Compare commits
2 Commits
reseed-rew
...
debian-var
Author | SHA1 | Date | |
---|---|---|---|
2462c4b657 | |||
e3ce4a7a1a |
@ -1 +0,0 @@
|
||||
.git
|
@ -22,9 +22,9 @@ except ImportError:
|
||||
###########
|
||||
# Constants
|
||||
|
||||
CURRENT_I2P_VERSION = '1.9.0'
|
||||
CURRENT_I2P_FIREFOX_PROFILE_VERSION = '1.9.5'
|
||||
CURRENT_I2P_OSX_VERSION = '1.9.0'
|
||||
CURRENT_I2P_VERSION = '1.8.0'
|
||||
CURRENT_I2P_FIREFOX_PROFILE_VERSION = '1.8.0'
|
||||
CURRENT_I2P_OSX_VERSION = '1.8.0'
|
||||
|
||||
CANONICAL_DOMAIN = 'geti2p.net'
|
||||
|
||||
|
@ -1,201 +0,0 @@
|
||||
|
||||
============================================================
|
||||
{% trans -%}Meet Your Maintainer: StormyCloud{%- endtrans %}
|
||||
============================================================
|
||||
|
||||
.. meta::
|
||||
:author: sadie
|
||||
:date: 2022-09-07
|
||||
:category: general
|
||||
:excerpt: {% trans %}An interview with the maintainers of the StormyCloud Outproxy{% endtrans %}
|
||||
|
||||
{% trans -%}
|
||||
A conversation with StormyCloud Inc.
|
||||
{%- endtrans %}
|
||||
====================================
|
||||
|
||||
{% trans -%}
|
||||
With the most recent `I2P Java
|
||||
release <https://geti2p.net/en/blog/post/2022/08/22/1.9.0-Release>`__,
|
||||
the existing outproxy, false.i2p was replaced with the new StormyCloud
|
||||
outproxy for new I2P installs. For people who are updating their router,
|
||||
changing over to the Stormycloud service can be done quickly.
|
||||
{%- endtrans %}
|
||||
|
||||
{% trans -%}
|
||||
In your Hidden Services Manager, change both Outproxies and SSL
|
||||
Outproxies to exit.stormycloud.i2p and click on the save button at the
|
||||
bottom of the page.
|
||||
{%- endtrans %}
|
||||
|
||||
|outproxystormy| **{% trans -%}Who is StormyCloud Inc?{%- endtrans %}**
|
||||
|
||||
**Mission of StormyCloud Inc.**
|
||||
|
||||
{% trans -%}
|
||||
To defend Internet access as a universal human right. By doing so, the
|
||||
group protects users’ electronic privacy and builds community by
|
||||
fostering unrestricted access to information and thus the free exchange
|
||||
of ideas across borders. This is essential because the Internet is the
|
||||
most powerful tool available for making a positive difference in the
|
||||
world.
|
||||
{%- endtrans %}
|
||||
|
||||
**{% trans -%}Vision Statement{%- endtrans %}**
|
||||
|
||||
{% trans -%}
|
||||
To become a pioneer in providing free and open Internet to everyone in
|
||||
the universe because Internet access is a basic human right
|
||||
`(https://stormycloud.org/about-us/) <https://stormycloud.org/about-us/>`__
|
||||
{%- endtrans %}
|
||||
|
||||
{% trans -%}
|
||||
I met with Dustin to say hello, and to talk more about privacy, the need
|
||||
for services like StormyCloud, and what drew the company to I2P.
|
||||
{%- endtrans %}
|
||||
|
||||
**{% trans -%}What was the inspiration behind starting StormyCloud?{%- endtrans %}**
|
||||
|
||||
{% trans -%}
|
||||
It was late 2021, I was on the /r/tor subreddit. There was a person who
|
||||
had responded in a thread about how to use Tor who talked about how they
|
||||
relied on Tor in order to stay in contact with their family. Their
|
||||
family lived in the United States, but at the time they resided in a
|
||||
country where internet access was very restricted. They needed to be
|
||||
very cautious about who they communicated with and what they said. For
|
||||
these reasons, they relied on Tor. I thought about how I can communicate
|
||||
with people without fear or restrictions and that it should be the same
|
||||
for everyone.
|
||||
{%- endtrans %}
|
||||
|
||||
{% trans -%}
|
||||
The goal of StormyCloud is to help as many people as we can to do that.
|
||||
{%- endtrans %}
|
||||
|
||||
**{% trans -%}What have been some of the challenges of getting StormyCloud
|
||||
started?{%- endtrans %}**
|
||||
|
||||
{% trans -%}
|
||||
The cost — it is ungodly expensive. We went the data centre route since
|
||||
the scale of what we are doing is not something that can be done on a
|
||||
home network. There are equipment expenses and reoccurring hosting
|
||||
costs.
|
||||
{%- endtrans %}
|
||||
|
||||
{% trans -%}
|
||||
In regard to setting up the non-profit, we followed in Emerald Onion’s
|
||||
path and utilized some of their documents and lessons learned. The Tor
|
||||
community has many resources available that are very helpful.
|
||||
{%- endtrans %}
|
||||
|
||||
**{% trans -%}How has the response been to your services?{%- endtrans %}**
|
||||
|
||||
{% trans -%}
|
||||
In July we served 1.5 billion DNS requests over all of our services.
|
||||
People appreciate that there is no logging being done. The data is just
|
||||
not there, and people like that.
|
||||
{%- endtrans %}
|
||||
|
||||
**{% trans -%}What is an outproxy?{%- endtrans %}**
|
||||
|
||||
{% trans -%}
|
||||
An outproxy is similar to Tor’s exit nodes, it allows for clearnet
|
||||
(normal internet traffic) to be relayed through the I2P network. In
|
||||
other words, it allows I2P users to access the internet through the
|
||||
safety of the I2P network.
|
||||
{%- endtrans %}
|
||||
|
||||
**{% trans -%}What is special about the StormyCloud I2P Outproxy?{%- endtrans %}**
|
||||
|
||||
{% trans -%}
|
||||
To start with we are multi-homed which means we have several servers
|
||||
serving outproxy traffic. This ensures the service is always available
|
||||
to the community. All the logs on our servers are wiped every 15
|
||||
minutes. This ensures both law enforcement and ourselves do not have
|
||||
access to any data. We support visiting Tor onion links though the
|
||||
outproxy, and our outproxy is pretty fast.
|
||||
{%- endtrans %}
|
||||
|
||||
**{% trans -%}How do you define privacy? What are some of the issues you see with
|
||||
overreach and data handling?{%- endtrans %}**
|
||||
|
||||
{% trans -%}
|
||||
Privacy is freedom from unauthorized access. Transparency is important,
|
||||
such as opting in — the example being GDPR requirements.
|
||||
{%- endtrans %}
|
||||
|
||||
{% trans -%}
|
||||
There are big companies hoarding data that is being used for
|
||||
`warrantless access to location
|
||||
data. <https://www.eff.org/deeplinks/2022/08/fog-revealed-guided-tour-how-cops-can-browse-your-location-data>`__
|
||||
There is overreach of tech companies into what people think is, and
|
||||
should be private, like photos or messages.
|
||||
{%- endtrans %}
|
||||
|
||||
{% trans -%}
|
||||
It is important to keep doing outreach about how to keep your
|
||||
communication safe, and what tools or apps will help a person do so. The
|
||||
way that we interact with all of the information out there is important
|
||||
as well. We need to trust but verify.
|
||||
{%- endtrans %}
|
||||
|
||||
**{% trans -%}How does I2P fit into StormyCloud’s Mission and Vision Statement?{%- endtrans %}**
|
||||
|
||||
{% trans -%}
|
||||
I2P is an open source project, and what it offers aligns with the
|
||||
mission of StormyCloud Inc. I2P provides a layer of privacy and
|
||||
protection for traffic and communication, and the project believes that
|
||||
everybody has a right to privacy.
|
||||
{%- endtrans %}
|
||||
|
||||
{% trans -%}
|
||||
We became aware of I2P in early 2022 when talking to people in the Tor
|
||||
community, and liked what the project was doing. It seemed similar to
|
||||
Tor.
|
||||
{%- endtrans %}
|
||||
|
||||
{% trans -%}
|
||||
During our introduction to I2P and its capabilities, we saw the need for
|
||||
a reliable outproxy. We had really great support from people in the I2P
|
||||
community to create and start providing the outproxy service.
|
||||
{%- endtrans %}
|
||||
|
||||
**{% trans -%}I am always curious about first impressions and what resources we can
|
||||
provide or improve on for people who are getting started with I2P. What
|
||||
can you tell me about your experience and suggestions for onboarding?{%- endtrans %}**
|
||||
|
||||
{% trans -%}
|
||||
Make it easy to replicate or understand for people with limited IT
|
||||
knowledge or knowledge of I2P. Using the router, or even using email on
|
||||
I2P should be easy for everybody.
|
||||
{%- endtrans %}
|
||||
|
||||
**{% trans -%}Conclusion{%- endtrans %}**
|
||||
|
||||
{% trans -%}
|
||||
The need for awareness about surveilling what should be private in our
|
||||
online lives is ongoing. Collecting any data should be consensual , and
|
||||
privacy should be implicit.
|
||||
{%- endtrans %}
|
||||
|
||||
{% trans -%}
|
||||
Where we cannot trust that our traffic or communication will not be
|
||||
observed without consent, we thankfully have access to networks that
|
||||
will by-design anonymize traffic and hide our locations.
|
||||
{%- endtrans %}
|
||||
|
||||
{% trans -%}
|
||||
Thank you to StormyCloud and everyone who provides outproxies or nodes
|
||||
for Tor and I2P so that people can access the internet more safely when
|
||||
they need to. I look forward to more people bridging the capabilities of
|
||||
these complementary networks to create a more robust privacy ecosystem
|
||||
for everyone.
|
||||
{%- endtrans %}
|
||||
|
||||
{% trans -%}
|
||||
Learn more about StormyCloud Inc.’s services https://stormycloud.org/
|
||||
and help support their work by making a donation
|
||||
https://stormycloud.org/donate/.
|
||||
{%- endtrans %}
|
||||
|
||||
.. |outproxystormy| image:: https://user-images.githubusercontent.com/50714166/188997993-465b6a5a-52a0-40f0-bdff-68ca2b6c97ba.png
|
@ -1,27 +0,0 @@
|
||||
====================================================================
|
||||
{% trans -%}Windows Easy-Install Bundle 1.9.5 Release{%- endtrans %}
|
||||
====================================================================
|
||||
|
||||
.. meta::
|
||||
:author: idk
|
||||
:date: 2022-09-07
|
||||
:category: release
|
||||
:excerpt: {% trans %}Windows Easy-Install Bundle 1.9.5{% endtrans %}
|
||||
|
||||
{% trans -%}
|
||||
Bug Fixing release for Windows 11 users
|
||||
{%- endtrans %}
|
||||
=======================================
|
||||
|
||||
{% trans -%}
|
||||
This point release includes a bug fix in the included I2P router, which resolves
|
||||
a highly obscure bug where the context clock is out of sync with the clock in
|
||||
use by the File System, resulting in a router which is unable to read the current
|
||||
state of it's own NetDB. Although this bug has only been observed on Windows 11
|
||||
so far, it is highly recommended that all users update to the new build.
|
||||
{%- endtrans %}
|
||||
|
||||
{% trans -%}
|
||||
This release also features faster startup and times improved stability in the profile
|
||||
manager.
|
||||
{%- endtrans %}
|
@ -1,135 +0,0 @@
|
||||
{% trans -%}
|
||||
==================================
|
||||
A Reminder to be Safe as I2P Grows
|
||||
==================================
|
||||
{%- endtrans %}
|
||||
.. meta::
|
||||
:author: idk
|
||||
:date: 2022-09-26
|
||||
:category: general
|
||||
:excerpt: {% trans %}{% endtrans %}
|
||||
|
||||
{% trans -%}
|
||||
A Reminder to be Safe as I2P Grows
|
||||
{%- endtrans %}
|
||||
==================================
|
||||
|
||||
{% trans -%}
|
||||
It is an an exciting time for The Invisible Internet Project (I2P). We
|
||||
are completing our migration to modern cryptography across all of our
|
||||
transports, ( Java and C++), and we have recently gained a high-capacity
|
||||
and professional outproxy service, and there are more applications
|
||||
integrating I2P based functionality than ever. The network is poised to
|
||||
grow, so now is a good time to remind everyone to be smart and be safe
|
||||
when obtaining I2P and I2P-related software. We welcome new
|
||||
applications, implementations, and forks with new ideas, and the power
|
||||
of the network comes from its openness to participation by all I2P
|
||||
users. In fact, we don’t like to call you users, we like to use the word
|
||||
“Participants” because each of you helps the network, in your own way by
|
||||
contributing content, developing applications, or simply routing traffic
|
||||
and helping other participants find peers.
|
||||
{%- endtrans %}
|
||||
|
||||
{% trans -%}
|
||||
You are the network, and we want you to be safe.
|
||||
{%- endtrans %}
|
||||
|
||||
{% trans -%}
|
||||
We have become aware of attempts to impersonate I2P’s presence on the
|
||||
web and social media. To avoid offering momentum to these campaigns, we
|
||||
will not mention the actors affiliated with them, However, in order to
|
||||
help you recognize these campaigns should you encounter them in the
|
||||
wild, we are documenting their tactics:
|
||||
{%- endtrans %}
|
||||
|
||||
- Copying text directly from the I2P Web Site without acknowledging our
|
||||
licence requirements in a way that may suggest endorsement.
|
||||
- Involvement or promotion of an Intial Coin Offering, or ICO
|
||||
- Crypto-Scam like language
|
||||
- Graphics that have nothing to do with the textual content
|
||||
- Click-farming behavior, sites that appear to have content but which
|
||||
instead link to other sites
|
||||
- Attempts to get the user to register for non-I2P chat servers. We
|
||||
come to you or you come to us, we will not ask you to meet us at a
|
||||
third-party service unless you already use it(Note that this is not
|
||||
always true for other forks and projects, but it is true of
|
||||
geti2p.net).
|
||||
- The use of bot networks to amplify the message on social media.
|
||||
I2P(geti2p.net) does not use bots to spread the message.
|
||||
|
||||
{% trans -%}
|
||||
These campaigns have had the side-effect of “shadow-banning” some
|
||||
legitimate I2P-related discussion on Twitter and possibly other social
|
||||
media.
|
||||
{%- endtrans %}
|
||||
|
||||
{% trans -%}Our Sites{%- endtrans %}
|
||||
---------
|
||||
|
||||
{% trans -%}
|
||||
We have official sites where people may obtain the I2P software safely:
|
||||
{%- endtrans %}
|
||||
|
||||
- `Official Website - i2p.net - TLS Fingerprint(SHA256) -
|
||||
5B:09:29:D9:26:64:7D:0E:33:B6:4A:9D:6F:58:FA:5E:24:EF:18:81:21:A9:A9:4F:8B:D2:CE:D8:74:91:60:8B <https://i2p.net>`__
|
||||
- `Official Website - geti2p.net - TLS Fingerprint(SHA256) -
|
||||
5B:09:29:D9:26:64:7D:0E:33:B6:4A:9D:6F:58:FA:5E:24:EF:18:81:21:A9:A9:4F:8B:D2:CE:D8:74:91:60:8B <https://geti2p.net>`__
|
||||
- `Official Gitlab - i2pgit.org - TLS Fingerprint(SHA256) -
|
||||
0E:90:B8:61:AA:38:AB:4A:A4:F3:54:07:AC:8B:B6:FF:03:3D:DC:18:31:BD:BA:EA:4C:A9:73:28:22:CB:97:30 <https://i2pgit.org>`__
|
||||
- `Official Debian Repository - deb.i2p2.de - TLS
|
||||
Fingerprint(SHA256) -
|
||||
17:42:0B:AB:B6:4F:24:51:5E:BC:AD:10:44:9E:2C:C9:37:BB:28:89:74:62:6B:0A:9F:23:4C:5E:A5:EA:64:91 <https://deb.i2p2.de>`__
|
||||
- `Official Debian Repository - deb.i2p2.no - TLS
|
||||
Fingerprint(SHA256) -
|
||||
EC:43:E8:DC:29:8E:BB:78:B9:88:70:ED:21:1A:8E:AD:FA:8D:6F:5E:D9:56:54:89:9F:7B:30:58:1E:03:02:CE <https://deb.i2p2.no>`__
|
||||
- `Official Forums - i2pforum.net - TLS Fingerprint(SHA256) -
|
||||
7B:1E:B6:5D:C7:5A:DE:32:E6:08:DB:8E:3C:4C:DB:5F:67:DB:13:A3:C8:1F:F9:26:53:C9:49:94:8E:CD:90:D1 <https://i2pforum.net>`__
|
||||
|
||||
{% trans -%}Invisible Internet Project Forums, Blogs and Social Media{%- endtrans %}
|
||||
---------------------------------------------------------
|
||||
|
||||
{% trans -%}Hosted by the project{%- endtrans %}
|
||||
~~~~~~~~~~~~~~~~~~~~~
|
||||
|
||||
- `I2P Forums <https://i2pforum.net>`__ and it’s `I2P
|
||||
Mirror <https://i2pforum.i2p>`__
|
||||
- irc: `#i2p-dev` on Irc2P(`127.0.0.1:6668` in a standard I2P
|
||||
installation)
|
||||
|
||||
{% trans -%}Hosted by Others{%- endtrans %}
|
||||
~~~~~~~~~~~~~~~~
|
||||
|
||||
{% trans -%}
|
||||
These services are hosted by third-parties, sometimes corporations,
|
||||
where we participate in order to provide a social media outreach
|
||||
presence to I2P users who choose to participate in them. We will never
|
||||
ask you to participate in these unless you already have an account with
|
||||
them, prior to interacting with us.
|
||||
{%- endtrans %}
|
||||
|
||||
- `Launchpad : https://launchpad.net/i2p <https://launchpad.net/i2p>`__
|
||||
- `Twitter : https://twitter.com/GetI2P <https://twitter.com/GetI2P>`__
|
||||
- `Reddit :
|
||||
https://www.reddit.com/r/i2p/ <https://www.reddit.com/r/i2p/>`__
|
||||
- `Mastodon:
|
||||
https://mastodon.social/@i2p <https://mastodon.social/@i2p>`__
|
||||
- `Medium: https://i2p.medium.com/ <https://i2p.medium.com/>`__
|
||||
|
||||
{% trans -%}Forks, Apps, and Third-Party Implementations are Not Evil.{%- endtrans %}
|
||||
~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
|
||||
|
||||
{% trans -%}
|
||||
This post attempts to provide ways of vetting the source for obtaining
|
||||
the Java I2P package represented by the source code contained in
|
||||
https://i2pgit.org/i2p-hackers/i2p.i2p and
|
||||
https://github.com/i2p/i2p.i2p, and which is available for download from
|
||||
the web site https://geti2p.net/en/download. It is not intended to pass
|
||||
judgement on third-party forks, downstream projects, embedders,
|
||||
packagers, people experimenting in laboratories, or people who just
|
||||
disagree with us. You are all valued members of our community who are
|
||||
trying to protect, and not compromise, the privacy of others. Since we
|
||||
are aware of attempts to impersonate I2P project community members, you
|
||||
may wish to review the download, verification, and installation
|
||||
procedures which you recommend to your users in order to document your
|
||||
official sources and known mirrors.
|
||||
{%- endtrans %}
|
@ -1,371 +0,0 @@
|
||||
===========================================
|
||||
{% trans -%}SSU2 Transport{%- endtrans %}
|
||||
===========================================
|
||||
|
||||
.. meta::
|
||||
:author: zzz
|
||||
:date: 2022-09-30
|
||||
:category: development
|
||||
:excerpt: {% trans %}SSU2 Transport{% endtrans %}
|
||||
|
||||
{% trans %}Overview{% endtrans %}
|
||||
------------------------------------
|
||||
|
||||
{% trans -%}
|
||||
I2P has used a censorship-resistant UDP transport protocol "SSU" since 2005.
|
||||
We've had few, if any, reports of SSU being blocked in 17 years.
|
||||
However, by today's standards of security, blocking resistance,
|
||||
and performance, we can do better. Much better.
|
||||
{%- endtrans %}
|
||||
|
||||
{% trans link1="https://i2pd.xyz/" -%}
|
||||
That's why, together with the `i2pd project <{{ link1 }}>`_, we have created and implemented "SSU2",
|
||||
a modern UDP protocol designed to the highest standards of security and blocking resistance.
|
||||
{%- endtrans %}
|
||||
|
||||
{% trans -%}
|
||||
We have combined industry-standard encryption with the best
|
||||
features of UDP protocols WireGuard and QUIC, together with the
|
||||
censorship resistance features of our TCP protocol "NTCP2".
|
||||
SSU2 may be one of the most secure transport protocols ever designed.
|
||||
{%- endtrans %}
|
||||
|
||||
|
||||
{% trans link1="/spec/proposals/159", link2="/en/docs/transport/ssu", link3="https://en.wikipedia.org/wiki/ElGamal_encryption" -%}
|
||||
The Java I2P and i2pd teams are finishing the `SSU2 transport <{{ link1 }}>`_ and we will enable it for all routers in the next release.
|
||||
This completes our decade-long plan to upgrade all the cryptography from the original
|
||||
Java I2P implementation dating back to 2003.
|
||||
SSU2 will replace `SSU <{{ link2 }}>`_, our sole remaining use of `ElGamal <{{ link3 }}>`_ cryptography.
|
||||
{%- endtrans %}
|
||||
|
||||
- Signature types and ECDSA signatures (0.9.12, 2014)
|
||||
- ECDSA routers (??)
|
||||
- Ed25519 signatures and leasesets (0.9.15, 2014)
|
||||
- Ed25519 routers (0.9.22, 2015)
|
||||
- Destination encryption types and X25519 leasesets (0.9.46, 2020)
|
||||
- Router encryption types and X25519 routers (0.9.49, 2021)
|
||||
|
||||
{% trans link1="https://noiseprotocol.org/" -%}
|
||||
After the transition to SSU2,
|
||||
we will have migrated all our authenticated and encrypted protocols to standard `Noise Protocol <{{ link1 }}>`_ handshakes:
|
||||
{%- endtrans %}
|
||||
|
||||
- `NTCP2 <{{ spec_url("ntcp2") }}>`_ (0.9.36, 2018)
|
||||
- `{% trans %}Ratchet end-to-end protocol{% endtrans %} <{{ spec_url("ecies") }}>`_ (0.9.46, 2020)
|
||||
- `{% trans %}ECIES tunnel build messages{% endtrans %} <{{ spec_url("tunnel-creation-ecies") }}>`_ (1.5.0, 2021)
|
||||
- `SSU2 <{{ proposal_url("159") }}>`_ (2.0.0, 2022)
|
||||
|
||||
{% trans -%}
|
||||
All I2P Noise protocols use the following standard cryptographic algorithms:
|
||||
{%- endtrans %}
|
||||
|
||||
- `X25519 <https://en.wikipedia.org/wiki/Curve25519>`_
|
||||
- `ChaCha20/Poly1305 AEAD <https://www.rfc-editor.org/rfc/rfc8439.html>`_
|
||||
- `SHA-256 <https://en.wikipedia.org/wiki/SHA-2>`_
|
||||
|
||||
|
||||
{% trans %}Goals{% endtrans %}
|
||||
------------------------------------
|
||||
|
||||
- {% trans %}Upgrade the asymmetric cryptography to the much faster X25519{% endtrans %}
|
||||
- {% trans %}Use standard symmetric authenticated encryption ChaCha20/Poly1305{% endtrans %}
|
||||
- {% trans %}Improve the obfuscation and blocking resistance features of SSU{% endtrans %}
|
||||
- {% trans %}Improve the resistance to spoofed addresses by adapting strategies from QUIC{% endtrans %}
|
||||
- {% trans %}Improved handshake CPU efficiency{% endtrans %}
|
||||
- {% trans %}Improved bandwidth efficiency via smaller handshakes and acknowledgements{% endtrans %}
|
||||
- {% trans %}Improve the security of the peer test and relay features of SSU{% endtrans %}
|
||||
- {% trans %}Improve the handling of peer IP and port changes by adapting the "connection migration" feature of QUIC{% endtrans %}
|
||||
- {% trans %}Move away from heuristic code for packet handling to documented, algorithmic processing{% endtrans %}
|
||||
- {% trans %}Support a gradual network transition from SSU to SSU2{% endtrans %}
|
||||
- {% trans %}Easy extensibility using the block concept from NTCP2{% endtrans %}
|
||||
|
||||
|
||||
{% trans %}Design{% endtrans %}
|
||||
------------------------------------
|
||||
|
||||
{% trans link1="/spec/i2np" -%}
|
||||
SSU2, like previous I2P transport protocols, is not a general-purpose pipe for data.
|
||||
Its primary job is to securely deliver I2P's low-level `I2NP messages <{{ link1 }}>`_
|
||||
from one router to the next router.
|
||||
Each of these point-to-point connections comprises one hop in an I2P tunnel.
|
||||
Higher-layer I2P protocols run over these point-to-point connections
|
||||
to deliver garlic messages end-to-end between I2P's destinations.
|
||||
{%- endtrans %}
|
||||
|
||||
{% trans -%}
|
||||
Designing a UDP transport presents unique and complex challenges not present in TCP protocols.
|
||||
A UDP protocol must handle security issues caused by address spoofing,
|
||||
and must implement its own congestion control.
|
||||
Additionally, all messages must be fragmented to fit within the maximum packet size (MTU)
|
||||
of the network path, and reassembled by the receiver.
|
||||
{%- endtrans %}
|
||||
|
||||
{% trans -%}
|
||||
We first relied heavily on our previous experience with our NTCP2, SSU, and streaming protocols.
|
||||
Then, we carefully reviewed and borrowed heavily from two recently-developed UDP protocols:
|
||||
{%- endtrans %}
|
||||
|
||||
- QUIC (`RFC 9000 <https://www.rfc-editor.org/rfc/rfc9000.html>`_, `RFC 9001 <https://www.rfc-editor.org/rfc/rfc9001.html>`_, `RFC 9002 <https://www.rfc-editor.org/rfc/rfc9002.html>`_)
|
||||
- `WireGuard <https://www.wireguard.com/protocol/>`_
|
||||
|
||||
{% trans -%}
|
||||
Protocol classification and blocking by adversarial on-path attackers such
|
||||
as nation-state firewalls is not an explicit part of the threat model for those protocols.
|
||||
However, it is an important part of I2P's threat model, as our mission is to
|
||||
provide an anonymous and censorship-resistant communications system to at-risk users around the world.
|
||||
Therefore, much of our design work involved combining the lessons learned from
|
||||
NTCP2 and SSU with the features and security supported by QUIC and WireGuard.
|
||||
{%- endtrans %}
|
||||
|
||||
|
||||
{% trans -%}
|
||||
Unlike QUIC, I2P transport protocols are peer-to-peer, with no defined server/client relationship.
|
||||
Identities and public keys are published in I2P's network database,
|
||||
and the handshake must authenticate participants to those identities.
|
||||
{%- endtrans %}
|
||||
|
||||
|
||||
{% trans -%}
|
||||
A complete summary of the SSU2 design is beyond the scope of this article.
|
||||
However, we highlight several features of the protocol below,
|
||||
emphasizing the challenges of UDP protocol design and threat models.
|
||||
{%- endtrans %}
|
||||
|
||||
|
||||
|
||||
|
||||
|
||||
{% trans %}DoS Resistance{% endtrans %}
|
||||
`````````````````````````````````````````````````
|
||||
|
||||
{% trans -%}
|
||||
UDP protocols are especially vulnerable to Denial of Service (DoS) attacks.
|
||||
By sending a large amount of packets with spoofed source addresses to a victim,
|
||||
an attacker can induce the victim to consume large amounts of CPU and bandwidth to respond.
|
||||
In SSU2, we adapt the token concept from QUIC and WireGuard.
|
||||
When a router receives a connection request without a valid token,
|
||||
it does not perform an expensive cryptographic DH operation.
|
||||
It simply responds with small message containing a valid token using inexpensive cryptographic operations.
|
||||
If the initiator was not spoofing his address, he will receive the token and the handshake may proceed normally.
|
||||
This prevents any traffic amplification attacks using spoofed addresses.
|
||||
{%- endtrans %}
|
||||
|
||||
|
||||
|
||||
{% trans %}Header Encryption{% endtrans %}
|
||||
`````````````````````````````````````````````````
|
||||
|
||||
{% trans -%}
|
||||
SSU2's packet headers are similar to WireGuard, and are encrypted in a manner similar to that in QUIC.
|
||||
{%- endtrans %}
|
||||
|
||||
{% trans -%}
|
||||
Header encryption is vitally important to prevent traffic classification, protocol identification, and censorship.
|
||||
Headers also contain information that would make it easier for attackers to interfere with
|
||||
or even decrypt packet contents.
|
||||
While nation-state firewalls are mostly focused on classification and possible disruption of TCP traffic,
|
||||
we anticipate that their UDP capabilities will increase to meet the challenges of
|
||||
new UDP protocols such as QUIC and WireGuard.
|
||||
Ensuring that SSU2 headers are adequately obfuscated and/or encrypted was the first task we addressed.
|
||||
{%- endtrans %}
|
||||
|
||||
{% trans link1="https://eprint.iacr.org/2019/624.pdf" -%}
|
||||
Headers are encrypted using a header protection scheme by XORing with data calculated from known keys,
|
||||
using ChaCha20, similar to QUIC [RFC-9001] and `Nonces are Noticed <{{ link1 }}>`_.
|
||||
This ensures that the encrypted headers will appear to be random, without any distinguishable pattern.
|
||||
{%- endtrans %}
|
||||
|
||||
{% trans -%}
|
||||
Unlike the QUIC [RFC-9001] header protection scheme, all parts of all headers, including destination and source connection IDs, are encrypted.
|
||||
QUIC [RFC-9001] and [Nonces] are primarily focused on encrypting the "critical" part of the header, i.e. the packet number (ChaCha20 nonce).
|
||||
While encrypting the session ID makes incoming packet classification a little more complex, it makes some attacks more difficult.
|
||||
{%- endtrans %}
|
||||
|
||||
{% trans -%}
|
||||
Our threat model assumes that censorship firewalls do not have real-time access to I2P's network database.
|
||||
Headers are encrypted with known keys published in the network database or calculated later.
|
||||
In the handshake phase, header encryption is for traffic classification resistance only,
|
||||
as the decryption key is public and the key and nonces are reused.
|
||||
Header encryption in this phase is effectively just obfuscation.
|
||||
Note that the header encryption is also used to obfuscate the X25519 ephemeral keys in the handshake,
|
||||
for additional protection.
|
||||
{%- endtrans %}
|
||||
|
||||
{% trans -%}
|
||||
In the data phase, only the session ID field is encrypted with a key from the network database.
|
||||
The critical nonce field is encrypted with a key derived from the handshake,
|
||||
so it may not be decrypted even by a party with access to the network database.
|
||||
{%- endtrans %}
|
||||
|
||||
|
||||
|
||||
|
||||
{% trans %}Packet Numbering, ACKS, and Retransmission{% endtrans %}
|
||||
```````````````````````````````````````````````````````````````````````
|
||||
|
||||
{% trans link1="/en/docs/api/streaming" -%}
|
||||
SSU2 contains several improvements over SSU for security and efficiency.
|
||||
The packet number is the AEAD nonce, and each packet number is only used once.
|
||||
Acknowledgements (ACKs) are for packet numbers, not I2NP message numbers or fragments.
|
||||
ACKs are sent in a very efficient, compact format adapted from QUIC.
|
||||
An immediate-ack request mechanism is supported, similar to SSU.
|
||||
Congestion control, windowing, timers, and retransmission strategies are not fully specified,
|
||||
to allow for implementation flexibility and improvements,
|
||||
but general guidance is taken from the RFCs for TCP.
|
||||
Additional algorithms for timers are adapted from I2P's `streaming protocol <{{ link1 }}>`_ and SSU implementations.
|
||||
{%- endtrans %}
|
||||
|
||||
|
||||
|
||||
|
||||
|
||||
{% trans %}Connection Migration{% endtrans %}
|
||||
`````````````````````````````````````````````````
|
||||
|
||||
{% trans -%}
|
||||
UDP protocols are susceptible to breakage from peer port and IP changes
|
||||
caused by NAT rebinding, IPv6 temporary address changes, and mobile device address changes.
|
||||
Previous SSU implementations attempted to handle some of these cases with complex and brittle heuristics.
|
||||
SSU2 provides a formal, documented process to detect and validate peer
|
||||
address changes and migrate connections to the peer's new address without data loss.
|
||||
It prevents migration caused by packet injection or modification by attackers.
|
||||
The protocol to implement connection migration is adapted and simplified from QUIC.
|
||||
{%- endtrans %}
|
||||
|
||||
|
||||
|
||||
|
||||
|
||||
{% trans %}Peer Test and Relay{% endtrans %}
|
||||
`````````````````````````````````````````````````
|
||||
|
||||
|
||||
{% trans -%}
|
||||
SSU provides two important services in addition to the transport of I2NP messages.
|
||||
First, it supports Peer Test, which is a cooperative scheme to determine local IP
|
||||
and detect the presence of network address translation (NAT) and firewall devices.
|
||||
This detection is used to update router state, share that state with other transports,
|
||||
and publish current address and state in I2P's network database.
|
||||
Second, it supports Relaying, in which routers cooperate to traverse firewalls
|
||||
so that all routers may accept incoming connections.
|
||||
These two services are essentially sub-protocols within the SSU transport.
|
||||
{%- endtrans %}
|
||||
|
||||
{% trans -%}
|
||||
SSU2 updates the security and reliability of these services by
|
||||
enhancing them to add more response codes, encryption, authentication,
|
||||
and restrictions to the design and implementation.
|
||||
{%- endtrans %}
|
||||
|
||||
|
||||
|
||||
|
||||
|
||||
{% trans %}Performance{% endtrans %}
|
||||
--------------------------------------------
|
||||
|
||||
{% trans -%}
|
||||
The I2P network is a complex mix of diverse routers.
|
||||
There are two primary implementations running all over the world on
|
||||
hardware ranging from high-performance data center computers to
|
||||
Raspberry Pis and Android phones.
|
||||
Routers use both TCP and UDP transports.
|
||||
While the SSU2 improvements are significant, we do not expect them
|
||||
to be apparent to the user, either locally or in end-to-end transfer speeds.
|
||||
End-to-end transfers depend on the performance of 13 other routers
|
||||
and 14 point-to-point transport links, each of which could be
|
||||
SSU2, NTCP2, or SSU 1.
|
||||
{%- endtrans %}
|
||||
|
||||
{% trans -%}
|
||||
In the live network, latency and packet loss varies widely.
|
||||
Even in a test setup, performance depends on configured latency and packet loss.
|
||||
The i2pd project reports that maximum transfer rates for SSU2 were over 3 times
|
||||
faster than SSU 1 in some tests. However, they completely redesigned their
|
||||
SSU 1 code for SSU2 as their previous implementation was rather poor.
|
||||
The Java I2P project does not expect that their SSU2 implementation will be any faster than SSU 1.
|
||||
{%- endtrans %}
|
||||
|
||||
{% trans -%}
|
||||
Very low-end platforms such as Raspberry Pis and OpenWRT may see substantial improvements
|
||||
from the elimination of SSU 1.
|
||||
ElGamal is extremely slow and limits performance on those platforms.
|
||||
{%- endtrans %}
|
||||
|
||||
{% trans -%}
|
||||
SSU2 data phase encryption uses ChaCha20/Poly1305, compared to AES with a MD5 HMAC for SSU 1.
|
||||
Both are very fast and the change is not expected to measurably affect performance.
|
||||
{%- endtrans %}
|
||||
|
||||
{% trans -%}
|
||||
Here are some highlights of the estimated improvements for SSU2 over SSU 1:
|
||||
{%- endtrans %}
|
||||
|
||||
- {% trans %}40% reduction in total handshake packet size{% endtrans %}
|
||||
- {% trans %}50% or more reduction in handshake CPU{% endtrans %}
|
||||
- {% trans %}90% or more reduction in ACK overhead{% endtrans %}
|
||||
- {% trans %}50% reduction in packet fragmentation{% endtrans %}
|
||||
- {% trans %}10% reduction in data phase overhead{% endtrans %}
|
||||
|
||||
|
||||
|
||||
{% trans %}Transition Plan{% endtrans %}
|
||||
--------------------------------------------
|
||||
|
||||
{% trans -%}
|
||||
I2P strives to maintain backward compatibility, both to ensure network stability,
|
||||
and to allow older routers to continue to be useful and secure.
|
||||
However, there are limits, because compatibility increases code complexity
|
||||
and maintenance requirements.
|
||||
{%- endtrans %}
|
||||
|
||||
|
||||
{% trans -%}
|
||||
The Java I2P and i2pd projects will both enable SSU2 by default in their next releases (2.0.0 and 2.44.0) in November 2022.
|
||||
However, they have different plans for disabling SSU 1.
|
||||
I2pd will disable SSU 1 immediately, because SSU2 is a vast improvement over their SSU 1 implementation.
|
||||
Java I2P plans to disable SSU 1 in mid-2023, to support a gradual transition
|
||||
and give older routers time to upgrade.
|
||||
Because Java I2P release 0.9.36 and i2pd release 2.20.0 (2018) were the first to support NTCP2,
|
||||
routers older than that will not be able to connect to i2pd routers 2.44.0 or higher.
|
||||
{%- endtrans %}
|
||||
|
||||
|
||||
|
||||
|
||||
|
||||
{% trans %}Summary{% endtrans %}
|
||||
------------------------------------
|
||||
|
||||
{% trans -%}
|
||||
The founders of I2P had to make several choices for cryptographic algorithms and protocols.
|
||||
Some of those choices were better than others, but twenty years later, most are showing their age.
|
||||
Of course, we knew this was coming, and we've spent the last decade planning and implementing cryptographic upgrades.
|
||||
As the old saying goes, upgrading things while maintaining backward compatibility
|
||||
and avoiding a "flag day" is like changing the tires on the bus while it's rolling down the road.
|
||||
{%- endtrans %}
|
||||
|
||||
{% trans -%}
|
||||
SSU2 was the last and most complex protocol to develop in our long upgrade path.
|
||||
UDP has a very challenging set of assumptions and threat model.
|
||||
We first designed and rolled out three other flavors of Noise protocols,
|
||||
and gained experience and deeper understanding of the security and protocol design issues.
|
||||
Finally, we had to research and fully understand other modern UDP protocols - WireGuard and QUIC.
|
||||
While the authors of those protocols didn't solve all of our problems for us,
|
||||
their documentation of the UDP threat models and their designed countermeasures gave us the
|
||||
confidence that we too would be able to complete our task.
|
||||
We thank them as well as the creators of all the cryptography we rely on to keep our users safe.
|
||||
{%- endtrans %}
|
||||
|
||||
|
||||
{% trans -%}
|
||||
Expect SSU2 to be enabled in the i2pd and Java I2P releases scheduled for November 2022.
|
||||
If the update goes well, nobody will notice anything different at all.
|
||||
The performance benefits, while significant, will probably not be noticeable.
|
||||
{%- endtrans %}
|
||||
|
||||
|
||||
{% trans -%}
|
||||
As usual, we recommend that you update to the new release when it's available.
|
||||
The best way to maintain security and help the network is to run the latest release.
|
||||
{%- endtrans %}
|
@ -1,87 +0,0 @@
|
||||
===========================================
|
||||
{% trans -%}1.9.0 Release{%- endtrans %}
|
||||
===========================================
|
||||
|
||||
.. meta::
|
||||
:author: zzz
|
||||
:date: 2022-08-22
|
||||
:category: release
|
||||
:excerpt: {% trans %}1.9.0 with SSU2{% endtrans %}
|
||||
|
||||
{% trans -%}
|
||||
Update details
|
||||
{%- endtrans %}
|
||||
============================================
|
||||
|
||||
{% trans -%}
|
||||
We have spent the last three months working on our new UDP transport protocol "SSU2"
|
||||
with a small number of volunteer testers.
|
||||
This release completes the implementation, including relay and peer testing.
|
||||
We are enabling it by default for Android and ARM platforms, and a small percentage of other routers at random.
|
||||
This will allow us to do much more testing in the next three months, finish the connection migration feature,
|
||||
and fix any remaining issues.
|
||||
We plan to enable it for everyone in the next release scheduled for November.
|
||||
No manual configuration is necessary.
|
||||
Of course, there's the usual collection of bug fixes in this release as well.
|
||||
We also added an automatic deadlock detector that has already found a rare deadlock that is now fixed.
|
||||
{%- endtrans %}
|
||||
|
||||
{% trans -%}
|
||||
As usual, we recommend that you update to this release. The best way to
|
||||
maintain security and help the network is to run the latest release.
|
||||
{%- endtrans %}
|
||||
|
||||
|
||||
**{% trans %}RELEASE DETAILS{% endtrans %}**
|
||||
|
||||
**{% trans %}Changes{% endtrans %}**
|
||||
|
||||
- {% trans %}Add deadlock detector{% endtrans %}
|
||||
- {% trans %}Periodically send our RI to connected peers{% endtrans %}
|
||||
- {% trans %}SSU MTU/PMTU improvements and fixes{% endtrans %}
|
||||
- {% trans %}SSU2 base protocol fixes and improvements{% endtrans %}
|
||||
- {% trans %}SSU2 peer test and relay implementation{% endtrans %}
|
||||
- {% trans %}SSU2 published address fixes{% endtrans %}
|
||||
- {% trans %}SSU2: Enable for Android, ARM, and a small portion of others at random{% endtrans %}
|
||||
|
||||
**{% trans %}Bug Fixes{% endtrans %}**
|
||||
|
||||
- {% trans %}Clock: Fix deadlock after clock shift{% endtrans %}
|
||||
- {% trans %}Debian: Apparmor profile fixes{% endtrans %}
|
||||
- {% trans %}Don't allow family key errors to crash router{% endtrans %}
|
||||
- {% trans %}Fix EC family key loading on Android{% endtrans %}
|
||||
- {% trans %}Fix EdDSA key loading on Java 15+{% endtrans %}
|
||||
- {% trans %}i2psnark: Fix DHT not restarting after router restart{% endtrans %}
|
||||
- {% trans %}OSX: Prevent hangs at shutdown after dock right-click quit{% endtrans %}
|
||||
- {% trans %}SSU: Fix publishing of MTU in addresses without IPs{% endtrans %}
|
||||
- {% trans %}SSU: Fix rare HMAC NPE{% endtrans %}
|
||||
- {% trans %}SusiDNS CSS fixes{% endtrans %}
|
||||
- {% trans %}Transport: Improve processing after message delivery failure{% endtrans %}
|
||||
- {% trans %}UPnP: Don't briefly bind to all addresses at startup{% endtrans %}
|
||||
|
||||
|
||||
**{% trans %}Other{% endtrans %}**
|
||||
|
||||
- {% trans %}Set outproxy to exit.stormycloud.i2p (new installs only){% endtrans %}
|
||||
- {% trans %}Disable SSU introductions on Android{% endtrans %}
|
||||
- {% trans %}API version: 0.9.55{% endtrans %}
|
||||
- {% trans %}New translation: Spanish (Argentina){% endtrans %}
|
||||
- {% trans %}Translation updates{% endtrans %}
|
||||
|
||||
|
||||
|
||||
`{% trans %}Full list of fixed bugs{% endtrans %}`__
|
||||
|
||||
__ http://{{ i2pconv('git.idk.i2p') }}/i2p-hackers/i2p.i2p/-/issues?scope=all&state=closed&milestone_title=1.9.0
|
||||
|
||||
|
||||
**{% trans %}SHA256 Checksums:{% endtrans %}**
|
||||
|
||||
::
|
||||
|
||||
fdb2e471fadfda33589697536180df966ec165ab59a0d9c8a623491cc2c8eae3 i2pinstall_1.9.0_windows.exe
|
||||
124a1d917dec1f75dc17b5a062704d5abe259b874655c595a9d8f5fd9494eafd i2pinstall_1.9.0.jar
|
||||
57f61815098c35593d7ede305f98b9015c4c613c72231ad084e6806a3e2aa371 i2psource_1.9.0.tar.bz2
|
||||
31b8798c7fa75242ed09f671028b85e6acc9d5d9d0a132138debf4cdfbb08f21 i2pupdate_1.9.0.zip
|
||||
7959f1189c50fa8968e72023f614b610016c1d544a16315f05ea6ad4b18677bc i2pupdate.su3
|
||||
|
@ -1,43 +0,0 @@
|
||||
====================================================================
|
||||
{% trans -%}Windows Easy-Install Bundle 1.9.0 Release{%- endtrans %}
|
||||
====================================================================
|
||||
|
||||
.. meta::
|
||||
:author: idk
|
||||
:date: 2022-08-28
|
||||
:category: release
|
||||
:excerpt: {% trans %}Windows Easy-Install Bundle 1.9.0 - Major Stability/Compatibility Improvements{% endtrans %}
|
||||
|
||||
{% trans -%}
|
||||
This update includes the new 1.9.0 router and major quality-of-life improvements for bundle users
|
||||
{%- endtrans %}
|
||||
=================================================================================================
|
||||
|
||||
{% trans -%}
|
||||
This release includes the new I2P 1.9.0 router and is based on Java 18.02.1.
|
||||
{%- endtrans %}
|
||||
|
||||
{% trans -%}
|
||||
The old batch scripts have been phased out in favor of a more flexible and stable solution in the jpackage itself.
|
||||
This should fix all bugs related to path-finding and path-quoting which were present in the batch scripts. After
|
||||
you upgrade, the batch scripts can be safely deleted. They will be removed by the installer in the next update.
|
||||
{%- endtrans %}
|
||||
|
||||
{% trans -%}
|
||||
A sub-project for managing browsing tools has been started: i2p.plugins.firefox which has extensive capabilities
|
||||
for configuring I2P browsers automatically and stably on many platforms. This was used to replace the batch
|
||||
scripts but also functions as a cross-platform I2P Browser management tool. Contributions are welcome
|
||||
here: http://git.idk.i2p/idk/i2p.plugins.firefox at the source repository.
|
||||
{%- endtrans %}
|
||||
|
||||
{% trans -%}
|
||||
This release improves compatibility with externally-running I2P routers such as those provided by the IzPack
|
||||
installer and by third-party router implementations such as i2pd. By improving external router discovery it
|
||||
requires less of a system's resources, improves start-up time, and prevents resource conflicts from occurring.
|
||||
{%- endtrans %}
|
||||
|
||||
{% trans -%}
|
||||
Besides that, the profile has been updated to the latest version of the Arkenfox profile. I2P in Private
|
||||
Browsing and NoScript have both been updated. The profile has been restructured in order to allow for
|
||||
evaluating different configurations for different threat models.
|
||||
{%- endtrans %}
|
@ -1,30 +0,0 @@
|
||||
===========================================
|
||||
{% trans -%}Apple Silicon Easy Install{%- endtrans %}
|
||||
===========================================
|
||||
|
||||
.. meta::
|
||||
:author: zlatinb
|
||||
:date: 2022-08-03
|
||||
:category: beta
|
||||
:excerpt: {% trans %}Easy Install bundle BETA for Apple Silicon Macs available{% endtrans %}
|
||||
|
||||
{% trans -%}
|
||||
We are pleased to offer an Easy Install BETA bundle for Mac OS running on Apple Silicon hardware. You can download it here:
|
||||
{%- endtrans %}
|
||||
|
||||
`{% trans %}I2P Mac OS Easy Install bundles{% endtrans %}`__
|
||||
|
||||
__ https://geti2p.net/en/download/mac
|
||||
|
||||
|
||||
**{% trans -%}Speed{%- endtrans %}**
|
||||
|
||||
{% trans -%}In our internal benchmarks the cryptographic operations are between 2 and 2.5 times faster than when running the Intel bundle under Rosetta.{%- endtrans %}
|
||||
|
||||
**{% trans -%}Known Issues{%- endtrans %}**
|
||||
|
||||
- {% trans -%}Quitting I2P by right-clicking on the dock icon causes I2P to freeze and a "Force Quit" is necessary. This issue will be fixed for the 1.9 release.{%- endtrans %}
|
||||
- {% trans -%}If you already had an Intel bundle installed on your Mac, you need to modify some settings to prevent in-network updates from reverting you to an Intel bundle. Please see the instructions on the download page.{%- endtrans %}
|
||||
|
||||
**{% trans -%}Thank you for testing!{%- endtrans %}**
|
||||
|
@ -1,69 +0,0 @@
|
||||
==================================
|
||||
{% trans -%}How to Enable SSU2 on I2P and i2pd{%- endtrans %}
|
||||
==================================
|
||||
|
||||
.. meta::
|
||||
:author: idk
|
||||
:date: 2022-08-03
|
||||
:category: ssu2
|
||||
:excerpt: {% trans %}How to enable SSU2 on I2P and i2pd{% endtrans %}
|
||||
|
||||
{% trans -%}
|
||||
Help out with SSU2 development and testing
|
||||
{%- endtrans %}
|
||||
============================================
|
||||
|
||||
{% trans -%}
|
||||
I2P and i2pd developers are rapidly implementing the successor to the
|
||||
venerable SSU transport protocol, SSU2. SSU2 featues many improvements on
|
||||
SSU for censorship resistance, resistance to identification and blocking,
|
||||
performance, and in many other areas. Users who are comfortable testing
|
||||
the new protocol can enable it by following these procedures for I2P and
|
||||
i2pd respectively.
|
||||
{%- endtrans %}
|
||||
|
||||
*{% trans %}Warning: After enabling SSU2, you will publish a routerInfo which
|
||||
informs other routers that you can speak SSU2. This is still a small
|
||||
fraction of the network and identifies you as an early-adopter of
|
||||
SSU2.*{% endtrans %}*
|
||||
|
||||
**{% trans %}Enabling SSU2 on I2P{% endtrans %}**
|
||||
|
||||
{% trans -%}
|
||||
In order to enable SSU2 on Java I2P, you will need to locate your `router.config`
|
||||
file. If you have enabled "Advanced Mode" in your I2P installation already, then
|
||||
you can edit the `router.config` file from http://127.0.0.1:7657/configadvanced.
|
||||
{%- endtrans %}
|
||||
|
||||
{% trans -%}
|
||||
If you have not enabled advanced configuration, you'll need to edit the `router.config`
|
||||
file in a text editor. That file is usually in `/var/lib/i2p/i2p-config/router.config`
|
||||
on Debian, `$HOME/i2p/router.config` on other Linux,
|
||||
`$HOME/Library/Application Support/i2p/router.config` on OSX,` and in
|
||||
`%LOCALAPPDATA%\I2P\router.config` on Windows. Open that file in a text editor(like
|
||||
`notepad.exe`` on Windows) and add the following line to the end of the file:
|
||||
{%- endtrans %}
|
||||
|
||||
`i2np.ssu2.enable=true`
|
||||
|
||||
**{% trans %}Enabling SSU2 on i2pd{% endtrans %}**
|
||||
|
||||
{% trans -%}
|
||||
In order to enable SSU2 on i2pd, you will need to locate your `i2pd.conf` file
|
||||
and edit that. The `i2pd.conf` file is usually in `/etc/i2pd/i2pd.conf` on Debian,
|
||||
`$HOME/i2pd/i2pd.conf` on other Linux, on Windows is: `%APPDATA%\i2pd\i2pd.conf`,
|
||||
and on OSX it is: `$HOME/Library/Application Support/i2pd/i2pd.conf`. Open that,
|
||||
and add the following lines to the end of the file:
|
||||
{%- endtrans %}
|
||||
|
||||
`[SSU2]`
|
||||
|
||||
`enabled = true`
|
||||
|
||||
**{% trans %}Thanks to all Testers{% endtrans %}**
|
||||
|
||||
{% trans -%}
|
||||
We'd like to take this moment to thank all of the testers who have helped us so
|
||||
far and who will continue to help us in the future as we test SSU2 and continue
|
||||
to develop the I2P network.
|
||||
{%- endtrans %}
|
@ -1,70 +0,0 @@
|
||||
=================================================
|
||||
{% trans -%}How to Switch to the StormyCloud Outproxy Service{%- endtrans %}
|
||||
=================================================
|
||||
|
||||
.. meta::
|
||||
:author: idk
|
||||
:date: 2022-08-04
|
||||
:category: general
|
||||
:excerpt: {% trans %}How to Switch to the StormyCloud Outproxy Service{% endtrans %}
|
||||
|
||||
{% trans -%}
|
||||
How to Switch to the StormyCloud Outproxy Service
|
||||
{%- endtrans %}
|
||||
=================================================
|
||||
|
||||
**{% trans %}A New, Professional Outproxy{% endtrans %}**
|
||||
|
||||
{% trans -%}
|
||||
For years, I2P has been served by a single default outproxy, `false.i2p`
|
||||
who's reliability has been degrading. Although several competitors
|
||||
have emerged to take up some of the slack, they are mostly unable to
|
||||
volunteer to serve the clients of an entire I2P implementation by
|
||||
default. However, StormyCloud, a professional, non-profit organization
|
||||
which runs Tor exit nodes, has started a new, professional outproxy
|
||||
service which has been tested by members of the I2P community and which
|
||||
will become the new default outproxy in the upcoming release.
|
||||
{%- endtrans %}
|
||||
|
||||
**{% trans %}Who are StormyCloud{% endtrans %}**
|
||||
|
||||
In their own words, StormyCloud is:
|
||||
|
||||
{% trans -%}
|
||||
Mission of StormyCloud Inc
|
||||
To defend Internet access as a universal human right. By doing so, the group protects users’ electronic privacy and builds community by fostering unrestricted access to information and thus the free exchange of ideas across borders. This is essential because the Internet is the most powerful tool available for making a positive difference in the world.
|
||||
{%- endtrans %}
|
||||
|
||||
{% trans -%}
|
||||
Hardware
|
||||
We own all of our hardware and currently colocate at a Tier 4 data center. As of now have a 10GBps uplink with the option to upgrade to 40GBps without the need for much change. We have our own ASN and IP space (IPv4 & IPv6).
|
||||
{%- endtrans %}
|
||||
|
||||
{% trans -%}
|
||||
To learn more about StormyCloud visit their `web site
|
||||
<https://www.stormycloud.org/>`_.
|
||||
{%- endtrans %}
|
||||
|
||||
{% trans -%}
|
||||
Or, visit them on `I2P
|
||||
<http://stormycloud.i2p/>`_.
|
||||
{%- endtrans %}
|
||||
|
||||
**{% trans %}Switching to the StormyCloud Outproxy on I2P{% endtrans %}**
|
||||
|
||||
{% trans -%}
|
||||
To switch to the StormyCloud outproxy *today* you can visit `the Hidden Services Manager
|
||||
<http://127.0.0.1:7657/i2ptunnel/edit?tunnel=0>`_. Once you're there, you should change
|
||||
the value of **Outproxies** and **SSL Outproxies** to `exit.stormycloud.i2p`. Once you
|
||||
have done this, scroll down to the bottom of the page and click on the "Save" button.
|
||||
{%- endtrans %}
|
||||
|
||||
.. class:: screenshot
|
||||
.. image:: /_static/images/stormycloudscreenshot.png
|
||||
|
||||
**{% trans %}Thanks to StormyCloud{% endtrans %}**
|
||||
|
||||
{% trans -%}
|
||||
We would like to thank StormyCloud for volunteering to provide high-quality outproxy
|
||||
services to the I2P network.
|
||||
{%- endtrans %}
|
@ -28,7 +28,7 @@ How to use the blog
|
||||
-------------------
|
||||
|
||||
1. Create a directory path matching the date of the blog post, e.g.
|
||||
'mkdir -p 2014/01/01'. Day and month directories MUST be two digits!
|
||||
'mkdir -p 2014/01/01'
|
||||
2. Create a file in that directory with suffix '.rst'. The name of the file and
|
||||
the directory path will together be the URL that the post will be visible at
|
||||
e.g. '2014/01/01/Happy-New-Year.rst' -> '/lang/blog/post/2014/01/01/Happy-New-Year'
|
||||
|
@ -67,8 +67,7 @@ def get_blog_slugs(num=0):
|
||||
# walk over all directories/files
|
||||
for v in os.walk(BLOG_DIR):
|
||||
# iterate over all files
|
||||
slugbase = slug_base_datevalidate(os.path.relpath(v[0], BLOG_DIR))
|
||||
|
||||
slugbase = os.path.relpath(v[0], BLOG_DIR)
|
||||
for f in v[2]:
|
||||
# ignore all non-.rst files and drafts
|
||||
if not f.endswith('.rst') or f.endswith('.draft.rst'):
|
||||
@ -80,39 +79,7 @@ def get_blog_slugs(num=0):
|
||||
return slugs[:num]
|
||||
return slugs
|
||||
|
||||
# reads a date and if it finds a one-digit representation of a day or month,
|
||||
# lengthens it to two
|
||||
def slug_base_datevalidate(slugbase):
|
||||
parts = slugbase.split('/')
|
||||
slugParts = []
|
||||
for p in parts:
|
||||
slugParts.append(datevalidate(p))
|
||||
return "/".join(slugParts)
|
||||
|
||||
# turns a one-digit date unit into a two-digit date unit
|
||||
def datevalidate(slugfrag):
|
||||
if len(str(slugfrag)) == 1:
|
||||
return "0"+str(slugfrag)
|
||||
else:
|
||||
return str(slugfrag)
|
||||
|
||||
# turns a two-digit date unit into a one-digit date unit
|
||||
def dedatevalidate(slugfrag):
|
||||
if len(str(slugfrag)) == 2:
|
||||
return str(slugfrag).lstrip("0")
|
||||
else:
|
||||
return str(slugfrag)
|
||||
|
||||
# reverses slug_base_datevalidate
|
||||
def slug_base_dedatevalidate(slugbase):
|
||||
parts = slugbase.split('/')
|
||||
slugParts = []
|
||||
for p in parts:
|
||||
slugParts.append(dedatevalidate(p))
|
||||
return "/".join(slugParts)
|
||||
|
||||
def get_date_from_slug(slug):
|
||||
slug = slug_base_datevalidate(slug)
|
||||
parts = slug.split('/')
|
||||
return "%s-%s-%s" % (parts[0], parts[1], parts[2])
|
||||
|
||||
@ -129,12 +96,7 @@ def render_blog_post(slug):
|
||||
# check for drafts
|
||||
path = safe_join(BLOG_DIR, slug + ".draft.rst")
|
||||
if not os.path.exists(path):
|
||||
slug = slug_base_dedatevalidate(slug)
|
||||
path = safe_join(BLOG_DIR, slug+".rst")
|
||||
if not os.path.exists(path):
|
||||
path = safe_join(BLOG_DIR, slug + ".draft.rst")
|
||||
if not os.path.exists(path):
|
||||
abort(404)
|
||||
abort(404)
|
||||
|
||||
# read file
|
||||
with codecs.open(path, encoding='utf-8') as fd:
|
||||
|
@ -20,20 +20,20 @@ DEFAULT_MIRROR = {
|
||||
#DEFAULT_MIRROR = {
|
||||
# "net": "clearnet",
|
||||
# "protocol": "https",
|
||||
# "domain": "download.i2p2.no",
|
||||
# "domain": "download.i2p2.de",
|
||||
# "path": "/releases/%(version)s/%(file)s",
|
||||
# "org": "sigterm.no",
|
||||
# "org_url": "https://download.i2p2.no",
|
||||
# "org_url": "https://download.i2p2.de",
|
||||
# "country": "no",
|
||||
#}
|
||||
|
||||
DEFAULT_MIRROR= {
|
||||
'net': 'clearnet',
|
||||
'protocol': 'https',
|
||||
'domain': 'download.i2p2.no',
|
||||
'org': 'sigterm.no',
|
||||
'country': 'no',
|
||||
}
|
||||
#{
|
||||
# 'net': 'clearnet',
|
||||
# 'protocol': 'https',
|
||||
# 'domain': 'download.i2p2.de',
|
||||
# 'org': 'sigterm.no',
|
||||
# 'country': 'no',
|
||||
#}
|
||||
|
||||
DEFAULT_I2P_MIRROR = {
|
||||
'net': 'i2p',
|
||||
|
@ -1,119 +0,0 @@
|
||||
(04:00:14 PM) eyedeekay: Hi everybody, welcome to the July 5 Meeting
|
||||
(04:00:14 PM) eyedeekay: 1. Hi
|
||||
(04:00:14 PM) eyedeekay: 2. 1.9.0 development status
|
||||
(04:00:14 PM) eyedeekay: 3. Support for Apple Silicon in the Mac easy-install bundle
|
||||
(04:00:14 PM) eyedeekay: 4. Windows easy-install bundle - out of beta?
|
||||
(04:00:32 PM) zzz: hi
|
||||
(04:00:35 PM) zlatinb: hi
|
||||
(04:00:44 PM) mode (-m ) by zzz
|
||||
(04:00:55 PM) eyedeekay: Hi guys, anybody else here today?
|
||||
(04:01:30 PM) eyedeekay: Moving right into 2. 1.9.0 development status
|
||||
(04:04:27 PM) eyedeekay: We are at a little less than 6 weeks in I think, approx. 7 to go
|
||||
(04:04:27 PM) eyedeekay: zzz and orignal have been working hard on the implementation of SSU2 in i2p.i2p and i2pd
|
||||
(04:04:27 PM) eyedeekay: It won't be activated in 1.9.0 but if I understand correctly it's nearly done
|
||||
(04:04:27 PM) eyedeekay: I've been working on UDP tunnels again, mostly there but something's broken still, I'll probably need to ask zzz for help this week
|
||||
(04:04:50 PM) eyedeekay: zzz zlatinb anything else to add
|
||||
(04:05:09 PM) zzz: that's right, ssu2 is mostly working
|
||||
(04:05:17 PM) zzz: still fixing small bugs
|
||||
(04:06:03 PM) zzz: right now I'm working on making tunnel peer selection more efficient (unrelated to ssu2)
|
||||
(04:06:03 PM) zzz: other than that, just doing the usual bug fixing
|
||||
(04:06:06 PM) zzz: targeting a late august release
|
||||
(04:06:08 PM) zzz: EOT
|
||||
(04:06:48 PM) eyedeekay: Anyone interested in helping test should visit zzz's forum for instructions and to give feedback: http://zzz.i2p/topics/3314-how-to-enable-ssu2-in-i2p-1-8-0
|
||||
(04:07:00 PM) eyedeekay: 3. Support for Apple Silicon in the Mac easy-install bundle
|
||||
(04:07:27 PM) eyedeekay: zlatinb this is your topic, take your time
|
||||
(04:08:11 PM) zlatinb: hi, the big issue was jbigi but that is now solved via backporting the x18 register patch
|
||||
(04:08:59 PM) eyedeekay: So the easy-install bundle no longer needs to run on the emulated x86_64 mode?
|
||||
(04:09:15 PM) zlatinb: I would like to put up an official and notarized beta around end of july
|
||||
(04:09:42 PM) zlatinb: it has to be a separate download
|
||||
(04:09:46 PM) zzz: this would be a second bundle. we'd have two, one for x86 and one for arm
|
||||
(04:10:29 PM) zzz: I'm in favor, as it appears the extra dev effort would be small, and the speedup is large. Right?
|
||||
(04:10:37 PM) zlatinb: there is a caveat with updates when switching between bundle4s
|
||||
(04:12:21 PM) zzz: sure, as long as there's instructions on how to switch, even if it's as simple as uninstall and reinstall, that should be fine
|
||||
(04:13:01 PM) zlatinb: i'll put them on /download/mac
|
||||
(04:13:23 PM) zlatinb: the news url needs to be changed manually
|
||||
(04:13:51 PM) zzz: the dev effort is small and the speedup is large, correct?
|
||||
(04:14:36 PM) zlatinb: speedup is there, also looks good to keep up with the times :) dev effort except for notarization is small
|
||||
(04:14:48 PM) zzz: great. +1
|
||||
(04:14:54 PM) eyedeekay: +1
|
||||
(04:15:07 PM) zlatinb: thx EOT
|
||||
(04:16:02 PM) eyedeekay: Thanks zlatinb
|
||||
(04:16:02 PM) eyedeekay: 4. Windows easy-install bundle - out of beta?
|
||||
(04:16:35 PM) eyedeekay: I said ~3 months ago that I would be ready to move the easy-install bundle out-of-beta when I had a successful end-to-end update
|
||||
(04:18:05 PM) eyedeekay: I got that at 1.7.2 IIRC, but between 1.7.2 and 1.8.0 there were a number of bugs in how it worked when used with an external I2P router(i.e. a non-jpackaged router) in this situation the bundle is intended to work as a firefox-launcher only but this functionality was broken from 1.7.3-1.7.6
|
||||
(04:18:30 PM) eyedeekay: So I pushed it back again, but now I'm sure that all of the issues with running in both bundled and non-bundled modes are resolved
|
||||
(04:19:38 PM) eyedeekay: So I think it's finally ready to move out of beta, all the core functionality I thought was necessary has been established
|
||||
(04:20:49 PM) zzz: here's some things that may still need to be resolved:
|
||||
(04:21:18 PM) zzz: - is it just you that is successfully updating or are there other users that are also?
|
||||
(04:21:43 PM) zzz: - license requirements all met now?
|
||||
(04:22:27 PM) zzz: - are the windows bundle and the mac bundle now on the same JRE and roughly same release schedules?
|
||||
(04:22:58 PM) zzz: -- i.e. prepared for the 3-monthly JRE releases
|
||||
(04:23:22 PM) zzz: - and the usual question, do we have the resources to support this as an official product
|
||||
(04:23:49 PM) zzz: - also, are we removing the non-bundle download like we did for mac? or not?
|
||||
(04:23:51 PM) zzz: eot
|
||||
(04:25:46 PM) eyedeekay: License requirements are now fixed
|
||||
(04:25:46 PM) eyedeekay: I don't get a lot of feedback but at least 2 non-me updaters
|
||||
(04:25:46 PM) eyedeekay: I am sticking to LTS JRE, I think zlatinb is doing 18, but yes we are on the same schedule more-or-less
|
||||
(04:25:46 PM) eyedeekay: I do not think the resources required to work on the bundle are extensive, the hardest part is getting the build set up and it's not that hard, small investment now that it all works
|
||||
(04:25:46 PM) eyedeekay: I kind of want to remove the non-bundled download or possibly make it an "advanced installation" procedure
|
||||
(04:28:14 PM) zzz: - I don't think 2 non-you updaters is enough testers to declare it non-beta. Can you pimp it more on reddit or something?
|
||||
(04:28:25 PM) eyedeekay: Sure can do
|
||||
(04:28:43 PM) eyedeekay: I'm not in a hurry to rush it out
|
||||
(04:29:18 PM) zzz: - I'd like to see win and mac on the same JRE. Let's consolidate. I don't know which of you is right, but one of you is
|
||||
(04:29:29 PM) zzz: can you two come to an agreement?
|
||||
(04:29:43 PM) zzz: or are there reasons to be different?
|
||||
(04:30:01 PM) eyedeekay: I'm not married to my decision, I chose LTS strictly because of the statement "LTS"
|
||||
(04:30:57 PM) zzz: to be clear, not just the same version, but the same JRE supplier
|
||||
(04:31:10 PM) zzz: this will reduce the CVE review required every 3 months
|
||||
(04:31:14 PM) eyedeekay: We're both using Oracle right now to my knowledge
|
||||
(04:31:34 PM) eyedeekay: The only vendor with a similar update cycle is Amazon
|
||||
(04:31:49 PM) eyedeekay: I'd rather use Oracle than Amazon I think
|
||||
(04:33:16 PM) zzz: you two should be making these decisions together and in sync. I don't know why you're not and it sounds like you don't know either? :)
|
||||
(04:35:22 PM) eyedeekay: No I don't know. We did discuss vendors and update cycles at a couple points which is when we landed on Oracle due to releases being very quick compared to CVE's, but I don't know why I'm on 17 and zlatinb's on 18 now
|
||||
(04:36:27 PM) zlatinb: I don't remember the exact reason either
|
||||
(04:36:59 PM) zlatinb: maybe I wanted to test the ram reductions
|
||||
(04:37:28 PM) zzz: ok. I'm in favor of it coming out of beta, but let's get on the same JRE, get some more testing first and come back to us in a month or two
|
||||
(04:38:11 PM) zzz: I also want to think more about whether to remove the standard installer, maybe even worth a separate meeting about that
|
||||
(04:40:28 PM) zzz: eot
|
||||
(04:40:28 PM) eyedeekay: Re: actual reasons, perhaps a discussion for another time but I know the reason I'm on Oracle/17 is because I needed to pick a vendor who would respond to CVE's in less than 24 hours and because I wanted to ensure that I would have stability in terms of what I could expect from the API's and the JVM. I didn't really consider other reasons
|
||||
(04:40:28 PM) eyedeekay: Based on a sample of 1 event, I assessed that Oracle and Amazon were the fastest to release an update.
|
||||
(04:40:28 PM) eyedeekay: I considered Amazon because they are packaged in chocolatey which makes life on Windows a lot easier, but decided on Oracle instead
|
||||
(04:41:54 PM) eyedeekay: So that's how I landed on Oracle/17, basically out of caution
|
||||
(04:41:56 PM) eyedeekay: eot
|
||||
(04:41:57 PM) zlatinb: I can go down to 17 but really prefer to stick to oracle
|
||||
(04:42:18 PM) eyedeekay: So would I, so we're agreed
|
||||
(04:42:48 PM) zlatinb: on a related note i'll be afk until a week after the next jre release
|
||||
(04:43:28 PM) eyedeekay: Will we/can we make any arrangement for signing the bundles?
|
||||
(04:43:32 PM) zzz: I think you need 18 for the best apple arm support? if so then let's drag windows up to 18 also. But again, you two shouldn't be doing JRE vendor research and selection in separate silos. work together and decide together
|
||||
(04:43:32 PM) zlatinb: hopefully there won't be any urgent fixes
|
||||
(04:44:22 PM) zzz: we have limited resources, let's not do stuff twice for no reason
|
||||
(04:44:23 PM) zlatinb: signing requires deanon
|
||||
(04:44:28 PM) eyedeekay: I can push an unsigned bundle and tell people that they'll need to click through the pop-up in the news if need be
|
||||
(04:44:52 PM) eyedeekay: Still signed `su3` just not signed `exe`
|
||||
(04:45:21 PM) zlatinb: can't "click-through" on mac
|
||||
(04:45:31 PM) zlatinb: oh the exe signing is fine
|
||||
(04:45:50 PM) zlatinb: we'\ll do it as usual
|
||||
(04:46:41 PM) eyedeekay: OK then. Let me know if there's anything I can do(less rapidly deanoning) to help
|
||||
(04:47:39 PM) zlatinb: Nothing really other than take down the mac download page in the worst case
|
||||
(04:47:55 PM) eyedeekay: Well you have my signal number if you need me to do it
|
||||
(04:48:23 PM) zlatinb: ok. it would be for a week at most
|
||||
(04:48:52 PM) zzz: eyedeekay, you're not setting the news URL in the feed, search for CHANGEME_URL_HERE :)
|
||||
(04:49:19 PM) eyedeekay: OMG I can't believe I missed that
|
||||
(04:49:29 PM) eyedeekay: Will do
|
||||
(04:49:32 PM) zzz: i put that in there a while back so you'd remember, I guess it didn't work (((
|
||||
(04:50:20 PM) eyedeekay: Re: Java 18 and Apple hardware, zzz just mentioned that 18 may have better support? If that's the case than that would be a thing I didn't know before and a reason to use 18 instead, can you confirm that?
|
||||
(04:51:39 PM) zlatinb: haven't done my homework on that sorry
|
||||
(04:51:53 PM) zzz: maybe a wild guess on my part, but don't need to decide in this meeting
|
||||
(04:52:17 PM) zlatinb: but if linux arm support is any indication it's very likely
|
||||
(04:52:34 PM) zlatinb: history of*
|
||||
(04:52:45 PM) zzz: but in general, newer is better, so isn't the point of bundling the JRE in a "easy bundle" is to have the latest?
|
||||
(04:53:19 PM) eyedeekay: I don't know, sometimes stable is better, and sometimes "easy" is somewhere in between
|
||||
(04:53:55 PM) zzz: that's why putting a LTS in a bundle doesn't make sense to me.
|
||||
(04:58:29 PM) eyedeekay: Probably won't settle it today, but maybe I'm wrong about 17. zlatinb do you have a time that would be good this week to hammer out the 17/18 debate?
|
||||
(05:00:05 PM) zlatinb: generally any time is good and also bad because of my injury unless you want to get on a call
|
||||
(05:01:05 PM) eyedeekay: I'm happy to get on a call, we can figure out a time in private
|
||||
(05:01:18 PM) zlatinb: ack
|
||||
(05:01:43 PM) eyedeekay: Anything else for 4?
|
||||
(05:01:48 PM) eyedeekay: Or for the meeting?
|
||||
(05:01:53 PM) eyedeekay: Timeout 1m
|
||||
(05:03:46 PM) eyedeekay: All right thanks everybody for coming
|
@ -1,11 +0,0 @@
|
||||
I2P dev meeting, July 5, 2022 @ 20:00 UTC
|
||||
=========================================
|
||||
|
||||
Quick recap
|
||||
-----------
|
||||
|
||||
* **Present:**
|
||||
|
||||
eyedeekay,
|
||||
zzz,
|
||||
zlatinb
|
@ -1,230 +0,0 @@
|
||||
(04:18:08 PM) eyedeekay: 1. Hi
|
||||
(04:18:08 PM) eyedeekay: 2. 1.9.0 development status
|
||||
(04:18:08 PM) eyedeekay: 3. Apple silicon bundle status
|
||||
(04:18:08 PM) eyedeekay: 4. Letter to EFF to clarify what "running" a network means
|
||||
(04:18:08 PM) eyedeekay: 5. New Outproxy ref: http://zzz.i2p/topics/3254
|
||||
(04:18:08 PM) eyedeekay: a) Organizational and infrastructure overview (StormyCloud)
|
||||
(04:18:08 PM) eyedeekay: b) Technical review and test results (zzz and others)
|
||||
(04:18:08 PM) eyedeekay: c) ToS and log policy review http://stormycloud.i2p/outproxy.html (all)
|
||||
(04:18:08 PM) eyedeekay: d) Vote to approve (all)
|
||||
(04:18:08 PM) eyedeekay: e) Rollout plan (if approved) (zzz, StormyCloud)
|
||||
(04:19:11 PM) eyedeekay: zzz zlatinb you guys here?
|
||||
(04:19:24 PM) zzz: hi
|
||||
(04:19:27 PM) zlatinb: hi yes
|
||||
(04:20:11 PM) eyedeekay: Sorry about that again, had a cooking accident
|
||||
(04:20:12 PM) eyedeekay: 2. 1.9.0 development status
|
||||
(04:21:23 PM) eyedeekay: We're 3 weeks from release, we pretty much settled on a date for it at ls2 meeting yesterday, it's going to be the 22nd. i2pd and/or Java I2P may enable SSU2 for new installs, or a small percentage of the network on restart like for router rekeying
|
||||
(04:22:21 PM) eyedeekay: 3 weeks left for bug reports and bug fixes
|
||||
(04:22:47 PM) eyedeekay: Anything else to add zzz, zlatinb?
|
||||
(04:23:54 PM) eyedeekay: 3. Apple silicon bundle status
|
||||
(04:23:54 PM) eyedeekay: zlatinb this one is your, please start when you are ready
|
||||
(04:24:23 PM) not_bob_afk is now known as not_bob
|
||||
(04:25:23 PM) zzz: let me add a little on 2) please
|
||||
(04:25:30 PM) SilicaRice: is SSU2 officially stable? :o
|
||||
(04:25:35 PM) eyedeekay: Ok go ahead, sorry did not mean to rush
|
||||
(04:25:46 PM) zzz: lag
|
||||
(04:25:59 PM) zzz: tag freeze will be Aug. 10, a week from tomorrow
|
||||
(04:26:17 PM) zzz: the SSU2 testers have been very helpful, about 50-75 of them on the network
|
||||
(04:26:36 PM) zzz: our goal is to enable it for a few hundred to a thousand routers in the this release
|
||||
(04:26:53 PM) zzz: to help us shake out the remaining bugs, while avoiding any chance of disaster
|
||||
(04:27:19 PM) zzz: and we'll enable it for everybody in the November release
|
||||
(04:27:33 PM) SilicaRice: ahh :3
|
||||
(04:27:47 PM) zzz: everything else is going smoothly as well, just the usual bug fixes all over
|
||||
(04:28:13 PM) zzz: SSU2 is mostly finished, that doesn't mean it's mostly perfect yet
|
||||
(04:28:30 PM) zzz: shout out also to the i2pd team, they're working hard also
|
||||
(04:28:42 PM) zzz: I guess that's it unless there's any questions
|
||||
(04:28:56 PM) not_bob: Will the update also effect the android build?
|
||||
(04:29:46 PM) eyedeekay: I don't change any settings, SSU2 will technically be available but there won't be a UI to enable it
|
||||
(04:30:34 PM) eyedeekay: It just inherits defaults from i2p.i2p except where it has to to run on the Android environment
|
||||
(04:30:36 PM) zzz: sure. We may also just enable SSU2 for all Android, since it's so much less CPU than SSU1 w/ ElGamal
|
||||
(04:30:36 PM) not_bob: Good, good.
|
||||
(04:30:36 PM) zzz: that's what i2pd is thinking, we may do the same
|
||||
(04:30:36 PM) zzz: yeah, we're not going to put an option in the UI and then lobby like crazy for people to enable it
|
||||
(04:30:36 PM) zzz: we'd never get the numbers we want
|
||||
(04:30:36 PM) not_bob: Can we get an option to enable it if desired? Better battery life would be better.
|
||||
(04:30:46 PM) zzz: there's an advanced config, see zzz.i2p for info
|
||||
(04:30:53 PM) not_bob: Thank you.
|
||||
(04:30:55 PM) zzz: not sure if Android has access to advanced cnofig?
|
||||
(04:31:32 PM) eyedeekay: No it doesn't, you have to do weird stuff to make it work
|
||||
(04:31:51 PM) eyedeekay: Pretty much devs-only to manually edit non-i2ptunnel config files on Android
|
||||
(04:32:03 PM) not_bob: :(
|
||||
(04:32:26 PM) zzz: ok. anyway, might be good to enable it for android anyway, because one of the last features we need to implement is handling IP changes, so mobile routers will help us develop and test test
|
||||
(04:32:43 PM) not_bob: I vote for that.
