tunnel sortant puis encore K "
+"sauts via le tunnel entrant, avec K\n"
+"inférieur ou égal à 3. La taille du réseau (N) n'a pas d'impact."
#: i2p2www/pages/site/docs/how/intro.html:150
msgid "When?"
@@ -6455,11 +8364,23 @@ msgstr "Quand?"
#, python-format
msgid ""
"I2P initially began in Feb 2003 as a proposed modification to Freenet to allow it to use alternate transports, such as Freenet to allow it to use "
+"alternate transports, such as JMS, then grew into its own as an\n"
-"'anonCommFramework' in April 2003, turning into I2P in July, with code being written in earnest\n"
-"starting in August '03. I2P is currently under development, following the roadmap."
-msgstr "I2P a initialement commencé en février 2003 comme modification proposée à Freenet pour permettre d'utiliser des transports alternés, tels que JMS, puis s'est développé en lui-même en tant que\n'anonCommFramework' en avril 2003, se métamorphosant en I2P en juillet, avec du code étant écrit sérieusement\nà partir de août 2003. I2P est actuellement en développement, selon la feuille de route."
+"'anonCommFramework' in April 2003, turning into I2P in July, with code "
+"being written in earnest\n"
+"starting in August '03. I2P is currently under development, following the"
+" roadmap."
+msgstr ""
+"I2P a initialement commencé en février 2003 comme modification proposée à"
+" Freenet pour permettre d'utiliser "
+"des transports alternés, tels que JMS, puis s'est développé en lui-même en tant que\n"
+"'anonCommFramework' en avril 2003, se métamorphosant en I2P en juillet, "
+"avec du code étant écrit sérieusement\n"
+"à partir de août 2003. I2P est actuellement en développement, selon la feuille de route."
#: i2p2www/pages/site/docs/how/intro.html:161
msgid "Who?"
@@ -6468,15 +8389,41 @@ msgstr "Qui?"
#: i2p2www/pages/site/docs/how/intro.html:162
#, python-format
msgid ""
-"We have a small team spread around several continents, working to advance\n"
-"different aspects of the project. We are very open to other developers who want to get involved and\n"
-"anyone else who would like to contribute in other ways, such as critiques, peer review, testing,\n"
-"writing I2P enabled applications, or documentation. The entire system is open source - the router\n"
-"and most of the SDK are outright public domain with some BSD and Cryptix licensed code, while some\n"
-"applications like I2PTunnel and I2PSnark are GPL. Almost everything is written in Java (1.5+),\n"
-"though some third party applications are being written in Python and other languages. The code works\n"
-"on Sun Java SE and other Java Virtual Machines."
-msgstr "Nous sommes une petite équipe répartie sur plusieurs continents, qui travaille à\nl'avancement\nde différents aspects du projet. Nous sommes complètement ouverts à l'arrivée d'autre développeurs qui voudraient s'impliquer et à celle de quiconque préfèrerait participer d'autres façons, telles que la critique, l'analyse de pair, le test,\nl'écriture d'applications compatibles, ou de documentation. Le système est totalement\n\"open source\" : le routeur et presque tout l'outil de développement sont de plein droit dans le domaine public avec\nquelques lignes de code sous licences BSD et Cryptix, et quelques applications comme I2PTunnel\net I2PSnark sous GPL. Presque tout est écrit en Java (1.5+), bien que quelques applications de tierce partie soient\nécrites en Python et autres langages. Le code fonctionne sur Oracle/Sun Java SE et d'autres Machines Virtuelles Java."
+"We have a small team spread around several "
+"continents, working to advance\n"
+"different aspects of the project. We are very open to other developers "
+"who want to get involved and\n"
+"anyone else who would like to contribute in other ways, such as "
+"critiques, peer review, testing,\n"
+"writing I2P enabled applications, or documentation. The entire system is "
+"open source - the router\n"
+"and most of the SDK are outright public domain with some BSD and Cryptix "
+"licensed code, while some\n"
+"applications like I2PTunnel and I2PSnark are GPL. Almost everything is "
+"written in Java (1.5+),\n"
+"though some third party applications are being written in Python and "
+"other languages. The code works\n"
+"on Sun Java SE and other Java Virtual"
+" Machines."
+msgstr ""
+"Nous sommes une petite équipe répartie sur "
+"plusieurs continents, qui travaille à\n"
+"l'avancement\n"
+"de différents aspects du projet. Nous sommes complètement ouverts à "
+"l'arrivée d'autre développeurs qui voudraient s'impliquer et à celle de "
+"quiconque préfèrerait participer d'autres façons, telles que la critique,"
+" l'analyse de pair, le test,\n"
+"l'écriture d'applications compatibles, ou de documentation. Le système "
+"est totalement\n"
+"\"open source\" : le routeur et presque tout l'outil de développement "
+"sont de plein droit dans le domaine public avec\n"
+"quelques lignes de code sous licences BSD et Cryptix, et quelques "
+"applications comme I2PTunnel\n"
+"et I2PSnark sous GPL. Presque tout est écrit en Java (1.5+), bien que "
+"quelques applications de tierce partie soient\n"
+"écrites en Python et autres langages. Le code fonctionne sur Oracle/Sun Java SE et d'autres Machines "
+"Virtuelles Java."
#: i2p2www/pages/site/docs/how/intro.html:173
msgid "Where?"
@@ -6485,9 +8432,12 @@ msgstr "Où?"
#: i2p2www/pages/site/docs/how/intro.html:174
#, python-format
msgid ""
-"Anyone interested should join us on the IRC channel #i2p-dev (hosted concurrently on irc.freenode.net,\n"
-"irc.postman.i2p, irc.echelon.i2p, irc.dg.i2p and irc.oftc.net). There are currently no\n"
-"scheduled development meetings, however archives are available."
+"Anyone interested should join us on the IRC channel #i2p-dev (hosted "
+"concurrently on irc.freenode.net,\n"
+"irc.postman.i2p, irc.echelon.i2p, irc.dg.i2p and irc.oftc.net). There are"
+" currently no\n"
+"scheduled development meetings, however archives"
+" are available."
msgstr ""
#: i2p2www/pages/site/docs/how/intro.html:180
@@ -6511,24 +8461,32 @@ msgstr ""
#: i2p2www/pages/site/docs/how/network-database.html:8
msgid ""
"I2P's netDb is a specialized distributed database, containing \n"
-"just two types of data - router contact information (RouterInfos) and destination contact\n"
-"information (LeaseSets). Each piece of data is signed by the appropriate party and verified\n"
-"by anyone who uses or stores it. In addition, the data has liveliness information\n"
-"within it, allowing irrelevant entries to be dropped, newer entries to replace\n"
+"just two types of data - router contact information (RouterInfos) "
+"and destination contact\n"
+"information (LeaseSets). Each piece of data is signed by the "
+"appropriate party and verified\n"
+"by anyone who uses or stores it. In addition, the data has liveliness "
+"information\n"
+"within it, allowing irrelevant entries to be dropped, newer entries to "
+"replace\n"
"older ones, and protection against certain classes of attack."
msgstr ""
#: i2p2www/pages/site/docs/how/network-database.html:17
msgid ""
"The netDb is distributed with a simple technique called \"floodfill\",\n"
-"where a subset of all routers, called \"floodfill routers\", maintains the distributed database."
+"where a subset of all routers, called \"floodfill routers\", maintains "
+"the distributed database."
msgstr ""
#: i2p2www/pages/site/docs/how/network-database.html:25
msgid ""
-"When an I2P router wants to contact another router, they need to know some \n"
-"key pieces of data - all of which are bundled up and signed by the router into\n"
-"a structure called the \"RouterInfo\", which is distributed with the SHA256 of the router's identity\n"
+"When an I2P router wants to contact another router, they need to know "
+"some \n"
+"key pieces of data - all of which are bundled up and signed by the router"
+" into\n"
+"a structure called the \"RouterInfo\", which is distributed with the "
+"SHA256 of the router's identity\n"
"as the key. The structure itself contains:"
msgstr ""
@@ -6540,8 +8498,8 @@ msgstr ""
#: i2p2www/pages/site/docs/how/network-database.html:33
msgid ""
-"The contact addresses at which it can be reached (e.g. TCP: example.org port"
-" 4108)"
+"The contact addresses at which it can be reached (e.g. TCP: example.org "
+"port 4108)"
msgstr ""
#: i2p2www/pages/site/docs/how/network-database.html:34
@@ -6553,8 +8511,7 @@ msgid "A set of arbitrary text options"
msgstr ""
#: i2p2www/pages/site/docs/how/network-database.html:36
-msgid ""
-"The signature of the above, generated by the identity's DSA signing key"
+msgid "The signature of the above, generated by the identity's DSA signing key"
msgstr ""
#: i2p2www/pages/site/docs/how/network-database.html:39
@@ -6565,8 +8522,8 @@ msgstr ""
#: i2p2www/pages/site/docs/how/network-database.html:45
msgid ""
-"Capabilities flags - used to indicate floodfill participation, approximate "
-"bandwidth, and perceived reachability"
+"Capabilities flags - used to indicate floodfill participation, "
+"approximate bandwidth, and perceived reachability"
msgstr ""
#: i2p2www/pages/site/docs/how/network-database.html:47
@@ -6623,29 +8580,36 @@ msgstr ""
#: i2p2www/pages/site/docs/how/network-database.html:70
msgid ""
-"Always sent as 90m, for compatibility with an older scheme where routers published their actual uptime,\n"
+"Always sent as 90m, for compatibility with an older scheme where routers "
+"published their actual uptime,\n"
"and only sent tunnel requests to peers whose was more than 60m"
msgstr ""
#: i2p2www/pages/site/docs/how/network-database.html:76
msgid ""
"These values are used by other routers for basic decisions.\n"
-"Should we connect to this router? Should we attempt to route a tunnel through this router?\n"
-"The bandwidth capability flag, in particular, is used only to determine whether\n"
+"Should we connect to this router? Should we attempt to route a tunnel "
+"through this router?\n"
+"The bandwidth capability flag, in particular, is used only to determine "
+"whether\n"
"the router meets a minimum threshold for routing tunnels.\n"
-"Above the minimum threshold, the advertised bandwidth is not used or trusted anywhere\n"
-"in the router, except for display in the user interface and for debugging and network analysis."
+"Above the minimum threshold, the advertised bandwidth is not used or "
+"trusted anywhere\n"
+"in the router, except for display in the user interface and for debugging"
+" and network analysis."
msgstr ""
#: i2p2www/pages/site/docs/how/network-database.html:86
#, python-format
msgid ""
"Additional text options include\n"
-"a small number of statistics about the router's health, which are aggregated by\n"
+"a small number of statistics about the router's health, which are "
+"aggregated by\n"
"sites such as %(stats)s\n"
"for network performance analysis and debugging.\n"
"These statistics were chosen to provide data crucial to the developers,\n"
-"such as tunnel build success rates, while balancing the need for such data\n"
+"such as tunnel build success rates, while balancing the need for such "
+"data\n"
"with the side-effects that could result from revealing this data.\n"
"Current statistics are limited to:"
msgstr ""
@@ -6660,16 +8624,18 @@ msgstr ""
#: i2p2www/pages/site/docs/how/network-database.html:101
msgid ""
-"Floodfill routers publish additional data on the number of entries in their "
-"network database."
+"Floodfill routers publish additional data on the number of entries in "
+"their network database."
msgstr ""
#: i2p2www/pages/site/docs/how/network-database.html:105
msgid ""
"The data published can be seen in the router's user interface,\n"
"but is not used or trusted within the router.\n"
-"As the network has matured, we have gradually removed most of the published\n"
-"statistics to improve anonymity, and we plan to remove more in future releases."
+"As the network has matured, we have gradually removed most of the "
+"published\n"
+"statistics to improve anonymity, and we plan to remove more in future "
+"releases."
msgstr ""
#: i2p2www/pages/site/docs/how/network-database.html:113
@@ -6687,15 +8653,16 @@ msgstr ""
#: i2p2www/pages/site/docs/how/network-database.html:120
msgid ""
"RouterInfos have no set expiration time.\n"
-"Each router is free to maintain its own local policy to trade off the frequency of RouterInfo lookups\n"
+"Each router is free to maintain its own local policy to trade off the "
+"frequency of RouterInfo lookups\n"
"with memory or disk usage.\n"
"In the current implementation, there are the following general policies:"
msgstr ""
#: i2p2www/pages/site/docs/how/network-database.html:127
msgid ""
-"There is no expiration during the first hour of uptime, as the persistent "
-"stored data may be old."
+"There is no expiration during the first hour of uptime, as the persistent"
+" stored data may be old."
msgstr ""
#: i2p2www/pages/site/docs/how/network-database.html:130
@@ -6704,21 +8671,25 @@ msgstr ""
#: i2p2www/pages/site/docs/how/network-database.html:133
msgid ""
-"As the number of local RouterInfos grows, the expiration time shrinks, in an attempt to maintain\n"
-"a reasonable number RouterInfos. The expiration time with less than 120 routers is 72 hours,\n"
+"As the number of local RouterInfos grows, the expiration time shrinks, in"
+" an attempt to maintain\n"
+"a reasonable number RouterInfos. The expiration time with less than 120 "
+"routers is 72 hours,\n"
"while expiration time with 300 routers is around 30 hours."
msgstr ""
#: i2p2www/pages/site/docs/how/network-database.html:138
#, python-format
msgid ""
-"RouterInfos containing SSU introducers expire in about an hour, as\n"
+"RouterInfos containing SSU introducers expire in "
+"about an hour, as\n"
"the introducer list expires in about that time."
msgstr ""
#: i2p2www/pages/site/docs/how/network-database.html:142
msgid ""
-"Floodfills use a short expiration time (1 hour) for all local RouterInfos, as valid RouterInfos will\n"
+"Floodfills use a short expiration time (1 hour) for all local "
+"RouterInfos, as valid RouterInfos will\n"
"be frequently republished to them."
msgstr ""
@@ -6734,8 +8705,10 @@ msgstr ""
#: i2p2www/pages/site/docs/how/network-database.html:157
msgid ""
-"The second piece of data distributed in the netDb is a \"LeaseSet\" - documenting\n"
-"a group of tunnel entry points (leases) for a particular client destination.\n"
+"The second piece of data distributed in the netDb is a \"LeaseSet\" - "
+"documenting\n"
+"a group of tunnel entry points (leases) for a particular client "
+"destination.\n"
"Each of these leases specify the following information:"
msgstr ""
@@ -6769,8 +8742,8 @@ msgstr ""
#: i2p2www/pages/site/docs/how/network-database.html:177
msgid ""
-"Additional encryption public key: used for end-to-end encryption of garlic "
-"messages"
+"Additional encryption public key: used for end-to-end encryption of "
+"garlic messages"
msgstr ""
#: i2p2www/pages/site/docs/how/network-database.html:178
@@ -6781,8 +8754,8 @@ msgstr ""
#: i2p2www/pages/site/docs/how/network-database.html:179
msgid ""
-"Signature of all the LeaseSet data, to make sure the Destination published "
-"the LeaseSet."
+"Signature of all the LeaseSet data, to make sure the Destination "
+"published the LeaseSet."
msgstr ""
#: i2p2www/pages/site/docs/how/network-database.html:183
@@ -6807,10 +8780,13 @@ msgstr ""
#: i2p2www/pages/site/docs/how/network-database.html:195
msgid ""
-"A LeaseSet for a destination used only for outgoing connections is unpublished.\n"
+"A LeaseSet for a destination used only for outgoing connections is "
+"unpublished.\n"
"It is never sent for publication to a floodfill router.\n"
-"\"Client\" tunnels, such as those for web browsing and IRC clients, are unpublished.\n"
-"Servers will still be able to send messages back to those unpublished destinations,\n"
+"\"Client\" tunnels, such as those for web browsing and IRC clients, are "
+"unpublished.\n"
+"Servers will still be able to send messages back to those unpublished "
+"destinations,\n"
"because of I2NP storage messages."
msgstr ""
@@ -6820,10 +8796,14 @@ msgstr ""
#: i2p2www/pages/site/docs/how/network-database.html:206
msgid ""
-"A LeaseSet may be revoked by publishing a new LeaseSet with zero leases.\n"
-"Revocations must be signed by the additional signing key in the LeaseSet.\n"
-"Revocations are not fully implemented, and it is unclear if they have any practical use.\n"
-"This is the only planned use for that signing key, so it is currently unused."
+"A LeaseSet may be revoked by publishing a new LeaseSet with zero "
+"leases.\n"
+"Revocations must be signed by the additional signing key in the LeaseSet."
+"\n"
+"Revocations are not fully implemented, and it is unclear if they have any"
+" practical use.\n"
+"This is the only planned use for that signing key, so it is currently "
+"unused."
msgstr ""
#: i2p2www/pages/site/docs/how/network-database.html:213
@@ -6832,12 +8812,17 @@ msgstr ""
#: i2p2www/pages/site/docs/how/network-database.html:214
msgid ""
-"In an encrypted LeaseSet, all Leases are encrypted with a separate DSA key.\n"
-"The leases may only be decoded, and thus the destination may only be contacted,\n"
+"In an encrypted LeaseSet, all Leases are encrypted with a separate"
+" DSA key.\n"
+"The leases may only be decoded, and thus the destination may only be "
+"contacted,\n"
"by those with the key.\n"
-"There is no flag or other direct indication that the LeaseSet is encrypted.\n"
-"Encrypted LeaseSets are not widely used, and it is a topic for future work to\n"
-"research whether the user interface and implementation of encrypted LeaseSets could be improved."
+"There is no flag or other direct indication that the LeaseSet is "
+"encrypted.\n"
+"Encrypted LeaseSets are not widely used, and it is a topic for future "
+"work to\n"
+"research whether the user interface and implementation of encrypted "
+"LeaseSets could be improved."
msgstr ""
#: i2p2www/pages/site/docs/how/network-database.html:223
@@ -6846,7 +8831,8 @@ msgstr ""
#: i2p2www/pages/site/docs/how/network-database.html:224
msgid ""
-"All Leases (tunnels) are valid for 10 minutes; therefore, a LeaseSet expires\n"
+"All Leases (tunnels) are valid for 10 minutes; therefore, a LeaseSet "
+"expires\n"
"10 minutes after the earliest creation time of all its Leases."
msgstr ""
@@ -6868,32 +8854,46 @@ msgstr ""
msgid ""
"The netDb is decentralized, however you do need at\n"
"least one reference to a peer so that the integration process\n"
-"ties you in. This is accomplished by \"reseeding\" your router with the RouterInfo\n"
-"of an active peer - specifically, by retrieving their routerInfo-$hash.dat
\n"
-"file and storing it in your netDb/
directory. Anyone can provide\n"
-"you with those files - you can even provide them to others by exposing your own\n"
+"ties you in. This is accomplished by \"reseeding\" your router with the "
+"RouterInfo\n"
+"of an active peer - specifically, by retrieving their "
+"routerInfo-$hash.dat
\n"
+"file and storing it in your netDb/
directory. Anyone can "
+"provide\n"
+"you with those files - you can even provide them to others by exposing "
+"your own\n"
"netDb directory. To simplify the process,\n"
-"volunteers publish their netDb directories (or a subset) on the regular (non-i2p) network,\n"
+"volunteers publish their netDb directories (or a subset) on the regular "
+"(non-i2p) network,\n"
"and the URLs of these directories are hardcoded in I2P.\n"
-"When the router starts up for the first time, it automatically fetches from\n"
+"When the router starts up for the first time, it automatically fetches "
+"from\n"
"one of these URLs, selected at random."
msgstr ""
#: i2p2www/pages/site/docs/how/network-database.html:251
msgid ""
"The floodfill netDb is a simple distributed storage mechanism.\n"
-"The storage algorithm is simple: send the data to the closest peer that has advertised itself\n"
-"as a floodfill router. Then wait 10 seconds, pick another floodfill router and ask them \n"
-"for the entry to be sent, verifying its proper insertion / distribution. If the \n"
-"verification peer doesn't reply, or they don't have the entry, the sender \n"
-"repeats the process. When the peer in the floodfill netDb receives a netDb \n"
-"store from a peer not in the floodfill netDb, they send it to a subset of the floodfill netDb-peers.\n"
-"The peers selected are the ones closest (according to the XOR-metric) to a specific key."
+"The storage algorithm is simple: send the data to the closest peer that "
+"has advertised itself\n"
+"as a floodfill router. Then wait 10 seconds, pick another floodfill "
+"router and ask them \n"
+"for the entry to be sent, verifying its proper insertion / distribution. "
+"If the \n"
+"verification peer doesn't reply, or they don't have the entry, the sender"
+" \n"
+"repeats the process. When the peer in the floodfill netDb receives a "
+"netDb \n"
+"store from a peer not in the floodfill netDb, they send it to a subset of"
+" the floodfill netDb-peers.\n"
+"The peers selected are the ones closest (according to the XOR-metric) to a specific key."
msgstr ""
#: i2p2www/pages/site/docs/how/network-database.html:262
msgid ""
-"Determining who is part of the floodfill netDb is trivial - it is exposed in each \n"
+"Determining who is part of the floodfill netDb is trivial - it is exposed"
+" in each \n"
"router's published routerInfo as a capability."
msgstr ""
@@ -6923,13 +8923,15 @@ msgid ""
"Routers with high bandwidth limits (which must be manually configured,\n"
"as the default is much lower) are presumed to be on lower-latency\n"
"connections, and are more likely to be available 24/7.\n"
-"The current minimum share bandwidth for a floodfill router is 128 KBytes/sec."
+"The current minimum share bandwidth for a floodfill router is 128 "
+"KBytes/sec."
msgstr ""
#: i2p2www/pages/site/docs/how/network-database.html:293
msgid ""
"In addition, a router must pass several additional tests for health\n"
-"(outbound message queue time, job lag, etc.) before floodfill operation is\n"
+"(outbound message queue time, job lag, etc.) before floodfill operation "
+"is\n"
"automatically enabled."
msgstr ""
@@ -6956,10 +8958,13 @@ msgstr ""
#: i2p2www/pages/site/docs/how/network-database.html:315
msgid ""
-"A floodfill router's only services that are in addition to those of non-floodfill routers\n"
+"A floodfill router's only services that are in addition to those of non-"
+"floodfill routers\n"
"are in accepting netDb stores and responding to netDb queries.\n"
-"Since they are generally high-bandwidth, they are more likely to participate in a high number of tunnels\n"
-"(i.e. be a \"relay\" for others), but this is not directly related to their distributed database services."
+"Since they are generally high-bandwidth, they are more likely to "
+"participate in a high number of tunnels\n"
+"(i.e. be a \"relay\" for others), but this is not directly related to "
+"their distributed database services."
msgstr ""
#: i2p2www/pages/site/docs/how/network-database.html:323
@@ -6968,21 +8973,29 @@ msgstr ""
#: i2p2www/pages/site/docs/how/network-database.html:324
msgid ""
-"The netDb uses a simple Kademlia-style XOR metric to determine closeness.\n"
+"The netDb uses a simple Kademlia-style XOR metric to determine closeness."
+"\n"
"The SHA256 hash of the key being looked up or stored is XOR-ed with\n"
"the hash of the router in question to determine closeness.\n"
-"A modification to this algorithm is done to increase the costs of Sybil attacks.\n"
-"Instead of the SHA256 hash of the key being looked up of stored, the SHA256 hash is taken\n"
-"of the 32-byte binary search key appended with the UTC date represented as an 8-byte ASCII string yyyyMMdd, i.e. SHA256(key + yyyyMMdd).\n"
-"This is called the \"routing key\", and it changes every day at midnight UTC.\n"
-"Only the search key is modified in this way, not the floodfill router hashes.\n"
-"The daily transformation of the DHT is sometimes called \"keyspace rotation\",\n"
+"A modification to this algorithm is done to increase the costs of Sybil attacks.\n"
+"Instead of the SHA256 hash of the key being looked up of stored, the "
+"SHA256 hash is taken\n"
+"of the 32-byte binary search key appended with the UTC date represented "
+"as an 8-byte ASCII string yyyyMMdd, i.e. SHA256(key + yyyyMMdd).\n"
+"This is called the \"routing key\", and it changes every day at midnight "
+"UTC.\n"
+"Only the search key is modified in this way, not the floodfill router "
+"hashes.\n"
+"The daily transformation of the DHT is sometimes called \"keyspace "
+"rotation\",\n"
"although it isn't strictly a rotation."
msgstr ""
#: i2p2www/pages/site/docs/how/network-database.html:337
msgid ""
-"Routing keys are never sent on-the-wire in any I2NP message, they are only used locally for\n"
+"Routing keys are never sent on-the-wire in any I2NP message, they are "
+"only used locally for\n"
"determination of distance."
msgstr ""
@@ -6997,7 +9010,8 @@ msgstr ""
#: i2p2www/pages/site/docs/how/network-database.html:347
#, python-format
msgid ""
-"I2NP DatabaseStoreMessages containing the local RouterInfo are exchanged with peers\n"
+"I2NP DatabaseStoreMessages containing the local "
+"RouterInfo are exchanged with peers\n"
"as a part of the initialization of a NTCP\n"
"or SSU transport connection."
msgstr ""
@@ -7009,32 +9023,46 @@ msgstr ""
#: i2p2www/pages/site/docs/how/network-database.html:355
#, python-format
msgid ""
-"I2NP DatabaseStoreMessages containing the local LeaseSet are periodically exchanged with peers\n"
-"by bundling them in a garlic message along with normal traffic from the related Destination.\n"
-"This allows an initial response, and later responses, to be sent to an appropriate Lease,\n"
-"without requiring any LeaseSet lookups, or requiring the communicating Destinations to have published LeaseSets at all."
+"I2NP DatabaseStoreMessages containing the local "
+"LeaseSet are periodically exchanged with peers\n"
+"by bundling them in a garlic message along with normal traffic from the "
+"related Destination.\n"
+"This allows an initial response, and later responses, to be sent to an "
+"appropriate Lease,\n"
+"without requiring any LeaseSet lookups, or requiring the communicating "
+"Destinations to have published LeaseSets at all."
msgstr ""
#: i2p2www/pages/site/docs/how/network-database.html:363
msgid ""
"The DatabaseStoreMessage should be sent to the floodfill that is closest\n"
"to the current routing key for the RouterInfo or LeaseSet being stored.\n"
-"Currently, the closest floodfill is found by a search in the local database.\n"
-"Even if that floodfill is not actually closest, it will flood it \"closer\" by\n"
+"Currently, the closest floodfill is found by a search in the local "
+"database.\n"
+"Even if that floodfill is not actually closest, it will flood it "
+"\"closer\" by\n"
"sending it to multiple other floodfills.\n"
"This provides a high degree of fault-tolerance."
msgstr ""
#: i2p2www/pages/site/docs/how/network-database.html:372
msgid ""
-"In traditional Kademlia, a peer would do a \"find-closest\" search before inserting\n"
-"an item in the DHT to the closest target. As the verify operation will tend to\n"
-"discover closer floodfills if they are present, a router will quickly improve\n"
-"its knowledge of the DHT \"neighborhood\" for the RouterInfo and LeaseSets it regularly publishes.\n"
-"While I2NP does not define a \"find-closest\" message, if it becomes necessary,\n"
-"a router may simply do an iterative search for a key with the least significant bit flipped\n"
-"(i.e. key ^ 0x01) until no closer peers are received in the DatabaseSearchReplyMessages.\n"
-"This ensures that the true closest peer will be found even if a more-distant peer had\n"
+"In traditional Kademlia, a peer would do a \"find-closest\" search before"
+" inserting\n"
+"an item in the DHT to the closest target. As the verify operation will "
+"tend to\n"
+"discover closer floodfills if they are present, a router will quickly "
+"improve\n"
+"its knowledge of the DHT \"neighborhood\" for the RouterInfo and "
+"LeaseSets it regularly publishes.\n"
+"While I2NP does not define a \"find-closest\" message, if it becomes "
+"necessary,\n"
+"a router may simply do an iterative search for a key with the least "
+"significant bit flipped\n"
+"(i.e. key ^ 0x01) until no closer peers are received in the "
+"DatabaseSearchReplyMessages.\n"
+"This ensures that the true closest peer will be found even if a more-"
+"distant peer had\n"
"the netdb item."
msgstr ""
@@ -7045,9 +9073,11 @@ msgstr ""
#: i2p2www/pages/site/docs/how/network-database.html:386
#, python-format
msgid ""
-"A router publishes its own RouterInfo by directly connecting to a floodfill router\n"
+"A router publishes its own RouterInfo by directly connecting to a "
+"floodfill router\n"
"and sending it a I2NP DatabaseStoreMessage\n"
-"with a nonzero Reply Token. The message is not end-to-end garlic encrypted,\n"
+"with a nonzero Reply Token. The message is not end-to-end garlic "
+"encrypted,\n"
"as this is a direct connection, so there are no intervening routers\n"
"(and no need to hide this data anyway).\n"
"The floodfill router replies with a\n"
@@ -7061,7 +9091,8 @@ msgstr ""
#: i2p2www/pages/site/docs/how/network-database.html:401
msgid ""
-"Storage of LeaseSets is much more sensitive than for RouterInfos, as a router\n"
+"Storage of LeaseSets is much more sensitive than for RouterInfos, as a "
+"router\n"
"must take care that the LeaseSet cannot be associated with the router."
msgstr ""
@@ -7070,8 +9101,10 @@ msgstr ""
msgid ""
"A router publishes a local LeaseSet by\n"
"sending a I2NP DatabaseStoreMessage\n"
-"with a nonzero Reply Token over an outbound client tunnel for that Destination.\n"
-"The message is end-to-end garlic encrypted using the Destination's Session Key Manager,\n"
+"with a nonzero Reply Token over an outbound client tunnel for that "
+"Destination.\n"
+"The message is end-to-end garlic encrypted using the Destination's "
+"Session Key Manager,\n"
"to hide the message from the tunnel's outbound endpoint.\n"
"The floodfill router replies with a\n"
"I2NP DeliveryStatusMessage,\n"
@@ -7087,12 +9120,17 @@ msgstr ""
#, python-format
msgid ""
"After a floodfill router receives a DatabaseStoreMessage containing a\n"
-"valid RouterInfo or LeaseSet which is newer than that previously stored in its\n"
+"valid RouterInfo or LeaseSet which is newer than that previously stored "
+"in its\n"
"local NetDb, it \"floods\" it.\n"
-"To flood a NetDb entry, it looks up several (currently %(floodsize)s) floodfill routers closest to the routing key\n"
-"of the NetDb entry. (The routing key is the SHA256 Hash of the RouterIdentity or Destination with the date (yyyyMMdd) appended.)\n"
-"By flooding to those closest to the key, not closest to itself, the floodfill ensures that the storage\n"
-"gets to the right place, even if the storing router did not have good knowledge of the\n"
+"To flood a NetDb entry, it looks up several (currently %(floodsize)s) "
+"floodfill routers closest to the routing key\n"
+"of the NetDb entry. (The routing key is the SHA256 Hash of the "
+"RouterIdentity or Destination with the date (yyyyMMdd) appended.)\n"
+"By flooding to those closest to the key, not closest to itself, the "
+"floodfill ensures that the storage\n"
+"gets to the right place, even if the storing router did not have good "
+"knowledge of the\n"
"DHT \"neighborhood\" for the routing key."
msgstr ""
@@ -7114,15 +9152,17 @@ msgstr ""
#: i2p2www/pages/site/docs/how/network-database.html:442
#, python-format
msgid ""
-"The I2NP DatabaseLookupMessage is used to request a netdb entry from a floodfill router.\n"
+"The I2NP DatabaseLookupMessage is used to "
+"request a netdb entry from a floodfill router.\n"
"Lookups are sent out one of the router's outbound exploratory tunnels.\n"
-"The replies are specified to return via one of the router's inbound exploratory tunnels."
+"The replies are specified to return via one of the router's inbound "
+"exploratory tunnels."
msgstr ""
#: i2p2www/pages/site/docs/how/network-database.html:448
msgid ""
-"Lookups are generally sent to the two \"good\" (the connection doesn't fail)"
-" floodfill routers closest to the requested key, in parallel."
+"Lookups are generally sent to the two \"good\" (the connection doesn't "
+"fail) floodfill routers closest to the requested key, in parallel."
msgstr ""
#: i2p2www/pages/site/docs/how/network-database.html:452
@@ -7130,7 +9170,8 @@ msgstr ""
msgid ""
"If the key is found locally by the floodfill router, it responds with a\n"
"I2NP DatabaseStoreMessage.\n"
-"If the key is not found locally by the floodfill router, it responds with a\n"
+"If the key is not found locally by the floodfill router, it responds with"
+" a\n"
"I2NP DatabaseSearchReplyMessage\n"
"containing a list of other floodfill routers close to the key."
msgstr ""
@@ -7138,17 +9179,22 @@ msgstr ""
#: i2p2www/pages/site/docs/how/network-database.html:460
msgid ""
"LeaseSet lookups are garlic encrypted end-to-end as of release 0.9.5.\n"
-"RouterInfo lookups are not encrypted and thus are vulnerable to snooping by the outbound endpoint\n"
-"(OBEP) of the client tunnel. This is due to the expense of the ElGamal encryption.\n"
+"RouterInfo lookups are not encrypted and thus are vulnerable to snooping "
+"by the outbound endpoint\n"
+"(OBEP) of the client tunnel. This is due to the expense of the ElGamal "
+"encryption.\n"
"RouterInfo lookup encryption may be enabled in a future release."
msgstr ""
#: i2p2www/pages/site/docs/how/network-database.html:467
msgid ""
-"As of release 0.9.7, replies to a LeaseSet lookup (a DatabaseStoreMessage or a DatabaseSearchReplyMessage)\n"
+"As of release 0.9.7, replies to a LeaseSet lookup (a DatabaseStoreMessage"
+" or a DatabaseSearchReplyMessage)\n"
"will be encrypted by including the session key and tag in the lookup.\n"
-"This hides the reply from the inbound gateway (IBGW) of the reply tunnel.\n"
-"Responses to RouterInfo lookups will be encrypted if we enable the lookup encryption."
+"This hides the reply from the inbound gateway (IBGW) of the reply tunnel."
+"\n"
+"Responses to RouterInfo lookups will be encrypted if we enable the lookup"
+" encryption."
msgstr ""
#: i2p2www/pages/site/docs/how/network-database.html:474
@@ -7160,33 +9206,44 @@ msgstr ""
#: i2p2www/pages/site/docs/how/network-database.html:478
msgid ""
-"Due to the relatively small size of the network and the flooding redundancy of 8x,\n"
+"Due to the relatively small size of the network and the flooding "
+"redundancy of 8x,\n"
"lookups are usually O(1) rather than O(log n) --\n"
-"a router is highly likely to know a floodfill router close enough to the key to get the answer on the first try.\n"
+"a router is highly likely to know a floodfill router close enough to the "
+"key to get the answer on the first try.\n"
"In releases prior to 0.8.9, routers used a lookup redundancy of two\n"
-"(that is, two lookups were performed in parallel to different peers), and\n"
-"neither recursive nor iterative routing for lookups was implemented.\n"
+"(that is, two lookups were performed in parallel to different peers), and"
+"\n"
+"neither recursive nor iterative routing for lookups was "
+"implemented.\n"
"Queries were sent through multiple routes simultaneously\n"
"to reduce the chance of query failure."
msgstr ""
#: i2p2www/pages/site/docs/how/network-database.html:489
msgid ""
-"As of release 0.8.9, iterative lookups are implemented with no lookup redundancy.\n"
+"As of release 0.8.9, iterative lookups are implemented with no "
+"lookup redundancy.\n"
"This is a more efficient and reliable lookup that will work much better\n"
"when not all floodfill peers are known, and it removes a serious\n"
-"limitation to network growth. As the network grows and each router knows only a small\n"
+"limitation to network growth. As the network grows and each router knows "
+"only a small\n"
"subset of the floodfill peers, lookups will become O(log n).\n"
-"Even if the peer does not return references closer to the key, the lookup continues with\n"
-"the next-closest peer, for added robustness, and to prevent a malicious floodfill from\n"
-"black-holing a part of the key space. Lookups continue until a total lookup timeout is reached,\n"
+"Even if the peer does not return references closer to the key, the lookup"
+" continues with\n"
+"the next-closest peer, for added robustness, and to prevent a malicious "
+"floodfill from\n"
+"black-holing a part of the key space. Lookups continue until a total "
+"lookup timeout is reached,\n"
"or the maximum number of peers is queried."
msgstr ""
#: i2p2www/pages/site/docs/how/network-database.html:501
msgid ""
-"Node IDs are verifiable in that we use the router hash directly as both the node ID and the Kademlia key.\n"
-"Incorrect responses that are not closer to the search key are generally ignored.\n"
+"Node IDs are verifiable in that we use the router hash "
+"directly as both the node ID and the Kademlia key.\n"
+"Incorrect responses that are not closer to the search key are generally "
+"ignored.\n"
"Given the current size of the network, a router has\n"
"detailed knowledge of the neighborhood of the destination ID space."
msgstr ""
@@ -7198,7 +9255,8 @@ msgstr ""
#: i2p2www/pages/site/docs/how/network-database.html:511
#, python-format
msgid ""
-"Note: RouterInfo verification is disabled as of release 0.9.7.1 to prevent\n"
+"Note: RouterInfo verification is disabled as of release 0.9.7.1 to "
+"prevent\n"
"the attack described in the paper\n"
"Practical Attacks Against the I2P Network.\n"
"It is not clear if verification can be redesigned to be done safely."
@@ -7206,11 +9264,13 @@ msgstr ""
#: i2p2www/pages/site/docs/how/network-database.html:518
msgid ""
-"To verify a storage was successful, a router simply waits about 10 seconds,\n"
+"To verify a storage was successful, a router simply waits about 10 "
+"seconds,\n"
"then sends a lookup to another floodfill router close to the key\n"
"(but not the one the store was sent to).\n"
"Lookups sent out one of the router's outbound exploratory tunnels.\n"
-"Lookups are end-to-end garlic encrypted to prevent snooping by the outbound endpoint(OBEP)."
+"Lookups are end-to-end garlic encrypted to prevent snooping by the "
+"outbound endpoint(OBEP)."
msgstr ""
#: i2p2www/pages/site/docs/how/network-database.html:526
@@ -7219,18 +9279,22 @@ msgstr ""
#: i2p2www/pages/site/docs/how/network-database.html:527
msgid ""
-"To verify a storage was successful, a router simply waits about 10 seconds,\n"
+"To verify a storage was successful, a router simply waits about 10 "
+"seconds,\n"
"then sends a lookup to another floodfill router close to the key\n"
"(but not the one the store was sent to).\n"
-"Lookups sent out one of the outbound client tunnels for the destination of the LeaseSet being verified.\n"
+"Lookups sent out one of the outbound client tunnels for the destination "
+"of the LeaseSet being verified.\n"
"To prevent snooping by the OBEP of the outbound tunnel,\n"
"lookups are end-to-end garlic encrypted.\n"
-"The replies are specified to return via one of the client's inbound tunnels."
+"The replies are specified to return via one of the client's inbound "
+"tunnels."
msgstr ""
#: i2p2www/pages/site/docs/how/network-database.html:537
msgid ""
-"As of release 0.9.7, replies for both RouterInfo and LeaseSet lookups (a DatabaseStoreMessage or a DatabaseSearchReplyMessage)\n"
+"As of release 0.9.7, replies for both RouterInfo and LeaseSet lookups (a "
+"DatabaseStoreMessage or a DatabaseSearchReplyMessage)\n"
"will be encrypted,\n"
"to hide the reply from the inbound gateway (IBGW) of the reply tunnel."
msgstr ""
@@ -7242,16 +9306,24 @@ msgstr ""
#: i2p2www/pages/site/docs/how/network-database.html:546
#, python-format
msgid ""
-"Exploration is a special form of netdb lookup, where a router attempts to learn about\n"
+"Exploration is a special form of netdb lookup, where a router "
+"attempts to learn about\n"
"new routers.\n"
-"It does this by sending a floodfill router a I2NP DatabaseLookupMessage, looking for a random key.\n"
+"It does this by sending a floodfill router a I2NP DatabaseLookupMessage, looking for a random "
+"key.\n"
"As this lookup will fail, the floodfill would normally respond with a\n"
-"I2NP DatabaseSearchReplyMessage containing hashes of floodfill routers close to the key.\n"
-"This would not be helpful, as the requesting router probably already knows those floodfills,\n"
-"and it would be impractical to add ALL floodfill routers to the \"don't include\" field of the lookup.\n"
-"For an exploration query, the requesting router adds a router hash of all zeros to the\n"
+"I2NP DatabaseSearchReplyMessage containing "
+"hashes of floodfill routers close to the key.\n"
+"This would not be helpful, as the requesting router probably already "
+"knows those floodfills,\n"
+"and it would be impractical to add ALL floodfill routers to the \"don't "
+"include\" field of the lookup.\n"
+"For an exploration query, the requesting router adds a router hash of all"
+" zeros to the\n"
"\"don't include\" field of the DatabaseLookupMessage.\n"
-"The floodfill will then respond only with non-floodfill routers close to the requested key."
+"The floodfill will then respond only with non-floodfill routers close to "
+"the requested key."
msgstr ""
#: i2p2www/pages/site/docs/how/network-database.html:560
@@ -7260,11 +9332,14 @@ msgstr ""
#: i2p2www/pages/site/docs/how/network-database.html:561
msgid ""
-"The response to a lookup request is either a Database Store Message (on success) or a\n"
-"Database Search Reply Message (on failure). The DSRM contains a 'from' router hash field\n"
+"The response to a lookup request is either a Database Store Message (on "
+"success) or a\n"
+"Database Search Reply Message (on failure). The DSRM contains a 'from' "
+"router hash field\n"
"to indicate the source of the reply; the DSM does not.\n"
"The DSRM 'from' field is unauthenticated and may be spoofed or invalid.\n"
-"There are no other response tags. Therefore, when making multiple requests in parallel, it is\n"
+"There are no other response tags. Therefore, when making multiple "
+"requests in parallel, it is\n"
"difficult to monitor the performance of the various floodfill routers."
msgstr ""
@@ -7274,13 +9349,19 @@ msgstr ""
#: i2p2www/pages/site/docs/how/network-database.html:573
msgid ""
-"Destinations may be hosted on multiple routers simultaneously, by using the same\n"
+"Destinations may be hosted on multiple routers simultaneously, by using "
+"the same\n"
"private and public keys (traditionally stored in eepPriv.dat files).\n"
-"As both instances will periodically publish their signed LeaseSets to the floodfill peers,\n"
-"the most recently published LeaseSet will be returned to a peer requesting a database lookup.\n"
-"As LeaseSets have (at most) a 10 minute lifetime, should a particular instance go down,\n"
-"the outage will be 10 minutes at most, and generally much less than that.\n"
-"The multihoming function has been verified and is in use by several services on the network."
+"As both instances will periodically publish their signed LeaseSets to the"
+" floodfill peers,\n"
+"the most recently published LeaseSet will be returned to a peer "
+"requesting a database lookup.\n"
+"As LeaseSets have (at most) a 10 minute lifetime, should a particular "
+"instance go down,\n"
+"the outage will be 10 minutes at most, and generally much less than that."
+"\n"
+"The multihoming function has been verified and is in use by several "
+"services on the network."
msgstr ""
#: i2p2www/pages/site/docs/how/network-database.html:583
@@ -7310,7 +9391,8 @@ msgstr ""
#, python-format
msgid ""
"There are currently around %(ffcount)s floodfill routers in the network.\n"
-"Most of the following attacks will become more difficult, or have less impact,\n"
+"Most of the following attacks will become more difficult, or have less "
+"impact,\n"
"as the network size and number of floodfill routers increase."
msgstr ""
@@ -7321,8 +9403,8 @@ msgstr ""
#: i2p2www/pages/site/docs/how/network-database.html:604
#, python-format
msgid ""
-"Via flooding, all netdb entries are stored on the %(floodsize)s floodfill "
-"routers closest to the key."
+"Via flooding, all netdb entries are stored on the %(floodsize)s floodfill"
+" routers closest to the key."
msgstr ""
#: i2p2www/pages/site/docs/how/network-database.html:609
@@ -7343,7 +9425,8 @@ msgstr ""
#, python-format
msgid ""
"Each router maintains an expanded set of statistics in the\n"
-"peer profile for each floodfill router,\n"
+"peer profile for each floodfill router,"
+"\n"
"covering various quality metrics for that peer.\n"
"The set includes:"
msgstr ""
@@ -7374,11 +9457,14 @@ msgstr ""
#: i2p2www/pages/site/docs/how/network-database.html:631
msgid ""
-"Each time a router needs to make a determination on which floodfill router is closest to a key,\n"
+"Each time a router needs to make a determination on which floodfill "
+"router is closest to a key,\n"
"it uses these metrics to determine which floodfill routers are \"good\".\n"
-"The methods, and thresholds, used to determine \"goodness\" are relatively new, and\n"
+"The methods, and thresholds, used to determine \"goodness\" are "
+"relatively new, and\n"
"are subject to further analysis and improvement.\n"
-"While a completely unresponsive router will quickly be identified and avoided,\n"
+"While a completely unresponsive router will quickly be identified and "
+"avoided,\n"
"routers that are only sometimes malicious may be much harder to deal with."
msgstr ""
@@ -7390,7 +9476,8 @@ msgstr ""
#, python-format
msgid ""
"An attacker may mount a Sybil attack\n"
-"by creating a large number of floodfill routers spread throughout the keyspace."
+"by creating a large number of floodfill routers spread throughout the "
+"keyspace."
msgstr ""
#: i2p2www/pages/site/docs/how/network-database.html:647
@@ -7398,29 +9485,35 @@ msgstr ""
msgid ""
"(In a related example, a researcher recently created a\n"
"large number of Tor relays.)\n"
-"If successful, this could be an effective DOS attack on the entire network."
+"If successful, this could be an effective DOS attack on the entire "
+"network."
msgstr ""
#: i2p2www/pages/site/docs/how/network-database.html:653
msgid ""
-"If the floodfills are not sufficiently misbehaving to be marked as \"bad\" using the peer profile\n"
+"If the floodfills are not sufficiently misbehaving to be marked as "
+"\"bad\" using the peer profile\n"
"metrics described above, this is a difficult scenario to handle.\n"
-"Tor's response can be much more nimble in the relay case, as the suspicious relays\n"
+"Tor's response can be much more nimble in the relay case, as the "
+"suspicious relays\n"
"can be manually removed from the consensus.\n"
-"Some possible responses for the I2P network are listed below, however none of them is completely satisfactory:"
+"Some possible responses for the I2P network are listed below, however "
+"none of them is completely satisfactory:"
msgstr ""
#: i2p2www/pages/site/docs/how/network-database.html:661
msgid ""
-"Compile a list of bad router hashes or IPs, and announce the list through various means\n"
-"(console news, website, forum, etc.); users would have to manually download the list and\n"
+"Compile a list of bad router hashes or IPs, and announce the list through"
+" various means\n"
+"(console news, website, forum, etc.); users would have to manually "
+"download the list and\n"
"add it to their local \"blacklist\"."
msgstr ""
#: i2p2www/pages/site/docs/how/network-database.html:666
msgid ""
-"Ask everyone in the network to enable floodfill manually (fight Sybil with "
-"more Sybil)"
+"Ask everyone in the network to enable floodfill manually (fight Sybil "
+"with more Sybil)"
msgstr ""
#: i2p2www/pages/site/docs/how/network-database.html:667
@@ -7429,7 +9522,8 @@ msgstr ""
#: i2p2www/pages/site/docs/how/network-database.html:668
msgid ""
-"Release a new software version that improves the peer profile metrics and thresholds,\n"
+"Release a new software version that improves the peer profile metrics and"
+" thresholds,\n"
"in an attempt to automatically identify the \"bad\" peers."
msgstr ""
@@ -7441,9 +9535,12 @@ msgstr ""
#: i2p2www/pages/site/docs/how/network-database.html:673
msgid ""
-"Implement an automatic subscription-based blacklist controlled by a single individual or group.\n"
-"This would essentially implement a portion of the Tor \"consensus\" model.\n"
-"Unfortunately it would also give a single individual or group the power to\n"
+"Implement an automatic subscription-based blacklist controlled by a "
+"single individual or group.\n"
+"This would essentially implement a portion of the Tor \"consensus\" "
+"model.\n"
+"Unfortunately it would also give a single individual or group the power "
+"to\n"
"block participation of any particular router or IP in the network,\n"
"or even to completely shutdown or destroy the entire network."
msgstr ""
@@ -7460,19 +9557,25 @@ msgstr ""
#, python-format
msgid ""
"An attacker may mount a Sybil attack\n"
-"by creating a small number (8-15) of floodfill routers clustered closely in the keyspace,\n"
+"by creating a small number (8-15) of floodfill routers clustered closely "
+"in the keyspace,\n"
"and distribute the RouterInfos for these routers widely.\n"
-"Then, all lookups and stores for a key in that keyspace would be directed\n"
+"Then, all lookups and stores for a key in that keyspace would be directed"
+"\n"
"to one of the attacker's routers.\n"
-"If successful, this could be an effective DOS attack on a particular eepsite, for example."
+"If successful, this could be an effective DOS attack on a particular "
+"eepsite, for example."
msgstr ""
#: i2p2www/pages/site/docs/how/network-database.html:698
msgid ""
-"As the keyspace is indexed by the cryptographic (SHA256) Hash of the key,\n"
-"an attacker must use a brute-force method to repeatedly generate router hashes\n"
+"As the keyspace is indexed by the cryptographic (SHA256) Hash of the key,"
+"\n"
+"an attacker must use a brute-force method to repeatedly generate router "
+"hashes\n"
"until he has enough that are sufficiently close to the key.\n"
-"The amount of computational power required for this, which is dependent on network\n"
+"The amount of computational power required for this, which is dependent "
+"on network\n"
"size, is unknown."
msgstr ""
@@ -7480,10 +9583,14 @@ msgstr ""
msgid ""
"As a partial defense against this attack,\n"
"the algorithm used to determine Kademlia \"closeness\" varies over time.\n"
-"Rather than using the Hash of the key (i.e. H(k)) to determine closeness,\n"
-"we use the Hash of the key appended with the current date string, i.e. H(k + YYYYMMDD).\n"
-"A function called the \"routing key generator\" does this, which transforms the original key into a \"routing key\".\n"
-"In other words, the entire netdb keyspace \"rotates\" every day at UTC midnight.\n"
+"Rather than using the Hash of the key (i.e. H(k)) to determine closeness,"
+"\n"
+"we use the Hash of the key appended with the current date string, i.e. "
+"H(k + YYYYMMDD).\n"
+"A function called the \"routing key generator\" does this, which "
+"transforms the original key into a \"routing key\".\n"
+"In other words, the entire netdb keyspace \"rotates\" every day at UTC "
+"midnight.\n"
"Any partial-keyspace attack would have to be regenerated every day, for\n"
"after the rotation, the attacking routers would no longer be close\n"
"to the target key, or to each other."
@@ -7492,7 +9599,8 @@ msgstr ""
#: i2p2www/pages/site/docs/how/network-database.html:718
msgid ""
"This attack becomes more difficult as the network size grows.\n"
-"However, recent research demonstrates that the keyspace rotation is not particularly effective.\n"
+"However, recent research demonstrates that the keyspace rotation is not "
+"particularly effective.\n"
"An attacker can precompute numerous router hashes in advance,\n"
"and only a few routers are sufficient to \"eclipse\" a portion\n"
"of the keyspace within a half hour after rotation."
@@ -7500,9 +9608,11 @@ msgstr ""
#: i2p2www/pages/site/docs/how/network-database.html:726
msgid ""
-"One consequence of daily keyspace rotation is that the distributed network database\n"
+"One consequence of daily keyspace rotation is that the distributed "
+"network database\n"
"may become unreliable for a few minutes after the rotation --\n"
-"lookups will fail because the new \"closest\" router has not received a store yet.\n"
+"lookups will fail because the new \"closest\" router has not received a "
+"store yet.\n"
"The extent of the issue, and methods for mitigation\n"
"(for example netdb \"handoffs\" at midnight)\n"
"are a topic for further study."
@@ -7565,19 +9675,24 @@ msgstr ""
#, python-format
msgid ""
"See also lookup\n"
-"(Reference: Hashing it out in Public Sections 2.2-2.3 for terms below in italics)"
+"(Reference: Hashing it out in Public Sections "
+"2.2-2.3 for terms below in italics)"
msgstr ""
#: i2p2www/pages/site/docs/how/network-database.html:782
msgid ""
-"Similar to a bootstrap attack, an attacker using a floodfill router could attempt to \"steer\"\n"
-"peers to a subset of routers controlled by him by returning their references."
+"Similar to a bootstrap attack, an attacker using a floodfill router could"
+" attempt to \"steer\"\n"
+"peers to a subset of routers controlled by him by returning their "
+"references."
msgstr ""
#: i2p2www/pages/site/docs/how/network-database.html:787
msgid ""
-"This is unlikely to work via exploration, because exploration is a low-frequency task.\n"
-"Routers acquire a majority of their peer references through normal tunnel building activity.\n"
+"This is unlikely to work via exploration, because exploration is a low-"
+"frequency task.\n"
+"Routers acquire a majority of their peer references through normal tunnel"
+" building activity.\n"
"Exploration results are generally limited to a few router hashes,\n"
"and each exploration query is directed to a random floodfill router."
msgstr ""
@@ -7589,13 +9704,18 @@ msgid ""
"For floodfill router references returned in a\n"
"I2NP DatabaseSearchReplyMessage\n"
"response to a lookup,\n"
-"these references are followed if they are closer (or the next closest) to the lookup key.\n"
+"these references are followed if they are closer (or the next closest) to"
+" the lookup key.\n"
"The requesting router does not trust that the references are\n"
"closer to the key (i.e. they are verifiably correct.\n"
-"The lookup also does not stop when no closer key is found, but continues by querying the\n"
-"next-closet node, until the timeout or maximum number of queries is reached.\n"
-"This prevents a malicious floodfill from black-holing a part of the key space.\n"
-"Also, the daily keyspace rotation requires an attacker to regenerate a router info\n"
+"The lookup also does not stop when no closer key is found, but continues "
+"by querying the\n"
+"next-closet node, until the timeout or maximum number of queries is "
+"reached.\n"
+"This prevents a malicious floodfill from black-holing a part of the key "
+"space.\n"
+"Also, the daily keyspace rotation requires an attacker to regenerate a "
+"router info\n"
"within the desired key space region.\n"
"This design ensures that the query capture attack described in\n"
"Hashing it out in Public\n"
@@ -7633,30 +9753,43 @@ msgstr ""
#: i2p2www/pages/site/docs/how/network-database.html:829
#, python-format
msgid ""
-"This paper addresses weaknesses in the \"Finger Table\" DHT lookups used by Torsk and NISAN.\n"
-"At first glance, these do not appear to apply to I2P. First, the use of DHT by Torsk and NISAN\n"
-"is significantly different from that in I2P. Second, I2P's network database lookups are only\n"
-"loosely correlated to the peer selection and\n"
-"tunnel building processes; only previously-known peers\n"
+"This paper addresses weaknesses in the \"Finger Table\" DHT lookups used "
+"by Torsk and NISAN.\n"
+"At first glance, these do not appear to apply to I2P. First, the use of "
+"DHT by Torsk and NISAN\n"
+"is significantly different from that in I2P. Second, I2P's network "
+"database lookups are only\n"
+"loosely correlated to the peer "
+"selection and\n"
+"tunnel building processes; only "
+"previously-known peers\n"
"are used for tunnels.\n"
"Also, peer selection is unrelated to any notion of DHT key-closeness."
msgstr ""
#: i2p2www/pages/site/docs/how/network-database.html:840
msgid ""
-"Some of this may actually be more interesting when the I2P network gets much larger.\n"
-"Right now, each router knows a large proportion of the network, so looking up a particular\n"
-"Router Info in the network database is not strongly indicative of a future intent to use\n"
-"that router in a tunnel. Perhaps when the network is 100 times larger, the lookup may be\n"
-"more correlative. Of course, a larger network makes a Sybil attack that much harder."
+"Some of this may actually be more interesting when the I2P network gets "
+"much larger.\n"
+"Right now, each router knows a large proportion of the network, so "
+"looking up a particular\n"
+"Router Info in the network database is not strongly indicative of a "
+"future intent to use\n"
+"that router in a tunnel. Perhaps when the network is 100 times larger, "
+"the lookup may be\n"
+"more correlative. Of course, a larger network makes a Sybil attack that "
+"much harder."
msgstr ""
#: i2p2www/pages/site/docs/how/network-database.html:848
#, python-format
msgid ""
-"However, the general issue of DHT information leakage in I2P needs further investigation.\n"
-"The floodfill routers are in a position to observe queries and gather information.\n"
-"Certainly, at a level of f = 0.2 (20% malicious nodes, as specifed in the paper)\n"
+"However, the general issue of DHT information leakage in I2P needs "
+"further investigation.\n"
+"The floodfill routers are in a position to observe queries and gather "
+"information.\n"
+"Certainly, at a level of f = 0.2 (20% malicious nodes, as "
+"specifed in the paper)\n"
"we expect that many of the Sybil threats we describe\n"
"(here,\n"
"here and\n"
@@ -7691,9 +9824,11 @@ msgstr ""
#: i2p2www/pages/site/docs/how/peer-selection.html:10
#, python-format
msgid ""
-"Peer profiling is the process of collecting data based on the observed performance\n"
+"Peer profiling is the process of collecting data based on the "
+"observed performance\n"
"of other routers or peers, and classifying those peers into groups.\n"
-"Profiling does not use any claimed performance data published by the peer itself\n"
+"Profiling does not use any claimed performance data published by "
+"the peer itself\n"
"in the network database."
msgstr ""
@@ -7703,12 +9838,15 @@ msgstr ""
#: i2p2www/pages/site/docs/how/peer-selection.html:19
msgid "Selecting peers to relay our traffic through, which is discussed below"
-msgstr "Sélectionner des pairs pour retransmettre notre trafic à travers, ce qui est discuté ci-dessous"
+msgstr ""
+"Sélectionner des pairs pour retransmettre notre trafic à travers, ce qui "
+"est discuté ci-dessous"
#: i2p2www/pages/site/docs/how/peer-selection.html:20
#, python-format
msgid ""
-"Choosing peers from the set of floodfill routers to use for network database storage and queries,\n"
+"Choosing peers from the set of floodfill routers to use for network "
+"database storage and queries,\n"
"which is discussed on the network database page"
msgstr ""
@@ -7721,9 +9859,11 @@ msgstr ""
#: i2p2www/pages/site/docs/how/peer-selection.html:28
msgid ""
"Peer selection is the process of choosing which routers\n"
-"on the network we want to relay our messages to go through (which peers will we \n"
+"on the network we want to relay our messages to go through (which peers "
+"will we \n"
"ask to join our tunnels). To accomplish this, we keep track of how each\n"
-"peer performs (the peer's \"profile\") and use that data to estimate how \n"
+"peer performs (the peer's \"profile\") and use that data to estimate how"
+" \n"
"fast they are, how often they will be able to accept our requests, and \n"
"whether they seem to be overloaded or otherwise unable to perform what\n"
"they agree to reliably."
@@ -7733,7 +9873,8 @@ msgstr ""
#, python-format
msgid ""
"Unlike some other anonymous networks, in I2P,\n"
-"claimed bandwidth is untrusted and is only used to avoid those peers\n"
+"claimed bandwidth is untrusted and is only used to avoid those "
+"peers\n"
"advertising very low bandwidth insufficient for routing tunnels.\n"
"All peer selection is done through profiling.\n"
"This prevents simple attacks based on peers claiming high bandwidth\n"
@@ -7745,8 +9886,10 @@ msgstr ""
#: i2p2www/pages/site/docs/how/peer-selection.html:50
msgid ""
-"Peer selection is done quite frequently, as a router may maintain a large number\n"
-"of client and exploratory tunnels, and a tunnel lifetime is only 10 minutes."
+"Peer selection is done quite frequently, as a router may maintain a large"
+" number\n"
+"of client and exploratory tunnels, and a tunnel lifetime is only 10 "
+"minutes."
msgstr ""
#: i2p2www/pages/site/docs/how/peer-selection.html:56
@@ -7757,9 +9900,11 @@ msgstr ""
#, python-format
msgid ""
"For more information see the paper\n"
-"Peer Profiling and Selection in the I2P Anonymous Network\n"
+"Peer Profiling and Selection in the I2P Anonymous "
+"Network\n"
"presented at PET-CON 2009.1.\n"
-"See below for notes on minor changes since the paper was published."
+"See below for notes on minor changes since the "
+"paper was published."
msgstr ""
#: i2p2www/pages/site/docs/how/peer-selection.html:65
@@ -7769,21 +9914,30 @@ msgstr ""
#: i2p2www/pages/site/docs/how/peer-selection.html:66
#, python-format
msgid ""
-"Each peer has a set of data points collected about them, including statistics \n"
-"about how long it takes for them to reply to a network database query, how \n"
-"often their tunnels fail, and how many new peers they are able to introduce \n"
-"us to, as well as simple data points such as when we last heard from them or\n"
-"when the last communication error occurred. The specific data points gathered\n"
+"Each peer has a set of data points collected about them, including "
+"statistics \n"
+"about how long it takes for them to reply to a network database query, "
+"how \n"
+"often their tunnels fail, and how many new peers they are able to "
+"introduce \n"
+"us to, as well as simple data points such as when we last heard from them"
+" or\n"
+"when the last communication error occurred. The specific data points "
+"gathered\n"
"can be found in the code."
msgstr ""
#: i2p2www/pages/site/docs/how/peer-selection.html:75
msgid ""
-"Profiles are fairly small, a few KB. To control memory usage, the profile expiration time\n"
+"Profiles are fairly small, a few KB. To control memory usage, the profile"
+" expiration time\n"
"lessens as the number of profiles grows.\n"
-"Profiles are kept in memory until router shutdown, when they are written to disk.\n"
-"At startup, the profiles are read so the router need not reinitialize all profiles,\n"
-"thus allowing a router to quickly re-integrate into the network after startup."
+"Profiles are kept in memory until router shutdown, when they are written "
+"to disk.\n"
+"At startup, the profiles are read so the router need not reinitialize all"
+" profiles,\n"
+"thus allowing a router to quickly re-integrate into the network after "
+"startup."
msgstr ""
#: i2p2www/pages/site/docs/how/peer-selection.html:85
@@ -7793,8 +9947,10 @@ msgstr ""
#: i2p2www/pages/site/docs/how/peer-selection.html:86
msgid ""
"While the profiles themselves can be considered a summary of a peer's \n"
-"performance, to allow for effective peer selection we break each summary down \n"
-"into four simple values, representing the peer's speed, its capacity, how well \n"
+"performance, to allow for effective peer selection we break each summary "
+"down \n"
+"into four simple values, representing the peer's speed, its capacity, how"
+" well \n"
"integrated into the network it is, and whether it is failing."
msgstr ""
@@ -7806,7 +9962,8 @@ msgstr ""
msgid ""
"The speed calculation\n"
"simply goes through the profile and estimates how much data we can\n"
-"send or receive on a single tunnel through the peer in a minute. For this estimate it just looks at\n"
+"send or receive on a single tunnel through the peer in a minute. For "
+"this estimate it just looks at\n"
"performance in the previous minute."
msgstr ""
@@ -7818,11 +9975,13 @@ msgstr ""
msgid ""
"The capacity calculation\n"
"simply goes through the profile and estimates how many tunnels the peer\n"
-"would agree to participate in over a given time period. For this estimate it looks at \n"
+"would agree to participate in over a given time period. For this "
+"estimate it looks at \n"
"how many tunnel build requests\n"
"the peer has accepted, rejected, and dropped, and how many\n"
"of the agreed-to tunnels later failed.\n"
-"While the calculation is time-weighted so that recent activity counts more than later activity,\n"
+"While the calculation is time-weighted so that recent activity counts "
+"more than later activity,\n"
"statistics up to 48 hours old may be included."
msgstr ""
@@ -7830,8 +9989,10 @@ msgstr ""
msgid ""
"Recognizing and avoiding unreliable and unreachable\n"
"peers is critically important.\n"
-"Unfortunately, as the tunnel building and testing require the participation of several peers,\n"
-"it is difficult to positively identify the cause of a dropped build request or test failure.\n"
+"Unfortunately, as the tunnel building and testing require the "
+"participation of several peers,\n"
+"it is difficult to positively identify the cause of a dropped build "
+"request or test failure.\n"
"The router assigns a probability of failure to each of the\n"
"peers, and uses that probability in the capacity calculation.\n"
"Drops and test failures are weighted much higher than rejections."
@@ -7843,8 +10004,10 @@ msgstr ""
#: i2p2www/pages/site/docs/how/peer-selection.html:124
msgid ""
-"As mentioned above, we drill through each peer's profile to come up with a \n"
-"few key calculations, and based upon those, we organize each peer into three\n"
+"As mentioned above, we drill through each peer's profile to come up with "
+"a \n"
+"few key calculations, and based upon those, we organize each peer into "
+"three\n"
"groups - fast, high capacity, and standard."
msgstr ""
@@ -7854,13 +10017,15 @@ msgstr ""
#: i2p2www/pages/site/docs/how/peer-selection.html:134
msgid ""
-"A peer is considered \"high capacity\" if its capacity calculation meets or \n"
+"A peer is considered \"high capacity\" if its capacity calculation meets "
+"or \n"
"exceeds the median of all peers."
msgstr ""
#: i2p2www/pages/site/docs/how/peer-selection.html:138
msgid ""
-"A peer is considered \"fast\" if they are already \"high capacity\" and their \n"
+"A peer is considered \"fast\" if they are already \"high capacity\" and "
+"their \n"
"speed calculation meets or exceeds the median of all peers."
msgstr ""
@@ -7886,20 +10051,25 @@ msgstr ""
#: i2p2www/pages/site/docs/how/peer-selection.html:156
msgid ""
"The fast group is limited to 30 peers.\n"
-"If there would be more, only the ones with the highest speed rating are placed in the group."
+"If there would be more, only the ones with the highest speed rating are "
+"placed in the group."
msgstr ""
#: i2p2www/pages/site/docs/how/peer-selection.html:160
msgid ""
-"The high capacity group is limited to 75 peers (including the fast group)\n"
-"If there would be more, only the ones with the highest capacity rating are placed in the group."
+"The high capacity group is limited to 75 peers (including the fast group)"
+"\n"
+"If there would be more, only the ones with the highest capacity rating "
+"are placed in the group."
msgstr ""
#: i2p2www/pages/site/docs/how/peer-selection.html:164
msgid ""
-"The standard group has no fixed limit, but is somewhat smaller than the number of RouterInfos\n"
+"The standard group has no fixed limit, but is somewhat smaller than the "
+"number of RouterInfos\n"
"stored in the local network database.\n"
-"On an active router in today's network, there may be about 1000 RouterInfos and 500 peer profiles\n"
+"On an active router in today's network, there may be about 1000 "
+"RouterInfos and 500 peer profiles\n"
"(including those in the fast and high capacity groups)"
msgstr ""
@@ -7915,15 +10085,16 @@ msgstr ""
#: i2p2www/pages/site/docs/how/peer-selection.html:177
msgid ""
-"The groups tend to be fairly stable, that is, there is not much \"churn\" in the rankings\n"
+"The groups tend to be fairly stable, that is, there is not much \"churn\""
+" in the rankings\n"
"at each recalculation.\n"
-"Peers in the fast and high capacity groups get more tunnels build through them, which increases their speed and capacity ratings,\n"
+"Peers in the fast and high capacity groups get more tunnels build through"
+" them, which increases their speed and capacity ratings,\n"
"which reinforces their presence in the group."
msgstr ""
#: i2p2www/pages/site/docs/how/peer-selection.html:188
-msgid ""
-"The router selects peers from the above groups to build tunnels through."
+msgid "The router selects peers from the above groups to build tunnels through."
msgstr ""
#: i2p2www/pages/site/docs/how/peer-selection.html:193
@@ -7932,17 +10103,28 @@ msgstr ""
#: i2p2www/pages/site/docs/how/peer-selection.html:194
msgid ""
-"Client tunnels are used for application traffic, such as for HTTP proxies "
-"and web servers."
+"Client tunnels are used for application traffic, such as for HTTP proxies"
+" and web servers."
msgstr ""
#: i2p2www/pages/site/docs/how/peer-selection.html:198
msgid ""
-"To reduce the susceptibility to some attacks,\n"
+"To reduce the susceptibility to some attacks,\n"
"and increase performance,\n"
-"peers for building client tunnels are chosen randomly from the smallest group, which is the \"fast\" group.\n"
-"There is no bias toward selecting peers that were previously participants in a tunnel for the same client."
-msgstr "Pour réduire la sensibilité à certaines attaques,\net augmenter la performance\nles pairs pour construire des tunnels de client sont choisis aléatoirement à partir du groupe le plus petit, qui est le groupe \"rapide\".\nIl n'y a aucun biais à sélectionner des pairs qui étaient précédemment des participants à un tunnel pour le même client."
+"peers for building client tunnels are chosen randomly from the smallest "
+"group, which is the \"fast\" group.\n"
+"There is no bias toward selecting peers that were previously participants"
+" in a tunnel for the same client."
+msgstr ""
+"Pour réduire la sensibilité à certaines attaques,\n"
+"et augmenter la performance\n"
+"les pairs pour construire des tunnels de client sont choisis "
+"aléatoirement à partir du groupe le plus petit, qui est le groupe "
+"\"rapide\".\n"
+"Il n'y a aucun biais à sélectionner des pairs qui étaient précédemment "
+"des participants à un tunnel pour le même client."
#: i2p2www/pages/site/docs/how/peer-selection.html:206
msgid "Peer Selection for Exploratory Tunnels"
@@ -7950,26 +10132,45 @@ msgstr ""
#: i2p2www/pages/site/docs/how/peer-selection.html:207
msgid ""
-"Exploratory tunnels are used for router administrative purposes, such as network database traffic\n"
+"Exploratory tunnels are used for router administrative purposes, such as "
+"network database traffic\n"
"and testing client tunnels.\n"
-"Exploratory tunnels are also used to contact previously unconnected routers, which is why\n"
+"Exploratory tunnels are also used to contact previously unconnected "
+"routers, which is why\n"
"they are called \"exploratory\".\n"
"These tunnels are usually low-bandwidth."
msgstr ""
#: i2p2www/pages/site/docs/how/peer-selection.html:215
msgid ""
-"Peers for building exploratory tunnels are generally chosen randomly from the standard group.\n"
-"If the success rate of these build attempts is low compared to the client tunnel build success rate,\n"
-"the router will select a weighted average of peers randomly from the high capacity group instead.\n"
-"This helps maintain a satisfactory build success rate even when network performance is poor.\n"
-"There is no bias toward selecting peers that were previously participants in an exploratory tunnel."
-msgstr "Les pairs pour construire des tunnels exploratoires sont généralement choisis aléatoirement à partir du groupe standard.\nSi le taux de réussite de ces tentatives de construction est bas comparé au taux de réussite de construction de tunnel de client,\nau lieu de cela le routeur choisira une moyenne pondérée de pairs aléatoires à partir du groupe de haute capacité.\nCela aide à maintenir un taux de réussite de construction satisfaisant même quand la performance du réseau est pauvre.\nIl n'y a aucun biais à sélectionner des pairs qui étaient précédemment des participants à un tunnel exploratoire."
+"Peers for building exploratory tunnels are generally chosen randomly from"
+" the standard group.\n"
+"If the success rate of these build attempts is low compared to the client"
+" tunnel build success rate,\n"
+"the router will select a weighted average of peers randomly from the high"
+" capacity group instead.\n"
+"This helps maintain a satisfactory build success rate even when network "
+"performance is poor.\n"
+"There is no bias toward selecting peers that were previously participants"
+" in an exploratory tunnel."
+msgstr ""
+"Les pairs pour construire des tunnels exploratoires sont généralement "
+"choisis aléatoirement à partir du groupe standard.\n"
+"Si le taux de réussite de ces tentatives de construction est bas comparé "
+"au taux de réussite de construction de tunnel de client,\n"
+"au lieu de cela le routeur choisira une moyenne pondérée de pairs "
+"aléatoires à partir du groupe de haute capacité.\n"
+"Cela aide à maintenir un taux de réussite de construction satisfaisant "
+"même quand la performance du réseau est pauvre.\n"
+"Il n'y a aucun biais à sélectionner des pairs qui étaient précédemment "
+"des participants à un tunnel exploratoire."
#: i2p2www/pages/site/docs/how/peer-selection.html:223
msgid ""
-"As the standard group includes a very large subset of all peers the router knows about,\n"
-"exploratory tunnels are essentially built through a random selection of all peers,\n"
+"As the standard group includes a very large subset of all peers the "
+"router knows about,\n"
+"exploratory tunnels are essentially built through a random selection of "
+"all peers,\n"
"until the build success rate becomes too low."
msgstr ""
@@ -7979,8 +10180,8 @@ msgstr ""
#: i2p2www/pages/site/docs/how/peer-selection.html:232
msgid ""
-"To prevent some simple attacks, and for performance, there are the following"
-" restrictions:"
+"To prevent some simple attacks, and for performance, there are the "
+"following restrictions:"
msgstr ""
#: i2p2www/pages/site/docs/how/peer-selection.html:236
@@ -7989,8 +10190,8 @@ msgstr ""
#: i2p2www/pages/site/docs/how/peer-selection.html:239
msgid ""
-"A peer may participate in a maximum of 33% of all tunnels created by the"
-" router."
+"A peer may participate in a maximum of 33% of all tunnels created by "
+"the router."
msgstr ""
#: i2p2www/pages/site/docs/how/peer-selection.html:242
@@ -8011,18 +10212,18 @@ msgid ""
"Peers are ordered within tunnels to\n"
"to deal with the predecessor attack\n"
"(2008 update).\n"
-"More information is on the tunnel page."
+"More information is on the tunnel "
+"page."
msgstr ""
#: i2p2www/pages/site/docs/how/peer-selection.html:268
-msgid ""
-"Continue to analyze an tune speed and capacity calculations as necessary"
+msgid "Continue to analyze an tune speed and capacity calculations as necessary"
msgstr ""
#: i2p2www/pages/site/docs/how/peer-selection.html:271
msgid ""
-"Implement a more aggressive ejection strategy if necessary to control memory"
-" usage as the network grows"
+"Implement a more aggressive ejection strategy if necessary to control "
+"memory usage as the network grows"
msgstr ""
#: i2p2www/pages/site/docs/how/peer-selection.html:274
@@ -8037,8 +10238,10 @@ msgstr ""
#, python-format
msgid ""
"For those reading the paper\n"
-"Peer Profiling and Selection in the I2P Anonymous Network,\n"
-"please keep in mind the following minor changes in I2P since the paper's publication:"
+"Peer Profiling and Selection in the I2P Anonymous "
+"Network,\n"
+"please keep in mind the following minor changes in I2P since the paper's "
+"publication:"
msgstr ""
#: i2p2www/pages/site/docs/how/peer-selection.html:289
@@ -8112,23 +10315,31 @@ msgstr "Cryptographie"
#: i2p2www/pages/site/docs/how/tech-intro.html:25
msgid ""
"I2P is a scalable, self organizing, resilient packet switched anonymous \n"
-"network layer, upon which any number of different anonymity or security conscious \n"
-"applications can operate. Each of these applications may make their own anonymity, \n"
-"latency, and throughput tradeoffs without worrying about the proper implementation \n"
-"of a free route mixnet, allowing them to blend their activity with the larger \n"
+"network layer, upon which any number of different anonymity or security "
+"conscious \n"
+"applications can operate. Each of these applications may make their own "
+"anonymity, \n"
+"latency, and throughput tradeoffs without worrying about the proper "
+"implementation \n"
+"of a free route mixnet, allowing them to blend their activity with the "
+"larger \n"
"anonymity set of users already running on top of I2P."
msgstr ""
#: i2p2www/pages/site/docs/how/tech-intro.html:34
msgid ""
-"Applications available already provide the full range of typical Internet activities -\n"
+"Applications available already provide the full range of typical Internet"
+" activities -\n"
"anonymous web browsing, web hosting, chat, file sharing, e-mail,\n"
-"blogging and content syndication, newsgroups, as well as several other applications under development."
+"blogging and content syndication, newsgroups, as well as several other "
+"applications under development."
msgstr ""
#: i2p2www/pages/site/docs/how/tech-intro.html:40
msgid "Web browsing: using any existing browser that supports using a proxy."
-msgstr "Navigation sur le Web : en utilisation n'importe quel navigateur existant qui soutient l'utilisation d'un proxy."
+msgstr ""
+"Navigation sur le Web : en utilisation n'importe quel navigateur existant"
+" qui soutient l'utilisation d'un proxy."
#: i2p2www/pages/site/docs/how/tech-intro.html:41
msgid "Chat: IRC, Jabber, I2P-Messenger."
@@ -8136,79 +10347,160 @@ msgstr "Tchat: IRC, Jabber, I2P-Messenger."
#: i2p2www/pages/site/docs/how/tech-intro.html:42
msgid ""
-"File sharing: I2PSnark, Robert, iMule, \n"
-"I2Phex, PyBit, I2P-bt\n"
+"File sharing: I2PSnark, Robert, iMule, \n"
+"I2Phex, PyBit, I2P-bt\n"
"and others."
-msgstr "Partage de fichiers : I2PSnark, Robert, iMule, \nI2Phex, PyBit, I2P-bt\net autres."
+msgstr ""
+"Partage de fichiers : I2PSnark, Robert, iMule, \n"
+"I2Phex, PyBit, I2P-bt\n"
+"et autres."
#: i2p2www/pages/site/docs/how/tech-intro.html:47
msgid ""
"E-mail: susimail and I2P-Bote."
-msgstr "E-mail: susimail et I2P-Bote."
+msgstr ""
+"E-mail: susimail et I2P-Bote."
#: i2p2www/pages/site/docs/how/tech-intro.html:48
msgid ""
-"Blog: using e.g. the pebble plugin or the distributed blogging software Syndie."
-msgstr "Blog : par exemple en utilisant le plug-in pebble ou le logiciel de blog distribué Syndie."
+"Blog: using e.g. the pebble plugin or the distributed blogging software "
+"Syndie."
+msgstr ""
+"Blog : par exemple en utilisant le plug-in pebble ou le logiciel de blog "
+"distribué Syndie."
#: i2p2www/pages/site/docs/how/tech-intro.html:49
msgid ""
-"Distributed Data Store: Save your data redundantly in the Tahoe-LAFS cloud "
-"over I2P."
-msgstr "Magasin de données distribué : sauvegardez vos données de façon redondante dans le nuage Tahoe-LAFS par dessus I2P."
+"Distributed Data Store: Save your data redundantly in the Tahoe-LAFS "
+"cloud over I2P."
+msgstr ""
+"Magasin de données distribué : sauvegardez vos données de façon "
+"redondante dans le nuage Tahoe-LAFS par dessus I2P."
#: i2p2www/pages/site/docs/how/tech-intro.html:50
msgid "Newsgroups: using any newsgroup reader that supports using a proxy."
-msgstr "Newsgroups : en utilisant n'importe quel lecteur de newsgroups supportant l'utilisation d'un proxy."
+msgstr ""
+"Newsgroups : en utilisant n'importe quel lecteur de newsgroups supportant"
+" l'utilisation d'un proxy."
#: i2p2www/pages/site/docs/how/tech-intro.html:53
msgid ""
-"Unlike web sites hosted within content distribution networks like Freenet \n"
-"or GNUnet, the services hosted on \n"
-"I2P are fully interactive - there are traditional web-style search engines, \n"
-"bulletin boards, blogs you can comment on, database driven sites, and bridges \n"
-"to query static systems like Freenet without needing to install it locally."
-msgstr "Contrairement aux sites Web hébergés dans les réseaux de diffusion de contenus tels que Freenet\nou GNUnet, les services hébergés dans\nI2P sont entièrement interactifs - il y a des moteurs de recherche de style Web traditionnel,\ndes forums, des blogs sur lesquels vous pouvez laisser des commentaires, des sites conduits par base de données, et des ponts\nvers des systèmes de requêtes statiques tels que Freenet sans devoir l'installer localement."
+"Unlike web sites hosted within content distribution networks like Freenet \n"
+"or GNUnet, the services "
+"hosted on \n"
+"I2P are fully interactive - there are traditional web-style search "
+"engines, \n"
+"bulletin boards, blogs you can comment on, database driven sites, and "
+"bridges \n"
+"to query static systems like Freenet without needing to install it "
+"locally."
+msgstr ""
+"Contrairement aux sites Web hébergés dans les réseaux de diffusion de "
+"contenus tels que Freenet\n"
+"ou GNUnet, les services "
+"hébergés dans\n"
+"I2P sont entièrement interactifs - il y a des moteurs de recherche de "
+"style Web traditionnel,\n"
+"des forums, des blogs sur lesquels vous pouvez laisser des commentaires, "
+"des sites conduits par base de données, et des ponts\n"
+"vers des systèmes de requêtes statiques tels que Freenet sans devoir "
+"l'installer localement."
#: i2p2www/pages/site/docs/how/tech-intro.html:61
msgid ""
"With all of these anonymity enabled applications, I2P takes on the role \n"
-"of the message oriented middleware - applications say that they want to send \n"
-"some data to a cryptographic identifier (a \"destination\") and I2P takes care \n"
-"of making sure it gets there securely and anonymously. I2P also bundles a \n"
-"simple streaming library to allow I2P's anonymous \n"
-"best-effort messages to transfer as reliable, in-order streams, transparently \n"
-"offering a TCP based congestion control algorithm tuned for the high bandwidth \n"
-"delay product of the network. While there have been several simple SOCKS proxies \n"
-"available to tie existing applications into the network, their value has been \n"
-"limited as nearly every application routinely exposes what, in an anonymous \n"
-"context, is sensitive information. The only safe way to go is to fully audit \n"
-"an application to ensure proper operation and to assist in that we provide \n"
-"a series of APIs in various languages which can be used to make the most out \n"
+"of the message oriented middleware - applications say that they want to "
+"send \n"
+"some data to a cryptographic identifier (a \"destination\") and I2P takes"
+" care \n"
+"of making sure it gets there securely and anonymously. I2P also bundles a"
+" \n"
+"simple streaming library to allow I2P's "
+"anonymous \n"
+"best-effort messages to transfer as reliable, in-order streams, "
+"transparently \n"
+"offering a TCP based congestion control algorithm tuned for the high "
+"bandwidth \n"
+"delay product of the network. While there have been several simple SOCKS "
+"proxies \n"
+"available to tie existing applications into the network, their value has "
+"been \n"
+"limited as nearly every application routinely exposes what, in an "
+"anonymous \n"
+"context, is sensitive information. The only safe way to go is to fully "
+"audit \n"
+"an application to ensure proper operation and to assist in that we "
+"provide \n"
+"a series of APIs in various languages which can be used to make the most "
+"out \n"
"of the network."
msgstr ""
#: i2p2www/pages/site/docs/how/tech-intro.html:78
#, python-format
msgid ""
-"I2P is not a research project - academic, commercial, or governmental, but \n"
-"is instead an engineering effort aimed at doing whatever is necessary to provide \n"
-"a sufficient level of anonymity to those who need it. It has been in active \n"
-"development since early 2003 with one full time developer and a dedicated \n"
-"group of part time contributors from all over the world. All of the work done \n"
-"on I2P is open source and freely available on the website, \n"
-"with the majority of the code released outright into the public domain, though \n"
-"making use of a few cryptographic routines under BSD-style licenses. The people \n"
-"working on I2P do not control what people release client applications under, \n"
-"and there are several GPL'ed applications available (I2PTunnel, \n"
-"susimail, I2PSnark, I2P-Bote, \n"
+"I2P is not a research project - academic, commercial, or governmental, "
+"but \n"
+"is instead an engineering effort aimed at doing whatever is necessary to "
+"provide \n"
+"a sufficient level of anonymity to those who need it. It has been in "
+"active \n"
+"development since early 2003 with one full time developer and a dedicated"
+" \n"
+"group of part time contributors from all over the world. All of the work "
+"done \n"
+"on I2P is open source and freely available on the website, \n"
+"with the majority of the code released outright into the public domain, "
+"though \n"
+"making use of a few cryptographic routines under BSD-style licenses. The "
+"people \n"
+"working on I2P do not control what people release client applications "
+"under, \n"
+"and there are several GPL'ed applications available (I2PTunnel, \n"
+"susimail, I2PSnark, I2P-"
+"Bote, \n"
"I2Phex and others.).\n"
-"Funding for I2P comes entirely from donations,\n"
+"Funding for I2P comes entirely from "
+"donations,\n"
"and does not receive any tax breaks in any jurisdiction at this time,\n"
"as many of the developers are themselves anonymous."
-msgstr "I2P n'est pas un projet de recherche - universitaire, commercial, ou gouvernemental, mais \nau lieu de cela il est un effort d'ingénierie visant à faire indépendamment de ceux-ci ce qui nécessaire afin de fournir \nun niveau suffisant d'anonymat à ceux qui en ont besoin. Il a été en développement actif depuis le début de 2003 avec un développeur à plein temps et un groupe de collaborateurs consacrés à temps partiel issus du monde entier. Tout le travail fait sur le code source libre d'I2P est librement disponible sur le site web,\navec la majorité du code sorti sans réserve dans le domaine public, quoique \nfaisant usage de quelques routines de chiffrement conformément sous licences BSD-style. Les gens\ntravaillant sur I2P ne contrôlent pas ce que les gens sortent comme applications clientes dessous,\net il y a plusieurs applications en GPL disponibles (I2PTunnel, \nsusimail, I2PSnark, I2P-Bote, \nI2Phex et autres.).\nLe financement de I2P vient entièrement de donations\net ne reçoit pas d'exemptions fiscales dans aucune juridiction en ce moment,\ncar nombre de développeurs sont anonyme."
+msgstr ""
+"I2P n'est pas un projet de recherche - universitaire, commercial, ou "
+"gouvernemental, mais \n"
+"au lieu de cela il est un effort d'ingénierie visant à faire "
+"indépendamment de ceux-ci ce qui nécessaire afin de fournir \n"
+"un niveau suffisant d'anonymat à ceux qui en ont besoin. Il a été en "
+"développement actif depuis le début de 2003 avec un développeur à plein "
+"temps et un groupe de collaborateurs consacrés à temps partiel issus du "
+"monde entier. Tout le travail fait sur le code source libre d'I2P est "
+"librement disponible sur le site web,\n"
+"avec la majorité du code sorti sans réserve dans le domaine public, "
+"quoique \n"
+"faisant usage de quelques routines de chiffrement conformément sous "
+"licences BSD-style. Les gens\n"
+"travaillant sur I2P ne contrôlent pas ce que les gens sortent comme "
+"applications clientes dessous,\n"
+"et il y a plusieurs applications en GPL disponibles (I2PTunnel, \n"
+"susimail, I2PSnark, I2P-"
+"Bote, \n"
+"I2Phex et autres.).\n"
+"Le financement de I2P vient entièrement de"
+" donations\n"
+"et ne reçoit pas d'exemptions fiscales dans aucune juridiction en ce "
+"moment,\n"
+"car nombre de développeurs sont anonyme."
#: i2p2www/pages/site/docs/how/tech-intro.html:96
msgid "Operation"
@@ -8216,27 +10508,40 @@ msgstr ""
#: i2p2www/pages/site/docs/how/tech-intro.html:98
msgid ""
-"To understand I2P's operation, it is essential to understand a few key concepts. \n"
-"First, I2P makes a strict separation between the software participating in \n"
-"the network (a \"router\") and the anonymous endpoints (\"destinations\") associated \n"
-"with individual applications. The fact that someone is running I2P is not \n"
-"usually a secret. What is hidden is information on what the user is doing, \n"
-"if anything at all, as well as what router a particular destination is connected \n"
-"to. End users will typically have several local destinations on their router \n"
-"- for instance, one proxying in to IRC servers, another supporting the user's \n"
-"anonymous webserver (\"eepsite\"), another for an I2Phex instance, another for \n"
+"To understand I2P's operation, it is essential to understand a few key "
+"concepts. \n"
+"First, I2P makes a strict separation between the software participating "
+"in \n"
+"the network (a \"router\") and the anonymous endpoints (\"destinations\")"
+" associated \n"
+"with individual applications. The fact that someone is running I2P is not"
+" \n"
+"usually a secret. What is hidden is information on what the user is "
+"doing, \n"
+"if anything at all, as well as what router a particular destination is "
+"connected \n"
+"to. End users will typically have several local destinations on their "
+"router \n"
+"- for instance, one proxying in to IRC servers, another supporting the "
+"user's \n"
+"anonymous webserver (\"eepsite\"), another for an I2Phex instance, "
+"another for \n"
"torrents, etc."
msgstr ""
#: i2p2www/pages/site/docs/how/tech-intro.html:111
msgid ""
"Another critical concept to understand is the \"tunnel\".\n"
-"A tunnel is a directed path through an explicitly selected list of routers.\n"
-"Layered encryption is used, so each of the routers can only decrypt a single layer.\n"
+"A tunnel is a directed path through an explicitly selected list of "
+"routers.\n"
+"Layered encryption is used, so each of the routers can only decrypt a "
+"single layer.\n"
"The decrypted information contains the IP of the next router, along with\n"
"the encrypted information to be forwarded.\n"
-"Each tunnel has a starting point (the first router, also known as \"gateway\")\n"
-"and an end point. Messages can be sent only in one way. To send messages back,\n"
+"Each tunnel has a starting point (the first router, also known as "
+"\"gateway\")\n"
+"and an end point. Messages can be sent only in one way. To send messages "
+"back,\n"
"another tunnel is required."
msgstr ""
@@ -8256,12 +10561,15 @@ msgid ""
"while \"inbound\" tunnels bring messages to the tunnel creator.\n"
"Combining these two tunnels allows users to send messages to each other.\n"
"The sender (\"Alice\" in the above image) sets up an outbound tunnel,\n"
-"while the receiver (\"Bob\" in the above image) creates an inbound tunnel.\n"
-"The gateway of an inbound tunnel can receive messages from any other user\n"
+"while the receiver (\"Bob\" in the above image) creates an inbound "
+"tunnel.\n"
+"The gateway of an inbound tunnel can receive messages from any other user"
+"\n"
"and will send them on until the endpoint (\"Bob\").\n"
"The endpoint of the outbound tunnel will need to send the message\n"
"on to the gateway of the inbound tunnel.\n"
-"To do this, the sender (\"Alice\") adds instructions to her encrypted message.\n"
+"To do this, the sender (\"Alice\") adds instructions to her encrypted "
+"message.\n"
"Once the endpoint of the outbound tunnel decrypts the message,\n"
"it will have instructions to forward the message to the correct\n"
"inbound gateway (the gateway to \"Bob\")."
@@ -8269,19 +10577,25 @@ msgstr ""
#: i2p2www/pages/site/docs/how/tech-intro.html:144
msgid ""
-"A third critical concept to understand is I2P's \"network database\" (or \"netDb\") \n"
-"- a pair of algorithms used to share network metadata. The two types of metadata \n"
-"carried are \"routerInfo\" and \"leaseSets\" - the routerInfo gives routers the \n"
-"data necessary for contacting a particular router (their public keys, transport \n"
-"addresses, etc), while the leaseSet gives routers the information necessary \n"
-"for contacting a particular destination. A leaseSet contains a number of \"leases\".\n"
-"Each of this leases specifies a tunnel gateway, which allows reaching a specific destination.\n"
+"A third critical concept to understand is I2P's \"network "
+"database\" (or \"netDb\") \n"
+"- a pair of algorithms used to share network metadata. The two types of "
+"metadata \n"
+"carried are \"routerInfo\" and \"leaseSets\" - the "
+"routerInfo gives routers the \n"
+"data necessary for contacting a particular router (their public keys, "
+"transport \n"
+"addresses, etc), while the leaseSet gives routers the information "
+"necessary \n"
+"for contacting a particular destination. A leaseSet contains a number of "
+"\"leases\".\n"
+"Each of this leases specifies a tunnel gateway, which allows reaching a "
+"specific destination.\n"
"The full information contained in a lease:"
msgstr ""
#: i2p2www/pages/site/docs/how/tech-intro.html:155
-msgid ""
-"Inbound gateway for a tunnel that allows reaching a specific destination."
+msgid "Inbound gateway for a tunnel that allows reaching a specific destination."
msgstr ""
#: i2p2www/pages/site/docs/how/tech-intro.html:156
@@ -8296,8 +10610,10 @@ msgstr ""
#: i2p2www/pages/site/docs/how/tech-intro.html:159
msgid ""
-"Routers themselves send their routerInfo to the netDb directly, while leaseSets are sent through outbound tunnels\n"
-"(leaseSets need to be sent anonymously, to avoid correlating a router with his leaseSets)."
+"Routers themselves send their routerInfo to the netDb directly, while "
+"leaseSets are sent through outbound tunnels\n"
+"(leaseSets need to be sent anonymously, to avoid correlating a router "
+"with his leaseSets)."
msgstr ""
#: i2p2www/pages/site/docs/how/tech-intro.html:164
@@ -8308,10 +10624,13 @@ msgstr ""
#: i2p2www/pages/site/docs/how/tech-intro.html:168
msgid ""
-"To build up her own inbound and outbound tunnels, Alice does a lookup in the netDb to collect routerInfo.\n"
+"To build up her own inbound and outbound tunnels, Alice does a lookup in "
+"the netDb to collect routerInfo.\n"
"This way, she gathers lists of peers she can use as hops in her tunnels.\n"
-"She can then send a build message to the first hop, requesting the construction of a tunnel and asking\n"
-"that router to send the construction message onward, until the tunnel has been constructed."
+"She can then send a build message to the first hop, requesting the "
+"construction of a tunnel and asking\n"
+"that router to send the construction message onward, until the tunnel has"
+" been constructed."
msgstr ""
#: i2p2www/pages/site/docs/how/tech-intro.html:175
@@ -8328,19 +10647,30 @@ msgstr ""
#: i2p2www/pages/site/docs/how/tech-intro.html:182
msgid ""
-"When Alice wants to send a message to Bob, she first does a lookup in the \n"
-"netDb to find Bob's leaseSet, giving her his current inbound tunnel gateways. \n"
-"She then picks one of her outbound tunnels and sends the message down it with \n"
-"instructions for the outbound tunnel's endpoint to forward the message on \n"
-"to one of Bob's inbound tunnel gateways. When the outbound tunnel endpoint \n"
-"receives those instructions, it forwards the message as requested, and when \n"
-"Bob's inbound tunnel gateway receives it, it is forwarded down the tunnel \n"
-"to Bob's router. If Alice wants Bob to be able to reply to the message, she \n"
-"needs to transmit her own destination explicitly as part of the message itself.\n"
-"This can be done by introducing a higher-level layer, which is done in the\n"
+"When Alice wants to send a message to Bob, she first does a lookup in the"
+" \n"
+"netDb to find Bob's leaseSet, giving her his current inbound tunnel "
+"gateways. \n"
+"She then picks one of her outbound tunnels and sends the message down it "
+"with \n"
+"instructions for the outbound tunnel's endpoint to forward the message on"
+" \n"
+"to one of Bob's inbound tunnel gateways. When the outbound tunnel "
+"endpoint \n"
+"receives those instructions, it forwards the message as requested, and "
+"when \n"
+"Bob's inbound tunnel gateway receives it, it is forwarded down the tunnel"
+" \n"
+"to Bob's router. If Alice wants Bob to be able to reply to the message, "
+"she \n"
+"needs to transmit her own destination explicitly as part of the message "
+"itself.\n"
+"This can be done by introducing a higher-level layer, which is done in "
+"the\n"
"streaming library.\n"
"Alice may also cut down on the response time by bundling her most \n"
-"recent LeaseSet with the message so that Bob doesn't need to do a netDb lookup \n"
+"recent LeaseSet with the message so that Bob doesn't need to do a netDb "
+"lookup \n"
"for it when he wants to reply, but this is optional."
msgstr ""
@@ -8358,126 +10688,210 @@ msgstr ""
#: i2p2www/pages/site/docs/how/tech-intro.html:204
msgid ""
-"While the tunnels themselves have layered encryption to prevent unauthorized \n"
-"disclosure to peers inside the network (as the transport layer itself does \n"
-"to prevent unauthorized disclosure to peers outside the network), it is necessary \n"
-"to add an additional end to end layer of encryption to hide the message from \n"
-"the outbound tunnel endpoint and the inbound tunnel gateway. This \"garlic \n"
-"encryption\" lets Alice's router wrap up multiple messages into a single \n"
-"\"garlic message\", encrypted to a particular public key so that intermediary \n"
-"peers cannot determine either how many messages are within the garlic, what \n"
-"those messages say, or where those individual cloves are destined. For typical \n"
-"end to end communication between Alice and Bob, the garlic will be encrypted \n"
-"to the public key published in Bob's leaseSet, allowing the message to be \n"
+"While the tunnels themselves have layered encryption to prevent "
+"unauthorized \n"
+"disclosure to peers inside the network (as the transport layer itself "
+"does \n"
+"to prevent unauthorized disclosure to peers outside the network), it is "
+"necessary \n"
+"to add an additional end to end layer of encryption to hide the message "
+"from \n"
+"the outbound tunnel endpoint and the inbound tunnel gateway. This \"garlic \n"
+"encryption\" lets Alice's router wrap up multiple messages into a "
+"single \n"
+"\"garlic message\", encrypted to a particular public key so that "
+"intermediary \n"
+"peers cannot determine either how many messages are within the garlic, "
+"what \n"
+"those messages say, or where those individual cloves are destined. For "
+"typical \n"
+"end to end communication between Alice and Bob, the garlic will be "
+"encrypted \n"
+"to the public key published in Bob's leaseSet, allowing the message to be"
+" \n"
"encrypted without giving out the public key to Bob's own router."
msgstr ""
#: i2p2www/pages/site/docs/how/tech-intro.html:219
msgid ""
-"Another important fact to keep in mind is that I2P is entirely message based \n"
-"and that some messages may be lost along the way. Applications using I2P can \n"
-"use the message oriented interfaces and take care of their own congestion \n"
-"control and reliability needs, but most would be best served by reusing the \n"
-"provided streaming library to view I2P as a streams \n"
+"Another important fact to keep in mind is that I2P is entirely message "
+"based \n"
+"and that some messages may be lost along the way. Applications using I2P "
+"can \n"
+"use the message oriented interfaces and take care of their own congestion"
+" \n"
+"control and reliability needs, but most would be best served by reusing "
+"the \n"
+"provided streaming library to view I2P as "
+"a streams \n"
"based network."
msgstr ""
#: i2p2www/pages/site/docs/how/tech-intro.html:229
msgid ""
"Both inbound and outbound tunnels work along similar principles.\n"
-"The tunnel gateway accumulates a number of tunnel messages, eventually preprocessing \n"
-"them into something for tunnel delivery. Next, the gateway encrypts that preprocessed \n"
-"data and forwards it to the first hop. That peer and subsequent tunnel participants \n"
-"add on a layer of encryption after verifying that it isn't a duplicate before \n"
-"forward it on to the next peer. Eventually, the message arrives at the endpoint \n"
-"where the messages are split out again and forwarded on as requested. The \n"
-"difference arises in what the tunnel's creator does - for inbound tunnels, \n"
-"the creator is the endpoint and they simply decrypt all of the layers added, \n"
-"while for outbound tunnels, the creator is the gateway and they pre-decrypt \n"
-"all of the layers so that after all of the layers of per-hop encryption are \n"
+"The tunnel gateway accumulates a number of tunnel messages, eventually "
+"preprocessing \n"
+"them into something for tunnel delivery. Next, the gateway encrypts that "
+"preprocessed \n"
+"data and forwards it to the first hop. That peer and subsequent tunnel "
+"participants \n"
+"add on a layer of encryption after verifying that it isn't a duplicate "
+"before \n"
+"forward it on to the next peer. Eventually, the message arrives at the "
+"endpoint \n"
+"where the messages are split out again and forwarded on as requested. The"
+" \n"
+"difference arises in what the tunnel's creator does - for inbound "
+"tunnels, \n"
+"the creator is the endpoint and they simply decrypt all of the layers "
+"added, \n"
+"while for outbound tunnels, the creator is the gateway and they pre-"
+"decrypt \n"
+"all of the layers so that after all of the layers of per-hop encryption "
+"are \n"
"added, the message arrives in the clear at the tunnel endpoint."
msgstr ""
#: i2p2www/pages/site/docs/how/tech-intro.html:244
msgid ""
-"The choice of specific peers to pass on messages as well as their particular \n"
-"ordering is important to understanding both I2P's anonymity and performance \n"
-"characteristics. While the network database (below) has its own criteria for \n"
-"picking what peers to query and store entries on, tunnel creators may use any peers \n"
-"in the network in any order (and even any number of times) in a single tunnel. \n"
-"If perfect latency and capacity data were globally known, selection and ordering \n"
-"would be driven by the particular needs of the client in tandem with their \n"
-"threat model. Unfortunately, latency and capacity data is not trivial to gather \n"
-"anonymously, and depending upon untrusted peers to provide this information \n"
+"The choice of specific peers to pass on messages as well as their "
+"particular \n"
+"ordering is important to understanding both I2P's anonymity and "
+"performance \n"
+"characteristics. While the network database (below) has its own criteria "
+"for \n"
+"picking what peers to query and store entries on, tunnel creators may use"
+" any peers \n"
+"in the network in any order (and even any number of times) in a single "
+"tunnel. \n"
+"If perfect latency and capacity data were globally known, selection and "
+"ordering \n"
+"would be driven by the particular needs of the client in tandem with "
+"their \n"
+"threat model. Unfortunately, latency and capacity data is not trivial to "
+"gather \n"
+"anonymously, and depending upon untrusted peers to provide this "
+"information \n"
"has its own serious anonymity implications."
msgstr ""
#: i2p2www/pages/site/docs/how/tech-intro.html:257
msgid ""
-"From an anonymity perspective, the simplest technique would be to pick peers \n"
-"randomly from the entire network, order them randomly and use those peers \n"
-"in that order for all eternity. From a performance perspective, the simplest \n"
-"technique would be to pick the fastest peers with the necessary spare capacity, \n"
-"spreading the load across different peers to handle transparent failover, \n"
-"and to rebuild the tunnel whenever capacity information changes. While the \n"
-"former is both brittle and inefficient, the later requires inaccessible information \n"
-"and offers insufficient anonymity. I2P is instead working on offering a range \n"
-"of peer selection strategies, coupled with anonymity aware measurement code \n"
+"From an anonymity perspective, the simplest technique would be to pick "
+"peers \n"
+"randomly from the entire network, order them randomly and use those peers"
+" \n"
+"in that order for all eternity. From a performance perspective, the "
+"simplest \n"
+"technique would be to pick the fastest peers with the necessary spare "
+"capacity, \n"
+"spreading the load across different peers to handle transparent failover,"
+" \n"
+"and to rebuild the tunnel whenever capacity information changes. While "
+"the \n"
+"former is both brittle and inefficient, the later requires inaccessible "
+"information \n"
+"and offers insufficient anonymity. I2P is instead working on offering a "
+"range \n"
+"of peer selection strategies, coupled with anonymity aware measurement "
+"code \n"
"to organize the peers by their profiles."
msgstr ""
#: i2p2www/pages/site/docs/how/tech-intro.html:270
msgid ""
-"As a base, I2P is constantly profiling the peers with which it interacts \n"
-"with by measuring their indirect behavior - for instance, when a peer responds \n"
-"to a netDb lookup in 1.3 seconds, that round trip latency is recorded in the \n"
-"profiles for all of the routers involved in the two tunnels (inbound and outbound) \n"
-"through which the request and response passed, as well as the queried peer's \n"
-"profile. Direct measurement, such as transport layer latency or congestion, \n"
-"is not used as part of the profile, as it can be manipulated and associated \n"
-"with the measuring router, exposing them to trivial attacks. While gathering \n"
-"these profiles, a series of calculations are run on each to summarize its \n"
-"performance - its latency, capacity to handle lots of activity, whether they \n"
-"are currently overloaded, and how well integrated into the network they seem \n"
-"to be. These calculations are then compared for active peers to organize the \n"
-"routers into four tiers - fast and high capacity, high capacity, not failing, \n"
-"and failing. The thresholds for those tiers are determined dynamically, and \n"
+"As a base, I2P is constantly profiling the peers with which it interacts"
+" \n"
+"with by measuring their indirect behavior - for instance, when a peer "
+"responds \n"
+"to a netDb lookup in 1.3 seconds, that round trip latency is recorded in "
+"the \n"
+"profiles for all of the routers involved in the two tunnels (inbound and "
+"outbound) \n"
+"through which the request and response passed, as well as the queried "
+"peer's \n"
+"profile. Direct measurement, such as transport layer latency or "
+"congestion, \n"
+"is not used as part of the profile, as it can be manipulated and "
+"associated \n"
+"with the measuring router, exposing them to trivial attacks. While "
+"gathering \n"
+"these profiles, a series of calculations are run on each to summarize its"
+" \n"
+"performance - its latency, capacity to handle lots of activity, whether "
+"they \n"
+"are currently overloaded, and how well integrated into the network they "
+"seem \n"
+"to be. These calculations are then compared for active peers to organize "
+"the \n"
+"routers into four tiers - fast and high capacity, high capacity, not "
+"failing, \n"
+"and failing. The thresholds for those tiers are determined dynamically, "
+"and \n"
"while they currently use fairly simple algorithms, alternatives exist."
msgstr ""
#: i2p2www/pages/site/docs/how/tech-intro.html:288
msgid ""
-"Using this profile data, the simplest reasonable peer selection strategy \n"
-"is to pick peers randomly from the top tier (fast and high capacity), and \n"
-"this is currently deployed for client tunnels. Exploratory tunnels (used for \n"
-"netDb and tunnel management) pick peers randomly from the \"not failing\" tier \n"
-"(which includes routers in 'better' tiers as well), allowing the peer to sample \n"
-"routers more widely, in effect optimizing the peer selection through randomized \n"
-"hill climbing. These strategies alone do however leak information regarding \n"
-"the peers in the router's top tier through predecessor and netDb harvesting \n"
-"attacks. In turn, several alternatives exist which, while not balancing the \n"
-"load as evenly, will address the attacks mounted by particular classes of \n"
+"Using this profile data, the simplest reasonable peer selection strategy"
+" \n"
+"is to pick peers randomly from the top tier (fast and high capacity), and"
+" \n"
+"this is currently deployed for client tunnels. Exploratory tunnels (used "
+"for \n"
+"netDb and tunnel management) pick peers randomly from the \"not failing\""
+" tier \n"
+"(which includes routers in 'better' tiers as well), allowing the peer to "
+"sample \n"
+"routers more widely, in effect optimizing the peer selection through "
+"randomized \n"
+"hill climbing. These strategies alone do however leak information "
+"regarding \n"
+"the peers in the router's top tier through predecessor and netDb "
+"harvesting \n"
+"attacks. In turn, several alternatives exist which, while not balancing "
+"the \n"
+"load as evenly, will address the attacks mounted by particular classes of"
+" \n"
"adversaries."
msgstr ""
#: i2p2www/pages/site/docs/how/tech-intro.html:302
msgid ""
-"By picking a random key and ordering the peers according to their XOR distance \n"
-"from it, the information leaked is reduced in predecessor and harvesting attacks \n"
-"according to the peers' failure rate and the tier's churn. Another simple \n"
-"strategy for dealing with netDb harvesting attacks is to simply fix the inbound \n"
-"tunnel gateway(s) yet randomize the peers further on in the tunnels. To deal \n"
-"with predecessor attacks for adversaries which the client contacts, the outbound \n"
-"tunnel endpoints would also remain fixed. The selection of which peer to fix \n"
-"on the most exposed point would of course need to have a limit to the duration, \n"
-"as all peers fail eventually, so it could either be reactively adjusted or \n"
-"proactively avoided to mimic a measured mean time between failures of other \n"
-"routers. These two strategies can in turn be combined, using a fixed exposed \n"
-"peer and an XOR based ordering within the tunnels themselves. A more rigid \n"
-"strategy would fix the exact peers and ordering of a potential tunnel, only \n"
-"using individual peers if all of them agree to participate in the same way \n"
-"each time. This varies from the XOR based ordering in that the predecessor \n"
-"and successor of each peer is always the same, while the XOR only makes sure \n"
+"By picking a random key and ordering the peers according to their XOR "
+"distance \n"
+"from it, the information leaked is reduced in predecessor and harvesting "
+"attacks \n"
+"according to the peers' failure rate and the tier's churn. Another simple"
+" \n"
+"strategy for dealing with netDb harvesting attacks is to simply fix the "
+"inbound \n"
+"tunnel gateway(s) yet randomize the peers further on in the tunnels. To "
+"deal \n"
+"with predecessor attacks for adversaries which the client contacts, the "
+"outbound \n"
+"tunnel endpoints would also remain fixed. The selection of which peer to "
+"fix \n"
+"on the most exposed point would of course need to have a limit to the "
+"duration, \n"
+"as all peers fail eventually, so it could either be reactively adjusted "
+"or \n"
+"proactively avoided to mimic a measured mean time between failures of "
+"other \n"
+"routers. These two strategies can in turn be combined, using a fixed "
+"exposed \n"
+"peer and an XOR based ordering within the tunnels themselves. A more "
+"rigid \n"
+"strategy would fix the exact peers and ordering of a potential tunnel, "
+"only \n"
+"using individual peers if all of them agree to participate in the same "
+"way \n"
+"each time. This varies from the XOR based ordering in that the "
+"predecessor \n"
+"and successor of each peer is always the same, while the XOR only makes "
+"sure \n"
"their order doesn't change."
msgstr ""
@@ -8486,8 +10900,10 @@ msgstr ""
msgid ""
"As mentioned before, I2P currently (release 0.8) includes the tiered \n"
"random strategy above, with XOR-based ordering. A \n"
-"more detailed discussion of the mechanics involved in tunnel operation, management, \n"
-"and peer selection can be found in the tunnel spec."
+"more detailed discussion of the mechanics involved in tunnel operation, "
+"management, \n"
+"and peer selection can be found in the tunnel "
+"spec."
msgstr ""
#: i2p2www/pages/site/docs/how/tech-intro.html:330
@@ -8501,20 +10917,27 @@ msgstr ""
#: i2p2www/pages/site/docs/how/tech-intro.html:336
msgid ""
"A percentage of I2P users are appointed as 'floodfill peers'.\n"
-"Currently, I2P installations that have a lot of bandwidth and are fast enough,\n"
-"will appoint themselves as floodfill as soon as the number of existing floodfill routers\n"
+"Currently, I2P installations that have a lot of bandwidth and are fast "
+"enough,\n"
+"will appoint themselves as floodfill as soon as the number of existing "
+"floodfill routers\n"
"drops too low."
msgstr ""
#: i2p2www/pages/site/docs/how/tech-intro.html:343
#, python-format
msgid ""
-"Other I2P routers will store their data and lookup data by sending simple 'store' and 'lookup' queries to the floodfills.\n"
-"If a floodfill router receives a 'store' query, it will spread the information to other floodfill routers\n"
-"using the Kademlia algorithm.\n"
-"The 'lookup' queries currently function differently, to avoid an important\n"
+"Other I2P routers will store their data and lookup data by sending simple"
+" 'store' and 'lookup' queries to the floodfills.\n"
+"If a floodfill router receives a 'store' query, it will spread the "
+"information to other floodfill routers\n"
+"using the Kademlia "
+"algorithm.\n"
+"The 'lookup' queries currently function differently, to avoid an "
+"important\n"
"security issue.\n"
-"When a lookup is done, the floodfill router will not forward the lookup to other peers,\n"
+"When a lookup is done, the floodfill router will not forward the lookup "
+"to other peers,\n"
"but will always answer by itself (if it has the requested data)."
msgstr ""
@@ -8524,8 +10947,8 @@ msgstr ""
#: i2p2www/pages/site/docs/how/tech-intro.html:357
msgid ""
-"A RouterInfo stores information on a specific I2P router and how to "
-"contact it"
+"A RouterInfo stores information on a specific I2P router and how "
+"to contact it"
msgstr ""
#: i2p2www/pages/site/docs/how/tech-intro.html:358
@@ -8536,10 +10959,14 @@ msgstr ""
#: i2p2www/pages/site/docs/how/tech-intro.html:360
msgid ""
-"All of this information is signed by the publishing party and verified by any I2P router using or storing the information.\n"
-"In addition, the data contains timing information, to avoid storage of old entries and possible attacks.\n"
-"This is also why I2P bundles the necessary code for maintaining the correct time, occasionally querying some SNTP servers \n"
-"(the pool.ntp.org round robin by default)\n"
+"All of this information is signed by the publishing party and verified by"
+" any I2P router using or storing the information.\n"
+"In addition, the data contains timing information, to avoid storage of "
+"old entries and possible attacks.\n"
+"This is also why I2P bundles the necessary code for maintaining the "
+"correct time, occasionally querying some SNTP servers \n"
+"(the pool.ntp.org round robin by"
+" default)\n"
"and detecting skew between routers at the transport layer."
msgstr ""
@@ -8554,8 +10981,10 @@ msgstr ""
#: i2p2www/pages/site/docs/how/tech-intro.html:374
msgid ""
"One could only want specific people to be able to reach a destination.\n"
-"This is possible by not publishing the destination in the netDb. You will however have to transmit the destination by other means.\n"
-"An alternative are the 'encrypted leaseSets'. These leaseSets can only be decoded by people with access to the decryption key."
+"This is possible by not publishing the destination in the netDb. You will"
+" however have to transmit the destination by other means.\n"
+"An alternative are the 'encrypted leaseSets'. These leaseSets can only be"
+" decoded by people with access to the decryption key."
msgstr ""
#: i2p2www/pages/site/docs/how/tech-intro.html:381
@@ -8564,10 +10993,13 @@ msgstr ""
#: i2p2www/pages/site/docs/how/tech-intro.html:382
msgid ""
-"Bootstrapping the netDb is quite simple. Once a router manages to receive a single routerInfo of a reachable peer,\n"
+"Bootstrapping the netDb is quite simple. Once a router manages to receive"
+" a single routerInfo of a reachable peer,\n"
"it can query that router for references to other routers in the network.\n"
-"Currently, a number of users post their routerInfo files to a website to make this information available.\n"
-"I2P automatically connects to one of these websites to gather routerInfo files and bootstrap."
+"Currently, a number of users post their routerInfo files to a website to "
+"make this information available.\n"
+"I2P automatically connects to one of these websites to gather routerInfo "
+"files and bootstrap."
msgstr ""
#: i2p2www/pages/site/docs/how/tech-intro.html:390
@@ -8577,18 +11009,26 @@ msgstr ""
#: i2p2www/pages/site/docs/how/tech-intro.html:391
msgid ""
"Lookups in the I2P network are not forwarded to other netDb routers.\n"
-"Currently, this is not a major problem, since the network is not very large.\n"
-"However, as the network grows, not all routerInfo and leaseSet files will be present\n"
-"on each netDb router. This will cause a deterioration of the percentage of successful lookups.\n"
-"Because of this, refinements to the netDb will be done in the next releases."
+"Currently, this is not a major problem, since the network is not very "
+"large.\n"
+"However, as the network grows, not all routerInfo and leaseSet files will"
+" be present\n"
+"on each netDb router. This will cause a deterioration of the percentage "
+"of successful lookups.\n"
+"Because of this, refinements to the netDb will be done in the next "
+"releases."
msgstr ""
#: i2p2www/pages/site/docs/how/tech-intro.html:402
msgid ""
-"Communication between routers needs to provide confidentiality and integrity \n"
-"against external adversaries while authenticating that the router contacted \n"
-"is the one who should receive a given message. The particulars of how routers \n"
-"communicate with other routers aren't critical - three separate protocols \n"
+"Communication between routers needs to provide confidentiality and "
+"integrity \n"
+"against external adversaries while authenticating that the router "
+"contacted \n"
+"is the one who should receive a given message. The particulars of how "
+"routers \n"
+"communicate with other routers aren't critical - three separate protocols"
+" \n"
"have been used at different points to provide those bare necessities."
msgstr ""
@@ -8596,9 +11036,12 @@ msgstr ""
#, python-format
msgid ""
"I2P started with a TCP-based protocol which \n"
-"has since been disabled. Then, to accommodate the need for high degree communication \n"
-"(as a number of routers will end up speaking with many others), I2P moved \n"
-"from a TCP based transport to a UDP-based one - \"Secure \n"
+"has since been disabled. Then, to accommodate the need for high degree "
+"communication \n"
+"(as a number of routers will end up speaking with many others), I2P moved"
+" \n"
+"from a TCP based transport to a UDP-based one - "
+"\"Secure \n"
"Semireliable UDP\", or \"SSU\"."
msgstr ""
@@ -8610,32 +11053,46 @@ msgstr ""
#: i2p2www/pages/site/docs/how/tech-intro.html:422
msgid ""
"The goal of this protocol is to provide secure, authenticated, \n"
-"semireliable and unordered message delivery, exposing only a minimal amount \n"
-"of data easily discernible to third parties. It should support high degree \n"
-"communication as well as TCP-friendly congestion control and may include \n"
-"PMTU detection. It should be capable of efficiently moving bulk data at rates \n"
-"sufficient for home users. In addition, it should support techniques for addressing \n"
+"semireliable and unordered message delivery, exposing only a minimal "
+"amount \n"
+"of data easily discernible to third parties. It should support high "
+"degree \n"
+"communication as well as TCP-friendly congestion control and may include"
+" \n"
+"PMTU detection. It should be capable of efficiently moving bulk data at "
+"rates \n"
+"sufficient for home users. In addition, it should support techniques for "
+"addressing \n"
"network obstacles, like most NATs or firewalls."
msgstr ""
#: i2p2www/pages/site/docs/how/tech-intro.html:432
#, python-format
msgid ""
-"Following the introduction of SSU, after issues with congestion collapse \n"
-"appeared, a new NIO-based TCP transport called NTCP \n"
-"was implemented. It is enabled by default for outbound connections only. Those \n"
-"who configure their NAT/firewall to allow inbound connections and specify \n"
-"the external host and port (dyndns/etc is ok) on /config.jsp can receive inbound \n"
-"connections. As NTCP is NIO based, so it doesn't suffer from the 1 thread \n"
+"Following the introduction of SSU, after issues with congestion collapse"
+" \n"
+"appeared, a new NIO-based TCP transport called NTCP \n"
+"was implemented. It is enabled by default for outbound connections only. "
+"Those \n"
+"who configure their NAT/firewall to allow inbound connections and specify"
+" \n"
+"the external host and port (dyndns/etc is ok) on /config.jsp can receive "
+"inbound \n"
+"connections. As NTCP is NIO based, so it doesn't suffer from the 1 thread"
+" \n"
"per connection issues of the old TCP transport."
msgstr ""
#: i2p2www/pages/site/docs/how/tech-intro.html:442
msgid ""
"I2P supports multiple transports simultaneously. A particular transport \n"
-"for an outbound connection is selected with \"bids\". Each transport bids for \n"
-"the connection and the relative value of these bids assigns the priority. \n"
-"Transports may reply with different bids, depending on whether there is already \n"
+"for an outbound connection is selected with \"bids\". Each transport bids"
+" for \n"
+"the connection and the relative value of these bids assigns the priority."
+" \n"
+"Transports may reply with different bids, depending on whether there is "
+"already \n"
"an established connection to the peer."
msgstr ""
@@ -8643,25 +11100,38 @@ msgstr ""
#, python-format
msgid ""
"The current implementation ranks NTCP as the highest-priority transport \n"
-"for outbound connections in most situations. SSU is enabled for both outbound \n"
-"and inbound connections. Your firewall and your I2P router must be configured \n"
-"to allow inbound NTCP connections. For further information see the NTCP \n"
+"for outbound connections in most situations. SSU is enabled for both "
+"outbound \n"
+"and inbound connections. Your firewall and your I2P router must be "
+"configured \n"
+"to allow inbound NTCP connections. For further information see the NTCP \n"
"page."
msgstr ""
#: i2p2www/pages/site/docs/how/tech-intro.html:459
msgid ""
"A bare minimum set of cryptographic primitives are combined together to \n"
-"provide I2P's layered defenses against a variety of adversaries. At the lowest \n"
-"level, inter router communication is protected by the transport layer security \n"
-"- SSU encrypts each packet with AES256/CBC with both an explicit IV and MAC \n"
-"(HMAC-MD5-128) after agreeing upon an ephemeral session key through a 2048bit \n"
-"Diffie-Hellman exchange, station-to-station authentication with the other \n"
-"router's DSA key, plus each network message has their own hash for local integrity \n"
-"checking. Tunnel messages passed over the transports \n"
-"have their own layered AES256/CBC encryption with an explicit IV and verified \n"
-"at the tunnel endpoint with an additional SHA256 hash. Various other messages \n"
-"are passed along inside \"garlic messages\", which are encrypted with ElGamal/AES+SessionTags \n"
+"provide I2P's layered defenses against a variety of adversaries. At the "
+"lowest \n"
+"level, inter router communication is protected by the transport layer "
+"security \n"
+"- SSU encrypts each packet with AES256/CBC with both an explicit IV and "
+"MAC \n"
+"(HMAC-MD5-128) after agreeing upon an ephemeral session key through a "
+"2048bit \n"
+"Diffie-Hellman exchange, station-to-station authentication with the other"
+" \n"
+"router's DSA key, plus each network message has their own hash for local "
+"integrity \n"
+"checking. Tunnel messages passed over the "
+"transports \n"
+"have their own layered AES256/CBC encryption with an explicit IV and "
+"verified \n"
+"at the tunnel endpoint with an additional SHA256 hash. Various other "
+"messages \n"
+"are passed along inside \"garlic messages\", which are encrypted with "
+"ElGamal/AES+SessionTags \n"
"(explained below)."
msgstr ""
@@ -8671,31 +11141,51 @@ msgstr "Messages en ail"
#: i2p2www/pages/site/docs/how/tech-intro.html:475
msgid ""
-"Garlic messages are an extension of \"onion\" layered encryption, allowing \n"
-"the contents of a single message to contain multiple \"cloves\" - fully formed \n"
-"messages alongside their own instructions for delivery. Messages are wrapped \n"
-"into a garlic message whenever the message would otherwise be passing in cleartext \n"
-"through a peer who should not have access to the information - for instance, \n"
-"when a router wants to ask another router to participate in a tunnel, they \n"
-"wrap the request inside a garlic, encrypt that garlic to the receiving router's \n"
-"2048bit ElGamal public key, and forward it through a tunnel. Another example \n"
-"is when a client wants to send a message to a destination - the sender's router \n"
-"will wrap up that data message (alongside some other messages) into a garlic, \n"
-"encrypt that garlic to the 2048bit ElGamal public key published in the recipient's \n"
+"Garlic messages are an extension of \"onion\" layered encryption, "
+"allowing \n"
+"the contents of a single message to contain multiple \"cloves\" - fully "
+"formed \n"
+"messages alongside their own instructions for delivery. Messages are "
+"wrapped \n"
+"into a garlic message whenever the message would otherwise be passing in "
+"cleartext \n"
+"through a peer who should not have access to the information - for "
+"instance, \n"
+"when a router wants to ask another router to participate in a tunnel, "
+"they \n"
+"wrap the request inside a garlic, encrypt that garlic to the receiving "
+"router's \n"
+"2048bit ElGamal public key, and forward it through a tunnel. Another "
+"example \n"
+"is when a client wants to send a message to a destination - the sender's "
+"router \n"
+"will wrap up that data message (alongside some other messages) into a "
+"garlic, \n"
+"encrypt that garlic to the 2048bit ElGamal public key published in the "
+"recipient's \n"
"leaseSet, and forward it through the appropriate tunnels."
msgstr ""
#: i2p2www/pages/site/docs/how/tech-intro.html:490
msgid ""
-"The \"instructions\" attached to each clove inside the encryption layer includes \n"
-"the ability to request that the clove be forwarded locally, to a remote router, \n"
-"or to a remote tunnel on a remote router. There are fields in those instructions \n"
-"allowing a peer to request that the delivery be delayed until a certain time \n"
-"or condition has been met, though they won't be honored until the nontrivial \n"
-"delays are deployed. It is possible to explicitly route garlic messages \n"
-"any number of hops without building tunnels, or even to reroute tunnel messages \n"
-"by wrapping them in garlic messages and forwarding them a number of hops prior \n"
-"to delivering them to the next hop in the tunnel, but those techniques are \n"
+"The \"instructions\" attached to each clove inside the encryption layer "
+"includes \n"
+"the ability to request that the clove be forwarded locally, to a remote "
+"router, \n"
+"or to a remote tunnel on a remote router. There are fields in those "
+"instructions \n"
+"allowing a peer to request that the delivery be delayed until a certain "
+"time \n"
+"or condition has been met, though they won't be honored until the nontrivial \n"
+"delays are deployed. It is possible to explicitly route garlic "
+"messages \n"
+"any number of hops without building tunnels, or even to reroute tunnel "
+"messages \n"
+"by wrapping them in garlic messages and forwarding them a number of hops "
+"prior \n"
+"to delivering them to the next hop in the tunnel, but those techniques "
+"are \n"
"not currently used in the existing implementation."
msgstr ""
@@ -8705,35 +11195,54 @@ msgstr ""
#: i2p2www/pages/site/docs/how/tech-intro.html:504
msgid ""
-"As an unreliable, unordered, message based system, I2P uses a simple combination \n"
-"of asymmetric and symmetric encryption algorithms to provide data confidentiality \n"
-"and integrity to garlic messages. As a whole, the combination is referred \n"
-"to as ElGamal/AES+SessionTags, but that is an excessively verbose way to describe \n"
+"As an unreliable, unordered, message based system, I2P uses a simple "
+"combination \n"
+"of asymmetric and symmetric encryption algorithms to provide data "
+"confidentiality \n"
+"and integrity to garlic messages. As a whole, the combination is referred"
+" \n"
+"to as ElGamal/AES+SessionTags, but that is an excessively verbose way to "
+"describe \n"
"the simple use of 2048bit ElGamal, AES256, SHA256 and 32 byte nonces."
msgstr ""
#: i2p2www/pages/site/docs/how/tech-intro.html:543
msgid ""
-"Session tags themselves have a very short lifetime, after which they are \n"
-"discarded if not used. In addition, the quantity stored for each key is limited, \n"
-"as are the number of keys themselves - if too many arrive, either new or old \n"
-"messages may be dropped. The sender keeps track whether messages using session \n"
-"tags are getting through, and if there isn't sufficient communication it may \n"
-"drop the ones previously assumed to be properly delivered, reverting back \n"
+"Session tags themselves have a very short lifetime, after which they are"
+" \n"
+"discarded if not used. In addition, the quantity stored for each key is "
+"limited, \n"
+"as are the number of keys themselves - if too many arrive, either new or "
+"old \n"
+"messages may be dropped. The sender keeps track whether messages using "
+"session \n"
+"tags are getting through, and if there isn't sufficient communication it "
+"may \n"
+"drop the ones previously assumed to be properly delivered, reverting back"
+" \n"
"to the full expensive ElGamal encryption."
msgstr ""
#: i2p2www/pages/site/docs/how/tech-intro.html:553
msgid ""
-"One alternative is to transmit only a single session tag, and from that, \n"
-"seed a deterministic PRNG for determining what tags to use or expect. By keeping \n"
-"this PRNG roughly synchronized between the sender and recipient (the recipient \n"
-"precomputes a window of the next e.g. 50 tags), the overhead of periodically \n"
-"bundling a large number of tags is removed, allowing more options in the space/time \n"
-"tradeoff, and perhaps reducing the number of ElGamal encryptions necessary. \n"
-"However, it would depend upon the strength of the PRNG to provide the necessary \n"
-"cover against internal adversaries, though perhaps by limiting the amount \n"
-"of times each PRNG is used, any weaknesses can be minimized. At the moment, \n"
+"One alternative is to transmit only a single session tag, and from that,"
+" \n"
+"seed a deterministic PRNG for determining what tags to use or expect. By "
+"keeping \n"
+"this PRNG roughly synchronized between the sender and recipient (the "
+"recipient \n"
+"precomputes a window of the next e.g. 50 tags), the overhead of "
+"periodically \n"
+"bundling a large number of tags is removed, allowing more options in the "
+"space/time \n"
+"tradeoff, and perhaps reducing the number of ElGamal encryptions "
+"necessary. \n"
+"However, it would depend upon the strength of the PRNG to provide the "
+"necessary \n"
+"cover against internal adversaries, though perhaps by limiting the amount"
+" \n"
+"of times each PRNG is used, any weaknesses can be minimized. At the "
+"moment, \n"
"there are no immediate plans to move towards these synchronized PRNGs."
msgstr ""
@@ -8743,10 +11252,19 @@ msgstr "Avenir"
#: i2p2www/pages/site/docs/how/tech-intro.html:567
msgid ""
-"While I2P is currently functional and sufficient for many scenarios, there \n"
-"are several areas which require further improvement to meet the needs of those \n"
-"facing more powerful adversaries as well as substantial user experience optimization."
-msgstr "Tandis qu'I2P est actuellement fonctionnel et suffisant pour beaucoup de scénarios, il y a \nplusieurs zones qui exigent de nouvelles améliorations répondant aux besoins de ceux\naffrontant des adversaires plus puissants aussi bien que l'optimisation substantielle de l'expérience utilisateur."
+"While I2P is currently functional and sufficient for many scenarios, "
+"there \n"
+"are several areas which require further improvement to meet the needs of "
+"those \n"
+"facing more powerful adversaries as well as substantial user experience "
+"optimization."
+msgstr ""
+"Tandis qu'I2P est actuellement fonctionnel et suffisant pour beaucoup de "
+"scénarios, il y a \n"
+"plusieurs zones qui exigent de nouvelles améliorations répondant aux "
+"besoins de ceux\n"
+"affrontant des adversaires plus puissants aussi bien que l'optimisation "
+"substantielle de l'expérience utilisateur."
#: i2p2www/pages/site/docs/how/tech-intro.html:573
msgid "Restricted route operation"
@@ -8754,64 +11272,106 @@ msgstr ""
#: i2p2www/pages/site/docs/how/tech-intro.html:574
msgid ""
-"I2P is an overlay network designed to be run on top of a functional packet \n"
-"switched network, exploiting the end to end principle to offer anonymity and \n"
-"security. While the Internet no longer fully embraces the end to end principle\n"
+"I2P is an overlay network designed to be run on top of a functional "
+"packet \n"
+"switched network, exploiting the end to end principle to offer anonymity "
+"and \n"
+"security. While the Internet no longer fully embraces the end to end "
+"principle\n"
"(due to the usage of NAT), \n"
-"I2P does require a substantial portion of the network to be reachable - there \n"
-"may be a number of peers along the edges running using restricted routes, \n"
-"but I2P does not include an appropriate routing algorithm for the degenerate \n"
-"case where most peers are unreachable. It would, however work on top of a \n"
+"I2P does require a substantial portion of the network to be reachable - "
+"there \n"
+"may be a number of peers along the edges running using restricted routes,"
+" \n"
+"but I2P does not include an appropriate routing algorithm for the "
+"degenerate \n"
+"case where most peers are unreachable. It would, however work on top of a"
+" \n"
"network employing such an algorithm."
msgstr ""
#: i2p2www/pages/site/docs/how/tech-intro.html:586
msgid ""
-"Restricted route operation, where there are limits to what peers are reachable \n"
-"directly, has several different functional and anonymity implications, dependent \n"
-"upon how the restricted routes are handled. At the most basic level, restricted \n"
-"routes exist when a peer is behind a NAT or firewall which does not allow \n"
-"inbound connections. This was largely addressed in I2P 0.6.0.6 by integrating \n"
-"distributed hole punching into the transport layer, allowing people behind \n"
-"most NATs and firewalls to receive unsolicited connections without any configuration. \n"
-"However, this does not limit the exposure of the peer's IP address to routers \n"
-"inside the network, as they can simply get introduced to the peer through \n"
+"Restricted route operation, where there are limits to what peers are "
+"reachable \n"
+"directly, has several different functional and anonymity implications, "
+"dependent \n"
+"upon how the restricted routes are handled. At the most basic level, "
+"restricted \n"
+"routes exist when a peer is behind a NAT or firewall which does not allow"
+" \n"
+"inbound connections. This was largely addressed in I2P 0.6.0.6 by "
+"integrating \n"
+"distributed hole punching into the transport layer, allowing people "
+"behind \n"
+"most NATs and firewalls to receive unsolicited connections without any "
+"configuration. \n"
+"However, this does not limit the exposure of the peer's IP address to "
+"routers \n"
+"inside the network, as they can simply get introduced to the peer through"
+" \n"
"the published introducer."
msgstr ""
#: i2p2www/pages/site/docs/how/tech-intro.html:599
msgid ""
-"Beyond the functional handling of restricted routes, there are two levels \n"
-"of restricted operation that can be used to limit the exposure of one's IP \n"
-"address - using router-specific tunnels for communication, and offering 'client \n"
-"routers'. For the former, routers can either build a new pool of tunnels or \n"
-"reuse their exploratory pool, publishing the inbound gateways to some of them \n"
-"as part of their routerInfo in place of their transport addresses. When a \n"
-"peer wants to get in touch with them, they see those tunnel gateways in the \n"
-"netDb and simply send the relevant message to them through one of the published \n"
-"tunnels. If the peer behind the restricted route wants to reply, it may do \n"
-"so either directly (if they are willing to expose their IP to the peer) or \n"
-"indirectly through their outbound tunnels. When the routers that the peer \n"
-"has direct connections to want to reach it (to forward tunnel messages, for \n"
-"instance), they simply prioritize their direct connection over the published \n"
-"tunnel gateway. The concept of 'client routers' simply extends the restricted \n"
-"route by not publishing any router addresses. Such a router would not even \n"
-"need to publish their routerInfo in the netDb, merely providing their self \n"
-"signed routerInfo to the peers that it contacts (necessary to pass the router's \n"
-"public keys). Both levels of restricted route operation are planned for I2P \n"
+"Beyond the functional handling of restricted routes, there are two levels"
+" \n"
+"of restricted operation that can be used to limit the exposure of one's "
+"IP \n"
+"address - using router-specific tunnels for communication, and offering "
+"'client \n"
+"routers'. For the former, routers can either build a new pool of tunnels "
+"or \n"
+"reuse their exploratory pool, publishing the inbound gateways to some of "
+"them \n"
+"as part of their routerInfo in place of their transport addresses. When a"
+" \n"
+"peer wants to get in touch with them, they see those tunnel gateways in "
+"the \n"
+"netDb and simply send the relevant message to them through one of the "
+"published \n"
+"tunnels. If the peer behind the restricted route wants to reply, it may "
+"do \n"
+"so either directly (if they are willing to expose their IP to the peer) "
+"or \n"
+"indirectly through their outbound tunnels. When the routers that the peer"
+" \n"
+"has direct connections to want to reach it (to forward tunnel messages, "
+"for \n"
+"instance), they simply prioritize their direct connection over the "
+"published \n"
+"tunnel gateway. The concept of 'client routers' simply extends the "
+"restricted \n"
+"route by not publishing any router addresses. Such a router would not "
+"even \n"
+"need to publish their routerInfo in the netDb, merely providing their "
+"self \n"
+"signed routerInfo to the peers that it contacts (necessary to pass the "
+"router's \n"
+"public keys). Both levels of restricted route operation are planned for "
+"I2P \n"
"2.0."
msgstr ""
#: i2p2www/pages/site/docs/how/tech-intro.html:621
msgid ""
-"There are tradeoffs for those behind restricted routes, as they would likely \n"
-"participate in other people's tunnels less frequently, and the routers which \n"
-"they are connected to would be able to infer traffic patterns that would not \n"
-"otherwise be exposed. On the other hand, if the cost of that exposure is less \n"
-"than the cost of an IP being made available, it may be worthwhile. This, of \n"
-"course, assumes that the peers that the router behind a restricted route contacts \n"
-"are not hostile - either the network is large enough that the probability \n"
-"of using a hostile peer to get connected is small enough, or trusted (and \n"
+"There are tradeoffs for those behind restricted routes, as they would "
+"likely \n"
+"participate in other people's tunnels less frequently, and the routers "
+"which \n"
+"they are connected to would be able to infer traffic patterns that would "
+"not \n"
+"otherwise be exposed. On the other hand, if the cost of that exposure is "
+"less \n"
+"than the cost of an IP being made available, it may be worthwhile. This, "
+"of \n"
+"course, assumes that the peers that the router behind a restricted route "
+"contacts \n"
+"are not hostile - either the network is large enough that the probability"
+" \n"
+"of using a hostile peer to get connected is small enough, or trusted (and"
+" \n"
"perhaps temporary) peers are used instead."
msgstr ""
@@ -8821,28 +11381,45 @@ msgstr ""
#: i2p2www/pages/site/docs/how/tech-intro.html:634
msgid ""
-"Even though the bulk of I2P's initial efforts have been on low latency communication, \n"
-"it was designed with variable latency services in mind from the beginning. \n"
-"At the most basic level, applications running on top of I2P can offer the \n"
-"anonymity of medium and high latency communication while still blending their \n"
-"traffic patterns in with low latency traffic. Internally though, I2P can offer \n"
-"its own medium and high latency communication through the garlic encryption \n"
-"- specifying that the message should be sent after a certain delay, at a certain \n"
-"time, after a certain number of messages have passed, or another mix strategy. \n"
-"With the layered encryption, only the router that the clove exposed the delay \n"
-"request would know that the message requires high latency, allowing the traffic \n"
-"to blend in further with the low latency traffic. Once the transmission precondition \n"
-"is met, the router holding on to the clove (which itself would likely be a \n"
-"garlic message) simply forwards it as requested - to a router, to a tunnel, \n"
+"Even though the bulk of I2P's initial efforts have been on low latency "
+"communication, \n"
+"it was designed with variable latency services in mind from the "
+"beginning. \n"
+"At the most basic level, applications running on top of I2P can offer the"
+" \n"
+"anonymity of medium and high latency communication while still blending "
+"their \n"
+"traffic patterns in with low latency traffic. Internally though, I2P can "
+"offer \n"
+"its own medium and high latency communication through the garlic "
+"encryption \n"
+"- specifying that the message should be sent after a certain delay, at a "
+"certain \n"
+"time, after a certain number of messages have passed, or another mix "
+"strategy. \n"
+"With the layered encryption, only the router that the clove exposed the "
+"delay \n"
+"request would know that the message requires high latency, allowing the "
+"traffic \n"
+"to blend in further with the low latency traffic. Once the transmission "
+"precondition \n"
+"is met, the router holding on to the clove (which itself would likely be "
+"a \n"
+"garlic message) simply forwards it as requested - to a router, to a "
+"tunnel, \n"
"or, most likely, to a remote client destination."
msgstr ""
#: i2p2www/pages/site/docs/how/tech-intro.html:651
msgid ""
-"There are a substantial number of ways to exploit this capacity for high \n"
-"latency comm in I2P, but for the moment, doing so has been scheduled for the \n"
-"I2P 3.0 release. In the meantime, those requiring the anonymity that high \n"
-"latency comm can offer should look towards the application layer to provide \n"
+"There are a substantial number of ways to exploit this capacity for high"
+" \n"
+"latency comm in I2P, but for the moment, doing so has been scheduled for "
+"the \n"
+"I2P 3.0 release. In the meantime, those requiring the anonymity that high"
+" \n"
+"latency comm can offer should look towards the application layer to "
+"provide \n"
"it."
msgstr ""
@@ -8876,12 +11453,18 @@ msgstr ""
#: i2p2www/pages/site/docs/how/tech-intro.html:669
msgid ""
-"I2P's architecture builds on the concepts of message oriented middleware, \n"
-"the topology of DHTs, the anonymity and cryptography of free route mixnets, \n"
-"and the adaptability of packet switched networking. The value comes not from \n"
-"novel concepts of algorithms though, but from careful engineering combining \n"
-"the research results of existing systems and papers. While there are a few \n"
-"similar efforts worth reviewing, both for technical and functional comparisons, \n"
+"I2P's architecture builds on the concepts of message oriented middleware,"
+" \n"
+"the topology of DHTs, the anonymity and cryptography of free route "
+"mixnets, \n"
+"and the adaptability of packet switched networking. The value comes not "
+"from \n"
+"novel concepts of algorithms though, but from careful engineering "
+"combining \n"
+"the research results of existing systems and papers. While there are a "
+"few \n"
+"similar efforts worth reviewing, both for technical and functional "
+"comparisons, \n"
"two in particular are pulled out here - Tor and Freenet."
msgstr ""
@@ -8898,127 +11481,209 @@ msgstr ""
#: i2p2www/pages/site/docs/how/tech-intro.html:686
msgid ""
"At first glance, Tor and I2P have many functional and anonymity related \n"
-"similarities. While I2P's development began before we were aware of the early \n"
-"stage efforts on Tor, many of the lessons of the original onion routing and \n"
-"ZKS efforts were integrated into I2P's design. Rather than building an essentially \n"
-"trusted, centralized system with directory servers, I2P has a self organizing \n"
-"network database with each peer taking on the responsibility of profiling \n"
-"other routers to determine how best to exploit available resources. Another \n"
-"key difference is that while both I2P and Tor use layered and ordered paths \n"
-"(tunnels and circuits/streams), I2P is fundamentally a packet switched network, \n"
-"while Tor is fundamentally a circuit switched one, allowing I2P to transparently \n"
-"route around congestion or other network failures, operate redundant pathways, \n"
-"and load balance the data across available resources. While Tor offers the \n"
-"useful outproxy functionality by offering integrated outproxy discovery and \n"
-"selection, I2P leaves such application layer decisions up to applications \n"
-"running on top of I2P - in fact, I2P has even externalized the TCP-like streaming \n"
-"library itself to the application layer, allowing developers to experiment \n"
-"with different strategies, exploiting their domain specific knowledge to offer \n"
+"similarities. While I2P's development began before we were aware of the "
+"early \n"
+"stage efforts on Tor, many of the lessons of the original onion routing "
+"and \n"
+"ZKS efforts were integrated into I2P's design. Rather than building an "
+"essentially \n"
+"trusted, centralized system with directory servers, I2P has a self "
+"organizing \n"
+"network database with each peer taking on the responsibility of profiling"
+" \n"
+"other routers to determine how best to exploit available resources. "
+"Another \n"
+"key difference is that while both I2P and Tor use layered and ordered "
+"paths \n"
+"(tunnels and circuits/streams), I2P is fundamentally a packet switched "
+"network, \n"
+"while Tor is fundamentally a circuit switched one, allowing I2P to "
+"transparently \n"
+"route around congestion or other network failures, operate redundant "
+"pathways, \n"
+"and load balance the data across available resources. While Tor offers "
+"the \n"
+"useful outproxy functionality by offering integrated outproxy discovery "
+"and \n"
+"selection, I2P leaves such application layer decisions up to applications"
+" \n"
+"running on top of I2P - in fact, I2P has even externalized the TCP-like "
+"streaming \n"
+"library itself to the application layer, allowing developers to "
+"experiment \n"
+"with different strategies, exploiting their domain specific knowledge to "
+"offer \n"
"better performance."
msgstr ""
#: i2p2www/pages/site/docs/how/tech-intro.html:707
msgid ""
-"From an anonymity perspective, there is much similarity when the core networks \n"
-"are compared. However, there are a few key differences. When dealing with \n"
-"an internal adversary or most external adversaries, I2P's simplex tunnels \n"
-"expose half as much traffic data than would be exposed with Tor's duplex circuits \n"
-"by simply looking at the flows themselves - an HTTP request and response would \n"
-"follow the same path in Tor, while in I2P the packets making up the request \n"
-"would go out through one or more outbound tunnels and the packets making up \n"
-"the response would come back through one or more different inbound tunnels. \n"
-"While I2P's peer selection and ordering strategies should sufficiently address \n"
-"predecessor attacks, should a switch to bidirectional tunnels be necessary,\n"
-"we could simply build an inbound and outbound tunnel along the same routers."
+"From an anonymity perspective, there is much similarity when the core "
+"networks \n"
+"are compared. However, there are a few key differences. When dealing with"
+" \n"
+"an internal adversary or most external adversaries, I2P's simplex tunnels"
+" \n"
+"expose half as much traffic data than would be exposed with Tor's duplex "
+"circuits \n"
+"by simply looking at the flows themselves - an HTTP request and response "
+"would \n"
+"follow the same path in Tor, while in I2P the packets making up the "
+"request \n"
+"would go out through one or more outbound tunnels and the packets making "
+"up \n"
+"the response would come back through one or more different inbound "
+"tunnels. \n"
+"While I2P's peer selection and ordering strategies should sufficiently "
+"address \n"
+"predecessor attacks, should a switch to bidirectional tunnels be "
+"necessary,\n"
+"we could simply build an inbound and outbound tunnel along the same "
+"routers."
msgstr ""
#: i2p2www/pages/site/docs/how/tech-intro.html:721
msgid ""
-"Another anonymity issue comes up in Tor's use of telescopic tunnel creation, \n"
-"as simple packet counting and timing measurements as the cells in a circuit \n"
-"pass through an adversary's node exposes statistical information regarding \n"
-"where the adversary is within the circuit. I2P's unidirectional tunnel creation \n"
-"with a single message so that this data is not exposed. Protecting the position \n"
-"in a tunnel is important, as an adversary would otherwise be able to mount \n"
-"a series of powerful predecessor, intersection, and traffic confirmation attacks."
+"Another anonymity issue comes up in Tor's use of telescopic tunnel "
+"creation, \n"
+"as simple packet counting and timing measurements as the cells in a "
+"circuit \n"
+"pass through an adversary's node exposes statistical information "
+"regarding \n"
+"where the adversary is within the circuit. I2P's unidirectional tunnel "
+"creation \n"
+"with a single message so that this data is not exposed. Protecting the "
+"position \n"
+"in a tunnel is important, as an adversary would otherwise be able to "
+"mount \n"
+"a series of powerful predecessor, intersection, and traffic confirmation "
+"attacks."
msgstr ""
#: i2p2www/pages/site/docs/how/tech-intro.html:731
msgid ""
-"Tor's support for a second tier of \"onion proxies\" does offer a non-trivial \n"
-"degree of anonymity while requiring a low cost of entry, while I2P will not \n"
+"Tor's support for a second tier of \"onion proxies\" does offer a non-"
+"trivial \n"
+"degree of anonymity while requiring a low cost of entry, while I2P will "
+"not \n"
"offer this topology until 2.0."
msgstr ""
#: i2p2www/pages/site/docs/how/tech-intro.html:737
msgid ""
-"On the whole, Tor and I2P complement each other in their focus - Tor works \n"
-"towards offering high speed anonymous Internet outproxying, while I2P works \n"
-"towards offering a decentralized resilient network in itself. In theory, both \n"
-"can be used to achieve both purposes, but given limited development resources, \n"
-"they both have their strengths and weaknesses. The I2P developers have considered \n"
-"the steps necessary to modify Tor to take advantage of I2P's design, but concerns \n"
-"of Tor's viability under resource scarcity suggest that I2P's packet switching \n"
+"On the whole, Tor and I2P complement each other in their focus - Tor "
+"works \n"
+"towards offering high speed anonymous Internet outproxying, while I2P "
+"works \n"
+"towards offering a decentralized resilient network in itself. In theory, "
+"both \n"
+"can be used to achieve both purposes, but given limited development "
+"resources, \n"
+"they both have their strengths and weaknesses. The I2P developers have "
+"considered \n"
+"the steps necessary to modify Tor to take advantage of I2P's design, but "
+"concerns \n"
+"of Tor's viability under resource scarcity suggest that I2P's packet "
+"switching \n"
"architecture will be able to exploit scarce resources more effectively."
msgstr ""
#: i2p2www/pages/site/docs/how/tech-intro.html:751
msgid ""
-"Freenet played a large part in the initial stages of I2P's design - giving \n"
-"proof to the viability of a vibrant pseudonymous community completely contained \n"
-"within the network, demonstrating that the dangers inherent in outproxies \n"
-"could be avoided. The first seed of I2P began as a replacement communication \n"
-"layer for Freenet, attempting to factor out the complexities of a scalable, \n"
-"anonymous and secure point to point communication from the complexities of \n"
-"a censorship resistant distributed data store. Over time however, some of \n"
-"the anonymity and scalability issues inherent in Freenet's algorithms made \n"
-"it clear that I2P's focus should stay strictly on providing a generic anonymous \n"
-"communication layer, rather than as a component of Freenet. Over the years, \n"
-"the Freenet developers have come to see the weaknesses in the older design, \n"
-"prompting them to suggest that they will require a \"premix\" layer to offer \n"
-"substantial anonymity. In other words, Freenet needs to run on top of a mixnet \n"
-"such as I2P or Tor, with \"client nodes\" requesting and publishing data through \n"
-"the mixnet to the \"server nodes\" which then fetch and store the data according \n"
+"Freenet played a large part in the initial stages of I2P's design - "
+"giving \n"
+"proof to the viability of a vibrant pseudonymous community completely "
+"contained \n"
+"within the network, demonstrating that the dangers inherent in outproxies"
+" \n"
+"could be avoided. The first seed of I2P began as a replacement "
+"communication \n"
+"layer for Freenet, attempting to factor out the complexities of a "
+"scalable, \n"
+"anonymous and secure point to point communication from the complexities "
+"of \n"
+"a censorship resistant distributed data store. Over time however, some of"
+" \n"
+"the anonymity and scalability issues inherent in Freenet's algorithms "
+"made \n"
+"it clear that I2P's focus should stay strictly on providing a generic "
+"anonymous \n"
+"communication layer, rather than as a component of Freenet. Over the "
+"years, \n"
+"the Freenet developers have come to see the weaknesses in the older "
+"design, \n"
+"prompting them to suggest that they will require a \"premix\" layer to "
+"offer \n"
+"substantial anonymity. In other words, Freenet needs to run on top of a "
+"mixnet \n"
+"such as I2P or Tor, with \"client nodes\" requesting and publishing data "
+"through \n"
+"the mixnet to the \"server nodes\" which then fetch and store the data "
+"according \n"
"to Freenet's heuristic distributed data storage algorithms."
msgstr ""
#: i2p2www/pages/site/docs/how/tech-intro.html:770
msgid ""
-"Freenet's functionality is very complementary to I2P's, as Freenet natively \n"
-"provides many of the tools for operating medium and high latency systems, \n"
-"while I2P natively provides the low latency mix network suitable for offering \n"
-"adequate anonymity. The logic of separating the mixnet from the censorship-\n"
-"resistant distributed data store still seems self-evident from an engineering, \n"
-"anonymity, security, and resource allocation perspective, so hopefully the \n"
-"Freenet team will pursue efforts in that direction, if not simply reusing \n"
+"Freenet's functionality is very complementary to I2P's, as Freenet "
+"natively \n"
+"provides many of the tools for operating medium and high latency systems,"
+" \n"
+"while I2P natively provides the low latency mix network suitable for "
+"offering \n"
+"adequate anonymity. The logic of separating the mixnet from the "
+"censorship-\n"
+"resistant distributed data store still seems self-evident from an "
+"engineering, \n"
+"anonymity, security, and resource allocation perspective, so hopefully "
+"the \n"
+"Freenet team will pursue efforts in that direction, if not simply reusing"
+" \n"
"(or helping to improve, as necessary) existing mixnets like I2P or Tor."
msgstr ""
#: i2p2www/pages/site/docs/how/tech-intro.html:781
msgid ""
"It is worth mentioning that there has recently been discussion and work \n"
-"by the Freenet developers on a \"globally scalable darknet\" using restricted \n"
-"routes between peers of various trust. While insufficient information has \n"
-"been made publicly available regarding how such a system would operate for \n"
-"a full review, from what has been said the anonymity and scalability claims \n"
-"seem highly dubious. In particular, the appropriateness for use in hostile \n"
-"regimes against state level adversaries has been tremendously overstated, \n"
-"and any analysis on the implications of resource scarcity upon the scalability \n"
-"of the network has seemingly been avoided. Further questions regarding susceptibility \n"
-"to traffic analysis, trust and other topics do exist, but a more in-depth \n"
-"review of this \"globally scalable darknet\" will have to wait until the Freenet \n"
+"by the Freenet developers on a \"globally scalable darknet\" using "
+"restricted \n"
+"routes between peers of various trust. While insufficient information has"
+" \n"
+"been made publicly available regarding how such a system would operate "
+"for \n"
+"a full review, from what has been said the anonymity and scalability "
+"claims \n"
+"seem highly dubious. In particular, the appropriateness for use in "
+"hostile \n"
+"regimes against state level adversaries has been tremendously overstated,"
+" \n"
+"and any analysis on the implications of resource scarcity upon the "
+"scalability \n"
+"of the network has seemingly been avoided. Further questions regarding "
+"susceptibility \n"
+"to traffic analysis, trust and other topics do exist, but a more in-depth"
+" \n"
+"review of this \"globally scalable darknet\" will have to wait until the "
+"Freenet \n"
"team makes more information available."
msgstr ""
#: i2p2www/pages/site/docs/how/tech-intro.html:797
msgid ""
-"I2P itself doesn't really do much - it simply sends messages to remote destinations \n"
-"and receives messages targeting local destinations - most of the interesting \n"
-"work goes on at the layers above it. By itself, I2P could be seen as an anonymous \n"
-"and secure IP layer, and the bundled streaming library \n"
-"as an implementation of an anonymous and secure TCP layer on top of it. Beyond \n"
-"that, I2PTunnel exposes a generic TCP proxying \n"
-"system for either getting into or out of the I2P network, plus a variety of \n"
+"I2P itself doesn't really do much - it simply sends messages to remote "
+"destinations \n"
+"and receives messages targeting local destinations - most of the "
+"interesting \n"
+"work goes on at the layers above it. By itself, I2P could be seen as an "
+"anonymous \n"
+"and secure IP layer, and the bundled streaming"
+" library \n"
+"as an implementation of an anonymous and secure TCP layer on top of it. "
+"Beyond \n"
+"that, I2PTunnel exposes a generic TCP "
+"proxying \n"
+"system for either getting into or out of the I2P network, plus a variety "
+"of \n"
"network applications provide further functionality for end users."
msgstr ""
@@ -9028,34 +11693,51 @@ msgstr "Librarie streaming"
#: i2p2www/pages/site/docs/how/tech-intro.html:809
msgid ""
-"The I2P streaming library can be viewed as a generic streaming interface (mirroring TCP sockets),\n"
-"and the implementation supports a sliding window protocol\n"
-"with several optimizations, to take into account the high delay over I2P.\n"
+"The I2P streaming library can be viewed as a generic streaming interface "
+"(mirroring TCP sockets),\n"
+"and the implementation supports a sliding "
+"window protocol\n"
+"with several optimizations, to take into account the high delay over I2P."
+"\n"
"Individual streams may adjust the maximum packet size and \n"
-"other options, though the default of 4KB compressed seems a reasonable tradeoff \n"
-"between the bandwidth costs of retransmitting lost messages and the latency \n"
+"other options, though the default of 4KB compressed seems a reasonable "
+"tradeoff \n"
+"between the bandwidth costs of retransmitting lost messages and the "
+"latency \n"
"of multiple messages."
msgstr ""
#: i2p2www/pages/site/docs/how/tech-intro.html:819
msgid ""
"In addition, in consideration of the relatively high cost of subsequent \n"
-"messages, the streaming library's protocol for scheduling and delivering messages \n"
-"has been optimized to allow individual messages passed to contain as much \n"
-"information as is available. For instance, a small HTTP transaction proxied \n"
-"through the streaming library can be completed in a single round trip - the \n"
-"first message bundles a SYN, FIN and the small payload (an HTTP request typically \n"
-"fits) and the reply bundles the SYN, FIN, ACK and the small payload (many \n"
-"HTTP responses fit). While an additional ACK must be transmitted to tell the \n"
-"HTTP server that the SYN/FIN/ACK has been received, the local HTTP proxy can \n"
+"messages, the streaming library's protocol for scheduling and delivering "
+"messages \n"
+"has been optimized to allow individual messages passed to contain as much"
+" \n"
+"information as is available. For instance, a small HTTP transaction "
+"proxied \n"
+"through the streaming library can be completed in a single round trip - "
+"the \n"
+"first message bundles a SYN, FIN and the small payload (an HTTP request "
+"typically \n"
+"fits) and the reply bundles the SYN, FIN, ACK and the small payload (many"
+" \n"
+"HTTP responses fit). While an additional ACK must be transmitted to tell "
+"the \n"
+"HTTP server that the SYN/FIN/ACK has been received, the local HTTP proxy "
+"can \n"
"deliver the full response to the browser immediately."
msgstr ""
#: i2p2www/pages/site/docs/how/tech-intro.html:832
msgid ""
-"On the whole, however, the streaming library bears much resemblance to an \n"
-"abstraction of TCP, with its sliding windows, congestion control algorithms \n"
-"(both slow start and congestion avoidance), and general packet behavior (ACK, \n"
+"On the whole, however, the streaming library bears much resemblance to an"
+" \n"
+"abstraction of TCP, with its sliding windows, congestion control "
+"algorithms \n"
+"(both slow start and congestion avoidance), and general packet behavior "
+"(ACK, \n"
"SYN, FIN, RST, etc)."
msgstr ""
@@ -9085,142 +11767,227 @@ msgstr "Développé par : %(dev)s"
#: i2p2www/pages/site/docs/how/tech-intro.html:846
msgid ""
-"Naming within I2P has been an oft-debated topic since the very beginning \n"
-"with advocates across the spectrum of possibilities. However, given I2P's \n"
-"inherent demand for secure communication and decentralized operation, the \n"
-"traditional DNS-style naming system is clearly out, as are \"majority rules\" \n"
-"voting systems. Instead, I2P ships with a generic naming library and a base \n"
-"implementation designed to work off a local name to destination mapping, as \n"
-"well as an optional add-on application called the \"addressbook\". The addressbook \n"
-"is a web-of-trust-driven secure, distributed, and human readable naming system, \n"
-"sacrificing only the call for all human readable names to be globally unique \n"
-"by mandating only local uniqueness. While all messages in I2P are cryptographically \n"
-"addressed by their destination, different people can have local addressbook \n"
-"entries for \"Alice\" which refer to different destinations. People can still \n"
-"discover new names by importing published addressbooks of peers specified \n"
-"in their web of trust, by adding in the entries provided through a third party, \n"
-"or (if some people organize a series of published addressbooks using a first \n"
-"come first serve registration system) people can choose to treat these addressbooks \n"
+"Naming within I2P has been an oft-debated topic since the very beginning"
+" \n"
+"with advocates across the spectrum of possibilities. However, given I2P's"
+" \n"
+"inherent demand for secure communication and decentralized operation, the"
+" \n"
+"traditional DNS-style naming system is clearly out, as are \"majority "
+"rules\" \n"
+"voting systems. Instead, I2P ships with a generic naming library and a "
+"base \n"
+"implementation designed to work off a local name to destination mapping, "
+"as \n"
+"well as an optional add-on application called the \"addressbook\". The "
+"addressbook \n"
+"is a web-of-trust-driven secure, distributed, and human readable naming "
+"system, \n"
+"sacrificing only the call for all human readable names to be globally "
+"unique \n"
+"by mandating only local uniqueness. While all messages in I2P are "
+"cryptographically \n"
+"addressed by their destination, different people can have local "
+"addressbook \n"
+"entries for \"Alice\" which refer to different destinations. People can "
+"still \n"
+"discover new names by importing published addressbooks of peers specified"
+" \n"
+"in their web of trust, by adding in the entries provided through a third "
+"party, \n"
+"or (if some people organize a series of published addressbooks using a "
+"first \n"
+"come first serve registration system) people can choose to treat these "
+"addressbooks \n"
"as name servers, emulating traditional DNS."
msgstr ""
#: i2p2www/pages/site/docs/how/tech-intro.html:866
msgid ""
"I2P does not promote the use of DNS-like services though, as the damage \n"
-"done by hijacking a site can be tremendous - and insecure destinations have \n"
-"no value. DNSsec itself still falls back on registrars and certificate authorities, \n"
-"while with I2P, requests sent to a destination cannot be intercepted or the \n"
-"reply spoofed, as they are encrypted to the destination's public keys, and \n"
-"a destination itself is just a pair of public keys and a certificate. DNS-style \n"
-"systems on the other hand allow any of the name servers on the lookup path \n"
-"to mount simple denial of service and spoofing attacks. Adding on a certificate \n"
-"authenticating the responses as signed by some centralized certificate authority \n"
-"would address many of the hostile nameserver issues but would leave open replay \n"
+"done by hijacking a site can be tremendous - and insecure destinations "
+"have \n"
+"no value. DNSsec itself still falls back on registrars and certificate "
+"authorities, \n"
+"while with I2P, requests sent to a destination cannot be intercepted or "
+"the \n"
+"reply spoofed, as they are encrypted to the destination's public keys, "
+"and \n"
+"a destination itself is just a pair of public keys and a certificate. "
+"DNS-style \n"
+"systems on the other hand allow any of the name servers on the lookup "
+"path \n"
+"to mount simple denial of service and spoofing attacks. Adding on a "
+"certificate \n"
+"authenticating the responses as signed by some centralized certificate "
+"authority \n"
+"would address many of the hostile nameserver issues but would leave open "
+"replay \n"
"attacks as well as hostile certificate authority attacks."
msgstr ""
#: i2p2www/pages/site/docs/how/tech-intro.html:880
msgid ""
-"Voting style naming is dangerous as well, especially given the effectiveness \n"
-"of Sybil attacks in anonymous systems - the attacker can simply create an \n"
-"arbitrarily high number of peers and \"vote\" with each to take over a given \n"
-"name. Proof-of-work methods can be used to make identity non-free, but as \n"
-"the network grows the load required to contact everyone to conduct online \n"
-"voting is implausible, or if the full network is not queried, different sets \n"
+"Voting style naming is dangerous as well, especially given the "
+"effectiveness \n"
+"of Sybil attacks in anonymous systems - the attacker can simply create an"
+" \n"
+"arbitrarily high number of peers and \"vote\" with each to take over a "
+"given \n"
+"name. Proof-of-work methods can be used to make identity non-free, but as"
+" \n"
+"the network grows the load required to contact everyone to conduct online"
+" \n"
+"voting is implausible, or if the full network is not queried, different "
+"sets \n"
"of answers may be reachable."
msgstr ""
#: i2p2www/pages/site/docs/how/tech-intro.html:890
msgid ""
-"As with the Internet however, I2P is keeping the design and operation of \n"
-"a naming system out of the (IP-like) communication layer. The bundled naming \n"
-"library includes a simple service provider interface which alternate naming \n"
-"systems can plug into, allowing end users to drive what sort of naming tradeoffs \n"
+"As with the Internet however, I2P is keeping the design and operation of"
+" \n"
+"a naming system out of the (IP-like) communication layer. The bundled "
+"naming \n"
+"library includes a simple service provider interface which alternate "
+"naming \n"
+"systems can plug into, allowing end users to drive what sort of naming "
+"tradeoffs \n"
"they prefer."
msgstr ""
#: i2p2www/pages/site/docs/how/tech-intro.html:899
msgid ""
-"The old Syndie bundled with I2P has been replaced by the new Syndie which\n"
-"is distributed separately. For more information see the Syndie\n"
+"The old Syndie bundled with I2P has been replaced by the new Syndie which"
+"\n"
+"is distributed separately. For more information see the Syndie\n"
"pages."
msgstr ""
#: i2p2www/pages/site/docs/how/tech-intro.html:905
msgid ""
-"Syndie is a safe, anonymous blogging / content publication / content aggregation \n"
-"system. It lets you create information, share it with others, and read posts \n"
-"from those you're interested in, all while taking into consideration your \n"
-"needs for security and anonymity. Rather than building its own content distribution \n"
-"network, Syndie is designed to run on top of existing networks, syndicating \n"
-"content through eepsites, Tor hidden services, Freenet freesites, normal websites, \n"
-"usenet newsgroups, email lists, RSS feeds, etc. Data published with Syndie \n"
-"is done so as to offer pseudonymous authentication to anyone reading or archiving \n"
+"Syndie is a safe, anonymous blogging / content publication / content "
+"aggregation \n"
+"system. It lets you create information, share it with others, and read "
+"posts \n"
+"from those you're interested in, all while taking into consideration your"
+" \n"
+"needs for security and anonymity. Rather than building its own content "
+"distribution \n"
+"network, Syndie is designed to run on top of existing networks, "
+"syndicating \n"
+"content through eepsites, Tor hidden services, Freenet freesites, normal "
+"websites, \n"
+"usenet newsgroups, email lists, RSS feeds, etc. Data published with "
+"Syndie \n"
+"is done so as to offer pseudonymous authentication to anyone reading or "
+"archiving \n"
"it."
msgstr ""
#: i2p2www/pages/site/docs/how/tech-intro.html:920
msgid ""
-"I2PTunnel is probably I2P's most popular and versatile client application, \n"
-"allowing generic proxying both into and out of the I2P network. I2PTunnel \n"
-"can be viewed as four separate proxying applications - a \"client\" which receives \n"
-"inbound TCP connections and forwards them to a given I2P destination, an \"httpclient\" \n"
-"(aka \"eepproxy\") which acts like an HTTP proxy and forwards the requests to \n"
-"the appropriate I2P destination (after querying the naming service if necessary), \n"
-"a \"server\" which receives inbound I2P streaming connections on a destination \n"
-"and forwards them to a given TCP host+port, and an \"httpserver\" which extends \n"
-"the \"server\" by parsing the HTTP request and responses to allow safer operation. \n"
-"There is an additional \"socksclient\" application, but its use is not encouraged \n"
+"I2PTunnel is probably I2P's most popular and versatile client "
+"application, \n"
+"allowing generic proxying both into and out of the I2P network. I2PTunnel"
+" \n"
+"can be viewed as four separate proxying applications - a \"client\" which"
+" receives \n"
+"inbound TCP connections and forwards them to a given I2P destination, an "
+"\"httpclient\" \n"
+"(aka \"eepproxy\") which acts like an HTTP proxy and forwards the "
+"requests to \n"
+"the appropriate I2P destination (after querying the naming service if "
+"necessary), \n"
+"a \"server\" which receives inbound I2P streaming connections on a "
+"destination \n"
+"and forwards them to a given TCP host+port, and an \"httpserver\" which "
+"extends \n"
+"the \"server\" by parsing the HTTP request and responses to allow safer "
+"operation. \n"
+"There is an additional \"socksclient\" application, but its use is not "
+"encouraged \n"
"for reasons previously mentioned."
msgstr ""
#: i2p2www/pages/site/docs/how/tech-intro.html:934
msgid ""
-"I2P itself is not an outproxy network - the anonymity and security concerns \n"
-"inherent in a mix net which forwards data into and out of the mix have kept \n"
-"I2P's design focused on providing an anonymous network which capable of meeting \n"
-"the user's needs without requiring external resources. However, the I2PTunnel \n"
-"\"httpclient\" application offers a hook for outproxying - if the hostname requested \n"
-"doesn't end in \".i2p\", it picks a random destination from a user-provided \n"
-"set of outproxies and forwards the request to them. These destinations are \n"
-"simply I2PTunnel \"server\" instances run by volunteers who have explicitly \n"
-"chosen to run outproxies - no one is an outproxy by default, and running an \n"
-"outproxy doesn't automatically tell other people to proxy through you. While \n"
-"outproxies do have inherent weaknesses, they offer a simple proof of concept \n"
-"for using I2P and provide some functionality under a threat model which may \n"
+"I2P itself is not an outproxy network - the anonymity and security "
+"concerns \n"
+"inherent in a mix net which forwards data into and out of the mix have "
+"kept \n"
+"I2P's design focused on providing an anonymous network which capable of "
+"meeting \n"
+"the user's needs without requiring external resources. However, the "
+"I2PTunnel \n"
+"\"httpclient\" application offers a hook for outproxying - if the "
+"hostname requested \n"
+"doesn't end in \".i2p\", it picks a random destination from a user-"
+"provided \n"
+"set of outproxies and forwards the request to them. These destinations "
+"are \n"
+"simply I2PTunnel \"server\" instances run by volunteers who have "
+"explicitly \n"
+"chosen to run outproxies - no one is an outproxy by default, and running "
+"an \n"
+"outproxy doesn't automatically tell other people to proxy through you. "
+"While \n"
+"outproxies do have inherent weaknesses, they offer a simple proof of "
+"concept \n"
+"for using I2P and provide some functionality under a threat model which "
+"may \n"
"be sufficient for some users."
msgstr ""
#: i2p2www/pages/site/docs/how/tech-intro.html:950
msgid ""
-"I2PTunnel enables most of the applications in use. An \"httpserver\" pointing \n"
-"at a webserver lets anyone run their own anonymous website (or \"eepsite\") \n"
-"- a webserver is bundled with I2P for this purpose, but any webserver can \n"
-"be used. Anyone may run a \"client\" pointing at one of the anonymously hosted \n"
-"IRC servers, each of which are running a \"server\" pointing at their local \n"
-"IRCd and communicating between IRCds over their own \"client\" tunnels. End \n"
-"users also have \"client\" tunnels pointing at I2Pmail's \n"
-"POP3 and SMTP destinations (which in turn are simply \"server\" instances pointing \n"
-"at POP3 and SMTP servers), as well as \"client\" tunnels pointing at I2P's CVS \n"
-"server, allowing anonymous development. At times people have even run \"client\" \n"
+"I2PTunnel enables most of the applications in use. An \"httpserver\" "
+"pointing \n"
+"at a webserver lets anyone run their own anonymous website (or "
+"\"eepsite\") \n"
+"- a webserver is bundled with I2P for this purpose, but any webserver can"
+" \n"
+"be used. Anyone may run a \"client\" pointing at one of the anonymously "
+"hosted \n"
+"IRC servers, each of which are running a \"server\" pointing at their "
+"local \n"
+"IRCd and communicating between IRCds over their own \"client\" tunnels. "
+"End \n"
+"users also have \"client\" tunnels pointing at I2Pmail's \n"
+"POP3 and SMTP destinations (which in turn are simply \"server\" instances"
+" pointing \n"
+"at POP3 and SMTP servers), as well as \"client\" tunnels pointing at "
+"I2P's CVS \n"
+"server, allowing anonymous development. At times people have even run "
+"\"client\" \n"
"proxies to access the \"server\" instances pointing at an NNTP server."
msgstr ""
#: i2p2www/pages/site/docs/how/tech-intro.html:967
msgid ""
-"i2p-bt is a port of the mainline python BitTorrent client to run both the \n"
-"tracker and peer communication over I2P. Tracker requests are forwarded through \n"
-"the eepproxy to eepsites specified in the torrent file while tracker responses \n"
-"refer to peers by their destination explicitly, allowing i2p-bt to open up \n"
-"a streaming lib connection to query them for \n"
+"i2p-bt is a port of the mainline python BitTorrent client to run both the"
+" \n"
+"tracker and peer communication over I2P. Tracker requests are forwarded "
+"through \n"
+"the eepproxy to eepsites specified in the torrent file while tracker "
+"responses \n"
+"refer to peers by their destination explicitly, allowing i2p-bt to open "
+"up \n"
+"a streaming lib connection to query them "
+"for \n"
"blocks."
msgstr ""
#: i2p2www/pages/site/docs/how/tech-intro.html:976
msgid ""
-"In addition to i2p-bt, a port of bytemonsoon has been made to I2P, making \n"
-"a few modifications as necessary to strip any anonymity-compromising information \n"
-"from the application and to take into consideration the fact that IPs cannot \n"
+"In addition to i2p-bt, a port of bytemonsoon has been made to I2P, making"
+" \n"
+"a few modifications as necessary to strip any anonymity-compromising "
+"information \n"
+"from the application and to take into consideration the fact that IPs "
+"cannot \n"
"be used for identifying peers."
msgstr ""
@@ -9233,8 +12000,10 @@ msgstr ""
#: i2p2www/pages/site/docs/how/tech-intro.html:990
msgid ""
-"Bundled with the I2P install, I2PSnark offers a simple anonymous BitTorrent \n"
-"client with multitorrent capabilities, exposing all of the functionality through \n"
+"Bundled with the I2P install, I2PSnark offers a simple anonymous "
+"BitTorrent \n"
+"client with multitorrent capabilities, exposing all of the functionality "
+"through \n"
"a plain HTML web interface."
msgstr ""
@@ -9242,7 +12011,9 @@ msgstr ""
#, python-format
msgid ""
"Robert is a Bittorrent client written in Python.\n"
-"It is hosted on http://%(bob)s/Robert.html "
+"It is hosted on http://%(bob)s/Robert.html "
msgstr ""
#: i2p2www/pages/site/docs/how/tech-intro.html:1007
@@ -9254,9 +12025,12 @@ msgstr ""
#: i2p2www/pages/site/docs/how/tech-intro.html:1015
msgid ""
-"I2Phex is a fairly direct port of the Phex Gnutella filesharing client to \n"
-"run entirely on top of I2P. While it has disabled some of Phex's functionality, \n"
-"such as integration with Gnutella webcaches, the basic file sharing and chatting \n"
+"I2Phex is a fairly direct port of the Phex Gnutella filesharing client to"
+" \n"
+"run entirely on top of I2P. While it has disabled some of Phex's "
+"functionality, \n"
+"such as integration with Gnutella webcaches, the basic file sharing and "
+"chatting \n"
"system is fully functional."
msgstr ""
@@ -9269,39 +12043,74 @@ msgstr ""
#: i2p2www/pages/site/docs/how/tech-intro.html:1033
#, python-format
msgid ""
-"I2Pmail is more a service than an application - postman offers both internal \n"
-"and external email with POP3 and SMTP service through I2PTunnel instances \n"
-"accessing a series of components developed with mastiejaner, allowing people \n"
-"to use their preferred mail clients to send and receive mail pseudonymously. \n"
-"However, as most mail clients expose substantial identifying information, \n"
-"I2P bundles susi23's web based susimail client which has been built specifically \n"
-"with I2P's anonymity needs in mind. The I2Pmail/mail.i2p service offers transparent \n"
-"virus filtering as well as denial of service prevention with hashcash augmented \n"
-"quotas. In addition, each user has control of their batching strategy prior \n"
-"to delivery through the mail.i2p outproxies, which are separate from the mail.i2p \n"
-"SMTP and POP3 servers - both the outproxies and inproxies communicate with \n"
-"the mail.i2p SMTP and POP3 servers through I2P itself, so compromising those \n"
-"non-anonymous locations does not give access to the mail accounts or activity \n"
-"patterns of the user. At the moment the developers work on a decentralized \n"
-"mailsystem, called \"v2mail\". More information can be found on the eepsite \n"
+"I2Pmail is more a service than an application - postman offers both "
+"internal \n"
+"and external email with POP3 and SMTP service through I2PTunnel instances"
+" \n"
+"accessing a series of components developed with mastiejaner, allowing "
+"people \n"
+"to use their preferred mail clients to send and receive mail "
+"pseudonymously. \n"
+"However, as most mail clients expose substantial identifying information,"
+" \n"
+"I2P bundles susi23's web based susimail client which has been built "
+"specifically \n"
+"with I2P's anonymity needs in mind. The I2Pmail/mail.i2p service offers "
+"transparent \n"
+"virus filtering as well as denial of service prevention with hashcash "
+"augmented \n"
+"quotas. In addition, each user has control of their batching strategy "
+"prior \n"
+"to delivery through the mail.i2p outproxies, which are separate from the "
+"mail.i2p \n"
+"SMTP and POP3 servers - both the outproxies and inproxies communicate "
+"with \n"
+"the mail.i2p SMTP and POP3 servers through I2P itself, so compromising "
+"those \n"
+"non-anonymous locations does not give access to the mail accounts or "
+"activity \n"
+"patterns of the user. At the moment the developers work on a "
+"decentralized \n"
+"mailsystem, called \"v2mail\". More information can be found on the "
+"eepsite \n"
"%(postman)s."
msgstr ""
#: i2p2www/pages/site/docs/how/tech-intro.html:1055
msgid ""
-"I2P-Bote is a distributed e-mail application. It does not use the traditional\n"
-"e-mail concept of sending an e-mail to a server and retrieving it from a server.\n"
+"I2P-Bote is a distributed e-mail application. It does not use the "
+"traditional\n"
+"e-mail concept of sending an e-mail to a server and retrieving it from a "
+"server.\n"
"Instead, it uses a Kademlia Distributed Hash Table to store mails.\n"
-"One user can push a mail into the DHT, while another can request the e-mail from the DHT.\n"
-"And all the mails sent within the I2P-Bote network are automatically encrypted end-to-end. X = g^x mod "
-"p
."
+"Alice generates a secret integer x. She then calculates X = g^x mod"
+" p
."
msgstr ""
#: i2p2www/pages/site/docs/transport/ntcp.html:166
@@ -13664,7 +17149,8 @@ msgstr ""
#: i2p2www/pages/site/docs/transport/ntcp.html:173
#, python-format
msgid ""
-"The sessionKey is then used to exchange identities in Message 3 and Message 4.\n"
+"The sessionKey is then used to exchange identities in Message 3 "
+"and Message 4.\n"
"The exponent (x and y) length for the DH exchange is documented on the\n"
"cryptography page."
msgstr ""
@@ -13677,7 +17163,8 @@ msgstr ""
#, python-format
msgid ""
"This is the DH request. Alice already has Bob's\n"
-"Router Identity,\n"
+"Router "
+"Identity,\n"
"IP address, and port, as contained in his\n"
"Router Info,\n"
"which was published to the\n"
@@ -13757,7 +17244,8 @@ msgstr ""
#: i2p2www/pages/site/docs/transport/ntcp.html:312
#, python-format
msgid ""
-"48 bytes AES encrypted using the DH session key and\n"
+"48 bytes AES encrypted using the DH "
+"session key and\n"
" the last 16 bytes of Y as the IV"
msgstr ""
@@ -13773,8 +17261,8 @@ msgstr ""
#: i2p2www/pages/site/docs/transport/ntcp.html:326
msgid ""
-"This contains Alice's router identity, and a signature of the critical data."
-" Alice sends Bob:"
+"This contains Alice's router identity, and a signature of the critical "
+"data. Alice sends Bob:"
msgstr ""
#: i2p2www/pages/site/docs/transport/ntcp.html:360
@@ -13794,14 +17282,17 @@ msgstr ""
msgid ""
"the `Signature` of the following concatenated data:\n"
" X, Y, Bob's `RouterIdentity`, tsA, tsB.\n"
-" Alice signs it with the `SigningPrivateKey` associated with the `SigningPublicKey` in her `RouterIdentity`"
+" Alice signs it with the `SigningPrivateKey` associated with "
+"the `SigningPublicKey` in her `RouterIdentity`"
msgstr ""
#: i2p2www/pages/site/docs/transport/ntcp.html:389
#, python-format
msgid ""
-"448 bytes AES encrypted using the DH session key and\n"
-" the last 16 bytes of HXxorHI (i.e., the last 16 bytes of message #1) as the IV"
+"448 bytes AES encrypted using the DH"
+" session key and\n"
+" the last 16 bytes of HXxorHI (i.e., the last 16 bytes "
+"of message #1) as the IV"
msgstr ""
#: i2p2www/pages/site/docs/transport/ntcp.html:400
@@ -13816,8 +17307,8 @@ msgstr ""
#: i2p2www/pages/site/docs/transport/ntcp.html:406
msgid ""
-"Alice will use the last 16 bytes of the encrypted contents of this message "
-"as the IV for the next message."
+"Alice will use the last 16 bytes of the encrypted contents of this "
+"message as the IV for the next message."
msgstr ""
#: i2p2www/pages/site/docs/transport/ntcp.html:430
@@ -13832,15 +17323,19 @@ msgstr ""
msgid ""
"the `Signature` of the following concatenated data:\n"
" X, Y, Alice's `RouterIdentity`, tsA, tsB.\n"
-" Bob signs it with the `SigningPrivateKey` associated with the `SigningPublicKey` in his `RouterIdentity`"
+" Bob signs it with the `SigningPrivateKey` associated with "
+"the `SigningPublicKey` in his `RouterIdentity`"
msgstr ""
#: i2p2www/pages/site/docs/transport/ntcp.html:479
#, python-format
msgid ""
-"Data AES encrypted using the DH session key and\n"
-" the last 16 bytes of the encrypted contents of message #2 as the IV\n"
-" 48 bytes for a DSA signature, may vary for other signature types"
+"Data AES encrypted using the DH "
+"session key and\n"
+" the last 16 bytes of the encrypted contents of message "
+"#2 as the IV\n"
+" 48 bytes for a DSA signature, may vary for other "
+"signature types"
msgstr ""
#: i2p2www/pages/site/docs/transport/ntcp.html:488
@@ -13849,8 +17344,8 @@ msgstr ""
#: i2p2www/pages/site/docs/transport/ntcp.html:491
msgid ""
-"Bob will use the last 16 bytes of the encrypted contents of this message as "
-"the IV for the next message."
+"Bob will use the last 16 bytes of the encrypted contents of this message "
+"as the IV for the next message."
msgstr ""
#: i2p2www/pages/site/docs/transport/ntcp.html:506
@@ -13859,10 +17354,14 @@ msgstr ""
#: i2p2www/pages/site/docs/transport/ntcp.html:507
msgid ""
-"The connection is established, and standard or time sync messages may be exchanged.\n"
-"All subsequent messages are AES encrypted using the negotiated DH session key.\n"
-"Alice will use the last 16 bytes of the encrypted contents of message #3 as the next IV.\n"
-"Bob will use the last 16 bytes of the encrypted contents of message #4 as the next IV."
+"The connection is established, and standard or time sync messages may be "
+"exchanged.\n"
+"All subsequent messages are AES encrypted using the negotiated DH session"
+" key.\n"
+"Alice will use the last 16 bytes of the encrypted contents of message #3 "
+"as the next IV.\n"
+"Bob will use the last 16 bytes of the encrypted contents of message #4 as"
+" the next IV."
msgstr ""
#: i2p2www/pages/site/docs/transport/ntcp.html:516
@@ -13889,8 +17388,8 @@ msgstr ""
#: i2p2www/pages/site/docs/transport/ntcp.html:528
msgid ""
-"that many bytes making up the local router's IP address (as reached by the "
-"remote side)"
+"that many bytes making up the local router's IP address (as reached by "
+"the remote side)"
msgstr ""
#: i2p2www/pages/site/docs/transport/ntcp.html:529
@@ -13909,8 +17408,8 @@ msgstr ""
#: i2p2www/pages/site/docs/transport/ntcp.html:532
msgid ""
-"xor of the local router's identity hash and the SHA256 of bytes 32 through "
-"bytes 223"
+"xor of the local router's identity hash and the SHA256 of bytes 32 "
+"through bytes 223"
msgstr ""
#: i2p2www/pages/site/docs/transport/ntcp.html:535
@@ -13933,9 +17432,11 @@ msgstr ""
#: i2p2www/pages/site/docs/transport/ntcp.html:550
msgid ""
"A set of fixed packet sizes may be appropriate to further hide the data \n"
-"fragmentation to external adversaries, but the tunnel, garlic, and end to \n"
+"fragmentation to external adversaries, but the tunnel, garlic, and end to"
+" \n"
"end padding should be sufficient for most needs until then.\n"
-"However, there is currently no provision for padding beyond the next 16-byte boundary,\n"
+"However, there is currently no provision for padding beyond the next "
+"16-byte boundary,\n"
"to create a limited number of message sizes."
msgstr ""
@@ -13958,8 +17459,10 @@ msgstr ""
#: i2p2www/pages/site/docs/transport/ssu.html:7
#, python-format
msgid ""
-"SSU (also called \"UDP\" in much of the I2P documentation and user interfaces)\n"
-"is one of two transports currently implemented in I2P.\n"
+"SSU (also called \"UDP\" in much of the I2P documentation and user "
+"interfaces)\n"
+"is one of two transports currently "
+"implemented in I2P.\n"
"The other is NTCP."
msgstr ""
@@ -13967,14 +17470,17 @@ msgstr ""
msgid ""
"SSU is the newer of the two transports,\n"
"introduced in I2P release 0.6.\n"
-"In a standard I2P installation, the router uses both NTCP and SSU for outbound connections.\n"
+"In a standard I2P installation, the router uses both NTCP and SSU for "
+"outbound connections.\n"
"SSU-over-IPv6 is supported as of version 0.9.8."
msgstr ""
#: i2p2www/pages/site/docs/transport/ssu.html:20
msgid ""
-"SSU is called \"semireliable\" because it will repeatedly retransmit unacknowledged messages,\n"
-"but only up to a maximum number of times. After that, the message is dropped."
+"SSU is called \"semireliable\" because it will repeatedly retransmit "
+"unacknowledged messages,\n"
+"but only up to a maximum number of times. After that, the message is "
+"dropped."
msgstr ""
#: i2p2www/pages/site/docs/transport/ssu.html:25
@@ -13983,8 +17489,10 @@ msgstr ""
#: i2p2www/pages/site/docs/transport/ssu.html:27
msgid ""
-"Like the NTCP transport, SSU provides reliable, encrypted, connection-oriented, point-to-point data transport.\n"
-"Unique to SSU, it also provides IP detection and NAT traversal services, including:"
+"Like the NTCP transport, SSU provides reliable, encrypted, connection-"
+"oriented, point-to-point data transport.\n"
+"Unique to SSU, it also provides IP detection and NAT traversal services, "
+"including:"
msgstr ""
#: i2p2www/pages/site/docs/transport/ssu.html:33
@@ -14001,7 +17509,8 @@ msgstr ""
#: i2p2www/pages/site/docs/transport/ssu.html:35
msgid ""
-"Communication of firewall status and local IP, and changes to either to NTCP"
+"Communication of firewall status and local IP, and changes to either to "
+"NTCP"
msgstr ""
#: i2p2www/pages/site/docs/transport/ssu.html:47
@@ -14035,20 +17544,26 @@ msgid ""
"Packets are scheduled according to the router's policy, taking care\n"
"not to exceed the router's outbound capacity or to exceed the measured \n"
"capacity of the remote peer. The measured capacity operates along the\n"
-"lines of TCP's slow start and congestion avoidance, with additive increases\n"
-"to the sending capacity and multiplicative decreases in face of congestion.\n"
+"lines of TCP's slow start and congestion avoidance, with additive "
+"increases\n"
+"to the sending capacity and multiplicative decreases in face of "
+"congestion.\n"
"Unlike for TCP, routers may give up on some messages after\n"
-"a given period or number of retransmissions while continuing to transmit \n"
+"a given period or number of retransmissions while continuing to transmit"
+" \n"
"other messages."
msgstr ""
#: i2p2www/pages/site/docs/transport/ssu.html:95
msgid ""
"The congestion detection techniques vary from TCP as well, since each \n"
-"message has its own unique and nonsequential identifier, and each message\n"
-"has a limited size - at most, 32KB. To efficiently transmit this feedback\n"
+"message has its own unique and nonsequential identifier, and each message"
+"\n"
+"has a limited size - at most, 32KB. To efficiently transmit this "
+"feedback\n"
"to the sender, the receiver periodically includes a list of fully ACKed \n"
-"message identifiers and may also include bitfields for partially received\n"
+"message identifiers and may also include bitfields for partially received"
+"\n"
"messages, where each bit represents the reception of a fragment. If \n"
"duplicate fragments arrive, the message should be ACKed again, or if the\n"
"message has still not been fully received, the bitfield should be \n"
@@ -14058,7 +17573,8 @@ msgstr ""
#: i2p2www/pages/site/docs/transport/ssu.html:107
msgid ""
"The current implementation does not pad the packets to\n"
-"any particular size, but instead just places a single message fragment into\n"
+"any particular size, but instead just places a single message fragment "
+"into\n"
"a packet and sends it off (careful not to exceed the MTU)."
msgstr ""
@@ -14066,7 +17582,8 @@ msgstr ""
msgid ""
"As of router version 0.8.12,\n"
"two MTU values are used for IPv4: 620 and 1484.\n"
-"The MTU value is adjusted based on the percentage of packets that are retransmitted."
+"The MTU value is adjusted based on the percentage of packets that are "
+"retransmitted."
msgstr ""
#: i2p2www/pages/site/docs/transport/ssu.html:120
@@ -14085,8 +17602,10 @@ msgstr ""
#: i2p2www/pages/site/docs/transport/ssu.html:132
msgid ""
-"Based on measurements, 1492 fits nearly all reasonably small I2NP messages\n"
-"(larger I2NP messages may be up to 1900 to 4500 bytes, which isn't going to fit\n"
+"Based on measurements, 1492 fits nearly all reasonably small I2NP "
+"messages\n"
+"(larger I2NP messages may be up to 1900 to 4500 bytes, which isn't going "
+"to fit\n"
"into a live network MTU anyway)."
msgstr ""
@@ -14106,7 +17625,8 @@ msgstr ""
#: i2p2www/pages/site/docs/transport/ssu.html:150
msgid ""
-"As of release 0.9.2, if a router's network interface MTU is less than 1484,\n"
+"As of release 0.9.2, if a router's network interface MTU is less than "
+"1484,\n"
"it will publish that in the network database, and other routers should\n"
"honor that when a connection is established."
msgstr ""
@@ -14125,10 +17645,13 @@ msgstr ""
#: i2p2www/pages/site/docs/transport/ssu.html:163
msgid ""
"While the maximum message size is nominally 32KB, the practical\n"
-"limit differs. The protocol limits the number of fragments to 7 bits, or 128.\n"
-"The current implementation, however, limits each message to a maximum of 64 fragments,\n"
+"limit differs. The protocol limits the number of fragments to 7 bits, or "
+"128.\n"
+"The current implementation, however, limits each message to a maximum of "
+"64 fragments,\n"
"which is sufficient for 64 * 534 = 33.3 KB when using the 608 MTU.\n"
-"Due to overhead for bundled LeaseSets and session keys, the practical limit\n"
+"Due to overhead for bundled LeaseSets and session keys, the practical "
+"limit\n"
"at the application level is about 6KB lower, or about 26KB.\n"
"Further work is necessary to raise the UDP transport limit above 32KB.\n"
"For connections using the larger MTU, larger messages are possible."
@@ -14142,7 +17665,8 @@ msgstr ""
msgid ""
"All encryption used is AES256/CBC with 32 byte keys and 16 byte IVs.\n"
"When Alice originates a session with Bob,\n"
-"the MAC and session keys are negotiated as part of the DH exchange, and are then used\n"
+"the MAC and session keys are negotiated as part of the DH exchange, and "
+"are then used\n"
"for the HMAC and encryption, respectively. During the DH exchange, \n"
"Bob's publicly knowable introKey is used for the MAC and encryption."
msgstr ""
@@ -14159,7 +17683,8 @@ msgstr ""
#: i2p2www/pages/site/docs/transport/ssu.html:204
msgid ""
-"Upon receiving a message, the receiver checks the \"from\" IP address and port\n"
+"Upon receiving a message, the receiver checks the \"from\" IP address and"
+" port\n"
"with all established sessions - if there are matches,\n"
"that session's MAC keys are tested in the HMAC. If none\n"
"of those verify or if there are no matching IP addresses, the \n"
@@ -14249,7 +17774,8 @@ msgstr ""
#: i2p2www/pages/site/docs/transport/ssu.html:284
msgid ""
-"Direct session establishment is used when no third party is required for NAT traversal.\n"
+"Direct session establishment is used when no third party is required for "
+"NAT traversal.\n"
"The message sequence is as follows:"
msgstr ""
@@ -14269,8 +17795,10 @@ msgid ""
"After the SessionConfirmed message is received, Bob sends a small\n"
"DeliveryStatus message\n"
"as a confirmation.\n"
-"In this message, the 4-byte message ID is set to a random number, and the\n"
-"8-byte \"arrival time\" is set to the current network-wide ID, which is 2\n"
+"In this message, the 4-byte message ID is set to a random number, and the"
+"\n"
+"8-byte \"arrival time\" is set to the current network-wide ID, which is 2"
+"\n"
"(i.e. 0x0000000000000002)."
msgstr ""
@@ -14285,7 +17813,8 @@ msgstr ""
#: i2p2www/pages/site/docs/transport/ssu.html:322
msgid ""
-"It does not appear that the type of the status message or its contents matters.\n"
+"It does not appear that the type of the status message or its contents "
+"matters.\n"
"It was originally added becasue the DatabaseStore message was delayed\n"
"several seconds; since the store is now sent immediately, perhaps\n"
"the status message can be eliminated."
@@ -14294,7 +17823,8 @@ msgstr ""
#: i2p2www/pages/site/docs/transport/ssu.html:331
msgid ""
"Introduction keys are delivered through an external channel \n"
-"(the network database, where they are identical to the router Hash for now)\n"
+"(the network database, where they are identical to the router Hash for "
+"now)\n"
"and must be used when establishing a session key. For the indirect\n"
"address, the peer must first contact the relayhost and ask them for\n"
"an introduction to the peer known at that relayhost under the given\n"
@@ -14312,16 +17842,24 @@ msgid ""
"is necessary for efficient NAT traversal. Charlie, a router behind a\n"
"NAT or firewall which does not allow unsolicited inbound UDP packets,\n"
"first contacts a few peers, choosing some to serve as introducers. Each\n"
-"of these peers (Bob, Bill, Betty, etc) provide Charlie with an introduction\n"
-"tag - a 4 byte random number - which he then makes available to the public\n"
-"as methods of contacting him. Alice, a router who has Charlie's published\n"
-"contact methods, first sends a RelayRequest packet to one or more of the \n"
+"of these peers (Bob, Bill, Betty, etc) provide Charlie with an "
+"introduction\n"
+"tag - a 4 byte random number - which he then makes available to the "
+"public\n"
+"as methods of contacting him. Alice, a router who has Charlie's "
+"published\n"
+"contact methods, first sends a RelayRequest packet to one or more of the"
+" \n"
"introducers, asking each to introduce her to Charlie (offering the \n"
"introduction tag to identify Charlie). Bob then forwards a RelayIntro\n"
-"packet to Charlie including Alice's public IP and port number, then sends\n"
-"Alice back a RelayResponse packet containing Charlie's public IP and port\n"
-"number. When Charlie receives the RelayIntro packet, he sends off a small\n"
-"random packet to Alice's IP and port (poking a hole in his NAT/firewall),\n"
+"packet to Charlie including Alice's public IP and port number, then sends"
+"\n"
+"Alice back a RelayResponse packet containing Charlie's public IP and port"
+"\n"
+"number. When Charlie receives the RelayIntro packet, he sends off a "
+"small\n"
+"random packet to Alice's IP and port (poking a hole in his NAT/firewall),"
+"\n"
"and when Alice receives Bob's RelayResponse packet, she begins a new \n"
"full direction session establishment with the specified IP and port."
msgstr ""
@@ -14331,14 +17869,13 @@ msgid "Connection establishment (indirect using an introducer)"
msgstr ""
#: i2p2www/pages/site/docs/transport/ssu.html:374
-msgid ""
-"Alice first connects to introducer Bob, who relays the request to Charlie."
+msgid "Alice first connects to introducer Bob, who relays the request to Charlie."
msgstr ""
#: i2p2www/pages/site/docs/transport/ssu.html:392
msgid ""
-"After the hole punch, the session is established between Alice and Charlie "
-"as in a direct establishment."
+"After the hole punch, the session is established between Alice and "
+"Charlie as in a direct establishment."
msgstr ""
#: i2p2www/pages/site/docs/transport/ssu.html:404
@@ -14442,12 +17979,14 @@ msgstr ""
#: i2p2www/pages/site/docs/transport/ssu.html:510
#, python-format
msgid ""
-"The details of windowing, ACK, and retransmission strategies are not specified\n"
+"The details of windowing, ACK, and retransmission strategies are not "
+"specified\n"
"here. See the Java code for the current implementation.\n"
"During the establishment phase, and for peer testing, routers\n"
"should implement exponential backoff for retransmission.\n"
"For an established connection, routers should implement\n"
-"an adjustable transmission window, RTT estimate and timeout, similar to TCP\n"
+"an adjustable transmission window, RTT estimate and timeout, similar to "
+"TCP\n"
"or streaming.\n"
"See the code for initial, min and max parameters."
msgstr ""
@@ -14491,22 +18030,27 @@ msgstr ""
#: i2p2www/pages/site/docs/transport/ssu.html:556
msgid ""
-"Analysis of current SSU performance, including assessment of window size adjustment\n"
-"and other parameters, and adjustment of the protocol implementation to improve\n"
+"Analysis of current SSU performance, including assessment of window size "
+"adjustment\n"
+"and other parameters, and adjustment of the protocol implementation to "
+"improve\n"
"performance, is a topic for future work."
msgstr ""
#: i2p2www/pages/site/docs/transport/ssu.html:562
msgid ""
-"The current implementation repeatedly sends acknowledgments for the same packets,\n"
+"The current implementation repeatedly sends acknowledgments for the same "
+"packets,\n"
"which unnecessarily increases overhead."
msgstr ""
#: i2p2www/pages/site/docs/transport/ssu.html:567
msgid ""
-"The default small MTU value of 620 should be analyzed and possibly increased.\n"
+"The default small MTU value of 620 should be analyzed and possibly "
+"increased.\n"
"The current MTU adjustment strategy should be evaluated.\n"
-"Does a streaming lib 1730-byte packet fit in 3 small SSU packets? Probably not."
+"Does a streaming lib 1730-byte packet fit in 3 small SSU packets? "
+"Probably not."
msgstr ""
#: i2p2www/pages/site/docs/transport/ssu.html:573
@@ -14519,28 +18063,32 @@ msgstr ""
#: i2p2www/pages/site/docs/transport/ssu.html:581
msgid ""
-"The potential use of the 'challenge' fields in RelayIntro and RelayResponse,\n"
-"and use of the padding field in SessionRequest and SessionCreated, is undocumented."
+"The potential use of the 'challenge' fields in RelayIntro and "
+"RelayResponse,\n"
+"and use of the padding field in SessionRequest and SessionCreated, is "
+"undocumented."
msgstr ""
#: i2p2www/pages/site/docs/transport/ssu.html:586
msgid ""
"Instead of a single fragment per packet, a more efficient\n"
-"strategy may be to bundle multiple message fragments into the same packet,\n"
+"strategy may be to bundle multiple message fragments into the same "
+"packet,\n"
"so long as it doesn't exceed the MTU."
msgstr ""
#: i2p2www/pages/site/docs/transport/ssu.html:592
msgid ""
"A set of fixed packet sizes may be appropriate to further hide the data \n"
-"fragmentation to external adversaries, but the tunnel, garlic, and end to \n"
+"fragmentation to external adversaries, but the tunnel, garlic, and end to"
+" \n"
"end padding should be sufficient for most needs until then."
msgstr ""
#: i2p2www/pages/site/docs/transport/ssu.html:598
msgid ""
-"Why are introduction keys the same as the router hash, should it be changed,"
-" would there be any benefit?"
+"Why are introduction keys the same as the router hash, should it be "
+"changed, would there be any benefit?"
msgstr ""
#: i2p2www/pages/site/docs/transport/ssu.html:602
@@ -14549,8 +18097,8 @@ msgstr ""
#: i2p2www/pages/site/docs/transport/ssu.html:606
msgid ""
-"Signed-on times in SessionCreated and SessionConfirmed appear to be unused "
-"or unverified."
+"Signed-on times in SessionCreated and SessionConfirmed appear to be "
+"unused or unverified."
msgstr ""
#: i2p2www/pages/site/docs/transport/ssu.html:611
@@ -14560,7 +18108,8 @@ msgstr ""
#: i2p2www/pages/site/docs/transport/ssu.html:612
msgid ""
"This diagram\n"
-"should accurately reflect the current implementation, however there may be small differences."
+"should accurately reflect the current implementation, however there may "
+"be small differences."
msgstr ""
#: i2p2www/pages/site/docs/transport/ssu.html:620
@@ -14588,9 +18137,12 @@ msgid ""
"Within I2P, messages are passed in one direction through a virtual\n"
"tunnel of peers, using whatever means are available to pass the \n"
"message on to the next hop. Messages arrive at the tunnel's \n"
-"gateway, get bundled up and/or fragmented into fixed-size tunnel messages, \n"
-"and are forwarded on to the next hop in the tunnel, which processes and verifies\n"
-"the validity of the message and sends it on to the next hop, and so on, until\n"
+"gateway, get bundled up and/or fragmented into fixed-size tunnel "
+"messages, \n"
+"and are forwarded on to the next hop in the tunnel, which processes and "
+"verifies\n"
+"the validity of the message and sends it on to the next hop, and so on, "
+"until\n"
"it reaches the tunnel endpoint. That endpoint takes the messages\n"
"bundled up by the gateway and forwards them as instructed - either\n"
"to another router, to another tunnel on another router, or locally."
@@ -14612,9 +18164,12 @@ msgid ""
"in the tunnel, and provides each with the necessary configuration\n"
"data. They may have any number of hops.\n"
"It is the intent to make\n"
-"it hard for either participants or third parties to determine the length of \n"
-"a tunnel, or even for colluding participants to determine whether they are a\n"
-"part of the same tunnel at all (barring the situation where colluding peers are\n"
+"it hard for either participants or third parties to determine the length "
+"of \n"
+"a tunnel, or even for colluding participants to determine whether they "
+"are a\n"
+"part of the same tunnel at all (barring the situation where colluding "
+"peers are\n"
"next to each other in the tunnel)."
msgstr ""
@@ -14652,7 +18207,8 @@ msgstr ""
#: i2p2www/pages/site/docs/tunnels/implementation.html:69
#, python-format
msgid ""
-"After a tunnel is built, I2NP messages are processed and passed through it.\n"
+"After a tunnel is built, I2NP messages are "
+"processed and passed through it.\n"
"Tunnel operation has four distinct processes, taken on by various \n"
"peers in the tunnel."
msgstr ""
@@ -14679,7 +18235,8 @@ msgstr ""
#: i2p2www/pages/site/docs/tunnels/implementation.html:89
msgid ""
-"Eventually, the tunnel messages arrive at the endpoint where the I2NP messages\n"
+"Eventually, the tunnel messages arrive at the endpoint where the I2NP "
+"messages\n"
"originally bundled by the gateway are reassembled and forwarded on as \n"
"requested."
msgstr ""
@@ -14739,13 +18296,11 @@ msgid "Decrypt (using an encryption operation)"
msgstr ""
#: i2p2www/pages/site/docs/tunnels/implementation.html:133
-msgid ""
-"Decrypt (using an encryption operation) to reveal plaintext tunnel message"
+msgid "Decrypt (using an encryption operation) to reveal plaintext tunnel message"
msgstr ""
#: i2p2www/pages/site/docs/tunnels/implementation.html:134
-msgid ""
-"Reassemble Fragments, Forward as instructed to Inbound Gateway or Router"
+msgid "Reassemble Fragments, Forward as instructed to Inbound Gateway or Router"
msgstr ""
#: i2p2www/pages/site/docs/tunnels/implementation.html:142
@@ -14806,8 +18361,10 @@ msgstr ""
#: i2p2www/pages/site/docs/tunnels/implementation.html:181
msgid ""
"Tunnel IDs are 4 byte numbers used at each hop - participants know what\n"
-"tunnel ID to listen for messages with and what tunnel ID they should be forwarded\n"
-"on as to the next hop, and each hop chooses the tunnel ID which they receive messages\n"
+"tunnel ID to listen for messages with and what tunnel ID they should be "
+"forwarded\n"
+"on as to the next hop, and each hop chooses the tunnel ID which they "
+"receive messages\n"
"on. Tunnels themselves are short-lived (10 minutes).\n"
"Even if subsequent tunnels are built using the same sequence of \n"
"peers, each hop's tunnel ID will change."
@@ -14815,11 +18372,16 @@ msgstr ""
#: i2p2www/pages/site/docs/tunnels/implementation.html:190
msgid ""
-"To prevent adversaries from tagging the messages along the path by adjusting\n"
-"the message size, all tunnel messages are a fixed 1024 bytes in size. To accommodate \n"
-"larger I2NP messages as well as to support smaller ones more efficiently, the\n"
-"gateway splits up the larger I2NP messages into fragments contained within each\n"
-"tunnel message. The endpoint will attempt to rebuild the I2NP message from the\n"
+"To prevent adversaries from tagging the messages along the path by "
+"adjusting\n"
+"the message size, all tunnel messages are a fixed 1024 bytes in size. To"
+" accommodate \n"
+"larger I2NP messages as well as to support smaller ones more efficiently,"
+" the\n"
+"gateway splits up the larger I2NP messages into fragments contained "
+"within each\n"
+"tunnel message. The endpoint will attempt to rebuild the I2NP message "
+"from the\n"
"fragments for a short period of time, but will discard them as necessary."
msgstr ""
@@ -14836,20 +18398,30 @@ msgstr ""
#: i2p2www/pages/site/docs/tunnels/implementation.html:207
msgid ""
-"After the preprocessing of messages into a padded payload, the gateway builds\n"
-"a random 16 byte IV value, iteratively encrypting it and the tunnel message as\n"
-"necessary, and forwards the tuple {tunnelID, IV, encrypted tunnel message} to the next hop."
+"After the preprocessing of messages into a padded payload, the gateway "
+"builds\n"
+"a random 16 byte IV value, iteratively encrypting it and the tunnel "
+"message as\n"
+"necessary, and forwards the tuple {tunnelID, IV, encrypted tunnel "
+"message} to the next hop."
msgstr ""
#: i2p2www/pages/site/docs/tunnels/implementation.html:213
msgid ""
-"How encryption at the gateway is done depends on whether the tunnel is an\n"
-"inbound or an outbound tunnel. For inbound tunnels, they simply select a random\n"
-"IV, postprocessing and updating it to generate the IV for the gateway and using \n"
-"that IV along side their own layer key to encrypt the preprocessed data. For outbound \n"
-"tunnels they must iteratively decrypt the (unencrypted) IV and preprocessed \n"
-"data with the IV and layer keys for all hops in the tunnel. The result of the outbound\n"
-"tunnel encryption is that when each peer encrypts it, the endpoint will recover \n"
+"How encryption at the gateway is done depends on whether the tunnel is an"
+"\n"
+"inbound or an outbound tunnel. For inbound tunnels, they simply select a"
+" random\n"
+"IV, postprocessing and updating it to generate the IV for the gateway and"
+" using \n"
+"that IV along side their own layer key to encrypt the preprocessed data."
+" For outbound \n"
+"tunnels they must iteratively decrypt the (unencrypted) IV and "
+"preprocessed \n"
+"data with the IV and layer keys for all hops in the tunnel. The result "
+"of the outbound\n"
+"tunnel encryption is that when each peer encrypts it, the endpoint will "
+"recover \n"
"the initial preprocessed data."
msgstr ""
@@ -14859,29 +18431,46 @@ msgstr ""
#: i2p2www/pages/site/docs/tunnels/implementation.html:227
msgid ""
-"When a peer receives a tunnel message, it checks that the message came from\n"
-"the same previous hop as before (initialized when the first message comes through\n"
-"the tunnel). If the previous peer is a different router, or if the message has\n"
-"already been seen, the message is dropped. The participant then encrypts the \n"
-"received IV with AES256/ECB using their IV key to determine the current IV, uses \n"
-"that IV with the participant's layer key to encrypt the data, encrypts the \n"
-"current IV with AES256/ECB using their IV key again, then forwards the tuple \n"
-"{nextTunnelId, nextIV, encryptedData} to the next hop. This double encryption\n"
+"When a peer receives a tunnel message, it checks that the message came "
+"from\n"
+"the same previous hop as before (initialized when the first message comes"
+" through\n"
+"the tunnel). If the previous peer is a different router, or if the "
+"message has\n"
+"already been seen, the message is dropped. The participant then encrypts"
+" the \n"
+"received IV with AES256/ECB using their IV key to determine the current "
+"IV, uses \n"
+"that IV with the participant's layer key to encrypt the data, encrypts "
+"the \n"
+"current IV with AES256/ECB using their IV key again, then forwards the "
+"tuple \n"
+"{nextTunnelId, nextIV, encryptedData} to the next hop. This double "
+"encryption\n"
"of the IV (both before and after use) help address a certain class of\n"
"confirmation attacks."
msgstr ""
#: i2p2www/pages/site/docs/tunnels/implementation.html:243
msgid ""
-"Duplicate message detection is handled by a decaying Bloom filter on message\n"
-"IVs. Each router maintains a single Bloom filter to contain the XOR of the IV and\n"
-"the first block of the message received for all of the tunnels it is participating\n"
-"in, modified to drop seen entries after 10-20 minutes (when the tunnels will have\n"
-"expired). The size of the bloom filter and the parameters used are sufficient to\n"
-"more than saturate the router's network connection with a negligible chance of \n"
-"false positive. The unique value fed into the Bloom filter is the XOR of the IV \n"
-"and the first block so as to prevent nonsequential colluding peers in the tunnel \n"
-"from tagging a message by resending it with the IV and first block switched."
+"Duplicate message detection is handled by a decaying Bloom filter on "
+"message\n"
+"IVs. Each router maintains a single Bloom filter to contain the XOR of "
+"the IV and\n"
+"the first block of the message received for all of the tunnels it is "
+"participating\n"
+"in, modified to drop seen entries after 10-20 minutes (when the tunnels "
+"will have\n"
+"expired). The size of the bloom filter and the parameters used are "
+"sufficient to\n"
+"more than saturate the router's network connection with a negligible "
+"chance of \n"
+"false positive. The unique value fed into the Bloom filter is the XOR of"
+" the IV \n"
+"and the first block so as to prevent nonsequential colluding peers in the"
+" tunnel \n"
+"from tagging a message by resending it with the IV and first block "
+"switched."
msgstr ""
#: i2p2www/pages/site/docs/tunnels/implementation.html:256
@@ -14890,19 +18479,27 @@ msgstr ""
#: i2p2www/pages/site/docs/tunnels/implementation.html:258
msgid ""
-"After receiving and validating a tunnel message at the last hop in the tunnel,\n"
-"how the endpoint recovers the data encoded by the gateway depends upon whether \n"
-"the tunnel is an inbound or an outbound tunnel. For outbound tunnels, the \n"
-"endpoint encrypts the message with its layer key just like any other participant, \n"
-"exposing the preprocessed data. For inbound tunnels, the endpoint is also the \n"
-"tunnel creator so they can merely iteratively decrypt the IV and message, using the \n"
+"After receiving and validating a tunnel message at the last hop in the "
+"tunnel,\n"
+"how the endpoint recovers the data encoded by the gateway depends upon "
+"whether \n"
+"the tunnel is an inbound or an outbound tunnel. For outbound tunnels, "
+"the \n"
+"endpoint encrypts the message with its layer key just like any other "
+"participant, \n"
+"exposing the preprocessed data. For inbound tunnels, the endpoint is "
+"also the \n"
+"tunnel creator so they can merely iteratively decrypt the IV and message,"
+" using the \n"
"layer and IV keys of each step in reverse order."
msgstr ""
#: i2p2www/pages/site/docs/tunnels/implementation.html:268
msgid ""
-"At this point, the tunnel endpoint has the preprocessed data sent by the gateway,\n"
-"which it may then parse out into the included I2NP messages and forwards them as\n"
+"At this point, the tunnel endpoint has the preprocessed data sent by the "
+"gateway,\n"
+"which it may then parse out into the included I2NP messages and forwards "
+"them as\n"
"requested in their delivery instructions."
msgstr ""
@@ -14912,21 +18509,30 @@ msgstr ""
#: i2p2www/pages/site/docs/tunnels/implementation.html:277
msgid ""
-"When building a tunnel, the creator must send a request with the necessary\n"
-"configuration data to each of the hops and wait for all of them to agree before\n"
-"enabling the tunnel. The requests are encrypted so that only the peers who need\n"
-"to know a piece of information (such as the tunnel layer or IV key) has that\n"
-"data. In addition, only the tunnel creator will have access to the peer's\n"
-"reply. There are three important dimensions to keep in mind when producing\n"
-"the tunnels: what peers are used (and where), how the requests are sent (and \n"
+"When building a tunnel, the creator must send a request with the "
+"necessary\n"
+"configuration data to each of the hops and wait for all of them to agree "
+"before\n"
+"enabling the tunnel. The requests are encrypted so that only the peers "
+"who need\n"
+"to know a piece of information (such as the tunnel layer or IV key) has "
+"that\n"
+"data. In addition, only the tunnel creator will have access to the "
+"peer's\n"
+"reply. There are three important dimensions to keep in mind when "
+"producing\n"
+"the tunnels: what peers are used (and where), how the requests are sent "
+"(and \n"
"replies received), and how they are maintained."
msgstr ""
#: i2p2www/pages/site/docs/tunnels/implementation.html:291
msgid ""
-"Beyond the two types of tunnels - inbound and outbound - there are two styles\n"
+"Beyond the two types of tunnels - inbound and outbound - there are two "
+"styles\n"
"of peer selection used for different tunnels - exploratory and client.\n"
-"Exploratory tunnels are used for both network database maintenance and tunnel\n"
+"Exploratory tunnels are used for both network database maintenance and "
+"tunnel\n"
"maintenance, while client tunnels are used for end to end client messages."
msgstr ""
@@ -14936,12 +18542,18 @@ msgstr ""
#: i2p2www/pages/site/docs/tunnels/implementation.html:301
msgid ""
-"Exploratory tunnels are built out of a random selection of peers from a subset\n"
-"of the network. The particular subset varies on the local router and on what their\n"
-"tunnel routing needs are. In general, the exploratory tunnels are built out of\n"
-"randomly selected peers who are in the peer's \"not failing but active\" profile\n"
-"category. The secondary purpose of the tunnels, beyond merely tunnel routing,\n"
-"is to find underutilized high capacity peers so that they can be promoted for\n"
+"Exploratory tunnels are built out of a random selection of peers from a "
+"subset\n"
+"of the network. The particular subset varies on the local router and on "
+"what their\n"
+"tunnel routing needs are. In general, the exploratory tunnels are built "
+"out of\n"
+"randomly selected peers who are in the peer's \"not failing but active\" "
+"profile\n"
+"category. The secondary purpose of the tunnels, beyond merely tunnel "
+"routing,\n"
+"is to find underutilized high capacity peers so that they can be promoted"
+" for\n"
"use in client tunnels."
msgstr ""
@@ -14958,10 +18570,14 @@ msgstr ""
#: i2p2www/pages/site/docs/tunnels/implementation.html:319
msgid ""
-"Client tunnels are built with a more stringent set of requirements - the local\n"
-"router will select peers out of its \"fast and high capacity\" profile category so\n"
-"that performance and reliability will meet the needs of the client application.\n"
-"However, there are several important details beyond that basic selection that \n"
+"Client tunnels are built with a more stringent set of requirements - the "
+"local\n"
+"router will select peers out of its \"fast and high capacity\" profile "
+"category so\n"
+"that performance and reliability will meet the needs of the client "
+"application.\n"
+"However, there are several important details beyond that basic selection "
+"that \n"
"should be adhered to, depending upon the client's anonymity needs."
msgstr ""
@@ -14987,8 +18603,10 @@ msgstr ""
#: i2p2www/pages/site/docs/tunnels/implementation.html:341
msgid ""
"To frustrate the predecessor \n"
-"attack, the tunnel selection keeps the peers selected in a strict order -\n"
-"if A, B, and C are in a tunnel for a particular tunnel pool, the hop after A is always B, and the hop after\n"
+"attack, the tunnel selection keeps the peers selected in a strict order -"
+"\n"
+"if A, B, and C are in a tunnel for a particular tunnel pool, the hop "
+"after A is always B, and the hop after\n"
"B is always C."
msgstr ""
@@ -14997,15 +18615,18 @@ msgid ""
"Ordering is implemented by generating a random 32-byte key for each\n"
"tunnel pool at startup.\n"
"Peers should not be able to guess the ordering, or an attacker could\n"
-"craft two router hashes far apart to maximize the chance of being at both\n"
+"craft two router hashes far apart to maximize the chance of being at both"
+"\n"
"ends of a tunnel.\n"
"Peers are sorted by XOR distance of the\n"
-"SHA256 Hash of (the peer's hash concatenated with the random key) from the random key"
+"SHA256 Hash of (the peer's hash concatenated with the random key) from "
+"the random key"
msgstr ""
#: i2p2www/pages/site/docs/tunnels/implementation.html:363
msgid ""
-"Because each tunnel pool uses a different random key, ordering is consistent\n"
+"Because each tunnel pool uses a different random key, ordering is "
+"consistent\n"
"within a single pool but not between different pools.\n"
"New keys are generated at each router restart."
msgstr ""
@@ -15017,7 +18638,8 @@ msgstr ""
#: i2p2www/pages/site/docs/tunnels/implementation.html:372
#, python-format
msgid ""
-"A multi-hop tunnel is built using a single build message which is repeatedly\n"
+"A multi-hop tunnel is built using a single build message which is "
+"repeatedly\n"
"decrypted and forwarded. In the terminology of\n"
"Hashing it out in Public,\n"
"this is \"non-interactive\" telescopic tunnel building."
@@ -15028,28 +18650,38 @@ msgstr ""
msgid ""
"This tunnel request preparation, delivery, and response method is\n"
"designed to reduce the number of\n"
-"predecessors exposed, cuts the number of messages transmitted, verifies proper\n"
-"connectivity, and avoids the message counting attack of traditional telescopic\n"
+"predecessors exposed, cuts the number of messages transmitted, verifies "
+"proper\n"
+"connectivity, and avoids the message counting attack of traditional "
+"telescopic\n"
"tunnel creation.\n"
-"(This method, which sends messages to extend a tunnel through the already-established\n"
-"part of the tunnel, is termed \"interactive\" telescopic tunnel building in\n"
+"(This method, which sends messages to extend a tunnel through the "
+"already-established\n"
+"part of the tunnel, is termed \"interactive\" telescopic tunnel building "
+"in\n"
"the \"Hashing it out\" paper.)"
msgstr ""
#: i2p2www/pages/site/docs/tunnels/implementation.html:390
#, python-format
msgid ""
-"The details of tunnel request and response messages, and their encryption,\n"
+"The details of tunnel request and response messages, and their "
+"encryption,\n"
"are specified here."
msgstr ""
#: i2p2www/pages/site/docs/tunnels/implementation.html:395
msgid ""
-"Peers may reject tunnel creation requests for a variety of reasons, though\n"
-"a series of four increasingly severe rejections are known: probabilistic rejection\n"
-"(due to approaching the router's capacity, or in response to a flood of requests), \n"
-"transient overload, bandwidth overload, and critical failure. When received, \n"
-"those four are interpreted by the tunnel creator to help adjust their profile of\n"
+"Peers may reject tunnel creation requests for a variety of reasons, "
+"though\n"
+"a series of four increasingly severe rejections are known: probabilistic "
+"rejection\n"
+"(due to approaching the router's capacity, or in response to a flood of "
+"requests), \n"
+"transient overload, bandwidth overload, and critical failure. When "
+"received, \n"
+"those four are interpreted by the tunnel creator to help adjust their "
+"profile of\n"
"the router in question."
msgstr ""
@@ -15067,26 +18699,37 @@ msgstr ""
#: i2p2www/pages/site/docs/tunnels/implementation.html:412
#, python-format
msgid ""
-"To allow efficient operation, the router maintains a series of tunnel pools,\n"
-"each managing a group of tunnels used for a specific purpose with their own\n"
-"configuration. When a tunnel is needed for that purpose, the router selects one\n"
-"out of the appropriate pool at random. Overall, there are two exploratory tunnel\n"
-"pools - one inbound and one outbound - each using the router's default configuration.\n"
+"To allow efficient operation, the router maintains a series of tunnel "
+"pools,\n"
+"each managing a group of tunnels used for a specific purpose with their "
+"own\n"
+"configuration. When a tunnel is needed for that purpose, the router "
+"selects one\n"
+"out of the appropriate pool at random. Overall, there are two "
+"exploratory tunnel\n"
+"pools - one inbound and one outbound - each using the router's default "
+"configuration.\n"
"In addition, there is a pair of pools for each local destination -\n"
-"one inbound and one outbound tunnel pool. Those pools use the configuration specified\n"
-"when the local destination connects to the router via I2CP, or the router's defaults if\n"
+"one inbound and one outbound tunnel pool. Those pools use the "
+"configuration specified\n"
+"when the local destination connects to the router via I2CP, or the router's defaults if\n"
"not specified."
msgstr ""
#: i2p2www/pages/site/docs/tunnels/implementation.html:424
#, python-format
msgid ""
-"Each pool has within its configuration a few key settings, defining how many\n"
-"tunnels to keep active, how many backup tunnels to maintain in case of failure,\n"
+"Each pool has within its configuration a few key settings, defining how "
+"many\n"
+"tunnels to keep active, how many backup tunnels to maintain in case of "
+"failure,\n"
"how long the tunnels should be, whether those\n"
"lengths should be randomized, as \n"
-"well as any of the other settings allowed when configuring individual tunnels.\n"
-"Configuration options are specified on the I2CP page."
+"well as any of the other settings allowed when configuring individual "
+"tunnels.\n"
+"Configuration options are specified on the I2CP "
+"page."
msgstr ""
#: i2p2www/pages/site/docs/tunnels/implementation.html:434
@@ -15103,14 +18746,20 @@ msgstr ""
#: i2p2www/pages/site/docs/tunnels/implementation.html:440
msgid ""
-"Tunnel building is expensive, and tunnels expire a fixed time after they are built.\n"
-"However, when a pool that runs out of tunnels, the Destination is essentially dead.\n"
-"In addition, tunnel build success rate may vary greatly with both local and global\n"
+"Tunnel building is expensive, and tunnels expire a fixed time after they "
+"are built.\n"
+"However, when a pool that runs out of tunnels, the Destination is "
+"essentially dead.\n"
+"In addition, tunnel build success rate may vary greatly with both local "
+"and global\n"
"network conditions.\n"
-"Therefore, it is important to maintain an anticipatory, adaptive build strategy\n"
-"to ensure that new tunnels are successfully built before they are needed,\n"
+"Therefore, it is important to maintain an anticipatory, adaptive build "
+"strategy\n"
+"to ensure that new tunnels are successfully built before they are needed,"
+"\n"
"without building an excess of tunnels, building them too soon,\n"
-"or consuming too much CPU or bandwidth creating and sending the encrypted build messages."
+"or consuming too much CPU or bandwidth creating and sending the encrypted"
+" build messages."
msgstr ""
#: i2p2www/pages/site/docs/tunnels/implementation.html:451
@@ -15118,7 +18767,8 @@ msgid ""
"For each tuple {exploratory/client, in/out, length, length variance}\n"
"the router maintains statistics on the time required for a successful\n"
"tunnel build.\n"
-"Using these statistics, it calculates how long before a tunnel's expiration\n"
+"Using these statistics, it calculates how long before a tunnel's "
+"expiration\n"
"it should start attempting to build a replacement.\n"
"As the expiration time approaches without a successful replacement,\n"
"it starts multiple build attempts in parallel, and then\n"
@@ -15140,18 +18790,30 @@ msgstr ""
#: i2p2www/pages/site/docs/tunnels/implementation.html:473
msgid ""
-"Even though the tunnels within I2P bear a resemblance to a circuit switched\n"
-"network, everything within I2P is strictly message based - tunnels are merely\n"
-"accounting tricks to help organize the delivery of messages. No assumptions are\n"
-"made regarding reliability or ordering of messages, and retransmissions are left\n"
-"to higher levels (e.g. I2P's client layer streaming library). This allows I2P\n"
-"to take advantage of throttling techniques available to both packet switched and\n"
-"circuit switched networks. For instance, each router may keep track of the \n"
-"moving average of how much data each tunnel is using, combine that with all of \n"
-"the averages used by other tunnels the router is participating in, and be able\n"
-"to accept or reject additional tunnel participation requests based on its \n"
-"capacity and utilization. On the other hand, each router can simply drop \n"
-"messages that are beyond its capacity, exploiting the research used on the \n"
+"Even though the tunnels within I2P bear a resemblance to a circuit "
+"switched\n"
+"network, everything within I2P is strictly message based - tunnels are "
+"merely\n"
+"accounting tricks to help organize the delivery of messages. No "
+"assumptions are\n"
+"made regarding reliability or ordering of messages, and retransmissions "
+"are left\n"
+"to higher levels (e.g. I2P's client layer streaming library). This "
+"allows I2P\n"
+"to take advantage of throttling techniques available to both packet "
+"switched and\n"
+"circuit switched networks. For instance, each router may keep track of "
+"the \n"
+"moving average of how much data each tunnel is using, combine that with "
+"all of \n"
+"the averages used by other tunnels the router is participating in, and be"
+" able\n"
+"to accept or reject additional tunnel participation requests based on its"
+" \n"
+"capacity and utilization. On the other hand, each router can simply drop"
+" \n"
+"messages that are beyond its capacity, exploiting the research used on "
+"the \n"
"normal Internet."
msgstr ""
@@ -15159,16 +18821,23 @@ msgstr ""
msgid ""
"In the current implementation, routers implement a\n"
"weighted random early discard (WRED) strategy.\n"
-"For all participating routers (internal participant, inbound gateway, and outbound endpoint),\n"
+"For all participating routers (internal participant, inbound gateway, and"
+" outbound endpoint),\n"
"the router will start randomly dropping a portion of messages as the\n"
"bandwidth limits are approached.\n"
-"As traffic gets closer to, or exceeds, the limits, more messages are dropped.\n"
-"For an internal participant, all messages are fragmented and padded and therefore are the same size.\n"
-"At the inbound gateway and outbound endpoint, however, the dropping decision is made\n"
-"on the full (coalesced) message, and the message size is taken into account.\n"
+"As traffic gets closer to, or exceeds, the limits, more messages are "
+"dropped.\n"
+"For an internal participant, all messages are fragmented and padded and "
+"therefore are the same size.\n"
+"At the inbound gateway and outbound endpoint, however, the dropping "
+"decision is made\n"
+"on the full (coalesced) message, and the message size is taken into "
+"account.\n"
"Larger messages are more likely to be dropped.\n"
-"Also, messages are more likely to be dropped at the outbound endpoint than the inbound gateway,\n"
-"as those messages are not as \"far along\" in their journey and thus the network cost of\n"
+"Also, messages are more likely to be dropped at the outbound endpoint "
+"than the inbound gateway,\n"
+"as those messages are not as \"far along\" in their journey and thus the "
+"network cost of\n"
"dropping those messages is lower."
msgstr ""
@@ -15178,11 +18847,16 @@ msgstr ""
#: i2p2www/pages/site/docs/tunnels/implementation.html:509
msgid ""
-"What strategies could be used at the gateway and at each hop for delaying,\n"
-"reordering, rerouting, or padding messages? To what extent should this be done\n"
-"automatically, how much should be configured as a per tunnel or per hop setting,\n"
-"and how should the tunnel's creator (and in turn, user) control this operation?\n"
-"All of this is left as unknown, to be worked out for a distant future release."
+"What strategies could be used at the gateway and at each hop for "
+"delaying,\n"
+"reordering, rerouting, or padding messages? To what extent should this "
+"be done\n"
+"automatically, how much should be configured as a per tunnel or per hop "
+"setting,\n"
+"and how should the tunnel's creator (and in turn, user) control this "
+"operation?\n"
+"All of this is left as unknown, to be worked out for a distant future "
+"release."
msgstr ""
#: i2p2www/pages/site/docs/tunnels/implementation.html:518
@@ -15191,10 +18865,13 @@ msgstr ""
#: i2p2www/pages/site/docs/tunnels/implementation.html:519
msgid ""
-"The padding strategies can be used on a variety of levels, addressing the\n"
+"The padding strategies can be used on a variety of levels, addressing the"
+"\n"
"exposure of message size information to different adversaries.\n"
-"The current fixed tunnel message size is 1024 bytes. Within this however, the fragmented\n"
-"messages themselves are not padded by the tunnel at all, though for end to end \n"
+"The current fixed tunnel message size is 1024 bytes. Within this "
+"however, the fragmented\n"
+"messages themselves are not padded by the tunnel at all, though for end "
+"to end \n"
"messages, they may be padded as part of the garlic wrapping."
msgstr ""
@@ -15218,7 +18895,8 @@ msgstr ""
#: i2p2www/pages/site/docs/tunnels/unidirectional.html:7
msgid ""
-"This page describes the origins and design of I2P's unidirectional tunnels.\n"
+"This page describes the origins and design of I2P's unidirectional "
+"tunnels.\n"
"For further infomrmation see:"
msgstr ""
@@ -15252,7 +18930,8 @@ msgid ""
"Several apps and protocols, notably HTTP,\n"
"do transfer data in such manner. Having the traffic follow the same \n"
"route to its destination and back could make it easier for an \n"
-"attacker who has only timing and traffic volume data to infer the path a \n"
+"attacker who has only timing and traffic volume data to infer the path a"
+" \n"
"tunnel is taking.\n"
"Having the response come back along a different path arguably \n"
"makes it harder."
@@ -15261,27 +18940,42 @@ msgstr ""
#: i2p2www/pages/site/docs/tunnels/unidirectional.html:45
msgid ""
"When dealing with \n"
-"an internal adversary or most external adversaries, I2P's undirectional tunnels\n"
-"expose half as much traffic data than would be exposed with bidirectional circuits\n"
-"by simply looking at the flows themselves - an HTTP request and response would \n"
-"follow the same path in Tor, while in I2P the packets making up the request \n"
-"would go out through one or more outbound tunnels and the packets making up \n"
-"the response would come back through one or more different inbound tunnels."
+"an internal adversary or most external adversaries, I2P's undirectional "
+"tunnels\n"
+"expose half as much traffic data than would be exposed with bidirectional"
+" circuits\n"
+"by simply looking at the flows themselves - an HTTP request and response "
+"would \n"
+"follow the same path in Tor, while in I2P the packets making up the "
+"request \n"
+"would go out through one or more outbound tunnels and the packets making "
+"up \n"
+"the response would come back through one or more different inbound "
+"tunnels."
msgstr ""
#: i2p2www/pages/site/docs/tunnels/unidirectional.html:55
msgid ""
"The strategy of using two separate tunnels for inbound and outbound\n"
-"communication is not the only technique available, and it does have anonymity\n"
-"implications. On the positive side, by using separate tunnels it lessens the\n"
-"traffic data exposed for analysis to participants in a tunnel - for instance,\n"
-"peers in an outbound tunnel from a web browser would only see the traffic of\n"
+"communication is not the only technique available, and it does have "
+"anonymity\n"
+"implications. On the positive side, by using separate tunnels it lessens"
+" the\n"
+"traffic data exposed for analysis to participants in a tunnel - for "
+"instance,\n"
+"peers in an outbound tunnel from a web browser would only see the traffic"
+" of\n"
"an HTTP GET, while the peers in an inbound tunnel would see the payload \n"
-"delivered along the tunnel. With bidirectional tunnels, all participants would\n"
-"have access to the fact that e.g. 1KB was sent in one direction, then 100KB\n"
-"in the other. On the negative side, using unidirectional tunnels means that\n"
-"there are two sets of peers which need to be profiled and accounted for, and\n"
-"additional care must be taken to address the increased speed of predecessor\n"
+"delivered along the tunnel. With bidirectional tunnels, all participants"
+" would\n"
+"have access to the fact that e.g. 1KB was sent in one direction, then "
+"100KB\n"
+"in the other. On the negative side, using unidirectional tunnels means "
+"that\n"
+"there are two sets of peers which need to be profiled and accounted for, "
+"and\n"
+"additional care must be taken to address the increased speed of "
+"predecessor\n"
"attacks. The tunnel pooling and building process\n"
"(peer selection and ordering strategies)\n"
"should minimize the worries of the predecessor attack."
@@ -15295,71 +18989,149 @@ msgstr "Anonymat"
#, python-format
msgid ""
"A recent paper by Hermann and Grothoff\n"
-"declared that I2P's unidirectional tunnels \"seems to be a bad design decision\"."
-msgstr "Un récent papier par Hermann et Grothoff\ndéclare que les tunnels unidirectionnels de I2P \"semblent être une mauvaise décision de conception\"."
+"declared that I2P's unidirectional tunnels \"seems to be a bad design "
+"decision\"."
+msgstr ""
+"Un récent papier par Hermann et Grothoff\n"
+"déclare que les tunnels unidirectionnels de I2P \"semblent être une "
+"mauvaise décision de conception\"."
#: i2p2www/pages/site/docs/tunnels/unidirectional.html:80
msgid ""
"The paper's main point is that\n"
-"deanonymizations on unidirectional tunnels take a longer time, which is an \n"
-"advantage, but that an attacker can be more certain in the unidirectional case. \n"
-"Therefore, the paper claims it isn't an advantage at all, but a disadvantage, at least\n"
+"deanonymizations on unidirectional tunnels take a longer time, which is "
+"an \n"
+"advantage, but that an attacker can be more certain in the unidirectional"
+" case. \n"
+"Therefore, the paper claims it isn't an advantage at all, but a "
+"disadvantage, at least\n"
"with long-living eepsites."
-msgstr "La question principale que le papier cible est que\nles déanonymisations ciblant les tunnels unidirectionnels prennent davantage de temps, ce qui est un\navantage, mais qu'un attaquant peut être davantage certain dans le cas d'un unidirectionnel. Par conséquent, le papier le déclare que ce n'est pas un avantage du tout, mais un inconvénient, au moins avec les eepsites à longue durée de vie (long-living eepsites)."
+msgstr ""
+"La question principale que le papier cible est que\n"
+"les déanonymisations ciblant les tunnels unidirectionnels prennent "
+"davantage de temps, ce qui est un\n"
+"avantage, mais qu'un attaquant peut être davantage certain dans le cas "
+"d'un unidirectionnel. Par conséquent, le papier le déclare que ce n'est "
+"pas un avantage du tout, mais un inconvénient, au moins avec les eepsites"
+" à longue durée de vie (long-living eepsites)."
#: i2p2www/pages/site/docs/tunnels/unidirectional.html:88
msgid ""
-"This conclusion is not fully supported by the paper. Unidirectional tunnels clearly \n"
-"mitigate other attacks and it's not clear how to trade off the risk of the \n"
+"This conclusion is not fully supported by the paper. Unidirectional "
+"tunnels clearly \n"
+"mitigate other attacks and it's not clear how to trade off the risk of "
+"the \n"
"attack in the paper\n"
"with attacks on a bidirectional tunnel architecture."
-msgstr "Cette conclusion n'est pas entièrement soutenue par le papier. Les tunnels unidirectionnels atténuent clairement d'autres attaques et il n'est pas clair dans le papier sur la façon de négocier le risque d'attaques dans une architecture de tunnels bidirectionnels."
+msgstr ""
+"Cette conclusion n'est pas entièrement soutenue par le papier. Les "
+"tunnels unidirectionnels atténuent clairement d'autres attaques et il "
+"n'est pas clair dans le papier sur la façon de négocier le risque "
+"d'attaques dans une architecture de tunnels bidirectionnels."
#: i2p2www/pages/site/docs/tunnels/unidirectional.html:95
msgid ""
"This conclusion is based on an arbitrary certainty vs. time weighting \n"
"(tradeoff) that may not be applicable in all cases. For \n"
-"example, somebody could make a list of possible IPs then issue subpoenas to \n"
+"example, somebody could make a list of possible IPs then issue subpoenas "
+"to \n"
"each. Or the attacker could DDoS each in turn and via a simple \n"
-"intersection attack see if the eepsite goes down or is slowed down. So close \n"
+"intersection attack see if the eepsite goes down or is slowed down. So "
+"close \n"
"may be good enough, or time may be more important."
-msgstr "Sa conclusion est basée sur une certitude arbitraire contre la pondération de temps ? (la différence) qui ne peut pas être applicable dans tous les cas. Par exemple, quelqu'un pourrait faire une liste d'IPs possibles puis publier \"subpoenas\" (des citations à comparaître) à chacune. Ou l'attaquant pourrait DDoS chacune tour à tour, et via une simple attaque par intersection voir si l'eepsite tombe ou est ralenti. Ainsi de près cela peut être assez bon, ou le temps peut être plus important."
+msgstr ""
+"Sa conclusion est basée sur une certitude arbitraire contre la "
+"pondération de temps ? (la différence) qui ne peut pas être applicable "
+"dans tous les cas. Par exemple, quelqu'un pourrait faire une liste d'IPs "
+"possibles puis publier \"subpoenas\" (des citations à comparaître) à "
+"chacune. Ou l'attaquant pourrait DDoS chacune tour à tour, et via une "
+"simple attaque par intersection voir si l'eepsite tombe ou est ralenti. "
+"Ainsi de près cela peut être assez bon, ou le temps peut être plus "
+"important."
#: i2p2www/pages/site/docs/tunnels/unidirectional.html:104
msgid ""
-"The conclusion is based on a specific weighting of the importance of certainty \n"
-"vs. time, and that weighting may be wrong, and it's definitely debatable, \n"
-"especially in a real world with subpoenas, search warrants, and other methods \n"
+"The conclusion is based on a specific weighting of the importance of "
+"certainty \n"
+"vs. time, and that weighting may be wrong, and it's definitely debatable,"
+" \n"
+"especially in a real world with subpoenas, search warrants, and other "
+"methods \n"
"available for final confirmation."
-msgstr "La conclusion est basée sur une pondération spécifique de l'importance de la certitude contre (\"versus\") le temps, et que la pondération pourrait être fausse, et c'est certainement discutable, particulièrement dans un monde réel avec citations à comparaître (\"subpoeanas\"), mandats de perquisition (\"search warrants\"), et autres méthodes disponibles pour la confirmation finale."
+msgstr ""
+"La conclusion est basée sur une pondération spécifique de l'importance de"
+" la certitude contre (\"versus\") le temps, et que la pondération "
+"pourrait être fausse, et c'est certainement discutable, particulièrement "
+"dans un monde réel avec citations à comparaître (\"subpoeanas\"), mandats"
+" de perquisition (\"search warrants\"), et autres méthodes disponibles "
+"pour la confirmation finale."
#: i2p2www/pages/site/docs/tunnels/unidirectional.html:111
msgid ""
"A full analysis of the tradeoffs of unidirectional vs. bidirectional \n"
-"tunnels is clearly outside the scope of the paper, and has not been done \n"
-"elsewhere. For example, how does this attack compare to the numerous possible \n"
-"timing attacks published about onion-routed networks? Clearly the authors have not\n"
+"tunnels is clearly outside the scope of the paper, and has not been done"
+" \n"
+"elsewhere. For example, how does this attack compare to the numerous "
+"possible \n"
+"timing attacks published about onion-routed networks? Clearly the authors"
+" have not\n"
"done that analysis, if it's even possible to do it\n"
"effectively."
-msgstr "Une analyse complète des différences entre les tunnels unidirectionnels opposés (\"versus\") aux bidirectionnel est clairement à l'extérieur du périmètre du papier, et n'a d'ailleurs pas été faite. Par exemple, comment cette attaque se compare-t-elle aux nombreuses \"timing attacks\" possibles publiées au sujet des réseaux \"onion-routed\" ? Clairement les auteurs n'ont pas fait cette analyse, s'il est même effectivement possible de le faire."
+msgstr ""
+"Une analyse complète des différences entre les tunnels unidirectionnels "
+"opposés (\"versus\") aux bidirectionnel est clairement à l'extérieur du "
+"périmètre du papier, et n'a d'ailleurs pas été faite. Par exemple, "
+"comment cette attaque se compare-t-elle aux nombreuses \"timing attacks\""
+" possibles publiées au sujet des réseaux \"onion-routed\" ? Clairement "
+"les auteurs n'ont pas fait cette analyse, s'il est même effectivement "
+"possible de le faire."
#: i2p2www/pages/site/docs/tunnels/unidirectional.html:120
msgid ""
-"Tor uses bidirectional tunnels and has had a lot of academic review. I2P \n"
-"uses unidirectional tunnels and has had very little review. Does the lack of a \n"
-"research paper defending unidirectional tunnels mean that it is a poor design \n"
+"Tor uses bidirectional tunnels and has had a lot of academic review. I2P"
+" \n"
+"uses unidirectional tunnels and has had very little review. Does the lack"
+" of a \n"
+"research paper defending unidirectional tunnels mean that it is a poor "
+"design \n"
"choice, or just that it needs more study? Timing attacks and \n"
-"distributed attacks are difficult to defend against in both I2P and Tor. The \n"
-"design intent (see references above) was that unidirectional tunnels are more \n"
-"resistant to timing attacks. However, the paper presents a somewhat different type of timing \n"
+"distributed attacks are difficult to defend against in both I2P and Tor. "
+"The \n"
+"design intent (see references above) was that unidirectional tunnels are "
+"more \n"
+"resistant to timing attacks. However, the paper presents a somewhat "
+"different type of timing \n"
"attack. Is this attack, innovative as it is, sufficient to label I2P's \n"
"tunnel architecture (and thus I2P as a whole) a \"bad design\", and by \n"
-"implication clearly inferior to Tor, or is it just a design alternative that \n"
-"clearly needs further investigation and analysis? There are several other reasons \n"
-"to consider I2P currently inferior to Tor and other projects (small network \n"
-"size, lack of funding, lack of review) but is unidirectional tunnels really a \n"
+"implication clearly inferior to Tor, or is it just a design alternative "
+"that \n"
+"clearly needs further investigation and analysis? There are several other"
+" reasons \n"
+"to consider I2P currently inferior to Tor and other projects (small "
+"network \n"
+"size, lack of funding, lack of review) but is unidirectional tunnels "
+"really a \n"
"reason?"
-msgstr "Tor utilise les tunnels bidirectionnels et a subi beaucoup d'examens. I2P utilise les tunnels unidirectionnels et a subi très peu d'examens. Est-ce que le manque de papiers de recherche défendant les tunnels unidirectionnels signifie que c'est un pauvre choix de conception, ou plutôt qu'il nécessite davantage d'examens ? Il est difficile de se défendre contre les timing attacks (attaques par synchronisation) et les attaques distribuées, autant dans I2P que dans Tor. L'intention de conception (voir les références ci-dessus) était que des tunnels unidirectionnels sont plus résistants à des timing attacks. Cependant, le papier présente un type quelque peu différent de timing\nattack. Dans cette attaque, novatrice en l'état actuel des choses, suffisante pour étiqueter l'architecture de tunnel d'I2P (et ainsi I2P dans son ensemble) un \"mauvais design\", et par implication clairement inférieure à Tor, ou cela est juste une alternative de design qui a clairement besoin de la davantage d'examens et d'analyses ? Il y a plusieurs autres raisons pour considérer I2P actuellement inférieur à Tor et à d'autres projets (la petite taille du réseau, le manque de financement, le manque d'examens) mais est-ce que les tunnels unidirectionnels en sont vraiment une raison ?"
+msgstr ""
+"Tor utilise les tunnels bidirectionnels et a subi beaucoup d'examens. I2P"
+" utilise les tunnels unidirectionnels et a subi très peu d'examens. Est-"
+"ce que le manque de papiers de recherche défendant les tunnels "
+"unidirectionnels signifie que c'est un pauvre choix de conception, ou "
+"plutôt qu'il nécessite davantage d'examens ? Il est difficile de se "
+"défendre contre les timing attacks (attaques par synchronisation) et les "
+"attaques distribuées, autant dans I2P que dans Tor. L'intention de "
+"conception (voir les références ci-dessus) était que des tunnels "
+"unidirectionnels sont plus résistants à des timing attacks. Cependant, le"
+" papier présente un type quelque peu différent de timing\n"
+"attack. Dans cette attaque, novatrice en l'état actuel des choses, "
+"suffisante pour étiqueter l'architecture de tunnel d'I2P (et ainsi I2P "
+"dans son ensemble) un \"mauvais design\", et par implication clairement "
+"inférieure à Tor, ou cela est juste une alternative de design qui a "
+"clairement besoin de la davantage d'examens et d'analyses ? Il y a "
+"plusieurs autres raisons pour considérer I2P actuellement inférieur à Tor"
+" et à d'autres projets (la petite taille du réseau, le manque de "
+"financement, le manque d'examens) mais est-ce que les tunnels "
+"unidirectionnels en sont vraiment une raison ?"
#: i2p2www/pages/site/docs/tunnels/unidirectional.html:137
msgid ""
@@ -15367,4 +19139,11 @@ msgid ""
"not label bidirectional tunnels \"bad\") shorthand for \"unidirectional \n"
"tunnels are unequivocally inferior to bidirectional tunnels\", yet this \n"
"conclusion is not supported by the paper."
-msgstr "En résumé, \"mauvaise décision de conception\" est apparemment (puisque le papier\nn'étiquette pas comme \"mauvais\" les tunnels bidirectionnels) un raccourci pour \"les tunnels unidirectionnels sont sans équivoque inférieurs aux tunnels bidirectionnel\", pourtant cette conclusion n'est pas soutenue par le papier."
+msgstr ""
+"En résumé, \"mauvaise décision de conception\" est apparemment (puisque "
+"le papier\n"
+"n'étiquette pas comme \"mauvais\" les tunnels bidirectionnels) un "
+"raccourci pour \"les tunnels unidirectionnels sont sans équivoque "
+"inférieurs aux tunnels bidirectionnel\", pourtant cette conclusion n'est "
+"pas soutenue par le papier."
+
diff --git a/i2p2www/translations/fr/LC_MESSAGES/get-involved.po b/i2p2www/translations/fr/LC_MESSAGES/get-involved.po
index 85a56889..ca0cf753 100644
--- a/i2p2www/translations/fr/LC_MESSAGES/get-involved.po
+++ b/i2p2www/translations/fr/LC_MESSAGES/get-involved.po
@@ -1,28 +1,27 @@
-# Translations template for I2P.
+# French translations for I2P.
# Copyright (C) 2014 ORGANIZATION
# This file is distributed under the same license as the I2P project.
-#
+#
# Translators:
# bassmax, 2014
# Boxoa590, 2013
# magma i2p.i2p
) has been set up to "
-"enable developers to easily set up two of the commonly-used IDEs for Java "
-"development: Eclipse and NetBeans."
-msgstr "La branche principale de développement de I2P (i2p.i2p
) a été mise en place pour permettre aux développeurs de configurer facilement deux des IDE généralement utilisés pour le développement Java : Éclipse et NetBeans."
+"The main I2P development branch (i2p.i2p
) has been set up to"
+" enable developers to easily set up two of the commonly-used IDEs for "
+"Java development: Eclipse and NetBeans."
+msgstr ""
+"La branche principale de développement de I2P (i2p.i2p
) a "
+"été mise en place pour permettre aux développeurs de configurer "
+"facilement deux des IDE généralement utilisés pour le développement Java "
+": Éclipse et NetBeans."
#: i2p2www/pages/site/get-involved/guides/ides.html:10
msgid ""
-"The main I2P development branches (i2p.i2p
and branches from "
-"it) contain .project and .classpath Eclipse files, to enable the branch to "
-"be easily set up in Eclipse."
-msgstr "Les branches principales de développement de I2P (i2p.i2p
et branches à partir d'elle) contiennent les fichiers Eclipse .project et .classpath, pour permettre à la branche d'être facilement mise en oeuvre dans Eclipse."
+"The main I2P development branches (i2p.i2p
and branches from"
+" it) contain .project and .classpath Eclipse files, to enable the branch "
+"to be easily set up in Eclipse."
+msgstr ""
+"Les branches principales de développement de I2P (i2p.i2p
et"
+" branches à partir d'elle) contiennent les fichiers Eclipse .project et "
+".classpath, pour permettre à la branche d'être facilement mise en oeuvre "
+"dans Eclipse."
#: i2p2www/pages/site/get-involved/guides/ides.html:16
msgid ""
"Check out the I2P branch into some directory (e.g. "
"$HOME/dev/i2p.i2p
)."
-msgstr "Regardez la branche I2P dans un certain répertoire (par exemple $HOME/dev/i2p.i2p
)."
+msgstr ""
+"Regardez la branche I2P dans un certain répertoire (par exemple "
+"$HOME/dev/i2p.i2p
)."
#: i2p2www/pages/site/get-involved/guides/ides.html:20
msgid ""
-"Open Eclipse and create a new Workspace, based in the directory that the I2P"
-" branch was checked out to."
-msgstr "Ouvrez Eclipse et créez un nouvel espace de travail, basé dans le répertoire vers lequel la branche I2P a été regardée."
+"Open Eclipse and create a new Workspace, based in the directory that the "
+"I2P branch was checked out to."
+msgstr ""
+"Ouvrez Eclipse et créez un nouvel espace de travail, basé dans le "
+"répertoire vers lequel la branche I2P a été regardée."
#: i2p2www/pages/site/get-involved/guides/ides.html:24
msgid ""
"Select \"File - Import...\" and then under \"General\" select \"Existing "
"Projects into Workspace\"."
-msgstr "Sélectionnez \"File - Import...\" et ensuite sous \"General\" sélectionnez \"Existing Projects into Workspace\"."
+msgstr ""
+"Sélectionnez \"File - Import...\" et ensuite sous \"General\" "
+"sélectionnez \"Existing Projects into Workspace\"."
#: i2p2www/pages/site/get-involved/guides/ides.html:28
msgid ""
-"For \"Select root directory:\" choose the directory that the I2P branch was "
-"checked out to."
-msgstr "Pour \"Select root directory:\" choisissez le répertoire vers lequel la branche I2P a été checked out."
+"For \"Select root directory:\" choose the directory that the I2P branch "
+"was checked out to."
+msgstr ""
+"Pour \"Select root directory:\" choisissez le répertoire vers lequel la "
+"branche I2P a été checked out."
#: i2p2www/pages/site/get-involved/guides/ides.html:32
msgid "If necessary, click \"Refresh\" to refresh the list of projects."
@@ -2354,15 +3755,20 @@ msgstr "Sélectionnez chaque projet dans la liste, puis cliquez \"Finish\"."
#: i2p2www/pages/site/get-involved/guides/ides.html:40
msgid ""
-"Done! Your workspace should now contain all projects within the I2P branch, "
-"and their build dependencies should be correctly set up."
-msgstr "Fait ! Votre espace de travail devrait maintenant contenir tous les projets dans la branche I2P, et leurs dépendances de construction devraient être correctement configurées."
+"Done! Your workspace should now contain all projects within the I2P "
+"branch, and their build dependencies should be correctly set up."
+msgstr ""
+"Fait ! Votre espace de travail devrait maintenant contenir tous les "
+"projets dans la branche I2P, et leurs dépendances de construction "
+"devraient être correctement configurées."
#: i2p2www/pages/site/get-involved/guides/ides.html:48
msgid ""
-"The main I2P development branches (i2p.i2p
and branches from "
-"it) contain NetBeans project files."
-msgstr "Les principales branches de développement d''I2P (i2p.i2p
et branches à partir d''elle) contiennent les fichiers projets NetBeans."
+"The main I2P development branches (i2p.i2p
and branches from"
+" it) contain NetBeans project files."
+msgstr ""
+"Les principales branches de développement d''I2P (i2p.i2p
et"
+" branches à partir d''elle) contiennent les fichiers projets NetBeans."
#: i2p2www/pages/site/get-involved/guides/monotone.html:2
msgid "Monotone Guide"
@@ -2396,7 +3802,9 @@ msgstr "Paramétrage des crochets d'évaluation de confiance"
msgid ""
"Pulling the i2p.i2p
, i2p.www
and "
"i2p.syndie
branches"
-msgstr "Tirer les branches i2p.i2p
, i2p.www
et i2p.syndie
"
+msgstr ""
+"Tirer les branches i2p.i2p
, i2p.www
et "
+"i2p.syndie
"
#: i2p2www/pages/site/get-involved/guides/monotone.html:14
#: i2p2www/pages/site/get-involved/guides/monotone.html:312
@@ -2440,28 +3848,57 @@ msgstr "Différences sous GNU/Linux Debian"
#: i2p2www/pages/site/get-involved/guides/monotone.html:32
#, python-format
msgid ""
-"This is a revised version of Complication's original\n"
+"This is a revised version of Complication's original\n"
" guide detailing the use of Monotone in I2P development.\n"
-" For basic instructions see the quick-start guide."
-msgstr "Ceci est une version révisée du Guide original de Complication\n détaillant l'usage de Monotone dans le développement I2P.\nPour des instructions basiques voyez le guide de démarrage rapide."
+" For basic instructions see the quick-start "
+"guide."
+msgstr ""
+"Ceci est une version révisée du Guide "
+"original de Complication\n"
+" détaillant l'usage de Monotone dans le développement I2P.\n"
+"Pour des instructions basiques voyez le guide de "
+"démarrage rapide."
#: i2p2www/pages/site/get-involved/guides/monotone.html:40
#, python-format
msgid ""
-"I2P has a distributed development model. The source code is replicated across\n"
-" independently administered Monotone (\"MTN\") repositories.\n"
-" Developers with commit rights are able to push their changes to the repository\n"
-" (a license agreement needs to be signed\n"
+"I2P has a distributed development model. The source code is replicated "
+"across\n"
+" independently administered Monotone (\"MTN\") repositories.\n"
+" Developers with commit rights are able to push their changes to the "
+"repository\n"
+" (a license agreement needs to be "
+"signed\n"
" before commit rights are granted)."
-msgstr "I2P a un modèle de développement distribué. Le code source est répliqué à travers des\ndépôts Monotone (\"MTN\") administrés indépendamment.\nLes développeurs ayant des droits d'engagement peuvent pousser leurs changements vers le dépôt\n(un contrat de licence nécessite d'être signé\navant que les droits d'engagement soient attribués)."
+msgstr ""
+"I2P a un modèle de développement distribué. Le code source est répliqué à"
+" travers des\n"
+"dépôts Monotone (\"MTN\") "
+"administrés indépendamment.\n"
+"Les développeurs ayant des droits d'engagement peuvent pousser leurs "
+"changements vers le dépôt\n"
+"(un contrat de licence nécessite "
+"d'être signé\n"
+"avant que les droits d'engagement soient attribués)."
#: i2p2www/pages/site/get-involved/guides/monotone.html:50
msgid ""
"Some of Monotone's noteworthy qualities are: distributed\n"
-" version control, cryptographic authentication, access control, its small size, having few\n"
-" dependencies, storage of projects in a compressed SQLite database file, and\n"
+" version control, cryptographic authentication, access control, its "
+"small size, having few\n"
+" dependencies, storage of projects in a compressed SQLite database file,"
+" and\n"
" having the ability to resume interrupted synchronization attempts."
-msgstr "Certaines des remarquables qualités de Monotone sont : contrôle\nde version distribué, authentification cryptographique, contrôle d''accès, petite taille, avoir peu\nde dépendances, stockage de projets dans un fichier de base de données SQLite compressé, et\navoir la capacité de reprendre des tentatives de synchronisation interrompues."
+msgstr ""
+"Certaines des remarquables qualités de Monotone sont : contrôle\n"
+"de version distribué, authentification cryptographique, contrôle "
+"d''accès, petite taille, avoir peu\n"
+"de dépendances, stockage de projets dans un fichier de base de données "
+"SQLite compressé, et\n"
+"avoir la capacité de reprendre des tentatives de synchronisation "
+"interrompues."
#: i2p2www/pages/site/get-involved/guides/monotone.html:59
msgid "Operating a Monotone Client"
@@ -2469,20 +3906,37 @@ msgstr "Opérer un client Monotone"
#: i2p2www/pages/site/get-involved/guides/monotone.html:64
msgid ""
-"A transport key grants you the ability to push your changes to a Monotone repository server.\n"
-" In order to commit code into Monotone (in essence signing your code), a commit key is also needed.\n"
-" None of the public Monotone servers on I2P currently require a key in order to read (or pull) the source code."
-msgstr "Une clé de transport vous accorde la capacité de pousser vos changements vers un serveur de dépôt Monotone.\nAfin d'engager du code dans Monotone (qui par essence signe votre code), une clé d'engagement est aussi nécessaire. \nAucun des serveurs publics Monotone dans I2P n'exigent actuellement de clé pour lire (ou tirer) du code source."
+"A transport key grants you the ability to push your changes to a Monotone"
+" repository server.\n"
+" In order to commit code into Monotone (in essence signing your code), a"
+" commit key is also needed.\n"
+" None of the public Monotone servers on I2P currently require a key in "
+"order to read (or pull) the source code."
+msgstr ""
+"Une clé de transport vous accorde la capacité de pousser vos changements "
+"vers un serveur de dépôt Monotone.\n"
+"Afin d'engager du code dans Monotone (qui par essence signe votre code), "
+"une clé d'engagement est aussi nécessaire. \n"
+"Aucun des serveurs publics Monotone dans I2P n'exigent actuellement de "
+"clé pour lire (ou tirer) du code source."
#: i2p2www/pages/site/get-involved/guides/monotone.html:72
msgid ""
"Without a transport key, one cannot:\n"
" $HOME/.monotone/keys
in text files which\n"
+"Monotone stores keys under $HOME/.monotone/keys
in "
+"text files which\n"
" are named identically to the keys. For example:"
-msgstr "Monotone stocke les clés sous $HOME/.monotone/keys
dans des fichiers textes qui\nsont nommés identiquement aux clés. Par example :"
+msgstr ""
+"Monotone stocke les clés sous $HOME/.monotone/keys
"
+"dans des fichiers textes qui\n"
+"sont nommés identiquement aux clés. Par example :"
#: i2p2www/pages/site/get-involved/guides/monotone.html:121
msgid ""
"To generate transport and commit keys, enter the following commands at a "
"prompt:"
-msgstr "Pour générer des clés de transport et d'engagement, entrez les commandes suivantes à un prompt :"
+msgstr ""
+"Pour générer des clés de transport et d'engagement, entrez les commandes "
+"suivantes à un prompt :"
#: i2p2www/pages/site/get-involved/guides/monotone.html:131
msgid ""
-"Monotone will prompt you for a password to protect your keys. You are very strongly encouraged to set a password\n"
-" for the commit key. Many users will leave an empty password for the transport key, especially those running a\n"
+"Monotone will prompt you for a password to protect your keys. You are "
+"very strongly encouraged to set a password\n"
+" for the commit key. Many users will leave an empty password for the "
+"transport key, especially those running a\n"
" Monotone server."
-msgstr "Monotone vous demandera un mot de passe pour protéger vos clés. Vous êtes très fortement encouragés à mettre un mot de passe\npour la clé d'engagement. Beaucoup d'utilisateurs laisseront un mot de passe vide pour la clé de transport, particulièrement ceux exécutant un serveur Monotone."
+msgstr ""
+"Monotone vous demandera un mot de passe pour protéger vos clés. Vous êtes"
+" très fortement encouragés à mettre un mot de passe\n"
+"pour la clé d'engagement. Beaucoup d'utilisateurs laisseront un mot de "
+"passe vide pour la clé de transport, particulièrement ceux exécutant un "
+"serveur Monotone."
#: i2p2www/pages/site/get-involved/guides/monotone.html:139
msgid "Trust, and initializing your repository"
@@ -2530,32 +4012,62 @@ msgstr "Confiance, et initialiser votre dépôt"
#: i2p2www/pages/site/get-involved/guides/monotone.html:143
msgid ""
-"Monotone's security model helps to ensure that nobody can easily impersonate a developer without\n"
-" it being noticed. Since developers can make mistakes and become compromised,only manual review can\n"
-" ensure quality of code. Monotone's trust model will ensure that you read the right diffs. It does\n"
+"Monotone's security model helps to ensure that nobody can easily "
+"impersonate a developer without\n"
+" it being noticed. Since developers can make mistakes and become "
+"compromised,only manual review can\n"
+" ensure quality of code. Monotone's trust model will ensure that you "
+"read the right diffs. It does\n"
" not replace reading diffs."
-msgstr "Le modèle de sécurité de Monotone aide à assurer que personne ne puisse facilement interpréter le rôle\nd'un développeur sans être remarqué. Puisque les développeurs peuvent faire des erreurs et devenir compromis,\nseul l'examen manuel peut assurer la qualité du code. Le modèle de confiance de Monotone assure que vous lisez\nles bonnes diffs. Il ne remplace pas la lecture des diffs."
+msgstr ""
+"Le modèle de sécurité de Monotone aide à assurer que personne ne puisse "
+"facilement interpréter le rôle\n"
+"d'un développeur sans être remarqué. Puisque les développeurs peuvent "
+"faire des erreurs et devenir compromis,\n"
+"seul l'examen manuel peut assurer la qualité du code. Le modèle de "
+"confiance de Monotone assure que vous lisez\n"
+"les bonnes diffs. Il ne remplace pas la lecture des diffs."
#: i2p2www/pages/site/get-involved/guides/monotone.html:153
msgid ""
-"A Monotone repository is a single file (a compressed SQLite database) which "
-"contains all of the project's source code and history."
-msgstr "Un dépôt Monotone est un simple fichier (une base de données SQLite compressée) qui contient le code source de tout le projet et l'historique."
+"A Monotone repository is a single file (a compressed SQLite database) "
+"which contains all of the project's source code and history."
+msgstr ""
+"Un dépôt Monotone est un simple fichier (une base de données SQLite "
+"compressée) qui contient le code source de tout le projet et "
+"l'historique."
#: i2p2www/pages/site/get-involved/guides/monotone.html:159
msgid ""
-"After importing the developers' keys into Monotone and\n"
-" setting up trust evaluation hooks,\n"
-" Monotone will prevent untrusted code from being checked out into your workspace.\n"
-" There are commands available to clean untrusted code from your workspace but in practice they've not been\n"
+"After importing the "
+"developers' keys into Monotone and\n"
+" setting up trust "
+"evaluation hooks,\n"
+" Monotone will prevent untrusted code from being checked out into your "
+"workspace.\n"
+" There are commands available to clean untrusted code from your "
+"workspace but in practice they've not been\n"
" needed due to the push access policies in place."
-msgstr "Après importation des clés de développeur dans Monotone et\nmise en place des crochets d''évaluation,\nMonotone empêchera le code non éprouvé d'être vérifié dans votre espace de travail. \nIl y a des commandes disponibles pour nettoyer le code non éprouvé de votre espace de travail mais dans la pratique elles n'ont pas été nécessaires en raison des politiques en place d'accès en poussée."
+msgstr ""
+"Après importation "
+"des clés de développeur dans Monotone et\n"
+"mise en place des crochets"
+" d''évaluation,\n"
+"Monotone empêchera le code non éprouvé d'être vérifié dans votre espace "
+"de travail. \n"
+"Il y a des commandes disponibles pour nettoyer le code non éprouvé de "
+"votre espace de travail mais dans la pratique elles n'ont pas été "
+"nécessaires en raison des politiques en place d'accès en poussée."
#: i2p2www/pages/site/get-involved/guides/monotone.html:169
msgid ""
-"A repository can hold many branches. For example, our repository holds the\n"
+"A repository can hold many branches. For example, our repository holds "
+"the\n"
" following main branches:"
-msgstr "Un dépôt peut retenir beaucoup de branches. Par exemple, notre dépôt retient les\nbranches principales suivantes :"
+msgstr ""
+"Un dépôt peut retenir beaucoup de branches. Par exemple, notre dépôt "
+"retient les\n"
+"branches principales suivantes :"
#: i2p2www/pages/site/get-involved/guides/monotone.html:174
msgid "The I2P router and associated programs"
@@ -2571,85 +4083,159 @@ msgstr "Syndie, un outil de forums distribués"
#: i2p2www/pages/site/get-involved/guides/monotone.html:181
msgid ""
-"By convention, the I2P Monotone repository is named i2p.mtn
. Before pulling\n"
-" source code from servers, a database for your repository will need to be initialized.\n"
-" To initialize your local repository, change into the directory that you want the\n"
-" i2p.mtn
file and branch directories to be stored and issue the following\n"
+"By convention, the I2P Monotone repository is named i2p.mtn
."
+" Before pulling\n"
+" source code from servers, a database for your repository will need to "
+"be initialized.\n"
+" To initialize your local repository, change into the directory that you"
+" want the\n"
+" i2p.mtn
file and branch directories to be stored and issue"
+" the following\n"
" command:"
-msgstr "Par convention, le dépôt Monotone de I2P est nommé i2p.mtn
. Avant de\ntirer le code depuis les serveurs, une base de données pour votre dépôt devra être initialisée.\nPour initialiser votre dépôt local, allez dans le répertoire dans lequel vous voulez que le\nfichier i2p.mtn
et les répertoires de branche soient stockés (ex: $HOME/.monotone/) et tapez la commande suivante :"
+msgstr ""
+"Par convention, le dépôt Monotone de I2P est nommé i2p.mtn
. "
+"Avant de\n"
+"tirer le code depuis les serveurs, une base de données pour votre dépôt "
+"devra être initialisée.\n"
+"Pour initialiser votre dépôt local, allez dans le répertoire dans lequel "
+"vous voulez que le\n"
+"fichier i2p.mtn
et les répertoires de branche soient stockés"
+" (ex: $HOME/.monotone/) et tapez la commande suivante :"
#: i2p2www/pages/site/get-involved/guides/monotone.html:197
msgid ""
-"Keys which developers use to commit code are essential for trust evaluation in\n"
-" Monotone. The other developers' transport keys are only required for Monotone server operators.\n"
+"Keys which developers use to commit code are essential for trust "
+"evaluation in\n"
+" Monotone. The other developers' transport keys are only required for "
+"Monotone server operators.\n"
" "
-msgstr "Les clés que les développeurs utilisent pour engager du code sont essentielles pour l'évaluation de confiance\ndans Monotone. Les clés de transport des autres développeurs sont seulement exigées pour les opérateurs de serveurs Monotone."
+msgstr ""
+"Les clés que les développeurs utilisent pour engager du code sont "
+"essentielles pour l'évaluation de confiance\n"
+"dans Monotone. Les clés de transport des autres développeurs sont "
+"seulement exigées pour les opérateurs de serveurs Monotone."
#: i2p2www/pages/site/get-involved/guides/monotone.html:204
#, python-format
msgid ""
"Developers' commit keys are provided GPG-signed on another page."
-msgstr "Les clés d'engagement des développeurs sont fournies signées en GPG sur une autre page."
+msgstr ""
+"Les clés d'engagement des développeurs sont fournies signées en GPG sur une autre page."
#: i2p2www/pages/site/get-involved/guides/monotone.html:210
#, python-format
msgid ""
-"To import developers' keys after verifying their authenticity, copy all of the keys into a new\n"
-" file. Create this file (e.g. keys.txt
) in the same directory where i2p.mtn
is located. Import the keys with the command:"
-msgstr "Pour importer les clés de développeurs après avoir vérifié leur authenticité, copiez toutes les clés dans un nouveau\nfichier. Créez ce fichier (ex: keys.txt
) dans le même répertoire dans lequel i2p.mtn
est localisé. Importez les clés avec la commande :"
+"To import developers' keys after verifying their authenticity, copy all of the keys into a new\n"
+" file. Create this file (e.g. keys.txt
) in the same "
+"directory where i2p.mtn
is located. Import the keys with the"
+" command:"
+msgstr ""
+"Pour importer les clés de développeurs après avoir vérifié leur "
+"authenticité, copiez toutes les clés dans un "
+"nouveau\n"
+"fichier. Créez ce fichier (ex: keys.txt
) dans le même"
+" répertoire dans lequel i2p.mtn
est localisé. Importez les "
+"clés avec la commande :"
#: i2p2www/pages/site/get-involved/guides/monotone.html:220
msgid ""
"Note: Never add keys to "
"$HOME/.monotone/keys
manually."
-msgstr "Note: ne jamais ajouter de clés à $HOME/.monotone/keys
manuellement."
+msgstr ""
+"Note: ne jamais ajouter de clés à "
+"$HOME/.monotone/keys
manuellement."
#: i2p2www/pages/site/get-involved/guides/monotone.html:228
msgid ""
-"The default Monotone trust policy is way too lax for our requirements: every committer is trusted by default.\n"
+"The default Monotone trust policy is way too lax for our requirements: "
+"every committer is trusted by default.\n"
" That is not acceptable for I2P development."
-msgstr "La politique de confiance de Monotone par défaut est beaucoup trop molle pour nos exigences : chaque contributeur est digne de confiance par défaut.\nCeci n'est pas acceptable pour le développement de I2P."
+msgstr ""
+"La politique de confiance de Monotone par défaut est beaucoup trop molle "
+"pour nos exigences : chaque contributeur est digne de confiance par "
+"défaut.\n"
+"Ceci n'est pas acceptable pour le développement de I2P."
#: i2p2www/pages/site/get-involved/guides/monotone.html:235
msgid ""
-"Change into the directory $HOME/.monotone
and open the file\n"
-" monotonerc
with a text editor. Copy and paste the following two functions into this file:"
-msgstr "Allez dans le répertoire $HOME/.monotone
puis ouvrez le fichier\nmonotonerc
avec un éditeur de texte. Copiez et collez les deux fonctions suivantes dans ce fichier :"
+"Change into the directory $HOME/.monotone
and open "
+"the file\n"
+" monotonerc
with a text editor. Copy and paste the "
+"following two functions into this file:"
+msgstr ""
+"Allez dans le répertoire $HOME/.monotone
puis ouvrez "
+"le fichier\n"
+"monotonerc
avec un éditeur de texte. Copiez et collez les "
+"deux fonctions suivantes dans ce fichier :"
#: i2p2www/pages/site/get-involved/guides/monotone.html:244
msgid ""
-"The first function determines an intersection between two sets, in our case a\n"
+"The first function determines an intersection between two sets, in our "
+"case a\n"
" revision's signers and trusted signers."
-msgstr "La première fonction détermine une intersection entre deux ensembles, dans notre cas un\nsignataire de révision et un signataire éprouvés."
+msgstr ""
+"La première fonction détermine une intersection entre deux ensembles, "
+"dans notre cas un\n"
+"signataire de révision et un signataire éprouvés."
#: i2p2www/pages/site/get-involved/guides/monotone.html:251
msgid ""
-"The second function determines trust in a given revision, by calling the first\n"
-" function with \"signers\" and \"trusted\" as arguments. If the intersection is\n"
-" null, the revision is not trusted. If the intersection is not empty, the\n"
+"The second function determines trust in a given revision, by calling the "
+"first\n"
+" function with \"signers\" and \"trusted\" as arguments. If the "
+"intersection is\n"
+" null, the revision is not trusted. If the intersection is not empty, "
+"the\n"
" revision is trusted. Otherwise, the revision is not trusted."
-msgstr "La deuxième fonction détermine la confiance en une révision donnée, en appelant le première\nfonction avec \"signataires\" et \"éprouvé\" comme arguments. Si l'intersection est\nvide, la révision est non digne de confiance. Si l'intersection n'est pas vide, la\nrévision est digne de confiance. Autrement, la révision est non digne de confiance."
+msgstr ""
+"La deuxième fonction détermine la confiance en une révision donnée, en "
+"appelant le première\n"
+"fonction avec \"signataires\" et \"éprouvé\" comme arguments. Si "
+"l'intersection est\n"
+"vide, la révision est non digne de confiance. Si l'intersection n'est pas"
+" vide, la\n"
+"révision est digne de confiance. Autrement, la révision est non digne de "
+"confiance."
#: i2p2www/pages/site/get-involved/guides/monotone.html:260
msgid ""
"More information about Trust Evaluation Hooks can be found in the official Monotone "
"documentation."
-msgstr "Davantage d'informations sur des crochets d'évaluation de confiance peuvent être trouvées dans la documentation officielle de Monotone."
+msgstr ""
+"Davantage d'informations sur des crochets d'évaluation de confiance "
+"peuvent être trouvées dans la documentation officielle "
+"de Monotone."
#: i2p2www/pages/site/get-involved/guides/monotone.html:268
msgid ""
-"I2P is shipped with a pre-configured tunnel pointing to the project Monotone server. Ensure that the tunnel has been started\n"
-" within I2PTunnel before attempting to pull the source code from 127.0.0.1:8998."
-msgstr "I2P est livré avec un tunnel pré-configuré pointant vers le serveur Monotone du projet. Assurez que ce tunnel a été démarré\ndans I2PTunnel avant de tenter de tirer le code source depuis 127.0.0.1:8998."
+"I2P is shipped with a pre-configured tunnel pointing to the project "
+"Monotone server. Ensure that the tunnel has been started\n"
+" within I2PTunnel before"
+" attempting to pull the source code from 127.0.0.1:8998."
+msgstr ""
+"I2P est livré avec un tunnel pré-configuré pointant vers le serveur "
+"Monotone du projet. Assurez que ce tunnel a été démarré\n"
+"dans I2PTunnel avant de "
+"tenter de tirer le code source depuis 127.0.0.1:8998."
#: i2p2www/pages/site/get-involved/guides/monotone.html:275
msgid ""
-"Enter the directory where you initialized i2p.mtn
. Depending on whether you\n"
-" want only I2P sources, or also sources for the I2P website and Syndie, you can\n"
+"Enter the directory where you initialized i2p.mtn
. Depending"
+" on whether you\n"
+" want only I2P sources, or also sources for the I2P website and Syndie, "
+"you can\n"
" perform the pull
operation in different ways."
-msgstr "Entrez dans le répertoire dans lequel vous avez initialisé le code i2p.mtn
. Selon que vous\nvoulez seulement les sources d''I2P, ou aussi les sources du site Web I2P et de Syndie, vous pouvez\naccomplir l'opération pull
de différentes façons."
+msgstr ""
+"Entrez dans le répertoire dans lequel vous avez initialisé le code "
+"i2p.mtn
. Selon que vous\n"
+"voulez seulement les sources d''I2P, ou aussi les sources du site Web I2P"
+" et de Syndie, vous pouvez\n"
+"accomplir l'opération pull
de différentes façons."
#: i2p2www/pages/site/get-involved/guides/monotone.html:283
msgid "If you only want I2P sources:"
@@ -2661,16 +4247,25 @@ msgstr "Si vous voulez toutes les branches :"
#: i2p2www/pages/site/get-involved/guides/monotone.html:298
msgid ""
-"If the transfer aborts before completing sucessfully, simply repeating the "
-"pull command will resume the transfer."
-msgstr "Si le transfert s'arrête avant l'achèvement complet, répétez simplement la commande de traction ce qui reprendra le transfert."
+"If the transfer aborts before completing sucessfully, simply repeating "
+"the pull command will resume the transfer."
+msgstr ""
+"Si le transfert s'arrête avant l'achèvement complet, répétez simplement "
+"la commande de traction ce qui reprendra le transfert."
#: i2p2www/pages/site/get-involved/guides/monotone.html:304
msgid ""
-"Pulling in the above examples is done anonymously by specifying an empty transport key.\n"
-" If everyone pulls anonymously it will be harder for an attacker who gains control of the server\n"
+"Pulling in the above examples is done anonymously by specifying an empty "
+"transport key.\n"
+" If everyone pulls anonymously it will be harder for an attacker who "
+"gains control of the server\n"
" to selectively provide some people with tampered data."
-msgstr "Le tirage lors des exemples susdits est fait anonymement en spécifiant une clé de transport vide.\nSi tout le monde tire anonymement ce sera plus dur pour un attaquant qui prendrait le contrôle du serveur\nde fournir sélectivement à quelques personnes des données trifouillées."
+msgstr ""
+"Le tirage lors des exemples susdits est fait anonymement en spécifiant "
+"une clé de transport vide.\n"
+"Si tout le monde tire anonymement ce sera plus dur pour un attaquant qui "
+"prendrait le contrôle du serveur\n"
+"de fournir sélectivement à quelques personnes des données trifouillées."
#: i2p2www/pages/site/get-involved/guides/monotone.html:315
msgid "To verify that trust evaluation works:"
@@ -2684,63 +4279,107 @@ msgstr "Faites une copie de sauvegarde de votre fichier monotonerc
.
msgid ""
"Modify monotonerc
by setting the trusted_signers "
"variable in the following way:"
-msgstr "Modifiez monotonerc
en modifiant la variable trusted_signers de façon suivante :"
+msgstr ""
+"Modifiez monotonerc
en modifiant la variable "
+"trusted_signers de façon suivante :"
#: i2p2www/pages/site/get-involved/guides/monotone.html:326
msgid ""
-"With monotonerc
configured as above, Monotone will no longer trust any committers. Confirm this by changing into the\n"
-"directory where i2p.mtn
was created and attempt a checkout of the I2P branch:"
-msgstr "Avec monotonerc
configuré comme ci-dessus, Monotone n'aura plus confiance en aucun des engagés. Confirmez-ceci en allant dans le\nrépertoire où i2p.mtn
a été créé, puis tentez d'obtenir la branche I2P :"
+"With monotonerc
configured as above, Monotone will no"
+" longer trust any committers. Confirm this by changing into the\n"
+"directory where i2p.mtn
was created and attempt a checkout "
+"of the I2P branch:"
+msgstr ""
+"Avec monotonerc
configuré comme ci-dessus, Monotone "
+"n'aura plus confiance en aucun des engagés. Confirmez-ceci en allant dans"
+" le\n"
+"répertoire où i2p.mtn
a été créé, puis tentez d'obtenir la "
+"branche I2P :"
#: i2p2www/pages/site/get-involved/guides/monotone.html:336
msgid ""
-"A directory named i2p.i2p
should not appear. You should encounter many\n"
+"A directory named i2p.i2p
should not appear. You "
+"should encounter many\n"
" error messages like:"
-msgstr "Un répertoire nommé i2p.i2p
ne devrait pas apparaître. Vous devriez rencontrer beaucoup\nde messages d'erreurs tels que :"
+msgstr ""
+"Un répertoire nommé i2p.i2p
ne devrait pas "
+"apparaître. Vous devriez rencontrer beaucoup\n"
+"de messages d'erreurs tels que :"
#: i2p2www/pages/site/get-involved/guides/monotone.html:353
msgid ""
"If you are satisfied with results, restore the backup of\n"
-" monotonerc
that was created above. If you didn't create a backup\n"
-" as advised, re-read Setting up trust evaluation hooks."
-msgstr "Si vous êtes satisfaits avec les résultats, rétablissez une sauvegarde de \nmonotonerc
qui a été crée comme susdit. Si vous n'avez pas créé de sauvegarde\ncomme conseillé, relisez Installation de crochets d'évaluation de confiance."
+" monotonerc
that was created above. If you didn't create a "
+"backup\n"
+" as advised, re-read Setting up trust evaluation hooks."
+msgstr ""
+"Si vous êtes satisfaits avec les résultats, rétablissez une sauvegarde de"
+" \n"
+"monotonerc
qui a été crée comme susdit. Si vous n'avez pas "
+"créé de sauvegarde\n"
+"comme conseillé, relisez Installation de crochets d'évaluation de confiance."
#: i2p2www/pages/site/get-involved/guides/monotone.html:364
msgid ""
-"If you already have a branch checked out, skip to the next\n"
+"If you already have a branch checked out, skip to the next\n"
" section."
-msgstr "Si vous avez déjà obtenu une branche, passez à la section suivante."
+msgstr ""
+"Si vous avez déjà obtenu une branche, passez à la section suivante."
#: i2p2www/pages/site/get-involved/guides/monotone.html:371
msgid ""
-"Change into the directory where i2p.mtn
is located. Over there "
-"issue:"
-msgstr "Allez dans le répertoire où i2p.mtn
est placé. Là-bas envoyez :"
+"Change into the directory where i2p.mtn
is located. Over "
+"there issue:"
+msgstr ""
+"Allez dans le répertoire où i2p.mtn
est placé. Là-bas "
+"envoyez :"
#: i2p2www/pages/site/get-involved/guides/monotone.html:380
msgid ""
-"The checkout should complete without error messages and a directory named\n"
-" i2p.i2p
should appear in the current directory. Congratulations! You have\n"
+"The checkout should complete without error messages and a directory named"
+"\n"
+" i2p.i2p
should appear in the current directory. "
+"Congratulations! You have\n"
" successfully checked out the latest I2P sources, ready to be compiled."
-msgstr "L'obtention (checkout) devrait être complète sans messages d'erreur et un répertoire nommé \ni2p.i2p
devrait apparaître dans le répertoire actuel. Félicitations ! vous avez\nobtenu avec succès les dernières sources d'I2P, prêtes à être compilées."
+msgstr ""
+"L'obtention (checkout) devrait être complète sans messages d'erreur et un"
+" répertoire nommé \n"
+"i2p.i2p
devrait apparaître dans le répertoire actuel. "
+"Félicitations ! vous avez\n"
+"obtenu avec succès les dernières sources d'I2P, prêtes à être compilées."
#: i2p2www/pages/site/get-involved/guides/monotone.html:391
msgid ""
-"If you haven't done this already, pull fresh code from the server to your local\n"
-" Monotone repository. To accomplish this, change into the directory where\n"
+"If you haven't done this already, pull fresh code from the server to your"
+" local\n"
+" Monotone repository. To accomplish this, change into the directory "
+"where\n"
" i2p.mtn
is located and issue:"
-msgstr "Si vous n'avez pas déjà fait ceci, tirez le code frais hors du serveur vers votre \ndépôt monotone local. Pour accomplir ceci, allez dans le répertoire où \ni2p.mtn
est localisé, puis entrez :"
+msgstr ""
+"Si vous n'avez pas déjà fait ceci, tirez le code frais hors du serveur "
+"vers votre \n"
+"dépôt monotone local. Pour accomplir ceci, allez dans le répertoire où \n"
+"i2p.mtn
est localisé, puis entrez :"
#: i2p2www/pages/site/get-involved/guides/monotone.html:402
-msgid ""
-"Now change into your i2p.i2p
directory, and over there issue:"
-msgstr "Maintenant allez dans votre répertoire i2p.i2p
, et là-bas envoyez :"
+msgid "Now change into your i2p.i2p
directory, and over there issue:"
+msgstr ""
+"Maintenant allez dans votre répertoire i2p.i2p
, et là-bas "
+"envoyez :"
#: i2p2www/pages/site/get-involved/guides/monotone.html:411
msgid ""
-"As long as there were no errors…Congratulations! You have successfully updated to the latest I2P sources. They\n"
+"As long as there were no errors…Congratulations! You have "
+"successfully updated to the latest I2P sources. They\n"
" should be ready to compile."
-msgstr "Si il n'y a pas d'erreurs …Félicitations ! vous avez réussi à vous mettre à jour aux dernières sources d'I2P. Elles\ndevraient être prêtes à être compilées."
+msgstr ""
+"Si il n'y a pas d'erreurs …Félicitations ! vous avez réussi à vous"
+" mettre à jour aux dernières sources d'I2P. Elles\n"
+"devraient être prêtes à être compilées."
#: i2p2www/pages/site/get-involved/guides/monotone.html:420
msgid "Obtaining and deploying developers' transport keys"
@@ -2750,7 +4389,9 @@ msgstr "Obtention et déploiement des clés de transport de développeur"
msgid ""
"As a server operator you may want to grant push access to certain "
"developers."
-msgstr "En tant qu'opérateur de serveur vous pouvez vouloir accorder l'accès en poussée à certains développeurs."
+msgstr ""
+"En tant qu'opérateur de serveur vous pouvez vouloir accorder l'accès en "
+"poussée à certains développeurs."
#: i2p2www/pages/site/get-involved/guides/monotone.html:431
msgid "By default the Monotone server denies all access."
@@ -2758,13 +4399,17 @@ msgstr "Par défaut le serveur Monotone refuse tout accès."
#: i2p2www/pages/site/get-involved/guides/monotone.html:437
msgid "To grant pull access to all clients, set the following in"
-msgstr "Pour accorder l'accès en traction à tous les clients, mettez la chose suivante dans"
+msgstr ""
+"Pour accorder l'accès en traction à tous les clients, mettez la chose "
+"suivante dans"
#: i2p2www/pages/site/get-involved/guides/monotone.html:449
msgid ""
-"No one will not be able to push code to your server without permission being"
-" explicitly granted. To grant push access:"
-msgstr "Personne ne pourra pousser du code vers votre serveur sans permission accordée explicitement. Accorder l'accès en poussée :"
+"No one will not be able to push code to your server without permission "
+"being explicitly granted. To grant push access:"
+msgstr ""
+"Personne ne pourra pousser du code vers votre serveur sans permission "
+"accordée explicitement. Accorder l'accès en poussée :"
#: i2p2www/pages/site/get-involved/guides/monotone.html:455
msgid ""
@@ -2775,48 +4420,97 @@ msgid ""
" complication-transport@mail.i2p\n"
"\n"
"with one key per line."
-msgstr "Ajoutez le nom de l'utilisateur de clé de transport à \n$HOME/.monotone/write-permissions
, tel que\n\nzzz-transport@mail.i2p\ncomplication-transport@mail.i2p\n
\navec une clé par ligne."
+msgstr ""
+"Ajoutez le nom de l'utilisateur de clé de transport à \n"
+"$HOME/.monotone/write-permissions
, tel que\n"
+"\n"
+"zzz-transport@mail.i2p\n"
+"complication-transport@mail.i2p\n"
+"
\n"
+"avec une clé par ligne."
#: i2p2www/pages/site/get-involved/guides/monotone.html:466
msgid ""
-"Import the transport key(s) into your database. The procedure for importing transport keys is the same as for\n"
-"importing commit keys, which is described in the section Obtaining and deploying developers' keys."
-msgstr "Importez la/les clé(s) de transport dans votre base de données. La procédure pour importer des clés de transport est la même que pour importer des clés d'engagement, qui est décrite dans la section Obtention et déploiement des clés de transport de développeur."
+"Import the transport key(s) into your database. The procedure for "
+"importing transport keys is the same as for\n"
+"importing commit keys, which is described in the section Obtaining and deploying "
+"developers' keys."
+msgstr ""
+"Importez la/les clé(s) de transport dans votre base de données. La "
+"procédure pour importer des clés de transport est la même que pour "
+"importer des clés d'engagement, qui est décrite dans la section Obtention et déploiement "
+"des clés de transport de développeur."
#: i2p2www/pages/site/get-involved/guides/monotone.html:476
msgid ""
-"A separate database should be used for your Monotone server because monotone will lock the database while it is served to others.\n"
+"A separate database should be used for your Monotone server because "
+"monotone will lock the database while it is served to others.\n"
" Make a copy of your development database, then start the server with:"
-msgstr "Une base de données séparée devrait être utilisée pour votre serveur Monotone parce que Monotone verrouillera la base de données lorsqu'elle est servie à d'autres.\nFaites une copie de votre base de données de développement, puis démarrez le serveur avec :"
+msgstr ""
+"Une base de données séparée devrait être utilisée pour votre serveur "
+"Monotone parce que Monotone verrouillera la base de données lorsqu'elle "
+"est servie à d'autres.\n"
+"Faites une copie de votre base de données de développement, puis démarrez"
+" le serveur avec :"
#: i2p2www/pages/site/get-involved/guides/monotone.html:483
msgid ""
-"If your key is protected with a passphrase, Monotone may request the passphrase\n"
-" when the first client connects. You can work around this by connecting making the first client connection to your server\n"
+"If your key is protected with a passphrase, Monotone may request the "
+"passphrase\n"
+" when the first client connects. You can work around this by connecting "
+"making the first client connection to your server\n"
" (or by clearing the password for your transport key)."
-msgstr "Si votre clé est protégée avec une phrase mot de passe, Monotone pourrait demander la phrase mot de passe\nquand le premier client se connecte. Vous pouvez contourner ceci en vous connectant en faisaint la première connexion de client à votre serveur\n(ou en effaçant le mot de passe pour votre clé de transport)."
+msgstr ""
+"Si votre clé est protégée avec une phrase mot de passe, Monotone pourrait"
+" demander la phrase mot de passe\n"
+"quand le premier client se connecte. Vous pouvez contourner ceci en vous "
+"connectant en faisaint la première connexion de client à votre serveur\n"
+"(ou en effaçant le mot de passe pour votre clé de transport)."
#: i2p2www/pages/site/get-involved/guides/monotone.html:491
msgid ""
-"For your server to be accessible for others over I2P, you will need to create a\n"
-" server tunnel for it. Use the \"Standard\" tunnel type and \"Bulk\" profile."
-msgstr "Pour que votre serveur puisse être accessible à d'autres via I2P, vous devrez créer un\ntunnel de serveur pour cela. Utilisez le type de tunnel \"Standard\" et le profil \"Bulk\"."
+"For your server to be accessible for others over I2P, you will need to "
+"create a\n"
+" server tunnel for it. Use the \"Standard\" tunnel type and \"Bulk\" "
+"profile."
+msgstr ""
+"Pour que votre serveur puisse être accessible à d'autres via I2P, vous "
+"devrez créer un\n"
+"tunnel de serveur pour cela. Utilisez le type de tunnel \"Standard\" et "
+"le profil \"Bulk\"."
#: i2p2www/pages/site/get-involved/guides/monotone.html:501
msgid ""
"Debian (amongst other distributions) has integrated Monotone into their\n"
-" framework of daemons/services. Although Monotone servers can still be run\n"
-" \"the ordinary way\" on Debian systems, doing it the \"Debian way\" may be more straightforward."
-msgstr "Debian (parmi d'autres distributions) a intégré Monotone dans leur\nframework de démons/services. Bien que les serveurs Monotone puissent toujours être exécutés\nde la \"façon ordinaire\" sur des systèmes Debian, le faire à la \"façon Debian\" peut être plus direct."
+" framework of daemons/services. Although Monotone servers can still be "
+"run\n"
+" \"the ordinary way\" on Debian systems, doing it the \"Debian way\" may"
+" be more straightforward."
+msgstr ""
+"Debian (parmi d'autres distributions) a intégré Monotone dans leur\n"
+"framework de démons/services. Bien que les serveurs Monotone puissent "
+"toujours être exécutés\n"
+"de la \"façon ordinaire\" sur des systèmes Debian, le faire à la \"façon "
+"Debian\" peut être plus direct."
#: i2p2www/pages/site/get-involved/guides/monotone.html:509
msgid ""
"Permissions are granted by editing the files\n"
" /etc/monotone/read-permissions
and\n"
" /etc/monotone/write-permissions
. You'll also need to edit\n"
-" /etc/default/monotone
to enable monotone to start at boot or to\n"
+" /etc/default/monotone
to enable monotone to start at boot "
+"or to\n"
" customize the host, port, or database location."
-msgstr "Les permissions sont accordables grâce à l'édition des fichiers\n/etc/monotone/read-permissions
et\n/etc/monotone/write-permissions
. Vous aurez aussi besoin d'éditer\n/etc/default/monotone
pour permettre à monotone de démarrer dès le boot ou pour\npersonnaliser l'hôte, le port, ou l'emplacement de la base de données."
+msgstr ""
+"Les permissions sont accordables grâce à l'édition des fichiers\n"
+"/etc/monotone/read-permissions
et\n"
+"/etc/monotone/write-permissions
. Vous aurez aussi besoin "
+"d'éditer\n"
+"/etc/default/monotone
pour permettre à monotone de démarrer "
+"dès le boot ou pour\n"
+"personnaliser l'hôte, le port, ou l'emplacement de la base de données."
#: i2p2www/pages/site/get-involved/guides/new-developers.html:2
msgid "New Developer's Guide"
@@ -2827,8 +4521,14 @@ msgid ""
"\n"
"So you want to start work on I2P? Great!\n"
"Here's a quick guide to getting started\n"
-"on contributing to the website or the software, doing development or creating translations."
-msgstr "\nDonc vous voulez commencer à travailler sur I2P ? Très bien !\nVoici un guide rapide doit pour commencer\nen contribuant au site Web ou au logiciel, faire du développement ou créer des traductions."
+"on contributing to the website or the software, doing development or "
+"creating translations."
+msgstr ""
+"\n"
+"Donc vous voulez commencer à travailler sur I2P ? Très bien !\n"
+"Voici un guide rapide doit pour commencer\n"
+"en contribuant au site Web ou au logiciel, faire du développement ou "
+"créer des traductions."
#: i2p2www/pages/site/get-involved/guides/new-developers.html:9
#, python-format
@@ -2836,7 +4536,10 @@ msgid ""
"\n"
"Not quite ready for coding?\n"
"Try getting involved first."
-msgstr "\nPas tout à fait prêt pour programmer ?\nessayez d''abord de devenir impliqué."
+msgstr ""
+"\n"
+"Pas tout à fait prêt pour programmer ?\n"
+"essayez d''abord de devenir impliqué."
#: i2p2www/pages/site/get-involved/guides/new-developers.html:16
#: i2p2www/pages/site/get-involved/guides/new-developers.html:27
@@ -2880,9 +4583,15 @@ msgstr "Outils"
#: i2p2www/pages/site/get-involved/guides/new-developers.html:29
msgid ""
-"Basic development on the I2P router or the embedded applications uses Java as the main development language.\n"
-"If you don't have experience with Java, you can always have a look at Thinking in Java."
-msgstr "Le développement de base concernant le routeur I2P ou les applications incorporées utilisent Java comme principal langage de développement.\nSi vous n'avez pas d'expérience avec Java, vous pouvez toujours regarder Thinking in Java."
+"Basic development on the I2P router or the embedded applications uses "
+"Java as the main development language.\n"
+"If you don't have experience with Java, you can always have a look at Thinking in Java."
+msgstr ""
+"Le développement de base concernant le routeur I2P ou les applications "
+"incorporées utilisent Java comme principal langage de développement.\n"
+"Si vous n'avez pas d'expérience avec Java, vous pouvez toujours regarder "
+"Thinking in Java."
#: i2p2www/pages/site/get-involved/guides/new-developers.html:33
#, python-format
@@ -2891,66 +4600,104 @@ msgid ""
"the other \"how\" documents,\n"
"the tech intro,\n"
"and associated documents.\n"
-"These will give you a good overview of how I2P is structured and what different things it does."
