[tor-commits] [translation/tor_outreach_md] pulling translations from transifex
translation at torproject.org
translation at torproject.org
Sat Mar 16 07:49:07 UTC 2019
commit c2cc755d1adf468957a40a86197c1bc121ee6739
Author: Translation commit bot <translation at torproject.org>
Date: Sat Mar 16 07:49:04 2019 +0000
pulling translations from transifex
---
ach.po | 162 +++++++++++++++++++++++++++++++++++++++++++++++
af.po | 162 +++++++++++++++++++++++++++++++++++++++++++++++
am.po | 162 +++++++++++++++++++++++++++++++++++++++++++++++
ar.po | 162 +++++++++++++++++++++++++++++++++++++++++++++++
ast.po | 162 +++++++++++++++++++++++++++++++++++++++++++++++
az.po | 162 +++++++++++++++++++++++++++++++++++++++++++++++
ba.po | 162 +++++++++++++++++++++++++++++++++++++++++++++++
be.po | 162 +++++++++++++++++++++++++++++++++++++++++++++++
bg.po | 162 +++++++++++++++++++++++++++++++++++++++++++++++
bn.po | 162 +++++++++++++++++++++++++++++++++++++++++++++++
bo.po | 162 +++++++++++++++++++++++++++++++++++++++++++++++
br.po | 162 +++++++++++++++++++++++++++++++++++++++++++++++
bs.po | 162 +++++++++++++++++++++++++++++++++++++++++++++++
ca.po | 162 +++++++++++++++++++++++++++++++++++++++++++++++
ceb.po | 162 +++++++++++++++++++++++++++++++++++++++++++++++
cs.po | 162 +++++++++++++++++++++++++++++++++++++++++++++++
cy.po | 162 +++++++++++++++++++++++++++++++++++++++++++++++
da.po | 162 +++++++++++++++++++++++++++++++++++++++++++++++
de.po | 162 +++++++++++++++++++++++++++++++++++++++++++++++
dz.po | 162 +++++++++++++++++++++++++++++++++++++++++++++++
el.po | 162 +++++++++++++++++++++++++++++++++++++++++++++++
en_GB.po | 162 +++++++++++++++++++++++++++++++++++++++++++++++
eo.po | 162 +++++++++++++++++++++++++++++++++++++++++++++++
es.po | 162 +++++++++++++++++++++++++++++++++++++++++++++++
es_AR.po | 162 +++++++++++++++++++++++++++++++++++++++++++++++
es_CL.po | 162 +++++++++++++++++++++++++++++++++++++++++++++++
es_CO.po | 162 +++++++++++++++++++++++++++++++++++++++++++++++
es_ES.po | 162 +++++++++++++++++++++++++++++++++++++++++++++++
es_MX.po | 162 +++++++++++++++++++++++++++++++++++++++++++++++
et.po | 162 +++++++++++++++++++++++++++++++++++++++++++++++
eu.po | 162 +++++++++++++++++++++++++++++++++++++++++++++++
fa.po | 162 +++++++++++++++++++++++++++++++++++++++++++++++
fa_AF.po | 162 +++++++++++++++++++++++++++++++++++++++++++++++
fi.po | 162 +++++++++++++++++++++++++++++++++++++++++++++++
fil.po | 162 +++++++++++++++++++++++++++++++++++++++++++++++
fo.po | 162 +++++++++++++++++++++++++++++++++++++++++++++++
fr.po | 162 +++++++++++++++++++++++++++++++++++++++++++++++
fy.po | 162 +++++++++++++++++++++++++++++++++++++++++++++++
ga.po | 162 +++++++++++++++++++++++++++++++++++++++++++++++
gd.po | 162 +++++++++++++++++++++++++++++++++++++++++++++++
gl.po | 162 +++++++++++++++++++++++++++++++++++++++++++++++
gu.po | 162 +++++++++++++++++++++++++++++++++++++++++++++++
he.po | 162 +++++++++++++++++++++++++++++++++++++++++++++++
hi.po | 162 +++++++++++++++++++++++++++++++++++++++++++++++
hr.po | 162 +++++++++++++++++++++++++++++++++++++++++++++++
hu.po | 162 +++++++++++++++++++++++++++++++++++++++++++++++
hy.po | 162 +++++++++++++++++++++++++++++++++++++++++++++++
id.po | 162 +++++++++++++++++++++++++++++++++++++++++++++++
is.po | 161 ++++++++++++++++++++++++++++++++++++++++++++++
it.po | 162 +++++++++++++++++++++++++++++++++++++++++++++++
ja.po | 162 +++++++++++++++++++++++++++++++++++++++++++++++
jv.po | 162 +++++++++++++++++++++++++++++++++++++++++++++++
ka.po | 162 +++++++++++++++++++++++++++++++++++++++++++++++
kk.po | 162 +++++++++++++++++++++++++++++++++++++++++++++++
km.po | 162 +++++++++++++++++++++++++++++++++++++++++++++++
kn.po | 162 +++++++++++++++++++++++++++++++++++++++++++++++
ko.po | 162 +++++++++++++++++++++++++++++++++++++++++++++++
ku_IQ.po | 162 +++++++++++++++++++++++++++++++++++++++++++++++
ky.po | 162 +++++++++++++++++++++++++++++++++++++++++++++++
la.po | 162 +++++++++++++++++++++++++++++++++++++++++++++++
lb.po | 162 +++++++++++++++++++++++++++++++++++++++++++++++
lo.po | 162 +++++++++++++++++++++++++++++++++++++++++++++++
lt.po | 162 +++++++++++++++++++++++++++++++++++++++++++++++
lv.po | 162 +++++++++++++++++++++++++++++++++++++++++++++++
mk.po | 162 +++++++++++++++++++++++++++++++++++++++++++++++
ml.po | 162 +++++++++++++++++++++++++++++++++++++++++++++++
mn.po | 162 +++++++++++++++++++++++++++++++++++++++++++++++
mr.po | 162 +++++++++++++++++++++++++++++++++++++++++++++++
ms_MY.po | 162 +++++++++++++++++++++++++++++++++++++++++++++++
mt.po | 162 +++++++++++++++++++++++++++++++++++++++++++++++
my.po | 162 +++++++++++++++++++++++++++++++++++++++++++++++
nb.po | 162 +++++++++++++++++++++++++++++++++++++++++++++++
nds.po | 162 +++++++++++++++++++++++++++++++++++++++++++++++
ne.po | 162 +++++++++++++++++++++++++++++++++++++++++++++++
nl.po | 162 +++++++++++++++++++++++++++++++++++++++++++++++
nn.po | 162 +++++++++++++++++++++++++++++++++++++++++++++++
oc.po | 162 +++++++++++++++++++++++++++++++++++++++++++++++
or.po | 162 +++++++++++++++++++++++++++++++++++++++++++++++
pa.po | 162 +++++++++++++++++++++++++++++++++++++++++++++++
pl.po | 162 +++++++++++++++++++++++++++++++++++++++++++++++
pms.po | 162 +++++++++++++++++++++++++++++++++++++++++++++++
ps.po | 162 +++++++++++++++++++++++++++++++++++++++++++++++
pt_BR.po | 162 +++++++++++++++++++++++++++++++++++++++++++++++
pt_PT.po | 162 +++++++++++++++++++++++++++++++++++++++++++++++
ro.po | 162 +++++++++++++++++++++++++++++++++++++++++++++++
ru.po | 162 +++++++++++++++++++++++++++++++++++++++++++++++
sco.po | 162 +++++++++++++++++++++++++++++++++++++++++++++++
si.po | 162 +++++++++++++++++++++++++++++++++++++++++++++++
sk.po | 162 +++++++++++++++++++++++++++++++++++++++++++++++
sl.po | 162 +++++++++++++++++++++++++++++++++++++++++++++++
sn.po | 162 +++++++++++++++++++++++++++++++++++++++++++++++
so.po | 162 +++++++++++++++++++++++++++++++++++++++++++++++
sq.po | 162 +++++++++++++++++++++++++++++++++++++++++++++++
sr.po | 162 +++++++++++++++++++++++++++++++++++++++++++++++
sv.po | 162 +++++++++++++++++++++++++++++++++++++++++++++++
sw.po | 162 +++++++++++++++++++++++++++++++++++++++++++++++
szl.po | 162 +++++++++++++++++++++++++++++++++++++++++++++++
ta.po | 162 +++++++++++++++++++++++++++++++++++++++++++++++
te.po | 162 +++++++++++++++++++++++++++++++++++++++++++++++
tg.po | 162 +++++++++++++++++++++++++++++++++++++++++++++++
th.po | 162 +++++++++++++++++++++++++++++++++++++++++++++++
tk.po | 162 +++++++++++++++++++++++++++++++++++++++++++++++
tl_PH.po | 162 +++++++++++++++++++++++++++++++++++++++++++++++
tor-outreach2019-2020.md | 162 +++++++++++++++++++++++++++++++++++++++++++++++
tr.po | 162 +++++++++++++++++++++++++++++++++++++++++++++++
ug at Arab.po | 162 +++++++++++++++++++++++++++++++++++++++++++++++
uk.po | 162 +++++++++++++++++++++++++++++++++++++++++++++++
ur.po | 162 +++++++++++++++++++++++++++++++++++++++++++++++
uz.po | 162 +++++++++++++++++++++++++++++++++++++++++++++++
vi.po | 162 +++++++++++++++++++++++++++++++++++++++++++++++
vls.po | 162 +++++++++++++++++++++++++++++++++++++++++++++++
yo.po | 162 +++++++++++++++++++++++++++++++++++++++++++++++
zh_CN.po | 162 +++++++++++++++++++++++++++++++++++++++++++++++
zh_TW.po | 162 +++++++++++++++++++++++++++++++++++++++++++++++
114 files changed, 18467 insertions(+)
diff --git a/ach.po b/ach.po
new file mode 100644
index 000000000..6c8fce0dc
--- /dev/null
+++ b/ach.po
@@ -0,0 +1,162 @@
+# Tor Outreach Material 2019-2020
+
+# 1. TOR FOR PRIVACY
+
+### Privacy is a human right
+
+Like many of us, Aleisha spends most of her time online--connecting with friends, posting on social media, and browsing the web.
+
+But lately, she's noticed that advertisements related to her previous searches are following her around online.
+
+This feels so invasive that she does some research on online ads and learns that it's not just advertisers tracking her but also her ISP, analytics companies, social media platforms, and more.
+
+Aleisha decides she wants to find and use software that doesn't collect her data, doesn't track her, and doesn't tell other services anything private about her.
+
+She goes to a privacy training at a local hackerspace and learns about **Tor Browser**, the only web browser that allows her to browse anonymously.
+
+---
+
+# 2.TOR FOR FEMINISTS
+
+### The future is cyberfeminist
+
+Fernanda runs a women's collective focused on reproductive rights in Brazil, where abortion is illegal.
+
+Fernanda and her colleagues built a website with information about abortion access, birth control, and other resources for people seeking reproductive information.
+
+If this website was linked back to them, they could be arrested--or worse.
+
+To protect themselves, Fernanda and her colleagues created the website using Tor **onion services**. Onion services not only protect them from being discovered as the operators of the server but also help protect visitors to their website by requiring they use Tor Browser.
+
+In fact, Fernanda uses **Tor Browser** for all of her web browsing just to be on the safe side.
+
+She also uses a Tor-powered app called **OnionShare** to send files to other activists securely and privately.
+
+### Reproductive rights activists like Fernanda are fighting for fundamental freedoms, and Tor helps power their resistance.
+
+---
+
+# 3. TOR FOR HUMAN RIGHTS
+
+### Water is life
+
+Jelani lives in a small village which a wide river runs through.
+
+This river has provided water to his community since the days of his ancestors.
+
+But today, Jelani’s river is threatened by powerful multinational companies drilling for oil in the region.
+
+Private security firms, paid for by these companies, use powerful surveillance mechanisms to monitor the online activities of Jelani and his neighbors in the village who are organizing to protect their sacred river.
+
+Jelani uses **Tor Browser** to prevent these companies from watching as he visits websites for international human rights protection and legal aid and writes blog posts about the resistance movement in his village.
+
+He also uses **OnionShare** and **SecureDrop** to securely send documents to journalists who are helping expose these human rights violations.
+
+All of this software uses Tor to help protect Jelani’s privacy.
+
+### Human rights activists like Jelani are fighting for justice in their communities, and Tor helps power their resistance.
+
+---
+
+# 4. TOR FOR ANTI-CENSORSHIP
+
+### Build bridges not walls
+
+Jean was traveling for the first time to a country far from his family.
+
+After arriving at a hotel, he opened his laptop.
+
+He was so exhausted that when the message "Connection has timed out" first appeared on his web browser, he thought it was due to his own error.
+
+But after trying again and again, he realized that his email provider, a news website, and many apps were unavailable.
+
+He had heard that this country censors the internet and wondered if that was happening.
+How could he contact his family from behind this impenetrable wall?
+After doing some web searches, he found a forum and read about VPNs, private services that allow you to connect to another uncensored network.
+
+Jean spent half an hour trying to figure out which cheap VPN was best.
+
+He chose one and for a moment it seemed to work, but after five minutes the connection went offline and the VPN would no longer connect.
+
+Jean kept reading to find other options and learned about Tor Browser and how it can circumvent censorship.
+
+He found an official website mirror to download the program.
+
+When he opened **Tor Browser**, he followed the prompts for censored users and connected to a bridge which allowed him to access the internet again.
+
+With Tor Browser, Jean can browse freely and privately and contact his family.
+
+### Censored users all over the world rely on Tor Browser for a free, stable, and uncensored way to access the internet.
+
+---
+
+# 5. Shared Sections
+
+## What is Tor?
+
+Tor is free software and an open network that helps protect you from tracking, surveillance, and censorship online.
+Tor is created for free by a 501(c)3 U.S.-based nonprofit called the Tor Project.
+
+The easiest way to use Tor is Tor Browser.
+When you use Tor Browser, no one can see what websites you visit or where in the world you’re coming from.
+
+Other applications, like SecureDrop and OnionShare, use Tor to protect their users against surveillance and censorship.
+
+
+## 6. How does Tor work?
+
+Amal wants to visit Bekele’s website privately, so she opens Tor Browser.
+
+Tor Browser selects a random circuit of three relays, which are computers all over the world configured to route traffic over the Tor network.
+
+Tor Browser then encrypts her website request three times and sends it to the first Tor relay in her circuit.
+
+The first relay removes the first encryption layer but doesn't learn that the destination is Bekele’s website.
+
+The first relay learns only the next location in the circuit, which is the second relay.
+
+The second relay removes another encryption layer and forwards the web page request to the third relay.
+
+The third relay removes the last encryption layer and forwards the web page request to its destination, Bekele’s website, but it doesn't know the request comes from Amal.
+
+Bekele doesn't know that the website request came from Amal unless she tells him so.
+
+## 7. Who uses Tor?
+
+People all over the world use Tor to protect their privacy and access the web freely.
+
+Tor helps protect journalists, human rights defenders, domestic violence victims, academic researchers, and anyone experiencing tracking, censorship, or surveillance.
+
+## 6. Why trust Tor?
+
+Tor is designed for privacy. We don’t know who our users are, and we don't keep logs of user activity.
+
+Tor relay operators cannot reveal the true identity of Tor users.
+
+Continual peer review of Tor's source code by academic and open source communities ensures that there are no backdoors in Tor, and our social contract promises that we will never backdoor Tor.
+
+## 7. Join the Tor community
+
+Tor is made possible by a diverse set of users, developers, relay operators, and advocates from around the world.
+
+We need your help to make Tor more usable and secure for people everywhere.
+
+You can volunteer with Tor by writing code, running a relay, creating documentation, offering user support, or telling people in your community about Tor.
+
+The Tor community is governed by a code of conduct, and we outline our set of promises to the community in our social contract.
+
+Learn more about Tor by visiting our website, our wiki, finding us on IRC, joining one of our mailing lists, or signing up for Tor News at newsletter.torproject.org.
+
+
+## 8. Download Tor
+
+Tor for Desktop
+torproject.org/download
+
+TOR ON MOBILE
+### Android
+Tor Browser for Android is available from GooglePlay.
+
+### iOS
+Onion Browser, developed by M. Tigas, is the only browser we recommend for iOS.
+
diff --git a/af.po b/af.po
new file mode 100644
index 000000000..6c8fce0dc
--- /dev/null
+++ b/af.po
@@ -0,0 +1,162 @@
+# Tor Outreach Material 2019-2020
+
+# 1. TOR FOR PRIVACY
+
+### Privacy is a human right
+
+Like many of us, Aleisha spends most of her time online--connecting with friends, posting on social media, and browsing the web.
+
+But lately, she's noticed that advertisements related to her previous searches are following her around online.
+
+This feels so invasive that she does some research on online ads and learns that it's not just advertisers tracking her but also her ISP, analytics companies, social media platforms, and more.
+
+Aleisha decides she wants to find and use software that doesn't collect her data, doesn't track her, and doesn't tell other services anything private about her.
+
+She goes to a privacy training at a local hackerspace and learns about **Tor Browser**, the only web browser that allows her to browse anonymously.
+
+---
+
+# 2.TOR FOR FEMINISTS
+
+### The future is cyberfeminist
+
+Fernanda runs a women's collective focused on reproductive rights in Brazil, where abortion is illegal.
+
+Fernanda and her colleagues built a website with information about abortion access, birth control, and other resources for people seeking reproductive information.
+
+If this website was linked back to them, they could be arrested--or worse.
+
+To protect themselves, Fernanda and her colleagues created the website using Tor **onion services**. Onion services not only protect them from being discovered as the operators of the server but also help protect visitors to their website by requiring they use Tor Browser.
+
+In fact, Fernanda uses **Tor Browser** for all of her web browsing just to be on the safe side.
+
+She also uses a Tor-powered app called **OnionShare** to send files to other activists securely and privately.
+
+### Reproductive rights activists like Fernanda are fighting for fundamental freedoms, and Tor helps power their resistance.
+
+---
+
+# 3. TOR FOR HUMAN RIGHTS
+
+### Water is life
+
+Jelani lives in a small village which a wide river runs through.
+
+This river has provided water to his community since the days of his ancestors.
+
+But today, Jelani’s river is threatened by powerful multinational companies drilling for oil in the region.
+
+Private security firms, paid for by these companies, use powerful surveillance mechanisms to monitor the online activities of Jelani and his neighbors in the village who are organizing to protect their sacred river.
+
+Jelani uses **Tor Browser** to prevent these companies from watching as he visits websites for international human rights protection and legal aid and writes blog posts about the resistance movement in his village.
+
+He also uses **OnionShare** and **SecureDrop** to securely send documents to journalists who are helping expose these human rights violations.
+
+All of this software uses Tor to help protect Jelani’s privacy.
+
+### Human rights activists like Jelani are fighting for justice in their communities, and Tor helps power their resistance.
+
+---
+
+# 4. TOR FOR ANTI-CENSORSHIP
+
+### Build bridges not walls
+
+Jean was traveling for the first time to a country far from his family.
+
+After arriving at a hotel, he opened his laptop.
+
+He was so exhausted that when the message "Connection has timed out" first appeared on his web browser, he thought it was due to his own error.
+
+But after trying again and again, he realized that his email provider, a news website, and many apps were unavailable.
+
+He had heard that this country censors the internet and wondered if that was happening.
+How could he contact his family from behind this impenetrable wall?
+After doing some web searches, he found a forum and read about VPNs, private services that allow you to connect to another uncensored network.
+
+Jean spent half an hour trying to figure out which cheap VPN was best.
+
+He chose one and for a moment it seemed to work, but after five minutes the connection went offline and the VPN would no longer connect.
+
+Jean kept reading to find other options and learned about Tor Browser and how it can circumvent censorship.
+
+He found an official website mirror to download the program.
+
+When he opened **Tor Browser**, he followed the prompts for censored users and connected to a bridge which allowed him to access the internet again.
+
+With Tor Browser, Jean can browse freely and privately and contact his family.
+
+### Censored users all over the world rely on Tor Browser for a free, stable, and uncensored way to access the internet.
+
+---
+
+# 5. Shared Sections
+
+## What is Tor?
+
+Tor is free software and an open network that helps protect you from tracking, surveillance, and censorship online.
+Tor is created for free by a 501(c)3 U.S.-based nonprofit called the Tor Project.
+
+The easiest way to use Tor is Tor Browser.
+When you use Tor Browser, no one can see what websites you visit or where in the world you’re coming from.
+
+Other applications, like SecureDrop and OnionShare, use Tor to protect their users against surveillance and censorship.
+
+
+## 6. How does Tor work?
+
+Amal wants to visit Bekele’s website privately, so she opens Tor Browser.
+
+Tor Browser selects a random circuit of three relays, which are computers all over the world configured to route traffic over the Tor network.
+
+Tor Browser then encrypts her website request three times and sends it to the first Tor relay in her circuit.
+
+The first relay removes the first encryption layer but doesn't learn that the destination is Bekele’s website.
+
+The first relay learns only the next location in the circuit, which is the second relay.
+
+The second relay removes another encryption layer and forwards the web page request to the third relay.
+
+The third relay removes the last encryption layer and forwards the web page request to its destination, Bekele’s website, but it doesn't know the request comes from Amal.
+
+Bekele doesn't know that the website request came from Amal unless she tells him so.
+
+## 7. Who uses Tor?
+
+People all over the world use Tor to protect their privacy and access the web freely.
+
+Tor helps protect journalists, human rights defenders, domestic violence victims, academic researchers, and anyone experiencing tracking, censorship, or surveillance.
+
+## 6. Why trust Tor?
+
+Tor is designed for privacy. We don’t know who our users are, and we don't keep logs of user activity.
+
+Tor relay operators cannot reveal the true identity of Tor users.
+
+Continual peer review of Tor's source code by academic and open source communities ensures that there are no backdoors in Tor, and our social contract promises that we will never backdoor Tor.
+
+## 7. Join the Tor community
+
+Tor is made possible by a diverse set of users, developers, relay operators, and advocates from around the world.
+
+We need your help to make Tor more usable and secure for people everywhere.
+
+You can volunteer with Tor by writing code, running a relay, creating documentation, offering user support, or telling people in your community about Tor.
+
+The Tor community is governed by a code of conduct, and we outline our set of promises to the community in our social contract.
+
+Learn more about Tor by visiting our website, our wiki, finding us on IRC, joining one of our mailing lists, or signing up for Tor News at newsletter.torproject.org.
+
+
+## 8. Download Tor
+
+Tor for Desktop
+torproject.org/download
+
+TOR ON MOBILE
+### Android
+Tor Browser for Android is available from GooglePlay.
+
+### iOS
+Onion Browser, developed by M. Tigas, is the only browser we recommend for iOS.
+
diff --git a/am.po b/am.po
new file mode 100644
index 000000000..6c8fce0dc
--- /dev/null
+++ b/am.po
@@ -0,0 +1,162 @@
+# Tor Outreach Material 2019-2020
+
+# 1. TOR FOR PRIVACY
+
+### Privacy is a human right
+
+Like many of us, Aleisha spends most of her time online--connecting with friends, posting on social media, and browsing the web.
+
+But lately, she's noticed that advertisements related to her previous searches are following her around online.
+
+This feels so invasive that she does some research on online ads and learns that it's not just advertisers tracking her but also her ISP, analytics companies, social media platforms, and more.
+
+Aleisha decides she wants to find and use software that doesn't collect her data, doesn't track her, and doesn't tell other services anything private about her.
+
+She goes to a privacy training at a local hackerspace and learns about **Tor Browser**, the only web browser that allows her to browse anonymously.
+
+---
+
+# 2.TOR FOR FEMINISTS
+
+### The future is cyberfeminist
+
+Fernanda runs a women's collective focused on reproductive rights in Brazil, where abortion is illegal.
+
+Fernanda and her colleagues built a website with information about abortion access, birth control, and other resources for people seeking reproductive information.
+
+If this website was linked back to them, they could be arrested--or worse.
+
+To protect themselves, Fernanda and her colleagues created the website using Tor **onion services**. Onion services not only protect them from being discovered as the operators of the server but also help protect visitors to their website by requiring they use Tor Browser.
+
+In fact, Fernanda uses **Tor Browser** for all of her web browsing just to be on the safe side.
+
+She also uses a Tor-powered app called **OnionShare** to send files to other activists securely and privately.
+
+### Reproductive rights activists like Fernanda are fighting for fundamental freedoms, and Tor helps power their resistance.
+
+---
+
+# 3. TOR FOR HUMAN RIGHTS
+
+### Water is life
+
+Jelani lives in a small village which a wide river runs through.
+
+This river has provided water to his community since the days of his ancestors.
+
+But today, Jelani’s river is threatened by powerful multinational companies drilling for oil in the region.
+
+Private security firms, paid for by these companies, use powerful surveillance mechanisms to monitor the online activities of Jelani and his neighbors in the village who are organizing to protect their sacred river.
+
+Jelani uses **Tor Browser** to prevent these companies from watching as he visits websites for international human rights protection and legal aid and writes blog posts about the resistance movement in his village.
+
+He also uses **OnionShare** and **SecureDrop** to securely send documents to journalists who are helping expose these human rights violations.
+
+All of this software uses Tor to help protect Jelani’s privacy.
+
+### Human rights activists like Jelani are fighting for justice in their communities, and Tor helps power their resistance.
+
+---
+
+# 4. TOR FOR ANTI-CENSORSHIP
+
+### Build bridges not walls
+
+Jean was traveling for the first time to a country far from his family.
+
+After arriving at a hotel, he opened his laptop.
+
+He was so exhausted that when the message "Connection has timed out" first appeared on his web browser, he thought it was due to his own error.
+
+But after trying again and again, he realized that his email provider, a news website, and many apps were unavailable.
+
+He had heard that this country censors the internet and wondered if that was happening.
+How could he contact his family from behind this impenetrable wall?
+After doing some web searches, he found a forum and read about VPNs, private services that allow you to connect to another uncensored network.
+
+Jean spent half an hour trying to figure out which cheap VPN was best.
+
+He chose one and for a moment it seemed to work, but after five minutes the connection went offline and the VPN would no longer connect.
+
+Jean kept reading to find other options and learned about Tor Browser and how it can circumvent censorship.
+
+He found an official website mirror to download the program.
+
+When he opened **Tor Browser**, he followed the prompts for censored users and connected to a bridge which allowed him to access the internet again.
+
+With Tor Browser, Jean can browse freely and privately and contact his family.
+
+### Censored users all over the world rely on Tor Browser for a free, stable, and uncensored way to access the internet.
+
+---
+
+# 5. Shared Sections
+
+## What is Tor?
+
+Tor is free software and an open network that helps protect you from tracking, surveillance, and censorship online.
+Tor is created for free by a 501(c)3 U.S.-based nonprofit called the Tor Project.
+
+The easiest way to use Tor is Tor Browser.
+When you use Tor Browser, no one can see what websites you visit or where in the world you’re coming from.
+
+Other applications, like SecureDrop and OnionShare, use Tor to protect their users against surveillance and censorship.
+
+
+## 6. How does Tor work?
+
+Amal wants to visit Bekele’s website privately, so she opens Tor Browser.
+
+Tor Browser selects a random circuit of three relays, which are computers all over the world configured to route traffic over the Tor network.
+
+Tor Browser then encrypts her website request three times and sends it to the first Tor relay in her circuit.
+
+The first relay removes the first encryption layer but doesn't learn that the destination is Bekele’s website.
+
+The first relay learns only the next location in the circuit, which is the second relay.
+
+The second relay removes another encryption layer and forwards the web page request to the third relay.
+
+The third relay removes the last encryption layer and forwards the web page request to its destination, Bekele’s website, but it doesn't know the request comes from Amal.
+
+Bekele doesn't know that the website request came from Amal unless she tells him so.
+
+## 7. Who uses Tor?
+
+People all over the world use Tor to protect their privacy and access the web freely.
+
+Tor helps protect journalists, human rights defenders, domestic violence victims, academic researchers, and anyone experiencing tracking, censorship, or surveillance.
+
+## 6. Why trust Tor?
+
+Tor is designed for privacy. We don’t know who our users are, and we don't keep logs of user activity.
+
+Tor relay operators cannot reveal the true identity of Tor users.
+
+Continual peer review of Tor's source code by academic and open source communities ensures that there are no backdoors in Tor, and our social contract promises that we will never backdoor Tor.
+
+## 7. Join the Tor community
+
+Tor is made possible by a diverse set of users, developers, relay operators, and advocates from around the world.
+
+We need your help to make Tor more usable and secure for people everywhere.
+
+You can volunteer with Tor by writing code, running a relay, creating documentation, offering user support, or telling people in your community about Tor.
+
+The Tor community is governed by a code of conduct, and we outline our set of promises to the community in our social contract.
+
+Learn more about Tor by visiting our website, our wiki, finding us on IRC, joining one of our mailing lists, or signing up for Tor News at newsletter.torproject.org.
+
+
+## 8. Download Tor
+
+Tor for Desktop
+torproject.org/download
+
+TOR ON MOBILE
+### Android
+Tor Browser for Android is available from GooglePlay.
+
+### iOS
+Onion Browser, developed by M. Tigas, is the only browser we recommend for iOS.
+
diff --git a/ar.po b/ar.po
new file mode 100644
index 000000000..1f392900a
--- /dev/null
+++ b/ar.po
@@ -0,0 +1,162 @@
+# Tor Outreach Material 2019-2020
+
+# 1. TOR FOR PRIVACY
+
+### Privacy is a human right
+
+Like many of us, Aleisha spends most of her time online--connecting with friends, posting on social media, and browsing the web.
+
+But lately, she's noticed that advertisements related to her previous searches are following her around online.
+
+This feels so invasive that she does some research on online ads and learns that it's not just advertisers tracking her but also her ISP, analytics companies, social media platforms, and more.
+
+Aleisha decides she wants to find and use software that doesn't collect her data, doesn't track her, and doesn't tell other services anything private about her.
+
+She goes to a privacy training at a local hackerspace and learns about **Tor Browser**, the only web browser that allows her to browse anonymously.
+
+---
+
+# 2.TOR FOR FEMINISTS
+
+### The future is cyberfeminist
+
+Fernanda runs a women's collective focused on reproductive rights in Brazil, where abortion is illegal.
+
+Fernanda and her colleagues built a website with information about abortion access, birth control, and other resources for people seeking reproductive information.
+
+If this website was linked back to them, they could be arrested--or worse.
+
+To protect themselves, Fernanda and her colleagues created the website using Tor **onion services**. Onion services not only protect them from being discovered as the operators of the server but also help protect visitors to their website by requiring they use Tor Browser.
+
+In fact, Fernanda uses **Tor Browser** for all of her web browsing just to be on the safe side.
+
+She also uses a Tor-powered app called **OnionShare** to send files to other activists securely and privately.
+
+### Reproductive rights activists like Fernanda are fighting for fundamental freedoms, and Tor helps power their resistance.
+
+---
+
+# 3. TOR FOR HUMAN RIGHTS
+
+### Water is life
+
+Jelani lives in a small village which a wide river runs through.
+
+This river has provided water to his community since the days of his ancestors.
+
+But today, Jelani’s river is threatened by powerful multinational companies drilling for oil in the region.
+
+Private security firms, paid for by these companies, use powerful surveillance mechanisms to monitor the online activities of Jelani and his neighbors in the village who are organizing to protect their sacred river.
+
+Jelani uses **Tor Browser** to prevent these companies from watching as he visits websites for international human rights protection and legal aid and writes blog posts about the resistance movement in his village.
+
+He also uses **OnionShare** and **SecureDrop** to securely send documents to journalists who are helping expose these human rights violations.
+
+All of this software uses Tor to help protect Jelani’s privacy.
+
+### Human rights activists like Jelani are fighting for justice in their communities, and Tor helps power their resistance.
+
+---
+
+# 4. TOR FOR ANTI-CENSORSHIP
+
+### Build bridges not walls
+
+Jean was traveling for the first time to a country far from his family.
+
+After arriving at a hotel, he opened his laptop.
+
+He was so exhausted that when the message "Connection has timed out" first appeared on his web browser, he thought it was due to his own error.
+
+But after trying again and again, he realized that his email provider, a news website, and many apps were unavailable.
+
+He had heard that this country censors the internet and wondered if that was happening.
+How could he contact his family from behind this impenetrable wall?
+After doing some web searches, he found a forum and read about VPNs, private services that allow you to connect to another uncensored network.
+
+Jean spent half an hour trying to figure out which cheap VPN was best.
+
+He chose one and for a moment it seemed to work, but after five minutes the connection went offline and the VPN would no longer connect.
+
+Jean kept reading to find other options and learned about Tor Browser and how it can circumvent censorship.
+
+He found an official website mirror to download the program.
+
+When he opened **Tor Browser**, he followed the prompts for censored users and connected to a bridge which allowed him to access the internet again.
+
+With Tor Browser, Jean can browse freely and privately and contact his family.
+
+### Censored users all over the world rely on Tor Browser for a free, stable, and uncensored way to access the internet.
+
+---
+
+# 5. Shared Sections
+
+## ما هو تور؟
+
+Tor is free software and an open network that helps protect you from tracking, surveillance, and censorship online.
+Tor is created for free by a 501(c)3 U.S.-based nonprofit called the Tor Project.
+
+The easiest way to use Tor is Tor Browser.
+When you use Tor Browser, no one can see what websites you visit or where in the world you’re coming from.
+
+Other applications, like SecureDrop and OnionShare, use Tor to protect their users against surveillance and censorship.
+
+
+## 6. How does Tor work?
+
+Amal wants to visit Bekele’s website privately, so she opens Tor Browser.
+
+Tor Browser selects a random circuit of three relays, which are computers all over the world configured to route traffic over the Tor network.
+
+Tor Browser then encrypts her website request three times and sends it to the first Tor relay in her circuit.
+
+The first relay removes the first encryption layer but doesn't learn that the destination is Bekele’s website.
+
+The first relay learns only the next location in the circuit, which is the second relay.
+
+The second relay removes another encryption layer and forwards the web page request to the third relay.
+
+The third relay removes the last encryption layer and forwards the web page request to its destination, Bekele’s website, but it doesn't know the request comes from Amal.
+
+Bekele doesn't know that the website request came from Amal unless she tells him so.
+
+## 7. Who uses Tor?
+
+People all over the world use Tor to protect their privacy and access the web freely.
+
+Tor helps protect journalists, human rights defenders, domestic violence victims, academic researchers, and anyone experiencing tracking, censorship, or surveillance.
+
+## 6. Why trust Tor?
+
+Tor is designed for privacy. We don’t know who our users are, and we don't keep logs of user activity.
+
+Tor relay operators cannot reveal the true identity of Tor users.
+
+Continual peer review of Tor's source code by academic and open source communities ensures that there are no backdoors in Tor, and our social contract promises that we will never backdoor Tor.
+
+## 7. Join the Tor community
+
+Tor is made possible by a diverse set of users, developers, relay operators, and advocates from around the world.
+
+We need your help to make Tor more usable and secure for people everywhere.
+
+You can volunteer with Tor by writing code, running a relay, creating documentation, offering user support, or telling people in your community about Tor.
+
+The Tor community is governed by a code of conduct, and we outline our set of promises to the community in our social contract.
+
+Learn more about Tor by visiting our website, our wiki, finding us on IRC, joining one of our mailing lists, or signing up for Tor News at newsletter.torproject.org.
+
+
+## 8. Download Tor
+
+Tor for Desktop
+torproject.org/download
+
+TOR ON MOBILE
+### Android
+Tor Browser for Android is available from GooglePlay.
+
+### iOS
+Onion Browser, developed by M. Tigas, is the only browser we recommend for iOS.
+
diff --git a/ast.po b/ast.po
new file mode 100644
index 000000000..6c8fce0dc
--- /dev/null
+++ b/ast.po
@@ -0,0 +1,162 @@
+# Tor Outreach Material 2019-2020
+
+# 1. TOR FOR PRIVACY
+
+### Privacy is a human right
+
+Like many of us, Aleisha spends most of her time online--connecting with friends, posting on social media, and browsing the web.
+
+But lately, she's noticed that advertisements related to her previous searches are following her around online.
+
+This feels so invasive that she does some research on online ads and learns that it's not just advertisers tracking her but also her ISP, analytics companies, social media platforms, and more.
+
+Aleisha decides she wants to find and use software that doesn't collect her data, doesn't track her, and doesn't tell other services anything private about her.
+
+She goes to a privacy training at a local hackerspace and learns about **Tor Browser**, the only web browser that allows her to browse anonymously.
+
+---
+
+# 2.TOR FOR FEMINISTS
+
+### The future is cyberfeminist
+
+Fernanda runs a women's collective focused on reproductive rights in Brazil, where abortion is illegal.
+
+Fernanda and her colleagues built a website with information about abortion access, birth control, and other resources for people seeking reproductive information.
+
+If this website was linked back to them, they could be arrested--or worse.
+
+To protect themselves, Fernanda and her colleagues created the website using Tor **onion services**. Onion services not only protect them from being discovered as the operators of the server but also help protect visitors to their website by requiring they use Tor Browser.
+
+In fact, Fernanda uses **Tor Browser** for all of her web browsing just to be on the safe side.
+
+She also uses a Tor-powered app called **OnionShare** to send files to other activists securely and privately.
+
+### Reproductive rights activists like Fernanda are fighting for fundamental freedoms, and Tor helps power their resistance.
+
+---
+
+# 3. TOR FOR HUMAN RIGHTS
+
+### Water is life
+
+Jelani lives in a small village which a wide river runs through.
+
+This river has provided water to his community since the days of his ancestors.
+
+But today, Jelani’s river is threatened by powerful multinational companies drilling for oil in the region.
+
+Private security firms, paid for by these companies, use powerful surveillance mechanisms to monitor the online activities of Jelani and his neighbors in the village who are organizing to protect their sacred river.
+
+Jelani uses **Tor Browser** to prevent these companies from watching as he visits websites for international human rights protection and legal aid and writes blog posts about the resistance movement in his village.
+
+He also uses **OnionShare** and **SecureDrop** to securely send documents to journalists who are helping expose these human rights violations.
+
+All of this software uses Tor to help protect Jelani’s privacy.
+
+### Human rights activists like Jelani are fighting for justice in their communities, and Tor helps power their resistance.
+
+---
+
+# 4. TOR FOR ANTI-CENSORSHIP
+
+### Build bridges not walls
+
+Jean was traveling for the first time to a country far from his family.
+
+After arriving at a hotel, he opened his laptop.
+
+He was so exhausted that when the message "Connection has timed out" first appeared on his web browser, he thought it was due to his own error.
+
+But after trying again and again, he realized that his email provider, a news website, and many apps were unavailable.
+
+He had heard that this country censors the internet and wondered if that was happening.
+How could he contact his family from behind this impenetrable wall?
+After doing some web searches, he found a forum and read about VPNs, private services that allow you to connect to another uncensored network.
+
+Jean spent half an hour trying to figure out which cheap VPN was best.
+
+He chose one and for a moment it seemed to work, but after five minutes the connection went offline and the VPN would no longer connect.
+
+Jean kept reading to find other options and learned about Tor Browser and how it can circumvent censorship.
+
+He found an official website mirror to download the program.
+
+When he opened **Tor Browser**, he followed the prompts for censored users and connected to a bridge which allowed him to access the internet again.
+
+With Tor Browser, Jean can browse freely and privately and contact his family.
+
+### Censored users all over the world rely on Tor Browser for a free, stable, and uncensored way to access the internet.
+
+---
+
+# 5. Shared Sections
+
+## What is Tor?
+
+Tor is free software and an open network that helps protect you from tracking, surveillance, and censorship online.
+Tor is created for free by a 501(c)3 U.S.-based nonprofit called the Tor Project.
+
+The easiest way to use Tor is Tor Browser.
+When you use Tor Browser, no one can see what websites you visit or where in the world you’re coming from.
+
+Other applications, like SecureDrop and OnionShare, use Tor to protect their users against surveillance and censorship.
+
+
+## 6. How does Tor work?
+
+Amal wants to visit Bekele’s website privately, so she opens Tor Browser.
+
+Tor Browser selects a random circuit of three relays, which are computers all over the world configured to route traffic over the Tor network.
+
+Tor Browser then encrypts her website request three times and sends it to the first Tor relay in her circuit.
+
+The first relay removes the first encryption layer but doesn't learn that the destination is Bekele’s website.
+
+The first relay learns only the next location in the circuit, which is the second relay.
+
+The second relay removes another encryption layer and forwards the web page request to the third relay.
+
+The third relay removes the last encryption layer and forwards the web page request to its destination, Bekele’s website, but it doesn't know the request comes from Amal.
+
+Bekele doesn't know that the website request came from Amal unless she tells him so.
+
+## 7. Who uses Tor?
+
+People all over the world use Tor to protect their privacy and access the web freely.
+
+Tor helps protect journalists, human rights defenders, domestic violence victims, academic researchers, and anyone experiencing tracking, censorship, or surveillance.
+
+## 6. Why trust Tor?
+
+Tor is designed for privacy. We don’t know who our users are, and we don't keep logs of user activity.
+
+Tor relay operators cannot reveal the true identity of Tor users.
+
+Continual peer review of Tor's source code by academic and open source communities ensures that there are no backdoors in Tor, and our social contract promises that we will never backdoor Tor.
+
+## 7. Join the Tor community
+
+Tor is made possible by a diverse set of users, developers, relay operators, and advocates from around the world.
+
+We need your help to make Tor more usable and secure for people everywhere.
+
+You can volunteer with Tor by writing code, running a relay, creating documentation, offering user support, or telling people in your community about Tor.
+
+The Tor community is governed by a code of conduct, and we outline our set of promises to the community in our social contract.
+
+Learn more about Tor by visiting our website, our wiki, finding us on IRC, joining one of our mailing lists, or signing up for Tor News at newsletter.torproject.org.
+
+
+## 8. Download Tor
+
+Tor for Desktop
+torproject.org/download
+
+TOR ON MOBILE
+### Android
+Tor Browser for Android is available from GooglePlay.
+
+### iOS
+Onion Browser, developed by M. Tigas, is the only browser we recommend for iOS.
+
diff --git a/az.po b/az.po
new file mode 100644
index 000000000..74575398f
--- /dev/null
+++ b/az.po
@@ -0,0 +1,162 @@
+# Tor Outreach Material 2019-2020
+
+# 1. TOR FOR PRIVACY
+
+### Privacy is a human right
+
+Like many of us, Aleisha spends most of her time online--connecting with friends, posting on social media, and browsing the web.
+
+But lately, she's noticed that advertisements related to her previous searches are following her around online.
+
+This feels so invasive that she does some research on online ads and learns that it's not just advertisers tracking her but also her ISP, analytics companies, social media platforms, and more.
+
+Aleisha decides she wants to find and use software that doesn't collect her data, doesn't track her, and doesn't tell other services anything private about her.
+
+She goes to a privacy training at a local hackerspace and learns about **Tor Browser**, the only web browser that allows her to browse anonymously.
+
+---
+
+# 2.TOR FOR FEMINISTS
+
+### The future is cyberfeminist
+
+Fernanda runs a women's collective focused on reproductive rights in Brazil, where abortion is illegal.
+
+Fernanda and her colleagues built a website with information about abortion access, birth control, and other resources for people seeking reproductive information.
+
+If this website was linked back to them, they could be arrested--or worse.
+
+To protect themselves, Fernanda and her colleagues created the website using Tor **onion services**. Onion services not only protect them from being discovered as the operators of the server but also help protect visitors to their website by requiring they use Tor Browser.
+
+In fact, Fernanda uses **Tor Browser** for all of her web browsing just to be on the safe side.
+
+She also uses a Tor-powered app called **OnionShare** to send files to other activists securely and privately.
+
+### Reproductive rights activists like Fernanda are fighting for fundamental freedoms, and Tor helps power their resistance.
+
+---
+
+# 3. TOR FOR HUMAN RIGHTS
+
+### Water is life
+
+Jelani lives in a small village which a wide river runs through.
+
+This river has provided water to his community since the days of his ancestors.
+
+But today, Jelani’s river is threatened by powerful multinational companies drilling for oil in the region.
+
+Private security firms, paid for by these companies, use powerful surveillance mechanisms to monitor the online activities of Jelani and his neighbors in the village who are organizing to protect their sacred river.
+
+Jelani uses **Tor Browser** to prevent these companies from watching as he visits websites for international human rights protection and legal aid and writes blog posts about the resistance movement in his village.
+
+He also uses **OnionShare** and **SecureDrop** to securely send documents to journalists who are helping expose these human rights violations.
+
+All of this software uses Tor to help protect Jelani’s privacy.
+
+### Human rights activists like Jelani are fighting for justice in their communities, and Tor helps power their resistance.
+
+---
+
+# 4. TOR FOR ANTI-CENSORSHIP
+
+### Build bridges not walls
+
+Jean was traveling for the first time to a country far from his family.
+
+After arriving at a hotel, he opened his laptop.
+
+He was so exhausted that when the message "Connection has timed out" first appeared on his web browser, he thought it was due to his own error.
+
+But after trying again and again, he realized that his email provider, a news website, and many apps were unavailable.
+
+He had heard that this country censors the internet and wondered if that was happening.
+How could he contact his family from behind this impenetrable wall?
+After doing some web searches, he found a forum and read about VPNs, private services that allow you to connect to another uncensored network.
+
+Jean spent half an hour trying to figure out which cheap VPN was best.
+
+He chose one and for a moment it seemed to work, but after five minutes the connection went offline and the VPN would no longer connect.
+
+Jean kept reading to find other options and learned about Tor Browser and how it can circumvent censorship.
+
+He found an official website mirror to download the program.
+
+When he opened **Tor Browser**, he followed the prompts for censored users and connected to a bridge which allowed him to access the internet again.
+
+With Tor Browser, Jean can browse freely and privately and contact his family.
+
+### Censored users all over the world rely on Tor Browser for a free, stable, and uncensored way to access the internet.
+
+---
+
+# 5. Shared Sections
+
+## Tor nədir?
+
+Tor is free software and an open network that helps protect you from tracking, surveillance, and censorship online.
+Tor is created for free by a 501(c)3 U.S.-based nonprofit called the Tor Project.
+
+The easiest way to use Tor is Tor Browser.
+When you use Tor Browser, no one can see what websites you visit or where in the world you’re coming from.
+
+Other applications, like SecureDrop and OnionShare, use Tor to protect their users against surveillance and censorship.
+
+
+## 6. How does Tor work?
+
+Amal wants to visit Bekele’s website privately, so she opens Tor Browser.
+
+Tor Browser selects a random circuit of three relays, which are computers all over the world configured to route traffic over the Tor network.
+
+Tor Browser then encrypts her website request three times and sends it to the first Tor relay in her circuit.
+
+The first relay removes the first encryption layer but doesn't learn that the destination is Bekele’s website.
+
+The first relay learns only the next location in the circuit, which is the second relay.
+
+The second relay removes another encryption layer and forwards the web page request to the third relay.
+
+The third relay removes the last encryption layer and forwards the web page request to its destination, Bekele’s website, but it doesn't know the request comes from Amal.
+
+Bekele doesn't know that the website request came from Amal unless she tells him so.
+
+## 7. Who uses Tor?
+
+People all over the world use Tor to protect their privacy and access the web freely.
+
+Tor helps protect journalists, human rights defenders, domestic violence victims, academic researchers, and anyone experiencing tracking, censorship, or surveillance.
+
+## 6. Why trust Tor?
+
+Tor is designed for privacy. We don’t know who our users are, and we don't keep logs of user activity.
+
+Tor relay operators cannot reveal the true identity of Tor users.
+
+Continual peer review of Tor's source code by academic and open source communities ensures that there are no backdoors in Tor, and our social contract promises that we will never backdoor Tor.
+
+## 7. Join the Tor community
+
+Tor is made possible by a diverse set of users, developers, relay operators, and advocates from around the world.
+
+We need your help to make Tor more usable and secure for people everywhere.
+
+You can volunteer with Tor by writing code, running a relay, creating documentation, offering user support, or telling people in your community about Tor.
+
+The Tor community is governed by a code of conduct, and we outline our set of promises to the community in our social contract.
+
+Learn more about Tor by visiting our website, our wiki, finding us on IRC, joining one of our mailing lists, or signing up for Tor News at newsletter.torproject.org.
+
+
+## 8. Download Tor
+
+Tor for Desktop
+torproject.org/download
+
+TOR ON MOBILE
+### Android
+Tor Browser for Android is available from GooglePlay.
+
+### iOS
+Onion Browser, developed by M. Tigas, is the only browser we recommend for iOS.
+
diff --git a/ba.po b/ba.po
new file mode 100644
index 000000000..6c8fce0dc
--- /dev/null
+++ b/ba.po
@@ -0,0 +1,162 @@
+# Tor Outreach Material 2019-2020
+
+# 1. TOR FOR PRIVACY
+
+### Privacy is a human right
+
+Like many of us, Aleisha spends most of her time online--connecting with friends, posting on social media, and browsing the web.
+
+But lately, she's noticed that advertisements related to her previous searches are following her around online.
+
+This feels so invasive that she does some research on online ads and learns that it's not just advertisers tracking her but also her ISP, analytics companies, social media platforms, and more.
+
+Aleisha decides she wants to find and use software that doesn't collect her data, doesn't track her, and doesn't tell other services anything private about her.
+
+She goes to a privacy training at a local hackerspace and learns about **Tor Browser**, the only web browser that allows her to browse anonymously.
+
+---
+
+# 2.TOR FOR FEMINISTS
+
+### The future is cyberfeminist
+
+Fernanda runs a women's collective focused on reproductive rights in Brazil, where abortion is illegal.
+
+Fernanda and her colleagues built a website with information about abortion access, birth control, and other resources for people seeking reproductive information.
+
+If this website was linked back to them, they could be arrested--or worse.
+
+To protect themselves, Fernanda and her colleagues created the website using Tor **onion services**. Onion services not only protect them from being discovered as the operators of the server but also help protect visitors to their website by requiring they use Tor Browser.
+
+In fact, Fernanda uses **Tor Browser** for all of her web browsing just to be on the safe side.
+
+She also uses a Tor-powered app called **OnionShare** to send files to other activists securely and privately.
+
+### Reproductive rights activists like Fernanda are fighting for fundamental freedoms, and Tor helps power their resistance.
+
+---
+
+# 3. TOR FOR HUMAN RIGHTS
+
+### Water is life
+
+Jelani lives in a small village which a wide river runs through.
+
+This river has provided water to his community since the days of his ancestors.
+
+But today, Jelani’s river is threatened by powerful multinational companies drilling for oil in the region.
+
+Private security firms, paid for by these companies, use powerful surveillance mechanisms to monitor the online activities of Jelani and his neighbors in the village who are organizing to protect their sacred river.
+
+Jelani uses **Tor Browser** to prevent these companies from watching as he visits websites for international human rights protection and legal aid and writes blog posts about the resistance movement in his village.
+
+He also uses **OnionShare** and **SecureDrop** to securely send documents to journalists who are helping expose these human rights violations.
+
+All of this software uses Tor to help protect Jelani’s privacy.
+
+### Human rights activists like Jelani are fighting for justice in their communities, and Tor helps power their resistance.
+
+---
+
+# 4. TOR FOR ANTI-CENSORSHIP
+
+### Build bridges not walls
+
+Jean was traveling for the first time to a country far from his family.
+
+After arriving at a hotel, he opened his laptop.
+
+He was so exhausted that when the message "Connection has timed out" first appeared on his web browser, he thought it was due to his own error.
+
+But after trying again and again, he realized that his email provider, a news website, and many apps were unavailable.
+
+He had heard that this country censors the internet and wondered if that was happening.
+How could he contact his family from behind this impenetrable wall?
+After doing some web searches, he found a forum and read about VPNs, private services that allow you to connect to another uncensored network.
+
+Jean spent half an hour trying to figure out which cheap VPN was best.
+
+He chose one and for a moment it seemed to work, but after five minutes the connection went offline and the VPN would no longer connect.
+
+Jean kept reading to find other options and learned about Tor Browser and how it can circumvent censorship.
+
+He found an official website mirror to download the program.
+
+When he opened **Tor Browser**, he followed the prompts for censored users and connected to a bridge which allowed him to access the internet again.
+
+With Tor Browser, Jean can browse freely and privately and contact his family.
+
+### Censored users all over the world rely on Tor Browser for a free, stable, and uncensored way to access the internet.
+
+---
+
+# 5. Shared Sections
+
+## What is Tor?
+
+Tor is free software and an open network that helps protect you from tracking, surveillance, and censorship online.
+Tor is created for free by a 501(c)3 U.S.-based nonprofit called the Tor Project.
+
+The easiest way to use Tor is Tor Browser.
+When you use Tor Browser, no one can see what websites you visit or where in the world you’re coming from.
+
+Other applications, like SecureDrop and OnionShare, use Tor to protect their users against surveillance and censorship.
+
+
+## 6. How does Tor work?
+
+Amal wants to visit Bekele’s website privately, so she opens Tor Browser.
+
+Tor Browser selects a random circuit of three relays, which are computers all over the world configured to route traffic over the Tor network.
+
+Tor Browser then encrypts her website request three times and sends it to the first Tor relay in her circuit.
+
+The first relay removes the first encryption layer but doesn't learn that the destination is Bekele’s website.
+
+The first relay learns only the next location in the circuit, which is the second relay.
+
+The second relay removes another encryption layer and forwards the web page request to the third relay.
+
+The third relay removes the last encryption layer and forwards the web page request to its destination, Bekele’s website, but it doesn't know the request comes from Amal.
+
+Bekele doesn't know that the website request came from Amal unless she tells him so.
+
+## 7. Who uses Tor?
+
+People all over the world use Tor to protect their privacy and access the web freely.
+
+Tor helps protect journalists, human rights defenders, domestic violence victims, academic researchers, and anyone experiencing tracking, censorship, or surveillance.
+
+## 6. Why trust Tor?
+
+Tor is designed for privacy. We don’t know who our users are, and we don't keep logs of user activity.
+
+Tor relay operators cannot reveal the true identity of Tor users.
+
+Continual peer review of Tor's source code by academic and open source communities ensures that there are no backdoors in Tor, and our social contract promises that we will never backdoor Tor.
+
+## 7. Join the Tor community
+
+Tor is made possible by a diverse set of users, developers, relay operators, and advocates from around the world.
+
+We need your help to make Tor more usable and secure for people everywhere.
+
+You can volunteer with Tor by writing code, running a relay, creating documentation, offering user support, or telling people in your community about Tor.
+
+The Tor community is governed by a code of conduct, and we outline our set of promises to the community in our social contract.
+
+Learn more about Tor by visiting our website, our wiki, finding us on IRC, joining one of our mailing lists, or signing up for Tor News at newsletter.torproject.org.
+
+
+## 8. Download Tor
+
+Tor for Desktop
+torproject.org/download
+
+TOR ON MOBILE
+### Android
+Tor Browser for Android is available from GooglePlay.
+
+### iOS
+Onion Browser, developed by M. Tigas, is the only browser we recommend for iOS.
+
diff --git a/be.po b/be.po
new file mode 100644
index 000000000..6c8fce0dc
--- /dev/null
+++ b/be.po
@@ -0,0 +1,162 @@
+# Tor Outreach Material 2019-2020
+
+# 1. TOR FOR PRIVACY
+
+### Privacy is a human right
+
+Like many of us, Aleisha spends most of her time online--connecting with friends, posting on social media, and browsing the web.
+
+But lately, she's noticed that advertisements related to her previous searches are following her around online.
+
+This feels so invasive that she does some research on online ads and learns that it's not just advertisers tracking her but also her ISP, analytics companies, social media platforms, and more.
+
+Aleisha decides she wants to find and use software that doesn't collect her data, doesn't track her, and doesn't tell other services anything private about her.
+
+She goes to a privacy training at a local hackerspace and learns about **Tor Browser**, the only web browser that allows her to browse anonymously.
+
+---
+
+# 2.TOR FOR FEMINISTS
+
+### The future is cyberfeminist
+
+Fernanda runs a women's collective focused on reproductive rights in Brazil, where abortion is illegal.
+
+Fernanda and her colleagues built a website with information about abortion access, birth control, and other resources for people seeking reproductive information.
+
+If this website was linked back to them, they could be arrested--or worse.
+
+To protect themselves, Fernanda and her colleagues created the website using Tor **onion services**. Onion services not only protect them from being discovered as the operators of the server but also help protect visitors to their website by requiring they use Tor Browser.
+
+In fact, Fernanda uses **Tor Browser** for all of her web browsing just to be on the safe side.
+
+She also uses a Tor-powered app called **OnionShare** to send files to other activists securely and privately.
+
+### Reproductive rights activists like Fernanda are fighting for fundamental freedoms, and Tor helps power their resistance.
+
+---
+
+# 3. TOR FOR HUMAN RIGHTS
+
+### Water is life
+
+Jelani lives in a small village which a wide river runs through.
+
+This river has provided water to his community since the days of his ancestors.
+
+But today, Jelani’s river is threatened by powerful multinational companies drilling for oil in the region.
+
+Private security firms, paid for by these companies, use powerful surveillance mechanisms to monitor the online activities of Jelani and his neighbors in the village who are organizing to protect their sacred river.
+
+Jelani uses **Tor Browser** to prevent these companies from watching as he visits websites for international human rights protection and legal aid and writes blog posts about the resistance movement in his village.
+
+He also uses **OnionShare** and **SecureDrop** to securely send documents to journalists who are helping expose these human rights violations.
+
+All of this software uses Tor to help protect Jelani’s privacy.
+
+### Human rights activists like Jelani are fighting for justice in their communities, and Tor helps power their resistance.
+
+---
+
+# 4. TOR FOR ANTI-CENSORSHIP
+
+### Build bridges not walls
+
+Jean was traveling for the first time to a country far from his family.
+
+After arriving at a hotel, he opened his laptop.
+
+He was so exhausted that when the message "Connection has timed out" first appeared on his web browser, he thought it was due to his own error.
+
+But after trying again and again, he realized that his email provider, a news website, and many apps were unavailable.
+
+He had heard that this country censors the internet and wondered if that was happening.
+How could he contact his family from behind this impenetrable wall?
+After doing some web searches, he found a forum and read about VPNs, private services that allow you to connect to another uncensored network.
+
+Jean spent half an hour trying to figure out which cheap VPN was best.
+
+He chose one and for a moment it seemed to work, but after five minutes the connection went offline and the VPN would no longer connect.
+
+Jean kept reading to find other options and learned about Tor Browser and how it can circumvent censorship.
+
+He found an official website mirror to download the program.
+
+When he opened **Tor Browser**, he followed the prompts for censored users and connected to a bridge which allowed him to access the internet again.
+
+With Tor Browser, Jean can browse freely and privately and contact his family.
+
+### Censored users all over the world rely on Tor Browser for a free, stable, and uncensored way to access the internet.
+
+---
+
+# 5. Shared Sections
+
+## What is Tor?
+
+Tor is free software and an open network that helps protect you from tracking, surveillance, and censorship online.
+Tor is created for free by a 501(c)3 U.S.-based nonprofit called the Tor Project.
+
+The easiest way to use Tor is Tor Browser.
+When you use Tor Browser, no one can see what websites you visit or where in the world you’re coming from.
+
+Other applications, like SecureDrop and OnionShare, use Tor to protect their users against surveillance and censorship.
+
+
+## 6. How does Tor work?
+
+Amal wants to visit Bekele’s website privately, so she opens Tor Browser.
+
+Tor Browser selects a random circuit of three relays, which are computers all over the world configured to route traffic over the Tor network.
+
+Tor Browser then encrypts her website request three times and sends it to the first Tor relay in her circuit.
+
+The first relay removes the first encryption layer but doesn't learn that the destination is Bekele’s website.
+
+The first relay learns only the next location in the circuit, which is the second relay.
+
+The second relay removes another encryption layer and forwards the web page request to the third relay.
+
+The third relay removes the last encryption layer and forwards the web page request to its destination, Bekele’s website, but it doesn't know the request comes from Amal.
+
+Bekele doesn't know that the website request came from Amal unless she tells him so.
+
+## 7. Who uses Tor?
+
+People all over the world use Tor to protect their privacy and access the web freely.
+
+Tor helps protect journalists, human rights defenders, domestic violence victims, academic researchers, and anyone experiencing tracking, censorship, or surveillance.
+
+## 6. Why trust Tor?
+
+Tor is designed for privacy. We don’t know who our users are, and we don't keep logs of user activity.
+
+Tor relay operators cannot reveal the true identity of Tor users.
+
+Continual peer review of Tor's source code by academic and open source communities ensures that there are no backdoors in Tor, and our social contract promises that we will never backdoor Tor.
+
+## 7. Join the Tor community
+
+Tor is made possible by a diverse set of users, developers, relay operators, and advocates from around the world.
+
+We need your help to make Tor more usable and secure for people everywhere.
+
+You can volunteer with Tor by writing code, running a relay, creating documentation, offering user support, or telling people in your community about Tor.
+
+The Tor community is governed by a code of conduct, and we outline our set of promises to the community in our social contract.
+
+Learn more about Tor by visiting our website, our wiki, finding us on IRC, joining one of our mailing lists, or signing up for Tor News at newsletter.torproject.org.
+
+
+## 8. Download Tor
+
+Tor for Desktop
+torproject.org/download
+
+TOR ON MOBILE
+### Android
+Tor Browser for Android is available from GooglePlay.
+
+### iOS
+Onion Browser, developed by M. Tigas, is the only browser we recommend for iOS.
+
diff --git a/bg.po b/bg.po
new file mode 100644
index 000000000..41bd1f4d7
--- /dev/null
+++ b/bg.po
@@ -0,0 +1,162 @@
+# Tor Outreach Material 2019-2020
+
+# 1. TOR FOR PRIVACY
+
+### Privacy is a human right
+
+Like many of us, Aleisha spends most of her time online--connecting with friends, posting on social media, and browsing the web.
+
+But lately, she's noticed that advertisements related to her previous searches are following her around online.
+
+This feels so invasive that she does some research on online ads and learns that it's not just advertisers tracking her but also her ISP, analytics companies, social media platforms, and more.
+
+Aleisha decides she wants to find and use software that doesn't collect her data, doesn't track her, and doesn't tell other services anything private about her.
+
+She goes to a privacy training at a local hackerspace and learns about **Tor Browser**, the only web browser that allows her to browse anonymously.
+
+---
+
+# 2.TOR FOR FEMINISTS
+
+### The future is cyberfeminist
+
+Fernanda runs a women's collective focused on reproductive rights in Brazil, where abortion is illegal.
+
+Fernanda and her colleagues built a website with information about abortion access, birth control, and other resources for people seeking reproductive information.
+
+If this website was linked back to them, they could be arrested--or worse.
+
+To protect themselves, Fernanda and her colleagues created the website using Tor **onion services**. Onion services not only protect them from being discovered as the operators of the server but also help protect visitors to their website by requiring they use Tor Browser.
+
+In fact, Fernanda uses **Tor Browser** for all of her web browsing just to be on the safe side.
+
+She also uses a Tor-powered app called **OnionShare** to send files to other activists securely and privately.
+
+### Reproductive rights activists like Fernanda are fighting for fundamental freedoms, and Tor helps power their resistance.
+
+---
+
+# 3. TOR FOR HUMAN RIGHTS
+
+### Water is life
+
+Jelani lives in a small village which a wide river runs through.
+
+This river has provided water to his community since the days of his ancestors.
+
+But today, Jelani’s river is threatened by powerful multinational companies drilling for oil in the region.
+
+Private security firms, paid for by these companies, use powerful surveillance mechanisms to monitor the online activities of Jelani and his neighbors in the village who are organizing to protect their sacred river.
+
+Jelani uses **Tor Browser** to prevent these companies from watching as he visits websites for international human rights protection and legal aid and writes blog posts about the resistance movement in his village.
+
+He also uses **OnionShare** and **SecureDrop** to securely send documents to journalists who are helping expose these human rights violations.
+
+All of this software uses Tor to help protect Jelani’s privacy.
+
+### Human rights activists like Jelani are fighting for justice in their communities, and Tor helps power their resistance.
+
+---
+
+# 4. TOR FOR ANTI-CENSORSHIP
+
+### Build bridges not walls
+
+Jean was traveling for the first time to a country far from his family.
+
+After arriving at a hotel, he opened his laptop.
+
+He was so exhausted that when the message "Connection has timed out" first appeared on his web browser, he thought it was due to his own error.
+
+But after trying again and again, he realized that his email provider, a news website, and many apps were unavailable.
+
+He had heard that this country censors the internet and wondered if that was happening.
+How could he contact his family from behind this impenetrable wall?
+After doing some web searches, he found a forum and read about VPNs, private services that allow you to connect to another uncensored network.
+
+Jean spent half an hour trying to figure out which cheap VPN was best.
+
+He chose one and for a moment it seemed to work, but after five minutes the connection went offline and the VPN would no longer connect.
+
+Jean kept reading to find other options and learned about Tor Browser and how it can circumvent censorship.
+
+He found an official website mirror to download the program.
+
+When he opened **Tor Browser**, he followed the prompts for censored users and connected to a bridge which allowed him to access the internet again.
+
+With Tor Browser, Jean can browse freely and privately and contact his family.
+
+### Censored users all over the world rely on Tor Browser for a free, stable, and uncensored way to access the internet.
+
+---
+
+# 5. Shared Sections
+
+## Какво е Tor ?
+
+Tor is free software and an open network that helps protect you from tracking, surveillance, and censorship online.
+Tor is created for free by a 501(c)3 U.S.-based nonprofit called the Tor Project.
+
+The easiest way to use Tor is Tor Browser.
+When you use Tor Browser, no one can see what websites you visit or where in the world you’re coming from.
+
+Other applications, like SecureDrop and OnionShare, use Tor to protect their users against surveillance and censorship.
+
+
+## 6. How does Tor work?
+
+Amal wants to visit Bekele’s website privately, so she opens Tor Browser.
+
+Tor Browser selects a random circuit of three relays, which are computers all over the world configured to route traffic over the Tor network.
+
+Tor Browser then encrypts her website request three times and sends it to the first Tor relay in her circuit.
+
+The first relay removes the first encryption layer but doesn't learn that the destination is Bekele’s website.
+
+The first relay learns only the next location in the circuit, which is the second relay.
+
+The second relay removes another encryption layer and forwards the web page request to the third relay.
+
+The third relay removes the last encryption layer and forwards the web page request to its destination, Bekele’s website, but it doesn't know the request comes from Amal.
+
+Bekele doesn't know that the website request came from Amal unless she tells him so.
+
+## 7. Who uses Tor?
+
+People all over the world use Tor to protect their privacy and access the web freely.
+
+Tor helps protect journalists, human rights defenders, domestic violence victims, academic researchers, and anyone experiencing tracking, censorship, or surveillance.
+
+## 6. Why trust Tor?
+
+Tor is designed for privacy. We don’t know who our users are, and we don't keep logs of user activity.
+
+Tor relay operators cannot reveal the true identity of Tor users.
+
+Continual peer review of Tor's source code by academic and open source communities ensures that there are no backdoors in Tor, and our social contract promises that we will never backdoor Tor.
+
+## 7. Join the Tor community
+
+Tor is made possible by a diverse set of users, developers, relay operators, and advocates from around the world.
+
+We need your help to make Tor more usable and secure for people everywhere.
+
+You can volunteer with Tor by writing code, running a relay, creating documentation, offering user support, or telling people in your community about Tor.
+
+The Tor community is governed by a code of conduct, and we outline our set of promises to the community in our social contract.
+
+Learn more about Tor by visiting our website, our wiki, finding us on IRC, joining one of our mailing lists, or signing up for Tor News at newsletter.torproject.org.
+
+
+## 8. Download Tor
+
+Tor for Desktop
+torproject.org/download
+
+TOR ON MOBILE
+### Android
+Tor Browser for Android is available from GooglePlay.
+
+### iOS
+Onion Browser, developed by M. Tigas, is the only browser we recommend for iOS.
+
diff --git a/bn.po b/bn.po
new file mode 100644
index 000000000..3b96d6221
--- /dev/null
+++ b/bn.po
@@ -0,0 +1,162 @@
+# টর প্রসার উপাদান 2019-2020
+
+# 1. গোপনীয়তার জন্য টর
+
+### গোপনীয়তা একটি মানুষের অধিকার
+
+আমাদের অনেকের মত, আলেশা তার বেশিরভাগ সময় অনলাইনে ব্যয় করেন--বন্ধুদের সাথে যোগাযোগ, সোশ্যাল মিডিয়ায় পোস্ট করা এবং ওয়েব ব্রাউজ করা ।
+
+কিন্তু ইদানীং, তিনি লক্ষ্য করেছেন যে তার আগের অনুসন্ধানে সম্পর্কিত বিজ্ঞাপন অনলাইনে তার পিছু নিয়েছে ।
+
+এই খুব আক্রমণাত্মক মতানুযায়ী যে তিনি অনলাইন বিজ্ঞাপনে কিছু গবেষণা করেন এবং জানতে পারেন যে এটা শুধু বিজ্ঞাপনদাতাদের তার ট্র্যাকিং কিন্তু তার আইএসপি, বিশ্লেষণ কোম্পানি, সামাজিক মিডিয়া প্ল্যাটফর্ম, এবং আরো.
+
+আলেশা তার তথ্য সংগ্রহ করে না এমন সফটওয়্যার খুঁজে পেতে এবং ব্যবহার করতে চান, তাকে ট্র্যাক করে না এবং অন্যান্য পরিষেবাগুলিকে তার সম্পর্কে গোপনীয় কিছু বলবে না ।
+
+সে একটি স্থানীয় হাকারস্পেস এ একটি প্রাইভেসি ট্রেনিং যায় এবং **টর ব্রাউজার** সম্পর্কে জানতে পারে, একমাত্র ওয়েব ব্রাউজার যা তাকে বেনামে ব্রাউজ করতে অনুমতি দেয় ।
+
+---
+
+# 2.TOR FOR FEMINISTS
+
+### The future is cyberfeminist
+
+ফেরন্দা ব্রাজিলে প্রজনন অধিকারের উপর নারীদের সম্মিলিত মনোযোগ প্রদান করে, যেখানে গর্ভপাত অবৈধ
+
+ফেরন্দা এবং তার সহকর্মীরা একটি ওয়েবসাইট তৈরি করেছেন, যার মধ্যে রয়েছে গর্ভপাত সুবিধা, জন্ম নিয়ন্ত্রণ এবং মানুষের প্রজনন সংক্রান্ত চাওয়া তথ্য।
+
+If this website was linked back to them, they could be arrested--or worse.
+
+নিজেদের রক্ষা করার জন্য, ফেরনন্দ এবং তার সহকর্মীরা টর **onion services** ব্যবহার করে ওয়েবসাইটটি তৈরি করেছে । Onion Services শুধুমাত্র তাদের সার্ভার অপারেটর হিসাবে আবিষ্কৃত হওয়া থেকে রক্ষা করা হয় না, কিন্তু তারা টর ব্রাউজার ব্যবহার করে তাদের ওয়েবসাইটে দর্শকদের রক্ষা করতে সহায়তা করে.
+
+আসলে, ফেরন্দা তার সব ওয়েব ব্রাউজিংয়ের জন্য **টর ব্রাউজারটি** ব্যবহার করে কেবল নিরাপদ দিকে থাকতে।
+
+তিনি একটি টর-চালিত অ্যাপ ব্যবহার করেন **OnionShare** অন্য কর্মীদেরকে নিরাপদে ও ব্যক্তিগত ভাবে ফাইল পাঠাতে ।
+
+### ফেরন্দার মতো প্রজনন অধিকার কর্মীরা মৌলিক স্বাধীনতার জন্য লড়াই করছে, আর টর তাদের প্রতিরোধ ক্ষমতা বাড়াতে সাহায্য করছে ।
+
+---
+
+# 3. মানবাধিকারের জন্য টর
+
+### Water is life
+
+জেলানি একটি ছোট্ট গ্রামে বসবাস করে যার মধ্যো দিয়ে বিস্তৃত নদী চলে।
+
+এই নদী তার পূর্বপুরুষদের সময় থেকে তার সম্প্রদায়ের জন্য পানি সরবরাহ করেছে ।
+
+কিন্তু বর্তমানে, জেলানীর নদী অঞ্চলে তেলের জন্য শক্তিশালী বহুজাতিক কোম্পানিগুলো ড্রিলিং-এর মাধ্যমে হুমকির মুখে পড়েছে ।
+
+Private security firms, paid for by these companies, use powerful surveillance mechanisms to monitor the online activities of Jelani and his neighbors in the village who are organizing to protect their sacred river.
+
+Jelani uses **Tor Browser** to prevent these companies from watching as he visits websites for international human rights protection and legal aid and writes blog posts about the resistance movement in his village.
+
+He also uses **OnionShare** and **SecureDrop** to securely send documents to journalists who are helping expose these human rights violations.
+
+এই সমস্ত সফ্টওয়্যার টর ব্যবহার করে জেলানির গোপনীয়তা রক্ষায় সাহায্য করার জন্য ।
+
+### জেলানি মত মানবাধিকার কর্মীরা তাদের সম্প্রদায়ের মধ্যে ন্যায়বিচারের জন্য লড়াই করছে, এবং টর তাদের প্রতিরোধ ক্ষমতাকে শক্তিশালী করে।
+
+---
+
+# 4. এন্টি-সেন্সরশীপের জন্য টর
+
+### প্রাচীর না সেতু নির্মাণ
+
+জিন তার পরিবার থেকে দূরে একটি দেশে প্রথমবারের মতো ভ্রমণ করছিলেন।
+
+একটি হোটেলে পৌঁছানোর পর, তিনি তার ল্যাপটপ খোলেন।
+
+তিনি এতটাই অবসন্ন ছিলেন যে, যখন বার্তা "কানেকশন শেষ হয়ে গেছে " প্রথমে তার ওয়েব ব্রাউজারে দেখা গিয়েছিল, তিনি ভেবেছিলেন এটি তার নিজের ভুলের কারণে হয়েছে ।
+
+কিন্তু বার বার চেষ্টা করার পর, তিনি বুঝতে পেরেছিলেন যে তার ইমেল প্রদানকারী, একটি নিউজ ওয়েবসাইট, এবং অনেক অ্যাপ্লিকেশন অনুপলব্ধ ছিল।
+
+He had heard that this country censors the internet and wondered if that was happening.
+How could he contact his family from behind this impenetrable wall?
+After doing some web searches, he found a forum and read about VPNs, private services that allow you to connect to another uncensored network.