|
||||
(04:33:25 PM) zzz: ok. to be clear, nobody's going to notice any difference with SSU2. It's mostly the same feature set, and currently a little slower than SSU1, at least on Java. It's faster for i2pd
|
||||
(04:33:47 PM) eyedeekay: Battery life is a huge deal if SSU2 will make a difference at that
|
||||
(04:34:18 PM) eyedeekay: We could be worse about how much battery we use, but we could also be better
|
||||
(04:34:37 PM) zzz: the benefits are more security, less CPU, more reliable firewall detection
|
||||
(04:34:44 PM) zzz: I may write up a whole blog post about it, I think it's one of the most censorship-resistant protocols ever designed. We'll see
|
||||
(04:35:01 PM) zzz: eot
|
||||
(04:36:20 PM) eyedeekay: Thanks zzz. I think people are hearing "Less CPU" and instantly making an association "Easier on battery for Androids" which may be part of the interest
|
||||
(04:36:35 PM) eyedeekay: 3. Apple silicon bundle status
|
||||
(04:37:15 PM) eyedeekay: zlatinb this one's yours, go ahead when you're ready
|
||||
(04:37:26 PM) zlatinb: Hi, I made the bundle available for download about 6 days ago and there have been almost 100 downloads since
|
||||
(04:37:55 PM) zlatinb: about 30% of the mac users download the arm64 bundle which surprises me
|
||||
(04:40:58 PM) zlatinb: No feedback anywhere yet, but with the last known bug fixed I think this should be ready for promotion to stable
|
||||
(04:40:58 PM) zzz: the only thing I'd suggest is making sure the news feeds are up and working on both servers, by putting up a 'thanks for testing' news entry
|
||||
(04:40:58 PM) zlatinb: I'm thinking to upgrade the 1.8 bundle to 1.9 when that becomes available to test the update channel although don't expect any issues
|
||||
(04:40:58 PM) zlatinb: yes, can do that tomorrow after my right hand will be fully functional again (hopefully)
|
||||
(04:40:58 PM) zlatinb: that's about it
|
||||
(04:40:58 PM) zlatinb: eot
|
||||
(04:42:08 PM) eyedeekay: Thanks zlatinb, if you choose to do a news entry let me know and I'll update the servers
|
||||
(04:42:48 PM) eyedeekay: 4. Letter to EFF to clarify what "running" a network means
|
||||
(04:43:28 PM) zzz: so I'd say after a successful update or news entry, stable is fine. I don't expect any issues either, but we've had plenty of news glitches before
|
||||
(04:43:48 PM) zzz: but willing to hear other opinions ofc
|
||||
(04:43:48 PM) zlatinb: the only real action for promoting to stable really is removing the "BETA" label from the website
|
||||
(04:43:48 PM) uis is now known as Irc2PGuest3854
|
||||
(04:43:48 PM) zzz: sure, it's more the principle than anything actually being different
|
||||
(04:43:48 PM) zzz: let's be purposeful in our labeling, that's all
|
||||
(04:44:07 PM) zlatinb: Yes, some background on that:
|
||||
(04:44:10 PM) mode (+v T3s|4) by ChanServ
|
||||
(04:44:34 PM) mode (+v albat) by ChanServ
|
||||
(04:44:48 PM) mode (+v polistern) by ChanServ
|
||||
(04:44:53 PM) zlatinb: eyedeekay and I met Kurt Opsahl from EFF at HOPE few weeks ago and asked him about legality of working on something like I2P
|
||||
(04:45:43 PM) zlatinb: He said that writing code is fine because "code == speech", however "running" the network may be a different story
|
||||
(04:46:21 PM) zlatinb: we didn't dig into what running the network means at HOPE
|
||||
(04:46:56 PM) zlatinb: but I think it's a good idea to reach out and clarify the topic as much as possible
|
||||
(04:47:41 PM) zzz: what would we do differently, based on conceivable responses?
|
||||
(04:48:38 PM) zlatinb: I'm having very hard time conceiving the responses as it's a very broad topic
|
||||
(04:48:44 PM) eyedeekay: It may inform who is able to run what services
|
||||
(04:48:50 PM) zzz: whatever "running" we're doing, it's much less than their darling Tor, and how might we do even less?
|
||||
(04:49:32 PM) eyedeekay: But I think one likely response is that running services to support a network is probably speech too
|
||||
(04:49:53 PM) eyedeekay: That may be optimistic, but it's also the one that involves the least leaps
|
||||
(04:50:20 PM) zzz: in my experience, ask a lawyer an informal question, you'll get good information. Send them a letter, they'll say they aren't licensed in your state, go hire somebody
|
||||
(04:50:51 PM) zlatinb: no idea, maybe reseeds are fine and addressbooks are not, who knows, Too many possible permutations
|
||||
(04:51:26 PM) zzz: if you want to follow up, follow up, but I've asked EFF for legal advice before, their answer is "we're not set up to be general purpose legal counsel. We litigate cases of interest"
|
||||
(04:51:59 PM) eyedeekay: Maybe I can track down somebody for an informal question next week then. Can't hurt to try both
|
||||
(04:52:38 PM) eyedeekay: Writing the letter would help inform the question
|
||||
(04:53:14 PM) zzz: email Kurt. He gave you a vague answer, following up is reasonable. He's always been quite nice every time I talk to him
|
||||
(04:54:00 PM) eyedeekay: Can do
|
||||
(04:54:30 PM) zzz: I just wouldn't expect anything actionable, but who knows?
|
||||
(04:54:32 PM) zlatinb: well it's worth structuring any such letter properly; also may be wise to build up the engagement gradually rather than dump a giant letter from the blue
|
||||
(04:55:31 PM) eyedeekay: zlatinb do you want to set up a time to sync up and write that letter this week?
|
||||
(04:55:34 PM) zlatinb: I suggest we start with a simple follow-up like "was nice to meet you" and then expand from there
|
||||
(04:56:32 PM) zlatinb: currently I'm thinking we should not write a giant letter describing how i2p works until we get an ack that eff is willing to work with us
|
||||
(04:56:42 PM) eyedeekay: OK
|
||||
(04:56:59 PM) zlatinb: they may decide they want a retainer, who knows
|
||||
(04:57:10 PM) zzz: see above. they don't do that
|
||||
(04:57:48 PM) zzz: you're misunderstanding how they work
|
||||
(04:58:06 PM) zlatinb: I'll shoot him a "was nice to meet you" follow up and cc you guys and take it from there.
|
||||
(04:58:18 PM) zlatinb: if they can't help at all that's fine too
|
||||
(04:59:15 PM) eyedeekay: Anything else for 4?
|
||||
(04:59:23 PM) zlatinb: no, eot
|
||||
(04:59:38 PM) eyedeekay: 5. New Outproxy ref: http://zzz.i2p/topics/3254
|
||||
(04:59:38 PM) eyedeekay: a) Organizational and infrastructure overview (StormyCloud)
|
||||
(04:59:38 PM) eyedeekay: b) Technical review and test results (zzz and others)
|
||||
(04:59:38 PM) eyedeekay: c) ToS and log policy review http://stormycloud.i2p/outproxy.html (all)
|
||||
(04:59:38 PM) eyedeekay: d) Vote to approve (all)
|
||||
(04:59:38 PM) eyedeekay: e) Rollout plan (if approved) (zzz, StormyCloud)
|
||||
(04:59:51 PM) eyedeekay: a) Organizational and infrastructure overview (StormyCloud)
|
||||
(05:00:10 PM) zzz: StormyCloud, you here?
|
||||
(05:00:21 PM) StormyCloud: Yes
|
||||
(05:00:41 PM) zzz: this is a proposal to replace false.i2p, which was unreliable for years and is now dead
|
||||
(05:00:56 PM) zzz: thanks for volunteering to support a replacement
|
||||
(05:01:18 PM) zzz: please go ahead and give us a brief overview of your organization and your infrastructure
|
||||
(05:01:45 PM) StormyCloud: Who we are: We are a 501(c)(3) non-profit organization based out of Texas. Our mission is to provide privacy-based tools to allow everyone access to an unfiltered and unregulated Internet. We started this organization in 2021 and have been working closely with the TOR community by deploying exit nodes.
|
||||
(05:02:37 PM) StormyCloud: We own all of our hardware and currently colocate at a Tier 4 data center. As of now have a 10GBps uplink with the option to upgrade to 40GBps without the need for much change. We have our own ASN and IP space (IPv4 & IPv6).
|
||||
(05:02:55 PM) StormyCloud: Outproxy Infrastructure: Outproxies are run on Ubuntu 22.04 and have been optimized for I2P. The backend proxy software is TinyProxy and supports HTTP, HTTPS, I2P, and TOR onion links. Currently, the outproxy is multi-homed on two servers. We can increase this number of servers as needed.
|
||||
(05:04:03 PM) zzz: I want to invite everyone to ask questions of StormyCloud at any point as we go through the agenda
|
||||
(05:04:15 PM) zzz: any questions at this time?
|
||||
(05:04:26 PM) not_bob: Yes
|
||||
(05:04:39 PM) not_bob: How do you deal with users who try to use your service for "really nasty stuff"?
|
||||
(05:05:46 PM) StormyCloud: Nothing, we do not filter any requests. While that does invite "bad" users we feel the internet should be a free and open place.
|
||||
(05:06:12 PM) R4SAS: And one from me: will be here SOCKS5 proxies in future?
|
||||
(05:06:48 PM) StormyCloud: R4SAS: If there is a need for a SOCKS5 proxy I am sure we can get one deployed.
|
||||
(05:07:01 PM) R4SAS: Thanks
|
||||
(05:07:45 PM) zzz: any other questions on 5a) ?
|
||||
(05:08:02 PM) not_bob: http://notbob.i2p/graphs/stormycloud.i2p.yearly.svg
|
||||
(05:08:14 PM) not_bob: I just want to note that stormycloud has been great for uptime.
|
||||
(05:08:56 PM) SilicaRice: the backend supports I2P links uh huh?
|
||||
(05:08:57 PM) not_bob: And performance is great.
|
||||
(05:09:29 PM) zzz: that brings us to 5b, yes
|
||||
(05:09:29 PM) zzz: the outproxy has been in beta for quite a while
|
||||
(05:09:29 PM) zzz: testing should ensure that the service is reliable, meets applicable standards, and is secure
|
||||
(05:10:00 PM) zzz: we've encountered several issues over the last few months, and StormyCloud has always been responsive
|
||||
(05:10:13 PM) SilicaRice: (why would you run i2p links through an outproxy?)
|
||||
(05:10:29 PM) zzz: at this time my test results are good, and I'm recommending it to be our official outproxy
|
||||
(05:10:38 PM) dr|z3d: StormyCloud misspoke. there is no .i2p support.
|
||||
(05:10:40 PM) zzz: but let's hear any other test reports or questions
|
||||
(05:10:43 PM) StormyCloud: SilicaRice: My apologies I wrote that wrong
|
||||
(05:11:03 PM) SilicaRice: oh okay
|
||||
(05:12:00 PM) R4SAS: > We do not cooperate with any requests for information except where compelled by law, and in that event our ability to assist is limited by our logging policy.
|
||||
(05:12:19 PM) R4SAS: Will be here transparency reports in such situations?
|
||||
(05:12:45 PM) zzz: also, to be clear, this meeting is about Java I2P's default and recommendations. Any other project including i2pd may have their own processes and requirements and negotiations with the outproxy operator
|
||||
(05:13:03 PM) StormyCloud: R4SAS: Yes, we public a report quarterly on our clearnet website. That is something I can also do on our i2p site.
|
||||
(05:13:48 PM) zzz: ok, looks like we're on 5c) review of ToS and logging policies. The goal here is to ensure our users are protected.
|
||||
(05:14:00 PM) R4SAS: also, please, create in-i2p mail for contacting =)
|
||||
(05:14:03 PM) zzz: any comments or questions about the Tos?
|
||||
(05:15:41 PM) R4SAS: ah, btw, about 5b: StormyCloud, what tunnel settings are you using?
|
||||
(05:16:06 PM) R4SAS: length, amount, etc
|
||||
(05:16:11 PM) dr|z3d: 0 hop.
|
||||
(05:16:17 PM) eyedeekay: Everything it says looks pretty clear to me, although to follow up on what R4S4S it might be good to put a link to the transparency report in or after that > We do not... unless compelled by law section
|
||||
(05:16:34 PM) zzz: an outproxy operator is in a position to view all traffic, or at least all non-https traffic, so it's important that we trust the operator to protect our users
|
||||
(05:17:01 PM) StormyCloud: eyedeekay: Makes sense, ill get this added to the website
|
||||
(05:17:09 PM) zzz: it's currently two multihomed 0-hop servers, right StormyCloud ?
|
||||
(05:17:19 PM) StormyCloud: Correct
|
||||
(05:17:42 PM) not_bob: But, just to clarify, with the way i2p tunnels work, my 2-3 hops are still there. You are just not adding any more, right?
|
||||
(05:18:07 PM) dr|z3d: the client can configure as many hops as they wish, not_bob.
|
||||
(05:18:12 PM) zzz: I also saw on zzz.i2p that it's ipv4-only but that may get fixed soon, right?
|
||||
(05:18:13 PM) anonymousmaybe is now known as Irc2PGuest54486
|
||||
(05:18:15 PM) not_bob: Yep, that's what I thought. Thank you.
|
||||
(05:18:48 PM) StormyCloud: zzz: Correct, our upstream provider finished their upgrade. I didnt want to mess with IPv6 until all testing was done
|
||||
(05:19:49 PM) zzz: would you please elaborate on your experience running tor exits and the capacity of your tor exits?
|
||||
(05:21:00 PM) StormyCloud: Sure, we have been running tor exit since late last year, currently sitting at 130ish exits with about 1.6% of TOR exit traffic going through our servers.
|
||||
(05:21:49 PM) StormyCloud: Everything is virtualized and the process to setup has become pretty automated
|
||||
(05:22:06 PM) zzz: have you ever received any DMCA or other legal processes w.r.t. your tor exits? if so, how was it handled?
|
||||
(05:23:33 PM) StormyCloud: No legal requests and surprisingly no DMCA requests. We do get abuse complaints, we just respond and let them know this is a TOR exit and there is nothing further that can be done on our end.
|
||||
(05:23:47 PM) major: No legal requests and surprisingly no DMCA requests. We do get abuse complaints, we just respond and let them know this is a TOR exit and there is nothing further that can be done on our end.
|
||||
(05:24:27 PM) R4SAS: huh, acetone's bot has bug
|
||||
(05:24:33 PM) zzz: any other questions sor StormyCloud before we go to 5d) appproval ?
|
||||
(05:24:34 PM) R4SAS: I'll PM him
|
||||
(05:25:33 PM) zzz: normally major doesn't have +v, but I turned +m off for the meeting, no big deal
|
||||
(05:26:36 PM) zzz: ok, if there's no more questions, everybody please indicate your approval / disapproval for making StormyCloud our official outproxy
|
||||
(05:26:45 PM) not_bob: Approve
|
||||
(05:26:58 PM) zzz: approve
|
||||
(05:27:05 PM) zlatinb: approve
|
||||
(05:27:05 PM) eyedeekay: approve
|
||||
(05:27:18 PM) SilicaRice: approve (if users count for anything)
|
||||
(05:27:54 PM) R4SAS: no objections, approve
|
||||
(05:28:32 PM) zzz: ok, great
|
||||
(05:28:39 PM) zzz: 5e) rollout
|
||||
(05:28:50 PM) zzz: the two major steps are:
|
||||
(05:29:08 PM) zzz: 1) setting it as default for new installs (as early as the next release in 3 weeks)
|
||||
(05:29:23 PM) zzz: 2) recommending to existing users to change their config (probably via console news, any time)
|
||||
(05:29:30 PM) zzz: these can happen in either order
|
||||
(05:29:41 PM) zzz: and we have no idea how much traffic either would generate
|
||||
(05:29:59 PM) zzz: other products (Android, bundles), probably aren't big enough to worry about timing
|
||||
(05:30:14 PM) zzz: StormyCloud, what is your request or recommendation on when and how we proceed?
|
||||
(05:31:36 PM) StormyCloud: If the console news can be set/sent anytime then we can let existing users know to switch now (if they want) and that gives us three weeks to monitor and spin up new servers if needed.
|
||||
(05:32:12 PM) dr|z3d: console news generally published with a new release.
|
||||
(05:32:13 PM) not_bob: StormyCloud: How much traffic are you handeling for the outproxy currently?
|
||||
(05:33:10 PM) zzz: ok. it would be nice to point to a howto page with screenshots for editing the hidden services manager config. That could be hosted on stormycloud.i2p, or a i2p-projekt.i2p blog post? Any volunteers to put that together?
|
||||
(05:33:35 PM) eyedeekay: I can do it
|
||||
(05:33:35 PM) StormyCloud: Difficult to say at this time, since we dont log anything. I am monitoring network activity, but that too doesnt tell a full picture since its also passing i2p traffic.
|
||||
(05:34:18 PM) dr|z3d: StormyCloud: we keep an eye on exit traffic via graphs..
|
||||
(05:34:41 PM) dr|z3d: in short, notbob, nothing worth getting excited about.
|
||||
(05:34:59 PM) zzz: dr|z3d, you have a guess on current % utilization of your two nodes? probably very small?
|
||||
(05:35:21 PM) dr|z3d: utilization in what sense?
|
||||
(05:35:28 PM) dr|z3d: capacity-wise?
|
||||
(05:35:33 PM) zzz: yes
|
||||
(05:35:50 PM) zzz: or maybe you don't really know until you hit it...
|
||||
(05:35:51 PM) dr|z3d: very small is about right.
|
||||
(05:36:18 PM) dr|z3d: throw a few thousand concurrent users at the outproxy, we'll then know :)
|
||||
(05:36:33 PM) zzz: yeah, apologies to StormyCloud, we were unable to get any historical estimates of false.i2p bandwidth
|
||||
(05:37:06 PM) zzz: so it's a little bit of a crap shoot, as long as you're monitoring things and have an expansion plan, we should be fine
|
||||
(05:37:37 PM) StormyCloud: All good, we will adjust as more and more people start to use the outproxy
|
||||
(05:38:11 PM) dr|z3d: well, as configured, the outproxies combined can handle up to 8192 concurrent streams. so there's plenty of capacity there, and StormyCloud has plenty of stuff in the wings if required.
|
||||
(05:38:21 PM) zzz: and StormyCloud re: new installs, should we plan to make it the default in the next release late this month as well?
|
||||
(05:39:01 PM) StormyCloud: Yes, that would be fine
|
||||
(05:39:29 PM) zzz: ok then. eyedeekay let me know when you have a blog post up, and then I'll write the news entry
|
||||
(05:39:39 PM) zzz: anything else on 5e) rollout ?
|
||||
(05:39:43 PM) eyedeekay: OK, expect it tonight or tomorrow
|
||||
(05:40:14 PM) eyedeekay: Nothing from me
|
||||
(05:40:14 PM) zzz: thanks again StormyCloud
|
||||
(05:40:18 PM) zzz: back to you eyedeekay
|
||||
(05:41:07 PM) eyedeekay: All right that's it for the listed items, I'll be at Def Con next week in case anybody who's watching wants to meet me there lol
|
||||
(05:41:49 PM) eyedeekay: If anybody else has anything else for the meeting, please speak up, otherwise timeout 1m
|
||||
(05:42:59 PM) R4SAS: I have one question, but it is out of meeting scope
|
||||
(05:43:34 PM) zzz: oh, also thanks to dr|z3d for vital technical assistance over the testing period
|
||||
(05:43:41 PM) eyedeekay: All right thanks everybody for coming to the meeting, I've got a kind of crazy section in the middle of my log but once I fix that I'll post the logs to the web site
|
||||
(05:43:44 PM) eyedeekay: Thanks for coming
|
||||
(05:43:59 PM) not_bob: Thank you for having us.
|
@ -1,15 +0,0 @@
|
||||
I2P dev meeting, August 2, 2022 @ 20:00 UTC
|
||||
===========================================
|
||||
|
||||
Quick recap
|
||||
-----------
|
||||
|
||||
* **Present:**
|
||||
|
||||
eyedeekay,
|
||||
zzz,
|
||||
zlatinb,
|
||||
StormyCloud,
|
||||
R4S4S,
|
||||
SilicaRice,
|
||||
not_bob
|
@ -1,106 +0,0 @@
|
||||
(04:01:46 PM) eyedeekay: Hi everybody
|
||||
(04:01:50 PM) eyedeekay: welcome to the Tuesday September 6 meeting
|
||||
(04:02:02 PM) zzz: hi
|
||||
(04:02:07 PM) mode (-m ) by zzz
|
||||
(04:02:13 PM) zlatinb: hi
|
||||
(04:02:26 PM) eyedeekay: 1. Hi
|
||||
(04:02:26 PM) eyedeekay: 2. 1.9.0 release status
|
||||
(04:02:26 PM) eyedeekay: 3. 1.10.0 development status
|
||||
(04:02:26 PM) eyedeekay: 4. next release 2.0.0?
|
||||
(04:02:26 PM) eyedeekay: 5. Mac arm64 bundle out of beta if 1.9.0 update was successful? (followup from last meeting)
|
||||
(04:02:51 PM) eyedeekay: Anything else to add before we get started?
|
||||
(04:03:19 PM) eyedeekay: hi zzz, hi zlatinb
|
||||
(04:03:46 PM) eyedeekay: 2. 1.9.0 release status
|
||||
(04:05:11 PM) eyedeekay: We released about 2 weeks ago, there was a slight delay getting Android and the Easy-Install bundle out now
|
||||
(04:05:11 PM) eyedeekay: F-Droid builds are now fixed as well so people who wish to can install from F-Droid main if they choose to and the app will work
|
||||
(04:05:37 PM) not_bob: Thank you for that.
|
||||
(04:05:43 PM) eyedeekay: No problem
|
||||
(04:06:41 PM) eyedeekay: I'm going to be doing a point release for the Windows Easy-Install bundle, zlatinb found a very hard-to-spot bug which sees to affect easy-install bundle on Windows 11 slightly more than other places
|
||||
(04:07:17 PM) eyedeekay: zzz do you want to talk Debian or anything else?
|
||||
(04:07:51 PM) zzz: sure
|
||||
(04:07:53 PM) zzz: about 40% of net is updated which is typical for 2 weeks in
|
||||
(04:08:10 PM) zzz: we have a few hundred SSU2-enabled routers now, as desired/expected
|
||||
(04:08:41 PM) zzz: no major issues so far
|
||||
(04:09:06 PM) zzz: although zlatinb's bug is maybe medium-major :)
|
||||
(04:09:07 PM) zzz: EOT
|
||||
(04:10:01 PM) eyedeekay: Yeah and what I don't understand is how it went without happening much for so long, and then it hits the easy bundle twice in quick succession
|
||||
(04:10:17 PM) zlatinb: well its kind of by accident that I have to use a windows 11 laptop for a few days, itś discovered a lot of issues
|
||||
(04:11:08 PM) zlatinb: I guess the reseed problem either caused people to try again or give up on i2p off the bat
|
||||
(04:11:09 PM) zzz: that's usually the way it goes... dev gets new setup... all hell breaks loose
|
||||
(04:11:59 PM) zlatinb: there is still an unresolved forking issue with firefox on first launch
|
||||
(04:12:48 PM) zlatinb: so ideally we should try and do something about it
|
||||
(04:13:30 PM) eyedeekay: Indeed, it only happens the very first time the browser launcher is run, every subsequent time it works fine
|
||||
(04:13:36 PM) zlatinb: maybe launch headless or play with the launch options, idk
|
||||
(04:14:10 PM) eyedeekay: Yeah I could launch it headless on the first run, let it fork and close, then subsequently run with the window open
|
||||
(04:14:58 PM) eyedeekay: That's a good idea thanks zlatinb
|
||||
(04:15:15 PM) eyedeekay: Anything else on 2?
|
||||
(04:16:03 PM) goingpostal is now known as Irc2PGuest14444
|
||||
(04:16:29 PM) eyedeekay: 3. 1.10.0 development status
|
||||
(04:18:30 PM) eyedeekay: Sorry I'm a little less prepared than usual, stuck in somebody else's office all day, bear with me
|
||||
(04:21:00 PM) eyedeekay: 2 weeks in, I've been working on a number of improvements to the Windows bundle to make it more stable and intuitive to use and to help track down this clock-skew bug
|
||||
(04:21:37 PM) eyedeekay: I've also been porting the profile and launcher parts of it(less the jpackaged router) to non-Windows platforms to hopefully provide automatic browser configuration there
|
||||
(04:22:06 PM) eyedeekay: zzz has been working on SSU2, fixing bugs with the help of orignal, would you like to update us on that zzz
|
||||
(04:22:16 PM) zzz: yes, thanks. early days, but a summary of changes and fixes so far is at http://zzz.i2p/topics/3377
|
||||
(04:22:32 PM) zzz: SSU2 - added the ack-immediate flag and connection migration
|
||||
(04:22:47 PM) zzz: which are the last two things we wanted to get in before enabling for all
|
||||
(04:24:07 PM) eyedeekay: Cool so you're right on track then?
|
||||
(04:24:30 PM) zzz: the larger user base has us finding corner cases and more rare bugs, nothing too serious, fixing as we go
|
||||
(04:24:30 PM) zzz: the plans for months has been for us to enable SSU2 for everybody in the November release and we are still on track
|
||||
(04:24:30 PM) zzz: EOT
|
||||
(04:24:42 PM) zzz: yes
|
||||
(04:24:51 PM) eyedeekay: Awesome thanks for the update
|
||||
(04:25:09 PM) eyedeekay: Anything else for 3?
|
||||
(04:25:41 PM) eyedeekay: 4) next release 2.0.0?
|
||||
(04:25:52 PM) eyedeekay: zzz you added this topic, would you like to get us started?
|
||||
(04:26:12 PM) zzz: this was a suggestion from dr|z3d so if he's around I'll ask him to make his pitch
|
||||
(04:26:50 PM) zzz: but if he's not, I'll say it's not a bad idea
|
||||
(04:27:05 PM) zzz: linux is about to go from 5.19 to 6.0
|
||||
(04:27:25 PM) zzz: tor's arti just went to 1.0.0
|
||||
(04:27:26 PM) zzz: ssu2 as good an excuse as any
|
||||
(04:27:45 PM) RightNow: and I2P is going from SSU to SSU2
|
||||
(04:27:47 PM) zzz: EOT - thoughts everyone? and we don't need to decide today, we have 11 more weeks
|
||||
(04:28:30 PM) not_bob: I have no issue with it so long it works.
|
||||
(04:29:18 PM) zzz: anybody hate it? anybody love it?
|
||||
(04:29:21 PM) eyedeekay: Sure, I think it makes sense, both transports will have been modernized, it's a big milestone
|
||||
(04:29:43 PM) zlatinb: I kind of wish we had something bigger of a bang to go to 2.0
|
||||
(04:29:48 PM) RightNow is now known as RN
|
||||
(04:30:34 PM) eyedeekay: Use it for 3.0.0 maybe?
|
||||
(04:30:38 PM) zzz: there's nothing bigger on the roadmap. frankly, I hope we don't ever do anything bigger, I'm tired...
|
||||
(04:30:56 PM) zlatinb: also I have to leave now sorry, on the last topic yes I think the mac arm bundle is ready to go out of beta. I will have the windows laptop for another day or two for testing. Gotta bolt now, sorry
|
||||
(04:30:59 PM) zlatinb: ttyl
|
||||
(04:31:05 PM) RN: zzz, you are also thanked.
|
||||
(04:32:26 PM) eyedeekay: Yes zzz, your dedication and hard work are appreciated
|
||||
(04:32:34 PM) zzz: tell you what eyedeekay let me post in the 1.10 thread on my forum and will come back next month with a report, stick it on the agenda for next month
|
||||
(04:32:44 PM) eyedeekay: Will do zzz
|
||||
(04:33:18 PM) zzz: wasn't trying to elicit thanks, just pointing out this was the last - and hardest - of the crypto migration we've been on for about a decade
|
||||
(04:33:36 PM) eyedeekay: Didn't need to elicit it, you deserve it :)
|
||||
(04:33:52 PM) eyedeekay: But point taken, it's a huge effort
|
||||
(04:33:58 PM) RN: it is a milestone worth celebration, and yeah, you deserve it!
|
||||
(04:34:14 PM) zzz: if we'd tried to do SSU2 first it would have killed us all. we only managed due to the experience of all the rest of it
|
||||
(04:34:26 PM) zzz: shared credit to the i2pd project of course
|
||||
(04:35:01 PM) eyedeekay: Indeed. Back on track though, anything else on 4?
|
||||
(04:35:15 PM) RN: but you led the charge.
|
||||
(04:35:21 PM) zzz: if we want to do post-quantum that can be 3.0.0 :)
|
||||
(04:35:43 PM) eyedeekay: Good idea, that will be exciting
|
||||
(04:35:53 PM) zzz: nope, nothing else
|
||||
(04:36:05 PM) eyedeekay: Well 5) was: Mac arm64 bundle out of beta if 1.9.0 update was successful? (followup from last meeting)
|
||||
(04:36:43 PM) eyedeekay: Which zlatinb gave us a status update for on his way out the door, with the update being successful I see no reason against it
|
||||
(04:37:38 PM) eyedeekay: Anybody else have anything to add to this topic?
|
||||
(04:38:06 PM) zzz: I assume zlatinb meant the update worked; if so, he can remove the beta label on the web page
|
||||
(04:38:32 PM) zzz: that was the only reservation I had at the last meeting
|
||||
(04:38:33 PM) zzz: eot
|
||||
(04:39:45 PM) eyedeekay: OK. One of us should ping us when we see him online
|
||||
(04:39:52 PM) eyedeekay: Anything else for the meeting?
|
||||
(04:40:04 PM) eyedeekay: ping *him
|
||||
(04:41:14 PM) eyedeekay: Well I guess without his git creds I may as well remove the label
|
||||
(04:41:27 PM) eyedeekay: So I'll do it
|
||||
(04:41:43 PM) zzz: do you have confirmation the update worked?
|
||||
(04:42:11 PM) zzz: because he didn't say that above
|
||||
(04:42:53 PM) eyedeekay: I don't think I do
|
||||
(04:43:01 PM) eyedeekay: Nope
|
||||
(04:43:14 PM) eyedeekay: No I've not strictly speaking heard anyone say those exact words yet
|
||||
(04:43:21 PM) eyedeekay: So I'll wait
|
||||
(04:43:26 PM) eyedeekay: And ask him
|
||||
(04:43:32 PM) zzz: ok
|
||||
(04:44:19 PM) eyedeekay: Anything else for the meeting timeout 1m?
|
||||
(04:45:44 PM) eyedeekay: All right thanks everyone for coming
|
@ -1,14 +0,0 @@
|
||||
I2P dev meeting, September 6, 2022 @ 20:00 UTC
|
||||
==============================================
|
||||
|
||||
Quick recap
|
||||
-----------
|
||||
|
||||
* **Present:**
|
||||
|
||||
eyedeekay,
|
||||
zzz,
|
||||
zlatinb,
|
||||
not_bob,
|
||||
RightNow,
|
||||
RN
|
@ -22,7 +22,7 @@
|
||||
<p>{% trans %}It does pre-configuration of your browser by enabling some of the privacy Browser Settings like ResistFingerprinting, and enforces WebRTC proxy obedience. It also contains menus, shortcuts, and monitoring tools improving Firefox's integration
|
||||
with I2P. It should not substantially interfere with your non-I2P Firefox tabs. {% endtrans %}</p>
|
||||
<p>{% trans %}The extension, <a href="https://addons.mozilla.org/en-US/firefox/addon/i2p-in-private-browsing/">I2P in Private Browsing</a>, can be obtained from the Mozilla addon store. {% endtrans %}</p>
|
||||
<p>{% trans %}The source code for the extension is available at <a href="https://i2pgit.org/idk/I2P-in-Private-Browsing-Mode-Firefox">i2pgit.org</a>. {% endtrans %}</p>
|
||||
<p>{% trans %}The source code for the extension is, <a href="https://i2pgit.org/idk/I2P-in-Private-Browsing-Mode-Firefox">i2pgit.org</a>. {% endtrans %}</p>
|
||||
<h4>{% trans %}Instructions for Firefox 57 and above:{% endtrans %}</h4>
|
||||
<p>{% trans -%} From the Menu button in the top right, select <em>Preferences</em>. Scroll down until you see the <em>Network Proxy</em> section, as shown in the screenshot below. Click on <em>Settings</em> {%- endtrans %}</p>
|
||||
<img src="{{ url_for('static', filename='images/firefox57.preferences.png') }}" alt="{{ _('Firefox57 Network Options') }}" title="{{ _('Firefox57 Network Options') }}">
|
||||
@ -60,7 +60,7 @@ in IceRaven will proxy all your IceRaven browsing over I2P.</em>{% endtrans %}</
|
||||
<p>{% trans %}Open the IceRaven main menu, and scroll to the top until you see the "Add-Ons" submenu. Tap the "Add-Ons Manager" option in the "Add-Ons" submenu. Install the extension named <em>I2P Proxy for Android and other Systems</em>. {% endtrans %}</p>
|
||||
<p>{% trans %}Your IceRaven browser is now configured to use I2P. {% endtrans %}</p>
|
||||
<p>{% trans %}This extension also works in pre-Fenix(Pre-Firefox-68) Firefox based web browsers, if installed from the following addons.mozilla.org URL.
|
||||
<em><a href="https://addons.mozilla.org/en-US/android/addon/i2p-proxy/">I2P Proxy for Android and Other Systems</a></em>
|
||||
<em><a href="https://addons.mozilla.org/en-US/android/addon/i2p-proxy/">I2P Proxy for Android and Other Systems</a><em>
|
||||
{% endtrans %}</p>
|
||||
<p>{% trans %}This extension is identical to the Chromium extension and is built from the same source.{% endtrans %}</p>
|
||||
<p>{% trans %}In order to enable extension support in Firefox Nightly, you should follow
|
||||
@ -93,17 +93,22 @@ Instead, it is meant to be used as an internal network.
|
||||
{%- endtrans %}</p>
|
||||
<p>{% trans -%}
|
||||
<p><b>The I2P project itself does not run any proxies to the Internet.</b>
|
||||
The I2P software includes a default outproxy: exit.stormycloud.i2p.
|
||||
These are run by a volunteer. </p>
|
||||
<a href="https://stormycloud.org"
|
||||
target="_blank">https://stormycloud.org</a>
|
||||
The I2P software includes two outproxies: false.i2p and outproxy-tor.meeh.i2p.
|
||||
Even though domain names are different, it's the same outproxy you hit,
|
||||
multihomed/keyed for better performance. These are run by a volunteer. </p>
|
||||
<a href="http://privacysolutions.no"
|
||||
target="_blank">http://privacysolutions.no</a>
|
||||
{%- endtrans %}</p>
|
||||
<p>{% trans http='exit.stormycloud.i2p', https='exit.stormycloud.i2p' -%}
|
||||
By default, I2P comes with one outproxy configured: <code>{{ http }}</code>.
|
||||
<p>{% trans http='false.i2p', https='outproxy-tor.meeh.i2p' -%}
|
||||
By default, I2P comes with two outproxies configured: <code>{{ http }}</code>
|
||||
and <code>{{ https }}</code>. Even the domain names are different, it's the same outproxy you hit.
|
||||
(multi-homed/keyed for better performance)
|
||||
{%- endtrans %}</p>
|
||||
<p>{% trans -%}
|
||||
I2P Sites that are accessible via .i2p addresses are also
|
||||
Filtering is active on these outproxies (for example, mibbit and torrent tracker
|
||||
access is blocked). I2P Sites that are accessible via .i2p addresses are also
|
||||
not allowed via the outproxies.
|
||||
As a convenience, the outproxy blocks ad servers.
|
||||
{%- endtrans %}</p>
|
||||
<p>{% trans -%}
|
||||
<a href="https://www.torproject.org">Tor</a> provides a browser to use as an outproxy to the Internet.
|
||||
|
@ -111,11 +111,27 @@ user to root with <code>su</code> or by prefixing each command with <code>sudo</
|
||||
| sudo tee /etc/apt/sources.list.d/i2p.list
|
||||
</code>
|
||||
</pre>
|
||||
if you are using Debian Buster or older distributons, use the following command instead:
|
||||
{% trans -%}If you're using a downstream variant of Debian like LMDE or Kali Linux, the following command fill find the correct version for your distribution:{%- endtrans %}
|
||||
<pre>
|
||||
<code>
|
||||
# Use this command on Debian Bullseye or newer only.
|
||||
echo "deb [signed-by=/usr/share/keyrings/i2p-archive-keyring.gpg] https://deb.i2p2.de/ $(dpkg --status tzdata | grep Provides | cut -f2 -d'-') main" \
|
||||
| sudo tee /etc/apt/sources.list.d/i2p.list
|
||||
</code>
|
||||
</pre>
|
||||
{% trans -%}If you are using Debian Buster or older official Debian distributons, use the following command instead:{%- endtrans %}
|
||||
<pre>
|
||||
<code>
|
||||
# Use this command on Debian Buster or older only.
|
||||
echo "deb https://deb.i2p2.de/ $(lsb_release -sc) main" \
|
||||
| sudo tee /etc/apt/sources.list.d/i2p.list
|
||||
</code>
|
||||
</pre>
|
||||
{% trans -%}If you're using a downstream variant of Debian like LMDE or Kali Linux, the following command fill find the correct version for your distribution:{%- endtrans %}
|
||||
<pre>
|
||||
<code>
|
||||
# Use this command on Debian Buster or older only.
|
||||
echo "deb https://deb.i2p2.de/ $(dpkg --status tzdata | grep Provides | cut -f2 -d'-') main" \
|
||||
| sudo tee /etc/apt/sources.list.d/i2p.list
|
||||
</code>
|
||||
</pre>
|
||||
|
@ -56,7 +56,7 @@ special configuration. You don't even need to close existing Firefox windows.
|
||||
{%- set name = 'Windows' -%}
|
||||
{%- set icon = 'images/download/windows.png' -%}
|
||||
{%- set filename = 'I2P-Profile-Installer-%s-signed.exe' -%}
|
||||
{%- set hash = 'ee66e9cfeb393d737e79f6960fe26ba28d51e845a0148ef2544802366e8840c6' -%}
|
||||
{%- set hash = '0012fd31a0bbfca36c820055de00682365d7955d53b11e79432fb2b2ea05432c' -%}
|
||||
|
||||
{% call package_outer('windows', name, icon) %}
|
||||
<div class = "file">
|
||||
|
@ -3,12 +3,17 @@
|
||||
{% block title %}Mac OS X Easy Install Bundle{% endblock %}
|
||||
{% block content %}
|
||||
|
||||
<h1>{{ _('Mac OS Easy Install Bundle') }}</h1>
|
||||
<h1>{{ _('Mac OS X Easy Install Bundle') }}</h1>
|
||||
<p>{% trans -%}
|
||||
We are excited to offer you a DMG-based bundle for Mac OS. It installs and behaves
|
||||
the same way many other Mac OS applications do and does not require a Java
|
||||
We are excited to offer you a DMG-based bundle for Mac OS X. It installs and behaves
|
||||
the same way many other Mac OS X applications do and does not require a Java
|
||||
Runtime Environment to be available.
|
||||
{%- endtrans %}</p>
|
||||
<p>{% trans perf="https://i2pgit.org/i2p-hackers/i2p-jpackage-mac/-/issues/1" -%}
|
||||
This bundle is built for <code>x86_64(Intel)</code> Macs. It will run on
|
||||
<code>ARM(M1)</code> Macs in emulated mode, but the performance is unknown. M1 Mac
|
||||
users should report results to us at the <a href="{{ perf }}">Gitlab Repository</a>.
|
||||
{%- endtrans %}</p>
|
||||
<h2>{{ _('How do I use it?') }}</h2>
|
||||
<p>{% trans -%}
|
||||
Double-Click on the .dmg file, which you may download from this page. When a
|
||||
@ -38,14 +43,11 @@ that are familiar and built-into the operating system.
|
||||
{%- set name = 'OSX' -%}
|
||||
{%- set icon = 'images/download/mac-osx.png' -%}
|
||||
{%- set filename = 'I2P-%s.dmg' -%}
|
||||
{%- set filename_arm64 = 'I2P-arm64-%s.dmg' -%}
|
||||
{%- set hash = '18cb22cfcc3cbe0cec150e89a394d1a35703cb508ed627ef48084b7ba7c90dde' -%}
|
||||
{%- set hash_arm64 = '4a1b4e392a2ec272980bf88bfe6dbad2d341bc74717f94a0b26e73afc300462b' -%}
|
||||
|
||||
{% call package_outer('osx', name, icon) %}
|
||||
<div class = "file">
|
||||
<a class = "default" href="{{ url_for('downloads_redirect', version=mver(), net=def_mirror.net, protocol=def_mirror.protocol, domain=def_mirror.domain, file=mver(filename) )}}">
|
||||
<span class = "name">Intel (x86-64)</span><br/>
|
||||
<span class = "name">{{ mver(filename) }}</span><br/>
|
||||
<span class="mirror">{{ _('Mirror:') }} <img src="{{ url_for('static', filename='images/flags/'+def_mirror.country+'.png') }}" /> {{ def_mirror.org }}</span>
|
||||
</a>
|
||||
@ -56,44 +58,12 @@ that are familiar and built-into the operating system.
|
||||
<code>{{ hash }}</code>
|
||||
</div>
|
||||
</div>
|
||||
{% endcall %}
|
||||
|
||||
{% call package_outer('osx', name, icon) %}
|
||||
<div class = "file">
|
||||
<a class = "default" href="{{ url_for('downloads_redirect', version=mver(), net=def_mirror.net, protocol=def_mirror.protocol, domain=def_mirror.domain, file=mver(filename_arm64) )}}">
|
||||
<span class = "name">Apple Silicon (arm64) BETA</span><br/>
|
||||
<span class = "name">{{ mver(filename_arm64) }}</span><br/>
|
||||
<span class="mirror">{{ _('Mirror:') }} <img src="{{ url_for('static', filename='images/flags/'+def_mirror.country+'.png') }}" /> {{ def_mirror.org }}</span>
|
||||
</a>
|
||||
<a class="mirrors" href="{{ get_url('downloads_select', version=mver(), file=mver(filename_arm64)) }}">{{ _('select alternate mirror') }}</a>
|
||||
</div>
|
||||
<div class="meta">
|
||||
<div class="hash">
|
||||
<code>{{ hash_arm64 }}</code>
|
||||
</div>
|
||||
</div>
|
||||
{% endcall %}
|
||||
|
||||
<h2>{{ _('Instructions') }}</h2>
|
||||
<p>{% trans -%}
|
||||
Download the appropriate file for your Mac hardware and double-click on it. Accept the License Agreement, then
|
||||
<p>{% trans -%}
|
||||
Download that file and double-click on it. Accept the License Agreement, then
|
||||
drag the <code>I2P</code> icon on top of the <code>Applications</code> icon.
|
||||
Launch I2P from Finder.
|
||||
{%- endtrans %}</p>
|
||||
|
||||
<h3>{{ _('Apple Silicon Notes') }}</h3>
|
||||
<p>{% trans -%}
|
||||
The I2P bundle for Apple silicon is currently in BETA. If you own an Apple silicon Mac and have previously installed the Intel bundle on it you need to change the update configuration to make sure the next I2P update does not revert your bundle to Intel.
|
||||
{%- endtrans %}</p>
|
||||
|
||||
<p>{% trans -%}
|
||||
Go to the "Configure Update" page, usually located at:
|
||||
{%- endtrans %}</p>
|
||||
<code>http://127.0.0.1:7657/configupdate</code>
|
||||
<p>{% trans -%}
|
||||
Then copy-paste the following in the "News URL" field:
|
||||
{%- endtrans %}</p>
|
||||
<code>http://tc73n4kivdroccekirco7rhgxdg5f3cjvbaapabupeyzrqwv5guq.b32.i2p/mac-arm64/stable/news.su3</code>
|
||||
{%- endtrans %}</p>
|
||||
{% endcall %}
|
||||
|
||||
<h2>{{ _('Limitations') }}</h2>
|
||||
<p>{% trans -%}
|
||||
|
@ -1,14 +1,14 @@
|
||||
{% set i2pinstall_windows_hash = 'fdb2e471fadfda33589697536180df966ec165ab59a0d9c8a623491cc2c8eae3' %}
|
||||
{% set i2pinstall_jar_hash = '124a1d917dec1f75dc17b5a062704d5abe259b874655c595a9d8f5fd9494eafd' %}
|
||||
{% set i2psource_hash = '57f61815098c35593d7ede305f98b9015c4c613c72231ad084e6806a3e2aa371' %}
|
||||
{% set i2pupdate_hash = '31b8798c7fa75242ed09f671028b85e6acc9d5d9d0a132138debf4cdfbb08f21' %}
|
||||
{% set i2p_android_hash = '84dcdc33e1fb2f49040083c6449bf644cdf9eff3d55018904972d3748ad19457' %}
|
||||
{% set i2pinstall_windows_hash = '738b7608d7f2c6433dcde8a1cbd7ea025d281e90b45c8695385004625a4c88d1' %}
|
||||
{% set i2pinstall_jar_hash = 'ee49cad06fd73e75ed25eaab342f8167e447b901205ee8593a31b5a599d892af' %}
|
||||
{% set i2psource_hash = '525f2ad3267f130b81296b3dd24102fdcf2adf098d54272da4e1be4abd87df04' %}
|
||||
{% set i2pupdate_hash = '3379fe757eecbf20688ee37685fe52f15ac04fd59e891c6a059a33d519c4ff19' %}
|
||||
{% set i2p_android_hash = '0e6196e601b99455d03bca190f6df10d68ef1337f023edcad9ec8953362795a7' %}
|
||||
{% set i2p_macnative_hash = '18cb22cfcc3cbe0cec150e89a394d1a35703cb508ed627ef48084b7ba7c90dde' %}
|
||||
|
||||
{% set i2p_windows_subver = '' %}
|
||||
{% set i2p_macosx_launcher_version = '1.9.0' %}
|
||||
{% set i2p_macosx_launcher_version = '1.8.0' %}
|
||||
|
||||
{% set i2p_android_version = '1.9.0' %}
|
||||
{% set i2p_android_version = '1.8.0' %}
|
||||
{% set i2p_android_version_kytv = '0.9.22' %}
|
||||
{% set i2p_android_version_fdroid = '0.9.50' %}
|
||||
|
||||
|
@ -1,9 +1,9 @@
|
||||
{"net": "clearnet", "protocol": "https", "domain": "files.i2p-projekt.de", "path": "/%(version)s/%(file)s", "org": "i2p-projekt", "country": "de"}
|
||||
{"net": "clearnet", "protocol": "https", "domain": "download.i2p2.no", "path": "/releases/%(version)s/%(file)s", "org": "sigterm.no", "country": "no"}
|
||||
{"net": "clearnet", "protocol": "https", "domain": "download.i2p2.de", "path": "/releases/%(version)s/%(file)s", "org": "sigterm.no", "country": "no"}
|
||||
#{"net": "clearnet", "protocol": "https", "domain": "launchpad.net", "path": "/i2p/trunk/%(version)s/+download/%(file)s", "org": "Launchpad", "org_url": "https://launchpad.net", "country": "us"}
|
||||
{"net": "i2p", "protocol": "http", "domain": "mgp6yzdxeoqds3wucnbhfrdgpjjyqbiqjdwcfezpul3or7bzm4ga.b32.i2p", "path": "/%(version)s/%(file)s", "org": "idk.i2p"}
|
||||
{"net": "clearnet", "protocol": "http", "domain": "download.i2p2.de", "path": "/releases/%(version)s/%(file)s", "org": "sigterm.no", "country": "no"}
|
||||
{"net": "clearnet", "protocol": "http", "domain": "download.i2p2.no", "path": "/releases/%(version)s/%(file)s", "org": "sigterm.no", "country": "no"}
|
||||
{"net": "clearnet", "protocol": "https", "domain": "eyedeekay.github.io", "path": "/files/releases/%(version)s/%(file)s", "org": "idk.i2p"}
|
||||
#{"net": "clearnet", "protocol": "https", "domain": "dl.dropboxusercontent.com", "path": "/u/18621288/I2P/%(version)s/%(file)s", "org": "Dropbox", "country": "us"}
|
||||
#{"net": "clearnet", "protocol": "https", "domain": "googledrive.com", "path": "/host/0B4jHEq5G7_EPWV9UeERwdGplZXc/%(version)s/%(file)s", "org": "Google Drive", "country": "us"}
|
||||
|
@ -132,9 +132,7 @@
|
||||
<ul>
|
||||
<li><a href="{{ site_url('docs/transport') }}"><div class="menuitem"><span>{{ _('Transport layer overview') }}</span></div></a></li>
|
||||
<li><a href="{{ site_url('docs/transport/ntcp') }}"><div class="menuitem"><span>NTCP</span></div></a></li>
|
||||
<li><a href="/spec/ntcp2"><div class="menuitem"><span>NTCP2</span></div></a></li>
|
||||
<li><a href="{{ site_url('docs/transport/ssu') }}"><div class="menuitem"><span>SSU</span></div></a></li>
|
||||
<li><a href="/spec/proposals/159-ssu2"><div class="menuitem"><span>SSU2(Proposal 159)</span></div></a></li>
|
||||
</ul>
|
||||
</li>
|
||||
<li class="has-sub"><div class="menuitem"><span>{{ _('Tunnels') }}</span></div>
|
||||
|
@ -33,7 +33,7 @@ GPG Key fingerprint: <tt>EA27 06D6 14F5 28DB 764B F47E CFCD C461 75E6 694A</tt>
|
||||
<ul>
|
||||
<li><a href="https://mastodon.social/@i2p">Mastodon - https://mastodon.social/@i2p</a></li>
|
||||
<li><a href="https://twitter.com/GetI2P">Twitter - https://twitter.com/GetI2P</a></li>
|
||||
<li><a href="https://old.reddit.com/r/i2p">Reddit - https://old.reddit.com/r/i2p</a></li>
|
||||
<li><a href="https://old.reddit.com/i2p">Reddit - https://old.reddit.com/i2p</a></li>
|
||||
</ul>
|
||||
{%- endtrans %}</p>
|
||||
|
||||
@ -107,7 +107,7 @@ GPG Key fingerprint: <tt>EA27 06D6 14F5 28DB 764B F47E CFCD C461 75E6 694A</tt>
|
||||
</tr>
|
||||
<tr>
|
||||
<td valign="top"><b>{{ _('Download mirrors admin') }}</b></td>
|
||||
<td valign="top">idk</td>
|
||||
<td valign="top">idk, Meeh</td>
|
||||
<td valign="top"><i>{{ _('manage the mirrors for the download files') }}</i></td>
|
||||
</tr>
|
||||
<tr>
|
||||
@ -132,7 +132,7 @@ GPG Key fingerprint: <tt>EA27 06D6 14F5 28DB 764B F47E CFCD C461 75E6 694A</tt>
|
||||
</tr>
|
||||
<tr>
|
||||
<td valign="top"><b>{{ _('Packager; OSX') }}</b></td>
|
||||
<td valign="top">zlatinb</td>
|
||||
<td valign="top">Meeh</td>
|
||||
<td valign="top"><i>{{ _('OSX installer packager') }}</i></td>
|
||||
</tr>
|
||||
<tr>
|
||||
@ -170,6 +170,11 @@ GPG Key fingerprint: <tt>EA27 06D6 14F5 28DB 764B F47E CFCD C461 75E6 694A</tt>
|
||||
<td valign="top">idk</td>
|
||||
<td valign="top"><i>{{ _('Manage the project bug tracker') }}</i></td>
|
||||
</tr>
|
||||
<tr>
|
||||
<td valign="top"><b><a href="https://trac.i2p2.de/">Trac</a>backup webserver admin</b></td>
|
||||
<td valign="top">Meeh</td>
|
||||
<td valign="top"><i>{{ _('manage the public project webservers') }}</i></td>
|
||||
</tr>
|
||||
<tr>
|
||||
<td valign="top"><b>{{ _('Translation admins') }}</b></td>
|
||||
<td valign="top">eche|on, zzz, idk, Sadie</td>
|
||||
@ -217,7 +222,7 @@ GPG Key fingerprint: <tt>EA27 06D6 14F5 28DB 764B F47E CFCD C461 75E6 694A</tt>
|
||||
</tr>
|
||||
<tr>
|
||||
<td valign="top"><b>Google Play admin</b></td>
|
||||
<td valign="top">idk</td>
|
||||
<td valign="top">idk, meeh</td>
|
||||
<td valign="top"><i></i></td>
|
||||
</tr>
|
||||
<tr>
|
||||
@ -227,7 +232,7 @@ GPG Key fingerprint: <tt>EA27 06D6 14F5 28DB 764B F47E CFCD C461 75E6 694A</tt>
|
||||
</tr>
|
||||
<tr>
|
||||
<td valign="top"><b>Outproxy admin</b></td>
|
||||
<td valign="top">StormyCloud</td>
|
||||
<td valign="top">Meeh</td>
|
||||
<td valign="top"><i></i></td>
|
||||
</tr>
|
||||
<tr>
|
||||
|
@ -1,27 +1,20 @@
|
||||
{% extends "global/layout.html" %}
|
||||
{% block title %}{{ _('BOB - Basic Open Bridge') }}{% endblock %}
|
||||
{% block lastupdated %}2022-06{% endblock %}
|
||||
{% block lastupdated %}2020-08{% endblock %}
|
||||
{% block content %}
|
||||
<h2>Warning - Deprecated</h2>
|
||||
<p>Not for use by new applications.
|
||||
BOB supports the DSA-SHA1 signature type only.
|
||||
BOB will not be extended to support new signature types or other advanced features.
|
||||
New applications should use <a href="{{ site_url('docs/api/samv3') }}">SAM V3</a>.
|
||||
</p><p>
|
||||
BOB is not supported in Java I2P new installs as of release 1.7.0 (2022-02).
|
||||
It will still work in Java I2P originally installed as version 1.6.1 or earlier,
|
||||
even after updates, but it is unsupported and may break at any time.
|
||||
BOB is still supported by i2pd as of 2022-06, but applications
|
||||
should still migrate to SAMv3 for the reasons above.
|
||||
</p>
|
||||
|
||||
<p>
|
||||
<p>{% trans -%}
|
||||
At this point, most of the good ideas from BOB have been incorporated into
|
||||
SAMv3, which has more features and more real-world use. BOB may still work
|
||||
on some installations (see above), but it
|
||||
SAMv3, which has more features and more real-world use. BOB still works, but it
|
||||
is not gaining the advanced features available to SAMv3 and is essentially
|
||||
unsupported, except by i2pd.
|
||||
</p>
|
||||
unsupported at this time.
|
||||
{%- endtrans %}</p>
|
||||
|
||||
<h2>Language libraries for the BOB API</h2>
|
||||
<ul>
|
||||
|
@ -1,7 +1,7 @@
|
||||
{% extends "global/layout.html" %}
|
||||
{% block title %}I2PTunnel{% endblock %}
|
||||
{% block lastupdated %}2022-09{% endblock %}
|
||||
{% block accuratefor %}1.9.0{% endblock %}
|
||||
{% block lastupdated %}January 2016{% endblock %}
|
||||
{% block accuratefor %}0.9.24{% endblock %}
|
||||
{% block content %}
|
||||
|
||||
<h2 id="overview">{% trans %}Overview{% endtrans %}</h2>
|
||||
@ -35,9 +35,10 @@ A HTTP proxy used for browsing I2P and the regular internet anonymously through
|
||||
Browsing internet through I2P uses a random proxy specified by the "Outproxies:" option.
|
||||
{%- endtrans %}</li>
|
||||
<li><b>Irc2P</b> - <i>localhost:6668</i> - {% trans %}An IRC tunnel to the default anonymous IRC network, Irc2P.{% endtrans %}</li>
|
||||
<li><b>gitssh.idk.i2p</b> - <i>localhost:7670</i> -
|
||||
SSH access to the project Git repository
|
||||
</li>
|
||||
<li><b>mtn.i2p2.i2p</b> - <i>localhost:8998</i> - {% trans monotone='http://en.wikipedia.org/wiki/Monotone_%28software%29' -%}
|
||||
The anonymous <a href="{{ monotone }}">monotone</a>
|
||||
sourcecode repository for I2P
|
||||
{%- endtrans %}</li>
|
||||
<li><b>smtp.postman.i2p</b> - <i>localhost:7659</i> - {% trans postman=i2pconv('hq.postman.i2p') -%}
|
||||
A SMTP service provided by postman at <a href="http://{{ postman }}/?page_id=16">{{ postman }}</a>
|
||||
{%- endtrans %}</li>
|
||||
@ -72,50 +73,6 @@ in a HTTP request. Supports proxying onto internet if an outproxy is provided. S
|
||||
<li><b>From:</b></li>
|
||||
</ul>
|
||||
|
||||
<p>
|
||||
The HTTP client proxy provides a number of services to protect the user
|
||||
and to provide a better user experience.
|
||||
</p>
|
||||
|
||||
<ul><li>Request header processing:
|
||||
<ul><li>Strip privacy-problematic headers
|
||||
<li>Routing to local or remote outproxy
|
||||
<li>Outproxy selection, caching, and reachability tracking
|
||||
<li>Hostname to destination lookups
|
||||
<li>Host header replacement to b32
|
||||
<li>Add header to indicate support for transparent decompression
|
||||
<li>Force connection: close
|
||||
<li>RFC-compliant proxy support
|
||||
<li>RFC-compliant hop-by-hop header processing and stripping
|
||||
<li>Optional digest and basic username/password authentication
|
||||
<li>Optional outproxy digest and basic username/password authentication
|
||||
<li>Buffering of all headers before passing through for efficiency
|
||||
<li>Jump server links
|
||||
<li>Jump response processing and forms (address helper)
|
||||
<li>Blinded b32 processing and credential forms
|
||||
<li>Supports standard HTTP and HTTPS (CONNECT) requests
|
||||
</ul>
|
||||
|
||||
<li>Response header processing:
|
||||
<ul><li>Check for whether to decompress response
|
||||
<li>Force connection: close
|
||||
<li>RFC-compliant hop-by-hop header processing and stripping
|
||||
<li>Buffering of all headers before passing through for efficiency
|
||||
</ul>
|
||||
|
||||
<li>HTTP error responses:
|
||||
<ul><li>For many common and not-so-common errors, so the user knows what happened
|
||||
<li>Over 20 unique translated, styled, and formatted error pages for various errors
|
||||
<li>Internal web server to serve forms, CSS, images, and errors
|
||||
</ul>
|
||||
|
||||
<li>Transparent response decompression:
|
||||
<ul><li>If the server-side HTTP proxy compressed the response,
|
||||
the HTTP client proxy transparently decompresses it.
|
||||
</ul>
|
||||
</ul>
|
||||
|
||||
|
||||
<p>
|
||||
The i2ptunnel compression is requested with the HTTP header:
|
||||
</p>
|
||||
@ -134,7 +91,7 @@ The response indicating i2ptunnel compression contains the following HTTP header
|
||||
Depending on if the tunnel is using an outproxy or not it will append the following User-Agent:
|
||||
{%- endtrans %}</p>
|
||||
<ul>
|
||||
<li><i>{% trans %}Outproxy:{% endtrans %} </i><b>User-Agent:</b> Uses the user agent from a recent Firefox release on Windows</li>
|
||||
<li><i>{% trans %}Outproxy:{% endtrans %} </i><b>User-Agent:</b> Mozilla/5.0 (Windows; U; Windows NT 5.1; en-US; rv:1.9.2.6) Gecko/20100625 Firefox/3.6.6</li>
|
||||
<li><i>{% trans %}Internal I2P use:{% endtrans %} </i><b>User-Agent:</b> MYOB/6.66 (AN/ON)</li>
|
||||
</ul>
|
||||
</p>
|
||||
@ -144,8 +101,8 @@ Depending on if the tunnel is using an outproxy or not it will append the follow
|
||||
Creates a connection to a random IRC server specified by the comma seprated (", ")
|
||||
list of destinations. Only a whitelisted subset of IRC commands are allowed due to anonymity concerns.
|
||||
{%- endtrans %}
|
||||
The following allow list is for commands inbound from the IRC server to the IRC client.
|
||||
<br>Allow list:</p>
|
||||
The following whitelist is for commands inbound from the IRC server to the IRC client.
|
||||
<br>{% trans %}Whitelist:{% endtrans %}</p>
|
||||
<ul>
|
||||
<li>AUTHENTICATE</li>
|
||||
<li>CAP</li>
|
||||
@ -216,51 +173,7 @@ Creates a destination to a local HTTP server ip:port. Supports gzip for requests
|
||||
Accept-encoding: x-i2p-gzip, replies with Content-encoding: x-i2p-gzip in such a request.
|
||||
{%- endtrans %}</p>
|
||||
|
||||
<p>
|
||||
The HTTP server proxy provides a number of services to make hosting a website easier and more secure,
|
||||
and to provide a better user experience on the client side.
|
||||
</p>
|
||||
|
||||
<ul><li>Request header processing:
|
||||
<ul><li>Header validation
|
||||
<li>Header spoof protection
|
||||
<li>Header size checks
|
||||
<li>Optional inproxy and user-agent rejection
|
||||
<li>Add X-I2P headers so the webserver knows where the request came from
|
||||
<li>Host header replacement to make webserver vhosts easier
|
||||
<li>Force connection: close
|
||||
<li>RFC-compliant hop-by-hop header processing and stripping
|
||||
<li>Buffering of all headers before passing through for efficiency
|
||||
</ul>
|
||||
|
||||
<li>DDoS protection:
|
||||
<ul><li>POST throttling
|
||||
<li>Timeouts and slowloris protection
|
||||
<li>Additional throttling happens in streaming for all tunnel types
|
||||
</ul>
|
||||
|
||||
<li>Response header processing:
|
||||
<ul><li>Stripping of some privacy-problematic headers
|
||||
<li>Mime type and other headers check for whether to compress response
|
||||
<li>Force connection: close
|
||||
<li>RFC-compliant hop-by-hop header processing and stripping
|
||||
<li>Buffering of all headers before passing through for efficiency
|
||||
</ul>
|
||||
|
||||
<li>HTTP error responses:
|
||||
<ul><li>For many common and not-so-common errors and on throttling, so the client-side user knows what happened
|
||||
</ul>
|
||||
|
||||
<li>Transparent response compression:
|
||||
<ul><li>The web server and/or the I2CP layer may compress, but the web server often does not,
|
||||
and it's most efficient to compress at a high layer, even if I2CP also compresses.
|
||||
The HTTP server proxy works cooperatively with the client-side proxy to transparently compress responses.
|
||||
</ul>
|
||||
</ul>
|
||||
|
||||
|
||||
<h3 id="server-mode-http-bidir">HTTP Bidirectional</h3>
|
||||
<p><i>Deprecated</i></p>
|
||||
<p>{% trans -%}
|
||||
Functions as both a I2PTunnel HTTP Server, and a I2PTunnel HTTP client with no outproxying
|
||||
capabilities. An example application would be a web application that does client-type
|
||||
|
@ -1,7 +1,7 @@
|
||||
{% extends "global/layout.html" %}
|
||||
{% block title %}SAM V3{% endblock %}
|
||||
{% block lastupdated %}2022-09{% endblock %}
|
||||
{% block accuratefor %}1.9.0{% endblock %}
|
||||
{% block lastupdated %}2022-06{% endblock %}
|
||||
{% block accuratefor %}1.8.0{% endblock %}
|
||||
{% block content %}
|
||||
<p>SAM is a simple client protocol for interacting with I2P.
|
||||
SAM is the recommended protocol for non-Java applications to connect to the I2P network,
|
||||
@ -164,15 +164,6 @@ Deprecated versions:
|
||||
<td><a href="https://github.com/eyedeekay/Jsam">github.com/eyedeekay/Jsam</a></td>
|
||||
</tr>
|
||||
<tr class="even">
|
||||
<td>I2PSharp</td>
|
||||
<td>.Net</td>
|
||||
<td>3.3</td>
|
||||
<td>yes</td>
|
||||
<td>no</td>
|
||||
<td>no</td>
|
||||
<td><a href="https://github.com/MohA39/I2PSharp">github.com/MohA39/I2PSharp</a></td>
|
||||
</tr>
|
||||
<tr class="odd">
|
||||
<td>i2pdotnet</td>
|
||||
<td>.Net</td>
|
||||
<td>3.0</td>
|
||||
@ -181,7 +172,7 @@ Deprecated versions:
|
||||
<td>unk</td>
|
||||
<td><a href="https://github.com/SamuelFisher/i2pdotnet">github.com/SamuelFisher/i2pdotnet</a></td>
|
||||
</tr>
|
||||
<tr class="even">
|
||||
<tr class="odd">
|
||||
<td>i2p.rb</td>
|
||||
<td>Ruby</td>
|
||||
<td>3.0</td>
|
||||
@ -190,7 +181,7 @@ Deprecated versions:
|
||||
<td>no</td>
|
||||
<td><a href="https://github.com/dryruby/i2p.rb">github.com/dryruby/i2p.rb</a></td>
|
||||
</tr>
|
||||
<tr class="odd">
|
||||
<tr class="even">
|
||||
<td>solitude</td>
|
||||
<td>Rust</td>
|
||||
<td>3.1</td>
|
||||
@ -199,7 +190,7 @@ Deprecated versions:
|
||||
<td>WIP</td>
|
||||
<td><a href="https://github.com/syvita/solitude">github.com/syvita/solitude</a></td>
|
||||
</tr>
|
||||
<tr class="even">
|
||||
<tr class="odd">
|
||||
<td>i2pSAM-Qt</td>
|
||||
<td>C++</td>
|
||||
<td>3.1</td>
|
||||
@ -539,8 +530,6 @@ received through other forms are answered with an error message) :
|
||||
[TO_PORT=nnn] # SAM 3.2 or higher only, default 0
|
||||
[PROTOCOL=nnn] # SAM 3.2 or higher only, for STYLE=RAW only, default 18
|
||||
[HEADER={true,false}] # SAM 3.2 or higher only, for STYLE=RAW only, default false
|
||||
[sam.udp.host=hostname] # Datagram bind host, Java I2P only, DATAGRAM/RAW only, default 127.0.0.1
|
||||
[sam.udp.port=nnn] # Datagram bind port, Java I2P only, DATAGRAM/RAW only, default 7655
|
||||
[option=value]* # I2CP and streaming options
|
||||
</pre>
|
||||
|
||||
@ -992,7 +981,7 @@ Reliability is inversely proportional to message size, perhaps even exponentiall
|
||||
|
||||
</p><p>
|
||||
After establishing a SAM session with STYLE=DATAGRAM or STYLE=RAW, the client can
|
||||
send repliable or raw datagrams through SAM's UDP port (7655 by default).
|
||||
send repliable or raw datagrams through SAM's UDP port (7655).
|
||||
|
||||
</p><p>
|
||||
The first line of a datagram sent through this port must be in the
|
||||
@ -1099,8 +1088,6 @@ CREATE command with PORT and HOST options:
|
||||
[FROM_PORT=nnn] # SAM 3.2 or higher only, default 0
|
||||
[TO_PORT=nnn] # SAM 3.2 or higher only, default 0
|
||||
[PROTOCOL=nnn] # SAM 3.2 or higher only, for STYLE=RAW only, default 18
|
||||
[sam.udp.host=hostname] # Datagram bind host, Java I2P only, default 127.0.0.1
|
||||
[sam.udp.port=nnn] # Datagram bind port, Java I2P only, default 7655
|
||||
[option=value]* # I2CP options
|
||||
</pre>
|
||||
|
||||
@ -1317,8 +1304,6 @@ for DHT communication.
|
||||
STYLE=PRIMARY # prior to 0.9.47, use STYLE=MASTER
|
||||
ID=$nickname
|
||||
DESTINATION={$privkey,TRANSIENT}
|
||||
[sam.udp.host=hostname] # Datagram bind host, Java I2P only, default 127.0.0.1
|
||||
[sam.udp.port=nnn] # Datagram bind port, Java I2P only, default 7655
|
||||
[option=value]* # I2CP and streaming options
|
||||
</pre>
|
||||
|
||||
@ -1363,8 +1348,6 @@ Using the same control socket on which the PRIMARY session was created:
|
||||
[LISTEN_PROTOCOL=nnn] # For inbound traffic for STYLE=RAW only.
|
||||
# Default is the PROTOCOL value; 6 (streaming) is disallowed
|
||||
[HEADER={true,false}] # For STYLE=RAW only, default false
|
||||
[sam.udp.host=hostname] # Datagram bind host, Java I2P only, DATAGRAM/RAW only, default 127.0.0.1
|
||||
[sam.udp.port=nnn] # Datagram bind port, Java I2P only, DATAGRAM/RAW only, default 7655
|
||||
[option=value]* # I2CP and streaming options
|
||||
</pre>
|
||||
|
||||
@ -1657,13 +1640,11 @@ The default SAM port is 7656. SAM is not enabled by default in the Java I2P Rout
|
||||
it must be started manually, or configured to start automatically,
|
||||
on the configure clients page in the router console, or in the clients.config file.
|
||||
The default SAM UDP port is 7655, listening on 127.0.0.1.
|
||||
These may be changed in the Java router by adding the arguments sam.udp.port=nnnnn and/or
|
||||
sam.udp.host=w.x.y.z to the invocation, or on the SESSION line.
|
||||
These may be changed by adding the arguments sam.udp.port=nnnnn and/or
|
||||
sam.udp.host=w.x.y.z to the invocation.
|
||||
|
||||
</p><p>
|
||||
Configuration in other routers is implementation-specific.
|
||||
See <a href="https://i2pd.readthedocs.io/en/latest/user-guide/configuration/">the i2pd configuration guide here</a>.
|
||||
|
||||
|
||||
</p>
|
||||
{% endblock %}
|
||||
|
@ -1,7 +1,7 @@
|
||||
{% extends "global/layout.html" %}
|
||||
{% block title %}{% trans %}Index to Technical Documentation{% endtrans %}{% endblock %}
|
||||
{% block lastupdated %}2022-08{% endblock %}
|
||||
{% block accuratefor %}0.9.55{% endblock %}
|
||||
{% block lastupdated %}2022-04{% endblock %}
|
||||
{% block accuratefor %}0.9.53{% endblock %}
|
||||
{% block content %}
|
||||
<p>{% trans -%}
|
||||
Following is an index to the technical documentation for I2P.
|
||||
@ -15,10 +15,6 @@ The interface between applications and the router is the I2CP (I2P Control
|
||||
Protocol) API.
|
||||
{%- endtrans %}</p>
|
||||
|
||||
The specifications linked below are currently supported in the network.
|
||||
See the <a href="{{ site_url('spec/proposals') }}">{{ _('Proposals') }}</a> page for
|
||||
specifications in discussion or development.
|
||||
|
||||
<p>{% trans trac='https://i2pgit.org/i2p-hackers/i2p.www/issues' -%}
|
||||
The I2P Project is committed to maintaining accurate, current documentation.
|
||||
If you find any inaccuracies in the documents linked below, please
|
||||
@ -78,13 +74,13 @@ Streamr Proxy
|
||||
</li><li>
|
||||
HTTP Bidir Proxy
|
||||
</li><li>
|
||||
<a href="{{ site_url('docs/api/sam') }}">{{ _('SAM Protocol') }}</a> (Deprecated)
|
||||
<a href="{{ site_url('docs/api/sam') }}">{{ _('SAM Protocol') }}</a>
|
||||
</li><li>
|
||||
<a href="{{ site_url('docs/api/samv2') }}">{{ _('SAMv2 Protocol') }}</a> (Deprecated)
|
||||
<a href="{{ site_url('docs/api/samv2') }}">{{ _('SAMv2 Protocol') }}</a>
|
||||
</li><li>
|
||||
<a href="{{ site_url('docs/api/samv3') }}">{{ _('SAMv3 Protocol') }}</a>
|
||||
</li><li>
|
||||
<a href="{{ site_url('docs/api/bob') }}">{{ _('BOB Protocol') }}</a> (Deprecated)
|
||||
<a href="{{ site_url('docs/api/bob') }}">{{ _('BOB Protocol') }}</a>
|
||||
</li></ul>
|
||||
|
||||
<h3>{% trans %}End-to-End Transport API and Protocols{% endtrans %}</h3>
|
||||
@ -184,8 +180,6 @@ Traditionally used only by Java applications and higher-level APIs.
|
||||
</li><li>
|
||||
<a href="{{ spec_url('ssu') }}">{{ _('SSU specification') }}</a>
|
||||
</li><li>
|
||||
<a href="{{ spec_url('ssu2') }}">{{ _('SSU2 specification') }}</a>
|
||||
</li><li>
|
||||
<a href="{{ site_url('docs/how/cryptography') }}#tcp">{{ _('NTCP transport encryption') }}</a>
|
||||
</li><li>
|
||||
<a href="{{ site_url('docs/how/cryptography') }}#udp">{{ _('SSU transport encryption') }}</a>
|
||||
|
@ -1,7 +1,7 @@
|
||||
{% extends "global/layout.html" %}
|
||||
{% block title %}{% trans %}Ports Used by I2P{% endtrans %}{% endblock %}
|
||||
{% block lastupdated %}2022-08{% endblock %}
|
||||
{% block accuratefor %}0.9.55{% endblock %}
|
||||
{% block lastupdated %}2020-06{% endblock %}
|
||||
{% block accuratefor %}0.9.46{% endblock %}
|
||||
{% block content %}
|
||||
|
||||
<p>{% trans -%}
|
||||
@ -46,7 +46,7 @@ in the 767x range.
|
||||
<tr><td>7657</td><td>Router Console</td></tr>
|
||||
<tr><td>7658</td><td>I2P Site</td></tr>
|
||||
<tr><td>7659</td><td>SMTP Proxy</td></tr>
|
||||
<tr><td>7660</td><td>POP3 Proxy</td></tr>
|
||||
<tr><td>7660</td><td>POP Proxy</td></tr>
|
||||
<tr><td>7661</td><td>Pebble Plugin</td></tr>
|
||||
<tr><td>7661</td><td>I2PBote Plugin SMTP</td></tr>
|
||||
<tr><td>7662</td><td>Zzzot Plugin</td></tr>
|
||||
@ -58,7 +58,6 @@ in the 767x range.
|
||||
<tr><td>7669</td><td>Garlic Farm</td></tr>
|
||||
<tr><td>7670</td><td>Git SSH</td></tr>
|
||||
<tr><td></td><td><i>{% trans %}recommended spot for new plugins/applications{% endtrans %}</i></td></tr>
|
||||
<tr><td>7680</td><td>don't use - Windows Delivery Optimization</td></tr>
|
||||
<tr><td>8002</td><td>I2PSnark (standalone install only)</td></tr>
|
||||
<tr><td>8003</td><td>I2PSnark SSL (standalone install only)</td></tr>
|
||||
<tr><td>8118</td><td>Privoxy (reserve)</td></tr>
|
||||
|
@ -1,6 +1,6 @@
|
||||
{% extends "global/layout.html" %}
|
||||
{% block title %}{% trans %}Secure Semireliable UDP{% endtrans %} (SSU){% endblock %}
|
||||
{% block lastupdated %}2022-07{% endblock %}
|
||||
{% block lastupdated %}2022-06{% endblock %}
|
||||
{% block accuratefor %}0.9.54{% endblock %}
|
||||
{% block content %}
|
||||
|
||||
@ -534,8 +534,8 @@ When Bob receives a request from Alice via IPv6, Bob must select a Charlie that
|
||||
The actual Bob-Charlie communication may be via IPv4 or IPv6 (i.e., independent of Alice's address type).
|
||||
</p><p>
|
||||
As of release 0.9.50,
|
||||
If the message is over IPv6 for an IPv4 peer test,
|
||||
or (as of release 0.9.50) over IPv4 for an IPv6 peer test,
|
||||
If the message is over IPv6 for an IPv4 introduction,
|
||||
or (as of release 0.9.50) over IPv4 for an IPv6 introduction,
|
||||
Alice must include her introduction address and port.
|
||||
|
||||
See <a href="/spec/proposals/158">Proposal 158</a> for details.
|
||||
|
@ -464,7 +464,7 @@ These are described in detail below.
|
||||
7660
|
||||
</td>
|
||||
<td>
|
||||
Incoming mail from pop3.postman.i2p
|
||||
Outgoing mail to smtp.postman.i2p
|
||||
</td>
|
||||
<td>
|
||||
{% trans -%}May be disabled or changed on the i2ptunnel page in the router console.
|
||||
|
File diff suppressed because it is too large
Load Diff
@ -1,6 +1,6 @@
|
||||
{% extends "global/layout.html" %}
|
||||
{% block title %} {{ _('Roadmap') }}{% endblock %}
|
||||
{% block lastupdated %}2021-08{% endblock %} {% block content %}
|
||||
{% block lastupdated %}2021-03{% endblock %} {% block content %}
|
||||
|
||||
<p>
|
||||
This is the official project roadmap for the desktop and Android Java I2P releases only. Some related tasks for resources such as the website and plugins may be included.
|
||||
@ -152,131 +152,39 @@
|
||||
|
||||
|
||||
<h2 id="1.8.0">1.8.0 (API 0.9.54)</h2>
|
||||
<p><b>Released: May 23, 2022</b></p>
|
||||
<p><b>Target release: May 2022</b></p>
|
||||
<ul>
|
||||
<li>
|
||||
Router family fixes and improvements
|
||||
</li>
|
||||
<li>
|
||||
Soft restart fixes
|
||||
</li>
|
||||
<li>
|
||||
SSU fixes and performance improvements
|
||||
</li>
|
||||
<li>
|
||||
I2PSnark standalond fixes and improvements
|
||||
</li>
|
||||
<li>
|
||||
Avoid Sybil penalty for trusted families
|
||||
</li>
|
||||
<li>
|
||||
Reduce tunnel build reply timeout
|
||||
</li>
|
||||
<li>
|
||||
UPnP fixes
|
||||
</li>
|
||||
<li>
|
||||
Remove BOB source
|
||||
</li>
|
||||
<li>
|
||||
Certificate import fixes
|
||||
</li>
|
||||
<li>
|
||||
Tomcat 9.0.62
|
||||
</li>
|
||||
<li>
|
||||
Refactoring to support SSU2 (proposal 159)
|
||||
</li>
|
||||
<li>
|
||||
Initial implementation of SSU2 base protocol (proposal 159)
|
||||
Continue implementation of SSU2 (proposal 159)
|
||||
</li>
|
||||
<li>
|
||||
SAM authorization popup for Android apps
|
||||
i2psnark UDP tracker support (proposal 160)
|
||||
</li>
|
||||
<li>
|
||||
Improve support for custom directory installs in i2p.firefox
|
||||
</li>
|
||||
</ul>
|
||||
|
||||
|
||||
|
||||
|
||||
<h2 id="1.9.0">1.9.0 (API 0.9.55)</h2>
|
||||
<p><b>Released: August 22, 2022</b></p>
|
||||
<ul>
|
||||
<li>
|
||||
SSU2 peer test and relay implementation
|
||||
</li>
|
||||
<li>
|
||||
SSU2 fixes
|
||||
</li>
|
||||
<li>
|
||||
SSU MTU/PMTU improvements
|
||||
</li>
|
||||
<li>
|
||||
Enable SSU2 for a small portion of routers
|
||||
</li>
|
||||
<li>
|
||||
Add deadlock detector
|
||||
</li>
|
||||
<li>
|
||||
More certificate import fixes
|
||||
</li>
|
||||
<li>
|
||||
Fix i2psnark DHT restart after router restart
|
||||
</li>
|
||||
</ul>
|
||||
|
||||
|
||||
|
||||
|
||||
|
||||
<h2 id="1.10.0">1.10.0 (API 0.9.56)</h2>
|
||||
<p><b>Target release: November 2022</b></p>
|
||||
<ul>
|
||||
<li>
|
||||
SSU2 connection migration
|
||||
</li>
|
||||
<li>
|
||||
Enable SSU2 by default
|
||||
</li>
|
||||
<li>
|
||||
i2psnark UDP tracker support (proposal 160) ?
|
||||
</li>
|
||||
<li>
|
||||
Custom reseed service entry for Android
|
||||
Improved outproxy support?
|
||||
</li>
|
||||
<li>
|
||||
UDP Hidden Service/Client support in Hidden Services Manager
|
||||
</li>
|
||||
<li>
|
||||
SAM authorization popup for Android apps
|
||||
</li>
|
||||
<li>
|
||||
Custom reseed service entry for Android
|
||||
</li>
|
||||
<li>
|
||||
Improve support for custom directory installs in i2p.firefox
|
||||
</li>
|
||||
<li>
|
||||
Automatic reseed servers from .onion URLs
|
||||
</li>
|
||||
<li>
|
||||
VPN-Mode Support in Android for browser configuration
|
||||
</li>
|
||||
<li>
|
||||
Update Android build process to use modern AGP, end need of deprecated Maven plugin in Android build
|
||||
</li>
|
||||
<li>
|
||||
Cross-Platform(Desktop) I2P browser auto-configuration support
|
||||
Yggdrasil support in Go reseed server equivalent to Python version
|
||||
</li>
|
||||
</ul>
|
||||
|
||||
<h2 id="1.11.0">1.11.0 (API 0.9.57)</h2>
|
||||
<p><b>Target release: February 2023</b></p>
|
||||
<ul>
|
||||
<li>
|
||||
TBD
|
||||
</li>
|
||||
</ul>
|
||||
|
||||
|
||||
|
||||
|
||||
|
||||
|
||||
|
||||
|
||||
<h4><a href="roadmap-archive">{% trans %}Looking for older releases? Check the roadmap archive by following this link.{% endtrans %}</a></h4>
|
||||
{% endblock %}
|
||||
|
@ -3,8 +3,8 @@ Configuration File Specification
|
||||
================================
|
||||
.. meta::
|
||||
:category: Formats
|
||||
:lastupdated: September 2022
|
||||
:accuratefor: 0.9.56
|
||||
:lastupdated: March 2020
|
||||
:accuratefor: 0.9.45
|
||||
|
||||
.. contents::
|
||||
|
||||
@ -170,8 +170,6 @@ Properties are as follows::
|
||||
logger.flushInterval=nnn
|
||||
# d = date, c = class, t = thread name, p = priority, m = message
|
||||
logger.format={dctpm}*
|
||||
# As of 0.9.56. Default false
|
||||
logger.gzip=true|false
|
||||
# Max to buffer before flushing. Default 1024
|
||||
logger.logBufferSize=n
|
||||
# Default logs/log-@.txt; @ replaced with number
|
||||
@ -181,8 +179,6 @@ Properties are as follows::
|
||||
logger.logFileSize=nnn[K|M|G]
|
||||
# Highest file number. Default 2
|
||||
logger.logRotationLimit=n
|
||||
# As of 0.9.56. Default 65536 (bytes)
|
||||
logger.minGzipSize=nnnnn
|
||||
# Default CRIT
|
||||
logger.minimumOnScreenLevel=CRIT|ERROR|WARN|INFO|DEBUG
|
||||
logger.record.{class}=CRIT|ERROR|WARN|INFO|DEBUG
|
||||
@ -412,11 +408,7 @@ Properties are as follows::
|
||||
|
||||
# HTTP Clients only. The MD5 of the password for local authorization for
|
||||
# user USER.
|
||||
tunnel.N.option.proxy.auth.USER.md5=(32 char lowercase hex)
|
||||
|
||||
# HTTP Clients only. The SHA-256 of the password for local authorization for
|
||||
# user USER. (RFC 7616) Since 0.9.56
|
||||
tunnel.N.option.proxy.auth.USER.sha256=(64 char lowercase hex)
|
||||
tunnel.N.option.proxy.auth.USER.md5=
|
||||
|
||||
# HTTP Servers only. Whether to reject incoming connections apparently via
|
||||
# an inproxy. Default false.
|
||||
|
File diff suppressed because it is too large
Load Diff
@ -1,25 +0,0 @@
|
||||
======
|
||||
SSU2
|
||||
======
|
||||
.. meta::
|
||||
:category: Transports
|
||||
:lastupdated: 2022-08
|
||||
:accuratefor: 0.9.55
|
||||
|
||||
.. contents::
|
||||
|
||||
|
||||
|
||||
Status
|
||||
========
|
||||
|
||||
Development and testing in progress. See [Prop159]_.
|
||||
|
||||
|
||||
|
||||
|
||||
References
|
||||
==========
|
||||
|
||||
.. [Prop159]
|
||||
{{ proposal_url('159') }}
|
@ -3,8 +3,8 @@ Software Update Specification
|
||||
=============================
|
||||
.. meta::
|
||||
:category: Design
|
||||
:lastupdated: 2022-08
|
||||
:accuratefor: 0.9.55
|
||||
:lastupdated: 2022-02
|
||||
:accuratefor: 0.9.53
|
||||
|
||||
.. contents::
|
||||
|
||||
@ -315,8 +315,9 @@ SU3 Details
|
||||
|
||||
* SU3 Version: The router version
|
||||
|
||||
* Jar and war files in the zip are no longer compressed with pack200 as documented above
|
||||
for "su2" files, because recent Java runtimes no longer support it.
|
||||
* Jar and war files in the zip are compressed with pack200 as documented above
|
||||
for "su2" files. If the client does not support pack200, it must download the
|
||||
update in a "sud" format.
|
||||
|
||||
Notes
|
||||
`````
|
||||
@ -337,7 +338,7 @@ Goals
|
||||
man-in-the-middle attacks that could boot victims into a separate, untrusted
|
||||
network.
|
||||
|
||||
* Use su3 file format already used for updates and plugins
|
||||
* Use su3 file format already used for updates, reseeding, and plugins
|
||||
|
||||
* Single compressed file to speed up reseeding, which was slow to fetch 200 files
|
||||
|
||||
@ -361,8 +362,7 @@ SU3 Details
|
||||
|
||||
* SU3 File Type: 0 (ZIP)
|
||||
|
||||
* SU3 Version: Seconds since the epoch, in ASCII (date +%s).
|
||||
Does NOT roll over in 2038 or 2106.
|
||||
* SU3 Version: Seconds since the epoch, in ASCII (date +%s)
|
||||
|
||||
* Router info files in the zip file must be at the "top level". No directories
|
||||
are in the zip file.
|
||||
@ -386,8 +386,8 @@ SU3 Details
|
||||
|
||||
* SU3 Version: The plugin version, must match that in plugin.config.
|
||||
|
||||
* Jar and war files in the zip should not be compressed with pack200 as documented above
|
||||
for "su2" files, as recent Java runtimes no longer support it.
|
||||
* Jar and war files in the zip are compressed with pack200 as documented above
|
||||
for "su2" files.
|
||||
|
||||
SU3 News File Specification
|
||||
---------------------------
|
||||
@ -415,8 +415,7 @@ SU3 Details
|
||||
|
||||
* SU3 File Type: 1 (XML) or 3 (XML.GZ)
|
||||
|
||||
* SU3 Version: Seconds since the epoch, in ASCII (date +%s).
|
||||
Does NOT roll over in 2038 or 2106.
|
||||
* SU3 Version: Seconds since the epoch, in ASCII (date +%s)
|
||||
|
||||
* File Format: XML or gzipped XML, containing an [RFC-4287]_ (Atom) XML Feed.
|
||||
Charset must be UTF-8.
|
||||
@ -638,8 +637,7 @@ then each unblock entry in the order received with a newline after each.
|
||||
Blocklist File Specification
|
||||
----------------------------
|
||||
|
||||
TBD, unimplemented, see proposal 130.
|
||||
Blocklist updates are delivered in the news file, see above.
|
||||
TBD, unimplemented, see proposal 130
|
||||
|
||||
|
||||
|
||||
|
Binary file not shown.