-msgstr "Étudiez l'intro comment,\nles autres documents \"comment\",\nl'intro tech,\net documents associés.\nCeux-ci vous donneront une bonne vue d'ensemble sur comment I2P est structuré et quelles différentes choses il fait."
+"These will give you a good overview of how I2P is structured and what "
+"different things it does."
+msgstr ""
+"Étudiez l'intro comment,\n"
+"les autres documents \"comment\",\n"
+"l'intro tech,\n"
+"et documents associés.\n"
+"Ceux-ci vous donneront une bonne vue d'ensemble sur comment I2P est "
+"structuré et quelles différentes choses il fait."
#: i2p2www/pages/site/get-involved/guides/new-developers.html:43
msgid ""
"For development on the i2p router or the embedded applications,\n"
"get the monotone source repository installed - short instructions:"
-msgstr "Pour développer le routeur i2p ou les applications incorporées\nobtenez le dépôt de source de monotone installé - instructions courtes :"
+msgstr ""
+"Pour développer le routeur i2p ou les applications incorporées\n"
+"obtenez le dépôt de source de monotone installé - instructions courtes :"
#: i2p2www/pages/site/get-involved/guides/new-developers.html:48
msgid ""
"Install monotone.\n"
"Monotone is a version control system.\n"
-"We use it because it allows us to keep track of who does what changes to the source code (and for a lot of complicated things, but 'keeping track of changes' is the basic idea)."
-msgstr "Installez monotone.\nMonotone est un système de contrôle de version. \nNous l'utilisons parce qu'il nous permet de garder la trace de qui fait quels changements au code source (et pour beaucoup de choses compliquées, mais 'garder la trace des changements' est l'idée de base)."
+"We use it because it allows us to keep track of who does what changes to "
+"the source code (and for a lot of complicated things, but 'keeping track "
+"of changes' is the basic idea)."
+msgstr ""
+"Installez monotone.\n"
+"Monotone est un système de contrôle de version. \n"
+"Nous l'utilisons parce qu'il nous permet de garder la trace de qui fait "
+"quels changements au code source (et pour beaucoup de choses compliquées,"
+" mais 'garder la trace des changements' est l'idée de base)."
#: i2p2www/pages/site/get-involved/guides/new-developers.html:53
msgid ""
-"Skim over the monotone"
-" tutorial, to make sure you understand the concepts."
-msgstr "Lisez le tutoriel de monotone, pour vous assurer vous comprenez les concepts."
+"Skim over the monotone tutorial,"
+" to make sure you understand the concepts."
+msgstr ""
+"Lisez le tutoriel "
+"de monotone, pour vous assurer vous comprenez les concepts."
#: i2p2www/pages/site/get-involved/guides/new-developers.html:57
msgid ""
-"If you want to remain anonymous, you need to do an additional step, to set "
-"up a connection to a monotone server over I2P:"
-msgstr "Si vous voulez rester anonyme, vous devez faire une étape supplémentaire, pour configurer une connexion à un serveur monotone au travers d''I2P :"
+"If you want to remain anonymous, you need to do an additional step, to "
+"set up a connection to a monotone server over I2P:"
+msgstr ""
+"Si vous voulez rester anonyme, vous devez faire une étape supplémentaire,"
+" pour configurer une connexion à un serveur monotone au travers d''I2P :"
#: i2p2www/pages/site/get-involved/guides/new-developers.html:60
#, python-format
msgid ""
"Enable the i2ptunnel client tunnel on port "
"8998 pointing to mtn.i2p2.i2p."
-msgstr "Activez le client tunnel i2ptunnel sur le port 8998 pointant vers mtn.i2p2.i2p."
+msgstr ""
+"Activez le client tunnel i2ptunnel sur le "
+"port 8998 pointant vers mtn.i2p2.i2p."
#: i2p2www/pages/site/get-involved/guides/new-developers.html:64
msgid ""
"Pick a directory where you want to put all your I2P files, and create a "
"monotone database:"
-msgstr "Choisissez un répertoire dans lequel vous voulez mettre tous vos fichiers I2P, et créez une base de données monotone :"
+msgstr ""
+"Choisissez un répertoire dans lequel vous voulez mettre tous vos fichiers"
+" I2P, et créez une base de données monotone :"
#: i2p2www/pages/site/get-involved/guides/new-developers.html:67
msgid ""
-"Define the trust list by creating ~/.monotone/monotonerc
(or "
-"_MTN/monotonerc
in the i2p.i2p workspace) with the following "
-"contents:"
-msgstr "Définissez la liste de confiance en créant ~/.monotone/monotonerc
(ou _MTN/monotonerc
dans l'espace de travail i2p.i2p) avec le contenu suivant :"
+"Define the trust list by creating ~/.monotone/monotonerc
(or"
+" _MTN/monotonerc
in the i2p.i2p workspace) with the "
+"following contents:"
+msgstr ""
+"Définissez la liste de confiance en créant "
+"~/.monotone/monotonerc
(ou _MTN/monotonerc
dans"
+" l'espace de travail i2p.i2p) avec le contenu suivant :"
#: i2p2www/pages/site/get-involved/guides/new-developers.html:72
#, python-format
msgid ""
-"Copy and paste the developer's commit keys into a new file (e.g. keys.txt
) in the same directory\n"
-" that i2p.mtn
is in. Import the keys into your database with mtn -d i2p.mtn read < keys.txt
"
-msgstr "Copiez et collez les clés d'engagement des développeurs dans un nouveau fichier (ex: keys.txt
) dans le même répertoire\ndans lequel se trouve i2p.mtn
. Importez les clés dans votre base de données avec mtn -d i2p.mtn read < keys.txt
"
+"Copy and paste the developer's commit keys "
+"into a new file (e.g. keys.txt
) in the same directory\n"
+" that i2p.mtn
is in. Import the keys into your database "
+"with mtn -d i2p.mtn read < keys.txt
"
+msgstr ""
+"Copiez et collez les clés d'engagement des "
+"développeurs dans un nouveau fichier (ex: keys.txt
) "
+"dans le même répertoire\n"
+"dans lequel se trouve i2p.mtn
. Importez les clés dans votre "
+"base de données avec mtn -d i2p.mtn read < "
+"keys.txt
"
#: i2p2www/pages/site/get-involved/guides/new-developers.html:76
msgid ""
-"Pull the I2P sources to your machine. This may take a long time, especially "
-"if you are doing this over I2P!"
-msgstr "Tirez les sources d'I2P vers votre machine. Cela peut prendre longtemps, en particulier si vous le faites à travers I2P !"
+"Pull the I2P sources to your machine. This may take a long time, "
+"especially if you are doing this over I2P!"
+msgstr ""
+"Tirez les sources d'I2P vers votre machine. Cela peut prendre longtemps, "
+"en particulier si vous le faites à travers I2P !"
#: i2p2www/pages/site/get-involved/guides/new-developers.html:78
msgid "Anonymously:"
@@ -2962,21 +4709,28 @@ msgstr "Non anonymement :"
#: i2p2www/pages/site/get-involved/guides/new-developers.html:83
msgid ""
-"Alternatively, instead of 'mtn.i2p2.de', you can also download from mtn.i2p-"
-"projekt.de."
-msgstr "Autrement, au lieu de 'mtn.i2p2.de', vous pouvez aussi télécharger depuis mtn.i2p-projekt.de."
+"Alternatively, instead of 'mtn.i2p2.de', you can also download from mtn"
+".i2p-projekt.de."
+msgstr ""
+"Autrement, au lieu de 'mtn.i2p2.de', vous pouvez aussi télécharger depuis"
+" mtn.i2p-projekt.de."
#: i2p2www/pages/site/get-involved/guides/new-developers.html:90
msgid ""
-"All the sources are now present on your machine, in the database file. To "
-"make them available in a directory, you need to check them out:"
-msgstr "Toutes les sources sont maintenant présentes sur votre machine, dans le fichier de base de données. Pour les rendre disponibles dans un répertoire, vous devez les vérifier :"
+"All the sources are now present on your machine, in the database file. To"
+" make them available in a directory, you need to check them out:"
+msgstr ""
+"Toutes les sources sont maintenant présentes sur votre machine, dans le "
+"fichier de base de données. Pour les rendre disponibles dans un "
+"répertoire, vous devez les vérifier :"
#: i2p2www/pages/site/get-involved/guides/new-developers.html:92
msgid ""
-"The above command creates a directory i2p.i2p, which contains all of the I2P"
-" sources."
-msgstr "La commande susdite crée un répertoire i2p.i2p, qui contient toutes les sources d''I2P."
+"The above command creates a directory i2p.i2p, which contains all of the "
+"I2P sources."
+msgstr ""
+"La commande susdite crée un répertoire i2p.i2p, qui contient toutes les "
+"sources d''I2P."
#: i2p2www/pages/site/get-involved/guides/new-developers.html:96
msgid "Remarks"
@@ -2985,53 +4739,83 @@ msgstr "Remarques"
#: i2p2www/pages/site/get-involved/guides/new-developers.html:97
msgid ""
"\n"
-"To download the website files instead of the I2P source files, use 'i2p.www' instead of 'i2p.i2p'."
-msgstr "\nPour télécharger les fichiers du site Web au lieu des fichiers du source d''I2P, utiliser 'i2p.www' au lieu de 'i2p.i2p'."
+"To download the website files instead of the I2P source files, use "
+"'i2p.www' instead of 'i2p.i2p'."
+msgstr ""
+"\n"
+"Pour télécharger les fichiers du site Web au lieu des fichiers du source "
+"d''I2P, utiliser 'i2p.www' au lieu de 'i2p.i2p'."
#: i2p2www/pages/site/get-involved/guides/new-developers.html:100
msgid ""
"The initial pull may take several hours using the tunnel.\n"
-"If it fails after a partial pull, simply rerun it, it will start where it left off.\n"
+"If it fails after a partial pull, simply rerun it, it will start where it"
+" left off.\n"
"If you are in a hurry, use the non-anonymous access."
-msgstr "La traction initiale peut prendre plusieurs heures en utilisant le tunnel.\nSi elle échoue après une traction partielle, simplement relancez-la, elle commencera là où elle s'est arrêtée.\nSi vous êtes pressé, utilisez l'accès non-anonyme."
+msgstr ""
+"La traction initiale peut prendre plusieurs heures en utilisant le "
+"tunnel.\n"
+"Si elle échoue après une traction partielle, simplement relancez-la, elle"
+" commencera là où elle s'est arrêtée.\n"
+"Si vous êtes pressé, utilisez l'accès non-anonyme."
#: i2p2www/pages/site/get-involved/guides/new-developers.html:105
#, python-format
msgid ""
-"A full list of branches, including i2p.i2p and i2p.www can be found on viewmtn."
-msgstr "Une liste complète de branches, y compris i2p.i2p et i2p.www peuvent êtres trouvées sur viewmtn."
+"A full list of branches, including i2p.i2p and i2p.www can be found on viewmtn."
+msgstr ""
+"Une liste complète de branches, y compris i2p.i2p et i2p.www peuvent "
+"êtres trouvées sur viewmtn."
#: i2p2www/pages/site/get-involved/guides/new-developers.html:108
#, python-format
msgid ""
"A long explanation about using monotone is available on the monotone page."
-msgstr "Une longue explication concernant l'utilisation de monotone est disponible sur la page monotone."
+msgstr ""
+"Une longue explication concernant l'utilisation de monotone est "
+"disponible sur la page monotone."
#: i2p2www/pages/site/get-involved/guides/new-developers.html:114
#, python-format
msgid ""
-"To compile the code, you need the Sun Java Development Kit 6 or higher, or equivalent JDK\n"
+"To compile the code, you need the Sun Java Development Kit 6 or higher, "
+"or equivalent JDK\n"
"(Sun JDK 6 strongly recommended) and\n"
"Apache ant\n"
"version 1.7.0 or higher.\n"
-"If you go are working on the main I2P code, you can go into the i2p.i2p directory and run 'ant' to see the build options."
-msgstr "Pour compiler le code, vous avez besoin de Sun Java Development Kit 6 ou plus récente, ou HDJ équivalent\n(Sun JDK 6 fortement recommandé) et\nApache ant\nversion 1.7.0 ou plus récente.\nSi vous comptez travailler sur le code principal d''I2P, vous pouvez aller au répertoire i2p.i2p et exécuter 'ant' pour voir les options de construction."
+"If you go are working on the main I2P code, you can go into the i2p.i2p "
+"directory and run 'ant' to see the build options."
+msgstr ""
+"Pour compiler le code, vous avez besoin de Sun Java Development Kit 6 ou "
+"plus récente, ou HDJ équivalent\n"
+"(Sun JDK 6 fortement recommandé) et\n"
+"Apache ant\n"
+"version 1.7.0 ou plus récente.\n"
+"Si vous comptez travailler sur le code principal d''I2P, vous pouvez "
+"aller au répertoire i2p.i2p et exécuter 'ant' pour voir les options de "
+"construction."
#: i2p2www/pages/site/get-involved/guides/new-developers.html:122
msgid ""
"To build or work on console translations, you need\n"
"the xgettext, msgfmt, and msgmerge tools from the\n"
"GNU gettext package."
-msgstr "Pour construire ou travailler sur les traductions de console, vous avez besoin \ndes outils xgettext, msgfmt, et msgmerge issus du\nGNU gettext package."
+msgstr ""
+"Pour construire ou travailler sur les traductions de console, vous avez "
+"besoin \n"
+"des outils xgettext, msgfmt, et msgmerge issus du\n"
+"GNU gettext package."
#: i2p2www/pages/site/get-involved/guides/new-developers.html:128
#, python-format
msgid ""
"For development on new applications,\n"
"see the application development guide."
-msgstr "Pour le développement de nouvelles applications,\nvoyez le guide de développement d''application."
+msgstr ""
+"Pour le développement de nouvelles applications,\n"
+"voyez le guide de développement d''application."
#: i2p2www/pages/site/get-involved/guides/new-developers.html:134
#, python-format
@@ -3040,18 +4824,31 @@ msgid ""
"this website's TODO list or\n"
"Trac\n"
"for ideas."
-msgstr "Voir la liste de zzz de TODO (choses à faire),\nliste TODO concernant ce site web ou\nTrac\npour des idées."
+msgstr ""
+"Voir la liste de zzz de TODO (choses "
+"à faire),\n"
+"liste TODO concernant ce site web ou\n"
+"Trac\n"
+"pour des idées."
#: i2p2www/pages/site/get-involved/guides/new-developers.html:143
#, python-format
msgid ""
-"See the bottom of the licenses page for\n"
-"commit privilege requirements. You need these to put code into i2p.i2p (not required for the website!)."
-msgstr "Voyez en bas de la page licenses pour\nles exigences de privilège d'engagement. Vous avez besoin de ceux-ci pour mettre du code dans i2p.i2p (non exigé pour le site Web !)."
+"See the bottom of the licenses page "
+"for\n"
+"commit privilege requirements. You need these to put code into i2p.i2p "
+"(not required for the website!)."
+msgstr ""
+"Voyez en bas de la page licenses pour"
+"\n"
+"les exigences de privilège d'engagement. Vous avez besoin de ceux-ci pour"
+" mettre du code dans i2p.i2p (non exigé pour le site Web !)."
#: i2p2www/pages/site/get-involved/guides/new-developers.html:148
msgid "Short version of how to generate and use keys if you plan to commit:"
-msgstr "Version courte sur la façon de générer et utiliser des clés si vous planifiez de vous engager :"
+msgstr ""
+"Version courte sur la façon de générer et utiliser des clés si vous "
+"planifiez de vous engager :"
#: i2p2www/pages/site/get-involved/guides/new-developers.html:150
msgid "use an empty passphrase"
@@ -3066,14 +4863,18 @@ msgstr "entrer une phrase mot de passe"
msgid ""
"send this to a mtn repo operator to get "
"push privileges"
-msgstr "envoyer ceci à un opérateur de dépôt mtn pour obtenir les privilèges de poussée"
+msgstr ""
+"envoyer ceci à un opérateur de dépôt mtn"
+" pour obtenir les privilèges de poussée"
#: i2p2www/pages/site/get-involved/guides/new-developers.html:153
#, python-format
msgid ""
"send this to a release manager to get "
"commit privileges - not required for website"
-msgstr "envoyez ceci à un gestionnaire de release pour obtenir les privilèges - non exigé pour le site Web"
+msgstr ""
+"envoyez ceci à un gestionnaire de "
+"release pour obtenir les privilèges - non exigé pour le site Web"
#: i2p2www/pages/site/get-involved/guides/new-developers.html:154
msgid "check in with this key"
@@ -3091,35 +4892,70 @@ msgstr "Version longue : voyez la page Monotone."
#: i2p2www/pages/site/get-involved/guides/new-developers.html:163
#, python-format
msgid ""
-"The developers hang around on IRC. They can be reached on the Freenode network, OFTC, and on the I2P internal networks. The usual place to look is #i2p-dev. Join the channel and say hi!\n"
-"We also have additional guidelines for regular developers."
-msgstr "Les développeurs traînent sur IRC. Ils peuvent être atteints sur le réseau Freenode, OFTC, et sur les réseaux internes d''I2P. L'endroit habituel à regarder est #i2p-dev. Rejoignez le canal et dites salut !\nNous avons aussi des directives supplémentaires pour les développeurs habitués."
+"The developers hang around on IRC. They can be reached on the Freenode "
+"network, OFTC, and on the I2P internal networks. The usual place to look "
+"is #i2p-dev. Join the channel and say hi!\n"
+"We also have additional guidelines for regular"
+" developers."
+msgstr ""
+"Les développeurs traînent sur IRC. Ils peuvent être atteints sur le "
+"réseau Freenode, OFTC, et sur les réseaux internes d''I2P. L'endroit "
+"habituel à regarder est #i2p-dev. Rejoignez le canal et dites salut !\n"
+"Nous avons aussi des directives "
+"supplémentaires pour les développeurs habitués."
#: i2p2www/pages/site/get-involved/guides/new-developers.html:169
#, python-format
msgid ""
-"Website and router console translators: See the New Translator's Guide\n"
+"Website and router console translators: See the New Translator's Guide\n"
"for next steps."
-msgstr "Traducteurs du site Web et de la console routeur : voyez le Guide du nouveau traducteur\npour les étapes suivantes."
+msgstr ""
+"Traducteurs du site Web et de la console routeur : voyez le Guide du nouveau traducteur\n"
+"pour les étapes suivantes."
#: i2p2www/pages/site/get-involved/guides/new-developers.html:175
msgid ""
"I2P is open source software that is mostly developed using open sourced\n"
-"toolkits. The I2P project recently acquired a license for the YourKit Java\n"
-"Profiler. Open source projects are eligible to receive a free license provided\n"
-"that YourKit is referenced on the project web site. Please get in touch if you\n"
+"toolkits. The I2P project recently acquired a license for the YourKit "
+"Java\n"
+"Profiler. Open source projects are eligible to receive a free license "
+"provided\n"
+"that YourKit is referenced on the project web site. Please get in touch "
+"if you\n"
"are interested in profiling the I2P codebase."
-msgstr "I2P est un logiciel libre qui est est développé surtout en utilisant des boîtes à outils\nd''origine open source. Le projet d''I2P a récemment acquis une licence pour YourKit\nJava Profiler. Des projets open source ont le droit de recevoir une licence gratuite du fait\nque YourKit est référencé sur le site Web du projet. Mettez-vous en contact s'il vous plaît si vous\nêtes intéressé par le profilage du codebase d''I2P."
+msgstr ""
+"I2P est un logiciel libre qui est est développé surtout en utilisant des "
+"boîtes à outils\n"
+"d''origine open source. Le projet d''I2P a récemment acquis une licence "
+"pour YourKit\n"
+"Java Profiler. Des projets open source ont le droit de recevoir une "
+"licence gratuite du fait\n"
+"que YourKit est référencé sur le site Web du projet. Mettez-vous en "
+"contact s'il vous plaît si vous\n"
+"êtes intéressé par le profilage du codebase d''I2P."
#: i2p2www/pages/site/get-involved/guides/new-developers.html:183
#, python-format
msgid ""
-"YourKit is kindly supporting open source projects with its full-featured Java Profiler.\n"
-"YourKit, LLC is the creator of innovative and intelligent tools for profiling\n"
-"Java and .NET applications. Take a look at YourKit's leading software products:\n"
+"YourKit is kindly supporting open source projects with its full-featured "
+"Java Profiler.\n"
+"YourKit, LLC is the creator of innovative and intelligent tools for "
+"profiling\n"
+"Java and .NET applications. Take a look at YourKit's leading software "
+"products:\n"
"YourKit Java Profiler and\n"
"YourKit .NET Profiler."
-msgstr "YourKit soutient avec bonté des projets open source avec son Java Profiler toutes options.\nYourKit, LLC est le créateur d'outils novateurs et intelligents pour le profilage\nd''applications Java et .NET. Jetez un coup d''oeil aux produits logiciels principaux de YourKit :\nYourKit Java Profiler et\nYourKit .NET Profiler."
+msgstr ""
+"YourKit soutient avec bonté des projets open source avec son Java "
+"Profiler toutes options.\n"
+"YourKit, LLC est le créateur d'outils novateurs et intelligents pour le "
+"profilage\n"
+"d''applications Java et .NET. Jetez un coup d''oeil aux produits "
+"logiciels principaux de YourKit :\n"
+"YourKit Java Profiler et\n"
+"YourKit .NET Profiler."
#: i2p2www/pages/site/get-involved/guides/new-translators.html:2
msgid "New Translator's Guide"
@@ -3136,11 +4972,20 @@ msgstr "Comment traduire le site web"
#: i2p2www/pages/site/get-involved/guides/new-translators.html:8
#, python-format
msgid ""
-"Translation of the website is done with .po files. The easiest way by far to\n"
+"Translation of the website is done with .po files. The easiest way by far"
+" to\n"
"translate the website is to sign up for an account at \n"
-"Transifex and request to join a translation team. \n"
+"Transifex and request to join a translation"
+" team. \n"
"Alternatively it can be done \"the old way\" as outlined below."
-msgstr "La traduction du site Web est faite avec des fichiers .po. La façon la plus facile de loin de\ntraduire le site Web est de s'inscrire pour un compte à\nTransifex et demander à rejoindre une équipe de traduction.\nAutrement cela peut être fait de la \"vieille façon\" comme décrit ci-dessous."
+msgstr ""
+"La traduction du site Web est faite avec des fichiers .po. La façon la "
+"plus facile de loin de\n"
+"traduire le site Web est de s'inscrire pour un compte à\n"
+"Transifex et demander à rejoindre une "
+"équipe de traduction.\n"
+"Autrement cela peut être fait de la \"vieille façon\" comme décrit ci-"
+"dessous."
#: i2p2www/pages/site/get-involved/guides/new-translators.html:17
#: i2p2www/pages/site/get-involved/guides/new-translators.html:82
@@ -3153,9 +4998,17 @@ msgstr "Préparation"
msgid ""
"Come to #i2p-dev on irc and talk to people.\n"
"Claim the language -\n"
-"To make sure other coworkers don't bump onto the files you are working on,\n"
-"please update the translation status on this wiki page."
-msgstr "Venez dans #i2p-dev sur irc et parlez aux gens.\nRevendiquez la langue -\nPour vous assurer que d''autres collègues ne se heurtent pas sur les fichiers sur lesquels vous travaillez,\nveuillez mettre à jour le statut de traduction sur cette page wiki."
+"To make sure other coworkers don't bump onto the files you are working "
+"on,\n"
+"please update the translation status on this wiki "
+"page."
+msgstr ""
+"Venez dans #i2p-dev sur irc et parlez aux gens.\n"
+"Revendiquez la langue -\n"
+"Pour vous assurer que d''autres collègues ne se heurtent pas sur les "
+"fichiers sur lesquels vous travaillez,\n"
+"veuillez mettre à jour le statut de traduction sur cette page wiki."
#: i2p2www/pages/site/get-involved/guides/new-translators.html:25
#, python-format
@@ -3164,53 +5017,90 @@ msgid ""
"Including the installation of monotone,\n"
"checking out i2p.www branch, and generate your own monotone keys.\n"
"It is not required that you sign a dev agreement."
-msgstr "Suivez le guide du nouveau développeur,\nincluant l'installation de monotone,\nexaminer la branche i2p.www, et générer vos propres clés monotone.\nIl n'est pas exigé que vous signiez un accord de dév."
+msgstr ""
+"Suivez le guide du nouveau développeur,\n"
+"incluant l'installation de monotone,\n"
+"examiner la branche i2p.www, et générer vos propres clés monotone.\n"
+"Il n'est pas exigé que vous signiez un accord de dév."
#: i2p2www/pages/site/get-involved/guides/new-translators.html:33
msgid ""
"Create files:\n"
"If the file for your language does not exist yet:"
-msgstr "Créer fichiers :\nSi le fichier pour votre langue n'existe pas encore :"
+msgstr ""
+"Créer fichiers :\n"
+"Si le fichier pour votre langue n'existe pas encore :"
#: i2p2www/pages/site/get-involved/guides/new-translators.html:38
msgid ""
-"Run \"./extract-messages.sh
\" to generate a messages.pot
in the base directory.\n"
-"Edit the header of this file, then run \"./init-new-po.sh locale
\" to generate the file\n"
-"i2p2www/translations/locale/LC_MESSAGES/messages.po
. \"mtn add
\" this file."
-msgstr "Exécutez \"./extract-messages.sh
\" pour générer un messages.pot
dans le répertoire de base.\nÉditez l'en-tête de ce fichier, puis exécutez \"./init-new-po.sh locale
\" pour générer le fichier\ni2p2www/translations/locale/LC_MESSAGES/messages.po
. \"mtn add
\" ce fichier."
+"Run \"./extract-messages.sh
\" to generate a "
+"messages.pot
in the base directory.\n"
+"Edit the header of this file, then run \"./init-new-po.sh "
+"locale
\" to generate the file\n"
+"i2p2www/translations/locale/LC_MESSAGES/messages.po
. "
+"\"mtn add
\" this file."
+msgstr ""
+"Exécutez \"./extract-messages.sh
\" pour générer un "
+"messages.pot
dans le répertoire de base.\n"
+"Éditez l'en-tête de ce fichier, puis exécutez \"./init-new-po.sh "
+"locale
\" pour générer le fichier\n"
+"i2p2www/translations/locale/LC_MESSAGES/messages.po
. "
+"\"mtn add
\" ce fichier."
#: i2p2www/pages/site/get-involved/guides/new-translators.html:43
msgid ""
"Edit i2p2www/pages/global/lang.html
and add a line for your "
"language (copy an existing line)."
-msgstr "Éditez i2p2www/pages/global/lang.html
et ajoutez une ligne pour votre langue (copiez une ligne existante)."
+msgstr ""
+"Éditez i2p2www/pages/global/lang.html
et ajoutez une ligne "
+"pour votre langue (copiez une ligne existante)."
#: i2p2www/pages/site/get-involved/guides/new-translators.html:46
msgid ""
-"Add a flag image file to i2p2www/static/images/flags/
for the "
-"menu (copy from the router)."
-msgstr "Ajoutez un fichier d'image de drapeau à i2p2www/static/images/flags/
pour le menu (copiez depuis le routeur)."
+"Add a flag image file to i2p2www/static/images/flags/
for "
+"the menu (copy from the router)."
+msgstr ""
+"Ajoutez un fichier d'image de drapeau à "
+"i2p2www/static/images/flags/
pour le menu (copiez depuis le "
+"routeur)."
#: i2p2www/pages/site/get-involved/guides/new-translators.html:52
msgid ""
"Edit files:\n"
"Edit i2p2www/translations/locale/LC_MESSAGES/messages.po
.\n"
-"To work with .po files efficiently, you may wish to use POEdit"
-msgstr "Éditer les fichiers :\nÉditez i2p2www/translations/locale/LC_MESSAGES/messages.po
.\nPour travailler efficacement avec les fichiers .po, vous pourriez vouloir utiliser POEdit"
+"To work with .po files efficiently, you may wish to use POEdit"
+msgstr ""
+"Éditer les fichiers :\n"
+"Éditez i2p2www/translations/locale/LC_MESSAGES/messages.po
.\n"
+"Pour travailler efficacement avec les fichiers .po, vous pourriez vouloir"
+" utiliser POEdit"
#: i2p2www/pages/site/get-involved/guides/new-translators.html:58
#: i2p2www/pages/site/get-involved/guides/new-translators.html:151
msgid ""
"Check in:\n"
-"\"mtn pull
\", \"mtn update
\". Then check in by \"mtn ci -k yourname@mail.i2p file1 file2 ...
\"\n"
-"This collects the diff info of your changed file into your local repo. Then \"mtn sync mtn.i2p2.de -k yourname-transport@mail.i2p i2p.i2p
\".\n"
+"\"mtn pull
\", \"mtn update
\". Then check in by "
+"\"mtn ci -k yourname@mail.i2p file1 file2 ...
\"\n"
+"This collects the diff info of your changed file into your local repo. "
+"Then \"mtn sync mtn.i2p2.de -k yourname-transport@mail.i2p "
+"i2p.i2p
\".\n"
"This synchronizes your local repo with the repo on the target machine."
-msgstr "Envoyer (check in) :\n\"mtn pull
\", \"mtn update
\". Puis envoyez par \"mtn ci -k yourname@mail.i2p file1 file2 ...
\"\nCeci collecte les infos diff de vos fichiers modifiés dans votre dépôt local. Puis \"mtn sync mtn.i2p2.de -k yourname-transport@mail.i2p i2p.i2p
\".\nCeci synchronise votre dépôt local avec le dépôt de la machine cible."
+msgstr ""
+"Envoyer (check in) :\n"
+"\"mtn pull
\", \"mtn update
\". Puis envoyez par "
+"\"mtn ci -k yourname@mail.i2p file1 file2 ...
\"\n"
+"Ceci collecte les infos diff de vos fichiers modifiés dans votre dépôt "
+"local. Puis \"mtn sync mtn.i2p2.de -k yourname-transport@mail.i2p "
+"i2p.i2p
\".\n"
+"Ceci synchronise votre dépôt local avec le dépôt de la machine cible."
#: i2p2www/pages/site/get-involved/guides/new-translators.html:65
#: i2p2www/pages/site/get-involved/guides/new-translators.html:158
msgid "Repeat. Check in often. Don't wait until it is perfect."
-msgstr "Répétez. Vérifiez souvent. N'attendez pas jusqu'à ce que tout soit parfait."
+msgstr ""
+"Répétez. Vérifiez souvent. N'attendez pas jusqu'à ce que tout soit "
+"parfait."
#: i2p2www/pages/site/get-involved/guides/new-translators.html:72
msgid "How to Translate the Router Console"
@@ -3219,10 +5109,18 @@ msgstr "Comment traduire la console de routeur"
#: i2p2www/pages/site/get-involved/guides/new-translators.html:74
#, python-format
msgid ""
-"The easiest way by far to translate the router console is to sign up for an account at \n"
-"Transifex and request to join a translation team. \n"
+"The easiest way by far to translate the router console is to sign up for "
+"an account at \n"
+"Transifex and request to join a translation"
+" team. \n"
"Alternatively it can be done \"the old way\" as outlined below."
-msgstr "La façon de loin la plus facile pour traduire la console de routeur est de s'inscrire pour un compte chez\nTransifex et demander à rejoindre une équipe de traduction.\nAutrement cela peut être fait de la \"vieille façon\" comme décrit ci-dessous."
+msgstr ""
+"La façon de loin la plus facile pour traduire la console de routeur est "
+"de s'inscrire pour un compte chez\n"
+"Transifex et demander à rejoindre une "
+"équipe de traduction.\n"
+"Autrement cela peut être fait de la \"vieille façon\" comme décrit ci-"
+"dessous."
#: i2p2www/pages/site/get-involved/guides/new-translators.html:90
#, python-format
@@ -3230,7 +5128,11 @@ msgid ""
"Follow the new developer's guide,\n"
"including the installation of monotone and the gettext tools,\n"
"checking out i2p.i2p branch, and generate your own monotone keys."
-msgstr "Suivez le guide du nouveau développeur,\nincluant l'installation de monotone et des outils gettext,\nla vérification de la branche i2p.i2p , et la génération de vos propres clés monotone."
+msgstr ""
+"Suivez le guide du nouveau développeur,\n"
+"incluant l'installation de monotone et des outils gettext,\n"
+"la vérification de la branche i2p.i2p , et la génération de vos propres "
+"clés monotone."
#: i2p2www/pages/site/get-involved/guides/new-translators.html:95
msgid "Generate your own gpg key and sign the dev agreement."
@@ -3238,43 +5140,76 @@ msgstr "Générez votre propre clé gpg et signez l'accord de dev."
#: i2p2www/pages/site/get-involved/guides/new-translators.html:101
msgid ""
-"Before starting a console translation, better help translate some i2p webpages first.\n"
+"Before starting a console translation, better help translate some i2p "
+"webpages first.\n"
"At least an i2p homepage in your language would be great."
-msgstr "Avant le départ d'une traduction de la console, il est mieux de traduire d''abord quelques pages web i2p.\nAu minimum une page d'accueil i2p dans votre langue serait super."
+msgstr ""
+"Avant le départ d'une traduction de la console, il est mieux de traduire "
+"d''abord quelques pages web i2p.\n"
+"Au minimum une page d'accueil i2p dans votre langue serait super."
#: i2p2www/pages/site/get-involved/guides/new-translators.html:106
msgid ""
"What to translate:\n"
"There are about 15 files in the i2p.i2p branch that needs translation:"
-msgstr "Que traduire :\nIl y a environ 15 fichiers dans la branche i2p.i2p qui nécessitent d'être traduites :"
+msgstr ""
+"Que traduire :\n"
+"Il y a environ 15 fichiers dans la branche i2p.i2p qui nécessitent d'être"
+" traduites :"
#: i2p2www/pages/site/get-involved/guides/new-translators.html:132
msgid ""
"Where xx is your language code like fr/de/ch/zh/...\n"
-"There may be or may not be files with your lang code. If not, you can create your own. by copying and renaming other language files you know with your own lang code."
-msgstr "Où xx est votre code langue comme fr/de/ch/zh/...\nIl peut y avoir ou ne pas y avoir des fichiers avec votre code de langue. Sinon, vous pouvez créer le votre. En copiant et rebaptisant d''autres fichiers de langue vous connaissez avec votre propre code de langue."
+"There may be or may not be files with your lang code. If not, you can "
+"create your own. by copying and renaming other language files you know "
+"with your own lang code."
+msgstr ""
+"Où xx est votre code langue comme fr/de/ch/zh/...\n"
+"Il peut y avoir ou ne pas y avoir des fichiers avec votre code de langue."
+" Sinon, vous pouvez créer le votre. En copiant et rebaptisant d''autres "
+"fichiers de langue vous connaissez avec votre propre code de langue."
#: i2p2www/pages/site/get-involved/guides/new-translators.html:137
msgid ""
"Create files:\n"
-"If the file for your language does not exist yet, copy another language file to a new file foo_xx.bar
for your language.\n"
+"If the file for your language does not exist yet, copy another language "
+"file to a new file foo_xx.bar
for your language.\n"
"Then \"mtn add
\" the file.\n"
-"After creating a .po file, edit the headers. Then run \"ant distclean poupdate
\"."
-msgstr "Créer des fichiers : \nSi le fichier pour votre langue n'existe pas encore, copiez un fichier d'une autre langue vers un nouveau fichier foo_xx.bar
pour votre langue.\nPuis \"mtn add
\" le fichier.\nAprès la création d'un fichier .po, éditez les en-têtes. Puis lancez \"ant distclean poupdate
\"."
+"After creating a .po file, edit the headers. Then run \"ant "
+"distclean poupdate
\"."
+msgstr ""
+"Créer des fichiers : \n"
+"Si le fichier pour votre langue n'existe pas encore, copiez un fichier "
+"d'une autre langue vers un nouveau fichier foo_xx.bar
pour "
+"votre langue.\n"
+"Puis \"mtn add
\" le fichier.\n"
+"Après la création d'un fichier .po, éditez les en-têtes. Puis lancez "
+"\"ant distclean poupdate
\"."
#: i2p2www/pages/site/get-involved/guides/new-translators.html:144
msgid ""
"Start to work:\n"
"Edit the HTML files with any text editor.\n"
"Be sure not to use an editor in HTML mode that reformats everything.\n"
-"To work with .po files efficiently, you may wish to use POEdit"
-msgstr "Commenez à travailler :\nÉditez les fichiers HTML avec n'importe quel éditeur de texte.\nAssuyez vous de ne pas utiliser un éditeur en mode de HTML qui reformate tout. \nPour travailler efficacement avec des fichiers .po, vous pourriez vouloir utiliser POEdit"
+"To work with .po files efficiently, you may wish to use POEdit"
+msgstr ""
+"Commenez à travailler :\n"
+"Éditez les fichiers HTML avec n'importe quel éditeur de texte.\n"
+"Assuyez vous de ne pas utiliser un éditeur en mode de HTML qui reformate "
+"tout. \n"
+"Pour travailler efficacement avec des fichiers .po, vous pourriez vouloir"
+" utiliser POEdit"
#: i2p2www/pages/site/get-involved/guides/new-translators.html:163
msgid ""
"As you can see, it's not that difficult.\n"
-"If you have questions about the meaning of the terms in the console, ask in #i2p-dev
on IRC."
-msgstr "Comme vous pouvez le voir, ce n'est pas si difficile.\nSi vous avez des questions concernant la signification de termes dans la console, demandez sur IRC dans #i2p-dev
."
+"If you have questions about the meaning of the terms in the console, ask "
+"in #i2p-dev
on IRC."
+msgstr ""
+"Comme vous pouvez le voir, ce n'est pas si difficile.\n"
+"Si vous avez des questions concernant la signification de termes dans la "
+"console, demandez sur IRC dans #i2p-dev
."
#: i2p2www/pages/site/get-involved/guides/new-translators.html:169
msgid "FAQ"
@@ -3282,9 +5217,12 @@ msgstr "FAQ"
#: i2p2www/pages/site/get-involved/guides/new-translators.html:171
msgid ""
-"Q: Why do I have to install monotone, Java, jsp, learn about .po files and "
-"html, etc.? Why can't I just do a translation and email it to you?"
-msgstr "Q : Pourquoi dois-je installer monotone, Java, jsp, apprendre les fichiers .po et HTML, etc ? Pourquoi je ne peux pas juste faire une traduction et vous l'envoyer par courrier électronique ?"
+"Q: Why do I have to install monotone, Java, jsp, learn about .po files "
+"and html, etc.? Why can't I just do a translation and email it to you?"
+msgstr ""
+"Q : Pourquoi dois-je installer monotone, Java, jsp, apprendre les "
+"fichiers .po et HTML, etc ? Pourquoi je ne peux pas juste faire une "
+"traduction et vous l'envoyer par courrier électronique ?"
#: i2p2www/pages/site/get-involved/guides/new-translators.html:175
msgid "A: Several reasons:"
@@ -3295,70 +5233,108 @@ msgstr "R : Plusieurs raisons :"
msgid ""
"You might be interested in translating via Transifex. Request to join a "
"translation team here."
-msgstr "Vous pourriez être intéressé par la traduction via Transifex. Demandez à joindre une équipe de traduction ici."
+msgstr ""
+"Vous pourriez être intéressé par la traduction via Transifex. Demandez à "
+"joindre une équipe de traduction ici."
#: i2p2www/pages/site/get-involved/guides/new-translators.html:182
msgid ""
-"We don't have anybody who has time to accept manual contributions and submit"
-" them to our source control system on your behalf. Even if we did, it "
-"doesn't scale."
-msgstr "Nous n''avons personne qui aie le temps d''accepter des contributions manuelles et les soumettre à notre système de contrôle source en votre nom. Même si nous l'avons eu fait, cela n''est pas possible à grande échelle."
+"We don't have anybody who has time to accept manual contributions and "
+"submit them to our source control system on your behalf. Even if we did, "
+"it doesn't scale."
+msgstr ""
+"Nous n''avons personne qui aie le temps d''accepter des contributions "
+"manuelles et les soumettre à notre système de contrôle source en votre "
+"nom. Même si nous l'avons eu fait, cela n''est pas possible à grande "
+"échelle."
#: i2p2www/pages/site/get-involved/guides/new-translators.html:186
msgid ""
"Maybe you are thinking translation is a one-step process. It isn't. You "
"can't do it all at once. You will make mistakes. You need to test it and "
-"tweak it to make it look right before you submit it. Developers will "
-"update or add to the English text, thus requiring a translation update."
-msgstr "Peut-être vous pensez que la traduction est un processus en une étape. Cela ne l'est pas. Vous ne pouvez pas tout faire immédiatement. Vous ferez des erreurs. Vous devez la tester et l'adapter afin qu'elle paraisse bien avant que vous la soumettiez. Les développeurs mettront à jour ou feront des ajouts au texte anglais, exigeant ainsi une mise à jour de traduction."
+"tweak it to make it look right before you submit it. Developers "
+"will update or add to the English text, thus requiring a translation "
+"update."
+msgstr ""
+"Peut-être vous pensez que la traduction est un processus en une étape. "
+"Cela ne l'est pas. Vous ne pouvez pas tout faire immédiatement. Vous "
+"ferez des erreurs. Vous devez la tester et l'adapter afin qu'elle "
+"paraisse bien avant que vous la soumettiez. Les développeurs "
+"mettront à jour ou feront des ajouts au texte anglais, exigeant ainsi une"
+" mise à jour de traduction."
#: i2p2www/pages/site/get-involved/guides/new-translators.html:190
msgid ""
"Having translators use a source control system directly provides "
-"authentication and accountablility - we know who is doing what, and we can "
-"track changes, and revert them if necessary."
-msgstr "Avoir des traducteurs utilisant un système de contrôle source fournit directement l'authentification et responsabilité - nous savons qui fait quoi et nous pouvons suivre à la trace les changements, et les retourner si nécessaire."
+"authentication and accountablility - we know who is doing what, and we "
+"can track changes, and revert them if necessary."
+msgstr ""
+"Avoir des traducteurs utilisant un système de contrôle source fournit "
+"directement l'authentification et responsabilité - nous savons qui fait "
+"quoi et nous pouvons suivre à la trace les changements, et les retourner "
+"si nécessaire."
#: i2p2www/pages/site/get-involved/guides/new-translators.html:194
msgid ""
-".po files are not difficult. If you don't want to work directly with them, "
-"we recommend 'poedit'."
-msgstr "Les fichiers .po ne sont pas difficiles. Si vous ne voulez pas travailler directement avec eux, nous recommandons 'poedit'."
+".po files are not difficult. If you don't want to work directly with "
+"them, we recommend 'poedit'."
+msgstr ""
+"Les fichiers .po ne sont pas difficiles. Si vous ne voulez pas travailler"
+" directement avec eux, nous recommandons 'poedit'."
#: i2p2www/pages/site/get-involved/guides/new-translators.html:198
msgid ""
-"HTML files are not difficult. Just ignore the html stuff and translate the "
-"text."
-msgstr "Les fichiers HTML ne sont pas difficiles. Ignorez simplement le trucs HTML et traduisez le texte."
+"HTML files are not difficult. Just ignore the html stuff and translate "
+"the text."
+msgstr ""
+"Les fichiers HTML ne sont pas difficiles. Ignorez simplement le trucs "
+"HTML et traduisez le texte."
#: i2p2www/pages/site/get-involved/guides/new-translators.html:202
msgid ""
"Installing and using monotone is not that difficult. Several of the "
-"translators and other contributors to I2P are non-programmers, and they use "
-"monotone regularly. Monotone is simply a source control system, it is not "
-"about \"coding\"."
-msgstr "L''installation et l''utilisation de Monotone ne sont pas si difficiles. Plusieurs des traducteurs et d'autres collaborateurs de I2P ne sont pas des programmeurs et ils utilisent monotone régulièrement. Monotone est simplement un système de de contrôle de source, ce n'est pas du \"codage\"."
+"translators and other contributors to I2P are non-programmers, and they "
+"use monotone regularly. Monotone is simply a source control system, it is"
+" not about \"coding\"."
+msgstr ""
+"L''installation et l''utilisation de Monotone ne sont pas si difficiles. "
+"Plusieurs des traducteurs et d'autres collaborateurs de I2P ne sont pas "
+"des programmeurs et ils utilisent monotone régulièrement. Monotone est "
+"simplement un système de de contrôle de source, ce n'est pas du "
+"\"codage\"."
#: i2p2www/pages/site/get-involved/guides/new-translators.html:206
msgid ""
"Our items to translate are not \"documents\". They are html files and po "
-"files, with a specific format and character encoding (UTF-8) that must be "
-"maintained, and not corrupted by email programs or other methods of "
+"files, with a specific format and character encoding (UTF-8) that must be"
+" maintained, and not corrupted by email programs or other methods of "
"transfer."
-msgstr "Nos articles à traduire ne sont pas des \"documents\". Ce sont des fichiers HTML et po, ayant un format spécifique et un codage de caractère (UTF-8) qui doit être maintenu et non corrompu par des logiciels de courrier électronique ou d''autres méthodes de transfert."
+msgstr ""
+"Nos articles à traduire ne sont pas des \"documents\". Ce sont des "
+"fichiers HTML et po, ayant un format spécifique et un codage de caractère"
+" (UTF-8) qui doit être maintenu et non corrompu par des logiciels de "
+"courrier électronique ou d''autres méthodes de transfert."
#: i2p2www/pages/site/get-involved/guides/new-translators.html:210
msgid ""
-"We looked at 'pootle' as a front-end for translators. It didn't work well, "
-"needed an administrator, and a pootle-based process would suffer from a "
-"number of the above flaws."
-msgstr "Nous avons regardé 'pootle' comme un frontal pour les traducteurs. Il n'a pas bien marché, avait besoin d'un administrateur, et un processus basé sur pootle souffrait d'un certain nombre des défauts susdits."
+"We looked at 'pootle' as a front-end for translators. It didn't work "
+"well, needed an administrator, and a pootle-based process would suffer "
+"from a number of the above flaws."
+msgstr ""
+"Nous avons regardé 'pootle' comme un frontal pour les traducteurs. Il n'a"
+" pas bien marché, avait besoin d'un administrateur, et un processus basé "
+"sur pootle souffrait d'un certain nombre des défauts susdits."
#: i2p2www/pages/site/get-involved/guides/new-translators.html:215
msgid ""
"In summary:\n"
-"Yes, we know it is somewhat of a hurdle to get started. It's really the only possible way we can do it. Give it a try, it really isn't that hard."
-msgstr "En résumé :\nOui, nous savons que c'est en quelque sorte un obstacle pour commencer. C'est vraiment la seule façon possible que nous pouvons faire. Faites un essai, ce n'est pas vraiment si difficile."
+"Yes, we know it is somewhat of a hurdle to get started. It's really the "
+"only possible way we can do it. Give it a try, it really isn't that hard."
+msgstr ""
+"En résumé :\n"
+"Oui, nous savons que c'est en quelque sorte un obstacle pour commencer. "
+"C'est vraiment la seule façon possible que nous pouvons faire. Faites un "
+"essai, ce n'est pas vraiment si difficile."
#: i2p2www/pages/site/get-involved/guides/new-translators.html:220
msgid "More Information"
@@ -3369,4 +5345,7 @@ msgstr "Davantage d'informations"
msgid ""
"The #i2p-dev channel on IRC, or the translation forum on %(zzz)s."
-msgstr "Le canal IRC #i2p-dev, ou le forum translation sur %(zzz)s."
+msgstr ""
+"Le canal IRC #i2p-dev, ou le forum "
+"translation sur %(zzz)s."
+
diff --git a/i2p2www/translations/fr/LC_MESSAGES/priority.po b/i2p2www/translations/fr/LC_MESSAGES/priority.po
index 3cf5071b..c1a538eb 100644
--- a/i2p2www/translations/fr/LC_MESSAGES/priority.po
+++ b/i2p2www/translations/fr/LC_MESSAGES/priority.po
@@ -1,31 +1,28 @@
-# Translations template for I2P.
+# French translations for I2P.
# Copyright (C) 2014 ORGANIZATION
# This file is distributed under the same license as the I2P project.
-#
+#
# Translators:
# bassmax, 2014
-# bassmax, 2014
# Boxoa590, 2013
# magma ppa"
-":i2p-maintainers/i2p
into the APT-line field and click Add "
-"Source. Click the Close button then Reload."
-msgstr "Cliquer sur l'onglet Autres sources et cliquez Ajouter. Coller ppa:i2p-maintainers/i2p
dans le champ ligne-APT et cliquez sur Ajouter source. Cliquez sur le bouton Fermer puis Recharger."
+"Click the Other Sources tab and click Add. Paste "
+"ppa:i2p-maintainers/i2p
into the APT-line field and click "
+"Add Source. Click the Close button then "
+"Reload."
+msgstr ""
+"Cliquer sur l'onglet Autres sources et cliquez Ajouter."
+" Coller ppa:i2p-maintainers/i2p
dans le champ ligne-APT et "
+"cliquez sur Ajouter source. Cliquez sur le bouton "
+"Fermer puis Recharger."
#: i2p2www/pages/downloads/debian.html:70
msgid ""
"In the Quick Filter box, type in i2p
and press enter. When "
"i2p
is returned in the results list, right click "
-"i2p
and select Mark for Installation. After doing so "
-"you may see a Mark additional required changes? popup. If so, click"
-" Mark then Apply."
-msgstr "Dans le champs \"filtre rapide\", tapez i2p
puis pressez entrée. Quand i2p
apparaît dans la liste des résultats, faites un clic droit sur i2p
et sélectionnez Marquer pour installation. Après avoir fait cela vous devriez voir l'invite Marquer les changements additionnels requis ?. Si c'est le cas, cliquez Marquer puis Appliquer."
+"i2p
and select Mark for Installation. After doing "
+"so you may see a Mark additional required changes? popup. If so,"
+" click Mark then Apply."
+msgstr ""
+"Dans le champs \"filtre rapide\", tapez i2p
puis pressez "
+"entrée. Quand i2p
apparaît dans la liste des résultats, "
+"faites un clic droit sur i2p
et sélectionnez Marquer "
+"pour installation. Après avoir fait cela vous devriez voir l'invite "
+"Marquer les changements additionnels requis ?. Si c'est le cas, "
+"cliquez Marquer puis Appliquer."
#: i2p2www/pages/downloads/debian.html:76
msgid ""
"After the installation process completes you can move on to the next\n"
-"part of starting I2P and configuring it for your system."
-msgstr "Une fois le processus d'installation terminé, vous pouvez passer à la prochaine étape : configuration post-install"
+"part of starting I2P and configuring "
+"it for your system."
+msgstr ""
+"Une fois le processus d'installation terminé, vous pouvez passer à la "
+"prochaine étape : configuration post-"
+"install"
#: i2p2www/pages/downloads/debian.html:81
msgid "Instructions for Debian"
@@ -177,9 +217,13 @@ msgstr "Instructions pour Debian"
#: i2p2www/pages/downloads/debian.html:85
msgid ""
-"Note: The steps below should be performed with root access (i.e., switching\n"
+"Note: The steps below should be performed with root access (i.e., "
+"switching\n"
"user to root with \"su\" or by prefixing each command with \"sudo\")."
-msgstr "Notez : les étapes ci-dessous devraient être exécutées avec accès root (ex: en s'identifiant comme root avec la commande \"su\" ou en préfixant chaque commande par \"sudo\")."
+msgstr ""
+"Notez : les étapes ci-dessous devraient être exécutées avec accès root "
+"(ex: en s'identifiant comme root avec la commande \"su\" ou en préfixant "
+"chaque commande par \"sudo\")."
#: i2p2www/pages/downloads/debian.html:90
#, python-format
@@ -189,9 +233,11 @@ msgstr "Ajoutez les lignes suivantes au fichier %(file)s
."
#: i2p2www/pages/downloads/debian.html:111
#, python-format
msgid ""
-"Download the key used to sign the repository "
-"and add it to apt:"
-msgstr "Téléchargez la clé utilisée pour signer le dépôt et ajoutez-là à apt :"
+"Download the key used to sign the repository"
+" and add it to apt:"
+msgstr ""
+"Téléchargez la clé utilisée pour signer le "
+"dépôt et ajoutez-là à apt :"
#: i2p2www/pages/downloads/debian.html:118
msgid "Notify your package manager of the new repository by entering"
@@ -200,22 +246,33 @@ msgstr "Notifiez votre gestionnaire de paquet du nouveau dépôt, en entrant"
#: i2p2www/pages/downloads/debian.html:120
msgid ""
"This command will retrieve the latest list of software from every\n"
-"repository enabled on your system, including the I2P repository added in step\n"
+"repository enabled on your system, including the I2P repository added in "
+"step\n"
+"1."
+msgstr ""
+"Cette commande va récupérer la dernière liste de logiciel depuis chaque\n"
+"dépôt activé sur votre système, y compris le dépôt I2P ajouté à l'étape\n"
"1."
-msgstr "Cette commande va récupérer la dernière liste de logiciel depuis chaque\ndépôt activé sur votre système, y compris le dépôt I2P ajouté à l'étape\n1."
#: i2p2www/pages/downloads/debian.html:126
msgid ""
-"You are now ready to install I2P! Installing the i2p-keyring
\n"
+"You are now ready to install I2P! Installing the i2p-keyring
"
+"\n"
"package will ensure that you receive updates to the repository's GPG key."
-msgstr "Vous êtes maintenant prêt à installer I2P ! Installer le paquet i2p-keyring
\nvous assurera d'obtenir les mises à jour de la clé GPG du dépôt."
+msgstr ""
+"Vous êtes maintenant prêt à installer I2P ! Installer le paquet i2p-keyring
\n"
+"vous assurera d'obtenir les mises à jour de la clé GPG du dépôt."
#: i2p2www/pages/downloads/debian.html:133
msgid ""
-"After the installation process completes you can move on to the next part of"
-" starting I2P and configuring it for your"
-" system."
-msgstr "Une fois le processus d'installation terminé, vous pouvez passer à la prochaine étape : configuration post-install"
+"After the installation process completes you can move on to the next part"
+" of starting I2P and configuring it "
+"for your system."
+msgstr ""
+"Une fois le processus d'installation terminé, vous pouvez passer à la "
+"prochaine étape : configuration post-"
+"install"
#: i2p2www/pages/downloads/debian.html:137
#: i2p2www/pages/downloads/post-install.html:1
@@ -226,52 +283,96 @@ msgstr "Configuration post-installation"
msgid ""
"Using these I2P packages the I2P router can be started in the following\n"
"three ways:"
-msgstr "En utilisant ces paquets I2P, le routeur I2P peut être lancé\ndes trois façons différentes :"
+msgstr ""
+"En utilisant ces paquets I2P, le routeur I2P peut être lancé\n"
+"des trois façons différentes :"
#: i2p2www/pages/downloads/debian.html:145
msgid ""
-""on demand" using the i2prouter script. Simply run "i2prouter\n"
-"start
" from a command prompt. (Note: Do not use\n"
+""on demand" using the i2prouter script. Simply run "
+""i2prouter\n"
+"start
" from a command prompt. (Note: Do "
+"not use\n"
"sudo or run it as root!)"
-msgstr "En utilisant le script i2prouter "à la demande". Lancez simplement "i2prouter start
" depuis une invite de commande. (Note: ne pas utiliser sudo ni le lancer en tant que root !)"
+msgstr ""
+"En utilisant le script i2prouter "à la demande". Lancez "
+"simplement "i2prouter start
" depuis une invite de "
+"commande. (Note: ne pas utiliser sudo ni le "
+"lancer en tant que root !)"
#: i2p2www/pages/downloads/debian.html:152
msgid ""
-""on demand" without the java service wrapper\n"
-"(needed on non-Linux/non-x86 systems) by running \"i2prouter-nowrapper
\".\n"
+""on demand" without the java service wrapper\n"
+"(needed on non-Linux/non-x86 systems) by running \"i2prouter-"
+"nowrapper
\".\n"
"(Note: Do not\n"
"use sudo or run it as root!)"
-msgstr ""à la demande" sans le java service wrapper\n(requis sur les systèmes non-Linux/non-x86) en lançant \"i2prouter-nowrapper
\".\n(Note: ne pas\nutiliser sudo ni le lancer en tant que root !)"
+msgstr ""
+""à la demande" sans le java service wrapper\n"
+"(requis sur les systèmes non-Linux/non-x86) en lançant \"i2prouter-"
+"nowrapper
\".\n"
+"(Note: ne pas\n"
+"utiliser sudo ni le lancer en tant que root !)"
#: i2p2www/pages/downloads/debian.html:160
msgid ""
"as a service that automatically runs when your system boots, even\n"
-"before logging in. The service can be enabled with \"dpkg-reconfigure\n"
-"i2p
\" as root or using sudo. This is the recommended means of operation."
-msgstr "en tant que service lancé automatiquement au démarrage du système, avant\nmême d'avoir ouvert une session. Le service peut être activé avec \"dpkg-reconfigure\n i2p
\" en tant que root ou en utilisant sudo. C'est la méthode recommandée."
+"before logging in. The service can be enabled with \"dpkg-"
+"reconfigure\n"
+"i2p
\" as root or using sudo. This is the recommended means of "
+"operation."
+msgstr ""
+"en tant que service lancé automatiquement au démarrage du système, avant\n"
+"même d'avoir ouvert une session. Le service peut être activé avec \"dpkg-reconfigure\n"
+" i2p
\" en tant que root ou en utilisant sudo. C'est la méthode "
+"recommandée."
#: i2p2www/pages/downloads/debian.html:168
msgid ""
-"When installing for the first time, please remember to adjust your NAT/firewall\n"
-"if you can. The ports to forward can be found on the \n"
-"network configuration page in the router console. If guidance with respect to forwarding ports is needed,\n"
-"you may find portforward.com to be helpful."
-msgstr "Lorsque vous installez pour la première fois, veuillez ne pas oublier de régler votre NAT / pare-feu\nsi vous le pouvez. Les ports à transférer peuvent être trouvés sur la \nConfiguration réseau I2P dans la console du routeur. Si, pour transférer des ports, de l'aide vous est nécessaire,\nle site web portforward.com pourra vous être utile."
+"When installing for the first time, please remember to adjust your "
+"NAT/firewall\n"
+"if you can. The ports to forward can be found on the \n"
+"network configuration page in the router console. If guidance with "
+"respect to forwarding ports is needed,\n"
+"you may find portforward.com to be"
+" helpful."
+msgstr ""
+"Lorsque vous installez pour la première fois, veuillez ne pas oublier de "
+"régler votre NAT / pare-feu\n"
+"si vous le pouvez. Les ports à transférer peuvent être trouvés sur la \n"
+"Configuration réseau I2P dans la console du routeur. Si, pour "
+"transférer des ports, de l'aide vous est nécessaire,\n"
+"le site web portforward.com pourra"
+" vous être utile."
#: i2p2www/pages/downloads/debian.html:175
msgid ""
"Please review and adjust the bandwidth settings on the\n"
"configuration page,\n"
-"as the default settings of 96 KB/s down / 40 KB/s up are fairly conservative."
-msgstr "Vérifiez et ajustez les paramètres de bande passante dans la\npage de configuration,\ncar les paramètres par défaut de 96 KB/s down / 40 KB/s up sont plutôt restrictifs."
+"as the default settings of 96 KB/s down / 40 KB/s up are fairly "
+"conservative."
+msgstr ""
+"Vérifiez et ajustez les paramètres de bande passante dans la\n"
+"page de configuration,\n"
+"car les paramètres par défaut de 96 KB/s down / 40 KB/s up sont plutôt "
+"restrictifs."
#: i2p2www/pages/downloads/debian.html:181
#: i2p2www/pages/downloads/post-install.html:34
#, python-format
msgid ""
"If you want to reach eepsites via your browser, have a look on the browser proxy setup page for an easy howto."
-msgstr "Si vous voulez consulter des sites eep via votre navigateur, jettez un coup d'oeil à la page configuration du navigateur pour de plus amples informations."
+"href=\"%(browserconfig)s\">browser proxy setup page for an easy "
+"howto."
+msgstr ""
+"Si vous voulez consulter des sites eep via votre navigateur, jettez un "
+"coup d'oeil à la page configuration du "
+"navigateur pour de plus amples informations."
#: i2p2www/pages/downloads/list.html:2 i2p2www/pages/downloads/select.html:12
#: i2p2www/pages/global/nav.html:3
@@ -296,7 +397,19 @@ msgid ""
"java -jar i2pinstall_%(i2pversion)s.jar
in a terminal to run the\n"
+" type java -jar i2pinstall_%(i2pversion)s.jar
in a "
+"terminal to run the\n"
" installer.\n"
" You may be able to right-click and select\n"
" "Open with Java"."
-msgstr "Téléchargez ce fichier et double-cliquez dessus (si cela fonctionne) ou\ntapez java -jar i2pinstall_%(i2pversion)s.jar
dans un terminal pour exécuter\nl'installateur. \nVous pourrez peut-être faire un clic droit et sélectionner\n"Ouvrir avec Java"."
+msgstr ""
+"Téléchargez ce fichier et double-cliquez dessus (si cela fonctionne) ou\n"
+"tapez java -jar i2pinstall_%(i2pversion)s.jar
dans un "
+"terminal pour exécuter\n"
+"l'installateur. \n"
+"Vous pourrez peut-être faire un clic droit et sélectionner\n"
+""Ouvrir avec Java"."
#: i2p2www/pages/downloads/list.html:77 i2p2www/pages/downloads/list.html:109
msgid "Command line (headless) install:"
@@ -336,25 +456,41 @@ msgstr "Installation en ligne de commande (headless) :"
#, python-format
msgid ""
"Download the %(i2pversion)s OSX graphical installer file above and\n"
-" run java -jar i2pinstall_%(i2pversion)s.jar -console
from the command line."
-msgstr "Télécharger la %(i2pversion)s installeur graphique OSX ci-dessus et\nexécuter java-jar i2pinstall_%(i2pversion)s.jar -console
à partir de la ligne de commande."
+" run java -jar i2pinstall_%(i2pversion)s.jar -console
"
+"from the command line."
+msgstr ""
+"Télécharger la %(i2pversion)s installeur graphique OSX ci-dessus et\n"
+"exécuter java-jar i2pinstall_%(i2pversion)s.jar -console
à "
+"partir de la ligne de commande."
#: i2p2www/pages/downloads/list.html:101
#, python-format
msgid ""
"Download that file and double-click it (if that works) or\n"
-" type java -jar i2pinstall_%(i2pversion)s.jar
in a terminal to run the\n"
+" type java -jar i2pinstall_%(i2pversion)s.jar
in a "
+"terminal to run the\n"
" installer.\n"
" On some platforms you may be able to right-click and select\n"
" "Open with Java"."
-msgstr "Téléchargez ce fichier puis double-cliquez le (si cela marche) ou\ntapez java -jar i2pinstall_%(i2pversion)s.jar
dans un terminal ou lancez\nl'installeur.\nSur certaines plateformes vous pourriez pouvoir faire clic droit et sélectionner\n "Ouvrir avec Java"."
+msgstr ""
+"Téléchargez ce fichier puis double-cliquez le (si cela marche) ou\n"
+"tapez java -jar i2pinstall_%(i2pversion)s.jar
dans un "
+"terminal ou lancez\n"
+"l'installeur.\n"
+"Sur certaines plateformes vous pourriez pouvoir faire clic droit et "
+"sélectionner\n"
+" "Ouvrir avec Java"."
#: i2p2www/pages/downloads/list.html:110
#, python-format
msgid ""
"Download the graphical installer file above and\n"
-" run java -jar i2pinstall_%(i2pversion)s.jar -console
from the command line."
-msgstr "Téléchargez l'installateur graphique depuis ci-dessus et\nlancez java -jar i2pinstall_%(i2pversion)s.jar -console
depuis la ligne de commande."
+" run java -jar i2pinstall_%(i2pversion)s.jar -console
"
+"from the command line."
+msgstr ""
+"Téléchargez l'installateur graphique depuis ci-dessus et\n"
+"lancez java -jar i2pinstall_%(i2pversion)s.jar -console
"
+"depuis la ligne de commande."
#: i2p2www/pages/downloads/list.html:123
msgid "Packages for Debian & Ubuntu are available."
@@ -379,15 +515,22 @@ msgstr "eepsite de str4d"
#: i2p2www/pages/downloads/list.html:155
msgid ""
-"The I2P Android app is in development and does NOT currently provide strong "
-"anonymity."
-msgstr "L'application I2P sous Android est en cours de développement et ne fournit actuellement PAS un anonymat fort."
+"The I2P Android app is in development and does NOT currently provide "
+"strong anonymity."
+msgstr ""
+"L'application I2P sous Android est en cours de développement et ne "
+"fournit actuellement PAS un anonymat fort."
#: i2p2www/pages/downloads/list.html:158
msgid ""
"Requires Android 2.3 (Gingerbread) or higher. If you earlier installed\n"
-" I2P, you need to reinstall because we have also changed the release keys."
-msgstr "Nécessite Android 2.3 (Gingerbread) ou plus récente. Si vous avez installé\nI2P précédemment, vous devez le résinstaller parce que nous avons aussi\nchangé les clés de release."
+" I2P, you need to reinstall because we have also changed the release"
+" keys."
+msgstr ""
+"Nécessite Android 2.3 (Gingerbread) ou plus récente. Si vous avez "
+"installé\n"
+"I2P précédemment, vous devez le résinstaller parce que nous avons aussi\n"
+"changé les clés de release."
#: i2p2www/pages/downloads/list.html:162
msgid "512 MB RAM minimum; 1 GB recommended."
@@ -396,9 +539,15 @@ msgstr "512 Mo de RAM minimum; 1 Go recommandé."
#: i2p2www/pages/downloads/list.html:165
msgid ""
"The release and dev versions of the I2P APK are not compatible, as they\n"
-" are signed by zzz and str4d respectively. Uninstall one before installing\n"
+" are signed by zzz and str4d respectively. Uninstall one before "
+"installing\n"
" the other."
-msgstr "Les versions release et dev des APK de I2P ne sont pas compatibles, car elles\nsont signées respectivement par zzz et str4d. Désinstallez l'une avant d'installer\nl'autre."
+msgstr ""
+"Les versions release et dev des APK de I2P ne sont pas compatibles, car "
+"elles\n"
+"sont signées respectivement par zzz et str4d. Désinstallez l'une avant "
+"d'installer\n"
+"l'autre."
#: i2p2www/pages/downloads/list.html:176
msgid "Source package"
@@ -407,28 +556,49 @@ msgstr "À partir des sources :"
#: i2p2www/pages/downloads/list.html:190
#, python-format
msgid ""
-"Alternately, you can fetch the source from monotone\n"
-" or via Git from git.repo.i2p or Github.\n"
+"Alternately, you can fetch the source from monotone\n"
+" or via Git from git.repo.i2p or Github.\n"
" (tar xjvf i2psource_%(i2pversion)s.tar.bz2 ; cd i2p-%(i2pversion)s ; ant pkg)
then either\n"
+" Run (tar xjvf i2psource_%(i2pversion)s.tar.bz2 ; cd "
+"i2p-%(i2pversion)s ; ant pkg)
then either\n"
" run the GUI installer or headless install as above."
-msgstr "Aussi, vous pouvez récupérer le source depuis monotone\n ou via Git depuis git.repo.i2p ou Github.\n(tar xjvf i2psource_%(i2pversion)s.tar.bz2 ; cd i2p-%(i2pversion)s ; ant pkg)
puis soit\n lancez l'installeur GUI ou l'installation facile comme ci-dessus."
+msgstr ""
+"Aussi, vous pouvez récupérer le source depuis monotone\n"
+" ou via Git depuis git.repo.i2p ou Github.\n"
+"(tar xjvf i2psource_%(i2pversion)s.tar.bz2 ; cd "
+"i2p-%(i2pversion)s ; ant pkg)
puis soit\n"
+" lancez l'installeur GUI ou l'installation facile comme ci-dessus."
#: i2p2www/pages/downloads/list.html:200
#, python-format
msgid ""
-"Android source is in monotone\n"
+"Android source is in monotone\n"
" and on Github.\n"
" Android builds require the I2P source.\n"
-" See the documentation in the Android source for additional build requirements and instructions."
-msgstr "Le source Android est dans monotone\net dans Github.\nLes constructions Android nécessitent le source d'I2P.\nVoir la documentation dans le source Android pour des instructions, et des informations supplémentaires d'exigences de construction."
+" See the documentation in the Android source for additional build "
+"requirements and instructions."
+msgstr ""
+"Le source Android est dans monotone\n"
+"et dans Github.\n"
+"Les constructions Android nécessitent le source d'I2P.\n"
+"Voir la documentation dans le source Android pour des instructions, et "
+"des informations supplémentaires d'exigences de construction."
#: i2p2www/pages/downloads/list.html:212
#, python-format
msgid ""
"The files are signed by zzz,\n"
"whose key is here."
-msgstr "Les fichiers sont signés par zzz,\ndont la clé est ici."
+msgstr ""
+"Les fichiers sont signés par zzz,\n"
+"dont la clé est ici."
#: i2p2www/pages/downloads/list.html:220
msgid "Updates from earlier releases:"
@@ -436,7 +606,9 @@ msgstr "Mises à jour depuis une version antérieure :"
#: i2p2www/pages/downloads/list.html:222
msgid "Both automatic and manual upgrades are available for the release."
-msgstr "Les mises à jour automatiques et manuelles sont disponibles pour la version."
+msgstr ""
+"Les mises à jour automatiques et manuelles sont disponibles pour la "
+"version."
#: i2p2www/pages/downloads/list.html:228
msgid "Automatic updates"
@@ -445,48 +617,84 @@ msgstr "Mises à jour automatiques"
#: i2p2www/pages/downloads/list.html:231
msgid ""
"If you are running 0.7.5 or later, your router should detect the\n"
-"new release. To upgrade simply click the 'Download Update' button on your router console\n"
+"new release. To upgrade simply click the 'Download Update' button on your"
+" router console\n"
"when it appears."
-msgstr "Si vous utilisez la version 0.7.5 ou ultérieure, votre routeur devrait détecter la\nnouvelle version. Pour mettre à niveau il suffit de cliquer sur le bouton 'Télécharger mise à jour' sur la console du routeur quand il apparaîtra."
+msgstr ""
+"Si vous utilisez la version 0.7.5 ou ultérieure, votre routeur devrait "
+"détecter la\n"
+"nouvelle version. Pour mettre à niveau il suffit de cliquer sur le bouton"
+" 'Télécharger mise à jour' sur la console du routeur quand il apparaîtra."
#: i2p2www/pages/downloads/list.html:237
msgid ""
-"Due to a bug in release 0.7.6, those whose first I2P installation was that version\n"
+"Due to a bug in release 0.7.6, those whose first I2P installation was "
+"that version\n"
"and have not upgraded manually\n"
-"may get a \"downloaded version is not greater than current version\" error,\n"
+"may get a \"downloaded version is not greater than current version\" "
+"error,\n"
"and should use the manual update method below."
-msgstr "En raison d'un bug dans la version 0.7.6, si cette version a été la première à être installée ou si elle a été mise à jour automatiquement, vous pouvez obtenir l'erreur : \"la version téléchargée n'est pas supérieure à la version actuelle\". \nDans ce cas veuillez utiliser la méthode de mise à jour manuelle décrite ci-dessous."
+msgstr ""
+"En raison d'un bug dans la version 0.7.6, si cette version a été la "
+"première à être installée ou si elle a été mise à jour automatiquement, "
+"vous pouvez obtenir l'erreur : \"la version téléchargée n'est pas "
+"supérieure à la version actuelle\". \n"
+"Dans ce cas veuillez utiliser la méthode de mise à jour manuelle décrite "
+"ci-dessous."
#: i2p2www/pages/downloads/list.html:245
#, python-format
msgid ""
"If you are running 0.7.4 or earlier, please see\n"
"the 0.7.5 release notes\n"
-"for important information about how to configure your router to automatically\n"
+"for important information about how to configure your router to "
+"automatically\n"
"receive the release."
-msgstr "Si vous utilisez la version 0.7.4 ou antérieure, veuillez consulter\nles notes de version de la 0.7.5 \npour obtenir des informations importantes sur la façon de configurer votre routeur afin de \nrecevoir automatiquement les mises à jour."
+msgstr ""
+"Si vous utilisez la version 0.7.4 ou antérieure, veuillez consulter\n"
+"les notes de version de la 0.7.5 \n"
+"pour obtenir des informations importantes sur la façon de configurer "
+"votre routeur afin de \n"
+"recevoir automatiquement les mises à jour."
#: i2p2www/pages/downloads/list.html:253
#, python-format
msgid ""
"If you are running 0.6.1.30 or earlier, please see\n"
"instructions\n"
-"for important information about how to configure your router to automatically\n"
+"for important information about how to configure your router to "
+"automatically\n"
"receive the release."
-msgstr "Si vous utilisez la version 0.6.1.30 ou antérieure, veuillez lire les\ninstructions \npour obtenir des informations importantes sur la façon de configurer votre routeur afin de \nrecevoir automatiquement les mises à jour."
+msgstr ""
+"Si vous utilisez la version 0.6.1.30 ou antérieure, veuillez lire les\n"
+"instructions \n"
+"pour obtenir des informations importantes sur la façon de configurer "
+"votre routeur afin de \n"
+"recevoir automatiquement les mises à jour."
#: i2p2www/pages/downloads/list.html:262
#, python-format
msgid ""
-"If you have reconfigured your router following the instructions, you should see a link on your \n"
-" router console allowing\n"
+"If you have reconfigured your router following the instructions, you should see a link on your"
+" \n"
+" router console "
+"allowing\n"
" you to download and install the new release by just clicking on that\n"
" link."
-msgstr "Si vous avez reconfiguré votre routeur en suivant les instructions, vous devriez voir un lien sur votre\n console du routeur vous permettant\nde télécharger et d'installer la nouvelle version d'un simple clic."
+msgstr ""
+"Si vous avez reconfiguré votre routeur en suivant les instructions, vous devriez voir un lien sur"
+" votre\n"
+" console du routeur vous "
+"permettant\n"
+"de télécharger et d'installer la nouvelle version d'un simple clic."
#: i2p2www/pages/downloads/list.html:270
msgid "Alternately, you can use the manual method specified below."
-msgstr "Comme alternative, vous pouvez utiliser la méthode manuelle décrite ci-dessous."
+msgstr ""
+"Comme alternative, vous pouvez utiliser la méthode manuelle décrite ci-"
+"dessous."
#: i2p2www/pages/downloads/list.html:281
msgid "Manual updates"
@@ -496,14 +704,24 @@ msgstr "Mises à jour manuelles"
msgid ""
"Download that file to your I2P\n"
" installation directory and rename as i2pupdate.zip.\n"
-" (alternately, you can get the source as above and run \"ant updater\", then copy the\n"
-" resulting i2pupdate.zip to your I2P installation directory). You do \n"
+" (alternately, you can get the source as above and run \"ant "
+"updater\", then copy the\n"
+" resulting i2pupdate.zip to your I2P installation directory). You do"
+" \n"
" NOT need to unzip that file."
-msgstr "Téléchargez ce fichier dans le répertoire d'installation\nd'I2P puis renommez-le en i2pupdate.zip .\n(alternativement, vous pouvez obtenir le code source ci-dessus et exécuter \"ant updater\", puis copier le fichier i2pupdate.zip généré le répertoire d'installation d'I2P). Il ne faut\nPAS décompresser ce fichier."
+msgstr ""
+"Téléchargez ce fichier dans le répertoire d'installation\n"
+"d'I2P puis renommez-le en i2pupdate.zip .\n"
+"(alternativement, vous pouvez obtenir le code source ci-dessus et "
+"exécuter \"ant updater\", puis copier le fichier i2pupdate.zip généré le "
+"répertoire d'installation d'I2P). Il ne faut\n"
+"PAS décompresser ce fichier."
#: i2p2www/pages/downloads/list.html:306
msgid "Click \"Restart\""
-msgstr "Cliquez sur \"Redémarrer\""
+msgstr ""
+"Cliquez sur \"Redémarrer\""
#: i2p2www/pages/downloads/list.html:311
msgid "Grab a cup of coffee and come back in 11 minutes"
@@ -514,7 +732,9 @@ msgstr "Prenez une tasse de café et revenez dans 11 minutes"
msgid ""
"The file is signed by zzz,\n"
"whose key is here."
-msgstr "Le fichier est signé par zzz,\ndont la clé est ici."
+msgstr ""
+"Le fichier est signé par zzz,\n"
+"dont la clé est ici."
#: i2p2www/pages/downloads/list.html:324
msgid "Previous Releases"
@@ -523,46 +743,90 @@ msgstr "Versions précédentes"
#: i2p2www/pages/downloads/list.html:326
#, python-format
msgid ""
-"Previous releases are available on Google Code\n"
+"Previous releases are available on Google "
+"Code\n"
"and Launchpad\n"
-"and within the I2P network on %(echelon)s."
-msgstr "Les versions précédentes sont disponibles sur Google Code\net Launchpad\net via le réseau I2P sur %(echelon)s."
+"and within the I2P network on %(echelon)s."
+msgstr ""
+"Les versions précédentes sont disponibles sur Google "
+"Code\n"
+"et Launchpad\n"
+"et via le réseau I2P sur %(echelon)s."
#: i2p2www/pages/downloads/post-install.html:3
msgid ""
-"After running the installer on windows, simply click on the \"Start I2P\" button\n"
-"which will bring up the router console,\n"
+"After running the installer on windows, simply click on the \"Start I2P\""
+" button\n"
+"which will bring up the router console,\n"
"which has further instructions."
-msgstr "Après avoir exécuté le programme d'installation sur Windows, cliquez sur le bouton \"Start I2P\"\nce qui fera apparaître la console du routeur,\nqui contient des instructions supplémentaires."
+msgstr ""
+"Après avoir exécuté le programme d'installation sur Windows, cliquez sur "
+"le bouton \"Start I2P\"\n"
+"ce qui fera apparaître la console du routeur,\n"
+"qui contient des instructions supplémentaires."
#: i2p2www/pages/downloads/post-install.html:9
msgid ""
"On Unix-like systems, I2P can be started as a service\n"
-"using the \"i2prouter\" script, located in the directory you selected for I2P.\n"
-"Changing to that directory in a console and issuing \"sh i2prouter status\"\n"
-"should tell you the router's status. The arguments \"start\", \"stop\" and \"restart\"\n"
-"control the service. The router console\n"
+"using the \"i2prouter\" script, located in the directory you selected for"
+" I2P.\n"
+"Changing to that directory in a console and issuing \"sh i2prouter "
+"status\"\n"
+"should tell you the router's status. The arguments \"start\", \"stop\" "
+"and \"restart\"\n"
+"control the service. The router console\n"
"can be accessed at its usual location.\n"
-"For users on OpenSolaris and other systems for which the wrapper (i2psvc) is not supported,\n"
+"For users on OpenSolaris and other systems for which the wrapper (i2psvc)"
+" is not supported,\n"
"start the router with \"sh runplain.sh\" instead."
-msgstr "Sur les systèmes Unix, I2P peut être lancé en tant que service\nen utilisant le script \"i2prouter\", situé dans le répertoire d'installation de I2P.\nDans ce même répertoire, la commande \"sh i2prouter status\" vous indiquera l'état du routeur. Les arguments \"start\", \"stop\" et \"restart\" contrôlent le service. La console du routeur est accessible à son adresse habituelle.\nPour les utilisateurs d'OpenSolaris et d'autres systèmes pour lesquels le wrapper (i2psvc) n'est pas supporté, démarrez le routeur avec la commande \"sh runplain.sh\"."
+msgstr ""
+"Sur les systèmes Unix, I2P peut être lancé en tant que service\n"
+"en utilisant le script \"i2prouter\", situé dans le répertoire "
+"d'installation de I2P.\n"
+"Dans ce même répertoire, la commande \"sh i2prouter status\" vous "
+"indiquera l'état du routeur. Les arguments \"start\", \"stop\" et "
+"\"restart\" contrôlent le service. La console du routeur est "
+"accessible à son adresse habituelle.\n"
+"Pour les utilisateurs d'OpenSolaris et d'autres systèmes pour lesquels le"
+" wrapper (i2psvc) n'est pas supporté, démarrez le routeur avec la "
+"commande \"sh runplain.sh\"."
#: i2p2www/pages/downloads/post-install.html:20
#, python-format
msgid ""
-"When installing for the first time, please remember to adjust your NAT/firewall\n"
+"When installing for the first time, please remember to adjust your "
+"NAT/firewall\n"
"if you can, bearing in mind the Internet-facing ports I2P uses,\n"
"described here among other ports.\n"
-"If you have successfully opened your port to inbound TCP, also enable inbound TCP on the\n"
+"If you have successfully opened your port to inbound TCP, also enable "
+"inbound TCP on the\n"
"configuration page."
-msgstr "Lorsque vous installez pour la première fois, veuillez, si vous le pouvez, régler votre NAT/pare-feu, en fonction des ports externes utilisés par I2P, décrits ici.\nSi vous avez ouvert avec succès votre port TCP au traffic entrant, activez le également sur la page de configuration."
+msgstr ""
+"Lorsque vous installez pour la première fois, veuillez, si vous le "
+"pouvez, régler votre NAT/pare-feu, en fonction des ports externes "
+"utilisés par I2P, décrits ici.\n"
+"Si vous avez ouvert avec succès votre port TCP au traffic entrant, "
+"activez le également sur la page de configuration."
#: i2p2www/pages/downloads/post-install.html:28
msgid ""
"Also, please review and adjust the bandwidth settings on the\n"
"configuration page,\n"
"as the default settings of 96 KBps down / 40 KBps up are fairly slow."
-msgstr "Pensez également à ajuster les paramètres de bande passante sur la\npage de configuration,\ncar les paramètres par défaut (96 kbps down / 40 kbps up) sont assez lents."
+msgstr ""
+"Pensez également à ajuster les paramètres de bande passante sur la"
+"\n"
+"page de configuration,\n"
+"car les paramètres par défaut (96 kbps down / 40 kbps up) sont assez "
+"lents."
#: i2p2www/pages/downloads/redirect.html:2
msgid "Downloading..."
@@ -573,7 +837,9 @@ msgstr "Téléchargement ..."
msgid ""
"Your download will begin shortly. If it doesn't start within 5 seconds, "
"click here."
-msgstr "Votre téléchargement commencera bientôt. S'il ne commence pas dans les 5 secondes, cliquez ici."
+msgstr ""
+"Votre téléchargement commencera bientôt. S'il ne commence pas dans les 5 "
+"secondes, cliquez ici."
#: i2p2www/pages/downloads/select.html:2 i2p2www/pages/downloads/select.html:4
msgid "Mirror selection"
@@ -591,15 +857,25 @@ msgstr "N'importe quel miroir"
msgid ""
"To claim the bounty the author must not be paid by other organizations\n"
"or teams for this work (e.g. GSoC students are not valid)."
-msgstr "Pour prétendre à une récompense, l'auteur ne doit pas être payé par d'autres organisations\nou équipes pour ce travail (e.g. les étudiants GSoC ne sont pas élligibles)."
+msgstr ""
+"Pour prétendre à une récompense, l'auteur ne doit pas être payé par "
+"d'autres organisations\n"
+"ou équipes pour ce travail (e.g. les étudiants GSoC ne sont pas "
+"élligibles)."
#: i2p2www/pages/global/bounty.html:29
#, python-format
msgid ""
"Bounty amounts may be increased by further donations. Do\n"
-"you think these are important? Add in your donation, \n"
+"you think these are important? Add in your "
+"donation, \n"
"marking the amount for the %(donatename)s bounty!"
-msgstr "Le montant des récompenses peut être augmenté par de nouveaux dons. Pensez-\nvous qu'elles soient suffisantes ? Ajoutez-y votre donation,\nen spécifiant le montant à consacrer pour les %(donatename)s récompenses !"
+msgstr ""
+"Le montant des récompenses peut être augmenté par de nouveaux dons. "
+"Pensez-\n"
+"vous qu'elles soient suffisantes ? Ajoutez-y votre"
+" donation,\n"
+"en spécifiant le montant à consacrer pour les %(donatename)s récompenses !"
#: i2p2www/pages/global/error_404.html:3
msgid "Not found"
@@ -607,9 +883,11 @@ msgstr "Pas trouvé"
#: i2p2www/pages/global/error_404.html:9
msgid ""
-"Yep... the resource, you were searching for, is named differently, doesn't "
-"exist or was removed."
-msgstr "Oui... la ressource que vous cherchiez est nommée différemment, n'existe pas, ou a été supprimée."
+"Yep... the resource, you were searching for, is named differently, "
+"doesn't exist or was removed."
+msgstr ""
+"Oui... la ressource que vous cherchiez est nommée différemment, n'existe "
+"pas, ou a été supprimée."
#: i2p2www/pages/global/error_500.html:5
msgid "Server error"
@@ -676,7 +954,9 @@ msgstr "The Invisible Internet Project"
msgid ""
"This page was last updated in %(lastupdated)s and is accurate for router "
"version %(accuratefor)s."
-msgstr "Cette page a été mise à jour en %(lastupdated)s et est valide pour la version de routeur %(accuratefor)s."
+msgstr ""
+"Cette page a été mise à jour en %(lastupdated)s et est valide pour la "
+"version de routeur %(accuratefor)s."
#: i2p2www/pages/global/layout.html:64
#, python-format
@@ -1007,17 +1287,28 @@ msgstr "Flux ATOM des réunions I2P"
#: i2p2www/pages/meetings/index.html:7
#, python-format
msgid ""
-"We do not currently have regularly scheduled meetings. Anyone can schedule and\n"
+"We do not currently have regularly scheduled meetings. Anyone can "
+"schedule and\n"
"run a meeting, by posting the agenda in\n"
"the meetings forum."
-msgstr "Nous n'avons actuellement pas de réunions régulièrement prévues. Chacun peut prévoir et\ndiriger une réunion, en postant l'ordre du jour dans\nle forum meetings."
+msgstr ""
+"Nous n'avons actuellement pas de réunions régulièrement prévues. Chacun "
+"peut prévoir et\n"
+"diriger une réunion, en postant l'ordre du jour dans\n"
+"le forum meetings."
#: i2p2www/pages/meetings/index.html:13
#, python-format
msgid ""
-"If you have something to discuss, please find the developers on IRC in #i2p-dev.\n"
-"Status updates from developers are also available."
-msgstr "Si vous voulez discuter de quelque chose, vous trouverez les développeurs sur IRC dans #I2P-dev. \nLe statut des mises à jour des développeurs est également disponibles."
+"If you have something to discuss, please find the developers on IRC in "
+"#i2p-dev.\n"
+"Status updates from developers are also "
+"available."
+msgstr ""
+"Si vous voulez discuter de quelque chose, vous trouverez les développeurs"
+" sur IRC dans #I2P-dev. \n"
+"Le statut des mises à jour des développeurs"
+" est également disponibles."
#: i2p2www/pages/meetings/show.html:2
#, python-format
@@ -1049,14 +1340,23 @@ msgid ""
"BibTeX source page for examples.libm.so.4
!"
-msgstr "J'utilise FreeBSD et quand je lance I2P, je reçois une erreur concernant libm.so.4
!"
+msgstr ""
+"J'utilise FreeBSD et quand je lance I2P, je reçois une erreur concernant "
+"libm.so.4
!"
#: i2p2www/pages/site/faq.html:48
msgid ""
"In wrapper.log
I see an error stating Protocol family "
"unavailable
when I2P is loading"
-msgstr "Dans wrapper.log
je vois une erreur indiquant Protocol family unavailable
lorsque I2P se lance"
+msgstr ""
+"Dans wrapper.log
je vois une erreur indiquant Protocol"
+" family unavailable
lorsque I2P se lance"
#: i2p2www/pages/site/faq.html:52 i2p2www/pages/site/faq.html:63
#: i2p2www/pages/site/faq.html:80 i2p2www/pages/site/faq.html:109
@@ -1366,19 +1728,29 @@ msgstr "lien"
#, python-format
msgid ""
"While I2P has been reported to run PCs as meagre as a low-end Pentium II "
-"with 64 MB of RAM, you'll have a much better experience on a Pentium III (or"
-" better) with 128MB of RAM (or more). A chart "
+"with 64 MB of RAM, you'll have a much better experience on a Pentium III "
+"(or better) with 128MB of RAM (or more). A chart "
"comparing the performance of the various JREs can be found at %(chart)s, but in short: it's at all possible, use "
-"Sun/Oracle Java or OpenJDK."
-msgstr "Bien qu'I2P soit capable de fonctionner sur un PC aux performances modestes, tel qu'un Pentium II avec 64 Mo de RAM, vous aurez une bien meilleure expérience sur une plateforme de type Pentium III (ou mieux) avec 128 Mo de RAM (ou plus). Un graphique comparant la performance des divers JREs est disponible là, %(chart)s, mais en bref : tout est possible, utilisez Sun/Oracle Java ou OpenJDK."
+"href=\"%(chart)s\">%(chart)s, but in short: it's at all possible, use"
+" Sun/Oracle Java or OpenJDK."
+msgstr ""
+"Bien qu'I2P soit capable de fonctionner sur un PC aux performances "
+"modestes, tel qu'un Pentium II avec 64 Mo de RAM, vous aurez une bien "
+"meilleure expérience sur une plateforme de type Pentium III (ou mieux) "
+"avec 128 Mo de RAM (ou plus). Un graphique "
+"comparant la performance des divers JREs est disponible là, %(chart)s, mais en bref : tout est possible, "
+"utilisez Sun/Oracle Java ou OpenJDK."
#: i2p2www/pages/site/faq.html:57
msgid ""
"I2P has been tested on Windows, Linux, FreeBSD (see the note below), OSX, and OpenSolaris. There is work underway "
-"to bring I2P to the Android platform."
-msgstr "I2P a été testé sur Windows, Linux, FreeBSD (voir la note ci-dessous), OSX, et OpenSolaris. Il y a des travaux en cours pour porter I2P sur la plate-forme Android."
+"href=\"#compat6x\">below), OSX, and OpenSolaris. There is work "
+"underway to bring I2P to the Android platform."
+msgstr ""
+"I2P a été testé sur Windows, Linux, FreeBSD (voir la note ci-dessous), OSX, et OpenSolaris. Il y a des "
+"travaux en cours pour porter I2P sur la plate-forme Android."
#: i2p2www/pages/site/faq.html:65
msgid "Here are some places, pick one or more."
@@ -1389,30 +1761,63 @@ msgid "Discuss with the developers on IRC in #i2p-dev"
msgstr "Discutez avec les développeurs sur IRC dans #I2P-dev"
#: i2p2www/pages/site/faq.html:75
-msgid ""
-"Please include relevant information from the router logs and wrapper logs."
-msgstr "Veuillez inclure des informations pertinentes issues des journaux du routeur et d'encapsulation (wrapper logs)."
+msgid "Please include relevant information from the router logs and wrapper logs."
+msgstr ""
+"Veuillez inclure des informations pertinentes issues des journaux du "
+"routeur et d'encapsulation (wrapper logs)."
#: i2p2www/pages/site/faq.html:81
msgid ""
-"The default subscription is to http://www.i2p2.i2p/hosts.txt which is updated rarely.\n"
-"If you don't have another subscription, you may often have to use \"jump\" links which\n"
+"The default subscription is to http://www.i2p2.i2p/hosts.txt which is "
+"updated rarely.\n"
+"If you don't have another subscription, you may often have to use "
+"\"jump\" links which\n"
"is annoying."
-msgstr "L'abonnement par défaut est http://www.i2p2.i2p/hosts.txt qui est rarement mis à jour.\nSi vous n'avez pas d'autre abonnement, vous risquez d'avoir souvent à utiliser des liens «jump»\nce qui est ennuyeux."
+msgstr ""
+"L'abonnement par défaut est http://www.i2p2.i2p/hosts.txt qui est "
+"rarement mis à jour.\n"
+"Si vous n'avez pas d'autre abonnement, vous risquez d'avoir souvent à "
+"utiliser des liens «jump»\n"
+"ce qui est ennuyeux."
#: i2p2www/pages/site/faq.html:87
msgid ""
-"Here are some other public addressbook subscription links. You may wish to add one or two\n"
-"to your susidns subscription list.\n"
-"You don't need to add all of them, as they sync with each other periodically.\n"
-"The links using a cgi-bin application employ various strategies to minimize\n"
-"the number of duplicate addresses delivered, so they should be more efficient.\n"
-"Note that subscribing to a hosts.txt service is an act of \"trust\", as a malicious\n"
-"subscription could give you incorrect addresses. So think about whether you\n"
+"Here are some other public addressbook subscription links. You may wish "
+"to add one or two\n"
+"to your susidns "
+"subscription list.\n"
+"You don't need to add all of them, as they sync with each other "
+"periodically.\n"
+"The links using a cgi-bin application employ various strategies to "
+"minimize\n"
+"the number of duplicate addresses delivered, so they should be more "
+"efficient.\n"
+"Note that subscribing to a hosts.txt service is an act of \"trust\", as a"
+" malicious\n"
+"subscription could give you incorrect addresses. So think about whether "
+"you\n"
"want to trust any of these.\n"
-"The operators of these services may have various policies for listing hosts.\n"
+"The operators of these services may have various policies for listing "
+"hosts.\n"
"Presence on this list does not imply endorsement."
-msgstr "Voici quelques liens d'abonnement de carnet d'adresses publiques. Vous pourriez vouloir en ajouter un ou deux \nà votre liste de souscription susidns. \nVous n'avez pas besoin de tous les ajouter, car ils se synchronisent mutuellement à intervalles réguliers. \nLes liens utilisant une application cgi-bin emploient diverses stratégies pour réduire \nle nombre d'adresses dupliquées, et devraient donc être plus efficace. \nNotez que l'abonnement à un service de hosts.txt requiert votre «confiance», car un\nabonnement malveillant pourrait vous transmettre des adresses incorrectes. Réfléchissez bien à la confiance que vous leur accordez.\nLes opérateurs de ces services peuvent avoir diverses politiques pour lister des hôtes.\nLa présence sur cette liste n'implique pas un quelconque soutien."
+msgstr ""
+"Voici quelques liens d'abonnement de carnet d'adresses publiques. Vous "
+"pourriez vouloir en ajouter un ou deux \n"
+"à votre liste"
+" de souscription susidns. \n"
+"Vous n'avez pas besoin de tous les ajouter, car ils se synchronisent "
+"mutuellement à intervalles réguliers. \n"
+"Les liens utilisant une application cgi-bin emploient diverses stratégies"
+" pour réduire \n"
+"le nombre d'adresses dupliquées, et devraient donc être plus efficace. \n"
+"Notez que l'abonnement à un service de hosts.txt requiert votre "
+"«confiance», car un\n"
+"abonnement malveillant pourrait vous transmettre des adresses "
+"incorrectes. Réfléchissez bien à la confiance que vous leur accordez.\n"
+"Les opérateurs de ces services peuvent avoir diverses politiques pour "
+"lister des hôtes.\n"
+"La présence sur cette liste n'implique pas un quelconque soutien."
#: i2p2www/pages/site/faq.html:110
msgid ""
@@ -1421,14 +1826,26 @@ msgid ""
"We do not know if or when jrandom will return.\n"
"The *.i2p.net domains were left in a non-functioning state after a power\n"
"outage at the hosting company."
-msgstr "Jrandom était le principal développeur de I2P et\nde Syndie durant plusieurs années.\nNous ne savons pas si ou quand jrandom reviendra.\nLes domaines *.i2p.net ont été laissés en état de non-fonctionnement après une panne\nélectrique chez l'hébergeur."
+msgstr ""
+"Jrandom était le principal développeur de I2P et\n"
+"de Syndie durant plusieurs années."
+"\n"
+"Nous ne savons pas si ou quand jrandom reviendra.\n"
+"Les domaines *.i2p.net ont été laissés en état de non-fonctionnement "
+"après une panne\n"
+"électrique chez l'hébergeur."
#: i2p2www/pages/site/faq.html:118
#, python-format
msgid ""
-"See this page for jrandom's parting message and additional information\n"
+"See this page for jrandom's parting message "
+"and additional information\n"
"on the migration of *.i2p.net to this website."
-msgstr "Consultez cette page pour voir le message d'au revoir de jrandom et\nde plus amples informations sur la migration de *.i2p.net vers ce site web."
+msgstr ""
+"Consultez cette page pour voir le message "
+"d'au revoir de jrandom et\n"
+"de plus amples informations sur la migration de *.i2p.net vers ce site web."
#: i2p2www/pages/site/faq.html:123
msgid "I2P remains in active development."
@@ -1436,54 +1853,106 @@ msgstr "I2P reste en développement actif."
#: i2p2www/pages/site/faq.html:127
msgid "There are many possible causes of high CPU usage. Here is a checklist:"
-msgstr "Il y a beaucoup de causes possibles de l'utilisation élevée du processeur. Voici une liste de choses à vérifier :"
+msgstr ""
+"Il y a beaucoup de causes possibles de l'utilisation élevée du "
+"processeur. Voici une liste de choses à vérifier :"
#: i2p2www/pages/site/faq.html:132
msgid ""
-"Try to use either OpenJDK or Sun/Oracle Java if it's available for your system. You can check \n"
-"which version of java you have installed by typing java -version
at a \n"
-"command/shell prompt. Performance tends to suffer with other implementations of java."
-msgstr "Essayez d'utiliser OpenJDK ou Sun/Oracle Java si il est disponible pour votre système. Vous pouvez vérifier\nquelle version de Java vous avez installé en tapant java -version
dans une invite de\ncommande/shell. Les performances ont tendance à être moins bonnes avec d'autres implémentations de Java."
+"Try to use either OpenJDK or Sun/Oracle Java if it's available for your "
+"system. You can check \n"
+"which version of java you have installed by typing java "
+"-version
at a \n"
+"command/shell prompt. Performance tends to suffer with other "
+"implementations of java."
+msgstr ""
+"Essayez d'utiliser OpenJDK ou Sun/Oracle Java si il est disponible pour "
+"votre système. Vous pouvez vérifier\n"
+"quelle version de Java vous avez installé en tapant java "
+"-version
dans une invite de\n"
+"commande/shell. Les performances ont tendance à être moins bonnes avec "
+"d'autres implémentations de Java."
#: i2p2www/pages/site/faq.html:139
msgid ""
-"Are you running a BitTorrent client over I2P? Try reducing the number of torrents, the bandwidth limits,\n"
+"Are you running a BitTorrent client over I2P? Try reducing the number of "
+"torrents, the bandwidth limits,\n"
"or try turning it off completely to see if that helps."
-msgstr "Faites-vous tourner un client BitTorrent sur I2P ? Essayez de réduire le nombre de torrents, \nles limites de bande passante, ou essayez de l'éteindre complètement pour voir si cela aide."
+msgstr ""
+"Faites-vous tourner un client BitTorrent sur I2P ? Essayez de réduire "
+"le nombre de torrents, \n"
+"les limites de bande passante, ou essayez de l'éteindre complètement pour"
+" voir si cela aide."
#: i2p2www/pages/site/faq.html:145
msgid ""
-"Are your bandwidth limits set too high? It is possible that too much traffic is going through your\n"
-"I2P router and it is overloaded. Try reducing the setting for share bandwidth percentage on the configuration page."
-msgstr "Est-ce que vos limites de bande passante sont trop élevées ? Il est possible que trop de trafic passe par votre \nrouteur I2P et qu'il soit surchargé. Essayez de réduire le réglage de pourcentage de bande passante partagée sur la page configuration."
+"Are your bandwidth limits set too high? It is possible that too much "
+"traffic is going through your\n"
+"I2P router and it is overloaded. Try reducing the setting for share "
+"bandwidth percentage on the configuration page."
+msgstr ""
+"Est-ce que vos limites de bande passante sont trop élevées ? Il est "
+"possible que trop de trafic passe par votre \n"
+"routeur I2P et qu'il soit surchargé. Essayez de réduire le réglage de "
+"pourcentage de bande passante partagée sur la page configuration."
#: i2p2www/pages/site/faq.html:150
msgid ""
-"Make sure that you're running the latest version of I2P to get the benefits "
-"of increased performance and bug fixes."
-msgstr "Assurez-vous que vous utilisez la dernière version d'I2P pour profiter des améliorations de performances et des corrections d'anomalies."
+"Make sure that you're running the latest version of I2P to get the "
+"benefits of increased performance and bug fixes."
+msgstr ""
+"Assurez-vous que vous utilisez la dernière version d'I2P pour profiter "
+"des améliorations de performances et des corrections d'anomalies."
#: i2p2www/pages/site/faq.html:155
msgid ""
-"Has enough memory been set aside for use by I2P? Look at the memory graph on the graphs page to see\n"
-"if the memory usage is \"pegged\"—the JVM is spending most of its time in\n"
-"garbage collection. Increase the setting wrapper.java.maxmemory
in the file wrapper.config
."
-msgstr "Est-ce que suffisamment de mémoire a été mise de côté pour l'usage de I2P ? Regardez le graphique de la page graphes pour voir\nsi l'usage mémoire est \"bloqué\" — la JVM passerait la plupart de son temps à faire\ndu ramasse-miettes. Augmentez le réglage wrapper.java.maxmemory
dans le fichier wrapper.config
."
+"Has enough memory been set aside for use by I2P? Look at the memory graph"
+" on the graphs page to see\n"
+"if the memory usage is \"pegged\"—the JVM is spending most of its "
+"time in\n"
+"garbage collection. Increase the setting "
+"wrapper.java.maxmemory
in the file "
+"wrapper.config
."
+msgstr ""
+"Est-ce que suffisamment de mémoire a été mise de côté pour l'usage de I2P"
+" ? Regardez le graphique de la page graphes pour voir\n"
+"si l'usage mémoire est \"bloqué\" — la JVM passerait la plupart de "
+"son temps à faire\n"
+"du ramasse-miettes. Augmentez le réglage "
+"wrapper.java.maxmemory
dans le fichier "
+"wrapper.config
."
#: i2p2www/pages/site/faq.html:162
msgid ""
-"Is the CPU usage simply higher than you would like, or is it pegged at 100% for a long time?\n"
+"Is the CPU usage simply higher than you would like, or is it pegged at "
+"100% for a long time?\n"
"If it's pegged, this could be a bug. Look in the logs for clues."
-msgstr "Est-ce que l'usage du CPU est simplement plus élevé que ce que vous aimeriez, ou est-il rivé à 100% durant longtemps ?\nSi il est rivé, cela pourrait être un bug. Regarder dans les historiques pour des indices."
+msgstr ""
+"Est-ce que l'usage du CPU est simplement plus élevé que ce que vous "
+"aimeriez, ou est-il rivé à 100% durant longtemps ?\n"
+"Si il est rivé, cela pourrait être un bug. Regarder dans les historiques "
+"pour des indices."
#: i2p2www/pages/site/faq.html:168
#, python-format
msgid ""
-"You may be using the Java-based BigInteger library instead of the native version,\n"
-"especially if you are running on a new or unusual OS or hardware (OpenSolaris, mipsel, etc.).\n"
+"You may be using the Java-based BigInteger library instead of the native "
+"version,\n"
+"especially if you are running on a new or unusual OS or hardware "
+"(OpenSolaris, mipsel, etc.).\n"
"See the jbigi page for instructions on\n"
"diagnosing, building, and testing methods."
-msgstr "Vous devriez utiliser la bibliothèque BigInteger au lieu de la version native,\nsurtout si vous utilisez un OS ou du matériel nouveau ou éxotique (OpenSolaris, mipsel, etc.) \nConsultez la page jbigi pour obtenir des instructions sur les méthodes\nde diagnostic, de compilation et de test."
+msgstr ""
+"Vous devriez utiliser la bibliothèque BigInteger au lieu de la version "
+"native,\n"
+"surtout si vous utilisez un OS ou du matériel nouveau ou éxotique "
+"(OpenSolaris, mipsel, etc.) \n"
+"Consultez la page jbigi pour obtenir des "
+"instructions sur les méthodes\n"
+"de diagnostic, de compilation et de test."
#: i2p2www/pages/site/faq.html:176
msgid ""
@@ -1494,183 +1963,386 @@ msgid ""
"share bandwidth on\n"
"confignet.jsp,\n"
"or by setting router.maxParticipatingTunnels=nnn on\n"
-"configadvanced.jsp."
-msgstr "Si votre bibliothèque native jbigi fonctionne correctement, le plus grand consommateur CPU \npeut être le routage du trafic dans les tunnels participants. Cela utilise des ressources CPU\nparce qu'à chaque saut une couche de chiffrement doit être décodée.\nVous pouvez limiter votre participation au trafic de deux façons - en réduisant le\npartage de bande passante sur\nconfignet.jsp,\nou en paramétrant router.maxParticipatingTunnels=nnn sur\nconfigadvanced.jsp."
+"configadvanced.jsp."
+msgstr ""
+"Si votre bibliothèque native jbigi fonctionne correctement, le plus grand"
+" consommateur CPU \n"
+"peut être le routage du trafic dans les tunnels participants. Cela "
+"utilise des ressources CPU\n"
+"parce qu'à chaque saut une couche de chiffrement doit être décodée.\n"
+"Vous pouvez limiter votre participation au trafic de deux façons - en "
+"réduisant le\n"
+"partage de bande passante sur\n"
+"confignet.jsp,\n"
+"ou en paramétrant router.maxParticipatingTunnels=nnn sur\n"
+"configadvanced.jsp."
#: i2p2www/pages/site/faq.html:191
msgid ""
"Hmm. I2P is an anonymous network, so that's a tricky one.\n"
-"I2P is designed to withstand censorship, providing a means for everyone to communicate freely. \n"
-"The best way to keep your PC free of (encrypted) traffic that you dislike is to not use I2P.\n"
+"I2P is designed to withstand censorship, providing a means for everyone "
+"to communicate freely. \n"
+"The best way to keep your PC free of (encrypted) traffic that you dislike"
+" is to not use I2P.\n"
"Freedom of speech has some costs.\n"
"But let's address your question in three parts:"
-msgstr "Hmm, I2P est un réseau anonyme, c'est une question délicate. \nI2P est conçu pour résister à la censure, en fournissant un moyen pour chacun de communiquer librement. \nLa meilleure façon de garder votre PC à l'écart de trafic (crypté) que vous n'aimez pas, est de ne pas utiliser I2P.\nLa liberté d'expression a des coûts.\nMais adressons cette problématique en trois points :"
+msgstr ""
+"Hmm, I2P est un réseau anonyme, c'est une question délicate. \n"
+"I2P est conçu pour résister à la censure, en fournissant un moyen pour "
+"chacun de communiquer librement. \n"
+"La meilleure façon de garder votre PC à l'écart de trafic (crypté) que "
+"vous n'aimez pas, est de ne pas utiliser I2P.\n"
+"La liberté d'expression a des coûts.\n"
+"Mais adressons cette problématique en trois points :"
#: i2p2www/pages/site/faq.html:200
msgid ""
-"Distribution - All traffic on I2P is encrypted in multiple layers. You don't know\n"
+"Distribution - All traffic on I2P is encrypted in multiple layers."
+" You don't know\n"
"a message's contents, source, or destination.\n"
-"All traffic you route is internal to the I2P network, you are not an exit node (outproxy).\n"
+"All traffic you route is internal to the I2P network, you are not an exit node (outproxy).\n"
"Your only alternative is to refuse to route\n"
-"any traffic, by setting your share bandwidth or maximum participating tunnels to 0 (see above).\n"
-"It would be nice if you didn't do this, you should help the network by routing traffic for others.\n"
+"any traffic, by setting your share bandwidth or maximum "
+"participating tunnels to 0 (see above).\n"
+"It would be nice if you didn't do this, you should help the network by "
+"routing traffic for others.\n"
"Over 95% of users route traffic for others."
-msgstr "Distribution - Tout le trafic dans I2P est chiffré dans plusieurs couches. Vous ne savez pas\nle contenu, la source, ou la destination d'un message. \nTout le trafic que votre routez - transmettez - est interne au réseau I2P, vous n'êtes pas un nœud de sortie (outproxy).\nVotre seule alternative est de refuser d'acheminer\ntout trafic, en mettant votre bande passante partagée ou le nombre maximum de tunnels participants à 0 (voir ci-dessus).\nCe serait bien de ne pas le faire, vous devriez aider le réseau en routant du trafic pour les autres.\nPlus de 95% des utilisateurs routent du trafic pour les autres."
+msgstr ""
+"Distribution - Tout le trafic dans I2P est chiffré dans plusieurs "
+"couches. Vous ne savez pas\n"
+"le contenu, la source, ou la destination d'un message. \n"
+"Tout le trafic que votre routez - transmettez - est interne au réseau "
+"I2P, vous n'êtes pas un nœud de sortie (outproxy)."
+"\n"
+"Votre seule alternative est de refuser d'acheminer\n"
+"tout trafic, en mettant votre bande passante partagée ou le nombre"
+" maximum de tunnels participants à 0 (voir ci-dessus).\n"
+"Ce serait bien de ne pas le faire, vous devriez aider le réseau en "
+"routant du trafic pour les autres.\n"
+"Plus de 95% des utilisateurs routent du trafic pour les autres."
#: i2p2www/pages/site/faq.html:211
msgid ""
-"Storage - I2P does not do distributed storage of content. You must be thinking of\n"
+"Storage - I2P does not do distributed storage of content. You must"
+" be thinking of\n"
"Freenet.\n"
"Nobody's content is being stored on your computer by running I2P."
-msgstr "Stockage - I2P n'utilise pas le stockage distribué, comme c'est le cas sur\nFreenet.\nEn exécutant I2P, aucun contenu n'est stocké sur votre ordinateur."
+msgstr ""
+"Stockage - I2P n'utilise pas le stockage distribué, comme c'est le"
+" cas sur\n"
+"Freenet.\n"
+"En exécutant I2P, aucun contenu n'est stocké sur votre ordinateur."
#: i2p2www/pages/site/faq.html:218
msgid ""
-"Access - If there are some eepsites you don't like, don't go there.\n"
+"Access - If there are some eepsites you don't like, don't go "
+"there.\n"
"Or, use a blocking proxy like Privoxy or some type of \"net nanny\"."
-msgstr "Accès - S'il y a des eepsites que vous n'aimez pas, n'y allez pas.\nVous pouvez sinon utilisez un proxy bloquant tel que Privoxy ou certains logiciels de filtrage de contenu."
+msgstr ""
+"Accès - S'il y a des eepsites que vous n'aimez pas, n'y allez pas."
+"\n"
+"Vous pouvez sinon utilisez un proxy bloquant tel que Privoxy ou certains "
+"logiciels de filtrage de contenu."
#: i2p2www/pages/site/faq.html:228
msgid ""
"No. This is normal.\n"
"All routers adjust dynamically to changing network conditions and demands."
-msgstr "Non, c'est normal. \nTous les routeurs s'adaptent dynamiquement à l'évolution des conditions du réseau et des demandes."
+msgstr ""
+"Non, c'est normal. \n"
+"Tous les routeurs s'adaptent dynamiquement à l'évolution des conditions "
+"du réseau et des demandes."
#: i2p2www/pages/site/faq.html:235
msgid ""
-"You may need to reseed your I2P router. With recent versions of I2P you can "
-"go to http://localhost:7657/configreseed"
-" and click the Save Changes and Reseed Now button. If this method "
-"doesn't work—or you're using a very old version—you may need to "
-"reseed manually."
-msgstr "Vous devrez peut-être réamorcer (reseed) votre routeur I2P. Avec les versions récentes de I2P vous pouvez aller sur http://localhost:7657/configreseed et cliquer sur le bouton Sauvegarder et réamorcer. Si cette méthode ne fonctionne pas ou que vous utilisez une très ancienne version, vous devrez peut-être réamorcer manuellement."
+" and click the Save Changes and Reseed Now button. If this "
+"method doesn't work—or you're using a very old version—you "
+"may need to reseed manually."
+msgstr ""
+"Vous devrez peut-être réamorcer (reseed) votre routeur I2P. Avec les "
+"versions récentes de I2P vous pouvez aller sur http://localhost:7657/configreseed"
+" et cliquer sur le bouton Sauvegarder et réamorcer. Si cette "
+"méthode ne fonctionne pas ou que vous utilisez une très ancienne version,"
+" vous devrez peut-être réamorcer "
+"manuellement."
#: i2p2www/pages/site/faq.html:238
msgid ""
-"The reseed URL changed a few years ago. If this is your first install and you have installed\n"
+"The reseed URL changed a few years ago. If this is your first install and"
+" you have installed\n"
"an old (0.6.1.30 or earlier) release, or\n"
"you have not run I2P in a long time, you must change the URL and then\n"
"click \"Reseed\" on the console to find other routers.\n"
"After your router is running,\n"
-"on configadvanced.jsp,\n"
+"on configadvanced.jsp,"
+"\n"
"add the line i2p.reseedURL=http://netdb.i2p2.de/\n"
-"OR i2p.reseedURL=http://i2pdb.tin0.de/netDb/ (either should work),\n"
+"OR i2p.reseedURL=http://i2pdb.tin0.de/netDb/ (either should "
+"work),\n"
"then click \"Apply\", then click the \"reseed\" link on the left."
-msgstr "L'URL de réamorçage a changé il y a quelques années. Si ceci est votre première installation et que vous avez installé\nune vielle version (0.6.1.30 ou antérieure), ou que\nvous n'avez pas exécuté I2P depuis longtemps, vous devez modifier l'URL puis\ncliquer sur \"Reseed\" sur la console afin de trouver d'autres routeurs.\nUne fois que votre routeur est opérationnel,\ndans configadvanced.jsp,\najoutez la ligne i2p.reseedURL=http://netdb.i2p2.de/\nOU i2p.reseedURL=http://i2pdb.tin0.de/netDb/ (les deux devraient fonctionner),\npuis cliquez sur \"Appliquer\", puis \"réamorcer\" ou \"reseed\" sur la gauche."
+msgstr ""
+"L'URL de réamorçage a changé il y a quelques années. Si ceci est votre "
+"première installation et que vous avez installé\n"
+"une vielle version (0.6.1.30 ou antérieure), ou que\n"
+"vous n'avez pas exécuté I2P depuis longtemps, vous devez modifier l'URL "
+"puis\n"
+"cliquer sur \"Reseed\" sur la console afin de trouver d'autres routeurs.\n"
+"Une fois que votre routeur est opérationnel,\n"
+"dans configadvanced.jsp,"
+"\n"
+"ajoutez la ligne i2p.reseedURL=http://netdb.i2p2.de/\n"
+"OU i2p.reseedURL=http://i2pdb.tin0.de/netDb/ (les deux devraient"
+" fonctionner),\n"
+"puis cliquez sur \"Appliquer\", puis \"réamorcer\" ou \"reseed\" sur la "
+"gauche."
#: i2p2www/pages/site/faq.html:249
#, python-format
msgid ""
"This works if you are running 0.6.1.27 or later.\n"
-"If you are running release 0.6.1.31 or later, you probably don't need to do this.\n"
+"If you are running release 0.6.1.31 or later, you probably don't need to "
+"do this.\n"
"If you are running release 0.6.1.26 or earlier, either follow the\n"
"manual reseed instructions below\n"
"or install the latest release.\n"
"Possible alternate method - add\n"
"wrapper.java.additional.5=-Di2p.reseedURL=http://netdb.i2p2.de/\n"
-"to wrapper.config, shutdown the router completely, then start again, then click \"reseed\".\n"
+"to wrapper.config, shutdown the router completely, then start again, then"
+" click \"reseed\".\n"
"Let us know if this works."
-msgstr "Cela fonctionne si vous utilisez la version 0.6.1.27 ou ultérieure.\nSi vous utilisez une version 0.6.1.31 ou plus récente, vous n'aurez probablement pas besoin de faire ça.\nSi vous utilisez une version 0.6.1.26 ou plus récente, suivez les\ninstructions de réamorçage manuel ci-dessous\nou installez la dernière version.\nMéthode alternative possible - ajouter\nwrapper.java.additional.5=-Di2p.reseedURL=http://netdb.i2p2.de/\nau fichier wrapper.config, arrêter le routeur complètement, puis redémarrer, et cliquez sur \"reseed\".\nFaites nous savoir si ça fonctionne."
+msgstr ""
+"Cela fonctionne si vous utilisez la version 0.6.1.27 ou ultérieure.\n"
+"Si vous utilisez une version 0.6.1.31 ou plus récente, vous n'aurez "
+"probablement pas besoin de faire ça.\n"
+"Si vous utilisez une version 0.6.1.26 ou plus récente, suivez les\n"
+"instructions de réamorçage manuel ci-"
+"dessous\n"
+"ou installez la dernière version.\n"
+"Méthode alternative possible - ajouter\n"
+"wrapper.java.additional.5=-Di2p.reseedURL=http://netdb.i2p2.de/\n"
+"au fichier wrapper.config, arrêter le routeur complètement, puis "
+"redémarrer, et cliquez sur \"reseed\".\n"
+"Faites nous savoir si ça fonctionne."
#: i2p2www/pages/site/faq.html:260
#, python-format
msgid ""
-"...but you *really* should upgrade to the "
-"latest version."
-msgstr "...mais vous devriez *vraiment* mettre à niveau vers la version la plus récente."
+"...but you *really* should upgrade to "
+"the latest version."
+msgstr ""
+"...mais vous devriez *vraiment* mettre à "
+"niveau vers la version la plus récente."
#: i2p2www/pages/site/faq.html:266
msgid ""
-"If your router has 10 or more active peers, everything is fine. Changes in releases 0.6.1.31 and 0.6.1.32 improved the\n"
-"efficiency of the router and effectively reduced the number of active peers.\n"
-"The router should maintain connections to a few peers at all times.\n"
-"The best way to stay \"better-connected\" to the network is to share more bandwidth."
-msgstr "Si votre routeur a au moins 10 pairs actifs, tout va bien. Des changements dans les versions 0.6.1.31 et 0.6.1.32 ont amélioré\nl'efficacité du routeur et effectivement réduit le nombre de pairs actifs.\nLe routeur devrait toujours maintenir la connexion vers quelques pairs.\nLa meilleure façon de rester \"connecté de façon fiable\" au réseau est de partager davantage de bande passante."
+"If your router has 10 or more active peers, everything is fine. Changes "
+"in releases 0.6.1.31 and 0.6.1.32 improved the\n"
+"efficiency of the router and effectively reduced the number of active "
+"peers.\n"
+"The router should maintain connections to a few peers at all "
+"times.\n"
+"The best way to stay \"better-connected\" to the network is to share more bandwidth."
+msgstr ""
+"Si votre routeur a au moins 10 pairs actifs, tout va bien. Des "
+"changements dans les versions 0.6.1.31 et 0.6.1.32 ont amélioré\n"
+"l'efficacité du routeur et effectivement réduit le nombre de pairs "
+"actifs.\n"
+"Le routeur devrait toujours maintenir la connexion vers quelques "
+"pairs.\n"
+"La meilleure façon de rester \"connecté de façon fiable\" au réseau est "
+"de partager davantage de bande "
+"passante."
#: i2p2www/pages/site/faq.html:273
msgid ""
-"Is my router an \"exit node\" to the regular Internet? I don't want it to "
-"be."
-msgstr "Est-ce que mon routeur est un nœud de sortie vers l'Internet standard ? Je ne veux pas qu'il le soit."
+"Is my router an \"exit node\" to the regular Internet? I don't want it to"
+" be."
+msgstr ""
+"Est-ce que mon routeur est un nœud de sortie vers l'Internet standard ? "
+"Je ne veux pas qu'il le soit."
#: i2p2www/pages/site/faq.html:275
msgid ""
"No. Unlike Tor,\n"
-"\"exit nodes\" or \"outproxies\" are not an inherent part of the network.\n"
-"Only volunteers who set up and run separate applications will relay traffic to the regular Internet.\n"
+"\"exit nodes\" or \"outproxies\" are not an inherent part of the network."
+"\n"
+"Only volunteers who set up and run separate applications will relay "
+"traffic to the regular Internet.\n"
"There are very, very few of these."
-msgstr "Non. Contrairement à Tor,\nles \"noeuds de sortie\" ou \"outproxies\" ne sont pas une partie inhérente du réseau.\nSeuls les volontaires qui configurent et font fonctionner des applications séparées relaieront du trafic vers l'Internet régulier.\nIl y a très, très peu, de ceux-ci."
+msgstr ""
+"Non. Contrairement à Tor,\n"
+"les \"noeuds de sortie\" ou \"outproxies\" ne sont pas une partie "
+"inhérente du réseau.\n"
+"Seuls les volontaires qui configurent et font fonctionner des "
+"applications séparées relaieront du trafic vers l'Internet régulier.\n"
+"Il y a très, très peu, de ceux-ci."
#: i2p2www/pages/site/faq.html:284
msgid ""
-"See above. There are very few HTTP \"outproxies\", they are not an inherent part of the network,\n"
+"See above. There are very few HTTP \"outproxies\", they are not an "
+"inherent part of the network,\n"
"and they may not be up.\n"
-"In addition, the old outproxies squid.i2p, true.i2p, and krabs.i2p have vanished.\n"
+"In addition, the old outproxies squid.i2p, true.i2p, and krabs.i2p have "
+"vanished.\n"
"The only outproxy at the moment is false.i2p.\n"
-"To use it, edit your i2ptunnel settings for eepProxy\n"
+"To use it, edit your i2ptunnel "
+"settings for eepProxy\n"
"and set your outproxy list to 'false.i2p' (only).\n"
"Then stop and restart the eepProxy.\n"
"If it doesn't work, the outproxy is not up. It is not I2P's fault.\n"
-"If your primary reason to use an anonymous network is to anonymously access sites\n"
-"on the regular Internet, you should probably try Tor."
-msgstr "Voir ci-dessus. Il y a très peu de \"outproxies\" HTTP, ils ne sont pas une partie intégrante du réseau,\net ils peuvent ne pas être en fonctionnement.\nEn outre, les anciens outproxies squid.i2p, true.i2p et krabs.i2p ont disparu.\nLe seul outproxy en ce moment est false.i2p.\nPour l'utiliser, modifiez les réglages de mandataire i2ptunnel pour eepProxy\net définissez votre liste de outproxy - mandataires sortants - à 'false.i2p' (seul).\nPuis arrêtez et redémarrez le eepProxy.\nSi cela ne fonctionne pas, le outproxy n'est pas en service. Ce n'est pas la faute de I2P.\nSi votre principale raison d'utiliser un réseau anonyme est d'accéder aux sites de l'Internet régulier\nde façon anonyme, vous devriez probablement essayer Tor."
+"If your primary reason to use an anonymous network is to anonymously "
+"access sites\n"
+"on the regular Internet, you should probably try Tor."
+msgstr ""
+"Voir ci-dessus. Il y a très peu de \"outproxies\" HTTP, ils ne sont pas "
+"une partie intégrante du réseau,\n"
+"et ils peuvent ne pas être en fonctionnement.\n"
+"En outre, les anciens outproxies squid.i2p, true.i2p et krabs.i2p ont "
+"disparu.\n"
+"Le seul outproxy en ce moment est false.i2p.\n"
+"Pour l'utiliser, modifiez les réglages de "
+"mandataire i2ptunnel pour eepProxy\n"
+"et définissez votre liste de outproxy - mandataires sortants - à "
+"'false.i2p' (seul).\n"
+"Puis arrêtez et redémarrez le eepProxy.\n"
+"Si cela ne fonctionne pas, le outproxy n'est pas en service. Ce n'est pas"
+" la faute de I2P.\n"
+"Si votre principale raison d'utiliser un réseau anonyme est d'accéder aux"
+" sites de l'Internet régulier\n"
+"de façon anonyme, vous devriez probablement essayer Tor."
#: i2p2www/pages/site/faq.html:299
msgid ""
-"Within I2P, there is no need for HTTPS, as all traffic is encrypted end-to-end.\n"
+"Within I2P, there is no need for HTTPS, as all traffic is encrypted end-"
+"to-end.\n"
"FTP is not supported for technical reasons."
-msgstr "Dans I2P, il n'y a pas besoin de HTTPS, car tout le trafic est chiffré de bout en bout. \nFTP n'est pas pris en charge pour des raisons techniques."
+msgstr ""
+"Dans I2P, il n'y a pas besoin de HTTPS, car tout le trafic est chiffré de"
+" bout en bout. \n"
+"FTP n'est pas pris en charge pour des raisons techniques."
#: i2p2www/pages/site/faq.html:303
msgid ""
-"There are no FTP \"outproxies\" to the Internet—it may not even be possible to set up one.\n"
-"Any other kind of outproxy may work if it's set up with a standard tunnel. \n"
-"If you would like to set up some type of outproxy, carefully research the potential risks.\n"
-"The I2P community may or may not be able to help with the technical aspects, feel free to ask."
-msgstr "Il n'y a pas de proxies sortant FTP vers l'Internet ; il est même probable qu'il soit impossible d'en mettre en place. \nTout autre type de proxy sortant peut fonctionner s'il est mis en place avec un tunnel standard. \nSi vous souhaitez mettre en place un certain type de proxy sortant, étudiez soigneusement les risques potentiels. \nLa communauté I2P peut, ou peut ne pas être, en mesure de vous aider concernant les aspects techniques, n'hésitez pas à demander."
+"There are no FTP \"outproxies\" to the Internet—it may not even be "
+"possible to set up one.\n"
+"Any other kind of outproxy may work if it's set up with a standard "
+"tunnel. \n"
+"If you would like to set up some type of outproxy, carefully research the"
+" potential risks.\n"
+"The I2P community may or may not be able to help with the technical "
+"aspects, feel free to ask."
+msgstr ""
+"Il n'y a pas de proxies sortant FTP vers l'Internet ; il est même "
+"probable qu'il soit impossible d'en mettre en place. \n"
+"Tout autre type de proxy sortant peut fonctionner s'il est mis en place "
+"avec un tunnel standard. \n"
+"Si vous souhaitez mettre en place un certain type de proxy sortant, "
+"étudiez soigneusement les risques potentiels. \n"
+"La communauté I2P peut, ou peut ne pas être, en mesure de vous aider "
+"concernant les aspects techniques, n'hésitez pas à demander."
#: i2p2www/pages/site/faq.html:309
msgid ""
-"As explained several times above, any existing outproxy isn't a core part of the network.\n"
+"As explained several times above, any existing outproxy isn't a core part"
+" of the network.\n"
"They are services run by individuals and they may or may not\n"
"be operational at any given time."
-msgstr "Comme expliqué à plusieurs reprises ci-dessus, un proxy sortant n'est pas un élément du coeur du réseau. \nCe sont des services, gérés par des individus, qui peuvent ne pas \nêtre opérationnels à tout moment."
+msgstr ""
+"Comme expliqué à plusieurs reprises ci-dessus, un proxy sortant n'est pas"
+" un élément du coeur du réseau. \n"
+"Ce sont des services, gérés par des individus, qui peuvent ne pas \n"
+"être opérationnels à tout moment."
#: i2p2www/pages/site/faq.html:314
msgid ""
-"Update: Thanks to the work of h2ik, there is an https outproxy available for use via I2P. Starting with I2P 0.8.4 the tunnel is configured out of the box.localhost 6668
. XChat-like client users can create a\n"
-"new network with the server localhost/6668
(remember to tick "Bypass\n"
+"A tunnel to the main IRC server within I2P, Irc2P, is created when I2P is"
+" installed (see\n"
+"the I2PTunnel "
+"configuration page),\n"
+"and is automatically started when the I2P router starts. To connect to "
+"it, tell your IRC\n"
+"client to connect to localhost 6668
. XChat-like client users"
+" can create a\n"
+"new network with the server localhost/6668
(remember to tick"
+" "Bypass\n"
"proxy server" if you have a proxy server configured)."
-msgstr "\nUn tunnel vers le serveur principal IRC dans I2P, Irc2P, est créé lorsque I2P est installé (voir\nla localhost 6668
. Les utilisateurs de clients comme XChat peuvent créer un\nnouveau réseau avec le serveur localhost/6668
(n'oubliez pas de cocher la case "Bypass\nproxy serverr" si vous avez un serveur proxy configuré)."
+msgstr ""
+"\n"
+"Un tunnel vers le serveur principal IRC dans I2P, Irc2P, est créé lorsque"
+" I2P est installé (voir\n"
+"la localhost 6668
. Les "
+"utilisateurs de clients comme XChat peuvent créer un\n"
+"nouveau réseau avec le serveur localhost/6668
(n'oubliez pas"
+" de cocher la case "Bypass\n"
+"proxy serverr" si vous avez un serveur proxy configuré)."
#: i2p2www/pages/site/faq.html:437
msgid ""
-"For security purposes, the router's admin console by default only listens\n"
+"For security purposes, the router's admin console by default only listens"
+"\n"
"for connections on the local interface. However, with a little hacking,\n"
"you can make it reachable remotely:"
-msgstr "Pour des raisons de sécurité, la console d'admin du routeur n'écoute par défaut que\nles connexions sur l'interface locale. Cependant, en bidouillant un peu,\nvous pouvez la rendre accessible à distance :"
+msgstr ""
+"Pour des raisons de sécurité, la console d'admin du routeur n'écoute par "
+"défaut que\n"
+"les connexions sur l'interface locale. Cependant, en bidouillant un peu,\n"
+"vous pouvez la rendre accessible à distance :"
#: i2p2www/pages/site/faq.html:445
msgid ""
@@ -1785,35 +2568,73 @@ msgid ""
"clientApp.0.args=7657 ::1,127.0.0.1 ./webapps/
clientApp.0.args=7657 0.0.0.0 ./webapps/
"
-msgstr "Ouvrez ~/.i2p/clients.config
et remplacez clientApp.0.args=7657 ::1,127.0.0.1 ./webapps/
clientApp.0.args=7657 0.0.0.0 ./webapps/
"
+msgstr ""
+"Ouvrez ~/.i2p/clients.config
et remplacez clientApp.0.args=7657 ::1,127.0.0.1 ./webapps/
clientApp.0.args=7657 0.0.0.0 ./webapps/
"
#: i2p2www/pages/site/faq.html:453
msgid ""
-"Go to http://localhost:7657/configui\n"
+"Go to http://localhost:7657/configui"
+"\n"
"and add a console username and password if desired."
-msgstr "Allez à http://localhost:7657/configui\net ajoutez un nom d'utilisateur de console et un mot de passe si désiré."
+msgstr ""
+"Allez à http://localhost:7657/configui"
+"\n"
+"et ajoutez un nom d'utilisateur de console et un mot de passe si désiré."
#: i2p2www/pages/site/faq.html:459
msgid ""
-"Go to http://localhost:7657/index.jsp\n"
-"and hit \"Graceful restart\", which restarts the JVM and reloads the client applications"
-msgstr "Allez à l'adresse http://localhost:7657/index.jsp \net cliquez sur \"Redémarrage en douceur\", qui redémarre la JVM et recharge les applications clientes"
+"Go to http://localhost:7657/index.jsp"
+"\n"
+"and hit \"Graceful restart\", which restarts the JVM and reloads the "
+"client applications"
+msgstr ""
+"Allez à l'adresse "
+"http://localhost:7657/index.jsp \n"
+"et cliquez sur \"Redémarrage en douceur\", qui redémarre la JVM et "
+"recharge les applications clientes"
#: i2p2www/pages/site/faq.html:466
msgid ""
-"After that fires up, you should now be able to reach your console remotely. Reload the router at\n"
-"http://127.0.0.1:7657 and you will be prompted for the username and password you specified in step 2\n"
+"After that fires up, you should now be able to reach your console "
+"remotely. Reload the router at\n"
+"http://127.0.0.1:7657 and you will be prompted for the username and "
+"password you specified in step 2\n"
"above if your browser supports the authentication popup. Note: the\n"
-"0.0.0.0
above specifies an interface, not a network or netmask. 0.0.0.0\n"
-"means \"bind to all interfaces\", so it can be reachable on 127.0.0.1:7657 as well as\n"
+"0.0.0.0
above specifies an interface, not a network "
+"or netmask. 0.0.0.0\n"
+"means \"bind to all interfaces\", so it can be reachable on "
+"127.0.0.1:7657 as well as\n"
"any LAN/WAN IP."
-msgstr "Après que cela se soit déclenché, vous devriez maintenant être en mesure d'atteindre votre console à distance. Rechargez le routeur depuis\nhttp://127.0.0.1:7657 et vous serez invité à entrer un nom d'utilisateur et mot de passe que vous avez spécifié à l'étape 2\nci-dessus si votre navigateur supporte l'authentification par fenêtre popup. Note : le\n0.0.0.0
ci-dessus spécifie une interface, pas un réseau ou un masque réseau. 0.0.0.0\nsignifie \"lier à toutes les interfaces\", de sorte qu'il peut être accessible sur 127.0.0.1:7657 ainsi que\ntout LAN / WAN IP."
+msgstr ""
+"Après que cela se soit déclenché, vous devriez maintenant être en mesure "
+"d'atteindre votre console à distance. Rechargez le routeur depuis\n"
+"http://127.0.0.1:7657 et vous serez invité à entrer un nom d'utilisateur "
+"et mot de passe que vous avez spécifié à l'étape 2\n"
+"ci-dessus si votre navigateur supporte l'authentification par fenêtre "
+"popup. Note : le\n"
+"0.0.0.0
ci-dessus spécifie une interface, pas un "
+"réseau ou un masque réseau. 0.0.0.0\n"
+"signifie \"lier à toutes les interfaces\", de sorte qu'il peut être "
+"accessible sur 127.0.0.1:7657 ainsi que\n"
+"tout LAN / WAN IP."
#: i2p2www/pages/site/faq.html:477
msgid ""
-"By default, the router I2CP interface (port 7654) binds to address 127.0.0.1. To bind to 0.0.0.0, set the\n"
-"router advanced configuration option i2cp.tcp.bindAllInterfaces=true and restart."
-msgstr "Par défaut, l'interface I2CP du routeur (port 7654) se lie à l'adresse 127.0.0.1. Pour lier à 0.0.0.0, réglez\nl'option de configuration avancée du routeur i2cp.tcp.bindAllInterfaces=true puis redémarrez."
+"By default, the router I2CP interface (port 7654) binds to address "
+"127.0.0.1. To bind to 0.0.0.0, set the\n"
+"router advanced configuration option "
+"i2cp.tcp.bindAllInterfaces=true and restart."
+msgstr ""
+"Par défaut, l'interface I2CP du routeur (port 7654) se lie à l'adresse "
+"127.0.0.1. Pour lier à 0.0.0.0, réglez\n"
+"l'option de configuration avancée du routeur "
+"i2cp.tcp.bindAllInterfaces=true puis redémarrez."
#: i2p2www/pages/site/faq.html:482
msgid "Whats an \"eepsite\"?"
@@ -1821,31 +2642,55 @@ msgstr "Qu'est ce qu'un \"eepsite\" ?"
#: i2p2www/pages/site/faq.html:484
msgid ""
-"An eepsite is a website that is hosted anonymously - you can access it by\n"
+"An eepsite is a website that is hosted anonymously - you can access it by"
+"\n"
"setting your web browser's HTTP proxy to use the web proxy (typically it\n"
"listens on localhost port 4444), and browsing to the site."
-msgstr "Un eepsite est un site qui est hébergé anonymement - vous pouvez y accéder en\nparamétrant le proxy HTTP de votre navigateur pour utiliser le proxy web (typiquement, il\nécoute sur le port localhost 4444), puis naviguer sur le site."
+msgstr ""
+"Un eepsite est un site qui est hébergé anonymement - vous pouvez y "
+"accéder en\n"
+"paramétrant le proxy HTTP de votre navigateur pour utiliser le proxy web "
+"(typiquement, il\n"
+"écoute sur le port localhost 4444), puis naviguer sur le site."
#: i2p2www/pages/site/faq.html:492
#, python-format
msgid ""
-"The proxy config for different browsers is on a \n"
-"separate page with screenshots. More advanced configs with external tools\n"
+"The proxy config for different browsers is on a \n"
+"separate page with screenshots. More advanced configs with external "
+"tools\n"
"are possible but could introduce leaks in your setup."
-msgstr "La configuration du proxy pour les différents navigateurs est sur une \npage séparée avec des copies d'écran. Des configurations plus avancées avec des outils externes\nsont possibles, mais pourraient induire des fuites dans votre configuration."
+msgstr ""
+"La configuration du proxy pour les différents navigateurs est sur une \n"
+"page séparée avec des copies d'écran. Des configurations plus "
+"avancées avec des outils externes\n"
+"sont possibles, mais pourraient induire des fuites dans votre "
+"configuration."
#: i2p2www/pages/site/faq.html:501
msgid ""
"x is the number of peers you've sent or received a message from\n"
-"successfully in the last minute, y is the number of peers seen in the last\n"
+"successfully in the last minute, y is the number of peers seen in the "
+"last\n"
"hour or so."
-msgstr "x est le nombre de pairs vers lesquels vous avez envoyé ou reçu un message \navec succès durant la dernière minute, y est le nombre de pairs vus dans la dernière \nheure environ."
+msgstr ""
+"x est le nombre de pairs vers lesquels vous avez envoyé ou reçu un "
+"message \n"
+"avec succès durant la dernière minute, y est le nombre de pairs vus dans "
+"la dernière \n"
+"heure environ."
#: i2p2www/pages/site/faq.html:509
msgid ""
-"The SOCKS proxy is working as of release 0.7.1. SOCKS 4/4a/5 are supported.\n"
+"The SOCKS proxy is working as of release 0.7.1. SOCKS 4/4a/5 are "
+"supported.\n"
"There is no SOCKS outproxy so it is of limited use."
-msgstr "Le proxy SOCKS fonctionne à partir de la version 0.7.1. SOCKS 4/4a/5 sont pris en charge. \nIl n'y a pas de proxy sortant SOCKS. Son utilité est donc limitée."
+msgstr ""
+"Le proxy SOCKS fonctionne à partir de la version 0.7.1. SOCKS 4/4a/5 sont"
+" pris en charge. \n"
+"Il n'y a pas de proxy sortant SOCKS. Son utilité est donc limitée."
#: i2p2www/pages/site/faq.html:513
msgid ""
@@ -1855,54 +2700,107 @@ msgid ""
"information as content, I2P has no way to protect your anonymity. For\n"
"example, some mail applications will send the IP address of the machine\n"
"they are running on to a mail server. There is no way for I2P to filter\n"
-"this, thus using I2P to 'socksify' existing applications is possible, but\n"
+"this, thus using I2P to 'socksify' existing applications is possible, but"
+"\n"
"extremely dangerous."
-msgstr "En outre, de nombreuses applications divulguent des informations\nsensibles qui pourraient vous identifier sur l'Internet. I2P filtre uniquement\nles données de connexion, mais si le logiciel que vous souhaitez exécuter envoi cette\ninformation en tant que contenu, I2P n'a aucun moyen de protéger votre anonymat.\nPar exemple certaines applications de messagerie envoient l'adresse IP de la machine\nsur laquelle elles sont en cours d'exécution vers un serveur de messagerie. Il n'existe\naucun moyen pour I2P de filtrer cela. Utiliser I2P pour 'socksifier' des applications existantes\nest possible, mais extrêmement dangereux."
+msgstr ""
+"En outre, de nombreuses applications divulguent des informations\n"
+"sensibles qui pourraient vous identifier sur l'Internet. I2P filtre "
+"uniquement\n"
+"les données de connexion, mais si le logiciel que vous souhaitez exécuter"
+" envoi cette\n"
+"information en tant que contenu, I2P n'a aucun moyen de protéger votre "
+"anonymat.\n"
+"Par exemple certaines applications de messagerie envoient l'adresse IP de"
+" la machine\n"
+"sur laquelle elles sont en cours d'exécution vers un serveur de "
+"messagerie. Il n'existe\n"
+"aucun moyen pour I2P de filtrer cela. Utiliser I2P pour 'socksifier' des "
+"applications existantes\n"
+"est possible, mais extrêmement dangereux."
#: i2p2www/pages/site/faq.html:523
#, python-format
msgid ""
-"If you would like more information on the socks proxy application anyway,\n"
+"If you would like more information on the socks proxy application anyway,"
+"\n"
"there are some helpful hints on the socks page."
-msgstr "Si vous souhaitez plus d'informations sur l'application de proxy socks malgré tout,\nil y a quelques conseils utiles sur la page socks ."
+msgstr ""
+"Si vous souhaitez plus d'informations sur l'application de proxy socks "
+"malgré tout,\n"
+"il y a quelques conseils utiles sur la page socks "
+"."
#: i2p2www/pages/site/faq.html:530
msgid ""
"Okay, here's a rundown of the default ports (everything is configurable\n"
"through various settings, of course):"
-msgstr "Ok, voici un récapitulatif des ports par défaut (bien sûr, tout est configurable\nà travers différents réglages) :"
+msgstr ""
+"Ok, voici un récapitulatif des ports par défaut (bien sûr, tout est "
+"configurable\n"
+"à travers différents réglages) :"
#: i2p2www/pages/site/faq.html:539
msgid ""
"Internet-facing ports\n"
-"Note: New installs as of release 0.7.8 do not use port 8887; they select a random port\n"
+"Note: New installs as of release 0.7.8 do not use port 8887; they select "
+"a random port\n"
"between 9000 and 31000 when the program is run for the first time.\n"
-"The selected port is shown on the router configuration page."
-msgstr "Ports exposés à Internet\nRemarque : les nouvelles installations depuis la version 0.7.8 n'utilisent pas le port 8887; elles sélectionnent un port aléatoire \nentre 9000 et 31000 lorsque le programme est exécuté pour la première fois. \nLe port sélectionné est affiché sur la page de configuration du routeur."
+"The selected port is shown on the router configuration page."
+msgstr ""
+"Ports exposés à Internet\n"
+"Remarque : les nouvelles installations depuis la version 0.7.8 "
+"n'utilisent pas le port 8887; elles sélectionnent un port aléatoire \n"
+"entre 9000 et 31000 lorsque le programme est exécuté pour la première "
+"fois. \n"
+"Le port sélectionné est affiché sur la page de configuration du"
+" routeur."
#: i2p2www/pages/site/faq.html:547
msgid ""
-"Outbound UDP from the random port noted on the configuration page to arbitrary remote UDP ports, allowing replies\n"
+"Outbound UDP from the random port noted on the configuration page to "
+"arbitrary remote UDP ports, allowing replies\n"
" "
-msgstr "UDP sortant depuis le port aléatoire noté sur la page de configuration vers des ports UDP distants arbitraires, acceptant des réponsessu
or log in as root
."
-msgstr "Basculer vers l'utilisateur root au moyen de su
ou se logger comme root
."
+"Switch to the root user with su
or log in as "
+"root
."
+msgstr ""
+"Basculer vers l'utilisateur root au moyen de su
ou se logger"
+" comme root
."
#: i2p2www/pages/site/faq.html:807
#, python-format
msgid ""
-"If you cannot install these compatibility libraries (or do not want to), other\n"
-"possibilities would be to compile the wrapper for your\n"
-"system, starting I2P with the runplain.sh
script, or you can\n"
+"If you cannot install these compatibility libraries (or do not want to), "
+"other\n"
+"possibilities would be to compile the wrapper for your\n"
+"system, starting I2P with the runplain.sh
script, or you"
+" can\n"
"replace the wrapper with one from the source tarball."
-msgstr "Si vous ne pouvez pas installer ces librairies de compatibilité (ou ne le voulez pas), d'autres \npossibilités seraient de compiler le wrapper pour votre \nsystème, en lançant I2P avec le script runplain.sh
, ou vous pouvez \nremplacer le wrapper avec un issu du tarball source."
+msgstr ""
+"Si vous ne pouvez pas installer ces librairies de compatibilité (ou ne le"
+" voulez pas), d'autres \n"
+"possibilités seraient de compiler le wrapper pour votre \n"
+"système, en lançant I2P avec le script runplain.sh
, ou "
+"vous pouvez \n"
+"remplacer le wrapper avec un issu du tarball source."
#: i2p2www/pages/site/faq.html:813
msgid ""
"For the 0.8.9 release of I2P, the wrapper was upgraded to v3.5.12 and "
"compiled on systems running FreeBSD 7.2."
-msgstr "Pour la release 0.8.9 de I2P, le wrapper a éét mis à niveau en v3.5.12 et compilé sur des systèmes faisant fonctionner FreeBSD 7.2."
+msgstr ""
+"Pour la release 0.8.9 de I2P, le wrapper a éét mis à niveau en v3.5.12 et"
+" compilé sur des systèmes faisant fonctionner FreeBSD 7.2."
#: i2p2www/pages/site/faq.html:817
msgid ""
"In wrapper.log
I see an error that states \"Protocol "
"family unavailable
\" when loading the Router Console"
-msgstr "Dans wrapper.log
je vois une erreur qui indique \"Famille de protocole indisponible
\" quand la console routeur se charge"
+msgstr ""
+"Dans wrapper.log
je vois une erreur qui indique "
+"\"Famille de protocole indisponible
\" quand la console "
+"routeur se charge"
#: i2p2www/pages/site/faq.html:819
msgid ""
-"Often this error will occur with any network enabled java software on some "
-"systems that are configured to use IPv6 by default. There are a few ways to "
-"solve this:"
-msgstr "Fréquemment, cette erreur se produit avec n'importe quel logiciel Java activé réseau, sur certains systèmes qui sont configurés pour utiliser IPv6 par défaut. Il y a quelques façons de résoudre cela :"
+"Often this error will occur with any network enabled java software on "
+"some systems that are configured to use IPv6 by default. There are a few "
+"ways to solve this:"
+msgstr ""
+"Fréquemment, cette erreur se produit avec n'importe quel logiciel Java "
+"activé réseau, sur certains systèmes qui sont configurés pour utiliser "
+"IPv6 par défaut. Il y a quelques façons de résoudre cela :"
#: i2p2www/pages/site/faq.html:824
msgid ""
"On Linux based systems, you can echo 0 > "
"/proc/sys/net/ipv6/bindv6only
"
-msgstr "Sur le systèmes basés Linux, vous pouvez echo 0 > /proc/sys/net/ipv6/bindv6only
"
+msgstr ""
+"Sur le systèmes basés Linux, vous pouvez echo 0 > "
+"/proc/sys/net/ipv6/bindv6only
"
#: i2p2www/pages/site/faq.html:826
msgid "Look for the following lines in wrapper.config
."
@@ -2183,23 +3310,34 @@ msgstr "Regarder les lignes suivantes dans wrapper.config
."
#: i2p2www/pages/site/faq.html:830
msgid ""
-"If the lines are there, uncomment them by removing the \"#\"s. If the lines "
-"are not there, add them without the \"#\"s."
-msgstr "Si les lignes sont là, mettez-les hors commentaire en supprimant les \"#\". Si les lignes ne sont pas là, ajoutez les, sans les \"#\"."
+"If the lines are there, uncomment them by removing the \"#\"s. If the "
+"lines are not there, add them without the \"#\"s."
+msgstr ""
+"Si les lignes sont là, mettez-les hors commentaire en supprimant les "
+"\"#\". Si les lignes ne sont pas là, ajoutez les, sans les \"#\"."
#: i2p2www/pages/site/faq.html:833
msgid ""
"Another option would be to remove the ::1 from "
"~/.i2p/clients.config
"
-msgstr "Une autre option serait de retirer le(s) ::1 depuis ~/.i2p/clients.config
"
+msgstr ""
+"Une autre option serait de retirer le(s) ::1 depuis "
+"~/.i2p/clients.config
"
#: i2p2www/pages/site/faq.html:837
msgid ""
-"WARNING: For any changes to wrapper.config
to take effect, you must completely\n"
+"WARNING: For any changes to wrapper.config
"
+"to take effect, you must completely\n"
"stop the router and the wrapper. Clicking Restart on your\n"
"router console will NOT reread this file! You must\n"
"click Shutdown, wait 11 minutes, then start I2P."
-msgstr "ATTENTION : pour que des modifications dans wrapper.config
prennent effet, vous devez \narrêter complètement le routeur et le wrapper. Cliquer Redémarrer dans votre\nconsole du routeur ne relira PAS ce fichier ! Vous devez\ncliquez cliquer Arrêt, attendre 11 minutes, puis lancer I2P."
+msgstr ""
+"ATTENTION : pour que des modifications dans "
+"wrapper.config
prennent effet, vous devez \n"
+"arrêter complètement le routeur et le wrapper. Cliquer "
+"Redémarrer dans votre\n"
+"console du routeur ne relira PAS ce fichier ! Vous devez\n"
+"cliquez cliquer Arrêt, attendre 11 minutes, puis lancer I2P."
#: i2p2www/pages/site/faq.html:848
#, python-format
@@ -2207,7 +3345,11 @@ msgid ""
"Great! Find us on IRC irc.freenode.net #i2p or post to\n"
"the forum and we'll post it here (with\n"
"the answer, hopefully)."
-msgstr "Formidable ! retrouvez-nous sur le serveur IRC irc.freenode.net #i2p, ou postez-la au\nforum et nous la publierons ici (avec\nla réponse, nous l'espérons)."
+msgstr ""
+"Formidable ! retrouvez-nous sur le serveur IRC irc.freenode.net #i2p, ou "
+"postez-la au\n"
+"forum et nous la publierons ici (avec\n"
+"la réponse, nous l'espérons)."
#: i2p2www/pages/site/impressum.html:4
msgid "German laws"
@@ -2220,9 +3362,12 @@ msgstr "Réseau anonyme I2P"
#: i2p2www/pages/site/index.html:4
msgid ""
"Anonymous peer-to-peer distributed communication layer built with open "
-"source tools and designed to run any traditional Internet service such as "
-"email, IRC or web hosting."
-msgstr "Couche de communication distribuée, anonyme, et pair-à-pair, construite avec des outils open source et conçue pour exécuter n'importe quel service Internet traditionnel tels que courriel, IRC ou hébergement web."
+"source tools and designed to run any traditional Internet service such as"
+" email, IRC or web hosting."
+msgstr ""
+"Couche de communication distribuée, anonyme, et pair-à-pair, construite "
+"avec des outils open source et conçue pour exécuter n'importe quel "
+"service Internet traditionnel tels que courriel, IRC ou hébergement web."
#: i2p2www/pages/site/index.html:7
msgid "What does I2P do for you?"
@@ -2230,10 +3375,14 @@ msgstr "Que peut faire I2P pour vous ?"
#: i2p2www/pages/site/index.html:8
msgid ""
-"The I2P network provides strong privacy protections for communication over "
-"the Internet. Many activities that would risk your privacy on the public "
-"Internet can be conducted anonymously inside I2P."
-msgstr "Le réseau I2P fournit des moyens de protection avancés pour préserver la confidentialité de vos communications sur Internet. De nombreuses activités sur l'Internet public peuvent dévoiler des informations personnelles. En utilisant I2P, elles resteront anonymes."
+"The I2P network provides strong privacy protections for communication "
+"over the Internet. Many activities that would risk your privacy on the "
+"public Internet can be conducted anonymously inside I2P."
+msgstr ""
+"Le réseau I2P fournit des moyens de protection avancés pour préserver la "
+"confidentialité de vos communications sur Internet. De nombreuses "
+"activités sur l'Internet public peuvent dévoiler des informations "
+"personnelles. En utilisant I2P, elles resteront anonymes."
#: i2p2www/pages/site/index.html:9
#, python-format
@@ -2247,30 +3396,45 @@ msgstr "Qu'est-ce que I2P ?"
#: i2p2www/pages/site/index.html:15
msgid ""
"I2P is an anonymous overlay network - a network within a network. It is "
-"intended to protect communication from dragnet surveillance and monitoring "
-"by third parties such as ISPs.\n"
-msgstr "I2P est une surcouche réseau d'anonymisation ; en quelque sorte, un réseau au sein du réseau. Il est destiné à protéger les communications contre la surveillance globale - dragnet surveillance -, et celle réalisée par des tiers tels que les fournisseurs d'accès à Internet.\n"
+"intended to protect communication from dragnet surveillance and "
+"monitoring by third parties such as ISPs.\n"
+msgstr ""
+"I2P est une surcouche réseau d'anonymisation ; en quelque sorte, un "
+"réseau au sein du réseau. Il est destiné à protéger les communications "
+"contre la surveillance globale - dragnet surveillance -, et celle "
+"réalisée par des tiers tels que les fournisseurs d'accès à Internet.\n"
#: i2p2www/pages/site/index.html:18
msgid ""
"I2P is used by many people who care about their privacy: activists, "
"oppressed people, journalists and whistleblowers, as well as the average "
"person.\n"
-msgstr "I2P est utilisé par beaucoup de personnes soucieuses de leur confidentialité : des militants, des peuples opprimés, des journalistes, des lanceurs d'alertes, et aussi de simples utilisateurs d'Internet.\n"
+msgstr ""
+"I2P est utilisé par beaucoup de personnes soucieuses de leur "
+"confidentialité : des militants, des peuples opprimés, des journalistes, "
+"des lanceurs d'alertes, et aussi de simples utilisateurs d'Internet.\n"
#: i2p2www/pages/site/index.html:21
msgid ""
-"No network can be \"perfectly anonymous\". The continued goal of I2P is to "
-"make attacks more and more difficult to mount. Its anonymity will get "
+"No network can be \"perfectly anonymous\". The continued goal of I2P is "
+"to make attacks more and more difficult to mount. Its anonymity will get "
"stronger as the size of the network increases and with ongoing academic "
"review.\n"
-msgstr "Aucun réseau ne peut être \"parfaitement anonyme\". L'objectif continu de I2P est de rendre les attaques de plus en plus difficiles à mettre en place. La protection de l'anonymat qu'il procure s'améliorera à mesure que le réseau d'utilisateurs grandira et grâce aux recherches universitaires en cours.\n"
+msgstr ""
+"Aucun réseau ne peut être \"parfaitement anonyme\". L'objectif continu "
+"de I2P est de rendre les attaques de plus en plus difficiles à mettre en "
+"place. La protection de l'anonymat qu'il procure s'améliorera à mesure "
+"que le réseau d'utilisateurs grandira et grâce aux recherches "
+"universitaires en cours.\n"
#: i2p2www/pages/site/index.html:24
msgid ""
-"I2P is available on desktops, embedded systems (like the Raspberry Pi) and "
-"Android phones. Help spread the word!\n"
-msgstr "I2P est disponible pour les ordinateurs personnels, les systèmes embarqués (comme le Raspberry Pi) et les téléphones Android. Faites passer le mot !\n"
+"I2P is available on desktops, embedded systems (like the Raspberry Pi) "
+"and Android phones. Help spread the word!\n"
+msgstr ""
+"I2P est disponible pour les ordinateurs personnels, les systèmes "
+"embarqués (comme le Raspberry Pi) et les téléphones Android. Faites "
+"passer le mot !\n"
#: i2p2www/pages/site/index.html:28
msgid "Read more…"
@@ -2283,56 +3447,72 @@ msgstr "Que pouvez-vous faire avec I2P ?"
#: i2p2www/pages/site/index.html:36
#, python-format
msgid ""
-"Email: Integrated web mail interface, "
-"plugin for serverless email."
-msgstr "Email Interface web mail intégrée, plugin pour email sans serveur."
+"Email: Integrated web mail interface,"
+" plugin for serverless email."
+msgstr ""
+"Email Interface web mail intégrée, "
+"plugin pour email sans serveur."
#: i2p2www/pages/site/index.html:41
#, python-format
msgid ""
-"Web browsing: Anonymous websites,"
-" gateways to and from the public Internet."
-msgstr "Navigation web : Sites web anonymes, passerelles vers et depuis l'Internet public."
+"Web browsing: Anonymous "
+"websites, gateways to and from the public Internet."
+msgstr ""
+"Navigation web : Sites web "
+"anonymes, passerelles vers et depuis l'Internet public."
#: i2p2www/pages/site/index.html:46
#, python-format
msgid ""
"Blogging and forums: "
"Blogging and Syndie plugins."
-msgstr "Blogging et forums Plugins pour Blogging et Syndie."
+msgstr ""
+"Blogging et forums "
+"Plugins pour Blogging et Syndie."
#: i2p2www/pages/site/index.html:51
#, python-format
msgid ""
-"Website hosting: Integrated "
-"anonymous web server."
-msgstr "Hébergement de sites web : Serveur web anonyme intégré."
+"Website hosting: Integrated"
+" anonymous web server."
+msgstr ""
+"Hébergement de sites web : "
+"Serveur web anonyme intégré."
#: i2p2www/pages/site/index.html:56
#, python-format
msgid ""
"Real-time chat: Instant "
"messaging and IRC clients."
-msgstr "Tchat en temps réel : Messagerie instantanée et clients IRC."
+msgstr ""
+"Tchat en temps réel : "
+"Messagerie instantanée et clients IRC."
#: i2p2www/pages/site/index.html:61
#, python-format
msgid ""
-"File sharing: ED2K and Gnutella "
-"clients, integrated BitTorrent client."
-msgstr "Partage de fichiers : Clients ED2K et Gnutella, client BitTorrent intégré."
+"File sharing: ED2K and "
+"Gnutella clients, integrated BitTorrent client."
+msgstr ""
+"Partage de fichiers : Clients "
+"ED2K et Gnutella, client BitTorrent intégré."
#: i2p2www/pages/site/index.html:66
#, python-format
msgid ""
"Decentralized file "
"storage: Tahoe-LAFS distributed filesystem plugin."
-msgstr "Stockage de fichiers décentralisé : Plugin pour système de fichiers distribué Tahoe-LAFS."
+msgstr ""
+"Stockage de fichiers"
+" décentralisé : Plugin pour système de fichiers distribué Tahoe-LAFS."
#: i2p2www/pages/site/index.html:71
#, python-format
msgid "More supported applications…"
-msgstr "Davantage d'applications supportées …"
+msgstr ""
+"Davantage d'applications supportées "
+"…"
#: i2p2www/pages/site/index.html:79
msgid "News & Updates"
@@ -2346,8 +3526,12 @@ msgstr "Liens & ressources recommandées"
#, python-format
msgid ""
"See also the page with\n"
-"links to presentations, videos, and tutorials about I2P."
-msgstr "Voir aussi la page avec\nliens vers des présentations, des vidéos et des tutoriels au sujet de I2P."
+"links to presentations, videos, and tutorials about"
+" I2P."
+msgstr ""
+"Voir aussi la page avec\n"
+"liens vers des présentations, des vidéos et des "
+"tutoriels au sujet de I2P."
#: i2p2www/pages/site/links.html:12
msgid "I2P on the web"
@@ -2372,3 +3556,4 @@ msgstr "Forums, actualités sur ce site web, autres"
#: i2p2www/pages/site/links.html:53
msgid "Very Old Stuff"
msgstr "Très vieilles choses"
+
diff --git a/i2p2www/translations/he/LC_MESSAGES/get-involved.po b/i2p2www/translations/he/LC_MESSAGES/get-involved.po
index ff63377d..d14a16ef 100644
--- a/i2p2www/translations/he/LC_MESSAGES/get-involved.po
+++ b/i2p2www/translations/he/LC_MESSAGES/get-involved.po
@@ -3731,15 +3731,3 @@ msgid ""
"href=\"http://%(zzz)s/forums/14\">translation forum on %(zzz)s."
msgstr ""
-
-
-
-
-
-
-
-
-
-
-
-
diff --git a/i2p2www/translations/id/LC_MESSAGES/get-involved.po b/i2p2www/translations/id/LC_MESSAGES/get-involved.po
index 574edbc0..00e88685 100644
--- a/i2p2www/translations/id/LC_MESSAGES/get-involved.po
+++ b/i2p2www/translations/id/LC_MESSAGES/get-involved.po
@@ -1,23 +1,23 @@
-# Translations template for I2P.
+# Indonesian translations for I2P.
# Copyright (C) 2014 ORGANIZATION
# This file is distributed under the same license as the I2P project.
-#
+#
# Translators:
# Khairul Agasta i2p.i2p
) has been set up to "
-"enable developers to easily set up two of the commonly-used IDEs for Java "
-"development: Eclipse and NetBeans."
+"The main I2P development branch (i2p.i2p
) has been set up to"
+" enable developers to easily set up two of the commonly-used IDEs for "
+"Java development: Eclipse and NetBeans."
msgstr ""
#: i2p2www/pages/site/get-involved/guides/ides.html:10
msgid ""
-"The main I2P development branches (i2p.i2p
and branches from "
-"it) contain .project and .classpath Eclipse files, to enable the branch to "
-"be easily set up in Eclipse."
+"The main I2P development branches (i2p.i2p
and branches from"
+" it) contain .project and .classpath Eclipse files, to enable the branch "
+"to be easily set up in Eclipse."
msgstr ""
#: i2p2www/pages/site/get-involved/guides/ides.html:16
@@ -2323,8 +2669,8 @@ msgstr ""
#: i2p2www/pages/site/get-involved/guides/ides.html:20
msgid ""
-"Open Eclipse and create a new Workspace, based in the directory that the I2P"
-" branch was checked out to."
+"Open Eclipse and create a new Workspace, based in the directory that the "
+"I2P branch was checked out to."
msgstr ""
#: i2p2www/pages/site/get-involved/guides/ides.html:24
@@ -2335,8 +2681,8 @@ msgstr ""
#: i2p2www/pages/site/get-involved/guides/ides.html:28
msgid ""
-"For \"Select root directory:\" choose the directory that the I2P branch was "
-"checked out to."
+"For \"Select root directory:\" choose the directory that the I2P branch "
+"was checked out to."
msgstr ""
#: i2p2www/pages/site/get-involved/guides/ides.html:32
@@ -2349,14 +2695,14 @@ msgstr ""
#: i2p2www/pages/site/get-involved/guides/ides.html:40
msgid ""
-"Done! Your workspace should now contain all projects within the I2P branch, "
-"and their build dependencies should be correctly set up."
+"Done! Your workspace should now contain all projects within the I2P "
+"branch, and their build dependencies should be correctly set up."
msgstr ""
#: i2p2www/pages/site/get-involved/guides/ides.html:48
msgid ""
-"The main I2P development branches (i2p.i2p
and branches from "
-"it) contain NetBeans project files."
+"The main I2P development branches (i2p.i2p
and branches from"
+" it) contain NetBeans project files."
msgstr ""
#: i2p2www/pages/site/get-involved/guides/monotone.html:2
@@ -2435,26 +2781,34 @@ msgstr ""
#: i2p2www/pages/site/get-involved/guides/monotone.html:32
#, python-format
msgid ""
-"This is a revised version of Complication's original\n"
+"This is a revised version of Complication's original\n"
" guide detailing the use of Monotone in I2P development.\n"
-" For basic instructions see the quick-start guide."
+" For basic instructions see the quick-start "
+"guide."
msgstr ""
#: i2p2www/pages/site/get-involved/guides/monotone.html:40
#, python-format
msgid ""
-"I2P has a distributed development model. The source code is replicated across\n"
-" independently administered Monotone (\"MTN\") repositories.\n"
-" Developers with commit rights are able to push their changes to the repository\n"
-" (a license agreement needs to be signed\n"
+"I2P has a distributed development model. The source code is replicated "
+"across\n"
+" independently administered Monotone (\"MTN\") repositories.\n"
+" Developers with commit rights are able to push their changes to the "
+"repository\n"
+" (a license agreement needs to be "
+"signed\n"
" before commit rights are granted)."
msgstr ""
#: i2p2www/pages/site/get-involved/guides/monotone.html:50
msgid ""
"Some of Monotone's noteworthy qualities are: distributed\n"
-" version control, cryptographic authentication, access control, its small size, having few\n"
-" dependencies, storage of projects in a compressed SQLite database file, and\n"
+" version control, cryptographic authentication, access control, its "
+"small size, having few\n"
+" dependencies, storage of projects in a compressed SQLite database file,"
+" and\n"
" having the ability to resume interrupted synchronization attempts."
msgstr ""
@@ -2464,16 +2818,20 @@ msgstr ""
#: i2p2www/pages/site/get-involved/guides/monotone.html:64
msgid ""
-"A transport key grants you the ability to push your changes to a Monotone repository server.\n"
-" In order to commit code into Monotone (in essence signing your code), a commit key is also needed.\n"
-" None of the public Monotone servers on I2P currently require a key in order to read (or pull) the source code."
+"A transport key grants you the ability to push your changes to a Monotone"
+" repository server.\n"
+" In order to commit code into Monotone (in essence signing your code), a"
+" commit key is also needed.\n"
+" None of the public Monotone servers on I2P currently require a key in "
+"order to read (or pull) the source code."
msgstr ""
#: i2p2www/pages/site/get-involved/guides/monotone.html:72
msgid ""
"Without a transport key, one cannot:\n"
" $HOME/.monotone/keys
in text files which\n"
+"Monotone stores keys under $HOME/.monotone/keys
in "
+"text files which\n"
" are named identically to the keys. For example:"
msgstr ""
@@ -2514,8 +2875,10 @@ msgstr ""
#: i2p2www/pages/site/get-involved/guides/monotone.html:131
msgid ""
-"Monotone will prompt you for a password to protect your keys. You are very strongly encouraged to set a password\n"
-" for the commit key. Many users will leave an empty password for the transport key, especially those running a\n"
+"Monotone will prompt you for a password to protect your keys. You are "
+"very strongly encouraged to set a password\n"
+" for the commit key. Many users will leave an empty password for the "
+"transport key, especially those running a\n"
" Monotone server."
msgstr ""
@@ -2525,30 +2888,38 @@ msgstr ""
#: i2p2www/pages/site/get-involved/guides/monotone.html:143
msgid ""
-"Monotone's security model helps to ensure that nobody can easily impersonate a developer without\n"
-" it being noticed. Since developers can make mistakes and become compromised,only manual review can\n"
-" ensure quality of code. Monotone's trust model will ensure that you read the right diffs. It does\n"
+"Monotone's security model helps to ensure that nobody can easily "
+"impersonate a developer without\n"
+" it being noticed. Since developers can make mistakes and become "
+"compromised,only manual review can\n"
+" ensure quality of code. Monotone's trust model will ensure that you "
+"read the right diffs. It does\n"
" not replace reading diffs."
msgstr ""
#: i2p2www/pages/site/get-involved/guides/monotone.html:153
msgid ""
-"A Monotone repository is a single file (a compressed SQLite database) which "
-"contains all of the project's source code and history."
+"A Monotone repository is a single file (a compressed SQLite database) "
+"which contains all of the project's source code and history."
msgstr ""
#: i2p2www/pages/site/get-involved/guides/monotone.html:159
msgid ""
-"After importing the developers' keys into Monotone and\n"
-" setting up trust evaluation hooks,\n"
-" Monotone will prevent untrusted code from being checked out into your workspace.\n"
-" There are commands available to clean untrusted code from your workspace but in practice they've not been\n"
+"After importing the "
+"developers' keys into Monotone and\n"
+" setting up trust "
+"evaluation hooks,\n"
+" Monotone will prevent untrusted code from being checked out into your "
+"workspace.\n"
+" There are commands available to clean untrusted code from your "
+"workspace but in practice they've not been\n"
" needed due to the push access policies in place."
msgstr ""
#: i2p2www/pages/site/get-involved/guides/monotone.html:169
msgid ""
-"A repository can hold many branches. For example, our repository holds the\n"
+"A repository can hold many branches. For example, our repository holds "
+"the\n"
" following main branches:"
msgstr ""
@@ -2566,17 +2937,23 @@ msgstr ""
#: i2p2www/pages/site/get-involved/guides/monotone.html:181
msgid ""
-"By convention, the I2P Monotone repository is named i2p.mtn
. Before pulling\n"
-" source code from servers, a database for your repository will need to be initialized.\n"
-" To initialize your local repository, change into the directory that you want the\n"
-" i2p.mtn
file and branch directories to be stored and issue the following\n"
+"By convention, the I2P Monotone repository is named i2p.mtn
."
+" Before pulling\n"
+" source code from servers, a database for your repository will need to "
+"be initialized.\n"
+" To initialize your local repository, change into the directory that you"
+" want the\n"
+" i2p.mtn
file and branch directories to be stored and issue"
+" the following\n"
" command:"
msgstr ""
#: i2p2www/pages/site/get-involved/guides/monotone.html:197
msgid ""
-"Keys which developers use to commit code are essential for trust evaluation in\n"
-" Monotone. The other developers' transport keys are only required for Monotone server operators.\n"
+"Keys which developers use to commit code are essential for trust "
+"evaluation in\n"
+" Monotone. The other developers' transport keys are only required for "
+"Monotone server operators.\n"
" "
msgstr ""
@@ -2590,8 +2967,11 @@ msgstr ""
#: i2p2www/pages/site/get-involved/guides/monotone.html:210
#, python-format
msgid ""
-"To import developers' keys after verifying their authenticity, copy all of the keys into a new\n"
-" file. Create this file (e.g. keys.txt
) in the same directory where i2p.mtn
is located. Import the keys with the command:"
+"To import developers' keys after verifying their authenticity, copy all of the keys into a new\n"
+" file. Create this file (e.g. keys.txt
) in the same "
+"directory where i2p.mtn
is located. Import the keys with the"
+" command:"
msgstr ""
#: i2p2www/pages/site/get-involved/guides/monotone.html:220
@@ -2602,27 +2982,34 @@ msgstr ""
#: i2p2www/pages/site/get-involved/guides/monotone.html:228
msgid ""
-"The default Monotone trust policy is way too lax for our requirements: every committer is trusted by default.\n"
+"The default Monotone trust policy is way too lax for our requirements: "
+"every committer is trusted by default.\n"
" That is not acceptable for I2P development."
msgstr ""
#: i2p2www/pages/site/get-involved/guides/monotone.html:235
msgid ""
-"Change into the directory $HOME/.monotone
and open the file\n"
-" monotonerc
with a text editor. Copy and paste the following two functions into this file:"
+"Change into the directory $HOME/.monotone
and open "
+"the file\n"
+" monotonerc
with a text editor. Copy and paste the "
+"following two functions into this file:"
msgstr ""
#: i2p2www/pages/site/get-involved/guides/monotone.html:244
msgid ""
-"The first function determines an intersection between two sets, in our case a\n"
+"The first function determines an intersection between two sets, in our "
+"case a\n"
" revision's signers and trusted signers."
msgstr ""
#: i2p2www/pages/site/get-involved/guides/monotone.html:251
msgid ""
-"The second function determines trust in a given revision, by calling the first\n"
-" function with \"signers\" and \"trusted\" as arguments. If the intersection is\n"
-" null, the revision is not trusted. If the intersection is not empty, the\n"
+"The second function determines trust in a given revision, by calling the "
+"first\n"
+" function with \"signers\" and \"trusted\" as arguments. If the "
+"intersection is\n"
+" null, the revision is not trusted. If the intersection is not empty, "
+"the\n"
" revision is trusted. Otherwise, the revision is not trusted."
msgstr ""
@@ -2635,14 +3022,18 @@ msgstr ""
#: i2p2www/pages/site/get-involved/guides/monotone.html:268
msgid ""
-"I2P is shipped with a pre-configured tunnel pointing to the project Monotone server. Ensure that the tunnel has been started\n"
-" within I2PTunnel before attempting to pull the source code from 127.0.0.1:8998."
+"I2P is shipped with a pre-configured tunnel pointing to the project "
+"Monotone server. Ensure that the tunnel has been started\n"
+" within I2PTunnel before"
+" attempting to pull the source code from 127.0.0.1:8998."
msgstr ""
#: i2p2www/pages/site/get-involved/guides/monotone.html:275
msgid ""
-"Enter the directory where you initialized i2p.mtn
. Depending on whether you\n"
-" want only I2P sources, or also sources for the I2P website and Syndie, you can\n"
+"Enter the directory where you initialized i2p.mtn
. Depending"
+" on whether you\n"
+" want only I2P sources, or also sources for the I2P website and Syndie, "
+"you can\n"
" perform the pull
operation in different ways."
msgstr ""
@@ -2656,14 +3047,16 @@ msgstr ""
#: i2p2www/pages/site/get-involved/guides/monotone.html:298
msgid ""
-"If the transfer aborts before completing sucessfully, simply repeating the "
-"pull command will resume the transfer."
+"If the transfer aborts before completing sucessfully, simply repeating "
+"the pull command will resume the transfer."
msgstr ""
#: i2p2www/pages/site/get-involved/guides/monotone.html:304
msgid ""
-"Pulling in the above examples is done anonymously by specifying an empty transport key.\n"
-" If everyone pulls anonymously it will be harder for an attacker who gains control of the server\n"
+"Pulling in the above examples is done anonymously by specifying an empty "
+"transport key.\n"
+" If everyone pulls anonymously it will be harder for an attacker who "
+"gains control of the server\n"
" to selectively provide some people with tampered data."
msgstr ""
@@ -2683,57 +3076,67 @@ msgstr ""
#: i2p2www/pages/site/get-involved/guides/monotone.html:326
msgid ""
-"With monotonerc
configured as above, Monotone will no longer trust any committers. Confirm this by changing into the\n"
-"directory where i2p.mtn
was created and attempt a checkout of the I2P branch:"
+"With monotonerc
configured as above, Monotone will no"
+" longer trust any committers. Confirm this by changing into the\n"
+"directory where i2p.mtn
was created and attempt a checkout "
+"of the I2P branch:"
msgstr ""
#: i2p2www/pages/site/get-involved/guides/monotone.html:336
msgid ""
-"A directory named i2p.i2p
should not appear. You should encounter many\n"
+"A directory named i2p.i2p
should not appear. You "
+"should encounter many\n"
" error messages like:"
msgstr ""
#: i2p2www/pages/site/get-involved/guides/monotone.html:353
msgid ""
"If you are satisfied with results, restore the backup of\n"
-" monotonerc
that was created above. If you didn't create a backup\n"
-" as advised, re-read Setting up trust evaluation hooks."
+" monotonerc
that was created above. If you didn't create a "
+"backup\n"
+" as advised, re-read Setting up trust evaluation hooks."
msgstr ""
#: i2p2www/pages/site/get-involved/guides/monotone.html:364
msgid ""
-"If you already have a branch checked out, skip to the next\n"
+"If you already have a branch checked out, skip to the next\n"
" section."
msgstr ""
#: i2p2www/pages/site/get-involved/guides/monotone.html:371
msgid ""
-"Change into the directory where i2p.mtn
is located. Over there "
-"issue:"
+"Change into the directory where i2p.mtn
is located. Over "
+"there issue:"
msgstr ""
#: i2p2www/pages/site/get-involved/guides/monotone.html:380
msgid ""
-"The checkout should complete without error messages and a directory named\n"
-" i2p.i2p
should appear in the current directory. Congratulations! You have\n"
+"The checkout should complete without error messages and a directory named"
+"\n"
+" i2p.i2p
should appear in the current directory. "
+"Congratulations! You have\n"
" successfully checked out the latest I2P sources, ready to be compiled."
msgstr ""
#: i2p2www/pages/site/get-involved/guides/monotone.html:391
msgid ""
-"If you haven't done this already, pull fresh code from the server to your local\n"
-" Monotone repository. To accomplish this, change into the directory where\n"
+"If you haven't done this already, pull fresh code from the server to your"
+" local\n"
+" Monotone repository. To accomplish this, change into the directory "
+"where\n"
" i2p.mtn
is located and issue:"
msgstr ""
#: i2p2www/pages/site/get-involved/guides/monotone.html:402
-msgid ""
-"Now change into your i2p.i2p
directory, and over there issue:"
+msgid "Now change into your i2p.i2p
directory, and over there issue:"
msgstr ""
#: i2p2www/pages/site/get-involved/guides/monotone.html:411
msgid ""
-"As long as there were no errors…Congratulations! You have successfully updated to the latest I2P sources. They\n"
+"As long as there were no errors…Congratulations! You have "
+"successfully updated to the latest I2P sources. They\n"
" should be ready to compile."
msgstr ""
@@ -2757,8 +3160,8 @@ msgstr ""
#: i2p2www/pages/site/get-involved/guides/monotone.html:449
msgid ""
-"No one will not be able to push code to your server without permission being"
-" explicitly granted. To grant push access:"
+"No one will not be able to push code to your server without permission "
+"being explicitly granted. To grant push access:"
msgstr ""
#: i2p2www/pages/site/get-involved/guides/monotone.html:455
@@ -2774,34 +3177,44 @@ msgstr ""
#: i2p2www/pages/site/get-involved/guides/monotone.html:466
msgid ""
-"Import the transport key(s) into your database. The procedure for importing transport keys is the same as for\n"
-"importing commit keys, which is described in the section Obtaining and deploying developers' keys."
+"Import the transport key(s) into your database. The procedure for "
+"importing transport keys is the same as for\n"
+"importing commit keys, which is described in the section Obtaining and deploying "
+"developers' keys."
msgstr ""
#: i2p2www/pages/site/get-involved/guides/monotone.html:476
msgid ""
-"A separate database should be used for your Monotone server because monotone will lock the database while it is served to others.\n"
+"A separate database should be used for your Monotone server because "
+"monotone will lock the database while it is served to others.\n"
" Make a copy of your development database, then start the server with:"
msgstr ""
#: i2p2www/pages/site/get-involved/guides/monotone.html:483
msgid ""
-"If your key is protected with a passphrase, Monotone may request the passphrase\n"
-" when the first client connects. You can work around this by connecting making the first client connection to your server\n"
+"If your key is protected with a passphrase, Monotone may request the "
+"passphrase\n"
+" when the first client connects. You can work around this by connecting "
+"making the first client connection to your server\n"
" (or by clearing the password for your transport key)."
msgstr ""
#: i2p2www/pages/site/get-involved/guides/monotone.html:491
msgid ""
-"For your server to be accessible for others over I2P, you will need to create a\n"
-" server tunnel for it. Use the \"Standard\" tunnel type and \"Bulk\" profile."
+"For your server to be accessible for others over I2P, you will need to "
+"create a\n"
+" server tunnel for it. Use the \"Standard\" tunnel type and \"Bulk\" "
+"profile."
msgstr ""
#: i2p2www/pages/site/get-involved/guides/monotone.html:501
msgid ""
"Debian (amongst other distributions) has integrated Monotone into their\n"
-" framework of daemons/services. Although Monotone servers can still be run\n"
-" \"the ordinary way\" on Debian systems, doing it the \"Debian way\" may be more straightforward."
+" framework of daemons/services. Although Monotone servers can still be "
+"run\n"
+" \"the ordinary way\" on Debian systems, doing it the \"Debian way\" may"
+" be more straightforward."
msgstr ""
#: i2p2www/pages/site/get-involved/guides/monotone.html:509
@@ -2809,7 +3222,8 @@ msgid ""
"Permissions are granted by editing the files\n"
" /etc/monotone/read-permissions
and\n"
" /etc/monotone/write-permissions
. You'll also need to edit\n"
-" /etc/default/monotone
to enable monotone to start at boot or to\n"
+" /etc/default/monotone
to enable monotone to start at boot "
+"or to\n"
" customize the host, port, or database location."
msgstr ""
@@ -2822,7 +3236,8 @@ msgid ""
"\n"
"So you want to start work on I2P? Great!\n"
"Here's a quick guide to getting started\n"
-"on contributing to the website or the software, doing development or creating translations."
+"on contributing to the website or the software, doing development or "
+"creating translations."
msgstr ""
#: i2p2www/pages/site/get-involved/guides/new-developers.html:9
@@ -2875,8 +3290,10 @@ msgstr ""
#: i2p2www/pages/site/get-involved/guides/new-developers.html:29
msgid ""
-"Basic development on the I2P router or the embedded applications uses Java as the main development language.\n"
-"If you don't have experience with Java, you can always have a look at Thinking in Java."
+"Basic development on the I2P router or the embedded applications uses "
+"Java as the main development language.\n"
+"If you don't have experience with Java, you can always have a look at Thinking in Java."
msgstr ""
#: i2p2www/pages/site/get-involved/guides/new-developers.html:33
@@ -2886,7 +3303,8 @@ msgid ""
"the other \"how\" documents,\n"
"the tech intro,\n"
"and associated documents.\n"
-"These will give you a good overview of how I2P is structured and what different things it does."
+"These will give you a good overview of how I2P is structured and what "
+"different things it does."
msgstr ""
#: i2p2www/pages/site/get-involved/guides/new-developers.html:43
@@ -2899,19 +3317,22 @@ msgstr ""
msgid ""
"Install monotone.\n"
"Monotone is a version control system.\n"
-"We use it because it allows us to keep track of who does what changes to the source code (and for a lot of complicated things, but 'keeping track of changes' is the basic idea)."
+"We use it because it allows us to keep track of who does what changes to "
+"the source code (and for a lot of complicated things, but 'keeping track "
+"of changes' is the basic idea)."
msgstr ""
#: i2p2www/pages/site/get-involved/guides/new-developers.html:53
msgid ""
-"Skim over the monotone"
-" tutorial, to make sure you understand the concepts."
+"Skim over the monotone tutorial,"
+" to make sure you understand the concepts."
msgstr ""
#: i2p2www/pages/site/get-involved/guides/new-developers.html:57
msgid ""
-"If you want to remain anonymous, you need to do an additional step, to set "
-"up a connection to a monotone server over I2P:"
+"If you want to remain anonymous, you need to do an additional step, to "
+"set up a connection to a monotone server over I2P:"
msgstr ""
#: i2p2www/pages/site/get-involved/guides/new-developers.html:60
@@ -2929,22 +3350,24 @@ msgstr ""
#: i2p2www/pages/site/get-involved/guides/new-developers.html:67
msgid ""
-"Define the trust list by creating ~/.monotone/monotonerc
(or "
-"_MTN/monotonerc
in the i2p.i2p workspace) with the following "
-"contents:"
+"Define the trust list by creating ~/.monotone/monotonerc
(or"
+" _MTN/monotonerc
in the i2p.i2p workspace) with the "
+"following contents:"
msgstr ""
#: i2p2www/pages/site/get-involved/guides/new-developers.html:72
#, python-format
msgid ""
-"Copy and paste the developer's commit keys into a new file (e.g. keys.txt
) in the same directory\n"
-" that i2p.mtn
is in. Import the keys into your database with mtn -d i2p.mtn read < keys.txt
"
+"Copy and paste the developer's commit keys "
+"into a new file (e.g. keys.txt
) in the same directory\n"
+" that i2p.mtn
is in. Import the keys into your database "
+"with mtn -d i2p.mtn read < keys.txt
"
msgstr ""
#: i2p2www/pages/site/get-involved/guides/new-developers.html:76
msgid ""
-"Pull the I2P sources to your machine. This may take a long time, especially "
-"if you are doing this over I2P!"
+"Pull the I2P sources to your machine. This may take a long time, "
+"especially if you are doing this over I2P!"
msgstr ""
#: i2p2www/pages/site/get-involved/guides/new-developers.html:78
@@ -2957,20 +3380,20 @@ msgstr ""
#: i2p2www/pages/site/get-involved/guides/new-developers.html:83
msgid ""
-"Alternatively, instead of 'mtn.i2p2.de', you can also download from mtn.i2p-"
-"projekt.de."
+"Alternatively, instead of 'mtn.i2p2.de', you can also download from mtn"
+".i2p-projekt.de."
msgstr ""
#: i2p2www/pages/site/get-involved/guides/new-developers.html:90
msgid ""
-"All the sources are now present on your machine, in the database file. To "
-"make them available in a directory, you need to check them out:"
+"All the sources are now present on your machine, in the database file. To"
+" make them available in a directory, you need to check them out:"
msgstr ""
#: i2p2www/pages/site/get-involved/guides/new-developers.html:92
msgid ""
-"The above command creates a directory i2p.i2p, which contains all of the I2P"
-" sources."
+"The above command creates a directory i2p.i2p, which contains all of the "
+"I2P sources."
msgstr ""
#: i2p2www/pages/site/get-involved/guides/new-developers.html:96
@@ -2980,21 +3403,23 @@ msgstr ""
#: i2p2www/pages/site/get-involved/guides/new-developers.html:97
msgid ""
"\n"
-"To download the website files instead of the I2P source files, use 'i2p.www' instead of 'i2p.i2p'."
+"To download the website files instead of the I2P source files, use "
+"'i2p.www' instead of 'i2p.i2p'."
msgstr ""
#: i2p2www/pages/site/get-involved/guides/new-developers.html:100
msgid ""
"The initial pull may take several hours using the tunnel.\n"
-"If it fails after a partial pull, simply rerun it, it will start where it left off.\n"
+"If it fails after a partial pull, simply rerun it, it will start where it"
+" left off.\n"
"If you are in a hurry, use the non-anonymous access."
msgstr ""
#: i2p2www/pages/site/get-involved/guides/new-developers.html:105
#, python-format
msgid ""
-"A full list of branches, including i2p.i2p and i2p.www can be found on viewmtn."
+"A full list of branches, including i2p.i2p and i2p.www can be found on viewmtn."
msgstr ""
#: i2p2www/pages/site/get-involved/guides/new-developers.html:108
@@ -3007,11 +3432,13 @@ msgstr ""
#: i2p2www/pages/site/get-involved/guides/new-developers.html:114
#, python-format
msgid ""
-"To compile the code, you need the Sun Java Development Kit 6 or higher, or equivalent JDK\n"
+"To compile the code, you need the Sun Java Development Kit 6 or higher, "
+"or equivalent JDK\n"
"(Sun JDK 6 strongly recommended) and\n"
"Apache ant\n"
"version 1.7.0 or higher.\n"
-"If you go are working on the main I2P code, you can go into the i2p.i2p directory and run 'ant' to see the build options."
+"If you go are working on the main I2P code, you can go into the i2p.i2p "
+"directory and run 'ant' to see the build options."
msgstr ""
#: i2p2www/pages/site/get-involved/guides/new-developers.html:122
@@ -3040,8 +3467,10 @@ msgstr ""
#: i2p2www/pages/site/get-involved/guides/new-developers.html:143
#, python-format
msgid ""
-"See the bottom of the licenses page for\n"
-"commit privilege requirements. You need these to put code into i2p.i2p (not required for the website!)."
+"See the bottom of the licenses page "
+"for\n"
+"commit privilege requirements. You need these to put code into i2p.i2p "
+"(not required for the website!)."
msgstr ""
#: i2p2www/pages/site/get-involved/guides/new-developers.html:148
@@ -3086,32 +3515,42 @@ msgstr ""
#: i2p2www/pages/site/get-involved/guides/new-developers.html:163
#, python-format
msgid ""
-"The developers hang around on IRC. They can be reached on the Freenode network, OFTC, and on the I2P internal networks. The usual place to look is #i2p-dev. Join the channel and say hi!\n"
-"We also have additional guidelines for regular developers."
+"The developers hang around on IRC. They can be reached on the Freenode "
+"network, OFTC, and on the I2P internal networks. The usual place to look "
+"is #i2p-dev. Join the channel and say hi!\n"
+"We also have additional guidelines for regular"
+" developers."
msgstr ""
#: i2p2www/pages/site/get-involved/guides/new-developers.html:169
#, python-format
msgid ""
-"Website and router console translators: See the New Translator's Guide\n"
+"Website and router console translators: See the New Translator's Guide\n"
"for next steps."
msgstr ""
#: i2p2www/pages/site/get-involved/guides/new-developers.html:175
msgid ""
"I2P is open source software that is mostly developed using open sourced\n"
-"toolkits. The I2P project recently acquired a license for the YourKit Java\n"
-"Profiler. Open source projects are eligible to receive a free license provided\n"
-"that YourKit is referenced on the project web site. Please get in touch if you\n"
+"toolkits. The I2P project recently acquired a license for the YourKit "
+"Java\n"
+"Profiler. Open source projects are eligible to receive a free license "
+"provided\n"
+"that YourKit is referenced on the project web site. Please get in touch "
+"if you\n"
"are interested in profiling the I2P codebase."
msgstr ""
#: i2p2www/pages/site/get-involved/guides/new-developers.html:183
#, python-format
msgid ""
-"YourKit is kindly supporting open source projects with its full-featured Java Profiler.\n"
-"YourKit, LLC is the creator of innovative and intelligent tools for profiling\n"
-"Java and .NET applications. Take a look at YourKit's leading software products:\n"
+"YourKit is kindly supporting open source projects with its full-featured "
+"Java Profiler.\n"
+"YourKit, LLC is the creator of innovative and intelligent tools for "
+"profiling\n"
+"Java and .NET applications. Take a look at YourKit's leading software "
+"products:\n"
"YourKit Java Profiler and\n"
"YourKit .NET Profiler."
msgstr ""
@@ -3131,9 +3570,11 @@ msgstr ""
#: i2p2www/pages/site/get-involved/guides/new-translators.html:8
#, python-format
msgid ""
-"Translation of the website is done with .po files. The easiest way by far to\n"
+"Translation of the website is done with .po files. The easiest way by far"
+" to\n"
"translate the website is to sign up for an account at \n"
-"Transifex and request to join a translation team. \n"
+"Transifex and request to join a translation"
+" team. \n"
"Alternatively it can be done \"the old way\" as outlined below."
msgstr ""
@@ -3148,8 +3589,10 @@ msgstr ""
msgid ""
"Come to #i2p-dev on irc and talk to people.\n"
"Claim the language -\n"
-"To make sure other coworkers don't bump onto the files you are working on,\n"
-"please update the translation status on this wiki page."
+"To make sure other coworkers don't bump onto the files you are working "
+"on,\n"
+"please update the translation status on this wiki "
+"page."
msgstr ""
#: i2p2www/pages/site/get-involved/guides/new-translators.html:25
@@ -3169,9 +3612,12 @@ msgstr ""
#: i2p2www/pages/site/get-involved/guides/new-translators.html:38
msgid ""
-"Run \"./extract-messages.sh
\" to generate a messages.pot
in the base directory.\n"
-"Edit the header of this file, then run \"./init-new-po.sh locale
\" to generate the file\n"
-"i2p2www/translations/locale/LC_MESSAGES/messages.po
. \"mtn add
\" this file."
+"Run \"./extract-messages.sh
\" to generate a "
+"messages.pot
in the base directory.\n"
+"Edit the header of this file, then run \"./init-new-po.sh "
+"locale
\" to generate the file\n"
+"i2p2www/translations/locale/LC_MESSAGES/messages.po
. "
+"\"mtn add
\" this file."
msgstr ""
#: i2p2www/pages/site/get-involved/guides/new-translators.html:43
@@ -3182,23 +3628,27 @@ msgstr ""
#: i2p2www/pages/site/get-involved/guides/new-translators.html:46
msgid ""
-"Add a flag image file to i2p2www/static/images/flags/
for the "
-"menu (copy from the router)."
+"Add a flag image file to i2p2www/static/images/flags/
for "
+"the menu (copy from the router)."
msgstr ""
#: i2p2www/pages/site/get-involved/guides/new-translators.html:52
msgid ""
"Edit files:\n"
"Edit i2p2www/translations/locale/LC_MESSAGES/messages.po
.\n"
-"To work with .po files efficiently, you may wish to use POEdit"
+"To work with .po files efficiently, you may wish to use POEdit"
msgstr ""
#: i2p2www/pages/site/get-involved/guides/new-translators.html:58
#: i2p2www/pages/site/get-involved/guides/new-translators.html:151
msgid ""
"Check in:\n"
-"\"mtn pull
\", \"mtn update
\". Then check in by \"mtn ci -k yourname@mail.i2p file1 file2 ...
\"\n"
-"This collects the diff info of your changed file into your local repo. Then \"mtn sync mtn.i2p2.de -k yourname-transport@mail.i2p i2p.i2p
\".\n"
+"\"mtn pull
\", \"mtn update
\". Then check in by "
+"\"mtn ci -k yourname@mail.i2p file1 file2 ...
\"\n"
+"This collects the diff info of your changed file into your local repo. "
+"Then \"mtn sync mtn.i2p2.de -k yourname-transport@mail.i2p "
+"i2p.i2p
\".\n"
"This synchronizes your local repo with the repo on the target machine."
msgstr ""
@@ -3214,8 +3664,10 @@ msgstr ""
#: i2p2www/pages/site/get-involved/guides/new-translators.html:74
#, python-format
msgid ""
-"The easiest way by far to translate the router console is to sign up for an account at \n"
-"Transifex and request to join a translation team. \n"
+"The easiest way by far to translate the router console is to sign up for "
+"an account at \n"
+"Transifex and request to join a translation"
+" team. \n"
"Alternatively it can be done \"the old way\" as outlined below."
msgstr ""
@@ -3233,7 +3685,8 @@ msgstr ""
#: i2p2www/pages/site/get-involved/guides/new-translators.html:101
msgid ""
-"Before starting a console translation, better help translate some i2p webpages first.\n"
+"Before starting a console translation, better help translate some i2p "
+"webpages first.\n"
"At least an i2p homepage in your language would be great."
msgstr ""
@@ -3246,15 +3699,19 @@ msgstr ""
#: i2p2www/pages/site/get-involved/guides/new-translators.html:132
msgid ""
"Where xx is your language code like fr/de/ch/zh/...\n"
-"There may be or may not be files with your lang code. If not, you can create your own. by copying and renaming other language files you know with your own lang code."
+"There may be or may not be files with your lang code. If not, you can "
+"create your own. by copying and renaming other language files you know "
+"with your own lang code."
msgstr ""
#: i2p2www/pages/site/get-involved/guides/new-translators.html:137
msgid ""
"Create files:\n"
-"If the file for your language does not exist yet, copy another language file to a new file foo_xx.bar
for your language.\n"
+"If the file for your language does not exist yet, copy another language "
+"file to a new file foo_xx.bar
for your language.\n"
"Then \"mtn add
\" the file.\n"
-"After creating a .po file, edit the headers. Then run \"ant distclean poupdate
\"."
+"After creating a .po file, edit the headers. Then run \"ant "
+"distclean poupdate
\"."
msgstr ""
#: i2p2www/pages/site/get-involved/guides/new-translators.html:144
@@ -3262,13 +3719,15 @@ msgid ""
"Start to work:\n"
"Edit the HTML files with any text editor.\n"
"Be sure not to use an editor in HTML mode that reformats everything.\n"
-"To work with .po files efficiently, you may wish to use POEdit"
+"To work with .po files efficiently, you may wish to use POEdit"
msgstr ""
#: i2p2www/pages/site/get-involved/guides/new-translators.html:163
msgid ""
"As you can see, it's not that difficult.\n"
-"If you have questions about the meaning of the terms in the console, ask in #i2p-dev
on IRC."
+"If you have questions about the meaning of the terms in the console, ask "
+"in #i2p-dev
on IRC."
msgstr ""
#: i2p2www/pages/site/get-involved/guides/new-translators.html:169
@@ -3277,8 +3736,8 @@ msgstr ""
#: i2p2www/pages/site/get-involved/guides/new-translators.html:171
msgid ""
-"Q: Why do I have to install monotone, Java, jsp, learn about .po files and "
-"html, etc.? Why can't I just do a translation and email it to you?"
+"Q: Why do I have to install monotone, Java, jsp, learn about .po files "
+"and html, etc.? Why can't I just do a translation and email it to you?"
msgstr ""
#: i2p2www/pages/site/get-involved/guides/new-translators.html:175
@@ -3294,65 +3753,67 @@ msgstr ""
#: i2p2www/pages/site/get-involved/guides/new-translators.html:182
msgid ""
-"We don't have anybody who has time to accept manual contributions and submit"
-" them to our source control system on your behalf. Even if we did, it "
-"doesn't scale."
+"We don't have anybody who has time to accept manual contributions and "
+"submit them to our source control system on your behalf. Even if we did, "
+"it doesn't scale."
msgstr ""
#: i2p2www/pages/site/get-involved/guides/new-translators.html:186
msgid ""
"Maybe you are thinking translation is a one-step process. It isn't. You "
"can't do it all at once. You will make mistakes. You need to test it and "
-"tweak it to make it look right before you submit it. Developers will "
-"update or add to the English text, thus requiring a translation update."
+"tweak it to make it look right before you submit it. Developers "
+"will update or add to the English text, thus requiring a translation "
+"update."
msgstr ""
#: i2p2www/pages/site/get-involved/guides/new-translators.html:190
msgid ""
"Having translators use a source control system directly provides "
-"authentication and accountablility - we know who is doing what, and we can "
-"track changes, and revert them if necessary."
+"authentication and accountablility - we know who is doing what, and we "
+"can track changes, and revert them if necessary."
msgstr ""
#: i2p2www/pages/site/get-involved/guides/new-translators.html:194
msgid ""
-".po files are not difficult. If you don't want to work directly with them, "
-"we recommend 'poedit'."
+".po files are not difficult. If you don't want to work directly with "
+"them, we recommend 'poedit'."
msgstr ""
#: i2p2www/pages/site/get-involved/guides/new-translators.html:198
msgid ""
-"HTML files are not difficult. Just ignore the html stuff and translate the "
-"text."
+"HTML files are not difficult. Just ignore the html stuff and translate "
+"the text."
msgstr ""
#: i2p2www/pages/site/get-involved/guides/new-translators.html:202
msgid ""
"Installing and using monotone is not that difficult. Several of the "
-"translators and other contributors to I2P are non-programmers, and they use "
-"monotone regularly. Monotone is simply a source control system, it is not "
-"about \"coding\"."
+"translators and other contributors to I2P are non-programmers, and they "
+"use monotone regularly. Monotone is simply a source control system, it is"
+" not about \"coding\"."
msgstr ""
#: i2p2www/pages/site/get-involved/guides/new-translators.html:206
msgid ""
"Our items to translate are not \"documents\". They are html files and po "
-"files, with a specific format and character encoding (UTF-8) that must be "
-"maintained, and not corrupted by email programs or other methods of "
+"files, with a specific format and character encoding (UTF-8) that must be"
+" maintained, and not corrupted by email programs or other methods of "
"transfer."
msgstr ""
#: i2p2www/pages/site/get-involved/guides/new-translators.html:210
msgid ""
-"We looked at 'pootle' as a front-end for translators. It didn't work well, "
-"needed an administrator, and a pootle-based process would suffer from a "
-"number of the above flaws."
+"We looked at 'pootle' as a front-end for translators. It didn't work "
+"well, needed an administrator, and a pootle-based process would suffer "
+"from a number of the above flaws."
msgstr ""
#: i2p2www/pages/site/get-involved/guides/new-translators.html:215
msgid ""
"In summary:\n"
-"Yes, we know it is somewhat of a hurdle to get started. It's really the only possible way we can do it. Give it a try, it really isn't that hard."
+"Yes, we know it is somewhat of a hurdle to get started. It's really the "
+"only possible way we can do it. Give it a try, it really isn't that hard."
msgstr ""
#: i2p2www/pages/site/get-involved/guides/new-translators.html:220
@@ -3365,3 +3826,4 @@ msgid ""
"The #i2p-dev channel on IRC, or the translation forum on %(zzz)s."
msgstr ""
+
diff --git a/i2p2www/translations/it/LC_MESSAGES/docs.po b/i2p2www/translations/it/LC_MESSAGES/docs.po
index ea3ce1af..138bee24 100644
--- a/i2p2www/translations/it/LC_MESSAGES/docs.po
+++ b/i2p2www/translations/it/LC_MESSAGES/docs.po
@@ -1,25 +1,25 @@
-# Translations template for I2P.
+# Italian translations for I2P.
# Copyright (C) 2014 ORGANIZATION
# This file is distributed under the same license as the I2P project.
-#
+#
# Translators:
# alamir http://i2p-projekt.i2p/hosts.txt (http://udhdrtrcetjm5sxzskjyr5ztpeszydbh4dpl3pl4utgqqw2v4jna.b32.i2p/hosts.txt)
, \n"
+"default is http://i2p-projekt.i2p/hosts.txt "
+"(http://udhdrtrcetjm5sxzskjyr5ztpeszydbh4dpl3pl4utgqqw2v4jna.b32.i2p/hosts.txt)
,"
+" \n"
"which contains a copy of the hosts.txt included\n"
"in the I2P release.\n"
"Users must configure additional subscriptions in their\n"
-"local addressbook application (via subscriptions.txt or SusiDNS)."
+"local addressbook application (via subscriptions.txt or SusiDNS)."
msgstr ""
#: i2p2www/pages/site/docs/naming.html:211
@@ -805,7 +849,8 @@ msgstr ""
#: i2p2www/pages/site/docs/naming.html:218
msgid ""
-"The operators of these services may have various policies for listing hosts.\n"
+"The operators of these services may have various policies for listing "
+"hosts.\n"
"Presence on this list does not imply endorsement."
msgstr ""
@@ -816,10 +861,12 @@ msgstr ""
#: i2p2www/pages/site/docs/naming.html:224
msgid ""
-"While there are hopefully not any technical limitations within I2P on host names,\n"
+"While there are hopefully not any technical limitations within I2P on "
+"host names,\n"
"the addressbook enforces several restrictions on host names\n"
"imported from subscriptions.\n"
-"It does this for basic typographical sanity and compatibility with browsers,\n"
+"It does this for basic typographical sanity and compatibility with "
+"browsers,\n"
"and for security.\n"
"The rules are essentially the same as those in RFC2396 Section 3.2.2.\n"
"Any hostnames violating these rules may not be propagated\n"
@@ -832,13 +879,13 @@ msgstr ""
#: i2p2www/pages/site/docs/naming.html:243
msgid ""
-"Names are checked for conflict with existing names in the existing userhosts.txt and hosts.txt\n"
+"Names are checked for conflict with existing names in the existing "
+"userhosts.txt and hosts.txt\n"
"(but not privatehosts.txt) after conversion to lower case."
msgstr ""
#: i2p2www/pages/site/docs/naming.html:248
-msgid ""
-"Must contain only [a-z] [0-9] '.' and '-' after conversion to lower case."
+msgid "Must contain only [a-z] [0-9] '.' and '-' after conversion to lower case."
msgstr ""
#: i2p2www/pages/site/docs/naming.html:252
@@ -874,7 +921,8 @@ msgstr ""
#: i2p2www/pages/site/docs/naming.html:280
msgid ""
"Certain hostnames reserved for project use are not allowed\n"
-"(proxy.i2p, router.i2p, console.i2p, *.proxy.i2p, *.router.i2p, *.console.i2p, and others)"
+"(proxy.i2p, router.i2p, console.i2p, *.proxy.i2p, *.router.i2p, "
+"*.console.i2p, and others)"
msgstr ""
#: i2p2www/pages/site/docs/naming.html:285
@@ -897,8 +945,8 @@ msgstr ""
#: i2p2www/pages/site/docs/naming.html:302
msgid ""
-"Any name received via subscription that passes all the checks is added via "
-"the local naming service."
+"Any name received via subscription that passes all the checks is added "
+"via the local naming service."
msgstr ""
#: i2p2www/pages/site/docs/naming.html:306
@@ -915,15 +963,19 @@ msgstr ""
#: i2p2www/pages/site/docs/naming.html:317
msgid ""
-"International Domain Names (IDN) also work in i2p (using punycode 'xn--' form).\n"
-"To see IDN .i2p domain names rendered correctly in Firefox's location bar,\n"
+"International Domain Names (IDN) also work in i2p (using punycode 'xn--' "
+"form).\n"
+"To see IDN .i2p domain names rendered correctly in Firefox's location "
+"bar,\n"
"add 'network.IDN.whitelist.i2p (boolean) = true' in about:config."
msgstr ""
#: i2p2www/pages/site/docs/naming.html:323
msgid ""
-"As the addressbook application does not use privatehosts.txt at all, in practice\n"
-"this file is the only place where it is appropriate to place private aliases or\n"
+"As the addressbook application does not use privatehosts.txt at all, in "
+"practice\n"
+"this file is the only place where it is appropriate to place private "
+"aliases or\n"
"\"pet names\" for sites already in hosts.txt."
msgstr ""
@@ -934,14 +986,16 @@ msgstr ""
#: i2p2www/pages/site/docs/naming.html:330
msgid ""
"Addressbook will publish the merged hosts.txt to a location\n"
-"(traditionally hosts.txt in the local eepsite's home directory) to be accessed by others\n"
+"(traditionally hosts.txt in the local eepsite's home directory) to be "
+"accessed by others\n"
"for their subscriptions.\n"
"This step is optional and is disabled by default."
msgstr ""
#: i2p2www/pages/site/docs/naming.html:338
msgid ""
-"The addressbook application, together with eepget, saves the Etag and/or Last-Modified\n"
+"The addressbook application, together with eepget, saves the Etag and/or "
+"Last-Modified\n"
"information returned by the web server of the subscription.\n"
"This greatly reduces the bandwidth required, as the web server will\n"
"return a '304 Not Modified' on the next fetch if nothing has changed."
@@ -958,7 +1012,8 @@ msgid ""
"Hosts serving a static hosts.txt or an equivalent CGI application\n"
"are strongly encouraged to deliver\n"
"a Content-Length header, and either an Etag or Last-Modified header.\n"
-"Also ensure that the server delivers a '304 Not Modified' when appropriate.\n"
+"Also ensure that the server delivers a '304 Not Modified' when "
+"appropriate.\n"
"This will dramatically reduce the network bandwidth, and\n"
"reduce chances of corruption."
msgstr ""
@@ -969,7 +1024,8 @@ msgstr ""
#: i2p2www/pages/site/docs/naming.html:360
msgid ""
-"A host add service is a simple CGI application that takes a hostname and a Base64 key as parameters\n"
+"A host add service is a simple CGI application that takes a hostname and "
+"a Base64 key as parameters\n"
"and adds that to its local hosts.txt.\n"
"If other routers subscribe to that hosts.txt, the new hostname/key\n"
"will be propagated through the network."
@@ -977,8 +1033,10 @@ msgstr ""
#: i2p2www/pages/site/docs/naming.html:367
msgid ""
-"It is recommended that host add services impose, at a minimum, the restrictions imposed by the addressbook application listed above.\n"
-"Host add services may impose additional restrictions on hostnames and keys, for example:"
+"It is recommended that host add services impose, at a minimum, the "
+"restrictions imposed by the addressbook application listed above.\n"
+"Host add services may impose additional restrictions on hostnames and "
+"keys, for example:"
msgstr ""
#: i2p2www/pages/site/docs/naming.html:372
@@ -1031,8 +1089,10 @@ msgstr ""
#: i2p2www/pages/site/docs/naming.html:418
msgid ""
-"A jump service is a simple CGI application that takes a hostname as a parameter\n"
-"and returns a 301 redirect to the proper URL with a ?i2paddresshelper=key
\n"
+"A jump service is a simple CGI application that takes a hostname as a "
+"parameter\n"
+"and returns a 301 redirect to the proper URL with a "
+"?i2paddresshelper=key
\n"
"string appended.\n"
"The HTTP proxy will interpret the appended string and\n"
"use that key as the actual destination.\n"
@@ -1055,14 +1115,16 @@ msgstr ""
#: i2p2www/pages/site/docs/naming.html:440
msgid ""
-"SusiDNS is simply a web interface front-end to configuring addressbook subscriptions\n"
+"SusiDNS is simply a web interface front-end to configuring addressbook "
+"subscriptions\n"
"and accessing the four addressbook files.\n"
"All the real work is done by the 'addressbook' application."
msgstr ""
#: i2p2www/pages/site/docs/naming.html:446
msgid ""
-"Currently, there is little enforcement of addressbook naming rules within SusiDNS,\n"
+"Currently, there is little enforcement of addressbook naming rules within"
+" SusiDNS,\n"
"so a user may enter hostnames locally that would be rejected by\n"
"the addressbook subscription rules."
msgstr ""
@@ -1076,29 +1138,36 @@ msgid ""
"I2P supports Base32 hostnames similar to Tor's .onion addresses.\n"
"Base32 addresses are much shorter and easier to handle than the\n"
"full 516-character Base64 Destinations or addresshelpers.\n"
-"Example: ukeu3k5oycgaauneqgtnvselmt4yemvoilkln7jpvamvfx7dnkdq.b32.i2p
"
+"Example: "
+"ukeu3k5oycgaauneqgtnvselmt4yemvoilkln7jpvamvfx7dnkdq.b32.i2p
"
msgstr ""
#: i2p2www/pages/site/docs/naming.html:460
#, python-format
msgid ""
-"In Tor, the address is 16 characters (80 bits), or half of the SHA-1 hash.\n"
+"In Tor, the address is 16 characters (80 bits), or half of the SHA-1 "
+"hash.\n"
"I2P uses 52 characters (256 bits) to represent the full SHA-256 hash.\n"
"The form is {52 chars}.b32.i2p.\n"
"Tor has recently published a\n"
-"proposal\n"
-"to convert to an identical format of {52 chars}.onion for their hidden services.\n"
+"proposal\n"
+"to convert to an identical format of {52 chars}.onion for their hidden "
+"services.\n"
"Base32 is implemented in the naming service, which queries the\n"
"router over I2CP to lookup the LeaseSet to get the full Destination.\n"
-"Base32 lookups will only be successful when the Destination is up and publishing\n"
+"Base32 lookups will only be successful when the Destination is up and "
+"publishing\n"
"a LeaseSet.\n"
-"Because resolution may require a network database lookup, it may take significantly\n"
+"Because resolution may require a network database lookup, it may take "
+"significantly\n"
"longer than a local address book lookup."
msgstr ""
#: i2p2www/pages/site/docs/naming.html:475
msgid ""
-"Base32 addresses can be used in most places where hostnames or full destinations\n"
+"Base32 addresses can be used in most places where hostnames or full "
+"destinations\n"
"are used, however there are some exceptions where they may fail if the\n"
"name does not immediately resolve. I2PTunnel will fail, for example, if\n"
"the name does not resolve to a destination."
@@ -1125,7 +1194,8 @@ msgstr ""
#: i2p2www/pages/site/docs/plugins.html:12
msgid ""
-"There are now plugins available that support distributed email, blogs, IRC\n"
+"There are now plugins available that support distributed email, blogs, "
+"IRC\n"
"clients, distributed file storage, wikis, and more."
msgstr ""
@@ -1145,7 +1215,8 @@ msgstr ""
#: i2p2www/pages/site/docs/plugins.html:31
msgid ""
-"Support large or special-purpose applications that would never be bundled\n"
+"Support large or special-purpose applications that would never be bundled"
+"\n"
"with the I2P installation"
msgstr ""
@@ -1159,8 +1230,8 @@ msgstr ""
#: i2p2www/pages/site/docs/plugins.html:44
msgid ""
-"Separate initial install and update packages, if desired, for smaller update"
-" downloads"
+"Separate initial install and update packages, if desired, for smaller "
+"update downloads"
msgstr ""
#: i2p2www/pages/site/docs/plugins.html:48
@@ -1190,8 +1261,7 @@ msgid ""
msgstr ""
#: i2p2www/pages/site/docs/plugins.html:70
-msgid ""
-"Automatic integration and startup of webapps into console Jetty instance"
+msgid "Automatic integration and startup of webapps into console Jetty instance"
msgstr ""
#: i2p2www/pages/site/docs/plugins.html:74
@@ -1231,21 +1301,32 @@ msgstr "Installazione"
#: i2p2www/pages/site/docs/plugins.html:101
msgid ""
-"To install and start a plugin, copy the .xpi2p
install link to\n"
+"To install and start a plugin, copy the .xpi2p
install link "
+"to\n"
"the form at the bottom of\n"
-"configclients.jsp in\n"
-"your router console and click the \"install plugin\" button. After a\n"
-"plugin is installed and started, a link to the plugin will usually appear at\n"
+"configclients.jsp"
+" in\n"
+"your router console and click the \"install plugin\" button. After a"
+"\n"
+"plugin is installed and started, a link to the plugin will usually appear"
+" at\n"
"the top of your summary bar."
msgstr ""
#: i2p2www/pages/site/docs/plugins.html:110
msgid ""
-"To update a plugin to the latest version, just click the update button on\n"
-"configclients.jsp.\n"
-"There is also a button to check if the plugin has a more recent version, as\n"
-"well as a button to check for updates for all plugins. Plugins will be checked\n"
-"for updates automatically when updating to a new I2P release (not including dev\n"
+"To update a plugin to the latest version, just click the update button on"
+"\n"
+"configclients.jsp."
+"\n"
+"There is also a button to check if the plugin has a more recent version, "
+"as\n"
+"well as a button to check for updates for all plugins. Plugins will be "
+"checked\n"
+"for updates automatically when updating to a new I2P release (not "
+"including dev\n"
"builds)."
msgstr ""
@@ -1256,21 +1337,25 @@ msgstr "Sviluppo "
#: i2p2www/pages/site/docs/plugins.html:121
#, python-format
msgid ""
-"See the latest plugin specification and the\n"
+"See the latest plugin specification and "
+"the\n"
"plugin forum on %(zzz)s."
msgstr ""
#: i2p2www/pages/site/docs/plugins.html:126
#, python-format
msgid ""
-"See also the sources for plugins developed by various people. Some plugins, such\n"
-"as snowman, were developed\n"
+"See also the sources for plugins developed by various people. Some "
+"plugins, such\n"
+"as snowman, were "
+"developed\n"
"specifically as examples."
msgstr ""
#: i2p2www/pages/site/docs/plugins.html:132
msgid ""
-"Developers wanted! Plugins are a great way to learn more about I2P\n"
+"Developers wanted! Plugins are a great way to learn more about I2P"
+"\n"
"or easily add some feature."
msgstr ""
@@ -1282,7 +1367,8 @@ msgstr ""
#, python-format
msgid ""
"To create a plugin from an existing binary package you will need to get\n"
-"makeplugin.sh from the i2p.scripts branch in monotone."
+"makeplugin.sh from the i2p.scripts branch in "
+"monotone."
msgstr ""
#: i2p2www/pages/site/docs/plugins.html:144
@@ -1298,7 +1384,8 @@ msgstr ""
#: i2p2www/pages/site/docs/plugins.html:151
msgid ""
"Updates of a plugin with included jars (not wars) won't be recognized if\n"
-"the plugin was already run, as it requires class loader trickery to flush the\n"
+"the plugin was already run, as it requires class loader trickery to flush"
+" the\n"
"class cache; a full router restart is required."
msgstr ""
@@ -1308,27 +1395,32 @@ msgstr ""
#: i2p2www/pages/site/docs/plugins.html:161
msgid ""
-"Plugins running in a separate JVM create a logs/
directory in\n"
+"Plugins running in a separate JVM create a logs/
directory "
+"in\n"
"$CWD
."
msgstr ""
#: i2p2www/pages/site/docs/plugins.html:166
msgid ""
-"No initial keys are present, except for those of jrandom and zzz (using the\n"
+"No initial keys are present, except for those of jrandom and zzz (using "
+"the\n"
"same keys as for router update), so the first key seen for a signer is\n"
"automatically accepted—there is no signing key authority."
msgstr ""
#: i2p2www/pages/site/docs/plugins.html:172
msgid ""
-"When deleting a plugin, the directory is not always deleted, especially on\n"
+"When deleting a plugin, the directory is not always deleted, especially "
+"on\n"
"Windows."
msgstr ""
#: i2p2www/pages/site/docs/plugins.html:177
msgid ""
-"Installing a plugin requiring Java 1.6 on a Java 1.5 machine will result in a\n"
-"\"plugin is corrupt\" message if pack200 compression of the plugin file is used."
+"Installing a plugin requiring Java 1.6 on a Java 1.5 machine will result "
+"in a\n"
+"\"plugin is corrupt\" message if pack200 compression of the plugin file "
+"is used."
msgstr ""
#: i2p2www/pages/site/docs/plugins.html:182
@@ -1349,7 +1441,8 @@ msgstr "Maggio 2013"
#: i2p2www/pages/site/docs/ports.html:7
msgid ""
-"These are the ports used or reserved by I2P, including those for known plugins,\n"
+"These are the ports used or reserved by I2P, including those for known "
+"plugins,\n"
"common alternates,\n"
"and some typical related applications."
msgstr ""
@@ -1403,7 +1496,8 @@ msgstr ""
msgid ""
"BOB does not hold keypair values, nor does the router.\n"
"Your application holds the keypair values. \n"
-"This is to reduce any extra complexity in the router code, it also adds to\n"
+"This is to reduce any extra complexity in the router code, it also adds "
+"to\n"
"your privacy."
msgstr ""
@@ -1426,25 +1520,27 @@ msgstr ""
#: i2p2www/pages/site/docs/api/bob.html:48
msgid ""
"ERROR
as is implied returns the message \"ERROR "
-"\"+DESCRIPTION+\"\\n\"
, where the DESCRIPTION
is what "
-"went wrong."
+"\"+DESCRIPTION+\"\\n\", where the DESCRIPTION
is what"
+" went wrong."
msgstr ""
#: i2p2www/pages/site/docs/api/bob.html:51
msgid ""
-"OK
returns \"OK\"
, and if data is to be returned, "
-"it is on the same line. OK
means the command is finished."
+"OK
returns \"OK\"
, and if data is to be "
+"returned, it is on the same line. OK
means the command is "
+"finished."
msgstr ""
#: i2p2www/pages/site/docs/api/bob.html:54
msgid ""
-"DATA
lines contain information that you requested. There may be"
-" multiple DATA
lines per request."
+"DATA
lines contain information that you requested. There may"
+" be multiple DATA
lines per request."
msgstr ""
#: i2p2www/pages/site/docs/api/bob.html:58
msgid ""
-"NOTE: The help command is the ONLY command that has an exception to\n"
+"NOTE: The help command is the ONLY command that has an exception "
+"to\n"
"the rules... it can actually return nothing! This is intentional, since\n"
"help is a HUMAN and not an APPLICATION command."
msgstr ""
@@ -1452,14 +1548,16 @@ msgstr ""
#: i2p2www/pages/site/docs/api/bob.html:64
msgid ""
"PLEASE NOTE:\n"
-"For CURRENT details on the commands PLEASE use the built-in help command. \n"
-"Just telnet to localhost 2827 and type help and you can get full documentation on each command."
+"For CURRENT details on the commands PLEASE use the built-in help command."
+" \n"
+"Just telnet to localhost 2827 and type help and you can get full "
+"documentation on each command."
msgstr ""
#: i2p2www/pages/site/docs/api/bob.html:70
msgid ""
-"Commands never get obsoleted or changed, however new commands do get added "
-"from time to time."
+"Commands never get obsoleted or changed, however new commands do get "
+"added from time to time."
msgstr ""
#: i2p2www/pages/site/docs/api/bob.html:74
@@ -1480,30 +1578,46 @@ msgstr ""
#: i2p2www/pages/site/docs/api/bob.html:106
msgid ""
-"Once set up, all TCP sockets can and will block as needed, and there is no need for any \n"
-"additional messages to/from the command channel. This allows the router to pace the\n"
-"stream without exploding with OOM like SAM does as it chokes on attempting to shove \n"
-"many streams in or out one socket -- that can't scale when you have alot of connections!"
+"Once set up, all TCP sockets can and will block as needed, and there is "
+"no need for any \n"
+"additional messages to/from the command channel. This allows the router "
+"to pace the\n"
+"stream without exploding with OOM like SAM does as it chokes on "
+"attempting to shove \n"
+"many streams in or out one socket -- that can't scale when you have alot "
+"of connections!"
msgstr ""
#: i2p2www/pages/site/docs/api/bob.html:113
msgid ""
-"What is also nice about this particular interface is that writing anything to interface \n"
-"to it, is much much easier than SAM. There is no other processing to do after the set up.\n"
-"It's configuration is so simple, that very simple tools, such as nc (netcat) can be used \n"
-"to point to some application. The value there is that one could schedule up and down times \n"
-"for an application, and not have to change the application to do that, or to even have \n"
-"to stop that application. Instead, you can literally \"unplug\" the destination, and \n"
-"\"plug it in\" again. As long as the same IP/port addresses and destination keys are used \n"
-"when bringing the bridge up, the normal TCP application won't care, and won't notice.\n"
-"It will simply be fooled -- the destinations are not reachable, and that nothing is coming in."
+"What is also nice about this particular interface is that writing "
+"anything to interface \n"
+"to it, is much much easier than SAM. There is no other processing to do "
+"after the set up.\n"
+"It's configuration is so simple, that very simple tools, such as nc "
+"(netcat) can be used \n"
+"to point to some application. The value there is that one could schedule "
+"up and down times \n"
+"for an application, and not have to change the application to do that, or"
+" to even have \n"
+"to stop that application. Instead, you can literally \"unplug\" the "
+"destination, and \n"
+"\"plug it in\" again. As long as the same IP/port addresses and "
+"destination keys are used \n"
+"when bringing the bridge up, the normal TCP application won't care, and "
+"won't notice.\n"
+"It will simply be fooled -- the destinations are not reachable, and that "
+"nothing is coming in."
msgstr ""
#: i2p2www/pages/site/docs/api/bob.html:125
msgid ""
-"For the following example, we'll setup a very simple local loopback connection, \n"
-"with two destinations. Destination \"mouth\" will be the CHARGEN service from \n"
-"the INET superserver daemon. Destination \"ear\" will be a local port that you\n"
+"For the following example, we'll setup a very simple local loopback "
+"connection, \n"
+"with two destinations. Destination \"mouth\" will be the CHARGEN service "
+"from \n"
+"the INET superserver daemon. Destination \"ear\" will be a local port "
+"that you\n"
"can telnet into, and watch the pretty ASCII test puke forth."
msgstr ""
@@ -1552,28 +1666,30 @@ msgstr ""
#: i2p2www/pages/site/docs/api/bob.html:158
msgid ""
-"At this point, there was no error, a destination with a nickname of \"mouth\" \n"
-"is set up. When you contact the destination provided, you actually connect \n"
+"At this point, there was no error, a destination with a nickname of "
+"\"mouth\" \n"
+"is set up. When you contact the destination provided, you actually "
+"connect \n"
"to the CHARGEN
service on 19/TCP
."
msgstr ""
#: i2p2www/pages/site/docs/api/bob.html:164
-msgid ""
-"Now for the other half, so that we can actually contact this destination."
+msgid "Now for the other half, so that we can actually contact this destination."
msgstr ""
#: i2p2www/pages/site/docs/api/bob.html:184
msgid ""
"Now all we need to do is telnet into 127.0.0.1, port 37337,\n"
-"send the destination key or host address from addressbook we want to contact.\n"
+"send the destination key or host address from addressbook we want to "
+"contact.\n"
"In this case, we want to contact \"mouth\", all we do is paste in the\n"
"key and it goes."
msgstr ""
#: i2p2www/pages/site/docs/api/bob.html:191
msgid ""
-"NOTE: The \"quit\" command in the command channel does NOT disconnect"
-" the tunnels like SAM."
+"NOTE: The \"quit\" command in the command channel does NOT "
+"disconnect the tunnels like SAM."
msgstr ""
#: i2p2www/pages/site/docs/api/bob.html:208
@@ -1590,10 +1706,14 @@ msgstr ""
#: i2p2www/pages/site/docs/api/bob.html:261
msgid ""
-"Pretty cool isn't it? Try some other well known EEPSITES if you like, nonexistent ones, \n"
-"etc, to get a feel for what kind of output to expect in different situations. \n"
-"For the most part, it is suggested that you ignore any of the error messages. \n"
-"They would be meaningless to the application, and are only presented for human debugging."
+"Pretty cool isn't it? Try some other well known EEPSITES if you like, "
+"nonexistent ones, \n"
+"etc, to get a feel for what kind of output to expect in different "
+"situations. \n"
+"For the most part, it is suggested that you ignore any of the error "
+"messages. \n"
+"They would be meaningless to the application, and are only presented for "
+"human debugging."
msgstr ""
#: i2p2www/pages/site/docs/api/bob.html:268
@@ -1610,7 +1730,8 @@ msgstr ""
#: i2p2www/pages/site/docs/api/bob.html:298
msgid ""
-"Now to remove \"ear\", note that this is what happens when you type too fast,\n"
+"Now to remove \"ear\", note that this is what happens when you type too "
+"fast,\n"
"and shows you what typical ERROR messages looks like."
msgstr ""
@@ -1661,11 +1782,16 @@ msgstr ""
#: i2p2www/pages/site/docs/api/datagrams.html:7
#, python-format
msgid ""
-"Datagrams build upon the base I2CP to provide authenticated\n"
-"and repliable messages in a standard format. This lets applications reliably read\n"
-"the \"from\" address out of a datagram and know that the address really sent the\n"
-"message. This is necessary for some applications since the base I2P message is\n"
-"completely raw - it has no \"from\" address (unlike IP packets). In addition, the\n"
+"Datagrams build upon the base I2CP to provide "
+"authenticated\n"
+"and repliable messages in a standard format. This lets applications "
+"reliably read\n"
+"the \"from\" address out of a datagram and know that the address really "
+"sent the\n"
+"message. This is necessary for some applications since the base I2P "
+"message is\n"
+"completely raw - it has no \"from\" address (unlike IP packets). In "
+"addition, the\n"
"message and sender are authenticated by signing the payload."
msgstr ""
@@ -1674,7 +1800,8 @@ msgstr ""
msgid ""
"Datagrams, like streaming library packets,\n"
"are an application-level construct.\n"
-"These protocols are independent of the low-level transports;\n"
+"These protocols are independent of the low-level transports;\n"
"the protocols are converted to I2NP messages by the router, and\n"
"either protocol may be carried by either transport."
msgstr ""
@@ -1690,7 +1817,8 @@ msgid ""
"datagram API,\n"
"while applications in other languages \n"
"can use SAM's datagram support.\n"
-"There is also limited support in i2ptunnel in the SOCKS proxy,\n"
+"There is also limited support in i2ptunnel in the SOCKS proxy,\n"
"the 'streamr' tunnel types, and udpTunnel classes."
msgstr ""
@@ -1700,23 +1828,34 @@ msgstr ""
#: i2p2www/pages/site/docs/api/datagrams.html:38
msgid ""
-"The application designer should carefully consider the tradeoff of repliable vs. non-repliable\n"
-"datagrams. Also, the datagram size will affect reliability, due to tunnel fragmentation into 1KB\n"
-"tunnel messages. The more message fragments, the more likely that one of them will be dropped\n"
-"by an intermediate hop. Messages larger than a few KB are not recommended.\n"
+"The application designer should carefully consider the tradeoff of "
+"repliable vs. non-repliable\n"
+"datagrams. Also, the datagram size will affect reliability, due to tunnel"
+" fragmentation into 1KB\n"
+"tunnel messages. The more message fragments, the more likely that one of "
+"them will be dropped\n"
+"by an intermediate hop. Messages larger than a few KB are not "
+"recommended.\n"
"Over about 10 KB, the delivery probablility drops dramatically.\n"
-"Messages over 16 KB cannot be delivered over NTCP, dropping delivery chances even more."
+"Messages over 16 KB cannot be delivered over NTCP, dropping delivery "
+"chances even more."
msgstr ""
#: i2p2www/pages/site/docs/api/datagrams.html:47
#, python-format
msgid ""
-"Also note that the various overheads added by lower layers, in particular asymmetric\n"
-"ElGamal/AES, place a large burden on intermittent messages\n"
-"such as used by a Kademlia-over-UDP application. The implementations are currently tuned\n"
-"for frequent traffic using the streaming library. There are a high number\n"
-"of session tags delivered, and a short session tag lifetime, for example.\n"
-"There are currently no configuration parameters available within I2CP to tune\n"
+"Also note that the various overheads added by lower layers, in particular"
+" asymmetric\n"
+"ElGamal/AES, place a large burden on "
+"intermittent messages\n"
+"such as used by a Kademlia-over-UDP application. The implementations are "
+"currently tuned\n"
+"for frequent traffic using the streaming library. There are a high number"
+"\n"
+"of session tags delivered, and a short session tag lifetime, for example."
+"\n"
+"There are currently no configuration parameters available within I2CP to "
+"tune\n"
"the ElGamal Session Tag parameters."
msgstr ""
@@ -1729,30 +1868,38 @@ msgid ""
"The standard I2CP protocol number for datagrams is PROTO_DATAGRAM (17).\n"
"Applications may or may not choose to set the\n"
"protocol in the I2CP header. It is not set by default.\n"
-"It must be set to demultiplex datagram and streaming traffic received on the same Destination."
+"It must be set to demultiplex datagram and streaming traffic received on "
+"the same Destination."
msgstr ""
#: i2p2www/pages/site/docs/api/datagrams.html:65
#, python-format
msgid ""
"As datagrams are not connection-oriented, the application may require\n"
-"port numbers to correlate datagrams with particular peers or communications sessions,\n"
+"port numbers to correlate datagrams with particular peers or "
+"communications sessions,\n"
"as is traditional with UDP over IP.\n"
-"Applications may add 'from' and 'to' ports to the I2CP (gzip) header as described in\n"
+"Applications may add 'from' and 'to' ports to the I2CP (gzip) header as "
+"described in\n"
"the I2CP page."
msgstr ""
#: i2p2www/pages/site/docs/api/datagrams.html:73
#, python-format
msgid ""
-"There is no method within the datagram API to specify whether it is non-repliable (raw)\n"
-"or repliable. The application should be designed to expect the appropriate type.\n"
+"There is no method within the datagram API to specify whether it is non-"
+"repliable (raw)\n"
+"or repliable. The application should be designed to expect the "
+"appropriate type.\n"
"The I2CP protocol number or port should be used by the application to\n"
"indicate datagram type.\n"
-"The I2CP protocol numbers PROTO_DATAGRAM (signed) and PROTO_DATAGRAM_RAW are defined in the\n"
+"The I2CP protocol numbers PROTO_DATAGRAM (signed) and PROTO_DATAGRAM_RAW "
+"are defined in the\n"
"I2PSession API\n"
-"for this purpose. A common design pattern in client/server datagram applications is to\n"
-"use signed datagrams for a request which includes a nonce, and use a raw datagram\n"
+"for this purpose. A common design pattern in client/server datagram "
+"applications is to\n"
+"use signed datagrams for a request which includes a nonce, and use a raw "
+"datagram\n"
"for the reply, returning the nonce from the request."
msgstr ""
@@ -1786,13 +1933,15 @@ msgstr ""
#: i2p2www/pages/site/docs/api/datagrams.html:101
#, python-format
msgid ""
-"Each datagram is sent through I2P as a single message (or as an individual clove in a\n"
+"Each datagram is sent through I2P as a single message (or as an "
+"individual clove in a\n"
"Garlic Message).\n"
"Message encapsulation is implemented in the underlying\n"
"I2CP,\n"
"I2NP, and\n"
"tunnel message layers.\n"
-"There is no packet delimiter mechanism or length field in the datagram protocol."
+"There is no packet delimiter mechanism or length field in the datagram "
+"protocol."
msgstr ""
#: i2p2www/pages/site/docs/api/datagrams.html:114
@@ -1812,10 +1961,17 @@ msgstr ""
#: i2p2www/pages/site/docs/api/i2pcontrol.html:4
#, python-format
msgid ""
-"I2P enables a JSONRPC2 interface via the plugin I2PControl.\n"
-"The aim of the interface is to provide simple way to interface with a running I2P node. A client, itoopie, has been developed in parallel.\n"
-"The JSONRPC2 implementation for the client as well as the plugin is provided by the java libraries JSON-RPC 2.0. \n"
-"A list of implementations of JSON-RPC for various languages can be found at the JSON-RPC wiki."
+"I2P enables a JSONRPC2 interface via the plugin I2PControl.\n"
+"The aim of the interface is to provide simple way to interface with a "
+"running I2P node. A client, itoopie, has been developed in parallel.\n"
+"The JSONRPC2 implementation for the client as well as the plugin is "
+"provided by the java libraries JSON-RPC 2.0. \n"
+"A list of implementations of JSON-RPC for various languages can be found "
+"at the JSON-RPC "
+"wiki."
msgstr ""
#: i2p2www/pages/site/docs/api/i2pcontrol.html:11
@@ -1891,8 +2047,8 @@ msgstr "Descrizione"
#: i2p2www/pages/site/docs/api/i2pcontrol.html:29
msgid ""
-"Token used for authenticating every request (excluding the 'Authenticate' "
-"RPC method)"
+"Token used for authenticating every request (excluding the 'Authenticate'"
+" RPC method)"
msgstr ""
#: i2p2www/pages/site/docs/api/i2pcontrol.html:37
@@ -1901,7 +2057,8 @@ msgstr ""
#: i2p2www/pages/site/docs/api/i2pcontrol.html:38
msgid ""
-"Creates and returns an authentication token used for further communication."
+"Creates and returns an authentication token used for further "
+"communication."
msgstr ""
#: i2p2www/pages/site/docs/api/i2pcontrol.html:40
@@ -1934,8 +2091,8 @@ msgstr ""
#: i2p2www/pages/site/docs/api/i2pcontrol.html:98
#: i2p2www/pages/site/docs/api/i2pcontrol.html:142
msgid ""
-"Token used for authenticating the client. Is provided by the server via the "
-"'Authenticate' RPC method."
+"Token used for authenticating the client. Is provided by the server via "
+"the 'Authenticate' RPC method."
msgstr ""
#: i2p2www/pages/site/docs/api/i2pcontrol.html:54
@@ -1997,8 +2154,7 @@ msgid "Returns true if any changes were made."
msgstr ""
#: i2p2www/pages/site/docs/api/i2pcontrol.html:79
-msgid ""
-"Returns true if any changes requiring a restart to take effect were made."
+msgid "Returns true if any changes requiring a restart to take effect were made."
msgstr ""
#: i2p2www/pages/site/docs/api/i2pcontrol.html:82
@@ -2067,7 +2223,8 @@ msgstr ""
#: i2p2www/pages/site/docs/api/i2pcontrol.html:137
msgid ""
-"Initiates a router reseed, fetching peers into our NetDB from a remote host."
+"Initiates a router reseed, fetching peers into our NetDB from a remote "
+"host."
msgstr ""
#: i2p2www/pages/site/docs/api/i2pcontrol.html:138
@@ -2076,7 +2233,8 @@ msgstr ""
#: i2p2www/pages/site/docs/api/i2pcontrol.html:139
msgid ""
-"Restarts the router gracefully (waits for participating tunnels to expire)."
+"Restarts the router gracefully (waits for participating tunnels to "
+"expire)."
msgstr ""
#: i2p2www/pages/site/docs/api/i2pcontrol.html:140
@@ -2110,8 +2268,7 @@ msgid "If requested, verifies that a graceful shutdown has been initiated"
msgstr ""
#: i2p2www/pages/site/docs/api/i2pcontrol.html:152
-msgid ""
-"Fetches or sets various network related settings. Ports, addresses etc."
+msgid "Fetches or sets various network related settings. Ports, addresses etc."
msgstr ""
#: i2p2www/pages/site/docs/api/i2pcontrol.html:154
@@ -2122,8 +2279,8 @@ msgstr ""
#: i2p2www/pages/site/docs/api/i2pcontrol.html:155
msgid ""
-"What hostname is used for the TCP transport. If null is submitted, current "
-"setting will be returned."
+"What hostname is used for the TCP transport. If null is submitted, "
+"current setting will be returned."
msgstr ""
#: i2p2www/pages/site/docs/api/i2pcontrol.html:156
@@ -2140,8 +2297,8 @@ msgstr ""
#: i2p2www/pages/site/docs/api/i2pcontrol.html:158
msgid ""
-"What hostname is used for the UDP transport. If null is submitted, current "
-"setting will be returned."
+"What hostname is used for the UDP transport. If null is submitted, "
+"current setting will be returned."
msgstr ""
#: i2p2www/pages/site/docs/api/i2pcontrol.html:159
@@ -2155,20 +2312,19 @@ msgid "What ip has been detected by the UDP transport."
msgstr ""
#: i2p2www/pages/site/docs/api/i2pcontrol.html:161
-msgid ""
-"Is UPnP enabled. If null is submitted, current setting will be returned."
+msgid "Is UPnP enabled. If null is submitted, current setting will be returned."
msgstr ""
#: i2p2www/pages/site/docs/api/i2pcontrol.html:162
msgid ""
-"How many percent of bandwidth is usable for participating tunnels. If null "
-"is submitted, current setting will be returned."
+"How many percent of bandwidth is usable for participating tunnels. If "
+"null is submitted, current setting will be returned."
msgstr ""
#: i2p2www/pages/site/docs/api/i2pcontrol.html:163
msgid ""
-"How many KB/s of inbound bandwidth is allowed. If null is submitted, current"
-" setting will be returned."
+"How many KB/s of inbound bandwidth is allowed. If null is submitted, "
+"current setting will be returned."
msgstr ""
#: i2p2www/pages/site/docs/api/i2pcontrol.html:164
@@ -2179,15 +2335,15 @@ msgstr ""
#: i2p2www/pages/site/docs/api/i2pcontrol.html:165
msgid ""
-"Is laptop mode enabled (change router identity and UDP port when IP changes "
-"). If null is submitted, current setting will be returned."
+"Is laptop mode enabled (change router identity and UDP port when IP "
+"changes ). If null is submitted, current setting will be returned."
msgstr ""
#: i2p2www/pages/site/docs/api/i2pcontrol.html:166
msgid ""
-"Token used for authenticating the client. Is provided by the server via the "
-"'Authenticate' RPC method. If null is submitted, current setting will be "
-"returned."
+"Token used for authenticating the client. Is provided by the server via "
+"the 'Authenticate' RPC method. If null is submitted, current setting will"
+" be returned."
msgstr ""
#: i2p2www/pages/site/docs/api/i2pcontrol.html:169
@@ -2200,8 +2356,8 @@ msgstr ""
#: i2p2www/pages/site/docs/api/i2pcontrol.html:171
msgid ""
-"If requested, returns the method used for automatically detecting ip for the"
-" TCP transport."
+"If requested, returns the method used for automatically detecting ip for "
+"the TCP transport."
msgstr ""
#: i2p2www/pages/site/docs/api/i2pcontrol.html:172
@@ -2214,8 +2370,8 @@ msgstr ""
#: i2p2www/pages/site/docs/api/i2pcontrol.html:174
msgid ""
-"If requested, returns methods used for detecting the ip address of the UDP "
-"transport."
+"If requested, returns methods used for detecting the ip address of the "
+"UDP transport."
msgstr ""
#: i2p2www/pages/site/docs/api/i2pcontrol.html:175
@@ -2310,27 +2466,34 @@ msgstr ""
#: i2p2www/pages/site/docs/api/i2pcontrol.html:201
msgid ""
-"The version of the I2PControl API used wasn't specified, but is required to "
-"be specified."
+"The version of the I2PControl API used wasn't specified, but is required "
+"to be specified."
msgstr ""
#: i2p2www/pages/site/docs/api/i2pcontrol.html:202
msgid ""
-"The version of the I2PControl API specified is not supported by I2PControl."
+"The version of the I2PControl API specified is not supported by "
+"I2PControl."
msgstr ""
#: i2p2www/pages/site/docs/api/i2ptunnel.html:12
#, python-format
msgid ""
"I2PTunnel is a tool for interfacing with and providing services on I2P.\n"
-"Destination of an I2PTunnel can be defined using a hostname,\n"
-"Base32, or a full 516-byte destination key.\n"
-"An established I2PTunnel will be available on your client machine as localhost:port.\n"
-"If you wish to provide a service on I2P network, you simply create I2PTunnel to the\n"
-"appropriate ip_address:port. A corresponding 516-byte destination key will be generated\n"
+"Destination of an I2PTunnel can be defined using a hostname,\n"
+"Base32, or a full 516-byte destination "
+"key.\n"
+"An established I2PTunnel will be available on your client machine as "
+"localhost:port.\n"
+"If you wish to provide a service on I2P network, you simply create "
+"I2PTunnel to the\n"
+"appropriate ip_address:port. A corresponding 516-byte destination key "
+"will be generated\n"
"for the service and it will become avaliable throughout I2P.\n"
"A web interface for I2PTunnel management is avaliable on\n"
-"localhost:7657/i2ptunnel/."
+"localhost:7657/i2ptunnel/."
msgstr ""
#: i2p2www/pages/site/docs/api/i2ptunnel.html:24
@@ -2344,7 +2507,8 @@ msgstr ""
#: i2p2www/pages/site/docs/api/i2ptunnel.html:27
msgid ""
"I2P Webserver - A tunnel pointed to a Jetty webserver run\n"
-"on localhost:7658 for convenient and quick hosting on I2P.\n"
+"on localhost:7658 for convenient "
+"and quick hosting on I2P.\n"
"1/(windowSize*factor)
. In standard TCP, window sizes are in bytes,\n"
+"of 1/(windowSize*factor)
. In standard TCP, window sizes are"
+" in bytes,\n"
"while in I2P, window sizes are in messages.\n"
"A higher number means slower growth."
msgstr ""
@@ -2881,15 +3116,16 @@ msgstr ""
msgid ""
"How long to wait after instantiating a new con \n"
"before actually attempting to connect. If this is\n"
-"<= 0, connect immediately with no initial data. If greater than 0, wait\n"
+"<= 0, connect immediately with no initial data. If greater than 0, "
+"wait\n"
"until the output stream is flushed, the buffer fills, \n"
"or that many milliseconds pass, and include any initial data with the SYN."
msgstr ""
#: i2p2www/pages/site/docs/api/streaming.html:186
msgid ""
-"How long to block on connect, in milliseconds. Negative means indefinitely. "
-"Default is 5 minutes."
+"How long to block on connect, in milliseconds. Negative means "
+"indefinitely. Default is 5 minutes."
msgstr ""
#: i2p2www/pages/site/docs/api/streaming.html:190
@@ -2901,19 +3137,23 @@ msgstr ""
#: i2p2www/pages/site/docs/api/streaming.html:196
msgid ""
"Whether to listen only for the streaming protocol.\n"
-"Setting to true will prohibit communication with Destinations earlier than release 0.7.1\n"
-"(released March 2009). Set to true if running multiple protocols on this Destination."
+"Setting to true will prohibit communication with Destinations earlier "
+"than release 0.7.1\n"
+"(released March 2009). Set to true if running multiple protocols on this "
+"Destination."
msgstr ""
#: i2p2www/pages/site/docs/api/streaming.html:204
msgid ""
"(0=noop, 1=disconnect)\n"
-"What to do on an inactivity timeout - do nothing, disconnect, or send a duplicate ack."
+"What to do on an inactivity timeout - do nothing, disconnect, or send a "
+"duplicate ack."
msgstr ""
#: i2p2www/pages/site/docs/api/streaming.html:212
msgid ""
-"The initial value of the resend delay field in the packet header, times 1000.\n"
+"The initial value of the resend delay field in the packet header, times "
+"1000.\n"
"Not fully implemented; see below."
msgstr ""
@@ -2936,8 +3176,8 @@ msgstr ""
#: i2p2www/pages/site/docs/api/streaming.html:230
msgid ""
-"In standard TCP, window sizes are in bytes, while in I2P, window sizes are "
-"in messages."
+"In standard TCP, window sizes are in bytes, while in I2P, window sizes "
+"are in messages."
msgstr ""
#: i2p2www/pages/site/docs/api/streaming.html:242
@@ -2977,12 +3217,12 @@ msgstr ""
#: i2p2www/pages/site/docs/api/streaming.html:295
msgid ""
"(2=interactive not supported)\n"
-"This doesn't currently do anything, but setting it to a value other than 1 will cause an error."
+"This doesn't currently do anything, but setting it to a value other than "
+"1 will cause an error."
msgstr ""
#: i2p2www/pages/site/docs/api/streaming.html:300
-msgid ""
-"How long to block on read, in milliseconds. Negative means indefinitely."
+msgid "How long to block on read, in milliseconds. Negative means indefinitely."
msgstr ""
#: i2p2www/pages/site/docs/api/streaming.html:304
@@ -3026,15 +3266,19 @@ msgstr ""
#: i2p2www/pages/site/docs/api/streaming.html:349
msgid ""
-"The initiator sends a packet with the SYNCHRONIZE flag set. This packet may contain the initial data as well.\n"
-"The peer replies with a packet with the SYNCHRONIZE flag set. This packet may contain the initial response data as well."
+"The initiator sends a packet with the SYNCHRONIZE flag set. This packet "
+"may contain the initial data as well.\n"
+"The peer replies with a packet with the SYNCHRONIZE flag set. This packet"
+" may contain the initial response data as well."
msgstr ""
#: i2p2www/pages/site/docs/api/streaming.html:354
msgid ""
-"The initiator may send additional data packets, up to the initial window size, before receiving the SYNCHRONIZE response.\n"
+"The initiator may send additional data packets, up to the initial window "
+"size, before receiving the SYNCHRONIZE response.\n"
"These packets will also have the send Stream ID field set to 0.\n"
-"Recipients must buffer packets received on unknown streams for a short period of time, as they may\n"
+"Recipients must buffer packets received on unknown streams for a short "
+"period of time, as they may\n"
"arrive out of order, in advance of the SYNCHRONIZE packet."
msgstr ""
@@ -3044,23 +3288,33 @@ msgstr ""
#: i2p2www/pages/site/docs/api/streaming.html:362
msgid ""
-"The maximum message size (also called the MTU / MRU) is negotiated to the lower value supported by\n"
-"the two peers. As tunnel messages are padded to 1KB, a poor MTU selection will lead to\n"
+"The maximum message size (also called the MTU / MRU) is negotiated to the"
+" lower value supported by\n"
+"the two peers. As tunnel messages are padded to 1KB, a poor MTU selection"
+" will lead to\n"
"a large amount of overhead.\n"
"The MTU is specified by the option i2p.streaming.maxMessageSize.\n"
-"The current default MTU of 1730 was chosen to fit precisely into two 1K I2NP tunnel messages,\n"
+"The current default MTU of 1730 was chosen to fit precisely into two 1K "
+"I2NP tunnel messages,\n"
"including overhead for the typical case."
msgstr ""
#: i2p2www/pages/site/docs/api/streaming.html:371
msgid ""
-"The first message in a connection includes a 387 byte (typical) Destination added by the streaming layer,\n"
-"and usually a 898 byte (typical) LeaseSet, and Session keys, bundled in the Garlic message by the router.\n"
-"(The LeaseSet and Session Keys will not be bundled if an ElGamal Session was previously established).\n"
-"Therefore, the goal of fitting a complete HTTP request in a single 1KB I2NP message is not always attainable.\n"
-"However, the selection of the MTU, together with careful implementation of fragmentation\n"
-"and batching strategies in the tunnel gateway processor, are important factors in network bandwidth,\n"
-"latency, reliability, and efficiency, especially for long-lived connections."
+"The first message in a connection includes a 387 byte (typical) "
+"Destination added by the streaming layer,\n"
+"and usually a 898 byte (typical) LeaseSet, and Session keys, bundled in "
+"the Garlic message by the router.\n"
+"(The LeaseSet and Session Keys will not be bundled if an ElGamal Session "
+"was previously established).\n"
+"Therefore, the goal of fitting a complete HTTP request in a single 1KB "
+"I2NP message is not always attainable.\n"
+"However, the selection of the MTU, together with careful implementation "
+"of fragmentation\n"
+"and batching strategies in the tunnel gateway processor, are important "
+"factors in network bandwidth,\n"
+"latency, reliability, and efficiency, especially for long-lived "
+"connections."
msgstr ""
#: i2p2www/pages/site/docs/api/streaming.html:382
@@ -3074,10 +3328,14 @@ msgstr ""
#: i2p2www/pages/site/docs/api/streaming.html:390
#, python-format
msgid ""
-"Each packet is sent through I2P as a single message (or as an individual clove in a\n"
-"Garlic Message). Message encapsulation is implemented\n"
-"in the underlying I2CP, I2NP, and\n"
-"tunnel message layers. There is no packet delimiter\n"
+"Each packet is sent through I2P as a single message (or as an individual "
+"clove in a\n"
+"Garlic Message). Message encapsulation "
+"is implemented\n"
+"in the underlying I2CP, I2NP, and\n"
+"tunnel message layers. There is no "
+"packet delimiter\n"
"mechanism or payload length field in the streaming protocol."
msgstr ""
@@ -3087,7 +3345,8 @@ msgstr ""
#: i2p2www/pages/site/docs/api/streaming.html:401
msgid ""
-"The streaming lib uses standard slow-start (exponential window growth) and congestion avoidance (linear window growth)\n"
+"The streaming lib uses standard slow-start (exponential window growth) "
+"and congestion avoidance (linear window growth)\n"
"phases, with exponential backoff.\n"
"Windowing and acknowledgments use packet count, not byte count."
msgstr ""
@@ -3098,38 +3357,46 @@ msgstr "Chiudi"
#: i2p2www/pages/site/docs/api/streaming.html:409
msgid ""
-"Any packet, including one with the SYNCHRONIZE flag set, may have the CLOSE flag sent as well.\n"
-"The connection is not closed until the peer responds with the CLOSE flag.\n"
+"Any packet, including one with the SYNCHRONIZE flag set, may have the "
+"CLOSE flag sent as well.\n"
+"The connection is not closed until the peer responds with the CLOSE flag."
+"\n"
"CLOSE packets may contain data as well."
msgstr ""
#: i2p2www/pages/site/docs/api/streaming.html:417
msgid ""
-"There is no ping function at the I2CP layer (equivalent to ICMP echo) or in datagrams.\n"
+"There is no ping function at the I2CP layer (equivalent to ICMP echo) or "
+"in datagrams.\n"
"This function is provided in streaming.\n"
"Pings and pongs may not be combined with a standard streaming packet;\n"
"if the ECHO option is set, then\n"
-"most other flags, options, ackThrough, sequenceNum, NACKs, payload, etc. are ignored."
+"most other flags, options, ackThrough, sequenceNum, NACKs, payload, etc. "
+"are ignored."
msgstr ""
#: i2p2www/pages/site/docs/api/streaming.html:425
msgid ""
-"A ping packet must have the ECHO, SIGNATURE_INCLUDED, and FROM_INCLUDED flags set.\n"
-"The sendStreamId must be greater than zero, and the receiveStreamId is ignored.\n"
+"A ping packet must have the ECHO, SIGNATURE_INCLUDED, and FROM_INCLUDED "
+"flags set.\n"
+"The sendStreamId must be greater than zero, and the receiveStreamId is "
+"ignored.\n"
"The sendStreamId may or may not correspond to an existing connection."
msgstr ""
#: i2p2www/pages/site/docs/api/streaming.html:431
msgid ""
"A pong packet must have the ECHO flag set.\n"
-"The sendStreamId must be zero, and the receiveStreamId is the sendStreamId from the ping.\n"
-"The pong packet does not include any payload that was contained in the ping."
+"The sendStreamId must be zero, and the receiveStreamId is the "
+"sendStreamId from the ping.\n"
+"The pong packet does not include any payload that was contained in the "
+"ping."
msgstr ""
#: i2p2www/pages/site/docs/api/streaming.html:437
msgid ""
-"Streaming may be configured to disable sending pongs with the configuration "
-"i2p.streaming.answerPings=false."
+"Streaming may be configured to disable sending pongs with the "
+"configuration i2p.streaming.answerPings=false."
msgstr ""
#: i2p2www/pages/site/docs/api/streaming.html:442
@@ -3145,7 +3412,8 @@ msgid ""
"This is used for \"temporal\" sharing at connection open/close time,\n"
"not \"ensemble\" sharing during a connection (See\n"
"RFC 2140).\n"
-"There is a separate share per ConnectionManager (i.e. per local Destination)\n"
+"There is a separate share per ConnectionManager (i.e. per local "
+"Destination)\n"
"so that there is no information leakage to other Destinations on the\n"
"same router.\n"
"The share data for a given peer expires after a few minutes.\n"
@@ -3158,7 +3426,8 @@ msgstr ""
#: i2p2www/pages/site/docs/api/streaming.html:465
msgid ""
-"The following parameters are hardcoded, but may be of interest for analysis:"
+"The following parameters are hardcoded, but may be of interest for "
+"analysis:"
msgstr ""
#: i2p2www/pages/site/docs/api/streaming.html:484
@@ -3168,16 +3437,25 @@ msgstr ""
#: i2p2www/pages/site/docs/api/streaming.html:485
msgid ""
-"The streaming library has grown organically for I2P - first mihi implemented the\n"
-"\"mini streaming library\" as part of I2PTunnel, which was limited to a window\n"
-"size of 1 message (requiring an ACK before sending the next one), and then it was\n"
-"refactored out into a generic streaming interface (mirroring TCP sockets) and the\n"
-"full streaming implementation was deployed with a sliding window protocol and \n"
-"optimizations to take into account the high bandwidth x delay product. Individual\n"
-"streams may adjust the maximum packet size and other options. The default\n"
-"message size is selected to fit precisely in two 1K I2NP tunnel messages,\n"
+"The streaming library has grown organically for I2P - first mihi "
+"implemented the\n"
+"\"mini streaming library\" as part of I2PTunnel, which was limited to a "
+"window\n"
+"size of 1 message (requiring an ACK before sending the next one), and "
+"then it was\n"
+"refactored out into a generic streaming interface (mirroring TCP sockets)"
+" and the\n"
+"full streaming implementation was deployed with a sliding window protocol"
+" and \n"
+"optimizations to take into account the high bandwidth x delay product. "
+"Individual\n"
+"streams may adjust the maximum packet size and other options. The default"
+"\n"
+"message size is selected to fit precisely in two 1K I2NP tunnel messages,"
+"\n"
"and is a reasonable tradeoff between the bandwidth costs of \n"
-"retransmitting lost messages, and the latency and overhead of multiple messages."
+"retransmitting lost messages, and the latency and overhead of multiple "
+"messages."
msgstr ""
#: i2p2www/pages/site/docs/api/streaming.html:499
@@ -3209,16 +3487,20 @@ msgstr ""
#: i2p2www/pages/site/docs/api/streaming.html:509
#, python-format
msgid ""
-"Another area for research is the interaction of the streaming lib with the\n"
+"Another area for research is the interaction of the streaming lib with "
+"the\n"
"NTCP and SSU transport layers.\n"
"See the NTCP discussion page for details."
msgstr ""
#: i2p2www/pages/site/docs/api/streaming.html:514
msgid ""
-"The interaction of the routing algorithms with the streaming lib strongly affects performance.\n"
-"In particular, random distribution of messages to multiple tunnels in a pool\n"
-"leads to a high degree of out-of-order delivery which results in smaller window\n"
+"The interaction of the routing algorithms with the streaming lib strongly"
+" affects performance.\n"
+"In particular, random distribution of messages to multiple tunnels in a "
+"pool\n"
+"leads to a high degree of out-of-order delivery which results in smaller "
+"window\n"
"sizes than would otherwise be the case. The router currently routes \n"
"messages for a single from/to destination pair through a consistent set \n"
"of tunnels, until tunnel expiration or delivery failure. The router's \n"
@@ -3253,9 +3535,11 @@ msgstr ""
#: i2p2www/pages/site/docs/api/streaming.html:541
msgid ""
-"zzz has added debug code to the streaming library to log packets in a wireshark-compatible\n"
+"zzz has added debug code to the streaming library to log packets in a "
+"wireshark-compatible\n"
"(pcap) format; Use this to further analyze performance.\n"
-"The format may require enhancement to map more streaming lib parameters to TCP fields."
+"The format may require enhancement to map more streaming lib parameters "
+"to TCP fields."
msgstr ""
#: i2p2www/pages/site/docs/api/streaming.html:546
@@ -3274,15 +3558,18 @@ msgstr ""
msgid ""
"There are several bittorrent clients and trackers on I2P.\n"
"As I2P addressing uses a Destination instead of an IP and port, minor\n"
-"changes are required to tracker and client software for operation on I2P.\n"
+"changes are required to tracker and client software for operation on I2P."
+"\n"
"These changes are specified below.\n"
-"Note carefully the guidelines for compatibility with older I2P clients and trackers."
+"Note carefully the guidelines for compatibility with older I2P clients "
+"and trackers."
msgstr ""
#: i2p2www/pages/site/docs/applications/bittorrent.html:15
msgid ""
"This page specifies protocol details common to all clients and trackers.\n"
-"Specific clients and trackers may implement other unique features or protocols."
+"Specific clients and trackers may implement other unique features or "
+"protocols."
msgstr ""
#: i2p2www/pages/site/docs/applications/bittorrent.html:20
@@ -3295,7 +3582,8 @@ msgstr "Annunci "
#: i2p2www/pages/site/docs/applications/bittorrent.html:27
msgid ""
-"Clients generally include a fake port=6881 parameter in the announce, for compatibility with older trackers.\n"
+"Clients generally include a fake port=6881 parameter in the announce, for"
+" compatibility with older trackers.\n"
"Trackers may ignore the port parameter, and should not require it."
msgstr ""
@@ -3307,7 +3595,8 @@ msgid ""
"using the I2P Base 64 alphabet [A-Z][a-z][0-9]-~.\n"
"Destinations\n"
"are 387+ bytes, so the Base 64 is 516+ bytes.\n"
-"Clients generally append \".i2p\" to the Base 64 Destination for compatibility with older trackers.\n"
+"Clients generally append \".i2p\" to the Base 64 Destination for "
+"compatibility with older trackers.\n"
"Trackers should not require an appended \".i2p\"."
msgstr ""
@@ -3317,15 +3606,19 @@ msgstr ""
#: i2p2www/pages/site/docs/applications/bittorrent.html:46
msgid ""
-"While all current Destinations for clients are exactly 387 bytes, a tracker should not\n"
-"presume that will always be so. A reasonable maximum to assume, for now, is 475 bytes.\n"
-"As the tracker must decode the Base64 to deliver compact responses (see below),\n"
+"While all current Destinations for clients are exactly 387 bytes, a "
+"tracker should not\n"
+"presume that will always be so. A reasonable maximum to assume, for now, "
+"is 475 bytes.\n"
+"As the tracker must decode the Base64 to deliver compact responses (see "
+"below),\n"
"the tracker should probably decode and reject bad Base64 when announced."
msgstr ""
#: i2p2www/pages/site/docs/applications/bittorrent.html:53
msgid ""
-"The default response type is non-compact. Clients may request a compact response with\n"
+"The default response type is non-compact. Clients may request a compact "
+"response with\n"
"the parameter compact=1. A tracker may, but is not required to, return\n"
"a compact response when requested."
msgstr ""
@@ -3333,8 +3626,10 @@ msgstr ""
#: i2p2www/pages/site/docs/applications/bittorrent.html:59
msgid ""
"Developers of new I2P clients\n"
-"are strongly encouraged to implemenent announces over their own tunnel rather than\n"
-"the HTTP client proxy at port 4444. Doing so is both more efficient and it allows\n"
+"are strongly encouraged to implemenent announces over their own tunnel "
+"rather than\n"
+"the HTTP client proxy at port 4444. Doing so is both more efficient and "
+"it allows\n"
"destination enforcement by the tracker (see below)."
msgstr ""
@@ -3356,7 +3651,8 @@ msgstr ""
#: i2p2www/pages/site/docs/applications/bittorrent.html:76
msgid ""
-"Trackers generally include a fake port key, or use the port from the announce, for compatibility with older clients.\n"
+"Trackers generally include a fake port key, or use the port from the "
+"announce, for compatibility with older clients.\n"
"Clients must ignore the port parameter, and should not require it."
msgstr ""
@@ -3364,8 +3660,10 @@ msgstr ""
#, python-format
msgid ""
"The value of the ip key is the base 64 of the client's\n"
-"Destination, as described above.\n"
-"Trackers generally append \".i2p\" to the Base 64 Destination if it wasn't in the announce ip, for compatibility with older clients.\n"
+"Destination, as "
+"described above.\n"
+"Trackers generally append \".i2p\" to the Base 64 Destination if it "
+"wasn't in the announce ip, for compatibility with older clients.\n"
"Clients should not require an appended \".i2p\" in the responses."
msgstr ""
@@ -3380,22 +3678,26 @@ msgstr ""
#: i2p2www/pages/site/docs/applications/bittorrent.html:95
#, python-format
msgid ""
-"In the compact response, the value of the \"peers\" dictionary key is a single byte string,\n"
+"In the compact response, the value of the \"peers\" dictionary key is a "
+"single byte string,\n"
"whose length is a multiple of 32 bytes.\n"
"This string contains the concatenated\n"
"32-byte SHA-256 Hashes\n"
"of the binary\n"
"Destinations\n"
"of the peers.\n"
-"This hash must be computed by the tracker, unless destination enforcement\n"
-"(see below) is used, in which case the hash delivered in the X-I2P-DestHash\n"
+"This hash must be computed by the tracker, unless destination enforcement"
+"\n"
+"(see below) is used, in which case the hash delivered in the X-I2P-"
+"DestHash\n"
"or X-I2P-DestB32 HTTP headers may be converted to binary and stored.\n"
"The peers key may be absent, or the peers value may be zero-length."
msgstr ""
#: i2p2www/pages/site/docs/applications/bittorrent.html:109
msgid ""
-"While compact response support is optional for both clients and trackers, it is highly\n"
+"While compact response support is optional for both clients and trackers,"
+" it is highly\n"
"recommended as it reduces the nominal response size by over 90%."
msgstr ""
@@ -3406,27 +3708,34 @@ msgstr ""
#: i2p2www/pages/site/docs/applications/bittorrent.html:117
#, python-format
msgid ""
-"Some, but not all, I2P bittorrent clients announce over their own tunnels.\n"
-"Trackers may choose to prevent spoofing by requiring this, and verifying the\n"
+"Some, but not all, I2P bittorrent clients announce over their own "
+"tunnels.\n"
+"Trackers may choose to prevent spoofing by requiring this, and verifying "
+"the\n"
"client's\n"
"Destination\n"
"using HTTP headers added by the I2PTunnel HTTP Server tunnel.\n"
-"The headers are X-I2P-DestHash, X-I2P-DestB64, and X-I2P-DestB32, which are\n"
+"The headers are X-I2P-DestHash, X-I2P-DestB64, and X-I2P-DestB32, which "
+"are\n"
"different formats for the same information.\n"
"These headers cannot be spoofed by the client.\n"
-"A tracker enforcing destinations need not require the ip announce parameter at all."
+"A tracker enforcing destinations need not require the ip announce "
+"parameter at all."
msgstr ""
#: i2p2www/pages/site/docs/applications/bittorrent.html:129
msgid ""
-"As several clients use the HTTP proxy instead of their own tunnel for announces,\n"
-"destination enforcement will prevent usage by those clients unless or until\n"
+"As several clients use the HTTP proxy instead of their own tunnel for "
+"announces,\n"
+"destination enforcement will prevent usage by those clients unless or "
+"until\n"
"those clients are converted to announcing over their own tunnel."
msgstr ""
#: i2p2www/pages/site/docs/applications/bittorrent.html:135
msgid ""
-"Unfortunately, as the network grows, so will the amount of maliciousness,\n"
+"Unfortunately, as the network grows, so will the amount of maliciousness,"
+"\n"
"so we expect that all trackers will eventually enforce destinations.\n"
"Both tracker and client developers should anticipate it."
msgstr ""
@@ -3440,9 +3749,12 @@ msgstr ""
msgid ""
"Announce URL host names in torrent files generally follow the\n"
"I2P naming standards.\n"
-"In addition to host names from address books and \".b32.i2p\" Base 32 hostnames,\n"
-"the full Base 64 Destination (with [or without?] \".i2p\" appended) should be supported.\n"
-"Non-open trackers should recognize their own host name in any of these formats."
+"In addition to host names from address books and \".b32.i2p\" Base 32 "
+"hostnames,\n"
+"the full Base 64 Destination (with [or without?] \".i2p\" appended) "
+"should be supported.\n"
+"Non-open trackers should recognize their own host name in any of these "
+"formats."
msgstr ""
#: i2p2www/pages/site/docs/applications/bittorrent.html:152
@@ -3464,22 +3776,27 @@ msgstr ""
#: i2p2www/pages/site/docs/applications/bittorrent.html:165
#, python-format
msgid ""
-"I2P uses 387+ byte Destinations\n"
+"I2P uses 387+ byte Destinations\n"
"for addresses, as explained above."
msgstr ""
#: i2p2www/pages/site/docs/applications/bittorrent.html:170
msgid ""
-"If the client has only the hash of the destination (such as from a compact response or PEX), it must perform a lookup\n"
-"by encoding it with Base 32, appending \".b32.i2p\", and querying the Naming Service,\n"
+"If the client has only the hash of the destination (such as from a "
+"compact response or PEX), it must perform a lookup\n"
+"by encoding it with Base 32, appending \".b32.i2p\", and querying the "
+"Naming Service,\n"
"which will return the full Destination if available."
msgstr ""
#: i2p2www/pages/site/docs/applications/bittorrent.html:176
msgid ""
-"If the client has a peer's full Destination it received in a non-compact response, it should use it\n"
+"If the client has a peer's full Destination it received in a non-compact "
+"response, it should use it\n"
"directly in the connection setup.\n"
-"Do not convert a Destination back to a Base 32 hash for lookup, this is quite inefficient."
+"Do not convert a Destination back to a Base 32 hash for lookup, this is "
+"quite inefficient."
msgstr ""
#: i2p2www/pages/site/docs/applications/bittorrent.html:183
@@ -3489,32 +3806,40 @@ msgstr ""
#: i2p2www/pages/site/docs/applications/bittorrent.html:184
msgid ""
"To preserve anonymity,\n"
-"I2P bittorrent clients generally do not support non-I2P announces or peer connections.\n"
+"I2P bittorrent clients generally do not support non-I2P announces or peer"
+" connections.\n"
"I2P HTTP outproxies often block announces.\n"
"There are no known SOCKS outproxies supporting bittorrent traffic."
msgstr ""
#: i2p2www/pages/site/docs/applications/bittorrent.html:191
msgid ""
-"To prevent usage by non-I2P clients via an HTTP inproxy, I2P trackers often\n"
+"To prevent usage by non-I2P clients via an HTTP inproxy, I2P trackers "
+"often\n"
"block accesses or announces that contain an X-Forwarded-For HTTP header.\n"
-"Trackers should reject standard network announces with IPv4 or IPv6 IPs, and not deliver them in responses."
+"Trackers should reject standard network announces with IPv4 or IPv6 IPs, "
+"and not deliver them in responses."
msgstr ""
#: i2p2www/pages/site/docs/applications/bittorrent.html:200
#, python-format
msgid ""
"I2P PEX is based on ut_pex.\n"
-"As there does not appear to be a formal specification of ut_pex available,\n"
+"As there does not appear to be a formal specification of ut_pex "
+"available,\n"
"it may be necessary to review the libtorrent source for assistance.\n"
"It is an extension message, identified as \"i2p_pex\" in\n"
-"the extension handshake.\n"
-"It contains a bencoded dictionary with up to 3 keys, \"added\", \"added.f\", and \"dropped\".\n"
-"The added and dropped values are each a single byte string, whose length is a multiple of 32 bytes.\n"
+"the extension "
+"handshake.\n"
+"It contains a bencoded dictionary with up to 3 keys, \"added\", "
+"\"added.f\", and \"dropped\".\n"
+"The added and dropped values are each a single byte string, whose length "
+"is a multiple of 32 bytes.\n"
"These byte strings are the concatenated SHA-256 Hashes of the binary\n"
"Destinations\n"
"of the peers.\n"
-"This is the same format as the peers dictionary value in the i2p compact response format specified above.\n"
+"This is the same format as the peers dictionary value in the i2p compact "
+"response format specified above.\n"
"The added.f value, if present, is the same as in ut_pex."
msgstr ""
@@ -3529,10 +3854,13 @@ msgstr ""
#: i2p2www/pages/site/docs/applications/bittorrent.html:226
msgid ""
-"Unlike standard DHT, I2P DHT does not use a bit in the options handshake, or the PORT message.\n"
+"Unlike standard DHT, I2P DHT does not use a bit in the options handshake,"
+" or the PORT message.\n"
"It is advertised with an extension message, identified as \"i2p_dht\" in\n"
-"the extension handshake.\n"
-"It contains a bencoded dictionary with two keys, \"port\" and \"rport\", both integers."
+"the extension "
+"handshake.\n"
+"It contains a bencoded dictionary with two keys, \"port\" and \"rport\", "
+"both integers."
msgstr ""
#: i2p2www/pages/site/docs/applications/bittorrent.html:233
@@ -3562,12 +3890,14 @@ msgstr ""
msgid ""
"Compact peer info is 32 bytes (32 byte SHA256 Hash)\n"
"instead of 4 byte IP + 2 byte port. There is no peer port.\n"
-"In a response, the \"values\" key is a list of strings, each containing a single compact peer info."
+"In a response, the \"values\" key is a list of strings, each containing a"
+" single compact peer info."
msgstr ""
#: i2p2www/pages/site/docs/applications/bittorrent.html:260
msgid ""
-"Compact node info is 54 bytes (20 byte SHA1 Hash + 32 byte SHA256 Hash + 2 byte port)\n"
+"Compact node info is 54 bytes (20 byte SHA1 Hash + 32 byte SHA256 Hash + "
+"2 byte port)\n"
"instead of 20 byte SHA1 Hash + 4 byte IP + 2 byte port.\n"
"In a response, the \"nodes\" key is a\n"
"single byte string with concatenated compact node info."
@@ -3576,8 +3906,10 @@ msgstr ""
#: i2p2www/pages/site/docs/applications/bittorrent.html:267
msgid ""
"Secure node ID requirement: To make various DHT attacks more difficult,\n"
-"the first 4 bytes of the Node ID must match the first 4 bytes of the destination Hash,\n"
-"and the next two bytes of the Node ID must match the next two bytes of the\n"
+"the first 4 bytes of the Node ID must match the first 4 bytes of the "
+"destination Hash,\n"
+"and the next two bytes of the Node ID must match the next two bytes of "
+"the\n"
"destination hash exclusive-ORed with the port."
msgstr ""
@@ -3602,38 +3934,51 @@ msgid ""
"Preliminary differences from\n"
"BEP 15\n"
"are described below, and are subject to change.\n"
-"Contact the I2P developers if you wish to develop a client or tracker supporting datagram announces."
+"Contact the I2P developers if you wish to develop a client or tracker "
+"supporting datagram announces."
msgstr ""
#: i2p2www/pages/site/docs/applications/bittorrent.html:295
msgid ""
"A UDP tracker listens on two ports.\n"
-"The \"query port\" is the advertised port, and is used to receive repliable (signed) datagrams, for the connect request only.\n"
-"The \"response port\" is used to receive unsigned (raw) datagrams, and is the source port for all replies.\n"
+"The \"query port\" is the advertised port, and is used to receive "
+"repliable (signed) datagrams, for the connect request only.\n"
+"The \"response port\" is used to receive unsigned (raw) datagrams, and is"
+" the source port for all replies.\n"
"The response port is arbitrary.\n"
"A client sends and receives on a single port only.\n"
"It receives only unsigned (raw) datagrams.\n"
-"Raw datagrams provides increased efficiency for replies since they contain tokens sent in the query, and need not be signed."
+"Raw datagrams provides increased efficiency for replies since they "
+"contain tokens sent in the query, and need not be signed."
msgstr ""
#: i2p2www/pages/site/docs/applications/bittorrent.html:305
msgid ""
-"In the announce request, the 4-byte IP is replaced by a 32-byte hash, and the port is still present,\n"
+"In the announce request, the 4-byte IP is replaced by a 32-byte hash, and"
+" the port is still present,\n"
"although it may be ignored by the tracker.\n"
-"In the announce response, each 4-byte IP and 2-byte port is replaced by a 32-byte hash (compact peer info), and no port is present.\n"
-"The client sends the announce request and scrape request to the source port in the announce response packet.\n"
-"The connect request, connect response, scrape request, scrape response, and error response are the same as in BEP 15."
+"In the announce response, each 4-byte IP and 2-byte port is replaced by a"
+" 32-byte hash (compact peer info), and no port is present.\n"
+"The client sends the announce request and scrape request to the source "
+"port in the announce response packet.\n"
+"The connect request, connect response, scrape request, scrape response, "
+"and error response are the same as in BEP 15."
msgstr ""
#: i2p2www/pages/site/docs/applications/bittorrent.html:313
msgid ""
-"Source addresses in I2P cannot be spoofed, so it is possible to use a simplified protocol\n"
+"Source addresses in I2P cannot be spoofed, so it is possible to use a "
+"simplified protocol\n"
"with 2 packets instead of 4, omitting the connect request and response.\n"
-"In this case, the announce request would be a repliable datagram sent to the tracker's query port,\n"
+"In this case, the announce request would be a repliable datagram sent to "
+"the tracker's query port,\n"
"and the tracker would not require a response port.\n"
-"While this is more efficient, it would be more difficult to modify an existing tracker to support this mode.\n"
-"The URL for the 4-packet-mode tracker would use standard \"udp://\" prefix. \n"
-"The URL for a modified 2-packet-mode tracker would require a different prefix if both modes are supported in I2P."
+"While this is more efficient, it would be more difficult to modify an "
+"existing tracker to support this mode.\n"
+"The URL for the 4-packet-mode tracker would use standard \"udp://\" "
+"prefix. \n"
+"The URL for a modified 2-packet-mode tracker would require a different "
+"prefix if both modes are supported in I2P."
msgstr ""
#: i2p2www/pages/site/docs/applications/bittorrent.html:326
@@ -3673,15 +4018,19 @@ msgstr ""
#: i2p2www/pages/site/docs/applications/embedding.html:8
msgid ""
-"This page is about bundling the entire I2P router binary with your application.\n"
-"It is not about writing an application to work with I2P (either bundled or external)."
+"This page is about bundling the entire I2P router binary with your "
+"application.\n"
+"It is not about writing an application to work with I2P (either bundled "
+"or external)."
msgstr ""
#: i2p2www/pages/site/docs/applications/embedding.html:13
msgid ""
-"Lots of projects are bundling, or talking about bundling, I2P. That's great if done right.\n"
+"Lots of projects are bundling, or talking about bundling, I2P. That's "
+"great if done right.\n"
"If done wrong, it could cause real harm to our network.\n"
-"The I2P router is complex, and it can be a challenge to hide all the complexity from your users.\n"
+"The I2P router is complex, and it can be a challenge to hide all the "
+"complexity from your users.\n"
"This page discusses some general guidelines."
msgstr ""
@@ -3691,8 +4040,10 @@ msgstr ""
#: i2p2www/pages/site/docs/applications/embedding.html:24
msgid ""
-"Start a dialog. We're here to help. Applications that embed I2P are the most promising - and exciting -\n"
-"opportunities for us to grow the network and improve anonymity for everyone."
+"Start a dialog. We're here to help. Applications that embed I2P are the "
+"most promising - and exciting -\n"
+"opportunities for us to grow the network and improve anonymity for "
+"everyone."
msgstr ""
#: i2p2www/pages/site/docs/applications/embedding.html:30
@@ -3701,9 +4052,11 @@ msgstr ""
#: i2p2www/pages/site/docs/applications/embedding.html:31
msgid ""
-"If your application is in Java or Scala, it's an easy choice - use the Java router.\n"
+"If your application is in Java or Scala, it's an easy choice - use the "
+"Java router.\n"
"If in C/C++, we recommend i2pd. The development of i2pcpp has stopped.\n"
-"For apps in other languages, best to use SAM or BOB or SOCKS and bundle the Java router as a separate process.\n"
+"For apps in other languages, best to use SAM or BOB or SOCKS and bundle "
+"the Java router as a separate process.\n"
"Some of the following only applies to the Java router."
msgstr ""
@@ -3712,8 +4065,7 @@ msgid "Licensing"
msgstr ""
#: i2p2www/pages/site/docs/applications/embedding.html:40
-msgid ""
-"Ensure you meet the license requirements of the software you are bundling."
+msgid "Ensure you meet the license requirements of the software you are bundling."
msgstr ""
#: i2p2www/pages/site/docs/applications/embedding.html:45
@@ -3722,22 +4074,29 @@ msgstr ""
#: i2p2www/pages/site/docs/applications/embedding.html:46
msgid ""
-"A correct default configuration is crucial. Most users will not change the defaults.\n"
-"The defaults for your application may need to be different than the defaults for the router you are bundling.\n"
+"A correct default configuration is crucial. Most users will not change "
+"the defaults.\n"
+"The defaults for your application may need to be different than the "
+"defaults for the router you are bundling.\n"
"Override the router defaults if necessary."
msgstr ""
#: i2p2www/pages/site/docs/applications/embedding.html:51
msgid ""
-"Some important defaults to review: Max bandwidth, tunnel quantity and length, max participating tunnels.\n"
-"A lot of this depends on the expected bandwidth and usage patterns of your app."
+"Some important defaults to review: Max bandwidth, tunnel quantity and "
+"length, max participating tunnels.\n"
+"A lot of this depends on the expected bandwidth and usage patterns of "
+"your app."
msgstr ""
#: i2p2www/pages/site/docs/applications/embedding.html:55
msgid ""
-"Configure enough bandwidth and tunnels to allow your users to contribute to the network.\n"
-"Consider disabling external I2CP, as you probably don't need it and it would conflict with any other running I2P instance.\n"
-"Also look at the configs for disabling killing of the JVM on exit, for example."
+"Configure enough bandwidth and tunnels to allow your users to contribute "
+"to the network.\n"
+"Consider disabling external I2CP, as you probably don't need it and it "
+"would conflict with any other running I2P instance.\n"
+"Also look at the configs for disabling killing of the JVM on exit, for "
+"example."
msgstr ""
#: i2p2www/pages/site/docs/applications/embedding.html:62
@@ -3747,25 +4106,32 @@ msgstr ""
#: i2p2www/pages/site/docs/applications/embedding.html:63
msgid ""
"It may be tempting for you to disable participating traffic.\n"
-"There's several ways to do this (hidden mode, setting max tunnels to 0, setting shared bandwidth below 12 KBytes/sec).\n"
-"Without participating traffic, you don't have to worry about graceful shutdown,\n"
+"There's several ways to do this (hidden mode, setting max tunnels to 0, "
+"setting shared bandwidth below 12 KBytes/sec).\n"
+"Without participating traffic, you don't have to worry about graceful "
+"shutdown,\n"
"your users don't see bandwidth usage not generated by them, etc.\n"
-"However, there's lots of reasons why you should allow participating tunnels."
+"However, there's lots of reasons why you should allow participating "
+"tunnels."
msgstr ""
#: i2p2www/pages/site/docs/applications/embedding.html:70
msgid ""
-"First of all, the router doesn't work that well if it doesn't have a chance to \"integrate\" with the network,\n"
+"First of all, the router doesn't work that well if it doesn't have a "
+"chance to \"integrate\" with the network,\n"
"which is helped tremendously by others building tunnels through you."
msgstr ""
#: i2p2www/pages/site/docs/applications/embedding.html:74
msgid ""
-"Secondly, over 90% of the routers in the current network allow participating traffic.\n"
+"Secondly, over 90% of the routers in the current network allow "
+"participating traffic.\n"
"It's the default in the Java router.\n"
-"If your application doesn't route for others and it gets really popular, then it's a leech on the network,\n"
+"If your application doesn't route for others and it gets really popular, "
+"then it's a leech on the network,\n"
"and it upsets the balance we have now.\n"
-"If it gets really big, then we become Tor, and spend our time begging for people to enable relaying."
+"If it gets really big, then we become Tor, and spend our time begging for"
+" people to enable relaying."
msgstr ""
#: i2p2www/pages/site/docs/applications/embedding.html:81
@@ -3776,8 +4142,10 @@ msgstr ""
#: i2p2www/pages/site/docs/applications/embedding.html:84
msgid ""
-"We strongly discourage you from disabling participating traffic by default.\n"
-"If you do this and your application gets hugely popular, it could break the network."
+"We strongly discourage you from disabling participating traffic by "
+"default.\n"
+"If you do this and your application gets hugely popular, it could break "
+"the network."
msgstr ""
#: i2p2www/pages/site/docs/applications/embedding.html:90
@@ -3786,9 +4154,12 @@ msgstr ""
#: i2p2www/pages/site/docs/applications/embedding.html:91
msgid ""
-"You must save the router's data (netdb, configuration, etc.) between runs of the router.\n"
-"I2P does not work well if you must reseed each startup, and that's a huge load on our reseed servers, and not very good for anonymity either.\n"
-"Even if you bundle router infos, I2P needs saved profile data for best performance."
+"You must save the router's data (netdb, configuration, etc.) between runs"
+" of the router.\n"
+"I2P does not work well if you must reseed each startup, and that's a huge"
+" load on our reseed servers, and not very good for anonymity either.\n"
+"Even if you bundle router infos, I2P needs saved profile data for best "
+"performance."
msgstr ""
#: i2p2www/pages/site/docs/applications/embedding.html:99
@@ -3797,9 +4168,12 @@ msgstr ""
#: i2p2www/pages/site/docs/applications/embedding.html:100
msgid ""
-"Give your users a way to change the configuration of the important settings.\n"
-"We understand that you will probably want to hide most of I2P's complexity, but it's important to show some basic settings.\n"
-"In addition to the defaults above, some network settings such as UPnP, IP/port may be helpful."
+"Give your users a way to change the configuration of the important "
+"settings.\n"
+"We understand that you will probably want to hide most of I2P's "
+"complexity, but it's important to show some basic settings.\n"
+"In addition to the defaults above, some network settings such as UPnP, "
+"IP/port may be helpful."
msgstr ""
#: i2p2www/pages/site/docs/applications/embedding.html:108
@@ -3808,9 +4182,12 @@ msgstr ""
#: i2p2www/pages/site/docs/applications/embedding.html:109
msgid ""
-"Above a certain bandwidth setting, and meeting other health criteria, your router will become floodfill,\n"
-"which may cause a large increase in connections and memory usage (at least with the Java router).\n"
-"Think about whether that's OK. You can disable floodfill, but then your fastest users aren't contributing what they could.\n"
+"Above a certain bandwidth setting, and meeting other health criteria, "
+"your router will become floodfill,\n"
+"which may cause a large increase in connections and memory usage (at "
+"least with the Java router).\n"
+"Think about whether that's OK. You can disable floodfill, but then your "
+"fastest users aren't contributing what they could.\n"
"It also depends on the typical uptime for your application."
msgstr ""
@@ -3821,7 +4198,8 @@ msgstr ""
#: i2p2www/pages/site/docs/applications/embedding.html:120
msgid ""
"Decide if you are bundling router infos or using our reseed hosts.\n"
-"The Java reseed host list is in the source code, so if you keep your source up to date, the host list will be also.\n"
+"The Java reseed host list is in the source code, so if you keep your "
+"source up to date, the host list will be also.\n"
"Be aware of possible blocking by hostile governments."
msgstr ""
@@ -3831,9 +4209,12 @@ msgstr ""
#: i2p2www/pages/site/docs/applications/embedding.html:130
msgid ""
-"Consider setting your application tunnels to delay-open, reduce-on-idle and/or close-on-idle.\n"
-"This is straightforward if using i2ptunnel but you'll have to implement some of it yourself if using I2CP directly.\n"
-"See i2psnark for code that reduces tunnel count and then closes the tunnel, even in the presence of some background DHT activity."
+"Consider setting your application tunnels to delay-open, reduce-on-idle "
+"and/or close-on-idle.\n"
+"This is straightforward if using i2ptunnel but you'll have to implement "
+"some of it yourself if using I2CP directly.\n"
+"See i2psnark for code that reduces tunnel count and then closes the "
+"tunnel, even in the presence of some background DHT activity."
msgstr ""
#: i2p2www/pages/site/docs/applications/embedding.html:138
@@ -3842,11 +4223,16 @@ msgstr ""
#: i2p2www/pages/site/docs/applications/embedding.html:139
msgid ""
-"Have an auto-update feature if at all possible, or at least auto-notification of a new version.\n"
-"Our biggest fear is a huge number of routers out there that can't be updated.\n"
-"We have about 6-8 releases a year of the Java router, and it's critical to the health of the network that the users keep up.\n"
-"We usually have over 80% of the network on the latest release within 6 weeks after the release, and we'd like to keep it that way.\n"
-"You don't need to worry about disabling the router's built-in auto-update function, as that code is in the router console,\n"
+"Have an auto-update feature if at all possible, or at least auto-"
+"notification of a new version.\n"
+"Our biggest fear is a huge number of routers out there that can't be "
+"updated.\n"
+"We have about 6-8 releases a year of the Java router, and it's critical "
+"to the health of the network that the users keep up.\n"
+"We usually have over 80% of the network on the latest release within "
+"6 weeks after the release, and we'd like to keep it that way.\n"
+"You don't need to worry about disabling the router's built-in auto-update"
+" function, as that code is in the router console,\n"
"which you presumably are not bundling."
msgstr ""
@@ -3857,12 +4243,17 @@ msgstr ""
#: i2p2www/pages/site/docs/applications/embedding.html:151
msgid ""
"Have a gradual rollout plan. Don't overwhelm the network all at once.\n"
-"We currently have approximately 25K unique users per day and 40K uniques per month.\n"
-"We are probably able to handle growth of 2-3X per year without too much issue.\n"
-"If you anticipate a faster rampup than that, OR the bandwidth distribution (or uptime distribution,\n"
-"or any other significant characteristic) of your userbase is significantly different from our current userbase,\n"
+"We currently have approximately 25K unique users per day and 40K uniques "
+"per month.\n"
+"We are probably able to handle growth of 2-3X per year without too much "
+"issue.\n"
+"If you anticipate a faster rampup than that, OR the bandwidth "
+"distribution (or uptime distribution,\n"
+"or any other significant characteristic) of your userbase is "
+"significantly different from our current userbase,\n"
"we really need to have a discussion.\n"
-"The bigger your growth plans, the more important everthing else in this checklist is."
+"The bigger your growth plans, the more important everthing else in this "
+"checklist is."
msgstr ""
#: i2p2www/pages/site/docs/applications/embedding.html:163
@@ -3872,8 +4263,10 @@ msgstr ""
#: i2p2www/pages/site/docs/applications/embedding.html:164
msgid ""
"Tell your users that I2P works best if it keeps running.\n"
-"It may be several minutes after startup before it works well, and even more after first install.\n"
-"If your average uptime is less than an hour, I2P is probably the wrong solution."
+"It may be several minutes after startup before it works well, and even "
+"more after first install.\n"
+"If your average uptime is less than an hour, I2P is probably the wrong "
+"solution."
msgstr ""
#: i2p2www/pages/site/docs/applications/embedding.html:172
@@ -3882,8 +4275,8 @@ msgstr ""
#: i2p2www/pages/site/docs/applications/embedding.html:173
msgid ""
-"Provide some indication to the user that the application tunnels are ready. "
-"Encourage patience."
+"Provide some indication to the user that the application tunnels are "
+"ready. Encourage patience."
msgstr ""
#: i2p2www/pages/site/docs/applications/embedding.html:178
@@ -3893,7 +4286,8 @@ msgstr ""
#: i2p2www/pages/site/docs/applications/embedding.html:179
msgid ""
"If possible, delay the shutdown until your participating tunnels expire.\n"
-"Don't let your users break tunnels easily, or at least ask them to confirm."
+"Don't let your users break tunnels easily, or at least ask them to "
+"confirm."
msgstr ""
#: i2p2www/pages/site/docs/applications/embedding.html:185
@@ -3902,8 +4296,8 @@ msgstr ""
#: i2p2www/pages/site/docs/applications/embedding.html:186
msgid ""
-"It would be nice if you give your users links to learn more about I2P and to"
-" donate."
+"It would be nice if you give your users links to learn more about I2P and"
+" to donate."
msgstr ""
#: i2p2www/pages/site/docs/applications/embedding.html:192
@@ -3913,7 +4307,8 @@ msgstr ""
#: i2p2www/pages/site/docs/applications/embedding.html:193
msgid ""
"Depending on your user base and application,\n"
-"it may be helpful to provide an option or a separate package to use an external router."
+"it may be helpful to provide an option or a separate package to use an "
+"external router."
msgstr ""
#: i2p2www/pages/site/docs/applications/embedding.html:200
@@ -3922,7 +4317,8 @@ msgstr ""
#: i2p2www/pages/site/docs/applications/embedding.html:201
msgid ""
-"If you plan to use or link to other common I2P services (news feeds, hosts.txt subscriptions, trackers, outproxies, etc.),\n"
+"If you plan to use or link to other common I2P services (news feeds, "
+"hosts.txt subscriptions, trackers, outproxies, etc.),\n"
"make sure you aren't overloading them,\n"
"and talk to the people who are running them to make sure it's ok."
msgstr ""
@@ -3934,8 +4330,10 @@ msgstr ""
#: i2p2www/pages/site/docs/applications/embedding.html:210
msgid ""
"I2P includes an SNTP client. I2P requires correct time to operate.\n"
-"It will compensate for a skewed system clock but this may delay startup. You may disable I2P's SNTP queries,\n"
-"but this isn't advised unless your application makes sure the system clock is correct."
+"It will compensate for a skewed system clock but this may delay startup. "
+"You may disable I2P's SNTP queries,\n"
+"but this isn't advised unless your application makes sure the system "
+"clock is correct."
msgstr ""
#: i2p2www/pages/site/docs/applications/embedding.html:218
@@ -3944,15 +4342,20 @@ msgstr ""
#: i2p2www/pages/site/docs/applications/embedding.html:219
msgid ""
-"At a minimum you will need i2p.jar, router.jar, streaming.jar, and mstreaming.jar.\n"
+"At a minimum you will need i2p.jar, router.jar, streaming.jar, and "
+"mstreaming.jar.\n"
"You may omit the two straming jars for a datagram-only app.\n"
"Some apps may need more, e.g. i2ptunnel.jar or addressbook.jar.\n"
-"Don't forget jbigi.jar, or a subset of it for the platforms you support, to make the crypto much faster.\n"
-"We are currently building them for Java 6, as of 0.9.14. The source is mostly compatible with Java 5 if you want to do your own compile,\n"
+"Don't forget jbigi.jar, or a subset of it for the platforms you support, "
+"to make the crypto much faster.\n"
+"We are currently building them for Java 6, as of 0.9.14. The source is "
+"mostly compatible with Java 5 if you want to do your own compile,\n"
"but we may start using Java 6 features at any time without notice.\n"
"We plan to migrate to Java 7 in 2015.\n"
-"If you're building Debian / Ubuntu packages, you should require the I2P package from our PPA instead of bundling it.\n"
-"You almost certainly do not need susimail, susidns, the router console, and i2psnark, for example."
+"If you're building Debian / Ubuntu packages, you should require the I2P "
+"package from our PPA instead of bundling it.\n"
+"You almost certainly do not need susimail, susidns, the router console, "
+"and i2psnark, for example."
msgstr ""
#: i2p2www/pages/site/docs/applications/embedding.html:233
@@ -3970,13 +4373,17 @@ msgstr ""
#: i2p2www/pages/site/docs/applications/embedding.html:245
msgid ""
"If your application is using I2P datagrams, e.g. for a DHT,\n"
-"there's lots of advanced options available to reduce overhead and increase reliability.\n"
+"there's lots of advanced options available to reduce overhead and "
+"increase reliability.\n"
"This may take some time and experimentation to get working well.\n"
"Be aware of size/reliability tradeoffs. Talk to us for help.\n"
-"It is possible - and recommended - to use Datagrams and Streaming on the same Destination.\n"
+"It is possible - and recommended - to use Datagrams and Streaming on the "
+"same Destination.\n"
"Don't create separate Destinations for this.\n"
-"Don't try to store your unrelated data in the existing network DHTs (iMule, bote, bittorrent, and router).\n"
-"Build your own. If you are hardcoding seed nodes, we recommend that you have several."
+"Don't try to store your unrelated data in the existing network DHTs "
+"(iMule, bote, bittorrent, and router).\n"
+"Build your own. If you are hardcoding seed nodes, we recommend that you "
+"have several."
msgstr ""
#: i2p2www/pages/site/docs/applications/embedding.html:258
@@ -3986,7 +4393,8 @@ msgstr ""
#: i2p2www/pages/site/docs/applications/embedding.html:259
msgid ""
"Let's work together. Don't wait until it's done.\n"
-"Give us your Twitter handle and start tweeting about it, we will return the favor."
+"Give us your Twitter handle and start tweeting about it, we will return "
+"the favor."
msgstr ""
#: i2p2www/pages/site/docs/applications/embedding.html:265
@@ -4005,7 +4413,8 @@ msgstr ""
#: i2p2www/pages/site/docs/applications/embedding.html:273
msgid ""
-"This may be obvious, but join the community. Run I2P 24/7. Start an eepsite about your project.\n"
+"This may be obvious, but join the community. Run I2P 24/7. Start an "
+"eepsite about your project.\n"
"Hang out in IRC #i2p-dev. Post on the forums. Spread the word.\n"
"We can help get you users, testers, translators, or even coders."
msgstr ""
@@ -4016,10 +4425,12 @@ msgstr ""
#: i2p2www/pages/site/docs/applications/embedding.html:282
msgid ""
-"You may wish to install and play with the I2P Android app, and look at its code, for an example of an application that bundles the router.\n"
+"You may wish to install and play with the I2P Android app, and look at "
+"its code, for an example of an application that bundles the router.\n"
"See what we expose to the user and what we hide.\n"
"Look at the state machine we use to start and stop the router.\n"
-"Other examples are: Vuze, the Nightweb Android app, iMule, TAILS, iCloak, and Monero."
+"Other examples are: Vuze, the Nightweb Android app, iMule, TAILS, iCloak,"
+" and Monero."
msgstr ""
#: i2p2www/pages/site/docs/applications/embedding.html:290
@@ -4034,8 +4445,10 @@ msgstr ""
#: i2p2www/pages/site/docs/applications/embedding.html:306
msgid ""
-"This code is for the case where your application starts the router, as in our Android app.\n"
-"You could also have the router start the applictaion via the clients.config and i2ptunnel.config files,\n"
+"This code is for the case where your application starts the router, as in"
+" our Android app.\n"
+"You could also have the router start the applictaion via the "
+"clients.config and i2ptunnel.config files,\n"
"together with Jetty webapps,\n"
"as is done in our Java packages.\n"
"As always, state management is the difficult part."