+
+জেলানি সবথেকে সেরা সস্তা ভিপিএন কোনটা বুঝতে আধা ঘন্টা চেষ্টা করে ।
+
+তিনি একটিকে বেছে নেন এবং এক মুহূর্তের জন্য এটি কাজ করতে লাগল, কিন্তু পাঁচ মিনিটের পরে সংযোগটি অফলাইন হয়ে গেল এবং ভিপিএন আর সংযুক্ত হয় না।
+
+জেলানি অন্যান্য অপশন খুঁজে পেতে পড়তে থাকে এবং টর ব্রাউজার সম্পর্কে শিখে এবং কিভাবে এটি সেন্সরশিপ আরোপ করতে পারে।
+
+প্রোগ্রাম ডাউনলোড করার জন্য তিনি একটি অফিসিয়াল ওয়েবসাইট মিররকে খুঁজে পেয়েছেন ।
+
+When he opened **Tor Browser**, he followed the prompts for censored users and connected to a bridge which allowed him to access the internet again.
+
+With Tor Browser, Jean can browse freely and privately and contact his family.
+
+### Censored users all over the world rely on Tor Browser for a free, stable, and uncensored way to access the internet.
+
+---
+
+# 5. শেয়ারকৃত শাখাসমঠা
+
+## টর কি জিনিস ?
+
+টর মুক্ত সফটওয়্যার এবং একটি খোলা নেটওয়ার্ক যা অনলাইনে ট্র্যাকিং, নজরদারি এবং সেন্সরশিপ থেকে রক্ষা করতে সাহায্য করে ।
+টর এর জন্য তৈরি করা হয় 501(C)3 আমেরিকা ভিত্তিক অলাভজনক ' টর প্রজেক্ট ' ।
+
+টর ব্যবহার করার সবচেয়ে সহজ উপায় হল টর ব্রাউজার ।
+আপনি যখন টর ব্রাউজার ব্যবহার করেন, তখন কেউ দেখতে পায় না আপনি কি ওয়েবসাইট দেখেন বা আপনি বিশ্বের কোথা থেকে এসেছেন।
+
+Other applications, like SecureDrop and OnionShare, use Tor to protect their users against surveillance and censorship.
+
+
+## 6. How does Tor work?
+
+Amal wants to visit Bekele’s website privately, so she opens Tor Browser.
+
+Tor Browser selects a random circuit of three relays, which are computers all over the world configured to route traffic over the Tor network.
+
+Tor Browser then encrypts her website request three times and sends it to the first Tor relay in her circuit.
+
+The first relay removes the first encryption layer but doesn't learn that the destination is Bekele’s website.
+
+The first relay learns only the next location in the circuit, which is the second relay.
+
+The second relay removes another encryption layer and forwards the web page request to the third relay.
+
+The third relay removes the last encryption layer and forwards the web page request to its destination, Bekele’s website, but it doesn't know the request comes from Amal.
+
+Bekele doesn't know that the website request came from Amal unless she tells him so.
+
+## 7. Who uses Tor?
+
+People all over the world use Tor to protect their privacy and access the web freely.
+
+Tor helps protect journalists, human rights defenders, domestic violence victims, academic researchers, and anyone experiencing tracking, censorship, or surveillance.
+
+## 6. Why trust Tor?
+
+Tor is designed for privacy. We don’t know who our users are, and we don't keep logs of user activity.
+
+Tor relay operators cannot reveal the true identity of Tor users.
+
+Continual peer review of Tor's source code by academic and open source communities ensures that there are no backdoors in Tor, and our social contract promises that we will never backdoor Tor.
+
+## 7. Join the Tor community
+
+Tor is made possible by a diverse set of users, developers, relay operators, and advocates from around the world.
+
+We need your help to make Tor more usable and secure for people everywhere.
+
+You can volunteer with Tor by writing code, running a relay, creating documentation, offering user support, or telling people in your community about Tor.
+
+The Tor community is governed by a code of conduct, and we outline our set of promises to the community in our social contract.
+
+Learn more about Tor by visiting our website, our wiki, finding us on IRC, joining one of our mailing lists, or signing up for Tor News at newsletter.torproject.org.
+
+
+## 8. Download Tor
+
+Tor for Desktop
+torproject.org/download
+
+TOR ON MOBILE
+### Android
+Tor Browser for Android is available from GooglePlay.
+
+### iOS
+Onion Browser, developed by M. Tigas, is the only browser we recommend for iOS.
+
diff --git a/bo.po b/bo.po
new file mode 100644
index 000000000..6c8fce0dc
--- /dev/null
+++ b/bo.po
@@ -0,0 +1,162 @@
+# Tor Outreach Material 2019-2020
+
+# 1. TOR FOR PRIVACY
+
+### Privacy is a human right
+
+Like many of us, Aleisha spends most of her time online--connecting with friends, posting on social media, and browsing the web.
+
+But lately, she's noticed that advertisements related to her previous searches are following her around online.
+
+This feels so invasive that she does some research on online ads and learns that it's not just advertisers tracking her but also her ISP, analytics companies, social media platforms, and more.
+
+Aleisha decides she wants to find and use software that doesn't collect her data, doesn't track her, and doesn't tell other services anything private about her.
+
+She goes to a privacy training at a local hackerspace and learns about **Tor Browser**, the only web browser that allows her to browse anonymously.
+
+---
+
+# 2.TOR FOR FEMINISTS
+
+### The future is cyberfeminist
+
+Fernanda runs a women's collective focused on reproductive rights in Brazil, where abortion is illegal.
+
+Fernanda and her colleagues built a website with information about abortion access, birth control, and other resources for people seeking reproductive information.
+
+If this website was linked back to them, they could be arrested--or worse.
+
+To protect themselves, Fernanda and her colleagues created the website using Tor **onion services**. Onion services not only protect them from being discovered as the operators of the server but also help protect visitors to their website by requiring they use Tor Browser.
+
+In fact, Fernanda uses **Tor Browser** for all of her web browsing just to be on the safe side.
+
+She also uses a Tor-powered app called **OnionShare** to send files to other activists securely and privately.
+
+### Reproductive rights activists like Fernanda are fighting for fundamental freedoms, and Tor helps power their resistance.
+
+---
+
+# 3. TOR FOR HUMAN RIGHTS
+
+### Water is life
+
+Jelani lives in a small village which a wide river runs through.
+
+This river has provided water to his community since the days of his ancestors.
+
+But today, Jelani’s river is threatened by powerful multinational companies drilling for oil in the region.
+
+Private security firms, paid for by these companies, use powerful surveillance mechanisms to monitor the online activities of Jelani and his neighbors in the village who are organizing to protect their sacred river.
+
+Jelani uses **Tor Browser** to prevent these companies from watching as he visits websites for international human rights protection and legal aid and writes blog posts about the resistance movement in his village.
+
+He also uses **OnionShare** and **SecureDrop** to securely send documents to journalists who are helping expose these human rights violations.
+
+All of this software uses Tor to help protect Jelani’s privacy.
+
+### Human rights activists like Jelani are fighting for justice in their communities, and Tor helps power their resistance.
+
+---
+
+# 4. TOR FOR ANTI-CENSORSHIP
+
+### Build bridges not walls
+
+Jean was traveling for the first time to a country far from his family.
+
+After arriving at a hotel, he opened his laptop.
+
+He was so exhausted that when the message "Connection has timed out" first appeared on his web browser, he thought it was due to his own error.
+
+But after trying again and again, he realized that his email provider, a news website, and many apps were unavailable.
+
+He had heard that this country censors the internet and wondered if that was happening.
+How could he contact his family from behind this impenetrable wall?
+After doing some web searches, he found a forum and read about VPNs, private services that allow you to connect to another uncensored network.
+
+Jean spent half an hour trying to figure out which cheap VPN was best.
+
+He chose one and for a moment it seemed to work, but after five minutes the connection went offline and the VPN would no longer connect.
+
+Jean kept reading to find other options and learned about Tor Browser and how it can circumvent censorship.
+
+He found an official website mirror to download the program.
+
+When he opened **Tor Browser**, he followed the prompts for censored users and connected to a bridge which allowed him to access the internet again.
+
+With Tor Browser, Jean can browse freely and privately and contact his family.
+
+### Censored users all over the world rely on Tor Browser for a free, stable, and uncensored way to access the internet.
+
+---
+
+# 5. Shared Sections
+
+## What is Tor?
+
+Tor is free software and an open network that helps protect you from tracking, surveillance, and censorship online.
+Tor is created for free by a 501(c)3 U.S.-based nonprofit called the Tor Project.
+
+The easiest way to use Tor is Tor Browser.
+When you use Tor Browser, no one can see what websites you visit or where in the world you’re coming from.
+
+Other applications, like SecureDrop and OnionShare, use Tor to protect their users against surveillance and censorship.
+
+
+## 6. How does Tor work?
+
+Amal wants to visit Bekele’s website privately, so she opens Tor Browser.
+
+Tor Browser selects a random circuit of three relays, which are computers all over the world configured to route traffic over the Tor network.
+
+Tor Browser then encrypts her website request three times and sends it to the first Tor relay in her circuit.
+
+The first relay removes the first encryption layer but doesn't learn that the destination is Bekele’s website.
+
+The first relay learns only the next location in the circuit, which is the second relay.
+
+The second relay removes another encryption layer and forwards the web page request to the third relay.
+
+The third relay removes the last encryption layer and forwards the web page request to its destination, Bekele’s website, but it doesn't know the request comes from Amal.
+
+Bekele doesn't know that the website request came from Amal unless she tells him so.
+
+## 7. Who uses Tor?
+
+People all over the world use Tor to protect their privacy and access the web freely.
+
+Tor helps protect journalists, human rights defenders, domestic violence victims, academic researchers, and anyone experiencing tracking, censorship, or surveillance.
+
+## 6. Why trust Tor?
+
+Tor is designed for privacy. We don’t know who our users are, and we don't keep logs of user activity.
+
+Tor relay operators cannot reveal the true identity of Tor users.
+
+Continual peer review of Tor's source code by academic and open source communities ensures that there are no backdoors in Tor, and our social contract promises that we will never backdoor Tor.
+
+## 7. Join the Tor community
+
+Tor is made possible by a diverse set of users, developers, relay operators, and advocates from around the world.
+
+We need your help to make Tor more usable and secure for people everywhere.
+
+You can volunteer with Tor by writing code, running a relay, creating documentation, offering user support, or telling people in your community about Tor.
+
+The Tor community is governed by a code of conduct, and we outline our set of promises to the community in our social contract.
+
+Learn more about Tor by visiting our website, our wiki, finding us on IRC, joining one of our mailing lists, or signing up for Tor News at newsletter.torproject.org.
+
+
+## 8. Download Tor
+
+Tor for Desktop
+torproject.org/download
+
+TOR ON MOBILE
+### Android
+Tor Browser for Android is available from GooglePlay.
+
+### iOS
+Onion Browser, developed by M. Tigas, is the only browser we recommend for iOS.
+
diff --git a/br.po b/br.po
new file mode 100644
index 000000000..6c8fce0dc
--- /dev/null
+++ b/br.po
@@ -0,0 +1,162 @@
+# Tor Outreach Material 2019-2020
+
+# 1. TOR FOR PRIVACY
+
+### Privacy is a human right
+
+Like many of us, Aleisha spends most of her time online--connecting with friends, posting on social media, and browsing the web.
+
+But lately, she's noticed that advertisements related to her previous searches are following her around online.
+
+This feels so invasive that she does some research on online ads and learns that it's not just advertisers tracking her but also her ISP, analytics companies, social media platforms, and more.
+
+Aleisha decides she wants to find and use software that doesn't collect her data, doesn't track her, and doesn't tell other services anything private about her.
+
+She goes to a privacy training at a local hackerspace and learns about **Tor Browser**, the only web browser that allows her to browse anonymously.
+
+---
+
+# 2.TOR FOR FEMINISTS
+
+### The future is cyberfeminist
+
+Fernanda runs a women's collective focused on reproductive rights in Brazil, where abortion is illegal.
+
+Fernanda and her colleagues built a website with information about abortion access, birth control, and other resources for people seeking reproductive information.
+
+If this website was linked back to them, they could be arrested--or worse.
+
+To protect themselves, Fernanda and her colleagues created the website using Tor **onion services**. Onion services not only protect them from being discovered as the operators of the server but also help protect visitors to their website by requiring they use Tor Browser.
+
+In fact, Fernanda uses **Tor Browser** for all of her web browsing just to be on the safe side.
+
+She also uses a Tor-powered app called **OnionShare** to send files to other activists securely and privately.
+
+### Reproductive rights activists like Fernanda are fighting for fundamental freedoms, and Tor helps power their resistance.
+
+---
+
+# 3. TOR FOR HUMAN RIGHTS
+
+### Water is life
+
+Jelani lives in a small village which a wide river runs through.
+
+This river has provided water to his community since the days of his ancestors.
+
+But today, Jelani’s river is threatened by powerful multinational companies drilling for oil in the region.
+
+Private security firms, paid for by these companies, use powerful surveillance mechanisms to monitor the online activities of Jelani and his neighbors in the village who are organizing to protect their sacred river.
+
+Jelani uses **Tor Browser** to prevent these companies from watching as he visits websites for international human rights protection and legal aid and writes blog posts about the resistance movement in his village.
+
+He also uses **OnionShare** and **SecureDrop** to securely send documents to journalists who are helping expose these human rights violations.
+
+All of this software uses Tor to help protect Jelani’s privacy.
+
+### Human rights activists like Jelani are fighting for justice in their communities, and Tor helps power their resistance.
+
+---
+
+# 4. TOR FOR ANTI-CENSORSHIP
+
+### Build bridges not walls
+
+Jean was traveling for the first time to a country far from his family.
+
+After arriving at a hotel, he opened his laptop.
+
+He was so exhausted that when the message "Connection has timed out" first appeared on his web browser, he thought it was due to his own error.
+
+But after trying again and again, he realized that his email provider, a news website, and many apps were unavailable.
+
+He had heard that this country censors the internet and wondered if that was happening.
+How could he contact his family from behind this impenetrable wall?
+After doing some web searches, he found a forum and read about VPNs, private services that allow you to connect to another uncensored network.
+
+Jean spent half an hour trying to figure out which cheap VPN was best.
+
+He chose one and for a moment it seemed to work, but after five minutes the connection went offline and the VPN would no longer connect.
+
+Jean kept reading to find other options and learned about Tor Browser and how it can circumvent censorship.
+
+He found an official website mirror to download the program.
+
+When he opened **Tor Browser**, he followed the prompts for censored users and connected to a bridge which allowed him to access the internet again.
+
+With Tor Browser, Jean can browse freely and privately and contact his family.
+
+### Censored users all over the world rely on Tor Browser for a free, stable, and uncensored way to access the internet.
+
+---
+
+# 5. Shared Sections
+
+## What is Tor?
+
+Tor is free software and an open network that helps protect you from tracking, surveillance, and censorship online.
+Tor is created for free by a 501(c)3 U.S.-based nonprofit called the Tor Project.
+
+The easiest way to use Tor is Tor Browser.
+When you use Tor Browser, no one can see what websites you visit or where in the world you’re coming from.
+
+Other applications, like SecureDrop and OnionShare, use Tor to protect their users against surveillance and censorship.
+
+
+## 6. How does Tor work?
+
+Amal wants to visit Bekele’s website privately, so she opens Tor Browser.
+
+Tor Browser selects a random circuit of three relays, which are computers all over the world configured to route traffic over the Tor network.
+
+Tor Browser then encrypts her website request three times and sends it to the first Tor relay in her circuit.
+
+The first relay removes the first encryption layer but doesn't learn that the destination is Bekele’s website.
+
+The first relay learns only the next location in the circuit, which is the second relay.
+
+The second relay removes another encryption layer and forwards the web page request to the third relay.
+
+The third relay removes the last encryption layer and forwards the web page request to its destination, Bekele’s website, but it doesn't know the request comes from Amal.
+
+Bekele doesn't know that the website request came from Amal unless she tells him so.
+
+## 7. Who uses Tor?
+
+People all over the world use Tor to protect their privacy and access the web freely.
+
+Tor helps protect journalists, human rights defenders, domestic violence victims, academic researchers, and anyone experiencing tracking, censorship, or surveillance.
+
+## 6. Why trust Tor?
+
+Tor is designed for privacy. We don’t know who our users are, and we don't keep logs of user activity.
+
+Tor relay operators cannot reveal the true identity of Tor users.
+
+Continual peer review of Tor's source code by academic and open source communities ensures that there are no backdoors in Tor, and our social contract promises that we will never backdoor Tor.
+
+## 7. Join the Tor community
+
+Tor is made possible by a diverse set of users, developers, relay operators, and advocates from around the world.
+
+We need your help to make Tor more usable and secure for people everywhere.
+
+You can volunteer with Tor by writing code, running a relay, creating documentation, offering user support, or telling people in your community about Tor.
+
+The Tor community is governed by a code of conduct, and we outline our set of promises to the community in our social contract.
+
+Learn more about Tor by visiting our website, our wiki, finding us on IRC, joining one of our mailing lists, or signing up for Tor News at newsletter.torproject.org.
+
+
+## 8. Download Tor
+
+Tor for Desktop
+torproject.org/download
+
+TOR ON MOBILE
+### Android
+Tor Browser for Android is available from GooglePlay.
+
+### iOS
+Onion Browser, developed by M. Tigas, is the only browser we recommend for iOS.
+
diff --git a/bs.po b/bs.po
new file mode 100644
index 000000000..6c8fce0dc
--- /dev/null
+++ b/bs.po
@@ -0,0 +1,162 @@
+# Tor Outreach Material 2019-2020
+
+# 1. TOR FOR PRIVACY
+
+### Privacy is a human right
+
+Like many of us, Aleisha spends most of her time online--connecting with friends, posting on social media, and browsing the web.
+
+But lately, she's noticed that advertisements related to her previous searches are following her around online.
+
+This feels so invasive that she does some research on online ads and learns that it's not just advertisers tracking her but also her ISP, analytics companies, social media platforms, and more.
+
+Aleisha decides she wants to find and use software that doesn't collect her data, doesn't track her, and doesn't tell other services anything private about her.
+
+She goes to a privacy training at a local hackerspace and learns about **Tor Browser**, the only web browser that allows her to browse anonymously.
+
+---
+
+# 2.TOR FOR FEMINISTS
+
+### The future is cyberfeminist
+
+Fernanda runs a women's collective focused on reproductive rights in Brazil, where abortion is illegal.
+
+Fernanda and her colleagues built a website with information about abortion access, birth control, and other resources for people seeking reproductive information.
+
+If this website was linked back to them, they could be arrested--or worse.
+
+To protect themselves, Fernanda and her colleagues created the website using Tor **onion services**. Onion services not only protect them from being discovered as the operators of the server but also help protect visitors to their website by requiring they use Tor Browser.
+
+In fact, Fernanda uses **Tor Browser** for all of her web browsing just to be on the safe side.
+
+She also uses a Tor-powered app called **OnionShare** to send files to other activists securely and privately.
+
+### Reproductive rights activists like Fernanda are fighting for fundamental freedoms, and Tor helps power their resistance.
+
+---
+
+# 3. TOR FOR HUMAN RIGHTS
+
+### Water is life
+
+Jelani lives in a small village which a wide river runs through.
+
+This river has provided water to his community since the days of his ancestors.
+
+But today, Jelani’s river is threatened by powerful multinational companies drilling for oil in the region.
+
+Private security firms, paid for by these companies, use powerful surveillance mechanisms to monitor the online activities of Jelani and his neighbors in the village who are organizing to protect their sacred river.
+
+Jelani uses **Tor Browser** to prevent these companies from watching as he visits websites for international human rights protection and legal aid and writes blog posts about the resistance movement in his village.
+
+He also uses **OnionShare** and **SecureDrop** to securely send documents to journalists who are helping expose these human rights violations.
+
+All of this software uses Tor to help protect Jelani’s privacy.
+
+### Human rights activists like Jelani are fighting for justice in their communities, and Tor helps power their resistance.
+
+---
+
+# 4. TOR FOR ANTI-CENSORSHIP
+
+### Build bridges not walls
+
+Jean was traveling for the first time to a country far from his family.
+
+After arriving at a hotel, he opened his laptop.
+
+He was so exhausted that when the message "Connection has timed out" first appeared on his web browser, he thought it was due to his own error.
+
+But after trying again and again, he realized that his email provider, a news website, and many apps were unavailable.
+
+He had heard that this country censors the internet and wondered if that was happening.
+How could he contact his family from behind this impenetrable wall?
+After doing some web searches, he found a forum and read about VPNs, private services that allow you to connect to another uncensored network.
+
+Jean spent half an hour trying to figure out which cheap VPN was best.
+
+He chose one and for a moment it seemed to work, but after five minutes the connection went offline and the VPN would no longer connect.
+
+Jean kept reading to find other options and learned about Tor Browser and how it can circumvent censorship.
+
+He found an official website mirror to download the program.
+
+When he opened **Tor Browser**, he followed the prompts for censored users and connected to a bridge which allowed him to access the internet again.
+
+With Tor Browser, Jean can browse freely and privately and contact his family.
+
+### Censored users all over the world rely on Tor Browser for a free, stable, and uncensored way to access the internet.
+
+---
+
+# 5. Shared Sections
+
+## What is Tor?
+
+Tor is free software and an open network that helps protect you from tracking, surveillance, and censorship online.
+Tor is created for free by a 501(c)3 U.S.-based nonprofit called the Tor Project.
+
+The easiest way to use Tor is Tor Browser.
+When you use Tor Browser, no one can see what websites you visit or where in the world you’re coming from.
+
+Other applications, like SecureDrop and OnionShare, use Tor to protect their users against surveillance and censorship.
+
+
+## 6. How does Tor work?
+
+Amal wants to visit Bekele’s website privately, so she opens Tor Browser.
+
+Tor Browser selects a random circuit of three relays, which are computers all over the world configured to route traffic over the Tor network.
+
+Tor Browser then encrypts her website request three times and sends it to the first Tor relay in her circuit.
+
+The first relay removes the first encryption layer but doesn't learn that the destination is Bekele’s website.
+
+The first relay learns only the next location in the circuit, which is the second relay.
+
+The second relay removes another encryption layer and forwards the web page request to the third relay.
+
+The third relay removes the last encryption layer and forwards the web page request to its destination, Bekele’s website, but it doesn't know the request comes from Amal.
+
+Bekele doesn't know that the website request came from Amal unless she tells him so.
+
+## 7. Who uses Tor?
+
+People all over the world use Tor to protect their privacy and access the web freely.
+
+Tor helps protect journalists, human rights defenders, domestic violence victims, academic researchers, and anyone experiencing tracking, censorship, or surveillance.
+
+## 6. Why trust Tor?
+
+Tor is designed for privacy. We don’t know who our users are, and we don't keep logs of user activity.
+
+Tor relay operators cannot reveal the true identity of Tor users.
+
+Continual peer review of Tor's source code by academic and open source communities ensures that there are no backdoors in Tor, and our social contract promises that we will never backdoor Tor.
+
+## 7. Join the Tor community
+
+Tor is made possible by a diverse set of users, developers, relay operators, and advocates from around the world.
+
+We need your help to make Tor more usable and secure for people everywhere.
+
+You can volunteer with Tor by writing code, running a relay, creating documentation, offering user support, or telling people in your community about Tor.
+
+The Tor community is governed by a code of conduct, and we outline our set of promises to the community in our social contract.
+
+Learn more about Tor by visiting our website, our wiki, finding us on IRC, joining one of our mailing lists, or signing up for Tor News at newsletter.torproject.org.
+
+
+## 8. Download Tor
+
+Tor for Desktop
+torproject.org/download
+
+TOR ON MOBILE
+### Android
+Tor Browser for Android is available from GooglePlay.
+
+### iOS
+Onion Browser, developed by M. Tigas, is the only browser we recommend for iOS.
+
diff --git a/ca.po b/ca.po
new file mode 100644
index 000000000..3715997b5
--- /dev/null
+++ b/ca.po
@@ -0,0 +1,162 @@
+# Tor Outreach Material 2019-2020
+
+# 1. TOR FOR PRIVACY
+
+### Privacy is a human right
+
+Like many of us, Aleisha spends most of her time online--connecting with friends, posting on social media, and browsing the web.
+
+But lately, she's noticed that advertisements related to her previous searches are following her around online.
+
+This feels so invasive that she does some research on online ads and learns that it's not just advertisers tracking her but also her ISP, analytics companies, social media platforms, and more.
+
+Aleisha decides she wants to find and use software that doesn't collect her data, doesn't track her, and doesn't tell other services anything private about her.
+
+She goes to a privacy training at a local hackerspace and learns about **Tor Browser**, the only web browser that allows her to browse anonymously.
+
+---
+
+# 2.TOR FOR FEMINISTS
+
+### The future is cyberfeminist
+
+Fernanda runs a women's collective focused on reproductive rights in Brazil, where abortion is illegal.
+
+Fernanda and her colleagues built a website with information about abortion access, birth control, and other resources for people seeking reproductive information.
+
+If this website was linked back to them, they could be arrested--or worse.
+
+To protect themselves, Fernanda and her colleagues created the website using Tor **onion services**. Onion services not only protect them from being discovered as the operators of the server but also help protect visitors to their website by requiring they use Tor Browser.
+
+In fact, Fernanda uses **Tor Browser** for all of her web browsing just to be on the safe side.
+
+She also uses a Tor-powered app called **OnionShare** to send files to other activists securely and privately.
+
+### Reproductive rights activists like Fernanda are fighting for fundamental freedoms, and Tor helps power their resistance.
+
+---
+
+# 3. TOR FOR HUMAN RIGHTS
+
+### Water is life
+
+Jelani lives in a small village which a wide river runs through.
+
+This river has provided water to his community since the days of his ancestors.
+
+But today, Jelani’s river is threatened by powerful multinational companies drilling for oil in the region.
+
+Private security firms, paid for by these companies, use powerful surveillance mechanisms to monitor the online activities of Jelani and his neighbors in the village who are organizing to protect their sacred river.
+
+Jelani uses **Tor Browser** to prevent these companies from watching as he visits websites for international human rights protection and legal aid and writes blog posts about the resistance movement in his village.
+
+He also uses **OnionShare** and **SecureDrop** to securely send documents to journalists who are helping expose these human rights violations.
+
+All of this software uses Tor to help protect Jelani’s privacy.
+
+### Human rights activists like Jelani are fighting for justice in their communities, and Tor helps power their resistance.
+
+---
+
+# 4. TOR FOR ANTI-CENSORSHIP
+
+### Build bridges not walls
+
+Jean was traveling for the first time to a country far from his family.
+
+After arriving at a hotel, he opened his laptop.
+
+He was so exhausted that when the message "Connection has timed out" first appeared on his web browser, he thought it was due to his own error.
+
+But after trying again and again, he realized that his email provider, a news website, and many apps were unavailable.
+
+He had heard that this country censors the internet and wondered if that was happening.
+How could he contact his family from behind this impenetrable wall?
+After doing some web searches, he found a forum and read about VPNs, private services that allow you to connect to another uncensored network.
+
+Jean spent half an hour trying to figure out which cheap VPN was best.
+
+He chose one and for a moment it seemed to work, but after five minutes the connection went offline and the VPN would no longer connect.
+
+Jean kept reading to find other options and learned about Tor Browser and how it can circumvent censorship.
+
+He found an official website mirror to download the program.
+
+When he opened **Tor Browser**, he followed the prompts for censored users and connected to a bridge which allowed him to access the internet again.
+
+With Tor Browser, Jean can browse freely and privately and contact his family.
+
+### Censored users all over the world rely on Tor Browser for a free, stable, and uncensored way to access the internet.
+
+---
+
+# 5. Shared Sections
+
+## Què és Tor?
+
+Tor is free software and an open network that helps protect you from tracking, surveillance, and censorship online.
+Tor is created for free by a 501(c)3 U.S.-based nonprofit called the Tor Project.
+
+The easiest way to use Tor is Tor Browser.
+When you use Tor Browser, no one can see what websites you visit or where in the world you’re coming from.
+
+Other applications, like SecureDrop and OnionShare, use Tor to protect their users against surveillance and censorship.
+
+
+## 6. How does Tor work?
+
+Amal wants to visit Bekele’s website privately, so she opens Tor Browser.
+
+Tor Browser selects a random circuit of three relays, which are computers all over the world configured to route traffic over the Tor network.
+
+Tor Browser then encrypts her website request three times and sends it to the first Tor relay in her circuit.
+
+The first relay removes the first encryption layer but doesn't learn that the destination is Bekele’s website.
+
+The first relay learns only the next location in the circuit, which is the second relay.
+
+The second relay removes another encryption layer and forwards the web page request to the third relay.
+
+The third relay removes the last encryption layer and forwards the web page request to its destination, Bekele’s website, but it doesn't know the request comes from Amal.
+
+Bekele doesn't know that the website request came from Amal unless she tells him so.
+
+## 7. Who uses Tor?
+
+People all over the world use Tor to protect their privacy and access the web freely.
+
+Tor helps protect journalists, human rights defenders, domestic violence victims, academic researchers, and anyone experiencing tracking, censorship, or surveillance.
+
+## 6. Why trust Tor?
+
+Tor is designed for privacy. We don’t know who our users are, and we don't keep logs of user activity.
+
+Tor relay operators cannot reveal the true identity of Tor users.
+
+Continual peer review of Tor's source code by academic and open source communities ensures that there are no backdoors in Tor, and our social contract promises that we will never backdoor Tor.
+
+## 7. Join the Tor community
+
+Tor is made possible by a diverse set of users, developers, relay operators, and advocates from around the world.
+
+We need your help to make Tor more usable and secure for people everywhere.
+
+You can volunteer with Tor by writing code, running a relay, creating documentation, offering user support, or telling people in your community about Tor.
+
+The Tor community is governed by a code of conduct, and we outline our set of promises to the community in our social contract.
+
+Learn more about Tor by visiting our website, our wiki, finding us on IRC, joining one of our mailing lists, or signing up for Tor News at newsletter.torproject.org.
+
+
+## 8. Download Tor
+
+Tor for Desktop
+torproject.org/download
+
+TOR ON MOBILE
+### Android
+Tor Browser for Android is available from GooglePlay.
+
+### iOS
+Onion Browser, developed by M. Tigas, is the only browser we recommend for iOS.
+
diff --git a/ceb.po b/ceb.po
new file mode 100644
index 000000000..6c8fce0dc
--- /dev/null
+++ b/ceb.po
@@ -0,0 +1,162 @@
+# Tor Outreach Material 2019-2020
+
+# 1. TOR FOR PRIVACY
+
+### Privacy is a human right
+
+Like many of us, Aleisha spends most of her time online--connecting with friends, posting on social media, and browsing the web.
+
+But lately, she's noticed that advertisements related to her previous searches are following her around online.
+
+This feels so invasive that she does some research on online ads and learns that it's not just advertisers tracking her but also her ISP, analytics companies, social media platforms, and more.
+
+Aleisha decides she wants to find and use software that doesn't collect her data, doesn't track her, and doesn't tell other services anything private about her.
+
+She goes to a privacy training at a local hackerspace and learns about **Tor Browser**, the only web browser that allows her to browse anonymously.
+
+---
+
+# 2.TOR FOR FEMINISTS
+
+### The future is cyberfeminist
+
+Fernanda runs a women's collective focused on reproductive rights in Brazil, where abortion is illegal.
+
+Fernanda and her colleagues built a website with information about abortion access, birth control, and other resources for people seeking reproductive information.
+
+If this website was linked back to them, they could be arrested--or worse.
+
+To protect themselves, Fernanda and her colleagues created the website using Tor **onion services**. Onion services not only protect them from being discovered as the operators of the server but also help protect visitors to their website by requiring they use Tor Browser.
+
+In fact, Fernanda uses **Tor Browser** for all of her web browsing just to be on the safe side.
+
+She also uses a Tor-powered app called **OnionShare** to send files to other activists securely and privately.
+
+### Reproductive rights activists like Fernanda are fighting for fundamental freedoms, and Tor helps power their resistance.
+
+---
+
+# 3. TOR FOR HUMAN RIGHTS
+
+### Water is life
+
+Jelani lives in a small village which a wide river runs through.
+
+This river has provided water to his community since the days of his ancestors.
+
+But today, Jelani’s river is threatened by powerful multinational companies drilling for oil in the region.
+
+Private security firms, paid for by these companies, use powerful surveillance mechanisms to monitor the online activities of Jelani and his neighbors in the village who are organizing to protect their sacred river.
+
+Jelani uses **Tor Browser** to prevent these companies from watching as he visits websites for international human rights protection and legal aid and writes blog posts about the resistance movement in his village.
+
+He also uses **OnionShare** and **SecureDrop** to securely send documents to journalists who are helping expose these human rights violations.
+
+All of this software uses Tor to help protect Jelani’s privacy.
+
+### Human rights activists like Jelani are fighting for justice in their communities, and Tor helps power their resistance.
+
+---
+
+# 4. TOR FOR ANTI-CENSORSHIP
+
+### Build bridges not walls
+
+Jean was traveling for the first time to a country far from his family.
+
+After arriving at a hotel, he opened his laptop.
+
+He was so exhausted that when the message "Connection has timed out" first appeared on his web browser, he thought it was due to his own error.
+
+But after trying again and again, he realized that his email provider, a news website, and many apps were unavailable.
+
+He had heard that this country censors the internet and wondered if that was happening.
+How could he contact his family from behind this impenetrable wall?
+After doing some web searches, he found a forum and read about VPNs, private services that allow you to connect to another uncensored network.
+
+Jean spent half an hour trying to figure out which cheap VPN was best.
+
+He chose one and for a moment it seemed to work, but after five minutes the connection went offline and the VPN would no longer connect.
+
+Jean kept reading to find other options and learned about Tor Browser and how it can circumvent censorship.
+
+He found an official website mirror to download the program.
+
+When he opened **Tor Browser**, he followed the prompts for censored users and connected to a bridge which allowed him to access the internet again.
+
+With Tor Browser, Jean can browse freely and privately and contact his family.
+
+### Censored users all over the world rely on Tor Browser for a free, stable, and uncensored way to access the internet.
+
+---
+
+# 5. Shared Sections
+
+## What is Tor?
+
+Tor is free software and an open network that helps protect you from tracking, surveillance, and censorship online.
+Tor is created for free by a 501(c)3 U.S.-based nonprofit called the Tor Project.
+
+The easiest way to use Tor is Tor Browser.
+When you use Tor Browser, no one can see what websites you visit or where in the world you’re coming from.
+
+Other applications, like SecureDrop and OnionShare, use Tor to protect their users against surveillance and censorship.
+
+
+## 6. How does Tor work?
+
+Amal wants to visit Bekele’s website privately, so she opens Tor Browser.
+
+Tor Browser selects a random circuit of three relays, which are computers all over the world configured to route traffic over the Tor network.
+
+Tor Browser then encrypts her website request three times and sends it to the first Tor relay in her circuit.
+
+The first relay removes the first encryption layer but doesn't learn that the destination is Bekele’s website.
+
+The first relay learns only the next location in the circuit, which is the second relay.
+
+The second relay removes another encryption layer and forwards the web page request to the third relay.
+
+The third relay removes the last encryption layer and forwards the web page request to its destination, Bekele’s website, but it doesn't know the request comes from Amal.
+
+Bekele doesn't know that the website request came from Amal unless she tells him so.
+
+## 7. Who uses Tor?
+
+People all over the world use Tor to protect their privacy and access the web freely.
+
+Tor helps protect journalists, human rights defenders, domestic violence victims, academic researchers, and anyone experiencing tracking, censorship, or surveillance.
+
+## 6. Why trust Tor?
+
+Tor is designed for privacy. We don’t know who our users are, and we don't keep logs of user activity.
+
+Tor relay operators cannot reveal the true identity of Tor users.
+
+Continual peer review of Tor's source code by academic and open source communities ensures that there are no backdoors in Tor, and our social contract promises that we will never backdoor Tor.
+
+## 7. Join the Tor community
+
+Tor is made possible by a diverse set of users, developers, relay operators, and advocates from around the world.
+
+We need your help to make Tor more usable and secure for people everywhere.
+
+You can volunteer with Tor by writing code, running a relay, creating documentation, offering user support, or telling people in your community about Tor.
+
+The Tor community is governed by a code of conduct, and we outline our set of promises to the community in our social contract.
+
+Learn more about Tor by visiting our website, our wiki, finding us on IRC, joining one of our mailing lists, or signing up for Tor News at newsletter.torproject.org.
+
+
+## 8. Download Tor
+
+Tor for Desktop
+torproject.org/download
+
+TOR ON MOBILE
+### Android
+Tor Browser for Android is available from GooglePlay.
+
+### iOS
+Onion Browser, developed by M. Tigas, is the only browser we recommend for iOS.
+
diff --git a/cs.po b/cs.po
new file mode 100644
index 000000000..8c73a9e81
--- /dev/null
+++ b/cs.po
@@ -0,0 +1,162 @@
+# Tor Outreach Material 2019-2020
+
+# 1. TOR FOR PRIVACY
+
+### Privacy is a human right
+
+Like many of us, Aleisha spends most of her time online--connecting with friends, posting on social media, and browsing the web.
+
+But lately, she's noticed that advertisements related to her previous searches are following her around online.
+
+This feels so invasive that she does some research on online ads and learns that it's not just advertisers tracking her but also her ISP, analytics companies, social media platforms, and more.
+
+Aleisha decides she wants to find and use software that doesn't collect her data, doesn't track her, and doesn't tell other services anything private about her.
+
+She goes to a privacy training at a local hackerspace and learns about **Tor Browser**, the only web browser that allows her to browse anonymously.
+
+---
+
+# 2.TOR FOR FEMINISTS
+
+### The future is cyberfeminist
+
+Fernanda runs a women's collective focused on reproductive rights in Brazil, where abortion is illegal.
+
+Fernanda and her colleagues built a website with information about abortion access, birth control, and other resources for people seeking reproductive information.
+
+If this website was linked back to them, they could be arrested--or worse.
+
+To protect themselves, Fernanda and her colleagues created the website using Tor **onion services**. Onion services not only protect them from being discovered as the operators of the server but also help protect visitors to their website by requiring they use Tor Browser.
+
+In fact, Fernanda uses **Tor Browser** for all of her web browsing just to be on the safe side.
+
+She also uses a Tor-powered app called **OnionShare** to send files to other activists securely and privately.
+
+### Reproductive rights activists like Fernanda are fighting for fundamental freedoms, and Tor helps power their resistance.
+
+---
+
+# 3. TOR FOR HUMAN RIGHTS
+
+### Water is life
+
+Jelani lives in a small village which a wide river runs through.
+
+This river has provided water to his community since the days of his ancestors.
+
+But today, Jelani’s river is threatened by powerful multinational companies drilling for oil in the region.
+
+Private security firms, paid for by these companies, use powerful surveillance mechanisms to monitor the online activities of Jelani and his neighbors in the village who are organizing to protect their sacred river.
+
+Jelani uses **Tor Browser** to prevent these companies from watching as he visits websites for international human rights protection and legal aid and writes blog posts about the resistance movement in his village.
+
+He also uses **OnionShare** and **SecureDrop** to securely send documents to journalists who are helping expose these human rights violations.
+
+All of this software uses Tor to help protect Jelani’s privacy.
+
+### Human rights activists like Jelani are fighting for justice in their communities, and Tor helps power their resistance.
+
+---
+
+# 4. TOR FOR ANTI-CENSORSHIP
+
+### Build bridges not walls
+
+Jean was traveling for the first time to a country far from his family.
+
+After arriving at a hotel, he opened his laptop.
+
+He was so exhausted that when the message "Connection has timed out" first appeared on his web browser, he thought it was due to his own error.
+
+But after trying again and again, he realized that his email provider, a news website, and many apps were unavailable.
+
+He had heard that this country censors the internet and wondered if that was happening.
+How could he contact his family from behind this impenetrable wall?
+After doing some web searches, he found a forum and read about VPNs, private services that allow you to connect to another uncensored network.
+
+Jean spent half an hour trying to figure out which cheap VPN was best.
+
+He chose one and for a moment it seemed to work, but after five minutes the connection went offline and the VPN would no longer connect.
+
+Jean kept reading to find other options and learned about Tor Browser and how it can circumvent censorship.
+
+He found an official website mirror to download the program.
+
+When he opened **Tor Browser**, he followed the prompts for censored users and connected to a bridge which allowed him to access the internet again.
+
+With Tor Browser, Jean can browse freely and privately and contact his family.
+
+### Censored users all over the world rely on Tor Browser for a free, stable, and uncensored way to access the internet.
+
+---
+
+# 5. Shared Sections
+
+## Co je Tor?
+
+Tor is free software and an open network that helps protect you from tracking, surveillance, and censorship online.
+Tor is created for free by a 501(c)3 U.S.-based nonprofit called the Tor Project.
+
+The easiest way to use Tor is Tor Browser.
+When you use Tor Browser, no one can see what websites you visit or where in the world you’re coming from.
+
+Other applications, like SecureDrop and OnionShare, use Tor to protect their users against surveillance and censorship.
+
+
+## 6. How does Tor work?
+
+Amal wants to visit Bekele’s website privately, so she opens Tor Browser.
+
+Tor Browser selects a random circuit of three relays, which are computers all over the world configured to route traffic over the Tor network.
+
+Tor Browser then encrypts her website request three times and sends it to the first Tor relay in her circuit.
+
+The first relay removes the first encryption layer but doesn't learn that the destination is Bekele’s website.
+
+The first relay learns only the next location in the circuit, which is the second relay.
+
+The second relay removes another encryption layer and forwards the web page request to the third relay.
+
+The third relay removes the last encryption layer and forwards the web page request to its destination, Bekele’s website, but it doesn't know the request comes from Amal.
+
+Bekele doesn't know that the website request came from Amal unless she tells him so.
+
+## 7. Who uses Tor?
+
+People all over the world use Tor to protect their privacy and access the web freely.
+
+Tor helps protect journalists, human rights defenders, domestic violence victims, academic researchers, and anyone experiencing tracking, censorship, or surveillance.
+
+## 6. Why trust Tor?
+
+Tor is designed for privacy. We don’t know who our users are, and we don't keep logs of user activity.
+
+Tor relay operators cannot reveal the true identity of Tor users.
+
+Continual peer review of Tor's source code by academic and open source communities ensures that there are no backdoors in Tor, and our social contract promises that we will never backdoor Tor.
+
+## 7. Join the Tor community
+
+Tor is made possible by a diverse set of users, developers, relay operators, and advocates from around the world.
+
+We need your help to make Tor more usable and secure for people everywhere.
+
+You can volunteer with Tor by writing code, running a relay, creating documentation, offering user support, or telling people in your community about Tor.
+
+The Tor community is governed by a code of conduct, and we outline our set of promises to the community in our social contract.
+
+Learn more about Tor by visiting our website, our wiki, finding us on IRC, joining one of our mailing lists, or signing up for Tor News at newsletter.torproject.org.
+
+
+## 8. Download Tor
+
+Tor for Desktop
+torproject.org/download
+
+TOR ON MOBILE
+### Android
+Tor Browser for Android is available from GooglePlay.
+
+### iOS
+Onion Browser, developed by M. Tigas, is the only browser we recommend for iOS.
+
diff --git a/cy.po b/cy.po
new file mode 100644
index 000000000..8a84a75c1
--- /dev/null
+++ b/cy.po
@@ -0,0 +1,162 @@
+# Tor Outreach Material 2019-2020
+
+# 1. TOR FOR PRIVACY
+
+### Privacy is a human right
+
+Like many of us, Aleisha spends most of her time online--connecting with friends, posting on social media, and browsing the web.
+
+But lately, she's noticed that advertisements related to her previous searches are following her around online.
+
+This feels so invasive that she does some research on online ads and learns that it's not just advertisers tracking her but also her ISP, analytics companies, social media platforms, and more.
+
+Aleisha decides she wants to find and use software that doesn't collect her data, doesn't track her, and doesn't tell other services anything private about her.
+
+She goes to a privacy training at a local hackerspace and learns about **Tor Browser**, the only web browser that allows her to browse anonymously.
+
+---
+
+# 2.TOR FOR FEMINISTS
+
+### The future is cyberfeminist
+
+Fernanda runs a women's collective focused on reproductive rights in Brazil, where abortion is illegal.
+
+Fernanda and her colleagues built a website with information about abortion access, birth control, and other resources for people seeking reproductive information.
+
+If this website was linked back to them, they could be arrested--or worse.
+
+To protect themselves, Fernanda and her colleagues created the website using Tor **onion services**. Onion services not only protect them from being discovered as the operators of the server but also help protect visitors to their website by requiring they use Tor Browser.
+
+In fact, Fernanda uses **Tor Browser** for all of her web browsing just to be on the safe side.
+
+She also uses a Tor-powered app called **OnionShare** to send files to other activists securely and privately.
+
+### Reproductive rights activists like Fernanda are fighting for fundamental freedoms, and Tor helps power their resistance.
+
+---
+
+# 3. TOR FOR HUMAN RIGHTS
+
+### Water is life
+
+Jelani lives in a small village which a wide river runs through.
+
+This river has provided water to his community since the days of his ancestors.
+
+But today, Jelani’s river is threatened by powerful multinational companies drilling for oil in the region.
+
+Private security firms, paid for by these companies, use powerful surveillance mechanisms to monitor the online activities of Jelani and his neighbors in the village who are organizing to protect their sacred river.
+
+Jelani uses **Tor Browser** to prevent these companies from watching as he visits websites for international human rights protection and legal aid and writes blog posts about the resistance movement in his village.
+
+He also uses **OnionShare** and **SecureDrop** to securely send documents to journalists who are helping expose these human rights violations.
+
+All of this software uses Tor to help protect Jelani’s privacy.
+
+### Human rights activists like Jelani are fighting for justice in their communities, and Tor helps power their resistance.
+
+---
+
+# 4. TOR FOR ANTI-CENSORSHIP
+
+### Build bridges not walls
+
+Jean was traveling for the first time to a country far from his family.
+
+After arriving at a hotel, he opened his laptop.
+
+He was so exhausted that when the message "Connection has timed out" first appeared on his web browser, he thought it was due to his own error.
+
+But after trying again and again, he realized that his email provider, a news website, and many apps were unavailable.
+
+He had heard that this country censors the internet and wondered if that was happening.
+How could he contact his family from behind this impenetrable wall?
+After doing some web searches, he found a forum and read about VPNs, private services that allow you to connect to another uncensored network.
+
+Jean spent half an hour trying to figure out which cheap VPN was best.
+
+He chose one and for a moment it seemed to work, but after five minutes the connection went offline and the VPN would no longer connect.
+
+Jean kept reading to find other options and learned about Tor Browser and how it can circumvent censorship.
+
+He found an official website mirror to download the program.
+
+When he opened **Tor Browser**, he followed the prompts for censored users and connected to a bridge which allowed him to access the internet again.
+
+With Tor Browser, Jean can browse freely and privately and contact his family.
+
+### Censored users all over the world rely on Tor Browser for a free, stable, and uncensored way to access the internet.
+
+---
+
+# 5. Shared Sections
+
+## Beth yw Tor?
+
+Tor is free software and an open network that helps protect you from tracking, surveillance, and censorship online.
+Tor is created for free by a 501(c)3 U.S.-based nonprofit called the Tor Project.
+
+The easiest way to use Tor is Tor Browser.
+When you use Tor Browser, no one can see what websites you visit or where in the world you’re coming from.
+
+Other applications, like SecureDrop and OnionShare, use Tor to protect their users against surveillance and censorship.
+
+
+## 6. How does Tor work?
+
+Amal wants to visit Bekele’s website privately, so she opens Tor Browser.
+
+Tor Browser selects a random circuit of three relays, which are computers all over the world configured to route traffic over the Tor network.
+
+Tor Browser then encrypts her website request three times and sends it to the first Tor relay in her circuit.
+
+The first relay removes the first encryption layer but doesn't learn that the destination is Bekele’s website.
+
+The first relay learns only the next location in the circuit, which is the second relay.
+
+The second relay removes another encryption layer and forwards the web page request to the third relay.
+
+The third relay removes the last encryption layer and forwards the web page request to its destination, Bekele’s website, but it doesn't know the request comes from Amal.
+
+Bekele doesn't know that the website request came from Amal unless she tells him so.
+
+## 7. Who uses Tor?
+
+People all over the world use Tor to protect their privacy and access the web freely.
+
+Tor helps protect journalists, human rights defenders, domestic violence victims, academic researchers, and anyone experiencing tracking, censorship, or surveillance.
+
+## 6. Why trust Tor?
+
+Tor is designed for privacy. We don’t know who our users are, and we don't keep logs of user activity.
+
+Tor relay operators cannot reveal the true identity of Tor users.
+
+Continual peer review of Tor's source code by academic and open source communities ensures that there are no backdoors in Tor, and our social contract promises that we will never backdoor Tor.
+
+## 7. Join the Tor community
+
+Tor is made possible by a diverse set of users, developers, relay operators, and advocates from around the world.
+
+We need your help to make Tor more usable and secure for people everywhere.
+
+You can volunteer with Tor by writing code, running a relay, creating documentation, offering user support, or telling people in your community about Tor.
+
+The Tor community is governed by a code of conduct, and we outline our set of promises to the community in our social contract.
+
+Learn more about Tor by visiting our website, our wiki, finding us on IRC, joining one of our mailing lists, or signing up for Tor News at newsletter.torproject.org.
+
+
+## 8. Download Tor
+
+Tor for Desktop
+torproject.org/download
+
+TOR ON MOBILE
+### Android
+Tor Browser for Android is available from GooglePlay.
+
+### iOS
+Onion Browser, developed by M. Tigas, is the only browser we recommend for iOS.
+
diff --git a/da.po b/da.po
new file mode 100644
index 000000000..ef02163ed
--- /dev/null
+++ b/da.po
@@ -0,0 +1,162 @@
+# Tor Outreach Material 2019-2020
+
+# 1. TOR FOR PRIVACY
+
+### Privacy is a human right
+
+Like many of us, Aleisha spends most of her time online--connecting with friends, posting on social media, and browsing the web.
+
+But lately, she's noticed that advertisements related to her previous searches are following her around online.
+
+This feels so invasive that she does some research on online ads and learns that it's not just advertisers tracking her but also her ISP, analytics companies, social media platforms, and more.
+
+Aleisha decides she wants to find and use software that doesn't collect her data, doesn't track her, and doesn't tell other services anything private about her.
+
+She goes to a privacy training at a local hackerspace and learns about **Tor Browser**, the only web browser that allows her to browse anonymously.
+
+---
+
+# 2.TOR FOR FEMINISTS
+
+### The future is cyberfeminist
+
+Fernanda runs a women's collective focused on reproductive rights in Brazil, where abortion is illegal.
+
+Fernanda and her colleagues built a website with information about abortion access, birth control, and other resources for people seeking reproductive information.
+
+If this website was linked back to them, they could be arrested--or worse.
+
+To protect themselves, Fernanda and her colleagues created the website using Tor **onion services**. Onion services not only protect them from being discovered as the operators of the server but also help protect visitors to their website by requiring they use Tor Browser.
+
+In fact, Fernanda uses **Tor Browser** for all of her web browsing just to be on the safe side.
+
+She also uses a Tor-powered app called **OnionShare** to send files to other activists securely and privately.
+
+### Reproductive rights activists like Fernanda are fighting for fundamental freedoms, and Tor helps power their resistance.
+
+---
+
+# 3. TOR FOR HUMAN RIGHTS
+
+### Water is life
+
+Jelani lives in a small village which a wide river runs through.
+
+This river has provided water to his community since the days of his ancestors.
+
+But today, Jelani’s river is threatened by powerful multinational companies drilling for oil in the region.
+
+Private security firms, paid for by these companies, use powerful surveillance mechanisms to monitor the online activities of Jelani and his neighbors in the village who are organizing to protect their sacred river.
+
+Jelani uses **Tor Browser** to prevent these companies from watching as he visits websites for international human rights protection and legal aid and writes blog posts about the resistance movement in his village.
+
+He also uses **OnionShare** and **SecureDrop** to securely send documents to journalists who are helping expose these human rights violations.
+
+All of this software uses Tor to help protect Jelani’s privacy.
+
+### Human rights activists like Jelani are fighting for justice in their communities, and Tor helps power their resistance.
+
+---
+
+# 4. TOR FOR ANTI-CENSORSHIP
+
+### Build bridges not walls
+
+Jean was traveling for the first time to a country far from his family.
+
+After arriving at a hotel, he opened his laptop.
+
+He was so exhausted that when the message "Connection has timed out" first appeared on his web browser, he thought it was due to his own error.
+
+But after trying again and again, he realized that his email provider, a news website, and many apps were unavailable.
+
+He had heard that this country censors the internet and wondered if that was happening.
+How could he contact his family from behind this impenetrable wall?
+After doing some web searches, he found a forum and read about VPNs, private services that allow you to connect to another uncensored network.
+
+Jean spent half an hour trying to figure out which cheap VPN was best.
+
+He chose one and for a moment it seemed to work, but after five minutes the connection went offline and the VPN would no longer connect.
+
+Jean kept reading to find other options and learned about Tor Browser and how it can circumvent censorship.
+
+He found an official website mirror to download the program.
+
+When he opened **Tor Browser**, he followed the prompts for censored users and connected to a bridge which allowed him to access the internet again.
+
+With Tor Browser, Jean can browse freely and privately and contact his family.
+
+### Censored users all over the world rely on Tor Browser for a free, stable, and uncensored way to access the internet.
+
+---
+
+# 5. Shared Sections
+
+## Hvad er Tor?
+
+Tor is free software and an open network that helps protect you from tracking, surveillance, and censorship online.
+Tor is created for free by a 501(c)3 U.S.-based nonprofit called the Tor Project.
+
+The easiest way to use Tor is Tor Browser.
+When you use Tor Browser, no one can see what websites you visit or where in the world you’re coming from.
+
+Other applications, like SecureDrop and OnionShare, use Tor to protect their users against surveillance and censorship.
+
+
+## 6. How does Tor work?
+
+Amal wants to visit Bekele’s website privately, so she opens Tor Browser.
+
+Tor Browser selects a random circuit of three relays, which are computers all over the world configured to route traffic over the Tor network.
+
+Tor Browser then encrypts her website request three times and sends it to the first Tor relay in her circuit.
+
+The first relay removes the first encryption layer but doesn't learn that the destination is Bekele’s website.
+
+The first relay learns only the next location in the circuit, which is the second relay.
+
+The second relay removes another encryption layer and forwards the web page request to the third relay.
+
+The third relay removes the last encryption layer and forwards the web page request to its destination, Bekele’s website, but it doesn't know the request comes from Amal.
+
+Bekele doesn't know that the website request came from Amal unless she tells him so.
+
+## 7. Who uses Tor?
+
+People all over the world use Tor to protect their privacy and access the web freely.
+
+Tor helps protect journalists, human rights defenders, domestic violence victims, academic researchers, and anyone experiencing tracking, censorship, or surveillance.
+
+## 6. Why trust Tor?
+
+Tor is designed for privacy. We don’t know who our users are, and we don't keep logs of user activity.
+
+Tor relay operators cannot reveal the true identity of Tor users.
+
+Continual peer review of Tor's source code by academic and open source communities ensures that there are no backdoors in Tor, and our social contract promises that we will never backdoor Tor.
+
+## 7. Join the Tor community
+
+Tor is made possible by a diverse set of users, developers, relay operators, and advocates from around the world.
+
+We need your help to make Tor more usable and secure for people everywhere.
+
+You can volunteer with Tor by writing code, running a relay, creating documentation, offering user support, or telling people in your community about Tor.
+
+The Tor community is governed by a code of conduct, and we outline our set of promises to the community in our social contract.
+
+Learn more about Tor by visiting our website, our wiki, finding us on IRC, joining one of our mailing lists, or signing up for Tor News at newsletter.torproject.org.
+
+
+## 8. Download Tor
+
+Tor for Desktop
+torproject.org/download
+
+TOR ON MOBILE
+### Android
+Tor Browser for Android is available from GooglePlay.
+
+### iOS
+Onion Browser, developed by M. Tigas, is the only browser we recommend for iOS.
+
diff --git a/de.po b/de.po
new file mode 100644
index 000000000..6c469e5b6
--- /dev/null
+++ b/de.po
@@ -0,0 +1,162 @@
+# Tor Outreach Material 2019-2020
+
+# 1. TOR FÜR PRIVATSPHÄRE
+
+### Datenschutz ist ein Menschenrecht
+
+Wie viele von uns verbringt Aleisha die meiste Zeit mit Online-Kontakten mit Freunden, Postings in sozialen Medien und dem Surfen im Internet.
+
+Aber in letzter Zeit hat sie bemerkt, dass Anzeigen, die sich auf ihre früheren Recherchen beziehen, sie online verfolgen.
+
+Dies fühlt sich so aufdringlich an, dass sie einige Recherchen über Online-Anzeigen durchführt und erfährt, dass es nicht nur Werbetreibende sind, die sie verfolgen, sondern auch ihr ISP, Analytikunternehmen, Social Media Plattformen und mehr.
+
+Aleisha beschließt, Software zu finden und zu verwenden, die ihre Daten nicht sammelt, sie nicht verfolgt und anderen Diensten nichts Privates über sie erzählt.
+
+Sie besucht ein Privattraining in einem lokalen Hackerspace und lernt **Tor Browser** kennen, den einzigen Webbrowser, der es ihr ermöglicht, anonym zu surfen.
+
+---
+
+# 2.TOR FÜR FEMINISTINNEN
+
+### Die Zukunft ist cyberfeministisch.
+
+Fernanda leitet ein Frauenkollektiv, das sich auf Reproduktionsrechte in Brasilien konzentriert, wo Abtreibung illegal ist.
+
+Fernanda und ihre Kollegen erstellten eine Website mit Informationen über Abtreibungszugang, Geburtenkontrolle und andere Ressourcen für Menschen, die reproduktive Informationen suchen.
+
+Wenn diese Website mit ihnen verlinkt wäre, könnten sie verhaftet werden - oder schlimmer noch.
+
+Um sich selbst zu schützen, haben Fernanda und ihre Kollegen die Website mit den Tor **onion-Diensten** erstellt. Onion-Dienste schützen sie nicht nur davor, als Betreiber des Servers entdeckt zu werden, sondern helfen auch, Besucher ihrer Website zu schützen, indem sie verlangen, dass sie Tor-Browser verwenden.
+
+Tatsächlich verwendet Fernanda **Tor Browser** für alle ihre Webbrowser, nur um auf der sicheren Seite zu sein.
+
+Sie verwendet auch eine Tor-powered App namens **OnionShare**, um Dateien sicher und privat an andere Aktivisten zu senden.
+
+### Aktivisten für Reproduktionsrechte wie Fernanda kämpfen für die Grundfreiheiten, und Tor hilft, ihren Widerstand zu stärken.
+
+---
+
+# 3. TOR FÜR MENSCHENRECHTE
+
+### Wasser ist Leben
+
+Jelani lebt in einem kleinen Dorf, durch das ein breiter Fluss fließt.
+
+Dieser Fluss versorgt seine Gemeinde seit den Tagen seiner Vorfahren mit Wasser.
+
+Aber heute ist Jelani's Fluss von mächtigen multinationalen Unternehmen bedroht, die in der Region nach Öl bohren.
+
+Private Sicherheitsfirmen, die von diesen Unternehmen bezahlt werden, nutzen leistungsstarke Überwachungsmechanismen, um die Online-Aktivitäten von Jelani und seinen Nachbarn im Dorf zu überwachen, die sich für den Schutz ihres heiligen Flusses einsetzen.
+
+Jelani verwendet **Tor Browser**, um zu verhindern, dass diese Unternehmen zusehen, wie er Websites zum internationalen Schutz der Menschenrechte und zur Rechtshilfe besucht und Blogbeiträge über die Widerstandsbewegung in seinem Dorf schreibt.
+
+Er verwendet auch **OnionShare** und **SecureDrop**, um Dokumente sicher an Journalisten zu senden, die helfen, diese Menschenrechtsverletzungen aufzudecken.
+
+Alle diese Programme verwenden Tor, um die Privatsphäre von Jelani zu schützen.
+
+### Menschenrechtsaktivisten wie Jelani kämpfen für Gerechtigkeit in ihren Gemeinden, und Tor hilft, ihren Widerstand zu stärken.
+
+---
+
+# 4. TOR FÜR ANTI-ZENSUR
+
+### Brücken bauen statt Mauern
+
+Jean reiste zum ersten Mal in ein Land, das weit von seiner Familie entfernt war.
+
+Als er in einem Hotel ankam, öffnete er seinen Laptop.
+
+Er war so erschöpft, dass er, als die Meldung "Connection has timed out" zum ersten Mal in seinem Webbrowser erschien, dachte, es sei auf seinen eigenen Fehler zurückzuführen.
+
+Aber nachdem er es immer wieder versucht hatte, erkannte er, dass sein E-Mail-Provider, eine Nachrichten-Website und viele Apps nicht verfügbar waren.
+
+Er hatte gehört, dass dieses Land das Internet zensiert und sich gefragt, ob das passiert.
+Wie konnte er seine Familie von hinter dieser undurchdringlichen Mauer aus kontaktieren?
+Nachdem er einige Websuchen durchgeführt hatte, fand er ein Forum und las über VPNs, private Dienste, die es Ihnen ermöglichen, sich mit einem anderen unzensierten Netzwerk zu verbinden.
+
+Jean verbrachte eine halbe Stunde damit, herauszufinden, welches preisgünstige VPN das Beste ist.
+
+Er wählte eines aus, und für einen Moment schien es zu funktionieren, aber nach fünf Minuten ging die Verbindung offline, und das VPN wollte sich nicht mehr verbinden.
+
+Jean las weiter, um andere Optionen zu finden, und lernte Tor Browser kennen und wie er die Zensur umgehen kann.
+
+Er fand einen offiziellen Website-Mirror, um das Programm herunterzuladen.
+
+Als er **Tor Browser** öffnete, folgte er den Anweisungen für zensierte Benutzer und verband sich mit einer Brücke, die es ihm ermöglichte, wieder auf das Internet zuzugreifen.
+
+Mit Tor Browser kann Jean frei und privat surfen und seine Familie kontaktieren.
+
+### Zensierte Benutzer auf der ganzen Welt verlassen sich auf Tor Browser für einen kostenlosen, stabilen und unzensierten Zugang zum Internet.
+
+---
+
+# 5. Gemeinsame Bereiche
+
+## Was ist Tor?
+
+Tor ist kostenlose Software und ein offenes Netzwerk, das dich vor Verfolgung, Überwachung und Zensur online schützt.
+Tor wird kostenlos von einem 501(c)3 U.S.-amerikanischen gemeinnützigen Verein namens Tor Project erstellt.
+
+Der einfachste Weg, Tor zu benutzen, ist der Tor-Browser.
+Wenn du Tor-Browser verwendest, kann niemand sehen, welche Websites du besuchst oder von wo in der Welt du kommst.
+
+Andere Anwendungen, wie SecureDrop und OnionShare, verwenden Tor, um ihre Benutzer vor Überwachung und Zensur zu schützen.
+
+
+## 6. Wie funktioniert Tor?
+
+Amal will Bekeles Website privat besuchen, also öffnet sie den Tor-Browser.
+
+Der Tor-Browser wählt einen zufälligen Schaltkreis aus drei Relays aus, d.h. Computern auf der ganzen Welt, die konfiguriert sind, um den Verkehr über das Tor-Netzwerk zu leiten.
+
+Tor Browser verschlüsselt dann dreimal ihre Website-Anfrage und sendet sie an das erste Tor-Relay in ihrer Schaltung.
+
+Das erste Relay entfernt die erste Verschlüsselungsebene, erfährt aber nicht, dass das Ziel die Website von Bekele ist.
+
+Das erste Relay erfährt nur den nächsten Ort in der Schaltung, nämlich das zweite Relay.
+
+Das zweite Relay entfernt eine weitere Verschlüsselungsebene und leitet die Webseitenanforderung an das dritte Relay weiter.
+
+Das dritte Relay entfernt die letzte Verschlüsselungsebene und leitet die Webseitenanfrage an ihr Ziel, Bekeles Website, weiter, aber es weiß nicht, dass die Anfrage von Amal kommt.
+
+Bekele weiß nicht, dass die Website-Anfrage von Amal kam, es sei denn, sie sagt es ihm.
+
+## 7. Wer benutzt Tor?
+
+Menschen auf der ganzen Welt nutzen Tor, um ihre Privatsphäre zu schützen und frei auf das Internet zuzugreifen.
+
+Tor hilft Journalisten, Menschenrechtsaktivisten, Opfern häuslicher Gewalt, akademischen Forschern und allen, die Verfolgung, Zensur oder Überwachung erleben.
+
+## 6. Warum Tor vertrauen?
+
+Tor ist auf Privatsphäre ausgelegt. Wir wissen nicht, wer unsere Benutzer sind, und wir führen keine Protokolle über die Benutzeraktivität.
+
+Tor-Relay-Betreiber können die wahre Identität von Tor-Benutzern nicht preisgeben.
+
+Kontinuierliche Peer-Reviews des Quellcodes von akademischen und Open-Source-Communities stellen sicher, dass es in Tor keine Hintertüren gibt, und unser Sozialvertrag verspricht, dass wir nie hinter die Kulissen von Tor gehen werden.
+
+## 7. Der Tor-Community beitreten
+
+Tor wird durch eine Vielzahl von Benutzern, Entwicklern, Relaybetreibern und Anwälten aus der ganzen Welt ermöglicht.
+
+Wir brauchen deine Hilfe, um Tor benutzerfreundlicher und sicherer für alle Menschen zu machen.
+
+Du kannst dich freiwillig bei Tor melden, indem du Code schreibst, einen Relay betreibst, Dokumentation erstellst, Benutzerunterstützung anbietest oder Leuten in deiner Community von Tor erzählst.
+
+Die Tor-Community unterliegt einem Verhaltenskodex, und wir beschreiben unsere Versprechen an die Community in unserem Gesellschaftsvertrag.
+
+Erfahren Sie mehr über Tor, indem Sie unsere Website, unser Wiki besuchen, uns im IRC finden, einer unserer Mailinglisten beitreten oder sich für Tor News anmelden unter newsletter.torproject.org.
+
+
+## 8. Tor herunterladen
+
+Tor für Desktop
+torproject.org/download
+
+TOR AUF DEM HANDY
+### Android
+Tor-Browser für Android ist bei GooglePlay erhältlich.
+
+### iOS
+Onion Browser, entwickelt von M. Tigas, ist der einzige Browser, den wir für iOS empfehlen.
+
diff --git a/dz.po b/dz.po
new file mode 100644
index 000000000..6c8fce0dc
--- /dev/null
+++ b/dz.po
@@ -0,0 +1,162 @@
+# Tor Outreach Material 2019-2020
+
+# 1. TOR FOR PRIVACY
+
+### Privacy is a human right
+
+Like many of us, Aleisha spends most of her time online--connecting with friends, posting on social media, and browsing the web.
+
+But lately, she's noticed that advertisements related to her previous searches are following her around online.
+
+This feels so invasive that she does some research on online ads and learns that it's not just advertisers tracking her but also her ISP, analytics companies, social media platforms, and more.
+
+Aleisha decides she wants to find and use software that doesn't collect her data, doesn't track her, and doesn't tell other services anything private about her.
+
+She goes to a privacy training at a local hackerspace and learns about **Tor Browser**, the only web browser that allows her to browse anonymously.
+
+---
+
+# 2.TOR FOR FEMINISTS
+
+### The future is cyberfeminist
+
+Fernanda runs a women's collective focused on reproductive rights in Brazil, where abortion is illegal.
+
+Fernanda and her colleagues built a website with information about abortion access, birth control, and other resources for people seeking reproductive information.
+
+If this website was linked back to them, they could be arrested--or worse.
+
+To protect themselves, Fernanda and her colleagues created the website using Tor **onion services**. Onion services not only protect them from being discovered as the operators of the server but also help protect visitors to their website by requiring they use Tor Browser.
+
+In fact, Fernanda uses **Tor Browser** for all of her web browsing just to be on the safe side.
+
+She also uses a Tor-powered app called **OnionShare** to send files to other activists securely and privately.
+
+### Reproductive rights activists like Fernanda are fighting for fundamental freedoms, and Tor helps power their resistance.
+
+---
+
+# 3. TOR FOR HUMAN RIGHTS
+
+### Water is life
+
+Jelani lives in a small village which a wide river runs through.
+
+This river has provided water to his community since the days of his ancestors.
+
+But today, Jelani’s river is threatened by powerful multinational companies drilling for oil in the region.
+
+Private security firms, paid for by these companies, use powerful surveillance mechanisms to monitor the online activities of Jelani and his neighbors in the village who are organizing to protect their sacred river.
+
+Jelani uses **Tor Browser** to prevent these companies from watching as he visits websites for international human rights protection and legal aid and writes blog posts about the resistance movement in his village.
+
+He also uses **OnionShare** and **SecureDrop** to securely send documents to journalists who are helping expose these human rights violations.
+
+All of this software uses Tor to help protect Jelani’s privacy.
+
+### Human rights activists like Jelani are fighting for justice in their communities, and Tor helps power their resistance.
+
+---
+
+# 4. TOR FOR ANTI-CENSORSHIP
+
+### Build bridges not walls
+
+Jean was traveling for the first time to a country far from his family.
+
+After arriving at a hotel, he opened his laptop.
+
+He was so exhausted that when the message "Connection has timed out" first appeared on his web browser, he thought it was due to his own error.
+
+But after trying again and again, he realized that his email provider, a news website, and many apps were unavailable.
+
+He had heard that this country censors the internet and wondered if that was happening.
+How could he contact his family from behind this impenetrable wall?
+After doing some web searches, he found a forum and read about VPNs, private services that allow you to connect to another uncensored network.
+
+Jean spent half an hour trying to figure out which cheap VPN was best.
+
+He chose one and for a moment it seemed to work, but after five minutes the connection went offline and the VPN would no longer connect.
+
+Jean kept reading to find other options and learned about Tor Browser and how it can circumvent censorship.
+
+He found an official website mirror to download the program.
+
+When he opened **Tor Browser**, he followed the prompts for censored users and connected to a bridge which allowed him to access the internet again.
+
+With Tor Browser, Jean can browse freely and privately and contact his family.
+
+### Censored users all over the world rely on Tor Browser for a free, stable, and uncensored way to access the internet.
+
+---
+
+# 5. Shared Sections
+
+## What is Tor?
+
+Tor is free software and an open network that helps protect you from tracking, surveillance, and censorship online.
+Tor is created for free by a 501(c)3 U.S.-based nonprofit called the Tor Project.
+
+The easiest way to use Tor is Tor Browser.
+When you use Tor Browser, no one can see what websites you visit or where in the world you’re coming from.
+
+Other applications, like SecureDrop and OnionShare, use Tor to protect their users against surveillance and censorship.
+
+
+## 6. How does Tor work?
+
+Amal wants to visit Bekele’s website privately, so she opens Tor Browser.
+
+Tor Browser selects a random circuit of three relays, which are computers all over the world configured to route traffic over the Tor network.
+
+Tor Browser then encrypts her website request three times and sends it to the first Tor relay in her circuit.
+
+The first relay removes the first encryption layer but doesn't learn that the destination is Bekele’s website.
+
+The first relay learns only the next location in the circuit, which is the second relay.
+
+The second relay removes another encryption layer and forwards the web page request to the third relay.
+
+The third relay removes the last encryption layer and forwards the web page request to its destination, Bekele’s website, but it doesn't know the request comes from Amal.
+
+Bekele doesn't know that the website request came from Amal unless she tells him so.
+
+## 7. Who uses Tor?
+
+People all over the world use Tor to protect their privacy and access the web freely.
+
+Tor helps protect journalists, human rights defenders, domestic violence victims, academic researchers, and anyone experiencing tracking, censorship, or surveillance.
+
+## 6. Why trust Tor?
+
+Tor is designed for privacy. We don’t know who our users are, and we don't keep logs of user activity.
+
+Tor relay operators cannot reveal the true identity of Tor users.
+
+Continual peer review of Tor's source code by academic and open source communities ensures that there are no backdoors in Tor, and our social contract promises that we will never backdoor Tor.
+
+## 7. Join the Tor community
+
+Tor is made possible by a diverse set of users, developers, relay operators, and advocates from around the world.
+
+We need your help to make Tor more usable and secure for people everywhere.
+
+You can volunteer with Tor by writing code, running a relay, creating documentation, offering user support, or telling people in your community about Tor.
+
+The Tor community is governed by a code of conduct, and we outline our set of promises to the community in our social contract.
+
+Learn more about Tor by visiting our website, our wiki, finding us on IRC, joining one of our mailing lists, or signing up for Tor News at newsletter.torproject.org.
+
+
+## 8. Download Tor
+
+Tor for Desktop
+torproject.org/download
+
+TOR ON MOBILE
+### Android
+Tor Browser for Android is available from GooglePlay.
+
+### iOS
+Onion Browser, developed by M. Tigas, is the only browser we recommend for iOS.
+
diff --git a/el.po b/el.po
new file mode 100644
index 000000000..626504111
--- /dev/null
+++ b/el.po
@@ -0,0 +1,162 @@
+# Tor Outreach Material 2019-2020
+
+# 1. TOR FOR PRIVACY
+
+### Privacy is a human right
+
+Like many of us, Aleisha spends most of her time online--connecting with friends, posting on social media, and browsing the web.
+
+But lately, she's noticed that advertisements related to her previous searches are following her around online.
+
+This feels so invasive that she does some research on online ads and learns that it's not just advertisers tracking her but also her ISP, analytics companies, social media platforms, and more.
+
+Aleisha decides she wants to find and use software that doesn't collect her data, doesn't track her, and doesn't tell other services anything private about her.
+
+She goes to a privacy training at a local hackerspace and learns about **Tor Browser**, the only web browser that allows her to browse anonymously.
+
+---
+
+# 2.TOR FOR FEMINISTS
+
+### The future is cyberfeminist
+
+Fernanda runs a women's collective focused on reproductive rights in Brazil, where abortion is illegal.
+
+Fernanda and her colleagues built a website with information about abortion access, birth control, and other resources for people seeking reproductive information.
+
+If this website was linked back to them, they could be arrested--or worse.
+
+To protect themselves, Fernanda and her colleagues created the website using Tor **onion services**. Onion services not only protect them from being discovered as the operators of the server but also help protect visitors to their website by requiring they use Tor Browser.