Before Width: | Height: | Size: 50 KiB |
@ -59,14 +59,13 @@ div.hide {
|
||||
display: none
|
||||
}
|
||||
|
||||
div#topbar .title,
|
||||
div#content>.title {
|
||||
div#topbar .title, div#content > .title {
|
||||
font-family: "URW Gothic L", "Century Gothic", sans-serif;
|
||||
font-size: 2.1875rem;
|
||||
font-weight: bold;
|
||||
color: #363A68;
|
||||
line-height: 41px;
|
||||
vertical-align: middle;
|
||||
line-height:41px;
|
||||
vertical-align:middle;
|
||||
}
|
||||
|
||||
div#topbar {
|
||||
@ -98,7 +97,6 @@ div#content {
|
||||
display: block
|
||||
}
|
||||
|
||||
|
||||
/**
|
||||
* The .main class is for content wrapper on the home page (with the big banner)
|
||||
*/
|
||||
@ -122,18 +120,18 @@ div#content .main h1 {
|
||||
font-family: "URW Gothic L", "Century Gothic", sans-serif;
|
||||
font-size: 2.5em;
|
||||
line-height: 1em;
|
||||
text-shadow: 1px 1px 2px rgba(0, 0, 0, .3);
|
||||
text-shadow: 1px 1px 2px rgba(0,0,0,.3);
|
||||
color: white;
|
||||
margin-bottom: .5em;
|
||||
}
|
||||
|
||||
div#content .main p {
|
||||
color: var(--i2poffwhite);
|
||||
color: var(--i2poffwhite);
|
||||
}
|
||||
|
||||
div#herocredit {
|
||||
text-align: right;
|
||||
font-size: 8px;
|
||||
text-align: right;
|
||||
font-size: 8px;
|
||||
}
|
||||
|
||||
.main .get-i2p {
|
||||
@ -145,12 +143,12 @@ div#herocredit {
|
||||
color: white;
|
||||
font-family: Arial, Helvetica, sans-serif;
|
||||
font-weight: bold;
|
||||
/* text-transform: uppercase;*/
|
||||
/* text-transform: uppercase;*/
|
||||
text-decoration: none;
|
||||
text-align: center;
|
||||
background: #60ab60;
|
||||
border-radius: .3em;
|
||||
text-shadow: 1px 1px 1px rgba(0, 0, 0, .2);
|
||||
text-shadow: 1px 1px 1px rgba(0,0,0,.2);
|
||||
/*box-shadow: 2px 2px 4px rgba(0, 0, 0, 0.3), 1em 3em 2em 0.5em rgba(255, 255, 255, 0.3) inset, inset -.2em -.5em 1em -0em rgba(0,0,0,.3);*/
|
||||
}
|
||||
|
||||
@ -202,7 +200,6 @@ div#content .feed-icon {
|
||||
width: 28px;
|
||||
}
|
||||
|
||||
|
||||
/**
|
||||
* The .inner class is for the content wrapper on inner pages (as opposed to the home page)
|
||||
*/
|
||||
@ -237,8 +234,7 @@ div#content .inner:after {
|
||||
}
|
||||
|
||||
div#content .inner .fluid {
|
||||
background-color: #FFFAF0;
|
||||
/*var(--i2poffwhite);*/
|
||||
background-color: #FFFAF0; /*var(--i2poffwhite);*/
|
||||
}
|
||||
|
||||
div#content .sidebar {
|
||||
@ -354,7 +350,6 @@ div#content .inner .box img {
|
||||
max-width: 100%;
|
||||
}
|
||||
|
||||
|
||||
/*
|
||||
* Download page
|
||||
*/
|
||||
@ -384,10 +379,10 @@ div#content .inner .box img {
|
||||
margin-bottom: 10px
|
||||
}
|
||||
|
||||
.file>a,
|
||||
.file > a,
|
||||
.filedownload {
|
||||
padding: 5px;
|
||||
background-color: rgba(255, 255, 255, 0.2);
|
||||
background-color: rgba(255,255,255,0.2);
|
||||
/*box-shadow: -1px -1px 1px 1px rgb(51, 51, 51) inset;*/
|
||||
text-align: center;
|
||||
}
|
||||
@ -400,7 +395,7 @@ div#content .inner .box img {
|
||||
}
|
||||
|
||||
.file:hover .default:hover .sig:hover .mirror:hover {
|
||||
box-shadow: 2px 2px 2px rgba(0, 0, 0, 0.3), inset 0 -2.2em 2.2em rgba(255, 255, 255, 0.3), inset .2em .5em 1em 0em rgba(0, 0, 0, .3);
|
||||
box-shadow: 2px 2px 2px rgba(0, 0, 0, 0.3), inset 0 -2.2em 2.2em rgba(255, 255, 255, 0.3), inset .2em .5em 1em 0em rgba(0,0,0,.3);
|
||||
}
|
||||
|
||||
html body div.container-fluid div#content main.inner div.fluid article.content-inner div.downloadlist div#android.package div.details div.file a.default {
|
||||
@ -453,11 +448,9 @@ html body div.container-fluid div#content main.inner div.fluid article.content-i
|
||||
text-align: center;
|
||||
}
|
||||
|
||||
|
||||
/*
|
||||
* Lab page
|
||||
*/
|
||||
|
||||
.labproject {
|
||||
border: 3px solid rgba(171, 204, 113, 0.7);
|
||||
border-radius: 5px;
|
||||
@ -465,7 +458,6 @@ html body div.container-fluid div#content main.inner div.fluid article.content-i
|
||||
padding: 5px;
|
||||
}
|
||||
|
||||
|
||||
/*
|
||||
* Threat model
|
||||
*/
|
||||
@ -478,25 +470,18 @@ div#content .inner ul.DREAD {
|
||||
padding: 0.5em;
|
||||
}
|
||||
|
||||
|
||||
/*
|
||||
* Additions to syntax.css
|
||||
*/
|
||||
|
||||
.highlight>pre {
|
||||
white-space: pre-wrap;
|
||||
/* CSS-3 */
|
||||
white-space: -moz-pre-wrap !important;
|
||||
/* Mozilla, since 1999 */
|
||||
white-space: -pre-wrap;
|
||||
/* Opera 4-6 */
|
||||
white-space: -o-pre-wrap;
|
||||
/* Opera 7 */
|
||||
word-wrap: break-word;
|
||||
/* Internet Explorer 5.5+ */
|
||||
.highlight > pre {
|
||||
white-space: pre-wrap; /* CSS-3 */
|
||||
white-space: -moz-pre-wrap !important; /* Mozilla, since 1999 */
|
||||
white-space: -pre-wrap; /* Opera 4-6 */
|
||||
white-space: -o-pre-wrap; /* Opera 7 */
|
||||
word-wrap: break-word; /* Internet Explorer 5.5+ */
|
||||
}
|
||||
|
||||
|
||||
/*
|
||||
* Proposals
|
||||
*/
|
||||
@ -551,7 +536,6 @@ div#content .inner ul.DREAD {
|
||||
width: 100%;
|
||||
}
|
||||
|
||||
|
||||
/*
|
||||
* Blog
|
||||
*/
|
||||
@ -585,7 +569,7 @@ div#content .inner ul.DREAD {
|
||||
text-align: center;
|
||||
}
|
||||
|
||||
#blog-topimg>img {
|
||||
#blog-topimg > img {
|
||||
max-width: 100%;
|
||||
min-width: 50%;
|
||||
}
|
||||
@ -612,18 +596,14 @@ blockquote {
|
||||
}
|
||||
|
||||
#post li img {
|
||||
display: inline-block;
|
||||
margin-right: 50%;
|
||||
display: inline-block;
|
||||
margin-right: 50%;
|
||||
}
|
||||
|
||||
#post .section {
|
||||
overflow: auto;
|
||||
}
|
||||
|
||||
.screenshot {
|
||||
max-width: 95% !important;
|
||||
}
|
||||
|
||||
#post .screenshot img {
|
||||
max-width: 95% !important;
|
||||
min-height: unset;
|
||||
@ -639,7 +619,7 @@ blockquote {
|
||||
padding: 5px;
|
||||
}
|
||||
|
||||
.system-messages>h1 {
|
||||
.system-messages > h1 {
|
||||
font-size: 1.2em !important;
|
||||
text-align: left !important;
|
||||
}
|
||||
@ -648,7 +628,6 @@ pre.literal-block {
|
||||
overflow: auto;
|
||||
}
|
||||
|
||||
|
||||
/*
|
||||
Exceptions to the post image rules
|
||||
*/
|
||||
@ -663,7 +642,6 @@ pre.literal-block {
|
||||
float: unset;
|
||||
}
|
||||
|
||||
|
||||
/*
|
||||
* Papers
|
||||
*/
|
||||
@ -678,13 +656,13 @@ pre.literal-block {
|
||||
*/
|
||||
|
||||
.socialfooter {
|
||||
height: 32px;
|
||||
padding-right: 16px;
|
||||
height: 32px;
|
||||
padding-right: 16px;
|
||||
}
|
||||
|
||||
#global-footer {
|
||||
width: auto;
|
||||
/* border-top: 2px solid #4456B7;*/
|
||||
/* border-top: 2px solid #4456B7;*/
|
||||
border-top: 2px solid #FFFAF0;
|
||||
background: #3C468A;
|
||||
font-size: 0.75rem;
|
||||
@ -747,16 +725,14 @@ pre.literal-block {
|
||||
list-style-type: lower-roman;
|
||||
}
|
||||
|
||||
|
||||
/**
|
||||
*
|
||||
* The Browser pages
|
||||
*
|
||||
**/
|
||||
|
||||
.get-i2p-browser {
|
||||
display: block;
|
||||
padding: .5em;
|
||||
display: block;
|
||||
padding: .5em;
|
||||
}
|
||||
|
||||
a.get-i2p-browser:hover {
|
||||
@ -764,69 +740,68 @@ a.get-i2p-browser:hover {
|
||||
}
|
||||
|
||||
.browser-front-wrapper {
|
||||
text-align: center;
|
||||
text-align: center;
|
||||
}
|
||||
|
||||
.browser-front-download {
|
||||
display: inline-block;
|
||||
display: inline-block;
|
||||
}
|
||||
|
||||
.browser-clip-circle {
|
||||
height: auto;
|
||||
width: 30%;
|
||||
-webkit-border-radius: 50%;
|
||||
-moz-border-radius: 50%;
|
||||
-ms-border-radius: 50%;
|
||||
-o-border-radius: 50%;
|
||||
border-radius: 50%;
|
||||
padding-bottom: 1rem;
|
||||
height: auto;
|
||||
width: 30%;
|
||||
-webkit-border-radius: 50%;
|
||||
-moz-border-radius: 50%;
|
||||
-ms-border-radius: 50%;
|
||||
-o-border-radius: 50%;
|
||||
border-radius: 50%;
|
||||
padding-bottom: 1rem;
|
||||
}
|
||||
|
||||
.browser-onboarding {
|
||||
width: 100%;
|
||||
min-height: 35rem;
|
||||
width: 100%;
|
||||
min-height: 35rem;
|
||||
}
|
||||
|
||||
.browser-onboarding .row {
|
||||
padding: 10px;
|
||||
margin: 10px;
|
||||
padding: 10px;
|
||||
margin: 10px;
|
||||
}
|
||||
|
||||
.browser-onboarding .row-text {
|
||||
width: 80%;
|
||||
width: 80%;
|
||||
}
|
||||
|
||||
.browser-onboarding .row-image {
|
||||
float: left;
|
||||
width: 20%;
|
||||
float: left;
|
||||
width: 20%;
|
||||
}
|
||||
|
||||
.browser-onboarding .row-image>img {
|
||||
width: 128px;
|
||||
.browser-onboarding .row-image > img {
|
||||
width: 128px;
|
||||
}
|
||||
|
||||
|
||||
/*special formatting for tables and textareas inside the content*/
|
||||
|
||||
table.unwrapped-table {
|
||||
table-layout: auto;
|
||||
width: 99%;
|
||||
border: 1px solid;
|
||||
font-size: 0.70rem;
|
||||
table-layout: auto;
|
||||
width: 99%;
|
||||
border: 1px solid;
|
||||
font-size: 0.70rem;
|
||||
}
|
||||
|
||||
td.unwrapped-table {
|
||||
border: 1px solid;
|
||||
overflow: hidden;
|
||||
white-space: nowrap;
|
||||
text-overflow: ellipsis;
|
||||
border: 1px solid;
|
||||
overflow: hidden;
|
||||
white-space: nowrap;
|
||||
text-overflow: ellipsis;
|
||||
}
|
||||
|
||||
th.unwrapped-table {
|
||||
border: 1px solid;
|
||||
overflow: hidden;
|
||||
white-space: nowrap;
|
||||
text-overflow: ellipsis;
|
||||
border: 1px solid;
|
||||
overflow: hidden;
|
||||
white-space: nowrap;
|
||||
text-overflow: ellipsis;
|
||||
}
|
||||
|
||||
div#content .coinaddr {
|
||||
@ -843,13 +818,13 @@ div#content .coinaddr {
|
||||
}
|
||||
|
||||
div#content .qrcode {
|
||||
transition: transform .3s;
|
||||
width: 50px;
|
||||
height: 50px;
|
||||
transition: transform .3s;
|
||||
width: 50px;
|
||||
height: 50px;
|
||||
}
|
||||
|
||||
div#content .qrcode:hover {
|
||||
transform: scale(5) translateX(20px);
|
||||
transform: scale(5) translateX(20px);
|
||||
}
|
||||
|
||||
div#content .emaillabel {
|
||||
@ -860,9 +835,7 @@ div#content .emaillabel {
|
||||
margin-bottom: .2rem;
|
||||
}
|
||||
|
||||
|
||||
/*delete this section when we have an e-mail address to use on the donations page*/
|
||||
|
||||
div#content .emailforms {
|
||||
display: none;
|
||||
}
|
||||
@ -891,115 +864,38 @@ div#content .messagebox {
|
||||
height: 100px;
|
||||
}
|
||||
|
||||
element {}
|
||||
|
||||
element {
|
||||
}
|
||||
.background-primary {
|
||||
background-color: #4661A9;
|
||||
}
|
||||
|
||||
.text-white {
|
||||
color: #fff !important;
|
||||
}
|
||||
|
||||
.p-5 {
|
||||
padding: 3rem !important;
|
||||
}
|
||||
|
||||
.col-12 {
|
||||
-ms-flex: 0 0 100%;
|
||||
flex: 0 0 100%;
|
||||
max-width: 100%;
|
||||
}
|
||||
|
||||
.col,
|
||||
.col-1,
|
||||
.col-10,
|
||||
.col-11,
|
||||
.col-12,
|
||||
.col-2,
|
||||
.col-3,
|
||||
.col-4,
|
||||
.col-5,
|
||||
.col-6,
|
||||
.col-7,
|
||||
.col-8,
|
||||
.col-9,
|
||||
.col-auto,
|
||||
.col-lg,
|
||||
.col-lg-1,
|
||||
.col-lg-10,
|
||||
.col-lg-11,
|
||||
.col-lg-12,
|
||||
.col-lg-2,
|
||||
.col-lg-3,
|
||||
.col-lg-4,
|
||||
.col-lg-5,
|
||||
.col-lg-6,
|
||||
.col-lg-7,
|
||||
.col-lg-8,
|
||||
.col-lg-9,
|
||||
.col-lg-auto,
|
||||
.col-md,
|
||||
.col-md-1,
|
||||
.col-md-10,
|
||||
.col-md-11,
|
||||
.col-md-12,
|
||||
.col-md-2,
|
||||
.col-md-3,
|
||||
.col-md-4,
|
||||
.col-md-5,
|
||||
.col-md-6,
|
||||
.col-md-7,
|
||||
.col-md-8,
|
||||
.col-md-9,
|
||||
.col-md-auto,
|
||||
.col-sm,
|
||||
.col-sm-1,
|
||||
.col-sm-10,
|
||||
.col-sm-11,
|
||||
.col-sm-12,
|
||||
.col-sm-2,
|
||||
.col-sm-3,
|
||||
.col-sm-4,
|
||||
.col-sm-5,
|
||||
.col-sm-6,
|
||||
.col-sm-7,
|
||||
.col-sm-8,
|
||||
.col-sm-9,
|
||||
.col-sm-auto,
|
||||
.col-xl,
|
||||
.col-xl-1,
|
||||
.col-xl-10,
|
||||
.col-xl-11,
|
||||
.col-xl-12,
|
||||
.col-xl-2,
|
||||
.col-xl-3,
|
||||
.col-xl-4,
|
||||
.col-xl-5,
|
||||
.col-xl-6,
|
||||
.col-xl-7,
|
||||
.col-xl-8,
|
||||
.col-xl-9,
|
||||
.col-xl-auto {
|
||||
.col, .col-1, .col-10, .col-11, .col-12, .col-2, .col-3, .col-4, .col-5, .col-6, .col-7, .col-8, .col-9, .col-auto, .col-lg, .col-lg-1, .col-lg-10, .col-lg-11, .col-lg-12, .col-lg-2, .col-lg-3, .col-lg-4, .col-lg-5, .col-lg-6, .col-lg-7, .col-lg-8, .col-lg-9, .col-lg-auto, .col-md, .col-md-1, .col-md-10, .col-md-11, .col-md-12, .col-md-2, .col-md-3, .col-md-4, .col-md-5, .col-md-6, .col-md-7, .col-md-8, .col-md-9, .col-md-auto, .col-sm, .col-sm-1, .col-sm-10, .col-sm-11, .col-sm-12, .col-sm-2, .col-sm-3, .col-sm-4, .col-sm-5, .col-sm-6, .col-sm-7, .col-sm-8, .col-sm-9, .col-sm-auto, .col-xl, .col-xl-1, .col-xl-10, .col-xl-11, .col-xl-12, .col-xl-2, .col-xl-3, .col-xl-4, .col-xl-5, .col-xl-6, .col-xl-7, .col-xl-8, .col-xl-9, .col-xl-auto {
|
||||
position: relative;
|
||||
width: 100%;
|
||||
min-height: 1px;
|
||||
padding-right: 15px;
|
||||
padding-left: 15px;
|
||||
}
|
||||
|
||||
*,
|
||||
::after,
|
||||
::before {
|
||||
*, ::after, ::before {
|
||||
box-sizing: border-box;
|
||||
}
|
||||
|
||||
body {
|
||||
color: #212529;
|
||||
font-family: "Source Sans Pro", sans-serif !important;
|
||||
font-family: "Source Sans Pro",sans-serif !important;
|
||||
font-size: 1rem;
|
||||
}
|
||||
|
||||
body {
|
||||
font-family: -apple-system, BlinkMacSystemFont, "Segoe UI", Roboto, "Helvetica Neue", Arial, sans-serif, "Apple Color Emoji", "Segoe UI Emoji", "Segoe UI Symbol";
|
||||
font-size: 1rem;
|
||||
@ -1008,7 +904,6 @@ body {
|
||||
color: #212529;
|
||||
text-align: left;
|
||||
}
|
||||
|
||||
:root {
|
||||
--blue: #007bff;
|
||||
--indigo: #6610f2;
|
||||
@ -1039,9 +934,9 @@ body {
|
||||
--font-family-sans-serif: -apple-system, BlinkMacSystemFont, "Segoe UI", Roboto, "Helvetica Neue", Arial, sans-serif, "Apple Color Emoji", "Segoe UI Emoji", "Segoe UI Symbol";
|
||||
--font-family-monospace: SFMono-Regular, Menlo, Monaco, Consolas, "Liberation Mono", "Courier New", monospace;
|
||||
}
|
||||
|
||||
html {
|
||||
font-family: sans-serif;
|
||||
line-height: 1.15;
|
||||
-webkit-text-size-adjust: 100%;
|
||||
}
|
||||
}
|
||||
|
||||
|
File diff suppressed because it is too large
Load Diff
@ -1,22 +1,22 @@
|
||||
# Arabic translations for I2P.
|
||||
# Translations template for I2P.
|
||||
# Copyright (C) 2021 ORGANIZATION
|
||||
# This file is distributed under the same license as the I2P project.
|
||||
#
|
||||
#
|
||||
# Translators:
|
||||
msgid ""
|
||||
msgstr ""
|
||||
"Project-Id-Version: I2P\n"
|
||||
"Project-Id-Version: I2P\n"
|
||||
"Report-Msgid-Bugs-To: http://trac.i2p2.de\n"
|
||||
"POT-Creation-Date: 2021-10-11 16:27+0000\n"
|
||||
"PO-Revision-Date: 2013-07-15 11:59+0000\n"
|
||||
"Last-Translator: FULL NAME <EMAIL@ADDRESS>\n"
|
||||
"Language-Team: Arabic (http://www.transifex.com/otf/I2P/language/ar/)\n"
|
||||
"Plural-Forms: nplurals=6; plural=n==0 ? 0 : n==1 ? 1 : n==2 ? 2 : "
|
||||
"n%100>=3 && n%100<=10 ? 3 : n%100>=11 && n%100<=99 ? 4 : 5\n"
|
||||
"MIME-Version: 1.0\n"
|
||||
"Content-Type: text/plain; charset=utf-8\n"
|
||||
"Content-Type: text/plain; charset=UTF-8\n"
|
||||
"Content-Transfer-Encoding: 8bit\n"
|
||||
"Generated-By: Babel 1.3\n"
|
||||
"Language: ar\n"
|
||||
"Plural-Forms: nplurals=6; plural=n==0 ? 0 : n==1 ? 1 : n==2 ? 2 : n%100>=3 && n%100<=10 ? 3 : n%100>=11 && n%100<=99 ? 4 : 5;\n"
|
||||
|
||||
#: i2p2www/pages/site/comparison/freenet.html:2
|
||||
msgid "I2P Compared to Freenet"
|
||||
@ -24,34 +24,23 @@ msgstr ""
|
||||
|
||||
#: i2p2www/pages/site/comparison/freenet.html:8
|
||||
msgid ""
|
||||
"Freenet is a fully distributed, peer to peer anonymous publishing "
|
||||
"network, offering \n"
|
||||
"secure ways to store data, as well as some approaches attempting to "
|
||||
"address the loads\n"
|
||||
"of a flash flood. While Freenet is designed as a distributed data store,"
|
||||
" people have\n"
|
||||
"built applications on top of it to do more generic anonymous "
|
||||
"communication, such as \n"
|
||||
"Freenet is a fully distributed, peer to peer anonymous publishing network, offering \n"
|
||||
"secure ways to store data, as well as some approaches attempting to address the loads\n"
|
||||
"of a flash flood. While Freenet is designed as a distributed data store, people have\n"
|
||||
"built applications on top of it to do more generic anonymous communication, such as \n"
|
||||
"static websites and message boards."
|
||||
msgstr ""
|
||||
|
||||
#: i2p2www/pages/site/comparison/freenet.html:16
|
||||
#, python-format
|
||||
msgid ""
|
||||
"Compared to I2P, Freenet offers some substantial benefits - it is a "
|
||||
"distributed data\n"
|
||||
"store, while I2P is not, allowing people to retrieve the content "
|
||||
"published by others \n"
|
||||
"even when the publisher is no longer online. In addition, it should be "
|
||||
"able to \n"
|
||||
"distribute popular data fairly efficiently. I2P itself does not and will"
|
||||
" not provide \n"
|
||||
"this functionality. On the other hand, there is overlap for users who "
|
||||
"simply want to \n"
|
||||
"communicate with each other anonymously through websites, message boards,"
|
||||
" file sharing\n"
|
||||
"programs, etc. There have also been some attempts to develop a "
|
||||
"distributed data \n"
|
||||
"Compared to I2P, Freenet offers some substantial benefits - it is a distributed data\n"
|
||||
"store, while I2P is not, allowing people to retrieve the content published by others \n"
|
||||
"even when the publisher is no longer online. In addition, it should be able to \n"
|
||||
"distribute popular data fairly efficiently. I2P itself does not and will not provide \n"
|
||||
"this functionality. On the other hand, there is overlap for users who simply want to \n"
|
||||
"communicate with each other anonymously through websites, message boards, file sharing\n"
|
||||
"programs, etc. There have also been some attempts to develop a distributed data \n"
|
||||
"store to run on top of I2P,\n"
|
||||
"(most recently a port of <a href=\"%(tahoe)s\">Tahoe-LAFS</a>)\n"
|
||||
"but nothing is yet ready for general use."
|
||||
@ -59,20 +48,13 @@ msgstr ""
|
||||
|
||||
#: i2p2www/pages/site/comparison/freenet.html:29
|
||||
msgid ""
|
||||
"However, even ignoring any implementations issues, there are some "
|
||||
"concerns \n"
|
||||
"about Freenet's algorithms from both a scalability and anonymity "
|
||||
"perspective, owing \n"
|
||||
"largely to Freenet's heuristic driven routing. The interactions of "
|
||||
"various techniques \n"
|
||||
"certainly may successfully deter various attacks, and perhaps some "
|
||||
"aspects of the \n"
|
||||
"routing algorithms will provide the hoped for scalability. "
|
||||
"Unfortunately, not much\n"
|
||||
"analysis of the algorithms involved has resulted in positive results, but"
|
||||
" there is still\n"
|
||||
"hope. At the very least, Freenet does provide substantial anonymity "
|
||||
"against an attacker\n"
|
||||
"However, even ignoring any implementations issues, there are some concerns \n"
|
||||
"about Freenet's algorithms from both a scalability and anonymity perspective, owing \n"
|
||||
"largely to Freenet's heuristic driven routing. The interactions of various techniques \n"
|
||||
"certainly may successfully deter various attacks, and perhaps some aspects of the \n"
|
||||
"routing algorithms will provide the hoped for scalability. Unfortunately, not much\n"
|
||||
"analysis of the algorithms involved has resulted in positive results, but there is still\n"
|
||||
"hope. At the very least, Freenet does provide substantial anonymity against an attacker\n"
|
||||
"who does not have the resources necessary to analyze it further."
|
||||
msgstr ""
|
||||
|
||||
@ -82,15 +64,11 @@ msgstr ""
|
||||
|
||||
#: i2p2www/pages/site/comparison/index.html:4
|
||||
msgid ""
|
||||
"There are a great many other applications and projects working on "
|
||||
"anonymous \n"
|
||||
"communication and I2P has been inspired by much of their efforts. This "
|
||||
"is not \n"
|
||||
"There are a great many other applications and projects working on anonymous \n"
|
||||
"communication and I2P has been inspired by much of their efforts. This is not \n"
|
||||
"a comprehensive list of anonymity resources - both freehaven's \n"
|
||||
"<a href=\"http://freehaven.net/anonbib/topic.html\">Anonymity "
|
||||
"Bibliography</a>\n"
|
||||
"and GNUnet's <a href=\"https://www.gnunet.org/links/\">related "
|
||||
"projects</a>\n"
|
||||
"<a href=\"http://freehaven.net/anonbib/topic.html\">Anonymity Bibliography</a>\n"
|
||||
"and GNUnet's <a href=\"https://www.gnunet.org/links/\">related projects</a>\n"
|
||||
"serve that purpose well. That said, a few systems stand out for further\n"
|
||||
"comparison. The following have individual comparison pages:"
|
||||
msgstr ""
|
||||
@ -105,10 +83,8 @@ msgstr ""
|
||||
#: i2p2www/pages/site/comparison/index.html:33
|
||||
#, python-format
|
||||
msgid ""
|
||||
"The content of this page is subject to update, discussion and dispute, "
|
||||
"and we welcome comments and additions.\n"
|
||||
"You may contribute an analysis by entering a <a href=\"%(trac)s\">new "
|
||||
"issue on Github</a>."
|
||||
"The content of this page is subject to update, discussion and dispute, and we welcome comments and additions.\n"
|
||||
"You may contribute an analysis by entering a <a href=\"%(trac)s\">new issue on Github</a>."
|
||||
msgstr ""
|
||||
|
||||
#: i2p2www/pages/site/comparison/other-networks.html:2
|
||||
@ -133,45 +109,31 @@ msgstr ""
|
||||
#, python-format
|
||||
msgid ""
|
||||
"RetroShare is a set of peer-to-peer applications running in a\n"
|
||||
"<a href=\"%(f2fwiki)s\">Friend-to-friend (F2F)</a> network. Each peer of "
|
||||
"such F2F \n"
|
||||
"network makes direct IP connections only to authenticated peers "
|
||||
"(\"friends\") after explicit \n"
|
||||
"certificates exchange. It can discover unauthenticated peers (e.g. "
|
||||
"friends of friends), \n"
|
||||
"but connections to them are relayed over \"friend\" peers for providing "
|
||||
"privacy and anonymity."
|
||||
"<a href=\"%(f2fwiki)s\">Friend-to-friend (F2F)</a> network. Each peer of such F2F \n"
|
||||
"network makes direct IP connections only to authenticated peers (\"friends\") after explicit \n"
|
||||
"certificates exchange. It can discover unauthenticated peers (e.g. friends of friends), \n"
|
||||
"but connections to them are relayed over \"friend\" peers for providing privacy and anonymity."
|
||||
msgstr ""
|
||||
|
||||
#: i2p2www/pages/site/comparison/other-networks.html:37
|
||||
msgid ""
|
||||
"RetroShare is designed to build a private network of trusted peers, while"
|
||||
" I2P is designed \n"
|
||||
"to be a large-scaled public anonymous network. Recent versions of "
|
||||
"RetroShare have options to run \n"
|
||||
"as a public \"darknet\" by using I2P or Tor as a transport. That way all "
|
||||
"connections are \n"
|
||||
"RetroShare is designed to build a private network of trusted peers, while I2P is designed \n"
|
||||
"to be a large-scaled public anonymous network. Recent versions of RetroShare have options to run \n"
|
||||
"as a public \"darknet\" by using I2P or Tor as a transport. That way all connections are \n"
|
||||
"anonymized and no trust is required for adding new \"friends\"."
|
||||
msgstr ""
|
||||
|
||||
#: i2p2www/pages/site/comparison/other-networks.html:48
|
||||
#, python-format
|
||||
msgid ""
|
||||
"Morphmix and Tarzan are both fully distributed, peer to peer networks of"
|
||||
" \n"
|
||||
"anonymizing proxies, allowing people to tunnel out through the low "
|
||||
"latency \n"
|
||||
"mix network. Morphmix includes some very interesting collusion detection"
|
||||
" \n"
|
||||
"algorithms and Sybil defenses, while Tarzan makes use of the scarcity of "
|
||||
"IP\n"
|
||||
"Morphmix and Tarzan are both fully distributed, peer to peer networks of \n"
|
||||
"anonymizing proxies, allowing people to tunnel out through the low latency \n"
|
||||
"mix network. Morphmix includes some very interesting collusion detection \n"
|
||||
"algorithms and Sybil defenses, while Tarzan makes use of the scarcity of IP\n"
|
||||
"addresses to accomplish the same. The two primary differences between \n"
|
||||
"these systems and I2P are related to I2P's <a "
|
||||
"href=\"%(threatmodel)s\">threat model</a> \n"
|
||||
"and their out-proxy design (as opposed to providing both sender and "
|
||||
"receiver \n"
|
||||
"anonymity). There is source code available to both systems, but we are "
|
||||
"not aware \n"
|
||||
"these systems and I2P are related to I2P's <a href=\"%(threatmodel)s\">threat model</a> \n"
|
||||
"and their out-proxy design (as opposed to providing both sender and receiver \n"
|
||||
"anonymity). There is source code available to both systems, but we are not aware \n"
|
||||
"of their use outside of academic environments."
|
||||
msgstr ""
|
||||
|
||||
@ -179,19 +141,15 @@ msgstr ""
|
||||
#, python-format
|
||||
msgid ""
|
||||
"\n"
|
||||
"Mixminion and Mixmaster are networks to support anonymous email against a"
|
||||
" very\n"
|
||||
"Mixminion and Mixmaster are networks to support anonymous email against a very\n"
|
||||
"powerful adversary.\n"
|
||||
"High-latency messaging applications running on top of I2P\n"
|
||||
"(for example <a href=\"%(syndie)s\">Syndie</a> or I2PBote)\n"
|
||||
"may perhaps prove adequate to meet the threat\n"
|
||||
"model of those adversaries, while running in parallel along side the "
|
||||
"needs of low latency users, to provide\n"
|
||||
"model of those adversaries, while running in parallel along side the needs of low latency users, to provide\n"
|
||||
"a significantly larger anonymity set.\n"
|
||||
"High-latency support within the I2P router itself may or may not be added"
|
||||
" in a distant future release.\n"
|
||||
"It is too early to say if I2P will meet the needs of users requiring "
|
||||
"extreme protection for email."
|
||||
"High-latency support within the I2P router itself may or may not be added in a distant future release.\n"
|
||||
"It is too early to say if I2P will meet the needs of users requiring extreme protection for email."
|
||||
msgstr ""
|
||||
|
||||
#: i2p2www/pages/site/comparison/other-networks.html:184
|
||||
@ -203,32 +161,20 @@ msgstr ""
|
||||
#: i2p2www/pages/site/comparison/other-networks.html:194
|
||||
#, python-format
|
||||
msgid ""
|
||||
"JAP (Java Anonymous Proxy) is a network of mix cascades for anonymizing "
|
||||
"web requests,\n"
|
||||
"and as such it has a few centralized nodes (participants in the cascade) "
|
||||
"that blend\n"
|
||||
"and mix requests from clients through the sequence of nodes (the cascade)"
|
||||
" before \n"
|
||||
"proxying out onto the web. The scope, threat model, and security is "
|
||||
"substantially \n"
|
||||
"different from I2P, but for those who don't require significant anonymity"
|
||||
" but still\n"
|
||||
"are not satisfied with an Anonymizer-like service, JAP is worth "
|
||||
"reviewing. One\n"
|
||||
"caution to note is that anyone under the jurisdiction of the German "
|
||||
"courts may want\n"
|
||||
"to take care, as the German Federal Bureau of Criminal Investigation "
|
||||
"(FBCI) has \n"
|
||||
"JAP (Java Anonymous Proxy) is a network of mix cascades for anonymizing web requests,\n"
|
||||
"and as such it has a few centralized nodes (participants in the cascade) that blend\n"
|
||||
"and mix requests from clients through the sequence of nodes (the cascade) before \n"
|
||||
"proxying out onto the web. The scope, threat model, and security is substantially \n"
|
||||
"different from I2P, but for those who don't require significant anonymity but still\n"
|
||||
"are not satisfied with an Anonymizer-like service, JAP is worth reviewing. One\n"
|
||||
"caution to note is that anyone under the jurisdiction of the German courts may want\n"
|
||||
"to take care, as the German Federal Bureau of Criminal Investigation (FBCI) has \n"
|
||||
"successfully mounted an \n"
|
||||
"<a href=\"%(url)s\">attack</a> \n"
|
||||
"on the network. Even though the method of this attack was later found to"
|
||||
" be illegal \n"
|
||||
"in the German courts, the fact that the data was successfully collected "
|
||||
"is the \n"
|
||||
"concern. Courts change their minds based upon circumstance, and this is "
|
||||
"evidence that \n"
|
||||
"if a government body or intelligence agency wanted to, they could gather "
|
||||
"the data, even \n"
|
||||
"on the network. Even though the method of this attack was later found to be illegal \n"
|
||||
"in the German courts, the fact that the data was successfully collected is the \n"
|
||||
"concern. Courts change their minds based upon circumstance, and this is evidence that \n"
|
||||
"if a government body or intelligence agency wanted to, they could gather the data, even \n"
|
||||
"if it may be found inadmissible in some courts later)"
|
||||
msgstr ""
|
||||
|
||||
@ -237,36 +183,23 @@ msgstr ""
|
||||
msgid ""
|
||||
"Both of these systems work through the same basic \n"
|
||||
"<a href=\"%(antnet)s\">antnet</a> routing, providing some degree of\n"
|
||||
"anonymity based on the threat model of providing plausible deniability "
|
||||
"against a simple \n"
|
||||
"non-colluding adversary. With the antnet routing, they first either do a"
|
||||
" random walk or a \n"
|
||||
"broadcast search to find some peer with the data or identity desired, and"
|
||||
" then use a feedback\n"
|
||||
"algorithm to optimize that found path. This works well for applications "
|
||||
"that merely want to know \n"
|
||||
"what other people around them have to offer - \"How are y'all doing\" vs."
|
||||
" \"Hey Alice, how are you\" - \n"
|
||||
"you basically get a local cluster of nodes that can share files with and "
|
||||
"maintain some degree of \n"
|
||||
"anonymity (though you don't have much control over who is in that group "
|
||||
"of peers)."
|
||||
"anonymity based on the threat model of providing plausible deniability against a simple \n"
|
||||
"non-colluding adversary. With the antnet routing, they first either do a random walk or a \n"
|
||||
"broadcast search to find some peer with the data or identity desired, and then use a feedback\n"
|
||||
"algorithm to optimize that found path. This works well for applications that merely want to know \n"
|
||||
"what other people around them have to offer - \"How are y'all doing\" vs. \"Hey Alice, how are you\" - \n"
|
||||
"you basically get a local cluster of nodes that can share files with and maintain some degree of \n"
|
||||
"anonymity (though you don't have much control over who is in that group of peers)."
|
||||
msgstr ""
|
||||
|
||||
#: i2p2www/pages/site/comparison/other-networks.html:228
|
||||
msgid ""
|
||||
"However, the algorithm does not scale well at all - if the application "
|
||||
"wants to speak with a \n"
|
||||
"particular peer it ends up doing a broadcast search or random walk "
|
||||
"(though if they are lucky enough\n"
|
||||
"for that to succeed, the antnet routing should optimize that found "
|
||||
"connection). This means that \n"
|
||||
"while these networks can work great at small scales, they are not "
|
||||
"suitable for large networks where\n"
|
||||
"someone wants to get in touch with another specific peer. That does not "
|
||||
"mean that there is no \n"
|
||||
"value in these systems, just that their applicability is limited to "
|
||||
"situations where their \n"
|
||||
"However, the algorithm does not scale well at all - if the application wants to speak with a \n"
|
||||
"particular peer it ends up doing a broadcast search or random walk (though if they are lucky enough\n"
|
||||
"for that to succeed, the antnet routing should optimize that found connection). This means that \n"
|
||||
"while these networks can work great at small scales, they are not suitable for large networks where\n"
|
||||
"someone wants to get in touch with another specific peer. That does not mean that there is no \n"
|
||||
"value in these systems, just that their applicability is limited to situations where their \n"
|
||||
"particular issues can be addressed."
|
||||
msgstr ""
|
||||
|
||||
@ -274,10 +207,8 @@ msgstr ""
|
||||
#, python-format
|
||||
msgid ""
|
||||
"This was a closed-source network targeted at Iranian users.\n"
|
||||
"Tor did a <a href=\"%(torpost)s\">good writeup on what to look for in a "
|
||||
"circumvention tool</a>.\n"
|
||||
"Suffice it to say that being closed source and publicly targeting a "
|
||||
"specific country are not good ideas.\n"
|
||||
"Tor did a <a href=\"%(torpost)s\">good writeup on what to look for in a circumvention tool</a>.\n"
|
||||
"Suffice it to say that being closed source and publicly targeting a specific country are not good ideas.\n"
|
||||
"I2P is, of course, open source. However, that source, and our\n"
|
||||
"<a href=\"%(docs)s\">technical documentation</a>, need much more review."
|
||||
msgstr ""
|
||||
@ -497,8 +428,7 @@ msgstr ""
|
||||
|
||||
#: i2p2www/pages/site/comparison/tor.html:78
|
||||
msgid ""
|
||||
"Much bigger user base; much more visibility in the academic and hacker "
|
||||
"communities; benefits from\n"
|
||||
"Much bigger user base; much more visibility in the academic and hacker communities; benefits from\n"
|
||||
"formal studies of anonymity, resistance, and performance;\n"
|
||||
"has a non-anonymous, visible, university-based leader"
|
||||
msgstr ""
|
||||
@ -517,10 +447,8 @@ msgstr ""
|
||||
|
||||
#: i2p2www/pages/site/comparison/tor.html:88
|
||||
msgid ""
|
||||
"More resistant to state-level blocking due to TLS transport layer and "
|
||||
"bridges\n"
|
||||
"(I2P has proposals for \"full restricted routes\" but these are not yet "
|
||||
"implemented)"
|
||||
"More resistant to state-level blocking due to TLS transport layer and bridges\n"
|
||||
"(I2P has proposals for \"full restricted routes\" but these are not yet implemented)"
|
||||
msgstr ""
|
||||
|
||||
#: i2p2www/pages/site/comparison/tor.html:93
|
||||
@ -528,7 +456,8 @@ msgid "Big enough that it has had to adapt to blocking and DOS attempts"
|
||||
msgstr ""
|
||||
|
||||
#: i2p2www/pages/site/comparison/tor.html:94
|
||||
msgid "Designed and optimized for exit traffic, with a large number of exit nodes"
|
||||
msgid ""
|
||||
"Designed and optimized for exit traffic, with a large number of exit nodes"
|
||||
msgstr ""
|
||||
|
||||
#: i2p2www/pages/site/comparison/tor.html:96
|
||||
@ -567,8 +496,8 @@ msgstr ""
|
||||
|
||||
#: i2p2www/pages/site/comparison/tor.html:120
|
||||
msgid ""
|
||||
"Designed and optimized for hidden services, which are much faster than in"
|
||||
" Tor"
|
||||
"Designed and optimized for hidden services, which are much faster than in "
|
||||
"Tor"
|
||||
msgstr ""
|
||||
|
||||
#: i2p2www/pages/site/comparison/tor.html:121
|
||||
@ -705,4 +634,3 @@ msgid ""
|
||||
"where the endpoint will inject dummy messages if there\n"
|
||||
"are insufficient messages, etc)"
|
||||
msgstr ""
|
||||
|
||||
|
File diff suppressed because it is too large
Load Diff
File diff suppressed because it is too large
Load Diff
@ -4713,3 +4713,6 @@ msgstr ""
|
||||
msgid "Very Old Stuff"
|
||||
msgstr ""
|
||||
|
||||
|
||||
|
||||
|
||||
|
@ -1,23 +1,24 @@
|
||||
# Arabic translations for I2P.
|
||||
# Translations template for I2P.
|
||||
# Copyright (C) 2021 ORGANIZATION
|
||||
# This file is distributed under the same license as the I2P project.
|
||||
#
|
||||
#
|
||||
# Translators:
|
||||
# Tashigi OP, 2018
|
||||
# Tashigi OP, 2018
|
||||
msgid ""
|
||||
msgstr ""
|
||||
"Project-Id-Version: I2P\n"
|
||||
"Project-Id-Version: I2P\n"
|
||||
"Report-Msgid-Bugs-To: http://trac.i2p2.de\n"
|
||||
"POT-Creation-Date: 2021-04-26 14:51+0000\n"
|
||||
"PO-Revision-Date: 2013-07-15 12:01+0000\n"
|
||||
"Last-Translator: Tashigi OP, 2018\n"
|
||||
"Language-Team: Arabic (http://www.transifex.com/otf/I2P/language/ar/)\n"
|
||||
"Plural-Forms: nplurals=6; plural=n==0 ? 0 : n==1 ? 1 : n==2 ? 2 : "
|
||||
"n%100>=3 && n%100<=10 ? 3 : n%100>=11 && n%100<=99 ? 4 : 5\n"
|
||||
"MIME-Version: 1.0\n"
|
||||
"Content-Type: text/plain; charset=utf-8\n"
|
||||
"Content-Type: text/plain; charset=UTF-8\n"
|
||||
"Content-Transfer-Encoding: 8bit\n"
|
||||
"Generated-By: Babel 1.3\n"
|
||||
"Language: ar\n"
|
||||
"Plural-Forms: nplurals=6; plural=n==0 ? 0 : n==1 ? 1 : n==2 ? 2 : n%100>=3 && n%100<=10 ? 3 : n%100>=11 && n%100<=99 ? 4 : 5;\n"
|
||||
|
||||
#: i2p2www/pages/site/research/index.html:2
|
||||
msgid "Academic Research"
|
||||
@ -38,42 +39,24 @@ msgstr "بحثٌ عن شبكة I2P"
|
||||
|
||||
#: i2p2www/pages/site/research/index.html:10
|
||||
msgid ""
|
||||
"I2P is a very unique project that unfortunately has not received the "
|
||||
"wider\n"
|
||||
"academic attention it deserves. To date, most research focus on anonymous"
|
||||
" and\n"
|
||||
"onion-routing technology has been around Tor, and while those papers "
|
||||
"benefit us\n"
|
||||
"as well, there is a great need for I2P-focused research. This plays a key"
|
||||
" role\n"
|
||||
"in both maintaining the security and integrity of the network, as well as"
|
||||
"\n"
|
||||
"I2P is a very unique project that unfortunately has not received the wider\n"
|
||||
"academic attention it deserves. To date, most research focus on anonymous and\n"
|
||||
"onion-routing technology has been around Tor, and while those papers benefit us\n"
|
||||
"as well, there is a great need for I2P-focused research. This plays a key role\n"
|
||||
"in both maintaining the security and integrity of the network, as well as\n"
|
||||
"opening doors for more impactful future development."
|
||||
msgstr ""
|
||||
"مشروع I2P هو مشروع فريد من نوعه لم يحصل لسوء الحظ على الاهتمام الواسع \n"
|
||||
"من الدراسات الأكاديميّة الّتي يستحقها. حتى اليوم، تركز معظم البحوث على "
|
||||
"المجهول\n"
|
||||
"و تقنية توجيه البصل الّتي كانت حول مشروع Tor, وبينما أنّ هذه اﻷوراق "
|
||||
"تفيدنا كذلك,\n"
|
||||
"ما زال هناك حاجة كبيرة إلى بحوث تركز على I2P. هذا يلعب دورًا رئيسًا\n"
|
||||
"في الحفاظ على كلٍّ من الحماية، وسلامة أمن الشبكة، كما يفتح أيضًا\n"
|
||||
"أبواب للمزيد من البحوث والتطويرات المؤثرة في المستقبل."
|
||||
msgstr "مشروع I2P هو مشروع فريد من نوعه لم يحصل لسوء الحظ على الاهتمام الواسع \nمن الدراسات الأكاديميّة الّتي يستحقها. حتى اليوم، تركز معظم البحوث على المجهول\nو تقنية توجيه البصل الّتي كانت حول مشروع Tor, وبينما أنّ هذه اﻷوراق تفيدنا كذلك,\nما زال هناك حاجة كبيرة إلى بحوث تركز على I2P. هذا يلعب دورًا رئيسًا\nفي الحفاظ على كلٍّ من الحماية، وسلامة أمن الشبكة، كما يفتح أيضًا\nأبواب للمزيد من البحوث والتطويرات المؤثرة في المستقبل."
|
||||
|
||||
#: i2p2www/pages/site/research/index.html:19
|
||||
#, python-format
|
||||
msgid ""
|
||||
"\n"
|
||||
"There is a large research community investigating a wide range of aspects"
|
||||
" of\n"
|
||||
"anonymity. For a current and comprehensive list of relevant papers, see "
|
||||
"the\n"
|
||||
"There is a large research community investigating a wide range of aspects of\n"
|
||||
"anonymity. For a current and comprehensive list of relevant papers, see the\n"
|
||||
"<a href=\"%(anonbib)s\">Free Haven Anonymity Bibliography</a>.\n"
|
||||
"I2P benefits from much of the research into Tor and onion routing, but "
|
||||
"there is\n"
|
||||
"little dedicated research interest into the theory behind I2P, and the "
|
||||
"choices\n"
|
||||
"and tradeoffs that the network makes. This presents a unique opportunity "
|
||||
"for\n"
|
||||
"I2P benefits from much of the research into Tor and onion routing, but there is\n"
|
||||
"little dedicated research interest into the theory behind I2P, and the choices\n"
|
||||
"and tradeoffs that the network makes. This presents a unique opportunity for\n"
|
||||
"original research.\n"
|
||||
msgstr ""
|
||||
|
||||
@ -82,16 +65,13 @@ msgstr ""
|
||||
msgid ""
|
||||
"A list of known published papers about I2P is available <a "
|
||||
"href=\"%(papers)s\">here</a>."
|
||||
msgstr ""
|
||||
" قائمة باﻷوراق المعروفة الّتي نشرت حول I2P متوفرة<a "
|
||||
"href=\"%(papers)s\">هنا</a>"
|
||||
msgstr " قائمة باﻷوراق المعروفة الّتي نشرت حول I2P متوفرة<a href=\"%(papers)s\">هنا</a>"
|
||||
|
||||
#: i2p2www/pages/site/research/index.html:34
|
||||
msgid ""
|
||||
"\n"
|
||||
"This page aims to outline the most needed fields of research, notes to\n"
|
||||
"potential researchers, our general safety guidelines as well as an "
|
||||
"expanding\n"
|
||||
"potential researchers, our general safety guidelines as well as an expanding\n"
|
||||
"list of open questions that you can begin on at any time.\n"
|
||||
msgstr ""
|
||||
|
||||
@ -105,16 +85,12 @@ msgstr "البحوث الدّفاعيّة"
|
||||
|
||||
#: i2p2www/pages/site/research/index.html:44
|
||||
msgid ""
|
||||
"While all research on the I2P network is beneficial and appreciated, "
|
||||
"there are\n"
|
||||
"While all research on the I2P network is beneficial and appreciated, there are\n"
|
||||
"certain areas which are more in need than others - most so in defensive\n"
|
||||
"research. Most people enjoy coming up with fun ways to launch offensives\n"
|
||||
"against anonymous software, and this is further reinforced by the "
|
||||
"incentives in\n"
|
||||
"academic institutions. While we know it is often not the first choice for"
|
||||
"\n"
|
||||
"researchers, We would certainly appreciate any and all work towards ways "
|
||||
"to\n"
|
||||
"against anonymous software, and this is further reinforced by the incentives in\n"
|
||||
"academic institutions. While we know it is often not the first choice for\n"
|
||||
"researchers, We would certainly appreciate any and all work towards ways to\n"
|
||||
"fortify the network!"
|
||||
msgstr ""
|
||||
|
||||
@ -125,27 +101,17 @@ msgstr "الاختباراتُ الهجوميّة والتحليليّة"
|
||||
#: i2p2www/pages/site/research/index.html:56
|
||||
#, python-format
|
||||
msgid ""
|
||||
"If you've decided on a research topic that aims to hands-on investigate "
|
||||
"the I2P\n"
|
||||
"network or solve a problem of large proportions we ask you to "
|
||||
"<b>please</b> \n"
|
||||
"<a href=\"%(contact)s\">communicate your ideas</a> to the development "
|
||||
"team, the\n"
|
||||
"sooner the better. I2P is under constant development and a significant "
|
||||
"amount\n"
|
||||
"of roadmapping occurs, therefore your problem may have already been "
|
||||
"identified\n"
|
||||
"and flagged for update or patch. In the unlikely event you are conducting"
|
||||
"\n"
|
||||
"testing that overlaps with / would be of interest to another research "
|
||||
"project\n"
|
||||
"already in motion, we are also able to make you aware of this (with their"
|
||||
"\n"
|
||||
"permission, of course), and possibly open the door for collaboration. "
|
||||
"There is\n"
|
||||
"If you've decided on a research topic that aims to hands-on investigate the I2P\n"
|
||||
"network or solve a problem of large proportions we ask you to <b>please</b> \n"
|
||||
"<a href=\"%(contact)s\">communicate your ideas</a> to the development team, the\n"
|
||||
"sooner the better. I2P is under constant development and a significant amount\n"
|
||||
"of roadmapping occurs, therefore your problem may have already been identified\n"
|
||||
"and flagged for update or patch. In the unlikely event you are conducting\n"
|
||||
"testing that overlaps with / would be of interest to another research project\n"
|
||||
"already in motion, we are also able to make you aware of this (with their\n"
|
||||
"permission, of course), and possibly open the door for collaboration. There is\n"
|
||||
"also a chance that the test itself may significantly harm the network or\n"
|
||||
"regular users, and the team may have ideas or suggestions to mitigate "
|
||||
"that risk\n"
|
||||
"regular users, and the team may have ideas or suggestions to mitigate that risk\n"
|
||||
"and increase the safety of your testing."
|
||||
msgstr ""
|
||||
|
||||
@ -161,13 +127,11 @@ msgstr "إرشادات عامّة"
|
||||
msgid ""
|
||||
"<ol>\n"
|
||||
" <li>\n"
|
||||
" Consider the benefits and risks - is there any doubt that the "
|
||||
"research\n"
|
||||
" Consider the benefits and risks - is there any doubt that the research\n"
|
||||
" provides more value than danger?\n"
|
||||
" </li>\n"
|
||||
" <li>\n"
|
||||
" If the research can be done on a test network then that is the "
|
||||
"preferred\n"
|
||||
" If the research can be done on a test network then that is the preferred\n"
|
||||
" method\n"
|
||||
" </li>\n"
|
||||
" <li>\n"
|
||||
@ -175,10 +139,8 @@ msgid ""
|
||||
" collecting data about yourself\n"
|
||||
" </li>\n"
|
||||
" <li>\n"
|
||||
" If you need 'bigger data', It is recommended to first see if you can "
|
||||
"use\n"
|
||||
" data sets from previous experiments or other third party resources is"
|
||||
"\n"
|
||||
" If you need 'bigger data', It is recommended to first see if you can use\n"
|
||||
" data sets from previous experiments or other third party resources is\n"
|
||||
" recommended\n"
|
||||
" </li>\n"
|
||||
" <li>\n"
|
||||
@ -186,10 +148,8 @@ msgid ""
|
||||
" publication and collect as little as possible\n"
|
||||
" </li>\n"
|
||||
" <li>\n"
|
||||
" After testing and before publish, review that all data which is to be"
|
||||
"\n"
|
||||
" published publicly is <b><i>not</i></b> intended to be private by the"
|
||||
"\n"
|
||||
" After testing and before publish, review that all data which is to be\n"
|
||||
" published publicly is <b><i>not</i></b> intended to be private by the\n"
|
||||
" originator\n"
|
||||
" </li>\n"
|
||||
"</ol>"
|
||||
@ -201,32 +161,24 @@ msgstr "استخدام شبكة اختبار لمهاجمة I2P"
|
||||
|
||||
#: i2p2www/pages/site/research/index.html:108
|
||||
msgid ""
|
||||
"I2P can be run as a separate test network by controlling the locations "
|
||||
"that a\n"
|
||||
"I2P can be run as a separate test network by controlling the locations that a\n"
|
||||
"new router reseeds from so that it only finds other test routers.\n"
|
||||
"\n"
|
||||
"The standard mode of operation is to have one JVM per router instance; "
|
||||
"hence\n"
|
||||
"running multiple copies of I2P on a single machine is inadvisable, both "
|
||||
"due to\n"
|
||||
"The standard mode of operation is to have one JVM per router instance; hence\n"
|
||||
"running multiple copies of I2P on a single machine is inadvisable, both due to\n"
|
||||
"the potential resource drain and the certain port conflicts. To better\n"
|
||||
"facilitate setting up small test networks, I2P has a multirouter mode "
|
||||
"which\n"
|
||||
"facilitate setting up small test networks, I2P has a multirouter mode which\n"
|
||||
"enables multiple distinct routers to be run in the same JVM.\n"
|
||||
"\n"
|
||||
"MultiRouter can be started from the i2p base directory by running the "
|
||||
"below\n"
|
||||
"MultiRouter can be started from the i2p base directory by running the below\n"
|
||||
"command."
|
||||
msgstr ""
|
||||
|
||||
#: i2p2www/pages/site/research/index.html:124
|
||||
msgid ""
|
||||
"Additionally, I2P can be started in a virtual network mode. This mode "
|
||||
"disables\n"
|
||||
"all transports, allowing the router to be tested in isolation without "
|
||||
"network\n"
|
||||
"traffic. To enable this mode, add <code>i2p.vmCommSystem=true</code> to "
|
||||
"the\n"
|
||||
"Additionally, I2P can be started in a virtual network mode. This mode disables\n"
|
||||
"all transports, allowing the router to be tested in isolation without network\n"
|
||||
"traffic. To enable this mode, add <code>i2p.vmCommSystem=true</code> to the\n"
|
||||
"router.config before starting."
|
||||
msgstr ""
|
||||
|
||||
@ -237,13 +189,10 @@ msgstr "اختبار على شبكة I2P الحيّة"
|
||||
#: i2p2www/pages/site/research/index.html:133
|
||||
#, python-format
|
||||
msgid ""
|
||||
"As stated above in the researcher notes, please <a "
|
||||
"href=\"%(contact)s\">contact\n"
|
||||
"As stated above in the researcher notes, please <a href=\"%(contact)s\">contact\n"
|
||||
" us</a> before you commence your testing. While we do not discourage\n"
|
||||
"researchers from responsibly testing their ideas on the live network, if "
|
||||
"an\n"
|
||||
"attack becomes apparent and we don't have any line of communication then "
|
||||
"we\n"
|
||||
"researchers from responsibly testing their ideas on the live network, if an\n"
|
||||
"attack becomes apparent and we don't have any line of communication then we\n"
|
||||
"will end up taking countermeasures which could interfere with the test."
|
||||
msgstr ""
|
||||
|
||||
@ -253,35 +202,23 @@ msgstr "تهيئة موجه العائلة"
|
||||
|
||||
#: i2p2www/pages/site/research/index.html:143
|
||||
msgid ""
|
||||
"As of release 0.9.25, I2P supports a router family configuration. This "
|
||||
"provides\n"
|
||||
"researchers who run multiple routers with the means to publicly identify "
|
||||
"those\n"
|
||||
"routers. In turn, this helps the I2P project understand that these "
|
||||
"routers are\n"
|
||||
"not running an attack on the network. It also will prevent other routers "
|
||||
"from\n"
|
||||
"including multiple routers of the family in a single tunnel, which could "
|
||||
"lead\n"
|
||||
"to deanonymization. Routers that appear to be colluding but do not have a"
|
||||
"\n"
|
||||
"declared family may be assumed to be an attack on the network, and may be"
|
||||
"\n"
|
||||
"blocked. The best way to ensure the success of your research project is "
|
||||
"to work\n"
|
||||
"As of release 0.9.25, I2P supports a router family configuration. This provides\n"
|
||||
"researchers who run multiple routers with the means to publicly identify those\n"
|
||||
"routers. In turn, this helps the I2P project understand that these routers are\n"
|
||||
"not running an attack on the network. It also will prevent other routers from\n"
|
||||
"including multiple routers of the family in a single tunnel, which could lead\n"
|
||||
"to deanonymization. Routers that appear to be colluding but do not have a\n"
|
||||
"declared family may be assumed to be an attack on the network, and may be\n"
|
||||
"blocked. The best way to ensure the success of your research project is to work\n"
|
||||
"with us directly."
|
||||
msgstr ""
|
||||
|
||||
#: i2p2www/pages/site/research/index.html:155
|
||||
msgid ""
|
||||
"A router family shares a private key so that participation in the family "
|
||||
"cannot\n"
|
||||
"be spoofed. To configure a router family, click on the 'I2P Internals' "
|
||||
"link in\n"
|
||||
"the router console, and then on the 'Family' tab. Follow the instructions"
|
||||
" there\n"
|
||||
"to generate the private key for the first router in the family. Then, "
|
||||
"export\n"
|
||||
"A router family shares a private key so that participation in the family cannot\n"
|
||||
"be spoofed. To configure a router family, click on the 'I2P Internals' link in\n"
|
||||
"the router console, and then on the 'Family' tab. Follow the instructions there\n"
|
||||
"to generate the private key for the first router in the family. Then, export\n"
|
||||
"the key from that router, and import it to other members of the family."
|
||||
msgstr ""
|
||||
|
||||
@ -336,8 +273,7 @@ msgstr ""
|
||||
#: i2p2www/pages/site/research/vrp.html:6
|
||||
msgid ""
|
||||
"\n"
|
||||
"This process is subject to change. Please refer to this page for the "
|
||||
"current VRP."
|
||||
"This process is subject to change. Please refer to this page for the current VRP."
|
||||
msgstr ""
|
||||
|
||||
#: i2p2www/pages/site/research/vrp.html:10
|
||||
@ -346,22 +282,15 @@ msgstr ""
|
||||
|
||||
#: i2p2www/pages/site/research/vrp.html:12
|
||||
msgid ""
|
||||
"Researchers: while you research/hack, we ask that you refrain from the "
|
||||
"following: - Performing active exploits or Denial of Service attacks on "
|
||||
"the\n"
|
||||
"i2p network - Performing social engineering on i2p development team "
|
||||
"members - Performing any physical or electronic attempts against i2p "
|
||||
"property and/or data\n"
|
||||
"Researchers: while you research/hack, we ask that you refrain from the following: - Performing active exploits or Denial of Service attacks on the\n"
|
||||
"i2p network - Performing social engineering on i2p development team members - Performing any physical or electronic attempts against i2p property and/or data\n"
|
||||
"centers"
|
||||
msgstr ""
|
||||
|
||||
#: i2p2www/pages/site/research/vrp.html:15
|
||||
msgid ""
|
||||
"As i2p is an open-source community, many volunteers and development team "
|
||||
"members run their own I2P Sites as well as public (“non-private "
|
||||
"internet”) domains. These\n"
|
||||
"sites/servers are NOT in the scope of the vulnerability assessment / "
|
||||
"response process, only the underlying code of i2p is."
|
||||
"As i2p is an open-source community, many volunteers and development team members run their own I2P Sites as well as public (“non-private internet”) domains. These\n"
|
||||
"sites/servers are NOT in the scope of the vulnerability assessment / response process, only the underlying code of i2p is."
|
||||
msgstr ""
|
||||
|
||||
#: i2p2www/pages/site/research/vrp.html:18
|
||||
@ -388,8 +317,7 @@ msgstr ""
|
||||
|
||||
#: i2p2www/pages/site/research/vrp.html:37
|
||||
msgid ""
|
||||
"Response Team designates a Response Manager who is in charge of the "
|
||||
"particular\n"
|
||||
"Response Team designates a Response Manager who is in charge of the particular\n"
|
||||
"report based on availability and/or knowledge-set."
|
||||
msgstr ""
|
||||
|
||||
@ -402,8 +330,7 @@ msgstr ""
|
||||
|
||||
#: i2p2www/pages/site/research/vrp.html:47
|
||||
msgid ""
|
||||
"Response Manager makes inquiries to satisfy any needed information and to"
|
||||
"\n"
|
||||
"Response Manager makes inquiries to satisfy any needed information and to\n"
|
||||
"confirm if submission is indeed a vulnerability."
|
||||
msgstr ""
|
||||
|
||||
@ -423,8 +350,8 @@ msgstr ""
|
||||
|
||||
#: i2p2www/pages/site/research/vrp.html:62
|
||||
msgid ""
|
||||
"Response Manager moves discussion to a new or existing ticket on public "
|
||||
"Trac if necessary."
|
||||
"Response Manager moves discussion to a new or existing ticket on public Trac"
|
||||
" if necessary."
|
||||
msgstr ""
|
||||
|
||||
#: i2p2www/pages/site/research/vrp.html:70
|
||||
@ -436,8 +363,8 @@ msgstr ""
|
||||
|
||||
#: i2p2www/pages/site/research/vrp.html:75
|
||||
msgid ""
|
||||
"Affects network as a whole, has potential to break entire network or is "
|
||||
"on a scale of great catastrophe."
|
||||
"Affects network as a whole, has potential to break entire network or is on a"
|
||||
" scale of great catastrophe."
|
||||
msgstr ""
|
||||
|
||||
#: i2p2www/pages/site/research/vrp.html:79
|
||||
@ -455,19 +382,18 @@ msgstr ""
|
||||
#: i2p2www/pages/site/research/vrp.html:93
|
||||
#, python-format
|
||||
msgid ""
|
||||
"HIGH severities must be notified on website and news feed within "
|
||||
"%(limit)s\n"
|
||||
"HIGH severities must be notified on website and news feed within %(limit)s\n"
|
||||
"working days of classification."
|
||||
msgstr ""
|
||||
|
||||
#: i2p2www/pages/site/research/vrp.html:98
|
||||
msgid "The notification should list appropriate steps for users to take, if any."
|
||||
msgid ""
|
||||
"The notification should list appropriate steps for users to take, if any."
|
||||
msgstr ""
|
||||
|
||||
#: i2p2www/pages/site/research/vrp.html:101
|
||||
msgid ""
|
||||
"The notification must not include any details that could suggest an "
|
||||
"exploitation\n"
|
||||
"The notification must not include any details that could suggest an exploitation\n"
|
||||
"path."
|
||||
msgstr ""
|
||||
|
||||
@ -490,8 +416,8 @@ msgstr ""
|
||||
#: i2p2www/pages/site/research/vrp.html:122
|
||||
msgid ""
|
||||
"Response Manager works on a patch LOCALLY, patches are shared by the "
|
||||
"response team via PGP-encrypted e-mail until such a time as it is safe to"
|
||||
" expose to the public."
|
||||
"response team via PGP-encrypted e-mail until such a time as it is safe to "
|
||||
"expose to the public."
|
||||
msgstr ""
|
||||
|
||||
#: i2p2www/pages/site/research/vrp.html:125
|
||||
@ -500,10 +426,8 @@ msgstr ""
|
||||
|
||||
#: i2p2www/pages/site/research/vrp.html:128
|
||||
msgid ""
|
||||
"Any messages associated with PUBLIC commits during the time of review "
|
||||
"should not\n"
|
||||
"make reference to the security nature of the PRIVATE branch or its "
|
||||
"commits."
|
||||
"Any messages associated with PUBLIC commits during the time of review should not\n"
|
||||
"make reference to the security nature of the PRIVATE branch or its commits."
|
||||
msgstr ""
|
||||
|
||||
#: i2p2www/pages/site/research/vrp.html:132
|
||||
@ -538,19 +462,14 @@ msgstr ""
|
||||
|
||||
#: i2p2www/pages/site/research/vrp.html:159
|
||||
msgid ""
|
||||
"Response Manager includes vulnerability announcement draft in release "
|
||||
"notes."
|
||||
"Response Manager includes vulnerability announcement draft in release notes."
|
||||
msgstr ""
|
||||
|
||||
#: i2p2www/pages/site/research/vrp.html:162
|
||||
msgid ""
|
||||
"Proceed with the Point or Regular Release. At this time, it is not "
|
||||
"possible to release an in-network update for only one operating system or"
|
||||
"\n"
|
||||
"\t\tarchitecture. In order that all affected products can be released as "
|
||||
"quickly as possible, the person responsible\n"
|
||||
"\t\tfor that software should be able to perform necessary release "
|
||||
"processes in a timely manner. Importantly this should include\n"
|
||||
"Proceed with the Point or Regular Release. At this time, it is not possible to release an in-network update for only one operating system or\n"
|
||||
"\t\tarchitecture. In order that all affected products can be released as quickly as possible, the person responsible\n"
|
||||
"\t\tfor that software should be able to perform necessary release processes in a timely manner. Importantly this should include\n"
|
||||
"\t\tconsideration for package maintainers in Debian, Ubuntu and F-Droid."
|
||||
msgstr ""
|
||||
|
||||
@ -560,11 +479,13 @@ msgstr ""
|
||||
|
||||
#: i2p2www/pages/site/research/vrp.html:175
|
||||
#, python-format
|
||||
msgid "Response Team has %(limit)s days to fulfill all points within section III."
|
||||
msgid ""
|
||||
"Response Team has %(limit)s days to fulfill all points within section III."
|
||||
msgstr ""
|
||||
|
||||
#: i2p2www/pages/site/research/vrp.html:179
|
||||
msgid "If the Incident Response process in section III is successfully completed:"
|
||||
msgid ""
|
||||
"If the Incident Response process in section III is successfully completed:"
|
||||
msgstr ""
|
||||
|
||||
#: i2p2www/pages/site/research/vrp.html:183
|
||||
@ -616,8 +537,8 @@ msgstr ""
|
||||
|
||||
#: i2p2www/pages/site/research/vrp.html:214
|
||||
msgid ""
|
||||
"Workarounds (configuration changes users can make to reduce their "
|
||||
"exposure to the vulnerability)."
|
||||
"Workarounds (configuration changes users can make to reduce their exposure "
|
||||
"to the vulnerability)."
|
||||
msgstr ""
|
||||
|
||||
#: i2p2www/pages/site/research/vrp.html:217
|
||||
@ -625,13 +546,14 @@ msgid "If applicable, credits to the original reporter."
|
||||
msgstr ""
|
||||
|
||||
#: i2p2www/pages/site/research/vrp.html:222
|
||||
msgid "Release finalized vulnerability announcement on website and in news feed."
|
||||
msgid ""
|
||||
"Release finalized vulnerability announcement on website and in news feed."
|
||||
msgstr ""
|
||||
|
||||
#: i2p2www/pages/site/research/vrp.html:230
|
||||
msgid ""
|
||||
"For HIGH severities, release finalized vulnerability announcement on "
|
||||
"well-known mailing lists:"
|
||||
"For HIGH severities, release finalized vulnerability announcement on well-"
|
||||
"known mailing lists:"
|
||||
msgstr ""
|
||||
|
||||
#: i2p2www/pages/site/research/vrp.html:238
|
||||
@ -640,8 +562,8 @@ msgstr ""
|
||||
|
||||
#: i2p2www/pages/site/research/vrp.html:242
|
||||
msgid ""
|
||||
"The commit that applied the fix is made reference too in a future commit "
|
||||
"and includes a CVE-ID."
|
||||
"The commit that applied the fix is made reference too in a future commit and"
|
||||
" includes a CVE-ID."
|
||||
msgstr ""
|
||||
|
||||
#: i2p2www/pages/site/research/vrp.html:250
|
||||
@ -652,33 +574,28 @@ msgstr ""
|
||||
|
||||
#: i2p2www/pages/site/research/vrp.html:254
|
||||
msgid ""
|
||||
"Response Team and developers organize an IRC meeting to discuss why/what "
|
||||
"points\n"
|
||||
"in section III were not resolved and how the team can resolve them in the"
|
||||
"\n"
|
||||
"Response Team and developers organize an IRC meeting to discuss why/what points\n"
|
||||
"in section III were not resolved and how the team can resolve them in the\n"
|
||||
"future."
|
||||
msgstr ""
|
||||
|
||||
#: i2p2www/pages/site/research/vrp.html:259
|
||||
msgid ""
|
||||
"Any developer meetings immediately following the incident should include "
|
||||
"points\n"
|
||||
"Any developer meetings immediately following the incident should include points\n"
|
||||
"made in section V."
|
||||
msgstr ""
|
||||
|
||||
#: i2p2www/pages/site/research/vrp.html:263
|
||||
msgid ""
|
||||
"If disputes arise about whether or when to disclose information about a\n"
|
||||
"vulnerability, the Response Team will publicly discuss the issue via IRC "
|
||||
"and\n"
|
||||
"vulnerability, the Response Team will publicly discuss the issue via IRC and\n"
|
||||
"attempt to reach consensus."
|
||||
msgstr ""
|
||||
|
||||
#: i2p2www/pages/site/research/vrp.html:268
|
||||
#, python-format
|
||||
msgid ""
|
||||
"If consensus on a timely disclosure is not met (no later than %(limit)s "
|
||||
"days),\n"
|
||||
"If consensus on a timely disclosure is not met (no later than %(limit)s days),\n"
|
||||
"the researcher (after %(limit)s days) has every right to expose the\n"
|
||||
"vulnerability to the public."
|
||||
msgstr ""
|
||||
@ -693,7 +610,8 @@ msgstr ""
|
||||
|
||||
#: i2p2www/pages/site/research/vrp.html:282
|
||||
#: i2p2www/pages/site/research/vrp.html:302
|
||||
msgid "Response Team and developers should coordinate to work on the following:"
|
||||
msgid ""
|
||||
"Response Team and developers should coordinate to work on the following:"
|
||||
msgstr ""
|
||||
|
||||
#: i2p2www/pages/site/research/vrp.html:286
|
||||
@ -722,15 +640,13 @@ msgstr ""
|
||||
|
||||
#: i2p2www/pages/site/research/vrp.html:312
|
||||
msgid ""
|
||||
"If results are not sensitive, share with the public via IRC or public "
|
||||
"Trac."