@@ -4062,18 +4475,24 @@ msgstr ""
msgid ""
"As of release 0.9.4, the router supports managed clients.\n"
"Managed clients are instantiated and started by the ClientAppManager.\n"
-"The ClientAppManager maintains a reference to the client and receives updates on the client's state.\n"
-"Managed clients are preferred, as it is much easier to implement state tracking\n"
-"and to start and stop a client. It also is much easier to avoid static references in the client code\n"
+"The ClientAppManager maintains a reference to the client and receives "
+"updates on the client's state.\n"
+"Managed clients are preferred, as it is much easier to implement state "
+"tracking\n"
+"and to start and stop a client. It also is much easier to avoid static "
+"references in the client code\n"
"which could lead to excessive memory usage after a client is stopped.\n"
-"Managed clients may be started and stopped by the user in the router console,\n"
+"Managed clients may be started and stopped by the user in the router "
+"console,\n"
"and are stopped at router shutdown."
msgstr ""
#: i2p2www/pages/site/docs/applications/managed-clients.html:31
msgid ""
-"Managed clients implement either the net.i2p.app.ClientApp or net.i2p.router.app.RouterApp interface.\n"
-"Clients implementing the ClientApp interface must provide the following constructor:"
+"Managed clients implement either the net.i2p.app.ClientApp or "
+"net.i2p.router.app.RouterApp interface.\n"
+"Clients implementing the ClientApp interface must provide the following "
+"constructor:"
msgstr ""
#: i2p2www/pages/site/docs/applications/managed-clients.html:38
@@ -4092,10 +4511,12 @@ msgstr ""
#: i2p2www/pages/site/docs/applications/managed-clients.html:49
msgid ""
-"If the main class specified in the clients.config file does not implement a managed interface,\n"
+"If the main class specified in the clients.config file does not implement"
+" a managed interface,\n"
"it will be started with main() with the arguments specified,\n"
"and stopped with main() with the arguments specified.\n"
-"The router does not maintain a reference, since all interactions are via the static main() method.\n"
+"The router does not maintain a reference, since all interactions are via "
+"the static main() method.\n"
"The console cannot provide accurate state information to the user."
msgstr ""
@@ -4105,7 +4526,8 @@ msgstr ""
#: i2p2www/pages/site/docs/applications/managed-clients.html:58
msgid ""
-"Clients, whether managed or unmanaged, may register with the ClientAppManager\n"
+"Clients, whether managed or unmanaged, may register with the "
+"ClientAppManager\n"
"so that other clients may retrieve a reference to them.\n"
"Registration is by name.\n"
"Known registered clients are:"
@@ -4117,10 +4539,12 @@ msgstr ""
#: i2p2www/pages/site/docs/applications/managed-clients.html:69
msgid ""
-"The router also provides a simple mechanism for clients to find an internal socket service,\n"
+"The router also provides a simple mechanism for clients to find an "
+"internal socket service,\n"
"such as the HTTP proxy. This is provided by the Port Mapper.\n"
"Registration is by name.\n"
-"Clients that register generally provide an internal emulated socket on that port."
+"Clients that register generally provide an internal emulated socket on "
+"that port."
msgstr ""
#: i2p2www/pages/site/docs/applications/supported.html:2
@@ -4392,12 +4816,17 @@ msgstr ""
#, python-format
msgid ""
"Warning: Using an application, plugin, or service with I2P\n"
-"doesn't automatically protect your anonymity. I2P is merely a set of tools\n"
-"which can help you mitigate certain identified\n"
-"threats to anonymity. We do not and cannot make any guarantees about the\n"
+"doesn't automatically protect your anonymity. I2P is merely a set of "
+"tools\n"
+"which can help you mitigate certain identified\n"
+"threats to anonymity. We do not and cannot make any guarantees about "
+"the\n"
"safety of the applications, plugins, and services listed below. Most\n"
-"applications and plugins must be properly configured, and some will need to\n"
-"be patched — and even then your anonymity might not be assured. Similarly,\n"
+"applications and plugins must be properly configured, and some will need "
+"to\n"
+"be patched — and even then your anonymity might not be assured. "
+"Similarly,\n"
"services could put your anonymity at risk, either by design or through\n"
"carelessness on their part or your own."
msgstr ""
@@ -4405,8 +4834,10 @@ msgstr ""
#: i2p2www/pages/site/docs/applications/supported.html:171
msgid ""
"If you have doubts about the suitability of an application,\n"
-"plugin, or service for use with I2P, you are urged to inquire about privacy\n"
-"issues with its maintainers, to search its mailing lists and bug tracker if\n"
+"plugin, or service for use with I2P, you are urged to inquire about "
+"privacy\n"
+"issues with its maintainers, to search its mailing lists and bug tracker "
+"if\n"
"one exists, and consult trusted, knowledgeable members of the I2P\n"
"community."
msgstr ""
@@ -4414,7 +4845,8 @@ msgstr ""
#: i2p2www/pages/site/docs/applications/supported.html:179
msgid ""
"Take responsibility for your own anonymity and safety — always\n"
-"seek expert advice, educate yourself, practice good judgment, be mindful of\n"
+"seek expert advice, educate yourself, practice good judgment, be mindful "
+"of\n"
"disclosing personally identifying information, and don't take\n"
"shortcuts."
msgstr ""
@@ -4445,7 +4877,8 @@ msgstr ""
#: i2p2www/pages/site/docs/applications/supported.html:236
#, python-format
msgid ""
-"Port of the Tahoe-LAFS\n"
+"Port of the Tahoe-"
+"LAFS\n"
"distributed file system to the I2P network. Controller plugin here."
msgstr ""
@@ -4467,8 +4900,10 @@ msgid ""
"Provides management of addressbooks, which are part of a simple,\n"
"user-controlled I2P naming system somewhat\n"
"analogous to the Internet's Domain Name System (DNS). Addressbooks map\n"
-"Base64 destinations to short, usually human-readable “domain” names ending\n"
-"with a .i2p suffix which the I2P router's HTTP client can resolve back to\n"
+"Base64 destinations to short, usually human-readable “domain” names "
+"ending\n"
+"with a .i2p suffix which the I2P router's HTTP client can resolve back to"
+"\n"
"Base64 addresses. (Note: While Base64 destinations are globally\n"
"unique, addressbook “domain” names only resolve to unique destinations\n"
"locally.)"
@@ -4483,7 +4918,8 @@ msgstr ""
#: i2p2www/pages/site/docs/applications/supported.html:297
msgid ""
"Provides email service within the I2P network via @mail.i2p addresses,\n"
-"and email gateway service between the I2P network and the public Internet\n"
+"and email gateway service between the I2P network and the public Internet"
+"\n"
"via @i2pmail.org addresses. One of the oldest continuous services on I2P."
msgstr ""
@@ -4538,7 +4974,8 @@ msgstr ""
#: i2p2www/pages/site/docs/applications/supported.html:382
msgid ""
-"The code that powered one of the first major tracker/indexer sites on the\n"
+"The code that powered one of the first major tracker/indexer sites on the"
+"\n"
"Internet. Patched for I2P."
msgstr ""
@@ -4563,7 +5000,8 @@ msgstr ""
#: i2p2www/pages/site/docs/applications/supported.html:422
#, python-format
msgid ""
-"Port of the Phex Gnutella client. Website\n"
+"Port of the Phex Gnutella "
+"client. Website\n"
"for plugin version here."
msgstr ""
@@ -4586,13 +5024,14 @@ msgstr ""
#: i2p2www/pages/site/docs/applications/supported.html:461
msgid ""
-"Proxy providing simple, transparent SOCKS-ification of network applications."
+"Proxy providing simple, transparent SOCKS-ification of network "
+"applications."
msgstr ""
#: i2p2www/pages/site/docs/applications/supported.html:471
msgid ""
-"Most popular implementation of the Secure Shell (SSH) protocol and related "
-"tools."
+"Most popular implementation of the Secure Shell (SSH) protocol and "
+"related tools."
msgstr ""
#: i2p2www/pages/site/docs/applications/supported.html:477
@@ -4606,21 +5045,29 @@ msgstr ""
#: i2p2www/pages/site/docs/applications/supported.html:496
msgid ""
"Many IRC clients leak identifying information to servers or other\n"
-"clients, so I2P's IRC and SOCKS IRC client tunnels filter certain inbound\n"
-"and outbound messages to scrub data such as LAN IP addresses, external IP\n"
-"addresses, local hostnames, and the name and version of the IRC client. Two\n"
-"message types in particular, DCC and CTCP, can't be sufficiently anonymized\n"
-"without changes to the protocols or to IRC client/server code, so they are\n"
+"clients, so I2P's IRC and SOCKS IRC client tunnels filter certain inbound"
+"\n"
+"and outbound messages to scrub data such as LAN IP addresses, external IP"
+"\n"
+"addresses, local hostnames, and the name and version of the IRC client. "
+"Two\n"
+"message types in particular, DCC and CTCP, can't be sufficiently "
+"anonymized\n"
+"without changes to the protocols or to IRC client/server code, so they "
+"are\n"
"completely blocked, except for CTCP ACTION (the message emitted by the\n"
"/me
command) which isn't inherently dangerous."
msgstr ""
#: i2p2www/pages/site/docs/applications/supported.html:507
msgid ""
-"I2P's IRC filtering may not cover every possible leak — users should also\n"
-"check if their client is sending their real name or local username. Packet\n"
+"I2P's IRC filtering may not cover every possible leak — users should also"
+"\n"
+"check if their client is sending their real name or local username. "
+"Packet\n"
"sniffers such as Wireshark are\n"
-"useful here. Eliminating remaining leaks may be as simple as changing the\n"
+"useful here. Eliminating remaining leaks may be as simple as changing the"
+"\n"
"client's default configuration. If that doesn't help, inform the I2P\n"
"developers; they may be able to solve it via additional filtering."
msgstr ""
@@ -4654,8 +5101,8 @@ msgstr ""
#: i2p2www/pages/site/docs/applications/supported.html:568
msgid ""
-"Any website hosted anonymously on I2P, reachable through the I2P router's "
-"HTTP proxy."
+"Any website hosted anonymously on I2P, reachable through the I2P router's"
+" HTTP proxy."
msgstr ""
#: i2p2www/pages/site/docs/applications/supported.html:576
@@ -4715,7 +5162,8 @@ msgstr ""
#: i2p2www/pages/site/docs/applications/supported.html:671
msgid ""
-"Gateways allowing I2P users to access content hosted on the public Internet."
+"Gateways allowing I2P users to access content hosted on the public "
+"Internet."
msgstr ""
#: i2p2www/pages/site/docs/applications/supported.html:678
@@ -4725,9 +5173,12 @@ msgstr ""
#: i2p2www/pages/site/docs/applications/supported.html:688
msgid ""
"Lightweight web server and Java servlet container. I2P is tightly\n"
-"integrated with a bundled copy of Jetty which by default is configured to\n"
-"host the user's eepsite. The bundled\n"
-"Jetty also serves the I2P router console and web applications bundled with\n"
+"integrated with a bundled copy of Jetty which by default is configured to"
+"\n"
+"host the user's eepsite. The "
+"bundled\n"
+"Jetty also serves the I2P router console and web applications bundled "
+"with\n"
"I2P."
msgstr ""
@@ -4761,7 +5212,8 @@ msgstr ""
#: i2p2www/pages/site/docs/discussions/naming.html:4
#, python-format
msgid ""
-"NOTE: The following is a discussion of the reasons behind the I2P naming system,\n"
+"NOTE: The following is a discussion of the reasons behind the I2P naming "
+"system,\n"
"common arguments and possible alternatives.\n"
"See the naming page for current documentation."
msgstr ""
@@ -4772,49 +5224,72 @@ msgstr ""
#: i2p2www/pages/site/docs/discussions/naming.html:12
msgid ""
-"Naming within I2P has been an oft-debated topic since the very beginning with\n"
-"advocates across the spectrum of possibilities. However, given I2P's inherent\n"
-"demand for secure communication and decentralized operation, the traditional\n"
-"DNS-style naming system is clearly out, as are \"majority rules\" voting systems."
+"Naming within I2P has been an oft-debated topic since the very beginning "
+"with\n"
+"advocates across the spectrum of possibilities. However, given I2P's "
+"inherent\n"
+"demand for secure communication and decentralized operation, the "
+"traditional\n"
+"DNS-style naming system is clearly out, as are \"majority rules\" voting "
+"systems."
msgstr ""
#: i2p2www/pages/site/docs/discussions/naming.html:19
msgid ""
-"I2P does not promote the use of DNS-like services though, as the damage done\n"
-"by hijacking a site can be tremendous - and insecure destinations have no\n"
-"value. DNSsec itself still falls back on registrars and certificate authorities,\n"
-"while with I2P, requests sent to a destination cannot be intercepted or the reply\n"
-"spoofed, as they are encrypted to the destination's public keys, and a destination\n"
-"itself is just a pair of public keys and a certificate. DNS-style systems on the\n"
-"other hand allow any of the name servers on the lookup path to mount simple denial\n"
-"of service and spoofing attacks. Adding on a certificate authenticating the\n"
-"responses as signed by some centralized certificate authority would address many of\n"
-"the hostile nameserver issues but would leave open replay attacks as well as \n"
+"I2P does not promote the use of DNS-like services though, as the damage "
+"done\n"
+"by hijacking a site can be tremendous - and insecure destinations have no"
+"\n"
+"value. DNSsec itself still falls back on registrars and certificate "
+"authorities,\n"
+"while with I2P, requests sent to a destination cannot be intercepted or "
+"the reply\n"
+"spoofed, as they are encrypted to the destination's public keys, and a "
+"destination\n"
+"itself is just a pair of public keys and a certificate. DNS-style "
+"systems on the\n"
+"other hand allow any of the name servers on the lookup path to mount "
+"simple denial\n"
+"of service and spoofing attacks. Adding on a certificate authenticating "
+"the\n"
+"responses as signed by some centralized certificate authority would "
+"address many of\n"
+"the hostile nameserver issues but would leave open replay attacks as well"
+" as \n"
"hostile certificate authority attacks."
msgstr ""
#: i2p2www/pages/site/docs/discussions/naming.html:33
msgid ""
-"Voting style naming is dangerous as well, especially given the effectiveness of\n"
-"Sybil attacks in anonymous systems - the attacker can simply create an arbitrarily\n"
-"high number of peers and \"vote\" with each to take over a given name. Proof-of-work\n"
-"methods can be used to make identity non-free, but as the network grows the load\n"
-"required to contact everyone to conduct online voting is implausible, or if the\n"
+"Voting style naming is dangerous as well, especially given the "
+"effectiveness of\n"
+"Sybil attacks in anonymous systems - the attacker can simply create an "
+"arbitrarily\n"
+"high number of peers and \"vote\" with each to take over a given name. "
+"Proof-of-work\n"
+"methods can be used to make identity non-free, but as the network grows "
+"the load\n"
+"required to contact everyone to conduct online voting is implausible, or "
+"if the\n"
"full network is not queried, different sets of answers may be reachable."
msgstr ""
#: i2p2www/pages/site/docs/discussions/naming.html:42
msgid ""
-"As with the Internet however, I2P is keeping the design and operation of a \n"
-"naming system out of the (IP-like) communication layer. The bundled naming library\n"
-"includes a simple service provider interface which alternate naming systems can\n"
-"plug into, allowing end users to drive what sort of naming tradeoffs they prefer."
+"As with the Internet however, I2P is keeping the design and operation of "
+"a \n"
+"naming system out of the (IP-like) communication layer. The bundled "
+"naming library\n"
+"includes a simple service provider interface which alternate naming systems can\n"
+"plug into, allowing end users to drive what sort of naming tradeoffs they"
+" prefer."
msgstr ""
#: i2p2www/pages/site/docs/discussions/naming.html:50
msgid ""
-"See also Names: Decentralized, "
-"Secure, Human-Meaningful: Choose Two."
+"See also Names: "
+"Decentralized, Secure, Human-Meaningful: Choose Two."
msgstr ""
#: i2p2www/pages/site/docs/discussions/naming.html:55
@@ -4825,26 +5300,36 @@ msgstr ""
msgid ""
"Q:\n"
"What to do if some hosts \n"
-"do not agree on one address and if some addresses are working, others are not? \n"
+"do not agree on one address and if some addresses are working, others are"
+" not? \n"
"Who is the right source of a name?"
msgstr ""
#: i2p2www/pages/site/docs/discussions/naming.html:64
msgid ""
"A:\n"
-"You don't. This is actually a critical difference between names on I2P and how \n"
-"DNS works - names in I2P are human readable, secure, but not globally \n"
-"unique. This is by design, and an inherent part of our need for security."
+"You don't. This is actually a critical difference between names on I2P "
+"and how \n"
+"DNS works - names in I2P are human readable, secure, but not globally"
+" \n"
+"unique. This is by design, and an inherent part of our need for "
+"security."
msgstr ""
#: i2p2www/pages/site/docs/discussions/naming.html:70
msgid ""
-"If I could somehow convince you to change the destination associated with some \n"
-"name, I'd successfully \"take over\" the site, and under no circumstances is that \n"
-"acceptable. Instead, what we do is make names locally unique: they are \n"
-"what you use to call a site, just as how you can call things whatever \n"
-"you want when you add them to your browser's bookmarks, or your IM client's \n"
-"buddy list. Who you call \"Boss\" may be who someone else calls \"Sally\"."
+"If I could somehow convince you to change the destination associated with"
+" some \n"
+"name, I'd successfully \"take over\" the site, and under no circumstances"
+" is that \n"
+"acceptable. Instead, what we do is make names locally unique: "
+"they are \n"
+"what you use to call a site, just as how you can call things "
+"whatever \n"
+"you want when you add them to your browser's bookmarks, or your IM "
+"client's \n"
+"buddy list. Who you call \"Boss\" may be who someone else calls "
+"\"Sally\"."
msgstr ""
#: i2p2www/pages/site/docs/discussions/naming.html:78
@@ -4860,33 +5345,44 @@ msgstr ""
#: i2p2www/pages/site/docs/discussions/naming.html:89
msgid ""
"Inefficiency:\n"
-"The whole hosts.txt is downloaded (if it has changed, since eepget uses the etag and last-modified headers).\n"
+"The whole hosts.txt is downloaded (if it has changed, since eepget uses "
+"the etag and last-modified headers).\n"
"It's about 400K right now for almost 800 hosts."
msgstr ""
#: i2p2www/pages/site/docs/discussions/naming.html:94
msgid ""
-"True, but this isn't a lot of traffic in the context of i2p, which is itself wildly inefficient\n"
-"(floodfill databases, huge encryption overhead and padding, garlic routing, etc.).\n"
-"If you downloaded a hosts.txt file from someone every 12 hours it averages out to about 10 bytes/sec."
+"True, but this isn't a lot of traffic in the context of i2p, which is "
+"itself wildly inefficient\n"
+"(floodfill databases, huge encryption overhead and padding, garlic "
+"routing, etc.).\n"
+"If you downloaded a hosts.txt file from someone every 12 hours it "
+"averages out to about 10 bytes/sec."
msgstr ""
#: i2p2www/pages/site/docs/discussions/naming.html:99
msgid ""
-"As is usually the case in i2p, there is a fundamental tradeoff here between anonymity and efficiency.\n"
-"Some would say that using the etag and last-modified headers is hazardous because it exposes when you\n"
+"As is usually the case in i2p, there is a fundamental tradeoff here "
+"between anonymity and efficiency.\n"
+"Some would say that using the etag and last-modified headers is hazardous"
+" because it exposes when you\n"
"last requested the data.\n"
-"Others have suggested asking for specific keys only (similar to what jump services do, but\n"
+"Others have suggested asking for specific keys only (similar to what jump"
+" services do, but\n"
"in a more automated fashion), possibly at a further cost in anonymity."
msgstr ""
#: i2p2www/pages/site/docs/discussions/naming.html:106
#, python-format
msgid ""
-"Possible improvements would be a replacement or supplement to addressbook (see %(i2host)sp),\n"
-"or something simple like subscribing to http://example.i2p/cgi-bin/recenthosts.cgi rather than http://example.i2p/hosts.txt.\n"
-"If a hypothetical recenthosts.cgi distributed all hosts from the last 24 hours, for example,\n"
-"that could be both more efficient and more anonymous than the current hosts.txt with last-modified and etag."
+"Possible improvements would be a replacement or supplement to addressbook"
+" (see %(i2host)sp),\n"
+"or something simple like subscribing to http://example.i2p/cgi-"
+"bin/recenthosts.cgi rather than http://example.i2p/hosts.txt.\n"
+"If a hypothetical recenthosts.cgi distributed all hosts from the last 24 "
+"hours, for example,\n"
+"that could be both more efficient and more anonymous than the current "
+"hosts.txt with last-modified and etag."
msgstr ""
#: i2p2www/pages/site/docs/discussions/naming.html:112
@@ -4896,14 +5392,17 @@ msgid ""
"%(url)s.\n"
"This script returns an Etag with a timestamp.\n"
"When a request comes in with the If-None-Match etag,\n"
-"the script ONLY returns new hosts since that timestamp, or 304 Not Modified if there are none.\n"
-"In this way, the script efficiently returns only the hosts the subscriber\n"
+"the script ONLY returns new hosts since that timestamp, or 304 Not "
+"Modified if there are none.\n"
+"In this way, the script efficiently returns only the hosts the subscriber"
+"\n"
"does not know about, in an addressbook-compatible manner."
msgstr ""
#: i2p2www/pages/site/docs/discussions/naming.html:121
msgid ""
-"So the inefficiency is not a big issue and there are several ways to improve things without\n"
+"So the inefficiency is not a big issue and there are several ways to "
+"improve things without\n"
"radical change."
msgstr ""
@@ -4917,30 +5416,37 @@ msgstr ""
#: i2p2www/pages/site/docs/discussions/naming.html:132
msgid ""
"As far as network traffic see above.\n"
-"But unless you're going to do a slow real-time query over the network for\n"
-"a key, you need to have the whole set of keys stored locally, at a cost of about 500 bytes per key."
+"But unless you're going to do a slow real-time query over the network for"
+"\n"
+"a key, you need to have the whole set of keys stored locally, at a cost "
+"of about 500 bytes per key."
msgstr ""
#: i2p2www/pages/site/docs/discussions/naming.html:139
msgid ""
"Requires configuration and \"trust\":\n"
-"Out-of-the-box addressbook is only subscribed to http://www.i2p2.i2p/hosts.txt, which is rarely updated,\n"
+"Out-of-the-box addressbook is only subscribed to "
+"http://www.i2p2.i2p/hosts.txt, which is rarely updated,\n"
"leading to poor new-user experience."
msgstr ""
#: i2p2www/pages/site/docs/discussions/naming.html:144
msgid ""
-"This is very much intentional. jrandom wants a user to \"trust\" a hosts.txt\n"
+"This is very much intentional. jrandom wants a user to \"trust\" a "
+"hosts.txt\n"
"provider, and as he likes to say, \"trust is not a boolean\".\n"
-"The configuration step attempts to force users to think about issues of trust in an anonymous network."
+"The configuration step attempts to force users to think about issues of "
+"trust in an anonymous network."
msgstr ""
#: i2p2www/pages/site/docs/discussions/naming.html:149
msgid ""
"As another example, the \"Eepsite Unknown\" error page in the HTTP Proxy\n"
-"lists some jump services, but doesn't \"recommend\" any one in particular,\n"
+"lists some jump services, but doesn't \"recommend\" any one in "
+"particular,\n"
"and it's up to the user to pick one (or not).\n"
-"jrandom would say we trust the listed providers enough to list them but not enough to\n"
+"jrandom would say we trust the listed providers enough to list them but "
+"not enough to\n"
"automatically go fetch the key from them."
msgstr ""
@@ -4957,13 +5463,14 @@ msgstr ""
#: i2p2www/pages/site/docs/discussions/naming.html:166
msgid ""
-"Unfortunately real-time lookups over i2p would significantly slow down web "
-"browsing."
+"Unfortunately real-time lookups over i2p would significantly slow down "
+"web browsing."
msgstr ""
#: i2p2www/pages/site/docs/discussions/naming.html:169
msgid ""
-"Also, DNS is based on lookups with limited caching and time-to-live, while i2p\n"
+"Also, DNS is based on lookups with limited caching and time-to-live, "
+"while i2p\n"
"keys are permanent."
msgstr ""
@@ -4982,21 +5489,26 @@ msgid ""
"Yes it depends on a few servers that you have configured.\n"
"Within i2p, servers and services come and go.\n"
"Any other centralized system (for example DNS root servers) would\n"
-"have the same problem. A completely decentralized system (everybody is authoritative)\n"
-"is possible by implementing an \"everybody is a root DNS server\" solution, or by\n"
-"something even simpler, like a script that adds everybody in your hosts.txt to your addressbook."
+"have the same problem. A completely decentralized system (everybody is "
+"authoritative)\n"
+"is possible by implementing an \"everybody is a root DNS server\" "
+"solution, or by\n"
+"something even simpler, like a script that adds everybody in your "
+"hosts.txt to your addressbook."
msgstr ""
#: i2p2www/pages/site/docs/discussions/naming.html:190
msgid ""
-"People advocating all-authoritative solutions generally haven't thought through\n"
+"People advocating all-authoritative solutions generally haven't thought "
+"through\n"
"the issues of conflicts and hijacking, however."
msgstr ""
#: i2p2www/pages/site/docs/discussions/naming.html:196
msgid ""
"Awkward, not real-time:\n"
-"It's a patchwork of hosts.txt providers, key-add web form providers, jump service providers,\n"
+"It's a patchwork of hosts.txt providers, key-add web form providers, jump"
+" service providers,\n"
"eepsite status reporters.\n"
"Jump servers and subscriptions are a pain, it should just work like DNS."
msgstr ""
@@ -5007,7 +5519,8 @@ msgstr ""
#: i2p2www/pages/site/docs/discussions/naming.html:207
msgid ""
-"So, in summary, the current system is not horribly broken, inefficient, or un-scalable,\n"
+"So, in summary, the current system is not horribly broken, inefficient, "
+"or un-scalable,\n"
"and proposals to \"just use DNS\" aren't well thought-through."
msgstr ""
@@ -5017,7 +5530,8 @@ msgstr ""
#: i2p2www/pages/site/docs/discussions/naming.html:213
msgid ""
-"The I2P source contains several pluggable naming systems and supports configuration options\n"
+"The I2P source contains several pluggable naming systems and supports "
+"configuration options\n"
"to enable experimentation with naming systems."
msgstr ""
@@ -5039,8 +5553,8 @@ msgstr ""
#: i2p2www/pages/site/docs/discussions/naming.html:234
msgid ""
-"AddressDB - Each host is listed in a separate file in a addressDb/ "
-"directory."
+"AddressDB - Each host is listed in a separate file in a addressDb/"
+" directory."
msgstr ""
#: i2p2www/pages/site/docs/discussions/naming.html:237
@@ -5065,7 +5579,8 @@ msgstr ""
#: i2p2www/pages/site/docs/discussions/naming.html:253
msgid ""
-"The current naming system can be changed with the advanced config option 'i2p.naming.impl'\n"
+"The current naming system can be changed with the advanced config option "
+"'i2p.naming.impl'\n"
"(restart required).\n"
"See core/java/src/net/i2p/client/naming for details."
msgstr ""
@@ -5073,7 +5588,8 @@ msgstr ""
#: i2p2www/pages/site/docs/discussions/naming.html:258
msgid ""
"Any new system should be stacked with HostsTxt, or should\n"
-"implement local storage and/or the addressbook subscription functions, since addressbook\n"
+"implement local storage and/or the addressbook subscription functions, "
+"since addressbook\n"
"only knows about the hosts.txt files and format."
msgstr ""
@@ -5083,40 +5599,50 @@ msgstr ""
#: i2p2www/pages/site/docs/discussions/naming.html:265
msgid ""
-"I2P destinations contain a certificate, however at the moment that certificate\n"
+"I2P destinations contain a certificate, however at the moment that "
+"certificate\n"
"is always null.\n"
-"With a null certificate, base64 destinations are always 516 bytes ending in \"AAAA\",\n"
-"and this is checked in the addressbook merge mechanism, and possibly other places.\n"
-"Also, there is no method available to generate a certificate or add it to a\n"
+"With a null certificate, base64 destinations are always 516 bytes ending "
+"in \"AAAA\",\n"
+"and this is checked in the addressbook merge mechanism, and possibly "
+"other places.\n"
+"Also, there is no method available to generate a certificate or add it to"
+" a\n"
"destination. So these will have to be updated to implement certificates."
msgstr ""
#: i2p2www/pages/site/docs/discussions/naming.html:273
#, python-format
msgid ""
-"One possible use of certificates is for proof "
-"of work."
+"One possible use of certificates is for proof of work."
msgstr ""
#: i2p2www/pages/site/docs/discussions/naming.html:276
msgid ""
-"Another is for \"subdomains\" (in quotes because there is really no such thing,\n"
-"i2p uses a flat naming system) to be signed by the 2nd level domain's keys."
+"Another is for \"subdomains\" (in quotes because there is really no such "
+"thing,\n"
+"i2p uses a flat naming system) to be signed by the 2nd level domain's "
+"keys."
msgstr ""
#: i2p2www/pages/site/docs/discussions/naming.html:280
msgid ""
-"With any certificate implementation must come the method for verifying the\n"
+"With any certificate implementation must come the method for verifying "
+"the\n"
"certificates.\n"
"Presumably this would happen in the addressbook merge code.\n"
-"Is there a method for multiple types of certificates, or multiple certificates?"
+"Is there a method for multiple types of certificates, or multiple "
+"certificates?"
msgstr ""
#: i2p2www/pages/site/docs/discussions/naming.html:286
msgid ""
"Adding on a certificate authenticating the\n"
-"responses as signed by some centralized certificate authority would address many of\n"
-"the hostile nameserver issues but would leave open replay attacks as well as \n"
+"responses as signed by some centralized certificate authority would "
+"address many of\n"
+"the hostile nameserver issues but would leave open replay attacks as well"
+" as \n"
"hostile certificate authority attacks."
msgstr ""
@@ -5131,13 +5657,20 @@ msgstr ""
#: i2p2www/pages/site/docs/how/cryptography.html:10
#, python-format
msgid ""
-"There are a handful of cryptographic algorithms in use within I2P, but we have\n"
-"reduced them to a bare minimum to deal with our needs - one symmetric algorithm\n"
-"one asymmetric algorithm, one signing algorithm, and one hashing algorithm. However, \n"
-"we do combine them in some particular ways to provide message integrity (rather than\n"
-"relying on a MAC). In addition, as much as we hate doing anything new in regards to \n"
-"cryptography, we can't seem to find a reference discussing (or even naming) the \n"
-"technique used in ElGamal/AES+SessionTag (but we're sure others have done it)."
+"There are a handful of cryptographic algorithms in use within I2P, but we"
+" have\n"
+"reduced them to a bare minimum to deal with our needs - one symmetric "
+"algorithm\n"
+"one asymmetric algorithm, one signing algorithm, and one hashing "
+"algorithm. However, \n"
+"we do combine them in some particular ways to provide message integrity "
+"(rather than\n"
+"relying on a MAC). In addition, as much as we hate doing anything new in"
+" regards to \n"
+"cryptography, we can't seem to find a reference discussing (or even "
+"naming) the \n"
+"technique used in ElGamal/AES+SessionTag "
+"(but we're sure others have done it)."
msgstr ""
#: i2p2www/pages/site/docs/how/cryptography.html:20
@@ -5161,23 +5694,28 @@ msgstr ""
#: i2p2www/pages/site/docs/how/cryptography.html:30
#, python-format
msgid ""
-"For end-to-end (destination-to-destination) encryption as a part of ElGamal/AES+SessionTag\n"
-"using the encryption key in the LeaseSet"
+"For end-to-end (destination-to-destination) encryption as a part of ElGamal/AES+SessionTag\n"
+"using the encryption key in the LeaseSet"
msgstr ""
#: i2p2www/pages/site/docs/how/cryptography.html:34
#: i2p2www/pages/site/docs/how/cryptography.html:198
#, python-format
msgid ""
-"For encryption of some netDb stores and queries sent to floodfill routers\n"
+"For encryption of some netDb stores and "
+"queries sent to floodfill routers\n"
"as a part of ElGamal/AES+SessionTag\n"
"(destination-to-router or router-to-router)."
msgstr ""
#: i2p2www/pages/site/docs/how/cryptography.html:41
msgid ""
-"We use common primes for 2048 ElGamal encryption and decryption, as given by IETF RFC-3526.\n"
-"We currently only use ElGamal to encrypt the IV and session key in a single block, followed by the \n"
+"We use common primes for 2048 ElGamal encryption and decryption, as given"
+" by IETF RFC-3526.\n"
+"We currently only use ElGamal to encrypt the IV and session key in a "
+"single block, followed by the \n"
"AES encrypted payload using that key and IV."
msgstr ""
@@ -5187,13 +5725,15 @@ msgstr ""
#: i2p2www/pages/site/docs/how/cryptography.html:64
msgid ""
-"The H(data) is the SHA256 of the data that is encrypted in the ElGamal block,\n"
+"The H(data) is the SHA256 of the data that is encrypted in the ElGamal "
+"block,\n"
"and is preceded by a nonzero byte. \n"
"This byte could be random, but as implemented it is always 0xFF.\n"
"It could possibly be used for flags in the future.\n"
"The data encrypted in the block may be up to 222 bytes long.\n"
"As the encrypted data may contain a substantial number of zeros if the\n"
-"cleartext is smaller than 222 bytes, it is recommended that higher layers pad\n"
+"cleartext is smaller than 222 bytes, it is recommended that higher layers"
+" pad\n"
"the cleartext to 222 bytes with random data.\n"
"Total length: typically 255 bytes."
msgstr ""
@@ -5204,7 +5744,8 @@ msgstr ""
#: i2p2www/pages/site/docs/how/cryptography.html:102
msgid ""
-"Each encrypted part is prepended with zeros to a size of exactly 257 bytes.\n"
+"Each encrypted part is prepended with zeros to a size of exactly 257 "
+"bytes.\n"
"Total length: 514 bytes.\n"
"In typical usage, higher layers pad the cleartext data to 222 bytes,\n"
"resulting in an unencrypted block of 255 bytes.\n"
@@ -5220,7 +5761,8 @@ msgstr ""
#: i2p2www/pages/site/docs/how/cryptography.html:115
msgid ""
"The shared prime is the \n"
-"[Oakley prime for 2048 bit keys]"
+"[Oakley prime "
+"for 2048 bit keys]"
msgstr ""
#: i2p2www/pages/site/docs/how/cryptography.html:122
@@ -5248,17 +5790,23 @@ msgstr ""
#, python-format
msgid ""
"This should be safe for use with the Oakley primes, per\n"
-"On Diffie-Hellman Key Agreement with Short Exponents - van Oorschot, Weiner\n"
-"at EuroCrypt 96, and crypto++'s benchmarks.\n"
-"Benchmarks originally at this link, now dead,\n"
-"rescued from the wayback machine, dated Apr 23, 2008."
+"On Diffie-Hellman Key Agreement with Short Exponents "
+"- van Oorschot, Weiner\n"
+"at EuroCrypt 96, and crypto++'s "
+"benchmarks.\n"
+"Benchmarks originally at this link, now dead,\n"
+"rescued from the wayback machine,"
+" dated Apr 23, 2008."
msgstr ""
#: i2p2www/pages/site/docs/how/cryptography.html:160
#, python-format
msgid ""
-"Also, Koshiba & Kurosawa: Short Exponent Diffie-Hellman Problems (PKC 2004, LNCS 2947, pp. 173-186)\n"
-"(full text on Google Books) apparently supports this, according to\n"
+"Also, Koshiba & Kurosawa: Short Exponent Diffie-"
+"Hellman Problems (PKC 2004, LNCS 2947, pp. 173-186)\n"
+"(full text on Google Books) apparently "
+"supports this, according to\n"
"this sci.crypt thread.\n"
"The remainder of the PrivateKey is padded with zeroes."
msgstr ""
@@ -5267,8 +5815,10 @@ msgstr ""
msgid ""
"Prior to release 0.9.8, all routers used the short exponent.\n"
"As of release 0.9.8, 64-bit x86 routers use a full 2048-bit exponent.\n"
-"Other routers continue to use the short exponent due to concerns about processor load.\n"
-"The transition to a longer exponent for these platforms is a topic for further study."
+"Other routers continue to use the short exponent due to concerns about "
+"processor load.\n"
+"The transition to a longer exponent for these platforms is a topic for "
+"further study."
msgstr ""
#: i2p2www/pages/site/docs/how/cryptography.html:176
@@ -5280,7 +5830,8 @@ msgstr "Obsolescenza "
#: i2p2www/pages/site/docs/how/cryptography.html:177
msgid ""
-"The vulnerability of the network to an ElGamal attack and the impact of transitioning to a longer bit length is to be studied.\n"
+"The vulnerability of the network to an ElGamal attack and the impact of "
+"transitioning to a longer bit length is to be studied.\n"
"It may be quite difficult to make any change backward-compatible."
msgstr ""
@@ -5302,24 +5853,30 @@ msgstr ""
#: i2p2www/pages/site/docs/how/cryptography.html:204
#, python-format
msgid ""
-"For encryption of periodic tunnel test"
-" messages sent from the router to itself, through its own tunnels."
+"For encryption of periodic tunnel "
+"test messages sent from the router to itself, through its own "
+"tunnels."
msgstr ""
#: i2p2www/pages/site/docs/how/cryptography.html:209
#, python-format
msgid ""
"We use AES with 256 bit keys and 128 bit blocks in CBC mode.\n"
-"The padding used is specified in IETF RFC-2313 (PKCS#5 1.5, section 8.1 (for block type 02)).\n"
-"In this case, padding exists of pseudorandomly generated octets to match 16 byte blocks.\n"
-"Specifically, see [the CBC code] and the Cryptix AES\n"
-"[implementation], as well as the padding, found in the\n"
+"The padding used is specified in IETF RFC-2313 "
+"(PKCS#5 1.5, section 8.1 (for block type 02)).\n"
+"In this case, padding exists of pseudorandomly generated octets to match "
+"16 byte blocks.\n"
+"Specifically, see [the CBC code] and the "
+"Cryptix AES\n"
+"[implementation], as well as the padding, found"
+" in the\n"
"ElGamalAESEngine.getPadding function."
msgstr ""
#: i2p2www/pages/site/docs/how/cryptography.html:274
msgid ""
-"The vulnerability of the network to an AES attack and the impact of transitioning to a longer bit length is to be studied.\n"
+"The vulnerability of the network to an AES attack and the impact of "
+"transitioning to a longer bit length is to be studied.\n"
"It may be quite difficult to make any change backward-compatible."
msgstr ""
@@ -5349,7 +5906,8 @@ msgstr ""
#: i2p2www/pages/site/docs/how/cryptography.html:295
#, python-format
msgid ""
-"Signatures are generated and verified with 1024 bit DSA (L=1024, N=160), as implemented in\n"
+"Signatures are generated and verified with 1024 bit DSA (L=1024, N=160), "
+"as implemented in\n"
"[DSAEngine].\n"
"DSA was chosen because it is much faster for signatures than ElGamal."
msgstr ""
@@ -5357,8 +5915,10 @@ msgstr ""
#: i2p2www/pages/site/docs/how/cryptography.html:350
#, python-format
msgid ""
-"The Signing Public Key is 1024 bits.\n"
-"The Signing Private Key is 160 bits."
+"The Signing Public"
+" Key is 1024 bits.\n"
+"The Signing "
+"Private Key is 160 bits."
msgstr ""
#: i2p2www/pages/site/docs/how/cryptography.html:357
@@ -5366,15 +5926,18 @@ msgstr ""
msgid ""
"NIST 800-57\n"
"recommends a minimum of (L=2048, N=224) for usage beyond 2010.\n"
-"This may be mitigated somewhat by the \"cryptoperiod\", or lifespan of a given key."
+"This may be mitigated somewhat by the \"cryptoperiod\", or lifespan of a "
+"given key."
msgstr ""
#: i2p2www/pages/site/docs/how/cryptography.html:363
msgid ""
"The prime number was chosen in 2003,\n"
-"and the person that chose the number (TheCrypto) is currently no longer an I2P developer.\n"
+"and the person that chose the number (TheCrypto) is currently no longer "
+"an I2P developer.\n"
"As such, we do not know if the prime chosen is a 'strong prime'.\n"
-"If a larger prime is chosen for future purposes, this should be a strong prime, and we will document the construction process."
+"If a larger prime is chosen for future purposes, this should be a strong "
+"prime, and we will document the construction process."
msgstr ""
#: i2p2www/pages/site/docs/how/cryptography.html:374
@@ -5393,10 +5956,14 @@ msgstr ""
#: i2p2www/pages/site/docs/how/cryptography.html:386
msgid ""
-"As of release 0.9.12, the router supports additional signature algorithms that are more secure than 1024-bit DSA.\n"
-"The first usage is for Destinations; support for Router Identities was added in release 0.9.16.\n"
-"Support for migrating existing Destinations from old to new signatures will be added in a future release.\n"
-"Signature type is encoded in the Destination and Router Identity, so that new signature algorithms\n"
+"As of release 0.9.12, the router supports additional signature algorithms"
+" that are more secure than 1024-bit DSA.\n"
+"The first usage is for Destinations; support for Router Identities was "
+"added in release 0.9.16.\n"
+"Support for migrating existing Destinations from old to new signatures "
+"will be added in a future release.\n"
+"Signature type is encoded in the Destination and Router Identity, so that"
+" new signature algorithms\n"
"or curves may be added at any time.\n"
"The current supported signature types are as follows:"
msgstr ""
@@ -5404,24 +5971,30 @@ msgstr ""
#: i2p2www/pages/site/docs/how/cryptography.html:407
msgid ""
"ECDSA uses the standard NIST curves and standard SHA-2 hashes.\n"
-"We will migrate new destinations to ECDSA-SHA256-P256 in the 0.9.16 - 0.9.19 release time frame.\n"
-"Usage for Router Identities is supported as of release 0.9.16 and migration may occur in early 2015."
+"We will migrate new destinations to ECDSA-SHA256-P256 in the 0.9.16 - "
+"0.9.19 release time frame.\n"
+"Usage for Router Identities is supported as of release 0.9.16 and "
+"migration may occur in early 2015."
msgstr ""
#: i2p2www/pages/site/docs/how/cryptography.html:416
msgid ""
"Standard RSA with the public exponent F4 = 65537.\n"
-"RSA is now used for signing all out-of-band trusted content, including router updates, reseeding, plugins, and news.\n"
-"The signatures are embedded in the \"su3\" format documented on the router updates page.\n"
+"RSA is now used for signing all out-of-band trusted content, including "
+"router updates, reseeding, plugins, and news.\n"
+"The signatures are embedded in the \"su3\" format documented on the "
+"router updates page.\n"
"4096-bit keys are recommended and used by all known signers.\n"
-"RSA is not used, or planned for use, in any in-network Destinations or Router Identities."
+"RSA is not used, or planned for use, in any in-network Destinations or "
+"Router Identities."
msgstr ""
#: i2p2www/pages/site/docs/how/cryptography.html:427
msgid ""
"Standard EdDSA using curve 25519 and standard 512-bit SHA-2 hashes.\n"
"Supported as of release 0.9.15.\n"
-"Migration for Destinations and Router Identities is scheduled for mid-2015."
+"Migration for Destinations and Router Identities is scheduled for "
+"mid-2015."
msgstr ""
#: i2p2www/pages/site/docs/how/cryptography.html:437
@@ -5433,7 +6006,8 @@ msgstr ""
#: i2p2www/pages/site/docs/how/cryptography.html:443
msgid ""
-"The vulnerability of the network to a SHA-256 attack and the impact of transitioning to a longer hash is to be studied.\n"
+"The vulnerability of the network to a SHA-256 attack and the impact of "
+"transitioning to a longer hash is to be studied.\n"
"It may be quite difficult to make any change backward-compatible."
msgstr ""
@@ -5444,13 +6018,16 @@ msgstr "Trasporti"
#: i2p2www/pages/site/docs/how/cryptography.html:455
msgid ""
"At the lowest protocol layer,\n"
-"point-to-point inter-router communication is protected by the transport layer security.\n"
+"point-to-point inter-router communication is protected by the transport "
+"layer security.\n"
"Both transports use 256 byte (2048 bit) Diffie-Hellman key exchange\n"
"using\n"
-"the same shared prime and generator as specified above for ElGamal,\n"
+"the same shared prime and generator as specified "
+"above for ElGamal,\n"
"followed by symmetric AES encryption as described above.\n"
"This provides\n"
-"perfect forward secrecy\n"
+"perfect "
+"forward secrecy\n"
"on the transport links."
msgstr ""
@@ -5461,17 +6038,24 @@ msgstr "Connessioni NTCP"
#: i2p2www/pages/site/docs/how/cryptography.html:469
#, python-format
msgid ""
-"NTCP connections are negotiated with a 2048 Diffie-Hellman implementation,\n"
-"using the router's identity to proceed with a station to station agreement, followed by\n"
-"some encrypted protocol specific fields, with all subsequent data encrypted with AES\n"
+"NTCP connections are negotiated with a 2048 Diffie-Hellman "
+"implementation,\n"
+"using the router's identity to proceed with a station to station "
+"agreement, followed by\n"
+"some encrypted protocol specific fields, with all subsequent data "
+"encrypted with AES\n"
"(as above).\n"
-"The primary reason to do the DH negotiation instead of using ElGamalAES+SessionTag is that it provides '(perfect) forward secrecy', while ElGamalAES+SessionTag does not."
+"The primary reason to do the DH negotiation instead of using ElGamalAES+SessionTag is that it provides '(perfect) "
+"forward secrecy', while ElGamalAES+SessionTag does not."
msgstr ""
#: i2p2www/pages/site/docs/how/cryptography.html:477
msgid ""
-"In order to migrate to a more standardized implementation (TLS/SSL or even "
-"SSH), the following issues must be addressed:"
+"In order to migrate to a more standardized implementation (TLS/SSL or "
+"even SSH), the following issues must be addressed:"
msgstr ""
#: i2p2www/pages/site/docs/how/cryptography.html:481
@@ -5482,7 +6066,8 @@ msgstr ""
#: i2p2www/pages/site/docs/how/cryptography.html:484
msgid ""
-"Can we simplify/avoid the x509 or other certificate formats and use our own RouterInfo structure (which \n"
+"Can we simplify/avoid the x509 or other certificate formats and use our "
+"own RouterInfo structure (which \n"
"contains the ElGamal and DSA keys)?"
msgstr ""
@@ -5497,10 +6082,14 @@ msgstr "Connessioni UDP"
#: i2p2www/pages/site/docs/how/cryptography.html:494
msgid ""
-"SSU (the UDP transport) encrypts each packet with AES256/CBC with both an explicit IV and MAC \n"
-"(HMAC-MD5-128) after agreeing upon an ephemeral session key through a 2048 bit \n"
-"Diffie-Hellman exchange, station-to-station authentication with the other \n"
-"router's DSA key, plus each network message has their own hash for local integrity \n"
+"SSU (the UDP transport) encrypts each packet with AES256/CBC with both an"
+" explicit IV and MAC \n"
+"(HMAC-MD5-128) after agreeing upon an ephemeral session key through a "
+"2048 bit \n"
+"Diffie-Hellman exchange, station-to-station authentication with the other"
+" \n"
+"router's DSA key, plus each network message has their own hash for local "
+"integrity \n"
"checking."
msgstr ""
@@ -5513,8 +6102,10 @@ msgstr ""
#, python-format
msgid ""
"WARNING - I2P's HMAC-MD5-128 used in SSU is apparently non-standard.\n"
-"Apparently, an early version of SSU used HMAC-SHA256, and then it was switched\n"
-"to MD5-128 for performance reasons, but left the 32-byte buffer size intact.\n"
+"Apparently, an early version of SSU used HMAC-SHA256, and then it was "
+"switched\n"
+"to MD5-128 for performance reasons, but left the 32-byte buffer size "
+"intact.\n"
"See HMACGenerator.java and\n"
"the 2005-07-05 status notes\n"
"for details."
@@ -5535,58 +6126,91 @@ msgstr ""
#: i2p2www/pages/site/docs/how/elgamal-aes.html:11
msgid ""
-"As an unreliable, unordered, message based system, I2P uses a simple combination \n"
-"of asymmetric and symmetric encryption algorithms to provide data confidentiality \n"
-"and integrity to garlic messages. As a whole, the combination is referred \n"
-"to as ElGamal/AES+SessionTags, but that is an excessively verbose way to describe \n"
+"As an unreliable, unordered, message based system, I2P uses a simple "
+"combination \n"
+"of asymmetric and symmetric encryption algorithms to provide data "
+"confidentiality \n"
+"and integrity to garlic messages. As a whole, the combination is referred"
+" \n"
+"to as ElGamal/AES+SessionTags, but that is an excessively verbose way to "
+"describe \n"
"the use of 2048bit ElGamal, AES256, SHA256, and 32 byte nonces."
msgstr ""
#: i2p2www/pages/site/docs/how/elgamal-aes.html:19
#: i2p2www/pages/site/docs/how/tech-intro.html:512
msgid ""
-"The first time a router wants to encrypt a garlic message to another router, \n"
-"they encrypt the keying material for an AES256 session key with ElGamal and \n"
-"append the AES256/CBC encrypted payload after that encrypted ElGamal block. \n"
-"In addition to the encrypted payload, the AES encrypted section contains the \n"
-"payload length, the SHA256 hash of the unencrypted payload, as well as a number \n"
-"of \"session tags\" - random 32 byte nonces. The next time the sender wants \n"
-"to encrypt a garlic message to another router, rather than ElGamal encrypt \n"
-"a new session key they simply pick one of the previously delivered session \n"
-"tags and AES encrypt the payload like before, using the session key used with \n"
-"that session tag, prepended with the session tag itself. When a router receives \n"
-"a garlic encrypted message, they check the first 32 bytes to see if it matches \n"
-"an available session tag - if it does, they simply AES decrypt the message, \n"
+"The first time a router wants to encrypt a garlic message to another "
+"router, \n"
+"they encrypt the keying material for an AES256 session key with ElGamal "
+"and \n"
+"append the AES256/CBC encrypted payload after that encrypted ElGamal "
+"block. \n"
+"In addition to the encrypted payload, the AES encrypted section contains "
+"the \n"
+"payload length, the SHA256 hash of the unencrypted payload, as well as a "
+"number \n"
+"of \"session tags\" - random 32 byte nonces. The next time the sender "
+"wants \n"
+"to encrypt a garlic message to another router, rather than ElGamal "
+"encrypt \n"
+"a new session key they simply pick one of the previously delivered "
+"session \n"
+"tags and AES encrypt the payload like before, using the session key used "
+"with \n"
+"that session tag, prepended with the session tag itself. When a router "
+"receives \n"
+"a garlic encrypted message, they check the first 32 bytes to see if it "
+"matches \n"
+"an available session tag - if it does, they simply AES decrypt the "
+"message, \n"
"but if it does not, they ElGamal decrypt the first block."
msgstr ""
#: i2p2www/pages/site/docs/how/elgamal-aes.html:35
#: i2p2www/pages/site/docs/how/tech-intro.html:528
msgid ""
-"Each session tag can be used only once so as to prevent internal adversaries \n"
-"from unnecessarily correlating different messages as being between the same \n"
-"routers. The sender of an ElGamal/AES+SessionTag encrypted message chooses \n"
-"when and how many tags to deliver, prestocking the recipient with enough tags \n"
-"to cover a volley of messages. Garlic messages may detect the successful tag \n"
-"delivery by bundling a small additional message as a clove (a \"delivery status \n"
-"message\") - when the garlic message arrives at the intended recipient and \n"
-"is decrypted successfully, this small delivery status message is one of the \n"
-"cloves exposed and has instructions for the recipient to send the clove back \n"
-"to the original sender (through an inbound tunnel, of course). When the original \n"
-"sender receives this delivery status message, they know that the session tags \n"
+"Each session tag can be used only once so as to prevent internal "
+"adversaries \n"
+"from unnecessarily correlating different messages as being between the "
+"same \n"
+"routers. The sender of an ElGamal/AES+SessionTag encrypted message "
+"chooses \n"
+"when and how many tags to deliver, prestocking the recipient with enough "
+"tags \n"
+"to cover a volley of messages. Garlic messages may detect the successful "
+"tag \n"
+"delivery by bundling a small additional message as a clove (a \"delivery "
+"status \n"
+"message\") - when the garlic message arrives at the intended recipient "
+"and \n"
+"is decrypted successfully, this small delivery status message is one of "
+"the \n"
+"cloves exposed and has instructions for the recipient to send the clove "
+"back \n"
+"to the original sender (through an inbound tunnel, of course). When the "
+"original \n"
+"sender receives this delivery status message, they know that the session "
+"tags \n"
"bundled in the garlic message were successfully delivered."
msgstr ""
#: i2p2www/pages/site/docs/how/elgamal-aes.html:50
msgid ""
"Session tags themselves have a short lifetime, after which they are \n"
-"discarded if not used. In addition, the quantity stored for each key is limited, \n"
-"as are the number of keys themselves - if too many arrive, either new or old \n"
-"messages may be dropped. The sender keeps track whether messages using session \n"
-"tags are getting through, and if there isn't sufficient communication it may \n"
-"drop the ones previously assumed to be properly delivered, reverting back \n"
+"discarded if not used. In addition, the quantity stored for each key is "
+"limited, \n"
+"as are the number of keys themselves - if too many arrive, either new or "
+"old \n"
+"messages may be dropped. The sender keeps track whether messages using "
+"session \n"
+"tags are getting through, and if there isn't sufficient communication it "
+"may \n"
+"drop the ones previously assumed to be properly delivered, reverting back"
+" \n"
"to the full expensive ElGamal encryption.\n"
-"A session will continue to exist until all its tags are exhausted or expire."
+"A session will continue to exist until all its tags are exhausted or "
+"expire."
msgstr ""
#: i2p2www/pages/site/docs/how/elgamal-aes.html:61
@@ -5601,7 +6225,8 @@ msgid ""
"between a Router and a Destination.\n"
"Each Router and Destination maintains its own Session Key Manager to\n"
"keep track of Session Keys and Session Tags.\n"
-"Separate Session Key Managers prevents correlation of multiple Destinations\n"
+"Separate Session Key Managers prevents correlation of multiple "
+"Destinations\n"
"to each other or a Router by adversaries."
msgstr ""
@@ -5622,14 +6247,14 @@ msgid ""
msgstr ""
#: i2p2www/pages/site/docs/how/elgamal-aes.html:85
-msgid ""
-"It is for a new session and contains both ElGamal and AES encrypted blocks"
+msgid "It is for a new session and contains both ElGamal and AES encrypted blocks"
msgstr ""
#: i2p2www/pages/site/docs/how/elgamal-aes.html:88
msgid ""
"When a router receives a message, it will first assume it is from\n"
-"an existing session and attempt to look up the Session Tag and decrypt the following data using AES.\n"
+"an existing session and attempt to look up the Session Tag and decrypt "
+"the following data using AES.\n"
"If that fails, it will assume it is for a new session and attempt to\n"
"decrypt it using ElGamal."
msgstr ""
@@ -5640,7 +6265,8 @@ msgstr ""
#: i2p2www/pages/site/docs/how/elgamal-aes.html:98
msgid ""
-"A New Session ElGamal Message contains two parts, an encrypted ElGamal block\n"
+"A New Session ElGamal Message contains two parts, an encrypted ElGamal "
+"block\n"
"and an encrypted AES block."
msgstr ""
@@ -5666,7 +6292,8 @@ msgid ""
"The 32-byte\n"
"Session Key\n"
"is the identifier for the session.\n"
-"The 32-byte Pre-IV will be used to generate the IV for the AES block that follows;\n"
+"The 32-byte Pre-IV will be used to generate the IV for the AES block that"
+" follows;\n"
"the IV is the first 16 bytes of the SHA-256 Hash of the Pre-IV."
msgstr ""
@@ -5695,8 +6322,8 @@ msgstr ""
#: i2p2www/pages/site/docs/how/elgamal-aes.html:228
#, python-format
msgid ""
-"That many 32-byte Session "
-"Tags"
+"That many 32-byte Session Tags"
msgstr ""
#: i2p2www/pages/site/docs/how/elgamal-aes.html:232
@@ -5707,8 +6334,8 @@ msgstr ""
#: i2p2www/pages/site/docs/how/elgamal-aes.html:236
#, python-format
msgid ""
-"The 32-byte SHA256 Hash of "
-"the payload"
+"The 32-byte SHA256 Hash of"
+" the payload"
msgstr ""
#: i2p2www/pages/site/docs/how/elgamal-aes.html:240
@@ -5718,8 +6345,10 @@ msgstr ""
#: i2p2www/pages/site/docs/how/elgamal-aes.html:244
#, python-format
msgid ""
-"A 32-byte Session Key,\n"
-" to replace the old key, and is only present if preceding flag is 0x01"
+"A 32-byte Session "
+"Key,\n"
+" to replace the old key, and is only present if preceding"
+" flag is 0x01"
msgstr ""
#: i2p2www/pages/site/docs/how/elgamal-aes.html:249
@@ -5740,16 +6369,18 @@ msgstr ""
#, python-format
msgid ""
"The data is then AES Encrypted,\n"
-"using the session key and IV (calculated from the pre-IV) from the ElGamal section.\n"
-"The encrypted AES Block length is variable but is always a multiple of 16 bytes.\n"
+"using the session key and IV (calculated from the pre-IV) from the "
+"ElGamal section.\n"
+"The encrypted AES Block length is variable but is always a multiple of 16"
+" bytes.\n"
""
msgstr ""
#: i2p2www/pages/site/docs/how/elgamal-aes.html:269
#, python-format
msgid ""
-"Actual max payload length, and max block length, is less than 64 KB; see the"
-" I2NP Overview."
+"Actual max payload length, and max block length, is less than 64 KB; see "
+"the I2NP Overview."
msgstr ""
#: i2p2www/pages/site/docs/how/elgamal-aes.html:272
@@ -5778,7 +6409,8 @@ msgstr ""
#: i2p2www/pages/site/docs/how/elgamal-aes.html:309
#, python-format
msgid ""
-"A 32-byte Session Tag\n"
+"A 32-byte Session "
+"Tag\n"
" previously delivered in an AES block"
msgstr ""
@@ -5789,14 +6421,18 @@ msgstr ""
#: i2p2www/pages/site/docs/how/elgamal-aes.html:318
msgid ""
"The session tag also serves as\n"
-"the pre-IV. The IV is the first 16 bytes of the SHA-256 Hash of the sessionTag."
+"the pre-IV. The IV is the first 16 bytes of the SHA-256 Hash of the "
+"sessionTag."
msgstr ""
#: i2p2www/pages/site/docs/how/elgamal-aes.html:323
msgid ""
-"To decode a message from an existing session, a router looks up the Session Tag to find an\n"
-"associated Session Key. If the Session Tag is found, the AES block is decrypted using the associated Session Key.\n"
-"If the tag is not found, the message is assumed to be a New Session Message."
+"To decode a message from an existing session, a router looks up the "
+"Session Tag to find an\n"
+"associated Session Key. If the Session Tag is found, the AES block is "
+"decrypted using the associated Session Key.\n"
+"If the tag is not found, the message is assumed to be a New Session Message."
msgstr ""
#: i2p2www/pages/site/docs/how/elgamal-aes.html:331
@@ -5806,30 +6442,38 @@ msgstr ""
#: i2p2www/pages/site/docs/how/elgamal-aes.html:332
#, python-format
msgid ""
-"As of release 0.9.2, the client may configure the default number of Session Tags to send\n"
+"As of release 0.9.2, the client may configure the default number of "
+"Session Tags to send\n"
"and the low tag threshold for the current session.\n"
-"For brief streaming connections or datagrams, these options may be used to significantly reduce bandwidth.\n"
-"See the I2CP options specification for details.\n"
+"For brief streaming connections or datagrams, these options may be used "
+"to significantly reduce bandwidth.\n"
+"See the I2CP options specification for "
+"details.\n"
"The session settings may also be overridden on a per-message basis.\n"
-"See the I2CP Send Message Expires specification for details."
+"See the I2CP Send Message"
+" Expires specification for details."
msgstr ""
#: i2p2www/pages/site/docs/how/elgamal-aes.html:345
msgid ""
-"There are many possible areas to tune the Session Key Manager's algorithms;\n"
-"some may interact with the streaming library behavior, or have significant\n"
+"There are many possible areas to tune the Session Key Manager's "
+"algorithms;\n"
+"some may interact with the streaming library behavior, or have "
+"significant\n"
"impact on overall performance."
msgstr ""
#: i2p2www/pages/site/docs/how/elgamal-aes.html:352
msgid ""
-"The number of tags delivered could depend on message size, keeping in mind\n"
+"The number of tags delivered could depend on message size, keeping in "
+"mind\n"
"the eventual padding to 1KB at the tunnel message layer."
msgstr ""
#: i2p2www/pages/site/docs/how/elgamal-aes.html:357
msgid ""
-"Clients could send an estimate of session lifetime to the router, as an advisory\n"
+"Clients could send an estimate of session lifetime to the router, as an "
+"advisory\n"
"on the number of tags required."
msgstr ""
@@ -5841,13 +6485,15 @@ msgstr ""
#: i2p2www/pages/site/docs/how/elgamal-aes.html:366
msgid ""
-"The router may assume delivery of Session Tags, or await acknowledgement before using them;\n"
+"The router may assume delivery of Session Tags, or await acknowledgement "
+"before using them;\n"
"there are tradeoffs for each strategy."
msgstr ""
#: i2p2www/pages/site/docs/how/elgamal-aes.html:371
msgid ""
-"For very brief messages, almost the full 222 bytes of the pre-IV and padding fields in the ElGamal block\n"
+"For very brief messages, almost the full 222 bytes of the pre-IV and "
+"padding fields in the ElGamal block\n"
"could be used for the entire message, instead of establishing a session."
msgstr ""
@@ -5859,8 +6505,10 @@ msgstr ""
#: i2p2www/pages/site/docs/how/elgamal-aes.html:381
msgid ""
-"Perhaps things could be more efficient if the Session Tag system was bidirectional,\n"
-"so tags delivered in the 'forward' path could be used in the 'reverse' path,\n"
+"Perhaps things could be more efficient if the Session Tag system was "
+"bidirectional,\n"
+"so tags delivered in the 'forward' path could be used in the 'reverse' "
+"path,\n"
"thus avoiding ElGamal in the initial response.\n"
"The router currently plays some tricks like this when sending\n"
"tunnel test messages to itself."
@@ -5880,7 +6528,8 @@ msgid ""
"set a flag in the\n"
"Delivery Instructions,\n"
"or set a magic number in the first few bytes of the Session Key field\n"
-"and accept a small risk of the random Session Key matching the magic number."
+"and accept a small risk of the random Session Key matching the magic "
+"number."
msgstr ""
#: i2p2www/pages/site/docs/how/garlic-routing.html:2
@@ -5893,7 +6542,8 @@ msgstr ""
#: i2p2www/pages/site/docs/how/garlic-routing.html:7
msgid ""
-"The terms \"garlic routing\" and \"garlic encryption\" are often used rather loosely when referring to I2P's technology.\n"
+"The terms \"garlic routing\" and \"garlic encryption\" are often used "
+"rather loosely when referring to I2P's technology.\n"
"Here, we explain the history of the terms, the various meanings, and\n"
"the usage of \"garlic\" methods in I2P."
msgstr ""
@@ -5903,16 +6553,20 @@ msgid ""
"\"Garlic routing\" was first coined by\n"
"Michael J. Freedman\n"
"in Roger Dingledine's Free Haven \n"
-"Master's thesis Section 8.1.1 (June 2000), as derived from \n"
+"Master's thesis "
+"Section 8.1.1 (June 2000), as derived from \n"
"Onion Routing."
msgstr ""
#: i2p2www/pages/site/docs/how/garlic-routing.html:21
msgid ""
-"\"Garlic\" may have been used originally by I2P developers because I2P implements a form of\n"
-"bundling as Freedman describes, or simply to emphasize general differences from Tor.\n"
+"\"Garlic\" may have been used originally by I2P developers because I2P "
+"implements a form of\n"
+"bundling as Freedman describes, or simply to emphasize general "
+"differences from Tor.\n"
"The specific reasoning may be lost to history.\n"
-"Generally, when referring to I2P, the term \"garlic\" may mean one of three things:"
+"Generally, when referring to I2P, the term \"garlic\" may mean one of "
+"three things:"
msgstr ""
#: i2p2www/pages/site/docs/how/garlic-routing.html:28
@@ -5931,39 +6585,54 @@ msgstr ""
#: i2p2www/pages/site/docs/how/garlic-routing.html:33
msgid ""
-"Unfortunately, I2P's usage of \"garlic\" terminology over the past seven years has not always been precise; therefore the reader is\n"
+"Unfortunately, I2P's usage of \"garlic\" terminology over the past seven "
+"years has not always been precise; therefore the reader is\n"
"cautioned when encountering the term.\n"
"Hopefully, the explanation below will make things clear."
msgstr ""
#: i2p2www/pages/site/docs/how/garlic-routing.html:40
msgid ""
-"Onion routing is a technique for building paths, or tunnels, through a series of peers,\n"
+"Onion routing is a technique for building paths, or tunnels, through a "
+"series of peers,\n"
"and then using that tunnel.\n"
-"Messages are repeatedly encrypted by the originator, and then decrypted by each hop.\n"
-"During the building phase, only the routing instructions for the next hop are exposed to each peer.\n"
-"During the operating phase, messages are passed through the tunnel, and the\n"
-"message and its routing instructions are only exposed to the endpoint of the tunnel."
+"Messages are repeatedly encrypted by the originator, and then decrypted "
+"by each hop.\n"
+"During the building phase, only the routing instructions for the next hop"
+" are exposed to each peer.\n"
+"During the operating phase, messages are passed through the tunnel, and "
+"the\n"
+"message and its routing instructions are only exposed to the endpoint of "
+"the tunnel."
msgstr ""
#: i2p2www/pages/site/docs/how/garlic-routing.html:49
#, python-format
msgid ""
"This is similar to the way Mixmaster\n"
-"(see network comparisons) sends messages - taking a message, encrypting it\n"
-"to the recipient's public key, taking that encrypted message and encrypting\n"
-"it (along with instructions specifying the next hop), and then taking that\n"
-"resulting encrypted message and so on, until it has one layer of encryption\n"
+"(see network comparisons) sends messages "
+"- taking a message, encrypting it\n"
+"to the recipient's public key, taking that encrypted message and "
+"encrypting\n"
+"it (along with instructions specifying the next hop), and then taking "
+"that\n"
+"resulting encrypted message and so on, until it has one layer of "
+"encryption\n"
"per hop along the path."
msgstr ""
#: i2p2www/pages/site/docs/how/garlic-routing.html:58
msgid ""
-"In this sense, \"garlic routing\" as a general concept is identical to \"onion routing\".\n"
-"As implemented in I2P, of course, there are several differences from the implementation in Tor; see below.\n"
-"Even so, there are substantial similarities such that I2P benefits from a\n"
-"large amount of academic research on onion routing,\n"
-"Tor, and similar mixnets."
+"In this sense, \"garlic routing\" as a general concept is identical to "
+"\"onion routing\".\n"
+"As implemented in I2P, of course, there are several differences from the "
+"implementation in Tor; see below.\n"
+"Even so, there are substantial similarities such that I2P benefits from a"
+"\n"
+"large amount of"
+" academic research on onion routing,\n"
+"Tor, and similar "
+"mixnets."
msgstr ""
#: i2p2www/pages/site/docs/how/garlic-routing.html:67
@@ -5972,12 +6641,15 @@ msgstr ""
#: i2p2www/pages/site/docs/how/garlic-routing.html:68
msgid ""
-"Michael Freedman defined \"garlic routing\" as an extension to onion routing,\n"
+"Michael Freedman defined \"garlic routing\" as an extension to onion "
+"routing,\n"
"in which multiple messages are bundled together.\n"
"He called each message a \"bulb\".\n"
-"All the messages, each with its own delivery instructions, are exposed at the\n"
+"All the messages, each with its own delivery instructions, are exposed at"
+" the\n"
"endpoint.\n"
-"This allows the efficient bundling of an onion routing \"reply block\" with the original message."
+"This allows the efficient bundling of an onion routing \"reply block\" "
+"with the original message."
msgstr ""
#: i2p2www/pages/site/docs/how/garlic-routing.html:77
@@ -5986,8 +6658,10 @@ msgid ""
"Our term for garlic \"bulbs\" is \"cloves\".\n"
"Any number of messages can be\n"
"contained, instead of just a single message.\n"
-"This is a significant distinction from the onion routing implemented in Tor.\n"
-"However, it is only one of many major architectural differences between I2P and Tor;\n"
+"This is a significant distinction from the onion routing implemented in "
+"Tor.\n"
+"However, it is only one of many major architectural differences between "
+"I2P and Tor;\n"
"perhaps it is not, by itself, enough to justify a change in terminology."
msgstr ""
@@ -5995,8 +6669,10 @@ msgstr ""
msgid ""
"Another difference\n"
"from the method described by Freedman\n"
-"is that the path is unidirectional - there is no \"turning point\" as seen in onion routing\n"
-"or mixmaster reply blocks, which greatly simplifies the algorithm and allows for more flexible\n"
+"is that the path is unidirectional - there is no \"turning point\" as "
+"seen in onion routing\n"
+"or mixmaster reply blocks, which greatly simplifies the algorithm and "
+"allows for more flexible\n"
"and reliable delivery."
msgstr ""
@@ -6030,14 +6706,16 @@ msgstr ""
#: i2p2www/pages/site/docs/how/garlic-routing.html:113
msgid ""
-"For publishing some network database entries (dampening the probability of a"
-" successful traffic analysis attack) (ElGamal/AES)"
+"For publishing some network database entries (dampening the probability "
+"of a successful traffic analysis attack) (ElGamal/AES)"
msgstr ""
#: i2p2www/pages/site/docs/how/garlic-routing.html:116
msgid ""
-"There are also significant ways that this technique can be used to improve the performance of the network, \n"
-"exploiting transport latency/throughput tradeoffs, and branching data through redundant paths to increase reliability."
+"There are also significant ways that this technique can be used to "
+"improve the performance of the network, \n"
+"exploiting transport latency/throughput tradeoffs, and branching data "
+"through redundant paths to increase reliability."
msgstr ""
#: i2p2www/pages/site/docs/how/garlic-routing.html:122
@@ -6048,7 +6726,8 @@ msgstr ""
msgid ""
"In I2P, tunnels are unidirectional. Each party builds two tunnels,\n"
"one for outbound and one for inbound traffic.\n"
-"Therefore, four tunnels are required for a single round-trip message and reply."
+"Therefore, four tunnels are required for a single round-trip message and "
+"reply."
msgstr ""
#: i2p2www/pages/site/docs/how/garlic-routing.html:129
@@ -6068,10 +6747,12 @@ msgstr ""
msgid ""
"Tunnels are a general-purpose mechanism to transport all\n"
"I2NP messages, and\n"
-"Garlic Messages are not used to build tunnels.\n"
+"Garlic Messages are not used to "
+"build tunnels.\n"
"We do not bundle multiple\n"
"I2NP messages into a single\n"
-"Garlic Message for unwrapping at the outbound tunnel endpoint;\n"
+"Garlic Message for unwrapping at "
+"the outbound tunnel endpoint;\n"
"the tunnel encryption is sufficient."
msgstr ""
@@ -6085,7 +6766,8 @@ msgid ""
"At the layer above tunnels, I2P delivers end-to-end messages between\n"
"Destinations.\n"
"Just as within a single tunnel, we use\n"
-"ElGamal/AES+SessionTag for the encryption.\n"
+"ElGamal/AES+SessionTag for the encryption."
+"\n"
"Each client message as delivered to the router through the\n"
"I2CP interface becomes a single\n"
"Garlic Clove\n"
@@ -6114,12 +6796,16 @@ msgid ""
"Delivery Status Message,\n"
"with\n"
"Delivery Instructions\n"
-"specifying that it be sent back to the originating router as an acknowledgment.\n"
+"specifying that it be sent back to the originating router as an "
+"acknowledgment.\n"
"This is similar to the \"reply block\" or \"reply onion\"\n"
"described in the references.\n"
-"It is used for determining the success or failure of end to end message delivery.\n"
-"The originating router may, upon failure to receive the Delivery Status Message\n"
-"within the expected time period, modify the routing to the far-end Destination,\n"
+"It is used for determining the success or failure of end to end message "
+"delivery.\n"
+"The originating router may, upon failure to receive the Delivery Status "
+"Message\n"
+"within the expected time period, modify the routing to the far-end "
+"Destination,\n"
"or take other actions."
msgstr ""
@@ -6133,10 +6819,13 @@ msgid ""
"for the originating Destination, with\n"
"Delivery Instructions\n"
"specifying the far-end destination's router.\n"
-"By periodically bundling a LeaseSet, the router ensures that the far-end will be able\n"
+"By periodically bundling a LeaseSet, the router ensures that the far-end "
+"will be able\n"
"to maintain communications.\n"
-"Otherwise the far-end would have to query a floodfill router for the network database entry,\n"
-"and all LeaseSets would have to be published to the network database, as explained on the\n"
+"Otherwise the far-end would have to query a floodfill router for the "
+"network database entry,\n"
+"and all LeaseSets would have to be published to the network database, as "
+"explained on the\n"
"network database page."
msgstr ""
@@ -6146,24 +6835,31 @@ msgid ""
"By default, the Delivery Status and Database Store Messages\n"
"are bundled when the local LeaseSet changes, when additional\n"
"Session Tags\n"
-"are delivered, or if the messages have not been bundled in the previous minute.\n"
-"As of release 0.9.2, the client may configure the default number of Session Tags to send\n"
+"are delivered, or if the messages have not been bundled in the previous "
+"minute.\n"
+"As of release 0.9.2, the client may configure the default number of "
+"Session Tags to send\n"
"and the low tag threshold for the current session.\n"
-"See the I2CP options specification for details.\n"
+"See the I2CP options specification for "
+"details.\n"
"The session settings may also be overridden on a per-message basis.\n"
-"See the I2CP Send Message Expires specification for details."
+"See the I2CP Send Message"
+" Expires specification for details."
msgstr ""
#: i2p2www/pages/site/docs/how/garlic-routing.html:227
msgid ""
-"Obviously, the additional messages are currently bundled for specific purposes,\n"
+"Obviously, the additional messages are currently bundled for specific "
+"purposes,\n"
"and not part of a general-purpose routing scheme."
msgstr ""
#: i2p2www/pages/site/docs/how/garlic-routing.html:232
msgid ""
-"As of release 0.9.12, the Delivery Status Message is wrapped in another Garlic Message\n"
-"by the originator so that the contents are encrypted and not visible to routers on the return path."
+"As of release 0.9.12, the Delivery Status Message is wrapped in another "
+"Garlic Message\n"
+"by the originator so that the contents are encrypted and not visible to "
+"routers on the return path."
msgstr ""
#: i2p2www/pages/site/docs/how/garlic-routing.html:238
@@ -6187,26 +6883,34 @@ msgstr ""
#: i2p2www/pages/site/docs/how/garlic-routing.html:255
#, python-format
msgid ""
-"The Garlic Message mechanism is very flexible and provides a structure for\n"
+"The Garlic Message mechanism is very flexible and provides a structure "
+"for\n"
"implementing many types of mixnet delivery methods.\n"
"Together with the unused delay option in the\n"
-"tunnel message Delivery Instructions,\n"
-"a wide spectrum of batching, delay, mixing, and routing strategies are possible."
+"tunnel message Delivery "
+"Instructions,\n"
+"a wide spectrum of batching, delay, mixing, and routing strategies are "
+"possible."
msgstr ""
#: i2p2www/pages/site/docs/how/garlic-routing.html:263
msgid ""
-"In particular, there is potential for much more flexibility at the outbound tunnel endpoint.\n"
+"In particular, there is potential for much more flexibility at the "
+"outbound tunnel endpoint.\n"
"Messages could possibly be routed from there to one of several tunnels\n"
-"(thus minimizing point-to-point connections), or multicast to several tunnels\n"
+"(thus minimizing point-to-point connections), or multicast to several "
+"tunnels\n"
"for redundancy, or streaming audio and video."
msgstr ""
#: i2p2www/pages/site/docs/how/garlic-routing.html:270
msgid ""
-"Such experiments may conflict with the need to ensure security and anonymity, such\n"
-"as limiting certain routing paths, restricting the types of I2NP messages that may\n"
-"be forwarded along various paths, and enforcing certain message expiration times."
+"Such experiments may conflict with the need to ensure security and "
+"anonymity, such\n"
+"as limiting certain routing paths, restricting the types of I2NP messages"
+" that may\n"
+"be forwarded along various paths, and enforcing certain message "
+"expiration times."
msgstr ""
#: i2p2www/pages/site/docs/how/garlic-routing.html:276
@@ -6215,9 +6919,11 @@ msgid ""
"As a part of\n"
"ElGamal/AES encryption,\n"
"a garlic message contains a sender\n"
-"specified amount of padding data, allowing the sender to take active countermeasures \n"
+"specified amount of padding data, allowing the sender to take active "
+"countermeasures \n"
"against traffic analysis.\n"
-"This is not currently used, beyond the requirement to pad to a multiple of 16 bytes."
+"This is not currently used, beyond the requirement to pad to a multiple "
+"of 16 bytes."
msgstr ""
#: i2p2www/pages/site/docs/how/garlic-routing.html:285
@@ -6229,8 +6935,10 @@ msgstr ""
#: i2p2www/pages/site/docs/how/garlic-routing.html:295
msgid ""
-"The term garlic routing was first coined in Roger Dingledine's Free Haven \n"
-"Master's thesis (June 2000),\n"
+"The term garlic routing was first coined in Roger Dingledine's Free Haven"
+" \n"
+"Master's thesis "
+"(June 2000),\n"
"see Section 8.1.1 authored by\n"
"Michael J. Freedman."
msgstr ""
@@ -6260,7 +6968,8 @@ msgstr ""
#: i2p2www/pages/site/docs/how/garlic-routing.html:316
msgid ""
-"Onion routing was first described in Hiding Routing Information\n"
+"Onion routing was first described in Hiding Routing Information\n"
"by David M. Goldschlag, Michael G. Reed, and Paul F. Syverson in 1996."
msgstr ""
@@ -6270,51 +6979,79 @@ msgstr ""
#: i2p2www/pages/site/docs/how/intro.html:4
msgid ""
-"I2P is a project to build, deploy, and maintain a network supporting secure and anonymous\n"
-"communication. People using I2P are in control of the tradeoffs between anonymity, reliability,\n"
-"bandwidth usage, and latency. There is no central point in the network on which pressure can be\n"
-"exerted to compromise the integrity, security, or anonymity of the system. The network supports\n"
-"dynamic reconfiguration in response to various attacks, and has been designed to make use of\n"
-"additional resources as they become available. Of course, all aspects of the network are open and\n"
+"I2P is a project to build, deploy, and maintain a network supporting "
+"secure and anonymous\n"
+"communication. People using I2P are in control of the tradeoffs between "
+"anonymity, reliability,\n"
+"bandwidth usage, and latency. There is no central point in the network on"
+" which pressure can be\n"
+"exerted to compromise the integrity, security, or anonymity of the "
+"system. The network supports\n"
+"dynamic reconfiguration in response to various attacks, and has been "
+"designed to make use of\n"
+"additional resources as they become available. Of course, all aspects of "
+"the network are open and\n"
"freely available."
msgstr ""
#: i2p2www/pages/site/docs/how/intro.html:14
msgid ""
-"Unlike many other anonymizing networks, I2P doesn't try to provide anonymity by hiding the\n"
-"originator of some communication and not the recipient, or the other way around. I2P is designed to\n"
-"allow peers using I2P to communicate with each other anonymously — both sender and recipient\n"
-"are unidentifiable to each other as well as to third parties. For example, today there are both\n"
-"in-I2P web sites (allowing anonymous publishing / hosting) as well as HTTP proxies to the normal web\n"
-"(allowing anonymous web browsing). Having the ability to run servers within I2P is essential, as it\n"
-"is quite likely that any outbound proxies to the normal Internet will be monitored, disabled, or\n"
+"Unlike many other anonymizing networks, I2P doesn't try to provide "
+"anonymity by hiding the\n"
+"originator of some communication and not the recipient, or the other way "
+"around. I2P is designed to\n"
+"allow peers using I2P to communicate with each other anonymously — "
+"both sender and recipient\n"
+"are unidentifiable to each other as well as to third parties. For "
+"example, today there are both\n"
+"in-I2P web sites (allowing anonymous publishing / hosting) as well as "
+"HTTP proxies to the normal web\n"
+"(allowing anonymous web browsing). Having the ability to run servers "
+"within I2P is essential, as it\n"
+"is quite likely that any outbound proxies to the normal Internet will be "
+"monitored, disabled, or\n"
"even taken over to attempt more malicious attacks."
msgstr ""
#: i2p2www/pages/site/docs/how/intro.html:25
#, python-format
msgid ""
-"The network itself is message oriented - it is essentially a secure and anonymous IP layer, where\n"
-"messages are addressed to cryptographic keys (Destinations) and can be significantly larger than IP\n"
-"packets. Some example uses of the network include \"eepsites\" (webservers hosting normal web\n"
-"applications within I2P), a BitTorrent client (\"I2PSnark\"), or a distributed data store. With the\n"
-"help of the I2PTunnel application, we are able to stream traditional\n"
-"TCP/IP applications over I2P, such as SSH, IRC, a squid proxy, and even streaming audio. Most people\n"
-"will not use I2P directly, or even need to know they're using it. Instead their view will be of one\n"
-"of the I2P enabled applications, or perhaps as a little controller app to turn on and off various\n"
+"The network itself is message oriented - it is essentially a secure and "
+"anonymous IP layer, where\n"
+"messages are addressed to cryptographic keys (Destinations) and can be "
+"significantly larger than IP\n"
+"packets. Some example uses of the network include \"eepsites\" "
+"(webservers hosting normal web\n"
+"applications within I2P), a BitTorrent client (\"I2PSnark\"), or a "
+"distributed data store. With the\n"
+"help of the I2PTunnel application, we are "
+"able to stream traditional\n"
+"TCP/IP applications over I2P, such as SSH, IRC, a squid proxy, and even "
+"streaming audio. Most people\n"
+"will not use I2P directly, or even need to know they're using it. Instead"
+" their view will be of one\n"
+"of the I2P enabled applications, or perhaps as a little controller app to"
+" turn on and off various\n"
"proxies to enable the anonymizing functionality."
msgstr ""
#: i2p2www/pages/site/docs/how/intro.html:37
#, python-format
msgid ""
-"An essential part of designing, developing, and testing an anonymizing network is to define the threat model, since there is no such thing as \"true\" anonymity, just\n"
-"increasingly expensive costs to identify someone. Briefly, I2P's intent is to allow people to\n"
-"communicate in arbitrarily hostile environments by providing good anonymity, mixed in with\n"
-"sufficient cover traffic provided by the activity of people who require less anonymity. This way,\n"
-"some users can avoid detection by a very powerful adversary, while others will try to evade a weaker\n"
-"entity, all on the same network, where each one's messages are essentially indistinguishable\n"
+"An essential part of designing, developing, and testing an anonymizing "
+"network is to define the threat model, since there is no such thing "
+"as \"true\" anonymity, just\n"
+"increasingly expensive costs to identify someone. Briefly, I2P's intent "
+"is to allow people to\n"
+"communicate in arbitrarily hostile environments by providing good "
+"anonymity, mixed in with\n"
+"sufficient cover traffic provided by the activity of people who require "
+"less anonymity. This way,\n"
+"some users can avoid detection by a very powerful adversary, while others"
+" will try to evade a weaker\n"
+"entity, all on the same network, where each one's messages are "
+"essentially indistinguishable\n"
"from the others."
msgstr ""
@@ -6325,9 +7062,12 @@ msgstr "Perché?"
#: i2p2www/pages/site/docs/how/intro.html:49
#, python-format
msgid ""
-"There are a multitude of reasons why we need a system to support anonymous communication, and\n"
-"everyone has their own personal rationale. There are many other\n"
-"efforts working on finding ways to provide varying degrees of anonymity to people through the\n"
+"There are a multitude of reasons why we need a system to support "
+"anonymous communication, and\n"
+"everyone has their own personal rationale. There are many other\n"
+"efforts working on finding ways to provide varying degrees of "
+"anonymity to people through the\n"
"Internet, but we could not find any that met our needs or threat model."
msgstr ""
@@ -6338,14 +7078,23 @@ msgstr "Come?"
#: i2p2www/pages/site/docs/how/intro.html:58
#, python-format
msgid ""
-"The network at a glance is made up of a set of nodes (\"routers\") with a number of unidirectional\n"
-"inbound and outbound virtual paths (\"tunnels\", as outlined on the tunnel routing page). Each router is identified by a cryptographic RouterIdentity which is\n"
-"typically long lived. These routers communicate with each other through existing transport\n"
-"mechanisms (TCP, UDP, etc), passing various messages. Client applications have their own\n"
-"cryptographic identifier (\"Destination\") which enables it to send and receive messages. These\n"
-"clients can connect to any router and authorize the temporary allocation (\"lease\") of some tunnels\n"
-"that will be used for sending and receiving messages through the network. I2P has its own internal\n"
-"network database (using a modification of the Kademlia algorithm) for\n"
+"The network at a glance is made up of a set of nodes (\"routers\") with a"
+" number of unidirectional\n"
+"inbound and outbound virtual paths (\"tunnels\", as outlined on the tunnel routing page). Each router is "
+"identified by a cryptographic RouterIdentity which is\n"
+"typically long lived. These routers communicate with each other through "
+"existing transport\n"
+"mechanisms (TCP, UDP, etc), passing various messages. Client applications"
+" have their own\n"
+"cryptographic identifier (\"Destination\") which enables it to send and "
+"receive messages. These\n"
+"clients can connect to any router and authorize the temporary allocation "
+"(\"lease\") of some tunnels\n"
+"that will be used for sending and receiving messages through the network."
+" I2P has its own internal\n"
+"network database (using a modification of the "
+"Kademlia algorithm) for\n"
"distributing routing and contact information securely."
msgstr ""
@@ -6355,62 +7104,92 @@ msgstr ""
#: i2p2www/pages/site/docs/how/intro.html:73
msgid ""
-"In the above, Alice, Bob, Charlie, and Dave are all running routers with a single Destination on\n"
-"their local router. They each have a pair of 2-hop inbound tunnels per destination (labeled 1, 2, 3,\n"
-"4, 5 and 6), and a small subset of each of those router's outbound tunnel pool is shown with 2-hop\n"
-"outbound tunnels. For simplicity, Charlie's inbound tunnels and Dave's outbound tunnels are not\n"
-"shown, nor are the rest of each router's outbound tunnel pool (typically stocked with a few tunnels\n"
-"at a time). When Alice and Bob talk to each other, Alice sends a message out one of her (pink)\n"
-"outbound tunnels targeting one of Bob's (green) inbound tunnels (tunnel 3 or 4). She knows to send\n"
-"to those tunnels on the correct router by querying the network database, which is constantly updated\n"
+"In the above, Alice, Bob, Charlie, and Dave are all running routers with "
+"a single Destination on\n"
+"their local router. They each have a pair of 2-hop inbound tunnels per "
+"destination (labeled 1, 2, 3,\n"
+"4, 5 and 6), and a small subset of each of those router's outbound tunnel"
+" pool is shown with 2-hop\n"
+"outbound tunnels. For simplicity, Charlie's inbound tunnels and Dave's "
+"outbound tunnels are not\n"
+"shown, nor are the rest of each router's outbound tunnel pool (typically "
+"stocked with a few tunnels\n"
+"at a time). When Alice and Bob talk to each other, Alice sends a message "
+"out one of her (pink)\n"
+"outbound tunnels targeting one of Bob's (green) inbound tunnels (tunnel 3"
+" or 4). She knows to send\n"
+"to those tunnels on the correct router by querying the network database, "
+"which is constantly updated\n"
"as new leases are authorized and old ones expire."
msgstr ""
#: i2p2www/pages/site/docs/how/intro.html:85
#, python-format
msgid ""
-"If Bob wants to reply to Alice, he simply goes through the same process - send a message out one of\n"
-"his outbound tunnels targeting one of Alice's inbound tunnels (tunnel 1 or 2). To make things\n"
-"easier, most messages sent between Alice and Bob are garlic\n"
-"wrapped, bundling the sender's own current lease information so that the recipient can reply\n"
-"immediately without having to look in the network database for the current data."
+"If Bob wants to reply to Alice, he simply goes through the same process -"
+" send a message out one of\n"
+"his outbound tunnels targeting one of Alice's inbound tunnels (tunnel 1 "
+"or 2). To make things\n"
+"easier, most messages sent between Alice and Bob are garlic\n"
+"wrapped, bundling the sender's own current lease information so that the "
+"recipient can reply\n"
+"immediately without having to look in the network database for the "
+"current data."
msgstr ""
#: i2p2www/pages/site/docs/how/intro.html:93
#, python-format
msgid ""
-"To deal with a wide range of attacks, I2P is fully distributed with no centralized resources - and\n"
-"hence there are no directory servers keeping statistics regarding the performance and reliability of\n"
-"routers within the network. As such, each router must keep and maintain profiles of various routers\n"
-"and is responsible for selecting appropriate peers to meet the anonymity, performance, and\n"
-"reliability needs of the users, as described in the peer selection\n"
+"To deal with a wide range of attacks, I2P is fully distributed with no "
+"centralized resources - and\n"
+"hence there are no directory servers keeping statistics regarding the "
+"performance and reliability of\n"
+"routers within the network. As such, each router must keep and maintain "
+"profiles of various routers\n"
+"and is responsible for selecting appropriate peers to meet the anonymity,"
+" performance, and\n"
+"reliability needs of the users, as described in the peer selection\n"
"page."
msgstr ""
#: i2p2www/pages/site/docs/how/intro.html:102
#, python-format
msgid ""
-"The network itself makes use of a significant number of cryptographic\n"
-"techniques and algorithms - a full laundry list includes 2048bit ElGamal encryption, 256bit AES\n"
-"in CBC mode with PKCS#5 padding, 1024bit DSA signatures, SHA256 hashes, 2048bit Diffie-Hellman\n"
-"negotiated connections with station to station authentication, and ElGamal / AES+SessionTag."
+"The network itself makes use of a significant number of cryptographic\n"
+"techniques and algorithms - a full laundry list includes 2048bit "
+"ElGamal encryption, 256bit AES\n"
+"in CBC mode with PKCS#5 padding, 1024bit DSA signatures, SHA256 hashes, "
+"2048bit Diffie-Hellman\n"
+"negotiated connections with station to station authentication, and ElGamal / AES+SessionTag."
msgstr ""
#: i2p2www/pages/site/docs/how/intro.html:110
msgid ""
-"Content sent over I2P is encrypted through three layers garlic encryption (used to verify the\n"
-"delivery of the message to the recipient), tunnel encryption (all messages passing through a tunnel\n"
-"is encrypted by the tunnel gateway to the tunnel endpoint), and inter router transport layer\n"
+"Content sent over I2P is encrypted through three layers garlic encryption"
+" (used to verify the\n"
+"delivery of the message to the recipient), tunnel encryption (all "
+"messages passing through a tunnel\n"
+"is encrypted by the tunnel gateway to the tunnel endpoint), and inter "
+"router transport layer\n"
"encryption (e.g. the TCP transport uses AES256 with ephemeral keys)."
msgstr ""
#: i2p2www/pages/site/docs/how/intro.html:117
msgid ""
-"End-to-end (I2CP) encryption (client application to server application) was disabled in I2P release\n"
-"0.6; end-to-end (garlic) encryption (I2P client router to I2P server router) from Alice's router \"a\"\n"
-"to Bob's router \"h\" remains. Notice the different use of terms! All data from a to h is end-to-end\n"
-"encrypted, but the I2CP connection between the I2P router and the applications is not end-to-end\n"
-"encrypted! A and h are the routers of Alice and Bob, while Alice and Bob in following chart are the\n"
+"End-to-end (I2CP) encryption (client application to server application) "
+"was disabled in I2P release\n"
+"0.6; end-to-end (garlic) encryption (I2P client router to I2P server "
+"router) from Alice's router \"a\"\n"
+"to Bob's router \"h\" remains. Notice the different use of terms! All "
+"data from a to h is end-to-end\n"
+"encrypted, but the I2CP connection between the I2P router and the "
+"applications is not end-to-end\n"
+"encrypted! A and h are the routers of Alice and Bob, while Alice and Bob "
+"in following chart are the\n"
"applications running atop of I2P."
msgstr ""
@@ -6427,22 +7206,32 @@ msgstr ""
#: i2p2www/pages/site/docs/how/intro.html:132
msgid ""
-"The two main mechanisms for allowing people who need strong anonymity to use the network are\n"
-"explicitly delayed garlic routed messages and more comprehensive tunnels to include support for\n"
-"pooling and mixing messages. These are currently planned for release 3.0, but garlic routed messages\n"
-"with no delays and FIFO tunnels are currently in place. Additionally, the 2.0 release will allow\n"
-"people to set up and operate behind restricted routes (perhaps with trusted peers), as well as the\n"
+"The two main mechanisms for allowing people who need strong anonymity to "
+"use the network are\n"
+"explicitly delayed garlic routed messages and more comprehensive tunnels "
+"to include support for\n"
+"pooling and mixing messages. These are currently planned for release 3.0,"
+" but garlic routed messages\n"
+"with no delays and FIFO tunnels are currently in place. Additionally, the"
+" 2.0 release will allow\n"
+"people to set up and operate behind restricted routes (perhaps with "
+"trusted peers), as well as the\n"
"deployment of more flexible and anonymous transports."
msgstr ""
#: i2p2www/pages/site/docs/how/intro.html:141
#, python-format
msgid ""
-"Some questions have been raised with regards to the scalability of I2P, and reasonably so. There\n"
-"will certainly be more analysis over time, but peer lookup and integration should be bounded by\n"
-"O(log(N))
due to the network database's algorithm, while end\n"
-"to end messages should be O(1)
(scale free), since messages go out K hops through the\n"
-"outbound tunnel and another K hops through the inbound tunnel, with K no longer than 3. The size of\n"
+"Some questions have been raised with regards to the scalability of I2P, "
+"and reasonably so. There\n"
+"will certainly be more analysis over time, but peer lookup and "
+"integration should be bounded by\n"
+"O(log(N))
due to the network "
+"database's algorithm, while end\n"
+"to end messages should be O(1)
(scale free), since messages "
+"go out K hops through the\n"
+"outbound tunnel and another K hops through the inbound tunnel, with K no "
+"longer than 3. The size of\n"
"the network (N) bears no impact."
msgstr ""
@@ -6454,10 +7243,13 @@ msgstr "Quando?"
#, python-format
msgid ""
"I2P initially began in Feb 2003 as a proposed modification to Freenet to allow it to use alternate transports, such as Freenet to allow it to use "
+"alternate transports, such as JMS, then grew into its own as an\n"
-"'anonCommFramework' in April 2003, turning into I2P in July, with code being written in earnest\n"
-"starting in August '03. I2P is currently under development, following the roadmap."
+"'anonCommFramework' in April 2003, turning into I2P in July, with code "
+"being written in earnest\n"
+"starting in August '03. I2P is currently under development, following the"
+" roadmap."
msgstr ""
#: i2p2www/pages/site/docs/how/intro.html:161
@@ -6467,14 +7259,22 @@ msgstr "Chi?"
#: i2p2www/pages/site/docs/how/intro.html:162
#, python-format
msgid ""
-"We have a small team spread around several continents, working to advance\n"
-"different aspects of the project. We are very open to other developers who want to get involved and\n"
-"anyone else who would like to contribute in other ways, such as critiques, peer review, testing,\n"
-"writing I2P enabled applications, or documentation. The entire system is open source - the router\n"
-"and most of the SDK are outright public domain with some BSD and Cryptix licensed code, while some\n"
-"applications like I2PTunnel and I2PSnark are GPL. Almost everything is written in Java (1.5+),\n"
-"though some third party applications are being written in Python and other languages. The code works\n"
-"on Sun Java SE and other Java Virtual Machines."
+"We have a small team spread around several "
+"continents, working to advance\n"
+"different aspects of the project. We are very open to other developers "
+"who want to get involved and\n"
+"anyone else who would like to contribute in other ways, such as "
+"critiques, peer review, testing,\n"
+"writing I2P enabled applications, or documentation. The entire system is "
+"open source - the router\n"
+"and most of the SDK are outright public domain with some BSD and Cryptix "
+"licensed code, while some\n"
+"applications like I2PTunnel and I2PSnark are GPL. Almost everything is "
+"written in Java (1.5+),\n"
+"though some third party applications are being written in Python and "
+"other languages. The code works\n"
+"on Sun Java SE and other Java Virtual"
+" Machines."
msgstr ""
#: i2p2www/pages/site/docs/how/intro.html:173
@@ -6484,9 +7284,12 @@ msgstr "Dove?"
#: i2p2www/pages/site/docs/how/intro.html:174
#, python-format
msgid ""
-"Anyone interested should join us on the IRC channel #i2p-dev (hosted concurrently on irc.freenode.net,\n"
-"irc.postman.i2p, irc.echelon.i2p, irc.dg.i2p and irc.oftc.net). There are currently no\n"
-"scheduled development meetings, however archives are available."
+"Anyone interested should join us on the IRC channel #i2p-dev (hosted "
+"concurrently on irc.freenode.net,\n"
+"irc.postman.i2p, irc.echelon.i2p, irc.dg.i2p and irc.oftc.net). There are"
+" currently no\n"
+"scheduled development meetings, however archives"
+" are available."
msgstr ""
#: i2p2www/pages/site/docs/how/intro.html:180
@@ -6510,24 +7313,32 @@ msgstr ""
#: i2p2www/pages/site/docs/how/network-database.html:8
msgid ""
"I2P's netDb is a specialized distributed database, containing \n"
-"just two types of data - router contact information (RouterInfos) and destination contact\n"
-"information (LeaseSets). Each piece of data is signed by the appropriate party and verified\n"
-"by anyone who uses or stores it. In addition, the data has liveliness information\n"
-"within it, allowing irrelevant entries to be dropped, newer entries to replace\n"
+"just two types of data - router contact information (RouterInfos) "
+"and destination contact\n"
+"information (LeaseSets). Each piece of data is signed by the "
+"appropriate party and verified\n"
+"by anyone who uses or stores it. In addition, the data has liveliness "
+"information\n"
+"within it, allowing irrelevant entries to be dropped, newer entries to "
+"replace\n"
"older ones, and protection against certain classes of attack."
msgstr ""
#: i2p2www/pages/site/docs/how/network-database.html:17
msgid ""
"The netDb is distributed with a simple technique called \"floodfill\",\n"
-"where a subset of all routers, called \"floodfill routers\", maintains the distributed database."
+"where a subset of all routers, called \"floodfill routers\", maintains "
+"the distributed database."
msgstr ""
#: i2p2www/pages/site/docs/how/network-database.html:25
msgid ""
-"When an I2P router wants to contact another router, they need to know some \n"
-"key pieces of data - all of which are bundled up and signed by the router into\n"
-"a structure called the \"RouterInfo\", which is distributed with the SHA256 of the router's identity\n"
+"When an I2P router wants to contact another router, they need to know "
+"some \n"
+"key pieces of data - all of which are bundled up and signed by the router"
+" into\n"
+"a structure called the \"RouterInfo\", which is distributed with the "
+"SHA256 of the router's identity\n"
"as the key. The structure itself contains:"
msgstr ""
@@ -6539,8 +7350,8 @@ msgstr ""
#: i2p2www/pages/site/docs/how/network-database.html:33
msgid ""
-"The contact addresses at which it can be reached (e.g. TCP: example.org port"
-" 4108)"
+"The contact addresses at which it can be reached (e.g. TCP: example.org "
+"port 4108)"
msgstr ""
#: i2p2www/pages/site/docs/how/network-database.html:34
@@ -6552,8 +7363,7 @@ msgid "A set of arbitrary text options"
msgstr ""
#: i2p2www/pages/site/docs/how/network-database.html:36
-msgid ""
-"The signature of the above, generated by the identity's DSA signing key"
+msgid "The signature of the above, generated by the identity's DSA signing key"
msgstr ""
#: i2p2www/pages/site/docs/how/network-database.html:39
@@ -6564,8 +7374,8 @@ msgstr ""
#: i2p2www/pages/site/docs/how/network-database.html:45
msgid ""
-"Capabilities flags - used to indicate floodfill participation, approximate "
-"bandwidth, and perceived reachability"
+"Capabilities flags - used to indicate floodfill participation, "
+"approximate bandwidth, and perceived reachability"
msgstr ""
#: i2p2www/pages/site/docs/how/network-database.html:47
@@ -6622,29 +7432,36 @@ msgstr ""
#: i2p2www/pages/site/docs/how/network-database.html:70
msgid ""
-"Always sent as 90m, for compatibility with an older scheme where routers published their actual uptime,\n"
+"Always sent as 90m, for compatibility with an older scheme where routers "
+"published their actual uptime,\n"
"and only sent tunnel requests to peers whose was more than 60m"
msgstr ""
#: i2p2www/pages/site/docs/how/network-database.html:76
msgid ""
"These values are used by other routers for basic decisions.\n"
-"Should we connect to this router? Should we attempt to route a tunnel through this router?\n"
-"The bandwidth capability flag, in particular, is used only to determine whether\n"
+"Should we connect to this router? Should we attempt to route a tunnel "
+"through this router?\n"
+"The bandwidth capability flag, in particular, is used only to determine "
+"whether\n"
"the router meets a minimum threshold for routing tunnels.\n"
-"Above the minimum threshold, the advertised bandwidth is not used or trusted anywhere\n"
-"in the router, except for display in the user interface and for debugging and network analysis."
+"Above the minimum threshold, the advertised bandwidth is not used or "
+"trusted anywhere\n"
+"in the router, except for display in the user interface and for debugging"
+" and network analysis."
msgstr ""
#: i2p2www/pages/site/docs/how/network-database.html:86
#, python-format
msgid ""
"Additional text options include\n"
-"a small number of statistics about the router's health, which are aggregated by\n"
+"a small number of statistics about the router's health, which are "
+"aggregated by\n"
"sites such as %(stats)s\n"
"for network performance analysis and debugging.\n"
"These statistics were chosen to provide data crucial to the developers,\n"
-"such as tunnel build success rates, while balancing the need for such data\n"
+"such as tunnel build success rates, while balancing the need for such "
+"data\n"
"with the side-effects that could result from revealing this data.\n"
"Current statistics are limited to:"
msgstr ""
@@ -6659,16 +7476,18 @@ msgstr ""
#: i2p2www/pages/site/docs/how/network-database.html:101
msgid ""
-"Floodfill routers publish additional data on the number of entries in their "
-"network database."
+"Floodfill routers publish additional data on the number of entries in "
+"their network database."
msgstr ""
#: i2p2www/pages/site/docs/how/network-database.html:105
msgid ""
"The data published can be seen in the router's user interface,\n"
"but is not used or trusted within the router.\n"
-"As the network has matured, we have gradually removed most of the published\n"
-"statistics to improve anonymity, and we plan to remove more in future releases."
+"As the network has matured, we have gradually removed most of the "
+"published\n"
+"statistics to improve anonymity, and we plan to remove more in future "
+"releases."
msgstr ""
#: i2p2www/pages/site/docs/how/network-database.html:113
@@ -6686,15 +7505,16 @@ msgstr ""
#: i2p2www/pages/site/docs/how/network-database.html:120
msgid ""
"RouterInfos have no set expiration time.\n"
-"Each router is free to maintain its own local policy to trade off the frequency of RouterInfo lookups\n"
+"Each router is free to maintain its own local policy to trade off the "
+"frequency of RouterInfo lookups\n"
"with memory or disk usage.\n"
"In the current implementation, there are the following general policies:"
msgstr ""
#: i2p2www/pages/site/docs/how/network-database.html:127
msgid ""
-"There is no expiration during the first hour of uptime, as the persistent "
-"stored data may be old."
+"There is no expiration during the first hour of uptime, as the persistent"
+" stored data may be old."
msgstr ""
#: i2p2www/pages/site/docs/how/network-database.html:130
@@ -6703,21 +7523,25 @@ msgstr ""
#: i2p2www/pages/site/docs/how/network-database.html:133
msgid ""
-"As the number of local RouterInfos grows, the expiration time shrinks, in an attempt to maintain\n"
-"a reasonable number RouterInfos. The expiration time with less than 120 routers is 72 hours,\n"
+"As the number of local RouterInfos grows, the expiration time shrinks, in"
+" an attempt to maintain\n"
+"a reasonable number RouterInfos. The expiration time with less than 120 "
+"routers is 72 hours,\n"
"while expiration time with 300 routers is around 30 hours."
msgstr ""
#: i2p2www/pages/site/docs/how/network-database.html:138
#, python-format
msgid ""
-"RouterInfos containing SSU introducers expire in about an hour, as\n"
+"RouterInfos containing SSU introducers expire in "
+"about an hour, as\n"
"the introducer list expires in about that time."
msgstr ""
#: i2p2www/pages/site/docs/how/network-database.html:142
msgid ""
-"Floodfills use a short expiration time (1 hour) for all local RouterInfos, as valid RouterInfos will\n"
+"Floodfills use a short expiration time (1 hour) for all local "
+"RouterInfos, as valid RouterInfos will\n"
"be frequently republished to them."
msgstr ""
@@ -6733,8 +7557,10 @@ msgstr ""
#: i2p2www/pages/site/docs/how/network-database.html:157
msgid ""
-"The second piece of data distributed in the netDb is a \"LeaseSet\" - documenting\n"
-"a group of tunnel entry points (leases) for a particular client destination.\n"
+"The second piece of data distributed in the netDb is a \"LeaseSet\" - "
+"documenting\n"
+"a group of tunnel entry points (leases) for a particular client "
+"destination.\n"
"Each of these leases specify the following information:"
msgstr ""
@@ -6768,8 +7594,8 @@ msgstr ""
#: i2p2www/pages/site/docs/how/network-database.html:177
msgid ""
-"Additional encryption public key: used for end-to-end encryption of garlic "
-"messages"
+"Additional encryption public key: used for end-to-end encryption of "
+"garlic messages"
msgstr ""
#: i2p2www/pages/site/docs/how/network-database.html:178
@@ -6780,8 +7606,8 @@ msgstr ""
#: i2p2www/pages/site/docs/how/network-database.html:179
msgid ""
-"Signature of all the LeaseSet data, to make sure the Destination published "
-"the LeaseSet."
+"Signature of all the LeaseSet data, to make sure the Destination "
+"published the LeaseSet."
msgstr ""
#: i2p2www/pages/site/docs/how/network-database.html:183
@@ -6806,10 +7632,13 @@ msgstr ""
#: i2p2www/pages/site/docs/how/network-database.html:195
msgid ""
-"A LeaseSet for a destination used only for outgoing connections is unpublished.\n"
+"A LeaseSet for a destination used only for outgoing connections is "
+"unpublished.\n"
"It is never sent for publication to a floodfill router.\n"
-"\"Client\" tunnels, such as those for web browsing and IRC clients, are unpublished.\n"
-"Servers will still be able to send messages back to those unpublished destinations,\n"
+"\"Client\" tunnels, such as those for web browsing and IRC clients, are "
+"unpublished.\n"
+"Servers will still be able to send messages back to those unpublished "
+"destinations,\n"
"because of I2NP storage messages."
msgstr ""
@@ -6819,10 +7648,14 @@ msgstr ""
#: i2p2www/pages/site/docs/how/network-database.html:206
msgid ""
-"A LeaseSet may be revoked by publishing a new LeaseSet with zero leases.\n"
-"Revocations must be signed by the additional signing key in the LeaseSet.\n"
-"Revocations are not fully implemented, and it is unclear if they have any practical use.\n"
-"This is the only planned use for that signing key, so it is currently unused."
+"A LeaseSet may be revoked by publishing a new LeaseSet with zero "
+"leases.\n"
+"Revocations must be signed by the additional signing key in the LeaseSet."
+"\n"
+"Revocations are not fully implemented, and it is unclear if they have any"
+" practical use.\n"
+"This is the only planned use for that signing key, so it is currently "
+"unused."
msgstr ""
#: i2p2www/pages/site/docs/how/network-database.html:213
@@ -6831,12 +7664,17 @@ msgstr ""
#: i2p2www/pages/site/docs/how/network-database.html:214
msgid ""
-"In an encrypted LeaseSet, all Leases are encrypted with a separate DSA key.\n"
-"The leases may only be decoded, and thus the destination may only be contacted,\n"
+"In an encrypted LeaseSet, all Leases are encrypted with a separate"
+" DSA key.\n"
+"The leases may only be decoded, and thus the destination may only be "
+"contacted,\n"
"by those with the key.\n"
-"There is no flag or other direct indication that the LeaseSet is encrypted.\n"
-"Encrypted LeaseSets are not widely used, and it is a topic for future work to\n"
-"research whether the user interface and implementation of encrypted LeaseSets could be improved."
+"There is no flag or other direct indication that the LeaseSet is "
+"encrypted.\n"
+"Encrypted LeaseSets are not widely used, and it is a topic for future "
+"work to\n"
+"research whether the user interface and implementation of encrypted "
+"LeaseSets could be improved."
msgstr ""
#: i2p2www/pages/site/docs/how/network-database.html:223
@@ -6845,7 +7683,8 @@ msgstr ""
#: i2p2www/pages/site/docs/how/network-database.html:224
msgid ""
-"All Leases (tunnels) are valid for 10 minutes; therefore, a LeaseSet expires\n"
+"All Leases (tunnels) are valid for 10 minutes; therefore, a LeaseSet "
+"expires\n"
"10 minutes after the earliest creation time of all its Leases."
msgstr ""
@@ -6867,32 +7706,46 @@ msgstr ""
msgid ""
"The netDb is decentralized, however you do need at\n"
"least one reference to a peer so that the integration process\n"
-"ties you in. This is accomplished by \"reseeding\" your router with the RouterInfo\n"
-"of an active peer - specifically, by retrieving their routerInfo-$hash.dat
\n"
-"file and storing it in your netDb/
directory. Anyone can provide\n"
-"you with those files - you can even provide them to others by exposing your own\n"
+"ties you in. This is accomplished by \"reseeding\" your router with the "
+"RouterInfo\n"
+"of an active peer - specifically, by retrieving their "
+"routerInfo-$hash.dat
\n"
+"file and storing it in your netDb/
directory. Anyone can "
+"provide\n"
+"you with those files - you can even provide them to others by exposing "
+"your own\n"
"netDb directory. To simplify the process,\n"
-"volunteers publish their netDb directories (or a subset) on the regular (non-i2p) network,\n"
+"volunteers publish their netDb directories (or a subset) on the regular "
+"(non-i2p) network,\n"
"and the URLs of these directories are hardcoded in I2P.\n"
-"When the router starts up for the first time, it automatically fetches from\n"
+"When the router starts up for the first time, it automatically fetches "
+"from\n"
"one of these URLs, selected at random."
msgstr ""
#: i2p2www/pages/site/docs/how/network-database.html:251
msgid ""
"The floodfill netDb is a simple distributed storage mechanism.\n"
-"The storage algorithm is simple: send the data to the closest peer that has advertised itself\n"
-"as a floodfill router. Then wait 10 seconds, pick another floodfill router and ask them \n"
-"for the entry to be sent, verifying its proper insertion / distribution. If the \n"
-"verification peer doesn't reply, or they don't have the entry, the sender \n"
-"repeats the process. When the peer in the floodfill netDb receives a netDb \n"
-"store from a peer not in the floodfill netDb, they send it to a subset of the floodfill netDb-peers.\n"
-"The peers selected are the ones closest (according to the XOR-metric) to a specific key."
+"The storage algorithm is simple: send the data to the closest peer that "
+"has advertised itself\n"
+"as a floodfill router. Then wait 10 seconds, pick another floodfill "
+"router and ask them \n"
+"for the entry to be sent, verifying its proper insertion / distribution. "
+"If the \n"
+"verification peer doesn't reply, or they don't have the entry, the sender"
+" \n"
+"repeats the process. When the peer in the floodfill netDb receives a "
+"netDb \n"
+"store from a peer not in the floodfill netDb, they send it to a subset of"
+" the floodfill netDb-peers.\n"
+"The peers selected are the ones closest (according to the XOR-metric) to a specific key."
msgstr ""
#: i2p2www/pages/site/docs/how/network-database.html:262
msgid ""
-"Determining who is part of the floodfill netDb is trivial - it is exposed in each \n"
+"Determining who is part of the floodfill netDb is trivial - it is exposed"
+" in each \n"
"router's published routerInfo as a capability."
msgstr ""
@@ -6922,13 +7775,15 @@ msgid ""
"Routers with high bandwidth limits (which must be manually configured,\n"
"as the default is much lower) are presumed to be on lower-latency\n"
"connections, and are more likely to be available 24/7.\n"
-"The current minimum share bandwidth for a floodfill router is 128 KBytes/sec."
+"The current minimum share bandwidth for a floodfill router is 128 "
+"KBytes/sec."
msgstr ""
#: i2p2www/pages/site/docs/how/network-database.html:293
msgid ""
"In addition, a router must pass several additional tests for health\n"
-"(outbound message queue time, job lag, etc.) before floodfill operation is\n"
+"(outbound message queue time, job lag, etc.) before floodfill operation "
+"is\n"
"automatically enabled."
msgstr ""
@@ -6955,10 +7810,13 @@ msgstr ""
#: i2p2www/pages/site/docs/how/network-database.html:315
msgid ""
-"A floodfill router's only services that are in addition to those of non-floodfill routers\n"
+"A floodfill router's only services that are in addition to those of non-"
+"floodfill routers\n"
"are in accepting netDb stores and responding to netDb queries.\n"
-"Since they are generally high-bandwidth, they are more likely to participate in a high number of tunnels\n"
-"(i.e. be a \"relay\" for others), but this is not directly related to their distributed database services."
+"Since they are generally high-bandwidth, they are more likely to "
+"participate in a high number of tunnels\n"
+"(i.e. be a \"relay\" for others), but this is not directly related to "
+"their distributed database services."
msgstr ""
#: i2p2www/pages/site/docs/how/network-database.html:323
@@ -6967,21 +7825,29 @@ msgstr ""
#: i2p2www/pages/site/docs/how/network-database.html:324
msgid ""
-"The netDb uses a simple Kademlia-style XOR metric to determine closeness.\n"
+"The netDb uses a simple Kademlia-style XOR metric to determine closeness."
+"\n"
"The SHA256 hash of the key being looked up or stored is XOR-ed with\n"
"the hash of the router in question to determine closeness.\n"
-"A modification to this algorithm is done to increase the costs of Sybil attacks.\n"
-"Instead of the SHA256 hash of the key being looked up of stored, the SHA256 hash is taken\n"
-"of the 32-byte binary search key appended with the UTC date represented as an 8-byte ASCII string yyyyMMdd, i.e. SHA256(key + yyyyMMdd).\n"
-"This is called the \"routing key\", and it changes every day at midnight UTC.\n"
-"Only the search key is modified in this way, not the floodfill router hashes.\n"
-"The daily transformation of the DHT is sometimes called \"keyspace rotation\",\n"
+"A modification to this algorithm is done to increase the costs of Sybil attacks.\n"
+"Instead of the SHA256 hash of the key being looked up of stored, the "
+"SHA256 hash is taken\n"
+"of the 32-byte binary search key appended with the UTC date represented "
+"as an 8-byte ASCII string yyyyMMdd, i.e. SHA256(key + yyyyMMdd).\n"
+"This is called the \"routing key\", and it changes every day at midnight "
+"UTC.\n"
+"Only the search key is modified in this way, not the floodfill router "
+"hashes.\n"
+"The daily transformation of the DHT is sometimes called \"keyspace "
+"rotation\",\n"
"although it isn't strictly a rotation."
msgstr ""
#: i2p2www/pages/site/docs/how/network-database.html:337
msgid ""
-"Routing keys are never sent on-the-wire in any I2NP message, they are only used locally for\n"
+"Routing keys are never sent on-the-wire in any I2NP message, they are "
+"only used locally for\n"
"determination of distance."
msgstr ""
@@ -6996,7 +7862,8 @@ msgstr ""
#: i2p2www/pages/site/docs/how/network-database.html:347
#, python-format
msgid ""
-"I2NP DatabaseStoreMessages containing the local RouterInfo are exchanged with peers\n"
+"I2NP DatabaseStoreMessages containing the local "
+"RouterInfo are exchanged with peers\n"
"as a part of the initialization of a NTCP\n"
"or SSU transport connection."
msgstr ""
@@ -7008,32 +7875,46 @@ msgstr ""
#: i2p2www/pages/site/docs/how/network-database.html:355
#, python-format
msgid ""
-"I2NP DatabaseStoreMessages containing the local LeaseSet are periodically exchanged with peers\n"
-"by bundling them in a garlic message along with normal traffic from the related Destination.\n"
-"This allows an initial response, and later responses, to be sent to an appropriate Lease,\n"
-"without requiring any LeaseSet lookups, or requiring the communicating Destinations to have published LeaseSets at all."
+"I2NP DatabaseStoreMessages containing the local "
+"LeaseSet are periodically exchanged with peers\n"
+"by bundling them in a garlic message along with normal traffic from the "
+"related Destination.\n"
+"This allows an initial response, and later responses, to be sent to an "
+"appropriate Lease,\n"
+"without requiring any LeaseSet lookups, or requiring the communicating "
+"Destinations to have published LeaseSets at all."
msgstr ""
#: i2p2www/pages/site/docs/how/network-database.html:363
msgid ""
"The DatabaseStoreMessage should be sent to the floodfill that is closest\n"
"to the current routing key for the RouterInfo or LeaseSet being stored.\n"
-"Currently, the closest floodfill is found by a search in the local database.\n"
-"Even if that floodfill is not actually closest, it will flood it \"closer\" by\n"
+"Currently, the closest floodfill is found by a search in the local "
+"database.\n"
+"Even if that floodfill is not actually closest, it will flood it "
+"\"closer\" by\n"
"sending it to multiple other floodfills.\n"
"This provides a high degree of fault-tolerance."
msgstr ""
#: i2p2www/pages/site/docs/how/network-database.html:372
msgid ""
-"In traditional Kademlia, a peer would do a \"find-closest\" search before inserting\n"
-"an item in the DHT to the closest target. As the verify operation will tend to\n"
-"discover closer floodfills if they are present, a router will quickly improve\n"
-"its knowledge of the DHT \"neighborhood\" for the RouterInfo and LeaseSets it regularly publishes.\n"
-"While I2NP does not define a \"find-closest\" message, if it becomes necessary,\n"
-"a router may simply do an iterative search for a key with the least significant bit flipped\n"
-"(i.e. key ^ 0x01) until no closer peers are received in the DatabaseSearchReplyMessages.\n"
-"This ensures that the true closest peer will be found even if a more-distant peer had\n"
+"In traditional Kademlia, a peer would do a \"find-closest\" search before"
+" inserting\n"
+"an item in the DHT to the closest target. As the verify operation will "
+"tend to\n"
+"discover closer floodfills if they are present, a router will quickly "
+"improve\n"
+"its knowledge of the DHT \"neighborhood\" for the RouterInfo and "
+"LeaseSets it regularly publishes.\n"
+"While I2NP does not define a \"find-closest\" message, if it becomes "
+"necessary,\n"
+"a router may simply do an iterative search for a key with the least "
+"significant bit flipped\n"
+"(i.e. key ^ 0x01) until no closer peers are received in the "
+"DatabaseSearchReplyMessages.\n"
+"This ensures that the true closest peer will be found even if a more-"
+"distant peer had\n"
"the netdb item."
msgstr ""
@@ -7044,9 +7925,11 @@ msgstr ""
#: i2p2www/pages/site/docs/how/network-database.html:386
#, python-format
msgid ""
-"A router publishes its own RouterInfo by directly connecting to a floodfill router\n"
+"A router publishes its own RouterInfo by directly connecting to a "
+"floodfill router\n"
"and sending it a I2NP DatabaseStoreMessage\n"
-"with a nonzero Reply Token. The message is not end-to-end garlic encrypted,\n"
+"with a nonzero Reply Token. The message is not end-to-end garlic "
+"encrypted,\n"
"as this is a direct connection, so there are no intervening routers\n"
"(and no need to hide this data anyway).\n"
"The floodfill router replies with a\n"
@@ -7060,7 +7943,8 @@ msgstr ""
#: i2p2www/pages/site/docs/how/network-database.html:401
msgid ""
-"Storage of LeaseSets is much more sensitive than for RouterInfos, as a router\n"
+"Storage of LeaseSets is much more sensitive than for RouterInfos, as a "
+"router\n"
"must take care that the LeaseSet cannot be associated with the router."
msgstr ""
@@ -7069,8 +7953,10 @@ msgstr ""
msgid ""
"A router publishes a local LeaseSet by\n"
"sending a I2NP DatabaseStoreMessage\n"
-"with a nonzero Reply Token over an outbound client tunnel for that Destination.\n"
-"The message is end-to-end garlic encrypted using the Destination's Session Key Manager,\n"
+"with a nonzero Reply Token over an outbound client tunnel for that "
+"Destination.\n"
+"The message is end-to-end garlic encrypted using the Destination's "
+"Session Key Manager,\n"
"to hide the message from the tunnel's outbound endpoint.\n"
"The floodfill router replies with a\n"
"I2NP DeliveryStatusMessage,\n"
@@ -7086,12 +7972,17 @@ msgstr ""
#, python-format
msgid ""
"After a floodfill router receives a DatabaseStoreMessage containing a\n"
-"valid RouterInfo or LeaseSet which is newer than that previously stored in its\n"
+"valid RouterInfo or LeaseSet which is newer than that previously stored "
+"in its\n"
"local NetDb, it \"floods\" it.\n"
-"To flood a NetDb entry, it looks up several (currently %(floodsize)s) floodfill routers closest to the routing key\n"
-"of the NetDb entry. (The routing key is the SHA256 Hash of the RouterIdentity or Destination with the date (yyyyMMdd) appended.)\n"
-"By flooding to those closest to the key, not closest to itself, the floodfill ensures that the storage\n"
-"gets to the right place, even if the storing router did not have good knowledge of the\n"
+"To flood a NetDb entry, it looks up several (currently %(floodsize)s) "
+"floodfill routers closest to the routing key\n"
+"of the NetDb entry. (The routing key is the SHA256 Hash of the "
+"RouterIdentity or Destination with the date (yyyyMMdd) appended.)\n"
+"By flooding to those closest to the key, not closest to itself, the "
+"floodfill ensures that the storage\n"
+"gets to the right place, even if the storing router did not have good "
+"knowledge of the\n"
"DHT \"neighborhood\" for the routing key."
msgstr ""
@@ -7113,15 +8004,17 @@ msgstr ""
#: i2p2www/pages/site/docs/how/network-database.html:442
#, python-format
msgid ""
-"The I2NP DatabaseLookupMessage is used to request a netdb entry from a floodfill router.\n"
+"The I2NP DatabaseLookupMessage is used to "
+"request a netdb entry from a floodfill router.\n"
"Lookups are sent out one of the router's outbound exploratory tunnels.\n"
-"The replies are specified to return via one of the router's inbound exploratory tunnels."
+"The replies are specified to return via one of the router's inbound "
+"exploratory tunnels."
msgstr ""
#: i2p2www/pages/site/docs/how/network-database.html:448
msgid ""
-"Lookups are generally sent to the two \"good\" (the connection doesn't fail)"
-" floodfill routers closest to the requested key, in parallel."
+"Lookups are generally sent to the two \"good\" (the connection doesn't "
+"fail) floodfill routers closest to the requested key, in parallel."
msgstr ""
#: i2p2www/pages/site/docs/how/network-database.html:452
@@ -7129,7 +8022,8 @@ msgstr ""
msgid ""
"If the key is found locally by the floodfill router, it responds with a\n"
"I2NP DatabaseStoreMessage.\n"
-"If the key is not found locally by the floodfill router, it responds with a\n"
+"If the key is not found locally by the floodfill router, it responds with"
+" a\n"
"I2NP DatabaseSearchReplyMessage\n"
"containing a list of other floodfill routers close to the key."
msgstr ""
@@ -7137,17 +8031,22 @@ msgstr ""
#: i2p2www/pages/site/docs/how/network-database.html:460
msgid ""
"LeaseSet lookups are garlic encrypted end-to-end as of release 0.9.5.\n"
-"RouterInfo lookups are not encrypted and thus are vulnerable to snooping by the outbound endpoint\n"
-"(OBEP) of the client tunnel. This is due to the expense of the ElGamal encryption.\n"
+"RouterInfo lookups are not encrypted and thus are vulnerable to snooping "
+"by the outbound endpoint\n"
+"(OBEP) of the client tunnel. This is due to the expense of the ElGamal "
+"encryption.\n"
"RouterInfo lookup encryption may be enabled in a future release."
msgstr ""
#: i2p2www/pages/site/docs/how/network-database.html:467
msgid ""
-"As of release 0.9.7, replies to a LeaseSet lookup (a DatabaseStoreMessage or a DatabaseSearchReplyMessage)\n"
+"As of release 0.9.7, replies to a LeaseSet lookup (a DatabaseStoreMessage"
+" or a DatabaseSearchReplyMessage)\n"
"will be encrypted by including the session key and tag in the lookup.\n"
-"This hides the reply from the inbound gateway (IBGW) of the reply tunnel.\n"
-"Responses to RouterInfo lookups will be encrypted if we enable the lookup encryption."
+"This hides the reply from the inbound gateway (IBGW) of the reply tunnel."
+"\n"
+"Responses to RouterInfo lookups will be encrypted if we enable the lookup"
+" encryption."
msgstr ""
#: i2p2www/pages/site/docs/how/network-database.html:474
@@ -7159,33 +8058,44 @@ msgstr ""
#: i2p2www/pages/site/docs/how/network-database.html:478
msgid ""
-"Due to the relatively small size of the network and the flooding redundancy of 8x,\n"
+"Due to the relatively small size of the network and the flooding "
+"redundancy of 8x,\n"
"lookups are usually O(1) rather than O(log n) --\n"
-"a router is highly likely to know a floodfill router close enough to the key to get the answer on the first try.\n"
+"a router is highly likely to know a floodfill router close enough to the "
+"key to get the answer on the first try.\n"
"In releases prior to 0.8.9, routers used a lookup redundancy of two\n"
-"(that is, two lookups were performed in parallel to different peers), and\n"
-"neither recursive nor iterative routing for lookups was implemented.\n"
+"(that is, two lookups were performed in parallel to different peers), and"
+"\n"
+"neither recursive nor iterative routing for lookups was "
+"implemented.\n"
"Queries were sent through multiple routes simultaneously\n"
"to reduce the chance of query failure."
msgstr ""
#: i2p2www/pages/site/docs/how/network-database.html:489
msgid ""
-"As of release 0.8.9, iterative lookups are implemented with no lookup redundancy.\n"
+"As of release 0.8.9, iterative lookups are implemented with no "
+"lookup redundancy.\n"
"This is a more efficient and reliable lookup that will work much better\n"
"when not all floodfill peers are known, and it removes a serious\n"
-"limitation to network growth. As the network grows and each router knows only a small\n"
+"limitation to network growth. As the network grows and each router knows "
+"only a small\n"
"subset of the floodfill peers, lookups will become O(log n).\n"
-"Even if the peer does not return references closer to the key, the lookup continues with\n"
-"the next-closest peer, for added robustness, and to prevent a malicious floodfill from\n"
-"black-holing a part of the key space. Lookups continue until a total lookup timeout is reached,\n"
+"Even if the peer does not return references closer to the key, the lookup"
+" continues with\n"
+"the next-closest peer, for added robustness, and to prevent a malicious "
+"floodfill from\n"
+"black-holing a part of the key space. Lookups continue until a total "
+"lookup timeout is reached,\n"
"or the maximum number of peers is queried."
msgstr ""
#: i2p2www/pages/site/docs/how/network-database.html:501
msgid ""
-"Node IDs are verifiable in that we use the router hash directly as both the node ID and the Kademlia key.\n"
-"Incorrect responses that are not closer to the search key are generally ignored.\n"
+"Node IDs are verifiable in that we use the router hash "
+"directly as both the node ID and the Kademlia key.\n"
+"Incorrect responses that are not closer to the search key are generally "
+"ignored.\n"
"Given the current size of the network, a router has\n"
"detailed knowledge of the neighborhood of the destination ID space."
msgstr ""
@@ -7197,7 +8107,8 @@ msgstr ""
#: i2p2www/pages/site/docs/how/network-database.html:511
#, python-format
msgid ""
-"Note: RouterInfo verification is disabled as of release 0.9.7.1 to prevent\n"
+"Note: RouterInfo verification is disabled as of release 0.9.7.1 to "
+"prevent\n"
"the attack described in the paper\n"
"Practical Attacks Against the I2P Network.\n"
"It is not clear if verification can be redesigned to be done safely."
@@ -7205,11 +8116,13 @@ msgstr ""
#: i2p2www/pages/site/docs/how/network-database.html:518
msgid ""
-"To verify a storage was successful, a router simply waits about 10 seconds,\n"
+"To verify a storage was successful, a router simply waits about 10 "
+"seconds,\n"
"then sends a lookup to another floodfill router close to the key\n"
"(but not the one the store was sent to).\n"
"Lookups sent out one of the router's outbound exploratory tunnels.\n"
-"Lookups are end-to-end garlic encrypted to prevent snooping by the outbound endpoint(OBEP)."
+"Lookups are end-to-end garlic encrypted to prevent snooping by the "
+"outbound endpoint(OBEP)."
msgstr ""
#: i2p2www/pages/site/docs/how/network-database.html:526
@@ -7218,18 +8131,22 @@ msgstr ""
#: i2p2www/pages/site/docs/how/network-database.html:527
msgid ""
-"To verify a storage was successful, a router simply waits about 10 seconds,\n"
+"To verify a storage was successful, a router simply waits about 10 "
+"seconds,\n"
"then sends a lookup to another floodfill router close to the key\n"
"(but not the one the store was sent to).\n"
-"Lookups sent out one of the outbound client tunnels for the destination of the LeaseSet being verified.\n"
+"Lookups sent out one of the outbound client tunnels for the destination "
+"of the LeaseSet being verified.\n"
"To prevent snooping by the OBEP of the outbound tunnel,\n"
"lookups are end-to-end garlic encrypted.\n"
-"The replies are specified to return via one of the client's inbound tunnels."
+"The replies are specified to return via one of the client's inbound "
+"tunnels."
msgstr ""
#: i2p2www/pages/site/docs/how/network-database.html:537
msgid ""
-"As of release 0.9.7, replies for both RouterInfo and LeaseSet lookups (a DatabaseStoreMessage or a DatabaseSearchReplyMessage)\n"
+"As of release 0.9.7, replies for both RouterInfo and LeaseSet lookups (a "
+"DatabaseStoreMessage or a DatabaseSearchReplyMessage)\n"
"will be encrypted,\n"
"to hide the reply from the inbound gateway (IBGW) of the reply tunnel."
msgstr ""
@@ -7241,16 +8158,24 @@ msgstr ""
#: i2p2www/pages/site/docs/how/network-database.html:546
#, python-format
msgid ""
-"Exploration is a special form of netdb lookup, where a router attempts to learn about\n"
+"Exploration is a special form of netdb lookup, where a router "
+"attempts to learn about\n"
"new routers.\n"
-"It does this by sending a floodfill router a I2NP DatabaseLookupMessage, looking for a random key.\n"
+"It does this by sending a floodfill router a I2NP DatabaseLookupMessage, looking for a random "
+"key.\n"
"As this lookup will fail, the floodfill would normally respond with a\n"
-"I2NP DatabaseSearchReplyMessage containing hashes of floodfill routers close to the key.\n"
-"This would not be helpful, as the requesting router probably already knows those floodfills,\n"
-"and it would be impractical to add ALL floodfill routers to the \"don't include\" field of the lookup.\n"
-"For an exploration query, the requesting router adds a router hash of all zeros to the\n"
+"I2NP DatabaseSearchReplyMessage containing "
+"hashes of floodfill routers close to the key.\n"
+"This would not be helpful, as the requesting router probably already "
+"knows those floodfills,\n"
+"and it would be impractical to add ALL floodfill routers to the \"don't "
+"include\" field of the lookup.\n"
+"For an exploration query, the requesting router adds a router hash of all"
+" zeros to the\n"
"\"don't include\" field of the DatabaseLookupMessage.\n"
-"The floodfill will then respond only with non-floodfill routers close to the requested key."
+"The floodfill will then respond only with non-floodfill routers close to "
+"the requested key."
msgstr ""
#: i2p2www/pages/site/docs/how/network-database.html:560
@@ -7259,11 +8184,14 @@ msgstr ""
#: i2p2www/pages/site/docs/how/network-database.html:561
msgid ""
-"The response to a lookup request is either a Database Store Message (on success) or a\n"
-"Database Search Reply Message (on failure). The DSRM contains a 'from' router hash field\n"
+"The response to a lookup request is either a Database Store Message (on "
+"success) or a\n"
+"Database Search Reply Message (on failure). The DSRM contains a 'from' "
+"router hash field\n"
"to indicate the source of the reply; the DSM does not.\n"
"The DSRM 'from' field is unauthenticated and may be spoofed or invalid.\n"
-"There are no other response tags. Therefore, when making multiple requests in parallel, it is\n"
+"There are no other response tags. Therefore, when making multiple "
+"requests in parallel, it is\n"
"difficult to monitor the performance of the various floodfill routers."
msgstr ""
@@ -7273,13 +8201,19 @@ msgstr ""
#: i2p2www/pages/site/docs/how/network-database.html:573
msgid ""
-"Destinations may be hosted on multiple routers simultaneously, by using the same\n"
+"Destinations may be hosted on multiple routers simultaneously, by using "
+"the same\n"
"private and public keys (traditionally stored in eepPriv.dat files).\n"
-"As both instances will periodically publish their signed LeaseSets to the floodfill peers,\n"
-"the most recently published LeaseSet will be returned to a peer requesting a database lookup.\n"
-"As LeaseSets have (at most) a 10 minute lifetime, should a particular instance go down,\n"
-"the outage will be 10 minutes at most, and generally much less than that.\n"
-"The multihoming function has been verified and is in use by several services on the network."
+"As both instances will periodically publish their signed LeaseSets to the"
+" floodfill peers,\n"
+"the most recently published LeaseSet will be returned to a peer "
+"requesting a database lookup.\n"
+"As LeaseSets have (at most) a 10 minute lifetime, should a particular "
+"instance go down,\n"
+"the outage will be 10 minutes at most, and generally much less than that."
+"\n"
+"The multihoming function has been verified and is in use by several "
+"services on the network."
msgstr ""
#: i2p2www/pages/site/docs/how/network-database.html:583
@@ -7309,7 +8243,8 @@ msgstr ""
#, python-format
msgid ""
"There are currently around %(ffcount)s floodfill routers in the network.\n"
-"Most of the following attacks will become more difficult, or have less impact,\n"
+"Most of the following attacks will become more difficult, or have less "
+"impact,\n"
"as the network size and number of floodfill routers increase."
msgstr ""
@@ -7320,8 +8255,8 @@ msgstr ""
#: i2p2www/pages/site/docs/how/network-database.html:604
#, python-format
msgid ""
-"Via flooding, all netdb entries are stored on the %(floodsize)s floodfill "
-"routers closest to the key."
+"Via flooding, all netdb entries are stored on the %(floodsize)s floodfill"
+" routers closest to the key."
msgstr ""
#: i2p2www/pages/site/docs/how/network-database.html:609
@@ -7342,7 +8277,8 @@ msgstr ""
#, python-format
msgid ""
"Each router maintains an expanded set of statistics in the\n"
-"peer profile for each floodfill router,\n"
+"peer profile for each floodfill router,"
+"\n"
"covering various quality metrics for that peer.\n"
"The set includes:"
msgstr ""
@@ -7373,11 +8309,14 @@ msgstr ""
#: i2p2www/pages/site/docs/how/network-database.html:631
msgid ""
-"Each time a router needs to make a determination on which floodfill router is closest to a key,\n"
+"Each time a router needs to make a determination on which floodfill "
+"router is closest to a key,\n"
"it uses these metrics to determine which floodfill routers are \"good\".\n"
-"The methods, and thresholds, used to determine \"goodness\" are relatively new, and\n"
+"The methods, and thresholds, used to determine \"goodness\" are "
+"relatively new, and\n"
"are subject to further analysis and improvement.\n"
-"While a completely unresponsive router will quickly be identified and avoided,\n"
+"While a completely unresponsive router will quickly be identified and "
+"avoided,\n"
"routers that are only sometimes malicious may be much harder to deal with."
msgstr ""
@@ -7389,7 +8328,8 @@ msgstr ""
#, python-format
msgid ""
"An attacker may mount a Sybil attack\n"
-"by creating a large number of floodfill routers spread throughout the keyspace."
+"by creating a large number of floodfill routers spread throughout the "
+"keyspace."
msgstr ""
#: i2p2www/pages/site/docs/how/network-database.html:647
@@ -7397,29 +8337,35 @@ msgstr ""
msgid ""
"(In a related example, a researcher recently created a\n"
"large number of Tor relays.)\n"
-"If successful, this could be an effective DOS attack on the entire network."
+"If successful, this could be an effective DOS attack on the entire "
+"network."
msgstr ""
#: i2p2www/pages/site/docs/how/network-database.html:653
msgid ""
-"If the floodfills are not sufficiently misbehaving to be marked as \"bad\" using the peer profile\n"
+"If the floodfills are not sufficiently misbehaving to be marked as "
+"\"bad\" using the peer profile\n"
"metrics described above, this is a difficult scenario to handle.\n"
-"Tor's response can be much more nimble in the relay case, as the suspicious relays\n"
+"Tor's response can be much more nimble in the relay case, as the "
+"suspicious relays\n"
"can be manually removed from the consensus.\n"
-"Some possible responses for the I2P network are listed below, however none of them is completely satisfactory:"
+"Some possible responses for the I2P network are listed below, however "
+"none of them is completely satisfactory:"
msgstr ""
#: i2p2www/pages/site/docs/how/network-database.html:661
msgid ""
-"Compile a list of bad router hashes or IPs, and announce the list through various means\n"
-"(console news, website, forum, etc.); users would have to manually download the list and\n"
+"Compile a list of bad router hashes or IPs, and announce the list through"
+" various means\n"
+"(console news, website, forum, etc.); users would have to manually "
+"download the list and\n"
"add it to their local \"blacklist\"."
msgstr ""
#: i2p2www/pages/site/docs/how/network-database.html:666
msgid ""
-"Ask everyone in the network to enable floodfill manually (fight Sybil with "
-"more Sybil)"
+"Ask everyone in the network to enable floodfill manually (fight Sybil "
+"with more Sybil)"
msgstr ""
#: i2p2www/pages/site/docs/how/network-database.html:667
@@ -7428,7 +8374,8 @@ msgstr ""
#: i2p2www/pages/site/docs/how/network-database.html:668
msgid ""
-"Release a new software version that improves the peer profile metrics and thresholds,\n"
+"Release a new software version that improves the peer profile metrics and"
+" thresholds,\n"
"in an attempt to automatically identify the \"bad\" peers."
msgstr ""
@@ -7440,9 +8387,12 @@ msgstr ""
#: i2p2www/pages/site/docs/how/network-database.html:673
msgid ""
-"Implement an automatic subscription-based blacklist controlled by a single individual or group.\n"
-"This would essentially implement a portion of the Tor \"consensus\" model.\n"
-"Unfortunately it would also give a single individual or group the power to\n"
+"Implement an automatic subscription-based blacklist controlled by a "
+"single individual or group.\n"
+"This would essentially implement a portion of the Tor \"consensus\" "
+"model.\n"
+"Unfortunately it would also give a single individual or group the power "
+"to\n"
"block participation of any particular router or IP in the network,\n"
"or even to completely shutdown or destroy the entire network."
msgstr ""
@@ -7459,19 +8409,25 @@ msgstr ""
#, python-format
msgid ""
"An attacker may mount a Sybil attack\n"
-"by creating a small number (8-15) of floodfill routers clustered closely in the keyspace,\n"
+"by creating a small number (8-15) of floodfill routers clustered closely "
+"in the keyspace,\n"
"and distribute the RouterInfos for these routers widely.\n"
-"Then, all lookups and stores for a key in that keyspace would be directed\n"
+"Then, all lookups and stores for a key in that keyspace would be directed"
+"\n"
"to one of the attacker's routers.\n"
-"If successful, this could be an effective DOS attack on a particular eepsite, for example."
+"If successful, this could be an effective DOS attack on a particular "
+"eepsite, for example."
msgstr ""
#: i2p2www/pages/site/docs/how/network-database.html:698
msgid ""
-"As the keyspace is indexed by the cryptographic (SHA256) Hash of the key,\n"
-"an attacker must use a brute-force method to repeatedly generate router hashes\n"
+"As the keyspace is indexed by the cryptographic (SHA256) Hash of the key,"
+"\n"
+"an attacker must use a brute-force method to repeatedly generate router "
+"hashes\n"
"until he has enough that are sufficiently close to the key.\n"
-"The amount of computational power required for this, which is dependent on network\n"
+"The amount of computational power required for this, which is dependent "
+"on network\n"
"size, is unknown."
msgstr ""
@@ -7479,10 +8435,14 @@ msgstr ""
msgid ""
"As a partial defense against this attack,\n"
"the algorithm used to determine Kademlia \"closeness\" varies over time.\n"
-"Rather than using the Hash of the key (i.e. H(k)) to determine closeness,\n"
-"we use the Hash of the key appended with the current date string, i.e. H(k + YYYYMMDD).\n"
-"A function called the \"routing key generator\" does this, which transforms the original key into a \"routing key\".\n"
-"In other words, the entire netdb keyspace \"rotates\" every day at UTC midnight.\n"
+"Rather than using the Hash of the key (i.e. H(k)) to determine closeness,"
+"\n"
+"we use the Hash of the key appended with the current date string, i.e. "
+"H(k + YYYYMMDD).\n"
+"A function called the \"routing key generator\" does this, which "
+"transforms the original key into a \"routing key\".\n"
+"In other words, the entire netdb keyspace \"rotates\" every day at UTC "
+"midnight.\n"
"Any partial-keyspace attack would have to be regenerated every day, for\n"
"after the rotation, the attacking routers would no longer be close\n"
"to the target key, or to each other."
@@ -7491,7 +8451,8 @@ msgstr ""
#: i2p2www/pages/site/docs/how/network-database.html:718
msgid ""
"This attack becomes more difficult as the network size grows.\n"
-"However, recent research demonstrates that the keyspace rotation is not particularly effective.\n"
+"However, recent research demonstrates that the keyspace rotation is not "
+"particularly effective.\n"
"An attacker can precompute numerous router hashes in advance,\n"
"and only a few routers are sufficient to \"eclipse\" a portion\n"
"of the keyspace within a half hour after rotation."
@@ -7499,9 +8460,11 @@ msgstr ""
#: i2p2www/pages/site/docs/how/network-database.html:726
msgid ""
-"One consequence of daily keyspace rotation is that the distributed network database\n"
+"One consequence of daily keyspace rotation is that the distributed "
+"network database\n"
"may become unreliable for a few minutes after the rotation --\n"
-"lookups will fail because the new \"closest\" router has not received a store yet.\n"
+"lookups will fail because the new \"closest\" router has not received a "
+"store yet.\n"
"The extent of the issue, and methods for mitigation\n"
"(for example netdb \"handoffs\" at midnight)\n"
"are a topic for further study."
@@ -7564,19 +8527,24 @@ msgstr ""
#, python-format
msgid ""
"See also lookup\n"
-"(Reference: Hashing it out in Public Sections 2.2-2.3 for terms below in italics)"
+"(Reference: Hashing it out in Public Sections "
+"2.2-2.3 for terms below in italics)"
msgstr ""
#: i2p2www/pages/site/docs/how/network-database.html:782
msgid ""
-"Similar to a bootstrap attack, an attacker using a floodfill router could attempt to \"steer\"\n"
-"peers to a subset of routers controlled by him by returning their references."
+"Similar to a bootstrap attack, an attacker using a floodfill router could"
+" attempt to \"steer\"\n"
+"peers to a subset of routers controlled by him by returning their "
+"references."
msgstr ""
#: i2p2www/pages/site/docs/how/network-database.html:787
msgid ""
-"This is unlikely to work via exploration, because exploration is a low-frequency task.\n"
-"Routers acquire a majority of their peer references through normal tunnel building activity.\n"
+"This is unlikely to work via exploration, because exploration is a low-"
+"frequency task.\n"
+"Routers acquire a majority of their peer references through normal tunnel"
+" building activity.\n"
"Exploration results are generally limited to a few router hashes,\n"
"and each exploration query is directed to a random floodfill router."
msgstr ""
@@ -7588,13 +8556,18 @@ msgid ""
"For floodfill router references returned in a\n"
"I2NP DatabaseSearchReplyMessage\n"
"response to a lookup,\n"
-"these references are followed if they are closer (or the next closest) to the lookup key.\n"
+"these references are followed if they are closer (or the next closest) to"
+" the lookup key.\n"
"The requesting router does not trust that the references are\n"
"closer to the key (i.e. they are verifiably correct.\n"
-"The lookup also does not stop when no closer key is found, but continues by querying the\n"
-"next-closet node, until the timeout or maximum number of queries is reached.\n"
-"This prevents a malicious floodfill from black-holing a part of the key space.\n"
-"Also, the daily keyspace rotation requires an attacker to regenerate a router info\n"
+"The lookup also does not stop when no closer key is found, but continues "
+"by querying the\n"
+"next-closet node, until the timeout or maximum number of queries is "
+"reached.\n"
+"This prevents a malicious floodfill from black-holing a part of the key "
+"space.\n"
+"Also, the daily keyspace rotation requires an attacker to regenerate a "
+"router info\n"
"within the desired key space region.\n"
"This design ensures that the query capture attack described in\n"
"Hashing it out in Public\n"
@@ -7632,30 +8605,43 @@ msgstr ""
#: i2p2www/pages/site/docs/how/network-database.html:829
#, python-format
msgid ""
-"This paper addresses weaknesses in the \"Finger Table\" DHT lookups used by Torsk and NISAN.\n"
-"At first glance, these do not appear to apply to I2P. First, the use of DHT by Torsk and NISAN\n"
-"is significantly different from that in I2P. Second, I2P's network database lookups are only\n"
-"loosely correlated to the peer selection and\n"
-"tunnel building processes; only previously-known peers\n"
+"This paper addresses weaknesses in the \"Finger Table\" DHT lookups used "
+"by Torsk and NISAN.\n"
+"At first glance, these do not appear to apply to I2P. First, the use of "
+"DHT by Torsk and NISAN\n"
+"is significantly different from that in I2P. Second, I2P's network "
+"database lookups are only\n"
+"loosely correlated to the peer "
+"selection and\n"
+"tunnel building processes; only "
+"previously-known peers\n"
"are used for tunnels.\n"
"Also, peer selection is unrelated to any notion of DHT key-closeness."
msgstr ""
#: i2p2www/pages/site/docs/how/network-database.html:840
msgid ""
-"Some of this may actually be more interesting when the I2P network gets much larger.\n"
-"Right now, each router knows a large proportion of the network, so looking up a particular\n"
-"Router Info in the network database is not strongly indicative of a future intent to use\n"
-"that router in a tunnel. Perhaps when the network is 100 times larger, the lookup may be\n"
-"more correlative. Of course, a larger network makes a Sybil attack that much harder."
+"Some of this may actually be more interesting when the I2P network gets "
+"much larger.\n"
+"Right now, each router knows a large proportion of the network, so "
+"looking up a particular\n"
+"Router Info in the network database is not strongly indicative of a "
+"future intent to use\n"
+"that router in a tunnel. Perhaps when the network is 100 times larger, "
+"the lookup may be\n"
+"more correlative. Of course, a larger network makes a Sybil attack that "
+"much harder."
msgstr ""
#: i2p2www/pages/site/docs/how/network-database.html:848
#, python-format
msgid ""
-"However, the general issue of DHT information leakage in I2P needs further investigation.\n"
-"The floodfill routers are in a position to observe queries and gather information.\n"
-"Certainly, at a level of f = 0.2 (20% malicious nodes, as specifed in the paper)\n"
+"However, the general issue of DHT information leakage in I2P needs "
+"further investigation.\n"
+"The floodfill routers are in a position to observe queries and gather "
+"information.\n"
+"Certainly, at a level of f = 0.2 (20% malicious nodes, as "
+"specifed in the paper)\n"
"we expect that many of the Sybil threats we describe\n"
"(here,\n"
"here and\n"
@@ -7690,9 +8676,11 @@ msgstr ""
#: i2p2www/pages/site/docs/how/peer-selection.html:10
#, python-format
msgid ""
-"Peer profiling is the process of collecting data based on the observed performance\n"
+"Peer profiling is the process of collecting data based on the "
+"observed performance\n"
"of other routers or peers, and classifying those peers into groups.\n"
-"Profiling does not use any claimed performance data published by the peer itself\n"
+"Profiling does not use any claimed performance data published by "
+"the peer itself\n"
"in the network database."
msgstr ""
@@ -7707,7 +8695,8 @@ msgstr ""
#: i2p2www/pages/site/docs/how/peer-selection.html:20
#, python-format
msgid ""
-"Choosing peers from the set of floodfill routers to use for network database storage and queries,\n"
+"Choosing peers from the set of floodfill routers to use for network "
+"database storage and queries,\n"
"which is discussed on the network database page"
msgstr ""
@@ -7720,9 +8709,11 @@ msgstr ""
#: i2p2www/pages/site/docs/how/peer-selection.html:28
msgid ""
"Peer selection is the process of choosing which routers\n"
-"on the network we want to relay our messages to go through (which peers will we \n"
+"on the network we want to relay our messages to go through (which peers "
+"will we \n"
"ask to join our tunnels). To accomplish this, we keep track of how each\n"
-"peer performs (the peer's \"profile\") and use that data to estimate how \n"
+"peer performs (the peer's \"profile\") and use that data to estimate how"
+" \n"
"fast they are, how often they will be able to accept our requests, and \n"
"whether they seem to be overloaded or otherwise unable to perform what\n"
"they agree to reliably."
@@ -7732,7 +8723,8 @@ msgstr ""
#, python-format
msgid ""
"Unlike some other anonymous networks, in I2P,\n"
-"claimed bandwidth is untrusted and is only used to avoid those peers\n"
+"claimed bandwidth is untrusted and is only used to avoid those "
+"peers\n"
"advertising very low bandwidth insufficient for routing tunnels.\n"
"All peer selection is done through profiling.\n"
"This prevents simple attacks based on peers claiming high bandwidth\n"
@@ -7744,8 +8736,10 @@ msgstr ""
#: i2p2www/pages/site/docs/how/peer-selection.html:50
msgid ""
-"Peer selection is done quite frequently, as a router may maintain a large number\n"
-"of client and exploratory tunnels, and a tunnel lifetime is only 10 minutes."
+"Peer selection is done quite frequently, as a router may maintain a large"
+" number\n"
+"of client and exploratory tunnels, and a tunnel lifetime is only 10 "
+"minutes."
msgstr ""
#: i2p2www/pages/site/docs/how/peer-selection.html:56
@@ -7756,9 +8750,11 @@ msgstr ""
#, python-format
msgid ""
"For more information see the paper\n"
-"Peer Profiling and Selection in the I2P Anonymous Network\n"
+"Peer Profiling and Selection in the I2P Anonymous "
+"Network\n"
"presented at PET-CON 2009.1.\n"
-"See below for notes on minor changes since the paper was published."
+"See below for notes on minor changes since the "
+"paper was published."
msgstr ""
#: i2p2www/pages/site/docs/how/peer-selection.html:65
@@ -7768,21 +8764,30 @@ msgstr ""
#: i2p2www/pages/site/docs/how/peer-selection.html:66
#, python-format
msgid ""
-"Each peer has a set of data points collected about them, including statistics \n"
-"about how long it takes for them to reply to a network database query, how \n"
-"often their tunnels fail, and how many new peers they are able to introduce \n"
-"us to, as well as simple data points such as when we last heard from them or\n"
-"when the last communication error occurred. The specific data points gathered\n"
+"Each peer has a set of data points collected about them, including "
+"statistics \n"
+"about how long it takes for them to reply to a network database query, "
+"how \n"
+"often their tunnels fail, and how many new peers they are able to "
+"introduce \n"
+"us to, as well as simple data points such as when we last heard from them"
+" or\n"
+"when the last communication error occurred. The specific data points "
+"gathered\n"
"can be found in the code."
msgstr ""
#: i2p2www/pages/site/docs/how/peer-selection.html:75
msgid ""
-"Profiles are fairly small, a few KB. To control memory usage, the profile expiration time\n"
+"Profiles are fairly small, a few KB. To control memory usage, the profile"
+" expiration time\n"
"lessens as the number of profiles grows.\n"
-"Profiles are kept in memory until router shutdown, when they are written to disk.\n"
-"At startup, the profiles are read so the router need not reinitialize all profiles,\n"
-"thus allowing a router to quickly re-integrate into the network after startup."
+"Profiles are kept in memory until router shutdown, when they are written "
+"to disk.\n"
+"At startup, the profiles are read so the router need not reinitialize all"
+" profiles,\n"
+"thus allowing a router to quickly re-integrate into the network after "
+"startup."
msgstr ""
#: i2p2www/pages/site/docs/how/peer-selection.html:85
@@ -7792,8 +8797,10 @@ msgstr ""
#: i2p2www/pages/site/docs/how/peer-selection.html:86
msgid ""
"While the profiles themselves can be considered a summary of a peer's \n"
-"performance, to allow for effective peer selection we break each summary down \n"
-"into four simple values, representing the peer's speed, its capacity, how well \n"
+"performance, to allow for effective peer selection we break each summary "
+"down \n"
+"into four simple values, representing the peer's speed, its capacity, how"
+" well \n"
"integrated into the network it is, and whether it is failing."
msgstr ""
@@ -7805,7 +8812,8 @@ msgstr "Velocità"
msgid ""
"The speed calculation\n"
"simply goes through the profile and estimates how much data we can\n"
-"send or receive on a single tunnel through the peer in a minute. For this estimate it just looks at\n"
+"send or receive on a single tunnel through the peer in a minute. For "
+"this estimate it just looks at\n"
"performance in the previous minute."
msgstr ""
@@ -7817,11 +8825,13 @@ msgstr "Capacità"
msgid ""
"The capacity calculation\n"
"simply goes through the profile and estimates how many tunnels the peer\n"
-"would agree to participate in over a given time period. For this estimate it looks at \n"
+"would agree to participate in over a given time period. For this "
+"estimate it looks at \n"
"how many tunnel build requests\n"
"the peer has accepted, rejected, and dropped, and how many\n"
"of the agreed-to tunnels later failed.\n"
-"While the calculation is time-weighted so that recent activity counts more than later activity,\n"
+"While the calculation is time-weighted so that recent activity counts "
+"more than later activity,\n"
"statistics up to 48 hours old may be included."
msgstr ""
@@ -7829,8 +8839,10 @@ msgstr ""
msgid ""
"Recognizing and avoiding unreliable and unreachable\n"
"peers is critically important.\n"
-"Unfortunately, as the tunnel building and testing require the participation of several peers,\n"
-"it is difficult to positively identify the cause of a dropped build request or test failure.\n"
+"Unfortunately, as the tunnel building and testing require the "
+"participation of several peers,\n"
+"it is difficult to positively identify the cause of a dropped build "
+"request or test failure.\n"
"The router assigns a probability of failure to each of the\n"
"peers, and uses that probability in the capacity calculation.\n"
"Drops and test failures are weighted much higher than rejections."
@@ -7842,8 +8854,10 @@ msgstr ""
#: i2p2www/pages/site/docs/how/peer-selection.html:124
msgid ""
-"As mentioned above, we drill through each peer's profile to come up with a \n"
-"few key calculations, and based upon those, we organize each peer into three\n"
+"As mentioned above, we drill through each peer's profile to come up with "
+"a \n"
+"few key calculations, and based upon those, we organize each peer into "
+"three\n"
"groups - fast, high capacity, and standard."
msgstr ""
@@ -7853,13 +8867,15 @@ msgstr ""
#: i2p2www/pages/site/docs/how/peer-selection.html:134
msgid ""
-"A peer is considered \"high capacity\" if its capacity calculation meets or \n"
+"A peer is considered \"high capacity\" if its capacity calculation meets "
+"or \n"
"exceeds the median of all peers."
msgstr ""
#: i2p2www/pages/site/docs/how/peer-selection.html:138
msgid ""
-"A peer is considered \"fast\" if they are already \"high capacity\" and their \n"
+"A peer is considered \"fast\" if they are already \"high capacity\" and "
+"their \n"
"speed calculation meets or exceeds the median of all peers."
msgstr ""
@@ -7885,20 +8901,25 @@ msgstr ""
#: i2p2www/pages/site/docs/how/peer-selection.html:156
msgid ""
"The fast group is limited to 30 peers.\n"
-"If there would be more, only the ones with the highest speed rating are placed in the group."
+"If there would be more, only the ones with the highest speed rating are "
+"placed in the group."
msgstr ""
#: i2p2www/pages/site/docs/how/peer-selection.html:160
msgid ""
-"The high capacity group is limited to 75 peers (including the fast group)\n"
-"If there would be more, only the ones with the highest capacity rating are placed in the group."
+"The high capacity group is limited to 75 peers (including the fast group)"
+"\n"
+"If there would be more, only the ones with the highest capacity rating "
+"are placed in the group."
msgstr ""
#: i2p2www/pages/site/docs/how/peer-selection.html:164
msgid ""
-"The standard group has no fixed limit, but is somewhat smaller than the number of RouterInfos\n"
+"The standard group has no fixed limit, but is somewhat smaller than the "
+"number of RouterInfos\n"
"stored in the local network database.\n"
-"On an active router in today's network, there may be about 1000 RouterInfos and 500 peer profiles\n"
+"On an active router in today's network, there may be about 1000 "
+"RouterInfos and 500 peer profiles\n"
"(including those in the fast and high capacity groups)"
msgstr ""
@@ -7914,15 +8935,16 @@ msgstr ""
#: i2p2www/pages/site/docs/how/peer-selection.html:177
msgid ""
-"The groups tend to be fairly stable, that is, there is not much \"churn\" in the rankings\n"
+"The groups tend to be fairly stable, that is, there is not much \"churn\""
+" in the rankings\n"
"at each recalculation.\n"
-"Peers in the fast and high capacity groups get more tunnels build through them, which increases their speed and capacity ratings,\n"
+"Peers in the fast and high capacity groups get more tunnels build through"
+" them, which increases their speed and capacity ratings,\n"
"which reinforces their presence in the group."
msgstr ""
#: i2p2www/pages/site/docs/how/peer-selection.html:188
-msgid ""
-"The router selects peers from the above groups to build tunnels through."
+msgid "The router selects peers from the above groups to build tunnels through."
msgstr ""
#: i2p2www/pages/site/docs/how/peer-selection.html:193
@@ -7931,16 +8953,19 @@ msgstr ""
#: i2p2www/pages/site/docs/how/peer-selection.html:194
msgid ""
-"Client tunnels are used for application traffic, such as for HTTP proxies "
-"and web servers."
+"Client tunnels are used for application traffic, such as for HTTP proxies"
+" and web servers."
msgstr ""
#: i2p2www/pages/site/docs/how/peer-selection.html:198
msgid ""
-"To reduce the susceptibility to some attacks,\n"
+"To reduce the susceptibility to some attacks,\n"
"and increase performance,\n"
-"peers for building client tunnels are chosen randomly from the smallest group, which is the \"fast\" group.\n"
-"There is no bias toward selecting peers that were previously participants in a tunnel for the same client."
+"peers for building client tunnels are chosen randomly from the smallest "
+"group, which is the \"fast\" group.\n"
+"There is no bias toward selecting peers that were previously participants"
+" in a tunnel for the same client."
msgstr ""
#: i2p2www/pages/site/docs/how/peer-selection.html:206
@@ -7949,26 +8974,35 @@ msgstr ""
#: i2p2www/pages/site/docs/how/peer-selection.html:207
msgid ""
-"Exploratory tunnels are used for router administrative purposes, such as network database traffic\n"
+"Exploratory tunnels are used for router administrative purposes, such as "
+"network database traffic\n"
"and testing client tunnels.\n"
-"Exploratory tunnels are also used to contact previously unconnected routers, which is why\n"
+"Exploratory tunnels are also used to contact previously unconnected "
+"routers, which is why\n"
"they are called \"exploratory\".\n"
"These tunnels are usually low-bandwidth."
msgstr ""
#: i2p2www/pages/site/docs/how/peer-selection.html:215
msgid ""
-"Peers for building exploratory tunnels are generally chosen randomly from the standard group.\n"
-"If the success rate of these build attempts is low compared to the client tunnel build success rate,\n"
-"the router will select a weighted average of peers randomly from the high capacity group instead.\n"
-"This helps maintain a satisfactory build success rate even when network performance is poor.\n"
-"There is no bias toward selecting peers that were previously participants in an exploratory tunnel."
+"Peers for building exploratory tunnels are generally chosen randomly from"
+" the standard group.\n"
+"If the success rate of these build attempts is low compared to the client"
+" tunnel build success rate,\n"
+"the router will select a weighted average of peers randomly from the high"
+" capacity group instead.\n"
+"This helps maintain a satisfactory build success rate even when network "
+"performance is poor.\n"
+"There is no bias toward selecting peers that were previously participants"
+" in an exploratory tunnel."
msgstr ""
#: i2p2www/pages/site/docs/how/peer-selection.html:223
msgid ""
-"As the standard group includes a very large subset of all peers the router knows about,\n"
-"exploratory tunnels are essentially built through a random selection of all peers,\n"
+"As the standard group includes a very large subset of all peers the "
+"router knows about,\n"
+"exploratory tunnels are essentially built through a random selection of "
+"all peers,\n"
"until the build success rate becomes too low."
msgstr ""
@@ -7978,8 +9012,8 @@ msgstr "Restrizioni "
#: i2p2www/pages/site/docs/how/peer-selection.html:232
msgid ""
-"To prevent some simple attacks, and for performance, there are the following"
-" restrictions:"
+"To prevent some simple attacks, and for performance, there are the "
+"following restrictions:"
msgstr ""
#: i2p2www/pages/site/docs/how/peer-selection.html:236
@@ -7988,8 +9022,8 @@ msgstr ""
#: i2p2www/pages/site/docs/how/peer-selection.html:239
msgid ""
-"A peer may participate in a maximum of 33% of all tunnels created by the"
-" router."
+"A peer may participate in a maximum of 33% of all tunnels created by "
+"the router."
msgstr ""
#: i2p2www/pages/site/docs/how/peer-selection.html:242
@@ -8010,18 +9044,18 @@ msgid ""
"Peers are ordered within tunnels to\n"
"to deal with the predecessor attack\n"
"(2008 update).\n"
-"More information is on the tunnel page."
+"More information is on the tunnel "
+"page."
msgstr ""
#: i2p2www/pages/site/docs/how/peer-selection.html:268
-msgid ""
-"Continue to analyze an tune speed and capacity calculations as necessary"
+msgid "Continue to analyze an tune speed and capacity calculations as necessary"
msgstr ""
#: i2p2www/pages/site/docs/how/peer-selection.html:271
msgid ""
-"Implement a more aggressive ejection strategy if necessary to control memory"
-" usage as the network grows"
+"Implement a more aggressive ejection strategy if necessary to control "
+"memory usage as the network grows"
msgstr ""
#: i2p2www/pages/site/docs/how/peer-selection.html:274
@@ -8036,8 +9070,10 @@ msgstr ""
#, python-format
msgid ""
"For those reading the paper\n"
-"Peer Profiling and Selection in the I2P Anonymous Network,\n"
-"please keep in mind the following minor changes in I2P since the paper's publication:"
+"Peer Profiling and Selection in the I2P Anonymous "
+"Network,\n"
+"please keep in mind the following minor changes in I2P since the paper's "
+"publication:"
msgstr ""
#: i2p2www/pages/site/docs/how/peer-selection.html:289
@@ -8111,18 +9147,24 @@ msgstr "Crittografia "
#: i2p2www/pages/site/docs/how/tech-intro.html:25
msgid ""
"I2P is a scalable, self organizing, resilient packet switched anonymous \n"
-"network layer, upon which any number of different anonymity or security conscious \n"
-"applications can operate. Each of these applications may make their own anonymity, \n"
-"latency, and throughput tradeoffs without worrying about the proper implementation \n"
-"of a free route mixnet, allowing them to blend their activity with the larger \n"
+"network layer, upon which any number of different anonymity or security "
+"conscious \n"
+"applications can operate. Each of these applications may make their own "
+"anonymity, \n"
+"latency, and throughput tradeoffs without worrying about the proper "
+"implementation \n"
+"of a free route mixnet, allowing them to blend their activity with the "
+"larger \n"
"anonymity set of users already running on top of I2P."
msgstr ""
#: i2p2www/pages/site/docs/how/tech-intro.html:34
msgid ""
-"Applications available already provide the full range of typical Internet activities -\n"
+"Applications available already provide the full range of typical Internet"
+" activities -\n"
"anonymous web browsing, web hosting, chat, file sharing, e-mail,\n"
-"blogging and content syndication, newsgroups, as well as several other applications under development."
+"blogging and content syndication, newsgroups, as well as several other "
+"applications under development."
msgstr ""
#: i2p2www/pages/site/docs/how/tech-intro.html:40
@@ -8135,8 +9177,10 @@ msgstr ""
#: i2p2www/pages/site/docs/how/tech-intro.html:42
msgid ""
-"File sharing: I2PSnark, Robert, iMule, \n"
-"I2Phex, PyBit, I2P-bt\n"
+"File sharing: I2PSnark, Robert, iMule, \n"
+"I2Phex, PyBit, I2P-bt\n"
"and others."
msgstr ""
@@ -8148,14 +9192,14 @@ msgstr ""
#: i2p2www/pages/site/docs/how/tech-intro.html:48
msgid ""
-"Blog: using e.g. the pebble plugin or the distributed blogging software Syndie."
+"Blog: using e.g. the pebble plugin or the distributed blogging software "
+"Syndie."
msgstr ""
#: i2p2www/pages/site/docs/how/tech-intro.html:49
msgid ""
-"Distributed Data Store: Save your data redundantly in the Tahoe-LAFS cloud "
-"over I2P."
+"Distributed Data Store: Save your data redundantly in the Tahoe-LAFS "
+"cloud over I2P."
msgstr ""
#: i2p2www/pages/site/docs/how/tech-intro.html:50
@@ -8164,47 +9208,77 @@ msgstr ""
#: i2p2www/pages/site/docs/how/tech-intro.html:53
msgid ""
-"Unlike web sites hosted within content distribution networks like Freenet \n"
-"or GNUnet, the services hosted on \n"
-"I2P are fully interactive - there are traditional web-style search engines, \n"
-"bulletin boards, blogs you can comment on, database driven sites, and bridges \n"
-"to query static systems like Freenet without needing to install it locally."
+"Unlike web sites hosted within content distribution networks like Freenet \n"
+"or GNUnet, the services "
+"hosted on \n"
+"I2P are fully interactive - there are traditional web-style search "
+"engines, \n"
+"bulletin boards, blogs you can comment on, database driven sites, and "
+"bridges \n"
+"to query static systems like Freenet without needing to install it "
+"locally."
msgstr ""
#: i2p2www/pages/site/docs/how/tech-intro.html:61
msgid ""
"With all of these anonymity enabled applications, I2P takes on the role \n"
-"of the message oriented middleware - applications say that they want to send \n"
-"some data to a cryptographic identifier (a \"destination\") and I2P takes care \n"
-"of making sure it gets there securely and anonymously. I2P also bundles a \n"
-"simple streaming library to allow I2P's anonymous \n"
-"best-effort messages to transfer as reliable, in-order streams, transparently \n"
-"offering a TCP based congestion control algorithm tuned for the high bandwidth \n"
-"delay product of the network. While there have been several simple SOCKS proxies \n"
-"available to tie existing applications into the network, their value has been \n"
-"limited as nearly every application routinely exposes what, in an anonymous \n"
-"context, is sensitive information. The only safe way to go is to fully audit \n"
-"an application to ensure proper operation and to assist in that we provide \n"
-"a series of APIs in various languages which can be used to make the most out \n"
+"of the message oriented middleware - applications say that they want to "
+"send \n"
+"some data to a cryptographic identifier (a \"destination\") and I2P takes"
+" care \n"
+"of making sure it gets there securely and anonymously. I2P also bundles a"
+" \n"
+"simple streaming library to allow I2P's "
+"anonymous \n"
+"best-effort messages to transfer as reliable, in-order streams, "
+"transparently \n"
+"offering a TCP based congestion control algorithm tuned for the high "
+"bandwidth \n"
+"delay product of the network. While there have been several simple SOCKS "
+"proxies \n"
+"available to tie existing applications into the network, their value has "
+"been \n"
+"limited as nearly every application routinely exposes what, in an "
+"anonymous \n"
+"context, is sensitive information. The only safe way to go is to fully "
+"audit \n"
+"an application to ensure proper operation and to assist in that we "
+"provide \n"
+"a series of APIs in various languages which can be used to make the most "
+"out \n"
"of the network."
msgstr ""
#: i2p2www/pages/site/docs/how/tech-intro.html:78
#, python-format
msgid ""
-"I2P is not a research project - academic, commercial, or governmental, but \n"
-"is instead an engineering effort aimed at doing whatever is necessary to provide \n"
-"a sufficient level of anonymity to those who need it. It has been in active \n"
-"development since early 2003 with one full time developer and a dedicated \n"
-"group of part time contributors from all over the world. All of the work done \n"
-"on I2P is open source and freely available on the website, \n"
-"with the majority of the code released outright into the public domain, though \n"
-"making use of a few cryptographic routines under BSD-style licenses. The people \n"
-"working on I2P do not control what people release client applications under, \n"
-"and there are several GPL'ed applications available (I2PTunnel, \n"
-"susimail, I2PSnark, I2P-Bote, \n"
+"I2P is not a research project - academic, commercial, or governmental, "
+"but \n"
+"is instead an engineering effort aimed at doing whatever is necessary to "
+"provide \n"
+"a sufficient level of anonymity to those who need it. It has been in "
+"active \n"
+"development since early 2003 with one full time developer and a dedicated"
+" \n"
+"group of part time contributors from all over the world. All of the work "
+"done \n"
+"on I2P is open source and freely available on the website, \n"
+"with the majority of the code released outright into the public domain, "
+"though \n"
+"making use of a few cryptographic routines under BSD-style licenses. The "
+"people \n"
+"working on I2P do not control what people release client applications "
+"under, \n"
+"and there are several GPL'ed applications available (I2PTunnel, \n"
+"susimail, I2PSnark, I2P-"
+"Bote, \n"
"I2Phex and others.).\n"
-"Funding for I2P comes entirely from donations,\n"
+"Funding for I2P comes entirely from "
+"donations,\n"
"and does not receive any tax breaks in any jurisdiction at this time,\n"
"as many of the developers are themselves anonymous."
msgstr ""
@@ -8215,27 +9289,40 @@ msgstr "Operazione"
#: i2p2www/pages/site/docs/how/tech-intro.html:98
msgid ""
-"To understand I2P's operation, it is essential to understand a few key concepts. \n"
-"First, I2P makes a strict separation between the software participating in \n"
-"the network (a \"router\") and the anonymous endpoints (\"destinations\") associated \n"
-"with individual applications. The fact that someone is running I2P is not \n"
-"usually a secret. What is hidden is information on what the user is doing, \n"
-"if anything at all, as well as what router a particular destination is connected \n"
-"to. End users will typically have several local destinations on their router \n"
-"- for instance, one proxying in to IRC servers, another supporting the user's \n"
-"anonymous webserver (\"eepsite\"), another for an I2Phex instance, another for \n"
+"To understand I2P's operation, it is essential to understand a few key "
+"concepts. \n"
+"First, I2P makes a strict separation between the software participating "
+"in \n"
+"the network (a \"router\") and the anonymous endpoints (\"destinations\")"
+" associated \n"
+"with individual applications. The fact that someone is running I2P is not"
+" \n"
+"usually a secret. What is hidden is information on what the user is "
+"doing, \n"
+"if anything at all, as well as what router a particular destination is "
+"connected \n"
+"to. End users will typically have several local destinations on their "
+"router \n"
+"- for instance, one proxying in to IRC servers, another supporting the "
+"user's \n"
+"anonymous webserver (\"eepsite\"), another for an I2Phex instance, "
+"another for \n"
"torrents, etc."
msgstr ""
#: i2p2www/pages/site/docs/how/tech-intro.html:111
msgid ""
"Another critical concept to understand is the \"tunnel\".\n"
-"A tunnel is a directed path through an explicitly selected list of routers.\n"
-"Layered encryption is used, so each of the routers can only decrypt a single layer.\n"
+"A tunnel is a directed path through an explicitly selected list of "
+"routers.\n"
+"Layered encryption is used, so each of the routers can only decrypt a "
+"single layer.\n"
"The decrypted information contains the IP of the next router, along with\n"
"the encrypted information to be forwarded.\n"
-"Each tunnel has a starting point (the first router, also known as \"gateway\")\n"
-"and an end point. Messages can be sent only in one way. To send messages back,\n"
+"Each tunnel has a starting point (the first router, also known as "
+"\"gateway\")\n"
+"and an end point. Messages can be sent only in one way. To send messages "
+"back,\n"
"another tunnel is required."
msgstr ""
@@ -8255,12 +9342,15 @@ msgid ""
"while \"inbound\" tunnels bring messages to the tunnel creator.\n"
"Combining these two tunnels allows users to send messages to each other.\n"
"The sender (\"Alice\" in the above image) sets up an outbound tunnel,\n"
-"while the receiver (\"Bob\" in the above image) creates an inbound tunnel.\n"
-"The gateway of an inbound tunnel can receive messages from any other user\n"
+"while the receiver (\"Bob\" in the above image) creates an inbound "
+"tunnel.\n"
+"The gateway of an inbound tunnel can receive messages from any other user"
+"\n"
"and will send them on until the endpoint (\"Bob\").\n"
"The endpoint of the outbound tunnel will need to send the message\n"
"on to the gateway of the inbound tunnel.\n"
-"To do this, the sender (\"Alice\") adds instructions to her encrypted message.\n"
+"To do this, the sender (\"Alice\") adds instructions to her encrypted "
+"message.\n"
"Once the endpoint of the outbound tunnel decrypts the message,\n"
"it will have instructions to forward the message to the correct\n"
"inbound gateway (the gateway to \"Bob\")."
@@ -8268,19 +9358,25 @@ msgstr ""
#: i2p2www/pages/site/docs/how/tech-intro.html:144
msgid ""
-"A third critical concept to understand is I2P's \"network database\" (or \"netDb\") \n"
-"- a pair of algorithms used to share network metadata. The two types of metadata \n"
-"carried are \"routerInfo\" and \"leaseSets\" - the routerInfo gives routers the \n"
-"data necessary for contacting a particular router (their public keys, transport \n"
-"addresses, etc), while the leaseSet gives routers the information necessary \n"
-"for contacting a particular destination. A leaseSet contains a number of \"leases\".\n"
-"Each of this leases specifies a tunnel gateway, which allows reaching a specific destination.\n"
+"A third critical concept to understand is I2P's \"network "
+"database\" (or \"netDb\") \n"
+"- a pair of algorithms used to share network metadata. The two types of "
+"metadata \n"
+"carried are \"routerInfo\" and \"leaseSets\" - the "
+"routerInfo gives routers the \n"
+"data necessary for contacting a particular router (their public keys, "
+"transport \n"
+"addresses, etc), while the leaseSet gives routers the information "
+"necessary \n"
+"for contacting a particular destination. A leaseSet contains a number of "
+"\"leases\".\n"
+"Each of this leases specifies a tunnel gateway, which allows reaching a "
+"specific destination.\n"
"The full information contained in a lease:"
msgstr ""
#: i2p2www/pages/site/docs/how/tech-intro.html:155
-msgid ""
-"Inbound gateway for a tunnel that allows reaching a specific destination."
+msgid "Inbound gateway for a tunnel that allows reaching a specific destination."
msgstr ""
#: i2p2www/pages/site/docs/how/tech-intro.html:156
@@ -8295,8 +9391,10 @@ msgstr ""
#: i2p2www/pages/site/docs/how/tech-intro.html:159
msgid ""
-"Routers themselves send their routerInfo to the netDb directly, while leaseSets are sent through outbound tunnels\n"
-"(leaseSets need to be sent anonymously, to avoid correlating a router with his leaseSets)."
+"Routers themselves send their routerInfo to the netDb directly, while "
+"leaseSets are sent through outbound tunnels\n"
+"(leaseSets need to be sent anonymously, to avoid correlating a router "
+"with his leaseSets)."
msgstr ""
#: i2p2www/pages/site/docs/how/tech-intro.html:164
@@ -8307,10 +9405,13 @@ msgstr ""
#: i2p2www/pages/site/docs/how/tech-intro.html:168
msgid ""
-"To build up her own inbound and outbound tunnels, Alice does a lookup in the netDb to collect routerInfo.\n"
+"To build up her own inbound and outbound tunnels, Alice does a lookup in "
+"the netDb to collect routerInfo.\n"
"This way, she gathers lists of peers she can use as hops in her tunnels.\n"
-"She can then send a build message to the first hop, requesting the construction of a tunnel and asking\n"
-"that router to send the construction message onward, until the tunnel has been constructed."
+"She can then send a build message to the first hop, requesting the "
+"construction of a tunnel and asking\n"
+"that router to send the construction message onward, until the tunnel has"
+" been constructed."
msgstr ""
#: i2p2www/pages/site/docs/how/tech-intro.html:175
@@ -8327,19 +9428,30 @@ msgstr ""
#: i2p2www/pages/site/docs/how/tech-intro.html:182
msgid ""
-"When Alice wants to send a message to Bob, she first does a lookup in the \n"
-"netDb to find Bob's leaseSet, giving her his current inbound tunnel gateways. \n"
-"She then picks one of her outbound tunnels and sends the message down it with \n"
-"instructions for the outbound tunnel's endpoint to forward the message on \n"
-"to one of Bob's inbound tunnel gateways. When the outbound tunnel endpoint \n"
-"receives those instructions, it forwards the message as requested, and when \n"
-"Bob's inbound tunnel gateway receives it, it is forwarded down the tunnel \n"
-"to Bob's router. If Alice wants Bob to be able to reply to the message, she \n"
-"needs to transmit her own destination explicitly as part of the message itself.\n"
-"This can be done by introducing a higher-level layer, which is done in the\n"
+"When Alice wants to send a message to Bob, she first does a lookup in the"
+" \n"
+"netDb to find Bob's leaseSet, giving her his current inbound tunnel "
+"gateways. \n"
+"She then picks one of her outbound tunnels and sends the message down it "
+"with \n"
+"instructions for the outbound tunnel's endpoint to forward the message on"
+" \n"
+"to one of Bob's inbound tunnel gateways. When the outbound tunnel "
+"endpoint \n"
+"receives those instructions, it forwards the message as requested, and "
+"when \n"
+"Bob's inbound tunnel gateway receives it, it is forwarded down the tunnel"
+" \n"
+"to Bob's router. If Alice wants Bob to be able to reply to the message, "
+"she \n"
+"needs to transmit her own destination explicitly as part of the message "
+"itself.\n"
+"This can be done by introducing a higher-level layer, which is done in "
+"the\n"
"streaming library.\n"
"Alice may also cut down on the response time by bundling her most \n"
-"recent LeaseSet with the message so that Bob doesn't need to do a netDb lookup \n"
+"recent LeaseSet with the message so that Bob doesn't need to do a netDb "
+"lookup \n"
"for it when he wants to reply, but this is optional."
msgstr ""
@@ -8357,126 +9469,210 @@ msgstr ""
#: i2p2www/pages/site/docs/how/tech-intro.html:204
msgid ""
-"While the tunnels themselves have layered encryption to prevent unauthorized \n"
-"disclosure to peers inside the network (as the transport layer itself does \n"
-"to prevent unauthorized disclosure to peers outside the network), it is necessary \n"
-"to add an additional end to end layer of encryption to hide the message from \n"
-"the outbound tunnel endpoint and the inbound tunnel gateway. This \"garlic \n"
-"encryption\" lets Alice's router wrap up multiple messages into a single \n"
-"\"garlic message\", encrypted to a particular public key so that intermediary \n"
-"peers cannot determine either how many messages are within the garlic, what \n"
-"those messages say, or where those individual cloves are destined. For typical \n"
-"end to end communication between Alice and Bob, the garlic will be encrypted \n"
-"to the public key published in Bob's leaseSet, allowing the message to be \n"
+"While the tunnels themselves have layered encryption to prevent "
+"unauthorized \n"
+"disclosure to peers inside the network (as the transport layer itself "
+"does \n"
+"to prevent unauthorized disclosure to peers outside the network), it is "
+"necessary \n"
+"to add an additional end to end layer of encryption to hide the message "
+"from \n"
+"the outbound tunnel endpoint and the inbound tunnel gateway. This \"garlic \n"
+"encryption\" lets Alice's router wrap up multiple messages into a "
+"single \n"
+"\"garlic message\", encrypted to a particular public key so that "
+"intermediary \n"
+"peers cannot determine either how many messages are within the garlic, "
+"what \n"
+"those messages say, or where those individual cloves are destined. For "
+"typical \n"
+"end to end communication between Alice and Bob, the garlic will be "
+"encrypted \n"
+"to the public key published in Bob's leaseSet, allowing the message to be"
+" \n"
"encrypted without giving out the public key to Bob's own router."
msgstr ""
#: i2p2www/pages/site/docs/how/tech-intro.html:219
msgid ""
-"Another important fact to keep in mind is that I2P is entirely message based \n"
-"and that some messages may be lost along the way. Applications using I2P can \n"
-"use the message oriented interfaces and take care of their own congestion \n"
-"control and reliability needs, but most would be best served by reusing the \n"
-"provided streaming library to view I2P as a streams \n"
+"Another important fact to keep in mind is that I2P is entirely message "
+"based \n"
+"and that some messages may be lost along the way. Applications using I2P "
+"can \n"
+"use the message oriented interfaces and take care of their own congestion"
+" \n"
+"control and reliability needs, but most would be best served by reusing "
+"the \n"
+"provided streaming library to view I2P as "
+"a streams \n"
"based network."
msgstr ""
#: i2p2www/pages/site/docs/how/tech-intro.html:229
msgid ""
"Both inbound and outbound tunnels work along similar principles.\n"
-"The tunnel gateway accumulates a number of tunnel messages, eventually preprocessing \n"
-"them into something for tunnel delivery. Next, the gateway encrypts that preprocessed \n"
-"data and forwards it to the first hop. That peer and subsequent tunnel participants \n"
-"add on a layer of encryption after verifying that it isn't a duplicate before \n"
-"forward it on to the next peer. Eventually, the message arrives at the endpoint \n"
-"where the messages are split out again and forwarded on as requested. The \n"
-"difference arises in what the tunnel's creator does - for inbound tunnels, \n"
-"the creator is the endpoint and they simply decrypt all of the layers added, \n"
-"while for outbound tunnels, the creator is the gateway and they pre-decrypt \n"
-"all of the layers so that after all of the layers of per-hop encryption are \n"
+"The tunnel gateway accumulates a number of tunnel messages, eventually "
+"preprocessing \n"
+"them into something for tunnel delivery. Next, the gateway encrypts that "
+"preprocessed \n"
+"data and forwards it to the first hop. That peer and subsequent tunnel "
+"participants \n"
+"add on a layer of encryption after verifying that it isn't a duplicate "
+"before \n"
+"forward it on to the next peer. Eventually, the message arrives at the "
+"endpoint \n"
+"where the messages are split out again and forwarded on as requested. The"
+" \n"
+"difference arises in what the tunnel's creator does - for inbound "
+"tunnels, \n"
+"the creator is the endpoint and they simply decrypt all of the layers "
+"added, \n"
+"while for outbound tunnels, the creator is the gateway and they pre-"
+"decrypt \n"
+"all of the layers so that after all of the layers of per-hop encryption "
+"are \n"
"added, the message arrives in the clear at the tunnel endpoint."
msgstr ""
#: i2p2www/pages/site/docs/how/tech-intro.html:244
msgid ""
-"The choice of specific peers to pass on messages as well as their particular \n"
-"ordering is important to understanding both I2P's anonymity and performance \n"
-"characteristics. While the network database (below) has its own criteria for \n"
-"picking what peers to query and store entries on, tunnel creators may use any peers \n"
-"in the network in any order (and even any number of times) in a single tunnel. \n"
-"If perfect latency and capacity data were globally known, selection and ordering \n"
-"would be driven by the particular needs of the client in tandem with their \n"
-"threat model. Unfortunately, latency and capacity data is not trivial to gather \n"
-"anonymously, and depending upon untrusted peers to provide this information \n"
+"The choice of specific peers to pass on messages as well as their "
+"particular \n"
+"ordering is important to understanding both I2P's anonymity and "
+"performance \n"
+"characteristics. While the network database (below) has its own criteria "
+"for \n"
+"picking what peers to query and store entries on, tunnel creators may use"
+" any peers \n"
+"in the network in any order (and even any number of times) in a single "
+"tunnel. \n"
+"If perfect latency and capacity data were globally known, selection and "
+"ordering \n"
+"would be driven by the particular needs of the client in tandem with "
+"their \n"
+"threat model. Unfortunately, latency and capacity data is not trivial to "
+"gather \n"
+"anonymously, and depending upon untrusted peers to provide this "
+"information \n"
"has its own serious anonymity implications."
msgstr ""
#: i2p2www/pages/site/docs/how/tech-intro.html:257
msgid ""
-"From an anonymity perspective, the simplest technique would be to pick peers \n"
-"randomly from the entire network, order them randomly and use those peers \n"
-"in that order for all eternity. From a performance perspective, the simplest \n"
-"technique would be to pick the fastest peers with the necessary spare capacity, \n"
-"spreading the load across different peers to handle transparent failover, \n"
-"and to rebuild the tunnel whenever capacity information changes. While the \n"
-"former is both brittle and inefficient, the later requires inaccessible information \n"
-"and offers insufficient anonymity. I2P is instead working on offering a range \n"
-"of peer selection strategies, coupled with anonymity aware measurement code \n"
+"From an anonymity perspective, the simplest technique would be to pick "
+"peers \n"
+"randomly from the entire network, order them randomly and use those peers"
+" \n"
+"in that order for all eternity. From a performance perspective, the "
+"simplest \n"
+"technique would be to pick the fastest peers with the necessary spare "
+"capacity, \n"
+"spreading the load across different peers to handle transparent failover,"
+" \n"
+"and to rebuild the tunnel whenever capacity information changes. While "
+"the \n"
+"former is both brittle and inefficient, the later requires inaccessible "
+"information \n"
+"and offers insufficient anonymity. I2P is instead working on offering a "
+"range \n"
+"of peer selection strategies, coupled with anonymity aware measurement "
+"code \n"
"to organize the peers by their profiles."
msgstr ""
#: i2p2www/pages/site/docs/how/tech-intro.html:270
msgid ""
-"As a base, I2P is constantly profiling the peers with which it interacts \n"
-"with by measuring their indirect behavior - for instance, when a peer responds \n"
-"to a netDb lookup in 1.3 seconds, that round trip latency is recorded in the \n"
-"profiles for all of the routers involved in the two tunnels (inbound and outbound) \n"
-"through which the request and response passed, as well as the queried peer's \n"
-"profile. Direct measurement, such as transport layer latency or congestion, \n"
-"is not used as part of the profile, as it can be manipulated and associated \n"
-"with the measuring router, exposing them to trivial attacks. While gathering \n"
-"these profiles, a series of calculations are run on each to summarize its \n"
-"performance - its latency, capacity to handle lots of activity, whether they \n"
-"are currently overloaded, and how well integrated into the network they seem \n"
-"to be. These calculations are then compared for active peers to organize the \n"
-"routers into four tiers - fast and high capacity, high capacity, not failing, \n"
-"and failing. The thresholds for those tiers are determined dynamically, and \n"
+"As a base, I2P is constantly profiling the peers with which it interacts"
+" \n"
+"with by measuring their indirect behavior - for instance, when a peer "
+"responds \n"
+"to a netDb lookup in 1.3 seconds, that round trip latency is recorded in "
+"the \n"
+"profiles for all of the routers involved in the two tunnels (inbound and "
+"outbound) \n"
+"through which the request and response passed, as well as the queried "
+"peer's \n"
+"profile. Direct measurement, such as transport layer latency or "
+"congestion, \n"
+"is not used as part of the profile, as it can be manipulated and "
+"associated \n"
+"with the measuring router, exposing them to trivial attacks. While "
+"gathering \n"
+"these profiles, a series of calculations are run on each to summarize its"
+" \n"
+"performance - its latency, capacity to handle lots of activity, whether "
+"they \n"
+"are currently overloaded, and how well integrated into the network they "
+"seem \n"
+"to be. These calculations are then compared for active peers to organize "
+"the \n"
+"routers into four tiers - fast and high capacity, high capacity, not "
+"failing, \n"
+"and failing. The thresholds for those tiers are determined dynamically, "
+"and \n"
"while they currently use fairly simple algorithms, alternatives exist."
msgstr ""
#: i2p2www/pages/site/docs/how/tech-intro.html:288
msgid ""
-"Using this profile data, the simplest reasonable peer selection strategy \n"
-"is to pick peers randomly from the top tier (fast and high capacity), and \n"
-"this is currently deployed for client tunnels. Exploratory tunnels (used for \n"
-"netDb and tunnel management) pick peers randomly from the \"not failing\" tier \n"
-"(which includes routers in 'better' tiers as well), allowing the peer to sample \n"
-"routers more widely, in effect optimizing the peer selection through randomized \n"
-"hill climbing. These strategies alone do however leak information regarding \n"
-"the peers in the router's top tier through predecessor and netDb harvesting \n"
-"attacks. In turn, several alternatives exist which, while not balancing the \n"
-"load as evenly, will address the attacks mounted by particular classes of \n"
+"Using this profile data, the simplest reasonable peer selection strategy"
+" \n"
+"is to pick peers randomly from the top tier (fast and high capacity), and"
+" \n"
+"this is currently deployed for client tunnels. Exploratory tunnels (used "
+"for \n"
+"netDb and tunnel management) pick peers randomly from the \"not failing\""
+" tier \n"
+"(which includes routers in 'better' tiers as well), allowing the peer to "
+"sample \n"
+"routers more widely, in effect optimizing the peer selection through "
+"randomized \n"
+"hill climbing. These strategies alone do however leak information "
+"regarding \n"
+"the peers in the router's top tier through predecessor and netDb "
+"harvesting \n"
+"attacks. In turn, several alternatives exist which, while not balancing "
+"the \n"
+"load as evenly, will address the attacks mounted by particular classes of"
+" \n"
"adversaries."
msgstr ""
#: i2p2www/pages/site/docs/how/tech-intro.html:302
msgid ""
-"By picking a random key and ordering the peers according to their XOR distance \n"
-"from it, the information leaked is reduced in predecessor and harvesting attacks \n"
-"according to the peers' failure rate and the tier's churn. Another simple \n"
-"strategy for dealing with netDb harvesting attacks is to simply fix the inbound \n"
-"tunnel gateway(s) yet randomize the peers further on in the tunnels. To deal \n"
-"with predecessor attacks for adversaries which the client contacts, the outbound \n"
-"tunnel endpoints would also remain fixed. The selection of which peer to fix \n"
-"on the most exposed point would of course need to have a limit to the duration, \n"
-"as all peers fail eventually, so it could either be reactively adjusted or \n"
-"proactively avoided to mimic a measured mean time between failures of other \n"
-"routers. These two strategies can in turn be combined, using a fixed exposed \n"
-"peer and an XOR based ordering within the tunnels themselves. A more rigid \n"
-"strategy would fix the exact peers and ordering of a potential tunnel, only \n"
-"using individual peers if all of them agree to participate in the same way \n"
-"each time. This varies from the XOR based ordering in that the predecessor \n"
-"and successor of each peer is always the same, while the XOR only makes sure \n"
+"By picking a random key and ordering the peers according to their XOR "
+"distance \n"
+"from it, the information leaked is reduced in predecessor and harvesting "
+"attacks \n"
+"according to the peers' failure rate and the tier's churn. Another simple"
+" \n"
+"strategy for dealing with netDb harvesting attacks is to simply fix the "
+"inbound \n"
+"tunnel gateway(s) yet randomize the peers further on in the tunnels. To "
+"deal \n"
+"with predecessor attacks for adversaries which the client contacts, the "
+"outbound \n"
+"tunnel endpoints would also remain fixed. The selection of which peer to "
+"fix \n"
+"on the most exposed point would of course need to have a limit to the "
+"duration, \n"
+"as all peers fail eventually, so it could either be reactively adjusted "
+"or \n"
+"proactively avoided to mimic a measured mean time between failures of "
+"other \n"
+"routers. These two strategies can in turn be combined, using a fixed "
+"exposed \n"
+"peer and an XOR based ordering within the tunnels themselves. A more "
+"rigid \n"
+"strategy would fix the exact peers and ordering of a potential tunnel, "
+"only \n"
+"using individual peers if all of them agree to participate in the same "
+"way \n"
+"each time. This varies from the XOR based ordering in that the "
+"predecessor \n"
+"and successor of each peer is always the same, while the XOR only makes "
+"sure \n"
"their order doesn't change."
msgstr ""
@@ -8485,8 +9681,10 @@ msgstr ""
msgid ""
"As mentioned before, I2P currently (release 0.8) includes the tiered \n"
"random strategy above, with XOR-based ordering. A \n"
-"more detailed discussion of the mechanics involved in tunnel operation, management, \n"
-"and peer selection can be found in the tunnel spec."
+"more detailed discussion of the mechanics involved in tunnel operation, "
+"management, \n"
+"and peer selection can be found in the tunnel "
+"spec."
msgstr ""
#: i2p2www/pages/site/docs/how/tech-intro.html:330
@@ -8500,20 +9698,27 @@ msgstr ""
#: i2p2www/pages/site/docs/how/tech-intro.html:336
msgid ""
"A percentage of I2P users are appointed as 'floodfill peers'.\n"
-"Currently, I2P installations that have a lot of bandwidth and are fast enough,\n"
-"will appoint themselves as floodfill as soon as the number of existing floodfill routers\n"
+"Currently, I2P installations that have a lot of bandwidth and are fast "
+"enough,\n"
+"will appoint themselves as floodfill as soon as the number of existing "
+"floodfill routers\n"
"drops too low."
msgstr ""
#: i2p2www/pages/site/docs/how/tech-intro.html:343
#, python-format
msgid ""
-"Other I2P routers will store their data and lookup data by sending simple 'store' and 'lookup' queries to the floodfills.\n"
-"If a floodfill router receives a 'store' query, it will spread the information to other floodfill routers\n"
-"using the Kademlia algorithm.\n"
-"The 'lookup' queries currently function differently, to avoid an important\n"
+"Other I2P routers will store their data and lookup data by sending simple"
+" 'store' and 'lookup' queries to the floodfills.\n"
+"If a floodfill router receives a 'store' query, it will spread the "
+"information to other floodfill routers\n"
+"using the Kademlia "
+"algorithm.\n"
+"The 'lookup' queries currently function differently, to avoid an "
+"important\n"
"security issue.\n"
-"When a lookup is done, the floodfill router will not forward the lookup to other peers,\n"
+"When a lookup is done, the floodfill router will not forward the lookup "
+"to other peers,\n"
"but will always answer by itself (if it has the requested data)."
msgstr ""
@@ -8523,8 +9728,8 @@ msgstr ""
#: i2p2www/pages/site/docs/how/tech-intro.html:357
msgid ""
-"A RouterInfo stores information on a specific I2P router and how to "
-"contact it"
+"A RouterInfo stores information on a specific I2P router and how "
+"to contact it"
msgstr ""
#: i2p2www/pages/site/docs/how/tech-intro.html:358
@@ -8535,10 +9740,14 @@ msgstr ""
#: i2p2www/pages/site/docs/how/tech-intro.html:360
msgid ""
-"All of this information is signed by the publishing party and verified by any I2P router using or storing the information.\n"
-"In addition, the data contains timing information, to avoid storage of old entries and possible attacks.\n"
-"This is also why I2P bundles the necessary code for maintaining the correct time, occasionally querying some SNTP servers \n"
-"(the pool.ntp.org round robin by default)\n"
+"All of this information is signed by the publishing party and verified by"
+" any I2P router using or storing the information.\n"
+"In addition, the data contains timing information, to avoid storage of "
+"old entries and possible attacks.\n"
+"This is also why I2P bundles the necessary code for maintaining the "
+"correct time, occasionally querying some SNTP servers \n"
+"(the pool.ntp.org round robin by"
+" default)\n"
"and detecting skew between routers at the transport layer."
msgstr ""
@@ -8553,8 +9762,10 @@ msgstr ""
#: i2p2www/pages/site/docs/how/tech-intro.html:374
msgid ""
"One could only want specific people to be able to reach a destination.\n"
-"This is possible by not publishing the destination in the netDb. You will however have to transmit the destination by other means.\n"
-"An alternative are the 'encrypted leaseSets'. These leaseSets can only be decoded by people with access to the decryption key."
+"This is possible by not publishing the destination in the netDb. You will"
+" however have to transmit the destination by other means.\n"
+"An alternative are the 'encrypted leaseSets'. These leaseSets can only be"
+" decoded by people with access to the decryption key."
msgstr ""
#: i2p2www/pages/site/docs/how/tech-intro.html:381
@@ -8563,10 +9774,13 @@ msgstr ""
#: i2p2www/pages/site/docs/how/tech-intro.html:382
msgid ""
-"Bootstrapping the netDb is quite simple. Once a router manages to receive a single routerInfo of a reachable peer,\n"
+"Bootstrapping the netDb is quite simple. Once a router manages to receive"
+" a single routerInfo of a reachable peer,\n"
"it can query that router for references to other routers in the network.\n"
-"Currently, a number of users post their routerInfo files to a website to make this information available.\n"
-"I2P automatically connects to one of these websites to gather routerInfo files and bootstrap."
+"Currently, a number of users post their routerInfo files to a website to "
+"make this information available.\n"
+"I2P automatically connects to one of these websites to gather routerInfo "
+"files and bootstrap."
msgstr ""
#: i2p2www/pages/site/docs/how/tech-intro.html:390
@@ -8576,18 +9790,26 @@ msgstr ""
#: i2p2www/pages/site/docs/how/tech-intro.html:391
msgid ""
"Lookups in the I2P network are not forwarded to other netDb routers.\n"
-"Currently, this is not a major problem, since the network is not very large.\n"
-"However, as the network grows, not all routerInfo and leaseSet files will be present\n"
-"on each netDb router. This will cause a deterioration of the percentage of successful lookups.\n"
-"Because of this, refinements to the netDb will be done in the next releases."
+"Currently, this is not a major problem, since the network is not very "
+"large.\n"
+"However, as the network grows, not all routerInfo and leaseSet files will"
+" be present\n"
+"on each netDb router. This will cause a deterioration of the percentage "
+"of successful lookups.\n"
+"Because of this, refinements to the netDb will be done in the next "
+"releases."
msgstr ""
#: i2p2www/pages/site/docs/how/tech-intro.html:402
msgid ""
-"Communication between routers needs to provide confidentiality and integrity \n"
-"against external adversaries while authenticating that the router contacted \n"
-"is the one who should receive a given message. The particulars of how routers \n"
-"communicate with other routers aren't critical - three separate protocols \n"
+"Communication between routers needs to provide confidentiality and "
+"integrity \n"
+"against external adversaries while authenticating that the router "
+"contacted \n"
+"is the one who should receive a given message. The particulars of how "
+"routers \n"
+"communicate with other routers aren't critical - three separate protocols"
+" \n"
"have been used at different points to provide those bare necessities."
msgstr ""
@@ -8595,9 +9817,12 @@ msgstr ""
#, python-format
msgid ""
"I2P started with a TCP-based protocol which \n"
-"has since been disabled. Then, to accommodate the need for high degree communication \n"
-"(as a number of routers will end up speaking with many others), I2P moved \n"
-"from a TCP based transport to a UDP-based one - \"Secure \n"
+"has since been disabled. Then, to accommodate the need for high degree "
+"communication \n"
+"(as a number of routers will end up speaking with many others), I2P moved"
+" \n"
+"from a TCP based transport to a UDP-based one - "
+"\"Secure \n"
"Semireliable UDP\", or \"SSU\"."
msgstr ""
@@ -8609,32 +9834,46 @@ msgstr ""
#: i2p2www/pages/site/docs/how/tech-intro.html:422
msgid ""
"The goal of this protocol is to provide secure, authenticated, \n"
-"semireliable and unordered message delivery, exposing only a minimal amount \n"
-"of data easily discernible to third parties. It should support high degree \n"
-"communication as well as TCP-friendly congestion control and may include \n"
-"PMTU detection. It should be capable of efficiently moving bulk data at rates \n"
-"sufficient for home users. In addition, it should support techniques for addressing \n"
+"semireliable and unordered message delivery, exposing only a minimal "
+"amount \n"
+"of data easily discernible to third parties. It should support high "
+"degree \n"
+"communication as well as TCP-friendly congestion control and may include"
+" \n"
+"PMTU detection. It should be capable of efficiently moving bulk data at "
+"rates \n"
+"sufficient for home users. In addition, it should support techniques for "
+"addressing \n"
"network obstacles, like most NATs or firewalls."
msgstr ""
#: i2p2www/pages/site/docs/how/tech-intro.html:432
#, python-format
msgid ""
-"Following the introduction of SSU, after issues with congestion collapse \n"
-"appeared, a new NIO-based TCP transport called NTCP \n"
-"was implemented. It is enabled by default for outbound connections only. Those \n"
-"who configure their NAT/firewall to allow inbound connections and specify \n"
-"the external host and port (dyndns/etc is ok) on /config.jsp can receive inbound \n"
-"connections. As NTCP is NIO based, so it doesn't suffer from the 1 thread \n"
+"Following the introduction of SSU, after issues with congestion collapse"
+" \n"
+"appeared, a new NIO-based TCP transport called NTCP \n"
+"was implemented. It is enabled by default for outbound connections only. "
+"Those \n"
+"who configure their NAT/firewall to allow inbound connections and specify"
+" \n"
+"the external host and port (dyndns/etc is ok) on /config.jsp can receive "
+"inbound \n"
+"connections. As NTCP is NIO based, so it doesn't suffer from the 1 thread"
+" \n"
"per connection issues of the old TCP transport."
msgstr ""
#: i2p2www/pages/site/docs/how/tech-intro.html:442
msgid ""
"I2P supports multiple transports simultaneously. A particular transport \n"
-"for an outbound connection is selected with \"bids\". Each transport bids for \n"
-"the connection and the relative value of these bids assigns the priority. \n"
-"Transports may reply with different bids, depending on whether there is already \n"
+"for an outbound connection is selected with \"bids\". Each transport bids"
+" for \n"
+"the connection and the relative value of these bids assigns the priority."
+" \n"
+"Transports may reply with different bids, depending on whether there is "
+"already \n"
"an established connection to the peer."
msgstr ""
@@ -8642,25 +9881,38 @@ msgstr ""
#, python-format
msgid ""
"The current implementation ranks NTCP as the highest-priority transport \n"
-"for outbound connections in most situations. SSU is enabled for both outbound \n"
-"and inbound connections. Your firewall and your I2P router must be configured \n"
-"to allow inbound NTCP connections. For further information see the NTCP \n"
+"for outbound connections in most situations. SSU is enabled for both "
+"outbound \n"
+"and inbound connections. Your firewall and your I2P router must be "
+"configured \n"
+"to allow inbound NTCP connections. For further information see the NTCP \n"
"page."
msgstr ""
#: i2p2www/pages/site/docs/how/tech-intro.html:459
msgid ""
"A bare minimum set of cryptographic primitives are combined together to \n"
-"provide I2P's layered defenses against a variety of adversaries. At the lowest \n"
-"level, inter router communication is protected by the transport layer security \n"
-"- SSU encrypts each packet with AES256/CBC with both an explicit IV and MAC \n"
-"(HMAC-MD5-128) after agreeing upon an ephemeral session key through a 2048bit \n"
-"Diffie-Hellman exchange, station-to-station authentication with the other \n"
-"router's DSA key, plus each network message has their own hash for local integrity \n"
-"checking. Tunnel messages passed over the transports \n"
-"have their own layered AES256/CBC encryption with an explicit IV and verified \n"
-"at the tunnel endpoint with an additional SHA256 hash. Various other messages \n"
-"are passed along inside \"garlic messages\", which are encrypted with ElGamal/AES+SessionTags \n"
+"provide I2P's layered defenses against a variety of adversaries. At the "
+"lowest \n"
+"level, inter router communication is protected by the transport layer "
+"security \n"
+"- SSU encrypts each packet with AES256/CBC with both an explicit IV and "
+"MAC \n"
+"(HMAC-MD5-128) after agreeing upon an ephemeral session key through a "
+"2048bit \n"
+"Diffie-Hellman exchange, station-to-station authentication with the other"
+" \n"
+"router's DSA key, plus each network message has their own hash for local "
+"integrity \n"
+"checking. Tunnel messages passed over the "
+"transports \n"
+"have their own layered AES256/CBC encryption with an explicit IV and "
+"verified \n"
+"at the tunnel endpoint with an additional SHA256 hash. Various other "
+"messages \n"
+"are passed along inside \"garlic messages\", which are encrypted with "
+"ElGamal/AES+SessionTags \n"
"(explained below)."
msgstr ""
@@ -8670,31 +9922,51 @@ msgstr ""
#: i2p2www/pages/site/docs/how/tech-intro.html:475
msgid ""
-"Garlic messages are an extension of \"onion\" layered encryption, allowing \n"
-"the contents of a single message to contain multiple \"cloves\" - fully formed \n"
-"messages alongside their own instructions for delivery. Messages are wrapped \n"
-"into a garlic message whenever the message would otherwise be passing in cleartext \n"
-"through a peer who should not have access to the information - for instance, \n"
-"when a router wants to ask another router to participate in a tunnel, they \n"
-"wrap the request inside a garlic, encrypt that garlic to the receiving router's \n"
-"2048bit ElGamal public key, and forward it through a tunnel. Another example \n"
-"is when a client wants to send a message to a destination - the sender's router \n"
-"will wrap up that data message (alongside some other messages) into a garlic, \n"
-"encrypt that garlic to the 2048bit ElGamal public key published in the recipient's \n"
+"Garlic messages are an extension of \"onion\" layered encryption, "
+"allowing \n"
+"the contents of a single message to contain multiple \"cloves\" - fully "
+"formed \n"
+"messages alongside their own instructions for delivery. Messages are "
+"wrapped \n"
+"into a garlic message whenever the message would otherwise be passing in "
+"cleartext \n"
+"through a peer who should not have access to the information - for "
+"instance, \n"
+"when a router wants to ask another router to participate in a tunnel, "
+"they \n"
+"wrap the request inside a garlic, encrypt that garlic to the receiving "
+"router's \n"
+"2048bit ElGamal public key, and forward it through a tunnel. Another "
+"example \n"
+"is when a client wants to send a message to a destination - the sender's "
+"router \n"
+"will wrap up that data message (alongside some other messages) into a "
+"garlic, \n"
+"encrypt that garlic to the 2048bit ElGamal public key published in the "
+"recipient's \n"
"leaseSet, and forward it through the appropriate tunnels."
msgstr ""
#: i2p2www/pages/site/docs/how/tech-intro.html:490
msgid ""
-"The \"instructions\" attached to each clove inside the encryption layer includes \n"
-"the ability to request that the clove be forwarded locally, to a remote router, \n"
-"or to a remote tunnel on a remote router. There are fields in those instructions \n"
-"allowing a peer to request that the delivery be delayed until a certain time \n"
-"or condition has been met, though they won't be honored until the nontrivial \n"
-"delays are deployed. It is possible to explicitly route garlic messages \n"
-"any number of hops without building tunnels, or even to reroute tunnel messages \n"
-"by wrapping them in garlic messages and forwarding them a number of hops prior \n"
-"to delivering them to the next hop in the tunnel, but those techniques are \n"
+"The \"instructions\" attached to each clove inside the encryption layer "
+"includes \n"
+"the ability to request that the clove be forwarded locally, to a remote "
+"router, \n"
+"or to a remote tunnel on a remote router. There are fields in those "
+"instructions \n"
+"allowing a peer to request that the delivery be delayed until a certain "
+"time \n"
+"or condition has been met, though they won't be honored until the nontrivial \n"
+"delays are deployed. It is possible to explicitly route garlic "
+"messages \n"
+"any number of hops without building tunnels, or even to reroute tunnel "
+"messages \n"
+"by wrapping them in garlic messages and forwarding them a number of hops "
+"prior \n"
+"to delivering them to the next hop in the tunnel, but those techniques "
+"are \n"
"not currently used in the existing implementation."
msgstr ""
@@ -8704,35 +9976,54 @@ msgstr ""
#: i2p2www/pages/site/docs/how/tech-intro.html:504
msgid ""
-"As an unreliable, unordered, message based system, I2P uses a simple combination \n"
-"of asymmetric and symmetric encryption algorithms to provide data confidentiality \n"
-"and integrity to garlic messages. As a whole, the combination is referred \n"
-"to as ElGamal/AES+SessionTags, but that is an excessively verbose way to describe \n"
+"As an unreliable, unordered, message based system, I2P uses a simple "
+"combination \n"
+"of asymmetric and symmetric encryption algorithms to provide data "
+"confidentiality \n"
+"and integrity to garlic messages. As a whole, the combination is referred"
+" \n"
+"to as ElGamal/AES+SessionTags, but that is an excessively verbose way to "
+"describe \n"
"the simple use of 2048bit ElGamal, AES256, SHA256 and 32 byte nonces."
msgstr ""
#: i2p2www/pages/site/docs/how/tech-intro.html:543
msgid ""
-"Session tags themselves have a very short lifetime, after which they are \n"
-"discarded if not used. In addition, the quantity stored for each key is limited, \n"
-"as are the number of keys themselves - if too many arrive, either new or old \n"
-"messages may be dropped. The sender keeps track whether messages using session \n"
-"tags are getting through, and if there isn't sufficient communication it may \n"
-"drop the ones previously assumed to be properly delivered, reverting back \n"
+"Session tags themselves have a very short lifetime, after which they are"
+" \n"
+"discarded if not used. In addition, the quantity stored for each key is "
+"limited, \n"
+"as are the number of keys themselves - if too many arrive, either new or "
+"old \n"
+"messages may be dropped. The sender keeps track whether messages using "
+"session \n"
+"tags are getting through, and if there isn't sufficient communication it "
+"may \n"
+"drop the ones previously assumed to be properly delivered, reverting back"
+" \n"
"to the full expensive ElGamal encryption."
msgstr ""
#: i2p2www/pages/site/docs/how/tech-intro.html:553
msgid ""
-"One alternative is to transmit only a single session tag, and from that, \n"
-"seed a deterministic PRNG for determining what tags to use or expect. By keeping \n"
-"this PRNG roughly synchronized between the sender and recipient (the recipient \n"
-"precomputes a window of the next e.g. 50 tags), the overhead of periodically \n"
-"bundling a large number of tags is removed, allowing more options in the space/time \n"
-"tradeoff, and perhaps reducing the number of ElGamal encryptions necessary. \n"
-"However, it would depend upon the strength of the PRNG to provide the necessary \n"
-"cover against internal adversaries, though perhaps by limiting the amount \n"
-"of times each PRNG is used, any weaknesses can be minimized. At the moment, \n"
+"One alternative is to transmit only a single session tag, and from that,"
+" \n"
+"seed a deterministic PRNG for determining what tags to use or expect. By "
+"keeping \n"
+"this PRNG roughly synchronized between the sender and recipient (the "
+"recipient \n"
+"precomputes a window of the next e.g. 50 tags), the overhead of "
+"periodically \n"
+"bundling a large number of tags is removed, allowing more options in the "
+"space/time \n"
+"tradeoff, and perhaps reducing the number of ElGamal encryptions "
+"necessary. \n"
+"However, it would depend upon the strength of the PRNG to provide the "
+"necessary \n"
+"cover against internal adversaries, though perhaps by limiting the amount"
+" \n"
+"of times each PRNG is used, any weaknesses can be minimized. At the "
+"moment, \n"
"there are no immediate plans to move towards these synchronized PRNGs."
msgstr ""
@@ -8742,9 +10033,12 @@ msgstr "Futuro"
#: i2p2www/pages/site/docs/how/tech-intro.html:567
msgid ""
-"While I2P is currently functional and sufficient for many scenarios, there \n"
-"are several areas which require further improvement to meet the needs of those \n"
-"facing more powerful adversaries as well as substantial user experience optimization."
+"While I2P is currently functional and sufficient for many scenarios, "
+"there \n"
+"are several areas which require further improvement to meet the needs of "
+"those \n"
+"facing more powerful adversaries as well as substantial user experience "
+"optimization."
msgstr ""
#: i2p2www/pages/site/docs/how/tech-intro.html:573
@@ -8753,64 +10047,106 @@ msgstr ""
#: i2p2www/pages/site/docs/how/tech-intro.html:574
msgid ""
-"I2P is an overlay network designed to be run on top of a functional packet \n"
-"switched network, exploiting the end to end principle to offer anonymity and \n"
-"security. While the Internet no longer fully embraces the end to end principle\n"
+"I2P is an overlay network designed to be run on top of a functional "
+"packet \n"
+"switched network, exploiting the end to end principle to offer anonymity "
+"and \n"
+"security. While the Internet no longer fully embraces the end to end "
+"principle\n"
"(due to the usage of NAT), \n"
-"I2P does require a substantial portion of the network to be reachable - there \n"
-"may be a number of peers along the edges running using restricted routes, \n"
-"but I2P does not include an appropriate routing algorithm for the degenerate \n"
-"case where most peers are unreachable. It would, however work on top of a \n"
+"I2P does require a substantial portion of the network to be reachable - "
+"there \n"
+"may be a number of peers along the edges running using restricted routes,"
+" \n"
+"but I2P does not include an appropriate routing algorithm for the "
+"degenerate \n"
+"case where most peers are unreachable. It would, however work on top of a"
+" \n"
"network employing such an algorithm."
msgstr ""
#: i2p2www/pages/site/docs/how/tech-intro.html:586
msgid ""
-"Restricted route operation, where there are limits to what peers are reachable \n"
-"directly, has several different functional and anonymity implications, dependent \n"
-"upon how the restricted routes are handled. At the most basic level, restricted \n"
-"routes exist when a peer is behind a NAT or firewall which does not allow \n"
-"inbound connections. This was largely addressed in I2P 0.6.0.6 by integrating \n"
-"distributed hole punching into the transport layer, allowing people behind \n"
-"most NATs and firewalls to receive unsolicited connections without any configuration. \n"
-"However, this does not limit the exposure of the peer's IP address to routers \n"
-"inside the network, as they can simply get introduced to the peer through \n"
+"Restricted route operation, where there are limits to what peers are "
+"reachable \n"
+"directly, has several different functional and anonymity implications, "
+"dependent \n"
+"upon how the restricted routes are handled. At the most basic level, "
+"restricted \n"
+"routes exist when a peer is behind a NAT or firewall which does not allow"
+" \n"
+"inbound connections. This was largely addressed in I2P 0.6.0.6 by "
+"integrating \n"
+"distributed hole punching into the transport layer, allowing people "
+"behind \n"
+"most NATs and firewalls to receive unsolicited connections without any "
+"configuration. \n"
+"However, this does not limit the exposure of the peer's IP address to "
+"routers \n"
+"inside the network, as they can simply get introduced to the peer through"
+" \n"
"the published introducer."
msgstr ""
#: i2p2www/pages/site/docs/how/tech-intro.html:599
msgid ""
-"Beyond the functional handling of restricted routes, there are two levels \n"
-"of restricted operation that can be used to limit the exposure of one's IP \n"
-"address - using router-specific tunnels for communication, and offering 'client \n"
-"routers'. For the former, routers can either build a new pool of tunnels or \n"
-"reuse their exploratory pool, publishing the inbound gateways to some of them \n"
-"as part of their routerInfo in place of their transport addresses. When a \n"
-"peer wants to get in touch with them, they see those tunnel gateways in the \n"
-"netDb and simply send the relevant message to them through one of the published \n"
-"tunnels. If the peer behind the restricted route wants to reply, it may do \n"
-"so either directly (if they are willing to expose their IP to the peer) or \n"
-"indirectly through their outbound tunnels. When the routers that the peer \n"
-"has direct connections to want to reach it (to forward tunnel messages, for \n"
-"instance), they simply prioritize their direct connection over the published \n"
-"tunnel gateway. The concept of 'client routers' simply extends the restricted \n"
-"route by not publishing any router addresses. Such a router would not even \n"
-"need to publish their routerInfo in the netDb, merely providing their self \n"
-"signed routerInfo to the peers that it contacts (necessary to pass the router's \n"
-"public keys). Both levels of restricted route operation are planned for I2P \n"
+"Beyond the functional handling of restricted routes, there are two levels"
+" \n"
+"of restricted operation that can be used to limit the exposure of one's "
+"IP \n"
+"address - using router-specific tunnels for communication, and offering "
+"'client \n"
+"routers'. For the former, routers can either build a new pool of tunnels "
+"or \n"
+"reuse their exploratory pool, publishing the inbound gateways to some of "
+"them \n"
+"as part of their routerInfo in place of their transport addresses. When a"
+" \n"
+"peer wants to get in touch with them, they see those tunnel gateways in "
+"the \n"
+"netDb and simply send the relevant message to them through one of the "
+"published \n"
+"tunnels. If the peer behind the restricted route wants to reply, it may "
+"do \n"
+"so either directly (if they are willing to expose their IP to the peer) "
+"or \n"
+"indirectly through their outbound tunnels. When the routers that the peer"
+" \n"
+"has direct connections to want to reach it (to forward tunnel messages, "
+"for \n"
+"instance), they simply prioritize their direct connection over the "
+"published \n"
+"tunnel gateway. The concept of 'client routers' simply extends the "
+"restricted \n"
+"route by not publishing any router addresses. Such a router would not "
+"even \n"
+"need to publish their routerInfo in the netDb, merely providing their "
+"self \n"
+"signed routerInfo to the peers that it contacts (necessary to pass the "
+"router's \n"
+"public keys). Both levels of restricted route operation are planned for "
+"I2P \n"
"2.0."
msgstr ""
#: i2p2www/pages/site/docs/how/tech-intro.html:621
msgid ""
-"There are tradeoffs for those behind restricted routes, as they would likely \n"
-"participate in other people's tunnels less frequently, and the routers which \n"
-"they are connected to would be able to infer traffic patterns that would not \n"
-"otherwise be exposed. On the other hand, if the cost of that exposure is less \n"
-"than the cost of an IP being made available, it may be worthwhile. This, of \n"
-"course, assumes that the peers that the router behind a restricted route contacts \n"
-"are not hostile - either the network is large enough that the probability \n"
-"of using a hostile peer to get connected is small enough, or trusted (and \n"
+"There are tradeoffs for those behind restricted routes, as they would "
+"likely \n"
+"participate in other people's tunnels less frequently, and the routers "
+"which \n"
+"they are connected to would be able to infer traffic patterns that would "
+"not \n"
+"otherwise be exposed. On the other hand, if the cost of that exposure is "
+"less \n"
+"than the cost of an IP being made available, it may be worthwhile. This, "
+"of \n"
+"course, assumes that the peers that the router behind a restricted route "
+"contacts \n"
+"are not hostile - either the network is large enough that the probability"
+" \n"
+"of using a hostile peer to get connected is small enough, or trusted (and"
+" \n"
"perhaps temporary) peers are used instead."
msgstr ""
@@ -8820,28 +10156,45 @@ msgstr ""
#: i2p2www/pages/site/docs/how/tech-intro.html:634
msgid ""
-"Even though the bulk of I2P's initial efforts have been on low latency communication, \n"
-"it was designed with variable latency services in mind from the beginning. \n"
-"At the most basic level, applications running on top of I2P can offer the \n"
-"anonymity of medium and high latency communication while still blending their \n"
-"traffic patterns in with low latency traffic. Internally though, I2P can offer \n"
-"its own medium and high latency communication through the garlic encryption \n"
-"- specifying that the message should be sent after a certain delay, at a certain \n"
-"time, after a certain number of messages have passed, or another mix strategy. \n"
-"With the layered encryption, only the router that the clove exposed the delay \n"
-"request would know that the message requires high latency, allowing the traffic \n"
-"to blend in further with the low latency traffic. Once the transmission precondition \n"
-"is met, the router holding on to the clove (which itself would likely be a \n"
-"garlic message) simply forwards it as requested - to a router, to a tunnel, \n"
+"Even though the bulk of I2P's initial efforts have been on low latency "
+"communication, \n"
+"it was designed with variable latency services in mind from the "
+"beginning. \n"
+"At the most basic level, applications running on top of I2P can offer the"
+" \n"
+"anonymity of medium and high latency communication while still blending "
+"their \n"
+"traffic patterns in with low latency traffic. Internally though, I2P can "
+"offer \n"
+"its own medium and high latency communication through the garlic "
+"encryption \n"
+"- specifying that the message should be sent after a certain delay, at a "
+"certain \n"
+"time, after a certain number of messages have passed, or another mix "
+"strategy. \n"
+"With the layered encryption, only the router that the clove exposed the "
+"delay \n"
+"request would know that the message requires high latency, allowing the "
+"traffic \n"
+"to blend in further with the low latency traffic. Once the transmission "
+"precondition \n"
+"is met, the router holding on to the clove (which itself would likely be "
+"a \n"
+"garlic message) simply forwards it as requested - to a router, to a "
+"tunnel, \n"
"or, most likely, to a remote client destination."
msgstr ""
#: i2p2www/pages/site/docs/how/tech-intro.html:651
msgid ""
-"There are a substantial number of ways to exploit this capacity for high \n"
-"latency comm in I2P, but for the moment, doing so has been scheduled for the \n"
-"I2P 3.0 release. In the meantime, those requiring the anonymity that high \n"
-"latency comm can offer should look towards the application layer to provide \n"
+"There are a substantial number of ways to exploit this capacity for high"
+" \n"
+"latency comm in I2P, but for the moment, doing so has been scheduled for "
+"the \n"
+"I2P 3.0 release. In the meantime, those requiring the anonymity that high"
+" \n"
+"latency comm can offer should look towards the application layer to "
+"provide \n"
"it."
msgstr ""
@@ -8875,12 +10228,18 @@ msgstr "Sistemi similari"
#: i2p2www/pages/site/docs/how/tech-intro.html:669
msgid ""
-"I2P's architecture builds on the concepts of message oriented middleware, \n"
-"the topology of DHTs, the anonymity and cryptography of free route mixnets, \n"
-"and the adaptability of packet switched networking. The value comes not from \n"
-"novel concepts of algorithms though, but from careful engineering combining \n"
-"the research results of existing systems and papers. While there are a few \n"
-"similar efforts worth reviewing, both for technical and functional comparisons, \n"
+"I2P's architecture builds on the concepts of message oriented middleware,"
+" \n"
+"the topology of DHTs, the anonymity and cryptography of free route "
+"mixnets, \n"
+"and the adaptability of packet switched networking. The value comes not "
+"from \n"
+"novel concepts of algorithms though, but from careful engineering "
+"combining \n"
+"the research results of existing systems and papers. While there are a "
+"few \n"
+"similar efforts worth reviewing, both for technical and functional "
+"comparisons, \n"
"two in particular are pulled out here - Tor and Freenet."
msgstr ""
@@ -8897,127 +10256,209 @@ msgstr "sito web"
#: i2p2www/pages/site/docs/how/tech-intro.html:686
msgid ""
"At first glance, Tor and I2P have many functional and anonymity related \n"
-"similarities. While I2P's development began before we were aware of the early \n"
-"stage efforts on Tor, many of the lessons of the original onion routing and \n"
-"ZKS efforts were integrated into I2P's design. Rather than building an essentially \n"
-"trusted, centralized system with directory servers, I2P has a self organizing \n"
-"network database with each peer taking on the responsibility of profiling \n"
-"other routers to determine how best to exploit available resources. Another \n"
-"key difference is that while both I2P and Tor use layered and ordered paths \n"
-"(tunnels and circuits/streams), I2P is fundamentally a packet switched network, \n"
-"while Tor is fundamentally a circuit switched one, allowing I2P to transparently \n"
-"route around congestion or other network failures, operate redundant pathways, \n"
-"and load balance the data across available resources. While Tor offers the \n"
-"useful outproxy functionality by offering integrated outproxy discovery and \n"
-"selection, I2P leaves such application layer decisions up to applications \n"
-"running on top of I2P - in fact, I2P has even externalized the TCP-like streaming \n"
-"library itself to the application layer, allowing developers to experiment \n"
-"with different strategies, exploiting their domain specific knowledge to offer \n"
+"similarities. While I2P's development began before we were aware of the "
+"early \n"
+"stage efforts on Tor, many of the lessons of the original onion routing "
+"and \n"
+"ZKS efforts were integrated into I2P's design. Rather than building an "
+"essentially \n"
+"trusted, centralized system with directory servers, I2P has a self "
+"organizing \n"
+"network database with each peer taking on the responsibility of profiling"
+" \n"
+"other routers to determine how best to exploit available resources. "
+"Another \n"
+"key difference is that while both I2P and Tor use layered and ordered "
+"paths \n"
+"(tunnels and circuits/streams), I2P is fundamentally a packet switched "
+"network, \n"
+"while Tor is fundamentally a circuit switched one, allowing I2P to "
+"transparently \n"
+"route around congestion or other network failures, operate redundant "
+"pathways, \n"
+"and load balance the data across available resources. While Tor offers "
+"the \n"
+"useful outproxy functionality by offering integrated outproxy discovery "
+"and \n"
+"selection, I2P leaves such application layer decisions up to applications"
+" \n"
+"running on top of I2P - in fact, I2P has even externalized the TCP-like "
+"streaming \n"
+"library itself to the application layer, allowing developers to "
+"experiment \n"
+"with different strategies, exploiting their domain specific knowledge to "
+"offer \n"
"better performance."
msgstr ""
#: i2p2www/pages/site/docs/how/tech-intro.html:707
msgid ""
-"From an anonymity perspective, there is much similarity when the core networks \n"
-"are compared. However, there are a few key differences. When dealing with \n"
-"an internal adversary or most external adversaries, I2P's simplex tunnels \n"
-"expose half as much traffic data than would be exposed with Tor's duplex circuits \n"
-"by simply looking at the flows themselves - an HTTP request and response would \n"
-"follow the same path in Tor, while in I2P the packets making up the request \n"
-"would go out through one or more outbound tunnels and the packets making up \n"
-"the response would come back through one or more different inbound tunnels. \n"
-"While I2P's peer selection and ordering strategies should sufficiently address \n"
-"predecessor attacks, should a switch to bidirectional tunnels be necessary,\n"
-"we could simply build an inbound and outbound tunnel along the same routers."
+"From an anonymity perspective, there is much similarity when the core "
+"networks \n"
+"are compared. However, there are a few key differences. When dealing with"
+" \n"
+"an internal adversary or most external adversaries, I2P's simplex tunnels"
+" \n"
+"expose half as much traffic data than would be exposed with Tor's duplex "
+"circuits \n"
+"by simply looking at the flows themselves - an HTTP request and response "
+"would \n"
+"follow the same path in Tor, while in I2P the packets making up the "
+"request \n"
+"would go out through one or more outbound tunnels and the packets making "
+"up \n"
+"the response would come back through one or more different inbound "
+"tunnels. \n"
+"While I2P's peer selection and ordering strategies should sufficiently "
+"address \n"
+"predecessor attacks, should a switch to bidirectional tunnels be "
+"necessary,\n"
+"we could simply build an inbound and outbound tunnel along the same "
+"routers."
msgstr ""
#: i2p2www/pages/site/docs/how/tech-intro.html:721
msgid ""
-"Another anonymity issue comes up in Tor's use of telescopic tunnel creation, \n"
-"as simple packet counting and timing measurements as the cells in a circuit \n"
-"pass through an adversary's node exposes statistical information regarding \n"
-"where the adversary is within the circuit. I2P's unidirectional tunnel creation \n"
-"with a single message so that this data is not exposed. Protecting the position \n"
-"in a tunnel is important, as an adversary would otherwise be able to mount \n"
-"a series of powerful predecessor, intersection, and traffic confirmation attacks."
+"Another anonymity issue comes up in Tor's use of telescopic tunnel "
+"creation, \n"
+"as simple packet counting and timing measurements as the cells in a "
+"circuit \n"
+"pass through an adversary's node exposes statistical information "
+"regarding \n"
+"where the adversary is within the circuit. I2P's unidirectional tunnel "
+"creation \n"
+"with a single message so that this data is not exposed. Protecting the "
+"position \n"
+"in a tunnel is important, as an adversary would otherwise be able to "
+"mount \n"
+"a series of powerful predecessor, intersection, and traffic confirmation "
+"attacks."
msgstr ""
#: i2p2www/pages/site/docs/how/tech-intro.html:731
msgid ""
-"Tor's support for a second tier of \"onion proxies\" does offer a non-trivial \n"
-"degree of anonymity while requiring a low cost of entry, while I2P will not \n"
+"Tor's support for a second tier of \"onion proxies\" does offer a non-"
+"trivial \n"
+"degree of anonymity while requiring a low cost of entry, while I2P will "
+"not \n"
"offer this topology until 2.0."
msgstr ""
#: i2p2www/pages/site/docs/how/tech-intro.html:737
msgid ""
-"On the whole, Tor and I2P complement each other in their focus - Tor works \n"
-"towards offering high speed anonymous Internet outproxying, while I2P works \n"
-"towards offering a decentralized resilient network in itself. In theory, both \n"
-"can be used to achieve both purposes, but given limited development resources, \n"
-"they both have their strengths and weaknesses. The I2P developers have considered \n"
-"the steps necessary to modify Tor to take advantage of I2P's design, but concerns \n"
-"of Tor's viability under resource scarcity suggest that I2P's packet switching \n"
+"On the whole, Tor and I2P complement each other in their focus - Tor "
+"works \n"
+"towards offering high speed anonymous Internet outproxying, while I2P "
+"works \n"
+"towards offering a decentralized resilient network in itself. In theory, "
+"both \n"
+"can be used to achieve both purposes, but given limited development "
+"resources, \n"
+"they both have their strengths and weaknesses. The I2P developers have "
+"considered \n"
+"the steps necessary to modify Tor to take advantage of I2P's design, but "
+"concerns \n"
+"of Tor's viability under resource scarcity suggest that I2P's packet "
+"switching \n"
"architecture will be able to exploit scarce resources more effectively."
msgstr ""
#: i2p2www/pages/site/docs/how/tech-intro.html:751
msgid ""
-"Freenet played a large part in the initial stages of I2P's design - giving \n"
-"proof to the viability of a vibrant pseudonymous community completely contained \n"
-"within the network, demonstrating that the dangers inherent in outproxies \n"
-"could be avoided. The first seed of I2P began as a replacement communication \n"
-"layer for Freenet, attempting to factor out the complexities of a scalable, \n"
-"anonymous and secure point to point communication from the complexities of \n"
-"a censorship resistant distributed data store. Over time however, some of \n"
-"the anonymity and scalability issues inherent in Freenet's algorithms made \n"
-"it clear that I2P's focus should stay strictly on providing a generic anonymous \n"
-"communication layer, rather than as a component of Freenet. Over the years, \n"
-"the Freenet developers have come to see the weaknesses in the older design, \n"
-"prompting them to suggest that they will require a \"premix\" layer to offer \n"
-"substantial anonymity. In other words, Freenet needs to run on top of a mixnet \n"
-"such as I2P or Tor, with \"client nodes\" requesting and publishing data through \n"
-"the mixnet to the \"server nodes\" which then fetch and store the data according \n"
+"Freenet played a large part in the initial stages of I2P's design - "
+"giving \n"
+"proof to the viability of a vibrant pseudonymous community completely "
+"contained \n"
+"within the network, demonstrating that the dangers inherent in outproxies"
+" \n"
+"could be avoided. The first seed of I2P began as a replacement "
+"communication \n"
+"layer for Freenet, attempting to factor out the complexities of a "
+"scalable, \n"
+"anonymous and secure point to point communication from the complexities "
+"of \n"
+"a censorship resistant distributed data store. Over time however, some of"
+" \n"
+"the anonymity and scalability issues inherent in Freenet's algorithms "
+"made \n"
+"it clear that I2P's focus should stay strictly on providing a generic "
+"anonymous \n"
+"communication layer, rather than as a component of Freenet. Over the "
+"years, \n"
+"the Freenet developers have come to see the weaknesses in the older "
+"design, \n"
+"prompting them to suggest that they will require a \"premix\" layer to "
+"offer \n"
+"substantial anonymity. In other words, Freenet needs to run on top of a "
+"mixnet \n"
+"such as I2P or Tor, with \"client nodes\" requesting and publishing data "
+"through \n"
+"the mixnet to the \"server nodes\" which then fetch and store the data "
+"according \n"
"to Freenet's heuristic distributed data storage algorithms."
msgstr ""
#: i2p2www/pages/site/docs/how/tech-intro.html:770
msgid ""
-"Freenet's functionality is very complementary to I2P's, as Freenet natively \n"
-"provides many of the tools for operating medium and high latency systems, \n"
-"while I2P natively provides the low latency mix network suitable for offering \n"
-"adequate anonymity. The logic of separating the mixnet from the censorship-\n"
-"resistant distributed data store still seems self-evident from an engineering, \n"
-"anonymity, security, and resource allocation perspective, so hopefully the \n"
-"Freenet team will pursue efforts in that direction, if not simply reusing \n"
+"Freenet's functionality is very complementary to I2P's, as Freenet "
+"natively \n"
+"provides many of the tools for operating medium and high latency systems,"
+" \n"
+"while I2P natively provides the low latency mix network suitable for "
+"offering \n"
+"adequate anonymity. The logic of separating the mixnet from the "
+"censorship-\n"
+"resistant distributed data store still seems self-evident from an "
+"engineering, \n"
+"anonymity, security, and resource allocation perspective, so hopefully "
+"the \n"
+"Freenet team will pursue efforts in that direction, if not simply reusing"
+" \n"
"(or helping to improve, as necessary) existing mixnets like I2P or Tor."
msgstr ""
#: i2p2www/pages/site/docs/how/tech-intro.html:781
msgid ""
"It is worth mentioning that there has recently been discussion and work \n"
-"by the Freenet developers on a \"globally scalable darknet\" using restricted \n"
-"routes between peers of various trust. While insufficient information has \n"
-"been made publicly available regarding how such a system would operate for \n"
-"a full review, from what has been said the anonymity and scalability claims \n"
-"seem highly dubious. In particular, the appropriateness for use in hostile \n"
-"regimes against state level adversaries has been tremendously overstated, \n"
-"and any analysis on the implications of resource scarcity upon the scalability \n"
-"of the network has seemingly been avoided. Further questions regarding susceptibility \n"
-"to traffic analysis, trust and other topics do exist, but a more in-depth \n"
-"review of this \"globally scalable darknet\" will have to wait until the Freenet \n"
+"by the Freenet developers on a \"globally scalable darknet\" using "
+"restricted \n"
+"routes between peers of various trust. While insufficient information has"
+" \n"
+"been made publicly available regarding how such a system would operate "
+"for \n"
+"a full review, from what has been said the anonymity and scalability "
+"claims \n"
+"seem highly dubious. In particular, the appropriateness for use in "
+"hostile \n"
+"regimes against state level adversaries has been tremendously overstated,"
+" \n"
+"and any analysis on the implications of resource scarcity upon the "
+"scalability \n"
+"of the network has seemingly been avoided. Further questions regarding "
+"susceptibility \n"
+"to traffic analysis, trust and other topics do exist, but a more in-depth"
+" \n"
+"review of this \"globally scalable darknet\" will have to wait until the "
+"Freenet \n"
"team makes more information available."
msgstr ""
#: i2p2www/pages/site/docs/how/tech-intro.html:797
msgid ""
-"I2P itself doesn't really do much - it simply sends messages to remote destinations \n"
-"and receives messages targeting local destinations - most of the interesting \n"
-"work goes on at the layers above it. By itself, I2P could be seen as an anonymous \n"
-"and secure IP layer, and the bundled streaming library \n"
-"as an implementation of an anonymous and secure TCP layer on top of it. Beyond \n"
-"that, I2PTunnel exposes a generic TCP proxying \n"
-"system for either getting into or out of the I2P network, plus a variety of \n"
+"I2P itself doesn't really do much - it simply sends messages to remote "
+"destinations \n"
+"and receives messages targeting local destinations - most of the "
+"interesting \n"
+"work goes on at the layers above it. By itself, I2P could be seen as an "
+"anonymous \n"
+"and secure IP layer, and the bundled streaming"
+" library \n"
+"as an implementation of an anonymous and secure TCP layer on top of it. "
+"Beyond \n"
+"that, I2PTunnel exposes a generic TCP "
+"proxying \n"
+"system for either getting into or out of the I2P network, plus a variety "
+"of \n"
"network applications provide further functionality for end users."
msgstr ""
@@ -9027,34 +10468,51 @@ msgstr ""
#: i2p2www/pages/site/docs/how/tech-intro.html:809
msgid ""
-"The I2P streaming library can be viewed as a generic streaming interface (mirroring TCP sockets),\n"
-"and the implementation supports a sliding window protocol\n"
-"with several optimizations, to take into account the high delay over I2P.\n"
+"The I2P streaming library can be viewed as a generic streaming interface "
+"(mirroring TCP sockets),\n"
+"and the implementation supports a sliding "
+"window protocol\n"
+"with several optimizations, to take into account the high delay over I2P."
+"\n"
"Individual streams may adjust the maximum packet size and \n"
-"other options, though the default of 4KB compressed seems a reasonable tradeoff \n"
-"between the bandwidth costs of retransmitting lost messages and the latency \n"
+"other options, though the default of 4KB compressed seems a reasonable "
+"tradeoff \n"
+"between the bandwidth costs of retransmitting lost messages and the "
+"latency \n"
"of multiple messages."
msgstr ""
#: i2p2www/pages/site/docs/how/tech-intro.html:819
msgid ""
"In addition, in consideration of the relatively high cost of subsequent \n"
-"messages, the streaming library's protocol for scheduling and delivering messages \n"
-"has been optimized to allow individual messages passed to contain as much \n"
-"information as is available. For instance, a small HTTP transaction proxied \n"
-"through the streaming library can be completed in a single round trip - the \n"
-"first message bundles a SYN, FIN and the small payload (an HTTP request typically \n"
-"fits) and the reply bundles the SYN, FIN, ACK and the small payload (many \n"
-"HTTP responses fit). While an additional ACK must be transmitted to tell the \n"
-"HTTP server that the SYN/FIN/ACK has been received, the local HTTP proxy can \n"
+"messages, the streaming library's protocol for scheduling and delivering "
+"messages \n"
+"has been optimized to allow individual messages passed to contain as much"
+" \n"
+"information as is available. For instance, a small HTTP transaction "
+"proxied \n"
+"through the streaming library can be completed in a single round trip - "
+"the \n"
+"first message bundles a SYN, FIN and the small payload (an HTTP request "
+"typically \n"
+"fits) and the reply bundles the SYN, FIN, ACK and the small payload (many"
+" \n"
+"HTTP responses fit). While an additional ACK must be transmitted to tell "
+"the \n"
+"HTTP server that the SYN/FIN/ACK has been received, the local HTTP proxy "
+"can \n"
"deliver the full response to the browser immediately."
msgstr ""
#: i2p2www/pages/site/docs/how/tech-intro.html:832
msgid ""
-"On the whole, however, the streaming library bears much resemblance to an \n"
-"abstraction of TCP, with its sliding windows, congestion control algorithms \n"
-"(both slow start and congestion avoidance), and general packet behavior (ACK, \n"
+"On the whole, however, the streaming library bears much resemblance to an"
+" \n"
+"abstraction of TCP, with its sliding windows, congestion control "
+"algorithms \n"
+"(both slow start and congestion avoidance), and general packet behavior "
+"(ACK, \n"
"SYN, FIN, RST, etc)."
msgstr ""
@@ -9084,142 +10542,227 @@ msgstr ""
#: i2p2www/pages/site/docs/how/tech-intro.html:846
msgid ""
-"Naming within I2P has been an oft-debated topic since the very beginning \n"
-"with advocates across the spectrum of possibilities. However, given I2P's \n"
-"inherent demand for secure communication and decentralized operation, the \n"
-"traditional DNS-style naming system is clearly out, as are \"majority rules\" \n"
-"voting systems. Instead, I2P ships with a generic naming library and a base \n"
-"implementation designed to work off a local name to destination mapping, as \n"
-"well as an optional add-on application called the \"addressbook\". The addressbook \n"
-"is a web-of-trust-driven secure, distributed, and human readable naming system, \n"
-"sacrificing only the call for all human readable names to be globally unique \n"
-"by mandating only local uniqueness. While all messages in I2P are cryptographically \n"
-"addressed by their destination, different people can have local addressbook \n"
-"entries for \"Alice\" which refer to different destinations. People can still \n"
-"discover new names by importing published addressbooks of peers specified \n"
-"in their web of trust, by adding in the entries provided through a third party, \n"
-"or (if some people organize a series of published addressbooks using a first \n"
-"come first serve registration system) people can choose to treat these addressbooks \n"
+"Naming within I2P has been an oft-debated topic since the very beginning"
+" \n"
+"with advocates across the spectrum of possibilities. However, given I2P's"
+" \n"
+"inherent demand for secure communication and decentralized operation, the"
+" \n"
+"traditional DNS-style naming system is clearly out, as are \"majority "
+"rules\" \n"
+"voting systems. Instead, I2P ships with a generic naming library and a "
+"base \n"
+"implementation designed to work off a local name to destination mapping, "
+"as \n"
+"well as an optional add-on application called the \"addressbook\". The "
+"addressbook \n"
+"is a web-of-trust-driven secure, distributed, and human readable naming "
+"system, \n"
+"sacrificing only the call for all human readable names to be globally "
+"unique \n"
+"by mandating only local uniqueness. While all messages in I2P are "
+"cryptographically \n"
+"addressed by their destination, different people can have local "
+"addressbook \n"
+"entries for \"Alice\" which refer to different destinations. People can "
+"still \n"
+"discover new names by importing published addressbooks of peers specified"
+" \n"
+"in their web of trust, by adding in the entries provided through a third "
+"party, \n"
+"or (if some people organize a series of published addressbooks using a "
+"first \n"
+"come first serve registration system) people can choose to treat these "
+"addressbooks \n"
"as name servers, emulating traditional DNS."
msgstr ""
#: i2p2www/pages/site/docs/how/tech-intro.html:866
msgid ""
"I2P does not promote the use of DNS-like services though, as the damage \n"
-"done by hijacking a site can be tremendous - and insecure destinations have \n"
-"no value. DNSsec itself still falls back on registrars and certificate authorities, \n"
-"while with I2P, requests sent to a destination cannot be intercepted or the \n"
-"reply spoofed, as they are encrypted to the destination's public keys, and \n"
-"a destination itself is just a pair of public keys and a certificate. DNS-style \n"
-"systems on the other hand allow any of the name servers on the lookup path \n"
-"to mount simple denial of service and spoofing attacks. Adding on a certificate \n"
-"authenticating the responses as signed by some centralized certificate authority \n"
-"would address many of the hostile nameserver issues but would leave open replay \n"
+"done by hijacking a site can be tremendous - and insecure destinations "
+"have \n"
+"no value. DNSsec itself still falls back on registrars and certificate "
+"authorities, \n"
+"while with I2P, requests sent to a destination cannot be intercepted or "
+"the \n"
+"reply spoofed, as they are encrypted to the destination's public keys, "
+"and \n"
+"a destination itself is just a pair of public keys and a certificate. "
+"DNS-style \n"
+"systems on the other hand allow any of the name servers on the lookup "
+"path \n"
+"to mount simple denial of service and spoofing attacks. Adding on a "
+"certificate \n"
+"authenticating the responses as signed by some centralized certificate "
+"authority \n"
+"would address many of the hostile nameserver issues but would leave open "
+"replay \n"
"attacks as well as hostile certificate authority attacks."
msgstr ""
#: i2p2www/pages/site/docs/how/tech-intro.html:880
msgid ""
-"Voting style naming is dangerous as well, especially given the effectiveness \n"
-"of Sybil attacks in anonymous systems - the attacker can simply create an \n"
-"arbitrarily high number of peers and \"vote\" with each to take over a given \n"
-"name. Proof-of-work methods can be used to make identity non-free, but as \n"
-"the network grows the load required to contact everyone to conduct online \n"
-"voting is implausible, or if the full network is not queried, different sets \n"
+"Voting style naming is dangerous as well, especially given the "
+"effectiveness \n"
+"of Sybil attacks in anonymous systems - the attacker can simply create an"
+" \n"
+"arbitrarily high number of peers and \"vote\" with each to take over a "
+"given \n"
+"name. Proof-of-work methods can be used to make identity non-free, but as"
+" \n"
+"the network grows the load required to contact everyone to conduct online"
+" \n"
+"voting is implausible, or if the full network is not queried, different "
+"sets \n"
"of answers may be reachable."
msgstr ""
#: i2p2www/pages/site/docs/how/tech-intro.html:890
msgid ""
-"As with the Internet however, I2P is keeping the design and operation of \n"
-"a naming system out of the (IP-like) communication layer. The bundled naming \n"
-"library includes a simple service provider interface which alternate naming \n"
-"systems can plug into, allowing end users to drive what sort of naming tradeoffs \n"
+"As with the Internet however, I2P is keeping the design and operation of"
+" \n"
+"a naming system out of the (IP-like) communication layer. The bundled "
+"naming \n"
+"library includes a simple service provider interface which alternate "
+"naming \n"
+"systems can plug into, allowing end users to drive what sort of naming "
+"tradeoffs \n"
"they prefer."
msgstr ""
#: i2p2www/pages/site/docs/how/tech-intro.html:899
msgid ""
-"The old Syndie bundled with I2P has been replaced by the new Syndie which\n"
-"is distributed separately. For more information see the Syndie\n"
+"The old Syndie bundled with I2P has been replaced by the new Syndie which"
+"\n"
+"is distributed separately. For more information see the Syndie\n"
"pages."
msgstr ""
#: i2p2www/pages/site/docs/how/tech-intro.html:905
msgid ""
-"Syndie is a safe, anonymous blogging / content publication / content aggregation \n"
-"system. It lets you create information, share it with others, and read posts \n"
-"from those you're interested in, all while taking into consideration your \n"
-"needs for security and anonymity. Rather than building its own content distribution \n"
-"network, Syndie is designed to run on top of existing networks, syndicating \n"
-"content through eepsites, Tor hidden services, Freenet freesites, normal websites, \n"
-"usenet newsgroups, email lists, RSS feeds, etc. Data published with Syndie \n"
-"is done so as to offer pseudonymous authentication to anyone reading or archiving \n"
+"Syndie is a safe, anonymous blogging / content publication / content "
+"aggregation \n"
+"system. It lets you create information, share it with others, and read "
+"posts \n"
+"from those you're interested in, all while taking into consideration your"
+" \n"
+"needs for security and anonymity. Rather than building its own content "
+"distribution \n"
+"network, Syndie is designed to run on top of existing networks, "
+"syndicating \n"
+"content through eepsites, Tor hidden services, Freenet freesites, normal "
+"websites, \n"
+"usenet newsgroups, email lists, RSS feeds, etc. Data published with "
+"Syndie \n"
+"is done so as to offer pseudonymous authentication to anyone reading or "
+"archiving \n"
"it."
msgstr ""
#: i2p2www/pages/site/docs/how/tech-intro.html:920
msgid ""
-"I2PTunnel is probably I2P's most popular and versatile client application, \n"
-"allowing generic proxying both into and out of the I2P network. I2PTunnel \n"
-"can be viewed as four separate proxying applications - a \"client\" which receives \n"
-"inbound TCP connections and forwards them to a given I2P destination, an \"httpclient\" \n"
-"(aka \"eepproxy\") which acts like an HTTP proxy and forwards the requests to \n"
-"the appropriate I2P destination (after querying the naming service if necessary), \n"
-"a \"server\" which receives inbound I2P streaming connections on a destination \n"
-"and forwards them to a given TCP host+port, and an \"httpserver\" which extends \n"
-"the \"server\" by parsing the HTTP request and responses to allow safer operation. \n"
-"There is an additional \"socksclient\" application, but its use is not encouraged \n"
+"I2PTunnel is probably I2P's most popular and versatile client "
+"application, \n"
+"allowing generic proxying both into and out of the I2P network. I2PTunnel"
+" \n"
+"can be viewed as four separate proxying applications - a \"client\" which"
+" receives \n"
+"inbound TCP connections and forwards them to a given I2P destination, an "
+"\"httpclient\" \n"
+"(aka \"eepproxy\") which acts like an HTTP proxy and forwards the "
+"requests to \n"
+"the appropriate I2P destination (after querying the naming service if "
+"necessary), \n"
+"a \"server\" which receives inbound I2P streaming connections on a "
+"destination \n"
+"and forwards them to a given TCP host+port, and an \"httpserver\" which "
+"extends \n"
+"the \"server\" by parsing the HTTP request and responses to allow safer "
+"operation. \n"
+"There is an additional \"socksclient\" application, but its use is not "
+"encouraged \n"
"for reasons previously mentioned."
msgstr ""
#: i2p2www/pages/site/docs/how/tech-intro.html:934
msgid ""
-"I2P itself is not an outproxy network - the anonymity and security concerns \n"
-"inherent in a mix net which forwards data into and out of the mix have kept \n"
-"I2P's design focused on providing an anonymous network which capable of meeting \n"
-"the user's needs without requiring external resources. However, the I2PTunnel \n"
-"\"httpclient\" application offers a hook for outproxying - if the hostname requested \n"
-"doesn't end in \".i2p\", it picks a random destination from a user-provided \n"
-"set of outproxies and forwards the request to them. These destinations are \n"
-"simply I2PTunnel \"server\" instances run by volunteers who have explicitly \n"
-"chosen to run outproxies - no one is an outproxy by default, and running an \n"
-"outproxy doesn't automatically tell other people to proxy through you. While \n"
-"outproxies do have inherent weaknesses, they offer a simple proof of concept \n"
-"for using I2P and provide some functionality under a threat model which may \n"
+"I2P itself is not an outproxy network - the anonymity and security "
+"concerns \n"
+"inherent in a mix net which forwards data into and out of the mix have "
+"kept \n"
+"I2P's design focused on providing an anonymous network which capable of "
+"meeting \n"
+"the user's needs without requiring external resources. However, the "
+"I2PTunnel \n"
+"\"httpclient\" application offers a hook for outproxying - if the "
+"hostname requested \n"
+"doesn't end in \".i2p\", it picks a random destination from a user-"
+"provided \n"
+"set of outproxies and forwards the request to them. These destinations "
+"are \n"
+"simply I2PTunnel \"server\" instances run by volunteers who have "
+"explicitly \n"
+"chosen to run outproxies - no one is an outproxy by default, and running "
+"an \n"
+"outproxy doesn't automatically tell other people to proxy through you. "
+"While \n"
+"outproxies do have inherent weaknesses, they offer a simple proof of "
+"concept \n"
+"for using I2P and provide some functionality under a threat model which "
+"may \n"
"be sufficient for some users."
msgstr ""
#: i2p2www/pages/site/docs/how/tech-intro.html:950
msgid ""
-"I2PTunnel enables most of the applications in use. An \"httpserver\" pointing \n"
-"at a webserver lets anyone run their own anonymous website (or \"eepsite\") \n"
-"- a webserver is bundled with I2P for this purpose, but any webserver can \n"
-"be used. Anyone may run a \"client\" pointing at one of the anonymously hosted \n"
-"IRC servers, each of which are running a \"server\" pointing at their local \n"
-"IRCd and communicating between IRCds over their own \"client\" tunnels. End \n"
-"users also have \"client\" tunnels pointing at I2Pmail's \n"
-"POP3 and SMTP destinations (which in turn are simply \"server\" instances pointing \n"
-"at POP3 and SMTP servers), as well as \"client\" tunnels pointing at I2P's CVS \n"
-"server, allowing anonymous development. At times people have even run \"client\" \n"
+"I2PTunnel enables most of the applications in use. An \"httpserver\" "
+"pointing \n"
+"at a webserver lets anyone run their own anonymous website (or "
+"\"eepsite\") \n"
+"- a webserver is bundled with I2P for this purpose, but any webserver can"
+" \n"
+"be used. Anyone may run a \"client\" pointing at one of the anonymously "
+"hosted \n"
+"IRC servers, each of which are running a \"server\" pointing at their "
+"local \n"
+"IRCd and communicating between IRCds over their own \"client\" tunnels. "
+"End \n"
+"users also have \"client\" tunnels pointing at I2Pmail's \n"
+"POP3 and SMTP destinations (which in turn are simply \"server\" instances"
+" pointing \n"
+"at POP3 and SMTP servers), as well as \"client\" tunnels pointing at "
+"I2P's CVS \n"
+"server, allowing anonymous development. At times people have even run "
+"\"client\" \n"
"proxies to access the \"server\" instances pointing at an NNTP server."
msgstr ""
#: i2p2www/pages/site/docs/how/tech-intro.html:967
msgid ""
-"i2p-bt is a port of the mainline python BitTorrent client to run both the \n"
-"tracker and peer communication over I2P. Tracker requests are forwarded through \n"
-"the eepproxy to eepsites specified in the torrent file while tracker responses \n"
-"refer to peers by their destination explicitly, allowing i2p-bt to open up \n"
-"a streaming lib connection to query them for \n"
+"i2p-bt is a port of the mainline python BitTorrent client to run both the"
+" \n"
+"tracker and peer communication over I2P. Tracker requests are forwarded "
+"through \n"
+"the eepproxy to eepsites specified in the torrent file while tracker "
+"responses \n"
+"refer to peers by their destination explicitly, allowing i2p-bt to open "
+"up \n"
+"a streaming lib connection to query them "
+"for \n"
"blocks."
msgstr ""
#: i2p2www/pages/site/docs/how/tech-intro.html:976
msgid ""
-"In addition to i2p-bt, a port of bytemonsoon has been made to I2P, making \n"
-"a few modifications as necessary to strip any anonymity-compromising information \n"
-"from the application and to take into consideration the fact that IPs cannot \n"
+"In addition to i2p-bt, a port of bytemonsoon has been made to I2P, making"
+" \n"
+"a few modifications as necessary to strip any anonymity-compromising "
+"information \n"
+"from the application and to take into consideration the fact that IPs "
+"cannot \n"
"be used for identifying peers."
msgstr ""
@@ -9232,8 +10775,10 @@ msgstr ""
#: i2p2www/pages/site/docs/how/tech-intro.html:990
msgid ""
-"Bundled with the I2P install, I2PSnark offers a simple anonymous BitTorrent \n"
-"client with multitorrent capabilities, exposing all of the functionality through \n"
+"Bundled with the I2P install, I2PSnark offers a simple anonymous "
+"BitTorrent \n"
+"client with multitorrent capabilities, exposing all of the functionality "
+"through \n"
"a plain HTML web interface."
msgstr ""
@@ -9241,7 +10786,9 @@ msgstr ""
#, python-format
msgid ""
"Robert is a Bittorrent client written in Python.\n"
-"It is hosted on http://%(bob)s/Robert.html "
+"It is hosted on http://%(bob)s/Robert.html "
msgstr ""
#: i2p2www/pages/site/docs/how/tech-intro.html:1007
@@ -9253,9 +10800,12 @@ msgstr ""
#: i2p2www/pages/site/docs/how/tech-intro.html:1015
msgid ""
-"I2Phex is a fairly direct port of the Phex Gnutella filesharing client to \n"
-"run entirely on top of I2P. While it has disabled some of Phex's functionality, \n"
-"such as integration with Gnutella webcaches, the basic file sharing and chatting \n"
+"I2Phex is a fairly direct port of the Phex Gnutella filesharing client to"
+" \n"
+"run entirely on top of I2P. While it has disabled some of Phex's "
+"functionality, \n"
+"such as integration with Gnutella webcaches, the basic file sharing and "
+"chatting \n"
"system is fully functional."
msgstr ""
@@ -9268,39 +10818,62 @@ msgstr ""
#: i2p2www/pages/site/docs/how/tech-intro.html:1033
#, python-format
msgid ""
-"I2Pmail is more a service than an application - postman offers both internal \n"
-"and external email with POP3 and SMTP service through I2PTunnel instances \n"
-"accessing a series of components developed with mastiejaner, allowing people \n"
-"to use their preferred mail clients to send and receive mail pseudonymously. \n"
-"However, as most mail clients expose substantial identifying information, \n"
-"I2P bundles susi23's web based susimail client which has been built specifically \n"
-"with I2P's anonymity needs in mind. The I2Pmail/mail.i2p service offers transparent \n"
-"virus filtering as well as denial of service prevention with hashcash augmented \n"
-"quotas. In addition, each user has control of their batching strategy prior \n"
-"to delivery through the mail.i2p outproxies, which are separate from the mail.i2p \n"
-"SMTP and POP3 servers - both the outproxies and inproxies communicate with \n"
-"the mail.i2p SMTP and POP3 servers through I2P itself, so compromising those \n"
-"non-anonymous locations does not give access to the mail accounts or activity \n"
-"patterns of the user. At the moment the developers work on a decentralized \n"
-"mailsystem, called \"v2mail\". More information can be found on the eepsite \n"
+"I2Pmail is more a service than an application - postman offers both "
+"internal \n"
+"and external email with POP3 and SMTP service through I2PTunnel instances"
+" \n"
+"accessing a series of components developed with mastiejaner, allowing "
+"people \n"
+"to use their preferred mail clients to send and receive mail "
+"pseudonymously. \n"
+"However, as most mail clients expose substantial identifying information,"
+" \n"
+"I2P bundles susi23's web based susimail client which has been built "
+"specifically \n"
+"with I2P's anonymity needs in mind. The I2Pmail/mail.i2p service offers "
+"transparent \n"
+"virus filtering as well as denial of service prevention with hashcash "
+"augmented \n"
+"quotas. In addition, each user has control of their batching strategy "
+"prior \n"
+"to delivery through the mail.i2p outproxies, which are separate from the "
+"mail.i2p \n"
+"SMTP and POP3 servers - both the outproxies and inproxies communicate "
+"with \n"
+"the mail.i2p SMTP and POP3 servers through I2P itself, so compromising "
+"those \n"
+"non-anonymous locations does not give access to the mail accounts or "
+"activity \n"
+"patterns of the user. At the moment the developers work on a "
+"decentralized \n"
+"mailsystem, called \"v2mail\". More information can be found on the "
+"eepsite \n"
"%(postman)s."
msgstr ""
#: i2p2www/pages/site/docs/how/tech-intro.html:1055
msgid ""
-"I2P-Bote is a distributed e-mail application. It does not use the traditional\n"
-"e-mail concept of sending an e-mail to a server and retrieving it from a server.\n"
+"I2P-Bote is a distributed e-mail application. It does not use the "
+"traditional\n"
+"e-mail concept of sending an e-mail to a server and retrieving it from a "
+"server.\n"
"Instead, it uses a Kademlia Distributed Hash Table to store mails.\n"
-"One user can push a mail into the DHT, while another can request the e-mail from the DHT.\n"
-"And all the mails sent within the I2P-Bote network are automatically encrypted end-to-end. X = g^x mod "
-"p
."
+"Alice generates a secret integer x. She then calculates X = g^x mod"
+" p
."
msgstr ""
#: i2p2www/pages/site/docs/transport/ntcp.html:166
@@ -13663,7 +15794,8 @@ msgstr ""
#: i2p2www/pages/site/docs/transport/ntcp.html:173
#, python-format
msgid ""
-"The sessionKey is then used to exchange identities in Message 3 and Message 4.\n"
+"The sessionKey is then used to exchange identities in Message 3 "
+"and Message 4.\n"
"The exponent (x and y) length for the DH exchange is documented on the\n"
"cryptography page."
msgstr ""
@@ -13676,7 +15808,8 @@ msgstr ""
#, python-format
msgid ""
"This is the DH request. Alice already has Bob's\n"
-"Router Identity,\n"
+"Router "
+"Identity,\n"
"IP address, and port, as contained in his\n"
"Router Info,\n"
"which was published to the\n"
@@ -13756,7 +15889,8 @@ msgstr ""
#: i2p2www/pages/site/docs/transport/ntcp.html:312
#, python-format
msgid ""
-"48 bytes AES encrypted using the DH session key and\n"
+"48 bytes AES encrypted using the DH "
+"session key and\n"
" the last 16 bytes of Y as the IV"
msgstr ""
@@ -13772,8 +15906,8 @@ msgstr ""
#: i2p2www/pages/site/docs/transport/ntcp.html:326
msgid ""
-"This contains Alice's router identity, and a signature of the critical data."
-" Alice sends Bob:"
+"This contains Alice's router identity, and a signature of the critical "
+"data. Alice sends Bob:"
msgstr ""
#: i2p2www/pages/site/docs/transport/ntcp.html:360
@@ -13793,14 +15927,17 @@ msgstr ""
msgid ""
"the `Signature` of the following concatenated data:\n"
" X, Y, Bob's `RouterIdentity`, tsA, tsB.\n"
-" Alice signs it with the `SigningPrivateKey` associated with the `SigningPublicKey` in her `RouterIdentity`"
+" Alice signs it with the `SigningPrivateKey` associated with "
+"the `SigningPublicKey` in her `RouterIdentity`"
msgstr ""
#: i2p2www/pages/site/docs/transport/ntcp.html:389
#, python-format
msgid ""
-"448 bytes AES encrypted using the DH session key and\n"
-" the last 16 bytes of HXxorHI (i.e., the last 16 bytes of message #1) as the IV"
+"448 bytes AES encrypted using the DH"
+" session key and\n"
+" the last 16 bytes of HXxorHI (i.e., the last 16 bytes "
+"of message #1) as the IV"
msgstr ""
#: i2p2www/pages/site/docs/transport/ntcp.html:400
@@ -13815,8 +15952,8 @@ msgstr ""
#: i2p2www/pages/site/docs/transport/ntcp.html:406
msgid ""
-"Alice will use the last 16 bytes of the encrypted contents of this message "
-"as the IV for the next message."
+"Alice will use the last 16 bytes of the encrypted contents of this "
+"message as the IV for the next message."
msgstr ""
#: i2p2www/pages/site/docs/transport/ntcp.html:430
@@ -13831,15 +15968,19 @@ msgstr ""
msgid ""
"the `Signature` of the following concatenated data:\n"
" X, Y, Alice's `RouterIdentity`, tsA, tsB.\n"
-" Bob signs it with the `SigningPrivateKey` associated with the `SigningPublicKey` in his `RouterIdentity`"
+" Bob signs it with the `SigningPrivateKey` associated with "
+"the `SigningPublicKey` in his `RouterIdentity`"
msgstr ""
#: i2p2www/pages/site/docs/transport/ntcp.html:479
#, python-format
msgid ""
-"Data AES encrypted using the DH session key and\n"
-" the last 16 bytes of the encrypted contents of message #2 as the IV\n"
-" 48 bytes for a DSA signature, may vary for other signature types"
+"Data AES encrypted using the DH "
+"session key and\n"
+" the last 16 bytes of the encrypted contents of message "
+"#2 as the IV\n"
+" 48 bytes for a DSA signature, may vary for other "
+"signature types"
msgstr ""
#: i2p2www/pages/site/docs/transport/ntcp.html:488
@@ -13848,8 +15989,8 @@ msgstr ""
#: i2p2www/pages/site/docs/transport/ntcp.html:491
msgid ""
-"Bob will use the last 16 bytes of the encrypted contents of this message as "
-"the IV for the next message."
+"Bob will use the last 16 bytes of the encrypted contents of this message "
+"as the IV for the next message."
msgstr ""
#: i2p2www/pages/site/docs/transport/ntcp.html:506
@@ -13858,10 +15999,14 @@ msgstr ""
#: i2p2www/pages/site/docs/transport/ntcp.html:507
msgid ""
-"The connection is established, and standard or time sync messages may be exchanged.\n"
-"All subsequent messages are AES encrypted using the negotiated DH session key.\n"
-"Alice will use the last 16 bytes of the encrypted contents of message #3 as the next IV.\n"
-"Bob will use the last 16 bytes of the encrypted contents of message #4 as the next IV."
+"The connection is established, and standard or time sync messages may be "
+"exchanged.\n"
+"All subsequent messages are AES encrypted using the negotiated DH session"
+" key.\n"
+"Alice will use the last 16 bytes of the encrypted contents of message #3 "
+"as the next IV.\n"
+"Bob will use the last 16 bytes of the encrypted contents of message #4 as"
+" the next IV."
msgstr ""
#: i2p2www/pages/site/docs/transport/ntcp.html:516
@@ -13888,8 +16033,8 @@ msgstr ""
#: i2p2www/pages/site/docs/transport/ntcp.html:528
msgid ""
-"that many bytes making up the local router's IP address (as reached by the "
-"remote side)"
+"that many bytes making up the local router's IP address (as reached by "
+"the remote side)"
msgstr ""
#: i2p2www/pages/site/docs/transport/ntcp.html:529
@@ -13908,8 +16053,8 @@ msgstr ""
#: i2p2www/pages/site/docs/transport/ntcp.html:532
msgid ""
-"xor of the local router's identity hash and the SHA256 of bytes 32 through "
-"bytes 223"
+"xor of the local router's identity hash and the SHA256 of bytes 32 "
+"through bytes 223"
msgstr ""
#: i2p2www/pages/site/docs/transport/ntcp.html:535
@@ -13932,9 +16077,11 @@ msgstr ""
#: i2p2www/pages/site/docs/transport/ntcp.html:550
msgid ""
"A set of fixed packet sizes may be appropriate to further hide the data \n"
-"fragmentation to external adversaries, but the tunnel, garlic, and end to \n"
+"fragmentation to external adversaries, but the tunnel, garlic, and end to"
+" \n"
"end padding should be sufficient for most needs until then.\n"
-"However, there is currently no provision for padding beyond the next 16-byte boundary,\n"
+"However, there is currently no provision for padding beyond the next "
+"16-byte boundary,\n"
"to create a limited number of message sizes."
msgstr ""
@@ -13957,8 +16104,10 @@ msgstr ""
#: i2p2www/pages/site/docs/transport/ssu.html:7
#, python-format
msgid ""
-"SSU (also called \"UDP\" in much of the I2P documentation and user interfaces)\n"
-"is one of two transports currently implemented in I2P.\n"
+"SSU (also called \"UDP\" in much of the I2P documentation and user "
+"interfaces)\n"
+"is one of two transports currently "
+"implemented in I2P.\n"
"The other is NTCP."
msgstr ""
@@ -13966,14 +16115,17 @@ msgstr ""
msgid ""
"SSU is the newer of the two transports,\n"
"introduced in I2P release 0.6.\n"
-"In a standard I2P installation, the router uses both NTCP and SSU for outbound connections.\n"
+"In a standard I2P installation, the router uses both NTCP and SSU for "
+"outbound connections.\n"
"SSU-over-IPv6 is supported as of version 0.9.8."
msgstr ""
#: i2p2www/pages/site/docs/transport/ssu.html:20
msgid ""
-"SSU is called \"semireliable\" because it will repeatedly retransmit unacknowledged messages,\n"
-"but only up to a maximum number of times. After that, the message is dropped."
+"SSU is called \"semireliable\" because it will repeatedly retransmit "
+"unacknowledged messages,\n"
+"but only up to a maximum number of times. After that, the message is "
+"dropped."
msgstr ""
#: i2p2www/pages/site/docs/transport/ssu.html:25
@@ -13982,8 +16134,10 @@ msgstr "Servizi SSU"
#: i2p2www/pages/site/docs/transport/ssu.html:27
msgid ""
-"Like the NTCP transport, SSU provides reliable, encrypted, connection-oriented, point-to-point data transport.\n"
-"Unique to SSU, it also provides IP detection and NAT traversal services, including:"
+"Like the NTCP transport, SSU provides reliable, encrypted, connection-"
+"oriented, point-to-point data transport.\n"
+"Unique to SSU, it also provides IP detection and NAT traversal services, "
+"including:"
msgstr ""
#: i2p2www/pages/site/docs/transport/ssu.html:33
@@ -14000,7 +16154,8 @@ msgstr ""
#: i2p2www/pages/site/docs/transport/ssu.html:35
msgid ""
-"Communication of firewall status and local IP, and changes to either to NTCP"
+"Communication of firewall status and local IP, and changes to either to "
+"NTCP"
msgstr ""
#: i2p2www/pages/site/docs/transport/ssu.html:47
@@ -14034,20 +16189,26 @@ msgid ""
"Packets are scheduled according to the router's policy, taking care\n"
"not to exceed the router's outbound capacity or to exceed the measured \n"
"capacity of the remote peer. The measured capacity operates along the\n"
-"lines of TCP's slow start and congestion avoidance, with additive increases\n"
-"to the sending capacity and multiplicative decreases in face of congestion.\n"
+"lines of TCP's slow start and congestion avoidance, with additive "
+"increases\n"
+"to the sending capacity and multiplicative decreases in face of "
+"congestion.\n"
"Unlike for TCP, routers may give up on some messages after\n"
-"a given period or number of retransmissions while continuing to transmit \n"
+"a given period or number of retransmissions while continuing to transmit"
+" \n"
"other messages."
msgstr ""
#: i2p2www/pages/site/docs/transport/ssu.html:95
msgid ""
"The congestion detection techniques vary from TCP as well, since each \n"
-"message has its own unique and nonsequential identifier, and each message\n"
-"has a limited size - at most, 32KB. To efficiently transmit this feedback\n"
+"message has its own unique and nonsequential identifier, and each message"
+"\n"
+"has a limited size - at most, 32KB. To efficiently transmit this "
+"feedback\n"
"to the sender, the receiver periodically includes a list of fully ACKed \n"
-"message identifiers and may also include bitfields for partially received\n"
+"message identifiers and may also include bitfields for partially received"
+"\n"
"messages, where each bit represents the reception of a fragment. If \n"
"duplicate fragments arrive, the message should be ACKed again, or if the\n"
"message has still not been fully received, the bitfield should be \n"
@@ -14057,7 +16218,8 @@ msgstr ""
#: i2p2www/pages/site/docs/transport/ssu.html:107
msgid ""
"The current implementation does not pad the packets to\n"
-"any particular size, but instead just places a single message fragment into\n"
+"any particular size, but instead just places a single message fragment "
+"into\n"
"a packet and sends it off (careful not to exceed the MTU)."
msgstr ""
@@ -14065,7 +16227,8 @@ msgstr ""
msgid ""
"As of router version 0.8.12,\n"
"two MTU values are used for IPv4: 620 and 1484.\n"
-"The MTU value is adjusted based on the percentage of packets that are retransmitted."
+"The MTU value is adjusted based on the percentage of packets that are "
+"retransmitted."
msgstr ""
#: i2p2www/pages/site/docs/transport/ssu.html:120
@@ -14084,8 +16247,10 @@ msgstr ""
#: i2p2www/pages/site/docs/transport/ssu.html:132
msgid ""
-"Based on measurements, 1492 fits nearly all reasonably small I2NP messages\n"
-"(larger I2NP messages may be up to 1900 to 4500 bytes, which isn't going to fit\n"
+"Based on measurements, 1492 fits nearly all reasonably small I2NP "
+"messages\n"
+"(larger I2NP messages may be up to 1900 to 4500 bytes, which isn't going "
+"to fit\n"
"into a live network MTU anyway)."
msgstr ""
@@ -14105,7 +16270,8 @@ msgstr ""
#: i2p2www/pages/site/docs/transport/ssu.html:150
msgid ""
-"As of release 0.9.2, if a router's network interface MTU is less than 1484,\n"
+"As of release 0.9.2, if a router's network interface MTU is less than "
+"1484,\n"
"it will publish that in the network database, and other routers should\n"
"honor that when a connection is established."
msgstr ""
@@ -14124,10 +16290,13 @@ msgstr ""
#: i2p2www/pages/site/docs/transport/ssu.html:163
msgid ""
"While the maximum message size is nominally 32KB, the practical\n"
-"limit differs. The protocol limits the number of fragments to 7 bits, or 128.\n"
-"The current implementation, however, limits each message to a maximum of 64 fragments,\n"
+"limit differs. The protocol limits the number of fragments to 7 bits, or "
+"128.\n"
+"The current implementation, however, limits each message to a maximum of "
+"64 fragments,\n"
"which is sufficient for 64 * 534 = 33.3 KB when using the 608 MTU.\n"
-"Due to overhead for bundled LeaseSets and session keys, the practical limit\n"
+"Due to overhead for bundled LeaseSets and session keys, the practical "
+"limit\n"
"at the application level is about 6KB lower, or about 26KB.\n"
"Further work is necessary to raise the UDP transport limit above 32KB.\n"
"For connections using the larger MTU, larger messages are possible."
@@ -14141,7 +16310,8 @@ msgstr "Chiavi "
msgid ""
"All encryption used is AES256/CBC with 32 byte keys and 16 byte IVs.\n"
"When Alice originates a session with Bob,\n"
-"the MAC and session keys are negotiated as part of the DH exchange, and are then used\n"
+"the MAC and session keys are negotiated as part of the DH exchange, and "
+"are then used\n"
"for the HMAC and encryption, respectively. During the DH exchange, \n"
"Bob's publicly knowable introKey is used for the MAC and encryption."
msgstr ""
@@ -14158,7 +16328,8 @@ msgstr ""
#: i2p2www/pages/site/docs/transport/ssu.html:204
msgid ""
-"Upon receiving a message, the receiver checks the \"from\" IP address and port\n"
+"Upon receiving a message, the receiver checks the \"from\" IP address and"
+" port\n"
"with all established sessions - if there are matches,\n"
"that session's MAC keys are tested in the HMAC. If none\n"
"of those verify or if there are no matching IP addresses, the \n"
@@ -14248,7 +16419,8 @@ msgstr ""
#: i2p2www/pages/site/docs/transport/ssu.html:284
msgid ""
-"Direct session establishment is used when no third party is required for NAT traversal.\n"
+"Direct session establishment is used when no third party is required for "
+"NAT traversal.\n"
"The message sequence is as follows:"
msgstr ""
@@ -14268,8 +16440,10 @@ msgid ""
"After the SessionConfirmed message is received, Bob sends a small\n"
"DeliveryStatus message\n"
"as a confirmation.\n"
-"In this message, the 4-byte message ID is set to a random number, and the\n"
-"8-byte \"arrival time\" is set to the current network-wide ID, which is 2\n"
+"In this message, the 4-byte message ID is set to a random number, and the"
+"\n"
+"8-byte \"arrival time\" is set to the current network-wide ID, which is 2"
+"\n"
"(i.e. 0x0000000000000002)."
msgstr ""
@@ -14284,7 +16458,8 @@ msgstr ""
#: i2p2www/pages/site/docs/transport/ssu.html:322
msgid ""
-"It does not appear that the type of the status message or its contents matters.\n"
+"It does not appear that the type of the status message or its contents "
+"matters.\n"
"It was originally added becasue the DatabaseStore message was delayed\n"
"several seconds; since the store is now sent immediately, perhaps\n"
"the status message can be eliminated."
@@ -14293,7 +16468,8 @@ msgstr ""
#: i2p2www/pages/site/docs/transport/ssu.html:331
msgid ""
"Introduction keys are delivered through an external channel \n"
-"(the network database, where they are identical to the router Hash for now)\n"
+"(the network database, where they are identical to the router Hash for "
+"now)\n"
"and must be used when establishing a session key. For the indirect\n"
"address, the peer must first contact the relayhost and ask them for\n"
"an introduction to the peer known at that relayhost under the given\n"
@@ -14311,16 +16487,24 @@ msgid ""
"is necessary for efficient NAT traversal. Charlie, a router behind a\n"
"NAT or firewall which does not allow unsolicited inbound UDP packets,\n"
"first contacts a few peers, choosing some to serve as introducers. Each\n"
-"of these peers (Bob, Bill, Betty, etc) provide Charlie with an introduction\n"
-"tag - a 4 byte random number - which he then makes available to the public\n"
-"as methods of contacting him. Alice, a router who has Charlie's published\n"
-"contact methods, first sends a RelayRequest packet to one or more of the \n"
+"of these peers (Bob, Bill, Betty, etc) provide Charlie with an "
+"introduction\n"
+"tag - a 4 byte random number - which he then makes available to the "
+"public\n"
+"as methods of contacting him. Alice, a router who has Charlie's "
+"published\n"
+"contact methods, first sends a RelayRequest packet to one or more of the"
+" \n"
"introducers, asking each to introduce her to Charlie (offering the \n"
"introduction tag to identify Charlie). Bob then forwards a RelayIntro\n"
-"packet to Charlie including Alice's public IP and port number, then sends\n"
-"Alice back a RelayResponse packet containing Charlie's public IP and port\n"
-"number. When Charlie receives the RelayIntro packet, he sends off a small\n"
-"random packet to Alice's IP and port (poking a hole in his NAT/firewall),\n"
+"packet to Charlie including Alice's public IP and port number, then sends"
+"\n"
+"Alice back a RelayResponse packet containing Charlie's public IP and port"
+"\n"
+"number. When Charlie receives the RelayIntro packet, he sends off a "
+"small\n"
+"random packet to Alice's IP and port (poking a hole in his NAT/firewall),"
+"\n"
"and when Alice receives Bob's RelayResponse packet, she begins a new \n"
"full direction session establishment with the specified IP and port."
msgstr ""
@@ -14330,14 +16514,13 @@ msgid "Connection establishment (indirect using an introducer)"
msgstr ""
#: i2p2www/pages/site/docs/transport/ssu.html:374
-msgid ""
-"Alice first connects to introducer Bob, who relays the request to Charlie."
+msgid "Alice first connects to introducer Bob, who relays the request to Charlie."
msgstr ""
#: i2p2www/pages/site/docs/transport/ssu.html:392
msgid ""
-"After the hole punch, the session is established between Alice and Charlie "
-"as in a direct establishment."
+"After the hole punch, the session is established between Alice and "
+"Charlie as in a direct establishment."
msgstr ""
#: i2p2www/pages/site/docs/transport/ssu.html:404
@@ -14441,12 +16624,14 @@ msgstr ""
#: i2p2www/pages/site/docs/transport/ssu.html:510
#, python-format
msgid ""
-"The details of windowing, ACK, and retransmission strategies are not specified\n"
+"The details of windowing, ACK, and retransmission strategies are not "
+"specified\n"
"here. See the Java code for the current implementation.\n"
"During the establishment phase, and for peer testing, routers\n"
"should implement exponential backoff for retransmission.\n"
"For an established connection, routers should implement\n"
-"an adjustable transmission window, RTT estimate and timeout, similar to TCP\n"
+"an adjustable transmission window, RTT estimate and timeout, similar to "
+"TCP\n"
"or streaming.\n"
"See the code for initial, min and max parameters."
msgstr ""
@@ -14490,22 +16675,27 @@ msgstr ""
#: i2p2www/pages/site/docs/transport/ssu.html:556
msgid ""
-"Analysis of current SSU performance, including assessment of window size adjustment\n"
-"and other parameters, and adjustment of the protocol implementation to improve\n"
+"Analysis of current SSU performance, including assessment of window size "
+"adjustment\n"
+"and other parameters, and adjustment of the protocol implementation to "
+"improve\n"
"performance, is a topic for future work."
msgstr ""
#: i2p2www/pages/site/docs/transport/ssu.html:562
msgid ""
-"The current implementation repeatedly sends acknowledgments for the same packets,\n"
+"The current implementation repeatedly sends acknowledgments for the same "
+"packets,\n"
"which unnecessarily increases overhead."
msgstr ""
#: i2p2www/pages/site/docs/transport/ssu.html:567
msgid ""
-"The default small MTU value of 620 should be analyzed and possibly increased.\n"
+"The default small MTU value of 620 should be analyzed and possibly "
+"increased.\n"
"The current MTU adjustment strategy should be evaluated.\n"
-"Does a streaming lib 1730-byte packet fit in 3 small SSU packets? Probably not."
+"Does a streaming lib 1730-byte packet fit in 3 small SSU packets? "
+"Probably not."
msgstr ""
#: i2p2www/pages/site/docs/transport/ssu.html:573
@@ -14518,28 +16708,32 @@ msgstr ""
#: i2p2www/pages/site/docs/transport/ssu.html:581
msgid ""
-"The potential use of the 'challenge' fields in RelayIntro and RelayResponse,\n"
-"and use of the padding field in SessionRequest and SessionCreated, is undocumented."
+"The potential use of the 'challenge' fields in RelayIntro and "
+"RelayResponse,\n"
+"and use of the padding field in SessionRequest and SessionCreated, is "
+"undocumented."
msgstr ""
#: i2p2www/pages/site/docs/transport/ssu.html:586
msgid ""
"Instead of a single fragment per packet, a more efficient\n"
-"strategy may be to bundle multiple message fragments into the same packet,\n"
+"strategy may be to bundle multiple message fragments into the same "
+"packet,\n"
"so long as it doesn't exceed the MTU."
msgstr ""
#: i2p2www/pages/site/docs/transport/ssu.html:592
msgid ""
"A set of fixed packet sizes may be appropriate to further hide the data \n"
-"fragmentation to external adversaries, but the tunnel, garlic, and end to \n"
+"fragmentation to external adversaries, but the tunnel, garlic, and end to"
+" \n"
"end padding should be sufficient for most needs until then."
msgstr ""
#: i2p2www/pages/site/docs/transport/ssu.html:598
msgid ""
-"Why are introduction keys the same as the router hash, should it be changed,"
-" would there be any benefit?"
+"Why are introduction keys the same as the router hash, should it be "
+"changed, would there be any benefit?"
msgstr ""
#: i2p2www/pages/site/docs/transport/ssu.html:602
@@ -14548,8 +16742,8 @@ msgstr ""
#: i2p2www/pages/site/docs/transport/ssu.html:606
msgid ""
-"Signed-on times in SessionCreated and SessionConfirmed appear to be unused "
-"or unverified."
+"Signed-on times in SessionCreated and SessionConfirmed appear to be "
+"unused or unverified."
msgstr ""
#: i2p2www/pages/site/docs/transport/ssu.html:611
@@ -14559,7 +16753,8 @@ msgstr ""
#: i2p2www/pages/site/docs/transport/ssu.html:612
msgid ""
"This diagram\n"
-"should accurately reflect the current implementation, however there may be small differences."
+"should accurately reflect the current implementation, however there may "
+"be small differences."
msgstr ""
#: i2p2www/pages/site/docs/transport/ssu.html:620
@@ -14587,9 +16782,12 @@ msgid ""
"Within I2P, messages are passed in one direction through a virtual\n"
"tunnel of peers, using whatever means are available to pass the \n"
"message on to the next hop. Messages arrive at the tunnel's \n"
-"gateway, get bundled up and/or fragmented into fixed-size tunnel messages, \n"
-"and are forwarded on to the next hop in the tunnel, which processes and verifies\n"
-"the validity of the message and sends it on to the next hop, and so on, until\n"
+"gateway, get bundled up and/or fragmented into fixed-size tunnel "
+"messages, \n"
+"and are forwarded on to the next hop in the tunnel, which processes and "
+"verifies\n"
+"the validity of the message and sends it on to the next hop, and so on, "
+"until\n"
"it reaches the tunnel endpoint. That endpoint takes the messages\n"
"bundled up by the gateway and forwards them as instructed - either\n"
"to another router, to another tunnel on another router, or locally."
@@ -14611,9 +16809,12 @@ msgid ""
"in the tunnel, and provides each with the necessary configuration\n"
"data. They may have any number of hops.\n"
"It is the intent to make\n"
-"it hard for either participants or third parties to determine the length of \n"
-"a tunnel, or even for colluding participants to determine whether they are a\n"
-"part of the same tunnel at all (barring the situation where colluding peers are\n"
+"it hard for either participants or third parties to determine the length "
+"of \n"
+"a tunnel, or even for colluding participants to determine whether they "
+"are a\n"
+"part of the same tunnel at all (barring the situation where colluding "
+"peers are\n"
"next to each other in the tunnel)."
msgstr ""
@@ -14651,7 +16852,8 @@ msgstr ""
#: i2p2www/pages/site/docs/tunnels/implementation.html:69
#, python-format
msgid ""
-"After a tunnel is built, I2NP messages are processed and passed through it.\n"
+"After a tunnel is built, I2NP messages are "
+"processed and passed through it.\n"
"Tunnel operation has four distinct processes, taken on by various \n"
"peers in the tunnel."
msgstr ""
@@ -14678,7 +16880,8 @@ msgstr ""
#: i2p2www/pages/site/docs/tunnels/implementation.html:89
msgid ""
-"Eventually, the tunnel messages arrive at the endpoint where the I2NP messages\n"
+"Eventually, the tunnel messages arrive at the endpoint where the I2NP "
+"messages\n"
"originally bundled by the gateway are reassembled and forwarded on as \n"
"requested."
msgstr ""
@@ -14738,13 +16941,11 @@ msgid "Decrypt (using an encryption operation)"
msgstr ""
#: i2p2www/pages/site/docs/tunnels/implementation.html:133
-msgid ""
-"Decrypt (using an encryption operation) to reveal plaintext tunnel message"
+msgid "Decrypt (using an encryption operation) to reveal plaintext tunnel message"
msgstr ""
#: i2p2www/pages/site/docs/tunnels/implementation.html:134
-msgid ""
-"Reassemble Fragments, Forward as instructed to Inbound Gateway or Router"
+msgid "Reassemble Fragments, Forward as instructed to Inbound Gateway or Router"
msgstr ""
#: i2p2www/pages/site/docs/tunnels/implementation.html:142
@@ -14805,8 +17006,10 @@ msgstr ""
#: i2p2www/pages/site/docs/tunnels/implementation.html:181
msgid ""
"Tunnel IDs are 4 byte numbers used at each hop - participants know what\n"
-"tunnel ID to listen for messages with and what tunnel ID they should be forwarded\n"
-"on as to the next hop, and each hop chooses the tunnel ID which they receive messages\n"
+"tunnel ID to listen for messages with and what tunnel ID they should be "
+"forwarded\n"
+"on as to the next hop, and each hop chooses the tunnel ID which they "
+"receive messages\n"
"on. Tunnels themselves are short-lived (10 minutes).\n"
"Even if subsequent tunnels are built using the same sequence of \n"
"peers, each hop's tunnel ID will change."
@@ -14814,11 +17017,16 @@ msgstr ""
#: i2p2www/pages/site/docs/tunnels/implementation.html:190
msgid ""
-"To prevent adversaries from tagging the messages along the path by adjusting\n"
-"the message size, all tunnel messages are a fixed 1024 bytes in size. To accommodate \n"
-"larger I2NP messages as well as to support smaller ones more efficiently, the\n"
-"gateway splits up the larger I2NP messages into fragments contained within each\n"
-"tunnel message. The endpoint will attempt to rebuild the I2NP message from the\n"
+"To prevent adversaries from tagging the messages along the path by "
+"adjusting\n"
+"the message size, all tunnel messages are a fixed 1024 bytes in size. To"
+" accommodate \n"
+"larger I2NP messages as well as to support smaller ones more efficiently,"
+" the\n"
+"gateway splits up the larger I2NP messages into fragments contained "
+"within each\n"
+"tunnel message. The endpoint will attempt to rebuild the I2NP message "
+"from the\n"
"fragments for a short period of time, but will discard them as necessary."
msgstr ""
@@ -14835,20 +17043,30 @@ msgstr ""
#: i2p2www/pages/site/docs/tunnels/implementation.html:207
msgid ""
-"After the preprocessing of messages into a padded payload, the gateway builds\n"
-"a random 16 byte IV value, iteratively encrypting it and the tunnel message as\n"
-"necessary, and forwards the tuple {tunnelID, IV, encrypted tunnel message} to the next hop."
+"After the preprocessing of messages into a padded payload, the gateway "
+"builds\n"
+"a random 16 byte IV value, iteratively encrypting it and the tunnel "
+"message as\n"
+"necessary, and forwards the tuple {tunnelID, IV, encrypted tunnel "
+"message} to the next hop."
msgstr ""
#: i2p2www/pages/site/docs/tunnels/implementation.html:213
msgid ""
-"How encryption at the gateway is done depends on whether the tunnel is an\n"
-"inbound or an outbound tunnel. For inbound tunnels, they simply select a random\n"
-"IV, postprocessing and updating it to generate the IV for the gateway and using \n"
-"that IV along side their own layer key to encrypt the preprocessed data. For outbound \n"
-"tunnels they must iteratively decrypt the (unencrypted) IV and preprocessed \n"
-"data with the IV and layer keys for all hops in the tunnel. The result of the outbound\n"
-"tunnel encryption is that when each peer encrypts it, the endpoint will recover \n"
+"How encryption at the gateway is done depends on whether the tunnel is an"
+"\n"
+"inbound or an outbound tunnel. For inbound tunnels, they simply select a"
+" random\n"
+"IV, postprocessing and updating it to generate the IV for the gateway and"
+" using \n"
+"that IV along side their own layer key to encrypt the preprocessed data."
+" For outbound \n"
+"tunnels they must iteratively decrypt the (unencrypted) IV and "
+"preprocessed \n"
+"data with the IV and layer keys for all hops in the tunnel. The result "
+"of the outbound\n"
+"tunnel encryption is that when each peer encrypts it, the endpoint will "
+"recover \n"
"the initial preprocessed data."
msgstr ""
@@ -14858,29 +17076,46 @@ msgstr ""
#: i2p2www/pages/site/docs/tunnels/implementation.html:227
msgid ""
-"When a peer receives a tunnel message, it checks that the message came from\n"
-"the same previous hop as before (initialized when the first message comes through\n"
-"the tunnel). If the previous peer is a different router, or if the message has\n"
-"already been seen, the message is dropped. The participant then encrypts the \n"
-"received IV with AES256/ECB using their IV key to determine the current IV, uses \n"
-"that IV with the participant's layer key to encrypt the data, encrypts the \n"
-"current IV with AES256/ECB using their IV key again, then forwards the tuple \n"
-"{nextTunnelId, nextIV, encryptedData} to the next hop. This double encryption\n"
+"When a peer receives a tunnel message, it checks that the message came "
+"from\n"
+"the same previous hop as before (initialized when the first message comes"
+" through\n"
+"the tunnel). If the previous peer is a different router, or if the "
+"message has\n"
+"already been seen, the message is dropped. The participant then encrypts"
+" the \n"
+"received IV with AES256/ECB using their IV key to determine the current "
+"IV, uses \n"
+"that IV with the participant's layer key to encrypt the data, encrypts "
+"the \n"
+"current IV with AES256/ECB using their IV key again, then forwards the "
+"tuple \n"
+"{nextTunnelId, nextIV, encryptedData} to the next hop. This double "
+"encryption\n"
"of the IV (both before and after use) help address a certain class of\n"
"confirmation attacks."
msgstr ""
#: i2p2www/pages/site/docs/tunnels/implementation.html:243
msgid ""
-"Duplicate message detection is handled by a decaying Bloom filter on message\n"
-"IVs. Each router maintains a single Bloom filter to contain the XOR of the IV and\n"
-"the first block of the message received for all of the tunnels it is participating\n"
-"in, modified to drop seen entries after 10-20 minutes (when the tunnels will have\n"
-"expired). The size of the bloom filter and the parameters used are sufficient to\n"
-"more than saturate the router's network connection with a negligible chance of \n"
-"false positive. The unique value fed into the Bloom filter is the XOR of the IV \n"
-"and the first block so as to prevent nonsequential colluding peers in the tunnel \n"
-"from tagging a message by resending it with the IV and first block switched."