+
+In fact, Fernanda uses **Tor Browser** for all of her web browsing just to be on the safe side.
+
+She also uses a Tor-powered app called **OnionShare** to send files to other activists securely and privately.
+
+### Reproductive rights activists like Fernanda are fighting for fundamental freedoms, and Tor helps power their resistance.
+
+---
+
+# 3. TOR FOR HUMAN RIGHTS
+
+### Water is life
+
+Jelani lives in a small village which a wide river runs through.
+
+This river has provided water to his community since the days of his ancestors.
+
+But today, Jelani’s river is threatened by powerful multinational companies drilling for oil in the region.
+
+Private security firms, paid for by these companies, use powerful surveillance mechanisms to monitor the online activities of Jelani and his neighbors in the village who are organizing to protect their sacred river.
+
+Jelani uses **Tor Browser** to prevent these companies from watching as he visits websites for international human rights protection and legal aid and writes blog posts about the resistance movement in his village.
+
+He also uses **OnionShare** and **SecureDrop** to securely send documents to journalists who are helping expose these human rights violations.
+
+All of this software uses Tor to help protect Jelani’s privacy.
+
+### Human rights activists like Jelani are fighting for justice in their communities, and Tor helps power their resistance.
+
+---
+
+# 4. TOR FOR ANTI-CENSORSHIP
+
+### Build bridges not walls
+
+Jean was traveling for the first time to a country far from his family.
+
+After arriving at a hotel, he opened his laptop.
+
+He was so exhausted that when the message "Connection has timed out" first appeared on his web browser, he thought it was due to his own error.
+
+But after trying again and again, he realized that his email provider, a news website, and many apps were unavailable.
+
+He had heard that this country censors the internet and wondered if that was happening.
+How could he contact his family from behind this impenetrable wall?
+After doing some web searches, he found a forum and read about VPNs, private services that allow you to connect to another uncensored network.
+
+Jean spent half an hour trying to figure out which cheap VPN was best.
+
+He chose one and for a moment it seemed to work, but after five minutes the connection went offline and the VPN would no longer connect.
+
+Jean kept reading to find other options and learned about Tor Browser and how it can circumvent censorship.
+
+He found an official website mirror to download the program.
+
+When he opened **Tor Browser**, he followed the prompts for censored users and connected to a bridge which allowed him to access the internet again.
+
+With Tor Browser, Jean can browse freely and privately and contact his family.
+
+### Censored users all over the world rely on Tor Browser for a free, stable, and uncensored way to access the internet.
+
+---
+
+# 5. Shared Sections
+
+## Τι είναι το Tor;
+
+Tor is free software and an open network that helps protect you from tracking, surveillance, and censorship online.
+Tor is created for free by a 501(c)3 U.S.-based nonprofit called the Tor Project.
+
+The easiest way to use Tor is Tor Browser.
+When you use Tor Browser, no one can see what websites you visit or where in the world you’re coming from.
+
+Other applications, like SecureDrop and OnionShare, use Tor to protect their users against surveillance and censorship.
+
+
+## 6. How does Tor work?
+
+Amal wants to visit Bekele’s website privately, so she opens Tor Browser.
+
+Tor Browser selects a random circuit of three relays, which are computers all over the world configured to route traffic over the Tor network.
+
+Tor Browser then encrypts her website request three times and sends it to the first Tor relay in her circuit.
+
+The first relay removes the first encryption layer but doesn't learn that the destination is Bekele’s website.
+
+The first relay learns only the next location in the circuit, which is the second relay.
+
+The second relay removes another encryption layer and forwards the web page request to the third relay.
+
+The third relay removes the last encryption layer and forwards the web page request to its destination, Bekele’s website, but it doesn't know the request comes from Amal.
+
+Bekele doesn't know that the website request came from Amal unless she tells him so.
+
+## 7. Who uses Tor?
+
+People all over the world use Tor to protect their privacy and access the web freely.
+
+Tor helps protect journalists, human rights defenders, domestic violence victims, academic researchers, and anyone experiencing tracking, censorship, or surveillance.
+
+## 6. Why trust Tor?
+
+Tor is designed for privacy. We don’t know who our users are, and we don't keep logs of user activity.
+
+Tor relay operators cannot reveal the true identity of Tor users.
+
+Continual peer review of Tor's source code by academic and open source communities ensures that there are no backdoors in Tor, and our social contract promises that we will never backdoor Tor.
+
+## 7. Join the Tor community
+
+Tor is made possible by a diverse set of users, developers, relay operators, and advocates from around the world.
+
+We need your help to make Tor more usable and secure for people everywhere.
+
+You can volunteer with Tor by writing code, running a relay, creating documentation, offering user support, or telling people in your community about Tor.
+
+The Tor community is governed by a code of conduct, and we outline our set of promises to the community in our social contract.
+
+Learn more about Tor by visiting our website, our wiki, finding us on IRC, joining one of our mailing lists, or signing up for Tor News at newsletter.torproject.org.
+
+
+## 8. Download Tor
+
+Tor for Desktop
+torproject.org/download
+
+TOR ON MOBILE
+### Android
+Tor Browser for Android is available from GooglePlay.
+
+### iOS
+Onion Browser, developed by M. Tigas, is the only browser we recommend for iOS.
+
diff --git a/en_GB.po b/en_GB.po
new file mode 100644
index 000000000..25e431b89
--- /dev/null
+++ b/en_GB.po
@@ -0,0 +1,162 @@
+# Tor Outreach Material 2019-2020
+
+# 1. TOR FOR PRIVACY
+
+### Privacy is a human right
+
+Like many of us, Aleisha spends most of her time online--connecting with friends, posting on social media, and browsing the web.
+
+But lately, she's noticed that advertisements related to her previous searches are following her around online.
+
+This feels so invasive that she does some research on online ads and learns that it's not just advertisers tracking her but also her ISP, analytics companies, social media platforms, and more.
+
+Aleisha decides she wants to find and use software that doesn't collect her data, doesn't track her, and doesn't tell other services anything private about her.
+
+She goes to a privacy training at a local hackerspace and learns about **Tor Browser**, the only web browser that allows her to browse anonymously.
+
+---
+
+# 2.TOR FOR FEMINISTS
+
+### The future is cyberfeminist
+
+Fernanda runs a women's collective focused on reproductive rights in Brazil, where abortion is illegal.
+
+Fernanda ve çalışma arkadaşları cinsel aktivite üzerine bilgi arayan insanlar için kürtaj geçerliliği, doğum kontrolü ve diğer kaynaklar hakkında bir websitesi kurdular.
+
+If this website was linked back to them, they could be arrested--or worse.
+
+To protect themselves, Fernanda and her colleagues created the website using Tor **onion services**. Onion services not only protect them from being discovered as the operators of the server but also help protect visitors to their website by requiring they use Tor Browser.
+
+In fact, Fernanda uses **Tor Browser** for all of her web browsing just to be on the safe side.
+
+She also uses a Tor-powered app called **OnionShare** to send files to other activists securely and privately.
+
+### Reproductive rights activists like Fernanda are fighting for fundamental freedoms, and Tor helps power their resistance.
+
+---
+
+# 3. TOR FOR HUMAN RIGHTS
+
+### Water is life
+
+Jelani lives in a small village which a wide river runs through.
+
+This river has provided water to his community since the days of his ancestors.
+
+But today, Jelani’s river is threatened by powerful multinational companies drilling for oil in the region.
+
+Private security firms, paid for by these companies, use powerful surveillance mechanisms to monitor the online activities of Jelani and his neighbors in the village who are organizing to protect their sacred river.
+
+Jelani uses **Tor Browser** to prevent these companies from watching as he visits websites for international human rights protection and legal aid and writes blog posts about the resistance movement in his village.
+
+He also uses **OnionShare** and **SecureDrop** to securely send documents to journalists who are helping expose these human rights violations.
+
+All of this software uses Tor to help protect Jelani’s privacy.
+
+### Human rights activists like Jelani are fighting for justice in their communities, and Tor helps power their resistance.
+
+---
+
+# 4. TOR FOR ANTI-CENSORSHIP
+
+### Build bridges not walls
+
+Jean was traveling for the first time to a country far from his family.
+
+After arriving at a hotel, he opened his laptop.
+
+He was so exhausted that when the message "Connection has timed out" first appeared on his web browser, he thought it was due to his own error.
+
+But after trying again and again, he realized that his email provider, a news website, and many apps were unavailable.
+
+He had heard that this country censors the internet and wondered if that was happening.
+How could he contact his family from behind this impenetrable wall?
+After doing some web searches, he found a forum and read about VPNs, private services that allow you to connect to another uncensored network.
+
+Jean spent half an hour trying to figure out which cheap VPN was best.
+
+He chose one and for a moment it seemed to work, but after five minutes the connection went offline and the VPN would no longer connect.
+
+Jean kept reading to find other options and learned about Tor Browser and how it can circumvent censorship.
+
+He found an official website mirror to download the program.
+
+When he opened **Tor Browser**, he followed the prompts for censored users and connected to a bridge which allowed him to access the internet again.
+
+With Tor Browser, Jean can browse freely and privately and contact his family.
+
+### Censored users all over the world rely on Tor Browser for a free, stable, and uncensored way to access the internet.
+
+---
+
+# 5. Shared Sections
+
+## What is Tor?
+
+Tor is free software and an open network that helps protect you from tracking, surveillance, and censorship online.
+Tor is created for free by a 501(c)3 U.S.-based nonprofit called the Tor Project.
+
+The easiest way to use Tor is Tor Browser.
+When you use Tor Browser, no one can see what websites you visit or where in the world you’re coming from.
+
+Other applications, like SecureDrop and OnionShare, use Tor to protect their users against surveillance and censorship.
+
+
+## 6. How does Tor work?
+
+Amal wants to visit Bekele’s website privately, so she opens Tor Browser.
+
+Tor Browser selects a random circuit of three relays, which are computers all over the world configured to route traffic over the Tor network.
+
+Tor Browser then encrypts her website request three times and sends it to the first Tor relay in her circuit.
+
+The first relay removes the first encryption layer but doesn't learn that the destination is Bekele’s website.
+
+The first relay learns only the next location in the circuit, which is the second relay.
+
+The second relay removes another encryption layer and forwards the web page request to the third relay.
+
+The third relay removes the last encryption layer and forwards the web page request to its destination, Bekele’s website, but it doesn't know the request comes from Amal.
+
+Bekele doesn't know that the website request came from Amal unless she tells him so.
+
+## 7. Who uses Tor?
+
+People all over the world use Tor to protect their privacy and access the web freely.
+
+Tor helps protect journalists, human rights defenders, domestic violence victims, academic researchers, and anyone experiencing tracking, censorship, or surveillance.
+
+## 6. Why trust Tor?
+
+Tor is designed for privacy. We don’t know who our users are, and we don't keep logs of user activity.
+
+Tor relay operators cannot reveal the true identity of Tor users.
+
+Continual peer review of Tor's source code by academic and open source communities ensures that there are no backdoors in Tor, and our social contract promises that we will never backdoor Tor.
+
+## 7. Join the Tor community
+
+Tor is made possible by a diverse set of users, developers, relay operators, and advocates from around the world.
+
+We need your help to make Tor more usable and secure for people everywhere.
+
+You can volunteer with Tor by writing code, running a relay, creating documentation, offering user support, or telling people in your community about Tor.
+
+The Tor community is governed by a code of conduct, and we outline our set of promises to the community in our social contract.
+
+Learn more about Tor by visiting our website, our wiki, finding us on IRC, joining one of our mailing lists, or signing up for Tor News at newsletter.torproject.org.
+
+
+## 8. Download Tor
+
+Tor for Desktop
+torproject.org/download
+
+TOR ON MOBILE
+### Android
+Tor Browser for Android is available from GooglePlay.
+
+### iOS
+Onion Browser, developed by M. Tigas, is the only browser we recommend for iOS.
+
diff --git a/eo.po b/eo.po
new file mode 100644
index 000000000..b3f6c3841
--- /dev/null
+++ b/eo.po
@@ -0,0 +1,162 @@
+# Tor Outreach Material 2019-2020
+
+# 1. TOR FOR PRIVACY
+
+### Privacy is a human right
+
+Like many of us, Aleisha spends most of her time online--connecting with friends, posting on social media, and browsing the web.
+
+But lately, she's noticed that advertisements related to her previous searches are following her around online.
+
+This feels so invasive that she does some research on online ads and learns that it's not just advertisers tracking her but also her ISP, analytics companies, social media platforms, and more.
+
+Aleisha decides she wants to find and use software that doesn't collect her data, doesn't track her, and doesn't tell other services anything private about her.
+
+She goes to a privacy training at a local hackerspace and learns about **Tor Browser**, the only web browser that allows her to browse anonymously.
+
+---
+
+# 2.TOR FOR FEMINISTS
+
+### The future is cyberfeminist
+
+Fernanda runs a women's collective focused on reproductive rights in Brazil, where abortion is illegal.
+
+Fernanda and her colleagues built a website with information about abortion access, birth control, and other resources for people seeking reproductive information.
+
+If this website was linked back to them, they could be arrested--or worse.
+
+To protect themselves, Fernanda and her colleagues created the website using Tor **onion services**. Onion services not only protect them from being discovered as the operators of the server but also help protect visitors to their website by requiring they use Tor Browser.
+
+In fact, Fernanda uses **Tor Browser** for all of her web browsing just to be on the safe side.
+
+She also uses a Tor-powered app called **OnionShare** to send files to other activists securely and privately.
+
+### Reproductive rights activists like Fernanda are fighting for fundamental freedoms, and Tor helps power their resistance.
+
+---
+
+# 3. TOR FOR HUMAN RIGHTS
+
+### Water is life
+
+Jelani lives in a small village which a wide river runs through.
+
+This river has provided water to his community since the days of his ancestors.
+
+But today, Jelani’s river is threatened by powerful multinational companies drilling for oil in the region.
+
+Private security firms, paid for by these companies, use powerful surveillance mechanisms to monitor the online activities of Jelani and his neighbors in the village who are organizing to protect their sacred river.
+
+Jelani uses **Tor Browser** to prevent these companies from watching as he visits websites for international human rights protection and legal aid and writes blog posts about the resistance movement in his village.
+
+He also uses **OnionShare** and **SecureDrop** to securely send documents to journalists who are helping expose these human rights violations.
+
+All of this software uses Tor to help protect Jelani’s privacy.
+
+### Human rights activists like Jelani are fighting for justice in their communities, and Tor helps power their resistance.
+
+---
+
+# 4. TOR FOR ANTI-CENSORSHIP
+
+### Build bridges not walls
+
+Jean was traveling for the first time to a country far from his family.
+
+After arriving at a hotel, he opened his laptop.
+
+He was so exhausted that when the message "Connection has timed out" first appeared on his web browser, he thought it was due to his own error.
+
+But after trying again and again, he realized that his email provider, a news website, and many apps were unavailable.
+
+He had heard that this country censors the internet and wondered if that was happening.
+How could he contact his family from behind this impenetrable wall?
+After doing some web searches, he found a forum and read about VPNs, private services that allow you to connect to another uncensored network.
+
+Jean spent half an hour trying to figure out which cheap VPN was best.
+
+He chose one and for a moment it seemed to work, but after five minutes the connection went offline and the VPN would no longer connect.
+
+Jean kept reading to find other options and learned about Tor Browser and how it can circumvent censorship.
+
+He found an official website mirror to download the program.
+
+When he opened **Tor Browser**, he followed the prompts for censored users and connected to a bridge which allowed him to access the internet again.
+
+With Tor Browser, Jean can browse freely and privately and contact his family.
+
+### Censored users all over the world rely on Tor Browser for a free, stable, and uncensored way to access the internet.
+
+---
+
+# 5. Shared Sections
+
+## Kio estas Tor?
+
+Tor is free software and an open network that helps protect you from tracking, surveillance, and censorship online.
+Tor is created for free by a 501(c)3 U.S.-based nonprofit called the Tor Project.
+
+The easiest way to use Tor is Tor Browser.
+When you use Tor Browser, no one can see what websites you visit or where in the world you’re coming from.
+
+Other applications, like SecureDrop and OnionShare, use Tor to protect their users against surveillance and censorship.
+
+
+## 6. How does Tor work?
+
+Amal wants to visit Bekele’s website privately, so she opens Tor Browser.
+
+Tor Browser selects a random circuit of three relays, which are computers all over the world configured to route traffic over the Tor network.
+
+Tor Browser then encrypts her website request three times and sends it to the first Tor relay in her circuit.
+
+The first relay removes the first encryption layer but doesn't learn that the destination is Bekele’s website.
+
+The first relay learns only the next location in the circuit, which is the second relay.
+
+The second relay removes another encryption layer and forwards the web page request to the third relay.
+
+The third relay removes the last encryption layer and forwards the web page request to its destination, Bekele’s website, but it doesn't know the request comes from Amal.
+
+Bekele doesn't know that the website request came from Amal unless she tells him so.
+
+## 7. Who uses Tor?
+
+People all over the world use Tor to protect their privacy and access the web freely.
+
+Tor helps protect journalists, human rights defenders, domestic violence victims, academic researchers, and anyone experiencing tracking, censorship, or surveillance.
+
+## 6. Why trust Tor?
+
+Tor is designed for privacy. We don’t know who our users are, and we don't keep logs of user activity.
+
+Tor relay operators cannot reveal the true identity of Tor users.
+
+Continual peer review of Tor's source code by academic and open source communities ensures that there are no backdoors in Tor, and our social contract promises that we will never backdoor Tor.
+
+## 7. Join the Tor community
+
+Tor is made possible by a diverse set of users, developers, relay operators, and advocates from around the world.
+
+We need your help to make Tor more usable and secure for people everywhere.
+
+You can volunteer with Tor by writing code, running a relay, creating documentation, offering user support, or telling people in your community about Tor.
+
+The Tor community is governed by a code of conduct, and we outline our set of promises to the community in our social contract.
+
+Learn more about Tor by visiting our website, our wiki, finding us on IRC, joining one of our mailing lists, or signing up for Tor News at newsletter.torproject.org.
+
+
+## 8. Download Tor
+
+Tor for Desktop
+torproject.org/download
+
+TOR ON MOBILE
+### Android
+Tor Browser for Android is available from GooglePlay.
+
+### iOS
+Onion Browser, developed by M. Tigas, is the only browser we recommend for iOS.
+
diff --git a/es.po b/es.po
new file mode 100644
index 000000000..26d77cd9b
--- /dev/null
+++ b/es.po
@@ -0,0 +1,162 @@
+# Material de divulgación de Tor 2019-2020
+
+# 1. TOR PARA LA PRIVACIDAD
+
+### La privacidad es un derecho humano.
+
+Como muchos de nosotros, Aleisha pasa la mayor parte de su tiempo en línea: conectada con los amigos, publicando en redes sociales y navegando por la web.
+
+Pero últimamente, ha notado que los anuncios relacionados con sus búsquedas anteriores la siguen doquiera que navegue.
+
+Esto resulta tan invasivo que investiga sobre anuncios en la red y aprende que no solo los anunciantes la rastrean, sino también su ISP, las compañías de análisis, las plataformas de redes sociales y más.
+
+Aleisha decide que quiere encontrar y usar software que no recopile sus datos, no la rastree y no informe a otros servicios nada privado sobre ella.
+
+Asiste a un curso sobre privacidad en un espacio de hackers local y aprende sobre ** el Tor Browser **, el único navegador web que le permite navegar de forma anónima.
+
+---
+
+# 2.TOR PARA LAS FEMINISTAS
+
+### El futuro es ciberfeminista
+
+Fernanda dirige un colectivo de mujeres centrado en los derechos reproductivos en Brasil, donde el aborto es ilegal.
+
+Fernanda y sus compañeras crearon un sitio web con información sobre el acceso al aborto, el control de la natalidad y otros recursos para las personas que buscan información reproductiva.
+
+Si se vinculara este sitio web a ellas, las podrían arrestar, o peor.
+
+Para protegerse, Fernanda y sus colegas crearon el sitio web utilizando los servicios Tor ** onion **. Los servicios de Onion no solo las protegen de ser descubiertas como operadoras del servidor, sino que también ayudan a proteger a los visitantes de su sitio web al requerir que usen el Tor Browser.
+
+De hecho, Fernanda utiliza ** el Tor Browser ** para toda su navegación en la web solo para estar segura.
+
+Ella también usa una aplicación de Tor llamada ** OnionShare ** para enviar archivos a otras activistas de forma segura y privada.
+
+### Las activistas por los derechos reproductivos como Fernanda luchan por libertades fundamentales, y Tor ayuda a fortalecer su resistencia.
+
+---
+
+# 3. TOR POR LOS DERECHOS HUMANOS
+
+### El agua es vida
+
+Jelani vive en un pequeño pueblo atravesado por un ancho río.
+
+Este río ha proporcionado agua a su comunidad desde los más remotos tiempos.
+
+Pero ahora, el río Jelani se ve amenazado por poderosas compañías multinacionales que perforan buscando petróleo en la región.
+
+Las empresas de seguridad privadas, pagadas por estas compañías, utilizan poderosos mecanismos de vigilancia para monitorear las actividades en línea de Jelani y sus vecinos en la aldea, que se están organizando para proteger su río sagrado.
+
+Jelani usa ** el Tor Browser ** para evitar que estas compañías lo vean mientras visita sitios web de protección de derechos humanos y asistencia legal internacionales y escribe en blogs sobre el movimiento de resistencia en su aldea.
+
+También usa ** OnionShare ** y ** SecureDrop ** para enviar documentos de manera segura a periodistas que están ayudando a hacer público estas violaciones de derechos humanos.
+
+Tor usa todo este software para ayudar a proteger la privacidad de Jelani.
+
+### Los activistas por los derechos humanos como Jelani luchan por la justicia en sus comunidades, y Tor ayuda a fortalecer su resistencia.
+
+---
+
+# 4. TOR LUCHA CONTRA LA CENSURA
+
+### Construye puentes, no muros
+
+Jean viaja, por primera vez, a un país lejos de su familia.
+
+Después de llegar al hotel, abre el portátil
+
+Estaba tan agotado que la primera vez que apareció en su navegador el mensaje "La conexión se ha agotado", pensó que era un error suyo.
+
+Tras intentarlo una y otra vez, se dio cuenta de que su proveedor de correo electrónico, un sitio web de noticias y muchas aplicaciones no estaban disponibles.
+
+Había oído que en este país se censuraba a internet y se preguntaba si era eso lo que sucedía.
+¿Cómo podría ponerse en contacto con su familia con ese muro impenetrable?
+Después de hacer algunas búsquedas en la red, encontró un foro y leyó sobre VPN, servicios privados que te permiten conectarte a otra red sin censura.
+
+Jean se pasó media hora tratando de averiguar qué VPN barata sería mejor.
+
+Eligió uno y en un principio parecía que funcionaba, pero después de cinco minutos, la conexión se desconectó y la VPN ya no se conectó.
+
+Jean siguió leyendo buscando otras opciones y aprendió sobre el Tor Browser y sobre cómo puede eludir la censura.
+
+Encontró un mirror oficial para bajarse el programa.
+
+Cuando abrió ** el Tor Browser **, siguió las indicaciones para usuarios censurados y se conectó a un puente que le permitió acceder a Internet nuevamente.
+
+Con Tor, Jean puede navegar libre y privadamente y contactar con su familia.
+
+### Los usuarios censurados de todo el mundo confían en el Tor Browser para conseguir una forma libre, estable y sin censura de acceder a Internet.
+
+---
+
+# 5. Secciones compartidas
+
+## ¿Qué es Tor?
+
+Tor es software libre y una red abierta que te ayuda a protegerte contra el seguimiento, la vigilancia y la censura en línea.
+Tor es creada de forma libre por una organización sin ánimo de lucro 501 (c) 3 con sede en los Estados Unidos llamada el Proyecto Tor.
+
+La forma más fácil de usar Tor es el Tor Browser.
+Cuando usas el Tor Browser, nadie puede ver qué sitios web visitas o de qué parte del mundo vienes
+
+Otras aplicaciones, como SecureDrop y OnionShare, usan Tor para proteger a sus usuarios contra la vigilancia y la censura.
+
+
+## 6. ¿Como funciona Tor?
+
+Amal quiere visitar la web de Bekele en privado, así que abre el Tor Browser.
+
+El Tor Browser selecciona un circuito aleatorio de tres relés, que son ordenadores de todo el mundo configurados para enrutar el tráfico a través de la red Tor.
+
+El Tor Browser a continuación encripta la solicitud del sitio web tres veces y la envía al primer relé Tor del circuito.
+
+El primer relé elimina la primera capa de encriptación pero no se entera de que el destino es la web Bekele.
+
+El primer relé solo sabe la siguiente ubicación en el circuito, que es el segundo relé.
+
+El segundo relé elimina otra capa de cifrado y envía la solicitud de página web al tercer relé.
+
+El tercer relé elimina la última capa de cifrado y envía la solicitud de la web a su destino, el sitio web Bekele, pero no sabe que la solicitud proviene de Amal.
+
+Bekele no sabe que la solicitud proviene de Amal a menos que se lo diga ella.
+
+## 7. ¿Quién usa Tor?
+
+Personas de todo el mundo usan Tor para proteger su privacidad y acceder a la web libremente.
+
+Tor ayuda a proteger a periodistas, defensores de los derechos humanos, víctimas de violencia doméstica, investigadores académicos y cualquier persona que sufra el rastreo, la censura o la vigilancia.
+
+## 6. ¿Por qué confiar en Tor?
+
+Tor está diseñado para la privacidad. No sabemos quiénes son nuestros usuarios y no mantenemos registros de la actividad de los usuarios.
+
+Los operadores de retransmisión de Tor no pueden revelar la verdadera identidad de los usuarios de Tor.
+
+La revisión continua del código fuente de Tor por parte de las comunidades académicas y de código abierto garantiza que no haya puertas traseras en Tor, y nuestro contrato social promete que nunca lo haremos.
+
+## 7. Ingresa en la comunidad Tor
+
+Tor es posible gracias a un conjunto diverso de usuarios, desarrolladores, operadores de retransmisión y defensores de todo el mundo.
+
+Necesitamos tu ayuda para hacer que Tor sea más sencillo y seguro para las personas de todo el mundo.
+
+Puede ser voluntario de Tor escribiendo código, ejecutando un relée, creando documentación, ofreciendo soporte al usuario o difundiendo entre las personas de tu comunidad qué es Tor.
+
+La comunidad de Tor se rige por un código de conducta, y mostramos nuestro compromiso con la comunidad en nuestro contrato social.
+
+Consigue más información sobre Tor visitando nuestro sitio web, nuestro wiki, encontrándonos en IRC, uniéndote a una de nuestras listas de correo o inscribiéndote en Tor News en newsletter.torproject.org.
+
+
+## 8. Bajar Tor
+
+Tor para escritorio
+torproject.org/download
+
+TOR EN EL MÓVIL
+### Android
+El Tor Browser para Android está disponible en GooglePlay.
+
+### iOS
+El navegador Onion, desarrollado por M. Tigas, es el único navegador que recomendamos para iOS.
+
diff --git a/es_AR.po b/es_AR.po
new file mode 100644
index 000000000..d3591c652
--- /dev/null
+++ b/es_AR.po
@@ -0,0 +1,162 @@
+# Material de Difusión Tor 2019-2020
+
+# 1. TOR PARA LA PRIVACIDAD
+
+### La privacidad es un derecho humano
+
+Como muchos de nosotros, Aleisha pasa la mayor parte de su tiempo en línea - conectándose con amigos, publicando en redes sociales, y navegando la web.
+
+Pero últimamente, ha notado que las publicidades relacionadas con sus búsquedas previas la están siguiendo en línea.
+
+Esto lo siente tan invasivo, que está haciendo alguna investigación acerca de publicidades en línea, y descubre que no sólo son los publicitarios quiénes la están rastreando, sino también su ISP, compañías de análisis de datos, plataformas de redes sociales, y más.
+
+Aleisha decide que quiere encontrar y usar software que no recopila sus datos, no la rastrea, y no le dice a otros servicios cualquier cosa privada acerca de ella.
+
+Va a un entrenamiento en privacidad a un espacio de hackeo local y aprende acerca del **Tor Browser**, el único navegador web que le permite navegar anónimamente.
+
+---
+
+# 2. TOR PARA FEMINISTAS
+
+### El futuro es cyberfeminista
+
+Fernanda dirige una colectividad de mujeres enfocada en derechos reproductivos en Brasil, donde el aborto es ilegal.
+
+Fernanda y sus colegas construyen un sitio web con información acerca de acceso al aborto, control de natalidad, y otros recursos para personas buscando información reproductiva.
+
+Si este sitio web fuera vinculado a ellas, podrían ser arrestadas -- o peor.
+
+Para protegerse a sí mismas, Fernanda y sus colegas crearon el sitio web usando **servicios onion** de Tor. Los servicios onion no sólo las protegen de ser descubiertas como las operadoras del servidor, sino que también ayudan a proteger a los visitantes de su sitio web al requerir que usen el Tor Browser.
+
+De hecho, Fernanda usa el **Tor Browser** para todas sus exploraciones en la web, sólo para estar en lo seguro.
+
+También usa una aplicación basada en Tor llamada **OnionShare** para enviar archivos a otras activistas en forma segura y privada.
+
+### Las activistas de derechos reproductivos como Fernanda están luchando por libertades fundamentales, y Tor las ayuda a potenciar su resistencia.
+
+---
+
+# 3. TOR POR LOS DERECHOS HUMANOS
+
+### El agua es vida
+
+Jelani vive en una pequeña villa a través de la cual corre un ancho río.
+
+Este río ha provisto agua a su comunidad desde los días de sus ancestros.
+
+Pero hoy, el río de Jelani está amenazado por poderosas compañías multinacionales perforando en busca de petróleo en la región.
+
+Firmas de seguridad privadas, pagadas por éstas compañías, usan poderosos mecanismos de vigilancia para monitorear las actividades en línea de Jelani y sus vecinos en la villa, quienes se están organizando para proteger su río sagrado.
+
+Jelani usa el **Tor Browser** para evitar que éstas compañías lo vigilen mientras visita sitios web internacionales para protección de los derechos humanos y asistencia legal, y escribe un blog acerca del movimiento de resistencia en su villa.
+
+También usa **OnionShare** y **SecureDrop** para enviar documentos en forma segura a periodistas que están ayudando a exponer estas violaciones a los derechos humanos.
+
+Todo este software usa Tor para ayudar a proteger la privacidad de Jelani.
+
+### Activistas de derechos humanos como como Jelani están peleando por la justicia en sus comunidades, y Tor ayuda a potenciar su resistencia.
+
+---
+
+# 4. TOR PARA ANTI-CENSURA
+
+### Construir puentes, no muros
+
+Jean estaba viajando por primera vez a un país lejos de su familia.
+
+Luego de llegar a un hotel, abrió su laptop.
+
+Estaba tan cansado que cuando el mensaje "La conexión ha expirado" apareció por primera vez en su navegador, pensó que era debido a su propio error.
+
+Pero luego de tratar una y otra vez, se dió cuenta que su proveedor de correo electrónico, un sitio web de noticias, y muchas aplicaciones no estaban disponibles.
+
+Había escuchado que este país censura Internet, y se preguntó si eso es lo que estaba pasando.
+¿Cómo podría contactar a su familia desde atrás de este muro impenetrable?
+Luego de hacer algunas búsquedas web, encontró un foro y leyó acerca de RPVs, servicios privados que te permiten conectar a otra red no censurada.
+
+Jean tardó media hora tratando de descubrir cuál de las RPV baratas era mejor.
+
+Eligió una y por un momento pareció funcionar, pero luego de cinco minutos la conexión se interrumpió y la RPV no volvió a conectar.
+
+Jean siguió leyendo para encontrar otras opciones y aprendió acerca del Tor Browser y cómo puede eludir la censura.
+
+Encontró un espejo de un sitio web oficial para descargar el programa.
+
+Cuando abrió el **Tor Browser**, siguió las solicitudes para usuarios censurados y se conectó a un puente que le permitió acceder a Internet nuevamente.
+
+Con el Tor Browser, Jean puede navegar libre y privadamente, y contactar a su familia.
+
+### Usuarios censurados a través de todo el mundo confían en el Tor Browser por una manera libre, estable y no censurada de acceder a Internet.
+
+---
+
+# 5. Secciones Compartidas
+
+## ¿Qué es Tor?
+
+Tor es software libre y una red abierta que ayuda a protegerte de rastreo, vigilancia y censura en línea.
+Tor fue creado gratis por El Proyecto Tor, una organización sin fines de lucro basada en EE.UU., definida bajo 501(c)3.
+
+La manera más fácil de usar Tor es el Tor Browser.
+Cuando lo usás, nadie puede ver qué sitios web visitás, o de dónde en el mundo estás viniendo.
+
+Otras aplicaciones, como SecureDrop y OnionShare, usan Tor para proteger a sus usuarios en contra de la vigilancia y la censura.
+
+
+## 6. ¿Cómo funciona Tor?
+
+Amal quiere visitar el sitio web de Bekele en forma privada, de manera que abre el Tor Browser.
+
+El Tor Browser selecciona un circuito aleatorio de tres relevos, los cuales son computadoras alrededor del mundo configuradas para enrutar tráfico sobre la red de Tor.
+
+Luego, el Tor Browser encripta su solicitud del sitio web tres veces y la envía al primer relevo Tor en su circuito.
+
+El primer relevo remueve la primera capa de encriptación, pero no sabe que el destino es el sitio web de Bekele.
+
+El primer relevo sabe solamente la siguiente ubicación en el circuito, que es el segundo relevo.
+
+El segundo relevo remueve otra capa de encriptación y reenvía la solicitud de la página web al tercer relevo.
+
+El tercer relevo remueve la última capa de encriptación y reenvía la solicitud de la página web a su destino, el sitio web de Bekele, pero no sabe que la solicitud vino de Amal.
+
+Bekele no sabe que la solicitud del sitio web vino de Amal, a menos que ella se lo diga.
+
+## 7. ¿Quién usa Tor?
+
+Personas alrededor de todo el mundo usan Tor para proteger su privacidad y acceder a la web libremente.
+
+Tor ayuda a proteger periodistas, defensores de los derechos humanos, víctimas de violencia doméstica, investigadores académicos, y cualquiera que esté experimentando rastreo, censura o vigilancia.
+
+## 6. ¿Por qué confiar en Tor?
+
+Tor está diseñado para privacidad. No sabemos quiénes son nuestros usuarios, y no mantenemos registros de sus actividades.
+
+Los operadores de relevos Tor no pueden revelar la verdadera identidad de los usuarios de Tor.
+
+La continua revisión por pares del código fuente de Tor, tanto de comunidades de fuente abierta como académicas, asegura que no hay puertas traseras, y nuestro contrato social promete que nunca crearemos una.
+
+## 7. Unite a la comunidad Tor
+
+Tor está hecho posible por un diverso conjunto de usuarios, desarrolladores, operadores de relevos y portavoces alrededor del mundo.
+
+Necesitamos tu ayuda para hacer Tor más utilizable y seguro para personas en todos lados.
+
+Podés hacerte voluntario para Tor escribiendo código, ejecutando un relevo, creando documentación, ofreciendo soporte de usuario, o contándole a las personas en tu comunidad acerca de Tor.
+
+La comunidad de Tor está gobernada por un código de conducta, y delineamos nuestro conjunto de promesas a la comunidad en nuestro contrato social.
+
+Aprendé más acerca de Tor visitando nuestro sitio web, nuestra wiki, encontrándonos en IRC, uniéndote a una de nuestras listas de correo, o suscribiéndote a Noticias de Tor en newsletter.torproject.org.
+
+
+## 8. Descargá Tor
+
+Tor para PC de escritorio
+torproject.org/download
+
+TOR EN MÓVILES
+### Android
+El Tor Browser para Android está disponible en GooglePlay.
+
+### iOS
+Onion Browser, desarrollado por M. Tigas, es el único navegador que recomendamos para iOS.
+
diff --git a/es_CL.po b/es_CL.po
new file mode 100644
index 000000000..6c8fce0dc
--- /dev/null
+++ b/es_CL.po
@@ -0,0 +1,162 @@
+# Tor Outreach Material 2019-2020
+
+# 1. TOR FOR PRIVACY
+
+### Privacy is a human right
+
+Like many of us, Aleisha spends most of her time online--connecting with friends, posting on social media, and browsing the web.
+
+But lately, she's noticed that advertisements related to her previous searches are following her around online.
+
+This feels so invasive that she does some research on online ads and learns that it's not just advertisers tracking her but also her ISP, analytics companies, social media platforms, and more.
+
+Aleisha decides she wants to find and use software that doesn't collect her data, doesn't track her, and doesn't tell other services anything private about her.
+
+She goes to a privacy training at a local hackerspace and learns about **Tor Browser**, the only web browser that allows her to browse anonymously.
+
+---
+
+# 2.TOR FOR FEMINISTS
+
+### The future is cyberfeminist
+
+Fernanda runs a women's collective focused on reproductive rights in Brazil, where abortion is illegal.
+
+Fernanda and her colleagues built a website with information about abortion access, birth control, and other resources for people seeking reproductive information.
+
+If this website was linked back to them, they could be arrested--or worse.
+
+To protect themselves, Fernanda and her colleagues created the website using Tor **onion services**. Onion services not only protect them from being discovered as the operators of the server but also help protect visitors to their website by requiring they use Tor Browser.
+
+In fact, Fernanda uses **Tor Browser** for all of her web browsing just to be on the safe side.
+
+She also uses a Tor-powered app called **OnionShare** to send files to other activists securely and privately.
+
+### Reproductive rights activists like Fernanda are fighting for fundamental freedoms, and Tor helps power their resistance.
+
+---
+
+# 3. TOR FOR HUMAN RIGHTS
+
+### Water is life
+
+Jelani lives in a small village which a wide river runs through.
+
+This river has provided water to his community since the days of his ancestors.
+
+But today, Jelani’s river is threatened by powerful multinational companies drilling for oil in the region.
+
+Private security firms, paid for by these companies, use powerful surveillance mechanisms to monitor the online activities of Jelani and his neighbors in the village who are organizing to protect their sacred river.
+
+Jelani uses **Tor Browser** to prevent these companies from watching as he visits websites for international human rights protection and legal aid and writes blog posts about the resistance movement in his village.
+
+He also uses **OnionShare** and **SecureDrop** to securely send documents to journalists who are helping expose these human rights violations.
+
+All of this software uses Tor to help protect Jelani’s privacy.
+
+### Human rights activists like Jelani are fighting for justice in their communities, and Tor helps power their resistance.
+
+---
+
+# 4. TOR FOR ANTI-CENSORSHIP
+
+### Build bridges not walls
+
+Jean was traveling for the first time to a country far from his family.
+
+After arriving at a hotel, he opened his laptop.
+
+He was so exhausted that when the message "Connection has timed out" first appeared on his web browser, he thought it was due to his own error.
+
+But after trying again and again, he realized that his email provider, a news website, and many apps were unavailable.
+
+He had heard that this country censors the internet and wondered if that was happening.
+How could he contact his family from behind this impenetrable wall?
+After doing some web searches, he found a forum and read about VPNs, private services that allow you to connect to another uncensored network.
+
+Jean spent half an hour trying to figure out which cheap VPN was best.
+
+He chose one and for a moment it seemed to work, but after five minutes the connection went offline and the VPN would no longer connect.
+
+Jean kept reading to find other options and learned about Tor Browser and how it can circumvent censorship.
+
+He found an official website mirror to download the program.
+
+When he opened **Tor Browser**, he followed the prompts for censored users and connected to a bridge which allowed him to access the internet again.
+
+With Tor Browser, Jean can browse freely and privately and contact his family.
+
+### Censored users all over the world rely on Tor Browser for a free, stable, and uncensored way to access the internet.
+
+---
+
+# 5. Shared Sections
+
+## What is Tor?
+
+Tor is free software and an open network that helps protect you from tracking, surveillance, and censorship online.
+Tor is created for free by a 501(c)3 U.S.-based nonprofit called the Tor Project.
+
+The easiest way to use Tor is Tor Browser.
+When you use Tor Browser, no one can see what websites you visit or where in the world you’re coming from.
+
+Other applications, like SecureDrop and OnionShare, use Tor to protect their users against surveillance and censorship.
+
+
+## 6. How does Tor work?
+
+Amal wants to visit Bekele’s website privately, so she opens Tor Browser.
+
+Tor Browser selects a random circuit of three relays, which are computers all over the world configured to route traffic over the Tor network.
+
+Tor Browser then encrypts her website request three times and sends it to the first Tor relay in her circuit.
+
+The first relay removes the first encryption layer but doesn't learn that the destination is Bekele’s website.
+
+The first relay learns only the next location in the circuit, which is the second relay.
+
+The second relay removes another encryption layer and forwards the web page request to the third relay.
+
+The third relay removes the last encryption layer and forwards the web page request to its destination, Bekele’s website, but it doesn't know the request comes from Amal.
+
+Bekele doesn't know that the website request came from Amal unless she tells him so.
+
+## 7. Who uses Tor?
+
+People all over the world use Tor to protect their privacy and access the web freely.
+
+Tor helps protect journalists, human rights defenders, domestic violence victims, academic researchers, and anyone experiencing tracking, censorship, or surveillance.
+
+## 6. Why trust Tor?
+
+Tor is designed for privacy. We don’t know who our users are, and we don't keep logs of user activity.
+
+Tor relay operators cannot reveal the true identity of Tor users.
+
+Continual peer review of Tor's source code by academic and open source communities ensures that there are no backdoors in Tor, and our social contract promises that we will never backdoor Tor.
+
+## 7. Join the Tor community
+
+Tor is made possible by a diverse set of users, developers, relay operators, and advocates from around the world.
+
+We need your help to make Tor more usable and secure for people everywhere.
+
+You can volunteer with Tor by writing code, running a relay, creating documentation, offering user support, or telling people in your community about Tor.
+
+The Tor community is governed by a code of conduct, and we outline our set of promises to the community in our social contract.
+
+Learn more about Tor by visiting our website, our wiki, finding us on IRC, joining one of our mailing lists, or signing up for Tor News at newsletter.torproject.org.
+
+
+## 8. Download Tor
+
+Tor for Desktop
+torproject.org/download
+
+TOR ON MOBILE
+### Android
+Tor Browser for Android is available from GooglePlay.
+
+### iOS
+Onion Browser, developed by M. Tigas, is the only browser we recommend for iOS.
+
diff --git a/es_CO.po b/es_CO.po
new file mode 100644
index 000000000..6c8fce0dc
--- /dev/null
+++ b/es_CO.po
@@ -0,0 +1,162 @@
+# Tor Outreach Material 2019-2020
+
+# 1. TOR FOR PRIVACY
+
+### Privacy is a human right
+
+Like many of us, Aleisha spends most of her time online--connecting with friends, posting on social media, and browsing the web.
+
+But lately, she's noticed that advertisements related to her previous searches are following her around online.
+
+This feels so invasive that she does some research on online ads and learns that it's not just advertisers tracking her but also her ISP, analytics companies, social media platforms, and more.
+
+Aleisha decides she wants to find and use software that doesn't collect her data, doesn't track her, and doesn't tell other services anything private about her.
+
+She goes to a privacy training at a local hackerspace and learns about **Tor Browser**, the only web browser that allows her to browse anonymously.
+
+---
+
+# 2.TOR FOR FEMINISTS
+
+### The future is cyberfeminist
+
+Fernanda runs a women's collective focused on reproductive rights in Brazil, where abortion is illegal.
+
+Fernanda and her colleagues built a website with information about abortion access, birth control, and other resources for people seeking reproductive information.
+
+If this website was linked back to them, they could be arrested--or worse.
+
+To protect themselves, Fernanda and her colleagues created the website using Tor **onion services**. Onion services not only protect them from being discovered as the operators of the server but also help protect visitors to their website by requiring they use Tor Browser.
+
+In fact, Fernanda uses **Tor Browser** for all of her web browsing just to be on the safe side.
+
+She also uses a Tor-powered app called **OnionShare** to send files to other activists securely and privately.
+
+### Reproductive rights activists like Fernanda are fighting for fundamental freedoms, and Tor helps power their resistance.
+
+---
+
+# 3. TOR FOR HUMAN RIGHTS
+
+### Water is life
+
+Jelani lives in a small village which a wide river runs through.
+
+This river has provided water to his community since the days of his ancestors.
+
+But today, Jelani’s river is threatened by powerful multinational companies drilling for oil in the region.
+
+Private security firms, paid for by these companies, use powerful surveillance mechanisms to monitor the online activities of Jelani and his neighbors in the village who are organizing to protect their sacred river.
+
+Jelani uses **Tor Browser** to prevent these companies from watching as he visits websites for international human rights protection and legal aid and writes blog posts about the resistance movement in his village.
+
+He also uses **OnionShare** and **SecureDrop** to securely send documents to journalists who are helping expose these human rights violations.
+
+All of this software uses Tor to help protect Jelani’s privacy.
+
+### Human rights activists like Jelani are fighting for justice in their communities, and Tor helps power their resistance.
+
+---
+
+# 4. TOR FOR ANTI-CENSORSHIP
+
+### Build bridges not walls
+
+Jean was traveling for the first time to a country far from his family.
+
+After arriving at a hotel, he opened his laptop.
+
+He was so exhausted that when the message "Connection has timed out" first appeared on his web browser, he thought it was due to his own error.
+
+But after trying again and again, he realized that his email provider, a news website, and many apps were unavailable.
+
+He had heard that this country censors the internet and wondered if that was happening.
+How could he contact his family from behind this impenetrable wall?
+After doing some web searches, he found a forum and read about VPNs, private services that allow you to connect to another uncensored network.
+
+Jean spent half an hour trying to figure out which cheap VPN was best.
+
+He chose one and for a moment it seemed to work, but after five minutes the connection went offline and the VPN would no longer connect.
+
+Jean kept reading to find other options and learned about Tor Browser and how it can circumvent censorship.
+
+He found an official website mirror to download the program.
+
+When he opened **Tor Browser**, he followed the prompts for censored users and connected to a bridge which allowed him to access the internet again.
+
+With Tor Browser, Jean can browse freely and privately and contact his family.
+
+### Censored users all over the world rely on Tor Browser for a free, stable, and uncensored way to access the internet.
+
+---
+
+# 5. Shared Sections
+
+## What is Tor?
+
+Tor is free software and an open network that helps protect you from tracking, surveillance, and censorship online.
+Tor is created for free by a 501(c)3 U.S.-based nonprofit called the Tor Project.
+
+The easiest way to use Tor is Tor Browser.
+When you use Tor Browser, no one can see what websites you visit or where in the world you’re coming from.
+
+Other applications, like SecureDrop and OnionShare, use Tor to protect their users against surveillance and censorship.
+
+
+## 6. How does Tor work?
+
+Amal wants to visit Bekele’s website privately, so she opens Tor Browser.
+
+Tor Browser selects a random circuit of three relays, which are computers all over the world configured to route traffic over the Tor network.
+
+Tor Browser then encrypts her website request three times and sends it to the first Tor relay in her circuit.
+
+The first relay removes the first encryption layer but doesn't learn that the destination is Bekele’s website.
+
+The first relay learns only the next location in the circuit, which is the second relay.
+
+The second relay removes another encryption layer and forwards the web page request to the third relay.
+
+The third relay removes the last encryption layer and forwards the web page request to its destination, Bekele’s website, but it doesn't know the request comes from Amal.
+
+Bekele doesn't know that the website request came from Amal unless she tells him so.
+
+## 7. Who uses Tor?
+
+People all over the world use Tor to protect their privacy and access the web freely.
+
+Tor helps protect journalists, human rights defenders, domestic violence victims, academic researchers, and anyone experiencing tracking, censorship, or surveillance.
+
+## 6. Why trust Tor?
+
+Tor is designed for privacy. We don’t know who our users are, and we don't keep logs of user activity.
+
+Tor relay operators cannot reveal the true identity of Tor users.
+
+Continual peer review of Tor's source code by academic and open source communities ensures that there are no backdoors in Tor, and our social contract promises that we will never backdoor Tor.
+
+## 7. Join the Tor community
+
+Tor is made possible by a diverse set of users, developers, relay operators, and advocates from around the world.
+
+We need your help to make Tor more usable and secure for people everywhere.
+
+You can volunteer with Tor by writing code, running a relay, creating documentation, offering user support, or telling people in your community about Tor.
+
+The Tor community is governed by a code of conduct, and we outline our set of promises to the community in our social contract.
+
+Learn more about Tor by visiting our website, our wiki, finding us on IRC, joining one of our mailing lists, or signing up for Tor News at newsletter.torproject.org.
+
+
+## 8. Download Tor
+
+Tor for Desktop
+torproject.org/download
+
+TOR ON MOBILE
+### Android
+Tor Browser for Android is available from GooglePlay.
+
+### iOS
+Onion Browser, developed by M. Tigas, is the only browser we recommend for iOS.
+
diff --git a/es_ES.po b/es_ES.po
new file mode 100644
index 000000000..6c8fce0dc
--- /dev/null
+++ b/es_ES.po
@@ -0,0 +1,162 @@
+# Tor Outreach Material 2019-2020
+
+# 1. TOR FOR PRIVACY
+
+### Privacy is a human right
+
+Like many of us, Aleisha spends most of her time online--connecting with friends, posting on social media, and browsing the web.
+
+But lately, she's noticed that advertisements related to her previous searches are following her around online.
+
+This feels so invasive that she does some research on online ads and learns that it's not just advertisers tracking her but also her ISP, analytics companies, social media platforms, and more.
+
+Aleisha decides she wants to find and use software that doesn't collect her data, doesn't track her, and doesn't tell other services anything private about her.
+
+She goes to a privacy training at a local hackerspace and learns about **Tor Browser**, the only web browser that allows her to browse anonymously.
+
+---
+
+# 2.TOR FOR FEMINISTS
+
+### The future is cyberfeminist
+
+Fernanda runs a women's collective focused on reproductive rights in Brazil, where abortion is illegal.
+
+Fernanda and her colleagues built a website with information about abortion access, birth control, and other resources for people seeking reproductive information.
+
+If this website was linked back to them, they could be arrested--or worse.
+
+To protect themselves, Fernanda and her colleagues created the website using Tor **onion services**. Onion services not only protect them from being discovered as the operators of the server but also help protect visitors to their website by requiring they use Tor Browser.
+
+In fact, Fernanda uses **Tor Browser** for all of her web browsing just to be on the safe side.
+
+She also uses a Tor-powered app called **OnionShare** to send files to other activists securely and privately.
+
+### Reproductive rights activists like Fernanda are fighting for fundamental freedoms, and Tor helps power their resistance.
+
+---
+
+# 3. TOR FOR HUMAN RIGHTS
+
+### Water is life
+
+Jelani lives in a small village which a wide river runs through.
+
+This river has provided water to his community since the days of his ancestors.
+
+But today, Jelani’s river is threatened by powerful multinational companies drilling for oil in the region.
+
+Private security firms, paid for by these companies, use powerful surveillance mechanisms to monitor the online activities of Jelani and his neighbors in the village who are organizing to protect their sacred river.
+
+Jelani uses **Tor Browser** to prevent these companies from watching as he visits websites for international human rights protection and legal aid and writes blog posts about the resistance movement in his village.
+
+He also uses **OnionShare** and **SecureDrop** to securely send documents to journalists who are helping expose these human rights violations.
+
+All of this software uses Tor to help protect Jelani’s privacy.
+
+### Human rights activists like Jelani are fighting for justice in their communities, and Tor helps power their resistance.
+
+---
+
+# 4. TOR FOR ANTI-CENSORSHIP
+
+### Build bridges not walls
+
+Jean was traveling for the first time to a country far from his family.
+
+After arriving at a hotel, he opened his laptop.
+
+He was so exhausted that when the message "Connection has timed out" first appeared on his web browser, he thought it was due to his own error.
+
+But after trying again and again, he realized that his email provider, a news website, and many apps were unavailable.
+
+He had heard that this country censors the internet and wondered if that was happening.
+How could he contact his family from behind this impenetrable wall?
+After doing some web searches, he found a forum and read about VPNs, private services that allow you to connect to another uncensored network.
+
+Jean spent half an hour trying to figure out which cheap VPN was best.
+
+He chose one and for a moment it seemed to work, but after five minutes the connection went offline and the VPN would no longer connect.
+
+Jean kept reading to find other options and learned about Tor Browser and how it can circumvent censorship.
+
+He found an official website mirror to download the program.
+
+When he opened **Tor Browser**, he followed the prompts for censored users and connected to a bridge which allowed him to access the internet again.
+
+With Tor Browser, Jean can browse freely and privately and contact his family.
+
+### Censored users all over the world rely on Tor Browser for a free, stable, and uncensored way to access the internet.
+
+---
+
+# 5. Shared Sections
+
+## What is Tor?
+
+Tor is free software and an open network that helps protect you from tracking, surveillance, and censorship online.
+Tor is created for free by a 501(c)3 U.S.-based nonprofit called the Tor Project.
+
+The easiest way to use Tor is Tor Browser.
+When you use Tor Browser, no one can see what websites you visit or where in the world you’re coming from.
+
+Other applications, like SecureDrop and OnionShare, use Tor to protect their users against surveillance and censorship.
+
+
+## 6. How does Tor work?
+
+Amal wants to visit Bekele’s website privately, so she opens Tor Browser.
+
+Tor Browser selects a random circuit of three relays, which are computers all over the world configured to route traffic over the Tor network.
+
+Tor Browser then encrypts her website request three times and sends it to the first Tor relay in her circuit.
+
+The first relay removes the first encryption layer but doesn't learn that the destination is Bekele’s website.
+
+The first relay learns only the next location in the circuit, which is the second relay.
+
+The second relay removes another encryption layer and forwards the web page request to the third relay.
+
+The third relay removes the last encryption layer and forwards the web page request to its destination, Bekele’s website, but it doesn't know the request comes from Amal.
+
+Bekele doesn't know that the website request came from Amal unless she tells him so.
+
+## 7. Who uses Tor?
+
+People all over the world use Tor to protect their privacy and access the web freely.
+
+Tor helps protect journalists, human rights defenders, domestic violence victims, academic researchers, and anyone experiencing tracking, censorship, or surveillance.
+
+## 6. Why trust Tor?
+
+Tor is designed for privacy. We don’t know who our users are, and we don't keep logs of user activity.
+
+Tor relay operators cannot reveal the true identity of Tor users.
+
+Continual peer review of Tor's source code by academic and open source communities ensures that there are no backdoors in Tor, and our social contract promises that we will never backdoor Tor.
+
+## 7. Join the Tor community
+
+Tor is made possible by a diverse set of users, developers, relay operators, and advocates from around the world.
+
+We need your help to make Tor more usable and secure for people everywhere.
+
+You can volunteer with Tor by writing code, running a relay, creating documentation, offering user support, or telling people in your community about Tor.
+
+The Tor community is governed by a code of conduct, and we outline our set of promises to the community in our social contract.
+
+Learn more about Tor by visiting our website, our wiki, finding us on IRC, joining one of our mailing lists, or signing up for Tor News at newsletter.torproject.org.
+
+
+## 8. Download Tor
+
+Tor for Desktop
+torproject.org/download
+
+TOR ON MOBILE
+### Android
+Tor Browser for Android is available from GooglePlay.
+
+### iOS
+Onion Browser, developed by M. Tigas, is the only browser we recommend for iOS.
+
diff --git a/es_MX.po b/es_MX.po
new file mode 100644
index 000000000..6c8fce0dc
--- /dev/null
+++ b/es_MX.po
@@ -0,0 +1,162 @@
+# Tor Outreach Material 2019-2020
+
+# 1. TOR FOR PRIVACY
+
+### Privacy is a human right
+
+Like many of us, Aleisha spends most of her time online--connecting with friends, posting on social media, and browsing the web.
+
+But lately, she's noticed that advertisements related to her previous searches are following her around online.
+
+This feels so invasive that she does some research on online ads and learns that it's not just advertisers tracking her but also her ISP, analytics companies, social media platforms, and more.
+
+Aleisha decides she wants to find and use software that doesn't collect her data, doesn't track her, and doesn't tell other services anything private about her.
+
+She goes to a privacy training at a local hackerspace and learns about **Tor Browser**, the only web browser that allows her to browse anonymously.
+
+---
+
+# 2.TOR FOR FEMINISTS
+
+### The future is cyberfeminist
+
+Fernanda runs a women's collective focused on reproductive rights in Brazil, where abortion is illegal.
+
+Fernanda and her colleagues built a website with information about abortion access, birth control, and other resources for people seeking reproductive information.
+
+If this website was linked back to them, they could be arrested--or worse.
+
+To protect themselves, Fernanda and her colleagues created the website using Tor **onion services**. Onion services not only protect them from being discovered as the operators of the server but also help protect visitors to their website by requiring they use Tor Browser.
+
+In fact, Fernanda uses **Tor Browser** for all of her web browsing just to be on the safe side.
+
+She also uses a Tor-powered app called **OnionShare** to send files to other activists securely and privately.
+
+### Reproductive rights activists like Fernanda are fighting for fundamental freedoms, and Tor helps power their resistance.
+
+---
+
+# 3. TOR FOR HUMAN RIGHTS
+
+### Water is life
+
+Jelani lives in a small village which a wide river runs through.
+
+This river has provided water to his community since the days of his ancestors.
+
+But today, Jelani’s river is threatened by powerful multinational companies drilling for oil in the region.
+
+Private security firms, paid for by these companies, use powerful surveillance mechanisms to monitor the online activities of Jelani and his neighbors in the village who are organizing to protect their sacred river.
+
+Jelani uses **Tor Browser** to prevent these companies from watching as he visits websites for international human rights protection and legal aid and writes blog posts about the resistance movement in his village.
+
+He also uses **OnionShare** and **SecureDrop** to securely send documents to journalists who are helping expose these human rights violations.
+
+All of this software uses Tor to help protect Jelani’s privacy.
+
+### Human rights activists like Jelani are fighting for justice in their communities, and Tor helps power their resistance.
+
+---
+
+# 4. TOR FOR ANTI-CENSORSHIP
+
+### Build bridges not walls
+
+Jean was traveling for the first time to a country far from his family.
+
+After arriving at a hotel, he opened his laptop.
+
+He was so exhausted that when the message "Connection has timed out" first appeared on his web browser, he thought it was due to his own error.
+
+But after trying again and again, he realized that his email provider, a news website, and many apps were unavailable.
+
+He had heard that this country censors the internet and wondered if that was happening.
+How could he contact his family from behind this impenetrable wall?
+After doing some web searches, he found a forum and read about VPNs, private services that allow you to connect to another uncensored network.
+
+Jean spent half an hour trying to figure out which cheap VPN was best.
+
+He chose one and for a moment it seemed to work, but after five minutes the connection went offline and the VPN would no longer connect.
+
+Jean kept reading to find other options and learned about Tor Browser and how it can circumvent censorship.
+
+He found an official website mirror to download the program.
+
+When he opened **Tor Browser**, he followed the prompts for censored users and connected to a bridge which allowed him to access the internet again.
+
+With Tor Browser, Jean can browse freely and privately and contact his family.
+
+### Censored users all over the world rely on Tor Browser for a free, stable, and uncensored way to access the internet.
+
+---
+
+# 5. Shared Sections
+
+## What is Tor?
+
+Tor is free software and an open network that helps protect you from tracking, surveillance, and censorship online.
+Tor is created for free by a 501(c)3 U.S.-based nonprofit called the Tor Project.
+
+The easiest way to use Tor is Tor Browser.
+When you use Tor Browser, no one can see what websites you visit or where in the world you’re coming from.
+
+Other applications, like SecureDrop and OnionShare, use Tor to protect their users against surveillance and censorship.
+
+
+## 6. How does Tor work?
+
+Amal wants to visit Bekele’s website privately, so she opens Tor Browser.
+
+Tor Browser selects a random circuit of three relays, which are computers all over the world configured to route traffic over the Tor network.
+
+Tor Browser then encrypts her website request three times and sends it to the first Tor relay in her circuit.
+
+The first relay removes the first encryption layer but doesn't learn that the destination is Bekele’s website.
+
+The first relay learns only the next location in the circuit, which is the second relay.
+
+The second relay removes another encryption layer and forwards the web page request to the third relay.
+
+The third relay removes the last encryption layer and forwards the web page request to its destination, Bekele’s website, but it doesn't know the request comes from Amal.
+
+Bekele doesn't know that the website request came from Amal unless she tells him so.
+
+## 7. Who uses Tor?
+
+People all over the world use Tor to protect their privacy and access the web freely.
+
+Tor helps protect journalists, human rights defenders, domestic violence victims, academic researchers, and anyone experiencing tracking, censorship, or surveillance.
+
+## 6. Why trust Tor?
+
+Tor is designed for privacy. We don’t know who our users are, and we don't keep logs of user activity.
+
+Tor relay operators cannot reveal the true identity of Tor users.
+
+Continual peer review of Tor's source code by academic and open source communities ensures that there are no backdoors in Tor, and our social contract promises that we will never backdoor Tor.
+
+## 7. Join the Tor community
+
+Tor is made possible by a diverse set of users, developers, relay operators, and advocates from around the world.
+
+We need your help to make Tor more usable and secure for people everywhere.
+
+You can volunteer with Tor by writing code, running a relay, creating documentation, offering user support, or telling people in your community about Tor.
+
+The Tor community is governed by a code of conduct, and we outline our set of promises to the community in our social contract.
+
+Learn more about Tor by visiting our website, our wiki, finding us on IRC, joining one of our mailing lists, or signing up for Tor News at newsletter.torproject.org.
+
+
+## 8. Download Tor
+
+Tor for Desktop
+torproject.org/download
+
+TOR ON MOBILE
+### Android
+Tor Browser for Android is available from GooglePlay.
+
+### iOS
+Onion Browser, developed by M. Tigas, is the only browser we recommend for iOS.
+
diff --git a/et.po b/et.po
new file mode 100644
index 000000000..6c8fce0dc
--- /dev/null
+++ b/et.po
@@ -0,0 +1,162 @@
+# Tor Outreach Material 2019-2020
+
+# 1. TOR FOR PRIVACY
+
+### Privacy is a human right
+
+Like many of us, Aleisha spends most of her time online--connecting with friends, posting on social media, and browsing the web.
+
+But lately, she's noticed that advertisements related to her previous searches are following her around online.
+
+This feels so invasive that she does some research on online ads and learns that it's not just advertisers tracking her but also her ISP, analytics companies, social media platforms, and more.
+
+Aleisha decides she wants to find and use software that doesn't collect her data, doesn't track her, and doesn't tell other services anything private about her.
+
+She goes to a privacy training at a local hackerspace and learns about **Tor Browser**, the only web browser that allows her to browse anonymously.
+
+---
+
+# 2.TOR FOR FEMINISTS
+
+### The future is cyberfeminist
+
+Fernanda runs a women's collective focused on reproductive rights in Brazil, where abortion is illegal.
+
+Fernanda and her colleagues built a website with information about abortion access, birth control, and other resources for people seeking reproductive information.
+
+If this website was linked back to them, they could be arrested--or worse.
+
+To protect themselves, Fernanda and her colleagues created the website using Tor **onion services**. Onion services not only protect them from being discovered as the operators of the server but also help protect visitors to their website by requiring they use Tor Browser.
+
+In fact, Fernanda uses **Tor Browser** for all of her web browsing just to be on the safe side.
+
+She also uses a Tor-powered app called **OnionShare** to send files to other activists securely and privately.
+
+### Reproductive rights activists like Fernanda are fighting for fundamental freedoms, and Tor helps power their resistance.
+
+---
+
+# 3. TOR FOR HUMAN RIGHTS
+
+### Water is life
+
+Jelani lives in a small village which a wide river runs through.
+
+This river has provided water to his community since the days of his ancestors.
+
+But today, Jelani’s river is threatened by powerful multinational companies drilling for oil in the region.
+
+Private security firms, paid for by these companies, use powerful surveillance mechanisms to monitor the online activities of Jelani and his neighbors in the village who are organizing to protect their sacred river.
+
+Jelani uses **Tor Browser** to prevent these companies from watching as he visits websites for international human rights protection and legal aid and writes blog posts about the resistance movement in his village.
+
+He also uses **OnionShare** and **SecureDrop** to securely send documents to journalists who are helping expose these human rights violations.
+
+All of this software uses Tor to help protect Jelani’s privacy.
+
+### Human rights activists like Jelani are fighting for justice in their communities, and Tor helps power their resistance.
+
+---
+
+# 4. TOR FOR ANTI-CENSORSHIP
+
+### Build bridges not walls
+
+Jean was traveling for the first time to a country far from his family.
+
+After arriving at a hotel, he opened his laptop.
+
+He was so exhausted that when the message "Connection has timed out" first appeared on his web browser, he thought it was due to his own error.
+
+But after trying again and again, he realized that his email provider, a news website, and many apps were unavailable.
+
+He had heard that this country censors the internet and wondered if that was happening.
+How could he contact his family from behind this impenetrable wall?
+After doing some web searches, he found a forum and read about VPNs, private services that allow you to connect to another uncensored network.
+
+Jean spent half an hour trying to figure out which cheap VPN was best.
+
+He chose one and for a moment it seemed to work, but after five minutes the connection went offline and the VPN would no longer connect.
+
+Jean kept reading to find other options and learned about Tor Browser and how it can circumvent censorship.
+
+He found an official website mirror to download the program.
+
+When he opened **Tor Browser**, he followed the prompts for censored users and connected to a bridge which allowed him to access the internet again.
+
+With Tor Browser, Jean can browse freely and privately and contact his family.
+
+### Censored users all over the world rely on Tor Browser for a free, stable, and uncensored way to access the internet.
+
+---
+
+# 5. Shared Sections
+
+## What is Tor?
+
+Tor is free software and an open network that helps protect you from tracking, surveillance, and censorship online.
+Tor is created for free by a 501(c)3 U.S.-based nonprofit called the Tor Project.
+
+The easiest way to use Tor is Tor Browser.
+When you use Tor Browser, no one can see what websites you visit or where in the world you’re coming from.
+
+Other applications, like SecureDrop and OnionShare, use Tor to protect their users against surveillance and censorship.
+
+
+## 6. How does Tor work?
+
+Amal wants to visit Bekele’s website privately, so she opens Tor Browser.
+
+Tor Browser selects a random circuit of three relays, which are computers all over the world configured to route traffic over the Tor network.
+
+Tor Browser then encrypts her website request three times and sends it to the first Tor relay in her circuit.
+
+The first relay removes the first encryption layer but doesn't learn that the destination is Bekele’s website.
+
+The first relay learns only the next location in the circuit, which is the second relay.
+
+The second relay removes another encryption layer and forwards the web page request to the third relay.
+
+The third relay removes the last encryption layer and forwards the web page request to its destination, Bekele’s website, but it doesn't know the request comes from Amal.
+
+Bekele doesn't know that the website request came from Amal unless she tells him so.
+
+## 7. Who uses Tor?
+
+People all over the world use Tor to protect their privacy and access the web freely.
+
+Tor helps protect journalists, human rights defenders, domestic violence victims, academic researchers, and anyone experiencing tracking, censorship, or surveillance.
+
+## 6. Why trust Tor?
+
+Tor is designed for privacy. We don’t know who our users are, and we don't keep logs of user activity.
+
+Tor relay operators cannot reveal the true identity of Tor users.
+
+Continual peer review of Tor's source code by academic and open source communities ensures that there are no backdoors in Tor, and our social contract promises that we will never backdoor Tor.
+
+## 7. Join the Tor community
+
+Tor is made possible by a diverse set of users, developers, relay operators, and advocates from around the world.
+
+We need your help to make Tor more usable and secure for people everywhere.
+
+You can volunteer with Tor by writing code, running a relay, creating documentation, offering user support, or telling people in your community about Tor.
+
+The Tor community is governed by a code of conduct, and we outline our set of promises to the community in our social contract.
+
+Learn more about Tor by visiting our website, our wiki, finding us on IRC, joining one of our mailing lists, or signing up for Tor News at newsletter.torproject.org.
+
+
+## 8. Download Tor
+
+Tor for Desktop
+torproject.org/download
+
+TOR ON MOBILE
+### Android
+Tor Browser for Android is available from GooglePlay.
+
+### iOS
+Onion Browser, developed by M. Tigas, is the only browser we recommend for iOS.
+
diff --git a/eu.po b/eu.po
new file mode 100644
index 000000000..b8d703a56
--- /dev/null
+++ b/eu.po
@@ -0,0 +1,162 @@
+# Tor Outreach Material 2019-2020
+
+# 1. TOR FOR PRIVACY
+
+### Privacy is a human right
+
+Like many of us, Aleisha spends most of her time online--connecting with friends, posting on social media, and browsing the web.
+
+But lately, she's noticed that advertisements related to her previous searches are following her around online.
+
+This feels so invasive that she does some research on online ads and learns that it's not just advertisers tracking her but also her ISP, analytics companies, social media platforms, and more.
+
+Aleisha decides she wants to find and use software that doesn't collect her data, doesn't track her, and doesn't tell other services anything private about her.
+
+She goes to a privacy training at a local hackerspace and learns about **Tor Browser**, the only web browser that allows her to browse anonymously.
+
+---
+
+# 2.TOR FOR FEMINISTS
+
+### The future is cyberfeminist
+
+Fernanda runs a women's collective focused on reproductive rights in Brazil, where abortion is illegal.
+
+Fernanda and her colleagues built a website with information about abortion access, birth control, and other resources for people seeking reproductive information.
+
+If this website was linked back to them, they could be arrested--or worse.
+
+To protect themselves, Fernanda and her colleagues created the website using Tor **onion services**. Onion services not only protect them from being discovered as the operators of the server but also help protect visitors to their website by requiring they use Tor Browser.
+
+In fact, Fernanda uses **Tor Browser** for all of her web browsing just to be on the safe side.
+
+She also uses a Tor-powered app called **OnionShare** to send files to other activists securely and privately.
+
+### Reproductive rights activists like Fernanda are fighting for fundamental freedoms, and Tor helps power their resistance.
+
+---
+
+# 3. TOR FOR HUMAN RIGHTS
+
+### Water is life
+
+Jelani lives in a small village which a wide river runs through.
+
+This river has provided water to his community since the days of his ancestors.
+
+But today, Jelani’s river is threatened by powerful multinational companies drilling for oil in the region.
+
+Private security firms, paid for by these companies, use powerful surveillance mechanisms to monitor the online activities of Jelani and his neighbors in the village who are organizing to protect their sacred river.
+
+Jelani uses **Tor Browser** to prevent these companies from watching as he visits websites for international human rights protection and legal aid and writes blog posts about the resistance movement in his village.
+
+He also uses **OnionShare** and **SecureDrop** to securely send documents to journalists who are helping expose these human rights violations.
+
+All of this software uses Tor to help protect Jelani’s privacy.
+
+### Human rights activists like Jelani are fighting for justice in their communities, and Tor helps power their resistance.
+
+---
+
+# 4. TOR FOR ANTI-CENSORSHIP
+
+### Build bridges not walls
+
+Jean was traveling for the first time to a country far from his family.
+
+After arriving at a hotel, he opened his laptop.
+
+He was so exhausted that when the message "Connection has timed out" first appeared on his web browser, he thought it was due to his own error.
+
+But after trying again and again, he realized that his email provider, a news website, and many apps were unavailable.
+
+He had heard that this country censors the internet and wondered if that was happening.
+How could he contact his family from behind this impenetrable wall?
+After doing some web searches, he found a forum and read about VPNs, private services that allow you to connect to another uncensored network.
+
+Jean spent half an hour trying to figure out which cheap VPN was best.
+
+He chose one and for a moment it seemed to work, but after five minutes the connection went offline and the VPN would no longer connect.
+
+Jean kept reading to find other options and learned about Tor Browser and how it can circumvent censorship.
+
+He found an official website mirror to download the program.
+
+When he opened **Tor Browser**, he followed the prompts for censored users and connected to a bridge which allowed him to access the internet again.
+
+With Tor Browser, Jean can browse freely and privately and contact his family.
+
+### Censored users all over the world rely on Tor Browser for a free, stable, and uncensored way to access the internet.
+
+---
+
+# 5. Shared Sections
+
+## Zer da Tor?
+
+Tor is free software and an open network that helps protect you from tracking, surveillance, and censorship online.
+Tor is created for free by a 501(c)3 U.S.-based nonprofit called the Tor Project.
+
+The easiest way to use Tor is Tor Browser.
+When you use Tor Browser, no one can see what websites you visit or where in the world you’re coming from.
+
+Other applications, like SecureDrop and OnionShare, use Tor to protect their users against surveillance and censorship.
+
+
+## 6. How does Tor work?
+
+Amal wants to visit Bekele’s website privately, so she opens Tor Browser.
+
+Tor Browser selects a random circuit of three relays, which are computers all over the world configured to route traffic over the Tor network.
+
+Tor Browser then encrypts her website request three times and sends it to the first Tor relay in her circuit.
+
+The first relay removes the first encryption layer but doesn't learn that the destination is Bekele’s website.
+
+The first relay learns only the next location in the circuit, which is the second relay.
+
+The second relay removes another encryption layer and forwards the web page request to the third relay.
+
+The third relay removes the last encryption layer and forwards the web page request to its destination, Bekele’s website, but it doesn't know the request comes from Amal.
+
+Bekele doesn't know that the website request came from Amal unless she tells him so.
+
+## 7. Who uses Tor?
+
+People all over the world use Tor to protect their privacy and access the web freely.
+
+Tor helps protect journalists, human rights defenders, domestic violence victims, academic researchers, and anyone experiencing tracking, censorship, or surveillance.
+
+## 6. Why trust Tor?
+
+Tor is designed for privacy. We don’t know who our users are, and we don't keep logs of user activity.
+
+Tor relay operators cannot reveal the true identity of Tor users.
+
+Continual peer review of Tor's source code by academic and open source communities ensures that there are no backdoors in Tor, and our social contract promises that we will never backdoor Tor.
+
+## 7. Join the Tor community
+
+Tor is made possible by a diverse set of users, developers, relay operators, and advocates from around the world.
+
+We need your help to make Tor more usable and secure for people everywhere.
+
+You can volunteer with Tor by writing code, running a relay, creating documentation, offering user support, or telling people in your community about Tor.
+
+The Tor community is governed by a code of conduct, and we outline our set of promises to the community in our social contract.
+
+Learn more about Tor by visiting our website, our wiki, finding us on IRC, joining one of our mailing lists, or signing up for Tor News at newsletter.torproject.org.