|
||||
"If results are not sensitive, share with the public via IRC or public Trac."
|
||||
msgstr ""
|
||||
|
||||
#: i2p2www/pages/site/research/vrp.html:320
|
||||
#, python-format
|
||||
msgid ""
|
||||
"Response Team has %(limit)s days following completion of section III to "
|
||||
"ensure\n"
|
||||
"Response Team has %(limit)s days following completion of section III to ensure\n"
|
||||
"completion of section V."
|
||||
msgstr ""
|
||||
|
||||
@ -740,10 +656,8 @@ msgstr ""
|
||||
|
||||
#: i2p2www/pages/site/research/vrp.html:328
|
||||
msgid ""
|
||||
"Any further questions or resolutions regarding the incident(s) between "
|
||||
"the\n"
|
||||
"researcher and response + development team after public disclosure can be"
|
||||
"\n"
|
||||
"Any further questions or resolutions regarding the incident(s) between the\n"
|
||||
"researcher and response + development team after public disclosure can be\n"
|
||||
"addressed via the following:"
|
||||
msgstr ""
|
||||
|
||||
@ -753,8 +667,7 @@ msgstr ""
|
||||
|
||||
#: i2p2www/pages/site/research/vrp.html:344
|
||||
msgid ""
|
||||
"Response Team and developers should hold annual meetings to review the "
|
||||
"previous\n"
|
||||
"Response Team and developers should hold annual meetings to review the previous\n"
|
||||
"year's incidents."
|
||||
msgstr ""
|
||||
|
||||
@ -791,4 +704,3 @@ msgstr ""
|
||||
#: i2p2www/pages/site/research/vrp.html:375
|
||||
msgid "Potential changes to this process to improve future responses."
|
||||
msgstr ""
|
||||
|
||||
|
File diff suppressed because it is too large
Load Diff
File diff suppressed because it is too large
Load Diff
File diff suppressed because it is too large
Load Diff
@ -1,23 +1,23 @@
|
||||
# Azerbaijani translations for I2P.
|
||||
# Translations template for I2P.
|
||||
# Copyright (C) 2021 ORGANIZATION
|
||||
# This file is distributed under the same license as the I2P project.
|
||||
#
|
||||
#
|
||||
# Translators:
|
||||
# Nikafn <appone6@gmail.com>, 2018
|
||||
msgid ""
|
||||
msgstr ""
|
||||
"Project-Id-Version: I2P\n"
|
||||
"Project-Id-Version: I2P\n"
|
||||
"Report-Msgid-Bugs-To: http://trac.i2p2.de\n"
|
||||
"POT-Creation-Date: 2021-04-26 14:51+0000\n"
|
||||
"PO-Revision-Date: 2013-07-15 12:01+0000\n"
|
||||
"Last-Translator: Nikafn <appone6@gmail.com>, 2018\n"
|
||||
"Language-Team: Azerbaijani "
|
||||
"(http://www.transifex.com/otf/I2P/language/az/)\n"
|
||||
"Plural-Forms: nplurals=2; plural=(n != 1)\n"
|
||||
"Language-Team: Azerbaijani (http://www.transifex.com/otf/I2P/language/az/)\n"
|
||||
"MIME-Version: 1.0\n"
|
||||
"Content-Type: text/plain; charset=utf-8\n"
|
||||
"Content-Type: text/plain; charset=UTF-8\n"
|
||||
"Content-Transfer-Encoding: 8bit\n"
|
||||
"Generated-By: Babel 1.3\n"
|
||||
"Language: az\n"
|
||||
"Plural-Forms: nplurals=2; plural=(n != 1);\n"
|
||||
|
||||
#: i2p2www/pages/site/research/index.html:2
|
||||
msgid "Academic Research"
|
||||
@ -38,16 +38,11 @@ msgstr ""
|
||||
|
||||
#: i2p2www/pages/site/research/index.html:10
|
||||
msgid ""
|
||||
"I2P is a very unique project that unfortunately has not received the "
|
||||
"wider\n"
|
||||
"academic attention it deserves. To date, most research focus on anonymous"
|
||||
" and\n"
|
||||
"onion-routing technology has been around Tor, and while those papers "
|
||||
"benefit us\n"
|
||||
"as well, there is a great need for I2P-focused research. This plays a key"
|
||||
" role\n"
|
||||
"in both maintaining the security and integrity of the network, as well as"
|
||||
"\n"
|
||||
"I2P is a very unique project that unfortunately has not received the wider\n"
|
||||
"academic attention it deserves. To date, most research focus on anonymous and\n"
|
||||
"onion-routing technology has been around Tor, and while those papers benefit us\n"
|
||||
"as well, there is a great need for I2P-focused research. This plays a key role\n"
|
||||
"in both maintaining the security and integrity of the network, as well as\n"
|
||||
"opening doors for more impactful future development."
|
||||
msgstr ""
|
||||
|
||||
@ -55,43 +50,27 @@ msgstr ""
|
||||
#, python-format
|
||||
msgid ""
|
||||
"\n"
|
||||
"There is a large research community investigating a wide range of aspects"
|
||||
" of\n"
|
||||
"anonymity. For a current and comprehensive list of relevant papers, see "
|
||||
"the\n"
|
||||
"There is a large research community investigating a wide range of aspects of\n"
|
||||
"anonymity. For a current and comprehensive list of relevant papers, see the\n"
|
||||
"<a href=\"%(anonbib)s\">Free Haven Anonymity Bibliography</a>.\n"
|
||||
"I2P benefits from much of the research into Tor and onion routing, but "
|
||||
"there is\n"
|
||||
"little dedicated research interest into the theory behind I2P, and the "
|
||||
"choices\n"
|
||||
"and tradeoffs that the network makes. This presents a unique opportunity "
|
||||
"for\n"
|
||||
"I2P benefits from much of the research into Tor and onion routing, but there is\n"
|
||||
"little dedicated research interest into the theory behind I2P, and the choices\n"
|
||||
"and tradeoffs that the network makes. This presents a unique opportunity for\n"
|
||||
"original research.\n"
|
||||
msgstr ""
|
||||
"\n"
|
||||
"Anonimliyin geniş aspektlərini araşdıran böyük araşdırma icması var. "
|
||||
"Müvafiq sənədlərin cari və hərtərəfli siyahısı üçün, <a "
|
||||
"href=\"%(anonbib)s\">Free Haven Anonymity Bibliography</a>ya baxın.\n"
|
||||
"I2P, Tor və \"soğan\" istiqamətləndirici üzərinə araşdırmalardan "
|
||||
"yararlanır, ancaq I2P-nin arxasındakı nəzəriyyəni, qərarları və şəbəkənin"
|
||||
" səs verməsini araşdırmağa maraq azdır. \n"
|
||||
"Bu, orijinal araşdırma üçün unikal imkandır.\n"
|
||||
msgstr "\nAnonimliyin geniş aspektlərini araşdıran böyük araşdırma icması var. Müvafiq sənədlərin cari və hərtərəfli siyahısı üçün, <a href=\"%(anonbib)s\">Free Haven Anonymity Bibliography</a>ya baxın.\nI2P, Tor və \"soğan\" istiqamətləndirici üzərinə araşdırmalardan yararlanır, ancaq I2P-nin arxasındakı nəzəriyyəni, qərarları və şəbəkənin səs verməsini araşdırmağa maraq azdır. \nBu, orijinal araşdırma üçün unikal imkandır.\n"
|
||||
|
||||
#: i2p2www/pages/site/research/index.html:29
|
||||
#, python-format
|
||||
msgid ""
|
||||
"A list of known published papers about I2P is available <a "
|
||||
"href=\"%(papers)s\">here</a>."
|
||||
msgstr ""
|
||||
"Burada I2P haqqında tanınmış məqalələrin siyahısı <a "
|
||||
"href=\"%(papers)s\">mövcuddur </a>."
|
||||
msgstr "Burada I2P haqqında tanınmış məqalələrin siyahısı <a href=\"%(papers)s\">mövcuddur </a>."
|
||||
|
||||
#: i2p2www/pages/site/research/index.html:34
|
||||
msgid ""
|
||||
"\n"
|
||||
"This page aims to outline the most needed fields of research, notes to\n"
|
||||
"potential researchers, our general safety guidelines as well as an "
|
||||
"expanding\n"
|
||||
"potential researchers, our general safety guidelines as well as an expanding\n"
|
||||
"list of open questions that you can begin on at any time.\n"
|
||||
msgstr ""
|
||||
|
||||
@ -105,16 +84,12 @@ msgstr ""
|
||||
|
||||
#: i2p2www/pages/site/research/index.html:44
|
||||
msgid ""
|
||||
"While all research on the I2P network is beneficial and appreciated, "
|
||||
"there are\n"
|
||||
"While all research on the I2P network is beneficial and appreciated, there are\n"
|
||||
"certain areas which are more in need than others - most so in defensive\n"
|
||||
"research. Most people enjoy coming up with fun ways to launch offensives\n"
|
||||
"against anonymous software, and this is further reinforced by the "
|
||||
"incentives in\n"
|
||||
"academic institutions. While we know it is often not the first choice for"
|
||||
"\n"
|
||||
"researchers, We would certainly appreciate any and all work towards ways "
|
||||
"to\n"
|
||||
"against anonymous software, and this is further reinforced by the incentives in\n"
|
||||
"academic institutions. While we know it is often not the first choice for\n"
|
||||
"researchers, We would certainly appreciate any and all work towards ways to\n"
|
||||
"fortify the network!"
|
||||
msgstr ""
|
||||
|
||||
@ -125,27 +100,17 @@ msgstr ""
|
||||
#: i2p2www/pages/site/research/index.html:56
|
||||
#, python-format
|
||||
msgid ""
|
||||
"If you've decided on a research topic that aims to hands-on investigate "
|
||||
"the I2P\n"
|
||||
"network or solve a problem of large proportions we ask you to "
|
||||
"<b>please</b> \n"
|
||||
"<a href=\"%(contact)s\">communicate your ideas</a> to the development "
|
||||
"team, the\n"
|
||||
"sooner the better. I2P is under constant development and a significant "
|
||||
"amount\n"
|
||||
"of roadmapping occurs, therefore your problem may have already been "
|
||||
"identified\n"
|
||||
"and flagged for update or patch. In the unlikely event you are conducting"
|
||||
"\n"
|
||||
"testing that overlaps with / would be of interest to another research "
|
||||
"project\n"
|
||||
"already in motion, we are also able to make you aware of this (with their"
|
||||
"\n"
|
||||
"permission, of course), and possibly open the door for collaboration. "
|
||||
"There is\n"
|
||||
"If you've decided on a research topic that aims to hands-on investigate the I2P\n"
|
||||
"network or solve a problem of large proportions we ask you to <b>please</b> \n"
|
||||
"<a href=\"%(contact)s\">communicate your ideas</a> to the development team, the\n"
|
||||
"sooner the better. I2P is under constant development and a significant amount\n"
|
||||
"of roadmapping occurs, therefore your problem may have already been identified\n"
|
||||
"and flagged for update or patch. In the unlikely event you are conducting\n"
|
||||
"testing that overlaps with / would be of interest to another research project\n"
|
||||
"already in motion, we are also able to make you aware of this (with their\n"
|
||||
"permission, of course), and possibly open the door for collaboration. There is\n"
|
||||
"also a chance that the test itself may significantly harm the network or\n"
|
||||
"regular users, and the team may have ideas or suggestions to mitigate "
|
||||
"that risk\n"
|
||||
"regular users, and the team may have ideas or suggestions to mitigate that risk\n"
|
||||
"and increase the safety of your testing."
|
||||
msgstr ""
|
||||
|
||||
@ -161,13 +126,11 @@ msgstr ""
|
||||
msgid ""
|
||||
"<ol>\n"
|
||||
" <li>\n"
|
||||
" Consider the benefits and risks - is there any doubt that the "
|
||||
"research\n"
|
||||
" Consider the benefits and risks - is there any doubt that the research\n"
|
||||
" provides more value than danger?\n"
|
||||
" </li>\n"
|
||||
" <li>\n"
|
||||
" If the research can be done on a test network then that is the "
|
||||
"preferred\n"
|
||||
" If the research can be done on a test network then that is the preferred\n"
|
||||
" method\n"
|
||||
" </li>\n"
|
||||
" <li>\n"
|
||||
@ -175,10 +138,8 @@ msgid ""
|
||||
" collecting data about yourself\n"
|
||||
" </li>\n"
|
||||
" <li>\n"
|
||||
" If you need 'bigger data', It is recommended to first see if you can "
|
||||
"use\n"
|
||||
" data sets from previous experiments or other third party resources is"
|
||||
"\n"
|
||||
" If you need 'bigger data', It is recommended to first see if you can use\n"
|
||||
" data sets from previous experiments or other third party resources is\n"
|
||||
" recommended\n"
|
||||
" </li>\n"
|
||||
" <li>\n"
|
||||
@ -186,10 +147,8 @@ msgid ""
|
||||
" publication and collect as little as possible\n"
|
||||
" </li>\n"
|
||||
" <li>\n"
|
||||
" After testing and before publish, review that all data which is to be"
|
||||
"\n"
|
||||
" published publicly is <b><i>not</i></b> intended to be private by the"
|
||||
"\n"
|
||||
" After testing and before publish, review that all data which is to be\n"
|
||||
" published publicly is <b><i>not</i></b> intended to be private by the\n"
|
||||
" originator\n"
|
||||
" </li>\n"
|
||||
"</ol>"
|
||||
@ -201,32 +160,24 @@ msgstr ""
|
||||
|
||||
#: i2p2www/pages/site/research/index.html:108
|
||||
msgid ""
|
||||
"I2P can be run as a separate test network by controlling the locations "
|
||||
"that a\n"
|
||||
"I2P can be run as a separate test network by controlling the locations that a\n"
|
||||
"new router reseeds from so that it only finds other test routers.\n"
|
||||
"\n"
|
||||
"The standard mode of operation is to have one JVM per router instance; "
|
||||
"hence\n"
|
||||
"running multiple copies of I2P on a single machine is inadvisable, both "
|
||||
"due to\n"
|
||||
"The standard mode of operation is to have one JVM per router instance; hence\n"
|
||||
"running multiple copies of I2P on a single machine is inadvisable, both due to\n"
|
||||
"the potential resource drain and the certain port conflicts. To better\n"
|
||||
"facilitate setting up small test networks, I2P has a multirouter mode "
|
||||
"which\n"
|
||||
"facilitate setting up small test networks, I2P has a multirouter mode which\n"
|
||||
"enables multiple distinct routers to be run in the same JVM.\n"
|
||||
"\n"
|
||||
"MultiRouter can be started from the i2p base directory by running the "
|
||||
"below\n"
|
||||
"MultiRouter can be started from the i2p base directory by running the below\n"
|
||||
"command."
|
||||
msgstr ""
|
||||
|
||||
#: i2p2www/pages/site/research/index.html:124
|
||||
msgid ""
|
||||
"Additionally, I2P can be started in a virtual network mode. This mode "
|
||||
"disables\n"
|
||||
"all transports, allowing the router to be tested in isolation without "
|
||||
"network\n"
|
||||
"traffic. To enable this mode, add <code>i2p.vmCommSystem=true</code> to "
|
||||
"the\n"
|
||||
"Additionally, I2P can be started in a virtual network mode. This mode disables\n"
|
||||
"all transports, allowing the router to be tested in isolation without network\n"
|
||||
"traffic. To enable this mode, add <code>i2p.vmCommSystem=true</code> to the\n"
|
||||
"router.config before starting."
|
||||
msgstr ""
|
||||
|
||||
@ -237,13 +188,10 @@ msgstr ""
|
||||
#: i2p2www/pages/site/research/index.html:133
|
||||
#, python-format
|
||||
msgid ""
|
||||
"As stated above in the researcher notes, please <a "
|
||||
"href=\"%(contact)s\">contact\n"
|
||||
"As stated above in the researcher notes, please <a href=\"%(contact)s\">contact\n"
|
||||
" us</a> before you commence your testing. While we do not discourage\n"
|
||||
"researchers from responsibly testing their ideas on the live network, if "
|
||||
"an\n"
|
||||
"attack becomes apparent and we don't have any line of communication then "
|
||||
"we\n"
|
||||
"researchers from responsibly testing their ideas on the live network, if an\n"
|
||||
"attack becomes apparent and we don't have any line of communication then we\n"
|
||||
"will end up taking countermeasures which could interfere with the test."
|
||||
msgstr ""
|
||||
|
||||
@ -253,35 +201,23 @@ msgstr "İstiqamətləndiricinin ailə quraşdırması"
|
||||
|
||||
#: i2p2www/pages/site/research/index.html:143
|
||||
msgid ""
|
||||
"As of release 0.9.25, I2P supports a router family configuration. This "
|
||||
"provides\n"
|
||||
"researchers who run multiple routers with the means to publicly identify "
|
||||
"those\n"
|
||||
"routers. In turn, this helps the I2P project understand that these "
|
||||
"routers are\n"
|
||||
"not running an attack on the network. It also will prevent other routers "
|
||||
"from\n"
|
||||
"including multiple routers of the family in a single tunnel, which could "
|
||||
"lead\n"
|
||||
"to deanonymization. Routers that appear to be colluding but do not have a"
|
||||
"\n"
|
||||
"declared family may be assumed to be an attack on the network, and may be"
|
||||
"\n"
|
||||
"blocked. The best way to ensure the success of your research project is "
|
||||
"to work\n"
|
||||
"As of release 0.9.25, I2P supports a router family configuration. This provides\n"
|
||||
"researchers who run multiple routers with the means to publicly identify those\n"
|
||||
"routers. In turn, this helps the I2P project understand that these routers are\n"
|
||||
"not running an attack on the network. It also will prevent other routers from\n"
|
||||
"including multiple routers of the family in a single tunnel, which could lead\n"
|
||||
"to deanonymization. Routers that appear to be colluding but do not have a\n"
|
||||
"declared family may be assumed to be an attack on the network, and may be\n"
|
||||
"blocked. The best way to ensure the success of your research project is to work\n"
|
||||
"with us directly."
|
||||
msgstr ""
|
||||
|
||||
#: i2p2www/pages/site/research/index.html:155
|
||||
msgid ""
|
||||
"A router family shares a private key so that participation in the family "
|
||||
"cannot\n"
|
||||
"be spoofed. To configure a router family, click on the 'I2P Internals' "
|
||||
"link in\n"
|
||||
"the router console, and then on the 'Family' tab. Follow the instructions"
|
||||
" there\n"
|
||||
"to generate the private key for the first router in the family. Then, "
|
||||
"export\n"
|
||||
"A router family shares a private key so that participation in the family cannot\n"
|
||||
"be spoofed. To configure a router family, click on the 'I2P Internals' link in\n"
|
||||
"the router console, and then on the 'Family' tab. Follow the instructions there\n"
|
||||
"to generate the private key for the first router in the family. Then, export\n"
|
||||
"the key from that router, and import it to other members of the family."
|
||||
msgstr ""
|
||||
|
||||
@ -336,11 +272,8 @@ msgstr "Həssaslığı bildirən proses"
|
||||
#: i2p2www/pages/site/research/vrp.html:6
|
||||
msgid ""
|
||||
"\n"
|
||||
"This process is subject to change. Please refer to this page for the "
|
||||
"current VRP."
|
||||
msgstr ""
|
||||
"\n"
|
||||
"Bu proses dəyişdirilə bilər. Mövcud VRP üçün bu səhifəyə baxın."
|
||||
"This process is subject to change. Please refer to this page for the current VRP."
|
||||
msgstr "\nBu proses dəyişdirilə bilər. Mövcud VRP üçün bu səhifəyə baxın."
|
||||
|
||||
#: i2p2www/pages/site/research/vrp.html:10
|
||||
msgid "This page was last updated in June 2020."
|
||||
@ -348,22 +281,15 @@ msgstr ""
|
||||
|
||||
#: i2p2www/pages/site/research/vrp.html:12
|
||||
msgid ""
|
||||
"Researchers: while you research/hack, we ask that you refrain from the "
|
||||
"following: - Performing active exploits or Denial of Service attacks on "
|
||||
"the\n"
|
||||
"i2p network - Performing social engineering on i2p development team "
|
||||
"members - Performing any physical or electronic attempts against i2p "
|
||||
"property and/or data\n"
|
||||
"Researchers: while you research/hack, we ask that you refrain from the following: - Performing active exploits or Denial of Service attacks on the\n"
|
||||
"i2p network - Performing social engineering on i2p development team members - Performing any physical or electronic attempts against i2p property and/or data\n"
|
||||
"centers"
|
||||
msgstr ""
|
||||
|
||||
#: i2p2www/pages/site/research/vrp.html:15
|
||||
msgid ""
|
||||
"As i2p is an open-source community, many volunteers and development team "
|
||||
"members run their own I2P Sites as well as public (“non-private "
|
||||
"internet”) domains. These\n"
|
||||
"sites/servers are NOT in the scope of the vulnerability assessment / "
|
||||
"response process, only the underlying code of i2p is."
|
||||
"As i2p is an open-source community, many volunteers and development team members run their own I2P Sites as well as public (“non-private internet”) domains. These\n"
|
||||
"sites/servers are NOT in the scope of the vulnerability assessment / response process, only the underlying code of i2p is."
|
||||
msgstr ""
|
||||
|
||||
#: i2p2www/pages/site/research/vrp.html:18
|
||||
@ -390,12 +316,9 @@ msgstr ""
|
||||
|
||||
#: i2p2www/pages/site/research/vrp.html:37
|
||||
msgid ""
|
||||
"Response Team designates a Response Manager who is in charge of the "
|
||||
"particular\n"
|
||||
"Response Team designates a Response Manager who is in charge of the particular\n"
|
||||
"report based on availability and/or knowledge-set."
|
||||
msgstr ""
|
||||
"Cavab qrupu yararlılıq və/ və ya məlumat dəstinə əsaslanan konkret "
|
||||
"hesabata cavabdeh müdir təyin edir."
|
||||
msgstr "Cavab qrupu yararlılıq və/ və ya məlumat dəstinə əsaslanan konkret hesabata cavabdeh müdir təyin edir."
|
||||
|
||||
#: i2p2www/pages/site/research/vrp.html:42
|
||||
#, python-format
|
||||
@ -406,13 +329,9 @@ msgstr ""
|
||||
|
||||
#: i2p2www/pages/site/research/vrp.html:47
|
||||
msgid ""
|
||||
"Response Manager makes inquiries to satisfy any needed information and to"
|
||||
"\n"
|
||||
"Response Manager makes inquiries to satisfy any needed information and to\n"
|
||||
"confirm if submission is indeed a vulnerability."
|
||||
msgstr ""
|
||||
"Cavab meneceri hər hansı zəruri məlumatı təmin etmək üçün sorğu göndərir "
|
||||
"və \n"
|
||||
"təqdimatın həqiqətən zəiflik olduğunu təsdiqləyir."
|
||||
msgstr "Cavab meneceri hər hansı zəruri məlumatı təmin etmək üçün sorğu göndərir və \ntəqdimatın həqiqətən zəiflik olduğunu təsdiqləyir."
|
||||
|
||||
#: i2p2www/pages/site/research/vrp.html:52
|
||||
msgid "If submission proves to be vulnerable, proceed."
|
||||
@ -430,28 +349,22 @@ msgstr "Cavab meneceri təqdimatın zəif olmadığına dair səbəbləri açıq
|
||||
|
||||
#: i2p2www/pages/site/research/vrp.html:62
|
||||
msgid ""
|
||||
"Response Manager moves discussion to a new or existing ticket on public "
|
||||
"Trac if necessary."
|
||||
msgstr ""
|
||||
"Cavab meneceri müzakirəni zəruri hallarda ictimai Trac-da yeni və ya "
|
||||
"mövcud biletə keçirir."
|
||||
"Response Manager moves discussion to a new or existing ticket on public Trac"
|
||||
" if necessary."
|
||||
msgstr "Cavab meneceri müzakirəni zəruri hallarda ictimai Trac-da yeni və ya mövcud biletə keçirir."
|
||||
|
||||
#: i2p2www/pages/site/research/vrp.html:70
|
||||
msgid ""
|
||||
"\n"
|
||||
"Establish severity of vulnerability:\n"
|
||||
" "
|
||||
msgstr ""
|
||||
"\n"
|
||||
"Zəifliyin səviyyəsini müəyyən etmə:"
|
||||
msgstr "\nZəifliyin səviyyəsini müəyyən etmə:"
|
||||
|
||||
#: i2p2www/pages/site/research/vrp.html:75
|
||||
msgid ""
|
||||
"Affects network as a whole, has potential to break entire network or is "
|
||||
"on a scale of great catastrophe."
|
||||
msgstr ""
|
||||
"Effekt şəbəkəsi bütöv bir şəbəkəni pozmaq potensialına malikdir və ya "
|
||||
"böyük fəlakət miqyasındadır."
|
||||
"Affects network as a whole, has potential to break entire network or is on a"
|
||||
" scale of great catastrophe."
|
||||
msgstr "Effekt şəbəkəsi bütöv bir şəbəkəni pozmaq potensialına malikdir və ya böyük fəlakət miqyasındadır."
|
||||
|
||||
#: i2p2www/pages/site/research/vrp.html:79
|
||||
msgid "Affects individual routers, or must be carefully exploited."
|
||||
@ -468,25 +381,20 @@ msgstr "Zəiflik səviyyəsinə uyğun cavab verin:"
|
||||
#: i2p2www/pages/site/research/vrp.html:93
|
||||
#, python-format
|
||||
msgid ""
|
||||
"HIGH severities must be notified on website and news feed within "
|
||||
"%(limit)s\n"
|
||||
"HIGH severities must be notified on website and news feed within %(limit)s\n"
|
||||
"working days of classification."
|
||||
msgstr ""
|
||||
"YÜKSƏK səviyyə veb səhifələrdə və xəbər lentində %(limit)stəsnifat iş "
|
||||
"günləri daxilində bildirilməlidir."
|
||||
msgstr "YÜKSƏK səviyyə veb səhifələrdə və xəbər lentində %(limit)stəsnifat iş günləri daxilində bildirilməlidir."
|
||||
|
||||
#: i2p2www/pages/site/research/vrp.html:98
|
||||
msgid "The notification should list appropriate steps for users to take, if any."
|
||||
msgid ""
|
||||
"The notification should list appropriate steps for users to take, if any."
|
||||
msgstr "Bildirişdə istifadəçilər üçün müvafiq addımlar göstərilməlidir."
|
||||
|
||||
#: i2p2www/pages/site/research/vrp.html:101
|
||||
msgid ""
|
||||
"The notification must not include any details that could suggest an "
|
||||
"exploitation\n"
|
||||
"The notification must not include any details that could suggest an exploitation\n"
|
||||
"path."
|
||||
msgstr ""
|
||||
"Bildirişə istismar yolunu təklif edən hər hansı məlumat daxil "
|
||||
"edilməməlidir."
|
||||
msgstr "Bildirişə istismar yolunu təklif edən hər hansı məlumat daxil edilməməlidir."
|
||||
|
||||
#: i2p2www/pages/site/research/vrp.html:105
|
||||
msgid "The latter takes precedence over the former."
|
||||
@ -507,8 +415,8 @@ msgstr "Cavab qrupu müvafiq yama(lar) tətbiq edir."
|
||||
#: i2p2www/pages/site/research/vrp.html:122
|
||||
msgid ""
|
||||
"Response Manager works on a patch LOCALLY, patches are shared by the "
|
||||
"response team via PGP-encrypted e-mail until such a time as it is safe to"
|
||||
" expose to the public."
|
||||
"response team via PGP-encrypted e-mail until such a time as it is safe to "
|
||||
"expose to the public."
|
||||
msgstr ""
|
||||
|
||||
#: i2p2www/pages/site/research/vrp.html:125
|
||||
@ -517,14 +425,9 @@ msgstr "Yamalar tədqiqatçı tərəfindən nəzərdən keçirilir."
|
||||
|
||||
#: i2p2www/pages/site/research/vrp.html:128
|
||||
msgid ""
|
||||
"Any messages associated with PUBLIC commits during the time of review "
|
||||
"should not\n"
|
||||
"make reference to the security nature of the PRIVATE branch or its "
|
||||
"commits."
|
||||
msgstr ""
|
||||
"Baxış zamanı İCTİMAİ ilə əlaqəli hər hansı məlumat ÖZƏL bölmə və ya onun "
|
||||
"öhdəlliklərinin \n"
|
||||
"təhlükəsizliyinə istinad etməməlidir. "
|
||||
"Any messages associated with PUBLIC commits during the time of review should not\n"
|
||||
"make reference to the security nature of the PRIVATE branch or its commits."
|
||||
msgstr "Baxış zamanı İCTİMAİ ilə əlaqəli hər hansı məlumat ÖZƏL bölmə və ya onun öhdəlliklərinin \ntəhlükəsizliyinə istinad etməməlidir. "
|
||||
|
||||
#: i2p2www/pages/site/research/vrp.html:132
|
||||
msgid "Vulnerability announcement is drafted."
|
||||
@ -550,9 +453,7 @@ msgstr "Təqdimat tarixi müzakirə edilir."
|
||||
msgid ""
|
||||
"At release date, Response Team coordinates with developers to finalize "
|
||||
"update:"
|
||||
msgstr ""
|
||||
"Təqdimat tarixində cavab qrupu yeniləməni yekunlaşdırmaq üçün işi "
|
||||
"yaradıcılarla koordinasiya edir."
|
||||
msgstr "Təqdimat tarixində cavab qrupu yeniləməni yekunlaşdırmaq üçün işi yaradıcılarla koordinasiya edir."
|
||||
|
||||
#: i2p2www/pages/site/research/vrp.html:156
|
||||
msgid "Response Manager propagates the \"hotfix branch\" to trunk."
|
||||
@ -560,19 +461,14 @@ msgstr "Cavab meneceri \"düzəltmə bölməsi\"ni magistral xəttə yayır. "
|
||||
|
||||
#: i2p2www/pages/site/research/vrp.html:159
|
||||
msgid ""
|
||||
"Response Manager includes vulnerability announcement draft in release "
|
||||
"notes."
|
||||
"Response Manager includes vulnerability announcement draft in release notes."
|
||||
msgstr "Cavab meneceri buraxılış qeydlərinə zəiflik elanı layihəsini daxil edir. "
|
||||
|
||||
#: i2p2www/pages/site/research/vrp.html:162
|
||||
msgid ""
|
||||
"Proceed with the Point or Regular Release. At this time, it is not "
|
||||
"possible to release an in-network update for only one operating system or"
|
||||
"\n"
|
||||
"\t\tarchitecture. In order that all affected products can be released as "
|
||||
"quickly as possible, the person responsible\n"
|
||||
"\t\tfor that software should be able to perform necessary release "
|
||||
"processes in a timely manner. Importantly this should include\n"
|
||||
"Proceed with the Point or Regular Release. At this time, it is not possible to release an in-network update for only one operating system or\n"
|
||||
"\t\tarchitecture. In order that all affected products can be released as quickly as possible, the person responsible\n"
|
||||
"\t\tfor that software should be able to perform necessary release processes in a timely manner. Importantly this should include\n"
|
||||
"\t\tconsideration for package maintainers in Debian, Ubuntu and F-Droid."
|
||||
msgstr ""
|
||||
|
||||
@ -582,22 +478,20 @@ msgstr "Buraxılışdan sonra açıqlama prosesi"
|
||||
|
||||
#: i2p2www/pages/site/research/vrp.html:175
|
||||
#, python-format
|
||||
msgid "Response Team has %(limit)s days to fulfill all points within section III."
|
||||
msgstr ""
|
||||
"Cavab qrupunun III hissədəki bütün nöqtələri yerinə yetirmək üçün "
|
||||
"%(limit)s günü var."
|
||||
msgid ""
|
||||
"Response Team has %(limit)s days to fulfill all points within section III."
|
||||
msgstr "Cavab qrupunun III hissədəki bütün nöqtələri yerinə yetirmək üçün %(limit)s günü var."
|
||||
|
||||
#: i2p2www/pages/site/research/vrp.html:179
|
||||
msgid "If the Incident Response process in section III is successfully completed:"
|
||||
msgid ""
|
||||
"If the Incident Response process in section III is successfully completed:"
|
||||
msgstr "III bölmədə hadisəyə cavab prosesi uğurla başa çatdıqda:"
|
||||
|
||||
#: i2p2www/pages/site/research/vrp.html:183
|
||||
msgid ""
|
||||
"Response Manager contacts researcher and asks if researcher wishes for "
|
||||
"credit."
|
||||
msgstr ""
|
||||
"Cavab meneceri tədqiqatçı ilə əlaqə qurur və onun kredit istəyib-"
|
||||
"istəmədiyini soruşur."
|
||||
msgstr "Cavab meneceri tədqiqatçı ilə əlaqə qurur və onun kredit istəyib-istəmədiyini soruşur."
|
||||
|
||||
#: i2p2www/pages/site/research/vrp.html:186
|
||||
msgid "Finalize vulnerability announcement draft and include the following:"
|
||||
@ -616,9 +510,7 @@ msgid ""
|
||||
"Versions known to be not affected (for example, the vulnerable code was "
|
||||
"introduced in a recent version, and older versions are therefore "
|
||||
"unaffected)."
|
||||
msgstr ""
|
||||
"Təsirə məruz qalmayan versiyalar (məsələn, son versiyada zəif kod tətbiq "
|
||||
"olundu və bu səbəbdən öncəki versiyalar təsirlənmədi)."
|
||||
msgstr "Təsirə məruz qalmayan versiyalar (məsələn, son versiyada zəif kod tətbiq olundu və bu səbəbdən öncəki versiyalar təsirlənmədi)."
|
||||
|
||||
#: i2p2www/pages/site/research/vrp.html:199
|
||||
msgid "Versions not checked."
|
||||
@ -640,33 +532,28 @@ msgstr "Planlaşdırılmış, razılaşdırılmış təqdimat tarixi."
|
||||
msgid ""
|
||||
"Mitigating factors (for example, the vulnerability is only exposed in "
|
||||
"uncommon, non-default configurations)."
|
||||
msgstr ""
|
||||
"Azaldıcı amillər (məsələn, zəiflik yalnız qeyri-standart quraşdırmalarda "
|
||||
"müşahidə olunur)."
|
||||
msgstr "Azaldıcı amillər (məsələn, zəiflik yalnız qeyri-standart quraşdırmalarda müşahidə olunur)."
|
||||
|
||||
#: i2p2www/pages/site/research/vrp.html:214
|
||||
msgid ""
|
||||
"Workarounds (configuration changes users can make to reduce their "
|
||||
"exposure to the vulnerability)."
|
||||
msgstr ""
|
||||
"Müvəqqəti həllər (isifadəçilər zəifliyə məruz qalmalarını azaltmaq üçün "
|
||||
"quraşdırma dəyişiklikləri edə bilər)."
|
||||
"Workarounds (configuration changes users can make to reduce their exposure "
|
||||
"to the vulnerability)."
|
||||
msgstr "Müvəqqəti həllər (isifadəçilər zəifliyə məruz qalmalarını azaltmaq üçün quraşdırma dəyişiklikləri edə bilər)."
|
||||
|
||||
#: i2p2www/pages/site/research/vrp.html:217
|
||||
msgid "If applicable, credits to the original reporter."
|
||||
msgstr "Mümkündürsə, əsas müxbirə kredit verin."
|
||||
|
||||
#: i2p2www/pages/site/research/vrp.html:222
|
||||
msgid "Release finalized vulnerability announcement on website and in news feed."
|
||||
msgid ""
|
||||
"Release finalized vulnerability announcement on website and in news feed."
|
||||
msgstr "Vebdə və xəbər lentində yekunlaşdırılmış zəiflik elanının buraxılışı."
|
||||
|
||||
#: i2p2www/pages/site/research/vrp.html:230
|
||||
msgid ""
|
||||
"For HIGH severities, release finalized vulnerability announcement on "
|
||||
"well-known mailing lists:"
|
||||
msgstr ""
|
||||
"YÜKSƏK səviyyə üçün, yekunlaşdırılmış zəiflik elanını tanınan göndəriş "
|
||||
"siyahılarına yayın:"
|
||||
"For HIGH severities, release finalized vulnerability announcement on well-"
|
||||
"known mailing lists:"
|
||||
msgstr "YÜKSƏK səviyyə üçün, yekunlaşdırılmış zəiflik elanını tanınan göndəriş siyahılarına yayın:"
|
||||
|
||||
#: i2p2www/pages/site/research/vrp.html:238
|
||||
msgid "If applicable, developers request a CVE-ID."
|
||||
@ -674,11 +561,9 @@ msgstr "Mümkündürsə, yaradıcılar CVE-ID tələb edir."
|
||||
|
||||
#: i2p2www/pages/site/research/vrp.html:242
|
||||
msgid ""
|
||||
"The commit that applied the fix is made reference too in a future commit "
|
||||
"and includes a CVE-ID."
|
||||
msgstr ""
|
||||
"Düzeltməni tətbiq edən versiya, gələcək fiksasiyada da qeyd olunur və "
|
||||
"bura CVE-ID daxildir."
|
||||
"The commit that applied the fix is made reference too in a future commit and"
|
||||
" includes a CVE-ID."
|
||||
msgstr "Düzeltməni tətbiq edən versiya, gələcək fiksasiyada da qeyd olunur və bura CVE-ID daxildir."
|
||||
|
||||
#: i2p2www/pages/site/research/vrp.html:250
|
||||
msgid ""
|
||||
@ -688,50 +573,31 @@ msgstr "III bölmədə hadisəyə cavab prosesi uğurla başa *çatmadıqda*:"
|
||||
|
||||
#: i2p2www/pages/site/research/vrp.html:254
|
||||
msgid ""
|
||||
"Response Team and developers organize an IRC meeting to discuss why/what "
|
||||
"points\n"
|
||||
"in section III were not resolved and how the team can resolve them in the"
|
||||
"\n"
|
||||
"Response Team and developers organize an IRC meeting to discuss why/what points\n"
|
||||
"in section III were not resolved and how the team can resolve them in the\n"
|
||||
"future."
|
||||
msgstr ""
|
||||
"Cavab qrupu və yaradıcılar İİİ bölmədəki niyə/hansı nöqtələrin həll "
|
||||
"olunmadığını və gələcəkdə\n"
|
||||
" onları necə həll edə biləcəyini müzakirə etmək üçün IRC görüşünü təşkil "
|
||||
"edir."
|
||||
msgstr "Cavab qrupu və yaradıcılar İİİ bölmədəki niyə/hansı nöqtələrin həll olunmadığını və gələcəkdə\n onları necə həll edə biləcəyini müzakirə etmək üçün IRC görüşünü təşkil edir."
|
||||
|
||||
#: i2p2www/pages/site/research/vrp.html:259
|
||||
msgid ""
|
||||
"Any developer meetings immediately following the incident should include "
|
||||
"points\n"
|
||||
"Any developer meetings immediately following the incident should include points\n"
|
||||
"made in section V."
|
||||
msgstr ""
|
||||
"Hadisədən sonra yaradıcıların istənilən görüşü V bölmədəki bəndləri "
|
||||
"nəzərə almalıdır."
|
||||
msgstr "Hadisədən sonra yaradıcıların istənilən görüşü V bölmədəki bəndləri nəzərə almalıdır."
|
||||
|
||||
#: i2p2www/pages/site/research/vrp.html:263
|
||||
msgid ""
|
||||
"If disputes arise about whether or when to disclose information about a\n"
|
||||
"vulnerability, the Response Team will publicly discuss the issue via IRC "
|
||||
"and\n"
|
||||
"vulnerability, the Response Team will publicly discuss the issue via IRC and\n"
|
||||
"attempt to reach consensus."
|
||||
msgstr ""
|
||||
"Zəiflik haqqında məlumatın açıqlanması yaxud nə zaman açıqlanması ilə "
|
||||
"əlaqədar anlaşılmazlıq \n"
|
||||
"yaranarsa, cavab qrupu məsələni İRC vasitəsilə açıq müzakirə edərək, "
|
||||
"ortaq məxrəcə gəlməyə\n"
|
||||
" çalışacaq."
|
||||
msgstr "Zəiflik haqqında məlumatın açıqlanması yaxud nə zaman açıqlanması ilə əlaqədar anlaşılmazlıq \nyaranarsa, cavab qrupu məsələni İRC vasitəsilə açıq müzakirə edərək, ortaq məxrəcə gəlməyə\n çalışacaq."
|
||||
|
||||
#: i2p2www/pages/site/research/vrp.html:268
|
||||
#, python-format
|
||||
msgid ""
|
||||
"If consensus on a timely disclosure is not met (no later than %(limit)s "
|
||||
"days),\n"
|
||||
"If consensus on a timely disclosure is not met (no later than %(limit)s days),\n"
|
||||
"the researcher (after %(limit)s days) has every right to expose the\n"
|
||||
"vulnerability to the public."
|
||||
msgstr ""
|
||||
"Əgər vaxtında açıqlama verməyə dair konsensus (%(limit)sgündən gec "
|
||||
"olmayaraq) əldə olunmursa, tədqiqatçı (%(limit)sgündən sonra) zəifliyi "
|
||||
"ictimaiyyətə açıqlamaq hüququna sahibdir. "
|
||||
msgstr "Əgər vaxtında açıqlama verməyə dair konsensus (%(limit)sgündən gec olmayaraq) əldə olunmursa, tədqiqatçı (%(limit)sgündən sonra) zəifliyi ictimaiyyətə açıqlamaq hüququna sahibdir. "
|
||||
|
||||
#: i2p2www/pages/site/research/vrp.html:277
|
||||
msgid "Incident Analysis"
|
||||
@ -743,10 +609,9 @@ msgstr "Kodbazasını ayırın"
|
||||
|
||||
#: i2p2www/pages/site/research/vrp.html:282
|
||||
#: i2p2www/pages/site/research/vrp.html:302
|
||||
msgid "Response Team and developers should coordinate to work on the following:"
|
||||
msgstr ""
|
||||
"Cavab qrupu və yaradıcılar işləmək üçün aşağıdakı məsələlərlə bağlı "
|
||||
"koordinasiya etməlidirlər:"
|
||||
msgid ""
|
||||
"Response Team and developers should coordinate to work on the following:"
|
||||
msgstr "Cavab qrupu və yaradıcılar işləmək üçün aşağıdakı məsələlərlə bağlı koordinasiya etməlidirlər:"
|
||||
|
||||
#: i2p2www/pages/site/research/vrp.html:286
|
||||
msgid "Problematic implementation of classes/libraries/functions, etc."
|
||||
@ -774,21 +639,15 @@ msgstr "Daxili hesabatlar yaradın və gələcək arayış üçün saxlayın."
|
||||
|
||||
#: i2p2www/pages/site/research/vrp.html:312
|
||||
msgid ""
|
||||
"If results are not sensitive, share with the public via IRC or public "
|
||||
"Trac."
|
||||
msgstr ""
|
||||
"Nəticələr həssas deyilsə, IRC və ya ictimai Trac vasitəsilə ictimaiyyətlə"
|
||||
" bölüşün."
|
||||
"If results are not sensitive, share with the public via IRC or public Trac."
|
||||
msgstr "Nəticələr həssas deyilsə, IRC və ya ictimai Trac vasitəsilə ictimaiyyətlə bölüşün."
|
||||
|
||||
#: i2p2www/pages/site/research/vrp.html:320
|
||||
#, python-format
|
||||
msgid ""
|
||||
"Response Team has %(limit)s days following completion of section III to "
|
||||
"ensure\n"
|
||||
"Response Team has %(limit)s days following completion of section III to ensure\n"
|
||||
"completion of section V."
|
||||
msgstr ""
|
||||
"Cavab qrupunun İİİ bölümü bitirdikdən sonra V bölmənin bitməsini təmin "
|
||||
"etmək üçün %(limit)s günü var. "
|
||||
msgstr "Cavab qrupunun İİİ bölümü bitirdikdən sonra V bölmənin bitməsini təmin etmək üçün %(limit)s günü var. "
|
||||
|
||||
#: i2p2www/pages/site/research/vrp.html:326
|
||||
msgid "Resolutions"
|
||||
@ -796,15 +655,10 @@ msgstr "Qərarlar"
|
||||
|
||||
#: i2p2www/pages/site/research/vrp.html:328
|
||||
msgid ""
|
||||
"Any further questions or resolutions regarding the incident(s) between "
|
||||
"the\n"
|
||||
"researcher and response + development team after public disclosure can be"
|
||||
"\n"
|
||||
"Any further questions or resolutions regarding the incident(s) between the\n"
|
||||
"researcher and response + development team after public disclosure can be\n"
|
||||
"addressed via the following:"
|
||||
msgstr ""
|
||||
"Tədqiqatçı və cavab + inkişaf qrupu arasında istənilən əlavə suallar və "
|
||||
"ya hadisə(lər)lə bağlı qərarlar\n"
|
||||
" ictimai açıqlamadan sonra növbəti qaydada həll edilə bilər:"
|
||||
msgstr "Tədqiqatçı və cavab + inkişaf qrupu arasında istənilən əlavə suallar və ya hadisə(lər)lə bağlı qərarlar\n ictimai açıqlamadan sonra növbəti qaydada həll edilə bilər:"
|
||||
|
||||
#: i2p2www/pages/site/research/vrp.html:341
|
||||
msgid "Continuous Improvement"
|
||||
@ -812,20 +666,15 @@ msgstr "Davamlı inkişaf"
|
||||
|
||||
#: i2p2www/pages/site/research/vrp.html:344
|
||||
msgid ""
|
||||
"Response Team and developers should hold annual meetings to review the "
|
||||
"previous\n"
|
||||
"Response Team and developers should hold annual meetings to review the previous\n"
|
||||
"year's incidents."
|
||||
msgstr ""
|
||||
"Cavab qrupu və yaradıcılar əvvəlki illərin hadisələrini nəzərdən keçirmək"
|
||||
" üçün illik görüşlər keçirməlidirlər. "
|
||||
msgstr "Cavab qrupu və yaradıcılar əvvəlki illərin hadisələrini nəzərdən keçirmək üçün illik görüşlər keçirməlidirlər. "
|
||||
|
||||
#: i2p2www/pages/site/research/vrp.html:349
|
||||
msgid ""
|
||||
"Response Team or designated person(s) should give a brief presentation, "
|
||||
"including:"
|
||||
msgstr ""
|
||||
"Cavab qrupu və ya təyin edilmiş şəxs(lər) qısa təqdimat hazırlamalıdır, o"
|
||||
" cümlədən: "
|
||||
msgstr "Cavab qrupu və ya təyin edilmiş şəxs(lər) qısa təqdimat hazırlamalıdır, o cümlədən: "
|
||||
|
||||
#: i2p2www/pages/site/research/vrp.html:353
|
||||
msgid "Areas of I2P affected by the incidents."
|
||||
@ -849,11 +698,8 @@ msgstr "Təqdimatdan sonra cavab qrupu və yaradıcılar müzakirə etməlidirl
|
||||
|
||||
#: i2p2www/pages/site/research/vrp.html:372
|
||||
msgid "Potential changes to development processes to reduce future incidents."
|
||||
msgstr ""
|
||||
"Gələcək hadisələri azaltmaq üçün inkişaf proseslərinə potensial "
|
||||
"dəyişikliklər."
|
||||
msgstr "Gələcək hadisələri azaltmaq üçün inkişaf proseslərinə potensial dəyişikliklər."
|
||||
|
||||
#: i2p2www/pages/site/research/vrp.html:375
|
||||
msgid "Potential changes to this process to improve future responses."
|
||||
msgstr "Gələcək cavabları yaxşılaşdırmaq üçün bu prosesə potensial dəyişikliklər."
|
||||
|
||||
|
File diff suppressed because it is too large
Load Diff
File diff suppressed because it is too large
Load Diff
File diff suppressed because it is too large
Load Diff
File diff suppressed because it is too large
Load Diff
File diff suppressed because it is too large
Load Diff
@ -7,7 +7,7 @@ msgid ""
|
||||
msgstr ""
|
||||
"Project-Id-Version: I2P\n"
|
||||
"Report-Msgid-Bugs-To: http://trac.i2p2.de\n"
|
||||
"POT-Creation-Date: 2021-10-11 16:27+0000\n"
|
||||
"POT-Creation-Date: 2018-08-24 11:47+0000\n"
|
||||
"PO-Revision-Date: 2018-10-04 00:28+0000\n"
|
||||
"Last-Translator: erinm\n"
|
||||
"Language-Team: Danish (http://www.transifex.com/otf/I2P/language/da/)\n"
|
||||
@ -107,7 +107,7 @@ msgid ""
|
||||
"The content of this page is subject to update, discussion and dispute, "
|
||||
"and we welcome comments and additions.\n"
|
||||
"You may contribute an analysis by entering a <a href=\"%(trac)s\">new "
|
||||
"issue on Github</a>."
|
||||
"ticket on Trac</a>."
|
||||
msgstr ""
|
||||
|
||||
#: i2p2www/pages/site/comparison/other-networks.html:2
|
||||
@ -125,7 +125,7 @@ msgid ""
|
||||
"For an overview of available comparisons, see the\n"
|
||||
"<a href=\"%(comparison)s\">main network comparisons page</a>.\n"
|
||||
"You may contribute an analysis by entering a\n"
|
||||
"<a href=\"%(trac)s\">new issue on Github</a>."
|
||||
"<a href=\"%(trac)s\">new ticket on Trac</a>."
|
||||
msgstr ""
|
||||
|
||||
#: i2p2www/pages/site/comparison/other-networks.html:29
|
||||
@ -290,7 +290,7 @@ msgstr ""
|
||||
#, python-format
|
||||
msgid ""
|
||||
"You may contribute an analysis by entering a\n"
|
||||
"<a href=\"%(trac)s\">new issue on Github</a>."
|
||||
"<a href=\"%(trac)s\">new ticket on Trac</a>."
|
||||
msgstr ""
|
||||
|
||||
#: i2p2www/pages/site/comparison/other-networks.html:254
|
||||
@ -425,7 +425,7 @@ msgstr "Skjulte Tjenster"
|
||||
|
||||
#: i2p2www/pages/site/comparison/tor.html:63
|
||||
#: i2p2www/pages/site/comparison/tor.html:68
|
||||
msgid "I2P Site or Destination"
|
||||
msgid "Eepsite or Destination"
|
||||
msgstr ""
|
||||
|
||||
#: i2p2www/pages/site/comparison/tor.html:64
|
||||
@ -705,5 +705,3 @@ msgid ""
|
||||
"are insufficient messages, etc)"
|
||||
msgstr ""
|
||||
|
||||
|
||||
|
||||
|
File diff suppressed because it is too large
Load Diff
File diff suppressed because it is too large
Load Diff
File diff suppressed because it is too large
Load Diff
@ -1,7 +1,7 @@
|
||||
# German translations for I2P.
|
||||
# Translations template for I2P.
|
||||
# Copyright (C) 2021 ORGANIZATION
|
||||
# This file is distributed under the same license as the I2P project.
|
||||
#
|
||||
#
|
||||
# Translators:
|
||||
# a b <ahx7@posteo.net>, 2017
|
||||
# Ettore Atalan <atalanttore@googlemail.com>, 2014-2017,2021
|
||||
@ -10,18 +10,18 @@
|
||||
# tk2015, 2014
|
||||
msgid ""
|
||||
msgstr ""
|
||||
"Project-Id-Version: I2P\n"
|
||||
"Project-Id-Version: I2P\n"
|
||||
"Report-Msgid-Bugs-To: http://trac.i2p2.de\n"
|
||||
"POT-Creation-Date: 2021-10-11 16:27+0000\n"
|
||||
"PO-Revision-Date: 2013-07-15 11:59+0000\n"
|
||||
"Last-Translator: Ettore Atalan <atalanttore@googlemail.com>, "
|
||||
"2014-2017,2021\n"
|
||||
"Last-Translator: Ettore Atalan <atalanttore@googlemail.com>, 2014-2017,2021\n"
|
||||
"Language-Team: German (http://www.transifex.com/otf/I2P/language/de/)\n"
|
||||
"Plural-Forms: nplurals=2; plural=(n != 1)\n"
|
||||
"MIME-Version: 1.0\n"
|
||||
"Content-Type: text/plain; charset=utf-8\n"
|
||||
"Content-Type: text/plain; charset=UTF-8\n"
|
||||
"Content-Transfer-Encoding: 8bit\n"
|
||||
"Generated-By: Babel 1.3\n"
|
||||
"Language: de\n"
|
||||
"Plural-Forms: nplurals=2; plural=(n != 1);\n"
|
||||
|
||||
#: i2p2www/pages/site/comparison/freenet.html:2
|
||||
msgid "I2P Compared to Freenet"
|
||||
@ -29,74 +29,37 @@ msgstr "I2P im Vergleich zu Freenet"
|
||||
|
||||
#: i2p2www/pages/site/comparison/freenet.html:8
|
||||
msgid ""
|
||||
"Freenet is a fully distributed, peer to peer anonymous publishing "
|
||||
"network, offering \n"
|
||||
"secure ways to store data, as well as some approaches attempting to "
|
||||
"address the loads\n"
|
||||
"of a flash flood. While Freenet is designed as a distributed data store,"
|
||||
" people have\n"
|
||||
"built applications on top of it to do more generic anonymous "
|
||||
"communication, such as \n"
|
||||
"Freenet is a fully distributed, peer to peer anonymous publishing network, offering \n"
|
||||
"secure ways to store data, as well as some approaches attempting to address the loads\n"
|
||||
"of a flash flood. While Freenet is designed as a distributed data store, people have\n"
|
||||
"built applications on top of it to do more generic anonymous communication, such as \n"
|
||||
"static websites and message boards."
|
||||
msgstr ""
|
||||
"Freenet ist ein vollständig verteiltes anonymes Peer-to-Peer Netzwerk für"
|
||||
" Veröffentlichungen, welches sichere Methoden bereitstellt, Daten sicher "
|
||||
"zu speichern, so wie einige Ansätze den Lasten eines 'Flash Flood' "
|
||||
"gerecht zu werden. Während Freenet als verteilter Datenspeicher "
|
||||
"konzipiert wurde, hat die Comunity darüber hinaus Anwendungen "
|
||||
"programmiert, die mehr ursprüngliche anonyme Kommunikation zur Verfügung "
|
||||
"stellt wie statische Webseiten und Nachrichtenboards. "
|
||||
msgstr "Freenet ist ein vollständig verteiltes anonymes Peer-to-Peer Netzwerk für Veröffentlichungen, welches sichere Methoden bereitstellt, Daten sicher zu speichern, so wie einige Ansätze den Lasten eines 'Flash Flood' gerecht zu werden. Während Freenet als verteilter Datenspeicher konzipiert wurde, hat die Comunity darüber hinaus Anwendungen programmiert, die mehr ursprüngliche anonyme Kommunikation zur Verfügung stellt wie statische Webseiten und Nachrichtenboards. "
|
||||
|
||||
#: i2p2www/pages/site/comparison/freenet.html:16
|
||||
#, python-format
|
||||
msgid ""
|
||||
"Compared to I2P, Freenet offers some substantial benefits - it is a "
|
||||
"distributed data\n"
|
||||
"store, while I2P is not, allowing people to retrieve the content "
|
||||
"published by others \n"
|
||||
"even when the publisher is no longer online. In addition, it should be "
|
||||
"able to \n"
|
||||
"distribute popular data fairly efficiently. I2P itself does not and will"
|
||||
" not provide \n"
|
||||
"this functionality. On the other hand, there is overlap for users who "
|
||||
"simply want to \n"
|
||||
"communicate with each other anonymously through websites, message boards,"
|
||||
" file sharing\n"
|
||||
"programs, etc. There have also been some attempts to develop a "
|
||||
"distributed data \n"
|
||||
"Compared to I2P, Freenet offers some substantial benefits - it is a distributed data\n"
|
||||
"store, while I2P is not, allowing people to retrieve the content published by others \n"
|
||||
"even when the publisher is no longer online. In addition, it should be able to \n"
|
||||
"distribute popular data fairly efficiently. I2P itself does not and will not provide \n"
|
||||
"this functionality. On the other hand, there is overlap for users who simply want to \n"
|
||||
"communicate with each other anonymously through websites, message boards, file sharing\n"
|
||||
"programs, etc. There have also been some attempts to develop a distributed data \n"
|
||||
"store to run on top of I2P,\n"
|
||||
"(most recently a port of <a href=\"%(tahoe)s\">Tahoe-LAFS</a>)\n"
|
||||
"but nothing is yet ready for general use."
|
||||
msgstr ""
|
||||
"Verglichen mit I2P hat Freenet einige wesentliche Vorteile zu bieten.\n"
|
||||
"Freenet ist ein verteilter Datenspeicher, der es den Nutzern erlaubt, "
|
||||
"auch wenn die Quelle offline ist dessen Daten zu empfangen.Hinzu kommt, "
|
||||
"dass beliebte und viel verwendete Daten sehr effektiv verteilt werden "
|
||||
"können. I2P selbst bietet keine derartige Funktionalität und wird diese "
|
||||
"auch in Zukunft nicht tun.\n"
|
||||
"Auf der anderen Seite gibt es jedoch auch Nutzer, die einfach nur anonym "
|
||||
"kommunizieren wollen durch Websites, Message Boards, File Sharing "
|
||||
"Programme etc. Es wurden Versuche unternommen einen verteilten "
|
||||
"Datenspeicher zu entwickeln, der über I2P läuft, (zuletzt eine Portierung"
|
||||
" von <a href=\"%(tahoe)s\">Tahoe-LAFS</a>) jedoch ist derzeit nichts "
|
||||
"davon in breiterer Verwendung."
|
||||
msgstr "Verglichen mit I2P hat Freenet einige wesentliche Vorteile zu bieten.\nFreenet ist ein verteilter Datenspeicher, der es den Nutzern erlaubt, auch wenn die Quelle offline ist dessen Daten zu empfangen.Hinzu kommt, dass beliebte und viel verwendete Daten sehr effektiv verteilt werden können. I2P selbst bietet keine derartige Funktionalität und wird diese auch in Zukunft nicht tun.\nAuf der anderen Seite gibt es jedoch auch Nutzer, die einfach nur anonym kommunizieren wollen durch Websites, Message Boards, File Sharing Programme etc. Es wurden Versuche unternommen einen verteilten Datenspeicher zu entwickeln, der über I2P läuft, (zuletzt eine Portierung von <a href=\"%(tahoe)s\">Tahoe-LAFS</a>) jedoch ist derzeit nichts davon in breiterer Verwendung."
|
||||
|
||||
#: i2p2www/pages/site/comparison/freenet.html:29
|
||||
msgid ""
|
||||
"However, even ignoring any implementations issues, there are some "
|
||||
"concerns \n"
|
||||
"about Freenet's algorithms from both a scalability and anonymity "
|
||||
"perspective, owing \n"
|
||||
"largely to Freenet's heuristic driven routing. The interactions of "
|
||||
"various techniques \n"
|
||||
"certainly may successfully deter various attacks, and perhaps some "
|
||||
"aspects of the \n"
|
||||
"routing algorithms will provide the hoped for scalability. "
|
||||
"Unfortunately, not much\n"
|
||||
"analysis of the algorithms involved has resulted in positive results, but"
|
||||
" there is still\n"
|
||||
"hope. At the very least, Freenet does provide substantial anonymity "
|
||||
"against an attacker\n"
|
||||
"However, even ignoring any implementations issues, there are some concerns \n"
|
||||
"about Freenet's algorithms from both a scalability and anonymity perspective, owing \n"
|
||||
"largely to Freenet's heuristic driven routing. The interactions of various techniques \n"
|
||||
"certainly may successfully deter various attacks, and perhaps some aspects of the \n"
|
||||
"routing algorithms will provide the hoped for scalability. Unfortunately, not much\n"
|
||||
"analysis of the algorithms involved has resulted in positive results, but there is still\n"
|
||||
"hope. At the very least, Freenet does provide substantial anonymity against an attacker\n"
|
||||
"who does not have the resources necessary to analyze it further."
|
||||
msgstr ""
|
||||
|
||||
@ -106,46 +69,27 @@ msgstr "I2P im Vergleich zu anderen Projekten"
|
||||
|
||||
#: i2p2www/pages/site/comparison/index.html:4
|
||||
msgid ""
|
||||
"There are a great many other applications and projects working on "
|
||||
"anonymous \n"
|
||||
"communication and I2P has been inspired by much of their efforts. This "
|
||||
"is not \n"
|
||||
"There are a great many other applications and projects working on anonymous \n"
|
||||
"communication and I2P has been inspired by much of their efforts. This is not \n"
|
||||
"a comprehensive list of anonymity resources - both freehaven's \n"
|
||||
"<a href=\"http://freehaven.net/anonbib/topic.html\">Anonymity "
|
||||
"Bibliography</a>\n"
|
||||
"and GNUnet's <a href=\"https://www.gnunet.org/links/\">related "
|
||||
"projects</a>\n"
|
||||
"<a href=\"http://freehaven.net/anonbib/topic.html\">Anonymity Bibliography</a>\n"
|
||||
"and GNUnet's <a href=\"https://www.gnunet.org/links/\">related projects</a>\n"
|
||||
"serve that purpose well. That said, a few systems stand out for further\n"
|
||||
"comparison. The following have individual comparison pages:"
|
||||
msgstr ""
|
||||
"Es gibt sehr viele andere Anwendungen und Projekte die an anonymer "
|
||||
"Kommunikation arbeiten und I2P wurde von vielen dieser Anstrengungen "
|
||||
"inspiriert. Dies ist keine umfassende Liste anonymer Ressourcen. Sowohl "
|
||||
"freehavens\n"
|
||||
"<a href=\"http://freehaven.net/anonbib/topic.html\">Anonymity "
|
||||
"Bibliography</a>\n"
|
||||
"als auch auf GNUnet <a href=\"https://www.gnunet.org/links/\">bezogene "
|
||||
"Projekte</a>\n"
|
||||
"sind hierfür sehr gut geeignet. Einige wenige Systeme eigenen sich für\n"
|
||||
"einen weitergehenden Vergleich. Für folgende Projekte gibt eigene "
|
||||
"Vergleichsseiten:"
|
||||
msgstr "Es gibt sehr viele andere Anwendungen und Projekte die an anonymer Kommunikation arbeiten und I2P wurde von vielen dieser Anstrengungen inspiriert. Dies ist keine umfassende Liste anonymer Ressourcen. Sowohl freehavens\n<a href=\"http://freehaven.net/anonbib/topic.html\">Anonymity Bibliography</a>\nals auch auf GNUnet <a href=\"https://www.gnunet.org/links/\">bezogene Projekte</a>\nsind hierfür sehr gut geeignet. Einige wenige Systeme eigenen sich für\neinen weitergehenden Vergleich. Für folgende Projekte gibt eigene Vergleichsseiten:"
|
||||
|
||||
#: i2p2www/pages/site/comparison/index.html:20
|
||||
#, python-format
|
||||
msgid ""
|
||||
"The following are discussed on the <a href=\"%(othernetworks)s\">other "
|
||||
"networks page:</a>"
|
||||
msgstr ""
|
||||
"Die folgenden werden auf der Seite <a href=\"%(othernetworks)s\">Andere "
|
||||
"Netzwerke</a> erörtert:"
|
||||
msgstr "Die folgenden werden auf der Seite <a href=\"%(othernetworks)s\">Andere Netzwerke</a> erörtert:"
|
||||
|
||||
#: i2p2www/pages/site/comparison/index.html:33
|
||||
#, python-format
|
||||
msgid ""
|
||||
"The content of this page is subject to update, discussion and dispute, "
|
||||
"and we welcome comments and additions.\n"
|
||||
"You may contribute an analysis by entering a <a href=\"%(trac)s\">new "
|
||||
"issue on Github</a>."
|
||||
"The content of this page is subject to update, discussion and dispute, and we welcome comments and additions.\n"
|
||||
"You may contribute an analysis by entering a <a href=\"%(trac)s\">new issue on Github</a>."
|
||||
msgstr ""
|
||||
|
||||
#: i2p2www/pages/site/comparison/other-networks.html:2
|
||||
@ -170,45 +114,31 @@ msgstr ""
|
||||
#, python-format
|
||||
msgid ""
|
||||
"RetroShare is a set of peer-to-peer applications running in a\n"
|
||||
"<a href=\"%(f2fwiki)s\">Friend-to-friend (F2F)</a> network. Each peer of "
|
||||
"such F2F \n"
|
||||
"network makes direct IP connections only to authenticated peers "
|
||||
"(\"friends\") after explicit \n"
|
||||
"certificates exchange. It can discover unauthenticated peers (e.g. "
|
||||
"friends of friends), \n"
|
||||
"but connections to them are relayed over \"friend\" peers for providing "
|
||||
"privacy and anonymity."
|
||||
"<a href=\"%(f2fwiki)s\">Friend-to-friend (F2F)</a> network. Each peer of such F2F \n"
|
||||
"network makes direct IP connections only to authenticated peers (\"friends\") after explicit \n"
|
||||
"certificates exchange. It can discover unauthenticated peers (e.g. friends of friends), \n"
|
||||
"but connections to them are relayed over \"friend\" peers for providing privacy and anonymity."
|
||||
msgstr ""
|
||||
|
||||
#: i2p2www/pages/site/comparison/other-networks.html:37
|
||||
msgid ""
|
||||
"RetroShare is designed to build a private network of trusted peers, while"
|
||||
" I2P is designed \n"
|
||||
"to be a large-scaled public anonymous network. Recent versions of "
|
||||
"RetroShare have options to run \n"
|
||||
"as a public \"darknet\" by using I2P or Tor as a transport. That way all "
|
||||
"connections are \n"
|
||||
"RetroShare is designed to build a private network of trusted peers, while I2P is designed \n"
|
||||
"to be a large-scaled public anonymous network. Recent versions of RetroShare have options to run \n"
|
||||
"as a public \"darknet\" by using I2P or Tor as a transport. That way all connections are \n"
|
||||
"anonymized and no trust is required for adding new \"friends\"."
|
||||
msgstr ""
|
||||
|
||||
#: i2p2www/pages/site/comparison/other-networks.html:48
|
||||
#, python-format
|
||||
msgid ""
|
||||
"Morphmix and Tarzan are both fully distributed, peer to peer networks of"
|
||||
" \n"
|
||||
"anonymizing proxies, allowing people to tunnel out through the low "
|
||||
"latency \n"
|
||||
"mix network. Morphmix includes some very interesting collusion detection"
|
||||
" \n"
|
||||
"algorithms and Sybil defenses, while Tarzan makes use of the scarcity of "
|
||||
"IP\n"
|
||||
"Morphmix and Tarzan are both fully distributed, peer to peer networks of \n"
|
||||
"anonymizing proxies, allowing people to tunnel out through the low latency \n"
|
||||
"mix network. Morphmix includes some very interesting collusion detection \n"
|
||||
"algorithms and Sybil defenses, while Tarzan makes use of the scarcity of IP\n"
|
||||
"addresses to accomplish the same. The two primary differences between \n"
|
||||
"these systems and I2P are related to I2P's <a "
|
||||
"href=\"%(threatmodel)s\">threat model</a> \n"
|
||||
"and their out-proxy design (as opposed to providing both sender and "
|
||||
"receiver \n"
|
||||
"anonymity). There is source code available to both systems, but we are "
|
||||
"not aware \n"
|
||||
"these systems and I2P are related to I2P's <a href=\"%(threatmodel)s\">threat model</a> \n"
|
||||
"and their out-proxy design (as opposed to providing both sender and receiver \n"
|
||||
"anonymity). There is source code available to both systems, but we are not aware \n"
|
||||
"of their use outside of academic environments."
|
||||
msgstr ""
|
||||
|
||||
@ -216,19 +146,15 @@ msgstr ""
|
||||
#, python-format
|
||||
msgid ""
|
||||
"\n"
|
||||
"Mixminion and Mixmaster are networks to support anonymous email against a"
|
||||
" very\n"
|
||||
"Mixminion and Mixmaster are networks to support anonymous email against a very\n"
|
||||
"powerful adversary.\n"
|
||||
"High-latency messaging applications running on top of I2P\n"
|
||||
"(for example <a href=\"%(syndie)s\">Syndie</a> or I2PBote)\n"
|
||||
"may perhaps prove adequate to meet the threat\n"
|
||||
"model of those adversaries, while running in parallel along side the "
|
||||
"needs of low latency users, to provide\n"
|
||||
"model of those adversaries, while running in parallel along side the needs of low latency users, to provide\n"
|
||||
"a significantly larger anonymity set.\n"
|
||||
"High-latency support within the I2P router itself may or may not be added"
|
||||
" in a distant future release.\n"
|
||||
"It is too early to say if I2P will meet the needs of users requiring "
|
||||
"extreme protection for email."
|
||||
"High-latency support within the I2P router itself may or may not be added in a distant future release.\n"
|
||||
"It is too early to say if I2P will meet the needs of users requiring extreme protection for email."
|
||||
msgstr ""
|
||||
|
||||
#: i2p2www/pages/site/comparison/other-networks.html:184
|
||||
@ -240,32 +166,20 @@ msgstr ""
|
||||
#: i2p2www/pages/site/comparison/other-networks.html:194
|
||||
#, python-format
|
||||
msgid ""
|
||||
"JAP (Java Anonymous Proxy) is a network of mix cascades for anonymizing "
|
||||
"web requests,\n"
|
||||
"and as such it has a few centralized nodes (participants in the cascade) "
|
||||
"that blend\n"
|
||||
"and mix requests from clients through the sequence of nodes (the cascade)"
|
||||
" before \n"
|
||||
"proxying out onto the web. The scope, threat model, and security is "
|
||||
"substantially \n"
|
||||
"different from I2P, but for those who don't require significant anonymity"
|
||||
" but still\n"
|
||||
"are not satisfied with an Anonymizer-like service, JAP is worth "
|
||||
"reviewing. One\n"
|
||||
"caution to note is that anyone under the jurisdiction of the German "
|
||||
"courts may want\n"
|
||||
"to take care, as the German Federal Bureau of Criminal Investigation "
|
||||
"(FBCI) has \n"
|
||||
"JAP (Java Anonymous Proxy) is a network of mix cascades for anonymizing web requests,\n"
|
||||
"and as such it has a few centralized nodes (participants in the cascade) that blend\n"
|
||||
"and mix requests from clients through the sequence of nodes (the cascade) before \n"
|
||||
"proxying out onto the web. The scope, threat model, and security is substantially \n"
|
||||
"different from I2P, but for those who don't require significant anonymity but still\n"
|
||||
"are not satisfied with an Anonymizer-like service, JAP is worth reviewing. One\n"
|
||||
"caution to note is that anyone under the jurisdiction of the German courts may want\n"
|
||||
"to take care, as the German Federal Bureau of Criminal Investigation (FBCI) has \n"
|
||||
"successfully mounted an \n"
|
||||
"<a href=\"%(url)s\">attack</a> \n"
|
||||
"on the network. Even though the method of this attack was later found to"
|
||||
" be illegal \n"
|
||||
"in the German courts, the fact that the data was successfully collected "
|
||||
"is the \n"
|
||||
"concern. Courts change their minds based upon circumstance, and this is "
|
||||
"evidence that \n"
|
||||
"if a government body or intelligence agency wanted to, they could gather "
|
||||
"the data, even \n"
|
||||
"on the network. Even though the method of this attack was later found to be illegal \n"
|
||||
"in the German courts, the fact that the data was successfully collected is the \n"
|
||||
"concern. Courts change their minds based upon circumstance, and this is evidence that \n"
|
||||
"if a government body or intelligence agency wanted to, they could gather the data, even \n"
|
||||
"if it may be found inadmissible in some courts later)"
|
||||
msgstr ""
|
||||
|
||||
@ -274,36 +188,23 @@ msgstr ""
|
||||
msgid ""
|
||||
"Both of these systems work through the same basic \n"
|
||||
"<a href=\"%(antnet)s\">antnet</a> routing, providing some degree of\n"
|
||||
"anonymity based on the threat model of providing plausible deniability "
|
||||
"against a simple \n"
|
||||
"non-colluding adversary. With the antnet routing, they first either do a"
|
||||
" random walk or a \n"
|
||||
"broadcast search to find some peer with the data or identity desired, and"
|
||||
" then use a feedback\n"
|
||||
"algorithm to optimize that found path. This works well for applications "
|
||||
"that merely want to know \n"
|
||||
"what other people around them have to offer - \"How are y'all doing\" vs."
|
||||
" \"Hey Alice, how are you\" - \n"
|
||||
"you basically get a local cluster of nodes that can share files with and "
|
||||
"maintain some degree of \n"
|
||||
"anonymity (though you don't have much control over who is in that group "
|
||||
"of peers)."
|
||||
"anonymity based on the threat model of providing plausible deniability against a simple \n"
|
||||
"non-colluding adversary. With the antnet routing, they first either do a random walk or a \n"
|
||||
"broadcast search to find some peer with the data or identity desired, and then use a feedback\n"
|
||||
"algorithm to optimize that found path. This works well for applications that merely want to know \n"
|
||||
"what other people around them have to offer - \"How are y'all doing\" vs. \"Hey Alice, how are you\" - \n"
|
||||
"you basically get a local cluster of nodes that can share files with and maintain some degree of \n"
|
||||
"anonymity (though you don't have much control over who is in that group of peers)."
|
||||
msgstr ""
|
||||
|
||||
#: i2p2www/pages/site/comparison/other-networks.html:228
|
||||
msgid ""
|
||||
"However, the algorithm does not scale well at all - if the application "
|
||||
"wants to speak with a \n"
|
||||
"particular peer it ends up doing a broadcast search or random walk "
|
||||
"(though if they are lucky enough\n"
|
||||
"for that to succeed, the antnet routing should optimize that found "
|
||||
"connection). This means that \n"
|
||||
"while these networks can work great at small scales, they are not "
|
||||
"suitable for large networks where\n"
|
||||
"someone wants to get in touch with another specific peer. That does not "
|
||||
"mean that there is no \n"
|
||||
"value in these systems, just that their applicability is limited to "
|
||||
"situations where their \n"
|
||||
"However, the algorithm does not scale well at all - if the application wants to speak with a \n"
|
||||
"particular peer it ends up doing a broadcast search or random walk (though if they are lucky enough\n"
|
||||
"for that to succeed, the antnet routing should optimize that found connection). This means that \n"
|
||||
"while these networks can work great at small scales, they are not suitable for large networks where\n"
|
||||
"someone wants to get in touch with another specific peer. That does not mean that there is no \n"
|
||||
"value in these systems, just that their applicability is limited to situations where their \n"
|
||||
"particular issues can be addressed."
|
||||
msgstr ""
|
||||
|
||||
@ -311,10 +212,8 @@ msgstr ""
|
||||
#, python-format
|
||||
msgid ""
|
||||
"This was a closed-source network targeted at Iranian users.\n"
|
||||
"Tor did a <a href=\"%(torpost)s\">good writeup on what to look for in a "
|
||||
"circumvention tool</a>.\n"
|
||||
"Suffice it to say that being closed source and publicly targeting a "
|
||||
"specific country are not good ideas.\n"
|
||||
"Tor did a <a href=\"%(torpost)s\">good writeup on what to look for in a circumvention tool</a>.\n"
|
||||
"Suffice it to say that being closed source and publicly targeting a specific country are not good ideas.\n"
|
||||
"I2P is, of course, open source. However, that source, and our\n"
|
||||
"<a href=\"%(docs)s\">technical documentation</a>, need much more review."
|
||||
msgstr ""
|
||||
@ -390,9 +289,7 @@ msgstr "Vergleich der Tor- und I2P-Terminologie"
|
||||
msgid ""
|
||||
"While Tor and I2P are similar in many ways, much of the terminology is "
|
||||
"different."
|
||||
msgstr ""
|
||||
"Obwohl Tor und I2P in vielerlei Hinsicht ähnlich sind, ist ihre "
|
||||
"Terminologie weitgehend anders."
|
||||
msgstr "Obwohl Tor und I2P in vielerlei Hinsicht ähnlich sind, ist ihre Terminologie weitgehend anders."