+"Duplicate message detection is handled by a decaying Bloom filter on "
+"message\n"
+"IVs. Each router maintains a single Bloom filter to contain the XOR of "
+"the IV and\n"
+"the first block of the message received for all of the tunnels it is "
+"participating\n"
+"in, modified to drop seen entries after 10-20 minutes (when the tunnels "
+"will have\n"
+"expired). The size of the bloom filter and the parameters used are "
+"sufficient to\n"
+"more than saturate the router's network connection with a negligible "
+"chance of \n"
+"false positive. The unique value fed into the Bloom filter is the XOR of"
+" the IV \n"
+"and the first block so as to prevent nonsequential colluding peers in the"
+" tunnel \n"
+"from tagging a message by resending it with the IV and first block "
+"switched."
msgstr ""
#: i2p2www/pages/site/docs/tunnels/implementation.html:256
@@ -14889,19 +17124,27 @@ msgstr ""
#: i2p2www/pages/site/docs/tunnels/implementation.html:258
msgid ""
-"After receiving and validating a tunnel message at the last hop in the tunnel,\n"
-"how the endpoint recovers the data encoded by the gateway depends upon whether \n"
-"the tunnel is an inbound or an outbound tunnel. For outbound tunnels, the \n"
-"endpoint encrypts the message with its layer key just like any other participant, \n"
-"exposing the preprocessed data. For inbound tunnels, the endpoint is also the \n"
-"tunnel creator so they can merely iteratively decrypt the IV and message, using the \n"
+"After receiving and validating a tunnel message at the last hop in the "
+"tunnel,\n"
+"how the endpoint recovers the data encoded by the gateway depends upon "
+"whether \n"
+"the tunnel is an inbound or an outbound tunnel. For outbound tunnels, "
+"the \n"
+"endpoint encrypts the message with its layer key just like any other "
+"participant, \n"
+"exposing the preprocessed data. For inbound tunnels, the endpoint is "
+"also the \n"
+"tunnel creator so they can merely iteratively decrypt the IV and message,"
+" using the \n"
"layer and IV keys of each step in reverse order."
msgstr ""
#: i2p2www/pages/site/docs/tunnels/implementation.html:268
msgid ""
-"At this point, the tunnel endpoint has the preprocessed data sent by the gateway,\n"
-"which it may then parse out into the included I2NP messages and forwards them as\n"
+"At this point, the tunnel endpoint has the preprocessed data sent by the "
+"gateway,\n"
+"which it may then parse out into the included I2NP messages and forwards "
+"them as\n"
"requested in their delivery instructions."
msgstr ""
@@ -14911,21 +17154,30 @@ msgstr ""
#: i2p2www/pages/site/docs/tunnels/implementation.html:277
msgid ""
-"When building a tunnel, the creator must send a request with the necessary\n"
-"configuration data to each of the hops and wait for all of them to agree before\n"
-"enabling the tunnel. The requests are encrypted so that only the peers who need\n"
-"to know a piece of information (such as the tunnel layer or IV key) has that\n"
-"data. In addition, only the tunnel creator will have access to the peer's\n"
-"reply. There are three important dimensions to keep in mind when producing\n"
-"the tunnels: what peers are used (and where), how the requests are sent (and \n"
+"When building a tunnel, the creator must send a request with the "
+"necessary\n"
+"configuration data to each of the hops and wait for all of them to agree "
+"before\n"
+"enabling the tunnel. The requests are encrypted so that only the peers "
+"who need\n"
+"to know a piece of information (such as the tunnel layer or IV key) has "
+"that\n"
+"data. In addition, only the tunnel creator will have access to the "
+"peer's\n"
+"reply. There are three important dimensions to keep in mind when "
+"producing\n"
+"the tunnels: what peers are used (and where), how the requests are sent "
+"(and \n"
"replies received), and how they are maintained."
msgstr ""
#: i2p2www/pages/site/docs/tunnels/implementation.html:291
msgid ""
-"Beyond the two types of tunnels - inbound and outbound - there are two styles\n"
+"Beyond the two types of tunnels - inbound and outbound - there are two "
+"styles\n"
"of peer selection used for different tunnels - exploratory and client.\n"
-"Exploratory tunnels are used for both network database maintenance and tunnel\n"
+"Exploratory tunnels are used for both network database maintenance and "
+"tunnel\n"
"maintenance, while client tunnels are used for end to end client messages."
msgstr ""
@@ -14935,12 +17187,18 @@ msgstr ""
#: i2p2www/pages/site/docs/tunnels/implementation.html:301
msgid ""
-"Exploratory tunnels are built out of a random selection of peers from a subset\n"
-"of the network. The particular subset varies on the local router and on what their\n"
-"tunnel routing needs are. In general, the exploratory tunnels are built out of\n"
-"randomly selected peers who are in the peer's \"not failing but active\" profile\n"
-"category. The secondary purpose of the tunnels, beyond merely tunnel routing,\n"
-"is to find underutilized high capacity peers so that they can be promoted for\n"
+"Exploratory tunnels are built out of a random selection of peers from a "
+"subset\n"
+"of the network. The particular subset varies on the local router and on "
+"what their\n"
+"tunnel routing needs are. In general, the exploratory tunnels are built "
+"out of\n"
+"randomly selected peers who are in the peer's \"not failing but active\" "
+"profile\n"
+"category. The secondary purpose of the tunnels, beyond merely tunnel "
+"routing,\n"
+"is to find underutilized high capacity peers so that they can be promoted"
+" for\n"
"use in client tunnels."
msgstr ""
@@ -14957,10 +17215,14 @@ msgstr ""
#: i2p2www/pages/site/docs/tunnels/implementation.html:319
msgid ""
-"Client tunnels are built with a more stringent set of requirements - the local\n"
-"router will select peers out of its \"fast and high capacity\" profile category so\n"
-"that performance and reliability will meet the needs of the client application.\n"
-"However, there are several important details beyond that basic selection that \n"
+"Client tunnels are built with a more stringent set of requirements - the "
+"local\n"
+"router will select peers out of its \"fast and high capacity\" profile "
+"category so\n"
+"that performance and reliability will meet the needs of the client "
+"application.\n"
+"However, there are several important details beyond that basic selection "
+"that \n"
"should be adhered to, depending upon the client's anonymity needs."
msgstr ""
@@ -14986,8 +17248,10 @@ msgstr ""
#: i2p2www/pages/site/docs/tunnels/implementation.html:341
msgid ""
"To frustrate the predecessor \n"
-"attack, the tunnel selection keeps the peers selected in a strict order -\n"
-"if A, B, and C are in a tunnel for a particular tunnel pool, the hop after A is always B, and the hop after\n"
+"attack, the tunnel selection keeps the peers selected in a strict order -"
+"\n"
+"if A, B, and C are in a tunnel for a particular tunnel pool, the hop "
+"after A is always B, and the hop after\n"
"B is always C."
msgstr ""
@@ -14996,15 +17260,18 @@ msgid ""
"Ordering is implemented by generating a random 32-byte key for each\n"
"tunnel pool at startup.\n"
"Peers should not be able to guess the ordering, or an attacker could\n"
-"craft two router hashes far apart to maximize the chance of being at both\n"
+"craft two router hashes far apart to maximize the chance of being at both"
+"\n"
"ends of a tunnel.\n"
"Peers are sorted by XOR distance of the\n"
-"SHA256 Hash of (the peer's hash concatenated with the random key) from the random key"
+"SHA256 Hash of (the peer's hash concatenated with the random key) from "
+"the random key"
msgstr ""
#: i2p2www/pages/site/docs/tunnels/implementation.html:363
msgid ""
-"Because each tunnel pool uses a different random key, ordering is consistent\n"
+"Because each tunnel pool uses a different random key, ordering is "
+"consistent\n"
"within a single pool but not between different pools.\n"
"New keys are generated at each router restart."
msgstr ""
@@ -15016,7 +17283,8 @@ msgstr ""
#: i2p2www/pages/site/docs/tunnels/implementation.html:372
#, python-format
msgid ""
-"A multi-hop tunnel is built using a single build message which is repeatedly\n"
+"A multi-hop tunnel is built using a single build message which is "
+"repeatedly\n"
"decrypted and forwarded. In the terminology of\n"
"Hashing it out in Public,\n"
"this is \"non-interactive\" telescopic tunnel building."
@@ -15027,28 +17295,38 @@ msgstr ""
msgid ""
"This tunnel request preparation, delivery, and response method is\n"
"designed to reduce the number of\n"
-"predecessors exposed, cuts the number of messages transmitted, verifies proper\n"
-"connectivity, and avoids the message counting attack of traditional telescopic\n"
+"predecessors exposed, cuts the number of messages transmitted, verifies "
+"proper\n"
+"connectivity, and avoids the message counting attack of traditional "
+"telescopic\n"
"tunnel creation.\n"
-"(This method, which sends messages to extend a tunnel through the already-established\n"
-"part of the tunnel, is termed \"interactive\" telescopic tunnel building in\n"
+"(This method, which sends messages to extend a tunnel through the "
+"already-established\n"
+"part of the tunnel, is termed \"interactive\" telescopic tunnel building "
+"in\n"
"the \"Hashing it out\" paper.)"
msgstr ""
#: i2p2www/pages/site/docs/tunnels/implementation.html:390
#, python-format
msgid ""
-"The details of tunnel request and response messages, and their encryption,\n"
+"The details of tunnel request and response messages, and their "
+"encryption,\n"
"are specified here."
msgstr ""
#: i2p2www/pages/site/docs/tunnels/implementation.html:395
msgid ""
-"Peers may reject tunnel creation requests for a variety of reasons, though\n"
-"a series of four increasingly severe rejections are known: probabilistic rejection\n"
-"(due to approaching the router's capacity, or in response to a flood of requests), \n"
-"transient overload, bandwidth overload, and critical failure. When received, \n"
-"those four are interpreted by the tunnel creator to help adjust their profile of\n"
+"Peers may reject tunnel creation requests for a variety of reasons, "
+"though\n"
+"a series of four increasingly severe rejections are known: probabilistic "
+"rejection\n"
+"(due to approaching the router's capacity, or in response to a flood of "
+"requests), \n"
+"transient overload, bandwidth overload, and critical failure. When "
+"received, \n"
+"those four are interpreted by the tunnel creator to help adjust their "
+"profile of\n"
"the router in question."
msgstr ""
@@ -15066,26 +17344,37 @@ msgstr ""
#: i2p2www/pages/site/docs/tunnels/implementation.html:412
#, python-format
msgid ""
-"To allow efficient operation, the router maintains a series of tunnel pools,\n"
-"each managing a group of tunnels used for a specific purpose with their own\n"
-"configuration. When a tunnel is needed for that purpose, the router selects one\n"
-"out of the appropriate pool at random. Overall, there are two exploratory tunnel\n"
-"pools - one inbound and one outbound - each using the router's default configuration.\n"
+"To allow efficient operation, the router maintains a series of tunnel "
+"pools,\n"
+"each managing a group of tunnels used for a specific purpose with their "
+"own\n"
+"configuration. When a tunnel is needed for that purpose, the router "
+"selects one\n"
+"out of the appropriate pool at random. Overall, there are two "
+"exploratory tunnel\n"
+"pools - one inbound and one outbound - each using the router's default "
+"configuration.\n"
"In addition, there is a pair of pools for each local destination -\n"
-"one inbound and one outbound tunnel pool. Those pools use the configuration specified\n"
-"when the local destination connects to the router via I2CP, or the router's defaults if\n"
+"one inbound and one outbound tunnel pool. Those pools use the "
+"configuration specified\n"
+"when the local destination connects to the router via I2CP, or the router's defaults if\n"
"not specified."
msgstr ""
#: i2p2www/pages/site/docs/tunnels/implementation.html:424
#, python-format
msgid ""
-"Each pool has within its configuration a few key settings, defining how many\n"
-"tunnels to keep active, how many backup tunnels to maintain in case of failure,\n"
+"Each pool has within its configuration a few key settings, defining how "
+"many\n"
+"tunnels to keep active, how many backup tunnels to maintain in case of "
+"failure,\n"
"how long the tunnels should be, whether those\n"
"lengths should be randomized, as \n"
-"well as any of the other settings allowed when configuring individual tunnels.\n"
-"Configuration options are specified on the I2CP page."
+"well as any of the other settings allowed when configuring individual "
+"tunnels.\n"
+"Configuration options are specified on the I2CP "
+"page."
msgstr ""
#: i2p2www/pages/site/docs/tunnels/implementation.html:434
@@ -15102,14 +17391,20 @@ msgstr ""
#: i2p2www/pages/site/docs/tunnels/implementation.html:440
msgid ""
-"Tunnel building is expensive, and tunnels expire a fixed time after they are built.\n"
-"However, when a pool that runs out of tunnels, the Destination is essentially dead.\n"
-"In addition, tunnel build success rate may vary greatly with both local and global\n"
+"Tunnel building is expensive, and tunnels expire a fixed time after they "
+"are built.\n"
+"However, when a pool that runs out of tunnels, the Destination is "
+"essentially dead.\n"
+"In addition, tunnel build success rate may vary greatly with both local "
+"and global\n"
"network conditions.\n"
-"Therefore, it is important to maintain an anticipatory, adaptive build strategy\n"
-"to ensure that new tunnels are successfully built before they are needed,\n"
+"Therefore, it is important to maintain an anticipatory, adaptive build "
+"strategy\n"
+"to ensure that new tunnels are successfully built before they are needed,"
+"\n"
"without building an excess of tunnels, building them too soon,\n"
-"or consuming too much CPU or bandwidth creating and sending the encrypted build messages."
+"or consuming too much CPU or bandwidth creating and sending the encrypted"
+" build messages."
msgstr ""
#: i2p2www/pages/site/docs/tunnels/implementation.html:451
@@ -15117,7 +17412,8 @@ msgid ""
"For each tuple {exploratory/client, in/out, length, length variance}\n"
"the router maintains statistics on the time required for a successful\n"
"tunnel build.\n"
-"Using these statistics, it calculates how long before a tunnel's expiration\n"
+"Using these statistics, it calculates how long before a tunnel's "
+"expiration\n"
"it should start attempting to build a replacement.\n"
"As the expiration time approaches without a successful replacement,\n"
"it starts multiple build attempts in parallel, and then\n"
@@ -15139,18 +17435,30 @@ msgstr ""
#: i2p2www/pages/site/docs/tunnels/implementation.html:473
msgid ""
-"Even though the tunnels within I2P bear a resemblance to a circuit switched\n"
-"network, everything within I2P is strictly message based - tunnels are merely\n"
-"accounting tricks to help organize the delivery of messages. No assumptions are\n"
-"made regarding reliability or ordering of messages, and retransmissions are left\n"
-"to higher levels (e.g. I2P's client layer streaming library). This allows I2P\n"
-"to take advantage of throttling techniques available to both packet switched and\n"
-"circuit switched networks. For instance, each router may keep track of the \n"
-"moving average of how much data each tunnel is using, combine that with all of \n"
-"the averages used by other tunnels the router is participating in, and be able\n"
-"to accept or reject additional tunnel participation requests based on its \n"
-"capacity and utilization. On the other hand, each router can simply drop \n"
-"messages that are beyond its capacity, exploiting the research used on the \n"
+"Even though the tunnels within I2P bear a resemblance to a circuit "
+"switched\n"
+"network, everything within I2P is strictly message based - tunnels are "
+"merely\n"
+"accounting tricks to help organize the delivery of messages. No "
+"assumptions are\n"
+"made regarding reliability or ordering of messages, and retransmissions "
+"are left\n"
+"to higher levels (e.g. I2P's client layer streaming library). This "
+"allows I2P\n"
+"to take advantage of throttling techniques available to both packet "
+"switched and\n"
+"circuit switched networks. For instance, each router may keep track of "
+"the \n"
+"moving average of how much data each tunnel is using, combine that with "
+"all of \n"
+"the averages used by other tunnels the router is participating in, and be"
+" able\n"
+"to accept or reject additional tunnel participation requests based on its"
+" \n"
+"capacity and utilization. On the other hand, each router can simply drop"
+" \n"
+"messages that are beyond its capacity, exploiting the research used on "
+"the \n"
"normal Internet."
msgstr ""
@@ -15158,16 +17466,23 @@ msgstr ""
msgid ""
"In the current implementation, routers implement a\n"
"weighted random early discard (WRED) strategy.\n"
-"For all participating routers (internal participant, inbound gateway, and outbound endpoint),\n"
+"For all participating routers (internal participant, inbound gateway, and"
+" outbound endpoint),\n"
"the router will start randomly dropping a portion of messages as the\n"
"bandwidth limits are approached.\n"
-"As traffic gets closer to, or exceeds, the limits, more messages are dropped.\n"
-"For an internal participant, all messages are fragmented and padded and therefore are the same size.\n"
-"At the inbound gateway and outbound endpoint, however, the dropping decision is made\n"
-"on the full (coalesced) message, and the message size is taken into account.\n"
+"As traffic gets closer to, or exceeds, the limits, more messages are "
+"dropped.\n"
+"For an internal participant, all messages are fragmented and padded and "
+"therefore are the same size.\n"
+"At the inbound gateway and outbound endpoint, however, the dropping "
+"decision is made\n"
+"on the full (coalesced) message, and the message size is taken into "
+"account.\n"
"Larger messages are more likely to be dropped.\n"
-"Also, messages are more likely to be dropped at the outbound endpoint than the inbound gateway,\n"
-"as those messages are not as \"far along\" in their journey and thus the network cost of\n"
+"Also, messages are more likely to be dropped at the outbound endpoint "
+"than the inbound gateway,\n"
+"as those messages are not as \"far along\" in their journey and thus the "
+"network cost of\n"
"dropping those messages is lower."
msgstr ""
@@ -15177,11 +17492,16 @@ msgstr ""
#: i2p2www/pages/site/docs/tunnels/implementation.html:509
msgid ""
-"What strategies could be used at the gateway and at each hop for delaying,\n"
-"reordering, rerouting, or padding messages? To what extent should this be done\n"
-"automatically, how much should be configured as a per tunnel or per hop setting,\n"
-"and how should the tunnel's creator (and in turn, user) control this operation?\n"
-"All of this is left as unknown, to be worked out for a distant future release."
+"What strategies could be used at the gateway and at each hop for "
+"delaying,\n"
+"reordering, rerouting, or padding messages? To what extent should this "
+"be done\n"
+"automatically, how much should be configured as a per tunnel or per hop "
+"setting,\n"
+"and how should the tunnel's creator (and in turn, user) control this "
+"operation?\n"
+"All of this is left as unknown, to be worked out for a distant future "
+"release."
msgstr ""
#: i2p2www/pages/site/docs/tunnels/implementation.html:518
@@ -15190,10 +17510,13 @@ msgstr ""
#: i2p2www/pages/site/docs/tunnels/implementation.html:519
msgid ""
-"The padding strategies can be used on a variety of levels, addressing the\n"
+"The padding strategies can be used on a variety of levels, addressing the"
+"\n"
"exposure of message size information to different adversaries.\n"
-"The current fixed tunnel message size is 1024 bytes. Within this however, the fragmented\n"
-"messages themselves are not padded by the tunnel at all, though for end to end \n"
+"The current fixed tunnel message size is 1024 bytes. Within this "
+"however, the fragmented\n"
+"messages themselves are not padded by the tunnel at all, though for end "
+"to end \n"
"messages, they may be padded as part of the garlic wrapping."
msgstr ""
@@ -15217,7 +17540,8 @@ msgstr ""
#: i2p2www/pages/site/docs/tunnels/unidirectional.html:7
msgid ""
-"This page describes the origins and design of I2P's unidirectional tunnels.\n"
+"This page describes the origins and design of I2P's unidirectional "
+"tunnels.\n"
"For further infomrmation see:"
msgstr ""
@@ -15251,7 +17575,8 @@ msgid ""
"Several apps and protocols, notably HTTP,\n"
"do transfer data in such manner. Having the traffic follow the same \n"
"route to its destination and back could make it easier for an \n"
-"attacker who has only timing and traffic volume data to infer the path a \n"
+"attacker who has only timing and traffic volume data to infer the path a"
+" \n"
"tunnel is taking.\n"
"Having the response come back along a different path arguably \n"
"makes it harder."
@@ -15260,27 +17585,42 @@ msgstr ""
#: i2p2www/pages/site/docs/tunnels/unidirectional.html:45
msgid ""
"When dealing with \n"
-"an internal adversary or most external adversaries, I2P's undirectional tunnels\n"
-"expose half as much traffic data than would be exposed with bidirectional circuits\n"
-"by simply looking at the flows themselves - an HTTP request and response would \n"
-"follow the same path in Tor, while in I2P the packets making up the request \n"
-"would go out through one or more outbound tunnels and the packets making up \n"
-"the response would come back through one or more different inbound tunnels."
+"an internal adversary or most external adversaries, I2P's undirectional "
+"tunnels\n"
+"expose half as much traffic data than would be exposed with bidirectional"
+" circuits\n"
+"by simply looking at the flows themselves - an HTTP request and response "
+"would \n"
+"follow the same path in Tor, while in I2P the packets making up the "
+"request \n"
+"would go out through one or more outbound tunnels and the packets making "
+"up \n"
+"the response would come back through one or more different inbound "
+"tunnels."
msgstr ""
#: i2p2www/pages/site/docs/tunnels/unidirectional.html:55
msgid ""
"The strategy of using two separate tunnels for inbound and outbound\n"
-"communication is not the only technique available, and it does have anonymity\n"
-"implications. On the positive side, by using separate tunnels it lessens the\n"
-"traffic data exposed for analysis to participants in a tunnel - for instance,\n"
-"peers in an outbound tunnel from a web browser would only see the traffic of\n"
+"communication is not the only technique available, and it does have "
+"anonymity\n"
+"implications. On the positive side, by using separate tunnels it lessens"
+" the\n"
+"traffic data exposed for analysis to participants in a tunnel - for "
+"instance,\n"
+"peers in an outbound tunnel from a web browser would only see the traffic"
+" of\n"
"an HTTP GET, while the peers in an inbound tunnel would see the payload \n"
-"delivered along the tunnel. With bidirectional tunnels, all participants would\n"
-"have access to the fact that e.g. 1KB was sent in one direction, then 100KB\n"
-"in the other. On the negative side, using unidirectional tunnels means that\n"
-"there are two sets of peers which need to be profiled and accounted for, and\n"
-"additional care must be taken to address the increased speed of predecessor\n"
+"delivered along the tunnel. With bidirectional tunnels, all participants"
+" would\n"
+"have access to the fact that e.g. 1KB was sent in one direction, then "
+"100KB\n"
+"in the other. On the negative side, using unidirectional tunnels means "
+"that\n"
+"there are two sets of peers which need to be profiled and accounted for, "
+"and\n"
+"additional care must be taken to address the increased speed of "
+"predecessor\n"
"attacks. The tunnel pooling and building process\n"
"(peer selection and ordering strategies)\n"
"should minimize the worries of the predecessor attack."
@@ -15294,22 +17634,28 @@ msgstr ""
#, python-format
msgid ""
"A recent paper by Hermann and Grothoff\n"
-"declared that I2P's unidirectional tunnels \"seems to be a bad design decision\"."
+"declared that I2P's unidirectional tunnels \"seems to be a bad design "
+"decision\"."
msgstr ""
#: i2p2www/pages/site/docs/tunnels/unidirectional.html:80
msgid ""
"The paper's main point is that\n"
-"deanonymizations on unidirectional tunnels take a longer time, which is an \n"
-"advantage, but that an attacker can be more certain in the unidirectional case. \n"
-"Therefore, the paper claims it isn't an advantage at all, but a disadvantage, at least\n"
+"deanonymizations on unidirectional tunnels take a longer time, which is "
+"an \n"
+"advantage, but that an attacker can be more certain in the unidirectional"
+" case. \n"
+"Therefore, the paper claims it isn't an advantage at all, but a "
+"disadvantage, at least\n"
"with long-living eepsites."
msgstr ""
#: i2p2www/pages/site/docs/tunnels/unidirectional.html:88
msgid ""
-"This conclusion is not fully supported by the paper. Unidirectional tunnels clearly \n"
-"mitigate other attacks and it's not clear how to trade off the risk of the \n"
+"This conclusion is not fully supported by the paper. Unidirectional "
+"tunnels clearly \n"
+"mitigate other attacks and it's not clear how to trade off the risk of "
+"the \n"
"attack in the paper\n"
"with attacks on a bidirectional tunnel architecture."
msgstr ""
@@ -15318,45 +17664,63 @@ msgstr ""
msgid ""
"This conclusion is based on an arbitrary certainty vs. time weighting \n"
"(tradeoff) that may not be applicable in all cases. For \n"
-"example, somebody could make a list of possible IPs then issue subpoenas to \n"
+"example, somebody could make a list of possible IPs then issue subpoenas "
+"to \n"
"each. Or the attacker could DDoS each in turn and via a simple \n"
-"intersection attack see if the eepsite goes down or is slowed down. So close \n"
+"intersection attack see if the eepsite goes down or is slowed down. So "
+"close \n"
"may be good enough, or time may be more important."
msgstr ""
#: i2p2www/pages/site/docs/tunnels/unidirectional.html:104
msgid ""
-"The conclusion is based on a specific weighting of the importance of certainty \n"
-"vs. time, and that weighting may be wrong, and it's definitely debatable, \n"
-"especially in a real world with subpoenas, search warrants, and other methods \n"
+"The conclusion is based on a specific weighting of the importance of "
+"certainty \n"
+"vs. time, and that weighting may be wrong, and it's definitely debatable,"
+" \n"
+"especially in a real world with subpoenas, search warrants, and other "
+"methods \n"
"available for final confirmation."
msgstr ""
#: i2p2www/pages/site/docs/tunnels/unidirectional.html:111
msgid ""
"A full analysis of the tradeoffs of unidirectional vs. bidirectional \n"
-"tunnels is clearly outside the scope of the paper, and has not been done \n"
-"elsewhere. For example, how does this attack compare to the numerous possible \n"
-"timing attacks published about onion-routed networks? Clearly the authors have not\n"
+"tunnels is clearly outside the scope of the paper, and has not been done"
+" \n"
+"elsewhere. For example, how does this attack compare to the numerous "
+"possible \n"
+"timing attacks published about onion-routed networks? Clearly the authors"
+" have not\n"
"done that analysis, if it's even possible to do it\n"
"effectively."
msgstr ""
#: i2p2www/pages/site/docs/tunnels/unidirectional.html:120
msgid ""
-"Tor uses bidirectional tunnels and has had a lot of academic review. I2P \n"
-"uses unidirectional tunnels and has had very little review. Does the lack of a \n"
-"research paper defending unidirectional tunnels mean that it is a poor design \n"
+"Tor uses bidirectional tunnels and has had a lot of academic review. I2P"
+" \n"
+"uses unidirectional tunnels and has had very little review. Does the lack"
+" of a \n"
+"research paper defending unidirectional tunnels mean that it is a poor "
+"design \n"
"choice, or just that it needs more study? Timing attacks and \n"
-"distributed attacks are difficult to defend against in both I2P and Tor. The \n"
-"design intent (see references above) was that unidirectional tunnels are more \n"
-"resistant to timing attacks. However, the paper presents a somewhat different type of timing \n"
+"distributed attacks are difficult to defend against in both I2P and Tor. "
+"The \n"
+"design intent (see references above) was that unidirectional tunnels are "
+"more \n"
+"resistant to timing attacks. However, the paper presents a somewhat "
+"different type of timing \n"
"attack. Is this attack, innovative as it is, sufficient to label I2P's \n"
"tunnel architecture (and thus I2P as a whole) a \"bad design\", and by \n"
-"implication clearly inferior to Tor, or is it just a design alternative that \n"
-"clearly needs further investigation and analysis? There are several other reasons \n"
-"to consider I2P currently inferior to Tor and other projects (small network \n"
-"size, lack of funding, lack of review) but is unidirectional tunnels really a \n"
+"implication clearly inferior to Tor, or is it just a design alternative "
+"that \n"
+"clearly needs further investigation and analysis? There are several other"
+" reasons \n"
+"to consider I2P currently inferior to Tor and other projects (small "
+"network \n"
+"size, lack of funding, lack of review) but is unidirectional tunnels "
+"really a \n"
"reason?"
msgstr ""
@@ -15367,3 +17731,4 @@ msgid ""
"tunnels are unequivocally inferior to bidirectional tunnels\", yet this \n"
"conclusion is not supported by the paper."
msgstr ""
+
diff --git a/i2p2www/translations/it/LC_MESSAGES/get-involved.po b/i2p2www/translations/it/LC_MESSAGES/get-involved.po
index d773a32b..1d0ba92d 100644
--- a/i2p2www/translations/it/LC_MESSAGES/get-involved.po
+++ b/i2p2www/translations/it/LC_MESSAGES/get-involved.po
@@ -1,7 +1,7 @@
-# Translations template for I2P.
+# Italian translations for I2P.
# Copyright (C) 2014 ORGANIZATION
# This file is distributed under the same license as the I2P project.
-#
+#
# Translators:
# alxbrb i2p.i2p
) has been set up to "
-"enable developers to easily set up two of the commonly-used IDEs for Java "
-"development: Eclipse and NetBeans."
+"The main I2P development branch (i2p.i2p
) has been set up to"
+" enable developers to easily set up two of the commonly-used IDEs for "
+"Java development: Eclipse and NetBeans."
msgstr ""
#: i2p2www/pages/site/get-involved/guides/ides.html:10
msgid ""
-"The main I2P development branches (i2p.i2p
and branches from "
-"it) contain .project and .classpath Eclipse files, to enable the branch to "
-"be easily set up in Eclipse."
+"The main I2P development branches (i2p.i2p
and branches from"
+" it) contain .project and .classpath Eclipse files, to enable the branch "
+"to be easily set up in Eclipse."
msgstr ""
#: i2p2www/pages/site/get-involved/guides/ides.html:16
@@ -2326,8 +2636,8 @@ msgstr ""
#: i2p2www/pages/site/get-involved/guides/ides.html:20
msgid ""
-"Open Eclipse and create a new Workspace, based in the directory that the I2P"
-" branch was checked out to."
+"Open Eclipse and create a new Workspace, based in the directory that the "
+"I2P branch was checked out to."
msgstr ""
#: i2p2www/pages/site/get-involved/guides/ides.html:24
@@ -2338,8 +2648,8 @@ msgstr ""
#: i2p2www/pages/site/get-involved/guides/ides.html:28
msgid ""
-"For \"Select root directory:\" choose the directory that the I2P branch was "
-"checked out to."
+"For \"Select root directory:\" choose the directory that the I2P branch "
+"was checked out to."
msgstr ""
#: i2p2www/pages/site/get-involved/guides/ides.html:32
@@ -2352,14 +2662,14 @@ msgstr ""
#: i2p2www/pages/site/get-involved/guides/ides.html:40
msgid ""
-"Done! Your workspace should now contain all projects within the I2P branch, "
-"and their build dependencies should be correctly set up."
+"Done! Your workspace should now contain all projects within the I2P "
+"branch, and their build dependencies should be correctly set up."
msgstr ""
#: i2p2www/pages/site/get-involved/guides/ides.html:48
msgid ""
-"The main I2P development branches (i2p.i2p
and branches from "
-"it) contain NetBeans project files."
+"The main I2P development branches (i2p.i2p
and branches from"
+" it) contain NetBeans project files."
msgstr ""
#: i2p2www/pages/site/get-involved/guides/monotone.html:2
@@ -2438,26 +2748,34 @@ msgstr ""
#: i2p2www/pages/site/get-involved/guides/monotone.html:32
#, python-format
msgid ""
-"This is a revised version of Complication's original\n"
+"This is a revised version of Complication's original\n"
" guide detailing the use of Monotone in I2P development.\n"
-" For basic instructions see the quick-start guide."
+" For basic instructions see the quick-start "
+"guide."
msgstr ""
#: i2p2www/pages/site/get-involved/guides/monotone.html:40
#, python-format
msgid ""
-"I2P has a distributed development model. The source code is replicated across\n"
-" independently administered Monotone (\"MTN\") repositories.\n"
-" Developers with commit rights are able to push their changes to the repository\n"
-" (a license agreement needs to be signed\n"
+"I2P has a distributed development model. The source code is replicated "
+"across\n"
+" independently administered Monotone (\"MTN\") repositories.\n"
+" Developers with commit rights are able to push their changes to the "
+"repository\n"
+" (a license agreement needs to be "
+"signed\n"
" before commit rights are granted)."
msgstr ""
#: i2p2www/pages/site/get-involved/guides/monotone.html:50
msgid ""
"Some of Monotone's noteworthy qualities are: distributed\n"
-" version control, cryptographic authentication, access control, its small size, having few\n"
-" dependencies, storage of projects in a compressed SQLite database file, and\n"
+" version control, cryptographic authentication, access control, its "
+"small size, having few\n"
+" dependencies, storage of projects in a compressed SQLite database file,"
+" and\n"
" having the ability to resume interrupted synchronization attempts."
msgstr ""
@@ -2467,16 +2785,20 @@ msgstr ""
#: i2p2www/pages/site/get-involved/guides/monotone.html:64
msgid ""
-"A transport key grants you the ability to push your changes to a Monotone repository server.\n"
-" In order to commit code into Monotone (in essence signing your code), a commit key is also needed.\n"
-" None of the public Monotone servers on I2P currently require a key in order to read (or pull) the source code."
+"A transport key grants you the ability to push your changes to a Monotone"
+" repository server.\n"
+" In order to commit code into Monotone (in essence signing your code), a"
+" commit key is also needed.\n"
+" None of the public Monotone servers on I2P currently require a key in "
+"order to read (or pull) the source code."
msgstr ""
#: i2p2www/pages/site/get-involved/guides/monotone.html:72
msgid ""
"Without a transport key, one cannot:\n"
" $HOME/.monotone/keys
in text files which\n"
+"Monotone stores keys under $HOME/.monotone/keys
in "
+"text files which\n"
" are named identically to the keys. For example:"
msgstr ""
@@ -2517,8 +2842,10 @@ msgstr ""
#: i2p2www/pages/site/get-involved/guides/monotone.html:131
msgid ""
-"Monotone will prompt you for a password to protect your keys. You are very strongly encouraged to set a password\n"
-" for the commit key. Many users will leave an empty password for the transport key, especially those running a\n"
+"Monotone will prompt you for a password to protect your keys. You are "
+"very strongly encouraged to set a password\n"
+" for the commit key. Many users will leave an empty password for the "
+"transport key, especially those running a\n"
" Monotone server."
msgstr ""
@@ -2528,30 +2855,38 @@ msgstr ""
#: i2p2www/pages/site/get-involved/guides/monotone.html:143
msgid ""
-"Monotone's security model helps to ensure that nobody can easily impersonate a developer without\n"
-" it being noticed. Since developers can make mistakes and become compromised,only manual review can\n"
-" ensure quality of code. Monotone's trust model will ensure that you read the right diffs. It does\n"
+"Monotone's security model helps to ensure that nobody can easily "
+"impersonate a developer without\n"
+" it being noticed. Since developers can make mistakes and become "
+"compromised,only manual review can\n"
+" ensure quality of code. Monotone's trust model will ensure that you "
+"read the right diffs. It does\n"
" not replace reading diffs."
msgstr ""
#: i2p2www/pages/site/get-involved/guides/monotone.html:153
msgid ""
-"A Monotone repository is a single file (a compressed SQLite database) which "
-"contains all of the project's source code and history."
+"A Monotone repository is a single file (a compressed SQLite database) "
+"which contains all of the project's source code and history."
msgstr ""
#: i2p2www/pages/site/get-involved/guides/monotone.html:159
msgid ""
-"After importing the developers' keys into Monotone and\n"
-" setting up trust evaluation hooks,\n"
-" Monotone will prevent untrusted code from being checked out into your workspace.\n"
-" There are commands available to clean untrusted code from your workspace but in practice they've not been\n"
+"After importing the "
+"developers' keys into Monotone and\n"
+" setting up trust "
+"evaluation hooks,\n"
+" Monotone will prevent untrusted code from being checked out into your "
+"workspace.\n"
+" There are commands available to clean untrusted code from your "
+"workspace but in practice they've not been\n"
" needed due to the push access policies in place."
msgstr ""
#: i2p2www/pages/site/get-involved/guides/monotone.html:169
msgid ""
-"A repository can hold many branches. For example, our repository holds the\n"
+"A repository can hold many branches. For example, our repository holds "
+"the\n"
" following main branches:"
msgstr ""
@@ -2569,17 +2904,23 @@ msgstr ""
#: i2p2www/pages/site/get-involved/guides/monotone.html:181
msgid ""
-"By convention, the I2P Monotone repository is named i2p.mtn
. Before pulling\n"
-" source code from servers, a database for your repository will need to be initialized.\n"
-" To initialize your local repository, change into the directory that you want the\n"
-" i2p.mtn
file and branch directories to be stored and issue the following\n"
+"By convention, the I2P Monotone repository is named i2p.mtn
."
+" Before pulling\n"
+" source code from servers, a database for your repository will need to "
+"be initialized.\n"
+" To initialize your local repository, change into the directory that you"
+" want the\n"
+" i2p.mtn
file and branch directories to be stored and issue"
+" the following\n"
" command:"
msgstr ""
#: i2p2www/pages/site/get-involved/guides/monotone.html:197
msgid ""
-"Keys which developers use to commit code are essential for trust evaluation in\n"
-" Monotone. The other developers' transport keys are only required for Monotone server operators.\n"
+"Keys which developers use to commit code are essential for trust "
+"evaluation in\n"
+" Monotone. The other developers' transport keys are only required for "
+"Monotone server operators.\n"
" "
msgstr ""
@@ -2593,8 +2934,11 @@ msgstr ""
#: i2p2www/pages/site/get-involved/guides/monotone.html:210
#, python-format
msgid ""
-"To import developers' keys after verifying their authenticity, copy all of the keys into a new\n"
-" file. Create this file (e.g. keys.txt
) in the same directory where i2p.mtn
is located. Import the keys with the command:"
+"To import developers' keys after verifying their authenticity, copy all of the keys into a new\n"
+" file. Create this file (e.g. keys.txt
) in the same "
+"directory where i2p.mtn
is located. Import the keys with the"
+" command:"
msgstr ""
#: i2p2www/pages/site/get-involved/guides/monotone.html:220
@@ -2605,27 +2949,34 @@ msgstr ""
#: i2p2www/pages/site/get-involved/guides/monotone.html:228
msgid ""
-"The default Monotone trust policy is way too lax for our requirements: every committer is trusted by default.\n"
+"The default Monotone trust policy is way too lax for our requirements: "
+"every committer is trusted by default.\n"
" That is not acceptable for I2P development."
msgstr ""
#: i2p2www/pages/site/get-involved/guides/monotone.html:235
msgid ""
-"Change into the directory $HOME/.monotone
and open the file\n"
-" monotonerc
with a text editor. Copy and paste the following two functions into this file:"
+"Change into the directory $HOME/.monotone
and open "
+"the file\n"
+" monotonerc
with a text editor. Copy and paste the "
+"following two functions into this file:"
msgstr ""
#: i2p2www/pages/site/get-involved/guides/monotone.html:244
msgid ""
-"The first function determines an intersection between two sets, in our case a\n"
+"The first function determines an intersection between two sets, in our "
+"case a\n"
" revision's signers and trusted signers."
msgstr ""
#: i2p2www/pages/site/get-involved/guides/monotone.html:251
msgid ""
-"The second function determines trust in a given revision, by calling the first\n"
-" function with \"signers\" and \"trusted\" as arguments. If the intersection is\n"
-" null, the revision is not trusted. If the intersection is not empty, the\n"
+"The second function determines trust in a given revision, by calling the "
+"first\n"
+" function with \"signers\" and \"trusted\" as arguments. If the "
+"intersection is\n"
+" null, the revision is not trusted. If the intersection is not empty, "
+"the\n"
" revision is trusted. Otherwise, the revision is not trusted."
msgstr ""
@@ -2638,14 +2989,18 @@ msgstr ""
#: i2p2www/pages/site/get-involved/guides/monotone.html:268
msgid ""
-"I2P is shipped with a pre-configured tunnel pointing to the project Monotone server. Ensure that the tunnel has been started\n"
-" within I2PTunnel before attempting to pull the source code from 127.0.0.1:8998."
+"I2P is shipped with a pre-configured tunnel pointing to the project "
+"Monotone server. Ensure that the tunnel has been started\n"
+" within I2PTunnel before"
+" attempting to pull the source code from 127.0.0.1:8998."
msgstr ""
#: i2p2www/pages/site/get-involved/guides/monotone.html:275
msgid ""
-"Enter the directory where you initialized i2p.mtn
. Depending on whether you\n"
-" want only I2P sources, or also sources for the I2P website and Syndie, you can\n"
+"Enter the directory where you initialized i2p.mtn
. Depending"
+" on whether you\n"
+" want only I2P sources, or also sources for the I2P website and Syndie, "
+"you can\n"
" perform the pull
operation in different ways."
msgstr ""
@@ -2659,14 +3014,16 @@ msgstr ""
#: i2p2www/pages/site/get-involved/guides/monotone.html:298
msgid ""
-"If the transfer aborts before completing sucessfully, simply repeating the "
-"pull command will resume the transfer."
+"If the transfer aborts before completing sucessfully, simply repeating "
+"the pull command will resume the transfer."
msgstr ""
#: i2p2www/pages/site/get-involved/guides/monotone.html:304
msgid ""
-"Pulling in the above examples is done anonymously by specifying an empty transport key.\n"
-" If everyone pulls anonymously it will be harder for an attacker who gains control of the server\n"
+"Pulling in the above examples is done anonymously by specifying an empty "
+"transport key.\n"
+" If everyone pulls anonymously it will be harder for an attacker who "
+"gains control of the server\n"
" to selectively provide some people with tampered data."
msgstr ""
@@ -2686,57 +3043,67 @@ msgstr ""
#: i2p2www/pages/site/get-involved/guides/monotone.html:326
msgid ""
-"With monotonerc
configured as above, Monotone will no longer trust any committers. Confirm this by changing into the\n"
-"directory where i2p.mtn
was created and attempt a checkout of the I2P branch:"
+"With monotonerc
configured as above, Monotone will no"
+" longer trust any committers. Confirm this by changing into the\n"
+"directory where i2p.mtn
was created and attempt a checkout "
+"of the I2P branch:"
msgstr ""
#: i2p2www/pages/site/get-involved/guides/monotone.html:336
msgid ""
-"A directory named i2p.i2p
should not appear. You should encounter many\n"
+"A directory named i2p.i2p
should not appear. You "
+"should encounter many\n"
" error messages like:"
msgstr ""
#: i2p2www/pages/site/get-involved/guides/monotone.html:353
msgid ""
"If you are satisfied with results, restore the backup of\n"
-" monotonerc
that was created above. If you didn't create a backup\n"
-" as advised, re-read Setting up trust evaluation hooks."
+" monotonerc
that was created above. If you didn't create a "
+"backup\n"
+" as advised, re-read Setting up trust evaluation hooks."
msgstr ""
#: i2p2www/pages/site/get-involved/guides/monotone.html:364
msgid ""
-"If you already have a branch checked out, skip to the next\n"
+"If you already have a branch checked out, skip to the next\n"
" section."
msgstr ""
#: i2p2www/pages/site/get-involved/guides/monotone.html:371
msgid ""
-"Change into the directory where i2p.mtn
is located. Over there "
-"issue:"
+"Change into the directory where i2p.mtn
is located. Over "
+"there issue:"
msgstr ""
#: i2p2www/pages/site/get-involved/guides/monotone.html:380
msgid ""
-"The checkout should complete without error messages and a directory named\n"
-" i2p.i2p
should appear in the current directory. Congratulations! You have\n"
+"The checkout should complete without error messages and a directory named"
+"\n"
+" i2p.i2p
should appear in the current directory. "
+"Congratulations! You have\n"
" successfully checked out the latest I2P sources, ready to be compiled."
msgstr ""
#: i2p2www/pages/site/get-involved/guides/monotone.html:391
msgid ""
-"If you haven't done this already, pull fresh code from the server to your local\n"
-" Monotone repository. To accomplish this, change into the directory where\n"
+"If you haven't done this already, pull fresh code from the server to your"
+" local\n"
+" Monotone repository. To accomplish this, change into the directory "
+"where\n"
" i2p.mtn
is located and issue:"
msgstr ""
#: i2p2www/pages/site/get-involved/guides/monotone.html:402
-msgid ""
-"Now change into your i2p.i2p
directory, and over there issue:"
+msgid "Now change into your i2p.i2p
directory, and over there issue:"
msgstr ""
#: i2p2www/pages/site/get-involved/guides/monotone.html:411
msgid ""
-"As long as there were no errors…Congratulations! You have successfully updated to the latest I2P sources. They\n"
+"As long as there were no errors…Congratulations! You have "
+"successfully updated to the latest I2P sources. They\n"
" should be ready to compile."
msgstr ""
@@ -2760,8 +3127,8 @@ msgstr ""
#: i2p2www/pages/site/get-involved/guides/monotone.html:449
msgid ""
-"No one will not be able to push code to your server without permission being"
-" explicitly granted. To grant push access:"
+"No one will not be able to push code to your server without permission "
+"being explicitly granted. To grant push access:"
msgstr ""
#: i2p2www/pages/site/get-involved/guides/monotone.html:455
@@ -2777,34 +3144,44 @@ msgstr ""
#: i2p2www/pages/site/get-involved/guides/monotone.html:466
msgid ""
-"Import the transport key(s) into your database. The procedure for importing transport keys is the same as for\n"
-"importing commit keys, which is described in the section Obtaining and deploying developers' keys."
+"Import the transport key(s) into your database. The procedure for "
+"importing transport keys is the same as for\n"
+"importing commit keys, which is described in the section Obtaining and deploying "
+"developers' keys."
msgstr ""
#: i2p2www/pages/site/get-involved/guides/monotone.html:476
msgid ""
-"A separate database should be used for your Monotone server because monotone will lock the database while it is served to others.\n"
+"A separate database should be used for your Monotone server because "
+"monotone will lock the database while it is served to others.\n"
" Make a copy of your development database, then start the server with:"
msgstr ""
#: i2p2www/pages/site/get-involved/guides/monotone.html:483
msgid ""
-"If your key is protected with a passphrase, Monotone may request the passphrase\n"
-" when the first client connects. You can work around this by connecting making the first client connection to your server\n"
+"If your key is protected with a passphrase, Monotone may request the "
+"passphrase\n"
+" when the first client connects. You can work around this by connecting "
+"making the first client connection to your server\n"
" (or by clearing the password for your transport key)."
msgstr ""
#: i2p2www/pages/site/get-involved/guides/monotone.html:491
msgid ""
-"For your server to be accessible for others over I2P, you will need to create a\n"
-" server tunnel for it. Use the \"Standard\" tunnel type and \"Bulk\" profile."
+"For your server to be accessible for others over I2P, you will need to "
+"create a\n"
+" server tunnel for it. Use the \"Standard\" tunnel type and \"Bulk\" "
+"profile."
msgstr ""
#: i2p2www/pages/site/get-involved/guides/monotone.html:501
msgid ""
"Debian (amongst other distributions) has integrated Monotone into their\n"
-" framework of daemons/services. Although Monotone servers can still be run\n"
-" \"the ordinary way\" on Debian systems, doing it the \"Debian way\" may be more straightforward."
+" framework of daemons/services. Although Monotone servers can still be "
+"run\n"
+" \"the ordinary way\" on Debian systems, doing it the \"Debian way\" may"
+" be more straightforward."
msgstr ""
#: i2p2www/pages/site/get-involved/guides/monotone.html:509
@@ -2812,7 +3189,8 @@ msgid ""
"Permissions are granted by editing the files\n"
" /etc/monotone/read-permissions
and\n"
" /etc/monotone/write-permissions
. You'll also need to edit\n"
-" /etc/default/monotone
to enable monotone to start at boot or to\n"
+" /etc/default/monotone
to enable monotone to start at boot "
+"or to\n"
" customize the host, port, or database location."
msgstr ""
@@ -2825,7 +3203,8 @@ msgid ""
"\n"
"So you want to start work on I2P? Great!\n"
"Here's a quick guide to getting started\n"
-"on contributing to the website or the software, doing development or creating translations."
+"on contributing to the website or the software, doing development or "
+"creating translations."
msgstr ""
#: i2p2www/pages/site/get-involved/guides/new-developers.html:9
@@ -2878,8 +3257,10 @@ msgstr "Tools"
#: i2p2www/pages/site/get-involved/guides/new-developers.html:29
msgid ""
-"Basic development on the I2P router or the embedded applications uses Java as the main development language.\n"
-"If you don't have experience with Java, you can always have a look at Thinking in Java."
+"Basic development on the I2P router or the embedded applications uses "
+"Java as the main development language.\n"
+"If you don't have experience with Java, you can always have a look at Thinking in Java."
msgstr ""
#: i2p2www/pages/site/get-involved/guides/new-developers.html:33
@@ -2889,7 +3270,8 @@ msgid ""
"the other \"how\" documents,\n"
"the tech intro,\n"
"and associated documents.\n"
-"These will give you a good overview of how I2P is structured and what different things it does."
+"These will give you a good overview of how I2P is structured and what "
+"different things it does."
msgstr ""
#: i2p2www/pages/site/get-involved/guides/new-developers.html:43
@@ -2902,19 +3284,22 @@ msgstr ""
msgid ""
"Install monotone.\n"
"Monotone is a version control system.\n"
-"We use it because it allows us to keep track of who does what changes to the source code (and for a lot of complicated things, but 'keeping track of changes' is the basic idea)."
+"We use it because it allows us to keep track of who does what changes to "
+"the source code (and for a lot of complicated things, but 'keeping track "
+"of changes' is the basic idea)."
msgstr ""
#: i2p2www/pages/site/get-involved/guides/new-developers.html:53
msgid ""
-"Skim over the monotone"
-" tutorial, to make sure you understand the concepts."
+"Skim over the monotone tutorial,"
+" to make sure you understand the concepts."
msgstr ""
#: i2p2www/pages/site/get-involved/guides/new-developers.html:57
msgid ""
-"If you want to remain anonymous, you need to do an additional step, to set "
-"up a connection to a monotone server over I2P:"
+"If you want to remain anonymous, you need to do an additional step, to "
+"set up a connection to a monotone server over I2P:"
msgstr ""
#: i2p2www/pages/site/get-involved/guides/new-developers.html:60
@@ -2932,22 +3317,24 @@ msgstr ""
#: i2p2www/pages/site/get-involved/guides/new-developers.html:67
msgid ""
-"Define the trust list by creating ~/.monotone/monotonerc
(or "
-"_MTN/monotonerc
in the i2p.i2p workspace) with the following "
-"contents:"
+"Define the trust list by creating ~/.monotone/monotonerc
(or"
+" _MTN/monotonerc
in the i2p.i2p workspace) with the "
+"following contents:"
msgstr ""
#: i2p2www/pages/site/get-involved/guides/new-developers.html:72
#, python-format
msgid ""
-"Copy and paste the developer's commit keys into a new file (e.g. keys.txt
) in the same directory\n"
-" that i2p.mtn
is in. Import the keys into your database with mtn -d i2p.mtn read < keys.txt
"
+"Copy and paste the developer's commit keys "
+"into a new file (e.g. keys.txt
) in the same directory\n"
+" that i2p.mtn
is in. Import the keys into your database "
+"with mtn -d i2p.mtn read < keys.txt
"
msgstr ""
#: i2p2www/pages/site/get-involved/guides/new-developers.html:76
msgid ""
-"Pull the I2P sources to your machine. This may take a long time, especially "
-"if you are doing this over I2P!"
+"Pull the I2P sources to your machine. This may take a long time, "
+"especially if you are doing this over I2P!"
msgstr ""
#: i2p2www/pages/site/get-involved/guides/new-developers.html:78
@@ -2960,20 +3347,20 @@ msgstr ""
#: i2p2www/pages/site/get-involved/guides/new-developers.html:83
msgid ""
-"Alternatively, instead of 'mtn.i2p2.de', you can also download from mtn.i2p-"
-"projekt.de."
+"Alternatively, instead of 'mtn.i2p2.de', you can also download from mtn"
+".i2p-projekt.de."
msgstr ""
#: i2p2www/pages/site/get-involved/guides/new-developers.html:90
msgid ""
-"All the sources are now present on your machine, in the database file. To "
-"make them available in a directory, you need to check them out:"
+"All the sources are now present on your machine, in the database file. To"
+" make them available in a directory, you need to check them out:"
msgstr ""
#: i2p2www/pages/site/get-involved/guides/new-developers.html:92
msgid ""
-"The above command creates a directory i2p.i2p, which contains all of the I2P"
-" sources."
+"The above command creates a directory i2p.i2p, which contains all of the "
+"I2P sources."
msgstr ""
#: i2p2www/pages/site/get-involved/guides/new-developers.html:96
@@ -2983,21 +3370,23 @@ msgstr ""
#: i2p2www/pages/site/get-involved/guides/new-developers.html:97
msgid ""
"\n"
-"To download the website files instead of the I2P source files, use 'i2p.www' instead of 'i2p.i2p'."
+"To download the website files instead of the I2P source files, use "
+"'i2p.www' instead of 'i2p.i2p'."
msgstr ""
#: i2p2www/pages/site/get-involved/guides/new-developers.html:100
msgid ""
"The initial pull may take several hours using the tunnel.\n"
-"If it fails after a partial pull, simply rerun it, it will start where it left off.\n"
+"If it fails after a partial pull, simply rerun it, it will start where it"
+" left off.\n"
"If you are in a hurry, use the non-anonymous access."
msgstr ""
#: i2p2www/pages/site/get-involved/guides/new-developers.html:105
#, python-format
msgid ""
-"A full list of branches, including i2p.i2p and i2p.www can be found on viewmtn."
+"A full list of branches, including i2p.i2p and i2p.www can be found on viewmtn."
msgstr ""
#: i2p2www/pages/site/get-involved/guides/new-developers.html:108
@@ -3010,11 +3399,13 @@ msgstr ""
#: i2p2www/pages/site/get-involved/guides/new-developers.html:114
#, python-format
msgid ""
-"To compile the code, you need the Sun Java Development Kit 6 or higher, or equivalent JDK\n"
+"To compile the code, you need the Sun Java Development Kit 6 or higher, "
+"or equivalent JDK\n"
"(Sun JDK 6 strongly recommended) and\n"
"Apache ant\n"
"version 1.7.0 or higher.\n"
-"If you go are working on the main I2P code, you can go into the i2p.i2p directory and run 'ant' to see the build options."
+"If you go are working on the main I2P code, you can go into the i2p.i2p "
+"directory and run 'ant' to see the build options."
msgstr ""
#: i2p2www/pages/site/get-involved/guides/new-developers.html:122
@@ -3043,8 +3434,10 @@ msgstr ""
#: i2p2www/pages/site/get-involved/guides/new-developers.html:143
#, python-format
msgid ""
-"See the bottom of the licenses page for\n"
-"commit privilege requirements. You need these to put code into i2p.i2p (not required for the website!)."
+"See the bottom of the licenses page "
+"for\n"
+"commit privilege requirements. You need these to put code into i2p.i2p "
+"(not required for the website!)."
msgstr ""
#: i2p2www/pages/site/get-involved/guides/new-developers.html:148
@@ -3089,32 +3482,42 @@ msgstr ""
#: i2p2www/pages/site/get-involved/guides/new-developers.html:163
#, python-format
msgid ""
-"The developers hang around on IRC. They can be reached on the Freenode network, OFTC, and on the I2P internal networks. The usual place to look is #i2p-dev. Join the channel and say hi!\n"
-"We also have additional guidelines for regular developers."
+"The developers hang around on IRC. They can be reached on the Freenode "
+"network, OFTC, and on the I2P internal networks. The usual place to look "
+"is #i2p-dev. Join the channel and say hi!\n"
+"We also have additional guidelines for regular"
+" developers."
msgstr ""
#: i2p2www/pages/site/get-involved/guides/new-developers.html:169
#, python-format
msgid ""
-"Website and router console translators: See the New Translator's Guide\n"
+"Website and router console translators: See the New Translator's Guide\n"
"for next steps."
msgstr ""
#: i2p2www/pages/site/get-involved/guides/new-developers.html:175
msgid ""
"I2P is open source software that is mostly developed using open sourced\n"
-"toolkits. The I2P project recently acquired a license for the YourKit Java\n"
-"Profiler. Open source projects are eligible to receive a free license provided\n"
-"that YourKit is referenced on the project web site. Please get in touch if you\n"
+"toolkits. The I2P project recently acquired a license for the YourKit "
+"Java\n"
+"Profiler. Open source projects are eligible to receive a free license "
+"provided\n"
+"that YourKit is referenced on the project web site. Please get in touch "
+"if you\n"
"are interested in profiling the I2P codebase."
msgstr ""
#: i2p2www/pages/site/get-involved/guides/new-developers.html:183
#, python-format
msgid ""
-"YourKit is kindly supporting open source projects with its full-featured Java Profiler.\n"
-"YourKit, LLC is the creator of innovative and intelligent tools for profiling\n"
-"Java and .NET applications. Take a look at YourKit's leading software products:\n"
+"YourKit is kindly supporting open source projects with its full-featured "
+"Java Profiler.\n"
+"YourKit, LLC is the creator of innovative and intelligent tools for "
+"profiling\n"
+"Java and .NET applications. Take a look at YourKit's leading software "
+"products:\n"
"YourKit Java Profiler and\n"
"YourKit .NET Profiler."
msgstr ""
@@ -3134,9 +3537,11 @@ msgstr ""
#: i2p2www/pages/site/get-involved/guides/new-translators.html:8
#, python-format
msgid ""
-"Translation of the website is done with .po files. The easiest way by far to\n"
+"Translation of the website is done with .po files. The easiest way by far"
+" to\n"
"translate the website is to sign up for an account at \n"
-"Transifex and request to join a translation team. \n"
+"Transifex and request to join a translation"
+" team. \n"
"Alternatively it can be done \"the old way\" as outlined below."
msgstr ""
@@ -3151,8 +3556,10 @@ msgstr ""
msgid ""
"Come to #i2p-dev on irc and talk to people.\n"
"Claim the language -\n"
-"To make sure other coworkers don't bump onto the files you are working on,\n"
-"please update the translation status on this wiki page."
+"To make sure other coworkers don't bump onto the files you are working "
+"on,\n"
+"please update the translation status on this wiki "
+"page."
msgstr ""
#: i2p2www/pages/site/get-involved/guides/new-translators.html:25
@@ -3172,9 +3579,12 @@ msgstr ""
#: i2p2www/pages/site/get-involved/guides/new-translators.html:38
msgid ""
-"Run \"./extract-messages.sh
\" to generate a messages.pot
in the base directory.\n"
-"Edit the header of this file, then run \"./init-new-po.sh locale
\" to generate the file\n"
-"i2p2www/translations/locale/LC_MESSAGES/messages.po
. \"mtn add
\" this file."
+"Run \"./extract-messages.sh
\" to generate a "
+"messages.pot
in the base directory.\n"
+"Edit the header of this file, then run \"./init-new-po.sh "
+"locale
\" to generate the file\n"
+"i2p2www/translations/locale/LC_MESSAGES/messages.po
. "
+"\"mtn add
\" this file."
msgstr ""
#: i2p2www/pages/site/get-involved/guides/new-translators.html:43
@@ -3185,23 +3595,27 @@ msgstr ""
#: i2p2www/pages/site/get-involved/guides/new-translators.html:46
msgid ""
-"Add a flag image file to i2p2www/static/images/flags/
for the "
-"menu (copy from the router)."
+"Add a flag image file to i2p2www/static/images/flags/
for "
+"the menu (copy from the router)."
msgstr ""
#: i2p2www/pages/site/get-involved/guides/new-translators.html:52
msgid ""
"Edit files:\n"
"Edit i2p2www/translations/locale/LC_MESSAGES/messages.po
.\n"
-"To work with .po files efficiently, you may wish to use POEdit"
+"To work with .po files efficiently, you may wish to use POEdit"
msgstr ""
#: i2p2www/pages/site/get-involved/guides/new-translators.html:58
#: i2p2www/pages/site/get-involved/guides/new-translators.html:151
msgid ""
"Check in:\n"
-"\"mtn pull
\", \"mtn update
\". Then check in by \"mtn ci -k yourname@mail.i2p file1 file2 ...
\"\n"
-"This collects the diff info of your changed file into your local repo. Then \"mtn sync mtn.i2p2.de -k yourname-transport@mail.i2p i2p.i2p
\".\n"
+"\"mtn pull
\", \"mtn update
\". Then check in by "
+"\"mtn ci -k yourname@mail.i2p file1 file2 ...
\"\n"
+"This collects the diff info of your changed file into your local repo. "
+"Then \"mtn sync mtn.i2p2.de -k yourname-transport@mail.i2p "
+"i2p.i2p
\".\n"
"This synchronizes your local repo with the repo on the target machine."
msgstr ""
@@ -3217,8 +3631,10 @@ msgstr ""
#: i2p2www/pages/site/get-involved/guides/new-translators.html:74
#, python-format
msgid ""
-"The easiest way by far to translate the router console is to sign up for an account at \n"
-"Transifex and request to join a translation team. \n"
+"The easiest way by far to translate the router console is to sign up for "
+"an account at \n"
+"Transifex and request to join a translation"
+" team. \n"
"Alternatively it can be done \"the old way\" as outlined below."
msgstr ""
@@ -3236,7 +3652,8 @@ msgstr ""
#: i2p2www/pages/site/get-involved/guides/new-translators.html:101
msgid ""
-"Before starting a console translation, better help translate some i2p webpages first.\n"
+"Before starting a console translation, better help translate some i2p "
+"webpages first.\n"
"At least an i2p homepage in your language would be great."
msgstr ""
@@ -3249,15 +3666,19 @@ msgstr ""
#: i2p2www/pages/site/get-involved/guides/new-translators.html:132
msgid ""
"Where xx is your language code like fr/de/ch/zh/...\n"
-"There may be or may not be files with your lang code. If not, you can create your own. by copying and renaming other language files you know with your own lang code."
+"There may be or may not be files with your lang code. If not, you can "
+"create your own. by copying and renaming other language files you know "
+"with your own lang code."
msgstr ""
#: i2p2www/pages/site/get-involved/guides/new-translators.html:137
msgid ""
"Create files:\n"
-"If the file for your language does not exist yet, copy another language file to a new file foo_xx.bar
for your language.\n"
+"If the file for your language does not exist yet, copy another language "
+"file to a new file foo_xx.bar
for your language.\n"
"Then \"mtn add
\" the file.\n"
-"After creating a .po file, edit the headers. Then run \"ant distclean poupdate
\"."
+"After creating a .po file, edit the headers. Then run \"ant "
+"distclean poupdate
\"."
msgstr ""
#: i2p2www/pages/site/get-involved/guides/new-translators.html:144
@@ -3265,13 +3686,15 @@ msgid ""
"Start to work:\n"
"Edit the HTML files with any text editor.\n"
"Be sure not to use an editor in HTML mode that reformats everything.\n"
-"To work with .po files efficiently, you may wish to use POEdit"
+"To work with .po files efficiently, you may wish to use POEdit"
msgstr ""
#: i2p2www/pages/site/get-involved/guides/new-translators.html:163
msgid ""
"As you can see, it's not that difficult.\n"
-"If you have questions about the meaning of the terms in the console, ask in #i2p-dev
on IRC."
+"If you have questions about the meaning of the terms in the console, ask "
+"in #i2p-dev
on IRC."
msgstr ""
#: i2p2www/pages/site/get-involved/guides/new-translators.html:169
@@ -3280,8 +3703,8 @@ msgstr "FAQ"
#: i2p2www/pages/site/get-involved/guides/new-translators.html:171
msgid ""
-"Q: Why do I have to install monotone, Java, jsp, learn about .po files and "
-"html, etc.? Why can't I just do a translation and email it to you?"
+"Q: Why do I have to install monotone, Java, jsp, learn about .po files "
+"and html, etc.? Why can't I just do a translation and email it to you?"
msgstr ""
#: i2p2www/pages/site/get-involved/guides/new-translators.html:175
@@ -3297,66 +3720,86 @@ msgstr ""
#: i2p2www/pages/site/get-involved/guides/new-translators.html:182
msgid ""
-"We don't have anybody who has time to accept manual contributions and submit"
-" them to our source control system on your behalf. Even if we did, it "
-"doesn't scale."
+"We don't have anybody who has time to accept manual contributions and "
+"submit them to our source control system on your behalf. Even if we did, "
+"it doesn't scale."
msgstr ""
#: i2p2www/pages/site/get-involved/guides/new-translators.html:186
msgid ""
"Maybe you are thinking translation is a one-step process. It isn't. You "
"can't do it all at once. You will make mistakes. You need to test it and "
-"tweak it to make it look right before you submit it. Developers will "
-"update or add to the English text, thus requiring a translation update."
+"tweak it to make it look right before you submit it. Developers "
+"will update or add to the English text, thus requiring a translation "
+"update."
msgstr ""
#: i2p2www/pages/site/get-involved/guides/new-translators.html:190
msgid ""
"Having translators use a source control system directly provides "
-"authentication and accountablility - we know who is doing what, and we can "
-"track changes, and revert them if necessary."
+"authentication and accountablility - we know who is doing what, and we "
+"can track changes, and revert them if necessary."
msgstr ""
#: i2p2www/pages/site/get-involved/guides/new-translators.html:194
msgid ""
-".po files are not difficult. If you don't want to work directly with them, "
-"we recommend 'poedit'."
-msgstr "I file .po non sono difficili. Se non vuoi lavorare direttamente con loro, ti raccomandiamo 'poedit'."
+".po files are not difficult. If you don't want to work directly with "
+"them, we recommend 'poedit'."
+msgstr ""
+"I file .po non sono difficili. Se non vuoi lavorare direttamente con "
+"loro, ti raccomandiamo 'poedit'."
#: i2p2www/pages/site/get-involved/guides/new-translators.html:198
msgid ""
-"HTML files are not difficult. Just ignore the html stuff and translate the "
-"text."
-msgstr "I file HTML non sono difficili. Semplicemente ignora l'html e traduci il testo."
+"HTML files are not difficult. Just ignore the html stuff and translate "
+"the text."
+msgstr ""
+"I file HTML non sono difficili. Semplicemente ignora l'html e traduci il "
+"testo."
#: i2p2www/pages/site/get-involved/guides/new-translators.html:202
msgid ""
"Installing and using monotone is not that difficult. Several of the "
-"translators and other contributors to I2P are non-programmers, and they use "
-"monotone regularly. Monotone is simply a source control system, it is not "
-"about \"coding\"."
-msgstr "Installare e utilizzare monotone non è così difficile. Alcuni traduttori ed altri collaboratori di I2P non sono programmatori, eppure usano monotone regolarmente. Monotone è semplicemente un sistema di controllo dei sorgenti, ma non ha nulla a che vedere con il \"coding\"."
+"translators and other contributors to I2P are non-programmers, and they "
+"use monotone regularly. Monotone is simply a source control system, it is"
+" not about \"coding\"."
+msgstr ""
+"Installare e utilizzare monotone non è così difficile. Alcuni traduttori "
+"ed altri collaboratori di I2P non sono programmatori, eppure usano "
+"monotone regolarmente. Monotone è semplicemente un sistema di controllo "
+"dei sorgenti, ma non ha nulla a che vedere con il \"coding\"."
#: i2p2www/pages/site/get-involved/guides/new-translators.html:206
msgid ""
"Our items to translate are not \"documents\". They are html files and po "
-"files, with a specific format and character encoding (UTF-8) that must be "
-"maintained, and not corrupted by email programs or other methods of "
+"files, with a specific format and character encoding (UTF-8) that must be"
+" maintained, and not corrupted by email programs or other methods of "
"transfer."
-msgstr "I nostri oggetti di traduzione non sono \"documenti\". Sono file html e file po, con uno specifico formato e una codifica UTF-8 che deve essere mantenuta, e non corrotta, nel processo di trasferimento che sia l'email o altro."
+msgstr ""
+"I nostri oggetti di traduzione non sono \"documenti\". Sono file html e "
+"file po, con uno specifico formato e una codifica UTF-8 che deve essere "
+"mantenuta, e non corrotta, nel processo di trasferimento che sia l'email "
+"o altro."
#: i2p2www/pages/site/get-involved/guides/new-translators.html:210
msgid ""
-"We looked at 'pootle' as a front-end for translators. It didn't work well, "
-"needed an administrator, and a pootle-based process would suffer from a "
-"number of the above flaws."
-msgstr "Avevamo dato uno sguardo a 'pootple' come front-end per i traduttori. Non funzionava bene, aveva bisogno di un amministratore, e il processo pootle-based avrebbe sofferto di numerosi dei problemi di cui sopra."
+"We looked at 'pootle' as a front-end for translators. It didn't work "
+"well, needed an administrator, and a pootle-based process would suffer "
+"from a number of the above flaws."
+msgstr ""
+"Avevamo dato uno sguardo a 'pootple' come front-end per i traduttori. Non"
+" funzionava bene, aveva bisogno di un amministratore, e il processo "
+"pootle-based avrebbe sofferto di numerosi dei problemi di cui sopra."
#: i2p2www/pages/site/get-involved/guides/new-translators.html:215
msgid ""
"In summary:\n"
-"Yes, we know it is somewhat of a hurdle to get started. It's really the only possible way we can do it. Give it a try, it really isn't that hard."
-msgstr "In sintesi:<\\b>\nSi, sappiamo che può essere un po' ostico partire. E' l'unico modo in cui possiamo farcela. Provaci, non è poi così difficile."
+"Yes, we know it is somewhat of a hurdle to get started. It's really the "
+"only possible way we can do it. Give it a try, it really isn't that hard."
+msgstr ""
+"In sintesi:<\\b>\n"
+"Si, sappiamo che può essere un po' ostico partire. E' l'unico modo in cui"
+" possiamo farcela. Provaci, non è poi così difficile."
#: i2p2www/pages/site/get-involved/guides/new-translators.html:220
msgid "More Information"
@@ -3367,4 +3810,7 @@ msgstr "Ulteriori Informazioni"
msgid ""
"The #i2p-dev channel on IRC, or the translation forum on %(zzz)s."
-msgstr "Il canale #i2p'dev su IRC o il forum di traduzione su %(zzz)s."
+msgstr ""
+"Il canale #i2p'dev su IRC o il forum"
+" di traduzione su %(zzz)s."
+
diff --git a/i2p2www/translations/it/LC_MESSAGES/priority.po b/i2p2www/translations/it/LC_MESSAGES/priority.po
index e36fb496..00af5ef8 100644
--- a/i2p2www/translations/it/LC_MESSAGES/priority.po
+++ b/i2p2www/translations/it/LC_MESSAGES/priority.po
@@ -1,32 +1,30 @@
-# Translations template for I2P.
+# Italian translations for I2P.
# Copyright (C) 2014 ORGANIZATION
# This file is distributed under the same license as the I2P project.
-#
+#
# Translators:
# alamir ppa"
-":i2p-maintainers/i2p
into the APT-line field and click Add "
-"Source. Click the Close button then Reload."
-msgstr "Fai clc sulla scheda Altre fonti e su Aggiungi. Incolla ppa:i2p-maintainers/i2p
nel campo dedicato alla riga APT e fai clic su Aggiungi fonte. Fai clic sul pulsante Chiudi quindi su Ricarica."
+"Click the Other Sources tab and click Add. Paste "
+"ppa:i2p-maintainers/i2p
into the APT-line field and click "
+"Add Source. Click the Close button then "
+"Reload."
+msgstr ""
+"Fai clc sulla scheda Altre fonti e su Aggiungi. Incolla"
+" ppa:i2p-maintainers/i2p
nel campo dedicato alla riga APT e "
+"fai clic su Aggiungi fonte. Fai clic sul pulsante "
+"Chiudi quindi su Ricarica."
#: i2p2www/pages/downloads/debian.html:70
msgid ""
"In the Quick Filter box, type in i2p
and press enter. When "
"i2p
is returned in the results list, right click "
-"i2p
and select Mark for Installation. After doing so "
-"you may see a Mark additional required changes? popup. If so, click"
-" Mark then Apply."
-msgstr "Nel riquadro di filtro rapido, digita i2p
e premi Invio. Quando i2p
compare nell'elenco dei risultati, fai clic con il pulsante destro del mouse su i2p
e seleziona Contrassegna per l'installazione. Dopo di che, potrebbe apparire un messaggio di popup Contrassegna modifiche necessarie aggiuntive?. Se capita, fai clic su Contrassegna quindi su Applica."
+"i2p
and select Mark for Installation. After doing "
+"so you may see a Mark additional required changes? popup. If so,"
+" click Mark then Apply."
+msgstr ""
+"Nel riquadro di filtro rapido, digita i2p
e premi Invio. "
+"Quando i2p
compare nell'elenco dei risultati, fai clic con "
+"il pulsante destro del mouse su i2p
e seleziona "
+"Contrassegna per l'installazione. Dopo di che, potrebbe apparire"
+" un messaggio di popup Contrassegna modifiche necessarie "
+"aggiuntive?. Se capita, fai clic su Contrassegna quindi su "
+"Applica."
#: i2p2www/pages/downloads/debian.html:76
msgid ""
"After the installation process completes you can move on to the next\n"
-"part of starting I2P and configuring it for your system."
-msgstr "Dopo il completamento della procedura di installazione, puoi passare alla sezione\nsuccessiva per avviare I2P e configurarlo per il tuo sistema."
+"part of starting I2P and configuring "
+"it for your system."
+msgstr ""
+"Dopo il completamento della procedura di installazione, puoi passare alla"
+" sezione\n"
+"successiva per avviare I2P e "
+"configurarlo per il tuo sistema."
#: i2p2www/pages/downloads/debian.html:81
msgid "Instructions for Debian"
@@ -178,9 +220,13 @@ msgstr "Istruzioni per Debian"
#: i2p2www/pages/downloads/debian.html:85
msgid ""
-"Note: The steps below should be performed with root access (i.e., switching\n"
+"Note: The steps below should be performed with root access (i.e., "
+"switching\n"
"user to root with \"su\" or by prefixing each command with \"sudo\")."
-msgstr "Nota: i punti sottostanti dovrebbe essere eseguiti con un accesso di amministratore (ad esempio, passando da utente normale\na root con \"su\" o facendo precedere ogni comando da \"sudo\")."
+msgstr ""
+"Nota: i punti sottostanti dovrebbe essere eseguiti con un accesso di "
+"amministratore (ad esempio, passando da utente normale\n"
+"a root con \"su\" o facendo precedere ogni comando da \"sudo\")."
#: i2p2www/pages/downloads/debian.html:90
#, python-format
@@ -190,9 +236,11 @@ msgstr "Aggiungi linee come le seguenti a %(file)s
."
#: i2p2www/pages/downloads/debian.html:111
#, python-format
msgid ""
-"Download the key used to sign the repository "
-"and add it to apt:"
-msgstr "Scarica la chiave usata per firmare il repository e aggiungila ad apt:"
+"Download the key used to sign the repository"
+" and add it to apt:"
+msgstr ""
+"Scarica la chiave usata per firmare il "
+"repository e aggiungila ad apt:"
#: i2p2www/pages/downloads/debian.html:118
msgid "Notify your package manager of the new repository by entering"
@@ -201,22 +249,34 @@ msgstr "Notifica al tuo gestore di pacchetti il nuovo repository inserendo"
#: i2p2www/pages/downloads/debian.html:120
msgid ""
"This command will retrieve the latest list of software from every\n"
-"repository enabled on your system, including the I2P repository added in step\n"
+"repository enabled on your system, including the I2P repository added in "
+"step\n"
+"1."
+msgstr ""
+"Questo comando recupererà l'elenco di programmi più recenti da ogni\n"
+"repository attivato sul sistema, incluso quello I2P aggiunto nel punto \n"
"1."
-msgstr "Questo comando recupererà l'elenco di programmi più recenti da ogni\nrepository attivato sul sistema, incluso quello I2P aggiunto nel punto \n1."
#: i2p2www/pages/downloads/debian.html:126
msgid ""
-"You are now ready to install I2P! Installing the i2p-keyring
\n"
+"You are now ready to install I2P! Installing the i2p-keyring
"
+"\n"
"package will ensure that you receive updates to the repository's GPG key."
-msgstr "Sei pronto a installare I2P! L'installazione del pacchetto i2p-keyring
\nfarà in modo di farti ricevere gli aggiornamenti della chiave GPG del repository."
+msgstr ""
+"Sei pronto a installare I2P! L'installazione del pacchetto i2p-"
+"keyring
\n"
+"farà in modo di farti ricevere gli aggiornamenti della chiave GPG del "
+"repository."
#: i2p2www/pages/downloads/debian.html:133
msgid ""
-"After the installation process completes you can move on to the next part of"
-" starting I2P and configuring it for your"
-" system."
-msgstr "Dopo il completamento della procedura di installazione, puoi passare alla sezione successiva per avviare I2P e configurarlo per il tuo sistema."
+"After the installation process completes you can move on to the next part"
+" of starting I2P and configuring it "
+"for your system."
+msgstr ""
+"Dopo il completamento della procedura di installazione, puoi passare alla"
+" sezione successiva per avviare I2P e "
+"configurarlo per il tuo sistema."
#: i2p2www/pages/downloads/debian.html:137
#: i2p2www/pages/downloads/post-install.html:1
@@ -227,52 +287,99 @@ msgstr "Post-installazione"
msgid ""
"Using these I2P packages the I2P router can be started in the following\n"
"three ways:"
-msgstr "Usando questi pacchetti I2P, il router I2P può essere arriavo nei \ntre modi che seguono:"
+msgstr ""
+"Usando questi pacchetti I2P, il router I2P può essere arriavo nei \n"
+"tre modi che seguono:"
#: i2p2www/pages/downloads/debian.html:145
msgid ""
-""on demand" using the i2prouter script. Simply run "i2prouter\n"
-"start
" from a command prompt. (Note: Do not use\n"
+""on demand" using the i2prouter script. Simply run "
+""i2prouter\n"
+"start
" from a command prompt. (Note: Do "
+"not use\n"
"sudo or run it as root!)"
-msgstr ""a richiesta" usando lo script i2prouter. Ti basta eseguire "i2prouter\nstart
" da riga di comando. (Nota: non usare\nsudo e non eseguirlo con privilegi di amministrazione!)"
+msgstr ""
+""a richiesta" usando lo script i2prouter. Ti basta eseguire "
+""i2prouter\n"
+"start
" da riga di comando. (Nota: non"
+" usare\n"
+"sudo e non eseguirlo con privilegi di amministrazione!)"
#: i2p2www/pages/downloads/debian.html:152
msgid ""
-""on demand" without the java service wrapper\n"
-"(needed on non-Linux/non-x86 systems) by running \"i2prouter-nowrapper
\".\n"
+""on demand" without the java service wrapper\n"
+"(needed on non-Linux/non-x86 systems) by running \"i2prouter-"
+"nowrapper
\".\n"
"(Note: Do not\n"
"use sudo or run it as root!)"
-msgstr ""a richiesta" senza il wrapper di servizi java\n(necessario su sistemi diversi da Linux o diversi da x86) eseguendo \"i2prouter-nowrapper
\".\n(Nota: strong>non/u>\nusare sudo e non eseguirlo con privilegi di amministrazione!)"
+msgstr ""
+""a richiesta" senza il wrapper di servizi java\n"
+"(necessario su sistemi diversi da Linux o diversi da x86) eseguendo "
+"\"i2prouter-nowrapper
\".\n"
+"(Nota: strong>non/u>\n"
+"usare sudo e non eseguirlo con privilegi di amministrazione!)"
#: i2p2www/pages/downloads/debian.html:160
msgid ""
"as a service that automatically runs when your system boots, even\n"
-"before logging in. The service can be enabled with \"dpkg-reconfigure\n"
-"i2p
\" as root or using sudo. This is the recommended means of operation."
-msgstr "come servizio che viene eseguito automaticamente all'avvio del sistema, anche \nprima di effettuare l'accesso. Il servizio può essere attivato con \"dpkg-reconfigure\ni2p
\" con privilegi di amministrazione o usando sudo. Questa è la modalità consigliata."
+"before logging in. The service can be enabled with \"dpkg-"
+"reconfigure\n"
+"i2p
\" as root or using sudo. This is the recommended means of "
+"operation."
+msgstr ""
+"come servizio che viene eseguito automaticamente all'avvio del sistema, "
+"anche \n"
+"prima di effettuare l'accesso. Il servizio può essere attivato con "
+"\"dpkg-reconfigure\n"
+"i2p
\" con privilegi di amministrazione o usando sudo. Questa è la "
+"modalità consigliata."
#: i2p2www/pages/downloads/debian.html:168
msgid ""
-"When installing for the first time, please remember to adjust your NAT/firewall\n"
-"if you can. The ports to forward can be found on the \n"
-"network configuration page in the router console. If guidance with respect to forwarding ports is needed,\n"
-"you may find portforward.com to be helpful."
-msgstr "Per la primissima installazione, ricorda di regolare il tuo NAT o firewall\nse puoi. Le porte da inoltrare possono essere trovate nella \npagina di configurazione di rete nel console router. Se serve aiuto in merito al port forwarding,\nè possibile trovare qualche dritta su portforward.com."
+"When installing for the first time, please remember to adjust your "
+"NAT/firewall\n"
+"if you can. The ports to forward can be found on the \n"
+"network configuration page in the router console. If guidance with "
+"respect to forwarding ports is needed,\n"
+"you may find portforward.com to be"
+" helpful."
+msgstr ""
+"Per la primissima installazione, ricorda di regolare il tuo NAT o "
+"firewall\n"
+"se puoi. Le porte da inoltrare possono essere trovate nella \n"
+"pagina di configurazione di rete nel console router. Se serve aiuto "
+"in merito al port forwarding,\n"
+"è possibile trovare qualche dritta su portforward.com."
#: i2p2www/pages/downloads/debian.html:175
msgid ""
"Please review and adjust the bandwidth settings on the\n"
"configuration page,\n"
-"as the default settings of 96 KB/s down / 40 KB/s up are fairly conservative."
-msgstr "Esamina e modifica le impostazioni della larghezza di banda nella\npagina di configurazione,\nperché le impostazioni predefinite di 96 KB/s per il download e 40 KB/s per l'upload sono abbastanza conservative."
+"as the default settings of 96 KB/s down / 40 KB/s up are fairly "
+"conservative."
+msgstr ""
+"Esamina e modifica le impostazioni della larghezza di banda nella\n"
+"pagina di "
+"configurazione,\n"
+"perché le impostazioni predefinite di 96 KB/s per il download e 40 KB/s "
+"per l'upload sono abbastanza conservative."
#: i2p2www/pages/downloads/debian.html:181
#: i2p2www/pages/downloads/post-install.html:34
#, python-format
msgid ""
"If you want to reach eepsites via your browser, have a look on the browser proxy setup page for an easy howto."
-msgstr "Se vuoi raggiungere gli eepsite con il tuo browser, dai un'occhiata alla pagina impostazione proxy del browser per delle semplici istruzioni."
+"href=\"%(browserconfig)s\">browser proxy setup page for an easy "
+"howto."
+msgstr ""
+"Se vuoi raggiungere gli eepsite con il tuo browser, dai un'occhiata alla "
+"pagina impostazione proxy del browser "
+"per delle semplici istruzioni."
#: i2p2www/pages/downloads/list.html:2 i2p2www/pages/downloads/select.html:12
#: i2p2www/pages/global/nav.html:3
@@ -323,11 +430,20 @@ msgstr "Scarica il file ed eseguilo."
#, python-format
msgid ""
"Download that file and double-click it (if that works) or\n"
-" type java -jar i2pinstall_%(i2pversion)s.jar
in a terminal to run the\n"
+" type java -jar i2pinstall_%(i2pversion)s.jar
in a "
+"terminal to run the\n"
" installer.\n"
" You may be able to right-click and select\n"
" "Open with Java"."
-msgstr "Scarica il fil e fari doppio clic su di esso (se la cosa funziona) oppure\n digita java -jar i2pinstall_%(i2pversion)s.jar
in un terminale per eseguire il\n programma di installazione.\n Potrebbe essere possibile fare clic con il pulsante destro del mouse e selezionare\n "Apri con Java"."
+msgstr ""
+"Scarica il fil e fari doppio clic su di esso (se la cosa funziona) oppure"
+"\n"
+" digita java -jar i2pinstall_%(i2pversion)s.jar
in un "
+"terminale per eseguire il\n"
+" programma di installazione.\n"
+" Potrebbe essere possibile fare clic con il pulsante destro del mouse "
+"e selezionare\n"
+" "Apri con Java"."
#: i2p2www/pages/downloads/list.html:77 i2p2www/pages/downloads/list.html:109
msgid "Command line (headless) install:"
@@ -337,25 +453,43 @@ msgstr "Installazione da riga di comando (non interattiva):"
#, python-format
msgid ""
"Download the %(i2pversion)s OSX graphical installer file above and\n"
-" run java -jar i2pinstall_%(i2pversion)s.jar -console
from the command line."
-msgstr "Scarica il file del programma di installazione grafica per OSX %(i2pversion)s e\n esegui java -jar i2pinstall_%(i2pversion)s.jar -console
da riga di comando."
+" run java -jar i2pinstall_%(i2pversion)s.jar -console
"
+"from the command line."
+msgstr ""
+"Scarica il file del programma di installazione grafica per OSX "
+"%(i2pversion)s e\n"
+" esegui java -jar i2pinstall_%(i2pversion)s.jar -console
"
+"da riga di comando."
#: i2p2www/pages/downloads/list.html:101
#, python-format
msgid ""
"Download that file and double-click it (if that works) or\n"
-" type java -jar i2pinstall_%(i2pversion)s.jar
in a terminal to run the\n"
+" type java -jar i2pinstall_%(i2pversion)s.jar
in a "
+"terminal to run the\n"
" installer.\n"
" On some platforms you may be able to right-click and select\n"
" "Open with Java"."
-msgstr "Scarica il fil e fari doppio clic su di esso (se la cosa funziona) oppure\n digita java -jar i2pinstall_%(i2pversion)s.jar
in un terminale per eseguire il\n programma di installazione.\n Su alcune piattaforme potrebbe essere possibile fare clic con il pulsante destro del mouse e selezionare\n "Apri con Java"."
+msgstr ""
+"Scarica il fil e fari doppio clic su di esso (se la cosa funziona) oppure"
+"\n"
+" digita java -jar i2pinstall_%(i2pversion)s.jar
in un "
+"terminale per eseguire il\n"
+" programma di installazione.\n"
+" Su alcune piattaforme potrebbe essere possibile fare clic con il "
+"pulsante destro del mouse e selezionare\n"
+" "Apri con Java"."
#: i2p2www/pages/downloads/list.html:110
#, python-format
msgid ""
"Download the graphical installer file above and\n"
-" run java -jar i2pinstall_%(i2pversion)s.jar -console
from the command line."
-msgstr "Scarica il file del programma di installazione grafica e\n esegui java -jar i2pinstall_%(i2pversion)s.jar -console
da riga di comando."
+" run java -jar i2pinstall_%(i2pversion)s.jar -console
"
+"from the command line."
+msgstr ""
+"Scarica il file del programma di installazione grafica e\n"
+" esegui java -jar i2pinstall_%(i2pversion)s.jar -console
"
+"da riga di comando."
#: i2p2www/pages/downloads/list.html:123
msgid "Packages for Debian & Ubuntu are available."
@@ -380,15 +514,20 @@ msgstr "eepsite di str4d"
#: i2p2www/pages/downloads/list.html:155
msgid ""
-"The I2P Android app is in development and does NOT currently provide strong "
-"anonymity."
-msgstr "L'app di I2P per Android è in sviluppo e attualmente NON fornisce un robusto anonimato "
+"The I2P Android app is in development and does NOT currently provide "
+"strong anonymity."
+msgstr ""
+"L'app di I2P per Android è in sviluppo e attualmente NON fornisce un "
+"robusto anonimato "
#: i2p2www/pages/downloads/list.html:158
msgid ""
"Requires Android 2.3 (Gingerbread) or higher. If you earlier installed\n"
-" I2P, you need to reinstall because we have also changed the release keys."
-msgstr "Richiede Android 2.3 (Gingerbread) o maggiore. Se hai già installato I2P, devi reinstallarlo perchè abbiamo anche cambiato le release keys"
+" I2P, you need to reinstall because we have also changed the release"
+" keys."
+msgstr ""
+"Richiede Android 2.3 (Gingerbread) o maggiore. Se hai già installato I2P,"
+" devi reinstallarlo perchè abbiamo anche cambiato le release keys"
#: i2p2www/pages/downloads/list.html:162
msgid "512 MB RAM minimum; 1 GB recommended."
@@ -397,9 +536,15 @@ msgstr "512 MB di RAM minimo; 1 GB raccomandato."
#: i2p2www/pages/downloads/list.html:165
msgid ""
"The release and dev versions of the I2P APK are not compatible, as they\n"
-" are signed by zzz and str4d respectively. Uninstall one before installing\n"
+" are signed by zzz and str4d respectively. Uninstall one before "
+"installing\n"
" the other."
-msgstr "Le versioni per il pubblico e quelle di sviiluppo dell'APK di I2P non sono compatibili perché \n sono firmate rispettivamente da zzz e str4d. Disinstallane una prima di installare\n l'altra."
+msgstr ""
+"Le versioni per il pubblico e quelle di sviiluppo dell'APK di I2P non "
+"sono compatibili perché \n"
+" sono firmate rispettivamente da zzz e str4d. Disinstallane una "
+"prima di installare\n"
+" l'altra."
#: i2p2www/pages/downloads/list.html:176
msgid "Source package"
@@ -408,20 +553,34 @@ msgstr "Pacchetto sorgente"
#: i2p2www/pages/downloads/list.html:190
#, python-format
msgid ""
-"Alternately, you can fetch the source from monotone\n"
-" or via Git from git.repo.i2p or Github.\n"
+"Alternately, you can fetch the source from monotone\n"
+" or via Git from git.repo.i2p or Github.\n"
" (tar xjvf i2psource_%(i2pversion)s.tar.bz2 ; cd i2p-%(i2pversion)s ; ant pkg)
then either\n"
+" Run (tar xjvf i2psource_%(i2pversion)s.tar.bz2 ; cd "
+"i2p-%(i2pversion)s ; ant pkg)
then either\n"
" run the GUI installer or headless install as above."
-msgstr "In alternativa, puoi recuperare la fonte su monotone\n o tramite Git su git.repo.i2p oppure Github.\n (tar xjvf i2psource_%(i2pversion)s.tar.bz2 ; cd i2p-%(i2pversion)s ; ant pkg)
quindi\n esegui l'installazione grafica o l'installazione non interattiva come sopra."
+msgstr ""
+"In alternativa, puoi recuperare la fonte su monotone\n"
+" o tramite Git su git.repo.i2p oppure Github.\n"
+" (tar xjvf i2psource_%(i2pversion)s.tar.bz2 ; cd "
+"i2p-%(i2pversion)s ; ant pkg)
quindi\n"
+" esegui l'installazione grafica o l'installazione non interattiva come"
+" sopra."
#: i2p2www/pages/downloads/list.html:200
#, python-format
msgid ""
-"Android source is in monotone\n"
+"Android source is in monotone\n"
" and on Github.\n"
" Android builds require the I2P source.\n"
-" See the documentation in the Android source for additional build requirements and instructions."
+" See the documentation in the Android source for additional build "
+"requirements and instructions."
msgstr ""
#: i2p2www/pages/downloads/list.html:212
@@ -429,7 +588,9 @@ msgstr ""
msgid ""
"The files are signed by zzz,\n"
"whose key is here."
-msgstr "I file sono firmati da zzz,\nla cui chiave si trova qui."
+msgstr ""
+"I file sono firmati da zzz,\n"
+"la cui chiave si trova qui."
#: i2p2www/pages/downloads/list.html:220
msgid "Updates from earlier releases:"
@@ -437,7 +598,9 @@ msgstr "Aggiornamento da versioni precedenti:"
#: i2p2www/pages/downloads/list.html:222
msgid "Both automatic and manual upgrades are available for the release."
-msgstr "sono disponibili sia gli aggiornamenti automatici che manuali per questa versione."
+msgstr ""
+"sono disponibili sia gli aggiornamenti automatici che manuali per questa "
+"versione."
#: i2p2www/pages/downloads/list.html:228
msgid "Automatic updates"
@@ -446,44 +609,78 @@ msgstr "Aggiornamenti automatici"
#: i2p2www/pages/downloads/list.html:231
msgid ""
"If you are running 0.7.5 or later, your router should detect the\n"
-"new release. To upgrade simply click the 'Download Update' button on your router console\n"
+"new release. To upgrade simply click the 'Download Update' button on your"
+" router console\n"
"when it appears."
-msgstr "Se usi la versione 0.7.5 o successiva, il tuo router dovrebber rilevare la presenza di una \nnuova versione. Per aggiornare, fai semplicemente clic su 'Scarica aggiornamento' nel console router\nquando appare."
+msgstr ""
+"Se usi la versione 0.7.5 o successiva, il tuo router dovrebber rilevare "
+"la presenza di una \n"
+"nuova versione. Per aggiornare, fai semplicemente clic su 'Scarica "
+"aggiornamento' nel console router\n"
+"quando appare."
#: i2p2www/pages/downloads/list.html:237
msgid ""
-"Due to a bug in release 0.7.6, those whose first I2P installation was that version\n"
+"Due to a bug in release 0.7.6, those whose first I2P installation was "
+"that version\n"
"and have not upgraded manually\n"
-"may get a \"downloaded version is not greater than current version\" error,\n"
+"may get a \"downloaded version is not greater than current version\" "
+"error,\n"
"and should use the manual update method below."
-msgstr "A causa di un bug nella versione 0.7.6, chi ha installato I2P per la prima volta con quella versione\ne non ha aggiornato manualmente\npotrebbe ricevere un errore \"versione scaricata non maggiore di quella attuale\",\ne dovrebbe quindi usare il metodo di aggiornamento manuale qui sotto."
+msgstr ""
+"A causa di un bug nella versione 0.7.6, chi ha installato I2P per la "
+"prima volta con quella versione\n"
+"e non ha aggiornato manualmente\n"
+"potrebbe ricevere un errore \"versione scaricata non maggiore di quella "
+"attuale\",\n"
+"e dovrebbe quindi usare il metodo di aggiornamento manuale qui sotto."
#: i2p2www/pages/downloads/list.html:245
#, python-format
msgid ""
"If you are running 0.7.4 or earlier, please see\n"
"the 0.7.5 release notes\n"
-"for important information about how to configure your router to automatically\n"
+"for important information about how to configure your router to "
+"automatically\n"
"receive the release."
-msgstr "Se usi la versione 0.7.4 o precedente, consulta le\nnote della versione 0.7.5\nper informazioni importanti su come configurare il router per ricevere\nla versione in automatico."
+msgstr ""
+"Se usi la versione 0.7.4 o precedente, consulta le\n"
+"note della versione 0.7.5\n"
+"per informazioni importanti su come configurare il router per ricevere\n"
+"la versione in automatico."
#: i2p2www/pages/downloads/list.html:253
#, python-format
msgid ""
"If you are running 0.6.1.30 or earlier, please see\n"
"instructions\n"
-"for important information about how to configure your router to automatically\n"
+"for important information about how to configure your router to "
+"automatically\n"
"receive the release."
-msgstr "Se usi la versione 0.6.1.30 o precedente, consulta le\nistruzioni\nper informazioni importanti su come configurare il router per ricevere\nla versione in automatico."
+msgstr ""
+"Se usi la versione 0.6.1.30 o precedente, consulta le\n"
+"istruzioni\n"
+"per informazioni importanti su come configurare il router per ricevere\n"
+"la versione in automatico."
#: i2p2www/pages/downloads/list.html:262
#, python-format
msgid ""
-"If you have reconfigured your router following the instructions, you should see a link on your \n"
-" router console allowing\n"
+"If you have reconfigured your router following the instructions, you should see a link on your"
+" \n"
+" router console "
+"allowing\n"
" you to download and install the new release by just clicking on that\n"
" link."
-msgstr "Se hai riconfigurato il router seguendo le istruzioni, dovresti vedere un link nel \n console router che ti consente di\n scaricare e installare la nuova versione semplicemente facendo clic sul\n link."
+msgstr ""
+"Se hai riconfigurato il router seguendo le istruzioni, dovresti vedere un link nel \n"
+" console router che ti"
+" consente di\n"
+" scaricare e installare la nuova versione semplicemente facendo clic "
+"sul\n"
+" link."
#: i2p2www/pages/downloads/list.html:270
msgid "Alternately, you can use the manual method specified below."
@@ -497,14 +694,24 @@ msgstr "Aggiornamenti manuali"
msgid ""
"Download that file to your I2P\n"
" installation directory and rename as i2pupdate.zip.\n"
-" (alternately, you can get the source as above and run \"ant updater\", then copy the\n"
-" resulting i2pupdate.zip to your I2P installation directory). You do \n"
+" (alternately, you can get the source as above and run \"ant "
+"updater\", then copy the\n"
+" resulting i2pupdate.zip to your I2P installation directory). You do"
+" \n"
" NOT need to unzip that file."
-msgstr "Scarica il file nella cartella di installazione di I2P\n e rinominalo come i2pupdate.zip.\n (in alternativa, puoi ottenere il sorgente come sopra ed eseguire \"ant updater\", quindi copiare il\n file risultante nella cartella di installazione di I2P). \n NON occorre scompattare il file."
+msgstr ""
+"Scarica il file nella cartella di installazione di I2P\n"
+" e rinominalo come i2pupdate.zip.\n"
+" (in alternativa, puoi ottenere il sorgente come sopra ed eseguire "
+"\"ant updater\", quindi copiare il\n"
+" file risultante nella cartella di installazione di I2P). \n"
+" NON occorre scompattare il file."
#: i2p2www/pages/downloads/list.html:306
msgid "Click \"Restart\""
-msgstr "Fai clic su \"Riavvia\""
+msgstr ""
+"Fai clic su \"Riavvia\""
#: i2p2www/pages/downloads/list.html:311
msgid "Grab a cup of coffee and come back in 11 minutes"
@@ -515,7 +722,9 @@ msgstr "Vai a bere un caffè e ritorna tra 11 minuti"
msgid ""
"The file is signed by zzz,\n"
"whose key is here."
-msgstr "Il file è firmato da zzz,\nla cui chiave si trova qui."
+msgstr ""
+"Il file è firmato da zzz,\n"
+"la cui chiave si trova qui."
#: i2p2www/pages/downloads/list.html:324
msgid "Previous Releases"
@@ -524,46 +733,97 @@ msgstr "Versioni precedenti"
#: i2p2www/pages/downloads/list.html:326
#, python-format
msgid ""
-"Previous releases are available on Google Code\n"
+"Previous releases are available on Google "
+"Code\n"
"and Launchpad\n"
-"and within the I2P network on %(echelon)s."
-msgstr "Le versioni precedenti sono disponibli su Google Code\ne Launchpad\n, nonché sulla rete I2P all'indirizzo %(echelon)s."
+"and within the I2P network on %(echelon)s."
+msgstr ""
+"Le versioni precedenti sono disponibli su Google "
+"Code\n"
+"e Launchpad\n"
+", nonché sulla rete I2P all'indirizzo %(echelon)s."
#: i2p2www/pages/downloads/post-install.html:3
msgid ""
-"After running the installer on windows, simply click on the \"Start I2P\" button\n"
-"which will bring up the router console,\n"
+"After running the installer on windows, simply click on the \"Start I2P\""
+" button\n"
+"which will bring up the router console,\n"
"which has further instructions."
-msgstr "Dopo aver eseguito l'installazione su Windows, fai semplicemente clic sul pulsante \"Avvia I2P\"\nche richiama la router console,\nche contiene ulteriori istruzioni."
+msgstr ""
+"Dopo aver eseguito l'installazione su Windows, fai semplicemente clic sul"
+" pulsante \"Avvia I2P\"\n"
+"che richiama la router "
+"console,\n"
+"che contiene ulteriori istruzioni."
#: i2p2www/pages/downloads/post-install.html:9
msgid ""
"On Unix-like systems, I2P can be started as a service\n"
-"using the \"i2prouter\" script, located in the directory you selected for I2P.\n"
-"Changing to that directory in a console and issuing \"sh i2prouter status\"\n"
-"should tell you the router's status. The arguments \"start\", \"stop\" and \"restart\"\n"
-"control the service. The router console\n"
+"using the \"i2prouter\" script, located in the directory you selected for"
+" I2P.\n"
+"Changing to that directory in a console and issuing \"sh i2prouter "
+"status\"\n"
+"should tell you the router's status. The arguments \"start\", \"stop\" "
+"and \"restart\"\n"
+"control the service. The router console\n"
"can be accessed at its usual location.\n"
-"For users on OpenSolaris and other systems for which the wrapper (i2psvc) is not supported,\n"
+"For users on OpenSolaris and other systems for which the wrapper (i2psvc)"
+" is not supported,\n"
"start the router with \"sh runplain.sh\" instead."
-msgstr "Sui sistemi Unix e simili, I2P può essere avviato come un servizio\nusando lo script \"i2prouter\" che si trova nella cartella che hai selezionato per I2P.\nAccedere a quella cartella in un terminale ed eseguire il comando \"sh i2prouter status\"\ndovrebbe indicarti lo stato del router. Gli argomenti \"start\", \"stop\" e \"restart\"\ncontrollano il servizio. Puoi accedere alla router console\nnella sua posizione usuale.\nGli utenti su OpenSolaris e altri sistemi per i quali il wrapper (i2psvc) non è supportato\ndovrebbero invece avviare il router con \"sh runplain.sh\"."
+msgstr ""
+"Sui sistemi Unix e simili, I2P può essere avviato come un servizio\n"
+"usando lo script \"i2prouter\" che si trova nella cartella che hai "
+"selezionato per I2P.\n"
+"Accedere a quella cartella in un terminale ed eseguire il comando \"sh "
+"i2prouter status\"\n"
+"dovrebbe indicarti lo stato del router. Gli argomenti \"start\", \"stop\""
+" e \"restart\"\n"
+"controllano il servizio. Puoi accedere alla router console\n"
+"nella sua posizione usuale.\n"
+"Gli utenti su OpenSolaris e altri sistemi per i quali il wrapper (i2psvc)"
+" non è supportato\n"
+"dovrebbero invece avviare il router con \"sh runplain.sh\"."
#: i2p2www/pages/downloads/post-install.html:20
#, python-format
msgid ""
-"When installing for the first time, please remember to adjust your NAT/firewall\n"
+"When installing for the first time, please remember to adjust your "
+"NAT/firewall\n"
"if you can, bearing in mind the Internet-facing ports I2P uses,\n"
"described here among other ports.\n"
-"If you have successfully opened your port to inbound TCP, also enable inbound TCP on the\n"
+"If you have successfully opened your port to inbound TCP, also enable "
+"inbound TCP on the\n"
"configuration page."
-msgstr "Quando lo installi per la prima volta, ricorda di regolare il tuo NAT o firewall\nse puoi, tenendo presente le porte usate da I2P per l'accesso a Internet,\ndescritte qui tra le altre porte.\nSe hai aperto correttamente la porta per il traffico TCP in entrata, attiva il traffico TCP in entrata anche nella\npagina di configurazione."
+msgstr ""
+"Quando lo installi per la prima volta, ricorda di regolare il tuo NAT "
+"o firewall\n"
+"se puoi, tenendo presente le porte usate da I2P per l'accesso a Internet,"
+"\n"
+"descritte qui tra le altre porte.\n"
+"Se hai aperto correttamente la porta per il traffico TCP in entrata, "
+"attiva il traffico TCP in entrata anche nella\n"
+"pagina di "
+"configurazione."
#: i2p2www/pages/downloads/post-install.html:28
msgid ""
"Also, please review and adjust the bandwidth settings on the\n"
"configuration page,\n"
"as the default settings of 96 KBps down / 40 KBps up are fairly slow."
-msgstr "Inoltre, esamina e modifica le impostazioni della larghezza di banda nella\npagina di configurazione,\nperché le impostazioni predefinitie di of 96 KBps per il download e 40 KBps per l'upload sono abbastanza lente."
+msgstr ""
+"Inoltre, esamina e modifica le impostazioni della larghezza di "
+"banda nella\n"
+"pagina di "
+"configurazione,\n"
+"perché le impostazioni predefinitie di of 96 KBps per il download e 40 "
+"KBps per l'upload sono abbastanza lente."
#: i2p2www/pages/downloads/redirect.html:2
msgid "Downloading..."
@@ -574,7 +834,9 @@ msgstr "Scaricamento in corso..."
msgid ""
"Your download will begin shortly. If it doesn't start within 5 seconds, "
"click here."
-msgstr "Lo scaricamento comincerà tra poco. Se non inizia entro 5 secondi, clicca qui."
+msgstr ""
+"Lo scaricamento comincerà tra poco. Se non inizia entro 5 secondi, clicca"
+" qui."
#: i2p2www/pages/downloads/select.html:2 i2p2www/pages/downloads/select.html:4
msgid "Mirror selection"
@@ -592,15 +854,23 @@ msgstr "Qualsiasi mirror"
msgid ""
"To claim the bounty the author must not be paid by other organizations\n"
"or teams for this work (e.g. GSoC students are not valid)."
-msgstr "Per ritirare i premi, l'autore non deve essere pagato da altre organizzazioni\no team per il lavoro svolto (per esempio, non sono valide le domande degli studenti del Google Summer of Code)."
+msgstr ""
+"Per ritirare i premi, l'autore non deve essere pagato da altre "
+"organizzazioni\n"
+"o team per il lavoro svolto (per esempio, non sono valide le domande "
+"degli studenti del Google Summer of Code)."
#: i2p2www/pages/global/bounty.html:29
#, python-format
msgid ""
"Bounty amounts may be increased by further donations. Do\n"
-"you think these are important? Add in your donation, \n"
+"you think these are important? Add in your "
+"donation, \n"
"marking the amount for the %(donatename)s bounty!"
-msgstr "L'ammontare dei premi può essere aumentato da ulteriori donazioni. Credi\nsiano importanti? Aggiungi la tua, \nevidenziando il valore della %(donatename)s sovvenzione!"
+msgstr ""
+"L'ammontare dei premi può essere aumentato da ulteriori donazioni. Credi\n"
+"siano importanti? Aggiungi la tua, \n"
+"evidenziando il valore della %(donatename)s sovvenzione!"
#: i2p2www/pages/global/error_404.html:3
msgid "Not found"
@@ -608,9 +878,11 @@ msgstr "Non trovato"
#: i2p2www/pages/global/error_404.html:9
msgid ""
-"Yep... the resource, you were searching for, is named differently, doesn't "
-"exist or was removed."
-msgstr "Già... la risorsa che stavi cercando ha un nome diverso, non esiste oppure è stata rimossa."
+"Yep... the resource, you were searching for, is named differently, "
+"doesn't exist or was removed."
+msgstr ""
+"Già... la risorsa che stavi cercando ha un nome diverso, non esiste "
+"oppure è stata rimossa."
#: i2p2www/pages/global/error_500.html:5
msgid "Server error"
@@ -677,7 +949,9 @@ msgstr "Il progetto Internet invisibile"
msgid ""
"This page was last updated in %(lastupdated)s and is accurate for router "
"version %(accuratefor)s."
-msgstr "L'aggiornamento più recente di questa pagina risale a %(lastupdated)s e si riferisce alla versione del router %(accuratefor)s."
+msgstr ""
+"L'aggiornamento più recente di questa pagina risale a %(lastupdated)s e "
+"si riferisce alla versione del router %(accuratefor)s."
#: i2p2www/pages/global/layout.html:64
#, python-format
@@ -1008,17 +1282,28 @@ msgstr "Feed ATOM riunioni I2P"
#: i2p2www/pages/meetings/index.html:7
#, python-format
msgid ""
-"We do not currently have regularly scheduled meetings. Anyone can schedule and\n"
+"We do not currently have regularly scheduled meetings. Anyone can "
+"schedule and\n"
"run a meeting, by posting the agenda in\n"
"the meetings forum."
-msgstr "Attualmente, non abbiamo pianificato incontri periodici. Chiunque può pianificare e\ngestiew una riunione, lasciando un messaggio nell'agenda sul\nforum delle riunioni."
+msgstr ""
+"Attualmente, non abbiamo pianificato incontri periodici. Chiunque può "
+"pianificare e\n"
+"gestiew una riunione, lasciando un messaggio nell'agenda sul\n"
+"forum delle riunioni."
#: i2p2www/pages/meetings/index.html:13
#, python-format
msgid ""
-"If you have something to discuss, please find the developers on IRC in #i2p-dev.\n"
-"Status updates from developers are also available."
-msgstr "Se hai qulcosa da discutere, cerca gli sviluppatori su IRC nel canale #i2p-dev.\nSono disponibili anche gli Aggiornamenti di stato degli sviluppatori."
+"If you have something to discuss, please find the developers on IRC in "
+"#i2p-dev.\n"
+"Status updates from developers are also "
+"available."
+msgstr ""
+"Se hai qulcosa da discutere, cerca gli sviluppatori su IRC nel canale "
+"#i2p-dev.\n"
+"Sono disponibili anche gli Aggiornamenti di "
+"stato degli sviluppatori."
#: i2p2www/pages/meetings/show.html:2
#, python-format
@@ -1050,14 +1335,23 @@ msgid ""
"BibTeX source page for examples.libm.so.4
!"
-msgstr "Uso FreeBSD e quando avvio I2P ricevo un errore relativo a libm.so.4
!"
+msgstr ""
+"Uso FreeBSD e quando avvio I2P ricevo un errore relativo a "
+"libm.so.4
!"
#: i2p2www/pages/site/faq.html:48
msgid ""
"In wrapper.log
I see an error stating Protocol family "
"unavailable
when I2P is loading"
-msgstr "Nel wrapper.log
osservo un errore relativo alla famiglia di protocolli non disponibile
quando I2P viene caricato"
+msgstr ""
+"Nel wrapper.log
osservo un errore relativo alla "
+"famiglia di protocolli non disponibile
quando I2P viene "
+"caricato"
#: i2p2www/pages/site/faq.html:52 i2p2www/pages/site/faq.html:63
#: i2p2www/pages/site/faq.html:80 i2p2www/pages/site/faq.html:109
@@ -1367,19 +1721,29 @@ msgstr "collegamento"
#, python-format
msgid ""
"While I2P has been reported to run PCs as meagre as a low-end Pentium II "
-"with 64 MB of RAM, you'll have a much better experience on a Pentium III (or"
-" better) with 128MB of RAM (or more). A chart "
+"with 64 MB of RAM, you'll have a much better experience on a Pentium III "
+"(or better) with 128MB of RAM (or more). A chart "
"comparing the performance of the various JREs can be found at %(chart)s, but in short: it's at all possible, use "
-"Sun/Oracle Java or OpenJDK."
-msgstr "Sebbene ci siano riscontri di I2P funzionante su PC con basse prestazioni addirittura come i Pentium II con 64 MB di RAM, l'esperienza sarà migliore sui Pentium III (o superiori) con 128 MB di RAM (o di più). Un grafico con il confronto delle prestazioni dei vari ambienti JRE può essere repirto all'indirizzo %(chart)s, ma per dirla in breve: se possibile, usa Sun/Oracle Java o OpenJDK."
+"href=\"%(chart)s\">%(chart)s, but in short: it's at all possible, use"
+" Sun/Oracle Java or OpenJDK."
+msgstr ""
+"Sebbene ci siano riscontri di I2P funzionante su PC con basse prestazioni"
+" addirittura come i Pentium II con 64 MB di RAM, l'esperienza sarà "
+"migliore sui Pentium III (o superiori) con 128 MB di RAM (o di più). Un "
+"grafico con il confronto delle prestazioni dei "
+"vari ambienti JRE può essere repirto all'indirizzo %(chart)s, ma per dirla in breve: se possibile, "
+"usa Sun/Oracle Java o OpenJDK."
#: i2p2www/pages/site/faq.html:57
msgid ""
"I2P has been tested on Windows, Linux, FreeBSD (see the note below), OSX, and OpenSolaris. There is work underway "
-"to bring I2P to the Android platform."
-msgstr "I2P è stato testato su Windows, Linux, FreeBSD (leggere la nota qui sotto), OSX e OpenSolaris. Esistono progetti in corso per portare I2P sulla piattaforma Android."
+"href=\"#compat6x\">below), OSX, and OpenSolaris. There is work "
+"underway to bring I2P to the Android platform."
+msgstr ""
+"I2P è stato testato su Windows, Linux, FreeBSD (leggere la nota qui sotto), OSX e OpenSolaris. Esistono progetti "
+"in corso per portare I2P sulla piattaforma Android."
#: i2p2www/pages/site/faq.html:65
msgid "Here are some places, pick one or more."
@@ -1390,30 +1754,63 @@ msgid "Discuss with the developers on IRC in #i2p-dev"
msgstr "Discuti con gli sviluppatori su IRC nel canale #i2p-dev"
#: i2p2www/pages/site/faq.html:75
-msgid ""
-"Please include relevant information from the router logs and wrapper logs."
+msgid "Please include relevant information from the router logs and wrapper logs."
msgstr "Includi le relative informazioni prese dai log del router e del wrapper."
#: i2p2www/pages/site/faq.html:81
msgid ""
-"The default subscription is to http://www.i2p2.i2p/hosts.txt which is updated rarely.\n"
-"If you don't have another subscription, you may often have to use \"jump\" links which\n"
+"The default subscription is to http://www.i2p2.i2p/hosts.txt which is "
+"updated rarely.\n"
+"If you don't have another subscription, you may often have to use "
+"\"jump\" links which\n"
"is annoying."
-msgstr "L'iscrizione predefinita è a http://www.i2p2.i2p/hosts.txt che viene raramente aggiornato.\nSe non disponi di un'altra iscrizione, potresti dover usare spesso i collegamenti \"jump\", il che è\nseccante."
+msgstr ""
+"L'iscrizione predefinita è a http://www.i2p2.i2p/hosts.txt che viene "
+"raramente aggiornato.\n"
+"Se non disponi di un'altra iscrizione, potresti dover usare spesso i "
+"collegamenti \"jump\", il che è\n"
+"seccante."
#: i2p2www/pages/site/faq.html:87
msgid ""
-"Here are some other public addressbook subscription links. You may wish to add one or two\n"
-"to your susidns subscription list.\n"
-"You don't need to add all of them, as they sync with each other periodically.\n"
-"The links using a cgi-bin application employ various strategies to minimize\n"
-"the number of duplicate addresses delivered, so they should be more efficient.\n"
-"Note that subscribing to a hosts.txt service is an act of \"trust\", as a malicious\n"
-"subscription could give you incorrect addresses. So think about whether you\n"
+"Here are some other public addressbook subscription links. You may wish "
+"to add one or two\n"
+"to your susidns "
+"subscription list.\n"
+"You don't need to add all of them, as they sync with each other "
+"periodically.\n"
+"The links using a cgi-bin application employ various strategies to "
+"minimize\n"
+"the number of duplicate addresses delivered, so they should be more "
+"efficient.\n"
+"Note that subscribing to a hosts.txt service is an act of \"trust\", as a"
+" malicious\n"
+"subscription could give you incorrect addresses. So think about whether "
+"you\n"
"want to trust any of these.\n"
-"The operators of these services may have various policies for listing hosts.\n"
+"The operators of these services may have various policies for listing "
+"hosts.\n"
"Presence on this list does not imply endorsement."
-msgstr "Ecco qualche altro collegamento per la rubrica pubblica. Potresti aggioungerne uno o due\nal tuo elenco di iscrizioni susidns.\nNon c'è bisogno di aggiungerli tutti, perché si sincronizzano l'uno con l'altro periodicamente.\nI collegamenti che usano un applicazione cgi-bin application si avvalgono di svariate strategie per minimizzare\nil numero di indirizzi duplicati, per cui dovrebbero essere più efficienti.\nRicorda che iscriversi a un servizio hosts.txt è un atto di \"fiducia\" perché un'iscrizione\nmalevola potrebbe fornirti indirizzi sbagliati. Per cui rifletti se intendi\nfidarti o no.\nGli operatori di tali servizi potrebbero avere diverse regole per gli host elencati.\nLa presenza di un sito in questa lista non implica approvazione."
+msgstr ""
+"Ecco qualche altro collegamento per la rubrica pubblica. Potresti "
+"aggioungerne uno o due\n"
+"al tuo elenco"
+" di iscrizioni susidns.\n"
+"Non c'è bisogno di aggiungerli tutti, perché si sincronizzano l'uno con "
+"l'altro periodicamente.\n"
+"I collegamenti che usano un applicazione cgi-bin application si avvalgono"
+" di svariate strategie per minimizzare\n"
+"il numero di indirizzi duplicati, per cui dovrebbero essere più "
+"efficienti.\n"
+"Ricorda che iscriversi a un servizio hosts.txt è un atto di \"fiducia\" "
+"perché un'iscrizione\n"
+"malevola potrebbe fornirti indirizzi sbagliati. Per cui rifletti se "
+"intendi\n"
+"fidarti o no.\n"
+"Gli operatori di tali servizi potrebbero avere diverse regole per gli "
+"host elencati.\n"
+"La presenza di un sito in questa lista non implica approvazione."
#: i2p2www/pages/site/faq.html:110
msgid ""
@@ -1422,14 +1819,24 @@ msgid ""
"We do not know if or when jrandom will return.\n"
"The *.i2p.net domains were left in a non-functioning state after a power\n"
"outage at the hosting company."
-msgstr "Jrandom è stato lo sviluppatore capo di I2P e\nSyndie per diversi anni.\nNon sappiamo se jrandom farà ritorno o no.\nI dominii *.i2p.net sono stati lasciati in uno stato di non funzionamento dopo un blackout\ncapitato all'azienda che si occupa del loro hosting."
+msgstr ""
+"Jrandom è stato lo sviluppatore capo di I2P e\n"
+"Syndie per diversi anni.\n"
+"Non sappiamo se jrandom farà ritorno o no.\n"
+"I dominii *.i2p.net sono stati lasciati in uno stato di non funzionamento"
+" dopo un blackout\n"
+"capitato all'azienda che si occupa del loro hosting."
#: i2p2www/pages/site/faq.html:118
#, python-format
msgid ""
-"See this page for jrandom's parting message and additional information\n"
+"See this page for jrandom's parting message "
+"and additional information\n"
"on the migration of *.i2p.net to this website."
-msgstr "Consulta questa pagina con il messaggio di addio di jrandom e informazioni aggiuntive\nsulla migrazione di *.i2p.net a questo sito web."
+msgstr ""
+"Consulta questa pagina con il messaggio di "
+"addio di jrandom e informazioni aggiuntive\n"
+"sulla migrazione di *.i2p.net a questo sito web."
#: i2p2www/pages/site/faq.html:123
msgid "I2P remains in active development."
@@ -1437,54 +1844,106 @@ msgstr "I2P rimane in attivo sviluppo."
#: i2p2www/pages/site/faq.html:127
msgid "There are many possible causes of high CPU usage. Here is a checklist:"
-msgstr "Esistono numerose possibile cause di un elevato utilizzo della CPU. Ecco un elenco di controllo:"
+msgstr ""
+"Esistono numerose possibile cause di un elevato utilizzo della CPU. Ecco "
+"un elenco di controllo:"
#: i2p2www/pages/site/faq.html:132
msgid ""
-"Try to use either OpenJDK or Sun/Oracle Java if it's available for your system. You can check \n"
-"which version of java you have installed by typing java -version
at a \n"
-"command/shell prompt. Performance tends to suffer with other implementations of java."
-msgstr "Prova a usare OpenJDK oppure Java di Sun/Oracle se sono disponibili sul tuo sistema. Puoi controllare \nla versione di java installata digitando java -version
al prompt dei \ncomandi o in un terminale. Le prestazioni tendono a soffrire con implementazioni di java diverse."
+"Try to use either OpenJDK or Sun/Oracle Java if it's available for your "
+"system. You can check \n"
+"which version of java you have installed by typing java "
+"-version
at a \n"
+"command/shell prompt. Performance tends to suffer with other "
+"implementations of java."
+msgstr ""
+"Prova a usare OpenJDK oppure Java di Sun/Oracle se sono disponibili sul "
+"tuo sistema. Puoi controllare \n"
+"la versione di java installata digitando java -version
al "
+"prompt dei \n"
+"comandi o in un terminale. Le prestazioni tendono a soffrire con "
+"implementazioni di java diverse."
#: i2p2www/pages/site/faq.html:139
msgid ""
-"Are you running a BitTorrent client over I2P? Try reducing the number of torrents, the bandwidth limits,\n"
+"Are you running a BitTorrent client over I2P? Try reducing the number of "
+"torrents, the bandwidth limits,\n"
"or try turning it off completely to see if that helps."
-msgstr "Hai un client BitTorrent in esecuzione su I2P? Prova a ridurre il numero di torrent, i limiti di banda\noppure spegnerlo completamente per vedere se aiuta a risolvere il problema."
+msgstr ""
+"Hai un client BitTorrent in esecuzione su I2P? Prova a ridurre il numero "
+"di torrent, i limiti di banda\n"
+"oppure spegnerlo completamente per vedere se aiuta a risolvere il "
+"problema."
#: i2p2www/pages/site/faq.html:145
msgid ""
-"Are your bandwidth limits set too high? It is possible that too much traffic is going through your\n"
-"I2P router and it is overloaded. Try reducing the setting for share bandwidth percentage on the configuration page."
-msgstr "I limiti della larghezza di banda sono impostati troppo in alto? È possibile che stia passando troppo traffico nel tuo\nrouter I2P che è quindi sovraccarico. Prova ad abbassare l'impostazione dellapercentuale di condivisione della banda nella pagina di configurazione."
+"Are your bandwidth limits set too high? It is possible that too much "
+"traffic is going through your\n"
+"I2P router and it is overloaded. Try reducing the setting for share "
+"bandwidth percentage on the configuration page."
+msgstr ""
+"I limiti della larghezza di banda sono impostati troppo in alto? È "
+"possibile che stia passando troppo traffico nel tuo\n"
+"router I2P che è quindi sovraccarico. Prova ad abbassare l'impostazione "
+"dellapercentuale di condivisione della banda nella pagina di configurazione."
#: i2p2www/pages/site/faq.html:150
msgid ""
-"Make sure that you're running the latest version of I2P to get the benefits "
-"of increased performance and bug fixes."
-msgstr "Assicurati di avere la versione più recente di I2P in esecuzione per avvantaggiarti delle prestazioni migliorate e dei problemi risolti."
+"Make sure that you're running the latest version of I2P to get the "
+"benefits of increased performance and bug fixes."
+msgstr ""
+"Assicurati di avere la versione più recente di I2P in esecuzione per "
+"avvantaggiarti delle prestazioni migliorate e dei problemi risolti."
#: i2p2www/pages/site/faq.html:155
msgid ""
-"Has enough memory been set aside for use by I2P? Look at the memory graph on the graphs page to see\n"
-"if the memory usage is \"pegged\"—the JVM is spending most of its time in\n"
-"garbage collection. Increase the setting wrapper.java.maxmemory
in the file wrapper.config
."
-msgstr "È stata assegnata sufficiente memoria per usare I2P? Controlla il grafico della memoria nella pagina dei grafici\nper vedere se l'utilizzo della memoria è eccessivo —, la macchina virtuale Java\nsta spendendo la maggior parte del tempo nella funzione di garbage collection.\nAumenta l'impostazione di wrapper.java.maxmemory
nel file wrapper.config
."
+"Has enough memory been set aside for use by I2P? Look at the memory graph"
+" on the graphs page to see\n"
+"if the memory usage is \"pegged\"—the JVM is spending most of its "
+"time in\n"
+"garbage collection. Increase the setting "
+"wrapper.java.maxmemory
in the file "
+"wrapper.config
."
+msgstr ""
+"È stata assegnata sufficiente memoria per usare I2P? Controlla il grafico"
+" della memoria nella pagina dei "
+"grafici\n"
+"per vedere se l'utilizzo della memoria è eccessivo —, la macchina "
+"virtuale Java\n"
+"sta spendendo la maggior parte del tempo nella funzione di garbage "
+"collection.\n"
+"Aumenta l'impostazione di wrapper.java.maxmemory
nel file "
+"wrapper.config
."
#: i2p2www/pages/site/faq.html:162
msgid ""
-"Is the CPU usage simply higher than you would like, or is it pegged at 100% for a long time?\n"
+"Is the CPU usage simply higher than you would like, or is it pegged at "
+"100% for a long time?\n"
"If it's pegged, this could be a bug. Look in the logs for clues."
-msgstr "L'utilizzo della CPU è semplicemente più elevato di quanto vorresti oppure rimane fisso su 100% per un periodo di tempo molto lungo?\nSe è fisso, ciò potrebbe essere dovuto a un bug. Cerca nei log per eventuali indizi."
+msgstr ""
+"L'utilizzo della CPU è semplicemente più elevato di quanto vorresti "
+"oppure rimane fisso su 100% per un periodo di tempo molto lungo?\n"
+"Se è fisso, ciò potrebbe essere dovuto a un bug. Cerca nei log per "
+"eventuali indizi."
#: i2p2www/pages/site/faq.html:168
#, python-format
msgid ""
-"You may be using the Java-based BigInteger library instead of the native version,\n"
-"especially if you are running on a new or unusual OS or hardware (OpenSolaris, mipsel, etc.).\n"
+"You may be using the Java-based BigInteger library instead of the native "
+"version,\n"
+"especially if you are running on a new or unusual OS or hardware "
+"(OpenSolaris, mipsel, etc.).\n"
"See the jbigi page for instructions on\n"
"diagnosing, building, and testing methods."
-msgstr "Forse stai usando la libreria BigInteger basata su Java invece della versione originale,\nspecialmente se stai usandoo un sistema operativo o un hardware insolito o nuovo (OpenSolaris, mipsel, ecc.).\nConsulta la pagina jbigi per istruzioni sui\nmetodi di diagnosi, compilazione e collaudo."
+msgstr ""
+"Forse stai usando la libreria BigInteger basata su Java invece della "
+"versione originale,\n"
+"specialmente se stai usandoo un sistema operativo o un hardware insolito "
+"o nuovo (OpenSolaris, mipsel, ecc.).\n"
+"Consulta la pagina jbigi per istruzioni sui\n"
+"metodi di diagnosi, compilazione e collaudo."
#: i2p2www/pages/site/faq.html:176
msgid ""
@@ -1495,183 +1954,383 @@ msgid ""
"share bandwidth on\n"
"confignet.jsp,\n"
"or by setting router.maxParticipatingTunnels=nnn on\n"
-"configadvanced.jsp."
-msgstr "Se la tua libreria jbigi originale funziona senza problemi, l'utente più esoso di \nCPU potrebbe instradare il traffico per i tunnel partecipanti. Questo fa uso di CPU\nperché con ciascun salto uno strato di cifratura deve essere decodificato.\nPuoi limitare il traffico partecipanti in due modi: riducendo la\nbanda condivisa su\nconfignet.jsp,\noppure impostando router.maxParticipatingTunnels=nnn su\nconfigadvanced.jsp."
+"configadvanced.jsp."
+msgstr ""
+"Se la tua libreria jbigi originale funziona senza problemi, l'utente più "
+"esoso di \n"
+"CPU potrebbe instradare il traffico per i tunnel partecipanti. Questo fa "
+"uso di CPU\n"
+"perché con ciascun salto uno strato di cifratura deve essere "
+"decodificato.\n"
+"Puoi limitare il traffico partecipanti in due modi: riducendo la\n"
+"banda condivisa su\n"
+"confignet.jsp,\n"
+"oppure impostando router.maxParticipatingTunnels=nnn su\n"
+"configadvanced.jsp."
#: i2p2www/pages/site/faq.html:191
msgid ""
"Hmm. I2P is an anonymous network, so that's a tricky one.\n"
-"I2P is designed to withstand censorship, providing a means for everyone to communicate freely. \n"
-"The best way to keep your PC free of (encrypted) traffic that you dislike is to not use I2P.\n"
+"I2P is designed to withstand censorship, providing a means for everyone "
+"to communicate freely. \n"
+"The best way to keep your PC free of (encrypted) traffic that you dislike"
+" is to not use I2P.\n"
"Freedom of speech has some costs.\n"
"But let's address your question in three parts:"
-msgstr "Uhm. I2P è una rete anonima, quindi questa è una questione complicata.\nI2P è progettato per resistere alla censura offrendo un mezzo che tutti possono usare per comunicare liberamente. \nIl modo migliore di tenere il tuo computere libero da traffico (criptato) che non è di tuo gradimento è quello di non usare affatto I2P.\nLa libertà di parola ha dei costi.\nMa vediamo di analizzare il problema dividendolo in tre parti:"
+msgstr ""
+"Uhm. I2P è una rete anonima, quindi questa è una questione complicata.\n"
+"I2P è progettato per resistere alla censura offrendo un mezzo che tutti "
+"possono usare per comunicare liberamente. \n"
+"Il modo migliore di tenere il tuo computere libero da traffico (criptato)"
+" che non è di tuo gradimento è quello di non usare affatto I2P.\n"
+"La libertà di parola ha dei costi.\n"
+"Ma vediamo di analizzare il problema dividendolo in tre parti:"
#: i2p2www/pages/site/faq.html:200
msgid ""
-"Distribution - All traffic on I2P is encrypted in multiple layers. You don't know\n"
+"Distribution - All traffic on I2P is encrypted in multiple layers."
+" You don't know\n"
"a message's contents, source, or destination.\n"
-"All traffic you route is internal to the I2P network, you are not an exit node (outproxy).\n"
+"All traffic you route is internal to the I2P network, you are not an exit node (outproxy).\n"
"Your only alternative is to refuse to route\n"
-"any traffic, by setting your share bandwidth or maximum participating tunnels to 0 (see above).\n"
-"It would be nice if you didn't do this, you should help the network by routing traffic for others.\n"
+"any traffic, by setting your share bandwidth or maximum "
+"participating tunnels to 0 (see above).\n"
+"It would be nice if you didn't do this, you should help the network by "
+"routing traffic for others.\n"
"Over 95% of users route traffic for others."
-msgstr "Distribuzione - Tutto il traffico I2P è cifrato a strati multipli. Non si può sapere \nil contenuto di un messaggio, la sua fonte e la sua destinazione.\nTutto il traffico che indirizzi è interno alla rete I2P, tu non sei un nodo di uscita (outproxy).\nLa tua unica alternativa è di rifiutare di indirizzare\nqualsivoglia traffico, impostando a 0 la larghezza di banda condivisa o il numero massimo di tunnel partecipanti (vedi sopra).\nTi saremmo grati se evitassi di assumere un comportamento del genere, dovresti invece dare una mano alla rete indirizzando il traffico per altri.\nPiù del 95% degli utenti lo fa."
+msgstr ""
+"Distribuzione - Tutto il traffico I2P è cifrato a strati multipli."
+" Non si può sapere \n"
+"il contenuto di un messaggio, la sua fonte e la sua destinazione.\n"
+"Tutto il traffico che indirizzi è interno alla rete I2P, tu non sei un nodo di uscita (outproxy).\n"
+"La tua unica alternativa è di rifiutare di indirizzare\n"
+"qualsivoglia traffico, impostando a 0 la larghezza di banda "
+"condivisa o il numero massimo di tunnel partecipanti (vedi sopra).\n"
+"Ti saremmo grati se evitassi di assumere un comportamento del genere, "
+"dovresti invece dare una mano alla rete indirizzando il traffico per "
+"altri.\n"
+"Più del 95% degli utenti lo fa."
#: i2p2www/pages/site/faq.html:211
msgid ""
-"Storage - I2P does not do distributed storage of content. You must be thinking of\n"
+"Storage - I2P does not do distributed storage of content. You must"
+" be thinking of\n"
"Freenet.\n"
"Nobody's content is being stored on your computer by running I2P."
-msgstr "Deposito - I2P non effettua la distribuzione di depositi di contenuti. Devi pensare a \nFreenet.\nSul tuo computer non viene depositato il contenuto di nessuno eseguendo I2P."
+msgstr ""
+"Deposito - I2P non effettua la distribuzione di depositi di "
+"contenuti. Devi pensare a \n"
+"Freenet.\n"
+"Sul tuo computer non viene depositato il contenuto di nessuno eseguendo "
+"I2P."
#: i2p2www/pages/site/faq.html:218
msgid ""
-"Access - If there are some eepsites you don't like, don't go there.\n"
+"Access - If there are some eepsites you don't like, don't go "
+"there.\n"
"Or, use a blocking proxy like Privoxy or some type of \"net nanny\"."
-msgstr "Accesso - Se ci sono degli eepsite che non ti piacciono, non visitarli.\nAltrimenti usa un proxy di blocco come Privoxy o qualche tipo di \"balia della rete\"."
+msgstr ""
+"Accesso - Se ci sono degli eepsite che non ti piacciono, non "
+"visitarli.\n"
+"Altrimenti usa un proxy di blocco come Privoxy o qualche tipo di \"balia "
+"della rete\"."
#: i2p2www/pages/site/faq.html:228
msgid ""
"No. This is normal.\n"
"All routers adjust dynamically to changing network conditions and demands."
-msgstr "No. Questo è normale.Tutti i router si regolano in maniera dinamica al cambiare delle condizioni della rete e delle richieste."
+msgstr ""
+"No. Questo è normale.Tutti i router si regolano in maniera dinamica al "
+"cambiare delle condizioni della rete e delle richieste."
#: i2p2www/pages/site/faq.html:235
msgid ""
-"You may need to reseed your I2P router. With recent versions of I2P you can "
-"go to http://localhost:7657/configreseed"
-" and click the Save Changes and Reseed Now button. If this method "
-"doesn't work—or you're using a very old version—you may need to "
-"reseed manually."
-msgstr "Potrebbe essere necessario fare il reseed del tuo router I2P. Con le versioni recenti di I2P, puoi accedere a http://localhost:7657/configreseed e fare clic sul pulsante Salva modifiche e fail il reseed adesso. Se questo metodo non funziona—o se stai usando una versione molto vecchia—potrebbe rendersi necessario fare il reseed manualmente."
+" and click the Save Changes and Reseed Now button. If this "
+"method doesn't work—or you're using a very old version—you "
+"may need to reseed manually."
+msgstr ""
+"Potrebbe essere necessario fare il reseed del tuo router I2P. Con le "
+"versioni recenti di I2P, puoi accedere a http://localhost:7657/configreseed"
+" e fare clic sul pulsante Salva modifiche e fail il reseed "
+"adesso. Se questo metodo non funziona—o se stai usando una "
+"versione molto vecchia—potrebbe rendersi necessario fare il reseed manualmente."
#: i2p2www/pages/site/faq.html:238
msgid ""
-"The reseed URL changed a few years ago. If this is your first install and you have installed\n"
+"The reseed URL changed a few years ago. If this is your first install and"
+" you have installed\n"
"an old (0.6.1.30 or earlier) release, or\n"
"you have not run I2P in a long time, you must change the URL and then\n"
"click \"Reseed\" on the console to find other routers.\n"
"After your router is running,\n"
-"on configadvanced.jsp,\n"
+"on configadvanced.jsp,"
+"\n"
"add the line i2p.reseedURL=http://netdb.i2p2.de/\n"
-"OR i2p.reseedURL=http://i2pdb.tin0.de/netDb/ (either should work),\n"
+"OR i2p.reseedURL=http://i2pdb.tin0.de/netDb/ (either should "
+"work),\n"
"then click \"Apply\", then click the \"reseed\" link on the left."
-msgstr "L'URL del reseed cambiò qualche anno fa. Se questa è la tua prima installazione e hai installato\nauan versione vecchia (0.6.1.30 o precedente), oppure\nse non hai eseguito I2P da tanto tempo, devi cambiare l'URL e quindi\nfare clic su \"Reseed\" nella console per trovare altri router.\nUna volta che il tuo router è in esecuzione,\nin configadvanced.jsp,\naggiungi la riga i2p.reseedURL=http://netdb.i2p2.de/\nOPPURE i2p.reseedURL=http://i2pdb.tin0.de/netDb/ (sia una che l'latra dovrebbero funzionare),\nquindi fai clic su \"Applica\", e sul link \"reseed\" sulla sinistra."
+msgstr ""
+"L'URL del reseed cambiò qualche anno fa. Se questa è la tua prima "
+"installazione e hai installato\n"
+"auan versione vecchia (0.6.1.30 o precedente), oppure\n"
+"se non hai eseguito I2P da tanto tempo, devi cambiare l'URL e quindi\n"
+"fare clic su \"Reseed\" nella console per trovare altri router.\n"
+"Una volta che il tuo router è in esecuzione,\n"
+"in configadvanced.jsp,"
+"\n"
+"aggiungi la riga i2p.reseedURL=http://netdb.i2p2.de/\n"
+"OPPURE i2p.reseedURL=http://i2pdb.tin0.de/netDb/ (sia una che "
+"l'latra dovrebbero funzionare),\n"
+"quindi fai clic su \"Applica\", e sul link \"reseed\" sulla sinistra."
#: i2p2www/pages/site/faq.html:249
#, python-format
msgid ""
"This works if you are running 0.6.1.27 or later.\n"
-"If you are running release 0.6.1.31 or later, you probably don't need to do this.\n"
+"If you are running release 0.6.1.31 or later, you probably don't need to "
+"do this.\n"
"If you are running release 0.6.1.26 or earlier, either follow the\n"
"manual reseed instructions below\n"
"or install the latest release.\n"
"Possible alternate method - add\n"
"wrapper.java.additional.5=-Di2p.reseedURL=http://netdb.i2p2.de/\n"
-"to wrapper.config, shutdown the router completely, then start again, then click \"reseed\".\n"
+"to wrapper.config, shutdown the router completely, then start again, then"
+" click \"reseed\".\n"
"Let us know if this works."
-msgstr "Questo funziona se stai eseguendo la versione 0.6.1.27 o successiva.\nSe usi la versione 0.6.1.31 o successiva, probabilmente non ti serve.\nSe stai eseguendo la versinoe 0.6.1.26 o precedente, segui le\nistruzioni per reseed manuale qui sotto\noppure installa la versione più recente.\nUn possibile metodo alternativo - aggiungi\nwrapper.java.additional.5=-Di2p.reseedURL=http://netdb.i2p2.de/\na wrapper.config, arresta completamente il router, quindi riavvialo e fai clic su \"reseed\".\nFacci sapere se funziona."
+msgstr ""
+"Questo funziona se stai eseguendo la versione 0.6.1.27 o successiva.\n"
+"Se usi la versione 0.6.1.31 o successiva, probabilmente non ti serve.\n"
+"Se stai eseguendo la versinoe 0.6.1.26 o precedente, segui le\n"
+"istruzioni per reseed manuale qui sotto\n"
+"oppure installa la versione più "
+"recente.\n"
+"Un possibile metodo alternativo - aggiungi\n"
+"wrapper.java.additional.5=-Di2p.reseedURL=http://netdb.i2p2.de/\n"
+"a wrapper.config, arresta completamente il router, quindi riavvialo e fai"
+" clic su \"reseed\".\n"
+"Facci sapere se funziona."
#: i2p2www/pages/site/faq.html:260
#, python-format
msgid ""
-"...but you *really* should upgrade to the "
-"latest version."
-msgstr "...ma dovresti *davvero* aggiornare passando alla versione più recente."
+"...but you *really* should upgrade to "
+"the latest version."
+msgstr ""
+"...ma dovresti *davvero* aggiornare "
+"passando alla versione più recente."
#: i2p2www/pages/site/faq.html:266
msgid ""
-"If your router has 10 or more active peers, everything is fine. Changes in releases 0.6.1.31 and 0.6.1.32 improved the\n"
-"efficiency of the router and effectively reduced the number of active peers.\n"
-"The router should maintain connections to a few peers at all times.\n"
-"The best way to stay \"better-connected\" to the network is to share more bandwidth."
-msgstr "Se il tuo router ha 10 o più peer attivi, tutto va bene. Le modifiche nelle versioni 0.6.1.31 e 0.6.1.32 hanno migliorato\nl'efficienza del router e hanno ridotto in modo efficace il numero di peer attivi.\nIl router dovrebbe mantenere le connessioni verso pochi peer in ogni momento.\nIl modo migliore per avere una \"connessione migliore\" alla rete è di condividere più banda."
+"If your router has 10 or more active peers, everything is fine. Changes "
+"in releases 0.6.1.31 and 0.6.1.32 improved the\n"
+"efficiency of the router and effectively reduced the number of active "
+"peers.\n"
+"The router should maintain connections to a few peers at all "
+"times.\n"
+"The best way to stay \"better-connected\" to the network is to share more bandwidth."
+msgstr ""
+"Se il tuo router ha 10 o più peer attivi, tutto va bene. Le modifiche "
+"nelle versioni 0.6.1.31 e 0.6.1.32 hanno migliorato\n"
+"l'efficienza del router e hanno ridotto in modo efficace il numero di "
+"peer attivi.\n"
+"Il router dovrebbe mantenere le connessioni verso pochi peer in "
+"ogni momento.\n"
+"Il modo migliore per avere una \"connessione migliore\" alla rete è di condividere più banda."
#: i2p2www/pages/site/faq.html:273
msgid ""
-"Is my router an \"exit node\" to the regular Internet? I don't want it to "
-"be."
-msgstr "Il mio router è un \"nodo di uscita\" sull'Internet normale? Non voglio che lo sia."
+"Is my router an \"exit node\" to the regular Internet? I don't want it to"
+" be."
+msgstr ""
+"Il mio router è un \"nodo di uscita\" sull'Internet normale? Non voglio "
+"che lo sia."
#: i2p2www/pages/site/faq.html:275
msgid ""
"No. Unlike Tor,\n"
-"\"exit nodes\" or \"outproxies\" are not an inherent part of the network.\n"
-"Only volunteers who set up and run separate applications will relay traffic to the regular Internet.\n"
+"\"exit nodes\" or \"outproxies\" are not an inherent part of the network."
+"\n"
+"Only volunteers who set up and run separate applications will relay "
+"traffic to the regular Internet.\n"
"There are very, very few of these."
-msgstr "No. A differenza di Tor,\ni \"nodi di uscita\" o \"outproxies\" non sono una parte intrinseca della rete.\nSolo i volontari che impostano ed eseguono applicazioni separate ripeteranno il traffico verso la rete Internet solita.\nNe esitono pochi, anzi, pochissimi."
+msgstr ""
+"No. A differenza di Tor,\n"
+"i \"nodi di uscita\" o \"outproxies\" non sono una parte intrinseca della"
+" rete.\n"
+"Solo i volontari che impostano ed eseguono applicazioni separate "
+"ripeteranno il traffico verso la rete Internet solita.\n"
+"Ne esitono pochi, anzi, pochissimi."
#: i2p2www/pages/site/faq.html:284
msgid ""
-"See above. There are very few HTTP \"outproxies\", they are not an inherent part of the network,\n"
+"See above. There are very few HTTP \"outproxies\", they are not an "
+"inherent part of the network,\n"
"and they may not be up.\n"
-"In addition, the old outproxies squid.i2p, true.i2p, and krabs.i2p have vanished.\n"
+"In addition, the old outproxies squid.i2p, true.i2p, and krabs.i2p have "
+"vanished.\n"
"The only outproxy at the moment is false.i2p.\n"
-"To use it, edit your i2ptunnel settings for eepProxy\n"
+"To use it, edit your i2ptunnel "
+"settings for eepProxy\n"
"and set your outproxy list to 'false.i2p' (only).\n"
"Then stop and restart the eepProxy.\n"
"If it doesn't work, the outproxy is not up. It is not I2P's fault.\n"
-"If your primary reason to use an anonymous network is to anonymously access sites\n"
-"on the regular Internet, you should probably try Tor."
-msgstr "Vedi sopra. Esistono pochissimi \"outproxy\" HTTP \"outproxies\", non fanno intrinsecamente parte della rete\ne potrebbero non funzionare.\nInoltre, i vecchi outproxy squid.i2p, true.i2p, e krabs.i2p sono scomparsi.\nL'unico outproxy al momento è false.i2p.\nPer usarlo, modifica le tue impostazioni i2ptunnel per eepProxy\ne imposta il tuo elenco di outproxy su 'false.i2p' (only).\nQuindi interrompi e riavvia l'eepProxy.\nSe non funziona, significa che l'outproxy non funziona. Non è colpa di I2P.\nSe il motivo principale per usare una rete anonima è quello di accedere ai siti anonimamente\nsull'Internet normale, forse dovresti provare Tor."
+"If your primary reason to use an anonymous network is to anonymously "
+"access sites\n"
+"on the regular Internet, you should probably try Tor."
+msgstr ""
+"Vedi sopra. Esistono pochissimi \"outproxy\" HTTP \"outproxies\", non "
+"fanno intrinsecamente parte della rete\n"
+"e potrebbero non funzionare.\n"
+"Inoltre, i vecchi outproxy squid.i2p, true.i2p, e krabs.i2p sono "
+"scomparsi.\n"
+"L'unico outproxy al momento è false.i2p.\n"
+"Per usarlo, modifica le tue impostazioni "
+"i2ptunnel per eepProxy\n"
+"e imposta il tuo elenco di outproxy su 'false.i2p' (only).\n"
+"Quindi interrompi e riavvia l'eepProxy.\n"
+"Se non funziona, significa che l'outproxy non funziona. Non è colpa di "
+"I2P.\n"
+"Se il motivo principale per usare una rete anonima è quello di accedere "
+"ai siti anonimamente\n"
+"sull'Internet normale, forse dovresti provare Tor."
#: i2p2www/pages/site/faq.html:299
msgid ""
-"Within I2P, there is no need for HTTPS, as all traffic is encrypted end-to-end.\n"
+"Within I2P, there is no need for HTTPS, as all traffic is encrypted end-"
+"to-end.\n"
"FTP is not supported for technical reasons."
-msgstr "All'interno di I2P non c'è bisogno di HTTPS perché tutto il traffico è criptato punto-a-punto.\nFTP non è supportato per motivi tecnici."
+msgstr ""
+"All'interno di I2P non c'è bisogno di HTTPS perché tutto il traffico è "
+"criptato punto-a-punto.\n"
+"FTP non è supportato per motivi tecnici."
#: i2p2www/pages/site/faq.html:303
msgid ""
-"There are no FTP \"outproxies\" to the Internet—it may not even be possible to set up one.\n"
-"Any other kind of outproxy may work if it's set up with a standard tunnel. \n"
-"If you would like to set up some type of outproxy, carefully research the potential risks.\n"
-"The I2P community may or may not be able to help with the technical aspects, feel free to ask."
-msgstr "Non ci sono \"outproxy\" FTP verso Internet—potrebbe addirittura non essere possibile impostarne uno.\nQualunque altro tipo di outproxy potrebbe funzionare se viene impostato con il tunnel standard. \nSe desideri impostare qualche tipo di outproxy, cerca con attenzione i rischi potenziali in cui potresti incorrere.\nLa comunità I2P potrebbe, o non potrebbe, essere in grado di darti una mano con gli aspetti tecnici, sentiti libero di porre domande."
+"There are no FTP \"outproxies\" to the Internet—it may not even be "
+"possible to set up one.\n"
+"Any other kind of outproxy may work if it's set up with a standard "
+"tunnel. \n"
+"If you would like to set up some type of outproxy, carefully research the"
+" potential risks.\n"
+"The I2P community may or may not be able to help with the technical "
+"aspects, feel free to ask."
+msgstr ""
+"Non ci sono \"outproxy\" FTP verso Internet—potrebbe addirittura "
+"non essere possibile impostarne uno.\n"
+"Qualunque altro tipo di outproxy potrebbe funzionare se viene impostato "
+"con il tunnel standard. \n"
+"Se desideri impostare qualche tipo di outproxy, cerca con attenzione i "
+"rischi potenziali in cui potresti incorrere.\n"
+"La comunità I2P potrebbe, o non potrebbe, essere in grado di darti una "
+"mano con gli aspetti tecnici, sentiti libero di porre domande."
#: i2p2www/pages/site/faq.html:309
msgid ""
-"As explained several times above, any existing outproxy isn't a core part of the network.\n"
+"As explained several times above, any existing outproxy isn't a core part"
+" of the network.\n"
"They are services run by individuals and they may or may not\n"
"be operational at any given time."
-msgstr "Come spiegato tante volte in precedenza, qualunque outproxy esistente non fa parte della rete in quanto tale.\nSi tratta di servizi messi a disposizione da singoli individue e, come tali,\npotrebbero essere operativi o no in un dato momento."
+msgstr ""
+"Come spiegato tante volte in precedenza, qualunque outproxy esistente non"
+" fa parte della rete in quanto tale.\n"
+"Si tratta di servizi messi a disposizione da singoli individue e, come "
+"tali,\n"
+"potrebbero essere operativi o no in un dato momento."
#: i2p2www/pages/site/faq.html:314
msgid ""
-"Update: Thanks to the work of h2ik, there is an https outproxy available for use via I2P. Starting with I2P 0.8.4 the tunnel is configured out of the box.localhost 6668
. XChat-like client users can create a\n"
-"new network with the server localhost/6668
(remember to tick "Bypass\n"
+"A tunnel to the main IRC server within I2P, Irc2P, is created when I2P is"
+" installed (see\n"
+"the I2PTunnel "
+"configuration page),\n"
+"and is automatically started when the I2P router starts. To connect to "
+"it, tell your IRC\n"
+"client to connect to localhost 6668
. XChat-like client users"
+" can create a\n"
+"new network with the server localhost/6668
(remember to tick"
+" "Bypass\n"
"proxy server" if you have a proxy server configured)."
-msgstr "\nUn tunnel verso il server IRC principale all'interno di I2P, Irc2P, viene creato al momento dell'installazione di I2P (consulta\nla pagina di configurazione di I2PTunnel)\ned è avviato automaticamente quando si avvia il router I2P. Per connetterti, istruisci il tuo client\nIRC a connettersi a localhost 6668
. I client simili a XCha possono creare una nuova\nrete con il server localhost/6668
(ricorda di mettere il segno di spunta sull'opzione "Bypassa\nil server proxyr" nel caso in cui tu abbia un server proxy preconfigurato)."
+msgstr ""
+"\n"
+"Un tunnel verso il server IRC principale all'interno di I2P, Irc2P, viene"
+" creato al momento dell'installazione di I2P (consulta\n"
+"la pagina di "
+"configurazione di I2PTunnel)\n"
+"ed è avviato automaticamente quando si avvia il router I2P. Per "
+"connetterti, istruisci il tuo client\n"
+"IRC a connettersi a localhost 6668
. I client simili a XCha "
+"possono creare una nuova\n"
+"rete con il server localhost/6668
(ricorda di mettere il "
+"segno di spunta sull'opzione "Bypassa\n"
+"il server proxyr" nel caso in cui tu abbia un server proxy "
+"preconfigurato)."
#: i2p2www/pages/site/faq.html:437
msgid ""
-"For security purposes, the router's admin console by default only listens\n"
+"For security purposes, the router's admin console by default only listens"
+"\n"
"for connections on the local interface. However, with a little hacking,\n"
"you can make it reachable remotely:"
-msgstr "Per motivi di sicurezza, la console admin del router di default rimane in ascolto soltanto\ndelle connessioni sull'interfaccia locale. Tuttavia, con qualche intervento,\npuoi fare in modo che sia accessibile da remoto:"
+msgstr ""
+"Per motivi di sicurezza, la console admin del router di default rimane in"
+" ascolto soltanto\n"
+"delle connessioni sull'interfaccia locale. Tuttavia, con qualche "
+"intervento,\n"
+"puoi fare in modo che sia accessibile da remoto:"
#: i2p2www/pages/site/faq.html:445
msgid ""
@@ -1786,35 +2558,75 @@ msgid ""
"clientApp.0.args=7657 ::1,127.0.0.1 ./webapps/
clientApp.0.args=7657 0.0.0.0 ./webapps/
"
-msgstr "Apri ~/.i2p/clients.config
e sostituisciclientApp.0.args=7657 ::1,127.0.0.1 ./webapps/
clientApp.0.args=7657 0.0.0.0 ./webapps/
"
+msgstr ""
+"Apri ~/.i2p/clients.config
e sostituisciclientApp.0.args=7657 ::1,127.0.0.1 ./webapps/
clientApp.0.args=7657 0.0.0.0 ./webapps/
"
#: i2p2www/pages/site/faq.html:453
msgid ""
-"Go to http://localhost:7657/configui\n"
+"Go to http://localhost:7657/configui"
+"\n"
"and add a console username and password if desired."
-msgstr "Accedi a http://localhost:7657/configui\ne aggiungi un nome utente e password per la console se vuoi."
+msgstr ""
+"Accedi a http://localhost:7657/configui"
+"\n"
+"e aggiungi un nome utente e password per la console se vuoi."
#: i2p2www/pages/site/faq.html:459
msgid ""
-"Go to http://localhost:7657/index.jsp\n"
-"and hit \"Graceful restart\", which restarts the JVM and reloads the client applications"
-msgstr "Accedi a http://localhost:7657/index.jsp\ne fai clic su \"Riavvia garbatamente\", un'opzione che riavvia la JVM e ricaricare le applicazioni client."
+"Go to http://localhost:7657/index.jsp"
+"\n"
+"and hit \"Graceful restart\", which restarts the JVM and reloads the "
+"client applications"
+msgstr ""
+"Accedi a http://localhost:7657/index.jsp"
+"\n"
+"e fai clic su \"Riavvia garbatamente\", un'opzione che riavvia la JVM e "
+"ricaricare le applicazioni client."
#: i2p2www/pages/site/faq.html:466
msgid ""
-"After that fires up, you should now be able to reach your console remotely. Reload the router at\n"
-"http://127.0.0.1:7657 and you will be prompted for the username and password you specified in step 2\n"
+"After that fires up, you should now be able to reach your console "
+"remotely. Reload the router at\n"
+"http://127.0.0.1:7657 and you will be prompted for the username and "
+"password you specified in step 2\n"
"above if your browser supports the authentication popup. Note: the\n"
-"0.0.0.0
above specifies an interface, not a network or netmask. 0.0.0.0\n"
-"means \"bind to all interfaces\", so it can be reachable on 127.0.0.1:7657 as well as\n"
+"0.0.0.0
above specifies an interface, not a network "
+"or netmask. 0.0.0.0\n"
+"means \"bind to all interfaces\", so it can be reachable on "
+"127.0.0.1:7657 as well as\n"
"any LAN/WAN IP."
-msgstr "Dopo d che, dovresti essere in grado di raggiungere la console da remote. Ricarica il router at\nhttp://127.0.0.1:7657 e ti sarà richiesto il nome utente e la password che indicato al punto 2\nqui sopra se il tuo browser supporta i popup di autenticazione. Nota: l'indirizzo\n0.0.0.0
qui sopra indica l'interfaccia, non la rete o il netmask. 0.0.0.0\nsignifica \"lega a tutte le interfacce\", per cui può essere raggiunto su 127.0.0.1:7657 e anche da qualunque indirizzo internet di\nLAN o WAN."
+msgstr ""
+"Dopo d che, dovresti essere in grado di raggiungere la console da remote."
+" Ricarica il router at\n"
+"http://127.0.0.1:7657 e ti sarà richiesto il nome utente e la password "
+"che indicato al punto 2\n"
+"qui sopra se il tuo browser supporta i popup di autenticazione. Nota: "
+"l'indirizzo\n"
+"0.0.0.0
qui sopra indica l'interfaccia, non la rete o"
+" il netmask. 0.0.0.0\n"
+"significa \"lega a tutte le interfacce\", per cui può essere raggiunto su"
+" 127.0.0.1:7657 e anche da qualunque indirizzo internet di\n"
+"LAN o WAN."
#: i2p2www/pages/site/faq.html:477
msgid ""
-"By default, the router I2CP interface (port 7654) binds to address 127.0.0.1. To bind to 0.0.0.0, set the\n"
-"router advanced configuration option i2cp.tcp.bindAllInterfaces=true and restart."
-msgstr "Come impostazione predefinita, l'interfaccia I2CP del router (porta 7654) si lega all'indirizzo 127.0.0.1. Per legarla a 0.0.0.0, imposta l'opzione di configurazione avanzata del router su\nrouter advanced configuration option i2cp.tcp.bindAllInterfaces=true e riavvia."
+"By default, the router I2CP interface (port 7654) binds to address "
+"127.0.0.1. To bind to 0.0.0.0, set the\n"
+"router advanced configuration option "
+"i2cp.tcp.bindAllInterfaces=true and restart."
+msgstr ""
+"Come impostazione predefinita, l'interfaccia I2CP del router (porta 7654)"
+" si lega all'indirizzo 127.0.0.1. Per legarla a 0.0.0.0, imposta "
+"l'opzione di configurazione avanzata del router su\n"
+"router advanced configuration option "
+"i2cp.tcp.bindAllInterfaces=true e riavvia."
#: i2p2www/pages/site/faq.html:482
msgid "Whats an \"eepsite\"?"
@@ -1822,31 +2634,52 @@ msgstr "Cos'è un \"eepsite\"?"
#: i2p2www/pages/site/faq.html:484
msgid ""
-"An eepsite is a website that is hosted anonymously - you can access it by\n"
+"An eepsite is a website that is hosted anonymously - you can access it by"
+"\n"
"setting your web browser's HTTP proxy to use the web proxy (typically it\n"
"listens on localhost port 4444), and browsing to the site."
-msgstr "Un eepsite è un sito web ospitato in maniera anonima: puoi accedervi\nimpostando il tuo proxy HTTP del browser per usare un proxy web (che di solito è in ascolto\nsu localhost port 4444) e navigando verso il sito."
+msgstr ""
+"Un eepsite è un sito web ospitato in maniera anonima: puoi accedervi\n"
+"impostando il tuo proxy HTTP del browser per usare un proxy web (che di "
+"solito è in ascolto\n"
+"su localhost port 4444) e navigando verso il sito."
#: i2p2www/pages/site/faq.html:492
#, python-format
msgid ""
-"The proxy config for different browsers is on a \n"
-"separate page with screenshots. More advanced configs with external tools\n"
+"The proxy config for different browsers is on a \n"
+"separate page with screenshots. More advanced configs with external "
+"tools\n"
"are possible but could introduce leaks in your setup."
-msgstr "La configurazione del proxy per browser differenti si trova su una \npagina separata con i relativi screenshot. Sono possibili configurazioni più avanzate con strumenti esterni\nma potrebbero introdurre delle falle nella tua impostazione."
+msgstr ""
+"La configurazione del proxy per browser differenti si trova su una \n"
+"pagina separata con i relativi screenshot. Sono possibili "
+"configurazioni più avanzate con strumenti esterni\n"
+"ma potrebbero introdurre delle falle nella tua impostazione."
#: i2p2www/pages/site/faq.html:501
msgid ""
"x is the number of peers you've sent or received a message from\n"
-"successfully in the last minute, y is the number of peers seen in the last\n"
+"successfully in the last minute, y is the number of peers seen in the "
+"last\n"
"hour or so."
-msgstr "x è il numero di peer a cui hai inviato o da cui ha ricevuto un messaggio con successo\nnell'ultimo minuto, y è il numero di peer visti nell'ultima\nora all'incirca."
+msgstr ""
+"x è il numero di peer a cui hai inviato o da cui ha ricevuto un messaggio"
+" con successo\n"
+"nell'ultimo minuto, y è il numero di peer visti nell'ultima\n"
+"ora all'incirca."
#: i2p2www/pages/site/faq.html:509
msgid ""
-"The SOCKS proxy is working as of release 0.7.1. SOCKS 4/4a/5 are supported.\n"
+"The SOCKS proxy is working as of release 0.7.1. SOCKS 4/4a/5 are "
+"supported.\n"
"There is no SOCKS outproxy so it is of limited use."
-msgstr "Il proxy SOCKS funziona a partire dalla versione 0.7.1. Sono supportati i SOCKS 4/4a/5.\nNon c'è alcun outproxy SOCKS per cui il suo uso è limitato."
+msgstr ""
+"Il proxy SOCKS funziona a partire dalla versione 0.7.1. Sono supportati i"
+" SOCKS 4/4a/5.\n"
+"Non c'è alcun outproxy SOCKS per cui il suo uso è limitato."
#: i2p2www/pages/site/faq.html:513
msgid ""
@@ -1856,54 +2689,112 @@ msgid ""
"information as content, I2P has no way to protect your anonymity. For\n"
"example, some mail applications will send the IP address of the machine\n"
"they are running on to a mail server. There is no way for I2P to filter\n"
-"this, thus using I2P to 'socksify' existing applications is possible, but\n"
+"this, thus using I2P to 'socksify' existing applications is possible, but"
+"\n"
"extremely dangerous."
-msgstr "Inoltre, molte applicazioni rivelano informazioni\nsensibili che potrebbero farti identificare su Internet. I2P filtra soltanto\ni dati di connessione, ma se il programma che pensi di eseguire invia tali \ninformazioni come contenuti, I2P non ha modo di proteggere il tuo anonimato. \nAd esempio, alcune applicazioni di posta elettronica invieranno al server di posta elettronica\nl'indirizzo IP del computer su cui vengono eseguite. Non c'è modo per I2P di filtrarlo,\nperciò la 'socksettizzazione' di applicazioni esistenti è possibilethis, ma\npericolosissima."
+msgstr ""
+"Inoltre, molte applicazioni rivelano informazioni\n"
+"sensibili che potrebbero farti identificare su Internet. I2P filtra "
+"soltanto\n"
+"i dati di connessione, ma se il programma che pensi di eseguire invia "
+"tali \n"
+"informazioni come contenuti, I2P non ha modo di proteggere il tuo "
+"anonimato. \n"
+"Ad esempio, alcune applicazioni di posta elettronica invieranno al server"
+" di posta elettronica\n"
+"l'indirizzo IP del computer su cui vengono eseguite. Non c'è modo per I2P"
+" di filtrarlo,\n"
+"perciò la 'socksettizzazione' di applicazioni esistenti è possibilethis, "
+"ma\n"
+"pericolosissima."
#: i2p2www/pages/site/faq.html:523
#, python-format
msgid ""
-"If you would like more information on the socks proxy application anyway,\n"
+"If you would like more information on the socks proxy application anyway,"
+"\n"
"there are some helpful hints on the socks page."
-msgstr "Se desideri comunque ulteriori informazioni sull'applicazione di proxy socks,\necco alcuni suggerimenti utili nella pagina di socks."
+msgstr ""
+"Se desideri comunque ulteriori informazioni sull'applicazione di proxy "
+"socks,\n"
+"ecco alcuni suggerimenti utili nella pagina di "
+"socks."
#: i2p2www/pages/site/faq.html:530
msgid ""
"Okay, here's a rundown of the default ports (everything is configurable\n"
"through various settings, of course):"
-msgstr "Bene, ecco un riepilogo delle porte predefinite (ogni cosa è configurabileable\ntramite svariate impostazioni, ovviamente):"
+msgstr ""
+"Bene, ecco un riepilogo delle porte predefinite (ogni cosa è "
+"configurabileable\n"
+"tramite svariate impostazioni, ovviamente):"
#: i2p2www/pages/site/faq.html:539
msgid ""
"Internet-facing ports\n"
-"Note: New installs as of release 0.7.8 do not use port 8887; they select a random port\n"
+"Note: New installs as of release 0.7.8 do not use port 8887; they select "
+"a random port\n"
"between 9000 and 31000 when the program is run for the first time.\n"
-"The selected port is shown on the router configuration page."
-msgstr "Porte per l'accesso a Internet\nNota: le nuove installazioni a partire dalla versione 0.7.8 non usano la porta 8887, ma selezionano invece una porta casuale\ncompresa tra 9000 e 31000 quando il programma viene eseguito per la prima volta.\nTale porta è mostrata nellla pagina di configurazione del router."
+"The selected port is shown on the router configuration page."
+msgstr ""
+"Porte per l'accesso a Internet\n"
+"Nota: le nuove installazioni a partire dalla versione 0.7.8 non usano la "
+"porta 8887, ma selezionano invece una porta casuale\n"
+"compresa tra 9000 e 31000 quando il programma viene eseguito per la prima"
+" volta.\n"
+"Tale porta è mostrata nellla pagina di configurazione"
+" del router."
#: i2p2www/pages/site/faq.html:547
msgid ""
-"Outbound UDP from the random port noted on the configuration page to arbitrary remote UDP ports, allowing replies\n"
+"Outbound UDP from the random port noted on the configuration page to "
+"arbitrary remote UDP ports, allowing replies\n"
+" "
+msgstr ""
+"UDP in uscita dalla porta casuale indicata nella pagina di configurazione"
+" verso porte UDP remote arbitrarie, per consentire le risposte\n"
" "
-msgstr "UDP in uscita dalla porta casuale indicata nella pagina di configurazione verso porte UDP remote arbitrarie, per consentire le risposte\n "
#: i2p2www/pages/site/faq.html:552
msgid ""
"Outbound TCP from random high ports to arbitrary remote TCP ports\n"
" "
-msgstr "TCP in uscita da porte casuali alte verso porte TCP remote arbitrarie\n "
+msgstr ""
+"TCP in uscita da porte casuali alte verso porte TCP remote "
+"arbitrarie\n"
+" "
#: i2p2www/pages/site/faq.html:557
msgid ""
-"(optional, but recommended) Inbound UDP to the port noted on configuration page from arbitrary locations\n"
+"(optional, but recommended) Inbound UDP to the port noted on configuration page from "
+"arbitrary locations\n"
+" "
+msgstr ""
+"(facoltativo, ma consigliato) UDP in entrata verso la porta indicata "
+"nella pagina di "
+"configurazione da posizioni arbitrarie\n"
" "
-msgstr "(facoltativo, ma consigliato) UDP in entrata verso la porta indicata nella pagina di configurazione da posizioni arbitrarie\n "
#: i2p2www/pages/site/faq.html:562
msgid ""
-"(optional, but recommended) Inbound TCP to the port noted on configuration page from arbitrary locationssu
or log in as root
."
-msgstr "Passa all'utente amministratore con su
oppure effettua il login come root
."
+"Switch to the root user with su
or log in as "
+"root
."
+msgstr ""
+"Passa all'utente amministratore con su
oppure effettua il "
+"login come root
."
#: i2p2www/pages/site/faq.html:807
#, python-format
msgid ""
-"If you cannot install these compatibility libraries (or do not want to), other\n"
-"possibilities would be to compile the wrapper for your\n"
-"system, starting I2P with the runplain.sh
script, or you can\n"
+"If you cannot install these compatibility libraries (or do not want to), "
+"other\n"
+"possibilities would be to compile the wrapper for your\n"
+"system, starting I2P with the runplain.sh
script, or you"
+" can\n"
"replace the wrapper with one from the source tarball."
-msgstr "Se non riesci a installare queste librerie di compatibilità (o non vuoi farlo), le altre\npossibilità a tua disposizione potrebbero esser la compilazione del wrapper per il tuo\nsistema, l'avvio di I2P con lo script runplain.sh
oppure \nla sostituzione del wrapper con uno contenuto nel file sorgente compresso con tar."
+msgstr ""
+"Se non riesci a installare queste librerie di compatibilità (o non vuoi "
+"farlo), le altre\n"
+"possibilità a tua disposizione potrebbero esser la compilazione del "
+"wrapper per il tuo\n"
+"sistema, l'avvio di I2P con lo script runplain.sh
oppure"
+" \n"
+"la sostituzione del wrapper con uno contenuto nel file sorgente compresso"
+" con tar."
#: i2p2www/pages/site/faq.html:813
msgid ""
"For the 0.8.9 release of I2P, the wrapper was upgraded to v3.5.12 and "
"compiled on systems running FreeBSD 7.2."
-msgstr "Per la versione 0.8.9 di I2P, il wrapper è stato aggiornata alla versione 3.5.12 e compilato su sistemi FreeBDS 7.2."
+msgstr ""
+"Per la versione 0.8.9 di I2P, il wrapper è stato aggiornata alla versione"
+" 3.5.12 e compilato su sistemi FreeBDS 7.2."
#: i2p2www/pages/site/faq.html:817
msgid ""
"In wrapper.log
I see an error that states \"Protocol "
"family unavailable
\" when loading the Router Console"
-msgstr "Nel wrapper.log
osservo un errore relativo alla famiglia di protocolli non disponibile
quando viene caricato il console router."
+msgstr ""
+"Nel wrapper.log
osservo un errore relativo alla "
+"famiglia di protocolli non disponibile
quando viene caricato"
+" il console router."
#: i2p2www/pages/site/faq.html:819
msgid ""
-"Often this error will occur with any network enabled java software on some "
-"systems that are configured to use IPv6 by default. There are a few ways to "
-"solve this:"
-msgstr "Spesso tale errore si verifica con qualunque software java abilitato per le reti su alcuni sistemi che sono configurati per l'uso di IPv6 come impostazione predefinita. Esistono alcuni modi per risolvere questo problema:"
+"Often this error will occur with any network enabled java software on "
+"some systems that are configured to use IPv6 by default. There are a few "
+"ways to solve this:"
+msgstr ""
+"Spesso tale errore si verifica con qualunque software java abilitato per "
+"le reti su alcuni sistemi che sono configurati per l'uso di IPv6 come "
+"impostazione predefinita. Esistono alcuni modi per risolvere questo "
+"problema:"
#: i2p2www/pages/site/faq.html:824
msgid ""
"On Linux based systems, you can echo 0 > "
"/proc/sys/net/ipv6/bindv6only
"
-msgstr "Sui sistemi basati su Linux, è possibile eseguire echo 0 > /proc/sys/net/ipv6/bindv6only
"
+msgstr ""
+"Sui sistemi basati su Linux, è possibile eseguire echo 0 > "
+"/proc/sys/net/ipv6/bindv6only
"
#: i2p2www/pages/site/faq.html:826
msgid "Look for the following lines in wrapper.config
."
@@ -2184,23 +3305,33 @@ msgstr "Cerca le seguenti righe nel wrapper.config
."
#: i2p2www/pages/site/faq.html:830
msgid ""
-"If the lines are there, uncomment them by removing the \"#\"s. If the lines "
-"are not there, add them without the \"#\"s."
-msgstr "Se tali righe esistono, rimuovi i loro simboli di commento \"#\". Se non esistono, aggiungile senza i simboli \"#\"."
+"If the lines are there, uncomment them by removing the \"#\"s. If the "
+"lines are not there, add them without the \"#\"s."
+msgstr ""
+"Se tali righe esistono, rimuovi i loro simboli di commento \"#\". Se non "
+"esistono, aggiungile senza i simboli \"#\"."
#: i2p2www/pages/site/faq.html:833
msgid ""
"Another option would be to remove the ::1 from "
"~/.i2p/clients.config
"
-msgstr "Un'altra opzione potrebbe essere quella di rimuovere ::1 da ~/.i2p/clients.config
"
+msgstr ""
+"Un'altra opzione potrebbe essere quella di rimuovere ::1"
+" da ~/.i2p/clients.config
"
#: i2p2www/pages/site/faq.html:837
msgid ""
-"WARNING: For any changes to wrapper.config
to take effect, you must completely\n"
+"WARNING: For any changes to wrapper.config
"
+"to take effect, you must completely\n"
"stop the router and the wrapper. Clicking Restart on your\n"
"router console will NOT reread this file! You must\n"
"click Shutdown, wait 11 minutes, then start I2P."
-msgstr "ATTENZIONE: perché wrapper.config
abbia qualche possibilità di avere effetto, devi interrompere completamento\nil router e il wrapper. Fare clic su Riavvia nel console\nrouter NON eseguirà una rilettura del file! Devi\nfare clic suArresta, attendere 11 minuti, quindi avviare I2P."
+msgstr ""
+"ATTENZIONE: perché wrapper.config
abbia "
+"qualche possibilità di avere effetto, devi interrompere completamento\n"
+"il router e il wrapper. Fare clic su Riavvia nel console\n"
+"router NON eseguirà una rilettura del file! Devi\n"
+"fare clic suArresta, attendere 11 minuti, quindi avviare I2P."
#: i2p2www/pages/site/faq.html:848
#, python-format
@@ -2208,7 +3339,12 @@ msgid ""
"Great! Find us on IRC irc.freenode.net #i2p or post to\n"
"the forum and we'll post it here (with\n"
"the answer, hopefully)."
-msgstr "Fantastico! Ci puoi trovare su IRC all'indirizzo irc.freenode.net nel canale #i2p oppure postare sul\nforum e noi provvederemo a postare qui (con\nla risposta, si spera)."
+msgstr ""
+"Fantastico! Ci puoi trovare su IRC all'indirizzo irc.freenode.net nel "
+"canale #i2p oppure postare sul\n"
+"forum e noi provvederemo a postare qui "
+"(con\n"
+"la risposta, si spera)."
#: i2p2www/pages/site/impressum.html:4
msgid "German laws"
@@ -2221,9 +3357,12 @@ msgstr "Rete anonima I2P"
#: i2p2www/pages/site/index.html:4
msgid ""
"Anonymous peer-to-peer distributed communication layer built with open "
-"source tools and designed to run any traditional Internet service such as "
-"email, IRC or web hosting."
-msgstr "Livello di comunicazione distribuito peer-to-peer anonimo compilato con strumenti open source e progettato per funzionare con qualunque servizio Internet come e-mail, IRC o web hosting."
+"source tools and designed to run any traditional Internet service such as"
+" email, IRC or web hosting."
+msgstr ""
+"Livello di comunicazione distribuito peer-to-peer anonimo compilato con "
+"strumenti open source e progettato per funzionare con qualunque servizio "
+"Internet come e-mail, IRC o web hosting."
#: i2p2www/pages/site/index.html:7
msgid "What does I2P do for you?"
@@ -2231,10 +3370,14 @@ msgstr "Che cosa fa I2P per te?"
#: i2p2www/pages/site/index.html:8
msgid ""
-"The I2P network provides strong privacy protections for communication over "
-"the Internet. Many activities that would risk your privacy on the public "
-"Internet can be conducted anonymously inside I2P."
-msgstr "La rete I2P fornisce una forte protezione della privacy per le comunicazioni su Internet. Molte delle attività che metterebbero in pericolo la tua privacy su Internet pubblica possono essere condotte in modo anonimo all'interno di I2P."
+"The I2P network provides strong privacy protections for communication "
+"over the Internet. Many activities that would risk your privacy on the "
+"public Internet can be conducted anonymously inside I2P."
+msgstr ""
+"La rete I2P fornisce una forte protezione della privacy per le "
+"comunicazioni su Internet. Molte delle attività che metterebbero in "
+"pericolo la tua privacy su Internet pubblica possono essere condotte in "
+"modo anonimo all'interno di I2P."
#: i2p2www/pages/site/index.html:9
#, python-format
@@ -2248,30 +3391,42 @@ msgstr "Cos'è I2P?"
#: i2p2www/pages/site/index.html:15
msgid ""
"I2P is an anonymous overlay network - a network within a network. It is "
-"intended to protect communication from dragnet surveillance and monitoring "
-"by third parties such as ISPs.\n"
-msgstr "I2P è una rete di copertura anonima, una rete dentro la rete. Il suo scopo è di proteggere le comunicazioni dal controllo a tappeto e dal monitoraggio di terze parti come gli ISP.\n"
+"intended to protect communication from dragnet surveillance and "
+"monitoring by third parties such as ISPs.\n"
+msgstr ""
+"I2P è una rete di copertura anonima, una rete dentro la rete. Il suo "
+"scopo è di proteggere le comunicazioni dal controllo a tappeto e dal "
+"monitoraggio di terze parti come gli ISP.\n"
#: i2p2www/pages/site/index.html:18
msgid ""
"I2P is used by many people who care about their privacy: activists, "
"oppressed people, journalists and whistleblowers, as well as the average "
"person.\n"
-msgstr "I2P è usato da molte persone che ci tengono alla propria privacy: attivisti, oppressi, giornalisti e gole profonde, e anche persone normali.\n"
+msgstr ""
+"I2P è usato da molte persone che ci tengono alla propria privacy: "
+"attivisti, oppressi, giornalisti e gole profonde, e anche persone "
+"normali.\n"
#: i2p2www/pages/site/index.html:21
msgid ""
-"No network can be \"perfectly anonymous\". The continued goal of I2P is to "
-"make attacks more and more difficult to mount. Its anonymity will get "
+"No network can be \"perfectly anonymous\". The continued goal of I2P is "
+"to make attacks more and more difficult to mount. Its anonymity will get "
"stronger as the size of the network increases and with ongoing academic "
"review.\n"
-msgstr "Nessuna rete può essere \"perfettamente anonima\". L'intento continuo di I2P è di rendere gli attacchi sempre più difficili da lanciare. Il suo anonimato si rafforzerà all'aumentare delle dimensioni e degli studi accademici che verranno continuamente condotti.\n"
+msgstr ""
+"Nessuna rete può essere \"perfettamente anonima\". L'intento continuo di "
+"I2P è di rendere gli attacchi sempre più difficili da lanciare. Il suo "
+"anonimato si rafforzerà all'aumentare delle dimensioni e degli studi "
+"accademici che verranno continuamente condotti.\n"
#: i2p2www/pages/site/index.html:24
msgid ""
-"I2P is available on desktops, embedded systems (like the Raspberry Pi) and "
-"Android phones. Help spread the word!\n"
-msgstr "I2P è disponibile per desktop, sistemi integrati (come il Raspberry Pi) e i telefonini Android. Dacci una mano con il passaparola!\n"
+"I2P is available on desktops, embedded systems (like the Raspberry Pi) "
+"and Android phones. Help spread the word!\n"
+msgstr ""
+"I2P è disponibile per desktop, sistemi integrati (come il Raspberry Pi) e"
+" i telefonini Android. Dacci una mano con il passaparola!\n"
#: i2p2www/pages/site/index.html:28
msgid "Read more…"
@@ -2284,56 +3439,72 @@ msgstr "Che cosa puoi fare con I2P?"
#: i2p2www/pages/site/index.html:36
#, python-format
msgid ""
-"Email: Integrated web mail interface, "
-"plugin for serverless email."
-msgstr "Email: interfaccia web integrata per la posta elettronica, plugin per la posta elettronica senza server."
+"Email: Integrated web mail interface,"
+" plugin for serverless email."
+msgstr ""
+"Email: interfaccia web integrata per "
+"la posta elettronica, plugin per la posta elettronica senza server."
#: i2p2www/pages/site/index.html:41
#, python-format
msgid ""
-"Web browsing: Anonymous websites,"
-" gateways to and from the public Internet."
-msgstr "Navigazione web: siti web anonimi, gateway verso e dallInternet pubblica."
+"Web browsing: Anonymous "
+"websites, gateways to and from the public Internet."
+msgstr ""
+"Navigazione web: siti web "
+"anonimi, gateway verso e dallInternet pubblica."
#: i2p2www/pages/site/index.html:46
#, python-format
msgid ""
"Blogging and forums: "
"Blogging and Syndie plugins."
-msgstr "Blog e forum: plugin per gestire blog e per Syndie."
+msgstr ""
+"Blog e forum: plugin "
+"per gestire blog e per Syndie."
#: i2p2www/pages/site/index.html:51
#, python-format
msgid ""
-"Website hosting: Integrated "
-"anonymous web server."
-msgstr "Host di siti web: web server anonimo integrato."
+"Website hosting: Integrated"
+" anonymous web server."
+msgstr ""
+"Host di siti web: web "
+"server anonimo integrato."
#: i2p2www/pages/site/index.html:56
#, python-format
msgid ""
"Real-time chat: Instant "
"messaging and IRC clients."
-msgstr "Chat in tempo reale: messaggistica immediata e client IRC."
+msgstr ""
+"Chat in tempo reale: "
+"messaggistica immediata e client IRC."
#: i2p2www/pages/site/index.html:61
#, python-format
msgid ""
-"File sharing: ED2K and Gnutella "
-"clients, integrated BitTorrent client."
-msgstr "File sharing: client ED2K e Gnutella, client BitTorrent integrato."
+"File sharing: ED2K and "
+"Gnutella clients, integrated BitTorrent client."
+msgstr ""
+"File sharing: client ED2K e "
+"Gnutella, client BitTorrent integrato."
#: i2p2www/pages/site/index.html:66
#, python-format
msgid ""
"Decentralized file "
"storage: Tahoe-LAFS distributed filesystem plugin."
-msgstr "Deposito file decentralizzato: plugin per il filesystem distribuito Tahoe-LAFS."
+msgstr ""
+"Deposito file "
+"decentralizzato: plugin per il filesystem distribuito Tahoe-LAFS."
#: i2p2www/pages/site/index.html:71
#, python-format
msgid "More supported applications…"
-msgstr "Altre applicazioni supportate…"
+msgstr ""
+"Altre applicazioni "
+"supportate…"
#: i2p2www/pages/site/index.html:79
msgid "News & Updates"
@@ -2347,8 +3518,12 @@ msgstr "Link e risorse consigliate"
#, python-format
msgid ""
"See also the page with\n"
-"links to presentations, videos, and tutorials about I2P."
-msgstr "\"Consulta\" anche la pagina con i\nlink alle presentazioni, ai video e ai tutorial relativi ad I2P."
+"links to presentations, videos, and tutorials about"
+" I2P."
+msgstr ""
+"\"Consulta\" anche la pagina con i\n"
+"link alle presentazioni, ai video e ai tutorial "
+"relativi ad I2P."
#: i2p2www/pages/site/links.html:12
msgid "I2P on the web"
@@ -2373,3 +3548,4 @@ msgstr "Bacheche, siti di notizie, altri"
#: i2p2www/pages/site/links.html:53
msgid "Very Old Stuff"
msgstr "Materiale molto vecchio"
+
diff --git a/i2p2www/translations/pt_BR/LC_MESSAGES/about.po b/i2p2www/translations/pt_BR/LC_MESSAGES/about.po
index e87eff58..e74d29b3 100644
--- a/i2p2www/translations/pt_BR/LC_MESSAGES/about.po
+++ b/i2p2www/translations/pt_BR/LC_MESSAGES/about.po
@@ -1,7 +1,7 @@
-# Translations template for I2P.
+# Portuguese (Brazil) translations for I2P.
# Copyright (C) 2014 ORGANIZATION
# This file is distributed under the same license as the I2P project.
-#
+#
# Translators:
# blueboy, 2013
# blueboy, 2014
@@ -9,18 +9,18 @@
# nuit 127.0.0.1,localhost
into the Exceptions box. Click Apply then OK\n"
+"Enter 127.0.0.1 and port 4444 into the HTTP box. Enter 127.0.0.1 and port"
+" 4445 into\n"
+"HTTPS box. Enter 127.0.0.1,localhost
into the Exceptions "
+"box. Click Apply then OK\n"
"to close the configuration window.\n"
-"Note/Privacy tip: Set the FTP proxy to the same settings as the HTTP proxy."
+"Note/Privacy tip: Set the FTP proxy to the same settings as the "
+"HTTP proxy."
msgstr ""
#: i2p2www/pages/site/about/browser-config.html:74
msgid ""
-"Remember: I2P was not designed for creating proxies to the outer Internet.\n"
+"Remember: I2P was not designed for creating proxies to the outer "
+"Internet.\n"
"Instead, it is meant to be used as an internal network."
-msgstr "Lembre-se: A I2P não foi projetada para a criação de proxies para a internet exterior.\nEm vez disso, pretende ser utilizada como uma rede interna."
+msgstr ""
+"Lembre-se: A I2P não foi projetada para a criação de proxies para a "
+"internet exterior.\n"
+"Em vez disso, pretende ser utilizada como uma rede interna."
#: i2p2www/pages/site/about/browser-config.html:78
msgid ""
-"The I2P project itself does not run any proxies to the Internet. \n" +"
The I2P project itself does not run any proxies to the " +"Internet. \n" "The only outproxy is a service from the privacy solutions project. \n" -"Consider donating to them for a continued stable service. Higher bandwidth will \n" -"increase with the founding of the organization. Maybe more outproxies too.
\n" +"Consider donating to them for a continued stable service. Higher " +"bandwidth will \n" +"increase with the founding of the organization. Maybe more outproxies " +"too.\n" "http://privacysolutions.no" msgstr "" @@ -134,8 +179,10 @@ msgstr "" #: i2p2www/pages/site/about/browser-config.html:86 #, python-format msgid "" -"By default, I2P comes with two outproxies configured:%(http)s
\n"
-"and %(https)s
. Even the domain names are different, it's the same outproxy you hit.\n"
+"By default, I2P comes with two outproxies configured: "
+"%(http)s
\n"
+"and %(https)s
. Even the domain names are different, it's the"
+" same outproxy you hit.\n"
"(multi-homed/keyed for better performance)"
msgstr ""
@@ -143,15 +190,20 @@ msgstr ""
msgid ""
"Filtering is active on these outproxies (for example, mibbit and torrent\n"
"tracker access is blocked). Eepsites\n"
-"that are accessible via .i2p addresses are also not allowed via the outproxies.\n"
+"that are accessible via .i2p addresses are also not allowed via the "
+"outproxies.\n"
"As a convenience, the outproxy blocks ad servers."
msgstr ""
#: i2p2www/pages/site/about/browser-config.html:97
msgid ""
-"Tor is good application to use as an\n"
+"Tor is good application to use"
+" as an\n"
"outproxy to the Internet."
-msgstr "O Tor é uma boa aplicação para ser usada como\num proxy de saída para a Internet."
+msgstr ""
+"O Tor é uma boa aplicação para"
+" ser usada como\n"
+"um proxy de saída para a Internet."
#: i2p2www/pages/site/about/glossary.html:2
msgid "Glossary"
@@ -159,8 +211,11 @@ msgstr "Glossário"
#: i2p2www/pages/site/about/glossary.html:4
msgid ""
-"This page lists often-used terminology when discussing I2P and cryptography."
-msgstr "Esta página lista os termos mais usados nas discussões sobre a I2P e criptografia."
+"This page lists often-used terminology when discussing I2P and "
+"cryptography."
+msgstr ""
+"Esta página lista os termos mais usados nas discussões sobre a I2P e "
+"criptografia."
#: i2p2www/pages/site/about/hall-of-fame.html:2
msgid "Hall Of Fame"
@@ -486,9 +541,14 @@ msgstr "Somos muito gratos as seguintes pessoas que doaram ao projeto I2P!"
#: i2p2www/pages/site/about/hall-of-fame.html:37
#, python-format
msgid ""
-"If you have made a donation, please send an email to echelon\n"
+"If you have made a donation, please send an email to echelon\n"
"with your name or nick (and optionally homepage) so we can list you here."
-msgstr "Se você deseja fazer uma doação, por favor, envie um email para echelon\ncom o seu nome ou pseudônimo (e, opcionalmente, sua página web) para que possamos listá-lo aqui."
+msgstr ""
+"Se você deseja fazer uma doação, por favor, envie um email para echelon\n"
+"com o seu nome ou pseudônimo (e, opcionalmente, sua página web) para que "
+"possamos listá-lo aqui."
#: i2p2www/pages/site/about/hall-of-fame.html:42
msgid "Current monthly subscriptions:"
@@ -525,15 +585,32 @@ msgstr "O Projeto Internet Invisível"
#: i2p2www/pages/site/about/intro.html:5
#, python-format
msgid ""
-"I2P is an anonymous network, exposing a simple layer that applications can \n"
-"use to anonymously and securely send messages to each other. The network itself is \n"
+"I2P is an anonymous network, exposing a simple layer that applications "
+"can \n"
+"use to anonymously and securely send messages to each other. The network "
+"itself is \n"
"strictly message based (a la IP), but there is a \n"
-"library available to allow reliable streaming communication on top of it (a la \n"
+"library available to allow reliable streaming communication on top of it "
+"(a la \n"
"TCP). \n"
-"All communication is end to end encrypted (in total there are four layers of \n"
-"encryption used when sending a message), and even the end points (\"destinations\") \n"
-"are cryptographic identifiers (essentially a pair of public keys)."
-msgstr "A I2P é uma rede anônima, erguida a partir de um simples substrato no qual aplicações podem se comunicar, por meio de troca de mensagens, de maneira anônima e segura. A rede é por si só estritamente baseada em mensagens (a la IP), mas há disponível uma biblioteca que permite uma confiável comunicação por streaming uma camada acima (a la TCP).\n\nToda a comunicação é criptografada de ponta-a-ponta (há, no total, quatro camadas de criptografia usadas ao se enviar uma mensagem), e mesmo os extremos (\"destinos\") são identificadores criptográficos (essencialmente um par de chaves públicas)."
+"All communication is end to end encrypted (in total there are four layers"
+" of \n"
+"encryption used when sending a message), and even the end points "
+"(\"destinations\") \n"
+"are cryptographic identifiers (essentially a pair of public keys)."
+msgstr ""
+"A I2P é uma rede anônima, erguida a partir de um simples substrato no "
+"qual aplicações podem se comunicar, por meio de troca de mensagens, de "
+"maneira anônima e segura. A rede é por si só estritamente baseada em "
+"mensagens (a la IP), mas há disponível uma "
+"biblioteca que permite uma confiável comunicação por streaming uma camada"
+" acima (a la TCP).\n"
+"\n"
+"Toda a comunicação é criptografada de ponta-a-ponta (há, no total, quatro"
+" camadas de criptografia usadas ao se enviar uma mensagem), e mesmo os "
+"extremos (\"destinos\") são identificadores criptográficos "
+"(essencialmente um par de chaves públicas)."
#: i2p2www/pages/site/about/intro.html:18
msgid "How does it work?"
@@ -542,36 +619,51 @@ msgstr "Como funciona?"
#: i2p2www/pages/site/about/intro.html:20
#, python-format
msgid ""
-"To anonymize the messages sent, each client application has their I2P \"router\"\n"
-"build a few inbound and outbound \"tunnels\" - a \n"
-"sequence of peers that pass messages in one direction (to and from the client, \n"
-"respectively). In turn, when a client wants to send a message to another client, \n"
-"the client passes that message out one of their outbound tunnels targeting one of the \n"
-"other client's inbound tunnels, eventually reaching the destination. Every \n"
-"participant in the network chooses the length of these tunnels, and in doing so, \n"
-"makes a tradeoff between anonymity, latency, and throughput according to their \n"
-"own needs. The result is that the number of peers relaying each end to end \n"
-"message is the absolute minimum necessary to meet both the sender's and the \n"
+"To anonymize the messages sent, each client application has their I2P "
+"\"router\"\n"
+"build a few inbound and outbound \"tunnels\" - a \n"
+"sequence of peers that pass messages in one direction (to and from the "
+"client, \n"
+"respectively). In turn, when a client wants to send a message to another"
+" client, \n"
+"the client passes that message out one of their outbound tunnels "
+"targeting one of the \n"
+"other client's inbound tunnels, eventually reaching the destination. "
+"Every \n"
+"participant in the network chooses the length of these tunnels, and in "
+"doing so, \n"
+"makes a tradeoff between anonymity, latency, and throughput according to "
+"their \n"
+"own needs. The result is that the number of peers relaying each end to "
+"end \n"
+"message is the absolute minimum necessary to meet both the sender's and "
+"the \n"
"receiver's threat model."
msgstr ""
#: i2p2www/pages/site/about/intro.html:34
#, python-format
msgid ""
-"The first time a client wants to contact another client, they make a query \n"
+"The first time a client wants to contact another client, they make a "
+"query \n"
"against the fully distributed \"network \n"
"database\" - a custom structured \n"
"distributed hash table (DHT) based off the \n"
"Kademlia algorithm. This is done \n"
-"to find the other client's inbound tunnels efficiently, but subsequent messages \n"
-"between them usually includes that data so no further network database lookups \n"
+"to find the other client's inbound tunnels efficiently, but subsequent "
+"messages \n"
+"between them usually includes that data so no further network database "
+"lookups \n"
"are required."
msgstr ""
#: i2p2www/pages/site/about/intro.html:47
#, python-format
msgid "More details about how I2P works are available."
-msgstr "Mais detalhes sobre o funcionamento da I2P estão disponíveis aqui."
+msgstr ""
+"Mais detalhes sobre o funcionamento da I2P estão disponíveis aqui."
#: i2p2www/pages/site/about/intro.html:51
msgid "What can you do with it?"
@@ -582,59 +674,101 @@ msgstr "Para que serve?"
msgid ""
"Within the I2P network, applications are not restricted in how they can \n"
"communicate - those that typically use UDP can make use of the base I2P \n"
-"functionality, and those that typically use TCP can use the TCP-like streaming\n"
+"functionality, and those that typically use TCP can use the TCP-like "
+"streaming\n"
"library. We have a generic TCP/I2P bridge application \n"
-"(\"I2PTunnel\") that enables people to forward TCP streams\n"
-"into the I2P network as well as to receive streams out of the network and \n"
+"(\"I2PTunnel\") that enables people to "
+"forward TCP streams\n"
+"into the I2P network as well as to receive streams out of the network and"
+" \n"
"forward them towards a specific TCP/IP address."
msgstr ""
#: i2p2www/pages/site/about/intro.html:63
#, python-format
msgid ""
-"I2PTunnel is currently used to let people run their own anonymous website \n"
-"(\"eepsite\") by running a normal webserver and pointing an I2PTunnel 'server' \n"
-"at it, which people can access anonymously over I2P with a normal web browser \n"
-"by running an I2PTunnel HTTP proxy (\"eepproxy\"). In addition, we use the same \n"
-"technique to run an anonymous IRC network (where the IRC server is hosted \n"
-"anonymously, and standard IRC clients use an I2PTunnel to contact it). There \n"
-"are other application development efforts going on as well, such as one to \n"
+"I2PTunnel is currently used to let people run their own anonymous website"
+" \n"
+"(\"eepsite\") by running a normal webserver and pointing an I2PTunnel "
+"'server' \n"
+"at it, which people can access anonymously over I2P with a normal web "
+"browser \n"
+"by running an I2PTunnel HTTP proxy (\"eepproxy\"). In addition, we use "
+"the same \n"
+"technique to run an anonymous IRC network (where the IRC server is hosted"
+" \n"
+"anonymously, and standard IRC clients use an I2PTunnel to contact it). "
+"There \n"
+"are other application development efforts going on as well, such as one "
+"to \n"
"build an optimized swarming file transfer application (a la \n"
"BitTorrent), a \n"
"distributed data store (a la Freenet / \n"
"MNet), and a blogging system (a fully \n"
"distributed LiveJournal), but those are \n"
"not ready for use yet."
-msgstr "I2PTunnel é atualmente utilizado para deixar as pessoas executarem seu próprio site anônimo (\"eepsite\") rodando um servidor web normal e apontando o 'servidor' I2PTunnel para ele, na qual as pessoas podem acessar anonimamente sobre o I2P com um navegador normal rodando o I2PTunnel HTTP proxy (\"eepproxy\"). Além disso, nós usamos a mesma técnica para rodar servidores IRC (onde o servidor IRC é hospedado anonimamente, e os clientes padrões IRC usam o I2PTunnel para contatá-lo). Temos outros esforços de desenvolvimento de aplicações em andamento, como a construção de uma aplicação de transferência de arquivos swarming (a la BitTorrent), um armazenamento de dados distribuídos (a la Freenet / MNet), e um sistema de blogs (totalmente distribuídos LiveJournal), mas esses não estão prontos para uso ainda."
+msgstr ""
+"I2PTunnel é atualmente utilizado para deixar as pessoas executarem seu "
+"próprio site anônimo (\"eepsite\") rodando um servidor web normal e "
+"apontando o 'servidor' I2PTunnel para ele, na qual as pessoas podem "
+"acessar anonimamente sobre o I2P com um navegador normal rodando o "
+"I2PTunnel HTTP proxy (\"eepproxy\"). Além disso, nós usamos a mesma "
+"técnica para rodar servidores IRC (onde o servidor IRC é hospedado "
+"anonimamente, e os clientes padrões IRC usam o I2PTunnel para "
+"contatá-lo). Temos outros esforços de desenvolvimento de aplicações em "
+"andamento, como a construção de uma aplicação de transferência de "
+"arquivos swarming (a la BitTorrent), um "
+"armazenamento de dados distribuídos (a la Freenet / MNet), e um "
+"sistema de blogs (totalmente distribuídos LiveJournal), mas esses não estão prontos "
+"para uso ainda."
#: i2p2www/pages/site/about/intro.html:82
#, python-format
msgid ""
-"I2P is not inherently an \"outproxy\" network - the client you send a message \n"
-"to is the cryptographic identifier, not some IP address, so the message must \n"
-"be addressed to someone running I2P. However, it is possible for that client\n"
-"to be an outproxy, allowing you to anonymously make use of their Internet \n"
-"connection. To demonstrate this, the \"eepproxy\" will accept normal non-I2P \n"
-"URLs (e.g. \"http://www.i2p.net\") and forward them to a specific destination\n"
+"I2P is not inherently an \"outproxy\" network - the client you send a "
+"message \n"
+"to is the cryptographic identifier, not some IP address, so the message "
+"must \n"
+"be addressed to someone running I2P. However, it is possible for that "
+"client\n"
+"to be an outproxy, allowing you to anonymously make use of their Internet"
+" \n"
+"connection. To demonstrate this, the \"eepproxy\" will accept normal "
+"non-I2P \n"
+"URLs (e.g. \"http://www.i2p.net\") and forward them to a specific "
+"destination\n"
"that runs a squid HTTP proxy, allowing \n"
-"simple anonymous browsing of the normal web. Simple outproxies like that are \n"
-"not viable in the long run for several reasons (including the cost of running \n"
-"one as well as the anonymity and security issues they introduce), but in \n"
+"simple anonymous browsing of the normal web. Simple outproxies like that"
+" are \n"
+"not viable in the long run for several reasons (including the cost of "
+"running \n"
+"one as well as the anonymity and security issues they introduce), but in"
+" \n"
"certain circumstances the technique could be appropriate."
msgstr ""
#: i2p2www/pages/site/about/intro.html:96
#, python-format
msgid ""
-"The I2P development team is an open group, welcome to all \n"
-"who are interested in getting involved, and all of \n"
-"the code is open source. The core I2P SDK and the \n"
-"current router implementation is done in Java (currently working with both \n"
+"The I2P development team is an open group, "
+"welcome to all \n"
+"who are interested in getting involved, and"
+" all of \n"
+"the code is open source. The core I2P SDK "
+"and the \n"
+"current router implementation is done in Java (currently working with "
+"both \n"
"sun and kaffe, gcj support planned for later), and there is a \n"
-"simple socket based API for accessing the network from \n"
-"other languages (with a C library available, and both Python and Perl in \n"
-"development). The network is actively being developed and has not yet reached \n"
-"the 1.0 release, but the current roadmap describes \n"
+"simple socket based API for accessing the network"
+" from \n"
+"other languages (with a C library available, and both Python and Perl in"
+" \n"
+"development). The network is actively being developed and has not yet "
+"reached \n"
+"the 1.0 release, but the current roadmap "
+"describes \n"
"our schedule."
msgstr ""
@@ -645,20 +779,29 @@ msgstr "Exposições sobre a I2P"
#: i2p2www/pages/site/about/media.html:4
#, python-format
msgid ""
-"Following are links to presentations, videos, and tutorials about I2P. Links"
-" to research papers on I2P are available here."
-msgstr "Seguem linques para apresentações, videos e tutoriais sobre a I2P. Linques para artigos acadêmicos sobre a I2P estão disponíveis aqui."
+"Following are links to presentations, videos, and tutorials about I2P. "
+"Links to research papers on I2P are available here."
+msgstr ""
+"Seguem linques para apresentações, videos e tutoriais sobre a I2P. "
+"Linques para artigos acadêmicos sobre a I2P estão disponíveis aqui."
#: i2p2www/pages/site/about/media.html:7
#, python-format
msgid "To request an addition to this page, please send to %(email)s."
-msgstr "Para requisitar uma adição a esta página, por favor, faça contato via %(email)s."
+msgstr ""
+"Para requisitar uma adição a esta página, por favor, faça contato via "
+"%(email)s."
#: i2p2www/pages/site/about/media.html:10
msgid ""
"\n"
"Newest links are at the bottom of each section."
-msgstr "\nOs linques mais recentes encontram-se relacionados na parte inferior de cada seção."
+msgstr ""
+"\n"
+"Os linques mais recentes encontram-se relacionados na parte inferior de "
+"cada seção."
#: i2p2www/pages/site/about/media.html:15
msgid "Presentations"
@@ -671,7 +814,11 @@ msgid ""
"MP3 audio\n"
"transcript\n"
"Lance James (0x90), February 2002."
-msgstr "Apresentação sobre a IIP no CodeCon.\nAúdio MP3. Transcrição.\nLance James (0x90), fevereiro de 2002."
+msgstr ""
+"Apresentação sobre a IIP no CodeCon.\n"
+"Aúdio MP3. Transcrição.\n"
+"Lance James (0x90), fevereiro de 2002."
#: i2p2www/pages/site/about/media.html:26
#, python-format
@@ -680,7 +827,10 @@ msgid ""
"MP3 audio\n"
"slides\n"
"Lance James (0x90), September 2002."
-msgstr "Apresentação sobre a IIP no ToorCon.\nAúdio MP3. Slides.\nLance James (0x90), setembro de 2002."
+msgstr ""
+"Apresentação sobre a IIP no ToorCon.\n"
+"Aúdio MP3. Slides.\n"
+"Lance James (0x90), setembro de 2002."
#: i2p2www/pages/site/about/media.html:34
#, python-format
@@ -690,7 +840,12 @@ msgid ""
"An introduction into anonymous communication with I2P.\n"
"To Be or I2P (PDF presentation),\n"
"Jens Kubieziel, 24C3 Berlin, December 28, 2007."
-msgstr "Ser ou I2P\n(Vídeo no Youtube)\nUma introdução em comunicação anônima com a I2P.\nSer ou I2P (PDF da apresentação),\nJens Kubieziel, 24C3 Berlin, 28 de dezembro de 2007."
+msgstr ""
+"Ser ou I2P\n"
+"(Vídeo no Youtube)\n"
+"Uma introdução em comunicação anônima com a I2P.\n"
+"Ser ou I2P (PDF da apresentação),\n"
+"Jens Kubieziel, 24C3 Berlin, 28 de dezembro de 2007."
#: i2p2www/pages/site/about/media.html:43
#, python-format
@@ -698,22 +853,30 @@ msgid ""
"Video of I2P talk at Chemnitz Linux Tag,\n"
"Lars Schimmer,\n"
"March 14-15, 2009"
-msgstr "Vídeo de um colóquio sobre a I2P no Chemnitz Linux Tag, Lars Schimmer, 14-15 de março de 2009."
+msgstr ""
+"Vídeo de um colóquio sobre a I2P no Chemnitz Linux "
+"Tag, Lars Schimmer, 14-15 de março de 2009."
#: i2p2www/pages/site/about/media.html:49
#, python-format
msgid ""
-"HOPE New York July 17, 2010 - Brief overview of I2P by zzz, at the end of Adrian Hong's talk\n"
+"HOPE New York July 17, 2010 - Brief overview of I2P by zzz, at the end of"
+" Adrian Hong's talk\n"
"\"Hackers for Human Rights\".\n"
"MP3 audio"
-msgstr "Hope, Nova Iorque, 17 de julho de 2010 - Uma breve visão-geral acerca da I2P por zzz, ao término do Adrian Hong's talk \"Hackers for Human Rights\". Áudio MP3."
+msgstr ""
+"Hope, Nova Iorque, 17 de julho de 2010 - Uma breve visão-geral acerca da "
+"I2P por zzz, ao término do Adrian Hong's talk \"Hackers for Human "
+"Rights\". Áudio MP3."
#: i2p2www/pages/site/about/media.html:55
#, python-format
msgid ""
"Into the I2P Darknet: Welcome to Cipherspace\n"
"Adrian Crenshaw. Schmoocon Firetalk, January 2011"
-msgstr "Na darknet I2P: Seja bem-vindo ao Criptoespaço.\nAdrian Crenshaw. Schmoocon Firetalk, janeiro de 2011."
+msgstr ""
+"Na darknet I2P: Seja bem-vindo ao Criptoespaço.\n"
+"Adrian Crenshaw. Schmoocon Firetalk, janeiro de 2011."
#: i2p2www/pages/site/about/media.html:60
#, python-format
@@ -721,55 +884,85 @@ msgid ""
"Using techhnology to advance liberty\n"
"(Youtube Video)\n"
"Eric Johnson.\n"
-"Agora I/O Unconference, March 27, 2011.\n"
+"Agora I/O Unconference, March 27,"
+" 2011.\n"
"I2P covered from 10:00 to 20:00 in the video."
-msgstr "Usando tecnologia para fazer avançar a liberdade\n(Vídeo no Youtube).\nEric Johnson.\nAgora I/O Unconference, 27 de março de 2011.\nA I2P é abordada de 10:00 até 20:00 no vídeo."
+msgstr ""
+"Usando tecnologia para fazer avançar a liberdade"
+"\n"
+"(Vídeo no Youtube).\n"
+"Eric Johnson.\n"
+"Agora I/O Unconference, 27 de "
+"março de 2011.\n"
+"A I2P é abordada de 10:00 até 20:00 no vídeo."
#: i2p2www/pages/site/about/media.html:68
#, python-format
msgid ""
"The Bright side of darknets, FOSSCOMM Patras May "
"2011"
-msgstr "O lado brilhante das darknets, FOSSCOMM, Patras. Maio de 2011."
+msgstr ""
+"O lado brilhante das darknets, FOSSCOMM, Patras. "
+"Maio de 2011."
#: i2p2www/pages/site/about/media.html:72
#, python-format
msgid ""
"Common Darknet Weaknesses\n"
"(Youtube Video)\n"
-"Adrian Crenshaw, AIDE, July 11-15, 2011."
-msgstr "Vulnerabilidades comuns em darknets\n(Vídeo no Youtube).\nAdrian Crenshaw, AIDE, 11-15 de julho, 2011."
+"Adrian Crenshaw, AIDE, July "
+"11-15, 2011."
+msgstr ""
+"Vulnerabilidades comuns em darknets\n"
+"(Vídeo no Youtube).\n"
+"Adrian Crenshaw, AIDE, 11-15 de"
+" julho, 2011."
#: i2p2www/pages/site/about/media.html:78
#, python-format
msgid ""
"I2P / Tor Workshop Notes\n"
"Adrian Crenshaw. DEF CON 19, Las Vegas, August 6, 2011."
-msgstr "Notas de um seminário sobre I2P / Tor.\nAdrian Crenshaw. DEF CON 19, Las Vegas, 6 de agosto de 2011."
+msgstr ""
+"Notas de um seminário sobre I2P / Tor.\n"
+"Adrian Crenshaw. DEF CON 19, Las Vegas, 6 de agosto de 2011."
#: i2p2www/pages/site/about/media.html:83
#, python-format
msgid ""
-"Cipherspaces/Darknets: An Overview Of Attack Strategies -\n"
+"Cipherspaces/Darknets: An Overview Of Attack "
+"Strategies -\n"
"DEF CON Live version (Youtube Video),\n"
"\"Studio\" version (Youtube Video),\n"
"Slides (ppt)\n"
"Adrian Crenshaw. DEF CON 19, Las Vegas, August 7, 2011."
-msgstr "Criptoespaços/Darknets: Uma visão geral das estratégias de ataque -\nDEF CON versão ao vivo (vídeo no Youtube).\nversão de \"Studio\" (vídeo no Youtube).\nSlides (ppt). Adrian Crenshaw. DEF CON 19, Las Vegas, 7 de agosto de 2011."
+msgstr ""
+"Criptoespaços/Darknets: Uma visão geral das "
+"estratégias de ataque -\n"
+"DEF CON versão ao vivo (vídeo no Youtube).\n"
+"versão de \"Studio\" (vídeo no Youtube).\n"
+"Slides (ppt). Adrian Crenshaw. DEF CON 19, Las"
+" Vegas, 7 de agosto de 2011."
#: i2p2www/pages/site/about/media.html:93
msgid ""
-"Modern cipherspace ecosystems, 0x375 0x06 "
-"(Thessaloniki Tech Talk Sessions), November 4, 2011."
-msgstr "Ecossistemas do criptoespaço moderno. 0x375 0x06 (Thessaloniki Tech Talk Sessions). 4 de novembro de 2011."
+"Modern cipherspace ecosystems, 0x375 "
+"0x06 (Thessaloniki Tech Talk Sessions), November 4, 2011."
+msgstr ""
+"Ecossistemas do criptoespaço moderno. "
+"0x375 0x06 (Thessaloniki Tech Talk Sessions). 4 de novembro de 2011."
#: i2p2www/pages/site/about/media.html:97
#, python-format
msgid ""
"I2P - The Anonymous Network\n"
"(Youtube Video)\n"
-"Blair Dick, University of Abertay, Dundee Ethical Hacking Society, January 25, 2012."
-msgstr "I2P - A rede anônima (Vídeo no Youtube). Por Blair Dick - University of Abertay, Dundee Ethical Hacking Society. 25 de janeiro de 2012."
+"Blair Dick, University of Abertay, Dundee Ethical Hacking Society, "
+"January 25, 2012."
+msgstr ""
+"I2P - A rede anônima (Vídeo no Youtube). Por "
+"Blair Dick - University of Abertay, Dundee Ethical Hacking Society. 25 de"
+" janeiro de 2012."
#: i2p2www/pages/site/about/media.html:105
msgid "Tutorials"
@@ -782,7 +975,11 @@ msgid ""
"(Youtube Video)\n"
"This guide will show you how to install I2P in Windows XP.\n"
"By Telecomix"
-msgstr "Tutorial sobre o acesso a I2P no Windows\n(Vídeo no Youtube)\nEste guia mostra como instalar a I2P no Windows XP.\nPor Telecomix"
+msgstr ""
+"Tutorial sobre o acesso a I2P no Windows\n"
+"(Vídeo no Youtube)\n"
+"Este guia mostra como instalar a I2P no Windows XP.\n"
+"Por Telecomix"
#: i2p2www/pages/site/about/media.html:115
#, python-format
@@ -791,7 +988,12 @@ msgid ""
"(Youtube Video)\n"
"This will guide you through how to install I2P on a Debian Linux System.\n"
"By Telecomix"
-msgstr "Tutorial sobre a instalação da I2P no Debian\n(Vídeo no Youtube)\nEste guia lhe ajudará a instalar a I2P numa distribuição Debian do Linux.\nPor Telecomix"
+msgstr ""
+"Tutorial sobre a instalação da I2P no Debian\n"
+"(Vídeo no Youtube)\n"
+"Este guia lhe ajudará a instalar a I2P numa distribuição Debian do Linux."
+"\n"
+"Por Telecomix"
#: i2p2www/pages/site/about/media.html:122
#, python-format
@@ -800,33 +1002,56 @@ msgid ""
"(Youtube Video)\n"
"How to set up an anonymous web site in I2P.\n"
"By Telecomix"
-msgstr "Como configurar um site anônimo na I2P\n(Vídeo no Youtube)\nComo configurar um website anônimo na I2P.\nPor Telecomix"
+msgstr ""
+"Como configurar um site anônimo na I2P\n"
+"(Vídeo no Youtube)\n"
+"Como configurar um website anônimo na I2P.\n"
+"Por Telecomix"
#: i2p2www/pages/site/about/media.html:129
#, python-format
msgid ""
"I2P Tutorial Mac OS X\n"
"(Youtube Video)\n"
-"A tutorial on how to run i2p on Mac OS X and how to connect to irc.telecomix.i2p.\n"
+"A tutorial on how to run i2p on Mac OS X and how to connect to "
+"irc.telecomix.i2p.\n"
"By Telecomix"
-msgstr "Tutorial sobre como usar a I2P no Mac OS X\n(Vídeo no Youtube)\nTutorial sobre como rodar a I2P no Mac OS X e como conectar-se a irc.telecomix.i2p.\nPor Telecomix"
+msgstr ""
+"Tutorial sobre como usar a I2P no Mac OS X\n"
+"(Vídeo no Youtube)\n"
+"Tutorial sobre como rodar a I2P no Mac OS X e como conectar-se a "
+"irc.telecomix.i2p.\n"
+"Por Telecomix"
#: i2p2www/pages/site/about/media.html:136
#, python-format
msgid ""
-"Felix Atari explains the basic principles of I2P\n"
+"Felix Atari explains the basic principles of I2P"
+"\n"
"(Youtube Video)\n"
"Agent Felix Atari of the Telecomix Crypto Munitions Bureau.\n"
"By Telecomix"
-msgstr "Felix Atari explica os princípios básicos da I2P\n(Vídeo no Youtube).\nAgente Felix Atari do Telecomix Crypto Munitions Bureau.\nPor Telecomix"
+msgstr ""
+"Felix Atari explica os princípios básicos da I2P"
+"\n"
+"(Vídeo no Youtube).\n"
+"Agente Felix Atari do Telecomix Crypto Munitions Bureau.\n"
+"Por Telecomix"
#: i2p2www/pages/site/about/media.html:143
#, python-format
msgid ""
-"How to get onto I2P, the anonymous P2P Darknet (Windows Install)\n"
+"How to get onto I2P, the anonymous P2P Darknet "
+"(Windows Install)\n"
"(Youtube Video)\n"
-"This tutorial shows how to install and configure software needed to access I2P."
-msgstr "Como iniciar-se na I2P, a darknet peer-to-peer anônima (instalação no Windows)\n(Vídeo no Youtube)\nEsse tutorial mostra como instalar e configurar o software necessário para acessar a I2P."
+"This tutorial shows how to install and configure software needed to "
+"access I2P."
+msgstr ""
+"Como iniciar-se na I2P, a darknet peer-to-peer "
+"anônima (instalação no Windows)\n"
+"(Vídeo no Youtube)\n"
+"Esse tutorial mostra como instalar e configurar o software necessário "
+"para acessar a I2P."
#: i2p2www/pages/site/about/media.html:149
#, python-format
@@ -834,7 +1059,10 @@ msgid ""
"How to connect to I2P\n"
"(Youtube Video)\n"
"How to install I2P on Ubuntu."
-msgstr "Como conectar-se a I2P\n(Vídeo no Youtube)\nComo instalar o roteador I2P no Ubuntu."
+msgstr ""
+"Como conectar-se a I2P\n"
+"(Vídeo no Youtube)\n"
+"Como instalar o roteador I2P no Ubuntu."
#: i2p2www/pages/site/about/media.html:155
#, python-format
@@ -843,7 +1071,9 @@ msgid ""
"(Video)\n"
"Adrian Crenshaw.\n"
"January 2011"
-msgstr "Instalando o software da darknet I2P no Linux (Vídeo). Por Adrian Crenshaw. Janeiro de 2011."
+msgstr ""
+"Instalando o software da darknet I2P no Linux "
+"(Vídeo). Por Adrian Crenshaw. Janeiro de 2011."
#: i2p2www/pages/site/about/media.html:162
#, python-format
@@ -851,7 +1081,9 @@ msgid ""
"Short garlic routing animation\n"
"(Youtube Video)\n"
"Adrian Crenshaw.\n"
-msgstr "Uma pequena animação sobre o roteamento alho (Vídeo no Youtube). Por Adrian Crenshaw.\n"
+msgstr ""
+"Uma pequena animação sobre o roteamento alho "
+"(Vídeo no Youtube). Por Adrian Crenshaw.\n"
#: i2p2www/pages/site/about/media.html:170
msgid "Articles and Interviews"
@@ -864,7 +1096,11 @@ msgid ""
"Part 1\n"
"Part 2\n"
"July 26, 2002."
-msgstr "Lance James (0x90) entrevistado por DistributedCity.\nParte 1.\nParte 2.\n26 de Julho de 2002."
+msgstr ""
+"Lance James (0x90) entrevistado por DistributedCity.\n"
+"Parte 1.\n"
+"Parte 2.\n"
+"26 de Julho de 2002."
#: i2p2www/pages/site/about/media.html:181
#, python-format
@@ -873,18 +1109,24 @@ msgid ""
"(original in Spanish)\n"
"English translation\n"
"October 31, 2002."
-msgstr "Lance James (0x90) entrevistado pelo El País\n(original em espanhol).\nTradução para o inglês.\n31 de Outubro de 2002."
+msgstr ""
+"Lance James (0x90) entrevistado pelo El País\n"
+"(original em espanhol).\n"
+"Tradução para o inglês.\n"
+"31 de Outubro de 2002."
#: i2p2www/pages/site/about/media.html:188
#, python-format
msgid ""
-"2003 Business Week article referencing invisiblenet"
+"2003 Business Week article referencing "
+"invisiblenet"
msgstr ""
#: i2p2www/pages/site/about/media.html:192
#, python-format
msgid ""
-"Netzwelt.de article about being anonymous in the Internet\n"
+"Netzwelt.de article about being anonymous in the "
+"Internet\n"
"(German)\n"
"November 2007."
msgstr ""
@@ -896,11 +1138,15 @@ msgid ""
"March 2009\n"
"German translation"
msgstr ""
+"zzz entrevistado por gulli.com,\n"
+"março de 2009.\n"
+"Tradução para o alemão."
#: i2p2www/pages/site/about/media.html:205
#, python-format
msgid ""
-"zzz interviewed on the InfoSec Daily Podcast Ep. 454 (mp3)\n"
+"zzz interviewed on the InfoSec Daily Podcast Ep. 454 "
+"(mp3)\n"
"August 18, 2011"
msgstr ""
@@ -910,12 +1156,16 @@ msgid ""
"I2P - Anonymity for the Masses,\n"
"Jonathan Cox,\n"
"November 11, 2011."
-msgstr "I2P - Anonimato para as massas,\nJonathan Cox,\n11 de novembro de 2011."
+msgstr ""
+"I2P - Anonimato para as massas,\n"
+"Jonathan Cox,\n"
+"11 de novembro de 2011."
#: i2p2www/pages/site/about/media.html:216
#, python-format
msgid ""
-"zzz and Lance James interviewed on the InfoSec Daily Podcast Ep. 596 (mp3)\n"
+"zzz and Lance James interviewed on the InfoSec Daily "
+"Podcast Ep. 596 (mp3)\n"
"February 16, 2012"
msgstr ""
@@ -927,7 +1177,9 @@ msgstr "Outros"
msgid ""
"I2P mentioned in Netflix's \"House of Cards\" Season 2 Episode 2,\n"
"February 14, 2014"
-msgstr "A I2P é mencionada em \"House of Cards\" da Netflix, 2o Episódio da 2a Temporada. 14 de fevereiro de 2014."
+msgstr ""
+"A I2P é mencionada em \"House of Cards\" da Netflix, 2o Episódio da 2a "
+"Temporada. 14 de fevereiro de 2014."
#: i2p2www/pages/site/about/team.html:2
msgid "I2P Project Members"
@@ -936,11 +1188,17 @@ msgstr "Membros do Projeto I2P"
#: i2p2www/pages/site/about/team.html:4
#, python-format
msgid ""
-"We are a small group of people spread around several continents, working to\n"
-"advance different aspects of the project and discussing the design of the\n"
+"We are a small group of people spread around several continents, working "
+"to\n"
+"advance different aspects of the project and discussing the design of the"
+"\n"
"network.\n"
"Get involved!"
-msgstr "Somos um pequeno grupo de pessoas espalhadas por vários continentes, trabalhando para conseguir avanços em diferentes aspectos do projeto e mantendo discussões sobre a arquitetura da rede. Envolva-se!"
+msgstr ""
+"Somos um pequeno grupo de pessoas espalhadas por vários continentes, "
+"trabalhando para conseguir avanços em diferentes aspectos do projeto e "
+"mantendo discussões sobre a arquitetura da rede. Envolva-se!"
#: i2p2www/pages/site/about/team.html:13
msgid "Admin"
@@ -1078,8 +1336,7 @@ msgstr "modelo de risco / perito em criptografia"
msgid "Manage the project bug tracker"
msgstr ""
-#: i2p2www/pages/site/about/team.html:91
-#: i2p2www/pages/site/about/team.html:111
+#: i2p2www/pages/site/about/team.html:91 i2p2www/pages/site/about/team.html:111
msgid "manage the public project webservers"
msgstr ""
@@ -1219,7 +1476,9 @@ msgstr "Mantém o cliente Bittorrent integrado"
#: i2p2www/pages/site/about/team.html:191
#, python-format
msgid "iMule lead"
-msgstr "desenvolvedor-chefe do iMule"
+msgstr ""
+"desenvolvedor-chefe do iMule"
#: i2p2www/pages/site/about/team.html:193
msgid "eMule client over I2P"
@@ -1335,7 +1594,9 @@ msgstr "desenvolvedor-chefe do Projeto, desenvolvedor-chefe do Syndie"
#: i2p2www/pages/site/about/team.html:279
msgid "Project lead, Syndie lead, I2Phex, support guru"
-msgstr "desenvolvedor-chefe do Projeto, desenvolvedor-chefe do Syndie, I2Phex, guru de suporte"
+msgstr ""
+"desenvolvedor-chefe do Projeto, desenvolvedor-chefe do Syndie, I2Phex, "
+"guru de suporte"
#: i2p2www/pages/site/about/team.html:283
msgid "iMule lead"
@@ -1396,8 +1657,7 @@ msgid "jbigi development, wiki migration, doc cleanup"
msgstr ""
#: i2p2www/pages/site/about/team.html:347
-msgid ""
-"java debugging and client development on I2PTunnel and the router console"
+msgid "java debugging and client development on I2PTunnel and the router console"
msgstr ""
#: i2p2www/pages/site/about/team.html:351
@@ -1455,11 +1715,15 @@ msgstr "Agosto de 2010"
#: i2p2www/pages/site/about/performance/future.html:7
msgid ""
-"There are a few major techniques that can be done to improve the perceived\n"
-"performance of I2P - some of the following are CPU related, others bandwidth\n"
+"There are a few major techniques that can be done to improve the "
+"perceived\n"
+"performance of I2P - some of the following are CPU related, others "
+"bandwidth\n"
"related, and others still are protocol related. However, all of those\n"
-"dimensions affect the latency, throughput, and perceived performance of the\n"
-"network, as they reduce contention for scarce resources. This list is of course\n"
+"dimensions affect the latency, throughput, and perceived performance of "
+"the\n"
+"network, as they reduce contention for scarce resources. This list is of"
+" course\n"
"not comprehensive, but it does cover the major ones that are seen."
msgstr ""
@@ -1469,7 +1733,9 @@ msgstr ""
msgid ""
"For past performance improvements see the \n"
"Performance History."
-msgstr "Para os ganhos de desempenho conquistados, ver o Histórico de Desempenho."
+msgstr ""
+"Para os ganhos de desempenho conquistados, ver o Histórico de Desempenho."
#: i2p2www/pages/site/about/performance/future.html:20
msgid "Better peer profiling and selection"
@@ -1478,10 +1744,14 @@ msgstr ""
#: i2p2www/pages/site/about/performance/future.html:21
#, python-format
msgid ""
-"Probably one of the most important parts of getting faster performance will\n"
-"be improving how routers choose the peers that they build their tunnels through\n"
-"- making sure they don't use peers with slow links or ones with fast links that\n"
-"are overloaded, etc. In addition, we've got to make sure we don't expose\n"
+"Probably one of the most important parts of getting faster performance "
+"will\n"
+"be improving how routers choose the peers that they build their tunnels "
+"through\n"
+"- making sure they don't use peers with slow links or ones with fast "
+"links that\n"
+"are overloaded, etc. In addition, we've got to make sure we don't expose"
+"\n"
"ourselves to a Sybil attack\n"
"from a powerful adversary with lots of fast machines."
msgstr ""
@@ -1492,13 +1762,20 @@ msgstr ""
#: i2p2www/pages/site/about/performance/future.html:31
msgid ""
-"We're going to want to be more efficient with the network database's healing\n"
-"and maintenance algorithms - rather than constantly explore the keyspace for new\n"
-"peers - causing a significant number of network messages and router load - we\n"
-"can slow down or even stop exploring until we detect that there's something new\n"
-"worth finding (e.g. decay the exploration rate based upon the last time someone\n"
-"gave us a reference to someone we had never heard of). We can also do some\n"
-"tuning on what we actually send - how many peers we bounce back (or even if we\n"
+"We're going to want to be more efficient with the network database's "
+"healing\n"
+"and maintenance algorithms - rather than constantly explore the keyspace "
+"for new\n"
+"peers - causing a significant number of network messages and router load "
+"- we\n"
+"can slow down or even stop exploring until we detect that there's "
+"something new\n"
+"worth finding (e.g. decay the exploration rate based upon the last time "
+"someone\n"
+"gave us a reference to someone we had never heard of). We can also do "
+"some\n"
+"tuning on what we actually send - how many peers we bounce back (or even "
+"if we\n"
"bounce back a reply), as well as how many concurrent searches we perform."
msgstr ""
@@ -1509,15 +1786,24 @@ msgstr ""
#: i2p2www/pages/site/about/performance/future.html:43
#, python-format
msgid ""
-"The way the ElGamal/AES+SessionTag algorithm\n"
-"works is by managing a set of random one-time-use 32 byte arrays, and expiring\n"
-"them if they aren't used quickly enough. If we expire them too soon, we're\n"
-"forced to fall back on a full (expensive) ElGamal encryption, but if we don't\n"
-"expire them quickly enough, we've got to reduce their quantity so that we don't\n"
-"run out of memory (and if the recipient somehow gets corrupted and loses some\n"
-"tags, even more encryption failures may occur prior to detection). With some\n"
-"more active detection and feedback driven algorithms, we can safely and more\n"
-"efficiently tune the lifetime of the tags, replacing the ElGamal encryption with\n"
+"The way the ElGamal/AES+SessionTag "
+"algorithm\n"
+"works is by managing a set of random one-time-use 32 byte arrays, and "
+"expiring\n"
+"them if they aren't used quickly enough. If we expire them too soon, "
+"we're\n"
+"forced to fall back on a full (expensive) ElGamal encryption, but if we "
+"don't\n"
+"expire them quickly enough, we've got to reduce their quantity so that we"
+" don't\n"
+"run out of memory (and if the recipient somehow gets corrupted and loses "
+"some\n"
+"tags, even more encryption failures may occur prior to detection). With "
+"some\n"
+"more active detection and feedback driven algorithms, we can safely and "
+"more\n"
+"efficiently tune the lifetime of the tags, replacing the ElGamal "
+"encryption with\n"
"a trivial AES operation."
msgstr ""
@@ -1537,24 +1823,33 @@ msgstr ""
msgid ""
"Right now, our ElGamal/AES+SessionTag \n"
"algorithm works by tagging each encrypted message with a unique random \n"
-"32 byte nonce (a \"session tag\"), identifying that message as being encrypted \n"
-"with the associated AES session's key. This prevents peers from distinguishing \n"
-"messages that are part of the same session, since each message has a completely \n"
+"32 byte nonce (a \"session tag\"), identifying that message as being "
+"encrypted \n"
+"with the associated AES session's key. This prevents peers from "
+"distinguishing \n"
+"messages that are part of the same session, since each message has a "
+"completely \n"
"new random tag. To accomplish this, every few messages bundle a whole \n"
-"new set of session tags within the encrypted message itself, transparently \n"
-"delivering a way to identify future messages. We then have to keep track \n"
+"new set of session tags within the encrypted message itself, "
+"transparently \n"
+"delivering a way to identify future messages. We then have to keep track"
+" \n"
"of what messages are successfully delivered so that we know what tags \n"
"we may use."
msgstr ""
#: i2p2www/pages/site/about/performance/future.html:74
msgid ""
-"This works fine and is fairly robust, however it is inefficient in terms \n"
+"This works fine and is fairly robust, however it is inefficient in terms"
+" \n"
"of bandwidth usage, as it requires the delivery of these tags ahead of \n"
"time (and not all tags may be necessary, or some may be wasted, due to \n"
-"their expiration). On average though, predelivering the session tag costs \n"
-"32 bytes per message (the size of a tag). As Taral suggested though, that \n"
-"size can be avoided by replacing the delivery of the tags with a synchronized \n"
+"their expiration). On average though, predelivering the session tag costs"
+" \n"
+"32 bytes per message (the size of a tag). As Taral suggested though, that"
+" \n"
+"size can be avoided by replacing the delivery of the tags with a "
+"synchronized \n"
"PRNG - when a new session is established (through an ElGamal encrypted \n"
"block), both sides seed a PRNG for use and generate the session tags on \n"
"demand (with the recipient precalculating the next few possible values \n"
@@ -1567,24 +1862,32 @@ msgstr ""
#: i2p2www/pages/site/about/performance/future.html:88
msgid ""
-"The current default tunnel duration of 10 minutes is fairly arbitrary, though\n"
-"it \"feels okay\". Once we've got tunnel healing code and more effective failure\n"
-"detection, we'll be able to more safely vary those durations, reducing the\n"
+"The current default tunnel duration of 10 minutes is fairly arbitrary, "
+"though\n"
+"it \"feels okay\". Once we've got tunnel healing code and more effective"
+" failure\n"
+"detection, we'll be able to more safely vary those durations, reducing "
+"the\n"
"network and CPU load (due to expensive tunnel creation messages)."
msgstr ""
#: i2p2www/pages/site/about/performance/future.html:95
msgid ""
-"This appears to be an easy fix for high load on the big-bandwidth routers, but\n"
-"we should not resort to it until we've tuned the tunnel building algorithms further.\n"
-"However, the 10 minute tunnel lifetime is hardcoded in quite a few places,\n"
+"This appears to be an easy fix for high load on the big-bandwidth "
+"routers, but\n"
+"we should not resort to it until we've tuned the tunnel building "
+"algorithms further.\n"
+"However, the 10 minute tunnel lifetime is hardcoded in quite a few "
+"places,\n"
"so substantial effort would be required to change the duration.\n"
-"Also, it would be difficult to maintain backward compatibility with such a change."
+"Also, it would be difficult to maintain backward compatibility with such "
+"a change."
msgstr ""
#: i2p2www/pages/site/about/performance/future.html:102
msgid ""
-"Currently, since the network average tunnel build success rate is fairly high,\n"
+"Currently, since the network average tunnel build success rate is fairly "
+"high,\n"
"there are no current plans to extend tunnel lifetime."
msgstr ""
@@ -1594,19 +1897,27 @@ msgstr ""
#: i2p2www/pages/site/about/performance/future.html:109
msgid ""
-"Yet another of the fairly arbitrary but \"okay feeling\" things we've got are the\n"
-"current timeouts for various activities. Why do we have a 60 second \"peer\n"
-"unreachable\" timeout? Why do we try sending through a different tunnel that a\n"
-"LeaseSet advertises after 10 seconds? Why are the network database queries\n"
-"bounded by 60 or 20 second limits? Why are destinations configured to ask for a\n"
-"new set of tunnels every 10 minutes? Why do we allow 60 seconds for a peer to\n"
-"reply to our request that they join a tunnel? Why do we consider a tunnel that\n"
+"Yet another of the fairly arbitrary but \"okay feeling\" things we've got"
+" are the\n"
+"current timeouts for various activities. Why do we have a 60 second "
+"\"peer\n"
+"unreachable\" timeout? Why do we try sending through a different tunnel "
+"that a\n"
+"LeaseSet advertises after 10 seconds? Why are the network database "
+"queries\n"
+"bounded by 60 or 20 second limits? Why are destinations configured to "
+"ask for a\n"
+"new set of tunnels every 10 minutes? Why do we allow 60 seconds for a "
+"peer to\n"
+"reply to our request that they join a tunnel? Why do we consider a "
+"tunnel that\n"
"doesn't pass our test within 60 seconds \"dead\"?"
msgstr ""
#: i2p2www/pages/site/about/performance/future.html:119
msgid ""
-"Each of those imponderables can be addressed with more adaptive code, as well\n"
+"Each of those imponderables can be addressed with more adaptive code, as "
+"well\n"
"as tunable parameters to allow for more appropriate tradeoffs between\n"
"bandwidth, latency, and CPU usage."
msgstr ""
@@ -1623,14 +1934,17 @@ msgstr ""
#: i2p2www/pages/site/about/performance/future.html:134
msgid ""
-"Client level bandwidth limiting (in either or both directions on a stream, \n"
-"or possibly shared across multiple streams). This would be in addition to \n"
+"Client level bandwidth limiting (in either or both directions on a "
+"stream, \n"
+"or possibly shared across multiple streams). This would be in addition to"
+" \n"
"the router's overall bandwidth limiting, of course."
msgstr ""
#: i2p2www/pages/site/about/performance/future.html:141
msgid ""
-"Access control lists (only allowing streams to or from certain other known \n"
+"Access control lists (only allowing streams to or from certain other "
+"known \n"
"destinations)."
msgstr ""
@@ -1643,9 +1957,13 @@ msgstr ""
#: i2p2www/pages/site/about/performance/future.html:153
#, python-format
msgid ""
-"Additional ideas for improving the streaming library are described on the\n"
+"Additional ideas for improving the streaming library are described on the"
+"\n"
"streaming library page."
-msgstr "Ideias adicionais para melhorias na biblioteca de streamings estão descritas na página da biblioteca de streamings."
+msgstr ""
+"Ideias adicionais para melhorias na biblioteca de streamings estão "
+"descritas na página da biblioteca de "
+"streamings."
#: i2p2www/pages/site/about/performance/history.html:2
msgid "Performance History"
@@ -1654,8 +1972,10 @@ msgstr "Histórico de desempenho"
#: i2p2www/pages/site/about/performance/history.html:4
#, python-format
msgid ""
-"Notable performance improvements have been made using the techniques below.\n"
-"There is more to do, see the Performance page\n"
+"Notable performance improvements have been made using the techniques "
+"below.\n"
+"There is more to do, see the Performance "
+"page\n"
"for current issues and thoughts."
msgstr ""
@@ -1674,23 +1994,30 @@ msgstr "Implementado"
#: i2p2www/pages/site/about/performance/history.html:12
#, python-format
msgid ""
-"When I last profiled the I2P code, the vast majority of time was spent within\n"
+"When I last profiled the I2P code, the vast majority of time was spent "
+"within\n"
"one function: java.math.BigInteger's\n"
"modPow.\n"
"Rather than try to tune this method, we'll call out to\n"
"GNU MP - an insanely fast math library\n"
"(with tuned assembler for many architectures). (Editor: see\n"
-"NativeBigInteger for faster public key cryptography)"
+"NativeBigInteger for faster public key "
+"cryptography)"
msgstr ""
#: i2p2www/pages/site/about/performance/history.html:23
msgid ""
"\n"
-"ugha and duck are working on the C/JNI glue code, and the existing java code\n"
-"is already deployed with hooks for that whenever its ready. Preliminary results\n"
-"look fantastic - running the router with the native GMP modPow is providing over\n"
-"a 800% speedup in encryption performance, and the load was cut in half. This\n"
-"was just on one user's machine, and things are nowhere near ready for packaging\n"
+"ugha and duck are working on the C/JNI glue code, and the existing java "
+"code\n"
+"is already deployed with hooks for that whenever its ready. Preliminary "
+"results\n"
+"look fantastic - running the router with the native GMP modPow is "
+"providing over\n"
+"a 800% speedup in encryption performance, and the load was cut in "
+"half. This\n"
+"was just on one user's machine, and things are nowhere near ready for "
+"packaging\n"
"and deployment, yet."
msgstr ""
@@ -1704,40 +2031,55 @@ msgstr ""
#: i2p2www/pages/site/about/performance/history.html:34
msgid ""
-"This algorithm tweak will only be relevant for applications that want their\n"
-"peers to reply to them (though that includes everything that uses I2PTunnel or\n"
+"This algorithm tweak will only be relevant for applications that want "
+"their\n"
+"peers to reply to them (though that includes everything that uses "
+"I2PTunnel or\n"
"mihi's ministreaming lib):"
msgstr ""
#: i2p2www/pages/site/about/performance/history.html:39
msgid ""
-"Previously, when Alice sent Bob a message, when Bob replied he had to do a\n"
-"lookup in the network database - sending out a few requests to get Alice's\n"
-"current LeaseSet. If he already has Alice's current LeaseSet, he can instead\n"
-"just send his reply immediately - this is (part of) why it typically takes a\n"
-"little longer talking to someone the first time you connect, but subsequent\n"
+"Previously, when Alice sent Bob a message, when Bob replied he had to do "
+"a\n"
+"lookup in the network database - sending out a few requests to get "
+"Alice's\n"
+"current LeaseSet. If he already has Alice's current LeaseSet, he can "
+"instead\n"
+"just send his reply immediately - this is (part of) why it typically "
+"takes a\n"
+"little longer talking to someone the first time you connect, but "
+"subsequent\n"
"communication is faster. Currently - for all clients - we wrap\n"
-"the sender's current LeaseSet in the garlic that is delivered to the recipient,\n"
-"so that when they go to reply, they'll always have the LeaseSet locally\n"
-"stored - completely removing any need for a network database lookup on replies.\n"
-"This trades off a large portion of the sender's bandwidth for that faster reply.\n"
+"the sender's current LeaseSet in the garlic that is delivered to the "
+"recipient,\n"
+"so that when they go to reply, they'll always have the LeaseSet "
+"locally\n"
+"stored - completely removing any need for a network database lookup on "
+"replies.\n"
+"This trades off a large portion of the sender's bandwidth for that faster"
+" reply.\n"
"If we didn't do this very often,\n"
-"overall network bandwidth usage would decrease, since the recipient doesn't\n"
+"overall network bandwidth usage would decrease, since the recipient "
+"doesn't\n"
"have to do the network database lookup."
msgstr ""
#: i2p2www/pages/site/about/performance/history.html:54
msgid ""
-"For unpublished LeaseSets such as \"shared clients\", this is the only way to\n"
+"For unpublished LeaseSets such as \"shared clients\", this is the only "
+"way to\n"
"get the LeaseSet to Bob. Unfortunately this bundling every time adds\n"
-"almost 100% overhead to a high-bandwidth connection, and much more to\n"
+"almost 100% overhead to a high-bandwidth connection, and much more to"
+"\n"
"a connection with smaller messages."
msgstr ""
#: i2p2www/pages/site/about/performance/history.html:60
msgid ""
"Changes scheduled for release 0.6.2 will bundle the LeaseSet only when\n"
-"necessary, at the beginning of a connection or when the LeaseSet changes.\n"
+"necessary, at the beginning of a connection or when the LeaseSet changes."
+"\n"
"This will substantially reduce the total overhead of I2P messaging."
msgstr ""
@@ -1748,13 +2090,20 @@ msgstr ""
#: i2p2www/pages/site/about/performance/history.html:68
msgid ""
"At the moment, all TCP connections do all of their peer validation after\n"
-"going through the full (expensive) Diffie-Hellman handshaking to negotiate a\n"
-"private session key. This means that if someone's clock is really wrong, or\n"
-"their NAT/firewall/etc is improperly configured (or they're just running an\n"
-"incompatible version of the router), they're going to consistently (though not\n"
-"constantly, thanks to the banlist) cause a futile expensive cryptographic\n"
-"operation on all the peers they know about. While we will want to keep some\n"
-"verification/validation within the encryption boundary, we'll want to update the\n"
+"going through the full (expensive) Diffie-Hellman handshaking to "
+"negotiate a\n"
+"private session key. This means that if someone's clock is really wrong,"
+" or\n"
+"their NAT/firewall/etc is improperly configured (or they're just running "
+"an\n"
+"incompatible version of the router), they're going to consistently "
+"(though not\n"
+"constantly, thanks to the banlist) cause a futile expensive cryptographic"
+"\n"
+"operation on all the peers they know about. While we will want to keep "
+"some\n"
+"verification/validation within the encryption boundary, we'll want to "
+"update the\n"
"protocol to do some of it first, so that we can reject them cleanly\n"
"without wasting much CPU or other resources."
msgstr ""
@@ -1765,11 +2114,16 @@ msgstr ""
#: i2p2www/pages/site/about/performance/history.html:83
msgid ""
-"Rather than going with the fairly random scheme we have now, we should use a\n"
-"more context aware algorithm for testing tunnels. e.g. if we already know its\n"
-"passing valid data correctly, there's no need to test it, while if we haven't\n"
-"seen any data through it recently, perhaps its worthwhile to throw some data its\n"
-"way. This will reduce the tunnel contention due to excess messages, as well as\n"
+"Rather than going with the fairly random scheme we have now, we should "
+"use a\n"
+"more context aware algorithm for testing tunnels. e.g. if we already "
+"know its\n"
+"passing valid data correctly, there's no need to test it, while if we "
+"haven't\n"
+"seen any data through it recently, perhaps its worthwhile to throw some "
+"data its\n"
+"way. This will reduce the tunnel contention due to excess messages, as "
+"well as\n"
"improve the speed at which we detect - and address - failing tunnels."
msgstr ""
@@ -1779,14 +2133,17 @@ msgstr ""
#: i2p2www/pages/site/about/performance/history.html:93
msgid ""
-"Outbound tunnel selection implemented in 0.6.1.30, inbound lease selection \n"
+"Outbound tunnel selection implemented in 0.6.1.30, inbound lease "
+"selection \n"
"implemented in release 0.6.2."
msgstr ""
#: i2p2www/pages/site/about/performance/history.html:97
msgid ""
-"Selecting tunnels and leases at random for every message creates a large \n"
-"incidence of out-of-order delivery, which prevents the streaming lib from \n"
+"Selecting tunnels and leases at random for every message creates a large"
+" \n"
+"incidence of out-of-order delivery, which prevents the streaming lib from"
+" \n"
"increasing its window size as much as it could. By persisting with the \n"
"same selections for a given connection, the transfer rate is much faster."
msgstr ""
@@ -1797,13 +2154,20 @@ msgstr "Compactar algumas estruturas de dados"
#: i2p2www/pages/site/about/performance/history.html:106
msgid ""
-"The I2NP messages and the data they contain is already defined in a fairly\n"
-"compact structure, though one attribute of the RouterInfo structure is not -\n"
-"\"options\" is a plain ASCII name = value mapping. Right now, we're filling it\n"
-"with those published statistics - around 3300 bytes per peer. Trivial to\n"
-"implement GZip compression would nearly cut that to 1/3 its size, and when you\n"
-"consider how often RouterInfo structures are passed across the network, that's\n"
-"significant savings - every time a router asks another router for a networkDb\n"
+"The I2NP messages and the data they contain is already defined in a "
+"fairly\n"
+"compact structure, though one attribute of the RouterInfo structure is "
+"not -\n"
+"\"options\" is a plain ASCII name = value mapping. Right now, we're "
+"filling it\n"
+"with those published statistics - around 3300 bytes per peer. Trivial to"
+"\n"
+"implement GZip compression would nearly cut that to 1/3 its size, and "
+"when you\n"
+"consider how often RouterInfo structures are passed across the network, "
+"that's\n"
+"significant savings - every time a router asks another router for a "
+"networkDb\n"
"entry that the peer doesn't have, it sends back 3-10 RouterInfo of them."
msgstr ""
@@ -1817,16 +2181,26 @@ msgstr ""
#: i2p2www/pages/site/about/performance/history.html:119
msgid ""
-"Currently mihi's ministreaming library has a fairly simple stream negotiation\n"
-"protocol - Alice sends Bob a SYN message, Bob replies with an ACK message, then\n"
-"Alice and Bob send each other some data, until one of them sends the other a\n"
-"CLOSE message. For long lasting connections (to an IRC server, for instance),\n"
-"that overhead is negligible, but for simple one-off request/response situations\n"
-"(an HTTP request/reply, for instance), that's more than twice as many messages as\n"
-"necessary. If, however, Alice piggybacked her first payload in with the SYN\n"
-"message, and Bob piggybacked his first reply with the ACK - and perhaps also\n"
-"included the CLOSE flag - transient streams such as HTTP requests could be\n"
-"reduced to a pair of messages, instead of the SYN+ACK+request+response+CLOSE."
+"Currently mihi's ministreaming library has a fairly simple stream "
+"negotiation\n"
+"protocol - Alice sends Bob a SYN message, Bob replies with an ACK "
+"message, then\n"
+"Alice and Bob send each other some data, until one of them sends the "
+"other a\n"
+"CLOSE message. For long lasting connections (to an IRC server, for "
+"instance),\n"
+"that overhead is negligible, but for simple one-off request/response "
+"situations\n"
+"(an HTTP request/reply, for instance), that's more than twice as many "
+"messages as\n"
+"necessary. If, however, Alice piggybacked her first payload in with the "
+"SYN\n"
+"message, and Bob piggybacked his first reply with the ACK - and perhaps "
+"also\n"
+"included the CLOSE flag - transient streams such as HTTP requests could "
+"be\n"
+"reduced to a pair of messages, instead of the "
+"SYN+ACK+request+response+CLOSE."
msgstr ""
#: i2p2www/pages/site/about/performance/history.html:132
@@ -1835,12 +2209,18 @@ msgstr ""
#: i2p2www/pages/site/about/performance/history.html:134
msgid ""
-"The ministreaming protocol takes advantage of a poor design decision in the\n"
-"I2P client protocol (I2CP) - the exposure of \"mode=GUARANTEED\", allowing what\n"
-"would otherwise be an unreliable, best-effort, message based protocol to be used\n"
-"for reliable, blocking operation (under the covers, its still all unreliable and\n"
-"message based, with the router providing delivery guarantees by garlic wrapping\n"
-"an \"ACK\" message in with the payload, so once the data gets to the target, the\n"
+"The ministreaming protocol takes advantage of a poor design decision in "
+"the\n"
+"I2P client protocol (I2CP) - the exposure of \"mode=GUARANTEED\", "
+"allowing what\n"
+"would otherwise be an unreliable, best-effort, message based protocol to "
+"be used\n"
+"for reliable, blocking operation (under the covers, its still all "
+"unreliable and\n"
+"message based, with the router providing delivery guarantees by garlic "
+"wrapping\n"
+"an \"ACK\" message in with the payload, so once the data gets to the "
+"target, the\n"
"ACK message is forwarded back to us [through tunnels, of course])."
msgstr ""
@@ -1848,11 +2228,16 @@ msgstr ""
#, python-format
msgid ""
"As I've said, having\n"
-"I2PTunnel (and the ministreaming lib) go this route was the best thing that\n"
-"could be done, but more efficient mechanisms are available. When we rip out the\n"
-"\"mode=GUARANTEED\" functionality, we're essentially leaving ourselves with an\n"
-"I2CP that looks like an anonymous IP layer, and as such, we'll be able to\n"
-"implement the streaming library to take advantage of the design experiences of\n"
+"I2PTunnel (and the ministreaming lib) go this route was the best thing "
+"that\n"
+"could be done, but more efficient mechanisms are available. When we rip "
+"out the\n"
+"\"mode=GUARANTEED\" functionality, we're essentially leaving ourselves "
+"with an\n"
+"I2CP that looks like an anonymous IP layer, and as such, we'll be able to"
+"\n"
+"implement the streaming library to take advantage of the design "
+"experiences of\n"
"the TCP layer - selective ACKs, congestion detection, nagle, etc."
msgstr ""
@@ -1864,37 +2249,58 @@ msgstr "Desempenho"
msgid ""
"How does I2P work, why is it slow, and why does it not use my full "
"bandwidth?"
-msgstr "Como a I2P funciona, por que é lenta, e por que não usa toda a minha banda?"
+msgstr ""
+"Como a I2P funciona, por que é lenta, e por que não usa toda a minha "
+"banda?"
#: i2p2www/pages/site/about/performance/index.html:7
msgid ""
-"Probably one of the most frequent things people ask is \"how fast is I2P?\",\n"
-"and no one seems to like the answer - \"it depends\". After trying out I2P, the\n"
-"next thing they ask is \"will it get faster?\", and the answer to that is a most\n"
+"Probably one of the most frequent things people ask is \"how fast is "
+"I2P?\",\n"
+"and no one seems to like the answer - \"it depends\". After trying out "
+"I2P, the\n"
+"next thing they ask is \"will it get faster?\", and the answer to that is"
+" a most\n"
"emphatic yes."
msgstr ""
#: i2p2www/pages/site/about/performance/index.html:14
msgid ""
-"I2P is a full dynamic network. Each client is known to other nodes and tests local known nodes for reachability and capacity.\n"
-"Only reachable and capable nodes are saved to a local NetDB (This is generally only a portion of the network, around 500-1000).\n"
-"When I2P builds tunnels, it selects the best resource from this pool. For example, a small subset of 20-50 nodes are only available to build tunnels with.\n"
-"Because testing happens every minute, the pool of used nodes changes every minute.\n"
-"Each I2P node knows a different part of the net, meaning that each router has a different set of I2P nodes to be used for tunnels.\n"
-"Even if two routers have the same subset of known nodes, the tests for reachability and capacity will likely show different results, as the other routers could be under load just as one router tests, but be free if the second router tests."
+"I2P is a full dynamic network. Each client is known to other nodes and "
+"tests local known nodes for reachability and capacity.\n"
+"Only reachable and capable nodes are saved to a local NetDB (This is "
+"generally only a portion of the network, around 500-1000).\n"
+"When I2P builds tunnels, it selects the best resource from this pool. For"
+" example, a small subset of 20-50 nodes are only available to build "
+"tunnels with.\n"
+"Because testing happens every minute, the pool of used nodes changes "
+"every minute.\n"
+"Each I2P node knows a different part of the net, meaning that each router"
+" has a different set of I2P nodes to be used for tunnels.\n"
+"Even if two routers have the same subset of known nodes, the tests for "
+"reachability and capacity will likely show different results, as the "
+"other routers could be under load just as one router tests, but be free "
+"if the second router tests."
msgstr ""
#: i2p2www/pages/site/about/performance/index.html:23
msgid ""
-"The above describes why each I2P node has different nodes to build tunnels.\n"
-"Because every I2P node has a different latency and bandwith, tunnels (which are built via those nodes) have different latency and bandwidth values.\n"
-"And because every I2P node has different tunnels built, no two I2P nodes have the same tunnel sets."
+"The above describes why each I2P node has different nodes to build "
+"tunnels.\n"
+"Because every I2P node has a different latency and bandwith, tunnels "
+"(which are built via those nodes) have different latency and bandwidth "
+"values.\n"
+"And because every I2P node has different tunnels built, no two I2P nodes "
+"have the same tunnel sets."
msgstr ""
#: i2p2www/pages/site/about/performance/index.html:29
msgid ""
-"A server/client is known as a \"destination\" and each destination has at least one inbound and one outbound tunnel. The default is 3 hops per tunnel.\n"
-"This adds up to 12 hops (aka 12 different I2P nodes) for a full roundtrip client-server-client."
+"A server/client is known as a \"destination\" and each destination has at"
+" least one inbound and one outbound tunnel. The default is 3 hops per "
+"tunnel.\n"
+"This adds up to 12 hops (aka 12 different I2P nodes) for a full roundtrip"
+" client-server-client."
msgstr ""
#: i2p2www/pages/site/about/performance/index.html:34
@@ -1909,61 +2315,102 @@ msgstr ""
#: i2p2www/pages/site/about/performance/index.html:47
msgid ""
-"As most traffic on I2P (www, torrent,...) needs ack packages until new data is sent, it needs to wait until a ack package returns from the server.\n"
+"As most traffic on I2P (www, torrent,...) needs ack packages until new "
+"data is sent, it needs to wait until a ack package returns from the "
+"server.\n"
"In the end: send data, wait for ack, send more data, wait for ack,..\n"
-"As the RTT (RoundTripTime) adds up from the latency of each individual I2P node and each connection on this roundtrip, it takes usually 1-3 seconds until a ack package comes back to the client.\n"
-"With some internals of TCP and I2P transport, a data package has a limited size and cannot be as large as we want it to be.\n"
-"Together these conditions set a limit of max bandwidth per tunnel of 20-50 kbyte/sec.\n"
-"But if ONLY ONE hop in the tunnel has only 5 kb/sec bandwidth to spend, the whole tunnel is limited to 5 kb/sec, independent of the \n"
+"As the RTT (RoundTripTime) adds up from the latency of each individual "
+"I2P node and each connection on this roundtrip, it takes usually 1-3 "
+"seconds until a ack package comes back to the client.\n"
+"With some internals of TCP and I2P transport, a data package has a "
+"limited size and cannot be as large as we want it to be.\n"
+"Together these conditions set a limit of max bandwidth per tunnel of "
+"20-50 kbyte/sec.\n"
+"But if ONLY ONE hop in the tunnel has only 5 kb/sec bandwidth to spend, "
+"the whole tunnel is limited to 5 kb/sec, independent of the \n"
"latency and other limitations."
msgstr ""
#: i2p2www/pages/site/about/performance/index.html:57
msgid ""
-"Due to encryption used and other setups in I2P (howto built up tunnels, latency, ...) it is quite expensive in CPU time to build a tunnel. This is \n"
-"why a destination is only allowed to have a max of 6 IN and 6 OUT tunnels to transport data. With a max of 50 kb/sec per tunnel, a destination could \n"
-"use roughly 300 kb/sec traffic combined ( in reality it could be more if shorter tunnels are used with low or no anonymity available).\n"
+"Due to encryption used and other setups in I2P (howto built up tunnels, "
+"latency, ...) it is quite expensive in CPU time to build a tunnel. This "
+"is \n"
+"why a destination is only allowed to have a max of 6 IN and 6 OUT tunnels"
+" to transport data. With a max of 50 kb/sec per tunnel, a destination "
+"could \n"
+"use roughly 300 kb/sec traffic combined ( in reality it could be more if "
+"shorter tunnels are used with low or no anonymity available).\n"
"Used tunnels are discarded every 10 minutes and new ones are built up.\n"
-"This change of tunnels (and sometimes clients that shutdown hard due to usage of \"shut down at once\" or situations where there is power loss) does \n"
-"sometimes break tunnels and connections, as seen on the IRC2P Network in loss of connection (ping timeout) or on when using eepget."
+"This change of tunnels (and sometimes clients that shutdown hard due to "
+"usage of \"shut down at once\" or situations where there is power loss) "
+"does \n"
+"sometimes break tunnels and connections, as seen on the IRC2P Network in "
+"loss of connection (ping timeout) or on when using eepget."
msgstr ""
#: i2p2www/pages/site/about/performance/index.html:66
msgid ""
-"With a limited set of destinations and a limited set of tunnels per destination, one I2P node only uses a limited set of tunnels across other I2P nodes.\n"
-"For example, if an I2P node is \"hop1\" in the small example above, we only see 1 participating tunnel originating from the client.\n"
-"If we sum up the whole I2P network, only a rather limited number of participating tunnels could be built with a limited amount of bandwidth all together.\n"
-"If one distributes these limited numbers across the number of I2P nodes, there is only a fraction of available bandwidth/capacity available for use."
+"With a limited set of destinations and a limited set of tunnels per "
+"destination, one I2P node only uses a limited set of tunnels across other"
+" I2P nodes.\n"
+"For example, if an I2P node is \"hop1\" in the small example above, we "
+"only see 1 participating tunnel originating from the client.\n"
+"If we sum up the whole I2P network, only a rather limited number of "
+"participating tunnels could be built with a limited amount of bandwidth "
+"all together.\n"
+"If one distributes these limited numbers across the number of I2P nodes, "
+"there is only a fraction of available bandwidth/capacity available for "
+"use."
msgstr ""
#: i2p2www/pages/site/about/performance/index.html:73
msgid ""
-"To remain anonymous one router should not be used by the whole network for building tunnels.\n"
-"If one router does act as a tunnel router for ALL I2P nodes, it becomes a very real central point of failure as well as a central point to grab IPs and data from the clients. This is not good.\n"
-"I2P attempts to spread the load across a lot of I2P nodes because of this reason."
+"To remain anonymous one router should not be used by the whole network "
+"for building tunnels.\n"
+"If one router does act as a tunnel router for ALL I2P nodes, it becomes a"
+" very real central point of failure as well as a central point to grab "
+"IPs and data from the clients. This is not good.\n"
+"I2P attempts to spread the load across a lot of I2P nodes because of this"
+" reason."
msgstr ""
#: i2p2www/pages/site/about/performance/index.html:79
msgid ""
-"Another point is the full mesh network. Each connection hop-hop utilizes one TCP or UDP connection on the I2P nodes. With 1000 connections, one sees \n"
-"1000 TCP connections. That is quite a lot and some home and small office routers (DSL, cable,..) only allow a small number of connections (or just go mad if you use more than X connections).\n"
-"I2P tries to limit these connections to be under 1500 per UDP and per TCP type.\n"
+"Another point is the full mesh network. Each connection hop-hop utilizes "
+"one TCP or UDP connection on the I2P nodes. With 1000 connections, one "
+"sees \n"
+"1000 TCP connections. That is quite a lot and some home and small office "
+"routers (DSL, cable,..) only allow a small number of connections (or just"
+" go mad if you use more than X connections).\n"
+"I2P tries to limit these connections to be under 1500 per UDP and per TCP"
+" type.\n"
"This limits the amount of traffic routed across your I2P node as well."
msgstr ""
#: i2p2www/pages/site/about/performance/index.html:86
msgid ""
-"In summary, I2P is very complex and there is no easy way to pinpoint why your node is not used.\n"
-"If your node is reachable and has a bandwidth setting of >128 kbyte/sec shared and is reachable 24/7, it should be used after some time for participating traffic.\n"
-"If it is down in between, the testing of your I2P node done by other nodes will tell them: you are not reachable. This blocks your node for at least \n"
-"24h on other nodes. So, the other nodes which tested you as down will not use your node for 24h for building tunnels. This is why your traffic will \n"
+"In summary, I2P is very complex and there is no easy way to pinpoint why "
+"your node is not used.\n"
+"If your node is reachable and has a bandwidth setting of >128 kbyte/sec "
+"shared and is reachable 24/7, it should be used after some time for "
+"participating traffic.\n"
+"If it is down in between, the testing of your I2P node done by other "
+"nodes will tell them: you are not reachable. This blocks your node for at"
+" least \n"
+"24h on other nodes. So, the other nodes which tested you as down will not"
+" use your node for 24h for building tunnels. This is why your traffic "
+"will \n"
"be lower after a restart/shutdown for a minimum of 24h."
msgstr ""
#: i2p2www/pages/site/about/performance/index.html:94
msgid ""
-"Also: other I2P nodes needs to know your I2P router to test it for reachability and capacity. It takes time for other nodes to get known to your node. \n"
-"It will be faster if you use I2P and build more tunnels, e.g. use a torrent or www for some time."
+"Also: other I2P nodes needs to know your I2P router to test it for "
+"reachability and capacity. It takes time for other nodes to get known to "
+"your node. \n"
+"It will be faster if you use I2P and build more tunnels, e.g. use a "
+"torrent or www for some time."
msgstr ""
#: i2p2www/pages/site/about/performance/index.html:99
@@ -1975,4 +2422,7 @@ msgstr "Ganhos de desempenho"
msgid ""
"For possible future performance improvements see\n"
"Future Performance Improvements."
-msgstr "Para os possíveis futuros ganhos de desempenho, ver\nFuturos Aperfeiçoamentos de Desempenho."
+msgstr ""
+"Para os possíveis futuros ganhos de desempenho, ver\n"
+"Futuros Aperfeiçoamentos de Desempenho."
+
diff --git a/i2p2www/translations/pt_BR/LC_MESSAGES/blog.po b/i2p2www/translations/pt_BR/LC_MESSAGES/blog.po
index 977a0766..f78c4ccf 100644
--- a/i2p2www/translations/pt_BR/LC_MESSAGES/blog.po
+++ b/i2p2www/translations/pt_BR/LC_MESSAGES/blog.po
@@ -1,26 +1,25 @@
-# Translations template for I2P.
+# Portuguese (Brazil) translations for I2P.
# Copyright (C) 2014 ORGANIZATION
# This file is distributed under the same license as the I2P project.
-#
+#
# Translators:
# blueboy, 2013-2014
# blueboy, 2013
# blueboy, 2014
-# blueboy, 2013-2014
msgid ""
msgstr ""
-"Project-Id-Version: I2P\n"
+"Project-Id-Version: I2P\n"
"Report-Msgid-Bugs-To: http://trac.i2p2.de\n"
"POT-Creation-Date: 2014-11-16 00:55+0000\n"
"PO-Revision-Date: 2014-11-29 12:17+0000\n"
"Last-Translator: blueboy\n"
-"Language-Team: Portuguese (Brazil) (http://www.transifex.com/projects/p/I2P/language/pt_BR/)\n"
+"Language-Team: Portuguese (Brazil) "
+"(http://www.transifex.com/projects/p/I2P/language/pt_BR/)\n"
+"Plural-Forms: nplurals=2; plural=(n > 1)\n"
"MIME-Version: 1.0\n"
-"Content-Type: text/plain; charset=UTF-8\n"
+"Content-Type: text/plain; charset=utf-8\n"
"Content-Transfer-Encoding: 8bit\n"
"Generated-By: Babel 1.3\n"
-"Language: pt_BR\n"
-"Plural-Forms: nplurals=2; plural=(n > 1);\n"
#: i2p2www/blog/2011/10/11/0.8.9-Release.rst:24
#: i2p2www/blog/2011/10/20/0.8.10-Release.rst:11
@@ -193,24 +192,32 @@ msgstr "Lançamento da versão 0.9.2"
#: i2p2www/blog/2012/09/21/0.9.2-Release.rst:7
#: i2p2www/blog/2012/09/21/0.9.2-Release.rst:9
msgid ""
-"0.9.2 includes extensive low-level changes to improve the performance and "
-"efficiency of the router. We have updated our UPnP library, to hopefully "
-"make UPnP work for more people. I2PSnark now has DHT support, but it is not "
-"yet enabled by default, as we plan to do more testing during the upcoming "
-"0.9.3 development cycle."
-msgstr "O lançamento da versão 0.9.2 inclui extensas mudanças de baixo nível que melhoram o desempenho e a eficiência do roteador. Atualizamos nossa biblioteca UPnP para, esperançosamente, fazer o UPnP funcionar para um maior número de pessoas. O I2PSnark possui agora suporte a DHT, contudo não ainda configurado como padrão, uma vez que pretendemos realizar mais testes durante o ciclo de desenvolvimento da versão 0.9.3 por vir."
+"0.9.2 includes extensive low-level changes to improve the performance and"
+" efficiency of the router. We have updated our UPnP library, to hopefully"
+" make UPnP work for more people. I2PSnark now has DHT support, but it is "
+"not yet enabled by default, as we plan to do more testing during the "
+"upcoming 0.9.3 development cycle."
+msgstr ""
+"O lançamento da versão 0.9.2 inclui extensas mudanças de baixo nível que "
+"melhoram o desempenho e a eficiência do roteador. Atualizamos nossa "
+"biblioteca UPnP para, esperançosamente, fazer o UPnP funcionar para um "
+"maior número de pessoas. O I2PSnark possui agora suporte a DHT, contudo "
+"não ainda configurado como padrão, uma vez que pretendemos realizar mais "
+"testes durante o ciclo de desenvolvimento da versão 0.9.3 por vir."
#: i2p2www/blog/2012/09/21/0.9.2-Release.rst:12
#: i2p2www/blog/2012/10/27/0.9.3-Release.rst:12
msgid ""
"As usual, there's also lots of bug fixes in this release, so updating is "
"recommended."
-msgstr "Como de costume, há uma porção de correções de falhas neste lançamento. Assim, é recomendado atualizar a versão do seu software I2P."
+msgstr ""
+"Como de costume, há uma porção de correções de falhas neste lançamento. "
+"Assim, é recomendado atualizar a versão do seu software I2P."
#: i2p2www/blog/2012/09/21/0.9.2-Release.rst:26
msgid ""
-"SSU: Fix several problems in our UDP transport, to improve efficiency and "
-"reliability for connection setup. Also improve defenses against various "
+"SSU: Fix several problems in our UDP transport, to improve efficiency and"
+" reliability for connection setup. Also improve defenses against various "
"types of bad input."
msgstr ""
@@ -218,41 +225,48 @@ msgstr ""
msgid ""
"UPnP: Updated our library to fix several issues, should work for more "
"routers now"
-msgstr "UPnP: Nossa biblioteca foi atualizada para corrigir vários problemas. Por ora, deve funcionar para mais roteadores."
+msgstr ""
+"UPnP: Nossa biblioteca foi atualizada para corrigir vários problemas. Por"
+" ora, deve funcionar para mais roteadores."
#: i2p2www/blog/2012/09/21/0.9.2-Release.rst:28
msgid ""
"Transport: Improve performance in both our TCP and UDP transports, to "
"benefit high-bandwidth routers"
-msgstr "Transporte: ganho de desempenho tanto no nosso transporte TCP quanto UDP, de modo a beneficiar roteadores com banda-larga de alta velocidade"
+msgstr ""
+"Transporte: ganho de desempenho tanto no nosso transporte TCP quanto UDP,"
+" de modo a beneficiar roteadores com banda-larga de alta velocidade"
#: i2p2www/blog/2012/09/21/0.9.2-Release.rst:29
msgid ""
-"Crypto: The thresholds and number of ElGamal/AES Session Tags delivered are "
-"now much more flexible, which should lessen protocol overhead and reduce "
-"stalls caused by dropped tags."
+"Crypto: The thresholds and number of ElGamal/AES Session Tags delivered "
+"are now much more flexible, which should lessen protocol overhead and "
+"reduce stalls caused by dropped tags."
msgstr ""
#: i2p2www/blog/2012/09/21/0.9.2-Release.rst:30
msgid ""
"I2PSnark: Add DHT support, not yet enabled by default, will do further "
"testing and plan to enable by default in 0.9.3."
-msgstr "I2PSnark: Adicionado suporte a DHT, não ainda estabelecido como padrão, que passará por testes e será estabelecido como padrão, conforme se planeja, no lançamento da versão 0.9.3."
+msgstr ""
+"I2PSnark: Adicionado suporte a DHT, não ainda estabelecido como padrão, "
+"que passará por testes e será estabelecido como padrão, conforme se "
+"planeja, no lançamento da versão 0.9.3."
#: i2p2www/blog/2012/09/21/0.9.2-Release.rst:34
msgid ""
-"Fix various issues affecting memory usage and performance on high-bandwidth "
-"routers"
-msgstr "Corrige diversos problemas que afetavam o uso de memória e o desempenho em roteadores de banda-larga de alta capacidade"
+"Fix various issues affecting memory usage and performance on high-"
+"bandwidth routers"
+msgstr ""
+"Corrige diversos problemas que afetavam o uso de memória e o desempenho "
+"em roteadores de banda-larga de alta capacidade"
#: i2p2www/blog/2012/09/21/0.9.2-Release.rst:35
-msgid ""
-"Fix problems in UDP for routers using a reduced-MTU connection, e.g. a VPN"
+msgid "Fix problems in UDP for routers using a reduced-MTU connection, e.g. a VPN"
msgstr ""
#: i2p2www/blog/2012/09/21/0.9.2-Release.rst:36
-msgid ""
-"Fix i2psnark bug that prevented a completion announcement to the tracker"
+msgid "Fix i2psnark bug that prevented a completion announcement to the tracker"
msgstr ""
#: i2p2www/blog/2012/09/21/0.9.2-Release.rst:37
@@ -320,14 +334,14 @@ msgstr "Lançamento da versão 0.9.3"
#: i2p2www/blog/2012/10/27/0.9.3-Release.rst:7
#: i2p2www/blog/2012/10/27/0.9.3-Release.rst:9
msgid ""
-"0.9.3 includes extensive low-level changes to the queueing of messages in "
-"the router. We implement the CoDel Active Queue Management (AQM) algorithm."
-" We also unify the queueing and priority mechanisms in the transports to "
-"aid diagnosis and reduce network latency. Work continues on fixing UDP "
-"transport bugs and making UDP more resistant to attacks. There are more "
-"changes to improve the performance of the router and reduce its memory "
-"usage. Also, we enable i2psnark's DHT support, introduced last release, by "
-"default."
+"0.9.3 includes extensive low-level changes to the queueing of messages in"
+" the router. We implement the CoDel Active Queue Management (AQM) "
+"algorithm. We also unify the queueing and priority mechanisms in the "
+"transports to aid diagnosis and reduce network latency. Work continues "
+"on fixing UDP transport bugs and making UDP more resistant to attacks. "
+"There are more changes to improve the performance of the router and "
+"reduce its memory usage. Also, we enable i2psnark's DHT support, "
+"introduced last release, by default."
msgstr ""
#: i2p2www/blog/2012/10/27/0.9.3-Release.rst:26
@@ -345,8 +359,8 @@ msgstr "DHT I2PSnark: Vários bugs corrigidos, permitido por padrão."
#: i2p2www/blog/2012/10/27/0.9.3-Release.rst:32
msgid ""
"Several SSU fixes including memory leak, and better handling of routers "
-"behind firewalls that change UDP ports; additional defenses for malicious "
-"packets."
+"behind firewalls that change UDP ports; additional defenses for malicious"
+" packets."
msgstr ""
#: i2p2www/blog/2012/10/27/0.9.3-Release.rst:33
@@ -355,7 +369,9 @@ msgstr ""
#: i2p2www/blog/2012/10/27/0.9.3-Release.rst:34
msgid "Fix bug causing multiple browsers to open at startup"
-msgstr "Corrigido erro que causava a abertura de múltiplos navegadores ao inicializar"
+msgstr ""
+"Corrigido erro que causava a abertura de múltiplos navegadores ao "
+"inicializar"
#: i2p2www/blog/2012/10/27/0.9.3-Release.rst:38
msgid "Improvements in caching"
@@ -371,8 +387,9 @@ msgstr "Maior redução no uso de buffers de memória para SSU"
#: i2p2www/blog/2012/10/27/0.9.3-Release.rst:41
msgid ""
-"Fix streaming connection timeout back to 1 minute, was inadvertently changed"
-" to 5 minutes; set i2ptunnel server read timeout to 5 minutes, was unlimited"
+"Fix streaming connection timeout back to 1 minute, was inadvertently "
+"changed to 5 minutes; set i2ptunnel server read timeout to 5 minutes, was"
+" unlimited"
msgstr ""
#: i2p2www/blog/2012/10/27/0.9.3-Release.rst:42
@@ -428,24 +445,28 @@ msgstr "Lançamento da versão 0.9.4"
#: i2p2www/blog/2012/12/17/0.9.4-Release.rst:7
#: i2p2www/blog/2012/12/17/0.9.4-Release.rst:9
msgid ""
-"0.9.4 includes a fix for a network capacity bug, introduced in 0.9.2, that "
-"was reducing network performance and reliability. It also includes major "
-"changes in the in-network update system, and adds the capability to update "
-"via in-network torrents."
+"0.9.4 includes a fix for a network capacity bug, introduced in 0.9.2, "
+"that was reducing network performance and reliability. It also includes "
+"major changes in the in-network update system, and adds the capability to"
+" update via in-network torrents."
msgstr ""
#: i2p2www/blog/2012/12/17/0.9.4-Release.rst:13
msgid ""
-"We fixed several bugs in the i2psnark DHT implementation that was introduced\n"
+"We fixed several bugs in the i2psnark DHT implementation that was "
+"introduced\n"
"last release. For those of you using console or http proxy passwords,\n"
-"we converted to the more-secure digest method and improved the security for console forms."
+"we converted to the more-secure digest method and improved the security "
+"for console forms."
msgstr ""
#: i2p2www/blog/2012/12/17/0.9.4-Release.rst:19
msgid ""
-"For those of you already running development builds, your router should automatically\n"
+"For those of you already running development builds, your router should "
+"automatically\n"
"update to 0.9.4-0 using the new in-network torrent facility.\n"
-"For those running 0.9.3-0, you will update normally using in-network HTTP, and\n"
+"For those running 0.9.3-0, you will update normally using in-network "
+"HTTP, and\n"
"we will have more information for you when we release 0.9.5."
msgstr ""
@@ -453,7 +474,9 @@ msgstr ""
msgid ""
"Big rework of the update system; Preliminary support for updates via "
"i2psnark"
-msgstr "Grande retrabalho no sistema de atualização; suporte preliminar para atualizações via i2psnark"
+msgstr ""
+"Grande retrabalho no sistema de atualização; suporte preliminar para "
+"atualizações via i2psnark"
#: i2p2www/blog/2012/12/17/0.9.4-Release.rst:37
msgid "Add per-destination outbound priorities"
@@ -461,13 +484,12 @@ msgstr ""
#: i2p2www/blog/2012/12/17/0.9.4-Release.rst:41
msgid ""
-"Fix major bug that reduced SSU connection limits which reduced tunnel build "
-"success rates"
+"Fix major bug that reduced SSU connection limits which reduced tunnel "
+"build success rates"
msgstr ""
#: i2p2www/blog/2012/12/17/0.9.4-Release.rst:42
-msgid ""
-"Fix bug with external I2CP that prevented some external apps from working"
+msgid "Fix bug with external I2CP that prevented some external apps from working"
msgstr ""
#: i2p2www/blog/2012/12/17/0.9.4-Release.rst:43
@@ -500,7 +522,8 @@ msgstr ""
#: i2p2www/blog/2012/12/17/0.9.4-Release.rst:53
msgid ""
-"More performance improvements, memory reduction, and object churn reduction"
+"More performance improvements, memory reduction, and object churn "
+"reduction"
msgstr ""
#: i2p2www/blog/2012/12/17/0.9.4-Release.rst:54
@@ -517,15 +540,15 @@ msgstr "Adicionada uma caixa de entrada de senha no painel"
#: i2p2www/blog/2012/12/17/0.9.4-Release.rst:57
msgid ""
-"Convert http proxy and console from basic to digest authentication for added"
-" security"
+"Convert http proxy and console from basic to digest authentication for "
+"added security"
msgstr ""
#: i2p2www/blog/2012/12/17/0.9.4-Release.rst:58
msgid ""
"Improved verification of console form submissions, using jsp sessions. "
-"Cookies may now be required on forms, except when the console password is "
-"enabled"
+"Cookies may now be required on forms, except when the console password is"
+" enabled"
msgstr ""
#: i2p2www/blog/2012/12/17/0.9.4-Release.rst:59
@@ -544,9 +567,11 @@ msgstr ""
#: i2p2www/blog/2012/12/17/0.9.4-Release.rst:62
msgid ""
-"Translation updates: Chinese, French, German, Italian, Polish, Portuguese, "
-"Swedish, and Ukrainian"
-msgstr "Traduções atualizadas: alemão, chinês, francês, italiano, português, sueco e ucraniano"
+"Translation updates: Chinese, French, German, Italian, Polish, "
+"Portuguese, Swedish, and Ukrainian"
+msgstr ""
+"Traduções atualizadas: alemão, chinês, francês, italiano, português, "
+"sueco e ucraniano"
#: i2p2www/blog/2012/12/17/0.9.4-Release.rst:64
msgid "Update wrapper to 3.5.16 (new installs and PPA only)"
@@ -563,21 +588,24 @@ msgstr "Lançamento da versão 0.9.5"
#: i2p2www/blog/2013/03/08/0.9.5-Release.rst:7
#: i2p2www/blog/2013/03/08/0.9.5-Release.rst:9
msgid ""
-"0.9.5 includes bug fixes and defenses for some issues and vulnerabilities "
-"that are being investigated by researchers at UCSB. We continue to work with"
-" them on additional improvements. This is a good opportunity to remind the "
-"community that while our network continues to grow rapidly, it is still "
-"relatively small. There may be multiple weaknesses or bugs that could "
-"compromise your anonymity. Help us grow the network by spreading the word "
-"and contributing where you can."
+"0.9.5 includes bug fixes and defenses for some issues and vulnerabilities"
+" that are being investigated by researchers at UCSB. We continue to work "
+"with them on additional improvements. This is a good opportunity to "
+"remind the community that while our network continues to grow rapidly, it"
+" is still relatively small. There may be multiple weaknesses or bugs that"
+" could compromise your anonymity. Help us grow the network by spreading "
+"the word and contributing where you can."
msgstr ""
#: i2p2www/blog/2013/03/08/0.9.5-Release.rst:13
#, python-format
msgid ""
-"In this upgrade cycle, a random 1%(pc)s of routers, (plus all routers running a\n"
-"development build) will attempt to update via the experimental in-network bittorrent\n"
-"with i2psnark. If this doesn't work, it should fall back to standard in-network HTTP update."
+"In this upgrade cycle, a random 1%(pc)s of routers, (plus all routers "
+"running a\n"
+"development build) will attempt to update via the experimental in-network"
+" bittorrent\n"
+"with i2psnark. If this doesn't work, it should fall back to standard in-"
+"network HTTP update."
msgstr ""
#: i2p2www/blog/2013/03/08/0.9.5-Release.rst:27
@@ -622,8 +650,8 @@ msgstr ""
#: i2p2www/blog/2013/03/08/0.9.5-Release.rst:38
msgid ""
-"Encrypt database lookup messages end-to-end when sent through exploratory "
-"tunnels"
+"Encrypt database lookup messages end-to-end when sent through exploratory"
+" tunnels"
msgstr ""
#: i2p2www/blog/2013/03/08/0.9.5-Release.rst:39
@@ -668,9 +696,11 @@ msgstr ""
#: i2p2www/blog/2013/03/08/0.9.5-Release.rst:52
msgid ""
-"Translation updates: French, German, Hungarian, Italian, Norwegian, Polish, "
-"Portuguese, Russian, Swedish"
-msgstr "Traduções atualizadas: alemão, francês, húngaro, italiano, norueguês, polonês, português, russo e sueco"
+"Translation updates: French, German, Hungarian, Italian, Norwegian, "
+"Polish, Portuguese, Russian, Swedish"
+msgstr ""
+"Traduções atualizadas: alemão, francês, húngaro, italiano, norueguês, "
+"polonês, português, russo e sueco"
#: i2p2www/blog/2013/03/08/0.9.5-Release.rst:54
msgid "Update wrapper to 3.5.17 (new installs and PPA only)"
@@ -684,15 +714,17 @@ msgstr "Lançamento da versão 0.9.6"
#: i2p2www/blog/2013/05/28/0.9.6-Release.rst:9
msgid ""
"0.9.6 includes bug fixes and an update from Jetty 6.1.26 (2010-11-10) to "
-"Jetty 7.6.10 (2013-03-12). See below for important information on the Jetty "
-"update. The Jetty 7 series is actively maintained and we plan to stay "
-"current with it in future I2P releases."
+"Jetty 7.6.10 (2013-03-12). See below for important information on the "
+"Jetty update. The Jetty 7 series is actively maintained and we plan to "
+"stay current with it in future I2P releases."
msgstr ""
#: i2p2www/blog/2013/05/28/0.9.6-Release.rst:13
msgid ""
-"Most users will update via HTTP. Those running development builds will attempt to update via the\n"
-"experimental in-network bittorrent with i2psnark. We've fixed some bugs that will enable more users\n"
+"Most users will update via HTTP. Those running development builds will "
+"attempt to update via the\n"
+"experimental in-network bittorrent with i2psnark. We've fixed some bugs "
+"that will enable more users\n"
"to update via torrent in the 0.9.7 update cycle."
msgstr ""
@@ -702,9 +734,12 @@ msgstr ""
#: i2p2www/blog/2013/05/28/0.9.6-Release.rst:27
msgid ""
-"If you first installed I2P with version 0.9.5, on Windows only, we recommend that you follow the\n"
-"following instructions to fix your eepsite location **before** you update to 0.9.6.\n"
-"Only original installations of 0.9.5-0 on Windows are affected by this issue. If your router version\n"
+"If you first installed I2P with version 0.9.5, on Windows only, we "
+"recommend that you follow the\n"
+"following instructions to fix your eepsite location **before** you update"
+" to 0.9.6.\n"
+"Only original installations of 0.9.5-0 on Windows are affected by this "
+"issue. If your router version\n"
"is 0.9.5-0-win1, you already have the fix and need not take any action."
msgstr ""
@@ -722,29 +757,36 @@ msgstr ""
#: i2p2www/blog/2013/05/28/0.9.6-Release.rst:42
msgid ""
-"For most people, the update should just work. If you have multiple Jetty eepsites,\n"
-"OR have made changes to jetty.xml or other Jetty configuration files, including changing the port\n"
+"For most people, the update should just work. If you have multiple Jetty "
+"eepsites,\n"
+"OR have made changes to jetty.xml or other Jetty configuration files, "
+"including changing the port\n"
"from 7658, you MUST take manual action AFTER updating."
msgstr ""
#: i2p2www/blog/2013/05/28/0.9.6-Release.rst:48
msgid ""
-"After update, the router will migrate your jetty.xml files to the new Jetty "
-"7 format."
+"After update, the router will migrate your jetty.xml files to the new "
+"Jetty 7 format."
msgstr ""
#: i2p2www/blog/2013/05/28/0.9.6-Release.rst:50
msgid ""
-"The migration resets the port to 7658. If you have more than one Jetty eepsite, OR your eepsite\n"
-" is NOT on port 7658, OR you have made other modifications to jetty.xml (for example changing the\n"
-" listen address from 127.0.0.1 to 0.0.0.0), you MUST edit the jetty.xml file for each eepsite to fix them up\n"
+"The migration resets the port to 7658. If you have more than one Jetty "
+"eepsite, OR your eepsite\n"
+" is NOT on port 7658, OR you have made other modifications to jetty.xml "
+"(for example changing the\n"
+" listen address from 127.0.0.1 to 0.0.0.0), you MUST edit the jetty.xml "
+"file for each eepsite to fix them up\n"
" after updating, and restart again."
msgstr ""
#: i2p2www/blog/2013/05/28/0.9.6-Release.rst:55
msgid ""
-"**The following files will be backed up with a ".jetty6" suffix and then migrated.**\n"
-"If you have made local changes, you may have to edit them manually and restart.\n"
+"**The following files will be backed up with a ".jetty6" suffix"
+" and then migrated.**\n"
+"If you have made local changes, you may have to edit them manually and "
+"restart.\n"
"See http://wiki.eclipse.org/Jetty for assistance in configuring Jetty 7."
msgstr ""
@@ -763,8 +805,7 @@ msgid ""
msgstr ""
#: i2p2www/blog/2013/05/28/0.9.6-Release.rst:77
-msgid ""
-"If a plugin does not work, please contact the maintainer for that plugin."
+msgid "If a plugin does not work, please contact the maintainer for that plugin."
msgstr ""
#: i2p2www/blog/2013/05/28/0.9.6-Release.rst:83
@@ -793,14 +834,14 @@ msgstr ""
#: i2p2www/blog/2013/05/28/0.9.6-Release.rst:89
msgid ""
-"Ignore unsupported IPs in RouterInfos when selecting an address (prep for "
-"IPv6)"
+"Ignore unsupported IPs in RouterInfos when selecting an address (prep for"
+" IPv6)"
msgstr ""
#: i2p2www/blog/2013/05/28/0.9.6-Release.rst:90
msgid ""
-"Ignore unused option bits in Database Lookup Message (prep for requesting "
-"encrypted response)"
+"Ignore unused option bits in Database Lookup Message (prep for requesting"
+" encrypted response)"
msgstr ""
#: i2p2www/blog/2013/05/28/0.9.6-Release.rst:91
@@ -809,7 +850,9 @@ msgstr ""
#: i2p2www/blog/2013/05/28/0.9.6-Release.rst:92
msgid "Recognize UPnP devices without port forwarding capability"
-msgstr "Reconhecimento de dispositivos UPnP que não implementam redirecionamento de portas"
+msgstr ""
+"Reconhecimento de dispositivos UPnP que não implementam redirecionamento "
+"de portas"
#: i2p2www/blog/2013/05/28/0.9.6-Release.rst:96
msgid "Jetty 7.6.10 (see above for migration information)"
@@ -870,24 +913,31 @@ msgstr "A versão 0.9.7 inclui correções de falhas e melhorias significativas.
#: i2p2www/blog/2013/07/15/0.9.7-Release.rst:11
msgid ""
-"For the first time, class 'N' routers (those with a minimumum of 128 KBytes/sec of shared bandwidth)\n"
-"will automatically become floodfill (previously it was only 'O' routers with 256 KBps). This will\n"
-"increase the floodfill population for additional resistance to certain attacks (see below). Floodfill routers\n"
-"don't consume much additional bandwidth, but they do tend to use additional memory and concurrent\n"
-"connections. If you do not wish your router to become floodfill, set the advanced configuration\n"
+"For the first time, class 'N' routers (those with a minimumum of 128 "
+"KBytes/sec of shared bandwidth)\n"
+"will automatically become floodfill (previously it was only 'O' routers "
+"with 256 KBps). This will\n"
+"increase the floodfill population for additional resistance to certain "
+"attacks (see below). Floodfill routers\n"
+"don't consume much additional bandwidth, but they do tend to use "
+"additional memory and concurrent\n"
+"connections. If you do not wish your router to become floodfill, set the "
+"advanced configuration\n"
"router.floodfillParticipant=false ."
msgstr ""
#: i2p2www/blog/2013/07/15/0.9.7-Release.rst:20
#, python-format
msgid ""
-"As we think the last release fixed the experimental update-via-torrent bugs, 3%(pc)s of routers should\n"
+"As we think the last release fixed the experimental update-via-torrent "
+"bugs, 3%(pc)s of routers should\n"
"update over in-network bittorrent this cycle."
msgstr ""
#: i2p2www/blog/2013/07/15/0.9.7-Release.rst:25
msgid ""
-"Plugin update checks, possibly broken for several releases, are fixed. Your plugins should once again\n"
+"Plugin update checks, possibly broken for several releases, are fixed. "
+"Your plugins should once again\n"
"auto-update after updating the router."
msgstr ""
@@ -899,12 +949,17 @@ msgstr ""
#: i2p2www/blog/2013/07/15/0.9.7-Release.rst:34
msgid ""
-"This release contains additional mitigations for the `\"practical attacks\" paper`_.\n"
-"However, we have a lot more work to do to resist Sybil attacks on the floodfills, and resist\n"
+"This release contains additional mitigations for the `\"practical "
+"attacks\" paper`_.\n"
+"However, we have a lot more work to do to resist Sybil attacks on the "
+"floodfills, and resist\n"
"traffic analysis at the gateways and endpoints of exploratory tunnels.\n"
-"It's a good reminder for everybody that our network is still relatively small and vulnerable.\n"
-"We don't currently recommend any uses that would put anybody in serious jeopardy.\n"
-"We'll keep working to improve it... please keep working to spread the word. A bigger network is a better network."
+"It's a good reminder for everybody that our network is still relatively "
+"small and vulnerable.\n"
+"We don't currently recommend any uses that would put anybody in serious "
+"jeopardy.\n"
+"We'll keep working to improve it... please keep working to spread the "
+"word. A bigger network is a better network."
msgstr ""
#: i2p2www/blog/2013/07/15/0.9.7-Release.rst:43
@@ -953,8 +1008,8 @@ msgstr ""
#: i2p2www/blog/2013/07/15/0.9.7-Release.rst:59
msgid ""
-"Fix i2psnark bug that changed the infohash of torrents created by Robert and"
-" fetched via magnet link"
+"Fix i2psnark bug that changed the infohash of torrents created by Robert "
+"and fetched via magnet link"
msgstr ""
#: i2p2www/blog/2013/07/15/0.9.7-Release.rst:60
@@ -989,8 +1044,8 @@ msgstr "Suporte para IE 10"
#: i2p2www/blog/2013/07/15/0.9.7-Release.rst:70
msgid ""
-"Individual expiration times in leases, for efficiency on destinations with a"
-" high number of tunnels"
+"Individual expiration times in leases, for efficiency on destinations "
+"with a high number of tunnels"
msgstr ""
#: i2p2www/blog/2013/07/15/0.9.7-Release.rst:71
@@ -1006,9 +1061,10 @@ msgid "Tomcat 6.0.37"
msgstr "Tomcat 6.0.37"
#: i2p2www/blog/2013/07/15/0.9.7-Release.rst:74
-msgid ""
-"Translation updates: Chinese, French, German, Portuguese, Russian, Spanish"
-msgstr "Traduções atualizadas: alemão, chinês, espanhol, francês, português e russo"
+msgid "Translation updates: Chinese, French, German, Portuguese, Russian, Spanish"
+msgstr ""
+"Traduções atualizadas: alemão, chinês, espanhol, francês, português e "
+"russo"
#: i2p2www/blog/2013/07/15/0.9.7-Release.rst:75
msgid "New Turkish translation"
@@ -1025,11 +1081,12 @@ msgstr "Lançamento da versão 0.9.7.1"
#: i2p2www/blog/2013/08/10/0.9.7.1-Release.rst:7
#: i2p2www/blog/2013/08/10/0.9.7.1-Release.rst:9
msgid ""
-"This unscheduled release disables the RouterInfo verification messages that "
-"were used in the attack published in the UCSB paper, which should make "
-"correlating a LeaseSet and a Router much more difficult. We have also "
-"included a limited number of other fixes listed below. Our 0.9.8 release, "
-"which will include IPv6 support, is still on-schedule for late September."
+"This unscheduled release disables the RouterInfo verification messages "
+"that were used in the attack published in the UCSB paper, which should "
+"make correlating a LeaseSet and a Router much more difficult. We have "
+"also included a limited number of other fixes listed below. Our 0.9.8 "
+"release, which will include IPv6 support, is still on-schedule for late "
+"September."
msgstr ""
#: i2p2www/blog/2013/08/10/0.9.7.1-Release.rst:11
@@ -1079,17 +1136,16 @@ msgstr "Lançamento da versão 0.9.8"
#: i2p2www/blog/2013/09/30/0.9.8-Release.rst:7
#: i2p2www/blog/2013/09/30/0.9.8-Release.rst:9
msgid ""
-"0.9.8 includes the long-awaited support for IPv6. It's enabled by default, "
-"but of course you need a public IPv6 address to use it. Configuration is on "
-"the 'network' configuration tab in your console. We also have anonymity "
-"improvements including padding of SSU packets and longer router private "
-"keys."
+"0.9.8 includes the long-awaited support for IPv6. It's enabled by "
+"default, but of course you need a public IPv6 address to use it. "
+"Configuration is on the 'network' configuration tab in your console. We "
+"also have anonymity improvements including padding of SSU packets and "
+"longer router private keys."
msgstr ""
#: i2p2www/blog/2013/09/30/0.9.8-Release.rst:11
#, python-format
-msgid ""
-"30%(pc)s of you will update via in-network torrent in this update cycle."
+msgid "30%(pc)s of you will update via in-network torrent in this update cycle."
msgstr ""
#: i2p2www/blog/2013/09/30/0.9.8-Release.rst:13
@@ -1098,30 +1154,41 @@ msgstr "Detalhes sobre o IPv6"
#: i2p2www/blog/2013/09/30/0.9.8-Release.rst:15
msgid ""
-"IPv6 is enabled and preferred by default. If you have a public IPv6 address \n"
-"and you are connecting to another router with a published IPv6 address, it will \n"
-"connect via IPv6. There is a new IPv6 configuration section on /confignet in \n"
+"IPv6 is enabled and preferred by default. If you have a public IPv6 "
+"address \n"
+"and you are connecting to another router with a published IPv6 address, "
+"it will \n"
+"connect via IPv6. There is a new IPv6 configuration section on /confignet"
+" in \n"
"the router console. If IPv6 is causing problems you may disable it there."
msgstr ""
#: i2p2www/blog/2013/09/30/0.9.8-Release.rst:22
msgid ""
"As a part of the IPv6 development effort, I2P now supports multiple \n"
-"published IP addresses. If you have multiple public IP addresses (IPv4, IPv6, \n"
-"or both), you may enable or disable them individually on /confignet. The \n"
-"default is to use the first IPv4 and IPv6 addresses it discovers. If you have \n"
-"multiple addresses you should review the configuration on /confignet and adjust \n"
+"published IP addresses. If you have multiple public IP addresses (IPv4, "
+"IPv6, \n"
+"or both), you may enable or disable them individually on /confignet. The"
+" \n"
+"default is to use the first IPv4 and IPv6 addresses it discovers. If you "
+"have \n"
+"multiple addresses you should review the configuration on /confignet and "
+"adjust \n"
"it if necessary.\n"
-"Note that while you may enable multiple IPv4 and IPv6 addresses on /confignet,\n"
+"Note that while you may enable multiple IPv4 and IPv6 addresses on "
+"/confignet,\n"
"we recommend that you use only one IPv4 and one IPv6 address. There are\n"
"bugs still to be fixed with multiple addresses of each type."
msgstr ""
#: i2p2www/blog/2013/09/30/0.9.8-Release.rst:34
msgid ""
-"While IPv6 support was designed and developed over several years, it has \n"
-"only been tested by a limited number of users and is still beta. If you do have \n"
-"a public IPv6 address, please monitor your router and the logs for problems, \n"
+"While IPv6 support was designed and developed over several years, it has"
+" \n"
+"only been tested by a limited number of users and is still beta. If you "
+"do have \n"
+"a public IPv6 address, please monitor your router and the logs for "
+"problems, \n"
"and disable it necessary. Please report any bugs on \n"
"http://trac.i2p2.i2p."
msgstr ""
@@ -1132,19 +1199,26 @@ msgstr ""
#: i2p2www/blog/2013/09/30/0.9.8-Release.rst:44
msgid ""
-"For those of you running I2P on faster hardware (generally, 64-bit x86) the \n"
-"router will generate a new identity using longer keys. This will substantially \n"
-"reduce your participating traffic for 48 hours or more, while your router \n"
-"re-integrates into the network. Due to the new keys, the large number of \n"
+"For those of you running I2P on faster hardware (generally, 64-bit x86) "
+"the \n"
+"router will generate a new identity using longer keys. This will "
+"substantially \n"
+"reduce your participating traffic for 48 hours or more, while your router"
+" \n"
+"re-integrates into the network. Due to the new keys, the large number of"
+" \n"
"torrent updates, and the recent network growth, we expect substantial \n"
-"disruption to the network for a week or more after the update is released. \n"
+"disruption to the network for a week or more after the update is "
+"released. \n"
"Please be patient and things should start to improve after a few days."
msgstr ""
#: i2p2www/blog/2013/09/30/0.9.8-Release.rst:54
msgid ""
-"These changes may result in higher CPU usage for some of you. We're doing \n"
-"our best to increase efficiency, but stronger security generally requires more \n"
+"These changes may result in higher CPU usage for some of you. We're doing"
+" \n"
+"our best to increase efficiency, but stronger security generally requires"
+" more \n"
"computation. Performance may also be poor during the first week\n"
"due to the network churn.\n"
"We will evaluate the network performace before deciding whether to\n"
@@ -1153,8 +1227,10 @@ msgstr ""
#: i2p2www/blog/2013/09/30/0.9.8-Release.rst:63
msgid ""
-"We are experiencing rapid network growth in the last few weeks, which is \n"
-"causing a bit of a bumpy ride for some, especially on weekends. However, the \n"
+"We are experiencing rapid network growth in the last few weeks, which is"
+" \n"
+"causing a bit of a bumpy ride for some, especially on weekends. However, "
+"the \n"
"network is still performing fairly well, so keep spreading the word."
msgstr ""
@@ -1166,10 +1242,14 @@ msgstr "Mais mudanças estão a caminho"
msgid ""
"We're in the initial stages of desiging major changes to strengthen our \n"
"crypto. Stronger crypto will use more CPU and it may possibly \n"
-"require a Java 7 JRE at a minimum. We understand your desire to run I2P on low-power \n"
-"and/or older hardware. We're working hard to minimize the impacts, but some \n"
-"loss of performance is inevitable. In addition, Java 5 and 6 are no longer \n"
-"supported by Oracle. Now is a good time to upgrade to Java 7. Any change in \n"
+"require a Java 7 JRE at a minimum. We understand your desire to run I2P "
+"on low-power \n"
+"and/or older hardware. We're working hard to minimize the impacts, but "
+"some \n"
+"loss of performance is inevitable. In addition, Java 5 and 6 are no "
+"longer \n"
+"supported by Oracle. Now is a good time to upgrade to Java 7. Any change "
+"in \n"
"minimum requirements will be announced well in advance."
msgstr ""
@@ -1184,7 +1264,13 @@ msgid ""
"https://geti2p.net and http://www.i2p2.i2p soon. Please \n"
"contribute to the new website translations on Transifex, especially the \n"
"website_priority resource."