+
+
+## 8. Download Tor
+
+Tor for Desktop
+torproject.org/download
+
+TOR ON MOBILE
+### Android
+Tor Browser for Android is available from GooglePlay.
+
+### iOS
+Onion Browser, developed by M. Tigas, is the only browser we recommend for iOS.
+
diff --git a/fa.po b/fa.po
new file mode 100644
index 000000000..d83eef99e
--- /dev/null
+++ b/fa.po
@@ -0,0 +1,162 @@
+# تور توسعه یافته متریال 1397 - 1398
+
+# 1. تور برای محرمانگی
+
+### حریم خصوصی یک حق انسانی است
+
+مانند بسیاری از ما، Aleisha بیشتر وقت خود را به صورت آنلاین سپری میکند - - برقراری ارتباط با دوستان، ارسال وب سایتهای ارتباط جمعی، و مرور وب.
+
+اما اخیرا متوجه شدهاست که تبلیغات مربوط به جستجوهای گذشته او، او را به صورت آنلاین دنبال میکنند.
+
+این به قدری تهاجمی است که برخی از تحقیقات را بر روی تبلیغات آنلاین انجام میدهد و یاد میگیرد که نه تنها تبلیغ کنندگان او بلکه ISP، شرکتهای تجزیه و تحلیل، سکوهای رسانه اجتماعی و چیزهای دیگر را پیگیری میکنند.
+
+Aleisha تصمیم میگیرد که به دنبال پیدا کردن و استفاده از نرمافزاری است که دادههای او را جمعآوری نمیکند، او را ردیابی نمیکند، و هیچ چیز خصوصی در مورد او به دیگران نمیگوید.
+
+او به یک تمرین خصوصی در یک هکر محلی میرود و در مورد مرورگر وب چیزی یاد میگیرد، تنها مرورگر وب که به او اجازه میدهد بدون نام مستعار مرور کند.
+
+---
+
+# 2.TOR FOR FEMINISTS
+
+### The future is cyberfeminist
+
+فرناندا یک گروه از زنان را بر روی حقوق باروری در برزیل اداره میکند که در آن سقطجنین غیر قانونی است.
+
+فرناندا و همکارانش یک وب سایت با اطلاعاتی درباره سقطجنین، کنترل تولد و سایر منابع برای افرادی که به دنبال اطلاعات تولید مثلی هستند، ساختند.
+
+If this website was linked back to them, they could be arrested--or worse.
+
+To protect themselves, Fernanda and her colleagues created the website using Tor **onion services**. Onion services not only protect them from being discovered as the operators of the server but also help protect visitors to their website by requiring they use Tor Browser.
+
+In fact, Fernanda uses **Tor Browser** for all of her web browsing just to be on the safe side.
+
+She also uses a Tor-powered app called **OnionShare** to send files to other activists securely and privately.
+
+### فعالین حقوق باروری مانند فرناندا، برای آزادیهای اساسی مبارزه میکنند و تور به قدرت مقاومت آنها کمک میکند.
+
+---
+
+# 3. تور برای حقوق بشر
+
+### Water is life
+
+Jelani در روستایی کوچکی زندگی میکند که رودخانه وسیعی از آن عبور میکند.
+
+این رودخانه از زمان اجدادش به جامعه خود آب دادهاست.
+
+اما امروز، رودخانه Jelani توسط شرکتهای چند ملیتی قدرتمند در حال حفاری نفت در منطقه مورد تهدید قرار گرفتهاست.
+
+Private security firms, paid for by these companies, use powerful surveillance mechanisms to monitor the online activities of Jelani and his neighbors in the village who are organizing to protect their sacred river.
+
+Jelani uses **Tor Browser** to prevent these companies from watching as he visits websites for international human rights protection and legal aid and writes blog posts about the resistance movement in his village.
+
+He also uses **OnionShare** and **SecureDrop** to securely send documents to journalists who are helping expose these human rights violations.
+
+All of this software uses Tor to help protect Jelani’s privacy.
+
+### Human rights activists like Jelani are fighting for justice in their communities, and Tor helps power their resistance.
+
+---
+
+# 4. TOR FOR ANTI-CENSORSHIP
+
+### Build bridges not walls
+
+Jean was traveling for the first time to a country far from his family.
+
+After arriving at a hotel, he opened his laptop.
+
+He was so exhausted that when the message "Connection has timed out" first appeared on his web browser, he thought it was due to his own error.
+
+But after trying again and again, he realized that his email provider, a news website, and many apps were unavailable.
+
+He had heard that this country censors the internet and wondered if that was happening.
+How could he contact his family from behind this impenetrable wall?
+After doing some web searches, he found a forum and read about VPNs, private services that allow you to connect to another uncensored network.
+
+Jean spent half an hour trying to figure out which cheap VPN was best.
+
+He chose one and for a moment it seemed to work, but after five minutes the connection went offline and the VPN would no longer connect.
+
+Jean kept reading to find other options and learned about Tor Browser and how it can circumvent censorship.
+
+He found an official website mirror to download the program.
+
+When he opened **Tor Browser**, he followed the prompts for censored users and connected to a bridge which allowed him to access the internet again.
+
+With Tor Browser, Jean can browse freely and privately and contact his family.
+
+### Censored users all over the world rely on Tor Browser for a free, stable, and uncensored way to access the internet.
+
+---
+
+# 5. Shared Sections
+
+## تور چیست؟
+
+Tor is free software and an open network that helps protect you from tracking, surveillance, and censorship online.
+Tor is created for free by a 501(c)3 U.S.-based nonprofit called the Tor Project.
+
+The easiest way to use Tor is Tor Browser.
+When you use Tor Browser, no one can see what websites you visit or where in the world you’re coming from.
+
+Other applications, like SecureDrop and OnionShare, use Tor to protect their users against surveillance and censorship.
+
+
+## 6. How does Tor work?
+
+Amal wants to visit Bekele’s website privately, so she opens Tor Browser.
+
+Tor Browser selects a random circuit of three relays, which are computers all over the world configured to route traffic over the Tor network.
+
+Tor Browser then encrypts her website request three times and sends it to the first Tor relay in her circuit.
+
+The first relay removes the first encryption layer but doesn't learn that the destination is Bekele’s website.
+
+The first relay learns only the next location in the circuit, which is the second relay.
+
+The second relay removes another encryption layer and forwards the web page request to the third relay.
+
+The third relay removes the last encryption layer and forwards the web page request to its destination, Bekele’s website, but it doesn't know the request comes from Amal.
+
+Bekele doesn't know that the website request came from Amal unless she tells him so.
+
+## 7. Who uses Tor?
+
+People all over the world use Tor to protect their privacy and access the web freely.
+
+Tor helps protect journalists, human rights defenders, domestic violence victims, academic researchers, and anyone experiencing tracking, censorship, or surveillance.
+
+## 6. Why trust Tor?
+
+Tor is designed for privacy. We don’t know who our users are, and we don't keep logs of user activity.
+
+Tor relay operators cannot reveal the true identity of Tor users.
+
+Continual peer review of Tor's source code by academic and open source communities ensures that there are no backdoors in Tor, and our social contract promises that we will never backdoor Tor.
+
+## 7. Join the Tor community
+
+Tor is made possible by a diverse set of users, developers, relay operators, and advocates from around the world.
+
+We need your help to make Tor more usable and secure for people everywhere.
+
+You can volunteer with Tor by writing code, running a relay, creating documentation, offering user support, or telling people in your community about Tor.
+
+The Tor community is governed by a code of conduct, and we outline our set of promises to the community in our social contract.
+
+Learn more about Tor by visiting our website, our wiki, finding us on IRC, joining one of our mailing lists, or signing up for Tor News at newsletter.torproject.org.
+
+
+## 8. Download Tor
+
+Tor for Desktop
+torproject.org/download
+
+TOR ON MOBILE
+### Android
+Tor Browser for Android is available from GooglePlay.
+
+### iOS
+Onion Browser, developed by M. Tigas, is the only browser we recommend for iOS.
+
diff --git a/fa_AF.po b/fa_AF.po
new file mode 100644
index 000000000..6c8fce0dc
--- /dev/null
+++ b/fa_AF.po
@@ -0,0 +1,162 @@
+# Tor Outreach Material 2019-2020
+
+# 1. TOR FOR PRIVACY
+
+### Privacy is a human right
+
+Like many of us, Aleisha spends most of her time online--connecting with friends, posting on social media, and browsing the web.
+
+But lately, she's noticed that advertisements related to her previous searches are following her around online.
+
+This feels so invasive that she does some research on online ads and learns that it's not just advertisers tracking her but also her ISP, analytics companies, social media platforms, and more.
+
+Aleisha decides she wants to find and use software that doesn't collect her data, doesn't track her, and doesn't tell other services anything private about her.
+
+She goes to a privacy training at a local hackerspace and learns about **Tor Browser**, the only web browser that allows her to browse anonymously.
+
+---
+
+# 2.TOR FOR FEMINISTS
+
+### The future is cyberfeminist
+
+Fernanda runs a women's collective focused on reproductive rights in Brazil, where abortion is illegal.
+
+Fernanda and her colleagues built a website with information about abortion access, birth control, and other resources for people seeking reproductive information.
+
+If this website was linked back to them, they could be arrested--or worse.
+
+To protect themselves, Fernanda and her colleagues created the website using Tor **onion services**. Onion services not only protect them from being discovered as the operators of the server but also help protect visitors to their website by requiring they use Tor Browser.
+
+In fact, Fernanda uses **Tor Browser** for all of her web browsing just to be on the safe side.
+
+She also uses a Tor-powered app called **OnionShare** to send files to other activists securely and privately.
+
+### Reproductive rights activists like Fernanda are fighting for fundamental freedoms, and Tor helps power their resistance.
+
+---
+
+# 3. TOR FOR HUMAN RIGHTS
+
+### Water is life
+
+Jelani lives in a small village which a wide river runs through.
+
+This river has provided water to his community since the days of his ancestors.
+
+But today, Jelani’s river is threatened by powerful multinational companies drilling for oil in the region.
+
+Private security firms, paid for by these companies, use powerful surveillance mechanisms to monitor the online activities of Jelani and his neighbors in the village who are organizing to protect their sacred river.
+
+Jelani uses **Tor Browser** to prevent these companies from watching as he visits websites for international human rights protection and legal aid and writes blog posts about the resistance movement in his village.
+
+He also uses **OnionShare** and **SecureDrop** to securely send documents to journalists who are helping expose these human rights violations.
+
+All of this software uses Tor to help protect Jelani’s privacy.
+
+### Human rights activists like Jelani are fighting for justice in their communities, and Tor helps power their resistance.
+
+---
+
+# 4. TOR FOR ANTI-CENSORSHIP
+
+### Build bridges not walls
+
+Jean was traveling for the first time to a country far from his family.
+
+After arriving at a hotel, he opened his laptop.
+
+He was so exhausted that when the message "Connection has timed out" first appeared on his web browser, he thought it was due to his own error.
+
+But after trying again and again, he realized that his email provider, a news website, and many apps were unavailable.
+
+He had heard that this country censors the internet and wondered if that was happening.
+How could he contact his family from behind this impenetrable wall?
+After doing some web searches, he found a forum and read about VPNs, private services that allow you to connect to another uncensored network.
+
+Jean spent half an hour trying to figure out which cheap VPN was best.
+
+He chose one and for a moment it seemed to work, but after five minutes the connection went offline and the VPN would no longer connect.
+
+Jean kept reading to find other options and learned about Tor Browser and how it can circumvent censorship.
+
+He found an official website mirror to download the program.
+
+When he opened **Tor Browser**, he followed the prompts for censored users and connected to a bridge which allowed him to access the internet again.
+
+With Tor Browser, Jean can browse freely and privately and contact his family.
+
+### Censored users all over the world rely on Tor Browser for a free, stable, and uncensored way to access the internet.
+
+---
+
+# 5. Shared Sections
+
+## What is Tor?
+
+Tor is free software and an open network that helps protect you from tracking, surveillance, and censorship online.
+Tor is created for free by a 501(c)3 U.S.-based nonprofit called the Tor Project.
+
+The easiest way to use Tor is Tor Browser.
+When you use Tor Browser, no one can see what websites you visit or where in the world you’re coming from.
+
+Other applications, like SecureDrop and OnionShare, use Tor to protect their users against surveillance and censorship.
+
+
+## 6. How does Tor work?
+
+Amal wants to visit Bekele’s website privately, so she opens Tor Browser.
+
+Tor Browser selects a random circuit of three relays, which are computers all over the world configured to route traffic over the Tor network.
+
+Tor Browser then encrypts her website request three times and sends it to the first Tor relay in her circuit.
+
+The first relay removes the first encryption layer but doesn't learn that the destination is Bekele’s website.
+
+The first relay learns only the next location in the circuit, which is the second relay.
+
+The second relay removes another encryption layer and forwards the web page request to the third relay.
+
+The third relay removes the last encryption layer and forwards the web page request to its destination, Bekele’s website, but it doesn't know the request comes from Amal.
+
+Bekele doesn't know that the website request came from Amal unless she tells him so.
+
+## 7. Who uses Tor?
+
+People all over the world use Tor to protect their privacy and access the web freely.
+
+Tor helps protect journalists, human rights defenders, domestic violence victims, academic researchers, and anyone experiencing tracking, censorship, or surveillance.
+
+## 6. Why trust Tor?
+
+Tor is designed for privacy. We don’t know who our users are, and we don't keep logs of user activity.
+
+Tor relay operators cannot reveal the true identity of Tor users.
+
+Continual peer review of Tor's source code by academic and open source communities ensures that there are no backdoors in Tor, and our social contract promises that we will never backdoor Tor.
+
+## 7. Join the Tor community
+
+Tor is made possible by a diverse set of users, developers, relay operators, and advocates from around the world.
+
+We need your help to make Tor more usable and secure for people everywhere.
+
+You can volunteer with Tor by writing code, running a relay, creating documentation, offering user support, or telling people in your community about Tor.
+
+The Tor community is governed by a code of conduct, and we outline our set of promises to the community in our social contract.
+
+Learn more about Tor by visiting our website, our wiki, finding us on IRC, joining one of our mailing lists, or signing up for Tor News at newsletter.torproject.org.
+
+
+## 8. Download Tor
+
+Tor for Desktop
+torproject.org/download
+
+TOR ON MOBILE
+### Android
+Tor Browser for Android is available from GooglePlay.
+
+### iOS
+Onion Browser, developed by M. Tigas, is the only browser we recommend for iOS.
+
diff --git a/fi.po b/fi.po
new file mode 100644
index 000000000..ca4142d26
--- /dev/null
+++ b/fi.po
@@ -0,0 +1,162 @@
+# Tor Outreach Material 2019-2020
+
+# 1. TOR FOR PRIVACY
+
+### Privacy is a human right
+
+Like many of us, Aleisha spends most of her time online--connecting with friends, posting on social media, and browsing the web.
+
+But lately, she's noticed that advertisements related to her previous searches are following her around online.
+
+This feels so invasive that she does some research on online ads and learns that it's not just advertisers tracking her but also her ISP, analytics companies, social media platforms, and more.
+
+Aleisha decides she wants to find and use software that doesn't collect her data, doesn't track her, and doesn't tell other services anything private about her.
+
+She goes to a privacy training at a local hackerspace and learns about **Tor Browser**, the only web browser that allows her to browse anonymously.
+
+---
+
+# 2.TOR FOR FEMINISTS
+
+### The future is cyberfeminist
+
+Fernanda runs a women's collective focused on reproductive rights in Brazil, where abortion is illegal.
+
+Fernanda and her colleagues built a website with information about abortion access, birth control, and other resources for people seeking reproductive information.
+
+If this website was linked back to them, they could be arrested--or worse.
+
+To protect themselves, Fernanda and her colleagues created the website using Tor **onion services**. Onion services not only protect them from being discovered as the operators of the server but also help protect visitors to their website by requiring they use Tor Browser.
+
+In fact, Fernanda uses **Tor Browser** for all of her web browsing just to be on the safe side.
+
+She also uses a Tor-powered app called **OnionShare** to send files to other activists securely and privately.
+
+### Reproductive rights activists like Fernanda are fighting for fundamental freedoms, and Tor helps power their resistance.
+
+---
+
+# 3. TOR FOR HUMAN RIGHTS
+
+### Water is life
+
+Jelani lives in a small village which a wide river runs through.
+
+This river has provided water to his community since the days of his ancestors.
+
+But today, Jelani’s river is threatened by powerful multinational companies drilling for oil in the region.
+
+Private security firms, paid for by these companies, use powerful surveillance mechanisms to monitor the online activities of Jelani and his neighbors in the village who are organizing to protect their sacred river.
+
+Jelani uses **Tor Browser** to prevent these companies from watching as he visits websites for international human rights protection and legal aid and writes blog posts about the resistance movement in his village.
+
+He also uses **OnionShare** and **SecureDrop** to securely send documents to journalists who are helping expose these human rights violations.
+
+All of this software uses Tor to help protect Jelani’s privacy.
+
+### Human rights activists like Jelani are fighting for justice in their communities, and Tor helps power their resistance.
+
+---
+
+# 4. TOR FOR ANTI-CENSORSHIP
+
+### Build bridges not walls
+
+Jean was traveling for the first time to a country far from his family.
+
+After arriving at a hotel, he opened his laptop.
+
+He was so exhausted that when the message "Connection has timed out" first appeared on his web browser, he thought it was due to his own error.
+
+But after trying again and again, he realized that his email provider, a news website, and many apps were unavailable.
+
+He had heard that this country censors the internet and wondered if that was happening.
+How could he contact his family from behind this impenetrable wall?
+After doing some web searches, he found a forum and read about VPNs, private services that allow you to connect to another uncensored network.
+
+Jean spent half an hour trying to figure out which cheap VPN was best.
+
+He chose one and for a moment it seemed to work, but after five minutes the connection went offline and the VPN would no longer connect.
+
+Jean kept reading to find other options and learned about Tor Browser and how it can circumvent censorship.
+
+He found an official website mirror to download the program.
+
+When he opened **Tor Browser**, he followed the prompts for censored users and connected to a bridge which allowed him to access the internet again.
+
+With Tor Browser, Jean can browse freely and privately and contact his family.
+
+### Censored users all over the world rely on Tor Browser for a free, stable, and uncensored way to access the internet.
+
+---
+
+# 5. Shared Sections
+
+## Mikä Tor on?
+
+Tor is free software and an open network that helps protect you from tracking, surveillance, and censorship online.
+Tor is created for free by a 501(c)3 U.S.-based nonprofit called the Tor Project.
+
+The easiest way to use Tor is Tor Browser.
+When you use Tor Browser, no one can see what websites you visit or where in the world you’re coming from.
+
+Other applications, like SecureDrop and OnionShare, use Tor to protect their users against surveillance and censorship.
+
+
+## 6. How does Tor work?
+
+Amal wants to visit Bekele’s website privately, so she opens Tor Browser.
+
+Tor Browser selects a random circuit of three relays, which are computers all over the world configured to route traffic over the Tor network.
+
+Tor Browser then encrypts her website request three times and sends it to the first Tor relay in her circuit.
+
+The first relay removes the first encryption layer but doesn't learn that the destination is Bekele’s website.
+
+The first relay learns only the next location in the circuit, which is the second relay.
+
+The second relay removes another encryption layer and forwards the web page request to the third relay.
+
+The third relay removes the last encryption layer and forwards the web page request to its destination, Bekele’s website, but it doesn't know the request comes from Amal.
+
+Bekele doesn't know that the website request came from Amal unless she tells him so.
+
+## 7. Who uses Tor?
+
+People all over the world use Tor to protect their privacy and access the web freely.
+
+Tor helps protect journalists, human rights defenders, domestic violence victims, academic researchers, and anyone experiencing tracking, censorship, or surveillance.
+
+## 6. Why trust Tor?
+
+Tor is designed for privacy. We don’t know who our users are, and we don't keep logs of user activity.
+
+Tor relay operators cannot reveal the true identity of Tor users.
+
+Continual peer review of Tor's source code by academic and open source communities ensures that there are no backdoors in Tor, and our social contract promises that we will never backdoor Tor.
+
+## 7. Join the Tor community
+
+Tor is made possible by a diverse set of users, developers, relay operators, and advocates from around the world.
+
+We need your help to make Tor more usable and secure for people everywhere.
+
+You can volunteer with Tor by writing code, running a relay, creating documentation, offering user support, or telling people in your community about Tor.
+
+The Tor community is governed by a code of conduct, and we outline our set of promises to the community in our social contract.
+
+Learn more about Tor by visiting our website, our wiki, finding us on IRC, joining one of our mailing lists, or signing up for Tor News at newsletter.torproject.org.
+
+
+## 8. Download Tor
+
+Tor for Desktop
+torproject.org/download
+
+TOR ON MOBILE
+### Android
+Tor Browser for Android is available from GooglePlay.
+
+### iOS
+Onion Browser, developed by M. Tigas, is the only browser we recommend for iOS.
+
diff --git a/fil.po b/fil.po
new file mode 100644
index 000000000..cbe6cfbf8
--- /dev/null
+++ b/fil.po
@@ -0,0 +1,162 @@
+# Tor Outreach Material 2019-2020
+
+# 1. TOR FOR PRIVACY
+
+### Privacy is a human right
+
+Like many of us, Aleisha spends most of her time online--connecting with friends, posting on social media, and browsing the web.
+
+But lately, she's noticed that advertisements related to her previous searches are following her around online.
+
+This feels so invasive that she does some research on online ads and learns that it's not just advertisers tracking her but also her ISP, analytics companies, social media platforms, and more.
+
+Aleisha decides she wants to find and use software that doesn't collect her data, doesn't track her, and doesn't tell other services anything private about her.
+
+She goes to a privacy training at a local hackerspace and learns about **Tor Browser**, the only web browser that allows her to browse anonymously.
+
+---
+
+# 2.TOR FOR FEMINISTS
+
+### The future is cyberfeminist
+
+Fernanda runs a women's collective focused on reproductive rights in Brazil, where abortion is illegal.
+
+Fernanda and her colleagues built a website with information about abortion access, birth control, and other resources for people seeking reproductive information.
+
+If this website was linked back to them, they could be arrested--or worse.
+
+To protect themselves, Fernanda and her colleagues created the website using Tor **onion services**. Onion services not only protect them from being discovered as the operators of the server but also help protect visitors to their website by requiring they use Tor Browser.
+
+In fact, Fernanda uses **Tor Browser** for all of her web browsing just to be on the safe side.
+
+She also uses a Tor-powered app called **OnionShare** to send files to other activists securely and privately.
+
+### Reproductive rights activists like Fernanda are fighting for fundamental freedoms, and Tor helps power their resistance.
+
+---
+
+# 3. TOR FOR HUMAN RIGHTS
+
+### Water is life
+
+Jelani lives in a small village which a wide river runs through.
+
+This river has provided water to his community since the days of his ancestors.
+
+But today, Jelani’s river is threatened by powerful multinational companies drilling for oil in the region.
+
+Private security firms, paid for by these companies, use powerful surveillance mechanisms to monitor the online activities of Jelani and his neighbors in the village who are organizing to protect their sacred river.
+
+Jelani uses **Tor Browser** to prevent these companies from watching as he visits websites for international human rights protection and legal aid and writes blog posts about the resistance movement in his village.
+
+He also uses **OnionShare** and **SecureDrop** to securely send documents to journalists who are helping expose these human rights violations.
+
+All of this software uses Tor to help protect Jelani’s privacy.
+
+### Human rights activists like Jelani are fighting for justice in their communities, and Tor helps power their resistance.
+
+---
+
+# 4. TOR FOR ANTI-CENSORSHIP
+
+### Build bridges not walls
+
+Jean was traveling for the first time to a country far from his family.
+
+After arriving at a hotel, he opened his laptop.
+
+He was so exhausted that when the message "Connection has timed out" first appeared on his web browser, he thought it was due to his own error.
+
+But after trying again and again, he realized that his email provider, a news website, and many apps were unavailable.
+
+He had heard that this country censors the internet and wondered if that was happening.
+How could he contact his family from behind this impenetrable wall?
+After doing some web searches, he found a forum and read about VPNs, private services that allow you to connect to another uncensored network.
+
+Jean spent half an hour trying to figure out which cheap VPN was best.
+
+He chose one and for a moment it seemed to work, but after five minutes the connection went offline and the VPN would no longer connect.
+
+Jean kept reading to find other options and learned about Tor Browser and how it can circumvent censorship.
+
+He found an official website mirror to download the program.
+
+When he opened **Tor Browser**, he followed the prompts for censored users and connected to a bridge which allowed him to access the internet again.
+
+With Tor Browser, Jean can browse freely and privately and contact his family.
+
+### Censored users all over the world rely on Tor Browser for a free, stable, and uncensored way to access the internet.
+
+---
+
+# 5. Shared Sections
+
+## Ano ang Tor?
+
+Tor is free software and an open network that helps protect you from tracking, surveillance, and censorship online.
+Tor is created for free by a 501(c)3 U.S.-based nonprofit called the Tor Project.
+
+The easiest way to use Tor is Tor Browser.
+When you use Tor Browser, no one can see what websites you visit or where in the world you’re coming from.
+
+Other applications, like SecureDrop and OnionShare, use Tor to protect their users against surveillance and censorship.
+
+
+## 6. How does Tor work?
+
+Amal wants to visit Bekele’s website privately, so she opens Tor Browser.
+
+Tor Browser selects a random circuit of three relays, which are computers all over the world configured to route traffic over the Tor network.
+
+Tor Browser then encrypts her website request three times and sends it to the first Tor relay in her circuit.
+
+The first relay removes the first encryption layer but doesn't learn that the destination is Bekele’s website.
+
+The first relay learns only the next location in the circuit, which is the second relay.
+
+The second relay removes another encryption layer and forwards the web page request to the third relay.
+
+The third relay removes the last encryption layer and forwards the web page request to its destination, Bekele’s website, but it doesn't know the request comes from Amal.
+
+Bekele doesn't know that the website request came from Amal unless she tells him so.
+
+## 7. Who uses Tor?
+
+People all over the world use Tor to protect their privacy and access the web freely.
+
+Tor helps protect journalists, human rights defenders, domestic violence victims, academic researchers, and anyone experiencing tracking, censorship, or surveillance.
+
+## 6. Why trust Tor?
+
+Tor is designed for privacy. We don’t know who our users are, and we don't keep logs of user activity.
+
+Tor relay operators cannot reveal the true identity of Tor users.
+
+Continual peer review of Tor's source code by academic and open source communities ensures that there are no backdoors in Tor, and our social contract promises that we will never backdoor Tor.
+
+## 7. Join the Tor community
+
+Tor is made possible by a diverse set of users, developers, relay operators, and advocates from around the world.
+
+We need your help to make Tor more usable and secure for people everywhere.
+
+You can volunteer with Tor by writing code, running a relay, creating documentation, offering user support, or telling people in your community about Tor.
+
+The Tor community is governed by a code of conduct, and we outline our set of promises to the community in our social contract.
+
+Learn more about Tor by visiting our website, our wiki, finding us on IRC, joining one of our mailing lists, or signing up for Tor News at newsletter.torproject.org.
+
+
+## 8. Download Tor
+
+Tor for Desktop
+torproject.org/download
+
+TOR ON MOBILE
+### Android
+Tor Browser for Android is available from GooglePlay.
+
+### iOS
+Onion Browser, developed by M. Tigas, is the only browser we recommend for iOS.
+
diff --git a/fo.po b/fo.po
new file mode 100644
index 000000000..6c8fce0dc
--- /dev/null
+++ b/fo.po
@@ -0,0 +1,162 @@
+# Tor Outreach Material 2019-2020
+
+# 1. TOR FOR PRIVACY
+
+### Privacy is a human right
+
+Like many of us, Aleisha spends most of her time online--connecting with friends, posting on social media, and browsing the web.
+
+But lately, she's noticed that advertisements related to her previous searches are following her around online.
+
+This feels so invasive that she does some research on online ads and learns that it's not just advertisers tracking her but also her ISP, analytics companies, social media platforms, and more.
+
+Aleisha decides she wants to find and use software that doesn't collect her data, doesn't track her, and doesn't tell other services anything private about her.
+
+She goes to a privacy training at a local hackerspace and learns about **Tor Browser**, the only web browser that allows her to browse anonymously.
+
+---
+
+# 2.TOR FOR FEMINISTS
+
+### The future is cyberfeminist
+
+Fernanda runs a women's collective focused on reproductive rights in Brazil, where abortion is illegal.
+
+Fernanda and her colleagues built a website with information about abortion access, birth control, and other resources for people seeking reproductive information.
+
+If this website was linked back to them, they could be arrested--or worse.
+
+To protect themselves, Fernanda and her colleagues created the website using Tor **onion services**. Onion services not only protect them from being discovered as the operators of the server but also help protect visitors to their website by requiring they use Tor Browser.
+
+In fact, Fernanda uses **Tor Browser** for all of her web browsing just to be on the safe side.
+
+She also uses a Tor-powered app called **OnionShare** to send files to other activists securely and privately.
+
+### Reproductive rights activists like Fernanda are fighting for fundamental freedoms, and Tor helps power their resistance.
+
+---
+
+# 3. TOR FOR HUMAN RIGHTS
+
+### Water is life
+
+Jelani lives in a small village which a wide river runs through.
+
+This river has provided water to his community since the days of his ancestors.
+
+But today, Jelani’s river is threatened by powerful multinational companies drilling for oil in the region.
+
+Private security firms, paid for by these companies, use powerful surveillance mechanisms to monitor the online activities of Jelani and his neighbors in the village who are organizing to protect their sacred river.
+
+Jelani uses **Tor Browser** to prevent these companies from watching as he visits websites for international human rights protection and legal aid and writes blog posts about the resistance movement in his village.
+
+He also uses **OnionShare** and **SecureDrop** to securely send documents to journalists who are helping expose these human rights violations.
+
+All of this software uses Tor to help protect Jelani’s privacy.
+
+### Human rights activists like Jelani are fighting for justice in their communities, and Tor helps power their resistance.
+
+---
+
+# 4. TOR FOR ANTI-CENSORSHIP
+
+### Build bridges not walls
+
+Jean was traveling for the first time to a country far from his family.
+
+After arriving at a hotel, he opened his laptop.
+
+He was so exhausted that when the message "Connection has timed out" first appeared on his web browser, he thought it was due to his own error.
+
+But after trying again and again, he realized that his email provider, a news website, and many apps were unavailable.
+
+He had heard that this country censors the internet and wondered if that was happening.
+How could he contact his family from behind this impenetrable wall?
+After doing some web searches, he found a forum and read about VPNs, private services that allow you to connect to another uncensored network.
+
+Jean spent half an hour trying to figure out which cheap VPN was best.
+
+He chose one and for a moment it seemed to work, but after five minutes the connection went offline and the VPN would no longer connect.
+
+Jean kept reading to find other options and learned about Tor Browser and how it can circumvent censorship.
+
+He found an official website mirror to download the program.
+
+When he opened **Tor Browser**, he followed the prompts for censored users and connected to a bridge which allowed him to access the internet again.
+
+With Tor Browser, Jean can browse freely and privately and contact his family.
+
+### Censored users all over the world rely on Tor Browser for a free, stable, and uncensored way to access the internet.
+
+---
+
+# 5. Shared Sections
+
+## What is Tor?
+
+Tor is free software and an open network that helps protect you from tracking, surveillance, and censorship online.
+Tor is created for free by a 501(c)3 U.S.-based nonprofit called the Tor Project.
+
+The easiest way to use Tor is Tor Browser.
+When you use Tor Browser, no one can see what websites you visit or where in the world you’re coming from.
+
+Other applications, like SecureDrop and OnionShare, use Tor to protect their users against surveillance and censorship.
+
+
+## 6. How does Tor work?
+
+Amal wants to visit Bekele’s website privately, so she opens Tor Browser.
+
+Tor Browser selects a random circuit of three relays, which are computers all over the world configured to route traffic over the Tor network.
+
+Tor Browser then encrypts her website request three times and sends it to the first Tor relay in her circuit.
+
+The first relay removes the first encryption layer but doesn't learn that the destination is Bekele’s website.
+
+The first relay learns only the next location in the circuit, which is the second relay.
+
+The second relay removes another encryption layer and forwards the web page request to the third relay.
+
+The third relay removes the last encryption layer and forwards the web page request to its destination, Bekele’s website, but it doesn't know the request comes from Amal.
+
+Bekele doesn't know that the website request came from Amal unless she tells him so.
+
+## 7. Who uses Tor?
+
+People all over the world use Tor to protect their privacy and access the web freely.
+
+Tor helps protect journalists, human rights defenders, domestic violence victims, academic researchers, and anyone experiencing tracking, censorship, or surveillance.
+
+## 6. Why trust Tor?
+
+Tor is designed for privacy. We don’t know who our users are, and we don't keep logs of user activity.
+
+Tor relay operators cannot reveal the true identity of Tor users.
+
+Continual peer review of Tor's source code by academic and open source communities ensures that there are no backdoors in Tor, and our social contract promises that we will never backdoor Tor.
+
+## 7. Join the Tor community
+
+Tor is made possible by a diverse set of users, developers, relay operators, and advocates from around the world.
+
+We need your help to make Tor more usable and secure for people everywhere.
+
+You can volunteer with Tor by writing code, running a relay, creating documentation, offering user support, or telling people in your community about Tor.
+
+The Tor community is governed by a code of conduct, and we outline our set of promises to the community in our social contract.
+
+Learn more about Tor by visiting our website, our wiki, finding us on IRC, joining one of our mailing lists, or signing up for Tor News at newsletter.torproject.org.
+
+
+## 8. Download Tor
+
+Tor for Desktop
+torproject.org/download
+
+TOR ON MOBILE
+### Android
+Tor Browser for Android is available from GooglePlay.
+
+### iOS
+Onion Browser, developed by M. Tigas, is the only browser we recommend for iOS.
+
diff --git a/fr.po b/fr.po
new file mode 100644
index 000000000..030efa012
--- /dev/null
+++ b/fr.po
@@ -0,0 +1,162 @@
+# Documents de sensibilisation à Tor 2019-2020
+
+# 1. TOR POUR LE RESPECT DE LA VIE PRIVÉE
+
+### La vie privée est un droit de la personne
+
+Comme beaucoup d’entre nous, Aleisha passe la plupart de son temps en ligne, à communiquer avec des amis, à publier sur les médias sociaux et à parcourir le Web.
+
+Mais dernièrement, elle a remarqué que des publicités liées à ses recherches précédentes la suivent partout en ligne.
+
+Elle trouve cela si envahissant qu’elle fait des recherches sur les publicités en ligne et apprend que ce n’est pas seulement les annonceurs qui la suivent à la trace, mais aussi son FAI, les entreprises d’analyse, les plateformes de médias sociaux et d’autres.
+
+Aleisha décide qu’elle veut trouver et utiliser des logiciels qui ne recueillent pas ses données, ne la suivent pas à la trace et ne révèlent rien de confidentiel à son sujet à d’autres services.
+
+Elle suit dans un laboratoire numérique ouvert local une formation sur la protection de la vie privée et découvre le **navigateur Tor Browser**, le seul navigateur Web qui lui permet de naviguer de façon anonyme.
+
+---
+
+# 2. TOR POUR LES FÉMINISTES
+
+### L’avenir est cyberféministe
+
+Fernanda dirige un collectif de femmes axé sur les droits liés à la procréation au Brésil, où l’avortement est illégal.
+
+Fernanda et ses collègues ont créé un site Web qui offre des renseignements sur l’accès à l’avortement, la régulation des naissances et d’autres ressources pour les personnes à la recherche de renseignements sur la procréation.
+
+Si l’on pouvait remonter la trace de ce site Web jusqu’à elles, elles pourraient être arrêtées ou pire encore.
+
+Pour se protéger, Fernanda et ses collègues ont créé le site Web en utilisant les **services onion** de Tor. Non seulement les services onion empêchent qu’elles soient découvertes comme opératrices du serveur, mais ils aident également à protéger les visiteurs de leur site Web en exigeant qu’ils utilisent le navigateur Tor Browser.
+
+En fait, Fernanda utilise le **navigateur Tor Browser** pour toute sa navigation sur le Web, simplement par mesure de sécurité.
+
+Elle utilise également une application propulsée par Tor appelée **OnionShare** pour envoyer des fichiers à d’autres activistes en toute sécurité et en toute confidentialité.
+
+### Les défenseures des droits liés à la procréation, comme Fernanda, luttent pour les libertés fondamentales et Tor aide à propulser leur résistance.
+
+---
+
+# 3. TOR POUR LES DROITS DE LA PERSONNE
+
+### L’eau, c’est la vie
+
+Jelani vit dans un petit village traversé par une large rivière.
+
+Cette rivière fournit de l’eau à sa communauté depuis l’époque de ses ancêtres.
+
+Mais aujourd’hui, la rivière de Jelani est menacée par de puissantes multinationales qui forent des puits de pétrole dans la région.
+
+Les entreprises de sécurité privées, financées par ces entreprises, utilisent de puissants mécanismes pour surveiller les activités en ligne de Jelani et de ses voisins dans le village qui s’organisent pour protéger leur rivière sacrée.
+
+Jelani utilise le **navigateur Tor Browser** pour empêcher ces entreprises de le surveiller alors qu’il visite des sites Web sur la protection internationale des droits de la personne et sur l’aide juridique, et rédige des articles de blogue sur le mouvement de résistance dans son village.
+
+Il utilise également **OnionShare** et **SecureDrop** pour envoyer en toute sécurité des documents aux journalistes qui contribuent à exposer ces violations des droits de la personne.
+
+Tous ces logiciels utilisent Tor pour protéger la vie privée et les renseignements personnels de Jelani.
+
+### Des défenseurs des droits de la personne comme Jelani luttent pour la justice dans leurs communautés et Tor aide à propulser leur résistance.
+
+---
+
+# 4. TOR POUR L’ANTICENSURE
+
+### Bâtir des ponts plutôt que de dresser des murs
+
+Jean voyageait pour la première fois dans un pays loin de sa famille.
+
+Une fois arrivé à l’hôtel, il a ouvert son ordinateur portable.
+
+Il était tellement épuisé que lorsque le message « La connexion est expirée » est apparu pour la première fois sur son navigateur Web, il a pensé qu’il avait fait une erreur.
+
+Mais après avoir essayé encore et encore, il s’est rendu compte qu’il ne pouvait plus accéder à son fournisseur de services de courriel ni à un site Web de nouvelles ni à beaucoup d’applis.
+
+Il avait entendu dire que ce pays censure Internet et se demanda si c’était le cas.
+Comment pouvait-il contacter sa famille derrière ce mur impénétrable ?
+Après avoir fait quelques recherches sur le Web, il a trouvé un forum et a découvert les RPV, des services privés et confidentiels qui vous permettent de vous connecter à un autre réseau non censuré.
+
+Jean passa une demi-heure à essayer de déterminer quel RPV bon marché était le meilleur.
+
+Il en choisit un et pendant un moment il sembla fonctionner, mais après cinq minutes, la connexion tomba hors ligne et le RPV ne se connectait plus.
+
+Jean continua à lire pour trouver d’autres options et découvrit le navigateur Tor Browser et la façon dont il contourne la censure.
+
+Il trouva un miroir officiel du site Web pour télécharger le programme.
+
+Quand il ouvrit le **navigateur Tor Browser**, il suivit les indications pour les utilisateurs censurés et se connecta à un pont qui lui permit à nouveau d’accéder à Internet.
+
+Avec le navigateur Tor Browser, Jean peut naviguer librement, en toute confidentialité, et contacter sa famille.
+
+### Dans le monde entier, des utilisateurs censurés comptent sur le navigateur Tor Browser pour une façon gratuite, stable et non censurée d’accéder à Internet.
+
+---
+
+# 5. Sections partagées
+
+## Qu’est-ce que Tor ?
+
+Tor est un logiciel gratuit et un réseau ouvert qui aident à vous protéger contre le suivi à trace, la surveillance et la censure en ligne.
+Tor est créé gratuitement par un organisme à but non lucratif 501(c)3 situé aux États-Unis appelée Le Projet Tor.
+
+La façon la plus simple d’utiliser Tor est avec le navigateur Tor Browser.
+Quand vous utilisez le navigateur Tor Browser, personne ne peut savoir quels sites Web vous visitez ni d’où, dans le monde, vous venez.
+
+D’autres applications telles que SecureDrop et OnionShare utilisent Tor pour protéger leurs utilisateurs contre la surveillance et la censure.
+
+
+## 6. Comment Tor fonctionne-t-il ?
+
+Amal veut visiter le site Web de Bekele en toute confidentialité, alors elle ouvre le navigateur Tor Browser.
+
+Le navigateur Tor Browser sélectionne un circuit aléatoire de trois relais, qui sont des ordinateurs partout dans le monde configurés pour acheminer le trafic sur le réseau Tor.
+
+Le navigateur Tor Browser chiffre alors la requête de son site Web trois fois et l’envoie au premier relais Tor dans son circuit.
+
+Le premier relais supprime la première couche de chiffrement, mais n’apprend pas que la destination est le site Web de Bekele.
+
+Le premier relais n’apprend que le prochain emplacement du circuit, qui est le deuxième relais.
+
+Le deuxième relais supprime une autre couche de chiffrement et achemine la requête de page Web au troisième relais.
+
+Le troisième relais supprime la dernière couche de chiffrement et achemine la demande de page Web à sa destination, le site Web de Bekele, mais il ne sait pas que la demande provient d’Amal.
+
+Bekele ne sait pas que la requête de site Web provenait d’Amal, sauf si elle le lui dit.
+
+## 7. Qui utilise Tor ?
+
+Dans le monde entier, des personnes utilisent Tor pour protéger leur vie privée et leurs renseignements personnels, mais aussi accéder librement au Web.
+
+Tor aide à protéger les journalistes, les défenseurs des droits de la personne, les victimes de violence familiale, les chercheurs universitaires et toute personne confrontée au pistage, à la censure ou à la surveillance.
+
+## 6. Pourquoi faire confiance à Tor ?
+
+Tor est conçu pour la confidentialité. Nous ne savons pas qui nos utilisateurs sont ni ne gardons de journaux de l’activité des utilisateurs.
+
+Les opérateurs de relais Tor ne peuvent pas divulguer la véritable identité des utilisateurs de Tor.
+
+L’examen collégial continu du code source de Tor par les communautés universitaires et par celles des logiciels à code source ouvert garantit qu’il n’y a pas de portes dérobées dans Tor. De plus, notre contrat social implique que nous n’introduiront jamais de portes dérobées dans Tor.
+
+## 7. Se joindre à la communauté de Tor
+
+Tor est rendu possible grâce à un ensemble varié d’utilisateurs, de développeurs, d’opérateurs de relais et de défenseurs du droit à la vie privée partout dans le monde.
+
+Nous avons besoin de votre aide pour rendre Tor plus facile à utiliser et plus sûr, pour tous, partout.
+
+Vous pouvez faire du bénévolat auprès de Tor en écrivant du code, en exploitant un relais, en rédigeant de la documentation, en offrant de l’assistance aux utilisateurs ou encore en parlant de Tor aux gens de votre communauté.
+
+La communauté de Tor est régie par un code de conduite et nous énonçons l’ensemble de nos promesses à la communauté dans notre contrat social.
+
+Apprenez-en davantage au sujet de Tor en visitant notre site Web, notre wiki, en nous trouvant sur IRC, en vous joignant à l’une de nos listes de diffusion, ou encore en vous inscrivant aux nouvelles de Tor sur newsletter.torproject.org.
+
+
+## 8. Télécharger Tor
+
+Tor pour ordinateur
+torproject.org/download
+
+TOR SUR APPAREIL MOBILE
+### Android
+Le navigateur Tor Browser pour Android est proposée sur Google Play.
+
+### iOS
+Le Navigateur Onion, développé par M. Tigas, est le seul navigateur que nous recommandons pour iOS.
+
diff --git a/fy.po b/fy.po
new file mode 100644
index 000000000..b0d86b14f
--- /dev/null
+++ b/fy.po
@@ -0,0 +1,162 @@
+# Tor Outreach Material 2019-2020
+
+# 1. TOR FOR PRIVACY
+
+### Privacy is a human right
+
+Like many of us, Aleisha spends most of her time online--connecting with friends, posting on social media, and browsing the web.
+
+But lately, she's noticed that advertisements related to her previous searches are following her around online.
+
+This feels so invasive that she does some research on online ads and learns that it's not just advertisers tracking her but also her ISP, analytics companies, social media platforms, and more.
+
+Aleisha decides she wants to find and use software that doesn't collect her data, doesn't track her, and doesn't tell other services anything private about her.
+
+She goes to a privacy training at a local hackerspace and learns about **Tor Browser**, the only web browser that allows her to browse anonymously.
+
+---
+
+# 2.TOR FOR FEMINISTS
+
+### The future is cyberfeminist
+
+Fernanda runs a women's collective focused on reproductive rights in Brazil, where abortion is illegal.
+
+Fernanda and her colleagues built a website with information about abortion access, birth control, and other resources for people seeking reproductive information.
+
+If this website was linked back to them, they could be arrested--or worse.
+
+To protect themselves, Fernanda and her colleagues created the website using Tor **onion services**. Onion services not only protect them from being discovered as the operators of the server but also help protect visitors to their website by requiring they use Tor Browser.
+
+In fact, Fernanda uses **Tor Browser** for all of her web browsing just to be on the safe side.
+
+She also uses a Tor-powered app called **OnionShare** to send files to other activists securely and privately.
+
+### Reproductive rights activists like Fernanda are fighting for fundamental freedoms, and Tor helps power their resistance.
+
+---
+
+# 3. TOR FOR HUMAN RIGHTS
+
+### Water is life
+
+Jelani lives in a small village which a wide river runs through.
+
+This river has provided water to his community since the days of his ancestors.
+
+But today, Jelani’s river is threatened by powerful multinational companies drilling for oil in the region.
+
+Private security firms, paid for by these companies, use powerful surveillance mechanisms to monitor the online activities of Jelani and his neighbors in the village who are organizing to protect their sacred river.
+
+Jelani uses **Tor Browser** to prevent these companies from watching as he visits websites for international human rights protection and legal aid and writes blog posts about the resistance movement in his village.
+
+He also uses **OnionShare** and **SecureDrop** to securely send documents to journalists who are helping expose these human rights violations.
+
+All of this software uses Tor to help protect Jelani’s privacy.
+
+### Human rights activists like Jelani are fighting for justice in their communities, and Tor helps power their resistance.
+
+---
+
+# 4. TOR FOR ANTI-CENSORSHIP
+
+### Build bridges not walls
+
+Jean was traveling for the first time to a country far from his family.
+
+After arriving at a hotel, he opened his laptop.
+
+He was so exhausted that when the message "Connection has timed out" first appeared on his web browser, he thought it was due to his own error.
+
+But after trying again and again, he realized that his email provider, a news website, and many apps were unavailable.
+
+He had heard that this country censors the internet and wondered if that was happening.
+How could he contact his family from behind this impenetrable wall?
+After doing some web searches, he found a forum and read about VPNs, private services that allow you to connect to another uncensored network.
+
+Jean spent half an hour trying to figure out which cheap VPN was best.
+
+He chose one and for a moment it seemed to work, but after five minutes the connection went offline and the VPN would no longer connect.
+
+Jean kept reading to find other options and learned about Tor Browser and how it can circumvent censorship.
+
+He found an official website mirror to download the program.
+
+When he opened **Tor Browser**, he followed the prompts for censored users and connected to a bridge which allowed him to access the internet again.
+
+With Tor Browser, Jean can browse freely and privately and contact his family.
+
+### Censored users all over the world rely on Tor Browser for a free, stable, and uncensored way to access the internet.
+
+---
+
+# 5. Shared Sections
+
+## Wat is Tor?
+
+Tor is free software and an open network that helps protect you from tracking, surveillance, and censorship online.
+Tor is created for free by a 501(c)3 U.S.-based nonprofit called the Tor Project.
+
+The easiest way to use Tor is Tor Browser.
+When you use Tor Browser, no one can see what websites you visit or where in the world you’re coming from.
+
+Other applications, like SecureDrop and OnionShare, use Tor to protect their users against surveillance and censorship.
+
+
+## 6. How does Tor work?
+
+Amal wants to visit Bekele’s website privately, so she opens Tor Browser.
+
+Tor Browser selects a random circuit of three relays, which are computers all over the world configured to route traffic over the Tor network.
+
+Tor Browser then encrypts her website request three times and sends it to the first Tor relay in her circuit.
+
+The first relay removes the first encryption layer but doesn't learn that the destination is Bekele’s website.
+
+The first relay learns only the next location in the circuit, which is the second relay.
+
+The second relay removes another encryption layer and forwards the web page request to the third relay.
+
+The third relay removes the last encryption layer and forwards the web page request to its destination, Bekele’s website, but it doesn't know the request comes from Amal.
+
+Bekele doesn't know that the website request came from Amal unless she tells him so.
+
+## 7. Who uses Tor?
+
+People all over the world use Tor to protect their privacy and access the web freely.
+
+Tor helps protect journalists, human rights defenders, domestic violence victims, academic researchers, and anyone experiencing tracking, censorship, or surveillance.
+
+## 6. Why trust Tor?
+
+Tor is designed for privacy. We don’t know who our users are, and we don't keep logs of user activity.
+
+Tor relay operators cannot reveal the true identity of Tor users.
+
+Continual peer review of Tor's source code by academic and open source communities ensures that there are no backdoors in Tor, and our social contract promises that we will never backdoor Tor.
+
+## 7. Join the Tor community
+
+Tor is made possible by a diverse set of users, developers, relay operators, and advocates from around the world.
+
+We need your help to make Tor more usable and secure for people everywhere.
+
+You can volunteer with Tor by writing code, running a relay, creating documentation, offering user support, or telling people in your community about Tor.
+
+The Tor community is governed by a code of conduct, and we outline our set of promises to the community in our social contract.
+
+Learn more about Tor by visiting our website, our wiki, finding us on IRC, joining one of our mailing lists, or signing up for Tor News at newsletter.torproject.org.
+
+
+## 8. Download Tor
+
+Tor for Desktop
+torproject.org/download
+
+TOR ON MOBILE
+### Android
+Tor Browser for Android is available from GooglePlay.
+
+### iOS
+Onion Browser, developed by M. Tigas, is the only browser we recommend for iOS.
+
diff --git a/ga.po b/ga.po
new file mode 100644
index 000000000..6c8fce0dc
--- /dev/null
+++ b/ga.po
@@ -0,0 +1,162 @@
+# Tor Outreach Material 2019-2020
+
+# 1. TOR FOR PRIVACY
+
+### Privacy is a human right
+
+Like many of us, Aleisha spends most of her time online--connecting with friends, posting on social media, and browsing the web.
+
+But lately, she's noticed that advertisements related to her previous searches are following her around online.
+
+This feels so invasive that she does some research on online ads and learns that it's not just advertisers tracking her but also her ISP, analytics companies, social media platforms, and more.
+
+Aleisha decides she wants to find and use software that doesn't collect her data, doesn't track her, and doesn't tell other services anything private about her.
+
+She goes to a privacy training at a local hackerspace and learns about **Tor Browser**, the only web browser that allows her to browse anonymously.
+
+---
+
+# 2.TOR FOR FEMINISTS
+
+### The future is cyberfeminist
+
+Fernanda runs a women's collective focused on reproductive rights in Brazil, where abortion is illegal.
+
+Fernanda and her colleagues built a website with information about abortion access, birth control, and other resources for people seeking reproductive information.
+
+If this website was linked back to them, they could be arrested--or worse.
+
+To protect themselves, Fernanda and her colleagues created the website using Tor **onion services**. Onion services not only protect them from being discovered as the operators of the server but also help protect visitors to their website by requiring they use Tor Browser.
+
+In fact, Fernanda uses **Tor Browser** for all of her web browsing just to be on the safe side.
+
+She also uses a Tor-powered app called **OnionShare** to send files to other activists securely and privately.
+
+### Reproductive rights activists like Fernanda are fighting for fundamental freedoms, and Tor helps power their resistance.
+
+---
+
+# 3. TOR FOR HUMAN RIGHTS
+
+### Water is life
+
+Jelani lives in a small village which a wide river runs through.
+
+This river has provided water to his community since the days of his ancestors.
+
+But today, Jelani’s river is threatened by powerful multinational companies drilling for oil in the region.
+
+Private security firms, paid for by these companies, use powerful surveillance mechanisms to monitor the online activities of Jelani and his neighbors in the village who are organizing to protect their sacred river.
+
+Jelani uses **Tor Browser** to prevent these companies from watching as he visits websites for international human rights protection and legal aid and writes blog posts about the resistance movement in his village.
+
+He also uses **OnionShare** and **SecureDrop** to securely send documents to journalists who are helping expose these human rights violations.
+
+All of this software uses Tor to help protect Jelani’s privacy.
+
+### Human rights activists like Jelani are fighting for justice in their communities, and Tor helps power their resistance.
+
+---
+
+# 4. TOR FOR ANTI-CENSORSHIP
+
+### Build bridges not walls
+
+Jean was traveling for the first time to a country far from his family.
+
+After arriving at a hotel, he opened his laptop.
+
+He was so exhausted that when the message "Connection has timed out" first appeared on his web browser, he thought it was due to his own error.
+
+But after trying again and again, he realized that his email provider, a news website, and many apps were unavailable.
+
+He had heard that this country censors the internet and wondered if that was happening.
+How could he contact his family from behind this impenetrable wall?
+After doing some web searches, he found a forum and read about VPNs, private services that allow you to connect to another uncensored network.
+
+Jean spent half an hour trying to figure out which cheap VPN was best.
+
+He chose one and for a moment it seemed to work, but after five minutes the connection went offline and the VPN would no longer connect.
+
+Jean kept reading to find other options and learned about Tor Browser and how it can circumvent censorship.
+
+He found an official website mirror to download the program.
+
+When he opened **Tor Browser**, he followed the prompts for censored users and connected to a bridge which allowed him to access the internet again.
+
+With Tor Browser, Jean can browse freely and privately and contact his family.
+
+### Censored users all over the world rely on Tor Browser for a free, stable, and uncensored way to access the internet.
+
+---
+
+# 5. Shared Sections
+
+## What is Tor?
+
+Tor is free software and an open network that helps protect you from tracking, surveillance, and censorship online.
+Tor is created for free by a 501(c)3 U.S.-based nonprofit called the Tor Project.
+
+The easiest way to use Tor is Tor Browser.
+When you use Tor Browser, no one can see what websites you visit or where in the world you’re coming from.
+
+Other applications, like SecureDrop and OnionShare, use Tor to protect their users against surveillance and censorship.
+
+
+## 6. How does Tor work?
+
+Amal wants to visit Bekele’s website privately, so she opens Tor Browser.
+
+Tor Browser selects a random circuit of three relays, which are computers all over the world configured to route traffic over the Tor network.
+
+Tor Browser then encrypts her website request three times and sends it to the first Tor relay in her circuit.
+
+The first relay removes the first encryption layer but doesn't learn that the destination is Bekele’s website.
+
+The first relay learns only the next location in the circuit, which is the second relay.
+
+The second relay removes another encryption layer and forwards the web page request to the third relay.
+
+The third relay removes the last encryption layer and forwards the web page request to its destination, Bekele’s website, but it doesn't know the request comes from Amal.
+
+Bekele doesn't know that the website request came from Amal unless she tells him so.
+
+## 7. Who uses Tor?
+
+People all over the world use Tor to protect their privacy and access the web freely.
+
+Tor helps protect journalists, human rights defenders, domestic violence victims, academic researchers, and anyone experiencing tracking, censorship, or surveillance.
+
+## 6. Why trust Tor?
+
+Tor is designed for privacy. We don’t know who our users are, and we don't keep logs of user activity.
+
+Tor relay operators cannot reveal the true identity of Tor users.
+
+Continual peer review of Tor's source code by academic and open source communities ensures that there are no backdoors in Tor, and our social contract promises that we will never backdoor Tor.
+
+## 7. Join the Tor community
+
+Tor is made possible by a diverse set of users, developers, relay operators, and advocates from around the world.
+
+We need your help to make Tor more usable and secure for people everywhere.
+
+You can volunteer with Tor by writing code, running a relay, creating documentation, offering user support, or telling people in your community about Tor.
+
+The Tor community is governed by a code of conduct, and we outline our set of promises to the community in our social contract.
+
+Learn more about Tor by visiting our website, our wiki, finding us on IRC, joining one of our mailing lists, or signing up for Tor News at newsletter.torproject.org.
+
+
+## 8. Download Tor
+
+Tor for Desktop
+torproject.org/download
+
+TOR ON MOBILE
+### Android
+Tor Browser for Android is available from GooglePlay.
+
+### iOS
+Onion Browser, developed by M. Tigas, is the only browser we recommend for iOS.
+
diff --git a/gd.po b/gd.po
new file mode 100644
index 000000000..6c8fce0dc
--- /dev/null
+++ b/gd.po
@@ -0,0 +1,162 @@
+# Tor Outreach Material 2019-2020
+
+# 1. TOR FOR PRIVACY
+
+### Privacy is a human right
+
+Like many of us, Aleisha spends most of her time online--connecting with friends, posting on social media, and browsing the web.
+
+But lately, she's noticed that advertisements related to her previous searches are following her around online.
+
+This feels so invasive that she does some research on online ads and learns that it's not just advertisers tracking her but also her ISP, analytics companies, social media platforms, and more.
+
+Aleisha decides she wants to find and use software that doesn't collect her data, doesn't track her, and doesn't tell other services anything private about her.
+
+She goes to a privacy training at a local hackerspace and learns about **Tor Browser**, the only web browser that allows her to browse anonymously.
+
+---
+
+# 2.TOR FOR FEMINISTS
+
+### The future is cyberfeminist
+
+Fernanda runs a women's collective focused on reproductive rights in Brazil, where abortion is illegal.
+
+Fernanda and her colleagues built a website with information about abortion access, birth control, and other resources for people seeking reproductive information.
+
+If this website was linked back to them, they could be arrested--or worse.
+
+To protect themselves, Fernanda and her colleagues created the website using Tor **onion services**. Onion services not only protect them from being discovered as the operators of the server but also help protect visitors to their website by requiring they use Tor Browser.
+
+In fact, Fernanda uses **Tor Browser** for all of her web browsing just to be on the safe side.
+
+She also uses a Tor-powered app called **OnionShare** to send files to other activists securely and privately.
+
+### Reproductive rights activists like Fernanda are fighting for fundamental freedoms, and Tor helps power their resistance.
+
+---
+
+# 3. TOR FOR HUMAN RIGHTS
+
+### Water is life
+
+Jelani lives in a small village which a wide river runs through.
+
+This river has provided water to his community since the days of his ancestors.
+
+But today, Jelani’s river is threatened by powerful multinational companies drilling for oil in the region.
+
+Private security firms, paid for by these companies, use powerful surveillance mechanisms to monitor the online activities of Jelani and his neighbors in the village who are organizing to protect their sacred river.
+
+Jelani uses **Tor Browser** to prevent these companies from watching as he visits websites for international human rights protection and legal aid and writes blog posts about the resistance movement in his village.
+
+He also uses **OnionShare** and **SecureDrop** to securely send documents to journalists who are helping expose these human rights violations.
+
+All of this software uses Tor to help protect Jelani’s privacy.
+
+### Human rights activists like Jelani are fighting for justice in their communities, and Tor helps power their resistance.
+
+---
+
+# 4. TOR FOR ANTI-CENSORSHIP
+
+### Build bridges not walls
+
+Jean was traveling for the first time to a country far from his family.
+
+After arriving at a hotel, he opened his laptop.
+
+He was so exhausted that when the message "Connection has timed out" first appeared on his web browser, he thought it was due to his own error.
+
+But after trying again and again, he realized that his email provider, a news website, and many apps were unavailable.
+
+He had heard that this country censors the internet and wondered if that was happening.
+How could he contact his family from behind this impenetrable wall?
+After doing some web searches, he found a forum and read about VPNs, private services that allow you to connect to another uncensored network.
+
+Jean spent half an hour trying to figure out which cheap VPN was best.
+
+He chose one and for a moment it seemed to work, but after five minutes the connection went offline and the VPN would no longer connect.
+
+Jean kept reading to find other options and learned about Tor Browser and how it can circumvent censorship.
+
+He found an official website mirror to download the program.
+
+When he opened **Tor Browser**, he followed the prompts for censored users and connected to a bridge which allowed him to access the internet again.
+
+With Tor Browser, Jean can browse freely and privately and contact his family.
+
+### Censored users all over the world rely on Tor Browser for a free, stable, and uncensored way to access the internet.
+
+---
+
+# 5. Shared Sections
+
+## What is Tor?
+
+Tor is free software and an open network that helps protect you from tracking, surveillance, and censorship online.
+Tor is created for free by a 501(c)3 U.S.-based nonprofit called the Tor Project.
+
+The easiest way to use Tor is Tor Browser.
+When you use Tor Browser, no one can see what websites you visit or where in the world you’re coming from.
+
+Other applications, like SecureDrop and OnionShare, use Tor to protect their users against surveillance and censorship.
+
+
+## 6. How does Tor work?
+
+Amal wants to visit Bekele’s website privately, so she opens Tor Browser.
+
+Tor Browser selects a random circuit of three relays, which are computers all over the world configured to route traffic over the Tor network.
+
+Tor Browser then encrypts her website request three times and sends it to the first Tor relay in her circuit.
+
+The first relay removes the first encryption layer but doesn't learn that the destination is Bekele’s website.
+
+The first relay learns only the next location in the circuit, which is the second relay.
+
+The second relay removes another encryption layer and forwards the web page request to the third relay.
+
+The third relay removes the last encryption layer and forwards the web page request to its destination, Bekele’s website, but it doesn't know the request comes from Amal.
+
+Bekele doesn't know that the website request came from Amal unless she tells him so.
+
+## 7. Who uses Tor?
+
+People all over the world use Tor to protect their privacy and access the web freely.
+
+Tor helps protect journalists, human rights defenders, domestic violence victims, academic researchers, and anyone experiencing tracking, censorship, or surveillance.
+
+## 6. Why trust Tor?
+
+Tor is designed for privacy. We don’t know who our users are, and we don't keep logs of user activity.
+
+Tor relay operators cannot reveal the true identity of Tor users.
+
+Continual peer review of Tor's source code by academic and open source communities ensures that there are no backdoors in Tor, and our social contract promises that we will never backdoor Tor.
+
+## 7. Join the Tor community
+
+Tor is made possible by a diverse set of users, developers, relay operators, and advocates from around the world.
+
+We need your help to make Tor more usable and secure for people everywhere.
+
+You can volunteer with Tor by writing code, running a relay, creating documentation, offering user support, or telling people in your community about Tor.
+
+The Tor community is governed by a code of conduct, and we outline our set of promises to the community in our social contract.
+
+Learn more about Tor by visiting our website, our wiki, finding us on IRC, joining one of our mailing lists, or signing up for Tor News at newsletter.torproject.org.
+
+
+## 8. Download Tor
+
+Tor for Desktop
+torproject.org/download
+
+TOR ON MOBILE
+### Android
+Tor Browser for Android is available from GooglePlay.
+
+### iOS
+Onion Browser, developed by M. Tigas, is the only browser we recommend for iOS.
+
diff --git a/gl.po b/gl.po
new file mode 100644
index 000000000..acd850a8c
--- /dev/null
+++ b/gl.po
@@ -0,0 +1,162 @@
+# Tor Outreach Material 2019-2020
+
+# 1. TOR FOR PRIVACY
+
+### Privacy is a human right
+
+Like many of us, Aleisha spends most of her time online--connecting with friends, posting on social media, and browsing the web.
+
+But lately, she's noticed that advertisements related to her previous searches are following her around online.
+
+This feels so invasive that she does some research on online ads and learns that it's not just advertisers tracking her but also her ISP, analytics companies, social media platforms, and more.
+
+Aleisha decides she wants to find and use software that doesn't collect her data, doesn't track her, and doesn't tell other services anything private about her.
+
+She goes to a privacy training at a local hackerspace and learns about **Tor Browser**, the only web browser that allows her to browse anonymously.
+
+---
+
+# 2.TOR FOR FEMINISTS
+
+### The future is cyberfeminist
+
+Fernanda runs a women's collective focused on reproductive rights in Brazil, where abortion is illegal.
+
+Fernanda and her colleagues built a website with information about abortion access, birth control, and other resources for people seeking reproductive information.
+
+If this website was linked back to them, they could be arrested--or worse.
+
+To protect themselves, Fernanda and her colleagues created the website using Tor **onion services**. Onion services not only protect them from being discovered as the operators of the server but also help protect visitors to their website by requiring they use Tor Browser.
+
+In fact, Fernanda uses **Tor Browser** for all of her web browsing just to be on the safe side.
+
+She also uses a Tor-powered app called **OnionShare** to send files to other activists securely and privately.
+
+### Reproductive rights activists like Fernanda are fighting for fundamental freedoms, and Tor helps power their resistance.
+
+---
+
+# 3. TOR FOR HUMAN RIGHTS
+
+### Water is life
+
+Jelani lives in a small village which a wide river runs through.
+
+This river has provided water to his community since the days of his ancestors.
+
+But today, Jelani’s river is threatened by powerful multinational companies drilling for oil in the region.
+
+Private security firms, paid for by these companies, use powerful surveillance mechanisms to monitor the online activities of Jelani and his neighbors in the village who are organizing to protect their sacred river.
+
+Jelani uses **Tor Browser** to prevent these companies from watching as he visits websites for international human rights protection and legal aid and writes blog posts about the resistance movement in his village.
+
+He also uses **OnionShare** and **SecureDrop** to securely send documents to journalists who are helping expose these human rights violations.
+
+All of this software uses Tor to help protect Jelani’s privacy.
+
+### Human rights activists like Jelani are fighting for justice in their communities, and Tor helps power their resistance.
+
+---
+
+# 4. TOR FOR ANTI-CENSORSHIP
+
+### Build bridges not walls
+
+Jean was traveling for the first time to a country far from his family.
+
+After arriving at a hotel, he opened his laptop.
+
+He was so exhausted that when the message "Connection has timed out" first appeared on his web browser, he thought it was due to his own error.
+
+But after trying again and again, he realized that his email provider, a news website, and many apps were unavailable.
+
+He had heard that this country censors the internet and wondered if that was happening.
+How could he contact his family from behind this impenetrable wall?
+After doing some web searches, he found a forum and read about VPNs, private services that allow you to connect to another uncensored network.
+
+Jean spent half an hour trying to figure out which cheap VPN was best.
+
+He chose one and for a moment it seemed to work, but after five minutes the connection went offline and the VPN would no longer connect.
+
+Jean kept reading to find other options and learned about Tor Browser and how it can circumvent censorship.
+
+He found an official website mirror to download the program.
+
+When he opened **Tor Browser**, he followed the prompts for censored users and connected to a bridge which allowed him to access the internet again.
+
+With Tor Browser, Jean can browse freely and privately and contact his family.
+
+### Censored users all over the world rely on Tor Browser for a free, stable, and uncensored way to access the internet.
+
+---
+
+# 5. Shared Sections
+
+## Que é Tor?
+
+Tor is free software and an open network that helps protect you from tracking, surveillance, and censorship online.
+Tor is created for free by a 501(c)3 U.S.-based nonprofit called the Tor Project.
+
+The easiest way to use Tor is Tor Browser.
+When you use Tor Browser, no one can see what websites you visit or where in the world you’re coming from.
+
+Other applications, like SecureDrop and OnionShare, use Tor to protect their users against surveillance and censorship.
+
+
+## 6. How does Tor work?
+
+Amal wants to visit Bekele’s website privately, so she opens Tor Browser.
+
+Tor Browser selects a random circuit of three relays, which are computers all over the world configured to route traffic over the Tor network.
+
+Tor Browser then encrypts her website request three times and sends it to the first Tor relay in her circuit.
+
+The first relay removes the first encryption layer but doesn't learn that the destination is Bekele’s website.
+
+The first relay learns only the next location in the circuit, which is the second relay.
+
+The second relay removes another encryption layer and forwards the web page request to the third relay.
+
+The third relay removes the last encryption layer and forwards the web page request to its destination, Bekele’s website, but it doesn't know the request comes from Amal.
+
+Bekele doesn't know that the website request came from Amal unless she tells him so.
+
+## 7. Who uses Tor?
+
+People all over the world use Tor to protect their privacy and access the web freely.
+
+Tor helps protect journalists, human rights defenders, domestic violence victims, academic researchers, and anyone experiencing tracking, censorship, or surveillance.
+
+## 6. Why trust Tor?
+
+Tor is designed for privacy. We don’t know who our users are, and we don't keep logs of user activity.
+
+Tor relay operators cannot reveal the true identity of Tor users.
+
+Continual peer review of Tor's source code by academic and open source communities ensures that there are no backdoors in Tor, and our social contract promises that we will never backdoor Tor.
+
+## 7. Join the Tor community
+
+Tor is made possible by a diverse set of users, developers, relay operators, and advocates from around the world.
+
+We need your help to make Tor more usable and secure for people everywhere.
+
+You can volunteer with Tor by writing code, running a relay, creating documentation, offering user support, or telling people in your community about Tor.
+
+The Tor community is governed by a code of conduct, and we outline our set of promises to the community in our social contract.
+
+Learn more about Tor by visiting our website, our wiki, finding us on IRC, joining one of our mailing lists, or signing up for Tor News at newsletter.torproject.org.
+
+
+## 8. Download Tor
+
+Tor for Desktop
+torproject.org/download
+
+TOR ON MOBILE
+### Android
+Tor Browser for Android is available from GooglePlay.
+
+### iOS
+Onion Browser, developed by M. Tigas, is the only browser we recommend for iOS.
+
diff --git a/gu.po b/gu.po
new file mode 100644
index 000000000..6c8fce0dc
--- /dev/null
+++ b/gu.po
@@ -0,0 +1,162 @@
+# Tor Outreach Material 2019-2020
+
+# 1. TOR FOR PRIVACY
+
+### Privacy is a human right
+
+Like many of us, Aleisha spends most of her time online--connecting with friends, posting on social media, and browsing the web.
+
+But lately, she's noticed that advertisements related to her previous searches are following her around online.
+
+This feels so invasive that she does some research on online ads and learns that it's not just advertisers tracking her but also her ISP, analytics companies, social media platforms, and more.
+
+Aleisha decides she wants to find and use software that doesn't collect her data, doesn't track her, and doesn't tell other services anything private about her.
+
+She goes to a privacy training at a local hackerspace and learns about **Tor Browser**, the only web browser that allows her to browse anonymously.
+
+---
+
+# 2.TOR FOR FEMINISTS
+
+### The future is cyberfeminist
+
+Fernanda runs a women's collective focused on reproductive rights in Brazil, where abortion is illegal.
+
+Fernanda and her colleagues built a website with information about abortion access, birth control, and other resources for people seeking reproductive information.
+
+If this website was linked back to them, they could be arrested--or worse.
+
+To protect themselves, Fernanda and her colleagues created the website using Tor **onion services**. Onion services not only protect them from being discovered as the operators of the server but also help protect visitors to their website by requiring they use Tor Browser.
+
+In fact, Fernanda uses **Tor Browser** for all of her web browsing just to be on the safe side.
+
+She also uses a Tor-powered app called **OnionShare** to send files to other activists securely and privately.
+
+### Reproductive rights activists like Fernanda are fighting for fundamental freedoms, and Tor helps power their resistance.
+
+---
+
+# 3. TOR FOR HUMAN RIGHTS
+
+### Water is life
+
+Jelani lives in a small village which a wide river runs through.
+
+This river has provided water to his community since the days of his ancestors.
+
+But today, Jelani’s river is threatened by powerful multinational companies drilling for oil in the region.
+
+Private security firms, paid for by these companies, use powerful surveillance mechanisms to monitor the online activities of Jelani and his neighbors in the village who are organizing to protect their sacred river.
+
+Jelani uses **Tor Browser** to prevent these companies from watching as he visits websites for international human rights protection and legal aid and writes blog posts about the resistance movement in his village.
+
+He also uses **OnionShare** and **SecureDrop** to securely send documents to journalists who are helping expose these human rights violations.
+
+All of this software uses Tor to help protect Jelani’s privacy.
+
+### Human rights activists like Jelani are fighting for justice in their communities, and Tor helps power their resistance.
+
+---
+
+# 4. TOR FOR ANTI-CENSORSHIP
+
+### Build bridges not walls
+
+Jean was traveling for the first time to a country far from his family.
+
+After arriving at a hotel, he opened his laptop.
+
+He was so exhausted that when the message "Connection has timed out" first appeared on his web browser, he thought it was due to his own error.
+
+But after trying again and again, he realized that his email provider, a news website, and many apps were unavailable.
+
+He had heard that this country censors the internet and wondered if that was happening.
+How could he contact his family from behind this impenetrable wall?
+After doing some web searches, he found a forum and read about VPNs, private services that allow you to connect to another uncensored network.
+
+Jean spent half an hour trying to figure out which cheap VPN was best.
+
+He chose one and for a moment it seemed to work, but after five minutes the connection went offline and the VPN would no longer connect.
+
+Jean kept reading to find other options and learned about Tor Browser and how it can circumvent censorship.
+
+He found an official website mirror to download the program.
+
+When he opened **Tor Browser**, he followed the prompts for censored users and connected to a bridge which allowed him to access the internet again.
+
+With Tor Browser, Jean can browse freely and privately and contact his family.
+
+### Censored users all over the world rely on Tor Browser for a free, stable, and uncensored way to access the internet.
+
+---
+
+# 5. Shared Sections
+
+## What is Tor?
+
+Tor is free software and an open network that helps protect you from tracking, surveillance, and censorship online.
+Tor is created for free by a 501(c)3 U.S.-based nonprofit called the Tor Project.
+
+The easiest way to use Tor is Tor Browser.
+When you use Tor Browser, no one can see what websites you visit or where in the world you’re coming from.
+
+Other applications, like SecureDrop and OnionShare, use Tor to protect their users against surveillance and censorship.
+
+
+## 6. How does Tor work?
+
+Amal wants to visit Bekele’s website privately, so she opens Tor Browser.
+
+Tor Browser selects a random circuit of three relays, which are computers all over the world configured to route traffic over the Tor network.
+
+Tor Browser then encrypts her website request three times and sends it to the first Tor relay in her circuit.
+
+The first relay removes the first encryption layer but doesn't learn that the destination is Bekele’s website.
+
+The first relay learns only the next location in the circuit, which is the second relay.
+
+The second relay removes another encryption layer and forwards the web page request to the third relay.