|
||||
|
||||
#: i2p2www/pages/site/comparison/tor.html:55
|
||||
msgid "Cell"
|
||||
@ -536,15 +433,10 @@ msgstr "Vorteile von Tor gegenüber I2P"
|
||||
|
||||
#: i2p2www/pages/site/comparison/tor.html:78
|
||||
msgid ""
|
||||
"Much bigger user base; much more visibility in the academic and hacker "
|
||||
"communities; benefits from\n"
|
||||
"Much bigger user base; much more visibility in the academic and hacker communities; benefits from\n"
|
||||
"formal studies of anonymity, resistance, and performance;\n"
|
||||
"has a non-anonymous, visible, university-based leader"
|
||||
msgstr ""
|
||||
"Viel größere Nutzerbasis; kommt im akademischen Bereich und bei Hacker-"
|
||||
"Communities viel häufiger vor; profitiert von\n"
|
||||
"wissenschaftlichen Studien über Anonymität, Resistenz und Performanz;\n"
|
||||
"hat einen nicht-anonymen, bekannten Projektleiter an einer Universität"
|
||||
msgstr "Viel größere Nutzerbasis; kommt im akademischen Bereich und bei Hacker-Communities viel häufiger vor; profitiert von\nwissenschaftlichen Studien über Anonymität, Resistenz und Performanz;\nhat einen nicht-anonymen, bekannten Projektleiter an einer Universität"
|
||||
|
||||
#: i2p2www/pages/site/comparison/tor.html:84
|
||||
msgid "Has already solved some scaling issues I2P has yet to address"
|
||||
@ -560,34 +452,24 @@ msgstr "Hat mehr Entwickler, davon mehrere mit finanzieller Unterstützung"
|
||||
|
||||
#: i2p2www/pages/site/comparison/tor.html:88
|
||||
msgid ""
|
||||
"More resistant to state-level blocking due to TLS transport layer and "
|
||||
"bridges\n"
|
||||
"(I2P has proposals for \"full restricted routes\" but these are not yet "
|
||||
"implemented)"
|
||||
msgstr ""
|
||||
"Resistenter gegenüber staatlichem Sperren wegen der TLS Transportschicht "
|
||||
"und Bridges\n"
|
||||
"(bei I2P gibt es Vorschläge für \"full restricted routes\", aber diese "
|
||||
"sind noch nicht umgesetzt)"
|
||||
"More resistant to state-level blocking due to TLS transport layer and bridges\n"
|
||||
"(I2P has proposals for \"full restricted routes\" but these are not yet implemented)"
|
||||
msgstr "Resistenter gegenüber staatlichem Sperren wegen der TLS Transportschicht und Bridges\n(bei I2P gibt es Vorschläge für \"full restricted routes\", aber diese sind noch nicht umgesetzt)"
|
||||
|
||||
#: i2p2www/pages/site/comparison/tor.html:93
|
||||
msgid "Big enough that it has had to adapt to blocking and DOS attempts"
|
||||
msgstr "Groß genug, dass es sich auf Blocking und DOS-Attacken einstellen musste"
|
||||
|
||||
#: i2p2www/pages/site/comparison/tor.html:94
|
||||
msgid "Designed and optimized for exit traffic, with a large number of exit nodes"
|
||||
msgstr ""
|
||||
"Ausgerichtet und optimiert auf Exit-Traffic mit einer großen Anzahl von "
|
||||
"Exit-Knoten"
|
||||
msgid ""
|
||||
"Designed and optimized for exit traffic, with a large number of exit nodes"
|
||||
msgstr "Ausgerichtet und optimiert auf Exit-Traffic mit einer großen Anzahl von Exit-Knoten"
|
||||
|
||||
#: i2p2www/pages/site/comparison/tor.html:96
|
||||
msgid ""
|
||||
"Better documentation, has formal papers and specifications,\n"
|
||||
"better website, many more translations"
|
||||
msgstr ""
|
||||
"Bessere Dokumentation, hat wissenschaftliche Arbeiten und "
|
||||
"Spezifikationen,\n"
|
||||
"bessere Website, viel mehr Übersetzungen"
|
||||
msgstr "Bessere Dokumentation, hat wissenschaftliche Arbeiten und Spezifikationen,\nbessere Website, viel mehr Übersetzungen"
|
||||
|
||||
#: i2p2www/pages/site/comparison/tor.html:101
|
||||
msgid "More efficient with memory usage"
|
||||
@ -607,9 +489,7 @@ msgstr ""
|
||||
msgid ""
|
||||
"A core of high capacity nodes provides higher\n"
|
||||
"throughput and lower latency"
|
||||
msgstr ""
|
||||
"Ein Kern von Knoten mit hoher Kapazität\n"
|
||||
"sorgt für höheren Durchsatz und niedrigere Latenz"
|
||||
msgstr "Ein Kern von Knoten mit hoher Kapazität\nsorgt für höheren Durchsatz und niedrigere Latenz"
|
||||
|
||||
#: i2p2www/pages/site/comparison/tor.html:115
|
||||
msgid "C, not Java (ewww)"
|
||||
@ -621,8 +501,8 @@ msgstr "Vorteile von I2P gegenüber Tor"
|
||||
|
||||
#: i2p2www/pages/site/comparison/tor.html:120
|
||||
msgid ""
|
||||
"Designed and optimized for hidden services, which are much faster than in"
|
||||
" Tor"
|
||||
"Designed and optimized for hidden services, which are much faster than in "
|
||||
"Tor"
|
||||
msgstr ""
|
||||
|
||||
#: i2p2www/pages/site/comparison/tor.html:121
|
||||
@ -633,11 +513,7 @@ msgstr "Vollkommen verteilt und selbst-organisierend"
|
||||
msgid ""
|
||||
"Peers are selected by continuously profiling and ranking performance,\n"
|
||||
"rather than trusting claimed capacity"
|
||||
msgstr ""
|
||||
"Peers werden mittels fortlaufender Profilbildung und Performanzeinstufung"
|
||||
"\n"
|
||||
"ausgewählt, anstatt der von ihnen selbst angegebenen Kapazität zu "
|
||||
"vertrauen"
|
||||
msgstr "Peers werden mittels fortlaufender Profilbildung und Performanzeinstufung\nausgewählt, anstatt der von ihnen selbst angegebenen Kapazität zu vertrauen"
|
||||
|
||||
#: i2p2www/pages/site/comparison/tor.html:129
|
||||
msgid ""
|
||||
@ -647,9 +523,7 @@ msgstr ""
|
||||
|
||||
#: i2p2www/pages/site/comparison/tor.html:134
|
||||
msgid "Small enough that it hasn't been blocked or DOSed much, or at all"
|
||||
msgstr ""
|
||||
"Klein genug, dass es bisher kaum oder gar keine Blockierungen bzw. DOS-"
|
||||
"Attacken gab"
|
||||
msgstr "Klein genug, dass es bisher kaum oder gar keine Blockierungen bzw. DOS-Attacken gab"
|
||||
|
||||
#: i2p2www/pages/site/comparison/tor.html:135
|
||||
msgid "Peer-to-peer friendly"
|
||||
@ -684,10 +558,7 @@ msgid ""
|
||||
"Unidirectional tunnels instead of bidirectional\n"
|
||||
"circuits, doubling the number of nodes a peer has to\n"
|
||||
"compromise to get the same information."
|
||||
msgstr ""
|
||||
"Unidirektionale Tunnel statt bidirektionaler\n"
|
||||
"Schaltungen, was die Zahl der zu kompromittierenden Stellen\n"
|
||||
"verdoppelt um an dieselbe Information zu gelangen."
|
||||
msgstr "Unidirektionale Tunnel statt bidirektionaler\nSchaltungen, was die Zahl der zu kompromittierenden Stellen\nverdoppelt um an dieselbe Information zu gelangen."
|
||||
|
||||
#: i2p2www/pages/site/comparison/tor.html:166
|
||||
#, python-format
|
||||
@ -746,9 +617,7 @@ msgstr "Weitere potentielle Vorteile von I2P, aber noch nicht implementiert"
|
||||
|
||||
#: i2p2www/pages/site/comparison/tor.html:207
|
||||
msgid "...and may never be implemented, so don't count on them!"
|
||||
msgstr ""
|
||||
"...und die vielleicht niemals implementiert werden, also nicht darauf "
|
||||
"verlassen!"
|
||||
msgstr "...und die vielleicht niemals implementiert werden, also nicht darauf verlassen!"
|
||||
|
||||
#: i2p2www/pages/site/comparison/tor.html:210
|
||||
msgid ""
|
||||
@ -770,4 +639,3 @@ msgid ""
|
||||
"where the endpoint will inject dummy messages if there\n"
|
||||
"are insufficient messages, etc)"
|
||||
msgstr ""
|
||||
|
||||
|
File diff suppressed because it is too large
Load Diff
File diff suppressed because it is too large
Load Diff
File diff suppressed because it is too large
Load Diff
File diff suppressed because it is too large
Load Diff
@ -1,7 +1,7 @@
|
||||
# German translations for I2P.
|
||||
# Translations template for I2P.
|
||||
# Copyright (C) 2021 ORGANIZATION
|
||||
# This file is distributed under the same license as the I2P project.
|
||||
#
|
||||
#
|
||||
# Translators:
|
||||
# a b <ahx7@posteo.net>, 2017,2019
|
||||
# Ettore Atalan <atalanttore@googlemail.com>, 2014,2016-2018
|
||||
@ -11,17 +11,18 @@
|
||||
# Forecast <taisto@web.de>, 2019
|
||||
msgid ""
|
||||
msgstr ""
|
||||
"Project-Id-Version: I2P\n"
|
||||
"Project-Id-Version: I2P\n"
|
||||
"Report-Msgid-Bugs-To: http://trac.i2p2.de\n"
|
||||
"POT-Creation-Date: 2021-04-26 14:51+0000\n"
|
||||
"PO-Revision-Date: 2013-07-15 12:01+0000\n"
|
||||
"Last-Translator: a b <ahx7@posteo.net>, 2017,2019\n"
|
||||
"Language-Team: German (http://www.transifex.com/otf/I2P/language/de/)\n"
|
||||
"Plural-Forms: nplurals=2; plural=(n != 1)\n"
|
||||
"MIME-Version: 1.0\n"
|
||||
"Content-Type: text/plain; charset=utf-8\n"
|
||||
"Content-Type: text/plain; charset=UTF-8\n"
|
||||
"Content-Transfer-Encoding: 8bit\n"
|
||||
"Generated-By: Babel 1.3\n"
|
||||
"Language: de\n"
|
||||
"Plural-Forms: nplurals=2; plural=(n != 1);\n"
|
||||
|
||||
#: i2p2www/pages/site/research/index.html:2
|
||||
msgid "Academic Research"
|
||||
@ -42,80 +43,41 @@ msgstr "Forschung über das I2P-Netzwerk"
|
||||
|
||||
#: i2p2www/pages/site/research/index.html:10
|
||||
msgid ""
|
||||
"I2P is a very unique project that unfortunately has not received the "
|
||||
"wider\n"
|
||||
"academic attention it deserves. To date, most research focus on anonymous"
|
||||
" and\n"
|
||||
"onion-routing technology has been around Tor, and while those papers "
|
||||
"benefit us\n"
|
||||
"as well, there is a great need for I2P-focused research. This plays a key"
|
||||
" role\n"
|
||||
"in both maintaining the security and integrity of the network, as well as"
|
||||
"\n"
|
||||
"I2P is a very unique project that unfortunately has not received the wider\n"
|
||||
"academic attention it deserves. To date, most research focus on anonymous and\n"
|
||||
"onion-routing technology has been around Tor, and while those papers benefit us\n"
|
||||
"as well, there is a great need for I2P-focused research. This plays a key role\n"
|
||||
"in both maintaining the security and integrity of the network, as well as\n"
|
||||
"opening doors for more impactful future development."
|
||||
msgstr ""
|
||||
"I2P ist ein einzigartiges Projekt, das von akademischer Seite leider "
|
||||
"nicht\n"
|
||||
"die Aufmerksamkeit erhält, die es verdient. Bis heute konzentriert sich\n"
|
||||
"wissenschaftliche Arbeit zu anonymen und verschachtelten\n"
|
||||
"Verbindungstechnologien auf das Tor-Projekt. Während diese Publikationen\n"
|
||||
"auch uns nützen, existiert ein großer Bedarf für Forschungsarbeiten über "
|
||||
"I2P.\n"
|
||||
"Dies ist der Schüssel, um sowohl die Sicherheit und Integrität des "
|
||||
"Netzwerks\n"
|
||||
"aufrecht zu erhalten, als auch die Tür zu noch wirkungsvolleren "
|
||||
"Entwicklungen\n"
|
||||
"in der Zukunft zu eröffnen."
|
||||
msgstr "I2P ist ein einzigartiges Projekt, das von akademischer Seite leider nicht\ndie Aufmerksamkeit erhält, die es verdient. Bis heute konzentriert sich\nwissenschaftliche Arbeit zu anonymen und verschachtelten\nVerbindungstechnologien auf das Tor-Projekt. Während diese Publikationen\nauch uns nützen, existiert ein großer Bedarf für Forschungsarbeiten über I2P.\nDies ist der Schüssel, um sowohl die Sicherheit und Integrität des Netzwerks\naufrecht zu erhalten, als auch die Tür zu noch wirkungsvolleren Entwicklungen\nin der Zukunft zu eröffnen."
|
||||
|
||||
#: i2p2www/pages/site/research/index.html:19
|
||||
#, python-format
|
||||
msgid ""
|
||||
"\n"
|
||||
"There is a large research community investigating a wide range of aspects"
|
||||
" of\n"
|
||||
"anonymity. For a current and comprehensive list of relevant papers, see "
|
||||
"the\n"
|
||||
"There is a large research community investigating a wide range of aspects of\n"
|
||||
"anonymity. For a current and comprehensive list of relevant papers, see the\n"
|
||||
"<a href=\"%(anonbib)s\">Free Haven Anonymity Bibliography</a>.\n"
|
||||
"I2P benefits from much of the research into Tor and onion routing, but "
|
||||
"there is\n"
|
||||
"little dedicated research interest into the theory behind I2P, and the "
|
||||
"choices\n"
|
||||
"and tradeoffs that the network makes. This presents a unique opportunity "
|
||||
"for\n"
|
||||
"I2P benefits from much of the research into Tor and onion routing, but there is\n"
|
||||
"little dedicated research interest into the theory behind I2P, and the choices\n"
|
||||
"and tradeoffs that the network makes. This presents a unique opportunity for\n"
|
||||
"original research.\n"
|
||||
msgstr ""
|
||||
"\n"
|
||||
"Es existiert eine große Gruppe an Forschern, die eine große Liste an "
|
||||
"Themen zur Anonymität erforschen. Für eine aktuelle und umfassende Liste "
|
||||
"der relevanten Paper, schauen Sie in die <a href=\"%(anonbib)s\">Free "
|
||||
"Haven Anonymity Bibliography</a>.\n"
|
||||
"I2P profitiert viel von der Forschung an Tor und Onion Routing, aber es "
|
||||
"gibt wenig dediziertes Interesse an der Forschung zur Theorie hinter I2P,"
|
||||
" den Entscheidungen und den Abstimmungen, die das Netzwerk macht. Dieses "
|
||||
"ist eine einzigartige Chance für originale Forschung.\n"
|
||||
msgstr "\nEs existiert eine große Gruppe an Forschern, die eine große Liste an Themen zur Anonymität erforschen. Für eine aktuelle und umfassende Liste der relevanten Paper, schauen Sie in die <a href=\"%(anonbib)s\">Free Haven Anonymity Bibliography</a>.\nI2P profitiert viel von der Forschung an Tor und Onion Routing, aber es gibt wenig dediziertes Interesse an der Forschung zur Theorie hinter I2P, den Entscheidungen und den Abstimmungen, die das Netzwerk macht. Dieses ist eine einzigartige Chance für originale Forschung.\n"
|
||||
|
||||
#: i2p2www/pages/site/research/index.html:29
|
||||
#, python-format
|
||||
msgid ""
|
||||
"A list of known published papers about I2P is available <a "
|
||||
"href=\"%(papers)s\">here</a>."
|
||||
msgstr ""
|
||||
"Eine Liste der bekannten publizierten Paper über I2P ist <a "
|
||||
"href=\"%(papers)s\">hier</a> verfügbar."
|
||||
msgstr "Eine Liste der bekannten publizierten Paper über I2P ist <a href=\"%(papers)s\">hier</a> verfügbar."
|
||||
|
||||
#: i2p2www/pages/site/research/index.html:34
|
||||
msgid ""
|
||||
"\n"
|
||||
"This page aims to outline the most needed fields of research, notes to\n"
|
||||
"potential researchers, our general safety guidelines as well as an "
|
||||
"expanding\n"
|
||||
"potential researchers, our general safety guidelines as well as an expanding\n"
|
||||
"list of open questions that you can begin on at any time.\n"
|
||||
msgstr ""
|
||||
"\n"
|
||||
"Diese Seite soll die meistbenötigten Forschungsthemen umreißen;\n"
|
||||
"sie enthält Hinweise an Wissenschaftler, unsere allgemeinen "
|
||||
"Sicherheitsrichtlinien\n"
|
||||
"sowie eine wachsende Liste offener Fragen, bei denen man ansetzen kann.\n"
|
||||
msgstr "\nDiese Seite soll die meistbenötigten Forschungsthemen umreißen;\nsie enthält Hinweise an Wissenschaftler, unsere allgemeinen Sicherheitsrichtlinien\nsowie eine wachsende Liste offener Fragen, bei denen man ansetzen kann.\n"
|
||||
|
||||
#: i2p2www/pages/site/research/index.html:40
|
||||
msgid "Notes to Researchers:"
|
||||
@ -127,16 +89,12 @@ msgstr "Verteidigungsforschung"
|
||||
|
||||
#: i2p2www/pages/site/research/index.html:44
|
||||
msgid ""
|
||||
"While all research on the I2P network is beneficial and appreciated, "
|
||||
"there are\n"
|
||||
"While all research on the I2P network is beneficial and appreciated, there are\n"
|
||||
"certain areas which are more in need than others - most so in defensive\n"
|
||||
"research. Most people enjoy coming up with fun ways to launch offensives\n"
|
||||
"against anonymous software, and this is further reinforced by the "
|
||||
"incentives in\n"
|
||||
"academic institutions. While we know it is often not the first choice for"
|
||||
"\n"
|
||||
"researchers, We would certainly appreciate any and all work towards ways "
|
||||
"to\n"
|
||||
"against anonymous software, and this is further reinforced by the incentives in\n"
|
||||
"academic institutions. While we know it is often not the first choice for\n"
|
||||
"researchers, We would certainly appreciate any and all work towards ways to\n"
|
||||
"fortify the network!"
|
||||
msgstr ""
|
||||
|
||||
@ -147,27 +105,17 @@ msgstr "Offensive und analytische Tests"
|
||||
#: i2p2www/pages/site/research/index.html:56
|
||||
#, python-format
|
||||
msgid ""
|
||||
"If you've decided on a research topic that aims to hands-on investigate "
|
||||
"the I2P\n"
|
||||
"network or solve a problem of large proportions we ask you to "
|
||||
"<b>please</b> \n"
|
||||
"<a href=\"%(contact)s\">communicate your ideas</a> to the development "
|
||||
"team, the\n"
|
||||
"sooner the better. I2P is under constant development and a significant "
|
||||
"amount\n"
|
||||
"of roadmapping occurs, therefore your problem may have already been "
|
||||
"identified\n"
|
||||
"and flagged for update or patch. In the unlikely event you are conducting"
|
||||
"\n"
|
||||
"testing that overlaps with / would be of interest to another research "
|
||||
"project\n"
|
||||
"already in motion, we are also able to make you aware of this (with their"
|
||||
"\n"
|
||||
"permission, of course), and possibly open the door for collaboration. "
|
||||
"There is\n"
|
||||
"If you've decided on a research topic that aims to hands-on investigate the I2P\n"
|
||||
"network or solve a problem of large proportions we ask you to <b>please</b> \n"
|
||||
"<a href=\"%(contact)s\">communicate your ideas</a> to the development team, the\n"
|
||||
"sooner the better. I2P is under constant development and a significant amount\n"
|
||||
"of roadmapping occurs, therefore your problem may have already been identified\n"
|
||||
"and flagged for update or patch. In the unlikely event you are conducting\n"
|
||||
"testing that overlaps with / would be of interest to another research project\n"
|
||||
"already in motion, we are also able to make you aware of this (with their\n"
|
||||
"permission, of course), and possibly open the door for collaboration. There is\n"
|
||||
"also a chance that the test itself may significantly harm the network or\n"
|
||||
"regular users, and the team may have ideas or suggestions to mitigate "
|
||||
"that risk\n"
|
||||
"regular users, and the team may have ideas or suggestions to mitigate that risk\n"
|
||||
"and increase the safety of your testing."
|
||||
msgstr ""
|
||||
|
||||
@ -183,13 +131,11 @@ msgstr "Allgemeine Richtlinien"
|
||||
msgid ""
|
||||
"<ol>\n"
|
||||
" <li>\n"
|
||||
" Consider the benefits and risks - is there any doubt that the "
|
||||
"research\n"
|
||||
" Consider the benefits and risks - is there any doubt that the research\n"
|
||||
" provides more value than danger?\n"
|
||||
" </li>\n"
|
||||
" <li>\n"
|
||||
" If the research can be done on a test network then that is the "
|
||||
"preferred\n"
|
||||
" If the research can be done on a test network then that is the preferred\n"
|
||||
" method\n"
|
||||
" </li>\n"
|
||||
" <li>\n"
|
||||
@ -197,10 +143,8 @@ msgid ""
|
||||
" collecting data about yourself\n"
|
||||
" </li>\n"
|
||||
" <li>\n"
|
||||
" If you need 'bigger data', It is recommended to first see if you can "
|
||||
"use\n"
|
||||
" data sets from previous experiments or other third party resources is"
|
||||
"\n"
|
||||
" If you need 'bigger data', It is recommended to first see if you can use\n"
|
||||
" data sets from previous experiments or other third party resources is\n"
|
||||
" recommended\n"
|
||||
" </li>\n"
|
||||
" <li>\n"
|
||||
@ -208,10 +152,8 @@ msgid ""
|
||||
" publication and collect as little as possible\n"
|
||||
" </li>\n"
|
||||
" <li>\n"
|
||||
" After testing and before publish, review that all data which is to be"
|
||||
"\n"
|
||||
" published publicly is <b><i>not</i></b> intended to be private by the"
|
||||
"\n"
|
||||
" After testing and before publish, review that all data which is to be\n"
|
||||
" published publicly is <b><i>not</i></b> intended to be private by the\n"
|
||||
" originator\n"
|
||||
" </li>\n"
|
||||
"</ol>"
|
||||
@ -223,32 +165,24 @@ msgstr ""
|
||||
|
||||
#: i2p2www/pages/site/research/index.html:108
|
||||
msgid ""
|
||||
"I2P can be run as a separate test network by controlling the locations "
|
||||
"that a\n"
|
||||
"I2P can be run as a separate test network by controlling the locations that a\n"
|
||||
"new router reseeds from so that it only finds other test routers.\n"
|
||||
"\n"
|
||||
"The standard mode of operation is to have one JVM per router instance; "
|
||||
"hence\n"
|
||||
"running multiple copies of I2P on a single machine is inadvisable, both "
|
||||
"due to\n"
|
||||
"The standard mode of operation is to have one JVM per router instance; hence\n"
|
||||
"running multiple copies of I2P on a single machine is inadvisable, both due to\n"
|
||||
"the potential resource drain and the certain port conflicts. To better\n"
|
||||
"facilitate setting up small test networks, I2P has a multirouter mode "
|
||||
"which\n"
|
||||
"facilitate setting up small test networks, I2P has a multirouter mode which\n"
|
||||
"enables multiple distinct routers to be run in the same JVM.\n"
|
||||
"\n"
|
||||
"MultiRouter can be started from the i2p base directory by running the "
|
||||
"below\n"
|
||||
"MultiRouter can be started from the i2p base directory by running the below\n"
|
||||
"command."
|
||||
msgstr ""
|
||||
|
||||
#: i2p2www/pages/site/research/index.html:124
|
||||
msgid ""
|
||||
"Additionally, I2P can be started in a virtual network mode. This mode "
|
||||
"disables\n"
|
||||
"all transports, allowing the router to be tested in isolation without "
|
||||
"network\n"
|
||||
"traffic. To enable this mode, add <code>i2p.vmCommSystem=true</code> to "
|
||||
"the\n"
|
||||
"Additionally, I2P can be started in a virtual network mode. This mode disables\n"
|
||||
"all transports, allowing the router to be tested in isolation without network\n"
|
||||
"traffic. To enable this mode, add <code>i2p.vmCommSystem=true</code> to the\n"
|
||||
"router.config before starting."
|
||||
msgstr ""
|
||||
|
||||
@ -259,13 +193,10 @@ msgstr "Am Live I2P Netzwerk test"
|
||||
#: i2p2www/pages/site/research/index.html:133
|
||||
#, python-format
|
||||
msgid ""
|
||||
"As stated above in the researcher notes, please <a "
|
||||
"href=\"%(contact)s\">contact\n"
|
||||
"As stated above in the researcher notes, please <a href=\"%(contact)s\">contact\n"
|
||||
" us</a> before you commence your testing. While we do not discourage\n"
|
||||
"researchers from responsibly testing their ideas on the live network, if "
|
||||
"an\n"
|
||||
"attack becomes apparent and we don't have any line of communication then "
|
||||
"we\n"
|
||||
"researchers from responsibly testing their ideas on the live network, if an\n"
|
||||
"attack becomes apparent and we don't have any line of communication then we\n"
|
||||
"will end up taking countermeasures which could interfere with the test."
|
||||
msgstr ""
|
||||
|
||||
@ -275,35 +206,23 @@ msgstr "Routerfamilienkonfiguration"
|
||||
|
||||
#: i2p2www/pages/site/research/index.html:143
|
||||
msgid ""
|
||||
"As of release 0.9.25, I2P supports a router family configuration. This "
|
||||
"provides\n"
|
||||
"researchers who run multiple routers with the means to publicly identify "
|
||||
"those\n"
|
||||
"routers. In turn, this helps the I2P project understand that these "
|
||||
"routers are\n"
|
||||
"not running an attack on the network. It also will prevent other routers "
|
||||
"from\n"
|
||||
"including multiple routers of the family in a single tunnel, which could "
|
||||
"lead\n"
|
||||
"to deanonymization. Routers that appear to be colluding but do not have a"
|
||||
"\n"
|
||||
"declared family may be assumed to be an attack on the network, and may be"
|
||||
"\n"
|
||||
"blocked. The best way to ensure the success of your research project is "
|
||||
"to work\n"
|
||||
"As of release 0.9.25, I2P supports a router family configuration. This provides\n"
|
||||
"researchers who run multiple routers with the means to publicly identify those\n"
|
||||
"routers. In turn, this helps the I2P project understand that these routers are\n"
|
||||
"not running an attack on the network. It also will prevent other routers from\n"
|
||||
"including multiple routers of the family in a single tunnel, which could lead\n"
|
||||
"to deanonymization. Routers that appear to be colluding but do not have a\n"
|
||||
"declared family may be assumed to be an attack on the network, and may be\n"
|
||||
"blocked. The best way to ensure the success of your research project is to work\n"
|
||||
"with us directly."
|
||||
msgstr ""
|
||||
|
||||
#: i2p2www/pages/site/research/index.html:155
|
||||
msgid ""
|
||||
"A router family shares a private key so that participation in the family "
|
||||
"cannot\n"
|
||||
"be spoofed. To configure a router family, click on the 'I2P Internals' "
|
||||
"link in\n"
|
||||
"the router console, and then on the 'Family' tab. Follow the instructions"
|
||||
" there\n"
|
||||
"to generate the private key for the first router in the family. Then, "
|
||||
"export\n"
|
||||
"A router family shares a private key so that participation in the family cannot\n"
|
||||
"be spoofed. To configure a router family, click on the 'I2P Internals' link in\n"
|
||||
"the router console, and then on the 'Family' tab. Follow the instructions there\n"
|
||||
"to generate the private key for the first router in the family. Then, export\n"
|
||||
"the key from that router, and import it to other members of the family."
|
||||
msgstr ""
|
||||
|
||||
@ -358,12 +277,8 @@ msgstr "Sicherheitslücken-Reaktionsteam"
|
||||
#: i2p2www/pages/site/research/vrp.html:6
|
||||
msgid ""
|
||||
"\n"
|
||||
"This process is subject to change. Please refer to this page for the "
|
||||
"current VRP."
|
||||
msgstr ""
|
||||
"\n"
|
||||
"Dieser Prozessablauf wird derzeit geändert. Der aktuelle Stand kann hier "
|
||||
"eingesehen werden."
|
||||
"This process is subject to change. Please refer to this page for the current VRP."
|
||||
msgstr "\nDieser Prozessablauf wird derzeit geändert. Der aktuelle Stand kann hier eingesehen werden."
|
||||
|
||||
#: i2p2www/pages/site/research/vrp.html:10
|
||||
msgid "This page was last updated in June 2020."
|
||||
@ -371,22 +286,15 @@ msgstr ""
|
||||
|
||||
#: i2p2www/pages/site/research/vrp.html:12
|
||||
msgid ""
|
||||
"Researchers: while you research/hack, we ask that you refrain from the "
|
||||
"following: - Performing active exploits or Denial of Service attacks on "
|
||||
"the\n"
|
||||
"i2p network - Performing social engineering on i2p development team "
|
||||
"members - Performing any physical or electronic attempts against i2p "
|
||||
"property and/or data\n"
|
||||
"Researchers: while you research/hack, we ask that you refrain from the following: - Performing active exploits or Denial of Service attacks on the\n"
|
||||
"i2p network - Performing social engineering on i2p development team members - Performing any physical or electronic attempts against i2p property and/or data\n"
|
||||
"centers"
|
||||
msgstr ""
|
||||
|
||||
#: i2p2www/pages/site/research/vrp.html:15
|
||||
msgid ""
|
||||
"As i2p is an open-source community, many volunteers and development team "
|
||||
"members run their own I2P Sites as well as public (“non-private "
|
||||
"internet”) domains. These\n"
|
||||
"sites/servers are NOT in the scope of the vulnerability assessment / "
|
||||
"response process, only the underlying code of i2p is."
|
||||
"As i2p is an open-source community, many volunteers and development team members run their own I2P Sites as well as public (“non-private internet”) domains. These\n"
|
||||
"sites/servers are NOT in the scope of the vulnerability assessment / response process, only the underlying code of i2p is."
|
||||
msgstr ""
|
||||
|
||||
#: i2p2www/pages/site/research/vrp.html:18
|
||||
@ -413,8 +321,7 @@ msgstr ""
|
||||
|
||||
#: i2p2www/pages/site/research/vrp.html:37
|
||||
msgid ""
|
||||
"Response Team designates a Response Manager who is in charge of the "
|
||||
"particular\n"
|
||||
"Response Team designates a Response Manager who is in charge of the particular\n"
|
||||
"report based on availability and/or knowledge-set."
|
||||
msgstr ""
|
||||
|
||||
@ -427,8 +334,7 @@ msgstr ""
|
||||
|
||||
#: i2p2www/pages/site/research/vrp.html:47
|
||||
msgid ""
|
||||
"Response Manager makes inquiries to satisfy any needed information and to"
|
||||
"\n"
|
||||
"Response Manager makes inquiries to satisfy any needed information and to\n"
|
||||
"confirm if submission is indeed a vulnerability."
|
||||
msgstr ""
|
||||
|
||||
@ -444,36 +350,26 @@ msgstr "Wenn sie keine Sicherheitslücke ist:"
|
||||
msgid ""
|
||||
"Response Manager responds with reasons why submission is not a "
|
||||
"vulnerability."
|
||||
msgstr ""
|
||||
"Der Response-Manager gibt eine begründete Antwort warum die Einreichung "
|
||||
"keine Sicherheitslücke darstellt."
|
||||
msgstr "Der Response-Manager gibt eine begründete Antwort warum die Einreichung keine Sicherheitslücke darstellt."
|
||||
|
||||
#: i2p2www/pages/site/research/vrp.html:62
|
||||
msgid ""
|
||||
"Response Manager moves discussion to a new or existing ticket on public "
|
||||
"Trac if necessary."
|
||||
msgstr ""
|
||||
"Der Response-Manager verschiebt die Diskussion in ein neues oder "
|
||||
"existierendes Ticket im öffentlichen Bereich des Trac falls nötig."
|
||||
"Response Manager moves discussion to a new or existing ticket on public Trac"
|
||||
" if necessary."
|
||||
msgstr "Der Response-Manager verschiebt die Diskussion in ein neues oder existierendes Ticket im öffentlichen Bereich des Trac falls nötig."
|
||||
|
||||
#: i2p2www/pages/site/research/vrp.html:70
|
||||
msgid ""
|
||||
"\n"
|
||||
"Establish severity of vulnerability:\n"
|
||||
" "
|
||||
msgstr ""
|
||||
"\n"
|
||||
"Schweregrad der Sicherheitslücke feststellen:\n"
|
||||
" "
|
||||
msgstr "\nSchweregrad der Sicherheitslücke feststellen:\n "
|
||||
|
||||
#: i2p2www/pages/site/research/vrp.html:75
|
||||
msgid ""
|
||||
"Affects network as a whole, has potential to break entire network or is "
|
||||
"on a scale of great catastrophe."
|
||||
msgstr ""
|
||||
"Betrifft das Netzwerk als solches, hat das Potential das ganze Netzwerk "
|
||||
"lahmzulegen oder gehört in die Größenordnung einer bedeutsamen "
|
||||
"Katastrophe."
|
||||
"Affects network as a whole, has potential to break entire network or is on a"
|
||||
" scale of great catastrophe."
|
||||
msgstr "Betrifft das Netzwerk als solches, hat das Potential das ganze Netzwerk lahmzulegen oder gehört in die Größenordnung einer bedeutsamen Katastrophe."
|
||||
|
||||
#: i2p2www/pages/site/research/vrp.html:79
|
||||
msgid "Affects individual routers, or must be carefully exploited."
|
||||
@ -490,29 +386,20 @@ msgstr ""
|
||||
#: i2p2www/pages/site/research/vrp.html:93
|
||||
#, python-format
|
||||
msgid ""
|
||||
"HIGH severities must be notified on website and news feed within "
|
||||
"%(limit)s\n"
|
||||
"HIGH severities must be notified on website and news feed within %(limit)s\n"
|
||||
"working days of classification."
|
||||
msgstr ""
|
||||
"Schweregrad HIGH muss auf der Website und im Nachrichten-Feed innerhalb "
|
||||
"von %(limit)s\n"
|
||||
"Werktagen ab Einstufung bekannt gegeben werden."
|
||||
msgstr "Schweregrad HIGH muss auf der Website und im Nachrichten-Feed innerhalb von %(limit)s\nWerktagen ab Einstufung bekannt gegeben werden."
|
||||
|
||||
#: i2p2www/pages/site/research/vrp.html:98
|
||||
msgid "The notification should list appropriate steps for users to take, if any."
|
||||
msgstr ""
|
||||
"Die Bekanntmachung sollte den Nutzern angemessene Gegenmaßnahmen "
|
||||
"nahelegen, falls möglich."
|
||||
msgid ""
|
||||
"The notification should list appropriate steps for users to take, if any."
|
||||
msgstr "Die Bekanntmachung sollte den Nutzern angemessene Gegenmaßnahmen nahelegen, falls möglich."
|
||||
|
||||
#: i2p2www/pages/site/research/vrp.html:101
|
||||
msgid ""
|
||||
"The notification must not include any details that could suggest an "
|
||||
"exploitation\n"
|
||||
"The notification must not include any details that could suggest an exploitation\n"
|
||||
"path."
|
||||
msgstr ""
|
||||
"Die Bekanntmachung darf keine Details offenlegen, die eine Möglichkeit "
|
||||
"zur Ausnutzung\n"
|
||||
"aufzeigen."
|
||||
msgstr "Die Bekanntmachung darf keine Details offenlegen, die eine Möglichkeit zur Ausnutzung\naufzeigen."
|
||||
|
||||
#: i2p2www/pages/site/research/vrp.html:105
|
||||
msgid "The latter takes precedence over the former."
|
||||
@ -533,8 +420,8 @@ msgstr "Das Reaktionsteam wendet geeignete Patches an."
|
||||
#: i2p2www/pages/site/research/vrp.html:122
|
||||
msgid ""
|
||||
"Response Manager works on a patch LOCALLY, patches are shared by the "
|
||||
"response team via PGP-encrypted e-mail until such a time as it is safe to"
|
||||
" expose to the public."
|
||||
"response team via PGP-encrypted e-mail until such a time as it is safe to "
|
||||
"expose to the public."
|
||||
msgstr ""
|
||||
|
||||
#: i2p2www/pages/site/research/vrp.html:125
|
||||
@ -543,10 +430,8 @@ msgstr ""
|
||||
|
||||
#: i2p2www/pages/site/research/vrp.html:128
|
||||
msgid ""
|
||||
"Any messages associated with PUBLIC commits during the time of review "
|
||||
"should not\n"
|
||||
"make reference to the security nature of the PRIVATE branch or its "
|
||||
"commits."
|
||||
"Any messages associated with PUBLIC commits during the time of review should not\n"
|
||||
"make reference to the security nature of the PRIVATE branch or its commits."
|
||||
msgstr ""
|
||||
|
||||
#: i2p2www/pages/site/research/vrp.html:132
|
||||
@ -581,19 +466,14 @@ msgstr ""
|
||||
|
||||
#: i2p2www/pages/site/research/vrp.html:159
|
||||
msgid ""
|
||||
"Response Manager includes vulnerability announcement draft in release "
|
||||
"notes."
|
||||
"Response Manager includes vulnerability announcement draft in release notes."
|
||||
msgstr ""
|
||||
|
||||
#: i2p2www/pages/site/research/vrp.html:162
|
||||
msgid ""
|
||||
"Proceed with the Point or Regular Release. At this time, it is not "
|
||||
"possible to release an in-network update for only one operating system or"
|
||||
"\n"
|
||||
"\t\tarchitecture. In order that all affected products can be released as "
|
||||
"quickly as possible, the person responsible\n"
|
||||
"\t\tfor that software should be able to perform necessary release "
|
||||
"processes in a timely manner. Importantly this should include\n"
|
||||
"Proceed with the Point or Regular Release. At this time, it is not possible to release an in-network update for only one operating system or\n"
|
||||
"\t\tarchitecture. In order that all affected products can be released as quickly as possible, the person responsible\n"
|
||||
"\t\tfor that software should be able to perform necessary release processes in a timely manner. Importantly this should include\n"
|
||||
"\t\tconsideration for package maintainers in Debian, Ubuntu and F-Droid."
|
||||
msgstr ""
|
||||
|
||||
@ -603,11 +483,13 @@ msgstr ""
|
||||
|
||||
#: i2p2www/pages/site/research/vrp.html:175
|
||||
#, python-format
|
||||
msgid "Response Team has %(limit)s days to fulfill all points within section III."
|
||||
msgid ""
|
||||
"Response Team has %(limit)s days to fulfill all points within section III."
|
||||
msgstr ""
|
||||
|
||||
#: i2p2www/pages/site/research/vrp.html:179
|
||||
msgid "If the Incident Response process in section III is successfully completed:"
|
||||
msgid ""
|
||||
"If the Incident Response process in section III is successfully completed:"
|
||||
msgstr ""
|
||||
|
||||
#: i2p2www/pages/site/research/vrp.html:183
|
||||
@ -618,9 +500,7 @@ msgstr ""
|
||||
|
||||
#: i2p2www/pages/site/research/vrp.html:186
|
||||
msgid "Finalize vulnerability announcement draft and include the following:"
|
||||
msgstr ""
|
||||
"Die Ankündigung der Sicherheitslücke wird fertiggestellt und soll das "
|
||||
"Folgende enthalten:"
|
||||
msgstr "Die Ankündigung der Sicherheitslücke wird fertiggestellt und soll das Folgende enthalten:"
|
||||
|
||||
#: i2p2www/pages/site/research/vrp.html:190
|
||||
msgid "Project name and URL."
|
||||
@ -635,10 +515,7 @@ msgid ""
|
||||
"Versions known to be not affected (for example, the vulnerable code was "
|
||||
"introduced in a recent version, and older versions are therefore "
|
||||
"unaffected)."
|
||||
msgstr ""
|
||||
"Nicht betroffene Versionen (z.B. wenn der sicherheitskritische Code in "
|
||||
"einer neuen Version hinzugekommen ist und ältere Versionen das Problem "
|
||||
"dadurch nicht haben)."
|
||||
msgstr "Nicht betroffene Versionen (z.B. wenn der sicherheitskritische Code in einer neuen Version hinzugekommen ist und ältere Versionen das Problem dadurch nicht haben)."
|
||||
|
||||
#: i2p2www/pages/site/research/vrp.html:199
|
||||
msgid "Versions not checked."
|
||||
@ -664,8 +541,8 @@ msgstr ""
|
||||
|
||||
#: i2p2www/pages/site/research/vrp.html:214
|
||||
msgid ""
|
||||
"Workarounds (configuration changes users can make to reduce their "
|
||||
"exposure to the vulnerability)."
|
||||
"Workarounds (configuration changes users can make to reduce their exposure "
|
||||
"to the vulnerability)."
|
||||
msgstr ""
|
||||
|
||||
#: i2p2www/pages/site/research/vrp.html:217
|
||||
@ -673,13 +550,14 @@ msgid "If applicable, credits to the original reporter."
|
||||
msgstr ""
|
||||
|
||||
#: i2p2www/pages/site/research/vrp.html:222
|
||||
msgid "Release finalized vulnerability announcement on website and in news feed."
|
||||
msgid ""
|
||||
"Release finalized vulnerability announcement on website and in news feed."
|
||||
msgstr ""
|
||||
|
||||
#: i2p2www/pages/site/research/vrp.html:230
|
||||
msgid ""
|
||||
"For HIGH severities, release finalized vulnerability announcement on "
|
||||
"well-known mailing lists:"
|
||||
"For HIGH severities, release finalized vulnerability announcement on well-"
|
||||
"known mailing lists:"
|
||||
msgstr ""
|
||||
|
||||
#: i2p2www/pages/site/research/vrp.html:238
|
||||
@ -688,8 +566,8 @@ msgstr ""
|
||||
|
||||
#: i2p2www/pages/site/research/vrp.html:242
|
||||
msgid ""
|
||||
"The commit that applied the fix is made reference too in a future commit "
|
||||
"and includes a CVE-ID."
|
||||
"The commit that applied the fix is made reference too in a future commit and"
|
||||
" includes a CVE-ID."
|
||||
msgstr ""
|
||||
|
||||
#: i2p2www/pages/site/research/vrp.html:250
|
||||
@ -700,33 +578,28 @@ msgstr ""
|
||||
|
||||
#: i2p2www/pages/site/research/vrp.html:254
|
||||
msgid ""
|
||||
"Response Team and developers organize an IRC meeting to discuss why/what "
|
||||
"points\n"
|
||||
"in section III were not resolved and how the team can resolve them in the"
|
||||
"\n"
|
||||
"Response Team and developers organize an IRC meeting to discuss why/what points\n"
|
||||
"in section III were not resolved and how the team can resolve them in the\n"
|
||||
"future."
|
||||
msgstr ""
|
||||
|
||||
#: i2p2www/pages/site/research/vrp.html:259
|
||||
msgid ""
|
||||
"Any developer meetings immediately following the incident should include "
|
||||
"points\n"
|
||||
"Any developer meetings immediately following the incident should include points\n"
|
||||
"made in section V."
|
||||
msgstr ""
|
||||
|
||||
#: i2p2www/pages/site/research/vrp.html:263
|
||||
msgid ""
|
||||
"If disputes arise about whether or when to disclose information about a\n"
|
||||
"vulnerability, the Response Team will publicly discuss the issue via IRC "
|
||||
"and\n"
|
||||
"vulnerability, the Response Team will publicly discuss the issue via IRC and\n"
|
||||
"attempt to reach consensus."
|
||||
msgstr ""
|
||||
|
||||
#: i2p2www/pages/site/research/vrp.html:268
|
||||
#, python-format
|
||||
msgid ""
|
||||
"If consensus on a timely disclosure is not met (no later than %(limit)s "
|
||||
"days),\n"
|
||||
"If consensus on a timely disclosure is not met (no later than %(limit)s days),\n"
|
||||
"the researcher (after %(limit)s days) has every right to expose the\n"
|
||||
"vulnerability to the public."
|
||||
msgstr ""
|
||||
@ -741,7 +614,8 @@ msgstr "Codebasis isolieren"
|
||||
|
||||
#: i2p2www/pages/site/research/vrp.html:282
|
||||
#: i2p2www/pages/site/research/vrp.html:302
|
||||
msgid "Response Team and developers should coordinate to work on the following:"
|
||||
msgid ""
|
||||
"Response Team and developers should coordinate to work on the following:"
|
||||
msgstr ""
|
||||
|
||||
#: i2p2www/pages/site/research/vrp.html:286
|
||||
@ -770,15 +644,13 @@ msgstr ""
|
||||
|
||||
#: i2p2www/pages/site/research/vrp.html:312
|
||||
msgid ""
|
||||
"If results are not sensitive, share with the public via IRC or public "
|
||||
"Trac."
|
||||
"If results are not sensitive, share with the public via IRC or public Trac."
|
||||
msgstr ""
|
||||
|
||||
#: i2p2www/pages/site/research/vrp.html:320
|
||||
#, python-format
|
||||
msgid ""
|
||||
"Response Team has %(limit)s days following completion of section III to "
|
||||
"ensure\n"
|
||||
"Response Team has %(limit)s days following completion of section III to ensure\n"
|
||||
"completion of section V."
|
||||
msgstr ""
|
||||
|
||||
@ -788,10 +660,8 @@ msgstr ""
|
||||
|
||||
#: i2p2www/pages/site/research/vrp.html:328
|
||||
msgid ""
|
||||
"Any further questions or resolutions regarding the incident(s) between "
|
||||
"the\n"
|
||||
"researcher and response + development team after public disclosure can be"
|
||||
"\n"
|
||||
"Any further questions or resolutions regarding the incident(s) between the\n"
|
||||
"researcher and response + development team after public disclosure can be\n"
|
||||
"addressed via the following:"
|
||||
msgstr ""
|
||||
|
||||
@ -801,8 +671,7 @@ msgstr "Kontinuierliche Verbesserungen"
|
||||
|
||||
#: i2p2www/pages/site/research/vrp.html:344
|
||||
msgid ""
|
||||
"Response Team and developers should hold annual meetings to review the "
|
||||
"previous\n"
|
||||
"Response Team and developers should hold annual meetings to review the previous\n"
|
||||
"year's incidents."
|
||||
msgstr ""
|
||||
|
||||
@ -839,4 +708,3 @@ msgstr ""
|
||||
#: i2p2www/pages/site/research/vrp.html:375
|
||||
msgid "Potential changes to this process to improve future responses."
|
||||
msgstr ""
|
||||
|
||||
|
File diff suppressed because it is too large
Load Diff
File diff suppressed because it is too large
Load Diff
File diff suppressed because it is too large
Load Diff
File diff suppressed because it is too large
Load Diff
File diff suppressed because it is too large
Load Diff
File diff suppressed because it is too large
Load Diff
@ -1,31 +1,31 @@
|
||||
# Spanish translations for I2P.
|
||||
# Translations template for I2P.
|
||||
# Copyright (C) 2021 ORGANIZATION
|
||||
# This file is distributed under the same license as the I2P project.
|
||||
#
|
||||
#
|
||||
# Translators:
|
||||
# Adolfo Jayme-Barrientos, 2013
|
||||
# 0f759dd1ea6c4c76cedc299039ca4f23_7584d04
|
||||
# <454cc45058db9632179dc8079c0c1af3_5311>, 2013
|
||||
# 0f759dd1ea6c4c76cedc299039ca4f23_7584d04 <454cc45058db9632179dc8079c0c1af3_5311>, 2013
|
||||
# m1xxy <m1xxy@mail.i2p>, 2011
|
||||
# Oliver Trash <oliver.trasshh@gmail.com>, 2013
|
||||
# strel, 2016
|
||||
# strel, 2013
|
||||
# trolly, 2013
|
||||
# fa1e5d1b5b1ea91a38c4e92aeae85c31_060014a, 2013
|
||||
# fa1e5d1b5b1ea91a38c4e92aeae85c31_060014a, 2013
|
||||
msgid ""
|
||||
msgstr ""
|
||||
"Project-Id-Version: I2P\n"
|
||||
"Project-Id-Version: I2P\n"
|
||||
"Report-Msgid-Bugs-To: http://trac.i2p2.de\n"
|
||||
"POT-Creation-Date: 2021-10-11 16:27+0000\n"
|
||||
"PO-Revision-Date: 2013-07-15 11:59+0000\n"
|
||||
"Last-Translator: strel, 2016\n"
|
||||
"Language-Team: Spanish (http://www.transifex.com/otf/I2P/language/es/)\n"
|
||||
"Plural-Forms: nplurals=3; plural=n == 1 ? 0 : n != 0 && n % 1000000 == 0 "
|
||||
"? 1 : 2\n"
|
||||
"MIME-Version: 1.0\n"
|
||||
"Content-Type: text/plain; charset=utf-8\n"
|
||||
"Content-Type: text/plain; charset=UTF-8\n"
|
||||
"Content-Transfer-Encoding: 8bit\n"
|
||||
"Generated-By: Babel 1.3\n"
|
||||
"Language: es\n"
|
||||
"Plural-Forms: nplurals=3; plural=n == 1 ? 0 : n != 0 && n % 1000000 == 0 ? 1 : 2;\n"
|
||||
|
||||
#: i2p2www/pages/site/comparison/freenet.html:2
|
||||
msgid "I2P Compared to Freenet"
|
||||
@ -33,85 +33,39 @@ msgstr "Comparación de I2P con Freenet"
|
||||
|
||||
#: i2p2www/pages/site/comparison/freenet.html:8
|
||||
msgid ""
|
||||
"Freenet is a fully distributed, peer to peer anonymous publishing "
|
||||
"network, offering \n"
|
||||
"secure ways to store data, as well as some approaches attempting to "
|
||||
"address the loads\n"
|
||||
"of a flash flood. While Freenet is designed as a distributed data store,"
|
||||
" people have\n"
|
||||
"built applications on top of it to do more generic anonymous "
|
||||
"communication, such as \n"
|
||||
"Freenet is a fully distributed, peer to peer anonymous publishing network, offering \n"
|
||||
"secure ways to store data, as well as some approaches attempting to address the loads\n"
|
||||
"of a flash flood. While Freenet is designed as a distributed data store, people have\n"
|
||||
"built applications on top of it to do more generic anonymous communication, such as \n"
|
||||
"static websites and message boards."
|
||||
msgstr ""
|
||||
"Freenet es una red completamente distribuida, red anónima de publicación "
|
||||
"par a par, que ofrece una forma segura de almacenar datos, y también "
|
||||
"enfocada en solucionar los problemas de carga y desbordamientos. Mientras"
|
||||
" que Freenet está diseñada como un almacén distribuido de datos, la gente"
|
||||
" ha construido aplicaciones sobre el sistema para tener otras "
|
||||
"comunicaciones anónimas genéricas, como webs estáticas y foros."
|
||||
msgstr "Freenet es una red completamente distribuida, red anónima de publicación par a par, que ofrece una forma segura de almacenar datos, y también enfocada en solucionar los problemas de carga y desbordamientos. Mientras que Freenet está diseñada como un almacén distribuido de datos, la gente ha construido aplicaciones sobre el sistema para tener otras comunicaciones anónimas genéricas, como webs estáticas y foros."
|
||||
|
||||
#: i2p2www/pages/site/comparison/freenet.html:16
|
||||
#, python-format
|
||||
msgid ""
|
||||
"Compared to I2P, Freenet offers some substantial benefits - it is a "
|
||||
"distributed data\n"
|
||||
"store, while I2P is not, allowing people to retrieve the content "
|
||||
"published by others \n"
|
||||
"even when the publisher is no longer online. In addition, it should be "
|
||||
"able to \n"
|
||||
"distribute popular data fairly efficiently. I2P itself does not and will"
|
||||
" not provide \n"
|
||||
"this functionality. On the other hand, there is overlap for users who "
|
||||
"simply want to \n"
|
||||
"communicate with each other anonymously through websites, message boards,"
|
||||
" file sharing\n"
|
||||
"programs, etc. There have also been some attempts to develop a "
|
||||
"distributed data \n"
|
||||
"Compared to I2P, Freenet offers some substantial benefits - it is a distributed data\n"
|
||||
"store, while I2P is not, allowing people to retrieve the content published by others \n"
|
||||
"even when the publisher is no longer online. In addition, it should be able to \n"
|
||||
"distribute popular data fairly efficiently. I2P itself does not and will not provide \n"
|
||||
"this functionality. On the other hand, there is overlap for users who simply want to \n"
|
||||
"communicate with each other anonymously through websites, message boards, file sharing\n"
|
||||
"programs, etc. There have also been some attempts to develop a distributed data \n"
|
||||
"store to run on top of I2P,\n"
|
||||
"(most recently a port of <a href=\"%(tahoe)s\">Tahoe-LAFS</a>)\n"
|
||||
"but nothing is yet ready for general use."
|
||||
msgstr ""
|
||||
"Comparado con I2P, Freenet ofrece substanciales beneficios - es un "
|
||||
"sistema distribuido de almacenamiento de datos, mientras que I2P no lo "
|
||||
"es, permitiendo a la gente obtener al contenido publicado por otros "
|
||||
"incluso cuando el que lo ha publicado no esté online. Además es capaz de "
|
||||
"distribuir eficientemente la información más utilizada. I2P no tiene ni "
|
||||
"tendrá esta funcionalidad. Por otro lado, hay demasiada redundancia para "
|
||||
"los usuarios que simplemente quieren comunicarse con otros anónimamente a"
|
||||
" través de webs, foros, aplicaciones de compartición de archivos, etc. "
|
||||
"Ha habido varios intentos de desarrollar un sistema de almacenamiento "
|
||||
"distribuido funcionando sobre I2P, (más recientemente un port de <a "
|
||||
"href=\"%(tahoe)s\">Tahoe-LAFS</a>) pero todavía no está listo para uso "
|
||||
"general."
|
||||
msgstr "Comparado con I2P, Freenet ofrece substanciales beneficios - es un sistema distribuido de almacenamiento de datos, mientras que I2P no lo es, permitiendo a la gente obtener al contenido publicado por otros incluso cuando el que lo ha publicado no esté online. Además es capaz de distribuir eficientemente la información más utilizada. I2P no tiene ni tendrá esta funcionalidad. Por otro lado, hay demasiada redundancia para los usuarios que simplemente quieren comunicarse con otros anónimamente a través de webs, foros, aplicaciones de compartición de archivos, etc. Ha habido varios intentos de desarrollar un sistema de almacenamiento distribuido funcionando sobre I2P, (más recientemente un port de <a href=\"%(tahoe)s\">Tahoe-LAFS</a>) pero todavía no está listo para uso general."
|
||||
|
||||
#: i2p2www/pages/site/comparison/freenet.html:29
|
||||
msgid ""
|
||||
"However, even ignoring any implementations issues, there are some "
|
||||
"concerns \n"
|
||||
"about Freenet's algorithms from both a scalability and anonymity "
|
||||
"perspective, owing \n"
|
||||
"largely to Freenet's heuristic driven routing. The interactions of "
|
||||
"various techniques \n"
|
||||
"certainly may successfully deter various attacks, and perhaps some "
|
||||
"aspects of the \n"
|
||||
"routing algorithms will provide the hoped for scalability. "
|
||||
"Unfortunately, not much\n"
|
||||
"analysis of the algorithms involved has resulted in positive results, but"
|
||||
" there is still\n"
|
||||
"hope. At the very least, Freenet does provide substantial anonymity "
|
||||
"against an attacker\n"
|
||||
"However, even ignoring any implementations issues, there are some concerns \n"
|
||||
"about Freenet's algorithms from both a scalability and anonymity perspective, owing \n"
|
||||
"largely to Freenet's heuristic driven routing. The interactions of various techniques \n"
|
||||
"certainly may successfully deter various attacks, and perhaps some aspects of the \n"
|
||||
"routing algorithms will provide the hoped for scalability. Unfortunately, not much\n"
|
||||
"analysis of the algorithms involved has resulted in positive results, but there is still\n"
|
||||
"hope. At the very least, Freenet does provide substantial anonymity against an attacker\n"
|
||||
"who does not have the resources necessary to analyze it further."
|
||||
msgstr ""
|
||||
"Sin embargo, e incluso ignorando los problemas de implementación, hay "
|
||||
"algunas preocupaciones sobre la escalabilidad y el anonimato de algunos "
|
||||
"algoritmos de Freenet, debido básicamente a la heurística de ruteo de "
|
||||
"Freenet. La unión de varias técnicas puede desalentar el hacer varios "
|
||||
"tipos de ataques, y quizás algunos aspectos del algoritmo de ruteo "
|
||||
"podrían proveer la escalabilidad esperada. Desafortunadamente, no muchos "
|
||||
"de los análisis sobre los algoritmos han dado resultados satisfactorios, "
|
||||
"pero aún hay esperanzas. Al final, Freenet nos proporciona bastante "
|
||||
"anonimato contra cualquier atacante que no tenga los recursos necesarios "
|
||||
"para análisis completos."
|
||||
msgstr "Sin embargo, e incluso ignorando los problemas de implementación, hay algunas preocupaciones sobre la escalabilidad y el anonimato de algunos algoritmos de Freenet, debido básicamente a la heurística de ruteo de Freenet. La unión de varias técnicas puede desalentar el hacer varios tipos de ataques, y quizás algunos aspectos del algoritmo de ruteo podrían proveer la escalabilidad esperada. Desafortunadamente, no muchos de los análisis sobre los algoritmos han dado resultados satisfactorios, pero aún hay esperanzas. Al final, Freenet nos proporciona bastante anonimato contra cualquier atacante que no tenga los recursos necesarios para análisis completos."
|
||||
|
||||
#: i2p2www/pages/site/comparison/index.html:2
|
||||
msgid "Comparing I2P to other projects"
|
||||
@ -119,45 +73,27 @@ msgstr "Comparando I2P con otros proyectos"
|
||||
|
||||
#: i2p2www/pages/site/comparison/index.html:4
|
||||
msgid ""
|
||||
"There are a great many other applications and projects working on "
|
||||
"anonymous \n"
|
||||
"communication and I2P has been inspired by much of their efforts. This "
|
||||
"is not \n"
|
||||
"There are a great many other applications and projects working on anonymous \n"
|
||||
"communication and I2P has been inspired by much of their efforts. This is not \n"
|
||||
"a comprehensive list of anonymity resources - both freehaven's \n"
|
||||
"<a href=\"http://freehaven.net/anonbib/topic.html\">Anonymity "
|
||||
"Bibliography</a>\n"
|
||||
"and GNUnet's <a href=\"https://www.gnunet.org/links/\">related "
|
||||
"projects</a>\n"
|
||||
"<a href=\"http://freehaven.net/anonbib/topic.html\">Anonymity Bibliography</a>\n"
|
||||
"and GNUnet's <a href=\"https://www.gnunet.org/links/\">related projects</a>\n"
|
||||
"serve that purpose well. That said, a few systems stand out for further\n"
|
||||
"comparison. The following have individual comparison pages:"
|
||||
msgstr ""
|
||||
"Hay muchas otras buenas aplicaciones y proyectos trabajando en "
|
||||
"comunicaciones anónimas, e I2P se ha inspirado en muchos de sus "
|
||||
"esfuerzos. Esto no es una lista completa de recursos para el anonimato - "
|
||||
"ambos \n"
|
||||
"<a href=\"http://freehaven.net/anonbib/topic.html\">Anonymity "
|
||||
"Bibliography</a> y los <a "
|
||||
"href=\"https://www.gnunet.org/links/\">proyectos relacionados</a> con "
|
||||
"GNUnet sirven también para ese mismo propósito. Dicho eso, pocos "
|
||||
"proyectos destacan como para comparaciones adicionales. Los siguientes "
|
||||
"proyectos tienen webs con comparaciones individuales:"
|
||||
msgstr "Hay muchas otras buenas aplicaciones y proyectos trabajando en comunicaciones anónimas, e I2P se ha inspirado en muchos de sus esfuerzos. Esto no es una lista completa de recursos para el anonimato - ambos \n<a href=\"http://freehaven.net/anonbib/topic.html\">Anonymity Bibliography</a> y los <a href=\"https://www.gnunet.org/links/\">proyectos relacionados</a> con GNUnet sirven también para ese mismo propósito. Dicho eso, pocos proyectos destacan como para comparaciones adicionales. Los siguientes proyectos tienen webs con comparaciones individuales:"
|
||||
|
||||
#: i2p2www/pages/site/comparison/index.html:20
|
||||
#, python-format
|
||||
msgid ""
|
||||
"The following are discussed on the <a href=\"%(othernetworks)s\">other "
|
||||
"networks page:</a>"
|
||||
msgstr ""
|
||||
"Los siguientes proyectos son discutidos en la <a "
|
||||
"href=\"%(othernetworks)s\">página sobre otras redes:</a>"
|
||||
msgstr "Los siguientes proyectos son discutidos en la <a href=\"%(othernetworks)s\">página sobre otras redes:</a>"
|
||||
|
||||
#: i2p2www/pages/site/comparison/index.html:33
|
||||
#, python-format
|
||||
msgid ""
|
||||
"The content of this page is subject to update, discussion and dispute, "
|
||||
"and we welcome comments and additions.\n"
|
||||
"You may contribute an analysis by entering a <a href=\"%(trac)s\">new "
|
||||
"issue on Github</a>."
|
||||
"The content of this page is subject to update, discussion and dispute, and we welcome comments and additions.\n"
|
||||
"You may contribute an analysis by entering a <a href=\"%(trac)s\">new issue on Github</a>."
|
||||
msgstr ""
|
||||
|
||||
#: i2p2www/pages/site/comparison/other-networks.html:2
|
||||
@ -182,220 +118,109 @@ msgstr ""
|
||||
#, python-format
|
||||
msgid ""
|
||||
"RetroShare is a set of peer-to-peer applications running in a\n"
|
||||
"<a href=\"%(f2fwiki)s\">Friend-to-friend (F2F)</a> network. Each peer of "
|
||||
"such F2F \n"
|
||||
"network makes direct IP connections only to authenticated peers "
|
||||
"(\"friends\") after explicit \n"
|
||||
"certificates exchange. It can discover unauthenticated peers (e.g. "
|
||||
"friends of friends), \n"
|
||||
"but connections to them are relayed over \"friend\" peers for providing "
|
||||
"privacy and anonymity."
|
||||
"<a href=\"%(f2fwiki)s\">Friend-to-friend (F2F)</a> network. Each peer of such F2F \n"
|
||||
"network makes direct IP connections only to authenticated peers (\"friends\") after explicit \n"
|
||||
"certificates exchange. It can discover unauthenticated peers (e.g. friends of friends), \n"
|
||||
"but connections to them are relayed over \"friend\" peers for providing privacy and anonymity."
|
||||
msgstr ""
|
||||
|
||||
#: i2p2www/pages/site/comparison/other-networks.html:37
|
||||
msgid ""
|
||||
"RetroShare is designed to build a private network of trusted peers, while"
|
||||
" I2P is designed \n"
|
||||
"to be a large-scaled public anonymous network. Recent versions of "
|
||||
"RetroShare have options to run \n"
|
||||
"as a public \"darknet\" by using I2P or Tor as a transport. That way all "
|
||||
"connections are \n"
|
||||
"RetroShare is designed to build a private network of trusted peers, while I2P is designed \n"
|
||||
"to be a large-scaled public anonymous network. Recent versions of RetroShare have options to run \n"
|
||||
"as a public \"darknet\" by using I2P or Tor as a transport. That way all connections are \n"
|
||||
"anonymized and no trust is required for adding new \"friends\"."
|
||||
msgstr ""
|
||||
|
||||
#: i2p2www/pages/site/comparison/other-networks.html:48
|
||||
#, python-format
|
||||
msgid ""
|
||||
"Morphmix and Tarzan are both fully distributed, peer to peer networks of"
|
||||
" \n"
|
||||
"anonymizing proxies, allowing people to tunnel out through the low "
|
||||
"latency \n"
|
||||
"mix network. Morphmix includes some very interesting collusion detection"
|
||||
" \n"
|
||||
"algorithms and Sybil defenses, while Tarzan makes use of the scarcity of "
|
||||
"IP\n"
|
||||
"Morphmix and Tarzan are both fully distributed, peer to peer networks of \n"
|
||||
"anonymizing proxies, allowing people to tunnel out through the low latency \n"
|
||||
"mix network. Morphmix includes some very interesting collusion detection \n"
|
||||
"algorithms and Sybil defenses, while Tarzan makes use of the scarcity of IP\n"
|
||||
"addresses to accomplish the same. The two primary differences between \n"
|
||||
"these systems and I2P are related to I2P's <a "
|
||||
"href=\"%(threatmodel)s\">threat model</a> \n"
|
||||
"and their out-proxy design (as opposed to providing both sender and "
|
||||
"receiver \n"
|
||||
"anonymity). There is source code available to both systems, but we are "
|
||||
"not aware \n"
|
||||
"these systems and I2P are related to I2P's <a href=\"%(threatmodel)s\">threat model</a> \n"
|
||||
"and their out-proxy design (as opposed to providing both sender and receiver \n"
|
||||
"anonymity). There is source code available to both systems, but we are not aware \n"
|
||||
"of their use outside of academic environments."
|
||||
msgstr ""
|
||||
"Morphmix y Tarzan son las dos totalmente distribuidas, redes par a par "
|
||||
"anónimas con proxies para el anonimato, permitiendo a la gente enviar "
|
||||
"datos fuera a través de redes de mezcla de baja latencia. Morphmix "
|
||||
"incluye unos algoritmos de detección de colisiones bastante interesante y"
|
||||
" defensas contra Sybil, mientras que Tarzan hace uso de la escasez de "
|
||||
"direcciones IP para obtener lo mismo. Las dos principales diferencias "
|
||||
"entre estos dos sistemas e I2P tienen que ver con el <a "
|
||||
"href=\"%(threatmodel)s\">modelo de amenazas</a> de I2P y su diseño de "
|
||||
"outproxies (al contrario que el anonimato proporcionado para ambos, el "
|
||||
"que envía y el que recibe). El código está disponible para ambos "
|
||||
"sistemas, pero no sabemos de su uso fuera de ambientes académicos."
|
||||
msgstr "Morphmix y Tarzan son las dos totalmente distribuidas, redes par a par anónimas con proxies para el anonimato, permitiendo a la gente enviar datos fuera a través de redes de mezcla de baja latencia. Morphmix incluye unos algoritmos de detección de colisiones bastante interesante y defensas contra Sybil, mientras que Tarzan hace uso de la escasez de direcciones IP para obtener lo mismo. Las dos principales diferencias entre estos dos sistemas e I2P tienen que ver con el <a href=\"%(threatmodel)s\">modelo de amenazas</a> de I2P y su diseño de outproxies (al contrario que el anonimato proporcionado para ambos, el que envía y el que recibe). El código está disponible para ambos sistemas, pero no sabemos de su uso fuera de ambientes académicos."
|
||||
|
||||
#: i2p2www/pages/site/comparison/other-networks.html:172
|
||||
#, python-format
|
||||
msgid ""
|
||||
"\n"
|
||||
"Mixminion and Mixmaster are networks to support anonymous email against a"
|
||||
" very\n"
|
||||
"Mixminion and Mixmaster are networks to support anonymous email against a very\n"
|
||||
"powerful adversary.\n"
|
||||
"High-latency messaging applications running on top of I2P\n"
|
||||
"(for example <a href=\"%(syndie)s\">Syndie</a> or I2PBote)\n"
|
||||
"may perhaps prove adequate to meet the threat\n"
|
||||
"model of those adversaries, while running in parallel along side the "
|
||||
"needs of low latency users, to provide\n"
|
||||
"model of those adversaries, while running in parallel along side the needs of low latency users, to provide\n"
|
||||
"a significantly larger anonymity set.\n"
|
||||
"High-latency support within the I2P router itself may or may not be added"
|
||||
" in a distant future release.\n"
|
||||
"It is too early to say if I2P will meet the needs of users requiring "
|
||||
"extreme protection for email."
|
||||
msgstr ""
|
||||
"\n"
|
||||
"Mixminion y Mixmaster son redes que soportan correos anónimos contra "
|
||||
"adversarios muy peligrosos. Las aplicaciones de mensajes de alta latencia"
|
||||
" sobre I2P (por ejemplo <a href=\"%(syndie)s\">Syndie</a> o I2PBote) "
|
||||
"quizás sean adecuadas para satisfacer el modelo de amenazas de estos "
|
||||
"adversarios, funcionando en paralelo con las necesidades de baja latencia"
|
||||
" de los usuarios, para proporcionar un gran set de anonimato. El soporte "
|
||||
"de alta latencia en el ruter de I2P puede que se añada o no en un futuro "
|
||||
"distante. Es demasiado pronto para decir si I2P satisfará las necesidades"
|
||||
" de los usuarios que requieran una protección extrema para los correos."
|
||||
"High-latency support within the I2P router itself may or may not be added in a distant future release.\n"
|
||||
"It is too early to say if I2P will meet the needs of users requiring extreme protection for email."
|
||||
msgstr "\nMixminion y Mixmaster son redes que soportan correos anónimos contra adversarios muy peligrosos. Las aplicaciones de mensajes de alta latencia sobre I2P (por ejemplo <a href=\"%(syndie)s\">Syndie</a> o I2PBote) quizás sean adecuadas para satisfacer el modelo de amenazas de estos adversarios, funcionando en paralelo con las necesidades de baja latencia de los usuarios, para proporcionar un gran set de anonimato. El soporte de alta latencia en el ruter de I2P puede que se añada o no en un futuro distante. Es demasiado pronto para decir si I2P satisfará las necesidades de los usuarios que requieran una protección extrema para los correos."
|
||||
|
||||
#: i2p2www/pages/site/comparison/other-networks.html:184
|
||||
msgid ""
|
||||
"As with Tor and Onion Routing, \n"
|
||||
"both Mixminion and Mixmaster take the directory based approach as well."
|
||||
msgstr ""
|
||||
"Al igual que con Tor y Onion routing, Mixminion y Mixmaster toman también"
|
||||
" la aproximación basada en directorios."
|
||||
msgstr "Al igual que con Tor y Onion routing, Mixminion y Mixmaster toman también la aproximación basada en directorios."
|
||||
|
||||
#: i2p2www/pages/site/comparison/other-networks.html:194
|
||||
#, python-format
|
||||
msgid ""
|
||||
"JAP (Java Anonymous Proxy) is a network of mix cascades for anonymizing "
|
||||
"web requests,\n"
|
||||
"and as such it has a few centralized nodes (participants in the cascade) "
|
||||
"that blend\n"
|
||||
"and mix requests from clients through the sequence of nodes (the cascade)"
|
||||
" before \n"
|
||||
"proxying out onto the web. The scope, threat model, and security is "
|
||||
"substantially \n"
|
||||
"different from I2P, but for those who don't require significant anonymity"
|
||||
" but still\n"
|
||||
"are not satisfied with an Anonymizer-like service, JAP is worth "
|
||||
"reviewing. One\n"
|
||||
"caution to note is that anyone under the jurisdiction of the German "
|
||||
"courts may want\n"
|
||||
"to take care, as the German Federal Bureau of Criminal Investigation "
|
||||
"(FBCI) has \n"
|
||||
"JAP (Java Anonymous Proxy) is a network of mix cascades for anonymizing web requests,\n"
|
||||
"and as such it has a few centralized nodes (participants in the cascade) that blend\n"
|
||||
"and mix requests from clients through the sequence of nodes (the cascade) before \n"
|
||||
"proxying out onto the web. The scope, threat model, and security is substantially \n"
|
||||
"different from I2P, but for those who don't require significant anonymity but still\n"
|
||||
"are not satisfied with an Anonymizer-like service, JAP is worth reviewing. One\n"
|
||||
"caution to note is that anyone under the jurisdiction of the German courts may want\n"
|
||||
"to take care, as the German Federal Bureau of Criminal Investigation (FBCI) has \n"
|
||||
"successfully mounted an \n"
|
||||
"<a href=\"%(url)s\">attack</a> \n"
|
||||
"on the network. Even though the method of this attack was later found to"
|
||||
" be illegal \n"
|
||||
"in the German courts, the fact that the data was successfully collected "
|
||||
"is the \n"
|
||||
"concern. Courts change their minds based upon circumstance, and this is "
|
||||
"evidence that \n"
|
||||
"if a government body or intelligence agency wanted to, they could gather "
|
||||
"the data, even \n"
|
||||
"on the network. Even though the method of this attack was later found to be illegal \n"
|
||||
"in the German courts, the fact that the data was successfully collected is the \n"
|
||||
"concern. Courts change their minds based upon circumstance, and this is evidence that \n"
|
||||
"if a government body or intelligence agency wanted to, they could gather the data, even \n"
|
||||
"if it may be found inadmissible in some courts later)"
|
||||
msgstr ""
|
||||
"JAP (Proxy Anónimo en Java) es una red de mezcla en cascadas para el "
|
||||
"anonimato de las solicitudes web que tiene varios nodos centrales "
|
||||
"(participantes en la cascada) que combinan y mezclan las solicitudes de "
|
||||
"los clientes a través de una secuencia de nodos (la cascada) antes de "
|
||||
"enviarlos por un proxy a la web. El alcance, modelo de amenazas y la "
|
||||
"seguridad son bastantes diferentes a las de I2P, pero para aquellos que "
|
||||
"requieran bastante anonimato pero no están satisfechos con un servicio de"
|
||||
" tipo anonimizador, puede venirles bien echarle un ojo a JAP. Un "
|
||||
"precaución que debe tener todo aquel que se encuentre bajo la "
|
||||
"jurisdicción de los juzgados alemanes, es que el German Federal Bureau "
|
||||
"of Criminal Investigation (FBCI) ha montado un <a "
|
||||
"href=\"%(url)s\">ataque</a> con éxito sobre esta red. Incluso aunque el "
|
||||
"ataque se encontró más tarde ilegal en los juzgados alemanes, la realidad"
|
||||
" es que la información fue sustraída con éxito. Los jueces cambian sus "
|
||||
"mentes basados en las circunstancias, y esta es la evidencia de que si el"
|
||||
" gobierno quisiese la información podrían conseguirla, aunque fuese "
|
||||
"inadmisible más tarde en un juicio)"
|
||||
msgstr "JAP (Proxy Anónimo en Java) es una red de mezcla en cascadas para el anonimato de las solicitudes web que tiene varios nodos centrales (participantes en la cascada) que combinan y mezclan las solicitudes de los clientes a través de una secuencia de nodos (la cascada) antes de enviarlos por un proxy a la web. El alcance, modelo de amenazas y la seguridad son bastantes diferentes a las de I2P, pero para aquellos que requieran bastante anonimato pero no están satisfechos con un servicio de tipo anonimizador, puede venirles bien echarle un ojo a JAP. Un precaución que debe tener todo aquel que se encuentre bajo la jurisdicción de los juzgados alemanes, es que el German Federal Bureau of Criminal Investigation (FBCI) ha montado un <a href=\"%(url)s\">ataque</a> con éxito sobre esta red. Incluso aunque el ataque se encontró más tarde ilegal en los juzgados alemanes, la realidad es que la información fue sustraída con éxito. Los jueces cambian sus mentes basados en las circunstancias, y esta es la evidencia de que si el gobierno quisiese la información podrían conseguirla, aunque fuese inadmisible más tarde en un juicio)"
|
||||
|
||||
#: i2p2www/pages/site/comparison/other-networks.html:216
|
||||
#, python-format
|
||||
msgid ""
|
||||
"Both of these systems work through the same basic \n"
|
||||
"<a href=\"%(antnet)s\">antnet</a> routing, providing some degree of\n"
|
||||
"anonymity based on the threat model of providing plausible deniability "
|
||||
"against a simple \n"
|
||||
"non-colluding adversary. With the antnet routing, they first either do a"
|
||||
" random walk or a \n"
|
||||
"broadcast search to find some peer with the data or identity desired, and"
|
||||
" then use a feedback\n"
|
||||
"algorithm to optimize that found path. This works well for applications "
|
||||
"that merely want to know \n"
|
||||
"what other people around them have to offer - \"How are y'all doing\" vs."
|
||||
" \"Hey Alice, how are you\" - \n"
|
||||
"you basically get a local cluster of nodes that can share files with and "
|
||||
"maintain some degree of \n"
|
||||
"anonymity (though you don't have much control over who is in that group "
|
||||
"of peers)."
|
||||
msgstr ""
|
||||
"Estos dos sistemas trabajan con el rutado básico <a "
|
||||
"href=\"%(antnet)s\">antnet</a>, proporcionando anonimato al proveer "
|
||||
"negación plausible contra un simple adversario sin colisión. Con el "
|
||||
"rutado antnet, primero hacen una ruta aleatoria o una búsqueda broadcast"
|
||||
" para encontrar el par o la identidad deseada, y después usan esa "
|
||||
"algoritmo para optimizar la ruta. Esto funciona bien para aplicaciones "
|
||||
"que sólo quieren saber que tienen que ofrecer la gente que está alrededor"
|
||||
" - \"Cómo os va\" contra \"Hey Alice, como estás\" - básicamente se "
|
||||
"obtiene un conjunto de nodos que pueden compartit archivos y mantener el "
|
||||
"anonimato (aunque no se tiene mucho control sobre quién es ese grupo de "
|
||||
"pares)."
|
||||
"anonymity based on the threat model of providing plausible deniability against a simple \n"
|
||||
"non-colluding adversary. With the antnet routing, they first either do a random walk or a \n"
|
||||
"broadcast search to find some peer with the data or identity desired, and then use a feedback\n"
|
||||
"algorithm to optimize that found path. This works well for applications that merely want to know \n"
|
||||
"what other people around them have to offer - \"How are y'all doing\" vs. \"Hey Alice, how are you\" - \n"
|
||||
"you basically get a local cluster of nodes that can share files with and maintain some degree of \n"
|
||||
"anonymity (though you don't have much control over who is in that group of peers)."
|
||||
msgstr "Estos dos sistemas trabajan con el rutado básico <a href=\"%(antnet)s\">antnet</a>, proporcionando anonimato al proveer negación plausible contra un simple adversario sin colisión. Con el rutado antnet, primero hacen una ruta aleatoria o una búsqueda broadcast para encontrar el par o la identidad deseada, y después usan esa algoritmo para optimizar la ruta. Esto funciona bien para aplicaciones que sólo quieren saber que tienen que ofrecer la gente que está alrededor - \"Cómo os va\" contra \"Hey Alice, como estás\" - básicamente se obtiene un conjunto de nodos que pueden compartit archivos y mantener el anonimato (aunque no se tiene mucho control sobre quién es ese grupo de pares)."
|
||||
|
||||
#: i2p2www/pages/site/comparison/other-networks.html:228
|
||||
msgid ""
|
||||
"However, the algorithm does not scale well at all - if the application "
|
||||
"wants to speak with a \n"
|
||||
"particular peer it ends up doing a broadcast search or random walk "
|
||||
"(though if they are lucky enough\n"
|
||||
"for that to succeed, the antnet routing should optimize that found "
|
||||
"connection). This means that \n"
|
||||
"while these networks can work great at small scales, they are not "
|
||||
"suitable for large networks where\n"
|
||||
"someone wants to get in touch with another specific peer. That does not "
|
||||
"mean that there is no \n"
|
||||
"value in these systems, just that their applicability is limited to "
|
||||
"situations where their \n"
|
||||
"However, the algorithm does not scale well at all - if the application wants to speak with a \n"
|
||||
"particular peer it ends up doing a broadcast search or random walk (though if they are lucky enough\n"
|
||||
"for that to succeed, the antnet routing should optimize that found connection). This means that \n"
|
||||
"while these networks can work great at small scales, they are not suitable for large networks where\n"
|
||||
"someone wants to get in touch with another specific peer. That does not mean that there is no \n"
|
||||
"value in these systems, just that their applicability is limited to situations where their \n"
|
||||
"particular issues can be addressed."
|
||||
msgstr ""
|
||||
"Sin embargo, el algoritmo no escala bien del todo - si la aplicación "
|
||||
"quiere hablar con un par en particular termina haciendo una búsqueda "
|
||||
"broadcast o un paseo aleatorio (si son afortunados de que eso ocurra). "
|
||||
"Esto significa que mientras esas redes trabajan bien a escalas pequeñas, "
|
||||
"no son apropiadas para redes grandes donde alguien quiere ponerse en "
|
||||
"contacto con un par en particular. Esto no quiere decir que este sistema "
|
||||
"no tenga ningún valor, sólo que su aplicación está limitada a situaciones"
|
||||
" donde sus problemas pueden evitarse."
|
||||
msgstr "Sin embargo, el algoritmo no escala bien del todo - si la aplicación quiere hablar con un par en particular termina haciendo una búsqueda broadcast o un paseo aleatorio (si son afortunados de que eso ocurra). Esto significa que mientras esas redes trabajan bien a escalas pequeñas, no son apropiadas para redes grandes donde alguien quiere ponerse en contacto con un par en particular. Esto no quiere decir que este sistema no tenga ningún valor, sólo que su aplicación está limitada a situaciones donde sus problemas pueden evitarse."
|
||||
|
||||
#: i2p2www/pages/site/comparison/other-networks.html:239
|
||||
#, python-format
|
||||
msgid ""
|
||||
"This was a closed-source network targeted at Iranian users.\n"
|
||||
"Tor did a <a href=\"%(torpost)s\">good writeup on what to look for in a "
|
||||
"circumvention tool</a>.\n"
|
||||
"Suffice it to say that being closed source and publicly targeting a "
|
||||
"specific country are not good ideas.\n"
|
||||
"Tor did a <a href=\"%(torpost)s\">good writeup on what to look for in a circumvention tool</a>.\n"
|
||||
"Suffice it to say that being closed source and publicly targeting a specific country are not good ideas.\n"
|
||||
"I2P is, of course, open source. However, that source, and our\n"
|
||||
"<a href=\"%(docs)s\">technical documentation</a>, need much more review."