-msgstr "Após um esforço heróico de str4d, uma prévia do novo website encontra-se em\nhttp://i2hq.srv.i2p2.de. Esperamos vê-lo em breve em\nhttps://geti2p.net e http://www.i2p2.i2p. Por favor,\ncontribua traduzindo o novo website no Transifex, em especial o\nrecurso website_priority."
+msgstr ""
+"Após um esforço heróico de str4d, uma prévia do novo website encontra-se "
+"em\n"
+"http://i2hq.srv.i2p2.de. Esperamos vê-lo em breve em\n"
+"https://geti2p.net e http://www.i2p2.i2p. Por favor,\n"
+"contribua traduzindo o novo website no Transifex, em especial o\n"
+"recurso website_priority."
#: i2p2www/blog/2013/09/30/0.9.8-Release.rst:91
msgid "Community Participation"
@@ -1196,7 +1282,8 @@ msgid ""
"Last weekend, echelon attended the CTS IV conference in Berlin and\n"
"psi attended the Tahoe-LAFS hackfest at GNU 30 in Cambridge, Mass.\n"
"Several of us will be at 30C3 in Hamburg late this year.\n"
-"It's great to see people participating at these events and representing I2P."
+"It's great to see people participating at these events and representing "
+"I2P."
msgstr ""
#: i2p2www/blog/2013/09/30/0.9.8-Release.rst:105
@@ -1224,8 +1311,7 @@ msgid "Fix occasional runtime exception in NTCP"
msgstr "Corrige ocasional exceção de ciclo de execução no NTCP"
#: i2p2www/blog/2013/09/30/0.9.8-Release.rst:120
-msgid ""
-"Big rework of transport code to accommodate multiple addresses and IPv6"
+msgid "Big rework of transport code to accommodate multiple addresses and IPv6"
msgstr ""
#: i2p2www/blog/2013/09/30/0.9.8-Release.rst:121
@@ -1233,15 +1319,18 @@ msgid "Streaming: Improved recovery from lost acks, other fixes"
msgstr ""
#: i2p2www/blog/2013/09/30/0.9.8-Release.rst:122
-msgid ""
-"Use Transifex for translation of initial news and HTTP proxy error pages"
-msgstr "Usa o Transifex para a tradução de novidades iniciais e páginas de erros do proxy HTTP"
+msgid "Use Transifex for translation of initial news and HTTP proxy error pages"
+msgstr ""
+"Usa o Transifex para a tradução de novidades iniciais e páginas de erros "
+"do proxy HTTP"
#: i2p2www/blog/2013/09/30/0.9.8-Release.rst:123
msgid ""
-"Translation updates: Chinese, French, German, Portuguese, Russian, Swedish, "
-"Turkish"
-msgstr "Traduções atualizadas: alemão, chinês, francês, português, russo, sueco e turco"
+"Translation updates: Chinese, French, German, Portuguese, Russian, "
+"Swedish, Turkish"
+msgstr ""
+"Traduções atualizadas: alemão, chinês, francês, português, russo, sueco e"
+" turco"
#: i2p2www/blog/2013/09/30/0.9.8-Release.rst:124
msgid "New Romanian translation"
@@ -1258,9 +1347,9 @@ msgstr "Lançamento da versão 0.9.8.1"
#: i2p2www/blog/2013/10/02/0.9.8.1-Release.rst:7
#: i2p2www/blog/2013/10/02/0.9.8.1-Release.rst:9
msgid ""
-"0.9.8.1 fixes a problem with updating to 0.9.8 on Windows for some people. "
-"New installs and non-Windows platforms are not affected, however all "
-"platforms will automatically update even if running 0.9.8."
+"0.9.8.1 fixes a problem with updating to 0.9.8 on Windows for some "
+"people. New installs and non-Windows platforms are not affected, however "
+"all platforms will automatically update even if running 0.9.8."
msgstr ""
#: i2p2www/blog/2013/10/02/0.9.8.1-Release.rst:11
@@ -1271,8 +1360,10 @@ msgstr ""
#: i2p2www/blog/2013/10/02/0.9.8.1-Release.rst:16
msgid ""
-"Due to recent attacks, logins are disabled on `Trac`_ and new registrations are\n"
-"disabled on `zzz.i2p`_. Until those services are restored, please report all\n"
+"Due to recent attacks, logins are disabled on `Trac`_ and new "
+"registrations are\n"
+"disabled on `zzz.i2p`_. Until those services are restored, please report "
+"all\n"
"bugs on IRC freenode or IRC2P #i2p-dev."
msgstr ""
@@ -1293,9 +1384,9 @@ msgstr "Lançamento da versão 0.9.9"
msgid ""
"0.9.9 fixes a number of bugs in the netdb, streaming, and i2ptunnel, and "
"starts work on a year-long plan to increase the strength of the "
-"cryptographic signing algorithms used in the router, and support multiple "
-"algorithms and key lengths simultaneously. Automatic update files will now "
-"be signed with 4096-bit RSA keys."
+"cryptographic signing algorithms used in the router, and support multiple"
+" algorithms and key lengths simultaneously. Automatic update files will "
+"now be signed with 4096-bit RSA keys."
msgstr ""
#: i2p2www/blog/2013/12/07/0.9.9-Release.rst:11
@@ -1311,7 +1402,8 @@ msgstr ""
#: i2p2www/blog/2013/12/07/0.9.9-Release.rst:18
msgid ""
"As usual, we recommend that you update to this release.\n"
-"The best way to maintain security and help the network is to run the latest release.\n"
+"The best way to maintain security and help the network is to run the "
+"latest release.\n"
"Several members of the I2P team will be at 30C3 in Hamburg this year.\n"
"Come say hello and ask for an I2P sticker.\n"
"Thanks to everyone for their support this year."
@@ -1427,7 +1519,8 @@ msgstr ""
#: i2p2www/blog/2013/12/07/0.9.9-Release.rst:62
msgid ""
-"Extend router info expiration and other changes to reduce load on floodfills"
+"Extend router info expiration and other changes to reduce load on "
+"floodfills"
msgstr ""
#: i2p2www/blog/2013/12/07/0.9.9-Release.rst:63
@@ -1464,9 +1557,11 @@ msgstr "Nova tradução para o japonês (parcial)"
#: i2p2www/blog/2013/12/07/0.9.9-Release.rst:71
msgid ""
-"Translation updates: French, German, Italian, Romanian, Russian, Spanish, "
-"Swedish, and others"
-msgstr "Traduções atualizadas: alemão, espanhol, francês, italiano, romeno, russo, sueco e outros idiomas"
+"Translation updates: French, German, Italian, Romanian, Russian, Spanish,"
+" Swedish, and others"
+msgstr ""
+"Traduções atualizadas: alemão, espanhol, francês, italiano, romeno, "
+"russo, sueco e outros idiomas"
#: i2p2www/blog/2013/12/07/0.9.9-Release.rst:73
msgid "Wrapper 3.5.22 (new installs and PPA only)"
@@ -1477,7 +1572,10 @@ msgid ""
"=====================\n"
"Syndie 1.105b Release\n"
"====================="
-msgstr "===================================\nLançamento da versão 1.105b do Syndie\n==================================="
+msgstr ""
+"===================================\n"
+"Lançamento da versão 1.105b do Syndie\n"
+"==================================="
#: i2p2www/blog/2014/01/21/Syndie-1.105b-Release.rst:9
msgid "Update to HSQLDB 2.3.1"
@@ -1504,15 +1602,19 @@ msgstr ""
#: i2p2www/blog/2014/01/21/Syndie-1.105b-Release.rst:25
msgid ""
"If you have a large database or an identity you wish to preserve,\n"
-"you may wish to back up your entire ~/.syndie directory before you start.\n"
-"The upgrade process does make its own backup, however you may find it easier to use your own backup if the upgrade fails."
+"you may wish to back up your entire ~/.syndie directory before you start."
+"\n"
+"The upgrade process does make its own backup, however you may find it "
+"easier to use your own backup if the upgrade fails."
msgstr ""
#: i2p2www/blog/2014/01/21/Syndie-1.105b-Release.rst:31
msgid ""
-"Upgrades from 1.103b may fail for some people due to database corruption due to bugs in the old HSQLDB.\n"
+"Upgrades from 1.103b may fail for some people due to database corruption "
+"due to bugs in the old HSQLDB.\n"
"Unfortunately, we don't know how to fix it.\n"
-"Your alternatives are to start over with a clean database, or stay with 1.103b forever.\n"
+"Your alternatives are to start over with a clean database, or stay with "
+"1.103b forever.\n"
"Sorry about that."
msgstr ""
@@ -1520,7 +1622,8 @@ msgstr ""
#: i2p2www/blog/2014/01/22/0.9.10-Release.rst:29
msgid ""
"As usual, we recommend that you update to this release.\n"
-"The best way to maintain security and help the network is to run the latest release."
+"The best way to maintain security and help the network is to run the "
+"latest release."
msgstr ""
#: i2p2www/blog/2014/01/21/Syndie-1.105b-Release.rst:56
@@ -1555,7 +1658,10 @@ msgid ""
"==============\n"
"0.9.10 Release\n"
"=============="
-msgstr "==========================\nLançamento da versão 0.9.10\n=========================="
+msgstr ""
+"==========================\n"
+"Lançamento da versão 0.9.10\n"
+"=========================="
#: i2p2www/blog/2014/01/22/0.9.10-Release.rst:9
msgid ""
@@ -1565,15 +1671,19 @@ msgstr ""
#: i2p2www/blog/2014/01/22/0.9.10-Release.rst:11
msgid ""
-"0.9.10 changes the mechanism for doing LeaseSet lookups, making it more difficult for an attacker\n"
-"to correlate a Destination with a Router. It also fixes character encoding bugs in susimail,\n"
+"0.9.10 changes the mechanism for doing LeaseSet lookups, making it more "
+"difficult for an attacker\n"
+"to correlate a Destination with a Router. It also fixes character "
+"encoding bugs in susimail,\n"
"and includes lots of other bug fixes and translation updates.\n"
-"Most of you will update via torrent, using the new \"su3\" update format with stronger keys."
+"Most of you will update via torrent, using the new \"su3\" update format "
+"with stronger keys."
msgstr ""
#: i2p2www/blog/2014/01/22/0.9.10-Release.rst:18
msgid ""
-"We recently attended `30C3`_ and `Real World Crypto`_, making several new\n"
+"We recently attended `30C3`_ and `Real World Crypto`_, making several new"
+"\n"
"connections and formulating `big plans`_ for 2014. Thanks to those who\n"
"supported our attendance with their `donations`_!"
msgstr ""
@@ -1592,8 +1702,8 @@ msgstr ""
#: i2p2www/blog/2014/01/22/0.9.10-Release.rst:42
msgid ""
-"Flood netdb stores to new location before midnight to prevent lookup fails "
-"after midnight"
+"Flood netdb stores to new location before midnight to prevent lookup "
+"fails after midnight"
msgstr ""
#: i2p2www/blog/2014/01/22/0.9.10-Release.rst:43
@@ -1659,7 +1769,10 @@ msgid ""
"==============\n"
"0.9.11 Release\n"
"=============="
-msgstr "==========================\nLançamento da versão 0.9.11\n=========================="
+msgstr ""
+"==========================\n"
+"Lançamento da versão 0.9.11\n"
+"=========================="
#: i2p2www/blog/2014/02/08/0.9.11-Release.rst:9
msgid ""
@@ -1670,19 +1783,24 @@ msgstr ""
#: i2p2www/blog/2014/02/08/0.9.11-Release.rst:11
#, python-format
msgid ""
-"0.9.11 continues improving LeaseSet lookup and storage to prevent an attacker\n"
+"0.9.11 continues improving LeaseSet lookup and storage to prevent an "
+"attacker\n"
"from correlating a Destination with a Router. It adds support for the\n"
"%(orchid)s outproxy plugin which is available at %(url)s. There is a\n"
-"reduction in memory usage due to fixes in the transports. We have some I2CP\n"
+"reduction in memory usage due to fixes in the transports. We have some "
+"I2CP\n"
"protocol improvements that will provide better lookup facilities and\n"
-"authorization protection for external clients. Of course, there's also the\n"
+"authorization protection for external clients. Of course, there's also "
+"the\n"
"usual collection of bug fixes. All users should update."
msgstr ""
#: i2p2www/blog/2014/02/08/0.9.11-Release.rst:21
msgid ""
-"This may be the last release that works with Java 5, which is very old and\n"
-"unsupported. If you are using a Java 5 or 6 runtime, we strongly recommend that\n"
+"This may be the last release that works with Java 5, which is very old "
+"and\n"
+"unsupported. If you are using a Java 5 or 6 runtime, we strongly "
+"recommend that\n"
"you upgrade to Java 7."
msgstr ""
@@ -1726,8 +1844,8 @@ msgstr ""
#: i2p2www/blog/2014/02/08/0.9.11-Release.rst:52
msgid ""
-"Stricter I2CP authorization enforcement of external clients (incompatible "
-"change)"
+"Stricter I2CP authorization enforcement of external clients (incompatible"
+" change)"
msgstr ""
#: i2p2www/blog/2014/02/08/0.9.11-Release.rst:53
@@ -1747,26 +1865,40 @@ msgid ""
"=========================\n"
"Malware at i2pbrowser.net\n"
"========================="
-msgstr "============================\nMalware no site i2pbrowser.net\n============================"
+msgstr ""
+"============================\n"
+"Malware no site i2pbrowser.net\n"
+"============================"
#: i2p2www/blog/2014/02/16/i2pbrowser-malware.rst:8
msgid ""
-"The site i2pbrowser.net is a fake I2P website mirror serving up malware for "
-"Windows."
-msgstr "O site i2pbrowser.net é um espelho fake do website da I2P que distribui malware para Windows."
+"The site i2pbrowser.net is a fake I2P website mirror serving up malware "
+"for Windows."
+msgstr ""
+"O site i2pbrowser.net é um espelho fake do website da I2P que distribui "
+"malware para Windows."
#: i2p2www/blog/2014/02/16/i2pbrowser-malware.rst:10
msgid ""
-"We have recently been made aware of the existence of i2pbrowser.net. This\n"
-"website copies our homepage and download page, and attempts to trick users into\n"
+"We have recently been made aware of the existence of i2pbrowser.net. This"
+"\n"
+"website copies our homepage and download page, and attempts to trick "
+"users into\n"
"downloading Windows malware."
-msgstr "Ficamos recentemente surpresos com a existência do site i2pbrowser.net. Este\nwebsite copia a nossa homepage e página de download e tenta ludibriar os usuários\npara baixar um malware para Windows."
+msgstr ""
+"Ficamos recentemente surpresos com a existência do site i2pbrowser.net. "
+"Este\n"
+"website copia a nossa homepage e página de download e tenta ludibriar os "
+"usuários\n"
+"para baixar um malware para Windows."
#: i2p2www/blog/2014/02/16/i2pbrowser-malware.rst:16
msgid ""
-"There are several indicators that point to i2pbrowser.net being a malware "
-"site:"
-msgstr "Há inúmeros indicativos de que o site i2pbrowser.net seja fonte de malware:"
+"There are several indicators that point to i2pbrowser.net being a malware"
+" site:"
+msgstr ""
+"Há inúmeros indicativos de que o site i2pbrowser.net seja fonte de "
+"malware:"
#: i2p2www/blog/2014/02/16/i2pbrowser-malware.rst:20
msgid "The domain was registered on February 10th, 2014."
@@ -1774,26 +1906,31 @@ msgstr "O domínio foi registrado em 10 de fevereiro de 2014."
#: i2p2www/blog/2014/02/16/i2pbrowser-malware.rst:21
msgid ""
-"The download URLs for Windows, Mac OSX, Linux, Android etc. all link to the "
-"same .exe file."
-msgstr "Todas os URLs de download, para Windows, Mac OSZ, Linux, Android etc., lincam para o mesmo arquivo .exe"
+"The download URLs for Windows, Mac OSX, Linux, Android etc. all link to "
+"the same .exe file."
+msgstr ""
+"Todas os URLs de download, para Windows, Mac OSZ, Linux, Android etc., "
+"lincam para o mesmo arquivo .exe"
#: i2p2www/blog/2014/02/16/i2pbrowser-malware.rst:22
-msgid ""
-"The .exe is only 741 KB; the official Windows installer for I2P is 13 MB."
+msgid "The .exe is only 741 KB; the official Windows installer for I2P is 13 MB."
msgstr ""
#: i2p2www/blog/2014/02/16/i2pbrowser-malware.rst:24
msgid ""
-"We have not examined the malware ourselves, but it does not appear to be very\n"
-"sophisticated; it is not integrated into or bundled with the I2P software.\n"
-"Information security expert `Lance James`_ posted `a tweet`_ labelling it as\n"
+"We have not examined the malware ourselves, but it does not appear to be "
+"very\n"
+"sophisticated; it is not integrated into or bundled with the I2P "
+"software.\n"
+"Information security expert `Lance James`_ posted `a tweet`_ labelling it"
+" as\n"
"\"a standard dark comet rat\"."
msgstr ""
#: i2p2www/blog/2014/02/16/i2pbrowser-malware.rst:31
msgid ""
-"Spread the word. The only official download locations for I2P are linked on our\n"
+"Spread the word. The only official download locations for I2P are linked "
+"on our\n"
"`download page`_. All I2P download packages are GPG-signed by the\n"
"`release signing key`_."
msgstr ""
@@ -1811,32 +1948,48 @@ msgid ""
"================================================================\n"
"Search Engine DuckDuckGo Awards Invisible Internet Project $5000\n"
"================================================================"
-msgstr "========================================================================\nBuscador DuckDuckGo premia o Projeto Internet Invisível com doação de $5000\n========================================================================"
+msgstr ""
+"========================================================================\n"
+"Buscador DuckDuckGo premia o Projeto Internet Invisível com doação de "
+"$5000\n"
+"========================================================================"
#: i2p2www/blog/2014/03/12/press-release-ddg-donation.rst:10
msgid ""
"Search engine `DuckDuckGo`_ `donates`_ $5000 to the `Invisible Internet "
"Project`_ (I2P) in their open source donation program."
-msgstr "Buscador `DuckDuckGo`_ `doa`_ $5000 para o `Projeto Internet Invisível`_ (I2P) no seu programa de doações para iniciativas open-source."
+msgstr ""
+"Buscador `DuckDuckGo`_ `doa`_ $5000 para o `Projeto Internet Invisível`_ "
+"(I2P) no seu programa de doações para iniciativas open-source."
#: i2p2www/blog/2014/03/12/press-release-ddg-donation.rst:12
msgid ""
"**Somewhere, NH** -- Internet search company `DuckDuckGo`_ `donates`_\n"
-"$5000 to the `Invisible Internet Project`_ (I2P) as part of their yearly open-source\n"
-"donation program. The award was granted on the basis of `nominations`_ by members of the public\n"
-"on the DuckDuckGo community portal. With an emphasis on privacy, DuckDuckGo provides a search\n"
-"engine which does not track its users or store personal data. I2P is an anonymous network intended to\n"
-"protect individuals from dragnet surveillance regularly performed by ISPs and governments."
+"$5000 to the `Invisible Internet Project`_ (I2P) as part of their yearly "
+"open-source\n"
+"donation program. The award was granted on the basis of `nominations`_ by"
+" members of the public\n"
+"on the DuckDuckGo community portal. With an emphasis on privacy, "
+"DuckDuckGo provides a search\n"
+"engine which does not track its users or store personal data. I2P is an "
+"anonymous network intended to\n"
+"protect individuals from dragnet surveillance regularly performed by ISPs"
+" and governments."
msgstr ""
#: i2p2www/blog/2014/03/12/press-release-ddg-donation.rst:21
#: i2p2www/blog/2014/03/31/0.9.12-Release.rst:42
msgid ""
-"This marks the single largest donation ever received by I2P and reflects a growing interest in\n"
-"privacy and security by the Internet community. The funding will help I2P to reach more users, expand\n"
-"development, and audit the code. It will also enable I2P developers to attend conferences, such\n"
-"as the `Real-World Cryptography`_ conference in New York City, where the developers met and\n"
-"collaborated with cryptography experts pursuant to I2P's goals of providing anonymity to the\n"
+"This marks the single largest donation ever received by I2P and reflects "
+"a growing interest in\n"
+"privacy and security by the Internet community. The funding will help I2P"
+" to reach more users, expand\n"
+"development, and audit the code. It will also enable I2P developers to "
+"attend conferences, such\n"
+"as the `Real-World Cryptography`_ conference in New York City, where the "
+"developers met and\n"
+"collaborated with cryptography experts pursuant to I2P's goals of "
+"providing anonymity to the\n"
"public."
msgstr ""
@@ -1845,13 +1998,18 @@ msgstr ""
msgid ""
"I2P thanks Gabriel Weinberg and DuckDuckGo for the generous donation,\n"
"and the I2P community for its support in the `nominations`_."
-msgstr "O projeto I2P agradece a Gabriel Weinberg e DuckDuckGo pela doação generosa,\ne a comunidade I2P pelo suporte que ofereceram nas `nomeações`_."
+msgstr ""
+"O projeto I2P agradece a Gabriel Weinberg e DuckDuckGo pela doação "
+"generosa,\n"
+"e a comunidade I2P pelo suporte que ofereceram nas `nomeações`_."
#: i2p2www/blog/2014/03/12/press-release-ddg-donation.rst:35
msgid ""
"For more information about I2P, visit `our web site`_ or follow us `on "
"Twitter`_."
-msgstr "Para mais informações sobre a I2P, visite o `nosso sítio web`_ ou siga-nos `no Twitter`_."
+msgstr ""
+"Para mais informações sobre a I2P, visite o `nosso sítio web`_ ou siga-"
+"nos `no Twitter`_."
#: i2p2www/blog/2014/03/12/press-release-ddg-donation.rst:39
msgid "`donates`"
@@ -1875,7 +2033,10 @@ msgid ""
"==============\n"
"0.9.12 Release\n"
"=============="
-msgstr "==========================\nLançamento da versão 0.9.12\n=========================="
+msgstr ""
+"==========================\n"
+"Lançamento da versão 0.9.12\n"
+"=========================="
#: i2p2www/blog/2014/03/31/0.9.12-Release.rst:10
msgid "0.9.12 adds support for ECDSA and updates to Jetty 8"
@@ -1885,28 +2046,34 @@ msgstr ""
msgid ""
"I2P now requires Java 6 or higher.\n"
"We strongly recommend that you upgrade to Java 7.\n"
-"If you are still using Java 5, you must upgrade your Java before installing I2P 0.9.12."
+"If you are still using Java 5, you must upgrade your Java before "
+"installing I2P 0.9.12."
msgstr ""
#: i2p2www/blog/2014/03/31/0.9.12-Release.rst:18
msgid ""
"0.9.12 adds preliminary support for ECDSA-signed Destinations.\n"
-"It contains several fixes for the handling of Delivery Status Messages (acknowledgements)\n"
+"It contains several fixes for the handling of Delivery Status Messages "
+"(acknowledgements)\n"
"and those messages are now end-to-end encrypted for increased security."
msgstr ""
#: i2p2www/blog/2014/03/31/0.9.12-Release.rst:24
msgid ""
"We have upgraded to Jetty 8.\n"
-"Jetty 8 is almost identical to Jetty 7, so there are no complex configuration file conversions as there have been in past Jetty upgrades.\n"
+"Jetty 8 is almost identical to Jetty 7, so there are no complex "
+"configuration file conversions as there have been in past Jetty upgrades."
+"\n"
"No manual changes should be necessary."
msgstr ""
#: i2p2www/blog/2014/03/31/0.9.12-Release.rst:35
msgid ""
"In early March, Internet search company `DuckDuckGo`_ `donated`_\n"
-"$5000 to the `Invisible Internet Project` (I2P) as part of their yearly open-source\n"
-"donation program. The award was granted on the basis of `nominations`_ by members of the public\n"
+"$5000 to the `Invisible Internet Project` (I2P) as part of their yearly "
+"open-source\n"
+"donation program. The award was granted on the basis of `nominations`_ by"
+" members of the public\n"
"on the DuckDuckGo community portal."
msgstr ""
@@ -1959,8 +2126,7 @@ msgid "Jetty 8.1.14.v20131031; Java 6 now required"
msgstr ""
#: i2p2www/blog/2014/03/31/0.9.12-Release.rst:90
-msgid ""
-"Reduce target connection count again to reduce tunnel reject rate further"
+msgid "Reduce target connection count again to reduce tunnel reject rate further"
msgstr ""
#: i2p2www/blog/2014/03/31/0.9.12-Release.rst:91
@@ -2000,16 +2166,23 @@ msgid ""
"==============\n"
"0.9.13 Release\n"
"=============="
-msgstr "==========================\nLançamento da versão 0.9.13\n=========================="
+msgstr ""
+"==========================\n"
+"Lançamento da versão 0.9.13\n"
+"=========================="
#: i2p2www/blog/2014/05/22/0.9.13-Release.rst:10
msgid "0.9.13 with SusiMail improvements and fixes for firewalled routers"
-msgstr "0.9.13 com melhorias no SusiMail e correções para rotadores protegidos por firewall"
+msgstr ""
+"0.9.13 com melhorias no SusiMail e correções para rotadores protegidos "
+"por firewall"
#: i2p2www/blog/2014/05/22/0.9.13-Release.rst:12
msgid ""
-"0.9.13 includes fixes for firewalled routers, netdb lookup improvements, and a big SusiMail update.\n"
-"Of course, there's also the usual collection of bug fixes and translation updates."
+"0.9.13 includes fixes for firewalled routers, netdb lookup improvements, "
+"and a big SusiMail update.\n"
+"Of course, there's also the usual collection of bug fixes and translation"
+" updates."
msgstr ""
#: i2p2www/blog/2014/05/22/0.9.13-Release.rst:22
@@ -2048,7 +2221,9 @@ msgstr ""
#: i2p2www/blog/2014/05/22/0.9.13-Release.rst:42
msgid "Fix transition from not-firewalled to firewalled"
-msgstr "Corrige a transição de não-protegido por firewall para protegido por firewall"
+msgstr ""
+"Corrige a transição de não-protegido por firewall para protegido por "
+"firewall"
#: i2p2www/blog/2014/05/22/0.9.13-Release.rst:43
msgid "Fix plugin uninstall on Windows"
@@ -2099,7 +2274,10 @@ msgid ""
"==============\n"
"0.9.14 Release\n"
"=============="
-msgstr "=============================\nLançamento da versão 0.9.14\n============================="
+msgstr ""
+"=============================\n"
+"Lançamento da versão 0.9.14\n"
+"============================="
#: i2p2www/blog/2014/07/26/0.9.14-Release.rst:10
msgid "0.9.14 includes critical security fixes"
@@ -2107,24 +2285,30 @@ msgstr "0.9.14 inclui correções críticas de segurança"
#: i2p2www/blog/2014/07/26/0.9.14-Release.rst:12
msgid ""
-"0.9.14 includes critical fixes for XSS and remote execution vulnerabilities reported by Exodus Intelligence.\n"
-"As an added precaution, we have disabled several advanced configuration features in the router console,\n"
+"0.9.14 includes critical fixes for XSS and remote execution "
+"vulnerabilities reported by Exodus Intelligence.\n"
+"As an added precaution, we have disabled several advanced configuration "
+"features in the router console,\n"
"including installation of new plugins.\n"
"We plan to re-enable these in a future release after additional review."
msgstr ""
#: i2p2www/blog/2014/07/26/0.9.14-Release.rst:19
msgid ""
-"Due to I2P library changes, I2P-Bote users must upgrade their plugin to version 0.2.10 to work with I2P 0.9.14.\n"
-"Your router should update the plugin automatically after the router restarts."
+"Due to I2P library changes, I2P-Bote users must upgrade their plugin to "
+"version 0.2.10 to work with I2P 0.9.14.\n"
+"Your router should update the plugin automatically after the router "
+"restarts."
msgstr ""
#: i2p2www/blog/2014/07/26/0.9.14-Release.rst:24
msgid ""
-"The release also contains several bug fixes in i2ptunnel, i2psnark, and other areas,\n"
+"The release also contains several bug fixes in i2ptunnel, i2psnark, and "
+"other areas,\n"
"and updates to the latest Jetty, Tomcat, and Wrapper.\n"
"We've also implemented a faster and more secure method for reseeding.\n"
-"Of course, there's also the usual collection of minor bug fixes and translation updates."
+"Of course, there's also the usual collection of minor bug fixes and "
+"translation updates."
msgstr ""
#: i2p2www/blog/2014/07/26/0.9.14-Release.rst:31
@@ -2175,14 +2359,14 @@ msgstr ""
#: i2p2www/blog/2014/07/26/0.9.14-Release.rst:54
msgid ""
-"Several i2psnark improvements and fixes (GUI and DHT), including changes for"
-" better compatibility with Vuze"
+"Several i2psnark improvements and fixes (GUI and DHT), including changes "
+"for better compatibility with Vuze"
msgstr ""
#: i2p2www/blog/2014/07/26/0.9.14-Release.rst:59
msgid ""
-"Reseeding now fetches a signed zip file containing router infos for security"
-" and speed"
+"Reseeding now fetches a signed zip file containing router infos for "
+"security and speed"
msgstr ""
#: i2p2www/blog/2014/07/26/0.9.14-Release.rst:60
@@ -2195,8 +2379,8 @@ msgstr ""
#: i2p2www/blog/2014/07/26/0.9.14-Release.rst:62
msgid ""
-"Per-message reliabilitiy settings in I2CP and error propagation back from "
-"router to client"
+"Per-message reliabilitiy settings in I2CP and error propagation back from"
+" router to client"
msgstr ""
#: i2p2www/blog/2014/07/26/0.9.14-Release.rst:63
@@ -2220,7 +2404,10 @@ msgid ""
"================\n"
"0.9.14.1 Release\n"
"================"
-msgstr "=============================\nLançamento da versão 0.9.14.1\n============================="
+msgstr ""
+"=============================\n"
+"Lançamento da versão 0.9.14.1\n"
+"============================="
#: i2p2www/blog/2014/08/09/0.9.14.1-Release.rst:10
msgid "0.9.14.1 includes i2psnark and console fixes"
@@ -2228,23 +2415,33 @@ msgstr "0.9.14.1 inclui o i2psnark e correções no painel"
#: i2p2www/blog/2014/08/09/0.9.14.1-Release.rst:12
msgid ""
-"0.9.14.1 includes fixes for the \"Add Torrent\" form in i2psnark and some other web forms.\n"
-"We've restored the ability to install plugins via the console, but you must first edit your router.config file\n"
-"(in ~/.i2p/ or /var/lib/i2p/i2p-config/ or %APPDATA%\\I2P\\) to add the line routerconsole.enablePluginInstall=true.\n"
-"Other rarely-used advanced features that were removed in 0.9.14 may be restored by adding the line routerconsole.advanced=true."
+"0.9.14.1 includes fixes for the \"Add Torrent\" form in i2psnark and some"
+" other web forms.\n"
+"We've restored the ability to install plugins via the console, but you "
+"must first edit your router.config file\n"
+"(in ~/.i2p/ or /var/lib/i2p/i2p-config/ or %APPDATA%\\I2P\\) to add the "
+"line routerconsole.enablePluginInstall=true.\n"
+"Other rarely-used advanced features that were removed in 0.9.14 may be "
+"restored by adding the line routerconsole.advanced=true."
msgstr ""
#: i2p2www/blog/2014/08/09/0.9.14.1-Release.rst:19
msgid ""
-"As usual, if configured with the default \"Download and Verify\", the router will automatically download the update and display a button to restart.\n"
-"However, due to a bug in 0.9.14, if your update is configured for \"Notify only\", the download button will not be displayed.\n"
-"You must change your configuration to \"Download and Verify\" or \"Download, Verify, and Restart\" to update."
+"As usual, if configured with the default \"Download and Verify\", the "
+"router will automatically download the update and display a button to "
+"restart.\n"
+"However, due to a bug in 0.9.14, if your update is configured for "
+"\"Notify only\", the download button will not be displayed.\n"
+"You must change your configuration to \"Download and Verify\" or "
+"\"Download, Verify, and Restart\" to update."
msgstr ""
#: i2p2www/blog/2014/08/09/0.9.14.1-Release.rst:25
msgid ""
-"If you are still running 0.9.13 or older, we recommend that you update to this release as soon as possible.\n"
-"If you don't often check your router console, please consider changing your configuration to \"Download, Verify, and Restart\"\n"
+"If you are still running 0.9.13 or older, we recommend that you update to"
+" this release as soon as possible.\n"
+"If you don't often check your router console, please consider changing "
+"your configuration to \"Download, Verify, and Restart\"\n"
"to ensure you are always running the latest release."
msgstr ""
@@ -2288,7 +2485,10 @@ msgid ""
"==============================\n"
"The birth of Privacy Solutions\n"
"=============================="
-msgstr "===============================================\nO nascimento de SOLUÇÕES PARA PRIVACIDADE\n==============================================="
+msgstr ""
+"===============================================\n"
+"O nascimento de SOLUÇÕES PARA PRIVACIDADE\n"
+"==============================================="
#: i2p2www/blog/2014/08/15/The-privacy-solutions-project.rst:10
msgid "Organization launch"
@@ -2298,7 +2498,10 @@ msgstr ""
msgid ""
"Hello all!\n"
"\n"
-"Today we announce the Privacy Solutions project, a new organization that develops and maintains I2P software. Privacy Solutions includes several new development efforts designed to enhance the privacy, security, and anonymity for users, based on I2P protocols and technology.\n"
+"Today we announce the Privacy Solutions project, a new organization that "
+"develops and maintains I2P software. Privacy Solutions includes several "
+"new development efforts designed to enhance the privacy, security, and "
+"anonymity for users, based on I2P protocols and technology.\n"
"\n"
"These efforts include\n"
"\n"
@@ -2308,23 +2511,40 @@ msgid ""
"4) The Anoncoin crypto-coin project.\n"
"5) The Monero crypto-coin project.\n"
"\n"
-"Privacy Solutions' initial funding was provided by the supporters of the Anoncoin and Monero projects. Privacy Solutions is a Norway-based non-profit type of organization registered within the Norwegian government registers. ( Kind of like US 501(c)3. )\n"
+"Privacy Solutions' initial funding was provided by the supporters of the "
+"Anoncoin and Monero projects. Privacy Solutions is a Norway-based non-"
+"profit type of organization registered within the Norwegian government "
+"registers. ( Kind of like US 501(c)3. )\n"
"\n"
-"Privacy Solutions plans to apply for funding from the Norwegian goverment for network research, because of BigBrother (We'll get back to what that is) and the coins that are planned to use low-latency networks as primary transport layer. Our research will support advances in software technology for anonymity, security, and privacy.\n"
+"Privacy Solutions plans to apply for funding from the Norwegian goverment"
+" for network research, because of BigBrother (We'll get back to what that"
+" is) and the coins that are planned to use low-latency networks as "
+"primary transport layer. Our research will support advances in software "
+"technology for anonymity, security, and privacy.\n"
"\n"
"\n"
-"First a little bit about the Abscond Browser Bundle. This was first a one-man project by Meeh, but later on friends started sending patches, the project is now trying to create the same easy access to I2P as Tor has with their browser bundle. Our first release isn't far away, it's just some gitian script tasks left, including setup of the Apple toolchain. But again we will add monitoring with PROCESS_INFORMATION (A C struct keeping vital proces information about an process) from the Java instance to check on I2P before we declare it stable. I2pd will also switch with the Java version once it's ready, and there is no point in shipping a JRE in the bundle anymore. You can read more about the Abscond Browser Bundle at https://hideme.today/dev"
+"First a little bit about the Abscond Browser Bundle. This was first a "
+"one-man project by Meeh, but later on friends started sending patches, "
+"the project is now trying to create the same easy access to I2P as Tor "
+"has with their browser bundle. Our first release isn't far away, it's "
+"just some gitian script tasks left, including setup of the Apple "
+"toolchain. But again we will add monitoring with PROCESS_INFORMATION (A C"
+" struct keeping vital proces information about an process) from the Java "
+"instance to check on I2P before we declare it stable. I2pd will also "
+"switch with the Java version once it's ready, and there is no point in "
+"shipping a JRE in the bundle anymore. You can read more about the Abscond"
+" Browser Bundle at https://hideme.today/dev"
msgstr ""
#: i2p2www/blog/2014/08/15/The-privacy-solutions-project.rst:36
msgid ""
-"We would also like to inform of the current status of i2pd. I2pd supports "
-"bi-directional streaming now, that allows to use not only HTTP but long-"
-"lived communication channels. Instant IRC support has been added. I2pd users"
-" are able to use it same way as Java I2P for access to I2P IRC network. "
-"I2PTunnel is one of key features of I2P network, allowing non-I2P "
-"applications communicate transparently. That's why it's vital feature for "
-"i2pd and one of key milestones."
+"We would also like to inform of the current status of i2pd. I2pd supports"
+" bi-directional streaming now, that allows to use not only HTTP but long-"
+"lived communication channels. Instant IRC support has been added. I2pd "
+"users are able to use it same way as Java I2P for access to I2P IRC "
+"network. I2PTunnel is one of key features of I2P network, allowing non-"
+"I2P applications communicate transparently. That's why it's vital feature"
+" for i2pd and one of key milestones."
msgstr ""
#: i2p2www/blog/2014/08/15/The-privacy-solutions-project.rst:40
@@ -2333,17 +2553,18 @@ msgid ""
"Bigbrother.i2p, which is a metrics system Meeh made over a year back. "
"Recently we noticed that Meeh actually have 100Gb of non-duplicated data "
"from nodes reporting in since initial launch. This will also be moved to "
-"Privacy Solutions and be rewritten with a NSPOF backend. With this we will "
-"aslo start using the Graphite ( http://graphite.wikidot.com/screen-shots ). "
-"This will give us a great overview over the network without privacy issues "
-"for our end users. The clients filter all data except country, router hash "
-"and success rate on tunnel buildings. The name of this service is as always "
-"a little joke from Meeh."
+"Privacy Solutions and be rewritten with a NSPOF backend. With this we "
+"will aslo start using the Graphite ( http://graphite.wikidot.com/screen-"
+"shots ). This will give us a great overview over the network without "
+"privacy issues for our end users. The clients filter all data except "
+"country, router hash and success rate on tunnel buildings. The name of "
+"this service is as always a little joke from Meeh."
msgstr ""
#: i2p2www/blog/2014/08/15/The-privacy-solutions-project.rst:47
msgid ""
-"We have shorted down a bit of the news here, if you're interested in more information please visit https://blog.privacysolutions.no/\n"
+"We have shorted down a bit of the news here, if you're interested in more"
+" information please visit https://blog.privacysolutions.no/\n"
"We're still under construction and more content will come!\n"
"\n"
"\n"
@@ -2363,54 +2584,79 @@ msgid ""
"=============================================\n"
"Android test release on Google Play in Norway\n"
"============================================="
-msgstr "==========================================================\nLançada versão-teste para Android no Google Play Noruega\n=========================================================="
+msgstr ""
+"==========================================================\n"
+"Lançada versão-teste para Android no Google Play Noruega\n"
+"=========================================================="
#: i2p2www/blog/2014/08/23/Android-test-release-on-Google-Play-in-Norway.rst:10
msgid ""
-"I2P Android and Bote have been released on Google Play in Norway, as a test "
-"run for a future worldwide release."
+"I2P Android and Bote have been released on Google Play in Norway, as a "
+"test run for a future worldwide release."
msgstr ""
#: i2p2www/blog/2014/08/23/Android-test-release-on-Google-Play-in-Norway.rst:12
msgid ""
-"I2P Android has existed for over three years. In that time, it has evolved from\n"
-"a simple test project into a usable, useful Android port of the I2P router. Our\n"
-"eventual goal has been to release I2P Android on Google Play, to make it easier\n"
-"for users to discover, install and use I2P on their Android devices. After much\n"
-"work improving the user interface, fixing bugs and testing, we think that I2P\n"
+"I2P Android has existed for over three years. In that time, it has "
+"evolved from\n"
+"a simple test project into a usable, useful Android port of the I2P "
+"router. Our\n"
+"eventual goal has been to release I2P Android on Google Play, to make it "
+"easier\n"
+"for users to discover, install and use I2P on their Android devices. "
+"After much\n"
+"work improving the user interface, fixing bugs and testing, we think that"
+" I2P\n"
"Android is finally ready to go where the users are."
msgstr ""
#: i2p2www/blog/2014/08/23/Android-test-release-on-Google-Play-in-Norway.rst:21
msgid ""
-"Initially, we are only releasing to Android users in Norway, as a test run. I2P\n"
-"Android will have far more exposure on Google Play than it has ever had before,\n"
-"and there will be bugs and usability issues that we need to fix. It will be much\n"
-"easier (and less stressful!) to respond to feedback if we only need to deal with\n"
-"reports from hundreds of users instead of thousands (already orders of magnitude\n"
+"Initially, we are only releasing to Android users in Norway, as a test "
+"run. I2P\n"
+"Android will have far more exposure on Google Play than it has ever had "
+"before,\n"
+"and there will be bugs and usability issues that we need to fix. It will "
+"be much\n"
+"easier (and less stressful!) to respond to feedback if we only need to "
+"deal with\n"
+"reports from hundreds of users instead of thousands (already orders of "
+"magnitude\n"
"more feedback than we have ever had)."
msgstr ""
#: i2p2www/blog/2014/08/23/Android-test-release-on-Google-Play-in-Norway.rst:30
msgid ""
-"Simultaneously we are making the first public release of Bote, an Android port\n"
-"of `I2P-Bote`_. Bote is private, distributed, secure email, made easy. It runs\n"
-"on top of the I2P network, and while it works as a standalone app, it will use\n"
+"Simultaneously we are making the first public release of Bote, an Android"
+" port\n"
+"of `I2P-Bote`_. Bote is private, distributed, secure email, made easy. It"
+" runs\n"
+"on top of the I2P network, and while it works as a standalone app, it "
+"will use\n"
"the I2P Android app by default if installed. As with I2P Android, we are\n"
"initially only releasing Bote to Android users in Norway."
msgstr ""
#: i2p2www/blog/2014/08/23/Android-test-release-on-Google-Play-in-Norway.rst:38
msgid ""
-"The apps are being released on Google Play by `The Privacy Solutions Project`_.\n"
-"See their `blog post`_ for further information, and links to the Google Play\n"
+"The apps are being released on Google Play by `The Privacy Solutions "
+"Project`_.\n"
+"See their `blog post`_ for further information, and links to the Google "
+"Play\n"
"page for Norway users."
-msgstr "Os aplicativos estão sendo lançados no Google Play pelo `Projeto SOLUÇÕES PARA PRIVACIDADE`_.\nVeja a `postagem no blog` correlata para informações adicionais e linques para a página do Google Play\ndirecionada a usuários noruegueses."
+msgstr ""
+"Os aplicativos estão sendo lançados no Google Play pelo `Projeto SOLUÇÕES"
+" PARA PRIVACIDADE`_.\n"
+"Veja a `postagem no blog` correlata para informações adicionais e linques"
+" para a página do Google Play\n"
+"direcionada a usuários noruegueses."
#: i2p2www/blog/2014/08/23/Android-test-release-on-Google-Play-in-Norway.rst:44
msgid ""
-"As lead developer for I2P Android and Bote, I look forward to your comments. You\n"
-"are the people who will be using them, and your perspectives will help me craft\n"
+"As lead developer for I2P Android and Bote, I look forward to your "
+"comments. You\n"
+"are the people who will be using them, and your perspectives will help me"
+" craft\n"
"simple, intuitive apps that make privacy accessible to everyone."
msgstr ""
@@ -2428,22 +2674,28 @@ msgstr ""
#: i2p2www/blog/2014/08/23/Android-test-release-on-Google-Play-in-Norway.rst:56
msgid ""
-"We have also updated I2P Android on the website to match the release candidate\n"
-"deployed in Norway. This version will be updated with changes as we respond to\n"
+"We have also updated I2P Android on the website to match the release "
+"candidate\n"
+"deployed in Norway. This version will be updated with changes as we "
+"respond to\n"
"feedback from Norwegian users, heading towards our next stable release."
msgstr ""
#: i2p2www/blog/2014/08/23/Android-test-release-on-Google-Play-in-Norway.rst:62
msgid ""
-"Please note that we have upgraded the Android API to 9. This means that Froyo\n"
-"Android 2.2 will not be supported anymore; the minimum requirement is now\n"
+"Please note that we have upgraded the Android API to 9. This means that "
+"Froyo\n"
+"Android 2.2 will not be supported anymore; the minimum requirement is now"
+"\n"
"Gingerbread Android 2.3."
msgstr ""
#: i2p2www/blog/2014/08/23/Android-test-release-on-Google-Play-in-Norway.rst:68
msgid ""
-"Also note that if you have an earlier version of I2P Android, you will need to\n"
-"uninstall and reinstall because we have changed the release keys. Further\n"
+"Also note that if you have an earlier version of I2P Android, you will "
+"need to\n"
+"uninstall and reinstall because we have changed the release keys. Further"
+"\n"
"information about this will be provided in a subsequent blog post."
msgstr ""
@@ -2452,7 +2704,10 @@ msgid ""
"==============\n"
"0.9.15 Release\n"
"=============="
-msgstr "=============================\nLançamento da versão 0.9.15\n============================="
+msgstr ""
+"=============================\n"
+"Lançamento da versão 0.9.15\n"
+"============================="
#: i2p2www/blog/2014/09/20/0.9.15-Release.rst:10
msgid "0.9.15 includes Ed25519 crypto and many fixes"
@@ -2461,23 +2716,31 @@ msgstr ""
#: i2p2www/blog/2014/09/20/0.9.15-Release.rst:12
msgid ""
"0.9.15 adds preliminary support for Ed25519 EdDSA signatures.\n"
-"It includes a new persistent configuration backend for i2psnark and fixes several issues with i2psnark's handling of file names.\n"
+"It includes a new persistent configuration backend for i2psnark and fixes"
+" several issues with i2psnark's handling of file names.\n"
"There are several improvements to speed up SAM.\n"
"Plugins now support stronger signatures in the su3 file format.\n"
-"Plugin installation via the console, which was disabled in 0.9.14, is re-enabled."
+"Plugin installation via the console, which was disabled in 0.9.14, is re-"
+"enabled."
msgstr ""
#: i2p2www/blog/2014/09/20/0.9.15-Release.rst:20
msgid ""
-"We have supported ECDSA signatures since 0.9.12, and we would like to start using ECDSA by default.\n"
-"Unfortunately, some of you are still running older I2P versions, and for others,\n"
+"We have supported ECDSA signatures since 0.9.12, and we would like to "
+"start using ECDSA by default.\n"
+"Unfortunately, some of you are still running older I2P versions, and for "
+"others,\n"
"their distribution or Java runtime does not support ECDSA. Red Hat\n"
"(RHEL, Fedora) distributions are reported to be missing ECDSA.\n"
"Some have fixed the Java issues by upgrading from Java 6 to Java 7;\n"
-"others have had success with installing the \"unlimited strength policy files\".\n"
-"We've added information about missing crypto to the log file and the /logs page in the console.\n"
-"After you update to 0.9.15, please check if you are missing ECDSA support, and attempt to fix it if necessary.\n"
-"This is particularly important for those that run popular eepsites and services."
+"others have had success with installing the \"unlimited strength policy "
+"files\".\n"
+"We've added information about missing crypto to the log file and the "
+"/logs page in the console.\n"
+"After you update to 0.9.15, please check if you are missing ECDSA "
+"support, and attempt to fix it if necessary.\n"
+"This is particularly important for those that run popular eepsites and "
+"services."
msgstr ""
#: i2p2www/blog/2014/09/20/0.9.15-Release.rst:41
@@ -2553,8 +2816,8 @@ msgstr ""
#: i2p2www/blog/2014/09/20/0.9.15-Release.rst:67
msgid ""
-"i2ptunnel add support for local SSL connections for standard and IRC client "
-"tunnels"
+"i2ptunnel add support for local SSL connections for standard and IRC "
+"client tunnels"
msgstr ""
#: i2p2www/blog/2014/09/20/0.9.15-Release.rst:68
@@ -2580,7 +2843,10 @@ msgid ""
"==============\n"
"0.9.16 Release\n"
"=============="
-msgstr "=============================\nLançamento da versão 0.9.16\n============================="
+msgstr ""
+"=============================\n"
+"Lançamento da versão 0.9.16\n"
+"============================="
#: i2p2www/blog/2014/11/01/0.9.16-Release.rst:10
msgid "0.9.16 includes crypto migration and many fixes"
@@ -2591,21 +2857,26 @@ msgid ""
"0.9.16 is a significant step forward in our plan to migrate\n"
"from DSA to ECDSA and then EdDSA cryptographic signatures,\n"
"and makes several other changes to increase your anonymity and security.\n"
-"Client tunnels for standard, IRC, and SOCKS IRC will use ECDSA signatures by default.\n"
-"In addition, we've fixed a large number of serious bugs, including console lockups."
+"Client tunnels for standard, IRC, and SOCKS IRC will use ECDSA signatures"
+" by default.\n"
+"In addition, we've fixed a large number of serious bugs, including "
+"console lockups."
msgstr ""
#: i2p2www/blog/2014/11/01/0.9.16-Release.rst:20
msgid ""
-"Changes in router data structures will require i2pcontrol plugin users to "
-"update to version 0.0.9."
+"Changes in router data structures will require i2pcontrol plugin users to"
+" update to version 0.0.9."
msgstr ""
#: i2p2www/blog/2014/11/01/0.9.16-Release.rst:24
msgid ""
-"If you run an eepsite or a service and you are not running a recent release,\n"
-"or your Java or OS does not support ECDSA (as noted in the logs and on the /logs page in the console),\n"
-"please fix the issue as soon as possible or your users will soon be unable to connect."
+"If you run an eepsite or a service and you are not running a recent "
+"release,\n"
+"or your Java or OS does not support ECDSA (as noted in the logs and on "
+"the /logs page in the console),\n"
+"please fix the issue as soon as possible or your users will soon be "
+"unable to connect."
msgstr ""
#: i2p2www/blog/2014/11/01/0.9.16-Release.rst:41
@@ -2618,8 +2889,8 @@ msgstr ""
#: i2p2www/blog/2014/11/01/0.9.16-Release.rst:43
msgid ""
-"Require I2CP authorization for all messages when enabled (requires 0.9.11 or"
-" higher client)"
+"Require I2CP authorization for all messages when enabled (requires 0.9.11"
+" or higher client)"
msgstr ""
#: i2p2www/blog/2014/11/01/0.9.16-Release.rst:44
@@ -2638,8 +2909,8 @@ msgstr ""
#: i2p2www/blog/2014/11/01/0.9.16-Release.rst:47
msgid ""
-"New column sorting, set-all priority buttons, and upload ratio display in "
-"i2psnark"
+"New column sorting, set-all priority buttons, and upload ratio display in"
+" i2psnark"
msgstr ""
#: i2p2www/blog/2014/11/01/0.9.16-Release.rst:48
@@ -2700,14 +2971,14 @@ msgstr ""
#: i2p2www/blog/2014/11/01/0.9.16-Release.rst:70
msgid ""
-"Move router data structures from i2p.jar to router.jar (breaks i2pcontrol "
-"plugin)"
+"Move router data structures from i2p.jar to router.jar (breaks i2pcontrol"
+" plugin)"
msgstr ""
#: i2p2www/blog/2014/11/01/0.9.16-Release.rst:71
msgid ""
-"New router keys now stored in router.keys.dat (eepPriv.dat format) instead "
-"of router.keys"
+"New router keys now stored in router.keys.dat (eepPriv.dat format) "
+"instead of router.keys"
msgstr ""
#: i2p2www/blog/2014/11/01/0.9.16-Release.rst:72
@@ -2742,9 +3013,11 @@ msgstr ""
#: i2p2www/blog/2014/11/01/0.9.16-Release.rst:79
msgid ""
-"Change eepsite Jetty threadpool and queue configuration (new installs only)"
+"Change eepsite Jetty threadpool and queue configuration (new installs "
+"only)"
msgstr ""
#: i2p2www/blog/2014/11/01/0.9.16-Release.rst:80
msgid "NTCP establishment refactoring in prep for NTCP2 and PT"
msgstr ""
+
diff --git a/i2p2www/translations/pt_BR/LC_MESSAGES/docs.po b/i2p2www/translations/pt_BR/LC_MESSAGES/docs.po
index 27546ff3..8b99f1c1 100644
--- a/i2p2www/translations/pt_BR/LC_MESSAGES/docs.po
+++ b/i2p2www/translations/pt_BR/LC_MESSAGES/docs.po
@@ -1,7 +1,7 @@
-# Translations template for I2P.
+# Portuguese (Brazil) translations for I2P.
# Copyright (C) 2014 ORGANIZATION
# This file is distributed under the same license as the I2P project.
-#
+#
# Translators:
# blueboy, 2013
# blueboy, 2014
@@ -10,18 +10,18 @@
# Victor Maximiliano http://i2p-projekt.i2p/hosts.txt (http://udhdrtrcetjm5sxzskjyr5ztpeszydbh4dpl3pl4utgqqw2v4jna.b32.i2p/hosts.txt)
, \n"
+"default is http://i2p-projekt.i2p/hosts.txt "
+"(http://udhdrtrcetjm5sxzskjyr5ztpeszydbh4dpl3pl4utgqqw2v4jna.b32.i2p/hosts.txt)
,"
+" \n"
"which contains a copy of the hosts.txt included\n"
"in the I2P release.\n"
"Users must configure additional subscriptions in their\n"
-"local addressbook application (via subscriptions.txt or SusiDNS)."
+"local addressbook application (via subscriptions.txt or SusiDNS)."
msgstr ""
#: i2p2www/pages/site/docs/naming.html:211
@@ -807,7 +902,8 @@ msgstr ""
#: i2p2www/pages/site/docs/naming.html:218
msgid ""
-"The operators of these services may have various policies for listing hosts.\n"
+"The operators of these services may have various policies for listing "
+"hosts.\n"
"Presence on this list does not imply endorsement."
msgstr ""
@@ -818,10 +914,12 @@ msgstr "Regras de atribuição de nomes"
#: i2p2www/pages/site/docs/naming.html:224
msgid ""
-"While there are hopefully not any technical limitations within I2P on host names,\n"
+"While there are hopefully not any technical limitations within I2P on "
+"host names,\n"
"the addressbook enforces several restrictions on host names\n"
"imported from subscriptions.\n"
-"It does this for basic typographical sanity and compatibility with browsers,\n"
+"It does this for basic typographical sanity and compatibility with "
+"browsers,\n"
"and for security.\n"
"The rules are essentially the same as those in RFC2396 Section 3.2.2.\n"
"Any hostnames violating these rules may not be propagated\n"
@@ -834,13 +932,13 @@ msgstr ""
#: i2p2www/pages/site/docs/naming.html:243
msgid ""
-"Names are checked for conflict with existing names in the existing userhosts.txt and hosts.txt\n"
+"Names are checked for conflict with existing names in the existing "
+"userhosts.txt and hosts.txt\n"
"(but not privatehosts.txt) after conversion to lower case."
msgstr ""
#: i2p2www/pages/site/docs/naming.html:248
-msgid ""
-"Must contain only [a-z] [0-9] '.' and '-' after conversion to lower case."
+msgid "Must contain only [a-z] [0-9] '.' and '-' after conversion to lower case."
msgstr "Deve conter apenas [a-z] [0-9] '.' e '-' após conversão para caixa baixa"
#: i2p2www/pages/site/docs/naming.html:252
@@ -876,8 +974,12 @@ msgstr ""
#: i2p2www/pages/site/docs/naming.html:280
msgid ""
"Certain hostnames reserved for project use are not allowed\n"
-"(proxy.i2p, router.i2p, console.i2p, *.proxy.i2p, *.router.i2p, *.console.i2p, and others)"
-msgstr "Alguns nomes de hosts reservados para uso do projeto não são permitidos\n(proxy.i2p, router.i2p, console.i2p, *.proxy.i2p, *.router.i2p, *.console.i2p, and others)"
+"(proxy.i2p, router.i2p, console.i2p, *.proxy.i2p, *.router.i2p, "
+"*.console.i2p, and others)"
+msgstr ""
+"Alguns nomes de hosts reservados para uso do projeto não são permitidos\n"
+"(proxy.i2p, router.i2p, console.i2p, *.proxy.i2p, *.router.i2p, "
+"*.console.i2p, and others)"
#: i2p2www/pages/site/docs/naming.html:285
msgid "Keys are checked for base64 validity."
@@ -899,8 +1001,8 @@ msgstr ""
#: i2p2www/pages/site/docs/naming.html:302
msgid ""
-"Any name received via subscription that passes all the checks is added via "
-"the local naming service."
+"Any name received via subscription that passes all the checks is added "
+"via the local naming service."
msgstr ""
#: i2p2www/pages/site/docs/naming.html:306
@@ -917,15 +1019,19 @@ msgstr ""
#: i2p2www/pages/site/docs/naming.html:317
msgid ""
-"International Domain Names (IDN) also work in i2p (using punycode 'xn--' form).\n"
-"To see IDN .i2p domain names rendered correctly in Firefox's location bar,\n"
+"International Domain Names (IDN) also work in i2p (using punycode 'xn--' "
+"form).\n"
+"To see IDN .i2p domain names rendered correctly in Firefox's location "
+"bar,\n"
"add 'network.IDN.whitelist.i2p (boolean) = true' in about:config."
msgstr ""
#: i2p2www/pages/site/docs/naming.html:323
msgid ""
-"As the addressbook application does not use privatehosts.txt at all, in practice\n"
-"this file is the only place where it is appropriate to place private aliases or\n"
+"As the addressbook application does not use privatehosts.txt at all, in "
+"practice\n"
+"this file is the only place where it is appropriate to place private "
+"aliases or\n"
"\"pet names\" for sites already in hosts.txt."
msgstr ""
@@ -936,14 +1042,16 @@ msgstr ""
#: i2p2www/pages/site/docs/naming.html:330
msgid ""
"Addressbook will publish the merged hosts.txt to a location\n"
-"(traditionally hosts.txt in the local eepsite's home directory) to be accessed by others\n"
+"(traditionally hosts.txt in the local eepsite's home directory) to be "
+"accessed by others\n"
"for their subscriptions.\n"
"This step is optional and is disabled by default."
msgstr ""
#: i2p2www/pages/site/docs/naming.html:338
msgid ""
-"The addressbook application, together with eepget, saves the Etag and/or Last-Modified\n"
+"The addressbook application, together with eepget, saves the Etag and/or "
+"Last-Modified\n"
"information returned by the web server of the subscription.\n"
"This greatly reduces the bandwidth required, as the web server will\n"
"return a '304 Not Modified' on the next fetch if nothing has changed."
@@ -960,7 +1068,8 @@ msgid ""
"Hosts serving a static hosts.txt or an equivalent CGI application\n"
"are strongly encouraged to deliver\n"
"a Content-Length header, and either an Etag or Last-Modified header.\n"
-"Also ensure that the server delivers a '304 Not Modified' when appropriate.\n"
+"Also ensure that the server delivers a '304 Not Modified' when "
+"appropriate.\n"
"This will dramatically reduce the network bandwidth, and\n"
"reduce chances of corruption."
msgstr ""
@@ -971,7 +1080,8 @@ msgstr ""
#: i2p2www/pages/site/docs/naming.html:360
msgid ""
-"A host add service is a simple CGI application that takes a hostname and a Base64 key as parameters\n"
+"A host add service is a simple CGI application that takes a hostname and "
+"a Base64 key as parameters\n"
"and adds that to its local hosts.txt.\n"
"If other routers subscribe to that hosts.txt, the new hostname/key\n"
"will be propagated through the network."
@@ -979,8 +1089,10 @@ msgstr ""
#: i2p2www/pages/site/docs/naming.html:367
msgid ""
-"It is recommended that host add services impose, at a minimum, the restrictions imposed by the addressbook application listed above.\n"
-"Host add services may impose additional restrictions on hostnames and keys, for example:"
+"It is recommended that host add services impose, at a minimum, the "
+"restrictions imposed by the addressbook application listed above.\n"
+"Host add services may impose additional restrictions on hostnames and "
+"keys, for example:"
msgstr ""
#: i2p2www/pages/site/docs/naming.html:372
@@ -1009,7 +1121,9 @@ msgstr "Reserva ou rejeição de determinados nomes de hosts."
#: i2p2www/pages/site/docs/naming.html:396
msgid "Restrictions on the number of names registered in a given time period."
-msgstr "Restrições quanto ao número de nomes registrados em um dado período de tempo."
+msgstr ""
+"Restrições quanto ao número de nomes registrados em um dado período de "
+"tempo."
#: i2p2www/pages/site/docs/naming.html:400
msgid "Delays between registration and publication."
@@ -1033,8 +1147,10 @@ msgstr "Serviços de saltos"
#: i2p2www/pages/site/docs/naming.html:418
msgid ""
-"A jump service is a simple CGI application that takes a hostname as a parameter\n"
-"and returns a 301 redirect to the proper URL with a ?i2paddresshelper=key
\n"
+"A jump service is a simple CGI application that takes a hostname as a "
+"parameter\n"
+"and returns a 301 redirect to the proper URL with a "
+"?i2paddresshelper=key
\n"
"string appended.\n"
"The HTTP proxy will interpret the appended string and\n"
"use that key as the actual destination.\n"
@@ -1057,14 +1173,16 @@ msgstr ""
#: i2p2www/pages/site/docs/naming.html:440
msgid ""
-"SusiDNS is simply a web interface front-end to configuring addressbook subscriptions\n"
+"SusiDNS is simply a web interface front-end to configuring addressbook "
+"subscriptions\n"
"and accessing the four addressbook files.\n"
"All the real work is done by the 'addressbook' application."
msgstr ""
#: i2p2www/pages/site/docs/naming.html:446
msgid ""
-"Currently, there is little enforcement of addressbook naming rules within SusiDNS,\n"
+"Currently, there is little enforcement of addressbook naming rules within"
+" SusiDNS,\n"
"so a user may enter hostnames locally that would be rejected by\n"
"the addressbook subscription rules."
msgstr ""
@@ -1078,29 +1196,36 @@ msgid ""
"I2P supports Base32 hostnames similar to Tor's .onion addresses.\n"
"Base32 addresses are much shorter and easier to handle than the\n"
"full 516-character Base64 Destinations or addresshelpers.\n"
-"Example: ukeu3k5oycgaauneqgtnvselmt4yemvoilkln7jpvamvfx7dnkdq.b32.i2p
"
+"Example: "
+"ukeu3k5oycgaauneqgtnvselmt4yemvoilkln7jpvamvfx7dnkdq.b32.i2p
"
msgstr ""
#: i2p2www/pages/site/docs/naming.html:460
#, python-format
msgid ""
-"In Tor, the address is 16 characters (80 bits), or half of the SHA-1 hash.\n"
+"In Tor, the address is 16 characters (80 bits), or half of the SHA-1 "
+"hash.\n"
"I2P uses 52 characters (256 bits) to represent the full SHA-256 hash.\n"
"The form is {52 chars}.b32.i2p.\n"
"Tor has recently published a\n"
-"proposal\n"
-"to convert to an identical format of {52 chars}.onion for their hidden services.\n"
+"proposal\n"
+"to convert to an identical format of {52 chars}.onion for their hidden "
+"services.\n"
"Base32 is implemented in the naming service, which queries the\n"
"router over I2CP to lookup the LeaseSet to get the full Destination.\n"
-"Base32 lookups will only be successful when the Destination is up and publishing\n"
+"Base32 lookups will only be successful when the Destination is up and "
+"publishing\n"
"a LeaseSet.\n"
-"Because resolution may require a network database lookup, it may take significantly\n"
+"Because resolution may require a network database lookup, it may take "
+"significantly\n"
"longer than a local address book lookup."
msgstr ""
#: i2p2www/pages/site/docs/naming.html:475
msgid ""
-"Base32 addresses can be used in most places where hostnames or full destinations\n"
+"Base32 addresses can be used in most places where hostnames or full "
+"destinations\n"
"are used, however there are some exceptions where they may fail if the\n"
"name does not immediately resolve. I2PTunnel will fail, for example, if\n"
"the name does not resolve to a destination."
@@ -1127,7 +1252,8 @@ msgstr ""
#: i2p2www/pages/site/docs/plugins.html:12
msgid ""
-"There are now plugins available that support distributed email, blogs, IRC\n"
+"There are now plugins available that support distributed email, blogs, "
+"IRC\n"
"clients, distributed file storage, wikis, and more."
msgstr ""
@@ -1147,7 +1273,8 @@ msgstr ""
#: i2p2www/pages/site/docs/plugins.html:31
msgid ""
-"Support large or special-purpose applications that would never be bundled\n"
+"Support large or special-purpose applications that would never be bundled"
+"\n"
"with the I2P installation"
msgstr ""
@@ -1161,8 +1288,8 @@ msgstr "Atualizações automática de aplicações, tal como para o roteador"
#: i2p2www/pages/site/docs/plugins.html:44
msgid ""
-"Separate initial install and update packages, if desired, for smaller update"
-" downloads"
+"Separate initial install and update packages, if desired, for smaller "
+"update downloads"
msgstr ""
#: i2p2www/pages/site/docs/plugins.html:48
@@ -1192,8 +1319,7 @@ msgid ""
msgstr ""
#: i2p2www/pages/site/docs/plugins.html:70
-msgid ""
-"Automatic integration and startup of webapps into console Jetty instance"
+msgid "Automatic integration and startup of webapps into console Jetty instance"
msgstr ""
#: i2p2www/pages/site/docs/plugins.html:74
@@ -1233,21 +1359,32 @@ msgstr "Instalação"
#: i2p2www/pages/site/docs/plugins.html:101
msgid ""
-"To install and start a plugin, copy the .xpi2p
install link to\n"
+"To install and start a plugin, copy the .xpi2p
install link "
+"to\n"
"the form at the bottom of\n"
-"configclients.jsp in\n"
-"your router console and click the \"install plugin\" button. After a\n"
-"plugin is installed and started, a link to the plugin will usually appear at\n"
+"configclients.jsp"
+" in\n"
+"your router console and click the \"install plugin\" button. After a"
+"\n"
+"plugin is installed and started, a link to the plugin will usually appear"
+" at\n"
"the top of your summary bar."
msgstr ""
#: i2p2www/pages/site/docs/plugins.html:110
msgid ""
-"To update a plugin to the latest version, just click the update button on\n"
-"configclients.jsp.\n"
-"There is also a button to check if the plugin has a more recent version, as\n"
-"well as a button to check for updates for all plugins. Plugins will be checked\n"
-"for updates automatically when updating to a new I2P release (not including dev\n"
+"To update a plugin to the latest version, just click the update button on"
+"\n"
+"configclients.jsp."
+"\n"
+"There is also a button to check if the plugin has a more recent version, "
+"as\n"
+"well as a button to check for updates for all plugins. Plugins will be "
+"checked\n"
+"for updates automatically when updating to a new I2P release (not "
+"including dev\n"
"builds)."
msgstr ""
@@ -1258,21 +1395,25 @@ msgstr "Desenvolvimento"
#: i2p2www/pages/site/docs/plugins.html:121
#, python-format
msgid ""
-"See the latest plugin specification and the\n"
+"See the latest plugin specification and "
+"the\n"
"plugin forum on %(zzz)s."
msgstr ""
#: i2p2www/pages/site/docs/plugins.html:126
#, python-format
msgid ""
-"See also the sources for plugins developed by various people. Some plugins, such\n"
-"as snowman, were developed\n"
+"See also the sources for plugins developed by various people. Some "
+"plugins, such\n"
+"as snowman, were "
+"developed\n"
"specifically as examples."
msgstr ""
#: i2p2www/pages/site/docs/plugins.html:132
msgid ""
-"Developers wanted! Plugins are a great way to learn more about I2P\n"
+"Developers wanted! Plugins are a great way to learn more about I2P"
+"\n"
"or easily add some feature."
msgstr ""
@@ -1284,7 +1425,8 @@ msgstr "Primeiros passos"
#, python-format
msgid ""
"To create a plugin from an existing binary package you will need to get\n"
-"makeplugin.sh from the i2p.scripts branch in monotone."
+"makeplugin.sh from the i2p.scripts branch in "
+"monotone."
msgstr ""
#: i2p2www/pages/site/docs/plugins.html:144
@@ -1300,7 +1442,8 @@ msgstr ""
#: i2p2www/pages/site/docs/plugins.html:151
msgid ""
"Updates of a plugin with included jars (not wars) won't be recognized if\n"
-"the plugin was already run, as it requires class loader trickery to flush the\n"
+"the plugin was already run, as it requires class loader trickery to flush"
+" the\n"
"class cache; a full router restart is required."
msgstr ""
@@ -1310,27 +1453,35 @@ msgstr ""
#: i2p2www/pages/site/docs/plugins.html:161
msgid ""
-"Plugins running in a separate JVM create a logs/
directory in\n"
+"Plugins running in a separate JVM create a logs/
directory "
+"in\n"
+"$CWD
."
+msgstr ""
+"Extensões rodando em Máquina Virtual Java separada criam um diretório de "
+"registros/
em\n"
"$CWD
."
-msgstr "Extensões rodando em Máquina Virtual Java separada criam um diretório de registros/
em\n$CWD
."
#: i2p2www/pages/site/docs/plugins.html:166
msgid ""
-"No initial keys are present, except for those of jrandom and zzz (using the\n"
+"No initial keys are present, except for those of jrandom and zzz (using "
+"the\n"
"same keys as for router update), so the first key seen for a signer is\n"
"automatically accepted—there is no signing key authority."
msgstr ""
#: i2p2www/pages/site/docs/plugins.html:172
msgid ""
-"When deleting a plugin, the directory is not always deleted, especially on\n"
+"When deleting a plugin, the directory is not always deleted, especially "
+"on\n"
"Windows."
msgstr ""
#: i2p2www/pages/site/docs/plugins.html:177
msgid ""
-"Installing a plugin requiring Java 1.6 on a Java 1.5 machine will result in a\n"
-"\"plugin is corrupt\" message if pack200 compression of the plugin file is used."
+"Installing a plugin requiring Java 1.6 on a Java 1.5 machine will result "
+"in a\n"
+"\"plugin is corrupt\" message if pack200 compression of the plugin file "
+"is used."
msgstr ""
#: i2p2www/pages/site/docs/plugins.html:182
@@ -1351,7 +1502,8 @@ msgstr "Maio de 2013"
#: i2p2www/pages/site/docs/ports.html:7
msgid ""
-"These are the ports used or reserved by I2P, including those for known plugins,\n"
+"These are the ports used or reserved by I2P, including those for known "
+"plugins,\n"
"common alternates,\n"
"and some typical related applications."
msgstr ""
@@ -1405,7 +1557,8 @@ msgstr ""
msgid ""
"BOB does not hold keypair values, nor does the router.\n"
"Your application holds the keypair values. \n"
-"This is to reduce any extra complexity in the router code, it also adds to\n"
+"This is to reduce any extra complexity in the router code, it also adds "
+"to\n"
"your privacy."
msgstr ""
@@ -1428,25 +1581,27 @@ msgstr ""
#: i2p2www/pages/site/docs/api/bob.html:48
msgid ""
"ERROR
as is implied returns the message \"ERROR "
-"\"+DESCRIPTION+\"\\n\"
, where the DESCRIPTION
is what "
-"went wrong."
+"\"+DESCRIPTION+\"\\n\", where the DESCRIPTION
is what"
+" went wrong."
msgstr ""
#: i2p2www/pages/site/docs/api/bob.html:51
msgid ""
-"OK
returns \"OK\"
, and if data is to be returned, "
-"it is on the same line. OK
means the command is finished."
+"OK
returns \"OK\"
, and if data is to be "
+"returned, it is on the same line. OK
means the command is "
+"finished."
msgstr ""
#: i2p2www/pages/site/docs/api/bob.html:54
msgid ""
-"DATA
lines contain information that you requested. There may be"
-" multiple DATA
lines per request."
+"DATA
lines contain information that you requested. There may"
+" be multiple DATA
lines per request."
msgstr ""
#: i2p2www/pages/site/docs/api/bob.html:58
msgid ""
-"NOTE: The help command is the ONLY command that has an exception to\n"
+"NOTE: The help command is the ONLY command that has an exception "
+"to\n"
"the rules... it can actually return nothing! This is intentional, since\n"
"help is a HUMAN and not an APPLICATION command."
msgstr ""
@@ -1454,14 +1609,16 @@ msgstr ""
#: i2p2www/pages/site/docs/api/bob.html:64
msgid ""
"PLEASE NOTE:\n"
-"For CURRENT details on the commands PLEASE use the built-in help command. \n"
-"Just telnet to localhost 2827 and type help and you can get full documentation on each command."
+"For CURRENT details on the commands PLEASE use the built-in help command."
+" \n"
+"Just telnet to localhost 2827 and type help and you can get full "
+"documentation on each command."
msgstr ""
#: i2p2www/pages/site/docs/api/bob.html:70
msgid ""
-"Commands never get obsoleted or changed, however new commands do get added "
-"from time to time."
+"Commands never get obsoleted or changed, however new commands do get "
+"added from time to time."
msgstr ""
#: i2p2www/pages/site/docs/api/bob.html:74
@@ -1482,30 +1639,46 @@ msgstr ""
#: i2p2www/pages/site/docs/api/bob.html:106
msgid ""
-"Once set up, all TCP sockets can and will block as needed, and there is no need for any \n"
-"additional messages to/from the command channel. This allows the router to pace the\n"
-"stream without exploding with OOM like SAM does as it chokes on attempting to shove \n"
-"many streams in or out one socket -- that can't scale when you have alot of connections!"
+"Once set up, all TCP sockets can and will block as needed, and there is "
+"no need for any \n"
+"additional messages to/from the command channel. This allows the router "
+"to pace the\n"
+"stream without exploding with OOM like SAM does as it chokes on "
+"attempting to shove \n"
+"many streams in or out one socket -- that can't scale when you have alot "
+"of connections!"
msgstr ""
#: i2p2www/pages/site/docs/api/bob.html:113
msgid ""
-"What is also nice about this particular interface is that writing anything to interface \n"
-"to it, is much much easier than SAM. There is no other processing to do after the set up.\n"
-"It's configuration is so simple, that very simple tools, such as nc (netcat) can be used \n"
-"to point to some application. The value there is that one could schedule up and down times \n"
-"for an application, and not have to change the application to do that, or to even have \n"
-"to stop that application. Instead, you can literally \"unplug\" the destination, and \n"
-"\"plug it in\" again. As long as the same IP/port addresses and destination keys are used \n"
-"when bringing the bridge up, the normal TCP application won't care, and won't notice.\n"
-"It will simply be fooled -- the destinations are not reachable, and that nothing is coming in."
+"What is also nice about this particular interface is that writing "
+"anything to interface \n"
+"to it, is much much easier than SAM. There is no other processing to do "
+"after the set up.\n"
+"It's configuration is so simple, that very simple tools, such as nc "
+"(netcat) can be used \n"
+"to point to some application. The value there is that one could schedule "
+"up and down times \n"
+"for an application, and not have to change the application to do that, or"
+" to even have \n"
+"to stop that application. Instead, you can literally \"unplug\" the "
+"destination, and \n"
+"\"plug it in\" again. As long as the same IP/port addresses and "
+"destination keys are used \n"
+"when bringing the bridge up, the normal TCP application won't care, and "
+"won't notice.\n"
+"It will simply be fooled -- the destinations are not reachable, and that "
+"nothing is coming in."
msgstr ""
#: i2p2www/pages/site/docs/api/bob.html:125
msgid ""
-"For the following example, we'll setup a very simple local loopback connection, \n"
-"with two destinations. Destination \"mouth\" will be the CHARGEN service from \n"
-"the INET superserver daemon. Destination \"ear\" will be a local port that you\n"
+"For the following example, we'll setup a very simple local loopback "
+"connection, \n"
+"with two destinations. Destination \"mouth\" will be the CHARGEN service "
+"from \n"
+"the INET superserver daemon. Destination \"ear\" will be a local port "
+"that you\n"
"can telnet into, and watch the pretty ASCII test puke forth."
msgstr ""
@@ -1554,28 +1727,30 @@ msgstr ""
#: i2p2www/pages/site/docs/api/bob.html:158
msgid ""
-"At this point, there was no error, a destination with a nickname of \"mouth\" \n"
-"is set up. When you contact the destination provided, you actually connect \n"
+"At this point, there was no error, a destination with a nickname of "
+"\"mouth\" \n"
+"is set up. When you contact the destination provided, you actually "
+"connect \n"
"to the CHARGEN
service on 19/TCP
."
msgstr ""
#: i2p2www/pages/site/docs/api/bob.html:164
-msgid ""
-"Now for the other half, so that we can actually contact this destination."
+msgid "Now for the other half, so that we can actually contact this destination."
msgstr ""
#: i2p2www/pages/site/docs/api/bob.html:184
msgid ""
"Now all we need to do is telnet into 127.0.0.1, port 37337,\n"
-"send the destination key or host address from addressbook we want to contact.\n"
+"send the destination key or host address from addressbook we want to "
+"contact.\n"
"In this case, we want to contact \"mouth\", all we do is paste in the\n"
"key and it goes."
msgstr ""
#: i2p2www/pages/site/docs/api/bob.html:191
msgid ""
-"NOTE: The \"quit\" command in the command channel does NOT disconnect"
-" the tunnels like SAM."
+"NOTE: The \"quit\" command in the command channel does NOT "
+"disconnect the tunnels like SAM."
msgstr ""
#: i2p2www/pages/site/docs/api/bob.html:208
@@ -1592,10 +1767,14 @@ msgstr "Você também pode se conectar a EEPSITES!"
#: i2p2www/pages/site/docs/api/bob.html:261
msgid ""
-"Pretty cool isn't it? Try some other well known EEPSITES if you like, nonexistent ones, \n"
-"etc, to get a feel for what kind of output to expect in different situations. \n"
-"For the most part, it is suggested that you ignore any of the error messages. \n"
-"They would be meaningless to the application, and are only presented for human debugging."
+"Pretty cool isn't it? Try some other well known EEPSITES if you like, "
+"nonexistent ones, \n"
+"etc, to get a feel for what kind of output to expect in different "
+"situations. \n"
+"For the most part, it is suggested that you ignore any of the error "
+"messages. \n"
+"They would be meaningless to the application, and are only presented for "
+"human debugging."
msgstr ""
#: i2p2www/pages/site/docs/api/bob.html:268
@@ -1612,7 +1791,8 @@ msgstr ""
#: i2p2www/pages/site/docs/api/bob.html:298
msgid ""
-"Now to remove \"ear\", note that this is what happens when you type too fast,\n"
+"Now to remove \"ear\", note that this is what happens when you type too "
+"fast,\n"
"and shows you what typical ERROR messages looks like."
msgstr ""
@@ -1663,11 +1843,16 @@ msgstr "Uma visão geral do datagrama"
#: i2p2www/pages/site/docs/api/datagrams.html:7
#, python-format
msgid ""
-"Datagrams build upon the base I2CP to provide authenticated\n"
-"and repliable messages in a standard format. This lets applications reliably read\n"
-"the \"from\" address out of a datagram and know that the address really sent the\n"
-"message. This is necessary for some applications since the base I2P message is\n"
-"completely raw - it has no \"from\" address (unlike IP packets). In addition, the\n"
+"Datagrams build upon the base I2CP to provide "
+"authenticated\n"
+"and repliable messages in a standard format. This lets applications "
+"reliably read\n"
+"the \"from\" address out of a datagram and know that the address really "
+"sent the\n"
+"message. This is necessary for some applications since the base I2P "
+"message is\n"
+"completely raw - it has no \"from\" address (unlike IP packets). In "
+"addition, the\n"
"message and sender are authenticated by signing the payload."
msgstr ""
@@ -1676,7 +1861,8 @@ msgstr ""
msgid ""
"Datagrams, like streaming library packets,\n"
"are an application-level construct.\n"
-"These protocols are independent of the low-level transports;\n"
+"These protocols are independent of the low-level transports;\n"
"the protocols are converted to I2NP messages by the router, and\n"
"either protocol may be carried by either transport."
msgstr ""
@@ -1692,7 +1878,8 @@ msgid ""
"datagram API,\n"
"while applications in other languages \n"
"can use SAM's datagram support.\n"
-"There is also limited support in i2ptunnel in the SOCKS proxy,\n"
+"There is also limited support in i2ptunnel in the SOCKS proxy,\n"
"the 'streamr' tunnel types, and udpTunnel classes."
msgstr ""
@@ -1702,23 +1889,34 @@ msgstr "Comprimento do datagrama"
#: i2p2www/pages/site/docs/api/datagrams.html:38
msgid ""
-"The application designer should carefully consider the tradeoff of repliable vs. non-repliable\n"
-"datagrams. Also, the datagram size will affect reliability, due to tunnel fragmentation into 1KB\n"
-"tunnel messages. The more message fragments, the more likely that one of them will be dropped\n"
-"by an intermediate hop. Messages larger than a few KB are not recommended.\n"
+"The application designer should carefully consider the tradeoff of "
+"repliable vs. non-repliable\n"
+"datagrams. Also, the datagram size will affect reliability, due to tunnel"
+" fragmentation into 1KB\n"
+"tunnel messages. The more message fragments, the more likely that one of "
+"them will be dropped\n"
+"by an intermediate hop. Messages larger than a few KB are not "
+"recommended.\n"
"Over about 10 KB, the delivery probablility drops dramatically.\n"
-"Messages over 16 KB cannot be delivered over NTCP, dropping delivery chances even more."
+"Messages over 16 KB cannot be delivered over NTCP, dropping delivery "
+"chances even more."
msgstr ""
#: i2p2www/pages/site/docs/api/datagrams.html:47
#, python-format
msgid ""
-"Also note that the various overheads added by lower layers, in particular asymmetric\n"
-"ElGamal/AES, place a large burden on intermittent messages\n"
-"such as used by a Kademlia-over-UDP application. The implementations are currently tuned\n"
-"for frequent traffic using the streaming library. There are a high number\n"
-"of session tags delivered, and a short session tag lifetime, for example.\n"
-"There are currently no configuration parameters available within I2CP to tune\n"
+"Also note that the various overheads added by lower layers, in particular"
+" asymmetric\n"
+"ElGamal/AES, place a large burden on "
+"intermittent messages\n"
+"such as used by a Kademlia-over-UDP application. The implementations are "
+"currently tuned\n"
+"for frequent traffic using the streaming library. There are a high number"
+"\n"
+"of session tags delivered, and a short session tag lifetime, for example."
+"\n"
+"There are currently no configuration parameters available within I2CP to "
+"tune\n"
"the ElGamal Session Tag parameters."
msgstr ""
@@ -1731,30 +1929,38 @@ msgid ""
"The standard I2CP protocol number for datagrams is PROTO_DATAGRAM (17).\n"
"Applications may or may not choose to set the\n"
"protocol in the I2CP header. It is not set by default.\n"
-"It must be set to demultiplex datagram and streaming traffic received on the same Destination."
+"It must be set to demultiplex datagram and streaming traffic received on "
+"the same Destination."
msgstr ""
#: i2p2www/pages/site/docs/api/datagrams.html:65
#, python-format
msgid ""
"As datagrams are not connection-oriented, the application may require\n"
-"port numbers to correlate datagrams with particular peers or communications sessions,\n"
+"port numbers to correlate datagrams with particular peers or "
+"communications sessions,\n"
"as is traditional with UDP over IP.\n"
-"Applications may add 'from' and 'to' ports to the I2CP (gzip) header as described in\n"
+"Applications may add 'from' and 'to' ports to the I2CP (gzip) header as "
+"described in\n"
"the I2CP page."
msgstr ""
#: i2p2www/pages/site/docs/api/datagrams.html:73
#, python-format
msgid ""
-"There is no method within the datagram API to specify whether it is non-repliable (raw)\n"
-"or repliable. The application should be designed to expect the appropriate type.\n"
+"There is no method within the datagram API to specify whether it is non-"
+"repliable (raw)\n"
+"or repliable. The application should be designed to expect the "
+"appropriate type.\n"
"The I2CP protocol number or port should be used by the application to\n"
"indicate datagram type.\n"
-"The I2CP protocol numbers PROTO_DATAGRAM (signed) and PROTO_DATAGRAM_RAW are defined in the\n"
+"The I2CP protocol numbers PROTO_DATAGRAM (signed) and PROTO_DATAGRAM_RAW "
+"are defined in the\n"
"I2PSession API\n"
-"for this purpose. A common design pattern in client/server datagram applications is to\n"
-"use signed datagrams for a request which includes a nonce, and use a raw datagram\n"
+"for this purpose. A common design pattern in client/server datagram "
+"applications is to\n"
+"use signed datagrams for a request which includes a nonce, and use a raw "
+"datagram\n"
"for the reply, returning the nonce from the request."
msgstr ""
@@ -1788,13 +1994,15 @@ msgstr "Encapsulamento de pacotes"
#: i2p2www/pages/site/docs/api/datagrams.html:101
#, python-format
msgid ""
-"Each datagram is sent through I2P as a single message (or as an individual clove in a\n"
+"Each datagram is sent through I2P as a single message (or as an "
+"individual clove in a\n"
"Garlic Message).\n"
"Message encapsulation is implemented in the underlying\n"
"I2CP,\n"
"I2NP, and\n"
"tunnel message layers.\n"
-"There is no packet delimiter mechanism or length field in the datagram protocol."
+"There is no packet delimiter mechanism or length field in the datagram "
+"protocol."
msgstr ""
#: i2p2www/pages/site/docs/api/datagrams.html:114
@@ -1814,10 +2022,17 @@ msgstr "I2PControl - Serviço de Controle Remoto"
#: i2p2www/pages/site/docs/api/i2pcontrol.html:4
#, python-format
msgid ""
-"I2P enables a JSONRPC2 interface via the plugin I2PControl.\n"
-"The aim of the interface is to provide simple way to interface with a running I2P node. A client, itoopie, has been developed in parallel.\n"
-"The JSONRPC2 implementation for the client as well as the plugin is provided by the java libraries JSON-RPC 2.0. \n"
-"A list of implementations of JSON-RPC for various languages can be found at the JSON-RPC wiki."
+"I2P enables a JSONRPC2 interface via the plugin I2PControl.\n"
+"The aim of the interface is to provide simple way to interface with a "
+"running I2P node. A client, itoopie, has been developed in parallel.\n"
+"The JSONRPC2 implementation for the client as well as the plugin is "
+"provided by the java libraries JSON-RPC 2.0. \n"
+"A list of implementations of JSON-RPC for various languages can be found "
+"at the JSON-RPC "
+"wiki."
msgstr ""
#: i2p2www/pages/site/docs/api/i2pcontrol.html:11
@@ -1893,8 +2108,8 @@ msgstr "Descrição"
#: i2p2www/pages/site/docs/api/i2pcontrol.html:29
msgid ""
-"Token used for authenticating every request (excluding the 'Authenticate' "
-"RPC method)"
+"Token used for authenticating every request (excluding the 'Authenticate'"
+" RPC method)"
msgstr ""
#: i2p2www/pages/site/docs/api/i2pcontrol.html:37
@@ -1903,7 +2118,8 @@ msgstr "Métodos implementados"
#: i2p2www/pages/site/docs/api/i2pcontrol.html:38
msgid ""
-"Creates and returns an authentication token used for further communication."
+"Creates and returns an authentication token used for further "
+"communication."
msgstr ""
#: i2p2www/pages/site/docs/api/i2pcontrol.html:40
@@ -1936,8 +2152,8 @@ msgstr ""
#: i2p2www/pages/site/docs/api/i2pcontrol.html:98
#: i2p2www/pages/site/docs/api/i2pcontrol.html:142
msgid ""
-"Token used for authenticating the client. Is provided by the server via the "
-"'Authenticate' RPC method."
+"Token used for authenticating the client. Is provided by the server via "
+"the 'Authenticate' RPC method."
msgstr ""
#: i2p2www/pages/site/docs/api/i2pcontrol.html:54
@@ -1999,8 +2215,7 @@ msgid "Returns true if any changes were made."
msgstr ""
#: i2p2www/pages/site/docs/api/i2pcontrol.html:79
-msgid ""
-"Returns true if any changes requiring a restart to take effect were made."
+msgid "Returns true if any changes requiring a restart to take effect were made."
msgstr ""
#: i2p2www/pages/site/docs/api/i2pcontrol.html:82
@@ -2069,7 +2284,8 @@ msgstr ""
#: i2p2www/pages/site/docs/api/i2pcontrol.html:137
msgid ""
-"Initiates a router reseed, fetching peers into our NetDB from a remote host."
+"Initiates a router reseed, fetching peers into our NetDB from a remote "
+"host."
msgstr ""
#: i2p2www/pages/site/docs/api/i2pcontrol.html:138
@@ -2078,7 +2294,8 @@ msgstr ""
#: i2p2www/pages/site/docs/api/i2pcontrol.html:139
msgid ""
-"Restarts the router gracefully (waits for participating tunnels to expire)."
+"Restarts the router gracefully (waits for participating tunnels to "
+"expire)."
msgstr ""
#: i2p2www/pages/site/docs/api/i2pcontrol.html:140
@@ -2112,8 +2329,7 @@ msgid "If requested, verifies that a graceful shutdown has been initiated"
msgstr ""
#: i2p2www/pages/site/docs/api/i2pcontrol.html:152
-msgid ""
-"Fetches or sets various network related settings. Ports, addresses etc."
+msgid "Fetches or sets various network related settings. Ports, addresses etc."
msgstr ""
#: i2p2www/pages/site/docs/api/i2pcontrol.html:154
@@ -2124,8 +2340,8 @@ msgstr ""
#: i2p2www/pages/site/docs/api/i2pcontrol.html:155
msgid ""
-"What hostname is used for the TCP transport. If null is submitted, current "
-"setting will be returned."
+"What hostname is used for the TCP transport. If null is submitted, "
+"current setting will be returned."
msgstr ""
#: i2p2www/pages/site/docs/api/i2pcontrol.html:156
@@ -2142,8 +2358,8 @@ msgstr ""
#: i2p2www/pages/site/docs/api/i2pcontrol.html:158
msgid ""
-"What hostname is used for the UDP transport. If null is submitted, current "
-"setting will be returned."
+"What hostname is used for the UDP transport. If null is submitted, "
+"current setting will be returned."
msgstr ""
#: i2p2www/pages/site/docs/api/i2pcontrol.html:159
@@ -2157,20 +2373,19 @@ msgid "What ip has been detected by the UDP transport."
msgstr ""
#: i2p2www/pages/site/docs/api/i2pcontrol.html:161
-msgid ""
-"Is UPnP enabled. If null is submitted, current setting will be returned."
+msgid "Is UPnP enabled. If null is submitted, current setting will be returned."
msgstr ""
#: i2p2www/pages/site/docs/api/i2pcontrol.html:162
msgid ""
-"How many percent of bandwidth is usable for participating tunnels. If null "
-"is submitted, current setting will be returned."
+"How many percent of bandwidth is usable for participating tunnels. If "
+"null is submitted, current setting will be returned."
msgstr ""
#: i2p2www/pages/site/docs/api/i2pcontrol.html:163
msgid ""
-"How many KB/s of inbound bandwidth is allowed. If null is submitted, current"
-" setting will be returned."
+"How many KB/s of inbound bandwidth is allowed. If null is submitted, "
+"current setting will be returned."
msgstr ""
#: i2p2www/pages/site/docs/api/i2pcontrol.html:164
@@ -2181,15 +2396,15 @@ msgstr ""
#: i2p2www/pages/site/docs/api/i2pcontrol.html:165
msgid ""
-"Is laptop mode enabled (change router identity and UDP port when IP changes "
-"). If null is submitted, current setting will be returned."
+"Is laptop mode enabled (change router identity and UDP port when IP "
+"changes ). If null is submitted, current setting will be returned."
msgstr ""
#: i2p2www/pages/site/docs/api/i2pcontrol.html:166
msgid ""
-"Token used for authenticating the client. Is provided by the server via the "
-"'Authenticate' RPC method. If null is submitted, current setting will be "
-"returned."
+"Token used for authenticating the client. Is provided by the server via "
+"the 'Authenticate' RPC method. If null is submitted, current setting will"
+" be returned."
msgstr ""
#: i2p2www/pages/site/docs/api/i2pcontrol.html:169
@@ -2202,8 +2417,8 @@ msgstr ""
#: i2p2www/pages/site/docs/api/i2pcontrol.html:171
msgid ""
-"If requested, returns the method used for automatically detecting ip for the"
-" TCP transport."
+"If requested, returns the method used for automatically detecting ip for "
+"the TCP transport."
msgstr ""
#: i2p2www/pages/site/docs/api/i2pcontrol.html:172
@@ -2216,8 +2431,8 @@ msgstr ""
#: i2p2www/pages/site/docs/api/i2pcontrol.html:174
msgid ""
-"If requested, returns methods used for detecting the ip address of the UDP "
-"transport."
+"If requested, returns methods used for detecting the ip address of the "
+"UDP transport."
msgstr ""
#: i2p2www/pages/site/docs/api/i2pcontrol.html:175
@@ -2312,27 +2527,36 @@ msgstr ""
#: i2p2www/pages/site/docs/api/i2pcontrol.html:201
msgid ""
-"The version of the I2PControl API used wasn't specified, but is required to "
-"be specified."
-msgstr "A versão da API de I2PControl usada não foi especificada, mas requer-se que seja especificada."
+"The version of the I2PControl API used wasn't specified, but is required "
+"to be specified."
+msgstr ""
+"A versão da API de I2PControl usada não foi especificada, mas requer-se "
+"que seja especificada."
#: i2p2www/pages/site/docs/api/i2pcontrol.html:202
msgid ""
-"The version of the I2PControl API specified is not supported by I2PControl."
+"The version of the I2PControl API specified is not supported by "
+"I2PControl."
msgstr "A versão da API de I2PControl não é suportada pela extensão I2PControl."
#: i2p2www/pages/site/docs/api/i2ptunnel.html:12
#, python-format
msgid ""
"I2PTunnel is a tool for interfacing with and providing services on I2P.\n"
-"Destination of an I2PTunnel can be defined using a hostname,\n"
-"Base32, or a full 516-byte destination key.\n"
-"An established I2PTunnel will be available on your client machine as localhost:port.\n"
-"If you wish to provide a service on I2P network, you simply create I2PTunnel to the\n"
-"appropriate ip_address:port. A corresponding 516-byte destination key will be generated\n"
+"Destination of an I2PTunnel can be defined using a hostname,\n"
+"Base32, or a full 516-byte destination "
+"key.\n"
+"An established I2PTunnel will be available on your client machine as "
+"localhost:port.\n"
+"If you wish to provide a service on I2P network, you simply create "
+"I2PTunnel to the\n"
+"appropriate ip_address:port. A corresponding 516-byte destination key "
+"will be generated\n"
"for the service and it will become avaliable throughout I2P.\n"
"A web interface for I2PTunnel management is avaliable on\n"
-"localhost:7657/i2ptunnel/."
+"localhost:7657/i2ptunnel/."
msgstr ""
#: i2p2www/pages/site/docs/api/i2ptunnel.html:24
@@ -2346,7 +2570,8 @@ msgstr ""
#: i2p2www/pages/site/docs/api/i2ptunnel.html:27
msgid ""
"I2P Webserver - A tunnel pointed to a Jetty webserver run\n"
-"on localhost:7658 for convenient and quick hosting on I2P.\n"
+"on localhost:7658 for convenient "
+"and quick hosting on I2P.\n"
"1/(windowSize*factor)
. In standard TCP, window sizes are in bytes,\n"
+"of 1/(windowSize*factor)
. In standard TCP, window sizes are"
+" in bytes,\n"
"while in I2P, window sizes are in messages.\n"
"A higher number means slower growth."
msgstr ""
@@ -2883,15 +3181,16 @@ msgstr ""
msgid ""
"How long to wait after instantiating a new con \n"
"before actually attempting to connect. If this is\n"
-"<= 0, connect immediately with no initial data. If greater than 0, wait\n"
+"<= 0, connect immediately with no initial data. If greater than 0, "
+"wait\n"
"until the output stream is flushed, the buffer fills, \n"
"or that many milliseconds pass, and include any initial data with the SYN."
msgstr ""
#: i2p2www/pages/site/docs/api/streaming.html:186
msgid ""
-"How long to block on connect, in milliseconds. Negative means indefinitely. "
-"Default is 5 minutes."
+"How long to block on connect, in milliseconds. Negative means "
+"indefinitely. Default is 5 minutes."
msgstr ""
#: i2p2www/pages/site/docs/api/streaming.html:190
@@ -2903,19 +3202,23 @@ msgstr ""
#: i2p2www/pages/site/docs/api/streaming.html:196
msgid ""
"Whether to listen only for the streaming protocol.\n"
-"Setting to true will prohibit communication with Destinations earlier than release 0.7.1\n"
-"(released March 2009). Set to true if running multiple protocols on this Destination."
+"Setting to true will prohibit communication with Destinations earlier "
+"than release 0.7.1\n"
+"(released March 2009). Set to true if running multiple protocols on this "
+"Destination."
msgstr ""
#: i2p2www/pages/site/docs/api/streaming.html:204
msgid ""
"(0=noop, 1=disconnect)\n"
-"What to do on an inactivity timeout - do nothing, disconnect, or send a duplicate ack."
+"What to do on an inactivity timeout - do nothing, disconnect, or send a "
+"duplicate ack."
msgstr ""
#: i2p2www/pages/site/docs/api/streaming.html:212
msgid ""
-"The initial value of the resend delay field in the packet header, times 1000.\n"
+"The initial value of the resend delay field in the packet header, times "
+"1000.\n"
"Not fully implemented; see below."
msgstr ""
@@ -2938,8 +3241,8 @@ msgstr ""
#: i2p2www/pages/site/docs/api/streaming.html:230
msgid ""
-"In standard TCP, window sizes are in bytes, while in I2P, window sizes are "
-"in messages."
+"In standard TCP, window sizes are in bytes, while in I2P, window sizes "
+"are in messages."
msgstr ""
#: i2p2www/pages/site/docs/api/streaming.html:242
@@ -2979,12 +3282,12 @@ msgstr ""
#: i2p2www/pages/site/docs/api/streaming.html:295
msgid ""
"(2=interactive not supported)\n"
-"This doesn't currently do anything, but setting it to a value other than 1 will cause an error."
+"This doesn't currently do anything, but setting it to a value other than "
+"1 will cause an error."
msgstr ""
#: i2p2www/pages/site/docs/api/streaming.html:300
-msgid ""
-"How long to block on read, in milliseconds. Negative means indefinitely."
+msgid "How long to block on read, in milliseconds. Negative means indefinitely."
msgstr ""
#: i2p2www/pages/site/docs/api/streaming.html:304
@@ -3016,7 +3319,7 @@ msgstr ""
#: i2p2www/pages/site/docs/api/streaming.html:342
msgid "See the Streaming Library Specification page."
-msgstr ""
+msgstr "Ver a página da especificação da biblioteca de streaming."
#: i2p2www/pages/site/docs/api/streaming.html:346
msgid "Implementation Details"
@@ -3028,15 +3331,19 @@ msgstr ""
#: i2p2www/pages/site/docs/api/streaming.html:349
msgid ""
-"The initiator sends a packet with the SYNCHRONIZE flag set. This packet may contain the initial data as well.\n"
-"The peer replies with a packet with the SYNCHRONIZE flag set. This packet may contain the initial response data as well."
+"The initiator sends a packet with the SYNCHRONIZE flag set. This packet "
+"may contain the initial data as well.\n"
+"The peer replies with a packet with the SYNCHRONIZE flag set. This packet"
+" may contain the initial response data as well."
msgstr ""
#: i2p2www/pages/site/docs/api/streaming.html:354
msgid ""
-"The initiator may send additional data packets, up to the initial window size, before receiving the SYNCHRONIZE response.\n"
+"The initiator may send additional data packets, up to the initial window "
+"size, before receiving the SYNCHRONIZE response.\n"
"These packets will also have the send Stream ID field set to 0.\n"
-"Recipients must buffer packets received on unknown streams for a short period of time, as they may\n"
+"Recipients must buffer packets received on unknown streams for a short "
+"period of time, as they may\n"
"arrive out of order, in advance of the SYNCHRONIZE packet."
msgstr ""
@@ -3046,23 +3353,33 @@ msgstr ""
#: i2p2www/pages/site/docs/api/streaming.html:362
msgid ""
-"The maximum message size (also called the MTU / MRU) is negotiated to the lower value supported by\n"
-"the two peers. As tunnel messages are padded to 1KB, a poor MTU selection will lead to\n"
+"The maximum message size (also called the MTU / MRU) is negotiated to the"
+" lower value supported by\n"
+"the two peers. As tunnel messages are padded to 1KB, a poor MTU selection"
+" will lead to\n"
"a large amount of overhead.\n"
"The MTU is specified by the option i2p.streaming.maxMessageSize.\n"
-"The current default MTU of 1730 was chosen to fit precisely into two 1K I2NP tunnel messages,\n"
+"The current default MTU of 1730 was chosen to fit precisely into two 1K "
+"I2NP tunnel messages,\n"
"including overhead for the typical case."
msgstr ""
#: i2p2www/pages/site/docs/api/streaming.html:371
msgid ""
-"The first message in a connection includes a 387 byte (typical) Destination added by the streaming layer,\n"
-"and usually a 898 byte (typical) LeaseSet, and Session keys, bundled in the Garlic message by the router.\n"
-"(The LeaseSet and Session Keys will not be bundled if an ElGamal Session was previously established).\n"
-"Therefore, the goal of fitting a complete HTTP request in a single 1KB I2NP message is not always attainable.\n"
-"However, the selection of the MTU, together with careful implementation of fragmentation\n"
-"and batching strategies in the tunnel gateway processor, are important factors in network bandwidth,\n"
-"latency, reliability, and efficiency, especially for long-lived connections."
+"The first message in a connection includes a 387 byte (typical) "
+"Destination added by the streaming layer,\n"
+"and usually a 898 byte (typical) LeaseSet, and Session keys, bundled in "
+"the Garlic message by the router.\n"
+"(The LeaseSet and Session Keys will not be bundled if an ElGamal Session "
+"was previously established).\n"
+"Therefore, the goal of fitting a complete HTTP request in a single 1KB "
+"I2NP message is not always attainable.\n"
+"However, the selection of the MTU, together with careful implementation "
+"of fragmentation\n"
+"and batching strategies in the tunnel gateway processor, are important "
+"factors in network bandwidth,\n"
+"latency, reliability, and efficiency, especially for long-lived "
+"connections."
msgstr ""
#: i2p2www/pages/site/docs/api/streaming.html:382
@@ -3076,10 +3393,14 @@ msgstr ""
#: i2p2www/pages/site/docs/api/streaming.html:390
#, python-format
msgid ""
-"Each packet is sent through I2P as a single message (or as an individual clove in a\n"
-"Garlic Message). Message encapsulation is implemented\n"
-"in the underlying I2CP, I2NP, and\n"
-"tunnel message layers. There is no packet delimiter\n"
+"Each packet is sent through I2P as a single message (or as an individual "
+"clove in a\n"
+"Garlic Message). Message encapsulation "
+"is implemented\n"
+"in the underlying I2CP, I2NP, and\n"
+"tunnel message layers. There is no "
+"packet delimiter\n"
"mechanism or payload length field in the streaming protocol."
msgstr ""
@@ -3089,7 +3410,8 @@ msgstr ""
#: i2p2www/pages/site/docs/api/streaming.html:401
msgid ""
-"The streaming lib uses standard slow-start (exponential window growth) and congestion avoidance (linear window growth)\n"
+"The streaming lib uses standard slow-start (exponential window growth) "
+"and congestion avoidance (linear window growth)\n"
"phases, with exponential backoff.\n"
"Windowing and acknowledgments use packet count, not byte count."
msgstr ""
@@ -3100,38 +3422,46 @@ msgstr ""
#: i2p2www/pages/site/docs/api/streaming.html:409
msgid ""
-"Any packet, including one with the SYNCHRONIZE flag set, may have the CLOSE flag sent as well.\n"
-"The connection is not closed until the peer responds with the CLOSE flag.\n"
+"Any packet, including one with the SYNCHRONIZE flag set, may have the "
+"CLOSE flag sent as well.\n"
+"The connection is not closed until the peer responds with the CLOSE flag."
+"\n"
"CLOSE packets may contain data as well."
msgstr ""
#: i2p2www/pages/site/docs/api/streaming.html:417
msgid ""
-"There is no ping function at the I2CP layer (equivalent to ICMP echo) or in datagrams.\n"
+"There is no ping function at the I2CP layer (equivalent to ICMP echo) or "
+"in datagrams.\n"
"This function is provided in streaming.\n"
"Pings and pongs may not be combined with a standard streaming packet;\n"
"if the ECHO option is set, then\n"
-"most other flags, options, ackThrough, sequenceNum, NACKs, payload, etc. are ignored."
+"most other flags, options, ackThrough, sequenceNum, NACKs, payload, etc. "
+"are ignored."
msgstr ""
#: i2p2www/pages/site/docs/api/streaming.html:425
msgid ""
-"A ping packet must have the ECHO, SIGNATURE_INCLUDED, and FROM_INCLUDED flags set.\n"
-"The sendStreamId must be greater than zero, and the receiveStreamId is ignored.\n"
+"A ping packet must have the ECHO, SIGNATURE_INCLUDED, and FROM_INCLUDED "
+"flags set.\n"
+"The sendStreamId must be greater than zero, and the receiveStreamId is "
+"ignored.\n"
"The sendStreamId may or may not correspond to an existing connection."
msgstr ""
#: i2p2www/pages/site/docs/api/streaming.html:431
msgid ""
"A pong packet must have the ECHO flag set.\n"
-"The sendStreamId must be zero, and the receiveStreamId is the sendStreamId from the ping.\n"
-"The pong packet does not include any payload that was contained in the ping."
+"The sendStreamId must be zero, and the receiveStreamId is the "
+"sendStreamId from the ping.\n"
+"The pong packet does not include any payload that was contained in the "
+"ping."
msgstr ""
#: i2p2www/pages/site/docs/api/streaming.html:437
msgid ""
-"Streaming may be configured to disable sending pongs with the configuration "
-"i2p.streaming.answerPings=false."
+"Streaming may be configured to disable sending pongs with the "
+"configuration i2p.streaming.answerPings=false."
msgstr ""
#: i2p2www/pages/site/docs/api/streaming.html:442
@@ -3147,7 +3477,8 @@ msgid ""
"This is used for \"temporal\" sharing at connection open/close time,\n"
"not \"ensemble\" sharing during a connection (See\n"
"RFC 2140).\n"
-"There is a separate share per ConnectionManager (i.e. per local Destination)\n"
+"There is a separate share per ConnectionManager (i.e. per local "
+"Destination)\n"
"so that there is no information leakage to other Destinations on the\n"
"same router.\n"
"The share data for a given peer expires after a few minutes.\n"
@@ -3160,7 +3491,8 @@ msgstr ""
#: i2p2www/pages/site/docs/api/streaming.html:465
msgid ""
-"The following parameters are hardcoded, but may be of interest for analysis:"
+"The following parameters are hardcoded, but may be of interest for "
+"analysis:"
msgstr ""
#: i2p2www/pages/site/docs/api/streaming.html:484
@@ -3170,16 +3502,25 @@ msgstr ""
#: i2p2www/pages/site/docs/api/streaming.html:485
msgid ""
-"The streaming library has grown organically for I2P - first mihi implemented the\n"
-"\"mini streaming library\" as part of I2PTunnel, which was limited to a window\n"
-"size of 1 message (requiring an ACK before sending the next one), and then it was\n"
-"refactored out into a generic streaming interface (mirroring TCP sockets) and the\n"
-"full streaming implementation was deployed with a sliding window protocol and \n"
-"optimizations to take into account the high bandwidth x delay product. Individual\n"
-"streams may adjust the maximum packet size and other options. The default\n"
-"message size is selected to fit precisely in two 1K I2NP tunnel messages,\n"
+"The streaming library has grown organically for I2P - first mihi "
+"implemented the\n"
+"\"mini streaming library\" as part of I2PTunnel, which was limited to a "
+"window\n"
+"size of 1 message (requiring an ACK before sending the next one), and "
+"then it was\n"
+"refactored out into a generic streaming interface (mirroring TCP sockets)"
+" and the\n"
+"full streaming implementation was deployed with a sliding window protocol"
+" and \n"
+"optimizations to take into account the high bandwidth x delay product. "
+"Individual\n"
+"streams may adjust the maximum packet size and other options. The default"
+"\n"
+"message size is selected to fit precisely in two 1K I2NP tunnel messages,"
+"\n"
"and is a reasonable tradeoff between the bandwidth costs of \n"
-"retransmitting lost messages, and the latency and overhead of multiple messages."
+"retransmitting lost messages, and the latency and overhead of multiple "
+"messages."
msgstr ""
#: i2p2www/pages/site/docs/api/streaming.html:499
@@ -3211,16 +3552,20 @@ msgstr ""
#: i2p2www/pages/site/docs/api/streaming.html:509
#, python-format
msgid ""
-"Another area for research is the interaction of the streaming lib with the\n"
+"Another area for research is the interaction of the streaming lib with "
+"the\n"
"NTCP and SSU transport layers.\n"
"See the NTCP discussion page for details."
msgstr ""
#: i2p2www/pages/site/docs/api/streaming.html:514
msgid ""
-"The interaction of the routing algorithms with the streaming lib strongly affects performance.\n"
-"In particular, random distribution of messages to multiple tunnels in a pool\n"
-"leads to a high degree of out-of-order delivery which results in smaller window\n"
+"The interaction of the routing algorithms with the streaming lib strongly"
+" affects performance.\n"
+"In particular, random distribution of messages to multiple tunnels in a "
+"pool\n"
+"leads to a high degree of out-of-order delivery which results in smaller "
+"window\n"
"sizes than would otherwise be the case. The router currently routes \n"
"messages for a single from/to destination pair through a consistent set \n"
"of tunnels, until tunnel expiration or delivery failure. The router's \n"
@@ -3255,9 +3600,11 @@ msgstr ""
#: i2p2www/pages/site/docs/api/streaming.html:541
msgid ""
-"zzz has added debug code to the streaming library to log packets in a wireshark-compatible\n"
+"zzz has added debug code to the streaming library to log packets in a "
+"wireshark-compatible\n"
"(pcap) format; Use this to further analyze performance.\n"
-"The format may require enhancement to map more streaming lib parameters to TCP fields."
+"The format may require enhancement to map more streaming lib parameters "
+"to TCP fields."
msgstr ""
#: i2p2www/pages/site/docs/api/streaming.html:546
@@ -3276,15 +3623,18 @@ msgstr ""
msgid ""
"There are several bittorrent clients and trackers on I2P.\n"
"As I2P addressing uses a Destination instead of an IP and port, minor\n"
-"changes are required to tracker and client software for operation on I2P.\n"
+"changes are required to tracker and client software for operation on I2P."
+"\n"
"These changes are specified below.\n"
-"Note carefully the guidelines for compatibility with older I2P clients and trackers."
+"Note carefully the guidelines for compatibility with older I2P clients "
+"and trackers."
msgstr ""
#: i2p2www/pages/site/docs/applications/bittorrent.html:15
msgid ""
"This page specifies protocol details common to all clients and trackers.\n"
-"Specific clients and trackers may implement other unique features or protocols."
+"Specific clients and trackers may implement other unique features or "
+"protocols."
msgstr ""
#: i2p2www/pages/site/docs/applications/bittorrent.html:20
@@ -3297,7 +3647,8 @@ msgstr ""
#: i2p2www/pages/site/docs/applications/bittorrent.html:27
msgid ""
-"Clients generally include a fake port=6881 parameter in the announce, for compatibility with older trackers.\n"
+"Clients generally include a fake port=6881 parameter in the announce, for"
+" compatibility with older trackers.\n"
"Trackers may ignore the port parameter, and should not require it."
msgstr ""
@@ -3309,7 +3660,8 @@ msgid ""
"using the I2P Base 64 alphabet [A-Z][a-z][0-9]-~.\n"
"Destinations\n"
"are 387+ bytes, so the Base 64 is 516+ bytes.\n"
-"Clients generally append \".i2p\" to the Base 64 Destination for compatibility with older trackers.\n"
+"Clients generally append \".i2p\" to the Base 64 Destination for "
+"compatibility with older trackers.\n"
"Trackers should not require an appended \".i2p\"."
msgstr ""
@@ -3319,15 +3671,19 @@ msgstr ""
#: i2p2www/pages/site/docs/applications/bittorrent.html:46
msgid ""
-"While all current Destinations for clients are exactly 387 bytes, a tracker should not\n"
-"presume that will always be so. A reasonable maximum to assume, for now, is 475 bytes.\n"
-"As the tracker must decode the Base64 to deliver compact responses (see below),\n"
+"While all current Destinations for clients are exactly 387 bytes, a "
+"tracker should not\n"
+"presume that will always be so. A reasonable maximum to assume, for now, "
+"is 475 bytes.\n"
+"As the tracker must decode the Base64 to deliver compact responses (see "
+"below),\n"
"the tracker should probably decode and reject bad Base64 when announced."
msgstr ""
#: i2p2www/pages/site/docs/applications/bittorrent.html:53
msgid ""
-"The default response type is non-compact. Clients may request a compact response with\n"
+"The default response type is non-compact. Clients may request a compact "
+"response with\n"
"the parameter compact=1. A tracker may, but is not required to, return\n"
"a compact response when requested."
msgstr ""
@@ -3335,8 +3691,10 @@ msgstr ""
#: i2p2www/pages/site/docs/applications/bittorrent.html:59
msgid ""
"Developers of new I2P clients\n"
-"are strongly encouraged to implemenent announces over their own tunnel rather than\n"
-"the HTTP client proxy at port 4444. Doing so is both more efficient and it allows\n"
+"are strongly encouraged to implemenent announces over their own tunnel "
+"rather than\n"
+"the HTTP client proxy at port 4444. Doing so is both more efficient and "
+"it allows\n"
"destination enforcement by the tracker (see below)."
msgstr ""
@@ -3358,7 +3716,8 @@ msgstr ""
#: i2p2www/pages/site/docs/applications/bittorrent.html:76
msgid ""
-"Trackers generally include a fake port key, or use the port from the announce, for compatibility with older clients.\n"
+"Trackers generally include a fake port key, or use the port from the "
+"announce, for compatibility with older clients.\n"
"Clients must ignore the port parameter, and should not require it."
msgstr ""
@@ -3366,8 +3725,10 @@ msgstr ""
#, python-format
msgid ""
"The value of the ip key is the base 64 of the client's\n"
-"Destination, as described above.\n"
-"Trackers generally append \".i2p\" to the Base 64 Destination if it wasn't in the announce ip, for compatibility with older clients.\n"
+"Destination, as "
+"described above.\n"
+"Trackers generally append \".i2p\" to the Base 64 Destination if it "
+"wasn't in the announce ip, for compatibility with older clients.\n"
"Clients should not require an appended \".i2p\" in the responses."
msgstr ""
@@ -3382,22 +3743,26 @@ msgstr ""
#: i2p2www/pages/site/docs/applications/bittorrent.html:95
#, python-format
msgid ""
-"In the compact response, the value of the \"peers\" dictionary key is a single byte string,\n"
+"In the compact response, the value of the \"peers\" dictionary key is a "
+"single byte string,\n"
"whose length is a multiple of 32 bytes.\n"
"This string contains the concatenated\n"
"32-byte SHA-256 Hashes\n"
"of the binary\n"
"Destinations\n"
"of the peers.\n"
-"This hash must be computed by the tracker, unless destination enforcement\n"
-"(see below) is used, in which case the hash delivered in the X-I2P-DestHash\n"
+"This hash must be computed by the tracker, unless destination enforcement"
+"\n"
+"(see below) is used, in which case the hash delivered in the X-I2P-"
+"DestHash\n"
"or X-I2P-DestB32 HTTP headers may be converted to binary and stored.\n"
"The peers key may be absent, or the peers value may be zero-length."
msgstr ""
#: i2p2www/pages/site/docs/applications/bittorrent.html:109
msgid ""
-"While compact response support is optional for both clients and trackers, it is highly\n"
+"While compact response support is optional for both clients and trackers,"
+" it is highly\n"
"recommended as it reduces the nominal response size by over 90%."
msgstr ""
@@ -3408,27 +3773,34 @@ msgstr ""
#: i2p2www/pages/site/docs/applications/bittorrent.html:117
#, python-format
msgid ""
-"Some, but not all, I2P bittorrent clients announce over their own tunnels.\n"
-"Trackers may choose to prevent spoofing by requiring this, and verifying the\n"
+"Some, but not all, I2P bittorrent clients announce over their own "
+"tunnels.\n"
+"Trackers may choose to prevent spoofing by requiring this, and verifying "
+"the\n"
"client's\n"
"Destination\n"
"using HTTP headers added by the I2PTunnel HTTP Server tunnel.\n"
-"The headers are X-I2P-DestHash, X-I2P-DestB64, and X-I2P-DestB32, which are\n"
+"The headers are X-I2P-DestHash, X-I2P-DestB64, and X-I2P-DestB32, which "
+"are\n"
"different formats for the same information.\n"
"These headers cannot be spoofed by the client.\n"
-"A tracker enforcing destinations need not require the ip announce parameter at all."
+"A tracker enforcing destinations need not require the ip announce "
+"parameter at all."
msgstr ""
#: i2p2www/pages/site/docs/applications/bittorrent.html:129
msgid ""
-"As several clients use the HTTP proxy instead of their own tunnel for announces,\n"
-"destination enforcement will prevent usage by those clients unless or until\n"
+"As several clients use the HTTP proxy instead of their own tunnel for "
+"announces,\n"
+"destination enforcement will prevent usage by those clients unless or "
+"until\n"
"those clients are converted to announcing over their own tunnel."
msgstr ""
#: i2p2www/pages/site/docs/applications/bittorrent.html:135
msgid ""
-"Unfortunately, as the network grows, so will the amount of maliciousness,\n"
+"Unfortunately, as the network grows, so will the amount of maliciousness,"
+"\n"
"so we expect that all trackers will eventually enforce destinations.\n"
"Both tracker and client developers should anticipate it."
msgstr ""
@@ -3442,9 +3814,12 @@ msgstr ""
msgid ""
"Announce URL host names in torrent files generally follow the\n"
"I2P naming standards.\n"
-"In addition to host names from address books and \".b32.i2p\" Base 32 hostnames,\n"
-"the full Base 64 Destination (with [or without?] \".i2p\" appended) should be supported.\n"
-"Non-open trackers should recognize their own host name in any of these formats."
+"In addition to host names from address books and \".b32.i2p\" Base 32 "
+"hostnames,\n"
+"the full Base 64 Destination (with [or without?] \".i2p\" appended) "
+"should be supported.\n"
+"Non-open trackers should recognize their own host name in any of these "
+"formats."
msgstr ""
#: i2p2www/pages/site/docs/applications/bittorrent.html:152
@@ -3466,22 +3841,27 @@ msgstr ""
#: i2p2www/pages/site/docs/applications/bittorrent.html:165
#, python-format
msgid ""
-"I2P uses 387+ byte Destinations\n"
+"I2P uses 387+ byte Destinations\n"
"for addresses, as explained above."
msgstr ""
#: i2p2www/pages/site/docs/applications/bittorrent.html:170
msgid ""
-"If the client has only the hash of the destination (such as from a compact response or PEX), it must perform a lookup\n"
-"by encoding it with Base 32, appending \".b32.i2p\", and querying the Naming Service,\n"
+"If the client has only the hash of the destination (such as from a "
+"compact response or PEX), it must perform a lookup\n"
+"by encoding it with Base 32, appending \".b32.i2p\", and querying the "
+"Naming Service,\n"
"which will return the full Destination if available."
msgstr ""
#: i2p2www/pages/site/docs/applications/bittorrent.html:176
msgid ""
-"If the client has a peer's full Destination it received in a non-compact response, it should use it\n"
+"If the client has a peer's full Destination it received in a non-compact "
+"response, it should use it\n"
"directly in the connection setup.\n"
-"Do not convert a Destination back to a Base 32 hash for lookup, this is quite inefficient."
+"Do not convert a Destination back to a Base 32 hash for lookup, this is "
+"quite inefficient."
msgstr ""
#: i2p2www/pages/site/docs/applications/bittorrent.html:183
@@ -3491,32 +3871,40 @@ msgstr ""
#: i2p2www/pages/site/docs/applications/bittorrent.html:184
msgid ""
"To preserve anonymity,\n"
-"I2P bittorrent clients generally do not support non-I2P announces or peer connections.\n"
+"I2P bittorrent clients generally do not support non-I2P announces or peer"
+" connections.\n"
"I2P HTTP outproxies often block announces.\n"
"There are no known SOCKS outproxies supporting bittorrent traffic."
msgstr ""
#: i2p2www/pages/site/docs/applications/bittorrent.html:191
msgid ""
-"To prevent usage by non-I2P clients via an HTTP inproxy, I2P trackers often\n"
+"To prevent usage by non-I2P clients via an HTTP inproxy, I2P trackers "
+"often\n"
"block accesses or announces that contain an X-Forwarded-For HTTP header.\n"
-"Trackers should reject standard network announces with IPv4 or IPv6 IPs, and not deliver them in responses."
+"Trackers should reject standard network announces with IPv4 or IPv6 IPs, "
+"and not deliver them in responses."
msgstr ""
#: i2p2www/pages/site/docs/applications/bittorrent.html:200
#, python-format
msgid ""
"I2P PEX is based on ut_pex.\n"
-"As there does not appear to be a formal specification of ut_pex available,\n"
+"As there does not appear to be a formal specification of ut_pex "
+"available,\n"
"it may be necessary to review the libtorrent source for assistance.\n"
"It is an extension message, identified as \"i2p_pex\" in\n"
-"the extension handshake.\n"
-"It contains a bencoded dictionary with up to 3 keys, \"added\", \"added.f\", and \"dropped\".\n"
-"The added and dropped values are each a single byte string, whose length is a multiple of 32 bytes.\n"
+"the extension "
+"handshake.\n"
+"It contains a bencoded dictionary with up to 3 keys, \"added\", "
+"\"added.f\", and \"dropped\".\n"
+"The added and dropped values are each a single byte string, whose length "
+"is a multiple of 32 bytes.\n"
"These byte strings are the concatenated SHA-256 Hashes of the binary\n"
"Destinations\n"
"of the peers.\n"
-"This is the same format as the peers dictionary value in the i2p compact response format specified above.\n"
+"This is the same format as the peers dictionary value in the i2p compact "
+"response format specified above.\n"
"The added.f value, if present, is the same as in ut_pex."
msgstr ""
@@ -3531,10 +3919,13 @@ msgstr ""
#: i2p2www/pages/site/docs/applications/bittorrent.html:226
msgid ""
-"Unlike standard DHT, I2P DHT does not use a bit in the options handshake, or the PORT message.\n"
+"Unlike standard DHT, I2P DHT does not use a bit in the options handshake,"
+" or the PORT message.\n"
"It is advertised with an extension message, identified as \"i2p_dht\" in\n"
-"the extension handshake.\n"
-"It contains a bencoded dictionary with two keys, \"port\" and \"rport\", both integers."
+"the extension "
+"handshake.\n"
+"It contains a bencoded dictionary with two keys, \"port\" and \"rport\", "
+"both integers."
msgstr ""
#: i2p2www/pages/site/docs/applications/bittorrent.html:233
@@ -3564,12 +3955,14 @@ msgstr ""
msgid ""
"Compact peer info is 32 bytes (32 byte SHA256 Hash)\n"
"instead of 4 byte IP + 2 byte port. There is no peer port.\n"
-"In a response, the \"values\" key is a list of strings, each containing a single compact peer info."
+"In a response, the \"values\" key is a list of strings, each containing a"
+" single compact peer info."
msgstr ""
#: i2p2www/pages/site/docs/applications/bittorrent.html:260
msgid ""
-"Compact node info is 54 bytes (20 byte SHA1 Hash + 32 byte SHA256 Hash + 2 byte port)\n"
+"Compact node info is 54 bytes (20 byte SHA1 Hash + 32 byte SHA256 Hash + "
+"2 byte port)\n"
"instead of 20 byte SHA1 Hash + 4 byte IP + 2 byte port.\n"
"In a response, the \"nodes\" key is a\n"
"single byte string with concatenated compact node info."
@@ -3578,8 +3971,10 @@ msgstr ""
#: i2p2www/pages/site/docs/applications/bittorrent.html:267
msgid ""
"Secure node ID requirement: To make various DHT attacks more difficult,\n"
-"the first 4 bytes of the Node ID must match the first 4 bytes of the destination Hash,\n"
-"and the next two bytes of the Node ID must match the next two bytes of the\n"
+"the first 4 bytes of the Node ID must match the first 4 bytes of the "
+"destination Hash,\n"
+"and the next two bytes of the Node ID must match the next two bytes of "
+"the\n"
"destination hash exclusive-ORed with the port."
msgstr ""
@@ -3604,38 +3999,51 @@ msgid ""
"Preliminary differences from\n"
"BEP 15\n"
"are described below, and are subject to change.\n"
-"Contact the I2P developers if you wish to develop a client or tracker supporting datagram announces."
+"Contact the I2P developers if you wish to develop a client or tracker "
+"supporting datagram announces."
msgstr ""
#: i2p2www/pages/site/docs/applications/bittorrent.html:295
msgid ""
"A UDP tracker listens on two ports.\n"
-"The \"query port\" is the advertised port, and is used to receive repliable (signed) datagrams, for the connect request only.\n"
-"The \"response port\" is used to receive unsigned (raw) datagrams, and is the source port for all replies.\n"
+"The \"query port\" is the advertised port, and is used to receive "
+"repliable (signed) datagrams, for the connect request only.\n"
+"The \"response port\" is used to receive unsigned (raw) datagrams, and is"
+" the source port for all replies.\n"
"The response port is arbitrary.\n"
"A client sends and receives on a single port only.\n"
"It receives only unsigned (raw) datagrams.\n"
-"Raw datagrams provides increased efficiency for replies since they contain tokens sent in the query, and need not be signed."
+"Raw datagrams provides increased efficiency for replies since they "
+"contain tokens sent in the query, and need not be signed."
msgstr ""
#: i2p2www/pages/site/docs/applications/bittorrent.html:305
msgid ""
-"In the announce request, the 4-byte IP is replaced by a 32-byte hash, and the port is still present,\n"
+"In the announce request, the 4-byte IP is replaced by a 32-byte hash, and"
+" the port is still present,\n"
"although it may be ignored by the tracker.\n"
-"In the announce response, each 4-byte IP and 2-byte port is replaced by a 32-byte hash (compact peer info), and no port is present.\n"
-"The client sends the announce request and scrape request to the source port in the announce response packet.\n"
-"The connect request, connect response, scrape request, scrape response, and error response are the same as in BEP 15."
+"In the announce response, each 4-byte IP and 2-byte port is replaced by a"
+" 32-byte hash (compact peer info), and no port is present.\n"
+"The client sends the announce request and scrape request to the source "
+"port in the announce response packet.\n"
+"The connect request, connect response, scrape request, scrape response, "
+"and error response are the same as in BEP 15."
msgstr ""
#: i2p2www/pages/site/docs/applications/bittorrent.html:313
msgid ""
-"Source addresses in I2P cannot be spoofed, so it is possible to use a simplified protocol\n"
+"Source addresses in I2P cannot be spoofed, so it is possible to use a "
+"simplified protocol\n"
"with 2 packets instead of 4, omitting the connect request and response.\n"
-"In this case, the announce request would be a repliable datagram sent to the tracker's query port,\n"
+"In this case, the announce request would be a repliable datagram sent to "
+"the tracker's query port,\n"
"and the tracker would not require a response port.\n"
-"While this is more efficient, it would be more difficult to modify an existing tracker to support this mode.\n"
-"The URL for the 4-packet-mode tracker would use standard \"udp://\" prefix. \n"
-"The URL for a modified 2-packet-mode tracker would require a different prefix if both modes are supported in I2P."
+"While this is more efficient, it would be more difficult to modify an "
+"existing tracker to support this mode.\n"
+"The URL for the 4-packet-mode tracker would use standard \"udp://\" "
+"prefix. \n"
+"The URL for a modified 2-packet-mode tracker would require a different "
+"prefix if both modes are supported in I2P."
msgstr ""
#: i2p2www/pages/site/docs/applications/bittorrent.html:326
@@ -3675,15 +4083,19 @@ msgstr ""
#: i2p2www/pages/site/docs/applications/embedding.html:8
msgid ""
-"This page is about bundling the entire I2P router binary with your application.\n"
-"It is not about writing an application to work with I2P (either bundled or external)."
+"This page is about bundling the entire I2P router binary with your "
+"application.\n"
+"It is not about writing an application to work with I2P (either bundled "
+"or external)."
msgstr ""
#: i2p2www/pages/site/docs/applications/embedding.html:13
msgid ""
-"Lots of projects are bundling, or talking about bundling, I2P. That's great if done right.\n"
+"Lots of projects are bundling, or talking about bundling, I2P. That's "
+"great if done right.\n"
"If done wrong, it could cause real harm to our network.\n"
-"The I2P router is complex, and it can be a challenge to hide all the complexity from your users.\n"
+"The I2P router is complex, and it can be a challenge to hide all the "
+"complexity from your users.\n"
"This page discusses some general guidelines."
msgstr ""
@@ -3693,8 +4105,10 @@ msgstr ""
#: i2p2www/pages/site/docs/applications/embedding.html:24
msgid ""
-"Start a dialog. We're here to help. Applications that embed I2P are the most promising - and exciting -\n"
-"opportunities for us to grow the network and improve anonymity for everyone."
+"Start a dialog. We're here to help. Applications that embed I2P are the "
+"most promising - and exciting -\n"
+"opportunities for us to grow the network and improve anonymity for "
+"everyone."
msgstr ""
#: i2p2www/pages/site/docs/applications/embedding.html:30
@@ -3703,9 +4117,11 @@ msgstr ""
#: i2p2www/pages/site/docs/applications/embedding.html:31
msgid ""
-"If your application is in Java or Scala, it's an easy choice - use the Java router.\n"
+"If your application is in Java or Scala, it's an easy choice - use the "
+"Java router.\n"
"If in C/C++, we recommend i2pd. The development of i2pcpp has stopped.\n"
-"For apps in other languages, best to use SAM or BOB or SOCKS and bundle the Java router as a separate process.\n"
+"For apps in other languages, best to use SAM or BOB or SOCKS and bundle "
+"the Java router as a separate process.\n"
"Some of the following only applies to the Java router."
msgstr ""
@@ -3714,8 +4130,7 @@ msgid "Licensing"
msgstr ""
#: i2p2www/pages/site/docs/applications/embedding.html:40
-msgid ""
-"Ensure you meet the license requirements of the software you are bundling."
+msgid "Ensure you meet the license requirements of the software you are bundling."
msgstr ""
#: i2p2www/pages/site/docs/applications/embedding.html:45
@@ -3724,22 +4139,29 @@ msgstr ""
#: i2p2www/pages/site/docs/applications/embedding.html:46
msgid ""
-"A correct default configuration is crucial. Most users will not change the defaults.\n"
-"The defaults for your application may need to be different than the defaults for the router you are bundling.\n"
+"A correct default configuration is crucial. Most users will not change "
+"the defaults.\n"
+"The defaults for your application may need to be different than the "
+"defaults for the router you are bundling.\n"
"Override the router defaults if necessary."
msgstr ""
#: i2p2www/pages/site/docs/applications/embedding.html:51
msgid ""
-"Some important defaults to review: Max bandwidth, tunnel quantity and length, max participating tunnels.\n"
-"A lot of this depends on the expected bandwidth and usage patterns of your app."
+"Some important defaults to review: Max bandwidth, tunnel quantity and "
+"length, max participating tunnels.\n"
+"A lot of this depends on the expected bandwidth and usage patterns of "
+"your app."
msgstr ""
#: i2p2www/pages/site/docs/applications/embedding.html:55
msgid ""
-"Configure enough bandwidth and tunnels to allow your users to contribute to the network.\n"
-"Consider disabling external I2CP, as you probably don't need it and it would conflict with any other running I2P instance.\n"
-"Also look at the configs for disabling killing of the JVM on exit, for example."
+"Configure enough bandwidth and tunnels to allow your users to contribute "
+"to the network.\n"
+"Consider disabling external I2CP, as you probably don't need it and it "
+"would conflict with any other running I2P instance.\n"
+"Also look at the configs for disabling killing of the JVM on exit, for "
+"example."
msgstr ""
#: i2p2www/pages/site/docs/applications/embedding.html:62
@@ -3749,25 +4171,32 @@ msgstr ""
#: i2p2www/pages/site/docs/applications/embedding.html:63
msgid ""
"It may be tempting for you to disable participating traffic.\n"
-"There's several ways to do this (hidden mode, setting max tunnels to 0, setting shared bandwidth below 12 KBytes/sec).\n"
-"Without participating traffic, you don't have to worry about graceful shutdown,\n"
+"There's several ways to do this (hidden mode, setting max tunnels to 0, "
+"setting shared bandwidth below 12 KBytes/sec).\n"
+"Without participating traffic, you don't have to worry about graceful "
+"shutdown,\n"
"your users don't see bandwidth usage not generated by them, etc.\n"
-"However, there's lots of reasons why you should allow participating tunnels."
+"However, there's lots of reasons why you should allow participating "
+"tunnels."
msgstr ""
#: i2p2www/pages/site/docs/applications/embedding.html:70
msgid ""
-"First of all, the router doesn't work that well if it doesn't have a chance to \"integrate\" with the network,\n"
+"First of all, the router doesn't work that well if it doesn't have a "
+"chance to \"integrate\" with the network,\n"
"which is helped tremendously by others building tunnels through you."
msgstr ""
#: i2p2www/pages/site/docs/applications/embedding.html:74
msgid ""
-"Secondly, over 90% of the routers in the current network allow participating traffic.\n"
+"Secondly, over 90% of the routers in the current network allow "
+"participating traffic.\n"
"It's the default in the Java router.\n"
-"If your application doesn't route for others and it gets really popular, then it's a leech on the network,\n"
+"If your application doesn't route for others and it gets really popular, "
+"then it's a leech on the network,\n"
"and it upsets the balance we have now.\n"
-"If it gets really big, then we become Tor, and spend our time begging for people to enable relaying."
+"If it gets really big, then we become Tor, and spend our time begging for"
+" people to enable relaying."
msgstr ""
#: i2p2www/pages/site/docs/applications/embedding.html:81
@@ -3778,8 +4207,10 @@ msgstr ""
#: i2p2www/pages/site/docs/applications/embedding.html:84
msgid ""
-"We strongly discourage you from disabling participating traffic by default.\n"
-"If you do this and your application gets hugely popular, it could break the network."
+"We strongly discourage you from disabling participating traffic by "
+"default.\n"
+"If you do this and your application gets hugely popular, it could break "
+"the network."
msgstr ""
#: i2p2www/pages/site/docs/applications/embedding.html:90
@@ -3788,9 +4219,12 @@ msgstr ""
#: i2p2www/pages/site/docs/applications/embedding.html:91
msgid ""
-"You must save the router's data (netdb, configuration, etc.) between runs of the router.\n"
-"I2P does not work well if you must reseed each startup, and that's a huge load on our reseed servers, and not very good for anonymity either.\n"
-"Even if you bundle router infos, I2P needs saved profile data for best performance."
+"You must save the router's data (netdb, configuration, etc.) between runs"
+" of the router.\n"
+"I2P does not work well if you must reseed each startup, and that's a huge"
+" load on our reseed servers, and not very good for anonymity either.\n"
+"Even if you bundle router infos, I2P needs saved profile data for best "
+"performance."
msgstr ""
#: i2p2www/pages/site/docs/applications/embedding.html:99
@@ -3799,9 +4233,12 @@ msgstr ""
#: i2p2www/pages/site/docs/applications/embedding.html:100
msgid ""
-"Give your users a way to change the configuration of the important settings.\n"
-"We understand that you will probably want to hide most of I2P's complexity, but it's important to show some basic settings.\n"
-"In addition to the defaults above, some network settings such as UPnP, IP/port may be helpful."
+"Give your users a way to change the configuration of the important "
+"settings.\n"
+"We understand that you will probably want to hide most of I2P's "
+"complexity, but it's important to show some basic settings.\n"
+"In addition to the defaults above, some network settings such as UPnP, "
+"IP/port may be helpful."
msgstr ""
#: i2p2www/pages/site/docs/applications/embedding.html:108
@@ -3810,9 +4247,12 @@ msgstr ""
#: i2p2www/pages/site/docs/applications/embedding.html:109
msgid ""
-"Above a certain bandwidth setting, and meeting other health criteria, your router will become floodfill,\n"
-"which may cause a large increase in connections and memory usage (at least with the Java router).\n"
-"Think about whether that's OK. You can disable floodfill, but then your fastest users aren't contributing what they could.\n"
+"Above a certain bandwidth setting, and meeting other health criteria, "
+"your router will become floodfill,\n"
+"which may cause a large increase in connections and memory usage (at "
+"least with the Java router).\n"
+"Think about whether that's OK. You can disable floodfill, but then your "
+"fastest users aren't contributing what they could.\n"
"It also depends on the typical uptime for your application."
msgstr ""
@@ -3823,7 +4263,8 @@ msgstr ""
#: i2p2www/pages/site/docs/applications/embedding.html:120
msgid ""
"Decide if you are bundling router infos or using our reseed hosts.\n"
-"The Java reseed host list is in the source code, so if you keep your source up to date, the host list will be also.\n"
+"The Java reseed host list is in the source code, so if you keep your "
+"source up to date, the host list will be also.\n"
"Be aware of possible blocking by hostile governments."
msgstr ""
@@ -3833,9 +4274,12 @@ msgstr ""
#: i2p2www/pages/site/docs/applications/embedding.html:130
msgid ""
-"Consider setting your application tunnels to delay-open, reduce-on-idle and/or close-on-idle.\n"
-"This is straightforward if using i2ptunnel but you'll have to implement some of it yourself if using I2CP directly.\n"
-"See i2psnark for code that reduces tunnel count and then closes the tunnel, even in the presence of some background DHT activity."
+"Consider setting your application tunnels to delay-open, reduce-on-idle "
+"and/or close-on-idle.\n"
+"This is straightforward if using i2ptunnel but you'll have to implement "
+"some of it yourself if using I2CP directly.\n"
+"See i2psnark for code that reduces tunnel count and then closes the "
+"tunnel, even in the presence of some background DHT activity."
msgstr ""
#: i2p2www/pages/site/docs/applications/embedding.html:138
@@ -3844,11 +4288,16 @@ msgstr ""
#: i2p2www/pages/site/docs/applications/embedding.html:139
msgid ""
-"Have an auto-update feature if at all possible, or at least auto-notification of a new version.\n"
-"Our biggest fear is a huge number of routers out there that can't be updated.\n"
-"We have about 6-8 releases a year of the Java router, and it's critical to the health of the network that the users keep up.\n"
-"We usually have over 80% of the network on the latest release within 6 weeks after the release, and we'd like to keep it that way.\n"
-"You don't need to worry about disabling the router's built-in auto-update function, as that code is in the router console,\n"
+"Have an auto-update feature if at all possible, or at least auto-"
+"notification of a new version.\n"
+"Our biggest fear is a huge number of routers out there that can't be "
+"updated.\n"
+"We have about 6-8 releases a year of the Java router, and it's critical "
+"to the health of the network that the users keep up.\n"
+"We usually have over 80% of the network on the latest release within "
+"6 weeks after the release, and we'd like to keep it that way.\n"
+"You don't need to worry about disabling the router's built-in auto-update"
+" function, as that code is in the router console,\n"
"which you presumably are not bundling."
msgstr ""
@@ -3859,12 +4308,17 @@ msgstr ""
#: i2p2www/pages/site/docs/applications/embedding.html:151
msgid ""
"Have a gradual rollout plan. Don't overwhelm the network all at once.\n"
-"We currently have approximately 25K unique users per day and 40K uniques per month.\n"
-"We are probably able to handle growth of 2-3X per year without too much issue.\n"
-"If you anticipate a faster rampup than that, OR the bandwidth distribution (or uptime distribution,\n"
-"or any other significant characteristic) of your userbase is significantly different from our current userbase,\n"
+"We currently have approximately 25K unique users per day and 40K uniques "
+"per month.\n"
+"We are probably able to handle growth of 2-3X per year without too much "
+"issue.\n"
+"If you anticipate a faster rampup than that, OR the bandwidth "
+"distribution (or uptime distribution,\n"
+"or any other significant characteristic) of your userbase is "
+"significantly different from our current userbase,\n"
"we really need to have a discussion.\n"
-"The bigger your growth plans, the more important everthing else in this checklist is."
+"The bigger your growth plans, the more important everthing else in this "
+"checklist is."
msgstr ""
#: i2p2www/pages/site/docs/applications/embedding.html:163
@@ -3874,8 +4328,10 @@ msgstr ""
#: i2p2www/pages/site/docs/applications/embedding.html:164
msgid ""
"Tell your users that I2P works best if it keeps running.\n"
-"It may be several minutes after startup before it works well, and even more after first install.\n"
-"If your average uptime is less than an hour, I2P is probably the wrong solution."
+"It may be several minutes after startup before it works well, and even "
+"more after first install.\n"
+"If your average uptime is less than an hour, I2P is probably the wrong "
+"solution."
msgstr ""
#: i2p2www/pages/site/docs/applications/embedding.html:172
@@ -3884,8 +4340,8 @@ msgstr ""
#: i2p2www/pages/site/docs/applications/embedding.html:173
msgid ""
-"Provide some indication to the user that the application tunnels are ready. "
-"Encourage patience."
+"Provide some indication to the user that the application tunnels are "
+"ready. Encourage patience."
msgstr ""
#: i2p2www/pages/site/docs/applications/embedding.html:178
@@ -3895,7 +4351,8 @@ msgstr ""
#: i2p2www/pages/site/docs/applications/embedding.html:179
msgid ""
"If possible, delay the shutdown until your participating tunnels expire.\n"
-"Don't let your users break tunnels easily, or at least ask them to confirm."
+"Don't let your users break tunnels easily, or at least ask them to "
+"confirm."
msgstr ""
#: i2p2www/pages/site/docs/applications/embedding.html:185
@@ -3904,8 +4361,8 @@ msgstr ""
#: i2p2www/pages/site/docs/applications/embedding.html:186
msgid ""
-"It would be nice if you give your users links to learn more about I2P and to"
-" donate."
+"It would be nice if you give your users links to learn more about I2P and"
+" to donate."
msgstr ""
#: i2p2www/pages/site/docs/applications/embedding.html:192
@@ -3915,7 +4372,8 @@ msgstr ""
#: i2p2www/pages/site/docs/applications/embedding.html:193
msgid ""
"Depending on your user base and application,\n"
-"it may be helpful to provide an option or a separate package to use an external router."
+"it may be helpful to provide an option or a separate package to use an "
+"external router."
msgstr ""
#: i2p2www/pages/site/docs/applications/embedding.html:200
@@ -3924,7 +4382,8 @@ msgstr ""
#: i2p2www/pages/site/docs/applications/embedding.html:201
msgid ""
-"If you plan to use or link to other common I2P services (news feeds, hosts.txt subscriptions, trackers, outproxies, etc.),\n"
+"If you plan to use or link to other common I2P services (news feeds, "
+"hosts.txt subscriptions, trackers, outproxies, etc.),\n"
"make sure you aren't overloading them,\n"
"and talk to the people who are running them to make sure it's ok."
msgstr ""
@@ -3936,8 +4395,10 @@ msgstr ""
#: i2p2www/pages/site/docs/applications/embedding.html:210
msgid ""
"I2P includes an SNTP client. I2P requires correct time to operate.\n"
-"It will compensate for a skewed system clock but this may delay startup. You may disable I2P's SNTP queries,\n"
-"but this isn't advised unless your application makes sure the system clock is correct."
+"It will compensate for a skewed system clock but this may delay startup. "
+"You may disable I2P's SNTP queries,\n"
+"but this isn't advised unless your application makes sure the system "
+"clock is correct."
msgstr ""
#: i2p2www/pages/site/docs/applications/embedding.html:218
@@ -3946,15 +4407,20 @@ msgstr ""
#: i2p2www/pages/site/docs/applications/embedding.html:219
msgid ""
-"At a minimum you will need i2p.jar, router.jar, streaming.jar, and mstreaming.jar.\n"
+"At a minimum you will need i2p.jar, router.jar, streaming.jar, and "
+"mstreaming.jar.\n"
"You may omit the two straming jars for a datagram-only app.\n"
"Some apps may need more, e.g. i2ptunnel.jar or addressbook.jar.\n"
-"Don't forget jbigi.jar, or a subset of it for the platforms you support, to make the crypto much faster.\n"
-"We are currently building them for Java 6, as of 0.9.14. The source is mostly compatible with Java 5 if you want to do your own compile,\n"
+"Don't forget jbigi.jar, or a subset of it for the platforms you support, "
+"to make the crypto much faster.\n"
+"We are currently building them for Java 6, as of 0.9.14. The source is "
+"mostly compatible with Java 5 if you want to do your own compile,\n"
"but we may start using Java 6 features at any time without notice.\n"
"We plan to migrate to Java 7 in 2015.\n"
-"If you're building Debian / Ubuntu packages, you should require the I2P package from our PPA instead of bundling it.\n"
-"You almost certainly do not need susimail, susidns, the router console, and i2psnark, for example."
+"If you're building Debian / Ubuntu packages, you should require the I2P "
+"package from our PPA instead of bundling it.\n"
+"You almost certainly do not need susimail, susidns, the router console, "
+"and i2psnark, for example."
msgstr ""
#: i2p2www/pages/site/docs/applications/embedding.html:233
@@ -3972,13 +4438,17 @@ msgstr ""
#: i2p2www/pages/site/docs/applications/embedding.html:245
msgid ""
"If your application is using I2P datagrams, e.g. for a DHT,\n"
-"there's lots of advanced options available to reduce overhead and increase reliability.\n"
+"there's lots of advanced options available to reduce overhead and "
+"increase reliability.\n"
"This may take some time and experimentation to get working well.\n"
"Be aware of size/reliability tradeoffs. Talk to us for help.\n"
-"It is possible - and recommended - to use Datagrams and Streaming on the same Destination.\n"
+"It is possible - and recommended - to use Datagrams and Streaming on the "
+"same Destination.\n"
"Don't create separate Destinations for this.\n"
-"Don't try to store your unrelated data in the existing network DHTs (iMule, bote, bittorrent, and router).\n"
-"Build your own. If you are hardcoding seed nodes, we recommend that you have several."
+"Don't try to store your unrelated data in the existing network DHTs "
+"(iMule, bote, bittorrent, and router).\n"
+"Build your own. If you are hardcoding seed nodes, we recommend that you "
+"have several."
msgstr ""
#: i2p2www/pages/site/docs/applications/embedding.html:258
@@ -3988,7 +4458,8 @@ msgstr ""
#: i2p2www/pages/site/docs/applications/embedding.html:259
msgid ""
"Let's work together. Don't wait until it's done.\n"
-"Give us your Twitter handle and start tweeting about it, we will return the favor."
+"Give us your Twitter handle and start tweeting about it, we will return "
+"the favor."
msgstr ""
#: i2p2www/pages/site/docs/applications/embedding.html:265
@@ -4007,7 +4478,8 @@ msgstr ""
#: i2p2www/pages/site/docs/applications/embedding.html:273
msgid ""
-"This may be obvious, but join the community. Run I2P 24/7. Start an eepsite about your project.\n"
+"This may be obvious, but join the community. Run I2P 24/7. Start an "
+"eepsite about your project.\n"
"Hang out in IRC #i2p-dev. Post on the forums. Spread the word.\n"
"We can help get you users, testers, translators, or even coders."
msgstr ""
@@ -4018,10 +4490,12 @@ msgstr ""
#: i2p2www/pages/site/docs/applications/embedding.html:282
msgid ""
-"You may wish to install and play with the I2P Android app, and look at its code, for an example of an application that bundles the router.\n"
+"You may wish to install and play with the I2P Android app, and look at "
+"its code, for an example of an application that bundles the router.\n"
"See what we expose to the user and what we hide.\n"
"Look at the state machine we use to start and stop the router.\n"
-"Other examples are: Vuze, the Nightweb Android app, iMule, TAILS, iCloak, and Monero."
+"Other examples are: Vuze, the Nightweb Android app, iMule, TAILS, iCloak,"
+" and Monero."
msgstr ""
#: i2p2www/pages/site/docs/applications/embedding.html:290
@@ -4036,8 +4510,10 @@ msgstr ""
#: i2p2www/pages/site/docs/applications/embedding.html:306
msgid ""
-"This code is for the case where your application starts the router, as in our Android app.\n"
-"You could also have the router start the applictaion via the clients.config and i2ptunnel.config files,\n"
+"This code is for the case where your application starts the router, as in"
+" our Android app.\n"
+"You could also have the router start the applictaion via the "
+"clients.config and i2ptunnel.config files,\n"
"together with Jetty webapps,\n"
"as is done in our Java packages.\n"
"As always, state management is the difficult part."
@@ -4064,18 +4540,24 @@ msgstr ""
msgid ""
"As of release 0.9.4, the router supports managed clients.\n"
"Managed clients are instantiated and started by the ClientAppManager.\n"
-"The ClientAppManager maintains a reference to the client and receives updates on the client's state.\n"
-"Managed clients are preferred, as it is much easier to implement state tracking\n"
-"and to start and stop a client. It also is much easier to avoid static references in the client code\n"
+"The ClientAppManager maintains a reference to the client and receives "
+"updates on the client's state.\n"
+"Managed clients are preferred, as it is much easier to implement state "
+"tracking\n"
+"and to start and stop a client. It also is much easier to avoid static "
+"references in the client code\n"
"which could lead to excessive memory usage after a client is stopped.\n"
-"Managed clients may be started and stopped by the user in the router console,\n"
+"Managed clients may be started and stopped by the user in the router "
+"console,\n"
"and are stopped at router shutdown."
msgstr ""
#: i2p2www/pages/site/docs/applications/managed-clients.html:31
msgid ""
-"Managed clients implement either the net.i2p.app.ClientApp or net.i2p.router.app.RouterApp interface.\n"
-"Clients implementing the ClientApp interface must provide the following constructor:"
+"Managed clients implement either the net.i2p.app.ClientApp or "
+"net.i2p.router.app.RouterApp interface.\n"
+"Clients implementing the ClientApp interface must provide the following "
+"constructor:"
msgstr ""
#: i2p2www/pages/site/docs/applications/managed-clients.html:38
@@ -4094,10 +4576,12 @@ msgstr ""
#: i2p2www/pages/site/docs/applications/managed-clients.html:49
msgid ""
-"If the main class specified in the clients.config file does not implement a managed interface,\n"
+"If the main class specified in the clients.config file does not implement"
+" a managed interface,\n"
"it will be started with main() with the arguments specified,\n"
"and stopped with main() with the arguments specified.\n"
-"The router does not maintain a reference, since all interactions are via the static main() method.\n"
+"The router does not maintain a reference, since all interactions are via "
+"the static main() method.\n"
"The console cannot provide accurate state information to the user."
msgstr ""
@@ -4107,7 +4591,8 @@ msgstr ""
#: i2p2www/pages/site/docs/applications/managed-clients.html:58
msgid ""
-"Clients, whether managed or unmanaged, may register with the ClientAppManager\n"
+"Clients, whether managed or unmanaged, may register with the "
+"ClientAppManager\n"
"so that other clients may retrieve a reference to them.\n"
"Registration is by name.\n"
"Known registered clients are:"
@@ -4119,10 +4604,12 @@ msgstr ""
#: i2p2www/pages/site/docs/applications/managed-clients.html:69
msgid ""
-"The router also provides a simple mechanism for clients to find an internal socket service,\n"
+"The router also provides a simple mechanism for clients to find an "
+"internal socket service,\n"
"such as the HTTP proxy. This is provided by the Port Mapper.\n"
"Registration is by name.\n"
-"Clients that register generally provide an internal emulated socket on that port."
+"Clients that register generally provide an internal emulated socket on "
+"that port."
msgstr ""
#: i2p2www/pages/site/docs/applications/supported.html:2
@@ -4394,12 +4881,17 @@ msgstr ""
#, python-format
msgid ""
"Warning: Using an application, plugin, or service with I2P\n"
-"doesn't automatically protect your anonymity. I2P is merely a set of tools\n"
-"which can help you mitigate certain identified\n"
-"threats to anonymity. We do not and cannot make any guarantees about the\n"
+"doesn't automatically protect your anonymity. I2P is merely a set of "
+"tools\n"
+"which can help you mitigate certain identified\n"
+"threats to anonymity. We do not and cannot make any guarantees about "
+"the\n"
"safety of the applications, plugins, and services listed below. Most\n"
-"applications and plugins must be properly configured, and some will need to\n"
-"be patched — and even then your anonymity might not be assured. Similarly,\n"
+"applications and plugins must be properly configured, and some will need "
+"to\n"
+"be patched — and even then your anonymity might not be assured. "
+"Similarly,\n"
"services could put your anonymity at risk, either by design or through\n"
"carelessness on their part or your own."
msgstr ""
@@ -4407,8 +4899,10 @@ msgstr ""
#: i2p2www/pages/site/docs/applications/supported.html:171
msgid ""
"If you have doubts about the suitability of an application,\n"
-"plugin, or service for use with I2P, you are urged to inquire about privacy\n"
-"issues with its maintainers, to search its mailing lists and bug tracker if\n"
+"plugin, or service for use with I2P, you are urged to inquire about "
+"privacy\n"
+"issues with its maintainers, to search its mailing lists and bug tracker "
+"if\n"
"one exists, and consult trusted, knowledgeable members of the I2P\n"
"community."
msgstr ""
@@ -4416,7 +4910,8 @@ msgstr ""
#: i2p2www/pages/site/docs/applications/supported.html:179
msgid ""
"Take responsibility for your own anonymity and safety — always\n"
-"seek expert advice, educate yourself, practice good judgment, be mindful of\n"
+"seek expert advice, educate yourself, practice good judgment, be mindful "
+"of\n"
"disclosing personally identifying information, and don't take\n"
"shortcuts."
msgstr ""
@@ -4447,7 +4942,8 @@ msgstr ""
#: i2p2www/pages/site/docs/applications/supported.html:236
#, python-format
msgid ""
-"Port of the Tahoe-LAFS\n"
+"Port of the Tahoe-"
+"LAFS\n"
"distributed file system to the I2P network. Controller plugin here."
msgstr ""
@@ -4461,7 +4957,9 @@ msgstr "O mais popular dos sistemas distribuídos de controle de versão."
msgid ""
"Another distributed version control system. Currently\n"
"used in I2P development."
-msgstr "Um outro sistema distribuído de controle de versão. Atualmente\nusado no desenvolvimento do roteador I2P."
+msgstr ""
+"Um outro sistema distribuído de controle de versão. Atualmente\n"
+"usado no desenvolvimento do roteador I2P."
#: i2p2www/pages/site/docs/applications/supported.html:269
#, python-format
@@ -4469,8 +4967,10 @@ msgid ""
"Provides management of addressbooks, which are part of a simple,\n"
"user-controlled I2P naming system somewhat\n"
"analogous to the Internet's Domain Name System (DNS). Addressbooks map\n"
-"Base64 destinations to short, usually human-readable “domain” names ending\n"
-"with a .i2p suffix which the I2P router's HTTP client can resolve back to\n"
+"Base64 destinations to short, usually human-readable “domain” names "
+"ending\n"
+"with a .i2p suffix which the I2P router's HTTP client can resolve back to"
+"\n"
"Base64 addresses. (Note: While Base64 destinations are globally\n"
"unique, addressbook “domain” names only resolve to unique destinations\n"
"locally.)"
@@ -4485,7 +4985,8 @@ msgstr ""
#: i2p2www/pages/site/docs/applications/supported.html:297
msgid ""
"Provides email service within the I2P network via @mail.i2p addresses,\n"
-"and email gateway service between the I2P network and the public Internet\n"
+"and email gateway service between the I2P network and the public Internet"
+"\n"
"via @i2pmail.org addresses. One of the oldest continuous services on I2P."
msgstr ""
@@ -4540,7 +5041,8 @@ msgstr ""
#: i2p2www/pages/site/docs/applications/supported.html:382
msgid ""
-"The code that powered one of the first major tracker/indexer sites on the\n"
+"The code that powered one of the first major tracker/indexer sites on the"
+"\n"
"Internet. Patched for I2P."
msgstr ""
@@ -4565,7 +5067,8 @@ msgstr ""
#: i2p2www/pages/site/docs/applications/supported.html:422
#, python-format
msgid ""
-"Port of the Phex Gnutella client. Website\n"
+"Port of the Phex Gnutella "
+"client. Website\n"
"for plugin version here."
msgstr ""
@@ -4588,13 +5091,14 @@ msgstr ""
#: i2p2www/pages/site/docs/applications/supported.html:461
msgid ""
-"Proxy providing simple, transparent SOCKS-ification of network applications."
+"Proxy providing simple, transparent SOCKS-ification of network "
+"applications."
msgstr ""
#: i2p2www/pages/site/docs/applications/supported.html:471
msgid ""
-"Most popular implementation of the Secure Shell (SSH) protocol and related "
-"tools."
+"Most popular implementation of the Secure Shell (SSH) protocol and "
+"related tools."
msgstr ""
#: i2p2www/pages/site/docs/applications/supported.html:477
@@ -4608,21 +5112,29 @@ msgstr ""
#: i2p2www/pages/site/docs/applications/supported.html:496
msgid ""
"Many IRC clients leak identifying information to servers or other\n"
-"clients, so I2P's IRC and SOCKS IRC client tunnels filter certain inbound\n"
-"and outbound messages to scrub data such as LAN IP addresses, external IP\n"
-"addresses, local hostnames, and the name and version of the IRC client. Two\n"
-"message types in particular, DCC and CTCP, can't be sufficiently anonymized\n"
-"without changes to the protocols or to IRC client/server code, so they are\n"
+"clients, so I2P's IRC and SOCKS IRC client tunnels filter certain inbound"
+"\n"
+"and outbound messages to scrub data such as LAN IP addresses, external IP"
+"\n"
+"addresses, local hostnames, and the name and version of the IRC client. "
+"Two\n"
+"message types in particular, DCC and CTCP, can't be sufficiently "
+"anonymized\n"
+"without changes to the protocols or to IRC client/server code, so they "
+"are\n"
"completely blocked, except for CTCP ACTION (the message emitted by the\n"
"/me
command) which isn't inherently dangerous."
msgstr ""
#: i2p2www/pages/site/docs/applications/supported.html:507
msgid ""
-"I2P's IRC filtering may not cover every possible leak — users should also\n"
-"check if their client is sending their real name or local username. Packet\n"
+"I2P's IRC filtering may not cover every possible leak — users should also"
+"\n"
+"check if their client is sending their real name or local username. "
+"Packet\n"
"sniffers such as Wireshark are\n"
-"useful here. Eliminating remaining leaks may be as simple as changing the\n"
+"useful here. Eliminating remaining leaks may be as simple as changing the"
+"\n"
"client's default configuration. If that doesn't help, inform the I2P\n"
"developers; they may be able to solve it via additional filtering."
msgstr ""
@@ -4656,8 +5168,8 @@ msgstr ""
#: i2p2www/pages/site/docs/applications/supported.html:568
msgid ""
-"Any website hosted anonymously on I2P, reachable through the I2P router's "
-"HTTP proxy."
+"Any website hosted anonymously on I2P, reachable through the I2P router's"
+" HTTP proxy."
msgstr ""
#: i2p2www/pages/site/docs/applications/supported.html:576
@@ -4717,7 +5229,8 @@ msgstr ""
#: i2p2www/pages/site/docs/applications/supported.html:671
msgid ""
-"Gateways allowing I2P users to access content hosted on the public Internet."
+"Gateways allowing I2P users to access content hosted on the public "
+"Internet."
msgstr ""
#: i2p2www/pages/site/docs/applications/supported.html:678
@@ -4727,9 +5240,12 @@ msgstr ""
#: i2p2www/pages/site/docs/applications/supported.html:688
msgid ""
"Lightweight web server and Java servlet container. I2P is tightly\n"
-"integrated with a bundled copy of Jetty which by default is configured to\n"
-"host the user's eepsite. The bundled\n"
-"Jetty also serves the I2P router console and web applications bundled with\n"
+"integrated with a bundled copy of Jetty which by default is configured to"
+"\n"
+"host the user's eepsite. The "
+"bundled\n"
+"Jetty also serves the I2P router console and web applications bundled "
+"with\n"
"I2P."
msgstr ""
@@ -4763,7 +5279,8 @@ msgstr ""
#: i2p2www/pages/site/docs/discussions/naming.html:4
#, python-format
msgid ""
-"NOTE: The following is a discussion of the reasons behind the I2P naming system,\n"
+"NOTE: The following is a discussion of the reasons behind the I2P naming "
+"system,\n"
"common arguments and possible alternatives.\n"
"See the naming page for current documentation."
msgstr ""
@@ -4774,49 +5291,72 @@ msgstr ""
#: i2p2www/pages/site/docs/discussions/naming.html:12
msgid ""
-"Naming within I2P has been an oft-debated topic since the very beginning with\n"
-"advocates across the spectrum of possibilities. However, given I2P's inherent\n"
-"demand for secure communication and decentralized operation, the traditional\n"
-"DNS-style naming system is clearly out, as are \"majority rules\" voting systems."
+"Naming within I2P has been an oft-debated topic since the very beginning "
+"with\n"
+"advocates across the spectrum of possibilities. However, given I2P's "
+"inherent\n"
+"demand for secure communication and decentralized operation, the "
+"traditional\n"
+"DNS-style naming system is clearly out, as are \"majority rules\" voting "
+"systems."
msgstr ""
#: i2p2www/pages/site/docs/discussions/naming.html:19
msgid ""
-"I2P does not promote the use of DNS-like services though, as the damage done\n"
-"by hijacking a site can be tremendous - and insecure destinations have no\n"
-"value. DNSsec itself still falls back on registrars and certificate authorities,\n"
-"while with I2P, requests sent to a destination cannot be intercepted or the reply\n"
-"spoofed, as they are encrypted to the destination's public keys, and a destination\n"
-"itself is just a pair of public keys and a certificate. DNS-style systems on the\n"
-"other hand allow any of the name servers on the lookup path to mount simple denial\n"
-"of service and spoofing attacks. Adding on a certificate authenticating the\n"
-"responses as signed by some centralized certificate authority would address many of\n"
-"the hostile nameserver issues but would leave open replay attacks as well as \n"
+"I2P does not promote the use of DNS-like services though, as the damage "
+"done\n"
+"by hijacking a site can be tremendous - and insecure destinations have no"
+"\n"
+"value. DNSsec itself still falls back on registrars and certificate "
+"authorities,\n"
+"while with I2P, requests sent to a destination cannot be intercepted or "
+"the reply\n"
+"spoofed, as they are encrypted to the destination's public keys, and a "
+"destination\n"
+"itself is just a pair of public keys and a certificate. DNS-style "
+"systems on the\n"
+"other hand allow any of the name servers on the lookup path to mount "
+"simple denial\n"
+"of service and spoofing attacks. Adding on a certificate authenticating "
+"the\n"
+"responses as signed by some centralized certificate authority would "
+"address many of\n"
+"the hostile nameserver issues but would leave open replay attacks as well"
+" as \n"
"hostile certificate authority attacks."
msgstr ""
#: i2p2www/pages/site/docs/discussions/naming.html:33
msgid ""
-"Voting style naming is dangerous as well, especially given the effectiveness of\n"
-"Sybil attacks in anonymous systems - the attacker can simply create an arbitrarily\n"
-"high number of peers and \"vote\" with each to take over a given name. Proof-of-work\n"
-"methods can be used to make identity non-free, but as the network grows the load\n"
-"required to contact everyone to conduct online voting is implausible, or if the\n"
+"Voting style naming is dangerous as well, especially given the "
+"effectiveness of\n"
+"Sybil attacks in anonymous systems - the attacker can simply create an "
+"arbitrarily\n"
+"high number of peers and \"vote\" with each to take over a given name. "
+"Proof-of-work\n"
+"methods can be used to make identity non-free, but as the network grows "
+"the load\n"
+"required to contact everyone to conduct online voting is implausible, or "
+"if the\n"
"full network is not queried, different sets of answers may be reachable."
msgstr ""
#: i2p2www/pages/site/docs/discussions/naming.html:42
msgid ""
-"As with the Internet however, I2P is keeping the design and operation of a \n"
-"naming system out of the (IP-like) communication layer. The bundled naming library\n"
-"includes a simple service provider interface which alternate naming systems can\n"
-"plug into, allowing end users to drive what sort of naming tradeoffs they prefer."
+"As with the Internet however, I2P is keeping the design and operation of "
+"a \n"
+"naming system out of the (IP-like) communication layer. The bundled "
+"naming library\n"
+"includes a simple service provider interface which alternate naming systems can\n"
+"plug into, allowing end users to drive what sort of naming tradeoffs they"
+" prefer."
msgstr ""
#: i2p2www/pages/site/docs/discussions/naming.html:50
msgid ""
-"See also Names: Decentralized, "
-"Secure, Human-Meaningful: Choose Two."
+"See also Names: "
+"Decentralized, Secure, Human-Meaningful: Choose Two."
msgstr ""
#: i2p2www/pages/site/docs/discussions/naming.html:55
@@ -4827,26 +5367,36 @@ msgstr ""
msgid ""
"Q:\n"
"What to do if some hosts \n"
-"do not agree on one address and if some addresses are working, others are not? \n"
+"do not agree on one address and if some addresses are working, others are"
+" not? \n"
"Who is the right source of a name?"
msgstr ""
#: i2p2www/pages/site/docs/discussions/naming.html:64
msgid ""
"A:\n"
-"You don't. This is actually a critical difference between names on I2P and how \n"
-"DNS works - names in I2P are human readable, secure, but not globally \n"
-"unique. This is by design, and an inherent part of our need for security."
+"You don't. This is actually a critical difference between names on I2P "
+"and how \n"
+"DNS works - names in I2P are human readable, secure, but not globally"
+" \n"
+"unique. This is by design, and an inherent part of our need for "
+"security."
msgstr ""
#: i2p2www/pages/site/docs/discussions/naming.html:70
msgid ""
-"If I could somehow convince you to change the destination associated with some \n"
-"name, I'd successfully \"take over\" the site, and under no circumstances is that \n"
-"acceptable. Instead, what we do is make names locally unique: they are \n"
-"what you use to call a site, just as how you can call things whatever \n"
-"you want when you add them to your browser's bookmarks, or your IM client's \n"
-"buddy list. Who you call \"Boss\" may be who someone else calls \"Sally\"."
+"If I could somehow convince you to change the destination associated with"
+" some \n"
+"name, I'd successfully \"take over\" the site, and under no circumstances"
+" is that \n"
+"acceptable. Instead, what we do is make names locally unique: "
+"they are \n"
+"what you use to call a site, just as how you can call things "
+"whatever \n"
+"you want when you add them to your browser's bookmarks, or your IM "
+"client's \n"
+"buddy list. Who you call \"Boss\" may be who someone else calls "
+"\"Sally\"."
msgstr ""
#: i2p2www/pages/site/docs/discussions/naming.html:78
@@ -4862,33 +5412,44 @@ msgstr ""
#: i2p2www/pages/site/docs/discussions/naming.html:89
msgid ""
"Inefficiency:\n"
-"The whole hosts.txt is downloaded (if it has changed, since eepget uses the etag and last-modified headers).\n"
+"The whole hosts.txt is downloaded (if it has changed, since eepget uses "
+"the etag and last-modified headers).\n"
"It's about 400K right now for almost 800 hosts."
msgstr ""
#: i2p2www/pages/site/docs/discussions/naming.html:94
msgid ""
-"True, but this isn't a lot of traffic in the context of i2p, which is itself wildly inefficient\n"
-"(floodfill databases, huge encryption overhead and padding, garlic routing, etc.).\n"
-"If you downloaded a hosts.txt file from someone every 12 hours it averages out to about 10 bytes/sec."
+"True, but this isn't a lot of traffic in the context of i2p, which is "
+"itself wildly inefficient\n"
+"(floodfill databases, huge encryption overhead and padding, garlic "
+"routing, etc.).\n"
+"If you downloaded a hosts.txt file from someone every 12 hours it "
+"averages out to about 10 bytes/sec."
msgstr ""
#: i2p2www/pages/site/docs/discussions/naming.html:99
msgid ""
-"As is usually the case in i2p, there is a fundamental tradeoff here between anonymity and efficiency.\n"
-"Some would say that using the etag and last-modified headers is hazardous because it exposes when you\n"
+"As is usually the case in i2p, there is a fundamental tradeoff here "
+"between anonymity and efficiency.\n"
+"Some would say that using the etag and last-modified headers is hazardous"
+" because it exposes when you\n"
"last requested the data.\n"
-"Others have suggested asking for specific keys only (similar to what jump services do, but\n"
+"Others have suggested asking for specific keys only (similar to what jump"
+" services do, but\n"
"in a more automated fashion), possibly at a further cost in anonymity."
msgstr ""
#: i2p2www/pages/site/docs/discussions/naming.html:106
#, python-format
msgid ""
-"Possible improvements would be a replacement or supplement to addressbook (see %(i2host)sp),\n"
-"or something simple like subscribing to http://example.i2p/cgi-bin/recenthosts.cgi rather than http://example.i2p/hosts.txt.\n"
-"If a hypothetical recenthosts.cgi distributed all hosts from the last 24 hours, for example,\n"
-"that could be both more efficient and more anonymous than the current hosts.txt with last-modified and etag."
+"Possible improvements would be a replacement or supplement to addressbook"
+" (see %(i2host)sp),\n"
+"or something simple like subscribing to http://example.i2p/cgi-"
+"bin/recenthosts.cgi rather than http://example.i2p/hosts.txt.\n"
+"If a hypothetical recenthosts.cgi distributed all hosts from the last 24 "
+"hours, for example,\n"
+"that could be both more efficient and more anonymous than the current "
+"hosts.txt with last-modified and etag."
msgstr ""
#: i2p2www/pages/site/docs/discussions/naming.html:112
@@ -4898,14 +5459,17 @@ msgid ""
"%(url)s.\n"
"This script returns an Etag with a timestamp.\n"
"When a request comes in with the If-None-Match etag,\n"
-"the script ONLY returns new hosts since that timestamp, or 304 Not Modified if there are none.\n"
-"In this way, the script efficiently returns only the hosts the subscriber\n"
+"the script ONLY returns new hosts since that timestamp, or 304 Not "
+"Modified if there are none.\n"
+"In this way, the script efficiently returns only the hosts the subscriber"
+"\n"
"does not know about, in an addressbook-compatible manner."
msgstr ""
#: i2p2www/pages/site/docs/discussions/naming.html:121
msgid ""
-"So the inefficiency is not a big issue and there are several ways to improve things without\n"
+"So the inefficiency is not a big issue and there are several ways to "
+"improve things without\n"
"radical change."
msgstr ""
@@ -4919,30 +5483,37 @@ msgstr ""
#: i2p2www/pages/site/docs/discussions/naming.html:132
msgid ""
"As far as network traffic see above.\n"
-"But unless you're going to do a slow real-time query over the network for\n"
-"a key, you need to have the whole set of keys stored locally, at a cost of about 500 bytes per key."
+"But unless you're going to do a slow real-time query over the network for"
+"\n"
+"a key, you need to have the whole set of keys stored locally, at a cost "
+"of about 500 bytes per key."
msgstr ""
#: i2p2www/pages/site/docs/discussions/naming.html:139
msgid ""
"Requires configuration and \"trust\":\n"
-"Out-of-the-box addressbook is only subscribed to http://www.i2p2.i2p/hosts.txt, which is rarely updated,\n"
+"Out-of-the-box addressbook is only subscribed to "
+"http://www.i2p2.i2p/hosts.txt, which is rarely updated,\n"
"leading to poor new-user experience."
msgstr ""
#: i2p2www/pages/site/docs/discussions/naming.html:144
msgid ""
-"This is very much intentional. jrandom wants a user to \"trust\" a hosts.txt\n"
+"This is very much intentional. jrandom wants a user to \"trust\" a "
+"hosts.txt\n"
"provider, and as he likes to say, \"trust is not a boolean\".\n"
-"The configuration step attempts to force users to think about issues of trust in an anonymous network."
+"The configuration step attempts to force users to think about issues of "
+"trust in an anonymous network."
msgstr ""
#: i2p2www/pages/site/docs/discussions/naming.html:149
msgid ""
"As another example, the \"Eepsite Unknown\" error page in the HTTP Proxy\n"
-"lists some jump services, but doesn't \"recommend\" any one in particular,\n"
+"lists some jump services, but doesn't \"recommend\" any one in "
+"particular,\n"
"and it's up to the user to pick one (or not).\n"
-"jrandom would say we trust the listed providers enough to list them but not enough to\n"
+"jrandom would say we trust the listed providers enough to list them but "
+"not enough to\n"
"automatically go fetch the key from them."
msgstr ""
@@ -4959,13 +5530,14 @@ msgstr ""
#: i2p2www/pages/site/docs/discussions/naming.html:166
msgid ""
-"Unfortunately real-time lookups over i2p would significantly slow down web "
-"browsing."
+"Unfortunately real-time lookups over i2p would significantly slow down "
+"web browsing."
msgstr ""
#: i2p2www/pages/site/docs/discussions/naming.html:169
msgid ""
-"Also, DNS is based on lookups with limited caching and time-to-live, while i2p\n"
+"Also, DNS is based on lookups with limited caching and time-to-live, "
+"while i2p\n"
"keys are permanent."
msgstr ""
@@ -4984,21 +5556,26 @@ msgid ""
"Yes it depends on a few servers that you have configured.\n"
"Within i2p, servers and services come and go.\n"
"Any other centralized system (for example DNS root servers) would\n"
-"have the same problem. A completely decentralized system (everybody is authoritative)\n"
-"is possible by implementing an \"everybody is a root DNS server\" solution, or by\n"
-"something even simpler, like a script that adds everybody in your hosts.txt to your addressbook."
+"have the same problem. A completely decentralized system (everybody is "
+"authoritative)\n"
+"is possible by implementing an \"everybody is a root DNS server\" "
+"solution, or by\n"
+"something even simpler, like a script that adds everybody in your "
+"hosts.txt to your addressbook."
msgstr ""
#: i2p2www/pages/site/docs/discussions/naming.html:190
msgid ""
-"People advocating all-authoritative solutions generally haven't thought through\n"
+"People advocating all-authoritative solutions generally haven't thought "
+"through\n"
"the issues of conflicts and hijacking, however."
msgstr ""
#: i2p2www/pages/site/docs/discussions/naming.html:196
msgid ""
"Awkward, not real-time:\n"
-"It's a patchwork of hosts.txt providers, key-add web form providers, jump service providers,\n"
+"It's a patchwork of hosts.txt providers, key-add web form providers, jump"
+" service providers,\n"
"eepsite status reporters.\n"
"Jump servers and subscriptions are a pain, it should just work like DNS."
msgstr ""
@@ -5009,7 +5586,8 @@ msgstr ""
#: i2p2www/pages/site/docs/discussions/naming.html:207
msgid ""
-"So, in summary, the current system is not horribly broken, inefficient, or un-scalable,\n"
+"So, in summary, the current system is not horribly broken, inefficient, "
+"or un-scalable,\n"
"and proposals to \"just use DNS\" aren't well thought-through."
msgstr ""
@@ -5019,7 +5597,8 @@ msgstr ""
#: i2p2www/pages/site/docs/discussions/naming.html:213
msgid ""
-"The I2P source contains several pluggable naming systems and supports configuration options\n"
+"The I2P source contains several pluggable naming systems and supports "
+"configuration options\n"
"to enable experimentation with naming systems."
msgstr ""
@@ -5041,8 +5620,8 @@ msgstr ""
#: i2p2www/pages/site/docs/discussions/naming.html:234
msgid ""
-"AddressDB - Each host is listed in a separate file in a addressDb/ "
-"directory."
+"AddressDB - Each host is listed in a separate file in a addressDb/"
+" directory."
msgstr ""
#: i2p2www/pages/site/docs/discussions/naming.html:237
@@ -5067,7 +5646,8 @@ msgstr ""
#: i2p2www/pages/site/docs/discussions/naming.html:253
msgid ""
-"The current naming system can be changed with the advanced config option 'i2p.naming.impl'\n"
+"The current naming system can be changed with the advanced config option "
+"'i2p.naming.impl'\n"
"(restart required).\n"
"See core/java/src/net/i2p/client/naming for details."
msgstr ""
@@ -5075,7 +5655,8 @@ msgstr ""
#: i2p2www/pages/site/docs/discussions/naming.html:258
msgid ""
"Any new system should be stacked with HostsTxt, or should\n"
-"implement local storage and/or the addressbook subscription functions, since addressbook\n"
+"implement local storage and/or the addressbook subscription functions, "
+"since addressbook\n"
"only knows about the hosts.txt files and format."
msgstr ""
@@ -5085,40 +5666,50 @@ msgstr ""
#: i2p2www/pages/site/docs/discussions/naming.html:265
msgid ""
-"I2P destinations contain a certificate, however at the moment that certificate\n"
+"I2P destinations contain a certificate, however at the moment that "
+"certificate\n"
"is always null.\n"
-"With a null certificate, base64 destinations are always 516 bytes ending in \"AAAA\",\n"
-"and this is checked in the addressbook merge mechanism, and possibly other places.\n"
-"Also, there is no method available to generate a certificate or add it to a\n"
+"With a null certificate, base64 destinations are always 516 bytes ending "
+"in \"AAAA\",\n"
+"and this is checked in the addressbook merge mechanism, and possibly "
+"other places.\n"
+"Also, there is no method available to generate a certificate or add it to"
+" a\n"
"destination. So these will have to be updated to implement certificates."
msgstr ""
#: i2p2www/pages/site/docs/discussions/naming.html:273
#, python-format
msgid ""
-"One possible use of certificates is for proof "
-"of work."
+"One possible use of certificates is for proof of work."
msgstr ""
#: i2p2www/pages/site/docs/discussions/naming.html:276
msgid ""
-"Another is for \"subdomains\" (in quotes because there is really no such thing,\n"
-"i2p uses a flat naming system) to be signed by the 2nd level domain's keys."
+"Another is for \"subdomains\" (in quotes because there is really no such "
+"thing,\n"
+"i2p uses a flat naming system) to be signed by the 2nd level domain's "
+"keys."
msgstr ""
#: i2p2www/pages/site/docs/discussions/naming.html:280
msgid ""
-"With any certificate implementation must come the method for verifying the\n"
+"With any certificate implementation must come the method for verifying "
+"the\n"
"certificates.\n"
"Presumably this would happen in the addressbook merge code.\n"
-"Is there a method for multiple types of certificates, or multiple certificates?"
+"Is there a method for multiple types of certificates, or multiple "
+"certificates?"
msgstr ""
#: i2p2www/pages/site/docs/discussions/naming.html:286
msgid ""
"Adding on a certificate authenticating the\n"
-"responses as signed by some centralized certificate authority would address many of\n"
-"the hostile nameserver issues but would leave open replay attacks as well as \n"
+"responses as signed by some centralized certificate authority would "
+"address many of\n"
+"the hostile nameserver issues but would leave open replay attacks as well"
+" as \n"
"hostile certificate authority attacks."
msgstr ""
@@ -5133,13 +5724,20 @@ msgstr ""
#: i2p2www/pages/site/docs/how/cryptography.html:10
#, python-format
msgid ""
-"There are a handful of cryptographic algorithms in use within I2P, but we have\n"
-"reduced them to a bare minimum to deal with our needs - one symmetric algorithm\n"
-"one asymmetric algorithm, one signing algorithm, and one hashing algorithm. However, \n"
-"we do combine them in some particular ways to provide message integrity (rather than\n"
-"relying on a MAC). In addition, as much as we hate doing anything new in regards to \n"
-"cryptography, we can't seem to find a reference discussing (or even naming) the \n"
-"technique used in ElGamal/AES+SessionTag (but we're sure others have done it)."
+"There are a handful of cryptographic algorithms in use within I2P, but we"
+" have\n"
+"reduced them to a bare minimum to deal with our needs - one symmetric "
+"algorithm\n"
+"one asymmetric algorithm, one signing algorithm, and one hashing "
+"algorithm. However, \n"
+"we do combine them in some particular ways to provide message integrity "
+"(rather than\n"
+"relying on a MAC). In addition, as much as we hate doing anything new in"
+" regards to \n"
+"cryptography, we can't seem to find a reference discussing (or even "
+"naming) the \n"
+"technique used in ElGamal/AES+SessionTag "
+"(but we're sure others have done it)."
msgstr ""
#: i2p2www/pages/site/docs/how/cryptography.html:20
@@ -5163,23 +5761,28 @@ msgstr ""
#: i2p2www/pages/site/docs/how/cryptography.html:30
#, python-format
msgid ""
-"For end-to-end (destination-to-destination) encryption as a part of ElGamal/AES+SessionTag\n"
-"using the encryption key in the LeaseSet"
+"For end-to-end (destination-to-destination) encryption as a part of ElGamal/AES+SessionTag\n"
+"using the encryption key in the LeaseSet"
msgstr ""
#: i2p2www/pages/site/docs/how/cryptography.html:34
#: i2p2www/pages/site/docs/how/cryptography.html:198
#, python-format
msgid ""
-"For encryption of some netDb stores and queries sent to floodfill routers\n"
+"For encryption of some netDb stores and "
+"queries sent to floodfill routers\n"
"as a part of ElGamal/AES+SessionTag\n"
"(destination-to-router or router-to-router)."
msgstr ""
#: i2p2www/pages/site/docs/how/cryptography.html:41
msgid ""
-"We use common primes for 2048 ElGamal encryption and decryption, as given by IETF RFC-3526.\n"
-"We currently only use ElGamal to encrypt the IV and session key in a single block, followed by the \n"
+"We use common primes for 2048 ElGamal encryption and decryption, as given"
+" by IETF RFC-3526.\n"
+"We currently only use ElGamal to encrypt the IV and session key in a "
+"single block, followed by the \n"
"AES encrypted payload using that key and IV."
msgstr ""
@@ -5189,13 +5792,15 @@ msgstr ""
#: i2p2www/pages/site/docs/how/cryptography.html:64
msgid ""
-"The H(data) is the SHA256 of the data that is encrypted in the ElGamal block,\n"
+"The H(data) is the SHA256 of the data that is encrypted in the ElGamal "
+"block,\n"
"and is preceded by a nonzero byte. \n"
"This byte could be random, but as implemented it is always 0xFF.\n"
"It could possibly be used for flags in the future.\n"
"The data encrypted in the block may be up to 222 bytes long.\n"
"As the encrypted data may contain a substantial number of zeros if the\n"
-"cleartext is smaller than 222 bytes, it is recommended that higher layers pad\n"
+"cleartext is smaller than 222 bytes, it is recommended that higher layers"
+" pad\n"
"the cleartext to 222 bytes with random data.\n"
"Total length: typically 255 bytes."
msgstr ""
@@ -5206,7 +5811,8 @@ msgstr ""
#: i2p2www/pages/site/docs/how/cryptography.html:102
msgid ""
-"Each encrypted part is prepended with zeros to a size of exactly 257 bytes.\n"
+"Each encrypted part is prepended with zeros to a size of exactly 257 "
+"bytes.\n"
"Total length: 514 bytes.\n"
"In typical usage, higher layers pad the cleartext data to 222 bytes,\n"
"resulting in an unencrypted block of 255 bytes.\n"
@@ -5222,7 +5828,8 @@ msgstr ""
#: i2p2www/pages/site/docs/how/cryptography.html:115
msgid ""
"The shared prime is the \n"
-"[Oakley prime for 2048 bit keys]"
+"[Oakley prime "
+"for 2048 bit keys]"
msgstr ""
#: i2p2www/pages/site/docs/how/cryptography.html:122
@@ -5250,17 +5857,23 @@ msgstr ""
#, python-format
msgid ""
"This should be safe for use with the Oakley primes, per\n"
-"On Diffie-Hellman Key Agreement with Short Exponents - van Oorschot, Weiner\n"
-"at EuroCrypt 96, and crypto++'s benchmarks.\n"
-"Benchmarks originally at this link, now dead,\n"
-"rescued from the wayback machine, dated Apr 23, 2008."
+"On Diffie-Hellman Key Agreement with Short Exponents "
+"- van Oorschot, Weiner\n"
+"at EuroCrypt 96, and crypto++'s "
+"benchmarks.\n"
+"Benchmarks originally at this link, now dead,\n"
+"rescued from the wayback machine,"
+" dated Apr 23, 2008."
msgstr ""
#: i2p2www/pages/site/docs/how/cryptography.html:160
#, python-format
msgid ""
-"Also, Koshiba & Kurosawa: Short Exponent Diffie-Hellman Problems (PKC 2004, LNCS 2947, pp. 173-186)\n"
-"(full text on Google Books) apparently supports this, according to\n"
+"Also, Koshiba & Kurosawa: Short Exponent Diffie-"
+"Hellman Problems (PKC 2004, LNCS 2947, pp. 173-186)\n"
+"(full text on Google Books) apparently "
+"supports this, according to\n"
"this sci.crypt thread.\n"
"The remainder of the PrivateKey is padded with zeroes."
msgstr ""
@@ -5269,8 +5882,10 @@ msgstr ""
msgid ""
"Prior to release 0.9.8, all routers used the short exponent.\n"
"As of release 0.9.8, 64-bit x86 routers use a full 2048-bit exponent.\n"
-"Other routers continue to use the short exponent due to concerns about processor load.\n"
-"The transition to a longer exponent for these platforms is a topic for further study."
+"Other routers continue to use the short exponent due to concerns about "
+"processor load.\n"
+"The transition to a longer exponent for these platforms is a topic for "
+"further study."
msgstr ""
#: i2p2www/pages/site/docs/how/cryptography.html:176
@@ -5282,7 +5897,8 @@ msgstr ""
#: i2p2www/pages/site/docs/how/cryptography.html:177
msgid ""
-"The vulnerability of the network to an ElGamal attack and the impact of transitioning to a longer bit length is to be studied.\n"
+"The vulnerability of the network to an ElGamal attack and the impact of "
+"transitioning to a longer bit length is to be studied.\n"
"It may be quite difficult to make any change backward-compatible."
msgstr ""
@@ -5304,24 +5920,30 @@ msgstr ""
#: i2p2www/pages/site/docs/how/cryptography.html:204
#, python-format
msgid ""
-"For encryption of periodic tunnel test"
-" messages sent from the router to itself, through its own tunnels."
+"For encryption of periodic tunnel "
+"test messages sent from the router to itself, through its own "
+"tunnels."
msgstr ""
#: i2p2www/pages/site/docs/how/cryptography.html:209
#, python-format
msgid ""
"We use AES with 256 bit keys and 128 bit blocks in CBC mode.\n"
-"The padding used is specified in IETF RFC-2313 (PKCS#5 1.5, section 8.1 (for block type 02)).\n"
-"In this case, padding exists of pseudorandomly generated octets to match 16 byte blocks.\n"
-"Specifically, see [the CBC code] and the Cryptix AES\n"
-"[implementation], as well as the padding, found in the\n"
+"The padding used is specified in IETF RFC-2313 "
+"(PKCS#5 1.5, section 8.1 (for block type 02)).\n"
+"In this case, padding exists of pseudorandomly generated octets to match "
+"16 byte blocks.\n"
+"Specifically, see [the CBC code] and the "
+"Cryptix AES\n"
+"[implementation], as well as the padding, found"
+" in the\n"
"ElGamalAESEngine.getPadding function."
msgstr ""
#: i2p2www/pages/site/docs/how/cryptography.html:274
msgid ""
-"The vulnerability of the network to an AES attack and the impact of transitioning to a longer bit length is to be studied.\n"
+"The vulnerability of the network to an AES attack and the impact of "
+"transitioning to a longer bit length is to be studied.\n"
"It may be quite difficult to make any change backward-compatible."
msgstr ""
@@ -5351,7 +5973,8 @@ msgstr ""
#: i2p2www/pages/site/docs/how/cryptography.html:295
#, python-format
msgid ""
-"Signatures are generated and verified with 1024 bit DSA (L=1024, N=160), as implemented in\n"
+"Signatures are generated and verified with 1024 bit DSA (L=1024, N=160), "
+"as implemented in\n"
"[DSAEngine].\n"
"DSA was chosen because it is much faster for signatures than ElGamal."
msgstr ""
@@ -5359,8 +5982,10 @@ msgstr ""
#: i2p2www/pages/site/docs/how/cryptography.html:350
#, python-format
msgid ""
-"The Signing Public Key is 1024 bits.\n"
-"The Signing Private Key is 160 bits."
+"The Signing Public"
+" Key is 1024 bits.\n"
+"The Signing "
+"Private Key is 160 bits."
msgstr ""
#: i2p2www/pages/site/docs/how/cryptography.html:357
@@ -5368,15 +5993,18 @@ msgstr ""
msgid ""
"NIST 800-57\n"
"recommends a minimum of (L=2048, N=224) for usage beyond 2010.\n"
-"This may be mitigated somewhat by the \"cryptoperiod\", or lifespan of a given key."
+"This may be mitigated somewhat by the \"cryptoperiod\", or lifespan of a "
+"given key."
msgstr ""
#: i2p2www/pages/site/docs/how/cryptography.html:363
msgid ""
"The prime number was chosen in 2003,\n"
-"and the person that chose the number (TheCrypto) is currently no longer an I2P developer.\n"
+"and the person that chose the number (TheCrypto) is currently no longer "
+"an I2P developer.\n"
"As such, we do not know if the prime chosen is a 'strong prime'.\n"
-"If a larger prime is chosen for future purposes, this should be a strong prime, and we will document the construction process."
+"If a larger prime is chosen for future purposes, this should be a strong "
+"prime, and we will document the construction process."
msgstr ""
#: i2p2www/pages/site/docs/how/cryptography.html:374
@@ -5395,10 +6023,14 @@ msgstr ""
#: i2p2www/pages/site/docs/how/cryptography.html:386
msgid ""
-"As of release 0.9.12, the router supports additional signature algorithms that are more secure than 1024-bit DSA.\n"
-"The first usage is for Destinations; support for Router Identities was added in release 0.9.16.\n"
-"Support for migrating existing Destinations from old to new signatures will be added in a future release.\n"
-"Signature type is encoded in the Destination and Router Identity, so that new signature algorithms\n"
+"As of release 0.9.12, the router supports additional signature algorithms"
+" that are more secure than 1024-bit DSA.\n"
+"The first usage is for Destinations; support for Router Identities was "
+"added in release 0.9.16.\n"
+"Support for migrating existing Destinations from old to new signatures "
+"will be added in a future release.\n"
+"Signature type is encoded in the Destination and Router Identity, so that"
+" new signature algorithms\n"
"or curves may be added at any time.\n"
"The current supported signature types are as follows:"
msgstr ""
@@ -5406,24 +6038,30 @@ msgstr ""
#: i2p2www/pages/site/docs/how/cryptography.html:407
msgid ""
"ECDSA uses the standard NIST curves and standard SHA-2 hashes.\n"
-"We will migrate new destinations to ECDSA-SHA256-P256 in the 0.9.16 - 0.9.19 release time frame.\n"
-"Usage for Router Identities is supported as of release 0.9.16 and migration may occur in early 2015."
+"We will migrate new destinations to ECDSA-SHA256-P256 in the 0.9.16 - "
+"0.9.19 release time frame.\n"
+"Usage for Router Identities is supported as of release 0.9.16 and "
+"migration may occur in early 2015."
msgstr ""
#: i2p2www/pages/site/docs/how/cryptography.html:416
msgid ""
"Standard RSA with the public exponent F4 = 65537.\n"
-"RSA is now used for signing all out-of-band trusted content, including router updates, reseeding, plugins, and news.\n"
-"The signatures are embedded in the \"su3\" format documented on the router updates page.\n"
+"RSA is now used for signing all out-of-band trusted content, including "
+"router updates, reseeding, plugins, and news.\n"
+"The signatures are embedded in the \"su3\" format documented on the "
+"router updates page.\n"
"4096-bit keys are recommended and used by all known signers.\n"
-"RSA is not used, or planned for use, in any in-network Destinations or Router Identities."
+"RSA is not used, or planned for use, in any in-network Destinations or "
+"Router Identities."
msgstr ""
#: i2p2www/pages/site/docs/how/cryptography.html:427
msgid ""
"Standard EdDSA using curve 25519 and standard 512-bit SHA-2 hashes.\n"
"Supported as of release 0.9.15.\n"
-"Migration for Destinations and Router Identities is scheduled for mid-2015."
+"Migration for Destinations and Router Identities is scheduled for "
+"mid-2015."
msgstr ""
#: i2p2www/pages/site/docs/how/cryptography.html:437
@@ -5435,7 +6073,8 @@ msgstr ""
#: i2p2www/pages/site/docs/how/cryptography.html:443
msgid ""
-"The vulnerability of the network to a SHA-256 attack and the impact of transitioning to a longer hash is to be studied.\n"
+"The vulnerability of the network to a SHA-256 attack and the impact of "
+"transitioning to a longer hash is to be studied.\n"
"It may be quite difficult to make any change backward-compatible."
msgstr ""
@@ -5446,13 +6085,16 @@ msgstr ""
#: i2p2www/pages/site/docs/how/cryptography.html:455
msgid ""
"At the lowest protocol layer,\n"
-"point-to-point inter-router communication is protected by the transport layer security.\n"
+"point-to-point inter-router communication is protected by the transport "
+"layer security.\n"
"Both transports use 256 byte (2048 bit) Diffie-Hellman key exchange\n"
"using\n"
-"the same shared prime and generator as specified above for ElGamal,\n"
+"the same shared prime and generator as specified "
+"above for ElGamal,\n"
"followed by symmetric AES encryption as described above.\n"
"This provides\n"
-"perfect forward secrecy\n"
+"perfect "
+"forward secrecy\n"
"on the transport links."
msgstr ""
@@ -5463,17 +6105,24 @@ msgstr ""
#: i2p2www/pages/site/docs/how/cryptography.html:469
#, python-format
msgid ""
-"NTCP connections are negotiated with a 2048 Diffie-Hellman implementation,\n"
-"using the router's identity to proceed with a station to station agreement, followed by\n"
-"some encrypted protocol specific fields, with all subsequent data encrypted with AES\n"
+"NTCP connections are negotiated with a 2048 Diffie-Hellman "
+"implementation,\n"
+"using the router's identity to proceed with a station to station "
+"agreement, followed by\n"
+"some encrypted protocol specific fields, with all subsequent data "
+"encrypted with AES\n"
"(as above).\n"
-"The primary reason to do the DH negotiation instead of using ElGamalAES+SessionTag is that it provides '(perfect) forward secrecy', while ElGamalAES+SessionTag does not."
+"The primary reason to do the DH negotiation instead of using ElGamalAES+SessionTag is that it provides '(perfect) "
+"forward secrecy', while ElGamalAES+SessionTag does not."
msgstr ""
#: i2p2www/pages/site/docs/how/cryptography.html:477
msgid ""
-"In order to migrate to a more standardized implementation (TLS/SSL or even "
-"SSH), the following issues must be addressed:"
+"In order to migrate to a more standardized implementation (TLS/SSL or "
+"even SSH), the following issues must be addressed:"
msgstr ""
#: i2p2www/pages/site/docs/how/cryptography.html:481
@@ -5484,7 +6133,8 @@ msgstr ""
#: i2p2www/pages/site/docs/how/cryptography.html:484
msgid ""
-"Can we simplify/avoid the x509 or other certificate formats and use our own RouterInfo structure (which \n"
+"Can we simplify/avoid the x509 or other certificate formats and use our "
+"own RouterInfo structure (which \n"
"contains the ElGamal and DSA keys)?"
msgstr ""
@@ -5499,10 +6149,14 @@ msgstr ""
#: i2p2www/pages/site/docs/how/cryptography.html:494
msgid ""
-"SSU (the UDP transport) encrypts each packet with AES256/CBC with both an explicit IV and MAC \n"
-"(HMAC-MD5-128) after agreeing upon an ephemeral session key through a 2048 bit \n"
-"Diffie-Hellman exchange, station-to-station authentication with the other \n"
-"router's DSA key, plus each network message has their own hash for local integrity \n"
+"SSU (the UDP transport) encrypts each packet with AES256/CBC with both an"
+" explicit IV and MAC \n"
+"(HMAC-MD5-128) after agreeing upon an ephemeral session key through a "
+"2048 bit \n"
+"Diffie-Hellman exchange, station-to-station authentication with the other"
+" \n"
+"router's DSA key, plus each network message has their own hash for local "
+"integrity \n"
"checking."
msgstr ""
@@ -5515,8 +6169,10 @@ msgstr ""
#, python-format
msgid ""
"WARNING - I2P's HMAC-MD5-128 used in SSU is apparently non-standard.\n"
-"Apparently, an early version of SSU used HMAC-SHA256, and then it was switched\n"
-"to MD5-128 for performance reasons, but left the 32-byte buffer size intact.\n"
+"Apparently, an early version of SSU used HMAC-SHA256, and then it was "
+"switched\n"
+"to MD5-128 for performance reasons, but left the 32-byte buffer size "
+"intact.\n"
"See HMACGenerator.java and\n"
"the 2005-07-05 status notes\n"
"for details."
@@ -5537,58 +6193,91 @@ msgstr ""
#: i2p2www/pages/site/docs/how/elgamal-aes.html:11
msgid ""
-"As an unreliable, unordered, message based system, I2P uses a simple combination \n"
-"of asymmetric and symmetric encryption algorithms to provide data confidentiality \n"
-"and integrity to garlic messages. As a whole, the combination is referred \n"
-"to as ElGamal/AES+SessionTags, but that is an excessively verbose way to describe \n"
+"As an unreliable, unordered, message based system, I2P uses a simple "
+"combination \n"
+"of asymmetric and symmetric encryption algorithms to provide data "
+"confidentiality \n"
+"and integrity to garlic messages. As a whole, the combination is referred"
+" \n"
+"to as ElGamal/AES+SessionTags, but that is an excessively verbose way to "
+"describe \n"
"the use of 2048bit ElGamal, AES256, SHA256, and 32 byte nonces."
msgstr ""
#: i2p2www/pages/site/docs/how/elgamal-aes.html:19
#: i2p2www/pages/site/docs/how/tech-intro.html:512
msgid ""
-"The first time a router wants to encrypt a garlic message to another router, \n"
-"they encrypt the keying material for an AES256 session key with ElGamal and \n"
-"append the AES256/CBC encrypted payload after that encrypted ElGamal block. \n"
-"In addition to the encrypted payload, the AES encrypted section contains the \n"
-"payload length, the SHA256 hash of the unencrypted payload, as well as a number \n"
-"of \"session tags\" - random 32 byte nonces. The next time the sender wants \n"
-"to encrypt a garlic message to another router, rather than ElGamal encrypt \n"
-"a new session key they simply pick one of the previously delivered session \n"
-"tags and AES encrypt the payload like before, using the session key used with \n"
-"that session tag, prepended with the session tag itself. When a router receives \n"
-"a garlic encrypted message, they check the first 32 bytes to see if it matches \n"
-"an available session tag - if it does, they simply AES decrypt the message, \n"
+"The first time a router wants to encrypt a garlic message to another "
+"router, \n"
+"they encrypt the keying material for an AES256 session key with ElGamal "
+"and \n"
+"append the AES256/CBC encrypted payload after that encrypted ElGamal "
+"block. \n"
+"In addition to the encrypted payload, the AES encrypted section contains "
+"the \n"
+"payload length, the SHA256 hash of the unencrypted payload, as well as a "
+"number \n"
+"of \"session tags\" - random 32 byte nonces. The next time the sender "
+"wants \n"
+"to encrypt a garlic message to another router, rather than ElGamal "
+"encrypt \n"
+"a new session key they simply pick one of the previously delivered "
+"session \n"
+"tags and AES encrypt the payload like before, using the session key used "
+"with \n"
+"that session tag, prepended with the session tag itself. When a router "
+"receives \n"
+"a garlic encrypted message, they check the first 32 bytes to see if it "
+"matches \n"
+"an available session tag - if it does, they simply AES decrypt the "
+"message, \n"
"but if it does not, they ElGamal decrypt the first block."
msgstr ""
#: i2p2www/pages/site/docs/how/elgamal-aes.html:35
#: i2p2www/pages/site/docs/how/tech-intro.html:528
msgid ""
-"Each session tag can be used only once so as to prevent internal adversaries \n"
-"from unnecessarily correlating different messages as being between the same \n"
-"routers. The sender of an ElGamal/AES+SessionTag encrypted message chooses \n"
-"when and how many tags to deliver, prestocking the recipient with enough tags \n"
-"to cover a volley of messages. Garlic messages may detect the successful tag \n"
-"delivery by bundling a small additional message as a clove (a \"delivery status \n"
-"message\") - when the garlic message arrives at the intended recipient and \n"
-"is decrypted successfully, this small delivery status message is one of the \n"
-"cloves exposed and has instructions for the recipient to send the clove back \n"
-"to the original sender (through an inbound tunnel, of course). When the original \n"
-"sender receives this delivery status message, they know that the session tags \n"
+"Each session tag can be used only once so as to prevent internal "
+"adversaries \n"
+"from unnecessarily correlating different messages as being between the "
+"same \n"
+"routers. The sender of an ElGamal/AES+SessionTag encrypted message "
+"chooses \n"
+"when and how many tags to deliver, prestocking the recipient with enough "
+"tags \n"
+"to cover a volley of messages. Garlic messages may detect the successful "
+"tag \n"
+"delivery by bundling a small additional message as a clove (a \"delivery "
+"status \n"
+"message\") - when the garlic message arrives at the intended recipient "
+"and \n"
+"is decrypted successfully, this small delivery status message is one of "
+"the \n"
+"cloves exposed and has instructions for the recipient to send the clove "
+"back \n"
+"to the original sender (through an inbound tunnel, of course). When the "
+"original \n"
+"sender receives this delivery status message, they know that the session "
+"tags \n"
"bundled in the garlic message were successfully delivered."
msgstr ""
#: i2p2www/pages/site/docs/how/elgamal-aes.html:50
msgid ""
"Session tags themselves have a short lifetime, after which they are \n"
-"discarded if not used. In addition, the quantity stored for each key is limited, \n"
-"as are the number of keys themselves - if too many arrive, either new or old \n"
-"messages may be dropped. The sender keeps track whether messages using session \n"
-"tags are getting through, and if there isn't sufficient communication it may \n"
-"drop the ones previously assumed to be properly delivered, reverting back \n"
+"discarded if not used. In addition, the quantity stored for each key is "
+"limited, \n"
+"as are the number of keys themselves - if too many arrive, either new or "
+"old \n"
+"messages may be dropped. The sender keeps track whether messages using "
+"session \n"
+"tags are getting through, and if there isn't sufficient communication it "
+"may \n"
+"drop the ones previously assumed to be properly delivered, reverting back"
+" \n"
"to the full expensive ElGamal encryption.\n"
-"A session will continue to exist until all its tags are exhausted or expire."
+"A session will continue to exist until all its tags are exhausted or "
+"expire."
msgstr ""
#: i2p2www/pages/site/docs/how/elgamal-aes.html:61
@@ -5603,7 +6292,8 @@ msgid ""
"between a Router and a Destination.\n"
"Each Router and Destination maintains its own Session Key Manager to\n"
"keep track of Session Keys and Session Tags.\n"
-"Separate Session Key Managers prevents correlation of multiple Destinations\n"
+"Separate Session Key Managers prevents correlation of multiple "
+"Destinations\n"
"to each other or a Router by adversaries."
msgstr ""
@@ -5624,14 +6314,14 @@ msgid ""
msgstr ""
#: i2p2www/pages/site/docs/how/elgamal-aes.html:85
-msgid ""
-"It is for a new session and contains both ElGamal and AES encrypted blocks"
+msgid "It is for a new session and contains both ElGamal and AES encrypted blocks"
msgstr ""
#: i2p2www/pages/site/docs/how/elgamal-aes.html:88
msgid ""
"When a router receives a message, it will first assume it is from\n"
-"an existing session and attempt to look up the Session Tag and decrypt the following data using AES.\n"
+"an existing session and attempt to look up the Session Tag and decrypt "
+"the following data using AES.\n"
"If that fails, it will assume it is for a new session and attempt to\n"
"decrypt it using ElGamal."
msgstr ""
@@ -5642,7 +6332,8 @@ msgstr ""
#: i2p2www/pages/site/docs/how/elgamal-aes.html:98
msgid ""
-"A New Session ElGamal Message contains two parts, an encrypted ElGamal block\n"
+"A New Session ElGamal Message contains two parts, an encrypted ElGamal "
+"block\n"
"and an encrypted AES block."
msgstr ""
@@ -5668,7 +6359,8 @@ msgid ""
"The 32-byte\n"
"Session Key\n"
"is the identifier for the session.\n"
-"The 32-byte Pre-IV will be used to generate the IV for the AES block that follows;\n"
+"The 32-byte Pre-IV will be used to generate the IV for the AES block that"
+" follows;\n"
"the IV is the first 16 bytes of the SHA-256 Hash of the Pre-IV."
msgstr ""
@@ -5697,8 +6389,8 @@ msgstr ""
#: i2p2www/pages/site/docs/how/elgamal-aes.html:228
#, python-format
msgid ""
-"That many 32-byte Session "
-"Tags"
+"That many 32-byte Session Tags"
msgstr ""
#: i2p2www/pages/site/docs/how/elgamal-aes.html:232
@@ -5709,8 +6401,8 @@ msgstr ""
#: i2p2www/pages/site/docs/how/elgamal-aes.html:236
#, python-format
msgid ""
-"The 32-byte SHA256 Hash of "
-"the payload"
+"The 32-byte SHA256 Hash of"
+" the payload"
msgstr ""
#: i2p2www/pages/site/docs/how/elgamal-aes.html:240
@@ -5720,8 +6412,10 @@ msgstr ""
#: i2p2www/pages/site/docs/how/elgamal-aes.html:244
#, python-format
msgid ""
-"A 32-byte Session Key,\n"
-" to replace the old key, and is only present if preceding flag is 0x01"
+"A 32-byte Session "
+"Key,\n"
+" to replace the old key, and is only present if preceding"
+" flag is 0x01"
msgstr ""
#: i2p2www/pages/site/docs/how/elgamal-aes.html:249
@@ -5742,16 +6436,18 @@ msgstr ""
#, python-format
msgid ""
"The data is then AES Encrypted,\n"
-"using the session key and IV (calculated from the pre-IV) from the ElGamal section.\n"
-"The encrypted AES Block length is variable but is always a multiple of 16 bytes.\n"
+"using the session key and IV (calculated from the pre-IV) from the "
+"ElGamal section.\n"
+"The encrypted AES Block length is variable but is always a multiple of 16"
+" bytes.\n"
""
msgstr ""
#: i2p2www/pages/site/docs/how/elgamal-aes.html:269
#, python-format
msgid ""
-"Actual max payload length, and max block length, is less than 64 KB; see the"
-" I2NP Overview."
+"Actual max payload length, and max block length, is less than 64 KB; see "
+"the I2NP Overview."
msgstr ""
#: i2p2www/pages/site/docs/how/elgamal-aes.html:272
@@ -5780,7 +6476,8 @@ msgstr ""
#: i2p2www/pages/site/docs/how/elgamal-aes.html:309
#, python-format
msgid ""
-"A 32-byte Session Tag\n"
+"A 32-byte Session "
+"Tag\n"
" previously delivered in an AES block"
msgstr ""
@@ -5791,14 +6488,18 @@ msgstr ""
#: i2p2www/pages/site/docs/how/elgamal-aes.html:318
msgid ""
"The session tag also serves as\n"
-"the pre-IV. The IV is the first 16 bytes of the SHA-256 Hash of the sessionTag."
+"the pre-IV. The IV is the first 16 bytes of the SHA-256 Hash of the "
+"sessionTag."
msgstr ""
#: i2p2www/pages/site/docs/how/elgamal-aes.html:323
msgid ""
-"To decode a message from an existing session, a router looks up the Session Tag to find an\n"
-"associated Session Key. If the Session Tag is found, the AES block is decrypted using the associated Session Key.\n"
-"If the tag is not found, the message is assumed to be a New Session Message."
+"To decode a message from an existing session, a router looks up the "
+"Session Tag to find an\n"
+"associated Session Key. If the Session Tag is found, the AES block is "
+"decrypted using the associated Session Key.\n"
+"If the tag is not found, the message is assumed to be a New Session Message."
msgstr ""
#: i2p2www/pages/site/docs/how/elgamal-aes.html:331
@@ -5808,30 +6509,38 @@ msgstr ""
#: i2p2www/pages/site/docs/how/elgamal-aes.html:332
#, python-format
msgid ""
-"As of release 0.9.2, the client may configure the default number of Session Tags to send\n"
+"As of release 0.9.2, the client may configure the default number of "
+"Session Tags to send\n"
"and the low tag threshold for the current session.\n"
-"For brief streaming connections or datagrams, these options may be used to significantly reduce bandwidth.\n"
-"See the I2CP options specification for details.\n"
+"For brief streaming connections or datagrams, these options may be used "
+"to significantly reduce bandwidth.\n"
+"See the I2CP options specification for "
+"details.\n"
"The session settings may also be overridden on a per-message basis.\n"
-"See the I2CP Send Message Expires specification for details."
+"See the I2CP Send Message"
+" Expires specification for details."
msgstr ""
#: i2p2www/pages/site/docs/how/elgamal-aes.html:345
msgid ""
-"There are many possible areas to tune the Session Key Manager's algorithms;\n"
-"some may interact with the streaming library behavior, or have significant\n"
+"There are many possible areas to tune the Session Key Manager's "
+"algorithms;\n"
+"some may interact with the streaming library behavior, or have "
+"significant\n"
"impact on overall performance."
msgstr ""
#: i2p2www/pages/site/docs/how/elgamal-aes.html:352
msgid ""
-"The number of tags delivered could depend on message size, keeping in mind\n"
+"The number of tags delivered could depend on message size, keeping in "
+"mind\n"
"the eventual padding to 1KB at the tunnel message layer."
msgstr ""
#: i2p2www/pages/site/docs/how/elgamal-aes.html:357
msgid ""
-"Clients could send an estimate of session lifetime to the router, as an advisory\n"
+"Clients could send an estimate of session lifetime to the router, as an "
+"advisory\n"
"on the number of tags required."
msgstr ""
@@ -5843,13 +6552,15 @@ msgstr ""
#: i2p2www/pages/site/docs/how/elgamal-aes.html:366
msgid ""
-"The router may assume delivery of Session Tags, or await acknowledgement before using them;\n"
+"The router may assume delivery of Session Tags, or await acknowledgement "
+"before using them;\n"
"there are tradeoffs for each strategy."
msgstr ""
#: i2p2www/pages/site/docs/how/elgamal-aes.html:371
msgid ""
-"For very brief messages, almost the full 222 bytes of the pre-IV and padding fields in the ElGamal block\n"
+"For very brief messages, almost the full 222 bytes of the pre-IV and "
+"padding fields in the ElGamal block\n"
"could be used for the entire message, instead of establishing a session."
msgstr ""
@@ -5861,8 +6572,10 @@ msgstr ""
#: i2p2www/pages/site/docs/how/elgamal-aes.html:381
msgid ""
-"Perhaps things could be more efficient if the Session Tag system was bidirectional,\n"
-"so tags delivered in the 'forward' path could be used in the 'reverse' path,\n"
+"Perhaps things could be more efficient if the Session Tag system was "
+"bidirectional,\n"
+"so tags delivered in the 'forward' path could be used in the 'reverse' "
+"path,\n"
"thus avoiding ElGamal in the initial response.\n"
"The router currently plays some tricks like this when sending\n"
"tunnel test messages to itself."
@@ -5882,7 +6595,8 @@ msgid ""
"set a flag in the\n"
"Delivery Instructions,\n"
"or set a magic number in the first few bytes of the Session Key field\n"
-"and accept a small risk of the random Session Key matching the magic number."
+"and accept a small risk of the random Session Key matching the magic "
+"number."
msgstr ""
#: i2p2www/pages/site/docs/how/garlic-routing.html:2
@@ -5895,7 +6609,8 @@ msgstr ""
#: i2p2www/pages/site/docs/how/garlic-routing.html:7
msgid ""
-"The terms \"garlic routing\" and \"garlic encryption\" are often used rather loosely when referring to I2P's technology.\n"
+"The terms \"garlic routing\" and \"garlic encryption\" are often used "
+"rather loosely when referring to I2P's technology.\n"
"Here, we explain the history of the terms, the various meanings, and\n"
"the usage of \"garlic\" methods in I2P."
msgstr ""
@@ -5905,16 +6620,20 @@ msgid ""
"\"Garlic routing\" was first coined by\n"
"Michael J. Freedman\n"
"in Roger Dingledine's Free Haven \n"
-"Master's thesis Section 8.1.1 (June 2000), as derived from \n"
+"Master's thesis "
+"Section 8.1.1 (June 2000), as derived from \n"
"Onion Routing."
msgstr ""
#: i2p2www/pages/site/docs/how/garlic-routing.html:21
msgid ""
-"\"Garlic\" may have been used originally by I2P developers because I2P implements a form of\n"
-"bundling as Freedman describes, or simply to emphasize general differences from Tor.\n"
+"\"Garlic\" may have been used originally by I2P developers because I2P "
+"implements a form of\n"
+"bundling as Freedman describes, or simply to emphasize general "
+"differences from Tor.\n"
"The specific reasoning may be lost to history.\n"
-"Generally, when referring to I2P, the term \"garlic\" may mean one of three things:"
+"Generally, when referring to I2P, the term \"garlic\" may mean one of "
+"three things:"
msgstr ""
#: i2p2www/pages/site/docs/how/garlic-routing.html:28
@@ -5933,39 +6652,54 @@ msgstr ""
#: i2p2www/pages/site/docs/how/garlic-routing.html:33
msgid ""
-"Unfortunately, I2P's usage of \"garlic\" terminology over the past seven years has not always been precise; therefore the reader is\n"
+"Unfortunately, I2P's usage of \"garlic\" terminology over the past seven "
+"years has not always been precise; therefore the reader is\n"
"cautioned when encountering the term.\n"
"Hopefully, the explanation below will make things clear."
msgstr ""
#: i2p2www/pages/site/docs/how/garlic-routing.html:40
msgid ""
-"Onion routing is a technique for building paths, or tunnels, through a series of peers,\n"
+"Onion routing is a technique for building paths, or tunnels, through a "
+"series of peers,\n"
"and then using that tunnel.\n"
-"Messages are repeatedly encrypted by the originator, and then decrypted by each hop.\n"
-"During the building phase, only the routing instructions for the next hop are exposed to each peer.\n"
-"During the operating phase, messages are passed through the tunnel, and the\n"
-"message and its routing instructions are only exposed to the endpoint of the tunnel."
+"Messages are repeatedly encrypted by the originator, and then decrypted "
+"by each hop.\n"
+"During the building phase, only the routing instructions for the next hop"
+" are exposed to each peer.\n"
+"During the operating phase, messages are passed through the tunnel, and "
+"the\n"
+"message and its routing instructions are only exposed to the endpoint of "
+"the tunnel."
msgstr ""
#: i2p2www/pages/site/docs/how/garlic-routing.html:49
#, python-format
msgid ""
"This is similar to the way Mixmaster\n"
-"(see network comparisons) sends messages - taking a message, encrypting it\n"
-"to the recipient's public key, taking that encrypted message and encrypting\n"
-"it (along with instructions specifying the next hop), and then taking that\n"
-"resulting encrypted message and so on, until it has one layer of encryption\n"
+"(see network comparisons) sends messages "
+"- taking a message, encrypting it\n"
+"to the recipient's public key, taking that encrypted message and "
+"encrypting\n"
+"it (along with instructions specifying the next hop), and then taking "
+"that\n"
+"resulting encrypted message and so on, until it has one layer of "
+"encryption\n"
"per hop along the path."
msgstr ""
#: i2p2www/pages/site/docs/how/garlic-routing.html:58
msgid ""
-"In this sense, \"garlic routing\" as a general concept is identical to \"onion routing\".\n"
-"As implemented in I2P, of course, there are several differences from the implementation in Tor; see below.\n"
-"Even so, there are substantial similarities such that I2P benefits from a\n"
-"large amount of academic research on onion routing,\n"
-"Tor, and similar mixnets."
+"In this sense, \"garlic routing\" as a general concept is identical to "
+"\"onion routing\".\n"
+"As implemented in I2P, of course, there are several differences from the "
+"implementation in Tor; see below.\n"
+"Even so, there are substantial similarities such that I2P benefits from a"
+"\n"
+"large amount of"
+" academic research on onion routing,\n"
+"Tor, and similar "
+"mixnets."
msgstr ""
#: i2p2www/pages/site/docs/how/garlic-routing.html:67
@@ -5974,12 +6708,15 @@ msgstr ""
#: i2p2www/pages/site/docs/how/garlic-routing.html:68
msgid ""
-"Michael Freedman defined \"garlic routing\" as an extension to onion routing,\n"
+"Michael Freedman defined \"garlic routing\" as an extension to onion "
+"routing,\n"
"in which multiple messages are bundled together.\n"
"He called each message a \"bulb\".\n"
-"All the messages, each with its own delivery instructions, are exposed at the\n"
+"All the messages, each with its own delivery instructions, are exposed at"
+" the\n"
"endpoint.\n"
-"This allows the efficient bundling of an onion routing \"reply block\" with the original message."
+"This allows the efficient bundling of an onion routing \"reply block\" "
+"with the original message."
msgstr ""
#: i2p2www/pages/site/docs/how/garlic-routing.html:77
@@ -5988,8 +6725,10 @@ msgid ""
"Our term for garlic \"bulbs\" is \"cloves\".\n"
"Any number of messages can be\n"
"contained, instead of just a single message.\n"
-"This is a significant distinction from the onion routing implemented in Tor.\n"
-"However, it is only one of many major architectural differences between I2P and Tor;\n"
+"This is a significant distinction from the onion routing implemented in "
+"Tor.\n"
+"However, it is only one of many major architectural differences between "
+"I2P and Tor;\n"
"perhaps it is not, by itself, enough to justify a change in terminology."
msgstr ""
@@ -5997,8 +6736,10 @@ msgstr ""
msgid ""
"Another difference\n"
"from the method described by Freedman\n"
-"is that the path is unidirectional - there is no \"turning point\" as seen in onion routing\n"
-"or mixmaster reply blocks, which greatly simplifies the algorithm and allows for more flexible\n"
+"is that the path is unidirectional - there is no \"turning point\" as "
+"seen in onion routing\n"
+"or mixmaster reply blocks, which greatly simplifies the algorithm and "
+"allows for more flexible\n"
"and reliable delivery."
msgstr ""
@@ -6032,14 +6773,16 @@ msgstr ""
#: i2p2www/pages/site/docs/how/garlic-routing.html:113
msgid ""
-"For publishing some network database entries (dampening the probability of a"
-" successful traffic analysis attack) (ElGamal/AES)"
+"For publishing some network database entries (dampening the probability "
+"of a successful traffic analysis attack) (ElGamal/AES)"
msgstr ""
#: i2p2www/pages/site/docs/how/garlic-routing.html:116
msgid ""
-"There are also significant ways that this technique can be used to improve the performance of the network, \n"
-"exploiting transport latency/throughput tradeoffs, and branching data through redundant paths to increase reliability."
+"There are also significant ways that this technique can be used to "
+"improve the performance of the network, \n"
+"exploiting transport latency/throughput tradeoffs, and branching data "
+"through redundant paths to increase reliability."
msgstr ""
#: i2p2www/pages/site/docs/how/garlic-routing.html:122
@@ -6050,7 +6793,8 @@ msgstr ""
msgid ""
"In I2P, tunnels are unidirectional. Each party builds two tunnels,\n"
"one for outbound and one for inbound traffic.\n"
-"Therefore, four tunnels are required for a single round-trip message and reply."
+"Therefore, four tunnels are required for a single round-trip message and "
+"reply."
msgstr ""
#: i2p2www/pages/site/docs/how/garlic-routing.html:129
@@ -6070,10 +6814,12 @@ msgstr ""
msgid ""
"Tunnels are a general-purpose mechanism to transport all\n"
"I2NP messages, and\n"
-"Garlic Messages are not used to build tunnels.\n"
+"Garlic Messages are not used to "
+"build tunnels.\n"
"We do not bundle multiple\n"
"I2NP messages into a single\n"
-"Garlic Message for unwrapping at the outbound tunnel endpoint;\n"
+"Garlic Message for unwrapping at "
+"the outbound tunnel endpoint;\n"
"the tunnel encryption is sufficient."
msgstr ""
@@ -6087,7 +6833,8 @@ msgid ""
"At the layer above tunnels, I2P delivers end-to-end messages between\n"
"Destinations.\n"
"Just as within a single tunnel, we use\n"
-"ElGamal/AES+SessionTag for the encryption.\n"
+"ElGamal/AES+SessionTag for the encryption."
+"\n"
"Each client message as delivered to the router through the\n"
"I2CP interface becomes a single\n"
"Garlic Clove\n"
@@ -6116,12 +6863,16 @@ msgid ""
"Delivery Status Message,\n"
"with\n"
"Delivery Instructions\n"
-"specifying that it be sent back to the originating router as an acknowledgment.\n"
+"specifying that it be sent back to the originating router as an "
+"acknowledgment.\n"
"This is similar to the \"reply block\" or \"reply onion\"\n"
"described in the references.\n"
-"It is used for determining the success or failure of end to end message delivery.\n"
-"The originating router may, upon failure to receive the Delivery Status Message\n"
-"within the expected time period, modify the routing to the far-end Destination,\n"
+"It is used for determining the success or failure of end to end message "
+"delivery.\n"
+"The originating router may, upon failure to receive the Delivery Status "
+"Message\n"
+"within the expected time period, modify the routing to the far-end "
+"Destination,\n"
"or take other actions."
msgstr ""
@@ -6135,10 +6886,13 @@ msgid ""
"for the originating Destination, with\n"
"Delivery Instructions\n"
"specifying the far-end destination's router.\n"
-"By periodically bundling a LeaseSet, the router ensures that the far-end will be able\n"
+"By periodically bundling a LeaseSet, the router ensures that the far-end "
+"will be able\n"
"to maintain communications.\n"
-"Otherwise the far-end would have to query a floodfill router for the network database entry,\n"
-"and all LeaseSets would have to be published to the network database, as explained on the\n"
+"Otherwise the far-end would have to query a floodfill router for the "
+"network database entry,\n"
+"and all LeaseSets would have to be published to the network database, as "
+"explained on the\n"
"network database page."
msgstr ""
@@ -6148,24 +6902,31 @@ msgid ""
"By default, the Delivery Status and Database Store Messages\n"
"are bundled when the local LeaseSet changes, when additional\n"
"Session Tags\n"
-"are delivered, or if the messages have not been bundled in the previous minute.\n"
-"As of release 0.9.2, the client may configure the default number of Session Tags to send\n"
+"are delivered, or if the messages have not been bundled in the previous "
+"minute.\n"
+"As of release 0.9.2, the client may configure the default number of "
+"Session Tags to send\n"
"and the low tag threshold for the current session.\n"
-"See the I2CP options specification for details.\n"
+"See the I2CP options specification for "
+"details.\n"
"The session settings may also be overridden on a per-message basis.\n"
-"See the I2CP Send Message Expires specification for details."
+"See the I2CP Send Message"
+" Expires specification for details."
msgstr ""
#: i2p2www/pages/site/docs/how/garlic-routing.html:227
msgid ""
-"Obviously, the additional messages are currently bundled for specific purposes,\n"
+"Obviously, the additional messages are currently bundled for specific "
+"purposes,\n"
"and not part of a general-purpose routing scheme."
msgstr ""
#: i2p2www/pages/site/docs/how/garlic-routing.html:232
msgid ""
-"As of release 0.9.12, the Delivery Status Message is wrapped in another Garlic Message\n"
-"by the originator so that the contents are encrypted and not visible to routers on the return path."
+"As of release 0.9.12, the Delivery Status Message is wrapped in another "
+"Garlic Message\n"
+"by the originator so that the contents are encrypted and not visible to "
+"routers on the return path."
msgstr ""
#: i2p2www/pages/site/docs/how/garlic-routing.html:238
@@ -6189,26 +6950,34 @@ msgstr ""
#: i2p2www/pages/site/docs/how/garlic-routing.html:255
#, python-format
msgid ""
-"The Garlic Message mechanism is very flexible and provides a structure for\n"
+"The Garlic Message mechanism is very flexible and provides a structure "
+"for\n"
"implementing many types of mixnet delivery methods.\n"
"Together with the unused delay option in the\n"
-"tunnel message Delivery Instructions,\n"
-"a wide spectrum of batching, delay, mixing, and routing strategies are possible."
+"tunnel message Delivery "
+"Instructions,\n"
+"a wide spectrum of batching, delay, mixing, and routing strategies are "
+"possible."
msgstr ""
#: i2p2www/pages/site/docs/how/garlic-routing.html:263
msgid ""
-"In particular, there is potential for much more flexibility at the outbound tunnel endpoint.\n"
+"In particular, there is potential for much more flexibility at the "
+"outbound tunnel endpoint.\n"
"Messages could possibly be routed from there to one of several tunnels\n"
-"(thus minimizing point-to-point connections), or multicast to several tunnels\n"
+"(thus minimizing point-to-point connections), or multicast to several "
+"tunnels\n"
"for redundancy, or streaming audio and video."
msgstr ""
#: i2p2www/pages/site/docs/how/garlic-routing.html:270
msgid ""
-"Such experiments may conflict with the need to ensure security and anonymity, such\n"
-"as limiting certain routing paths, restricting the types of I2NP messages that may\n"
-"be forwarded along various paths, and enforcing certain message expiration times."
+"Such experiments may conflict with the need to ensure security and "
+"anonymity, such\n"
+"as limiting certain routing paths, restricting the types of I2NP messages"
+" that may\n"
+"be forwarded along various paths, and enforcing certain message "
+"expiration times."
msgstr ""
#: i2p2www/pages/site/docs/how/garlic-routing.html:276
@@ -6217,9 +6986,11 @@ msgid ""
"As a part of\n"
"ElGamal/AES encryption,\n"
"a garlic message contains a sender\n"
-"specified amount of padding data, allowing the sender to take active countermeasures \n"
+"specified amount of padding data, allowing the sender to take active "
+"countermeasures \n"
"against traffic analysis.\n"
-"This is not currently used, beyond the requirement to pad to a multiple of 16 bytes."
+"This is not currently used, beyond the requirement to pad to a multiple "
+"of 16 bytes."
msgstr ""
#: i2p2www/pages/site/docs/how/garlic-routing.html:285
@@ -6231,8 +7002,10 @@ msgstr ""
#: i2p2www/pages/site/docs/how/garlic-routing.html:295
msgid ""
-"The term garlic routing was first coined in Roger Dingledine's Free Haven \n"
-"Master's thesis (June 2000),\n"
+"The term garlic routing was first coined in Roger Dingledine's Free Haven"
+" \n"
+"Master's thesis "
+"(June 2000),\n"
"see Section 8.1.1 authored by\n"
"Michael J. Freedman."
msgstr ""
@@ -6262,7 +7035,8 @@ msgstr ""
#: i2p2www/pages/site/docs/how/garlic-routing.html:316
msgid ""
-"Onion routing was first described in Hiding Routing Information\n"
+"Onion routing was first described in Hiding Routing Information\n"
"by David M. Goldschlag, Michael G. Reed, and Paul F. Syverson in 1996."
msgstr ""
@@ -6272,51 +7046,79 @@ msgstr ""
#: i2p2www/pages/site/docs/how/intro.html:4
msgid ""
-"I2P is a project to build, deploy, and maintain a network supporting secure and anonymous\n"
-"communication. People using I2P are in control of the tradeoffs between anonymity, reliability,\n"
-"bandwidth usage, and latency. There is no central point in the network on which pressure can be\n"
-"exerted to compromise the integrity, security, or anonymity of the system. The network supports\n"
-"dynamic reconfiguration in response to various attacks, and has been designed to make use of\n"
-"additional resources as they become available. Of course, all aspects of the network are open and\n"
+"I2P is a project to build, deploy, and maintain a network supporting "
+"secure and anonymous\n"
+"communication. People using I2P are in control of the tradeoffs between "
+"anonymity, reliability,\n"
+"bandwidth usage, and latency. There is no central point in the network on"
+" which pressure can be\n"
+"exerted to compromise the integrity, security, or anonymity of the "
+"system. The network supports\n"
+"dynamic reconfiguration in response to various attacks, and has been "
+"designed to make use of\n"
+"additional resources as they become available. Of course, all aspects of "
+"the network are open and\n"
"freely available."
msgstr ""
#: i2p2www/pages/site/docs/how/intro.html:14
msgid ""
-"Unlike many other anonymizing networks, I2P doesn't try to provide anonymity by hiding the\n"
-"originator of some communication and not the recipient, or the other way around. I2P is designed to\n"
-"allow peers using I2P to communicate with each other anonymously — both sender and recipient\n"
-"are unidentifiable to each other as well as to third parties. For example, today there are both\n"
-"in-I2P web sites (allowing anonymous publishing / hosting) as well as HTTP proxies to the normal web\n"
-"(allowing anonymous web browsing). Having the ability to run servers within I2P is essential, as it\n"
-"is quite likely that any outbound proxies to the normal Internet will be monitored, disabled, or\n"
+"Unlike many other anonymizing networks, I2P doesn't try to provide "
+"anonymity by hiding the\n"
+"originator of some communication and not the recipient, or the other way "
+"around. I2P is designed to\n"
+"allow peers using I2P to communicate with each other anonymously — "
+"both sender and recipient\n"
+"are unidentifiable to each other as well as to third parties. For "
+"example, today there are both\n"
+"in-I2P web sites (allowing anonymous publishing / hosting) as well as "
+"HTTP proxies to the normal web\n"
+"(allowing anonymous web browsing). Having the ability to run servers "
+"within I2P is essential, as it\n"
+"is quite likely that any outbound proxies to the normal Internet will be "
+"monitored, disabled, or\n"
"even taken over to attempt more malicious attacks."
msgstr ""
#: i2p2www/pages/site/docs/how/intro.html:25
#, python-format
msgid ""
-"The network itself is message oriented - it is essentially a secure and anonymous IP layer, where\n"
-"messages are addressed to cryptographic keys (Destinations) and can be significantly larger than IP\n"
-"packets. Some example uses of the network include \"eepsites\" (webservers hosting normal web\n"
-"applications within I2P), a BitTorrent client (\"I2PSnark\"), or a distributed data store. With the\n"
-"help of the I2PTunnel application, we are able to stream traditional\n"
-"TCP/IP applications over I2P, such as SSH, IRC, a squid proxy, and even streaming audio. Most people\n"
-"will not use I2P directly, or even need to know they're using it. Instead their view will be of one\n"
-"of the I2P enabled applications, or perhaps as a little controller app to turn on and off various\n"
+"The network itself is message oriented - it is essentially a secure and "
+"anonymous IP layer, where\n"
+"messages are addressed to cryptographic keys (Destinations) and can be "
+"significantly larger than IP\n"
+"packets. Some example uses of the network include \"eepsites\" "
+"(webservers hosting normal web\n"
+"applications within I2P), a BitTorrent client (\"I2PSnark\"), or a "
+"distributed data store. With the\n"
+"help of the I2PTunnel application, we are "
+"able to stream traditional\n"
+"TCP/IP applications over I2P, such as SSH, IRC, a squid proxy, and even "
+"streaming audio. Most people\n"
+"will not use I2P directly, or even need to know they're using it. Instead"
+" their view will be of one\n"
+"of the I2P enabled applications, or perhaps as a little controller app to"
+" turn on and off various\n"
"proxies to enable the anonymizing functionality."
msgstr ""
#: i2p2www/pages/site/docs/how/intro.html:37
#, python-format
msgid ""
-"An essential part of designing, developing, and testing an anonymizing network is to define the threat model, since there is no such thing as \"true\" anonymity, just\n"
-"increasingly expensive costs to identify someone. Briefly, I2P's intent is to allow people to\n"
-"communicate in arbitrarily hostile environments by providing good anonymity, mixed in with\n"
-"sufficient cover traffic provided by the activity of people who require less anonymity. This way,\n"
-"some users can avoid detection by a very powerful adversary, while others will try to evade a weaker\n"
-"entity, all on the same network, where each one's messages are essentially indistinguishable\n"
+"An essential part of designing, developing, and testing an anonymizing "
+"network is to define the threat model, since there is no such thing "
+"as \"true\" anonymity, just\n"
+"increasingly expensive costs to identify someone. Briefly, I2P's intent "
+"is to allow people to\n"
+"communicate in arbitrarily hostile environments by providing good "
+"anonymity, mixed in with\n"
+"sufficient cover traffic provided by the activity of people who require "
+"less anonymity. This way,\n"
+"some users can avoid detection by a very powerful adversary, while others"
+" will try to evade a weaker\n"
+"entity, all on the same network, where each one's messages are "
+"essentially indistinguishable\n"
"from the others."
msgstr ""
@@ -6327,9 +7129,12 @@ msgstr ""
#: i2p2www/pages/site/docs/how/intro.html:49
#, python-format
msgid ""
-"There are a multitude of reasons why we need a system to support anonymous communication, and\n"
-"everyone has their own personal rationale. There are many other\n"
-"efforts working on finding ways to provide varying degrees of anonymity to people through the\n"
+"There are a multitude of reasons why we need a system to support "
+"anonymous communication, and\n"
+"everyone has their own personal rationale. There are many other\n"
+"efforts working on finding ways to provide varying degrees of "
+"anonymity to people through the\n"
"Internet, but we could not find any that met our needs or threat model."
msgstr ""
@@ -6340,14 +7145,23 @@ msgstr ""
#: i2p2www/pages/site/docs/how/intro.html:58
#, python-format
msgid ""
-"The network at a glance is made up of a set of nodes (\"routers\") with a number of unidirectional\n"
-"inbound and outbound virtual paths (\"tunnels\", as outlined on the tunnel routing page). Each router is identified by a cryptographic RouterIdentity which is\n"
-"typically long lived. These routers communicate with each other through existing transport\n"
-"mechanisms (TCP, UDP, etc), passing various messages. Client applications have their own\n"
-"cryptographic identifier (\"Destination\") which enables it to send and receive messages. These\n"
-"clients can connect to any router and authorize the temporary allocation (\"lease\") of some tunnels\n"
-"that will be used for sending and receiving messages through the network. I2P has its own internal\n"
-"network database (using a modification of the Kademlia algorithm) for\n"
+"The network at a glance is made up of a set of nodes (\"routers\") with a"
+" number of unidirectional\n"
+"inbound and outbound virtual paths (\"tunnels\", as outlined on the tunnel routing page). Each router is "
+"identified by a cryptographic RouterIdentity which is\n"
+"typically long lived. These routers communicate with each other through "
+"existing transport\n"
+"mechanisms (TCP, UDP, etc), passing various messages. Client applications"
+" have their own\n"
+"cryptographic identifier (\"Destination\") which enables it to send and "
+"receive messages. These\n"
+"clients can connect to any router and authorize the temporary allocation "
+"(\"lease\") of some tunnels\n"
+"that will be used for sending and receiving messages through the network."
+" I2P has its own internal\n"
+"network database (using a modification of the "
+"Kademlia algorithm) for\n"
"distributing routing and contact information securely."
msgstr ""
@@ -6357,62 +7171,92 @@ msgstr ""
#: i2p2www/pages/site/docs/how/intro.html:73
msgid ""
-"In the above, Alice, Bob, Charlie, and Dave are all running routers with a single Destination on\n"
-"their local router. They each have a pair of 2-hop inbound tunnels per destination (labeled 1, 2, 3,\n"
-"4, 5 and 6), and a small subset of each of those router's outbound tunnel pool is shown with 2-hop\n"
-"outbound tunnels. For simplicity, Charlie's inbound tunnels and Dave's outbound tunnels are not\n"
-"shown, nor are the rest of each router's outbound tunnel pool (typically stocked with a few tunnels\n"
-"at a time). When Alice and Bob talk to each other, Alice sends a message out one of her (pink)\n"
-"outbound tunnels targeting one of Bob's (green) inbound tunnels (tunnel 3 or 4). She knows to send\n"
-"to those tunnels on the correct router by querying the network database, which is constantly updated\n"
+"In the above, Alice, Bob, Charlie, and Dave are all running routers with "
+"a single Destination on\n"
+"their local router. They each have a pair of 2-hop inbound tunnels per "
+"destination (labeled 1, 2, 3,\n"
+"4, 5 and 6), and a small subset of each of those router's outbound tunnel"
+" pool is shown with 2-hop\n"
+"outbound tunnels. For simplicity, Charlie's inbound tunnels and Dave's "
+"outbound tunnels are not\n"
+"shown, nor are the rest of each router's outbound tunnel pool (typically "
+"stocked with a few tunnels\n"
+"at a time). When Alice and Bob talk to each other, Alice sends a message "
+"out one of her (pink)\n"
+"outbound tunnels targeting one of Bob's (green) inbound tunnels (tunnel 3"
+" or 4). She knows to send\n"
+"to those tunnels on the correct router by querying the network database, "
+"which is constantly updated\n"
"as new leases are authorized and old ones expire."
msgstr ""
#: i2p2www/pages/site/docs/how/intro.html:85
#, python-format
msgid ""
-"If Bob wants to reply to Alice, he simply goes through the same process - send a message out one of\n"
-"his outbound tunnels targeting one of Alice's inbound tunnels (tunnel 1 or 2). To make things\n"
-"easier, most messages sent between Alice and Bob are garlic\n"
-"wrapped, bundling the sender's own current lease information so that the recipient can reply\n"
-"immediately without having to look in the network database for the current data."
+"If Bob wants to reply to Alice, he simply goes through the same process -"
+" send a message out one of\n"
+"his outbound tunnels targeting one of Alice's inbound tunnels (tunnel 1 "
+"or 2). To make things\n"
+"easier, most messages sent between Alice and Bob are garlic\n"
+"wrapped, bundling the sender's own current lease information so that the "
+"recipient can reply\n"
+"immediately without having to look in the network database for the "
+"current data."
msgstr ""
#: i2p2www/pages/site/docs/how/intro.html:93
#, python-format
msgid ""
-"To deal with a wide range of attacks, I2P is fully distributed with no centralized resources - and\n"
-"hence there are no directory servers keeping statistics regarding the performance and reliability of\n"
-"routers within the network. As such, each router must keep and maintain profiles of various routers\n"
-"and is responsible for selecting appropriate peers to meet the anonymity, performance, and\n"
-"reliability needs of the users, as described in the peer selection\n"
+"To deal with a wide range of attacks, I2P is fully distributed with no "
+"centralized resources - and\n"
+"hence there are no directory servers keeping statistics regarding the "
+"performance and reliability of\n"
+"routers within the network. As such, each router must keep and maintain "
+"profiles of various routers\n"
+"and is responsible for selecting appropriate peers to meet the anonymity,"
+" performance, and\n"
+"reliability needs of the users, as described in the peer selection\n"
"page."
msgstr ""
#: i2p2www/pages/site/docs/how/intro.html:102
#, python-format
msgid ""
-"The network itself makes use of a significant number of cryptographic\n"
-"techniques and algorithms - a full laundry list includes 2048bit ElGamal encryption, 256bit AES\n"
-"in CBC mode with PKCS#5 padding, 1024bit DSA signatures, SHA256 hashes, 2048bit Diffie-Hellman\n"
-"negotiated connections with station to station authentication, and ElGamal / AES+SessionTag."
+"The network itself makes use of a significant number of cryptographic\n"
+"techniques and algorithms - a full laundry list includes 2048bit "
+"ElGamal encryption, 256bit AES\n"
+"in CBC mode with PKCS#5 padding, 1024bit DSA signatures, SHA256 hashes, "
+"2048bit Diffie-Hellman\n"
+"negotiated connections with station to station authentication, and ElGamal / AES+SessionTag."
msgstr ""
#: i2p2www/pages/site/docs/how/intro.html:110
msgid ""
-"Content sent over I2P is encrypted through three layers garlic encryption (used to verify the\n"
-"delivery of the message to the recipient), tunnel encryption (all messages passing through a tunnel\n"
-"is encrypted by the tunnel gateway to the tunnel endpoint), and inter router transport layer\n"
+"Content sent over I2P is encrypted through three layers garlic encryption"
+" (used to verify the\n"
+"delivery of the message to the recipient), tunnel encryption (all "
+"messages passing through a tunnel\n"
+"is encrypted by the tunnel gateway to the tunnel endpoint), and inter "
+"router transport layer\n"
"encryption (e.g. the TCP transport uses AES256 with ephemeral keys)."
msgstr ""
#: i2p2www/pages/site/docs/how/intro.html:117
msgid ""
-"End-to-end (I2CP) encryption (client application to server application) was disabled in I2P release\n"
-"0.6; end-to-end (garlic) encryption (I2P client router to I2P server router) from Alice's router \"a\"\n"
-"to Bob's router \"h\" remains. Notice the different use of terms! All data from a to h is end-to-end\n"
-"encrypted, but the I2CP connection between the I2P router and the applications is not end-to-end\n"
-"encrypted! A and h are the routers of Alice and Bob, while Alice and Bob in following chart are the\n"
+"End-to-end (I2CP) encryption (client application to server application) "
+"was disabled in I2P release\n"
+"0.6; end-to-end (garlic) encryption (I2P client router to I2P server "
+"router) from Alice's router \"a\"\n"
+"to Bob's router \"h\" remains. Notice the different use of terms! All "
+"data from a to h is end-to-end\n"
+"encrypted, but the I2CP connection between the I2P router and the "
+"applications is not end-to-end\n"
+"encrypted! A and h are the routers of Alice and Bob, while Alice and Bob "
+"in following chart are the\n"
"applications running atop of I2P."
msgstr ""
@@ -6429,22 +7273,32 @@ msgstr ""
#: i2p2www/pages/site/docs/how/intro.html:132
msgid ""
-"The two main mechanisms for allowing people who need strong anonymity to use the network are\n"
-"explicitly delayed garlic routed messages and more comprehensive tunnels to include support for\n"
-"pooling and mixing messages. These are currently planned for release 3.0, but garlic routed messages\n"
-"with no delays and FIFO tunnels are currently in place. Additionally, the 2.0 release will allow\n"
-"people to set up and operate behind restricted routes (perhaps with trusted peers), as well as the\n"
+"The two main mechanisms for allowing people who need strong anonymity to "
+"use the network are\n"
+"explicitly delayed garlic routed messages and more comprehensive tunnels "
+"to include support for\n"
+"pooling and mixing messages. These are currently planned for release 3.0,"
+" but garlic routed messages\n"
+"with no delays and FIFO tunnels are currently in place. Additionally, the"
+" 2.0 release will allow\n"
+"people to set up and operate behind restricted routes (perhaps with "
+"trusted peers), as well as the\n"
"deployment of more flexible and anonymous transports."
msgstr ""
#: i2p2www/pages/site/docs/how/intro.html:141
#, python-format
msgid ""
-"Some questions have been raised with regards to the scalability of I2P, and reasonably so. There\n"
-"will certainly be more analysis over time, but peer lookup and integration should be bounded by\n"
-"O(log(N))
due to the network database's algorithm, while end\n"
-"to end messages should be O(1)
(scale free), since messages go out K hops through the\n"
-"outbound tunnel and another K hops through the inbound tunnel, with K no longer than 3. The size of\n"
+"Some questions have been raised with regards to the scalability of I2P, "
+"and reasonably so. There\n"
+"will certainly be more analysis over time, but peer lookup and "
+"integration should be bounded by\n"
+"O(log(N))
due to the network "
+"database's algorithm, while end\n"
+"to end messages should be O(1)
(scale free), since messages "
+"go out K hops through the\n"
+"outbound tunnel and another K hops through the inbound tunnel, with K no "
+"longer than 3. The size of\n"
"the network (N) bears no impact."
msgstr ""
@@ -6456,10 +7310,13 @@ msgstr ""
#, python-format
msgid ""
"I2P initially began in Feb 2003 as a proposed modification to Freenet to allow it to use alternate transports, such as Freenet to allow it to use "
+"alternate transports, such as JMS, then grew into its own as an\n"
-"'anonCommFramework' in April 2003, turning into I2P in July, with code being written in earnest\n"
-"starting in August '03. I2P is currently under development, following the roadmap."
+"'anonCommFramework' in April 2003, turning into I2P in July, with code "
+"being written in earnest\n"
+"starting in August '03. I2P is currently under development, following the"
+" roadmap."
msgstr ""
#: i2p2www/pages/site/docs/how/intro.html:161
@@ -6469,14 +7326,22 @@ msgstr ""
#: i2p2www/pages/site/docs/how/intro.html:162
#, python-format
msgid ""
-"We have a small team spread around several continents, working to advance\n"
-"different aspects of the project. We are very open to other developers who want to get involved and\n"
-"anyone else who would like to contribute in other ways, such as critiques, peer review, testing,\n"
-"writing I2P enabled applications, or documentation. The entire system is open source - the router\n"
-"and most of the SDK are outright public domain with some BSD and Cryptix licensed code, while some\n"
-"applications like I2PTunnel and I2PSnark are GPL. Almost everything is written in Java (1.5+),\n"
-"though some third party applications are being written in Python and other languages. The code works\n"
-"on Sun Java SE and other Java Virtual Machines."
+"We have a small team spread around several "
+"continents, working to advance\n"
+"different aspects of the project. We are very open to other developers "
+"who want to get involved and\n"
+"anyone else who would like to contribute in other ways, such as "
+"critiques, peer review, testing,\n"
+"writing I2P enabled applications, or documentation. The entire system is "
+"open source - the router\n"
+"and most of the SDK are outright public domain with some BSD and Cryptix "
+"licensed code, while some\n"
+"applications like I2PTunnel and I2PSnark are GPL. Almost everything is "
+"written in Java (1.5+),\n"
+"though some third party applications are being written in Python and "
+"other languages. The code works\n"
+"on Sun Java SE and other Java Virtual"
+" Machines."
msgstr ""
#: i2p2www/pages/site/docs/how/intro.html:173
@@ -6486,9 +7351,12 @@ msgstr ""
#: i2p2www/pages/site/docs/how/intro.html:174
#, python-format
msgid ""
-"Anyone interested should join us on the IRC channel #i2p-dev (hosted concurrently on irc.freenode.net,\n"
-"irc.postman.i2p, irc.echelon.i2p, irc.dg.i2p and irc.oftc.net). There are currently no\n"
-"scheduled development meetings, however archives are available."
+"Anyone interested should join us on the IRC channel #i2p-dev (hosted "
+"concurrently on irc.freenode.net,\n"
+"irc.postman.i2p, irc.echelon.i2p, irc.dg.i2p and irc.oftc.net). There are"
+" currently no\n"
+"scheduled development meetings, however archives"
+" are available."
msgstr ""
#: i2p2www/pages/site/docs/how/intro.html:180
@@ -6512,24 +7380,32 @@ msgstr "Outubro de 2014"
#: i2p2www/pages/site/docs/how/network-database.html:8
msgid ""
"I2P's netDb is a specialized distributed database, containing \n"
-"just two types of data - router contact information (RouterInfos) and destination contact\n"
-"information (LeaseSets). Each piece of data is signed by the appropriate party and verified\n"
-"by anyone who uses or stores it. In addition, the data has liveliness information\n"
-"within it, allowing irrelevant entries to be dropped, newer entries to replace\n"
+"just two types of data - router contact information (RouterInfos) "
+"and destination contact\n"
+"information (LeaseSets). Each piece of data is signed by the "
+"appropriate party and verified\n"
+"by anyone who uses or stores it. In addition, the data has liveliness "
+"information\n"
+"within it, allowing irrelevant entries to be dropped, newer entries to "
+"replace\n"
"older ones, and protection against certain classes of attack."
msgstr ""
#: i2p2www/pages/site/docs/how/network-database.html:17
msgid ""
"The netDb is distributed with a simple technique called \"floodfill\",\n"
-"where a subset of all routers, called \"floodfill routers\", maintains the distributed database."
+"where a subset of all routers, called \"floodfill routers\", maintains "
+"the distributed database."
msgstr ""
#: i2p2www/pages/site/docs/how/network-database.html:25
msgid ""
-"When an I2P router wants to contact another router, they need to know some \n"
-"key pieces of data - all of which are bundled up and signed by the router into\n"
-"a structure called the \"RouterInfo\", which is distributed with the SHA256 of the router's identity\n"
+"When an I2P router wants to contact another router, they need to know "
+"some \n"
+"key pieces of data - all of which are bundled up and signed by the router"
+" into\n"
+"a structure called the \"RouterInfo\", which is distributed with the "
+"SHA256 of the router's identity\n"
"as the key. The structure itself contains:"
msgstr ""
@@ -6541,8 +7417,8 @@ msgstr ""
#: i2p2www/pages/site/docs/how/network-database.html:33
msgid ""
-"The contact addresses at which it can be reached (e.g. TCP: example.org port"
-" 4108)"
+"The contact addresses at which it can be reached (e.g. TCP: example.org "
+"port 4108)"
msgstr ""
#: i2p2www/pages/site/docs/how/network-database.html:34
@@ -6554,8 +7430,7 @@ msgid "A set of arbitrary text options"
msgstr ""
#: i2p2www/pages/site/docs/how/network-database.html:36
-msgid ""
-"The signature of the above, generated by the identity's DSA signing key"
+msgid "The signature of the above, generated by the identity's DSA signing key"
msgstr ""
#: i2p2www/pages/site/docs/how/network-database.html:39
@@ -6566,8 +7441,8 @@ msgstr ""
#: i2p2www/pages/site/docs/how/network-database.html:45
msgid ""
-"Capabilities flags - used to indicate floodfill participation, approximate "
-"bandwidth, and perceived reachability"
+"Capabilities flags - used to indicate floodfill participation, "
+"approximate bandwidth, and perceived reachability"
msgstr ""
#: i2p2www/pages/site/docs/how/network-database.html:47
@@ -6624,29 +7499,36 @@ msgstr ""
#: i2p2www/pages/site/docs/how/network-database.html:70
msgid ""
-"Always sent as 90m, for compatibility with an older scheme where routers published their actual uptime,\n"
+"Always sent as 90m, for compatibility with an older scheme where routers "
+"published their actual uptime,\n"
"and only sent tunnel requests to peers whose was more than 60m"
msgstr ""
#: i2p2www/pages/site/docs/how/network-database.html:76
msgid ""
"These values are used by other routers for basic decisions.\n"
-"Should we connect to this router? Should we attempt to route a tunnel through this router?\n"
-"The bandwidth capability flag, in particular, is used only to determine whether\n"
+"Should we connect to this router? Should we attempt to route a tunnel "
+"through this router?\n"
+"The bandwidth capability flag, in particular, is used only to determine "
+"whether\n"
"the router meets a minimum threshold for routing tunnels.\n"
-"Above the minimum threshold, the advertised bandwidth is not used or trusted anywhere\n"
-"in the router, except for display in the user interface and for debugging and network analysis."
+"Above the minimum threshold, the advertised bandwidth is not used or "
+"trusted anywhere\n"
+"in the router, except for display in the user interface and for debugging"
+" and network analysis."
msgstr ""
#: i2p2www/pages/site/docs/how/network-database.html:86
#, python-format
msgid ""
"Additional text options include\n"
-"a small number of statistics about the router's health, which are aggregated by\n"
+"a small number of statistics about the router's health, which are "
+"aggregated by\n"
"sites such as %(stats)s\n"
"for network performance analysis and debugging.\n"
"These statistics were chosen to provide data crucial to the developers,\n"
-"such as tunnel build success rates, while balancing the need for such data\n"
+"such as tunnel build success rates, while balancing the need for such "
+"data\n"
"with the side-effects that could result from revealing this data.\n"
"Current statistics are limited to:"
msgstr ""
@@ -6661,16 +7543,18 @@ msgstr ""
#: i2p2www/pages/site/docs/how/network-database.html:101
msgid ""
-"Floodfill routers publish additional data on the number of entries in their "
-"network database."
+"Floodfill routers publish additional data on the number of entries in "
+"their network database."
msgstr ""
#: i2p2www/pages/site/docs/how/network-database.html:105
msgid ""
"The data published can be seen in the router's user interface,\n"
"but is not used or trusted within the router.\n"
-"As the network has matured, we have gradually removed most of the published\n"
-"statistics to improve anonymity, and we plan to remove more in future releases."
+"As the network has matured, we have gradually removed most of the "
+"published\n"
+"statistics to improve anonymity, and we plan to remove more in future "
+"releases."
msgstr ""
#: i2p2www/pages/site/docs/how/network-database.html:113
@@ -6688,15 +7572,16 @@ msgstr ""
#: i2p2www/pages/site/docs/how/network-database.html:120
msgid ""
"RouterInfos have no set expiration time.\n"
-"Each router is free to maintain its own local policy to trade off the frequency of RouterInfo lookups\n"
+"Each router is free to maintain its own local policy to trade off the "
+"frequency of RouterInfo lookups\n"
"with memory or disk usage.\n"
"In the current implementation, there are the following general policies:"
msgstr ""
#: i2p2www/pages/site/docs/how/network-database.html:127
msgid ""
-"There is no expiration during the first hour of uptime, as the persistent "
-"stored data may be old."
+"There is no expiration during the first hour of uptime, as the persistent"
+" stored data may be old."
msgstr ""
#: i2p2www/pages/site/docs/how/network-database.html:130
@@ -6705,21 +7590,25 @@ msgstr ""
#: i2p2www/pages/site/docs/how/network-database.html:133
msgid ""
-"As the number of local RouterInfos grows, the expiration time shrinks, in an attempt to maintain\n"
-"a reasonable number RouterInfos. The expiration time with less than 120 routers is 72 hours,\n"
+"As the number of local RouterInfos grows, the expiration time shrinks, in"
+" an attempt to maintain\n"
+"a reasonable number RouterInfos. The expiration time with less than 120 "
+"routers is 72 hours,\n"
"while expiration time with 300 routers is around 30 hours."
msgstr ""
#: i2p2www/pages/site/docs/how/network-database.html:138
#, python-format
msgid ""
-"RouterInfos containing SSU introducers expire in about an hour, as\n"
+"RouterInfos containing SSU introducers expire in "
+"about an hour, as\n"
"the introducer list expires in about that time."
msgstr ""
#: i2p2www/pages/site/docs/how/network-database.html:142
msgid ""
-"Floodfills use a short expiration time (1 hour) for all local RouterInfos, as valid RouterInfos will\n"
+"Floodfills use a short expiration time (1 hour) for all local "
+"RouterInfos, as valid RouterInfos will\n"
"be frequently republished to them."
msgstr ""
@@ -6735,8 +7624,10 @@ msgstr ""
#: i2p2www/pages/site/docs/how/network-database.html:157
msgid ""
-"The second piece of data distributed in the netDb is a \"LeaseSet\" - documenting\n"
-"a group of tunnel entry points (leases) for a particular client destination.\n"
+"The second piece of data distributed in the netDb is a \"LeaseSet\" - "
+"documenting\n"
+"a group of tunnel entry points (leases) for a particular client "
+"destination.\n"
"Each of these leases specify the following information:"
msgstr ""
@@ -6770,8 +7661,8 @@ msgstr ""
#: i2p2www/pages/site/docs/how/network-database.html:177
msgid ""
-"Additional encryption public key: used for end-to-end encryption of garlic "
-"messages"
+"Additional encryption public key: used for end-to-end encryption of "
+"garlic messages"
msgstr ""
#: i2p2www/pages/site/docs/how/network-database.html:178
@@ -6782,8 +7673,8 @@ msgstr ""
#: i2p2www/pages/site/docs/how/network-database.html:179
msgid ""
-"Signature of all the LeaseSet data, to make sure the Destination published "
-"the LeaseSet."
+"Signature of all the LeaseSet data, to make sure the Destination "
+"published the LeaseSet."
msgstr ""
#: i2p2www/pages/site/docs/how/network-database.html:183
@@ -6808,10 +7699,13 @@ msgstr ""
#: i2p2www/pages/site/docs/how/network-database.html:195
msgid ""
-"A LeaseSet for a destination used only for outgoing connections is unpublished.\n"
+"A LeaseSet for a destination used only for outgoing connections is "
+"unpublished.\n"
"It is never sent for publication to a floodfill router.\n"
-"\"Client\" tunnels, such as those for web browsing and IRC clients, are unpublished.\n"
-"Servers will still be able to send messages back to those unpublished destinations,\n"
+"\"Client\" tunnels, such as those for web browsing and IRC clients, are "
+"unpublished.\n"
+"Servers will still be able to send messages back to those unpublished "
+"destinations,\n"
"because of I2NP storage messages."
msgstr ""
@@ -6821,10 +7715,14 @@ msgstr ""
#: i2p2www/pages/site/docs/how/network-database.html:206
msgid ""
-"A LeaseSet may be revoked by publishing a new LeaseSet with zero leases.\n"
-"Revocations must be signed by the additional signing key in the LeaseSet.\n"
-"Revocations are not fully implemented, and it is unclear if they have any practical use.\n"
-"This is the only planned use for that signing key, so it is currently unused."
+"A LeaseSet may be revoked by publishing a new LeaseSet with zero "
+"leases.\n"
+"Revocations must be signed by the additional signing key in the LeaseSet."
+"\n"
+"Revocations are not fully implemented, and it is unclear if they have any"
+" practical use.\n"
+"This is the only planned use for that signing key, so it is currently "
+"unused."
msgstr ""
#: i2p2www/pages/site/docs/how/network-database.html:213
@@ -6833,12 +7731,17 @@ msgstr ""
#: i2p2www/pages/site/docs/how/network-database.html:214
msgid ""
-"In an encrypted LeaseSet, all Leases are encrypted with a separate DSA key.\n"
-"The leases may only be decoded, and thus the destination may only be contacted,\n"
+"In an encrypted LeaseSet, all Leases are encrypted with a separate"
+" DSA key.\n"
+"The leases may only be decoded, and thus the destination may only be "
+"contacted,\n"
"by those with the key.\n"
-"There is no flag or other direct indication that the LeaseSet is encrypted.\n"
-"Encrypted LeaseSets are not widely used, and it is a topic for future work to\n"
-"research whether the user interface and implementation of encrypted LeaseSets could be improved."
+"There is no flag or other direct indication that the LeaseSet is "
+"encrypted.\n"
+"Encrypted LeaseSets are not widely used, and it is a topic for future "
+"work to\n"
+"research whether the user interface and implementation of encrypted "
+"LeaseSets could be improved."
msgstr ""
#: i2p2www/pages/site/docs/how/network-database.html:223
@@ -6847,7 +7750,8 @@ msgstr ""
#: i2p2www/pages/site/docs/how/network-database.html:224
msgid ""
-"All Leases (tunnels) are valid for 10 minutes; therefore, a LeaseSet expires\n"
+"All Leases (tunnels) are valid for 10 minutes; therefore, a LeaseSet "
+"expires\n"
"10 minutes after the earliest creation time of all its Leases."
msgstr ""
@@ -6869,32 +7773,46 @@ msgstr ""
msgid ""
"The netDb is decentralized, however you do need at\n"
"least one reference to a peer so that the integration process\n"
-"ties you in. This is accomplished by \"reseeding\" your router with the RouterInfo\n"
-"of an active peer - specifically, by retrieving their routerInfo-$hash.dat
\n"
-"file and storing it in your netDb/
directory. Anyone can provide\n"
-"you with those files - you can even provide them to others by exposing your own\n"
+"ties you in. This is accomplished by \"reseeding\" your router with the "
+"RouterInfo\n"
+"of an active peer - specifically, by retrieving their "
+"routerInfo-$hash.dat
\n"
+"file and storing it in your netDb/
directory. Anyone can "
+"provide\n"
+"you with those files - you can even provide them to others by exposing "
+"your own\n"
"netDb directory. To simplify the process,\n"
-"volunteers publish their netDb directories (or a subset) on the regular (non-i2p) network,\n"
+"volunteers publish their netDb directories (or a subset) on the regular "
+"(non-i2p) network,\n"
"and the URLs of these directories are hardcoded in I2P.\n"
-"When the router starts up for the first time, it automatically fetches from\n"
+"When the router starts up for the first time, it automatically fetches "
+"from\n"
"one of these URLs, selected at random."
msgstr ""
#: i2p2www/pages/site/docs/how/network-database.html:251
msgid ""
"The floodfill netDb is a simple distributed storage mechanism.\n"
-"The storage algorithm is simple: send the data to the closest peer that has advertised itself\n"
-"as a floodfill router. Then wait 10 seconds, pick another floodfill router and ask them \n"
-"for the entry to be sent, verifying its proper insertion / distribution. If the \n"
-"verification peer doesn't reply, or they don't have the entry, the sender \n"
-"repeats the process. When the peer in the floodfill netDb receives a netDb \n"
-"store from a peer not in the floodfill netDb, they send it to a subset of the floodfill netDb-peers.\n"
-"The peers selected are the ones closest (according to the XOR-metric) to a specific key."
+"The storage algorithm is simple: send the data to the closest peer that "
+"has advertised itself\n"
+"as a floodfill router. Then wait 10 seconds, pick another floodfill "
+"router and ask them \n"
+"for the entry to be sent, verifying its proper insertion / distribution. "
+"If the \n"
+"verification peer doesn't reply, or they don't have the entry, the sender"
+" \n"
+"repeats the process. When the peer in the floodfill netDb receives a "
+"netDb \n"
+"store from a peer not in the floodfill netDb, they send it to a subset of"
+" the floodfill netDb-peers.\n"
+"The peers selected are the ones closest (according to the XOR-metric) to a specific key."
msgstr ""
#: i2p2www/pages/site/docs/how/network-database.html:262
msgid ""
-"Determining who is part of the floodfill netDb is trivial - it is exposed in each \n"
+"Determining who is part of the floodfill netDb is trivial - it is exposed"
+" in each \n"
"router's published routerInfo as a capability."
msgstr ""
@@ -6924,13 +7842,15 @@ msgid ""
"Routers with high bandwidth limits (which must be manually configured,\n"
"as the default is much lower) are presumed to be on lower-latency\n"
"connections, and are more likely to be available 24/7.\n"
-"The current minimum share bandwidth for a floodfill router is 128 KBytes/sec."
+"The current minimum share bandwidth for a floodfill router is 128 "
+"KBytes/sec."
msgstr ""
#: i2p2www/pages/site/docs/how/network-database.html:293
msgid ""
"In addition, a router must pass several additional tests for health\n"
-"(outbound message queue time, job lag, etc.) before floodfill operation is\n"
+"(outbound message queue time, job lag, etc.) before floodfill operation "
+"is\n"
"automatically enabled."
msgstr ""
@@ -6957,10 +7877,13 @@ msgstr ""
#: i2p2www/pages/site/docs/how/network-database.html:315
msgid ""
-"A floodfill router's only services that are in addition to those of non-floodfill routers\n"
+"A floodfill router's only services that are in addition to those of non-"
+"floodfill routers\n"
"are in accepting netDb stores and responding to netDb queries.\n"
-"Since they are generally high-bandwidth, they are more likely to participate in a high number of tunnels\n"
-"(i.e. be a \"relay\" for others), but this is not directly related to their distributed database services."
+"Since they are generally high-bandwidth, they are more likely to "
+"participate in a high number of tunnels\n"
+"(i.e. be a \"relay\" for others), but this is not directly related to "
+"their distributed database services."
msgstr ""
#: i2p2www/pages/site/docs/how/network-database.html:323
@@ -6969,21 +7892,29 @@ msgstr ""
#: i2p2www/pages/site/docs/how/network-database.html:324
msgid ""
-"The netDb uses a simple Kademlia-style XOR metric to determine closeness.\n"
+"The netDb uses a simple Kademlia-style XOR metric to determine closeness."
+"\n"
"The SHA256 hash of the key being looked up or stored is XOR-ed with\n"
"the hash of the router in question to determine closeness.\n"
-"A modification to this algorithm is done to increase the costs of Sybil attacks.\n"
-"Instead of the SHA256 hash of the key being looked up of stored, the SHA256 hash is taken\n"
-"of the 32-byte binary search key appended with the UTC date represented as an 8-byte ASCII string yyyyMMdd, i.e. SHA256(key + yyyyMMdd).\n"
-"This is called the \"routing key\", and it changes every day at midnight UTC.\n"
-"Only the search key is modified in this way, not the floodfill router hashes.\n"
-"The daily transformation of the DHT is sometimes called \"keyspace rotation\",\n"
+"A modification to this algorithm is done to increase the costs of Sybil attacks.\n"
+"Instead of the SHA256 hash of the key being looked up of stored, the "
+"SHA256 hash is taken\n"
+"of the 32-byte binary search key appended with the UTC date represented "
+"as an 8-byte ASCII string yyyyMMdd, i.e. SHA256(key + yyyyMMdd).\n"
+"This is called the \"routing key\", and it changes every day at midnight "
+"UTC.\n"
+"Only the search key is modified in this way, not the floodfill router "
+"hashes.\n"
+"The daily transformation of the DHT is sometimes called \"keyspace "
+"rotation\",\n"
"although it isn't strictly a rotation."
msgstr ""
#: i2p2www/pages/site/docs/how/network-database.html:337
msgid ""
-"Routing keys are never sent on-the-wire in any I2NP message, they are only used locally for\n"
+"Routing keys are never sent on-the-wire in any I2NP message, they are "
+"only used locally for\n"
"determination of distance."
msgstr ""
@@ -6998,7 +7929,8 @@ msgstr ""
#: i2p2www/pages/site/docs/how/network-database.html:347
#, python-format
msgid ""
-"I2NP DatabaseStoreMessages containing the local RouterInfo are exchanged with peers\n"
+"I2NP DatabaseStoreMessages containing the local "
+"RouterInfo are exchanged with peers\n"
"as a part of the initialization of a NTCP\n"
"or SSU transport connection."
msgstr ""
@@ -7010,32 +7942,46 @@ msgstr ""
#: i2p2www/pages/site/docs/how/network-database.html:355
#, python-format
msgid ""
-"I2NP DatabaseStoreMessages containing the local LeaseSet are periodically exchanged with peers\n"
-"by bundling them in a garlic message along with normal traffic from the related Destination.\n"
-"This allows an initial response, and later responses, to be sent to an appropriate Lease,\n"
-"without requiring any LeaseSet lookups, or requiring the communicating Destinations to have published LeaseSets at all."
+"I2NP DatabaseStoreMessages containing the local "
+"LeaseSet are periodically exchanged with peers\n"
+"by bundling them in a garlic message along with normal traffic from the "
+"related Destination.\n"
+"This allows an initial response, and later responses, to be sent to an "
+"appropriate Lease,\n"
+"without requiring any LeaseSet lookups, or requiring the communicating "
+"Destinations to have published LeaseSets at all."
msgstr ""
#: i2p2www/pages/site/docs/how/network-database.html:363
msgid ""
"The DatabaseStoreMessage should be sent to the floodfill that is closest\n"
"to the current routing key for the RouterInfo or LeaseSet being stored.\n"
-"Currently, the closest floodfill is found by a search in the local database.\n"
-"Even if that floodfill is not actually closest, it will flood it \"closer\" by\n"
+"Currently, the closest floodfill is found by a search in the local "
+"database.\n"
+"Even if that floodfill is not actually closest, it will flood it "
+"\"closer\" by\n"
"sending it to multiple other floodfills.\n"
"This provides a high degree of fault-tolerance."
msgstr ""
#: i2p2www/pages/site/docs/how/network-database.html:372
msgid ""
-"In traditional Kademlia, a peer would do a \"find-closest\" search before inserting\n"
-"an item in the DHT to the closest target. As the verify operation will tend to\n"
-"discover closer floodfills if they are present, a router will quickly improve\n"
-"its knowledge of the DHT \"neighborhood\" for the RouterInfo and LeaseSets it regularly publishes.\n"
-"While I2NP does not define a \"find-closest\" message, if it becomes necessary,\n"
-"a router may simply do an iterative search for a key with the least significant bit flipped\n"
-"(i.e. key ^ 0x01) until no closer peers are received in the DatabaseSearchReplyMessages.\n"
-"This ensures that the true closest peer will be found even if a more-distant peer had\n"
+"In traditional Kademlia, a peer would do a \"find-closest\" search before"
+" inserting\n"
+"an item in the DHT to the closest target. As the verify operation will "
+"tend to\n"
+"discover closer floodfills if they are present, a router will quickly "
+"improve\n"
+"its knowledge of the DHT \"neighborhood\" for the RouterInfo and "
+"LeaseSets it regularly publishes.\n"
+"While I2NP does not define a \"find-closest\" message, if it becomes "
+"necessary,\n"
+"a router may simply do an iterative search for a key with the least "
+"significant bit flipped\n"
+"(i.e. key ^ 0x01) until no closer peers are received in the "
+"DatabaseSearchReplyMessages.\n"
+"This ensures that the true closest peer will be found even if a more-"
+"distant peer had\n"
"the netdb item."
msgstr ""
@@ -7046,9 +7992,11 @@ msgstr ""
#: i2p2www/pages/site/docs/how/network-database.html:386
#, python-format
msgid ""
-"A router publishes its own RouterInfo by directly connecting to a floodfill router\n"
+"A router publishes its own RouterInfo by directly connecting to a "
+"floodfill router\n"
"and sending it a I2NP DatabaseStoreMessage\n"
-"with a nonzero Reply Token. The message is not end-to-end garlic encrypted,\n"
+"with a nonzero Reply Token. The message is not end-to-end garlic "
+"encrypted,\n"
"as this is a direct connection, so there are no intervening routers\n"
"(and no need to hide this data anyway).\n"
"The floodfill router replies with a\n"
@@ -7062,7 +8010,8 @@ msgstr ""
#: i2p2www/pages/site/docs/how/network-database.html:401
msgid ""
-"Storage of LeaseSets is much more sensitive than for RouterInfos, as a router\n"
+"Storage of LeaseSets is much more sensitive than for RouterInfos, as a "
+"router\n"
"must take care that the LeaseSet cannot be associated with the router."
msgstr ""
@@ -7071,8 +8020,10 @@ msgstr ""
msgid ""
"A router publishes a local LeaseSet by\n"
"sending a I2NP DatabaseStoreMessage\n"
-"with a nonzero Reply Token over an outbound client tunnel for that Destination.\n"
-"The message is end-to-end garlic encrypted using the Destination's Session Key Manager,\n"
+"with a nonzero Reply Token over an outbound client tunnel for that "
+"Destination.\n"
+"The message is end-to-end garlic encrypted using the Destination's "
+"Session Key Manager,\n"
"to hide the message from the tunnel's outbound endpoint.\n"
"The floodfill router replies with a\n"
"I2NP DeliveryStatusMessage,\n"
@@ -7088,12 +8039,17 @@ msgstr ""
#, python-format
msgid ""
"After a floodfill router receives a DatabaseStoreMessage containing a\n"
-"valid RouterInfo or LeaseSet which is newer than that previously stored in its\n"
+"valid RouterInfo or LeaseSet which is newer than that previously stored "
+"in its\n"
"local NetDb, it \"floods\" it.\n"
-"To flood a NetDb entry, it looks up several (currently %(floodsize)s) floodfill routers closest to the routing key\n"
-"of the NetDb entry. (The routing key is the SHA256 Hash of the RouterIdentity or Destination with the date (yyyyMMdd) appended.)\n"
-"By flooding to those closest to the key, not closest to itself, the floodfill ensures that the storage\n"
-"gets to the right place, even if the storing router did not have good knowledge of the\n"
+"To flood a NetDb entry, it looks up several (currently %(floodsize)s) "
+"floodfill routers closest to the routing key\n"
+"of the NetDb entry. (The routing key is the SHA256 Hash of the "
+"RouterIdentity or Destination with the date (yyyyMMdd) appended.)\n"
+"By flooding to those closest to the key, not closest to itself, the "
+"floodfill ensures that the storage\n"
+"gets to the right place, even if the storing router did not have good "
+"knowledge of the\n"
"DHT \"neighborhood\" for the routing key."
msgstr ""
@@ -7115,15 +8071,17 @@ msgstr ""
#: i2p2www/pages/site/docs/how/network-database.html:442
#, python-format
msgid ""
-"The I2NP DatabaseLookupMessage is used to request a netdb entry from a floodfill router.\n"
+"The I2NP DatabaseLookupMessage is used to "
+"request a netdb entry from a floodfill router.\n"
"Lookups are sent out one of the router's outbound exploratory tunnels.\n"
-"The replies are specified to return via one of the router's inbound exploratory tunnels."
+"The replies are specified to return via one of the router's inbound "
+"exploratory tunnels."
msgstr ""
#: i2p2www/pages/site/docs/how/network-database.html:448
msgid ""
-"Lookups are generally sent to the two \"good\" (the connection doesn't fail)"
-" floodfill routers closest to the requested key, in parallel."
+"Lookups are generally sent to the two \"good\" (the connection doesn't "
+"fail) floodfill routers closest to the requested key, in parallel."
msgstr ""
#: i2p2www/pages/site/docs/how/network-database.html:452
@@ -7131,7 +8089,8 @@ msgstr ""
msgid ""
"If the key is found locally by the floodfill router, it responds with a\n"
"I2NP DatabaseStoreMessage.\n"
-"If the key is not found locally by the floodfill router, it responds with a\n"
+"If the key is not found locally by the floodfill router, it responds with"
+" a\n"
"I2NP DatabaseSearchReplyMessage\n"
"containing a list of other floodfill routers close to the key."
msgstr ""
@@ -7139,17 +8098,22 @@ msgstr ""
#: i2p2www/pages/site/docs/how/network-database.html:460
msgid ""
"LeaseSet lookups are garlic encrypted end-to-end as of release 0.9.5.\n"
-"RouterInfo lookups are not encrypted and thus are vulnerable to snooping by the outbound endpoint\n"
-"(OBEP) of the client tunnel. This is due to the expense of the ElGamal encryption.\n"
+"RouterInfo lookups are not encrypted and thus are vulnerable to snooping "
+"by the outbound endpoint\n"
+"(OBEP) of the client tunnel. This is due to the expense of the ElGamal "
+"encryption.\n"
"RouterInfo lookup encryption may be enabled in a future release."
msgstr ""
#: i2p2www/pages/site/docs/how/network-database.html:467
msgid ""
-"As of release 0.9.7, replies to a LeaseSet lookup (a DatabaseStoreMessage or a DatabaseSearchReplyMessage)\n"
+"As of release 0.9.7, replies to a LeaseSet lookup (a DatabaseStoreMessage"
+" or a DatabaseSearchReplyMessage)\n"
"will be encrypted by including the session key and tag in the lookup.\n"
-"This hides the reply from the inbound gateway (IBGW) of the reply tunnel.\n"
-"Responses to RouterInfo lookups will be encrypted if we enable the lookup encryption."
+"This hides the reply from the inbound gateway (IBGW) of the reply tunnel."
+"\n"
+"Responses to RouterInfo lookups will be encrypted if we enable the lookup"
+" encryption."
msgstr ""
#: i2p2www/pages/site/docs/how/network-database.html:474
@@ -7161,33 +8125,44 @@ msgstr ""
#: i2p2www/pages/site/docs/how/network-database.html:478
msgid ""
-"Due to the relatively small size of the network and the flooding redundancy of 8x,\n"
+"Due to the relatively small size of the network and the flooding "
+"redundancy of 8x,\n"
"lookups are usually O(1) rather than O(log n) --\n"
-"a router is highly likely to know a floodfill router close enough to the key to get the answer on the first try.\n"
+"a router is highly likely to know a floodfill router close enough to the "
+"key to get the answer on the first try.\n"
"In releases prior to 0.8.9, routers used a lookup redundancy of two\n"
-"(that is, two lookups were performed in parallel to different peers), and\n"
-"neither recursive nor iterative routing for lookups was implemented.\n"
+"(that is, two lookups were performed in parallel to different peers), and"
+"\n"
+"neither recursive nor iterative routing for lookups was "
+"implemented.\n"
"Queries were sent through multiple routes simultaneously\n"
"to reduce the chance of query failure."
msgstr ""
#: i2p2www/pages/site/docs/how/network-database.html:489
msgid ""
-"As of release 0.8.9, iterative lookups are implemented with no lookup redundancy.\n"
+"As of release 0.8.9, iterative lookups are implemented with no "
+"lookup redundancy.\n"
"This is a more efficient and reliable lookup that will work much better\n"
"when not all floodfill peers are known, and it removes a serious\n"
-"limitation to network growth. As the network grows and each router knows only a small\n"
+"limitation to network growth. As the network grows and each router knows "
+"only a small\n"
"subset of the floodfill peers, lookups will become O(log n).\n"
-"Even if the peer does not return references closer to the key, the lookup continues with\n"
-"the next-closest peer, for added robustness, and to prevent a malicious floodfill from\n"
-"black-holing a part of the key space. Lookups continue until a total lookup timeout is reached,\n"
+"Even if the peer does not return references closer to the key, the lookup"
+" continues with\n"
+"the next-closest peer, for added robustness, and to prevent a malicious "
+"floodfill from\n"
+"black-holing a part of the key space. Lookups continue until a total "
+"lookup timeout is reached,\n"
"or the maximum number of peers is queried."
msgstr ""
#: i2p2www/pages/site/docs/how/network-database.html:501
msgid ""
-"Node IDs are verifiable in that we use the router hash directly as both the node ID and the Kademlia key.\n"
-"Incorrect responses that are not closer to the search key are generally ignored.\n"
+"Node IDs are verifiable in that we use the router hash "
+"directly as both the node ID and the Kademlia key.\n"
+"Incorrect responses that are not closer to the search key are generally "
+"ignored.\n"
"Given the current size of the network, a router has\n"
"detailed knowledge of the neighborhood of the destination ID space."
msgstr ""
@@ -7199,7 +8174,8 @@ msgstr ""
#: i2p2www/pages/site/docs/how/network-database.html:511
#, python-format
msgid ""
-"Note: RouterInfo verification is disabled as of release 0.9.7.1 to prevent\n"
+"Note: RouterInfo verification is disabled as of release 0.9.7.1 to "
+"prevent\n"
"the attack described in the paper\n"
"Practical Attacks Against the I2P Network.\n"
"It is not clear if verification can be redesigned to be done safely."
@@ -7207,11 +8183,13 @@ msgstr ""
#: i2p2www/pages/site/docs/how/network-database.html:518
msgid ""
-"To verify a storage was successful, a router simply waits about 10 seconds,\n"
+"To verify a storage was successful, a router simply waits about 10 "
+"seconds,\n"
"then sends a lookup to another floodfill router close to the key\n"
"(but not the one the store was sent to).\n"
"Lookups sent out one of the router's outbound exploratory tunnels.\n"
-"Lookups are end-to-end garlic encrypted to prevent snooping by the outbound endpoint(OBEP)."
+"Lookups are end-to-end garlic encrypted to prevent snooping by the "
+"outbound endpoint(OBEP)."
msgstr ""
#: i2p2www/pages/site/docs/how/network-database.html:526
@@ -7220,18 +8198,22 @@ msgstr ""
#: i2p2www/pages/site/docs/how/network-database.html:527
msgid ""
-"To verify a storage was successful, a router simply waits about 10 seconds,\n"
+"To verify a storage was successful, a router simply waits about 10 "
+"seconds,\n"
"then sends a lookup to another floodfill router close to the key\n"
"(but not the one the store was sent to).\n"
-"Lookups sent out one of the outbound client tunnels for the destination of the LeaseSet being verified.\n"
+"Lookups sent out one of the outbound client tunnels for the destination "
+"of the LeaseSet being verified.\n"
"To prevent snooping by the OBEP of the outbound tunnel,\n"
"lookups are end-to-end garlic encrypted.\n"
-"The replies are specified to return via one of the client's inbound tunnels."
+"The replies are specified to return via one of the client's inbound "
+"tunnels."
msgstr ""
#: i2p2www/pages/site/docs/how/network-database.html:537
msgid ""
-"As of release 0.9.7, replies for both RouterInfo and LeaseSet lookups (a DatabaseStoreMessage or a DatabaseSearchReplyMessage)\n"
+"As of release 0.9.7, replies for both RouterInfo and LeaseSet lookups (a "
+"DatabaseStoreMessage or a DatabaseSearchReplyMessage)\n"
"will be encrypted,\n"
"to hide the reply from the inbound gateway (IBGW) of the reply tunnel."
msgstr ""
@@ -7243,16 +8225,24 @@ msgstr ""
#: i2p2www/pages/site/docs/how/network-database.html:546
#, python-format
msgid ""
-"Exploration is a special form of netdb lookup, where a router attempts to learn about\n"
+"Exploration is a special form of netdb lookup, where a router "
+"attempts to learn about\n"
"new routers.\n"
-"It does this by sending a floodfill router a I2NP DatabaseLookupMessage, looking for a random key.\n"
+"It does this by sending a floodfill router a I2NP DatabaseLookupMessage, looking for a random "
+"key.\n"
"As this lookup will fail, the floodfill would normally respond with a\n"
-"I2NP DatabaseSearchReplyMessage containing hashes of floodfill routers close to the key.\n"
-"This would not be helpful, as the requesting router probably already knows those floodfills,\n"
-"and it would be impractical to add ALL floodfill routers to the \"don't include\" field of the lookup.\n"
-"For an exploration query, the requesting router adds a router hash of all zeros to the\n"
+"I2NP DatabaseSearchReplyMessage containing "
+"hashes of floodfill routers close to the key.\n"
+"This would not be helpful, as the requesting router probably already "
+"knows those floodfills,\n"
+"and it would be impractical to add ALL floodfill routers to the \"don't "
+"include\" field of the lookup.\n"
+"For an exploration query, the requesting router adds a router hash of all"
+" zeros to the\n"
"\"don't include\" field of the DatabaseLookupMessage.\n"
-"The floodfill will then respond only with non-floodfill routers close to the requested key."
+"The floodfill will then respond only with non-floodfill routers close to "
+"the requested key."
msgstr ""
#: i2p2www/pages/site/docs/how/network-database.html:560
@@ -7261,11 +8251,14 @@ msgstr ""
#: i2p2www/pages/site/docs/how/network-database.html:561
msgid ""
-"The response to a lookup request is either a Database Store Message (on success) or a\n"
-"Database Search Reply Message (on failure). The DSRM contains a 'from' router hash field\n"
+"The response to a lookup request is either a Database Store Message (on "
+"success) or a\n"
+"Database Search Reply Message (on failure). The DSRM contains a 'from' "
+"router hash field\n"
"to indicate the source of the reply; the DSM does not.\n"
"The DSRM 'from' field is unauthenticated and may be spoofed or invalid.\n"
-"There are no other response tags. Therefore, when making multiple requests in parallel, it is\n"
+"There are no other response tags. Therefore, when making multiple "
+"requests in parallel, it is\n"
"difficult to monitor the performance of the various floodfill routers."
msgstr ""
@@ -7275,13 +8268,19 @@ msgstr ""
#: i2p2www/pages/site/docs/how/network-database.html:573
msgid ""
-"Destinations may be hosted on multiple routers simultaneously, by using the same\n"
+"Destinations may be hosted on multiple routers simultaneously, by using "
+"the same\n"
"private and public keys (traditionally stored in eepPriv.dat files).\n"
-"As both instances will periodically publish their signed LeaseSets to the floodfill peers,\n"
-"the most recently published LeaseSet will be returned to a peer requesting a database lookup.\n"
-"As LeaseSets have (at most) a 10 minute lifetime, should a particular instance go down,\n"
-"the outage will be 10 minutes at most, and generally much less than that.\n"
-"The multihoming function has been verified and is in use by several services on the network."
+"As both instances will periodically publish their signed LeaseSets to the"
+" floodfill peers,\n"
+"the most recently published LeaseSet will be returned to a peer "
+"requesting a database lookup.\n"
+"As LeaseSets have (at most) a 10 minute lifetime, should a particular "
+"instance go down,\n"
+"the outage will be 10 minutes at most, and generally much less than that."
+"\n"
+"The multihoming function has been verified and is in use by several "
+"services on the network."
msgstr ""
#: i2p2www/pages/site/docs/how/network-database.html:583
@@ -7311,7 +8310,8 @@ msgstr ""
#, python-format
msgid ""
"There are currently around %(ffcount)s floodfill routers in the network.\n"
-"Most of the following attacks will become more difficult, or have less impact,\n"
+"Most of the following attacks will become more difficult, or have less "
+"impact,\n"
"as the network size and number of floodfill routers increase."
msgstr ""
@@ -7322,8 +8322,8 @@ msgstr ""
#: i2p2www/pages/site/docs/how/network-database.html:604
#, python-format
msgid ""
-"Via flooding, all netdb entries are stored on the %(floodsize)s floodfill "
-"routers closest to the key."
+"Via flooding, all netdb entries are stored on the %(floodsize)s floodfill"
+" routers closest to the key."
msgstr ""
#: i2p2www/pages/site/docs/how/network-database.html:609
@@ -7344,7 +8344,8 @@ msgstr ""
#, python-format
msgid ""
"Each router maintains an expanded set of statistics in the\n"
-"peer profile for each floodfill router,\n"
+"peer profile for each floodfill router,"
+"\n"
"covering various quality metrics for that peer.\n"
"The set includes:"
msgstr ""
@@ -7375,11 +8376,14 @@ msgstr ""
#: i2p2www/pages/site/docs/how/network-database.html:631
msgid ""
-"Each time a router needs to make a determination on which floodfill router is closest to a key,\n"
+"Each time a router needs to make a determination on which floodfill "
+"router is closest to a key,\n"
"it uses these metrics to determine which floodfill routers are \"good\".\n"
-"The methods, and thresholds, used to determine \"goodness\" are relatively new, and\n"
+"The methods, and thresholds, used to determine \"goodness\" are "
+"relatively new, and\n"
"are subject to further analysis and improvement.\n"
-"While a completely unresponsive router will quickly be identified and avoided,\n"
+"While a completely unresponsive router will quickly be identified and "
+"avoided,\n"
"routers that are only sometimes malicious may be much harder to deal with."
msgstr ""
@@ -7391,7 +8395,8 @@ msgstr ""
#, python-format
msgid ""
"An attacker may mount a Sybil attack\n"
-"by creating a large number of floodfill routers spread throughout the keyspace."
+"by creating a large number of floodfill routers spread throughout the "
+"keyspace."
msgstr ""
#: i2p2www/pages/site/docs/how/network-database.html:647
@@ -7399,29 +8404,35 @@ msgstr ""
msgid ""
"(In a related example, a researcher recently created a\n"
"large number of Tor relays.)\n"
-"If successful, this could be an effective DOS attack on the entire network."
+"If successful, this could be an effective DOS attack on the entire "
+"network."
msgstr ""
#: i2p2www/pages/site/docs/how/network-database.html:653
msgid ""
-"If the floodfills are not sufficiently misbehaving to be marked as \"bad\" using the peer profile\n"
+"If the floodfills are not sufficiently misbehaving to be marked as "
+"\"bad\" using the peer profile\n"
"metrics described above, this is a difficult scenario to handle.\n"
-"Tor's response can be much more nimble in the relay case, as the suspicious relays\n"
+"Tor's response can be much more nimble in the relay case, as the "
+"suspicious relays\n"
"can be manually removed from the consensus.\n"
-"Some possible responses for the I2P network are listed below, however none of them is completely satisfactory:"
+"Some possible responses for the I2P network are listed below, however "
+"none of them is completely satisfactory:"
msgstr ""
#: i2p2www/pages/site/docs/how/network-database.html:661
msgid ""
-"Compile a list of bad router hashes or IPs, and announce the list through various means\n"
-"(console news, website, forum, etc.); users would have to manually download the list and\n"
+"Compile a list of bad router hashes or IPs, and announce the list through"
+" various means\n"
+"(console news, website, forum, etc.); users would have to manually "
+"download the list and\n"
"add it to their local \"blacklist\"."
msgstr ""
#: i2p2www/pages/site/docs/how/network-database.html:666
msgid ""
-"Ask everyone in the network to enable floodfill manually (fight Sybil with "
-"more Sybil)"
+"Ask everyone in the network to enable floodfill manually (fight Sybil "
+"with more Sybil)"
msgstr ""
#: i2p2www/pages/site/docs/how/network-database.html:667
@@ -7430,7 +8441,8 @@ msgstr ""
#: i2p2www/pages/site/docs/how/network-database.html:668
msgid ""
-"Release a new software version that improves the peer profile metrics and thresholds,\n"
+"Release a new software version that improves the peer profile metrics and"
+" thresholds,\n"
"in an attempt to automatically identify the \"bad\" peers."
msgstr ""
@@ -7442,9 +8454,12 @@ msgstr ""
#: i2p2www/pages/site/docs/how/network-database.html:673
msgid ""
-"Implement an automatic subscription-based blacklist controlled by a single individual or group.\n"
-"This would essentially implement a portion of the Tor \"consensus\" model.\n"
-"Unfortunately it would also give a single individual or group the power to\n"
+"Implement an automatic subscription-based blacklist controlled by a "
+"single individual or group.\n"
+"This would essentially implement a portion of the Tor \"consensus\" "
+"model.\n"
+"Unfortunately it would also give a single individual or group the power "
+"to\n"
"block participation of any particular router or IP in the network,\n"
"or even to completely shutdown or destroy the entire network."
msgstr ""
@@ -7461,19 +8476,25 @@ msgstr ""
#, python-format
msgid ""
"An attacker may mount a Sybil attack\n"
-"by creating a small number (8-15) of floodfill routers clustered closely in the keyspace,\n"
+"by creating a small number (8-15) of floodfill routers clustered closely "
+"in the keyspace,\n"
"and distribute the RouterInfos for these routers widely.\n"
-"Then, all lookups and stores for a key in that keyspace would be directed\n"
+"Then, all lookups and stores for a key in that keyspace would be directed"
+"\n"
"to one of the attacker's routers.\n"
-"If successful, this could be an effective DOS attack on a particular eepsite, for example."
+"If successful, this could be an effective DOS attack on a particular "
+"eepsite, for example."
msgstr ""
#: i2p2www/pages/site/docs/how/network-database.html:698
msgid ""
-"As the keyspace is indexed by the cryptographic (SHA256) Hash of the key,\n"
-"an attacker must use a brute-force method to repeatedly generate router hashes\n"
+"As the keyspace is indexed by the cryptographic (SHA256) Hash of the key,"
+"\n"
+"an attacker must use a brute-force method to repeatedly generate router "
+"hashes\n"
"until he has enough that are sufficiently close to the key.\n"
-"The amount of computational power required for this, which is dependent on network\n"
+"The amount of computational power required for this, which is dependent "
+"on network\n"
"size, is unknown."
msgstr ""
@@ -7481,10 +8502,14 @@ msgstr ""
msgid ""
"As a partial defense against this attack,\n"
"the algorithm used to determine Kademlia \"closeness\" varies over time.\n"
-"Rather than using the Hash of the key (i.e. H(k)) to determine closeness,\n"
-"we use the Hash of the key appended with the current date string, i.e. H(k + YYYYMMDD).\n"
-"A function called the \"routing key generator\" does this, which transforms the original key into a \"routing key\".\n"
-"In other words, the entire netdb keyspace \"rotates\" every day at UTC midnight.\n"
+"Rather than using the Hash of the key (i.e. H(k)) to determine closeness,"
+"\n"
+"we use the Hash of the key appended with the current date string, i.e. "
+"H(k + YYYYMMDD).\n"
+"A function called the \"routing key generator\" does this, which "
+"transforms the original key into a \"routing key\".\n"
+"In other words, the entire netdb keyspace \"rotates\" every day at UTC "
+"midnight.\n"
"Any partial-keyspace attack would have to be regenerated every day, for\n"
"after the rotation, the attacking routers would no longer be close\n"
"to the target key, or to each other."