+
+The third relay removes the last encryption layer and forwards the web page request to its destination, Bekele’s website, but it doesn't know the request comes from Amal.
+
+Bekele doesn't know that the website request came from Amal unless she tells him so.
+
+## 7. Who uses Tor?
+
+People all over the world use Tor to protect their privacy and access the web freely.
+
+Tor helps protect journalists, human rights defenders, domestic violence victims, academic researchers, and anyone experiencing tracking, censorship, or surveillance.
+
+## 6. Why trust Tor?
+
+Tor is designed for privacy. We don’t know who our users are, and we don't keep logs of user activity.
+
+Tor relay operators cannot reveal the true identity of Tor users.
+
+Continual peer review of Tor's source code by academic and open source communities ensures that there are no backdoors in Tor, and our social contract promises that we will never backdoor Tor.
+
+## 7. Join the Tor community
+
+Tor is made possible by a diverse set of users, developers, relay operators, and advocates from around the world.
+
+We need your help to make Tor more usable and secure for people everywhere.
+
+You can volunteer with Tor by writing code, running a relay, creating documentation, offering user support, or telling people in your community about Tor.
+
+The Tor community is governed by a code of conduct, and we outline our set of promises to the community in our social contract.
+
+Learn more about Tor by visiting our website, our wiki, finding us on IRC, joining one of our mailing lists, or signing up for Tor News at newsletter.torproject.org.
+
+
+## 8. Download Tor
+
+Tor for Desktop
+torproject.org/download
+
+TOR ON MOBILE
+### Android
+Tor Browser for Android is available from GooglePlay.
+
+### iOS
+Onion Browser, developed by M. Tigas, is the only browser we recommend for iOS.
+
diff --git a/he.po b/he.po
new file mode 100644
index 000000000..82c41b344
--- /dev/null
+++ b/he.po
@@ -0,0 +1,162 @@
+# Tor Outreach Material 2019-2020
+
+# 1. TOR למען פרטיות
+
+### פרטיות היא זכות אדם
+
+כמו רבים מאיתנו, אלישיה מבלה את מרבית זמנה ברשת--מתחברת עם חברים, יוצרת רשומות במדיה חברתית וגולשת ברשת.
+
+אבל לאחרונה היא שמה לב שפרסומות הקשורות לחיפושים האחרונים שלה עוקבות אחריה ברחבי הרשת.
+
+זה כל כך פולשני כך שהיא עושה קצת מחקר באינטרנט על פרסומות מקוונות ומגלה שאלו לא רק מפרסמים עוקבים אחריה, אלא גם ספק האינטרנט שלה, חברות ניתוח, מסדות רשת חברתית, ועוד.
+
+אלישיה מחליטה שהיא רוצה למצוא ולהשתמש בתוכנה שאינה אוספת את הנתונים שלה, אינה עוקבת אחריה, ואינה מספרת לשירותים אחרים שום דבר פרטי עליה.
+
+היא הולכת אל אימון פרטיות במרחב פצחנים מקומי ולומדת על **דפדפן Tor**, דפדפן הרשת היחיד אשר מתיר לה לגלוש באופן אלמוני.
+
+---
+
+# 2.TOR למען פמיניסטים
+
+### העתיד הוא סייבר־פמיניסט
+
+Fernanda runs a women's collective focused on reproductive rights in Brazil, where abortion is illegal.
+
+Fernanda and her colleagues built a website with information about abortion access, birth control, and other resources for people seeking reproductive information.
+
+If this website was linked back to them, they could be arrested--or worse.
+
+To protect themselves, Fernanda and her colleagues created the website using Tor **onion services**. Onion services not only protect them from being discovered as the operators of the server but also help protect visitors to their website by requiring they use Tor Browser.
+
+In fact, Fernanda uses **Tor Browser** for all of her web browsing just to be on the safe side.
+
+She also uses a Tor-powered app called **OnionShare** to send files to other activists securely and privately.
+
+### Reproductive rights activists like Fernanda are fighting for fundamental freedoms, and Tor helps power their resistance.
+
+---
+
+# 3. TOR למען זכויות אדם
+
+### מים הם חיים
+
+Jelani lives in a small village which a wide river runs through.
+
+This river has provided water to his community since the days of his ancestors.
+
+But today, Jelani’s river is threatened by powerful multinational companies drilling for oil in the region.
+
+Private security firms, paid for by these companies, use powerful surveillance mechanisms to monitor the online activities of Jelani and his neighbors in the village who are organizing to protect their sacred river.
+
+Jelani uses **Tor Browser** to prevent these companies from watching as he visits websites for international human rights protection and legal aid and writes blog posts about the resistance movement in his village.
+
+He also uses **OnionShare** and **SecureDrop** to securely send documents to journalists who are helping expose these human rights violations.
+
+All of this software uses Tor to help protect Jelani’s privacy.
+
+### Human rights activists like Jelani are fighting for justice in their communities, and Tor helps power their resistance.
+
+---
+
+# 4. TOR למען נגד־צנזורה
+
+### בנה גשרים לא חומות
+
+Jean was traveling for the first time to a country far from his family.
+
+After arriving at a hotel, he opened his laptop.
+
+He was so exhausted that when the message "Connection has timed out" first appeared on his web browser, he thought it was due to his own error.
+
+But after trying again and again, he realized that his email provider, a news website, and many apps were unavailable.
+
+He had heard that this country censors the internet and wondered if that was happening.
+How could he contact his family from behind this impenetrable wall?
+After doing some web searches, he found a forum and read about VPNs, private services that allow you to connect to another uncensored network.
+
+Jean spent half an hour trying to figure out which cheap VPN was best.
+
+He chose one and for a moment it seemed to work, but after five minutes the connection went offline and the VPN would no longer connect.
+
+Jean kept reading to find other options and learned about Tor Browser and how it can circumvent censorship.
+
+He found an official website mirror to download the program.
+
+When he opened **Tor Browser**, he followed the prompts for censored users and connected to a bridge which allowed him to access the internet again.
+
+With Tor Browser, Jean can browse freely and privately and contact his family.
+
+### Censored users all over the world rely on Tor Browser for a free, stable, and uncensored way to access the internet.
+
+---
+
+# 5. קטעים משותפים
+
+## מהו Tor?
+
+Tor is free software and an open network that helps protect you from tracking, surveillance, and censorship online.
+Tor is created for free by a 501(c)3 U.S.-based nonprofit called the Tor Project.
+
+The easiest way to use Tor is Tor Browser.
+When you use Tor Browser, no one can see what websites you visit or where in the world you’re coming from.
+
+Other applications, like SecureDrop and OnionShare, use Tor to protect their users against surveillance and censorship.
+
+
+## 6. איך Tor עובד?
+
+Amal wants to visit Bekele’s website privately, so she opens Tor Browser.
+
+Tor Browser selects a random circuit of three relays, which are computers all over the world configured to route traffic over the Tor network.
+
+Tor Browser then encrypts her website request three times and sends it to the first Tor relay in her circuit.
+
+The first relay removes the first encryption layer but doesn't learn that the destination is Bekele’s website.
+
+The first relay learns only the next location in the circuit, which is the second relay.
+
+The second relay removes another encryption layer and forwards the web page request to the third relay.
+
+The third relay removes the last encryption layer and forwards the web page request to its destination, Bekele’s website, but it doesn't know the request comes from Amal.
+
+Bekele doesn't know that the website request came from Amal unless she tells him so.
+
+## 7. מי משתמש ב-Tor?
+
+People all over the world use Tor to protect their privacy and access the web freely.
+
+Tor helps protect journalists, human rights defenders, domestic violence victims, academic researchers, and anyone experiencing tracking, censorship, or surveillance.
+
+## 6. למה לבטוח ב-Tor?
+
+Tor תוכנן למען פרטיות. אנחנו לא יודעים מי המשתמשים שלנו, ואנחנו לא שומרים יומנים של פעילות משתמשים.
+
+Tor relay operators cannot reveal the true identity of Tor users.
+
+Continual peer review of Tor's source code by academic and open source communities ensures that there are no backdoors in Tor, and our social contract promises that we will never backdoor Tor.
+
+## 7. הצטרף אל קהילת Tor
+
+Tor is made possible by a diverse set of users, developers, relay operators, and advocates from around the world.
+
+We need your help to make Tor more usable and secure for people everywhere.
+
+You can volunteer with Tor by writing code, running a relay, creating documentation, offering user support, or telling people in your community about Tor.
+
+The Tor community is governed by a code of conduct, and we outline our set of promises to the community in our social contract.
+
+Learn more about Tor by visiting our website, our wiki, finding us on IRC, joining one of our mailing lists, or signing up for Tor News at newsletter.torproject.org.
+
+
+## 8. הורד את Tor
+
+Tor עבור שולחן עבודה
+torproject.org/download
+
+TOR בנייד
+### Android
+דפדפן Tor עבור Android זמין מן Google Play.
+
+### iOS
+דפדפן בצל, המפותח ע"י M. Tigas, הוא הדפדפן היחיד שאנחנו ממליצים עבור iOS.
+
diff --git a/hi.po b/hi.po
new file mode 100644
index 000000000..6c8fce0dc
--- /dev/null
+++ b/hi.po
@@ -0,0 +1,162 @@
+# Tor Outreach Material 2019-2020
+
+# 1. TOR FOR PRIVACY
+
+### Privacy is a human right
+
+Like many of us, Aleisha spends most of her time online--connecting with friends, posting on social media, and browsing the web.
+
+But lately, she's noticed that advertisements related to her previous searches are following her around online.
+
+This feels so invasive that she does some research on online ads and learns that it's not just advertisers tracking her but also her ISP, analytics companies, social media platforms, and more.
+
+Aleisha decides she wants to find and use software that doesn't collect her data, doesn't track her, and doesn't tell other services anything private about her.
+
+She goes to a privacy training at a local hackerspace and learns about **Tor Browser**, the only web browser that allows her to browse anonymously.
+
+---
+
+# 2.TOR FOR FEMINISTS
+
+### The future is cyberfeminist
+
+Fernanda runs a women's collective focused on reproductive rights in Brazil, where abortion is illegal.
+
+Fernanda and her colleagues built a website with information about abortion access, birth control, and other resources for people seeking reproductive information.
+
+If this website was linked back to them, they could be arrested--or worse.
+
+To protect themselves, Fernanda and her colleagues created the website using Tor **onion services**. Onion services not only protect them from being discovered as the operators of the server but also help protect visitors to their website by requiring they use Tor Browser.
+
+In fact, Fernanda uses **Tor Browser** for all of her web browsing just to be on the safe side.
+
+She also uses a Tor-powered app called **OnionShare** to send files to other activists securely and privately.
+
+### Reproductive rights activists like Fernanda are fighting for fundamental freedoms, and Tor helps power their resistance.
+
+---
+
+# 3. TOR FOR HUMAN RIGHTS
+
+### Water is life
+
+Jelani lives in a small village which a wide river runs through.
+
+This river has provided water to his community since the days of his ancestors.
+
+But today, Jelani’s river is threatened by powerful multinational companies drilling for oil in the region.
+
+Private security firms, paid for by these companies, use powerful surveillance mechanisms to monitor the online activities of Jelani and his neighbors in the village who are organizing to protect their sacred river.
+
+Jelani uses **Tor Browser** to prevent these companies from watching as he visits websites for international human rights protection and legal aid and writes blog posts about the resistance movement in his village.
+
+He also uses **OnionShare** and **SecureDrop** to securely send documents to journalists who are helping expose these human rights violations.
+
+All of this software uses Tor to help protect Jelani’s privacy.
+
+### Human rights activists like Jelani are fighting for justice in their communities, and Tor helps power their resistance.
+
+---
+
+# 4. TOR FOR ANTI-CENSORSHIP
+
+### Build bridges not walls
+
+Jean was traveling for the first time to a country far from his family.
+
+After arriving at a hotel, he opened his laptop.
+
+He was so exhausted that when the message "Connection has timed out" first appeared on his web browser, he thought it was due to his own error.
+
+But after trying again and again, he realized that his email provider, a news website, and many apps were unavailable.
+
+He had heard that this country censors the internet and wondered if that was happening.
+How could he contact his family from behind this impenetrable wall?
+After doing some web searches, he found a forum and read about VPNs, private services that allow you to connect to another uncensored network.
+
+Jean spent half an hour trying to figure out which cheap VPN was best.
+
+He chose one and for a moment it seemed to work, but after five minutes the connection went offline and the VPN would no longer connect.
+
+Jean kept reading to find other options and learned about Tor Browser and how it can circumvent censorship.
+
+He found an official website mirror to download the program.
+
+When he opened **Tor Browser**, he followed the prompts for censored users and connected to a bridge which allowed him to access the internet again.
+
+With Tor Browser, Jean can browse freely and privately and contact his family.
+
+### Censored users all over the world rely on Tor Browser for a free, stable, and uncensored way to access the internet.
+
+---
+
+# 5. Shared Sections
+
+## What is Tor?
+
+Tor is free software and an open network that helps protect you from tracking, surveillance, and censorship online.
+Tor is created for free by a 501(c)3 U.S.-based nonprofit called the Tor Project.
+
+The easiest way to use Tor is Tor Browser.
+When you use Tor Browser, no one can see what websites you visit or where in the world you’re coming from.
+
+Other applications, like SecureDrop and OnionShare, use Tor to protect their users against surveillance and censorship.
+
+
+## 6. How does Tor work?
+
+Amal wants to visit Bekele’s website privately, so she opens Tor Browser.
+
+Tor Browser selects a random circuit of three relays, which are computers all over the world configured to route traffic over the Tor network.
+
+Tor Browser then encrypts her website request three times and sends it to the first Tor relay in her circuit.
+
+The first relay removes the first encryption layer but doesn't learn that the destination is Bekele’s website.
+
+The first relay learns only the next location in the circuit, which is the second relay.
+
+The second relay removes another encryption layer and forwards the web page request to the third relay.
+
+The third relay removes the last encryption layer and forwards the web page request to its destination, Bekele’s website, but it doesn't know the request comes from Amal.
+
+Bekele doesn't know that the website request came from Amal unless she tells him so.
+
+## 7. Who uses Tor?
+
+People all over the world use Tor to protect their privacy and access the web freely.
+
+Tor helps protect journalists, human rights defenders, domestic violence victims, academic researchers, and anyone experiencing tracking, censorship, or surveillance.
+
+## 6. Why trust Tor?
+
+Tor is designed for privacy. We don’t know who our users are, and we don't keep logs of user activity.
+
+Tor relay operators cannot reveal the true identity of Tor users.
+
+Continual peer review of Tor's source code by academic and open source communities ensures that there are no backdoors in Tor, and our social contract promises that we will never backdoor Tor.
+
+## 7. Join the Tor community
+
+Tor is made possible by a diverse set of users, developers, relay operators, and advocates from around the world.
+
+We need your help to make Tor more usable and secure for people everywhere.
+
+You can volunteer with Tor by writing code, running a relay, creating documentation, offering user support, or telling people in your community about Tor.
+
+The Tor community is governed by a code of conduct, and we outline our set of promises to the community in our social contract.
+
+Learn more about Tor by visiting our website, our wiki, finding us on IRC, joining one of our mailing lists, or signing up for Tor News at newsletter.torproject.org.
+
+
+## 8. Download Tor
+
+Tor for Desktop
+torproject.org/download
+
+TOR ON MOBILE
+### Android
+Tor Browser for Android is available from GooglePlay.
+
+### iOS
+Onion Browser, developed by M. Tigas, is the only browser we recommend for iOS.
+
diff --git a/hr.po b/hr.po
new file mode 100644
index 000000000..e211de7b8
--- /dev/null
+++ b/hr.po
@@ -0,0 +1,162 @@
+# Tor Outreach Material 2019-2020
+
+# 1. TOR FOR PRIVACY
+
+### Privacy is a human right
+
+Like many of us, Aleisha spends most of her time online--connecting with friends, posting on social media, and browsing the web.
+
+But lately, she's noticed that advertisements related to her previous searches are following her around online.
+
+This feels so invasive that she does some research on online ads and learns that it's not just advertisers tracking her but also her ISP, analytics companies, social media platforms, and more.
+
+Aleisha decides she wants to find and use software that doesn't collect her data, doesn't track her, and doesn't tell other services anything private about her.
+
+She goes to a privacy training at a local hackerspace and learns about **Tor Browser**, the only web browser that allows her to browse anonymously.
+
+---
+
+# 2.TOR FOR FEMINISTS
+
+### The future is cyberfeminist
+
+Fernanda runs a women's collective focused on reproductive rights in Brazil, where abortion is illegal.
+
+Fernanda and her colleagues built a website with information about abortion access, birth control, and other resources for people seeking reproductive information.
+
+If this website was linked back to them, they could be arrested--or worse.
+
+To protect themselves, Fernanda and her colleagues created the website using Tor **onion services**. Onion services not only protect them from being discovered as the operators of the server but also help protect visitors to their website by requiring they use Tor Browser.
+
+In fact, Fernanda uses **Tor Browser** for all of her web browsing just to be on the safe side.
+
+She also uses a Tor-powered app called **OnionShare** to send files to other activists securely and privately.
+
+### Reproductive rights activists like Fernanda are fighting for fundamental freedoms, and Tor helps power their resistance.
+
+---
+
+# 3. TOR FOR HUMAN RIGHTS
+
+### Water is life
+
+Jelani lives in a small village which a wide river runs through.
+
+This river has provided water to his community since the days of his ancestors.
+
+But today, Jelani’s river is threatened by powerful multinational companies drilling for oil in the region.
+
+Private security firms, paid for by these companies, use powerful surveillance mechanisms to monitor the online activities of Jelani and his neighbors in the village who are organizing to protect their sacred river.
+
+Jelani uses **Tor Browser** to prevent these companies from watching as he visits websites for international human rights protection and legal aid and writes blog posts about the resistance movement in his village.
+
+He also uses **OnionShare** and **SecureDrop** to securely send documents to journalists who are helping expose these human rights violations.
+
+All of this software uses Tor to help protect Jelani’s privacy.
+
+### Human rights activists like Jelani are fighting for justice in their communities, and Tor helps power their resistance.
+
+---
+
+# 4. TOR FOR ANTI-CENSORSHIP
+
+### Build bridges not walls
+
+Jean was traveling for the first time to a country far from his family.
+
+After arriving at a hotel, he opened his laptop.
+
+He was so exhausted that when the message "Connection has timed out" first appeared on his web browser, he thought it was due to his own error.
+
+But after trying again and again, he realized that his email provider, a news website, and many apps were unavailable.
+
+He had heard that this country censors the internet and wondered if that was happening.
+How could he contact his family from behind this impenetrable wall?
+After doing some web searches, he found a forum and read about VPNs, private services that allow you to connect to another uncensored network.
+
+Jean spent half an hour trying to figure out which cheap VPN was best.
+
+He chose one and for a moment it seemed to work, but after five minutes the connection went offline and the VPN would no longer connect.
+
+Jean kept reading to find other options and learned about Tor Browser and how it can circumvent censorship.
+
+He found an official website mirror to download the program.
+
+When he opened **Tor Browser**, he followed the prompts for censored users and connected to a bridge which allowed him to access the internet again.
+
+With Tor Browser, Jean can browse freely and privately and contact his family.
+
+### Censored users all over the world rely on Tor Browser for a free, stable, and uncensored way to access the internet.
+
+---
+
+# 5. Shared Sections
+
+## Što je Tor?
+
+Tor is free software and an open network that helps protect you from tracking, surveillance, and censorship online.
+Tor is created for free by a 501(c)3 U.S.-based nonprofit called the Tor Project.
+
+The easiest way to use Tor is Tor Browser.
+When you use Tor Browser, no one can see what websites you visit or where in the world you’re coming from.
+
+Other applications, like SecureDrop and OnionShare, use Tor to protect their users against surveillance and censorship.
+
+
+## 6. How does Tor work?
+
+Amal wants to visit Bekele’s website privately, so she opens Tor Browser.
+
+Tor Browser selects a random circuit of three relays, which are computers all over the world configured to route traffic over the Tor network.
+
+Tor Browser then encrypts her website request three times and sends it to the first Tor relay in her circuit.
+
+The first relay removes the first encryption layer but doesn't learn that the destination is Bekele’s website.
+
+The first relay learns only the next location in the circuit, which is the second relay.
+
+The second relay removes another encryption layer and forwards the web page request to the third relay.
+
+The third relay removes the last encryption layer and forwards the web page request to its destination, Bekele’s website, but it doesn't know the request comes from Amal.
+
+Bekele doesn't know that the website request came from Amal unless she tells him so.
+
+## 7. Who uses Tor?
+
+People all over the world use Tor to protect their privacy and access the web freely.
+
+Tor helps protect journalists, human rights defenders, domestic violence victims, academic researchers, and anyone experiencing tracking, censorship, or surveillance.
+
+## 6. Why trust Tor?
+
+Tor is designed for privacy. We don’t know who our users are, and we don't keep logs of user activity.
+
+Tor relay operators cannot reveal the true identity of Tor users.
+
+Continual peer review of Tor's source code by academic and open source communities ensures that there are no backdoors in Tor, and our social contract promises that we will never backdoor Tor.
+
+## 7. Join the Tor community
+
+Tor is made possible by a diverse set of users, developers, relay operators, and advocates from around the world.
+
+We need your help to make Tor more usable and secure for people everywhere.
+
+You can volunteer with Tor by writing code, running a relay, creating documentation, offering user support, or telling people in your community about Tor.
+
+The Tor community is governed by a code of conduct, and we outline our set of promises to the community in our social contract.
+
+Learn more about Tor by visiting our website, our wiki, finding us on IRC, joining one of our mailing lists, or signing up for Tor News at newsletter.torproject.org.
+
+
+## 8. Download Tor
+
+Tor for Desktop
+torproject.org/download
+
+TOR ON MOBILE
+### Android
+Tor Browser for Android is available from GooglePlay.
+
+### iOS
+Onion Browser, developed by M. Tigas, is the only browser we recommend for iOS.
+
diff --git a/hu.po b/hu.po
new file mode 100644
index 000000000..99bbf8ad0
--- /dev/null
+++ b/hu.po
@@ -0,0 +1,162 @@
+# Tor Outreach Material 2019-2020
+
+# 1. TOR FOR PRIVACY
+
+### Privacy is a human right
+
+Like many of us, Aleisha spends most of her time online--connecting with friends, posting on social media, and browsing the web.
+
+But lately, she's noticed that advertisements related to her previous searches are following her around online.
+
+This feels so invasive that she does some research on online ads and learns that it's not just advertisers tracking her but also her ISP, analytics companies, social media platforms, and more.
+
+Aleisha decides she wants to find and use software that doesn't collect her data, doesn't track her, and doesn't tell other services anything private about her.
+
+She goes to a privacy training at a local hackerspace and learns about **Tor Browser**, the only web browser that allows her to browse anonymously.
+
+---
+
+# 2.TOR FOR FEMINISTS
+
+### The future is cyberfeminist
+
+Fernanda runs a women's collective focused on reproductive rights in Brazil, where abortion is illegal.
+
+Fernanda and her colleagues built a website with information about abortion access, birth control, and other resources for people seeking reproductive information.
+
+If this website was linked back to them, they could be arrested--or worse.
+
+To protect themselves, Fernanda and her colleagues created the website using Tor **onion services**. Onion services not only protect them from being discovered as the operators of the server but also help protect visitors to their website by requiring they use Tor Browser.
+
+In fact, Fernanda uses **Tor Browser** for all of her web browsing just to be on the safe side.
+
+She also uses a Tor-powered app called **OnionShare** to send files to other activists securely and privately.
+
+### Reproductive rights activists like Fernanda are fighting for fundamental freedoms, and Tor helps power their resistance.
+
+---
+
+# 3. TOR FOR HUMAN RIGHTS
+
+### Water is life
+
+Jelani lives in a small village which a wide river runs through.
+
+This river has provided water to his community since the days of his ancestors.
+
+But today, Jelani’s river is threatened by powerful multinational companies drilling for oil in the region.
+
+Private security firms, paid for by these companies, use powerful surveillance mechanisms to monitor the online activities of Jelani and his neighbors in the village who are organizing to protect their sacred river.
+
+Jelani uses **Tor Browser** to prevent these companies from watching as he visits websites for international human rights protection and legal aid and writes blog posts about the resistance movement in his village.
+
+He also uses **OnionShare** and **SecureDrop** to securely send documents to journalists who are helping expose these human rights violations.
+
+All of this software uses Tor to help protect Jelani’s privacy.
+
+### Human rights activists like Jelani are fighting for justice in their communities, and Tor helps power their resistance.
+
+---
+
+# 4. TOR FOR ANTI-CENSORSHIP
+
+### Build bridges not walls
+
+Jean was traveling for the first time to a country far from his family.
+
+After arriving at a hotel, he opened his laptop.
+
+He was so exhausted that when the message "Connection has timed out" first appeared on his web browser, he thought it was due to his own error.
+
+But after trying again and again, he realized that his email provider, a news website, and many apps were unavailable.
+
+He had heard that this country censors the internet and wondered if that was happening.
+How could he contact his family from behind this impenetrable wall?
+After doing some web searches, he found a forum and read about VPNs, private services that allow you to connect to another uncensored network.
+
+Jean spent half an hour trying to figure out which cheap VPN was best.
+
+He chose one and for a moment it seemed to work, but after five minutes the connection went offline and the VPN would no longer connect.
+
+Jean kept reading to find other options and learned about Tor Browser and how it can circumvent censorship.
+
+He found an official website mirror to download the program.
+
+When he opened **Tor Browser**, he followed the prompts for censored users and connected to a bridge which allowed him to access the internet again.
+
+With Tor Browser, Jean can browse freely and privately and contact his family.
+
+### Censored users all over the world rely on Tor Browser for a free, stable, and uncensored way to access the internet.
+
+---
+
+# 5. Shared Sections
+
+## Mi a Tor?
+
+Tor is free software and an open network that helps protect you from tracking, surveillance, and censorship online.
+Tor is created for free by a 501(c)3 U.S.-based nonprofit called the Tor Project.
+
+The easiest way to use Tor is Tor Browser.
+When you use Tor Browser, no one can see what websites you visit or where in the world you’re coming from.
+
+Other applications, like SecureDrop and OnionShare, use Tor to protect their users against surveillance and censorship.
+
+
+## 6. How does Tor work?
+
+Amal wants to visit Bekele’s website privately, so she opens Tor Browser.
+
+Tor Browser selects a random circuit of three relays, which are computers all over the world configured to route traffic over the Tor network.
+
+Tor Browser then encrypts her website request three times and sends it to the first Tor relay in her circuit.
+
+The first relay removes the first encryption layer but doesn't learn that the destination is Bekele’s website.
+
+The first relay learns only the next location in the circuit, which is the second relay.
+
+The second relay removes another encryption layer and forwards the web page request to the third relay.
+
+The third relay removes the last encryption layer and forwards the web page request to its destination, Bekele’s website, but it doesn't know the request comes from Amal.
+
+Bekele doesn't know that the website request came from Amal unless she tells him so.
+
+## 7. Who uses Tor?
+
+People all over the world use Tor to protect their privacy and access the web freely.
+
+Tor helps protect journalists, human rights defenders, domestic violence victims, academic researchers, and anyone experiencing tracking, censorship, or surveillance.
+
+## 6. Why trust Tor?
+
+Tor is designed for privacy. We don’t know who our users are, and we don't keep logs of user activity.
+
+Tor relay operators cannot reveal the true identity of Tor users.
+
+Continual peer review of Tor's source code by academic and open source communities ensures that there are no backdoors in Tor, and our social contract promises that we will never backdoor Tor.
+
+## 7. Join the Tor community
+
+Tor is made possible by a diverse set of users, developers, relay operators, and advocates from around the world.
+
+We need your help to make Tor more usable and secure for people everywhere.
+
+You can volunteer with Tor by writing code, running a relay, creating documentation, offering user support, or telling people in your community about Tor.
+
+The Tor community is governed by a code of conduct, and we outline our set of promises to the community in our social contract.
+
+Learn more about Tor by visiting our website, our wiki, finding us on IRC, joining one of our mailing lists, or signing up for Tor News at newsletter.torproject.org.
+
+
+## 8. Download Tor
+
+Tor for Desktop
+torproject.org/download
+
+TOR ON MOBILE
+### Android
+Tor Browser for Android is available from GooglePlay.
+
+### iOS
+Onion Browser, developed by M. Tigas, is the only browser we recommend for iOS.
+
diff --git a/hy.po b/hy.po
new file mode 100644
index 000000000..6c8fce0dc
--- /dev/null
+++ b/hy.po
@@ -0,0 +1,162 @@
+# Tor Outreach Material 2019-2020
+
+# 1. TOR FOR PRIVACY
+
+### Privacy is a human right
+
+Like many of us, Aleisha spends most of her time online--connecting with friends, posting on social media, and browsing the web.
+
+But lately, she's noticed that advertisements related to her previous searches are following her around online.
+
+This feels so invasive that she does some research on online ads and learns that it's not just advertisers tracking her but also her ISP, analytics companies, social media platforms, and more.
+
+Aleisha decides she wants to find and use software that doesn't collect her data, doesn't track her, and doesn't tell other services anything private about her.
+
+She goes to a privacy training at a local hackerspace and learns about **Tor Browser**, the only web browser that allows her to browse anonymously.
+
+---
+
+# 2.TOR FOR FEMINISTS
+
+### The future is cyberfeminist
+
+Fernanda runs a women's collective focused on reproductive rights in Brazil, where abortion is illegal.
+
+Fernanda and her colleagues built a website with information about abortion access, birth control, and other resources for people seeking reproductive information.
+
+If this website was linked back to them, they could be arrested--or worse.
+
+To protect themselves, Fernanda and her colleagues created the website using Tor **onion services**. Onion services not only protect them from being discovered as the operators of the server but also help protect visitors to their website by requiring they use Tor Browser.
+
+In fact, Fernanda uses **Tor Browser** for all of her web browsing just to be on the safe side.
+
+She also uses a Tor-powered app called **OnionShare** to send files to other activists securely and privately.
+
+### Reproductive rights activists like Fernanda are fighting for fundamental freedoms, and Tor helps power their resistance.
+
+---
+
+# 3. TOR FOR HUMAN RIGHTS
+
+### Water is life
+
+Jelani lives in a small village which a wide river runs through.
+
+This river has provided water to his community since the days of his ancestors.
+
+But today, Jelani’s river is threatened by powerful multinational companies drilling for oil in the region.
+
+Private security firms, paid for by these companies, use powerful surveillance mechanisms to monitor the online activities of Jelani and his neighbors in the village who are organizing to protect their sacred river.
+
+Jelani uses **Tor Browser** to prevent these companies from watching as he visits websites for international human rights protection and legal aid and writes blog posts about the resistance movement in his village.
+
+He also uses **OnionShare** and **SecureDrop** to securely send documents to journalists who are helping expose these human rights violations.
+
+All of this software uses Tor to help protect Jelani’s privacy.
+
+### Human rights activists like Jelani are fighting for justice in their communities, and Tor helps power their resistance.
+
+---
+
+# 4. TOR FOR ANTI-CENSORSHIP
+
+### Build bridges not walls
+
+Jean was traveling for the first time to a country far from his family.
+
+After arriving at a hotel, he opened his laptop.
+
+He was so exhausted that when the message "Connection has timed out" first appeared on his web browser, he thought it was due to his own error.
+
+But after trying again and again, he realized that his email provider, a news website, and many apps were unavailable.
+
+He had heard that this country censors the internet and wondered if that was happening.
+How could he contact his family from behind this impenetrable wall?
+After doing some web searches, he found a forum and read about VPNs, private services that allow you to connect to another uncensored network.
+
+Jean spent half an hour trying to figure out which cheap VPN was best.
+
+He chose one and for a moment it seemed to work, but after five minutes the connection went offline and the VPN would no longer connect.
+
+Jean kept reading to find other options and learned about Tor Browser and how it can circumvent censorship.
+
+He found an official website mirror to download the program.
+
+When he opened **Tor Browser**, he followed the prompts for censored users and connected to a bridge which allowed him to access the internet again.
+
+With Tor Browser, Jean can browse freely and privately and contact his family.
+
+### Censored users all over the world rely on Tor Browser for a free, stable, and uncensored way to access the internet.
+
+---
+
+# 5. Shared Sections
+
+## What is Tor?
+
+Tor is free software and an open network that helps protect you from tracking, surveillance, and censorship online.
+Tor is created for free by a 501(c)3 U.S.-based nonprofit called the Tor Project.
+
+The easiest way to use Tor is Tor Browser.
+When you use Tor Browser, no one can see what websites you visit or where in the world you’re coming from.
+
+Other applications, like SecureDrop and OnionShare, use Tor to protect their users against surveillance and censorship.
+
+
+## 6. How does Tor work?
+
+Amal wants to visit Bekele’s website privately, so she opens Tor Browser.
+
+Tor Browser selects a random circuit of three relays, which are computers all over the world configured to route traffic over the Tor network.
+
+Tor Browser then encrypts her website request three times and sends it to the first Tor relay in her circuit.
+
+The first relay removes the first encryption layer but doesn't learn that the destination is Bekele’s website.
+
+The first relay learns only the next location in the circuit, which is the second relay.
+
+The second relay removes another encryption layer and forwards the web page request to the third relay.
+
+The third relay removes the last encryption layer and forwards the web page request to its destination, Bekele’s website, but it doesn't know the request comes from Amal.
+
+Bekele doesn't know that the website request came from Amal unless she tells him so.
+
+## 7. Who uses Tor?
+
+People all over the world use Tor to protect their privacy and access the web freely.
+
+Tor helps protect journalists, human rights defenders, domestic violence victims, academic researchers, and anyone experiencing tracking, censorship, or surveillance.
+
+## 6. Why trust Tor?
+
+Tor is designed for privacy. We don’t know who our users are, and we don't keep logs of user activity.
+
+Tor relay operators cannot reveal the true identity of Tor users.
+
+Continual peer review of Tor's source code by academic and open source communities ensures that there are no backdoors in Tor, and our social contract promises that we will never backdoor Tor.
+
+## 7. Join the Tor community
+
+Tor is made possible by a diverse set of users, developers, relay operators, and advocates from around the world.
+
+We need your help to make Tor more usable and secure for people everywhere.
+
+You can volunteer with Tor by writing code, running a relay, creating documentation, offering user support, or telling people in your community about Tor.
+
+The Tor community is governed by a code of conduct, and we outline our set of promises to the community in our social contract.
+
+Learn more about Tor by visiting our website, our wiki, finding us on IRC, joining one of our mailing lists, or signing up for Tor News at newsletter.torproject.org.
+
+
+## 8. Download Tor
+
+Tor for Desktop
+torproject.org/download
+
+TOR ON MOBILE
+### Android
+Tor Browser for Android is available from GooglePlay.
+
+### iOS
+Onion Browser, developed by M. Tigas, is the only browser we recommend for iOS.
+
diff --git a/id.po b/id.po
new file mode 100644
index 000000000..1d0b72e30
--- /dev/null
+++ b/id.po
@@ -0,0 +1,162 @@
+# Materi Penjangkauan Tor 2019-2020
+
+# 1. TOR UNTUK PRiVASI
+
+### Privasi adalah hak asasi manusia
+
+Seperti kebanyakan kita, Aleisha menghabiskan sebagian besar waktunya berhubungan secara daring dengan teman-teman, berbagi di media sosial, dan menjelajahi web.
+
+But lately, she's noticed that advertisements related to her previous searches are following her around online.
+
+This feels so invasive that she does some research on online ads and learns that it's not just advertisers tracking her but also her ISP, analytics companies, social media platforms, and more.
+
+Aleisha decides she wants to find and use software that doesn't collect her data, doesn't track her, and doesn't tell other services anything private about her.
+
+She goes to a privacy training at a local hackerspace and learns about **Tor Browser**, the only web browser that allows her to browse anonymously.
+
+---
+
+# 2.TOR FOR FEMINISTS
+
+### The future is cyberfeminist
+
+Fernanda runs a women's collective focused on reproductive rights in Brazil, where abortion is illegal.
+
+Fernanda and her colleagues built a website with information about abortion access, birth control, and other resources for people seeking reproductive information.
+
+If this website was linked back to them, they could be arrested--or worse.
+
+To protect themselves, Fernanda and her colleagues created the website using Tor **onion services**. Onion services not only protect them from being discovered as the operators of the server but also help protect visitors to their website by requiring they use Tor Browser.
+
+In fact, Fernanda uses **Tor Browser** for all of her web browsing just to be on the safe side.
+
+She also uses a Tor-powered app called **OnionShare** to send files to other activists securely and privately.
+
+### Reproductive rights activists like Fernanda are fighting for fundamental freedoms, and Tor helps power their resistance.
+
+---
+
+# 3. TOR FOR HUMAN RIGHTS
+
+### Water is life
+
+Jelani lives in a small village which a wide river runs through.
+
+This river has provided water to his community since the days of his ancestors.
+
+But today, Jelani’s river is threatened by powerful multinational companies drilling for oil in the region.
+
+Private security firms, paid for by these companies, use powerful surveillance mechanisms to monitor the online activities of Jelani and his neighbors in the village who are organizing to protect their sacred river.
+
+Jelani uses **Tor Browser** to prevent these companies from watching as he visits websites for international human rights protection and legal aid and writes blog posts about the resistance movement in his village.
+
+He also uses **OnionShare** and **SecureDrop** to securely send documents to journalists who are helping expose these human rights violations.
+
+All of this software uses Tor to help protect Jelani’s privacy.
+
+### Human rights activists like Jelani are fighting for justice in their communities, and Tor helps power their resistance.
+
+---
+
+# 4. TOR FOR ANTI-CENSORSHIP
+
+### Build bridges not walls
+
+Jean was traveling for the first time to a country far from his family.
+
+After arriving at a hotel, he opened his laptop.
+
+He was so exhausted that when the message "Connection has timed out" first appeared on his web browser, he thought it was due to his own error.
+
+But after trying again and again, he realized that his email provider, a news website, and many apps were unavailable.
+
+He had heard that this country censors the internet and wondered if that was happening.
+How could he contact his family from behind this impenetrable wall?
+After doing some web searches, he found a forum and read about VPNs, private services that allow you to connect to another uncensored network.
+
+Jean spent half an hour trying to figure out which cheap VPN was best.
+
+He chose one and for a moment it seemed to work, but after five minutes the connection went offline and the VPN would no longer connect.
+
+Jean kept reading to find other options and learned about Tor Browser and how it can circumvent censorship.
+
+He found an official website mirror to download the program.
+
+When he opened **Tor Browser**, he followed the prompts for censored users and connected to a bridge which allowed him to access the internet again.
+
+With Tor Browser, Jean can browse freely and privately and contact his family.
+
+### Censored users all over the world rely on Tor Browser for a free, stable, and uncensored way to access the internet.
+
+---
+
+# 5. Shared Sections
+
+## Apa itu Tor?
+
+Tor is free software and an open network that helps protect you from tracking, surveillance, and censorship online.
+Tor is created for free by a 501(c)3 U.S.-based nonprofit called the Tor Project.
+
+The easiest way to use Tor is Tor Browser.
+When you use Tor Browser, no one can see what websites you visit or where in the world you’re coming from.
+
+Other applications, like SecureDrop and OnionShare, use Tor to protect their users against surveillance and censorship.
+
+
+## 6. How does Tor work?
+
+Amal wants to visit Bekele’s website privately, so she opens Tor Browser.
+
+Tor Browser selects a random circuit of three relays, which are computers all over the world configured to route traffic over the Tor network.
+
+Tor Browser then encrypts her website request three times and sends it to the first Tor relay in her circuit.
+
+The first relay removes the first encryption layer but doesn't learn that the destination is Bekele’s website.
+
+The first relay learns only the next location in the circuit, which is the second relay.
+
+The second relay removes another encryption layer and forwards the web page request to the third relay.
+
+The third relay removes the last encryption layer and forwards the web page request to its destination, Bekele’s website, but it doesn't know the request comes from Amal.
+
+Bekele doesn't know that the website request came from Amal unless she tells him so.
+
+## 7. Who uses Tor?
+
+People all over the world use Tor to protect their privacy and access the web freely.
+
+Tor helps protect journalists, human rights defenders, domestic violence victims, academic researchers, and anyone experiencing tracking, censorship, or surveillance.
+
+## 6. Why trust Tor?
+
+Tor is designed for privacy. We don’t know who our users are, and we don't keep logs of user activity.
+
+Tor relay operators cannot reveal the true identity of Tor users.
+
+Continual peer review of Tor's source code by academic and open source communities ensures that there are no backdoors in Tor, and our social contract promises that we will never backdoor Tor.
+
+## 7. Join the Tor community
+
+Tor is made possible by a diverse set of users, developers, relay operators, and advocates from around the world.
+
+We need your help to make Tor more usable and secure for people everywhere.
+
+You can volunteer with Tor by writing code, running a relay, creating documentation, offering user support, or telling people in your community about Tor.
+
+The Tor community is governed by a code of conduct, and we outline our set of promises to the community in our social contract.
+
+Learn more about Tor by visiting our website, our wiki, finding us on IRC, joining one of our mailing lists, or signing up for Tor News at newsletter.torproject.org.
+
+
+## 8. Download Tor
+
+Tor for Desktop
+torproject.org/download
+
+TOR ON MOBILE
+### Android
+Tor Browser for Android is available from GooglePlay.
+
+### iOS
+Onion Browser, developed by M. Tigas, is the only browser we recommend for iOS.
+
diff --git a/is.po b/is.po
new file mode 100644
index 000000000..25fdb4718
--- /dev/null
+++ b/is.po
@@ -0,0 +1,161 @@
+# Tor kynningarefni 2019-2020
+
+# 1. TOR FYRIR GAGNALEYND
+
+### Friðhelgi persónuupplýsinga er mannréttindi
+
+Líkt og mörg okkar, eyðir Aleisha miklu af tímanum sínum á netinu -að hafa samband við vini, pósta á samfélagsmiðla og við vafur á vefnum.
+
+En upp á síðkastið hefur hún tekið eftir að auglýsingar sem tengjast málum sem hún hefur áður leitað að á netinu eru farnar að fylgja henni út um allt á netinu.
+
+Þetta finnst henni vægast sagt uppáþrengjandi, þannig að hún leggst í dálitla rannsóknarvinnu á netinu og kemst fljótt að því að það eru ekki bara auglýsendur sem eru að fylgjast með henni, heldur einnig netþjónustufyrirtækið hennar, ýmis greiningafyrirtæki, samfélagsmiðlafyritæki og fleiri.
+
+Aleisha ákveður að hún vilji reyna að finna og nota hugbúnað sem ekki safnar gögnum um hana, fylgist ekki með henni, og sem gefi ekki öðrum þjónustum upp neinar persónulegar upplýsingar um hana.
+
+Hún fer á námskeið um gagnaleynd í hakkaravinnustofu (hackerspace) í hverfinu sínu og lærir þar um **Tor-vafrann** - eina vefvafrann sem gerir henni hleift að vafra nafnlaust um netið.
+
+---
+
+# 2. TOR FYRIR FEMÍNISTA
+
+### Framtíðin er fyrir netvædda femínista
+
+Fernanda rekur kvennasamtök sem vinna að réttindum til frjósemisheilbrigði í Brasilíu, þar sem fóstureyðingar eru ólöglegar.
+
+Fernanda og samstarfskonur hennar útbjuggu vefsvæði með upplýsingum um aðgang að fóstureyðingum, getnaðarvörnum og öðrum upplýsingum varðandi barneignir.
+
+Ef þetta vefsvæði væri rakið til þeirra gætu þær átt á hættu að vera handteknar - eða þaðan af verra.
+
+Til að verja sig, útbjuggu Fernanda og samstarfskonur hennar vefsvæðið með Tor **onion-þjónustum**. Onion-þjónustur koma ekki aðeins í veg fyrir að upp komist að þær séu rekstraraðilar vefsvæðisins, heldur hjálpar einnig til við að vernda þá sem heimsækja vefinn, því hann er einungis hægt að skoða með Tor-vafranum.
+
+Reyndar notar Fernanda **Tor-vafrann** í allt sitt vafur á veraldarvefnum, bara til að hafa öryggið sín megin.
+
+Hún notar einnig Tor-virkjað forrit sem kallast **OnionShare** til að senda skrár til annarra aðgerðasinna, á öruggan hátt og í friði fyrir hnýsni.
+
+### Aðgerðasinnar eins og Fernanda sem vinna að réttindum til frjósemisheilbrigði eru að berjast fyrir grunn-mannréttindum og frelsi, og Tor styður því við baráttu þeirra.
+
+---
+
+# 3. TOR FYRIR MANNRÉTTINDI
+
+### Vatn er lífið
+
+Jelani býr í litlu þorpi á bakka stórs fljóts.
+
+Þetta fljót hefur séð samfélaginu fyrir vatni svo lengi sem elstu menn muna.
+
+En núna er fljótinu hans Jelani ógnað af valdamiklum fjölþjóðafyrirtækjum sem eru byrjuð að bora eftir olíu í nágrenninu.
+
+Einkarekin öryggisfyrirtæki, starfandi á vegum þessara fyrirtækja, nota öfluga eftirlitstækni til að fylgjast með netumferð Jelani og nágranna hans í þorpinu, sem eru smátt og smátt að skipuleggja sig til að reyna að verja mikilvæga fljótið þeirra.
+
+Jelani nýtir sér **Tor-vafrann** til að komast hjá því að þessi fyrirtæki fylgist með því þegar hann heimsækir vefsvæði mannréttindasamtaka og lögfræðiaðstoðar eða skrifar bloggfærslur um andófshreyfinguna í þorpinu hans.
+
+Hann notfærir sér líka **OnionShare** og **SecureDrop** til að geta sent skjöl á öruggan hátt til blaðamanna sem eru að hjálpa við að fletta ofan af þeim brotum á mannréttingum sem í gangi eru.
+
+Allur þessi hugbúnaður notar Tor til að vernda friðhelgi Jelanis.
+
+### Aðgerðasinnar í mannréttindamálum eins og Jelani eru að berjast fyrir réttlátu samfélagi, og Tor styður því við baráttu þeirra.
+
+---
+
+# 4. TOR GEGN RITSKOÐUN
+
+### Byggjum brýr - ekki veggi
+
+Jean var að ferðast í fyrsta skipti til lands langt frá heimahögunum.
+
+Þegar hann kom á hótelið var eitt af því fyrsta sem hann gerði að opna fartölvuna sína.
+
+Hann var það þreyttur að fyrst þegar hann fékk skilaboðin "Tengingin rann út á tíma", þá datt honum í hug að villan stafaði af einhverri vitleysu sem hann hefði sjálfur gert.
+
+En eftir að hafa reynt aftur nokkrum sinnum, þá rann upp fyrir honum að tölvupóstþjónustan hans, fréttavefurinn sem hann var vanur að skoða, ásamt mörgum forritum, virkuðu ekki og voru ekki aðgengileg.
+
+Hann hafði heyrt að internetið væri ritskoðað í þessu landi og velti fyrir sér hvort það væri ástæðan. Hvernig ætti hann að fara að því að hafa samband við fjölskyldu og vini í gegnum þennan ókleifa múr?
+Honum tókst samt að framkvæma nokkrar vefleitir of fann spjallsvæði þar sem hann gat fræðst um VPN; einkaþjónustur sem gera kleift að tengjast beint við netkerfi, án ritskoðunar eða annarra hafta.
+
+Jean eyddi hálftíma í að finna út hvaða ódýra VPN-þjónusta væri best.
+
+Han valdi sér eina og í smástund virtist allt vera í lagi, en eftir fimm mínútur rofnaði tengingin og VPN-þjónustan hætti að virka.
+
+Jean hélt áfram að kanna málið og datt loks niður á Tor-vafrann of sá hvernig hann gæti komist í kringum ritskoðun.
+
+Hann fann opinberan vefspegil þar sem hann gat sótt upprunalega útgáfu forritsins.
+
+Þegar hann opnaði **Tor-vafrann**, gat hann fylgt leiðbeiningum fyrir ritskoðaða notendur og tengdist við svokallaða brú sem gerði honum kleift að fá aftur ótakmarkaðan aðgang að intenetinu.
+
+Með Tor-vafranum getur Jean vafrað frjálst og í friði fyrir hnýsni og komist í samband við fjölskylduna sína.
+
+### Notendur út um víða veröld sem búa við ritskoðun reiða sig á Tor-vafrann sem ókeypis, stöðuga og óritskoðaða leið inn á internetið.
+
+---
+
+# 5. Sameiginlegir hlutar
+
+## Hvað er Tor?
+
+Tor er frjáls hugbúnaður og opið netkerfi sem hjálpar þér að verjast eftirliti, skráningu og ritskoðun á netinu.
+Tor er í boði án kvaða frá Tor-verkefninu sem er bandarísk US 501(c)(3) sjálfboðaliðasamtök án gróðamarkmiða.
+
+Einfaldasta leiðin til að nota Tor er með Tor-vafranum.
+Þegar þú notar Tor-vafrann getur enginn séð hvaða vefsvæði þú ert að skoða eða hvar í heiminum þú ert.
+
+Önnur forrit, eins og SecureDrop og OnionShare, nota Tor til að verja notendur sína gegn eftirliti og ritskoðun.
+
+
+## 6. Hvernig virkar Tor?
+
+Amal vill heimsækja vefsvæði Bekele án afskipta annarra, þannig að hún ræsir Tor-vafrann.
+
+Tor-vafrinn velur af handahófi rás með þremur endurvörpum, sem eru tölvur víðs vegar um heiminn sem settar eru upp til að beina umferð um Tor-netkerfið.
+
+Tor-vafrinn dulritar síðan í þrígang beiðnir hennar um vefsíður og sendir þær upplýsingar til fyrsta endurvarpans í rásinni hennar.
+
+Fyrsti endurvarpinn fjarlægir fyrsta dulritunarlagið en fær ekki að vita að áfangastaðurinn er vefþjónninn sem hýsir vefsvæði Bekele.
+
+Fyrsti endurvarpinn fær einungis að vita næstu staðsetningu í rásinni, sem er þá endurvarpi númer tvö.
+
+Annar endurvarpinn fjarlægir næsta dulritunarlag og áframsendir beiðnina á þriðja endurvarpann.
+
+Þriðji endurvarpinn fjarlægir síðsta dulritunarlagið og áframsendir vefsíðubeiðnina á áfangastaðinn, en veit ekki að beiðnin kemur frá Amal.
+
+Bekele veit ekki að beiðnin um vefsíðuna kemur frá Amal nema ef hún segir honum frá því sjálf.
+
+## 7. Hverjir nota Tor?
+
+Fólk út um víða veröld notar Tor til að verja persónuupplýsingar sínar og til að geta skoðað vefinn án hafta.
+
+Tor aðstoðar við að vernda blaðamenn, verjendur mannréttinda, fórnarlömb heimilisofbeldis, akademíska vísindamenn og alla þá sem gætu orðið fyrir eftirliti, skráningu og ritskoðun.
+
+## 6. Af hverju treysta Tor?
+
+Tor er hannað fyrir gagnaleynd. Við vitum ekki hverjir notendur okkar eru, og við höldum ekki neinar skrár yfir virkni notenda.
+
+Þeir sem reka Tor-endurvarpa geta ekki séð raunveruleg auðkenni Tor-notenda.
+
+Sífelld yfirferð jafningja á grunnkóða Tor, sem fram fer í akademískum og frjálsum samfélögum, tryggir að það séu engar bakdyr í Tor, auk þess sem samfélagssáttmálinn okkar lofar að aldrei muni verða neinar bakdyr í Tor.
+
+## 7. Taktu þátt í Tor-samfélaginu
+
+Tor er gert mögulegt með fjölbreyttri blöndu af notendum, forriturum, endurvörpurum og ráðgjöfum úr hinum ýmsu heimshornum.
+
+Við þörfnumst hjálpar þinnar við að gera Tor ennþá notendavænni og öruggari fyrir fólk allsstaðar í heiminum.
+
+Þú getur boðið fram krafta þína hjá Tor með því að skrifa kóða, reka endurvarpa, útbúa leiðbeiningar, bjóða stuðning við notendur, eða með því að segja fólki sem þú hittir frá Tor.
+
+Samfélaginu sem stendur að Tor er stýrt með siðareglum, og í samfélagssáttmálanum okkar útlistum við þau loforð sem við ætlum aðö standa við gagnvart samfélaginu.
+
+Lærðu meira um Tor með því að skoða vefsvæðið okkar, wiki-upplýsingasíðurnar, með því að finna okkur á IRC, gerast áskrifandi að einhverjum póstlistanum okkar, eða með því að skrá þig fyrir Tor-fréttabréfinu á at newsletter.torproject.org.
+
+
+## 8. Sæktu Tor-vafrann
+
+Tor fyrir tölvur
+torproject.org/download
+
+TOR Á SNJALLTÆKJUM
+### Android
+Tor-vafri fyrir Android er tiltækur á GooglePlay.
+
+### iOS
+Onion-vafrinn, þróaður af M. Tigas, er eini vafrinn sem við getum mælt með fyrir iOS.
+
diff --git a/it.po b/it.po
new file mode 100644
index 000000000..216d722a9
--- /dev/null
+++ b/it.po
@@ -0,0 +1,162 @@
+# Tor Outreach Material 2019-2020
+
+# 1. TOR FOR PRIVACY
+
+### Privacy is a human right
+
+Like many of us, Aleisha spends most of her time online--connecting with friends, posting on social media, and browsing the web.
+
+But lately, she's noticed that advertisements related to her previous searches are following her around online.
+
+This feels so invasive that she does some research on online ads and learns that it's not just advertisers tracking her but also her ISP, analytics companies, social media platforms, and more.
+
+Aleisha decides she wants to find and use software that doesn't collect her data, doesn't track her, and doesn't tell other services anything private about her.
+
+She goes to a privacy training at a local hackerspace and learns about **Tor Browser**, the only web browser that allows her to browse anonymously.
+
+---
+
+# 2.TOR FOR FEMINISTS
+
+### The future is cyberfeminist
+
+Fernanda runs a women's collective focused on reproductive rights in Brazil, where abortion is illegal.
+
+Fernanda and her colleagues built a website with information about abortion access, birth control, and other resources for people seeking reproductive information.
+
+If this website was linked back to them, they could be arrested--or worse.
+
+To protect themselves, Fernanda and her colleagues created the website using Tor **onion services**. Onion services not only protect them from being discovered as the operators of the server but also help protect visitors to their website by requiring they use Tor Browser.
+
+In fact, Fernanda uses **Tor Browser** for all of her web browsing just to be on the safe side.
+
+She also uses a Tor-powered app called **OnionShare** to send files to other activists securely and privately.
+
+### Reproductive rights activists like Fernanda are fighting for fundamental freedoms, and Tor helps power their resistance.
+
+---
+
+# 3. TOR FOR HUMAN RIGHTS
+
+### Water is life
+
+Jelani lives in a small village which a wide river runs through.
+
+This river has provided water to his community since the days of his ancestors.
+
+But today, Jelani’s river is threatened by powerful multinational companies drilling for oil in the region.
+
+Private security firms, paid for by these companies, use powerful surveillance mechanisms to monitor the online activities of Jelani and his neighbors in the village who are organizing to protect their sacred river.
+
+Jelani uses **Tor Browser** to prevent these companies from watching as he visits websites for international human rights protection and legal aid and writes blog posts about the resistance movement in his village.
+
+He also uses **OnionShare** and **SecureDrop** to securely send documents to journalists who are helping expose these human rights violations.
+
+All of this software uses Tor to help protect Jelani’s privacy.
+
+### Human rights activists like Jelani are fighting for justice in their communities, and Tor helps power their resistance.
+
+---
+
+# 4. TOR FOR ANTI-CENSORSHIP
+
+### Build bridges not walls
+
+Jean was traveling for the first time to a country far from his family.
+
+After arriving at a hotel, he opened his laptop.
+
+He was so exhausted that when the message "Connection has timed out" first appeared on his web browser, he thought it was due to his own error.
+
+But after trying again and again, he realized that his email provider, a news website, and many apps were unavailable.
+
+He had heard that this country censors the internet and wondered if that was happening.
+How could he contact his family from behind this impenetrable wall?
+After doing some web searches, he found a forum and read about VPNs, private services that allow you to connect to another uncensored network.
+
+Jean spent half an hour trying to figure out which cheap VPN was best.
+
+He chose one and for a moment it seemed to work, but after five minutes the connection went offline and the VPN would no longer connect.
+
+Jean kept reading to find other options and learned about Tor Browser and how it can circumvent censorship.
+
+He found an official website mirror to download the program.
+
+When he opened **Tor Browser**, he followed the prompts for censored users and connected to a bridge which allowed him to access the internet again.
+
+With Tor Browser, Jean can browse freely and privately and contact his family.
+
+### Censored users all over the world rely on Tor Browser for a free, stable, and uncensored way to access the internet.
+
+---
+
+# 5. Shared Sections
+
+## Cos'è Tor?
+
+Tor is free software and an open network that helps protect you from tracking, surveillance, and censorship online.
+Tor is created for free by a 501(c)3 U.S.-based nonprofit called the Tor Project.
+
+The easiest way to use Tor is Tor Browser.
+When you use Tor Browser, no one can see what websites you visit or where in the world you’re coming from.
+
+Other applications, like SecureDrop and OnionShare, use Tor to protect their users against surveillance and censorship.
+
+
+## 6. How does Tor work?
+
+Amal wants to visit Bekele’s website privately, so she opens Tor Browser.
+
+Tor Browser selects a random circuit of three relays, which are computers all over the world configured to route traffic over the Tor network.
+
+Tor Browser then encrypts her website request three times and sends it to the first Tor relay in her circuit.
+
+The first relay removes the first encryption layer but doesn't learn that the destination is Bekele’s website.
+
+The first relay learns only the next location in the circuit, which is the second relay.
+
+The second relay removes another encryption layer and forwards the web page request to the third relay.
+
+The third relay removes the last encryption layer and forwards the web page request to its destination, Bekele’s website, but it doesn't know the request comes from Amal.
+
+Bekele doesn't know that the website request came from Amal unless she tells him so.
+
+## 7. Who uses Tor?
+
+People all over the world use Tor to protect their privacy and access the web freely.
+
+Tor helps protect journalists, human rights defenders, domestic violence victims, academic researchers, and anyone experiencing tracking, censorship, or surveillance.
+
+## 6. Why trust Tor?
+
+Tor is designed for privacy. We don’t know who our users are, and we don't keep logs of user activity.
+
+Tor relay operators cannot reveal the true identity of Tor users.
+
+Continual peer review of Tor's source code by academic and open source communities ensures that there are no backdoors in Tor, and our social contract promises that we will never backdoor Tor.
+
+## 7. Join the Tor community
+
+Tor is made possible by a diverse set of users, developers, relay operators, and advocates from around the world.
+
+We need your help to make Tor more usable and secure for people everywhere.
+
+You can volunteer with Tor by writing code, running a relay, creating documentation, offering user support, or telling people in your community about Tor.
+
+The Tor community is governed by a code of conduct, and we outline our set of promises to the community in our social contract.
+
+Learn more about Tor by visiting our website, our wiki, finding us on IRC, joining one of our mailing lists, or signing up for Tor News at newsletter.torproject.org.
+
+
+## 8. Download Tor
+
+Tor for Desktop
+torproject.org/download
+
+TOR ON MOBILE
+### Android
+Tor Browser for Android is available from GooglePlay.
+
+### iOS
+Onion Browser, developed by M. Tigas, is the only browser we recommend for iOS.
+
diff --git a/ja.po b/ja.po
new file mode 100644
index 000000000..0cb403965
--- /dev/null
+++ b/ja.po
@@ -0,0 +1,162 @@
+# Tor Outreach Material 2019-2020
+
+# 1. TOR FOR PRIVACY
+
+### Privacy is a human right
+
+Like many of us, Aleisha spends most of her time online--connecting with friends, posting on social media, and browsing the web.
+
+But lately, she's noticed that advertisements related to her previous searches are following her around online.
+
+This feels so invasive that she does some research on online ads and learns that it's not just advertisers tracking her but also her ISP, analytics companies, social media platforms, and more.
+
+Aleisha decides she wants to find and use software that doesn't collect her data, doesn't track her, and doesn't tell other services anything private about her.
+
+She goes to a privacy training at a local hackerspace and learns about **Tor Browser**, the only web browser that allows her to browse anonymously.
+
+---
+
+# 2.TOR FOR FEMINISTS
+
+### The future is cyberfeminist
+
+Fernanda runs a women's collective focused on reproductive rights in Brazil, where abortion is illegal.
+
+Fernanda and her colleagues built a website with information about abortion access, birth control, and other resources for people seeking reproductive information.
+
+If this website was linked back to them, they could be arrested--or worse.
+
+To protect themselves, Fernanda and her colleagues created the website using Tor **onion services**. Onion services not only protect them from being discovered as the operators of the server but also help protect visitors to their website by requiring they use Tor Browser.
+
+In fact, Fernanda uses **Tor Browser** for all of her web browsing just to be on the safe side.
+
+She also uses a Tor-powered app called **OnionShare** to send files to other activists securely and privately.
+
+### Reproductive rights activists like Fernanda are fighting for fundamental freedoms, and Tor helps power their resistance.
+
+---
+
+# 3. TOR FOR HUMAN RIGHTS
+
+### Water is life
+
+Jelani lives in a small village which a wide river runs through.
+
+This river has provided water to his community since the days of his ancestors.
+
+But today, Jelani’s river is threatened by powerful multinational companies drilling for oil in the region.
+
+Private security firms, paid for by these companies, use powerful surveillance mechanisms to monitor the online activities of Jelani and his neighbors in the village who are organizing to protect their sacred river.
+
+Jelani uses **Tor Browser** to prevent these companies from watching as he visits websites for international human rights protection and legal aid and writes blog posts about the resistance movement in his village.
+
+He also uses **OnionShare** and **SecureDrop** to securely send documents to journalists who are helping expose these human rights violations.
+
+All of this software uses Tor to help protect Jelani’s privacy.
+
+### Human rights activists like Jelani are fighting for justice in their communities, and Tor helps power their resistance.
+
+---
+
+# 4. TOR FOR ANTI-CENSORSHIP
+
+### Build bridges not walls
+
+Jean was traveling for the first time to a country far from his family.
+
+After arriving at a hotel, he opened his laptop.
+
+He was so exhausted that when the message "Connection has timed out" first appeared on his web browser, he thought it was due to his own error.
+
+But after trying again and again, he realized that his email provider, a news website, and many apps were unavailable.
+
+He had heard that this country censors the internet and wondered if that was happening.
+How could he contact his family from behind this impenetrable wall?
+After doing some web searches, he found a forum and read about VPNs, private services that allow you to connect to another uncensored network.
+
+Jean spent half an hour trying to figure out which cheap VPN was best.
+
+He chose one and for a moment it seemed to work, but after five minutes the connection went offline and the VPN would no longer connect.
+
+Jean kept reading to find other options and learned about Tor Browser and how it can circumvent censorship.
+
+He found an official website mirror to download the program.
+
+When he opened **Tor Browser**, he followed the prompts for censored users and connected to a bridge which allowed him to access the internet again.
+
+With Tor Browser, Jean can browse freely and privately and contact his family.
+
+### Censored users all over the world rely on Tor Browser for a free, stable, and uncensored way to access the internet.
+
+---
+
+# 5. Shared Sections
+
+## Torって何ですか?
+
+Tor is free software and an open network that helps protect you from tracking, surveillance, and censorship online.
+Tor is created for free by a 501(c)3 U.S.-based nonprofit called the Tor Project.
+
+The easiest way to use Tor is Tor Browser.
+When you use Tor Browser, no one can see what websites you visit or where in the world you’re coming from.
+
+Other applications, like SecureDrop and OnionShare, use Tor to protect their users against surveillance and censorship.
+
+
+## 6. How does Tor work?
+
+Amal wants to visit Bekele’s website privately, so she opens Tor Browser.
+
+Tor Browser selects a random circuit of three relays, which are computers all over the world configured to route traffic over the Tor network.
+
+Tor Browser then encrypts her website request three times and sends it to the first Tor relay in her circuit.
+
+The first relay removes the first encryption layer but doesn't learn that the destination is Bekele’s website.
+
+The first relay learns only the next location in the circuit, which is the second relay.
+
+The second relay removes another encryption layer and forwards the web page request to the third relay.
+
+The third relay removes the last encryption layer and forwards the web page request to its destination, Bekele’s website, but it doesn't know the request comes from Amal.
+
+Bekele doesn't know that the website request came from Amal unless she tells him so.
+
+## 7. Who uses Tor?
+
+People all over the world use Tor to protect their privacy and access the web freely.
+
+Tor helps protect journalists, human rights defenders, domestic violence victims, academic researchers, and anyone experiencing tracking, censorship, or surveillance.
+
+## 6. Why trust Tor?
+
+Tor is designed for privacy. We don’t know who our users are, and we don't keep logs of user activity.
+
+Tor relay operators cannot reveal the true identity of Tor users.
+
+Continual peer review of Tor's source code by academic and open source communities ensures that there are no backdoors in Tor, and our social contract promises that we will never backdoor Tor.
+
+## 7. Join the Tor community
+
+Tor is made possible by a diverse set of users, developers, relay operators, and advocates from around the world.
+
+We need your help to make Tor more usable and secure for people everywhere.
+
+You can volunteer with Tor by writing code, running a relay, creating documentation, offering user support, or telling people in your community about Tor.
+
+The Tor community is governed by a code of conduct, and we outline our set of promises to the community in our social contract.
+
+Learn more about Tor by visiting our website, our wiki, finding us on IRC, joining one of our mailing lists, or signing up for Tor News at newsletter.torproject.org.
+
+
+## 8. Download Tor
+
+Tor for Desktop
+torproject.org/download
+
+TOR ON MOBILE
+### Android
+Tor Browser for Android is available from GooglePlay.
+
+### iOS
+Onion Browser, developed by M. Tigas, is the only browser we recommend for iOS.
+
diff --git a/jv.po b/jv.po
new file mode 100644
index 000000000..6c8fce0dc
--- /dev/null
+++ b/jv.po
@@ -0,0 +1,162 @@
+# Tor Outreach Material 2019-2020
+
+# 1. TOR FOR PRIVACY
+
+### Privacy is a human right
+
+Like many of us, Aleisha spends most of her time online--connecting with friends, posting on social media, and browsing the web.
+
+But lately, she's noticed that advertisements related to her previous searches are following her around online.
+
+This feels so invasive that she does some research on online ads and learns that it's not just advertisers tracking her but also her ISP, analytics companies, social media platforms, and more.
+
+Aleisha decides she wants to find and use software that doesn't collect her data, doesn't track her, and doesn't tell other services anything private about her.
+
+She goes to a privacy training at a local hackerspace and learns about **Tor Browser**, the only web browser that allows her to browse anonymously.
+
+---
+
+# 2.TOR FOR FEMINISTS
+
+### The future is cyberfeminist
+
+Fernanda runs a women's collective focused on reproductive rights in Brazil, where abortion is illegal.
+
+Fernanda and her colleagues built a website with information about abortion access, birth control, and other resources for people seeking reproductive information.
+
+If this website was linked back to them, they could be arrested--or worse.
+
+To protect themselves, Fernanda and her colleagues created the website using Tor **onion services**. Onion services not only protect them from being discovered as the operators of the server but also help protect visitors to their website by requiring they use Tor Browser.
+
+In fact, Fernanda uses **Tor Browser** for all of her web browsing just to be on the safe side.
+
+She also uses a Tor-powered app called **OnionShare** to send files to other activists securely and privately.
+
+### Reproductive rights activists like Fernanda are fighting for fundamental freedoms, and Tor helps power their resistance.
+
+---
+
+# 3. TOR FOR HUMAN RIGHTS
+
+### Water is life
+
+Jelani lives in a small village which a wide river runs through.
+
+This river has provided water to his community since the days of his ancestors.
+
+But today, Jelani’s river is threatened by powerful multinational companies drilling for oil in the region.
+
+Private security firms, paid for by these companies, use powerful surveillance mechanisms to monitor the online activities of Jelani and his neighbors in the village who are organizing to protect their sacred river.
+
+Jelani uses **Tor Browser** to prevent these companies from watching as he visits websites for international human rights protection and legal aid and writes blog posts about the resistance movement in his village.
+
+He also uses **OnionShare** and **SecureDrop** to securely send documents to journalists who are helping expose these human rights violations.
+
+All of this software uses Tor to help protect Jelani’s privacy.
+
+### Human rights activists like Jelani are fighting for justice in their communities, and Tor helps power their resistance.
+
+---
+
+# 4. TOR FOR ANTI-CENSORSHIP
+
+### Build bridges not walls
+
+Jean was traveling for the first time to a country far from his family.
+
+After arriving at a hotel, he opened his laptop.
+
+He was so exhausted that when the message "Connection has timed out" first appeared on his web browser, he thought it was due to his own error.
+
+But after trying again and again, he realized that his email provider, a news website, and many apps were unavailable.
+
+He had heard that this country censors the internet and wondered if that was happening.
+How could he contact his family from behind this impenetrable wall?
+After doing some web searches, he found a forum and read about VPNs, private services that allow you to connect to another uncensored network.
+
+Jean spent half an hour trying to figure out which cheap VPN was best.
+
+He chose one and for a moment it seemed to work, but after five minutes the connection went offline and the VPN would no longer connect.
+
+Jean kept reading to find other options and learned about Tor Browser and how it can circumvent censorship.
+
+He found an official website mirror to download the program.
+
+When he opened **Tor Browser**, he followed the prompts for censored users and connected to a bridge which allowed him to access the internet again.
+
+With Tor Browser, Jean can browse freely and privately and contact his family.
+
+### Censored users all over the world rely on Tor Browser for a free, stable, and uncensored way to access the internet.
+
+---
+
+# 5. Shared Sections
+
+## What is Tor?
+
+Tor is free software and an open network that helps protect you from tracking, surveillance, and censorship online.
+Tor is created for free by a 501(c)3 U.S.-based nonprofit called the Tor Project.
+
+The easiest way to use Tor is Tor Browser.
+When you use Tor Browser, no one can see what websites you visit or where in the world you’re coming from.
+
+Other applications, like SecureDrop and OnionShare, use Tor to protect their users against surveillance and censorship.
+
+
+## 6. How does Tor work?
+
+Amal wants to visit Bekele’s website privately, so she opens Tor Browser.
+
+Tor Browser selects a random circuit of three relays, which are computers all over the world configured to route traffic over the Tor network.
+
+Tor Browser then encrypts her website request three times and sends it to the first Tor relay in her circuit.
+
+The first relay removes the first encryption layer but doesn't learn that the destination is Bekele’s website.
+
+The first relay learns only the next location in the circuit, which is the second relay.
+
+The second relay removes another encryption layer and forwards the web page request to the third relay.
+
+The third relay removes the last encryption layer and forwards the web page request to its destination, Bekele’s website, but it doesn't know the request comes from Amal.
+
+Bekele doesn't know that the website request came from Amal unless she tells him so.
+
+## 7. Who uses Tor?
+
+People all over the world use Tor to protect their privacy and access the web freely.
+
+Tor helps protect journalists, human rights defenders, domestic violence victims, academic researchers, and anyone experiencing tracking, censorship, or surveillance.
+
+## 6. Why trust Tor?
+
+Tor is designed for privacy. We don’t know who our users are, and we don't keep logs of user activity.
+
+Tor relay operators cannot reveal the true identity of Tor users.
+
+Continual peer review of Tor's source code by academic and open source communities ensures that there are no backdoors in Tor, and our social contract promises that we will never backdoor Tor.
+
+## 7. Join the Tor community
+
+Tor is made possible by a diverse set of users, developers, relay operators, and advocates from around the world.
+
+We need your help to make Tor more usable and secure for people everywhere.
+
+You can volunteer with Tor by writing code, running a relay, creating documentation, offering user support, or telling people in your community about Tor.
+
+The Tor community is governed by a code of conduct, and we outline our set of promises to the community in our social contract.
+
+Learn more about Tor by visiting our website, our wiki, finding us on IRC, joining one of our mailing lists, or signing up for Tor News at newsletter.torproject.org.
+
+
+## 8. Download Tor
+
+Tor for Desktop
+torproject.org/download
+
+TOR ON MOBILE
+### Android
+Tor Browser for Android is available from GooglePlay.
+
+### iOS
+Onion Browser, developed by M. Tigas, is the only browser we recommend for iOS.
+
diff --git a/ka.po b/ka.po
new file mode 100644
index 000000000..38e4bcc21
--- /dev/null
+++ b/ka.po
@@ -0,0 +1,162 @@
+# Tor-ის მასალები ცნობიერების ასამაღლბლად 2019-2020
+
+# 1. TOR პირადულობისთვის
+
+### პირადულობა ადამიანის ძირითადი უფლებაა
+
+ყველა ჩვენგანის მსგავსად, ალიშაც დიდ დროს ატარებს ინტერნეტში – მეგობრებთან ურთიერთობისთვის, სოციალურ ქსელში წერისთვის და გვერდების მოსანახულებლად.
+
+თუმცა ბოლო დროს შენიშნა, რომ რეკლამები, ინტერნეტში მის მიერ მოძიებულ ადრინდელ მონაცემებს უკავშირდება.
+
+ეს შეგრძნება იმდენად გამაღიზიანებელი აღმოჩნდა, რომ გადაწყვიტა მოეკვლია ინტერნეტში რეკლამების შესახებ ინფორმაცია და აღმოაჩინა, რომ არამხოლოდ სარეკლამო კომპანიები ადევნებენ თვალს, არამედ ინტერნეტის მომწოდებელიც, მკვლევარი ორგანიზაციები, სოციალური ქსელები და უამრავი სხვა.
+
+ალიშამ გადაწყვიტა მოენახა პროგრამა, რომელიც არ შეაგროვებდა მასზე ინფორმაციას, არ მიადევნებდა თვალს მის მოქმედებებს და პირად მონაცემებს მის შესახებ, არ გაუზიარებდა სხვა მომსახურებებს.
+
+მან უკეთ შეისწავლა საკითხი უსაფრთხოების ადგილობრივი სპეციალისტებისგან და შეიტყო **Tor-ბრაუზერის** შესახებ, ერთადერთი ბრაუზერის, რომლის მეშვეობითაც, შეიძლება ინტერნეტის გამოყენება ვინაობის გაუმხელად.