|
||||
msgstr ""
|
||||
"Esta era una red de código cerrado orientada a usuarios de Irán. Tor hizo"
|
||||
" un <a href=\"%(torpost)s\">buen estudio sobre qué buscar en una "
|
||||
"herramienta de elusión</a>. No hace falta decir que el ser de código "
|
||||
"cerrado y orientada a un país específico no son buenas ideas. I2P es, por"
|
||||
" supuesto, de código libre. Aunque el código y nuestra <a "
|
||||
"href=\"%(docs)s\">documentación técnica</a> necesitan muchas más "
|
||||
"revisión."
|
||||
msgstr "Esta era una red de código cerrado orientada a usuarios de Irán. Tor hizo un <a href=\"%(torpost)s\">buen estudio sobre qué buscar en una herramienta de elusión</a>. No hace falta decir que el ser de código cerrado y orientada a un país específico no son buenas ideas. I2P es, por supuesto, de código libre. Aunque el código y nuestra <a href=\"%(docs)s\">documentación técnica</a> necesitan muchas más revisión."
|
||||
|
||||
#: i2p2www/pages/site/comparison/other-networks.html:248
|
||||
msgid "Paid VPN Services"
|
||||
@ -435,17 +260,7 @@ msgid ""
|
||||
"network, as well as gather and report statistics, as \n"
|
||||
"opposed to I2P's distributed <a href=\"%(netdb)s\">network \n"
|
||||
"database</a> and <a href=\"%(peerselection)s\">peer selection</a>."
|
||||
msgstr ""
|
||||
"Tor y el rutado Onion son ambas redes de proxies anónimas, que permiten a"
|
||||
" la gente salir a través de su red ya mezclada de baja latencia. Las dos "
|
||||
"primeras diferencias entre Tor/Onion-Routing e I2P están de nuevo "
|
||||
"relacionas con las diferencias en el modelo de amenazas y el diseño de "
|
||||
"los outproxies (a través de Tor soporta también servicios ocultos). "
|
||||
"Además, Tor usa un enfoque basado en directorios - creando un punto "
|
||||
"central para manejar la 'vista' general de las redes, y además se "
|
||||
"obtienen más estadísticas, al contrario que la <a href=\"%(netdb)s\">base"
|
||||
" de datos de la red </a> dsitribuida de I2P y la <a "
|
||||
"href=\"%(peerselection)s\">selección de pares</a>."
|
||||
msgstr "Tor y el rutado Onion son ambas redes de proxies anónimas, que permiten a la gente salir a través de su red ya mezclada de baja latencia. Las dos primeras diferencias entre Tor/Onion-Routing e I2P están de nuevo relacionas con las diferencias en el modelo de amenazas y el diseño de los outproxies (a través de Tor soporta también servicios ocultos). Además, Tor usa un enfoque basado en directorios - creando un punto central para manejar la 'vista' general de las redes, y además se obtienen más estadísticas, al contrario que la <a href=\"%(netdb)s\">base de datos de la red </a> dsitribuida de I2P y la <a href=\"%(peerselection)s\">selección de pares</a>."
|
||||
|
||||
#: i2p2www/pages/site/comparison/tor.html:23
|
||||
msgid ""
|
||||
@ -458,13 +273,7 @@ msgid ""
|
||||
"outproxies are prone to abuse, along with all of the \n"
|
||||
"other security issues we've come to know and love with \n"
|
||||
"normal Internet traffic."
|
||||
msgstr ""
|
||||
"El outproxy de I2P/Tor tiene varias debilidades contra cierto tipo de "
|
||||
"ataques - una vez que la comunicación deja la red Tor, adversarios "
|
||||
"pasivos pueden hacer más fácilmente ataques de análisis. Además los "
|
||||
"outproxies tienen acceso al texto en claro transferido en las dos "
|
||||
"direcciones, y los outproxies son propensos a abusos, y además tenemos "
|
||||
"que tener en cuenta otros ataques posibles dentro del Internet normal."
|
||||
msgstr "El outproxy de I2P/Tor tiene varias debilidades contra cierto tipo de ataques - una vez que la comunicación deja la red Tor, adversarios pasivos pueden hacer más fácilmente ataques de análisis. Además los outproxies tienen acceso al texto en claro transferido en las dos direcciones, y los outproxies son propensos a abusos, y además tenemos que tener en cuenta otros ataques posibles dentro del Internet normal."
|
||||
|
||||
#: i2p2www/pages/site/comparison/tor.html:35
|
||||
msgid ""
|
||||
@ -474,12 +283,7 @@ msgid ""
|
||||
"to build outproxy functionality on top of an anonymous\n"
|
||||
"communication layer, they can). In fact, some I2P users\n"
|
||||
"currently take advantage of Tor to outproxy."
|
||||
msgstr ""
|
||||
"Aún así, mucha gente no tiene por que preocuparse por estas situaciones, "
|
||||
"ya que no están dentro del modelo de amenazas. Y además esto está fuera "
|
||||
"del alcance (formal) de I2P (si la gente desea construir un outproxy "
|
||||
"sobre la capa de comunicación anónima, pueden hacerlo). De hecho, "
|
||||
"actualmente algunos usuarios utilizan el outproxy de Tor."
|
||||
msgstr "Aún así, mucha gente no tiene por que preocuparse por estas situaciones, ya que no están dentro del modelo de amenazas. Y además esto está fuera del alcance (formal) de I2P (si la gente desea construir un outproxy sobre la capa de comunicación anónima, pueden hacerlo). De hecho, actualmente algunos usuarios utilizan el outproxy de Tor."
|
||||
|
||||
#: i2p2www/pages/site/comparison/tor.html:49
|
||||
msgid "Comparison of Tor and I2P Terminology"
|
||||
@ -489,9 +293,7 @@ msgstr "Comparación de la terminología de I2P y Tor"
|
||||
msgid ""
|
||||
"While Tor and I2P are similar in many ways, much of the terminology is "
|
||||
"different."
|
||||
msgstr ""
|
||||
"Mientras que Tor e I2p tienen algunas similitudes, mucha de la "
|
||||
"terminología cambia."
|
||||
msgstr "Mientras que Tor e I2p tienen algunas similitudes, mucha de la terminología cambia."
|
||||
|
||||
#: i2p2www/pages/site/comparison/tor.html:55
|
||||
msgid "Cell"
|
||||
@ -615,9 +417,7 @@ msgstr "Punto de reunión"
|
||||
|
||||
#: i2p2www/pages/site/comparison/tor.html:70
|
||||
msgid "somewhat like Inbound Gateway + Outbound Endpoint"
|
||||
msgstr ""
|
||||
"algo así como inbound Gateway + Outbound Endpoint, puerta de salida de "
|
||||
"entrada + punto final de salida"
|
||||
msgstr "algo así como inbound Gateway + Outbound Endpoint, puerta de salida de entrada + punto final de salida"
|
||||
|
||||
#: i2p2www/pages/site/comparison/tor.html:71
|
||||
msgid "Router Descriptor"
|
||||
@ -637,15 +437,10 @@ msgstr "Beneficios de Tor sobre I2p"
|
||||
|
||||
#: i2p2www/pages/site/comparison/tor.html:78
|
||||
msgid ""
|
||||
"Much bigger user base; much more visibility in the academic and hacker "
|
||||
"communities; benefits from\n"
|
||||
"Much bigger user base; much more visibility in the academic and hacker communities; benefits from\n"
|
||||
"formal studies of anonymity, resistance, and performance;\n"
|
||||
"has a non-anonymous, visible, university-based leader"
|
||||
msgstr ""
|
||||
"El número de usuarios es mucho mayor; mucho más visible en entorno "
|
||||
"académicos y comunidades de hackers; tiene los beneficios de tener "
|
||||
"estudios formales sobre el anonimato, resistencia y rendimiento; y tienen"
|
||||
" un líder no anónimo universitario y visible"
|
||||
msgstr "El número de usuarios es mucho mayor; mucho más visible en entorno académicos y comunidades de hackers; tiene los beneficios de tener estudios formales sobre el anonimato, resistencia y rendimiento; y tienen un líder no anónimo universitario y visible"
|
||||
|
||||
#: i2p2www/pages/site/comparison/tor.html:84
|
||||
msgid "Has already solved some scaling issues I2P has yet to address"
|
||||
@ -661,32 +456,24 @@ msgstr "Tiene más desarrolladores, incluso algunos con fondos"
|
||||
|
||||
#: i2p2www/pages/site/comparison/tor.html:88
|
||||
msgid ""
|
||||
"More resistant to state-level blocking due to TLS transport layer and "
|
||||
"bridges\n"
|
||||
"(I2P has proposals for \"full restricted routes\" but these are not yet "
|
||||
"implemented)"
|
||||
msgstr ""
|
||||
"Tiene un bloqueo de nivel de estado más resistente debido la capa de "
|
||||
"transporte TLS y a los puentes (I2P tienen propuestas de \"rutas "
|
||||
"completamente restringidas\" pero estas aún no están implementadas)"
|
||||
"More resistant to state-level blocking due to TLS transport layer and bridges\n"
|
||||
"(I2P has proposals for \"full restricted routes\" but these are not yet implemented)"
|
||||
msgstr "Tiene un bloqueo de nivel de estado más resistente debido la capa de transporte TLS y a los puentes (I2P tienen propuestas de \"rutas completamente restringidas\" pero estas aún no están implementadas)"
|
||||
|
||||
#: i2p2www/pages/site/comparison/tor.html:93
|
||||
msgid "Big enough that it has had to adapt to blocking and DOS attempts"
|
||||
msgstr "Es tan grande que incluso se ha adaptado para bloquear los intentos de DOS"
|
||||
|
||||
#: i2p2www/pages/site/comparison/tor.html:94
|
||||
msgid "Designed and optimized for exit traffic, with a large number of exit nodes"
|
||||
msgstr ""
|
||||
"Diseñado para optimizar el tráfico de salida, con un gran número de nodos"
|
||||
" de salida"
|
||||
msgid ""
|
||||
"Designed and optimized for exit traffic, with a large number of exit nodes"
|
||||
msgstr "Diseñado para optimizar el tráfico de salida, con un gran número de nodos de salida"
|
||||
|
||||
#: i2p2www/pages/site/comparison/tor.html:96
|
||||
msgid ""
|
||||
"Better documentation, has formal papers and specifications,\n"
|
||||
"better website, many more translations"
|
||||
msgstr ""
|
||||
"Mejor documentación, tiene estudios formales y especificaciones, una web "
|
||||
"mejor, y muchas traducciones"
|
||||
msgstr "Mejor documentación, tiene estudios formales y especificaciones, una web mejor, y muchas traducciones"
|
||||
|
||||
#: i2p2www/pages/site/comparison/tor.html:101
|
||||
msgid "More efficient with memory usage"
|
||||
@ -700,17 +487,13 @@ msgstr "Los nodos cliente de Tor tienen muy poco gasto de ancho de nada"
|
||||
msgid ""
|
||||
"Centralized control reduces the complexity at each\n"
|
||||
"node and can efficiently address Sybil attacks"
|
||||
msgstr ""
|
||||
"El control centralizado reduce la complejidad de cada nodo y puede evitar"
|
||||
" ataques Sybil fácilmente"
|
||||
msgstr "El control centralizado reduce la complejidad de cada nodo y puede evitar ataques Sybil fácilmente"
|
||||
|
||||
#: i2p2www/pages/site/comparison/tor.html:110
|
||||
msgid ""
|
||||
"A core of high capacity nodes provides higher\n"
|
||||
"throughput and lower latency"
|
||||
msgstr ""
|
||||
"Un núcleo de nodos de gran capacidad proporciona una mayor rendimiento y "
|
||||
"menor latencia"
|
||||
msgstr "Un núcleo de nodos de gran capacidad proporciona una mayor rendimiento y menor latencia"
|
||||
|
||||
#: i2p2www/pages/site/comparison/tor.html:115
|
||||
msgid "C, not Java (ewww)"
|
||||
@ -722,11 +505,9 @@ msgstr "Beneficios de I2P sobre Tor"
|
||||
|
||||
#: i2p2www/pages/site/comparison/tor.html:120
|
||||
msgid ""
|
||||
"Designed and optimized for hidden services, which are much faster than in"
|
||||
" Tor"
|
||||
msgstr ""
|
||||
"Diseñado para optimizar los servicios ocultos, que son mucho más rápidos "
|
||||
"que los de Tor"
|
||||
"Designed and optimized for hidden services, which are much faster than in "
|
||||
"Tor"
|
||||
msgstr "Diseñado para optimizar los servicios ocultos, que son mucho más rápidos que los de Tor"
|
||||
|
||||
#: i2p2www/pages/site/comparison/tor.html:121
|
||||
msgid "Fully distributed and self organizing"
|
||||
@ -736,17 +517,13 @@ msgstr "Totalmente distribuido y auto organizado"
|
||||
msgid ""
|
||||
"Peers are selected by continuously profiling and ranking performance,\n"
|
||||
"rather than trusting claimed capacity"
|
||||
msgstr ""
|
||||
"Los pares son seleccionados continuamente según el rendimiento y "
|
||||
"categoría, en vez de confiar en la capacidad indicada"
|
||||
msgstr "Los pares son seleccionados continuamente según el rendimiento y categoría, en vez de confiar en la capacidad indicada"
|
||||
|
||||
#: i2p2www/pages/site/comparison/tor.html:129
|
||||
msgid ""
|
||||
"Floodfill peers (\"directory servers\") are varying and untrusted,\n"
|
||||
"rather than hardcoded"
|
||||
msgstr ""
|
||||
"Los pares Floodfill (\"servidores de directorios\") cambian, en vez de "
|
||||
"estar siempre fijos."
|
||||
msgstr "Los pares Floodfill (\"servidores de directorios\") cambian, en vez de estar siempre fijos."
|
||||
|
||||
#: i2p2www/pages/site/comparison/tor.html:134
|
||||
msgid "Small enough that it hasn't been blocked or DOSed much, or at all"
|
||||
@ -764,17 +541,13 @@ msgstr "Conmutado por paquete en vez de conmutado por circuito"
|
||||
msgid ""
|
||||
"implicit transparent load balancing of messages \n"
|
||||
"across multiple peers, rather than a single path"
|
||||
msgstr ""
|
||||
"Implica control de carga transparente de los mensajes a través de "
|
||||
"múltiples pares, en vez de por un sólo camino."
|
||||
msgstr "Implica control de carga transparente de los mensajes a través de múltiples pares, en vez de por un sólo camino."
|
||||
|
||||
#: i2p2www/pages/site/comparison/tor.html:145
|
||||
msgid ""
|
||||
"resilience vs. failures by running multiple \n"
|
||||
"tunnels in parallel, plus rotating tunnels"
|
||||
msgstr ""
|
||||
"Resistencia contra fallos ya que usa varios túneles en paralelo, además "
|
||||
"de rotar los túneles"
|
||||
msgstr "Resistencia contra fallos ya que usa varios túneles en paralelo, además de rotar los túneles"
|
||||
|
||||
#: i2p2www/pages/site/comparison/tor.html:151
|
||||
msgid ""
|
||||
@ -782,20 +555,14 @@ msgid ""
|
||||
"of O(N) (Alice has e.g. 2 inbound tunnels that are \n"
|
||||
"used by all of the peers Alice is talking with, \n"
|
||||
"rather than a circuit for each)"
|
||||
msgstr ""
|
||||
"el número de conexiones en i2p vienen dado por O(1) en vez de O(N) (por "
|
||||
"ejemplo, Alice tiene 2 túneles de entrada que son usados por todos los "
|
||||
"pares con lo que habla Alice, en vez de un circuito por cada par)"
|
||||
msgstr "el número de conexiones en i2p vienen dado por O(1) en vez de O(N) (por ejemplo, Alice tiene 2 túneles de entrada que son usados por todos los pares con lo que habla Alice, en vez de un circuito por cada par)"
|
||||
|
||||
#: i2p2www/pages/site/comparison/tor.html:161
|
||||
msgid ""
|
||||
"Unidirectional tunnels instead of bidirectional\n"
|
||||
"circuits, doubling the number of nodes a peer has to\n"
|
||||
"compromise to get the same information."
|
||||
msgstr ""
|
||||
"Túneles unidireccionales en vez de circuitos bidireccionales, usando el "
|
||||
"doble de nodos un par se compromete más para obtener la misma "
|
||||
"información."
|
||||
msgstr "Túneles unidireccionales en vez de circuitos bidireccionales, usando el doble de nodos un par se compromete más para obtener la misma información."
|
||||
|
||||
#: i2p2www/pages/site/comparison/tor.html:166
|
||||
#, python-format
|
||||
@ -809,11 +576,7 @@ msgid ""
|
||||
"tunnels are used for more than simply passing end \n"
|
||||
"to end messages (e.g. netDb, tunnel management, \n"
|
||||
"tunnel testing)"
|
||||
msgstr ""
|
||||
"Protección contra la detección de la actividad de un cliente, incluso "
|
||||
"cuando un atacante participa en el túnel, ya que los túneles no son sólo "
|
||||
"usados para pasar el mensaje de punto a punto (por ejemplo, netDB, "
|
||||
"administración de túneles, pruebas en los túneles)"
|
||||
msgstr "Protección contra la detección de la actividad de un cliente, incluso cuando un atacante participa en el túnel, ya que los túneles no son sólo usados para pasar el mensaje de punto a punto (por ejemplo, netDB, administración de túneles, pruebas en los túneles)"
|
||||
|
||||
#: i2p2www/pages/site/comparison/tor.html:180
|
||||
msgid ""
|
||||
@ -821,19 +584,13 @@ msgid ""
|
||||
"of samples that an attacker can use to mount an \n"
|
||||
"active attack with, unlike circuits in Tor, which are\n"
|
||||
"typically long lived."
|
||||
msgstr ""
|
||||
"Los túneles de I2P tienen una vida corta, reduciendo el número de "
|
||||
"muestras que un atacante puede usar para lograr un ataque activo, al "
|
||||
"contrario que con los circuitos en Tor, que son típicamente de larga "
|
||||
"duración."
|
||||
msgstr "Los túneles de I2P tienen una vida corta, reduciendo el número de muestras que un atacante puede usar para lograr un ataque activo, al contrario que con los circuitos en Tor, que son típicamente de larga duración."
|
||||
|
||||
#: i2p2www/pages/site/comparison/tor.html:188
|
||||
msgid ""
|
||||
"I2P APIs are designed specifically for anonymity and\n"
|
||||
"security, while SOCKS is designed for functionality."
|
||||
msgstr ""
|
||||
"Los APIs de I2P están específicamente diseñados para el anonimato y la "
|
||||
"seguridad, mientras que SOCKS está diseñado para su funcionalidad."
|
||||
msgstr "Los APIs de I2P están específicamente diseñados para el anonimato y la seguridad, mientras que SOCKS está diseñado para su funcionalidad."
|
||||
|
||||
#: i2p2www/pages/site/comparison/tor.html:193
|
||||
msgid "Essentially all peers participate in routing for others"
|
||||
@ -844,10 +601,7 @@ msgid ""
|
||||
"The bandwidth overhead of being a full peer is low, \n"
|
||||
"while in Tor, while client nodes don't require much\n"
|
||||
"bandwidth, they don't fully participate in the mixnet."
|
||||
msgstr ""
|
||||
"El uso de ancho de banda de cualquier par completo es bajo, mientras que "
|
||||
"en Tor, aunque un nodo cliente no necesita mucho ancho de banda, "
|
||||
"realmente no participan completamente en la red."
|
||||
msgstr "El uso de ancho de banda de cualquier par completo es bajo, mientras que en Tor, aunque un nodo cliente no necesita mucho ancho de banda, realmente no participan completamente en la red."
|
||||
|
||||
#: i2p2www/pages/site/comparison/tor.html:201
|
||||
msgid "Integrated automatic update mechanism"
|
||||
@ -867,26 +621,20 @@ msgstr "Otros beneficios potenciales de I2P aún no implementados"
|
||||
|
||||
#: i2p2www/pages/site/comparison/tor.html:207
|
||||
msgid "...and may never be implemented, so don't count on them!"
|
||||
msgstr ""
|
||||
"...y puede ser que nunca lleguen a ser implementados, ¡osea que no cuente"
|
||||
" con ellos!"
|
||||
msgstr "...y puede ser que nunca lleguen a ser implementados, ¡osea que no cuente con ellos!"
|
||||
|
||||
#: i2p2www/pages/site/comparison/tor.html:210
|
||||
msgid ""
|
||||
"Defense vs. message count analysis by garlic wrapping \n"
|
||||
"multiple messages"
|
||||
msgstr ""
|
||||
"Defensa contra el análisis de conteo de mensajes envolviendo múltiples "
|
||||
"mensajes dentro de la red garlic"
|
||||
msgstr "Defensa contra el análisis de conteo de mensajes envolviendo múltiples mensajes dentro de la red garlic"
|
||||
|
||||
#: i2p2www/pages/site/comparison/tor.html:216
|
||||
msgid ""
|
||||
"Defense vs. long term intersection by adding delays \n"
|
||||
"at various hops (where the delays are not discernible\n"
|
||||
"by other hops)"
|
||||
msgstr ""
|
||||
"Defensa contra la intersección a largo plazo añadiendo demoras en varios "
|
||||
"saltos (donde las demoras no son perceptibles por los otros saltos)"
|
||||
msgstr "Defensa contra la intersección a largo plazo añadiendo demoras en varios saltos (donde las demoras no son perceptibles por los otros saltos)"
|
||||
|
||||
#: i2p2www/pages/site/comparison/tor.html:223
|
||||
msgid ""
|
||||
@ -894,8 +642,4 @@ msgid ""
|
||||
"create a tunnel that will handle 500 messages / minute,\n"
|
||||
"where the endpoint will inject dummy messages if there\n"
|
||||
"are insufficient messages, etc)"
|
||||
msgstr ""
|
||||
"Varias estrategias de mezclado a nivel del túnel (por ejemplo, creando "
|
||||
"túneles que manejarán 500 mensajes al minuto, donde el punto final "
|
||||
"inyectará mensajes de relleno si no hubiese suficientes mensajes, etc)"
|
||||
|
||||
msgstr "Varias estrategias de mezclado a nivel del túnel (por ejemplo, creando túneles que manejarán 500 mensajes al minuto, donde el punto final inyectará mensajes de relleno si no hubiese suficientes mensajes, etc)"
|
||||
|
File diff suppressed because it is too large
Load Diff
File diff suppressed because it is too large
Load Diff
File diff suppressed because it is too large
Load Diff
File diff suppressed because it is too large
Load Diff
@ -1,31 +1,31 @@
|
||||
# Spanish translations for I2P.
|
||||
# Translations template for I2P.
|
||||
# Copyright (C) 2021 ORGANIZATION
|
||||
# This file is distributed under the same license as the I2P project.
|
||||
#
|
||||
#
|
||||
# Translators:
|
||||
# Adolfo Jayme-Barrientos, 2013
|
||||
# 0f759dd1ea6c4c76cedc299039ca4f23_7584d04
|
||||
# <454cc45058db9632179dc8079c0c1af3_5311>, 2013
|
||||
# 0f759dd1ea6c4c76cedc299039ca4f23_7584d04 <454cc45058db9632179dc8079c0c1af3_5311>, 2013
|
||||
# m1xxy <m1xxy@mail.i2p>, 2011
|
||||
# Oliver Trash <oliver.trasshh@gmail.com>, 2013
|
||||
# strel, 2013-2017
|
||||
# strel, 2013
|
||||
# trolly, 2013
|
||||
# fa1e5d1b5b1ea91a38c4e92aeae85c31_060014a, 2013
|
||||
# fa1e5d1b5b1ea91a38c4e92aeae85c31_060014a, 2013
|
||||
msgid ""
|
||||
msgstr ""
|
||||
"Project-Id-Version: I2P\n"
|
||||
"Project-Id-Version: I2P\n"
|
||||
"Report-Msgid-Bugs-To: http://trac.i2p2.de\n"
|
||||
"POT-Creation-Date: 2021-04-26 14:51+0000\n"
|
||||
"PO-Revision-Date: 2013-07-15 12:01+0000\n"
|
||||
"Last-Translator: strel, 2013-2017\n"
|
||||
"Language-Team: Spanish (http://www.transifex.com/otf/I2P/language/es/)\n"
|
||||
"Plural-Forms: nplurals=3; plural=n == 1 ? 0 : n != 0 && n % 1000000 == 0 "
|
||||
"? 1 : 2\n"
|
||||
"MIME-Version: 1.0\n"
|
||||
"Content-Type: text/plain; charset=utf-8\n"
|
||||
"Content-Type: text/plain; charset=UTF-8\n"
|
||||
"Content-Transfer-Encoding: 8bit\n"
|
||||
"Generated-By: Babel 1.3\n"
|
||||
"Language: es\n"
|
||||
"Plural-Forms: nplurals=3; plural=n == 1 ? 0 : n != 0 && n % 1000000 == 0 ? 1 : 2;\n"
|
||||
|
||||
#: i2p2www/pages/site/research/index.html:2
|
||||
msgid "Academic Research"
|
||||
@ -46,16 +46,11 @@ msgstr ""
|
||||
|
||||
#: i2p2www/pages/site/research/index.html:10
|
||||
msgid ""
|
||||
"I2P is a very unique project that unfortunately has not received the "
|
||||
"wider\n"
|
||||
"academic attention it deserves. To date, most research focus on anonymous"
|
||||
" and\n"
|
||||
"onion-routing technology has been around Tor, and while those papers "
|
||||
"benefit us\n"
|
||||
"as well, there is a great need for I2P-focused research. This plays a key"
|
||||
" role\n"
|
||||
"in both maintaining the security and integrity of the network, as well as"
|
||||
"\n"
|
||||
"I2P is a very unique project that unfortunately has not received the wider\n"
|
||||
"academic attention it deserves. To date, most research focus on anonymous and\n"
|
||||
"onion-routing technology has been around Tor, and while those papers benefit us\n"
|
||||
"as well, there is a great need for I2P-focused research. This plays a key role\n"
|
||||
"in both maintaining the security and integrity of the network, as well as\n"
|
||||
"opening doors for more impactful future development."
|
||||
msgstr ""
|
||||
|
||||
@ -63,43 +58,27 @@ msgstr ""
|
||||
#, python-format
|
||||
msgid ""
|
||||
"\n"
|
||||
"There is a large research community investigating a wide range of aspects"
|
||||
" of\n"
|
||||
"anonymity. For a current and comprehensive list of relevant papers, see "
|
||||
"the\n"
|
||||
"There is a large research community investigating a wide range of aspects of\n"
|
||||
"anonymity. For a current and comprehensive list of relevant papers, see the\n"
|
||||
"<a href=\"%(anonbib)s\">Free Haven Anonymity Bibliography</a>.\n"
|
||||
"I2P benefits from much of the research into Tor and onion routing, but "
|
||||
"there is\n"
|
||||
"little dedicated research interest into the theory behind I2P, and the "
|
||||
"choices\n"
|
||||
"and tradeoffs that the network makes. This presents a unique opportunity "
|
||||
"for\n"
|
||||
"I2P benefits from much of the research into Tor and onion routing, but there is\n"
|
||||
"little dedicated research interest into the theory behind I2P, and the choices\n"
|
||||
"and tradeoffs that the network makes. This presents a unique opportunity for\n"
|
||||
"original research.\n"
|
||||
msgstr ""
|
||||
"\n"
|
||||
"Hay una gran comunidad investigando un amplio rango de aspectos sobre el "
|
||||
"anonimato. Para una lista actualizada y completa de trabajos, vea la <a "
|
||||
"href=\"%(anonbib)s\">bibliografía de anonimato del proyecto Free "
|
||||
"Haven</a>. I2P se beneficia mucho de la investigación acerca deTor y el "
|
||||
"enrutamiento onion, pero hay poco interés dedicado al estudio de la "
|
||||
"teoría tras I2P, y sobre las elecciones y equilibrios que produce la red."
|
||||
" Esto presenta una oportunidad única para la investigación original.\n"
|
||||
msgstr "\nHay una gran comunidad investigando un amplio rango de aspectos sobre el anonimato. Para una lista actualizada y completa de trabajos, vea la <a href=\"%(anonbib)s\">bibliografía de anonimato del proyecto Free Haven</a>. I2P se beneficia mucho de la investigación acerca deTor y el enrutamiento onion, pero hay poco interés dedicado al estudio de la teoría tras I2P, y sobre las elecciones y equilibrios que produce la red. Esto presenta una oportunidad única para la investigación original.\n"
|
||||
|
||||
#: i2p2www/pages/site/research/index.html:29
|
||||
#, python-format
|
||||
msgid ""
|
||||
"A list of known published papers about I2P is available <a "
|
||||
"href=\"%(papers)s\">here</a>."
|
||||
msgstr ""
|
||||
"Una lista de ensayos publicados sobre I2P está disponible <a "
|
||||
"href=\"%(papers)s\">aquí</a>."
|
||||
msgstr "Una lista de ensayos publicados sobre I2P está disponible <a href=\"%(papers)s\">aquí</a>."
|
||||
|
||||
#: i2p2www/pages/site/research/index.html:34
|
||||
msgid ""
|
||||
"\n"
|
||||
"This page aims to outline the most needed fields of research, notes to\n"
|
||||
"potential researchers, our general safety guidelines as well as an "
|
||||
"expanding\n"
|
||||
"potential researchers, our general safety guidelines as well as an expanding\n"
|
||||
"list of open questions that you can begin on at any time.\n"
|
||||
msgstr ""
|
||||
|
||||
@ -113,16 +92,12 @@ msgstr ""
|
||||
|
||||
#: i2p2www/pages/site/research/index.html:44
|
||||
msgid ""
|
||||
"While all research on the I2P network is beneficial and appreciated, "
|
||||
"there are\n"
|
||||
"While all research on the I2P network is beneficial and appreciated, there are\n"
|
||||
"certain areas which are more in need than others - most so in defensive\n"
|
||||
"research. Most people enjoy coming up with fun ways to launch offensives\n"
|
||||
"against anonymous software, and this is further reinforced by the "
|
||||
"incentives in\n"
|
||||
"academic institutions. While we know it is often not the first choice for"
|
||||
"\n"
|
||||
"researchers, We would certainly appreciate any and all work towards ways "
|
||||
"to\n"
|
||||
"against anonymous software, and this is further reinforced by the incentives in\n"
|
||||
"academic institutions. While we know it is often not the first choice for\n"
|
||||
"researchers, We would certainly appreciate any and all work towards ways to\n"
|
||||
"fortify the network!"
|
||||
msgstr ""
|
||||
|
||||
@ -133,27 +108,17 @@ msgstr ""
|
||||
#: i2p2www/pages/site/research/index.html:56
|
||||
#, python-format
|
||||
msgid ""
|
||||
"If you've decided on a research topic that aims to hands-on investigate "
|
||||
"the I2P\n"
|
||||
"network or solve a problem of large proportions we ask you to "
|
||||
"<b>please</b> \n"
|
||||
"<a href=\"%(contact)s\">communicate your ideas</a> to the development "
|
||||
"team, the\n"
|
||||
"sooner the better. I2P is under constant development and a significant "
|
||||
"amount\n"
|
||||
"of roadmapping occurs, therefore your problem may have already been "
|
||||
"identified\n"
|
||||
"and flagged for update or patch. In the unlikely event you are conducting"
|
||||
"\n"
|
||||
"testing that overlaps with / would be of interest to another research "
|
||||
"project\n"
|
||||
"already in motion, we are also able to make you aware of this (with their"
|
||||
"\n"
|
||||
"permission, of course), and possibly open the door for collaboration. "
|
||||
"There is\n"
|
||||
"If you've decided on a research topic that aims to hands-on investigate the I2P\n"
|
||||
"network or solve a problem of large proportions we ask you to <b>please</b> \n"
|
||||
"<a href=\"%(contact)s\">communicate your ideas</a> to the development team, the\n"
|
||||
"sooner the better. I2P is under constant development and a significant amount\n"
|
||||
"of roadmapping occurs, therefore your problem may have already been identified\n"
|
||||
"and flagged for update or patch. In the unlikely event you are conducting\n"
|
||||
"testing that overlaps with / would be of interest to another research project\n"
|
||||
"already in motion, we are also able to make you aware of this (with their\n"
|
||||
"permission, of course), and possibly open the door for collaboration. There is\n"
|
||||
"also a chance that the test itself may significantly harm the network or\n"
|
||||
"regular users, and the team may have ideas or suggestions to mitigate "
|
||||
"that risk\n"
|
||||
"regular users, and the team may have ideas or suggestions to mitigate that risk\n"
|
||||
"and increase the safety of your testing."
|
||||
msgstr ""
|
||||
|
||||
@ -169,13 +134,11 @@ msgstr ""
|
||||
msgid ""
|
||||
"<ol>\n"
|
||||
" <li>\n"
|
||||
" Consider the benefits and risks - is there any doubt that the "
|
||||
"research\n"
|
||||
" Consider the benefits and risks - is there any doubt that the research\n"
|
||||
" provides more value than danger?\n"
|
||||
" </li>\n"
|
||||
" <li>\n"
|
||||
" If the research can be done on a test network then that is the "
|
||||
"preferred\n"
|
||||
" If the research can be done on a test network then that is the preferred\n"
|
||||
" method\n"
|
||||
" </li>\n"
|
||||
" <li>\n"
|
||||
@ -183,10 +146,8 @@ msgid ""
|
||||
" collecting data about yourself\n"
|
||||
" </li>\n"
|
||||
" <li>\n"
|
||||
" If you need 'bigger data', It is recommended to first see if you can "
|
||||
"use\n"
|
||||
" data sets from previous experiments or other third party resources is"
|
||||
"\n"
|
||||
" If you need 'bigger data', It is recommended to first see if you can use\n"
|
||||
" data sets from previous experiments or other third party resources is\n"
|
||||
" recommended\n"
|
||||
" </li>\n"
|
||||
" <li>\n"
|
||||
@ -194,10 +155,8 @@ msgid ""
|
||||
" publication and collect as little as possible\n"
|
||||
" </li>\n"
|
||||
" <li>\n"
|
||||
" After testing and before publish, review that all data which is to be"
|
||||
"\n"
|
||||
" published publicly is <b><i>not</i></b> intended to be private by the"
|
||||
"\n"
|
||||
" After testing and before publish, review that all data which is to be\n"
|
||||
" published publicly is <b><i>not</i></b> intended to be private by the\n"
|
||||
" originator\n"
|
||||
" </li>\n"
|
||||
"</ol>"
|
||||
@ -209,32 +168,24 @@ msgstr ""
|
||||
|
||||
#: i2p2www/pages/site/research/index.html:108
|
||||
msgid ""
|
||||
"I2P can be run as a separate test network by controlling the locations "
|
||||
"that a\n"
|
||||
"I2P can be run as a separate test network by controlling the locations that a\n"
|
||||
"new router reseeds from so that it only finds other test routers.\n"
|
||||
"\n"
|
||||
"The standard mode of operation is to have one JVM per router instance; "
|
||||
"hence\n"
|
||||
"running multiple copies of I2P on a single machine is inadvisable, both "
|
||||
"due to\n"
|
||||
"The standard mode of operation is to have one JVM per router instance; hence\n"
|
||||
"running multiple copies of I2P on a single machine is inadvisable, both due to\n"
|
||||
"the potential resource drain and the certain port conflicts. To better\n"
|
||||
"facilitate setting up small test networks, I2P has a multirouter mode "
|
||||
"which\n"
|
||||
"facilitate setting up small test networks, I2P has a multirouter mode which\n"
|
||||
"enables multiple distinct routers to be run in the same JVM.\n"
|
||||
"\n"
|
||||
"MultiRouter can be started from the i2p base directory by running the "
|
||||
"below\n"
|
||||
"MultiRouter can be started from the i2p base directory by running the below\n"
|
||||
"command."
|
||||
msgstr ""
|
||||
|
||||
#: i2p2www/pages/site/research/index.html:124
|
||||
msgid ""
|
||||
"Additionally, I2P can be started in a virtual network mode. This mode "
|
||||
"disables\n"
|
||||
"all transports, allowing the router to be tested in isolation without "
|
||||
"network\n"
|
||||
"traffic. To enable this mode, add <code>i2p.vmCommSystem=true</code> to "
|
||||
"the\n"
|
||||
"Additionally, I2P can be started in a virtual network mode. This mode disables\n"
|
||||
"all transports, allowing the router to be tested in isolation without network\n"
|
||||
"traffic. To enable this mode, add <code>i2p.vmCommSystem=true</code> to the\n"
|
||||
"router.config before starting."
|
||||
msgstr ""
|
||||
|
||||
@ -245,13 +196,10 @@ msgstr ""
|
||||
#: i2p2www/pages/site/research/index.html:133
|
||||
#, python-format
|
||||
msgid ""
|
||||
"As stated above in the researcher notes, please <a "
|
||||
"href=\"%(contact)s\">contact\n"
|
||||
"As stated above in the researcher notes, please <a href=\"%(contact)s\">contact\n"
|
||||
" us</a> before you commence your testing. While we do not discourage\n"
|
||||
"researchers from responsibly testing their ideas on the live network, if "
|
||||
"an\n"
|
||||
"attack becomes apparent and we don't have any line of communication then "
|
||||
"we\n"
|
||||
"researchers from responsibly testing their ideas on the live network, if an\n"
|
||||
"attack becomes apparent and we don't have any line of communication then we\n"
|
||||
"will end up taking countermeasures which could interfere with the test."
|
||||
msgstr ""
|
||||
|
||||
@ -261,35 +209,23 @@ msgstr "Configuración de familia de routers I2P"
|
||||
|
||||
#: i2p2www/pages/site/research/index.html:143
|
||||
msgid ""
|
||||
"As of release 0.9.25, I2P supports a router family configuration. This "
|
||||
"provides\n"
|
||||
"researchers who run multiple routers with the means to publicly identify "
|
||||
"those\n"
|
||||
"routers. In turn, this helps the I2P project understand that these "
|
||||
"routers are\n"
|
||||
"not running an attack on the network. It also will prevent other routers "
|
||||
"from\n"
|
||||
"including multiple routers of the family in a single tunnel, which could "
|
||||
"lead\n"
|
||||
"to deanonymization. Routers that appear to be colluding but do not have a"
|
||||
"\n"
|
||||
"declared family may be assumed to be an attack on the network, and may be"
|
||||
"\n"
|
||||
"blocked. The best way to ensure the success of your research project is "
|
||||
"to work\n"
|
||||
"As of release 0.9.25, I2P supports a router family configuration. This provides\n"
|
||||
"researchers who run multiple routers with the means to publicly identify those\n"
|
||||
"routers. In turn, this helps the I2P project understand that these routers are\n"
|
||||
"not running an attack on the network. It also will prevent other routers from\n"
|
||||
"including multiple routers of the family in a single tunnel, which could lead\n"
|
||||
"to deanonymization. Routers that appear to be colluding but do not have a\n"
|
||||
"declared family may be assumed to be an attack on the network, and may be\n"
|
||||
"blocked. The best way to ensure the success of your research project is to work\n"
|
||||
"with us directly."
|
||||
msgstr ""
|
||||
|
||||
#: i2p2www/pages/site/research/index.html:155
|
||||
msgid ""
|
||||
"A router family shares a private key so that participation in the family "
|
||||
"cannot\n"
|
||||
"be spoofed. To configure a router family, click on the 'I2P Internals' "
|
||||
"link in\n"
|
||||
"the router console, and then on the 'Family' tab. Follow the instructions"
|
||||
" there\n"
|
||||
"to generate the private key for the first router in the family. Then, "
|
||||
"export\n"
|
||||
"A router family shares a private key so that participation in the family cannot\n"
|
||||
"be spoofed. To configure a router family, click on the 'I2P Internals' link in\n"
|
||||
"the router console, and then on the 'Family' tab. Follow the instructions there\n"
|
||||
"to generate the private key for the first router in the family. Then, export\n"
|
||||
"the key from that router, and import it to other members of the family."
|
||||
msgstr ""
|
||||
|
||||
@ -344,12 +280,8 @@ msgstr "Proceso de respuesta a la vulnerabilidad (VRP)"
|
||||
#: i2p2www/pages/site/research/vrp.html:6
|
||||
msgid ""
|
||||
"\n"
|
||||
"This process is subject to change. Please refer to this page for the "
|
||||
"current VRP."
|
||||
msgstr ""
|
||||
"\n"
|
||||
"Este proceso está sujeto a cambio. Por favor, refiérase a esta página "
|
||||
"para el actual VRP."
|
||||
"This process is subject to change. Please refer to this page for the current VRP."
|
||||
msgstr "\nEste proceso está sujeto a cambio. Por favor, refiérase a esta página para el actual VRP."
|
||||
|
||||
#: i2p2www/pages/site/research/vrp.html:10
|
||||
msgid "This page was last updated in June 2020."
|
||||
@ -357,22 +289,15 @@ msgstr ""
|
||||
|
||||
#: i2p2www/pages/site/research/vrp.html:12
|
||||
msgid ""
|
||||
"Researchers: while you research/hack, we ask that you refrain from the "
|
||||
"following: - Performing active exploits or Denial of Service attacks on "
|
||||
"the\n"
|
||||
"i2p network - Performing social engineering on i2p development team "
|
||||
"members - Performing any physical or electronic attempts against i2p "
|
||||
"property and/or data\n"
|
||||
"Researchers: while you research/hack, we ask that you refrain from the following: - Performing active exploits or Denial of Service attacks on the\n"
|
||||
"i2p network - Performing social engineering on i2p development team members - Performing any physical or electronic attempts against i2p property and/or data\n"
|
||||
"centers"
|
||||
msgstr ""
|
||||
|
||||
#: i2p2www/pages/site/research/vrp.html:15
|
||||
msgid ""
|
||||
"As i2p is an open-source community, many volunteers and development team "
|
||||
"members run their own I2P Sites as well as public (“non-private "
|
||||
"internet”) domains. These\n"
|
||||
"sites/servers are NOT in the scope of the vulnerability assessment / "
|
||||
"response process, only the underlying code of i2p is."
|
||||
"As i2p is an open-source community, many volunteers and development team members run their own I2P Sites as well as public (“non-private internet”) domains. These\n"
|
||||
"sites/servers are NOT in the scope of the vulnerability assessment / response process, only the underlying code of i2p is."
|
||||
msgstr ""
|
||||
|
||||
#: i2p2www/pages/site/research/vrp.html:18
|
||||
@ -399,14 +324,9 @@ msgstr ""
|
||||
|
||||
#: i2p2www/pages/site/research/vrp.html:37
|
||||
msgid ""
|
||||
"Response Team designates a Response Manager who is in charge of the "
|
||||
"particular\n"
|
||||
"Response Team designates a Response Manager who is in charge of the particular\n"
|
||||
"report based on availability and/or knowledge-set."
|
||||
msgstr ""
|
||||
"El equipo de respuesta designa un gestor de respuesta que se ocupa del "
|
||||
"informe\n"
|
||||
"en particular en base a la disponibilidad y/o al conjunto de "
|
||||
"conocimientos."
|
||||
msgstr "El equipo de respuesta designa un gestor de respuesta que se ocupa del informe\nen particular en base a la disponibilidad y/o al conjunto de conocimientos."
|
||||
|
||||
#: i2p2www/pages/site/research/vrp.html:42
|
||||
#, python-format
|
||||
@ -417,14 +337,9 @@ msgstr ""
|
||||
|
||||
#: i2p2www/pages/site/research/vrp.html:47
|
||||
msgid ""
|
||||
"Response Manager makes inquiries to satisfy any needed information and to"
|
||||
"\n"
|
||||
"Response Manager makes inquiries to satisfy any needed information and to\n"
|
||||
"confirm if submission is indeed a vulnerability."
|
||||
msgstr ""
|
||||
"El gestor de respuesta formula preguntas para satisfacer cualquier "
|
||||
"información\n"
|
||||
"necesaria y para confirmar si la entrega efectivamente indica una "
|
||||
"vulnerabilidad."
|
||||
msgstr "El gestor de respuesta formula preguntas para satisfacer cualquier información\nnecesaria y para confirmar si la entrega efectivamente indica una vulnerabilidad."
|
||||
|
||||
#: i2p2www/pages/site/research/vrp.html:52
|
||||
msgid "If submission proves to be vulnerable, proceed."
|
||||
@ -438,34 +353,26 @@ msgstr "Si no indica vulnerabilidad:"
|
||||
msgid ""
|
||||
"Response Manager responds with reasons why submission is not a "
|
||||
"vulnerability."
|
||||
msgstr ""
|
||||
"El gestor de respuesta responde con las razones por las que la entrega no"
|
||||
" indica una vulnerabilidad."
|
||||
msgstr "El gestor de respuesta responde con las razones por las que la entrega no indica una vulnerabilidad."
|
||||
|
||||
#: i2p2www/pages/site/research/vrp.html:62
|
||||
msgid ""
|
||||
"Response Manager moves discussion to a new or existing ticket on public "
|
||||
"Trac if necessary."
|
||||
msgstr ""
|
||||
"Si es necesario, el gestor de respuesta mueve la conversación a un "
|
||||
"'ticket' nuevo o existente en un Trac público."
|
||||
"Response Manager moves discussion to a new or existing ticket on public Trac"
|
||||
" if necessary."
|
||||
msgstr "Si es necesario, el gestor de respuesta mueve la conversación a un 'ticket' nuevo o existente en un Trac público."
|
||||
|
||||
#: i2p2www/pages/site/research/vrp.html:70
|
||||
msgid ""
|
||||
"\n"
|
||||
"Establish severity of vulnerability:\n"
|
||||
" "
|
||||
msgstr ""
|
||||
"\n"
|
||||
"Establezca la gravedad de la vulnerabilidad:"
|
||||
msgstr "\nEstablezca la gravedad de la vulnerabilidad:"
|
||||
|
||||
#: i2p2www/pages/site/research/vrp.html:75
|
||||
msgid ""
|
||||
"Affects network as a whole, has potential to break entire network or is "
|
||||
"on a scale of great catastrophe."
|
||||
msgstr ""
|
||||
"Repercute en la red como conjunto, tiene potencial para desbaratar la red"
|
||||
" entera o está al nivel de una gran catástrofe."
|
||||
"Affects network as a whole, has potential to break entire network or is on a"
|
||||
" scale of great catastrophe."
|
||||
msgstr "Repercute en la red como conjunto, tiene potencial para desbaratar la red entera o está al nivel de una gran catástrofe."
|
||||
|
||||
#: i2p2www/pages/site/research/vrp.html:79
|
||||
msgid "Affects individual routers, or must be carefully exploited."
|
||||
@ -482,29 +389,20 @@ msgstr "Responda de acuerdo a la gravedad de la vulnerabilidad:"
|
||||
#: i2p2www/pages/site/research/vrp.html:93
|
||||
#, python-format
|
||||
msgid ""
|
||||
"HIGH severities must be notified on website and news feed within "
|
||||
"%(limit)s\n"
|
||||
"HIGH severities must be notified on website and news feed within %(limit)s\n"
|
||||
"working days of classification."
|
||||
msgstr ""
|
||||
"Las de gravedad ALTA deben notificarse en el sitio web y en la "
|
||||
"suscripción\n"
|
||||
"de novedades en %(limit)s días laborables desde su clasificación."
|
||||
msgstr "Las de gravedad ALTA deben notificarse en el sitio web y en la suscripción\nde novedades en %(limit)s días laborables desde su clasificación."
|
||||
|
||||
#: i2p2www/pages/site/research/vrp.html:98
|
||||
msgid "The notification should list appropriate steps for users to take, if any."
|
||||
msgstr ""
|
||||
"La notificación debe, en su caso, enumerar los pasos adecuados a seguir "
|
||||
"por los usuarios."
|
||||
msgid ""
|
||||
"The notification should list appropriate steps for users to take, if any."
|
||||
msgstr "La notificación debe, en su caso, enumerar los pasos adecuados a seguir por los usuarios."
|
||||
|
||||
#: i2p2www/pages/site/research/vrp.html:101
|
||||
msgid ""
|
||||
"The notification must not include any details that could suggest an "
|
||||
"exploitation\n"
|
||||
"The notification must not include any details that could suggest an exploitation\n"
|
||||
"path."
|
||||
msgstr ""
|
||||
"La notificación no debe incluir detalle alguno que pudiera sugerir una "
|
||||
"vía para\n"
|
||||
"explotar la vulnerabilidad."
|
||||
msgstr "La notificación no debe incluir detalle alguno que pudiera sugerir una vía para\nexplotar la vulnerabilidad."
|
||||
|
||||
#: i2p2www/pages/site/research/vrp.html:105
|
||||
msgid "The latter takes precedence over the former."
|
||||
@ -525,8 +423,8 @@ msgstr "El equipo de respuesta aplica el/los parche(s) apropiado(s)."
|
||||
#: i2p2www/pages/site/research/vrp.html:122
|
||||
msgid ""
|
||||
"Response Manager works on a patch LOCALLY, patches are shared by the "
|
||||
"response team via PGP-encrypted e-mail until such a time as it is safe to"
|
||||
" expose to the public."
|
||||
"response team via PGP-encrypted e-mail until such a time as it is safe to "
|
||||
"expose to the public."
|
||||
msgstr ""
|
||||
|
||||
#: i2p2www/pages/site/research/vrp.html:125
|
||||
@ -535,14 +433,9 @@ msgstr "Los parches se revisan con el investigador."
|
||||
|
||||
#: i2p2www/pages/site/research/vrp.html:128
|
||||
msgid ""
|
||||
"Any messages associated with PUBLIC commits during the time of review "
|
||||
"should not\n"
|
||||
"make reference to the security nature of the PRIVATE branch or its "
|
||||
"commits."
|
||||
msgstr ""
|
||||
"Cualquier mensaje asociado con consignaciones (commits) PÚBLICAS durante "
|
||||
"el periodo de revisión no debe hacer referencia a la naturaleza de "
|
||||
"seguridad del ramal (branch) PRIVADO o de sus consignaciones."
|
||||
"Any messages associated with PUBLIC commits during the time of review should not\n"
|
||||
"make reference to the security nature of the PRIVATE branch or its commits."
|
||||
msgstr "Cualquier mensaje asociado con consignaciones (commits) PÚBLICAS durante el periodo de revisión no debe hacer referencia a la naturaleza de seguridad del ramal (branch) PRIVADO o de sus consignaciones."
|
||||
|
||||
#: i2p2www/pages/site/research/vrp.html:132
|
||||
msgid "Vulnerability announcement is drafted."
|
||||
@ -568,33 +461,22 @@ msgstr "Se discute la fecha de publicación."
|
||||
msgid ""
|
||||
"At release date, Response Team coordinates with developers to finalize "
|
||||
"update:"
|
||||
msgstr ""
|
||||
"En la fecha de publicación, el equipo de respuesta se coordina con los "
|
||||
"desarrolladores para culminar la actualización:"
|
||||
msgstr "En la fecha de publicación, el equipo de respuesta se coordina con los desarrolladores para culminar la actualización:"
|
||||
|
||||
#: i2p2www/pages/site/research/vrp.html:156
|
||||
msgid "Response Manager propagates the \"hotfix branch\" to trunk."
|
||||
msgstr ""
|
||||
"El gestor de respuesta propaga el \"hotfix branch\" (ramal de corrección "
|
||||
"urgente) a trunk (ramal troncal)."
|
||||
msgstr "El gestor de respuesta propaga el \"hotfix branch\" (ramal de corrección urgente) a trunk (ramal troncal)."
|
||||
|
||||
#: i2p2www/pages/site/research/vrp.html:159
|
||||
msgid ""
|
||||
"Response Manager includes vulnerability announcement draft in release "
|
||||
"notes."
|
||||
msgstr ""
|
||||
"El gestor de respuesta incluye el borrador de anuncio de vulnerabilidad "
|
||||
"en las notas de la versión."
|
||||
"Response Manager includes vulnerability announcement draft in release notes."
|
||||
msgstr "El gestor de respuesta incluye el borrador de anuncio de vulnerabilidad en las notas de la versión."
|
||||
|
||||
#: i2p2www/pages/site/research/vrp.html:162
|
||||
msgid ""
|
||||
"Proceed with the Point or Regular Release. At this time, it is not "
|
||||
"possible to release an in-network update for only one operating system or"
|
||||
"\n"
|
||||
"\t\tarchitecture. In order that all affected products can be released as "
|
||||
"quickly as possible, the person responsible\n"
|
||||
"\t\tfor that software should be able to perform necessary release "
|
||||
"processes in a timely manner. Importantly this should include\n"
|
||||
"Proceed with the Point or Regular Release. At this time, it is not possible to release an in-network update for only one operating system or\n"
|
||||
"\t\tarchitecture. In order that all affected products can be released as quickly as possible, the person responsible\n"
|
||||
"\t\tfor that software should be able to perform necessary release processes in a timely manner. Importantly this should include\n"
|
||||
"\t\tconsideration for package maintainers in Debian, Ubuntu and F-Droid."
|
||||
msgstr ""
|
||||
|
||||
@ -604,24 +486,20 @@ msgstr "Proceso de divulgación post-publicación"
|
||||
|
||||
#: i2p2www/pages/site/research/vrp.html:175
|
||||
#, python-format
|
||||
msgid "Response Team has %(limit)s days to fulfill all points within section III."
|
||||
msgstr ""
|
||||
"El equipo de respuesta tiene %(limit)s días para satisfacer todos los "
|
||||
"puntos dentro de la sección III."
|
||||
msgid ""
|
||||
"Response Team has %(limit)s days to fulfill all points within section III."
|
||||
msgstr "El equipo de respuesta tiene %(limit)s días para satisfacer todos los puntos dentro de la sección III."
|
||||
|
||||
#: i2p2www/pages/site/research/vrp.html:179
|
||||
msgid "If the Incident Response process in section III is successfully completed:"
|
||||
msgstr ""
|
||||
"Si el proceso de respuesta a incidente en la sección III se completa con "
|
||||
"éxito:"
|
||||
msgid ""
|
||||
"If the Incident Response process in section III is successfully completed:"
|
||||
msgstr "Si el proceso de respuesta a incidente en la sección III se completa con éxito:"
|
||||
|
||||
#: i2p2www/pages/site/research/vrp.html:183
|
||||
msgid ""
|
||||
"Response Manager contacts researcher and asks if researcher wishes for "
|
||||
"credit."
|
||||
msgstr ""
|
||||
"El gestor de respuesta contacta con el investigador y le pregunta si "
|
||||
"desea aparecer en los créditos."
|
||||
msgstr "El gestor de respuesta contacta con el investigador y le pregunta si desea aparecer en los créditos."
|
||||
|
||||
#: i2p2www/pages/site/research/vrp.html:186
|
||||
msgid "Finalize vulnerability announcement draft and include the following:"
|
||||
@ -640,10 +518,7 @@ msgid ""
|
||||
"Versions known to be not affected (for example, the vulnerable code was "
|
||||
"introduced in a recent version, and older versions are therefore "
|
||||
"unaffected)."
|
||||
msgstr ""
|
||||
"Versiones que se sabe que no están afectadas (por ejemplo, si el código "
|
||||
"vulnerable fue introducido en una versión reciente, las versiones "
|
||||
"anteriores no están afectadas)."
|
||||
msgstr "Versiones que se sabe que no están afectadas (por ejemplo, si el código vulnerable fue introducido en una versión reciente, las versiones anteriores no están afectadas)."
|
||||
|
||||
#: i2p2www/pages/site/research/vrp.html:199
|
||||
msgid "Versions not checked."
|
||||
@ -655,9 +530,7 @@ msgstr "Tipo de vulnerabilidad y su impacto."
|
||||
|
||||
#: i2p2www/pages/site/research/vrp.html:205
|
||||
msgid "If already obtained or applicable, a CVE-ID."
|
||||
msgstr ""
|
||||
"Si ya se obtuvo o se aplica, un CVE-ID (identificador de "
|
||||
"vulnerabilidades)."
|
||||
msgstr "Si ya se obtuvo o se aplica, un CVE-ID (identificador de vulnerabilidades)."
|
||||
|
||||
#: i2p2www/pages/site/research/vrp.html:208
|
||||
msgid "The planned, coordinated release date."
|
||||
@ -667,105 +540,72 @@ msgstr "La fecha planeada de publicación coordinada."
|
||||
msgid ""
|
||||
"Mitigating factors (for example, the vulnerability is only exposed in "
|
||||
"uncommon, non-default configurations)."
|
||||
msgstr ""
|
||||
"Factores de mitigación (por ejemplo, la vulnerabilidad sólo se expone con"
|
||||
" configuraciones infrecuentes, y no predeterminadas)."
|
||||
msgstr "Factores de mitigación (por ejemplo, la vulnerabilidad sólo se expone con configuraciones infrecuentes, y no predeterminadas)."
|
||||
|
||||
#: i2p2www/pages/site/research/vrp.html:214
|
||||
msgid ""
|
||||
"Workarounds (configuration changes users can make to reduce their "
|
||||
"exposure to the vulnerability)."
|
||||
msgstr ""
|
||||
"Soluciones auxiliares (cambios que el usuario puede hacer en la "
|
||||
"configuración para reducir su exposición a la vulnerabilidad)."
|
||||
"Workarounds (configuration changes users can make to reduce their exposure "
|
||||
"to the vulnerability)."
|
||||
msgstr "Soluciones auxiliares (cambios que el usuario puede hacer en la configuración para reducir su exposición a la vulnerabilidad)."
|
||||
|
||||
#: i2p2www/pages/site/research/vrp.html:217
|
||||
msgid "If applicable, credits to the original reporter."
|
||||
msgstr "Si se aplica, créditos al informante original."
|
||||
|
||||
#: i2p2www/pages/site/research/vrp.html:222
|
||||
msgid "Release finalized vulnerability announcement on website and in news feed."
|
||||
msgstr ""
|
||||
"Anuncio de fin de la vulnerabilidad mediante la versión en el sitio web y"
|
||||
" en la suscripción de novedades."
|
||||
msgid ""
|
||||
"Release finalized vulnerability announcement on website and in news feed."
|
||||
msgstr "Anuncio de fin de la vulnerabilidad mediante la versión en el sitio web y en la suscripción de novedades."
|
||||
|
||||
#: i2p2www/pages/site/research/vrp.html:230
|
||||
msgid ""
|
||||
"For HIGH severities, release finalized vulnerability announcement on "
|
||||
"well-known mailing lists:"
|
||||
msgstr ""
|
||||
"Para severidades ALTAs, anuncio de fin de la vulnerabilidad mediante la "
|
||||
"versión en listas de correo bien-conocidas:"
|
||||
"For HIGH severities, release finalized vulnerability announcement on well-"
|
||||
"known mailing lists:"
|
||||
msgstr "Para severidades ALTAs, anuncio de fin de la vulnerabilidad mediante la versión en listas de correo bien-conocidas:"
|
||||
|
||||
#: i2p2www/pages/site/research/vrp.html:238
|
||||
msgid "If applicable, developers request a CVE-ID."
|
||||
msgstr ""
|
||||
"Si se aplica, los desarrolladores solicitan un CVE-ID (identificador de "
|
||||
"vulnerabilidad)."
|
||||
msgstr "Si se aplica, los desarrolladores solicitan un CVE-ID (identificador de vulnerabilidad)."
|
||||
|
||||
#: i2p2www/pages/site/research/vrp.html:242
|
||||
msgid ""
|
||||
"The commit that applied the fix is made reference too in a future commit "
|
||||
"and includes a CVE-ID."
|
||||
msgstr ""
|
||||
"Se hace referencia también a la consignación (commit) que aplicó la "
|
||||
"corrección en una futura consignación, y se incluye un CVE-ID."
|
||||
"The commit that applied the fix is made reference too in a future commit and"
|
||||
" includes a CVE-ID."
|
||||
msgstr "Se hace referencia también a la consignación (commit) que aplicó la corrección en una futura consignación, y se incluye un CVE-ID."
|
||||
|
||||
#: i2p2www/pages/site/research/vrp.html:250
|
||||
msgid ""
|
||||
"If the Incident Response process in section III is *not* successfully "
|
||||
"completed:"
|
||||
msgstr ""
|
||||
"Si el proceso de respuesta a incidente en la sección III *no* se completó"
|
||||
" con éxito:"
|
||||
msgstr "Si el proceso de respuesta a incidente en la sección III *no* se completó con éxito:"
|
||||
|
||||
#: i2p2www/pages/site/research/vrp.html:254
|
||||
msgid ""
|
||||
"Response Team and developers organize an IRC meeting to discuss why/what "
|
||||
"points\n"
|
||||
"in section III were not resolved and how the team can resolve them in the"
|
||||
"\n"
|
||||
"Response Team and developers organize an IRC meeting to discuss why/what points\n"
|
||||
"in section III were not resolved and how the team can resolve them in the\n"
|
||||
"future."
|
||||
msgstr ""
|
||||
"El equipo de respuesta y los desarolladores organizan una reunión en el "
|
||||
"IRC para\n"
|
||||
"discutir por qué y qué puntos de la sección III no se resolvieron, y cómo"
|
||||
" puede el equipo resolverlos en el futuro."
|
||||
msgstr "El equipo de respuesta y los desarolladores organizan una reunión en el IRC para\ndiscutir por qué y qué puntos de la sección III no se resolvieron, y cómo puede el equipo resolverlos en el futuro."
|
||||
|
||||
#: i2p2www/pages/site/research/vrp.html:259
|
||||
msgid ""
|
||||
"Any developer meetings immediately following the incident should include "
|
||||
"points\n"
|
||||
"Any developer meetings immediately following the incident should include points\n"
|
||||
"made in section V."
|
||||
msgstr ""
|
||||
"Cualquier reunión de desarrolladores inmediatamente a continuación del "
|
||||
"incidente\n"
|
||||
"debe incluir los puntos en la sección V."
|
||||
msgstr "Cualquier reunión de desarrolladores inmediatamente a continuación del incidente\ndebe incluir los puntos en la sección V."
|
||||
|
||||
#: i2p2www/pages/site/research/vrp.html:263
|
||||
msgid ""
|
||||
"If disputes arise about whether or when to disclose information about a\n"
|
||||
"vulnerability, the Response Team will publicly discuss the issue via IRC "
|
||||
"and\n"
|
||||
"vulnerability, the Response Team will publicly discuss the issue via IRC and\n"
|
||||
"attempt to reach consensus."
|
||||
msgstr ""
|
||||
"Si surgen disputas acerca de si divulgar o no información acerca de una\n"
|
||||
"vulnerabilidad, o cuándo hacerlo, el equipo de respuesta discutirá "
|
||||
"públicamente\n"
|
||||
"el problema en el IRC e intentará alcanzar un consenso."
|
||||
msgstr "Si surgen disputas acerca de si divulgar o no información acerca de una\nvulnerabilidad, o cuándo hacerlo, el equipo de respuesta discutirá públicamente\nel problema en el IRC e intentará alcanzar un consenso."
|
||||
|
||||
#: i2p2www/pages/site/research/vrp.html:268
|
||||
#, python-format
|
||||
msgid ""
|
||||
"If consensus on a timely disclosure is not met (no later than %(limit)s "
|
||||
"days),\n"
|
||||
"If consensus on a timely disclosure is not met (no later than %(limit)s days),\n"
|
||||
"the researcher (after %(limit)s days) has every right to expose the\n"
|
||||
"vulnerability to the public."
|
||||
msgstr ""
|
||||
"Si no se alcanza un conseso para una divulgación a tiempo (no más tarde\n"
|
||||
"de %(limit)s días), el investigador (tras %(limit)s días) está totalmente"
|
||||
"\n"
|
||||
"legitimado para exponer la vulnerabilidad al público."
|
||||
msgstr "Si no se alcanza un conseso para una divulgación a tiempo (no más tarde\nde %(limit)s días), el investigador (tras %(limit)s días) está totalmente\nlegitimado para exponer la vulnerabilidad al público."
|
||||
|
||||
#: i2p2www/pages/site/research/vrp.html:277
|
||||
msgid "Incident Analysis"
|
||||
@ -777,10 +617,9 @@ msgstr "Aislar el código base"
|
||||
|
||||
#: i2p2www/pages/site/research/vrp.html:282
|
||||
#: i2p2www/pages/site/research/vrp.html:302
|
||||
msgid "Response Team and developers should coordinate to work on the following:"
|
||||
msgstr ""
|
||||
"El equipo de respuesta y los desarrolladores deben coordinarse para "
|
||||
"trabajar en lo siguiente:"
|
||||
msgid ""
|
||||
"Response Team and developers should coordinate to work on the following:"
|
||||
msgstr "El equipo de respuesta y los desarrolladores deben coordinarse para trabajar en lo siguiente:"
|
||||
|
||||
#: i2p2www/pages/site/research/vrp.html:286
|
||||
msgid "Problematic implementation of classes/libraries/functions, etc."
|
||||
@ -800,9 +639,7 @@ msgstr "Auditoría"
|
||||
|
||||
#: i2p2www/pages/site/research/vrp.html:306
|
||||
msgid "Auditing of problem area(s) as discussed in point 1."
|
||||
msgstr ""
|
||||
"Auditado de la(s) área(s) problemáticas tal como se discutió en el punto "
|
||||
"1."
|
||||
msgstr "Auditado de la(s) área(s) problemáticas tal como se discutió en el punto 1."
|
||||
|
||||
#: i2p2www/pages/site/research/vrp.html:309
|
||||
msgid "Generate internal reports and store for future reference."
|
||||
@ -810,22 +647,15 @@ msgstr "Generar informes internos y almacenarlos para futura referencia."
|
||||
|
||||
#: i2p2www/pages/site/research/vrp.html:312
|
||||
msgid ""
|
||||
"If results are not sensitive, share with the public via IRC or public "
|
||||
"Trac."
|
||||
msgstr ""
|
||||
"Si los resultados no son información sensible, compartirlos con el "
|
||||
"público vía IRC o mediante el Trac público."
|
||||
"If results are not sensitive, share with the public via IRC or public Trac."
|
||||
msgstr "Si los resultados no son información sensible, compartirlos con el público vía IRC o mediante el Trac público."
|
||||
|
||||
#: i2p2www/pages/site/research/vrp.html:320
|
||||
#, python-format
|
||||
msgid ""
|
||||
"Response Team has %(limit)s days following completion of section III to "
|
||||
"ensure\n"
|
||||
"Response Team has %(limit)s days following completion of section III to ensure\n"
|
||||
"completion of section V."
|
||||
msgstr ""
|
||||
"El equipo de respuesta dispone de %(limit)s días tras completar la "
|
||||
"sección III\n"
|
||||
"para asegurar el completado de la sección V."
|
||||
msgstr "El equipo de respuesta dispone de %(limit)s días tras completar la sección III\npara asegurar el completado de la sección V."
|
||||
|
||||
#: i2p2www/pages/site/research/vrp.html:326
|
||||
msgid "Resolutions"
|
||||
@ -833,17 +663,10 @@ msgstr "Resoluciones"
|
||||
|
||||
#: i2p2www/pages/site/research/vrp.html:328
|
||||
msgid ""
|
||||
"Any further questions or resolutions regarding the incident(s) between "
|
||||
"the\n"
|
||||
"researcher and response + development team after public disclosure can be"
|
||||
"\n"
|
||||
"Any further questions or resolutions regarding the incident(s) between the\n"
|
||||
"researcher and response + development team after public disclosure can be\n"
|
||||
"addressed via the following:"
|
||||
msgstr ""
|
||||
"En relación a el/los incidente(s), cualquier pregunta o resolución "
|
||||
"adicional\n"
|
||||
"entre el investigador y el equipo de respuesta y desarrollo tras la "
|
||||
"divulgación\n"
|
||||
"pública, puede ser abordado mediante lo siguiente:"
|
||||
msgstr "En relación a el/los incidente(s), cualquier pregunta o resolución adicional\nentre el investigador y el equipo de respuesta y desarrollo tras la divulgación\npública, puede ser abordado mediante lo siguiente:"
|
||||
|
||||
#: i2p2www/pages/site/research/vrp.html:341
|
||||
msgid "Continuous Improvement"
|
||||
@ -851,22 +674,15 @@ msgstr "Mejora continua"
|
||||
|
||||
#: i2p2www/pages/site/research/vrp.html:344
|
||||
msgid ""
|
||||
"Response Team and developers should hold annual meetings to review the "
|
||||
"previous\n"
|
||||
"Response Team and developers should hold annual meetings to review the previous\n"
|
||||
"year's incidents."
|
||||
msgstr ""
|
||||
"El equipo de respuesta y los desarrolladores deben mantener reuniones "
|
||||
"anuales\n"
|
||||
"para revisar los incidentes del año anterior."
|
||||
msgstr "El equipo de respuesta y los desarrolladores deben mantener reuniones anuales\npara revisar los incidentes del año anterior."
|
||||
|
||||
#: i2p2www/pages/site/research/vrp.html:349
|
||||
msgid ""
|
||||
"Response Team or designated person(s) should give a brief presentation, "
|
||||
"including:"
|
||||
msgstr ""
|
||||
"El equipo de respuesta o la(s) persona(s) designada(s) debe(n) "
|
||||
"proporcionar una\n"
|
||||
"presentación breve, incluyendo:"
|
||||
msgstr "El equipo de respuesta o la(s) persona(s) designada(s) debe(n) proporcionar una\npresentación breve, incluyendo:"
|
||||
|
||||
#: i2p2www/pages/site/research/vrp.html:353
|
||||
msgid "Areas of I2P affected by the incidents."
|
||||
@ -874,15 +690,11 @@ msgstr "Áreas de I2P afectadas por los incidentes."
|
||||
|
||||
#: i2p2www/pages/site/research/vrp.html:356
|
||||
msgid "Any network downtime or monetary cost (if any) of the incidents."
|
||||
msgstr ""
|
||||
"Cualquier periodo de inactividad de la red o coste monetario (en su caso)"
|
||||
" de los incidentes."
|
||||
msgstr "Cualquier periodo de inactividad de la red o coste monetario (en su caso) de los incidentes."
|
||||
|
||||
#: i2p2www/pages/site/research/vrp.html:359
|
||||
msgid "Ways in which the incidents could have been avoided (if any)."
|
||||
msgstr ""
|
||||
"Maneras en las que los incidentes podrían haber sido evitados (en su "
|
||||
"caso)."
|
||||
msgstr "Maneras en las que los incidentes podrían haber sido evitados (en su caso)."
|
||||
|
||||
#: i2p2www/pages/site/research/vrp.html:362
|
||||
msgid "How effective this process was in dealing with the incidents."
|
||||
@ -890,17 +702,12 @@ msgstr "En qué medida fue efectivo este proceso para encargarse de los incident
|
||||
|
||||
#: i2p2www/pages/site/research/vrp.html:368
|
||||
msgid "After the presentation, Response Team and developers should discuss:"
|
||||
msgstr ""
|
||||
"Tras la presentación, el equipo de respuesta y los desarrolladores deben "
|
||||
"discutir:"
|
||||
msgstr "Tras la presentación, el equipo de respuesta y los desarrolladores deben discutir:"
|
||||
|
||||
#: i2p2www/pages/site/research/vrp.html:372
|
||||
msgid "Potential changes to development processes to reduce future incidents."
|
||||
msgstr ""
|
||||
"Cambios potenciales en el desarrollo de procesos para reducir futuros "
|
||||
"incidentes."
|
||||
msgstr "Cambios potenciales en el desarrollo de procesos para reducir futuros incidentes."
|
||||
|
||||
#: i2p2www/pages/site/research/vrp.html:375
|
||||
msgid "Potential changes to this process to improve future responses."
|
||||
msgstr "Cambios potenciales en este proceso para mejorar futuras respuestas."
|
||||
|
||||
|
File diff suppressed because it is too large
Load Diff
File diff suppressed because it is too large
Load Diff
@ -1,23 +1,22 @@
|
||||
# Spanish (Argentina) translations for I2P.
|
||||
# Translations template for I2P.
|
||||
# Copyright (C) 2021 ORGANIZATION
|
||||
# This file is distributed under the same license as the I2P project.
|
||||
#
|
||||
#
|
||||
# Translators:
|
||||
msgid ""
|
||||
msgstr ""
|
||||
"Project-Id-Version: I2P\n"
|
||||
"Project-Id-Version: I2P\n"
|
||||
"Report-Msgid-Bugs-To: http://trac.i2p2.de\n"
|
||||
"POT-Creation-Date: 2021-10-11 16:27+0000\n"
|
||||
"PO-Revision-Date: 2013-07-15 11:59+0000\n"
|
||||
"Last-Translator: FULL NAME <EMAIL@ADDRESS>\n"
|
||||
"Language-Team: Spanish (Argentina) "
|
||||
"(http://www.transifex.com/otf/I2P/language/es_AR/)\n"
|
||||
"Plural-Forms: nplurals=3; plural=n == 1 ? 0 : n != 0 && n % 1000000 == 0 "
|
||||
"? 1 : 2\n"
|
||||
"Language-Team: Spanish (Argentina) (http://www.transifex.com/otf/I2P/language/es_AR/)\n"
|
||||
"MIME-Version: 1.0\n"
|
||||
"Content-Type: text/plain; charset=utf-8\n"
|
||||
"Content-Type: text/plain; charset=UTF-8\n"
|
||||
"Content-Transfer-Encoding: 8bit\n"
|
||||
"Generated-By: Babel 1.3\n"
|
||||
"Language: es_AR\n"
|
||||
"Plural-Forms: nplurals=3; plural=n == 1 ? 0 : n != 0 && n % 1000000 == 0 ? 1 : 2;\n"
|
||||
|
||||
#: i2p2www/pages/site/comparison/freenet.html:2
|
||||
msgid "I2P Compared to Freenet"
|
||||
@ -25,85 +24,39 @@ msgstr "Comparación de I2P con Freenet"
|
||||
|
||||
#: i2p2www/pages/site/comparison/freenet.html:8
|
||||
msgid ""
|
||||
"Freenet is a fully distributed, peer to peer anonymous publishing "
|
||||
"network, offering \n"
|
||||
"secure ways to store data, as well as some approaches attempting to "
|
||||
"address the loads\n"
|
||||
"of a flash flood. While Freenet is designed as a distributed data store,"
|
||||
" people have\n"
|
||||
"built applications on top of it to do more generic anonymous "
|
||||
"communication, such as \n"
|
||||
"Freenet is a fully distributed, peer to peer anonymous publishing network, offering \n"
|
||||
"secure ways to store data, as well as some approaches attempting to address the loads\n"
|
||||
"of a flash flood. While Freenet is designed as a distributed data store, people have\n"
|
||||
"built applications on top of it to do more generic anonymous communication, such as \n"
|
||||
"static websites and message boards."
|
||||
msgstr ""
|
||||
"Freenet es una red completamente distribuida, red anónima de publicación "
|
||||
"par a par, que ofrece una forma segura de almacenar datos, y también "
|
||||
"enfocada en solucionar los problemas de carga y desbordamientos. Mientras"
|
||||
" que Freenet está diseñada como un almacén distribuido de datos, la gente"
|
||||
" ha construido aplicaciones sobre el sistema para tener otras "
|
||||
"comunicaciones anónimas genéricas, como webs estáticas y foros."
|
||||
msgstr "Freenet es una red completamente distribuida, red anónima de publicación par a par, que ofrece una forma segura de almacenar datos, y también enfocada en solucionar los problemas de carga y desbordamientos. Mientras que Freenet está diseñada como un almacén distribuido de datos, la gente ha construido aplicaciones sobre el sistema para tener otras comunicaciones anónimas genéricas, como webs estáticas y foros."
|
||||
|
||||
#: i2p2www/pages/site/comparison/freenet.html:16
|
||||
#, python-format
|
||||
msgid ""
|
||||
"Compared to I2P, Freenet offers some substantial benefits - it is a "
|
||||
"distributed data\n"
|
||||
"store, while I2P is not, allowing people to retrieve the content "
|
||||
"published by others \n"
|
||||
"even when the publisher is no longer online. In addition, it should be "
|
||||
"able to \n"
|
||||
"distribute popular data fairly efficiently. I2P itself does not and will"
|
||||
" not provide \n"
|
||||
"this functionality. On the other hand, there is overlap for users who "
|
||||
"simply want to \n"
|
||||
"communicate with each other anonymously through websites, message boards,"
|
||||
" file sharing\n"
|
||||
"programs, etc. There have also been some attempts to develop a "
|
||||
"distributed data \n"
|
||||
"Compared to I2P, Freenet offers some substantial benefits - it is a distributed data\n"
|
||||
"store, while I2P is not, allowing people to retrieve the content published by others \n"
|
||||
"even when the publisher is no longer online. In addition, it should be able to \n"
|
||||
"distribute popular data fairly efficiently. I2P itself does not and will not provide \n"
|
||||
"this functionality. On the other hand, there is overlap for users who simply want to \n"
|
||||
"communicate with each other anonymously through websites, message boards, file sharing\n"
|
||||
"programs, etc. There have also been some attempts to develop a distributed data \n"
|
||||
"store to run on top of I2P,\n"
|
||||
"(most recently a port of <a href=\"%(tahoe)s\">Tahoe-LAFS</a>)\n"
|
||||
"but nothing is yet ready for general use."
|
||||
msgstr ""
|
||||
"Comparado con I2P, Freenet ofrece substanciales beneficios - es un "
|
||||
"sistema distribuido de almacenamiento de datos, mientras que I2P no lo "
|
||||
"es, permitiendo a la gente obtener al contenido publicado por otros "
|
||||
"incluso cuando el que lo ha publicado no esté online. Además es capaz de "
|
||||
"distribuir eficientemente la información más utilizada. I2P no tiene ni "
|
||||
"tendrá esta funcionalidad. Por otro lado, hay demasiada redundancia para "
|
||||
"los usuarios que simplemente quieren comunicarse con otros anónimamente a"
|
||||
" través de webs, foros, aplicaciones de compartición de archivos, etc. "
|
||||
"Ha habido varios intentos de desarrollar un sistema de almacenamiento "
|
||||
"distribuido funcionando sobre I2P, (más recientemente un port de <a "
|
||||
"href=\"%(tahoe)s\">Tahoe-LAFS</a>) pero todavía no está listo para uso "
|
||||
"general."
|
||||
msgstr "Comparado con I2P, Freenet ofrece substanciales beneficios - es un sistema distribuido de almacenamiento de datos, mientras que I2P no lo es, permitiendo a la gente obtener al contenido publicado por otros incluso cuando el que lo ha publicado no esté online. Además es capaz de distribuir eficientemente la información más utilizada. I2P no tiene ni tendrá esta funcionalidad. Por otro lado, hay demasiada redundancia para los usuarios que simplemente quieren comunicarse con otros anónimamente a través de webs, foros, aplicaciones de compartición de archivos, etc. Ha habido varios intentos de desarrollar un sistema de almacenamiento distribuido funcionando sobre I2P, (más recientemente un port de <a href=\"%(tahoe)s\">Tahoe-LAFS</a>) pero todavía no está listo para uso general."
|
||||
|
||||
#: i2p2www/pages/site/comparison/freenet.html:29
|
||||
msgid ""
|
||||
"However, even ignoring any implementations issues, there are some "
|
||||
"concerns \n"
|
||||
"about Freenet's algorithms from both a scalability and anonymity "
|
||||
"perspective, owing \n"
|
||||
"largely to Freenet's heuristic driven routing. The interactions of "
|
||||
"various techniques \n"
|
||||
"certainly may successfully deter various attacks, and perhaps some "
|
||||
"aspects of the \n"
|
||||
"routing algorithms will provide the hoped for scalability. "
|
||||
"Unfortunately, not much\n"
|
||||
"analysis of the algorithms involved has resulted in positive results, but"
|
||||
" there is still\n"
|
||||
"hope. At the very least, Freenet does provide substantial anonymity "
|
||||
"against an attacker\n"
|
||||
"However, even ignoring any implementations issues, there are some concerns \n"
|
||||
"about Freenet's algorithms from both a scalability and anonymity perspective, owing \n"
|
||||
"largely to Freenet's heuristic driven routing. The interactions of various techniques \n"
|
||||
"certainly may successfully deter various attacks, and perhaps some aspects of the \n"
|
||||
"routing algorithms will provide the hoped for scalability. Unfortunately, not much\n"
|
||||
"analysis of the algorithms involved has resulted in positive results, but there is still\n"
|
||||
"hope. At the very least, Freenet does provide substantial anonymity against an attacker\n"
|
||||
"who does not have the resources necessary to analyze it further."