@@ -7493,7 +8518,8 @@ msgstr ""
#: i2p2www/pages/site/docs/how/network-database.html:718
msgid ""
"This attack becomes more difficult as the network size grows.\n"
-"However, recent research demonstrates that the keyspace rotation is not particularly effective.\n"
+"However, recent research demonstrates that the keyspace rotation is not "
+"particularly effective.\n"
"An attacker can precompute numerous router hashes in advance,\n"
"and only a few routers are sufficient to \"eclipse\" a portion\n"
"of the keyspace within a half hour after rotation."
@@ -7501,9 +8527,11 @@ msgstr ""
#: i2p2www/pages/site/docs/how/network-database.html:726
msgid ""
-"One consequence of daily keyspace rotation is that the distributed network database\n"
+"One consequence of daily keyspace rotation is that the distributed "
+"network database\n"
"may become unreliable for a few minutes after the rotation --\n"
-"lookups will fail because the new \"closest\" router has not received a store yet.\n"
+"lookups will fail because the new \"closest\" router has not received a "
+"store yet.\n"
"The extent of the issue, and methods for mitigation\n"
"(for example netdb \"handoffs\" at midnight)\n"
"are a topic for further study."
@@ -7566,19 +8594,24 @@ msgstr ""
#, python-format
msgid ""
"See also lookup\n"
-"(Reference: Hashing it out in Public Sections 2.2-2.3 for terms below in italics)"
+"(Reference: Hashing it out in Public Sections "
+"2.2-2.3 for terms below in italics)"
msgstr ""
#: i2p2www/pages/site/docs/how/network-database.html:782
msgid ""
-"Similar to a bootstrap attack, an attacker using a floodfill router could attempt to \"steer\"\n"
-"peers to a subset of routers controlled by him by returning their references."
+"Similar to a bootstrap attack, an attacker using a floodfill router could"
+" attempt to \"steer\"\n"
+"peers to a subset of routers controlled by him by returning their "
+"references."
msgstr ""
#: i2p2www/pages/site/docs/how/network-database.html:787
msgid ""
-"This is unlikely to work via exploration, because exploration is a low-frequency task.\n"
-"Routers acquire a majority of their peer references through normal tunnel building activity.\n"
+"This is unlikely to work via exploration, because exploration is a low-"
+"frequency task.\n"
+"Routers acquire a majority of their peer references through normal tunnel"
+" building activity.\n"
"Exploration results are generally limited to a few router hashes,\n"
"and each exploration query is directed to a random floodfill router."
msgstr ""
@@ -7590,13 +8623,18 @@ msgid ""
"For floodfill router references returned in a\n"
"I2NP DatabaseSearchReplyMessage\n"
"response to a lookup,\n"
-"these references are followed if they are closer (or the next closest) to the lookup key.\n"
+"these references are followed if they are closer (or the next closest) to"
+" the lookup key.\n"
"The requesting router does not trust that the references are\n"
"closer to the key (i.e. they are verifiably correct.\n"
-"The lookup also does not stop when no closer key is found, but continues by querying the\n"
-"next-closet node, until the timeout or maximum number of queries is reached.\n"
-"This prevents a malicious floodfill from black-holing a part of the key space.\n"
-"Also, the daily keyspace rotation requires an attacker to regenerate a router info\n"
+"The lookup also does not stop when no closer key is found, but continues "
+"by querying the\n"
+"next-closet node, until the timeout or maximum number of queries is "
+"reached.\n"
+"This prevents a malicious floodfill from black-holing a part of the key "
+"space.\n"
+"Also, the daily keyspace rotation requires an attacker to regenerate a "
+"router info\n"
"within the desired key space region.\n"
"This design ensures that the query capture attack described in\n"
"Hashing it out in Public\n"
@@ -7634,30 +8672,43 @@ msgstr ""
#: i2p2www/pages/site/docs/how/network-database.html:829
#, python-format
msgid ""
-"This paper addresses weaknesses in the \"Finger Table\" DHT lookups used by Torsk and NISAN.\n"
-"At first glance, these do not appear to apply to I2P. First, the use of DHT by Torsk and NISAN\n"
-"is significantly different from that in I2P. Second, I2P's network database lookups are only\n"
-"loosely correlated to the peer selection and\n"
-"tunnel building processes; only previously-known peers\n"
+"This paper addresses weaknesses in the \"Finger Table\" DHT lookups used "
+"by Torsk and NISAN.\n"
+"At first glance, these do not appear to apply to I2P. First, the use of "
+"DHT by Torsk and NISAN\n"
+"is significantly different from that in I2P. Second, I2P's network "
+"database lookups are only\n"
+"loosely correlated to the peer "
+"selection and\n"
+"tunnel building processes; only "
+"previously-known peers\n"
"are used for tunnels.\n"
"Also, peer selection is unrelated to any notion of DHT key-closeness."
msgstr ""
#: i2p2www/pages/site/docs/how/network-database.html:840
msgid ""
-"Some of this may actually be more interesting when the I2P network gets much larger.\n"
-"Right now, each router knows a large proportion of the network, so looking up a particular\n"
-"Router Info in the network database is not strongly indicative of a future intent to use\n"
-"that router in a tunnel. Perhaps when the network is 100 times larger, the lookup may be\n"
-"more correlative. Of course, a larger network makes a Sybil attack that much harder."
+"Some of this may actually be more interesting when the I2P network gets "
+"much larger.\n"
+"Right now, each router knows a large proportion of the network, so "
+"looking up a particular\n"
+"Router Info in the network database is not strongly indicative of a "
+"future intent to use\n"
+"that router in a tunnel. Perhaps when the network is 100 times larger, "
+"the lookup may be\n"
+"more correlative. Of course, a larger network makes a Sybil attack that "
+"much harder."
msgstr ""
#: i2p2www/pages/site/docs/how/network-database.html:848
#, python-format
msgid ""
-"However, the general issue of DHT information leakage in I2P needs further investigation.\n"
-"The floodfill routers are in a position to observe queries and gather information.\n"
-"Certainly, at a level of f = 0.2 (20% malicious nodes, as specifed in the paper)\n"
+"However, the general issue of DHT information leakage in I2P needs "
+"further investigation.\n"
+"The floodfill routers are in a position to observe queries and gather "
+"information.\n"
+"Certainly, at a level of f = 0.2 (20% malicious nodes, as "
+"specifed in the paper)\n"
"we expect that many of the Sybil threats we describe\n"
"(here,\n"
"here and\n"
@@ -7692,9 +8743,11 @@ msgstr ""
#: i2p2www/pages/site/docs/how/peer-selection.html:10
#, python-format
msgid ""
-"Peer profiling is the process of collecting data based on the observed performance\n"
+"Peer profiling is the process of collecting data based on the "
+"observed performance\n"
"of other routers or peers, and classifying those peers into groups.\n"
-"Profiling does not use any claimed performance data published by the peer itself\n"
+"Profiling does not use any claimed performance data published by "
+"the peer itself\n"
"in the network database."
msgstr ""
@@ -7709,7 +8762,8 @@ msgstr ""
#: i2p2www/pages/site/docs/how/peer-selection.html:20
#, python-format
msgid ""
-"Choosing peers from the set of floodfill routers to use for network database storage and queries,\n"
+"Choosing peers from the set of floodfill routers to use for network "
+"database storage and queries,\n"
"which is discussed on the network database page"
msgstr ""
@@ -7722,9 +8776,11 @@ msgstr ""
#: i2p2www/pages/site/docs/how/peer-selection.html:28
msgid ""
"Peer selection is the process of choosing which routers\n"
-"on the network we want to relay our messages to go through (which peers will we \n"
+"on the network we want to relay our messages to go through (which peers "
+"will we \n"
"ask to join our tunnels). To accomplish this, we keep track of how each\n"
-"peer performs (the peer's \"profile\") and use that data to estimate how \n"
+"peer performs (the peer's \"profile\") and use that data to estimate how"
+" \n"
"fast they are, how often they will be able to accept our requests, and \n"
"whether they seem to be overloaded or otherwise unable to perform what\n"
"they agree to reliably."
@@ -7734,7 +8790,8 @@ msgstr ""
#, python-format
msgid ""
"Unlike some other anonymous networks, in I2P,\n"
-"claimed bandwidth is untrusted and is only used to avoid those peers\n"
+"claimed bandwidth is untrusted and is only used to avoid those "
+"peers\n"
"advertising very low bandwidth insufficient for routing tunnels.\n"
"All peer selection is done through profiling.\n"
"This prevents simple attacks based on peers claiming high bandwidth\n"
@@ -7746,8 +8803,10 @@ msgstr ""
#: i2p2www/pages/site/docs/how/peer-selection.html:50
msgid ""
-"Peer selection is done quite frequently, as a router may maintain a large number\n"
-"of client and exploratory tunnels, and a tunnel lifetime is only 10 minutes."
+"Peer selection is done quite frequently, as a router may maintain a large"
+" number\n"
+"of client and exploratory tunnels, and a tunnel lifetime is only 10 "
+"minutes."
msgstr ""
#: i2p2www/pages/site/docs/how/peer-selection.html:56
@@ -7758,9 +8817,11 @@ msgstr ""
#, python-format
msgid ""
"For more information see the paper\n"
-"Peer Profiling and Selection in the I2P Anonymous Network\n"
+"Peer Profiling and Selection in the I2P Anonymous "
+"Network\n"
"presented at PET-CON 2009.1.\n"
-"See below for notes on minor changes since the paper was published."
+"See below for notes on minor changes since the "
+"paper was published."
msgstr ""
#: i2p2www/pages/site/docs/how/peer-selection.html:65
@@ -7770,21 +8831,30 @@ msgstr ""
#: i2p2www/pages/site/docs/how/peer-selection.html:66
#, python-format
msgid ""
-"Each peer has a set of data points collected about them, including statistics \n"
-"about how long it takes for them to reply to a network database query, how \n"
-"often their tunnels fail, and how many new peers they are able to introduce \n"
-"us to, as well as simple data points such as when we last heard from them or\n"
-"when the last communication error occurred. The specific data points gathered\n"
+"Each peer has a set of data points collected about them, including "
+"statistics \n"
+"about how long it takes for them to reply to a network database query, "
+"how \n"
+"often their tunnels fail, and how many new peers they are able to "
+"introduce \n"
+"us to, as well as simple data points such as when we last heard from them"
+" or\n"
+"when the last communication error occurred. The specific data points "
+"gathered\n"
"can be found in the code."
msgstr ""
#: i2p2www/pages/site/docs/how/peer-selection.html:75
msgid ""
-"Profiles are fairly small, a few KB. To control memory usage, the profile expiration time\n"
+"Profiles are fairly small, a few KB. To control memory usage, the profile"
+" expiration time\n"
"lessens as the number of profiles grows.\n"
-"Profiles are kept in memory until router shutdown, when they are written to disk.\n"
-"At startup, the profiles are read so the router need not reinitialize all profiles,\n"
-"thus allowing a router to quickly re-integrate into the network after startup."
+"Profiles are kept in memory until router shutdown, when they are written "
+"to disk.\n"
+"At startup, the profiles are read so the router need not reinitialize all"
+" profiles,\n"
+"thus allowing a router to quickly re-integrate into the network after "
+"startup."
msgstr ""
#: i2p2www/pages/site/docs/how/peer-selection.html:85
@@ -7794,8 +8864,10 @@ msgstr ""
#: i2p2www/pages/site/docs/how/peer-selection.html:86
msgid ""
"While the profiles themselves can be considered a summary of a peer's \n"
-"performance, to allow for effective peer selection we break each summary down \n"
-"into four simple values, representing the peer's speed, its capacity, how well \n"
+"performance, to allow for effective peer selection we break each summary "
+"down \n"
+"into four simple values, representing the peer's speed, its capacity, how"
+" well \n"
"integrated into the network it is, and whether it is failing."
msgstr ""
@@ -7807,7 +8879,8 @@ msgstr ""
msgid ""
"The speed calculation\n"
"simply goes through the profile and estimates how much data we can\n"
-"send or receive on a single tunnel through the peer in a minute. For this estimate it just looks at\n"
+"send or receive on a single tunnel through the peer in a minute. For "
+"this estimate it just looks at\n"
"performance in the previous minute."
msgstr ""
@@ -7819,11 +8892,13 @@ msgstr ""
msgid ""
"The capacity calculation\n"
"simply goes through the profile and estimates how many tunnels the peer\n"
-"would agree to participate in over a given time period. For this estimate it looks at \n"
+"would agree to participate in over a given time period. For this "
+"estimate it looks at \n"
"how many tunnel build requests\n"
"the peer has accepted, rejected, and dropped, and how many\n"
"of the agreed-to tunnels later failed.\n"
-"While the calculation is time-weighted so that recent activity counts more than later activity,\n"
+"While the calculation is time-weighted so that recent activity counts "
+"more than later activity,\n"
"statistics up to 48 hours old may be included."
msgstr ""
@@ -7831,8 +8906,10 @@ msgstr ""
msgid ""
"Recognizing and avoiding unreliable and unreachable\n"
"peers is critically important.\n"
-"Unfortunately, as the tunnel building and testing require the participation of several peers,\n"
-"it is difficult to positively identify the cause of a dropped build request or test failure.\n"
+"Unfortunately, as the tunnel building and testing require the "
+"participation of several peers,\n"
+"it is difficult to positively identify the cause of a dropped build "
+"request or test failure.\n"
"The router assigns a probability of failure to each of the\n"
"peers, and uses that probability in the capacity calculation.\n"
"Drops and test failures are weighted much higher than rejections."
@@ -7844,8 +8921,10 @@ msgstr ""
#: i2p2www/pages/site/docs/how/peer-selection.html:124
msgid ""
-"As mentioned above, we drill through each peer's profile to come up with a \n"
-"few key calculations, and based upon those, we organize each peer into three\n"
+"As mentioned above, we drill through each peer's profile to come up with "
+"a \n"
+"few key calculations, and based upon those, we organize each peer into "
+"three\n"
"groups - fast, high capacity, and standard."
msgstr ""
@@ -7855,13 +8934,15 @@ msgstr ""
#: i2p2www/pages/site/docs/how/peer-selection.html:134
msgid ""
-"A peer is considered \"high capacity\" if its capacity calculation meets or \n"
+"A peer is considered \"high capacity\" if its capacity calculation meets "
+"or \n"
"exceeds the median of all peers."
msgstr ""
#: i2p2www/pages/site/docs/how/peer-selection.html:138
msgid ""
-"A peer is considered \"fast\" if they are already \"high capacity\" and their \n"
+"A peer is considered \"fast\" if they are already \"high capacity\" and "
+"their \n"
"speed calculation meets or exceeds the median of all peers."
msgstr ""
@@ -7887,20 +8968,25 @@ msgstr ""
#: i2p2www/pages/site/docs/how/peer-selection.html:156
msgid ""
"The fast group is limited to 30 peers.\n"
-"If there would be more, only the ones with the highest speed rating are placed in the group."
+"If there would be more, only the ones with the highest speed rating are "
+"placed in the group."
msgstr ""
#: i2p2www/pages/site/docs/how/peer-selection.html:160
msgid ""
-"The high capacity group is limited to 75 peers (including the fast group)\n"
-"If there would be more, only the ones with the highest capacity rating are placed in the group."
+"The high capacity group is limited to 75 peers (including the fast group)"
+"\n"
+"If there would be more, only the ones with the highest capacity rating "
+"are placed in the group."
msgstr ""
#: i2p2www/pages/site/docs/how/peer-selection.html:164
msgid ""
-"The standard group has no fixed limit, but is somewhat smaller than the number of RouterInfos\n"
+"The standard group has no fixed limit, but is somewhat smaller than the "
+"number of RouterInfos\n"
"stored in the local network database.\n"
-"On an active router in today's network, there may be about 1000 RouterInfos and 500 peer profiles\n"
+"On an active router in today's network, there may be about 1000 "
+"RouterInfos and 500 peer profiles\n"
"(including those in the fast and high capacity groups)"
msgstr ""
@@ -7916,15 +9002,16 @@ msgstr ""
#: i2p2www/pages/site/docs/how/peer-selection.html:177
msgid ""
-"The groups tend to be fairly stable, that is, there is not much \"churn\" in the rankings\n"
+"The groups tend to be fairly stable, that is, there is not much \"churn\""
+" in the rankings\n"
"at each recalculation.\n"
-"Peers in the fast and high capacity groups get more tunnels build through them, which increases their speed and capacity ratings,\n"
+"Peers in the fast and high capacity groups get more tunnels build through"
+" them, which increases their speed and capacity ratings,\n"
"which reinforces their presence in the group."
msgstr ""
#: i2p2www/pages/site/docs/how/peer-selection.html:188
-msgid ""
-"The router selects peers from the above groups to build tunnels through."
+msgid "The router selects peers from the above groups to build tunnels through."
msgstr ""
#: i2p2www/pages/site/docs/how/peer-selection.html:193
@@ -7933,16 +9020,19 @@ msgstr ""
#: i2p2www/pages/site/docs/how/peer-selection.html:194
msgid ""
-"Client tunnels are used for application traffic, such as for HTTP proxies "
-"and web servers."
+"Client tunnels are used for application traffic, such as for HTTP proxies"
+" and web servers."
msgstr ""
#: i2p2www/pages/site/docs/how/peer-selection.html:198
msgid ""
-"To reduce the susceptibility to some attacks,\n"
+"To reduce the susceptibility to some attacks,\n"
"and increase performance,\n"
-"peers for building client tunnels are chosen randomly from the smallest group, which is the \"fast\" group.\n"
-"There is no bias toward selecting peers that were previously participants in a tunnel for the same client."
+"peers for building client tunnels are chosen randomly from the smallest "
+"group, which is the \"fast\" group.\n"
+"There is no bias toward selecting peers that were previously participants"
+" in a tunnel for the same client."
msgstr ""
#: i2p2www/pages/site/docs/how/peer-selection.html:206
@@ -7951,26 +9041,35 @@ msgstr ""
#: i2p2www/pages/site/docs/how/peer-selection.html:207
msgid ""
-"Exploratory tunnels are used for router administrative purposes, such as network database traffic\n"
+"Exploratory tunnels are used for router administrative purposes, such as "
+"network database traffic\n"
"and testing client tunnels.\n"
-"Exploratory tunnels are also used to contact previously unconnected routers, which is why\n"
+"Exploratory tunnels are also used to contact previously unconnected "
+"routers, which is why\n"
"they are called \"exploratory\".\n"
"These tunnels are usually low-bandwidth."
msgstr ""
#: i2p2www/pages/site/docs/how/peer-selection.html:215
msgid ""
-"Peers for building exploratory tunnels are generally chosen randomly from the standard group.\n"
-"If the success rate of these build attempts is low compared to the client tunnel build success rate,\n"
-"the router will select a weighted average of peers randomly from the high capacity group instead.\n"
-"This helps maintain a satisfactory build success rate even when network performance is poor.\n"
-"There is no bias toward selecting peers that were previously participants in an exploratory tunnel."
+"Peers for building exploratory tunnels are generally chosen randomly from"
+" the standard group.\n"
+"If the success rate of these build attempts is low compared to the client"
+" tunnel build success rate,\n"
+"the router will select a weighted average of peers randomly from the high"
+" capacity group instead.\n"
+"This helps maintain a satisfactory build success rate even when network "
+"performance is poor.\n"
+"There is no bias toward selecting peers that were previously participants"
+" in an exploratory tunnel."
msgstr ""
#: i2p2www/pages/site/docs/how/peer-selection.html:223
msgid ""
-"As the standard group includes a very large subset of all peers the router knows about,\n"
-"exploratory tunnels are essentially built through a random selection of all peers,\n"
+"As the standard group includes a very large subset of all peers the "
+"router knows about,\n"
+"exploratory tunnels are essentially built through a random selection of "
+"all peers,\n"
"until the build success rate becomes too low."
msgstr ""
@@ -7980,8 +9079,8 @@ msgstr ""
#: i2p2www/pages/site/docs/how/peer-selection.html:232
msgid ""
-"To prevent some simple attacks, and for performance, there are the following"
-" restrictions:"
+"To prevent some simple attacks, and for performance, there are the "
+"following restrictions:"
msgstr ""
#: i2p2www/pages/site/docs/how/peer-selection.html:236
@@ -7990,8 +9089,8 @@ msgstr ""
#: i2p2www/pages/site/docs/how/peer-selection.html:239
msgid ""
-"A peer may participate in a maximum of 33% of all tunnels created by the"
-" router."
+"A peer may participate in a maximum of 33% of all tunnels created by "
+"the router."
msgstr ""
#: i2p2www/pages/site/docs/how/peer-selection.html:242
@@ -8012,18 +9111,18 @@ msgid ""
"Peers are ordered within tunnels to\n"
"to deal with the predecessor attack\n"
"(2008 update).\n"
-"More information is on the tunnel page."
+"More information is on the tunnel "
+"page."
msgstr ""
#: i2p2www/pages/site/docs/how/peer-selection.html:268
-msgid ""
-"Continue to analyze an tune speed and capacity calculations as necessary"
+msgid "Continue to analyze an tune speed and capacity calculations as necessary"
msgstr ""
#: i2p2www/pages/site/docs/how/peer-selection.html:271
msgid ""
-"Implement a more aggressive ejection strategy if necessary to control memory"
-" usage as the network grows"
+"Implement a more aggressive ejection strategy if necessary to control "
+"memory usage as the network grows"
msgstr ""
#: i2p2www/pages/site/docs/how/peer-selection.html:274
@@ -8038,8 +9137,10 @@ msgstr ""
#, python-format
msgid ""
"For those reading the paper\n"
-"Peer Profiling and Selection in the I2P Anonymous Network,\n"
-"please keep in mind the following minor changes in I2P since the paper's publication:"
+"Peer Profiling and Selection in the I2P Anonymous "
+"Network,\n"
+"please keep in mind the following minor changes in I2P since the paper's "
+"publication:"
msgstr ""
#: i2p2www/pages/site/docs/how/peer-selection.html:289
@@ -8113,18 +9214,24 @@ msgstr ""
#: i2p2www/pages/site/docs/how/tech-intro.html:25
msgid ""
"I2P is a scalable, self organizing, resilient packet switched anonymous \n"
-"network layer, upon which any number of different anonymity or security conscious \n"
-"applications can operate. Each of these applications may make their own anonymity, \n"
-"latency, and throughput tradeoffs without worrying about the proper implementation \n"
-"of a free route mixnet, allowing them to blend their activity with the larger \n"
+"network layer, upon which any number of different anonymity or security "
+"conscious \n"
+"applications can operate. Each of these applications may make their own "
+"anonymity, \n"
+"latency, and throughput tradeoffs without worrying about the proper "
+"implementation \n"
+"of a free route mixnet, allowing them to blend their activity with the "
+"larger \n"
"anonymity set of users already running on top of I2P."
msgstr ""
#: i2p2www/pages/site/docs/how/tech-intro.html:34
msgid ""
-"Applications available already provide the full range of typical Internet activities -\n"
+"Applications available already provide the full range of typical Internet"
+" activities -\n"
"anonymous web browsing, web hosting, chat, file sharing, e-mail,\n"
-"blogging and content syndication, newsgroups, as well as several other applications under development."
+"blogging and content syndication, newsgroups, as well as several other "
+"applications under development."
msgstr ""
#: i2p2www/pages/site/docs/how/tech-intro.html:40
@@ -8137,8 +9244,10 @@ msgstr ""
#: i2p2www/pages/site/docs/how/tech-intro.html:42
msgid ""
-"File sharing: I2PSnark, Robert, iMule, \n"
-"I2Phex, PyBit, I2P-bt\n"
+"File sharing: I2PSnark, Robert, iMule, \n"
+"I2Phex, PyBit, I2P-bt\n"
"and others."
msgstr ""
@@ -8150,14 +9259,14 @@ msgstr ""
#: i2p2www/pages/site/docs/how/tech-intro.html:48
msgid ""
-"Blog: using e.g. the pebble plugin or the distributed blogging software Syndie."
+"Blog: using e.g. the pebble plugin or the distributed blogging software "
+"Syndie."
msgstr ""
#: i2p2www/pages/site/docs/how/tech-intro.html:49
msgid ""
-"Distributed Data Store: Save your data redundantly in the Tahoe-LAFS cloud "
-"over I2P."
+"Distributed Data Store: Save your data redundantly in the Tahoe-LAFS "
+"cloud over I2P."
msgstr ""
#: i2p2www/pages/site/docs/how/tech-intro.html:50
@@ -8166,47 +9275,77 @@ msgstr ""
#: i2p2www/pages/site/docs/how/tech-intro.html:53
msgid ""
-"Unlike web sites hosted within content distribution networks like Freenet \n"
-"or GNUnet, the services hosted on \n"
-"I2P are fully interactive - there are traditional web-style search engines, \n"
-"bulletin boards, blogs you can comment on, database driven sites, and bridges \n"
-"to query static systems like Freenet without needing to install it locally."
+"Unlike web sites hosted within content distribution networks like Freenet \n"
+"or GNUnet, the services "
+"hosted on \n"
+"I2P are fully interactive - there are traditional web-style search "
+"engines, \n"
+"bulletin boards, blogs you can comment on, database driven sites, and "
+"bridges \n"
+"to query static systems like Freenet without needing to install it "
+"locally."
msgstr ""
#: i2p2www/pages/site/docs/how/tech-intro.html:61
msgid ""
"With all of these anonymity enabled applications, I2P takes on the role \n"
-"of the message oriented middleware - applications say that they want to send \n"
-"some data to a cryptographic identifier (a \"destination\") and I2P takes care \n"
-"of making sure it gets there securely and anonymously. I2P also bundles a \n"
-"simple streaming library to allow I2P's anonymous \n"
-"best-effort messages to transfer as reliable, in-order streams, transparently \n"
-"offering a TCP based congestion control algorithm tuned for the high bandwidth \n"
-"delay product of the network. While there have been several simple SOCKS proxies \n"
-"available to tie existing applications into the network, their value has been \n"
-"limited as nearly every application routinely exposes what, in an anonymous \n"
-"context, is sensitive information. The only safe way to go is to fully audit \n"
-"an application to ensure proper operation and to assist in that we provide \n"
-"a series of APIs in various languages which can be used to make the most out \n"
+"of the message oriented middleware - applications say that they want to "
+"send \n"
+"some data to a cryptographic identifier (a \"destination\") and I2P takes"
+" care \n"
+"of making sure it gets there securely and anonymously. I2P also bundles a"
+" \n"
+"simple streaming library to allow I2P's "
+"anonymous \n"
+"best-effort messages to transfer as reliable, in-order streams, "
+"transparently \n"
+"offering a TCP based congestion control algorithm tuned for the high "
+"bandwidth \n"
+"delay product of the network. While there have been several simple SOCKS "
+"proxies \n"
+"available to tie existing applications into the network, their value has "
+"been \n"
+"limited as nearly every application routinely exposes what, in an "
+"anonymous \n"
+"context, is sensitive information. The only safe way to go is to fully "
+"audit \n"
+"an application to ensure proper operation and to assist in that we "
+"provide \n"
+"a series of APIs in various languages which can be used to make the most "
+"out \n"
"of the network."
msgstr ""
#: i2p2www/pages/site/docs/how/tech-intro.html:78
#, python-format
msgid ""
-"I2P is not a research project - academic, commercial, or governmental, but \n"
-"is instead an engineering effort aimed at doing whatever is necessary to provide \n"
-"a sufficient level of anonymity to those who need it. It has been in active \n"
-"development since early 2003 with one full time developer and a dedicated \n"
-"group of part time contributors from all over the world. All of the work done \n"
-"on I2P is open source and freely available on the website, \n"
-"with the majority of the code released outright into the public domain, though \n"
-"making use of a few cryptographic routines under BSD-style licenses. The people \n"
-"working on I2P do not control what people release client applications under, \n"
-"and there are several GPL'ed applications available (I2PTunnel, \n"
-"susimail, I2PSnark, I2P-Bote, \n"
+"I2P is not a research project - academic, commercial, or governmental, "
+"but \n"
+"is instead an engineering effort aimed at doing whatever is necessary to "
+"provide \n"
+"a sufficient level of anonymity to those who need it. It has been in "
+"active \n"
+"development since early 2003 with one full time developer and a dedicated"
+" \n"
+"group of part time contributors from all over the world. All of the work "
+"done \n"
+"on I2P is open source and freely available on the website, \n"
+"with the majority of the code released outright into the public domain, "
+"though \n"
+"making use of a few cryptographic routines under BSD-style licenses. The "
+"people \n"
+"working on I2P do not control what people release client applications "
+"under, \n"
+"and there are several GPL'ed applications available (I2PTunnel, \n"
+"susimail, I2PSnark, I2P-"
+"Bote, \n"
"I2Phex and others.).\n"
-"Funding for I2P comes entirely from donations,\n"
+"Funding for I2P comes entirely from "
+"donations,\n"
"and does not receive any tax breaks in any jurisdiction at this time,\n"
"as many of the developers are themselves anonymous."
msgstr ""
@@ -8217,27 +9356,40 @@ msgstr ""
#: i2p2www/pages/site/docs/how/tech-intro.html:98
msgid ""
-"To understand I2P's operation, it is essential to understand a few key concepts. \n"
-"First, I2P makes a strict separation between the software participating in \n"
-"the network (a \"router\") and the anonymous endpoints (\"destinations\") associated \n"
-"with individual applications. The fact that someone is running I2P is not \n"
-"usually a secret. What is hidden is information on what the user is doing, \n"
-"if anything at all, as well as what router a particular destination is connected \n"
-"to. End users will typically have several local destinations on their router \n"
-"- for instance, one proxying in to IRC servers, another supporting the user's \n"
-"anonymous webserver (\"eepsite\"), another for an I2Phex instance, another for \n"
+"To understand I2P's operation, it is essential to understand a few key "
+"concepts. \n"
+"First, I2P makes a strict separation between the software participating "
+"in \n"
+"the network (a \"router\") and the anonymous endpoints (\"destinations\")"
+" associated \n"
+"with individual applications. The fact that someone is running I2P is not"
+" \n"
+"usually a secret. What is hidden is information on what the user is "
+"doing, \n"
+"if anything at all, as well as what router a particular destination is "
+"connected \n"
+"to. End users will typically have several local destinations on their "
+"router \n"
+"- for instance, one proxying in to IRC servers, another supporting the "
+"user's \n"
+"anonymous webserver (\"eepsite\"), another for an I2Phex instance, "
+"another for \n"
"torrents, etc."
msgstr ""
#: i2p2www/pages/site/docs/how/tech-intro.html:111
msgid ""
"Another critical concept to understand is the \"tunnel\".\n"
-"A tunnel is a directed path through an explicitly selected list of routers.\n"
-"Layered encryption is used, so each of the routers can only decrypt a single layer.\n"
+"A tunnel is a directed path through an explicitly selected list of "
+"routers.\n"
+"Layered encryption is used, so each of the routers can only decrypt a "
+"single layer.\n"
"The decrypted information contains the IP of the next router, along with\n"
"the encrypted information to be forwarded.\n"
-"Each tunnel has a starting point (the first router, also known as \"gateway\")\n"
-"and an end point. Messages can be sent only in one way. To send messages back,\n"
+"Each tunnel has a starting point (the first router, also known as "
+"\"gateway\")\n"
+"and an end point. Messages can be sent only in one way. To send messages "
+"back,\n"
"another tunnel is required."
msgstr ""
@@ -8257,12 +9409,15 @@ msgid ""
"while \"inbound\" tunnels bring messages to the tunnel creator.\n"
"Combining these two tunnels allows users to send messages to each other.\n"
"The sender (\"Alice\" in the above image) sets up an outbound tunnel,\n"
-"while the receiver (\"Bob\" in the above image) creates an inbound tunnel.\n"
-"The gateway of an inbound tunnel can receive messages from any other user\n"
+"while the receiver (\"Bob\" in the above image) creates an inbound "
+"tunnel.\n"
+"The gateway of an inbound tunnel can receive messages from any other user"
+"\n"
"and will send them on until the endpoint (\"Bob\").\n"
"The endpoint of the outbound tunnel will need to send the message\n"
"on to the gateway of the inbound tunnel.\n"
-"To do this, the sender (\"Alice\") adds instructions to her encrypted message.\n"
+"To do this, the sender (\"Alice\") adds instructions to her encrypted "
+"message.\n"
"Once the endpoint of the outbound tunnel decrypts the message,\n"
"it will have instructions to forward the message to the correct\n"
"inbound gateway (the gateway to \"Bob\")."
@@ -8270,19 +9425,25 @@ msgstr ""
#: i2p2www/pages/site/docs/how/tech-intro.html:144
msgid ""
-"A third critical concept to understand is I2P's \"network database\" (or \"netDb\") \n"
-"- a pair of algorithms used to share network metadata. The two types of metadata \n"
-"carried are \"routerInfo\" and \"leaseSets\" - the routerInfo gives routers the \n"
-"data necessary for contacting a particular router (their public keys, transport \n"
-"addresses, etc), while the leaseSet gives routers the information necessary \n"
-"for contacting a particular destination. A leaseSet contains a number of \"leases\".\n"
-"Each of this leases specifies a tunnel gateway, which allows reaching a specific destination.\n"
+"A third critical concept to understand is I2P's \"network "
+"database\" (or \"netDb\") \n"
+"- a pair of algorithms used to share network metadata. The two types of "
+"metadata \n"
+"carried are \"routerInfo\" and \"leaseSets\" - the "
+"routerInfo gives routers the \n"
+"data necessary for contacting a particular router (their public keys, "
+"transport \n"
+"addresses, etc), while the leaseSet gives routers the information "
+"necessary \n"
+"for contacting a particular destination. A leaseSet contains a number of "
+"\"leases\".\n"
+"Each of this leases specifies a tunnel gateway, which allows reaching a "
+"specific destination.\n"
"The full information contained in a lease:"
msgstr ""
#: i2p2www/pages/site/docs/how/tech-intro.html:155
-msgid ""
-"Inbound gateway for a tunnel that allows reaching a specific destination."
+msgid "Inbound gateway for a tunnel that allows reaching a specific destination."
msgstr ""
#: i2p2www/pages/site/docs/how/tech-intro.html:156
@@ -8297,8 +9458,10 @@ msgstr ""
#: i2p2www/pages/site/docs/how/tech-intro.html:159
msgid ""
-"Routers themselves send their routerInfo to the netDb directly, while leaseSets are sent through outbound tunnels\n"
-"(leaseSets need to be sent anonymously, to avoid correlating a router with his leaseSets)."
+"Routers themselves send their routerInfo to the netDb directly, while "
+"leaseSets are sent through outbound tunnels\n"
+"(leaseSets need to be sent anonymously, to avoid correlating a router "
+"with his leaseSets)."
msgstr ""
#: i2p2www/pages/site/docs/how/tech-intro.html:164
@@ -8309,10 +9472,13 @@ msgstr ""
#: i2p2www/pages/site/docs/how/tech-intro.html:168
msgid ""
-"To build up her own inbound and outbound tunnels, Alice does a lookup in the netDb to collect routerInfo.\n"
+"To build up her own inbound and outbound tunnels, Alice does a lookup in "
+"the netDb to collect routerInfo.\n"
"This way, she gathers lists of peers she can use as hops in her tunnels.\n"
-"She can then send a build message to the first hop, requesting the construction of a tunnel and asking\n"
-"that router to send the construction message onward, until the tunnel has been constructed."
+"She can then send a build message to the first hop, requesting the "
+"construction of a tunnel and asking\n"
+"that router to send the construction message onward, until the tunnel has"
+" been constructed."
msgstr ""
#: i2p2www/pages/site/docs/how/tech-intro.html:175
@@ -8329,19 +9495,30 @@ msgstr ""
#: i2p2www/pages/site/docs/how/tech-intro.html:182
msgid ""
-"When Alice wants to send a message to Bob, she first does a lookup in the \n"
-"netDb to find Bob's leaseSet, giving her his current inbound tunnel gateways. \n"
-"She then picks one of her outbound tunnels and sends the message down it with \n"
-"instructions for the outbound tunnel's endpoint to forward the message on \n"
-"to one of Bob's inbound tunnel gateways. When the outbound tunnel endpoint \n"
-"receives those instructions, it forwards the message as requested, and when \n"
-"Bob's inbound tunnel gateway receives it, it is forwarded down the tunnel \n"
-"to Bob's router. If Alice wants Bob to be able to reply to the message, she \n"
-"needs to transmit her own destination explicitly as part of the message itself.\n"
-"This can be done by introducing a higher-level layer, which is done in the\n"
+"When Alice wants to send a message to Bob, she first does a lookup in the"
+" \n"
+"netDb to find Bob's leaseSet, giving her his current inbound tunnel "
+"gateways. \n"
+"She then picks one of her outbound tunnels and sends the message down it "
+"with \n"
+"instructions for the outbound tunnel's endpoint to forward the message on"
+" \n"
+"to one of Bob's inbound tunnel gateways. When the outbound tunnel "
+"endpoint \n"
+"receives those instructions, it forwards the message as requested, and "
+"when \n"
+"Bob's inbound tunnel gateway receives it, it is forwarded down the tunnel"
+" \n"
+"to Bob's router. If Alice wants Bob to be able to reply to the message, "
+"she \n"
+"needs to transmit her own destination explicitly as part of the message "
+"itself.\n"
+"This can be done by introducing a higher-level layer, which is done in "
+"the\n"
"streaming library.\n"
"Alice may also cut down on the response time by bundling her most \n"
-"recent LeaseSet with the message so that Bob doesn't need to do a netDb lookup \n"
+"recent LeaseSet with the message so that Bob doesn't need to do a netDb "
+"lookup \n"
"for it when he wants to reply, but this is optional."
msgstr ""
@@ -8359,126 +9536,210 @@ msgstr ""
#: i2p2www/pages/site/docs/how/tech-intro.html:204
msgid ""
-"While the tunnels themselves have layered encryption to prevent unauthorized \n"
-"disclosure to peers inside the network (as the transport layer itself does \n"
-"to prevent unauthorized disclosure to peers outside the network), it is necessary \n"
-"to add an additional end to end layer of encryption to hide the message from \n"
-"the outbound tunnel endpoint and the inbound tunnel gateway. This \"garlic \n"
-"encryption\" lets Alice's router wrap up multiple messages into a single \n"
-"\"garlic message\", encrypted to a particular public key so that intermediary \n"
-"peers cannot determine either how many messages are within the garlic, what \n"
-"those messages say, or where those individual cloves are destined. For typical \n"
-"end to end communication between Alice and Bob, the garlic will be encrypted \n"
-"to the public key published in Bob's leaseSet, allowing the message to be \n"
+"While the tunnels themselves have layered encryption to prevent "
+"unauthorized \n"
+"disclosure to peers inside the network (as the transport layer itself "
+"does \n"
+"to prevent unauthorized disclosure to peers outside the network), it is "
+"necessary \n"
+"to add an additional end to end layer of encryption to hide the message "
+"from \n"
+"the outbound tunnel endpoint and the inbound tunnel gateway. This \"garlic \n"
+"encryption\" lets Alice's router wrap up multiple messages into a "
+"single \n"
+"\"garlic message\", encrypted to a particular public key so that "
+"intermediary \n"
+"peers cannot determine either how many messages are within the garlic, "
+"what \n"
+"those messages say, or where those individual cloves are destined. For "
+"typical \n"
+"end to end communication between Alice and Bob, the garlic will be "
+"encrypted \n"
+"to the public key published in Bob's leaseSet, allowing the message to be"
+" \n"
"encrypted without giving out the public key to Bob's own router."
msgstr ""
#: i2p2www/pages/site/docs/how/tech-intro.html:219
msgid ""
-"Another important fact to keep in mind is that I2P is entirely message based \n"
-"and that some messages may be lost along the way. Applications using I2P can \n"
-"use the message oriented interfaces and take care of their own congestion \n"
-"control and reliability needs, but most would be best served by reusing the \n"
-"provided streaming library to view I2P as a streams \n"
+"Another important fact to keep in mind is that I2P is entirely message "
+"based \n"
+"and that some messages may be lost along the way. Applications using I2P "
+"can \n"
+"use the message oriented interfaces and take care of their own congestion"
+" \n"
+"control and reliability needs, but most would be best served by reusing "
+"the \n"
+"provided streaming library to view I2P as "
+"a streams \n"
"based network."
msgstr ""
#: i2p2www/pages/site/docs/how/tech-intro.html:229
msgid ""
"Both inbound and outbound tunnels work along similar principles.\n"
-"The tunnel gateway accumulates a number of tunnel messages, eventually preprocessing \n"
-"them into something for tunnel delivery. Next, the gateway encrypts that preprocessed \n"
-"data and forwards it to the first hop. That peer and subsequent tunnel participants \n"
-"add on a layer of encryption after verifying that it isn't a duplicate before \n"
-"forward it on to the next peer. Eventually, the message arrives at the endpoint \n"
-"where the messages are split out again and forwarded on as requested. The \n"
-"difference arises in what the tunnel's creator does - for inbound tunnels, \n"
-"the creator is the endpoint and they simply decrypt all of the layers added, \n"
-"while for outbound tunnels, the creator is the gateway and they pre-decrypt \n"
-"all of the layers so that after all of the layers of per-hop encryption are \n"
+"The tunnel gateway accumulates a number of tunnel messages, eventually "
+"preprocessing \n"
+"them into something for tunnel delivery. Next, the gateway encrypts that "
+"preprocessed \n"
+"data and forwards it to the first hop. That peer and subsequent tunnel "
+"participants \n"
+"add on a layer of encryption after verifying that it isn't a duplicate "
+"before \n"
+"forward it on to the next peer. Eventually, the message arrives at the "
+"endpoint \n"
+"where the messages are split out again and forwarded on as requested. The"
+" \n"
+"difference arises in what the tunnel's creator does - for inbound "
+"tunnels, \n"
+"the creator is the endpoint and they simply decrypt all of the layers "
+"added, \n"
+"while for outbound tunnels, the creator is the gateway and they pre-"
+"decrypt \n"
+"all of the layers so that after all of the layers of per-hop encryption "
+"are \n"
"added, the message arrives in the clear at the tunnel endpoint."
msgstr ""
#: i2p2www/pages/site/docs/how/tech-intro.html:244
msgid ""
-"The choice of specific peers to pass on messages as well as their particular \n"
-"ordering is important to understanding both I2P's anonymity and performance \n"
-"characteristics. While the network database (below) has its own criteria for \n"
-"picking what peers to query and store entries on, tunnel creators may use any peers \n"
-"in the network in any order (and even any number of times) in a single tunnel. \n"
-"If perfect latency and capacity data were globally known, selection and ordering \n"
-"would be driven by the particular needs of the client in tandem with their \n"
-"threat model. Unfortunately, latency and capacity data is not trivial to gather \n"
-"anonymously, and depending upon untrusted peers to provide this information \n"
+"The choice of specific peers to pass on messages as well as their "
+"particular \n"
+"ordering is important to understanding both I2P's anonymity and "
+"performance \n"
+"characteristics. While the network database (below) has its own criteria "
+"for \n"
+"picking what peers to query and store entries on, tunnel creators may use"
+" any peers \n"
+"in the network in any order (and even any number of times) in a single "
+"tunnel. \n"
+"If perfect latency and capacity data were globally known, selection and "
+"ordering \n"
+"would be driven by the particular needs of the client in tandem with "
+"their \n"
+"threat model. Unfortunately, latency and capacity data is not trivial to "
+"gather \n"
+"anonymously, and depending upon untrusted peers to provide this "
+"information \n"
"has its own serious anonymity implications."
msgstr ""
#: i2p2www/pages/site/docs/how/tech-intro.html:257
msgid ""
-"From an anonymity perspective, the simplest technique would be to pick peers \n"
-"randomly from the entire network, order them randomly and use those peers \n"
-"in that order for all eternity. From a performance perspective, the simplest \n"
-"technique would be to pick the fastest peers with the necessary spare capacity, \n"
-"spreading the load across different peers to handle transparent failover, \n"
-"and to rebuild the tunnel whenever capacity information changes. While the \n"
-"former is both brittle and inefficient, the later requires inaccessible information \n"
-"and offers insufficient anonymity. I2P is instead working on offering a range \n"
-"of peer selection strategies, coupled with anonymity aware measurement code \n"
+"From an anonymity perspective, the simplest technique would be to pick "
+"peers \n"
+"randomly from the entire network, order them randomly and use those peers"
+" \n"
+"in that order for all eternity. From a performance perspective, the "
+"simplest \n"
+"technique would be to pick the fastest peers with the necessary spare "
+"capacity, \n"
+"spreading the load across different peers to handle transparent failover,"
+" \n"
+"and to rebuild the tunnel whenever capacity information changes. While "
+"the \n"
+"former is both brittle and inefficient, the later requires inaccessible "
+"information \n"
+"and offers insufficient anonymity. I2P is instead working on offering a "
+"range \n"
+"of peer selection strategies, coupled with anonymity aware measurement "
+"code \n"
"to organize the peers by their profiles."
msgstr ""
#: i2p2www/pages/site/docs/how/tech-intro.html:270
msgid ""
-"As a base, I2P is constantly profiling the peers with which it interacts \n"
-"with by measuring their indirect behavior - for instance, when a peer responds \n"
-"to a netDb lookup in 1.3 seconds, that round trip latency is recorded in the \n"
-"profiles for all of the routers involved in the two tunnels (inbound and outbound) \n"
-"through which the request and response passed, as well as the queried peer's \n"
-"profile. Direct measurement, such as transport layer latency or congestion, \n"
-"is not used as part of the profile, as it can be manipulated and associated \n"
-"with the measuring router, exposing them to trivial attacks. While gathering \n"
-"these profiles, a series of calculations are run on each to summarize its \n"
-"performance - its latency, capacity to handle lots of activity, whether they \n"
-"are currently overloaded, and how well integrated into the network they seem \n"
-"to be. These calculations are then compared for active peers to organize the \n"
-"routers into four tiers - fast and high capacity, high capacity, not failing, \n"
-"and failing. The thresholds for those tiers are determined dynamically, and \n"
+"As a base, I2P is constantly profiling the peers with which it interacts"
+" \n"
+"with by measuring their indirect behavior - for instance, when a peer "
+"responds \n"
+"to a netDb lookup in 1.3 seconds, that round trip latency is recorded in "
+"the \n"
+"profiles for all of the routers involved in the two tunnels (inbound and "
+"outbound) \n"
+"through which the request and response passed, as well as the queried "
+"peer's \n"
+"profile. Direct measurement, such as transport layer latency or "
+"congestion, \n"
+"is not used as part of the profile, as it can be manipulated and "
+"associated \n"
+"with the measuring router, exposing them to trivial attacks. While "
+"gathering \n"
+"these profiles, a series of calculations are run on each to summarize its"
+" \n"
+"performance - its latency, capacity to handle lots of activity, whether "
+"they \n"
+"are currently overloaded, and how well integrated into the network they "
+"seem \n"
+"to be. These calculations are then compared for active peers to organize "
+"the \n"
+"routers into four tiers - fast and high capacity, high capacity, not "
+"failing, \n"
+"and failing. The thresholds for those tiers are determined dynamically, "
+"and \n"
"while they currently use fairly simple algorithms, alternatives exist."
msgstr ""
#: i2p2www/pages/site/docs/how/tech-intro.html:288
msgid ""
-"Using this profile data, the simplest reasonable peer selection strategy \n"
-"is to pick peers randomly from the top tier (fast and high capacity), and \n"
-"this is currently deployed for client tunnels. Exploratory tunnels (used for \n"
-"netDb and tunnel management) pick peers randomly from the \"not failing\" tier \n"
-"(which includes routers in 'better' tiers as well), allowing the peer to sample \n"
-"routers more widely, in effect optimizing the peer selection through randomized \n"
-"hill climbing. These strategies alone do however leak information regarding \n"
-"the peers in the router's top tier through predecessor and netDb harvesting \n"
-"attacks. In turn, several alternatives exist which, while not balancing the \n"
-"load as evenly, will address the attacks mounted by particular classes of \n"
+"Using this profile data, the simplest reasonable peer selection strategy"
+" \n"
+"is to pick peers randomly from the top tier (fast and high capacity), and"
+" \n"
+"this is currently deployed for client tunnels. Exploratory tunnels (used "
+"for \n"
+"netDb and tunnel management) pick peers randomly from the \"not failing\""
+" tier \n"
+"(which includes routers in 'better' tiers as well), allowing the peer to "
+"sample \n"
+"routers more widely, in effect optimizing the peer selection through "
+"randomized \n"
+"hill climbing. These strategies alone do however leak information "
+"regarding \n"
+"the peers in the router's top tier through predecessor and netDb "
+"harvesting \n"
+"attacks. In turn, several alternatives exist which, while not balancing "
+"the \n"
+"load as evenly, will address the attacks mounted by particular classes of"
+" \n"
"adversaries."
msgstr ""
#: i2p2www/pages/site/docs/how/tech-intro.html:302
msgid ""
-"By picking a random key and ordering the peers according to their XOR distance \n"
-"from it, the information leaked is reduced in predecessor and harvesting attacks \n"
-"according to the peers' failure rate and the tier's churn. Another simple \n"
-"strategy for dealing with netDb harvesting attacks is to simply fix the inbound \n"
-"tunnel gateway(s) yet randomize the peers further on in the tunnels. To deal \n"
-"with predecessor attacks for adversaries which the client contacts, the outbound \n"
-"tunnel endpoints would also remain fixed. The selection of which peer to fix \n"
-"on the most exposed point would of course need to have a limit to the duration, \n"
-"as all peers fail eventually, so it could either be reactively adjusted or \n"
-"proactively avoided to mimic a measured mean time between failures of other \n"
-"routers. These two strategies can in turn be combined, using a fixed exposed \n"
-"peer and an XOR based ordering within the tunnels themselves. A more rigid \n"
-"strategy would fix the exact peers and ordering of a potential tunnel, only \n"
-"using individual peers if all of them agree to participate in the same way \n"
-"each time. This varies from the XOR based ordering in that the predecessor \n"
-"and successor of each peer is always the same, while the XOR only makes sure \n"
+"By picking a random key and ordering the peers according to their XOR "
+"distance \n"
+"from it, the information leaked is reduced in predecessor and harvesting "
+"attacks \n"
+"according to the peers' failure rate and the tier's churn. Another simple"
+" \n"
+"strategy for dealing with netDb harvesting attacks is to simply fix the "
+"inbound \n"
+"tunnel gateway(s) yet randomize the peers further on in the tunnels. To "
+"deal \n"
+"with predecessor attacks for adversaries which the client contacts, the "
+"outbound \n"
+"tunnel endpoints would also remain fixed. The selection of which peer to "
+"fix \n"
+"on the most exposed point would of course need to have a limit to the "
+"duration, \n"
+"as all peers fail eventually, so it could either be reactively adjusted "
+"or \n"
+"proactively avoided to mimic a measured mean time between failures of "
+"other \n"
+"routers. These two strategies can in turn be combined, using a fixed "
+"exposed \n"
+"peer and an XOR based ordering within the tunnels themselves. A more "
+"rigid \n"
+"strategy would fix the exact peers and ordering of a potential tunnel, "
+"only \n"
+"using individual peers if all of them agree to participate in the same "
+"way \n"
+"each time. This varies from the XOR based ordering in that the "
+"predecessor \n"
+"and successor of each peer is always the same, while the XOR only makes "
+"sure \n"
"their order doesn't change."
msgstr ""
@@ -8487,8 +9748,10 @@ msgstr ""
msgid ""
"As mentioned before, I2P currently (release 0.8) includes the tiered \n"
"random strategy above, with XOR-based ordering. A \n"
-"more detailed discussion of the mechanics involved in tunnel operation, management, \n"
-"and peer selection can be found in the tunnel spec."
+"more detailed discussion of the mechanics involved in tunnel operation, "
+"management, \n"
+"and peer selection can be found in the tunnel "
+"spec."
msgstr ""
#: i2p2www/pages/site/docs/how/tech-intro.html:330
@@ -8502,20 +9765,27 @@ msgstr ""
#: i2p2www/pages/site/docs/how/tech-intro.html:336
msgid ""
"A percentage of I2P users are appointed as 'floodfill peers'.\n"
-"Currently, I2P installations that have a lot of bandwidth and are fast enough,\n"
-"will appoint themselves as floodfill as soon as the number of existing floodfill routers\n"
+"Currently, I2P installations that have a lot of bandwidth and are fast "
+"enough,\n"
+"will appoint themselves as floodfill as soon as the number of existing "
+"floodfill routers\n"
"drops too low."
msgstr ""
#: i2p2www/pages/site/docs/how/tech-intro.html:343
#, python-format
msgid ""
-"Other I2P routers will store their data and lookup data by sending simple 'store' and 'lookup' queries to the floodfills.\n"
-"If a floodfill router receives a 'store' query, it will spread the information to other floodfill routers\n"
-"using the Kademlia algorithm.\n"
-"The 'lookup' queries currently function differently, to avoid an important\n"
+"Other I2P routers will store their data and lookup data by sending simple"
+" 'store' and 'lookup' queries to the floodfills.\n"
+"If a floodfill router receives a 'store' query, it will spread the "
+"information to other floodfill routers\n"
+"using the Kademlia "
+"algorithm.\n"
+"The 'lookup' queries currently function differently, to avoid an "
+"important\n"
"security issue.\n"
-"When a lookup is done, the floodfill router will not forward the lookup to other peers,\n"
+"When a lookup is done, the floodfill router will not forward the lookup "
+"to other peers,\n"
"but will always answer by itself (if it has the requested data)."
msgstr ""
@@ -8525,8 +9795,8 @@ msgstr ""
#: i2p2www/pages/site/docs/how/tech-intro.html:357
msgid ""
-"A RouterInfo stores information on a specific I2P router and how to "
-"contact it"
+"A RouterInfo stores information on a specific I2P router and how "
+"to contact it"
msgstr ""
#: i2p2www/pages/site/docs/how/tech-intro.html:358
@@ -8537,10 +9807,14 @@ msgstr ""
#: i2p2www/pages/site/docs/how/tech-intro.html:360
msgid ""
-"All of this information is signed by the publishing party and verified by any I2P router using or storing the information.\n"
-"In addition, the data contains timing information, to avoid storage of old entries and possible attacks.\n"
-"This is also why I2P bundles the necessary code for maintaining the correct time, occasionally querying some SNTP servers \n"
-"(the pool.ntp.org round robin by default)\n"
+"All of this information is signed by the publishing party and verified by"
+" any I2P router using or storing the information.\n"
+"In addition, the data contains timing information, to avoid storage of "
+"old entries and possible attacks.\n"
+"This is also why I2P bundles the necessary code for maintaining the "
+"correct time, occasionally querying some SNTP servers \n"
+"(the pool.ntp.org round robin by"
+" default)\n"
"and detecting skew between routers at the transport layer."
msgstr ""
@@ -8555,8 +9829,10 @@ msgstr ""
#: i2p2www/pages/site/docs/how/tech-intro.html:374
msgid ""
"One could only want specific people to be able to reach a destination.\n"
-"This is possible by not publishing the destination in the netDb. You will however have to transmit the destination by other means.\n"
-"An alternative are the 'encrypted leaseSets'. These leaseSets can only be decoded by people with access to the decryption key."
+"This is possible by not publishing the destination in the netDb. You will"
+" however have to transmit the destination by other means.\n"
+"An alternative are the 'encrypted leaseSets'. These leaseSets can only be"
+" decoded by people with access to the decryption key."
msgstr ""
#: i2p2www/pages/site/docs/how/tech-intro.html:381
@@ -8565,10 +9841,13 @@ msgstr ""
#: i2p2www/pages/site/docs/how/tech-intro.html:382
msgid ""
-"Bootstrapping the netDb is quite simple. Once a router manages to receive a single routerInfo of a reachable peer,\n"
+"Bootstrapping the netDb is quite simple. Once a router manages to receive"
+" a single routerInfo of a reachable peer,\n"
"it can query that router for references to other routers in the network.\n"
-"Currently, a number of users post their routerInfo files to a website to make this information available.\n"
-"I2P automatically connects to one of these websites to gather routerInfo files and bootstrap."
+"Currently, a number of users post their routerInfo files to a website to "
+"make this information available.\n"
+"I2P automatically connects to one of these websites to gather routerInfo "
+"files and bootstrap."
msgstr ""
#: i2p2www/pages/site/docs/how/tech-intro.html:390
@@ -8578,18 +9857,26 @@ msgstr ""
#: i2p2www/pages/site/docs/how/tech-intro.html:391
msgid ""
"Lookups in the I2P network are not forwarded to other netDb routers.\n"
-"Currently, this is not a major problem, since the network is not very large.\n"
-"However, as the network grows, not all routerInfo and leaseSet files will be present\n"
-"on each netDb router. This will cause a deterioration of the percentage of successful lookups.\n"
-"Because of this, refinements to the netDb will be done in the next releases."
+"Currently, this is not a major problem, since the network is not very "
+"large.\n"
+"However, as the network grows, not all routerInfo and leaseSet files will"
+" be present\n"
+"on each netDb router. This will cause a deterioration of the percentage "
+"of successful lookups.\n"
+"Because of this, refinements to the netDb will be done in the next "
+"releases."
msgstr ""
#: i2p2www/pages/site/docs/how/tech-intro.html:402
msgid ""
-"Communication between routers needs to provide confidentiality and integrity \n"
-"against external adversaries while authenticating that the router contacted \n"
-"is the one who should receive a given message. The particulars of how routers \n"
-"communicate with other routers aren't critical - three separate protocols \n"
+"Communication between routers needs to provide confidentiality and "
+"integrity \n"
+"against external adversaries while authenticating that the router "
+"contacted \n"
+"is the one who should receive a given message. The particulars of how "
+"routers \n"
+"communicate with other routers aren't critical - three separate protocols"
+" \n"
"have been used at different points to provide those bare necessities."
msgstr ""
@@ -8597,9 +9884,12 @@ msgstr ""
#, python-format
msgid ""
"I2P started with a TCP-based protocol which \n"
-"has since been disabled. Then, to accommodate the need for high degree communication \n"
-"(as a number of routers will end up speaking with many others), I2P moved \n"
-"from a TCP based transport to a UDP-based one - \"Secure \n"
+"has since been disabled. Then, to accommodate the need for high degree "
+"communication \n"
+"(as a number of routers will end up speaking with many others), I2P moved"
+" \n"
+"from a TCP based transport to a UDP-based one - "
+"\"Secure \n"
"Semireliable UDP\", or \"SSU\"."
msgstr ""
@@ -8611,32 +9901,46 @@ msgstr ""
#: i2p2www/pages/site/docs/how/tech-intro.html:422
msgid ""
"The goal of this protocol is to provide secure, authenticated, \n"
-"semireliable and unordered message delivery, exposing only a minimal amount \n"
-"of data easily discernible to third parties. It should support high degree \n"
-"communication as well as TCP-friendly congestion control and may include \n"
-"PMTU detection. It should be capable of efficiently moving bulk data at rates \n"
-"sufficient for home users. In addition, it should support techniques for addressing \n"
+"semireliable and unordered message delivery, exposing only a minimal "
+"amount \n"
+"of data easily discernible to third parties. It should support high "
+"degree \n"
+"communication as well as TCP-friendly congestion control and may include"
+" \n"
+"PMTU detection. It should be capable of efficiently moving bulk data at "
+"rates \n"
+"sufficient for home users. In addition, it should support techniques for "
+"addressing \n"
"network obstacles, like most NATs or firewalls."
msgstr ""
#: i2p2www/pages/site/docs/how/tech-intro.html:432
#, python-format
msgid ""
-"Following the introduction of SSU, after issues with congestion collapse \n"
-"appeared, a new NIO-based TCP transport called NTCP \n"
-"was implemented. It is enabled by default for outbound connections only. Those \n"
-"who configure their NAT/firewall to allow inbound connections and specify \n"
-"the external host and port (dyndns/etc is ok) on /config.jsp can receive inbound \n"
-"connections. As NTCP is NIO based, so it doesn't suffer from the 1 thread \n"
+"Following the introduction of SSU, after issues with congestion collapse"
+" \n"
+"appeared, a new NIO-based TCP transport called NTCP \n"
+"was implemented. It is enabled by default for outbound connections only. "
+"Those \n"
+"who configure their NAT/firewall to allow inbound connections and specify"
+" \n"
+"the external host and port (dyndns/etc is ok) on /config.jsp can receive "
+"inbound \n"
+"connections. As NTCP is NIO based, so it doesn't suffer from the 1 thread"
+" \n"
"per connection issues of the old TCP transport."
msgstr ""
#: i2p2www/pages/site/docs/how/tech-intro.html:442
msgid ""
"I2P supports multiple transports simultaneously. A particular transport \n"
-"for an outbound connection is selected with \"bids\". Each transport bids for \n"
-"the connection and the relative value of these bids assigns the priority. \n"
-"Transports may reply with different bids, depending on whether there is already \n"
+"for an outbound connection is selected with \"bids\". Each transport bids"
+" for \n"
+"the connection and the relative value of these bids assigns the priority."
+" \n"
+"Transports may reply with different bids, depending on whether there is "
+"already \n"
"an established connection to the peer."
msgstr ""
@@ -8644,25 +9948,38 @@ msgstr ""
#, python-format
msgid ""
"The current implementation ranks NTCP as the highest-priority transport \n"
-"for outbound connections in most situations. SSU is enabled for both outbound \n"
-"and inbound connections. Your firewall and your I2P router must be configured \n"
-"to allow inbound NTCP connections. For further information see the NTCP \n"
+"for outbound connections in most situations. SSU is enabled for both "
+"outbound \n"
+"and inbound connections. Your firewall and your I2P router must be "
+"configured \n"
+"to allow inbound NTCP connections. For further information see the NTCP \n"
"page."
msgstr ""
#: i2p2www/pages/site/docs/how/tech-intro.html:459
msgid ""
"A bare minimum set of cryptographic primitives are combined together to \n"
-"provide I2P's layered defenses against a variety of adversaries. At the lowest \n"
-"level, inter router communication is protected by the transport layer security \n"
-"- SSU encrypts each packet with AES256/CBC with both an explicit IV and MAC \n"
-"(HMAC-MD5-128) after agreeing upon an ephemeral session key through a 2048bit \n"
-"Diffie-Hellman exchange, station-to-station authentication with the other \n"
-"router's DSA key, plus each network message has their own hash for local integrity \n"
-"checking. Tunnel messages passed over the transports \n"
-"have their own layered AES256/CBC encryption with an explicit IV and verified \n"
-"at the tunnel endpoint with an additional SHA256 hash. Various other messages \n"
-"are passed along inside \"garlic messages\", which are encrypted with ElGamal/AES+SessionTags \n"
+"provide I2P's layered defenses against a variety of adversaries. At the "
+"lowest \n"
+"level, inter router communication is protected by the transport layer "
+"security \n"
+"- SSU encrypts each packet with AES256/CBC with both an explicit IV and "
+"MAC \n"
+"(HMAC-MD5-128) after agreeing upon an ephemeral session key through a "
+"2048bit \n"
+"Diffie-Hellman exchange, station-to-station authentication with the other"
+" \n"
+"router's DSA key, plus each network message has their own hash for local "
+"integrity \n"
+"checking. Tunnel messages passed over the "
+"transports \n"
+"have their own layered AES256/CBC encryption with an explicit IV and "
+"verified \n"
+"at the tunnel endpoint with an additional SHA256 hash. Various other "
+"messages \n"
+"are passed along inside \"garlic messages\", which are encrypted with "
+"ElGamal/AES+SessionTags \n"
"(explained below)."
msgstr ""
@@ -8672,31 +9989,51 @@ msgstr ""
#: i2p2www/pages/site/docs/how/tech-intro.html:475
msgid ""
-"Garlic messages are an extension of \"onion\" layered encryption, allowing \n"
-"the contents of a single message to contain multiple \"cloves\" - fully formed \n"
-"messages alongside their own instructions for delivery. Messages are wrapped \n"
-"into a garlic message whenever the message would otherwise be passing in cleartext \n"
-"through a peer who should not have access to the information - for instance, \n"
-"when a router wants to ask another router to participate in a tunnel, they \n"
-"wrap the request inside a garlic, encrypt that garlic to the receiving router's \n"
-"2048bit ElGamal public key, and forward it through a tunnel. Another example \n"
-"is when a client wants to send a message to a destination - the sender's router \n"
-"will wrap up that data message (alongside some other messages) into a garlic, \n"
-"encrypt that garlic to the 2048bit ElGamal public key published in the recipient's \n"
+"Garlic messages are an extension of \"onion\" layered encryption, "
+"allowing \n"
+"the contents of a single message to contain multiple \"cloves\" - fully "
+"formed \n"
+"messages alongside their own instructions for delivery. Messages are "
+"wrapped \n"
+"into a garlic message whenever the message would otherwise be passing in "
+"cleartext \n"
+"through a peer who should not have access to the information - for "
+"instance, \n"
+"when a router wants to ask another router to participate in a tunnel, "
+"they \n"
+"wrap the request inside a garlic, encrypt that garlic to the receiving "
+"router's \n"
+"2048bit ElGamal public key, and forward it through a tunnel. Another "
+"example \n"
+"is when a client wants to send a message to a destination - the sender's "
+"router \n"
+"will wrap up that data message (alongside some other messages) into a "
+"garlic, \n"
+"encrypt that garlic to the 2048bit ElGamal public key published in the "
+"recipient's \n"
"leaseSet, and forward it through the appropriate tunnels."
msgstr ""
#: i2p2www/pages/site/docs/how/tech-intro.html:490
msgid ""
-"The \"instructions\" attached to each clove inside the encryption layer includes \n"
-"the ability to request that the clove be forwarded locally, to a remote router, \n"
-"or to a remote tunnel on a remote router. There are fields in those instructions \n"
-"allowing a peer to request that the delivery be delayed until a certain time \n"
-"or condition has been met, though they won't be honored until the nontrivial \n"
-"delays are deployed. It is possible to explicitly route garlic messages \n"
-"any number of hops without building tunnels, or even to reroute tunnel messages \n"
-"by wrapping them in garlic messages and forwarding them a number of hops prior \n"
-"to delivering them to the next hop in the tunnel, but those techniques are \n"
+"The \"instructions\" attached to each clove inside the encryption layer "
+"includes \n"
+"the ability to request that the clove be forwarded locally, to a remote "
+"router, \n"
+"or to a remote tunnel on a remote router. There are fields in those "
+"instructions \n"
+"allowing a peer to request that the delivery be delayed until a certain "
+"time \n"
+"or condition has been met, though they won't be honored until the nontrivial \n"
+"delays are deployed. It is possible to explicitly route garlic "
+"messages \n"
+"any number of hops without building tunnels, or even to reroute tunnel "
+"messages \n"
+"by wrapping them in garlic messages and forwarding them a number of hops "
+"prior \n"
+"to delivering them to the next hop in the tunnel, but those techniques "
+"are \n"
"not currently used in the existing implementation."
msgstr ""
@@ -8706,35 +10043,54 @@ msgstr ""
#: i2p2www/pages/site/docs/how/tech-intro.html:504
msgid ""
-"As an unreliable, unordered, message based system, I2P uses a simple combination \n"
-"of asymmetric and symmetric encryption algorithms to provide data confidentiality \n"
-"and integrity to garlic messages. As a whole, the combination is referred \n"
-"to as ElGamal/AES+SessionTags, but that is an excessively verbose way to describe \n"
+"As an unreliable, unordered, message based system, I2P uses a simple "
+"combination \n"
+"of asymmetric and symmetric encryption algorithms to provide data "
+"confidentiality \n"
+"and integrity to garlic messages. As a whole, the combination is referred"
+" \n"
+"to as ElGamal/AES+SessionTags, but that is an excessively verbose way to "
+"describe \n"
"the simple use of 2048bit ElGamal, AES256, SHA256 and 32 byte nonces."
msgstr ""
#: i2p2www/pages/site/docs/how/tech-intro.html:543
msgid ""
-"Session tags themselves have a very short lifetime, after which they are \n"
-"discarded if not used. In addition, the quantity stored for each key is limited, \n"
-"as are the number of keys themselves - if too many arrive, either new or old \n"
-"messages may be dropped. The sender keeps track whether messages using session \n"
-"tags are getting through, and if there isn't sufficient communication it may \n"
-"drop the ones previously assumed to be properly delivered, reverting back \n"
+"Session tags themselves have a very short lifetime, after which they are"
+" \n"
+"discarded if not used. In addition, the quantity stored for each key is "
+"limited, \n"
+"as are the number of keys themselves - if too many arrive, either new or "
+"old \n"
+"messages may be dropped. The sender keeps track whether messages using "
+"session \n"
+"tags are getting through, and if there isn't sufficient communication it "
+"may \n"
+"drop the ones previously assumed to be properly delivered, reverting back"
+" \n"
"to the full expensive ElGamal encryption."
msgstr ""
#: i2p2www/pages/site/docs/how/tech-intro.html:553
msgid ""
-"One alternative is to transmit only a single session tag, and from that, \n"
-"seed a deterministic PRNG for determining what tags to use or expect. By keeping \n"
-"this PRNG roughly synchronized between the sender and recipient (the recipient \n"
-"precomputes a window of the next e.g. 50 tags), the overhead of periodically \n"
-"bundling a large number of tags is removed, allowing more options in the space/time \n"
-"tradeoff, and perhaps reducing the number of ElGamal encryptions necessary. \n"
-"However, it would depend upon the strength of the PRNG to provide the necessary \n"
-"cover against internal adversaries, though perhaps by limiting the amount \n"
-"of times each PRNG is used, any weaknesses can be minimized. At the moment, \n"
+"One alternative is to transmit only a single session tag, and from that,"
+" \n"
+"seed a deterministic PRNG for determining what tags to use or expect. By "
+"keeping \n"
+"this PRNG roughly synchronized between the sender and recipient (the "
+"recipient \n"
+"precomputes a window of the next e.g. 50 tags), the overhead of "
+"periodically \n"
+"bundling a large number of tags is removed, allowing more options in the "
+"space/time \n"
+"tradeoff, and perhaps reducing the number of ElGamal encryptions "
+"necessary. \n"
+"However, it would depend upon the strength of the PRNG to provide the "
+"necessary \n"
+"cover against internal adversaries, though perhaps by limiting the amount"
+" \n"
+"of times each PRNG is used, any weaknesses can be minimized. At the "
+"moment, \n"
"there are no immediate plans to move towards these synchronized PRNGs."
msgstr ""
@@ -8744,9 +10100,12 @@ msgstr ""
#: i2p2www/pages/site/docs/how/tech-intro.html:567
msgid ""
-"While I2P is currently functional and sufficient for many scenarios, there \n"
-"are several areas which require further improvement to meet the needs of those \n"
-"facing more powerful adversaries as well as substantial user experience optimization."
+"While I2P is currently functional and sufficient for many scenarios, "
+"there \n"
+"are several areas which require further improvement to meet the needs of "
+"those \n"
+"facing more powerful adversaries as well as substantial user experience "
+"optimization."
msgstr ""
#: i2p2www/pages/site/docs/how/tech-intro.html:573
@@ -8755,64 +10114,106 @@ msgstr ""
#: i2p2www/pages/site/docs/how/tech-intro.html:574
msgid ""
-"I2P is an overlay network designed to be run on top of a functional packet \n"
-"switched network, exploiting the end to end principle to offer anonymity and \n"
-"security. While the Internet no longer fully embraces the end to end principle\n"
+"I2P is an overlay network designed to be run on top of a functional "
+"packet \n"
+"switched network, exploiting the end to end principle to offer anonymity "
+"and \n"
+"security. While the Internet no longer fully embraces the end to end "
+"principle\n"
"(due to the usage of NAT), \n"
-"I2P does require a substantial portion of the network to be reachable - there \n"
-"may be a number of peers along the edges running using restricted routes, \n"
-"but I2P does not include an appropriate routing algorithm for the degenerate \n"
-"case where most peers are unreachable. It would, however work on top of a \n"
+"I2P does require a substantial portion of the network to be reachable - "
+"there \n"
+"may be a number of peers along the edges running using restricted routes,"
+" \n"
+"but I2P does not include an appropriate routing algorithm for the "
+"degenerate \n"
+"case where most peers are unreachable. It would, however work on top of a"
+" \n"
"network employing such an algorithm."
msgstr ""
#: i2p2www/pages/site/docs/how/tech-intro.html:586
msgid ""
-"Restricted route operation, where there are limits to what peers are reachable \n"
-"directly, has several different functional and anonymity implications, dependent \n"
-"upon how the restricted routes are handled. At the most basic level, restricted \n"
-"routes exist when a peer is behind a NAT or firewall which does not allow \n"
-"inbound connections. This was largely addressed in I2P 0.6.0.6 by integrating \n"
-"distributed hole punching into the transport layer, allowing people behind \n"
-"most NATs and firewalls to receive unsolicited connections without any configuration. \n"
-"However, this does not limit the exposure of the peer's IP address to routers \n"
-"inside the network, as they can simply get introduced to the peer through \n"
+"Restricted route operation, where there are limits to what peers are "
+"reachable \n"
+"directly, has several different functional and anonymity implications, "
+"dependent \n"
+"upon how the restricted routes are handled. At the most basic level, "
+"restricted \n"
+"routes exist when a peer is behind a NAT or firewall which does not allow"
+" \n"
+"inbound connections. This was largely addressed in I2P 0.6.0.6 by "
+"integrating \n"
+"distributed hole punching into the transport layer, allowing people "
+"behind \n"
+"most NATs and firewalls to receive unsolicited connections without any "
+"configuration. \n"
+"However, this does not limit the exposure of the peer's IP address to "
+"routers \n"
+"inside the network, as they can simply get introduced to the peer through"
+" \n"
"the published introducer."
msgstr ""
#: i2p2www/pages/site/docs/how/tech-intro.html:599
msgid ""
-"Beyond the functional handling of restricted routes, there are two levels \n"
-"of restricted operation that can be used to limit the exposure of one's IP \n"
-"address - using router-specific tunnels for communication, and offering 'client \n"
-"routers'. For the former, routers can either build a new pool of tunnels or \n"
-"reuse their exploratory pool, publishing the inbound gateways to some of them \n"
-"as part of their routerInfo in place of their transport addresses. When a \n"
-"peer wants to get in touch with them, they see those tunnel gateways in the \n"
-"netDb and simply send the relevant message to them through one of the published \n"
-"tunnels. If the peer behind the restricted route wants to reply, it may do \n"
-"so either directly (if they are willing to expose their IP to the peer) or \n"
-"indirectly through their outbound tunnels. When the routers that the peer \n"
-"has direct connections to want to reach it (to forward tunnel messages, for \n"
-"instance), they simply prioritize their direct connection over the published \n"
-"tunnel gateway. The concept of 'client routers' simply extends the restricted \n"
-"route by not publishing any router addresses. Such a router would not even \n"
-"need to publish their routerInfo in the netDb, merely providing their self \n"
-"signed routerInfo to the peers that it contacts (necessary to pass the router's \n"
-"public keys). Both levels of restricted route operation are planned for I2P \n"
+"Beyond the functional handling of restricted routes, there are two levels"
+" \n"
+"of restricted operation that can be used to limit the exposure of one's "
+"IP \n"
+"address - using router-specific tunnels for communication, and offering "
+"'client \n"
+"routers'. For the former, routers can either build a new pool of tunnels "
+"or \n"
+"reuse their exploratory pool, publishing the inbound gateways to some of "
+"them \n"
+"as part of their routerInfo in place of their transport addresses. When a"
+" \n"
+"peer wants to get in touch with them, they see those tunnel gateways in "
+"the \n"
+"netDb and simply send the relevant message to them through one of the "
+"published \n"
+"tunnels. If the peer behind the restricted route wants to reply, it may "
+"do \n"
+"so either directly (if they are willing to expose their IP to the peer) "
+"or \n"
+"indirectly through their outbound tunnels. When the routers that the peer"
+" \n"
+"has direct connections to want to reach it (to forward tunnel messages, "
+"for \n"
+"instance), they simply prioritize their direct connection over the "
+"published \n"
+"tunnel gateway. The concept of 'client routers' simply extends the "
+"restricted \n"
+"route by not publishing any router addresses. Such a router would not "
+"even \n"
+"need to publish their routerInfo in the netDb, merely providing their "
+"self \n"
+"signed routerInfo to the peers that it contacts (necessary to pass the "
+"router's \n"
+"public keys). Both levels of restricted route operation are planned for "
+"I2P \n"
"2.0."
msgstr ""
#: i2p2www/pages/site/docs/how/tech-intro.html:621
msgid ""
-"There are tradeoffs for those behind restricted routes, as they would likely \n"
-"participate in other people's tunnels less frequently, and the routers which \n"
-"they are connected to would be able to infer traffic patterns that would not \n"
-"otherwise be exposed. On the other hand, if the cost of that exposure is less \n"
-"than the cost of an IP being made available, it may be worthwhile. This, of \n"
-"course, assumes that the peers that the router behind a restricted route contacts \n"
-"are not hostile - either the network is large enough that the probability \n"
-"of using a hostile peer to get connected is small enough, or trusted (and \n"
+"There are tradeoffs for those behind restricted routes, as they would "
+"likely \n"
+"participate in other people's tunnels less frequently, and the routers "
+"which \n"
+"they are connected to would be able to infer traffic patterns that would "
+"not \n"
+"otherwise be exposed. On the other hand, if the cost of that exposure is "
+"less \n"
+"than the cost of an IP being made available, it may be worthwhile. This, "
+"of \n"
+"course, assumes that the peers that the router behind a restricted route "
+"contacts \n"
+"are not hostile - either the network is large enough that the probability"
+" \n"
+"of using a hostile peer to get connected is small enough, or trusted (and"
+" \n"
"perhaps temporary) peers are used instead."
msgstr ""
@@ -8822,28 +10223,45 @@ msgstr ""
#: i2p2www/pages/site/docs/how/tech-intro.html:634
msgid ""
-"Even though the bulk of I2P's initial efforts have been on low latency communication, \n"
-"it was designed with variable latency services in mind from the beginning. \n"
-"At the most basic level, applications running on top of I2P can offer the \n"
-"anonymity of medium and high latency communication while still blending their \n"
-"traffic patterns in with low latency traffic. Internally though, I2P can offer \n"
-"its own medium and high latency communication through the garlic encryption \n"
-"- specifying that the message should be sent after a certain delay, at a certain \n"
-"time, after a certain number of messages have passed, or another mix strategy. \n"
-"With the layered encryption, only the router that the clove exposed the delay \n"
-"request would know that the message requires high latency, allowing the traffic \n"
-"to blend in further with the low latency traffic. Once the transmission precondition \n"
-"is met, the router holding on to the clove (which itself would likely be a \n"
-"garlic message) simply forwards it as requested - to a router, to a tunnel, \n"
+"Even though the bulk of I2P's initial efforts have been on low latency "
+"communication, \n"
+"it was designed with variable latency services in mind from the "
+"beginning. \n"
+"At the most basic level, applications running on top of I2P can offer the"
+" \n"
+"anonymity of medium and high latency communication while still blending "
+"their \n"
+"traffic patterns in with low latency traffic. Internally though, I2P can "
+"offer \n"
+"its own medium and high latency communication through the garlic "
+"encryption \n"
+"- specifying that the message should be sent after a certain delay, at a "
+"certain \n"
+"time, after a certain number of messages have passed, or another mix "
+"strategy. \n"
+"With the layered encryption, only the router that the clove exposed the "
+"delay \n"
+"request would know that the message requires high latency, allowing the "
+"traffic \n"
+"to blend in further with the low latency traffic. Once the transmission "
+"precondition \n"
+"is met, the router holding on to the clove (which itself would likely be "
+"a \n"
+"garlic message) simply forwards it as requested - to a router, to a "
+"tunnel, \n"
"or, most likely, to a remote client destination."
msgstr ""
#: i2p2www/pages/site/docs/how/tech-intro.html:651
msgid ""
-"There are a substantial number of ways to exploit this capacity for high \n"
-"latency comm in I2P, but for the moment, doing so has been scheduled for the \n"
-"I2P 3.0 release. In the meantime, those requiring the anonymity that high \n"
-"latency comm can offer should look towards the application layer to provide \n"
+"There are a substantial number of ways to exploit this capacity for high"
+" \n"
+"latency comm in I2P, but for the moment, doing so has been scheduled for "
+"the \n"
+"I2P 3.0 release. In the meantime, those requiring the anonymity that high"
+" \n"
+"latency comm can offer should look towards the application layer to "
+"provide \n"
"it."
msgstr ""
@@ -8877,12 +10295,18 @@ msgstr ""
#: i2p2www/pages/site/docs/how/tech-intro.html:669
msgid ""
-"I2P's architecture builds on the concepts of message oriented middleware, \n"
-"the topology of DHTs, the anonymity and cryptography of free route mixnets, \n"
-"and the adaptability of packet switched networking. The value comes not from \n"
-"novel concepts of algorithms though, but from careful engineering combining \n"
-"the research results of existing systems and papers. While there are a few \n"
-"similar efforts worth reviewing, both for technical and functional comparisons, \n"
+"I2P's architecture builds on the concepts of message oriented middleware,"
+" \n"
+"the topology of DHTs, the anonymity and cryptography of free route "
+"mixnets, \n"
+"and the adaptability of packet switched networking. The value comes not "
+"from \n"
+"novel concepts of algorithms though, but from careful engineering "
+"combining \n"
+"the research results of existing systems and papers. While there are a "
+"few \n"
+"similar efforts worth reviewing, both for technical and functional "
+"comparisons, \n"
"two in particular are pulled out here - Tor and Freenet."
msgstr ""
@@ -8899,164 +10323,263 @@ msgstr ""
#: i2p2www/pages/site/docs/how/tech-intro.html:686
msgid ""
"At first glance, Tor and I2P have many functional and anonymity related \n"
-"similarities. While I2P's development began before we were aware of the early \n"
-"stage efforts on Tor, many of the lessons of the original onion routing and \n"
-"ZKS efforts were integrated into I2P's design. Rather than building an essentially \n"
-"trusted, centralized system with directory servers, I2P has a self organizing \n"
-"network database with each peer taking on the responsibility of profiling \n"
-"other routers to determine how best to exploit available resources. Another \n"
-"key difference is that while both I2P and Tor use layered and ordered paths \n"
-"(tunnels and circuits/streams), I2P is fundamentally a packet switched network, \n"
-"while Tor is fundamentally a circuit switched one, allowing I2P to transparently \n"
-"route around congestion or other network failures, operate redundant pathways, \n"
-"and load balance the data across available resources. While Tor offers the \n"
-"useful outproxy functionality by offering integrated outproxy discovery and \n"
-"selection, I2P leaves such application layer decisions up to applications \n"
-"running on top of I2P - in fact, I2P has even externalized the TCP-like streaming \n"
-"library itself to the application layer, allowing developers to experiment \n"
-"with different strategies, exploiting their domain specific knowledge to offer \n"
+"similarities. While I2P's development began before we were aware of the "
+"early \n"
+"stage efforts on Tor, many of the lessons of the original onion routing "
+"and \n"
+"ZKS efforts were integrated into I2P's design. Rather than building an "
+"essentially \n"
+"trusted, centralized system with directory servers, I2P has a self "
+"organizing \n"
+"network database with each peer taking on the responsibility of profiling"
+" \n"
+"other routers to determine how best to exploit available resources. "
+"Another \n"
+"key difference is that while both I2P and Tor use layered and ordered "
+"paths \n"
+"(tunnels and circuits/streams), I2P is fundamentally a packet switched "
+"network, \n"
+"while Tor is fundamentally a circuit switched one, allowing I2P to "
+"transparently \n"
+"route around congestion or other network failures, operate redundant "
+"pathways, \n"
+"and load balance the data across available resources. While Tor offers "
+"the \n"
+"useful outproxy functionality by offering integrated outproxy discovery "
+"and \n"
+"selection, I2P leaves such application layer decisions up to applications"
+" \n"
+"running on top of I2P - in fact, I2P has even externalized the TCP-like "
+"streaming \n"
+"library itself to the application layer, allowing developers to "
+"experiment \n"
+"with different strategies, exploiting their domain specific knowledge to "
+"offer \n"
"better performance."
msgstr ""
#: i2p2www/pages/site/docs/how/tech-intro.html:707
msgid ""
-"From an anonymity perspective, there is much similarity when the core networks \n"
-"are compared. However, there are a few key differences. When dealing with \n"
-"an internal adversary or most external adversaries, I2P's simplex tunnels \n"
-"expose half as much traffic data than would be exposed with Tor's duplex circuits \n"
-"by simply looking at the flows themselves - an HTTP request and response would \n"
-"follow the same path in Tor, while in I2P the packets making up the request \n"
-"would go out through one or more outbound tunnels and the packets making up \n"
-"the response would come back through one or more different inbound tunnels. \n"
-"While I2P's peer selection and ordering strategies should sufficiently address \n"
-"predecessor attacks, should a switch to bidirectional tunnels be necessary,\n"
-"we could simply build an inbound and outbound tunnel along the same routers."
+"From an anonymity perspective, there is much similarity when the core "
+"networks \n"
+"are compared. However, there are a few key differences. When dealing with"
+" \n"
+"an internal adversary or most external adversaries, I2P's simplex tunnels"
+" \n"
+"expose half as much traffic data than would be exposed with Tor's duplex "
+"circuits \n"
+"by simply looking at the flows themselves - an HTTP request and response "
+"would \n"
+"follow the same path in Tor, while in I2P the packets making up the "
+"request \n"
+"would go out through one or more outbound tunnels and the packets making "
+"up \n"
+"the response would come back through one or more different inbound "
+"tunnels. \n"
+"While I2P's peer selection and ordering strategies should sufficiently "
+"address \n"
+"predecessor attacks, should a switch to bidirectional tunnels be "
+"necessary,\n"
+"we could simply build an inbound and outbound tunnel along the same "
+"routers."
msgstr ""
#: i2p2www/pages/site/docs/how/tech-intro.html:721
msgid ""
-"Another anonymity issue comes up in Tor's use of telescopic tunnel creation, \n"
-"as simple packet counting and timing measurements as the cells in a circuit \n"
-"pass through an adversary's node exposes statistical information regarding \n"
-"where the adversary is within the circuit. I2P's unidirectional tunnel creation \n"
-"with a single message so that this data is not exposed. Protecting the position \n"
-"in a tunnel is important, as an adversary would otherwise be able to mount \n"
-"a series of powerful predecessor, intersection, and traffic confirmation attacks."
+"Another anonymity issue comes up in Tor's use of telescopic tunnel "
+"creation, \n"
+"as simple packet counting and timing measurements as the cells in a "
+"circuit \n"
+"pass through an adversary's node exposes statistical information "
+"regarding \n"
+"where the adversary is within the circuit. I2P's unidirectional tunnel "
+"creation \n"
+"with a single message so that this data is not exposed. Protecting the "
+"position \n"
+"in a tunnel is important, as an adversary would otherwise be able to "
+"mount \n"
+"a series of powerful predecessor, intersection, and traffic confirmation "
+"attacks."
msgstr ""
#: i2p2www/pages/site/docs/how/tech-intro.html:731
msgid ""
-"Tor's support for a second tier of \"onion proxies\" does offer a non-trivial \n"
-"degree of anonymity while requiring a low cost of entry, while I2P will not \n"
+"Tor's support for a second tier of \"onion proxies\" does offer a non-"
+"trivial \n"
+"degree of anonymity while requiring a low cost of entry, while I2P will "
+"not \n"
"offer this topology until 2.0."
msgstr ""
#: i2p2www/pages/site/docs/how/tech-intro.html:737
msgid ""
-"On the whole, Tor and I2P complement each other in their focus - Tor works \n"
-"towards offering high speed anonymous Internet outproxying, while I2P works \n"
-"towards offering a decentralized resilient network in itself. In theory, both \n"
-"can be used to achieve both purposes, but given limited development resources, \n"
-"they both have their strengths and weaknesses. The I2P developers have considered \n"
-"the steps necessary to modify Tor to take advantage of I2P's design, but concerns \n"
-"of Tor's viability under resource scarcity suggest that I2P's packet switching \n"
+"On the whole, Tor and I2P complement each other in their focus - Tor "
+"works \n"
+"towards offering high speed anonymous Internet outproxying, while I2P "
+"works \n"
+"towards offering a decentralized resilient network in itself. In theory, "
+"both \n"
+"can be used to achieve both purposes, but given limited development "
+"resources, \n"
+"they both have their strengths and weaknesses. The I2P developers have "
+"considered \n"
+"the steps necessary to modify Tor to take advantage of I2P's design, but "
+"concerns \n"
+"of Tor's viability under resource scarcity suggest that I2P's packet "
+"switching \n"
"architecture will be able to exploit scarce resources more effectively."
msgstr ""
#: i2p2www/pages/site/docs/how/tech-intro.html:751
msgid ""
-"Freenet played a large part in the initial stages of I2P's design - giving \n"
-"proof to the viability of a vibrant pseudonymous community completely contained \n"
-"within the network, demonstrating that the dangers inherent in outproxies \n"
-"could be avoided. The first seed of I2P began as a replacement communication \n"
-"layer for Freenet, attempting to factor out the complexities of a scalable, \n"
-"anonymous and secure point to point communication from the complexities of \n"
-"a censorship resistant distributed data store. Over time however, some of \n"
-"the anonymity and scalability issues inherent in Freenet's algorithms made \n"
-"it clear that I2P's focus should stay strictly on providing a generic anonymous \n"
-"communication layer, rather than as a component of Freenet. Over the years, \n"
-"the Freenet developers have come to see the weaknesses in the older design, \n"
-"prompting them to suggest that they will require a \"premix\" layer to offer \n"
-"substantial anonymity. In other words, Freenet needs to run on top of a mixnet \n"
-"such as I2P or Tor, with \"client nodes\" requesting and publishing data through \n"
-"the mixnet to the \"server nodes\" which then fetch and store the data according \n"
+"Freenet played a large part in the initial stages of I2P's design - "
+"giving \n"
+"proof to the viability of a vibrant pseudonymous community completely "
+"contained \n"
+"within the network, demonstrating that the dangers inherent in outproxies"
+" \n"
+"could be avoided. The first seed of I2P began as a replacement "
+"communication \n"
+"layer for Freenet, attempting to factor out the complexities of a "
+"scalable, \n"
+"anonymous and secure point to point communication from the complexities "
+"of \n"
+"a censorship resistant distributed data store. Over time however, some of"
+" \n"
+"the anonymity and scalability issues inherent in Freenet's algorithms "
+"made \n"
+"it clear that I2P's focus should stay strictly on providing a generic "
+"anonymous \n"
+"communication layer, rather than as a component of Freenet. Over the "
+"years, \n"
+"the Freenet developers have come to see the weaknesses in the older "
+"design, \n"
+"prompting them to suggest that they will require a \"premix\" layer to "
+"offer \n"
+"substantial anonymity. In other words, Freenet needs to run on top of a "
+"mixnet \n"
+"such as I2P or Tor, with \"client nodes\" requesting and publishing data "
+"through \n"
+"the mixnet to the \"server nodes\" which then fetch and store the data "
+"according \n"
"to Freenet's heuristic distributed data storage algorithms."
msgstr ""
#: i2p2www/pages/site/docs/how/tech-intro.html:770
msgid ""
-"Freenet's functionality is very complementary to I2P's, as Freenet natively \n"
-"provides many of the tools for operating medium and high latency systems, \n"
-"while I2P natively provides the low latency mix network suitable for offering \n"
-"adequate anonymity. The logic of separating the mixnet from the censorship-\n"
-"resistant distributed data store still seems self-evident from an engineering, \n"
-"anonymity, security, and resource allocation perspective, so hopefully the \n"
-"Freenet team will pursue efforts in that direction, if not simply reusing \n"
+"Freenet's functionality is very complementary to I2P's, as Freenet "
+"natively \n"
+"provides many of the tools for operating medium and high latency systems,"
+" \n"
+"while I2P natively provides the low latency mix network suitable for "
+"offering \n"
+"adequate anonymity. The logic of separating the mixnet from the "
+"censorship-\n"
+"resistant distributed data store still seems self-evident from an "
+"engineering, \n"
+"anonymity, security, and resource allocation perspective, so hopefully "
+"the \n"
+"Freenet team will pursue efforts in that direction, if not simply reusing"
+" \n"
"(or helping to improve, as necessary) existing mixnets like I2P or Tor."
msgstr ""
#: i2p2www/pages/site/docs/how/tech-intro.html:781
msgid ""
"It is worth mentioning that there has recently been discussion and work \n"
-"by the Freenet developers on a \"globally scalable darknet\" using restricted \n"
-"routes between peers of various trust. While insufficient information has \n"
-"been made publicly available regarding how such a system would operate for \n"
-"a full review, from what has been said the anonymity and scalability claims \n"
-"seem highly dubious. In particular, the appropriateness for use in hostile \n"
-"regimes against state level adversaries has been tremendously overstated, \n"
-"and any analysis on the implications of resource scarcity upon the scalability \n"
-"of the network has seemingly been avoided. Further questions regarding susceptibility \n"
-"to traffic analysis, trust and other topics do exist, but a more in-depth \n"
-"review of this \"globally scalable darknet\" will have to wait until the Freenet \n"
+"by the Freenet developers on a \"globally scalable darknet\" using "
+"restricted \n"
+"routes between peers of various trust. While insufficient information has"
+" \n"
+"been made publicly available regarding how such a system would operate "
+"for \n"
+"a full review, from what has been said the anonymity and scalability "
+"claims \n"
+"seem highly dubious. In particular, the appropriateness for use in "
+"hostile \n"
+"regimes against state level adversaries has been tremendously overstated,"
+" \n"
+"and any analysis on the implications of resource scarcity upon the "
+"scalability \n"
+"of the network has seemingly been avoided. Further questions regarding "
+"susceptibility \n"
+"to traffic analysis, trust and other topics do exist, but a more in-depth"
+" \n"
+"review of this \"globally scalable darknet\" will have to wait until the "
+"Freenet \n"
"team makes more information available."
msgstr ""
#: i2p2www/pages/site/docs/how/tech-intro.html:797
msgid ""
-"I2P itself doesn't really do much - it simply sends messages to remote destinations \n"
-"and receives messages targeting local destinations - most of the interesting \n"
-"work goes on at the layers above it. By itself, I2P could be seen as an anonymous \n"
-"and secure IP layer, and the bundled streaming library \n"
-"as an implementation of an anonymous and secure TCP layer on top of it. Beyond \n"
-"that, I2PTunnel exposes a generic TCP proxying \n"
-"system for either getting into or out of the I2P network, plus a variety of \n"
+"I2P itself doesn't really do much - it simply sends messages to remote "
+"destinations \n"
+"and receives messages targeting local destinations - most of the "
+"interesting \n"
+"work goes on at the layers above it. By itself, I2P could be seen as an "
+"anonymous \n"
+"and secure IP layer, and the bundled streaming"
+" library \n"
+"as an implementation of an anonymous and secure TCP layer on top of it. "
+"Beyond \n"
+"that, I2PTunnel exposes a generic TCP "
+"proxying \n"
+"system for either getting into or out of the I2P network, plus a variety "
+"of \n"
"network applications provide further functionality for end users."
msgstr ""
#: i2p2www/pages/site/docs/how/tech-intro.html:808
msgid "Streaming library"
-msgstr ""
+msgstr "Biblioteca de streaming"
#: i2p2www/pages/site/docs/how/tech-intro.html:809
msgid ""
-"The I2P streaming library can be viewed as a generic streaming interface (mirroring TCP sockets),\n"
-"and the implementation supports a sliding window protocol\n"
-"with several optimizations, to take into account the high delay over I2P.\n"
+"The I2P streaming library can be viewed as a generic streaming interface "
+"(mirroring TCP sockets),\n"
+"and the implementation supports a sliding "
+"window protocol\n"
+"with several optimizations, to take into account the high delay over I2P."
+"\n"
"Individual streams may adjust the maximum packet size and \n"
-"other options, though the default of 4KB compressed seems a reasonable tradeoff \n"
-"between the bandwidth costs of retransmitting lost messages and the latency \n"
+"other options, though the default of 4KB compressed seems a reasonable "
+"tradeoff \n"
+"between the bandwidth costs of retransmitting lost messages and the "
+"latency \n"
"of multiple messages."
msgstr ""
#: i2p2www/pages/site/docs/how/tech-intro.html:819
msgid ""
"In addition, in consideration of the relatively high cost of subsequent \n"
-"messages, the streaming library's protocol for scheduling and delivering messages \n"
-"has been optimized to allow individual messages passed to contain as much \n"
-"information as is available. For instance, a small HTTP transaction proxied \n"
-"through the streaming library can be completed in a single round trip - the \n"
-"first message bundles a SYN, FIN and the small payload (an HTTP request typically \n"
-"fits) and the reply bundles the SYN, FIN, ACK and the small payload (many \n"
-"HTTP responses fit). While an additional ACK must be transmitted to tell the \n"
-"HTTP server that the SYN/FIN/ACK has been received, the local HTTP proxy can \n"
+"messages, the streaming library's protocol for scheduling and delivering "
+"messages \n"
+"has been optimized to allow individual messages passed to contain as much"
+" \n"
+"information as is available. For instance, a small HTTP transaction "
+"proxied \n"
+"through the streaming library can be completed in a single round trip - "
+"the \n"
+"first message bundles a SYN, FIN and the small payload (an HTTP request "
+"typically \n"
+"fits) and the reply bundles the SYN, FIN, ACK and the small payload (many"
+" \n"
+"HTTP responses fit). While an additional ACK must be transmitted to tell "
+"the \n"
+"HTTP server that the SYN/FIN/ACK has been received, the local HTTP proxy "
+"can \n"
"deliver the full response to the browser immediately."
msgstr ""
#: i2p2www/pages/site/docs/how/tech-intro.html:832
msgid ""
-"On the whole, however, the streaming library bears much resemblance to an \n"
-"abstraction of TCP, with its sliding windows, congestion control algorithms \n"
-"(both slow start and congestion avoidance), and general packet behavior (ACK, \n"
+"On the whole, however, the streaming library bears much resemblance to an"
+" \n"
+"abstraction of TCP, with its sliding windows, congestion control "
+"algorithms \n"
+"(both slow start and congestion avoidance), and general packet behavior "
+"(ACK, \n"
"SYN, FIN, RST, etc)."
msgstr ""
@@ -9086,142 +10609,227 @@ msgstr ""
#: i2p2www/pages/site/docs/how/tech-intro.html:846
msgid ""
-"Naming within I2P has been an oft-debated topic since the very beginning \n"
-"with advocates across the spectrum of possibilities. However, given I2P's \n"
-"inherent demand for secure communication and decentralized operation, the \n"
-"traditional DNS-style naming system is clearly out, as are \"majority rules\" \n"
-"voting systems. Instead, I2P ships with a generic naming library and a base \n"
-"implementation designed to work off a local name to destination mapping, as \n"
-"well as an optional add-on application called the \"addressbook\". The addressbook \n"
-"is a web-of-trust-driven secure, distributed, and human readable naming system, \n"
-"sacrificing only the call for all human readable names to be globally unique \n"
-"by mandating only local uniqueness. While all messages in I2P are cryptographically \n"
-"addressed by their destination, different people can have local addressbook \n"
-"entries for \"Alice\" which refer to different destinations. People can still \n"
-"discover new names by importing published addressbooks of peers specified \n"
-"in their web of trust, by adding in the entries provided through a third party, \n"
-"or (if some people organize a series of published addressbooks using a first \n"
-"come first serve registration system) people can choose to treat these addressbooks \n"
+"Naming within I2P has been an oft-debated topic since the very beginning"
+" \n"
+"with advocates across the spectrum of possibilities. However, given I2P's"
+" \n"
+"inherent demand for secure communication and decentralized operation, the"
+" \n"
+"traditional DNS-style naming system is clearly out, as are \"majority "
+"rules\" \n"
+"voting systems. Instead, I2P ships with a generic naming library and a "
+"base \n"
+"implementation designed to work off a local name to destination mapping, "
+"as \n"
+"well as an optional add-on application called the \"addressbook\". The "
+"addressbook \n"
+"is a web-of-trust-driven secure, distributed, and human readable naming "
+"system, \n"
+"sacrificing only the call for all human readable names to be globally "
+"unique \n"
+"by mandating only local uniqueness. While all messages in I2P are "
+"cryptographically \n"
+"addressed by their destination, different people can have local "
+"addressbook \n"
+"entries for \"Alice\" which refer to different destinations. People can "
+"still \n"
+"discover new names by importing published addressbooks of peers specified"
+" \n"
+"in their web of trust, by adding in the entries provided through a third "
+"party, \n"
+"or (if some people organize a series of published addressbooks using a "
+"first \n"
+"come first serve registration system) people can choose to treat these "
+"addressbooks \n"
"as name servers, emulating traditional DNS."
msgstr ""
#: i2p2www/pages/site/docs/how/tech-intro.html:866
msgid ""
"I2P does not promote the use of DNS-like services though, as the damage \n"
-"done by hijacking a site can be tremendous - and insecure destinations have \n"
-"no value. DNSsec itself still falls back on registrars and certificate authorities, \n"
-"while with I2P, requests sent to a destination cannot be intercepted or the \n"
-"reply spoofed, as they are encrypted to the destination's public keys, and \n"
-"a destination itself is just a pair of public keys and a certificate. DNS-style \n"
-"systems on the other hand allow any of the name servers on the lookup path \n"
-"to mount simple denial of service and spoofing attacks. Adding on a certificate \n"
-"authenticating the responses as signed by some centralized certificate authority \n"
-"would address many of the hostile nameserver issues but would leave open replay \n"
+"done by hijacking a site can be tremendous - and insecure destinations "
+"have \n"
+"no value. DNSsec itself still falls back on registrars and certificate "
+"authorities, \n"
+"while with I2P, requests sent to a destination cannot be intercepted or "
+"the \n"
+"reply spoofed, as they are encrypted to the destination's public keys, "
+"and \n"
+"a destination itself is just a pair of public keys and a certificate. "
+"DNS-style \n"
+"systems on the other hand allow any of the name servers on the lookup "
+"path \n"
+"to mount simple denial of service and spoofing attacks. Adding on a "
+"certificate \n"
+"authenticating the responses as signed by some centralized certificate "
+"authority \n"
+"would address many of the hostile nameserver issues but would leave open "
+"replay \n"
"attacks as well as hostile certificate authority attacks."
msgstr ""
#: i2p2www/pages/site/docs/how/tech-intro.html:880
msgid ""
-"Voting style naming is dangerous as well, especially given the effectiveness \n"
-"of Sybil attacks in anonymous systems - the attacker can simply create an \n"
-"arbitrarily high number of peers and \"vote\" with each to take over a given \n"
-"name. Proof-of-work methods can be used to make identity non-free, but as \n"
-"the network grows the load required to contact everyone to conduct online \n"
-"voting is implausible, or if the full network is not queried, different sets \n"
+"Voting style naming is dangerous as well, especially given the "
+"effectiveness \n"
+"of Sybil attacks in anonymous systems - the attacker can simply create an"
+" \n"
+"arbitrarily high number of peers and \"vote\" with each to take over a "
+"given \n"
+"name. Proof-of-work methods can be used to make identity non-free, but as"
+" \n"
+"the network grows the load required to contact everyone to conduct online"
+" \n"
+"voting is implausible, or if the full network is not queried, different "
+"sets \n"
"of answers may be reachable."
msgstr ""
#: i2p2www/pages/site/docs/how/tech-intro.html:890
msgid ""
-"As with the Internet however, I2P is keeping the design and operation of \n"
-"a naming system out of the (IP-like) communication layer. The bundled naming \n"
-"library includes a simple service provider interface which alternate naming \n"
-"systems can plug into, allowing end users to drive what sort of naming tradeoffs \n"
+"As with the Internet however, I2P is keeping the design and operation of"
+" \n"
+"a naming system out of the (IP-like) communication layer. The bundled "
+"naming \n"
+"library includes a simple service provider interface which alternate "
+"naming \n"
+"systems can plug into, allowing end users to drive what sort of naming "
+"tradeoffs \n"
"they prefer."
msgstr ""
#: i2p2www/pages/site/docs/how/tech-intro.html:899
msgid ""
-"The old Syndie bundled with I2P has been replaced by the new Syndie which\n"
-"is distributed separately. For more information see the Syndie\n"
+"The old Syndie bundled with I2P has been replaced by the new Syndie which"
+"\n"
+"is distributed separately. For more information see the Syndie\n"
"pages."
msgstr ""
#: i2p2www/pages/site/docs/how/tech-intro.html:905
msgid ""
-"Syndie is a safe, anonymous blogging / content publication / content aggregation \n"
-"system. It lets you create information, share it with others, and read posts \n"
-"from those you're interested in, all while taking into consideration your \n"
-"needs for security and anonymity. Rather than building its own content distribution \n"
-"network, Syndie is designed to run on top of existing networks, syndicating \n"
-"content through eepsites, Tor hidden services, Freenet freesites, normal websites, \n"
-"usenet newsgroups, email lists, RSS feeds, etc. Data published with Syndie \n"
-"is done so as to offer pseudonymous authentication to anyone reading or archiving \n"
+"Syndie is a safe, anonymous blogging / content publication / content "
+"aggregation \n"
+"system. It lets you create information, share it with others, and read "
+"posts \n"
+"from those you're interested in, all while taking into consideration your"
+" \n"
+"needs for security and anonymity. Rather than building its own content "
+"distribution \n"
+"network, Syndie is designed to run on top of existing networks, "
+"syndicating \n"
+"content through eepsites, Tor hidden services, Freenet freesites, normal "
+"websites, \n"
+"usenet newsgroups, email lists, RSS feeds, etc. Data published with "
+"Syndie \n"
+"is done so as to offer pseudonymous authentication to anyone reading or "
+"archiving \n"
"it."
msgstr ""
#: i2p2www/pages/site/docs/how/tech-intro.html:920
msgid ""
-"I2PTunnel is probably I2P's most popular and versatile client application, \n"
-"allowing generic proxying both into and out of the I2P network. I2PTunnel \n"
-"can be viewed as four separate proxying applications - a \"client\" which receives \n"
-"inbound TCP connections and forwards them to a given I2P destination, an \"httpclient\" \n"
-"(aka \"eepproxy\") which acts like an HTTP proxy and forwards the requests to \n"
-"the appropriate I2P destination (after querying the naming service if necessary), \n"
-"a \"server\" which receives inbound I2P streaming connections on a destination \n"
-"and forwards them to a given TCP host+port, and an \"httpserver\" which extends \n"
-"the \"server\" by parsing the HTTP request and responses to allow safer operation. \n"
-"There is an additional \"socksclient\" application, but its use is not encouraged \n"
+"I2PTunnel is probably I2P's most popular and versatile client "
+"application, \n"
+"allowing generic proxying both into and out of the I2P network. I2PTunnel"
+" \n"
+"can be viewed as four separate proxying applications - a \"client\" which"
+" receives \n"
+"inbound TCP connections and forwards them to a given I2P destination, an "
+"\"httpclient\" \n"
+"(aka \"eepproxy\") which acts like an HTTP proxy and forwards the "
+"requests to \n"
+"the appropriate I2P destination (after querying the naming service if "
+"necessary), \n"
+"a \"server\" which receives inbound I2P streaming connections on a "
+"destination \n"
+"and forwards them to a given TCP host+port, and an \"httpserver\" which "
+"extends \n"
+"the \"server\" by parsing the HTTP request and responses to allow safer "
+"operation. \n"
+"There is an additional \"socksclient\" application, but its use is not "
+"encouraged \n"
"for reasons previously mentioned."
msgstr ""
#: i2p2www/pages/site/docs/how/tech-intro.html:934
msgid ""
-"I2P itself is not an outproxy network - the anonymity and security concerns \n"
-"inherent in a mix net which forwards data into and out of the mix have kept \n"
-"I2P's design focused on providing an anonymous network which capable of meeting \n"
-"the user's needs without requiring external resources. However, the I2PTunnel \n"
-"\"httpclient\" application offers a hook for outproxying - if the hostname requested \n"
-"doesn't end in \".i2p\", it picks a random destination from a user-provided \n"
-"set of outproxies and forwards the request to them. These destinations are \n"
-"simply I2PTunnel \"server\" instances run by volunteers who have explicitly \n"
-"chosen to run outproxies - no one is an outproxy by default, and running an \n"
-"outproxy doesn't automatically tell other people to proxy through you. While \n"
-"outproxies do have inherent weaknesses, they offer a simple proof of concept \n"
-"for using I2P and provide some functionality under a threat model which may \n"
+"I2P itself is not an outproxy network - the anonymity and security "
+"concerns \n"
+"inherent in a mix net which forwards data into and out of the mix have "
+"kept \n"
+"I2P's design focused on providing an anonymous network which capable of "
+"meeting \n"
+"the user's needs without requiring external resources. However, the "
+"I2PTunnel \n"
+"\"httpclient\" application offers a hook for outproxying - if the "
+"hostname requested \n"
+"doesn't end in \".i2p\", it picks a random destination from a user-"
+"provided \n"
+"set of outproxies and forwards the request to them. These destinations "
+"are \n"
+"simply I2PTunnel \"server\" instances run by volunteers who have "
+"explicitly \n"
+"chosen to run outproxies - no one is an outproxy by default, and running "
+"an \n"
+"outproxy doesn't automatically tell other people to proxy through you. "
+"While \n"
+"outproxies do have inherent weaknesses, they offer a simple proof of "
+"concept \n"
+"for using I2P and provide some functionality under a threat model which "
+"may \n"
"be sufficient for some users."
msgstr ""
#: i2p2www/pages/site/docs/how/tech-intro.html:950
msgid ""
-"I2PTunnel enables most of the applications in use. An \"httpserver\" pointing \n"
-"at a webserver lets anyone run their own anonymous website (or \"eepsite\") \n"
-"- a webserver is bundled with I2P for this purpose, but any webserver can \n"
-"be used. Anyone may run a \"client\" pointing at one of the anonymously hosted \n"
-"IRC servers, each of which are running a \"server\" pointing at their local \n"
-"IRCd and communicating between IRCds over their own \"client\" tunnels. End \n"
-"users also have \"client\" tunnels pointing at I2Pmail's \n"
-"POP3 and SMTP destinations (which in turn are simply \"server\" instances pointing \n"
-"at POP3 and SMTP servers), as well as \"client\" tunnels pointing at I2P's CVS \n"
-"server, allowing anonymous development. At times people have even run \"client\" \n"
+"I2PTunnel enables most of the applications in use. An \"httpserver\" "
+"pointing \n"
+"at a webserver lets anyone run their own anonymous website (or "
+"\"eepsite\") \n"
+"- a webserver is bundled with I2P for this purpose, but any webserver can"
+" \n"
+"be used. Anyone may run a \"client\" pointing at one of the anonymously "
+"hosted \n"
+"IRC servers, each of which are running a \"server\" pointing at their "
+"local \n"
+"IRCd and communicating between IRCds over their own \"client\" tunnels. "
+"End \n"
+"users also have \"client\" tunnels pointing at I2Pmail's \n"
+"POP3 and SMTP destinations (which in turn are simply \"server\" instances"
+" pointing \n"
+"at POP3 and SMTP servers), as well as \"client\" tunnels pointing at "
+"I2P's CVS \n"
+"server, allowing anonymous development. At times people have even run "
+"\"client\" \n"
"proxies to access the \"server\" instances pointing at an NNTP server."
msgstr ""
#: i2p2www/pages/site/docs/how/tech-intro.html:967
msgid ""
-"i2p-bt is a port of the mainline python BitTorrent client to run both the \n"
-"tracker and peer communication over I2P. Tracker requests are forwarded through \n"
-"the eepproxy to eepsites specified in the torrent file while tracker responses \n"
-"refer to peers by their destination explicitly, allowing i2p-bt to open up \n"
-"a streaming lib connection to query them for \n"
+"i2p-bt is a port of the mainline python BitTorrent client to run both the"
+" \n"
+"tracker and peer communication over I2P. Tracker requests are forwarded "
+"through \n"
+"the eepproxy to eepsites specified in the torrent file while tracker "
+"responses \n"
+"refer to peers by their destination explicitly, allowing i2p-bt to open "
+"up \n"
+"a streaming lib connection to query them "
+"for \n"
"blocks."
msgstr ""
#: i2p2www/pages/site/docs/how/tech-intro.html:976
msgid ""
-"In addition to i2p-bt, a port of bytemonsoon has been made to I2P, making \n"
-"a few modifications as necessary to strip any anonymity-compromising information \n"
-"from the application and to take into consideration the fact that IPs cannot \n"
+"In addition to i2p-bt, a port of bytemonsoon has been made to I2P, making"
+" \n"
+"a few modifications as necessary to strip any anonymity-compromising "
+"information \n"
+"from the application and to take into consideration the fact that IPs "
+"cannot \n"
"be used for identifying peers."
msgstr ""
@@ -9234,8 +10842,10 @@ msgstr ""
#: i2p2www/pages/site/docs/how/tech-intro.html:990
msgid ""
-"Bundled with the I2P install, I2PSnark offers a simple anonymous BitTorrent \n"
-"client with multitorrent capabilities, exposing all of the functionality through \n"
+"Bundled with the I2P install, I2PSnark offers a simple anonymous "
+"BitTorrent \n"
+"client with multitorrent capabilities, exposing all of the functionality "
+"through \n"
"a plain HTML web interface."
msgstr ""
@@ -9243,7 +10853,9 @@ msgstr ""
#, python-format
msgid ""
"Robert is a Bittorrent client written in Python.\n"
-"It is hosted on http://%(bob)s/Robert.html "
+"It is hosted on http://%(bob)s/Robert.html "
msgstr ""
#: i2p2www/pages/site/docs/how/tech-intro.html:1007
@@ -9255,9 +10867,12 @@ msgstr ""
#: i2p2www/pages/site/docs/how/tech-intro.html:1015
msgid ""
-"I2Phex is a fairly direct port of the Phex Gnutella filesharing client to \n"
-"run entirely on top of I2P. While it has disabled some of Phex's functionality, \n"
-"such as integration with Gnutella webcaches, the basic file sharing and chatting \n"
+"I2Phex is a fairly direct port of the Phex Gnutella filesharing client to"
+" \n"
+"run entirely on top of I2P. While it has disabled some of Phex's "
+"functionality, \n"
+"such as integration with Gnutella webcaches, the basic file sharing and "
+"chatting \n"
"system is fully functional."
msgstr ""
@@ -9270,39 +10885,62 @@ msgstr ""
#: i2p2www/pages/site/docs/how/tech-intro.html:1033
#, python-format
msgid ""
-"I2Pmail is more a service than an application - postman offers both internal \n"
-"and external email with POP3 and SMTP service through I2PTunnel instances \n"
-"accessing a series of components developed with mastiejaner, allowing people \n"
-"to use their preferred mail clients to send and receive mail pseudonymously. \n"
-"However, as most mail clients expose substantial identifying information, \n"
-"I2P bundles susi23's web based susimail client which has been built specifically \n"
-"with I2P's anonymity needs in mind. The I2Pmail/mail.i2p service offers transparent \n"
-"virus filtering as well as denial of service prevention with hashcash augmented \n"
-"quotas. In addition, each user has control of their batching strategy prior \n"
-"to delivery through the mail.i2p outproxies, which are separate from the mail.i2p \n"
-"SMTP and POP3 servers - both the outproxies and inproxies communicate with \n"
-"the mail.i2p SMTP and POP3 servers through I2P itself, so compromising those \n"
-"non-anonymous locations does not give access to the mail accounts or activity \n"
-"patterns of the user. At the moment the developers work on a decentralized \n"
-"mailsystem, called \"v2mail\". More information can be found on the eepsite \n"
+"I2Pmail is more a service than an application - postman offers both "
+"internal \n"
+"and external email with POP3 and SMTP service through I2PTunnel instances"
+" \n"
+"accessing a series of components developed with mastiejaner, allowing "
+"people \n"
+"to use their preferred mail clients to send and receive mail "
+"pseudonymously. \n"
+"However, as most mail clients expose substantial identifying information,"
+" \n"
+"I2P bundles susi23's web based susimail client which has been built "
+"specifically \n"
+"with I2P's anonymity needs in mind. The I2Pmail/mail.i2p service offers "
+"transparent \n"
+"virus filtering as well as denial of service prevention with hashcash "
+"augmented \n"
+"quotas. In addition, each user has control of their batching strategy "
+"prior \n"
+"to delivery through the mail.i2p outproxies, which are separate from the "
+"mail.i2p \n"
+"SMTP and POP3 servers - both the outproxies and inproxies communicate "
+"with \n"
+"the mail.i2p SMTP and POP3 servers through I2P itself, so compromising "
+"those \n"
+"non-anonymous locations does not give access to the mail accounts or "
+"activity \n"
+"patterns of the user. At the moment the developers work on a "
+"decentralized \n"
+"mailsystem, called \"v2mail\". More information can be found on the "
+"eepsite \n"
"%(postman)s."
msgstr ""
#: i2p2www/pages/site/docs/how/tech-intro.html:1055
msgid ""
-"I2P-Bote is a distributed e-mail application. It does not use the traditional\n"
-"e-mail concept of sending an e-mail to a server and retrieving it from a server.\n"
+"I2P-Bote is a distributed e-mail application. It does not use the "
+"traditional\n"
+"e-mail concept of sending an e-mail to a server and retrieving it from a "
+"server.\n"
"Instead, it uses a Kademlia Distributed Hash Table to store mails.\n"
-"One user can push a mail into the DHT, while another can request the e-mail from the DHT.\n"
-"And all the mails sent within the I2P-Bote network are automatically encrypted end-to-end. X = g^x mod "
-"p
."
+"Alice generates a secret integer x. She then calculates X = g^x mod"
+" p
."
msgstr ""
#: i2p2www/pages/site/docs/transport/ntcp.html:166
@@ -13665,7 +15861,8 @@ msgstr ""
#: i2p2www/pages/site/docs/transport/ntcp.html:173
#, python-format
msgid ""
-"The sessionKey is then used to exchange identities in Message 3 and Message 4.\n"
+"The sessionKey is then used to exchange identities in Message 3 "
+"and Message 4.\n"
"The exponent (x and y) length for the DH exchange is documented on the\n"
"cryptography page."
msgstr ""
@@ -13678,7 +15875,8 @@ msgstr ""
#, python-format
msgid ""
"This is the DH request. Alice already has Bob's\n"
-"Router Identity,\n"
+"Router "
+"Identity,\n"
"IP address, and port, as contained in his\n"
"Router Info,\n"
"which was published to the\n"
@@ -13758,7 +15956,8 @@ msgstr ""
#: i2p2www/pages/site/docs/transport/ntcp.html:312
#, python-format
msgid ""
-"48 bytes AES encrypted using the DH session key and\n"
+"48 bytes AES encrypted using the DH "
+"session key and\n"
" the last 16 bytes of Y as the IV"
msgstr ""
@@ -13774,8 +15973,8 @@ msgstr ""
#: i2p2www/pages/site/docs/transport/ntcp.html:326
msgid ""
-"This contains Alice's router identity, and a signature of the critical data."
-" Alice sends Bob:"
+"This contains Alice's router identity, and a signature of the critical "
+"data. Alice sends Bob:"
msgstr ""
#: i2p2www/pages/site/docs/transport/ntcp.html:360
@@ -13795,14 +15994,17 @@ msgstr ""
msgid ""
"the `Signature` of the following concatenated data:\n"
" X, Y, Bob's `RouterIdentity`, tsA, tsB.\n"
-" Alice signs it with the `SigningPrivateKey` associated with the `SigningPublicKey` in her `RouterIdentity`"
+" Alice signs it with the `SigningPrivateKey` associated with "
+"the `SigningPublicKey` in her `RouterIdentity`"
msgstr ""
#: i2p2www/pages/site/docs/transport/ntcp.html:389
#, python-format
msgid ""
-"448 bytes AES encrypted using the DH session key and\n"
-" the last 16 bytes of HXxorHI (i.e., the last 16 bytes of message #1) as the IV"
+"448 bytes AES encrypted using the DH"
+" session key and\n"
+" the last 16 bytes of HXxorHI (i.e., the last 16 bytes "
+"of message #1) as the IV"
msgstr ""
#: i2p2www/pages/site/docs/transport/ntcp.html:400
@@ -13817,8 +16019,8 @@ msgstr ""
#: i2p2www/pages/site/docs/transport/ntcp.html:406
msgid ""
-"Alice will use the last 16 bytes of the encrypted contents of this message "
-"as the IV for the next message."
+"Alice will use the last 16 bytes of the encrypted contents of this "
+"message as the IV for the next message."
msgstr ""
#: i2p2www/pages/site/docs/transport/ntcp.html:430
@@ -13833,15 +16035,19 @@ msgstr ""
msgid ""
"the `Signature` of the following concatenated data:\n"
" X, Y, Alice's `RouterIdentity`, tsA, tsB.\n"
-" Bob signs it with the `SigningPrivateKey` associated with the `SigningPublicKey` in his `RouterIdentity`"
+" Bob signs it with the `SigningPrivateKey` associated with "
+"the `SigningPublicKey` in his `RouterIdentity`"
msgstr ""
#: i2p2www/pages/site/docs/transport/ntcp.html:479
#, python-format
msgid ""
-"Data AES encrypted using the DH session key and\n"
-" the last 16 bytes of the encrypted contents of message #2 as the IV\n"
-" 48 bytes for a DSA signature, may vary for other signature types"
+"Data AES encrypted using the DH "
+"session key and\n"
+" the last 16 bytes of the encrypted contents of message "
+"#2 as the IV\n"
+" 48 bytes for a DSA signature, may vary for other "
+"signature types"
msgstr ""
#: i2p2www/pages/site/docs/transport/ntcp.html:488
@@ -13850,8 +16056,8 @@ msgstr ""
#: i2p2www/pages/site/docs/transport/ntcp.html:491
msgid ""
-"Bob will use the last 16 bytes of the encrypted contents of this message as "
-"the IV for the next message."
+"Bob will use the last 16 bytes of the encrypted contents of this message "
+"as the IV for the next message."
msgstr ""
#: i2p2www/pages/site/docs/transport/ntcp.html:506
@@ -13860,10 +16066,14 @@ msgstr ""
#: i2p2www/pages/site/docs/transport/ntcp.html:507
msgid ""
-"The connection is established, and standard or time sync messages may be exchanged.\n"
-"All subsequent messages are AES encrypted using the negotiated DH session key.\n"
-"Alice will use the last 16 bytes of the encrypted contents of message #3 as the next IV.\n"
-"Bob will use the last 16 bytes of the encrypted contents of message #4 as the next IV."
+"The connection is established, and standard or time sync messages may be "
+"exchanged.\n"
+"All subsequent messages are AES encrypted using the negotiated DH session"
+" key.\n"
+"Alice will use the last 16 bytes of the encrypted contents of message #3 "
+"as the next IV.\n"
+"Bob will use the last 16 bytes of the encrypted contents of message #4 as"
+" the next IV."
msgstr ""
#: i2p2www/pages/site/docs/transport/ntcp.html:516
@@ -13890,8 +16100,8 @@ msgstr ""
#: i2p2www/pages/site/docs/transport/ntcp.html:528
msgid ""
-"that many bytes making up the local router's IP address (as reached by the "
-"remote side)"
+"that many bytes making up the local router's IP address (as reached by "
+"the remote side)"
msgstr ""
#: i2p2www/pages/site/docs/transport/ntcp.html:529
@@ -13910,8 +16120,8 @@ msgstr ""
#: i2p2www/pages/site/docs/transport/ntcp.html:532
msgid ""
-"xor of the local router's identity hash and the SHA256 of bytes 32 through "
-"bytes 223"
+"xor of the local router's identity hash and the SHA256 of bytes 32 "
+"through bytes 223"
msgstr ""
#: i2p2www/pages/site/docs/transport/ntcp.html:535
@@ -13934,9 +16144,11 @@ msgstr ""
#: i2p2www/pages/site/docs/transport/ntcp.html:550
msgid ""
"A set of fixed packet sizes may be appropriate to further hide the data \n"
-"fragmentation to external adversaries, but the tunnel, garlic, and end to \n"
+"fragmentation to external adversaries, but the tunnel, garlic, and end to"
+" \n"
"end padding should be sufficient for most needs until then.\n"
-"However, there is currently no provision for padding beyond the next 16-byte boundary,\n"
+"However, there is currently no provision for padding beyond the next "
+"16-byte boundary,\n"
"to create a limited number of message sizes."
msgstr ""
@@ -13959,8 +16171,10 @@ msgstr ""
#: i2p2www/pages/site/docs/transport/ssu.html:7
#, python-format
msgid ""
-"SSU (also called \"UDP\" in much of the I2P documentation and user interfaces)\n"
-"is one of two transports currently implemented in I2P.\n"
+"SSU (also called \"UDP\" in much of the I2P documentation and user "
+"interfaces)\n"
+"is one of two transports currently "
+"implemented in I2P.\n"
"The other is NTCP."
msgstr ""
@@ -13968,14 +16182,17 @@ msgstr ""
msgid ""
"SSU is the newer of the two transports,\n"
"introduced in I2P release 0.6.\n"
-"In a standard I2P installation, the router uses both NTCP and SSU for outbound connections.\n"
+"In a standard I2P installation, the router uses both NTCP and SSU for "
+"outbound connections.\n"
"SSU-over-IPv6 is supported as of version 0.9.8."
msgstr ""
#: i2p2www/pages/site/docs/transport/ssu.html:20
msgid ""
-"SSU is called \"semireliable\" because it will repeatedly retransmit unacknowledged messages,\n"
-"but only up to a maximum number of times. After that, the message is dropped."
+"SSU is called \"semireliable\" because it will repeatedly retransmit "
+"unacknowledged messages,\n"
+"but only up to a maximum number of times. After that, the message is "
+"dropped."
msgstr ""
#: i2p2www/pages/site/docs/transport/ssu.html:25
@@ -13984,8 +16201,10 @@ msgstr ""
#: i2p2www/pages/site/docs/transport/ssu.html:27
msgid ""
-"Like the NTCP transport, SSU provides reliable, encrypted, connection-oriented, point-to-point data transport.\n"
-"Unique to SSU, it also provides IP detection and NAT traversal services, including:"
+"Like the NTCP transport, SSU provides reliable, encrypted, connection-"
+"oriented, point-to-point data transport.\n"
+"Unique to SSU, it also provides IP detection and NAT traversal services, "
+"including:"
msgstr ""
#: i2p2www/pages/site/docs/transport/ssu.html:33
@@ -14002,7 +16221,8 @@ msgstr ""
#: i2p2www/pages/site/docs/transport/ssu.html:35
msgid ""
-"Communication of firewall status and local IP, and changes to either to NTCP"
+"Communication of firewall status and local IP, and changes to either to "
+"NTCP"
msgstr ""
#: i2p2www/pages/site/docs/transport/ssu.html:47
@@ -14036,20 +16256,26 @@ msgid ""
"Packets are scheduled according to the router's policy, taking care\n"
"not to exceed the router's outbound capacity or to exceed the measured \n"
"capacity of the remote peer. The measured capacity operates along the\n"
-"lines of TCP's slow start and congestion avoidance, with additive increases\n"
-"to the sending capacity and multiplicative decreases in face of congestion.\n"
+"lines of TCP's slow start and congestion avoidance, with additive "
+"increases\n"
+"to the sending capacity and multiplicative decreases in face of "
+"congestion.\n"
"Unlike for TCP, routers may give up on some messages after\n"
-"a given period or number of retransmissions while continuing to transmit \n"
+"a given period or number of retransmissions while continuing to transmit"
+" \n"
"other messages."
msgstr ""
#: i2p2www/pages/site/docs/transport/ssu.html:95
msgid ""
"The congestion detection techniques vary from TCP as well, since each \n"
-"message has its own unique and nonsequential identifier, and each message\n"
-"has a limited size - at most, 32KB. To efficiently transmit this feedback\n"
+"message has its own unique and nonsequential identifier, and each message"
+"\n"
+"has a limited size - at most, 32KB. To efficiently transmit this "
+"feedback\n"
"to the sender, the receiver periodically includes a list of fully ACKed \n"
-"message identifiers and may also include bitfields for partially received\n"
+"message identifiers and may also include bitfields for partially received"
+"\n"
"messages, where each bit represents the reception of a fragment. If \n"
"duplicate fragments arrive, the message should be ACKed again, or if the\n"
"message has still not been fully received, the bitfield should be \n"
@@ -14059,7 +16285,8 @@ msgstr ""
#: i2p2www/pages/site/docs/transport/ssu.html:107
msgid ""
"The current implementation does not pad the packets to\n"
-"any particular size, but instead just places a single message fragment into\n"
+"any particular size, but instead just places a single message fragment "
+"into\n"
"a packet and sends it off (careful not to exceed the MTU)."
msgstr ""
@@ -14067,7 +16294,8 @@ msgstr ""
msgid ""
"As of router version 0.8.12,\n"
"two MTU values are used for IPv4: 620 and 1484.\n"
-"The MTU value is adjusted based on the percentage of packets that are retransmitted."
+"The MTU value is adjusted based on the percentage of packets that are "
+"retransmitted."
msgstr ""
#: i2p2www/pages/site/docs/transport/ssu.html:120
@@ -14086,8 +16314,10 @@ msgstr ""
#: i2p2www/pages/site/docs/transport/ssu.html:132
msgid ""
-"Based on measurements, 1492 fits nearly all reasonably small I2NP messages\n"
-"(larger I2NP messages may be up to 1900 to 4500 bytes, which isn't going to fit\n"
+"Based on measurements, 1492 fits nearly all reasonably small I2NP "
+"messages\n"
+"(larger I2NP messages may be up to 1900 to 4500 bytes, which isn't going "
+"to fit\n"
"into a live network MTU anyway)."
msgstr ""
@@ -14107,7 +16337,8 @@ msgstr ""
#: i2p2www/pages/site/docs/transport/ssu.html:150
msgid ""
-"As of release 0.9.2, if a router's network interface MTU is less than 1484,\n"
+"As of release 0.9.2, if a router's network interface MTU is less than "
+"1484,\n"
"it will publish that in the network database, and other routers should\n"
"honor that when a connection is established."
msgstr ""
@@ -14126,10 +16357,13 @@ msgstr ""
#: i2p2www/pages/site/docs/transport/ssu.html:163
msgid ""
"While the maximum message size is nominally 32KB, the practical\n"
-"limit differs. The protocol limits the number of fragments to 7 bits, or 128.\n"
-"The current implementation, however, limits each message to a maximum of 64 fragments,\n"
+"limit differs. The protocol limits the number of fragments to 7 bits, or "
+"128.\n"
+"The current implementation, however, limits each message to a maximum of "
+"64 fragments,\n"
"which is sufficient for 64 * 534 = 33.3 KB when using the 608 MTU.\n"
-"Due to overhead for bundled LeaseSets and session keys, the practical limit\n"
+"Due to overhead for bundled LeaseSets and session keys, the practical "
+"limit\n"
"at the application level is about 6KB lower, or about 26KB.\n"
"Further work is necessary to raise the UDP transport limit above 32KB.\n"
"For connections using the larger MTU, larger messages are possible."
@@ -14143,7 +16377,8 @@ msgstr ""
msgid ""
"All encryption used is AES256/CBC with 32 byte keys and 16 byte IVs.\n"
"When Alice originates a session with Bob,\n"
-"the MAC and session keys are negotiated as part of the DH exchange, and are then used\n"
+"the MAC and session keys are negotiated as part of the DH exchange, and "
+"are then used\n"
"for the HMAC and encryption, respectively. During the DH exchange, \n"
"Bob's publicly knowable introKey is used for the MAC and encryption."
msgstr ""
@@ -14160,7 +16395,8 @@ msgstr ""
#: i2p2www/pages/site/docs/transport/ssu.html:204
msgid ""
-"Upon receiving a message, the receiver checks the \"from\" IP address and port\n"
+"Upon receiving a message, the receiver checks the \"from\" IP address and"
+" port\n"
"with all established sessions - if there are matches,\n"
"that session's MAC keys are tested in the HMAC. If none\n"
"of those verify or if there are no matching IP addresses, the \n"
@@ -14250,7 +16486,8 @@ msgstr ""
#: i2p2www/pages/site/docs/transport/ssu.html:284
msgid ""
-"Direct session establishment is used when no third party is required for NAT traversal.\n"
+"Direct session establishment is used when no third party is required for "
+"NAT traversal.\n"
"The message sequence is as follows:"
msgstr ""
@@ -14270,8 +16507,10 @@ msgid ""
"After the SessionConfirmed message is received, Bob sends a small\n"
"DeliveryStatus message\n"
"as a confirmation.\n"
-"In this message, the 4-byte message ID is set to a random number, and the\n"
-"8-byte \"arrival time\" is set to the current network-wide ID, which is 2\n"
+"In this message, the 4-byte message ID is set to a random number, and the"
+"\n"
+"8-byte \"arrival time\" is set to the current network-wide ID, which is 2"
+"\n"
"(i.e. 0x0000000000000002)."
msgstr ""
@@ -14286,7 +16525,8 @@ msgstr ""
#: i2p2www/pages/site/docs/transport/ssu.html:322
msgid ""
-"It does not appear that the type of the status message or its contents matters.\n"
+"It does not appear that the type of the status message or its contents "
+"matters.\n"
"It was originally added becasue the DatabaseStore message was delayed\n"
"several seconds; since the store is now sent immediately, perhaps\n"
"the status message can be eliminated."
@@ -14295,7 +16535,8 @@ msgstr ""
#: i2p2www/pages/site/docs/transport/ssu.html:331
msgid ""
"Introduction keys are delivered through an external channel \n"
-"(the network database, where they are identical to the router Hash for now)\n"
+"(the network database, where they are identical to the router Hash for "
+"now)\n"
"and must be used when establishing a session key. For the indirect\n"
"address, the peer must first contact the relayhost and ask them for\n"
"an introduction to the peer known at that relayhost under the given\n"
@@ -14313,16 +16554,24 @@ msgid ""
"is necessary for efficient NAT traversal. Charlie, a router behind a\n"
"NAT or firewall which does not allow unsolicited inbound UDP packets,\n"
"first contacts a few peers, choosing some to serve as introducers. Each\n"
-"of these peers (Bob, Bill, Betty, etc) provide Charlie with an introduction\n"
-"tag - a 4 byte random number - which he then makes available to the public\n"
-"as methods of contacting him. Alice, a router who has Charlie's published\n"
-"contact methods, first sends a RelayRequest packet to one or more of the \n"
+"of these peers (Bob, Bill, Betty, etc) provide Charlie with an "
+"introduction\n"
+"tag - a 4 byte random number - which he then makes available to the "
+"public\n"
+"as methods of contacting him. Alice, a router who has Charlie's "
+"published\n"
+"contact methods, first sends a RelayRequest packet to one or more of the"
+" \n"
"introducers, asking each to introduce her to Charlie (offering the \n"
"introduction tag to identify Charlie). Bob then forwards a RelayIntro\n"
-"packet to Charlie including Alice's public IP and port number, then sends\n"
-"Alice back a RelayResponse packet containing Charlie's public IP and port\n"
-"number. When Charlie receives the RelayIntro packet, he sends off a small\n"
-"random packet to Alice's IP and port (poking a hole in his NAT/firewall),\n"
+"packet to Charlie including Alice's public IP and port number, then sends"
+"\n"
+"Alice back a RelayResponse packet containing Charlie's public IP and port"
+"\n"
+"number. When Charlie receives the RelayIntro packet, he sends off a "
+"small\n"
+"random packet to Alice's IP and port (poking a hole in his NAT/firewall),"
+"\n"
"and when Alice receives Bob's RelayResponse packet, she begins a new \n"
"full direction session establishment with the specified IP and port."
msgstr ""
@@ -14332,14 +16581,13 @@ msgid "Connection establishment (indirect using an introducer)"
msgstr ""
#: i2p2www/pages/site/docs/transport/ssu.html:374
-msgid ""
-"Alice first connects to introducer Bob, who relays the request to Charlie."
+msgid "Alice first connects to introducer Bob, who relays the request to Charlie."
msgstr ""
#: i2p2www/pages/site/docs/transport/ssu.html:392
msgid ""
-"After the hole punch, the session is established between Alice and Charlie "
-"as in a direct establishment."
+"After the hole punch, the session is established between Alice and "
+"Charlie as in a direct establishment."
msgstr ""
#: i2p2www/pages/site/docs/transport/ssu.html:404
@@ -14443,12 +16691,14 @@ msgstr ""
#: i2p2www/pages/site/docs/transport/ssu.html:510
#, python-format
msgid ""
-"The details of windowing, ACK, and retransmission strategies are not specified\n"
+"The details of windowing, ACK, and retransmission strategies are not "
+"specified\n"
"here. See the Java code for the current implementation.\n"
"During the establishment phase, and for peer testing, routers\n"
"should implement exponential backoff for retransmission.\n"
"For an established connection, routers should implement\n"
-"an adjustable transmission window, RTT estimate and timeout, similar to TCP\n"
+"an adjustable transmission window, RTT estimate and timeout, similar to "
+"TCP\n"
"or streaming.\n"
"See the code for initial, min and max parameters."
msgstr ""
@@ -14492,22 +16742,27 @@ msgstr ""
#: i2p2www/pages/site/docs/transport/ssu.html:556
msgid ""
-"Analysis of current SSU performance, including assessment of window size adjustment\n"
-"and other parameters, and adjustment of the protocol implementation to improve\n"
+"Analysis of current SSU performance, including assessment of window size "
+"adjustment\n"
+"and other parameters, and adjustment of the protocol implementation to "
+"improve\n"
"performance, is a topic for future work."
msgstr ""
#: i2p2www/pages/site/docs/transport/ssu.html:562
msgid ""
-"The current implementation repeatedly sends acknowledgments for the same packets,\n"
+"The current implementation repeatedly sends acknowledgments for the same "
+"packets,\n"
"which unnecessarily increases overhead."
msgstr ""
#: i2p2www/pages/site/docs/transport/ssu.html:567
msgid ""
-"The default small MTU value of 620 should be analyzed and possibly increased.\n"
+"The default small MTU value of 620 should be analyzed and possibly "
+"increased.\n"
"The current MTU adjustment strategy should be evaluated.\n"
-"Does a streaming lib 1730-byte packet fit in 3 small SSU packets? Probably not."
+"Does a streaming lib 1730-byte packet fit in 3 small SSU packets? "
+"Probably not."
msgstr ""
#: i2p2www/pages/site/docs/transport/ssu.html:573
@@ -14520,28 +16775,32 @@ msgstr ""
#: i2p2www/pages/site/docs/transport/ssu.html:581
msgid ""
-"The potential use of the 'challenge' fields in RelayIntro and RelayResponse,\n"
-"and use of the padding field in SessionRequest and SessionCreated, is undocumented."
+"The potential use of the 'challenge' fields in RelayIntro and "
+"RelayResponse,\n"
+"and use of the padding field in SessionRequest and SessionCreated, is "
+"undocumented."
msgstr ""
#: i2p2www/pages/site/docs/transport/ssu.html:586
msgid ""
"Instead of a single fragment per packet, a more efficient\n"
-"strategy may be to bundle multiple message fragments into the same packet,\n"
+"strategy may be to bundle multiple message fragments into the same "
+"packet,\n"
"so long as it doesn't exceed the MTU."
msgstr ""
#: i2p2www/pages/site/docs/transport/ssu.html:592
msgid ""
"A set of fixed packet sizes may be appropriate to further hide the data \n"
-"fragmentation to external adversaries, but the tunnel, garlic, and end to \n"
+"fragmentation to external adversaries, but the tunnel, garlic, and end to"
+" \n"
"end padding should be sufficient for most needs until then."
msgstr ""
#: i2p2www/pages/site/docs/transport/ssu.html:598
msgid ""
-"Why are introduction keys the same as the router hash, should it be changed,"
-" would there be any benefit?"
+"Why are introduction keys the same as the router hash, should it be "
+"changed, would there be any benefit?"
msgstr ""
#: i2p2www/pages/site/docs/transport/ssu.html:602
@@ -14550,8 +16809,8 @@ msgstr ""
#: i2p2www/pages/site/docs/transport/ssu.html:606
msgid ""
-"Signed-on times in SessionCreated and SessionConfirmed appear to be unused "
-"or unverified."
+"Signed-on times in SessionCreated and SessionConfirmed appear to be "
+"unused or unverified."
msgstr ""
#: i2p2www/pages/site/docs/transport/ssu.html:611
@@ -14561,7 +16820,8 @@ msgstr ""
#: i2p2www/pages/site/docs/transport/ssu.html:612
msgid ""
"This diagram\n"
-"should accurately reflect the current implementation, however there may be small differences."
+"should accurately reflect the current implementation, however there may "
+"be small differences."
msgstr ""
#: i2p2www/pages/site/docs/transport/ssu.html:620
@@ -14589,9 +16849,12 @@ msgid ""
"Within I2P, messages are passed in one direction through a virtual\n"
"tunnel of peers, using whatever means are available to pass the \n"
"message on to the next hop. Messages arrive at the tunnel's \n"
-"gateway, get bundled up and/or fragmented into fixed-size tunnel messages, \n"
-"and are forwarded on to the next hop in the tunnel, which processes and verifies\n"
-"the validity of the message and sends it on to the next hop, and so on, until\n"
+"gateway, get bundled up and/or fragmented into fixed-size tunnel "
+"messages, \n"
+"and are forwarded on to the next hop in the tunnel, which processes and "
+"verifies\n"
+"the validity of the message and sends it on to the next hop, and so on, "
+"until\n"
"it reaches the tunnel endpoint. That endpoint takes the messages\n"
"bundled up by the gateway and forwards them as instructed - either\n"
"to another router, to another tunnel on another router, or locally."
@@ -14613,9 +16876,12 @@ msgid ""
"in the tunnel, and provides each with the necessary configuration\n"
"data. They may have any number of hops.\n"
"It is the intent to make\n"
-"it hard for either participants or third parties to determine the length of \n"
-"a tunnel, or even for colluding participants to determine whether they are a\n"
-"part of the same tunnel at all (barring the situation where colluding peers are\n"
+"it hard for either participants or third parties to determine the length "
+"of \n"
+"a tunnel, or even for colluding participants to determine whether they "
+"are a\n"
+"part of the same tunnel at all (barring the situation where colluding "
+"peers are\n"
"next to each other in the tunnel)."
msgstr ""
@@ -14653,7 +16919,8 @@ msgstr ""
#: i2p2www/pages/site/docs/tunnels/implementation.html:69
#, python-format
msgid ""
-"After a tunnel is built, I2NP messages are processed and passed through it.\n"
+"After a tunnel is built, I2NP messages are "
+"processed and passed through it.\n"
"Tunnel operation has four distinct processes, taken on by various \n"
"peers in the tunnel."
msgstr ""
@@ -14680,7 +16947,8 @@ msgstr ""
#: i2p2www/pages/site/docs/tunnels/implementation.html:89
msgid ""
-"Eventually, the tunnel messages arrive at the endpoint where the I2NP messages\n"
+"Eventually, the tunnel messages arrive at the endpoint where the I2NP "
+"messages\n"
"originally bundled by the gateway are reassembled and forwarded on as \n"
"requested."
msgstr ""
@@ -14740,13 +17008,11 @@ msgid "Decrypt (using an encryption operation)"
msgstr ""
#: i2p2www/pages/site/docs/tunnels/implementation.html:133
-msgid ""
-"Decrypt (using an encryption operation) to reveal plaintext tunnel message"
+msgid "Decrypt (using an encryption operation) to reveal plaintext tunnel message"
msgstr ""
#: i2p2www/pages/site/docs/tunnels/implementation.html:134
-msgid ""
-"Reassemble Fragments, Forward as instructed to Inbound Gateway or Router"
+msgid "Reassemble Fragments, Forward as instructed to Inbound Gateway or Router"
msgstr ""
#: i2p2www/pages/site/docs/tunnels/implementation.html:142
@@ -14807,8 +17073,10 @@ msgstr ""
#: i2p2www/pages/site/docs/tunnels/implementation.html:181
msgid ""
"Tunnel IDs are 4 byte numbers used at each hop - participants know what\n"
-"tunnel ID to listen for messages with and what tunnel ID they should be forwarded\n"
-"on as to the next hop, and each hop chooses the tunnel ID which they receive messages\n"
+"tunnel ID to listen for messages with and what tunnel ID they should be "
+"forwarded\n"
+"on as to the next hop, and each hop chooses the tunnel ID which they "
+"receive messages\n"
"on. Tunnels themselves are short-lived (10 minutes).\n"
"Even if subsequent tunnels are built using the same sequence of \n"
"peers, each hop's tunnel ID will change."
@@ -14816,11 +17084,16 @@ msgstr ""
#: i2p2www/pages/site/docs/tunnels/implementation.html:190
msgid ""
-"To prevent adversaries from tagging the messages along the path by adjusting\n"
-"the message size, all tunnel messages are a fixed 1024 bytes in size. To accommodate \n"
-"larger I2NP messages as well as to support smaller ones more efficiently, the\n"
-"gateway splits up the larger I2NP messages into fragments contained within each\n"
-"tunnel message. The endpoint will attempt to rebuild the I2NP message from the\n"
+"To prevent adversaries from tagging the messages along the path by "
+"adjusting\n"
+"the message size, all tunnel messages are a fixed 1024 bytes in size. To"
+" accommodate \n"
+"larger I2NP messages as well as to support smaller ones more efficiently,"
+" the\n"
+"gateway splits up the larger I2NP messages into fragments contained "
+"within each\n"
+"tunnel message. The endpoint will attempt to rebuild the I2NP message "
+"from the\n"
"fragments for a short period of time, but will discard them as necessary."
msgstr ""
@@ -14837,20 +17110,30 @@ msgstr ""
#: i2p2www/pages/site/docs/tunnels/implementation.html:207
msgid ""
-"After the preprocessing of messages into a padded payload, the gateway builds\n"
-"a random 16 byte IV value, iteratively encrypting it and the tunnel message as\n"
-"necessary, and forwards the tuple {tunnelID, IV, encrypted tunnel message} to the next hop."
+"After the preprocessing of messages into a padded payload, the gateway "
+"builds\n"
+"a random 16 byte IV value, iteratively encrypting it and the tunnel "
+"message as\n"
+"necessary, and forwards the tuple {tunnelID, IV, encrypted tunnel "
+"message} to the next hop."
msgstr ""
#: i2p2www/pages/site/docs/tunnels/implementation.html:213
msgid ""
-"How encryption at the gateway is done depends on whether the tunnel is an\n"
-"inbound or an outbound tunnel. For inbound tunnels, they simply select a random\n"
-"IV, postprocessing and updating it to generate the IV for the gateway and using \n"
-"that IV along side their own layer key to encrypt the preprocessed data. For outbound \n"
-"tunnels they must iteratively decrypt the (unencrypted) IV and preprocessed \n"
-"data with the IV and layer keys for all hops in the tunnel. The result of the outbound\n"
-"tunnel encryption is that when each peer encrypts it, the endpoint will recover \n"
+"How encryption at the gateway is done depends on whether the tunnel is an"
+"\n"
+"inbound or an outbound tunnel. For inbound tunnels, they simply select a"
+" random\n"
+"IV, postprocessing and updating it to generate the IV for the gateway and"
+" using \n"
+"that IV along side their own layer key to encrypt the preprocessed data."
+" For outbound \n"
+"tunnels they must iteratively decrypt the (unencrypted) IV and "
+"preprocessed \n"
+"data with the IV and layer keys for all hops in the tunnel. The result "
+"of the outbound\n"
+"tunnel encryption is that when each peer encrypts it, the endpoint will "
+"recover \n"
"the initial preprocessed data."
msgstr ""
@@ -14860,29 +17143,46 @@ msgstr ""
#: i2p2www/pages/site/docs/tunnels/implementation.html:227
msgid ""
-"When a peer receives a tunnel message, it checks that the message came from\n"
-"the same previous hop as before (initialized when the first message comes through\n"
-"the tunnel). If the previous peer is a different router, or if the message has\n"
-"already been seen, the message is dropped. The participant then encrypts the \n"
-"received IV with AES256/ECB using their IV key to determine the current IV, uses \n"
-"that IV with the participant's layer key to encrypt the data, encrypts the \n"
-"current IV with AES256/ECB using their IV key again, then forwards the tuple \n"
-"{nextTunnelId, nextIV, encryptedData} to the next hop. This double encryption\n"
+"When a peer receives a tunnel message, it checks that the message came "
+"from\n"
+"the same previous hop as before (initialized when the first message comes"
+" through\n"
+"the tunnel). If the previous peer is a different router, or if the "
+"message has\n"
+"already been seen, the message is dropped. The participant then encrypts"
+" the \n"
+"received IV with AES256/ECB using their IV key to determine the current "
+"IV, uses \n"
+"that IV with the participant's layer key to encrypt the data, encrypts "
+"the \n"
+"current IV with AES256/ECB using their IV key again, then forwards the "
+"tuple \n"
+"{nextTunnelId, nextIV, encryptedData} to the next hop. This double "
+"encryption\n"
"of the IV (both before and after use) help address a certain class of\n"
"confirmation attacks."
msgstr ""
#: i2p2www/pages/site/docs/tunnels/implementation.html:243
msgid ""
-"Duplicate message detection is handled by a decaying Bloom filter on message\n"
-"IVs. Each router maintains a single Bloom filter to contain the XOR of the IV and\n"
-"the first block of the message received for all of the tunnels it is participating\n"
-"in, modified to drop seen entries after 10-20 minutes (when the tunnels will have\n"
-"expired). The size of the bloom filter and the parameters used are sufficient to\n"
-"more than saturate the router's network connection with a negligible chance of \n"
-"false positive. The unique value fed into the Bloom filter is the XOR of the IV \n"
-"and the first block so as to prevent nonsequential colluding peers in the tunnel \n"
-"from tagging a message by resending it with the IV and first block switched."
+"Duplicate message detection is handled by a decaying Bloom filter on "
+"message\n"
+"IVs. Each router maintains a single Bloom filter to contain the XOR of "
+"the IV and\n"
+"the first block of the message received for all of the tunnels it is "
+"participating\n"
+"in, modified to drop seen entries after 10-20 minutes (when the tunnels "
+"will have\n"
+"expired). The size of the bloom filter and the parameters used are "
+"sufficient to\n"
+"more than saturate the router's network connection with a negligible "
+"chance of \n"
+"false positive. The unique value fed into the Bloom filter is the XOR of"
+" the IV \n"
+"and the first block so as to prevent nonsequential colluding peers in the"
+" tunnel \n"
+"from tagging a message by resending it with the IV and first block "
+"switched."
msgstr ""
#: i2p2www/pages/site/docs/tunnels/implementation.html:256
@@ -14891,19 +17191,27 @@ msgstr ""
#: i2p2www/pages/site/docs/tunnels/implementation.html:258
msgid ""
-"After receiving and validating a tunnel message at the last hop in the tunnel,\n"
-"how the endpoint recovers the data encoded by the gateway depends upon whether \n"
-"the tunnel is an inbound or an outbound tunnel. For outbound tunnels, the \n"
-"endpoint encrypts the message with its layer key just like any other participant, \n"
-"exposing the preprocessed data. For inbound tunnels, the endpoint is also the \n"
-"tunnel creator so they can merely iteratively decrypt the IV and message, using the \n"
+"After receiving and validating a tunnel message at the last hop in the "
+"tunnel,\n"
+"how the endpoint recovers the data encoded by the gateway depends upon "
+"whether \n"
+"the tunnel is an inbound or an outbound tunnel. For outbound tunnels, "
+"the \n"
+"endpoint encrypts the message with its layer key just like any other "
+"participant, \n"
+"exposing the preprocessed data. For inbound tunnels, the endpoint is "
+"also the \n"
+"tunnel creator so they can merely iteratively decrypt the IV and message,"
+" using the \n"
"layer and IV keys of each step in reverse order."
msgstr ""
#: i2p2www/pages/site/docs/tunnels/implementation.html:268
msgid ""
-"At this point, the tunnel endpoint has the preprocessed data sent by the gateway,\n"
-"which it may then parse out into the included I2NP messages and forwards them as\n"
+"At this point, the tunnel endpoint has the preprocessed data sent by the "
+"gateway,\n"
+"which it may then parse out into the included I2NP messages and forwards "
+"them as\n"
"requested in their delivery instructions."
msgstr ""
@@ -14913,21 +17221,30 @@ msgstr ""
#: i2p2www/pages/site/docs/tunnels/implementation.html:277
msgid ""
-"When building a tunnel, the creator must send a request with the necessary\n"
-"configuration data to each of the hops and wait for all of them to agree before\n"
-"enabling the tunnel. The requests are encrypted so that only the peers who need\n"
-"to know a piece of information (such as the tunnel layer or IV key) has that\n"
-"data. In addition, only the tunnel creator will have access to the peer's\n"
-"reply. There are three important dimensions to keep in mind when producing\n"
-"the tunnels: what peers are used (and where), how the requests are sent (and \n"
+"When building a tunnel, the creator must send a request with the "
+"necessary\n"
+"configuration data to each of the hops and wait for all of them to agree "
+"before\n"
+"enabling the tunnel. The requests are encrypted so that only the peers "
+"who need\n"
+"to know a piece of information (such as the tunnel layer or IV key) has "
+"that\n"
+"data. In addition, only the tunnel creator will have access to the "
+"peer's\n"
+"reply. There are three important dimensions to keep in mind when "
+"producing\n"
+"the tunnels: what peers are used (and where), how the requests are sent "
+"(and \n"
"replies received), and how they are maintained."
msgstr ""
#: i2p2www/pages/site/docs/tunnels/implementation.html:291
msgid ""
-"Beyond the two types of tunnels - inbound and outbound - there are two styles\n"
+"Beyond the two types of tunnels - inbound and outbound - there are two "
+"styles\n"
"of peer selection used for different tunnels - exploratory and client.\n"
-"Exploratory tunnels are used for both network database maintenance and tunnel\n"
+"Exploratory tunnels are used for both network database maintenance and "
+"tunnel\n"
"maintenance, while client tunnels are used for end to end client messages."
msgstr ""
@@ -14937,12 +17254,18 @@ msgstr ""
#: i2p2www/pages/site/docs/tunnels/implementation.html:301
msgid ""
-"Exploratory tunnels are built out of a random selection of peers from a subset\n"
-"of the network. The particular subset varies on the local router and on what their\n"
-"tunnel routing needs are. In general, the exploratory tunnels are built out of\n"
-"randomly selected peers who are in the peer's \"not failing but active\" profile\n"
-"category. The secondary purpose of the tunnels, beyond merely tunnel routing,\n"
-"is to find underutilized high capacity peers so that they can be promoted for\n"
+"Exploratory tunnels are built out of a random selection of peers from a "
+"subset\n"
+"of the network. The particular subset varies on the local router and on "
+"what their\n"
+"tunnel routing needs are. In general, the exploratory tunnels are built "
+"out of\n"
+"randomly selected peers who are in the peer's \"not failing but active\" "
+"profile\n"
+"category. The secondary purpose of the tunnels, beyond merely tunnel "
+"routing,\n"
+"is to find underutilized high capacity peers so that they can be promoted"
+" for\n"
"use in client tunnels."
msgstr ""
@@ -14959,10 +17282,14 @@ msgstr ""
#: i2p2www/pages/site/docs/tunnels/implementation.html:319
msgid ""
-"Client tunnels are built with a more stringent set of requirements - the local\n"
-"router will select peers out of its \"fast and high capacity\" profile category so\n"
-"that performance and reliability will meet the needs of the client application.\n"
-"However, there are several important details beyond that basic selection that \n"
+"Client tunnels are built with a more stringent set of requirements - the "
+"local\n"
+"router will select peers out of its \"fast and high capacity\" profile "
+"category so\n"
+"that performance and reliability will meet the needs of the client "
+"application.\n"
+"However, there are several important details beyond that basic selection "
+"that \n"
"should be adhered to, depending upon the client's anonymity needs."
msgstr ""
@@ -14988,8 +17315,10 @@ msgstr ""
#: i2p2www/pages/site/docs/tunnels/implementation.html:341
msgid ""
"To frustrate the predecessor \n"
-"attack, the tunnel selection keeps the peers selected in a strict order -\n"
-"if A, B, and C are in a tunnel for a particular tunnel pool, the hop after A is always B, and the hop after\n"
+"attack, the tunnel selection keeps the peers selected in a strict order -"
+"\n"
+"if A, B, and C are in a tunnel for a particular tunnel pool, the hop "
+"after A is always B, and the hop after\n"
"B is always C."
msgstr ""
@@ -14998,15 +17327,18 @@ msgid ""
"Ordering is implemented by generating a random 32-byte key for each\n"
"tunnel pool at startup.\n"
"Peers should not be able to guess the ordering, or an attacker could\n"
-"craft two router hashes far apart to maximize the chance of being at both\n"
+"craft two router hashes far apart to maximize the chance of being at both"
+"\n"
"ends of a tunnel.\n"
"Peers are sorted by XOR distance of the\n"
-"SHA256 Hash of (the peer's hash concatenated with the random key) from the random key"
+"SHA256 Hash of (the peer's hash concatenated with the random key) from "
+"the random key"
msgstr ""
#: i2p2www/pages/site/docs/tunnels/implementation.html:363
msgid ""
-"Because each tunnel pool uses a different random key, ordering is consistent\n"
+"Because each tunnel pool uses a different random key, ordering is "
+"consistent\n"
"within a single pool but not between different pools.\n"
"New keys are generated at each router restart."
msgstr ""
@@ -15018,7 +17350,8 @@ msgstr ""
#: i2p2www/pages/site/docs/tunnels/implementation.html:372
#, python-format
msgid ""
-"A multi-hop tunnel is built using a single build message which is repeatedly\n"
+"A multi-hop tunnel is built using a single build message which is "
+"repeatedly\n"
"decrypted and forwarded. In the terminology of\n"
"Hashing it out in Public,\n"
"this is \"non-interactive\" telescopic tunnel building."
@@ -15029,28 +17362,38 @@ msgstr ""
msgid ""
"This tunnel request preparation, delivery, and response method is\n"
"designed to reduce the number of\n"
-"predecessors exposed, cuts the number of messages transmitted, verifies proper\n"
-"connectivity, and avoids the message counting attack of traditional telescopic\n"
+"predecessors exposed, cuts the number of messages transmitted, verifies "
+"proper\n"
+"connectivity, and avoids the message counting attack of traditional "
+"telescopic\n"
"tunnel creation.\n"
-"(This method, which sends messages to extend a tunnel through the already-established\n"
-"part of the tunnel, is termed \"interactive\" telescopic tunnel building in\n"
+"(This method, which sends messages to extend a tunnel through the "
+"already-established\n"
+"part of the tunnel, is termed \"interactive\" telescopic tunnel building "
+"in\n"
"the \"Hashing it out\" paper.)"
msgstr ""
#: i2p2www/pages/site/docs/tunnels/implementation.html:390
#, python-format
msgid ""
-"The details of tunnel request and response messages, and their encryption,\n"
+"The details of tunnel request and response messages, and their "
+"encryption,\n"
"are specified here."
msgstr ""
#: i2p2www/pages/site/docs/tunnels/implementation.html:395
msgid ""
-"Peers may reject tunnel creation requests for a variety of reasons, though\n"
-"a series of four increasingly severe rejections are known: probabilistic rejection\n"
-"(due to approaching the router's capacity, or in response to a flood of requests), \n"
-"transient overload, bandwidth overload, and critical failure. When received, \n"
-"those four are interpreted by the tunnel creator to help adjust their profile of\n"
+"Peers may reject tunnel creation requests for a variety of reasons, "
+"though\n"
+"a series of four increasingly severe rejections are known: probabilistic "
+"rejection\n"
+"(due to approaching the router's capacity, or in response to a flood of "
+"requests), \n"
+"transient overload, bandwidth overload, and critical failure. When "
+"received, \n"
+"those four are interpreted by the tunnel creator to help adjust their "
+"profile of\n"
"the router in question."
msgstr ""
@@ -15068,26 +17411,37 @@ msgstr ""
#: i2p2www/pages/site/docs/tunnels/implementation.html:412
#, python-format
msgid ""
-"To allow efficient operation, the router maintains a series of tunnel pools,\n"
-"each managing a group of tunnels used for a specific purpose with their own\n"
-"configuration. When a tunnel is needed for that purpose, the router selects one\n"
-"out of the appropriate pool at random. Overall, there are two exploratory tunnel\n"
-"pools - one inbound and one outbound - each using the router's default configuration.\n"
+"To allow efficient operation, the router maintains a series of tunnel "
+"pools,\n"
+"each managing a group of tunnels used for a specific purpose with their "
+"own\n"
+"configuration. When a tunnel is needed for that purpose, the router "
+"selects one\n"
+"out of the appropriate pool at random. Overall, there are two "
+"exploratory tunnel\n"
+"pools - one inbound and one outbound - each using the router's default "
+"configuration.\n"
"In addition, there is a pair of pools for each local destination -\n"
-"one inbound and one outbound tunnel pool. Those pools use the configuration specified\n"
-"when the local destination connects to the router via I2CP, or the router's defaults if\n"
+"one inbound and one outbound tunnel pool. Those pools use the "
+"configuration specified\n"
+"when the local destination connects to the router via I2CP, or the router's defaults if\n"
"not specified."
msgstr ""
#: i2p2www/pages/site/docs/tunnels/implementation.html:424
#, python-format
msgid ""
-"Each pool has within its configuration a few key settings, defining how many\n"
-"tunnels to keep active, how many backup tunnels to maintain in case of failure,\n"
+"Each pool has within its configuration a few key settings, defining how "
+"many\n"
+"tunnels to keep active, how many backup tunnels to maintain in case of "
+"failure,\n"
"how long the tunnels should be, whether those\n"
"lengths should be randomized, as \n"
-"well as any of the other settings allowed when configuring individual tunnels.\n"
-"Configuration options are specified on the I2CP page."
+"well as any of the other settings allowed when configuring individual "
+"tunnels.\n"
+"Configuration options are specified on the I2CP "
+"page."
msgstr ""
#: i2p2www/pages/site/docs/tunnels/implementation.html:434
@@ -15104,14 +17458,20 @@ msgstr ""
#: i2p2www/pages/site/docs/tunnels/implementation.html:440
msgid ""
-"Tunnel building is expensive, and tunnels expire a fixed time after they are built.\n"
-"However, when a pool that runs out of tunnels, the Destination is essentially dead.\n"
-"In addition, tunnel build success rate may vary greatly with both local and global\n"
+"Tunnel building is expensive, and tunnels expire a fixed time after they "
+"are built.\n"
+"However, when a pool that runs out of tunnels, the Destination is "
+"essentially dead.\n"
+"In addition, tunnel build success rate may vary greatly with both local "
+"and global\n"
"network conditions.\n"
-"Therefore, it is important to maintain an anticipatory, adaptive build strategy\n"
-"to ensure that new tunnels are successfully built before they are needed,\n"
+"Therefore, it is important to maintain an anticipatory, adaptive build "
+"strategy\n"
+"to ensure that new tunnels are successfully built before they are needed,"
+"\n"
"without building an excess of tunnels, building them too soon,\n"
-"or consuming too much CPU or bandwidth creating and sending the encrypted build messages."
+"or consuming too much CPU or bandwidth creating and sending the encrypted"
+" build messages."
msgstr ""
#: i2p2www/pages/site/docs/tunnels/implementation.html:451
@@ -15119,7 +17479,8 @@ msgid ""
"For each tuple {exploratory/client, in/out, length, length variance}\n"
"the router maintains statistics on the time required for a successful\n"
"tunnel build.\n"
-"Using these statistics, it calculates how long before a tunnel's expiration\n"
+"Using these statistics, it calculates how long before a tunnel's "
+"expiration\n"
"it should start attempting to build a replacement.\n"
"As the expiration time approaches without a successful replacement,\n"
"it starts multiple build attempts in parallel, and then\n"
@@ -15141,18 +17502,30 @@ msgstr ""
#: i2p2www/pages/site/docs/tunnels/implementation.html:473
msgid ""
-"Even though the tunnels within I2P bear a resemblance to a circuit switched\n"
-"network, everything within I2P is strictly message based - tunnels are merely\n"
-"accounting tricks to help organize the delivery of messages. No assumptions are\n"
-"made regarding reliability or ordering of messages, and retransmissions are left\n"
-"to higher levels (e.g. I2P's client layer streaming library). This allows I2P\n"
-"to take advantage of throttling techniques available to both packet switched and\n"
-"circuit switched networks. For instance, each router may keep track of the \n"
-"moving average of how much data each tunnel is using, combine that with all of \n"
-"the averages used by other tunnels the router is participating in, and be able\n"
-"to accept or reject additional tunnel participation requests based on its \n"
-"capacity and utilization. On the other hand, each router can simply drop \n"
-"messages that are beyond its capacity, exploiting the research used on the \n"
+"Even though the tunnels within I2P bear a resemblance to a circuit "
+"switched\n"
+"network, everything within I2P is strictly message based - tunnels are "
+"merely\n"
+"accounting tricks to help organize the delivery of messages. No "
+"assumptions are\n"
+"made regarding reliability or ordering of messages, and retransmissions "
+"are left\n"
+"to higher levels (e.g. I2P's client layer streaming library). This "
+"allows I2P\n"
+"to take advantage of throttling techniques available to both packet "
+"switched and\n"
+"circuit switched networks. For instance, each router may keep track of "
+"the \n"
+"moving average of how much data each tunnel is using, combine that with "
+"all of \n"
+"the averages used by other tunnels the router is participating in, and be"
+" able\n"
+"to accept or reject additional tunnel participation requests based on its"
+" \n"
+"capacity and utilization. On the other hand, each router can simply drop"
+" \n"
+"messages that are beyond its capacity, exploiting the research used on "
+"the \n"
"normal Internet."
msgstr ""
@@ -15160,16 +17533,23 @@ msgstr ""
msgid ""
"In the current implementation, routers implement a\n"
"weighted random early discard (WRED) strategy.\n"
-"For all participating routers (internal participant, inbound gateway, and outbound endpoint),\n"
+"For all participating routers (internal participant, inbound gateway, and"
+" outbound endpoint),\n"
"the router will start randomly dropping a portion of messages as the\n"
"bandwidth limits are approached.\n"
-"As traffic gets closer to, or exceeds, the limits, more messages are dropped.\n"
-"For an internal participant, all messages are fragmented and padded and therefore are the same size.\n"
-"At the inbound gateway and outbound endpoint, however, the dropping decision is made\n"
-"on the full (coalesced) message, and the message size is taken into account.\n"
+"As traffic gets closer to, or exceeds, the limits, more messages are "
+"dropped.\n"
+"For an internal participant, all messages are fragmented and padded and "
+"therefore are the same size.\n"
+"At the inbound gateway and outbound endpoint, however, the dropping "
+"decision is made\n"
+"on the full (coalesced) message, and the message size is taken into "
+"account.\n"
"Larger messages are more likely to be dropped.\n"
-"Also, messages are more likely to be dropped at the outbound endpoint than the inbound gateway,\n"
-"as those messages are not as \"far along\" in their journey and thus the network cost of\n"
+"Also, messages are more likely to be dropped at the outbound endpoint "
+"than the inbound gateway,\n"
+"as those messages are not as \"far along\" in their journey and thus the "
+"network cost of\n"
"dropping those messages is lower."
msgstr ""
@@ -15179,11 +17559,16 @@ msgstr ""
#: i2p2www/pages/site/docs/tunnels/implementation.html:509
msgid ""
-"What strategies could be used at the gateway and at each hop for delaying,\n"
-"reordering, rerouting, or padding messages? To what extent should this be done\n"
-"automatically, how much should be configured as a per tunnel or per hop setting,\n"
-"and how should the tunnel's creator (and in turn, user) control this operation?\n"
-"All of this is left as unknown, to be worked out for a distant future release."
+"What strategies could be used at the gateway and at each hop for "
+"delaying,\n"
+"reordering, rerouting, or padding messages? To what extent should this "
+"be done\n"
+"automatically, how much should be configured as a per tunnel or per hop "
+"setting,\n"
+"and how should the tunnel's creator (and in turn, user) control this "
+"operation?\n"
+"All of this is left as unknown, to be worked out for a distant future "
+"release."
msgstr ""
#: i2p2www/pages/site/docs/tunnels/implementation.html:518
@@ -15192,10 +17577,13 @@ msgstr ""
#: i2p2www/pages/site/docs/tunnels/implementation.html:519
msgid ""
-"The padding strategies can be used on a variety of levels, addressing the\n"
+"The padding strategies can be used on a variety of levels, addressing the"
+"\n"
"exposure of message size information to different adversaries.\n"
-"The current fixed tunnel message size is 1024 bytes. Within this however, the fragmented\n"
-"messages themselves are not padded by the tunnel at all, though for end to end \n"
+"The current fixed tunnel message size is 1024 bytes. Within this "
+"however, the fragmented\n"
+"messages themselves are not padded by the tunnel at all, though for end "
+"to end \n"
"messages, they may be padded as part of the garlic wrapping."
msgstr ""
@@ -15219,7 +17607,8 @@ msgstr ""
#: i2p2www/pages/site/docs/tunnels/unidirectional.html:7
msgid ""
-"This page describes the origins and design of I2P's unidirectional tunnels.\n"
+"This page describes the origins and design of I2P's unidirectional "
+"tunnels.\n"
"For further infomrmation see:"
msgstr ""
@@ -15253,7 +17642,8 @@ msgid ""
"Several apps and protocols, notably HTTP,\n"
"do transfer data in such manner. Having the traffic follow the same \n"
"route to its destination and back could make it easier for an \n"
-"attacker who has only timing and traffic volume data to infer the path a \n"
+"attacker who has only timing and traffic volume data to infer the path a"
+" \n"
"tunnel is taking.\n"
"Having the response come back along a different path arguably \n"
"makes it harder."
@@ -15262,27 +17652,42 @@ msgstr ""
#: i2p2www/pages/site/docs/tunnels/unidirectional.html:45
msgid ""
"When dealing with \n"
-"an internal adversary or most external adversaries, I2P's undirectional tunnels\n"
-"expose half as much traffic data than would be exposed with bidirectional circuits\n"
-"by simply looking at the flows themselves - an HTTP request and response would \n"
-"follow the same path in Tor, while in I2P the packets making up the request \n"
-"would go out through one or more outbound tunnels and the packets making up \n"
-"the response would come back through one or more different inbound tunnels."
+"an internal adversary or most external adversaries, I2P's undirectional "
+"tunnels\n"
+"expose half as much traffic data than would be exposed with bidirectional"
+" circuits\n"
+"by simply looking at the flows themselves - an HTTP request and response "
+"would \n"
+"follow the same path in Tor, while in I2P the packets making up the "
+"request \n"
+"would go out through one or more outbound tunnels and the packets making "
+"up \n"
+"the response would come back through one or more different inbound "
+"tunnels."
msgstr ""
#: i2p2www/pages/site/docs/tunnels/unidirectional.html:55
msgid ""
"The strategy of using two separate tunnels for inbound and outbound\n"
-"communication is not the only technique available, and it does have anonymity\n"
-"implications. On the positive side, by using separate tunnels it lessens the\n"
-"traffic data exposed for analysis to participants in a tunnel - for instance,\n"
-"peers in an outbound tunnel from a web browser would only see the traffic of\n"
+"communication is not the only technique available, and it does have "
+"anonymity\n"
+"implications. On the positive side, by using separate tunnels it lessens"
+" the\n"
+"traffic data exposed for analysis to participants in a tunnel - for "
+"instance,\n"
+"peers in an outbound tunnel from a web browser would only see the traffic"
+" of\n"
"an HTTP GET, while the peers in an inbound tunnel would see the payload \n"
-"delivered along the tunnel. With bidirectional tunnels, all participants would\n"
-"have access to the fact that e.g. 1KB was sent in one direction, then 100KB\n"
-"in the other. On the negative side, using unidirectional tunnels means that\n"
-"there are two sets of peers which need to be profiled and accounted for, and\n"
-"additional care must be taken to address the increased speed of predecessor\n"
+"delivered along the tunnel. With bidirectional tunnels, all participants"
+" would\n"
+"have access to the fact that e.g. 1KB was sent in one direction, then "
+"100KB\n"
+"in the other. On the negative side, using unidirectional tunnels means "
+"that\n"
+"there are two sets of peers which need to be profiled and accounted for, "
+"and\n"
+"additional care must be taken to address the increased speed of "
+"predecessor\n"
"attacks. The tunnel pooling and building process\n"
"(peer selection and ordering strategies)\n"
"should minimize the worries of the predecessor attack."
@@ -15296,22 +17701,28 @@ msgstr ""
#, python-format
msgid ""
"A recent paper by Hermann and Grothoff\n"
-"declared that I2P's unidirectional tunnels \"seems to be a bad design decision\"."
+"declared that I2P's unidirectional tunnels \"seems to be a bad design "
+"decision\"."
msgstr ""
#: i2p2www/pages/site/docs/tunnels/unidirectional.html:80
msgid ""
"The paper's main point is that\n"
-"deanonymizations on unidirectional tunnels take a longer time, which is an \n"
-"advantage, but that an attacker can be more certain in the unidirectional case. \n"
-"Therefore, the paper claims it isn't an advantage at all, but a disadvantage, at least\n"
+"deanonymizations on unidirectional tunnels take a longer time, which is "
+"an \n"
+"advantage, but that an attacker can be more certain in the unidirectional"
+" case. \n"
+"Therefore, the paper claims it isn't an advantage at all, but a "
+"disadvantage, at least\n"
"with long-living eepsites."
msgstr ""
#: i2p2www/pages/site/docs/tunnels/unidirectional.html:88
msgid ""
-"This conclusion is not fully supported by the paper. Unidirectional tunnels clearly \n"
-"mitigate other attacks and it's not clear how to trade off the risk of the \n"
+"This conclusion is not fully supported by the paper. Unidirectional "
+"tunnels clearly \n"
+"mitigate other attacks and it's not clear how to trade off the risk of "
+"the \n"
"attack in the paper\n"
"with attacks on a bidirectional tunnel architecture."
msgstr ""
@@ -15320,45 +17731,63 @@ msgstr ""
msgid ""
"This conclusion is based on an arbitrary certainty vs. time weighting \n"
"(tradeoff) that may not be applicable in all cases. For \n"
-"example, somebody could make a list of possible IPs then issue subpoenas to \n"
+"example, somebody could make a list of possible IPs then issue subpoenas "
+"to \n"
"each. Or the attacker could DDoS each in turn and via a simple \n"
-"intersection attack see if the eepsite goes down or is slowed down. So close \n"
+"intersection attack see if the eepsite goes down or is slowed down. So "
+"close \n"
"may be good enough, or time may be more important."
msgstr ""
#: i2p2www/pages/site/docs/tunnels/unidirectional.html:104
msgid ""
-"The conclusion is based on a specific weighting of the importance of certainty \n"
-"vs. time, and that weighting may be wrong, and it's definitely debatable, \n"
-"especially in a real world with subpoenas, search warrants, and other methods \n"
+"The conclusion is based on a specific weighting of the importance of "
+"certainty \n"
+"vs. time, and that weighting may be wrong, and it's definitely debatable,"
+" \n"
+"especially in a real world with subpoenas, search warrants, and other "
+"methods \n"
"available for final confirmation."
msgstr ""
#: i2p2www/pages/site/docs/tunnels/unidirectional.html:111
msgid ""
"A full analysis of the tradeoffs of unidirectional vs. bidirectional \n"
-"tunnels is clearly outside the scope of the paper, and has not been done \n"
-"elsewhere. For example, how does this attack compare to the numerous possible \n"
-"timing attacks published about onion-routed networks? Clearly the authors have not\n"
+"tunnels is clearly outside the scope of the paper, and has not been done"
+" \n"
+"elsewhere. For example, how does this attack compare to the numerous "
+"possible \n"
+"timing attacks published about onion-routed networks? Clearly the authors"
+" have not\n"
"done that analysis, if it's even possible to do it\n"
"effectively."
msgstr ""
#: i2p2www/pages/site/docs/tunnels/unidirectional.html:120
msgid ""
-"Tor uses bidirectional tunnels and has had a lot of academic review. I2P \n"
-"uses unidirectional tunnels and has had very little review. Does the lack of a \n"
-"research paper defending unidirectional tunnels mean that it is a poor design \n"
+"Tor uses bidirectional tunnels and has had a lot of academic review. I2P"
+" \n"
+"uses unidirectional tunnels and has had very little review. Does the lack"
+" of a \n"
+"research paper defending unidirectional tunnels mean that it is a poor "
+"design \n"
"choice, or just that it needs more study? Timing attacks and \n"
-"distributed attacks are difficult to defend against in both I2P and Tor. The \n"
-"design intent (see references above) was that unidirectional tunnels are more \n"
-"resistant to timing attacks. However, the paper presents a somewhat different type of timing \n"
+"distributed attacks are difficult to defend against in both I2P and Tor. "
+"The \n"
+"design intent (see references above) was that unidirectional tunnels are "
+"more \n"
+"resistant to timing attacks. However, the paper presents a somewhat "
+"different type of timing \n"
"attack. Is this attack, innovative as it is, sufficient to label I2P's \n"
"tunnel architecture (and thus I2P as a whole) a \"bad design\", and by \n"
-"implication clearly inferior to Tor, or is it just a design alternative that \n"
-"clearly needs further investigation and analysis? There are several other reasons \n"
-"to consider I2P currently inferior to Tor and other projects (small network \n"
-"size, lack of funding, lack of review) but is unidirectional tunnels really a \n"
+"implication clearly inferior to Tor, or is it just a design alternative "
+"that \n"
+"clearly needs further investigation and analysis? There are several other"
+" reasons \n"
+"to consider I2P currently inferior to Tor and other projects (small "
+"network \n"
+"size, lack of funding, lack of review) but is unidirectional tunnels "
+"really a \n"
"reason?"
msgstr ""
@@ -15369,3 +17798,4 @@ msgid ""
"tunnels are unequivocally inferior to bidirectional tunnels\", yet this \n"
"conclusion is not supported by the paper."
msgstr ""
+
diff --git a/i2p2www/translations/pt_BR/LC_MESSAGES/get-involved.po b/i2p2www/translations/pt_BR/LC_MESSAGES/get-involved.po
index feb740e5..13e3f7be 100644
--- a/i2p2www/translations/pt_BR/LC_MESSAGES/get-involved.po
+++ b/i2p2www/translations/pt_BR/LC_MESSAGES/get-involved.po
@@ -1,25 +1,25 @@
-# Translations template for I2P.
+# Portuguese (Brazil) translations for I2P.
# Copyright (C) 2014 ORGANIZATION
# This file is distributed under the same license as the I2P project.
-#
+#
# Translators:
# blueboy, 2013
# blueboy, 2014
# blueboy, 2013-2014
msgid ""
msgstr ""
-"Project-Id-Version: I2P\n"
+"Project-Id-Version: I2P\n"
"Report-Msgid-Bugs-To: http://trac.i2p2.de\n"
"POT-Creation-Date: 2014-11-27 12:12+0000\n"
"PO-Revision-Date: 2014-11-29 03:58+0000\n"
"Last-Translator: blueboy\n"
-"Language-Team: Portuguese (Brazil) (http://www.transifex.com/projects/p/I2P/language/pt_BR/)\n"
+"Language-Team: Portuguese (Brazil) "
+"(http://www.transifex.com/projects/p/I2P/language/pt_BR/)\n"
+"Plural-Forms: nplurals=2; plural=(n > 1)\n"
"MIME-Version: 1.0\n"
-"Content-Type: text/plain; charset=UTF-8\n"
+"Content-Type: text/plain; charset=utf-8\n"
"Content-Transfer-Encoding: 8bit\n"
"Generated-By: Babel 1.3\n"
-"Language: pt_BR\n"
-"Plural-Forms: nplurals=2; plural=(n > 1);\n"
#: i2p2www/pages/site/get-involved/donate.html:2
#: i2p2www/pages/site/get-involved/index.html:77
@@ -31,7 +31,9 @@ msgid ""
"Thank you for your interest in contributing to I2P!\n"
"The details of how you\n"
"can make your contribution are provided below."
-msgstr "Obrigado pela disposição em contribuir com a I2P! Os detalhes de como fazer uma doação são fornecidos abaixo."
+msgstr ""
+"Obrigado pela disposição em contribuir com a I2P! Os detalhes de como "
+"fazer uma doação são fornecidos abaixo."
#: i2p2www/pages/site/get-involved/donate.html:10
msgid "Tax Status"
@@ -42,7 +44,10 @@ msgid ""
"I2P is not incorporated.\n"
"Your contributions are probably not tax-deductible.\n"
"If you would like to discuss a large contribution, please contact eche|on."
-msgstr "O projeto I2P não é uma corporação. As suas contribuições não são, provavelmente, dedutíveis. Se você pretende discutir uma grande contribuição, por favor, entre em contato com eche | on."
+msgstr ""
+"O projeto I2P não é uma corporação. As suas contribuições não são, "
+"provavelmente, dedutíveis. Se você pretende discutir uma grande "
+"contribuição, por favor, entre em contato com eche | on."
#: i2p2www/pages/site/get-involved/donate.html:17
msgid "Stickers"
@@ -52,10 +57,20 @@ msgstr "Adesivos"
msgid ""
"While supplies last, we offer I2P stickers to those who donate enough\n"
"to cover PayPal fees and postage from the U.S.\n"
-"You must include \"stickers please\" and your address in the Paypal comments.\n"
+"You must include \"stickers please\" and your address in the Paypal "
+"comments.\n"
"For other payment methods, follow up with an email to eche|on\n"
-"with the subject \"stickers please\", your payment information, and your address."
-msgstr "Enquanto durarem os estoques, nós ofereceremos adesivos da I2P para aqueles que doarem o suficiente para cobrir os custos com o PayPal e com o envio postal a partir dos EUA.\nVocê deve incluir \"stickers please\" e o seu endereço nos comentários do PayPal.\nPara outros métodos de pagamento, proceda com o envio de um email para echelon com o assunto \"stickers please\", suas informações de pagamento e seu endereço."
+"with the subject \"stickers please\", your payment information, and your "
+"address."
+msgstr ""
+"Enquanto durarem os estoques, nós ofereceremos adesivos da I2P para "
+"aqueles que doarem o suficiente para cobrir os custos com o PayPal e com "
+"o envio postal a partir dos EUA.\n"
+"Você deve incluir \"stickers please\" e o seu endereço nos comentários do"
+" PayPal.\n"
+"Para outros métodos de pagamento, proceda com o envio de um email para "
+"echelon com o assunto \"stickers please\", suas informações de pagamento "
+"e seu endereço."
#: i2p2www/pages/site/get-involved/donate.html:27
#, python-format
@@ -67,7 +82,13 @@ msgid ""
"desired amount of coins to the account %(account)s\n"
"and leave eche|on a note if you'd like your donation to be\n"
"mentioned on the I2P webpage."
-msgstr "Desde %(date)s, eche|on vem operando uma conta de %(cointype)s para o projeto I2P.\nATENÇÃO! O endereço mudou em 02-20-2014. ATENÇÃO!\nSe você prefere usar %(cointype)s, basta transferir a quantia que deseja doar, nessa moeda, para a conta %(account)s e deixar uma nota para o eche|on se desejar que a doação seja mencionada na página web da I2P."
+msgstr ""
+"Desde %(date)s, eche|on vem operando uma conta de %(cointype)s para o projeto I2P.\n"
+"ATENÇÃO! O endereço mudou em 02-20-2014. ATENÇÃO!\n"
+"Se você prefere usar %(cointype)s, basta transferir a quantia que deseja "
+"doar, nessa moeda, para a conta %(account)s e deixar uma nota para"
+" o eche|on se desejar que a doação seja mencionada na página web da I2P."
#: i2p2www/pages/site/get-involved/donate.html:39
#: i2p2www/pages/site/get-involved/donate.html:56
@@ -85,7 +106,13 @@ msgid ""
"desired amount of coins to the account %(account)s\n"
"and leave eche|on a note if you'd like your donation to be\n"
"mentioned on the I2P webpage."
-msgstr "Desde %(date)s, eche|on vem operando uma conta de %(cointype)s para o projeto I2P.\nATENÇÃO! O endereço mudou em 02-20-2014. ATENÇÃO!\nSe você prefere usar %(cointype)s, basta transferir a quantia que deseja doar, nessa moeda, para a conta %(account)s e deixar uma nota para o eche|on se desejar que a doação seja mencionada na página web da I2P."
+msgstr ""
+"Desde %(date)s, eche|on vem operando uma conta de %(cointype)s para o projeto I2P.\n"
+"ATENÇÃO! O endereço mudou em 02-20-2014. ATENÇÃO!\n"
+"Se você prefere usar %(cointype)s, basta transferir a quantia que deseja "
+"doar, nessa moeda, para a conta %(account)s e deixar uma nota para"
+" o eche|on se desejar que a doação seja mencionada na página web da I2P."
#: i2p2www/pages/site/get-involved/donate.html:61
#, python-format
@@ -96,20 +123,31 @@ msgid ""
"desired amount of coins to the account %(account)s\n"
"and leave Meeh a note if you'd like your donation to be\n"
"mentioned on the I2P webpage."
-msgstr "Desde %(date)s, Meeh vem operando uma conta de %(cointype)s para o projeto I2P. Se você prefere usar %(cointype)s, basta transferir a quantia que deseja doar, nessa moeda, para a conta %(account)s e deixar uma nota para o Meeh se desejar que a doação seja mencionada na página web da I2P."
+msgstr ""
+"Desde %(date)s, Meeh vem operando uma conta de %(cointype)s para o projeto I2P. Se você prefere"
+" usar %(cointype)s, basta transferir a quantia que deseja doar, nessa "
+"moeda, para a conta %(account)s e deixar uma nota para o Meeh se "
+"desejar que a doação seja mencionada na página web da I2P."
#: i2p2www/pages/site/get-involved/donate.html:77
#, python-format
msgid ""
-"We accept most altcoins, just ask Meeh. Other altcoins can be converted and "
-"exchanged for a crypto currency we currently support. Please send a mail to "
-"\"%(account)s\" for a such donation."
-msgstr "Aceitamos a maioria das moedas alternativas, basta perguntar ao Meeh. Outras moedas alternativas podem ser convertidas e trocadas por uma criptomoeda suportada por nós. Se deseja fazer uma doação desse tipo, por favor, envie um email para \"%(account)s\"."
+"We accept most altcoins, just ask Meeh. Other altcoins can be converted "
+"and exchanged for a crypto currency we currently support. Please send a "
+"mail to \"%(account)s\" for a such donation."
+msgstr ""
+"Aceitamos a maioria das moedas alternativas, basta perguntar ao Meeh. "
+"Outras moedas alternativas podem ser convertidas e trocadas por uma "
+"criptomoeda suportada por nós. Se deseja fazer uma doação desse tipo, por"
+" favor, envie um email para \"%(account)s\"."
#: i2p2www/pages/site/get-involved/donate.html:84
#, python-format
msgid "You can donate direct via PayPal to the account \"%(account)s\"."
-msgstr "Você pode fazer uma doação diretamente via PayPal para a conta \"%(account)s\"."
+msgstr ""
+"Você pode fazer uma doação diretamente via PayPal para a conta "
+"\"%(account)s\"."
#: i2p2www/pages/site/get-involved/donate.html:90
msgid "One time donation:"
@@ -144,23 +182,38 @@ msgstr "Doar com Flattr"
#: i2p2www/pages/site/get-involved/donate.html:162
msgid ""
-"If you want to keep more or less anonymous, the option to send money via mail is also available. But it is less secure\n"
+"If you want to keep more or less anonymous, the option to send money via "
+"mail is also available. But it is less secure\n"
"as the envelope can be lost on the way to us."
-msgstr "Se você quer manter-se mais ou menos anônimo, enviar dinheiro via correio é também uma opção. Mas é menos seguro, haja visto que o envelope pode ser extraviado."
+msgstr ""
+"Se você quer manter-se mais ou menos anônimo, enviar dinheiro via correio"
+" é também uma opção. Mas é menos seguro, haja visto que o envelope pode "
+"ser extraviado."
#: i2p2www/pages/site/get-involved/donate.html:166
#, python-format
msgid ""
-"If you'd like to donate via snail mail, send an email to %(email)s\n"
+"If you'd like to donate via snail mail, send an email to %(email)s\n"
" and you'll receive an email with instructions detailing how to proceed."
-msgstr "Se preferir doar via snail mail, envie um email para %(email)s que lhe enviaremos um email com instruções detalhando como proceder."
+msgstr ""
+"Se preferir doar via snail mail, envie um email para %(email)s que lhe enviaremos um email com instruções "
+"detalhando como proceder."
#: i2p2www/pages/site/get-involved/donate.html:171
#, python-format
msgid ""
-"In the meantime, feel free to take a look at the generous donations that have been\n"
-"given in support of the I2P Project at the hall of fame."
-msgstr "Por ora, sinta-se livre para dar uma olhada nas generosas doações que foram dadas em apoio ao projeto I2P no salão da fama."
+"In the meantime, feel free to take a look at the generous donations that "
+"have been\n"
+"given in support of the I2P Project at the hall of fame."
+msgstr ""
+"Por ora, sinta-se livre para dar uma olhada nas generosas doações que "
+"foram dadas em apoio ao projeto I2P no salão "
+"da fama."
#: i2p2www/pages/site/get-involved/index.html:2
msgid "Get Involved!"
@@ -172,22 +225,35 @@ msgstr "Nós precisamos da sua ajuda!"
#: i2p2www/pages/site/get-involved/index.html:5
msgid ""
-"To get involved, please feel free to join us on the #i2p-dev IRC channel (on\n"
-"irc.freenode.net, irc.oftc.net, or within I2P on irc.echelon.i2p, irc.dg.i2p or irc.postman.i2p)."
-msgstr "Para participar, por favor, sinta-se a vontade para juntar-se a nós no canal #i2p-dev de IRC (em irc.freenode.net, irc.oftc.net, ou na I2P em irc.echelon.i2p, irc.dg.i2p ou irc.postman.i2p)."
+"To get involved, please feel free to join us on the #i2p-dev IRC channel "
+"(on\n"
+"irc.freenode.net, irc.oftc.net, or within I2P on irc.echelon.i2p, "
+"irc.dg.i2p or irc.postman.i2p)."
+msgstr ""
+"Para participar, por favor, sinta-se a vontade para juntar-se a nós no "
+"canal #i2p-dev de IRC (em irc.freenode.net, irc.oftc.net, ou na I2P em "
+"irc.echelon.i2p, irc.dg.i2p ou irc.postman.i2p)."
#: i2p2www/pages/site/get-involved/index.html:9
#, python-format
msgid ""
-"If you're interested in joining our team, please get in\n"
+"If you're interested in joining our team, please"
+" get in\n"
"touch as we're always looking for eager contributors!"
-msgstr "Interessado em juntar-se a nossa equipe? Por favor, entre em\ncontato conosco! Estamos sempre em busca de contribuidores apaixonados!"
+msgstr ""
+"Interessado em juntar-se a nossa equipe? Por "
+"favor, entre em\n"
+"contato conosco! Estamos sempre em busca de contribuidores apaixonados!"
#: i2p2www/pages/site/get-involved/index.html:13
msgid ""
-"We need help in many areas, and you don't need to know Java to contribute!\n"
+"We need help in many areas, and you don't need to know Java to "
+"contribute!\n"
"Here's a list to help you get started!"
-msgstr "Nós precisamos de ajuda em diversas áreas e não é necessário conhecer Java para contribuir!\nEis aqui uma lista para auxiliar você a começar!"
+msgstr ""
+"Nós precisamos de ajuda em diversas áreas e não é necessário conhecer "
+"Java para contribuir!\n"
+"Eis aqui uma lista para auxiliar você a começar!"
#: i2p2www/pages/site/get-involved/index.html:18
msgid "Spread the Word!"
@@ -198,7 +264,10 @@ msgid ""
"Tell people about I2P on forums, blogs, and comments to articles.\n"
"Fix up the Wikipedia article about I2P in your language.\n"
"Tell your friends."
-msgstr "Divulgue a I2P em fóruns, blogs etc. Teça comentários.\nCorrija e desenvolva o artigo da Wikipédia sobre a I2P.\nComente com os seus amigos."
+msgstr ""
+"Divulgue a I2P em fóruns, blogs etc. Teça comentários.\n"
+"Corrija e desenvolva o artigo da Wikipédia sobre a I2P.\n"
+"Comente com os seus amigos."
#: i2p2www/pages/site/get-involved/index.html:24
msgid "Testing"
@@ -209,7 +278,10 @@ msgstr "Teste!"
msgid ""
"Run the latest builds from monotone\n"
"and report results on #i2p or as bugs on Trac."
-msgstr "Rode as últimas compilações do Monotone e reporte os resultados em #i2p ou as falhas no Trac."
+msgstr ""
+"Rode as últimas compilações do Monotone e "
+"reporte os resultados em #i2p ou as falhas no Trac."
#: i2p2www/pages/site/get-involved/index.html:30
msgid "Documentation"
@@ -219,7 +291,10 @@ msgstr "Documentação"
msgid ""
"Help fix the parts of the website that are outdated or incomplete.\n"
"Translate pages into other languages."
-msgstr "Ajude corrigindo páginas do site que estão desatualizadas ou incompletas.\nTraduza as páginas para outros idiomas."
+msgstr ""
+"Ajude corrigindo páginas do site que estão desatualizadas ou incompletas."
+"\n"
+"Traduza as páginas para outros idiomas."
#: i2p2www/pages/site/get-involved/index.html:35
msgid "Pictures"
@@ -227,7 +302,9 @@ msgstr "Figuras"
#: i2p2www/pages/site/get-involved/index.html:36
msgid "Make some more pictures, fix the old ones on the website"
-msgstr "Contribua com o website, criando mais algumas figuras ou melhorando as antigas"
+msgstr ""
+"Contribua com o website, criando mais algumas figuras ou melhorando as "
+"antigas"
#: i2p2www/pages/site/get-involved/index.html:39
msgid "Content"
@@ -246,7 +323,10 @@ msgid ""
"Run a service on an eepsite. It could be a proxy, a forum, a tracker,\n"
"a naming service, a search engine, an eepsite monitor... many of these\n"
"aren't that hard."
-msgstr "Disponibilize um serviço em um eepsite. Pode ser um proxy, um fórum, um rastreador, um serviço de nomes, um buscador, um monitor de eepsites... muitos desses não são difíceis de fazer."
+msgstr ""
+"Disponibilize um serviço em um eepsite. Pode ser um proxy, um fórum, um "
+"rastreador, um serviço de nomes, um buscador, um monitor de eepsites... "
+"muitos desses não são difíceis de fazer."
#: i2p2www/pages/site/get-involved/index.html:49
msgid "Applications"
@@ -257,7 +337,9 @@ msgstr "Aplicativos"
msgid ""
"Write or port applications for I2P! There's some guidelines and\n"
"a list of ideas on the applications page."
-msgstr "Escreva ou adapte aplicativos para a I2P! Há algumas diretrizes e\numa lista de ideias na página de aplicativos."
+msgstr ""
+"Escreva ou adapte aplicativos para a I2P! Há algumas diretrizes e\n"
+"uma lista de ideias na página de aplicativos."
#: i2p2www/pages/site/get-involved/index.html:54
msgid "Coding"
@@ -282,7 +364,10 @@ msgstr "Tradução"
msgid ""
"Help translate the website and the software into your language.\n"
"See the new translator's guide for details."
-msgstr "Ajude-nos a traduzir o website e o software para o seu idioma.\nVeja o guia para novos tradutores para detalhes."
+msgstr ""
+"Ajude-nos a traduzir o website e o software para o seu idioma.\n"
+"Veja o guia para novos tradutores para "
+"detalhes."
#: i2p2www/pages/site/get-involved/index.html:69
msgid "Analysis"
@@ -296,7 +381,12 @@ msgid ""
"threat models,\n"
"and DOS and other weaknesses due to securities holes,\n"
"need researching."
-msgstr "Estude ou teste o código, caçando vulnerabilidades.\nTanto as vulnerabilidades de anonimato nos vários\nmodelos de risco,\ncomo os Ataques de Negação de Serviço e outras fraquezas\ncom respeito a falhas de segurança, necessitam de pesquisa."
+msgstr ""
+"Estude ou teste o código, caçando vulnerabilidades.\n"
+"Tanto as vulnerabilidades de anonimato nos vários\n"
+"modelos de risco,\n"
+"como os Ataques de Negação de Serviço e outras fraquezas\n"
+"com respeito a falhas de segurança, necessitam de pesquisa."
#: i2p2www/pages/site/get-involved/roadmap.html:2
msgid "Roadmap"
@@ -337,9 +427,11 @@ msgstr "Completa revisão dos problemas de anonimato e outras vulnerabilidades"
#: i2p2www/pages/site/get-involved/roadmap.html:22
msgid ""
-"Reduce memory usage, remove debugging overhead, make it run better on slow "
-"and embedded machines"
-msgstr "Reduzir o uso de memória, remover a sobrecarga de depuração, melhorar a execução em sistemas lentos e embarcados"
+"Reduce memory usage, remove debugging overhead, make it run better on "
+"slow and embedded machines"
+msgstr ""
+"Reduzir o uso de memória, remover a sobrecarga de depuração, melhorar a "
+"execução em sistemas lentos e embarcados"
#: i2p2www/pages/site/get-involved/roadmap.html:25
msgid "Docs"
@@ -362,7 +454,9 @@ msgstr "Tempo de retardo de mensagens definido pelo usuário"
msgid ""
"Please see the TODO list for more detailed info "
"about some of these tasks."
-msgstr "Por favor, dê uma olhada na lista POR FAZER para informações mais detalhadas sobre essas tarefas."
+msgstr ""
+"Por favor, dê uma olhada na lista POR FAZER para"
+" informações mais detalhadas sobre essas tarefas."
#: i2p2www/pages/site/get-involved/todo.html:2
msgid "I2P Project Targets"
@@ -371,13 +465,20 @@ msgstr ""
#: i2p2www/pages/site/get-involved/todo.html:4
#, python-format
msgid ""
-"Below is a more detailed (yet still incomplete) discussion of the major areas\n"
-"of future development on the core I2P network, spanning the plausibly planned\n"
-"releases. This does not include stego transports, porting to wireless devices,\n"
-"or tools to secure the local machine, nor does it include client applications\n"
-"that will be essential in I2P's success. There are probably other things that\n"
-"will come up, especially as I2P gets more peer review, but these are the main\n"
-"'big things'. See also the roadmap. Want to help?\n"
+"Below is a more detailed (yet still incomplete) discussion of the major "
+"areas\n"
+"of future development on the core I2P network, spanning the plausibly "
+"planned\n"
+"releases. This does not include stego transports, porting to wireless "
+"devices,\n"
+"or tools to secure the local machine, nor does it include client "
+"applications\n"
+"that will be essential in I2P's success. There are probably other things "
+"that\n"
+"will come up, especially as I2P gets more peer review, but these are the "
+"main\n"
+"'big things'. See also the roadmap. Want to "
+"help?\n"
"Get involved!"
msgstr ""
@@ -429,49 +530,65 @@ msgstr "Desempenho"
#: i2p2www/pages/site/get-involved/todo.html:44
msgid ""
-"Within the current network database and profile management implementation, \n"
+"Within the current network database and profile management "
+"implementation, \n"
"we have taken the liberty of some practical shortcuts. For instance, we \n"
"don't have the code to drop peer references from the K-buckets, as we \n"
"don't have enough peers to even plausibly fill any of them, so instead, \n"
-"we just keep the peers in whatever bucket is appropriate. Another example \n"
-"deals with the peer profiles - the memory required to maintain each peer's \n"
-"profile is small enough that we can keep thousands of full blown profiles \n"
+"we just keep the peers in whatever bucket is appropriate. Another example"
+" \n"
+"deals with the peer profiles - the memory required to maintain each "
+"peer's \n"
+"profile is small enough that we can keep thousands of full blown profiles"
+" \n"
"in memory without problems. While we have the capacity to use trimmed \n"
"down profiles (which we can maintain 100s of thousands in memory), we \n"
-"don't have any code to deal with moving a profile from a \"minimal profile\" \n"
-"to a \"full profile\", a \"full profile\" to a \"minimal profile\", or to simply \n"
+"don't have any code to deal with moving a profile from a \"minimal "
+"profile\" \n"
+"to a \"full profile\", a \"full profile\" to a \"minimal profile\", or to"
+" simply \n"
"eject a profile altogether. It just wouldn't be practical to write that \n"
"code yet, since we aren't going to need it for a while."
msgstr ""
#: i2p2www/pages/site/get-involved/todo.html:59
msgid ""
-"That said, as the network grows we are going to want to keep these considerations \n"
+"That said, as the network grows we are going to want to keep these "
+"considerations \n"
"in mind. We will have some work to do, but we can put it off for later."
msgstr ""
#: i2p2www/pages/site/get-involved/todo.html:71
msgid ""
-"The restricted route functionality described before was simply a functional \n"
+"The restricted route functionality described before was simply a "
+"functional \n"
"issue - how to let peers who would not otherwise be able to communicate \n"
-"do so. However, the concept of allowing restricted routes includes additional \n"
-"capabilities. For instance, if a router absolutely cannot risk communicating \n"
-"directly with any untrusted peers, they can set up trusted links through \n"
+"do so. However, the concept of allowing restricted routes includes "
+"additional \n"
+"capabilities. For instance, if a router absolutely cannot risk "
+"communicating \n"
+"directly with any untrusted peers, they can set up trusted links through"
+" \n"
"those peers, using them to both send and receive all of its messages. \n"
"Those hidden peers who want to be completely isolated would also refuse \n"
"to connect to peers who attempt to get them to (as demonstrated by the \n"
-"garlic routing technique outlined before) - they can simply take the garlic \n"
+"garlic routing technique outlined before) - they can simply take the "
+"garlic \n"
"clove that has a request for delivery to a particular peer and tunnel \n"
-"route that message out one of the hidden peer's trusted links with instructions \n"
+"route that message out one of the hidden peer's trusted links with "
+"instructions \n"
"to forward it as requested."
msgstr ""
#: i2p2www/pages/site/get-involved/todo.html:90
#, python-format
msgid ""
-"Within the network, we will want some way to deter people from consuming \n"
-"too many resources or from creating so many peers to mount a Sybil \n"
-"attack. Traditional techniques such as having a peer see who is requesting \n"
+"Within the network, we will want some way to deter people from consuming"
+" \n"
+"too many resources or from creating so many peers to mount a Sybil \n"
+"attack. Traditional techniques such as having a peer see who is "
+"requesting \n"
"a resource or running a peer aren't appropriate for use within I2P, as \n"
"doing so would compromise the anonymity of the system. Instead, we want \n"
"to make certain requests \"expensive\"."
@@ -480,12 +597,17 @@ msgstr ""
#: i2p2www/pages/site/get-involved/todo.html:98
msgid ""
"Hashcash is one technique that \n"
-"we can use to anonymously increase the \"cost\" of doing certain activities, \n"
-"such as creating a new router identity (done only once on installation), \n"
+"we can use to anonymously increase the \"cost\" of doing certain "
+"activities, \n"
+"such as creating a new router identity (done only once on installation),"
+" \n"
"creating a new destination (done only once when creating a service), or \n"
-"requesting that a peer participate in a tunnel (done often, perhaps 2-300 \n"
-"times per hour). We don't know the \"correct\" cost of each type of certificate \n"
-"yet, but with some research and experimentation, we could set a base level \n"
+"requesting that a peer participate in a tunnel (done often, perhaps 2-300"
+" \n"
+"times per hour). We don't know the \"correct\" cost of each type of "
+"certificate \n"
+"yet, but with some research and experimentation, we could set a base "
+"level \n"
"that is sufficiently expensive while not an excessive burden for people \n"
"with few resources."
msgstr ""
@@ -493,23 +615,29 @@ msgstr ""
#: i2p2www/pages/site/get-involved/todo.html:109
msgid ""
"There are a few other algorithms that we can explore for making those \n"
-"requests for resources \"nonfree\", and further research on that front is \n"
+"requests for resources \"nonfree\", and further research on that front is"
+" \n"
"appropriate."
msgstr ""
#: i2p2www/pages/site/get-involved/todo.html:119
#, python-format
msgid ""
-"To powerful passive external observers as well as large colluding internal \n"
-"observers, standard tunnel routing is vulnerable to traffic analysis attacks \n"
-"- simply watching the size and frequency of messages being passed between \n"
+"To powerful passive external observers as well as large colluding "
+"internal \n"
+"observers, standard tunnel routing is vulnerable to traffic analysis "
+"attacks \n"
+"- simply watching the size and frequency of messages being passed between"
+" \n"
"routers. To defend against these, we will want to essentially turn some \n"
"of the tunnels into its own mix cascade - delaying messages received at \n"
"the gateway and passing them in batches, reordering them as necessary, \n"
-"and injecting dummy messages (indistinguishable from other \"real\" tunnel \n"
+"and injecting dummy messages (indistinguishable from other \"real\" "
+"tunnel \n"
"messages by peers in the path). There has been a significant amount of \n"
"research \n"
-"on these algorithms that we can lean on prior to implementing the various \n"
+"on these algorithms that we can lean on prior to implementing the various"
+" \n"
"tunnel mixing strategies."
msgstr ""
@@ -517,33 +645,42 @@ msgstr ""
msgid ""
"In addition to the anonymity aspects of more varied tunnel operation, \n"
"there is a functional dimension as well. Each peer only has a certain \n"
-"amount of data they can route for the network, and to keep any particular \n"
+"amount of data they can route for the network, and to keep any particular"
+" \n"
"tunnel from consuming an unreasonable portion of that bandwidth, they \n"
-"will want to include some throttles on the tunnel. For instance, a tunnel \n"
+"will want to include some throttles on the tunnel. For instance, a tunnel"
+" \n"
"may be configured to throttle itself after passing 600 messages (1 per \n"
"second), 2.4MB (4KBps), or exceeding some moving average (8KBps for the \n"
"last minute). Excess messages may be delayed or summarily dropped. With \n"
-"this sort of throttling, peers can provide ATM-like QoS support for their \n"
+"this sort of throttling, peers can provide ATM-like QoS support for their"
+" \n"
"tunnels, refusing to agree to allocate more bandwidth than the peer has \n"
"available."
msgstr ""
#: i2p2www/pages/site/get-involved/todo.html:145
msgid ""
-"In addition, we may want to implement code to dynamically reroute tunnels \n"
+"In addition, we may want to implement code to dynamically reroute tunnels"
+" \n"
"to avoid failed peers or to inject additional hops into the path. This \n"
-"can be done by garlic routing a message to any particular peer in a tunnel \n"
+"can be done by garlic routing a message to any particular peer in a "
+"tunnel \n"
"with instructions to redefine the next-hop in the tunnel."
msgstr ""
#: i2p2www/pages/site/get-involved/todo.html:156
msgid ""
"Beyond the per-tunnel batching and mixing strategy, there are further \n"
-"capabilities for protecting against powerful attackers, such as allowing \n"
+"capabilities for protecting against powerful attackers, such as allowing"
+" \n"
"each step in a garlic routed path to define a delay or window in which \n"
-"it should be forwarded on. This would enable protections against the long \n"
-"term intersection attack, as a peer could send a message that looks perfectly \n"
-"standard to most peers that pass it along, except at any peers where the \n"
+"it should be forwarded on. This would enable protections against the long"
+" \n"
+"term intersection attack, as a peer could send a message that looks "
+"perfectly \n"
+"standard to most peers that pass it along, except at any peers where the"
+" \n"
"clove exposed includes delay instructions."
msgstr ""
@@ -552,7 +689,9 @@ msgstr ""
msgid ""
"Performance related improvements are listed on the\n"
"Performance page."
-msgstr "Os aperfeiçoamentos relacionados ao desempenho estão relacionados na\npágina de Desempenho."
+msgstr ""
+"Os aperfeiçoamentos relacionados ao desempenho estão relacionados na\n"
+"página de Desempenho."
#: i2p2www/pages/site/get-involved/bounties/arabic-trans.html:2
msgid "Bounty Arabic translation of webpage and router console"
@@ -587,8 +726,7 @@ msgid ""
msgstr ""
#: i2p2www/pages/site/get-involved/bounties/arabic-trans.html:25
-msgid ""
-"This job was done by hamada and the bounty of 20 BTC was paid to hamada."
+msgid "This job was done by hamada and the bounty of 20 BTC was paid to hamada."
msgstr "Este trabalho foi feito por hamada que recebeu um prêmio de 20 BTC."
#: i2p2www/pages/site/get-involved/bounties/arabic-trans.html:27
@@ -613,15 +751,18 @@ msgstr "Cliente BTC nativo para a I2P"
msgid ""
"For a future of I2P and attract more people\n"
"into I2P this bounty is to create a I2P native Bitcoin client. \n"
-"It should integrate with other client via the I2P network and via gateways to\n"
+"It should integrate with other client via the I2P network and via "
+"gateways to\n"
"the existant bitcoin network."
msgstr ""
#: i2p2www/pages/site/get-involved/bounties/btc-client.html:15
msgid ""
"Judge is psychonaut who donated the first 30 € to this bounty.\n"
-"Bounty was almost fullfilled with btci2p, only a small\n"
-"part of creating a plugin is leftover. User giv has been paid for the work."
+"Bounty was almost fullfilled with btci2p, only a small\n"
+"part of creating a plugin is leftover. User giv has been paid for the "
+"work."
msgstr ""
#: i2p2www/pages/site/get-involved/bounties/datastore.html:2
@@ -654,23 +795,28 @@ msgstr ""
#: i2p2www/pages/site/get-involved/bounties/datastore.html:21
msgid ""
"The frost for I2P datastorage bounty is paid for a frost like program \n"
-"with which files/messages are stored into database and got from database.\n"
+"with which files/messages are stored into database and got from database."
+"\n"
"It needs to work with a GUI."
msgstr ""
#: i2p2www/pages/site/get-involved/bounties/datastore.html:26
msgid ""
"The eepsite served out of I2P datastorage extends a I2P router to send\n"
-"out eepsites out of the I2P datastorage. All files for eepsites need to be\n"
+"out eepsites out of the I2P datastorage. All files for eepsites need to "
+"be\n"
"saved inside of datastorage and are taken from it.\n"
"Extension:\n"
-"For better integration all datastorage participants could serve that eepsite."
+"For better integration all datastorage participants could serve that "
+"eepsite."
msgstr ""
#: i2p2www/pages/site/get-involved/bounties/datastore.html:36
msgid ""
-"For bounties to be declared done and paid, we need the program AND the source.\n"
-"Source and code need to be licensed under a free license (free to change and \n"
+"For bounties to be declared done and paid, we need the program AND the "
+"source.\n"
+"Source and code need to be licensed under a free license (free to change "
+"and \n"
"free to distribute)."
msgstr ""
@@ -685,11 +831,13 @@ msgstr "Pacote da I2P no Ubuntu/Debian"
#: i2p2www/pages/site/get-involved/bounties/deb-pack.html:6
msgid ""
"For the future of I2P and in order to attract more people\n"
-"to I2P, this bounty was set for including an I2P package into the Ubuntu and Debian \n"
+"to I2P, this bounty was set for including an I2P package into the Ubuntu "
+"and Debian \n"
"archive mirrors.\n"
"To claim this bounty, the I2P router package needs to be available from\n"
"Ubuntu and Debian archive mirrors and Debian bug \n"
-"448638 \n"
+"448638 \n"
"needs to be closed successfully."
msgstr ""
@@ -716,22 +864,26 @@ msgstr ""
msgid ""
"While we always gratefully accept any contributions of code, \n"
"documentation, and the like, there are other ways to help I2P move \n"
-"forward. As with any open source project, our goals would be achieved more \n"
+"forward. As with any open source project, our goals would be achieved "
+"more \n"
"rapidly if we were able to support all of our contributors to work on \n"
"I2P full time. However, as with any open source project, that's not a \n"
"possibility. Instead, we are making use of a bounty system, whereby \n"
"anyone can get support for working on something that people want \n"
-"implemented, and people who want to contribute to I2P can be assured that \n"
+"implemented, and people who want to contribute to I2P can be assured that"
+" \n"
"their support goes to what they care about."
msgstr ""
#: i2p2www/pages/site/get-involved/bounties/index.html:17
msgid ""
"We are also keeping open the ability for people who want to support I2P \n"
-"but don't have strong feelings about the bounties available. Those people\n"
+"but don't have strong feelings about the bounties available. Those "
+"people\n"
"can simply put their trust in the I2P team to do what we feel is best by\n"
"donating to a catch-all general fund that will be used as deemed \n"
-"necessary - allocated to various bounties, covering incidentals (hosting, \n"
+"necessary - allocated to various bounties, covering incidentals (hosting,"
+" \n"
"etc), and the like."
msgstr ""
@@ -814,7 +966,9 @@ msgstr ""
#: i2p2www/pages/site/get-involved/bounties/index.html:67
msgid "Partly done, partly in work, partly still open"
-msgstr "Uma parte já foi feita, outra está em andamento e uma permanece ainda em aberto"
+msgstr ""
+"Uma parte já foi feita, outra está em andamento e uma permanece ainda em "
+"aberto"
#: i2p2www/pages/site/get-involved/bounties/index.html:81
msgid "Hold bounties, set on hold due to jrandom AWOL and missing funding"
@@ -871,8 +1025,10 @@ msgstr ""
#: i2p2www/pages/site/get-involved/bounties/index.html:160
msgid ""
-"Dev lists anyone who may already be working on the bounty - collaboration is\n"
-"preferred, so if you're interested in working on it, please contact one of the\n"
+"Dev lists anyone who may already be working on the bounty - collaboration"
+" is\n"
+"preferred, so if you're interested in working on it, please contact one "
+"of the\n"
"people listed!"
msgstr ""
@@ -895,8 +1051,10 @@ msgstr ""
#: i2p2www/pages/site/get-involved/bounties/ipv6.html:23
#: i2p2www/pages/site/get-involved/bounties/vuze-plugin.html:20
msgid ""
-"For bounties to be declared done and paid, we need the plugin AND the source.\n"
-"Source and code need to be licensed under a free license (free to change and \n"
+"For bounties to be declared done and paid, we need the plugin AND the "
+"source.\n"
+"Source and code need to be licensed under a free license (free to change "
+"and \n"
"free to distribute)."
msgstr ""
@@ -935,13 +1093,14 @@ msgstr ""
#: i2p2www/pages/site/get-involved/bounties/russian-trans.html:17
msgid ""
-"For collecting the bounty of $115 USD you need to translate the following "
-"pages:"
+"For collecting the bounty of $115 USD you need to translate the following"
+" pages:"
msgstr ""
#: i2p2www/pages/site/get-involved/bounties/russian-trans.html:30
msgid ""
-"Part 2 is the translation of the router console. The whole router console needs\n"
+"Part 2 is the translation of the router console. The whole router console"
+" needs\n"
"to be translated to collect the bounty of $115 USD."
msgstr ""
@@ -961,23 +1120,28 @@ msgstr ""
msgid ""
"For a future of I2P and attract more people\n"
"into I2P this bounty is to setup and host a I2P SILC server. \n"
-"This will allow people to send files over their messaging servers and have intrinsic security built into the protocol."
+"This will allow people to send files over their messaging servers and "
+"have intrinsic security built into the protocol."
msgstr ""
#: i2p2www/pages/site/get-involved/bounties/silc.html:12
msgid ""
-"A silc server needs to be set up and run for at least 3 month time to get payed. \n"
+"A silc server needs to be set up and run for at least 3 month time to get"
+" payed. \n"
"A second server should be set up, too."
msgstr ""
#: i2p2www/pages/site/get-involved/bounties/silc.html:16
msgid ""
-"Bounty was withdrawn and money donated to returningnovice and general fund."
+"Bounty was withdrawn and money donated to returningnovice and general "
+"fund."
msgstr ""
#: i2p2www/pages/site/get-involved/bounties/silc.html:22
msgid "Judge is An Anonymous Secret Society, society@mail.i2p."
-msgstr "A arbitragem está a cargo de uma Sociedade Secreta Anônima, society@mail.i2p"
+msgstr ""
+"A arbitragem está a cargo de uma Sociedade Secreta Anônima, "
+"society@mail.i2p"
#: i2p2www/pages/site/get-involved/bounties/syndie-2012.html:2
#: i2p2www/pages/site/get-involved/bounties/syndie-2012.html:3
@@ -1095,7 +1259,8 @@ msgstr "pago a str4d"
msgid ""
"To collect this bounty, the existing SDK tests must be checked \n"
"and made to work again. The need to be integrated into the ant \n"
-"build scripts (\"ant test\"), and tied in with a code coverage tool (e.g. \n"
+"build scripts (\"ant test\"), and tied in with a code coverage tool (e.g."
+" \n"
"Clover). The ant script\n"
"must be capable of generating test status results as a web page, \n"
"which will be published online."
@@ -1195,7 +1360,8 @@ msgid ""
"The plugin needs to be official and submitted to vuze for publication\n"
"on their webpage/repository for plugins.\n"
"It should be easy to install and configured, work smooth and flawless.\n"
-"Configuration should be friendly to starters and made easy to be anonymous.\n"
+"Configuration should be friendly to starters and made easy to be "
+"anonymous.\n"
"It should work with *.b32.i2p destinations as with signed (516++ bits) \n"
"destinations."
msgstr ""
@@ -1241,52 +1407,72 @@ msgstr "Comece a desenvolver - um guia simples"
msgid ""
"There are multiple ways to use applications in I2P.\n"
"Using I2PTunnel,\n"
-"you can use regular applications without needing to program explicit I2P support.\n"
+"you can use regular applications without needing to program explicit I2P "
+"support.\n"
"This is very effective for client-server scenario's,\n"
"where you need to connect to a single website.\n"
-"You can simply create a tunnel using I2PTunnel to connect to that website, as shown in Figure 1."
+"You can simply create a tunnel using I2PTunnel to connect to that "
+"website, as shown in Figure 1."
msgstr ""
#: i2p2www/pages/site/get-involved/develop/applications.html:26
msgid ""
-"If your application is distributed, it will require connections to a large amount of peers.\n"
-"Using I2PTunnel, you will need to create a new tunnel for each peer you want to contact,\n"
+"If your application is distributed, it will require connections to a "
+"large amount of peers.\n"
+"Using I2PTunnel, you will need to create a new tunnel for each peer you "
+"want to contact,\n"
"as shown in Figure 2.\n"
-"This process can of course be automated, but running a lot of I2PTunnel instances creates a large amount of overhead.\n"
+"This process can of course be automated, but running a lot of I2PTunnel "
+"instances creates a large amount of overhead.\n"
"In addition, with many protocols you will need to force everyone to \n"
-"use the same set of ports for all peers - e.g. if you want to reliably run DCC \n"
-"chat, everyone needs to agree that port 10001 is Alice, port 10002 is Bob, port \n"
-"10003 is Charlie, and so on, since the protocol includes TCP/IP specific information\n"
+"use the same set of ports for all peers - e.g. if you want to reliably "
+"run DCC \n"
+"chat, everyone needs to agree that port 10001 is Alice, port 10002 is "
+"Bob, port \n"
+"10003 is Charlie, and so on, since the protocol includes TCP/IP specific "
+"information\n"
"(host and port)."
msgstr ""
#: i2p2www/pages/site/get-involved/develop/applications.html:37
msgid ""
-"General network applications often send a lot of additional data that could be used to identify users.\n"
-"Hostnames, port numbers, time zones, character sets, etc. are often sent without informing the user.\n"
-"As such, designing the network protocol specifically with anonymity in mind\n"
+"General network applications often send a lot of additional data that "
+"could be used to identify users.\n"
+"Hostnames, port numbers, time zones, character sets, etc. are often sent "
+"without informing the user.\n"
+"As such, designing the network protocol specifically with anonymity in "
+"mind\n"
"can avoid compromising user identities."
msgstr ""
#: i2p2www/pages/site/get-involved/develop/applications.html:43
msgid ""
-"There are also efficiency considerations to review when determining how to \n"
-"interact on top of I2P. The streaming library and things built on top of it\n"
-"operate with handshakes similar to TCP, while the core I2P protocols (I2NP and I2CP)\n"
-"are strictly message based (like UDP or in some instances raw IP). The important\n"
-"distinction is that with I2P, communication is operating over a long fat network - \n"
-"each end to end message will have nontrivial latencies, but may contain payloads \n"
-"of up to several KB. An application that needs a simple request and response can get rid\n"
-"of any state and drop the latency incurred by the startup and teardown handshakes\n"
-"by using (best effort) datagrams without having to worry about MTU detection or \n"
+"There are also efficiency considerations to review when determining how "
+"to \n"
+"interact on top of I2P. The streaming library and things built on top of"
+" it\n"
+"operate with handshakes similar to TCP, while the core I2P protocols "
+"(I2NP and I2CP)\n"
+"are strictly message based (like UDP or in some instances raw IP). The "
+"important\n"
+"distinction is that with I2P, communication is operating over a long fat "
+"network - \n"
+"each end to end message will have nontrivial latencies, but may contain "
+"payloads \n"
+"of up to several KB. An application that needs a simple request and "
+"response can get rid\n"
+"of any state and drop the latency incurred by the startup and teardown "
+"handshakes\n"
+"by using (best effort) datagrams without having to worry about MTU "
+"detection or \n"
"fragmentation of messages."
msgstr ""
#: i2p2www/pages/site/get-involved/develop/applications.html:57
#: i2p2www/pages/site/get-involved/develop/applications.html:59
msgid ""
-"Creating a server-client connection using I2PTunnel only requires creating a"
-" single tunnel."
+"Creating a server-client connection using I2PTunnel only requires "
+"creating a single tunnel."
msgstr ""
#: i2p2www/pages/site/get-involved/develop/applications.html:59
@@ -1296,8 +1482,8 @@ msgstr "Figura 1:"
#: i2p2www/pages/site/get-involved/develop/applications.html:64
#: i2p2www/pages/site/get-involved/develop/applications.html:66
msgid ""
-"Setting up connections for a peer-to-peer applications requires a very large"
-" amount of tunnels."
+"Setting up connections for a peer-to-peer applications requires a very "
+"large amount of tunnels."
msgstr ""
#: i2p2www/pages/site/get-involved/develop/applications.html:66
@@ -1310,27 +1496,33 @@ msgstr "Em suma, há inúmeros motivos para escrever código específico para a
#: i2p2www/pages/site/get-involved/develop/applications.html:74
msgid ""
-"Creating a large amount of I2PTunnel instances consumes a non-trivial amount of resources,\n"
-"which is problematic for distributed applications (a new tunnel is required for each peer)."
+"Creating a large amount of I2PTunnel instances consumes a non-trivial "
+"amount of resources,\n"
+"which is problematic for distributed applications (a new tunnel is "
+"required for each peer)."
msgstr ""
#: i2p2www/pages/site/get-involved/develop/applications.html:78
msgid ""
-"General network protocols often send a lot of additional data that can be used to identify users.\n"
-"Programming specifically for I2P allows the creation of a network protocol\n"
+"General network protocols often send a lot of additional data that can be"
+" used to identify users.\n"
+"Programming specifically for I2P allows the creation of a network "
+"protocol\n"
"that does not leak such information, keeping users anonymous and secure."
msgstr ""
#: i2p2www/pages/site/get-involved/develop/applications.html:83
msgid ""
-"Network protocols designed for use on the regular internet can be inefficient\n"
+"Network protocols designed for use on the regular internet can be "
+"inefficient\n"
"on I2P, which is a network with a much higher latency."
msgstr ""
#: i2p2www/pages/site/get-involved/develop/applications.html:90
#, python-format
msgid ""
-"I2P supports a standard plugins interface for developers\n"
+"I2P supports a standard plugins interface for"
+" developers\n"
"so that applications may be easily integrated and distributed."
msgstr ""
@@ -1351,57 +1543,76 @@ msgstr "Destino ~= host+porta"
#: i2p2www/pages/site/get-involved/develop/applications.html:110
msgid ""
-"An application running on I2P sends messages from and receives messages to a\n"
-"unique cryptographically secure end point - a \"destination\". In TCP or UDP\n"
-"terms, a destination could (largely) be considered the equivalent of a hostname\n"
+"An application running on I2P sends messages from and receives messages "
+"to a\n"
+"unique cryptographically secure end point - a \"destination\". In TCP or"
+" UDP\n"
+"terms, a destination could (largely) be considered the equivalent of a "
+"hostname\n"
"plus port number pair, though there are a few differences."
msgstr ""
#: i2p2www/pages/site/get-involved/develop/applications.html:118
msgid ""
-"An I2P destination itself is a cryptographic construct - all data sent to one is \n"
-"encrypted as if there were universal deployment of IPsec with the (anonymized)\n"
-"location of the end point signed as if there were universal deployment of DNSSEC."
+"An I2P destination itself is a cryptographic construct - all data sent to"
+" one is \n"
+"encrypted as if there were universal deployment of IPsec with the "
+"(anonymized)\n"
+"location of the end point signed as if there were universal deployment of"
+" DNSSEC."
msgstr ""
#: i2p2www/pages/site/get-involved/develop/applications.html:123
msgid ""
-"I2P destinations are mobile identifiers - they can be moved from one I2P router\n"
-"to another (or it can even \"multihome\" - operate on multiple routers at\n"
-"once). This is quite different from the TCP or UDP world where a single end point (port)\n"
+"I2P destinations are mobile identifiers - they can be moved from one I2P "
+"router\n"
+"to another (or it can even \"multihome\" - operate on multiple routers at"
+"\n"
+"once). This is quite different from the TCP or UDP world where a single "
+"end point (port)\n"
"must stay on a single host."
msgstr ""
#: i2p2www/pages/site/get-involved/develop/applications.html:130
msgid ""
-"I2P destinations are ugly and large - behind the scenes, they contain a 2048 bit ElGamal\n"
-"public key for encryption, a 1024 bit DSA public key for signing, and a variable size \n"
+"I2P destinations are ugly and large - behind the scenes, they contain a "
+"2048 bit ElGamal\n"
+"public key for encryption, a 1024 bit DSA public key for signing, and a "
+"variable size \n"
"certificate, which may contain proof of work or blinded data."
msgstr ""
#: i2p2www/pages/site/get-involved/develop/applications.html:135
#, python-format
msgid ""
-"There are existing ways to refer to these large and ugly destinations by short\n"
-"and pretty names (e.g. \"irc.duck.i2p\"), but those techniques do not guarantee\n"
-"globally uniqueness (since they're stored locally in a database on each person's machine)\n"
-"and the current mechanism is not especially scalable nor secure (updates to the host list are\n"
+"There are existing ways to refer to these large and ugly destinations by "
+"short\n"
+"and pretty names (e.g. \"irc.duck.i2p\"), but those techniques do not "
+"guarantee\n"
+"globally uniqueness (since they're stored locally in a database on each "
+"person's machine)\n"
+"and the current mechanism is not especially scalable nor secure (updates "
+"to the host list are\n"
"managed using \"subscriptions\" to naming services).\n"
"There may be some secure, human readable, scalable, and globally \n"
-"unique, naming system some day, but applications shouldn't depend upon it being in place,\n"
+"unique, naming system some day, but applications shouldn't depend upon it"
+" being in place,\n"
"since there are those who don't think such a beast is possible.\n"
-"Further information on the naming system is available."
+"Further information on the naming system is "
+"available."
msgstr ""
#: i2p2www/pages/site/get-involved/develop/applications.html:149
#, python-format
msgid ""
"While most applications do not need to distinguish protocols and ports,\n"
-"I2P does support them. Complex applications may specify a protocol,\n"
+"I2P does support them. Complex applications may specify a "
+"protocol,\n"
"from port, and to port, on a per-message basis, to multiplex traffic on\n"
"a single destination.\n"
"See the datagram page for details.\n"
-"Simple applications operate by listening for \"all protocols\" on \"all ports\" of a destination."
+"Simple applications operate by listening for \"all protocols\" on \"all "
+"ports\" of a destination."
msgstr ""
#: i2p2www/pages/site/get-involved/develop/applications.html:158
@@ -1411,18 +1622,25 @@ msgstr "Anonimato e confidencialidade"
#: i2p2www/pages/site/get-involved/develop/applications.html:160
msgid ""
"I2P has transparent end to end encryption\n"
-"and authentication for all data passed over the network - if Bob sends to Alice's destination,\n"
-"only Alice's destination can receive it, and if Bob is using the datagrams or streaming \n"
-"library, Alice knows for certain that Bob's destination is the one who sent the data."
+"and authentication for all data passed over the network - if Bob sends to"
+" Alice's destination,\n"
+"only Alice's destination can receive it, and if Bob is using the "
+"datagrams or streaming \n"
+"library, Alice knows for certain that Bob's destination is the one who "
+"sent the data."
msgstr ""
#: i2p2www/pages/site/get-involved/develop/applications.html:167
msgid ""
"Of course, I2P transparently anonymizes the\n"
-"data sent between Alice and Bob, but it does nothing to anonymize the content of what they\n"
-"send. For instance, if Alice sends Bob a form with her full name, government IDs, and \n"
-"credit card numbers, there is nothing I2P can do. As such, protocols and applications should \n"
-"keep in mind what information they are trying to protect and what information they are willing\n"
+"data sent between Alice and Bob, but it does nothing to anonymize the "
+"content of what they\n"
+"send. For instance, if Alice sends Bob a form with her full name, "
+"government IDs, and \n"
+"credit card numbers, there is nothing I2P can do. As such, protocols and"
+" applications should \n"
+"keep in mind what information they are trying to protect and what "
+"information they are willing\n"
"to expose."
msgstr ""
@@ -1433,21 +1651,29 @@ msgstr ""
#: i2p2www/pages/site/get-involved/develop/applications.html:178
#, python-format
msgid ""
-"Applications that use I2P datagrams (either raw or repliable ones) can essentially be thought\n"
-"of in terms of UDP - the datagrams are unordered, best effort, and connectionless - but unlike\n"
-"UDP, applications don't need to worry about MTU detection and can simply fire off large datagrams.\n"
-"While the upper limit is nominally 32 KB, the message is fragmented for transport, thus dropping\n"
-"the reliability of the whole. Datagrams over about 10 KB are not currently recommended.\n"
+"Applications that use I2P datagrams (either raw or repliable ones) can "
+"essentially be thought\n"
+"of in terms of UDP - the datagrams are unordered, best effort, and "
+"connectionless - but unlike\n"
+"UDP, applications don't need to worry about MTU detection and can simply "
+"fire off large datagrams.\n"
+"While the upper limit is nominally 32 KB, the message is fragmented for "
+"transport, thus dropping\n"
+"the reliability of the whole. Datagrams over about 10 KB are not "
+"currently recommended.\n"
"See the datagram page for details.\n"
"For many applications, 10 KB of data is sufficient for an\n"
-"entire request or response, allowing them to transparently operate in I2P as a UDP-like \n"
+"entire request or response, allowing them to transparently operate in I2P"
+" as a UDP-like \n"
"application without having to write fragmentation, resends, etc."
msgstr ""
#: i2p2www/pages/site/get-involved/develop/applications.html:192
msgid ""
-"There are several means of sending data over I2P, each with their own pros and cons.\n"
-"The streaming lib is the recommended interface, used by the majority of I2P applications."
+"There are several means of sending data over I2P, each with their own "
+"pros and cons.\n"
+"The streaming lib is the recommended interface, used by the majority of "
+"I2P applications."
msgstr ""
#: i2p2www/pages/site/get-involved/develop/applications.html:197
@@ -1457,8 +1683,10 @@ msgstr "Biblioteca de streaming"
#: i2p2www/pages/site/get-involved/develop/applications.html:198
#, python-format
msgid ""
-"The full streaming library is now the standard\n"
-"interface. It allows programming using TCP-like sockets, as explained in the Streaming development guide."
+"The full streaming library is now the "
+"standard\n"
+"interface. It allows programming using TCP-like sockets, as explained in "
+"the Streaming development guide."
msgstr ""
#: i2p2www/pages/site/get-involved/develop/applications.html:204
@@ -1466,10 +1694,13 @@ msgstr ""
msgid ""
"BOB is the Basic Open Bridge,\n"
"allowing an application in any language to make streaming connections \n"
-"to and from I2P. At this point in time it lacks UDP support, but UDP support\n"
+"to and from I2P. At this point in time it lacks UDP support, but UDP "
+"support\n"
"is planned in the near future. BOB also contains several tools, such as \n"
-"destination key generation, and verification that an address conforms to \n"
-"I2P specifications. Up to date info and applications that use BOB can be \n"
+"destination key generation, and verification that an address conforms to"
+" \n"
+"I2P specifications. Up to date info and applications that use BOB can be"
+" \n"
"found at this eepsite."
msgstr ""
@@ -1480,36 +1711,43 @@ msgstr ""
#: i2p2www/pages/site/get-involved/develop/applications.html:218
#, python-format
msgid ""
-"SAM is the Simple Anonymous Messaging protocol, allowing an\n"
-"application written in any language to talk to a SAM bridge through a plain TCP socket and have\n"
-"that bridge multiplex all of its I2P traffic, transparently coordinating the encryption/decryption\n"
+"SAM is the Simple Anonymous Messaging protocol, "
+"allowing an\n"
+"application written in any language to talk to a SAM bridge through a "
+"plain TCP socket and have\n"
+"that bridge multiplex all of its I2P traffic, transparently coordinating "
+"the encryption/decryption\n"
"and event based handling. SAM supports three styles of operation:"
msgstr ""
#: i2p2www/pages/site/get-involved/develop/applications.html:225
msgid ""
-"streams, for when Alice and Bob want to send data to each other reliably and"
-" in order"
+"streams, for when Alice and Bob want to send data to each other reliably "
+"and in order"
msgstr ""
#: i2p2www/pages/site/get-involved/develop/applications.html:228
msgid ""
-"repliable datagrams, for when Alice wants to send Bob a message that Bob can"
-" reply to"
+"repliable datagrams, for when Alice wants to send Bob a message that Bob "
+"can reply to"
msgstr ""
#: i2p2www/pages/site/get-involved/develop/applications.html:231
msgid ""
-"raw datagrams, for when Alice wants to squeeze the most bandwidth and performance as possible,\n"
-"and Bob doesn't care whether the data's sender is authenticated or not (e.g. the data transferred\n"
+"raw datagrams, for when Alice wants to squeeze the most bandwidth and "
+"performance as possible,\n"
+"and Bob doesn't care whether the data's sender is authenticated or not "
+"(e.g. the data transferred\n"
"is self authenticating)"
msgstr ""
#: i2p2www/pages/site/get-involved/develop/applications.html:237
msgid ""
"SAM V3 aims at the same goal as SAM and SAM V2, but does not require\n"
-"multiplexing/demultiplexing. Each I2P stream is handled by its own socket between the application\n"
-"and the SAM bridge. Besides, datagrams can be sent and received by the application through datagram\n"
+"multiplexing/demultiplexing. Each I2P stream is handled by its own socket"
+" between the application\n"
+"and the SAM bridge. Besides, datagrams can be sent and received by the "
+"application through datagram\n"
"communications with the SAM bridge."
msgstr ""
@@ -1524,20 +1762,28 @@ msgstr ""
#: i2p2www/pages/site/get-involved/develop/applications.html:252
msgid ""
-"The I2PTunnel application allows applications to build specific TCP-like tunnels to peers \n"
-"by creating either I2PTunnel 'client' applications (which listen on a specific port and connect\n"
-"to a specific I2P destination whenever a socket to that port is opened) or I2PTunnel 'server'\n"
-"applications (which listen to a specific I2P destination and whenever it gets a new I2P \n"
-"connection it outproxies to a specific TCP host/port). These streams are 8-bit clean, and are\n"
-"authenticated and secured through the same streaming library that SAM uses, but there is a \n"
-"nontrivial overhead involved with creating multiple unique I2PTunnel instances, since each have\n"
+"The I2PTunnel application allows applications to build specific TCP-like "
+"tunnels to peers \n"
+"by creating either I2PTunnel 'client' applications (which listen on a "
+"specific port and connect\n"
+"to a specific I2P destination whenever a socket to that port is opened) "
+"or I2PTunnel 'server'\n"
+"applications (which listen to a specific I2P destination and whenever it "
+"gets a new I2P \n"
+"connection it outproxies to a specific TCP host/port). These streams are"
+" 8-bit clean, and are\n"
+"authenticated and secured through the same streaming library that SAM "
+"uses, but there is a \n"
+"nontrivial overhead involved with creating multiple unique I2PTunnel "
+"instances, since each have\n"
"their own unique I2P destination and their own set of tunnels, keys, etc."
msgstr ""
#: i2p2www/pages/site/get-involved/develop/applications.html:264
msgid ""
"I2P supports a SOCKS V4 and V5 proxy.\n"
-"Outbound connections work well. Inbound (server) and UDP functionality may be incomplete\n"
+"Outbound connections work well. Inbound (server) and UDP functionality "
+"may be incomplete\n"
"and untested."
msgstr ""
@@ -1548,7 +1794,8 @@ msgstr "Removido"
#: i2p2www/pages/site/get-involved/develop/applications.html:272
msgid ""
"There used to be a simple \"ministreaming\" library,\n"
-"but now ministreaming.jar contains only the interfaces for the full streaming library."
+"but now ministreaming.jar contains only the interfaces for the full "
+"streaming library."
msgstr ""
#: i2p2www/pages/site/get-involved/develop/applications.html:277
@@ -1562,7 +1809,8 @@ msgstr "Recomendado para aplicativos do tipo UDP"
#: i2p2www/pages/site/get-involved/develop/applications.html:279
#, python-format
msgid ""
-"The Datagram library allows sending UDP-like packets.\n"
+"The Datagram library allows sending UDP-"
+"like packets.\n"
"It's possible to use:"
msgstr ""
@@ -1581,10 +1829,14 @@ msgstr "Não recomendado"
#: i2p2www/pages/site/get-involved/develop/applications.html:290
#, python-format
msgid ""
-"I2CP itself is a language independent protocol, but to implement an I2CP library \n"
-"in something other than Java there is a significant amount of code to be written (encryption routines, \n"
-"object marshalling, asynchronous message handling, etc). While someone could write an I2CP library in \n"
-"C or something else, it would most likely be more useful to use the C SAM library instead."
+"I2CP itself is a language independent protocol, "
+"but to implement an I2CP library \n"
+"in something other than Java there is a significant amount of code to be "
+"written (encryption routines, \n"
+"object marshalling, asynchronous message handling, etc). While someone "
+"could write an I2CP library in \n"
+"C or something else, it would most likely be more useful to use the C SAM"
+" library instead."
msgstr ""
#: i2p2www/pages/site/get-involved/develop/applications.html:297
@@ -1593,14 +1845,17 @@ msgstr "Aplicações para a Web"
#: i2p2www/pages/site/get-involved/develop/applications.html:298
msgid ""
-"I2P comes with the Jetty webserver, and configuring to use the Apache server instead is straightforward.\n"
+"I2P comes with the Jetty webserver, and configuring to use the Apache "
+"server instead is straightforward.\n"
"Any standard web app technology should work."
msgstr ""
#: i2p2www/pages/site/get-involved/develop/applications.html:304
msgid ""
-"Developing using I2P requires a working I2P installation and a development environment of your own choice.\n"
-"If you are using Java, you can start development with the streaming library or datagram library.\n"
+"Developing using I2P requires a working I2P installation and a "
+"development environment of your own choice.\n"
+"If you are using Java, you can start development with the streaming library or datagram library.\n"
"Using another programming language, SAM or BOB can be used."
msgstr ""
@@ -1610,7 +1865,8 @@ msgstr "Desenvolvendo com a biblioteca de streamings"
#: i2p2www/pages/site/get-involved/develop/applications.html:312
msgid ""
-"The following example shows how to create TCP-like client and server applications\n"
+"The following example shows how to create TCP-like client and server "
+"applications\n"
"using the streaming library."
msgstr ""
@@ -1633,18 +1889,24 @@ msgstr "Classes padrões da I2P, estruturas de dados, API e utilitários"
#: i2p2www/pages/site/get-involved/develop/applications.html:326
msgid ""
"Network communication requires the usage of I2P network sockets.\n"
-"To demonstrate this, we will create an application where a client can send text messages to a server,\n"
-"who will print the messages and send them back to the client. In other words, the server will function as an echo."
+"To demonstrate this, we will create an application where a client can "
+"send text messages to a server,\n"
+"who will print the messages and send them back to the client. In other "
+"words, the server will function as an echo."
msgstr ""
#: i2p2www/pages/site/get-involved/develop/applications.html:331
msgid ""
-"We will start by initializing the server application. This requires getting an I2PSocketManager\n"
+"We will start by initializing the server application. This requires "
+"getting an I2PSocketManager\n"
"and creating an I2PServerSocket.\n"
-"We will not provide the I2PSocketManagerFactory with the saved keys for an existing Destination,\n"
+"We will not provide the I2PSocketManagerFactory with the saved keys for "
+"an existing Destination,\n"
"so it will create a new Destination for us.\n"
-"So we will ask the I2PSocketManager for an I2PSession, so we can find out the Destination that\n"
-"was created, as we will need to copy and paste that information later so the client can connect to us."
+"So we will ask the I2PSocketManager for an I2PSession, so we can find out"
+" the Destination that\n"
+"was created, as we will need to copy and paste that information later so "
+"the client can connect to us."
msgstr ""
#: i2p2www/pages/site/get-involved/develop/applications.html:362
@@ -1653,53 +1915,68 @@ msgstr "Exemplo de código 1: inicializando o aplicativo servidor."
#: i2p2www/pages/site/get-involved/develop/applications.html:364
msgid ""
-"Once we have an I2PServerSocket, we can create I2PSocket instances to accept connections from clients.\n"
-"In this example, we will create a single I2PSocket instance, that can only handle one client at a time.\n"
+"Once we have an I2PServerSocket, we can create I2PSocket instances to "
+"accept connections from clients.\n"
+"In this example, we will create a single I2PSocket instance, that can "
+"only handle one client at a time.\n"
"A real server would have to be able to handle multiple clients.\n"
-"To do this, multiple I2PSocket instances would have to be created, each in separate threads.\n"
-"Once we have created the I2PSocket instance, we read data, print it and send it back to the client.\n"
+"To do this, multiple I2PSocket instances would have to be created, each "
+"in separate threads.\n"
+"Once we have created the I2PSocket instance, we read data, print it and "
+"send it back to the client.\n"
"The bold code is the new code we add."
msgstr ""
#: i2p2www/pages/site/get-involved/develop/applications.html:448
-msgid ""
-"Code example 2: accepting connections from clients and handling messages."
-msgstr "Exemplo de código 2: aceitando conexões de clientes e manuseando mensagens."
+msgid "Code example 2: accepting connections from clients and handling messages."
+msgstr ""
+"Exemplo de código 2: aceitando conexões de clientes e manuseando "
+"mensagens."
#: i2p2www/pages/site/get-involved/develop/applications.html:452
msgid ""
-"When you run the above server code, it should print something like this (but without the line endings, it should just be\n"
+"When you run the above server code, it should print something like this "
+"(but without the line endings, it should just be\n"
"one huge block of characters):"
msgstr ""
#: i2p2www/pages/site/get-involved/develop/applications.html:466
msgid ""
-"This is the base64-representation of the server Destination. The client will"
-" need this string to reach the server."
+"This is the base64-representation of the server Destination. The client "
+"will need this string to reach the server."
msgstr ""
#: i2p2www/pages/site/get-involved/develop/applications.html:470
msgid ""
-"Now, we will create the client application. Again, a number of steps are required for initialization.\n"
+"Now, we will create the client application. Again, a number of steps are "
+"required for initialization.\n"
"Again, we will need to start by getting an I2PSocketManager.\n"
"We won't use an I2PSession and an I2PServerSocket this time.\n"
-"Instead, we will use the server Destination string to start our connection.\n"
-"We will ask the user for the Destination string, and create an I2PSocket using this string.\n"
-"Once we have an I2PSocket, we can start sending and receiving data to and from the server."
+"Instead, we will use the server Destination string to start our "
+"connection.\n"
+"We will ask the user for the Destination string, and create an I2PSocket "
+"using this string.\n"
+"Once we have an I2PSocket, we can start sending and receiving data to and"
+" from the server."
msgstr ""
#: i2p2www/pages/site/get-involved/develop/applications.html:554
msgid ""
"Code example 3: starting the client and connecting it to the server "
"application."
-msgstr "Exemplo de código 3: inicializando o cliente e conectando-o ao aplicativo servidor."
+msgstr ""
+"Exemplo de código 3: inicializando o cliente e conectando-o ao aplicativo"
+" servidor."
#: i2p2www/pages/site/get-involved/develop/applications.html:556
msgid ""
"Finally, you can run both the server and the client application.\n"
-"First, start the server application. It will print a Destination string (like shown above).\n"
-"Next, start the client application. When it requests a Destination string, you can enter the string printed by the server.\n"
-"The client will then send 'Hello I2P!' (along with a newline) to the server, who will print the message and send it back to the client."
+"First, start the server application. It will print a Destination string "
+"(like shown above).\n"
+"Next, start the client application. When it requests a Destination "
+"string, you can enter the string printed by the server.\n"
+"The client will then send 'Hello I2P!' (along with a newline) to the "
+"server, who will print the message and send it back to the client."
msgstr ""
#: i2p2www/pages/site/get-involved/develop/applications.html:562
@@ -1724,8 +2001,8 @@ msgstr ""
#: i2p2www/pages/site/get-involved/develop/applications.html:593
msgid ""
-"Jabber server - there have been some in the past, and there is one at the "
-"moment, with access to the public internet"
+"Jabber server - there have been some in the past, and there is one at the"
+" moment, with access to the public internet"
msgstr ""
#: i2p2www/pages/site/get-involved/develop/applications.html:596
@@ -1744,7 +2021,8 @@ msgstr ""
#: i2p2www/pages/site/get-involved/develop/applications.html:606
msgid ""
-"Web-based applications - The sky is the limit for hosting web-server-based\n"
+"Web-based applications - The sky is the limit for hosting web-server-"
+"based\n"
"applications such as blogs, pastebins, storage, tracking, feeds, etc.\n"
"Any web or CGI technology such as Perl, PHP, Python, or Ruby will work."
msgstr ""
@@ -1773,16 +2051,20 @@ msgstr ""
#: i2p2www/pages/site/get-involved/develop/developers-keys.html:9
msgid ""
-"Transport Keys to push changes to remote servers."
+"Transport Keys to push changes to remote "
+"servers."
msgstr ""
#: i2p2www/pages/site/get-involved/develop/developers-keys.html:12
#, python-format
msgid ""
"Everyone that uses Monotone to checkout the I2P codebase will need to\n"
-"import the\n"
-"developer commit keys, but only Monotone \n"
-"server operators will need to import the transport keys."
+"import the\n"
+"developer commit keys, but only Monotone \n"
+"server operators will need to import the transport keys."
msgstr ""
#: i2p2www/pages/site/get-involved/develop/developers-keys.html:19
@@ -1854,8 +2136,11 @@ msgstr "o uso sem quaisquer custos"
#: i2p2www/pages/site/get-involved/develop/licenses.html:24
msgid ""
-"use with no restrictions on how, when, where, why, or by whom is running it"
-msgstr "o uso irrestrito independentemente de como, onde, porque ou por quem seja executado"
+"use with no restrictions on how, when, where, why, or by whom is running "
+"it"
+msgstr ""
+"o uso irrestrito independentemente de como, onde, porque ou por quem seja"
+" executado"
#: i2p2www/pages/site/get-involved/develop/licenses.html:25
msgid "access to the source code without fee"
@@ -1867,15 +2152,24 @@ msgstr "modificações do código-fonte"
#: i2p2www/pages/site/get-involved/develop/licenses.html:29
msgid ""
-"Most of the software guarantees much more - the ability of anyone to \n"
-"distribute the modified source however they choose. However, not all of the \n"
-"software bundled provides this freedom - the GPL restricts the ability of \n"
-"developers who wish to integrate I2P with their own applications that are not \n"
-"themselves open source applications. While we applaud the noble goals of \n"
-"increasing the resources in the commons, I2P is best served by removing any\n"
-"barriers that stand in the way of its adoption - if a developer considering whether\n"
-"they can integrate I2P with their application has to stop and check with their lawyer,\n"
-"or conduct a code audit to make sure their own source can be released as GPL-compatible,\n"
+"Most of the software guarantees much more - the ability of anyone "
+"to \n"
+"distribute the modified source however they choose. However, not all of "
+"the \n"
+"software bundled provides this freedom - the GPL restricts the ability of"
+" \n"
+"developers who wish to integrate I2P with their own applications that are"
+" not \n"
+"themselves open source applications. While we applaud the noble goals of"
+" \n"
+"increasing the resources in the commons, I2P is best served by removing "
+"any\n"
+"barriers that stand in the way of its adoption - if a developer "
+"considering whether\n"
+"they can integrate I2P with their application has to stop and check with "
+"their lawyer,\n"
+"or conduct a code audit to make sure their own source can be released as "
+"GPL-compatible,\n"
"we lose out."
msgstr ""
@@ -1885,14 +2179,22 @@ msgstr "Licenças componentes"
#: i2p2www/pages/site/get-involved/develop/licenses.html:43
msgid ""
-"The I2P distribution contains several resources, reflecting the partitioning of \n"
-"the source code into components. Each component has its own license, which all \n"
-"developers who contribute to it agree to - either by explicitly declaring the release\n"
-"of code committed under a license compatible with that component, or by implicitly\n"
-"releasing the code committed under the component's primary license. Each of these \n"
-"components has a lead developer who has the final say as to what license is compatible\n"
-"with the component's primary license, and the I2P project manager has the final say as\n"
-"to what licenses meet the above four guarantees for inclusion in the I2P distribution."
+"The I2P distribution contains several resources, reflecting the "
+"partitioning of \n"
+"the source code into components. Each component has its own license, "
+"which all \n"
+"developers who contribute to it agree to - either by explicitly declaring"
+" the release\n"
+"of code committed under a license compatible with that component, or by "
+"implicitly\n"
+"releasing the code committed under the component's primary license. Each"
+" of these \n"
+"components has a lead developer who has the final say as to what license "
+"is compatible\n"
+"with the component's primary license, and the I2P project manager has the"
+" final say as\n"
+"to what licenses meet the above four guarantees for inclusion in the I2P "
+"distribution."
msgstr ""
#: i2p2www/pages/site/get-involved/develop/licenses.html:56
@@ -1928,16 +2230,21 @@ msgstr ""
msgid ""
"While it may be redundant, just for clarity the\n"
"GPL'ed code included within\n"
-"I2PTunnel and other apps must be released under the GPL with an additional \"exception\"\n"
+"I2PTunnel and other apps must be released under the GPL with an "
+"additional \"exception\"\n"
"explicitly authorizing the use of Java's standard libraries:"
msgstr ""
#: i2p2www/pages/site/get-involved/develop/licenses.html:287
msgid ""
-"All source code under each component will by default be licensed under the\n"
-"primary license, unless marked otherwise in the code. All of the above is\n"
-"summary of the license terms - please see the specific license for the component\n"
-"or source code in question for authoritative terms. Component source locations and\n"
+"All source code under each component will by default be licensed under "
+"the\n"
+"primary license, unless marked otherwise in the code. All of the above "
+"is\n"
+"summary of the license terms - please see the specific license for the "
+"component\n"
+"or source code in question for authoritative terms. Component source "
+"locations and\n"
"resource packaging may be changed if the repository is reorganized."
msgstr ""
@@ -1957,8 +2264,10 @@ msgstr ""
msgid ""
"However, to have changes included in a release, developers\n"
"must be trusted by the release manager (currently zzz).\n"
-"In addition, they must explicitly agree with the above terms to be trusted.\n"
-"That means that they must send one of the release managers a signed message affirming that:"
+"In addition, they must explicitly agree with the above terms to be "
+"trusted.\n"
+"That means that they must send one of the release managers a signed "
+"message affirming that:"
msgstr ""
#: i2p2www/pages/site/get-involved/develop/licenses.html:309
@@ -1969,7 +2278,8 @@ msgstr ""
#: i2p2www/pages/site/get-involved/develop/licenses.html:313
msgid ""
-"If specified in the source, the code may be explicitly licensed under one\n"
+"If specified in the source, the code may be explicitly licensed under one"
+"\n"
"of the component's alternate licenses"
msgstr ""
@@ -1982,8 +2292,10 @@ msgstr ""
#: i2p2www/pages/site/get-involved/develop/licenses.html:323
#, python-format
msgid ""
-"If anyone is aware of any instances where the above conditions are not met,\n"
-"please contact the component lead and/or an I2P release manager with further\n"
+"If anyone is aware of any instances where the above conditions are not "
+"met,\n"
+"please contact the component lead and/or an I2P release manager with "
+"further\n"
"information.\n"
"See developers' license agreements."
msgstr ""
@@ -1997,14 +2309,13 @@ msgid "Releases 0.7.6 and later are signed by zzz. His current public key is:"
msgstr ""
#: i2p2www/pages/site/get-involved/develop/release-signing-key.html:190
-msgid ""
-"Releases 0.7.6 through 0.9.12 were signed by zzz with the following key:"
+msgid "Releases 0.7.6 through 0.9.12 were signed by zzz with the following key:"
msgstr ""
#: i2p2www/pages/site/get-involved/develop/release-signing-key.html:226
msgid ""
-"Releases 0.6.1.31 through 0.7.5 were signed by Complication. His public key "
-"is:"
+"Releases 0.6.1.31 through 0.7.5 were signed by Complication. His public "
+"key is:"
msgstr ""
#: i2p2www/pages/site/get-involved/develop/security-key.html:2
@@ -2021,7 +2332,8 @@ msgstr ""
#: i2p2www/pages/site/get-involved/develop/signed-keys.html:4
msgid ""
-"Keys for zzz, Complication and welterde are provided clearsigned. The key for jrandom must be\n"
+"Keys for zzz, Complication and welterde are provided clearsigned. The key"
+" for jrandom must be\n"
"verified differently, since he's away, and only left a binary detached\n"
"signature for his key."
msgstr ""
@@ -2053,28 +2365,35 @@ msgstr "Outros"
#: i2p2www/pages/site/get-involved/develop/signed-keys.html:17
msgid ""
-"Tip: To find zzz's GPG key, on his eepsite locate the key `0xA76E0BED`, with\n"
-"the name `zzz@mail.i2p` and the fingerprint `4456 EBBE C805 63FE 57E6 B310 4155\n"
+"Tip: To find zzz's GPG key, on his eepsite locate the key "
+"`0xA76E0BED`, with\n"
+"the name `zzz@mail.i2p` and the fingerprint `4456 EBBE C805 63FE 57E6 "
+"B310 4155\n"
"76BA A76E 0BED`."
msgstr ""
#: i2p2www/pages/site/get-involved/develop/signed-keys.html:49
msgid ""
-"Tip: To find welterde's GPG key, on public keyservers locate the key\n"
-"`0x62E011A1`, with the name `welterde@arcor.de` and the fingerprint `6720 FD81\n"
+"Tip: To find welterde's GPG key, on public keyservers locate the "
+"key\n"
+"`0x62E011A1`, with the name `welterde@arcor.de` and the fingerprint `6720"
+" FD81\n"
"3872 6DFC 6016 64D1 EBBC 0374 62E0 11A1`."
msgstr ""
#: i2p2www/pages/site/get-involved/develop/signed-keys.html:81
msgid ""
-"Tip: To find Complication's GPG key, on his eepsite locate the key\n"
-"`0x79FCCE33`, with the name `complication@mail.i2p` and the fingerprint `73CF\n"
+"Tip: To find Complication's GPG key, on his eepsite locate the key"
+"\n"
+"`0x79FCCE33`, with the name `complication@mail.i2p` and the fingerprint "
+"`73CF\n"
"2862 87A7 E7D2 19FF DB66 FA1D FC6B 79FC CE33`."
msgstr ""
#: i2p2www/pages/site/get-involved/develop/signed-keys.html:116
msgid ""
-"Tip: To find jrandom's GPG key for Syndie releases, on public keyservers locate\n"
+"Tip: To find jrandom's GPG key for Syndie releases, on public "
+"keyservers locate\n"
"the key `0x393F2DF9`, with the name `syndie-dist-key@i2p.net` and the\n"
"fingerprint `AE89 D080 0E85 72F0 B777 B2ED C2FA 68C0 393F 2DF9`."
msgstr ""
@@ -2082,23 +2401,29 @@ msgstr ""
#: i2p2www/pages/site/get-involved/develop/signed-keys.html:122
msgid ""
"Jrandom had to leave unexpectedly in the end of 2007. His commit key was\n"
-"deployed in the Syndie Monotone repository, in a file named `mtn-committers`.\n"
-"That file also had a GPG signature, `mtn-committers.sig`, but it was a binary\n"
-"detached signature. I am going to supply both files in GPG ASCII-armoured form\n"
+"deployed in the Syndie Monotone repository, in a file named `mtn-"
+"committers`.\n"
+"That file also had a GPG signature, `mtn-committers.sig`, but it was a "
+"binary\n"
+"detached signature. I am going to supply both files in GPG ASCII-armoured"
+" form\n"
"below."
msgstr ""
#: i2p2www/pages/site/get-involved/develop/signed-keys.html:130
msgid ""
-"First, the file `mtn-committers` containing jrandom's Monotone key. Save as\n"
-"`mtn-committers.asc` and unpack it using `gpg --output mtn-committers --dearmor\n"
+"First, the file `mtn-committers` containing jrandom's Monotone key. Save "
+"as\n"
+"`mtn-committers.asc` and unpack it using `gpg --output mtn-committers "
+"--dearmor\n"
"mtn-committers.asc`:"
msgstr ""
#: i2p2www/pages/site/get-involved/develop/signed-keys.html:151
msgid ""
"Now the file `mtn-committers.sig`, containing the GPG signature. Save as\n"
-"`mtn-committers.sig.asc` and unpack it using `gpg --output mtn-committers.sig\n"
+"`mtn-committers.sig.asc` and unpack it using `gpg --output mtn-"
+"committers.sig\n"
"--dearmor mtn-committers.sig.asc`. Use it to verify the above supplied\n"
"`mtn-committers` file:"
msgstr ""
@@ -2125,10 +2450,12 @@ msgstr "Diretrizes elementares e Estilo de código"
#: i2p2www/pages/site/get-involved/guides/dev-guidelines.html:10
msgid ""
-"Most of the following should be common sense for anybody who has worked on open source or in a commercial\n"
+"Most of the following should be common sense for anybody who has worked "
+"on open source or in a commercial\n"
"programming envrionment.\n"
"The following applies mostly to the main development branch i2p.i2p.\n"
-"Guidelines for other branches, plugins, and external apps may be substantially different;\n"
+"Guidelines for other branches, plugins, and external apps may be "
+"substantially different;\n"
"check with the appropriate developer for guidance."
msgstr ""
@@ -2138,8 +2465,10 @@ msgstr "Comunidade"
#: i2p2www/pages/site/get-involved/guides/dev-guidelines.html:20
msgid ""
-"Please don't just \"write code\". If you can, participate in other development activities, including:\n"
-"development discussions and support on IRC, zzz.i2p, and forum.i2p; testing;\n"
+"Please don't just \"write code\". If you can, participate in other "
+"development activities, including:\n"
+"development discussions and support on IRC, zzz.i2p, and forum.i2p; "
+"testing;\n"
"bug reporting and responses; documentation; code reviews; etc."
msgstr ""
@@ -2153,7 +2482,8 @@ msgstr ""
#: i2p2www/pages/site/get-involved/guides/dev-guidelines.html:35
msgid ""
-"Have a basic understanding of distributed source control systems, even if you haven't\n"
+"Have a basic understanding of distributed source control systems, even if"
+" you haven't\n"
"used monotone before. Ask for help if you need it.\n"
"Once pushed, checkins are forever, there is no undo. Please be careful.\n"
"If you have not used monotone before, start with baby steps.\n"
@@ -2167,14 +2497,17 @@ msgid ""
"use your own development branch (e.g. i2p.i2p.yourname.test)\n"
"and propagate back to i2p.i2p once it is working well.\n"
"Do not break the build. Do not cause regressions.\n"
-"In case you do (it happens), please do not vanish for a long period after\n"
+"In case you do (it happens), please do not vanish for a long period after"
+"\n"
"you push your change."
msgstr ""
#: i2p2www/pages/site/get-involved/guides/dev-guidelines.html:51
msgid ""
-"If your change is non-trivial, or you want people to test it and need good test reports\n"
-"to know whether your change was tested or not, add a checkin comment to history.txt\n"
+"If your change is non-trivial, or you want people to test it and need "
+"good test reports\n"
+"to know whether your change was tested or not, add a checkin comment to "
+"history.txt\n"
"and increment the build revision in RouterVersion.java."
msgstr ""
@@ -2190,14 +2523,17 @@ msgid ""
"If you inadvertently diverge, merge and push as soon as possible.\n"
"Don't routinely make others merge for you.\n"
"Yes, we know that monotone says you should push and then merge,\n"
-"but in our experience, in-workspace merge works just as well as in-database merge,\n"
+"but in our experience, in-workspace merge works just as well as in-"
+"database merge,\n"
"without creating a merge revision."
msgstr ""
#: i2p2www/pages/site/get-involved/guides/dev-guidelines.html:68
msgid ""
-"Do not check in major changes into the main i2p.i2p branch late in the release cycle.\n"
-"If a project will take you more than a couple days, create your own branch in monotone\n"
+"Do not check in major changes into the main i2p.i2p branch late in the "
+"release cycle.\n"
+"If a project will take you more than a couple days, create your own "
+"branch in monotone\n"
"and do the development there so you do not block releases."
msgstr ""
@@ -2207,48 +2543,58 @@ msgstr "Estilo de código"
#: i2p2www/pages/site/get-involved/guides/dev-guidelines.html:77
msgid ""
-"Coding style throughout most of the code is 4-spaces for indentation. Do not use tabs.\n"
-"Do not reformat code. If your IDE or editor wants to reformat everything, get control of it.\n"
-"Yes, we know 4 spaces is a pain, but perhaps you can configure your editor appropriately.\n"
+"Coding style throughout most of the code is 4-spaces for indentation. Do "
+"not use tabs.\n"
+"Do not reformat code. If your IDE or editor wants to reformat everything,"
+" get control of it.\n"
+"Yes, we know 4 spaces is a pain, but perhaps you can configure your "
+"editor appropriately.\n"
"In some places, the coding style is different.\n"
"Use common sense. Emulate the style in the file you are modifying."
msgstr ""
#: i2p2www/pages/site/get-involved/guides/dev-guidelines.html:84
msgid ""
-"New classes and methods require at least brief javadocs. Add @since release-"
-"number."
+"New classes and methods require at least brief javadocs. Add @since "
+"release-number."
msgstr ""
#: i2p2www/pages/site/get-involved/guides/dev-guidelines.html:87
msgid ""
-"Classes in core/ (i2p.jar) and portions of i2ptunnel are part of our official API.\n"
-"There are several out-of-tree plugins and other applications that rely on this API.\n"
+"Classes in core/ (i2p.jar) and portions of i2ptunnel are part of our "
+"official API.\n"
+"There are several out-of-tree plugins and other applications that rely on"
+" this API.\n"
"Be careful not to make any changes that break compatibility.\n"
"Don't add methods to the API unless they are of general utility.\n"
"Javadocs for API methods should be clear and complete.\n"
-"If you add or change the API, also update the documentation on the website (i2p.www branch)."
+"If you add or change the API, also update the documentation on the "
+"website (i2p.www branch)."
msgstr ""
#: i2p2www/pages/site/get-involved/guides/dev-guidelines.html:95
msgid ""
"Tag strings for translation where appropriate.\n"
-"Don't change existing tagged strings unless really necessary, as it will break existing translations.\n"
-"Do not add or change tagged strings after the \"tag freeze\" in the release cycle so that\n"
+"Don't change existing tagged strings unless really necessary, as it will "
+"break existing translations.\n"
+"Do not add or change tagged strings after the \"tag freeze\" in the "
+"release cycle so that\n"
"translators have a chance to update before the release."
msgstr ""
#: i2p2www/pages/site/get-involved/guides/dev-guidelines.html:101
msgid ""
-"Use generics and concurrent classes where possible. I2P is a highly multi-"
-"threaded application."
+"Use generics and concurrent classes where possible. I2P is a highly "
+"multi-threaded application."
msgstr ""
#: i2p2www/pages/site/get-involved/guides/dev-guidelines.html:104
msgid ""
"We require Java 6 to build but only Java 5 to run I2P.\n"
-"Do not use Java 6 classes or methods without handling the class not found exceptions\n"
-"and providing alternate Java 5 code. See classes in net.i2p.util for examples."
+"Do not use Java 6 classes or methods without handling the class not found"
+" exceptions\n"
+"and providing alternate Java 5 code. See classes in net.i2p.util for "
+"examples."
msgstr ""
#: i2p2www/pages/site/get-involved/guides/dev-guidelines.html:109
@@ -2305,17 +2651,24 @@ msgstr "Programar para a I2P usando um IDE"
#: i2p2www/pages/site/get-involved/guides/ides.html:4
msgid ""
-"The main I2P development branch (i2p.i2p
) has been set up to "
-"enable developers to easily set up two of the commonly-used IDEs for Java "
-"development: Eclipse and NetBeans."
-msgstr "O principal ramo do desenvolvimento da I2P (i2p.i2p
) foi configurado para permitir que os desenvolvedores facilmente configurem os dois IDEs mais usados no desenvolvimento em Java: o Eclipse e o NetBeans."
+"The main I2P development branch (i2p.i2p
) has been set up to"
+" enable developers to easily set up two of the commonly-used IDEs for "
+"Java development: Eclipse and NetBeans."
+msgstr ""
+"O principal ramo do desenvolvimento da I2P (i2p.i2p
) foi "
+"configurado para permitir que os desenvolvedores facilmente configurem os"
+" dois IDEs mais usados no desenvolvimento em Java: o Eclipse e o "
+"NetBeans."
#: i2p2www/pages/site/get-involved/guides/ides.html:10
msgid ""
-"The main I2P development branches (i2p.i2p
and branches from "
-"it) contain .project and .classpath Eclipse files, to enable the branch to "
-"be easily set up in Eclipse."
-msgstr "Os principais ramos do desenvolvimento da I2P (i2p.i2p
e derivados) contém arquivos de Eclipse .project e .classpath, permitindo que o ramo seja facilmente configurado no Eclipse."
+"The main I2P development branches (i2p.i2p
and branches from"
+" it) contain .project and .classpath Eclipse files, to enable the branch "
+"to be easily set up in Eclipse."
+msgstr ""
+"Os principais ramos do desenvolvimento da I2P (i2p.i2p
e "
+"derivados) contém arquivos de Eclipse .project e .classpath, permitindo "
+"que o ramo seja facilmente configurado no Eclipse."
#: i2p2www/pages/site/get-involved/guides/ides.html:16
msgid ""
@@ -2325,8 +2678,8 @@ msgstr ""
#: i2p2www/pages/site/get-involved/guides/ides.html:20
msgid ""
-"Open Eclipse and create a new Workspace, based in the directory that the I2P"
-" branch was checked out to."
+"Open Eclipse and create a new Workspace, based in the directory that the "
+"I2P branch was checked out to."
msgstr ""
#: i2p2www/pages/site/get-involved/guides/ides.html:24
@@ -2337,8 +2690,8 @@ msgstr ""
#: i2p2www/pages/site/get-involved/guides/ides.html:28
msgid ""
-"For \"Select root directory:\" choose the directory that the I2P branch was "
-"checked out to."
+"For \"Select root directory:\" choose the directory that the I2P branch "
+"was checked out to."
msgstr ""
#: i2p2www/pages/site/get-involved/guides/ides.html:32
@@ -2351,15 +2704,17 @@ msgstr "Selecione todos os projetos na lista e clique em \"Finalizar\"."
#: i2p2www/pages/site/get-involved/guides/ides.html:40
msgid ""
-"Done! Your workspace should now contain all projects within the I2P branch, "
-"and their build dependencies should be correctly set up."
+"Done! Your workspace should now contain all projects within the I2P "
+"branch, and their build dependencies should be correctly set up."
msgstr ""
#: i2p2www/pages/site/get-involved/guides/ides.html:48
msgid ""
-"The main I2P development branches (i2p.i2p
and branches from "
-"it) contain NetBeans project files."
-msgstr "Os principais ramos do desenvolvimento da I2P (i2p.i2p
e derivados) contém arquivos de projeto do NetBeans."
+"The main I2P development branches (i2p.i2p
and branches from"
+" it) contain NetBeans project files."
+msgstr ""
+"Os principais ramos do desenvolvimento da I2P (i2p.i2p
e "
+"derivados) contém arquivos de projeto do NetBeans."
#: i2p2www/pages/site/get-involved/guides/monotone.html:2
msgid "Monotone Guide"
@@ -2437,26 +2792,34 @@ msgstr ""
#: i2p2www/pages/site/get-involved/guides/monotone.html:32
#, python-format
msgid ""
-"This is a revised version of Complication's original\n"
+"This is a revised version of Complication's original\n"
" guide detailing the use of Monotone in I2P development.\n"
-" For basic instructions see the quick-start guide."
+" For basic instructions see the quick-start "
+"guide."
msgstr ""
#: i2p2www/pages/site/get-involved/guides/monotone.html:40
#, python-format
msgid ""
-"I2P has a distributed development model. The source code is replicated across\n"
-" independently administered Monotone (\"MTN\") repositories.\n"
-" Developers with commit rights are able to push their changes to the repository\n"
-" (a license agreement needs to be signed\n"
+"I2P has a distributed development model. The source code is replicated "
+"across\n"
+" independently administered Monotone (\"MTN\") repositories.\n"
+" Developers with commit rights are able to push their changes to the "
+"repository\n"
+" (a license agreement needs to be "
+"signed\n"
" before commit rights are granted)."
msgstr ""
#: i2p2www/pages/site/get-involved/guides/monotone.html:50
msgid ""
"Some of Monotone's noteworthy qualities are: distributed\n"
-" version control, cryptographic authentication, access control, its small size, having few\n"
-" dependencies, storage of projects in a compressed SQLite database file, and\n"
+" version control, cryptographic authentication, access control, its "
+"small size, having few\n"
+" dependencies, storage of projects in a compressed SQLite database file,"
+" and\n"
" having the ability to resume interrupted synchronization attempts."
msgstr ""
@@ -2466,16 +2829,20 @@ msgstr "Operando um cliente Monotone"
#: i2p2www/pages/site/get-involved/guides/monotone.html:64
msgid ""
-"A transport key grants you the ability to push your changes to a Monotone repository server.\n"
-" In order to commit code into Monotone (in essence signing your code), a commit key is also needed.\n"
-" None of the public Monotone servers on I2P currently require a key in order to read (or pull) the source code."
+"A transport key grants you the ability to push your changes to a Monotone"
+" repository server.\n"
+" In order to commit code into Monotone (in essence signing your code), a"
+" commit key is also needed.\n"
+" None of the public Monotone servers on I2P currently require a key in "
+"order to read (or pull) the source code."
msgstr ""
#: i2p2www/pages/site/get-involved/guides/monotone.html:72
msgid ""
"Without a transport key, one cannot:\n"
" $HOME/.monotone/keys
in text files which\n"
+"Monotone stores keys under $HOME/.monotone/keys
in "
+"text files which\n"
" are named identically to the keys. For example:"
msgstr ""
@@ -2516,8 +2886,10 @@ msgstr ""
#: i2p2www/pages/site/get-involved/guides/monotone.html:131
msgid ""
-"Monotone will prompt you for a password to protect your keys. You are very strongly encouraged to set a password\n"
-" for the commit key. Many users will leave an empty password for the transport key, especially those running a\n"
+"Monotone will prompt you for a password to protect your keys. You are "
+"very strongly encouraged to set a password\n"
+" for the commit key. Many users will leave an empty password for the "
+"transport key, especially those running a\n"
" Monotone server."
msgstr ""
@@ -2527,30 +2899,38 @@ msgstr ""
#: i2p2www/pages/site/get-involved/guides/monotone.html:143
msgid ""
-"Monotone's security model helps to ensure that nobody can easily impersonate a developer without\n"
-" it being noticed. Since developers can make mistakes and become compromised,only manual review can\n"
-" ensure quality of code. Monotone's trust model will ensure that you read the right diffs. It does\n"
+"Monotone's security model helps to ensure that nobody can easily "
+"impersonate a developer without\n"
+" it being noticed. Since developers can make mistakes and become "
+"compromised,only manual review can\n"
+" ensure quality of code. Monotone's trust model will ensure that you "
+"read the right diffs. It does\n"
" not replace reading diffs."
msgstr ""
#: i2p2www/pages/site/get-involved/guides/monotone.html:153
msgid ""
-"A Monotone repository is a single file (a compressed SQLite database) which "
-"contains all of the project's source code and history."
+"A Monotone repository is a single file (a compressed SQLite database) "
+"which contains all of the project's source code and history."
msgstr ""
#: i2p2www/pages/site/get-involved/guides/monotone.html:159
msgid ""
-"After importing the developers' keys into Monotone and\n"
-" setting up trust evaluation hooks,\n"
-" Monotone will prevent untrusted code from being checked out into your workspace.\n"
-" There are commands available to clean untrusted code from your workspace but in practice they've not been\n"
+"After importing the "
+"developers' keys into Monotone and\n"
+" setting up trust "
+"evaluation hooks,\n"
+" Monotone will prevent untrusted code from being checked out into your "
+"workspace.\n"
+" There are commands available to clean untrusted code from your "
+"workspace but in practice they've not been\n"
" needed due to the push access policies in place."
msgstr ""
#: i2p2www/pages/site/get-involved/guides/monotone.html:169
msgid ""
-"A repository can hold many branches. For example, our repository holds the\n"
+"A repository can hold many branches. For example, our repository holds "
+"the\n"
" following main branches:"
msgstr ""
@@ -2568,17 +2948,23 @@ msgstr "Syndie, uma ferramenta para fóruns distribuídos"
#: i2p2www/pages/site/get-involved/guides/monotone.html:181
msgid ""
-"By convention, the I2P Monotone repository is named i2p.mtn
. Before pulling\n"
-" source code from servers, a database for your repository will need to be initialized.\n"
-" To initialize your local repository, change into the directory that you want the\n"
-" i2p.mtn
file and branch directories to be stored and issue the following\n"
+"By convention, the I2P Monotone repository is named i2p.mtn
."
+" Before pulling\n"
+" source code from servers, a database for your repository will need to "
+"be initialized.\n"
+" To initialize your local repository, change into the directory that you"
+" want the\n"
+" i2p.mtn
file and branch directories to be stored and issue"
+" the following\n"
" command:"
msgstr ""
#: i2p2www/pages/site/get-involved/guides/monotone.html:197
msgid ""
-"Keys which developers use to commit code are essential for trust evaluation in\n"
-" Monotone. The other developers' transport keys are only required for Monotone server operators.\n"
+"Keys which developers use to commit code are essential for trust "
+"evaluation in\n"
+" Monotone. The other developers' transport keys are only required for "
+"Monotone server operators.\n"
" "
msgstr ""
@@ -2592,8 +2978,11 @@ msgstr ""
#: i2p2www/pages/site/get-involved/guides/monotone.html:210
#, python-format
msgid ""
-"To import developers' keys after verifying their authenticity, copy all of the keys into a new\n"
-" file. Create this file (e.g. keys.txt
) in the same directory where i2p.mtn
is located. Import the keys with the command:"
+"To import developers' keys after verifying their authenticity, copy all of the keys into a new\n"
+" file. Create this file (e.g. keys.txt
) in the same "
+"directory where i2p.mtn
is located. Import the keys with the"
+" command:"
msgstr ""
#: i2p2www/pages/site/get-involved/guides/monotone.html:220
@@ -2604,27 +2993,34 @@ msgstr ""
#: i2p2www/pages/site/get-involved/guides/monotone.html:228
msgid ""
-"The default Monotone trust policy is way too lax for our requirements: every committer is trusted by default.\n"
+"The default Monotone trust policy is way too lax for our requirements: "
+"every committer is trusted by default.\n"
" That is not acceptable for I2P development."
msgstr ""
#: i2p2www/pages/site/get-involved/guides/monotone.html:235
msgid ""
-"Change into the directory $HOME/.monotone
and open the file\n"
-" monotonerc
with a text editor. Copy and paste the following two functions into this file:"
+"Change into the directory $HOME/.monotone
and open "
+"the file\n"
+" monotonerc
with a text editor. Copy and paste the "
+"following two functions into this file:"
msgstr ""
#: i2p2www/pages/site/get-involved/guides/monotone.html:244
msgid ""
-"The first function determines an intersection between two sets, in our case a\n"
+"The first function determines an intersection between two sets, in our "
+"case a\n"
" revision's signers and trusted signers."
msgstr ""
#: i2p2www/pages/site/get-involved/guides/monotone.html:251
msgid ""
-"The second function determines trust in a given revision, by calling the first\n"
-" function with \"signers\" and \"trusted\" as arguments. If the intersection is\n"
-" null, the revision is not trusted. If the intersection is not empty, the\n"
+"The second function determines trust in a given revision, by calling the "
+"first\n"
+" function with \"signers\" and \"trusted\" as arguments. If the "
+"intersection is\n"
+" null, the revision is not trusted. If the intersection is not empty, "
+"the\n"
" revision is trusted. Otherwise, the revision is not trusted."
msgstr ""
@@ -2637,14 +3033,18 @@ msgstr ""
#: i2p2www/pages/site/get-involved/guides/monotone.html:268
msgid ""
-"I2P is shipped with a pre-configured tunnel pointing to the project Monotone server. Ensure that the tunnel has been started\n"
-" within I2PTunnel before attempting to pull the source code from 127.0.0.1:8998."
+"I2P is shipped with a pre-configured tunnel pointing to the project "
+"Monotone server. Ensure that the tunnel has been started\n"
+" within I2PTunnel before"
+" attempting to pull the source code from 127.0.0.1:8998."
msgstr ""
#: i2p2www/pages/site/get-involved/guides/monotone.html:275
msgid ""
-"Enter the directory where you initialized i2p.mtn
. Depending on whether you\n"
-" want only I2P sources, or also sources for the I2P website and Syndie, you can\n"
+"Enter the directory where you initialized i2p.mtn
. Depending"
+" on whether you\n"
+" want only I2P sources, or also sources for the I2P website and Syndie, "
+"you can\n"
" perform the pull
operation in different ways."
msgstr ""
@@ -2658,14 +3058,16 @@ msgstr ""
#: i2p2www/pages/site/get-involved/guides/monotone.html:298
msgid ""
-"If the transfer aborts before completing sucessfully, simply repeating the "
-"pull command will resume the transfer."
+"If the transfer aborts before completing sucessfully, simply repeating "
+"the pull command will resume the transfer."
msgstr ""
#: i2p2www/pages/site/get-involved/guides/monotone.html:304
msgid ""
-"Pulling in the above examples is done anonymously by specifying an empty transport key.\n"
-" If everyone pulls anonymously it will be harder for an attacker who gains control of the server\n"
+"Pulling in the above examples is done anonymously by specifying an empty "
+"transport key.\n"
+" If everyone pulls anonymously it will be harder for an attacker who "
+"gains control of the server\n"
" to selectively provide some people with tampered data."
msgstr ""
@@ -2685,57 +3087,67 @@ msgstr ""
#: i2p2www/pages/site/get-involved/guides/monotone.html:326
msgid ""
-"With monotonerc
configured as above, Monotone will no longer trust any committers. Confirm this by changing into the\n"
-"directory where i2p.mtn
was created and attempt a checkout of the I2P branch:"
+"With monotonerc
configured as above, Monotone will no"
+" longer trust any committers. Confirm this by changing into the\n"
+"directory where i2p.mtn
was created and attempt a checkout "
+"of the I2P branch:"
msgstr ""
#: i2p2www/pages/site/get-involved/guides/monotone.html:336
msgid ""
-"A directory named i2p.i2p
should not appear. You should encounter many\n"
+"A directory named i2p.i2p
should not appear. You "
+"should encounter many\n"
" error messages like:"
msgstr ""
#: i2p2www/pages/site/get-involved/guides/monotone.html:353
msgid ""
"If you are satisfied with results, restore the backup of\n"
-" monotonerc
that was created above. If you didn't create a backup\n"
-" as advised, re-read Setting up trust evaluation hooks."
+" monotonerc
that was created above. If you didn't create a "
+"backup\n"
+" as advised, re-read Setting up trust evaluation hooks."
msgstr ""
#: i2p2www/pages/site/get-involved/guides/monotone.html:364
msgid ""
-"If you already have a branch checked out, skip to the next\n"
+"If you already have a branch checked out, skip to the next\n"
" section."
msgstr ""
#: i2p2www/pages/site/get-involved/guides/monotone.html:371
msgid ""
-"Change into the directory where i2p.mtn
is located. Over there "
-"issue:"
+"Change into the directory where i2p.mtn
is located. Over "
+"there issue:"
msgstr ""
#: i2p2www/pages/site/get-involved/guides/monotone.html:380
msgid ""
-"The checkout should complete without error messages and a directory named\n"
-" i2p.i2p
should appear in the current directory. Congratulations! You have\n"
+"The checkout should complete without error messages and a directory named"
+"\n"
+" i2p.i2p
should appear in the current directory. "
+"Congratulations! You have\n"
" successfully checked out the latest I2P sources, ready to be compiled."
msgstr ""
#: i2p2www/pages/site/get-involved/guides/monotone.html:391
msgid ""
-"If you haven't done this already, pull fresh code from the server to your local\n"
-" Monotone repository. To accomplish this, change into the directory where\n"
+"If you haven't done this already, pull fresh code from the server to your"
+" local\n"
+" Monotone repository. To accomplish this, change into the directory "
+"where\n"
" i2p.mtn
is located and issue:"
msgstr ""
#: i2p2www/pages/site/get-involved/guides/monotone.html:402
-msgid ""
-"Now change into your i2p.i2p
directory, and over there issue:"
+msgid "Now change into your i2p.i2p
directory, and over there issue:"
msgstr ""
#: i2p2www/pages/site/get-involved/guides/monotone.html:411
msgid ""
-"As long as there were no errors…Congratulations! You have successfully updated to the latest I2P sources. They\n"
+"As long as there were no errors…Congratulations! You have "
+"successfully updated to the latest I2P sources. They\n"
" should be ready to compile."
msgstr ""
@@ -2759,8 +3171,8 @@ msgstr ""
#: i2p2www/pages/site/get-involved/guides/monotone.html:449
msgid ""
-"No one will not be able to push code to your server without permission being"
-" explicitly granted. To grant push access:"
+"No one will not be able to push code to your server without permission "
+"being explicitly granted. To grant push access:"
msgstr ""
#: i2p2www/pages/site/get-involved/guides/monotone.html:455
@@ -2776,34 +3188,44 @@ msgstr ""
#: i2p2www/pages/site/get-involved/guides/monotone.html:466
msgid ""
-"Import the transport key(s) into your database. The procedure for importing transport keys is the same as for\n"
-"importing commit keys, which is described in the section Obtaining and deploying developers' keys."
+"Import the transport key(s) into your database. The procedure for "
+"importing transport keys is the same as for\n"
+"importing commit keys, which is described in the section Obtaining and deploying "
+"developers' keys."
msgstr ""
#: i2p2www/pages/site/get-involved/guides/monotone.html:476
msgid ""
-"A separate database should be used for your Monotone server because monotone will lock the database while it is served to others.\n"
+"A separate database should be used for your Monotone server because "
+"monotone will lock the database while it is served to others.\n"
" Make a copy of your development database, then start the server with:"
msgstr ""
#: i2p2www/pages/site/get-involved/guides/monotone.html:483
msgid ""
-"If your key is protected with a passphrase, Monotone may request the passphrase\n"
-" when the first client connects. You can work around this by connecting making the first client connection to your server\n"
+"If your key is protected with a passphrase, Monotone may request the "
+"passphrase\n"
+" when the first client connects. You can work around this by connecting "
+"making the first client connection to your server\n"
" (or by clearing the password for your transport key)."
msgstr ""
#: i2p2www/pages/site/get-involved/guides/monotone.html:491
msgid ""
-"For your server to be accessible for others over I2P, you will need to create a\n"
-" server tunnel for it. Use the \"Standard\" tunnel type and \"Bulk\" profile."
+"For your server to be accessible for others over I2P, you will need to "
+"create a\n"
+" server tunnel for it. Use the \"Standard\" tunnel type and \"Bulk\" "
+"profile."
msgstr ""
#: i2p2www/pages/site/get-involved/guides/monotone.html:501
msgid ""
"Debian (amongst other distributions) has integrated Monotone into their\n"
-" framework of daemons/services. Although Monotone servers can still be run\n"
-" \"the ordinary way\" on Debian systems, doing it the \"Debian way\" may be more straightforward."
+" framework of daemons/services. Although Monotone servers can still be "
+"run\n"
+" \"the ordinary way\" on Debian systems, doing it the \"Debian way\" may"
+" be more straightforward."
msgstr ""
#: i2p2www/pages/site/get-involved/guides/monotone.html:509
@@ -2811,7 +3233,8 @@ msgid ""
"Permissions are granted by editing the files\n"
" /etc/monotone/read-permissions
and\n"
" /etc/monotone/write-permissions
. You'll also need to edit\n"
-" /etc/default/monotone
to enable monotone to start at boot or to\n"
+" /etc/default/monotone
to enable monotone to start at boot "
+"or to\n"
" customize the host, port, or database location."
msgstr ""
@@ -2824,7 +3247,8 @@ msgid ""
"\n"
"So you want to start work on I2P? Great!\n"
"Here's a quick guide to getting started\n"
-"on contributing to the website or the software, doing development or creating translations."
+"on contributing to the website or the software, doing development or "
+"creating translations."
msgstr ""
#: i2p2www/pages/site/get-involved/guides/new-developers.html:9
@@ -2877,8 +3301,10 @@ msgstr "Ferramentas"
#: i2p2www/pages/site/get-involved/guides/new-developers.html:29
msgid ""
-"Basic development on the I2P router or the embedded applications uses Java as the main development language.\n"
-"If you don't have experience with Java, you can always have a look at Thinking in Java."
+"Basic development on the I2P router or the embedded applications uses "
+"Java as the main development language.\n"
+"If you don't have experience with Java, you can always have a look at Thinking in Java."
msgstr ""
#: i2p2www/pages/site/get-involved/guides/new-developers.html:33
@@ -2888,7 +3314,8 @@ msgid ""
"the other \"how\" documents,\n"
"the tech intro,\n"
"and associated documents.\n"
-"These will give you a good overview of how I2P is structured and what different things it does."
+"These will give you a good overview of how I2P is structured and what "
+"different things it does."
msgstr ""
#: i2p2www/pages/site/get-involved/guides/new-developers.html:43
@@ -2901,19 +3328,22 @@ msgstr ""
msgid ""
"Install monotone.\n"
"Monotone is a version control system.\n"
-"We use it because it allows us to keep track of who does what changes to the source code (and for a lot of complicated things, but 'keeping track of changes' is the basic idea)."
+"We use it because it allows us to keep track of who does what changes to "
+"the source code (and for a lot of complicated things, but 'keeping track "
+"of changes' is the basic idea)."
msgstr ""
#: i2p2www/pages/site/get-involved/guides/new-developers.html:53
msgid ""
-"Skim over the monotone"
-" tutorial, to make sure you understand the concepts."
+"Skim over the monotone tutorial,"
+" to make sure you understand the concepts."
msgstr ""
#: i2p2www/pages/site/get-involved/guides/new-developers.html:57
msgid ""
-"If you want to remain anonymous, you need to do an additional step, to set "
-"up a connection to a monotone server over I2P:"
+"If you want to remain anonymous, you need to do an additional step, to "
+"set up a connection to a monotone server over I2P:"
msgstr ""
#: i2p2www/pages/site/get-involved/guides/new-developers.html:60
@@ -2931,22 +3361,24 @@ msgstr ""
#: i2p2www/pages/site/get-involved/guides/new-developers.html:67
msgid ""
-"Define the trust list by creating ~/.monotone/monotonerc
(or "
-"_MTN/monotonerc
in the i2p.i2p workspace) with the following "
-"contents:"
+"Define the trust list by creating ~/.monotone/monotonerc
(or"
+" _MTN/monotonerc
in the i2p.i2p workspace) with the "
+"following contents:"
msgstr ""
#: i2p2www/pages/site/get-involved/guides/new-developers.html:72
#, python-format
msgid ""
-"Copy and paste the developer's commit keys into a new file (e.g. keys.txt
) in the same directory\n"
-" that i2p.mtn
is in. Import the keys into your database with mtn -d i2p.mtn read < keys.txt
"
+"Copy and paste the developer's commit keys "
+"into a new file (e.g. keys.txt
) in the same directory\n"
+" that i2p.mtn
is in. Import the keys into your database "
+"with mtn -d i2p.mtn read < keys.txt
"
msgstr ""
#: i2p2www/pages/site/get-involved/guides/new-developers.html:76
msgid ""
-"Pull the I2P sources to your machine. This may take a long time, especially "
-"if you are doing this over I2P!"
+"Pull the I2P sources to your machine. This may take a long time, "
+"especially if you are doing this over I2P!"
msgstr ""
#: i2p2www/pages/site/get-involved/guides/new-developers.html:78
@@ -2959,20 +3391,20 @@ msgstr "Sem anonimato:"
#: i2p2www/pages/site/get-involved/guides/new-developers.html:83
msgid ""
-"Alternatively, instead of 'mtn.i2p2.de', you can also download from mtn.i2p-"
-"projekt.de."
+"Alternatively, instead of 'mtn.i2p2.de', you can also download from mtn"
+".i2p-projekt.de."
msgstr ""
#: i2p2www/pages/site/get-involved/guides/new-developers.html:90
msgid ""
-"All the sources are now present on your machine, in the database file. To "
-"make them available in a directory, you need to check them out:"
+"All the sources are now present on your machine, in the database file. To"
+" make them available in a directory, you need to check them out:"
msgstr ""
#: i2p2www/pages/site/get-involved/guides/new-developers.html:92
msgid ""
-"The above command creates a directory i2p.i2p, which contains all of the I2P"
-" sources."
+"The above command creates a directory i2p.i2p, which contains all of the "
+"I2P sources."
msgstr ""
#: i2p2www/pages/site/get-involved/guides/new-developers.html:96
@@ -2982,21 +3414,23 @@ msgstr ""
#: i2p2www/pages/site/get-involved/guides/new-developers.html:97
msgid ""
"\n"
-"To download the website files instead of the I2P source files, use 'i2p.www' instead of 'i2p.i2p'."
+"To download the website files instead of the I2P source files, use "
+"'i2p.www' instead of 'i2p.i2p'."
msgstr ""
#: i2p2www/pages/site/get-involved/guides/new-developers.html:100
msgid ""
"The initial pull may take several hours using the tunnel.\n"
-"If it fails after a partial pull, simply rerun it, it will start where it left off.\n"
+"If it fails after a partial pull, simply rerun it, it will start where it"
+" left off.\n"
"If you are in a hurry, use the non-anonymous access."
msgstr ""
#: i2p2www/pages/site/get-involved/guides/new-developers.html:105
#, python-format
msgid ""
-"A full list of branches, including i2p.i2p and i2p.www can be found on viewmtn."
+"A full list of branches, including i2p.i2p and i2p.www can be found on viewmtn."
msgstr ""
#: i2p2www/pages/site/get-involved/guides/new-developers.html:108
@@ -3009,11 +3443,13 @@ msgstr ""
#: i2p2www/pages/site/get-involved/guides/new-developers.html:114
#, python-format
msgid ""
-"To compile the code, you need the Sun Java Development Kit 6 or higher, or equivalent JDK\n"
+"To compile the code, you need the Sun Java Development Kit 6 or higher, "
+"or equivalent JDK\n"
"(Sun JDK 6 strongly recommended) and\n"
"Apache ant\n"
"version 1.7.0 or higher.\n"
-"If you go are working on the main I2P code, you can go into the i2p.i2p directory and run 'ant' to see the build options."
+"If you go are working on the main I2P code, you can go into the i2p.i2p "
+"directory and run 'ant' to see the build options."
msgstr ""
#: i2p2www/pages/site/get-involved/guides/new-developers.html:122
@@ -3042,8 +3478,10 @@ msgstr ""
#: i2p2www/pages/site/get-involved/guides/new-developers.html:143
#, python-format
msgid ""
-"See the bottom of the licenses page for\n"
-"commit privilege requirements. You need these to put code into i2p.i2p (not required for the website!)."
+"See the bottom of the licenses page "
+"for\n"
+"commit privilege requirements. You need these to put code into i2p.i2p "
+"(not required for the website!)."
msgstr ""
#: i2p2www/pages/site/get-involved/guides/new-developers.html:148
@@ -3088,32 +3526,42 @@ msgstr ""
#: i2p2www/pages/site/get-involved/guides/new-developers.html:163
#, python-format
msgid ""
-"The developers hang around on IRC. They can be reached on the Freenode network, OFTC, and on the I2P internal networks. The usual place to look is #i2p-dev. Join the channel and say hi!\n"
-"We also have additional guidelines for regular developers."