+
+---
+
+# 2.TOR ქალთა უფლებების დამცველთათვის
+
+### მომავალი არის ქალთა უფლებების დაცვა ინტერნეტით
+
+ფერნანდა ჩართულია ქალთა ერთობაში, რომლებიც იბრძვიან რეპროდუქციული უფლებებისთვის ბრაზილიაში, სადაც აბორტი კანონით აკრძალულია.
+
+ფერნანდა და მისი თანამებრძოლები ქმნიან ვებგვერდს, სადაც იქნება მონაცემები აბორტის ხელმისაწვდომობის შესახებ, შობადობის კონტროლზე და სხვა სასარგებლო მასალები, რომლებიც გამოადგებათ რეპროდუქციაზე ინფორმაციის მაძიებლებს.
+
+მაგრამ, თუ საიტი მათთან იქნება დაკავშირებულია, შეიძლება დააპატიმრონ – ან რამე უარესი დამართონ.
+
+უსაფრთხოების მიზნით, ფერნანდამ და მისმა თანამებრძოლებმა, საიტი შექმნეს Tor-ის **onion-მომსახურების** საშუალებით. Onion-მომსახურებები, არა მხოლოდ იცავს მათ აღმოჩენისგან, არამედ უზრუნველყოფს საიტის მნახველების უსაფრთხოებასაც, Tor-ბრაუზერის გამოყენების მოთხოვნით.
+
+საერთო ჯამში, ფერნანდა იყენებს **Tor-ბრაუზერს** ყველა მისი მოქმედებისთვის ინტერნეტში, უსაფრთხოების უზრუნველსაყოფად.
+
+იგი, ასევე იყენებს Tor-ზე მომუშავე პროგრამასაც სახელწოდებით **OnionShare** ფაილების დაცულად და უსაფრთხოდ გაზიარებისთვის, თანამებრძოლებს შორის.
+
+### რეპროდუქციის უფლებათა დამცველები, როგორიცაა ფერნანდა, იბრძვიან ძირითადი თავისუფლებისთვის, Tor კი ეხმარება წინააღმდეგობების დაძლევაში.
+
+---
+
+# 3. TOR ადამიანის უფლებებისთვის
+
+### წყალი სიცოცხლეა
+
+ჯელანი პატარა სოფელში ცხოვრობს, რომელსაც ფართო მდინარე კვეთს.
+
+მდინარე სასმელი წყლით ამარაგებს მის დასახლებას, წინაპრების დროიდან.
+
+მაგრამ დღეს, ჯელანის მდინარეს საფრთხე ემუქრება, რადგან მძლავრი საერთაშორისო კომპანიები რეგიონში ნავთობის ჭაბურღილებს აშენებენ.
+
+ამ კომპანიების მიერ ფინანსდება კერძო დაცვის ფირმები, რომ მკაცრად ადევნონ თვალი ჯელანისა და მისი მეზობლების მოქმედებებს ინტერნეტში, რომლებიც გეგმავენ დაიცვან მათი მდინარის ხელშეუხებლობა.
+
+ჯელანი იყენებს **Tor-ბრაუზერს** ამ კომპანიების თვალთვალის აღსაკვეთად, ადამიანის უფლებათა დამცველი საერთაშორისო ორგანიზაციებისა და სამართლებრივ საკითხთა დახმარების ვებგვერდების მონახულებისას, აგრეთვე, მისი სოფლის წინააღმდეგობის მოძრაობის შესახებ სტატიების გამოქვეყნებისას.
+
+იგი ასევე სარგებლობს მომსახურებებით **OnionShare** და **SecureDrop**, მასალების უსაფრთხოდ მისაწოდებლად ჟურნალისტებისა და იმ ხალხისთვის, რომლებიც ეხმარებიან უფლებების დარღვევათა გამოაშკარავებაში.
+
+ყველა ეს პროგრამა იყენებს Tor-ს ჯელანის პირადი მონაცემების დასაცავად.
+
+### ადამიანთა უფლებების დაცვისთვის მებრძოლები, როგორიცაა ჯელანი, იღწვიან თავიანთ საზოგადოებაში სამართლიანობისთვის, Tor კი უზრუნველყოფს მათ წინააღმდეგობების დაძლევაში.
+
+---
+
+# 4. TOR ცენზურის წინააღმდეგ
+
+### ხიდების შენება ნაცვლად კედლებისა
+
+ჯინი პირველად გაემგზავრა უცხოეთში ოჯახისგან შორს.
+
+სასტუმროში დაბინავების შემდეგ, გახსნა თავისი ლეპტოპი.
+
+იგი მეტად დაღლილი იყო და როცა პირველად ნახა შეტყობინება ბრაუზერში „კავშირის დრო ამოიწურა“, იფიქრა რომ საკუთარი შეცდომის გამო იყო.
+
+თუმცა, მომდევნო მცდელობების შემდეგ აღმოაჩინა, რომ მისი ელფოსტის მომსახურე და ახალი ამბების საიტები, ამასთან მრავალი სხვა პროგრამა მიუწვდომელი იყო.
+
+მას გაგონილი ჰქონდა, რომ ეს ქვეყანა ზღუდავს ინტერნეტს და სურდა გამოსავალი ეპოვა.
+როგორ უნდა დაკავშირებოდა თავისი ოჯახის წევრებს, გაურღვეველი კედლის მიღმა?
+ინტერნეტში მცირე მოკვლევის შემდეგ, მონახა ერთ-ერთი ფორუმი, სადაც წაიკითხა VPN-ების შესახებ, კერძო მომსახურებების, რომლებიც საშუალებას იძლევა სხვა, ცენზურისგან თავისუფალ ქსელთან კავშირის.
+
+ჯინმა ერთი საათი ცდილობდა გამოერკვია, რომელი იაფი VPN იყო საუკეთესო.
+
+როგორც იქნა, შეარჩია ერთ-ერთი რომელმაც იმუშავა, მაგრამ ხუთი წუთის შემდეგ კავშირი გაწყდა და VPN გახდა მიუწვდომელი.
+
+ჯინმა განაგრძო კითხვა სხვა საშუალებების მოსანახად და გაიგო Tor-ბრაუზერის შესახებ, თუ როგორ შეუძლია მას, ცენზურისთვის გვერდის ავლა.
+
+მან მოიძია ბმულის ოფიციალური ასლები პროგრამის ჩამოსატვირთად.
+
+როცა გაუშვა **Tor-ბრაუზერი**, გაჰყვა ცენზურის ქვეშ მყოფი მომხმარებლებისთვის განკუთვნილ მეგზურს და დაუკავშირდა გადამცემ ხიდს, რომლის მეშვეობითაც გავიდა ინტერნეტში.
+
+Tor-ბრაუზერით, ჯინს შეუძლია უფასოდ, თავისუფლად და პირადი მონაცემების გაუმჟღავნებლად დაუკავშირდეს ოჯახის წევრებს.
+
+### მომხმარებლები რომლებიც ცენზურის ქვეშ არიან მთელ მსოფლიოში, ენდობიან Tor-ბრაუზერს, ვინაიდან არის უფასო, მდგრადი, გახსნილი საშუალება, ინტერნეტთან თავისუფალი წვდომის.
+
+---
+
+# 5. ზოგადი საკითხები
+
+## რა არის Tor?
+
+Tor უფასო პროგრამა და ღია ქსელია, რომელიც გეხმარებათ თვალყურის დევნისგან, ზედამხედველებისგან და ცენზურისგან თავის დაცვაში.
+Tor შექმნილია ა.შ.შ.-ს 501(c)3 კანონის შესაბამისად, დაფუძნებული როგორც არამომგებიანი ორგანიზაცია სახელწოდებით Tor Project.
+
+უმარტივესი გზა Tor-ის გამოსაყენებლად არის Tor-ბრაუზერი.
+როცა სარგებლობთ Tor-ბრაუზერით, ვერავინ შეძლებს გაიგოს, თუ რომელ საიტს ეწვევით ან მსოფლიოს რომელ მხარეში იმყოფებით.
+
+სხვა პროგრამები, როგორიცაა SecureDrop და OnionShare იყენებს Tor-ს თავიანთი მომხმარებლების ზემდგომებისა და ცენზურისგან დასაცავად.
+
+
+## 6. როგორ მუშაობს Tor?
+
+ამალს სურს ეწვიოს ბეკელეს ვებსაიტს ვინაობის გაუმხელად, ასე რომ ხსნის Tor-ბრაუზერს.
+
+Tor-ბრაუზერი ქმნის წრედს სამი შემთხვევითი გადამცემით, რომლებიც წარმოადგენს კომპიუტერებს მსოფლიოს სხვადასხვა წერტილიდან, გამართულს Tor-ქსელით მონაცემების გადასაცემად.
+
+Tor-ბრაუზერი შესაბამისად დაშიფრავს მის მოთხოვნას სამჯერ და გაუგზავნის პირველ Tor-გადამცემს მის წრედში.
+
+პირველი გადამცემი მოაცილებს დაშიფვრის პირველ შრეს, მაგრამ ვერ გაიგებს, რომ დანიშნულების წერტილი არის ბეკელეს ვებსაიტი.
+
+პირველ გადამცემს ეცოდინება მხოლოდ მომდევნო წერტილი წრედში, რომელსაც წარმოადგენს მეორე გადამცემი.
+
+მეორე გადამცემი მოაცილებს დაშიფვრის შემდეგ შრეს და გადაუგზავნის ვებგვერდის მოთხოვნას მესამე გადამცემს.
+
+მესამე გადამცემი კი მოაცილებს დაშიფვრის ბოლო შრეს და ვებგვერდის მოთხოვნას გადააგზავნის დანიშნულების ადგილას, ანუ ბეკელეს ვებსაიტზე, თუმცა მას არ ეცოდინება, რომ მოთხოვნა მოდიოდა ამალის კომპიუტერიდან.
+
+შესაბამისად, ბეკელეს არ ეცოდინება რომ ვებსაიტის მოთხოვნა ამალისგან მოდიოდა, სანამ თავად ამალი არ აცნობებს ამას.
+
+## 7. ვინ იყენებს Tor-ს?
+
+ხალხი მთელი მსოფლიოდან იყენებს Tor-ს საკუთარი პირადი მონაცემების უსაფრთხოებისთვის და ინტერნეტთან თავისუფალი წვდომისთვის.
+
+Tor ეხმარება ჟურნალისტებს, ადამიანის უფლებათა დამცველებს, ოჯახური ძალადობის მსხვერპლებს, მკვლევარებს და ნებისმიერ ადამიანს, რომელსაც სურს თავი აარიდოს თვალის დევნებას, ზედამხედველებს და ცენზურას.
+
+## 6. რატომ უნდა ვენდო Tor-ს?
+
+Tor განკუთვნილია პირადი მონაცემების დასაცავად. ჩვენ არ ვიცით ვინ არიან ჩვენი მომხმარებლები და არ აღვრიცხავთ მათი მოქმედებების შესახებ არანაირ ინფორმაციას.
+
+Tor-გადამცემის მფლობელებს არ შეუძლიათ Tor-ის მომხმარებლების ნამდვილი ვინაობის დადგენა.
+
+მუდმივი დაკვირვება Tor-ის პირველწყარო კოდზე აკადემიური საზოგადოებებისა და ღია წყაროს ერთობების მიერ, ადასტურებს რომ არანაირი ფარული ხვრელები Tor-ში არ არსებობს და ჩვენი სოციალური პასუხისმგებლობით განსაზღვრულია პირობა, რომ Tor-ში არასდროს იარსებებს მსგავსი რამ.
+
+## 7. შემოუერთდით Tor-ის ერთობას
+
+Tor შექმნილია მრავალი, ერთმანეთისგან განსხვავებული მომხმარებლის, შემმუშავებლისა, გადამცემების მმართველებისა და მხარდამჭერების მიერ, მთელი მსოფლიოდან.
+
+ჩვენ გვესაჭიროება თქვენი დახმარება, რომ Tor გავხადოთ უფრო მეტად სასარგებლო და დაცული, ყველასთვის და ყველგან.
+
+შეგიძლიათ მონაწილეობა მიიღოთ Tor-პროექტში კოდის წერით, გადამცემის გაშვებით, მასალების შედგენით, მომხმარებლებისთვის მხარდაჭერის აღმოჩენით და მეტი ადამიანისთვის თქვენს ირგვლივ, Tor-ის შესახებ ინფორმაციის მიწოდებით.
+
+Tor-ის ერთობა იმართება წესდებით და ჩვენი, პირობების კრებული საზოგადოების მიმართ გაწერილი გვაქვს ჩვენს შეთანხმებაში.
+
+იხილეთ ვრცლად Tor-ის შესახებ, ჩვენს ვებსაიტზე, ვიკიში, მოგვძებნეთ IRC-სასაუბროში, შემოგვიერთდით ელფოსტის ჯგუფში ან გამოიწერეთ Tor-ის სიახლეები მისამართზე newsletter.torproject.org.
+
+
+## 8. ჩამოტვირთეთ Tor
+
+Tor კომპიუტერისთვის
+torproject.org/download
+
+TOR მობილურზე
+### Android
+Tor-ბრაუზერი Android-ისთვის ხელმისაწვდომია GooglePlay-დან.
+
+### iOS
+Onion Browser, შექმნილი M. Tigas-ის მიერ, ერთადერთი ბრაუზერია რომელსაც გირჩევთ iOS-ისთვის.
+
diff --git a/kk.po b/kk.po
new file mode 100644
index 000000000..6c8fce0dc
--- /dev/null
+++ b/kk.po
@@ -0,0 +1,162 @@
+# Tor Outreach Material 2019-2020
+
+# 1. TOR FOR PRIVACY
+
+### Privacy is a human right
+
+Like many of us, Aleisha spends most of her time online--connecting with friends, posting on social media, and browsing the web.
+
+But lately, she's noticed that advertisements related to her previous searches are following her around online.
+
+This feels so invasive that she does some research on online ads and learns that it's not just advertisers tracking her but also her ISP, analytics companies, social media platforms, and more.
+
+Aleisha decides she wants to find and use software that doesn't collect her data, doesn't track her, and doesn't tell other services anything private about her.
+
+She goes to a privacy training at a local hackerspace and learns about **Tor Browser**, the only web browser that allows her to browse anonymously.
+
+---
+
+# 2.TOR FOR FEMINISTS
+
+### The future is cyberfeminist
+
+Fernanda runs a women's collective focused on reproductive rights in Brazil, where abortion is illegal.
+
+Fernanda and her colleagues built a website with information about abortion access, birth control, and other resources for people seeking reproductive information.
+
+If this website was linked back to them, they could be arrested--or worse.
+
+To protect themselves, Fernanda and her colleagues created the website using Tor **onion services**. Onion services not only protect them from being discovered as the operators of the server but also help protect visitors to their website by requiring they use Tor Browser.
+
+In fact, Fernanda uses **Tor Browser** for all of her web browsing just to be on the safe side.
+
+She also uses a Tor-powered app called **OnionShare** to send files to other activists securely and privately.
+
+### Reproductive rights activists like Fernanda are fighting for fundamental freedoms, and Tor helps power their resistance.
+
+---
+
+# 3. TOR FOR HUMAN RIGHTS
+
+### Water is life
+
+Jelani lives in a small village which a wide river runs through.
+
+This river has provided water to his community since the days of his ancestors.
+
+But today, Jelani’s river is threatened by powerful multinational companies drilling for oil in the region.
+
+Private security firms, paid for by these companies, use powerful surveillance mechanisms to monitor the online activities of Jelani and his neighbors in the village who are organizing to protect their sacred river.
+
+Jelani uses **Tor Browser** to prevent these companies from watching as he visits websites for international human rights protection and legal aid and writes blog posts about the resistance movement in his village.
+
+He also uses **OnionShare** and **SecureDrop** to securely send documents to journalists who are helping expose these human rights violations.
+
+All of this software uses Tor to help protect Jelani’s privacy.
+
+### Human rights activists like Jelani are fighting for justice in their communities, and Tor helps power their resistance.
+
+---
+
+# 4. TOR FOR ANTI-CENSORSHIP
+
+### Build bridges not walls
+
+Jean was traveling for the first time to a country far from his family.
+
+After arriving at a hotel, he opened his laptop.
+
+He was so exhausted that when the message "Connection has timed out" first appeared on his web browser, he thought it was due to his own error.
+
+But after trying again and again, he realized that his email provider, a news website, and many apps were unavailable.
+
+He had heard that this country censors the internet and wondered if that was happening.
+How could he contact his family from behind this impenetrable wall?
+After doing some web searches, he found a forum and read about VPNs, private services that allow you to connect to another uncensored network.
+
+Jean spent half an hour trying to figure out which cheap VPN was best.
+
+He chose one and for a moment it seemed to work, but after five minutes the connection went offline and the VPN would no longer connect.
+
+Jean kept reading to find other options and learned about Tor Browser and how it can circumvent censorship.
+
+He found an official website mirror to download the program.
+
+When he opened **Tor Browser**, he followed the prompts for censored users and connected to a bridge which allowed him to access the internet again.
+
+With Tor Browser, Jean can browse freely and privately and contact his family.
+
+### Censored users all over the world rely on Tor Browser for a free, stable, and uncensored way to access the internet.
+
+---
+
+# 5. Shared Sections
+
+## What is Tor?
+
+Tor is free software and an open network that helps protect you from tracking, surveillance, and censorship online.
+Tor is created for free by a 501(c)3 U.S.-based nonprofit called the Tor Project.
+
+The easiest way to use Tor is Tor Browser.
+When you use Tor Browser, no one can see what websites you visit or where in the world you’re coming from.
+
+Other applications, like SecureDrop and OnionShare, use Tor to protect their users against surveillance and censorship.
+
+
+## 6. How does Tor work?
+
+Amal wants to visit Bekele’s website privately, so she opens Tor Browser.
+
+Tor Browser selects a random circuit of three relays, which are computers all over the world configured to route traffic over the Tor network.
+
+Tor Browser then encrypts her website request three times and sends it to the first Tor relay in her circuit.
+
+The first relay removes the first encryption layer but doesn't learn that the destination is Bekele’s website.
+
+The first relay learns only the next location in the circuit, which is the second relay.
+
+The second relay removes another encryption layer and forwards the web page request to the third relay.
+
+The third relay removes the last encryption layer and forwards the web page request to its destination, Bekele’s website, but it doesn't know the request comes from Amal.
+
+Bekele doesn't know that the website request came from Amal unless she tells him so.
+
+## 7. Who uses Tor?
+
+People all over the world use Tor to protect their privacy and access the web freely.
+
+Tor helps protect journalists, human rights defenders, domestic violence victims, academic researchers, and anyone experiencing tracking, censorship, or surveillance.
+
+## 6. Why trust Tor?
+
+Tor is designed for privacy. We don’t know who our users are, and we don't keep logs of user activity.
+
+Tor relay operators cannot reveal the true identity of Tor users.
+
+Continual peer review of Tor's source code by academic and open source communities ensures that there are no backdoors in Tor, and our social contract promises that we will never backdoor Tor.
+
+## 7. Join the Tor community
+
+Tor is made possible by a diverse set of users, developers, relay operators, and advocates from around the world.
+
+We need your help to make Tor more usable and secure for people everywhere.
+
+You can volunteer with Tor by writing code, running a relay, creating documentation, offering user support, or telling people in your community about Tor.
+
+The Tor community is governed by a code of conduct, and we outline our set of promises to the community in our social contract.
+
+Learn more about Tor by visiting our website, our wiki, finding us on IRC, joining one of our mailing lists, or signing up for Tor News at newsletter.torproject.org.
+
+
+## 8. Download Tor
+
+Tor for Desktop
+torproject.org/download
+
+TOR ON MOBILE
+### Android
+Tor Browser for Android is available from GooglePlay.
+
+### iOS
+Onion Browser, developed by M. Tigas, is the only browser we recommend for iOS.
+
diff --git a/km.po b/km.po
new file mode 100644
index 000000000..433f21e60
--- /dev/null
+++ b/km.po
@@ -0,0 +1,162 @@
+# Tor Outreach Material 2019-2020
+
+# 1. TOR FOR PRIVACY
+
+### Privacy is a human right
+
+Like many of us, Aleisha spends most of her time online--connecting with friends, posting on social media, and browsing the web.
+
+But lately, she's noticed that advertisements related to her previous searches are following her around online.
+
+This feels so invasive that she does some research on online ads and learns that it's not just advertisers tracking her but also her ISP, analytics companies, social media platforms, and more.
+
+Aleisha decides she wants to find and use software that doesn't collect her data, doesn't track her, and doesn't tell other services anything private about her.
+
+She goes to a privacy training at a local hackerspace and learns about **Tor Browser**, the only web browser that allows her to browse anonymously.
+
+---
+
+# 2.TOR FOR FEMINISTS
+
+### The future is cyberfeminist
+
+Fernanda runs a women's collective focused on reproductive rights in Brazil, where abortion is illegal.
+
+Fernanda and her colleagues built a website with information about abortion access, birth control, and other resources for people seeking reproductive information.
+
+If this website was linked back to them, they could be arrested--or worse.
+
+To protect themselves, Fernanda and her colleagues created the website using Tor **onion services**. Onion services not only protect them from being discovered as the operators of the server but also help protect visitors to their website by requiring they use Tor Browser.
+
+In fact, Fernanda uses **Tor Browser** for all of her web browsing just to be on the safe side.
+
+She also uses a Tor-powered app called **OnionShare** to send files to other activists securely and privately.
+
+### Reproductive rights activists like Fernanda are fighting for fundamental freedoms, and Tor helps power their resistance.
+
+---
+
+# 3. TOR FOR HUMAN RIGHTS
+
+### Water is life
+
+Jelani lives in a small village which a wide river runs through.
+
+This river has provided water to his community since the days of his ancestors.
+
+But today, Jelani’s river is threatened by powerful multinational companies drilling for oil in the region.
+
+Private security firms, paid for by these companies, use powerful surveillance mechanisms to monitor the online activities of Jelani and his neighbors in the village who are organizing to protect their sacred river.
+
+Jelani uses **Tor Browser** to prevent these companies from watching as he visits websites for international human rights protection and legal aid and writes blog posts about the resistance movement in his village.
+
+He also uses **OnionShare** and **SecureDrop** to securely send documents to journalists who are helping expose these human rights violations.
+
+All of this software uses Tor to help protect Jelani’s privacy.
+
+### Human rights activists like Jelani are fighting for justice in their communities, and Tor helps power their resistance.
+
+---
+
+# 4. TOR FOR ANTI-CENSORSHIP
+
+### Build bridges not walls
+
+Jean was traveling for the first time to a country far from his family.
+
+After arriving at a hotel, he opened his laptop.
+
+He was so exhausted that when the message "Connection has timed out" first appeared on his web browser, he thought it was due to his own error.
+
+But after trying again and again, he realized that his email provider, a news website, and many apps were unavailable.
+
+He had heard that this country censors the internet and wondered if that was happening.
+How could he contact his family from behind this impenetrable wall?
+After doing some web searches, he found a forum and read about VPNs, private services that allow you to connect to another uncensored network.
+
+Jean spent half an hour trying to figure out which cheap VPN was best.
+
+He chose one and for a moment it seemed to work, but after five minutes the connection went offline and the VPN would no longer connect.
+
+Jean kept reading to find other options and learned about Tor Browser and how it can circumvent censorship.
+
+He found an official website mirror to download the program.
+
+When he opened **Tor Browser**, he followed the prompts for censored users and connected to a bridge which allowed him to access the internet again.
+
+With Tor Browser, Jean can browse freely and privately and contact his family.
+
+### Censored users all over the world rely on Tor Browser for a free, stable, and uncensored way to access the internet.
+
+---
+
+# 5. Shared Sections
+
+## តើ Tor ជាអ្វី?
+
+Tor is free software and an open network that helps protect you from tracking, surveillance, and censorship online.
+Tor is created for free by a 501(c)3 U.S.-based nonprofit called the Tor Project.
+
+The easiest way to use Tor is Tor Browser.
+When you use Tor Browser, no one can see what websites you visit or where in the world you’re coming from.
+
+Other applications, like SecureDrop and OnionShare, use Tor to protect their users against surveillance and censorship.
+
+
+## 6. How does Tor work?
+
+Amal wants to visit Bekele’s website privately, so she opens Tor Browser.
+
+Tor Browser selects a random circuit of three relays, which are computers all over the world configured to route traffic over the Tor network.
+
+Tor Browser then encrypts her website request three times and sends it to the first Tor relay in her circuit.
+
+The first relay removes the first encryption layer but doesn't learn that the destination is Bekele’s website.
+
+The first relay learns only the next location in the circuit, which is the second relay.
+
+The second relay removes another encryption layer and forwards the web page request to the third relay.
+
+The third relay removes the last encryption layer and forwards the web page request to its destination, Bekele’s website, but it doesn't know the request comes from Amal.
+
+Bekele doesn't know that the website request came from Amal unless she tells him so.
+
+## 7. Who uses Tor?
+
+People all over the world use Tor to protect their privacy and access the web freely.
+
+Tor helps protect journalists, human rights defenders, domestic violence victims, academic researchers, and anyone experiencing tracking, censorship, or surveillance.
+
+## 6. Why trust Tor?
+
+Tor is designed for privacy. We don’t know who our users are, and we don't keep logs of user activity.
+
+Tor relay operators cannot reveal the true identity of Tor users.
+
+Continual peer review of Tor's source code by academic and open source communities ensures that there are no backdoors in Tor, and our social contract promises that we will never backdoor Tor.
+
+## 7. Join the Tor community
+
+Tor is made possible by a diverse set of users, developers, relay operators, and advocates from around the world.
+
+We need your help to make Tor more usable and secure for people everywhere.
+
+You can volunteer with Tor by writing code, running a relay, creating documentation, offering user support, or telling people in your community about Tor.
+
+The Tor community is governed by a code of conduct, and we outline our set of promises to the community in our social contract.
+
+Learn more about Tor by visiting our website, our wiki, finding us on IRC, joining one of our mailing lists, or signing up for Tor News at newsletter.torproject.org.
+
+
+## 8. Download Tor
+
+Tor for Desktop
+torproject.org/download
+
+TOR ON MOBILE
+### Android
+Tor Browser for Android is available from GooglePlay.
+
+### iOS
+Onion Browser, developed by M. Tigas, is the only browser we recommend for iOS.
+
diff --git a/kn.po b/kn.po
new file mode 100644
index 000000000..6c8fce0dc
--- /dev/null
+++ b/kn.po
@@ -0,0 +1,162 @@
+# Tor Outreach Material 2019-2020
+
+# 1. TOR FOR PRIVACY
+
+### Privacy is a human right
+
+Like many of us, Aleisha spends most of her time online--connecting with friends, posting on social media, and browsing the web.
+
+But lately, she's noticed that advertisements related to her previous searches are following her around online.
+
+This feels so invasive that she does some research on online ads and learns that it's not just advertisers tracking her but also her ISP, analytics companies, social media platforms, and more.
+
+Aleisha decides she wants to find and use software that doesn't collect her data, doesn't track her, and doesn't tell other services anything private about her.
+
+She goes to a privacy training at a local hackerspace and learns about **Tor Browser**, the only web browser that allows her to browse anonymously.
+
+---
+
+# 2.TOR FOR FEMINISTS
+
+### The future is cyberfeminist
+
+Fernanda runs a women's collective focused on reproductive rights in Brazil, where abortion is illegal.
+
+Fernanda and her colleagues built a website with information about abortion access, birth control, and other resources for people seeking reproductive information.
+
+If this website was linked back to them, they could be arrested--or worse.
+
+To protect themselves, Fernanda and her colleagues created the website using Tor **onion services**. Onion services not only protect them from being discovered as the operators of the server but also help protect visitors to their website by requiring they use Tor Browser.
+
+In fact, Fernanda uses **Tor Browser** for all of her web browsing just to be on the safe side.
+
+She also uses a Tor-powered app called **OnionShare** to send files to other activists securely and privately.
+
+### Reproductive rights activists like Fernanda are fighting for fundamental freedoms, and Tor helps power their resistance.
+
+---
+
+# 3. TOR FOR HUMAN RIGHTS
+
+### Water is life
+
+Jelani lives in a small village which a wide river runs through.
+
+This river has provided water to his community since the days of his ancestors.
+
+But today, Jelani’s river is threatened by powerful multinational companies drilling for oil in the region.
+
+Private security firms, paid for by these companies, use powerful surveillance mechanisms to monitor the online activities of Jelani and his neighbors in the village who are organizing to protect their sacred river.
+
+Jelani uses **Tor Browser** to prevent these companies from watching as he visits websites for international human rights protection and legal aid and writes blog posts about the resistance movement in his village.
+
+He also uses **OnionShare** and **SecureDrop** to securely send documents to journalists who are helping expose these human rights violations.
+
+All of this software uses Tor to help protect Jelani’s privacy.
+
+### Human rights activists like Jelani are fighting for justice in their communities, and Tor helps power their resistance.
+
+---
+
+# 4. TOR FOR ANTI-CENSORSHIP
+
+### Build bridges not walls
+
+Jean was traveling for the first time to a country far from his family.
+
+After arriving at a hotel, he opened his laptop.
+
+He was so exhausted that when the message "Connection has timed out" first appeared on his web browser, he thought it was due to his own error.
+
+But after trying again and again, he realized that his email provider, a news website, and many apps were unavailable.
+
+He had heard that this country censors the internet and wondered if that was happening.
+How could he contact his family from behind this impenetrable wall?
+After doing some web searches, he found a forum and read about VPNs, private services that allow you to connect to another uncensored network.
+
+Jean spent half an hour trying to figure out which cheap VPN was best.
+
+He chose one and for a moment it seemed to work, but after five minutes the connection went offline and the VPN would no longer connect.
+
+Jean kept reading to find other options and learned about Tor Browser and how it can circumvent censorship.
+
+He found an official website mirror to download the program.
+
+When he opened **Tor Browser**, he followed the prompts for censored users and connected to a bridge which allowed him to access the internet again.
+
+With Tor Browser, Jean can browse freely and privately and contact his family.
+
+### Censored users all over the world rely on Tor Browser for a free, stable, and uncensored way to access the internet.
+
+---
+
+# 5. Shared Sections
+
+## What is Tor?
+
+Tor is free software and an open network that helps protect you from tracking, surveillance, and censorship online.
+Tor is created for free by a 501(c)3 U.S.-based nonprofit called the Tor Project.
+
+The easiest way to use Tor is Tor Browser.
+When you use Tor Browser, no one can see what websites you visit or where in the world you’re coming from.
+
+Other applications, like SecureDrop and OnionShare, use Tor to protect their users against surveillance and censorship.
+
+
+## 6. How does Tor work?
+
+Amal wants to visit Bekele’s website privately, so she opens Tor Browser.
+
+Tor Browser selects a random circuit of three relays, which are computers all over the world configured to route traffic over the Tor network.
+
+Tor Browser then encrypts her website request three times and sends it to the first Tor relay in her circuit.
+
+The first relay removes the first encryption layer but doesn't learn that the destination is Bekele’s website.
+
+The first relay learns only the next location in the circuit, which is the second relay.
+
+The second relay removes another encryption layer and forwards the web page request to the third relay.
+
+The third relay removes the last encryption layer and forwards the web page request to its destination, Bekele’s website, but it doesn't know the request comes from Amal.
+
+Bekele doesn't know that the website request came from Amal unless she tells him so.
+
+## 7. Who uses Tor?
+
+People all over the world use Tor to protect their privacy and access the web freely.
+
+Tor helps protect journalists, human rights defenders, domestic violence victims, academic researchers, and anyone experiencing tracking, censorship, or surveillance.
+
+## 6. Why trust Tor?
+
+Tor is designed for privacy. We don’t know who our users are, and we don't keep logs of user activity.
+
+Tor relay operators cannot reveal the true identity of Tor users.
+
+Continual peer review of Tor's source code by academic and open source communities ensures that there are no backdoors in Tor, and our social contract promises that we will never backdoor Tor.
+
+## 7. Join the Tor community
+
+Tor is made possible by a diverse set of users, developers, relay operators, and advocates from around the world.
+
+We need your help to make Tor more usable and secure for people everywhere.
+
+You can volunteer with Tor by writing code, running a relay, creating documentation, offering user support, or telling people in your community about Tor.
+
+The Tor community is governed by a code of conduct, and we outline our set of promises to the community in our social contract.
+
+Learn more about Tor by visiting our website, our wiki, finding us on IRC, joining one of our mailing lists, or signing up for Tor News at newsletter.torproject.org.
+
+
+## 8. Download Tor
+
+Tor for Desktop
+torproject.org/download
+
+TOR ON MOBILE
+### Android
+Tor Browser for Android is available from GooglePlay.
+
+### iOS
+Onion Browser, developed by M. Tigas, is the only browser we recommend for iOS.
+
diff --git a/ko.po b/ko.po
new file mode 100644
index 000000000..f28cf4b1e
--- /dev/null
+++ b/ko.po
@@ -0,0 +1,162 @@
+# Tor Outreach Material 2019-2020
+
+# 1. TOR FOR PRIVACY
+
+### Privacy is a human right
+
+Like many of us, Aleisha spends most of her time online--connecting with friends, posting on social media, and browsing the web.
+
+But lately, she's noticed that advertisements related to her previous searches are following her around online.
+
+This feels so invasive that she does some research on online ads and learns that it's not just advertisers tracking her but also her ISP, analytics companies, social media platforms, and more.
+
+Aleisha decides she wants to find and use software that doesn't collect her data, doesn't track her, and doesn't tell other services anything private about her.
+
+She goes to a privacy training at a local hackerspace and learns about **Tor Browser**, the only web browser that allows her to browse anonymously.
+
+---
+
+# 2.TOR FOR FEMINISTS
+
+### The future is cyberfeminist
+
+Fernanda runs a women's collective focused on reproductive rights in Brazil, where abortion is illegal.
+
+Fernanda and her colleagues built a website with information about abortion access, birth control, and other resources for people seeking reproductive information.
+
+If this website was linked back to them, they could be arrested--or worse.
+
+To protect themselves, Fernanda and her colleagues created the website using Tor **onion services**. Onion services not only protect them from being discovered as the operators of the server but also help protect visitors to their website by requiring they use Tor Browser.
+
+In fact, Fernanda uses **Tor Browser** for all of her web browsing just to be on the safe side.
+
+She also uses a Tor-powered app called **OnionShare** to send files to other activists securely and privately.
+
+### Reproductive rights activists like Fernanda are fighting for fundamental freedoms, and Tor helps power their resistance.
+
+---
+
+# 3. TOR FOR HUMAN RIGHTS
+
+### Water is life
+
+Jelani lives in a small village which a wide river runs through.
+
+This river has provided water to his community since the days of his ancestors.
+
+But today, Jelani’s river is threatened by powerful multinational companies drilling for oil in the region.
+
+Private security firms, paid for by these companies, use powerful surveillance mechanisms to monitor the online activities of Jelani and his neighbors in the village who are organizing to protect their sacred river.
+
+Jelani uses **Tor Browser** to prevent these companies from watching as he visits websites for international human rights protection and legal aid and writes blog posts about the resistance movement in his village.
+
+He also uses **OnionShare** and **SecureDrop** to securely send documents to journalists who are helping expose these human rights violations.
+
+All of this software uses Tor to help protect Jelani’s privacy.
+
+### Human rights activists like Jelani are fighting for justice in their communities, and Tor helps power their resistance.
+
+---
+
+# 4. TOR FOR ANTI-CENSORSHIP
+
+### Build bridges not walls
+
+Jean was traveling for the first time to a country far from his family.
+
+After arriving at a hotel, he opened his laptop.
+
+He was so exhausted that when the message "Connection has timed out" first appeared on his web browser, he thought it was due to his own error.
+
+But after trying again and again, he realized that his email provider, a news website, and many apps were unavailable.
+
+He had heard that this country censors the internet and wondered if that was happening.
+How could he contact his family from behind this impenetrable wall?
+After doing some web searches, he found a forum and read about VPNs, private services that allow you to connect to another uncensored network.
+
+Jean spent half an hour trying to figure out which cheap VPN was best.
+
+He chose one and for a moment it seemed to work, but after five minutes the connection went offline and the VPN would no longer connect.
+
+Jean kept reading to find other options and learned about Tor Browser and how it can circumvent censorship.
+
+He found an official website mirror to download the program.
+
+When he opened **Tor Browser**, he followed the prompts for censored users and connected to a bridge which allowed him to access the internet again.
+
+With Tor Browser, Jean can browse freely and privately and contact his family.
+
+### Censored users all over the world rely on Tor Browser for a free, stable, and uncensored way to access the internet.
+
+---
+
+# 5. Shared Sections
+
+## 토르가 무엇인가요?
+
+Tor is free software and an open network that helps protect you from tracking, surveillance, and censorship online.
+Tor is created for free by a 501(c)3 U.S.-based nonprofit called the Tor Project.
+
+The easiest way to use Tor is Tor Browser.
+When you use Tor Browser, no one can see what websites you visit or where in the world you’re coming from.
+
+Other applications, like SecureDrop and OnionShare, use Tor to protect their users against surveillance and censorship.
+
+
+## 6. How does Tor work?
+
+Amal wants to visit Bekele’s website privately, so she opens Tor Browser.
+
+Tor Browser selects a random circuit of three relays, which are computers all over the world configured to route traffic over the Tor network.
+
+Tor Browser then encrypts her website request three times and sends it to the first Tor relay in her circuit.
+
+The first relay removes the first encryption layer but doesn't learn that the destination is Bekele’s website.
+
+The first relay learns only the next location in the circuit, which is the second relay.
+
+The second relay removes another encryption layer and forwards the web page request to the third relay.
+
+The third relay removes the last encryption layer and forwards the web page request to its destination, Bekele’s website, but it doesn't know the request comes from Amal.
+
+Bekele doesn't know that the website request came from Amal unless she tells him so.
+
+## 7. Who uses Tor?
+
+People all over the world use Tor to protect their privacy and access the web freely.
+
+Tor helps protect journalists, human rights defenders, domestic violence victims, academic researchers, and anyone experiencing tracking, censorship, or surveillance.
+
+## 6. Why trust Tor?
+
+Tor is designed for privacy. We don’t know who our users are, and we don't keep logs of user activity.
+
+Tor relay operators cannot reveal the true identity of Tor users.
+
+Continual peer review of Tor's source code by academic and open source communities ensures that there are no backdoors in Tor, and our social contract promises that we will never backdoor Tor.
+
+## 7. Join the Tor community
+
+Tor is made possible by a diverse set of users, developers, relay operators, and advocates from around the world.
+
+We need your help to make Tor more usable and secure for people everywhere.
+
+You can volunteer with Tor by writing code, running a relay, creating documentation, offering user support, or telling people in your community about Tor.
+
+The Tor community is governed by a code of conduct, and we outline our set of promises to the community in our social contract.
+
+Learn more about Tor by visiting our website, our wiki, finding us on IRC, joining one of our mailing lists, or signing up for Tor News at newsletter.torproject.org.
+
+
+## 8. Download Tor
+
+Tor for Desktop
+torproject.org/download
+
+TOR ON MOBILE
+### Android
+Tor Browser for Android is available from GooglePlay.
+
+### iOS
+Onion Browser, developed by M. Tigas, is the only browser we recommend for iOS.
+
diff --git a/ku_IQ.po b/ku_IQ.po
new file mode 100644
index 000000000..6c8fce0dc
--- /dev/null
+++ b/ku_IQ.po
@@ -0,0 +1,162 @@
+# Tor Outreach Material 2019-2020
+
+# 1. TOR FOR PRIVACY
+
+### Privacy is a human right
+
+Like many of us, Aleisha spends most of her time online--connecting with friends, posting on social media, and browsing the web.
+
+But lately, she's noticed that advertisements related to her previous searches are following her around online.
+
+This feels so invasive that she does some research on online ads and learns that it's not just advertisers tracking her but also her ISP, analytics companies, social media platforms, and more.
+
+Aleisha decides she wants to find and use software that doesn't collect her data, doesn't track her, and doesn't tell other services anything private about her.
+
+She goes to a privacy training at a local hackerspace and learns about **Tor Browser**, the only web browser that allows her to browse anonymously.
+
+---
+
+# 2.TOR FOR FEMINISTS
+
+### The future is cyberfeminist
+
+Fernanda runs a women's collective focused on reproductive rights in Brazil, where abortion is illegal.
+
+Fernanda and her colleagues built a website with information about abortion access, birth control, and other resources for people seeking reproductive information.
+
+If this website was linked back to them, they could be arrested--or worse.
+
+To protect themselves, Fernanda and her colleagues created the website using Tor **onion services**. Onion services not only protect them from being discovered as the operators of the server but also help protect visitors to their website by requiring they use Tor Browser.
+
+In fact, Fernanda uses **Tor Browser** for all of her web browsing just to be on the safe side.
+
+She also uses a Tor-powered app called **OnionShare** to send files to other activists securely and privately.
+
+### Reproductive rights activists like Fernanda are fighting for fundamental freedoms, and Tor helps power their resistance.
+
+---
+
+# 3. TOR FOR HUMAN RIGHTS
+
+### Water is life
+
+Jelani lives in a small village which a wide river runs through.
+
+This river has provided water to his community since the days of his ancestors.
+
+But today, Jelani’s river is threatened by powerful multinational companies drilling for oil in the region.
+
+Private security firms, paid for by these companies, use powerful surveillance mechanisms to monitor the online activities of Jelani and his neighbors in the village who are organizing to protect their sacred river.
+
+Jelani uses **Tor Browser** to prevent these companies from watching as he visits websites for international human rights protection and legal aid and writes blog posts about the resistance movement in his village.
+
+He also uses **OnionShare** and **SecureDrop** to securely send documents to journalists who are helping expose these human rights violations.
+
+All of this software uses Tor to help protect Jelani’s privacy.
+
+### Human rights activists like Jelani are fighting for justice in their communities, and Tor helps power their resistance.
+
+---
+
+# 4. TOR FOR ANTI-CENSORSHIP
+
+### Build bridges not walls
+
+Jean was traveling for the first time to a country far from his family.
+
+After arriving at a hotel, he opened his laptop.
+
+He was so exhausted that when the message "Connection has timed out" first appeared on his web browser, he thought it was due to his own error.
+
+But after trying again and again, he realized that his email provider, a news website, and many apps were unavailable.
+
+He had heard that this country censors the internet and wondered if that was happening.
+How could he contact his family from behind this impenetrable wall?
+After doing some web searches, he found a forum and read about VPNs, private services that allow you to connect to another uncensored network.
+
+Jean spent half an hour trying to figure out which cheap VPN was best.
+
+He chose one and for a moment it seemed to work, but after five minutes the connection went offline and the VPN would no longer connect.
+
+Jean kept reading to find other options and learned about Tor Browser and how it can circumvent censorship.
+
+He found an official website mirror to download the program.
+
+When he opened **Tor Browser**, he followed the prompts for censored users and connected to a bridge which allowed him to access the internet again.
+
+With Tor Browser, Jean can browse freely and privately and contact his family.
+
+### Censored users all over the world rely on Tor Browser for a free, stable, and uncensored way to access the internet.
+
+---
+
+# 5. Shared Sections
+
+## What is Tor?
+
+Tor is free software and an open network that helps protect you from tracking, surveillance, and censorship online.
+Tor is created for free by a 501(c)3 U.S.-based nonprofit called the Tor Project.
+
+The easiest way to use Tor is Tor Browser.
+When you use Tor Browser, no one can see what websites you visit or where in the world you’re coming from.
+
+Other applications, like SecureDrop and OnionShare, use Tor to protect their users against surveillance and censorship.
+
+
+## 6. How does Tor work?
+
+Amal wants to visit Bekele’s website privately, so she opens Tor Browser.
+
+Tor Browser selects a random circuit of three relays, which are computers all over the world configured to route traffic over the Tor network.
+
+Tor Browser then encrypts her website request three times and sends it to the first Tor relay in her circuit.
+
+The first relay removes the first encryption layer but doesn't learn that the destination is Bekele’s website.
+
+The first relay learns only the next location in the circuit, which is the second relay.
+
+The second relay removes another encryption layer and forwards the web page request to the third relay.
+
+The third relay removes the last encryption layer and forwards the web page request to its destination, Bekele’s website, but it doesn't know the request comes from Amal.
+
+Bekele doesn't know that the website request came from Amal unless she tells him so.
+
+## 7. Who uses Tor?
+
+People all over the world use Tor to protect their privacy and access the web freely.
+
+Tor helps protect journalists, human rights defenders, domestic violence victims, academic researchers, and anyone experiencing tracking, censorship, or surveillance.
+
+## 6. Why trust Tor?
+
+Tor is designed for privacy. We don’t know who our users are, and we don't keep logs of user activity.
+
+Tor relay operators cannot reveal the true identity of Tor users.
+
+Continual peer review of Tor's source code by academic and open source communities ensures that there are no backdoors in Tor, and our social contract promises that we will never backdoor Tor.
+
+## 7. Join the Tor community
+
+Tor is made possible by a diverse set of users, developers, relay operators, and advocates from around the world.
+
+We need your help to make Tor more usable and secure for people everywhere.
+
+You can volunteer with Tor by writing code, running a relay, creating documentation, offering user support, or telling people in your community about Tor.
+
+The Tor community is governed by a code of conduct, and we outline our set of promises to the community in our social contract.
+
+Learn more about Tor by visiting our website, our wiki, finding us on IRC, joining one of our mailing lists, or signing up for Tor News at newsletter.torproject.org.
+
+
+## 8. Download Tor
+
+Tor for Desktop
+torproject.org/download
+
+TOR ON MOBILE
+### Android
+Tor Browser for Android is available from GooglePlay.
+
+### iOS
+Onion Browser, developed by M. Tigas, is the only browser we recommend for iOS.
+
diff --git a/ky.po b/ky.po
new file mode 100644
index 000000000..6c8fce0dc
--- /dev/null
+++ b/ky.po
@@ -0,0 +1,162 @@
+# Tor Outreach Material 2019-2020
+
+# 1. TOR FOR PRIVACY
+
+### Privacy is a human right
+
+Like many of us, Aleisha spends most of her time online--connecting with friends, posting on social media, and browsing the web.
+
+But lately, she's noticed that advertisements related to her previous searches are following her around online.
+
+This feels so invasive that she does some research on online ads and learns that it's not just advertisers tracking her but also her ISP, analytics companies, social media platforms, and more.
+
+Aleisha decides she wants to find and use software that doesn't collect her data, doesn't track her, and doesn't tell other services anything private about her.
+
+She goes to a privacy training at a local hackerspace and learns about **Tor Browser**, the only web browser that allows her to browse anonymously.
+
+---
+
+# 2.TOR FOR FEMINISTS
+
+### The future is cyberfeminist
+
+Fernanda runs a women's collective focused on reproductive rights in Brazil, where abortion is illegal.
+
+Fernanda and her colleagues built a website with information about abortion access, birth control, and other resources for people seeking reproductive information.
+
+If this website was linked back to them, they could be arrested--or worse.
+
+To protect themselves, Fernanda and her colleagues created the website using Tor **onion services**. Onion services not only protect them from being discovered as the operators of the server but also help protect visitors to their website by requiring they use Tor Browser.
+
+In fact, Fernanda uses **Tor Browser** for all of her web browsing just to be on the safe side.
+
+She also uses a Tor-powered app called **OnionShare** to send files to other activists securely and privately.
+
+### Reproductive rights activists like Fernanda are fighting for fundamental freedoms, and Tor helps power their resistance.
+
+---
+
+# 3. TOR FOR HUMAN RIGHTS
+
+### Water is life
+
+Jelani lives in a small village which a wide river runs through.
+
+This river has provided water to his community since the days of his ancestors.
+
+But today, Jelani’s river is threatened by powerful multinational companies drilling for oil in the region.
+
+Private security firms, paid for by these companies, use powerful surveillance mechanisms to monitor the online activities of Jelani and his neighbors in the village who are organizing to protect their sacred river.
+
+Jelani uses **Tor Browser** to prevent these companies from watching as he visits websites for international human rights protection and legal aid and writes blog posts about the resistance movement in his village.
+
+He also uses **OnionShare** and **SecureDrop** to securely send documents to journalists who are helping expose these human rights violations.
+
+All of this software uses Tor to help protect Jelani’s privacy.
+
+### Human rights activists like Jelani are fighting for justice in their communities, and Tor helps power their resistance.
+
+---
+
+# 4. TOR FOR ANTI-CENSORSHIP
+
+### Build bridges not walls
+
+Jean was traveling for the first time to a country far from his family.
+
+After arriving at a hotel, he opened his laptop.
+
+He was so exhausted that when the message "Connection has timed out" first appeared on his web browser, he thought it was due to his own error.
+
+But after trying again and again, he realized that his email provider, a news website, and many apps were unavailable.
+
+He had heard that this country censors the internet and wondered if that was happening.
+How could he contact his family from behind this impenetrable wall?
+After doing some web searches, he found a forum and read about VPNs, private services that allow you to connect to another uncensored network.
+
+Jean spent half an hour trying to figure out which cheap VPN was best.
+
+He chose one and for a moment it seemed to work, but after five minutes the connection went offline and the VPN would no longer connect.
+
+Jean kept reading to find other options and learned about Tor Browser and how it can circumvent censorship.
+
+He found an official website mirror to download the program.
+
+When he opened **Tor Browser**, he followed the prompts for censored users and connected to a bridge which allowed him to access the internet again.
+
+With Tor Browser, Jean can browse freely and privately and contact his family.
+
+### Censored users all over the world rely on Tor Browser for a free, stable, and uncensored way to access the internet.
+
+---
+
+# 5. Shared Sections
+
+## What is Tor?
+
+Tor is free software and an open network that helps protect you from tracking, surveillance, and censorship online.
+Tor is created for free by a 501(c)3 U.S.-based nonprofit called the Tor Project.
+
+The easiest way to use Tor is Tor Browser.
+When you use Tor Browser, no one can see what websites you visit or where in the world you’re coming from.
+
+Other applications, like SecureDrop and OnionShare, use Tor to protect their users against surveillance and censorship.
+
+
+## 6. How does Tor work?
+
+Amal wants to visit Bekele’s website privately, so she opens Tor Browser.
+
+Tor Browser selects a random circuit of three relays, which are computers all over the world configured to route traffic over the Tor network.
+
+Tor Browser then encrypts her website request three times and sends it to the first Tor relay in her circuit.
+
+The first relay removes the first encryption layer but doesn't learn that the destination is Bekele’s website.
+
+The first relay learns only the next location in the circuit, which is the second relay.
+
+The second relay removes another encryption layer and forwards the web page request to the third relay.
+
+The third relay removes the last encryption layer and forwards the web page request to its destination, Bekele’s website, but it doesn't know the request comes from Amal.
+
+Bekele doesn't know that the website request came from Amal unless she tells him so.
+
+## 7. Who uses Tor?
+
+People all over the world use Tor to protect their privacy and access the web freely.
+
+Tor helps protect journalists, human rights defenders, domestic violence victims, academic researchers, and anyone experiencing tracking, censorship, or surveillance.
+
+## 6. Why trust Tor?
+
+Tor is designed for privacy. We don’t know who our users are, and we don't keep logs of user activity.
+
+Tor relay operators cannot reveal the true identity of Tor users.
+
+Continual peer review of Tor's source code by academic and open source communities ensures that there are no backdoors in Tor, and our social contract promises that we will never backdoor Tor.
+
+## 7. Join the Tor community
+
+Tor is made possible by a diverse set of users, developers, relay operators, and advocates from around the world.
+
+We need your help to make Tor more usable and secure for people everywhere.
+
+You can volunteer with Tor by writing code, running a relay, creating documentation, offering user support, or telling people in your community about Tor.
+
+The Tor community is governed by a code of conduct, and we outline our set of promises to the community in our social contract.
+
+Learn more about Tor by visiting our website, our wiki, finding us on IRC, joining one of our mailing lists, or signing up for Tor News at newsletter.torproject.org.
+
+
+## 8. Download Tor
+
+Tor for Desktop
+torproject.org/download
+
+TOR ON MOBILE
+### Android
+Tor Browser for Android is available from GooglePlay.
+
+### iOS
+Onion Browser, developed by M. Tigas, is the only browser we recommend for iOS.
+
diff --git a/la.po b/la.po
new file mode 100644
index 000000000..6c8fce0dc
--- /dev/null
+++ b/la.po
@@ -0,0 +1,162 @@
+# Tor Outreach Material 2019-2020
+
+# 1. TOR FOR PRIVACY
+
+### Privacy is a human right
+
+Like many of us, Aleisha spends most of her time online--connecting with friends, posting on social media, and browsing the web.
+
+But lately, she's noticed that advertisements related to her previous searches are following her around online.
+
+This feels so invasive that she does some research on online ads and learns that it's not just advertisers tracking her but also her ISP, analytics companies, social media platforms, and more.
+
+Aleisha decides she wants to find and use software that doesn't collect her data, doesn't track her, and doesn't tell other services anything private about her.
+
+She goes to a privacy training at a local hackerspace and learns about **Tor Browser**, the only web browser that allows her to browse anonymously.
+
+---
+
+# 2.TOR FOR FEMINISTS
+
+### The future is cyberfeminist
+
+Fernanda runs a women's collective focused on reproductive rights in Brazil, where abortion is illegal.
+
+Fernanda and her colleagues built a website with information about abortion access, birth control, and other resources for people seeking reproductive information.
+
+If this website was linked back to them, they could be arrested--or worse.
+
+To protect themselves, Fernanda and her colleagues created the website using Tor **onion services**. Onion services not only protect them from being discovered as the operators of the server but also help protect visitors to their website by requiring they use Tor Browser.
+
+In fact, Fernanda uses **Tor Browser** for all of her web browsing just to be on the safe side.
+
+She also uses a Tor-powered app called **OnionShare** to send files to other activists securely and privately.
+
+### Reproductive rights activists like Fernanda are fighting for fundamental freedoms, and Tor helps power their resistance.
+
+---
+
+# 3. TOR FOR HUMAN RIGHTS
+
+### Water is life
+
+Jelani lives in a small village which a wide river runs through.
+
+This river has provided water to his community since the days of his ancestors.
+
+But today, Jelani’s river is threatened by powerful multinational companies drilling for oil in the region.
+
+Private security firms, paid for by these companies, use powerful surveillance mechanisms to monitor the online activities of Jelani and his neighbors in the village who are organizing to protect their sacred river.
+
+Jelani uses **Tor Browser** to prevent these companies from watching as he visits websites for international human rights protection and legal aid and writes blog posts about the resistance movement in his village.
+
+He also uses **OnionShare** and **SecureDrop** to securely send documents to journalists who are helping expose these human rights violations.
+
+All of this software uses Tor to help protect Jelani’s privacy.
+
+### Human rights activists like Jelani are fighting for justice in their communities, and Tor helps power their resistance.
+
+---
+
+# 4. TOR FOR ANTI-CENSORSHIP
+
+### Build bridges not walls
+
+Jean was traveling for the first time to a country far from his family.
+
+After arriving at a hotel, he opened his laptop.
+
+He was so exhausted that when the message "Connection has timed out" first appeared on his web browser, he thought it was due to his own error.
+
+But after trying again and again, he realized that his email provider, a news website, and many apps were unavailable.
+
+He had heard that this country censors the internet and wondered if that was happening.
+How could he contact his family from behind this impenetrable wall?
+After doing some web searches, he found a forum and read about VPNs, private services that allow you to connect to another uncensored network.
+
+Jean spent half an hour trying to figure out which cheap VPN was best.
+
+He chose one and for a moment it seemed to work, but after five minutes the connection went offline and the VPN would no longer connect.
+
+Jean kept reading to find other options and learned about Tor Browser and how it can circumvent censorship.
+
+He found an official website mirror to download the program.
+
+When he opened **Tor Browser**, he followed the prompts for censored users and connected to a bridge which allowed him to access the internet again.
+
+With Tor Browser, Jean can browse freely and privately and contact his family.
+
+### Censored users all over the world rely on Tor Browser for a free, stable, and uncensored way to access the internet.
+
+---
+
+# 5. Shared Sections
+
+## What is Tor?
+
+Tor is free software and an open network that helps protect you from tracking, surveillance, and censorship online.
+Tor is created for free by a 501(c)3 U.S.-based nonprofit called the Tor Project.
+
+The easiest way to use Tor is Tor Browser.
+When you use Tor Browser, no one can see what websites you visit or where in the world you’re coming from.
+
+Other applications, like SecureDrop and OnionShare, use Tor to protect their users against surveillance and censorship.
+
+
+## 6. How does Tor work?
+
+Amal wants to visit Bekele’s website privately, so she opens Tor Browser.
+
+Tor Browser selects a random circuit of three relays, which are computers all over the world configured to route traffic over the Tor network.
+
+Tor Browser then encrypts her website request three times and sends it to the first Tor relay in her circuit.
+
+The first relay removes the first encryption layer but doesn't learn that the destination is Bekele’s website.
+
+The first relay learns only the next location in the circuit, which is the second relay.
+
+The second relay removes another encryption layer and forwards the web page request to the third relay.
+
+The third relay removes the last encryption layer and forwards the web page request to its destination, Bekele’s website, but it doesn't know the request comes from Amal.
+
+Bekele doesn't know that the website request came from Amal unless she tells him so.
+
+## 7. Who uses Tor?
+
+People all over the world use Tor to protect their privacy and access the web freely.
+
+Tor helps protect journalists, human rights defenders, domestic violence victims, academic researchers, and anyone experiencing tracking, censorship, or surveillance.
+
+## 6. Why trust Tor?
+
+Tor is designed for privacy. We don’t know who our users are, and we don't keep logs of user activity.
+
+Tor relay operators cannot reveal the true identity of Tor users.
+
+Continual peer review of Tor's source code by academic and open source communities ensures that there are no backdoors in Tor, and our social contract promises that we will never backdoor Tor.
+
+## 7. Join the Tor community
+
+Tor is made possible by a diverse set of users, developers, relay operators, and advocates from around the world.
+
+We need your help to make Tor more usable and secure for people everywhere.
+
+You can volunteer with Tor by writing code, running a relay, creating documentation, offering user support, or telling people in your community about Tor.
+
+The Tor community is governed by a code of conduct, and we outline our set of promises to the community in our social contract.
+
+Learn more about Tor by visiting our website, our wiki, finding us on IRC, joining one of our mailing lists, or signing up for Tor News at newsletter.torproject.org.
+
+
+## 8. Download Tor
+
+Tor for Desktop
+torproject.org/download
+
+TOR ON MOBILE
+### Android
+Tor Browser for Android is available from GooglePlay.
+
+### iOS
+Onion Browser, developed by M. Tigas, is the only browser we recommend for iOS.
+
diff --git a/lb.po b/lb.po
new file mode 100644
index 000000000..6c8fce0dc
--- /dev/null
+++ b/lb.po
@@ -0,0 +1,162 @@
+# Tor Outreach Material 2019-2020
+
+# 1. TOR FOR PRIVACY
+
+### Privacy is a human right
+
+Like many of us, Aleisha spends most of her time online--connecting with friends, posting on social media, and browsing the web.
+
+But lately, she's noticed that advertisements related to her previous searches are following her around online.
+
+This feels so invasive that she does some research on online ads and learns that it's not just advertisers tracking her but also her ISP, analytics companies, social media platforms, and more.
+
+Aleisha decides she wants to find and use software that doesn't collect her data, doesn't track her, and doesn't tell other services anything private about her.
+
+She goes to a privacy training at a local hackerspace and learns about **Tor Browser**, the only web browser that allows her to browse anonymously.
+
+---
+
+# 2.TOR FOR FEMINISTS
+
+### The future is cyberfeminist
+
+Fernanda runs a women's collective focused on reproductive rights in Brazil, where abortion is illegal.
+
+Fernanda and her colleagues built a website with information about abortion access, birth control, and other resources for people seeking reproductive information.
+
+If this website was linked back to them, they could be arrested--or worse.
+
+To protect themselves, Fernanda and her colleagues created the website using Tor **onion services**. Onion services not only protect them from being discovered as the operators of the server but also help protect visitors to their website by requiring they use Tor Browser.
+
+In fact, Fernanda uses **Tor Browser** for all of her web browsing just to be on the safe side.
+
+She also uses a Tor-powered app called **OnionShare** to send files to other activists securely and privately.
+
+### Reproductive rights activists like Fernanda are fighting for fundamental freedoms, and Tor helps power their resistance.
+
+---
+
+# 3. TOR FOR HUMAN RIGHTS
+
+### Water is life
+
+Jelani lives in a small village which a wide river runs through.
+
+This river has provided water to his community since the days of his ancestors.
+
+But today, Jelani’s river is threatened by powerful multinational companies drilling for oil in the region.
+
+Private security firms, paid for by these companies, use powerful surveillance mechanisms to monitor the online activities of Jelani and his neighbors in the village who are organizing to protect their sacred river.
+
+Jelani uses **Tor Browser** to prevent these companies from watching as he visits websites for international human rights protection and legal aid and writes blog posts about the resistance movement in his village.
+
+He also uses **OnionShare** and **SecureDrop** to securely send documents to journalists who are helping expose these human rights violations.
+
+All of this software uses Tor to help protect Jelani’s privacy.
+
+### Human rights activists like Jelani are fighting for justice in their communities, and Tor helps power their resistance.
+
+---
+
+# 4. TOR FOR ANTI-CENSORSHIP
+
+### Build bridges not walls
+
+Jean was traveling for the first time to a country far from his family.
+
+After arriving at a hotel, he opened his laptop.
+
+He was so exhausted that when the message "Connection has timed out" first appeared on his web browser, he thought it was due to his own error.
+
+But after trying again and again, he realized that his email provider, a news website, and many apps were unavailable.
+
+He had heard that this country censors the internet and wondered if that was happening.
+How could he contact his family from behind this impenetrable wall?
+After doing some web searches, he found a forum and read about VPNs, private services that allow you to connect to another uncensored network.
+
+Jean spent half an hour trying to figure out which cheap VPN was best.
+
+He chose one and for a moment it seemed to work, but after five minutes the connection went offline and the VPN would no longer connect.
+
+Jean kept reading to find other options and learned about Tor Browser and how it can circumvent censorship.
+
+He found an official website mirror to download the program.
+
+When he opened **Tor Browser**, he followed the prompts for censored users and connected to a bridge which allowed him to access the internet again.
+
+With Tor Browser, Jean can browse freely and privately and contact his family.
+
+### Censored users all over the world rely on Tor Browser for a free, stable, and uncensored way to access the internet.
+
+---
+
+# 5. Shared Sections
+
+## What is Tor?
+
+Tor is free software and an open network that helps protect you from tracking, surveillance, and censorship online.
+Tor is created for free by a 501(c)3 U.S.-based nonprofit called the Tor Project.
+
+The easiest way to use Tor is Tor Browser.
+When you use Tor Browser, no one can see what websites you visit or where in the world you’re coming from.
+
+Other applications, like SecureDrop and OnionShare, use Tor to protect their users against surveillance and censorship.
+
+
+## 6. How does Tor work?
+
+Amal wants to visit Bekele’s website privately, so she opens Tor Browser.
+
+Tor Browser selects a random circuit of three relays, which are computers all over the world configured to route traffic over the Tor network.
+
+Tor Browser then encrypts her website request three times and sends it to the first Tor relay in her circuit.
+
+The first relay removes the first encryption layer but doesn't learn that the destination is Bekele’s website.
+
+The first relay learns only the next location in the circuit, which is the second relay.
+
+The second relay removes another encryption layer and forwards the web page request to the third relay.
+
+The third relay removes the last encryption layer and forwards the web page request to its destination, Bekele’s website, but it doesn't know the request comes from Amal.
+
+Bekele doesn't know that the website request came from Amal unless she tells him so.
+
+## 7. Who uses Tor?
+
+People all over the world use Tor to protect their privacy and access the web freely.
+
+Tor helps protect journalists, human rights defenders, domestic violence victims, academic researchers, and anyone experiencing tracking, censorship, or surveillance.
+
+## 6. Why trust Tor?
+
+Tor is designed for privacy. We don’t know who our users are, and we don't keep logs of user activity.
+
+Tor relay operators cannot reveal the true identity of Tor users.
+
+Continual peer review of Tor's source code by academic and open source communities ensures that there are no backdoors in Tor, and our social contract promises that we will never backdoor Tor.
+
+## 7. Join the Tor community
+
+Tor is made possible by a diverse set of users, developers, relay operators, and advocates from around the world.
+
+We need your help to make Tor more usable and secure for people everywhere.
+
+You can volunteer with Tor by writing code, running a relay, creating documentation, offering user support, or telling people in your community about Tor.
+
+The Tor community is governed by a code of conduct, and we outline our set of promises to the community in our social contract.
+
+Learn more about Tor by visiting our website, our wiki, finding us on IRC, joining one of our mailing lists, or signing up for Tor News at newsletter.torproject.org.
+
+
+## 8. Download Tor
+
+Tor for Desktop
+torproject.org/download
+
+TOR ON MOBILE
+### Android
+Tor Browser for Android is available from GooglePlay.
+
+### iOS
+Onion Browser, developed by M. Tigas, is the only browser we recommend for iOS.
+
diff --git a/lo.po b/lo.po
new file mode 100644
index 000000000..6c8fce0dc
--- /dev/null
+++ b/lo.po
@@ -0,0 +1,162 @@
+# Tor Outreach Material 2019-2020
+
+# 1. TOR FOR PRIVACY
+
+### Privacy is a human right
+
+Like many of us, Aleisha spends most of her time online--connecting with friends, posting on social media, and browsing the web.
+
+But lately, she's noticed that advertisements related to her previous searches are following her around online.
+
+This feels so invasive that she does some research on online ads and learns that it's not just advertisers tracking her but also her ISP, analytics companies, social media platforms, and more.
+
+Aleisha decides she wants to find and use software that doesn't collect her data, doesn't track her, and doesn't tell other services anything private about her.
+
+She goes to a privacy training at a local hackerspace and learns about **Tor Browser**, the only web browser that allows her to browse anonymously.
+
+---
+
+# 2.TOR FOR FEMINISTS
+
+### The future is cyberfeminist
+
+Fernanda runs a women's collective focused on reproductive rights in Brazil, where abortion is illegal.
+
+Fernanda and her colleagues built a website with information about abortion access, birth control, and other resources for people seeking reproductive information.
+
+If this website was linked back to them, they could be arrested--or worse.
+
+To protect themselves, Fernanda and her colleagues created the website using Tor **onion services**. Onion services not only protect them from being discovered as the operators of the server but also help protect visitors to their website by requiring they use Tor Browser.
+
+In fact, Fernanda uses **Tor Browser** for all of her web browsing just to be on the safe side.
+
+She also uses a Tor-powered app called **OnionShare** to send files to other activists securely and privately.
+
+### Reproductive rights activists like Fernanda are fighting for fundamental freedoms, and Tor helps power their resistance.
+
+---
+
+# 3. TOR FOR HUMAN RIGHTS
+
+### Water is life
+
+Jelani lives in a small village which a wide river runs through.
+
+This river has provided water to his community since the days of his ancestors.
+
+But today, Jelani’s river is threatened by powerful multinational companies drilling for oil in the region.
+
+Private security firms, paid for by these companies, use powerful surveillance mechanisms to monitor the online activities of Jelani and his neighbors in the village who are organizing to protect their sacred river.
+
+Jelani uses **Tor Browser** to prevent these companies from watching as he visits websites for international human rights protection and legal aid and writes blog posts about the resistance movement in his village.
+
+He also uses **OnionShare** and **SecureDrop** to securely send documents to journalists who are helping expose these human rights violations.
+
+All of this software uses Tor to help protect Jelani’s privacy.
+
+### Human rights activists like Jelani are fighting for justice in their communities, and Tor helps power their resistance.
+
+---
+
+# 4. TOR FOR ANTI-CENSORSHIP
+
+### Build bridges not walls
+
+Jean was traveling for the first time to a country far from his family.
+
+After arriving at a hotel, he opened his laptop.
+
+He was so exhausted that when the message "Connection has timed out" first appeared on his web browser, he thought it was due to his own error.
+
+But after trying again and again, he realized that his email provider, a news website, and many apps were unavailable.
+
+He had heard that this country censors the internet and wondered if that was happening.
+How could he contact his family from behind this impenetrable wall?
+After doing some web searches, he found a forum and read about VPNs, private services that allow you to connect to another uncensored network.
+
+Jean spent half an hour trying to figure out which cheap VPN was best.
+
+He chose one and for a moment it seemed to work, but after five minutes the connection went offline and the VPN would no longer connect.
+
+Jean kept reading to find other options and learned about Tor Browser and how it can circumvent censorship.
+
+He found an official website mirror to download the program.
+
+When he opened **Tor Browser**, he followed the prompts for censored users and connected to a bridge which allowed him to access the internet again.
+
+With Tor Browser, Jean can browse freely and privately and contact his family.
+
+### Censored users all over the world rely on Tor Browser for a free, stable, and uncensored way to access the internet.
+
+---
+
+# 5. Shared Sections
+
+## What is Tor?
+
+Tor is free software and an open network that helps protect you from tracking, surveillance, and censorship online.
+Tor is created for free by a 501(c)3 U.S.-based nonprofit called the Tor Project.
+
+The easiest way to use Tor is Tor Browser.
+When you use Tor Browser, no one can see what websites you visit or where in the world you’re coming from.
+
+Other applications, like SecureDrop and OnionShare, use Tor to protect their users against surveillance and censorship.
+
+
+## 6. How does Tor work?
+
+Amal wants to visit Bekele’s website privately, so she opens Tor Browser.
+
+Tor Browser selects a random circuit of three relays, which are computers all over the world configured to route traffic over the Tor network.
+
+Tor Browser then encrypts her website request three times and sends it to the first Tor relay in her circuit.
+
+The first relay removes the first encryption layer but doesn't learn that the destination is Bekele’s website.
+
+The first relay learns only the next location in the circuit, which is the second relay.
+
+The second relay removes another encryption layer and forwards the web page request to the third relay.
+
+The third relay removes the last encryption layer and forwards the web page request to its destination, Bekele’s website, but it doesn't know the request comes from Amal.
+
+Bekele doesn't know that the website request came from Amal unless she tells him so.
+
+## 7. Who uses Tor?
+
+People all over the world use Tor to protect their privacy and access the web freely.
+
+Tor helps protect journalists, human rights defenders, domestic violence victims, academic researchers, and anyone experiencing tracking, censorship, or surveillance.
+
+## 6. Why trust Tor?
+
+Tor is designed for privacy. We don’t know who our users are, and we don't keep logs of user activity.
+
+Tor relay operators cannot reveal the true identity of Tor users.
+
+Continual peer review of Tor's source code by academic and open source communities ensures that there are no backdoors in Tor, and our social contract promises that we will never backdoor Tor.
+
+## 7. Join the Tor community
+
+Tor is made possible by a diverse set of users, developers, relay operators, and advocates from around the world.
+
+We need your help to make Tor more usable and secure for people everywhere.
+
+You can volunteer with Tor by writing code, running a relay, creating documentation, offering user support, or telling people in your community about Tor.
+
+The Tor community is governed by a code of conduct, and we outline our set of promises to the community in our social contract.
+
+Learn more about Tor by visiting our website, our wiki, finding us on IRC, joining one of our mailing lists, or signing up for Tor News at newsletter.torproject.org.
+
+
+## 8. Download Tor
+
+Tor for Desktop
+torproject.org/download
+
+TOR ON MOBILE
+### Android
+Tor Browser for Android is available from GooglePlay.
+
+### iOS
+Onion Browser, developed by M. Tigas, is the only browser we recommend for iOS.
+
diff --git a/lt.po b/lt.po
new file mode 100644
index 000000000..6c8fce0dc
--- /dev/null
+++ b/lt.po
@@ -0,0 +1,162 @@
+# Tor Outreach Material 2019-2020
+
+# 1. TOR FOR PRIVACY
+
+### Privacy is a human right
+
+Like many of us, Aleisha spends most of her time online--connecting with friends, posting on social media, and browsing the web.
+
+But lately, she's noticed that advertisements related to her previous searches are following her around online.
+
+This feels so invasive that she does some research on online ads and learns that it's not just advertisers tracking her but also her ISP, analytics companies, social media platforms, and more.
+
+Aleisha decides she wants to find and use software that doesn't collect her data, doesn't track her, and doesn't tell other services anything private about her.
+
+She goes to a privacy training at a local hackerspace and learns about **Tor Browser**, the only web browser that allows her to browse anonymously.
+
+---
+
+# 2.TOR FOR FEMINISTS
+
+### The future is cyberfeminist
+
+Fernanda runs a women's collective focused on reproductive rights in Brazil, where abortion is illegal.
+
+Fernanda and her colleagues built a website with information about abortion access, birth control, and other resources for people seeking reproductive information.
+
+If this website was linked back to them, they could be arrested--or worse.
+
+To protect themselves, Fernanda and her colleagues created the website using Tor **onion services**. Onion services not only protect them from being discovered as the operators of the server but also help protect visitors to their website by requiring they use Tor Browser.
+
+In fact, Fernanda uses **Tor Browser** for all of her web browsing just to be on the safe side.
+
+She also uses a Tor-powered app called **OnionShare** to send files to other activists securely and privately.
+
+### Reproductive rights activists like Fernanda are fighting for fundamental freedoms, and Tor helps power their resistance.
+
+---
+
+# 3. TOR FOR HUMAN RIGHTS
+
+### Water is life
+
+Jelani lives in a small village which a wide river runs through.
+
+This river has provided water to his community since the days of his ancestors.
+
+But today, Jelani’s river is threatened by powerful multinational companies drilling for oil in the region.
+
+Private security firms, paid for by these companies, use powerful surveillance mechanisms to monitor the online activities of Jelani and his neighbors in the village who are organizing to protect their sacred river.
+
+Jelani uses **Tor Browser** to prevent these companies from watching as he visits websites for international human rights protection and legal aid and writes blog posts about the resistance movement in his village.
+
+He also uses **OnionShare** and **SecureDrop** to securely send documents to journalists who are helping expose these human rights violations.
+
+All of this software uses Tor to help protect Jelani’s privacy.
+
+### Human rights activists like Jelani are fighting for justice in their communities, and Tor helps power their resistance.
+
+---
+
+# 4. TOR FOR ANTI-CENSORSHIP
+
+### Build bridges not walls
+
+Jean was traveling for the first time to a country far from his family.
+
+After arriving at a hotel, he opened his laptop.
+
+He was so exhausted that when the message "Connection has timed out" first appeared on his web browser, he thought it was due to his own error.
+
+But after trying again and again, he realized that his email provider, a news website, and many apps were unavailable.
+
+He had heard that this country censors the internet and wondered if that was happening.