|
||||
msgstr ""
|
||||
"Sin embargo, e incluso ignorando los problemas de implementación, hay "
|
||||
"algunas preocupaciones sobre la escalabilidad y el anonimato de algunos "
|
||||
"algoritmos de Freenet, debido básicamente a la heurística de ruteo de "
|
||||
"Freenet. La unión de varias técnicas puede desalentar el hacer varios "
|
||||
"tipos de ataques, y quizás algunos aspectos del algoritmo de ruteo "
|
||||
"podrían proveer la escalabilidad esperada. Desafortunadamente, no muchos "
|
||||
"de los análisis sobre los algoritmos han dado resultados satisfactorios, "
|
||||
"pero aún hay esperanzas. Al final, Freenet nos proporciona bastante "
|
||||
"anonimato contra cualquier atacante que no tenga los recursos necesarios "
|
||||
"para análisis completos."
|
||||
msgstr "Sin embargo, e incluso ignorando los problemas de implementación, hay algunas preocupaciones sobre la escalabilidad y el anonimato de algunos algoritmos de Freenet, debido básicamente a la heurística de ruteo de Freenet. La unión de varias técnicas puede desalentar el hacer varios tipos de ataques, y quizás algunos aspectos del algoritmo de ruteo podrían proveer la escalabilidad esperada. Desafortunadamente, no muchos de los análisis sobre los algoritmos han dado resultados satisfactorios, pero aún hay esperanzas. Al final, Freenet nos proporciona bastante anonimato contra cualquier atacante que no tenga los recursos necesarios para análisis completos."
|
||||
|
||||
#: i2p2www/pages/site/comparison/index.html:2
|
||||
msgid "Comparing I2P to other projects"
|
||||
@ -111,45 +64,27 @@ msgstr "Comparando I2P con otros proyectos"
|
||||
|
||||
#: i2p2www/pages/site/comparison/index.html:4
|
||||
msgid ""
|
||||
"There are a great many other applications and projects working on "
|
||||
"anonymous \n"
|
||||
"communication and I2P has been inspired by much of their efforts. This "
|
||||
"is not \n"
|
||||
"There are a great many other applications and projects working on anonymous \n"
|
||||
"communication and I2P has been inspired by much of their efforts. This is not \n"
|
||||
"a comprehensive list of anonymity resources - both freehaven's \n"
|
||||
"<a href=\"http://freehaven.net/anonbib/topic.html\">Anonymity "
|
||||
"Bibliography</a>\n"
|
||||
"and GNUnet's <a href=\"https://www.gnunet.org/links/\">related "
|
||||
"projects</a>\n"
|
||||
"<a href=\"http://freehaven.net/anonbib/topic.html\">Anonymity Bibliography</a>\n"
|
||||
"and GNUnet's <a href=\"https://www.gnunet.org/links/\">related projects</a>\n"
|
||||
"serve that purpose well. That said, a few systems stand out for further\n"
|
||||
"comparison. The following have individual comparison pages:"
|
||||
msgstr ""
|
||||
"Hay muchas otras buenas aplicaciones y proyectos trabajando en "
|
||||
"comunicaciones anónimas, e I2P se ha inspirado en muchos de sus "
|
||||
"esfuerzos. Esto no es una lista completa de recursos para el anonimato - "
|
||||
"ambos \n"
|
||||
"<a href=\"http://freehaven.net/anonbib/topic.html\">Anonymity "
|
||||
"Bibliography</a> y los <a "
|
||||
"href=\"https://www.gnunet.org/links/\">proyectos relacionados</a> con "
|
||||
"GNUnet sirven también para ese mismo propósito. Dicho eso, pocos "
|
||||
"proyectos destacan como para comparaciones adicionales. Los siguientes "
|
||||
"proyectos tienen webs con comparaciones individuales:"
|
||||
msgstr "Hay muchas otras buenas aplicaciones y proyectos trabajando en comunicaciones anónimas, e I2P se ha inspirado en muchos de sus esfuerzos. Esto no es una lista completa de recursos para el anonimato - ambos \n<a href=\"http://freehaven.net/anonbib/topic.html\">Anonymity Bibliography</a> y los <a href=\"https://www.gnunet.org/links/\">proyectos relacionados</a> con GNUnet sirven también para ese mismo propósito. Dicho eso, pocos proyectos destacan como para comparaciones adicionales. Los siguientes proyectos tienen webs con comparaciones individuales:"
|
||||
|
||||
#: i2p2www/pages/site/comparison/index.html:20
|
||||
#, python-format
|
||||
msgid ""
|
||||
"The following are discussed on the <a href=\"%(othernetworks)s\">other "
|
||||
"networks page:</a>"
|
||||
msgstr ""
|
||||
"Los siguientes proyectos son discutidos en la <a "
|
||||
"href=\"%(othernetworks)s\">página sobre otras redes:</a>"
|
||||
msgstr "Los siguientes proyectos son discutidos en la <a href=\"%(othernetworks)s\">página sobre otras redes:</a>"
|
||||
|
||||
#: i2p2www/pages/site/comparison/index.html:33
|
||||
#, python-format
|
||||
msgid ""
|
||||
"The content of this page is subject to update, discussion and dispute, "
|
||||
"and we welcome comments and additions.\n"
|
||||
"You may contribute an analysis by entering a <a href=\"%(trac)s\">new "
|
||||
"issue on Github</a>."
|
||||
"The content of this page is subject to update, discussion and dispute, and we welcome comments and additions.\n"
|
||||
"You may contribute an analysis by entering a <a href=\"%(trac)s\">new issue on Github</a>."
|
||||
msgstr ""
|
||||
|
||||
#: i2p2www/pages/site/comparison/other-networks.html:2
|
||||
@ -174,220 +109,109 @@ msgstr ""
|
||||
#, python-format
|
||||
msgid ""
|
||||
"RetroShare is a set of peer-to-peer applications running in a\n"
|
||||
"<a href=\"%(f2fwiki)s\">Friend-to-friend (F2F)</a> network. Each peer of "
|
||||
"such F2F \n"
|
||||
"network makes direct IP connections only to authenticated peers "
|
||||
"(\"friends\") after explicit \n"
|
||||
"certificates exchange. It can discover unauthenticated peers (e.g. "
|
||||
"friends of friends), \n"
|
||||
"but connections to them are relayed over \"friend\" peers for providing "
|
||||
"privacy and anonymity."
|
||||
"<a href=\"%(f2fwiki)s\">Friend-to-friend (F2F)</a> network. Each peer of such F2F \n"
|
||||
"network makes direct IP connections only to authenticated peers (\"friends\") after explicit \n"
|
||||
"certificates exchange. It can discover unauthenticated peers (e.g. friends of friends), \n"
|
||||
"but connections to them are relayed over \"friend\" peers for providing privacy and anonymity."
|
||||
msgstr ""
|
||||
|
||||
#: i2p2www/pages/site/comparison/other-networks.html:37
|
||||
msgid ""
|
||||
"RetroShare is designed to build a private network of trusted peers, while"
|
||||
" I2P is designed \n"
|
||||
"to be a large-scaled public anonymous network. Recent versions of "
|
||||
"RetroShare have options to run \n"
|
||||
"as a public \"darknet\" by using I2P or Tor as a transport. That way all "
|
||||
"connections are \n"
|
||||
"RetroShare is designed to build a private network of trusted peers, while I2P is designed \n"
|
||||
"to be a large-scaled public anonymous network. Recent versions of RetroShare have options to run \n"
|
||||
"as a public \"darknet\" by using I2P or Tor as a transport. That way all connections are \n"
|
||||
"anonymized and no trust is required for adding new \"friends\"."
|
||||
msgstr ""
|
||||
|
||||
#: i2p2www/pages/site/comparison/other-networks.html:48
|
||||
#, python-format
|
||||
msgid ""
|
||||
"Morphmix and Tarzan are both fully distributed, peer to peer networks of"
|
||||
" \n"
|
||||
"anonymizing proxies, allowing people to tunnel out through the low "
|
||||
"latency \n"
|
||||
"mix network. Morphmix includes some very interesting collusion detection"
|
||||
" \n"
|
||||
"algorithms and Sybil defenses, while Tarzan makes use of the scarcity of "
|
||||
"IP\n"
|
||||
"Morphmix and Tarzan are both fully distributed, peer to peer networks of \n"
|
||||
"anonymizing proxies, allowing people to tunnel out through the low latency \n"
|
||||
"mix network. Morphmix includes some very interesting collusion detection \n"
|
||||
"algorithms and Sybil defenses, while Tarzan makes use of the scarcity of IP\n"
|
||||
"addresses to accomplish the same. The two primary differences between \n"
|
||||
"these systems and I2P are related to I2P's <a "
|
||||
"href=\"%(threatmodel)s\">threat model</a> \n"
|
||||
"and their out-proxy design (as opposed to providing both sender and "
|
||||
"receiver \n"
|
||||
"anonymity). There is source code available to both systems, but we are "
|
||||
"not aware \n"
|
||||
"these systems and I2P are related to I2P's <a href=\"%(threatmodel)s\">threat model</a> \n"
|
||||
"and their out-proxy design (as opposed to providing both sender and receiver \n"
|
||||
"anonymity). There is source code available to both systems, but we are not aware \n"
|
||||
"of their use outside of academic environments."
|
||||
msgstr ""
|
||||
"Morphmix y Tarzan son las dos totalmente distribuidas, redes par a par "
|
||||
"anónimas con proxies para el anonimato, permitiendo a la gente enviar "
|
||||
"datos fuera a través de redes de mezcla de baja latencia. Morphmix "
|
||||
"incluye unos algoritmos de detección de colisiones bastante interesante y"
|
||||
" defensas contra Sybil, mientras que Tarzan hace uso de la escasez de "
|
||||
"direcciones IP para obtener lo mismo. Las dos principales diferencias "
|
||||
"entre estos dos sistemas e I2P tienen que ver con el <a "
|
||||
"href=\"%(threatmodel)s\">modelo de amenazas</a> de I2P y su diseño de "
|
||||
"outproxies (al contrario que el anonimato proporcionado para ambos, el "
|
||||
"que envía y el que recibe). El código está disponible para ambos "
|
||||
"sistemas, pero no sabemos de su uso fuera de ambientes académicos."
|
||||
msgstr "Morphmix y Tarzan son las dos totalmente distribuidas, redes par a par anónimas con proxies para el anonimato, permitiendo a la gente enviar datos fuera a través de redes de mezcla de baja latencia. Morphmix incluye unos algoritmos de detección de colisiones bastante interesante y defensas contra Sybil, mientras que Tarzan hace uso de la escasez de direcciones IP para obtener lo mismo. Las dos principales diferencias entre estos dos sistemas e I2P tienen que ver con el <a href=\"%(threatmodel)s\">modelo de amenazas</a> de I2P y su diseño de outproxies (al contrario que el anonimato proporcionado para ambos, el que envía y el que recibe). El código está disponible para ambos sistemas, pero no sabemos de su uso fuera de ambientes académicos."
|
||||
|
||||
#: i2p2www/pages/site/comparison/other-networks.html:172
|
||||
#, python-format
|
||||
msgid ""
|
||||
"\n"
|
||||
"Mixminion and Mixmaster are networks to support anonymous email against a"
|
||||
" very\n"
|
||||
"Mixminion and Mixmaster are networks to support anonymous email against a very\n"
|
||||
"powerful adversary.\n"
|
||||
"High-latency messaging applications running on top of I2P\n"
|
||||
"(for example <a href=\"%(syndie)s\">Syndie</a> or I2PBote)\n"
|
||||
"may perhaps prove adequate to meet the threat\n"
|
||||
"model of those adversaries, while running in parallel along side the "
|
||||
"needs of low latency users, to provide\n"
|
||||
"model of those adversaries, while running in parallel along side the needs of low latency users, to provide\n"
|
||||
"a significantly larger anonymity set.\n"
|
||||
"High-latency support within the I2P router itself may or may not be added"
|
||||
" in a distant future release.\n"
|
||||
"It is too early to say if I2P will meet the needs of users requiring "
|
||||
"extreme protection for email."
|
||||
msgstr ""
|
||||
"\n"
|
||||
"Mixminion y Mixmaster son redes que soportan correos anónimos contra "
|
||||
"adversarios muy peligrosos. Las aplicaciones de mensajes de alta latencia"
|
||||
" sobre I2P (por ejemplo <a href=\"%(syndie)s\">Syndie</a> o I2PBote) "
|
||||
"quizás sean adecuadas para satisfacer el modelo de amenazas de estos "
|
||||
"adversarios, funcionando en paralelo con las necesidades de baja latencia"
|
||||
" de los usuarios, para proporcionar un gran set de anonimato. El soporte "
|
||||
"de alta latencia en el ruter de I2P puede que se añada o no en un futuro "
|
||||
"distante. Es demasiado pronto para decir si I2P satisfará las necesidades"
|
||||
" de los usuarios que requieran una protección extrema para los correos."
|
||||
"High-latency support within the I2P router itself may or may not be added in a distant future release.\n"
|
||||
"It is too early to say if I2P will meet the needs of users requiring extreme protection for email."
|
||||
msgstr "\nMixminion y Mixmaster son redes que soportan correos anónimos contra adversarios muy peligrosos. Las aplicaciones de mensajes de alta latencia sobre I2P (por ejemplo <a href=\"%(syndie)s\">Syndie</a> o I2PBote) quizás sean adecuadas para satisfacer el modelo de amenazas de estos adversarios, funcionando en paralelo con las necesidades de baja latencia de los usuarios, para proporcionar un gran set de anonimato. El soporte de alta latencia en el ruter de I2P puede que se añada o no en un futuro distante. Es demasiado pronto para decir si I2P satisfará las necesidades de los usuarios que requieran una protección extrema para los correos."
|
||||
|
||||
#: i2p2www/pages/site/comparison/other-networks.html:184
|
||||
msgid ""
|
||||
"As with Tor and Onion Routing, \n"
|
||||
"both Mixminion and Mixmaster take the directory based approach as well."
|
||||
msgstr ""
|
||||
"Al igual que con Tor y Onion routing, Mixminion y Mixmaster toman también"
|
||||
" la aproximación basada en directorios."
|
||||
msgstr "Al igual que con Tor y Onion routing, Mixminion y Mixmaster toman también la aproximación basada en directorios."
|
||||
|
||||
#: i2p2www/pages/site/comparison/other-networks.html:194
|
||||
#, python-format
|
||||
msgid ""
|
||||
"JAP (Java Anonymous Proxy) is a network of mix cascades for anonymizing "
|
||||
"web requests,\n"
|
||||
"and as such it has a few centralized nodes (participants in the cascade) "
|
||||
"that blend\n"
|
||||
"and mix requests from clients through the sequence of nodes (the cascade)"
|
||||
" before \n"
|
||||
"proxying out onto the web. The scope, threat model, and security is "
|
||||
"substantially \n"
|
||||
"different from I2P, but for those who don't require significant anonymity"
|
||||
" but still\n"
|
||||
"are not satisfied with an Anonymizer-like service, JAP is worth "
|
||||
"reviewing. One\n"
|
||||
"caution to note is that anyone under the jurisdiction of the German "
|
||||
"courts may want\n"
|
||||
"to take care, as the German Federal Bureau of Criminal Investigation "
|
||||
"(FBCI) has \n"
|
||||
"JAP (Java Anonymous Proxy) is a network of mix cascades for anonymizing web requests,\n"
|
||||
"and as such it has a few centralized nodes (participants in the cascade) that blend\n"
|
||||
"and mix requests from clients through the sequence of nodes (the cascade) before \n"
|
||||
"proxying out onto the web. The scope, threat model, and security is substantially \n"
|
||||
"different from I2P, but for those who don't require significant anonymity but still\n"
|
||||
"are not satisfied with an Anonymizer-like service, JAP is worth reviewing. One\n"
|
||||
"caution to note is that anyone under the jurisdiction of the German courts may want\n"
|
||||
"to take care, as the German Federal Bureau of Criminal Investigation (FBCI) has \n"
|
||||
"successfully mounted an \n"
|
||||
"<a href=\"%(url)s\">attack</a> \n"
|
||||
"on the network. Even though the method of this attack was later found to"
|
||||
" be illegal \n"
|
||||
"in the German courts, the fact that the data was successfully collected "
|
||||
"is the \n"
|
||||
"concern. Courts change their minds based upon circumstance, and this is "
|
||||
"evidence that \n"
|
||||
"if a government body or intelligence agency wanted to, they could gather "
|
||||
"the data, even \n"
|
||||
"on the network. Even though the method of this attack was later found to be illegal \n"
|
||||
"in the German courts, the fact that the data was successfully collected is the \n"
|
||||
"concern. Courts change their minds based upon circumstance, and this is evidence that \n"
|
||||
"if a government body or intelligence agency wanted to, they could gather the data, even \n"
|
||||
"if it may be found inadmissible in some courts later)"
|
||||
msgstr ""
|
||||
"JAP (Proxy Anónimo en Java) es una red de mezcla en cascadas para el "
|
||||
"anonimato de las solicitudes web que tiene varios nodos centrales "
|
||||
"(participantes en la cascada) que combinan y mezclan las solicitudes de "
|
||||
"los clientes a través de una secuencia de nodos (la cascada) antes de "
|
||||
"enviarlos por un proxy a la web. El alcance, modelo de amenazas y la "
|
||||
"seguridad son bastantes diferentes a las de I2P, pero para aquellos que "
|
||||
"requieran bastante anonimato pero no están satisfechos con un servicio de"
|
||||
" tipo anonimizador, puede venirles bien echarle un ojo a JAP. Un "
|
||||
"precaución que debe tener todo aquel que se encuentre bajo la "
|
||||
"jurisdicción de los juzgados alemanes, es que el German Federal Bureau "
|
||||
"of Criminal Investigation (FBCI) ha montado un <a "
|
||||
"href=\"%(url)s\">ataque</a> con éxito sobre esta red. Incluso aunque el "
|
||||
"ataque se encontró más tarde ilegal en los juzgados alemanes, la realidad"
|
||||
" es que la información fue sustraída con éxito. Los jueces cambian sus "
|
||||
"mentes basados en las circunstancias, y esta es la evidencia de que si el"
|
||||
" gobierno quisiese la información podrían conseguirla, aunque fuese "
|
||||
"inadmisible más tarde en un juicio)"
|
||||
msgstr "JAP (Proxy Anónimo en Java) es una red de mezcla en cascadas para el anonimato de las solicitudes web que tiene varios nodos centrales (participantes en la cascada) que combinan y mezclan las solicitudes de los clientes a través de una secuencia de nodos (la cascada) antes de enviarlos por un proxy a la web. El alcance, modelo de amenazas y la seguridad son bastantes diferentes a las de I2P, pero para aquellos que requieran bastante anonimato pero no están satisfechos con un servicio de tipo anonimizador, puede venirles bien echarle un ojo a JAP. Un precaución que debe tener todo aquel que se encuentre bajo la jurisdicción de los juzgados alemanes, es que el German Federal Bureau of Criminal Investigation (FBCI) ha montado un <a href=\"%(url)s\">ataque</a> con éxito sobre esta red. Incluso aunque el ataque se encontró más tarde ilegal en los juzgados alemanes, la realidad es que la información fue sustraída con éxito. Los jueces cambian sus mentes basados en las circunstancias, y esta es la evidencia de que si el gobierno quisiese la información podrían conseguirla, aunque fuese inadmisible más tarde en un juicio)"
|
||||
|
||||
#: i2p2www/pages/site/comparison/other-networks.html:216
|
||||
#, python-format
|
||||
msgid ""
|
||||
"Both of these systems work through the same basic \n"
|
||||
"<a href=\"%(antnet)s\">antnet</a> routing, providing some degree of\n"
|
||||
"anonymity based on the threat model of providing plausible deniability "
|
||||
"against a simple \n"
|
||||
"non-colluding adversary. With the antnet routing, they first either do a"
|
||||
" random walk or a \n"
|
||||
"broadcast search to find some peer with the data or identity desired, and"
|
||||
" then use a feedback\n"
|
||||
"algorithm to optimize that found path. This works well for applications "
|
||||
"that merely want to know \n"
|
||||
"what other people around them have to offer - \"How are y'all doing\" vs."
|
||||
" \"Hey Alice, how are you\" - \n"
|
||||
"you basically get a local cluster of nodes that can share files with and "
|
||||
"maintain some degree of \n"
|
||||
"anonymity (though you don't have much control over who is in that group "
|
||||
"of peers)."
|
||||
msgstr ""
|
||||
"Estos dos sistemas trabajan con el rutado básico <a "
|
||||
"href=\"%(antnet)s\">antnet</a>, proporcionando anonimato al proveer "
|
||||
"negación plausible contra un simple adversario sin colisión. Con el "
|
||||
"rutado antnet, primero hacen una ruta aleatoria o una búsqueda broadcast"
|
||||
" para encontrar el par o la identidad deseada, y después usan esa "
|
||||
"algoritmo para optimizar la ruta. Esto funciona bien para aplicaciones "
|
||||
"que sólo quieren saber que tienen que ofrecer la gente que está alrededor"
|
||||
" - \"Cómo os va\" contra \"Hey Alice, como estás\" - básicamente se "
|
||||
"obtiene un conjunto de nodos que pueden compartit archivos y mantener el "
|
||||
"anonimato (aunque no se tiene mucho control sobre quién es ese grupo de "
|
||||
"pares)."
|
||||
"anonymity based on the threat model of providing plausible deniability against a simple \n"
|
||||
"non-colluding adversary. With the antnet routing, they first either do a random walk or a \n"
|
||||
"broadcast search to find some peer with the data or identity desired, and then use a feedback\n"
|
||||
"algorithm to optimize that found path. This works well for applications that merely want to know \n"
|
||||
"what other people around them have to offer - \"How are y'all doing\" vs. \"Hey Alice, how are you\" - \n"
|
||||
"you basically get a local cluster of nodes that can share files with and maintain some degree of \n"
|
||||
"anonymity (though you don't have much control over who is in that group of peers)."
|
||||
msgstr "Estos dos sistemas trabajan con el rutado básico <a href=\"%(antnet)s\">antnet</a>, proporcionando anonimato al proveer negación plausible contra un simple adversario sin colisión. Con el rutado antnet, primero hacen una ruta aleatoria o una búsqueda broadcast para encontrar el par o la identidad deseada, y después usan esa algoritmo para optimizar la ruta. Esto funciona bien para aplicaciones que sólo quieren saber que tienen que ofrecer la gente que está alrededor - \"Cómo os va\" contra \"Hey Alice, como estás\" - básicamente se obtiene un conjunto de nodos que pueden compartit archivos y mantener el anonimato (aunque no se tiene mucho control sobre quién es ese grupo de pares)."
|
||||
|
||||
#: i2p2www/pages/site/comparison/other-networks.html:228
|
||||
msgid ""
|
||||
"However, the algorithm does not scale well at all - if the application "
|
||||
"wants to speak with a \n"
|
||||
"particular peer it ends up doing a broadcast search or random walk "
|
||||
"(though if they are lucky enough\n"
|
||||
"for that to succeed, the antnet routing should optimize that found "
|
||||
"connection). This means that \n"
|
||||
"while these networks can work great at small scales, they are not "
|
||||
"suitable for large networks where\n"
|
||||
"someone wants to get in touch with another specific peer. That does not "
|
||||
"mean that there is no \n"
|
||||
"value in these systems, just that their applicability is limited to "
|
||||
"situations where their \n"
|
||||
"However, the algorithm does not scale well at all - if the application wants to speak with a \n"
|
||||
"particular peer it ends up doing a broadcast search or random walk (though if they are lucky enough\n"
|
||||
"for that to succeed, the antnet routing should optimize that found connection). This means that \n"
|
||||
"while these networks can work great at small scales, they are not suitable for large networks where\n"
|
||||
"someone wants to get in touch with another specific peer. That does not mean that there is no \n"
|
||||
"value in these systems, just that their applicability is limited to situations where their \n"
|
||||
"particular issues can be addressed."
|
||||
msgstr ""
|
||||
"Sin embargo, el algoritmo no escala bien del todo - si la aplicación "
|
||||
"quiere hablar con un par en particular termina haciendo una búsqueda "
|
||||
"broadcast o un paseo aleatorio (si son afortunados de que eso ocurra). "
|
||||
"Esto significa que mientras esas redes trabajan bien a escalas pequeñas, "
|
||||
"no son apropiadas para redes grandes donde alguien quiere ponerse en "
|
||||
"contacto con un par en particular. Esto no quiere decir que este sistema "
|
||||
"no tenga ningún valor, sólo que su aplicación está limitada a situaciones"
|
||||
" donde sus problemas pueden evitarse."
|
||||
msgstr "Sin embargo, el algoritmo no escala bien del todo - si la aplicación quiere hablar con un par en particular termina haciendo una búsqueda broadcast o un paseo aleatorio (si son afortunados de que eso ocurra). Esto significa que mientras esas redes trabajan bien a escalas pequeñas, no son apropiadas para redes grandes donde alguien quiere ponerse en contacto con un par en particular. Esto no quiere decir que este sistema no tenga ningún valor, sólo que su aplicación está limitada a situaciones donde sus problemas pueden evitarse."
|
||||
|
||||
#: i2p2www/pages/site/comparison/other-networks.html:239
|
||||
#, python-format
|
||||
msgid ""
|
||||
"This was a closed-source network targeted at Iranian users.\n"
|
||||
"Tor did a <a href=\"%(torpost)s\">good writeup on what to look for in a "
|
||||
"circumvention tool</a>.\n"
|
||||
"Suffice it to say that being closed source and publicly targeting a "
|
||||
"specific country are not good ideas.\n"
|
||||
"Tor did a <a href=\"%(torpost)s\">good writeup on what to look for in a circumvention tool</a>.\n"
|
||||
"Suffice it to say that being closed source and publicly targeting a specific country are not good ideas.\n"
|
||||
"I2P is, of course, open source. However, that source, and our\n"
|
||||
"<a href=\"%(docs)s\">technical documentation</a>, need much more review."
|
||||
msgstr ""
|
||||
"Esta era una red de código cerrado orientada a usuarios de Irán. Tor hizo"
|
||||
" un <a href=\"%(torpost)s\">buen estudio sobre qué buscar en una "
|
||||
"herramienta de elusión</a>. No hace falta decir que el ser de código "
|
||||
"cerrado y orientada a un país específico no son buenas ideas. I2P es, por"
|
||||
" supuesto, de código libre. Aunque el código y nuestra <a "
|
||||
"href=\"%(docs)s\">documentación técnica</a> necesitan muchas más "
|
||||
"revisión."
|
||||
msgstr "Esta era una red de código cerrado orientada a usuarios de Irán. Tor hizo un <a href=\"%(torpost)s\">buen estudio sobre qué buscar en una herramienta de elusión</a>. No hace falta decir que el ser de código cerrado y orientada a un país específico no son buenas ideas. I2P es, por supuesto, de código libre. Aunque el código y nuestra <a href=\"%(docs)s\">documentación técnica</a> necesitan muchas más revisión."
|
||||
|
||||
#: i2p2www/pages/site/comparison/other-networks.html:248
|
||||
msgid "Paid VPN Services"
|
||||
@ -427,17 +251,7 @@ msgid ""
|
||||
"network, as well as gather and report statistics, as \n"
|
||||
"opposed to I2P's distributed <a href=\"%(netdb)s\">network \n"
|
||||
"database</a> and <a href=\"%(peerselection)s\">peer selection</a>."
|
||||
msgstr ""
|
||||
"Tor y el rutado Onion son ambas redes de proxies anónimas, que permiten a"
|
||||
" la gente salir a través de su red ya mezclada de baja latencia. Las dos "
|
||||
"primeras diferencias entre Tor/Onion-Routing e I2P están de nuevo "
|
||||
"relacionas con las diferencias en el modelo de amenazas y el diseño de "
|
||||
"los outproxies (a través de Tor soporta también servicios ocultos). "
|
||||
"Además, Tor usa un enfoque basado en directorios - creando un punto "
|
||||
"central para manejar la 'vista' general de las redes, y además se "
|
||||
"obtienen más estadísticas, al contrario que la <a href=\"%(netdb)s\">base"
|
||||
" de datos de la red </a> dsitribuida de I2P y la <a "
|
||||
"href=\"%(peerselection)s\">selección de pares</a>."
|
||||
msgstr "Tor y el rutado Onion son ambas redes de proxies anónimas, que permiten a la gente salir a través de su red ya mezclada de baja latencia. Las dos primeras diferencias entre Tor/Onion-Routing e I2P están de nuevo relacionas con las diferencias en el modelo de amenazas y el diseño de los outproxies (a través de Tor soporta también servicios ocultos). Además, Tor usa un enfoque basado en directorios - creando un punto central para manejar la 'vista' general de las redes, y además se obtienen más estadísticas, al contrario que la <a href=\"%(netdb)s\">base de datos de la red </a> dsitribuida de I2P y la <a href=\"%(peerselection)s\">selección de pares</a>."
|
||||
|
||||
#: i2p2www/pages/site/comparison/tor.html:23
|
||||
msgid ""
|
||||
@ -450,13 +264,7 @@ msgid ""
|
||||
"outproxies are prone to abuse, along with all of the \n"
|
||||
"other security issues we've come to know and love with \n"
|
||||
"normal Internet traffic."
|
||||
msgstr ""
|
||||
"El outproxy de I2P/Tor tiene varias debilidades contra cierto tipo de "
|
||||
"ataques - una vez que la comunicación deja la red Tor, adversarios "
|
||||
"pasivos pueden hacer más fácilmente ataques de análisis. Además los "
|
||||
"outproxies tienen acceso al texto en claro transferido en las dos "
|
||||
"direcciones, y los outproxies son propensos a abusos, y además tenemos "
|
||||
"que tener en cuenta otros ataques posibles dentro del Internet normal."
|
||||
msgstr "El outproxy de I2P/Tor tiene varias debilidades contra cierto tipo de ataques - una vez que la comunicación deja la red Tor, adversarios pasivos pueden hacer más fácilmente ataques de análisis. Además los outproxies tienen acceso al texto en claro transferido en las dos direcciones, y los outproxies son propensos a abusos, y además tenemos que tener en cuenta otros ataques posibles dentro del Internet normal."
|
||||
|
||||
#: i2p2www/pages/site/comparison/tor.html:35
|
||||
msgid ""
|
||||
@ -466,12 +274,7 @@ msgid ""
|
||||
"to build outproxy functionality on top of an anonymous\n"
|
||||
"communication layer, they can). In fact, some I2P users\n"
|
||||
"currently take advantage of Tor to outproxy."
|
||||
msgstr ""
|
||||
"Aún así, mucha gente no tiene por que preocuparse por estas situaciones, "
|
||||
"ya que no están dentro del modelo de amenazas. Y además esto está fuera "
|
||||
"del alcance (formal) de I2P (si la gente desea construir un outproxy "
|
||||
"sobre la capa de comunicación anónima, pueden hacerlo). De hecho, "
|
||||
"actualmente algunos usuarios utilizan el outproxy de Tor."
|
||||
msgstr "Aún así, mucha gente no tiene por que preocuparse por estas situaciones, ya que no están dentro del modelo de amenazas. Y además esto está fuera del alcance (formal) de I2P (si la gente desea construir un outproxy sobre la capa de comunicación anónima, pueden hacerlo). De hecho, actualmente algunos usuarios utilizan el outproxy de Tor."
|
||||
|
||||
#: i2p2www/pages/site/comparison/tor.html:49
|
||||
msgid "Comparison of Tor and I2P Terminology"
|
||||
@ -481,9 +284,7 @@ msgstr "Comparación de la terminología de I2P y Tor"
|
||||
msgid ""
|
||||
"While Tor and I2P are similar in many ways, much of the terminology is "
|
||||
"different."
|
||||
msgstr ""
|
||||
"Mientras que Tor e I2p tienen algunas similitudes, mucha de la "
|
||||
"terminología cambia."
|
||||
msgstr "Mientras que Tor e I2p tienen algunas similitudes, mucha de la terminología cambia."
|
||||
|
||||
#: i2p2www/pages/site/comparison/tor.html:55
|
||||
msgid "Cell"
|
||||
@ -607,9 +408,7 @@ msgstr "Punto de reunión"
|
||||
|
||||
#: i2p2www/pages/site/comparison/tor.html:70
|
||||
msgid "somewhat like Inbound Gateway + Outbound Endpoint"
|
||||
msgstr ""
|
||||
"algo así como inbound Gateway + Outbound Endpoint, puerta de salida de "
|
||||
"entrada + punto final de salida"
|
||||
msgstr "algo así como inbound Gateway + Outbound Endpoint, puerta de salida de entrada + punto final de salida"
|
||||
|
||||
#: i2p2www/pages/site/comparison/tor.html:71
|
||||
msgid "Router Descriptor"
|
||||
@ -629,15 +428,10 @@ msgstr "Beneficios de Tor sobre I2p"
|
||||
|
||||
#: i2p2www/pages/site/comparison/tor.html:78
|
||||
msgid ""
|
||||
"Much bigger user base; much more visibility in the academic and hacker "
|
||||
"communities; benefits from\n"
|
||||
"Much bigger user base; much more visibility in the academic and hacker communities; benefits from\n"
|
||||
"formal studies of anonymity, resistance, and performance;\n"
|
||||
"has a non-anonymous, visible, university-based leader"
|
||||
msgstr ""
|
||||
"El número de usuarios es mucho mayor; mucho más visible en entorno "
|
||||
"académicos y comunidades de hackers; tiene los beneficios de tener "
|
||||
"estudios formales sobre el anonimato, resistencia y rendimiento; y tienen"
|
||||
" un líder no anónimo universitario y visible"
|
||||
msgstr "El número de usuarios es mucho mayor; mucho más visible en entorno académicos y comunidades de hackers; tiene los beneficios de tener estudios formales sobre el anonimato, resistencia y rendimiento; y tienen un líder no anónimo universitario y visible"
|
||||
|
||||
#: i2p2www/pages/site/comparison/tor.html:84
|
||||
msgid "Has already solved some scaling issues I2P has yet to address"
|
||||
@ -653,32 +447,24 @@ msgstr "Tiene más desarrolladores, incluso algunos con fondos"
|
||||
|
||||
#: i2p2www/pages/site/comparison/tor.html:88
|
||||
msgid ""
|
||||
"More resistant to state-level blocking due to TLS transport layer and "
|
||||
"bridges\n"
|
||||
"(I2P has proposals for \"full restricted routes\" but these are not yet "
|
||||
"implemented)"
|
||||
msgstr ""
|
||||
"Tiene un bloqueo de nivel de estado más resistente debido la capa de "
|
||||
"transporte TLS y a los puentes (I2P tienen propuestas de \"rutas "
|
||||
"completamente restringidas\" pero estas aún no están implementadas)"
|
||||
"More resistant to state-level blocking due to TLS transport layer and bridges\n"
|
||||
"(I2P has proposals for \"full restricted routes\" but these are not yet implemented)"
|
||||
msgstr "Tiene un bloqueo de nivel de estado más resistente debido la capa de transporte TLS y a los puentes (I2P tienen propuestas de \"rutas completamente restringidas\" pero estas aún no están implementadas)"
|
||||
|
||||
#: i2p2www/pages/site/comparison/tor.html:93
|
||||
msgid "Big enough that it has had to adapt to blocking and DOS attempts"
|
||||
msgstr "Es tan grande que incluso se ha adaptado para bloquear los intentos de DOS"
|
||||
|
||||
#: i2p2www/pages/site/comparison/tor.html:94
|
||||
msgid "Designed and optimized for exit traffic, with a large number of exit nodes"
|
||||
msgstr ""
|
||||
"Diseñado para optimizar el tráfico de salida, con un gran número de nodos"
|
||||
" de salida"
|
||||
msgid ""
|
||||
"Designed and optimized for exit traffic, with a large number of exit nodes"
|
||||
msgstr "Diseñado para optimizar el tráfico de salida, con un gran número de nodos de salida"
|
||||
|
||||
#: i2p2www/pages/site/comparison/tor.html:96
|
||||
msgid ""
|
||||
"Better documentation, has formal papers and specifications,\n"
|
||||
"better website, many more translations"
|
||||
msgstr ""
|
||||
"Mejor documentación, tiene estudios formales y especificaciones, una web "
|
||||
"mejor, y muchas traducciones"
|
||||
msgstr "Mejor documentación, tiene estudios formales y especificaciones, una web mejor, y muchas traducciones"
|
||||
|
||||
#: i2p2www/pages/site/comparison/tor.html:101
|
||||
msgid "More efficient with memory usage"
|
||||
@ -692,17 +478,13 @@ msgstr "Los nodos cliente de Tor tienen muy poco gasto de ancho de nada"
|
||||
msgid ""
|
||||
"Centralized control reduces the complexity at each\n"
|
||||
"node and can efficiently address Sybil attacks"
|
||||
msgstr ""
|
||||
"El control centralizado reduce la complejidad de cada nodo y puede evitar"
|
||||
" ataques Sybil fácilmente"
|
||||
msgstr "El control centralizado reduce la complejidad de cada nodo y puede evitar ataques Sybil fácilmente"
|
||||
|
||||
#: i2p2www/pages/site/comparison/tor.html:110
|
||||
msgid ""
|
||||
"A core of high capacity nodes provides higher\n"
|
||||
"throughput and lower latency"
|
||||
msgstr ""
|
||||
"Un núcleo de nodos de gran capacidad proporciona una mayor rendimiento y "
|
||||
"menor latencia"
|
||||
msgstr "Un núcleo de nodos de gran capacidad proporciona una mayor rendimiento y menor latencia"
|
||||
|
||||
#: i2p2www/pages/site/comparison/tor.html:115
|
||||
msgid "C, not Java (ewww)"
|
||||
@ -714,11 +496,9 @@ msgstr "Beneficios de I2P sobre Tor"
|
||||
|
||||
#: i2p2www/pages/site/comparison/tor.html:120
|
||||
msgid ""
|
||||
"Designed and optimized for hidden services, which are much faster than in"
|
||||
" Tor"
|
||||
msgstr ""
|
||||
"Diseñado para optimizar los servicios ocultos, que son mucho más rápidos "
|
||||
"que los de Tor"
|
||||
"Designed and optimized for hidden services, which are much faster than in "
|
||||
"Tor"
|
||||
msgstr "Diseñado para optimizar los servicios ocultos, que son mucho más rápidos que los de Tor"
|
||||
|
||||
#: i2p2www/pages/site/comparison/tor.html:121
|
||||
msgid "Fully distributed and self organizing"
|
||||
@ -728,17 +508,13 @@ msgstr "Totalmente distribuido y auto organizado"
|
||||
msgid ""
|
||||
"Peers are selected by continuously profiling and ranking performance,\n"
|
||||
"rather than trusting claimed capacity"
|
||||
msgstr ""
|
||||
"Los pares son seleccionados continuamente según el rendimiento y "
|
||||
"categoría, en vez de confiar en la capacidad indicada"
|
||||
msgstr "Los pares son seleccionados continuamente según el rendimiento y categoría, en vez de confiar en la capacidad indicada"
|
||||
|
||||
#: i2p2www/pages/site/comparison/tor.html:129
|
||||
msgid ""
|
||||
"Floodfill peers (\"directory servers\") are varying and untrusted,\n"
|
||||
"rather than hardcoded"
|
||||
msgstr ""
|
||||
"Los pares Floodfill (\"servidores de directorios\") cambian, en vez de "
|
||||
"estar siempre fijos."
|
||||
msgstr "Los pares Floodfill (\"servidores de directorios\") cambian, en vez de estar siempre fijos."
|
||||
|
||||
#: i2p2www/pages/site/comparison/tor.html:134
|
||||
msgid "Small enough that it hasn't been blocked or DOSed much, or at all"
|
||||
@ -756,17 +532,13 @@ msgstr "Conmutado por paquete en vez de conmutado por circuito"
|
||||
msgid ""
|
||||
"implicit transparent load balancing of messages \n"
|
||||
"across multiple peers, rather than a single path"
|
||||
msgstr ""
|
||||
"Implica control de carga transparente de los mensajes a través de "
|
||||
"múltiples pares, en vez de por un sólo camino."
|
||||
msgstr "Implica control de carga transparente de los mensajes a través de múltiples pares, en vez de por un sólo camino."
|
||||
|
||||
#: i2p2www/pages/site/comparison/tor.html:145
|
||||
msgid ""
|
||||
"resilience vs. failures by running multiple \n"
|
||||
"tunnels in parallel, plus rotating tunnels"
|
||||
msgstr ""
|
||||
"Resistencia contra fallos ya que usa varios túneles en paralelo, además "
|
||||
"de rotar los túneles"
|
||||
msgstr "Resistencia contra fallos ya que usa varios túneles en paralelo, además de rotar los túneles"
|
||||
|
||||
#: i2p2www/pages/site/comparison/tor.html:151
|
||||
msgid ""
|
||||
@ -774,20 +546,14 @@ msgid ""
|
||||
"of O(N) (Alice has e.g. 2 inbound tunnels that are \n"
|
||||
"used by all of the peers Alice is talking with, \n"
|
||||
"rather than a circuit for each)"
|
||||
msgstr ""
|
||||
"el número de conexiones en i2p vienen dado por O(1) en vez de O(N) (por "
|
||||
"ejemplo, Alice tiene 2 túneles de entrada que son usados por todos los "
|
||||
"pares con lo que habla Alice, en vez de un circuito por cada par)"
|
||||
msgstr "el número de conexiones en i2p vienen dado por O(1) en vez de O(N) (por ejemplo, Alice tiene 2 túneles de entrada que son usados por todos los pares con lo que habla Alice, en vez de un circuito por cada par)"
|
||||
|
||||
#: i2p2www/pages/site/comparison/tor.html:161
|
||||
msgid ""
|
||||
"Unidirectional tunnels instead of bidirectional\n"
|
||||
"circuits, doubling the number of nodes a peer has to\n"
|
||||
"compromise to get the same information."
|
||||
msgstr ""
|
||||
"Túneles unidireccionales en vez de circuitos bidireccionales, usando el "
|
||||
"doble de nodos un par se compromete más para obtener la misma "
|
||||
"información."
|
||||
msgstr "Túneles unidireccionales en vez de circuitos bidireccionales, usando el doble de nodos un par se compromete más para obtener la misma información."
|
||||
|
||||
#: i2p2www/pages/site/comparison/tor.html:166
|
||||
#, python-format
|
||||
@ -801,11 +567,7 @@ msgid ""
|
||||
"tunnels are used for more than simply passing end \n"
|
||||
"to end messages (e.g. netDb, tunnel management, \n"
|
||||
"tunnel testing)"
|
||||
msgstr ""
|
||||
"Protección contra la detección de la actividad de un cliente, incluso "
|
||||
"cuando un atacante participa en el túnel, ya que los túneles no son sólo "
|
||||
"usados para pasar el mensaje de punto a punto (por ejemplo, netDB, "
|
||||
"administración de túneles, pruebas en los túneles)"
|
||||
msgstr "Protección contra la detección de la actividad de un cliente, incluso cuando un atacante participa en el túnel, ya que los túneles no son sólo usados para pasar el mensaje de punto a punto (por ejemplo, netDB, administración de túneles, pruebas en los túneles)"
|
||||
|
||||
#: i2p2www/pages/site/comparison/tor.html:180
|
||||
msgid ""
|
||||
@ -813,19 +575,13 @@ msgid ""
|
||||
"of samples that an attacker can use to mount an \n"
|
||||
"active attack with, unlike circuits in Tor, which are\n"
|
||||
"typically long lived."
|
||||
msgstr ""
|
||||
"Los túneles de I2P tienen una vida corta, reduciendo el número de "
|
||||
"muestras que un atacante puede usar para lograr un ataque activo, al "
|
||||
"contrario que con los circuitos en Tor, que son típicamente de larga "
|
||||
"duración."
|
||||
msgstr "Los túneles de I2P tienen una vida corta, reduciendo el número de muestras que un atacante puede usar para lograr un ataque activo, al contrario que con los circuitos en Tor, que son típicamente de larga duración."
|
||||
|
||||
#: i2p2www/pages/site/comparison/tor.html:188
|
||||
msgid ""
|
||||
"I2P APIs are designed specifically for anonymity and\n"
|
||||
"security, while SOCKS is designed for functionality."
|
||||
msgstr ""
|
||||
"Los APIs de I2P están específicamente diseñados para el anonimato y la "
|
||||
"seguridad, mientras que SOCKS está diseñado para su funcionalidad."
|
||||
msgstr "Los APIs de I2P están específicamente diseñados para el anonimato y la seguridad, mientras que SOCKS está diseñado para su funcionalidad."
|
||||
|
||||
#: i2p2www/pages/site/comparison/tor.html:193
|
||||
msgid "Essentially all peers participate in routing for others"
|
||||
@ -836,10 +592,7 @@ msgid ""
|
||||
"The bandwidth overhead of being a full peer is low, \n"
|
||||
"while in Tor, while client nodes don't require much\n"
|
||||
"bandwidth, they don't fully participate in the mixnet."
|
||||
msgstr ""
|
||||
"El uso de ancho de banda de cualquier par completo es bajo, mientras que "
|
||||
"en Tor, aunque un nodo cliente no necesita mucho ancho de banda, "
|
||||
"realmente no participan completamente en la red."
|
||||
msgstr "El uso de ancho de banda de cualquier par completo es bajo, mientras que en Tor, aunque un nodo cliente no necesita mucho ancho de banda, realmente no participan completamente en la red."
|
||||
|
||||
#: i2p2www/pages/site/comparison/tor.html:201
|
||||
msgid "Integrated automatic update mechanism"
|
||||
@ -859,26 +612,20 @@ msgstr "Otros beneficios potenciales de I2P aún no implementados"
|
||||
|
||||
#: i2p2www/pages/site/comparison/tor.html:207
|
||||
msgid "...and may never be implemented, so don't count on them!"
|
||||
msgstr ""
|
||||
"...y puede ser que nunca lleguen a ser implementados, ¡osea que no cuente"
|
||||
" con ellos!"
|
||||
msgstr "...y puede ser que nunca lleguen a ser implementados, ¡osea que no cuente con ellos!"
|
||||
|
||||
#: i2p2www/pages/site/comparison/tor.html:210
|
||||
msgid ""
|
||||
"Defense vs. message count analysis by garlic wrapping \n"
|
||||
"multiple messages"
|
||||
msgstr ""
|
||||
"Defensa contra el análisis de conteo de mensajes envolviendo múltiples "
|
||||
"mensajes dentro de la red garlic"
|
||||
msgstr "Defensa contra el análisis de conteo de mensajes envolviendo múltiples mensajes dentro de la red garlic"
|
||||
|
||||
#: i2p2www/pages/site/comparison/tor.html:216
|
||||
msgid ""
|
||||
"Defense vs. long term intersection by adding delays \n"
|
||||
"at various hops (where the delays are not discernible\n"
|
||||
"by other hops)"
|
||||
msgstr ""
|
||||
"Defensa contra la intersección a largo plazo añadiendo demoras en varios "
|
||||
"saltos (donde las demoras no son perceptibles por los otros saltos)"
|
||||
msgstr "Defensa contra la intersección a largo plazo añadiendo demoras en varios saltos (donde las demoras no son perceptibles por los otros saltos)"
|
||||
|
||||
#: i2p2www/pages/site/comparison/tor.html:223
|
||||
msgid ""
|
||||
@ -886,8 +633,4 @@ msgid ""
|
||||
"create a tunnel that will handle 500 messages / minute,\n"
|
||||
"where the endpoint will inject dummy messages if there\n"
|
||||
"are insufficient messages, etc)"
|
||||
msgstr ""
|
||||
"Varias estrategias de mezclado a nivel del túnel (por ejemplo, creando "
|
||||
"túneles que manejarán 500 mensajes al minuto, donde el punto final "
|
||||
"inyectará mensajes de relleno si no hubiese suficientes mensajes, etc)"
|
||||
|
||||
msgstr "Varias estrategias de mezclado a nivel del túnel (por ejemplo, creando túneles que manejarán 500 mensajes al minuto, donde el punto final inyectará mensajes de relleno si no hubiese suficientes mensajes, etc)"
|
||||
|
File diff suppressed because it is too large
Load Diff
File diff suppressed because it is too large
Load Diff
File diff suppressed because it is too large
Load Diff
File diff suppressed because it is too large
Load Diff
@ -1,23 +1,22 @@
|
||||
# Spanish (Argentina) translations for I2P.
|
||||
# Translations template for I2P.
|
||||
# Copyright (C) 2021 ORGANIZATION
|
||||
# This file is distributed under the same license as the I2P project.
|
||||
#
|
||||
#
|
||||
# Translators:
|
||||
msgid ""
|
||||
msgstr ""
|
||||
"Project-Id-Version: I2P\n"
|
||||
"Project-Id-Version: I2P\n"
|
||||
"Report-Msgid-Bugs-To: http://trac.i2p2.de\n"
|
||||
"POT-Creation-Date: 2021-04-26 14:51+0000\n"
|
||||
"PO-Revision-Date: 2013-07-15 12:01+0000\n"
|
||||
"Last-Translator: FULL NAME <EMAIL@ADDRESS>\n"
|
||||
"Language-Team: Spanish (Argentina) "
|
||||
"(http://www.transifex.com/otf/I2P/language/es_AR/)\n"
|
||||
"Plural-Forms: nplurals=3; plural=n == 1 ? 0 : n != 0 && n % 1000000 == 0 "
|
||||
"? 1 : 2\n"
|
||||
"Language-Team: Spanish (Argentina) (http://www.transifex.com/otf/I2P/language/es_AR/)\n"
|
||||
"MIME-Version: 1.0\n"
|
||||
"Content-Type: text/plain; charset=utf-8\n"
|
||||
"Content-Type: text/plain; charset=UTF-8\n"
|
||||
"Content-Transfer-Encoding: 8bit\n"
|
||||
"Generated-By: Babel 1.3\n"
|
||||
"Language: es_AR\n"
|
||||
"Plural-Forms: nplurals=3; plural=n == 1 ? 0 : n != 0 && n % 1000000 == 0 ? 1 : 2;\n"
|
||||
|
||||
#: i2p2www/pages/site/research/index.html:2
|
||||
msgid "Academic Research"
|
||||
@ -38,16 +37,11 @@ msgstr ""
|
||||
|
||||
#: i2p2www/pages/site/research/index.html:10
|
||||
msgid ""
|
||||
"I2P is a very unique project that unfortunately has not received the "
|
||||
"wider\n"
|
||||
"academic attention it deserves. To date, most research focus on anonymous"
|
||||
" and\n"
|
||||
"onion-routing technology has been around Tor, and while those papers "
|
||||
"benefit us\n"
|
||||
"as well, there is a great need for I2P-focused research. This plays a key"
|
||||
" role\n"
|
||||
"in both maintaining the security and integrity of the network, as well as"
|
||||
"\n"
|
||||
"I2P is a very unique project that unfortunately has not received the wider\n"
|
||||
"academic attention it deserves. To date, most research focus on anonymous and\n"
|
||||
"onion-routing technology has been around Tor, and while those papers benefit us\n"
|
||||
"as well, there is a great need for I2P-focused research. This plays a key role\n"
|
||||
"in both maintaining the security and integrity of the network, as well as\n"
|
||||
"opening doors for more impactful future development."
|
||||
msgstr ""
|
||||
|
||||
@ -55,43 +49,27 @@ msgstr ""
|
||||
#, python-format
|
||||
msgid ""
|
||||
"\n"
|
||||
"There is a large research community investigating a wide range of aspects"
|
||||
" of\n"
|
||||
"anonymity. For a current and comprehensive list of relevant papers, see "
|
||||
"the\n"
|
||||
"There is a large research community investigating a wide range of aspects of\n"
|
||||
"anonymity. For a current and comprehensive list of relevant papers, see the\n"
|
||||
"<a href=\"%(anonbib)s\">Free Haven Anonymity Bibliography</a>.\n"
|
||||
"I2P benefits from much of the research into Tor and onion routing, but "
|
||||
"there is\n"
|
||||
"little dedicated research interest into the theory behind I2P, and the "
|
||||
"choices\n"
|
||||
"and tradeoffs that the network makes. This presents a unique opportunity "
|
||||
"for\n"
|
||||
"I2P benefits from much of the research into Tor and onion routing, but there is\n"
|
||||
"little dedicated research interest into the theory behind I2P, and the choices\n"
|
||||
"and tradeoffs that the network makes. This presents a unique opportunity for\n"
|
||||
"original research.\n"
|
||||
msgstr ""
|
||||
"\n"
|
||||
"Hay una gran comunidad investigando un amplio rango de aspectos sobre el "
|
||||
"anonimato. Para una lista actualizada y completa de trabajos, vea la <a "
|
||||
"href=\"%(anonbib)s\">bibliografía de anonimato del proyecto Free "
|
||||
"Haven</a>. I2P se beneficia mucho de la investigación acerca deTor y el "
|
||||
"enrutamiento onion, pero hay poco interés dedicado al estudio de la "
|
||||
"teoría tras I2P, y sobre las elecciones y equilibrios que produce la red."
|
||||
" Esto presenta una oportunidad única para la investigación original.\n"
|
||||
msgstr "\nHay una gran comunidad investigando un amplio rango de aspectos sobre el anonimato. Para una lista actualizada y completa de trabajos, vea la <a href=\"%(anonbib)s\">bibliografía de anonimato del proyecto Free Haven</a>. I2P se beneficia mucho de la investigación acerca deTor y el enrutamiento onion, pero hay poco interés dedicado al estudio de la teoría tras I2P, y sobre las elecciones y equilibrios que produce la red. Esto presenta una oportunidad única para la investigación original.\n"
|
||||
|
||||
#: i2p2www/pages/site/research/index.html:29
|
||||
#, python-format
|
||||
msgid ""
|
||||
"A list of known published papers about I2P is available <a "
|
||||
"href=\"%(papers)s\">here</a>."
|
||||
msgstr ""
|
||||
"Una lista de ensayos publicados sobre I2P está disponible <a "
|
||||
"href=\"%(papers)s\">aquí</a>."
|
||||
msgstr "Una lista de ensayos publicados sobre I2P está disponible <a href=\"%(papers)s\">aquí</a>."
|
||||
|
||||
#: i2p2www/pages/site/research/index.html:34
|
||||
msgid ""
|
||||
"\n"
|
||||
"This page aims to outline the most needed fields of research, notes to\n"
|
||||
"potential researchers, our general safety guidelines as well as an "
|
||||
"expanding\n"
|
||||
"potential researchers, our general safety guidelines as well as an expanding\n"
|
||||
"list of open questions that you can begin on at any time.\n"
|
||||
msgstr ""
|
||||
|
||||
@ -105,16 +83,12 @@ msgstr ""
|
||||
|
||||
#: i2p2www/pages/site/research/index.html:44
|
||||
msgid ""
|
||||
"While all research on the I2P network is beneficial and appreciated, "
|
||||
"there are\n"
|
||||
"While all research on the I2P network is beneficial and appreciated, there are\n"
|
||||
"certain areas which are more in need than others - most so in defensive\n"
|
||||
"research. Most people enjoy coming up with fun ways to launch offensives\n"
|
||||
"against anonymous software, and this is further reinforced by the "
|
||||
"incentives in\n"
|
||||
"academic institutions. While we know it is often not the first choice for"
|
||||
"\n"
|
||||
"researchers, We would certainly appreciate any and all work towards ways "
|
||||
"to\n"
|
||||
"against anonymous software, and this is further reinforced by the incentives in\n"
|
||||
"academic institutions. While we know it is often not the first choice for\n"
|
||||
"researchers, We would certainly appreciate any and all work towards ways to\n"
|
||||
"fortify the network!"
|
||||
msgstr ""
|
||||
|
||||
@ -125,27 +99,17 @@ msgstr ""
|
||||
#: i2p2www/pages/site/research/index.html:56
|
||||
#, python-format
|
||||
msgid ""
|
||||
"If you've decided on a research topic that aims to hands-on investigate "
|
||||
"the I2P\n"
|
||||
"network or solve a problem of large proportions we ask you to "
|
||||
"<b>please</b> \n"
|
||||
"<a href=\"%(contact)s\">communicate your ideas</a> to the development "
|
||||
"team, the\n"
|
||||
"sooner the better. I2P is under constant development and a significant "
|
||||
"amount\n"
|
||||
"of roadmapping occurs, therefore your problem may have already been "
|
||||
"identified\n"
|
||||
"and flagged for update or patch. In the unlikely event you are conducting"
|
||||
"\n"
|
||||
"testing that overlaps with / would be of interest to another research "
|
||||
"project\n"
|
||||
"already in motion, we are also able to make you aware of this (with their"
|
||||
"\n"
|
||||
"permission, of course), and possibly open the door for collaboration. "
|
||||
"There is\n"
|
||||
"If you've decided on a research topic that aims to hands-on investigate the I2P\n"
|
||||
"network or solve a problem of large proportions we ask you to <b>please</b> \n"
|
||||
"<a href=\"%(contact)s\">communicate your ideas</a> to the development team, the\n"
|
||||
"sooner the better. I2P is under constant development and a significant amount\n"
|
||||
"of roadmapping occurs, therefore your problem may have already been identified\n"
|
||||
"and flagged for update or patch. In the unlikely event you are conducting\n"
|
||||
"testing that overlaps with / would be of interest to another research project\n"
|
||||
"already in motion, we are also able to make you aware of this (with their\n"
|
||||
"permission, of course), and possibly open the door for collaboration. There is\n"
|
||||
"also a chance that the test itself may significantly harm the network or\n"
|
||||
"regular users, and the team may have ideas or suggestions to mitigate "
|
||||
"that risk\n"
|
||||
"regular users, and the team may have ideas or suggestions to mitigate that risk\n"
|
||||
"and increase the safety of your testing."
|
||||
msgstr ""
|
||||
|
||||
@ -161,13 +125,11 @@ msgstr ""
|
||||
msgid ""
|
||||
"<ol>\n"
|
||||
" <li>\n"
|
||||
" Consider the benefits and risks - is there any doubt that the "
|
||||
"research\n"
|
||||
" Consider the benefits and risks - is there any doubt that the research\n"
|
||||
" provides more value than danger?\n"
|
||||
" </li>\n"
|
||||
" <li>\n"
|
||||
" If the research can be done on a test network then that is the "
|
||||
"preferred\n"
|
||||
" If the research can be done on a test network then that is the preferred\n"
|
||||
" method\n"
|
||||
" </li>\n"
|
||||
" <li>\n"
|
||||
@ -175,10 +137,8 @@ msgid ""
|
||||
" collecting data about yourself\n"
|
||||
" </li>\n"
|
||||
" <li>\n"
|
||||
" If you need 'bigger data', It is recommended to first see if you can "
|
||||
"use\n"
|
||||
" data sets from previous experiments or other third party resources is"
|
||||
"\n"
|
||||
" If you need 'bigger data', It is recommended to first see if you can use\n"
|
||||
" data sets from previous experiments or other third party resources is\n"
|
||||
" recommended\n"
|
||||
" </li>\n"
|
||||
" <li>\n"
|
||||
@ -186,10 +146,8 @@ msgid ""
|
||||
" publication and collect as little as possible\n"
|
||||
" </li>\n"
|
||||
" <li>\n"
|
||||
" After testing and before publish, review that all data which is to be"
|
||||
"\n"
|
||||
" published publicly is <b><i>not</i></b> intended to be private by the"
|
||||
"\n"
|
||||
" After testing and before publish, review that all data which is to be\n"
|
||||
" published publicly is <b><i>not</i></b> intended to be private by the\n"
|
||||
" originator\n"
|
||||
" </li>\n"
|
||||
"</ol>"
|
||||
@ -201,32 +159,24 @@ msgstr ""
|
||||
|
||||
#: i2p2www/pages/site/research/index.html:108
|
||||
msgid ""
|
||||
"I2P can be run as a separate test network by controlling the locations "
|
||||
"that a\n"
|
||||
"I2P can be run as a separate test network by controlling the locations that a\n"
|
||||
"new router reseeds from so that it only finds other test routers.\n"
|
||||
"\n"
|
||||
"The standard mode of operation is to have one JVM per router instance; "
|
||||
"hence\n"
|
||||
"running multiple copies of I2P on a single machine is inadvisable, both "
|
||||
"due to\n"
|
||||
"The standard mode of operation is to have one JVM per router instance; hence\n"
|
||||
"running multiple copies of I2P on a single machine is inadvisable, both due to\n"
|
||||
"the potential resource drain and the certain port conflicts. To better\n"
|
||||
"facilitate setting up small test networks, I2P has a multirouter mode "
|
||||
"which\n"
|
||||
"facilitate setting up small test networks, I2P has a multirouter mode which\n"
|
||||
"enables multiple distinct routers to be run in the same JVM.\n"
|
||||
"\n"
|
||||
"MultiRouter can be started from the i2p base directory by running the "
|
||||
"below\n"
|
||||
"MultiRouter can be started from the i2p base directory by running the below\n"
|
||||
"command."
|
||||
msgstr ""
|
||||
|
||||
#: i2p2www/pages/site/research/index.html:124
|
||||
msgid ""
|
||||
"Additionally, I2P can be started in a virtual network mode. This mode "
|
||||
"disables\n"
|
||||
"all transports, allowing the router to be tested in isolation without "
|
||||
"network\n"
|
||||
"traffic. To enable this mode, add <code>i2p.vmCommSystem=true</code> to "
|
||||
"the\n"
|
||||
"Additionally, I2P can be started in a virtual network mode. This mode disables\n"
|
||||
"all transports, allowing the router to be tested in isolation without network\n"
|
||||
"traffic. To enable this mode, add <code>i2p.vmCommSystem=true</code> to the\n"
|
||||
"router.config before starting."
|
||||
msgstr ""
|
||||
|
||||
@ -237,13 +187,10 @@ msgstr ""
|
||||
#: i2p2www/pages/site/research/index.html:133
|
||||
#, python-format
|
||||
msgid ""
|
||||
"As stated above in the researcher notes, please <a "
|
||||
"href=\"%(contact)s\">contact\n"
|
||||
"As stated above in the researcher notes, please <a href=\"%(contact)s\">contact\n"
|
||||
" us</a> before you commence your testing. While we do not discourage\n"
|
||||
"researchers from responsibly testing their ideas on the live network, if "
|
||||
"an\n"
|
||||
"attack becomes apparent and we don't have any line of communication then "
|
||||
"we\n"
|
||||
"researchers from responsibly testing their ideas on the live network, if an\n"
|
||||
"attack becomes apparent and we don't have any line of communication then we\n"
|
||||
"will end up taking countermeasures which could interfere with the test."
|
||||
msgstr ""
|
||||
|
||||
@ -253,35 +200,23 @@ msgstr "Configuración de familia de routers I2P"
|
||||
|
||||
#: i2p2www/pages/site/research/index.html:143
|
||||
msgid ""
|
||||
"As of release 0.9.25, I2P supports a router family configuration. This "
|
||||
"provides\n"
|
||||
"researchers who run multiple routers with the means to publicly identify "
|
||||
"those\n"
|
||||
"routers. In turn, this helps the I2P project understand that these "
|
||||
"routers are\n"
|
||||
"not running an attack on the network. It also will prevent other routers "
|
||||
"from\n"
|
||||
"including multiple routers of the family in a single tunnel, which could "
|
||||
"lead\n"
|
||||
"to deanonymization. Routers that appear to be colluding but do not have a"
|
||||
"\n"
|
||||
"declared family may be assumed to be an attack on the network, and may be"
|
||||
"\n"
|
||||
"blocked. The best way to ensure the success of your research project is "
|
||||
"to work\n"
|
||||
"As of release 0.9.25, I2P supports a router family configuration. This provides\n"
|
||||
"researchers who run multiple routers with the means to publicly identify those\n"
|
||||
"routers. In turn, this helps the I2P project understand that these routers are\n"
|
||||
"not running an attack on the network. It also will prevent other routers from\n"
|
||||
"including multiple routers of the family in a single tunnel, which could lead\n"
|
||||
"to deanonymization. Routers that appear to be colluding but do not have a\n"
|
||||
"declared family may be assumed to be an attack on the network, and may be\n"
|
||||
"blocked. The best way to ensure the success of your research project is to work\n"
|
||||
"with us directly."
|
||||
msgstr ""
|
||||
|
||||
#: i2p2www/pages/site/research/index.html:155
|
||||
msgid ""
|
||||
"A router family shares a private key so that participation in the family "
|
||||
"cannot\n"
|
||||
"be spoofed. To configure a router family, click on the 'I2P Internals' "
|
||||
"link in\n"
|
||||
"the router console, and then on the 'Family' tab. Follow the instructions"
|
||||
" there\n"
|
||||
"to generate the private key for the first router in the family. Then, "
|
||||
"export\n"
|
||||
"A router family shares a private key so that participation in the family cannot\n"
|
||||
"be spoofed. To configure a router family, click on the 'I2P Internals' link in\n"
|
||||
"the router console, and then on the 'Family' tab. Follow the instructions there\n"
|
||||
"to generate the private key for the first router in the family. Then, export\n"
|
||||
"the key from that router, and import it to other members of the family."
|
||||
msgstr ""
|
||||
|
||||
@ -336,12 +271,8 @@ msgstr "Proceso de respuesta a la vulnerabilidad (VRP)"
|
||||
#: i2p2www/pages/site/research/vrp.html:6
|
||||
msgid ""
|
||||
"\n"
|
||||
"This process is subject to change. Please refer to this page for the "
|
||||
"current VRP."
|
||||
msgstr ""
|
||||
"\n"
|
||||
"Este proceso está sujeto a cambio. Por favor, refiérase a esta página "
|
||||
"para el actual VRP."
|
||||
"This process is subject to change. Please refer to this page for the current VRP."
|
||||
msgstr "\nEste proceso está sujeto a cambio. Por favor, refiérase a esta página para el actual VRP."
|
||||
|
||||
#: i2p2www/pages/site/research/vrp.html:10
|
||||
msgid "This page was last updated in June 2020."
|
||||
@ -349,22 +280,15 @@ msgstr ""
|
||||
|
||||
#: i2p2www/pages/site/research/vrp.html:12
|
||||
msgid ""
|
||||
"Researchers: while you research/hack, we ask that you refrain from the "
|
||||
"following: - Performing active exploits or Denial of Service attacks on "
|
||||
"the\n"
|
||||
"i2p network - Performing social engineering on i2p development team "
|
||||
"members - Performing any physical or electronic attempts against i2p "
|
||||
"property and/or data\n"
|
||||
"Researchers: while you research/hack, we ask that you refrain from the following: - Performing active exploits or Denial of Service attacks on the\n"
|
||||
"i2p network - Performing social engineering on i2p development team members - Performing any physical or electronic attempts against i2p property and/or data\n"
|
||||
"centers"
|
||||
msgstr ""
|
||||
|
||||
#: i2p2www/pages/site/research/vrp.html:15
|
||||
msgid ""
|
||||
"As i2p is an open-source community, many volunteers and development team "
|
||||
"members run their own I2P Sites as well as public (“non-private "
|
||||
"internet”) domains. These\n"
|
||||
"sites/servers are NOT in the scope of the vulnerability assessment / "
|
||||
"response process, only the underlying code of i2p is."
|
||||
"As i2p is an open-source community, many volunteers and development team members run their own I2P Sites as well as public (“non-private internet”) domains. These\n"
|
||||
"sites/servers are NOT in the scope of the vulnerability assessment / response process, only the underlying code of i2p is."
|
||||
msgstr ""
|
||||
|
||||
#: i2p2www/pages/site/research/vrp.html:18
|
||||
@ -391,14 +315,9 @@ msgstr ""
|
||||
|
||||
#: i2p2www/pages/site/research/vrp.html:37
|
||||
msgid ""
|
||||
"Response Team designates a Response Manager who is in charge of the "
|
||||
"particular\n"
|
||||
"Response Team designates a Response Manager who is in charge of the particular\n"
|
||||
"report based on availability and/or knowledge-set."
|
||||
msgstr ""
|
||||
"El equipo de respuesta designa un gestor de respuesta que se ocupa del "
|
||||
"informe\n"
|
||||
"en particular en base a la disponibilidad y/o al conjunto de "
|
||||
"conocimientos."
|
||||
msgstr "El equipo de respuesta designa un gestor de respuesta que se ocupa del informe\nen particular en base a la disponibilidad y/o al conjunto de conocimientos."
|
||||
|
||||
#: i2p2www/pages/site/research/vrp.html:42
|
||||
#, python-format
|
||||
@ -409,14 +328,9 @@ msgstr ""
|
||||
|
||||
#: i2p2www/pages/site/research/vrp.html:47
|
||||
msgid ""
|
||||
"Response Manager makes inquiries to satisfy any needed information and to"
|
||||
"\n"
|
||||
"Response Manager makes inquiries to satisfy any needed information and to\n"
|
||||
"confirm if submission is indeed a vulnerability."
|
||||
msgstr ""
|
||||
"El gestor de respuesta formula preguntas para satisfacer cualquier "
|
||||
"información\n"
|
||||
"necesaria y para confirmar si la entrega efectivamente indica una "
|
||||
"vulnerabilidad."
|
||||
msgstr "El gestor de respuesta formula preguntas para satisfacer cualquier información\nnecesaria y para confirmar si la entrega efectivamente indica una vulnerabilidad."
|
||||
|
||||
#: i2p2www/pages/site/research/vrp.html:52
|
||||
msgid "If submission proves to be vulnerable, proceed."
|
||||
@ -430,34 +344,26 @@ msgstr "Si no indica vulnerabilidad:"
|
||||
msgid ""
|
||||
"Response Manager responds with reasons why submission is not a "
|
||||
"vulnerability."
|
||||
msgstr ""
|
||||
"El gestor de respuesta responde con las razones por las que la entrega no"
|
||||
" indica una vulnerabilidad."
|
||||
msgstr "El gestor de respuesta responde con las razones por las que la entrega no indica una vulnerabilidad."
|
||||
|
||||
#: i2p2www/pages/site/research/vrp.html:62
|
||||
msgid ""
|
||||
"Response Manager moves discussion to a new or existing ticket on public "
|
||||
"Trac if necessary."
|
||||
msgstr ""
|
||||
"Si es necesario, el gestor de respuesta mueve la conversación a un "
|
||||
"'ticket' nuevo o existente en un Trac público."
|
||||
"Response Manager moves discussion to a new or existing ticket on public Trac"
|
||||
" if necessary."
|
||||
msgstr "Si es necesario, el gestor de respuesta mueve la conversación a un 'ticket' nuevo o existente en un Trac público."
|
||||
|
||||
#: i2p2www/pages/site/research/vrp.html:70
|
||||
msgid ""
|
||||
"\n"
|
||||
"Establish severity of vulnerability:\n"
|
||||
" "
|
||||
msgstr ""
|
||||
"\n"
|
||||
"Establezca la gravedad de la vulnerabilidad:"
|
||||
msgstr "\nEstablezca la gravedad de la vulnerabilidad:"
|
||||
|
||||
#: i2p2www/pages/site/research/vrp.html:75
|
||||
msgid ""
|
||||
"Affects network as a whole, has potential to break entire network or is "
|
||||
"on a scale of great catastrophe."
|
||||
msgstr ""
|
||||
"Repercute en la red como conjunto, tiene potencial para desbaratar la red"
|
||||
" entera o está al nivel de una gran catástrofe."
|
||||
"Affects network as a whole, has potential to break entire network or is on a"
|
||||
" scale of great catastrophe."
|
||||
msgstr "Repercute en la red como conjunto, tiene potencial para desbaratar la red entera o está al nivel de una gran catástrofe."
|
||||
|
||||
#: i2p2www/pages/site/research/vrp.html:79
|
||||
msgid "Affects individual routers, or must be carefully exploited."
|
||||
@ -474,29 +380,20 @@ msgstr "Responda de acuerdo a la gravedad de la vulnerabilidad:"
|
||||
#: i2p2www/pages/site/research/vrp.html:93
|
||||
#, python-format
|
||||
msgid ""
|
||||
"HIGH severities must be notified on website and news feed within "
|
||||
"%(limit)s\n"
|
||||
"HIGH severities must be notified on website and news feed within %(limit)s\n"
|
||||
"working days of classification."
|
||||
msgstr ""
|
||||
"Las de gravedad ALTA deben notificarse en el sitio web y en la "
|
||||
"suscripción\n"
|
||||
"de novedades en %(limit)s días laborables desde su clasificación."
|
||||
msgstr "Las de gravedad ALTA deben notificarse en el sitio web y en la suscripción\nde novedades en %(limit)s días laborables desde su clasificación."
|
||||
|
||||
#: i2p2www/pages/site/research/vrp.html:98
|
||||
msgid "The notification should list appropriate steps for users to take, if any."
|
||||
msgstr ""
|
||||
"La notificación debe, en su caso, enumerar los pasos adecuados a seguir "
|
||||
"por los usuarios."
|
||||
msgid ""
|
||||
"The notification should list appropriate steps for users to take, if any."
|
||||
msgstr "La notificación debe, en su caso, enumerar los pasos adecuados a seguir por los usuarios."
|
||||
|
||||
#: i2p2www/pages/site/research/vrp.html:101
|
||||
msgid ""
|
||||
"The notification must not include any details that could suggest an "
|
||||
"exploitation\n"
|
||||
"The notification must not include any details that could suggest an exploitation\n"
|
||||
"path."
|
||||
msgstr ""
|
||||
"La notificación no debe incluir detalle alguno que pudiera sugerir una "
|
||||
"vía para\n"
|
||||
"explotar la vulnerabilidad."
|
||||
msgstr "La notificación no debe incluir detalle alguno que pudiera sugerir una vía para\nexplotar la vulnerabilidad."
|
||||
|
||||
#: i2p2www/pages/site/research/vrp.html:105
|
||||
msgid "The latter takes precedence over the former."
|
||||
@ -517,8 +414,8 @@ msgstr "El equipo de respuesta aplica el/los parche(s) apropiado(s)."
|
||||
#: i2p2www/pages/site/research/vrp.html:122
|
||||
msgid ""
|
||||
"Response Manager works on a patch LOCALLY, patches are shared by the "
|
||||
"response team via PGP-encrypted e-mail until such a time as it is safe to"
|
||||
" expose to the public."
|
||||
"response team via PGP-encrypted e-mail until such a time as it is safe to "
|
||||
"expose to the public."
|
||||
msgstr ""
|
||||
|
||||
#: i2p2www/pages/site/research/vrp.html:125
|
||||
@ -527,14 +424,9 @@ msgstr "Los parches se revisan con el investigador."
|
||||
|
||||
#: i2p2www/pages/site/research/vrp.html:128
|
||||
msgid ""
|
||||
"Any messages associated with PUBLIC commits during the time of review "
|
||||
"should not\n"
|
||||
"make reference to the security nature of the PRIVATE branch or its "
|
||||
"commits."
|
||||
msgstr ""
|
||||
"Cualquier mensaje asociado con consignaciones (commits) PÚBLICAS durante "
|
||||
"el periodo de revisión no debe hacer referencia a la naturaleza de "
|
||||
"seguridad del ramal (branch) PRIVADO o de sus consignaciones."
|
||||
"Any messages associated with PUBLIC commits during the time of review should not\n"
|
||||
"make reference to the security nature of the PRIVATE branch or its commits."
|
||||
msgstr "Cualquier mensaje asociado con consignaciones (commits) PÚBLICAS durante el periodo de revisión no debe hacer referencia a la naturaleza de seguridad del ramal (branch) PRIVADO o de sus consignaciones."
|
||||
|
||||
#: i2p2www/pages/site/research/vrp.html:132
|
||||
msgid "Vulnerability announcement is drafted."
|
||||
@ -560,33 +452,22 @@ msgstr "Se discute la fecha de publicación."
|
||||
msgid ""
|
||||
"At release date, Response Team coordinates with developers to finalize "
|
||||
"update:"
|
||||
msgstr ""
|
||||
"En la fecha de publicación, el equipo de respuesta se coordina con los "
|
||||
"desarrolladores para culminar la actualización:"
|
||||
msgstr "En la fecha de publicación, el equipo de respuesta se coordina con los desarrolladores para culminar la actualización:"
|
||||
|
||||
#: i2p2www/pages/site/research/vrp.html:156
|
||||
msgid "Response Manager propagates the \"hotfix branch\" to trunk."
|
||||
msgstr ""
|
||||
"El gestor de respuesta propaga el \"hotfix branch\" (ramal de corrección "
|
||||
"urgente) a trunk (ramal troncal)."
|
||||
msgstr "El gestor de respuesta propaga el \"hotfix branch\" (ramal de corrección urgente) a trunk (ramal troncal)."
|
||||
|
||||
#: i2p2www/pages/site/research/vrp.html:159
|
||||
msgid ""
|
||||
"Response Manager includes vulnerability announcement draft in release "
|
||||
"notes."
|
||||
msgstr ""
|
||||
"El gestor de respuesta incluye el borrador de anuncio de vulnerabilidad "
|
||||
"en las notas de la versión."
|
||||
"Response Manager includes vulnerability announcement draft in release notes."
|
||||
msgstr "El gestor de respuesta incluye el borrador de anuncio de vulnerabilidad en las notas de la versión."
|
||||
|
||||
#: i2p2www/pages/site/research/vrp.html:162
|
||||
msgid ""
|
||||
"Proceed with the Point or Regular Release. At this time, it is not "
|
||||
"possible to release an in-network update for only one operating system or"
|
||||
"\n"
|
||||
"\t\tarchitecture. In order that all affected products can be released as "
|
||||
"quickly as possible, the person responsible\n"
|
||||
"\t\tfor that software should be able to perform necessary release "
|
||||
"processes in a timely manner. Importantly this should include\n"
|
||||
"Proceed with the Point or Regular Release. At this time, it is not possible to release an in-network update for only one operating system or\n"
|
||||
"\t\tarchitecture. In order that all affected products can be released as quickly as possible, the person responsible\n"
|
||||
"\t\tfor that software should be able to perform necessary release processes in a timely manner. Importantly this should include\n"
|
||||
"\t\tconsideration for package maintainers in Debian, Ubuntu and F-Droid."
|
||||
msgstr ""
|
||||
|
||||
@ -596,24 +477,20 @@ msgstr "Proceso de divulgación post-publicación"
|
||||
|
||||
#: i2p2www/pages/site/research/vrp.html:175
|
||||
#, python-format
|
||||
msgid "Response Team has %(limit)s days to fulfill all points within section III."
|
||||
msgstr ""
|
||||
"El equipo de respuesta tiene %(limit)s días para satisfacer todos los "
|
||||
"puntos dentro de la sección III."
|
||||
msgid ""
|
||||
"Response Team has %(limit)s days to fulfill all points within section III."
|
||||
msgstr "El equipo de respuesta tiene %(limit)s días para satisfacer todos los puntos dentro de la sección III."