+"The developers hang around on IRC. They can be reached on the Freenode "
+"network, OFTC, and on the I2P internal networks. The usual place to look "
+"is #i2p-dev. Join the channel and say hi!\n"
+"We also have additional guidelines for regular"
+" developers."
msgstr ""
#: i2p2www/pages/site/get-involved/guides/new-developers.html:169
#, python-format
msgid ""
-"Website and router console translators: See the New Translator's Guide\n"
+"Website and router console translators: See the New Translator's Guide\n"
"for next steps."
msgstr ""
#: i2p2www/pages/site/get-involved/guides/new-developers.html:175
msgid ""
"I2P is open source software that is mostly developed using open sourced\n"
-"toolkits. The I2P project recently acquired a license for the YourKit Java\n"
-"Profiler. Open source projects are eligible to receive a free license provided\n"
-"that YourKit is referenced on the project web site. Please get in touch if you\n"
+"toolkits. The I2P project recently acquired a license for the YourKit "
+"Java\n"
+"Profiler. Open source projects are eligible to receive a free license "
+"provided\n"
+"that YourKit is referenced on the project web site. Please get in touch "
+"if you\n"
"are interested in profiling the I2P codebase."
msgstr ""
#: i2p2www/pages/site/get-involved/guides/new-developers.html:183
#, python-format
msgid ""
-"YourKit is kindly supporting open source projects with its full-featured Java Profiler.\n"
-"YourKit, LLC is the creator of innovative and intelligent tools for profiling\n"
-"Java and .NET applications. Take a look at YourKit's leading software products:\n"
+"YourKit is kindly supporting open source projects with its full-featured "
+"Java Profiler.\n"
+"YourKit, LLC is the creator of innovative and intelligent tools for "
+"profiling\n"
+"Java and .NET applications. Take a look at YourKit's leading software "
+"products:\n"
"YourKit Java Profiler and\n"
"YourKit .NET Profiler."
msgstr ""
@@ -3133,9 +3581,11 @@ msgstr "Como traduzir o website"
#: i2p2www/pages/site/get-involved/guides/new-translators.html:8
#, python-format
msgid ""
-"Translation of the website is done with .po files. The easiest way by far to\n"
+"Translation of the website is done with .po files. The easiest way by far"
+" to\n"
"translate the website is to sign up for an account at \n"
-"Transifex and request to join a translation team. \n"
+"Transifex and request to join a translation"
+" team. \n"
"Alternatively it can be done \"the old way\" as outlined below."
msgstr ""
@@ -3150,8 +3600,10 @@ msgstr "Elaboração"
msgid ""
"Come to #i2p-dev on irc and talk to people.\n"
"Claim the language -\n"
-"To make sure other coworkers don't bump onto the files you are working on,\n"
-"please update the translation status on this wiki page."
+"To make sure other coworkers don't bump onto the files you are working "
+"on,\n"
+"please update the translation status on this wiki "
+"page."
msgstr ""
#: i2p2www/pages/site/get-involved/guides/new-translators.html:25
@@ -3171,9 +3623,12 @@ msgstr ""
#: i2p2www/pages/site/get-involved/guides/new-translators.html:38
msgid ""
-"Run \"./extract-messages.sh
\" to generate a messages.pot
in the base directory.\n"
-"Edit the header of this file, then run \"./init-new-po.sh locale
\" to generate the file\n"
-"i2p2www/translations/locale/LC_MESSAGES/messages.po
. \"mtn add
\" this file."
+"Run \"./extract-messages.sh
\" to generate a "
+"messages.pot
in the base directory.\n"
+"Edit the header of this file, then run \"./init-new-po.sh "
+"locale
\" to generate the file\n"
+"i2p2www/translations/locale/LC_MESSAGES/messages.po
. "
+"\"mtn add
\" this file."
msgstr ""
#: i2p2www/pages/site/get-involved/guides/new-translators.html:43
@@ -3184,23 +3639,27 @@ msgstr ""
#: i2p2www/pages/site/get-involved/guides/new-translators.html:46
msgid ""
-"Add a flag image file to i2p2www/static/images/flags/
for the "
-"menu (copy from the router)."
+"Add a flag image file to i2p2www/static/images/flags/
for "
+"the menu (copy from the router)."
msgstr ""
#: i2p2www/pages/site/get-involved/guides/new-translators.html:52
msgid ""
"Edit files:\n"
"Edit i2p2www/translations/locale/LC_MESSAGES/messages.po
.\n"
-"To work with .po files efficiently, you may wish to use POEdit"
+"To work with .po files efficiently, you may wish to use POEdit"
msgstr ""
#: i2p2www/pages/site/get-involved/guides/new-translators.html:58
#: i2p2www/pages/site/get-involved/guides/new-translators.html:151
msgid ""
"Check in:\n"
-"\"mtn pull
\", \"mtn update
\". Then check in by \"mtn ci -k yourname@mail.i2p file1 file2 ...
\"\n"
-"This collects the diff info of your changed file into your local repo. Then \"mtn sync mtn.i2p2.de -k yourname-transport@mail.i2p i2p.i2p
\".\n"
+"\"mtn pull
\", \"mtn update
\". Then check in by "
+"\"mtn ci -k yourname@mail.i2p file1 file2 ...
\"\n"
+"This collects the diff info of your changed file into your local repo. "
+"Then \"mtn sync mtn.i2p2.de -k yourname-transport@mail.i2p "
+"i2p.i2p
\".\n"
"This synchronizes your local repo with the repo on the target machine."
msgstr ""
@@ -3216,8 +3675,10 @@ msgstr "Como traduzir o painel do roteador"
#: i2p2www/pages/site/get-involved/guides/new-translators.html:74
#, python-format
msgid ""
-"The easiest way by far to translate the router console is to sign up for an account at \n"
-"Transifex and request to join a translation team. \n"
+"The easiest way by far to translate the router console is to sign up for "
+"an account at \n"
+"Transifex and request to join a translation"
+" team. \n"
"Alternatively it can be done \"the old way\" as outlined below."
msgstr ""
@@ -3235,7 +3696,8 @@ msgstr ""
#: i2p2www/pages/site/get-involved/guides/new-translators.html:101
msgid ""
-"Before starting a console translation, better help translate some i2p webpages first.\n"
+"Before starting a console translation, better help translate some i2p "
+"webpages first.\n"
"At least an i2p homepage in your language would be great."
msgstr ""
@@ -3248,15 +3710,19 @@ msgstr ""
#: i2p2www/pages/site/get-involved/guides/new-translators.html:132
msgid ""
"Where xx is your language code like fr/de/ch/zh/...\n"
-"There may be or may not be files with your lang code. If not, you can create your own. by copying and renaming other language files you know with your own lang code."
+"There may be or may not be files with your lang code. If not, you can "
+"create your own. by copying and renaming other language files you know "
+"with your own lang code."
msgstr ""
#: i2p2www/pages/site/get-involved/guides/new-translators.html:137
msgid ""
"Create files:\n"
-"If the file for your language does not exist yet, copy another language file to a new file foo_xx.bar
for your language.\n"
+"If the file for your language does not exist yet, copy another language "
+"file to a new file foo_xx.bar
for your language.\n"
"Then \"mtn add
\" the file.\n"
-"After creating a .po file, edit the headers. Then run \"ant distclean poupdate
\"."
+"After creating a .po file, edit the headers. Then run \"ant "
+"distclean poupdate
\"."
msgstr ""
#: i2p2www/pages/site/get-involved/guides/new-translators.html:144
@@ -3264,13 +3730,15 @@ msgid ""
"Start to work:\n"
"Edit the HTML files with any text editor.\n"
"Be sure not to use an editor in HTML mode that reformats everything.\n"
-"To work with .po files efficiently, you may wish to use POEdit"
+"To work with .po files efficiently, you may wish to use POEdit"
msgstr ""
#: i2p2www/pages/site/get-involved/guides/new-translators.html:163
msgid ""
"As you can see, it's not that difficult.\n"
-"If you have questions about the meaning of the terms in the console, ask in #i2p-dev
on IRC."
+"If you have questions about the meaning of the terms in the console, ask "
+"in #i2p-dev
on IRC."
msgstr ""
#: i2p2www/pages/site/get-involved/guides/new-translators.html:169
@@ -3279,8 +3747,8 @@ msgstr "Perguntas mais frequentes"
#: i2p2www/pages/site/get-involved/guides/new-translators.html:171
msgid ""
-"Q: Why do I have to install monotone, Java, jsp, learn about .po files and "
-"html, etc.? Why can't I just do a translation and email it to you?"
+"Q: Why do I have to install monotone, Java, jsp, learn about .po files "
+"and html, etc.? Why can't I just do a translation and email it to you?"
msgstr ""
#: i2p2www/pages/site/get-involved/guides/new-translators.html:175
@@ -3296,65 +3764,67 @@ msgstr ""
#: i2p2www/pages/site/get-involved/guides/new-translators.html:182
msgid ""
-"We don't have anybody who has time to accept manual contributions and submit"
-" them to our source control system on your behalf. Even if we did, it "
-"doesn't scale."
+"We don't have anybody who has time to accept manual contributions and "
+"submit them to our source control system on your behalf. Even if we did, "
+"it doesn't scale."
msgstr ""
#: i2p2www/pages/site/get-involved/guides/new-translators.html:186
msgid ""
"Maybe you are thinking translation is a one-step process. It isn't. You "
"can't do it all at once. You will make mistakes. You need to test it and "
-"tweak it to make it look right before you submit it. Developers will "
-"update or add to the English text, thus requiring a translation update."
+"tweak it to make it look right before you submit it. Developers "
+"will update or add to the English text, thus requiring a translation "
+"update."
msgstr ""
#: i2p2www/pages/site/get-involved/guides/new-translators.html:190
msgid ""
"Having translators use a source control system directly provides "
-"authentication and accountablility - we know who is doing what, and we can "
-"track changes, and revert them if necessary."
+"authentication and accountablility - we know who is doing what, and we "
+"can track changes, and revert them if necessary."
msgstr ""
#: i2p2www/pages/site/get-involved/guides/new-translators.html:194
msgid ""
-".po files are not difficult. If you don't want to work directly with them, "
-"we recommend 'poedit'."
+".po files are not difficult. If you don't want to work directly with "
+"them, we recommend 'poedit'."
msgstr ""
#: i2p2www/pages/site/get-involved/guides/new-translators.html:198
msgid ""
-"HTML files are not difficult. Just ignore the html stuff and translate the "
-"text."
+"HTML files are not difficult. Just ignore the html stuff and translate "
+"the text."
msgstr ""
#: i2p2www/pages/site/get-involved/guides/new-translators.html:202
msgid ""
"Installing and using monotone is not that difficult. Several of the "
-"translators and other contributors to I2P are non-programmers, and they use "
-"monotone regularly. Monotone is simply a source control system, it is not "
-"about \"coding\"."
+"translators and other contributors to I2P are non-programmers, and they "
+"use monotone regularly. Monotone is simply a source control system, it is"
+" not about \"coding\"."
msgstr ""
#: i2p2www/pages/site/get-involved/guides/new-translators.html:206
msgid ""
"Our items to translate are not \"documents\". They are html files and po "
-"files, with a specific format and character encoding (UTF-8) that must be "
-"maintained, and not corrupted by email programs or other methods of "
+"files, with a specific format and character encoding (UTF-8) that must be"
+" maintained, and not corrupted by email programs or other methods of "
"transfer."
msgstr ""
#: i2p2www/pages/site/get-involved/guides/new-translators.html:210
msgid ""
-"We looked at 'pootle' as a front-end for translators. It didn't work well, "
-"needed an administrator, and a pootle-based process would suffer from a "
-"number of the above flaws."
+"We looked at 'pootle' as a front-end for translators. It didn't work "
+"well, needed an administrator, and a pootle-based process would suffer "
+"from a number of the above flaws."
msgstr ""
#: i2p2www/pages/site/get-involved/guides/new-translators.html:215
msgid ""
"In summary:\n"
-"Yes, we know it is somewhat of a hurdle to get started. It's really the only possible way we can do it. Give it a try, it really isn't that hard."
+"Yes, we know it is somewhat of a hurdle to get started. It's really the "
+"only possible way we can do it. Give it a try, it really isn't that hard."
msgstr ""
#: i2p2www/pages/site/get-involved/guides/new-translators.html:220
@@ -3366,4 +3836,8 @@ msgstr "Informações adicionais"
msgid ""
"The #i2p-dev channel on IRC, or the translation forum on %(zzz)s."
-msgstr "No canal #i2p-dev no IRC; ou na sessão de traduções do fórum em %(zzz)s."
+msgstr ""
+"No canal #i2p-dev no IRC; ou na sessão de traduções do fórum em "
+"%(zzz)s."
+
diff --git a/i2p2www/translations/ru/LC_MESSAGES/blog.po b/i2p2www/translations/ru/LC_MESSAGES/blog.po
index b5e5cb76..80cd63d2 100644
--- a/i2p2www/translations/ru/LC_MESSAGES/blog.po
+++ b/i2p2www/translations/ru/LC_MESSAGES/blog.po
@@ -1,34 +1,31 @@
-# Translations template for I2P.
+# Russian translations for I2P.
# Copyright (C) 2014 ORGANIZATION
# This file is distributed under the same license as the I2P project.
-#
+#
# Translators:
# Petr Polyakov, 2014
# dimi http://i2p-projekt.i2p/hosts.txt (http://udhdrtrcetjm5sxzskjyr5ztpeszydbh4dpl3pl4utgqqw2v4jna.b32.i2p/hosts.txt)
, \n"
+"default is http://i2p-projekt.i2p/hosts.txt "
+"(http://udhdrtrcetjm5sxzskjyr5ztpeszydbh4dpl3pl4utgqqw2v4jna.b32.i2p/hosts.txt)
,"
+" \n"
"which contains a copy of the hosts.txt included\n"
"in the I2P release.\n"
"Users must configure additional subscriptions in their\n"
-"local addressbook application (via subscriptions.txt or SusiDNS)."
+"local addressbook application (via subscriptions.txt or SusiDNS)."
msgstr ""
#: i2p2www/pages/site/docs/naming.html:211
@@ -809,9 +972,13 @@ msgstr "Ссылки на некоторые другие подписки пу
#: i2p2www/pages/site/docs/naming.html:218
msgid ""
-"The operators of these services may have various policies for listing hosts.\n"
+"The operators of these services may have various policies for listing "
+"hosts.\n"
"Presence on this list does not imply endorsement."
-msgstr "У операторов этих служб могут быть различные политики для просмотра списка узлов. \nВ соответствии с этим, список может быть не ободрен."
+msgstr ""
+"У операторов этих служб могут быть различные политики для просмотра "
+"списка узлов. \n"
+"В соответствии с этим, список может быть не ободрен."
#: i2p2www/pages/site/docs/naming.html:223
#: i2p2www/pages/site/docs/naming.html:235
@@ -820,15 +987,26 @@ msgstr "Правила Именования"
#: i2p2www/pages/site/docs/naming.html:224
msgid ""
-"While there are hopefully not any technical limitations within I2P on host names,\n"
+"While there are hopefully not any technical limitations within I2P on "
+"host names,\n"
"the addressbook enforces several restrictions on host names\n"
"imported from subscriptions.\n"
-"It does this for basic typographical sanity and compatibility with browsers,\n"
+"It does this for basic typographical sanity and compatibility with "
+"browsers,\n"
"and for security.\n"
"The rules are essentially the same as those in RFC2396 Section 3.2.2.\n"
"Any hostnames violating these rules may not be propagated\n"
"to other routers."
-msgstr "К счастью, нет никаких технических ограничений на имена узлов в I2P, но \nадресная книга накладывает некоторые ограничения на имена узлов, \nимпортированные из подписок. \nЭто делается для соблюдения основных правил именования, совместимости с браузерами и \nс целью безопасности.\nЭти правила в сущности такие же, как описанные в Разделе 3.2.2 RFC2396. \nЛюбые имена узлов, нарушающие эти правила, не должны распространятся \nна другие маршрутизаторы."
+msgstr ""
+"К счастью, нет никаких технических ограничений на имена узлов в I2P, но \n"
+"адресная книга накладывает некоторые ограничения на имена узлов, \n"
+"импортированные из подписок. \n"
+"Это делается для соблюдения основных правил именования, совместимости с "
+"браузерами и \n"
+"с целью безопасности.\n"
+"Эти правила в сущности такие же, как описанные в Разделе 3.2.2 RFC2396. \n"
+"Любые имена узлов, нарушающие эти правила, не должны распространятся \n"
+"на другие маршрутизаторы."
#: i2p2www/pages/site/docs/naming.html:239
msgid "Names are converted to lower case on import."
@@ -836,14 +1014,19 @@ msgstr "При импорте имена приводятся к нижнему
#: i2p2www/pages/site/docs/naming.html:243
msgid ""
-"Names are checked for conflict with existing names in the existing userhosts.txt and hosts.txt\n"
+"Names are checked for conflict with existing names in the existing "
+"userhosts.txt and hosts.txt\n"
"(but not privatehosts.txt) after conversion to lower case."
-msgstr "После приведения к нижнему регистру имена проверяются на конфликты с имеющимися \nименами в userhosts.txt и hosts.txt (но не в privatehosts.txt)."
+msgstr ""
+"После приведения к нижнему регистру имена проверяются на конфликты с "
+"имеющимися \n"
+"именами в userhosts.txt и hosts.txt (но не в privatehosts.txt)."
#: i2p2www/pages/site/docs/naming.html:248
-msgid ""
-"Must contain only [a-z] [0-9] '.' and '-' after conversion to lower case."
-msgstr "После приведения к нижнему регистру должны содержать только [a-z] [0-9] '.' и '-'."
+msgid "Must contain only [a-z] [0-9] '.' and '-' after conversion to lower case."
+msgstr ""
+"После приведения к нижнему регистру должны содержать только [a-z] [0-9] "
+"'.' и '-'."
#: i2p2www/pages/site/docs/naming.html:252
msgid "Must not start with '.' or '-'."
@@ -878,8 +1061,13 @@ msgstr ""
#: i2p2www/pages/site/docs/naming.html:280
msgid ""
"Certain hostnames reserved for project use are not allowed\n"
-"(proxy.i2p, router.i2p, console.i2p, *.proxy.i2p, *.router.i2p, *.console.i2p, and others)"
-msgstr "Определенные имена узлов, зарезервированые для использования проектом, не допускаются \n(proxy.i2p, router.i2p, console.i2p, *.proxy.i2p, *.router.i2p, *.console.i2p, и другие)"
+"(proxy.i2p, router.i2p, console.i2p, *.proxy.i2p, *.router.i2p, "
+"*.console.i2p, and others)"
+msgstr ""
+"Определенные имена узлов, зарезервированые для использования проектом, не"
+" допускаются \n"
+"(proxy.i2p, router.i2p, console.i2p, *.proxy.i2p, *.router.i2p, "
+"*.console.i2p, и другие)"
#: i2p2www/pages/site/docs/naming.html:285
msgid "Keys are checked for base64 validity."
@@ -889,7 +1077,9 @@ msgstr "Ключи проверяются на соответствие base64."
msgid ""
"Keys are checked for conflict with existing keys in hosts.txt (but not "
"privatehosts.txt)."
-msgstr "Ключи проверяются на конфликты с существующими ключами в hosts.txt (но не в privatehosts.txt)."
+msgstr ""
+"Ключи проверяются на конфликты с существующими ключами в hosts.txt (но не"
+" в privatehosts.txt)."
#: i2p2www/pages/site/docs/naming.html:293
msgid "Minimum key length 516 bytes."
@@ -901,8 +1091,8 @@ msgstr "Максимальный размер ключа 616 байт (для н
#: i2p2www/pages/site/docs/naming.html:302
msgid ""
-"Any name received via subscription that passes all the checks is added via "
-"the local naming service."
+"Any name received via subscription that passes all the checks is added "
+"via the local naming service."
msgstr ""
#: i2p2www/pages/site/docs/naming.html:306
@@ -915,21 +1105,44 @@ msgid ""
"Methods to deny subdomains to non-domain 'owners' (certificates?),\n"
"and the desirability and feasibility of these methods,\n"
"are topics for future discussion."
-msgstr "Учтите, что символ '.' в имени узла не имеет особого смысла, \nИ не говорит о фактической иерархии имен или доверия. \nЕсли имя 'host.i2p' уже существует, ничто не мешает \nкому-нибудь добавить имя 'a.host.i2p' в свой hosts.txt, \nи это имя может быть импортировано в другие адресные книги. \nМетоды запрета заведения субдоменов не \"владельцами\" домена (сертификата?), \nцелесообразность и осуществимость этих методов это \nпредмет для будущих обсуждений."
+msgstr ""
+"Учтите, что символ '.' в имени узла не имеет особого смысла, \n"
+"И не говорит о фактической иерархии имен или доверия. \n"
+"Если имя 'host.i2p' уже существует, ничто не мешает \n"
+"кому-нибудь добавить имя 'a.host.i2p' в свой hosts.txt, \n"
+"и это имя может быть импортировано в другие адресные книги. \n"
+"Методы запрета заведения субдоменов не \"владельцами\" домена "
+"(сертификата?), \n"
+"целесообразность и осуществимость этих методов это \n"
+"предмет для будущих обсуждений."
#: i2p2www/pages/site/docs/naming.html:317
msgid ""
-"International Domain Names (IDN) also work in i2p (using punycode 'xn--' form).\n"
-"To see IDN .i2p domain names rendered correctly in Firefox's location bar,\n"
+"International Domain Names (IDN) also work in i2p (using punycode 'xn--' "
+"form).\n"
+"To see IDN .i2p domain names rendered correctly in Firefox's location "
+"bar,\n"
"add 'network.IDN.whitelist.i2p (boolean) = true' in about:config."
-msgstr "Также в I2P работают интернационализованные доменные имена (IDN) (используя форму punycode 'xn--').\nЧтобы IDN имена домена .i2p корректно отображались в адресной строке Firefox,\nдобавьте 'network.IDN.whitelist.i2p (boolean) = true' в about:config."
+msgstr ""
+"Также в I2P работают интернационализованные доменные имена (IDN) "
+"(используя форму punycode 'xn--').\n"
+"Чтобы IDN имена домена .i2p корректно отображались в адресной строке "
+"Firefox,\n"
+"добавьте 'network.IDN.whitelist.i2p (boolean) = true' в about:config."
#: i2p2www/pages/site/docs/naming.html:323
msgid ""
-"As the addressbook application does not use privatehosts.txt at all, in practice\n"
-"this file is the only place where it is appropriate to place private aliases or\n"
+"As the addressbook application does not use privatehosts.txt at all, in "
+"practice\n"
+"this file is the only place where it is appropriate to place private "
+"aliases or\n"
"\"pet names\" for sites already in hosts.txt."
-msgstr "Поскольку приложение адресной книги совсем не использует privatehosts.txt, то на практике \nэтот файл - единственно верное место, куда стоит поместить личные синонимы или \n\"клички\" для сайтов, которые уже есть в hosts.txt."
+msgstr ""
+"Поскольку приложение адресной книги совсем не использует "
+"privatehosts.txt, то на практике \n"
+"этот файл - единственно верное место, куда стоит поместить личные "
+"синонимы или \n"
+"\"клички\" для сайтов, которые уже есть в hosts.txt."
#: i2p2www/pages/site/docs/naming.html:329
msgid "Outgoing Subscriptions"
@@ -938,34 +1151,57 @@ msgstr "Исходящие Подписки"
#: i2p2www/pages/site/docs/naming.html:330
msgid ""
"Addressbook will publish the merged hosts.txt to a location\n"
-"(traditionally hosts.txt in the local eepsite's home directory) to be accessed by others\n"
+"(traditionally hosts.txt in the local eepsite's home directory) to be "
+"accessed by others\n"
"for their subscriptions.\n"
"This step is optional and is disabled by default."
-msgstr "Адресная книга публикует объединенный hosts.txt с местоположении \n(традиционно это hosts.txt в домашней директории локального eepsite), доступном другим \nпо их подпискам. \nЭтот шаг необязателен и по умолчанию отключен."
+msgstr ""
+"Адресная книга публикует объединенный hosts.txt с местоположении \n"
+"(традиционно это hosts.txt в домашней директории локального eepsite), "
+"доступном другим \n"
+"по их подпискам. \n"
+"Этот шаг необязателен и по умолчанию отключен."
#: i2p2www/pages/site/docs/naming.html:338
msgid ""
-"The addressbook application, together with eepget, saves the Etag and/or Last-Modified\n"
+"The addressbook application, together with eepget, saves the Etag and/or "
+"Last-Modified\n"
"information returned by the web server of the subscription.\n"
"This greatly reduces the bandwidth required, as the web server will\n"
"return a '304 Not Modified' on the next fetch if nothing has changed."
-msgstr "Приложение адресной книги, совместно с eepget, сохраняет Etag и/или информацию о \nпоследнем изменении, полученную веб сервером по подписке. \nЭто существенно снижает требования к полосе пропускания, т.к. веб сервер \nвернет '304 Not Modified' при следующем получении, если изменений не было."
+msgstr ""
+"Приложение адресной книги, совместно с eepget, сохраняет Etag и/или "
+"информацию о \n"
+"последнем изменении, полученную веб сервером по подписке. \n"
+"Это существенно снижает требования к полосе пропускания, т.к. веб сервер"
+" \n"
+"вернет '304 Not Modified' при следующем получении, если изменений не было."
#: i2p2www/pages/site/docs/naming.html:345
msgid ""
"However the entire hosts.txt is downloaded if it has changed.\n"
"See below for discussion on this issue."
-msgstr "Тем не менее, содержимое hosts.txt загружается, если он был изменен. \nОбсуждение этой темы смотри ниже."
+msgstr ""
+"Тем не менее, содержимое hosts.txt загружается, если он был изменен. \n"
+"Обсуждение этой темы смотри ниже."
#: i2p2www/pages/site/docs/naming.html:350
msgid ""
"Hosts serving a static hosts.txt or an equivalent CGI application\n"
"are strongly encouraged to deliver\n"
"a Content-Length header, and either an Etag or Last-Modified header.\n"
-"Also ensure that the server delivers a '304 Not Modified' when appropriate.\n"
+"Also ensure that the server delivers a '304 Not Modified' when "
+"appropriate.\n"
"This will dramatically reduce the network bandwidth, and\n"
"reduce chances of corruption."
-msgstr "Узлу, обслуживающему статичный hosts.txt, или эквивалентному приложению CGI \nнастоятельно рекомендуется отправлять \nзаголовок Content-Length, либо Etag или заголовок Last-Modified. \nУбедитесь также, что сервер по необходимости выдает '304 Not Modified'. \nЭто существенно уменьшить пропускную способность сети, и \nуменьшит вероятность повреждения."
+msgstr ""
+"Узлу, обслуживающему статичный hosts.txt, или эквивалентному приложению "
+"CGI \n"
+"настоятельно рекомендуется отправлять \n"
+"заголовок Content-Length, либо Etag или заголовок Last-Modified. \n"
+"Убедитесь также, что сервер по необходимости выдает '304 Not Modified'. \n"
+"Это существенно уменьшить пропускную способность сети, и \n"
+"уменьшит вероятность повреждения."
#: i2p2www/pages/site/docs/naming.html:359
msgid "Host Add Services"
@@ -973,17 +1209,31 @@ msgstr "Службы Добавления Узла"
#: i2p2www/pages/site/docs/naming.html:360
msgid ""
-"A host add service is a simple CGI application that takes a hostname and a Base64 key as parameters\n"
+"A host add service is a simple CGI application that takes a hostname and "
+"a Base64 key as parameters\n"
"and adds that to its local hosts.txt.\n"
"If other routers subscribe to that hosts.txt, the new hostname/key\n"
"will be propagated through the network."
-msgstr "Служба добавления узла это простое приложение CGI, которое принимает имя узла и Base64 ключ в качестве параметров, \nи добавляет их в локальный hosts.txt. \nЕсли другие маршрутизаторы подписаны на этот hosts.txt, то новая пара имя узла/ключ \nбудет передана по сети."
+msgstr ""
+"Служба добавления узла это простое приложение CGI, которое принимает имя "
+"узла и Base64 ключ в качестве параметров, \n"
+"и добавляет их в локальный hosts.txt. \n"
+"Если другие маршрутизаторы подписаны на этот hosts.txt, то новая пара имя"
+" узла/ключ \n"
+"будет передана по сети."
#: i2p2www/pages/site/docs/naming.html:367
msgid ""
-"It is recommended that host add services impose, at a minimum, the restrictions imposed by the addressbook application listed above.\n"
-"Host add services may impose additional restrictions on hostnames and keys, for example:"
-msgstr "На службу добавления узла, как минимум, рекомендуется наложить ограничения, совпадающие с ограничениями \nприложения адресной книги, описанными выше. \nНа службу добавления узла могут быть наложены дополнительные ограничения на имя узла и ключ, например:"
+"It is recommended that host add services impose, at a minimum, the "
+"restrictions imposed by the addressbook application listed above.\n"
+"Host add services may impose additional restrictions on hostnames and "
+"keys, for example:"
+msgstr ""
+"На службу добавления узла, как минимум, рекомендуется наложить "
+"ограничения, совпадающие с ограничениями \n"
+"приложения адресной книги, описанными выше. \n"
+"На службу добавления узла могут быть наложены дополнительные ограничения "
+"на имя узла и ключ, например:"
#: i2p2www/pages/site/docs/naming.html:372
msgid "A limit on number of 'subdomains'."
@@ -1035,41 +1285,68 @@ msgstr "Службы перехода"
#: i2p2www/pages/site/docs/naming.html:418
msgid ""
-"A jump service is a simple CGI application that takes a hostname as a parameter\n"
-"and returns a 301 redirect to the proper URL with a ?i2paddresshelper=key
\n"
+"A jump service is a simple CGI application that takes a hostname as a "
+"parameter\n"
+"and returns a 301 redirect to the proper URL with a "
+"?i2paddresshelper=key
\n"
"string appended.\n"
"The HTTP proxy will interpret the appended string and\n"
"use that key as the actual destination.\n"
"In addition, the proxy will cache that key so the\n"
"address helper is not necessary until restart."
-msgstr "Служба перехода это простое CGI приложение, которое получает имя узла в качестве параметра, \nи возвращает перенаправление 301 на правильный URL с добавлением строки \n?i2paddresshelper=key
. \nHTTP прокси интерпретирует добавленную строку и \nиспользует этот ключ как актуальный пункт назначения. \nКроме того, прокси кеширует этот ключ, так что \naddress helper не нужен до перезапуска."
+msgstr ""
+"Служба перехода это простое CGI приложение, которое получает имя узла в "
+"качестве параметра, \n"
+"и возвращает перенаправление 301 на правильный URL с добавлением строки \n"
+"?i2paddresshelper=key
. \n"
+"HTTP прокси интерпретирует добавленную строку и \n"
+"использует этот ключ как актуальный пункт назначения. \n"
+"Кроме того, прокси кеширует этот ключ, так что \n"
+"address helper не нужен до перезапуска."
#: i2p2www/pages/site/docs/naming.html:428
msgid ""
"Note that, like with subscriptions, using a jump service\n"
"implies a certain amount of trust, as a jump service could maliciously\n"
"redirect a user to an incorrect destination."
-msgstr "Учтите, что как и с подписками, использование службы перехода \nтребует части доверия, так как служба перехода может злонамеренно \nперенаправить пользователя в некорректный пункт назначения."
+msgstr ""
+"Учтите, что как и с подписками, использование службы перехода \n"
+"требует части доверия, так как служба перехода может злонамеренно \n"
+"перенаправить пользователя в некорректный пункт назначения."
#: i2p2www/pages/site/docs/naming.html:434
msgid ""
"To provide the best service, a jump service should be subscribed to\n"
"several hosts.txt providers so that its local host list is current."
-msgstr "Для предоставления лучшего уровня сервиса служба перехода должна быть подписана на \nнесколько провайдеров hosts.txt, т.о. локальный список узлов будет актуальным."
+msgstr ""
+"Для предоставления лучшего уровня сервиса служба перехода должна быть "
+"подписана на \n"
+"несколько провайдеров hosts.txt, т.о. локальный список узлов будет "
+"актуальным."
#: i2p2www/pages/site/docs/naming.html:440
msgid ""
-"SusiDNS is simply a web interface front-end to configuring addressbook subscriptions\n"
+"SusiDNS is simply a web interface front-end to configuring addressbook "
+"subscriptions\n"
"and accessing the four addressbook files.\n"
"All the real work is done by the 'addressbook' application."
-msgstr "SusiDNS это просто веб-интерфейс для настройки подписок адресной книги\nи для доступа к четырем ее файлам. \nВся настоящая работа выполняется приложением 'адресная книга'."
+msgstr ""
+"SusiDNS это просто веб-интерфейс для настройки подписок адресной книги\n"
+"и для доступа к четырем ее файлам. \n"
+"Вся настоящая работа выполняется приложением 'адресная книга'."
#: i2p2www/pages/site/docs/naming.html:446
msgid ""
-"Currently, there is little enforcement of addressbook naming rules within SusiDNS,\n"
+"Currently, there is little enforcement of addressbook naming rules within"
+" SusiDNS,\n"
"so a user may enter hostnames locally that would be rejected by\n"
"the addressbook subscription rules."
-msgstr "На данный момент в SusiDNS реализовано мало правил ограничения именования адресной книги, \nтак что пользователь может локально ввести имя узла, которое будет отвергнуто \nв соответствии с правилами подписки адресной книги."
+msgstr ""
+"На данный момент в SusiDNS реализовано мало правил ограничения именования"
+" адресной книги, \n"
+"так что пользователь может локально ввести имя узла, которое будет "
+"отвергнуто \n"
+"в соответствии с правилами подписки адресной книги."
#: i2p2www/pages/site/docs/naming.html:452
msgid "Base32 Names"
@@ -1080,33 +1357,52 @@ msgid ""
"I2P supports Base32 hostnames similar to Tor's .onion addresses.\n"
"Base32 addresses are much shorter and easier to handle than the\n"
"full 516-character Base64 Destinations or addresshelpers.\n"
-"Example: ukeu3k5oycgaauneqgtnvselmt4yemvoilkln7jpvamvfx7dnkdq.b32.i2p
"
-msgstr "I2P поддерживает Base32 имена узлов по аналогии с .onion адресами Tor. \nBase32 адреса гораздо короче и их проще обрабатывать, чем \nполные 516-символьные Base64 пункты назначения или addresshelper-ы. \nПример: ukeu3k5oycgaauneqgtnvselmt4yemvoilkln7jpvamvfx7dnkdq.b32.i2p
"
+"Example: "
+"ukeu3k5oycgaauneqgtnvselmt4yemvoilkln7jpvamvfx7dnkdq.b32.i2p
"
+msgstr ""
+"I2P поддерживает Base32 имена узлов по аналогии с .onion адресами Tor. \n"
+"Base32 адреса гораздо короче и их проще обрабатывать, чем \n"
+"полные 516-символьные Base64 пункты назначения или addresshelper-ы. \n"
+"Пример: "
+"ukeu3k5oycgaauneqgtnvselmt4yemvoilkln7jpvamvfx7dnkdq.b32.i2p
"
#: i2p2www/pages/site/docs/naming.html:460
#, python-format
msgid ""
-"In Tor, the address is 16 characters (80 bits), or half of the SHA-1 hash.\n"
+"In Tor, the address is 16 characters (80 bits), or half of the SHA-1 "
+"hash.\n"
"I2P uses 52 characters (256 bits) to represent the full SHA-256 hash.\n"
"The form is {52 chars}.b32.i2p.\n"
"Tor has recently published a\n"
-"proposal\n"
-"to convert to an identical format of {52 chars}.onion for their hidden services.\n"
+"proposal\n"
+"to convert to an identical format of {52 chars}.onion for their hidden "
+"services.\n"
"Base32 is implemented in the naming service, which queries the\n"
"router over I2CP to lookup the LeaseSet to get the full Destination.\n"
-"Base32 lookups will only be successful when the Destination is up and publishing\n"
+"Base32 lookups will only be successful when the Destination is up and "
+"publishing\n"
"a LeaseSet.\n"
-"Because resolution may require a network database lookup, it may take significantly\n"
+"Because resolution may require a network database lookup, it may take "
+"significantly\n"
"longer than a local address book lookup."
msgstr ""
#: i2p2www/pages/site/docs/naming.html:475
msgid ""
-"Base32 addresses can be used in most places where hostnames or full destinations\n"
+"Base32 addresses can be used in most places where hostnames or full "
+"destinations\n"
"are used, however there are some exceptions where they may fail if the\n"
"name does not immediately resolve. I2PTunnel will fail, for example, if\n"
"the name does not resolve to a destination."
-msgstr "Base32 адреса могут быть использованы в большинстве случаев, где используются имена узлов \nили полные пункты назначения, тем не менее есть несколько исключений, когда это может вызвать ошибку, если \nимя не может быть преобразовано в адрес. Например, в I2PTunnel возникнет ошибка, если \nимя не разрешается в пункт назначения."
+msgstr ""
+"Base32 адреса могут быть использованы в большинстве случаев, где "
+"используются имена узлов \n"
+"или полные пункты назначения, тем не менее есть несколько исключений, "
+"когда это может вызвать ошибку, если \n"
+"имя не может быть преобразовано в адрес. Например, в I2PTunnel возникнет "
+"ошибка, если \n"
+"имя не разрешается в пункт назначения."
#: i2p2www/pages/site/docs/plugins.html:2
#: i2p2www/pages/site/docs/spec/configuration.html:152
@@ -1125,13 +1421,19 @@ msgstr "Основная информация"
msgid ""
"I2P includes a plugin architecture\n"
"to support easy development and installation of additional software."
-msgstr "В I2P имеется архитектура плагинов \nдля поддержки легкой разработки и установки дополнительного ПО."
+msgstr ""
+"В I2P имеется архитектура плагинов \n"
+"для поддержки легкой разработки и установки дополнительного ПО."
#: i2p2www/pages/site/docs/plugins.html:12
msgid ""
-"There are now plugins available that support distributed email, blogs, IRC\n"
+"There are now plugins available that support distributed email, blogs, "
+"IRC\n"
"clients, distributed file storage, wikis, and more."
-msgstr "Уже сейчас доступны плагины с поддержкой распределенной электронной почты, блогов, \nклиентов IRC, распределенного хранилища файлов, wiki и др."
+msgstr ""
+"Уже сейчас доступны плагины с поддержкой распределенной электронной "
+"почты, блогов, \n"
+"клиентов IRC, распределенного хранилища файлов, wiki и др."
#: i2p2www/pages/site/docs/plugins.html:17
msgid "Benefits to i2p users and app developers:"
@@ -1145,13 +1447,20 @@ msgstr "Простое распространение приложений"
msgid ""
"Allows innovation and use of additional libraries without worrying about\n"
"increasing the size of i2pupdate.sud
"
-msgstr "Позволяет использовать инновации и дополнительные библиотеки, не беспокоясь об \nувеличении размера i2pupdate.sud
"
+msgstr ""
+"Позволяет использовать инновации и дополнительные библиотеки, не "
+"беспокоясь об \n"
+"увеличении размера i2pupdate.sud
"
#: i2p2www/pages/site/docs/plugins.html:31
msgid ""
-"Support large or special-purpose applications that would never be bundled\n"
+"Support large or special-purpose applications that would never be bundled"
+"\n"
"with the I2P installation"
-msgstr "Поддержка больших или специализированных приложений, которые никогда не будут связаны \nс установкой I2P"
+msgstr ""
+"Поддержка больших или специализированных приложений, которые никогда не "
+"будут связаны \n"
+"с установкой I2P"
#: i2p2www/pages/site/docs/plugins.html:36
msgid "Cryptographically signed and verified applications"
@@ -1163,15 +1472,20 @@ msgstr "Автоматическое обновление приложений,
#: i2p2www/pages/site/docs/plugins.html:44
msgid ""
-"Separate initial install and update packages, if desired, for smaller update"
-" downloads"
-msgstr "Отдельные начальная установка и пакеты обновлений, по желанию, для уменьшения размера загружаемых обновлений"
+"Separate initial install and update packages, if desired, for smaller "
+"update downloads"
+msgstr ""
+"Отдельные начальная установка и пакеты обновлений, по желанию, для "
+"уменьшения размера загружаемых обновлений"
#: i2p2www/pages/site/docs/plugins.html:48
msgid ""
"One-click installation of applications. No more asking users to modify\n"
"wrapper.config
or clients.config
"
-msgstr "Установка приложений в один клик. Не спрашивая пользователей об изменении \nwrapper.config
или clients.config
"
+msgstr ""
+"Установка приложений в один клик. Не спрашивая пользователей об изменении"
+" \n"
+"wrapper.config
или clients.config
"
#: i2p2www/pages/site/docs/plugins.html:53
msgid "Isolate applications from the base $I2P
installation"
@@ -1181,7 +1495,9 @@ msgstr "Изолирование приложений от базовой уст
msgid ""
"Automatic compatibility checking for I2P version, Java version, Jetty\n"
"version, and previous installed application version"
-msgstr "Автоматическая проверка совместимости с версией I2P, Java, Jetty \nи предыдущей установленной версией приложения"
+msgstr ""
+"Автоматическая проверка совместимости с версией I2P, Java, Jetty \n"
+"и предыдущей установленной версией приложения"
#: i2p2www/pages/site/docs/plugins.html:62
msgid "Automatic link addition in console"
@@ -1191,19 +1507,24 @@ msgstr "Автоматическое добавление ссылки в кон
msgid ""
"Automatic startup of application, including modifying classpath, without "
"requiring a restart"
-msgstr "Автоматический запуск приложения, включая модификацию classpath без необходимости перезапуска"
+msgstr ""
+"Автоматический запуск приложения, включая модификацию classpath без "
+"необходимости перезапуска"
#: i2p2www/pages/site/docs/plugins.html:70
-msgid ""
-"Automatic integration and startup of webapps into console Jetty instance"
-msgstr "Автоматическая интеграция и запуск веб-приложения в консольном экземпляре Jetty"
+msgid "Automatic integration and startup of webapps into console Jetty instance"
+msgstr ""
+"Автоматическая интеграция и запуск веб-приложения в консольном экземпляре"
+" Jetty"
#: i2p2www/pages/site/docs/plugins.html:74
#, python-format
msgid ""
"Facilitate creation of 'app stores' like the one at\n"
"%(pluginsite)s"
-msgstr "Облегченное создание 'app stores', как для \n%(pluginsite)s"
+msgstr ""
+"Облегченное создание 'app stores', как для \n"
+"%(pluginsite)s"
#: i2p2www/pages/site/docs/plugins.html:79
msgid "One-click uninstall"
@@ -1235,23 +1556,55 @@ msgstr "Установка"
#: i2p2www/pages/site/docs/plugins.html:101
msgid ""
-"To install and start a plugin, copy the .xpi2p
install link to\n"
+"To install and start a plugin, copy the .xpi2p
install link "
+"to\n"
"the form at the bottom of\n"
-"configclients.jsp in\n"
-"your router console and click the \"install plugin\" button. After a\n"
-"plugin is installed and started, a link to the plugin will usually appear at\n"
+"configclients.jsp"
+" in\n"
+"your router console and click the \"install plugin\" button. After a"
+"\n"
+"plugin is installed and started, a link to the plugin will usually appear"
+" at\n"
"the top of your summary bar."
-msgstr "Чтобы установить и запустить плагин, скопируйте ссылку на установщик .xpi2p
в \nформу внизу \nconfigclients.jsp в \nконсоли вашего маршрутизатора и нажмите кнопку \"install plugin\". После \nустановки и запуска плагина ссылка на него обычно появляется вверху \nвашей строки состояния."
+msgstr ""
+"Чтобы установить и запустить плагин, скопируйте ссылку на установщик "
+".xpi2p
в \n"
+"форму внизу \n"
+"configclients.jsp"
+" в \n"
+"консоли вашего маршрутизатора и нажмите кнопку \"install plugin\". "
+"После \n"
+"установки и запуска плагина ссылка на него обычно появляется вверху \n"
+"вашей строки состояния."
#: i2p2www/pages/site/docs/plugins.html:110
msgid ""
-"To update a plugin to the latest version, just click the update button on\n"
-"configclients.jsp.\n"
-"There is also a button to check if the plugin has a more recent version, as\n"
-"well as a button to check for updates for all plugins. Plugins will be checked\n"
-"for updates automatically when updating to a new I2P release (not including dev\n"
+"To update a plugin to the latest version, just click the update button on"
+"\n"
+"configclients.jsp."
+"\n"
+"There is also a button to check if the plugin has a more recent version, "
+"as\n"
+"well as a button to check for updates for all plugins. Plugins will be "
+"checked\n"
+"for updates automatically when updating to a new I2P release (not "
+"including dev\n"
"builds)."
-msgstr "Чтобы обновить плагин до последней версии, просто нажмите кнопку обновления в \nconfigclients.jsp. \nТакже есть кнопка для проверки актуальности версии плагина, как и \nкнопка проверки наличия обновления для плагина. Проверка наличия обновлений для\nплагинов будет выполнена при обновлении I2P до нового релиза (за исключением \nтестовых сборок)."
+msgstr ""
+"Чтобы обновить плагин до последней версии, просто нажмите кнопку "
+"обновления в \n"
+"configclients.jsp."
+" \n"
+"Также есть кнопка для проверки актуальности версии плагина, как и \n"
+"кнопка проверки наличия обновления для плагина. Проверка наличия "
+"обновлений для\n"
+"плагинов будет выполнена при обновлении I2P до нового релиза (за "
+"исключением \n"
+"тестовых сборок)."
#: i2p2www/pages/site/docs/plugins.html:120
msgid "Development"
@@ -1260,23 +1613,37 @@ msgstr "Разработка"
#: i2p2www/pages/site/docs/plugins.html:121
#, python-format
msgid ""
-"See the latest plugin specification and the\n"
+"See the latest plugin specification and "
+"the\n"
"plugin forum on %(zzz)s."
-msgstr "Смотри актуальную спецификацию плагинов и\nфорум о плагинах на %(zzz)s."
+msgstr ""
+"Смотри актуальную спецификацию плагинов и\n"
+"форум о плагинах на %(zzz)s."
#: i2p2www/pages/site/docs/plugins.html:126
#, python-format
msgid ""
-"See also the sources for plugins developed by various people. Some plugins, such\n"
-"as snowman, were developed\n"
+"See also the sources for plugins developed by various people. Some "
+"plugins, such\n"
+"as snowman, were "
+"developed\n"
"specifically as examples."
-msgstr "Также смотри исходники плагинов, разработанных другими людьми. Некоторые плагины, такие\nкак snowman, были разработаны\nспециально в качестве примеров."
+msgstr ""
+"Также смотри исходники плагинов, разработанных другими людьми. Некоторые "
+"плагины, такие\n"
+"как snowman, были "
+"разработаны\n"
+"специально в качестве примеров."
#: i2p2www/pages/site/docs/plugins.html:132
msgid ""
-"Developers wanted! Plugins are a great way to learn more about I2P\n"
+"Developers wanted! Plugins are a great way to learn more about I2P"
+"\n"
"or easily add some feature."
-msgstr "Разыскиваются разработчики! Плагины это замечательная возможность узнать больше о I2P,\nили легко добавить новую возможность."
+msgstr ""
+"Разыскиваются разработчики! Плагины это замечательная возможность "
+"узнать больше о I2P,\n"
+"или легко добавить новую возможность."
#: i2p2www/pages/site/docs/plugins.html:137
msgid "Getting Started"
@@ -1286,8 +1653,11 @@ msgstr "С чего начать"
#, python-format
msgid ""
"To create a plugin from an existing binary package you will need to get\n"
-"makeplugin.sh from the i2p.scripts branch in monotone."
-msgstr "Чтобы сделать плагин из имеющегося исполняемого пакета вам понадобится \nmakeplugin.sh из ветки i2p.scripts в monotone."
+"makeplugin.sh from the i2p.scripts branch in "
+"monotone."
+msgstr ""
+"Чтобы сделать плагин из имеющегося исполняемого пакета вам понадобится \n"
+"makeplugin.sh из ветки i2p.scripts в monotone."
#: i2p2www/pages/site/docs/plugins.html:144
msgid "Known Issues"
@@ -1297,14 +1667,23 @@ msgstr "Известные проблемы"
msgid ""
"Note that the router's plugin architecture does NOT currently\n"
"provide any additional security isolation or sandboxing of plugins."
-msgstr "Учтите, что архитектура плагинов маршрутизатора на данный момент НЕ \nпредоставляет дополнительную изоляцию безопасности или запуск плагинов в песочнице."
+msgstr ""
+"Учтите, что архитектура плагинов маршрутизатора на данный момент "
+"НЕ \n"
+"предоставляет дополнительную изоляцию безопасности или запуск плагинов в "
+"песочнице."
#: i2p2www/pages/site/docs/plugins.html:151
msgid ""
"Updates of a plugin with included jars (not wars) won't be recognized if\n"
-"the plugin was already run, as it requires class loader trickery to flush the\n"
+"the plugin was already run, as it requires class loader trickery to flush"
+" the\n"
"class cache; a full router restart is required."
-msgstr "Обновление плагина с jar-файлами (но не war) не будет распознано, если \nплагин уже запущен, т.к. для этого требуется, чтобы загрузчик классов сбросил \nкэш классов; необходим полный перезапуск маршрутизатора."
+msgstr ""
+"Обновление плагина с jar-файлами (но не war) не будет распознано, если \n"
+"плагин уже запущен, т.к. для этого требуется, чтобы загрузчик классов "
+"сбросил \n"
+"кэш классов; необходим полный перезапуск маршрутизатора."
#: i2p2www/pages/site/docs/plugins.html:157
msgid "The stop button may be displayed even if there is nothing to stop."
@@ -1312,28 +1691,47 @@ msgstr "Кнопка остановки может отображаться, д
#: i2p2www/pages/site/docs/plugins.html:161
msgid ""
-"Plugins running in a separate JVM create a logs/
directory in\n"
+"Plugins running in a separate JVM create a logs/
directory "
+"in\n"
+"$CWD
."
+msgstr ""
+"Плагины, запущенные в отдельном JVM, создают директорию "
+"logs/
в \n"
"$CWD
."
-msgstr "Плагины, запущенные в отдельном JVM, создают директорию logs/
в \n$CWD
."
#: i2p2www/pages/site/docs/plugins.html:166
msgid ""
-"No initial keys are present, except for those of jrandom and zzz (using the\n"
+"No initial keys are present, except for those of jrandom and zzz (using "
+"the\n"
"same keys as for router update), so the first key seen for a signer is\n"
"automatically accepted—there is no signing key authority."
-msgstr "Нет никаких первоначальных ключей, за исключением ключей jrandom и zzz (используются \nте же ключи, что и для обновления маршрутизатора), так что первый ключ, доступный для подписания, \nавтоматически принимается—авторизация подписывающих ключей отсутствует."
+msgstr ""
+"Нет никаких первоначальных ключей, за исключением ключей jrandom и zzz "
+"(используются \n"
+"те же ключи, что и для обновления маршрутизатора), так что первый ключ, "
+"доступный для подписания, \n"
+"автоматически принимается—авторизация подписывающих ключей "
+"отсутствует."
#: i2p2www/pages/site/docs/plugins.html:172
msgid ""
-"When deleting a plugin, the directory is not always deleted, especially on\n"
+"When deleting a plugin, the directory is not always deleted, especially "
+"on\n"
+"Windows."
+msgstr ""
+"При удалении плагина директории не всегда удаляются, особенно в \n"
"Windows."
-msgstr "При удалении плагина директории не всегда удаляются, особенно в \nWindows."
#: i2p2www/pages/site/docs/plugins.html:177
msgid ""
-"Installing a plugin requiring Java 1.6 on a Java 1.5 machine will result in a\n"
-"\"plugin is corrupt\" message if pack200 compression of the plugin file is used."
-msgstr "При установке плагинов, требующих Java 1.6, на машине с Java 1.5 возникнет \nсообщение \"plugin is corrupt\", если используется pack200 сжатие плагина."
+"Installing a plugin requiring Java 1.6 on a Java 1.5 machine will result "
+"in a\n"
+"\"plugin is corrupt\" message if pack200 compression of the plugin file "
+"is used."
+msgstr ""
+"При установке плагинов, требующих Java 1.6, на машине с Java 1.5 "
+"возникнет \n"
+"сообщение \"plugin is corrupt\", если используется pack200 сжатие плагина."
#: i2p2www/pages/site/docs/plugins.html:182
msgid "Theme and translation plugins are untested."
@@ -1353,10 +1751,15 @@ msgstr "Май 2013"
#: i2p2www/pages/site/docs/ports.html:7
msgid ""
-"These are the ports used or reserved by I2P, including those for known plugins,\n"
+"These are the ports used or reserved by I2P, including those for known "
+"plugins,\n"
"common alternates,\n"
"and some typical related applications."
-msgstr "Ниже приведены порты, используемые или зарезервированные под нужды I2P, включая порты для \nизвестных плагинов, общих альтернатив \nи некоторых типичных связанных приложений."
+msgstr ""
+"Ниже приведены порты, используемые или зарезервированные под нужды I2P, "
+"включая порты для \n"
+"известных плагинов, общих альтернатив \n"
+"и некоторых типичных связанных приложений."
#: i2p2www/pages/site/docs/ports.html:13
#, python-format
@@ -1367,7 +1770,13 @@ msgid ""
"Plugin authors please add any ports you use here.\n"
"For new plugins, we recommend using the next available port\n"
"in the 766x range."
-msgstr "Учтите, что многие из них не задействованы по умолчанию. \nБольше информации есть в FAQ. \nТакже смотри документацию по конкретным плагинам. \nАвторы плагинов, пожалуйста, добавляйте сюда все используемые порты. \nДля новых плагинов мы рекомендуем использовать следующий доступный порт \nиз диапазона 766x."
+msgstr ""
+"Учтите, что многие из них не задействованы по умолчанию. \n"
+"Больше информации есть в FAQ. \n"
+"Также смотри документацию по конкретным плагинам. \n"
+"Авторы плагинов, пожалуйста, добавляйте сюда все используемые порты. \n"
+"Для новых плагинов мы рекомендуем использовать следующий доступный порт \n"
+"из диапазона 766x."
#: i2p2www/pages/site/docs/ports.html:53
msgid "recommended spot for new plugins/applications"
@@ -1395,21 +1804,36 @@ msgid ""
"The command channel is only needed for making or setting the initial\n"
"destination key, and to set the destination key to port bindings. \n"
"All connections run in parallel."
-msgstr "BOB имеет раздельные каналы для команд и данных. \nОдин - сокет канала команд приложения к маршрутизатору для настройки. \nВторой - сокеты данных приложения к/от маршрутизатора, только для передачи данных. \nКанал команд нужен только для создания или задания начального ключа пункта назначения, \nи для установки связи ключа пункта назначения и порта. \nВсе соединения запускаются параллельно."
+msgstr ""
+"BOB имеет раздельные каналы для команд и данных. \n"
+"Один - сокет канала команд приложения к маршрутизатору для настройки. \n"
+"Второй - сокеты данных приложения к/от маршрутизатора, только для "
+"передачи данных. \n"
+"Канал команд нужен только для создания или задания начального ключа "
+"пункта назначения, \n"
+"и для установки связи ключа пункта назначения и порта. \n"
+"Все соединения запускаются параллельно."
#: i2p2www/pages/site/docs/api/bob.html:23
msgid ""
"SAM has one connection that does everything, and you need to parse every "
"packet."
-msgstr "В SAM все выполняется через одно соединение, и вам приходится разбирать каждый пакет."
+msgstr ""
+"В SAM все выполняется через одно соединение, и вам приходится разбирать "
+"каждый пакет."
#: i2p2www/pages/site/docs/api/bob.html:27
msgid ""
"BOB does not hold keypair values, nor does the router.\n"
"Your application holds the keypair values. \n"
-"This is to reduce any extra complexity in the router code, it also adds to\n"
+"This is to reduce any extra complexity in the router code, it also adds "
+"to\n"
"your privacy."
-msgstr "BOB не хранит значений пары ключей, как и маршрутизатор. \nВаше приложение хранит значения пары ключей. \nЭто сделано для уменьшения сложности кода маршрутизатор, \nэто также добавляет вам приватности."
+msgstr ""
+"BOB не хранит значений пары ключей, как и маршрутизатор. \n"
+"Ваше приложение хранит значения пары ключей. \n"
+"Это сделано для уменьшения сложности кода маршрутизатор, \n"
+"это также добавляет вам приватности."
#: i2p2www/pages/site/docs/api/bob.html:34
msgid "SAM router stores every keypair you ever make."
@@ -1430,41 +1854,65 @@ msgstr "KEY
= public ключ, также BASE64"
#: i2p2www/pages/site/docs/api/bob.html:48
msgid ""
"ERROR
as is implied returns the message \"ERROR "
-"\"+DESCRIPTION+\"\\n\"
, where the DESCRIPTION
is what "
-"went wrong."
-msgstr "ERROR
как и предполагается, возвращает сообщение \"ERROR \"+DESCRIPTION+\"\\n\"
, где DESCRIPTION
это описание проблемы."
+"\"+DESCRIPTION+\"\\n\", where the DESCRIPTION
is what"
+" went wrong."
+msgstr ""
+"ERROR
как и предполагается, возвращает сообщение "
+"\"ERROR \"+DESCRIPTION+\"\\n\"
, где DESCRIPTION
"
+" это описание проблемы."
#: i2p2www/pages/site/docs/api/bob.html:51
msgid ""
-"OK
returns \"OK\"
, and if data is to be returned, "
-"it is on the same line. OK
means the command is finished."
-msgstr "OK
возвращает \"OK\"
, и если есть возвращаемые данные, они буду расположены в этой же строке. OK
означает, что команда выполнена."
+"OK
returns \"OK\"
, and if data is to be "
+"returned, it is on the same line. OK
means the command is "
+"finished."
+msgstr ""
+"OK
возвращает \"OK\"
, и если есть возвращаемые "
+"данные, они буду расположены в этой же строке. OK
означает, "
+"что команда выполнена."
#: i2p2www/pages/site/docs/api/bob.html:54
msgid ""
-"DATA
lines contain information that you requested. There may be"
-" multiple DATA
lines per request."
-msgstr "Строка DATA
содержит информацию, которую вы запросили. Может быть несколько строк DATA
на один запрос."
+"DATA
lines contain information that you requested. There may"
+" be multiple DATA
lines per request."
+msgstr ""
+"Строка DATA
содержит информацию, которую вы запросили. Может"
+" быть несколько строк DATA
на один запрос."
#: i2p2www/pages/site/docs/api/bob.html:58
msgid ""
-"NOTE: The help command is the ONLY command that has an exception to\n"
+"NOTE: The help command is the ONLY command that has an exception "
+"to\n"
"the rules... it can actually return nothing! This is intentional, since\n"
"help is a HUMAN and not an APPLICATION command."
-msgstr "Примечание: Команда help - ЕДИНСТВЕННАЯ команда, для которой есть исключения из\nправил... Она может ничего не возвращать! Это сделано намеренно, поскольку \nhelp это команда для ЧЕЛОВЕКА, а не для ПРИЛОЖЕНИЯ."
+msgstr ""
+"Примечание: Команда help - ЕДИНСТВЕННАЯ команда, для которой есть "
+"исключения из\n"
+"правил... Она может ничего не возвращать! Это сделано намеренно, "
+"поскольку \n"
+"help это команда для ЧЕЛОВЕКА, а не для ПРИЛОЖЕНИЯ."
#: i2p2www/pages/site/docs/api/bob.html:64
msgid ""
"PLEASE NOTE:\n"
-"For CURRENT details on the commands PLEASE use the built-in help command. \n"
-"Just telnet to localhost 2827 and type help and you can get full documentation on each command."
-msgstr "ПОЖАЛУЙСТА УЧТИТЕ:\nДля получения АКТУАЛЬНЫХ подробностей по командам ПОЖАЛУЙСТА используйте встроенную команду help.\nПросто подключитесь по telnet к localhost 2827 и введите help, и вы получите полную документацию по каждой команде."
+"For CURRENT details on the commands PLEASE use the built-in help command."
+" \n"
+"Just telnet to localhost 2827 and type help and you can get full "
+"documentation on each command."
+msgstr ""
+"ПОЖАЛУЙСТА УЧТИТЕ:\n"
+"Для получения АКТУАЛЬНЫХ подробностей по командам ПОЖАЛУЙСТА используйте "
+"встроенную команду help.\n"
+"Просто подключитесь по telnet к localhost 2827 и введите help, и вы "
+"получите полную документацию по каждой команде."
#: i2p2www/pages/site/docs/api/bob.html:70
msgid ""
-"Commands never get obsoleted or changed, however new commands do get added "
-"from time to time."
-msgstr "Команды никогда не устаревают и не изменяются, тем не менее, новые команды время от времени появляются."
+"Commands never get obsoleted or changed, however new commands do get "
+"added from time to time."
+msgstr ""
+"Команды никогда не устаревают и не изменяются, тем не менее, новые "
+"команды время от времени появляются."
#: i2p2www/pages/site/docs/api/bob.html:74
msgid "Here are the commands we have as of this writing:"
@@ -1484,32 +1932,79 @@ msgstr "ВОЗВРАЩАЕТ"
#: i2p2www/pages/site/docs/api/bob.html:106
msgid ""
-"Once set up, all TCP sockets can and will block as needed, and there is no need for any \n"
-"additional messages to/from the command channel. This allows the router to pace the\n"
-"stream without exploding with OOM like SAM does as it chokes on attempting to shove \n"
-"many streams in or out one socket -- that can't scale when you have alot of connections!"
-msgstr "После установки все необходимые TCP сокеты могут и будут заблокированы, и нет необходимости в \nдополнительных сообщениях в/из канал команд. Это позволяет маршрутизатору проходить \nпоток без разрыва с OOM, в отличие от SAM, который захлебывается при попытке впихнуть \nнесколько потоков в или из одного сокета -- это не поддается масштабированию при наличии большого числа подключений!"
+"Once set up, all TCP sockets can and will block as needed, and there is "
+"no need for any \n"
+"additional messages to/from the command channel. This allows the router "
+"to pace the\n"
+"stream without exploding with OOM like SAM does as it chokes on "
+"attempting to shove \n"
+"many streams in or out one socket -- that can't scale when you have alot "
+"of connections!"
+msgstr ""
+"После установки все необходимые TCP сокеты могут и будут заблокированы, и"
+" нет необходимости в \n"
+"дополнительных сообщениях в/из канал команд. Это позволяет маршрутизатору"
+" проходить \n"
+"поток без разрыва с OOM, в отличие от SAM, который захлебывается при "
+"попытке впихнуть \n"
+"несколько потоков в или из одного сокета -- это не поддается "
+"масштабированию при наличии большого числа подключений!"
#: i2p2www/pages/site/docs/api/bob.html:113
msgid ""
-"What is also nice about this particular interface is that writing anything to interface \n"
-"to it, is much much easier than SAM. There is no other processing to do after the set up.\n"
-"It's configuration is so simple, that very simple tools, such as nc (netcat) can be used \n"
-"to point to some application. The value there is that one could schedule up and down times \n"
-"for an application, and not have to change the application to do that, or to even have \n"
-"to stop that application. Instead, you can literally \"unplug\" the destination, and \n"
-"\"plug it in\" again. As long as the same IP/port addresses and destination keys are used \n"
-"when bringing the bridge up, the normal TCP application won't care, and won't notice.\n"
-"It will simply be fooled -- the destinations are not reachable, and that nothing is coming in."
-msgstr "Есть еще одна замечательная вещь в этом специфическом интерфейсе - написать что угодно, подключающееся к нему, \nнамного проще, чем к SAM. Не нужно делать ничего дополнительного после установки. \nЕго настройка настолько проста, что любое просто средство, как например nc (netcat), можно использовать \nдля указания на какое-то приложение. Смысле в том, что можно запланировать время запуска и остановки \nприложения, и для этого не нужно изменять его, или, даже, \nостанавливать это приложение. Вместо этого вы можете буквально \"вынуть\" пункт назначения, и \n\"вставить\" снова. Поскольку для восстановления моста используются та же пара IP/порт и ключи, \nто обычному приложению это не важно, и оно не будет даже об этом знать. \nОно просто будет обмануто -- пункт назначения недоступен, и ничего не поступает на вход."
+"What is also nice about this particular interface is that writing "
+"anything to interface \n"
+"to it, is much much easier than SAM. There is no other processing to do "
+"after the set up.\n"
+"It's configuration is so simple, that very simple tools, such as nc "
+"(netcat) can be used \n"
+"to point to some application. The value there is that one could schedule "
+"up and down times \n"
+"for an application, and not have to change the application to do that, or"
+" to even have \n"
+"to stop that application. Instead, you can literally \"unplug\" the "
+"destination, and \n"
+"\"plug it in\" again. As long as the same IP/port addresses and "
+"destination keys are used \n"
+"when bringing the bridge up, the normal TCP application won't care, and "
+"won't notice.\n"
+"It will simply be fooled -- the destinations are not reachable, and that "
+"nothing is coming in."
+msgstr ""
+"Есть еще одна замечательная вещь в этом специфическом интерфейсе - "
+"написать что угодно, подключающееся к нему, \n"
+"намного проще, чем к SAM. Не нужно делать ничего дополнительного после "
+"установки. \n"
+"Его настройка настолько проста, что любое просто средство, как например "
+"nc (netcat), можно использовать \n"
+"для указания на какое-то приложение. Смысле в том, что можно "
+"запланировать время запуска и остановки \n"
+"приложения, и для этого не нужно изменять его, или, даже, \n"
+"останавливать это приложение. Вместо этого вы можете буквально \"вынуть\""
+" пункт назначения, и \n"
+"\"вставить\" снова. Поскольку для восстановления моста используются та же"
+" пара IP/порт и ключи, \n"
+"то обычному приложению это не важно, и оно не будет даже об этом знать. \n"
+"Оно просто будет обмануто -- пункт назначения недоступен, и ничего не "
+"поступает на вход."
#: i2p2www/pages/site/docs/api/bob.html:125
msgid ""
-"For the following example, we'll setup a very simple local loopback connection, \n"
-"with two destinations. Destination \"mouth\" will be the CHARGEN service from \n"
-"the INET superserver daemon. Destination \"ear\" will be a local port that you\n"
+"For the following example, we'll setup a very simple local loopback "
+"connection, \n"
+"with two destinations. Destination \"mouth\" will be the CHARGEN service "
+"from \n"
+"the INET superserver daemon. Destination \"ear\" will be a local port "
+"that you\n"
"can telnet into, and watch the pretty ASCII test puke forth."
-msgstr "В следующем примере мы установим очень простое закольцованное локальное подключение \nс двумя пунктами назначения. Пунктом \"mouth\" будет служба CHARGEN \nдемона суперсервера INET. Пунктом \"ear\" будет локальный порт, к которому \nвы можете подключиться по telnet и увидеть забавный тест с символами ASCII."
+msgstr ""
+"В следующем примере мы установим очень простое закольцованное локальное "
+"подключение \n"
+"с двумя пунктами назначения. Пунктом \"mouth\" будет служба CHARGEN \n"
+"демона суперсервера INET. Пунктом \"ear\" будет локальный порт, к "
+"которому \n"
+"вы можете подключиться по telnet и увидеть забавный тест с символами "
+"ASCII."
#: i2p2www/pages/site/docs/api/bob.html:133
msgid "EXAMPLE SESSION DIALOGUE -- simple telnet 127.0.0.1 2827 works"
@@ -1556,33 +2051,50 @@ msgstr "ОБРАТИТЕ ВНИМАНИЕ НА КЛЮЧ НАЗНАЧЕНИЯ В
#: i2p2www/pages/site/docs/api/bob.html:158
msgid ""
-"At this point, there was no error, a destination with a nickname of \"mouth\" \n"
-"is set up. When you contact the destination provided, you actually connect \n"
+"At this point, there was no error, a destination with a nickname of "
+"\"mouth\" \n"
+"is set up. When you contact the destination provided, you actually "
+"connect \n"
"to the CHARGEN
service on 19/TCP
."
-msgstr "Пока что ошибки не было, пункт назначения с именем \"mouth\" \nустановлен. Когда вы подключаетесь к указанному пункту, вы на самом деле \nсоединяетесь со службой CHARGEN
на порту 19/TCP
."
+msgstr ""
+"Пока что ошибки не было, пункт назначения с именем \"mouth\" \n"
+"установлен. Когда вы подключаетесь к указанному пункту, вы на самом деле"
+" \n"
+"соединяетесь со службой CHARGEN
на порту 19/TCP
."
#: i2p2www/pages/site/docs/api/bob.html:164
-msgid ""
-"Now for the other half, so that we can actually contact this destination."
-msgstr "А теперь вторая половина, мы на самом деле подключаемся к пункту назначения."
+msgid "Now for the other half, so that we can actually contact this destination."
+msgstr ""
+"А теперь вторая половина, мы на самом деле подключаемся к пункту "
+"назначения."
#: i2p2www/pages/site/docs/api/bob.html:184
msgid ""
"Now all we need to do is telnet into 127.0.0.1, port 37337,\n"
-"send the destination key or host address from addressbook we want to contact.\n"
+"send the destination key or host address from addressbook we want to "
+"contact.\n"
"In this case, we want to contact \"mouth\", all we do is paste in the\n"
"key and it goes."
-msgstr "Все что нам теперь осталось сделать - подключиться по telnet к 127.0.0.1 на порт 37337, отправить ключ пункта назначения или адрес узла из адресной книги, к которому мы хотим подключиться. \nВ нашем случае, мы хотим подключиться к \"mouth\", мы вставляем \nключ и понеслась."
+msgstr ""
+"Все что нам теперь осталось сделать - подключиться по telnet к 127.0.0.1 "
+"на порт 37337, отправить ключ пункта назначения или адрес узла из "
+"адресной книги, к которому мы хотим подключиться. \n"
+"В нашем случае, мы хотим подключиться к \"mouth\", мы вставляем \n"
+"ключ и понеслась."
#: i2p2www/pages/site/docs/api/bob.html:191
msgid ""
-"NOTE: The \"quit\" command in the command channel does NOT disconnect"
-" the tunnels like SAM."
-msgstr "ПРИМЕЧАНИЕ: Команда \"quit\" в канале команд НЕ выполняет разрыв соединения туннелей, как это делает SAM."
+"NOTE: The \"quit\" command in the command channel does NOT "
+"disconnect the tunnels like SAM."
+msgstr ""
+"ПРИМЕЧАНИЕ: Команда \"quit\" в канале команд НЕ выполняет разрыв "
+"соединения туннелей, как это делает SAM."
#: i2p2www/pages/site/docs/api/bob.html:208
msgid "After a few virtual miles of this spew, press Control-]
"
-msgstr "После пары виртуальных километров этой отрыжки нажмите Control-]
"
+msgstr ""
+"После пары виртуальных километров этой отрыжки нажмите "
+"Control-]
"
#: i2p2www/pages/site/docs/api/bob.html:220
msgid "Here is what happened..."
@@ -1594,15 +2106,28 @@ msgstr "Также вы не можете подключиться к EEPSITE!"
#: i2p2www/pages/site/docs/api/bob.html:261
msgid ""
-"Pretty cool isn't it? Try some other well known EEPSITES if you like, nonexistent ones, \n"
-"etc, to get a feel for what kind of output to expect in different situations. \n"
-"For the most part, it is suggested that you ignore any of the error messages. \n"
-"They would be meaningless to the application, and are only presented for human debugging."
-msgstr "Прикольно, правда? Если хотите, попробуйте другие известные EEPSITE, несуществующие, \nи т.д., чтобы понять что можно ожидать на выходе в различных ситуациях. \nПо большей части предполагается что вы игнорируете любые сообщения об ошибках. \nОни будут бессмысленными для приложения, и выводятся только для отладки человеком."
+"Pretty cool isn't it? Try some other well known EEPSITES if you like, "
+"nonexistent ones, \n"
+"etc, to get a feel for what kind of output to expect in different "
+"situations. \n"
+"For the most part, it is suggested that you ignore any of the error "
+"messages. \n"
+"They would be meaningless to the application, and are only presented for "
+"human debugging."
+msgstr ""
+"Прикольно, правда? Если хотите, попробуйте другие известные EEPSITE, "
+"несуществующие, \n"
+"и т.д., чтобы понять что можно ожидать на выходе в различных ситуациях. \n"
+"По большей части предполагается что вы игнорируете любые сообщения об "
+"ошибках. \n"
+"Они будут бессмысленными для приложения, и выводятся только для отладки "
+"человеком."
#: i2p2www/pages/site/docs/api/bob.html:268
msgid "Let's put down our destinations now that we are all done with them."
-msgstr "Давайте теперь отключим наши пункты назначения, т.к. мы уже с ними закончили."
+msgstr ""
+"Давайте теперь отключим наши пункты назначения, т.к. мы уже с ними "
+"закончили."
#: i2p2www/pages/site/docs/api/bob.html:272
msgid "First, lets see what destination nicknames we have."
@@ -1614,16 +2139,23 @@ msgstr "Отлично, вот и они. Сначала давайте убер
#: i2p2www/pages/site/docs/api/bob.html:298
msgid ""
-"Now to remove \"ear\", note that this is what happens when you type too fast,\n"
+"Now to remove \"ear\", note that this is what happens when you type too "
+"fast,\n"
"and shows you what typical ERROR messages looks like."
-msgstr "Теперь уберем \"ear\", и вот что происходит когда вы печатаете слишком быстро, \nтакже вы увидите как выглядят типичные сообщения об ОШИБКАХ."
+msgstr ""
+"Теперь уберем \"ear\", и вот что происходит когда вы печатаете слишком "
+"быстро, \n"
+"также вы увидите как выглядят типичные сообщения об ОШИБКАХ."
#: i2p2www/pages/site/docs/api/bob.html:317
msgid ""
"I won't bother to show an example of the receiver end of a bridge\n"
"because it is very simple. There are two possible settings for it, and\n"
"it is toggled with the \"quiet\" command."
-msgstr "Я не стану показывать пример получателя моста, \nпотому что это слишком просто. Для него есть два доступных режима, \nи они переключаются командой \"quiet\"."
+msgstr ""
+"Я не стану показывать пример получателя моста, \n"
+"потому что это слишком просто. Для него есть два доступных режима, \n"
+"и они переключаются командой \"quiet\"."
#: i2p2www/pages/site/docs/api/bob.html:323
msgid ""
@@ -1631,7 +2163,12 @@ msgid ""
"listening socket is the destination that is making the contact. It is a\n"
"single line consisting of the BASE64 address followed by a newline.\n"
"Everything after that is for the application to actually consume."
-msgstr "По умолчанию этот режим отключен, и первые данные, которые приходят на \nваш слушающий сокет - это пункт назначения, который к вам подключается. \nЭто одна строка, состоящая из BASE64 адреса, оканчивающаяся переводом строки. \nВсе остальное после нее предназначено для обработки приложением."
+msgstr ""
+"По умолчанию этот режим отключен, и первые данные, которые приходят на \n"
+"ваш слушающий сокет - это пункт назначения, который к вам подключается. \n"
+"Это одна строка, состоящая из BASE64 адреса, оканчивающаяся переводом "
+"строки. \n"
+"Все остальное после нее предназначено для обработки приложением."
#: i2p2www/pages/site/docs/api/bob.html:330
msgid ""
@@ -1641,7 +2178,18 @@ msgid ""
"is available on the router console tunnel settings pages, so that you\n"
"can use BOB to point a destination at a web server, for example, and\n"
"you would not have to modify the web server at all."
-msgstr "Тихий режим можете себе представить в виде обычного интернет подключения. \nНикаких дополнительных данных не приходит вовсе. Просто как будто вы подключились \nк обычному интернету. Этот режим предоставляет такую же форму прозрачности, какая \nдоступна на странице настроек туннеля консоли маршрутизатора, и поэтому вы \nможете использовать BOB, например, для указания пункта назначения на веб-сервере, \nи вам совсем не нужно изменять веб-сервер."
+msgstr ""
+"Тихий режим можете себе представить в виде обычного интернет подключения."
+" \n"
+"Никаких дополнительных данных не приходит вовсе. Просто как будто вы "
+"подключились \n"
+"к обычному интернету. Этот режим предоставляет такую же форму "
+"прозрачности, какая \n"
+"доступна на странице настроек туннеля консоли маршрутизатора, и поэтому "
+"вы \n"
+"можете использовать BOB, например, для указания пункта назначения на "
+"веб-сервере, \n"
+"и вам совсем не нужно изменять веб-сервер."
#: i2p2www/pages/site/docs/api/bob.html:339
msgid ""
@@ -1656,7 +2204,24 @@ msgid ""
"and point to a different machine on your LAN while you do updates, or\n"
"point to a set of backup machines depending on what is running, etc,\n"
"etc. Only your imagination limits what you could do with BOB."
-msgstr "Преимущества использования BOB, как описано ранее. \nВы можете запланировать произвольное время работы приложения, \nперенаправить а другую машину, и т.п. Одним из применений этого может быть \nжелание попробовать испортить оценку доступности канала \"маршрутизатор\"-\"пункт назначения\". \nВы можете опускать и поднимать пункт назначения совершенно другим \nспособом, чтобы выполнять произвольную остановку и запуск службы. Таким методом вы \nбудете только отключать возможность подключения к такой службе, и не будете \nвынуждены останавливать и перезапускать ее. Вы можете перенаправить \nили указать на другую машину в вашей LAN пока вы выполняете обновление, \nили указать на набор запасных машин, в зависимости от того что запущено, и т.д. \nВаши возможности взаимодействия с BOB ограничены только вашим воображением."
+msgstr ""
+"Преимущества использования BOB, как описано ранее. \n"
+"Вы можете запланировать произвольное время работы приложения, \n"
+"перенаправить а другую машину, и т.п. Одним из применений этого может "
+"быть \n"
+"желание попробовать испортить оценку доступности канала "
+"\"маршрутизатор\"-\"пункт назначения\". \n"
+"Вы можете опускать и поднимать пункт назначения совершенно другим \n"
+"способом, чтобы выполнять произвольную остановку и запуск службы. Таким "
+"методом вы \n"
+"будете только отключать возможность подключения к такой службе, и не "
+"будете \n"
+"вынуждены останавливать и перезапускать ее. Вы можете перенаправить \n"
+"или указать на другую машину в вашей LAN пока вы выполняете обновление, \n"
+"или указать на набор запасных машин, в зависимости от того что запущено, "
+"и т.д. \n"
+"Ваши возможности взаимодействия с BOB ограничены только вашим "
+"воображением."
#: i2p2www/pages/site/docs/api/datagrams.html:6
msgid "Datagram Overview"
@@ -1665,23 +2230,47 @@ msgstr "Обзор Дейтаграмм"
#: i2p2www/pages/site/docs/api/datagrams.html:7
#, python-format
msgid ""
-"Datagrams build upon the base I2CP to provide authenticated\n"
-"and repliable messages in a standard format. This lets applications reliably read\n"
-"the \"from\" address out of a datagram and know that the address really sent the\n"
-"message. This is necessary for some applications since the base I2P message is\n"
-"completely raw - it has no \"from\" address (unlike IP packets). In addition, the\n"
+"Datagrams build upon the base I2CP to provide "
+"authenticated\n"
+"and repliable messages in a standard format. This lets applications "
+"reliably read\n"
+"the \"from\" address out of a datagram and know that the address really "
+"sent the\n"
+"message. This is necessary for some applications since the base I2P "
+"message is\n"
+"completely raw - it has no \"from\" address (unlike IP packets). In "
+"addition, the\n"
"message and sender are authenticated by signing the payload."
-msgstr "Дейтаграммы строятся на основе I2CP, и предоставляют аутентифицированные \nсообщения в стандартном формате, на которые можно ответить. Это позволяет приложениям читать \nдостоверный адрес \"От\" в дейтаграмме, и узнать с какого адреса на самом деле \nотправлено сообщение. Это важно для некоторых приложений, поскольку базовое сообщение I2P \nне форматировано - в нем нет адреса \"от\" (как это есть в IP). Кроме того, \nсообщение и отправитель аутентифицируются по подписи на данных."
+msgstr ""
+"Дейтаграммы строятся на основе I2CP, и "
+"предоставляют аутентифицированные \n"
+"сообщения в стандартном формате, на которые можно ответить. Это позволяет"
+" приложениям читать \n"
+"достоверный адрес \"От\" в дейтаграмме, и узнать с какого адреса на самом"
+" деле \n"
+"отправлено сообщение. Это важно для некоторых приложений, поскольку "
+"базовое сообщение I2P \n"
+"не форматировано - в нем нет адреса \"от\" (как это есть в IP). Кроме "
+"того, \n"
+"сообщение и отправитель аутентифицируются по подписи на данных."
#: i2p2www/pages/site/docs/api/datagrams.html:16
#, python-format
msgid ""
"Datagrams, like streaming library packets,\n"
"are an application-level construct.\n"
-"These protocols are independent of the low-level transports;\n"
+"These protocols are independent of the low-level transports;\n"
"the protocols are converted to I2NP messages by the router, and\n"
"either protocol may be carried by either transport."
-msgstr "Дейтаграммы, как и пакеты потоковой библиотеки,\nявляются конструкциями уровня приложения.\nЭти протоколы не зависят от низкоуровневого транспорта;\nпротоколы конвертируются маршрутизатором в сообщения I2NP, \nкаждый протокол может передаваться любым транспортом."
+msgstr ""
+"Дейтаграммы, как и пакеты потоковой "
+"библиотеки,\n"
+"являются конструкциями уровня приложения.\n"
+"Эти протоколы не зависят от низкоуровневого транспорта;\n"
+"протоколы конвертируются маршрутизатором в сообщения I2NP, \n"
+"каждый протокол может передаваться любым транспортом."
#: i2p2www/pages/site/docs/api/datagrams.html:25
msgid "Application Guide"
@@ -1694,9 +2283,17 @@ msgid ""
"datagram API,\n"
"while applications in other languages \n"
"can use SAM's datagram support.\n"
-"There is also limited support in i2ptunnel in the SOCKS proxy,\n"
+"There is also limited support in i2ptunnel in the SOCKS proxy,\n"
"the 'streamr' tunnel types, and udpTunnel classes."
-msgstr "Приложения, написанные на Java, могут использовать \nAPI дейтаграмм, \nприложения на других языках \nмогут использовать поддержку дейтаграмм SAM'а. \nТакже есть ограниченная поддержка в i2ptunnel в SOCKS proxy, \n'streamr' типы туннеля и классы udpTunnel."
+msgstr ""
+"Приложения, написанные на Java, могут использовать \n"
+"API дейтаграмм, \n"
+"приложения на других языках \n"
+"могут использовать поддержку дейтаграмм SAM'а. \n"
+"Также есть ограниченная поддержка в i2ptunnel в SOCKS proxy, \n"
+"'streamr' типы туннеля и классы udpTunnel."
#: i2p2www/pages/site/docs/api/datagrams.html:37
msgid "Datagram Length"
@@ -1704,25 +2301,57 @@ msgstr "Длина Дейтаграммы"
#: i2p2www/pages/site/docs/api/datagrams.html:38
msgid ""
-"The application designer should carefully consider the tradeoff of repliable vs. non-repliable\n"
-"datagrams. Also, the datagram size will affect reliability, due to tunnel fragmentation into 1KB\n"
-"tunnel messages. The more message fragments, the more likely that one of them will be dropped\n"
-"by an intermediate hop. Messages larger than a few KB are not recommended.\n"
+"The application designer should carefully consider the tradeoff of "
+"repliable vs. non-repliable\n"
+"datagrams. Also, the datagram size will affect reliability, due to tunnel"
+" fragmentation into 1KB\n"
+"tunnel messages. The more message fragments, the more likely that one of "
+"them will be dropped\n"
+"by an intermediate hop. Messages larger than a few KB are not "
+"recommended.\n"
"Over about 10 KB, the delivery probablility drops dramatically.\n"
-"Messages over 16 KB cannot be delivered over NTCP, dropping delivery chances even more."
-msgstr "Проектировщик приложения должен хорошо понимать разницу между дейтаграммами с ответом \nи без оных. Также, размер дейтаграммы влияет на надежность, в виду фрагментации туннелем \nсообщений по 1 КБ. Чем больше сообщение фрагментируется, тем более вероятно, что одно из них будет потеряно \nна промежуточном прыжке. Сообщения размером более нескольких КБ не рекомендованы для использования. \nПри размере более 10 КБ доставка, возможно, сильно ухудшится. \nСообщения более 16 КБ не могут быть доставлены по NTCP, шансы сбоя доставки сильно увеличиваются."
+"Messages over 16 KB cannot be delivered over NTCP, dropping delivery "
+"chances even more."
+msgstr ""
+"Проектировщик приложения должен хорошо понимать разницу между "
+"дейтаграммами с ответом \n"
+"и без оных. Также, размер дейтаграммы влияет на надежность, в виду "
+"фрагментации туннелем \n"
+"сообщений по 1 КБ. Чем больше сообщение фрагментируется, тем более "
+"вероятно, что одно из них будет потеряно \n"
+"на промежуточном прыжке. Сообщения размером более нескольких КБ не "
+"рекомендованы для использования. \n"
+"При размере более 10 КБ доставка, возможно, сильно ухудшится. \n"
+"Сообщения более 16 КБ не могут быть доставлены по NTCP, шансы сбоя "
+"доставки сильно увеличиваются."
#: i2p2www/pages/site/docs/api/datagrams.html:47
#, python-format
msgid ""
-"Also note that the various overheads added by lower layers, in particular asymmetric\n"
-"ElGamal/AES, place a large burden on intermittent messages\n"
-"such as used by a Kademlia-over-UDP application. The implementations are currently tuned\n"
-"for frequent traffic using the streaming library. There are a high number\n"
-"of session tags delivered, and a short session tag lifetime, for example.\n"
-"There are currently no configuration parameters available within I2CP to tune\n"
+"Also note that the various overheads added by lower layers, in particular"
+" asymmetric\n"
+"ElGamal/AES, place a large burden on "
+"intermittent messages\n"
+"such as used by a Kademlia-over-UDP application. The implementations are "
+"currently tuned\n"
+"for frequent traffic using the streaming library. There are a high number"
+"\n"
+"of session tags delivered, and a short session tag lifetime, for example."
+"\n"
+"There are currently no configuration parameters available within I2CP to "
+"tune\n"
"the ElGamal Session Tag parameters."
-msgstr "Также учитывайте, что различные накладные расходы добавляются на более низких уровнях, в ассиметричном \nалгоритме ElGamal/AES, они создают большую нагрузку на прерывистые сообщения, \nкак в приложении Kademlia-over-UDP. Сейчас реализация отлажена \nдля часто встречающегося трафика с использованием потоковой библиотеки. Например, доставлено \nбольшое количество меток сессии и время жизни меток сессии мало. \nСейчас нет конфигурации, доступной в I2CP, для настройки \nпараметров меток сессии ElGamal."
+msgstr ""
+"Также учитывайте, что различные накладные расходы добавляются на более "
+"низких уровнях, в ассиметричном \n"
+"алгоритме ElGamal/AES, они создают большую"
+" нагрузку на прерывистые сообщения, \n"
+"как в приложении Kademlia-over-UDP. Сейчас реализация отлажена \n"
+"для часто встречающегося трафика с использованием потоковой библиотеки. "
+"Например, доставлено \n"
+"большое количество меток сессии и время жизни меток сессии мало. \n"
+"Сейчас нет конфигурации, доступной в I2CP, для настройки \n"
+"параметров меток сессии ElGamal."
#: i2p2www/pages/site/docs/api/datagrams.html:57
msgid "I2CP Protocol Number and Ports"
@@ -1733,32 +2362,65 @@ msgid ""
"The standard I2CP protocol number for datagrams is PROTO_DATAGRAM (17).\n"
"Applications may or may not choose to set the\n"
"protocol in the I2CP header. It is not set by default.\n"
-"It must be set to demultiplex datagram and streaming traffic received on the same Destination."
-msgstr "Стандартный номер протокола I2CP для дейтаграмм - PROTO_DATAGRAM (17). \nПриложения могут указывать или не указывать протокол \nв заголовке I2CP. По умолчанию он не указан. \nЕго нужно указать для демультиплексирования дейтаграммы и потокового трафика, полученных на одном пункте назначения."
+"It must be set to demultiplex datagram and streaming traffic received on "
+"the same Destination."
+msgstr ""
+"Стандартный номер протокола I2CP для дейтаграмм - PROTO_DATAGRAM (17). \n"
+"Приложения могут указывать или не указывать протокол \n"
+"в заголовке I2CP. По умолчанию он не указан. \n"
+"Его нужно указать для демультиплексирования дейтаграммы и потокового "
+"трафика, полученных на одном пункте назначения."
#: i2p2www/pages/site/docs/api/datagrams.html:65
#, python-format
msgid ""
"As datagrams are not connection-oriented, the application may require\n"
-"port numbers to correlate datagrams with particular peers or communications sessions,\n"
+"port numbers to correlate datagrams with particular peers or "
+"communications sessions,\n"
"as is traditional with UDP over IP.\n"
-"Applications may add 'from' and 'to' ports to the I2CP (gzip) header as described in\n"
+"Applications may add 'from' and 'to' ports to the I2CP (gzip) header as "
+"described in\n"
"the I2CP page."
-msgstr "Поскольку дейтаграммы не ориентированы на соединение, приложению может \nпонадобиться номер порта для сопоставления дейтаграмм от определенных узлов или сессий подключения, \nкак и в традиционном UDP над IP. \nПриложения могут добавить порты 'от' и 'к' в заголовок I2CP (gzip), как это описано на \nстранице I2CP."
+msgstr ""
+"Поскольку дейтаграммы не ориентированы на соединение, приложению может \n"
+"понадобиться номер порта для сопоставления дейтаграмм от определенных "
+"узлов или сессий подключения, \n"
+"как и в традиционном UDP над IP. \n"
+"Приложения могут добавить порты 'от' и 'к' в заголовок I2CP (gzip), как "
+"это описано на \n"
+"странице I2CP."
#: i2p2www/pages/site/docs/api/datagrams.html:73
#, python-format
msgid ""
-"There is no method within the datagram API to specify whether it is non-repliable (raw)\n"
-"or repliable. The application should be designed to expect the appropriate type.\n"
+"There is no method within the datagram API to specify whether it is non-"
+"repliable (raw)\n"
+"or repliable. The application should be designed to expect the "
+"appropriate type.\n"
"The I2CP protocol number or port should be used by the application to\n"
"indicate datagram type.\n"
-"The I2CP protocol numbers PROTO_DATAGRAM (signed) and PROTO_DATAGRAM_RAW are defined in the\n"
+"The I2CP protocol numbers PROTO_DATAGRAM (signed) and PROTO_DATAGRAM_RAW "
+"are defined in the\n"
"I2PSession API\n"
-"for this purpose. A common design pattern in client/server datagram applications is to\n"
-"use signed datagrams for a request which includes a nonce, and use a raw datagram\n"
+"for this purpose. A common design pattern in client/server datagram "
+"applications is to\n"
+"use signed datagrams for a request which includes a nonce, and use a raw "
+"datagram\n"
"for the reply, returning the nonce from the request."
-msgstr "В API дейтаграмм нет возможности указать является ли она безответной (raw) \nили с возможностью ответа. Приложение должно быть само определять правильный тип. \nНомер протокола I2CP или порт могут быть использованы приложением \nдля определения типа дейтаграммы. \nДля этой цели в I2PSession API \nопределены номера протокола I2CP - PROTO_DATAGRAM (подписанная) и PROTO_DATAGRAM_RAW. Общим принципом в приложениях клиент/сервер с дейтаграммами является \nиспользование подписанных дейтаграмм для запросов, которые содержат некие данные, и raw дейтаграммы \nдля ответа, с обратной отправкой тех данных из запроса."
+msgstr ""
+"В API дейтаграмм нет возможности указать является ли она безответной "
+"(raw) \n"
+"или с возможностью ответа. Приложение должно быть само определять "
+"правильный тип. \n"
+"Номер протокола I2CP или порт могут быть использованы приложением \n"
+"для определения типа дейтаграммы. \n"
+"Для этой цели в I2PSession API \n"
+"определены номера протокола I2CP - PROTO_DATAGRAM (подписанная) и "
+"PROTO_DATAGRAM_RAW. Общим принципом в приложениях клиент/сервер с "
+"дейтаграммами является \n"
+"использование подписанных дейтаграмм для запросов, которые содержат некие"
+" данные, и raw дейтаграммы \n"
+"для ответа, с обратной отправкой тех данных из запроса."
#: i2p2www/pages/site/docs/api/datagrams.html:85
#, python-format
@@ -1767,7 +2429,11 @@ msgid ""
"I2PSession API,\n"
"as implemented in\n"
"I2PSessionMuxedImpl."
-msgstr "Протоколы и порты могут быть настроены в \nI2PSession API I2CP, \nкак это реализовано в \nI2PSessionMuxedImpl."
+msgstr ""
+"Протоколы и порты могут быть настроены в \n"
+"I2PSession API I2CP, \n"
+"как это реализовано в \n"
+"I2PSessionMuxedImpl."
#: i2p2www/pages/site/docs/api/datagrams.html:93
#: i2p2www/pages/site/docs/api/streaming.html:381
@@ -1780,7 +2446,11 @@ msgid ""
"Data integrity is assured by the gzip CRC-32 checksum implemented in\n"
"the I2CP layer.\n"
"There is no checksum field in the datagram protocol."
-msgstr "Целостность данных, гарантируемая проверкой gzip суммы CRC-32, реализована на \nуровне I2CP. \nВ протоколе дейтаграмм нет поля с проверочной суммой."
+msgstr ""
+"Целостность данных, гарантируемая проверкой gzip суммы CRC-32, "
+"реализована на \n"
+"уровне I2CP. \n"
+"В протоколе дейтаграмм нет поля с проверочной суммой."
#: i2p2www/pages/site/docs/api/datagrams.html:100
#: i2p2www/pages/site/docs/api/streaming.html:389
@@ -1790,14 +2460,24 @@ msgstr "Инкапсуляция пакета"
#: i2p2www/pages/site/docs/api/datagrams.html:101
#, python-format
msgid ""
-"Each datagram is sent through I2P as a single message (or as an individual clove in a\n"
+"Each datagram is sent through I2P as a single message (or as an "
+"individual clove in a\n"
"Garlic Message).\n"
"Message encapsulation is implemented in the underlying\n"
"I2CP,\n"
"I2NP, and\n"
"tunnel message layers.\n"
-"There is no packet delimiter mechanism or length field in the datagram protocol."
-msgstr "Каждая дейтаграмма отправляется через I2P как отдельное сообщение (или отдельный зубчик в\nЧесночном Сообщении).\nИнкапсуляция сообщения реализована в нижележащих уровнях \nI2CP,\nI2NP и \nтуннельном сообщении.\nВ протоколе дейтаграмм нет механизма разделения пакетов или поля длины."
+"There is no packet delimiter mechanism or length field in the datagram "
+"protocol."
+msgstr ""
+"Каждая дейтаграмма отправляется через I2P как отдельное сообщение (или "
+"отдельный зубчик в\n"
+"Чесночном Сообщении).\n"
+"Инкапсуляция сообщения реализована в нижележащих уровнях \n"
+"I2CP,\n"
+"I2NP и \n"
+"туннельном сообщении.\n"
+"В протоколе дейтаграмм нет механизма разделения пакетов или поля длины."
#: i2p2www/pages/site/docs/api/datagrams.html:114
#: i2p2www/pages/site/docs/spec/datagrams.html:10
@@ -1816,11 +2496,29 @@ msgstr "I2PControl - Служба Удаленного Управления"
#: i2p2www/pages/site/docs/api/i2pcontrol.html:4
#, python-format
msgid ""
-"I2P enables a JSONRPC2 interface via the plugin I2PControl.\n"
-"The aim of the interface is to provide simple way to interface with a running I2P node. A client, itoopie, has been developed in parallel.\n"
-"The JSONRPC2 implementation for the client as well as the plugin is provided by the java libraries JSON-RPC 2.0. \n"
-"A list of implementations of JSON-RPC for various languages can be found at the JSON-RPC wiki."
-msgstr "I2P позволяет работать через интерфейс JSONRPC2 с помощью плагина I2PControl.\nЦель интерфейса - обеспечить простой метод взаимодействия с работающим узлом I2P. Клиент, itoopie, разрабатывался параллельно.\nРеализация JSONRPC2 для клиента, так же как и для плагина, обеспечивается java библиотеками JSON-RPC 2.0. \nСписок реализаций протокола JSON-RPC для разных языков программирования доступен на вики-странице JSON-RPC."
+"I2P enables a JSONRPC2 interface via the plugin I2PControl.\n"
+"The aim of the interface is to provide simple way to interface with a "
+"running I2P node. A client, itoopie, has been developed in parallel.\n"
+"The JSONRPC2 implementation for the client as well as the plugin is "
+"provided by the java libraries JSON-RPC 2.0. \n"
+"A list of implementations of JSON-RPC for various languages can be found "
+"at the JSON-RPC "
+"wiki."
+msgstr ""
+"I2P позволяет работать через интерфейс JSONRPC2 с помощью "
+"плагина I2PControl.\n"
+"Цель интерфейса - обеспечить простой метод взаимодействия с работающим "
+"узлом I2P. Клиент, itoopie, разрабатывался параллельно.\n"
+"Реализация JSONRPC2 для клиента, так же как и для плагина, обеспечивается"
+" java библиотеками JSON-RPC 2.0. \n"
+"Список реализаций протокола JSON-RPC для разных языков программирования "
+"доступен на вики-странице JSON-RPC."
#: i2p2www/pages/site/docs/api/i2pcontrol.html:11
msgid "I2PControl is by default listening on localhost:7650"
@@ -1895,9 +2593,11 @@ msgstr "Описание"
#: i2p2www/pages/site/docs/api/i2pcontrol.html:29
msgid ""
-"Token used for authenticating every request (excluding the 'Authenticate' "
-"RPC method)"
-msgstr "Токен, использующийся для аутентификации каждого запроса (исключая метод 'Authenticate')"
+"Token used for authenticating every request (excluding the 'Authenticate'"
+" RPC method)"
+msgstr ""
+"Токен, использующийся для аутентификации каждого запроса (исключая метод "
+"'Authenticate')"
#: i2p2www/pages/site/docs/api/i2pcontrol.html:37
msgid "Implemented methods"
@@ -1905,7 +2605,8 @@ msgstr "Реализованные методы"
#: i2p2www/pages/site/docs/api/i2pcontrol.html:38
msgid ""
-"Creates and returns an authentication token used for further communication."
+"Creates and returns an authentication token used for further "
+"communication."
msgstr "Создаёт и возвращает токен для дальнейшего использования."
#: i2p2www/pages/site/docs/api/i2pcontrol.html:40
@@ -1938,9 +2639,11 @@ msgstr "Значение будет возвращено в ответе."
#: i2p2www/pages/site/docs/api/i2pcontrol.html:98
#: i2p2www/pages/site/docs/api/i2pcontrol.html:142
msgid ""
-"Token used for authenticating the client. Is provided by the server via the "
-"'Authenticate' RPC method."
-msgstr "Токен, использованный для аутентификации клиента. Предоставляется сервером при помощи RPC метода 'Authenticate'."
+"Token used for authenticating the client. Is provided by the server via "
+"the 'Authenticate' RPC method."
+msgstr ""
+"Токен, использованный для аутентификации клиента. Предоставляется "
+"сервером при помощи RPC метода 'Authenticate'."
#: i2p2www/pages/site/docs/api/i2pcontrol.html:54
msgid "Value of the key 'echo' in the request."
@@ -1975,17 +2678,23 @@ msgstr "Управляет I2PControl. Порты, пароли и тому по
msgid ""
"Sets a new listen address for I2PControl (only 127.0.0.1 and 0.0.0.0 are "
"implemented in I2PControl currently)."
-msgstr "Задаёт новый адрес для прослушивания для I2PControl (на данный момент реализованы только 127.0.0.1 и 0.0.0.0 адреса)."
+msgstr ""
+"Задаёт новый адрес для прослушивания для I2PControl (на данный момент "
+"реализованы только 127.0.0.1 и 0.0.0.0 адреса)."
#: i2p2www/pages/site/docs/api/i2pcontrol.html:70
msgid ""
"Sets a new password for I2PControl, all Authentication tokens will be "
"revoked."
-msgstr "Устанавливает новый пароль для I2PControl, все токены для аутентификации будут сброшены."
+msgstr ""
+"Устанавливает новый пароль для I2PControl, все токены для аутентификации "
+"будут сброшены."
#: i2p2www/pages/site/docs/api/i2pcontrol.html:71
msgid "Switches which port I2PControl will listen for connections on."
-msgstr "Устанавливает, какой порт будет использовать I2P для прослушивания входящих соединений."
+msgstr ""
+"Устанавливает, какой порт будет использовать I2P для прослушивания "
+"входящих соединений."
#: i2p2www/pages/site/docs/api/i2pcontrol.html:75
msgid "Returned if address was changed"
@@ -2001,13 +2710,16 @@ msgid "Returns true if any changes were made."
msgstr "Возвращает 'true', если были изменены какие-либо настройки."
#: i2p2www/pages/site/docs/api/i2pcontrol.html:79
-msgid ""
-"Returns true if any changes requiring a restart to take effect were made."
-msgstr "Возвращает 'true', если были изменены какие-либо настройки, для применения которых требуется перезагрузка."
+msgid "Returns true if any changes requiring a restart to take effect were made."
+msgstr ""
+"Возвращает 'true', если были изменены какие-либо настройки, для "
+"применения которых требуется перезагрузка."
#: i2p2www/pages/site/docs/api/i2pcontrol.html:82
msgid "Fetches basic information about the I2P router. Uptime, version etc."
-msgstr "Получает базовую информацию о I2P маршрутизаторе. Время с начала загрузки, версию и т. д."
+msgstr ""
+"Получает базовую информацию о I2P маршрутизаторе. Время с начала "
+"загрузки, версию и т. д."
#: i2p2www/pages/site/docs/api/i2pcontrol.html:101
msgid "What the status of the router is."
@@ -2071,7 +2783,8 @@ msgstr "Управляет перезагрузкой/выключением I2P
#: i2p2www/pages/site/docs/api/i2pcontrol.html:137
msgid ""
-"Initiates a router reseed, fetching peers into our NetDB from a remote host."
+"Initiates a router reseed, fetching peers into our NetDB from a remote "
+"host."
msgstr ""
#: i2p2www/pages/site/docs/api/i2pcontrol.html:138
@@ -2080,8 +2793,11 @@ msgstr "Перезагружает I2P маршрутизатор."
#: i2p2www/pages/site/docs/api/i2pcontrol.html:139
msgid ""
-"Restarts the router gracefully (waits for participating tunnels to expire)."
-msgstr "\"Мягко\" перезагружает I2P маршрутизатор (ждёт, пока у участвующих в обмене туннелей истечёт время)."
+"Restarts the router gracefully (waits for participating tunnels to "
+"expire)."
+msgstr ""
+"\"Мягко\" перезагружает I2P маршрутизатор (ждёт, пока у участвующих в "
+"обмене туннелей истечёт время)."
#: i2p2www/pages/site/docs/api/i2pcontrol.html:140
msgid "Shuts down the router."
@@ -2091,7 +2807,9 @@ msgstr "Выключает I2P маршрутизатор."
msgid ""
"Shuts down the router gracefully (waits for participating tunnels to "
"expire)."
-msgstr "\"Мягко\" выключает I2P маршрутизатор (ждёт, пока у участвующих в обмене туннелей истечёт время)."
+msgstr ""
+"\"Мягко\" выключает I2P маршрутизатор (ждёт, пока у участвующих в обмене "
+"туннелей истечёт время)."
#: i2p2www/pages/site/docs/api/i2pcontrol.html:145
msgid "If requested, verifies that a reseed has been initiated."
@@ -2114,85 +2832,112 @@ msgid "If requested, verifies that a graceful shutdown has been initiated"
msgstr ""
#: i2p2www/pages/site/docs/api/i2pcontrol.html:152
-msgid ""
-"Fetches or sets various network related settings. Ports, addresses etc."
-msgstr "Получает или устанавливает различные сетевые настройки. Порты, адреса и т. д."
+msgid "Fetches or sets various network related settings. Ports, addresses etc."
+msgstr ""
+"Получает или устанавливает различные сетевые настройки. Порты, адреса и "
+"т. д."
#: i2p2www/pages/site/docs/api/i2pcontrol.html:154
msgid ""
"What port is used for the TCP transport. If null is submitted, current "
"setting will be returned."
-msgstr "Какой порт используется для TCP транспорта. Если передано пустое значение, то будет возвращено текущее значение."
+msgstr ""
+"Какой порт используется для TCP транспорта. Если передано пустое "
+"значение, то будет возвращено текущее значение."
#: i2p2www/pages/site/docs/api/i2pcontrol.html:155
msgid ""
-"What hostname is used for the TCP transport. If null is submitted, current "
-"setting will be returned."
-msgstr "Какое имя хоста используется для TCP транспорта. Если передано пустое значение, то будет возвращено текущее значение."
+"What hostname is used for the TCP transport. If null is submitted, "
+"current setting will be returned."
+msgstr ""
+"Какое имя хоста используется для TCP транспорта. Если передано пустое "
+"значение, то будет возвращено текущее значение."
#: i2p2www/pages/site/docs/api/i2pcontrol.html:156
msgid ""
"Use automatically detected ip for TCP transport. If null is submitted, "
"current setting will be returned."
-msgstr "Использовать автоматически определённый IP адрес для TCP транспорта. Если передано пустое значение, то будет возвращено текущее значение."
+msgstr ""
+"Использовать автоматически определённый IP адрес для TCP транспорта. Если"
+" передано пустое значение, то будет возвращено текущее значение."
#: i2p2www/pages/site/docs/api/i2pcontrol.html:157
msgid ""
"What port is used for the UDP transport. If null is submitted, current "
"setting will be returned."
-msgstr "Какой порт используется для UDP транспорта. Если передано пустое значение, то будет возвращено текущее значение."
+msgstr ""
+"Какой порт используется для UDP транспорта. Если передано пустое "
+"значение, то будет возвращено текущее значение."
#: i2p2www/pages/site/docs/api/i2pcontrol.html:158
msgid ""
-"What hostname is used for the UDP transport. If null is submitted, current "
-"setting will be returned."
-msgstr "Какое имя хоста используется для UDP транспорта. Если передано пустое значение, то будет возвращено текущее значение."
+"What hostname is used for the UDP transport. If null is submitted, "
+"current setting will be returned."
+msgstr ""
+"Какое имя хоста используется для UDP транспорта. Если передано пустое "
+"значение, то будет возвращено текущее значение."
#: i2p2www/pages/site/docs/api/i2pcontrol.html:159
msgid ""
"Which methods should be used for detecting the ip address of the UDP "
"transport. If null is submitted, current setting will be returned."
-msgstr "Какие методы следует использовать для определения IP адреса UDP транспорта. Если передано пустое значение, то будет возвращено текущее значение."
+msgstr ""
+"Какие методы следует использовать для определения IP адреса UDP "
+"транспорта. Если передано пустое значение, то будет возвращено текущее "
+"значение."
#: i2p2www/pages/site/docs/api/i2pcontrol.html:160
msgid "What ip has been detected by the UDP transport."
msgstr "IP адрес, автоматически определённый UDP транспортом."
#: i2p2www/pages/site/docs/api/i2pcontrol.html:161
-msgid ""
-"Is UPnP enabled. If null is submitted, current setting will be returned."
-msgstr "Включен ли UPnP. Если передано пустое значение, то будет возвращено текущее значение."
+msgid "Is UPnP enabled. If null is submitted, current setting will be returned."
+msgstr ""
+"Включен ли UPnP. Если передано пустое значение, то будет возвращено "
+"текущее значение."
#: i2p2www/pages/site/docs/api/i2pcontrol.html:162
msgid ""
-"How many percent of bandwidth is usable for participating tunnels. If null "
-"is submitted, current setting will be returned."
-msgstr "Процент ширины канала, доступный для обмена данными туннелей. Если передано пустое значение, то будет возвращено текущее значение."
+"How many percent of bandwidth is usable for participating tunnels. If "
+"null is submitted, current setting will be returned."
+msgstr ""
+"Процент ширины канала, доступный для обмена данными туннелей. Если "
+"передано пустое значение, то будет возвращено текущее значение."
#: i2p2www/pages/site/docs/api/i2pcontrol.html:163
msgid ""
-"How many KB/s of inbound bandwidth is allowed. If null is submitted, current"
-" setting will be returned."
-msgstr "Разрешенный входящий трафик в Кб/с. Если передано пустое значение, то будет возвращено текущее значение."
+"How many KB/s of inbound bandwidth is allowed. If null is submitted, "
+"current setting will be returned."
+msgstr ""
+"Разрешенный входящий трафик в Кб/с. Если передано пустое значение, то "
+"будет возвращено текущее значение."
#: i2p2www/pages/site/docs/api/i2pcontrol.html:164
msgid ""
"How many KB/s of outbound bandwidth is allowed. If null is submitted, "
"current setting will be returned."
-msgstr "Разрешенный исходящий трафик в Кб/с. Если передано пустое значение, то будет возвращено текущее значение."
+msgstr ""
+"Разрешенный исходящий трафик в Кб/с. Если передано пустое значение, то "
+"будет возвращено текущее значение."
#: i2p2www/pages/site/docs/api/i2pcontrol.html:165
msgid ""
-"Is laptop mode enabled (change router identity and UDP port when IP changes "
-"). If null is submitted, current setting will be returned."
-msgstr "Включен ли режим лэптопа (изменяет ID маршрутизатора и UDP порт, когда меняется IP адрес). Если передано пустое значение, то будет возвращено текущее значение."
+"Is laptop mode enabled (change router identity and UDP port when IP "
+"changes ). If null is submitted, current setting will be returned."
+msgstr ""
+"Включен ли режим лэптопа (изменяет ID маршрутизатора и UDP порт, когда "
+"меняется IP адрес). Если передано пустое значение, то будет возвращено "
+"текущее значение."
#: i2p2www/pages/site/docs/api/i2pcontrol.html:166
msgid ""
-"Token used for authenticating the client. Is provided by the server via the "
-"'Authenticate' RPC method. If null is submitted, current setting will be "
-"returned."
-msgstr "Токен, используемый для аутентификации клиента. Предоставляется сервером при помощи RPC метода 'Authenticate'. Если передано пустое значение, то будет возвращено текущее значение."
+"Token used for authenticating the client. Is provided by the server via "
+"the 'Authenticate' RPC method. If null is submitted, current setting will"
+" be returned."
+msgstr ""
+"Токен, используемый для аутентификации клиента. Предоставляется сервером "
+"при помощи RPC метода 'Authenticate'. Если передано пустое значение, то "
+"будет возвращено текущее значение."
#: i2p2www/pages/site/docs/api/i2pcontrol.html:169
msgid "If requested, returns the port used for the TCP transport."
@@ -2204,9 +2949,11 @@ msgstr "Если запрошено, возвращает имя хоста, и
#: i2p2www/pages/site/docs/api/i2pcontrol.html:171
msgid ""
-"If requested, returns the method used for automatically detecting ip for the"
-" TCP transport."
-msgstr "Если запрошено, возвращает метод, используемый для автоматического определения IP адреса для TCP транспорта."
+"If requested, returns the method used for automatically detecting ip for "
+"the TCP transport."
+msgstr ""
+"Если запрошено, возвращает метод, используемый для автоматического "
+"определения IP адреса для TCP транспорта."
#: i2p2www/pages/site/docs/api/i2pcontrol.html:172
msgid "If requested, returns the port used for the UDP transport."
@@ -2218,9 +2965,11 @@ msgstr "Если запрошено, возвращает имя хоста, и
#: i2p2www/pages/site/docs/api/i2pcontrol.html:174
msgid ""
-"If requested, returns methods used for detecting the ip address of the UDP "
-"transport."
-msgstr "Если запрошено, возвращает метод, используемый для автоматического определения IP адреса UDP транспорта."
+"If requested, returns methods used for detecting the ip address of the "
+"UDP transport."
+msgstr ""
+"Если запрошено, возвращает метод, используемый для автоматического "
+"определения IP адреса UDP транспорта."
#: i2p2www/pages/site/docs/api/i2pcontrol.html:175
msgid "If requested, returns what ip has been detected by the UDP transport."
@@ -2234,7 +2983,9 @@ msgstr "Если запрошено, возвращает значение на
msgid ""
"If requested, returns how many percent of bandwidth is usable for "
"participating tunnels."
-msgstr "Если запрошено, возвращает процент ширины канала, доступный для использования туннелями."
+msgstr ""
+"Если запрошено, возвращает процент ширины канала, доступный для "
+"использования туннелями."
#: i2p2www/pages/site/docs/api/i2pcontrol.html:178
msgid "If requested, returns how many KB/s of inbound bandwidth is allowed."
@@ -2310,31 +3061,40 @@ msgstr "Аутентификационный токен не существуе
#: i2p2www/pages/site/docs/api/i2pcontrol.html:200
msgid "The provided authentication token was expired and will be removed."
-msgstr "Время действия предоставленного аутентификационного токена истекло и он будет удалён."
+msgstr ""
+"Время действия предоставленного аутентификационного токена истекло и он "
+"будет удалён."
#: i2p2www/pages/site/docs/api/i2pcontrol.html:201
msgid ""
-"The version of the I2PControl API used wasn't specified, but is required to "
-"be specified."
+"The version of the I2PControl API used wasn't specified, but is required "
+"to be specified."
msgstr "Не указана используемая версия I2PControl API, необходимо её указать."
#: i2p2www/pages/site/docs/api/i2pcontrol.html:202
msgid ""
-"The version of the I2PControl API specified is not supported by I2PControl."
+"The version of the I2PControl API specified is not supported by "
+"I2PControl."
msgstr "Запрошенная версия I2PControl API не поддерживается I2PControl."
#: i2p2www/pages/site/docs/api/i2ptunnel.html:12
#, python-format
msgid ""
"I2PTunnel is a tool for interfacing with and providing services on I2P.\n"
-"Destination of an I2PTunnel can be defined using a hostname,\n"
-"Base32, or a full 516-byte destination key.\n"
-"An established I2PTunnel will be available on your client machine as localhost:port.\n"
-"If you wish to provide a service on I2P network, you simply create I2PTunnel to the\n"
-"appropriate ip_address:port. A corresponding 516-byte destination key will be generated\n"
+"Destination of an I2PTunnel can be defined using a hostname,\n"
+"Base32, or a full 516-byte destination "
+"key.\n"
+"An established I2PTunnel will be available on your client machine as "
+"localhost:port.\n"
+"If you wish to provide a service on I2P network, you simply create "
+"I2PTunnel to the\n"
+"appropriate ip_address:port. A corresponding 516-byte destination key "
+"will be generated\n"
"for the service and it will become avaliable throughout I2P.\n"
"A web interface for I2PTunnel management is avaliable on\n"
-"localhost:7657/i2ptunnel/."
+"localhost:7657/i2ptunnel/."
msgstr ""
#: i2p2www/pages/site/docs/api/i2ptunnel.html:24
@@ -2348,7 +3108,8 @@ msgstr "Серверные туннели"
#: i2p2www/pages/site/docs/api/i2ptunnel.html:27
msgid ""
"I2P Webserver - A tunnel pointed to a Jetty webserver run\n"
-"on localhost:7658 for convenient and quick hosting on I2P.\n"
+"on localhost:7658 for convenient "
+"and quick hosting on I2P.\n"
"1/(windowSize*factor)
. In standard TCP, window sizes are in bytes,\n"
+"of 1/(windowSize*factor)
. In standard TCP, window sizes are"
+" in bytes,\n"
"while in I2P, window sizes are in messages.\n"
"A higher number means slower growth."
msgstr ""
@@ -2885,15 +3717,16 @@ msgstr ""
msgid ""
"How long to wait after instantiating a new con \n"
"before actually attempting to connect. If this is\n"
-"<= 0, connect immediately with no initial data. If greater than 0, wait\n"
+"<= 0, connect immediately with no initial data. If greater than 0, "
+"wait\n"
"until the output stream is flushed, the buffer fills, \n"
"or that many milliseconds pass, and include any initial data with the SYN."
msgstr ""
#: i2p2www/pages/site/docs/api/streaming.html:186
msgid ""
-"How long to block on connect, in milliseconds. Negative means indefinitely. "
-"Default is 5 minutes."
+"How long to block on connect, in milliseconds. Negative means "
+"indefinitely. Default is 5 minutes."
msgstr ""
#: i2p2www/pages/site/docs/api/streaming.html:190
@@ -2905,19 +3738,23 @@ msgstr ""
#: i2p2www/pages/site/docs/api/streaming.html:196
msgid ""
"Whether to listen only for the streaming protocol.\n"
-"Setting to true will prohibit communication with Destinations earlier than release 0.7.1\n"
-"(released March 2009). Set to true if running multiple protocols on this Destination."
+"Setting to true will prohibit communication with Destinations earlier "
+"than release 0.7.1\n"
+"(released March 2009). Set to true if running multiple protocols on this "
+"Destination."
msgstr ""
#: i2p2www/pages/site/docs/api/streaming.html:204
msgid ""
"(0=noop, 1=disconnect)\n"
-"What to do on an inactivity timeout - do nothing, disconnect, or send a duplicate ack."
+"What to do on an inactivity timeout - do nothing, disconnect, or send a "
+"duplicate ack."
msgstr ""
#: i2p2www/pages/site/docs/api/streaming.html:212
msgid ""
-"The initial value of the resend delay field in the packet header, times 1000.\n"
+"The initial value of the resend delay field in the packet header, times "
+"1000.\n"
"Not fully implemented; see below."
msgstr ""
@@ -2940,8 +3777,8 @@ msgstr ""
#: i2p2www/pages/site/docs/api/streaming.html:230
msgid ""
-"In standard TCP, window sizes are in bytes, while in I2P, window sizes are "
-"in messages."
+"In standard TCP, window sizes are in bytes, while in I2P, window sizes "
+"are in messages."
msgstr ""
#: i2p2www/pages/site/docs/api/streaming.html:242
@@ -2981,12 +3818,12 @@ msgstr ""
#: i2p2www/pages/site/docs/api/streaming.html:295
msgid ""
"(2=interactive not supported)\n"
-"This doesn't currently do anything, but setting it to a value other than 1 will cause an error."
+"This doesn't currently do anything, but setting it to a value other than "
+"1 will cause an error."
msgstr ""
#: i2p2www/pages/site/docs/api/streaming.html:300
-msgid ""
-"How long to block on read, in milliseconds. Negative means indefinitely."
+msgid "How long to block on read, in milliseconds. Negative means indefinitely."
msgstr ""
#: i2p2www/pages/site/docs/api/streaming.html:304
@@ -3030,15 +3867,19 @@ msgstr ""
#: i2p2www/pages/site/docs/api/streaming.html:349
msgid ""
-"The initiator sends a packet with the SYNCHRONIZE flag set. This packet may contain the initial data as well.\n"
-"The peer replies with a packet with the SYNCHRONIZE flag set. This packet may contain the initial response data as well."
+"The initiator sends a packet with the SYNCHRONIZE flag set. This packet "
+"may contain the initial data as well.\n"
+"The peer replies with a packet with the SYNCHRONIZE flag set. This packet"
+" may contain the initial response data as well."
msgstr ""
#: i2p2www/pages/site/docs/api/streaming.html:354
msgid ""
-"The initiator may send additional data packets, up to the initial window size, before receiving the SYNCHRONIZE response.\n"
+"The initiator may send additional data packets, up to the initial window "
+"size, before receiving the SYNCHRONIZE response.\n"
"These packets will also have the send Stream ID field set to 0.\n"
-"Recipients must buffer packets received on unknown streams for a short period of time, as they may\n"
+"Recipients must buffer packets received on unknown streams for a short "
+"period of time, as they may\n"
"arrive out of order, in advance of the SYNCHRONIZE packet."
msgstr ""
@@ -3048,23 +3889,33 @@ msgstr ""
#: i2p2www/pages/site/docs/api/streaming.html:362
msgid ""
-"The maximum message size (also called the MTU / MRU) is negotiated to the lower value supported by\n"
-"the two peers. As tunnel messages are padded to 1KB, a poor MTU selection will lead to\n"
+"The maximum message size (also called the MTU / MRU) is negotiated to the"
+" lower value supported by\n"
+"the two peers. As tunnel messages are padded to 1KB, a poor MTU selection"
+" will lead to\n"
"a large amount of overhead.\n"
"The MTU is specified by the option i2p.streaming.maxMessageSize.\n"
-"The current default MTU of 1730 was chosen to fit precisely into two 1K I2NP tunnel messages,\n"
+"The current default MTU of 1730 was chosen to fit precisely into two 1K "
+"I2NP tunnel messages,\n"
"including overhead for the typical case."
msgstr ""
#: i2p2www/pages/site/docs/api/streaming.html:371
msgid ""
-"The first message in a connection includes a 387 byte (typical) Destination added by the streaming layer,\n"
-"and usually a 898 byte (typical) LeaseSet, and Session keys, bundled in the Garlic message by the router.\n"
-"(The LeaseSet and Session Keys will not be bundled if an ElGamal Session was previously established).\n"
-"Therefore, the goal of fitting a complete HTTP request in a single 1KB I2NP message is not always attainable.\n"
-"However, the selection of the MTU, together with careful implementation of fragmentation\n"
-"and batching strategies in the tunnel gateway processor, are important factors in network bandwidth,\n"
-"latency, reliability, and efficiency, especially for long-lived connections."
+"The first message in a connection includes a 387 byte (typical) "
+"Destination added by the streaming layer,\n"
+"and usually a 898 byte (typical) LeaseSet, and Session keys, bundled in "
+"the Garlic message by the router.\n"
+"(The LeaseSet and Session Keys will not be bundled if an ElGamal Session "
+"was previously established).\n"
+"Therefore, the goal of fitting a complete HTTP request in a single 1KB "
+"I2NP message is not always attainable.\n"
+"However, the selection of the MTU, together with careful implementation "
+"of fragmentation\n"
+"and batching strategies in the tunnel gateway processor, are important "
+"factors in network bandwidth,\n"
+"latency, reliability, and efficiency, especially for long-lived "
+"connections."
msgstr ""
#: i2p2www/pages/site/docs/api/streaming.html:382
@@ -3078,10 +3929,14 @@ msgstr ""
#: i2p2www/pages/site/docs/api/streaming.html:390
#, python-format
msgid ""
-"Each packet is sent through I2P as a single message (or as an individual clove in a\n"
-"Garlic Message). Message encapsulation is implemented\n"
-"in the underlying I2CP, I2NP, and\n"
-"tunnel message layers. There is no packet delimiter\n"
+"Each packet is sent through I2P as a single message (or as an individual "
+"clove in a\n"
+"Garlic Message). Message encapsulation "
+"is implemented\n"
+"in the underlying I2CP, I2NP, and\n"
+"tunnel message layers. There is no "
+"packet delimiter\n"
"mechanism or payload length field in the streaming protocol."
msgstr ""
@@ -3091,7 +3946,8 @@ msgstr ""
#: i2p2www/pages/site/docs/api/streaming.html:401
msgid ""
-"The streaming lib uses standard slow-start (exponential window growth) and congestion avoidance (linear window growth)\n"
+"The streaming lib uses standard slow-start (exponential window growth) "
+"and congestion avoidance (linear window growth)\n"
"phases, with exponential backoff.\n"
"Windowing and acknowledgments use packet count, not byte count."
msgstr ""
@@ -3102,38 +3958,46 @@ msgstr ""
#: i2p2www/pages/site/docs/api/streaming.html:409
msgid ""
-"Any packet, including one with the SYNCHRONIZE flag set, may have the CLOSE flag sent as well.\n"
-"The connection is not closed until the peer responds with the CLOSE flag.\n"
+"Any packet, including one with the SYNCHRONIZE flag set, may have the "
+"CLOSE flag sent as well.\n"
+"The connection is not closed until the peer responds with the CLOSE flag."
+"\n"
"CLOSE packets may contain data as well."
msgstr ""
#: i2p2www/pages/site/docs/api/streaming.html:417
msgid ""
-"There is no ping function at the I2CP layer (equivalent to ICMP echo) or in datagrams.\n"
+"There is no ping function at the I2CP layer (equivalent to ICMP echo) or "
+"in datagrams.\n"
"This function is provided in streaming.\n"
"Pings and pongs may not be combined with a standard streaming packet;\n"
"if the ECHO option is set, then\n"
-"most other flags, options, ackThrough, sequenceNum, NACKs, payload, etc. are ignored."
+"most other flags, options, ackThrough, sequenceNum, NACKs, payload, etc. "
+"are ignored."
msgstr ""
#: i2p2www/pages/site/docs/api/streaming.html:425
msgid ""
-"A ping packet must have the ECHO, SIGNATURE_INCLUDED, and FROM_INCLUDED flags set.\n"
-"The sendStreamId must be greater than zero, and the receiveStreamId is ignored.\n"
+"A ping packet must have the ECHO, SIGNATURE_INCLUDED, and FROM_INCLUDED "
+"flags set.\n"
+"The sendStreamId must be greater than zero, and the receiveStreamId is "
+"ignored.\n"
"The sendStreamId may or may not correspond to an existing connection."
msgstr ""
#: i2p2www/pages/site/docs/api/streaming.html:431
msgid ""
"A pong packet must have the ECHO flag set.\n"
-"The sendStreamId must be zero, and the receiveStreamId is the sendStreamId from the ping.\n"
-"The pong packet does not include any payload that was contained in the ping."
+"The sendStreamId must be zero, and the receiveStreamId is the "
+"sendStreamId from the ping.\n"
+"The pong packet does not include any payload that was contained in the "
+"ping."
msgstr ""
#: i2p2www/pages/site/docs/api/streaming.html:437
msgid ""
-"Streaming may be configured to disable sending pongs with the configuration "
-"i2p.streaming.answerPings=false."
+"Streaming may be configured to disable sending pongs with the "
+"configuration i2p.streaming.answerPings=false."
msgstr ""
#: i2p2www/pages/site/docs/api/streaming.html:442
@@ -3149,7 +4013,8 @@ msgid ""
"This is used for \"temporal\" sharing at connection open/close time,\n"
"not \"ensemble\" sharing during a connection (See\n"
"RFC 2140).\n"
-"There is a separate share per ConnectionManager (i.e. per local Destination)\n"
+"There is a separate share per ConnectionManager (i.e. per local "
+"Destination)\n"
"so that there is no information leakage to other Destinations on the\n"
"same router.\n"
"The share data for a given peer expires after a few minutes.\n"
@@ -3162,7 +4027,8 @@ msgstr "Прочие параметры"
#: i2p2www/pages/site/docs/api/streaming.html:465
msgid ""
-"The following parameters are hardcoded, but may be of interest for analysis:"
+"The following parameters are hardcoded, but may be of interest for "
+"analysis:"
msgstr ""
#: i2p2www/pages/site/docs/api/streaming.html:484
@@ -3172,16 +4038,25 @@ msgstr "История"
#: i2p2www/pages/site/docs/api/streaming.html:485
msgid ""
-"The streaming library has grown organically for I2P - first mihi implemented the\n"
-"\"mini streaming library\" as part of I2PTunnel, which was limited to a window\n"
-"size of 1 message (requiring an ACK before sending the next one), and then it was\n"
-"refactored out into a generic streaming interface (mirroring TCP sockets) and the\n"
-"full streaming implementation was deployed with a sliding window protocol and \n"
-"optimizations to take into account the high bandwidth x delay product. Individual\n"
-"streams may adjust the maximum packet size and other options. The default\n"
-"message size is selected to fit precisely in two 1K I2NP tunnel messages,\n"
+"The streaming library has grown organically for I2P - first mihi "
+"implemented the\n"
+"\"mini streaming library\" as part of I2PTunnel, which was limited to a "
+"window\n"
+"size of 1 message (requiring an ACK before sending the next one), and "
+"then it was\n"
+"refactored out into a generic streaming interface (mirroring TCP sockets)"
+" and the\n"
+"full streaming implementation was deployed with a sliding window protocol"
+" and \n"
+"optimizations to take into account the high bandwidth x delay product. "
+"Individual\n"
+"streams may adjust the maximum packet size and other options. The default"
+"\n"
+"message size is selected to fit precisely in two 1K I2NP tunnel messages,"
+"\n"
"and is a reasonable tradeoff between the bandwidth costs of \n"
-"retransmitting lost messages, and the latency and overhead of multiple messages."
+"retransmitting lost messages, and the latency and overhead of multiple "
+"messages."
msgstr ""
#: i2p2www/pages/site/docs/api/streaming.html:499
@@ -3213,16 +4088,20 @@ msgstr ""
#: i2p2www/pages/site/docs/api/streaming.html:509
#, python-format
msgid ""
-"Another area for research is the interaction of the streaming lib with the\n"
+"Another area for research is the interaction of the streaming lib with "
+"the\n"
"NTCP and SSU transport layers.\n"
"See the NTCP discussion page for details."
msgstr ""
#: i2p2www/pages/site/docs/api/streaming.html:514
msgid ""
-"The interaction of the routing algorithms with the streaming lib strongly affects performance.\n"
-"In particular, random distribution of messages to multiple tunnels in a pool\n"
-"leads to a high degree of out-of-order delivery which results in smaller window\n"
+"The interaction of the routing algorithms with the streaming lib strongly"
+" affects performance.\n"
+"In particular, random distribution of messages to multiple tunnels in a "
+"pool\n"
+"leads to a high degree of out-of-order delivery which results in smaller "
+"window\n"
"sizes than would otherwise be the case. The router currently routes \n"
"messages for a single from/to destination pair through a consistent set \n"
"of tunnels, until tunnel expiration or delivery failure. The router's \n"
@@ -3257,9 +4136,11 @@ msgstr ""
#: i2p2www/pages/site/docs/api/streaming.html:541
msgid ""
-"zzz has added debug code to the streaming library to log packets in a wireshark-compatible\n"
+"zzz has added debug code to the streaming library to log packets in a "
+"wireshark-compatible\n"
"(pcap) format; Use this to further analyze performance.\n"
-"The format may require enhancement to map more streaming lib parameters to TCP fields."
+"The format may require enhancement to map more streaming lib parameters "
+"to TCP fields."
msgstr ""
#: i2p2www/pages/site/docs/api/streaming.html:546
@@ -3278,15 +4159,18 @@ msgstr "Май 2014"
msgid ""
"There are several bittorrent clients and trackers on I2P.\n"
"As I2P addressing uses a Destination instead of an IP and port, minor\n"
-"changes are required to tracker and client software for operation on I2P.\n"
+"changes are required to tracker and client software for operation on I2P."
+"\n"
"These changes are specified below.\n"
-"Note carefully the guidelines for compatibility with older I2P clients and trackers."
+"Note carefully the guidelines for compatibility with older I2P clients "
+"and trackers."
msgstr ""
#: i2p2www/pages/site/docs/applications/bittorrent.html:15
msgid ""
"This page specifies protocol details common to all clients and trackers.\n"
-"Specific clients and trackers may implement other unique features or protocols."
+"Specific clients and trackers may implement other unique features or "
+"protocols."
msgstr ""
#: i2p2www/pages/site/docs/applications/bittorrent.html:20
@@ -3299,7 +4183,8 @@ msgstr "Анонсы"
#: i2p2www/pages/site/docs/applications/bittorrent.html:27
msgid ""
-"Clients generally include a fake port=6881 parameter in the announce, for compatibility with older trackers.\n"
+"Clients generally include a fake port=6881 parameter in the announce, for"
+" compatibility with older trackers.\n"
"Trackers may ignore the port parameter, and should not require it."
msgstr ""
@@ -3311,7 +4196,8 @@ msgid ""
"using the I2P Base 64 alphabet [A-Z][a-z][0-9]-~.\n"
"Destinations\n"
"are 387+ bytes, so the Base 64 is 516+ bytes.\n"
-"Clients generally append \".i2p\" to the Base 64 Destination for compatibility with older trackers.\n"
+"Clients generally append \".i2p\" to the Base 64 Destination for "
+"compatibility with older trackers.\n"
"Trackers should not require an appended \".i2p\"."
msgstr ""
@@ -3321,15 +4207,19 @@ msgstr ""
#: i2p2www/pages/site/docs/applications/bittorrent.html:46
msgid ""
-"While all current Destinations for clients are exactly 387 bytes, a tracker should not\n"
-"presume that will always be so. A reasonable maximum to assume, for now, is 475 bytes.\n"
-"As the tracker must decode the Base64 to deliver compact responses (see below),\n"
+"While all current Destinations for clients are exactly 387 bytes, a "
+"tracker should not\n"
+"presume that will always be so. A reasonable maximum to assume, for now, "
+"is 475 bytes.\n"
+"As the tracker must decode the Base64 to deliver compact responses (see "
+"below),\n"
"the tracker should probably decode and reject bad Base64 when announced."
msgstr ""
#: i2p2www/pages/site/docs/applications/bittorrent.html:53
msgid ""
-"The default response type is non-compact. Clients may request a compact response with\n"
+"The default response type is non-compact. Clients may request a compact "
+"response with\n"
"the parameter compact=1. A tracker may, but is not required to, return\n"
"a compact response when requested."
msgstr ""
@@ -3337,8 +4227,10 @@ msgstr ""
#: i2p2www/pages/site/docs/applications/bittorrent.html:59
msgid ""
"Developers of new I2P clients\n"
-"are strongly encouraged to implemenent announces over their own tunnel rather than\n"
-"the HTTP client proxy at port 4444. Doing so is both more efficient and it allows\n"
+"are strongly encouraged to implemenent announces over their own tunnel "
+"rather than\n"
+"the HTTP client proxy at port 4444. Doing so is both more efficient and "
+"it allows\n"
"destination enforcement by the tracker (see below)."
msgstr ""
@@ -3360,7 +4252,8 @@ msgstr ""
#: i2p2www/pages/site/docs/applications/bittorrent.html:76
msgid ""
-"Trackers generally include a fake port key, or use the port from the announce, for compatibility with older clients.\n"
+"Trackers generally include a fake port key, or use the port from the "
+"announce, for compatibility with older clients.\n"
"Clients must ignore the port parameter, and should not require it."
msgstr ""
@@ -3368,8 +4261,10 @@ msgstr ""
#, python-format
msgid ""
"The value of the ip key is the base 64 of the client's\n"
-"Destination, as described above.\n"
-"Trackers generally append \".i2p\" to the Base 64 Destination if it wasn't in the announce ip, for compatibility with older clients.\n"
+"Destination, as "
+"described above.\n"
+"Trackers generally append \".i2p\" to the Base 64 Destination if it "
+"wasn't in the announce ip, for compatibility with older clients.\n"
"Clients should not require an appended \".i2p\" in the responses."
msgstr ""
@@ -3384,22 +4279,26 @@ msgstr ""
#: i2p2www/pages/site/docs/applications/bittorrent.html:95
#, python-format
msgid ""
-"In the compact response, the value of the \"peers\" dictionary key is a single byte string,\n"
+"In the compact response, the value of the \"peers\" dictionary key is a "
+"single byte string,\n"
"whose length is a multiple of 32 bytes.\n"
"This string contains the concatenated\n"
"32-byte SHA-256 Hashes\n"
"of the binary\n"
"Destinations\n"
"of the peers.\n"
-"This hash must be computed by the tracker, unless destination enforcement\n"
-"(see below) is used, in which case the hash delivered in the X-I2P-DestHash\n"
+"This hash must be computed by the tracker, unless destination enforcement"
+"\n"
+"(see below) is used, in which case the hash delivered in the X-I2P-"
+"DestHash\n"
"or X-I2P-DestB32 HTTP headers may be converted to binary and stored.\n"
"The peers key may be absent, or the peers value may be zero-length."
msgstr ""
#: i2p2www/pages/site/docs/applications/bittorrent.html:109
msgid ""
-"While compact response support is optional for both clients and trackers, it is highly\n"
+"While compact response support is optional for both clients and trackers,"
+" it is highly\n"
"recommended as it reduces the nominal response size by over 90%."
msgstr ""
@@ -3410,27 +4309,34 @@ msgstr ""
#: i2p2www/pages/site/docs/applications/bittorrent.html:117
#, python-format
msgid ""
-"Some, but not all, I2P bittorrent clients announce over their own tunnels.\n"
-"Trackers may choose to prevent spoofing by requiring this, and verifying the\n"
+"Some, but not all, I2P bittorrent clients announce over their own "
+"tunnels.\n"
+"Trackers may choose to prevent spoofing by requiring this, and verifying "
+"the\n"
"client's\n"
"Destination\n"
"using HTTP headers added by the I2PTunnel HTTP Server tunnel.\n"
-"The headers are X-I2P-DestHash, X-I2P-DestB64, and X-I2P-DestB32, which are\n"
+"The headers are X-I2P-DestHash, X-I2P-DestB64, and X-I2P-DestB32, which "
+"are\n"
"different formats for the same information.\n"
"These headers cannot be spoofed by the client.\n"
-"A tracker enforcing destinations need not require the ip announce parameter at all."
+"A tracker enforcing destinations need not require the ip announce "
+"parameter at all."
msgstr ""
#: i2p2www/pages/site/docs/applications/bittorrent.html:129
msgid ""
-"As several clients use the HTTP proxy instead of their own tunnel for announces,\n"
-"destination enforcement will prevent usage by those clients unless or until\n"
+"As several clients use the HTTP proxy instead of their own tunnel for "
+"announces,\n"
+"destination enforcement will prevent usage by those clients unless or "
+"until\n"
"those clients are converted to announcing over their own tunnel."
msgstr ""
#: i2p2www/pages/site/docs/applications/bittorrent.html:135
msgid ""
-"Unfortunately, as the network grows, so will the amount of maliciousness,\n"
+"Unfortunately, as the network grows, so will the amount of maliciousness,"
+"\n"
"so we expect that all trackers will eventually enforce destinations.\n"
"Both tracker and client developers should anticipate it."
msgstr ""
@@ -3444,9 +4350,12 @@ msgstr ""
msgid ""
"Announce URL host names in torrent files generally follow the\n"
"I2P naming standards.\n"
-"In addition to host names from address books and \".b32.i2p\" Base 32 hostnames,\n"
-"the full Base 64 Destination (with [or without?] \".i2p\" appended) should be supported.\n"
-"Non-open trackers should recognize their own host name in any of these formats."
+"In addition to host names from address books and \".b32.i2p\" Base 32 "
+"hostnames,\n"
+"the full Base 64 Destination (with [or without?] \".i2p\" appended) "
+"should be supported.\n"
+"Non-open trackers should recognize their own host name in any of these "
+"formats."
msgstr ""
#: i2p2www/pages/site/docs/applications/bittorrent.html:152
@@ -3468,22 +4377,27 @@ msgstr ""
#: i2p2www/pages/site/docs/applications/bittorrent.html:165
#, python-format
msgid ""
-"I2P uses 387+ byte Destinations\n"
+"I2P uses 387+ byte Destinations\n"
"for addresses, as explained above."
msgstr ""
#: i2p2www/pages/site/docs/applications/bittorrent.html:170
msgid ""
-"If the client has only the hash of the destination (such as from a compact response or PEX), it must perform a lookup\n"
-"by encoding it with Base 32, appending \".b32.i2p\", and querying the Naming Service,\n"
+"If the client has only the hash of the destination (such as from a "
+"compact response or PEX), it must perform a lookup\n"
+"by encoding it with Base 32, appending \".b32.i2p\", and querying the "
+"Naming Service,\n"
"which will return the full Destination if available."
msgstr ""
#: i2p2www/pages/site/docs/applications/bittorrent.html:176
msgid ""
-"If the client has a peer's full Destination it received in a non-compact response, it should use it\n"
+"If the client has a peer's full Destination it received in a non-compact "
+"response, it should use it\n"
"directly in the connection setup.\n"
-"Do not convert a Destination back to a Base 32 hash for lookup, this is quite inefficient."
+"Do not convert a Destination back to a Base 32 hash for lookup, this is "
+"quite inefficient."
msgstr ""
#: i2p2www/pages/site/docs/applications/bittorrent.html:183
@@ -3493,32 +4407,40 @@ msgstr "Предотвращение межсетевых запросов"
#: i2p2www/pages/site/docs/applications/bittorrent.html:184
msgid ""
"To preserve anonymity,\n"
-"I2P bittorrent clients generally do not support non-I2P announces or peer connections.\n"
+"I2P bittorrent clients generally do not support non-I2P announces or peer"
+" connections.\n"
"I2P HTTP outproxies often block announces.\n"
"There are no known SOCKS outproxies supporting bittorrent traffic."
msgstr ""
#: i2p2www/pages/site/docs/applications/bittorrent.html:191
msgid ""
-"To prevent usage by non-I2P clients via an HTTP inproxy, I2P trackers often\n"
+"To prevent usage by non-I2P clients via an HTTP inproxy, I2P trackers "
+"often\n"
"block accesses or announces that contain an X-Forwarded-For HTTP header.\n"
-"Trackers should reject standard network announces with IPv4 or IPv6 IPs, and not deliver them in responses."
+"Trackers should reject standard network announces with IPv4 or IPv6 IPs, "
+"and not deliver them in responses."
msgstr ""
#: i2p2www/pages/site/docs/applications/bittorrent.html:200
#, python-format
msgid ""
"I2P PEX is based on ut_pex.\n"
-"As there does not appear to be a formal specification of ut_pex available,\n"
+"As there does not appear to be a formal specification of ut_pex "
+"available,\n"
"it may be necessary to review the libtorrent source for assistance.\n"
"It is an extension message, identified as \"i2p_pex\" in\n"
-"the extension handshake.\n"
-"It contains a bencoded dictionary with up to 3 keys, \"added\", \"added.f\", and \"dropped\".\n"
-"The added and dropped values are each a single byte string, whose length is a multiple of 32 bytes.\n"
+"the extension "
+"handshake.\n"
+"It contains a bencoded dictionary with up to 3 keys, \"added\", "
+"\"added.f\", and \"dropped\".\n"
+"The added and dropped values are each a single byte string, whose length "
+"is a multiple of 32 bytes.\n"
"These byte strings are the concatenated SHA-256 Hashes of the binary\n"
"Destinations\n"
"of the peers.\n"
-"This is the same format as the peers dictionary value in the i2p compact response format specified above.\n"
+"This is the same format as the peers dictionary value in the i2p compact "
+"response format specified above.\n"
"The added.f value, if present, is the same as in ut_pex."
msgstr ""
@@ -3533,10 +4455,13 @@ msgstr ""
#: i2p2www/pages/site/docs/applications/bittorrent.html:226
msgid ""
-"Unlike standard DHT, I2P DHT does not use a bit in the options handshake, or the PORT message.\n"
+"Unlike standard DHT, I2P DHT does not use a bit in the options handshake,"
+" or the PORT message.\n"
"It is advertised with an extension message, identified as \"i2p_dht\" in\n"
-"the extension handshake.\n"
-"It contains a bencoded dictionary with two keys, \"port\" and \"rport\", both integers."
+"the extension "
+"handshake.\n"
+"It contains a bencoded dictionary with two keys, \"port\" and \"rport\", "
+"both integers."
msgstr ""
#: i2p2www/pages/site/docs/applications/bittorrent.html:233
@@ -3566,12 +4491,14 @@ msgstr ""
msgid ""
"Compact peer info is 32 bytes (32 byte SHA256 Hash)\n"
"instead of 4 byte IP + 2 byte port. There is no peer port.\n"
-"In a response, the \"values\" key is a list of strings, each containing a single compact peer info."
+"In a response, the \"values\" key is a list of strings, each containing a"
+" single compact peer info."
msgstr ""
#: i2p2www/pages/site/docs/applications/bittorrent.html:260
msgid ""
-"Compact node info is 54 bytes (20 byte SHA1 Hash + 32 byte SHA256 Hash + 2 byte port)\n"
+"Compact node info is 54 bytes (20 byte SHA1 Hash + 32 byte SHA256 Hash + "
+"2 byte port)\n"
"instead of 20 byte SHA1 Hash + 4 byte IP + 2 byte port.\n"
"In a response, the \"nodes\" key is a\n"
"single byte string with concatenated compact node info."
@@ -3580,8 +4507,10 @@ msgstr ""
#: i2p2www/pages/site/docs/applications/bittorrent.html:267
msgid ""
"Secure node ID requirement: To make various DHT attacks more difficult,\n"
-"the first 4 bytes of the Node ID must match the first 4 bytes of the destination Hash,\n"
-"and the next two bytes of the Node ID must match the next two bytes of the\n"
+"the first 4 bytes of the Node ID must match the first 4 bytes of the "
+"destination Hash,\n"
+"and the next two bytes of the Node ID must match the next two bytes of "
+"the\n"
"destination hash exclusive-ORed with the port."
msgstr ""
@@ -3606,38 +4535,51 @@ msgid ""
"Preliminary differences from\n"
"BEP 15\n"
"are described below, and are subject to change.\n"
-"Contact the I2P developers if you wish to develop a client or tracker supporting datagram announces."
+"Contact the I2P developers if you wish to develop a client or tracker "
+"supporting datagram announces."
msgstr ""
#: i2p2www/pages/site/docs/applications/bittorrent.html:295
msgid ""
"A UDP tracker listens on two ports.\n"
-"The \"query port\" is the advertised port, and is used to receive repliable (signed) datagrams, for the connect request only.\n"
-"The \"response port\" is used to receive unsigned (raw) datagrams, and is the source port for all replies.\n"
+"The \"query port\" is the advertised port, and is used to receive "
+"repliable (signed) datagrams, for the connect request only.\n"
+"The \"response port\" is used to receive unsigned (raw) datagrams, and is"
+" the source port for all replies.\n"
"The response port is arbitrary.\n"
"A client sends and receives on a single port only.\n"
"It receives only unsigned (raw) datagrams.\n"
-"Raw datagrams provides increased efficiency for replies since they contain tokens sent in the query, and need not be signed."
+"Raw datagrams provides increased efficiency for replies since they "
+"contain tokens sent in the query, and need not be signed."
msgstr ""
#: i2p2www/pages/site/docs/applications/bittorrent.html:305
msgid ""
-"In the announce request, the 4-byte IP is replaced by a 32-byte hash, and the port is still present,\n"
+"In the announce request, the 4-byte IP is replaced by a 32-byte hash, and"
+" the port is still present,\n"
"although it may be ignored by the tracker.\n"
-"In the announce response, each 4-byte IP and 2-byte port is replaced by a 32-byte hash (compact peer info), and no port is present.\n"
-"The client sends the announce request and scrape request to the source port in the announce response packet.\n"
-"The connect request, connect response, scrape request, scrape response, and error response are the same as in BEP 15."
+"In the announce response, each 4-byte IP and 2-byte port is replaced by a"
+" 32-byte hash (compact peer info), and no port is present.\n"
+"The client sends the announce request and scrape request to the source "
+"port in the announce response packet.\n"
+"The connect request, connect response, scrape request, scrape response, "
+"and error response are the same as in BEP 15."
msgstr ""
#: i2p2www/pages/site/docs/applications/bittorrent.html:313
msgid ""
-"Source addresses in I2P cannot be spoofed, so it is possible to use a simplified protocol\n"
+"Source addresses in I2P cannot be spoofed, so it is possible to use a "
+"simplified protocol\n"
"with 2 packets instead of 4, omitting the connect request and response.\n"
-"In this case, the announce request would be a repliable datagram sent to the tracker's query port,\n"
+"In this case, the announce request would be a repliable datagram sent to "
+"the tracker's query port,\n"
"and the tracker would not require a response port.\n"
-"While this is more efficient, it would be more difficult to modify an existing tracker to support this mode.\n"
-"The URL for the 4-packet-mode tracker would use standard \"udp://\" prefix. \n"
-"The URL for a modified 2-packet-mode tracker would require a different prefix if both modes are supported in I2P."
+"While this is more efficient, it would be more difficult to modify an "
+"existing tracker to support this mode.\n"
+"The URL for the 4-packet-mode tracker would use standard \"udp://\" "
+"prefix. \n"
+"The URL for a modified 2-packet-mode tracker would require a different "
+"prefix if both modes are supported in I2P."
msgstr ""
#: i2p2www/pages/site/docs/applications/bittorrent.html:326
@@ -3677,15 +4619,19 @@ msgstr ""
#: i2p2www/pages/site/docs/applications/embedding.html:8
msgid ""
-"This page is about bundling the entire I2P router binary with your application.\n"
-"It is not about writing an application to work with I2P (either bundled or external)."
+"This page is about bundling the entire I2P router binary with your "
+"application.\n"
+"It is not about writing an application to work with I2P (either bundled "
+"or external)."
msgstr ""
#: i2p2www/pages/site/docs/applications/embedding.html:13
msgid ""
-"Lots of projects are bundling, or talking about bundling, I2P. That's great if done right.\n"
+"Lots of projects are bundling, or talking about bundling, I2P. That's "
+"great if done right.\n"
"If done wrong, it could cause real harm to our network.\n"
-"The I2P router is complex, and it can be a challenge to hide all the complexity from your users.\n"
+"The I2P router is complex, and it can be a challenge to hide all the "
+"complexity from your users.\n"
"This page discusses some general guidelines."
msgstr ""
@@ -3695,8 +4641,10 @@ msgstr ""
#: i2p2www/pages/site/docs/applications/embedding.html:24
msgid ""
-"Start a dialog. We're here to help. Applications that embed I2P are the most promising - and exciting -\n"
-"opportunities for us to grow the network and improve anonymity for everyone."
+"Start a dialog. We're here to help. Applications that embed I2P are the "
+"most promising - and exciting -\n"
+"opportunities for us to grow the network and improve anonymity for "
+"everyone."
msgstr ""
#: i2p2www/pages/site/docs/applications/embedding.html:30
@@ -3705,9 +4653,11 @@ msgstr ""
#: i2p2www/pages/site/docs/applications/embedding.html:31
msgid ""
-"If your application is in Java or Scala, it's an easy choice - use the Java router.\n"
+"If your application is in Java or Scala, it's an easy choice - use the "
+"Java router.\n"
"If in C/C++, we recommend i2pd. The development of i2pcpp has stopped.\n"
-"For apps in other languages, best to use SAM or BOB or SOCKS and bundle the Java router as a separate process.\n"
+"For apps in other languages, best to use SAM or BOB or SOCKS and bundle "
+"the Java router as a separate process.\n"
"Some of the following only applies to the Java router."
msgstr ""
@@ -3716,8 +4666,7 @@ msgid "Licensing"
msgstr ""
#: i2p2www/pages/site/docs/applications/embedding.html:40
-msgid ""
-"Ensure you meet the license requirements of the software you are bundling."
+msgid "Ensure you meet the license requirements of the software you are bundling."
msgstr ""
#: i2p2www/pages/site/docs/applications/embedding.html:45
@@ -3726,22 +4675,29 @@ msgstr ""
#: i2p2www/pages/site/docs/applications/embedding.html:46
msgid ""
-"A correct default configuration is crucial. Most users will not change the defaults.\n"
-"The defaults for your application may need to be different than the defaults for the router you are bundling.\n"
+"A correct default configuration is crucial. Most users will not change "
+"the defaults.\n"
+"The defaults for your application may need to be different than the "
+"defaults for the router you are bundling.\n"
"Override the router defaults if necessary."
msgstr ""
#: i2p2www/pages/site/docs/applications/embedding.html:51
msgid ""
-"Some important defaults to review: Max bandwidth, tunnel quantity and length, max participating tunnels.\n"
-"A lot of this depends on the expected bandwidth and usage patterns of your app."
+"Some important defaults to review: Max bandwidth, tunnel quantity and "
+"length, max participating tunnels.\n"
+"A lot of this depends on the expected bandwidth and usage patterns of "
+"your app."
msgstr ""
#: i2p2www/pages/site/docs/applications/embedding.html:55
msgid ""
-"Configure enough bandwidth and tunnels to allow your users to contribute to the network.\n"
-"Consider disabling external I2CP, as you probably don't need it and it would conflict with any other running I2P instance.\n"
-"Also look at the configs for disabling killing of the JVM on exit, for example."
+"Configure enough bandwidth and tunnels to allow your users to contribute "
+"to the network.\n"
+"Consider disabling external I2CP, as you probably don't need it and it "
+"would conflict with any other running I2P instance.\n"
+"Also look at the configs for disabling killing of the JVM on exit, for "
+"example."
msgstr ""
#: i2p2www/pages/site/docs/applications/embedding.html:62
@@ -3751,25 +4707,32 @@ msgstr ""
#: i2p2www/pages/site/docs/applications/embedding.html:63
msgid ""
"It may be tempting for you to disable participating traffic.\n"
-"There's several ways to do this (hidden mode, setting max tunnels to 0, setting shared bandwidth below 12 KBytes/sec).\n"
-"Without participating traffic, you don't have to worry about graceful shutdown,\n"
+"There's several ways to do this (hidden mode, setting max tunnels to 0, "
+"setting shared bandwidth below 12 KBytes/sec).\n"
+"Without participating traffic, you don't have to worry about graceful "
+"shutdown,\n"
"your users don't see bandwidth usage not generated by them, etc.\n"
-"However, there's lots of reasons why you should allow participating tunnels."
+"However, there's lots of reasons why you should allow participating "
+"tunnels."
msgstr ""
#: i2p2www/pages/site/docs/applications/embedding.html:70
msgid ""
-"First of all, the router doesn't work that well if it doesn't have a chance to \"integrate\" with the network,\n"
+"First of all, the router doesn't work that well if it doesn't have a "
+"chance to \"integrate\" with the network,\n"
"which is helped tremendously by others building tunnels through you."
msgstr ""
#: i2p2www/pages/site/docs/applications/embedding.html:74
msgid ""
-"Secondly, over 90% of the routers in the current network allow participating traffic.\n"
+"Secondly, over 90% of the routers in the current network allow "
+"participating traffic.\n"
"It's the default in the Java router.\n"
-"If your application doesn't route for others and it gets really popular, then it's a leech on the network,\n"
+"If your application doesn't route for others and it gets really popular, "
+"then it's a leech on the network,\n"
"and it upsets the balance we have now.\n"
-"If it gets really big, then we become Tor, and spend our time begging for people to enable relaying."
+"If it gets really big, then we become Tor, and spend our time begging for"
+" people to enable relaying."
msgstr ""
#: i2p2www/pages/site/docs/applications/embedding.html:81
@@ -3780,8 +4743,10 @@ msgstr ""
#: i2p2www/pages/site/docs/applications/embedding.html:84
msgid ""
-"We strongly discourage you from disabling participating traffic by default.\n"
-"If you do this and your application gets hugely popular, it could break the network."
+"We strongly discourage you from disabling participating traffic by "
+"default.\n"
+"If you do this and your application gets hugely popular, it could break "
+"the network."
msgstr ""
#: i2p2www/pages/site/docs/applications/embedding.html:90
@@ -3790,9 +4755,12 @@ msgstr ""
#: i2p2www/pages/site/docs/applications/embedding.html:91
msgid ""
-"You must save the router's data (netdb, configuration, etc.) between runs of the router.\n"
-"I2P does not work well if you must reseed each startup, and that's a huge load on our reseed servers, and not very good for anonymity either.\n"
-"Even if you bundle router infos, I2P needs saved profile data for best performance."
+"You must save the router's data (netdb, configuration, etc.) between runs"
+" of the router.\n"
+"I2P does not work well if you must reseed each startup, and that's a huge"
+" load on our reseed servers, and not very good for anonymity either.\n"
+"Even if you bundle router infos, I2P needs saved profile data for best "
+"performance."
msgstr ""
#: i2p2www/pages/site/docs/applications/embedding.html:99
@@ -3801,9 +4769,12 @@ msgstr ""
#: i2p2www/pages/site/docs/applications/embedding.html:100
msgid ""
-"Give your users a way to change the configuration of the important settings.\n"
-"We understand that you will probably want to hide most of I2P's complexity, but it's important to show some basic settings.\n"
-"In addition to the defaults above, some network settings such as UPnP, IP/port may be helpful."
+"Give your users a way to change the configuration of the important "
+"settings.\n"
+"We understand that you will probably want to hide most of I2P's "
+"complexity, but it's important to show some basic settings.\n"
+"In addition to the defaults above, some network settings such as UPnP, "
+"IP/port may be helpful."
msgstr ""
#: i2p2www/pages/site/docs/applications/embedding.html:108
@@ -3812,9 +4783,12 @@ msgstr ""
#: i2p2www/pages/site/docs/applications/embedding.html:109
msgid ""
-"Above a certain bandwidth setting, and meeting other health criteria, your router will become floodfill,\n"
-"which may cause a large increase in connections and memory usage (at least with the Java router).\n"
-"Think about whether that's OK. You can disable floodfill, but then your fastest users aren't contributing what they could.\n"
+"Above a certain bandwidth setting, and meeting other health criteria, "
+"your router will become floodfill,\n"
+"which may cause a large increase in connections and memory usage (at "
+"least with the Java router).\n"
+"Think about whether that's OK. You can disable floodfill, but then your "
+"fastest users aren't contributing what they could.\n"
"It also depends on the typical uptime for your application."
msgstr ""
@@ -3825,7 +4799,8 @@ msgstr ""
#: i2p2www/pages/site/docs/applications/embedding.html:120
msgid ""
"Decide if you are bundling router infos or using our reseed hosts.\n"
-"The Java reseed host list is in the source code, so if you keep your source up to date, the host list will be also.\n"
+"The Java reseed host list is in the source code, so if you keep your "
+"source up to date, the host list will be also.\n"
"Be aware of possible blocking by hostile governments."
msgstr ""
@@ -3835,9 +4810,12 @@ msgstr ""
#: i2p2www/pages/site/docs/applications/embedding.html:130
msgid ""
-"Consider setting your application tunnels to delay-open, reduce-on-idle and/or close-on-idle.\n"
-"This is straightforward if using i2ptunnel but you'll have to implement some of it yourself if using I2CP directly.\n"
-"See i2psnark for code that reduces tunnel count and then closes the tunnel, even in the presence of some background DHT activity."
+"Consider setting your application tunnels to delay-open, reduce-on-idle "
+"and/or close-on-idle.\n"
+"This is straightforward if using i2ptunnel but you'll have to implement "
+"some of it yourself if using I2CP directly.\n"
+"See i2psnark for code that reduces tunnel count and then closes the "
+"tunnel, even in the presence of some background DHT activity."
msgstr ""
#: i2p2www/pages/site/docs/applications/embedding.html:138
@@ -3846,11 +4824,16 @@ msgstr ""
#: i2p2www/pages/site/docs/applications/embedding.html:139
msgid ""
-"Have an auto-update feature if at all possible, or at least auto-notification of a new version.\n"
-"Our biggest fear is a huge number of routers out there that can't be updated.\n"
-"We have about 6-8 releases a year of the Java router, and it's critical to the health of the network that the users keep up.\n"
-"We usually have over 80% of the network on the latest release within 6 weeks after the release, and we'd like to keep it that way.\n"
-"You don't need to worry about disabling the router's built-in auto-update function, as that code is in the router console,\n"
+"Have an auto-update feature if at all possible, or at least auto-"
+"notification of a new version.\n"
+"Our biggest fear is a huge number of routers out there that can't be "
+"updated.\n"
+"We have about 6-8 releases a year of the Java router, and it's critical "
+"to the health of the network that the users keep up.\n"
+"We usually have over 80% of the network on the latest release within "
+"6 weeks after the release, and we'd like to keep it that way.\n"
+"You don't need to worry about disabling the router's built-in auto-update"
+" function, as that code is in the router console,\n"
"which you presumably are not bundling."
msgstr ""
@@ -3861,12 +4844,17 @@ msgstr ""
#: i2p2www/pages/site/docs/applications/embedding.html:151
msgid ""
"Have a gradual rollout plan. Don't overwhelm the network all at once.\n"
-"We currently have approximately 25K unique users per day and 40K uniques per month.\n"
-"We are probably able to handle growth of 2-3X per year without too much issue.\n"
-"If you anticipate a faster rampup than that, OR the bandwidth distribution (or uptime distribution,\n"
-"or any other significant characteristic) of your userbase is significantly different from our current userbase,\n"
+"We currently have approximately 25K unique users per day and 40K uniques "
+"per month.\n"
+"We are probably able to handle growth of 2-3X per year without too much "
+"issue.\n"
+"If you anticipate a faster rampup than that, OR the bandwidth "
+"distribution (or uptime distribution,\n"
+"or any other significant characteristic) of your userbase is "
+"significantly different from our current userbase,\n"
"we really need to have a discussion.\n"
-"The bigger your growth plans, the more important everthing else in this checklist is."
+"The bigger your growth plans, the more important everthing else in this "
+"checklist is."
msgstr ""
#: i2p2www/pages/site/docs/applications/embedding.html:163
@@ -3876,8 +4864,10 @@ msgstr ""
#: i2p2www/pages/site/docs/applications/embedding.html:164
msgid ""
"Tell your users that I2P works best if it keeps running.\n"
-"It may be several minutes after startup before it works well, and even more after first install.\n"
-"If your average uptime is less than an hour, I2P is probably the wrong solution."
+"It may be several minutes after startup before it works well, and even "
+"more after first install.\n"
+"If your average uptime is less than an hour, I2P is probably the wrong "
+"solution."
msgstr ""
#: i2p2www/pages/site/docs/applications/embedding.html:172
@@ -3886,8 +4876,8 @@ msgstr ""
#: i2p2www/pages/site/docs/applications/embedding.html:173
msgid ""
-"Provide some indication to the user that the application tunnels are ready. "
-"Encourage patience."
+"Provide some indication to the user that the application tunnels are "
+"ready. Encourage patience."
msgstr ""
#: i2p2www/pages/site/docs/applications/embedding.html:178
@@ -3897,7 +4887,8 @@ msgstr ""
#: i2p2www/pages/site/docs/applications/embedding.html:179
msgid ""
"If possible, delay the shutdown until your participating tunnels expire.\n"
-"Don't let your users break tunnels easily, or at least ask them to confirm."
+"Don't let your users break tunnels easily, or at least ask them to "
+"confirm."
msgstr ""
#: i2p2www/pages/site/docs/applications/embedding.html:185
@@ -3906,8 +4897,8 @@ msgstr ""
#: i2p2www/pages/site/docs/applications/embedding.html:186
msgid ""
-"It would be nice if you give your users links to learn more about I2P and to"
-" donate."
+"It would be nice if you give your users links to learn more about I2P and"
+" to donate."
msgstr ""
#: i2p2www/pages/site/docs/applications/embedding.html:192
@@ -3917,7 +4908,8 @@ msgstr ""
#: i2p2www/pages/site/docs/applications/embedding.html:193
msgid ""
"Depending on your user base and application,\n"
-"it may be helpful to provide an option or a separate package to use an external router."
+"it may be helpful to provide an option or a separate package to use an "
+"external router."
msgstr ""
#: i2p2www/pages/site/docs/applications/embedding.html:200
@@ -3926,7 +4918,8 @@ msgstr ""
#: i2p2www/pages/site/docs/applications/embedding.html:201
msgid ""
-"If you plan to use or link to other common I2P services (news feeds, hosts.txt subscriptions, trackers, outproxies, etc.),\n"
+"If you plan to use or link to other common I2P services (news feeds, "
+"hosts.txt subscriptions, trackers, outproxies, etc.),\n"
"make sure you aren't overloading them,\n"
"and talk to the people who are running them to make sure it's ok."
msgstr ""
@@ -3938,8 +4931,10 @@ msgstr ""
#: i2p2www/pages/site/docs/applications/embedding.html:210
msgid ""
"I2P includes an SNTP client. I2P requires correct time to operate.\n"
-"It will compensate for a skewed system clock but this may delay startup. You may disable I2P's SNTP queries,\n"
-"but this isn't advised unless your application makes sure the system clock is correct."
+"It will compensate for a skewed system clock but this may delay startup. "
+"You may disable I2P's SNTP queries,\n"
+"but this isn't advised unless your application makes sure the system "
+"clock is correct."
msgstr ""
#: i2p2www/pages/site/docs/applications/embedding.html:218
@@ -3948,15 +4943,20 @@ msgstr ""
#: i2p2www/pages/site/docs/applications/embedding.html:219
msgid ""
-"At a minimum you will need i2p.jar, router.jar, streaming.jar, and mstreaming.jar.\n"
+"At a minimum you will need i2p.jar, router.jar, streaming.jar, and "
+"mstreaming.jar.\n"
"You may omit the two straming jars for a datagram-only app.\n"
"Some apps may need more, e.g. i2ptunnel.jar or addressbook.jar.\n"
-"Don't forget jbigi.jar, or a subset of it for the platforms you support, to make the crypto much faster.\n"
-"We are currently building them for Java 6, as of 0.9.14. The source is mostly compatible with Java 5 if you want to do your own compile,\n"
+"Don't forget jbigi.jar, or a subset of it for the platforms you support, "
+"to make the crypto much faster.\n"
+"We are currently building them for Java 6, as of 0.9.14. The source is "
+"mostly compatible with Java 5 if you want to do your own compile,\n"
"but we may start using Java 6 features at any time without notice.\n"
"We plan to migrate to Java 7 in 2015.\n"
-"If you're building Debian / Ubuntu packages, you should require the I2P package from our PPA instead of bundling it.\n"
-"You almost certainly do not need susimail, susidns, the router console, and i2psnark, for example."
+"If you're building Debian / Ubuntu packages, you should require the I2P "
+"package from our PPA instead of bundling it.\n"
+"You almost certainly do not need susimail, susidns, the router console, "
+"and i2psnark, for example."
msgstr ""
#: i2p2www/pages/site/docs/applications/embedding.html:233
@@ -3974,13 +4974,17 @@ msgstr ""
#: i2p2www/pages/site/docs/applications/embedding.html:245
msgid ""
"If your application is using I2P datagrams, e.g. for a DHT,\n"
-"there's lots of advanced options available to reduce overhead and increase reliability.\n"
+"there's lots of advanced options available to reduce overhead and "
+"increase reliability.\n"
"This may take some time and experimentation to get working well.\n"
"Be aware of size/reliability tradeoffs. Talk to us for help.\n"
-"It is possible - and recommended - to use Datagrams and Streaming on the same Destination.\n"
+"It is possible - and recommended - to use Datagrams and Streaming on the "
+"same Destination.\n"
"Don't create separate Destinations for this.\n"
-"Don't try to store your unrelated data in the existing network DHTs (iMule, bote, bittorrent, and router).\n"
-"Build your own. If you are hardcoding seed nodes, we recommend that you have several."
+"Don't try to store your unrelated data in the existing network DHTs "
+"(iMule, bote, bittorrent, and router).\n"
+"Build your own. If you are hardcoding seed nodes, we recommend that you "
+"have several."
msgstr ""
#: i2p2www/pages/site/docs/applications/embedding.html:258
@@ -3990,7 +4994,8 @@ msgstr ""
#: i2p2www/pages/site/docs/applications/embedding.html:259
msgid ""
"Let's work together. Don't wait until it's done.\n"
-"Give us your Twitter handle and start tweeting about it, we will return the favor."
+"Give us your Twitter handle and start tweeting about it, we will return "
+"the favor."
msgstr ""
#: i2p2www/pages/site/docs/applications/embedding.html:265
@@ -4009,7 +5014,8 @@ msgstr ""
#: i2p2www/pages/site/docs/applications/embedding.html:273
msgid ""
-"This may be obvious, but join the community. Run I2P 24/7. Start an eepsite about your project.\n"
+"This may be obvious, but join the community. Run I2P 24/7. Start an "
+"eepsite about your project.\n"
"Hang out in IRC #i2p-dev. Post on the forums. Spread the word.\n"
"We can help get you users, testers, translators, or even coders."
msgstr ""
@@ -4020,10 +5026,12 @@ msgstr ""
#: i2p2www/pages/site/docs/applications/embedding.html:282
msgid ""
-"You may wish to install and play with the I2P Android app, and look at its code, for an example of an application that bundles the router.\n"
+"You may wish to install and play with the I2P Android app, and look at "
+"its code, for an example of an application that bundles the router.\n"
"See what we expose to the user and what we hide.\n"
"Look at the state machine we use to start and stop the router.\n"
-"Other examples are: Vuze, the Nightweb Android app, iMule, TAILS, iCloak, and Monero."
+"Other examples are: Vuze, the Nightweb Android app, iMule, TAILS, iCloak,"
+" and Monero."
msgstr ""
#: i2p2www/pages/site/docs/applications/embedding.html:290
@@ -4038,8 +5046,10 @@ msgstr ""
#: i2p2www/pages/site/docs/applications/embedding.html:306
msgid ""
-"This code is for the case where your application starts the router, as in our Android app.\n"
-"You could also have the router start the applictaion via the clients.config and i2ptunnel.config files,\n"
+"This code is for the case where your application starts the router, as in"
+" our Android app.\n"
+"You could also have the router start the applictaion via the "
+"clients.config and i2ptunnel.config files,\n"
"together with Jetty webapps,\n"
"as is done in our Java packages.\n"
"As always, state management is the difficult part."
@@ -4066,18 +5076,24 @@ msgstr ""
msgid ""
"As of release 0.9.4, the router supports managed clients.\n"
"Managed clients are instantiated and started by the ClientAppManager.\n"
-"The ClientAppManager maintains a reference to the client and receives updates on the client's state.\n"
-"Managed clients are preferred, as it is much easier to implement state tracking\n"
-"and to start and stop a client. It also is much easier to avoid static references in the client code\n"
+"The ClientAppManager maintains a reference to the client and receives "
+"updates on the client's state.\n"
+"Managed clients are preferred, as it is much easier to implement state "
+"tracking\n"
+"and to start and stop a client. It also is much easier to avoid static "
+"references in the client code\n"
"which could lead to excessive memory usage after a client is stopped.\n"
-"Managed clients may be started and stopped by the user in the router console,\n"
+"Managed clients may be started and stopped by the user in the router "
+"console,\n"
"and are stopped at router shutdown."
msgstr ""
#: i2p2www/pages/site/docs/applications/managed-clients.html:31
msgid ""
-"Managed clients implement either the net.i2p.app.ClientApp or net.i2p.router.app.RouterApp interface.\n"
-"Clients implementing the ClientApp interface must provide the following constructor:"
+"Managed clients implement either the net.i2p.app.ClientApp or "
+"net.i2p.router.app.RouterApp interface.\n"
+"Clients implementing the ClientApp interface must provide the following "
+"constructor:"
msgstr ""
#: i2p2www/pages/site/docs/applications/managed-clients.html:38
@@ -4096,10 +5112,12 @@ msgstr ""
#: i2p2www/pages/site/docs/applications/managed-clients.html:49
msgid ""
-"If the main class specified in the clients.config file does not implement a managed interface,\n"
+"If the main class specified in the clients.config file does not implement"
+" a managed interface,\n"
"it will be started with main() with the arguments specified,\n"
"and stopped with main() with the arguments specified.\n"
-"The router does not maintain a reference, since all interactions are via the static main() method.\n"
+"The router does not maintain a reference, since all interactions are via "
+"the static main() method.\n"
"The console cannot provide accurate state information to the user."
msgstr ""
@@ -4109,7 +5127,8 @@ msgstr ""
#: i2p2www/pages/site/docs/applications/managed-clients.html:58
msgid ""
-"Clients, whether managed or unmanaged, may register with the ClientAppManager\n"
+"Clients, whether managed or unmanaged, may register with the "
+"ClientAppManager\n"
"so that other clients may retrieve a reference to them.\n"
"Registration is by name.\n"
"Known registered clients are:"
@@ -4121,10 +5140,12 @@ msgstr ""
#: i2p2www/pages/site/docs/applications/managed-clients.html:69
msgid ""
-"The router also provides a simple mechanism for clients to find an internal socket service,\n"
+"The router also provides a simple mechanism for clients to find an "
+"internal socket service,\n"
"such as the HTTP proxy. This is provided by the Port Mapper.\n"
"Registration is by name.\n"
-"Clients that register generally provide an internal emulated socket on that port."
+"Clients that register generally provide an internal emulated socket on "
+"that port."
msgstr ""
#: i2p2www/pages/site/docs/applications/supported.html:2
@@ -4396,12 +5417,17 @@ msgstr ""
#, python-format
msgid ""
"Warning: Using an application, plugin, or service with I2P\n"
-"doesn't automatically protect your anonymity. I2P is merely a set of tools\n"
-"which can help you mitigate certain identified\n"
-"threats to anonymity. We do not and cannot make any guarantees about the\n"
+"doesn't automatically protect your anonymity. I2P is merely a set of "
+"tools\n"
+"which can help you mitigate certain identified\n"
+"threats to anonymity. We do not and cannot make any guarantees about "
+"the\n"
"safety of the applications, plugins, and services listed below. Most\n"
-"applications and plugins must be properly configured, and some will need to\n"
-"be patched — and even then your anonymity might not be assured. Similarly,\n"
+"applications and plugins must be properly configured, and some will need "
+"to\n"
+"be patched — and even then your anonymity might not be assured. "
+"Similarly,\n"
"services could put your anonymity at risk, either by design or through\n"
"carelessness on their part or your own."
msgstr ""
@@ -4409,8 +5435,10 @@ msgstr ""
#: i2p2www/pages/site/docs/applications/supported.html:171
msgid ""
"If you have doubts about the suitability of an application,\n"
-"plugin, or service for use with I2P, you are urged to inquire about privacy\n"
-"issues with its maintainers, to search its mailing lists and bug tracker if\n"
+"plugin, or service for use with I2P, you are urged to inquire about "
+"privacy\n"
+"issues with its maintainers, to search its mailing lists and bug tracker "
+"if\n"
"one exists, and consult trusted, knowledgeable members of the I2P\n"
"community."
msgstr ""
@@ -4418,7 +5446,8 @@ msgstr ""
#: i2p2www/pages/site/docs/applications/supported.html:179
msgid ""
"Take responsibility for your own anonymity and safety — always\n"
-"seek expert advice, educate yourself, practice good judgment, be mindful of\n"
+"seek expert advice, educate yourself, practice good judgment, be mindful "
+"of\n"
"disclosing personally identifying information, and don't take\n"
"shortcuts."
msgstr ""
@@ -4449,7 +5478,8 @@ msgstr ""
#: i2p2www/pages/site/docs/applications/supported.html:236
#, python-format
msgid ""
-"Port of the Tahoe-LAFS\n"
+"Port of the Tahoe-"
+"LAFS\n"
"distributed file system to the I2P network. Controller plugin here."
msgstr ""
@@ -4463,7 +5493,9 @@ msgstr "Самая популярная распределённая систе
msgid ""
"Another distributed version control system. Currently\n"
"used in I2P development."
-msgstr "Ещё одна распределённая система контроля версий. В настоящий момент\nиспользуется в разработке I2P."
+msgstr ""
+"Ещё одна распределённая система контроля версий. В настоящий момент\n"
+"используется в разработке I2P."
#: i2p2www/pages/site/docs/applications/supported.html:269
#, python-format
@@ -4471,8 +5503,10 @@ msgid ""
"Provides management of addressbooks, which are part of a simple,\n"
"user-controlled I2P naming system somewhat\n"
"analogous to the Internet's Domain Name System (DNS). Addressbooks map\n"
-"Base64 destinations to short, usually human-readable “domain” names ending\n"
-"with a .i2p suffix which the I2P router's HTTP client can resolve back to\n"
+"Base64 destinations to short, usually human-readable “domain” names "
+"ending\n"
+"with a .i2p suffix which the I2P router's HTTP client can resolve back to"
+"\n"
"Base64 addresses. (Note: While Base64 destinations are globally\n"
"unique, addressbook “domain” names only resolve to unique destinations\n"
"locally.)"
@@ -4487,7 +5521,8 @@ msgstr ""
#: i2p2www/pages/site/docs/applications/supported.html:297
msgid ""
"Provides email service within the I2P network via @mail.i2p addresses,\n"
-"and email gateway service between the I2P network and the public Internet\n"
+"and email gateway service between the I2P network and the public Internet"
+"\n"
"via @i2pmail.org addresses. One of the oldest continuous services on I2P."
msgstr ""
@@ -4542,7 +5577,8 @@ msgstr ""
#: i2p2www/pages/site/docs/applications/supported.html:382
msgid ""
-"The code that powered one of the first major tracker/indexer sites on the\n"
+"The code that powered one of the first major tracker/indexer sites on the"
+"\n"
"Internet. Patched for I2P."
msgstr ""
@@ -4567,7 +5603,8 @@ msgstr "Порт ED2K-клиента aMule для I2P."
#: i2p2www/pages/site/docs/applications/supported.html:422
#, python-format
msgid ""
-"Port of the Phex Gnutella client. Website\n"
+"Port of the Phex Gnutella "
+"client. Website\n"
"for plugin version here."
msgstr ""
@@ -4590,13 +5627,14 @@ msgstr "Похож на netcat, но более функционален."
#: i2p2www/pages/site/docs/applications/supported.html:461
msgid ""
-"Proxy providing simple, transparent SOCKS-ification of network applications."
+"Proxy providing simple, transparent SOCKS-ification of network "
+"applications."
msgstr ""
#: i2p2www/pages/site/docs/applications/supported.html:471
msgid ""
-"Most popular implementation of the Secure Shell (SSH) protocol and related "
-"tools."
+"Most popular implementation of the Secure Shell (SSH) protocol and "
+"related tools."
msgstr ""
#: i2p2www/pages/site/docs/applications/supported.html:477
@@ -4610,21 +5648,29 @@ msgstr ""
#: i2p2www/pages/site/docs/applications/supported.html:496
msgid ""
"Many IRC clients leak identifying information to servers or other\n"
-"clients, so I2P's IRC and SOCKS IRC client tunnels filter certain inbound\n"
-"and outbound messages to scrub data such as LAN IP addresses, external IP\n"
-"addresses, local hostnames, and the name and version of the IRC client. Two\n"
-"message types in particular, DCC and CTCP, can't be sufficiently anonymized\n"
-"without changes to the protocols or to IRC client/server code, so they are\n"
+"clients, so I2P's IRC and SOCKS IRC client tunnels filter certain inbound"
+"\n"
+"and outbound messages to scrub data such as LAN IP addresses, external IP"
+"\n"
+"addresses, local hostnames, and the name and version of the IRC client. "
+"Two\n"
+"message types in particular, DCC and CTCP, can't be sufficiently "
+"anonymized\n"
+"without changes to the protocols or to IRC client/server code, so they "
+"are\n"
"completely blocked, except for CTCP ACTION (the message emitted by the\n"
"/me
command) which isn't inherently dangerous."
msgstr ""
#: i2p2www/pages/site/docs/applications/supported.html:507
msgid ""
-"I2P's IRC filtering may not cover every possible leak — users should also\n"
-"check if their client is sending their real name or local username. Packet\n"
+"I2P's IRC filtering may not cover every possible leak — users should also"
+"\n"
+"check if their client is sending their real name or local username. "
+"Packet\n"
"sniffers such as Wireshark are\n"
-"useful here. Eliminating remaining leaks may be as simple as changing the\n"
+"useful here. Eliminating remaining leaks may be as simple as changing the"
+"\n"
"client's default configuration. If that doesn't help, inform the I2P\n"
"developers; they may be able to solve it via additional filtering."
msgstr ""
@@ -4658,8 +5704,8 @@ msgstr "Самый популярный IRC-сервер."
#: i2p2www/pages/site/docs/applications/supported.html:568
msgid ""
-"Any website hosted anonymously on I2P, reachable through the I2P router's "
-"HTTP proxy."
+"Any website hosted anonymously on I2P, reachable through the I2P router's"
+" HTTP proxy."
msgstr ""
#: i2p2www/pages/site/docs/applications/supported.html:576
@@ -4705,7 +5751,9 @@ msgstr "Кеширующий веб-прокси, не нуждающийся в
#: i2p2www/pages/site/docs/applications/supported.html:639
msgid "Gateways allowing users on the public Internet to access eepsites."
-msgstr "Шлюзы, позволяющие пользователям обычного интернета получить доступ к eep-сайтам."
+msgstr ""
+"Шлюзы, позволяющие пользователям обычного интернета получить доступ к "
+"eep-сайтам."
#: i2p2www/pages/site/docs/applications/supported.html:646
#, python-format
@@ -4719,8 +5767,11 @@ msgstr ""
#: i2p2www/pages/site/docs/applications/supported.html:671
msgid ""
-"Gateways allowing I2P users to access content hosted on the public Internet."
-msgstr "Шлюзы, предоставляющие пользователям I2P доступ к контенту, расположенному в обычном интернете."
+"Gateways allowing I2P users to access content hosted on the public "
+"Internet."
+msgstr ""
+"Шлюзы, предоставляющие пользователям I2P доступ к контенту, "
+"расположенному в обычном интернете."
#: i2p2www/pages/site/docs/applications/supported.html:678
msgid "Publicly advertised outproxy running Squid, located in Germany."
@@ -4729,9 +5780,12 @@ msgstr ""
#: i2p2www/pages/site/docs/applications/supported.html:688
msgid ""
"Lightweight web server and Java servlet container. I2P is tightly\n"
-"integrated with a bundled copy of Jetty which by default is configured to\n"
-"host the user's eepsite. The bundled\n"
-"Jetty also serves the I2P router console and web applications bundled with\n"
+"integrated with a bundled copy of Jetty which by default is configured to"
+"\n"
+"host the user's eepsite. The "
+"bundled\n"
+"Jetty also serves the I2P router console and web applications bundled "
+"with\n"
"I2P."
msgstr ""
@@ -4765,7 +5819,8 @@ msgstr ""
#: i2p2www/pages/site/docs/discussions/naming.html:4
#, python-format
msgid ""
-"NOTE: The following is a discussion of the reasons behind the I2P naming system,\n"
+"NOTE: The following is a discussion of the reasons behind the I2P naming "
+"system,\n"
"common arguments and possible alternatives.\n"
"See the naming page for current documentation."
msgstr ""
@@ -4776,49 +5831,72 @@ msgstr "Отвергнутые альтернативы"
#: i2p2www/pages/site/docs/discussions/naming.html:12
msgid ""
-"Naming within I2P has been an oft-debated topic since the very beginning with\n"
-"advocates across the spectrum of possibilities. However, given I2P's inherent\n"
-"demand for secure communication and decentralized operation, the traditional\n"
-"DNS-style naming system is clearly out, as are \"majority rules\" voting systems."
+"Naming within I2P has been an oft-debated topic since the very beginning "
+"with\n"
+"advocates across the spectrum of possibilities. However, given I2P's "
+"inherent\n"
+"demand for secure communication and decentralized operation, the "
+"traditional\n"
+"DNS-style naming system is clearly out, as are \"majority rules\" voting "
+"systems."
msgstr ""
#: i2p2www/pages/site/docs/discussions/naming.html:19
msgid ""
-"I2P does not promote the use of DNS-like services though, as the damage done\n"
-"by hijacking a site can be tremendous - and insecure destinations have no\n"
-"value. DNSsec itself still falls back on registrars and certificate authorities,\n"
-"while with I2P, requests sent to a destination cannot be intercepted or the reply\n"
-"spoofed, as they are encrypted to the destination's public keys, and a destination\n"
-"itself is just a pair of public keys and a certificate. DNS-style systems on the\n"
-"other hand allow any of the name servers on the lookup path to mount simple denial\n"
-"of service and spoofing attacks. Adding on a certificate authenticating the\n"
-"responses as signed by some centralized certificate authority would address many of\n"
-"the hostile nameserver issues but would leave open replay attacks as well as \n"
+"I2P does not promote the use of DNS-like services though, as the damage "
+"done\n"
+"by hijacking a site can be tremendous - and insecure destinations have no"
+"\n"
+"value. DNSsec itself still falls back on registrars and certificate "
+"authorities,\n"
+"while with I2P, requests sent to a destination cannot be intercepted or "
+"the reply\n"
+"spoofed, as they are encrypted to the destination's public keys, and a "
+"destination\n"
+"itself is just a pair of public keys and a certificate. DNS-style "
+"systems on the\n"
+"other hand allow any of the name servers on the lookup path to mount "
+"simple denial\n"
+"of service and spoofing attacks. Adding on a certificate authenticating "
+"the\n"
+"responses as signed by some centralized certificate authority would "
+"address many of\n"
+"the hostile nameserver issues but would leave open replay attacks as well"
+" as \n"
"hostile certificate authority attacks."
msgstr ""
#: i2p2www/pages/site/docs/discussions/naming.html:33
msgid ""
-"Voting style naming is dangerous as well, especially given the effectiveness of\n"
-"Sybil attacks in anonymous systems - the attacker can simply create an arbitrarily\n"
-"high number of peers and \"vote\" with each to take over a given name. Proof-of-work\n"
-"methods can be used to make identity non-free, but as the network grows the load\n"
-"required to contact everyone to conduct online voting is implausible, or if the\n"
+"Voting style naming is dangerous as well, especially given the "
+"effectiveness of\n"
+"Sybil attacks in anonymous systems - the attacker can simply create an "
+"arbitrarily\n"
+"high number of peers and \"vote\" with each to take over a given name. "
+"Proof-of-work\n"
+"methods can be used to make identity non-free, but as the network grows "
+"the load\n"
+"required to contact everyone to conduct online voting is implausible, or "
+"if the\n"
"full network is not queried, different sets of answers may be reachable."
msgstr ""
#: i2p2www/pages/site/docs/discussions/naming.html:42
msgid ""
-"As with the Internet however, I2P is keeping the design and operation of a \n"
-"naming system out of the (IP-like) communication layer. The bundled naming library\n"
-"includes a simple service provider interface which alternate naming systems can\n"
-"plug into, allowing end users to drive what sort of naming tradeoffs they prefer."
+"As with the Internet however, I2P is keeping the design and operation of "
+"a \n"
+"naming system out of the (IP-like) communication layer. The bundled "
+"naming library\n"
+"includes a simple service provider interface which alternate naming systems can\n"
+"plug into, allowing end users to drive what sort of naming tradeoffs they"
+" prefer."
msgstr ""
#: i2p2www/pages/site/docs/discussions/naming.html:50
msgid ""
-"See also Names: Decentralized, "
-"Secure, Human-Meaningful: Choose Two."
+"See also Names: "
+"Decentralized, Secure, Human-Meaningful: Choose Two."
msgstr ""
#: i2p2www/pages/site/docs/discussions/naming.html:55
@@ -4829,26 +5907,36 @@ msgstr ""
msgid ""
"Q:\n"
"What to do if some hosts \n"
-"do not agree on one address and if some addresses are working, others are not? \n"
+"do not agree on one address and if some addresses are working, others are"
+" not? \n"
"Who is the right source of a name?"
msgstr ""
#: i2p2www/pages/site/docs/discussions/naming.html:64
msgid ""
"A:\n"
-"You don't. This is actually a critical difference between names on I2P and how \n"
-"DNS works - names in I2P are human readable, secure, but not globally \n"
-"unique. This is by design, and an inherent part of our need for security."
+"You don't. This is actually a critical difference between names on I2P "
+"and how \n"
+"DNS works - names in I2P are human readable, secure, but not globally"
+" \n"
+"unique. This is by design, and an inherent part of our need for "
+"security."
msgstr ""
#: i2p2www/pages/site/docs/discussions/naming.html:70
msgid ""
-"If I could somehow convince you to change the destination associated with some \n"
-"name, I'd successfully \"take over\" the site, and under no circumstances is that \n"
-"acceptable. Instead, what we do is make names locally unique: they are \n"
-"what you use to call a site, just as how you can call things whatever \n"
-"you want when you add them to your browser's bookmarks, or your IM client's \n"
-"buddy list. Who you call \"Boss\" may be who someone else calls \"Sally\"."
+"If I could somehow convince you to change the destination associated with"
+" some \n"
+"name, I'd successfully \"take over\" the site, and under no circumstances"
+" is that \n"
+"acceptable. Instead, what we do is make names locally unique: "
+"they are \n"
+"what you use to call a site, just as how you can call things "
+"whatever \n"
+"you want when you add them to your browser's bookmarks, or your IM "
+"client's \n"
+"buddy list. Who you call \"Boss\" may be who someone else calls "
+"\"Sally\"."
msgstr ""
#: i2p2www/pages/site/docs/discussions/naming.html:78
@@ -4864,33 +5952,44 @@ msgstr ""
#: i2p2www/pages/site/docs/discussions/naming.html:89
msgid ""
"Inefficiency:\n"
-"The whole hosts.txt is downloaded (if it has changed, since eepget uses the etag and last-modified headers).\n"
+"The whole hosts.txt is downloaded (if it has changed, since eepget uses "
+"the etag and last-modified headers).\n"
"It's about 400K right now for almost 800 hosts."
msgstr ""
#: i2p2www/pages/site/docs/discussions/naming.html:94
msgid ""
-"True, but this isn't a lot of traffic in the context of i2p, which is itself wildly inefficient\n"
-"(floodfill databases, huge encryption overhead and padding, garlic routing, etc.).\n"
-"If you downloaded a hosts.txt file from someone every 12 hours it averages out to about 10 bytes/sec."
+"True, but this isn't a lot of traffic in the context of i2p, which is "
+"itself wildly inefficient\n"
+"(floodfill databases, huge encryption overhead and padding, garlic "
+"routing, etc.).\n"
+"If you downloaded a hosts.txt file from someone every 12 hours it "
+"averages out to about 10 bytes/sec."
msgstr ""
#: i2p2www/pages/site/docs/discussions/naming.html:99
msgid ""
-"As is usually the case in i2p, there is a fundamental tradeoff here between anonymity and efficiency.\n"
-"Some would say that using the etag and last-modified headers is hazardous because it exposes when you\n"
+"As is usually the case in i2p, there is a fundamental tradeoff here "
+"between anonymity and efficiency.\n"
+"Some would say that using the etag and last-modified headers is hazardous"
+" because it exposes when you\n"
"last requested the data.\n"
-"Others have suggested asking for specific keys only (similar to what jump services do, but\n"
+"Others have suggested asking for specific keys only (similar to what jump"
+" services do, but\n"
"in a more automated fashion), possibly at a further cost in anonymity."
msgstr ""
#: i2p2www/pages/site/docs/discussions/naming.html:106
#, python-format
msgid ""
-"Possible improvements would be a replacement or supplement to addressbook (see %(i2host)sp),\n"
-"or something simple like subscribing to http://example.i2p/cgi-bin/recenthosts.cgi rather than http://example.i2p/hosts.txt.\n"
-"If a hypothetical recenthosts.cgi distributed all hosts from the last 24 hours, for example,\n"
-"that could be both more efficient and more anonymous than the current hosts.txt with last-modified and etag."
+"Possible improvements would be a replacement or supplement to addressbook"
+" (see %(i2host)sp),\n"
+"or something simple like subscribing to http://example.i2p/cgi-"
+"bin/recenthosts.cgi rather than http://example.i2p/hosts.txt.\n"
+"If a hypothetical recenthosts.cgi distributed all hosts from the last 24 "
+"hours, for example,\n"
+"that could be both more efficient and more anonymous than the current "
+"hosts.txt with last-modified and etag."
msgstr ""
#: i2p2www/pages/site/docs/discussions/naming.html:112
@@ -4900,14 +5999,17 @@ msgid ""
"%(url)s.\n"
"This script returns an Etag with a timestamp.\n"
"When a request comes in with the If-None-Match etag,\n"
-"the script ONLY returns new hosts since that timestamp, or 304 Not Modified if there are none.\n"
-"In this way, the script efficiently returns only the hosts the subscriber\n"
+"the script ONLY returns new hosts since that timestamp, or 304 Not "
+"Modified if there are none.\n"
+"In this way, the script efficiently returns only the hosts the subscriber"
+"\n"
"does not know about, in an addressbook-compatible manner."
msgstr ""
#: i2p2www/pages/site/docs/discussions/naming.html:121
msgid ""
-"So the inefficiency is not a big issue and there are several ways to improve things without\n"
+"So the inefficiency is not a big issue and there are several ways to "
+"improve things without\n"
"radical change."
msgstr ""
@@ -4921,30 +6023,37 @@ msgstr ""
#: i2p2www/pages/site/docs/discussions/naming.html:132
msgid ""
"As far as network traffic see above.\n"
-"But unless you're going to do a slow real-time query over the network for\n"
-"a key, you need to have the whole set of keys stored locally, at a cost of about 500 bytes per key."
+"But unless you're going to do a slow real-time query over the network for"
+"\n"
+"a key, you need to have the whole set of keys stored locally, at a cost "
+"of about 500 bytes per key."
msgstr ""
#: i2p2www/pages/site/docs/discussions/naming.html:139
msgid ""
"Requires configuration and \"trust\":\n"
-"Out-of-the-box addressbook is only subscribed to http://www.i2p2.i2p/hosts.txt, which is rarely updated,\n"
+"Out-of-the-box addressbook is only subscribed to "
+"http://www.i2p2.i2p/hosts.txt, which is rarely updated,\n"
"leading to poor new-user experience."
msgstr ""
#: i2p2www/pages/site/docs/discussions/naming.html:144
msgid ""
-"This is very much intentional. jrandom wants a user to \"trust\" a hosts.txt\n"
+"This is very much intentional. jrandom wants a user to \"trust\" a "
+"hosts.txt\n"
"provider, and as he likes to say, \"trust is not a boolean\".\n"
-"The configuration step attempts to force users to think about issues of trust in an anonymous network."
+"The configuration step attempts to force users to think about issues of "
+"trust in an anonymous network."
msgstr ""
#: i2p2www/pages/site/docs/discussions/naming.html:149
msgid ""
"As another example, the \"Eepsite Unknown\" error page in the HTTP Proxy\n"
-"lists some jump services, but doesn't \"recommend\" any one in particular,\n"
+"lists some jump services, but doesn't \"recommend\" any one in "
+"particular,\n"
"and it's up to the user to pick one (or not).\n"
-"jrandom would say we trust the listed providers enough to list them but not enough to\n"
+"jrandom would say we trust the listed providers enough to list them but "
+"not enough to\n"
"automatically go fetch the key from them."
msgstr ""
@@ -4961,13 +6070,14 @@ msgstr "Это - не DNS"
#: i2p2www/pages/site/docs/discussions/naming.html:166
msgid ""
-"Unfortunately real-time lookups over i2p would significantly slow down web "
-"browsing."
+"Unfortunately real-time lookups over i2p would significantly slow down "
+"web browsing."
msgstr ""
#: i2p2www/pages/site/docs/discussions/naming.html:169
msgid ""
-"Also, DNS is based on lookups with limited caching and time-to-live, while i2p\n"
+"Also, DNS is based on lookups with limited caching and time-to-live, "
+"while i2p\n"
"keys are permanent."
msgstr ""
@@ -4986,21 +6096,26 @@ msgid ""
"Yes it depends on a few servers that you have configured.\n"
"Within i2p, servers and services come and go.\n"
"Any other centralized system (for example DNS root servers) would\n"
-"have the same problem. A completely decentralized system (everybody is authoritative)\n"
-"is possible by implementing an \"everybody is a root DNS server\" solution, or by\n"
-"something even simpler, like a script that adds everybody in your hosts.txt to your addressbook."
+"have the same problem. A completely decentralized system (everybody is "
+"authoritative)\n"
+"is possible by implementing an \"everybody is a root DNS server\" "
+"solution, or by\n"
+"something even simpler, like a script that adds everybody in your "
+"hosts.txt to your addressbook."
msgstr ""
#: i2p2www/pages/site/docs/discussions/naming.html:190
msgid ""
-"People advocating all-authoritative solutions generally haven't thought through\n"
+"People advocating all-authoritative solutions generally haven't thought "
+"through\n"
"the issues of conflicts and hijacking, however."
msgstr ""
#: i2p2www/pages/site/docs/discussions/naming.html:196
msgid ""
"Awkward, not real-time:\n"
-"It's a patchwork of hosts.txt providers, key-add web form providers, jump service providers,\n"
+"It's a patchwork of hosts.txt providers, key-add web form providers, jump"
+" service providers,\n"
"eepsite status reporters.\n"
"Jump servers and subscriptions are a pain, it should just work like DNS."
msgstr ""
@@ -5011,7 +6126,8 @@ msgstr ""
#: i2p2www/pages/site/docs/discussions/naming.html:207
msgid ""
-"So, in summary, the current system is not horribly broken, inefficient, or un-scalable,\n"
+"So, in summary, the current system is not horribly broken, inefficient, "
+"or un-scalable,\n"
"and proposals to \"just use DNS\" aren't well thought-through."
msgstr ""
@@ -5021,21 +6137,30 @@ msgstr "Альтернативы"
#: i2p2www/pages/site/docs/discussions/naming.html:213
msgid ""
-"The I2P source contains several pluggable naming systems and supports configuration options\n"
+"The I2P source contains several pluggable naming systems and supports "
+"configuration options\n"
"to enable experimentation with naming systems."
-msgstr "Исходный код I2P содержит несколько подключаемых систем именования и поддерживает параметры конфигурации, позволяющие экспериментировать с системами именования."
+msgstr ""
+"Исходный код I2P содержит несколько подключаемых систем именования и "
+"поддерживает параметры конфигурации, позволяющие экспериментировать с "
+"системами именования."
#: i2p2www/pages/site/docs/discussions/naming.html:218
msgid ""
"Meta - calls two or more other naming systems in order.\n"
"By default, calls PetName then HostsTxt."
-msgstr "Meta — вызывает две или более других систем именования в установленном порядке.\nПо умолчанию сначала вызывает PetName, потом HostsTxt."
+msgstr ""
+"Meta — вызывает две или более других систем именования в "
+"установленном порядке.\n"
+"По умолчанию сначала вызывает PetName, потом HostsTxt."
#: i2p2www/pages/site/docs/discussions/naming.html:222
msgid ""
"PetName - Looks up in a petnames.txt file.\n"
"The format for this file is NOT the same as hosts.txt."
-msgstr "PetName — Производит поиск в файле petnames.txt.\nФормат этого файла НЕ совпадает с hosts.txt."
+msgstr ""
+"PetName — Производит поиск в файле petnames.txt.\n"
+"Формат этого файла НЕ совпадает с hosts.txt."
#: i2p2www/pages/site/docs/discussions/naming.html:226
msgid "HostsTxt - Looks up in the following files, in order:"
@@ -5043,8 +6168,8 @@ msgstr "HostsTxt — Производит поиск в следующи
#: i2p2www/pages/site/docs/discussions/naming.html:234
msgid ""
-"AddressDB - Each host is listed in a separate file in a addressDb/ "
-"directory."
+"AddressDB - Each host is listed in a separate file in a addressDb/"
+" directory."
msgstr ""
#: i2p2www/pages/site/docs/discussions/naming.html:237
@@ -5069,15 +6194,22 @@ msgstr ""
#: i2p2www/pages/site/docs/discussions/naming.html:253
msgid ""
-"The current naming system can be changed with the advanced config option 'i2p.naming.impl'\n"
+"The current naming system can be changed with the advanced config option "
+"'i2p.naming.impl'\n"
"(restart required).\n"
"See core/java/src/net/i2p/client/naming for details."
-msgstr "Текущая система именования может быть изменена в дополнительных настройках 'i2p.naming.impl'\n(требуется перезагрузка).\nПодробнее см. core/java/src/net/i2p/client/naming.\n "
+msgstr ""
+"Текущая система именования может быть изменена в дополнительных "
+"настройках 'i2p.naming.impl'\n"
+"(требуется перезагрузка).\n"
+"Подробнее см. core/java/src/net/i2p/client/naming.\n"
+" "
#: i2p2www/pages/site/docs/discussions/naming.html:258
msgid ""
"Any new system should be stacked with HostsTxt, or should\n"
-"implement local storage and/or the addressbook subscription functions, since addressbook\n"
+"implement local storage and/or the addressbook subscription functions, "
+"since addressbook\n"
"only knows about the hosts.txt files and format."
msgstr ""
@@ -5087,40 +6219,50 @@ msgstr "Сертификаты"
#: i2p2www/pages/site/docs/discussions/naming.html:265
msgid ""
-"I2P destinations contain a certificate, however at the moment that certificate\n"
+"I2P destinations contain a certificate, however at the moment that "
+"certificate\n"
"is always null.\n"
-"With a null certificate, base64 destinations are always 516 bytes ending in \"AAAA\",\n"
-"and this is checked in the addressbook merge mechanism, and possibly other places.\n"
-"Also, there is no method available to generate a certificate or add it to a\n"
+"With a null certificate, base64 destinations are always 516 bytes ending "
+"in \"AAAA\",\n"
+"and this is checked in the addressbook merge mechanism, and possibly "
+"other places.\n"
+"Also, there is no method available to generate a certificate or add it to"
+" a\n"
"destination. So these will have to be updated to implement certificates."
msgstr ""
#: i2p2www/pages/site/docs/discussions/naming.html:273
#, python-format
msgid ""
-"One possible use of certificates is for proof "
-"of work."
+"One possible use of certificates is for proof of work."
msgstr ""
#: i2p2www/pages/site/docs/discussions/naming.html:276
msgid ""
-"Another is for \"subdomains\" (in quotes because there is really no such thing,\n"
-"i2p uses a flat naming system) to be signed by the 2nd level domain's keys."
+"Another is for \"subdomains\" (in quotes because there is really no such "
+"thing,\n"
+"i2p uses a flat naming system) to be signed by the 2nd level domain's "
+"keys."
msgstr ""
#: i2p2www/pages/site/docs/discussions/naming.html:280
msgid ""
-"With any certificate implementation must come the method for verifying the\n"
+"With any certificate implementation must come the method for verifying "
+"the\n"
"certificates.\n"
"Presumably this would happen in the addressbook merge code.\n"
-"Is there a method for multiple types of certificates, or multiple certificates?"
+"Is there a method for multiple types of certificates, or multiple "
+"certificates?"
msgstr ""
#: i2p2www/pages/site/docs/discussions/naming.html:286
msgid ""
"Adding on a certificate authenticating the\n"
-"responses as signed by some centralized certificate authority would address many of\n"
-"the hostile nameserver issues but would leave open replay attacks as well as \n"
+"responses as signed by some centralized certificate authority would "
+"address many of\n"
+"the hostile nameserver issues but would leave open replay attacks as well"
+" as \n"
"hostile certificate authority attacks."
msgstr ""
@@ -5130,18 +6272,27 @@ msgstr ""
#: i2p2www/pages/site/docs/how/cryptography.html:6
msgid "This page specifies the low-level details of the cryptography in I2P."
-msgstr "На этой странице подробно изложены низкоуровневые детали криптографии в I2P."
+msgstr ""
+"На этой странице подробно изложены низкоуровневые детали криптографии в "
+"I2P."
#: i2p2www/pages/site/docs/how/cryptography.html:10
#, python-format
msgid ""
-"There are a handful of cryptographic algorithms in use within I2P, but we have\n"
-"reduced them to a bare minimum to deal with our needs - one symmetric algorithm\n"
-"one asymmetric algorithm, one signing algorithm, and one hashing algorithm. However, \n"
-"we do combine them in some particular ways to provide message integrity (rather than\n"
-"relying on a MAC). In addition, as much as we hate doing anything new in regards to \n"
-"cryptography, we can't seem to find a reference discussing (or even naming) the \n"
-"technique used in ElGamal/AES+SessionTag (but we're sure others have done it)."
+"There are a handful of cryptographic algorithms in use within I2P, but we"
+" have\n"
+"reduced them to a bare minimum to deal with our needs - one symmetric "
+"algorithm\n"
+"one asymmetric algorithm, one signing algorithm, and one hashing "
+"algorithm. However, \n"
+"we do combine them in some particular ways to provide message integrity "
+"(rather than\n"
+"relying on a MAC). In addition, as much as we hate doing anything new in"
+" regards to \n"
+"cryptography, we can't seem to find a reference discussing (or even "
+"naming) the \n"
+"technique used in ElGamal/AES+SessionTag "
+"(but we're sure others have done it)."
msgstr ""
#: i2p2www/pages/site/docs/how/cryptography.html:20
@@ -5153,7 +6304,10 @@ msgid ""
"\n"
"ElGamal is used for asymmetric encryption.\n"
"ElGamal is used in several places in I2P:"
-msgstr "\nСхема Эль-Гамаля используется для ассиметричного шифрования.\nСхема используется в нескольких местах в I2P:"
+msgstr ""
+"\n"
+"Схема Эль-Гамаля используется для ассиметричного шифрования.\n"
+"Схема используется в нескольких местах в I2P:"
#: i2p2www/pages/site/docs/how/cryptography.html:27
#, python-format
@@ -5165,23 +6319,28 @@ msgstr ""
#: i2p2www/pages/site/docs/how/cryptography.html:30
#, python-format
msgid ""
-"For end-to-end (destination-to-destination) encryption as a part of ElGamal/AES+SessionTag\n"
-"using the encryption key in the LeaseSet"
+"For end-to-end (destination-to-destination) encryption as a part of ElGamal/AES+SessionTag\n"
+"using the encryption key in the LeaseSet"
msgstr ""
#: i2p2www/pages/site/docs/how/cryptography.html:34
#: i2p2www/pages/site/docs/how/cryptography.html:198
#, python-format
msgid ""
-"For encryption of some netDb stores and queries sent to floodfill routers\n"
+"For encryption of some netDb stores and "
+"queries sent to floodfill routers\n"
"as a part of ElGamal/AES+SessionTag\n"
"(destination-to-router or router-to-router)."
msgstr ""
#: i2p2www/pages/site/docs/how/cryptography.html:41
msgid ""
-"We use common primes for 2048 ElGamal encryption and decryption, as given by IETF RFC-3526.\n"
-"We currently only use ElGamal to encrypt the IV and session key in a single block, followed by the \n"
+"We use common primes for 2048 ElGamal encryption and decryption, as given"
+" by IETF RFC-3526.\n"
+"We currently only use ElGamal to encrypt the IV and session key in a "
+"single block, followed by the \n"
"AES encrypted payload using that key and IV."
msgstr ""
@@ -5191,13 +6350,15 @@ msgstr ""
#: i2p2www/pages/site/docs/how/cryptography.html:64
msgid ""
-"The H(data) is the SHA256 of the data that is encrypted in the ElGamal block,\n"
+"The H(data) is the SHA256 of the data that is encrypted in the ElGamal "
+"block,\n"
"and is preceded by a nonzero byte. \n"
"This byte could be random, but as implemented it is always 0xFF.\n"
"It could possibly be used for flags in the future.\n"
"The data encrypted in the block may be up to 222 bytes long.\n"
"As the encrypted data may contain a substantial number of zeros if the\n"
-"cleartext is smaller than 222 bytes, it is recommended that higher layers pad\n"
+"cleartext is smaller than 222 bytes, it is recommended that higher layers"
+" pad\n"
"the cleartext to 222 bytes with random data.\n"
"Total length: typically 255 bytes."
msgstr ""
@@ -5208,7 +6369,8 @@ msgstr ""
#: i2p2www/pages/site/docs/how/cryptography.html:102
msgid ""
-"Each encrypted part is prepended with zeros to a size of exactly 257 bytes.\n"
+"Each encrypted part is prepended with zeros to a size of exactly 257 "
+"bytes.\n"
"Total length: 514 bytes.\n"
"In typical usage, higher layers pad the cleartext data to 222 bytes,\n"
"resulting in an unencrypted block of 255 bytes.\n"
@@ -5224,7 +6386,8 @@ msgstr "См. код реализации схемы Эль-
#: i2p2www/pages/site/docs/how/cryptography.html:115
msgid ""
"The shared prime is the \n"
-"[Oakley prime for 2048 bit keys]"
+"[Oakley prime "
+"for 2048 bit keys]"
msgstr ""
#: i2p2www/pages/site/docs/how/cryptography.html:122
@@ -5252,17 +6415,23 @@ msgstr ""
#, python-format
msgid ""
"This should be safe for use with the Oakley primes, per\n"
-"On Diffie-Hellman Key Agreement with Short Exponents - van Oorschot, Weiner\n"
-"at EuroCrypt 96, and crypto++'s benchmarks.\n"
-"Benchmarks originally at this link, now dead,\n"
-"rescued from the wayback machine, dated Apr 23, 2008."
+"On Diffie-Hellman Key Agreement with Short Exponents "
+"- van Oorschot, Weiner\n"
+"at EuroCrypt 96, and crypto++'s "
+"benchmarks.\n"
+"Benchmarks originally at this link, now dead,\n"
+"rescued from the wayback machine,"
+" dated Apr 23, 2008."
msgstr ""
#: i2p2www/pages/site/docs/how/cryptography.html:160
#, python-format
msgid ""
-"Also, Koshiba & Kurosawa: Short Exponent Diffie-Hellman Problems (PKC 2004, LNCS 2947, pp. 173-186)\n"
-"(full text on Google Books) apparently supports this, according to\n"
+"Also, Koshiba & Kurosawa: Short Exponent Diffie-"
+"Hellman Problems (PKC 2004, LNCS 2947, pp. 173-186)\n"
+"(full text on Google Books) apparently "
+"supports this, according to\n"
"this sci.crypt thread.\n"
"The remainder of the PrivateKey is padded with zeroes."
msgstr ""
@@ -5271,8 +6440,10 @@ msgstr ""
msgid ""
"Prior to release 0.9.8, all routers used the short exponent.\n"
"As of release 0.9.8, 64-bit x86 routers use a full 2048-bit exponent.\n"
-"Other routers continue to use the short exponent due to concerns about processor load.\n"
-"The transition to a longer exponent for these platforms is a topic for further study."
+"Other routers continue to use the short exponent due to concerns about "
+"processor load.\n"
+"The transition to a longer exponent for these platforms is a topic for "
+"further study."
msgstr ""
#: i2p2www/pages/site/docs/how/cryptography.html:176
@@ -5284,7 +6455,8 @@ msgstr ""
#: i2p2www/pages/site/docs/how/cryptography.html:177
msgid ""
-"The vulnerability of the network to an ElGamal attack and the impact of transitioning to a longer bit length is to be studied.\n"
+"The vulnerability of the network to an ElGamal attack and the impact of "
+"transitioning to a longer bit length is to be studied.\n"
"It may be quite difficult to make any change backward-compatible."
msgstr ""
@@ -5306,24 +6478,30 @@ msgstr ""
#: i2p2www/pages/site/docs/how/cryptography.html:204
#, python-format
msgid ""
-"For encryption of periodic tunnel test"
-" messages sent from the router to itself, through its own tunnels."
+"For encryption of periodic tunnel "
+"test messages sent from the router to itself, through its own "
+"tunnels."
msgstr ""
#: i2p2www/pages/site/docs/how/cryptography.html:209
#, python-format
msgid ""
"We use AES with 256 bit keys and 128 bit blocks in CBC mode.\n"
-"The padding used is specified in IETF RFC-2313 (PKCS#5 1.5, section 8.1 (for block type 02)).\n"
-"In this case, padding exists of pseudorandomly generated octets to match 16 byte blocks.\n"
-"Specifically, see [the CBC code] and the Cryptix AES\n"
-"[implementation], as well as the padding, found in the\n"
+"The padding used is specified in IETF RFC-2313 "
+"(PKCS#5 1.5, section 8.1 (for block type 02)).\n"
+"In this case, padding exists of pseudorandomly generated octets to match "
+"16 byte blocks.\n"
+"Specifically, see [the CBC code] and the "
+"Cryptix AES\n"
+"[implementation], as well as the padding, found"
+" in the\n"
"ElGamalAESEngine.getPadding function."
msgstr ""
#: i2p2www/pages/site/docs/how/cryptography.html:274
msgid ""
-"The vulnerability of the network to an AES attack and the impact of transitioning to a longer bit length is to be studied.\n"
+"The vulnerability of the network to an AES attack and the impact of "
+"transitioning to a longer bit length is to be studied.\n"
"It may be quite difficult to make any change backward-compatible."
msgstr ""
@@ -5353,7 +6531,8 @@ msgstr ""
#: i2p2www/pages/site/docs/how/cryptography.html:295
#, python-format
msgid ""
-"Signatures are generated and verified with 1024 bit DSA (L=1024, N=160), as implemented in\n"
+"Signatures are generated and verified with 1024 bit DSA (L=1024, N=160), "
+"as implemented in\n"
"[DSAEngine].\n"
"DSA was chosen because it is much faster for signatures than ElGamal."
msgstr ""
@@ -5361,8 +6540,10 @@ msgstr ""
#: i2p2www/pages/site/docs/how/cryptography.html:350
#, python-format
msgid ""
-"The Signing Public Key is 1024 bits.\n"
-"The Signing Private Key is 160 bits."
+"The Signing Public"
+" Key is 1024 bits.\n"
+"The Signing "
+"Private Key is 160 bits."
msgstr ""
#: i2p2www/pages/site/docs/how/cryptography.html:357
@@ -5370,15 +6551,18 @@ msgstr ""
msgid ""
"NIST 800-57\n"
"recommends a minimum of (L=2048, N=224) for usage beyond 2010.\n"
-"This may be mitigated somewhat by the \"cryptoperiod\", or lifespan of a given key."
+"This may be mitigated somewhat by the \"cryptoperiod\", or lifespan of a "
+"given key."
msgstr ""
#: i2p2www/pages/site/docs/how/cryptography.html:363
msgid ""
"The prime number was chosen in 2003,\n"
-"and the person that chose the number (TheCrypto) is currently no longer an I2P developer.\n"
+"and the person that chose the number (TheCrypto) is currently no longer "
+"an I2P developer.\n"
"As such, we do not know if the prime chosen is a 'strong prime'.\n"
-"If a larger prime is chosen for future purposes, this should be a strong prime, and we will document the construction process."
+"If a larger prime is chosen for future purposes, this should be a strong "
+"prime, and we will document the construction process."
msgstr ""
#: i2p2www/pages/site/docs/how/cryptography.html:374
@@ -5397,10 +6581,14 @@ msgstr ""
#: i2p2www/pages/site/docs/how/cryptography.html:386
msgid ""
-"As of release 0.9.12, the router supports additional signature algorithms that are more secure than 1024-bit DSA.\n"
-"The first usage is for Destinations; support for Router Identities was added in release 0.9.16.\n"
-"Support for migrating existing Destinations from old to new signatures will be added in a future release.\n"
-"Signature type is encoded in the Destination and Router Identity, so that new signature algorithms\n"
+"As of release 0.9.12, the router supports additional signature algorithms"
+" that are more secure than 1024-bit DSA.\n"
+"The first usage is for Destinations; support for Router Identities was "
+"added in release 0.9.16.\n"
+"Support for migrating existing Destinations from old to new signatures "
+"will be added in a future release.\n"
+"Signature type is encoded in the Destination and Router Identity, so that"
+" new signature algorithms\n"
"or curves may be added at any time.\n"
"The current supported signature types are as follows:"
msgstr ""
@@ -5408,24 +6596,30 @@ msgstr ""
#: i2p2www/pages/site/docs/how/cryptography.html:407
msgid ""
"ECDSA uses the standard NIST curves and standard SHA-2 hashes.\n"
-"We will migrate new destinations to ECDSA-SHA256-P256 in the 0.9.16 - 0.9.19 release time frame.\n"
-"Usage for Router Identities is supported as of release 0.9.16 and migration may occur in early 2015."
+"We will migrate new destinations to ECDSA-SHA256-P256 in the 0.9.16 - "
+"0.9.19 release time frame.\n"
+"Usage for Router Identities is supported as of release 0.9.16 and "
+"migration may occur in early 2015."
msgstr ""
#: i2p2www/pages/site/docs/how/cryptography.html:416
msgid ""
"Standard RSA with the public exponent F4 = 65537.\n"
-"RSA is now used for signing all out-of-band trusted content, including router updates, reseeding, plugins, and news.\n"
-"The signatures are embedded in the \"su3\" format documented on the router updates page.\n"
+"RSA is now used for signing all out-of-band trusted content, including "
+"router updates, reseeding, plugins, and news.\n"
+"The signatures are embedded in the \"su3\" format documented on the "
+"router updates page.\n"
"4096-bit keys are recommended and used by all known signers.\n"
-"RSA is not used, or planned for use, in any in-network Destinations or Router Identities."
+"RSA is not used, or planned for use, in any in-network Destinations or "
+"Router Identities."
msgstr ""
#: i2p2www/pages/site/docs/how/cryptography.html:427
msgid ""
"Standard EdDSA using curve 25519 and standard 512-bit SHA-2 hashes.\n"
"Supported as of release 0.9.15.\n"
-"Migration for Destinations and Router Identities is scheduled for mid-2015."
+"Migration for Destinations and Router Identities is scheduled for "
+"mid-2015."
msgstr ""
#: i2p2www/pages/site/docs/how/cryptography.html:437
@@ -5437,7 +6631,8 @@ msgstr ""
#: i2p2www/pages/site/docs/how/cryptography.html:443
msgid ""
-"The vulnerability of the network to a SHA-256 attack and the impact of transitioning to a longer hash is to be studied.\n"
+"The vulnerability of the network to a SHA-256 attack and the impact of "
+"transitioning to a longer hash is to be studied.\n"
"It may be quite difficult to make any change backward-compatible."
msgstr ""
@@ -5448,13 +6643,16 @@ msgstr ""
#: i2p2www/pages/site/docs/how/cryptography.html:455
msgid ""
"At the lowest protocol layer,\n"
-"point-to-point inter-router communication is protected by the transport layer security.\n"
+"point-to-point inter-router communication is protected by the transport "
+"layer security.\n"
"Both transports use 256 byte (2048 bit) Diffie-Hellman key exchange\n"
"using\n"
-"the same shared prime and generator as specified above for ElGamal,\n"
+"the same shared prime and generator as specified "
+"above for ElGamal,\n"
"followed by symmetric AES encryption as described above.\n"
"This provides\n"
-"perfect forward secrecy\n"
+"perfect "
+"forward secrecy\n"
"on the transport links."
msgstr ""
@@ -5465,17 +6663,24 @@ msgstr ""
#: i2p2www/pages/site/docs/how/cryptography.html:469
#, python-format
msgid ""
-"NTCP connections are negotiated with a 2048 Diffie-Hellman implementation,\n"
-"using the router's identity to proceed with a station to station agreement, followed by\n"
-"some encrypted protocol specific fields, with all subsequent data encrypted with AES\n"
+"NTCP connections are negotiated with a 2048 Diffie-Hellman "
+"implementation,\n"
+"using the router's identity to proceed with a station to station "
+"agreement, followed by\n"
+"some encrypted protocol specific fields, with all subsequent data "
+"encrypted with AES\n"
"(as above).\n"
-"The primary reason to do the DH negotiation instead of using ElGamalAES+SessionTag is that it provides '(perfect) forward secrecy', while ElGamalAES+SessionTag does not."
+"The primary reason to do the DH negotiation instead of using ElGamalAES+SessionTag is that it provides '(perfect) "
+"forward secrecy', while ElGamalAES+SessionTag does not."
msgstr ""
#: i2p2www/pages/site/docs/how/cryptography.html:477
msgid ""
-"In order to migrate to a more standardized implementation (TLS/SSL or even "
-"SSH), the following issues must be addressed:"
+"In order to migrate to a more standardized implementation (TLS/SSL or "
+"even SSH), the following issues must be addressed:"
msgstr ""
#: i2p2www/pages/site/docs/how/cryptography.html:481
@@ -5486,7 +6691,8 @@ msgstr ""
#: i2p2www/pages/site/docs/how/cryptography.html:484
msgid ""
-"Can we simplify/avoid the x509 or other certificate formats and use our own RouterInfo structure (which \n"
+"Can we simplify/avoid the x509 or other certificate formats and use our "
+"own RouterInfo structure (which \n"
"contains the ElGamal and DSA keys)?"
msgstr ""
@@ -5501,10 +6707,14 @@ msgstr ""
#: i2p2www/pages/site/docs/how/cryptography.html:494
msgid ""
-"SSU (the UDP transport) encrypts each packet with AES256/CBC with both an explicit IV and MAC \n"
-"(HMAC-MD5-128) after agreeing upon an ephemeral session key through a 2048 bit \n"
-"Diffie-Hellman exchange, station-to-station authentication with the other \n"
-"router's DSA key, plus each network message has their own hash for local integrity \n"
+"SSU (the UDP transport) encrypts each packet with AES256/CBC with both an"
+" explicit IV and MAC \n"
+"(HMAC-MD5-128) after agreeing upon an ephemeral session key through a "
+"2048 bit \n"
+"Diffie-Hellman exchange, station-to-station authentication with the other"
+" \n"
+"router's DSA key, plus each network message has their own hash for local "
+"integrity \n"
"checking."
msgstr ""
@@ -5517,8 +6727,10 @@ msgstr "Подробнее см. спецификаци
#, python-format
msgid ""
"WARNING - I2P's HMAC-MD5-128 used in SSU is apparently non-standard.\n"
-"Apparently, an early version of SSU used HMAC-SHA256, and then it was switched\n"
-"to MD5-128 for performance reasons, but left the 32-byte buffer size intact.\n"
+"Apparently, an early version of SSU used HMAC-SHA256, and then it was "
+"switched\n"
+"to MD5-128 for performance reasons, but left the 32-byte buffer size "
+"intact.\n"
"See HMACGenerator.java and\n"
"the 2005-07-05 status notes\n"
"for details."
@@ -5539,58 +6751,91 @@ msgstr ""
#: i2p2www/pages/site/docs/how/elgamal-aes.html:11
msgid ""
-"As an unreliable, unordered, message based system, I2P uses a simple combination \n"
-"of asymmetric and symmetric encryption algorithms to provide data confidentiality \n"
-"and integrity to garlic messages. As a whole, the combination is referred \n"
-"to as ElGamal/AES+SessionTags, but that is an excessively verbose way to describe \n"
+"As an unreliable, unordered, message based system, I2P uses a simple "
+"combination \n"
+"of asymmetric and symmetric encryption algorithms to provide data "
+"confidentiality \n"
+"and integrity to garlic messages. As a whole, the combination is referred"
+" \n"
+"to as ElGamal/AES+SessionTags, but that is an excessively verbose way to "
+"describe \n"
"the use of 2048bit ElGamal, AES256, SHA256, and 32 byte nonces."
msgstr ""
#: i2p2www/pages/site/docs/how/elgamal-aes.html:19
#: i2p2www/pages/site/docs/how/tech-intro.html:512
msgid ""
-"The first time a router wants to encrypt a garlic message to another router, \n"
-"they encrypt the keying material for an AES256 session key with ElGamal and \n"
-"append the AES256/CBC encrypted payload after that encrypted ElGamal block. \n"
-"In addition to the encrypted payload, the AES encrypted section contains the \n"
-"payload length, the SHA256 hash of the unencrypted payload, as well as a number \n"
-"of \"session tags\" - random 32 byte nonces. The next time the sender wants \n"
-"to encrypt a garlic message to another router, rather than ElGamal encrypt \n"
-"a new session key they simply pick one of the previously delivered session \n"
-"tags and AES encrypt the payload like before, using the session key used with \n"
-"that session tag, prepended with the session tag itself. When a router receives \n"
-"a garlic encrypted message, they check the first 32 bytes to see if it matches \n"
-"an available session tag - if it does, they simply AES decrypt the message, \n"
+"The first time a router wants to encrypt a garlic message to another "
+"router, \n"
+"they encrypt the keying material for an AES256 session key with ElGamal "
+"and \n"
+"append the AES256/CBC encrypted payload after that encrypted ElGamal "
+"block. \n"
+"In addition to the encrypted payload, the AES encrypted section contains "
+"the \n"
+"payload length, the SHA256 hash of the unencrypted payload, as well as a "
+"number \n"
+"of \"session tags\" - random 32 byte nonces. The next time the sender "
+"wants \n"
+"to encrypt a garlic message to another router, rather than ElGamal "
+"encrypt \n"
+"a new session key they simply pick one of the previously delivered "
+"session \n"
+"tags and AES encrypt the payload like before, using the session key used "
+"with \n"
+"that session tag, prepended with the session tag itself. When a router "
+"receives \n"
+"a garlic encrypted message, they check the first 32 bytes to see if it "
+"matches \n"
+"an available session tag - if it does, they simply AES decrypt the "
+"message, \n"
"but if it does not, they ElGamal decrypt the first block."
msgstr ""
#: i2p2www/pages/site/docs/how/elgamal-aes.html:35
#: i2p2www/pages/site/docs/how/tech-intro.html:528
msgid ""
-"Each session tag can be used only once so as to prevent internal adversaries \n"
-"from unnecessarily correlating different messages as being between the same \n"
-"routers. The sender of an ElGamal/AES+SessionTag encrypted message chooses \n"
-"when and how many tags to deliver, prestocking the recipient with enough tags \n"
-"to cover a volley of messages. Garlic messages may detect the successful tag \n"
-"delivery by bundling a small additional message as a clove (a \"delivery status \n"
-"message\") - when the garlic message arrives at the intended recipient and \n"
-"is decrypted successfully, this small delivery status message is one of the \n"
-"cloves exposed and has instructions for the recipient to send the clove back \n"
-"to the original sender (through an inbound tunnel, of course). When the original \n"
-"sender receives this delivery status message, they know that the session tags \n"
+"Each session tag can be used only once so as to prevent internal "
+"adversaries \n"
+"from unnecessarily correlating different messages as being between the "
+"same \n"
+"routers. The sender of an ElGamal/AES+SessionTag encrypted message "
+"chooses \n"
+"when and how many tags to deliver, prestocking the recipient with enough "
+"tags \n"
+"to cover a volley of messages. Garlic messages may detect the successful "
+"tag \n"
+"delivery by bundling a small additional message as a clove (a \"delivery "
+"status \n"
+"message\") - when the garlic message arrives at the intended recipient "
+"and \n"
+"is decrypted successfully, this small delivery status message is one of "
+"the \n"
+"cloves exposed and has instructions for the recipient to send the clove "
+"back \n"
+"to the original sender (through an inbound tunnel, of course). When the "
+"original \n"
+"sender receives this delivery status message, they know that the session "
+"tags \n"
"bundled in the garlic message were successfully delivered."
msgstr ""
#: i2p2www/pages/site/docs/how/elgamal-aes.html:50
msgid ""
"Session tags themselves have a short lifetime, after which they are \n"
-"discarded if not used. In addition, the quantity stored for each key is limited, \n"
-"as are the number of keys themselves - if too many arrive, either new or old \n"
-"messages may be dropped. The sender keeps track whether messages using session \n"
-"tags are getting through, and if there isn't sufficient communication it may \n"
-"drop the ones previously assumed to be properly delivered, reverting back \n"
+"discarded if not used. In addition, the quantity stored for each key is "
+"limited, \n"
+"as are the number of keys themselves - if too many arrive, either new or "
+"old \n"
+"messages may be dropped. The sender keeps track whether messages using "
+"session \n"
+"tags are getting through, and if there isn't sufficient communication it "
+"may \n"
+"drop the ones previously assumed to be properly delivered, reverting back"
+" \n"
"to the full expensive ElGamal encryption.\n"
-"A session will continue to exist until all its tags are exhausted or expire."
+"A session will continue to exist until all its tags are exhausted or "
+"expire."
msgstr ""
#: i2p2www/pages/site/docs/how/elgamal-aes.html:61
@@ -5605,7 +6850,8 @@ msgid ""
"between a Router and a Destination.\n"
"Each Router and Destination maintains its own Session Key Manager to\n"
"keep track of Session Keys and Session Tags.\n"
-"Separate Session Key Managers prevents correlation of multiple Destinations\n"
+"Separate Session Key Managers prevents correlation of multiple "
+"Destinations\n"
"to each other or a Router by adversaries."
msgstr ""
@@ -5626,14 +6872,14 @@ msgid ""
msgstr ""
#: i2p2www/pages/site/docs/how/elgamal-aes.html:85
-msgid ""
-"It is for a new session and contains both ElGamal and AES encrypted blocks"
+msgid "It is for a new session and contains both ElGamal and AES encrypted blocks"
msgstr ""
#: i2p2www/pages/site/docs/how/elgamal-aes.html:88
msgid ""
"When a router receives a message, it will first assume it is from\n"
-"an existing session and attempt to look up the Session Tag and decrypt the following data using AES.\n"
+"an existing session and attempt to look up the Session Tag and decrypt "
+"the following data using AES.\n"
"If that fails, it will assume it is for a new session and attempt to\n"
"decrypt it using ElGamal."
msgstr ""
@@ -5644,7 +6890,8 @@ msgstr ""
#: i2p2www/pages/site/docs/how/elgamal-aes.html:98
msgid ""
-"A New Session ElGamal Message contains two parts, an encrypted ElGamal block\n"
+"A New Session ElGamal Message contains two parts, an encrypted ElGamal "
+"block\n"
"and an encrypted AES block."
msgstr ""
@@ -5670,7 +6917,8 @@ msgid ""
"The 32-byte\n"
"Session Key\n"
"is the identifier for the session.\n"
-"The 32-byte Pre-IV will be used to generate the IV for the AES block that follows;\n"
+"The 32-byte Pre-IV will be used to generate the IV for the AES block that"
+" follows;\n"
"the IV is the first 16 bytes of the SHA-256 Hash of the Pre-IV."
msgstr ""
@@ -5699,8 +6947,8 @@ msgstr ""
#: i2p2www/pages/site/docs/how/elgamal-aes.html:228
#, python-format
msgid ""
-"That many 32-byte Session "
-"Tags"
+"That many 32-byte Session Tags"
msgstr ""
#: i2p2www/pages/site/docs/how/elgamal-aes.html:232
@@ -5711,8 +6959,8 @@ msgstr ""
#: i2p2www/pages/site/docs/how/elgamal-aes.html:236
#, python-format
msgid ""
-"The 32-byte SHA256 Hash of "
-"the payload"
+"The 32-byte SHA256 Hash of"
+" the payload"
msgstr ""
#: i2p2www/pages/site/docs/how/elgamal-aes.html:240
@@ -5722,8 +6970,10 @@ msgstr ""
#: i2p2www/pages/site/docs/how/elgamal-aes.html:244
#, python-format
msgid ""
-"A 32-byte Session Key,\n"
-" to replace the old key, and is only present if preceding flag is 0x01"
+"A 32-byte Session "
+"Key,\n"
+" to replace the old key, and is only present if preceding"
+" flag is 0x01"
msgstr ""
#: i2p2www/pages/site/docs/how/elgamal-aes.html:249
@@ -5744,16 +6994,18 @@ msgstr "Минимальная длина: 48 байт"
#, python-format
msgid ""
"The data is then AES Encrypted,\n"
-"using the session key and IV (calculated from the pre-IV) from the ElGamal section.\n"
-"The encrypted AES Block length is variable but is always a multiple of 16 bytes.\n"
+"using the session key and IV (calculated from the pre-IV) from the "
+"ElGamal section.\n"
+"The encrypted AES Block length is variable but is always a multiple of 16"
+" bytes.\n"
""
msgstr ""
#: i2p2www/pages/site/docs/how/elgamal-aes.html:269
#, python-format
msgid ""
-"Actual max payload length, and max block length, is less than 64 KB; see the"
-" I2NP Overview."
+"Actual max payload length, and max block length, is less than 64 KB; see "
+"the I2NP Overview."
msgstr ""
#: i2p2www/pages/site/docs/how/elgamal-aes.html:272
@@ -5782,7 +7034,8 @@ msgstr ""
#: i2p2www/pages/site/docs/how/elgamal-aes.html:309
#, python-format
msgid ""
-"A 32-byte Session Tag\n"
+"A 32-byte Session "
+"Tag\n"
" previously delivered in an AES block"
msgstr ""
@@ -5793,14 +7046,18 @@ msgstr ""
#: i2p2www/pages/site/docs/how/elgamal-aes.html:318
msgid ""
"The session tag also serves as\n"
-"the pre-IV. The IV is the first 16 bytes of the SHA-256 Hash of the sessionTag."
+"the pre-IV. The IV is the first 16 bytes of the SHA-256 Hash of the "
+"sessionTag."
msgstr ""
#: i2p2www/pages/site/docs/how/elgamal-aes.html:323
msgid ""
-"To decode a message from an existing session, a router looks up the Session Tag to find an\n"
-"associated Session Key. If the Session Tag is found, the AES block is decrypted using the associated Session Key.\n"
-"If the tag is not found, the message is assumed to be a New Session Message."
+"To decode a message from an existing session, a router looks up the "
+"Session Tag to find an\n"
+"associated Session Key. If the Session Tag is found, the AES block is "
+"decrypted using the associated Session Key.\n"
+"If the tag is not found, the message is assumed to be a New Session Message."
msgstr ""
#: i2p2www/pages/site/docs/how/elgamal-aes.html:331
@@ -5810,30 +7067,38 @@ msgstr ""
#: i2p2www/pages/site/docs/how/elgamal-aes.html:332
#, python-format
msgid ""
-"As of release 0.9.2, the client may configure the default number of Session Tags to send\n"
+"As of release 0.9.2, the client may configure the default number of "
+"Session Tags to send\n"
"and the low tag threshold for the current session.\n"
-"For brief streaming connections or datagrams, these options may be used to significantly reduce bandwidth.\n"
-"See the I2CP options specification for details.\n"
+"For brief streaming connections or datagrams, these options may be used "
+"to significantly reduce bandwidth.\n"
+"See the I2CP options specification for "
+"details.\n"
"The session settings may also be overridden on a per-message basis.\n"
-"See the I2CP Send Message Expires specification for details."
+"See the I2CP Send Message"
+" Expires specification for details."
msgstr ""
#: i2p2www/pages/site/docs/how/elgamal-aes.html:345
msgid ""
-"There are many possible areas to tune the Session Key Manager's algorithms;\n"
-"some may interact with the streaming library behavior, or have significant\n"
+"There are many possible areas to tune the Session Key Manager's "
+"algorithms;\n"
+"some may interact with the streaming library behavior, or have "
+"significant\n"
"impact on overall performance."
msgstr ""
#: i2p2www/pages/site/docs/how/elgamal-aes.html:352
msgid ""
-"The number of tags delivered could depend on message size, keeping in mind\n"
+"The number of tags delivered could depend on message size, keeping in "
+"mind\n"
"the eventual padding to 1KB at the tunnel message layer."
msgstr ""
#: i2p2www/pages/site/docs/how/elgamal-aes.html:357
msgid ""
-"Clients could send an estimate of session lifetime to the router, as an advisory\n"
+"Clients could send an estimate of session lifetime to the router, as an "
+"advisory\n"
"on the number of tags required."
msgstr ""
@@ -5845,13 +7110,15 @@ msgstr ""
#: i2p2www/pages/site/docs/how/elgamal-aes.html:366
msgid ""
-"The router may assume delivery of Session Tags, or await acknowledgement before using them;\n"
+"The router may assume delivery of Session Tags, or await acknowledgement "
+"before using them;\n"
"there are tradeoffs for each strategy."
msgstr ""
#: i2p2www/pages/site/docs/how/elgamal-aes.html:371
msgid ""
-"For very brief messages, almost the full 222 bytes of the pre-IV and padding fields in the ElGamal block\n"
+"For very brief messages, almost the full 222 bytes of the pre-IV and "
+"padding fields in the ElGamal block\n"
"could be used for the entire message, instead of establishing a session."
msgstr ""
@@ -5863,8 +7130,10 @@ msgstr ""
#: i2p2www/pages/site/docs/how/elgamal-aes.html:381
msgid ""
-"Perhaps things could be more efficient if the Session Tag system was bidirectional,\n"
-"so tags delivered in the 'forward' path could be used in the 'reverse' path,\n"
+"Perhaps things could be more efficient if the Session Tag system was "
+"bidirectional,\n"
+"so tags delivered in the 'forward' path could be used in the 'reverse' "
+"path,\n"
"thus avoiding ElGamal in the initial response.\n"
"The router currently plays some tricks like this when sending\n"
"tunnel test messages to itself."
@@ -5884,7 +7153,8 @@ msgid ""
"set a flag in the\n"
"Delivery Instructions,\n"
"or set a magic number in the first few bytes of the Session Key field\n"
-"and accept a small risk of the random Session Key matching the magic number."
+"and accept a small risk of the random Session Key matching the magic "
+"number."
msgstr ""
#: i2p2www/pages/site/docs/how/garlic-routing.html:2
@@ -5897,7 +7167,8 @@ msgstr ""
#: i2p2www/pages/site/docs/how/garlic-routing.html:7
msgid ""
-"The terms \"garlic routing\" and \"garlic encryption\" are often used rather loosely when referring to I2P's technology.\n"
+"The terms \"garlic routing\" and \"garlic encryption\" are often used "
+"rather loosely when referring to I2P's technology.\n"
"Here, we explain the history of the terms, the various meanings, and\n"
"the usage of \"garlic\" methods in I2P."
msgstr ""
@@ -5907,16 +7178,20 @@ msgid ""
"\"Garlic routing\" was first coined by\n"
"Michael J. Freedman\n"
"in Roger Dingledine's Free Haven \n"
-"Master's thesis Section 8.1.1 (June 2000), as derived from \n"
+"Master's thesis "
+"Section 8.1.1 (June 2000), as derived from \n"
"Onion Routing."
msgstr ""
#: i2p2www/pages/site/docs/how/garlic-routing.html:21
msgid ""
-"\"Garlic\" may have been used originally by I2P developers because I2P implements a form of\n"
-"bundling as Freedman describes, or simply to emphasize general differences from Tor.\n"
+"\"Garlic\" may have been used originally by I2P developers because I2P "
+"implements a form of\n"
+"bundling as Freedman describes, or simply to emphasize general "
+"differences from Tor.\n"
"The specific reasoning may be lost to history.\n"
-"Generally, when referring to I2P, the term \"garlic\" may mean one of three things:"
+"Generally, when referring to I2P, the term \"garlic\" may mean one of "
+"three things:"
msgstr ""
#: i2p2www/pages/site/docs/how/garlic-routing.html:28
@@ -5935,39 +7210,54 @@ msgstr ""
#: i2p2www/pages/site/docs/how/garlic-routing.html:33
msgid ""
-"Unfortunately, I2P's usage of \"garlic\" terminology over the past seven years has not always been precise; therefore the reader is\n"
+"Unfortunately, I2P's usage of \"garlic\" terminology over the past seven "
+"years has not always been precise; therefore the reader is\n"
"cautioned when encountering the term.\n"
"Hopefully, the explanation below will make things clear."
msgstr ""
#: i2p2www/pages/site/docs/how/garlic-routing.html:40
msgid ""
-"Onion routing is a technique for building paths, or tunnels, through a series of peers,\n"
+"Onion routing is a technique for building paths, or tunnels, through a "
+"series of peers,\n"
"and then using that tunnel.\n"
-"Messages are repeatedly encrypted by the originator, and then decrypted by each hop.\n"
-"During the building phase, only the routing instructions for the next hop are exposed to each peer.\n"
-"During the operating phase, messages are passed through the tunnel, and the\n"
-"message and its routing instructions are only exposed to the endpoint of the tunnel."
+"Messages are repeatedly encrypted by the originator, and then decrypted "
+"by each hop.\n"
+"During the building phase, only the routing instructions for the next hop"
+" are exposed to each peer.\n"
+"During the operating phase, messages are passed through the tunnel, and "
+"the\n"
+"message and its routing instructions are only exposed to the endpoint of "
+"the tunnel."
msgstr ""
#: i2p2www/pages/site/docs/how/garlic-routing.html:49
#, python-format
msgid ""
"This is similar to the way Mixmaster\n"
-"(see network comparisons) sends messages - taking a message, encrypting it\n"
-"to the recipient's public key, taking that encrypted message and encrypting\n"
-"it (along with instructions specifying the next hop), and then taking that\n"
-"resulting encrypted message and so on, until it has one layer of encryption\n"
+"(see network comparisons) sends messages "
+"- taking a message, encrypting it\n"
+"to the recipient's public key, taking that encrypted message and "
+"encrypting\n"
+"it (along with instructions specifying the next hop), and then taking "
+"that\n"
+"resulting encrypted message and so on, until it has one layer of "
+"encryption\n"
"per hop along the path."
msgstr ""
#: i2p2www/pages/site/docs/how/garlic-routing.html:58
msgid ""
-"In this sense, \"garlic routing\" as a general concept is identical to \"onion routing\".\n"
-"As implemented in I2P, of course, there are several differences from the implementation in Tor; see below.\n"
-"Even so, there are substantial similarities such that I2P benefits from a\n"
-"large amount of academic research on onion routing,\n"
-"Tor, and similar mixnets."
+"In this sense, \"garlic routing\" as a general concept is identical to "
+"\"onion routing\".\n"
+"As implemented in I2P, of course, there are several differences from the "
+"implementation in Tor; see below.\n"
+"Even so, there are substantial similarities such that I2P benefits from a"
+"\n"
+"large amount of"
+" academic research on onion routing,\n"
+"Tor, and similar "
+"mixnets."
msgstr ""
#: i2p2www/pages/site/docs/how/garlic-routing.html:67
@@ -5976,12 +7266,15 @@ msgstr ""
#: i2p2www/pages/site/docs/how/garlic-routing.html:68
msgid ""
-"Michael Freedman defined \"garlic routing\" as an extension to onion routing,\n"
+"Michael Freedman defined \"garlic routing\" as an extension to onion "
+"routing,\n"
"in which multiple messages are bundled together.\n"
"He called each message a \"bulb\".\n"
-"All the messages, each with its own delivery instructions, are exposed at the\n"
+"All the messages, each with its own delivery instructions, are exposed at"
+" the\n"
"endpoint.\n"
-"This allows the efficient bundling of an onion routing \"reply block\" with the original message."
+"This allows the efficient bundling of an onion routing \"reply block\" "
+"with the original message."
msgstr ""
#: i2p2www/pages/site/docs/how/garlic-routing.html:77
@@ -5990,8 +7283,10 @@ msgid ""
"Our term for garlic \"bulbs\" is \"cloves\".\n"
"Any number of messages can be\n"
"contained, instead of just a single message.\n"
-"This is a significant distinction from the onion routing implemented in Tor.\n"
-"However, it is only one of many major architectural differences between I2P and Tor;\n"
+"This is a significant distinction from the onion routing implemented in "
+"Tor.\n"
+"However, it is only one of many major architectural differences between "
+"I2P and Tor;\n"
"perhaps it is not, by itself, enough to justify a change in terminology."
msgstr ""
@@ -5999,8 +7294,10 @@ msgstr ""
msgid ""
"Another difference\n"
"from the method described by Freedman\n"
-"is that the path is unidirectional - there is no \"turning point\" as seen in onion routing\n"
-"or mixmaster reply blocks, which greatly simplifies the algorithm and allows for more flexible\n"
+"is that the path is unidirectional - there is no \"turning point\" as "
+"seen in onion routing\n"
+"or mixmaster reply blocks, which greatly simplifies the algorithm and "
+"allows for more flexible\n"
"and reliable delivery."
msgstr ""
@@ -6034,14 +7331,16 @@ msgstr ""
#: i2p2www/pages/site/docs/how/garlic-routing.html:113
msgid ""
-"For publishing some network database entries (dampening the probability of a"
-" successful traffic analysis attack) (ElGamal/AES)"
+"For publishing some network database entries (dampening the probability "
+"of a successful traffic analysis attack) (ElGamal/AES)"
msgstr ""
#: i2p2www/pages/site/docs/how/garlic-routing.html:116
msgid ""
-"There are also significant ways that this technique can be used to improve the performance of the network, \n"
-"exploiting transport latency/throughput tradeoffs, and branching data through redundant paths to increase reliability."
+"There are also significant ways that this technique can be used to "
+"improve the performance of the network, \n"
+"exploiting transport latency/throughput tradeoffs, and branching data "
+"through redundant paths to increase reliability."
msgstr ""
#: i2p2www/pages/site/docs/how/garlic-routing.html:122
@@ -6052,7 +7351,8 @@ msgstr ""
msgid ""
"In I2P, tunnels are unidirectional. Each party builds two tunnels,\n"
"one for outbound and one for inbound traffic.\n"
-"Therefore, four tunnels are required for a single round-trip message and reply."
+"Therefore, four tunnels are required for a single round-trip message and "
+"reply."
msgstr ""
#: i2p2www/pages/site/docs/how/garlic-routing.html:129
@@ -6072,10 +7372,12 @@ msgstr ""
msgid ""
"Tunnels are a general-purpose mechanism to transport all\n"
"I2NP messages, and\n"
-"Garlic Messages are not used to build tunnels.\n"
+"Garlic Messages are not used to "
+"build tunnels.\n"
"We do not bundle multiple\n"
"I2NP messages into a single\n"
-"Garlic Message for unwrapping at the outbound tunnel endpoint;\n"
+"Garlic Message for unwrapping at "
+"the outbound tunnel endpoint;\n"
"the tunnel encryption is sufficient."
msgstr ""
@@ -6089,7 +7391,8 @@ msgid ""
"At the layer above tunnels, I2P delivers end-to-end messages between\n"
"Destinations.\n"
"Just as within a single tunnel, we use\n"
-"ElGamal/AES+SessionTag for the encryption.\n"
+"ElGamal/AES+SessionTag for the encryption."
+"\n"
"Each client message as delivered to the router through the\n"
"I2CP interface becomes a single\n"
"Garlic Clove\n"
@@ -6118,12 +7421,16 @@ msgid ""
"Delivery Status Message,\n"
"with\n"
"Delivery Instructions\n"
-"specifying that it be sent back to the originating router as an acknowledgment.\n"
+"specifying that it be sent back to the originating router as an "
+"acknowledgment.\n"
"This is similar to the \"reply block\" or \"reply onion\"\n"
"described in the references.\n"
-"It is used for determining the success or failure of end to end message delivery.\n"
-"The originating router may, upon failure to receive the Delivery Status Message\n"
-"within the expected time period, modify the routing to the far-end Destination,\n"
+"It is used for determining the success or failure of end to end message "
+"delivery.\n"
+"The originating router may, upon failure to receive the Delivery Status "
+"Message\n"
+"within the expected time period, modify the routing to the far-end "
+"Destination,\n"
"or take other actions."
msgstr ""
@@ -6137,10 +7444,13 @@ msgid ""
"for the originating Destination, with\n"
"Delivery Instructions\n"
"specifying the far-end destination's router.\n"
-"By periodically bundling a LeaseSet, the router ensures that the far-end will be able\n"
+"By periodically bundling a LeaseSet, the router ensures that the far-end "
+"will be able\n"
"to maintain communications.\n"
-"Otherwise the far-end would have to query a floodfill router for the network database entry,\n"
-"and all LeaseSets would have to be published to the network database, as explained on the\n"
+"Otherwise the far-end would have to query a floodfill router for the "
+"network database entry,\n"
+"and all LeaseSets would have to be published to the network database, as "
+"explained on the\n"
"network database page."
msgstr ""
@@ -6150,24 +7460,31 @@ msgid ""
"By default, the Delivery Status and Database Store Messages\n"
"are bundled when the local LeaseSet changes, when additional\n"
"Session Tags\n"
-"are delivered, or if the messages have not been bundled in the previous minute.\n"
-"As of release 0.9.2, the client may configure the default number of Session Tags to send\n"
+"are delivered, or if the messages have not been bundled in the previous "
+"minute.\n"
+"As of release 0.9.2, the client may configure the default number of "
+"Session Tags to send\n"
"and the low tag threshold for the current session.\n"
-"See the I2CP options specification for details.\n"
+"See the I2CP options specification for "
+"details.\n"
"The session settings may also be overridden on a per-message basis.\n"
-"See the I2CP Send Message Expires specification for details."
+"See the I2CP Send Message"
+" Expires specification for details."
msgstr ""
#: i2p2www/pages/site/docs/how/garlic-routing.html:227
msgid ""
-"Obviously, the additional messages are currently bundled for specific purposes,\n"
+"Obviously, the additional messages are currently bundled for specific "
+"purposes,\n"
"and not part of a general-purpose routing scheme."
msgstr ""
#: i2p2www/pages/site/docs/how/garlic-routing.html:232
msgid ""
-"As of release 0.9.12, the Delivery Status Message is wrapped in another Garlic Message\n"
-"by the originator so that the contents are encrypted and not visible to routers on the return path."
+"As of release 0.9.12, the Delivery Status Message is wrapped in another "
+"Garlic Message\n"
+"by the originator so that the contents are encrypted and not visible to "
+"routers on the return path."
msgstr ""
#: i2p2www/pages/site/docs/how/garlic-routing.html:238
@@ -6191,26 +7508,34 @@ msgstr ""
#: i2p2www/pages/site/docs/how/garlic-routing.html:255
#, python-format
msgid ""
-"The Garlic Message mechanism is very flexible and provides a structure for\n"
+"The Garlic Message mechanism is very flexible and provides a structure "
+"for\n"
"implementing many types of mixnet delivery methods.\n"
"Together with the unused delay option in the\n"
-"tunnel message Delivery Instructions,\n"
-"a wide spectrum of batching, delay, mixing, and routing strategies are possible."
+"tunnel message Delivery "
+"Instructions,\n"
+"a wide spectrum of batching, delay, mixing, and routing strategies are "
+"possible."
msgstr ""
#: i2p2www/pages/site/docs/how/garlic-routing.html:263
msgid ""
-"In particular, there is potential for much more flexibility at the outbound tunnel endpoint.\n"
+"In particular, there is potential for much more flexibility at the "
+"outbound tunnel endpoint.\n"
"Messages could possibly be routed from there to one of several tunnels\n"
-"(thus minimizing point-to-point connections), or multicast to several tunnels\n"
+"(thus minimizing point-to-point connections), or multicast to several "
+"tunnels\n"
"for redundancy, or streaming audio and video."
msgstr ""
#: i2p2www/pages/site/docs/how/garlic-routing.html:270
msgid ""
-"Such experiments may conflict with the need to ensure security and anonymity, such\n"
-"as limiting certain routing paths, restricting the types of I2NP messages that may\n"
-"be forwarded along various paths, and enforcing certain message expiration times."
+"Such experiments may conflict with the need to ensure security and "
+"anonymity, such\n"
+"as limiting certain routing paths, restricting the types of I2NP messages"
+" that may\n"
+"be forwarded along various paths, and enforcing certain message "
+"expiration times."
msgstr ""
#: i2p2www/pages/site/docs/how/garlic-routing.html:276
@@ -6219,9 +7544,11 @@ msgid ""
"As a part of\n"
"ElGamal/AES encryption,\n"
"a garlic message contains a sender\n"
-"specified amount of padding data, allowing the sender to take active countermeasures \n"
+"specified amount of padding data, allowing the sender to take active "
+"countermeasures \n"
"against traffic analysis.\n"
-"This is not currently used, beyond the requirement to pad to a multiple of 16 bytes."
+"This is not currently used, beyond the requirement to pad to a multiple "
+"of 16 bytes."
msgstr ""
#: i2p2www/pages/site/docs/how/garlic-routing.html:285
@@ -6233,8 +7560,10 @@ msgstr ""
#: i2p2www/pages/site/docs/how/garlic-routing.html:295
msgid ""
-"The term garlic routing was first coined in Roger Dingledine's Free Haven \n"
-"Master's thesis (June 2000),\n"
+"The term garlic routing was first coined in Roger Dingledine's Free Haven"
+" \n"
+"Master's thesis "
+"(June 2000),\n"
"see Section 8.1.1 authored by\n"
"Michael J. Freedman."
msgstr ""
@@ -6256,7 +7585,9 @@ msgstr "Чесночная маршрутизации в Википедии"
msgid ""
"I2P Meeting 58 (2003) discussing the "
"implementation of garlic routing"
-msgstr "Обсуждение имплементации чесночной маршрутизации на 58-й встрече разработчиков I2P (2003)"
+msgstr ""
+"Обсуждение имплементации чесночной маршрутизации на 58-й встрече разработчиков I2P (2003)"
#: i2p2www/pages/site/docs/how/garlic-routing.html:314
msgid "Free Haven publications"
@@ -6264,9 +7595,14 @@ msgstr "Публикации проекта Free Haven"
#: i2p2www/pages/site/docs/how/garlic-routing.html:316
msgid ""
-"Onion routing was first described in Hiding Routing Information\n"
+"Onion routing was first described in Hiding Routing Information\n"
"by David M. Goldschlag, Michael G. Reed, and Paul F. Syverson in 1996."
-msgstr "Луковая маршрутищация была впервые описала в работе Hiding Routing Information Дэвида Голдшлага, Майкла Рида и Пола Сиверсона в 1996 году."
+msgstr ""
+"Луковая маршрутищация была впервые описала в работе Hiding Routing "
+"Information Дэвида Голдшлага, Майкла Рида и Пола Сиверсона в 1996 "
+"году."
#: i2p2www/pages/site/docs/how/intro.html:2
msgid "A Gentle Introduction to How I2P Works"
@@ -6274,51 +7610,79 @@ msgstr ""
#: i2p2www/pages/site/docs/how/intro.html:4
msgid ""
-"I2P is a project to build, deploy, and maintain a network supporting secure and anonymous\n"
-"communication. People using I2P are in control of the tradeoffs between anonymity, reliability,\n"
-"bandwidth usage, and latency. There is no central point in the network on which pressure can be\n"
-"exerted to compromise the integrity, security, or anonymity of the system. The network supports\n"
-"dynamic reconfiguration in response to various attacks, and has been designed to make use of\n"
-"additional resources as they become available. Of course, all aspects of the network are open and\n"
+"I2P is a project to build, deploy, and maintain a network supporting "
+"secure and anonymous\n"
+"communication. People using I2P are in control of the tradeoffs between "
+"anonymity, reliability,\n"
+"bandwidth usage, and latency. There is no central point in the network on"
+" which pressure can be\n"
+"exerted to compromise the integrity, security, or anonymity of the "
+"system. The network supports\n"
+"dynamic reconfiguration in response to various attacks, and has been "
+"designed to make use of\n"
+"additional resources as they become available. Of course, all aspects of "
+"the network are open and\n"
"freely available."
msgstr ""
#: i2p2www/pages/site/docs/how/intro.html:14
msgid ""
-"Unlike many other anonymizing networks, I2P doesn't try to provide anonymity by hiding the\n"
-"originator of some communication and not the recipient, or the other way around. I2P is designed to\n"
-"allow peers using I2P to communicate with each other anonymously — both sender and recipient\n"
-"are unidentifiable to each other as well as to third parties. For example, today there are both\n"
-"in-I2P web sites (allowing anonymous publishing / hosting) as well as HTTP proxies to the normal web\n"
-"(allowing anonymous web browsing). Having the ability to run servers within I2P is essential, as it\n"
-"is quite likely that any outbound proxies to the normal Internet will be monitored, disabled, or\n"
+"Unlike many other anonymizing networks, I2P doesn't try to provide "
+"anonymity by hiding the\n"
+"originator of some communication and not the recipient, or the other way "
+"around. I2P is designed to\n"
+"allow peers using I2P to communicate with each other anonymously — "
+"both sender and recipient\n"
+"are unidentifiable to each other as well as to third parties. For "
+"example, today there are both\n"
+"in-I2P web sites (allowing anonymous publishing / hosting) as well as "
+"HTTP proxies to the normal web\n"
+"(allowing anonymous web browsing). Having the ability to run servers "
+"within I2P is essential, as it\n"
+"is quite likely that any outbound proxies to the normal Internet will be "
+"monitored, disabled, or\n"
"even taken over to attempt more malicious attacks."
msgstr ""
#: i2p2www/pages/site/docs/how/intro.html:25
#, python-format
msgid ""
-"The network itself is message oriented - it is essentially a secure and anonymous IP layer, where\n"
-"messages are addressed to cryptographic keys (Destinations) and can be significantly larger than IP\n"
-"packets. Some example uses of the network include \"eepsites\" (webservers hosting normal web\n"
-"applications within I2P), a BitTorrent client (\"I2PSnark\"), or a distributed data store. With the\n"
-"help of the I2PTunnel application, we are able to stream traditional\n"
-"TCP/IP applications over I2P, such as SSH, IRC, a squid proxy, and even streaming audio. Most people\n"
-"will not use I2P directly, or even need to know they're using it. Instead their view will be of one\n"
-"of the I2P enabled applications, or perhaps as a little controller app to turn on and off various\n"
+"The network itself is message oriented - it is essentially a secure and "
+"anonymous IP layer, where\n"
+"messages are addressed to cryptographic keys (Destinations) and can be "
+"significantly larger than IP\n"
+"packets. Some example uses of the network include \"eepsites\" "
+"(webservers hosting normal web\n"
+"applications within I2P), a BitTorrent client (\"I2PSnark\"), or a "
+"distributed data store. With the\n"
+"help of the I2PTunnel application, we are "
+"able to stream traditional\n"
+"TCP/IP applications over I2P, such as SSH, IRC, a squid proxy, and even "
+"streaming audio. Most people\n"
+"will not use I2P directly, or even need to know they're using it. Instead"
+" their view will be of one\n"
+"of the I2P enabled applications, or perhaps as a little controller app to"
+" turn on and off various\n"
"proxies to enable the anonymizing functionality."
msgstr ""
#: i2p2www/pages/site/docs/how/intro.html:37
#, python-format
msgid ""
-"An essential part of designing, developing, and testing an anonymizing network is to define the threat model, since there is no such thing as \"true\" anonymity, just\n"
-"increasingly expensive costs to identify someone. Briefly, I2P's intent is to allow people to\n"
-"communicate in arbitrarily hostile environments by providing good anonymity, mixed in with\n"
-"sufficient cover traffic provided by the activity of people who require less anonymity. This way,\n"
-"some users can avoid detection by a very powerful adversary, while others will try to evade a weaker\n"
-"entity, all on the same network, where each one's messages are essentially indistinguishable\n"
+"An essential part of designing, developing, and testing an anonymizing "
+"network is to define the threat model, since there is no such thing "
+"as \"true\" anonymity, just\n"
+"increasingly expensive costs to identify someone. Briefly, I2P's intent "
+"is to allow people to\n"
+"communicate in arbitrarily hostile environments by providing good "
+"anonymity, mixed in with\n"
+"sufficient cover traffic provided by the activity of people who require "
+"less anonymity. This way,\n"
+"some users can avoid detection by a very powerful adversary, while others"
+" will try to evade a weaker\n"
+"entity, all on the same network, where each one's messages are "
+"essentially indistinguishable\n"
"from the others."
msgstr ""
@@ -6329,11 +7693,21 @@ msgstr "Почему?"
#: i2p2www/pages/site/docs/how/intro.html:49
#, python-format
msgid ""
-"There are a multitude of reasons why we need a system to support anonymous communication, and\n"
-"everyone has their own personal rationale. There are many other\n"
-"efforts working on finding ways to provide varying degrees of anonymity to people through the\n"
+"There are a multitude of reasons why we need a system to support "
+"anonymous communication, and\n"
+"everyone has their own personal rationale. There are many other\n"
+"efforts working on finding ways to provide varying degrees of "
+"anonymity to people through the\n"
"Internet, but we could not find any that met our needs or threat model."
-msgstr "Существует множество причин, почему необходима система, поддерживающая анонимные \nкоммуникации, и у каждого своя мотивация. Несмотря на достижения \nв поиске путей обеспечения различной степени анонимности для людей в сети Интернет, \nмы не нашли соответствующего нашим потребностям и модели угроз."
+msgstr ""
+"Существует множество причин, почему необходима система, поддерживающая "
+"анонимные \n"
+"коммуникации, и у каждого своя мотивация. Несмотря на достижения \n"
+"в поиске путей обеспечения различной степени анонимности для людей в сети"
+" Интернет, \n"
+"мы не нашли соответствующего нашим потребностям и модели угроз."
#: i2p2www/pages/site/docs/how/intro.html:56
msgid "How?"
@@ -6342,14 +7716,23 @@ msgstr "Как?"
#: i2p2www/pages/site/docs/how/intro.html:58
#, python-format
msgid ""
-"The network at a glance is made up of a set of nodes (\"routers\") with a number of unidirectional\n"
-"inbound and outbound virtual paths (\"tunnels\", as outlined on the tunnel routing page). Each router is identified by a cryptographic RouterIdentity which is\n"
-"typically long lived. These routers communicate with each other through existing transport\n"
-"mechanisms (TCP, UDP, etc), passing various messages. Client applications have their own\n"
-"cryptographic identifier (\"Destination\") which enables it to send and receive messages. These\n"
-"clients can connect to any router and authorize the temporary allocation (\"lease\") of some tunnels\n"
-"that will be used for sending and receiving messages through the network. I2P has its own internal\n"
-"network database (using a modification of the Kademlia algorithm) for\n"
+"The network at a glance is made up of a set of nodes (\"routers\") with a"
+" number of unidirectional\n"
+"inbound and outbound virtual paths (\"tunnels\", as outlined on the tunnel routing page). Each router is "
+"identified by a cryptographic RouterIdentity which is\n"
+"typically long lived. These routers communicate with each other through "
+"existing transport\n"
+"mechanisms (TCP, UDP, etc), passing various messages. Client applications"
+" have their own\n"
+"cryptographic identifier (\"Destination\") which enables it to send and "
+"receive messages. These\n"
+"clients can connect to any router and authorize the temporary allocation "
+"(\"lease\") of some tunnels\n"
+"that will be used for sending and receiving messages through the network."
+" I2P has its own internal\n"
+"network database (using a modification of the "
+"Kademlia algorithm) for\n"
"distributing routing and contact information securely."
msgstr ""
@@ -6359,62 +7742,92 @@ msgstr "Пример сетевой топологии"
#: i2p2www/pages/site/docs/how/intro.html:73
msgid ""
-"In the above, Alice, Bob, Charlie, and Dave are all running routers with a single Destination on\n"
-"their local router. They each have a pair of 2-hop inbound tunnels per destination (labeled 1, 2, 3,\n"
-"4, 5 and 6), and a small subset of each of those router's outbound tunnel pool is shown with 2-hop\n"
-"outbound tunnels. For simplicity, Charlie's inbound tunnels and Dave's outbound tunnels are not\n"
-"shown, nor are the rest of each router's outbound tunnel pool (typically stocked with a few tunnels\n"
-"at a time). When Alice and Bob talk to each other, Alice sends a message out one of her (pink)\n"
-"outbound tunnels targeting one of Bob's (green) inbound tunnels (tunnel 3 or 4). She knows to send\n"
-"to those tunnels on the correct router by querying the network database, which is constantly updated\n"
+"In the above, Alice, Bob, Charlie, and Dave are all running routers with "
+"a single Destination on\n"
+"their local router. They each have a pair of 2-hop inbound tunnels per "
+"destination (labeled 1, 2, 3,\n"
+"4, 5 and 6), and a small subset of each of those router's outbound tunnel"
+" pool is shown with 2-hop\n"
+"outbound tunnels. For simplicity, Charlie's inbound tunnels and Dave's "
+"outbound tunnels are not\n"
+"shown, nor are the rest of each router's outbound tunnel pool (typically "
+"stocked with a few tunnels\n"
+"at a time). When Alice and Bob talk to each other, Alice sends a message "
+"out one of her (pink)\n"
+"outbound tunnels targeting one of Bob's (green) inbound tunnels (tunnel 3"
+" or 4). She knows to send\n"
+"to those tunnels on the correct router by querying the network database, "
+"which is constantly updated\n"
"as new leases are authorized and old ones expire."
msgstr ""
#: i2p2www/pages/site/docs/how/intro.html:85
#, python-format
msgid ""
-"If Bob wants to reply to Alice, he simply goes through the same process - send a message out one of\n"
-"his outbound tunnels targeting one of Alice's inbound tunnels (tunnel 1 or 2). To make things\n"
-"easier, most messages sent between Alice and Bob are garlic\n"
-"wrapped, bundling the sender's own current lease information so that the recipient can reply\n"
-"immediately without having to look in the network database for the current data."
+"If Bob wants to reply to Alice, he simply goes through the same process -"
+" send a message out one of\n"
+"his outbound tunnels targeting one of Alice's inbound tunnels (tunnel 1 "
+"or 2). To make things\n"
+"easier, most messages sent between Alice and Bob are garlic\n"
+"wrapped, bundling the sender's own current lease information so that the "
+"recipient can reply\n"
+"immediately without having to look in the network database for the "
+"current data."
msgstr ""
#: i2p2www/pages/site/docs/how/intro.html:93
#, python-format
msgid ""
-"To deal with a wide range of attacks, I2P is fully distributed with no centralized resources - and\n"
-"hence there are no directory servers keeping statistics regarding the performance and reliability of\n"
-"routers within the network. As such, each router must keep and maintain profiles of various routers\n"
-"and is responsible for selecting appropriate peers to meet the anonymity, performance, and\n"
-"reliability needs of the users, as described in the peer selection\n"
+"To deal with a wide range of attacks, I2P is fully distributed with no "
+"centralized resources - and\n"
+"hence there are no directory servers keeping statistics regarding the "
+"performance and reliability of\n"
+"routers within the network. As such, each router must keep and maintain "
+"profiles of various routers\n"
+"and is responsible for selecting appropriate peers to meet the anonymity,"
+" performance, and\n"
+"reliability needs of the users, as described in the peer selection\n"
"page."
msgstr ""
#: i2p2www/pages/site/docs/how/intro.html:102
#, python-format
msgid ""
-"The network itself makes use of a significant number of cryptographic\n"
-"techniques and algorithms - a full laundry list includes 2048bit ElGamal encryption, 256bit AES\n"
-"in CBC mode with PKCS#5 padding, 1024bit DSA signatures, SHA256 hashes, 2048bit Diffie-Hellman\n"
-"negotiated connections with station to station authentication, and ElGamal / AES+SessionTag."
+"The network itself makes use of a significant number of cryptographic\n"
+"techniques and algorithms - a full laundry list includes 2048bit "
+"ElGamal encryption, 256bit AES\n"
+"in CBC mode with PKCS#5 padding, 1024bit DSA signatures, SHA256 hashes, "
+"2048bit Diffie-Hellman\n"
+"negotiated connections with station to station authentication, and ElGamal / AES+SessionTag."
msgstr ""
#: i2p2www/pages/site/docs/how/intro.html:110
msgid ""
-"Content sent over I2P is encrypted through three layers garlic encryption (used to verify the\n"
-"delivery of the message to the recipient), tunnel encryption (all messages passing through a tunnel\n"
-"is encrypted by the tunnel gateway to the tunnel endpoint), and inter router transport layer\n"
+"Content sent over I2P is encrypted through three layers garlic encryption"
+" (used to verify the\n"
+"delivery of the message to the recipient), tunnel encryption (all "
+"messages passing through a tunnel\n"
+"is encrypted by the tunnel gateway to the tunnel endpoint), and inter "
+"router transport layer\n"
"encryption (e.g. the TCP transport uses AES256 with ephemeral keys)."
msgstr ""
#: i2p2www/pages/site/docs/how/intro.html:117
msgid ""
-"End-to-end (I2CP) encryption (client application to server application) was disabled in I2P release\n"
-"0.6; end-to-end (garlic) encryption (I2P client router to I2P server router) from Alice's router \"a\"\n"
-"to Bob's router \"h\" remains. Notice the different use of terms! All data from a to h is end-to-end\n"
-"encrypted, but the I2CP connection between the I2P router and the applications is not end-to-end\n"
-"encrypted! A and h are the routers of Alice and Bob, while Alice and Bob in following chart are the\n"
+"End-to-end (I2CP) encryption (client application to server application) "
+"was disabled in I2P release\n"
+"0.6; end-to-end (garlic) encryption (I2P client router to I2P server "
+"router) from Alice's router \"a\"\n"
+"to Bob's router \"h\" remains. Notice the different use of terms! All "
+"data from a to h is end-to-end\n"
+"encrypted, but the I2CP connection between the I2P router and the "
+"applications is not end-to-end\n"
+"encrypted! A and h are the routers of Alice and Bob, while Alice and Bob "
+"in following chart are the\n"
"applications running atop of I2P."
msgstr ""
@@ -6431,22 +7844,32 @@ msgstr ""
#: i2p2www/pages/site/docs/how/intro.html:132
msgid ""
-"The two main mechanisms for allowing people who need strong anonymity to use the network are\n"
-"explicitly delayed garlic routed messages and more comprehensive tunnels to include support for\n"
-"pooling and mixing messages. These are currently planned for release 3.0, but garlic routed messages\n"
-"with no delays and FIFO tunnels are currently in place. Additionally, the 2.0 release will allow\n"
-"people to set up and operate behind restricted routes (perhaps with trusted peers), as well as the\n"
+"The two main mechanisms for allowing people who need strong anonymity to "
+"use the network are\n"
+"explicitly delayed garlic routed messages and more comprehensive tunnels "
+"to include support for\n"
+"pooling and mixing messages. These are currently planned for release 3.0,"
+" but garlic routed messages\n"
+"with no delays and FIFO tunnels are currently in place. Additionally, the"
+" 2.0 release will allow\n"
+"people to set up and operate behind restricted routes (perhaps with "
+"trusted peers), as well as the\n"
"deployment of more flexible and anonymous transports."
msgstr ""
#: i2p2www/pages/site/docs/how/intro.html:141
#, python-format
msgid ""
-"Some questions have been raised with regards to the scalability of I2P, and reasonably so. There\n"
-"will certainly be more analysis over time, but peer lookup and integration should be bounded by\n"
-"O(log(N))
due to the network database's algorithm, while end\n"
-"to end messages should be O(1)
(scale free), since messages go out K hops through the\n"
-"outbound tunnel and another K hops through the inbound tunnel, with K no longer than 3. The size of\n"
+"Some questions have been raised with regards to the scalability of I2P, "
+"and reasonably so. There\n"
+"will certainly be more analysis over time, but peer lookup and "
+"integration should be bounded by\n"
+"O(log(N))
due to the network "
+"database's algorithm, while end\n"
+"to end messages should be O(1)
(scale free), since messages "
+"go out K hops through the\n"
+"outbound tunnel and another K hops through the inbound tunnel, with K no "
+"longer than 3. The size of\n"
"the network (N) bears no impact."
msgstr ""
@@ -6458,10 +7881,13 @@ msgstr "Когда?"
#, python-format
msgid ""
"I2P initially began in Feb 2003 as a proposed modification to Freenet to allow it to use alternate transports, such as Freenet to allow it to use "
+"alternate transports, such as JMS, then grew into its own as an\n"
-"'anonCommFramework' in April 2003, turning into I2P in July, with code being written in earnest\n"
-"starting in August '03. I2P is currently under development, following the roadmap."
+"'anonCommFramework' in April 2003, turning into I2P in July, with code "
+"being written in earnest\n"
+"starting in August '03. I2P is currently under development, following the"
+" roadmap."
msgstr ""
#: i2p2www/pages/site/docs/how/intro.html:161
@@ -6471,15 +7897,36 @@ msgstr "Кто?"
#: i2p2www/pages/site/docs/how/intro.html:162
#, python-format
msgid ""
-"We have a small team spread around several continents, working to advance\n"
-"different aspects of the project. We are very open to other developers who want to get involved and\n"
-"anyone else who would like to contribute in other ways, such as critiques, peer review, testing,\n"
-"writing I2P enabled applications, or documentation. The entire system is open source - the router\n"
-"and most of the SDK are outright public domain with some BSD and Cryptix licensed code, while some\n"
-"applications like I2PTunnel and I2PSnark are GPL. Almost everything is written in Java (1.5+),\n"
-"though some third party applications are being written in Python and other languages. The code works\n"
-"on Sun Java SE and other Java Virtual Machines."
-msgstr "У нас маленькая команда из разных уголков мира, которая развивает проект с различных сторон. Мы очень открыты для разработчиков, которые хотят поучаствовать в проекте, а также для всех тех, кто желает помочь другими способами, такими как критика, рецензирование, тестирование, документирование, написание приложений для I2P.\nВся система — это открытое программное обеспечение: маршрутизатор и большая часть SDK полностью находятся в общественном достоянии с частью кода под лицензиями BSD и Cryptix, некоторые приложения, такие как I2PTunnel и I2PSnark, имеют лицензию GPL. Почти весь код написан на Java (1.5+), хотя некоторые сторонние приложения написаны на Python и других языках. Код работает на Sun Java SE и других виртуальных машинах Java."
+"We have a small team spread around several "
+"continents, working to advance\n"
+"different aspects of the project. We are very open to other developers "
+"who want to get involved and\n"
+"anyone else who would like to contribute in other ways, such as "
+"critiques, peer review, testing,\n"
+"writing I2P enabled applications, or documentation. The entire system is "
+"open source - the router\n"
+"and most of the SDK are outright public domain with some BSD and Cryptix "
+"licensed code, while some\n"
+"applications like I2PTunnel and I2PSnark are GPL. Almost everything is "
+"written in Java (1.5+),\n"
+"though some third party applications are being written in Python and "
+"other languages. The code works\n"
+"on Sun Java SE and other Java Virtual"
+" Machines."
+msgstr ""
+"У нас маленькая команда из разных уголков мира, "
+"которая развивает проект с различных сторон. Мы очень открыты для "
+"разработчиков, которые хотят поучаствовать в проекте, а также для всех "
+"тех, кто желает помочь другими способами, такими как критика, "
+"рецензирование, тестирование, документирование, написание приложений для "
+"I2P.\n"
+"Вся система — это открытое программное обеспечение: маршрутизатор и "
+"большая часть SDK полностью находятся в общественном достоянии с частью "
+"кода под лицензиями BSD и Cryptix, некоторые приложения, такие как "
+"I2PTunnel и I2PSnark, имеют лицензию GPL. Почти весь код написан на Java "
+"(1.5+), хотя некоторые сторонние приложения написаны на Python и других "
+"языках. Код работает на Sun Java SE и"
+" других виртуальных машинах Java."
#: i2p2www/pages/site/docs/how/intro.html:173
msgid "Where?"
@@ -6488,9 +7935,12 @@ msgstr "Где?"
#: i2p2www/pages/site/docs/how/intro.html:174
#, python-format
msgid ""
-"Anyone interested should join us on the IRC channel #i2p-dev (hosted concurrently on irc.freenode.net,\n"
-"irc.postman.i2p, irc.echelon.i2p, irc.dg.i2p and irc.oftc.net). There are currently no\n"
-"scheduled development meetings, however archives are available."
+"Anyone interested should join us on the IRC channel #i2p-dev (hosted "
+"concurrently on irc.freenode.net,\n"
+"irc.postman.i2p, irc.echelon.i2p, irc.dg.i2p and irc.oftc.net). There are"
+" currently no\n"
+"scheduled development meetings, however archives"
+" are available."
msgstr ""
#: i2p2www/pages/site/docs/how/intro.html:180
@@ -6514,24 +7964,32 @@ msgstr ""
#: i2p2www/pages/site/docs/how/network-database.html:8
msgid ""
"I2P's netDb is a specialized distributed database, containing \n"
-"just two types of data - router contact information (RouterInfos) and destination contact\n"
-"information (LeaseSets). Each piece of data is signed by the appropriate party and verified\n"
-"by anyone who uses or stores it. In addition, the data has liveliness information\n"
-"within it, allowing irrelevant entries to be dropped, newer entries to replace\n"
+"just two types of data - router contact information (RouterInfos) "
+"and destination contact\n"
+"information (LeaseSets). Each piece of data is signed by the "
+"appropriate party and verified\n"
+"by anyone who uses or stores it. In addition, the data has liveliness "
+"information\n"
+"within it, allowing irrelevant entries to be dropped, newer entries to "
+"replace\n"
"older ones, and protection against certain classes of attack."
msgstr ""
#: i2p2www/pages/site/docs/how/network-database.html:17
msgid ""
"The netDb is distributed with a simple technique called \"floodfill\",\n"
-"where a subset of all routers, called \"floodfill routers\", maintains the distributed database."
+"where a subset of all routers, called \"floodfill routers\", maintains "
+"the distributed database."
msgstr ""
#: i2p2www/pages/site/docs/how/network-database.html:25
msgid ""
-"When an I2P router wants to contact another router, they need to know some \n"
-"key pieces of data - all of which are bundled up and signed by the router into\n"
-"a structure called the \"RouterInfo\", which is distributed with the SHA256 of the router's identity\n"
+"When an I2P router wants to contact another router, they need to know "
+"some \n"
+"key pieces of data - all of which are bundled up and signed by the router"
+" into\n"
+"a structure called the \"RouterInfo\", which is distributed with the "
+"SHA256 of the router's identity\n"
"as the key. The structure itself contains:"
msgstr ""
@@ -6543,8 +8001,8 @@ msgstr ""
#: i2p2www/pages/site/docs/how/network-database.html:33
msgid ""
-"The contact addresses at which it can be reached (e.g. TCP: example.org port"
-" 4108)"
+"The contact addresses at which it can be reached (e.g. TCP: example.org "
+"port 4108)"
msgstr ""
#: i2p2www/pages/site/docs/how/network-database.html:34
@@ -6556,8 +8014,7 @@ msgid "A set of arbitrary text options"
msgstr ""
#: i2p2www/pages/site/docs/how/network-database.html:36
-msgid ""
-"The signature of the above, generated by the identity's DSA signing key"
+msgid "The signature of the above, generated by the identity's DSA signing key"
msgstr ""
#: i2p2www/pages/site/docs/how/network-database.html:39
@@ -6568,8 +8025,8 @@ msgstr ""
#: i2p2www/pages/site/docs/how/network-database.html:45
msgid ""
-"Capabilities flags - used to indicate floodfill participation, approximate "
-"bandwidth, and perceived reachability"
+"Capabilities flags - used to indicate floodfill participation, "
+"approximate bandwidth, and perceived reachability"
msgstr ""
#: i2p2www/pages/site/docs/how/network-database.html:47
@@ -6626,29 +8083,36 @@ msgstr ""
#: i2p2www/pages/site/docs/how/network-database.html:70
msgid ""
-"Always sent as 90m, for compatibility with an older scheme where routers published their actual uptime,\n"
+"Always sent as 90m, for compatibility with an older scheme where routers "
+"published their actual uptime,\n"
"and only sent tunnel requests to peers whose was more than 60m"
msgstr ""
#: i2p2www/pages/site/docs/how/network-database.html:76
msgid ""
"These values are used by other routers for basic decisions.\n"
-"Should we connect to this router? Should we attempt to route a tunnel through this router?\n"
-"The bandwidth capability flag, in particular, is used only to determine whether\n"
+"Should we connect to this router? Should we attempt to route a tunnel "
+"through this router?\n"
+"The bandwidth capability flag, in particular, is used only to determine "
+"whether\n"
"the router meets a minimum threshold for routing tunnels.\n"
-"Above the minimum threshold, the advertised bandwidth is not used or trusted anywhere\n"
-"in the router, except for display in the user interface and for debugging and network analysis."
+"Above the minimum threshold, the advertised bandwidth is not used or "
+"trusted anywhere\n"
+"in the router, except for display in the user interface and for debugging"
+" and network analysis."
msgstr ""
#: i2p2www/pages/site/docs/how/network-database.html:86
#, python-format
msgid ""
"Additional text options include\n"
-"a small number of statistics about the router's health, which are aggregated by\n"
+"a small number of statistics about the router's health, which are "
+"aggregated by\n"
"sites such as %(stats)s\n"
"for network performance analysis and debugging.\n"
"These statistics were chosen to provide data crucial to the developers,\n"
-"such as tunnel build success rates, while balancing the need for such data\n"
+"such as tunnel build success rates, while balancing the need for such "
+"data\n"
"with the side-effects that could result from revealing this data.\n"
"Current statistics are limited to:"
msgstr ""
@@ -6663,16 +8127,18 @@ msgstr ""
#: i2p2www/pages/site/docs/how/network-database.html:101
msgid ""
-"Floodfill routers publish additional data on the number of entries in their "
-"network database."
+"Floodfill routers publish additional data on the number of entries in "
+"their network database."
msgstr ""
#: i2p2www/pages/site/docs/how/network-database.html:105
msgid ""
"The data published can be seen in the router's user interface,\n"
"but is not used or trusted within the router.\n"
-"As the network has matured, we have gradually removed most of the published\n"
-"statistics to improve anonymity, and we plan to remove more in future releases."
+"As the network has matured, we have gradually removed most of the "
+"published\n"
+"statistics to improve anonymity, and we plan to remove more in future "
+"releases."
msgstr ""
#: i2p2www/pages/site/docs/how/network-database.html:113
@@ -6690,15 +8156,16 @@ msgstr ""
#: i2p2www/pages/site/docs/how/network-database.html:120
msgid ""
"RouterInfos have no set expiration time.\n"
-"Each router is free to maintain its own local policy to trade off the frequency of RouterInfo lookups\n"
+"Each router is free to maintain its own local policy to trade off the "
+"frequency of RouterInfo lookups\n"
"with memory or disk usage.\n"
"In the current implementation, there are the following general policies:"
msgstr ""
#: i2p2www/pages/site/docs/how/network-database.html:127
msgid ""
-"There is no expiration during the first hour of uptime, as the persistent "
-"stored data may be old."
+"There is no expiration during the first hour of uptime, as the persistent"
+" stored data may be old."
msgstr ""
#: i2p2www/pages/site/docs/how/network-database.html:130
@@ -6707,21 +8174,25 @@ msgstr ""
#: i2p2www/pages/site/docs/how/network-database.html:133
msgid ""
-"As the number of local RouterInfos grows, the expiration time shrinks, in an attempt to maintain\n"
-"a reasonable number RouterInfos. The expiration time with less than 120 routers is 72 hours,\n"
+"As the number of local RouterInfos grows, the expiration time shrinks, in"
+" an attempt to maintain\n"
+"a reasonable number RouterInfos. The expiration time with less than 120 "
+"routers is 72 hours,\n"
"while expiration time with 300 routers is around 30 hours."
msgstr ""
#: i2p2www/pages/site/docs/how/network-database.html:138
#, python-format
msgid ""
-"RouterInfos containing SSU introducers expire in about an hour, as\n"
+"RouterInfos containing SSU introducers expire in "
+"about an hour, as\n"
"the introducer list expires in about that time."
msgstr ""
#: i2p2www/pages/site/docs/how/network-database.html:142
msgid ""
-"Floodfills use a short expiration time (1 hour) for all local RouterInfos, as valid RouterInfos will\n"
+"Floodfills use a short expiration time (1 hour) for all local "
+"RouterInfos, as valid RouterInfos will\n"
"be frequently republished to them."
msgstr ""
@@ -6737,8 +8208,10 @@ msgstr ""
#: i2p2www/pages/site/docs/how/network-database.html:157
msgid ""
-"The second piece of data distributed in the netDb is a \"LeaseSet\" - documenting\n"
-"a group of tunnel entry points (leases) for a particular client destination.\n"
+"The second piece of data distributed in the netDb is a \"LeaseSet\" - "
+"documenting\n"
+"a group of tunnel entry points (leases) for a particular client "
+"destination.\n"
"Each of these leases specify the following information:"
msgstr ""
@@ -6772,8 +8245,8 @@ msgstr ""
#: i2p2www/pages/site/docs/how/network-database.html:177
msgid ""
-"Additional encryption public key: used for end-to-end encryption of garlic "
-"messages"
+"Additional encryption public key: used for end-to-end encryption of "
+"garlic messages"
msgstr ""
#: i2p2www/pages/site/docs/how/network-database.html:178
@@ -6784,8 +8257,8 @@ msgstr ""
#: i2p2www/pages/site/docs/how/network-database.html:179
msgid ""
-"Signature of all the LeaseSet data, to make sure the Destination published "
-"the LeaseSet."
+"Signature of all the LeaseSet data, to make sure the Destination "
+"published the LeaseSet."
msgstr ""
#: i2p2www/pages/site/docs/how/network-database.html:183
@@ -6810,10 +8283,13 @@ msgstr ""
#: i2p2www/pages/site/docs/how/network-database.html:195
msgid ""
-"A LeaseSet for a destination used only for outgoing connections is unpublished.\n"
+"A LeaseSet for a destination used only for outgoing connections is "
+"unpublished.\n"
"It is never sent for publication to a floodfill router.\n"
-"\"Client\" tunnels, such as those for web browsing and IRC clients, are unpublished.\n"
-"Servers will still be able to send messages back to those unpublished destinations,\n"
+"\"Client\" tunnels, such as those for web browsing and IRC clients, are "
+"unpublished.\n"
+"Servers will still be able to send messages back to those unpublished "
+"destinations,\n"
"because of I2NP storage messages."
msgstr ""
@@ -6823,10 +8299,14 @@ msgstr ""
#: i2p2www/pages/site/docs/how/network-database.html:206
msgid ""
-"A LeaseSet may be revoked by publishing a new LeaseSet with zero leases.\n"
-"Revocations must be signed by the additional signing key in the LeaseSet.\n"
-"Revocations are not fully implemented, and it is unclear if they have any practical use.\n"
-"This is the only planned use for that signing key, so it is currently unused."
+"A LeaseSet may be revoked by publishing a new LeaseSet with zero "
+"leases.\n"
+"Revocations must be signed by the additional signing key in the LeaseSet."
+"\n"
+"Revocations are not fully implemented, and it is unclear if they have any"
+" practical use.\n"
+"This is the only planned use for that signing key, so it is currently "
+"unused."
msgstr ""
#: i2p2www/pages/site/docs/how/network-database.html:213
@@ -6835,12 +8315,17 @@ msgstr ""
#: i2p2www/pages/site/docs/how/network-database.html:214
msgid ""
-"In an encrypted LeaseSet, all Leases are encrypted with a separate DSA key.\n"
-"The leases may only be decoded, and thus the destination may only be contacted,\n"
+"In an encrypted LeaseSet, all Leases are encrypted with a separate"
+" DSA key.\n"
+"The leases may only be decoded, and thus the destination may only be "
+"contacted,\n"
"by those with the key.\n"
-"There is no flag or other direct indication that the LeaseSet is encrypted.\n"
-"Encrypted LeaseSets are not widely used, and it is a topic for future work to\n"
-"research whether the user interface and implementation of encrypted LeaseSets could be improved."
+"There is no flag or other direct indication that the LeaseSet is "
+"encrypted.\n"
+"Encrypted LeaseSets are not widely used, and it is a topic for future "
+"work to\n"
+"research whether the user interface and implementation of encrypted "
+"LeaseSets could be improved."
msgstr ""
#: i2p2www/pages/site/docs/how/network-database.html:223
@@ -6849,7 +8334,8 @@ msgstr ""
#: i2p2www/pages/site/docs/how/network-database.html:224
msgid ""
-"All Leases (tunnels) are valid for 10 minutes; therefore, a LeaseSet expires\n"
+"All Leases (tunnels) are valid for 10 minutes; therefore, a LeaseSet "
+"expires\n"
"10 minutes after the earliest creation time of all its Leases."
msgstr ""
@@ -6871,32 +8357,46 @@ msgstr ""
msgid ""
"The netDb is decentralized, however you do need at\n"
"least one reference to a peer so that the integration process\n"
-"ties you in. This is accomplished by \"reseeding\" your router with the RouterInfo\n"
-"of an active peer - specifically, by retrieving their routerInfo-$hash.dat
\n"
-"file and storing it in your netDb/
directory. Anyone can provide\n"
-"you with those files - you can even provide them to others by exposing your own\n"
+"ties you in. This is accomplished by \"reseeding\" your router with the "
+"RouterInfo\n"
+"of an active peer - specifically, by retrieving their "
+"routerInfo-$hash.dat
\n"
+"file and storing it in your netDb/
directory. Anyone can "
+"provide\n"
+"you with those files - you can even provide them to others by exposing "
+"your own\n"
"netDb directory. To simplify the process,\n"
-"volunteers publish their netDb directories (or a subset) on the regular (non-i2p) network,\n"
+"volunteers publish their netDb directories (or a subset) on the regular "
+"(non-i2p) network,\n"
"and the URLs of these directories are hardcoded in I2P.\n"
-"When the router starts up for the first time, it automatically fetches from\n"
+"When the router starts up for the first time, it automatically fetches "
+"from\n"
"one of these URLs, selected at random."
msgstr ""
#: i2p2www/pages/site/docs/how/network-database.html:251
msgid ""
"The floodfill netDb is a simple distributed storage mechanism.\n"
-"The storage algorithm is simple: send the data to the closest peer that has advertised itself\n"
-"as a floodfill router. Then wait 10 seconds, pick another floodfill router and ask them \n"
-"for the entry to be sent, verifying its proper insertion / distribution. If the \n"
-"verification peer doesn't reply, or they don't have the entry, the sender \n"
-"repeats the process. When the peer in the floodfill netDb receives a netDb \n"
-"store from a peer not in the floodfill netDb, they send it to a subset of the floodfill netDb-peers.\n"
-"The peers selected are the ones closest (according to the XOR-metric) to a specific key."
+"The storage algorithm is simple: send the data to the closest peer that "
+"has advertised itself\n"
+"as a floodfill router. Then wait 10 seconds, pick another floodfill "
+"router and ask them \n"
+"for the entry to be sent, verifying its proper insertion / distribution. "
+"If the \n"
+"verification peer doesn't reply, or they don't have the entry, the sender"
+" \n"
+"repeats the process. When the peer in the floodfill netDb receives a "
+"netDb \n"
+"store from a peer not in the floodfill netDb, they send it to a subset of"
+" the floodfill netDb-peers.\n"
+"The peers selected are the ones closest (according to the XOR-metric) to a specific key."
msgstr ""
#: i2p2www/pages/site/docs/how/network-database.html:262
msgid ""
-"Determining who is part of the floodfill netDb is trivial - it is exposed in each \n"
+"Determining who is part of the floodfill netDb is trivial - it is exposed"
+" in each \n"
"router's published routerInfo as a capability."
msgstr ""
@@ -6926,13 +8426,15 @@ msgid ""
"Routers with high bandwidth limits (which must be manually configured,\n"
"as the default is much lower) are presumed to be on lower-latency\n"
"connections, and are more likely to be available 24/7.\n"
-"The current minimum share bandwidth for a floodfill router is 128 KBytes/sec."
+"The current minimum share bandwidth for a floodfill router is 128 "
+"KBytes/sec."
msgstr ""
#: i2p2www/pages/site/docs/how/network-database.html:293
msgid ""
"In addition, a router must pass several additional tests for health\n"
-"(outbound message queue time, job lag, etc.) before floodfill operation is\n"
+"(outbound message queue time, job lag, etc.) before floodfill operation "
+"is\n"
"automatically enabled."
msgstr ""
@@ -6959,10 +8461,13 @@ msgstr ""
#: i2p2www/pages/site/docs/how/network-database.html:315
msgid ""
-"A floodfill router's only services that are in addition to those of non-floodfill routers\n"
+"A floodfill router's only services that are in addition to those of non-"
+"floodfill routers\n"
"are in accepting netDb stores and responding to netDb queries.\n"
-"Since they are generally high-bandwidth, they are more likely to participate in a high number of tunnels\n"
-"(i.e. be a \"relay\" for others), but this is not directly related to their distributed database services."
+"Since they are generally high-bandwidth, they are more likely to "
+"participate in a high number of tunnels\n"
+"(i.e. be a \"relay\" for others), but this is not directly related to "
+"their distributed database services."
msgstr ""
#: i2p2www/pages/site/docs/how/network-database.html:323
@@ -6971,21 +8476,29 @@ msgstr ""
#: i2p2www/pages/site/docs/how/network-database.html:324
msgid ""
-"The netDb uses a simple Kademlia-style XOR metric to determine closeness.\n"
+"The netDb uses a simple Kademlia-style XOR metric to determine closeness."
+"\n"
"The SHA256 hash of the key being looked up or stored is XOR-ed with\n"
"the hash of the router in question to determine closeness.\n"
-"A modification to this algorithm is done to increase the costs of Sybil attacks.\n"
-"Instead of the SHA256 hash of the key being looked up of stored, the SHA256 hash is taken\n"
-"of the 32-byte binary search key appended with the UTC date represented as an 8-byte ASCII string yyyyMMdd, i.e. SHA256(key + yyyyMMdd).\n"
-"This is called the \"routing key\", and it changes every day at midnight UTC.\n"
-"Only the search key is modified in this way, not the floodfill router hashes.\n"
-"The daily transformation of the DHT is sometimes called \"keyspace rotation\",\n"
+"A modification to this algorithm is done to increase the costs of Sybil attacks.\n"
+"Instead of the SHA256 hash of the key being looked up of stored, the "
+"SHA256 hash is taken\n"
+"of the 32-byte binary search key appended with the UTC date represented "
+"as an 8-byte ASCII string yyyyMMdd, i.e. SHA256(key + yyyyMMdd).\n"
+"This is called the \"routing key\", and it changes every day at midnight "
+"UTC.\n"
+"Only the search key is modified in this way, not the floodfill router "
+"hashes.\n"
+"The daily transformation of the DHT is sometimes called \"keyspace "
+"rotation\",\n"
"although it isn't strictly a rotation."
msgstr ""
#: i2p2www/pages/site/docs/how/network-database.html:337
msgid ""
-"Routing keys are never sent on-the-wire in any I2NP message, they are only used locally for\n"
+"Routing keys are never sent on-the-wire in any I2NP message, they are "
+"only used locally for\n"
"determination of distance."
msgstr ""
@@ -7000,7 +8513,8 @@ msgstr ""
#: i2p2www/pages/site/docs/how/network-database.html:347
#, python-format
msgid ""
-"I2NP DatabaseStoreMessages containing the local RouterInfo are exchanged with peers\n"
+"I2NP DatabaseStoreMessages containing the local "
+"RouterInfo are exchanged with peers\n"
"as a part of the initialization of a NTCP\n"
"or SSU transport connection."
msgstr ""
@@ -7012,32 +8526,46 @@ msgstr ""
#: i2p2www/pages/site/docs/how/network-database.html:355
#, python-format
msgid ""
-"I2NP DatabaseStoreMessages containing the local LeaseSet are periodically exchanged with peers\n"
-"by bundling them in a garlic message along with normal traffic from the related Destination.\n"
-"This allows an initial response, and later responses, to be sent to an appropriate Lease,\n"
-"without requiring any LeaseSet lookups, or requiring the communicating Destinations to have published LeaseSets at all."