+How could he contact his family from behind this impenetrable wall?
+After doing some web searches, he found a forum and read about VPNs, private services that allow you to connect to another uncensored network.
+
+Jean spent half an hour trying to figure out which cheap VPN was best.
+
+He chose one and for a moment it seemed to work, but after five minutes the connection went offline and the VPN would no longer connect.
+
+Jean kept reading to find other options and learned about Tor Browser and how it can circumvent censorship.
+
+He found an official website mirror to download the program.
+
+When he opened **Tor Browser**, he followed the prompts for censored users and connected to a bridge which allowed him to access the internet again.
+
+With Tor Browser, Jean can browse freely and privately and contact his family.
+
+### Censored users all over the world rely on Tor Browser for a free, stable, and uncensored way to access the internet.
+
+---
+
+# 5. Shared Sections
+
+## What is Tor?
+
+Tor is free software and an open network that helps protect you from tracking, surveillance, and censorship online.
+Tor is created for free by a 501(c)3 U.S.-based nonprofit called the Tor Project.
+
+The easiest way to use Tor is Tor Browser.
+When you use Tor Browser, no one can see what websites you visit or where in the world you’re coming from.
+
+Other applications, like SecureDrop and OnionShare, use Tor to protect their users against surveillance and censorship.
+
+
+## 6. How does Tor work?
+
+Amal wants to visit Bekele’s website privately, so she opens Tor Browser.
+
+Tor Browser selects a random circuit of three relays, which are computers all over the world configured to route traffic over the Tor network.
+
+Tor Browser then encrypts her website request three times and sends it to the first Tor relay in her circuit.
+
+The first relay removes the first encryption layer but doesn't learn that the destination is Bekele’s website.
+
+The first relay learns only the next location in the circuit, which is the second relay.
+
+The second relay removes another encryption layer and forwards the web page request to the third relay.
+
+The third relay removes the last encryption layer and forwards the web page request to its destination, Bekele’s website, but it doesn't know the request comes from Amal.
+
+Bekele doesn't know that the website request came from Amal unless she tells him so.
+
+## 7. Who uses Tor?
+
+People all over the world use Tor to protect their privacy and access the web freely.
+
+Tor helps protect journalists, human rights defenders, domestic violence victims, academic researchers, and anyone experiencing tracking, censorship, or surveillance.
+
+## 6. Why trust Tor?
+
+Tor is designed for privacy. We don’t know who our users are, and we don't keep logs of user activity.
+
+Tor relay operators cannot reveal the true identity of Tor users.
+
+Continual peer review of Tor's source code by academic and open source communities ensures that there are no backdoors in Tor, and our social contract promises that we will never backdoor Tor.
+
+## 7. Join the Tor community
+
+Tor is made possible by a diverse set of users, developers, relay operators, and advocates from around the world.
+
+We need your help to make Tor more usable and secure for people everywhere.
+
+You can volunteer with Tor by writing code, running a relay, creating documentation, offering user support, or telling people in your community about Tor.
+
+The Tor community is governed by a code of conduct, and we outline our set of promises to the community in our social contract.
+
+Learn more about Tor by visiting our website, our wiki, finding us on IRC, joining one of our mailing lists, or signing up for Tor News at newsletter.torproject.org.
+
+
+## 8. Download Tor
+
+Tor for Desktop
+torproject.org/download
+
+TOR ON MOBILE
+### Android
+Tor Browser for Android is available from GooglePlay.
+
+### iOS
+Onion Browser, developed by M. Tigas, is the only browser we recommend for iOS.
+
diff --git a/lv.po b/lv.po
new file mode 100644
index 000000000..c39229faa
--- /dev/null
+++ b/lv.po
@@ -0,0 +1,162 @@
+# Tor Outreach Material 2019-2020
+
+# 1. TOR FOR PRIVACY
+
+### Privacy is a human right
+
+Like many of us, Aleisha spends most of her time online--connecting with friends, posting on social media, and browsing the web.
+
+But lately, she's noticed that advertisements related to her previous searches are following her around online.
+
+This feels so invasive that she does some research on online ads and learns that it's not just advertisers tracking her but also her ISP, analytics companies, social media platforms, and more.
+
+Aleisha decides she wants to find and use software that doesn't collect her data, doesn't track her, and doesn't tell other services anything private about her.
+
+She goes to a privacy training at a local hackerspace and learns about **Tor Browser**, the only web browser that allows her to browse anonymously.
+
+---
+
+# 2.TOR FOR FEMINISTS
+
+### The future is cyberfeminist
+
+Fernanda runs a women's collective focused on reproductive rights in Brazil, where abortion is illegal.
+
+Fernanda and her colleagues built a website with information about abortion access, birth control, and other resources for people seeking reproductive information.
+
+If this website was linked back to them, they could be arrested--or worse.
+
+To protect themselves, Fernanda and her colleagues created the website using Tor **onion services**. Onion services not only protect them from being discovered as the operators of the server but also help protect visitors to their website by requiring they use Tor Browser.
+
+In fact, Fernanda uses **Tor Browser** for all of her web browsing just to be on the safe side.
+
+She also uses a Tor-powered app called **OnionShare** to send files to other activists securely and privately.
+
+### Reproductive rights activists like Fernanda are fighting for fundamental freedoms, and Tor helps power their resistance.
+
+---
+
+# 3. TOR FOR HUMAN RIGHTS
+
+### Water is life
+
+Jelani lives in a small village which a wide river runs through.
+
+This river has provided water to his community since the days of his ancestors.
+
+But today, Jelani’s river is threatened by powerful multinational companies drilling for oil in the region.
+
+Private security firms, paid for by these companies, use powerful surveillance mechanisms to monitor the online activities of Jelani and his neighbors in the village who are organizing to protect their sacred river.
+
+Jelani uses **Tor Browser** to prevent these companies from watching as he visits websites for international human rights protection and legal aid and writes blog posts about the resistance movement in his village.
+
+He also uses **OnionShare** and **SecureDrop** to securely send documents to journalists who are helping expose these human rights violations.
+
+All of this software uses Tor to help protect Jelani’s privacy.
+
+### Human rights activists like Jelani are fighting for justice in their communities, and Tor helps power their resistance.
+
+---
+
+# 4. TOR FOR ANTI-CENSORSHIP
+
+### Build bridges not walls
+
+Jean was traveling for the first time to a country far from his family.
+
+After arriving at a hotel, he opened his laptop.
+
+He was so exhausted that when the message "Connection has timed out" first appeared on his web browser, he thought it was due to his own error.
+
+But after trying again and again, he realized that his email provider, a news website, and many apps were unavailable.
+
+He had heard that this country censors the internet and wondered if that was happening.
+How could he contact his family from behind this impenetrable wall?
+After doing some web searches, he found a forum and read about VPNs, private services that allow you to connect to another uncensored network.
+
+Jean spent half an hour trying to figure out which cheap VPN was best.
+
+He chose one and for a moment it seemed to work, but after five minutes the connection went offline and the VPN would no longer connect.
+
+Jean kept reading to find other options and learned about Tor Browser and how it can circumvent censorship.
+
+He found an official website mirror to download the program.
+
+When he opened **Tor Browser**, he followed the prompts for censored users and connected to a bridge which allowed him to access the internet again.
+
+With Tor Browser, Jean can browse freely and privately and contact his family.
+
+### Censored users all over the world rely on Tor Browser for a free, stable, and uncensored way to access the internet.
+
+---
+
+# 5. Shared Sections
+
+## Kas ir Tor?
+
+Tor is free software and an open network that helps protect you from tracking, surveillance, and censorship online.
+Tor is created for free by a 501(c)3 U.S.-based nonprofit called the Tor Project.
+
+The easiest way to use Tor is Tor Browser.
+When you use Tor Browser, no one can see what websites you visit or where in the world you’re coming from.
+
+Other applications, like SecureDrop and OnionShare, use Tor to protect their users against surveillance and censorship.
+
+
+## 6. How does Tor work?
+
+Amal wants to visit Bekele’s website privately, so she opens Tor Browser.
+
+Tor Browser selects a random circuit of three relays, which are computers all over the world configured to route traffic over the Tor network.
+
+Tor Browser then encrypts her website request three times and sends it to the first Tor relay in her circuit.
+
+The first relay removes the first encryption layer but doesn't learn that the destination is Bekele’s website.
+
+The first relay learns only the next location in the circuit, which is the second relay.
+
+The second relay removes another encryption layer and forwards the web page request to the third relay.
+
+The third relay removes the last encryption layer and forwards the web page request to its destination, Bekele’s website, but it doesn't know the request comes from Amal.
+
+Bekele doesn't know that the website request came from Amal unless she tells him so.
+
+## 7. Who uses Tor?
+
+People all over the world use Tor to protect their privacy and access the web freely.
+
+Tor helps protect journalists, human rights defenders, domestic violence victims, academic researchers, and anyone experiencing tracking, censorship, or surveillance.
+
+## 6. Why trust Tor?
+
+Tor is designed for privacy. We don’t know who our users are, and we don't keep logs of user activity.
+
+Tor relay operators cannot reveal the true identity of Tor users.
+
+Continual peer review of Tor's source code by academic and open source communities ensures that there are no backdoors in Tor, and our social contract promises that we will never backdoor Tor.
+
+## 7. Join the Tor community
+
+Tor is made possible by a diverse set of users, developers, relay operators, and advocates from around the world.
+
+We need your help to make Tor more usable and secure for people everywhere.
+
+You can volunteer with Tor by writing code, running a relay, creating documentation, offering user support, or telling people in your community about Tor.
+
+The Tor community is governed by a code of conduct, and we outline our set of promises to the community in our social contract.
+
+Learn more about Tor by visiting our website, our wiki, finding us on IRC, joining one of our mailing lists, or signing up for Tor News at newsletter.torproject.org.
+
+
+## 8. Download Tor
+
+Tor for Desktop
+torproject.org/download
+
+TOR ON MOBILE
+### Android
+Tor Browser for Android is available from GooglePlay.
+
+### iOS
+Onion Browser, developed by M. Tigas, is the only browser we recommend for iOS.
+
diff --git a/mk.po b/mk.po
new file mode 100644
index 000000000..6c8fce0dc
--- /dev/null
+++ b/mk.po
@@ -0,0 +1,162 @@
+# Tor Outreach Material 2019-2020
+
+# 1. TOR FOR PRIVACY
+
+### Privacy is a human right
+
+Like many of us, Aleisha spends most of her time online--connecting with friends, posting on social media, and browsing the web.
+
+But lately, she's noticed that advertisements related to her previous searches are following her around online.
+
+This feels so invasive that she does some research on online ads and learns that it's not just advertisers tracking her but also her ISP, analytics companies, social media platforms, and more.
+
+Aleisha decides she wants to find and use software that doesn't collect her data, doesn't track her, and doesn't tell other services anything private about her.
+
+She goes to a privacy training at a local hackerspace and learns about **Tor Browser**, the only web browser that allows her to browse anonymously.
+
+---
+
+# 2.TOR FOR FEMINISTS
+
+### The future is cyberfeminist
+
+Fernanda runs a women's collective focused on reproductive rights in Brazil, where abortion is illegal.
+
+Fernanda and her colleagues built a website with information about abortion access, birth control, and other resources for people seeking reproductive information.
+
+If this website was linked back to them, they could be arrested--or worse.
+
+To protect themselves, Fernanda and her colleagues created the website using Tor **onion services**. Onion services not only protect them from being discovered as the operators of the server but also help protect visitors to their website by requiring they use Tor Browser.
+
+In fact, Fernanda uses **Tor Browser** for all of her web browsing just to be on the safe side.
+
+She also uses a Tor-powered app called **OnionShare** to send files to other activists securely and privately.
+
+### Reproductive rights activists like Fernanda are fighting for fundamental freedoms, and Tor helps power their resistance.
+
+---
+
+# 3. TOR FOR HUMAN RIGHTS
+
+### Water is life
+
+Jelani lives in a small village which a wide river runs through.
+
+This river has provided water to his community since the days of his ancestors.
+
+But today, Jelani’s river is threatened by powerful multinational companies drilling for oil in the region.
+
+Private security firms, paid for by these companies, use powerful surveillance mechanisms to monitor the online activities of Jelani and his neighbors in the village who are organizing to protect their sacred river.
+
+Jelani uses **Tor Browser** to prevent these companies from watching as he visits websites for international human rights protection and legal aid and writes blog posts about the resistance movement in his village.
+
+He also uses **OnionShare** and **SecureDrop** to securely send documents to journalists who are helping expose these human rights violations.
+
+All of this software uses Tor to help protect Jelani’s privacy.
+
+### Human rights activists like Jelani are fighting for justice in their communities, and Tor helps power their resistance.
+
+---
+
+# 4. TOR FOR ANTI-CENSORSHIP
+
+### Build bridges not walls
+
+Jean was traveling for the first time to a country far from his family.
+
+After arriving at a hotel, he opened his laptop.
+
+He was so exhausted that when the message "Connection has timed out" first appeared on his web browser, he thought it was due to his own error.
+
+But after trying again and again, he realized that his email provider, a news website, and many apps were unavailable.
+
+He had heard that this country censors the internet and wondered if that was happening.
+How could he contact his family from behind this impenetrable wall?
+After doing some web searches, he found a forum and read about VPNs, private services that allow you to connect to another uncensored network.
+
+Jean spent half an hour trying to figure out which cheap VPN was best.
+
+He chose one and for a moment it seemed to work, but after five minutes the connection went offline and the VPN would no longer connect.
+
+Jean kept reading to find other options and learned about Tor Browser and how it can circumvent censorship.
+
+He found an official website mirror to download the program.
+
+When he opened **Tor Browser**, he followed the prompts for censored users and connected to a bridge which allowed him to access the internet again.
+
+With Tor Browser, Jean can browse freely and privately and contact his family.
+
+### Censored users all over the world rely on Tor Browser for a free, stable, and uncensored way to access the internet.
+
+---
+
+# 5. Shared Sections
+
+## What is Tor?
+
+Tor is free software and an open network that helps protect you from tracking, surveillance, and censorship online.
+Tor is created for free by a 501(c)3 U.S.-based nonprofit called the Tor Project.
+
+The easiest way to use Tor is Tor Browser.
+When you use Tor Browser, no one can see what websites you visit or where in the world you’re coming from.
+
+Other applications, like SecureDrop and OnionShare, use Tor to protect their users against surveillance and censorship.
+
+
+## 6. How does Tor work?
+
+Amal wants to visit Bekele’s website privately, so she opens Tor Browser.
+
+Tor Browser selects a random circuit of three relays, which are computers all over the world configured to route traffic over the Tor network.
+
+Tor Browser then encrypts her website request three times and sends it to the first Tor relay in her circuit.
+
+The first relay removes the first encryption layer but doesn't learn that the destination is Bekele’s website.
+
+The first relay learns only the next location in the circuit, which is the second relay.
+
+The second relay removes another encryption layer and forwards the web page request to the third relay.
+
+The third relay removes the last encryption layer and forwards the web page request to its destination, Bekele’s website, but it doesn't know the request comes from Amal.
+
+Bekele doesn't know that the website request came from Amal unless she tells him so.
+
+## 7. Who uses Tor?
+
+People all over the world use Tor to protect their privacy and access the web freely.
+
+Tor helps protect journalists, human rights defenders, domestic violence victims, academic researchers, and anyone experiencing tracking, censorship, or surveillance.
+
+## 6. Why trust Tor?
+
+Tor is designed for privacy. We don’t know who our users are, and we don't keep logs of user activity.
+
+Tor relay operators cannot reveal the true identity of Tor users.
+
+Continual peer review of Tor's source code by academic and open source communities ensures that there are no backdoors in Tor, and our social contract promises that we will never backdoor Tor.
+
+## 7. Join the Tor community
+
+Tor is made possible by a diverse set of users, developers, relay operators, and advocates from around the world.
+
+We need your help to make Tor more usable and secure for people everywhere.
+
+You can volunteer with Tor by writing code, running a relay, creating documentation, offering user support, or telling people in your community about Tor.
+
+The Tor community is governed by a code of conduct, and we outline our set of promises to the community in our social contract.
+
+Learn more about Tor by visiting our website, our wiki, finding us on IRC, joining one of our mailing lists, or signing up for Tor News at newsletter.torproject.org.
+
+
+## 8. Download Tor
+
+Tor for Desktop
+torproject.org/download
+
+TOR ON MOBILE
+### Android
+Tor Browser for Android is available from GooglePlay.
+
+### iOS
+Onion Browser, developed by M. Tigas, is the only browser we recommend for iOS.
+
diff --git a/ml.po b/ml.po
new file mode 100644
index 000000000..6c8fce0dc
--- /dev/null
+++ b/ml.po
@@ -0,0 +1,162 @@
+# Tor Outreach Material 2019-2020
+
+# 1. TOR FOR PRIVACY
+
+### Privacy is a human right
+
+Like many of us, Aleisha spends most of her time online--connecting with friends, posting on social media, and browsing the web.
+
+But lately, she's noticed that advertisements related to her previous searches are following her around online.
+
+This feels so invasive that she does some research on online ads and learns that it's not just advertisers tracking her but also her ISP, analytics companies, social media platforms, and more.
+
+Aleisha decides she wants to find and use software that doesn't collect her data, doesn't track her, and doesn't tell other services anything private about her.
+
+She goes to a privacy training at a local hackerspace and learns about **Tor Browser**, the only web browser that allows her to browse anonymously.
+
+---
+
+# 2.TOR FOR FEMINISTS
+
+### The future is cyberfeminist
+
+Fernanda runs a women's collective focused on reproductive rights in Brazil, where abortion is illegal.
+
+Fernanda and her colleagues built a website with information about abortion access, birth control, and other resources for people seeking reproductive information.
+
+If this website was linked back to them, they could be arrested--or worse.
+
+To protect themselves, Fernanda and her colleagues created the website using Tor **onion services**. Onion services not only protect them from being discovered as the operators of the server but also help protect visitors to their website by requiring they use Tor Browser.
+
+In fact, Fernanda uses **Tor Browser** for all of her web browsing just to be on the safe side.
+
+She also uses a Tor-powered app called **OnionShare** to send files to other activists securely and privately.
+
+### Reproductive rights activists like Fernanda are fighting for fundamental freedoms, and Tor helps power their resistance.
+
+---
+
+# 3. TOR FOR HUMAN RIGHTS
+
+### Water is life
+
+Jelani lives in a small village which a wide river runs through.
+
+This river has provided water to his community since the days of his ancestors.
+
+But today, Jelani’s river is threatened by powerful multinational companies drilling for oil in the region.
+
+Private security firms, paid for by these companies, use powerful surveillance mechanisms to monitor the online activities of Jelani and his neighbors in the village who are organizing to protect their sacred river.
+
+Jelani uses **Tor Browser** to prevent these companies from watching as he visits websites for international human rights protection and legal aid and writes blog posts about the resistance movement in his village.
+
+He also uses **OnionShare** and **SecureDrop** to securely send documents to journalists who are helping expose these human rights violations.
+
+All of this software uses Tor to help protect Jelani’s privacy.
+
+### Human rights activists like Jelani are fighting for justice in their communities, and Tor helps power their resistance.
+
+---
+
+# 4. TOR FOR ANTI-CENSORSHIP
+
+### Build bridges not walls
+
+Jean was traveling for the first time to a country far from his family.
+
+After arriving at a hotel, he opened his laptop.
+
+He was so exhausted that when the message "Connection has timed out" first appeared on his web browser, he thought it was due to his own error.
+
+But after trying again and again, he realized that his email provider, a news website, and many apps were unavailable.
+
+He had heard that this country censors the internet and wondered if that was happening.
+How could he contact his family from behind this impenetrable wall?
+After doing some web searches, he found a forum and read about VPNs, private services that allow you to connect to another uncensored network.
+
+Jean spent half an hour trying to figure out which cheap VPN was best.
+
+He chose one and for a moment it seemed to work, but after five minutes the connection went offline and the VPN would no longer connect.
+
+Jean kept reading to find other options and learned about Tor Browser and how it can circumvent censorship.
+
+He found an official website mirror to download the program.
+
+When he opened **Tor Browser**, he followed the prompts for censored users and connected to a bridge which allowed him to access the internet again.
+
+With Tor Browser, Jean can browse freely and privately and contact his family.
+
+### Censored users all over the world rely on Tor Browser for a free, stable, and uncensored way to access the internet.
+
+---
+
+# 5. Shared Sections
+
+## What is Tor?
+
+Tor is free software and an open network that helps protect you from tracking, surveillance, and censorship online.
+Tor is created for free by a 501(c)3 U.S.-based nonprofit called the Tor Project.
+
+The easiest way to use Tor is Tor Browser.
+When you use Tor Browser, no one can see what websites you visit or where in the world you’re coming from.
+
+Other applications, like SecureDrop and OnionShare, use Tor to protect their users against surveillance and censorship.
+
+
+## 6. How does Tor work?
+
+Amal wants to visit Bekele’s website privately, so she opens Tor Browser.
+
+Tor Browser selects a random circuit of three relays, which are computers all over the world configured to route traffic over the Tor network.
+
+Tor Browser then encrypts her website request three times and sends it to the first Tor relay in her circuit.
+
+The first relay removes the first encryption layer but doesn't learn that the destination is Bekele’s website.
+
+The first relay learns only the next location in the circuit, which is the second relay.
+
+The second relay removes another encryption layer and forwards the web page request to the third relay.
+
+The third relay removes the last encryption layer and forwards the web page request to its destination, Bekele’s website, but it doesn't know the request comes from Amal.
+
+Bekele doesn't know that the website request came from Amal unless she tells him so.
+
+## 7. Who uses Tor?
+
+People all over the world use Tor to protect their privacy and access the web freely.
+
+Tor helps protect journalists, human rights defenders, domestic violence victims, academic researchers, and anyone experiencing tracking, censorship, or surveillance.
+
+## 6. Why trust Tor?
+
+Tor is designed for privacy. We don’t know who our users are, and we don't keep logs of user activity.
+
+Tor relay operators cannot reveal the true identity of Tor users.
+
+Continual peer review of Tor's source code by academic and open source communities ensures that there are no backdoors in Tor, and our social contract promises that we will never backdoor Tor.
+
+## 7. Join the Tor community
+
+Tor is made possible by a diverse set of users, developers, relay operators, and advocates from around the world.
+
+We need your help to make Tor more usable and secure for people everywhere.
+
+You can volunteer with Tor by writing code, running a relay, creating documentation, offering user support, or telling people in your community about Tor.
+
+The Tor community is governed by a code of conduct, and we outline our set of promises to the community in our social contract.
+
+Learn more about Tor by visiting our website, our wiki, finding us on IRC, joining one of our mailing lists, or signing up for Tor News at newsletter.torproject.org.
+
+
+## 8. Download Tor
+
+Tor for Desktop
+torproject.org/download
+
+TOR ON MOBILE
+### Android
+Tor Browser for Android is available from GooglePlay.
+
+### iOS
+Onion Browser, developed by M. Tigas, is the only browser we recommend for iOS.
+
diff --git a/mn.po b/mn.po
new file mode 100644
index 000000000..6c8fce0dc
--- /dev/null
+++ b/mn.po
@@ -0,0 +1,162 @@
+# Tor Outreach Material 2019-2020
+
+# 1. TOR FOR PRIVACY
+
+### Privacy is a human right
+
+Like many of us, Aleisha spends most of her time online--connecting with friends, posting on social media, and browsing the web.
+
+But lately, she's noticed that advertisements related to her previous searches are following her around online.
+
+This feels so invasive that she does some research on online ads and learns that it's not just advertisers tracking her but also her ISP, analytics companies, social media platforms, and more.
+
+Aleisha decides she wants to find and use software that doesn't collect her data, doesn't track her, and doesn't tell other services anything private about her.
+
+She goes to a privacy training at a local hackerspace and learns about **Tor Browser**, the only web browser that allows her to browse anonymously.
+
+---
+
+# 2.TOR FOR FEMINISTS
+
+### The future is cyberfeminist
+
+Fernanda runs a women's collective focused on reproductive rights in Brazil, where abortion is illegal.
+
+Fernanda and her colleagues built a website with information about abortion access, birth control, and other resources for people seeking reproductive information.
+
+If this website was linked back to them, they could be arrested--or worse.
+
+To protect themselves, Fernanda and her colleagues created the website using Tor **onion services**. Onion services not only protect them from being discovered as the operators of the server but also help protect visitors to their website by requiring they use Tor Browser.
+
+In fact, Fernanda uses **Tor Browser** for all of her web browsing just to be on the safe side.
+
+She also uses a Tor-powered app called **OnionShare** to send files to other activists securely and privately.
+
+### Reproductive rights activists like Fernanda are fighting for fundamental freedoms, and Tor helps power their resistance.
+
+---
+
+# 3. TOR FOR HUMAN RIGHTS
+
+### Water is life
+
+Jelani lives in a small village which a wide river runs through.
+
+This river has provided water to his community since the days of his ancestors.
+
+But today, Jelani’s river is threatened by powerful multinational companies drilling for oil in the region.
+
+Private security firms, paid for by these companies, use powerful surveillance mechanisms to monitor the online activities of Jelani and his neighbors in the village who are organizing to protect their sacred river.
+
+Jelani uses **Tor Browser** to prevent these companies from watching as he visits websites for international human rights protection and legal aid and writes blog posts about the resistance movement in his village.
+
+He also uses **OnionShare** and **SecureDrop** to securely send documents to journalists who are helping expose these human rights violations.
+
+All of this software uses Tor to help protect Jelani’s privacy.
+
+### Human rights activists like Jelani are fighting for justice in their communities, and Tor helps power their resistance.
+
+---
+
+# 4. TOR FOR ANTI-CENSORSHIP
+
+### Build bridges not walls
+
+Jean was traveling for the first time to a country far from his family.
+
+After arriving at a hotel, he opened his laptop.
+
+He was so exhausted that when the message "Connection has timed out" first appeared on his web browser, he thought it was due to his own error.
+
+But after trying again and again, he realized that his email provider, a news website, and many apps were unavailable.
+
+He had heard that this country censors the internet and wondered if that was happening.
+How could he contact his family from behind this impenetrable wall?
+After doing some web searches, he found a forum and read about VPNs, private services that allow you to connect to another uncensored network.
+
+Jean spent half an hour trying to figure out which cheap VPN was best.
+
+He chose one and for a moment it seemed to work, but after five minutes the connection went offline and the VPN would no longer connect.
+
+Jean kept reading to find other options and learned about Tor Browser and how it can circumvent censorship.
+
+He found an official website mirror to download the program.
+
+When he opened **Tor Browser**, he followed the prompts for censored users and connected to a bridge which allowed him to access the internet again.
+
+With Tor Browser, Jean can browse freely and privately and contact his family.
+
+### Censored users all over the world rely on Tor Browser for a free, stable, and uncensored way to access the internet.
+
+---
+
+# 5. Shared Sections
+
+## What is Tor?
+
+Tor is free software and an open network that helps protect you from tracking, surveillance, and censorship online.
+Tor is created for free by a 501(c)3 U.S.-based nonprofit called the Tor Project.
+
+The easiest way to use Tor is Tor Browser.
+When you use Tor Browser, no one can see what websites you visit or where in the world you’re coming from.
+
+Other applications, like SecureDrop and OnionShare, use Tor to protect their users against surveillance and censorship.
+
+
+## 6. How does Tor work?
+
+Amal wants to visit Bekele’s website privately, so she opens Tor Browser.
+
+Tor Browser selects a random circuit of three relays, which are computers all over the world configured to route traffic over the Tor network.
+
+Tor Browser then encrypts her website request three times and sends it to the first Tor relay in her circuit.
+
+The first relay removes the first encryption layer but doesn't learn that the destination is Bekele’s website.
+
+The first relay learns only the next location in the circuit, which is the second relay.
+
+The second relay removes another encryption layer and forwards the web page request to the third relay.
+
+The third relay removes the last encryption layer and forwards the web page request to its destination, Bekele’s website, but it doesn't know the request comes from Amal.
+
+Bekele doesn't know that the website request came from Amal unless she tells him so.
+
+## 7. Who uses Tor?
+
+People all over the world use Tor to protect their privacy and access the web freely.
+
+Tor helps protect journalists, human rights defenders, domestic violence victims, academic researchers, and anyone experiencing tracking, censorship, or surveillance.
+
+## 6. Why trust Tor?
+
+Tor is designed for privacy. We don’t know who our users are, and we don't keep logs of user activity.
+
+Tor relay operators cannot reveal the true identity of Tor users.
+
+Continual peer review of Tor's source code by academic and open source communities ensures that there are no backdoors in Tor, and our social contract promises that we will never backdoor Tor.
+
+## 7. Join the Tor community
+
+Tor is made possible by a diverse set of users, developers, relay operators, and advocates from around the world.
+
+We need your help to make Tor more usable and secure for people everywhere.
+
+You can volunteer with Tor by writing code, running a relay, creating documentation, offering user support, or telling people in your community about Tor.
+
+The Tor community is governed by a code of conduct, and we outline our set of promises to the community in our social contract.
+
+Learn more about Tor by visiting our website, our wiki, finding us on IRC, joining one of our mailing lists, or signing up for Tor News at newsletter.torproject.org.
+
+
+## 8. Download Tor
+
+Tor for Desktop
+torproject.org/download
+
+TOR ON MOBILE
+### Android
+Tor Browser for Android is available from GooglePlay.
+
+### iOS
+Onion Browser, developed by M. Tigas, is the only browser we recommend for iOS.
+
diff --git a/mr.po b/mr.po
new file mode 100644
index 000000000..6c8fce0dc
--- /dev/null
+++ b/mr.po
@@ -0,0 +1,162 @@
+# Tor Outreach Material 2019-2020
+
+# 1. TOR FOR PRIVACY
+
+### Privacy is a human right
+
+Like many of us, Aleisha spends most of her time online--connecting with friends, posting on social media, and browsing the web.
+
+But lately, she's noticed that advertisements related to her previous searches are following her around online.
+
+This feels so invasive that she does some research on online ads and learns that it's not just advertisers tracking her but also her ISP, analytics companies, social media platforms, and more.
+
+Aleisha decides she wants to find and use software that doesn't collect her data, doesn't track her, and doesn't tell other services anything private about her.
+
+She goes to a privacy training at a local hackerspace and learns about **Tor Browser**, the only web browser that allows her to browse anonymously.
+
+---
+
+# 2.TOR FOR FEMINISTS
+
+### The future is cyberfeminist
+
+Fernanda runs a women's collective focused on reproductive rights in Brazil, where abortion is illegal.
+
+Fernanda and her colleagues built a website with information about abortion access, birth control, and other resources for people seeking reproductive information.
+
+If this website was linked back to them, they could be arrested--or worse.
+
+To protect themselves, Fernanda and her colleagues created the website using Tor **onion services**. Onion services not only protect them from being discovered as the operators of the server but also help protect visitors to their website by requiring they use Tor Browser.
+
+In fact, Fernanda uses **Tor Browser** for all of her web browsing just to be on the safe side.
+
+She also uses a Tor-powered app called **OnionShare** to send files to other activists securely and privately.
+
+### Reproductive rights activists like Fernanda are fighting for fundamental freedoms, and Tor helps power their resistance.
+
+---
+
+# 3. TOR FOR HUMAN RIGHTS
+
+### Water is life
+
+Jelani lives in a small village which a wide river runs through.
+
+This river has provided water to his community since the days of his ancestors.
+
+But today, Jelani’s river is threatened by powerful multinational companies drilling for oil in the region.
+
+Private security firms, paid for by these companies, use powerful surveillance mechanisms to monitor the online activities of Jelani and his neighbors in the village who are organizing to protect their sacred river.
+
+Jelani uses **Tor Browser** to prevent these companies from watching as he visits websites for international human rights protection and legal aid and writes blog posts about the resistance movement in his village.
+
+He also uses **OnionShare** and **SecureDrop** to securely send documents to journalists who are helping expose these human rights violations.
+
+All of this software uses Tor to help protect Jelani’s privacy.
+
+### Human rights activists like Jelani are fighting for justice in their communities, and Tor helps power their resistance.
+
+---
+
+# 4. TOR FOR ANTI-CENSORSHIP
+
+### Build bridges not walls
+
+Jean was traveling for the first time to a country far from his family.
+
+After arriving at a hotel, he opened his laptop.
+
+He was so exhausted that when the message "Connection has timed out" first appeared on his web browser, he thought it was due to his own error.
+
+But after trying again and again, he realized that his email provider, a news website, and many apps were unavailable.
+
+He had heard that this country censors the internet and wondered if that was happening.
+How could he contact his family from behind this impenetrable wall?
+After doing some web searches, he found a forum and read about VPNs, private services that allow you to connect to another uncensored network.
+
+Jean spent half an hour trying to figure out which cheap VPN was best.
+
+He chose one and for a moment it seemed to work, but after five minutes the connection went offline and the VPN would no longer connect.
+
+Jean kept reading to find other options and learned about Tor Browser and how it can circumvent censorship.
+
+He found an official website mirror to download the program.
+
+When he opened **Tor Browser**, he followed the prompts for censored users and connected to a bridge which allowed him to access the internet again.
+
+With Tor Browser, Jean can browse freely and privately and contact his family.
+
+### Censored users all over the world rely on Tor Browser for a free, stable, and uncensored way to access the internet.
+
+---
+
+# 5. Shared Sections
+
+## What is Tor?
+
+Tor is free software and an open network that helps protect you from tracking, surveillance, and censorship online.
+Tor is created for free by a 501(c)3 U.S.-based nonprofit called the Tor Project.
+
+The easiest way to use Tor is Tor Browser.
+When you use Tor Browser, no one can see what websites you visit or where in the world you’re coming from.
+
+Other applications, like SecureDrop and OnionShare, use Tor to protect their users against surveillance and censorship.
+
+
+## 6. How does Tor work?
+
+Amal wants to visit Bekele’s website privately, so she opens Tor Browser.
+
+Tor Browser selects a random circuit of three relays, which are computers all over the world configured to route traffic over the Tor network.
+
+Tor Browser then encrypts her website request three times and sends it to the first Tor relay in her circuit.
+
+The first relay removes the first encryption layer but doesn't learn that the destination is Bekele’s website.
+
+The first relay learns only the next location in the circuit, which is the second relay.
+
+The second relay removes another encryption layer and forwards the web page request to the third relay.
+
+The third relay removes the last encryption layer and forwards the web page request to its destination, Bekele’s website, but it doesn't know the request comes from Amal.
+
+Bekele doesn't know that the website request came from Amal unless she tells him so.
+
+## 7. Who uses Tor?
+
+People all over the world use Tor to protect their privacy and access the web freely.
+
+Tor helps protect journalists, human rights defenders, domestic violence victims, academic researchers, and anyone experiencing tracking, censorship, or surveillance.
+
+## 6. Why trust Tor?
+
+Tor is designed for privacy. We don’t know who our users are, and we don't keep logs of user activity.
+
+Tor relay operators cannot reveal the true identity of Tor users.
+
+Continual peer review of Tor's source code by academic and open source communities ensures that there are no backdoors in Tor, and our social contract promises that we will never backdoor Tor.
+
+## 7. Join the Tor community
+
+Tor is made possible by a diverse set of users, developers, relay operators, and advocates from around the world.
+
+We need your help to make Tor more usable and secure for people everywhere.
+
+You can volunteer with Tor by writing code, running a relay, creating documentation, offering user support, or telling people in your community about Tor.
+
+The Tor community is governed by a code of conduct, and we outline our set of promises to the community in our social contract.
+
+Learn more about Tor by visiting our website, our wiki, finding us on IRC, joining one of our mailing lists, or signing up for Tor News at newsletter.torproject.org.
+
+
+## 8. Download Tor
+
+Tor for Desktop
+torproject.org/download
+
+TOR ON MOBILE
+### Android
+Tor Browser for Android is available from GooglePlay.
+
+### iOS
+Onion Browser, developed by M. Tigas, is the only browser we recommend for iOS.
+
diff --git a/ms_MY.po b/ms_MY.po
new file mode 100644
index 000000000..c5ffc766e
--- /dev/null
+++ b/ms_MY.po
@@ -0,0 +1,162 @@
+# Tor Outreach Material 2019-2020
+
+# 1. TOR FOR PRIVACY
+
+### Privacy is a human right
+
+Like many of us, Aleisha spends most of her time online--connecting with friends, posting on social media, and browsing the web.
+
+But lately, she's noticed that advertisements related to her previous searches are following her around online.
+
+This feels so invasive that she does some research on online ads and learns that it's not just advertisers tracking her but also her ISP, analytics companies, social media platforms, and more.
+
+Aleisha decides she wants to find and use software that doesn't collect her data, doesn't track her, and doesn't tell other services anything private about her.
+
+She goes to a privacy training at a local hackerspace and learns about **Tor Browser**, the only web browser that allows her to browse anonymously.
+
+---
+
+# 2.TOR FOR FEMINISTS
+
+### The future is cyberfeminist
+
+Fernanda runs a women's collective focused on reproductive rights in Brazil, where abortion is illegal.
+
+Fernanda and her colleagues built a website with information about abortion access, birth control, and other resources for people seeking reproductive information.
+
+If this website was linked back to them, they could be arrested--or worse.
+
+To protect themselves, Fernanda and her colleagues created the website using Tor **onion services**. Onion services not only protect them from being discovered as the operators of the server but also help protect visitors to their website by requiring they use Tor Browser.
+
+In fact, Fernanda uses **Tor Browser** for all of her web browsing just to be on the safe side.
+
+She also uses a Tor-powered app called **OnionShare** to send files to other activists securely and privately.
+
+### Reproductive rights activists like Fernanda are fighting for fundamental freedoms, and Tor helps power their resistance.
+
+---
+
+# 3. TOR FOR HUMAN RIGHTS
+
+### Water is life
+
+Jelani lives in a small village which a wide river runs through.
+
+This river has provided water to his community since the days of his ancestors.
+
+But today, Jelani’s river is threatened by powerful multinational companies drilling for oil in the region.
+
+Private security firms, paid for by these companies, use powerful surveillance mechanisms to monitor the online activities of Jelani and his neighbors in the village who are organizing to protect their sacred river.
+
+Jelani uses **Tor Browser** to prevent these companies from watching as he visits websites for international human rights protection and legal aid and writes blog posts about the resistance movement in his village.
+
+He also uses **OnionShare** and **SecureDrop** to securely send documents to journalists who are helping expose these human rights violations.
+
+All of this software uses Tor to help protect Jelani’s privacy.
+
+### Human rights activists like Jelani are fighting for justice in their communities, and Tor helps power their resistance.
+
+---
+
+# 4. TOR FOR ANTI-CENSORSHIP
+
+### Build bridges not walls
+
+Jean was traveling for the first time to a country far from his family.
+
+After arriving at a hotel, he opened his laptop.
+
+He was so exhausted that when the message "Connection has timed out" first appeared on his web browser, he thought it was due to his own error.
+
+But after trying again and again, he realized that his email provider, a news website, and many apps were unavailable.
+
+He had heard that this country censors the internet and wondered if that was happening.
+How could he contact his family from behind this impenetrable wall?
+After doing some web searches, he found a forum and read about VPNs, private services that allow you to connect to another uncensored network.
+
+Jean spent half an hour trying to figure out which cheap VPN was best.
+
+He chose one and for a moment it seemed to work, but after five minutes the connection went offline and the VPN would no longer connect.
+
+Jean kept reading to find other options and learned about Tor Browser and how it can circumvent censorship.
+
+He found an official website mirror to download the program.
+
+When he opened **Tor Browser**, he followed the prompts for censored users and connected to a bridge which allowed him to access the internet again.
+
+With Tor Browser, Jean can browse freely and privately and contact his family.
+
+### Censored users all over the world rely on Tor Browser for a free, stable, and uncensored way to access the internet.
+
+---
+
+# 5. Shared Sections
+
+## Apakah Tor?
+
+Tor is free software and an open network that helps protect you from tracking, surveillance, and censorship online.
+Tor is created for free by a 501(c)3 U.S.-based nonprofit called the Tor Project.
+
+The easiest way to use Tor is Tor Browser.
+When you use Tor Browser, no one can see what websites you visit or where in the world you’re coming from.
+
+Other applications, like SecureDrop and OnionShare, use Tor to protect their users against surveillance and censorship.
+
+
+## 6. How does Tor work?
+
+Amal wants to visit Bekele’s website privately, so she opens Tor Browser.
+
+Tor Browser selects a random circuit of three relays, which are computers all over the world configured to route traffic over the Tor network.
+
+Tor Browser then encrypts her website request three times and sends it to the first Tor relay in her circuit.
+
+The first relay removes the first encryption layer but doesn't learn that the destination is Bekele’s website.
+
+The first relay learns only the next location in the circuit, which is the second relay.
+
+The second relay removes another encryption layer and forwards the web page request to the third relay.
+
+The third relay removes the last encryption layer and forwards the web page request to its destination, Bekele’s website, but it doesn't know the request comes from Amal.
+
+Bekele doesn't know that the website request came from Amal unless she tells him so.
+
+## 7. Who uses Tor?
+
+People all over the world use Tor to protect their privacy and access the web freely.
+
+Tor helps protect journalists, human rights defenders, domestic violence victims, academic researchers, and anyone experiencing tracking, censorship, or surveillance.
+
+## 6. Why trust Tor?
+
+Tor is designed for privacy. We don’t know who our users are, and we don't keep logs of user activity.
+
+Tor relay operators cannot reveal the true identity of Tor users.
+
+Continual peer review of Tor's source code by academic and open source communities ensures that there are no backdoors in Tor, and our social contract promises that we will never backdoor Tor.
+
+## 7. Join the Tor community
+
+Tor is made possible by a diverse set of users, developers, relay operators, and advocates from around the world.
+
+We need your help to make Tor more usable and secure for people everywhere.
+
+You can volunteer with Tor by writing code, running a relay, creating documentation, offering user support, or telling people in your community about Tor.
+
+The Tor community is governed by a code of conduct, and we outline our set of promises to the community in our social contract.
+
+Learn more about Tor by visiting our website, our wiki, finding us on IRC, joining one of our mailing lists, or signing up for Tor News at newsletter.torproject.org.
+
+
+## 8. Download Tor
+
+Tor for Desktop
+torproject.org/download
+
+TOR ON MOBILE
+### Android
+Tor Browser for Android is available from GooglePlay.
+
+### iOS
+Onion Browser, developed by M. Tigas, is the only browser we recommend for iOS.
+
diff --git a/mt.po b/mt.po
new file mode 100644
index 000000000..6c8fce0dc
--- /dev/null
+++ b/mt.po
@@ -0,0 +1,162 @@
+# Tor Outreach Material 2019-2020
+
+# 1. TOR FOR PRIVACY
+
+### Privacy is a human right
+
+Like many of us, Aleisha spends most of her time online--connecting with friends, posting on social media, and browsing the web.
+
+But lately, she's noticed that advertisements related to her previous searches are following her around online.
+
+This feels so invasive that she does some research on online ads and learns that it's not just advertisers tracking her but also her ISP, analytics companies, social media platforms, and more.
+
+Aleisha decides she wants to find and use software that doesn't collect her data, doesn't track her, and doesn't tell other services anything private about her.
+
+She goes to a privacy training at a local hackerspace and learns about **Tor Browser**, the only web browser that allows her to browse anonymously.
+
+---
+
+# 2.TOR FOR FEMINISTS
+
+### The future is cyberfeminist
+
+Fernanda runs a women's collective focused on reproductive rights in Brazil, where abortion is illegal.
+
+Fernanda and her colleagues built a website with information about abortion access, birth control, and other resources for people seeking reproductive information.
+
+If this website was linked back to them, they could be arrested--or worse.
+
+To protect themselves, Fernanda and her colleagues created the website using Tor **onion services**. Onion services not only protect them from being discovered as the operators of the server but also help protect visitors to their website by requiring they use Tor Browser.
+
+In fact, Fernanda uses **Tor Browser** for all of her web browsing just to be on the safe side.
+
+She also uses a Tor-powered app called **OnionShare** to send files to other activists securely and privately.
+
+### Reproductive rights activists like Fernanda are fighting for fundamental freedoms, and Tor helps power their resistance.
+
+---
+
+# 3. TOR FOR HUMAN RIGHTS
+
+### Water is life
+
+Jelani lives in a small village which a wide river runs through.
+
+This river has provided water to his community since the days of his ancestors.
+
+But today, Jelani’s river is threatened by powerful multinational companies drilling for oil in the region.
+
+Private security firms, paid for by these companies, use powerful surveillance mechanisms to monitor the online activities of Jelani and his neighbors in the village who are organizing to protect their sacred river.
+
+Jelani uses **Tor Browser** to prevent these companies from watching as he visits websites for international human rights protection and legal aid and writes blog posts about the resistance movement in his village.
+
+He also uses **OnionShare** and **SecureDrop** to securely send documents to journalists who are helping expose these human rights violations.
+
+All of this software uses Tor to help protect Jelani’s privacy.
+
+### Human rights activists like Jelani are fighting for justice in their communities, and Tor helps power their resistance.
+
+---
+
+# 4. TOR FOR ANTI-CENSORSHIP
+
+### Build bridges not walls
+
+Jean was traveling for the first time to a country far from his family.
+
+After arriving at a hotel, he opened his laptop.
+
+He was so exhausted that when the message "Connection has timed out" first appeared on his web browser, he thought it was due to his own error.
+
+But after trying again and again, he realized that his email provider, a news website, and many apps were unavailable.
+
+He had heard that this country censors the internet and wondered if that was happening.
+How could he contact his family from behind this impenetrable wall?
+After doing some web searches, he found a forum and read about VPNs, private services that allow you to connect to another uncensored network.
+
+Jean spent half an hour trying to figure out which cheap VPN was best.
+
+He chose one and for a moment it seemed to work, but after five minutes the connection went offline and the VPN would no longer connect.
+
+Jean kept reading to find other options and learned about Tor Browser and how it can circumvent censorship.
+
+He found an official website mirror to download the program.
+
+When he opened **Tor Browser**, he followed the prompts for censored users and connected to a bridge which allowed him to access the internet again.
+
+With Tor Browser, Jean can browse freely and privately and contact his family.
+
+### Censored users all over the world rely on Tor Browser for a free, stable, and uncensored way to access the internet.
+
+---
+
+# 5. Shared Sections
+
+## What is Tor?
+
+Tor is free software and an open network that helps protect you from tracking, surveillance, and censorship online.
+Tor is created for free by a 501(c)3 U.S.-based nonprofit called the Tor Project.
+
+The easiest way to use Tor is Tor Browser.
+When you use Tor Browser, no one can see what websites you visit or where in the world you’re coming from.
+
+Other applications, like SecureDrop and OnionShare, use Tor to protect their users against surveillance and censorship.
+
+
+## 6. How does Tor work?
+
+Amal wants to visit Bekele’s website privately, so she opens Tor Browser.
+
+Tor Browser selects a random circuit of three relays, which are computers all over the world configured to route traffic over the Tor network.
+
+Tor Browser then encrypts her website request three times and sends it to the first Tor relay in her circuit.
+
+The first relay removes the first encryption layer but doesn't learn that the destination is Bekele’s website.
+
+The first relay learns only the next location in the circuit, which is the second relay.
+
+The second relay removes another encryption layer and forwards the web page request to the third relay.
+
+The third relay removes the last encryption layer and forwards the web page request to its destination, Bekele’s website, but it doesn't know the request comes from Amal.
+
+Bekele doesn't know that the website request came from Amal unless she tells him so.
+
+## 7. Who uses Tor?
+
+People all over the world use Tor to protect their privacy and access the web freely.
+
+Tor helps protect journalists, human rights defenders, domestic violence victims, academic researchers, and anyone experiencing tracking, censorship, or surveillance.
+
+## 6. Why trust Tor?
+
+Tor is designed for privacy. We don’t know who our users are, and we don't keep logs of user activity.
+
+Tor relay operators cannot reveal the true identity of Tor users.
+
+Continual peer review of Tor's source code by academic and open source communities ensures that there are no backdoors in Tor, and our social contract promises that we will never backdoor Tor.
+
+## 7. Join the Tor community
+
+Tor is made possible by a diverse set of users, developers, relay operators, and advocates from around the world.
+
+We need your help to make Tor more usable and secure for people everywhere.
+
+You can volunteer with Tor by writing code, running a relay, creating documentation, offering user support, or telling people in your community about Tor.
+
+The Tor community is governed by a code of conduct, and we outline our set of promises to the community in our social contract.
+
+Learn more about Tor by visiting our website, our wiki, finding us on IRC, joining one of our mailing lists, or signing up for Tor News at newsletter.torproject.org.
+
+
+## 8. Download Tor
+
+Tor for Desktop
+torproject.org/download
+
+TOR ON MOBILE
+### Android
+Tor Browser for Android is available from GooglePlay.
+
+### iOS
+Onion Browser, developed by M. Tigas, is the only browser we recommend for iOS.
+
diff --git a/my.po b/my.po
new file mode 100644
index 000000000..a93970c61
--- /dev/null
+++ b/my.po
@@ -0,0 +1,162 @@
+# Tor Outreach Material 2019-2020
+
+# 1. TOR FOR PRIVACY
+
+### Privacy is a human right
+
+Like many of us, Aleisha spends most of her time online--connecting with friends, posting on social media, and browsing the web.
+
+But lately, she's noticed that advertisements related to her previous searches are following her around online.
+
+This feels so invasive that she does some research on online ads and learns that it's not just advertisers tracking her but also her ISP, analytics companies, social media platforms, and more.
+
+Aleisha decides she wants to find and use software that doesn't collect her data, doesn't track her, and doesn't tell other services anything private about her.
+
+She goes to a privacy training at a local hackerspace and learns about **Tor Browser**, the only web browser that allows her to browse anonymously.
+
+---
+
+# 2.TOR FOR FEMINISTS
+
+### The future is cyberfeminist
+
+Fernanda runs a women's collective focused on reproductive rights in Brazil, where abortion is illegal.
+
+Fernanda and her colleagues built a website with information about abortion access, birth control, and other resources for people seeking reproductive information.
+
+If this website was linked back to them, they could be arrested--or worse.
+
+To protect themselves, Fernanda and her colleagues created the website using Tor **onion services**. Onion services not only protect them from being discovered as the operators of the server but also help protect visitors to their website by requiring they use Tor Browser.
+
+In fact, Fernanda uses **Tor Browser** for all of her web browsing just to be on the safe side.
+
+She also uses a Tor-powered app called **OnionShare** to send files to other activists securely and privately.
+
+### Reproductive rights activists like Fernanda are fighting for fundamental freedoms, and Tor helps power their resistance.
+
+---
+
+# 3. TOR FOR HUMAN RIGHTS
+
+### Water is life
+
+Jelani lives in a small village which a wide river runs through.
+
+This river has provided water to his community since the days of his ancestors.
+
+But today, Jelani’s river is threatened by powerful multinational companies drilling for oil in the region.
+
+Private security firms, paid for by these companies, use powerful surveillance mechanisms to monitor the online activities of Jelani and his neighbors in the village who are organizing to protect their sacred river.
+
+Jelani uses **Tor Browser** to prevent these companies from watching as he visits websites for international human rights protection and legal aid and writes blog posts about the resistance movement in his village.
+
+He also uses **OnionShare** and **SecureDrop** to securely send documents to journalists who are helping expose these human rights violations.
+
+All of this software uses Tor to help protect Jelani’s privacy.
+
+### Human rights activists like Jelani are fighting for justice in their communities, and Tor helps power their resistance.
+
+---
+
+# 4. TOR FOR ANTI-CENSORSHIP
+
+### Build bridges not walls
+
+Jean was traveling for the first time to a country far from his family.
+
+After arriving at a hotel, he opened his laptop.
+
+He was so exhausted that when the message "Connection has timed out" first appeared on his web browser, he thought it was due to his own error.
+
+But after trying again and again, he realized that his email provider, a news website, and many apps were unavailable.
+
+He had heard that this country censors the internet and wondered if that was happening.
+How could he contact his family from behind this impenetrable wall?
+After doing some web searches, he found a forum and read about VPNs, private services that allow you to connect to another uncensored network.
+
+Jean spent half an hour trying to figure out which cheap VPN was best.
+
+He chose one and for a moment it seemed to work, but after five minutes the connection went offline and the VPN would no longer connect.
+
+Jean kept reading to find other options and learned about Tor Browser and how it can circumvent censorship.
+
+He found an official website mirror to download the program.
+
+When he opened **Tor Browser**, he followed the prompts for censored users and connected to a bridge which allowed him to access the internet again.
+
+With Tor Browser, Jean can browse freely and privately and contact his family.
+
+### Censored users all over the world rely on Tor Browser for a free, stable, and uncensored way to access the internet.
+
+---
+
+# 5. Shared Sections
+
+## Tor ဆိုသည်မှာ အဘယ်နည်း?
+
+Tor is free software and an open network that helps protect you from tracking, surveillance, and censorship online.
+Tor is created for free by a 501(c)3 U.S.-based nonprofit called the Tor Project.
+
+The easiest way to use Tor is Tor Browser.
+When you use Tor Browser, no one can see what websites you visit or where in the world you’re coming from.
+
+Other applications, like SecureDrop and OnionShare, use Tor to protect their users against surveillance and censorship.
+
+
+## 6. How does Tor work?
+
+Amal wants to visit Bekele’s website privately, so she opens Tor Browser.
+
+Tor Browser selects a random circuit of three relays, which are computers all over the world configured to route traffic over the Tor network.
+
+Tor Browser then encrypts her website request three times and sends it to the first Tor relay in her circuit.
+
+The first relay removes the first encryption layer but doesn't learn that the destination is Bekele’s website.
+
+The first relay learns only the next location in the circuit, which is the second relay.
+
+The second relay removes another encryption layer and forwards the web page request to the third relay.
+
+The third relay removes the last encryption layer and forwards the web page request to its destination, Bekele’s website, but it doesn't know the request comes from Amal.
+
+Bekele doesn't know that the website request came from Amal unless she tells him so.
+
+## 7. Who uses Tor?
+
+People all over the world use Tor to protect their privacy and access the web freely.
+
+Tor helps protect journalists, human rights defenders, domestic violence victims, academic researchers, and anyone experiencing tracking, censorship, or surveillance.
+
+## 6. Why trust Tor?
+
+Tor is designed for privacy. We don’t know who our users are, and we don't keep logs of user activity.
+
+Tor relay operators cannot reveal the true identity of Tor users.
+
+Continual peer review of Tor's source code by academic and open source communities ensures that there are no backdoors in Tor, and our social contract promises that we will never backdoor Tor.
+
+## 7. Join the Tor community
+
+Tor is made possible by a diverse set of users, developers, relay operators, and advocates from around the world.
+
+We need your help to make Tor more usable and secure for people everywhere.
+
+You can volunteer with Tor by writing code, running a relay, creating documentation, offering user support, or telling people in your community about Tor.
+
+The Tor community is governed by a code of conduct, and we outline our set of promises to the community in our social contract.
+
+Learn more about Tor by visiting our website, our wiki, finding us on IRC, joining one of our mailing lists, or signing up for Tor News at newsletter.torproject.org.
+
+
+## 8. Download Tor
+
+Tor for Desktop
+torproject.org/download
+
+TOR ON MOBILE
+### Android
+Tor Browser for Android is available from GooglePlay.
+
+### iOS
+Onion Browser, developed by M. Tigas, is the only browser we recommend for iOS.
+
diff --git a/nb.po b/nb.po
new file mode 100644
index 000000000..322690959
--- /dev/null
+++ b/nb.po
@@ -0,0 +1,162 @@
+# Tor Outreach Material 2019-2020
+
+# 1. TOR FOR PRIVACY
+
+### Privacy is a human right
+
+Like many of us, Aleisha spends most of her time online--connecting with friends, posting on social media, and browsing the web.
+
+But lately, she's noticed that advertisements related to her previous searches are following her around online.
+
+This feels so invasive that she does some research on online ads and learns that it's not just advertisers tracking her but also her ISP, analytics companies, social media platforms, and more.
+
+Aleisha decides she wants to find and use software that doesn't collect her data, doesn't track her, and doesn't tell other services anything private about her.
+
+She goes to a privacy training at a local hackerspace and learns about **Tor Browser**, the only web browser that allows her to browse anonymously.
+
+---
+
+# 2.TOR FOR FEMINISTS
+
+### The future is cyberfeminist
+
+Fernanda runs a women's collective focused on reproductive rights in Brazil, where abortion is illegal.
+
+Fernanda and her colleagues built a website with information about abortion access, birth control, and other resources for people seeking reproductive information.
+
+If this website was linked back to them, they could be arrested--or worse.
+
+To protect themselves, Fernanda and her colleagues created the website using Tor **onion services**. Onion services not only protect them from being discovered as the operators of the server but also help protect visitors to their website by requiring they use Tor Browser.
+
+In fact, Fernanda uses **Tor Browser** for all of her web browsing just to be on the safe side.
+
+She also uses a Tor-powered app called **OnionShare** to send files to other activists securely and privately.
+
+### Reproductive rights activists like Fernanda are fighting for fundamental freedoms, and Tor helps power their resistance.
+
+---
+
+# 3. TOR FOR HUMAN RIGHTS
+
+### Water is life
+
+Jelani lives in a small village which a wide river runs through.
+
+This river has provided water to his community since the days of his ancestors.
+
+But today, Jelani’s river is threatened by powerful multinational companies drilling for oil in the region.
+
+Private security firms, paid for by these companies, use powerful surveillance mechanisms to monitor the online activities of Jelani and his neighbors in the village who are organizing to protect their sacred river.
+
+Jelani uses **Tor Browser** to prevent these companies from watching as he visits websites for international human rights protection and legal aid and writes blog posts about the resistance movement in his village.
+
+He also uses **OnionShare** and **SecureDrop** to securely send documents to journalists who are helping expose these human rights violations.
+
+All of this software uses Tor to help protect Jelani’s privacy.
+
+### Human rights activists like Jelani are fighting for justice in their communities, and Tor helps power their resistance.
+
+---
+
+# 4. TOR FOR ANTI-CENSORSHIP
+
+### Build bridges not walls
+
+Jean was traveling for the first time to a country far from his family.
+
+After arriving at a hotel, he opened his laptop.
+
+He was so exhausted that when the message "Connection has timed out" first appeared on his web browser, he thought it was due to his own error.
+
+But after trying again and again, he realized that his email provider, a news website, and many apps were unavailable.
+
+He had heard that this country censors the internet and wondered if that was happening.
+How could he contact his family from behind this impenetrable wall?
+After doing some web searches, he found a forum and read about VPNs, private services that allow you to connect to another uncensored network.
+
+Jean spent half an hour trying to figure out which cheap VPN was best.
+
+He chose one and for a moment it seemed to work, but after five minutes the connection went offline and the VPN would no longer connect.
+
+Jean kept reading to find other options and learned about Tor Browser and how it can circumvent censorship.
+
+He found an official website mirror to download the program.
+
+When he opened **Tor Browser**, he followed the prompts for censored users and connected to a bridge which allowed him to access the internet again.
+
+With Tor Browser, Jean can browse freely and privately and contact his family.
+
+### Censored users all over the world rely on Tor Browser for a free, stable, and uncensored way to access the internet.
+
+---
+
+# 5. Shared Sections
+
+## Hva er Tor?
+
+Tor is free software and an open network that helps protect you from tracking, surveillance, and censorship online.
+Tor is created for free by a 501(c)3 U.S.-based nonprofit called the Tor Project.
+
+The easiest way to use Tor is Tor Browser.
+When you use Tor Browser, no one can see what websites you visit or where in the world you’re coming from.
+
+Other applications, like SecureDrop and OnionShare, use Tor to protect their users against surveillance and censorship.
+
+
+## 6. How does Tor work?
+
+Amal wants to visit Bekele’s website privately, so she opens Tor Browser.
+
+Tor Browser selects a random circuit of three relays, which are computers all over the world configured to route traffic over the Tor network.
+
+Tor Browser then encrypts her website request three times and sends it to the first Tor relay in her circuit.
+
+The first relay removes the first encryption layer but doesn't learn that the destination is Bekele’s website.
+
+The first relay learns only the next location in the circuit, which is the second relay.
+
+The second relay removes another encryption layer and forwards the web page request to the third relay.
+
+The third relay removes the last encryption layer and forwards the web page request to its destination, Bekele’s website, but it doesn't know the request comes from Amal.
+
+Bekele doesn't know that the website request came from Amal unless she tells him so.
+
+## 7. Who uses Tor?
+
+People all over the world use Tor to protect their privacy and access the web freely.
+
+Tor helps protect journalists, human rights defenders, domestic violence victims, academic researchers, and anyone experiencing tracking, censorship, or surveillance.
+
+## 6. Why trust Tor?
+
+Tor is designed for privacy. We don’t know who our users are, and we don't keep logs of user activity.
+
+Tor relay operators cannot reveal the true identity of Tor users.
+
+Continual peer review of Tor's source code by academic and open source communities ensures that there are no backdoors in Tor, and our social contract promises that we will never backdoor Tor.
+
+## 7. Join the Tor community
+
+Tor is made possible by a diverse set of users, developers, relay operators, and advocates from around the world.
+
+We need your help to make Tor more usable and secure for people everywhere.
+
+You can volunteer with Tor by writing code, running a relay, creating documentation, offering user support, or telling people in your community about Tor.
+
+The Tor community is governed by a code of conduct, and we outline our set of promises to the community in our social contract.
+
+Learn more about Tor by visiting our website, our wiki, finding us on IRC, joining one of our mailing lists, or signing up for Tor News at newsletter.torproject.org.
+
+
+## 8. Download Tor
+
+Tor for Desktop
+torproject.org/download
+
+TOR ON MOBILE
+### Android
+Tor Browser for Android is available from GooglePlay.
+
+### iOS
+Onion Browser, developed by M. Tigas, is the only browser we recommend for iOS.
+
diff --git a/nds.po b/nds.po
new file mode 100644
index 000000000..6c8fce0dc
--- /dev/null
+++ b/nds.po
@@ -0,0 +1,162 @@
+# Tor Outreach Material 2019-2020
+
+# 1. TOR FOR PRIVACY
+
+### Privacy is a human right
+
+Like many of us, Aleisha spends most of her time online--connecting with friends, posting on social media, and browsing the web.
+
+But lately, she's noticed that advertisements related to her previous searches are following her around online.
+
+This feels so invasive that she does some research on online ads and learns that it's not just advertisers tracking her but also her ISP, analytics companies, social media platforms, and more.
+
+Aleisha decides she wants to find and use software that doesn't collect her data, doesn't track her, and doesn't tell other services anything private about her.
+
+She goes to a privacy training at a local hackerspace and learns about **Tor Browser**, the only web browser that allows her to browse anonymously.
+
+---
+
+# 2.TOR FOR FEMINISTS
+
+### The future is cyberfeminist
+
+Fernanda runs a women's collective focused on reproductive rights in Brazil, where abortion is illegal.
+
+Fernanda and her colleagues built a website with information about abortion access, birth control, and other resources for people seeking reproductive information.
+
+If this website was linked back to them, they could be arrested--or worse.
+
+To protect themselves, Fernanda and her colleagues created the website using Tor **onion services**. Onion services not only protect them from being discovered as the operators of the server but also help protect visitors to their website by requiring they use Tor Browser.
+
+In fact, Fernanda uses **Tor Browser** for all of her web browsing just to be on the safe side.
+
+She also uses a Tor-powered app called **OnionShare** to send files to other activists securely and privately.
+
+### Reproductive rights activists like Fernanda are fighting for fundamental freedoms, and Tor helps power their resistance.
+
+---
+
+# 3. TOR FOR HUMAN RIGHTS
+
+### Water is life
+
+Jelani lives in a small village which a wide river runs through.
+
+This river has provided water to his community since the days of his ancestors.
+
+But today, Jelani’s river is threatened by powerful multinational companies drilling for oil in the region.
+
+Private security firms, paid for by these companies, use powerful surveillance mechanisms to monitor the online activities of Jelani and his neighbors in the village who are organizing to protect their sacred river.
+
+Jelani uses **Tor Browser** to prevent these companies from watching as he visits websites for international human rights protection and legal aid and writes blog posts about the resistance movement in his village.
+
+He also uses **OnionShare** and **SecureDrop** to securely send documents to journalists who are helping expose these human rights violations.
+
+All of this software uses Tor to help protect Jelani’s privacy.
+
+### Human rights activists like Jelani are fighting for justice in their communities, and Tor helps power their resistance.
+
+---
+
+# 4. TOR FOR ANTI-CENSORSHIP
+
+### Build bridges not walls
+
+Jean was traveling for the first time to a country far from his family.
+
+After arriving at a hotel, he opened his laptop.
+
+He was so exhausted that when the message "Connection has timed out" first appeared on his web browser, he thought it was due to his own error.
+
+But after trying again and again, he realized that his email provider, a news website, and many apps were unavailable.
+
+He had heard that this country censors the internet and wondered if that was happening.
+How could he contact his family from behind this impenetrable wall?
+After doing some web searches, he found a forum and read about VPNs, private services that allow you to connect to another uncensored network.
+
+Jean spent half an hour trying to figure out which cheap VPN was best.
+
+He chose one and for a moment it seemed to work, but after five minutes the connection went offline and the VPN would no longer connect.
+
+Jean kept reading to find other options and learned about Tor Browser and how it can circumvent censorship.
+
+He found an official website mirror to download the program.
+
+When he opened **Tor Browser**, he followed the prompts for censored users and connected to a bridge which allowed him to access the internet again.
+
+With Tor Browser, Jean can browse freely and privately and contact his family.
+
+### Censored users all over the world rely on Tor Browser for a free, stable, and uncensored way to access the internet.
+
+---
+
+# 5. Shared Sections
+
+## What is Tor?
+
+Tor is free software and an open network that helps protect you from tracking, surveillance, and censorship online.
+Tor is created for free by a 501(c)3 U.S.-based nonprofit called the Tor Project.
+
+The easiest way to use Tor is Tor Browser.
+When you use Tor Browser, no one can see what websites you visit or where in the world you’re coming from.
+
+Other applications, like SecureDrop and OnionShare, use Tor to protect their users against surveillance and censorship.
+
+
+## 6. How does Tor work?
+
+Amal wants to visit Bekele’s website privately, so she opens Tor Browser.
+
+Tor Browser selects a random circuit of three relays, which are computers all over the world configured to route traffic over the Tor network.
+
+Tor Browser then encrypts her website request three times and sends it to the first Tor relay in her circuit.
+
+The first relay removes the first encryption layer but doesn't learn that the destination is Bekele’s website.
+
+The first relay learns only the next location in the circuit, which is the second relay.
+
+The second relay removes another encryption layer and forwards the web page request to the third relay.
+
+The third relay removes the last encryption layer and forwards the web page request to its destination, Bekele’s website, but it doesn't know the request comes from Amal.
+
+Bekele doesn't know that the website request came from Amal unless she tells him so.
+
+## 7. Who uses Tor?
+
+People all over the world use Tor to protect their privacy and access the web freely.
+
+Tor helps protect journalists, human rights defenders, domestic violence victims, academic researchers, and anyone experiencing tracking, censorship, or surveillance.
+
+## 6. Why trust Tor?
+
+Tor is designed for privacy. We don’t know who our users are, and we don't keep logs of user activity.
+
+Tor relay operators cannot reveal the true identity of Tor users.
+
+Continual peer review of Tor's source code by academic and open source communities ensures that there are no backdoors in Tor, and our social contract promises that we will never backdoor Tor.
+
+## 7. Join the Tor community
+
+Tor is made possible by a diverse set of users, developers, relay operators, and advocates from around the world.
+
+We need your help to make Tor more usable and secure for people everywhere.
+
+You can volunteer with Tor by writing code, running a relay, creating documentation, offering user support, or telling people in your community about Tor.
+
+The Tor community is governed by a code of conduct, and we outline our set of promises to the community in our social contract.
+
+Learn more about Tor by visiting our website, our wiki, finding us on IRC, joining one of our mailing lists, or signing up for Tor News at newsletter.torproject.org.
+
+
+## 8. Download Tor
+
+Tor for Desktop
+torproject.org/download
+
+TOR ON MOBILE
+### Android
+Tor Browser for Android is available from GooglePlay.
+
+### iOS
+Onion Browser, developed by M. Tigas, is the only browser we recommend for iOS.
+
diff --git a/ne.po b/ne.po
new file mode 100644
index 000000000..6c8fce0dc
--- /dev/null
+++ b/ne.po
@@ -0,0 +1,162 @@
+# Tor Outreach Material 2019-2020
+
+# 1. TOR FOR PRIVACY
+
+### Privacy is a human right
+
+Like many of us, Aleisha spends most of her time online--connecting with friends, posting on social media, and browsing the web.
+
+But lately, she's noticed that advertisements related to her previous searches are following her around online.
+
+This feels so invasive that she does some research on online ads and learns that it's not just advertisers tracking her but also her ISP, analytics companies, social media platforms, and more.
+
+Aleisha decides she wants to find and use software that doesn't collect her data, doesn't track her, and doesn't tell other services anything private about her.
+
+She goes to a privacy training at a local hackerspace and learns about **Tor Browser**, the only web browser that allows her to browse anonymously.
+
+---
+
+# 2.TOR FOR FEMINISTS
+
+### The future is cyberfeminist
+
+Fernanda runs a women's collective focused on reproductive rights in Brazil, where abortion is illegal.
+
+Fernanda and her colleagues built a website with information about abortion access, birth control, and other resources for people seeking reproductive information.
+
+If this website was linked back to them, they could be arrested--or worse.
+
+To protect themselves, Fernanda and her colleagues created the website using Tor **onion services**. Onion services not only protect them from being discovered as the operators of the server but also help protect visitors to their website by requiring they use Tor Browser.
+
+In fact, Fernanda uses **Tor Browser** for all of her web browsing just to be on the safe side.
+
+She also uses a Tor-powered app called **OnionShare** to send files to other activists securely and privately.
+
+### Reproductive rights activists like Fernanda are fighting for fundamental freedoms, and Tor helps power their resistance.
+
+---
+
+# 3. TOR FOR HUMAN RIGHTS
+
+### Water is life
+
+Jelani lives in a small village which a wide river runs through.
+
+This river has provided water to his community since the days of his ancestors.
+
+But today, Jelani’s river is threatened by powerful multinational companies drilling for oil in the region.
+
+Private security firms, paid for by these companies, use powerful surveillance mechanisms to monitor the online activities of Jelani and his neighbors in the village who are organizing to protect their sacred river.
+
+Jelani uses **Tor Browser** to prevent these companies from watching as he visits websites for international human rights protection and legal aid and writes blog posts about the resistance movement in his village.
+
+He also uses **OnionShare** and **SecureDrop** to securely send documents to journalists who are helping expose these human rights violations.
+
+All of this software uses Tor to help protect Jelani’s privacy.
+
+### Human rights activists like Jelani are fighting for justice in their communities, and Tor helps power their resistance.
+
+---
+
+# 4. TOR FOR ANTI-CENSORSHIP
+
+### Build bridges not walls
+
+Jean was traveling for the first time to a country far from his family.
+
+After arriving at a hotel, he opened his laptop.
+
+He was so exhausted that when the message "Connection has timed out" first appeared on his web browser, he thought it was due to his own error.
+
+But after trying again and again, he realized that his email provider, a news website, and many apps were unavailable.
+
+He had heard that this country censors the internet and wondered if that was happening.
+How could he contact his family from behind this impenetrable wall?
+After doing some web searches, he found a forum and read about VPNs, private services that allow you to connect to another uncensored network.
+
+Jean spent half an hour trying to figure out which cheap VPN was best.
+
+He chose one and for a moment it seemed to work, but after five minutes the connection went offline and the VPN would no longer connect.
+
+Jean kept reading to find other options and learned about Tor Browser and how it can circumvent censorship.
+
+He found an official website mirror to download the program.
+
+When he opened **Tor Browser**, he followed the prompts for censored users and connected to a bridge which allowed him to access the internet again.
+
+With Tor Browser, Jean can browse freely and privately and contact his family.
+
+### Censored users all over the world rely on Tor Browser for a free, stable, and uncensored way to access the internet.
+
+---
+
+# 5. Shared Sections
+
+## What is Tor?
+
+Tor is free software and an open network that helps protect you from tracking, surveillance, and censorship online.
+Tor is created for free by a 501(c)3 U.S.-based nonprofit called the Tor Project.
+
+The easiest way to use Tor is Tor Browser.
+When you use Tor Browser, no one can see what websites you visit or where in the world you’re coming from.
+
+Other applications, like SecureDrop and OnionShare, use Tor to protect their users against surveillance and censorship.
+
+
+## 6. How does Tor work?
+
+Amal wants to visit Bekele’s website privately, so she opens Tor Browser.
+
+Tor Browser selects a random circuit of three relays, which are computers all over the world configured to route traffic over the Tor network.
+
+Tor Browser then encrypts her website request three times and sends it to the first Tor relay in her circuit.
+
+The first relay removes the first encryption layer but doesn't learn that the destination is Bekele’s website.
+
+The first relay learns only the next location in the circuit, which is the second relay.
+
+The second relay removes another encryption layer and forwards the web page request to the third relay.
+
+The third relay removes the last encryption layer and forwards the web page request to its destination, Bekele’s website, but it doesn't know the request comes from Amal.
+
+Bekele doesn't know that the website request came from Amal unless she tells him so.
+
+## 7. Who uses Tor?
+
+People all over the world use Tor to protect their privacy and access the web freely.
+
+Tor helps protect journalists, human rights defenders, domestic violence victims, academic researchers, and anyone experiencing tracking, censorship, or surveillance.
+
+## 6. Why trust Tor?
+
+Tor is designed for privacy. We don’t know who our users are, and we don't keep logs of user activity.
+
+Tor relay operators cannot reveal the true identity of Tor users.
+
+Continual peer review of Tor's source code by academic and open source communities ensures that there are no backdoors in Tor, and our social contract promises that we will never backdoor Tor.
+
+## 7. Join the Tor community
+
+Tor is made possible by a diverse set of users, developers, relay operators, and advocates from around the world.
+
+We need your help to make Tor more usable and secure for people everywhere.
+
+You can volunteer with Tor by writing code, running a relay, creating documentation, offering user support, or telling people in your community about Tor.
+
+The Tor community is governed by a code of conduct, and we outline our set of promises to the community in our social contract.
+
+Learn more about Tor by visiting our website, our wiki, finding us on IRC, joining one of our mailing lists, or signing up for Tor News at newsletter.torproject.org.