|
||||
|
||||
#: i2p2www/pages/site/research/vrp.html:179
|
||||
msgid "If the Incident Response process in section III is successfully completed:"
|
||||
msgstr ""
|
||||
"Si el proceso de respuesta a incidente en la sección III se completa con "
|
||||
"éxito:"
|
||||
msgid ""
|
||||
"If the Incident Response process in section III is successfully completed:"
|
||||
msgstr "Si el proceso de respuesta a incidente en la sección III se completa con éxito:"
|
||||
|
||||
#: i2p2www/pages/site/research/vrp.html:183
|
||||
msgid ""
|
||||
"Response Manager contacts researcher and asks if researcher wishes for "
|
||||
"credit."
|
||||
msgstr ""
|
||||
"El gestor de respuesta contacta con el investigador y le pregunta si "
|
||||
"desea aparecer en los créditos."
|
||||
msgstr "El gestor de respuesta contacta con el investigador y le pregunta si desea aparecer en los créditos."
|
||||
|
||||
#: i2p2www/pages/site/research/vrp.html:186
|
||||
msgid "Finalize vulnerability announcement draft and include the following:"
|
||||
@ -632,10 +509,7 @@ msgid ""
|
||||
"Versions known to be not affected (for example, the vulnerable code was "
|
||||
"introduced in a recent version, and older versions are therefore "
|
||||
"unaffected)."
|
||||
msgstr ""
|
||||
"Versiones que se sabe que no están afectadas (por ejemplo, si el código "
|
||||
"vulnerable fue introducido en una versión reciente, las versiones "
|
||||
"anteriores no están afectadas)."
|
||||
msgstr "Versiones que se sabe que no están afectadas (por ejemplo, si el código vulnerable fue introducido en una versión reciente, las versiones anteriores no están afectadas)."
|
||||
|
||||
#: i2p2www/pages/site/research/vrp.html:199
|
||||
msgid "Versions not checked."
|
||||
@ -647,9 +521,7 @@ msgstr "Tipo de vulnerabilidad y su impacto."
|
||||
|
||||
#: i2p2www/pages/site/research/vrp.html:205
|
||||
msgid "If already obtained or applicable, a CVE-ID."
|
||||
msgstr ""
|
||||
"Si ya se obtuvo o se aplica, un CVE-ID (identificador de "
|
||||
"vulnerabilidades)."
|
||||
msgstr "Si ya se obtuvo o se aplica, un CVE-ID (identificador de vulnerabilidades)."
|
||||
|
||||
#: i2p2www/pages/site/research/vrp.html:208
|
||||
msgid "The planned, coordinated release date."
|
||||
@ -659,105 +531,72 @@ msgstr "La fecha planeada de publicación coordinada."
|
||||
msgid ""
|
||||
"Mitigating factors (for example, the vulnerability is only exposed in "
|
||||
"uncommon, non-default configurations)."
|
||||
msgstr ""
|
||||
"Factores de mitigación (por ejemplo, la vulnerabilidad sólo se expone con"
|
||||
" configuraciones infrecuentes, y no predeterminadas)."
|
||||
msgstr "Factores de mitigación (por ejemplo, la vulnerabilidad sólo se expone con configuraciones infrecuentes, y no predeterminadas)."
|
||||
|
||||
#: i2p2www/pages/site/research/vrp.html:214
|
||||
msgid ""
|
||||
"Workarounds (configuration changes users can make to reduce their "
|
||||
"exposure to the vulnerability)."
|
||||
msgstr ""
|
||||
"Soluciones auxiliares (cambios que el usuario puede hacer en la "
|
||||
"configuración para reducir su exposición a la vulnerabilidad)."
|
||||
"Workarounds (configuration changes users can make to reduce their exposure "
|
||||
"to the vulnerability)."
|
||||
msgstr "Soluciones auxiliares (cambios que el usuario puede hacer en la configuración para reducir su exposición a la vulnerabilidad)."
|
||||
|
||||
#: i2p2www/pages/site/research/vrp.html:217
|
||||
msgid "If applicable, credits to the original reporter."
|
||||
msgstr "Si se aplica, créditos al informante original."
|
||||
|
||||
#: i2p2www/pages/site/research/vrp.html:222
|
||||
msgid "Release finalized vulnerability announcement on website and in news feed."
|
||||
msgstr ""
|
||||
"Anuncio de fin de la vulnerabilidad mediante la versión en el sitio web y"
|
||||
" en la suscripción de novedades."
|
||||
msgid ""
|
||||
"Release finalized vulnerability announcement on website and in news feed."
|
||||
msgstr "Anuncio de fin de la vulnerabilidad mediante la versión en el sitio web y en la suscripción de novedades."
|
||||
|
||||
#: i2p2www/pages/site/research/vrp.html:230
|
||||
msgid ""
|
||||
"For HIGH severities, release finalized vulnerability announcement on "
|
||||
"well-known mailing lists:"
|
||||
msgstr ""
|
||||
"Para severidades ALTAs, anuncio de fin de la vulnerabilidad mediante la "
|
||||
"versión en listas de correo bien-conocidas:"
|
||||
"For HIGH severities, release finalized vulnerability announcement on well-"
|
||||
"known mailing lists:"
|
||||
msgstr "Para severidades ALTAs, anuncio de fin de la vulnerabilidad mediante la versión en listas de correo bien-conocidas:"
|
||||
|
||||
#: i2p2www/pages/site/research/vrp.html:238
|
||||
msgid "If applicable, developers request a CVE-ID."
|
||||
msgstr ""
|
||||
"Si se aplica, los desarrolladores solicitan un CVE-ID (identificador de "
|
||||
"vulnerabilidad)."
|
||||
msgstr "Si se aplica, los desarrolladores solicitan un CVE-ID (identificador de vulnerabilidad)."
|
||||
|
||||
#: i2p2www/pages/site/research/vrp.html:242
|
||||
msgid ""
|
||||
"The commit that applied the fix is made reference too in a future commit "
|
||||
"and includes a CVE-ID."
|
||||
msgstr ""
|
||||
"Se hace referencia también a la consignación (commit) que aplicó la "
|
||||
"corrección en una futura consignación, y se incluye un CVE-ID."
|
||||
"The commit that applied the fix is made reference too in a future commit and"
|
||||
" includes a CVE-ID."
|
||||
msgstr "Se hace referencia también a la consignación (commit) que aplicó la corrección en una futura consignación, y se incluye un CVE-ID."
|
||||
|
||||
#: i2p2www/pages/site/research/vrp.html:250
|
||||
msgid ""
|
||||
"If the Incident Response process in section III is *not* successfully "
|
||||
"completed:"
|
||||
msgstr ""
|
||||
"Si el proceso de respuesta a incidente en la sección III *no* se completó"
|
||||
" con éxito:"
|
||||
msgstr "Si el proceso de respuesta a incidente en la sección III *no* se completó con éxito:"
|
||||
|
||||
#: i2p2www/pages/site/research/vrp.html:254
|
||||
msgid ""
|
||||
"Response Team and developers organize an IRC meeting to discuss why/what "
|
||||
"points\n"
|
||||
"in section III were not resolved and how the team can resolve them in the"
|
||||
"\n"
|
||||
"Response Team and developers organize an IRC meeting to discuss why/what points\n"
|
||||
"in section III were not resolved and how the team can resolve them in the\n"
|
||||
"future."
|
||||
msgstr ""
|
||||
"El equipo de respuesta y los desarolladores organizan una reunión en el "
|
||||
"IRC para\n"
|
||||
"discutir por qué y qué puntos de la sección III no se resolvieron, y cómo"
|
||||
" puede el equipo resolverlos en el futuro."
|
||||
msgstr "El equipo de respuesta y los desarolladores organizan una reunión en el IRC para\ndiscutir por qué y qué puntos de la sección III no se resolvieron, y cómo puede el equipo resolverlos en el futuro."
|
||||
|
||||
#: i2p2www/pages/site/research/vrp.html:259
|
||||
msgid ""
|
||||
"Any developer meetings immediately following the incident should include "
|
||||
"points\n"
|
||||
"Any developer meetings immediately following the incident should include points\n"
|
||||
"made in section V."
|
||||
msgstr ""
|
||||
"Cualquier reunión de desarrolladores inmediatamente a continuación del "
|
||||
"incidente\n"
|
||||
"debe incluir los puntos en la sección V."
|
||||
msgstr "Cualquier reunión de desarrolladores inmediatamente a continuación del incidente\ndebe incluir los puntos en la sección V."
|
||||
|
||||
#: i2p2www/pages/site/research/vrp.html:263
|
||||
msgid ""
|
||||
"If disputes arise about whether or when to disclose information about a\n"
|
||||
"vulnerability, the Response Team will publicly discuss the issue via IRC "
|
||||
"and\n"
|
||||
"vulnerability, the Response Team will publicly discuss the issue via IRC and\n"
|
||||
"attempt to reach consensus."
|
||||
msgstr ""
|
||||
"Si surgen disputas acerca de si divulgar o no información acerca de una\n"
|
||||
"vulnerabilidad, o cuándo hacerlo, el equipo de respuesta discutirá "
|
||||
"públicamente\n"
|
||||
"el problema en el IRC e intentará alcanzar un consenso."
|
||||
msgstr "Si surgen disputas acerca de si divulgar o no información acerca de una\nvulnerabilidad, o cuándo hacerlo, el equipo de respuesta discutirá públicamente\nel problema en el IRC e intentará alcanzar un consenso."
|
||||
|
||||
#: i2p2www/pages/site/research/vrp.html:268
|
||||
#, python-format
|
||||
msgid ""
|
||||
"If consensus on a timely disclosure is not met (no later than %(limit)s "
|
||||
"days),\n"
|
||||
"If consensus on a timely disclosure is not met (no later than %(limit)s days),\n"
|
||||
"the researcher (after %(limit)s days) has every right to expose the\n"
|
||||
"vulnerability to the public."
|
||||
msgstr ""
|
||||
"Si no se alcanza un conseso para una divulgación a tiempo (no más tarde\n"
|
||||
"de %(limit)s días), el investigador (tras %(limit)s días) está totalmente"
|
||||
"\n"
|
||||
"legitimado para exponer la vulnerabilidad al público."
|
||||
msgstr "Si no se alcanza un conseso para una divulgación a tiempo (no más tarde\nde %(limit)s días), el investigador (tras %(limit)s días) está totalmente\nlegitimado para exponer la vulnerabilidad al público."
|
||||
|
||||
#: i2p2www/pages/site/research/vrp.html:277
|
||||
msgid "Incident Analysis"
|
||||
@ -769,10 +608,9 @@ msgstr "Aislar el código base"
|
||||
|
||||
#: i2p2www/pages/site/research/vrp.html:282
|
||||
#: i2p2www/pages/site/research/vrp.html:302
|
||||
msgid "Response Team and developers should coordinate to work on the following:"
|
||||
msgstr ""
|
||||
"El equipo de respuesta y los desarrolladores deben coordinarse para "
|
||||
"trabajar en lo siguiente:"
|
||||
msgid ""
|
||||
"Response Team and developers should coordinate to work on the following:"
|
||||
msgstr "El equipo de respuesta y los desarrolladores deben coordinarse para trabajar en lo siguiente:"
|
||||
|
||||
#: i2p2www/pages/site/research/vrp.html:286
|
||||
msgid "Problematic implementation of classes/libraries/functions, etc."
|
||||
@ -792,9 +630,7 @@ msgstr "Auditoría"
|
||||
|
||||
#: i2p2www/pages/site/research/vrp.html:306
|
||||
msgid "Auditing of problem area(s) as discussed in point 1."
|
||||
msgstr ""
|
||||
"Auditado de la(s) área(s) problemáticas tal como se discutió en el punto "
|
||||
"1."
|
||||
msgstr "Auditado de la(s) área(s) problemáticas tal como se discutió en el punto 1."
|
||||
|
||||
#: i2p2www/pages/site/research/vrp.html:309
|
||||
msgid "Generate internal reports and store for future reference."
|
||||
@ -802,22 +638,15 @@ msgstr "Generar informes internos y almacenarlos para futura referencia."
|
||||
|
||||
#: i2p2www/pages/site/research/vrp.html:312
|
||||
msgid ""
|
||||
"If results are not sensitive, share with the public via IRC or public "
|
||||
"Trac."
|
||||
msgstr ""
|
||||
"Si los resultados no son información sensible, compartirlos con el "
|
||||
"público vía IRC o mediante el Trac público."
|
||||
"If results are not sensitive, share with the public via IRC or public Trac."
|
||||
msgstr "Si los resultados no son información sensible, compartirlos con el público vía IRC o mediante el Trac público."
|
||||
|
||||
#: i2p2www/pages/site/research/vrp.html:320
|
||||
#, python-format
|
||||
msgid ""
|
||||
"Response Team has %(limit)s days following completion of section III to "
|
||||
"ensure\n"
|
||||
"Response Team has %(limit)s days following completion of section III to ensure\n"
|
||||
"completion of section V."
|
||||
msgstr ""
|
||||
"El equipo de respuesta dispone de %(limit)s días tras completar la "
|
||||
"sección III\n"
|
||||
"para asegurar el completado de la sección V."
|
||||
msgstr "El equipo de respuesta dispone de %(limit)s días tras completar la sección III\npara asegurar el completado de la sección V."
|
||||
|
||||
#: i2p2www/pages/site/research/vrp.html:326
|
||||
msgid "Resolutions"
|
||||
@ -825,17 +654,10 @@ msgstr "Resoluciones"
|
||||
|
||||
#: i2p2www/pages/site/research/vrp.html:328
|
||||
msgid ""
|
||||
"Any further questions or resolutions regarding the incident(s) between "
|
||||
"the\n"
|
||||
"researcher and response + development team after public disclosure can be"
|
||||
"\n"
|
||||
"Any further questions or resolutions regarding the incident(s) between the\n"
|
||||
"researcher and response + development team after public disclosure can be\n"
|
||||
"addressed via the following:"
|
||||
msgstr ""
|
||||
"En relación a el/los incidente(s), cualquier pregunta o resolución "
|
||||
"adicional\n"
|
||||
"entre el investigador y el equipo de respuesta y desarrollo tras la "
|
||||
"divulgación\n"
|
||||
"pública, puede ser abordado mediante lo siguiente:"
|
||||
msgstr "En relación a el/los incidente(s), cualquier pregunta o resolución adicional\nentre el investigador y el equipo de respuesta y desarrollo tras la divulgación\npública, puede ser abordado mediante lo siguiente:"
|
||||
|
||||
#: i2p2www/pages/site/research/vrp.html:341
|
||||
msgid "Continuous Improvement"
|
||||
@ -843,22 +665,15 @@ msgstr "Mejora continua"
|
||||
|
||||
#: i2p2www/pages/site/research/vrp.html:344
|
||||
msgid ""
|
||||
"Response Team and developers should hold annual meetings to review the "
|
||||
"previous\n"
|
||||
"Response Team and developers should hold annual meetings to review the previous\n"
|
||||
"year's incidents."
|
||||
msgstr ""
|
||||
"El equipo de respuesta y los desarrolladores deben mantener reuniones "
|
||||
"anuales\n"
|
||||
"para revisar los incidentes del año anterior."
|
||||
msgstr "El equipo de respuesta y los desarrolladores deben mantener reuniones anuales\npara revisar los incidentes del año anterior."
|
||||
|
||||
#: i2p2www/pages/site/research/vrp.html:349
|
||||
msgid ""
|
||||
"Response Team or designated person(s) should give a brief presentation, "
|
||||
"including:"
|
||||
msgstr ""
|
||||
"El equipo de respuesta o la(s) persona(s) designada(s) debe(n) "
|
||||
"proporcionar una\n"
|
||||
"presentación breve, incluyendo:"
|
||||
msgstr "El equipo de respuesta o la(s) persona(s) designada(s) debe(n) proporcionar una\npresentación breve, incluyendo:"
|
||||
|
||||
#: i2p2www/pages/site/research/vrp.html:353
|
||||
msgid "Areas of I2P affected by the incidents."
|
||||
@ -866,15 +681,11 @@ msgstr "Áreas de I2P afectadas por los incidentes."
|
||||
|
||||
#: i2p2www/pages/site/research/vrp.html:356
|
||||
msgid "Any network downtime or monetary cost (if any) of the incidents."
|
||||
msgstr ""
|
||||
"Cualquier periodo de inactividad de la red o coste monetario (en su caso)"
|
||||
" de los incidentes."
|
||||
msgstr "Cualquier periodo de inactividad de la red o coste monetario (en su caso) de los incidentes."
|
||||
|
||||
#: i2p2www/pages/site/research/vrp.html:359
|
||||
msgid "Ways in which the incidents could have been avoided (if any)."
|
||||
msgstr ""
|
||||
"Maneras en las que los incidentes podrían haber sido evitados (en su "
|
||||
"caso)."
|
||||
msgstr "Maneras en las que los incidentes podrían haber sido evitados (en su caso)."
|
||||
|
||||
#: i2p2www/pages/site/research/vrp.html:362
|
||||
msgid "How effective this process was in dealing with the incidents."
|
||||
@ -882,17 +693,12 @@ msgstr "En qué medida fue efectivo este proceso para encargarse de los incident
|
||||
|
||||
#: i2p2www/pages/site/research/vrp.html:368
|
||||
msgid "After the presentation, Response Team and developers should discuss:"
|
||||
msgstr ""
|
||||
"Tras la presentación, el equipo de respuesta y los desarrolladores deben "
|
||||
"discutir:"
|
||||
msgstr "Tras la presentación, el equipo de respuesta y los desarrolladores deben discutir:"
|
||||
|
||||
#: i2p2www/pages/site/research/vrp.html:372
|
||||
msgid "Potential changes to development processes to reduce future incidents."
|
||||
msgstr ""
|
||||
"Cambios potenciales en el desarrollo de procesos para reducir futuros "
|
||||
"incidentes."
|
||||
msgstr "Cambios potenciales en el desarrollo de procesos para reducir futuros incidentes."
|
||||
|
||||
#: i2p2www/pages/site/research/vrp.html:375
|
||||
msgid "Potential changes to this process to improve future responses."
|
||||
msgstr "Cambios potenciales en este proceso para mejorar futuras respuestas."
|
||||
|
||||
|
File diff suppressed because it is too large
Load Diff
File diff suppressed because it is too large
Load Diff
File diff suppressed because it is too large
Load Diff
File diff suppressed because it is too large
Load Diff
File diff suppressed because it is too large
Load Diff
File diff suppressed because it is too large
Load Diff
File diff suppressed because it is too large
Load Diff
File diff suppressed because it is too large
Load Diff
File diff suppressed because it is too large
Load Diff
File diff suppressed because it is too large
Load Diff
File diff suppressed because it is too large
Load Diff
@ -1,29 +1,30 @@
|
||||
# French translations for I2P.
|
||||
# Translations template for I2P.
|
||||
# Copyright (C) 2021 ORGANIZATION
|
||||
# This file is distributed under the same license as the I2P project.
|
||||
#
|
||||
#
|
||||
# Translators:
|
||||
# bassmax, 2015
|
||||
# AO <ao@localizationlab.org>, 2018-2020
|
||||
# Boxoa590, 2013
|
||||
# AO <ao@localizationlab.org>, 2017-2018
|
||||
# magma <magma@mail.i2p>, 2011
|
||||
# Boxoa590, 2013
|
||||
# syl_, 2013,2015-2016
|
||||
# Towinet, 2013-2016
|
||||
msgid ""
|
||||
msgstr ""
|
||||
"Project-Id-Version: I2P\n"
|
||||
"Project-Id-Version: I2P\n"
|
||||
"Report-Msgid-Bugs-To: http://trac.i2p2.de\n"
|
||||
"POT-Creation-Date: 2021-10-11 16:27+0000\n"
|
||||
"PO-Revision-Date: 2013-07-15 11:59+0000\n"
|
||||
"Last-Translator: AO <ao@localizationlab.org>, 2018-2020\n"
|
||||
"Language-Team: French (http://www.transifex.com/otf/I2P/language/fr/)\n"
|
||||
"Plural-Forms: nplurals=3; plural=(n == 0 || n == 1) ? 0 : n != 0 && n % "
|
||||
"1000000 == 0 ? 1 : 2\n"
|
||||
"MIME-Version: 1.0\n"
|
||||
"Content-Type: text/plain; charset=utf-8\n"
|
||||
"Content-Type: text/plain; charset=UTF-8\n"
|
||||
"Content-Transfer-Encoding: 8bit\n"
|
||||
"Generated-By: Babel 1.3\n"
|
||||
"Language: fr\n"
|
||||
"Plural-Forms: nplurals=3; plural=(n == 0 || n == 1) ? 0 : n != 0 && n % 1000000 == 0 ? 1 : 2;\n"
|
||||
|
||||
#: i2p2www/pages/site/comparison/freenet.html:2
|
||||
msgid "I2P Compared to Freenet"
|
||||
@ -31,89 +32,39 @@ msgstr "I2P comparé à Freenet"
|
||||
|
||||
#: i2p2www/pages/site/comparison/freenet.html:8
|
||||
msgid ""
|
||||
"Freenet is a fully distributed, peer to peer anonymous publishing "
|
||||
"network, offering \n"
|
||||
"secure ways to store data, as well as some approaches attempting to "
|
||||
"address the loads\n"
|
||||
"of a flash flood. While Freenet is designed as a distributed data store,"
|
||||
" people have\n"
|
||||
"built applications on top of it to do more generic anonymous "
|
||||
"communication, such as \n"
|
||||
"Freenet is a fully distributed, peer to peer anonymous publishing network, offering \n"
|
||||
"secure ways to store data, as well as some approaches attempting to address the loads\n"
|
||||
"of a flash flood. While Freenet is designed as a distributed data store, people have\n"
|
||||
"built applications on top of it to do more generic anonymous communication, such as \n"
|
||||
"static websites and message boards."
|
||||
msgstr ""
|
||||
"Freenet est entièrement distribué, c’est un réseau pair à pair de "
|
||||
"publication anonyme, offrant\n"
|
||||
"des moyens sûrs pour stocker des données, ainsi que des approches qui "
|
||||
"tentent de répondre aux charges\n"
|
||||
"d’une crue éclair. Alors que Freenet est conçu comme un magasin de "
|
||||
"données distribuées, des gens ont\n"
|
||||
"construit des applications par dessus celui-ci afin de faire de la "
|
||||
"communication anonyme plus générique, tels\n"
|
||||
"que des sites Web statiques et des forums électroniques."
|
||||
msgstr "Freenet est entièrement distribué, c’est un réseau pair à pair de publication anonyme, offrant\ndes moyens sûrs pour stocker des données, ainsi que des approches qui tentent de répondre aux charges\nd’une crue éclair. Alors que Freenet est conçu comme un magasin de données distribuées, des gens ont\nconstruit des applications par dessus celui-ci afin de faire de la communication anonyme plus générique, tels\nque des sites Web statiques et des forums électroniques."
|
||||
|
||||
#: i2p2www/pages/site/comparison/freenet.html:16
|
||||
#, python-format
|
||||
msgid ""
|
||||
"Compared to I2P, Freenet offers some substantial benefits - it is a "
|
||||
"distributed data\n"
|
||||
"store, while I2P is not, allowing people to retrieve the content "
|
||||
"published by others \n"
|
||||
"even when the publisher is no longer online. In addition, it should be "
|
||||
"able to \n"
|
||||
"distribute popular data fairly efficiently. I2P itself does not and will"
|
||||
" not provide \n"
|
||||
"this functionality. On the other hand, there is overlap for users who "
|
||||
"simply want to \n"
|
||||
"communicate with each other anonymously through websites, message boards,"
|
||||
" file sharing\n"
|
||||
"programs, etc. There have also been some attempts to develop a "
|
||||
"distributed data \n"
|
||||
"Compared to I2P, Freenet offers some substantial benefits - it is a distributed data\n"
|
||||
"store, while I2P is not, allowing people to retrieve the content published by others \n"
|
||||
"even when the publisher is no longer online. In addition, it should be able to \n"
|
||||
"distribute popular data fairly efficiently. I2P itself does not and will not provide \n"
|
||||
"this functionality. On the other hand, there is overlap for users who simply want to \n"
|
||||
"communicate with each other anonymously through websites, message boards, file sharing\n"
|
||||
"programs, etc. There have also been some attempts to develop a distributed data \n"
|
||||
"store to run on top of I2P,\n"
|
||||
"(most recently a port of <a href=\"%(tahoe)s\">Tahoe-LAFS</a>)\n"
|
||||
"but nothing is yet ready for general use."
|
||||
msgstr ""
|
||||
"Comparé à I2P, Freenet offre des avantages considérables : c’est un "
|
||||
"magasin de données distribuées, alors qu’I2P ne l’est pas, ce qui permet "
|
||||
"de récupérer les contenus publiés par autrui, même si l’éditeur n’est "
|
||||
"plus en ligne. En outre, il devrait être en mesure de distribuer des "
|
||||
"données populaires assez efficacement. I2P même n’offre et n’offrira pas "
|
||||
"cette fonction. D’autre part, il existe un chevauchement pour les "
|
||||
"utilisateurs qui veulent simplement communiquer anonymement les uns avec "
|
||||
"les autres par les sites Web, les forums, les logiciels de partage de "
|
||||
"fichiers, etc. Il y a aussi eu des tentatives de développement d’un "
|
||||
"magasin de données distribuées qui fonctionnerait par-dessus I2P (plus "
|
||||
"récemment un portage de <a href=\"%(tahoe)s\">Tahoe-LAFS</a>), mais rien "
|
||||
"n’est encore prêt pour une utilisation générale."
|
||||
msgstr "Comparé à I2P, Freenet offre des avantages considérables : c’est un magasin de données distribuées, alors qu’I2P ne l’est pas, ce qui permet de récupérer les contenus publiés par autrui, même si l’éditeur n’est plus en ligne. En outre, il devrait être en mesure de distribuer des données populaires assez efficacement. I2P même n’offre et n’offrira pas cette fonction. D’autre part, il existe un chevauchement pour les utilisateurs qui veulent simplement communiquer anonymement les uns avec les autres par les sites Web, les forums, les logiciels de partage de fichiers, etc. Il y a aussi eu des tentatives de développement d’un magasin de données distribuées qui fonctionnerait par-dessus I2P (plus récemment un portage de <a href=\"%(tahoe)s\">Tahoe-LAFS</a>), mais rien n’est encore prêt pour une utilisation générale."
|
||||
|
||||
#: i2p2www/pages/site/comparison/freenet.html:29
|
||||
msgid ""
|
||||
"However, even ignoring any implementations issues, there are some "
|
||||
"concerns \n"
|
||||
"about Freenet's algorithms from both a scalability and anonymity "
|
||||
"perspective, owing \n"
|
||||
"largely to Freenet's heuristic driven routing. The interactions of "
|
||||
"various techniques \n"
|
||||
"certainly may successfully deter various attacks, and perhaps some "
|
||||
"aspects of the \n"
|
||||
"routing algorithms will provide the hoped for scalability. "
|
||||
"Unfortunately, not much\n"
|
||||
"analysis of the algorithms involved has resulted in positive results, but"
|
||||
" there is still\n"
|
||||
"hope. At the very least, Freenet does provide substantial anonymity "
|
||||
"against an attacker\n"
|
||||
"However, even ignoring any implementations issues, there are some concerns \n"
|
||||
"about Freenet's algorithms from both a scalability and anonymity perspective, owing \n"
|
||||
"largely to Freenet's heuristic driven routing. The interactions of various techniques \n"
|
||||
"certainly may successfully deter various attacks, and perhaps some aspects of the \n"
|
||||
"routing algorithms will provide the hoped for scalability. Unfortunately, not much\n"
|
||||
"analysis of the algorithms involved has resulted in positive results, but there is still\n"
|
||||
"hope. At the very least, Freenet does provide substantial anonymity against an attacker\n"
|
||||
"who does not have the resources necessary to analyze it further."
|
||||
msgstr ""
|
||||
"Cependant, même sans tenir compte des questions relatives aux mises en "
|
||||
"œuvre, il y a des préoccupations sur les algorithmes de Freenet à la fois"
|
||||
" sur l’évolutivité et la perspective d’anonymat, en raison en grande "
|
||||
"partie du mode de routage de Freenet, axé heuristique. Les interactions "
|
||||
"des différentes techniques peuvent certainement réussir à dissuader "
|
||||
"diverses attaques, et peut-être que certains aspects des algorithmes de "
|
||||
"routage peuvent faire espérer de l’évolutivité. Malheureusement, peu "
|
||||
"d’analyses des algorithmes concernés ont abouti à des résultats positifs,"
|
||||
" mais il reste encore de l’espoir. À tout le moins, Freenet fournit un "
|
||||
"anonymat substantiel contre un assaillant qui n’aurait pas les ressources"
|
||||
" nécessaires pour l’analyser davantage."
|
||||
msgstr "Cependant, même sans tenir compte des questions relatives aux mises en œuvre, il y a des préoccupations sur les algorithmes de Freenet à la fois sur l’évolutivité et la perspective d’anonymat, en raison en grande partie du mode de routage de Freenet, axé heuristique. Les interactions des différentes techniques peuvent certainement réussir à dissuader diverses attaques, et peut-être que certains aspects des algorithmes de routage peuvent faire espérer de l’évolutivité. Malheureusement, peu d’analyses des algorithmes concernés ont abouti à des résultats positifs, mais il reste encore de l’espoir. À tout le moins, Freenet fournit un anonymat substantiel contre un assaillant qui n’aurait pas les ressources nécessaires pour l’analyser davantage."
|
||||
|
||||
#: i2p2www/pages/site/comparison/index.html:2
|
||||
msgid "Comparing I2P to other projects"
|
||||
@ -121,44 +72,27 @@ msgstr "I2P comparé à d’autres projets"
|
||||
|
||||
#: i2p2www/pages/site/comparison/index.html:4
|
||||
msgid ""
|
||||
"There are a great many other applications and projects working on "
|
||||
"anonymous \n"
|
||||
"communication and I2P has been inspired by much of their efforts. This "
|
||||
"is not \n"
|
||||
"There are a great many other applications and projects working on anonymous \n"
|
||||
"communication and I2P has been inspired by much of their efforts. This is not \n"
|
||||
"a comprehensive list of anonymity resources - both freehaven's \n"
|
||||
"<a href=\"http://freehaven.net/anonbib/topic.html\">Anonymity "
|
||||
"Bibliography</a>\n"
|
||||
"and GNUnet's <a href=\"https://www.gnunet.org/links/\">related "
|
||||
"projects</a>\n"
|
||||
"<a href=\"http://freehaven.net/anonbib/topic.html\">Anonymity Bibliography</a>\n"
|
||||
"and GNUnet's <a href=\"https://www.gnunet.org/links/\">related projects</a>\n"
|
||||
"serve that purpose well. That said, a few systems stand out for further\n"
|
||||
"comparison. The following have individual comparison pages:"
|
||||
msgstr ""
|
||||
"Il existe un grand nombre d’autres applications et de projets travaillant"
|
||||
" sur les communications anonymes et I2P s’en est largement inspiré. Cette"
|
||||
" liste est loin d’être exhaustive concernant le thème de l’anonymat (<a "
|
||||
"href=\"http://freehaven.net/anonbib/topic.html\">Anonymity "
|
||||
"Bibliography</a> de Freehaven\n"
|
||||
"et les <a href=\"https://www.gnunet.org/links/\">projets liés</a> à "
|
||||
"GNUnet servent à celà). \n"
|
||||
"Néanmoins, certains systèmes se prêtent bien à la comparaison. Les "
|
||||
"suivants disposent d’ailleurs d’une page dédiée :"
|
||||
msgstr "Il existe un grand nombre d’autres applications et de projets travaillant sur les communications anonymes et I2P s’en est largement inspiré. Cette liste est loin d’être exhaustive concernant le thème de l’anonymat (<a href=\"http://freehaven.net/anonbib/topic.html\">Anonymity Bibliography</a> de Freehaven\net les <a href=\"https://www.gnunet.org/links/\">projets liés</a> à GNUnet servent à celà). \nNéanmoins, certains systèmes se prêtent bien à la comparaison. Les suivants disposent d’ailleurs d’une page dédiée :"
|
||||
|
||||
#: i2p2www/pages/site/comparison/index.html:20
|
||||
#, python-format
|
||||
msgid ""
|
||||
"The following are discussed on the <a href=\"%(othernetworks)s\">other "
|
||||
"networks page:</a>"
|
||||
msgstr ""
|
||||
"Ceux qui suivent sont discuté sur la page <a "
|
||||
"href=\"%(othernetworks)s\">autres réseaux</a>"
|
||||
msgstr "Ceux qui suivent sont discuté sur la page <a href=\"%(othernetworks)s\">autres réseaux</a>"
|
||||
|
||||
#: i2p2www/pages/site/comparison/index.html:33
|
||||
#, python-format
|
||||
msgid ""
|
||||
"The content of this page is subject to update, discussion and dispute, "
|
||||
"and we welcome comments and additions.\n"
|
||||
"You may contribute an analysis by entering a <a href=\"%(trac)s\">new "
|
||||
"issue on Github</a>."
|
||||
"The content of this page is subject to update, discussion and dispute, and we welcome comments and additions.\n"
|
||||
"You may contribute an analysis by entering a <a href=\"%(trac)s\">new issue on Github</a>."
|
||||
msgstr ""
|
||||
|
||||
#: i2p2www/pages/site/comparison/other-networks.html:2
|
||||
@ -183,234 +117,109 @@ msgstr ""
|
||||
#, python-format
|
||||
msgid ""
|
||||
"RetroShare is a set of peer-to-peer applications running in a\n"
|
||||
"<a href=\"%(f2fwiki)s\">Friend-to-friend (F2F)</a> network. Each peer of "
|
||||
"such F2F \n"
|
||||
"network makes direct IP connections only to authenticated peers "
|
||||
"(\"friends\") after explicit \n"
|
||||
"certificates exchange. It can discover unauthenticated peers (e.g. "
|
||||
"friends of friends), \n"
|
||||
"but connections to them are relayed over \"friend\" peers for providing "
|
||||
"privacy and anonymity."
|
||||
"<a href=\"%(f2fwiki)s\">Friend-to-friend (F2F)</a> network. Each peer of such F2F \n"
|
||||
"network makes direct IP connections only to authenticated peers (\"friends\") after explicit \n"
|
||||
"certificates exchange. It can discover unauthenticated peers (e.g. friends of friends), \n"
|
||||
"but connections to them are relayed over \"friend\" peers for providing privacy and anonymity."
|
||||
msgstr ""
|
||||
|
||||
#: i2p2www/pages/site/comparison/other-networks.html:37
|
||||
msgid ""
|
||||
"RetroShare is designed to build a private network of trusted peers, while"
|
||||
" I2P is designed \n"
|
||||
"to be a large-scaled public anonymous network. Recent versions of "
|
||||
"RetroShare have options to run \n"
|
||||
"as a public \"darknet\" by using I2P or Tor as a transport. That way all "
|
||||
"connections are \n"
|
||||
"RetroShare is designed to build a private network of trusted peers, while I2P is designed \n"
|
||||
"to be a large-scaled public anonymous network. Recent versions of RetroShare have options to run \n"
|
||||
"as a public \"darknet\" by using I2P or Tor as a transport. That way all connections are \n"
|
||||
"anonymized and no trust is required for adding new \"friends\"."
|
||||
msgstr ""
|
||||
|
||||
#: i2p2www/pages/site/comparison/other-networks.html:48
|
||||
#, python-format
|
||||
msgid ""
|
||||
"Morphmix and Tarzan are both fully distributed, peer to peer networks of"
|
||||
" \n"
|
||||
"anonymizing proxies, allowing people to tunnel out through the low "
|
||||
"latency \n"
|
||||
"mix network. Morphmix includes some very interesting collusion detection"
|
||||
" \n"
|
||||
"algorithms and Sybil defenses, while Tarzan makes use of the scarcity of "
|
||||
"IP\n"
|
||||
"Morphmix and Tarzan are both fully distributed, peer to peer networks of \n"
|
||||
"anonymizing proxies, allowing people to tunnel out through the low latency \n"
|
||||
"mix network. Morphmix includes some very interesting collusion detection \n"
|
||||
"algorithms and Sybil defenses, while Tarzan makes use of the scarcity of IP\n"
|
||||
"addresses to accomplish the same. The two primary differences between \n"
|
||||
"these systems and I2P are related to I2P's <a "
|
||||
"href=\"%(threatmodel)s\">threat model</a> \n"
|
||||
"and their out-proxy design (as opposed to providing both sender and "
|
||||
"receiver \n"
|
||||
"anonymity). There is source code available to both systems, but we are "
|
||||
"not aware \n"
|
||||
"these systems and I2P are related to I2P's <a href=\"%(threatmodel)s\">threat model</a> \n"
|
||||
"and their out-proxy design (as opposed to providing both sender and receiver \n"
|
||||
"anonymity). There is source code available to both systems, but we are not aware \n"
|
||||
"of their use outside of academic environments."
|
||||
msgstr ""
|
||||
"Morphmix et Tarzan sont tous les deux des réseaux pair à pair de "
|
||||
"mandataires d’anonymisation entièrement distribués, permettant aux "
|
||||
"utilisateurs de tunnelliser vers l’extérieur par le réseau de mélange à "
|
||||
"latence faible. Morphmix comportent des algorithmes très intéressants de "
|
||||
"détection de collusion et des défenses contre les Sybil, tandis que "
|
||||
"Tarzan fait appel à la rareté d’adresses IP pour accomplir la même chose."
|
||||
" Les deux principales différences entre ces systèmes et I2P sont liées au"
|
||||
" <a href=\"%(threatmodel)s\">modèle de menace</a> d’I2P et à leur "
|
||||
"conception de mandataire sortant (au lieu de fournir de l’anonymat à la "
|
||||
"fois à l’émetteur et au destinataire). Le code source est offert pour les"
|
||||
" deux systèmes, mais nous ne sommes pas au courant d’une utilisation en "
|
||||
"dehors des milieux universitaires."
|
||||
msgstr "Morphmix et Tarzan sont tous les deux des réseaux pair à pair de mandataires d’anonymisation entièrement distribués, permettant aux utilisateurs de tunnelliser vers l’extérieur par le réseau de mélange à latence faible. Morphmix comportent des algorithmes très intéressants de détection de collusion et des défenses contre les Sybil, tandis que Tarzan fait appel à la rareté d’adresses IP pour accomplir la même chose. Les deux principales différences entre ces systèmes et I2P sont liées au <a href=\"%(threatmodel)s\">modèle de menace</a> d’I2P et à leur conception de mandataire sortant (au lieu de fournir de l’anonymat à la fois à l’émetteur et au destinataire). Le code source est offert pour les deux systèmes, mais nous ne sommes pas au courant d’une utilisation en dehors des milieux universitaires."
|
||||
|
||||
#: i2p2www/pages/site/comparison/other-networks.html:172
|
||||
#, python-format
|
||||
msgid ""
|
||||
"\n"
|
||||
"Mixminion and Mixmaster are networks to support anonymous email against a"
|
||||
" very\n"
|
||||
"Mixminion and Mixmaster are networks to support anonymous email against a very\n"
|
||||
"powerful adversary.\n"
|
||||
"High-latency messaging applications running on top of I2P\n"
|
||||
"(for example <a href=\"%(syndie)s\">Syndie</a> or I2PBote)\n"
|
||||
"may perhaps prove adequate to meet the threat\n"
|
||||
"model of those adversaries, while running in parallel along side the "
|
||||
"needs of low latency users, to provide\n"
|
||||
"model of those adversaries, while running in parallel along side the needs of low latency users, to provide\n"
|
||||
"a significantly larger anonymity set.\n"
|
||||
"High-latency support within the I2P router itself may or may not be added"
|
||||
" in a distant future release.\n"
|
||||
"It is too early to say if I2P will meet the needs of users requiring "
|
||||
"extreme protection for email."
|
||||
msgstr ""
|
||||
"\n"
|
||||
"Mixminion et Mixmaster sont des réseaux pour offrir un système de "
|
||||
"courriel anonyme contre des adversaires très puissants.\n"
|
||||
"Les applications de messagerie à latence élevée fonctionnant sur I2P (par"
|
||||
" exemple <a href=\"%(syndie)s\">Syndie</a> ou I2PBote) pourraient se "
|
||||
"révéler adéquates pour répondre au modèle de menace de ces adversaires, "
|
||||
"en s’exécutant simultanément aux besoins des utilisateurs à latence "
|
||||
"faible, pour fournir un jeu d’anonymat considérablement plus important.\n"
|
||||
"La prise en charge d’une latence élevée dans le routeur I2P même pourrait"
|
||||
" ou pas être ajoutée dans une version future éloignée.\n"
|
||||
"Il est trop tôt pour dire si I2P répondra aux besoins d’utilisateurs "
|
||||
"exigeant une protection extrême pour le courriel."
|
||||
"High-latency support within the I2P router itself may or may not be added in a distant future release.\n"
|
||||
"It is too early to say if I2P will meet the needs of users requiring extreme protection for email."
|
||||
msgstr "\nMixminion et Mixmaster sont des réseaux pour offrir un système de courriel anonyme contre des adversaires très puissants.\nLes applications de messagerie à latence élevée fonctionnant sur I2P (par exemple <a href=\"%(syndie)s\">Syndie</a> ou I2PBote) pourraient se révéler adéquates pour répondre au modèle de menace de ces adversaires, en s’exécutant simultanément aux besoins des utilisateurs à latence faible, pour fournir un jeu d’anonymat considérablement plus important.\nLa prise en charge d’une latence élevée dans le routeur I2P même pourrait ou pas être ajoutée dans une version future éloignée.\nIl est trop tôt pour dire si I2P répondra aux besoins d’utilisateurs exigeant une protection extrême pour le courriel."
|
||||
|
||||
#: i2p2www/pages/site/comparison/other-networks.html:184
|
||||
msgid ""
|
||||
"As with Tor and Onion Routing, \n"
|
||||
"both Mixminion and Mixmaster take the directory based approach as well."
|
||||
msgstr ""
|
||||
"Comme Tor et Onion Routing, Mixminion et Mixmaster ont une approche basée"
|
||||
" sur un répertoire."
|
||||
msgstr "Comme Tor et Onion Routing, Mixminion et Mixmaster ont une approche basée sur un répertoire."
|
||||
|
||||
#: i2p2www/pages/site/comparison/other-networks.html:194
|
||||
#, python-format
|
||||
msgid ""
|
||||
"JAP (Java Anonymous Proxy) is a network of mix cascades for anonymizing "
|
||||
"web requests,\n"
|
||||
"and as such it has a few centralized nodes (participants in the cascade) "
|
||||
"that blend\n"
|
||||
"and mix requests from clients through the sequence of nodes (the cascade)"
|
||||
" before \n"
|
||||
"proxying out onto the web. The scope, threat model, and security is "
|
||||
"substantially \n"
|
||||
"different from I2P, but for those who don't require significant anonymity"
|
||||
" but still\n"
|
||||
"are not satisfied with an Anonymizer-like service, JAP is worth "
|
||||
"reviewing. One\n"
|
||||
"caution to note is that anyone under the jurisdiction of the German "
|
||||
"courts may want\n"
|
||||
"to take care, as the German Federal Bureau of Criminal Investigation "
|
||||
"(FBCI) has \n"
|
||||
"JAP (Java Anonymous Proxy) is a network of mix cascades for anonymizing web requests,\n"
|
||||
"and as such it has a few centralized nodes (participants in the cascade) that blend\n"
|
||||
"and mix requests from clients through the sequence of nodes (the cascade) before \n"
|
||||
"proxying out onto the web. The scope, threat model, and security is substantially \n"
|
||||
"different from I2P, but for those who don't require significant anonymity but still\n"
|
||||
"are not satisfied with an Anonymizer-like service, JAP is worth reviewing. One\n"
|
||||
"caution to note is that anyone under the jurisdiction of the German courts may want\n"
|
||||
"to take care, as the German Federal Bureau of Criminal Investigation (FBCI) has \n"
|
||||
"successfully mounted an \n"
|
||||
"<a href=\"%(url)s\">attack</a> \n"
|
||||
"on the network. Even though the method of this attack was later found to"
|
||||
" be illegal \n"
|
||||
"in the German courts, the fact that the data was successfully collected "
|
||||
"is the \n"
|
||||
"concern. Courts change their minds based upon circumstance, and this is "
|
||||
"evidence that \n"
|
||||
"if a government body or intelligence agency wanted to, they could gather "
|
||||
"the data, even \n"
|
||||
"on the network. Even though the method of this attack was later found to be illegal \n"
|
||||
"in the German courts, the fact that the data was successfully collected is the \n"
|
||||
"concern. Courts change their minds based upon circumstance, and this is evidence that \n"
|
||||
"if a government body or intelligence agency wanted to, they could gather the data, even \n"
|
||||
"if it may be found inadmissible in some courts later)"
|
||||
msgstr ""
|
||||
"JAP (mandataire anonyme Java) est un réseau de mélange en cascades pour "
|
||||
"l’anonymisation de demandes Web et comme tel a quelques nœuds centralisés"
|
||||
" (participants à la cascade) qui brassent et mélangent les requêtes des "
|
||||
"clients à travers la séquence de nœuds (la cascade) avant de les relayer "
|
||||
"vers le Toile par un mandataire. Le champ d’application, le modèle de "
|
||||
"menace et la sécurité sont sensiblement\n"
|
||||
"différents d’I2P, mais pour ceux qui n’exige pas un anonymat important, "
|
||||
"mais qui ne sont quand même pas satisfaits par un service genre "
|
||||
"Anonymizer, JAP mérite d’être examiné. Une précaution à noter pour toute "
|
||||
"personne relevant de la juridiction des tribunaux allemands, car le "
|
||||
"bureau fédéral allemand des enquêtes criminelles (FBCI) a monté avec "
|
||||
"succès une <a href=\"%(url)s\"> attaque </a> contre le réseau. Même si la"
|
||||
" méthode de cette attaque a ensuite été jugée illégale par les tribunaux "
|
||||
"allemands, le fait que les données ont été recueillies avec succès est "
|
||||
"une préoccupation. Les tribunaux changent d’avis selon les circonstances "
|
||||
"et c’est la preuve que si un organisme gouvernemental ou une agence de "
|
||||
"renseignement le voulaient, ils pourraient recueillir les données, même "
|
||||
"si cela peut être déclaré irrecevable ultérieurement par certains "
|
||||
"tribunaux)"
|
||||
msgstr "JAP (mandataire anonyme Java) est un réseau de mélange en cascades pour l’anonymisation de demandes Web et comme tel a quelques nœuds centralisés (participants à la cascade) qui brassent et mélangent les requêtes des clients à travers la séquence de nœuds (la cascade) avant de les relayer vers le Toile par un mandataire. Le champ d’application, le modèle de menace et la sécurité sont sensiblement\ndifférents d’I2P, mais pour ceux qui n’exige pas un anonymat important, mais qui ne sont quand même pas satisfaits par un service genre Anonymizer, JAP mérite d’être examiné. Une précaution à noter pour toute personne relevant de la juridiction des tribunaux allemands, car le bureau fédéral allemand des enquêtes criminelles (FBCI) a monté avec succès une <a href=\"%(url)s\"> attaque </a> contre le réseau. Même si la méthode de cette attaque a ensuite été jugée illégale par les tribunaux allemands, le fait que les données ont été recueillies avec succès est une préoccupation. Les tribunaux changent d’avis selon les circonstances et c’est la preuve que si un organisme gouvernemental ou une agence de renseignement le voulaient, ils pourraient recueillir les données, même si cela peut être déclaré irrecevable ultérieurement par certains tribunaux)"
|
||||
|
||||
#: i2p2www/pages/site/comparison/other-networks.html:216
|
||||
#, python-format
|
||||
msgid ""
|
||||
"Both of these systems work through the same basic \n"
|
||||
"<a href=\"%(antnet)s\">antnet</a> routing, providing some degree of\n"
|
||||
"anonymity based on the threat model of providing plausible deniability "
|
||||
"against a simple \n"
|
||||
"non-colluding adversary. With the antnet routing, they first either do a"
|
||||
" random walk or a \n"
|
||||
"broadcast search to find some peer with the data or identity desired, and"
|
||||
" then use a feedback\n"
|
||||
"algorithm to optimize that found path. This works well for applications "
|
||||
"that merely want to know \n"
|
||||
"what other people around them have to offer - \"How are y'all doing\" vs."
|
||||
" \"Hey Alice, how are you\" - \n"
|
||||
"you basically get a local cluster of nodes that can share files with and "
|
||||
"maintain some degree of \n"
|
||||
"anonymity (though you don't have much control over who is in that group "
|
||||
"of peers)."
|
||||
msgstr ""
|
||||
"Ces deux systèmes fonctionnent par le même routage <a "
|
||||
"href=\"%(antnet)s\">antnet</a> de base, fournissant un certain degré "
|
||||
"d’anonymat d’après un modèle de menace qui consiste à fournir un déni "
|
||||
"plausible contre un adversaire seul. Avec le routage d’antnet, soit ils "
|
||||
"appliquent d’abord un cheminement aléatoire, soit une recherche par "
|
||||
"diffusion pour trouver un pair ayant les données ou l’identité désirée. "
|
||||
"Ils utilisent ensuite un algorithme de rétroaction pour optimiser ce "
|
||||
"chemin trouvé. Cela fonctionne bien pour les applications qui veulent "
|
||||
"simplement savoir ce que les autres aux alentours ont à offrir. « Comment"
|
||||
" allez vous tous ? » par opposition à « Salut Alice, comment vas-tu ? ». "
|
||||
"Vous obtenez essentiellement une grappe locale de nœuds qui peuvent "
|
||||
"partager des fichiers et garder un certain niveau d’anonymat (quoique "
|
||||
"vous n’ayez pas beaucoup de contrôle sur qui est dans ce groupe de "
|
||||
"pairs)."
|
||||
"anonymity based on the threat model of providing plausible deniability against a simple \n"
|
||||
"non-colluding adversary. With the antnet routing, they first either do a random walk or a \n"
|
||||
"broadcast search to find some peer with the data or identity desired, and then use a feedback\n"
|
||||
"algorithm to optimize that found path. This works well for applications that merely want to know \n"
|
||||
"what other people around them have to offer - \"How are y'all doing\" vs. \"Hey Alice, how are you\" - \n"
|
||||
"you basically get a local cluster of nodes that can share files with and maintain some degree of \n"
|
||||
"anonymity (though you don't have much control over who is in that group of peers)."
|
||||
msgstr "Ces deux systèmes fonctionnent par le même routage <a href=\"%(antnet)s\">antnet</a> de base, fournissant un certain degré d’anonymat d’après un modèle de menace qui consiste à fournir un déni plausible contre un adversaire seul. Avec le routage d’antnet, soit ils appliquent d’abord un cheminement aléatoire, soit une recherche par diffusion pour trouver un pair ayant les données ou l’identité désirée. Ils utilisent ensuite un algorithme de rétroaction pour optimiser ce chemin trouvé. Cela fonctionne bien pour les applications qui veulent simplement savoir ce que les autres aux alentours ont à offrir. « Comment allez vous tous ? » par opposition à « Salut Alice, comment vas-tu ? ». Vous obtenez essentiellement une grappe locale de nœuds qui peuvent partager des fichiers et garder un certain niveau d’anonymat (quoique vous n’ayez pas beaucoup de contrôle sur qui est dans ce groupe de pairs)."
|
||||
|
||||
#: i2p2www/pages/site/comparison/other-networks.html:228
|
||||
msgid ""
|
||||
"However, the algorithm does not scale well at all - if the application "
|
||||
"wants to speak with a \n"
|
||||
"particular peer it ends up doing a broadcast search or random walk "
|
||||
"(though if they are lucky enough\n"
|
||||
"for that to succeed, the antnet routing should optimize that found "
|
||||
"connection). This means that \n"
|
||||
"while these networks can work great at small scales, they are not "
|
||||
"suitable for large networks where\n"
|
||||
"someone wants to get in touch with another specific peer. That does not "
|
||||
"mean that there is no \n"
|
||||
"value in these systems, just that their applicability is limited to "
|
||||
"situations where their \n"
|
||||
"However, the algorithm does not scale well at all - if the application wants to speak with a \n"
|
||||
"particular peer it ends up doing a broadcast search or random walk (though if they are lucky enough\n"
|
||||
"for that to succeed, the antnet routing should optimize that found connection). This means that \n"
|
||||
"while these networks can work great at small scales, they are not suitable for large networks where\n"
|
||||
"someone wants to get in touch with another specific peer. That does not mean that there is no \n"
|
||||
"value in these systems, just that their applicability is limited to situations where their \n"
|
||||
"particular issues can be addressed."
|
||||
msgstr ""
|
||||
"Cependant, l’algorithme d’adaptation en taille (scale) ne se fait pas du "
|
||||
"tout - si l’application veut parler avec un\n"
|
||||
"pair en particulier cela finit par faire une large recherche (broadcast) "
|
||||
"ou une promenade aléatoire (random walk) (quoique s’ils ont assez\n"
|
||||
"de chance pour que cela réussisse, le routage antnet devrait optimiser "
|
||||
"cette connexion trouvée). Cela signifie que\n"
|
||||
"tandis que ces réseaux peuvent très bien marcher à petite échelle, ils ne"
|
||||
" sont pas appropriés pour de grands réseaux où\n"
|
||||
"quelqu’un veut se mettre en contact avec un autre pair spécifique. Cela "
|
||||
"ne signifie pas qu’il n’y a pas\n"
|
||||
"de valeur dans ces systèmes, juste que leur applicabilité est limitée aux"
|
||||
" situations où leur\n"
|
||||
"problèmes (issues) particuliers peuvent être adressés."
|
||||
msgstr "Cependant, l’algorithme d’adaptation en taille (scale) ne se fait pas du tout - si l’application veut parler avec un\npair en particulier cela finit par faire une large recherche (broadcast) ou une promenade aléatoire (random walk) (quoique s’ils ont assez\nde chance pour que cela réussisse, le routage antnet devrait optimiser cette connexion trouvée). Cela signifie que\ntandis que ces réseaux peuvent très bien marcher à petite échelle, ils ne sont pas appropriés pour de grands réseaux où\nquelqu’un veut se mettre en contact avec un autre pair spécifique. Cela ne signifie pas qu’il n’y a pas\nde valeur dans ces systèmes, juste que leur applicabilité est limitée aux situations où leur\nproblèmes (issues) particuliers peuvent être adressés."
|
||||
|
||||
#: i2p2www/pages/site/comparison/other-networks.html:239
|
||||
#, python-format
|
||||
msgid ""
|
||||
"This was a closed-source network targeted at Iranian users.\n"
|
||||
"Tor did a <a href=\"%(torpost)s\">good writeup on what to look for in a "
|
||||
"circumvention tool</a>.\n"
|
||||
"Suffice it to say that being closed source and publicly targeting a "
|
||||
"specific country are not good ideas.\n"
|
||||
"Tor did a <a href=\"%(torpost)s\">good writeup on what to look for in a circumvention tool</a>.\n"
|
||||
"Suffice it to say that being closed source and publicly targeting a specific country are not good ideas.\n"
|
||||
"I2P is, of course, open source. However, that source, and our\n"
|
||||
"<a href=\"%(docs)s\">technical documentation</a>, need much more review."
|
||||
msgstr ""
|
||||
"C’était un réseau closed-source visant les utilisateurs iraniens.\n"
|
||||
"Tor a fait <a href=\"%(torpost)s\">une bonne réécriture de ce que l’on "
|
||||
"doit chercher dans un outil de mise en échec</a>.\n"
|
||||
"Suffit-il de dire que être closed-source et cibler publiquement un pays "
|
||||
"spécifique ne sont pas de bonnes idées.\n"
|
||||
"I2P est, bien sûr, open-source. Cependant, ce code source, et notre\n"
|
||||
"<a href=\"%(docs)s\">documentation technique</a>, nécessitent beaucoup "
|
||||
"plus d’examen."
|
||||
msgstr "C’était un réseau closed-source visant les utilisateurs iraniens.\nTor a fait <a href=\"%(torpost)s\">une bonne réécriture de ce que l’on doit chercher dans un outil de mise en échec</a>.\nSuffit-il de dire que être closed-source et cibler publiquement un pays spécifique ne sont pas de bonnes idées.\nI2P est, bien sûr, open-source. Cependant, ce code source, et notre\n<a href=\"%(docs)s\">documentation technique</a>, nécessitent beaucoup plus d’examen."
|
||||
|
||||
#: i2p2www/pages/site/comparison/other-networks.html:248
|
||||
msgid "Paid VPN Services"
|
||||
@ -450,18 +259,7 @@ msgid ""
|
||||
"network, as well as gather and report statistics, as \n"
|
||||
"opposed to I2P's distributed <a href=\"%(netdb)s\">network \n"
|
||||
"database</a> and <a href=\"%(peerselection)s\">peer selection</a>."
|
||||
msgstr ""
|
||||
"Tor et le routage en oignon sont tous deux des réseaux mandataires "
|
||||
"d’anonymisation, permettant aux gens de tunnelliser par leur réseau de "
|
||||
"mélange à latence faible. Les deux principales différences entre Tor, le "
|
||||
"routage en oignon et I2P sont, encore une fois, liées à des différences "
|
||||
"dans le modèle de menaces et la conception du mandataire sortant (bien "
|
||||
"que Tor prenne aussi en charge les services cachés). De plus, Tor\n"
|
||||
"utilise une approche basée sur un annuaire, fournissant un point "
|
||||
"centralisé de gestion de la « vue » d’ensemble du réseau, recueille et "
|
||||
"rapporte aussi des statistiques, contrairement à la <a "
|
||||
"href=\"%(netdb)s\">base de données de réseau</a> distribuée d’I2P et la "
|
||||
"<a href=\"%(peerselection)s\">sélection de pairs</a>."
|
||||
msgstr "Tor et le routage en oignon sont tous deux des réseaux mandataires d’anonymisation, permettant aux gens de tunnelliser par leur réseau de mélange à latence faible. Les deux principales différences entre Tor, le routage en oignon et I2P sont, encore une fois, liées à des différences dans le modèle de menaces et la conception du mandataire sortant (bien que Tor prenne aussi en charge les services cachés). De plus, Tor\nutilise une approche basée sur un annuaire, fournissant un point centralisé de gestion de la « vue » d’ensemble du réseau, recueille et rapporte aussi des statistiques, contrairement à la <a href=\"%(netdb)s\">base de données de réseau</a> distribuée d’I2P et la <a href=\"%(peerselection)s\">sélection de pairs</a>."
|
||||
|
||||
#: i2p2www/pages/site/comparison/tor.html:23
|
||||
msgid ""
|
||||
@ -474,15 +272,7 @@ msgid ""
|
||||
"outproxies are prone to abuse, along with all of the \n"
|
||||
"other security issues we've come to know and love with \n"
|
||||
"normal Internet traffic."
|
||||
msgstr ""
|
||||
"La fonction de mandataire sortant d’I2P/Tor présente quelques\n"
|
||||
"faiblesses importantes contre certains assaillants. Une fois que la "
|
||||
"communication quitte le réseau de mélange, les adversaires\n"
|
||||
"passifs de partout peuvent plus facilement mettre en place une analyse du"
|
||||
" trafic. De plus, les mandataires sortants ont accès aux données en clair"
|
||||
" transférées dans les deux sens, et les mandataires sortants sont sujets "
|
||||
"aux abus, en plus de tous les autres problèmes de sécurité inhérents au "
|
||||
"trafic normal d’Internet, que nous avons appris à connaître et à aimer."
|
||||
msgstr "La fonction de mandataire sortant d’I2P/Tor présente quelques\nfaiblesses importantes contre certains assaillants. Une fois que la communication quitte le réseau de mélange, les adversaires\npassifs de partout peuvent plus facilement mettre en place une analyse du trafic. De plus, les mandataires sortants ont accès aux données en clair transférées dans les deux sens, et les mandataires sortants sont sujets aux abus, en plus de tous les autres problèmes de sécurité inhérents au trafic normal d’Internet, que nous avons appris à connaître et à aimer."
|
||||
|
||||
#: i2p2www/pages/site/comparison/tor.html:35
|
||||
msgid ""
|
||||
@ -492,14 +282,7 @@ msgid ""
|
||||
"to build outproxy functionality on top of an anonymous\n"
|
||||
"communication layer, they can). In fact, some I2P users\n"
|
||||
"currently take advantage of Tor to outproxy."
|
||||
msgstr ""
|
||||
"Cependant, la plupart des gens ne doivent pas s’inquiéter de\n"
|
||||
"ces situations, car elles ne correspondent pas à leur modèle de menace. "
|
||||
"Et cela dépasse aussi le champ d’action fonctionnel (officiel) d’I2P (si "
|
||||
"des personnes veulent construire une fonction de mandataire sortant par-"
|
||||
"dessus une couche de communication anonyme, elles le peuvent). En fait, "
|
||||
"certains utilisateurs d’I2P utilisent actuellement Tor comme mandataire "
|
||||
"sortant."
|
||||
msgstr "Cependant, la plupart des gens ne doivent pas s’inquiéter de\nces situations, car elles ne correspondent pas à leur modèle de menace. Et cela dépasse aussi le champ d’action fonctionnel (officiel) d’I2P (si des personnes veulent construire une fonction de mandataire sortant par-dessus une couche de communication anonyme, elles le peuvent). En fait, certains utilisateurs d’I2P utilisent actuellement Tor comme mandataire sortant."
|
||||
|
||||
#: i2p2www/pages/site/comparison/tor.html:49
|
||||
msgid "Comparison of Tor and I2P Terminology"
|
||||
@ -509,9 +292,7 @@ msgstr "Comparaison de terminologie entre Tor et I2P"
|
||||
msgid ""
|
||||
"While Tor and I2P are similar in many ways, much of the terminology is "
|
||||
"different."
|
||||
msgstr ""
|
||||
"Alors que Tor et I2P sont similaires à bien des égards, une grande partie"
|
||||
" de la terminologie est différente."
|
||||
msgstr "Alors que Tor et I2P sont similaires à bien des égards, une grande partie de la terminologie est différente."
|
||||
|
||||
#: i2p2www/pages/site/comparison/tor.html:55
|
||||
msgid "Cell"
|
||||
@ -655,21 +436,14 @@ msgstr "Avantages de Tor sur I2P"
|
||||
|
||||
#: i2p2www/pages/site/comparison/tor.html:78
|
||||
msgid ""
|
||||
"Much bigger user base; much more visibility in the academic and hacker "
|
||||
"communities; benefits from\n"
|
||||
"Much bigger user base; much more visibility in the academic and hacker communities; benefits from\n"
|
||||
"formal studies of anonymity, resistance, and performance;\n"
|
||||
"has a non-anonymous, visible, university-based leader"
|
||||
msgstr ""
|
||||
"Plus grand nombre d’utilisateurs ; beaucoup plus de visibilité dans les "
|
||||
"communautés universitaires et hackers ; bénéficie\n"
|
||||
"d’études formelles d’anonymat, de résistance, et de performance ;\n"
|
||||
"a un chef de file universitaire non-anonyme, visible"
|
||||
msgstr "Plus grand nombre d’utilisateurs ; beaucoup plus de visibilité dans les communautés universitaires et hackers ; bénéficie\nd’études formelles d’anonymat, de résistance, et de performance ;\na un chef de file universitaire non-anonyme, visible"
|
||||
|
||||
#: i2p2www/pages/site/comparison/tor.html:84
|
||||
msgid "Has already solved some scaling issues I2P has yet to address"
|
||||
msgstr ""
|
||||
"A déjà résolu certains problèmes d’échelle que I2P n’a pas eu encore à "
|
||||
"aborder"
|
||||
msgstr "A déjà résolu certains problèmes d’échelle que I2P n’a pas eu encore à aborder"
|
||||
|
||||
#: i2p2www/pages/site/comparison/tor.html:85
|
||||
msgid "Has significant funding"
|
||||
@ -681,33 +455,24 @@ msgstr "À plus de développeurs, dont plusieurs sont financés"
|
||||
|
||||
#: i2p2www/pages/site/comparison/tor.html:88
|
||||
msgid ""
|
||||
"More resistant to state-level blocking due to TLS transport layer and "
|
||||
"bridges\n"
|
||||
"(I2P has proposals for \"full restricted routes\" but these are not yet "
|
||||
"implemented)"
|
||||
msgstr ""
|
||||
"Plus résistant au blocage au niveau d’un État en raison de la couche "
|
||||
"transport TLS et des ponts\n"
|
||||
"(I2P a des propositions pour des \"routes restreintes pleines\" mais "
|
||||
"celles-ci ne sont pas encore mises en œuvre)"
|
||||
"More resistant to state-level blocking due to TLS transport layer and bridges\n"
|
||||
"(I2P has proposals for \"full restricted routes\" but these are not yet implemented)"
|
||||
msgstr "Plus résistant au blocage au niveau d’un État en raison de la couche transport TLS et des ponts\n(I2P a des propositions pour des \"routes restreintes pleines\" mais celles-ci ne sont pas encore mises en œuvre)"
|
||||
|
||||
#: i2p2www/pages/site/comparison/tor.html:93
|
||||
msgid "Big enough that it has had to adapt to blocking and DOS attempts"
|
||||
msgstr "Assez grand pour avoir dû s’adapter aux tentatives de blocage et de DOS"
|
||||
|
||||
#: i2p2www/pages/site/comparison/tor.html:94
|
||||
msgid "Designed and optimized for exit traffic, with a large number of exit nodes"
|
||||
msgstr ""
|
||||
"Conçu et optimisé pour le trafic sortant, avec un grand nombre de nœuds "
|
||||
"de sortie"
|
||||
msgid ""
|
||||
"Designed and optimized for exit traffic, with a large number of exit nodes"
|
||||
msgstr "Conçu et optimisé pour le trafic sortant, avec un grand nombre de nœuds de sortie"
|
||||
|
||||
#: i2p2www/pages/site/comparison/tor.html:96
|
||||
msgid ""
|
||||
"Better documentation, has formal papers and specifications,\n"
|
||||
"better website, many more translations"
|
||||
msgstr ""
|
||||
"Une meilleure documentation avec des articles et des spécifications "
|
||||
"formelles, un meilleur site Web, beaucoup plus de traductions"
|
||||
msgstr "Une meilleure documentation avec des articles et des spécifications formelles, un meilleur site Web, beaucoup plus de traductions"
|
||||
|
||||
#: i2p2www/pages/site/comparison/tor.html:101
|
||||
msgid "More efficient with memory usage"
|
||||
@ -721,17 +486,13 @@ msgstr "Les nœuds client de Tor ont une très faible surcharge de la bande pass
|
||||
msgid ""
|
||||
"Centralized control reduces the complexity at each\n"
|
||||
"node and can efficiently address Sybil attacks"
|
||||
msgstr ""
|
||||
"Le contrôle centralisé réduit la complexité à chaque\n"
|
||||
"nœud et peut répondre efficacement à des attaques Sybil"
|
||||
msgstr "Le contrôle centralisé réduit la complexité à chaque\nnœud et peut répondre efficacement à des attaques Sybil"
|
||||
|
||||
#: i2p2www/pages/site/comparison/tor.html:110
|
||||
msgid ""
|
||||
"A core of high capacity nodes provides higher\n"
|
||||
"throughput and lower latency"
|
||||
msgstr ""
|
||||
"Un coeur de nœuds à grande capacité a la possibilité de fournir un\n"
|
||||
"plus haut débit tout en gardant une faible latence"
|
||||
msgstr "Un coeur de nœuds à grande capacité a la possibilité de fournir un\nplus haut débit tout en gardant une faible latence"
|
||||
|
||||
#: i2p2www/pages/site/comparison/tor.html:115
|
||||
msgid "C, not Java (ewww)"
|
||||
@ -743,11 +504,9 @@ msgstr "Avantages d’I2P sur Tor"
|
||||
|
||||
#: i2p2www/pages/site/comparison/tor.html:120
|
||||
msgid ""
|
||||
"Designed and optimized for hidden services, which are much faster than in"
|
||||
" Tor"
|
||||
msgstr ""
|
||||
"Conçu et optimisé pour les services cachés, qui sont beaucoup plus rapide"
|
||||
" que dans Tor"
|
||||
"Designed and optimized for hidden services, which are much faster than in "
|
||||
"Tor"
|
||||
msgstr "Conçu et optimisé pour les services cachés, qui sont beaucoup plus rapide que dans Tor"
|
||||
|
||||
#: i2p2www/pages/site/comparison/tor.html:121
|
||||
msgid "Fully distributed and self organizing"
|
||||
@ -757,25 +516,17 @@ msgstr "Entièrement distribué et auto-organisé"
|
||||
msgid ""
|
||||
"Peers are selected by continuously profiling and ranking performance,\n"
|
||||
"rather than trusting claimed capacity"
|
||||
msgstr ""
|
||||
"Les pairs sont choisis par profilage continu et par classement de leurs "
|
||||
"performances,\n"
|
||||
"plutôt que de se contenter de faire confiance à la capacité qu’ils "
|
||||
"revendiquent"
|
||||
msgstr "Les pairs sont choisis par profilage continu et par classement de leurs performances,\nplutôt que de se contenter de faire confiance à la capacité qu’ils revendiquent"
|
||||
|
||||
#: i2p2www/pages/site/comparison/tor.html:129
|
||||
msgid ""
|
||||
"Floodfill peers (\"directory servers\") are varying and untrusted,\n"
|
||||
"rather than hardcoded"
|
||||
msgstr ""
|
||||
"Les pairs de remplissage par diffusion (serveurs annuaires) varient et ne"
|
||||
" sont pas fiables, plutôt que figés dans le code"
|
||||
msgstr "Les pairs de remplissage par diffusion (serveurs annuaires) varient et ne sont pas fiables, plutôt que figés dans le code"
|
||||
|
||||
#: i2p2www/pages/site/comparison/tor.html:134
|
||||
msgid "Small enough that it hasn't been blocked or DOSed much, or at all"
|
||||
msgstr ""
|
||||
"Tellement petit qu’il n’a pas été bloqué ni subi beaucoup de DOS, ou pas "
|
||||
"du tout"
|
||||
msgstr "Tellement petit qu’il n’a pas été bloqué ni subi beaucoup de DOS, ou pas du tout"
|
||||
|
||||
#: i2p2www/pages/site/comparison/tor.html:135
|
||||
msgid "Peer-to-peer friendly"
|
||||
@ -789,17 +540,13 @@ msgstr "Commutation de paquets à la place de commutation de circuit"
|
||||
msgid ""
|
||||
"implicit transparent load balancing of messages \n"
|
||||
"across multiple peers, rather than a single path"
|
||||
msgstr ""
|
||||
"équilibrage de charge transparent et implicite des messages\n"
|
||||
"à travers plusieurs pairs, plutôt que par un seul chemin"
|
||||
msgstr "équilibrage de charge transparent et implicite des messages\nà travers plusieurs pairs, plutôt que par un seul chemin"
|
||||
|
||||
#: i2p2www/pages/site/comparison/tor.html:145
|
||||
msgid ""
|
||||
"resilience vs. failures by running multiple \n"
|
||||
"tunnels in parallel, plus rotating tunnels"
|
||||
msgstr ""
|
||||
"résistance contre les défaillances, ceci par exécution de plusieurs\n"
|
||||
"tunnels en parallèle, ainsi que par rotation des tunnels"
|
||||
msgstr "résistance contre les défaillances, ceci par exécution de plusieurs\ntunnels en parallèle, ainsi que par rotation des tunnels"
|
||||
|
||||
#: i2p2www/pages/site/comparison/tor.html:151
|
||||
msgid ""
|
||||
@ -807,21 +554,14 @@ msgid ""
|
||||
"of O(N) (Alice has e.g. 2 inbound tunnels that are \n"
|
||||
"used by all of the peers Alice is talking with, \n"
|
||||
"rather than a circuit for each)"
|
||||
msgstr ""
|
||||
"s’adapte à l’échelle des connexions de chaque client à O(1) au lieu\n"
|
||||
"de O(N) (Alice a par exemple 2 tunnels entrants qui sont\n"
|
||||
"utilisés par tous les pairs avec lesquels parle Alice,\n"
|
||||
"plutôt qu’un circuit pour chaque)"
|
||||
msgstr "s’adapte à l’échelle des connexions de chaque client à O(1) au lieu\nde O(N) (Alice a par exemple 2 tunnels entrants qui sont\nutilisés par tous les pairs avec lesquels parle Alice,\nplutôt qu’un circuit pour chaque)"
|
||||
|
||||
#: i2p2www/pages/site/comparison/tor.html:161
|
||||
msgid ""
|
||||
"Unidirectional tunnels instead of bidirectional\n"
|
||||
"circuits, doubling the number of nodes a peer has to\n"
|
||||
"compromise to get the same information."
|
||||
msgstr ""
|
||||
"Tunnels unidirectionnels au lieu de circuits\n"
|
||||
"bidirectionnel, doublant le nombre de nœuds qu’un\n"
|
||||
"pair doit avoir à compromettre pour obtenir la même information."
|
||||
msgstr "Tunnels unidirectionnels au lieu de circuits\nbidirectionnel, doublant le nombre de nœuds qu’un\npair doit avoir à compromettre pour obtenir la même information."
|
||||
|
||||
#: i2p2www/pages/site/comparison/tor.html:166
|
||||
#, python-format
|
||||
@ -835,11 +575,7 @@ msgid ""
|
||||
"tunnels are used for more than simply passing end \n"
|
||||
"to end messages (e.g. netDb, tunnel management, \n"
|
||||
"tunnel testing)"
|
||||
msgstr ""
|
||||
"Protection contre la détection de l’activité du client, même si un "
|
||||
"assaillant participe au tunnel, puisque les tunnels ne sont pas juste "
|
||||
"utilisés pour passer simplement des messages de bout en bout (p. ex. "
|
||||
"BDréseau, gestion de tunnels, test de tunnels)"
|
||||
msgstr "Protection contre la détection de l’activité du client, même si un assaillant participe au tunnel, puisque les tunnels ne sont pas juste utilisés pour passer simplement des messages de bout en bout (p. ex. BDréseau, gestion de tunnels, test de tunnels)"
|
||||
|
||||
#: i2p2www/pages/site/comparison/tor.html:180
|
||||
msgid ""
|
||||
@ -847,19 +583,13 @@ msgid ""
|
||||
"of samples that an attacker can use to mount an \n"
|
||||
"active attack with, unlike circuits in Tor, which are\n"
|
||||
"typically long lived."
|
||||
msgstr ""
|
||||
"Dans I2P, les tunnels ont une durée de vie courte, diminuant ainsi le "
|
||||
"nombre d’échantillons qu’un assaillant peut utiliser pour lancer une\n"
|
||||
"attaque active, contrairement aux circuits dans Tor, qui ont généralement"
|
||||
" une durée de vie longue."
|
||||
msgstr "Dans I2P, les tunnels ont une durée de vie courte, diminuant ainsi le nombre d’échantillons qu’un assaillant peut utiliser pour lancer une\nattaque active, contrairement aux circuits dans Tor, qui ont généralement une durée de vie longue."
|
||||
|
||||
#: i2p2www/pages/site/comparison/tor.html:188
|
||||
msgid ""
|
||||
"I2P APIs are designed specifically for anonymity and\n"
|
||||
"security, while SOCKS is designed for functionality."
|
||||
msgstr ""
|
||||
"Les API d’I2P sont conçues précisément pour assurer anonymat et sécurité,"
|
||||
" tandis que SOCKS est conçu pour la fonctionnalité."
|
||||
msgstr "Les API d’I2P sont conçues précisément pour assurer anonymat et sécurité, tandis que SOCKS est conçu pour la fonctionnalité."
|
||||
|
||||
#: i2p2www/pages/site/comparison/tor.html:193
|
||||
msgid "Essentially all peers participate in routing for others"
|
||||
@ -870,11 +600,7 @@ msgid ""
|
||||
"The bandwidth overhead of being a full peer is low, \n"
|
||||
"while in Tor, while client nodes don't require much\n"
|
||||
"bandwidth, they don't fully participate in the mixnet."
|
||||
msgstr ""
|
||||
"Être un pair à part entière ne présente qu’une faible surcharge de bande "
|
||||
"passante, alors que dans Tor, bien que les nœuds client n’exigent que peu"
|
||||
" de bande passante, ils ne participent pas complètement au réseau de "
|
||||
"mélange."
|
||||
msgstr "Être un pair à part entière ne présente qu’une faible surcharge de bande passante, alors que dans Tor, bien que les nœuds client n’exigent que peu de bande passante, ils ne participent pas complètement au réseau de mélange."
|
||||
|
||||
#: i2p2www/pages/site/comparison/tor.html:201
|
||||
msgid "Integrated automatic update mechanism"
|
||||
@ -894,27 +620,20 @@ msgstr "Autres avantages potentiels d’I2P, mais pas encore mis en œuvre"
|
||||
|
||||
#: i2p2www/pages/site/comparison/tor.html:207
|
||||
msgid "...and may never be implemented, so don't count on them!"
|
||||
msgstr ""
|
||||
"… et qui pourraient ne jamais être mis en œuvre, alors ne comptez pas sur"
|
||||
" eux !"
|
||||
msgstr "… et qui pourraient ne jamais être mis en œuvre, alors ne comptez pas sur eux !"
|
||||
|
||||
#: i2p2www/pages/site/comparison/tor.html:210
|
||||
msgid ""
|
||||
"Defense vs. message count analysis by garlic wrapping \n"
|
||||
"multiple messages"
|
||||
msgstr ""
|
||||
"Défense contre l’analyse du nombre de messages par enveloppement en ail\n"
|
||||
"de plusieurs messages"
|
||||
msgstr "Défense contre l’analyse du nombre de messages par enveloppement en ail\nde plusieurs messages"
|
||||
|
||||
#: i2p2www/pages/site/comparison/tor.html:216
|
||||
msgid ""
|
||||
"Defense vs. long term intersection by adding delays \n"
|
||||
"at various hops (where the delays are not discernible\n"
|
||||
"by other hops)"
|
||||
msgstr ""
|
||||
"Défense contre intersection long terme en ajoutant des retards\n"
|
||||
"à différents sauts (où les retards ne sont pas discernables\n"
|
||||
"par d’autres sauts)"
|
||||
msgstr "Défense contre intersection long terme en ajoutant des retards\nà différents sauts (où les retards ne sont pas discernables\npar d’autres sauts)"
|
||||
|
||||
#: i2p2www/pages/site/comparison/tor.html:223
|
||||
msgid ""
|
||||
@ -922,9 +641,4 @@ msgid ""
|
||||
"create a tunnel that will handle 500 messages / minute,\n"
|
||||
"where the endpoint will inject dummy messages if there\n"
|
||||
"are insufficient messages, etc)"
|
||||
msgstr ""
|
||||
"Diverses stratégies de mélange au niveau du tunnel (par exemple\n"
|
||||
"créer un tunnel qui va gérer 500 messages / minute,\n"
|
||||
"dans lequel le point final va injecter des messages factices si\n"
|
||||
"il y a une nombre de messages insuffisant, etc)"
|
||||
|
||||
msgstr "Diverses stratégies de mélange au niveau du tunnel (par exemple\ncréer un tunnel qui va gérer 500 messages / minute,\ndans lequel le point final va injecter des messages factices si\nil y a une nombre de messages insuffisant, etc)"
|
||||
|
Some files were not shown because too many files have changed in this diff Show More
Reference in New Issue
Block a user