+"I2NP DatabaseStoreMessages containing the local "
+"LeaseSet are periodically exchanged with peers\n"
+"by bundling them in a garlic message along with normal traffic from the "
+"related Destination.\n"
+"This allows an initial response, and later responses, to be sent to an "
+"appropriate Lease,\n"
+"without requiring any LeaseSet lookups, or requiring the communicating "
+"Destinations to have published LeaseSets at all."
msgstr ""
#: i2p2www/pages/site/docs/how/network-database.html:363
msgid ""
"The DatabaseStoreMessage should be sent to the floodfill that is closest\n"
"to the current routing key for the RouterInfo or LeaseSet being stored.\n"
-"Currently, the closest floodfill is found by a search in the local database.\n"
-"Even if that floodfill is not actually closest, it will flood it \"closer\" by\n"
+"Currently, the closest floodfill is found by a search in the local "
+"database.\n"
+"Even if that floodfill is not actually closest, it will flood it "
+"\"closer\" by\n"
"sending it to multiple other floodfills.\n"
"This provides a high degree of fault-tolerance."
msgstr ""
#: i2p2www/pages/site/docs/how/network-database.html:372
msgid ""
-"In traditional Kademlia, a peer would do a \"find-closest\" search before inserting\n"
-"an item in the DHT to the closest target. As the verify operation will tend to\n"
-"discover closer floodfills if they are present, a router will quickly improve\n"
-"its knowledge of the DHT \"neighborhood\" for the RouterInfo and LeaseSets it regularly publishes.\n"
-"While I2NP does not define a \"find-closest\" message, if it becomes necessary,\n"
-"a router may simply do an iterative search for a key with the least significant bit flipped\n"
-"(i.e. key ^ 0x01) until no closer peers are received in the DatabaseSearchReplyMessages.\n"
-"This ensures that the true closest peer will be found even if a more-distant peer had\n"
+"In traditional Kademlia, a peer would do a \"find-closest\" search before"
+" inserting\n"
+"an item in the DHT to the closest target. As the verify operation will "
+"tend to\n"
+"discover closer floodfills if they are present, a router will quickly "
+"improve\n"
+"its knowledge of the DHT \"neighborhood\" for the RouterInfo and "
+"LeaseSets it regularly publishes.\n"
+"While I2NP does not define a \"find-closest\" message, if it becomes "
+"necessary,\n"
+"a router may simply do an iterative search for a key with the least "
+"significant bit flipped\n"
+"(i.e. key ^ 0x01) until no closer peers are received in the "
+"DatabaseSearchReplyMessages.\n"
+"This ensures that the true closest peer will be found even if a more-"
+"distant peer had\n"
"the netdb item."
msgstr ""
@@ -7048,9 +8576,11 @@ msgstr ""
#: i2p2www/pages/site/docs/how/network-database.html:386
#, python-format
msgid ""
-"A router publishes its own RouterInfo by directly connecting to a floodfill router\n"
+"A router publishes its own RouterInfo by directly connecting to a "
+"floodfill router\n"
"and sending it a I2NP DatabaseStoreMessage\n"
-"with a nonzero Reply Token. The message is not end-to-end garlic encrypted,\n"
+"with a nonzero Reply Token. The message is not end-to-end garlic "
+"encrypted,\n"
"as this is a direct connection, so there are no intervening routers\n"
"(and no need to hide this data anyway).\n"
"The floodfill router replies with a\n"
@@ -7064,7 +8594,8 @@ msgstr ""
#: i2p2www/pages/site/docs/how/network-database.html:401
msgid ""
-"Storage of LeaseSets is much more sensitive than for RouterInfos, as a router\n"
+"Storage of LeaseSets is much more sensitive than for RouterInfos, as a "
+"router\n"
"must take care that the LeaseSet cannot be associated with the router."
msgstr ""
@@ -7073,8 +8604,10 @@ msgstr ""
msgid ""
"A router publishes a local LeaseSet by\n"
"sending a I2NP DatabaseStoreMessage\n"
-"with a nonzero Reply Token over an outbound client tunnel for that Destination.\n"
-"The message is end-to-end garlic encrypted using the Destination's Session Key Manager,\n"
+"with a nonzero Reply Token over an outbound client tunnel for that "
+"Destination.\n"
+"The message is end-to-end garlic encrypted using the Destination's "
+"Session Key Manager,\n"
"to hide the message from the tunnel's outbound endpoint.\n"
"The floodfill router replies with a\n"
"I2NP DeliveryStatusMessage,\n"
@@ -7090,12 +8623,17 @@ msgstr ""
#, python-format
msgid ""
"After a floodfill router receives a DatabaseStoreMessage containing a\n"
-"valid RouterInfo or LeaseSet which is newer than that previously stored in its\n"
+"valid RouterInfo or LeaseSet which is newer than that previously stored "
+"in its\n"
"local NetDb, it \"floods\" it.\n"
-"To flood a NetDb entry, it looks up several (currently %(floodsize)s) floodfill routers closest to the routing key\n"
-"of the NetDb entry. (The routing key is the SHA256 Hash of the RouterIdentity or Destination with the date (yyyyMMdd) appended.)\n"
-"By flooding to those closest to the key, not closest to itself, the floodfill ensures that the storage\n"
-"gets to the right place, even if the storing router did not have good knowledge of the\n"
+"To flood a NetDb entry, it looks up several (currently %(floodsize)s) "
+"floodfill routers closest to the routing key\n"
+"of the NetDb entry. (The routing key is the SHA256 Hash of the "
+"RouterIdentity or Destination with the date (yyyyMMdd) appended.)\n"
+"By flooding to those closest to the key, not closest to itself, the "
+"floodfill ensures that the storage\n"
+"gets to the right place, even if the storing router did not have good "
+"knowledge of the\n"
"DHT \"neighborhood\" for the routing key."
msgstr ""
@@ -7117,15 +8655,17 @@ msgstr ""
#: i2p2www/pages/site/docs/how/network-database.html:442
#, python-format
msgid ""
-"The I2NP DatabaseLookupMessage is used to request a netdb entry from a floodfill router.\n"
+"The I2NP DatabaseLookupMessage is used to "
+"request a netdb entry from a floodfill router.\n"
"Lookups are sent out one of the router's outbound exploratory tunnels.\n"
-"The replies are specified to return via one of the router's inbound exploratory tunnels."
+"The replies are specified to return via one of the router's inbound "
+"exploratory tunnels."
msgstr ""
#: i2p2www/pages/site/docs/how/network-database.html:448
msgid ""
-"Lookups are generally sent to the two \"good\" (the connection doesn't fail)"
-" floodfill routers closest to the requested key, in parallel."
+"Lookups are generally sent to the two \"good\" (the connection doesn't "
+"fail) floodfill routers closest to the requested key, in parallel."
msgstr ""
#: i2p2www/pages/site/docs/how/network-database.html:452
@@ -7133,7 +8673,8 @@ msgstr ""
msgid ""
"If the key is found locally by the floodfill router, it responds with a\n"
"I2NP DatabaseStoreMessage.\n"
-"If the key is not found locally by the floodfill router, it responds with a\n"
+"If the key is not found locally by the floodfill router, it responds with"
+" a\n"
"I2NP DatabaseSearchReplyMessage\n"
"containing a list of other floodfill routers close to the key."
msgstr ""
@@ -7141,17 +8682,22 @@ msgstr ""
#: i2p2www/pages/site/docs/how/network-database.html:460
msgid ""
"LeaseSet lookups are garlic encrypted end-to-end as of release 0.9.5.\n"
-"RouterInfo lookups are not encrypted and thus are vulnerable to snooping by the outbound endpoint\n"
-"(OBEP) of the client tunnel. This is due to the expense of the ElGamal encryption.\n"
+"RouterInfo lookups are not encrypted and thus are vulnerable to snooping "
+"by the outbound endpoint\n"
+"(OBEP) of the client tunnel. This is due to the expense of the ElGamal "
+"encryption.\n"
"RouterInfo lookup encryption may be enabled in a future release."
msgstr ""
#: i2p2www/pages/site/docs/how/network-database.html:467
msgid ""
-"As of release 0.9.7, replies to a LeaseSet lookup (a DatabaseStoreMessage or a DatabaseSearchReplyMessage)\n"
+"As of release 0.9.7, replies to a LeaseSet lookup (a DatabaseStoreMessage"
+" or a DatabaseSearchReplyMessage)\n"
"will be encrypted by including the session key and tag in the lookup.\n"
-"This hides the reply from the inbound gateway (IBGW) of the reply tunnel.\n"
-"Responses to RouterInfo lookups will be encrypted if we enable the lookup encryption."
+"This hides the reply from the inbound gateway (IBGW) of the reply tunnel."
+"\n"
+"Responses to RouterInfo lookups will be encrypted if we enable the lookup"
+" encryption."
msgstr ""
#: i2p2www/pages/site/docs/how/network-database.html:474
@@ -7163,33 +8709,44 @@ msgstr ""
#: i2p2www/pages/site/docs/how/network-database.html:478
msgid ""
-"Due to the relatively small size of the network and the flooding redundancy of 8x,\n"
+"Due to the relatively small size of the network and the flooding "
+"redundancy of 8x,\n"
"lookups are usually O(1) rather than O(log n) --\n"
-"a router is highly likely to know a floodfill router close enough to the key to get the answer on the first try.\n"
+"a router is highly likely to know a floodfill router close enough to the "
+"key to get the answer on the first try.\n"
"In releases prior to 0.8.9, routers used a lookup redundancy of two\n"
-"(that is, two lookups were performed in parallel to different peers), and\n"
-"neither recursive nor iterative routing for lookups was implemented.\n"
+"(that is, two lookups were performed in parallel to different peers), and"
+"\n"
+"neither recursive nor iterative routing for lookups was "
+"implemented.\n"
"Queries were sent through multiple routes simultaneously\n"
"to reduce the chance of query failure."
msgstr ""
#: i2p2www/pages/site/docs/how/network-database.html:489
msgid ""
-"As of release 0.8.9, iterative lookups are implemented with no lookup redundancy.\n"
+"As of release 0.8.9, iterative lookups are implemented with no "
+"lookup redundancy.\n"
"This is a more efficient and reliable lookup that will work much better\n"
"when not all floodfill peers are known, and it removes a serious\n"
-"limitation to network growth. As the network grows and each router knows only a small\n"
+"limitation to network growth. As the network grows and each router knows "
+"only a small\n"
"subset of the floodfill peers, lookups will become O(log n).\n"
-"Even if the peer does not return references closer to the key, the lookup continues with\n"
-"the next-closest peer, for added robustness, and to prevent a malicious floodfill from\n"
-"black-holing a part of the key space. Lookups continue until a total lookup timeout is reached,\n"
+"Even if the peer does not return references closer to the key, the lookup"
+" continues with\n"
+"the next-closest peer, for added robustness, and to prevent a malicious "
+"floodfill from\n"
+"black-holing a part of the key space. Lookups continue until a total "
+"lookup timeout is reached,\n"
"or the maximum number of peers is queried."
msgstr ""
#: i2p2www/pages/site/docs/how/network-database.html:501
msgid ""
-"Node IDs are verifiable in that we use the router hash directly as both the node ID and the Kademlia key.\n"
-"Incorrect responses that are not closer to the search key are generally ignored.\n"
+"Node IDs are verifiable in that we use the router hash "
+"directly as both the node ID and the Kademlia key.\n"
+"Incorrect responses that are not closer to the search key are generally "
+"ignored.\n"
"Given the current size of the network, a router has\n"
"detailed knowledge of the neighborhood of the destination ID space."
msgstr ""
@@ -7201,7 +8758,8 @@ msgstr ""
#: i2p2www/pages/site/docs/how/network-database.html:511
#, python-format
msgid ""
-"Note: RouterInfo verification is disabled as of release 0.9.7.1 to prevent\n"
+"Note: RouterInfo verification is disabled as of release 0.9.7.1 to "
+"prevent\n"
"the attack described in the paper\n"
"Practical Attacks Against the I2P Network.\n"
"It is not clear if verification can be redesigned to be done safely."
@@ -7209,11 +8767,13 @@ msgstr ""
#: i2p2www/pages/site/docs/how/network-database.html:518
msgid ""
-"To verify a storage was successful, a router simply waits about 10 seconds,\n"
+"To verify a storage was successful, a router simply waits about 10 "
+"seconds,\n"
"then sends a lookup to another floodfill router close to the key\n"
"(but not the one the store was sent to).\n"
"Lookups sent out one of the router's outbound exploratory tunnels.\n"
-"Lookups are end-to-end garlic encrypted to prevent snooping by the outbound endpoint(OBEP)."
+"Lookups are end-to-end garlic encrypted to prevent snooping by the "
+"outbound endpoint(OBEP)."
msgstr ""
#: i2p2www/pages/site/docs/how/network-database.html:526
@@ -7222,18 +8782,22 @@ msgstr ""
#: i2p2www/pages/site/docs/how/network-database.html:527
msgid ""
-"To verify a storage was successful, a router simply waits about 10 seconds,\n"
+"To verify a storage was successful, a router simply waits about 10 "
+"seconds,\n"
"then sends a lookup to another floodfill router close to the key\n"
"(but not the one the store was sent to).\n"
-"Lookups sent out one of the outbound client tunnels for the destination of the LeaseSet being verified.\n"
+"Lookups sent out one of the outbound client tunnels for the destination "
+"of the LeaseSet being verified.\n"
"To prevent snooping by the OBEP of the outbound tunnel,\n"
"lookups are end-to-end garlic encrypted.\n"
-"The replies are specified to return via one of the client's inbound tunnels."
+"The replies are specified to return via one of the client's inbound "
+"tunnels."
msgstr ""
#: i2p2www/pages/site/docs/how/network-database.html:537
msgid ""
-"As of release 0.9.7, replies for both RouterInfo and LeaseSet lookups (a DatabaseStoreMessage or a DatabaseSearchReplyMessage)\n"
+"As of release 0.9.7, replies for both RouterInfo and LeaseSet lookups (a "
+"DatabaseStoreMessage or a DatabaseSearchReplyMessage)\n"
"will be encrypted,\n"
"to hide the reply from the inbound gateway (IBGW) of the reply tunnel."
msgstr ""
@@ -7245,16 +8809,24 @@ msgstr ""
#: i2p2www/pages/site/docs/how/network-database.html:546
#, python-format
msgid ""
-"Exploration is a special form of netdb lookup, where a router attempts to learn about\n"
+"Exploration is a special form of netdb lookup, where a router "
+"attempts to learn about\n"
"new routers.\n"
-"It does this by sending a floodfill router a I2NP DatabaseLookupMessage, looking for a random key.\n"
+"It does this by sending a floodfill router a I2NP DatabaseLookupMessage, looking for a random "
+"key.\n"
"As this lookup will fail, the floodfill would normally respond with a\n"
-"I2NP DatabaseSearchReplyMessage containing hashes of floodfill routers close to the key.\n"
-"This would not be helpful, as the requesting router probably already knows those floodfills,\n"
-"and it would be impractical to add ALL floodfill routers to the \"don't include\" field of the lookup.\n"
-"For an exploration query, the requesting router adds a router hash of all zeros to the\n"
+"I2NP DatabaseSearchReplyMessage containing "
+"hashes of floodfill routers close to the key.\n"
+"This would not be helpful, as the requesting router probably already "
+"knows those floodfills,\n"
+"and it would be impractical to add ALL floodfill routers to the \"don't "
+"include\" field of the lookup.\n"
+"For an exploration query, the requesting router adds a router hash of all"
+" zeros to the\n"
"\"don't include\" field of the DatabaseLookupMessage.\n"
-"The floodfill will then respond only with non-floodfill routers close to the requested key."
+"The floodfill will then respond only with non-floodfill routers close to "
+"the requested key."
msgstr ""
#: i2p2www/pages/site/docs/how/network-database.html:560
@@ -7263,11 +8835,14 @@ msgstr ""
#: i2p2www/pages/site/docs/how/network-database.html:561
msgid ""
-"The response to a lookup request is either a Database Store Message (on success) or a\n"
-"Database Search Reply Message (on failure). The DSRM contains a 'from' router hash field\n"
+"The response to a lookup request is either a Database Store Message (on "
+"success) or a\n"
+"Database Search Reply Message (on failure). The DSRM contains a 'from' "
+"router hash field\n"
"to indicate the source of the reply; the DSM does not.\n"
"The DSRM 'from' field is unauthenticated and may be spoofed or invalid.\n"
-"There are no other response tags. Therefore, when making multiple requests in parallel, it is\n"
+"There are no other response tags. Therefore, when making multiple "
+"requests in parallel, it is\n"
"difficult to monitor the performance of the various floodfill routers."
msgstr ""
@@ -7277,13 +8852,19 @@ msgstr ""
#: i2p2www/pages/site/docs/how/network-database.html:573
msgid ""
-"Destinations may be hosted on multiple routers simultaneously, by using the same\n"
+"Destinations may be hosted on multiple routers simultaneously, by using "
+"the same\n"
"private and public keys (traditionally stored in eepPriv.dat files).\n"
-"As both instances will periodically publish their signed LeaseSets to the floodfill peers,\n"
-"the most recently published LeaseSet will be returned to a peer requesting a database lookup.\n"
-"As LeaseSets have (at most) a 10 minute lifetime, should a particular instance go down,\n"
-"the outage will be 10 minutes at most, and generally much less than that.\n"
-"The multihoming function has been verified and is in use by several services on the network."
+"As both instances will periodically publish their signed LeaseSets to the"
+" floodfill peers,\n"
+"the most recently published LeaseSet will be returned to a peer "
+"requesting a database lookup.\n"
+"As LeaseSets have (at most) a 10 minute lifetime, should a particular "
+"instance go down,\n"
+"the outage will be 10 minutes at most, and generally much less than that."
+"\n"
+"The multihoming function has been verified and is in use by several "
+"services on the network."
msgstr ""
#: i2p2www/pages/site/docs/how/network-database.html:583
@@ -7295,7 +8876,9 @@ msgstr ""
msgid ""
"Also discussed on the threat model "
"page."
-msgstr "Также обсуждается на странице модели угроз."
+msgstr ""
+"Также обсуждается на странице "
+"модели угроз."
#: i2p2www/pages/site/docs/how/network-database.html:588
msgid ""
@@ -7313,7 +8896,8 @@ msgstr ""
#, python-format
msgid ""
"There are currently around %(ffcount)s floodfill routers in the network.\n"
-"Most of the following attacks will become more difficult, or have less impact,\n"
+"Most of the following attacks will become more difficult, or have less "
+"impact,\n"
"as the network size and number of floodfill routers increase."
msgstr ""
@@ -7324,8 +8908,8 @@ msgstr ""
#: i2p2www/pages/site/docs/how/network-database.html:604
#, python-format
msgid ""
-"Via flooding, all netdb entries are stored on the %(floodsize)s floodfill "
-"routers closest to the key."
+"Via flooding, all netdb entries are stored on the %(floodsize)s floodfill"
+" routers closest to the key."
msgstr ""
#: i2p2www/pages/site/docs/how/network-database.html:609
@@ -7346,7 +8930,8 @@ msgstr ""
#, python-format
msgid ""
"Each router maintains an expanded set of statistics in the\n"
-"peer profile for each floodfill router,\n"
+"peer profile for each floodfill router,"
+"\n"
"covering various quality metrics for that peer.\n"
"The set includes:"
msgstr ""
@@ -7377,11 +8962,14 @@ msgstr ""
#: i2p2www/pages/site/docs/how/network-database.html:631
msgid ""
-"Each time a router needs to make a determination on which floodfill router is closest to a key,\n"
+"Each time a router needs to make a determination on which floodfill "
+"router is closest to a key,\n"
"it uses these metrics to determine which floodfill routers are \"good\".\n"
-"The methods, and thresholds, used to determine \"goodness\" are relatively new, and\n"
+"The methods, and thresholds, used to determine \"goodness\" are "
+"relatively new, and\n"
"are subject to further analysis and improvement.\n"
-"While a completely unresponsive router will quickly be identified and avoided,\n"
+"While a completely unresponsive router will quickly be identified and "
+"avoided,\n"
"routers that are only sometimes malicious may be much harder to deal with."
msgstr ""
@@ -7393,7 +8981,8 @@ msgstr ""
#, python-format
msgid ""
"An attacker may mount a Sybil attack\n"
-"by creating a large number of floodfill routers spread throughout the keyspace."
+"by creating a large number of floodfill routers spread throughout the "
+"keyspace."
msgstr ""
#: i2p2www/pages/site/docs/how/network-database.html:647
@@ -7401,29 +8990,35 @@ msgstr ""
msgid ""
"(In a related example, a researcher recently created a\n"
"large number of Tor relays.)\n"
-"If successful, this could be an effective DOS attack on the entire network."
+"If successful, this could be an effective DOS attack on the entire "
+"network."
msgstr ""
#: i2p2www/pages/site/docs/how/network-database.html:653
msgid ""
-"If the floodfills are not sufficiently misbehaving to be marked as \"bad\" using the peer profile\n"
+"If the floodfills are not sufficiently misbehaving to be marked as "
+"\"bad\" using the peer profile\n"
"metrics described above, this is a difficult scenario to handle.\n"
-"Tor's response can be much more nimble in the relay case, as the suspicious relays\n"
+"Tor's response can be much more nimble in the relay case, as the "
+"suspicious relays\n"
"can be manually removed from the consensus.\n"
-"Some possible responses for the I2P network are listed below, however none of them is completely satisfactory:"
+"Some possible responses for the I2P network are listed below, however "
+"none of them is completely satisfactory:"
msgstr ""
#: i2p2www/pages/site/docs/how/network-database.html:661
msgid ""
-"Compile a list of bad router hashes or IPs, and announce the list through various means\n"
-"(console news, website, forum, etc.); users would have to manually download the list and\n"
+"Compile a list of bad router hashes or IPs, and announce the list through"
+" various means\n"
+"(console news, website, forum, etc.); users would have to manually "
+"download the list and\n"
"add it to their local \"blacklist\"."
msgstr ""
#: i2p2www/pages/site/docs/how/network-database.html:666
msgid ""
-"Ask everyone in the network to enable floodfill manually (fight Sybil with "
-"more Sybil)"
+"Ask everyone in the network to enable floodfill manually (fight Sybil "
+"with more Sybil)"
msgstr ""
#: i2p2www/pages/site/docs/how/network-database.html:667
@@ -7432,7 +9027,8 @@ msgstr ""
#: i2p2www/pages/site/docs/how/network-database.html:668
msgid ""
-"Release a new software version that improves the peer profile metrics and thresholds,\n"
+"Release a new software version that improves the peer profile metrics and"
+" thresholds,\n"
"in an attempt to automatically identify the \"bad\" peers."
msgstr ""
@@ -7444,9 +9040,12 @@ msgstr ""
#: i2p2www/pages/site/docs/how/network-database.html:673
msgid ""
-"Implement an automatic subscription-based blacklist controlled by a single individual or group.\n"
-"This would essentially implement a portion of the Tor \"consensus\" model.\n"
-"Unfortunately it would also give a single individual or group the power to\n"
+"Implement an automatic subscription-based blacklist controlled by a "
+"single individual or group.\n"
+"This would essentially implement a portion of the Tor \"consensus\" "
+"model.\n"
+"Unfortunately it would also give a single individual or group the power "
+"to\n"
"block participation of any particular router or IP in the network,\n"
"or even to completely shutdown or destroy the entire network."
msgstr ""
@@ -7463,19 +9062,25 @@ msgstr ""
#, python-format
msgid ""
"An attacker may mount a Sybil attack\n"
-"by creating a small number (8-15) of floodfill routers clustered closely in the keyspace,\n"
+"by creating a small number (8-15) of floodfill routers clustered closely "
+"in the keyspace,\n"
"and distribute the RouterInfos for these routers widely.\n"
-"Then, all lookups and stores for a key in that keyspace would be directed\n"
+"Then, all lookups and stores for a key in that keyspace would be directed"
+"\n"
"to one of the attacker's routers.\n"
-"If successful, this could be an effective DOS attack on a particular eepsite, for example."
+"If successful, this could be an effective DOS attack on a particular "
+"eepsite, for example."
msgstr ""
#: i2p2www/pages/site/docs/how/network-database.html:698
msgid ""
-"As the keyspace is indexed by the cryptographic (SHA256) Hash of the key,\n"
-"an attacker must use a brute-force method to repeatedly generate router hashes\n"
+"As the keyspace is indexed by the cryptographic (SHA256) Hash of the key,"
+"\n"
+"an attacker must use a brute-force method to repeatedly generate router "
+"hashes\n"
"until he has enough that are sufficiently close to the key.\n"
-"The amount of computational power required for this, which is dependent on network\n"
+"The amount of computational power required for this, which is dependent "
+"on network\n"
"size, is unknown."
msgstr ""
@@ -7483,10 +9088,14 @@ msgstr ""
msgid ""
"As a partial defense against this attack,\n"
"the algorithm used to determine Kademlia \"closeness\" varies over time.\n"
-"Rather than using the Hash of the key (i.e. H(k)) to determine closeness,\n"
-"we use the Hash of the key appended with the current date string, i.e. H(k + YYYYMMDD).\n"
-"A function called the \"routing key generator\" does this, which transforms the original key into a \"routing key\".\n"
-"In other words, the entire netdb keyspace \"rotates\" every day at UTC midnight.\n"
+"Rather than using the Hash of the key (i.e. H(k)) to determine closeness,"
+"\n"
+"we use the Hash of the key appended with the current date string, i.e. "
+"H(k + YYYYMMDD).\n"
+"A function called the \"routing key generator\" does this, which "
+"transforms the original key into a \"routing key\".\n"
+"In other words, the entire netdb keyspace \"rotates\" every day at UTC "
+"midnight.\n"
"Any partial-keyspace attack would have to be regenerated every day, for\n"
"after the rotation, the attacking routers would no longer be close\n"
"to the target key, or to each other."
@@ -7495,7 +9104,8 @@ msgstr ""
#: i2p2www/pages/site/docs/how/network-database.html:718
msgid ""
"This attack becomes more difficult as the network size grows.\n"
-"However, recent research demonstrates that the keyspace rotation is not particularly effective.\n"
+"However, recent research demonstrates that the keyspace rotation is not "
+"particularly effective.\n"
"An attacker can precompute numerous router hashes in advance,\n"
"and only a few routers are sufficient to \"eclipse\" a portion\n"
"of the keyspace within a half hour after rotation."
@@ -7503,9 +9113,11 @@ msgstr ""
#: i2p2www/pages/site/docs/how/network-database.html:726
msgid ""
-"One consequence of daily keyspace rotation is that the distributed network database\n"
+"One consequence of daily keyspace rotation is that the distributed "
+"network database\n"
"may become unreliable for a few minutes after the rotation --\n"
-"lookups will fail because the new \"closest\" router has not received a store yet.\n"
+"lookups will fail because the new \"closest\" router has not received a "
+"store yet.\n"
"The extent of the issue, and methods for mitigation\n"
"(for example netdb \"handoffs\" at midnight)\n"
"are a topic for further study."
@@ -7568,19 +9180,24 @@ msgstr ""
#, python-format
msgid ""
"See also lookup\n"
-"(Reference: Hashing it out in Public Sections 2.2-2.3 for terms below in italics)"
+"(Reference: Hashing it out in Public Sections "
+"2.2-2.3 for terms below in italics)"
msgstr ""
#: i2p2www/pages/site/docs/how/network-database.html:782
msgid ""
-"Similar to a bootstrap attack, an attacker using a floodfill router could attempt to \"steer\"\n"
-"peers to a subset of routers controlled by him by returning their references."
+"Similar to a bootstrap attack, an attacker using a floodfill router could"
+" attempt to \"steer\"\n"
+"peers to a subset of routers controlled by him by returning their "
+"references."
msgstr ""
#: i2p2www/pages/site/docs/how/network-database.html:787
msgid ""
-"This is unlikely to work via exploration, because exploration is a low-frequency task.\n"
-"Routers acquire a majority of their peer references through normal tunnel building activity.\n"
+"This is unlikely to work via exploration, because exploration is a low-"
+"frequency task.\n"
+"Routers acquire a majority of their peer references through normal tunnel"
+" building activity.\n"
"Exploration results are generally limited to a few router hashes,\n"
"and each exploration query is directed to a random floodfill router."
msgstr ""
@@ -7592,13 +9209,18 @@ msgid ""
"For floodfill router references returned in a\n"
"I2NP DatabaseSearchReplyMessage\n"
"response to a lookup,\n"
-"these references are followed if they are closer (or the next closest) to the lookup key.\n"
+"these references are followed if they are closer (or the next closest) to"
+" the lookup key.\n"
"The requesting router does not trust that the references are\n"
"closer to the key (i.e. they are verifiably correct.\n"
-"The lookup also does not stop when no closer key is found, but continues by querying the\n"
-"next-closet node, until the timeout or maximum number of queries is reached.\n"
-"This prevents a malicious floodfill from black-holing a part of the key space.\n"
-"Also, the daily keyspace rotation requires an attacker to regenerate a router info\n"
+"The lookup also does not stop when no closer key is found, but continues "
+"by querying the\n"
+"next-closet node, until the timeout or maximum number of queries is "
+"reached.\n"
+"This prevents a malicious floodfill from black-holing a part of the key "
+"space.\n"
+"Also, the daily keyspace rotation requires an attacker to regenerate a "
+"router info\n"
"within the desired key space region.\n"
"This design ensures that the query capture attack described in\n"
"Hashing it out in Public\n"
@@ -7636,30 +9258,43 @@ msgstr ""
#: i2p2www/pages/site/docs/how/network-database.html:829
#, python-format
msgid ""
-"This paper addresses weaknesses in the \"Finger Table\" DHT lookups used by Torsk and NISAN.\n"
-"At first glance, these do not appear to apply to I2P. First, the use of DHT by Torsk and NISAN\n"
-"is significantly different from that in I2P. Second, I2P's network database lookups are only\n"
-"loosely correlated to the peer selection and\n"
-"tunnel building processes; only previously-known peers\n"
+"This paper addresses weaknesses in the \"Finger Table\" DHT lookups used "
+"by Torsk and NISAN.\n"
+"At first glance, these do not appear to apply to I2P. First, the use of "
+"DHT by Torsk and NISAN\n"
+"is significantly different from that in I2P. Second, I2P's network "
+"database lookups are only\n"
+"loosely correlated to the peer "
+"selection and\n"
+"tunnel building processes; only "
+"previously-known peers\n"
"are used for tunnels.\n"
"Also, peer selection is unrelated to any notion of DHT key-closeness."
msgstr ""
#: i2p2www/pages/site/docs/how/network-database.html:840
msgid ""
-"Some of this may actually be more interesting when the I2P network gets much larger.\n"
-"Right now, each router knows a large proportion of the network, so looking up a particular\n"
-"Router Info in the network database is not strongly indicative of a future intent to use\n"
-"that router in a tunnel. Perhaps when the network is 100 times larger, the lookup may be\n"
-"more correlative. Of course, a larger network makes a Sybil attack that much harder."
+"Some of this may actually be more interesting when the I2P network gets "
+"much larger.\n"
+"Right now, each router knows a large proportion of the network, so "
+"looking up a particular\n"
+"Router Info in the network database is not strongly indicative of a "
+"future intent to use\n"
+"that router in a tunnel. Perhaps when the network is 100 times larger, "
+"the lookup may be\n"
+"more correlative. Of course, a larger network makes a Sybil attack that "
+"much harder."
msgstr ""
#: i2p2www/pages/site/docs/how/network-database.html:848
#, python-format
msgid ""
-"However, the general issue of DHT information leakage in I2P needs further investigation.\n"
-"The floodfill routers are in a position to observe queries and gather information.\n"
-"Certainly, at a level of f = 0.2 (20% malicious nodes, as specifed in the paper)\n"
+"However, the general issue of DHT information leakage in I2P needs "
+"further investigation.\n"
+"The floodfill routers are in a position to observe queries and gather "
+"information.\n"
+"Certainly, at a level of f = 0.2 (20% malicious nodes, as "
+"specifed in the paper)\n"
"we expect that many of the Sybil threats we describe\n"
"(here,\n"
"here and\n"
@@ -7694,9 +9329,11 @@ msgstr ""
#: i2p2www/pages/site/docs/how/peer-selection.html:10
#, python-format
msgid ""
-"Peer profiling is the process of collecting data based on the observed performance\n"
+"Peer profiling is the process of collecting data based on the "
+"observed performance\n"
"of other routers or peers, and classifying those peers into groups.\n"
-"Profiling does not use any claimed performance data published by the peer itself\n"
+"Profiling does not use any claimed performance data published by "
+"the peer itself\n"
"in the network database."
msgstr ""
@@ -7711,7 +9348,8 @@ msgstr ""
#: i2p2www/pages/site/docs/how/peer-selection.html:20
#, python-format
msgid ""
-"Choosing peers from the set of floodfill routers to use for network database storage and queries,\n"
+"Choosing peers from the set of floodfill routers to use for network "
+"database storage and queries,\n"
"which is discussed on the network database page"
msgstr ""
@@ -7724,9 +9362,11 @@ msgstr ""
#: i2p2www/pages/site/docs/how/peer-selection.html:28
msgid ""
"Peer selection is the process of choosing which routers\n"
-"on the network we want to relay our messages to go through (which peers will we \n"
+"on the network we want to relay our messages to go through (which peers "
+"will we \n"
"ask to join our tunnels). To accomplish this, we keep track of how each\n"
-"peer performs (the peer's \"profile\") and use that data to estimate how \n"
+"peer performs (the peer's \"profile\") and use that data to estimate how"
+" \n"
"fast they are, how often they will be able to accept our requests, and \n"
"whether they seem to be overloaded or otherwise unable to perform what\n"
"they agree to reliably."
@@ -7736,7 +9376,8 @@ msgstr ""
#, python-format
msgid ""
"Unlike some other anonymous networks, in I2P,\n"
-"claimed bandwidth is untrusted and is only used to avoid those peers\n"
+"claimed bandwidth is untrusted and is only used to avoid those "
+"peers\n"
"advertising very low bandwidth insufficient for routing tunnels.\n"
"All peer selection is done through profiling.\n"
"This prevents simple attacks based on peers claiming high bandwidth\n"
@@ -7748,8 +9389,10 @@ msgstr ""
#: i2p2www/pages/site/docs/how/peer-selection.html:50
msgid ""
-"Peer selection is done quite frequently, as a router may maintain a large number\n"
-"of client and exploratory tunnels, and a tunnel lifetime is only 10 minutes."
+"Peer selection is done quite frequently, as a router may maintain a large"
+" number\n"
+"of client and exploratory tunnels, and a tunnel lifetime is only 10 "
+"minutes."
msgstr ""
#: i2p2www/pages/site/docs/how/peer-selection.html:56
@@ -7760,9 +9403,11 @@ msgstr ""
#, python-format
msgid ""
"For more information see the paper\n"
-"Peer Profiling and Selection in the I2P Anonymous Network\n"
+"Peer Profiling and Selection in the I2P Anonymous "
+"Network\n"
"presented at PET-CON 2009.1.\n"
-"See below for notes on minor changes since the paper was published."
+"See below for notes on minor changes since the "
+"paper was published."
msgstr ""
#: i2p2www/pages/site/docs/how/peer-selection.html:65
@@ -7772,21 +9417,30 @@ msgstr ""
#: i2p2www/pages/site/docs/how/peer-selection.html:66
#, python-format
msgid ""
-"Each peer has a set of data points collected about them, including statistics \n"
-"about how long it takes for them to reply to a network database query, how \n"
-"often their tunnels fail, and how many new peers they are able to introduce \n"
-"us to, as well as simple data points such as when we last heard from them or\n"
-"when the last communication error occurred. The specific data points gathered\n"
+"Each peer has a set of data points collected about them, including "
+"statistics \n"
+"about how long it takes for them to reply to a network database query, "
+"how \n"
+"often their tunnels fail, and how many new peers they are able to "
+"introduce \n"
+"us to, as well as simple data points such as when we last heard from them"
+" or\n"
+"when the last communication error occurred. The specific data points "
+"gathered\n"
"can be found in the code."
msgstr ""
#: i2p2www/pages/site/docs/how/peer-selection.html:75
msgid ""
-"Profiles are fairly small, a few KB. To control memory usage, the profile expiration time\n"
+"Profiles are fairly small, a few KB. To control memory usage, the profile"
+" expiration time\n"
"lessens as the number of profiles grows.\n"
-"Profiles are kept in memory until router shutdown, when they are written to disk.\n"
-"At startup, the profiles are read so the router need not reinitialize all profiles,\n"
-"thus allowing a router to quickly re-integrate into the network after startup."
+"Profiles are kept in memory until router shutdown, when they are written "
+"to disk.\n"
+"At startup, the profiles are read so the router need not reinitialize all"
+" profiles,\n"
+"thus allowing a router to quickly re-integrate into the network after "
+"startup."
msgstr ""
#: i2p2www/pages/site/docs/how/peer-selection.html:85
@@ -7796,8 +9450,10 @@ msgstr ""
#: i2p2www/pages/site/docs/how/peer-selection.html:86
msgid ""
"While the profiles themselves can be considered a summary of a peer's \n"
-"performance, to allow for effective peer selection we break each summary down \n"
-"into four simple values, representing the peer's speed, its capacity, how well \n"
+"performance, to allow for effective peer selection we break each summary "
+"down \n"
+"into four simple values, representing the peer's speed, its capacity, how"
+" well \n"
"integrated into the network it is, and whether it is failing."
msgstr ""
@@ -7809,7 +9465,8 @@ msgstr "Скорость"
msgid ""
"The speed calculation\n"
"simply goes through the profile and estimates how much data we can\n"
-"send or receive on a single tunnel through the peer in a minute. For this estimate it just looks at\n"
+"send or receive on a single tunnel through the peer in a minute. For "
+"this estimate it just looks at\n"
"performance in the previous minute."
msgstr ""
@@ -7821,11 +9478,13 @@ msgstr ""
msgid ""
"The capacity calculation\n"
"simply goes through the profile and estimates how many tunnels the peer\n"
-"would agree to participate in over a given time period. For this estimate it looks at \n"
+"would agree to participate in over a given time period. For this "
+"estimate it looks at \n"
"how many tunnel build requests\n"
"the peer has accepted, rejected, and dropped, and how many\n"
"of the agreed-to tunnels later failed.\n"
-"While the calculation is time-weighted so that recent activity counts more than later activity,\n"
+"While the calculation is time-weighted so that recent activity counts "
+"more than later activity,\n"
"statistics up to 48 hours old may be included."
msgstr ""
@@ -7833,8 +9492,10 @@ msgstr ""
msgid ""
"Recognizing and avoiding unreliable and unreachable\n"
"peers is critically important.\n"
-"Unfortunately, as the tunnel building and testing require the participation of several peers,\n"
-"it is difficult to positively identify the cause of a dropped build request or test failure.\n"
+"Unfortunately, as the tunnel building and testing require the "
+"participation of several peers,\n"
+"it is difficult to positively identify the cause of a dropped build "
+"request or test failure.\n"
"The router assigns a probability of failure to each of the\n"
"peers, and uses that probability in the capacity calculation.\n"
"Drops and test failures are weighted much higher than rejections."
@@ -7846,8 +9507,10 @@ msgstr ""
#: i2p2www/pages/site/docs/how/peer-selection.html:124
msgid ""
-"As mentioned above, we drill through each peer's profile to come up with a \n"
-"few key calculations, and based upon those, we organize each peer into three\n"
+"As mentioned above, we drill through each peer's profile to come up with "
+"a \n"
+"few key calculations, and based upon those, we organize each peer into "
+"three\n"
"groups - fast, high capacity, and standard."
msgstr ""
@@ -7857,13 +9520,15 @@ msgstr ""
#: i2p2www/pages/site/docs/how/peer-selection.html:134
msgid ""
-"A peer is considered \"high capacity\" if its capacity calculation meets or \n"
+"A peer is considered \"high capacity\" if its capacity calculation meets "
+"or \n"
"exceeds the median of all peers."
msgstr ""
#: i2p2www/pages/site/docs/how/peer-selection.html:138
msgid ""
-"A peer is considered \"fast\" if they are already \"high capacity\" and their \n"
+"A peer is considered \"fast\" if they are already \"high capacity\" and "
+"their \n"
"speed calculation meets or exceeds the median of all peers."
msgstr ""
@@ -7889,20 +9554,25 @@ msgstr ""
#: i2p2www/pages/site/docs/how/peer-selection.html:156
msgid ""
"The fast group is limited to 30 peers.\n"
-"If there would be more, only the ones with the highest speed rating are placed in the group."
+"If there would be more, only the ones with the highest speed rating are "
+"placed in the group."
msgstr ""
#: i2p2www/pages/site/docs/how/peer-selection.html:160
msgid ""
-"The high capacity group is limited to 75 peers (including the fast group)\n"
-"If there would be more, only the ones with the highest capacity rating are placed in the group."
+"The high capacity group is limited to 75 peers (including the fast group)"
+"\n"
+"If there would be more, only the ones with the highest capacity rating "
+"are placed in the group."
msgstr ""
#: i2p2www/pages/site/docs/how/peer-selection.html:164
msgid ""
-"The standard group has no fixed limit, but is somewhat smaller than the number of RouterInfos\n"
+"The standard group has no fixed limit, but is somewhat smaller than the "
+"number of RouterInfos\n"
"stored in the local network database.\n"
-"On an active router in today's network, there may be about 1000 RouterInfos and 500 peer profiles\n"
+"On an active router in today's network, there may be about 1000 "
+"RouterInfos and 500 peer profiles\n"
"(including those in the fast and high capacity groups)"
msgstr ""
@@ -7918,15 +9588,16 @@ msgstr ""
#: i2p2www/pages/site/docs/how/peer-selection.html:177
msgid ""
-"The groups tend to be fairly stable, that is, there is not much \"churn\" in the rankings\n"
+"The groups tend to be fairly stable, that is, there is not much \"churn\""
+" in the rankings\n"
"at each recalculation.\n"
-"Peers in the fast and high capacity groups get more tunnels build through them, which increases their speed and capacity ratings,\n"
+"Peers in the fast and high capacity groups get more tunnels build through"
+" them, which increases their speed and capacity ratings,\n"
"which reinforces their presence in the group."
msgstr ""
#: i2p2www/pages/site/docs/how/peer-selection.html:188
-msgid ""
-"The router selects peers from the above groups to build tunnels through."
+msgid "The router selects peers from the above groups to build tunnels through."
msgstr ""
#: i2p2www/pages/site/docs/how/peer-selection.html:193
@@ -7935,16 +9606,19 @@ msgstr ""
#: i2p2www/pages/site/docs/how/peer-selection.html:194
msgid ""
-"Client tunnels are used for application traffic, such as for HTTP proxies "
-"and web servers."
+"Client tunnels are used for application traffic, such as for HTTP proxies"
+" and web servers."
msgstr ""
#: i2p2www/pages/site/docs/how/peer-selection.html:198
msgid ""
-"To reduce the susceptibility to some attacks,\n"
+"To reduce the susceptibility to some attacks,\n"
"and increase performance,\n"
-"peers for building client tunnels are chosen randomly from the smallest group, which is the \"fast\" group.\n"
-"There is no bias toward selecting peers that were previously participants in a tunnel for the same client."
+"peers for building client tunnels are chosen randomly from the smallest "
+"group, which is the \"fast\" group.\n"
+"There is no bias toward selecting peers that were previously participants"
+" in a tunnel for the same client."
msgstr ""
#: i2p2www/pages/site/docs/how/peer-selection.html:206
@@ -7953,26 +9627,35 @@ msgstr ""
#: i2p2www/pages/site/docs/how/peer-selection.html:207
msgid ""
-"Exploratory tunnels are used for router administrative purposes, such as network database traffic\n"
+"Exploratory tunnels are used for router administrative purposes, such as "
+"network database traffic\n"
"and testing client tunnels.\n"
-"Exploratory tunnels are also used to contact previously unconnected routers, which is why\n"
+"Exploratory tunnels are also used to contact previously unconnected "
+"routers, which is why\n"
"they are called \"exploratory\".\n"
"These tunnels are usually low-bandwidth."
msgstr ""
#: i2p2www/pages/site/docs/how/peer-selection.html:215
msgid ""
-"Peers for building exploratory tunnels are generally chosen randomly from the standard group.\n"
-"If the success rate of these build attempts is low compared to the client tunnel build success rate,\n"
-"the router will select a weighted average of peers randomly from the high capacity group instead.\n"
-"This helps maintain a satisfactory build success rate even when network performance is poor.\n"
-"There is no bias toward selecting peers that were previously participants in an exploratory tunnel."
+"Peers for building exploratory tunnels are generally chosen randomly from"
+" the standard group.\n"
+"If the success rate of these build attempts is low compared to the client"
+" tunnel build success rate,\n"
+"the router will select a weighted average of peers randomly from the high"
+" capacity group instead.\n"
+"This helps maintain a satisfactory build success rate even when network "
+"performance is poor.\n"
+"There is no bias toward selecting peers that were previously participants"
+" in an exploratory tunnel."
msgstr ""
#: i2p2www/pages/site/docs/how/peer-selection.html:223
msgid ""
-"As the standard group includes a very large subset of all peers the router knows about,\n"
-"exploratory tunnels are essentially built through a random selection of all peers,\n"
+"As the standard group includes a very large subset of all peers the "
+"router knows about,\n"
+"exploratory tunnels are essentially built through a random selection of "
+"all peers,\n"
"until the build success rate becomes too low."
msgstr ""
@@ -7982,8 +9665,8 @@ msgstr ""
#: i2p2www/pages/site/docs/how/peer-selection.html:232
msgid ""
-"To prevent some simple attacks, and for performance, there are the following"
-" restrictions:"
+"To prevent some simple attacks, and for performance, there are the "
+"following restrictions:"
msgstr ""
#: i2p2www/pages/site/docs/how/peer-selection.html:236
@@ -7992,8 +9675,8 @@ msgstr ""
#: i2p2www/pages/site/docs/how/peer-selection.html:239
msgid ""
-"A peer may participate in a maximum of 33% of all tunnels created by the"
-" router."
+"A peer may participate in a maximum of 33% of all tunnels created by "
+"the router."
msgstr ""
#: i2p2www/pages/site/docs/how/peer-selection.html:242
@@ -8014,18 +9697,18 @@ msgid ""
"Peers are ordered within tunnels to\n"
"to deal with the predecessor attack\n"
"(2008 update).\n"
-"More information is on the tunnel page."
+"More information is on the tunnel "
+"page."
msgstr ""
#: i2p2www/pages/site/docs/how/peer-selection.html:268
-msgid ""
-"Continue to analyze an tune speed and capacity calculations as necessary"
+msgid "Continue to analyze an tune speed and capacity calculations as necessary"
msgstr ""
#: i2p2www/pages/site/docs/how/peer-selection.html:271
msgid ""
-"Implement a more aggressive ejection strategy if necessary to control memory"
-" usage as the network grows"
+"Implement a more aggressive ejection strategy if necessary to control "
+"memory usage as the network grows"
msgstr ""
#: i2p2www/pages/site/docs/how/peer-selection.html:274
@@ -8040,8 +9723,10 @@ msgstr ""
#, python-format
msgid ""
"For those reading the paper\n"
-"Peer Profiling and Selection in the I2P Anonymous Network,\n"
-"please keep in mind the following minor changes in I2P since the paper's publication:"
+"Peer Profiling and Selection in the I2P Anonymous "
+"Network,\n"
+"please keep in mind the following minor changes in I2P since the paper's "
+"publication:"
msgstr ""
#: i2p2www/pages/site/docs/how/peer-selection.html:289
@@ -8115,18 +9800,24 @@ msgstr ""
#: i2p2www/pages/site/docs/how/tech-intro.html:25
msgid ""
"I2P is a scalable, self organizing, resilient packet switched anonymous \n"
-"network layer, upon which any number of different anonymity or security conscious \n"
-"applications can operate. Each of these applications may make their own anonymity, \n"
-"latency, and throughput tradeoffs without worrying about the proper implementation \n"
-"of a free route mixnet, allowing them to blend their activity with the larger \n"
+"network layer, upon which any number of different anonymity or security "
+"conscious \n"
+"applications can operate. Each of these applications may make their own "
+"anonymity, \n"
+"latency, and throughput tradeoffs without worrying about the proper "
+"implementation \n"
+"of a free route mixnet, allowing them to blend their activity with the "
+"larger \n"
"anonymity set of users already running on top of I2P."
msgstr ""
#: i2p2www/pages/site/docs/how/tech-intro.html:34
msgid ""
-"Applications available already provide the full range of typical Internet activities -\n"
+"Applications available already provide the full range of typical Internet"
+" activities -\n"
"anonymous web browsing, web hosting, chat, file sharing, e-mail,\n"
-"blogging and content syndication, newsgroups, as well as several other applications under development."
+"blogging and content syndication, newsgroups, as well as several other "
+"applications under development."
msgstr ""
#: i2p2www/pages/site/docs/how/tech-intro.html:40
@@ -8139,8 +9830,10 @@ msgstr ""
#: i2p2www/pages/site/docs/how/tech-intro.html:42
msgid ""
-"File sharing: I2PSnark, Robert, iMule, \n"
-"I2Phex, PyBit, I2P-bt\n"
+"File sharing: I2PSnark, Robert, iMule, \n"
+"I2Phex, PyBit, I2P-bt\n"
"and others."
msgstr ""
@@ -8152,14 +9845,14 @@ msgstr ""
#: i2p2www/pages/site/docs/how/tech-intro.html:48
msgid ""
-"Blog: using e.g. the pebble plugin or the distributed blogging software Syndie."
+"Blog: using e.g. the pebble plugin or the distributed blogging software "
+"Syndie."
msgstr ""
#: i2p2www/pages/site/docs/how/tech-intro.html:49
msgid ""
-"Distributed Data Store: Save your data redundantly in the Tahoe-LAFS cloud "
-"over I2P."
+"Distributed Data Store: Save your data redundantly in the Tahoe-LAFS "
+"cloud over I2P."
msgstr ""
#: i2p2www/pages/site/docs/how/tech-intro.html:50
@@ -8168,47 +9861,77 @@ msgstr ""
#: i2p2www/pages/site/docs/how/tech-intro.html:53
msgid ""
-"Unlike web sites hosted within content distribution networks like Freenet \n"
-"or GNUnet, the services hosted on \n"
-"I2P are fully interactive - there are traditional web-style search engines, \n"
-"bulletin boards, blogs you can comment on, database driven sites, and bridges \n"
-"to query static systems like Freenet without needing to install it locally."
+"Unlike web sites hosted within content distribution networks like Freenet \n"
+"or GNUnet, the services "
+"hosted on \n"
+"I2P are fully interactive - there are traditional web-style search "
+"engines, \n"
+"bulletin boards, blogs you can comment on, database driven sites, and "
+"bridges \n"
+"to query static systems like Freenet without needing to install it "
+"locally."
msgstr ""
#: i2p2www/pages/site/docs/how/tech-intro.html:61
msgid ""
"With all of these anonymity enabled applications, I2P takes on the role \n"
-"of the message oriented middleware - applications say that they want to send \n"
-"some data to a cryptographic identifier (a \"destination\") and I2P takes care \n"
-"of making sure it gets there securely and anonymously. I2P also bundles a \n"
-"simple streaming library to allow I2P's anonymous \n"
-"best-effort messages to transfer as reliable, in-order streams, transparently \n"
-"offering a TCP based congestion control algorithm tuned for the high bandwidth \n"
-"delay product of the network. While there have been several simple SOCKS proxies \n"
-"available to tie existing applications into the network, their value has been \n"
-"limited as nearly every application routinely exposes what, in an anonymous \n"
-"context, is sensitive information. The only safe way to go is to fully audit \n"
-"an application to ensure proper operation and to assist in that we provide \n"
-"a series of APIs in various languages which can be used to make the most out \n"
+"of the message oriented middleware - applications say that they want to "
+"send \n"
+"some data to a cryptographic identifier (a \"destination\") and I2P takes"
+" care \n"
+"of making sure it gets there securely and anonymously. I2P also bundles a"
+" \n"
+"simple streaming library to allow I2P's "
+"anonymous \n"
+"best-effort messages to transfer as reliable, in-order streams, "
+"transparently \n"
+"offering a TCP based congestion control algorithm tuned for the high "
+"bandwidth \n"
+"delay product of the network. While there have been several simple SOCKS "
+"proxies \n"
+"available to tie existing applications into the network, their value has "
+"been \n"
+"limited as nearly every application routinely exposes what, in an "
+"anonymous \n"
+"context, is sensitive information. The only safe way to go is to fully "
+"audit \n"
+"an application to ensure proper operation and to assist in that we "
+"provide \n"
+"a series of APIs in various languages which can be used to make the most "
+"out \n"
"of the network."
msgstr ""
#: i2p2www/pages/site/docs/how/tech-intro.html:78
#, python-format
msgid ""
-"I2P is not a research project - academic, commercial, or governmental, but \n"
-"is instead an engineering effort aimed at doing whatever is necessary to provide \n"
-"a sufficient level of anonymity to those who need it. It has been in active \n"
-"development since early 2003 with one full time developer and a dedicated \n"
-"group of part time contributors from all over the world. All of the work done \n"
-"on I2P is open source and freely available on the website, \n"
-"with the majority of the code released outright into the public domain, though \n"
-"making use of a few cryptographic routines under BSD-style licenses. The people \n"
-"working on I2P do not control what people release client applications under, \n"
-"and there are several GPL'ed applications available (I2PTunnel, \n"
-"susimail, I2PSnark, I2P-Bote, \n"
+"I2P is not a research project - academic, commercial, or governmental, "
+"but \n"
+"is instead an engineering effort aimed at doing whatever is necessary to "
+"provide \n"
+"a sufficient level of anonymity to those who need it. It has been in "
+"active \n"
+"development since early 2003 with one full time developer and a dedicated"
+" \n"
+"group of part time contributors from all over the world. All of the work "
+"done \n"
+"on I2P is open source and freely available on the website, \n"
+"with the majority of the code released outright into the public domain, "
+"though \n"
+"making use of a few cryptographic routines under BSD-style licenses. The "
+"people \n"
+"working on I2P do not control what people release client applications "
+"under, \n"
+"and there are several GPL'ed applications available (I2PTunnel, \n"
+"susimail, I2PSnark, I2P-"
+"Bote, \n"
"I2Phex and others.).\n"
-"Funding for I2P comes entirely from donations,\n"
+"Funding for I2P comes entirely from "
+"donations,\n"
"and does not receive any tax breaks in any jurisdiction at this time,\n"
"as many of the developers are themselves anonymous."
msgstr ""
@@ -8219,27 +9942,40 @@ msgstr ""
#: i2p2www/pages/site/docs/how/tech-intro.html:98
msgid ""
-"To understand I2P's operation, it is essential to understand a few key concepts. \n"
-"First, I2P makes a strict separation between the software participating in \n"
-"the network (a \"router\") and the anonymous endpoints (\"destinations\") associated \n"
-"with individual applications. The fact that someone is running I2P is not \n"
-"usually a secret. What is hidden is information on what the user is doing, \n"
-"if anything at all, as well as what router a particular destination is connected \n"
-"to. End users will typically have several local destinations on their router \n"
-"- for instance, one proxying in to IRC servers, another supporting the user's \n"
-"anonymous webserver (\"eepsite\"), another for an I2Phex instance, another for \n"
+"To understand I2P's operation, it is essential to understand a few key "
+"concepts. \n"
+"First, I2P makes a strict separation between the software participating "
+"in \n"
+"the network (a \"router\") and the anonymous endpoints (\"destinations\")"
+" associated \n"
+"with individual applications. The fact that someone is running I2P is not"
+" \n"
+"usually a secret. What is hidden is information on what the user is "
+"doing, \n"
+"if anything at all, as well as what router a particular destination is "
+"connected \n"
+"to. End users will typically have several local destinations on their "
+"router \n"
+"- for instance, one proxying in to IRC servers, another supporting the "
+"user's \n"
+"anonymous webserver (\"eepsite\"), another for an I2Phex instance, "
+"another for \n"
"torrents, etc."
msgstr ""
#: i2p2www/pages/site/docs/how/tech-intro.html:111
msgid ""
"Another critical concept to understand is the \"tunnel\".\n"
-"A tunnel is a directed path through an explicitly selected list of routers.\n"
-"Layered encryption is used, so each of the routers can only decrypt a single layer.\n"
+"A tunnel is a directed path through an explicitly selected list of "
+"routers.\n"
+"Layered encryption is used, so each of the routers can only decrypt a "
+"single layer.\n"
"The decrypted information contains the IP of the next router, along with\n"
"the encrypted information to be forwarded.\n"
-"Each tunnel has a starting point (the first router, also known as \"gateway\")\n"
-"and an end point. Messages can be sent only in one way. To send messages back,\n"
+"Each tunnel has a starting point (the first router, also known as "
+"\"gateway\")\n"
+"and an end point. Messages can be sent only in one way. To send messages "
+"back,\n"
"another tunnel is required."
msgstr ""
@@ -8259,12 +9995,15 @@ msgid ""
"while \"inbound\" tunnels bring messages to the tunnel creator.\n"
"Combining these two tunnels allows users to send messages to each other.\n"
"The sender (\"Alice\" in the above image) sets up an outbound tunnel,\n"
-"while the receiver (\"Bob\" in the above image) creates an inbound tunnel.\n"
-"The gateway of an inbound tunnel can receive messages from any other user\n"
+"while the receiver (\"Bob\" in the above image) creates an inbound "
+"tunnel.\n"
+"The gateway of an inbound tunnel can receive messages from any other user"
+"\n"
"and will send them on until the endpoint (\"Bob\").\n"
"The endpoint of the outbound tunnel will need to send the message\n"
"on to the gateway of the inbound tunnel.\n"
-"To do this, the sender (\"Alice\") adds instructions to her encrypted message.\n"
+"To do this, the sender (\"Alice\") adds instructions to her encrypted "
+"message.\n"
"Once the endpoint of the outbound tunnel decrypts the message,\n"
"it will have instructions to forward the message to the correct\n"
"inbound gateway (the gateway to \"Bob\")."
@@ -8272,19 +10011,25 @@ msgstr ""
#: i2p2www/pages/site/docs/how/tech-intro.html:144
msgid ""
-"A third critical concept to understand is I2P's \"network database\" (or \"netDb\") \n"
-"- a pair of algorithms used to share network metadata. The two types of metadata \n"
-"carried are \"routerInfo\" and \"leaseSets\" - the routerInfo gives routers the \n"
-"data necessary for contacting a particular router (their public keys, transport \n"
-"addresses, etc), while the leaseSet gives routers the information necessary \n"
-"for contacting a particular destination. A leaseSet contains a number of \"leases\".\n"
-"Each of this leases specifies a tunnel gateway, which allows reaching a specific destination.\n"
+"A third critical concept to understand is I2P's \"network "
+"database\" (or \"netDb\") \n"
+"- a pair of algorithms used to share network metadata. The two types of "
+"metadata \n"
+"carried are \"routerInfo\" and \"leaseSets\" - the "
+"routerInfo gives routers the \n"
+"data necessary for contacting a particular router (their public keys, "
+"transport \n"
+"addresses, etc), while the leaseSet gives routers the information "
+"necessary \n"
+"for contacting a particular destination. A leaseSet contains a number of "
+"\"leases\".\n"
+"Each of this leases specifies a tunnel gateway, which allows reaching a "
+"specific destination.\n"
"The full information contained in a lease:"
msgstr ""
#: i2p2www/pages/site/docs/how/tech-intro.html:155
-msgid ""
-"Inbound gateway for a tunnel that allows reaching a specific destination."
+msgid "Inbound gateway for a tunnel that allows reaching a specific destination."
msgstr ""
#: i2p2www/pages/site/docs/how/tech-intro.html:156
@@ -8299,8 +10044,10 @@ msgstr ""
#: i2p2www/pages/site/docs/how/tech-intro.html:159
msgid ""
-"Routers themselves send their routerInfo to the netDb directly, while leaseSets are sent through outbound tunnels\n"
-"(leaseSets need to be sent anonymously, to avoid correlating a router with his leaseSets)."
+"Routers themselves send their routerInfo to the netDb directly, while "
+"leaseSets are sent through outbound tunnels\n"
+"(leaseSets need to be sent anonymously, to avoid correlating a router "
+"with his leaseSets)."
msgstr ""
#: i2p2www/pages/site/docs/how/tech-intro.html:164
@@ -8311,10 +10058,13 @@ msgstr ""
#: i2p2www/pages/site/docs/how/tech-intro.html:168
msgid ""
-"To build up her own inbound and outbound tunnels, Alice does a lookup in the netDb to collect routerInfo.\n"
+"To build up her own inbound and outbound tunnels, Alice does a lookup in "
+"the netDb to collect routerInfo.\n"
"This way, she gathers lists of peers she can use as hops in her tunnels.\n"
-"She can then send a build message to the first hop, requesting the construction of a tunnel and asking\n"
-"that router to send the construction message onward, until the tunnel has been constructed."
+"She can then send a build message to the first hop, requesting the "
+"construction of a tunnel and asking\n"
+"that router to send the construction message onward, until the tunnel has"
+" been constructed."
msgstr ""
#: i2p2www/pages/site/docs/how/tech-intro.html:175
@@ -8331,19 +10081,30 @@ msgstr ""
#: i2p2www/pages/site/docs/how/tech-intro.html:182
msgid ""
-"When Alice wants to send a message to Bob, she first does a lookup in the \n"
-"netDb to find Bob's leaseSet, giving her his current inbound tunnel gateways. \n"
-"She then picks one of her outbound tunnels and sends the message down it with \n"
-"instructions for the outbound tunnel's endpoint to forward the message on \n"
-"to one of Bob's inbound tunnel gateways. When the outbound tunnel endpoint \n"
-"receives those instructions, it forwards the message as requested, and when \n"
-"Bob's inbound tunnel gateway receives it, it is forwarded down the tunnel \n"
-"to Bob's router. If Alice wants Bob to be able to reply to the message, she \n"
-"needs to transmit her own destination explicitly as part of the message itself.\n"
-"This can be done by introducing a higher-level layer, which is done in the\n"
+"When Alice wants to send a message to Bob, she first does a lookup in the"
+" \n"
+"netDb to find Bob's leaseSet, giving her his current inbound tunnel "
+"gateways. \n"
+"She then picks one of her outbound tunnels and sends the message down it "
+"with \n"
+"instructions for the outbound tunnel's endpoint to forward the message on"
+" \n"
+"to one of Bob's inbound tunnel gateways. When the outbound tunnel "
+"endpoint \n"
+"receives those instructions, it forwards the message as requested, and "
+"when \n"
+"Bob's inbound tunnel gateway receives it, it is forwarded down the tunnel"
+" \n"
+"to Bob's router. If Alice wants Bob to be able to reply to the message, "
+"she \n"
+"needs to transmit her own destination explicitly as part of the message "
+"itself.\n"
+"This can be done by introducing a higher-level layer, which is done in "
+"the\n"
"streaming library.\n"
"Alice may also cut down on the response time by bundling her most \n"
-"recent LeaseSet with the message so that Bob doesn't need to do a netDb lookup \n"
+"recent LeaseSet with the message so that Bob doesn't need to do a netDb "
+"lookup \n"
"for it when he wants to reply, but this is optional."
msgstr ""
@@ -8361,126 +10122,210 @@ msgstr ""
#: i2p2www/pages/site/docs/how/tech-intro.html:204
msgid ""
-"While the tunnels themselves have layered encryption to prevent unauthorized \n"
-"disclosure to peers inside the network (as the transport layer itself does \n"
-"to prevent unauthorized disclosure to peers outside the network), it is necessary \n"
-"to add an additional end to end layer of encryption to hide the message from \n"
-"the outbound tunnel endpoint and the inbound tunnel gateway. This \"garlic \n"
-"encryption\" lets Alice's router wrap up multiple messages into a single \n"
-"\"garlic message\", encrypted to a particular public key so that intermediary \n"
-"peers cannot determine either how many messages are within the garlic, what \n"
-"those messages say, or where those individual cloves are destined. For typical \n"
-"end to end communication between Alice and Bob, the garlic will be encrypted \n"
-"to the public key published in Bob's leaseSet, allowing the message to be \n"
+"While the tunnels themselves have layered encryption to prevent "
+"unauthorized \n"
+"disclosure to peers inside the network (as the transport layer itself "
+"does \n"
+"to prevent unauthorized disclosure to peers outside the network), it is "
+"necessary \n"
+"to add an additional end to end layer of encryption to hide the message "
+"from \n"
+"the outbound tunnel endpoint and the inbound tunnel gateway. This \"garlic \n"
+"encryption\" lets Alice's router wrap up multiple messages into a "
+"single \n"
+"\"garlic message\", encrypted to a particular public key so that "
+"intermediary \n"
+"peers cannot determine either how many messages are within the garlic, "
+"what \n"
+"those messages say, or where those individual cloves are destined. For "
+"typical \n"
+"end to end communication between Alice and Bob, the garlic will be "
+"encrypted \n"
+"to the public key published in Bob's leaseSet, allowing the message to be"
+" \n"
"encrypted without giving out the public key to Bob's own router."
msgstr ""
#: i2p2www/pages/site/docs/how/tech-intro.html:219
msgid ""
-"Another important fact to keep in mind is that I2P is entirely message based \n"
-"and that some messages may be lost along the way. Applications using I2P can \n"
-"use the message oriented interfaces and take care of their own congestion \n"
-"control and reliability needs, but most would be best served by reusing the \n"
-"provided streaming library to view I2P as a streams \n"
+"Another important fact to keep in mind is that I2P is entirely message "
+"based \n"
+"and that some messages may be lost along the way. Applications using I2P "
+"can \n"
+"use the message oriented interfaces and take care of their own congestion"
+" \n"
+"control and reliability needs, but most would be best served by reusing "
+"the \n"
+"provided streaming library to view I2P as "
+"a streams \n"
"based network."
msgstr ""
#: i2p2www/pages/site/docs/how/tech-intro.html:229
msgid ""
"Both inbound and outbound tunnels work along similar principles.\n"
-"The tunnel gateway accumulates a number of tunnel messages, eventually preprocessing \n"
-"them into something for tunnel delivery. Next, the gateway encrypts that preprocessed \n"
-"data and forwards it to the first hop. That peer and subsequent tunnel participants \n"
-"add on a layer of encryption after verifying that it isn't a duplicate before \n"
-"forward it on to the next peer. Eventually, the message arrives at the endpoint \n"
-"where the messages are split out again and forwarded on as requested. The \n"
-"difference arises in what the tunnel's creator does - for inbound tunnels, \n"
-"the creator is the endpoint and they simply decrypt all of the layers added, \n"
-"while for outbound tunnels, the creator is the gateway and they pre-decrypt \n"
-"all of the layers so that after all of the layers of per-hop encryption are \n"
+"The tunnel gateway accumulates a number of tunnel messages, eventually "
+"preprocessing \n"
+"them into something for tunnel delivery. Next, the gateway encrypts that "
+"preprocessed \n"
+"data and forwards it to the first hop. That peer and subsequent tunnel "
+"participants \n"
+"add on a layer of encryption after verifying that it isn't a duplicate "
+"before \n"
+"forward it on to the next peer. Eventually, the message arrives at the "
+"endpoint \n"
+"where the messages are split out again and forwarded on as requested. The"
+" \n"
+"difference arises in what the tunnel's creator does - for inbound "
+"tunnels, \n"
+"the creator is the endpoint and they simply decrypt all of the layers "
+"added, \n"
+"while for outbound tunnels, the creator is the gateway and they pre-"
+"decrypt \n"
+"all of the layers so that after all of the layers of per-hop encryption "
+"are \n"
"added, the message arrives in the clear at the tunnel endpoint."
msgstr ""
#: i2p2www/pages/site/docs/how/tech-intro.html:244
msgid ""
-"The choice of specific peers to pass on messages as well as their particular \n"
-"ordering is important to understanding both I2P's anonymity and performance \n"
-"characteristics. While the network database (below) has its own criteria for \n"
-"picking what peers to query and store entries on, tunnel creators may use any peers \n"
-"in the network in any order (and even any number of times) in a single tunnel. \n"
-"If perfect latency and capacity data were globally known, selection and ordering \n"
-"would be driven by the particular needs of the client in tandem with their \n"
-"threat model. Unfortunately, latency and capacity data is not trivial to gather \n"
-"anonymously, and depending upon untrusted peers to provide this information \n"
+"The choice of specific peers to pass on messages as well as their "
+"particular \n"
+"ordering is important to understanding both I2P's anonymity and "
+"performance \n"
+"characteristics. While the network database (below) has its own criteria "
+"for \n"
+"picking what peers to query and store entries on, tunnel creators may use"
+" any peers \n"
+"in the network in any order (and even any number of times) in a single "
+"tunnel. \n"
+"If perfect latency and capacity data were globally known, selection and "
+"ordering \n"
+"would be driven by the particular needs of the client in tandem with "
+"their \n"
+"threat model. Unfortunately, latency and capacity data is not trivial to "
+"gather \n"
+"anonymously, and depending upon untrusted peers to provide this "
+"information \n"
"has its own serious anonymity implications."
msgstr ""
#: i2p2www/pages/site/docs/how/tech-intro.html:257
msgid ""
-"From an anonymity perspective, the simplest technique would be to pick peers \n"
-"randomly from the entire network, order them randomly and use those peers \n"
-"in that order for all eternity. From a performance perspective, the simplest \n"
-"technique would be to pick the fastest peers with the necessary spare capacity, \n"
-"spreading the load across different peers to handle transparent failover, \n"
-"and to rebuild the tunnel whenever capacity information changes. While the \n"
-"former is both brittle and inefficient, the later requires inaccessible information \n"
-"and offers insufficient anonymity. I2P is instead working on offering a range \n"
-"of peer selection strategies, coupled with anonymity aware measurement code \n"
+"From an anonymity perspective, the simplest technique would be to pick "
+"peers \n"
+"randomly from the entire network, order them randomly and use those peers"
+" \n"
+"in that order for all eternity. From a performance perspective, the "
+"simplest \n"
+"technique would be to pick the fastest peers with the necessary spare "
+"capacity, \n"
+"spreading the load across different peers to handle transparent failover,"
+" \n"
+"and to rebuild the tunnel whenever capacity information changes. While "
+"the \n"
+"former is both brittle and inefficient, the later requires inaccessible "
+"information \n"
+"and offers insufficient anonymity. I2P is instead working on offering a "
+"range \n"
+"of peer selection strategies, coupled with anonymity aware measurement "
+"code \n"
"to organize the peers by their profiles."
msgstr ""
#: i2p2www/pages/site/docs/how/tech-intro.html:270
msgid ""
-"As a base, I2P is constantly profiling the peers with which it interacts \n"
-"with by measuring their indirect behavior - for instance, when a peer responds \n"
-"to a netDb lookup in 1.3 seconds, that round trip latency is recorded in the \n"
-"profiles for all of the routers involved in the two tunnels (inbound and outbound) \n"
-"through which the request and response passed, as well as the queried peer's \n"
-"profile. Direct measurement, such as transport layer latency or congestion, \n"
-"is not used as part of the profile, as it can be manipulated and associated \n"
-"with the measuring router, exposing them to trivial attacks. While gathering \n"
-"these profiles, a series of calculations are run on each to summarize its \n"
-"performance - its latency, capacity to handle lots of activity, whether they \n"
-"are currently overloaded, and how well integrated into the network they seem \n"
-"to be. These calculations are then compared for active peers to organize the \n"
-"routers into four tiers - fast and high capacity, high capacity, not failing, \n"
-"and failing. The thresholds for those tiers are determined dynamically, and \n"
+"As a base, I2P is constantly profiling the peers with which it interacts"
+" \n"
+"with by measuring their indirect behavior - for instance, when a peer "
+"responds \n"
+"to a netDb lookup in 1.3 seconds, that round trip latency is recorded in "
+"the \n"
+"profiles for all of the routers involved in the two tunnels (inbound and "
+"outbound) \n"
+"through which the request and response passed, as well as the queried "
+"peer's \n"
+"profile. Direct measurement, such as transport layer latency or "
+"congestion, \n"
+"is not used as part of the profile, as it can be manipulated and "
+"associated \n"
+"with the measuring router, exposing them to trivial attacks. While "
+"gathering \n"
+"these profiles, a series of calculations are run on each to summarize its"
+" \n"
+"performance - its latency, capacity to handle lots of activity, whether "
+"they \n"
+"are currently overloaded, and how well integrated into the network they "
+"seem \n"
+"to be. These calculations are then compared for active peers to organize "
+"the \n"
+"routers into four tiers - fast and high capacity, high capacity, not "
+"failing, \n"
+"and failing. The thresholds for those tiers are determined dynamically, "
+"and \n"
"while they currently use fairly simple algorithms, alternatives exist."
msgstr ""
#: i2p2www/pages/site/docs/how/tech-intro.html:288
msgid ""
-"Using this profile data, the simplest reasonable peer selection strategy \n"
-"is to pick peers randomly from the top tier (fast and high capacity), and \n"
-"this is currently deployed for client tunnels. Exploratory tunnels (used for \n"
-"netDb and tunnel management) pick peers randomly from the \"not failing\" tier \n"
-"(which includes routers in 'better' tiers as well), allowing the peer to sample \n"
-"routers more widely, in effect optimizing the peer selection through randomized \n"
-"hill climbing. These strategies alone do however leak information regarding \n"
-"the peers in the router's top tier through predecessor and netDb harvesting \n"
-"attacks. In turn, several alternatives exist which, while not balancing the \n"
-"load as evenly, will address the attacks mounted by particular classes of \n"
+"Using this profile data, the simplest reasonable peer selection strategy"
+" \n"
+"is to pick peers randomly from the top tier (fast and high capacity), and"
+" \n"
+"this is currently deployed for client tunnels. Exploratory tunnels (used "
+"for \n"
+"netDb and tunnel management) pick peers randomly from the \"not failing\""
+" tier \n"
+"(which includes routers in 'better' tiers as well), allowing the peer to "
+"sample \n"
+"routers more widely, in effect optimizing the peer selection through "
+"randomized \n"
+"hill climbing. These strategies alone do however leak information "
+"regarding \n"
+"the peers in the router's top tier through predecessor and netDb "
+"harvesting \n"
+"attacks. In turn, several alternatives exist which, while not balancing "
+"the \n"
+"load as evenly, will address the attacks mounted by particular classes of"
+" \n"
"adversaries."
msgstr ""
#: i2p2www/pages/site/docs/how/tech-intro.html:302
msgid ""
-"By picking a random key and ordering the peers according to their XOR distance \n"
-"from it, the information leaked is reduced in predecessor and harvesting attacks \n"
-"according to the peers' failure rate and the tier's churn. Another simple \n"
-"strategy for dealing with netDb harvesting attacks is to simply fix the inbound \n"
-"tunnel gateway(s) yet randomize the peers further on in the tunnels. To deal \n"
-"with predecessor attacks for adversaries which the client contacts, the outbound \n"
-"tunnel endpoints would also remain fixed. The selection of which peer to fix \n"
-"on the most exposed point would of course need to have a limit to the duration, \n"
-"as all peers fail eventually, so it could either be reactively adjusted or \n"
-"proactively avoided to mimic a measured mean time between failures of other \n"
-"routers. These two strategies can in turn be combined, using a fixed exposed \n"
-"peer and an XOR based ordering within the tunnels themselves. A more rigid \n"
-"strategy would fix the exact peers and ordering of a potential tunnel, only \n"
-"using individual peers if all of them agree to participate in the same way \n"
-"each time. This varies from the XOR based ordering in that the predecessor \n"
-"and successor of each peer is always the same, while the XOR only makes sure \n"
+"By picking a random key and ordering the peers according to their XOR "
+"distance \n"
+"from it, the information leaked is reduced in predecessor and harvesting "
+"attacks \n"
+"according to the peers' failure rate and the tier's churn. Another simple"
+" \n"
+"strategy for dealing with netDb harvesting attacks is to simply fix the "
+"inbound \n"
+"tunnel gateway(s) yet randomize the peers further on in the tunnels. To "
+"deal \n"
+"with predecessor attacks for adversaries which the client contacts, the "
+"outbound \n"
+"tunnel endpoints would also remain fixed. The selection of which peer to "
+"fix \n"
+"on the most exposed point would of course need to have a limit to the "
+"duration, \n"
+"as all peers fail eventually, so it could either be reactively adjusted "
+"or \n"
+"proactively avoided to mimic a measured mean time between failures of "
+"other \n"
+"routers. These two strategies can in turn be combined, using a fixed "
+"exposed \n"
+"peer and an XOR based ordering within the tunnels themselves. A more "
+"rigid \n"
+"strategy would fix the exact peers and ordering of a potential tunnel, "
+"only \n"
+"using individual peers if all of them agree to participate in the same "
+"way \n"
+"each time. This varies from the XOR based ordering in that the "
+"predecessor \n"
+"and successor of each peer is always the same, while the XOR only makes "
+"sure \n"
"their order doesn't change."
msgstr ""
@@ -8489,8 +10334,10 @@ msgstr ""
msgid ""
"As mentioned before, I2P currently (release 0.8) includes the tiered \n"
"random strategy above, with XOR-based ordering. A \n"
-"more detailed discussion of the mechanics involved in tunnel operation, management, \n"
-"and peer selection can be found in the tunnel spec."
+"more detailed discussion of the mechanics involved in tunnel operation, "
+"management, \n"
+"and peer selection can be found in the tunnel "
+"spec."
msgstr ""
#: i2p2www/pages/site/docs/how/tech-intro.html:330
@@ -8504,20 +10351,27 @@ msgstr ""
#: i2p2www/pages/site/docs/how/tech-intro.html:336
msgid ""
"A percentage of I2P users are appointed as 'floodfill peers'.\n"
-"Currently, I2P installations that have a lot of bandwidth and are fast enough,\n"
-"will appoint themselves as floodfill as soon as the number of existing floodfill routers\n"
+"Currently, I2P installations that have a lot of bandwidth and are fast "
+"enough,\n"
+"will appoint themselves as floodfill as soon as the number of existing "
+"floodfill routers\n"
"drops too low."
msgstr ""
#: i2p2www/pages/site/docs/how/tech-intro.html:343
#, python-format
msgid ""
-"Other I2P routers will store their data and lookup data by sending simple 'store' and 'lookup' queries to the floodfills.\n"
-"If a floodfill router receives a 'store' query, it will spread the information to other floodfill routers\n"
-"using the Kademlia algorithm.\n"
-"The 'lookup' queries currently function differently, to avoid an important\n"
+"Other I2P routers will store their data and lookup data by sending simple"
+" 'store' and 'lookup' queries to the floodfills.\n"
+"If a floodfill router receives a 'store' query, it will spread the "
+"information to other floodfill routers\n"
+"using the Kademlia "
+"algorithm.\n"
+"The 'lookup' queries currently function differently, to avoid an "
+"important\n"
"security issue.\n"
-"When a lookup is done, the floodfill router will not forward the lookup to other peers,\n"
+"When a lookup is done, the floodfill router will not forward the lookup "
+"to other peers,\n"
"but will always answer by itself (if it has the requested data)."
msgstr ""
@@ -8527,8 +10381,8 @@ msgstr ""
#: i2p2www/pages/site/docs/how/tech-intro.html:357
msgid ""
-"A RouterInfo stores information on a specific I2P router and how to "
-"contact it"
+"A RouterInfo stores information on a specific I2P router and how "
+"to contact it"
msgstr ""
#: i2p2www/pages/site/docs/how/tech-intro.html:358
@@ -8539,10 +10393,14 @@ msgstr ""
#: i2p2www/pages/site/docs/how/tech-intro.html:360
msgid ""
-"All of this information is signed by the publishing party and verified by any I2P router using or storing the information.\n"
-"In addition, the data contains timing information, to avoid storage of old entries and possible attacks.\n"
-"This is also why I2P bundles the necessary code for maintaining the correct time, occasionally querying some SNTP servers \n"
-"(the pool.ntp.org round robin by default)\n"
+"All of this information is signed by the publishing party and verified by"
+" any I2P router using or storing the information.\n"
+"In addition, the data contains timing information, to avoid storage of "
+"old entries and possible attacks.\n"
+"This is also why I2P bundles the necessary code for maintaining the "
+"correct time, occasionally querying some SNTP servers \n"
+"(the pool.ntp.org round robin by"
+" default)\n"
"and detecting skew between routers at the transport layer."
msgstr ""
@@ -8557,8 +10415,10 @@ msgstr ""
#: i2p2www/pages/site/docs/how/tech-intro.html:374
msgid ""
"One could only want specific people to be able to reach a destination.\n"
-"This is possible by not publishing the destination in the netDb. You will however have to transmit the destination by other means.\n"
-"An alternative are the 'encrypted leaseSets'. These leaseSets can only be decoded by people with access to the decryption key."
+"This is possible by not publishing the destination in the netDb. You will"
+" however have to transmit the destination by other means.\n"
+"An alternative are the 'encrypted leaseSets'. These leaseSets can only be"
+" decoded by people with access to the decryption key."
msgstr ""
#: i2p2www/pages/site/docs/how/tech-intro.html:381
@@ -8567,10 +10427,13 @@ msgstr "Начальная загрузка:"
#: i2p2www/pages/site/docs/how/tech-intro.html:382
msgid ""
-"Bootstrapping the netDb is quite simple. Once a router manages to receive a single routerInfo of a reachable peer,\n"
+"Bootstrapping the netDb is quite simple. Once a router manages to receive"
+" a single routerInfo of a reachable peer,\n"
"it can query that router for references to other routers in the network.\n"
-"Currently, a number of users post their routerInfo files to a website to make this information available.\n"
-"I2P automatically connects to one of these websites to gather routerInfo files and bootstrap."
+"Currently, a number of users post their routerInfo files to a website to "
+"make this information available.\n"
+"I2P automatically connects to one of these websites to gather routerInfo "
+"files and bootstrap."
msgstr ""
#: i2p2www/pages/site/docs/how/tech-intro.html:390
@@ -8580,18 +10443,26 @@ msgstr ""
#: i2p2www/pages/site/docs/how/tech-intro.html:391
msgid ""
"Lookups in the I2P network are not forwarded to other netDb routers.\n"
-"Currently, this is not a major problem, since the network is not very large.\n"
-"However, as the network grows, not all routerInfo and leaseSet files will be present\n"
-"on each netDb router. This will cause a deterioration of the percentage of successful lookups.\n"
-"Because of this, refinements to the netDb will be done in the next releases."
+"Currently, this is not a major problem, since the network is not very "
+"large.\n"
+"However, as the network grows, not all routerInfo and leaseSet files will"
+" be present\n"
+"on each netDb router. This will cause a deterioration of the percentage "
+"of successful lookups.\n"
+"Because of this, refinements to the netDb will be done in the next "
+"releases."
msgstr ""
#: i2p2www/pages/site/docs/how/tech-intro.html:402
msgid ""
-"Communication between routers needs to provide confidentiality and integrity \n"
-"against external adversaries while authenticating that the router contacted \n"
-"is the one who should receive a given message. The particulars of how routers \n"
-"communicate with other routers aren't critical - three separate protocols \n"
+"Communication between routers needs to provide confidentiality and "
+"integrity \n"
+"against external adversaries while authenticating that the router "
+"contacted \n"
+"is the one who should receive a given message. The particulars of how "
+"routers \n"
+"communicate with other routers aren't critical - three separate protocols"
+" \n"
"have been used at different points to provide those bare necessities."
msgstr ""
@@ -8599,9 +10470,12 @@ msgstr ""
#, python-format
msgid ""
"I2P started with a TCP-based protocol which \n"
-"has since been disabled. Then, to accommodate the need for high degree communication \n"
-"(as a number of routers will end up speaking with many others), I2P moved \n"
-"from a TCP based transport to a UDP-based one - \"Secure \n"
+"has since been disabled. Then, to accommodate the need for high degree "
+"communication \n"
+"(as a number of routers will end up speaking with many others), I2P moved"
+" \n"
+"from a TCP based transport to a UDP-based one - "
+"\"Secure \n"
"Semireliable UDP\", or \"SSU\"."
msgstr ""
@@ -8613,32 +10487,46 @@ msgstr ""
#: i2p2www/pages/site/docs/how/tech-intro.html:422
msgid ""
"The goal of this protocol is to provide secure, authenticated, \n"
-"semireliable and unordered message delivery, exposing only a minimal amount \n"
-"of data easily discernible to third parties. It should support high degree \n"
-"communication as well as TCP-friendly congestion control and may include \n"
-"PMTU detection. It should be capable of efficiently moving bulk data at rates \n"
-"sufficient for home users. In addition, it should support techniques for addressing \n"
+"semireliable and unordered message delivery, exposing only a minimal "
+"amount \n"
+"of data easily discernible to third parties. It should support high "
+"degree \n"
+"communication as well as TCP-friendly congestion control and may include"
+" \n"
+"PMTU detection. It should be capable of efficiently moving bulk data at "
+"rates \n"
+"sufficient for home users. In addition, it should support techniques for "
+"addressing \n"
"network obstacles, like most NATs or firewalls."
msgstr ""
#: i2p2www/pages/site/docs/how/tech-intro.html:432
#, python-format
msgid ""
-"Following the introduction of SSU, after issues with congestion collapse \n"
-"appeared, a new NIO-based TCP transport called NTCP \n"
-"was implemented. It is enabled by default for outbound connections only. Those \n"
-"who configure their NAT/firewall to allow inbound connections and specify \n"
-"the external host and port (dyndns/etc is ok) on /config.jsp can receive inbound \n"
-"connections. As NTCP is NIO based, so it doesn't suffer from the 1 thread \n"
+"Following the introduction of SSU, after issues with congestion collapse"
+" \n"
+"appeared, a new NIO-based TCP transport called NTCP \n"
+"was implemented. It is enabled by default for outbound connections only. "
+"Those \n"
+"who configure their NAT/firewall to allow inbound connections and specify"
+" \n"
+"the external host and port (dyndns/etc is ok) on /config.jsp can receive "
+"inbound \n"
+"connections. As NTCP is NIO based, so it doesn't suffer from the 1 thread"
+" \n"
"per connection issues of the old TCP transport."
msgstr ""
#: i2p2www/pages/site/docs/how/tech-intro.html:442
msgid ""
"I2P supports multiple transports simultaneously. A particular transport \n"
-"for an outbound connection is selected with \"bids\". Each transport bids for \n"
-"the connection and the relative value of these bids assigns the priority. \n"
-"Transports may reply with different bids, depending on whether there is already \n"
+"for an outbound connection is selected with \"bids\". Each transport bids"
+" for \n"
+"the connection and the relative value of these bids assigns the priority."
+" \n"
+"Transports may reply with different bids, depending on whether there is "
+"already \n"
"an established connection to the peer."
msgstr ""
@@ -8646,25 +10534,38 @@ msgstr ""
#, python-format
msgid ""
"The current implementation ranks NTCP as the highest-priority transport \n"
-"for outbound connections in most situations. SSU is enabled for both outbound \n"
-"and inbound connections. Your firewall and your I2P router must be configured \n"
-"to allow inbound NTCP connections. For further information see the NTCP \n"
+"for outbound connections in most situations. SSU is enabled for both "
+"outbound \n"
+"and inbound connections. Your firewall and your I2P router must be "
+"configured \n"
+"to allow inbound NTCP connections. For further information see the NTCP \n"
"page."
msgstr ""
#: i2p2www/pages/site/docs/how/tech-intro.html:459
msgid ""
"A bare minimum set of cryptographic primitives are combined together to \n"
-"provide I2P's layered defenses against a variety of adversaries. At the lowest \n"
-"level, inter router communication is protected by the transport layer security \n"
-"- SSU encrypts each packet with AES256/CBC with both an explicit IV and MAC \n"
-"(HMAC-MD5-128) after agreeing upon an ephemeral session key through a 2048bit \n"
-"Diffie-Hellman exchange, station-to-station authentication with the other \n"
-"router's DSA key, plus each network message has their own hash for local integrity \n"
-"checking. Tunnel messages passed over the transports \n"
-"have their own layered AES256/CBC encryption with an explicit IV and verified \n"
-"at the tunnel endpoint with an additional SHA256 hash. Various other messages \n"
-"are passed along inside \"garlic messages\", which are encrypted with ElGamal/AES+SessionTags \n"
+"provide I2P's layered defenses against a variety of adversaries. At the "
+"lowest \n"
+"level, inter router communication is protected by the transport layer "
+"security \n"
+"- SSU encrypts each packet with AES256/CBC with both an explicit IV and "
+"MAC \n"
+"(HMAC-MD5-128) after agreeing upon an ephemeral session key through a "
+"2048bit \n"
+"Diffie-Hellman exchange, station-to-station authentication with the other"
+" \n"
+"router's DSA key, plus each network message has their own hash for local "
+"integrity \n"
+"checking. Tunnel messages passed over the "
+"transports \n"
+"have their own layered AES256/CBC encryption with an explicit IV and "
+"verified \n"
+"at the tunnel endpoint with an additional SHA256 hash. Various other "
+"messages \n"
+"are passed along inside \"garlic messages\", which are encrypted with "
+"ElGamal/AES+SessionTags \n"
"(explained below)."
msgstr ""
@@ -8674,31 +10575,51 @@ msgstr ""
#: i2p2www/pages/site/docs/how/tech-intro.html:475
msgid ""
-"Garlic messages are an extension of \"onion\" layered encryption, allowing \n"
-"the contents of a single message to contain multiple \"cloves\" - fully formed \n"
-"messages alongside their own instructions for delivery. Messages are wrapped \n"
-"into a garlic message whenever the message would otherwise be passing in cleartext \n"
-"through a peer who should not have access to the information - for instance, \n"
-"when a router wants to ask another router to participate in a tunnel, they \n"
-"wrap the request inside a garlic, encrypt that garlic to the receiving router's \n"
-"2048bit ElGamal public key, and forward it through a tunnel. Another example \n"
-"is when a client wants to send a message to a destination - the sender's router \n"
-"will wrap up that data message (alongside some other messages) into a garlic, \n"
-"encrypt that garlic to the 2048bit ElGamal public key published in the recipient's \n"
+"Garlic messages are an extension of \"onion\" layered encryption, "
+"allowing \n"
+"the contents of a single message to contain multiple \"cloves\" - fully "
+"formed \n"
+"messages alongside their own instructions for delivery. Messages are "
+"wrapped \n"
+"into a garlic message whenever the message would otherwise be passing in "
+"cleartext \n"
+"through a peer who should not have access to the information - for "
+"instance, \n"
+"when a router wants to ask another router to participate in a tunnel, "
+"they \n"
+"wrap the request inside a garlic, encrypt that garlic to the receiving "
+"router's \n"
+"2048bit ElGamal public key, and forward it through a tunnel. Another "
+"example \n"
+"is when a client wants to send a message to a destination - the sender's "
+"router \n"
+"will wrap up that data message (alongside some other messages) into a "
+"garlic, \n"
+"encrypt that garlic to the 2048bit ElGamal public key published in the "
+"recipient's \n"
"leaseSet, and forward it through the appropriate tunnels."
msgstr ""
#: i2p2www/pages/site/docs/how/tech-intro.html:490
msgid ""
-"The \"instructions\" attached to each clove inside the encryption layer includes \n"
-"the ability to request that the clove be forwarded locally, to a remote router, \n"
-"or to a remote tunnel on a remote router. There are fields in those instructions \n"
-"allowing a peer to request that the delivery be delayed until a certain time \n"
-"or condition has been met, though they won't be honored until the nontrivial \n"
-"delays are deployed. It is possible to explicitly route garlic messages \n"
-"any number of hops without building tunnels, or even to reroute tunnel messages \n"
-"by wrapping them in garlic messages and forwarding them a number of hops prior \n"
-"to delivering them to the next hop in the tunnel, but those techniques are \n"
+"The \"instructions\" attached to each clove inside the encryption layer "
+"includes \n"
+"the ability to request that the clove be forwarded locally, to a remote "
+"router, \n"
+"or to a remote tunnel on a remote router. There are fields in those "
+"instructions \n"
+"allowing a peer to request that the delivery be delayed until a certain "
+"time \n"
+"or condition has been met, though they won't be honored until the nontrivial \n"
+"delays are deployed. It is possible to explicitly route garlic "
+"messages \n"
+"any number of hops without building tunnels, or even to reroute tunnel "
+"messages \n"
+"by wrapping them in garlic messages and forwarding them a number of hops "
+"prior \n"
+"to delivering them to the next hop in the tunnel, but those techniques "
+"are \n"
"not currently used in the existing implementation."
msgstr ""
@@ -8708,35 +10629,54 @@ msgstr ""
#: i2p2www/pages/site/docs/how/tech-intro.html:504
msgid ""
-"As an unreliable, unordered, message based system, I2P uses a simple combination \n"
-"of asymmetric and symmetric encryption algorithms to provide data confidentiality \n"
-"and integrity to garlic messages. As a whole, the combination is referred \n"
-"to as ElGamal/AES+SessionTags, but that is an excessively verbose way to describe \n"
+"As an unreliable, unordered, message based system, I2P uses a simple "
+"combination \n"
+"of asymmetric and symmetric encryption algorithms to provide data "
+"confidentiality \n"
+"and integrity to garlic messages. As a whole, the combination is referred"
+" \n"
+"to as ElGamal/AES+SessionTags, but that is an excessively verbose way to "
+"describe \n"
"the simple use of 2048bit ElGamal, AES256, SHA256 and 32 byte nonces."
msgstr ""
#: i2p2www/pages/site/docs/how/tech-intro.html:543
msgid ""
-"Session tags themselves have a very short lifetime, after which they are \n"
-"discarded if not used. In addition, the quantity stored for each key is limited, \n"
-"as are the number of keys themselves - if too many arrive, either new or old \n"
-"messages may be dropped. The sender keeps track whether messages using session \n"
-"tags are getting through, and if there isn't sufficient communication it may \n"
-"drop the ones previously assumed to be properly delivered, reverting back \n"
+"Session tags themselves have a very short lifetime, after which they are"
+" \n"
+"discarded if not used. In addition, the quantity stored for each key is "
+"limited, \n"
+"as are the number of keys themselves - if too many arrive, either new or "
+"old \n"
+"messages may be dropped. The sender keeps track whether messages using "
+"session \n"
+"tags are getting through, and if there isn't sufficient communication it "
+"may \n"
+"drop the ones previously assumed to be properly delivered, reverting back"
+" \n"
"to the full expensive ElGamal encryption."
msgstr ""
#: i2p2www/pages/site/docs/how/tech-intro.html:553
msgid ""
-"One alternative is to transmit only a single session tag, and from that, \n"
-"seed a deterministic PRNG for determining what tags to use or expect. By keeping \n"
-"this PRNG roughly synchronized between the sender and recipient (the recipient \n"
-"precomputes a window of the next e.g. 50 tags), the overhead of periodically \n"
-"bundling a large number of tags is removed, allowing more options in the space/time \n"
-"tradeoff, and perhaps reducing the number of ElGamal encryptions necessary. \n"
-"However, it would depend upon the strength of the PRNG to provide the necessary \n"
-"cover against internal adversaries, though perhaps by limiting the amount \n"
-"of times each PRNG is used, any weaknesses can be minimized. At the moment, \n"
+"One alternative is to transmit only a single session tag, and from that,"
+" \n"
+"seed a deterministic PRNG for determining what tags to use or expect. By "
+"keeping \n"
+"this PRNG roughly synchronized between the sender and recipient (the "
+"recipient \n"
+"precomputes a window of the next e.g. 50 tags), the overhead of "
+"periodically \n"
+"bundling a large number of tags is removed, allowing more options in the "
+"space/time \n"
+"tradeoff, and perhaps reducing the number of ElGamal encryptions "
+"necessary. \n"
+"However, it would depend upon the strength of the PRNG to provide the "
+"necessary \n"
+"cover against internal adversaries, though perhaps by limiting the amount"
+" \n"
+"of times each PRNG is used, any weaknesses can be minimized. At the "
+"moment, \n"
"there are no immediate plans to move towards these synchronized PRNGs."
msgstr ""
@@ -8746,9 +10686,12 @@ msgstr ""
#: i2p2www/pages/site/docs/how/tech-intro.html:567
msgid ""
-"While I2P is currently functional and sufficient for many scenarios, there \n"
-"are several areas which require further improvement to meet the needs of those \n"
-"facing more powerful adversaries as well as substantial user experience optimization."
+"While I2P is currently functional and sufficient for many scenarios, "
+"there \n"
+"are several areas which require further improvement to meet the needs of "
+"those \n"
+"facing more powerful adversaries as well as substantial user experience "
+"optimization."
msgstr ""
#: i2p2www/pages/site/docs/how/tech-intro.html:573
@@ -8757,64 +10700,106 @@ msgstr ""
#: i2p2www/pages/site/docs/how/tech-intro.html:574
msgid ""
-"I2P is an overlay network designed to be run on top of a functional packet \n"
-"switched network, exploiting the end to end principle to offer anonymity and \n"
-"security. While the Internet no longer fully embraces the end to end principle\n"
+"I2P is an overlay network designed to be run on top of a functional "
+"packet \n"
+"switched network, exploiting the end to end principle to offer anonymity "
+"and \n"
+"security. While the Internet no longer fully embraces the end to end "
+"principle\n"
"(due to the usage of NAT), \n"
-"I2P does require a substantial portion of the network to be reachable - there \n"
-"may be a number of peers along the edges running using restricted routes, \n"
-"but I2P does not include an appropriate routing algorithm for the degenerate \n"
-"case where most peers are unreachable. It would, however work on top of a \n"
+"I2P does require a substantial portion of the network to be reachable - "
+"there \n"
+"may be a number of peers along the edges running using restricted routes,"
+" \n"
+"but I2P does not include an appropriate routing algorithm for the "
+"degenerate \n"
+"case where most peers are unreachable. It would, however work on top of a"
+" \n"
"network employing such an algorithm."
msgstr ""
#: i2p2www/pages/site/docs/how/tech-intro.html:586
msgid ""
-"Restricted route operation, where there are limits to what peers are reachable \n"
-"directly, has several different functional and anonymity implications, dependent \n"
-"upon how the restricted routes are handled. At the most basic level, restricted \n"
-"routes exist when a peer is behind a NAT or firewall which does not allow \n"
-"inbound connections. This was largely addressed in I2P 0.6.0.6 by integrating \n"
-"distributed hole punching into the transport layer, allowing people behind \n"
-"most NATs and firewalls to receive unsolicited connections without any configuration. \n"
-"However, this does not limit the exposure of the peer's IP address to routers \n"
-"inside the network, as they can simply get introduced to the peer through \n"
+"Restricted route operation, where there are limits to what peers are "
+"reachable \n"
+"directly, has several different functional and anonymity implications, "
+"dependent \n"
+"upon how the restricted routes are handled. At the most basic level, "
+"restricted \n"
+"routes exist when a peer is behind a NAT or firewall which does not allow"
+" \n"
+"inbound connections. This was largely addressed in I2P 0.6.0.6 by "
+"integrating \n"
+"distributed hole punching into the transport layer, allowing people "
+"behind \n"
+"most NATs and firewalls to receive unsolicited connections without any "
+"configuration. \n"
+"However, this does not limit the exposure of the peer's IP address to "
+"routers \n"
+"inside the network, as they can simply get introduced to the peer through"
+" \n"
"the published introducer."
msgstr ""
#: i2p2www/pages/site/docs/how/tech-intro.html:599
msgid ""
-"Beyond the functional handling of restricted routes, there are two levels \n"
-"of restricted operation that can be used to limit the exposure of one's IP \n"
-"address - using router-specific tunnels for communication, and offering 'client \n"
-"routers'. For the former, routers can either build a new pool of tunnels or \n"
-"reuse their exploratory pool, publishing the inbound gateways to some of them \n"
-"as part of their routerInfo in place of their transport addresses. When a \n"
-"peer wants to get in touch with them, they see those tunnel gateways in the \n"
-"netDb and simply send the relevant message to them through one of the published \n"
-"tunnels. If the peer behind the restricted route wants to reply, it may do \n"
-"so either directly (if they are willing to expose their IP to the peer) or \n"
-"indirectly through their outbound tunnels. When the routers that the peer \n"
-"has direct connections to want to reach it (to forward tunnel messages, for \n"
-"instance), they simply prioritize their direct connection over the published \n"
-"tunnel gateway. The concept of 'client routers' simply extends the restricted \n"
-"route by not publishing any router addresses. Such a router would not even \n"
-"need to publish their routerInfo in the netDb, merely providing their self \n"
-"signed routerInfo to the peers that it contacts (necessary to pass the router's \n"
-"public keys). Both levels of restricted route operation are planned for I2P \n"
+"Beyond the functional handling of restricted routes, there are two levels"
+" \n"
+"of restricted operation that can be used to limit the exposure of one's "
+"IP \n"
+"address - using router-specific tunnels for communication, and offering "
+"'client \n"
+"routers'. For the former, routers can either build a new pool of tunnels "
+"or \n"
+"reuse their exploratory pool, publishing the inbound gateways to some of "
+"them \n"
+"as part of their routerInfo in place of their transport addresses. When a"
+" \n"
+"peer wants to get in touch with them, they see those tunnel gateways in "
+"the \n"
+"netDb and simply send the relevant message to them through one of the "
+"published \n"
+"tunnels. If the peer behind the restricted route wants to reply, it may "
+"do \n"
+"so either directly (if they are willing to expose their IP to the peer) "
+"or \n"
+"indirectly through their outbound tunnels. When the routers that the peer"
+" \n"
+"has direct connections to want to reach it (to forward tunnel messages, "
+"for \n"
+"instance), they simply prioritize their direct connection over the "
+"published \n"
+"tunnel gateway. The concept of 'client routers' simply extends the "
+"restricted \n"
+"route by not publishing any router addresses. Such a router would not "
+"even \n"
+"need to publish their routerInfo in the netDb, merely providing their "
+"self \n"
+"signed routerInfo to the peers that it contacts (necessary to pass the "
+"router's \n"
+"public keys). Both levels of restricted route operation are planned for "
+"I2P \n"
"2.0."
msgstr ""
#: i2p2www/pages/site/docs/how/tech-intro.html:621
msgid ""
-"There are tradeoffs for those behind restricted routes, as they would likely \n"
-"participate in other people's tunnels less frequently, and the routers which \n"
-"they are connected to would be able to infer traffic patterns that would not \n"
-"otherwise be exposed. On the other hand, if the cost of that exposure is less \n"
-"than the cost of an IP being made available, it may be worthwhile. This, of \n"
-"course, assumes that the peers that the router behind a restricted route contacts \n"
-"are not hostile - either the network is large enough that the probability \n"
-"of using a hostile peer to get connected is small enough, or trusted (and \n"
+"There are tradeoffs for those behind restricted routes, as they would "
+"likely \n"
+"participate in other people's tunnels less frequently, and the routers "
+"which \n"
+"they are connected to would be able to infer traffic patterns that would "
+"not \n"
+"otherwise be exposed. On the other hand, if the cost of that exposure is "
+"less \n"
+"than the cost of an IP being made available, it may be worthwhile. This, "
+"of \n"
+"course, assumes that the peers that the router behind a restricted route "
+"contacts \n"
+"are not hostile - either the network is large enough that the probability"
+" \n"
+"of using a hostile peer to get connected is small enough, or trusted (and"
+" \n"
"perhaps temporary) peers are used instead."
msgstr ""
@@ -8824,28 +10809,45 @@ msgstr ""
#: i2p2www/pages/site/docs/how/tech-intro.html:634
msgid ""
-"Even though the bulk of I2P's initial efforts have been on low latency communication, \n"
-"it was designed with variable latency services in mind from the beginning. \n"
-"At the most basic level, applications running on top of I2P can offer the \n"
-"anonymity of medium and high latency communication while still blending their \n"
-"traffic patterns in with low latency traffic. Internally though, I2P can offer \n"
-"its own medium and high latency communication through the garlic encryption \n"
-"- specifying that the message should be sent after a certain delay, at a certain \n"
-"time, after a certain number of messages have passed, or another mix strategy. \n"
-"With the layered encryption, only the router that the clove exposed the delay \n"
-"request would know that the message requires high latency, allowing the traffic \n"
-"to blend in further with the low latency traffic. Once the transmission precondition \n"
-"is met, the router holding on to the clove (which itself would likely be a \n"
-"garlic message) simply forwards it as requested - to a router, to a tunnel, \n"
+"Even though the bulk of I2P's initial efforts have been on low latency "
+"communication, \n"
+"it was designed with variable latency services in mind from the "
+"beginning. \n"
+"At the most basic level, applications running on top of I2P can offer the"
+" \n"
+"anonymity of medium and high latency communication while still blending "
+"their \n"
+"traffic patterns in with low latency traffic. Internally though, I2P can "
+"offer \n"
+"its own medium and high latency communication through the garlic "
+"encryption \n"
+"- specifying that the message should be sent after a certain delay, at a "
+"certain \n"
+"time, after a certain number of messages have passed, or another mix "
+"strategy. \n"
+"With the layered encryption, only the router that the clove exposed the "
+"delay \n"
+"request would know that the message requires high latency, allowing the "
+"traffic \n"
+"to blend in further with the low latency traffic. Once the transmission "
+"precondition \n"
+"is met, the router holding on to the clove (which itself would likely be "
+"a \n"
+"garlic message) simply forwards it as requested - to a router, to a "
+"tunnel, \n"
"or, most likely, to a remote client destination."
msgstr ""
#: i2p2www/pages/site/docs/how/tech-intro.html:651
msgid ""
-"There are a substantial number of ways to exploit this capacity for high \n"
-"latency comm in I2P, but for the moment, doing so has been scheduled for the \n"
-"I2P 3.0 release. In the meantime, those requiring the anonymity that high \n"
-"latency comm can offer should look towards the application layer to provide \n"
+"There are a substantial number of ways to exploit this capacity for high"
+" \n"
+"latency comm in I2P, but for the moment, doing so has been scheduled for "
+"the \n"
+"I2P 3.0 release. In the meantime, those requiring the anonymity that high"
+" \n"
+"latency comm can offer should look towards the application layer to "
+"provide \n"
"it."
msgstr ""
@@ -8879,12 +10881,18 @@ msgstr ""
#: i2p2www/pages/site/docs/how/tech-intro.html:669
msgid ""
-"I2P's architecture builds on the concepts of message oriented middleware, \n"
-"the topology of DHTs, the anonymity and cryptography of free route mixnets, \n"
-"and the adaptability of packet switched networking. The value comes not from \n"
-"novel concepts of algorithms though, but from careful engineering combining \n"
-"the research results of existing systems and papers. While there are a few \n"
-"similar efforts worth reviewing, both for technical and functional comparisons, \n"
+"I2P's architecture builds on the concepts of message oriented middleware,"
+" \n"
+"the topology of DHTs, the anonymity and cryptography of free route "
+"mixnets, \n"
+"and the adaptability of packet switched networking. The value comes not "
+"from \n"
+"novel concepts of algorithms though, but from careful engineering "
+"combining \n"
+"the research results of existing systems and papers. While there are a "
+"few \n"
+"similar efforts worth reviewing, both for technical and functional "
+"comparisons, \n"
"two in particular are pulled out here - Tor and Freenet."
msgstr ""
@@ -8901,127 +10909,209 @@ msgstr "сайт"
#: i2p2www/pages/site/docs/how/tech-intro.html:686
msgid ""
"At first glance, Tor and I2P have many functional and anonymity related \n"
-"similarities. While I2P's development began before we were aware of the early \n"
-"stage efforts on Tor, many of the lessons of the original onion routing and \n"
-"ZKS efforts were integrated into I2P's design. Rather than building an essentially \n"
-"trusted, centralized system with directory servers, I2P has a self organizing \n"
-"network database with each peer taking on the responsibility of profiling \n"
-"other routers to determine how best to exploit available resources. Another \n"
-"key difference is that while both I2P and Tor use layered and ordered paths \n"
-"(tunnels and circuits/streams), I2P is fundamentally a packet switched network, \n"
-"while Tor is fundamentally a circuit switched one, allowing I2P to transparently \n"
-"route around congestion or other network failures, operate redundant pathways, \n"
-"and load balance the data across available resources. While Tor offers the \n"
-"useful outproxy functionality by offering integrated outproxy discovery and \n"
-"selection, I2P leaves such application layer decisions up to applications \n"
-"running on top of I2P - in fact, I2P has even externalized the TCP-like streaming \n"
-"library itself to the application layer, allowing developers to experiment \n"
-"with different strategies, exploiting their domain specific knowledge to offer \n"
+"similarities. While I2P's development began before we were aware of the "
+"early \n"
+"stage efforts on Tor, many of the lessons of the original onion routing "
+"and \n"
+"ZKS efforts were integrated into I2P's design. Rather than building an "
+"essentially \n"
+"trusted, centralized system with directory servers, I2P has a self "
+"organizing \n"
+"network database with each peer taking on the responsibility of profiling"
+" \n"
+"other routers to determine how best to exploit available resources. "
+"Another \n"
+"key difference is that while both I2P and Tor use layered and ordered "
+"paths \n"
+"(tunnels and circuits/streams), I2P is fundamentally a packet switched "
+"network, \n"
+"while Tor is fundamentally a circuit switched one, allowing I2P to "
+"transparently \n"
+"route around congestion or other network failures, operate redundant "
+"pathways, \n"
+"and load balance the data across available resources. While Tor offers "
+"the \n"
+"useful outproxy functionality by offering integrated outproxy discovery "
+"and \n"
+"selection, I2P leaves such application layer decisions up to applications"
+" \n"
+"running on top of I2P - in fact, I2P has even externalized the TCP-like "
+"streaming \n"
+"library itself to the application layer, allowing developers to "
+"experiment \n"
+"with different strategies, exploiting their domain specific knowledge to "
+"offer \n"
"better performance."
msgstr ""
#: i2p2www/pages/site/docs/how/tech-intro.html:707
msgid ""
-"From an anonymity perspective, there is much similarity when the core networks \n"
-"are compared. However, there are a few key differences. When dealing with \n"
-"an internal adversary or most external adversaries, I2P's simplex tunnels \n"
-"expose half as much traffic data than would be exposed with Tor's duplex circuits \n"
-"by simply looking at the flows themselves - an HTTP request and response would \n"
-"follow the same path in Tor, while in I2P the packets making up the request \n"
-"would go out through one or more outbound tunnels and the packets making up \n"
-"the response would come back through one or more different inbound tunnels. \n"
-"While I2P's peer selection and ordering strategies should sufficiently address \n"
-"predecessor attacks, should a switch to bidirectional tunnels be necessary,\n"
-"we could simply build an inbound and outbound tunnel along the same routers."
+"From an anonymity perspective, there is much similarity when the core "
+"networks \n"
+"are compared. However, there are a few key differences. When dealing with"
+" \n"
+"an internal adversary or most external adversaries, I2P's simplex tunnels"
+" \n"
+"expose half as much traffic data than would be exposed with Tor's duplex "
+"circuits \n"
+"by simply looking at the flows themselves - an HTTP request and response "
+"would \n"
+"follow the same path in Tor, while in I2P the packets making up the "
+"request \n"
+"would go out through one or more outbound tunnels and the packets making "
+"up \n"
+"the response would come back through one or more different inbound "
+"tunnels. \n"
+"While I2P's peer selection and ordering strategies should sufficiently "
+"address \n"
+"predecessor attacks, should a switch to bidirectional tunnels be "
+"necessary,\n"
+"we could simply build an inbound and outbound tunnel along the same "
+"routers."
msgstr ""
#: i2p2www/pages/site/docs/how/tech-intro.html:721
msgid ""
-"Another anonymity issue comes up in Tor's use of telescopic tunnel creation, \n"
-"as simple packet counting and timing measurements as the cells in a circuit \n"
-"pass through an adversary's node exposes statistical information regarding \n"
-"where the adversary is within the circuit. I2P's unidirectional tunnel creation \n"
-"with a single message so that this data is not exposed. Protecting the position \n"
-"in a tunnel is important, as an adversary would otherwise be able to mount \n"
-"a series of powerful predecessor, intersection, and traffic confirmation attacks."
+"Another anonymity issue comes up in Tor's use of telescopic tunnel "
+"creation, \n"
+"as simple packet counting and timing measurements as the cells in a "
+"circuit \n"
+"pass through an adversary's node exposes statistical information "
+"regarding \n"
+"where the adversary is within the circuit. I2P's unidirectional tunnel "
+"creation \n"
+"with a single message so that this data is not exposed. Protecting the "
+"position \n"
+"in a tunnel is important, as an adversary would otherwise be able to "
+"mount \n"
+"a series of powerful predecessor, intersection, and traffic confirmation "
+"attacks."
msgstr ""
#: i2p2www/pages/site/docs/how/tech-intro.html:731
msgid ""
-"Tor's support for a second tier of \"onion proxies\" does offer a non-trivial \n"
-"degree of anonymity while requiring a low cost of entry, while I2P will not \n"
+"Tor's support for a second tier of \"onion proxies\" does offer a non-"
+"trivial \n"
+"degree of anonymity while requiring a low cost of entry, while I2P will "
+"not \n"
"offer this topology until 2.0."
msgstr ""
#: i2p2www/pages/site/docs/how/tech-intro.html:737
msgid ""
-"On the whole, Tor and I2P complement each other in their focus - Tor works \n"
-"towards offering high speed anonymous Internet outproxying, while I2P works \n"
-"towards offering a decentralized resilient network in itself. In theory, both \n"
-"can be used to achieve both purposes, but given limited development resources, \n"
-"they both have their strengths and weaknesses. The I2P developers have considered \n"
-"the steps necessary to modify Tor to take advantage of I2P's design, but concerns \n"
-"of Tor's viability under resource scarcity suggest that I2P's packet switching \n"
+"On the whole, Tor and I2P complement each other in their focus - Tor "
+"works \n"
+"towards offering high speed anonymous Internet outproxying, while I2P "
+"works \n"
+"towards offering a decentralized resilient network in itself. In theory, "
+"both \n"
+"can be used to achieve both purposes, but given limited development "
+"resources, \n"
+"they both have their strengths and weaknesses. The I2P developers have "
+"considered \n"
+"the steps necessary to modify Tor to take advantage of I2P's design, but "
+"concerns \n"
+"of Tor's viability under resource scarcity suggest that I2P's packet "
+"switching \n"
"architecture will be able to exploit scarce resources more effectively."
msgstr ""
#: i2p2www/pages/site/docs/how/tech-intro.html:751
msgid ""
-"Freenet played a large part in the initial stages of I2P's design - giving \n"
-"proof to the viability of a vibrant pseudonymous community completely contained \n"
-"within the network, demonstrating that the dangers inherent in outproxies \n"
-"could be avoided. The first seed of I2P began as a replacement communication \n"
-"layer for Freenet, attempting to factor out the complexities of a scalable, \n"
-"anonymous and secure point to point communication from the complexities of \n"
-"a censorship resistant distributed data store. Over time however, some of \n"
-"the anonymity and scalability issues inherent in Freenet's algorithms made \n"
-"it clear that I2P's focus should stay strictly on providing a generic anonymous \n"
-"communication layer, rather than as a component of Freenet. Over the years, \n"
-"the Freenet developers have come to see the weaknesses in the older design, \n"
-"prompting them to suggest that they will require a \"premix\" layer to offer \n"
-"substantial anonymity. In other words, Freenet needs to run on top of a mixnet \n"
-"such as I2P or Tor, with \"client nodes\" requesting and publishing data through \n"
-"the mixnet to the \"server nodes\" which then fetch and store the data according \n"
+"Freenet played a large part in the initial stages of I2P's design - "
+"giving \n"
+"proof to the viability of a vibrant pseudonymous community completely "
+"contained \n"
+"within the network, demonstrating that the dangers inherent in outproxies"
+" \n"
+"could be avoided. The first seed of I2P began as a replacement "
+"communication \n"
+"layer for Freenet, attempting to factor out the complexities of a "
+"scalable, \n"
+"anonymous and secure point to point communication from the complexities "
+"of \n"
+"a censorship resistant distributed data store. Over time however, some of"
+" \n"
+"the anonymity and scalability issues inherent in Freenet's algorithms "
+"made \n"
+"it clear that I2P's focus should stay strictly on providing a generic "
+"anonymous \n"
+"communication layer, rather than as a component of Freenet. Over the "
+"years, \n"
+"the Freenet developers have come to see the weaknesses in the older "
+"design, \n"
+"prompting them to suggest that they will require a \"premix\" layer to "
+"offer \n"
+"substantial anonymity. In other words, Freenet needs to run on top of a "
+"mixnet \n"
+"such as I2P or Tor, with \"client nodes\" requesting and publishing data "
+"through \n"
+"the mixnet to the \"server nodes\" which then fetch and store the data "
+"according \n"
"to Freenet's heuristic distributed data storage algorithms."
msgstr ""
#: i2p2www/pages/site/docs/how/tech-intro.html:770
msgid ""
-"Freenet's functionality is very complementary to I2P's, as Freenet natively \n"
-"provides many of the tools for operating medium and high latency systems, \n"
-"while I2P natively provides the low latency mix network suitable for offering \n"
-"adequate anonymity. The logic of separating the mixnet from the censorship-\n"
-"resistant distributed data store still seems self-evident from an engineering, \n"
-"anonymity, security, and resource allocation perspective, so hopefully the \n"
-"Freenet team will pursue efforts in that direction, if not simply reusing \n"
+"Freenet's functionality is very complementary to I2P's, as Freenet "
+"natively \n"
+"provides many of the tools for operating medium and high latency systems,"
+" \n"
+"while I2P natively provides the low latency mix network suitable for "
+"offering \n"
+"adequate anonymity. The logic of separating the mixnet from the "
+"censorship-\n"
+"resistant distributed data store still seems self-evident from an "
+"engineering, \n"
+"anonymity, security, and resource allocation perspective, so hopefully "
+"the \n"
+"Freenet team will pursue efforts in that direction, if not simply reusing"
+" \n"
"(or helping to improve, as necessary) existing mixnets like I2P or Tor."
msgstr ""
#: i2p2www/pages/site/docs/how/tech-intro.html:781
msgid ""
"It is worth mentioning that there has recently been discussion and work \n"
-"by the Freenet developers on a \"globally scalable darknet\" using restricted \n"
-"routes between peers of various trust. While insufficient information has \n"
-"been made publicly available regarding how such a system would operate for \n"
-"a full review, from what has been said the anonymity and scalability claims \n"
-"seem highly dubious. In particular, the appropriateness for use in hostile \n"
-"regimes against state level adversaries has been tremendously overstated, \n"
-"and any analysis on the implications of resource scarcity upon the scalability \n"
-"of the network has seemingly been avoided. Further questions regarding susceptibility \n"
-"to traffic analysis, trust and other topics do exist, but a more in-depth \n"
-"review of this \"globally scalable darknet\" will have to wait until the Freenet \n"
+"by the Freenet developers on a \"globally scalable darknet\" using "
+"restricted \n"
+"routes between peers of various trust. While insufficient information has"
+" \n"
+"been made publicly available regarding how such a system would operate "
+"for \n"
+"a full review, from what has been said the anonymity and scalability "
+"claims \n"
+"seem highly dubious. In particular, the appropriateness for use in "
+"hostile \n"
+"regimes against state level adversaries has been tremendously overstated,"
+" \n"
+"and any analysis on the implications of resource scarcity upon the "
+"scalability \n"
+"of the network has seemingly been avoided. Further questions regarding "
+"susceptibility \n"
+"to traffic analysis, trust and other topics do exist, but a more in-depth"
+" \n"
+"review of this \"globally scalable darknet\" will have to wait until the "
+"Freenet \n"
"team makes more information available."
msgstr ""
#: i2p2www/pages/site/docs/how/tech-intro.html:797
msgid ""
-"I2P itself doesn't really do much - it simply sends messages to remote destinations \n"
-"and receives messages targeting local destinations - most of the interesting \n"
-"work goes on at the layers above it. By itself, I2P could be seen as an anonymous \n"
-"and secure IP layer, and the bundled streaming library \n"
-"as an implementation of an anonymous and secure TCP layer on top of it. Beyond \n"
-"that, I2PTunnel exposes a generic TCP proxying \n"
-"system for either getting into or out of the I2P network, plus a variety of \n"
+"I2P itself doesn't really do much - it simply sends messages to remote "
+"destinations \n"
+"and receives messages targeting local destinations - most of the "
+"interesting \n"
+"work goes on at the layers above it. By itself, I2P could be seen as an "
+"anonymous \n"
+"and secure IP layer, and the bundled streaming"
+" library \n"
+"as an implementation of an anonymous and secure TCP layer on top of it. "
+"Beyond \n"
+"that, I2PTunnel exposes a generic TCP "
+"proxying \n"
+"system for either getting into or out of the I2P network, plus a variety "
+"of \n"
"network applications provide further functionality for end users."
msgstr ""
@@ -9031,34 +11121,51 @@ msgstr ""
#: i2p2www/pages/site/docs/how/tech-intro.html:809
msgid ""
-"The I2P streaming library can be viewed as a generic streaming interface (mirroring TCP sockets),\n"
-"and the implementation supports a sliding window protocol\n"
-"with several optimizations, to take into account the high delay over I2P.\n"
+"The I2P streaming library can be viewed as a generic streaming interface "
+"(mirroring TCP sockets),\n"
+"and the implementation supports a sliding "
+"window protocol\n"
+"with several optimizations, to take into account the high delay over I2P."
+"\n"
"Individual streams may adjust the maximum packet size and \n"
-"other options, though the default of 4KB compressed seems a reasonable tradeoff \n"
-"between the bandwidth costs of retransmitting lost messages and the latency \n"
+"other options, though the default of 4KB compressed seems a reasonable "
+"tradeoff \n"
+"between the bandwidth costs of retransmitting lost messages and the "
+"latency \n"
"of multiple messages."
msgstr ""
#: i2p2www/pages/site/docs/how/tech-intro.html:819
msgid ""
"In addition, in consideration of the relatively high cost of subsequent \n"
-"messages, the streaming library's protocol for scheduling and delivering messages \n"
-"has been optimized to allow individual messages passed to contain as much \n"
-"information as is available. For instance, a small HTTP transaction proxied \n"
-"through the streaming library can be completed in a single round trip - the \n"
-"first message bundles a SYN, FIN and the small payload (an HTTP request typically \n"
-"fits) and the reply bundles the SYN, FIN, ACK and the small payload (many \n"
-"HTTP responses fit). While an additional ACK must be transmitted to tell the \n"
-"HTTP server that the SYN/FIN/ACK has been received, the local HTTP proxy can \n"
+"messages, the streaming library's protocol for scheduling and delivering "
+"messages \n"
+"has been optimized to allow individual messages passed to contain as much"
+" \n"
+"information as is available. For instance, a small HTTP transaction "
+"proxied \n"
+"through the streaming library can be completed in a single round trip - "
+"the \n"
+"first message bundles a SYN, FIN and the small payload (an HTTP request "
+"typically \n"
+"fits) and the reply bundles the SYN, FIN, ACK and the small payload (many"
+" \n"
+"HTTP responses fit). While an additional ACK must be transmitted to tell "
+"the \n"
+"HTTP server that the SYN/FIN/ACK has been received, the local HTTP proxy "
+"can \n"
"deliver the full response to the browser immediately."
msgstr ""
#: i2p2www/pages/site/docs/how/tech-intro.html:832
msgid ""
-"On the whole, however, the streaming library bears much resemblance to an \n"
-"abstraction of TCP, with its sliding windows, congestion control algorithms \n"
-"(both slow start and congestion avoidance), and general packet behavior (ACK, \n"
+"On the whole, however, the streaming library bears much resemblance to an"
+" \n"
+"abstraction of TCP, with its sliding windows, congestion control "
+"algorithms \n"
+"(both slow start and congestion avoidance), and general packet behavior "
+"(ACK, \n"
"SYN, FIN, RST, etc)."
msgstr ""
@@ -9088,142 +11195,227 @@ msgstr ""
#: i2p2www/pages/site/docs/how/tech-intro.html:846
msgid ""
-"Naming within I2P has been an oft-debated topic since the very beginning \n"
-"with advocates across the spectrum of possibilities. However, given I2P's \n"
-"inherent demand for secure communication and decentralized operation, the \n"
-"traditional DNS-style naming system is clearly out, as are \"majority rules\" \n"
-"voting systems. Instead, I2P ships with a generic naming library and a base \n"
-"implementation designed to work off a local name to destination mapping, as \n"
-"well as an optional add-on application called the \"addressbook\". The addressbook \n"
-"is a web-of-trust-driven secure, distributed, and human readable naming system, \n"
-"sacrificing only the call for all human readable names to be globally unique \n"
-"by mandating only local uniqueness. While all messages in I2P are cryptographically \n"
-"addressed by their destination, different people can have local addressbook \n"
-"entries for \"Alice\" which refer to different destinations. People can still \n"
-"discover new names by importing published addressbooks of peers specified \n"
-"in their web of trust, by adding in the entries provided through a third party, \n"
-"or (if some people organize a series of published addressbooks using a first \n"
-"come first serve registration system) people can choose to treat these addressbooks \n"
+"Naming within I2P has been an oft-debated topic since the very beginning"
+" \n"
+"with advocates across the spectrum of possibilities. However, given I2P's"
+" \n"
+"inherent demand for secure communication and decentralized operation, the"
+" \n"
+"traditional DNS-style naming system is clearly out, as are \"majority "
+"rules\" \n"
+"voting systems. Instead, I2P ships with a generic naming library and a "
+"base \n"
+"implementation designed to work off a local name to destination mapping, "
+"as \n"
+"well as an optional add-on application called the \"addressbook\". The "
+"addressbook \n"
+"is a web-of-trust-driven secure, distributed, and human readable naming "
+"system, \n"
+"sacrificing only the call for all human readable names to be globally "
+"unique \n"
+"by mandating only local uniqueness. While all messages in I2P are "
+"cryptographically \n"
+"addressed by their destination, different people can have local "
+"addressbook \n"
+"entries for \"Alice\" which refer to different destinations. People can "
+"still \n"
+"discover new names by importing published addressbooks of peers specified"
+" \n"
+"in their web of trust, by adding in the entries provided through a third "
+"party, \n"
+"or (if some people organize a series of published addressbooks using a "
+"first \n"
+"come first serve registration system) people can choose to treat these "
+"addressbooks \n"
"as name servers, emulating traditional DNS."
msgstr ""
#: i2p2www/pages/site/docs/how/tech-intro.html:866
msgid ""
"I2P does not promote the use of DNS-like services though, as the damage \n"
-"done by hijacking a site can be tremendous - and insecure destinations have \n"
-"no value. DNSsec itself still falls back on registrars and certificate authorities, \n"
-"while with I2P, requests sent to a destination cannot be intercepted or the \n"
-"reply spoofed, as they are encrypted to the destination's public keys, and \n"
-"a destination itself is just a pair of public keys and a certificate. DNS-style \n"
-"systems on the other hand allow any of the name servers on the lookup path \n"
-"to mount simple denial of service and spoofing attacks. Adding on a certificate \n"
-"authenticating the responses as signed by some centralized certificate authority \n"
-"would address many of the hostile nameserver issues but would leave open replay \n"
+"done by hijacking a site can be tremendous - and insecure destinations "
+"have \n"
+"no value. DNSsec itself still falls back on registrars and certificate "
+"authorities, \n"
+"while with I2P, requests sent to a destination cannot be intercepted or "
+"the \n"
+"reply spoofed, as they are encrypted to the destination's public keys, "
+"and \n"
+"a destination itself is just a pair of public keys and a certificate. "
+"DNS-style \n"
+"systems on the other hand allow any of the name servers on the lookup "
+"path \n"
+"to mount simple denial of service and spoofing attacks. Adding on a "
+"certificate \n"
+"authenticating the responses as signed by some centralized certificate "
+"authority \n"
+"would address many of the hostile nameserver issues but would leave open "
+"replay \n"
"attacks as well as hostile certificate authority attacks."
msgstr ""
#: i2p2www/pages/site/docs/how/tech-intro.html:880
msgid ""
-"Voting style naming is dangerous as well, especially given the effectiveness \n"
-"of Sybil attacks in anonymous systems - the attacker can simply create an \n"
-"arbitrarily high number of peers and \"vote\" with each to take over a given \n"
-"name. Proof-of-work methods can be used to make identity non-free, but as \n"
-"the network grows the load required to contact everyone to conduct online \n"
-"voting is implausible, or if the full network is not queried, different sets \n"
+"Voting style naming is dangerous as well, especially given the "
+"effectiveness \n"
+"of Sybil attacks in anonymous systems - the attacker can simply create an"
+" \n"
+"arbitrarily high number of peers and \"vote\" with each to take over a "
+"given \n"
+"name. Proof-of-work methods can be used to make identity non-free, but as"
+" \n"
+"the network grows the load required to contact everyone to conduct online"
+" \n"
+"voting is implausible, or if the full network is not queried, different "
+"sets \n"
"of answers may be reachable."
msgstr ""
#: i2p2www/pages/site/docs/how/tech-intro.html:890
msgid ""
-"As with the Internet however, I2P is keeping the design and operation of \n"
-"a naming system out of the (IP-like) communication layer. The bundled naming \n"
-"library includes a simple service provider interface which alternate naming \n"
-"systems can plug into, allowing end users to drive what sort of naming tradeoffs \n"
+"As with the Internet however, I2P is keeping the design and operation of"
+" \n"
+"a naming system out of the (IP-like) communication layer. The bundled "
+"naming \n"
+"library includes a simple service provider interface which alternate "
+"naming \n"
+"systems can plug into, allowing end users to drive what sort of naming "
+"tradeoffs \n"
"they prefer."
msgstr ""
#: i2p2www/pages/site/docs/how/tech-intro.html:899
msgid ""
-"The old Syndie bundled with I2P has been replaced by the new Syndie which\n"
-"is distributed separately. For more information see the Syndie\n"
+"The old Syndie bundled with I2P has been replaced by the new Syndie which"
+"\n"
+"is distributed separately. For more information see the Syndie\n"
"pages."
msgstr ""
#: i2p2www/pages/site/docs/how/tech-intro.html:905
msgid ""
-"Syndie is a safe, anonymous blogging / content publication / content aggregation \n"
-"system. It lets you create information, share it with others, and read posts \n"
-"from those you're interested in, all while taking into consideration your \n"
-"needs for security and anonymity. Rather than building its own content distribution \n"
-"network, Syndie is designed to run on top of existing networks, syndicating \n"
-"content through eepsites, Tor hidden services, Freenet freesites, normal websites, \n"
-"usenet newsgroups, email lists, RSS feeds, etc. Data published with Syndie \n"
-"is done so as to offer pseudonymous authentication to anyone reading or archiving \n"
+"Syndie is a safe, anonymous blogging / content publication / content "
+"aggregation \n"
+"system. It lets you create information, share it with others, and read "
+"posts \n"
+"from those you're interested in, all while taking into consideration your"
+" \n"
+"needs for security and anonymity. Rather than building its own content "
+"distribution \n"
+"network, Syndie is designed to run on top of existing networks, "
+"syndicating \n"
+"content through eepsites, Tor hidden services, Freenet freesites, normal "
+"websites, \n"
+"usenet newsgroups, email lists, RSS feeds, etc. Data published with "
+"Syndie \n"
+"is done so as to offer pseudonymous authentication to anyone reading or "
+"archiving \n"
"it."
msgstr ""
#: i2p2www/pages/site/docs/how/tech-intro.html:920
msgid ""
-"I2PTunnel is probably I2P's most popular and versatile client application, \n"
-"allowing generic proxying both into and out of the I2P network. I2PTunnel \n"
-"can be viewed as four separate proxying applications - a \"client\" which receives \n"
-"inbound TCP connections and forwards them to a given I2P destination, an \"httpclient\" \n"
-"(aka \"eepproxy\") which acts like an HTTP proxy and forwards the requests to \n"
-"the appropriate I2P destination (after querying the naming service if necessary), \n"
-"a \"server\" which receives inbound I2P streaming connections on a destination \n"
-"and forwards them to a given TCP host+port, and an \"httpserver\" which extends \n"
-"the \"server\" by parsing the HTTP request and responses to allow safer operation. \n"
-"There is an additional \"socksclient\" application, but its use is not encouraged \n"
+"I2PTunnel is probably I2P's most popular and versatile client "
+"application, \n"
+"allowing generic proxying both into and out of the I2P network. I2PTunnel"
+" \n"
+"can be viewed as four separate proxying applications - a \"client\" which"
+" receives \n"
+"inbound TCP connections and forwards them to a given I2P destination, an "
+"\"httpclient\" \n"
+"(aka \"eepproxy\") which acts like an HTTP proxy and forwards the "
+"requests to \n"
+"the appropriate I2P destination (after querying the naming service if "
+"necessary), \n"
+"a \"server\" which receives inbound I2P streaming connections on a "
+"destination \n"
+"and forwards them to a given TCP host+port, and an \"httpserver\" which "
+"extends \n"
+"the \"server\" by parsing the HTTP request and responses to allow safer "
+"operation. \n"
+"There is an additional \"socksclient\" application, but its use is not "
+"encouraged \n"
"for reasons previously mentioned."
msgstr ""
#: i2p2www/pages/site/docs/how/tech-intro.html:934
msgid ""
-"I2P itself is not an outproxy network - the anonymity and security concerns \n"
-"inherent in a mix net which forwards data into and out of the mix have kept \n"
-"I2P's design focused on providing an anonymous network which capable of meeting \n"
-"the user's needs without requiring external resources. However, the I2PTunnel \n"
-"\"httpclient\" application offers a hook for outproxying - if the hostname requested \n"
-"doesn't end in \".i2p\", it picks a random destination from a user-provided \n"
-"set of outproxies and forwards the request to them. These destinations are \n"
-"simply I2PTunnel \"server\" instances run by volunteers who have explicitly \n"
-"chosen to run outproxies - no one is an outproxy by default, and running an \n"
-"outproxy doesn't automatically tell other people to proxy through you. While \n"
-"outproxies do have inherent weaknesses, they offer a simple proof of concept \n"
-"for using I2P and provide some functionality under a threat model which may \n"
+"I2P itself is not an outproxy network - the anonymity and security "
+"concerns \n"
+"inherent in a mix net which forwards data into and out of the mix have "
+"kept \n"
+"I2P's design focused on providing an anonymous network which capable of "
+"meeting \n"
+"the user's needs without requiring external resources. However, the "
+"I2PTunnel \n"
+"\"httpclient\" application offers a hook for outproxying - if the "
+"hostname requested \n"
+"doesn't end in \".i2p\", it picks a random destination from a user-"
+"provided \n"
+"set of outproxies and forwards the request to them. These destinations "
+"are \n"
+"simply I2PTunnel \"server\" instances run by volunteers who have "
+"explicitly \n"
+"chosen to run outproxies - no one is an outproxy by default, and running "
+"an \n"
+"outproxy doesn't automatically tell other people to proxy through you. "
+"While \n"
+"outproxies do have inherent weaknesses, they offer a simple proof of "
+"concept \n"
+"for using I2P and provide some functionality under a threat model which "
+"may \n"
"be sufficient for some users."
msgstr ""
#: i2p2www/pages/site/docs/how/tech-intro.html:950
msgid ""
-"I2PTunnel enables most of the applications in use. An \"httpserver\" pointing \n"
-"at a webserver lets anyone run their own anonymous website (or \"eepsite\") \n"
-"- a webserver is bundled with I2P for this purpose, but any webserver can \n"
-"be used. Anyone may run a \"client\" pointing at one of the anonymously hosted \n"
-"IRC servers, each of which are running a \"server\" pointing at their local \n"
-"IRCd and communicating between IRCds over their own \"client\" tunnels. End \n"
-"users also have \"client\" tunnels pointing at I2Pmail's \n"
-"POP3 and SMTP destinations (which in turn are simply \"server\" instances pointing \n"
-"at POP3 and SMTP servers), as well as \"client\" tunnels pointing at I2P's CVS \n"
-"server, allowing anonymous development. At times people have even run \"client\" \n"
+"I2PTunnel enables most of the applications in use. An \"httpserver\" "
+"pointing \n"
+"at a webserver lets anyone run their own anonymous website (or "
+"\"eepsite\") \n"
+"- a webserver is bundled with I2P for this purpose, but any webserver can"
+" \n"
+"be used. Anyone may run a \"client\" pointing at one of the anonymously "
+"hosted \n"
+"IRC servers, each of which are running a \"server\" pointing at their "
+"local \n"
+"IRCd and communicating between IRCds over their own \"client\" tunnels. "
+"End \n"
+"users also have \"client\" tunnels pointing at I2Pmail's \n"
+"POP3 and SMTP destinations (which in turn are simply \"server\" instances"
+" pointing \n"
+"at POP3 and SMTP servers), as well as \"client\" tunnels pointing at "
+"I2P's CVS \n"
+"server, allowing anonymous development. At times people have even run "
+"\"client\" \n"
"proxies to access the \"server\" instances pointing at an NNTP server."
msgstr ""
#: i2p2www/pages/site/docs/how/tech-intro.html:967
msgid ""
-"i2p-bt is a port of the mainline python BitTorrent client to run both the \n"
-"tracker and peer communication over I2P. Tracker requests are forwarded through \n"
-"the eepproxy to eepsites specified in the torrent file while tracker responses \n"
-"refer to peers by their destination explicitly, allowing i2p-bt to open up \n"
-"a streaming lib connection to query them for \n"
+"i2p-bt is a port of the mainline python BitTorrent client to run both the"
+" \n"
+"tracker and peer communication over I2P. Tracker requests are forwarded "
+"through \n"
+"the eepproxy to eepsites specified in the torrent file while tracker "
+"responses \n"
+"refer to peers by their destination explicitly, allowing i2p-bt to open "
+"up \n"
+"a streaming lib connection to query them "
+"for \n"
"blocks."
msgstr ""
#: i2p2www/pages/site/docs/how/tech-intro.html:976
msgid ""
-"In addition to i2p-bt, a port of bytemonsoon has been made to I2P, making \n"
-"a few modifications as necessary to strip any anonymity-compromising information \n"
-"from the application and to take into consideration the fact that IPs cannot \n"
+"In addition to i2p-bt, a port of bytemonsoon has been made to I2P, making"
+" \n"
+"a few modifications as necessary to strip any anonymity-compromising "
+"information \n"
+"from the application and to take into consideration the fact that IPs "
+"cannot \n"
"be used for identifying peers."
msgstr ""
@@ -9236,8 +11428,10 @@ msgstr ""
#: i2p2www/pages/site/docs/how/tech-intro.html:990
msgid ""
-"Bundled with the I2P install, I2PSnark offers a simple anonymous BitTorrent \n"
-"client with multitorrent capabilities, exposing all of the functionality through \n"
+"Bundled with the I2P install, I2PSnark offers a simple anonymous "
+"BitTorrent \n"
+"client with multitorrent capabilities, exposing all of the functionality "
+"through \n"
"a plain HTML web interface."
msgstr ""
@@ -9245,7 +11439,9 @@ msgstr ""
#, python-format
msgid ""
"Robert is a Bittorrent client written in Python.\n"
-"It is hosted on http://%(bob)s/Robert.html "
+"It is hosted on http://%(bob)s/Robert.html "
msgstr ""
#: i2p2www/pages/site/docs/how/tech-intro.html:1007
@@ -9257,9 +11453,12 @@ msgstr ""
#: i2p2www/pages/site/docs/how/tech-intro.html:1015
msgid ""
-"I2Phex is a fairly direct port of the Phex Gnutella filesharing client to \n"
-"run entirely on top of I2P. While it has disabled some of Phex's functionality, \n"
-"such as integration with Gnutella webcaches, the basic file sharing and chatting \n"
+"I2Phex is a fairly direct port of the Phex Gnutella filesharing client to"
+" \n"
+"run entirely on top of I2P. While it has disabled some of Phex's "
+"functionality, \n"
+"such as integration with Gnutella webcaches, the basic file sharing and "
+"chatting \n"
"system is fully functional."
msgstr ""
@@ -9272,39 +11471,62 @@ msgstr ""
#: i2p2www/pages/site/docs/how/tech-intro.html:1033
#, python-format
msgid ""
-"I2Pmail is more a service than an application - postman offers both internal \n"
-"and external email with POP3 and SMTP service through I2PTunnel instances \n"
-"accessing a series of components developed with mastiejaner, allowing people \n"
-"to use their preferred mail clients to send and receive mail pseudonymously. \n"
-"However, as most mail clients expose substantial identifying information, \n"
-"I2P bundles susi23's web based susimail client which has been built specifically \n"
-"with I2P's anonymity needs in mind. The I2Pmail/mail.i2p service offers transparent \n"
-"virus filtering as well as denial of service prevention with hashcash augmented \n"
-"quotas. In addition, each user has control of their batching strategy prior \n"
-"to delivery through the mail.i2p outproxies, which are separate from the mail.i2p \n"
-"SMTP and POP3 servers - both the outproxies and inproxies communicate with \n"
-"the mail.i2p SMTP and POP3 servers through I2P itself, so compromising those \n"
-"non-anonymous locations does not give access to the mail accounts or activity \n"
-"patterns of the user. At the moment the developers work on a decentralized \n"
-"mailsystem, called \"v2mail\". More information can be found on the eepsite \n"
+"I2Pmail is more a service than an application - postman offers both "
+"internal \n"
+"and external email with POP3 and SMTP service through I2PTunnel instances"
+" \n"
+"accessing a series of components developed with mastiejaner, allowing "
+"people \n"
+"to use their preferred mail clients to send and receive mail "
+"pseudonymously. \n"
+"However, as most mail clients expose substantial identifying information,"
+" \n"
+"I2P bundles susi23's web based susimail client which has been built "
+"specifically \n"
+"with I2P's anonymity needs in mind. The I2Pmail/mail.i2p service offers "
+"transparent \n"
+"virus filtering as well as denial of service prevention with hashcash "
+"augmented \n"
+"quotas. In addition, each user has control of their batching strategy "
+"prior \n"
+"to delivery through the mail.i2p outproxies, which are separate from the "
+"mail.i2p \n"
+"SMTP and POP3 servers - both the outproxies and inproxies communicate "
+"with \n"
+"the mail.i2p SMTP and POP3 servers through I2P itself, so compromising "
+"those \n"
+"non-anonymous locations does not give access to the mail accounts or "
+"activity \n"
+"patterns of the user. At the moment the developers work on a "
+"decentralized \n"
+"mailsystem, called \"v2mail\". More information can be found on the "
+"eepsite \n"
"%(postman)s."
msgstr ""
#: i2p2www/pages/site/docs/how/tech-intro.html:1055
msgid ""
-"I2P-Bote is a distributed e-mail application. It does not use the traditional\n"
-"e-mail concept of sending an e-mail to a server and retrieving it from a server.\n"
+"I2P-Bote is a distributed e-mail application. It does not use the "
+"traditional\n"
+"e-mail concept of sending an e-mail to a server and retrieving it from a "
+"server.\n"
"Instead, it uses a Kademlia Distributed Hash Table to store mails.\n"
-"One user can push a mail into the DHT, while another can request the e-mail from the DHT.\n"
-"And all the mails sent within the I2P-Bote network are automatically encrypted end-to-end. X = g^x mod "
-"p
."
+"Alice generates a secret integer x. She then calculates X = g^x mod"
+" p
."
msgstr ""
#: i2p2www/pages/site/docs/transport/ntcp.html:166
@@ -13667,7 +16463,8 @@ msgstr ""
#: i2p2www/pages/site/docs/transport/ntcp.html:173
#, python-format
msgid ""
-"The sessionKey is then used to exchange identities in Message 3 and Message 4.\n"
+"The sessionKey is then used to exchange identities in Message 3 "
+"and Message 4.\n"
"The exponent (x and y) length for the DH exchange is documented on the\n"
"cryptography page."
msgstr ""
@@ -13680,7 +16477,8 @@ msgstr ""
#, python-format
msgid ""
"This is the DH request. Alice already has Bob's\n"
-"Router Identity,\n"
+"Router "
+"Identity,\n"
"IP address, and port, as contained in his\n"
"Router Info,\n"
"which was published to the\n"
@@ -13760,7 +16558,8 @@ msgstr ""
#: i2p2www/pages/site/docs/transport/ntcp.html:312
#, python-format
msgid ""
-"48 bytes AES encrypted using the DH session key and\n"
+"48 bytes AES encrypted using the DH "
+"session key and\n"
" the last 16 bytes of Y as the IV"
msgstr ""
@@ -13776,8 +16575,8 @@ msgstr ""
#: i2p2www/pages/site/docs/transport/ntcp.html:326
msgid ""
-"This contains Alice's router identity, and a signature of the critical data."
-" Alice sends Bob:"
+"This contains Alice's router identity, and a signature of the critical "
+"data. Alice sends Bob:"
msgstr ""
#: i2p2www/pages/site/docs/transport/ntcp.html:360
@@ -13797,14 +16596,17 @@ msgstr ""
msgid ""
"the `Signature` of the following concatenated data:\n"
" X, Y, Bob's `RouterIdentity`, tsA, tsB.\n"
-" Alice signs it with the `SigningPrivateKey` associated with the `SigningPublicKey` in her `RouterIdentity`"
+" Alice signs it with the `SigningPrivateKey` associated with "
+"the `SigningPublicKey` in her `RouterIdentity`"
msgstr ""
#: i2p2www/pages/site/docs/transport/ntcp.html:389
#, python-format
msgid ""
-"448 bytes AES encrypted using the DH session key and\n"
-" the last 16 bytes of HXxorHI (i.e., the last 16 bytes of message #1) as the IV"
+"448 bytes AES encrypted using the DH"
+" session key and\n"
+" the last 16 bytes of HXxorHI (i.e., the last 16 bytes "
+"of message #1) as the IV"
msgstr ""
#: i2p2www/pages/site/docs/transport/ntcp.html:400
@@ -13819,8 +16621,8 @@ msgstr ""
#: i2p2www/pages/site/docs/transport/ntcp.html:406
msgid ""
-"Alice will use the last 16 bytes of the encrypted contents of this message "
-"as the IV for the next message."
+"Alice will use the last 16 bytes of the encrypted contents of this "
+"message as the IV for the next message."
msgstr ""
#: i2p2www/pages/site/docs/transport/ntcp.html:430
@@ -13835,15 +16637,19 @@ msgstr ""
msgid ""
"the `Signature` of the following concatenated data:\n"
" X, Y, Alice's `RouterIdentity`, tsA, tsB.\n"
-" Bob signs it with the `SigningPrivateKey` associated with the `SigningPublicKey` in his `RouterIdentity`"
+" Bob signs it with the `SigningPrivateKey` associated with "
+"the `SigningPublicKey` in his `RouterIdentity`"
msgstr ""
#: i2p2www/pages/site/docs/transport/ntcp.html:479
#, python-format
msgid ""
-"Data AES encrypted using the DH session key and\n"
-" the last 16 bytes of the encrypted contents of message #2 as the IV\n"
-" 48 bytes for a DSA signature, may vary for other signature types"
+"Data AES encrypted using the DH "
+"session key and\n"
+" the last 16 bytes of the encrypted contents of message "
+"#2 as the IV\n"
+" 48 bytes for a DSA signature, may vary for other "
+"signature types"
msgstr ""
#: i2p2www/pages/site/docs/transport/ntcp.html:488
@@ -13852,8 +16658,8 @@ msgstr ""
#: i2p2www/pages/site/docs/transport/ntcp.html:491
msgid ""
-"Bob will use the last 16 bytes of the encrypted contents of this message as "
-"the IV for the next message."
+"Bob will use the last 16 bytes of the encrypted contents of this message "
+"as the IV for the next message."
msgstr ""
#: i2p2www/pages/site/docs/transport/ntcp.html:506
@@ -13862,10 +16668,14 @@ msgstr ""
#: i2p2www/pages/site/docs/transport/ntcp.html:507
msgid ""
-"The connection is established, and standard or time sync messages may be exchanged.\n"
-"All subsequent messages are AES encrypted using the negotiated DH session key.\n"
-"Alice will use the last 16 bytes of the encrypted contents of message #3 as the next IV.\n"
-"Bob will use the last 16 bytes of the encrypted contents of message #4 as the next IV."
+"The connection is established, and standard or time sync messages may be "
+"exchanged.\n"
+"All subsequent messages are AES encrypted using the negotiated DH session"
+" key.\n"
+"Alice will use the last 16 bytes of the encrypted contents of message #3 "
+"as the next IV.\n"
+"Bob will use the last 16 bytes of the encrypted contents of message #4 as"
+" the next IV."
msgstr ""
#: i2p2www/pages/site/docs/transport/ntcp.html:516
@@ -13892,8 +16702,8 @@ msgstr ""
#: i2p2www/pages/site/docs/transport/ntcp.html:528
msgid ""
-"that many bytes making up the local router's IP address (as reached by the "
-"remote side)"
+"that many bytes making up the local router's IP address (as reached by "
+"the remote side)"
msgstr ""
#: i2p2www/pages/site/docs/transport/ntcp.html:529
@@ -13912,8 +16722,8 @@ msgstr ""
#: i2p2www/pages/site/docs/transport/ntcp.html:532
msgid ""
-"xor of the local router's identity hash and the SHA256 of bytes 32 through "
-"bytes 223"
+"xor of the local router's identity hash and the SHA256 of bytes 32 "
+"through bytes 223"
msgstr ""
#: i2p2www/pages/site/docs/transport/ntcp.html:535
@@ -13936,9 +16746,11 @@ msgstr ""
#: i2p2www/pages/site/docs/transport/ntcp.html:550
msgid ""
"A set of fixed packet sizes may be appropriate to further hide the data \n"
-"fragmentation to external adversaries, but the tunnel, garlic, and end to \n"
+"fragmentation to external adversaries, but the tunnel, garlic, and end to"
+" \n"
"end padding should be sufficient for most needs until then.\n"
-"However, there is currently no provision for padding beyond the next 16-byte boundary,\n"
+"However, there is currently no provision for padding beyond the next "
+"16-byte boundary,\n"
"to create a limited number of message sizes."
msgstr ""
@@ -13961,8 +16773,10 @@ msgstr ""
#: i2p2www/pages/site/docs/transport/ssu.html:7
#, python-format
msgid ""
-"SSU (also called \"UDP\" in much of the I2P documentation and user interfaces)\n"
-"is one of two transports currently implemented in I2P.\n"
+"SSU (also called \"UDP\" in much of the I2P documentation and user "
+"interfaces)\n"
+"is one of two transports currently "
+"implemented in I2P.\n"
"The other is NTCP."
msgstr ""
@@ -13970,14 +16784,17 @@ msgstr ""
msgid ""
"SSU is the newer of the two transports,\n"
"introduced in I2P release 0.6.\n"
-"In a standard I2P installation, the router uses both NTCP and SSU for outbound connections.\n"
+"In a standard I2P installation, the router uses both NTCP and SSU for "
+"outbound connections.\n"
"SSU-over-IPv6 is supported as of version 0.9.8."
msgstr ""
#: i2p2www/pages/site/docs/transport/ssu.html:20
msgid ""
-"SSU is called \"semireliable\" because it will repeatedly retransmit unacknowledged messages,\n"
-"but only up to a maximum number of times. After that, the message is dropped."
+"SSU is called \"semireliable\" because it will repeatedly retransmit "
+"unacknowledged messages,\n"
+"but only up to a maximum number of times. After that, the message is "
+"dropped."
msgstr ""
#: i2p2www/pages/site/docs/transport/ssu.html:25
@@ -13986,8 +16803,10 @@ msgstr ""
#: i2p2www/pages/site/docs/transport/ssu.html:27
msgid ""
-"Like the NTCP transport, SSU provides reliable, encrypted, connection-oriented, point-to-point data transport.\n"
-"Unique to SSU, it also provides IP detection and NAT traversal services, including:"
+"Like the NTCP transport, SSU provides reliable, encrypted, connection-"
+"oriented, point-to-point data transport.\n"
+"Unique to SSU, it also provides IP detection and NAT traversal services, "
+"including:"
msgstr ""
#: i2p2www/pages/site/docs/transport/ssu.html:33
@@ -14004,7 +16823,8 @@ msgstr ""
#: i2p2www/pages/site/docs/transport/ssu.html:35
msgid ""
-"Communication of firewall status and local IP, and changes to either to NTCP"
+"Communication of firewall status and local IP, and changes to either to "
+"NTCP"
msgstr ""
#: i2p2www/pages/site/docs/transport/ssu.html:47
@@ -14038,20 +16858,26 @@ msgid ""
"Packets are scheduled according to the router's policy, taking care\n"
"not to exceed the router's outbound capacity or to exceed the measured \n"
"capacity of the remote peer. The measured capacity operates along the\n"
-"lines of TCP's slow start and congestion avoidance, with additive increases\n"
-"to the sending capacity and multiplicative decreases in face of congestion.\n"
+"lines of TCP's slow start and congestion avoidance, with additive "
+"increases\n"
+"to the sending capacity and multiplicative decreases in face of "
+"congestion.\n"
"Unlike for TCP, routers may give up on some messages after\n"
-"a given period or number of retransmissions while continuing to transmit \n"
+"a given period or number of retransmissions while continuing to transmit"
+" \n"
"other messages."
msgstr ""
#: i2p2www/pages/site/docs/transport/ssu.html:95
msgid ""
"The congestion detection techniques vary from TCP as well, since each \n"
-"message has its own unique and nonsequential identifier, and each message\n"
-"has a limited size - at most, 32KB. To efficiently transmit this feedback\n"
+"message has its own unique and nonsequential identifier, and each message"
+"\n"
+"has a limited size - at most, 32KB. To efficiently transmit this "
+"feedback\n"
"to the sender, the receiver periodically includes a list of fully ACKed \n"
-"message identifiers and may also include bitfields for partially received\n"
+"message identifiers and may also include bitfields for partially received"
+"\n"
"messages, where each bit represents the reception of a fragment. If \n"
"duplicate fragments arrive, the message should be ACKed again, or if the\n"
"message has still not been fully received, the bitfield should be \n"
@@ -14061,7 +16887,8 @@ msgstr ""
#: i2p2www/pages/site/docs/transport/ssu.html:107
msgid ""
"The current implementation does not pad the packets to\n"
-"any particular size, but instead just places a single message fragment into\n"
+"any particular size, but instead just places a single message fragment "
+"into\n"
"a packet and sends it off (careful not to exceed the MTU)."
msgstr ""
@@ -14069,7 +16896,8 @@ msgstr ""
msgid ""
"As of router version 0.8.12,\n"
"two MTU values are used for IPv4: 620 and 1484.\n"
-"The MTU value is adjusted based on the percentage of packets that are retransmitted."
+"The MTU value is adjusted based on the percentage of packets that are "
+"retransmitted."
msgstr ""
#: i2p2www/pages/site/docs/transport/ssu.html:120
@@ -14088,8 +16916,10 @@ msgstr ""
#: i2p2www/pages/site/docs/transport/ssu.html:132
msgid ""
-"Based on measurements, 1492 fits nearly all reasonably small I2NP messages\n"
-"(larger I2NP messages may be up to 1900 to 4500 bytes, which isn't going to fit\n"
+"Based on measurements, 1492 fits nearly all reasonably small I2NP "
+"messages\n"
+"(larger I2NP messages may be up to 1900 to 4500 bytes, which isn't going "
+"to fit\n"
"into a live network MTU anyway)."
msgstr ""
@@ -14109,7 +16939,8 @@ msgstr ""
#: i2p2www/pages/site/docs/transport/ssu.html:150
msgid ""
-"As of release 0.9.2, if a router's network interface MTU is less than 1484,\n"
+"As of release 0.9.2, if a router's network interface MTU is less than "
+"1484,\n"
"it will publish that in the network database, and other routers should\n"
"honor that when a connection is established."
msgstr ""
@@ -14128,10 +16959,13 @@ msgstr ""
#: i2p2www/pages/site/docs/transport/ssu.html:163
msgid ""
"While the maximum message size is nominally 32KB, the practical\n"
-"limit differs. The protocol limits the number of fragments to 7 bits, or 128.\n"
-"The current implementation, however, limits each message to a maximum of 64 fragments,\n"
+"limit differs. The protocol limits the number of fragments to 7 bits, or "
+"128.\n"
+"The current implementation, however, limits each message to a maximum of "
+"64 fragments,\n"
"which is sufficient for 64 * 534 = 33.3 KB when using the 608 MTU.\n"
-"Due to overhead for bundled LeaseSets and session keys, the practical limit\n"
+"Due to overhead for bundled LeaseSets and session keys, the practical "
+"limit\n"
"at the application level is about 6KB lower, or about 26KB.\n"
"Further work is necessary to raise the UDP transport limit above 32KB.\n"
"For connections using the larger MTU, larger messages are possible."
@@ -14145,7 +16979,8 @@ msgstr ""
msgid ""
"All encryption used is AES256/CBC with 32 byte keys and 16 byte IVs.\n"
"When Alice originates a session with Bob,\n"
-"the MAC and session keys are negotiated as part of the DH exchange, and are then used\n"
+"the MAC and session keys are negotiated as part of the DH exchange, and "
+"are then used\n"
"for the HMAC and encryption, respectively. During the DH exchange, \n"
"Bob's publicly knowable introKey is used for the MAC and encryption."
msgstr ""
@@ -14162,7 +16997,8 @@ msgstr ""
#: i2p2www/pages/site/docs/transport/ssu.html:204
msgid ""
-"Upon receiving a message, the receiver checks the \"from\" IP address and port\n"
+"Upon receiving a message, the receiver checks the \"from\" IP address and"
+" port\n"
"with all established sessions - if there are matches,\n"
"that session's MAC keys are tested in the HMAC. If none\n"
"of those verify or if there are no matching IP addresses, the \n"
@@ -14252,7 +17088,8 @@ msgstr ""
#: i2p2www/pages/site/docs/transport/ssu.html:284
msgid ""
-"Direct session establishment is used when no third party is required for NAT traversal.\n"
+"Direct session establishment is used when no third party is required for "
+"NAT traversal.\n"
"The message sequence is as follows:"
msgstr ""
@@ -14272,8 +17109,10 @@ msgid ""
"After the SessionConfirmed message is received, Bob sends a small\n"
"DeliveryStatus message\n"
"as a confirmation.\n"
-"In this message, the 4-byte message ID is set to a random number, and the\n"
-"8-byte \"arrival time\" is set to the current network-wide ID, which is 2\n"
+"In this message, the 4-byte message ID is set to a random number, and the"
+"\n"
+"8-byte \"arrival time\" is set to the current network-wide ID, which is 2"
+"\n"
"(i.e. 0x0000000000000002)."
msgstr ""
@@ -14288,7 +17127,8 @@ msgstr ""
#: i2p2www/pages/site/docs/transport/ssu.html:322
msgid ""
-"It does not appear that the type of the status message or its contents matters.\n"
+"It does not appear that the type of the status message or its contents "
+"matters.\n"
"It was originally added becasue the DatabaseStore message was delayed\n"
"several seconds; since the store is now sent immediately, perhaps\n"
"the status message can be eliminated."
@@ -14297,7 +17137,8 @@ msgstr ""
#: i2p2www/pages/site/docs/transport/ssu.html:331
msgid ""
"Introduction keys are delivered through an external channel \n"
-"(the network database, where they are identical to the router Hash for now)\n"
+"(the network database, where they are identical to the router Hash for "
+"now)\n"
"and must be used when establishing a session key. For the indirect\n"
"address, the peer must first contact the relayhost and ask them for\n"
"an introduction to the peer known at that relayhost under the given\n"
@@ -14315,16 +17156,24 @@ msgid ""
"is necessary for efficient NAT traversal. Charlie, a router behind a\n"
"NAT or firewall which does not allow unsolicited inbound UDP packets,\n"
"first contacts a few peers, choosing some to serve as introducers. Each\n"
-"of these peers (Bob, Bill, Betty, etc) provide Charlie with an introduction\n"
-"tag - a 4 byte random number - which he then makes available to the public\n"
-"as methods of contacting him. Alice, a router who has Charlie's published\n"
-"contact methods, first sends a RelayRequest packet to one or more of the \n"
+"of these peers (Bob, Bill, Betty, etc) provide Charlie with an "
+"introduction\n"
+"tag - a 4 byte random number - which he then makes available to the "
+"public\n"
+"as methods of contacting him. Alice, a router who has Charlie's "
+"published\n"
+"contact methods, first sends a RelayRequest packet to one or more of the"
+" \n"
"introducers, asking each to introduce her to Charlie (offering the \n"
"introduction tag to identify Charlie). Bob then forwards a RelayIntro\n"
-"packet to Charlie including Alice's public IP and port number, then sends\n"
-"Alice back a RelayResponse packet containing Charlie's public IP and port\n"
-"number. When Charlie receives the RelayIntro packet, he sends off a small\n"
-"random packet to Alice's IP and port (poking a hole in his NAT/firewall),\n"
+"packet to Charlie including Alice's public IP and port number, then sends"
+"\n"
+"Alice back a RelayResponse packet containing Charlie's public IP and port"
+"\n"
+"number. When Charlie receives the RelayIntro packet, he sends off a "
+"small\n"
+"random packet to Alice's IP and port (poking a hole in his NAT/firewall),"
+"\n"
"and when Alice receives Bob's RelayResponse packet, she begins a new \n"
"full direction session establishment with the specified IP and port."
msgstr ""
@@ -14334,14 +17183,13 @@ msgid "Connection establishment (indirect using an introducer)"
msgstr ""
#: i2p2www/pages/site/docs/transport/ssu.html:374
-msgid ""
-"Alice first connects to introducer Bob, who relays the request to Charlie."
+msgid "Alice first connects to introducer Bob, who relays the request to Charlie."
msgstr ""
#: i2p2www/pages/site/docs/transport/ssu.html:392
msgid ""
-"After the hole punch, the session is established between Alice and Charlie "
-"as in a direct establishment."
+"After the hole punch, the session is established between Alice and "
+"Charlie as in a direct establishment."
msgstr ""
#: i2p2www/pages/site/docs/transport/ssu.html:404
@@ -14445,12 +17293,14 @@ msgstr ""
#: i2p2www/pages/site/docs/transport/ssu.html:510
#, python-format
msgid ""
-"The details of windowing, ACK, and retransmission strategies are not specified\n"
+"The details of windowing, ACK, and retransmission strategies are not "
+"specified\n"
"here. See the Java code for the current implementation.\n"
"During the establishment phase, and for peer testing, routers\n"
"should implement exponential backoff for retransmission.\n"
"For an established connection, routers should implement\n"
-"an adjustable transmission window, RTT estimate and timeout, similar to TCP\n"
+"an adjustable transmission window, RTT estimate and timeout, similar to "
+"TCP\n"
"or streaming.\n"
"See the code for initial, min and max parameters."
msgstr ""
@@ -14494,22 +17344,27 @@ msgstr ""
#: i2p2www/pages/site/docs/transport/ssu.html:556
msgid ""
-"Analysis of current SSU performance, including assessment of window size adjustment\n"
-"and other parameters, and adjustment of the protocol implementation to improve\n"
+"Analysis of current SSU performance, including assessment of window size "
+"adjustment\n"
+"and other parameters, and adjustment of the protocol implementation to "
+"improve\n"
"performance, is a topic for future work."
msgstr ""
#: i2p2www/pages/site/docs/transport/ssu.html:562
msgid ""
-"The current implementation repeatedly sends acknowledgments for the same packets,\n"
+"The current implementation repeatedly sends acknowledgments for the same "
+"packets,\n"
"which unnecessarily increases overhead."
msgstr ""
#: i2p2www/pages/site/docs/transport/ssu.html:567
msgid ""
-"The default small MTU value of 620 should be analyzed and possibly increased.\n"
+"The default small MTU value of 620 should be analyzed and possibly "
+"increased.\n"
"The current MTU adjustment strategy should be evaluated.\n"
-"Does a streaming lib 1730-byte packet fit in 3 small SSU packets? Probably not."
+"Does a streaming lib 1730-byte packet fit in 3 small SSU packets? "
+"Probably not."
msgstr ""
#: i2p2www/pages/site/docs/transport/ssu.html:573
@@ -14522,28 +17377,32 @@ msgstr ""
#: i2p2www/pages/site/docs/transport/ssu.html:581
msgid ""
-"The potential use of the 'challenge' fields in RelayIntro and RelayResponse,\n"
-"and use of the padding field in SessionRequest and SessionCreated, is undocumented."
+"The potential use of the 'challenge' fields in RelayIntro and "
+"RelayResponse,\n"
+"and use of the padding field in SessionRequest and SessionCreated, is "
+"undocumented."
msgstr ""
#: i2p2www/pages/site/docs/transport/ssu.html:586
msgid ""
"Instead of a single fragment per packet, a more efficient\n"
-"strategy may be to bundle multiple message fragments into the same packet,\n"
+"strategy may be to bundle multiple message fragments into the same "
+"packet,\n"
"so long as it doesn't exceed the MTU."
msgstr ""
#: i2p2www/pages/site/docs/transport/ssu.html:592
msgid ""
"A set of fixed packet sizes may be appropriate to further hide the data \n"
-"fragmentation to external adversaries, but the tunnel, garlic, and end to \n"
+"fragmentation to external adversaries, but the tunnel, garlic, and end to"
+" \n"
"end padding should be sufficient for most needs until then."
msgstr ""
#: i2p2www/pages/site/docs/transport/ssu.html:598
msgid ""
-"Why are introduction keys the same as the router hash, should it be changed,"
-" would there be any benefit?"
+"Why are introduction keys the same as the router hash, should it be "
+"changed, would there be any benefit?"
msgstr ""
#: i2p2www/pages/site/docs/transport/ssu.html:602
@@ -14552,8 +17411,8 @@ msgstr ""
#: i2p2www/pages/site/docs/transport/ssu.html:606
msgid ""
-"Signed-on times in SessionCreated and SessionConfirmed appear to be unused "
-"or unverified."
+"Signed-on times in SessionCreated and SessionConfirmed appear to be "
+"unused or unverified."
msgstr ""
#: i2p2www/pages/site/docs/transport/ssu.html:611
@@ -14563,7 +17422,8 @@ msgstr ""
#: i2p2www/pages/site/docs/transport/ssu.html:612
msgid ""
"This diagram\n"
-"should accurately reflect the current implementation, however there may be small differences."
+"should accurately reflect the current implementation, however there may "
+"be small differences."
msgstr ""
#: i2p2www/pages/site/docs/transport/ssu.html:620
@@ -14591,9 +17451,12 @@ msgid ""
"Within I2P, messages are passed in one direction through a virtual\n"
"tunnel of peers, using whatever means are available to pass the \n"
"message on to the next hop. Messages arrive at the tunnel's \n"
-"gateway, get bundled up and/or fragmented into fixed-size tunnel messages, \n"
-"and are forwarded on to the next hop in the tunnel, which processes and verifies\n"
-"the validity of the message and sends it on to the next hop, and so on, until\n"
+"gateway, get bundled up and/or fragmented into fixed-size tunnel "
+"messages, \n"
+"and are forwarded on to the next hop in the tunnel, which processes and "
+"verifies\n"
+"the validity of the message and sends it on to the next hop, and so on, "
+"until\n"
"it reaches the tunnel endpoint. That endpoint takes the messages\n"
"bundled up by the gateway and forwards them as instructed - either\n"
"to another router, to another tunnel on another router, or locally."
@@ -14615,9 +17478,12 @@ msgid ""
"in the tunnel, and provides each with the necessary configuration\n"
"data. They may have any number of hops.\n"
"It is the intent to make\n"
-"it hard for either participants or third parties to determine the length of \n"
-"a tunnel, or even for colluding participants to determine whether they are a\n"
-"part of the same tunnel at all (barring the situation where colluding peers are\n"
+"it hard for either participants or third parties to determine the length "
+"of \n"
+"a tunnel, or even for colluding participants to determine whether they "
+"are a\n"
+"part of the same tunnel at all (barring the situation where colluding "
+"peers are\n"
"next to each other in the tunnel)."
msgstr ""
@@ -14655,7 +17521,8 @@ msgstr ""
#: i2p2www/pages/site/docs/tunnels/implementation.html:69
#, python-format
msgid ""
-"After a tunnel is built, I2NP messages are processed and passed through it.\n"
+"After a tunnel is built, I2NP messages are "
+"processed and passed through it.\n"
"Tunnel operation has four distinct processes, taken on by various \n"
"peers in the tunnel."
msgstr ""
@@ -14682,7 +17549,8 @@ msgstr ""
#: i2p2www/pages/site/docs/tunnels/implementation.html:89
msgid ""
-"Eventually, the tunnel messages arrive at the endpoint where the I2NP messages\n"
+"Eventually, the tunnel messages arrive at the endpoint where the I2NP "
+"messages\n"
"originally bundled by the gateway are reassembled and forwarded on as \n"
"requested."
msgstr ""
@@ -14742,13 +17610,11 @@ msgid "Decrypt (using an encryption operation)"
msgstr ""
#: i2p2www/pages/site/docs/tunnels/implementation.html:133
-msgid ""
-"Decrypt (using an encryption operation) to reveal plaintext tunnel message"
+msgid "Decrypt (using an encryption operation) to reveal plaintext tunnel message"
msgstr ""
#: i2p2www/pages/site/docs/tunnels/implementation.html:134
-msgid ""
-"Reassemble Fragments, Forward as instructed to Inbound Gateway or Router"
+msgid "Reassemble Fragments, Forward as instructed to Inbound Gateway or Router"
msgstr ""
#: i2p2www/pages/site/docs/tunnels/implementation.html:142
@@ -14809,8 +17675,10 @@ msgstr ""
#: i2p2www/pages/site/docs/tunnels/implementation.html:181
msgid ""
"Tunnel IDs are 4 byte numbers used at each hop - participants know what\n"
-"tunnel ID to listen for messages with and what tunnel ID they should be forwarded\n"
-"on as to the next hop, and each hop chooses the tunnel ID which they receive messages\n"
+"tunnel ID to listen for messages with and what tunnel ID they should be "
+"forwarded\n"
+"on as to the next hop, and each hop chooses the tunnel ID which they "
+"receive messages\n"
"on. Tunnels themselves are short-lived (10 minutes).\n"
"Even if subsequent tunnels are built using the same sequence of \n"
"peers, each hop's tunnel ID will change."
@@ -14818,11 +17686,16 @@ msgstr ""
#: i2p2www/pages/site/docs/tunnels/implementation.html:190
msgid ""
-"To prevent adversaries from tagging the messages along the path by adjusting\n"
-"the message size, all tunnel messages are a fixed 1024 bytes in size. To accommodate \n"
-"larger I2NP messages as well as to support smaller ones more efficiently, the\n"
-"gateway splits up the larger I2NP messages into fragments contained within each\n"
-"tunnel message. The endpoint will attempt to rebuild the I2NP message from the\n"
+"To prevent adversaries from tagging the messages along the path by "
+"adjusting\n"
+"the message size, all tunnel messages are a fixed 1024 bytes in size. To"
+" accommodate \n"
+"larger I2NP messages as well as to support smaller ones more efficiently,"
+" the\n"
+"gateway splits up the larger I2NP messages into fragments contained "
+"within each\n"
+"tunnel message. The endpoint will attempt to rebuild the I2NP message "
+"from the\n"
"fragments for a short period of time, but will discard them as necessary."
msgstr ""
@@ -14839,20 +17712,30 @@ msgstr ""
#: i2p2www/pages/site/docs/tunnels/implementation.html:207
msgid ""
-"After the preprocessing of messages into a padded payload, the gateway builds\n"
-"a random 16 byte IV value, iteratively encrypting it and the tunnel message as\n"
-"necessary, and forwards the tuple {tunnelID, IV, encrypted tunnel message} to the next hop."
+"After the preprocessing of messages into a padded payload, the gateway "
+"builds\n"
+"a random 16 byte IV value, iteratively encrypting it and the tunnel "
+"message as\n"
+"necessary, and forwards the tuple {tunnelID, IV, encrypted tunnel "
+"message} to the next hop."
msgstr ""
#: i2p2www/pages/site/docs/tunnels/implementation.html:213
msgid ""
-"How encryption at the gateway is done depends on whether the tunnel is an\n"
-"inbound or an outbound tunnel. For inbound tunnels, they simply select a random\n"
-"IV, postprocessing and updating it to generate the IV for the gateway and using \n"
-"that IV along side their own layer key to encrypt the preprocessed data. For outbound \n"
-"tunnels they must iteratively decrypt the (unencrypted) IV and preprocessed \n"
-"data with the IV and layer keys for all hops in the tunnel. The result of the outbound\n"
-"tunnel encryption is that when each peer encrypts it, the endpoint will recover \n"
+"How encryption at the gateway is done depends on whether the tunnel is an"
+"\n"
+"inbound or an outbound tunnel. For inbound tunnels, they simply select a"
+" random\n"
+"IV, postprocessing and updating it to generate the IV for the gateway and"
+" using \n"
+"that IV along side their own layer key to encrypt the preprocessed data."
+" For outbound \n"
+"tunnels they must iteratively decrypt the (unencrypted) IV and "
+"preprocessed \n"
+"data with the IV and layer keys for all hops in the tunnel. The result "
+"of the outbound\n"
+"tunnel encryption is that when each peer encrypts it, the endpoint will "
+"recover \n"
"the initial preprocessed data."
msgstr ""
@@ -14862,29 +17745,46 @@ msgstr ""
#: i2p2www/pages/site/docs/tunnels/implementation.html:227
msgid ""
-"When a peer receives a tunnel message, it checks that the message came from\n"
-"the same previous hop as before (initialized when the first message comes through\n"
-"the tunnel). If the previous peer is a different router, or if the message has\n"
-"already been seen, the message is dropped. The participant then encrypts the \n"
-"received IV with AES256/ECB using their IV key to determine the current IV, uses \n"
-"that IV with the participant's layer key to encrypt the data, encrypts the \n"
-"current IV with AES256/ECB using their IV key again, then forwards the tuple \n"
-"{nextTunnelId, nextIV, encryptedData} to the next hop. This double encryption\n"
+"When a peer receives a tunnel message, it checks that the message came "
+"from\n"
+"the same previous hop as before (initialized when the first message comes"
+" through\n"
+"the tunnel). If the previous peer is a different router, or if the "
+"message has\n"
+"already been seen, the message is dropped. The participant then encrypts"
+" the \n"
+"received IV with AES256/ECB using their IV key to determine the current "
+"IV, uses \n"
+"that IV with the participant's layer key to encrypt the data, encrypts "
+"the \n"
+"current IV with AES256/ECB using their IV key again, then forwards the "
+"tuple \n"
+"{nextTunnelId, nextIV, encryptedData} to the next hop. This double "
+"encryption\n"
"of the IV (both before and after use) help address a certain class of\n"
"confirmation attacks."
msgstr ""
#: i2p2www/pages/site/docs/tunnels/implementation.html:243
msgid ""
-"Duplicate message detection is handled by a decaying Bloom filter on message\n"
-"IVs. Each router maintains a single Bloom filter to contain the XOR of the IV and\n"
-"the first block of the message received for all of the tunnels it is participating\n"
-"in, modified to drop seen entries after 10-20 minutes (when the tunnels will have\n"
-"expired). The size of the bloom filter and the parameters used are sufficient to\n"
-"more than saturate the router's network connection with a negligible chance of \n"
-"false positive. The unique value fed into the Bloom filter is the XOR of the IV \n"
-"and the first block so as to prevent nonsequential colluding peers in the tunnel \n"
-"from tagging a message by resending it with the IV and first block switched."
+"Duplicate message detection is handled by a decaying Bloom filter on "
+"message\n"
+"IVs. Each router maintains a single Bloom filter to contain the XOR of "
+"the IV and\n"
+"the first block of the message received for all of the tunnels it is "
+"participating\n"
+"in, modified to drop seen entries after 10-20 minutes (when the tunnels "
+"will have\n"
+"expired). The size of the bloom filter and the parameters used are "
+"sufficient to\n"
+"more than saturate the router's network connection with a negligible "
+"chance of \n"
+"false positive. The unique value fed into the Bloom filter is the XOR of"
+" the IV \n"
+"and the first block so as to prevent nonsequential colluding peers in the"
+" tunnel \n"
+"from tagging a message by resending it with the IV and first block "
+"switched."
msgstr ""
#: i2p2www/pages/site/docs/tunnels/implementation.html:256
@@ -14893,19 +17793,27 @@ msgstr ""
#: i2p2www/pages/site/docs/tunnels/implementation.html:258
msgid ""
-"After receiving and validating a tunnel message at the last hop in the tunnel,\n"
-"how the endpoint recovers the data encoded by the gateway depends upon whether \n"
-"the tunnel is an inbound or an outbound tunnel. For outbound tunnels, the \n"
-"endpoint encrypts the message with its layer key just like any other participant, \n"
-"exposing the preprocessed data. For inbound tunnels, the endpoint is also the \n"
-"tunnel creator so they can merely iteratively decrypt the IV and message, using the \n"
+"After receiving and validating a tunnel message at the last hop in the "
+"tunnel,\n"
+"how the endpoint recovers the data encoded by the gateway depends upon "
+"whether \n"
+"the tunnel is an inbound or an outbound tunnel. For outbound tunnels, "
+"the \n"
+"endpoint encrypts the message with its layer key just like any other "
+"participant, \n"
+"exposing the preprocessed data. For inbound tunnels, the endpoint is "
+"also the \n"
+"tunnel creator so they can merely iteratively decrypt the IV and message,"
+" using the \n"
"layer and IV keys of each step in reverse order."
msgstr ""
#: i2p2www/pages/site/docs/tunnels/implementation.html:268
msgid ""
-"At this point, the tunnel endpoint has the preprocessed data sent by the gateway,\n"
-"which it may then parse out into the included I2NP messages and forwards them as\n"
+"At this point, the tunnel endpoint has the preprocessed data sent by the "
+"gateway,\n"
+"which it may then parse out into the included I2NP messages and forwards "
+"them as\n"
"requested in their delivery instructions."
msgstr ""
@@ -14915,21 +17823,30 @@ msgstr ""
#: i2p2www/pages/site/docs/tunnels/implementation.html:277
msgid ""
-"When building a tunnel, the creator must send a request with the necessary\n"
-"configuration data to each of the hops and wait for all of them to agree before\n"
-"enabling the tunnel. The requests are encrypted so that only the peers who need\n"
-"to know a piece of information (such as the tunnel layer or IV key) has that\n"
-"data. In addition, only the tunnel creator will have access to the peer's\n"
-"reply. There are three important dimensions to keep in mind when producing\n"
-"the tunnels: what peers are used (and where), how the requests are sent (and \n"
+"When building a tunnel, the creator must send a request with the "
+"necessary\n"
+"configuration data to each of the hops and wait for all of them to agree "
+"before\n"
+"enabling the tunnel. The requests are encrypted so that only the peers "
+"who need\n"
+"to know a piece of information (such as the tunnel layer or IV key) has "
+"that\n"
+"data. In addition, only the tunnel creator will have access to the "
+"peer's\n"
+"reply. There are three important dimensions to keep in mind when "
+"producing\n"
+"the tunnels: what peers are used (and where), how the requests are sent "
+"(and \n"
"replies received), and how they are maintained."
msgstr ""
#: i2p2www/pages/site/docs/tunnels/implementation.html:291
msgid ""
-"Beyond the two types of tunnels - inbound and outbound - there are two styles\n"
+"Beyond the two types of tunnels - inbound and outbound - there are two "
+"styles\n"
"of peer selection used for different tunnels - exploratory and client.\n"
-"Exploratory tunnels are used for both network database maintenance and tunnel\n"
+"Exploratory tunnels are used for both network database maintenance and "
+"tunnel\n"
"maintenance, while client tunnels are used for end to end client messages."
msgstr ""
@@ -14939,12 +17856,18 @@ msgstr ""
#: i2p2www/pages/site/docs/tunnels/implementation.html:301
msgid ""
-"Exploratory tunnels are built out of a random selection of peers from a subset\n"
-"of the network. The particular subset varies on the local router and on what their\n"
-"tunnel routing needs are. In general, the exploratory tunnels are built out of\n"
-"randomly selected peers who are in the peer's \"not failing but active\" profile\n"
-"category. The secondary purpose of the tunnels, beyond merely tunnel routing,\n"
-"is to find underutilized high capacity peers so that they can be promoted for\n"
+"Exploratory tunnels are built out of a random selection of peers from a "
+"subset\n"
+"of the network. The particular subset varies on the local router and on "
+"what their\n"
+"tunnel routing needs are. In general, the exploratory tunnels are built "
+"out of\n"
+"randomly selected peers who are in the peer's \"not failing but active\" "
+"profile\n"
+"category. The secondary purpose of the tunnels, beyond merely tunnel "
+"routing,\n"
+"is to find underutilized high capacity peers so that they can be promoted"
+" for\n"
"use in client tunnels."
msgstr ""
@@ -14961,10 +17884,14 @@ msgstr ""
#: i2p2www/pages/site/docs/tunnels/implementation.html:319
msgid ""
-"Client tunnels are built with a more stringent set of requirements - the local\n"
-"router will select peers out of its \"fast and high capacity\" profile category so\n"
-"that performance and reliability will meet the needs of the client application.\n"
-"However, there are several important details beyond that basic selection that \n"
+"Client tunnels are built with a more stringent set of requirements - the "
+"local\n"
+"router will select peers out of its \"fast and high capacity\" profile "
+"category so\n"
+"that performance and reliability will meet the needs of the client "
+"application.\n"
+"However, there are several important details beyond that basic selection "
+"that \n"
"should be adhered to, depending upon the client's anonymity needs."
msgstr ""
@@ -14990,8 +17917,10 @@ msgstr ""
#: i2p2www/pages/site/docs/tunnels/implementation.html:341
msgid ""
"To frustrate the predecessor \n"
-"attack, the tunnel selection keeps the peers selected in a strict order -\n"
-"if A, B, and C are in a tunnel for a particular tunnel pool, the hop after A is always B, and the hop after\n"
+"attack, the tunnel selection keeps the peers selected in a strict order -"
+"\n"
+"if A, B, and C are in a tunnel for a particular tunnel pool, the hop "
+"after A is always B, and the hop after\n"
"B is always C."
msgstr ""
@@ -15000,15 +17929,18 @@ msgid ""
"Ordering is implemented by generating a random 32-byte key for each\n"
"tunnel pool at startup.\n"
"Peers should not be able to guess the ordering, or an attacker could\n"
-"craft two router hashes far apart to maximize the chance of being at both\n"
+"craft two router hashes far apart to maximize the chance of being at both"
+"\n"
"ends of a tunnel.\n"
"Peers are sorted by XOR distance of the\n"
-"SHA256 Hash of (the peer's hash concatenated with the random key) from the random key"
+"SHA256 Hash of (the peer's hash concatenated with the random key) from "
+"the random key"
msgstr ""
#: i2p2www/pages/site/docs/tunnels/implementation.html:363
msgid ""
-"Because each tunnel pool uses a different random key, ordering is consistent\n"
+"Because each tunnel pool uses a different random key, ordering is "
+"consistent\n"
"within a single pool but not between different pools.\n"
"New keys are generated at each router restart."
msgstr ""
@@ -15020,7 +17952,8 @@ msgstr ""
#: i2p2www/pages/site/docs/tunnels/implementation.html:372
#, python-format
msgid ""
-"A multi-hop tunnel is built using a single build message which is repeatedly\n"
+"A multi-hop tunnel is built using a single build message which is "
+"repeatedly\n"
"decrypted and forwarded. In the terminology of\n"
"Hashing it out in Public,\n"
"this is \"non-interactive\" telescopic tunnel building."
@@ -15031,28 +17964,38 @@ msgstr ""
msgid ""
"This tunnel request preparation, delivery, and response method is\n"
"designed to reduce the number of\n"
-"predecessors exposed, cuts the number of messages transmitted, verifies proper\n"
-"connectivity, and avoids the message counting attack of traditional telescopic\n"
+"predecessors exposed, cuts the number of messages transmitted, verifies "
+"proper\n"
+"connectivity, and avoids the message counting attack of traditional "
+"telescopic\n"
"tunnel creation.\n"
-"(This method, which sends messages to extend a tunnel through the already-established\n"
-"part of the tunnel, is termed \"interactive\" telescopic tunnel building in\n"
+"(This method, which sends messages to extend a tunnel through the "
+"already-established\n"
+"part of the tunnel, is termed \"interactive\" telescopic tunnel building "
+"in\n"
"the \"Hashing it out\" paper.)"
msgstr ""
#: i2p2www/pages/site/docs/tunnels/implementation.html:390
#, python-format
msgid ""
-"The details of tunnel request and response messages, and their encryption,\n"
+"The details of tunnel request and response messages, and their "
+"encryption,\n"
"are specified here."
msgstr ""
#: i2p2www/pages/site/docs/tunnels/implementation.html:395
msgid ""
-"Peers may reject tunnel creation requests for a variety of reasons, though\n"
-"a series of four increasingly severe rejections are known: probabilistic rejection\n"
-"(due to approaching the router's capacity, or in response to a flood of requests), \n"
-"transient overload, bandwidth overload, and critical failure. When received, \n"
-"those four are interpreted by the tunnel creator to help adjust their profile of\n"
+"Peers may reject tunnel creation requests for a variety of reasons, "
+"though\n"
+"a series of four increasingly severe rejections are known: probabilistic "
+"rejection\n"
+"(due to approaching the router's capacity, or in response to a flood of "
+"requests), \n"
+"transient overload, bandwidth overload, and critical failure. When "
+"received, \n"
+"those four are interpreted by the tunnel creator to help adjust their "
+"profile of\n"
"the router in question."
msgstr ""
@@ -15070,26 +18013,37 @@ msgstr ""
#: i2p2www/pages/site/docs/tunnels/implementation.html:412
#, python-format
msgid ""
-"To allow efficient operation, the router maintains a series of tunnel pools,\n"
-"each managing a group of tunnels used for a specific purpose with their own\n"
-"configuration. When a tunnel is needed for that purpose, the router selects one\n"
-"out of the appropriate pool at random. Overall, there are two exploratory tunnel\n"
-"pools - one inbound and one outbound - each using the router's default configuration.\n"
+"To allow efficient operation, the router maintains a series of tunnel "
+"pools,\n"
+"each managing a group of tunnels used for a specific purpose with their "
+"own\n"
+"configuration. When a tunnel is needed for that purpose, the router "
+"selects one\n"
+"out of the appropriate pool at random. Overall, there are two "
+"exploratory tunnel\n"
+"pools - one inbound and one outbound - each using the router's default "
+"configuration.\n"
"In addition, there is a pair of pools for each local destination -\n"
-"one inbound and one outbound tunnel pool. Those pools use the configuration specified\n"
-"when the local destination connects to the router via I2CP, or the router's defaults if\n"
+"one inbound and one outbound tunnel pool. Those pools use the "
+"configuration specified\n"
+"when the local destination connects to the router via I2CP, or the router's defaults if\n"
"not specified."
msgstr ""
#: i2p2www/pages/site/docs/tunnels/implementation.html:424
#, python-format
msgid ""
-"Each pool has within its configuration a few key settings, defining how many\n"
-"tunnels to keep active, how many backup tunnels to maintain in case of failure,\n"
+"Each pool has within its configuration a few key settings, defining how "
+"many\n"
+"tunnels to keep active, how many backup tunnels to maintain in case of "
+"failure,\n"
"how long the tunnels should be, whether those\n"
"lengths should be randomized, as \n"
-"well as any of the other settings allowed when configuring individual tunnels.\n"
-"Configuration options are specified on the I2CP page."
+"well as any of the other settings allowed when configuring individual "
+"tunnels.\n"
+"Configuration options are specified on the I2CP "
+"page."
msgstr ""
#: i2p2www/pages/site/docs/tunnels/implementation.html:434
@@ -15106,14 +18060,20 @@ msgstr ""
#: i2p2www/pages/site/docs/tunnels/implementation.html:440
msgid ""
-"Tunnel building is expensive, and tunnels expire a fixed time after they are built.\n"
-"However, when a pool that runs out of tunnels, the Destination is essentially dead.\n"
-"In addition, tunnel build success rate may vary greatly with both local and global\n"
+"Tunnel building is expensive, and tunnels expire a fixed time after they "
+"are built.\n"
+"However, when a pool that runs out of tunnels, the Destination is "
+"essentially dead.\n"
+"In addition, tunnel build success rate may vary greatly with both local "
+"and global\n"
"network conditions.\n"
-"Therefore, it is important to maintain an anticipatory, adaptive build strategy\n"
-"to ensure that new tunnels are successfully built before they are needed,\n"
+"Therefore, it is important to maintain an anticipatory, adaptive build "
+"strategy\n"
+"to ensure that new tunnels are successfully built before they are needed,"
+"\n"
"without building an excess of tunnels, building them too soon,\n"
-"or consuming too much CPU or bandwidth creating and sending the encrypted build messages."
+"or consuming too much CPU or bandwidth creating and sending the encrypted"
+" build messages."
msgstr ""
#: i2p2www/pages/site/docs/tunnels/implementation.html:451
@@ -15121,7 +18081,8 @@ msgid ""
"For each tuple {exploratory/client, in/out, length, length variance}\n"
"the router maintains statistics on the time required for a successful\n"
"tunnel build.\n"
-"Using these statistics, it calculates how long before a tunnel's expiration\n"
+"Using these statistics, it calculates how long before a tunnel's "
+"expiration\n"
"it should start attempting to build a replacement.\n"
"As the expiration time approaches without a successful replacement,\n"
"it starts multiple build attempts in parallel, and then\n"
@@ -15143,18 +18104,30 @@ msgstr ""
#: i2p2www/pages/site/docs/tunnels/implementation.html:473
msgid ""
-"Even though the tunnels within I2P bear a resemblance to a circuit switched\n"
-"network, everything within I2P is strictly message based - tunnels are merely\n"
-"accounting tricks to help organize the delivery of messages. No assumptions are\n"
-"made regarding reliability or ordering of messages, and retransmissions are left\n"
-"to higher levels (e.g. I2P's client layer streaming library). This allows I2P\n"
-"to take advantage of throttling techniques available to both packet switched and\n"
-"circuit switched networks. For instance, each router may keep track of the \n"
-"moving average of how much data each tunnel is using, combine that with all of \n"
-"the averages used by other tunnels the router is participating in, and be able\n"
-"to accept or reject additional tunnel participation requests based on its \n"
-"capacity and utilization. On the other hand, each router can simply drop \n"
-"messages that are beyond its capacity, exploiting the research used on the \n"
+"Even though the tunnels within I2P bear a resemblance to a circuit "
+"switched\n"
+"network, everything within I2P is strictly message based - tunnels are "
+"merely\n"
+"accounting tricks to help organize the delivery of messages. No "
+"assumptions are\n"
+"made regarding reliability or ordering of messages, and retransmissions "
+"are left\n"
+"to higher levels (e.g. I2P's client layer streaming library). This "
+"allows I2P\n"
+"to take advantage of throttling techniques available to both packet "
+"switched and\n"
+"circuit switched networks. For instance, each router may keep track of "
+"the \n"
+"moving average of how much data each tunnel is using, combine that with "
+"all of \n"
+"the averages used by other tunnels the router is participating in, and be"
+" able\n"
+"to accept or reject additional tunnel participation requests based on its"
+" \n"
+"capacity and utilization. On the other hand, each router can simply drop"
+" \n"
+"messages that are beyond its capacity, exploiting the research used on "
+"the \n"
"normal Internet."
msgstr ""
@@ -15162,16 +18135,23 @@ msgstr ""
msgid ""
"In the current implementation, routers implement a\n"
"weighted random early discard (WRED) strategy.\n"
-"For all participating routers (internal participant, inbound gateway, and outbound endpoint),\n"
+"For all participating routers (internal participant, inbound gateway, and"
+" outbound endpoint),\n"
"the router will start randomly dropping a portion of messages as the\n"
"bandwidth limits are approached.\n"
-"As traffic gets closer to, or exceeds, the limits, more messages are dropped.\n"
-"For an internal participant, all messages are fragmented and padded and therefore are the same size.\n"
-"At the inbound gateway and outbound endpoint, however, the dropping decision is made\n"
-"on the full (coalesced) message, and the message size is taken into account.\n"
+"As traffic gets closer to, or exceeds, the limits, more messages are "
+"dropped.\n"
+"For an internal participant, all messages are fragmented and padded and "
+"therefore are the same size.\n"
+"At the inbound gateway and outbound endpoint, however, the dropping "
+"decision is made\n"
+"on the full (coalesced) message, and the message size is taken into "
+"account.\n"
"Larger messages are more likely to be dropped.\n"
-"Also, messages are more likely to be dropped at the outbound endpoint than the inbound gateway,\n"
-"as those messages are not as \"far along\" in their journey and thus the network cost of\n"
+"Also, messages are more likely to be dropped at the outbound endpoint "
+"than the inbound gateway,\n"
+"as those messages are not as \"far along\" in their journey and thus the "
+"network cost of\n"
"dropping those messages is lower."
msgstr ""
@@ -15181,11 +18161,16 @@ msgstr ""
#: i2p2www/pages/site/docs/tunnels/implementation.html:509
msgid ""
-"What strategies could be used at the gateway and at each hop for delaying,\n"
-"reordering, rerouting, or padding messages? To what extent should this be done\n"
-"automatically, how much should be configured as a per tunnel or per hop setting,\n"
-"and how should the tunnel's creator (and in turn, user) control this operation?\n"
-"All of this is left as unknown, to be worked out for a distant future release."
+"What strategies could be used at the gateway and at each hop for "
+"delaying,\n"
+"reordering, rerouting, or padding messages? To what extent should this "
+"be done\n"
+"automatically, how much should be configured as a per tunnel or per hop "
+"setting,\n"
+"and how should the tunnel's creator (and in turn, user) control this "
+"operation?\n"
+"All of this is left as unknown, to be worked out for a distant future "
+"release."
msgstr ""
#: i2p2www/pages/site/docs/tunnels/implementation.html:518
@@ -15194,10 +18179,13 @@ msgstr ""
#: i2p2www/pages/site/docs/tunnels/implementation.html:519
msgid ""
-"The padding strategies can be used on a variety of levels, addressing the\n"
+"The padding strategies can be used on a variety of levels, addressing the"
+"\n"
"exposure of message size information to different adversaries.\n"
-"The current fixed tunnel message size is 1024 bytes. Within this however, the fragmented\n"
-"messages themselves are not padded by the tunnel at all, though for end to end \n"
+"The current fixed tunnel message size is 1024 bytes. Within this "
+"however, the fragmented\n"
+"messages themselves are not padded by the tunnel at all, though for end "
+"to end \n"
"messages, they may be padded as part of the garlic wrapping."
msgstr ""
@@ -15221,7 +18209,8 @@ msgstr ""
#: i2p2www/pages/site/docs/tunnels/unidirectional.html:7
msgid ""
-"This page describes the origins and design of I2P's unidirectional tunnels.\n"
+"This page describes the origins and design of I2P's unidirectional "
+"tunnels.\n"
"For further infomrmation see:"
msgstr ""
@@ -15255,7 +18244,8 @@ msgid ""
"Several apps and protocols, notably HTTP,\n"
"do transfer data in such manner. Having the traffic follow the same \n"
"route to its destination and back could make it easier for an \n"
-"attacker who has only timing and traffic volume data to infer the path a \n"
+"attacker who has only timing and traffic volume data to infer the path a"
+" \n"
"tunnel is taking.\n"
"Having the response come back along a different path arguably \n"
"makes it harder."
@@ -15264,27 +18254,42 @@ msgstr ""
#: i2p2www/pages/site/docs/tunnels/unidirectional.html:45
msgid ""
"When dealing with \n"
-"an internal adversary or most external adversaries, I2P's undirectional tunnels\n"
-"expose half as much traffic data than would be exposed with bidirectional circuits\n"
-"by simply looking at the flows themselves - an HTTP request and response would \n"
-"follow the same path in Tor, while in I2P the packets making up the request \n"
-"would go out through one or more outbound tunnels and the packets making up \n"
-"the response would come back through one or more different inbound tunnels."
+"an internal adversary or most external adversaries, I2P's undirectional "
+"tunnels\n"
+"expose half as much traffic data than would be exposed with bidirectional"
+" circuits\n"
+"by simply looking at the flows themselves - an HTTP request and response "
+"would \n"
+"follow the same path in Tor, while in I2P the packets making up the "
+"request \n"
+"would go out through one or more outbound tunnels and the packets making "
+"up \n"
+"the response would come back through one or more different inbound "
+"tunnels."
msgstr ""
#: i2p2www/pages/site/docs/tunnels/unidirectional.html:55
msgid ""
"The strategy of using two separate tunnels for inbound and outbound\n"
-"communication is not the only technique available, and it does have anonymity\n"
-"implications. On the positive side, by using separate tunnels it lessens the\n"
-"traffic data exposed for analysis to participants in a tunnel - for instance,\n"
-"peers in an outbound tunnel from a web browser would only see the traffic of\n"
+"communication is not the only technique available, and it does have "
+"anonymity\n"
+"implications. On the positive side, by using separate tunnels it lessens"
+" the\n"
+"traffic data exposed for analysis to participants in a tunnel - for "
+"instance,\n"
+"peers in an outbound tunnel from a web browser would only see the traffic"
+" of\n"
"an HTTP GET, while the peers in an inbound tunnel would see the payload \n"
-"delivered along the tunnel. With bidirectional tunnels, all participants would\n"
-"have access to the fact that e.g. 1KB was sent in one direction, then 100KB\n"
-"in the other. On the negative side, using unidirectional tunnels means that\n"
-"there are two sets of peers which need to be profiled and accounted for, and\n"
-"additional care must be taken to address the increased speed of predecessor\n"
+"delivered along the tunnel. With bidirectional tunnels, all participants"
+" would\n"
+"have access to the fact that e.g. 1KB was sent in one direction, then "
+"100KB\n"
+"in the other. On the negative side, using unidirectional tunnels means "
+"that\n"
+"there are two sets of peers which need to be profiled and accounted for, "
+"and\n"
+"additional care must be taken to address the increased speed of "
+"predecessor\n"
"attacks. The tunnel pooling and building process\n"
"(peer selection and ordering strategies)\n"
"should minimize the worries of the predecessor attack."
@@ -15298,22 +18303,28 @@ msgstr ""
#, python-format
msgid ""
"A recent paper by Hermann and Grothoff\n"
-"declared that I2P's unidirectional tunnels \"seems to be a bad design decision\"."
+"declared that I2P's unidirectional tunnels \"seems to be a bad design "
+"decision\"."
msgstr ""
#: i2p2www/pages/site/docs/tunnels/unidirectional.html:80
msgid ""
"The paper's main point is that\n"
-"deanonymizations on unidirectional tunnels take a longer time, which is an \n"
-"advantage, but that an attacker can be more certain in the unidirectional case. \n"
-"Therefore, the paper claims it isn't an advantage at all, but a disadvantage, at least\n"
+"deanonymizations on unidirectional tunnels take a longer time, which is "
+"an \n"
+"advantage, but that an attacker can be more certain in the unidirectional"
+" case. \n"
+"Therefore, the paper claims it isn't an advantage at all, but a "
+"disadvantage, at least\n"
"with long-living eepsites."
msgstr ""
#: i2p2www/pages/site/docs/tunnels/unidirectional.html:88
msgid ""
-"This conclusion is not fully supported by the paper. Unidirectional tunnels clearly \n"
-"mitigate other attacks and it's not clear how to trade off the risk of the \n"
+"This conclusion is not fully supported by the paper. Unidirectional "
+"tunnels clearly \n"
+"mitigate other attacks and it's not clear how to trade off the risk of "
+"the \n"
"attack in the paper\n"
"with attacks on a bidirectional tunnel architecture."
msgstr ""
@@ -15322,45 +18333,63 @@ msgstr ""
msgid ""
"This conclusion is based on an arbitrary certainty vs. time weighting \n"
"(tradeoff) that may not be applicable in all cases. For \n"
-"example, somebody could make a list of possible IPs then issue subpoenas to \n"
+"example, somebody could make a list of possible IPs then issue subpoenas "
+"to \n"
"each. Or the attacker could DDoS each in turn and via a simple \n"
-"intersection attack see if the eepsite goes down or is slowed down. So close \n"
+"intersection attack see if the eepsite goes down or is slowed down. So "
+"close \n"
"may be good enough, or time may be more important."
msgstr ""
#: i2p2www/pages/site/docs/tunnels/unidirectional.html:104
msgid ""
-"The conclusion is based on a specific weighting of the importance of certainty \n"
-"vs. time, and that weighting may be wrong, and it's definitely debatable, \n"
-"especially in a real world with subpoenas, search warrants, and other methods \n"
+"The conclusion is based on a specific weighting of the importance of "
+"certainty \n"
+"vs. time, and that weighting may be wrong, and it's definitely debatable,"
+" \n"
+"especially in a real world with subpoenas, search warrants, and other "
+"methods \n"
"available for final confirmation."
msgstr ""
#: i2p2www/pages/site/docs/tunnels/unidirectional.html:111
msgid ""
"A full analysis of the tradeoffs of unidirectional vs. bidirectional \n"
-"tunnels is clearly outside the scope of the paper, and has not been done \n"
-"elsewhere. For example, how does this attack compare to the numerous possible \n"
-"timing attacks published about onion-routed networks? Clearly the authors have not\n"
+"tunnels is clearly outside the scope of the paper, and has not been done"
+" \n"
+"elsewhere. For example, how does this attack compare to the numerous "
+"possible \n"
+"timing attacks published about onion-routed networks? Clearly the authors"
+" have not\n"
"done that analysis, if it's even possible to do it\n"
"effectively."
msgstr ""
#: i2p2www/pages/site/docs/tunnels/unidirectional.html:120
msgid ""
-"Tor uses bidirectional tunnels and has had a lot of academic review. I2P \n"
-"uses unidirectional tunnels and has had very little review. Does the lack of a \n"
-"research paper defending unidirectional tunnels mean that it is a poor design \n"
+"Tor uses bidirectional tunnels and has had a lot of academic review. I2P"
+" \n"
+"uses unidirectional tunnels and has had very little review. Does the lack"
+" of a \n"
+"research paper defending unidirectional tunnels mean that it is a poor "
+"design \n"
"choice, or just that it needs more study? Timing attacks and \n"
-"distributed attacks are difficult to defend against in both I2P and Tor. The \n"
-"design intent (see references above) was that unidirectional tunnels are more \n"
-"resistant to timing attacks. However, the paper presents a somewhat different type of timing \n"
+"distributed attacks are difficult to defend against in both I2P and Tor. "
+"The \n"
+"design intent (see references above) was that unidirectional tunnels are "
+"more \n"
+"resistant to timing attacks. However, the paper presents a somewhat "
+"different type of timing \n"
"attack. Is this attack, innovative as it is, sufficient to label I2P's \n"
"tunnel architecture (and thus I2P as a whole) a \"bad design\", and by \n"
-"implication clearly inferior to Tor, or is it just a design alternative that \n"
-"clearly needs further investigation and analysis? There are several other reasons \n"
-"to consider I2P currently inferior to Tor and other projects (small network \n"
-"size, lack of funding, lack of review) but is unidirectional tunnels really a \n"
+"implication clearly inferior to Tor, or is it just a design alternative "
+"that \n"
+"clearly needs further investigation and analysis? There are several other"
+" reasons \n"
+"to consider I2P currently inferior to Tor and other projects (small "
+"network \n"
+"size, lack of funding, lack of review) but is unidirectional tunnels "
+"really a \n"
"reason?"
msgstr ""
@@ -15371,3 +18400,4 @@ msgid ""
"tunnels are unequivocally inferior to bidirectional tunnels\", yet this \n"
"conclusion is not supported by the paper."
msgstr ""
+
diff --git a/i2p2www/translations/ru/LC_MESSAGES/get-involved.po b/i2p2www/translations/ru/LC_MESSAGES/get-involved.po
index b91e018f..1cc33dec 100644
--- a/i2p2www/translations/ru/LC_MESSAGES/get-involved.po
+++ b/i2p2www/translations/ru/LC_MESSAGES/get-involved.po
@@ -1,7 +1,7 @@
-# Translations template for I2P.
+# Russian translations for I2P.
# Copyright (C) 2014 ORGANIZATION
# This file is distributed under the same license as the I2P project.
-#
+#
# Translators:
# Aleksey Orekhov i2p.i2p
) has been set up to "
-"enable developers to easily set up two of the commonly-used IDEs for Java "
-"development: Eclipse and NetBeans."
-msgstr "Главная ветка разработки I2P (i2p.i2p
) была создана для того чтобы разработчики могли легко установить один из двух часто используемых IDE для Java разработки: Eclipse и NetBeans."
+"The main I2P development branch (i2p.i2p
) has been set up to"
+" enable developers to easily set up two of the commonly-used IDEs for "
+"Java development: Eclipse and NetBeans."
+msgstr ""
+"Главная ветка разработки I2P (i2p.i2p
) была создана для того"
+" чтобы разработчики могли легко установить один из двух часто "
+"используемых IDE для Java разработки: Eclipse и NetBeans."
#: i2p2www/pages/site/get-involved/guides/ides.html:10
msgid ""
-"The main I2P development branches (i2p.i2p
and branches from "
-"it) contain .project and .classpath Eclipse files, to enable the branch to "
-"be easily set up in Eclipse."
-msgstr "Главные ветки разработки I2P (i2p.i2p
и ее подветки) содержат файлы Eclipse .project и .classpath для легкого добавления веток в Eclipse."
+"The main I2P development branches (i2p.i2p
and branches from"
+" it) contain .project and .classpath Eclipse files, to enable the branch "
+"to be easily set up in Eclipse."
+msgstr ""
+"Главные ветки разработки I2P (i2p.i2p
и ее подветки) "
+"содержат файлы Eclipse .project и .classpath для легкого добавления веток"
+" в Eclipse."
#: i2p2www/pages/site/get-involved/guides/ides.html:16
msgid ""
"Check out the I2P branch into some directory (e.g. "
"$HOME/dev/i2p.i2p
)."
-msgstr "Извлеките ветку I2P в какую-нибудь директорию (например, $HOME/dev/i2p.i2p
)."
+msgstr ""
+"Извлеките ветку I2P в какую-нибудь директорию (например, "
+"$HOME/dev/i2p.i2p
)."
#: i2p2www/pages/site/get-involved/guides/ides.html:20
msgid ""
-"Open Eclipse and create a new Workspace, based in the directory that the I2P"
-" branch was checked out to."
-msgstr "Откройте Eclipse и создайте новый Workspace для директории, в которую вы извлекли ветку I2P."
+"Open Eclipse and create a new Workspace, based in the directory that the "
+"I2P branch was checked out to."
+msgstr ""
+"Откройте Eclipse и создайте новый Workspace для директории, в которую вы "
+"извлекли ветку I2P."
#: i2p2www/pages/site/get-involved/guides/ides.html:24
msgid ""
"Select \"File - Import...\" and then under \"General\" select \"Existing "
"Projects into Workspace\"."
-msgstr "Выберите \"File - Import...\" и в разделе \"General\" выберите \"Existing Projects into Workspace\"."
+msgstr ""
+"Выберите \"File - Import...\" и в разделе \"General\" выберите \"Existing"
+" Projects into Workspace\"."
#: i2p2www/pages/site/get-involved/guides/ides.html:28
msgid ""
-"For \"Select root directory:\" choose the directory that the I2P branch was "
-"checked out to."
-msgstr "Для опции \"Select root directory:\" выберите директорию, в которую вы извлекли ветку I2P."
+"For \"Select root directory:\" choose the directory that the I2P branch "
+"was checked out to."
+msgstr ""
+"Для опции \"Select root directory:\" выберите директорию, в которую вы "
+"извлекли ветку I2P."
#: i2p2www/pages/site/get-involved/guides/ides.html:32
msgid "If necessary, click \"Refresh\" to refresh the list of projects."
@@ -2353,15 +3600,19 @@ msgstr "Выберите каждый проект в списке и нажми
#: i2p2www/pages/site/get-involved/guides/ides.html:40
msgid ""
-"Done! Your workspace should now contain all projects within the I2P branch, "
-"and their build dependencies should be correctly set up."
-msgstr "Готово! Ваш workspace теперь должен содержать все проекты из ветки I2P, и его зависимости сборки должны быть корректно установлены."
+"Done! Your workspace should now contain all projects within the I2P "
+"branch, and their build dependencies should be correctly set up."
+msgstr ""
+"Готово! Ваш workspace теперь должен содержать все проекты из ветки I2P, и"
+" его зависимости сборки должны быть корректно установлены."
#: i2p2www/pages/site/get-involved/guides/ides.html:48
msgid ""
-"The main I2P development branches (i2p.i2p
and branches from "
-"it) contain NetBeans project files."
-msgstr "Главные ветки разработки I2P (i2p.i2p
его его подветки) содержит файлы проекта NetBeans."
+"The main I2P development branches (i2p.i2p
and branches from"
+" it) contain NetBeans project files."
+msgstr ""
+"Главные ветки разработки I2P (i2p.i2p
его его подветки) "
+"содержит файлы проекта NetBeans."
#: i2p2www/pages/site/get-involved/guides/monotone.html:2
msgid "Monotone Guide"
@@ -2395,7 +3646,9 @@ msgstr "Установка ловушек оценки доверия"
msgid ""
"Pulling the i2p.i2p
, i2p.www
and "
"i2p.syndie
branches"
-msgstr "Получение веток i2p.i2p
, i2p.www
и i2p.syndie
"
+msgstr ""
+"Получение веток i2p.i2p
, i2p.www
и "
+"i2p.syndie
"
#: i2p2www/pages/site/get-involved/guides/monotone.html:14
#: i2p2www/pages/site/get-involved/guides/monotone.html:312
@@ -2439,28 +3692,56 @@ msgstr "Различия под Debian GNU/Linux"
#: i2p2www/pages/site/get-involved/guides/monotone.html:32
#, python-format
msgid ""
-"This is a revised version of Complication's original\n"
+"This is a revised version of Complication's original\n"
" guide detailing the use of Monotone in I2P development.\n"
-" For basic instructions see the quick-start guide."
-msgstr "Это проверенная версия Оригинального руководства \nComplication, поясняющего использование Monotone в разработке I2P.\nОсновные инструкции смотри в руководстве по быстрому старту."
+" For basic instructions see the quick-start "
+"guide."
+msgstr ""
+"Это проверенная версия Оригинального "
+"руководства \n"
+"Complication, поясняющего использование Monotone в разработке I2P.\n"
+"Основные инструкции смотри в руководстве по "
+"быстрому старту."
#: i2p2www/pages/site/get-involved/guides/monotone.html:40
#, python-format
msgid ""
-"I2P has a distributed development model. The source code is replicated across\n"
-" independently administered Monotone (\"MTN\") repositories.\n"
-" Developers with commit rights are able to push their changes to the repository\n"
-" (a license agreement needs to be signed\n"
+"I2P has a distributed development model. The source code is replicated "
+"across\n"
+" independently administered Monotone (\"MTN\") repositories.\n"
+" Developers with commit rights are able to push their changes to the "
+"repository\n"
+" (a license agreement needs to be "
+"signed\n"
" before commit rights are granted)."
-msgstr "В I2P используется распределенная модель разработки. Исходный код реплицируется \nпо независимо администрируемым хранилищам Monotone (\"MTN\").\nРазработчики с правами фиксации могут размещать свои изменения в хранилище\n(необходимо подписать лицензионное соглашение \nдо того как будут выданы права для фиксации)."
+msgstr ""
+"В I2P используется распределенная модель разработки. Исходный код "
+"реплицируется \n"
+"по независимо администрируемым хранилищам Monotone (\"MTN\").\n"
+"Разработчики с правами фиксации могут размещать свои изменения в "
+"хранилище\n"
+"(необходимо подписать лицензионное "
+"соглашение \n"
+"до того как будут выданы права для фиксации)."
#: i2p2www/pages/site/get-involved/guides/monotone.html:50
msgid ""
"Some of Monotone's noteworthy qualities are: distributed\n"
-" version control, cryptographic authentication, access control, its small size, having few\n"
-" dependencies, storage of projects in a compressed SQLite database file, and\n"
+" version control, cryptographic authentication, access control, its "
+"small size, having few\n"
+" dependencies, storage of projects in a compressed SQLite database file,"
+" and\n"
" having the ability to resume interrupted synchronization attempts."
-msgstr "Некоторые из замечательных качеств Monotone: распределенный\nконтроль версий, криптографическая аутентификация, контроль доступа, малый размер, малое\nколичество зависимостей, хранение проектов в сжатом файле базы данных SQLite и \nналичие возможности восстанавливать прерванные попытки синхронизации."
+msgstr ""
+"Некоторые из замечательных качеств Monotone: распределенный\n"
+"контроль версий, криптографическая аутентификация, контроль доступа, "
+"малый размер, малое\n"
+"количество зависимостей, хранение проектов в сжатом файле базы данных "
+"SQLite и \n"
+"наличие возможности восстанавливать прерванные попытки синхронизации."
#: i2p2www/pages/site/get-involved/guides/monotone.html:59
msgid "Operating a Monotone Client"
@@ -2468,20 +3749,37 @@ msgstr "Управление клиентом Monotone"
#: i2p2www/pages/site/get-involved/guides/monotone.html:64
msgid ""
-"A transport key grants you the ability to push your changes to a Monotone repository server.\n"
-" In order to commit code into Monotone (in essence signing your code), a commit key is also needed.\n"
-" None of the public Monotone servers on I2P currently require a key in order to read (or pull) the source code."
-msgstr "Transport ключ дает вам возможность размещать ваши изменения в хранилище сервера Monotone.\nДля фиксации кода в Monotone (по сути, для подписания вашего кода), также нужен commit ключ.\nНи один из публичных серверов Monotone в I2P на данный момент не требует ключ для чтения (или получения) исходного кода."
+"A transport key grants you the ability to push your changes to a Monotone"
+" repository server.\n"
+" In order to commit code into Monotone (in essence signing your code), a"
+" commit key is also needed.\n"
+" None of the public Monotone servers on I2P currently require a key in "
+"order to read (or pull) the source code."
+msgstr ""
+"Transport ключ дает вам возможность размещать ваши изменения в хранилище "
+"сервера Monotone.\n"
+"Для фиксации кода в Monotone (по сути, для подписания вашего кода), также"
+" нужен commit ключ.\n"
+"Ни один из публичных серверов Monotone в I2P на данный момент не требует "
+"ключ для чтения (или получения) исходного кода."
#: i2p2www/pages/site/get-involved/guides/monotone.html:72
msgid ""
"Without a transport key, one cannot:\n"
" $HOME/.monotone/keys
in text files which\n"
+"Monotone stores keys under $HOME/.monotone/keys
in "
+"text files which\n"
" are named identically to the keys. For example:"
-msgstr "Monotone хранит ключи в $HOME/.monotone/keys
в текстовых файлах, которые \nназваны также как ключи. Например:"
+msgstr ""
+"Monotone хранит ключи в $HOME/.monotone/keys
в "
+"текстовых файлах, которые \n"
+"названы также как ключи. Например:"
#: i2p2www/pages/site/get-involved/guides/monotone.html:121
msgid ""
"To generate transport and commit keys, enter the following commands at a "
"prompt:"
-msgstr "Для генерации transport и commit ключей выполните следующие команды в командной строке:"
+msgstr ""
+"Для генерации transport и commit ключей выполните следующие команды в "
+"командной строке:"
#: i2p2www/pages/site/get-involved/guides/monotone.html:131
msgid ""
-"Monotone will prompt you for a password to protect your keys. You are very strongly encouraged to set a password\n"
-" for the commit key. Many users will leave an empty password for the transport key, especially those running a\n"
+"Monotone will prompt you for a password to protect your keys. You are "
+"very strongly encouraged to set a password\n"
+" for the commit key. Many users will leave an empty password for the "
+"transport key, especially those running a\n"
" Monotone server."
-msgstr "Monotone запросит у вас пароль для защиты ваших ключей. Вам настоятельно рекомендуется установить пароль \nдля commit ключа. Большинство пользователей оставляют пустым пароль для transport ключа, особенно те, кто \nзапускает сервер Monotone."
+msgstr ""
+"Monotone запросит у вас пароль для защиты ваших ключей. Вам настоятельно "
+"рекомендуется установить пароль \n"
+"для commit ключа. Большинство пользователей оставляют пустым пароль для "
+"transport ключа, особенно те, кто \n"
+"запускает сервер Monotone."
#: i2p2www/pages/site/get-involved/guides/monotone.html:139
msgid "Trust, and initializing your repository"
@@ -2529,32 +3854,60 @@ msgstr "Доверие и инициализация вашего хранили
#: i2p2www/pages/site/get-involved/guides/monotone.html:143
msgid ""
-"Monotone's security model helps to ensure that nobody can easily impersonate a developer without\n"
-" it being noticed. Since developers can make mistakes and become compromised,only manual review can\n"
-" ensure quality of code. Monotone's trust model will ensure that you read the right diffs. It does\n"
+"Monotone's security model helps to ensure that nobody can easily "
+"impersonate a developer without\n"
+" it being noticed. Since developers can make mistakes and become "
+"compromised,only manual review can\n"
+" ensure quality of code. Monotone's trust model will ensure that you "
+"read the right diffs. It does\n"
" not replace reading diffs."
-msgstr "Модель безопасности Monotone помогает быть уверенным в том, что никто не может запросто выдать себя за разработчика, \nбез того, чтобы он был уведомлен. Т.к. разработчики могут совершать ошибки и быть скомпрометированы, то только ручной пересмотр \nпоможет убедиться в качестве кода. Модель доверия Monotone обязывает вас следить за изменением прав. \nЧто не является заменой чтения изменений."
+msgstr ""
+"Модель безопасности Monotone помогает быть уверенным в том, что никто не "
+"может запросто выдать себя за разработчика, \n"
+"без того, чтобы он был уведомлен. Т.к. разработчики могут совершать "
+"ошибки и быть скомпрометированы, то только ручной пересмотр \n"
+"поможет убедиться в качестве кода. Модель доверия Monotone обязывает вас "
+"следить за изменением прав. \n"
+"Что не является заменой чтения изменений."
#: i2p2www/pages/site/get-involved/guides/monotone.html:153
msgid ""
-"A Monotone repository is a single file (a compressed SQLite database) which "
-"contains all of the project's source code and history."
-msgstr "Хранилище Monotone это один файл (сжатая база данных SQLite), который содержит исходный код всех проектов и историю."
+"A Monotone repository is a single file (a compressed SQLite database) "
+"which contains all of the project's source code and history."
+msgstr ""
+"Хранилище Monotone это один файл (сжатая база данных SQLite), который "
+"содержит исходный код всех проектов и историю."
#: i2p2www/pages/site/get-involved/guides/monotone.html:159
msgid ""
-"After importing the developers' keys into Monotone and\n"
-" setting up trust evaluation hooks,\n"
-" Monotone will prevent untrusted code from being checked out into your workspace.\n"
-" There are commands available to clean untrusted code from your workspace but in practice they've not been\n"
+"After importing the "
+"developers' keys into Monotone and\n"
+" setting up trust "
+"evaluation hooks,\n"
+" Monotone will prevent untrusted code from being checked out into your "
+"workspace.\n"
+" There are commands available to clean untrusted code from your "
+"workspace but in practice they've not been\n"
" needed due to the push access policies in place."
-msgstr "После импорта ключей разработчиков в Monotone и\nустановки ловушек оценки доверия,\nMonotone предотвратит извлечение ненадежного кода в ваш workspace.\nСуществуют команды, способные очистить ненадежный код из вашего workspace, но на практике они не нужны,\nблагодаря политикам доступа на размещение кода."
+msgstr ""
+"После импорта ключей"
+" разработчиков в Monotone и\n"
+"установки ловушек оценки "
+"доверия,\n"
+"Monotone предотвратит извлечение ненадежного кода в ваш workspace.\n"
+"Существуют команды, способные очистить ненадежный код из вашего "
+"workspace, но на практике они не нужны,\n"
+"благодаря политикам доступа на размещение кода."
#: i2p2www/pages/site/get-involved/guides/monotone.html:169
msgid ""
-"A repository can hold many branches. For example, our repository holds the\n"
+"A repository can hold many branches. For example, our repository holds "
+"the\n"
" following main branches:"
-msgstr "В хранилище могут находиться несколько веток. Например, наше хранилище содержит \nследующие главные ветки:"
+msgstr ""
+"В хранилище могут находиться несколько веток. Например, наше хранилище "
+"содержит \n"
+"следующие главные ветки:"
#: i2p2www/pages/site/get-involved/guides/monotone.html:174
msgid "The I2P router and associated programs"
@@ -2570,85 +3923,153 @@ msgstr "Syndie и средства распределенных форумов"
#: i2p2www/pages/site/get-involved/guides/monotone.html:181
msgid ""
-"By convention, the I2P Monotone repository is named i2p.mtn
. Before pulling\n"
-" source code from servers, a database for your repository will need to be initialized.\n"
-" To initialize your local repository, change into the directory that you want the\n"
-" i2p.mtn
file and branch directories to be stored and issue the following\n"
+"By convention, the I2P Monotone repository is named i2p.mtn
."
+" Before pulling\n"
+" source code from servers, a database for your repository will need to "
+"be initialized.\n"
+" To initialize your local repository, change into the directory that you"
+" want the\n"
+" i2p.mtn
file and branch directories to be stored and issue"
+" the following\n"
" command:"
-msgstr "По соглашению хранилище I2P Monotone названо i2p.mtn
. Перед извлечением \nисходного кода с серверов необходимо инициализировать базу данных для вашего хранилища. \nДля инициализации вашего локального хранилища перейдите в директорию, в которой вы хотите \nхранить i2p.mtn
файл и директории веток, и выполните следующую \nкоманду:"
+msgstr ""
+"По соглашению хранилище I2P Monotone названо i2p.mtn
. Перед "
+"извлечением \n"
+"исходного кода с серверов необходимо инициализировать базу данных для "
+"вашего хранилища. \n"
+"Для инициализации вашего локального хранилища перейдите в директорию, в "
+"которой вы хотите \n"
+"хранить i2p.mtn
файл и директории веток, и выполните "
+"следующую \n"
+"команду:"
#: i2p2www/pages/site/get-involved/guides/monotone.html:197
msgid ""
-"Keys which developers use to commit code are essential for trust evaluation in\n"
-" Monotone. The other developers' transport keys are only required for Monotone server operators.\n"
+"Keys which developers use to commit code are essential for trust "
+"evaluation in\n"
+" Monotone. The other developers' transport keys are only required for "
+"Monotone server operators.\n"
" "
-msgstr "Ключи, которые используют для фиксации кода, необходимы для оценки доверия в \nMonotone. Другие transport ключи разработчиков нужны только для операторов сервера Monotone."
+msgstr ""
+"Ключи, которые используют для фиксации кода, необходимы для оценки "
+"доверия в \n"
+"Monotone. Другие transport ключи разработчиков нужны только для "
+"операторов сервера Monotone."
#: i2p2www/pages/site/get-involved/guides/monotone.html:204
#, python-format
msgid ""
"Developers' commit keys are provided GPG-signed on another page."
-msgstr "Commit ключи разработчиков представлены в виде GPG-signed на другой странице."
+msgstr ""
+"Commit ключи разработчиков представлены в виде GPG-signed на другой странице."
#: i2p2www/pages/site/get-involved/guides/monotone.html:210
#, python-format
msgid ""
-"To import developers' keys after verifying their authenticity, copy all of the keys into a new\n"
-" file. Create this file (e.g. keys.txt
) in the same directory where i2p.mtn
is located. Import the keys with the command:"
-msgstr "Для импорта ключей разработчиков после проверки их подлинности скопируйте все ключи в новый \nфайл. Создайте этот файл (например, keys.txt
) в той же директории, в которой расположен i2p.mtn
. Импортируйте ключи командой:"
+"To import developers' keys after verifying their authenticity, copy all of the keys into a new\n"
+" file. Create this file (e.g. keys.txt
) in the same "
+"directory where i2p.mtn
is located. Import the keys with the"
+" command:"
+msgstr ""
+"Для импорта ключей разработчиков после проверки их подлинности скопируйте"
+" все ключи в новый \n"
+"файл. Создайте этот файл (например, keys.txt
) в той "
+"же директории, в которой расположен i2p.mtn
. Импортируйте "
+"ключи командой:"
#: i2p2www/pages/site/get-involved/guides/monotone.html:220
msgid ""
"Note: Never add keys to "
"$HOME/.monotone/keys
manually."
-msgstr "Примечание: Никогда не добавляйте ключи в $HOME/.monotone/keys
вручную."
+msgstr ""
+"Примечание: Никогда не добавляйте ключи в "
+"$HOME/.monotone/keys
вручную."
#: i2p2www/pages/site/get-involved/guides/monotone.html:228
msgid ""
-"The default Monotone trust policy is way too lax for our requirements: every committer is trusted by default.\n"
+"The default Monotone trust policy is way too lax for our requirements: "
+"every committer is trusted by default.\n"
" That is not acceptable for I2P development."
-msgstr "Дефолтная политика доверия Monotone слишком слаба для наших требований: каждый коммитер по умолчанию надежен.\nЭто неприемлемо для разработки I2P."
+msgstr ""
+"Дефолтная политика доверия Monotone слишком слаба для наших требований: "
+"каждый коммитер по умолчанию надежен.\n"
+"Это неприемлемо для разработки I2P."
#: i2p2www/pages/site/get-involved/guides/monotone.html:235
msgid ""
-"Change into the directory $HOME/.monotone
and open the file\n"
-" monotonerc
with a text editor. Copy and paste the following two functions into this file:"
-msgstr "Перейдите в директорию $HOME/.monotone
и откройте файл \nmonotonerc
в текстовом редакторе. Скопируйте и вставьте следующие две функции в этот файл:"
+"Change into the directory $HOME/.monotone
and open "
+"the file\n"
+" monotonerc
with a text editor. Copy and paste the "
+"following two functions into this file:"
+msgstr ""
+"Перейдите в директорию $HOME/.monotone
и откройте "
+"файл \n"
+"monotonerc
в текстовом редакторе. Скопируйте и вставьте "
+"следующие две функции в этот файл:"
#: i2p2www/pages/site/get-involved/guides/monotone.html:244
msgid ""
-"The first function determines an intersection between two sets, in our case a\n"
+"The first function determines an intersection between two sets, in our "
+"case a\n"
" revision's signers and trusted signers."
-msgstr "Первая функция определяет пересечение между двумя наборами, в нашем случае \nэто подписанты ревизий и надежные подписанты."
+msgstr ""
+"Первая функция определяет пересечение между двумя наборами, в нашем "
+"случае \n"
+"это подписанты ревизий и надежные подписанты."
#: i2p2www/pages/site/get-involved/guides/monotone.html:251
msgid ""
-"The second function determines trust in a given revision, by calling the first\n"
-" function with \"signers\" and \"trusted\" as arguments. If the intersection is\n"
-" null, the revision is not trusted. If the intersection is not empty, the\n"
+"The second function determines trust in a given revision, by calling the "
+"first\n"
+" function with \"signers\" and \"trusted\" as arguments. If the "
+"intersection is\n"
+" null, the revision is not trusted. If the intersection is not empty, "
+"the\n"
" revision is trusted. Otherwise, the revision is not trusted."
-msgstr "Вторая функция определяет доверие в заданной ревизии, вызывая первую \nфункцию с аргументами \"signers\" и \"trusted\". Если пересечение \nпусто, то ревизия не надежна. Если пересечение не пусто, то \nревизия надежна. В другом случае ревизия не надежна."
+msgstr ""
+"Вторая функция определяет доверие в заданной ревизии, вызывая первую \n"
+"функцию с аргументами \"signers\" и \"trusted\". Если пересечение \n"
+"пусто, то ревизия не надежна. Если пересечение не пусто, то \n"
+"ревизия надежна. В другом случае ревизия не надежна."
#: i2p2www/pages/site/get-involved/guides/monotone.html:260
msgid ""
"More information about Trust Evaluation Hooks can be found in the official Monotone "
"documentation."
-msgstr "Более подробную информацию о Trust Evaluation Hooks вы можете найти в официальной документации Monotone."
+msgstr ""
+"Более подробную информацию о Trust Evaluation Hooks вы можете найти в официальной документации "
+"Monotone."
#: i2p2www/pages/site/get-involved/guides/monotone.html:268
msgid ""
-"I2P is shipped with a pre-configured tunnel pointing to the project Monotone server. Ensure that the tunnel has been started\n"
-" within I2PTunnel before attempting to pull the source code from 127.0.0.1:8998."
-msgstr "I2P поставляется с предварительно настроенным туннелем, указывающим на сервер проекта Monotone. Убедитесь, что туннель запущен в I2PTunnel, перед тем как получать исходый код с 127.0.0.1:8998."
+"I2P is shipped with a pre-configured tunnel pointing to the project "
+"Monotone server. Ensure that the tunnel has been started\n"
+" within I2PTunnel before"
+" attempting to pull the source code from 127.0.0.1:8998."
+msgstr ""
+"I2P поставляется с предварительно настроенным туннелем, указывающим на "
+"сервер проекта Monotone. Убедитесь, что туннель запущен в I2PTunnel, перед тем как "
+"получать исходый код с 127.0.0.1:8998."
#: i2p2www/pages/site/get-involved/guides/monotone.html:275
msgid ""
-"Enter the directory where you initialized i2p.mtn
. Depending on whether you\n"
-" want only I2P sources, or also sources for the I2P website and Syndie, you can\n"
+"Enter the directory where you initialized i2p.mtn
. Depending"
+" on whether you\n"
+" want only I2P sources, or also sources for the I2P website and Syndie, "
+"you can\n"
" perform the pull
operation in different ways."
-msgstr "Перейдите в директорию, в которой Вы инициализировали i2p.mtn
. В зависимости от того, хотите ли Вы получить\nтолько исходники I2P, или ещё и исходники веб-сайта I2P и Syndie, Вы можете\nвыполнить операцию pull
по-разному."
+msgstr ""
+"Перейдите в директорию, в которой Вы инициализировали "
+"i2p.mtn
. В зависимости от того, хотите ли Вы получить\n"
+"только исходники I2P, или ещё и исходники веб-сайта I2P и Syndie, Вы "
+"можете\n"
+"выполнить операцию pull
по-разному."
#: i2p2www/pages/site/get-involved/guides/monotone.html:283
msgid "If you only want I2P sources:"
@@ -2660,16 +4081,25 @@ msgstr "Если вам нужны все ветки:"
#: i2p2www/pages/site/get-involved/guides/monotone.html:298
msgid ""
-"If the transfer aborts before completing sucessfully, simply repeating the "
-"pull command will resume the transfer."
-msgstr "Если передача прервалась до успешного завершения, просто повторите команду получения, и передача возобновится."
+"If the transfer aborts before completing sucessfully, simply repeating "
+"the pull command will resume the transfer."
+msgstr ""
+"Если передача прервалась до успешного завершения, просто повторите "
+"команду получения, и передача возобновится."
#: i2p2www/pages/site/get-involved/guides/monotone.html:304
msgid ""
-"Pulling in the above examples is done anonymously by specifying an empty transport key.\n"
-" If everyone pulls anonymously it will be harder for an attacker who gains control of the server\n"
+"Pulling in the above examples is done anonymously by specifying an empty "
+"transport key.\n"
+" If everyone pulls anonymously it will be harder for an attacker who "
+"gains control of the server\n"
" to selectively provide some people with tampered data."
-msgstr "Получение в примерах выше совершается анонимно, т.к. был указан пустой transport ключ. \nЕсли все будут выполнять получение анонимно, то атакующему будет сложнее получить контроль над сервером, \nизбирательно снабжая некоторых людей поддельными данными."
+msgstr ""
+"Получение в примерах выше совершается анонимно, т.к. был указан пустой "
+"transport ключ. \n"
+"Если все будут выполнять получение анонимно, то атакующему будет сложнее "
+"получить контроль над сервером, \n"
+"избирательно снабжая некоторых людей поддельными данными."
#: i2p2www/pages/site/get-involved/guides/monotone.html:315
msgid "To verify that trust evaluation works:"
@@ -2683,63 +4113,107 @@ msgstr "Сделайте резервную копию вашего файла <
msgid ""
"Modify monotonerc
by setting the trusted_signers "
"variable in the following way:"
-msgstr "Измените monotonerc
, определив переменную trusted_signers следующим образом:"
+msgstr ""
+"Измените monotonerc
, определив переменную "
+"trusted_signers следующим образом:"
#: i2p2www/pages/site/get-involved/guides/monotone.html:326
msgid ""
-"With monotonerc
configured as above, Monotone will no longer trust any committers. Confirm this by changing into the\n"
-"directory where i2p.mtn
was created and attempt a checkout of the I2P branch:"
-msgstr "С измененным т.о. monotonerc
Monotone не будет больше доверять никаким коммитерам. Убедитесь в этом, изменив \nдиректорию на ту, в которой был создан i2p.mtn
, и попробуйте извлечь ветку I2P:"
+"With monotonerc
configured as above, Monotone will no"
+" longer trust any committers. Confirm this by changing into the\n"
+"directory where i2p.mtn
was created and attempt a checkout "
+"of the I2P branch:"
+msgstr ""
+"С измененным т.о. monotonerc
Monotone не будет больше"
+" доверять никаким коммитерам. Убедитесь в этом, изменив \n"
+"директорию на ту, в которой был создан i2p.mtn
, и попробуйте"
+" извлечь ветку I2P:"
#: i2p2www/pages/site/get-involved/guides/monotone.html:336
msgid ""
-"A directory named i2p.i2p
should not appear. You should encounter many\n"
+"A directory named i2p.i2p
should not appear. You "
+"should encounter many\n"
" error messages like:"
-msgstr "Директория с именем i2p.i2p
не должна появиться. Вы должны увидеть много \nсообщений об ошибках, вроде таких:"
+msgstr ""
+"Директория с именем i2p.i2p
не должна появиться. Вы "
+"должны увидеть много \n"
+"сообщений об ошибках, вроде таких:"
#: i2p2www/pages/site/get-involved/guides/monotone.html:353
msgid ""
"If you are satisfied with results, restore the backup of\n"
-" monotonerc
that was created above. If you didn't create a backup\n"
-" as advised, re-read Setting up trust evaluation hooks."
-msgstr "Если вы удовлетворены результатом, восстановите резервную копию \nmonotonerc
, которая была создана ранее. Если вы не создали резервную копию, \nкак предлагалось, перечитайте Установку ловушек оценки доверия."
+" monotonerc
that was created above. If you didn't create a "
+"backup\n"
+" as advised, re-read Setting up trust evaluation hooks."
+msgstr ""
+"Если вы удовлетворены результатом, восстановите резервную копию \n"
+"monotonerc
, которая была создана ранее. Если вы не создали "
+"резервную копию, \n"
+"как предлагалось, перечитайте Установку ловушек оценки доверия."
#: i2p2www/pages/site/get-involved/guides/monotone.html:364
msgid ""
-"If you already have a branch checked out, skip to the next\n"
+"If you already have a branch checked out, skip to the next\n"
" section."
-msgstr "Если вы уже извлекли ветку, пропустите следующий \nраздел."
+msgstr ""
+"Если вы уже извлекли ветку, пропустите следующий \n"
+"раздел."
#: i2p2www/pages/site/get-involved/guides/monotone.html:371
msgid ""
-"Change into the directory where i2p.mtn
is located. Over there "
-"issue:"
-msgstr "Перейдите в директорию, в которой находится i2p.mtn
. И выполните в ней:"
+"Change into the directory where i2p.mtn
is located. Over "
+"there issue:"
+msgstr ""
+"Перейдите в директорию, в которой находится i2p.mtn
. И "
+"выполните в ней:"
#: i2p2www/pages/site/get-involved/guides/monotone.html:380
msgid ""
-"The checkout should complete without error messages and a directory named\n"
-" i2p.i2p
should appear in the current directory. Congratulations! You have\n"
+"The checkout should complete without error messages and a directory named"
+"\n"
+" i2p.i2p
should appear in the current directory. "
+"Congratulations! You have\n"
" successfully checked out the latest I2P sources, ready to be compiled."
-msgstr "Извлечение должно быть выполнено без сообщений об ошибках и директория с именем \ni2p.i2p
должна появиться в текущей директории. Поздравляем! Вы \nуспешно извлекли последние исходники I2P, готовые к компиляции."
+msgstr ""
+"Извлечение должно быть выполнено без сообщений об ошибках и директория с "
+"именем \n"
+"i2p.i2p
должна появиться в текущей директории. Поздравляем! "
+"Вы \n"
+"успешно извлекли последние исходники I2P, готовые к компиляции."
#: i2p2www/pages/site/get-involved/guides/monotone.html:391
msgid ""
-"If you haven't done this already, pull fresh code from the server to your local\n"
-" Monotone repository. To accomplish this, change into the directory where\n"
+"If you haven't done this already, pull fresh code from the server to your"
+" local\n"
+" Monotone repository. To accomplish this, change into the directory "
+"where\n"
" i2p.mtn
is located and issue:"
-msgstr "Если Вы ещё этого не сделали - загрузите самую последнюю версию кода с сервера\nв свой локальный Monotone-репозиторий. Чтобы сделать это, перейдите в директорию с\ni2p.mtn
и выполните:"
+msgstr ""
+"Если Вы ещё этого не сделали - загрузите самую последнюю версию кода с "
+"сервера\n"
+"в свой локальный Monotone-репозиторий. Чтобы сделать это, перейдите в "
+"директорию с\n"
+"i2p.mtn
и выполните:"
#: i2p2www/pages/site/get-involved/guides/monotone.html:402
-msgid ""
-"Now change into your i2p.i2p
directory, and over there issue:"
-msgstr "Теперь перейдите в вашу i2p.i2p
директорию, и выполните в ней:"
+msgid "Now change into your i2p.i2p
directory, and over there issue:"
+msgstr ""
+"Теперь перейдите в вашу i2p.i2p
директорию, и выполните в "
+"ней:"
#: i2p2www/pages/site/get-involved/guides/monotone.html:411
msgid ""
-"As long as there were no errors…Congratulations! You have successfully updated to the latest I2P sources. They\n"
+"As long as there were no errors…Congratulations! You have "
+"successfully updated to the latest I2P sources. They\n"
" should be ready to compile."
-msgstr "Т.к. ошибок нет…Поздравляем! Вы успешно обновились до последних исходников I2P. Они \nготовы для компиляции."
+msgstr ""
+"Т.к. ошибок нет…Поздравляем! Вы успешно обновились до последних "
+"исходников I2P. Они \n"
+"готовы для компиляции."
#: i2p2www/pages/site/get-involved/guides/monotone.html:420
msgid "Obtaining and deploying developers' transport keys"
@@ -2749,7 +4223,9 @@ msgstr "Получение и применение transport ключей раз
msgid ""
"As a server operator you may want to grant push access to certain "
"developers."
-msgstr "Как оператор сервера вы можете захотеть наделить некоторых разработчиков правом размещения."
+msgstr ""
+"Как оператор сервера вы можете захотеть наделить некоторых разработчиков "
+"правом размещения."
#: i2p2www/pages/site/get-involved/guides/monotone.html:431
msgid "By default the Monotone server denies all access."
@@ -2761,9 +4237,11 @@ msgstr "Чтобы дать право извлечения всем клиен
#: i2p2www/pages/site/get-involved/guides/monotone.html:449
msgid ""
-"No one will not be able to push code to your server without permission being"
-" explicitly granted. To grant push access:"
-msgstr "Никто без явного наделения правами не сможет размещать код на вашем сервере. Чтобы разрешить доступ на размещение:"
+"No one will not be able to push code to your server without permission "
+"being explicitly granted. To grant push access:"
+msgstr ""
+"Никто без явного наделения правами не сможет размещать код на вашем "
+"сервере. Чтобы разрешить доступ на размещение:"
#: i2p2www/pages/site/get-involved/guides/monotone.html:455
msgid ""
@@ -2774,48 +4252,94 @@ msgid ""
" complication-transport@mail.i2p\n"
"\n"
"with one key per line."
-msgstr "Добавьте имена transport ключей пользователей в\n$HOME/.monotone/write-permissions
, как это сделано для\n\n zzz-transport@mail.i2p\n complication-transport@mail.i2p\n
\nс одним ключом на строке."
+msgstr ""
+"Добавьте имена transport ключей пользователей в\n"
+"$HOME/.monotone/write-permissions
, как это сделано для\n"
+"\n"
+" zzz-transport@mail.i2p\n"
+" complication-transport@mail.i2p\n"
+"
\n"
+"с одним ключом на строке."
#: i2p2www/pages/site/get-involved/guides/monotone.html:466
msgid ""
-"Import the transport key(s) into your database. The procedure for importing transport keys is the same as for\n"
-"importing commit keys, which is described in the section Obtaining and deploying developers' keys."
-msgstr "Импортируйте transport ключ(и) в вашу базу данных. Процедура для импорта transport ключей подобна \nимпорту commit ключей, которая описана в разделе Получение и применение ключей разработчиков."
+"Import the transport key(s) into your database. The procedure for "
+"importing transport keys is the same as for\n"
+"importing commit keys, which is described in the section Obtaining and deploying "
+"developers' keys."
+msgstr ""
+"Импортируйте transport ключ(и) в вашу базу данных. Процедура для импорта "
+"transport ключей подобна \n"
+"импорту commit ключей, которая описана в разделе Получение и применение ключей "
+"разработчиков."
#: i2p2www/pages/site/get-involved/guides/monotone.html:476
msgid ""
-"A separate database should be used for your Monotone server because monotone will lock the database while it is served to others.\n"
+"A separate database should be used for your Monotone server because "
+"monotone will lock the database while it is served to others.\n"
" Make a copy of your development database, then start the server with:"
-msgstr "Для вашего сервера Monotone должна использоваться отдельная база данных, потому что Monotone блокирует базу данных пока она служит другим.\nСделайте копию вашей разработческой базы данных, затем запустите сервер:"
+msgstr ""
+"Для вашего сервера Monotone должна использоваться отдельная база данных, "
+"потому что Monotone блокирует базу данных пока она служит другим.\n"
+"Сделайте копию вашей разработческой базы данных, затем запустите сервер:"
#: i2p2www/pages/site/get-involved/guides/monotone.html:483
msgid ""
-"If your key is protected with a passphrase, Monotone may request the passphrase\n"
-" when the first client connects. You can work around this by connecting making the first client connection to your server\n"
+"If your key is protected with a passphrase, Monotone may request the "
+"passphrase\n"
+" when the first client connects. You can work around this by connecting "
+"making the first client connection to your server\n"
" (or by clearing the password for your transport key)."
-msgstr "Если ваш ключ защищен паролем, Monotone запросит этот пароль\nкогда подключится первый клиент. Вы можете обойти это, собственноручно выполнив первое подключения клиента к вашему серверу \n(или очистив пароль к вашему transport ключу)."
+msgstr ""
+"Если ваш ключ защищен паролем, Monotone запросит этот пароль\n"
+"когда подключится первый клиент. Вы можете обойти это, собственноручно "
+"выполнив первое подключения клиента к вашему серверу \n"
+"(или очистив пароль к вашему transport ключу)."
#: i2p2www/pages/site/get-involved/guides/monotone.html:491
msgid ""
-"For your server to be accessible for others over I2P, you will need to create a\n"
-" server tunnel for it. Use the \"Standard\" tunnel type and \"Bulk\" profile."
-msgstr "Чтобы ваш сервер был доступен другим в сети I2P, для этого вам нужно создать \nсерверный туннель. Используйте \"Standard\" тип туннеля и \"Bulk\" профиль."
+"For your server to be accessible for others over I2P, you will need to "
+"create a\n"
+" server tunnel for it. Use the \"Standard\" tunnel type and \"Bulk\" "
+"profile."
+msgstr ""
+"Чтобы ваш сервер был доступен другим в сети I2P, для этого вам нужно "
+"создать \n"
+"серверный туннель. Используйте \"Standard\" тип туннеля и \"Bulk\" "
+"профиль."
#: i2p2www/pages/site/get-involved/guides/monotone.html:501
msgid ""
"Debian (amongst other distributions) has integrated Monotone into their\n"
-" framework of daemons/services. Although Monotone servers can still be run\n"
-" \"the ordinary way\" on Debian systems, doing it the \"Debian way\" may be more straightforward."
-msgstr "В Debian (наряду с другими поставками) есть интегрированный в \nфреймворк демонов/сервисов Monotone. Также сервера Monotone можно запустить \n\"обычным способом\" на системах Debian, запуск в стиле \"Debian\" может быть более простым."
+" framework of daemons/services. Although Monotone servers can still be "
+"run\n"
+" \"the ordinary way\" on Debian systems, doing it the \"Debian way\" may"
+" be more straightforward."
+msgstr ""
+"В Debian (наряду с другими поставками) есть интегрированный в \n"
+"фреймворк демонов/сервисов Monotone. Также сервера Monotone можно "
+"запустить \n"
+"\"обычным способом\" на системах Debian, запуск в стиле \"Debian\" может "
+"быть более простым."
#: i2p2www/pages/site/get-involved/guides/monotone.html:509
msgid ""
"Permissions are granted by editing the files\n"
" /etc/monotone/read-permissions
and\n"
" /etc/monotone/write-permissions
. You'll also need to edit\n"
-" /etc/default/monotone
to enable monotone to start at boot or to\n"
+" /etc/default/monotone
to enable monotone to start at boot "
+"or to\n"
" customize the host, port, or database location."
-msgstr "Разрешения выдаются редактированием файлов\n/etc/monotone/read-permissions
и\n/etc/monotone/write-permissions
. Вам также нужно отредактировать\n/etc/default/monotone
чтобы включить запуск monotone при загрузке или \nизменить хост, порт, или расположение базы данных."
+msgstr ""
+"Разрешения выдаются редактированием файлов\n"
+"/etc/monotone/read-permissions
и\n"
+"/etc/monotone/write-permissions
. Вам также нужно "
+"отредактировать\n"
+"/etc/default/monotone
чтобы включить запуск monotone при "
+"загрузке или \n"
+"изменить хост, порт, или расположение базы данных."
#: i2p2www/pages/site/get-involved/guides/new-developers.html:2
msgid "New Developer's Guide"
@@ -2826,8 +4350,13 @@ msgid ""
"\n"
"So you want to start work on I2P? Great!\n"
"Here's a quick guide to getting started\n"
-"on contributing to the website or the software, doing development or creating translations."
-msgstr "\nИтак, вы хотите начать работать над I2P? Отлично!\nВот краткое руководство для начала\nработы над веб-сайтом или ПО, разработки или создания переводов."
+"on contributing to the website or the software, doing development or "
+"creating translations."
+msgstr ""
+"\n"
+"Итак, вы хотите начать работать над I2P? Отлично!\n"
+"Вот краткое руководство для начала\n"
+"работы над веб-сайтом или ПО, разработки или создания переводов."
#: i2p2www/pages/site/get-involved/guides/new-developers.html:9
#, python-format
@@ -2835,7 +4364,10 @@ msgid ""
"\n"
"Not quite ready for coding?\n"
"Try getting involved first."
-msgstr "\nНе совсем готовы для написания кода?\nПопробуйте поучаствовать для начала."
+msgstr ""
+"\n"
+"Не совсем готовы для написания кода?\n"
+"Попробуйте поучаствовать для начала."
#: i2p2www/pages/site/get-involved/guides/new-developers.html:16
#: i2p2www/pages/site/get-involved/guides/new-developers.html:27
@@ -2879,9 +4411,15 @@ msgstr "Средства"
#: i2p2www/pages/site/get-involved/guides/new-developers.html:29
msgid ""
-"Basic development on the I2P router or the embedded applications uses Java as the main development language.\n"
-"If you don't have experience with Java, you can always have a look at Thinking in Java."
-msgstr "Основная разработка маршрутизатора I2P или встроенных приложений выполняется на Java, как главном языке разработки.\nЕсли у вас нет опыта с Java, вы всегда можете обратиться к Thinking in Java."
+"Basic development on the I2P router or the embedded applications uses "
+"Java as the main development language.\n"
+"If you don't have experience with Java, you can always have a look at Thinking in Java."
+msgstr ""
+"Основная разработка маршрутизатора I2P или встроенных приложений "
+"выполняется на Java, как главном языке разработки.\n"
+"Если у вас нет опыта с Java, вы всегда можете обратиться к Thinking in Java."
#: i2p2www/pages/site/get-involved/guides/new-developers.html:33
#, python-format
@@ -2890,66 +4428,103 @@ msgid ""
"the other \"how\" documents,\n"
"the tech intro,\n"
"and associated documents.\n"
-"These will give you a good overview of how I2P is structured and what different things it does."
-msgstr "Изучите how intro,\nдругие \"how\" документы,\ntech intro,\nи связанные с ними документы.\nЭто даст вам хороший обзор того, как устроен I2P и какие различные вещи он выполняет."
+"These will give you a good overview of how I2P is structured and what "
+"different things it does."
+msgstr ""
+"Изучите how intro,\n"
+"другие \"how\" документы,\n"
+"tech intro,\n"
+"и связанные с ними документы.\n"
+"Это даст вам хороший обзор того, как устроен I2P и какие различные вещи "
+"он выполняет."
#: i2p2www/pages/site/get-involved/guides/new-developers.html:43
msgid ""
"For development on the i2p router or the embedded applications,\n"
"get the monotone source repository installed - short instructions:"
-msgstr "Для разработки маршрутизатора I2P или встроенных приложений, \nустановите хранилище исходников monotone - краткая инструкция:"
+msgstr ""
+"Для разработки маршрутизатора I2P или встроенных приложений, \n"
+"установите хранилище исходников monotone - краткая инструкция:"
#: i2p2www/pages/site/get-involved/guides/new-developers.html:48
msgid ""
"Install monotone.\n"
"Monotone is a version control system.\n"
-"We use it because it allows us to keep track of who does what changes to the source code (and for a lot of complicated things, but 'keeping track of changes' is the basic idea)."
-msgstr "Установите monotone.\nMonotone это система контроля версий.\nМы используем ее, потому что она позволяет следить за тем что и кто изменяет в исходных кодах (и для большого числа сложных вещей, но 'следить за изменениями' это основная задача)."
+"We use it because it allows us to keep track of who does what changes to "
+"the source code (and for a lot of complicated things, but 'keeping track "
+"of changes' is the basic idea)."
+msgstr ""
+"Установите monotone.\n"
+"Monotone это система контроля версий.\n"
+"Мы используем ее, потому что она позволяет следить за тем что и кто "
+"изменяет в исходных кодах (и для большого числа сложных вещей, но "
+"'следить за изменениями' это основная задача)."
#: i2p2www/pages/site/get-involved/guides/new-developers.html:53
msgid ""
-"Skim over the monotone"
-" tutorial, to make sure you understand the concepts."
-msgstr "Загляните в учебник monotone, чтобы убедиться, что вы понимаете концепцию."
+"Skim over the monotone tutorial,"
+" to make sure you understand the concepts."
+msgstr ""
+"Загляните в учебник"
+" monotone, чтобы убедиться, что вы понимаете концепцию."
#: i2p2www/pages/site/get-involved/guides/new-developers.html:57
msgid ""
-"If you want to remain anonymous, you need to do an additional step, to set "
-"up a connection to a monotone server over I2P:"
-msgstr "Если вы хотите остаться анонимным, вам нужно выполнить дополнительные шаги, чтобы подключиться к серверу monotone через I2P:"
+"If you want to remain anonymous, you need to do an additional step, to "
+"set up a connection to a monotone server over I2P:"
+msgstr ""
+"Если вы хотите остаться анонимным, вам нужно выполнить дополнительные "
+"шаги, чтобы подключиться к серверу monotone через I2P:"
#: i2p2www/pages/site/get-involved/guides/new-developers.html:60
#, python-format
msgid ""
"Enable the i2ptunnel client tunnel on port "
"8998 pointing to mtn.i2p2.i2p."
-msgstr "Включите клиентский туннель i2ptunnel на порту 8998, указывающий на mtn.i2p2.i2p."
+msgstr ""
+"Включите клиентский туннель i2ptunnel на "
+"порту 8998, указывающий на mtn.i2p2.i2p."
#: i2p2www/pages/site/get-involved/guides/new-developers.html:64
msgid ""
"Pick a directory where you want to put all your I2P files, and create a "
"monotone database:"
-msgstr "Выберите директорию, в которую вы хотите выгрузить все ваши файлы I2P, и создайте базу данных monotone:"
+msgstr ""
+"Выберите директорию, в которую вы хотите выгрузить все ваши файлы I2P, и "
+"создайте базу данных monotone:"
#: i2p2www/pages/site/get-involved/guides/new-developers.html:67
msgid ""
-"Define the trust list by creating ~/.monotone/monotonerc
(or "
-"_MTN/monotonerc
in the i2p.i2p workspace) with the following "
-"contents:"
-msgstr "Определите список доверия, создав ~/.monotone/monotonerc
(или _MTN/monotonerc
в workspace i2p.i2p) со следующим содержимым:"
+"Define the trust list by creating ~/.monotone/monotonerc
(or"
+" _MTN/monotonerc
in the i2p.i2p workspace) with the "
+"following contents:"
+msgstr ""
+"Определите список доверия, создав ~/.monotone/monotonerc
"
+"(или _MTN/monotonerc
в workspace i2p.i2p) со следующим "
+"содержимым:"
#: i2p2www/pages/site/get-involved/guides/new-developers.html:72
#, python-format
msgid ""
-"Copy and paste the developer's commit keys into a new file (e.g. keys.txt
) in the same directory\n"
-" that i2p.mtn
is in. Import the keys into your database with mtn -d i2p.mtn read < keys.txt
"
-msgstr "Скопируйте и вставьте commit ключи разработчиков в новый файл (например, keys.txt
) в той же директории, \nгде находится i2p.mtn
. Импортируйте ключи в вашу базу данных с mtn -d i2p.mtn read < keys.txt
"
+"Copy and paste the developer's commit keys "
+"into a new file (e.g. keys.txt
) in the same directory\n"
+" that i2p.mtn
is in. Import the keys into your database "
+"with mtn -d i2p.mtn read < keys.txt
"
+msgstr ""
+"Скопируйте и вставьте commit ключи "
+"разработчиков в новый файл (например, keys.txt
) в той же"
+" директории, \n"
+"где находится i2p.mtn
. Импортируйте ключи в вашу базу данных"
+" с mtn -d i2p.mtn read < keys.txt
"
#: i2p2www/pages/site/get-involved/guides/new-developers.html:76
msgid ""
-"Pull the I2P sources to your machine. This may take a long time, especially "
-"if you are doing this over I2P!"
-msgstr "Выгрузите исходники I2P на ваш компьютер. Это может занять много времени, особенно, если вы делаете это через I2P!"
+"Pull the I2P sources to your machine. This may take a long time, "
+"especially if you are doing this over I2P!"
+msgstr ""
+"Выгрузите исходники I2P на ваш компьютер. Это может занять много времени,"
+" особенно, если вы делаете это через I2P!"
#: i2p2www/pages/site/get-involved/guides/new-developers.html:78
msgid "Anonymously:"
@@ -2961,21 +4536,27 @@ msgstr "Не анонимно:"
#: i2p2www/pages/site/get-involved/guides/new-developers.html:83
msgid ""
-"Alternatively, instead of 'mtn.i2p2.de', you can also download from mtn.i2p-"
+"Alternatively, instead of 'mtn.i2p2.de', you can also download from mtn"
+".i2p-projekt.de."
+msgstr ""
+"Также, вместо 'mtn.i2p2.de' вы можете выполнять загрузку с mtn.i2p-"
"projekt.de."
-msgstr "Также, вместо 'mtn.i2p2.de' вы можете выполнять загрузку с mtn.i2p-projekt.de."
#: i2p2www/pages/site/get-involved/guides/new-developers.html:90
msgid ""
-"All the sources are now present on your machine, in the database file. To "
-"make them available in a directory, you need to check them out:"
-msgstr "Теперь все исходники есть на вашем компьютере, в файле базы данных. Чтобы они были доступны в директории, вам нужно их извлечь:"
+"All the sources are now present on your machine, in the database file. To"
+" make them available in a directory, you need to check them out:"
+msgstr ""
+"Теперь все исходники есть на вашем компьютере, в файле базы данных. Чтобы"
+" они были доступны в директории, вам нужно их извлечь:"
#: i2p2www/pages/site/get-involved/guides/new-developers.html:92
msgid ""
-"The above command creates a directory i2p.i2p, which contains all of the I2P"
-" sources."
-msgstr "Команда выше создает директорию i2p.i2p, которая содержит все исходники I2P."
+"The above command creates a directory i2p.i2p, which contains all of the "
+"I2P sources."
+msgstr ""
+"Команда выше создает директорию i2p.i2p, которая содержит все исходники "
+"I2P."
#: i2p2www/pages/site/get-involved/guides/new-developers.html:96
msgid "Remarks"
@@ -2984,53 +4565,81 @@ msgstr "Примечания"
#: i2p2www/pages/site/get-involved/guides/new-developers.html:97
msgid ""
"\n"
-"To download the website files instead of the I2P source files, use 'i2p.www' instead of 'i2p.i2p'."
-msgstr "\nЧтобы загрузить файлы веб-сайта вместо файлов исходников I2P, используйте 'i2p.www' вместо 'i2p.i2p'."
+"To download the website files instead of the I2P source files, use "
+"'i2p.www' instead of 'i2p.i2p'."
+msgstr ""
+"\n"
+"Чтобы загрузить файлы веб-сайта вместо файлов исходников I2P, используйте"
+" 'i2p.www' вместо 'i2p.i2p'."
#: i2p2www/pages/site/get-involved/guides/new-developers.html:100
msgid ""
"The initial pull may take several hours using the tunnel.\n"
-"If it fails after a partial pull, simply rerun it, it will start where it left off.\n"
+"If it fails after a partial pull, simply rerun it, it will start where it"
+" left off.\n"
"If you are in a hurry, use the non-anonymous access."
-msgstr "Начальная выгрузка может занять несколько часов при использовании туннеля.\nЕсли она прервется после частичной выгрузки, просто перезапустите ее, она продолжится с прерванного.\nЕсли вы торопитесь, используйте не анонимный доступ."
+msgstr ""
+"Начальная выгрузка может занять несколько часов при использовании "
+"туннеля.\n"
+"Если она прервется после частичной выгрузки, просто перезапустите ее, она"
+" продолжится с прерванного.\n"
+"Если вы торопитесь, используйте не анонимный доступ."
#: i2p2www/pages/site/get-involved/guides/new-developers.html:105
#, python-format
msgid ""
-"A full list of branches, including i2p.i2p and i2p.www can be found on viewmtn."
+msgstr ""
+"Полный список веток, включая i2p.i2p и i2p.www, можно найти на viewmtn."
-msgstr "Полный список веток, включая i2p.i2p и i2p.www, можно найти на viewmtn."
#: i2p2www/pages/site/get-involved/guides/new-developers.html:108
#, python-format
msgid ""
"A long explanation about using monotone is available on the monotone page."
-msgstr "Длинное описание использования monotone доступно на странице monotone."
+msgstr ""
+"Длинное описание использования monotone доступно на странице monotone."
#: i2p2www/pages/site/get-involved/guides/new-developers.html:114
#, python-format
msgid ""
-"To compile the code, you need the Sun Java Development Kit 6 or higher, or equivalent JDK\n"
+"To compile the code, you need the Sun Java Development Kit 6 or higher, "
+"or equivalent JDK\n"
"(Sun JDK 6 strongly recommended) and\n"
"Apache ant\n"
"version 1.7.0 or higher.\n"
-"If you go are working on the main I2P code, you can go into the i2p.i2p directory and run 'ant' to see the build options."
-msgstr "Чтобы упростить создание кода, вам понадобится Sun Java Development Kit 6 или выше, ли подобный JDK\n(Sun JDK 6 настоятельно рекомендуется) и\nApache ant\nверсии 1.7.0 или выше.\nЕсли вы работаете над основным кодом I2P, вы можете зайти в директорию i2p.i2p и запустить 'ant', чтобы увидеть опции сборки."
+"If you go are working on the main I2P code, you can go into the i2p.i2p "
+"directory and run 'ant' to see the build options."
+msgstr ""
+"Чтобы упростить создание кода, вам понадобится Sun Java Development Kit 6"
+" или выше, ли подобный JDK\n"
+"(Sun JDK 6 настоятельно рекомендуется) и\n"
+"Apache ant\n"
+"версии 1.7.0 или выше.\n"
+"Если вы работаете над основным кодом I2P, вы можете зайти в директорию "
+"i2p.i2p и запустить 'ant', чтобы увидеть опции сборки."
#: i2p2www/pages/site/get-involved/guides/new-developers.html:122
msgid ""
"To build or work on console translations, you need\n"
"the xgettext, msgfmt, and msgmerge tools from the\n"
"GNU gettext package."
-msgstr "Для сборки или работы на переводами консоли, вам нужны \nсредства xgettext, msgfmt и msgmerge из \nпакета GNU gettext."
+msgstr ""
+"Для сборки или работы на переводами консоли, вам нужны \n"
+"средства xgettext, msgfmt и msgmerge из \n"
+"пакета GNU gettext."
#: i2p2www/pages/site/get-involved/guides/new-developers.html:128
#, python-format
msgid ""
"For development on new applications,\n"
"see the application development guide."
-msgstr "Для разработки новый приложений, \nсмотри руководство по разработке приложений."
+msgstr ""
+"Для разработки новый приложений, \n"
+"смотри руководство по разработке приложений."
#: i2p2www/pages/site/get-involved/guides/new-developers.html:134
#, python-format
@@ -3039,18 +4648,29 @@ msgid ""
"this website's TODO list or\n"
"Trac\n"
"for ideas."
-msgstr "Смотри списки TODO zzz's,\nсписок TODO этого веб-сайта или\nTrac\nдля поиска идей."
+msgstr ""
+"Смотри списки TODO zzz's,\n"
+"список TODO этого веб-сайта или\n"
+"Trac\n"
+"для поиска идей."
#: i2p2www/pages/site/get-involved/guides/new-developers.html:143
#, python-format
msgid ""
-"See the bottom of the licenses page for\n"
-"commit privilege requirements. You need these to put code into i2p.i2p (not required for the website!)."
-msgstr "Необходимые привилегии для фиксации ищи в конце \nстраницы лицензий. Вам они понадобятся для размещения кода в i2p.i2p (не требуется для веб-сайта!)."
+"See the bottom of the licenses page "
+"for\n"
+"commit privilege requirements. You need these to put code into i2p.i2p "
+"(not required for the website!)."
+msgstr ""
+"Необходимые привилегии для фиксации ищи в конце \n"
+"страницы лицензий. Вам они "
+"понадобятся для размещения кода в i2p.i2p (не требуется для веб-сайта!)."
#: i2p2www/pages/site/get-involved/guides/new-developers.html:148
msgid "Short version of how to generate and use keys if you plan to commit:"
-msgstr "Краткая версия описания генерации и использования ключей, если вы планируете выполнять фиксацию:"
+msgstr ""
+"Краткая версия описания генерации и использования ключей, если вы "
+"планируете выполнять фиксацию:"
#: i2p2www/pages/site/get-involved/guides/new-developers.html:150
msgid "use an empty passphrase"
@@ -3065,14 +4685,18 @@ msgstr "введите пароль"
msgid ""
"send this to a mtn repo operator to get "
"push privileges"
-msgstr "отправьте это оператору mtn repo, чтобы получить привилегию на размещение"
+msgstr ""
+"отправьте это оператору mtn repo, чтобы "
+"получить привилегию на размещение"
#: i2p2www/pages/site/get-involved/guides/new-developers.html:153
#, python-format
msgid ""
"send this to a release manager to get "
"commit privileges - not required for website"
-msgstr "отправьте это релиз-менеджеру, чтобы получить привилегии фиксации - не требуется для веб-сайта"
+msgstr ""
+"отправьте это релиз-менеджеру, чтобы "
+"получить привилегии фиксации - не требуется для веб-сайта"
#: i2p2www/pages/site/get-involved/guides/new-developers.html:154
msgid "check in with this key"
@@ -3090,35 +4714,69 @@ msgstr "Длинная версия: смотри ст
#: i2p2www/pages/site/get-involved/guides/new-developers.html:163
#, python-format
msgid ""
-"The developers hang around on IRC. They can be reached on the Freenode network, OFTC, and on the I2P internal networks. The usual place to look is #i2p-dev. Join the channel and say hi!\n"
-"We also have additional guidelines for regular developers."
-msgstr "Разработчики общаются в IRC. Их можно найти в сети Freenode, OFTC и во внутренней сети I2P. Обычно нужно искать в #i2p-dev. Присоединитесь к каналу и скажите привет!\nТакже у нас есть дополнительные руководства для постоянных разработчиков."
+"The developers hang around on IRC. They can be reached on the Freenode "
+"network, OFTC, and on the I2P internal networks. The usual place to look "
+"is #i2p-dev. Join the channel and say hi!\n"
+"We also have additional guidelines for regular"
+" developers."
+msgstr ""
+"Разработчики общаются в IRC. Их можно найти в сети Freenode, OFTC и во "
+"внутренней сети I2P. Обычно нужно искать в #i2p-dev. Присоединитесь к "
+"каналу и скажите привет!\n"
+"Также у нас есть дополнительные руководства "
+"для постоянных разработчиков."
#: i2p2www/pages/site/get-involved/guides/new-developers.html:169
#, python-format
msgid ""
-"Website and router console translators: See the New Translator's Guide\n"
+"Website and router console translators: See the New Translator's Guide\n"
"for next steps."
-msgstr "Переводчики веб-сайта и консоли маршрутизатора: смотрите Руководство Нового Переводчика \nдля продолжения."
+msgstr ""
+"Переводчики веб-сайта и консоли маршрутизатора: смотрите Руководство Нового Переводчика \n"
+"для продолжения."
#: i2p2www/pages/site/get-involved/guides/new-developers.html:175
msgid ""
"I2P is open source software that is mostly developed using open sourced\n"
-"toolkits. The I2P project recently acquired a license for the YourKit Java\n"
-"Profiler. Open source projects are eligible to receive a free license provided\n"
-"that YourKit is referenced on the project web site. Please get in touch if you\n"
+"toolkits. The I2P project recently acquired a license for the YourKit "
+"Java\n"
+"Profiler. Open source projects are eligible to receive a free license "
+"provided\n"
+"that YourKit is referenced on the project web site. Please get in touch "
+"if you\n"
"are interested in profiling the I2P codebase."
-msgstr "I2P это По с открытым исходным кодом, которое в основном разрабатывается с использованием инструментов \nс открытым исходным кодом. Проект I2P недавно приобрел лицензию на YourKit Java\nProfiler. У проектов с открытым исходным кодом есть право на получение бесплатной лицензии, гарантирующей, \nчто на веб-сайте проекта есть ссылка на YourKit. Пожалуйста, свяжитесь, если вы \nзаинтересованы в профилировании базы кодов I2P."
+msgstr ""
+"I2P это По с открытым исходным кодом, которое в основном разрабатывается "
+"с использованием инструментов \n"
+"с открытым исходным кодом. Проект I2P недавно приобрел лицензию на "
+"YourKit Java\n"
+"Profiler. У проектов с открытым исходным кодом есть право на получение "
+"бесплатной лицензии, гарантирующей, \n"
+"что на веб-сайте проекта есть ссылка на YourKit. Пожалуйста, свяжитесь, "
+"если вы \n"
+"заинтересованы в профилировании базы кодов I2P."
#: i2p2www/pages/site/get-involved/guides/new-developers.html:183
#, python-format
msgid ""
-"YourKit is kindly supporting open source projects with its full-featured Java Profiler.\n"
-"YourKit, LLC is the creator of innovative and intelligent tools for profiling\n"
-"Java and .NET applications. Take a look at YourKit's leading software products:\n"
+"YourKit is kindly supporting open source projects with its full-featured "
+"Java Profiler.\n"
+"YourKit, LLC is the creator of innovative and intelligent tools for "
+"profiling\n"
+"Java and .NET applications. Take a look at YourKit's leading software "
+"products:\n"
"YourKit Java Profiler and\n"
"YourKit .NET Profiler."
-msgstr "YourKit любезно предоставляет проектам с открытым исходным кодом полностью функциональный Java Profiler.\nYourKit, LLC - создатель инновационного и умного средства профилирования\nJava и .NET приложений. Взгляните на ведущие программные продукты YourKit:\nYourKit Java Profiler и\nYourKit .NET Profiler."
+msgstr ""
+"YourKit любезно предоставляет проектам с открытым исходным кодом "
+"полностью функциональный Java Profiler.\n"
+"YourKit, LLC - создатель инновационного и умного средства профилирования\n"
+"Java и .NET приложений. Взгляните на ведущие программные продукты "
+"YourKit:\n"
+"YourKit Java Profiler и\n"
+"YourKit .NET Profiler."
#: i2p2www/pages/site/get-involved/guides/new-translators.html:2
msgid "New Translator's Guide"
@@ -3135,11 +4793,19 @@ msgstr "Как переводить Веб-сайт"
#: i2p2www/pages/site/get-involved/guides/new-translators.html:8
#, python-format
msgid ""
-"Translation of the website is done with .po files. The easiest way by far to\n"
+"Translation of the website is done with .po files. The easiest way by far"
+" to\n"
"translate the website is to sign up for an account at \n"
-"Transifex and request to join a translation team. \n"
+"Transifex and request to join a translation"
+" team. \n"
"Alternatively it can be done \"the old way\" as outlined below."
-msgstr "Перевод веб-сайта выполняется в файлах .po. До сих пор самый простой способ \nперевода веб-сайта - получить аккаунт на \nTransifex и присоединиться к команде переводчиков. \nИли можно переводить \"по старинке\", как описано ниже."
+msgstr ""
+"Перевод веб-сайта выполняется в файлах .po. До сих пор самый простой "
+"способ \n"
+"перевода веб-сайта - получить аккаунт на \n"
+"Transifex и присоединиться к команде "
+"переводчиков. \n"
+"Или можно переводить \"по старинке\", как описано ниже."
#: i2p2www/pages/site/get-involved/guides/new-translators.html:17
#: i2p2www/pages/site/get-involved/guides/new-translators.html:82
@@ -3152,9 +4818,17 @@ msgstr "Подготовка"
msgid ""
"Come to #i2p-dev on irc and talk to people.\n"
"Claim the language -\n"
-"To make sure other coworkers don't bump onto the files you are working on,\n"
-"please update the translation status on this wiki page."
-msgstr "Зайдите на #i2p-dev в IRC и поговорите с людьми.\nЗапросите язык - \nЧтобы бы уверенными, что ваши соратники не затрут файлы, над которыми вы работаете, \nпожалуйста, обновляйте статус перевода на этой wiki страничке."
+"To make sure other coworkers don't bump onto the files you are working "
+"on,\n"
+"please update the translation status on this wiki "
+"page."
+msgstr ""
+"Зайдите на #i2p-dev в IRC и поговорите с людьми.\n"
+"Запросите язык - \n"
+"Чтобы бы уверенными, что ваши соратники не затрут файлы, над которыми вы "
+"работаете, \n"
+"пожалуйста, обновляйте статус перевода на этой wiki "
+"страничке."
#: i2p2www/pages/site/get-involved/guides/new-translators.html:25
#, python-format
@@ -3163,48 +4837,85 @@ msgid ""
"Including the installation of monotone,\n"
"checking out i2p.www branch, and generate your own monotone keys.\n"
"It is not required that you sign a dev agreement."
-msgstr "Следуйте руководству нового разработчика,\nвключая перевод monotone,\nизвлеките ветку i2p.www и сгенерируйте ваши собственные ключи monotone.\nВам не требуется подписывать соглашение разработчика."
+msgstr ""
+"Следуйте руководству нового разработчика,\n"
+"включая перевод monotone,\n"
+"извлеките ветку i2p.www и сгенерируйте ваши собственные ключи monotone.\n"
+"Вам не требуется подписывать соглашение разработчика."
#: i2p2www/pages/site/get-involved/guides/new-translators.html:33
msgid ""
"Create files:\n"
"If the file for your language does not exist yet:"
-msgstr "Создайте файлы:\nЕсли файла для вашего языка еще нет:"
+msgstr ""
+"Создайте файлы:\n"
+"Если файла для вашего языка еще нет:"
#: i2p2www/pages/site/get-involved/guides/new-translators.html:38
msgid ""
-"Run \"./extract-messages.sh
\" to generate a messages.pot
in the base directory.\n"
-"Edit the header of this file, then run \"./init-new-po.sh locale
\" to generate the file\n"
-"i2p2www/translations/locale/LC_MESSAGES/messages.po
. \"mtn add
\" this file."
-msgstr "Выполните \"./extract-messages.sh
\" чтобы сгенерировать messages.pot
в основной директории.\nОтредактируйте заголовок файла, затем выполните \"./init-new-po.sh locale
\" чтобы сгенерировать файл\ni2p2www/translations/locale/LC_MESSAGES/messages.po
. \"mtn add
\" этот файл."
+"Run \"./extract-messages.sh
\" to generate a "
+"messages.pot
in the base directory.\n"
+"Edit the header of this file, then run \"./init-new-po.sh "
+"locale
\" to generate the file\n"
+"i2p2www/translations/locale/LC_MESSAGES/messages.po
. "
+"\"mtn add
\" this file."
+msgstr ""
+"Выполните \"./extract-messages.sh
\" чтобы сгенерировать "
+"messages.pot
в основной директории.\n"
+"Отредактируйте заголовок файла, затем выполните \"./init-new-po.sh "
+"locale
\" чтобы сгенерировать файл\n"
+"i2p2www/translations/locale/LC_MESSAGES/messages.po
. "
+"\"mtn add
\" этот файл."
#: i2p2www/pages/site/get-involved/guides/new-translators.html:43
msgid ""
"Edit i2p2www/pages/global/lang.html
and add a line for your "
"language (copy an existing line)."
-msgstr "Отредактируйте i2p2www/pages/global/lang.html
и добавьте строку для вашего языка (скопируйте какую-нибудь строку)."
+msgstr ""
+"Отредактируйте i2p2www/pages/global/lang.html
и добавьте "
+"строку для вашего языка (скопируйте какую-нибудь строку)."
#: i2p2www/pages/site/get-involved/guides/new-translators.html:46
msgid ""
-"Add a flag image file to i2p2www/static/images/flags/
for the "
-"menu (copy from the router)."
-msgstr "Добавьте файл с изображением флага в i2p2www/static/images/flags/
для меню (скопируйте из маршрутизатора)."
+"Add a flag image file to i2p2www/static/images/flags/
for "
+"the menu (copy from the router)."
+msgstr ""
+"Добавьте файл с изображением флага в "
+"i2p2www/static/images/flags/
для меню (скопируйте из "
+"маршрутизатора)."
#: i2p2www/pages/site/get-involved/guides/new-translators.html:52
msgid ""
"Edit files:\n"
"Edit i2p2www/translations/locale/LC_MESSAGES/messages.po
.\n"
-"To work with .po files efficiently, you may wish to use POEdit"
-msgstr "Отредактируйте файлы:\nОтредактируйте i2p2www/translations/locale/LC_MESSAGES/messages.po
.\nЧтобы эффективно работать с файлами .po, возможно, вы захотите использовать POEdit"
+"To work with .po files efficiently, you may wish to use POEdit"
+msgstr ""
+"Отредактируйте файлы:\n"
+"Отредактируйте "
+"i2p2www/translations/locale/LC_MESSAGES/messages.po
.\n"
+"Чтобы эффективно работать с файлами .po, возможно, вы захотите "
+"использовать POEdit"
#: i2p2www/pages/site/get-involved/guides/new-translators.html:58
#: i2p2www/pages/site/get-involved/guides/new-translators.html:151
msgid ""
"Check in:\n"
-"\"mtn pull
\", \"mtn update
\". Then check in by \"mtn ci -k yourname@mail.i2p file1 file2 ...
\"\n"
-"This collects the diff info of your changed file into your local repo. Then \"mtn sync mtn.i2p2.de -k yourname-transport@mail.i2p i2p.i2p
\".\n"
+"\"mtn pull
\", \"mtn update
\". Then check in by "
+"\"mtn ci -k yourname@mail.i2p file1 file2 ...
\"\n"
+"This collects the diff info of your changed file into your local repo. "
+"Then \"mtn sync mtn.i2p2.de -k yourname-transport@mail.i2p "
+"i2p.i2p
\".\n"
"This synchronizes your local repo with the repo on the target machine."
-msgstr "Разместите:\n\"mtn pull
\", \"mtn update
\". Затем выполните размещение \"mtn ci -k yourname@mail.i2p file1 file2 ...
\"\nТак вы соберете информацию а различиям в измененных вами файлах по вашему локальному репозиторию. Затем \"mtn sync mtn.i2p2.de -k yourname-transport@mail.i2p i2p.i2p
\".\nТак вы синхронизируете ваш локальный репозиторий с репозиторием на целевом компьютере."
+msgstr ""
+"Разместите:\n"
+"\"mtn pull
\", \"mtn update
\". Затем выполните "
+"размещение \"mtn ci -k yourname@mail.i2p file1 file2 ...
\"\n"
+"Так вы соберете информацию а различиям в измененных вами файлах по вашему"
+" локальному репозиторию. Затем \"mtn sync mtn.i2p2.de -k yourname-"
+"transport@mail.i2p i2p.i2p
\".\n"
+"Так вы синхронизируете ваш локальный репозиторий с репозиторием на "
+"целевом компьютере."
#: i2p2www/pages/site/get-involved/guides/new-translators.html:65
#: i2p2www/pages/site/get-involved/guides/new-translators.html:158
@@ -3218,10 +4929,17 @@ msgstr "Как Переводить Консоль Маршрутизатора"
#: i2p2www/pages/site/get-involved/guides/new-translators.html:74
#, python-format
msgid ""
-"The easiest way by far to translate the router console is to sign up for an account at \n"
-"Transifex and request to join a translation team. \n"
+"The easiest way by far to translate the router console is to sign up for "
+"an account at \n"
+"Transifex and request to join a translation"
+" team. \n"
"Alternatively it can be done \"the old way\" as outlined below."
-msgstr "До сих пор самый простой способ перевода консоли маршрутизатора - получить аккаунт на \nTransifex и присоединиться к команде переводчиков. \nИли можно переводить \"по старинке\", как описано ниже."
+msgstr ""
+"До сих пор самый простой способ перевода консоли маршрутизатора - "
+"получить аккаунт на \n"
+"Transifex и присоединиться к команде "
+"переводчиков. \n"
+"Или можно переводить \"по старинке\", как описано ниже."
#: i2p2www/pages/site/get-involved/guides/new-translators.html:90
#, python-format
@@ -3229,7 +4947,10 @@ msgid ""
"Follow the new developer's guide,\n"
"including the installation of monotone and the gettext tools,\n"
"checking out i2p.i2p branch, and generate your own monotone keys."
-msgstr "Следуйте руководству нового разработчика,\nвключая установку monotone and средств gettext,\nизвлеките ветку i2p.i2p, и сгенерируйте свои собственные ключи monotone."
+msgstr ""
+"Следуйте руководству нового разработчика,\n"
+"включая установку monotone and средств gettext,\n"
+"извлеките ветку i2p.i2p, и сгенерируйте свои собственные ключи monotone."
#: i2p2www/pages/site/get-involved/guides/new-translators.html:95
msgid "Generate your own gpg key and sign the dev agreement."
@@ -3237,43 +4958,74 @@ msgstr "Сгенерируйте ваш собственный gpg ключ и
#: i2p2www/pages/site/get-involved/guides/new-translators.html:101
msgid ""
-"Before starting a console translation, better help translate some i2p webpages first.\n"
+"Before starting a console translation, better help translate some i2p "
+"webpages first.\n"
"At least an i2p homepage in your language would be great."
-msgstr "До начала перевода консоли маршрутизатора, лучше сначал помогите перевести несколько веб-страниц i2p.\nХотя бы домашнюю страницу i2p на ваш язык, это было бы здорово."
+msgstr ""
+"До начала перевода консоли маршрутизатора, лучше сначал помогите "
+"перевести несколько веб-страниц i2p.\n"
+"Хотя бы домашнюю страницу i2p на ваш язык, это было бы здорово."
#: i2p2www/pages/site/get-involved/guides/new-translators.html:106
msgid ""
"What to translate:\n"
"There are about 15 files in the i2p.i2p branch that needs translation:"
-msgstr "Что переводить:\nЕсть около 15 файлов в ветке i2p.i2p, которые нужно перевести:"
+msgstr ""
+"Что переводить:\n"
+"Есть около 15 файлов в ветке i2p.i2p, которые нужно перевести:"
#: i2p2www/pages/site/get-involved/guides/new-translators.html:132
msgid ""
"Where xx is your language code like fr/de/ch/zh/...\n"
-"There may be or may not be files with your lang code. If not, you can create your own. by copying and renaming other language files you know with your own lang code."
-msgstr "Где xx это код вашего языка, как fr/de/ch/zh/...\nФайл с кодом вашего языка может быть, может и нет. Если его нет, вы можете его создать. Скопировав файл другого известного вам языка и переименовав его в код вашего языка."
+"There may be or may not be files with your lang code. If not, you can "
+"create your own. by copying and renaming other language files you know "
+"with your own lang code."
+msgstr ""
+"Где xx это код вашего языка, как fr/de/ch/zh/...\n"
+"Файл с кодом вашего языка может быть, может и нет. Если его нет, вы "
+"можете его создать. Скопировав файл другого известного вам языка и "
+"переименовав его в код вашего языка."
#: i2p2www/pages/site/get-involved/guides/new-translators.html:137
msgid ""
"Create files:\n"
-"If the file for your language does not exist yet, copy another language file to a new file foo_xx.bar
for your language.\n"
+"If the file for your language does not exist yet, copy another language "
+"file to a new file foo_xx.bar
for your language.\n"
"Then \"mtn add
\" the file.\n"
-"After creating a .po file, edit the headers. Then run \"ant distclean poupdate
\"."
-msgstr "Создайте файлы:\nЕсли файла для вашего языка еще нет, скопируйте файл другого языка в новый файл foo_xx.bar
для вашего языка.\nЗатем \"mtn add
\" файл.\nПосле создания файла .po, отредактируйте заголовки. Затем выполните \"ant distclean poupdate
\"."
+"After creating a .po file, edit the headers. Then run \"ant "
+"distclean poupdate
\"."
+msgstr ""
+"Создайте файлы:\n"
+"Если файла для вашего языка еще нет, скопируйте файл другого языка в "
+"новый файл foo_xx.bar
для вашего языка.\n"
+"Затем \"mtn add
\" файл.\n"
+"После создания файла .po, отредактируйте заголовки. Затем выполните "
+"\"ant distclean poupdate
\"."
#: i2p2www/pages/site/get-involved/guides/new-translators.html:144
msgid ""
"Start to work:\n"
"Edit the HTML files with any text editor.\n"
"Be sure not to use an editor in HTML mode that reformats everything.\n"
-"To work with .po files efficiently, you may wish to use POEdit"
-msgstr "Начните работу:\nОтредактируйте файлы HTML в любом текстовом редакторе.\nНе нужно использовать редакторы в режиме HTML, которые отформатируют весь текст.\nДля более эффективной работы с файлами .po, вы, возможно, захотите использовать POEdit"
+"To work with .po files efficiently, you may wish to use POEdit"
+msgstr ""
+"Начните работу:\n"
+"Отредактируйте файлы HTML в любом текстовом редакторе.\n"
+"Не нужно использовать редакторы в режиме HTML, которые отформатируют весь"
+" текст.\n"
+"Для более эффективной работы с файлами .po, вы, возможно, захотите "
+"использовать POEdit"
#: i2p2www/pages/site/get-involved/guides/new-translators.html:163
msgid ""
"As you can see, it's not that difficult.\n"
-"If you have questions about the meaning of the terms in the console, ask in #i2p-dev
on IRC."
-msgstr "Как вы видите, это не так сложно.\nЕсли у вас есть вопросы насчет значения терминов в консоли, спросите в #i2p-dev
в IRC."
+"If you have questions about the meaning of the terms in the console, ask "
+"in #i2p-dev
on IRC."
+msgstr ""
+"Как вы видите, это не так сложно.\n"
+"Если у вас есть вопросы насчет значения терминов в консоли, спросите в "
+"#i2p-dev
в IRC."
#: i2p2www/pages/site/get-involved/guides/new-translators.html:169
msgid "FAQ"
@@ -3281,9 +5033,12 @@ msgstr "ЧАВо"
#: i2p2www/pages/site/get-involved/guides/new-translators.html:171
msgid ""
-"Q: Why do I have to install monotone, Java, jsp, learn about .po files and "
-"html, etc.? Why can't I just do a translation and email it to you?"
-msgstr "В: Зачем мне нужно устанавливать monotone, Java, jsp, знать о файлах .po и html и т.д.? Почему я не могу просто переводить и отправлять все вам на почту?"
+"Q: Why do I have to install monotone, Java, jsp, learn about .po files "
+"and html, etc.? Why can't I just do a translation and email it to you?"
+msgstr ""
+"В: Зачем мне нужно устанавливать monotone, Java, jsp, знать о файлах .po "
+"и html и т.д.? Почему я не могу просто переводить и отправлять все вам на"
+" почту?"
#: i2p2www/pages/site/get-involved/guides/new-translators.html:175
msgid "A: Several reasons:"
@@ -3294,70 +5049,103 @@ msgstr "О: Несколько причин:"
msgid ""
"You might be interested in translating via Transifex. Request to join a "
"translation team here."
-msgstr "Возможно вы заинтересуетесь переводом через Transifex. Присоединитесь к команде переводчиков тут."
+msgstr ""
+"Возможно вы заинтересуетесь переводом через Transifex. Присоединитесь к "
+"команде переводчиков тут."
#: i2p2www/pages/site/get-involved/guides/new-translators.html:182
msgid ""
-"We don't have anybody who has time to accept manual contributions and submit"
-" them to our source control system on your behalf. Even if we did, it "
-"doesn't scale."
-msgstr "У нас нет людей, у которых есть время для приема помощи вручную и размещения в системе контроля версий от вашего имени. Даже если бы и были, это плохо масштабируется."
+"We don't have anybody who has time to accept manual contributions and "
+"submit them to our source control system on your behalf. Even if we did, "
+"it doesn't scale."
+msgstr ""
+"У нас нет людей, у которых есть время для приема помощи вручную и "
+"размещения в системе контроля версий от вашего имени. Даже если бы и "
+"были, это плохо масштабируется."
#: i2p2www/pages/site/get-involved/guides/new-translators.html:186
msgid ""
"Maybe you are thinking translation is a one-step process. It isn't. You "
"can't do it all at once. You will make mistakes. You need to test it and "
-"tweak it to make it look right before you submit it. Developers will "
-"update or add to the English text, thus requiring a translation update."
-msgstr "Может вы думаете, что перевод это одношаговый процесс. Это не так. Вы не можете выполнить его за один раз. Вы будете совершать ошибки. Вам нужно его протестировать и сделать его верным до того, как вы его утвердите. Разработчики обновляют или добавляют Английский текст, поэтому требуется обновление перевода."
+"tweak it to make it look right before you submit it. Developers "
+"will update or add to the English text, thus requiring a translation "
+"update."
+msgstr ""
+"Может вы думаете, что перевод это одношаговый процесс. Это не так. Вы не "
+"можете выполнить его за один раз. Вы будете совершать ошибки. Вам нужно "
+"его протестировать и сделать его верным до того, как вы его "
+"утвердите. Разработчики обновляют или добавляют Английский текст, поэтому"
+" требуется обновление перевода."
#: i2p2www/pages/site/get-involved/guides/new-translators.html:190
msgid ""
"Having translators use a source control system directly provides "
-"authentication and accountablility - we know who is doing what, and we can "
-"track changes, and revert them if necessary."
-msgstr "Наличие переводчиков, использующих систему контроля версий, увязано с аутентификацией и отчетностью - мы знаем кто что делает, и мы можем отследить изменения, и отменить их в случае необходимости."
+"authentication and accountablility - we know who is doing what, and we "
+"can track changes, and revert them if necessary."
+msgstr ""
+"Наличие переводчиков, использующих систему контроля версий, увязано с "
+"аутентификацией и отчетностью - мы знаем кто что делает, и мы можем "
+"отследить изменения, и отменить их в случае необходимости."
#: i2p2www/pages/site/get-involved/guides/new-translators.html:194
msgid ""
-".po files are not difficult. If you don't want to work directly with them, "
-"we recommend 'poedit'."
-msgstr "в файлах .po нет ничего сложного. Если вы не хотите работать непосредственно с ними, мы рекомендуем 'poedit'."
+".po files are not difficult. If you don't want to work directly with "
+"them, we recommend 'poedit'."
+msgstr ""
+"в файлах .po нет ничего сложного. Если вы не хотите работать "
+"непосредственно с ними, мы рекомендуем 'poedit'."
#: i2p2www/pages/site/get-involved/guides/new-translators.html:198
msgid ""
-"HTML files are not difficult. Just ignore the html stuff and translate the "
-"text."
-msgstr "В файлах HTML нет ничего сложного. Просто игнорируйте все тэги и переводите текст."
+"HTML files are not difficult. Just ignore the html stuff and translate "
+"the text."
+msgstr ""
+"В файлах HTML нет ничего сложного. Просто игнорируйте все тэги и "
+"переводите текст."
#: i2p2www/pages/site/get-involved/guides/new-translators.html:202
msgid ""
"Installing and using monotone is not that difficult. Several of the "
-"translators and other contributors to I2P are non-programmers, and they use "
-"monotone regularly. Monotone is simply a source control system, it is not "
-"about \"coding\"."
-msgstr "Установка и использование monotone не так сложны. Несколько переводчиков и других помощников I2P не являются программистами, и они регулярно используют monotone. Monotone - это просто система контроля версий, в нем нет ничего \"программистского\"."
+"translators and other contributors to I2P are non-programmers, and they "
+"use monotone regularly. Monotone is simply a source control system, it is"
+" not about \"coding\"."
+msgstr ""
+"Установка и использование monotone не так сложны. Несколько переводчиков "
+"и других помощников I2P не являются программистами, и они регулярно "
+"используют monotone. Monotone - это просто система контроля версий, в нем"
+" нет ничего \"программистского\"."
#: i2p2www/pages/site/get-involved/guides/new-translators.html:206
msgid ""
"Our items to translate are not \"documents\". They are html files and po "
-"files, with a specific format and character encoding (UTF-8) that must be "
-"maintained, and not corrupted by email programs or other methods of "
+"files, with a specific format and character encoding (UTF-8) that must be"
+" maintained, and not corrupted by email programs or other methods of "
"transfer."
-msgstr "Наша единица перевода - это не \"документ\". Это файлы html и .po, в определенном формате и кодировкой символов (UTF-8), это нужно поддерживать, и не поломать при отправке по почте или другими методами передачи."
+msgstr ""
+"Наша единица перевода - это не \"документ\". Это файлы html и .po, в "
+"определенном формате и кодировкой символов (UTF-8), это нужно "
+"поддерживать, и не поломать при отправке по почте или другими методами "
+"передачи."
#: i2p2www/pages/site/get-involved/guides/new-translators.html:210
msgid ""
-"We looked at 'pootle' as a front-end for translators. It didn't work well, "
-"needed an administrator, and a pootle-based process would suffer from a "
-"number of the above flaws."
-msgstr "Мы рассматриваем 'pootle' в качестве фронт-энда для переводчиков. Он работает не так как нужно, нуждается в администрировании, и pootle-подобный процесс страдает от ряда вышеописанных недостатков."
+"We looked at 'pootle' as a front-end for translators. It didn't work "
+"well, needed an administrator, and a pootle-based process would suffer "
+"from a number of the above flaws."
+msgstr ""
+"Мы рассматриваем 'pootle' в качестве фронт-энда для переводчиков. Он "
+"работает не так как нужно, нуждается в администрировании, и "
+"pootle-подобный процесс страдает от ряда вышеописанных недостатков."
#: i2p2www/pages/site/get-involved/guides/new-translators.html:215
msgid ""
"In summary:\n"
-"Yes, we know it is somewhat of a hurdle to get started. It's really the only possible way we can do it. Give it a try, it really isn't that hard."
-msgstr "В итоге:\nДа, мы знаем, что у начинающих есть преграды. Это действительно единственный способ. Попробуйте, это на самом деле не так сложно."
+"Yes, we know it is somewhat of a hurdle to get started. It's really the "
+"only possible way we can do it. Give it a try, it really isn't that hard."
+msgstr ""
+"В итоге:\n"
+"Да, мы знаем, что у начинающих есть преграды. Это действительно "
+"единственный способ. Попробуйте, это на самом деле не так сложно."
#: i2p2www/pages/site/get-involved/guides/new-translators.html:220
msgid "More Information"
@@ -3368,4 +5156,7 @@ msgstr "Больше информации"
msgid ""
"The #i2p-dev channel on IRC, or the translation forum on %(zzz)s."
-msgstr "Канал #i2p-dev в IRC, или форум перевода на %(zzz)s."
+msgstr ""
+"Канал #i2p-dev в IRC, или форум "
+"перевода на %(zzz)s."
+
diff --git a/i2p2www/translations/sv/LC_MESSAGES/get-involved.po b/i2p2www/translations/sv/LC_MESSAGES/get-involved.po
index 25fb0353..5d7108a5 100644
--- a/i2p2www/translations/sv/LC_MESSAGES/get-involved.po
+++ b/i2p2www/translations/sv/LC_MESSAGES/get-involved.po
@@ -3733,15 +3733,3 @@ msgid ""
"href=\"http://%(zzz)s/forums/14\">translation forum on %(zzz)s."
msgstr ""
-
-
-
-
-
-
-
-
-
-
-
-