+
+
+## 8. Download Tor
+
+Tor for Desktop
+torproject.org/download
+
+TOR ON MOBILE
+### Android
+Tor Browser for Android is available from GooglePlay.
+
+### iOS
+Onion Browser, developed by M. Tigas, is the only browser we recommend for iOS.
+
diff --git a/nl.po b/nl.po
new file mode 100644
index 000000000..bb03f5a92
--- /dev/null
+++ b/nl.po
@@ -0,0 +1,162 @@
+# Tor Outreach Material 2019-2020
+
+# 1. TOR FOR PRIVACY
+
+### Privacy is a human right
+
+Like many of us, Aleisha spends most of her time online--connecting with friends, posting on social media, and browsing the web.
+
+But lately, she's noticed that advertisements related to her previous searches are following her around online.
+
+This feels so invasive that she does some research on online ads and learns that it's not just advertisers tracking her but also her ISP, analytics companies, social media platforms, and more.
+
+Aleisha decides she wants to find and use software that doesn't collect her data, doesn't track her, and doesn't tell other services anything private about her.
+
+She goes to a privacy training at a local hackerspace and learns about **Tor Browser**, the only web browser that allows her to browse anonymously.
+
+tagged
+
+# 2.TOR FOR FEMINISTS
+
+### The future is cyberfeminist
+
+Fernanda runs a women's collective focused on reproductive rights in Brazil, where abortion is illegal.
+
+Fernanda and her colleagues built a website with information about abortion access, birth control, and other resources for people seeking reproductive information.
+
+If this website was linked back to them, they could be arrested--or worse.
+
+To protect themselves, Fernanda and her colleagues created the website using Tor **onion services**. Onion services not only protect them from being discovered as the operators of the server but also help protect visitors to their website by requiring they use Tor Browser.
+
+In fact, Fernanda uses **Tor Browser** for all of her web browsing just to be on the safe side.
+
+She also uses a Tor-powered app called **OnionShare** to send files to other activists securely and privately.
+
+### Reproductive rights activists like Fernanda are fighting for fundamental freedoms, and Tor helps power their resistance.
+
+tagged
+
+# 3. TOR FOR HUMAN RIGHTS
+
+### Water is life
+
+Jelani lives in a small village which a wide river runs through.
+
+This river has provided water to his community since the days of his ancestors.
+
+But today, Jelani’s river is threatened by powerful multinational companies drilling for oil in the region.
+
+Private security firms, paid for by these companies, use powerful surveillance mechanisms to monitor the online activities of Jelani and his neighbors in the village who are organizing to protect their sacred river.
+
+Jelani uses **Tor Browser** to prevent these companies from watching as he visits websites for international human rights protection and legal aid and writes blog posts about the resistance movement in his village.
+
+He also uses **OnionShare** and **SecureDrop** to securely send documents to journalists who are helping expose these human rights violations.
+
+All of this software uses Tor to help protect Jelani’s privacy.
+
+### Human rights activists like Jelani are fighting for justice in their communities, and Tor helps power their resistance.
+
+tagged
+
+# 4. TOR FOR ANTI-CENSORSHIP
+
+### Build bridges not walls
+
+Jean was traveling for the first time to a country far from his family.
+
+After arriving at a hotel, he opened his laptop.
+
+He was so exhausted that when the message "Connection has timed out" first appeared on his web browser, he thought it was due to his own error.
+
+But after trying again and again, he realized that his email provider, a news website, and many apps were unavailable.
+
+He had heard that this country censors the internet and wondered if that was happening.
+How could he contact his family from behind this impenetrable wall?
+After doing some web searches, he found a forum and read about VPNs, private services that allow you to connect to another uncensored network.
+
+Jean spent half an hour trying to figure out which cheap VPN was best.
+
+He chose one and for a moment it seemed to work, but after five minutes the connection went offline and the VPN would no longer connect.
+
+Jean kept reading to find other options and learned about Tor Browser and how it can circumvent censorship.
+
+He found an official website mirror to download the program.
+
+When he opened **Tor Browser**, he followed the prompts for censored users and connected to a bridge which allowed him to access the internet again.
+
+With Tor Browser, Jean can browse freely and privately and contact his family.
+
+### Censored users all over the world rely on Tor Browser for a free, stable, and uncensored way to access the internet.
+
+tagged
+
+# 5. Shared Sections
+
+## Wat is Tor?
+
+Tor is free software and an open network that helps protect you from tracking, surveillance, and censorship online.
+Tor is created for free by a 501(c)3 U.S.-based nonprofit called the Tor Project.
+
+The easiest way to use Tor is Tor Browser.
+When you use Tor Browser, no one can see what websites you visit or where in the world you’re coming from.
+
+Other applications, like SecureDrop and OnionShare, use Tor to protect their users against surveillance and censorship.
+
+
+## 6. How does Tor work?
+
+Amal wants to visit Bekele’s website privately, so she opens Tor Browser.
+
+Tor Browser selects a random circuit of three relays, which are computers all over the world configured to route traffic over the Tor network.
+
+Tor Browser then encrypts her website request three times and sends it to the first Tor relay in her circuit.
+
+The first relay removes the first encryption layer but doesn't learn that the destination is Bekele’s website.
+
+The first relay learns only the next location in the circuit, which is the second relay.
+
+The second relay removes another encryption layer and forwards the web page request to the third relay.
+
+The third relay removes the last encryption layer and forwards the web page request to its destination, Bekele’s website, but it doesn't know the request comes from Amal.
+
+Bekele doesn't know that the website request came from Amal unless she tells him so.
+
+## 7. Who uses Tor?
+
+People all over the world use Tor to protect their privacy and access the web freely.
+
+Tor helps protect journalists, human rights defenders, domestic violence victims, academic researchers, and anyone experiencing tracking, censorship, or surveillance.
+
+## 6. Why trust Tor?
+
+Tor is designed for privacy. We don’t know who our users are, and we don't keep logs of user activity.
+
+Tor relay operators cannot reveal the true identity of Tor users.
+
+Continual peer review of Tor's source code by academic and open source communities ensures that there are no backdoors in Tor, and our social contract promises that we will never backdoor Tor.
+
+## 7. Join the Tor community
+
+Tor is made possible by a diverse set of users, developers, relay operators, and advocates from around the world.
+
+We need your help to make Tor more usable and secure for people everywhere.
+
+You can volunteer with Tor by writing code, running a relay, creating documentation, offering user support, or telling people in your community about Tor.
+
+The Tor community is governed by a code of conduct, and we outline our set of promises to the community in our social contract.
+
+Learn more about Tor by visiting our website, our wiki, finding us on IRC, joining one of our mailing lists, or signing up for Tor News at newsletter.torproject.org.
+
+
+## 8. Download Tor
+
+Tor for Desktop
+torproject.org/download
+
+TOR ON MOBILE
+### Android
+Tor Browser for Android is available from GooglePlay.
+
+### iOS
+Onion Browser, developed by M. Tigas, is the only browser we recommend for iOS.
+
diff --git a/nn.po b/nn.po
new file mode 100644
index 000000000..e3395c80b
--- /dev/null
+++ b/nn.po
@@ -0,0 +1,162 @@
+# Tor Outreach Material 2019-2020
+
+# 1. TOR FOR PERSONVERN
+
+### Privacy is a human right
+
+Like many of us, Aleisha spends most of her time online--connecting with friends, posting on social media, and browsing the web.
+
+But lately, she's noticed that advertisements related to her previous searches are following her around online.
+
+This feels so invasive that she does some research on online ads and learns that it's not just advertisers tracking her but also her ISP, analytics companies, social media platforms, and more.
+
+Aleisha decides she wants to find and use software that doesn't collect her data, doesn't track her, and doesn't tell other services anything private about her.
+
+She goes to a privacy training at a local hackerspace and learns about **Tor Browser**, the only web browser that allows her to browse anonymously.
+
+---
+
+# 2.TOR FOR FEMINISTS
+
+### The future is cyberfeminist
+
+Fernanda runs a women's collective focused on reproductive rights in Brazil, where abortion is illegal.
+
+Fernanda and her colleagues built a website with information about abortion access, birth control, and other resources for people seeking reproductive information.
+
+If this website was linked back to them, they could be arrested--or worse.
+
+To protect themselves, Fernanda and her colleagues created the website using Tor **onion services**. Onion services not only protect them from being discovered as the operators of the server but also help protect visitors to their website by requiring they use Tor Browser.
+
+In fact, Fernanda uses **Tor Browser** for all of her web browsing just to be on the safe side.
+
+She also uses a Tor-powered app called **OnionShare** to send files to other activists securely and privately.
+
+### Reproductive rights activists like Fernanda are fighting for fundamental freedoms, and Tor helps power their resistance.
+
+---
+
+# 3. TOR FOR HUMAN RIGHTS
+
+### Water is life
+
+Jelani lives in a small village which a wide river runs through.
+
+This river has provided water to his community since the days of his ancestors.
+
+But today, Jelani’s river is threatened by powerful multinational companies drilling for oil in the region.
+
+Private security firms, paid for by these companies, use powerful surveillance mechanisms to monitor the online activities of Jelani and his neighbors in the village who are organizing to protect their sacred river.
+
+Jelani uses **Tor Browser** to prevent these companies from watching as he visits websites for international human rights protection and legal aid and writes blog posts about the resistance movement in his village.
+
+He also uses **OnionShare** and **SecureDrop** to securely send documents to journalists who are helping expose these human rights violations.
+
+All of this software uses Tor to help protect Jelani’s privacy.
+
+### Human rights activists like Jelani are fighting for justice in their communities, and Tor helps power their resistance.
+
+---
+
+# 4. TOR FOR ANTI-CENSORSHIP
+
+### Build bridges not walls
+
+Jean was traveling for the first time to a country far from his family.
+
+After arriving at a hotel, he opened his laptop.
+
+He was so exhausted that when the message "Connection has timed out" first appeared on his web browser, he thought it was due to his own error.
+
+But after trying again and again, he realized that his email provider, a news website, and many apps were unavailable.
+
+He had heard that this country censors the internet and wondered if that was happening.
+How could he contact his family from behind this impenetrable wall?
+After doing some web searches, he found a forum and read about VPNs, private services that allow you to connect to another uncensored network.
+
+Jean spent half an hour trying to figure out which cheap VPN was best.
+
+He chose one and for a moment it seemed to work, but after five minutes the connection went offline and the VPN would no longer connect.
+
+Jean kept reading to find other options and learned about Tor Browser and how it can circumvent censorship.
+
+He found an official website mirror to download the program.
+
+When he opened **Tor Browser**, he followed the prompts for censored users and connected to a bridge which allowed him to access the internet again.
+
+With Tor Browser, Jean can browse freely and privately and contact his family.
+
+### Censored users all over the world rely on Tor Browser for a free, stable, and uncensored way to access the internet.
+
+---
+
+# 5. Shared Sections
+
+## Kva er Tor?
+
+Tor is free software and an open network that helps protect you from tracking, surveillance, and censorship online.
+Tor is created for free by a 501(c)3 U.S.-based nonprofit called the Tor Project.
+
+The easiest way to use Tor is Tor Browser.
+When you use Tor Browser, no one can see what websites you visit or where in the world you’re coming from.
+
+Other applications, like SecureDrop and OnionShare, use Tor to protect their users against surveillance and censorship.
+
+
+## 6. Korleis verkar Tor?
+
+Amal wants to visit Bekele’s website privately, so she opens Tor Browser.
+
+Tor Browser selects a random circuit of three relays, which are computers all over the world configured to route traffic over the Tor network.
+
+Tor Browser then encrypts her website request three times and sends it to the first Tor relay in her circuit.
+
+The first relay removes the first encryption layer but doesn't learn that the destination is Bekele’s website.
+
+The first relay learns only the next location in the circuit, which is the second relay.
+
+The second relay removes another encryption layer and forwards the web page request to the third relay.
+
+The third relay removes the last encryption layer and forwards the web page request to its destination, Bekele’s website, but it doesn't know the request comes from Amal.
+
+Bekele doesn't know that the website request came from Amal unless she tells him so.
+
+## 7. Kven brukar Tor?
+
+People all over the world use Tor to protect their privacy and access the web freely.
+
+Tor helps protect journalists, human rights defenders, domestic violence victims, academic researchers, and anyone experiencing tracking, censorship, or surveillance.
+
+## 6. Why trust Tor?
+
+Tor is designed for privacy. We don’t know who our users are, and we don't keep logs of user activity.
+
+Tor relay operators cannot reveal the true identity of Tor users.
+
+Continual peer review of Tor's source code by academic and open source communities ensures that there are no backdoors in Tor, and our social contract promises that we will never backdoor Tor.
+
+## 7. Join the Tor community
+
+Tor is made possible by a diverse set of users, developers, relay operators, and advocates from around the world.
+
+We need your help to make Tor more usable and secure for people everywhere.
+
+You can volunteer with Tor by writing code, running a relay, creating documentation, offering user support, or telling people in your community about Tor.
+
+The Tor community is governed by a code of conduct, and we outline our set of promises to the community in our social contract.
+
+Learn more about Tor by visiting our website, our wiki, finding us on IRC, joining one of our mailing lists, or signing up for Tor News at newsletter.torproject.org.
+
+
+## 8. Last ned Tor
+
+Tor for Desktop
+torproject.org/download
+
+TOR ON MOBILE
+### Android
+Tor Browser for Android is available from GooglePlay.
+
+### iOS
+Onion Browser, developed by M. Tigas, is the only browser we recommend for iOS.
+
diff --git a/oc.po b/oc.po
new file mode 100644
index 000000000..6c8fce0dc
--- /dev/null
+++ b/oc.po
@@ -0,0 +1,162 @@
+# Tor Outreach Material 2019-2020
+
+# 1. TOR FOR PRIVACY
+
+### Privacy is a human right
+
+Like many of us, Aleisha spends most of her time online--connecting with friends, posting on social media, and browsing the web.
+
+But lately, she's noticed that advertisements related to her previous searches are following her around online.
+
+This feels so invasive that she does some research on online ads and learns that it's not just advertisers tracking her but also her ISP, analytics companies, social media platforms, and more.
+
+Aleisha decides she wants to find and use software that doesn't collect her data, doesn't track her, and doesn't tell other services anything private about her.
+
+She goes to a privacy training at a local hackerspace and learns about **Tor Browser**, the only web browser that allows her to browse anonymously.
+
+---
+
+# 2.TOR FOR FEMINISTS
+
+### The future is cyberfeminist
+
+Fernanda runs a women's collective focused on reproductive rights in Brazil, where abortion is illegal.
+
+Fernanda and her colleagues built a website with information about abortion access, birth control, and other resources for people seeking reproductive information.
+
+If this website was linked back to them, they could be arrested--or worse.
+
+To protect themselves, Fernanda and her colleagues created the website using Tor **onion services**. Onion services not only protect them from being discovered as the operators of the server but also help protect visitors to their website by requiring they use Tor Browser.
+
+In fact, Fernanda uses **Tor Browser** for all of her web browsing just to be on the safe side.
+
+She also uses a Tor-powered app called **OnionShare** to send files to other activists securely and privately.
+
+### Reproductive rights activists like Fernanda are fighting for fundamental freedoms, and Tor helps power their resistance.
+
+---
+
+# 3. TOR FOR HUMAN RIGHTS
+
+### Water is life
+
+Jelani lives in a small village which a wide river runs through.
+
+This river has provided water to his community since the days of his ancestors.
+
+But today, Jelani’s river is threatened by powerful multinational companies drilling for oil in the region.
+
+Private security firms, paid for by these companies, use powerful surveillance mechanisms to monitor the online activities of Jelani and his neighbors in the village who are organizing to protect their sacred river.
+
+Jelani uses **Tor Browser** to prevent these companies from watching as he visits websites for international human rights protection and legal aid and writes blog posts about the resistance movement in his village.
+
+He also uses **OnionShare** and **SecureDrop** to securely send documents to journalists who are helping expose these human rights violations.
+
+All of this software uses Tor to help protect Jelani’s privacy.
+
+### Human rights activists like Jelani are fighting for justice in their communities, and Tor helps power their resistance.
+
+---
+
+# 4. TOR FOR ANTI-CENSORSHIP
+
+### Build bridges not walls
+
+Jean was traveling for the first time to a country far from his family.
+
+After arriving at a hotel, he opened his laptop.
+
+He was so exhausted that when the message "Connection has timed out" first appeared on his web browser, he thought it was due to his own error.
+
+But after trying again and again, he realized that his email provider, a news website, and many apps were unavailable.
+
+He had heard that this country censors the internet and wondered if that was happening.
+How could he contact his family from behind this impenetrable wall?
+After doing some web searches, he found a forum and read about VPNs, private services that allow you to connect to another uncensored network.
+
+Jean spent half an hour trying to figure out which cheap VPN was best.
+
+He chose one and for a moment it seemed to work, but after five minutes the connection went offline and the VPN would no longer connect.
+
+Jean kept reading to find other options and learned about Tor Browser and how it can circumvent censorship.
+
+He found an official website mirror to download the program.
+
+When he opened **Tor Browser**, he followed the prompts for censored users and connected to a bridge which allowed him to access the internet again.
+
+With Tor Browser, Jean can browse freely and privately and contact his family.
+
+### Censored users all over the world rely on Tor Browser for a free, stable, and uncensored way to access the internet.
+
+---
+
+# 5. Shared Sections
+
+## What is Tor?
+
+Tor is free software and an open network that helps protect you from tracking, surveillance, and censorship online.
+Tor is created for free by a 501(c)3 U.S.-based nonprofit called the Tor Project.
+
+The easiest way to use Tor is Tor Browser.
+When you use Tor Browser, no one can see what websites you visit or where in the world you’re coming from.
+
+Other applications, like SecureDrop and OnionShare, use Tor to protect their users against surveillance and censorship.
+
+
+## 6. How does Tor work?
+
+Amal wants to visit Bekele’s website privately, so she opens Tor Browser.
+
+Tor Browser selects a random circuit of three relays, which are computers all over the world configured to route traffic over the Tor network.
+
+Tor Browser then encrypts her website request three times and sends it to the first Tor relay in her circuit.
+
+The first relay removes the first encryption layer but doesn't learn that the destination is Bekele’s website.
+
+The first relay learns only the next location in the circuit, which is the second relay.
+
+The second relay removes another encryption layer and forwards the web page request to the third relay.
+
+The third relay removes the last encryption layer and forwards the web page request to its destination, Bekele’s website, but it doesn't know the request comes from Amal.
+
+Bekele doesn't know that the website request came from Amal unless she tells him so.
+
+## 7. Who uses Tor?
+
+People all over the world use Tor to protect their privacy and access the web freely.
+
+Tor helps protect journalists, human rights defenders, domestic violence victims, academic researchers, and anyone experiencing tracking, censorship, or surveillance.
+
+## 6. Why trust Tor?
+
+Tor is designed for privacy. We don’t know who our users are, and we don't keep logs of user activity.
+
+Tor relay operators cannot reveal the true identity of Tor users.
+
+Continual peer review of Tor's source code by academic and open source communities ensures that there are no backdoors in Tor, and our social contract promises that we will never backdoor Tor.
+
+## 7. Join the Tor community
+
+Tor is made possible by a diverse set of users, developers, relay operators, and advocates from around the world.
+
+We need your help to make Tor more usable and secure for people everywhere.
+
+You can volunteer with Tor by writing code, running a relay, creating documentation, offering user support, or telling people in your community about Tor.
+
+The Tor community is governed by a code of conduct, and we outline our set of promises to the community in our social contract.
+
+Learn more about Tor by visiting our website, our wiki, finding us on IRC, joining one of our mailing lists, or signing up for Tor News at newsletter.torproject.org.
+
+
+## 8. Download Tor
+
+Tor for Desktop
+torproject.org/download
+
+TOR ON MOBILE
+### Android
+Tor Browser for Android is available from GooglePlay.
+
+### iOS
+Onion Browser, developed by M. Tigas, is the only browser we recommend for iOS.
+
diff --git a/or.po b/or.po
new file mode 100644
index 000000000..6c8fce0dc
--- /dev/null
+++ b/or.po
@@ -0,0 +1,162 @@
+# Tor Outreach Material 2019-2020
+
+# 1. TOR FOR PRIVACY
+
+### Privacy is a human right
+
+Like many of us, Aleisha spends most of her time online--connecting with friends, posting on social media, and browsing the web.
+
+But lately, she's noticed that advertisements related to her previous searches are following her around online.
+
+This feels so invasive that she does some research on online ads and learns that it's not just advertisers tracking her but also her ISP, analytics companies, social media platforms, and more.
+
+Aleisha decides she wants to find and use software that doesn't collect her data, doesn't track her, and doesn't tell other services anything private about her.
+
+She goes to a privacy training at a local hackerspace and learns about **Tor Browser**, the only web browser that allows her to browse anonymously.
+
+---
+
+# 2.TOR FOR FEMINISTS
+
+### The future is cyberfeminist
+
+Fernanda runs a women's collective focused on reproductive rights in Brazil, where abortion is illegal.
+
+Fernanda and her colleagues built a website with information about abortion access, birth control, and other resources for people seeking reproductive information.
+
+If this website was linked back to them, they could be arrested--or worse.
+
+To protect themselves, Fernanda and her colleagues created the website using Tor **onion services**. Onion services not only protect them from being discovered as the operators of the server but also help protect visitors to their website by requiring they use Tor Browser.
+
+In fact, Fernanda uses **Tor Browser** for all of her web browsing just to be on the safe side.
+
+She also uses a Tor-powered app called **OnionShare** to send files to other activists securely and privately.
+
+### Reproductive rights activists like Fernanda are fighting for fundamental freedoms, and Tor helps power their resistance.
+
+---
+
+# 3. TOR FOR HUMAN RIGHTS
+
+### Water is life
+
+Jelani lives in a small village which a wide river runs through.
+
+This river has provided water to his community since the days of his ancestors.
+
+But today, Jelani’s river is threatened by powerful multinational companies drilling for oil in the region.
+
+Private security firms, paid for by these companies, use powerful surveillance mechanisms to monitor the online activities of Jelani and his neighbors in the village who are organizing to protect their sacred river.
+
+Jelani uses **Tor Browser** to prevent these companies from watching as he visits websites for international human rights protection and legal aid and writes blog posts about the resistance movement in his village.
+
+He also uses **OnionShare** and **SecureDrop** to securely send documents to journalists who are helping expose these human rights violations.
+
+All of this software uses Tor to help protect Jelani’s privacy.
+
+### Human rights activists like Jelani are fighting for justice in their communities, and Tor helps power their resistance.
+
+---
+
+# 4. TOR FOR ANTI-CENSORSHIP
+
+### Build bridges not walls
+
+Jean was traveling for the first time to a country far from his family.
+
+After arriving at a hotel, he opened his laptop.
+
+He was so exhausted that when the message "Connection has timed out" first appeared on his web browser, he thought it was due to his own error.
+
+But after trying again and again, he realized that his email provider, a news website, and many apps were unavailable.
+
+He had heard that this country censors the internet and wondered if that was happening.
+How could he contact his family from behind this impenetrable wall?
+After doing some web searches, he found a forum and read about VPNs, private services that allow you to connect to another uncensored network.
+
+Jean spent half an hour trying to figure out which cheap VPN was best.
+
+He chose one and for a moment it seemed to work, but after five minutes the connection went offline and the VPN would no longer connect.
+
+Jean kept reading to find other options and learned about Tor Browser and how it can circumvent censorship.
+
+He found an official website mirror to download the program.
+
+When he opened **Tor Browser**, he followed the prompts for censored users and connected to a bridge which allowed him to access the internet again.
+
+With Tor Browser, Jean can browse freely and privately and contact his family.
+
+### Censored users all over the world rely on Tor Browser for a free, stable, and uncensored way to access the internet.
+
+---
+
+# 5. Shared Sections
+
+## What is Tor?
+
+Tor is free software and an open network that helps protect you from tracking, surveillance, and censorship online.
+Tor is created for free by a 501(c)3 U.S.-based nonprofit called the Tor Project.
+
+The easiest way to use Tor is Tor Browser.
+When you use Tor Browser, no one can see what websites you visit or where in the world you’re coming from.
+
+Other applications, like SecureDrop and OnionShare, use Tor to protect their users against surveillance and censorship.
+
+
+## 6. How does Tor work?
+
+Amal wants to visit Bekele’s website privately, so she opens Tor Browser.
+
+Tor Browser selects a random circuit of three relays, which are computers all over the world configured to route traffic over the Tor network.
+
+Tor Browser then encrypts her website request three times and sends it to the first Tor relay in her circuit.
+
+The first relay removes the first encryption layer but doesn't learn that the destination is Bekele’s website.
+
+The first relay learns only the next location in the circuit, which is the second relay.
+
+The second relay removes another encryption layer and forwards the web page request to the third relay.
+
+The third relay removes the last encryption layer and forwards the web page request to its destination, Bekele’s website, but it doesn't know the request comes from Amal.
+
+Bekele doesn't know that the website request came from Amal unless she tells him so.
+
+## 7. Who uses Tor?
+
+People all over the world use Tor to protect their privacy and access the web freely.
+
+Tor helps protect journalists, human rights defenders, domestic violence victims, academic researchers, and anyone experiencing tracking, censorship, or surveillance.
+
+## 6. Why trust Tor?
+
+Tor is designed for privacy. We don’t know who our users are, and we don't keep logs of user activity.
+
+Tor relay operators cannot reveal the true identity of Tor users.
+
+Continual peer review of Tor's source code by academic and open source communities ensures that there are no backdoors in Tor, and our social contract promises that we will never backdoor Tor.
+
+## 7. Join the Tor community
+
+Tor is made possible by a diverse set of users, developers, relay operators, and advocates from around the world.
+
+We need your help to make Tor more usable and secure for people everywhere.
+
+You can volunteer with Tor by writing code, running a relay, creating documentation, offering user support, or telling people in your community about Tor.
+
+The Tor community is governed by a code of conduct, and we outline our set of promises to the community in our social contract.
+
+Learn more about Tor by visiting our website, our wiki, finding us on IRC, joining one of our mailing lists, or signing up for Tor News at newsletter.torproject.org.
+
+
+## 8. Download Tor
+
+Tor for Desktop
+torproject.org/download
+
+TOR ON MOBILE
+### Android
+Tor Browser for Android is available from GooglePlay.
+
+### iOS
+Onion Browser, developed by M. Tigas, is the only browser we recommend for iOS.
+
diff --git a/pa.po b/pa.po
new file mode 100644
index 000000000..a58524e48
--- /dev/null
+++ b/pa.po
@@ -0,0 +1,162 @@
+# Tor Outreach Material 2019-2020
+
+# 1. TOR FOR PRIVACY
+
+### Privacy is a human right
+
+Like many of us, Aleisha spends most of her time online--connecting with friends, posting on social media, and browsing the web.
+
+But lately, she's noticed that advertisements related to her previous searches are following her around online.
+
+This feels so invasive that she does some research on online ads and learns that it's not just advertisers tracking her but also her ISP, analytics companies, social media platforms, and more.
+
+Aleisha decides she wants to find and use software that doesn't collect her data, doesn't track her, and doesn't tell other services anything private about her.
+
+She goes to a privacy training at a local hackerspace and learns about **Tor Browser**, the only web browser that allows her to browse anonymously.
+
+---
+
+# 2.TOR FOR FEMINISTS
+
+### The future is cyberfeminist
+
+Fernanda runs a women's collective focused on reproductive rights in Brazil, where abortion is illegal.
+
+Fernanda and her colleagues built a website with information about abortion access, birth control, and other resources for people seeking reproductive information.
+
+If this website was linked back to them, they could be arrested--or worse.
+
+To protect themselves, Fernanda and her colleagues created the website using Tor **onion services**. Onion services not only protect them from being discovered as the operators of the server but also help protect visitors to their website by requiring they use Tor Browser.
+
+In fact, Fernanda uses **Tor Browser** for all of her web browsing just to be on the safe side.
+
+She also uses a Tor-powered app called **OnionShare** to send files to other activists securely and privately.
+
+### Reproductive rights activists like Fernanda are fighting for fundamental freedoms, and Tor helps power their resistance.
+
+---
+
+# 3. TOR FOR HUMAN RIGHTS
+
+### Water is life
+
+Jelani lives in a small village which a wide river runs through.
+
+This river has provided water to his community since the days of his ancestors.
+
+But today, Jelani’s river is threatened by powerful multinational companies drilling for oil in the region.
+
+Private security firms, paid for by these companies, use powerful surveillance mechanisms to monitor the online activities of Jelani and his neighbors in the village who are organizing to protect their sacred river.
+
+Jelani uses **Tor Browser** to prevent these companies from watching as he visits websites for international human rights protection and legal aid and writes blog posts about the resistance movement in his village.
+
+He also uses **OnionShare** and **SecureDrop** to securely send documents to journalists who are helping expose these human rights violations.
+
+All of this software uses Tor to help protect Jelani’s privacy.
+
+### Human rights activists like Jelani are fighting for justice in their communities, and Tor helps power their resistance.
+
+---
+
+# 4. TOR FOR ANTI-CENSORSHIP
+
+### Build bridges not walls
+
+Jean was traveling for the first time to a country far from his family.
+
+After arriving at a hotel, he opened his laptop.
+
+He was so exhausted that when the message "Connection has timed out" first appeared on his web browser, he thought it was due to his own error.
+
+But after trying again and again, he realized that his email provider, a news website, and many apps were unavailable.
+
+He had heard that this country censors the internet and wondered if that was happening.
+How could he contact his family from behind this impenetrable wall?
+After doing some web searches, he found a forum and read about VPNs, private services that allow you to connect to another uncensored network.
+
+Jean spent half an hour trying to figure out which cheap VPN was best.
+
+He chose one and for a moment it seemed to work, but after five minutes the connection went offline and the VPN would no longer connect.
+
+Jean kept reading to find other options and learned about Tor Browser and how it can circumvent censorship.
+
+He found an official website mirror to download the program.
+
+When he opened **Tor Browser**, he followed the prompts for censored users and connected to a bridge which allowed him to access the internet again.
+
+With Tor Browser, Jean can browse freely and privately and contact his family.
+
+### Censored users all over the world rely on Tor Browser for a free, stable, and uncensored way to access the internet.
+
+---
+
+# 5. Shared Sections
+
+## ਟੋਰ ਕੀ ਹੈ?
+
+Tor is free software and an open network that helps protect you from tracking, surveillance, and censorship online.
+Tor is created for free by a 501(c)3 U.S.-based nonprofit called the Tor Project.
+
+The easiest way to use Tor is Tor Browser.
+When you use Tor Browser, no one can see what websites you visit or where in the world you’re coming from.
+
+Other applications, like SecureDrop and OnionShare, use Tor to protect their users against surveillance and censorship.
+
+
+## 6. How does Tor work?
+
+Amal wants to visit Bekele’s website privately, so she opens Tor Browser.
+
+Tor Browser selects a random circuit of three relays, which are computers all over the world configured to route traffic over the Tor network.
+
+Tor Browser then encrypts her website request three times and sends it to the first Tor relay in her circuit.
+
+The first relay removes the first encryption layer but doesn't learn that the destination is Bekele’s website.
+
+The first relay learns only the next location in the circuit, which is the second relay.
+
+The second relay removes another encryption layer and forwards the web page request to the third relay.
+
+The third relay removes the last encryption layer and forwards the web page request to its destination, Bekele’s website, but it doesn't know the request comes from Amal.
+
+Bekele doesn't know that the website request came from Amal unless she tells him so.
+
+## 7. Who uses Tor?
+
+People all over the world use Tor to protect their privacy and access the web freely.
+
+Tor helps protect journalists, human rights defenders, domestic violence victims, academic researchers, and anyone experiencing tracking, censorship, or surveillance.
+
+## 6. Why trust Tor?
+
+Tor is designed for privacy. We don’t know who our users are, and we don't keep logs of user activity.
+
+Tor relay operators cannot reveal the true identity of Tor users.
+
+Continual peer review of Tor's source code by academic and open source communities ensures that there are no backdoors in Tor, and our social contract promises that we will never backdoor Tor.
+
+## 7. Join the Tor community
+
+Tor is made possible by a diverse set of users, developers, relay operators, and advocates from around the world.
+
+We need your help to make Tor more usable and secure for people everywhere.
+
+You can volunteer with Tor by writing code, running a relay, creating documentation, offering user support, or telling people in your community about Tor.
+
+The Tor community is governed by a code of conduct, and we outline our set of promises to the community in our social contract.
+
+Learn more about Tor by visiting our website, our wiki, finding us on IRC, joining one of our mailing lists, or signing up for Tor News at newsletter.torproject.org.
+
+
+## 8. Download Tor
+
+Tor for Desktop
+torproject.org/download
+
+TOR ON MOBILE
+### Android
+Tor Browser for Android is available from GooglePlay.
+
+### iOS
+Onion Browser, developed by M. Tigas, is the only browser we recommend for iOS.
+
diff --git a/pl.po b/pl.po
new file mode 100644
index 000000000..2fa67d93a
--- /dev/null
+++ b/pl.po
@@ -0,0 +1,162 @@
+# Tor Outreach Material 2019-2020
+
+# 1. TOR FOR PRIVACY
+
+### Prawo do prywatności jest prawem człowieka.
+
+Tak jak wielu z nas, Aleisha większość czasu spędzanego online poświęca na kontakty ze znajomymi, postowanie w mediach społecznościowych i przeglądanie sieci.
+
+But lately, she's noticed that advertisements related to her previous searches are following her around online.
+
+This feels so invasive that she does some research on online ads and learns that it's not just advertisers tracking her but also her ISP, analytics companies, social media platforms, and more.
+
+Aleisha decides she wants to find and use software that doesn't collect her data, doesn't track her, and doesn't tell other services anything private about her.
+
+She goes to a privacy training at a local hackerspace and learns about **Tor Browser**, the only web browser that allows her to browse anonymously.
+
+---
+
+# 2.TOR FOR FEMINISTS
+
+### The future is cyberfeminist
+
+Fernanda runs a women's collective focused on reproductive rights in Brazil, where abortion is illegal.
+
+Fernanda and her colleagues built a website with information about abortion access, birth control, and other resources for people seeking reproductive information.
+
+If this website was linked back to them, they could be arrested--or worse.
+
+To protect themselves, Fernanda and her colleagues created the website using Tor **onion services**. Onion services not only protect them from being discovered as the operators of the server but also help protect visitors to their website by requiring they use Tor Browser.
+
+In fact, Fernanda uses **Tor Browser** for all of her web browsing just to be on the safe side.
+
+She also uses a Tor-powered app called **OnionShare** to send files to other activists securely and privately.
+
+### Reproductive rights activists like Fernanda are fighting for fundamental freedoms, and Tor helps power their resistance.
+
+---
+
+# 3. TOR FOR HUMAN RIGHTS
+
+### Water is life
+
+Jelani lives in a small village which a wide river runs through.
+
+This river has provided water to his community since the days of his ancestors.
+
+But today, Jelani’s river is threatened by powerful multinational companies drilling for oil in the region.
+
+Private security firms, paid for by these companies, use powerful surveillance mechanisms to monitor the online activities of Jelani and his neighbors in the village who are organizing to protect their sacred river.
+
+Jelani uses **Tor Browser** to prevent these companies from watching as he visits websites for international human rights protection and legal aid and writes blog posts about the resistance movement in his village.
+
+He also uses **OnionShare** and **SecureDrop** to securely send documents to journalists who are helping expose these human rights violations.
+
+All of this software uses Tor to help protect Jelani’s privacy.
+
+### Human rights activists like Jelani are fighting for justice in their communities, and Tor helps power their resistance.
+
+---
+
+# 4. TOR FOR ANTI-CENSORSHIP
+
+### Build bridges not walls
+
+Jean was traveling for the first time to a country far from his family.
+
+After arriving at a hotel, he opened his laptop.
+
+He was so exhausted that when the message "Connection has timed out" first appeared on his web browser, he thought it was due to his own error.
+
+But after trying again and again, he realized that his email provider, a news website, and many apps were unavailable.
+
+He had heard that this country censors the internet and wondered if that was happening.
+How could he contact his family from behind this impenetrable wall?
+After doing some web searches, he found a forum and read about VPNs, private services that allow you to connect to another uncensored network.
+
+Jean spent half an hour trying to figure out which cheap VPN was best.
+
+He chose one and for a moment it seemed to work, but after five minutes the connection went offline and the VPN would no longer connect.
+
+Jean kept reading to find other options and learned about Tor Browser and how it can circumvent censorship.
+
+He found an official website mirror to download the program.
+
+When he opened **Tor Browser**, he followed the prompts for censored users and connected to a bridge which allowed him to access the internet again.
+
+With Tor Browser, Jean can browse freely and privately and contact his family.
+
+### Censored users all over the world rely on Tor Browser for a free, stable, and uncensored way to access the internet.
+
+---
+
+# 5. Shared Sections
+
+## Czym jest Tor?
+
+Tor is free software and an open network that helps protect you from tracking, surveillance, and censorship online.
+Tor is created for free by a 501(c)3 U.S.-based nonprofit called the Tor Project.
+
+The easiest way to use Tor is Tor Browser.
+When you use Tor Browser, no one can see what websites you visit or where in the world you’re coming from.
+
+Other applications, like SecureDrop and OnionShare, use Tor to protect their users against surveillance and censorship.
+
+
+## 6. How does Tor work?
+
+Amal wants to visit Bekele’s website privately, so she opens Tor Browser.
+
+Tor Browser selects a random circuit of three relays, which are computers all over the world configured to route traffic over the Tor network.
+
+Tor Browser then encrypts her website request three times and sends it to the first Tor relay in her circuit.
+
+The first relay removes the first encryption layer but doesn't learn that the destination is Bekele’s website.
+
+The first relay learns only the next location in the circuit, which is the second relay.
+
+The second relay removes another encryption layer and forwards the web page request to the third relay.
+
+The third relay removes the last encryption layer and forwards the web page request to its destination, Bekele’s website, but it doesn't know the request comes from Amal.
+
+Bekele doesn't know that the website request came from Amal unless she tells him so.
+
+## 7. Who uses Tor?
+
+People all over the world use Tor to protect their privacy and access the web freely.
+
+Tor helps protect journalists, human rights defenders, domestic violence victims, academic researchers, and anyone experiencing tracking, censorship, or surveillance.
+
+## 6. Why trust Tor?
+
+Tor is designed for privacy. We don’t know who our users are, and we don't keep logs of user activity.
+
+Tor relay operators cannot reveal the true identity of Tor users.
+
+Continual peer review of Tor's source code by academic and open source communities ensures that there are no backdoors in Tor, and our social contract promises that we will never backdoor Tor.
+
+## 7. Join the Tor community
+
+Tor is made possible by a diverse set of users, developers, relay operators, and advocates from around the world.
+
+We need your help to make Tor more usable and secure for people everywhere.
+
+You can volunteer with Tor by writing code, running a relay, creating documentation, offering user support, or telling people in your community about Tor.
+
+The Tor community is governed by a code of conduct, and we outline our set of promises to the community in our social contract.
+
+Learn more about Tor by visiting our website, our wiki, finding us on IRC, joining one of our mailing lists, or signing up for Tor News at newsletter.torproject.org.
+
+
+## 8. Download Tor
+
+Tor for Desktop
+torproject.org/download
+
+TOR ON MOBILE
+### Android
+Tor Browser for Android is available from GooglePlay.
+
+### iOS
+Onion Browser, developed by M. Tigas, is the only browser we recommend for iOS.
+
diff --git a/pms.po b/pms.po
new file mode 100644
index 000000000..6c8fce0dc
--- /dev/null
+++ b/pms.po
@@ -0,0 +1,162 @@
+# Tor Outreach Material 2019-2020
+
+# 1. TOR FOR PRIVACY
+
+### Privacy is a human right
+
+Like many of us, Aleisha spends most of her time online--connecting with friends, posting on social media, and browsing the web.
+
+But lately, she's noticed that advertisements related to her previous searches are following her around online.
+
+This feels so invasive that she does some research on online ads and learns that it's not just advertisers tracking her but also her ISP, analytics companies, social media platforms, and more.
+
+Aleisha decides she wants to find and use software that doesn't collect her data, doesn't track her, and doesn't tell other services anything private about her.
+
+She goes to a privacy training at a local hackerspace and learns about **Tor Browser**, the only web browser that allows her to browse anonymously.
+
+---
+
+# 2.TOR FOR FEMINISTS
+
+### The future is cyberfeminist
+
+Fernanda runs a women's collective focused on reproductive rights in Brazil, where abortion is illegal.
+
+Fernanda and her colleagues built a website with information about abortion access, birth control, and other resources for people seeking reproductive information.
+
+If this website was linked back to them, they could be arrested--or worse.
+
+To protect themselves, Fernanda and her colleagues created the website using Tor **onion services**. Onion services not only protect them from being discovered as the operators of the server but also help protect visitors to their website by requiring they use Tor Browser.
+
+In fact, Fernanda uses **Tor Browser** for all of her web browsing just to be on the safe side.
+
+She also uses a Tor-powered app called **OnionShare** to send files to other activists securely and privately.
+
+### Reproductive rights activists like Fernanda are fighting for fundamental freedoms, and Tor helps power their resistance.
+
+---
+
+# 3. TOR FOR HUMAN RIGHTS
+
+### Water is life
+
+Jelani lives in a small village which a wide river runs through.
+
+This river has provided water to his community since the days of his ancestors.
+
+But today, Jelani’s river is threatened by powerful multinational companies drilling for oil in the region.
+
+Private security firms, paid for by these companies, use powerful surveillance mechanisms to monitor the online activities of Jelani and his neighbors in the village who are organizing to protect their sacred river.
+
+Jelani uses **Tor Browser** to prevent these companies from watching as he visits websites for international human rights protection and legal aid and writes blog posts about the resistance movement in his village.
+
+He also uses **OnionShare** and **SecureDrop** to securely send documents to journalists who are helping expose these human rights violations.
+
+All of this software uses Tor to help protect Jelani’s privacy.
+
+### Human rights activists like Jelani are fighting for justice in their communities, and Tor helps power their resistance.
+
+---
+
+# 4. TOR FOR ANTI-CENSORSHIP
+
+### Build bridges not walls
+
+Jean was traveling for the first time to a country far from his family.
+
+After arriving at a hotel, he opened his laptop.
+
+He was so exhausted that when the message "Connection has timed out" first appeared on his web browser, he thought it was due to his own error.
+
+But after trying again and again, he realized that his email provider, a news website, and many apps were unavailable.
+
+He had heard that this country censors the internet and wondered if that was happening.
+How could he contact his family from behind this impenetrable wall?
+After doing some web searches, he found a forum and read about VPNs, private services that allow you to connect to another uncensored network.
+
+Jean spent half an hour trying to figure out which cheap VPN was best.
+
+He chose one and for a moment it seemed to work, but after five minutes the connection went offline and the VPN would no longer connect.
+
+Jean kept reading to find other options and learned about Tor Browser and how it can circumvent censorship.
+
+He found an official website mirror to download the program.
+
+When he opened **Tor Browser**, he followed the prompts for censored users and connected to a bridge which allowed him to access the internet again.
+
+With Tor Browser, Jean can browse freely and privately and contact his family.
+
+### Censored users all over the world rely on Tor Browser for a free, stable, and uncensored way to access the internet.
+
+---
+
+# 5. Shared Sections
+
+## What is Tor?
+
+Tor is free software and an open network that helps protect you from tracking, surveillance, and censorship online.
+Tor is created for free by a 501(c)3 U.S.-based nonprofit called the Tor Project.
+
+The easiest way to use Tor is Tor Browser.
+When you use Tor Browser, no one can see what websites you visit or where in the world you’re coming from.
+
+Other applications, like SecureDrop and OnionShare, use Tor to protect their users against surveillance and censorship.
+
+
+## 6. How does Tor work?
+
+Amal wants to visit Bekele’s website privately, so she opens Tor Browser.
+
+Tor Browser selects a random circuit of three relays, which are computers all over the world configured to route traffic over the Tor network.
+
+Tor Browser then encrypts her website request three times and sends it to the first Tor relay in her circuit.
+
+The first relay removes the first encryption layer but doesn't learn that the destination is Bekele’s website.
+
+The first relay learns only the next location in the circuit, which is the second relay.
+
+The second relay removes another encryption layer and forwards the web page request to the third relay.
+
+The third relay removes the last encryption layer and forwards the web page request to its destination, Bekele’s website, but it doesn't know the request comes from Amal.
+
+Bekele doesn't know that the website request came from Amal unless she tells him so.
+
+## 7. Who uses Tor?
+
+People all over the world use Tor to protect their privacy and access the web freely.
+
+Tor helps protect journalists, human rights defenders, domestic violence victims, academic researchers, and anyone experiencing tracking, censorship, or surveillance.
+
+## 6. Why trust Tor?
+
+Tor is designed for privacy. We don’t know who our users are, and we don't keep logs of user activity.
+
+Tor relay operators cannot reveal the true identity of Tor users.
+
+Continual peer review of Tor's source code by academic and open source communities ensures that there are no backdoors in Tor, and our social contract promises that we will never backdoor Tor.
+
+## 7. Join the Tor community
+
+Tor is made possible by a diverse set of users, developers, relay operators, and advocates from around the world.
+
+We need your help to make Tor more usable and secure for people everywhere.
+
+You can volunteer with Tor by writing code, running a relay, creating documentation, offering user support, or telling people in your community about Tor.
+
+The Tor community is governed by a code of conduct, and we outline our set of promises to the community in our social contract.
+
+Learn more about Tor by visiting our website, our wiki, finding us on IRC, joining one of our mailing lists, or signing up for Tor News at newsletter.torproject.org.
+
+
+## 8. Download Tor
+
+Tor for Desktop
+torproject.org/download
+
+TOR ON MOBILE
+### Android
+Tor Browser for Android is available from GooglePlay.
+
+### iOS
+Onion Browser, developed by M. Tigas, is the only browser we recommend for iOS.
+
diff --git a/ps.po b/ps.po
new file mode 100644
index 000000000..6c8fce0dc
--- /dev/null
+++ b/ps.po
@@ -0,0 +1,162 @@
+# Tor Outreach Material 2019-2020
+
+# 1. TOR FOR PRIVACY
+
+### Privacy is a human right
+
+Like many of us, Aleisha spends most of her time online--connecting with friends, posting on social media, and browsing the web.
+
+But lately, she's noticed that advertisements related to her previous searches are following her around online.
+
+This feels so invasive that she does some research on online ads and learns that it's not just advertisers tracking her but also her ISP, analytics companies, social media platforms, and more.
+
+Aleisha decides she wants to find and use software that doesn't collect her data, doesn't track her, and doesn't tell other services anything private about her.
+
+She goes to a privacy training at a local hackerspace and learns about **Tor Browser**, the only web browser that allows her to browse anonymously.
+
+---
+
+# 2.TOR FOR FEMINISTS
+
+### The future is cyberfeminist
+
+Fernanda runs a women's collective focused on reproductive rights in Brazil, where abortion is illegal.
+
+Fernanda and her colleagues built a website with information about abortion access, birth control, and other resources for people seeking reproductive information.
+
+If this website was linked back to them, they could be arrested--or worse.
+
+To protect themselves, Fernanda and her colleagues created the website using Tor **onion services**. Onion services not only protect them from being discovered as the operators of the server but also help protect visitors to their website by requiring they use Tor Browser.
+
+In fact, Fernanda uses **Tor Browser** for all of her web browsing just to be on the safe side.
+
+She also uses a Tor-powered app called **OnionShare** to send files to other activists securely and privately.
+
+### Reproductive rights activists like Fernanda are fighting for fundamental freedoms, and Tor helps power their resistance.
+
+---
+
+# 3. TOR FOR HUMAN RIGHTS
+
+### Water is life
+
+Jelani lives in a small village which a wide river runs through.
+
+This river has provided water to his community since the days of his ancestors.
+
+But today, Jelani’s river is threatened by powerful multinational companies drilling for oil in the region.
+
+Private security firms, paid for by these companies, use powerful surveillance mechanisms to monitor the online activities of Jelani and his neighbors in the village who are organizing to protect their sacred river.
+
+Jelani uses **Tor Browser** to prevent these companies from watching as he visits websites for international human rights protection and legal aid and writes blog posts about the resistance movement in his village.
+
+He also uses **OnionShare** and **SecureDrop** to securely send documents to journalists who are helping expose these human rights violations.
+
+All of this software uses Tor to help protect Jelani’s privacy.
+
+### Human rights activists like Jelani are fighting for justice in their communities, and Tor helps power their resistance.
+
+---
+
+# 4. TOR FOR ANTI-CENSORSHIP
+
+### Build bridges not walls
+
+Jean was traveling for the first time to a country far from his family.
+
+After arriving at a hotel, he opened his laptop.
+
+He was so exhausted that when the message "Connection has timed out" first appeared on his web browser, he thought it was due to his own error.
+
+But after trying again and again, he realized that his email provider, a news website, and many apps were unavailable.
+
+He had heard that this country censors the internet and wondered if that was happening.
+How could he contact his family from behind this impenetrable wall?
+After doing some web searches, he found a forum and read about VPNs, private services that allow you to connect to another uncensored network.
+
+Jean spent half an hour trying to figure out which cheap VPN was best.
+
+He chose one and for a moment it seemed to work, but after five minutes the connection went offline and the VPN would no longer connect.
+
+Jean kept reading to find other options and learned about Tor Browser and how it can circumvent censorship.
+
+He found an official website mirror to download the program.
+
+When he opened **Tor Browser**, he followed the prompts for censored users and connected to a bridge which allowed him to access the internet again.
+
+With Tor Browser, Jean can browse freely and privately and contact his family.
+
+### Censored users all over the world rely on Tor Browser for a free, stable, and uncensored way to access the internet.
+
+---
+
+# 5. Shared Sections
+
+## What is Tor?
+
+Tor is free software and an open network that helps protect you from tracking, surveillance, and censorship online.
+Tor is created for free by a 501(c)3 U.S.-based nonprofit called the Tor Project.
+
+The easiest way to use Tor is Tor Browser.
+When you use Tor Browser, no one can see what websites you visit or where in the world you’re coming from.
+
+Other applications, like SecureDrop and OnionShare, use Tor to protect their users against surveillance and censorship.
+
+
+## 6. How does Tor work?
+
+Amal wants to visit Bekele’s website privately, so she opens Tor Browser.
+
+Tor Browser selects a random circuit of three relays, which are computers all over the world configured to route traffic over the Tor network.
+
+Tor Browser then encrypts her website request three times and sends it to the first Tor relay in her circuit.
+
+The first relay removes the first encryption layer but doesn't learn that the destination is Bekele’s website.
+
+The first relay learns only the next location in the circuit, which is the second relay.
+
+The second relay removes another encryption layer and forwards the web page request to the third relay.
+
+The third relay removes the last encryption layer and forwards the web page request to its destination, Bekele’s website, but it doesn't know the request comes from Amal.
+
+Bekele doesn't know that the website request came from Amal unless she tells him so.
+
+## 7. Who uses Tor?
+
+People all over the world use Tor to protect their privacy and access the web freely.
+
+Tor helps protect journalists, human rights defenders, domestic violence victims, academic researchers, and anyone experiencing tracking, censorship, or surveillance.
+
+## 6. Why trust Tor?
+
+Tor is designed for privacy. We don’t know who our users are, and we don't keep logs of user activity.
+
+Tor relay operators cannot reveal the true identity of Tor users.
+
+Continual peer review of Tor's source code by academic and open source communities ensures that there are no backdoors in Tor, and our social contract promises that we will never backdoor Tor.
+
+## 7. Join the Tor community
+
+Tor is made possible by a diverse set of users, developers, relay operators, and advocates from around the world.
+
+We need your help to make Tor more usable and secure for people everywhere.
+
+You can volunteer with Tor by writing code, running a relay, creating documentation, offering user support, or telling people in your community about Tor.
+
+The Tor community is governed by a code of conduct, and we outline our set of promises to the community in our social contract.
+
+Learn more about Tor by visiting our website, our wiki, finding us on IRC, joining one of our mailing lists, or signing up for Tor News at newsletter.torproject.org.
+
+
+## 8. Download Tor
+
+Tor for Desktop
+torproject.org/download
+
+TOR ON MOBILE
+### Android
+Tor Browser for Android is available from GooglePlay.
+
+### iOS
+Onion Browser, developed by M. Tigas, is the only browser we recommend for iOS.
+
diff --git a/pt_BR.po b/pt_BR.po
new file mode 100644
index 000000000..6eebb134d
--- /dev/null
+++ b/pt_BR.po
@@ -0,0 +1,162 @@
+# Tor: Material de Divulgação 2019-2020
+
+# 1. TOR PARA PRIVACIDADE
+
+### Privacidade é um direito humano.
+
+Tal como muitos de nós, Aleisha passa grande parte de seu tempo online -- conectando-se a amigos, publicando nas mídias sociais e navegando na web.
+
+Mas, recentemente, ela observou que anúncios publicitários relacionados às suas pesquisas anteriores têm-na perseguido por toda parte em sua vida online.
+
+Ele se sente tão invadida que, ao fazer uma pesquisa online sobre anúncios na internet, descobre que não somente os anunciantes a perseguem, mas também o seu provedor de serviços de internet, as empresas de web analytics, as plataformas de mídias sociais, e muito mais.
+
+Aleisha então decide que deseja encontrar e usar um software que não colete seus dados, não a persiga e não compartilhe com outros serviços nenhum dado privado a seu respeito.
+
+Ela comparece a um treinamento de privacidade em um hackerspace em sua cidade e descobre o "Tor Browser", o único navegador web que a permite navegar anonimamente.
+
+---
+
+# 2.TOR PARA FEMINISTAS
+
+### O futuro é ciberfeminista
+
+Fernanda dirige um coletivo de mulheres sobre direitos reprodutivos no Brasil, país onde o aborto é ilegal.
+
+Fernanda e suas colegas criaram um website com informações sobre acesso a aborto, controle de natalidade e outros recursos para pessoas em busca informação reprodutiva.
+
+Se este site estivesse ligado a eles, eles poderiam ser presos - ou pior.
+
+Para proteger-se, Fernanda e suas colegas criaram seu website usando os **Serviços Onion** do Tor não somente para proteger-se de ser descobertas como as operadoras do servidor, mas também para ajudar a proteger os visitantes de seu website ao tornar obrigatório o uso do Navegador Tor.
+
+De fato, Fernanda usa o **Navegador Tor** para toda sua navegação web, só para garantir sua segurança.
+
+Ela também usa um aplicativo empoderado pelo Tor chamado **OnionShare** para enviar arquivos a outros ativistas com privacidade e segurança.
+
+### Ativistas dos direitos reprodutivos como Fernanda estão lutando por liberdades fundamentais, e o Tor ajuda a empoderar sua resistência.
+
+---
+
+# 3. TOR PARA OS DIREITOS HUMANOS
+
+### Água é vida
+
+Jelani vive em uma pequena aldeia cortada por um rio caudaloso.
+
+Esse rio proveu água para sua comunidade desde os dias de seus ancestrais.
+
+Mas, hoje, o rio de Jelani está ameaçado por poderosas empresas multinacionais que perfuram sua região em busca de petróleo.
+
+Empresas particulares de segurança, pagas por essas empresas, usam poderosos mecanismos de vigilância para monitorar as atividades online de Jelani e seus vizinhos da aldeia que estão se organizando para proteger seu rio sagrado.
+
+Jelani usa o **Navegador Tor** para evitar que essas empresas observem suas visitas a websites internacionais de proteção aos direitos humanos e de auxílio jurídico e escreve artigos em blogs sobre o movimento de resistência em sua aldeia.
+
+Ela também usa o **OnionShare** e o **SecureDrop** para enviar em segurança documentos para jornalistas que estão ajudando a expor essas violações de direitos humanos.
+
+Todos esses softwares usam o Tor para ajudar a proteger a privacidade de Jelani.
+
+### Ativistas de direitos humanos como Jelani lutam por justiça em suas comunidades e o Tor ajuda a empoderar sua resistência.
+
+---
+
+# 4. TOR CONTRA A CENSURA
+
+### Construa pontes, não muros.
+
+Jean viajava pela primeira vez a um país distante de sua família.
+
+Na chegada ao hotel, ele abriu seu laptop.
+
+Ele se sentia tão exausto que quando a mensagem "Conexão expirada" apareceu pela primeira vez em seu navegador web, ele pensou que fosse devida a um erro dele próprio.
+
+Mas, após tentar de novo, e de novo, ele percebeu que seu provedor de email, um website de notícias e muitos aplicativos estavam indisponíveis.
+
+Ele ouvira dizer que esse país censurava a internet e se era isto que estava acontecendo.
+Como poderia contactar sua família por trás dessa muralha impenetrável?
+Após proceder a algumas pesquisas na web, ele encontrou um fórum onde leu sobre VPNs, serviços de privacidade que permitem que você se conecte a outras redes não censuradas.
+
+Jean gastou cerca de meia hora tentando descobrir qual das opções de VPN de baixo custo era a melhor.
+
+Ele escolheu uma que, por um momento, pareceu funcionar mas, após cinco minutos, a conexão caiu e ele não conseguiu mais conectar-se à VPN.
+
+Jean prosseguiu sua leitura em busca de outras opções e descobriu o Navegador Tor, e suas funcionalidades para contornar a censura.
+
+Ele descobriu um site-espelho oficial para fazer o download do programa.
+
+Quando ele abriu o **Navegador Tor** ele seguiu as instruções para usuários censurados e conectou-se a um ponte que possibilitou novamente seu acesso à internet.
+
+Com o Navegador Tor, Jean pode navegar livremente e com privacidade, entrando em contato com sua família.
+
+### Usuários censurados ao redor de todo o mundo confiam no Navegador Tor como um meio livre, estável e livre de censura para acessar a internet.
+
+---
+
+# 5. Seções compartilhadas
+
+## O que é Tor?
+
+Tor é um software livre e uma rede aberta que ajuda a proteger você contra rastreamento, vigilância e censura online.
+Tor é uma criação distribuída gratuitamente por uma organização sem fins lucrativos registrada nos Estados Unidos na categoria 501(c)3 chamada Projeto Tor.
+
+O meio mais fácil de utilizar o Tor é o Navegador Tor
+Quando você usa o Navegador Tor, ninguém pode ver quais websites você visita nem em que lugar do mundo você está.
+
+Outros aplicativos tais como SecureDrop ou OnionShare usam o Tor para proteger seus usuários contra vigilância e censura.
+
+
+## 6. Como funciona o Tor?
+
+Amal quer privacidade para visitar o site de Bekele e, assim, ela abre o Navegador Tor.
+
+O Navegador Tor seleciona um circuito aleatório de três retransmissores, os quais são computadores espalhados ao redor do mundo configurados para rotear todo o seu tráfego pela rede Tor.
+
+O Navegador Tor então criptografa sua solicitação ao website desejado três vezes e a envia ao primeiro retransmissor Tor de seu circuito.
+
+O primeiro retransmissor remove a primeira camada de criptografia mas não sabe que o website de destino é o de Bekele.
+
+O primeiro retransmissor sabe apenas a próxima localização do circuito, que é o segundo retransmissor.
+
+O segundo retransmissor remove outra camada de criptografia e encaminha a solicitação de página web ao terceiro retransmissor.
+
+O terceiro retransmissor remove a última camada de criptografia e encaminha a solicitação de página web ao seu destino, isto é, o website de Bekele, mas não sabe que a solicitação veio de Amal.
+
+Bekele não saberá que a solicitação a seu website veio de Amal, a menos que ela o informe disso.
+
+## 7. Quem usa o Tor?
+
+Pessoas ao redor do mundo usam o Tor para proteger sua privacidade e acessar a web livremente.
+
+Tor ajuda a proteger jornalistas, ativistas de direitos humanos, pesquisadores acadêmicos, bem como qualquer pessoa que experimente rastreamento, censura ou vigilância.
+
+## 6. Por que confiar no Tor?
+
+Tor foi desenvolvido com a privacidade como objetivo. Nós não sabemos quem são nossos usuários e não mantemos registros de atividades de usuários.
+
+Os operadores de retransmissores Tor não conseguem revelar a verdadeira identidade dos usuários do Tor.
+
+A contínua "revisão pelos pares" do código-fonte do Tor por comunidades acadêmicas e de código aberto assegura que não há "portas dos fundos" no Tor, e nosso contrato social promete que jamais criaremos esse tipo de coisa.
+
+## 7. Junte-se à comunidade Tor
+
+O Tor só é possível pela contribuição de um conjunto diversificado de usuários, desenvolvedores, operadores de retransmissores e defensores ao redor do mundo.
+
+Nós precisamos de sua ajuda para tornar o Tor mais usável e seguro para as pessoas em todos os lugares.
+
+Você pode voluntariar-se para ajudar o Tor escrevendo código, operando um retransmissor, criando documentação, oferecendo suporte ao usuário ou contando às pessoas em sua comunidade sobre o Tor.
+
+A comunidade Tor é governada por um código de conduta e nós delineamos nosso conjunto de promessas à comunidade em nosso contrato social.
+
+Saiba mais sobre o Tor visitando nosso website, nossa wiki, localizando-nos no IRC, unindo-se a uma de nossas listas de e-mail ou assinando as "Notícias Tor" no endereço newsletter.torproject.org.
+
+
+## 8. Baixando o Tor
+
+Tor para Desktop
+torproject.org/download
+
+TOR PARA DISPOSITIVOS MÓVEIS
+### Android
+O Navegador Tor para Android está disponível no GooglePlay.
+
+### iOS
+O Navegador Onion, desenvolvido por M. Tigas, é o único navegador que recomendamos para iOS.
+
diff --git a/pt_PT.po b/pt_PT.po
new file mode 100644
index 000000000..6c8fce0dc
--- /dev/null
+++ b/pt_PT.po
@@ -0,0 +1,162 @@
+# Tor Outreach Material 2019-2020
+
+# 1. TOR FOR PRIVACY
+
+### Privacy is a human right
+
+Like many of us, Aleisha spends most of her time online--connecting with friends, posting on social media, and browsing the web.
+
+But lately, she's noticed that advertisements related to her previous searches are following her around online.
+
+This feels so invasive that she does some research on online ads and learns that it's not just advertisers tracking her but also her ISP, analytics companies, social media platforms, and more.
+
+Aleisha decides she wants to find and use software that doesn't collect her data, doesn't track her, and doesn't tell other services anything private about her.
+
+She goes to a privacy training at a local hackerspace and learns about **Tor Browser**, the only web browser that allows her to browse anonymously.
+
+---
+
+# 2.TOR FOR FEMINISTS
+
+### The future is cyberfeminist
+
+Fernanda runs a women's collective focused on reproductive rights in Brazil, where abortion is illegal.
+
+Fernanda and her colleagues built a website with information about abortion access, birth control, and other resources for people seeking reproductive information.
+
+If this website was linked back to them, they could be arrested--or worse.
+
+To protect themselves, Fernanda and her colleagues created the website using Tor **onion services**. Onion services not only protect them from being discovered as the operators of the server but also help protect visitors to their website by requiring they use Tor Browser.
+
+In fact, Fernanda uses **Tor Browser** for all of her web browsing just to be on the safe side.
+
+She also uses a Tor-powered app called **OnionShare** to send files to other activists securely and privately.
+
+### Reproductive rights activists like Fernanda are fighting for fundamental freedoms, and Tor helps power their resistance.
+
+---
+
+# 3. TOR FOR HUMAN RIGHTS
+
+### Water is life
+
+Jelani lives in a small village which a wide river runs through.
+
+This river has provided water to his community since the days of his ancestors.
+
+But today, Jelani’s river is threatened by powerful multinational companies drilling for oil in the region.
+
+Private security firms, paid for by these companies, use powerful surveillance mechanisms to monitor the online activities of Jelani and his neighbors in the village who are organizing to protect their sacred river.
+
+Jelani uses **Tor Browser** to prevent these companies from watching as he visits websites for international human rights protection and legal aid and writes blog posts about the resistance movement in his village.
+
+He also uses **OnionShare** and **SecureDrop** to securely send documents to journalists who are helping expose these human rights violations.
+
+All of this software uses Tor to help protect Jelani’s privacy.
+
+### Human rights activists like Jelani are fighting for justice in their communities, and Tor helps power their resistance.
+
+---
+
+# 4. TOR FOR ANTI-CENSORSHIP
+
+### Build bridges not walls
+
+Jean was traveling for the first time to a country far from his family.
+
+After arriving at a hotel, he opened his laptop.
+
+He was so exhausted that when the message "Connection has timed out" first appeared on his web browser, he thought it was due to his own error.
+
+But after trying again and again, he realized that his email provider, a news website, and many apps were unavailable.
+
+He had heard that this country censors the internet and wondered if that was happening.
+How could he contact his family from behind this impenetrable wall?
+After doing some web searches, he found a forum and read about VPNs, private services that allow you to connect to another uncensored network.
+
+Jean spent half an hour trying to figure out which cheap VPN was best.
+
+He chose one and for a moment it seemed to work, but after five minutes the connection went offline and the VPN would no longer connect.
+
+Jean kept reading to find other options and learned about Tor Browser and how it can circumvent censorship.
+
+He found an official website mirror to download the program.
+
+When he opened **Tor Browser**, he followed the prompts for censored users and connected to a bridge which allowed him to access the internet again.
+
+With Tor Browser, Jean can browse freely and privately and contact his family.
+
+### Censored users all over the world rely on Tor Browser for a free, stable, and uncensored way to access the internet.
+
+---
+
+# 5. Shared Sections
+
+## What is Tor?
+
+Tor is free software and an open network that helps protect you from tracking, surveillance, and censorship online.
+Tor is created for free by a 501(c)3 U.S.-based nonprofit called the Tor Project.
+
+The easiest way to use Tor is Tor Browser.
+When you use Tor Browser, no one can see what websites you visit or where in the world you’re coming from.
+
+Other applications, like SecureDrop and OnionShare, use Tor to protect their users against surveillance and censorship.
+
+
+## 6. How does Tor work?
+
+Amal wants to visit Bekele’s website privately, so she opens Tor Browser.
+
+Tor Browser selects a random circuit of three relays, which are computers all over the world configured to route traffic over the Tor network.
+
+Tor Browser then encrypts her website request three times and sends it to the first Tor relay in her circuit.
+
+The first relay removes the first encryption layer but doesn't learn that the destination is Bekele’s website.
+
+The first relay learns only the next location in the circuit, which is the second relay.
+
+The second relay removes another encryption layer and forwards the web page request to the third relay.
+
+The third relay removes the last encryption layer and forwards the web page request to its destination, Bekele’s website, but it doesn't know the request comes from Amal.
+
+Bekele doesn't know that the website request came from Amal unless she tells him so.
+
+## 7. Who uses Tor?
+
+People all over the world use Tor to protect their privacy and access the web freely.
+
+Tor helps protect journalists, human rights defenders, domestic violence victims, academic researchers, and anyone experiencing tracking, censorship, or surveillance.
+
+## 6. Why trust Tor?
+
+Tor is designed for privacy. We don’t know who our users are, and we don't keep logs of user activity.
+
+Tor relay operators cannot reveal the true identity of Tor users.
+
+Continual peer review of Tor's source code by academic and open source communities ensures that there are no backdoors in Tor, and our social contract promises that we will never backdoor Tor.
+
+## 7. Join the Tor community
+
+Tor is made possible by a diverse set of users, developers, relay operators, and advocates from around the world.
+
+We need your help to make Tor more usable and secure for people everywhere.
+
+You can volunteer with Tor by writing code, running a relay, creating documentation, offering user support, or telling people in your community about Tor.
+
+The Tor community is governed by a code of conduct, and we outline our set of promises to the community in our social contract.
+
+Learn more about Tor by visiting our website, our wiki, finding us on IRC, joining one of our mailing lists, or signing up for Tor News at newsletter.torproject.org.
+
+
+## 8. Download Tor
+
+Tor for Desktop
+torproject.org/download
+
+TOR ON MOBILE
+### Android
+Tor Browser for Android is available from GooglePlay.
+
+### iOS
+Onion Browser, developed by M. Tigas, is the only browser we recommend for iOS.
+
diff --git a/ro.po b/ro.po
new file mode 100644
index 000000000..7e66d3b91
--- /dev/null
+++ b/ro.po
@@ -0,0 +1,162 @@
+# Material de mobilizare 2019-2020
+
+# 1. TOR PENTRU CONFIDENȚIALITATE
+
+### Confidențialitatea este un drept uman
+
+Ca mulți dintre noi, Aleisha își petrece cea mai mare parte a timpului online - conectându-se cu prietenii, postând pe social media și navigând pe web.
+
+Dar, în ultima vreme, a observat că reclamele legate de căutările ei anterioare o urmăresc online.
+
+Aceasta se simte atât de invazivă încât face cercetări privind anunțurile online și află că nu numai agenții de publicitate o urmăresc, ci și ISP-ul, companiile de analiză, platformele sociale media și multe altele.
+
+Aleisha decide că dorește să găsească și să utilizeze software care nu colectează datele ei, nu o urmărește și nu spune altor servicii nimic privat despre ea.
+
+Ea merge la un training de confidențialitate dintr-un spațiu hackers local și află despre ** Tor Browser **, singurul navigator web care îi permite să navigheze anonim.
+
+---
+
+# 2.TOR PENTRU FEMINIȘTI
+
+### Viitorul este cyberfeminist
+
+Fernanda conduce un colectiv de femei axat pe drepturile reproductive în Brazilia, unde avortul este ilegal.
+
+Fernanda și colegii ei au construit un site web cu informații despre accesul la avort, controlul nașterilor și alte resurse pentru persoanele care caută informații despre reproducere.
+
+Dacă prin acest site se poate ajunge la ei, ar putea fi arestați - sau mai rău.
+
+Pentru a se proteja, Fernanda și colegii ei au creat site-ul web folosind serviciile ** Tor **. Serviciile Onion nu numai că îi protejează de a fi descoperiți ca operatori ai serverului, ci ajută, de asemenea, la protejarea vizitatorilor pe site-ul lor web prin solicitarea utilizării Tor Browser.
+
+De fapt, Fernanda folosește **Tor Browser** pentru toate browserele web doar pentru a fi pe partea sigură.
+
+De asemenea, ea utilizează o aplicație Tor-powered, numită **OnionShare**, pentru a trimite în siguranță și în mod privat fișiere altor activiști.
+
+### Activiștii pentru drepturile reproductive, precum Fernanda, se luptă pentru libertățile fundamentale, iar Tor îi ajută în activitatea de rezistență.
+
+---
+
+# 3. TOR PENTRU DREPTURILE OMULUI
+
+### Apa este viață
+
+Jelani trăiește într-un mic sat prin care trece un râu larg.
+
+Acest râu a furnizat apă comunității sale din moși-strămoși.
+
+Dar astăzi, râul lui Jelani este amenințat de puternice companii multinaționale care sondează petrolul din regiune.
+
+Firmele private de securitate, plătite de aceste companii, utilizează mecanisme puternice de supraveghere pentru a monitoriza activitățile online ale lui Jelani și a vecinilor săi din sat care se organizează pentru a-și proteja râul sacru.
+
+Jelani folosește **Tor Browser** pentru a împiedica aceste companii să vizioneze site-ul pentru protecția drepturilor omului și a asistenței juridice internaționale și scrie bloguri despre mișcarea de rezistență din satul său.
+
+De asemenea, el folosește **OnionShare** și **SecureDrop** pentru a trimite în siguranță documente către jurnaliștii care ajută la expunerea acestor încălcări ale drepturilor omului.
+
+Toate aceste programe folosesc Tor pentru a proteja intimitatea lui Jelani.
+
+### Activiștii pentru drepturile omului, cum ar fi Jelani, se luptă pentru justiție în comunitățile lor, iar Tor îi ajută la activitatea de rezistență.
+
+---
+
+# 4. TOR PENTRU ANTI-CENZURĂ
+
+### Construiți poduri, nu ziduri
+
+Jean călătorea pentru prima dată într-o țară departe de familia sa.
+
+După ce a ajuns la un hotel, și-a deschis laptopul.
+
+S-a simțit nedumerit atunci când a apărut pentru prima oară pe browserul său web mesajul "Connection has timed out" și a crezut că mesajul s-a datorat propriei erori.
+
+Dar după ce a încercat de mai multe ori, și-a dat seama că furnizorul de e-mail, un site de știri și multe aplicații nu erau disponibile.
+
+A auzit că în această țară se cenzurează internetul și se întreba dacă se întâmplă acest lucru.
+Cum putea să-și contacteze familia din spatele acestui zid impenetrabil?
+După ce a făcut niște căutări pe web, a găsit un forum și a citit despre VPN-uri, servicii private care vă permit să vă conectați la o altă rețea necenzurată.
+
+Jean a petrecut o jumătate de oră încercând să-și dea seama care VPN ieftin era cel mai bun.
+
+El a ales unul și, pentru un timp, părea că funcționează, dar după cinci minute conexiunea a ieșit offline și VPN-ul nu se mai putea conecta.
+
+Jean continua să citească pentru a găsi alte opțiuni și a învățat despre Tor Browser și cum poate eluda cenzura.
+
+A găsit un site web oficial pentru a descărca programul.
+
+A deschis browserul **Tor Browser**, a urmat instrucțiunile pentru utilizatorii cenzurați și s-a conectat la un pod /bridge care i-a permis din nou accesul la internet.
+
+Cu Tor Browser, Jean poate naviga liber și privat și poate lua legătura cu familia sa.
+
+### Utilizatorii cenzurați din întreaga lume se bazează pe Tor Browser pentru o modalitate gratuită, stabilă și necenzurată de a accesa internetul.
+
+---
+
+# 5. Secțiuni comune
+
+## Ce e Torul?
+
+Tor este un software gratuit și o rețea deschisă care te ajută să te protejezi de urmărire, supraveghere și cenzură online.
+Tor este creat gratuit de către o organizație nonprofit 501(c)3 din S.U.A., numită Tor Project.
+
+Cea mai ușoară modalitate de a utiliza Tor este Tor Browser.
+Atunci când utilizați Tor Browser, nimeni nu poate vedea ce site-uri Web vizitați sau din ce locație le vizitați.
+
+Alte aplicații, cum ar fi SecureDrop și OnionShare, utilizează Tor pentru a-și proteja utilizatorii împotriva supravegherii și cenzurii.
+
+
+## 6. Cum funcționează Tor?
+
+Amal dorește să viziteze privat site-ul Bekele, așa că deschide browserul Tor.
+
+Tor Browser selectează un circuit aleatoriu de trei relee, care sunt computere din întreaga lume configurate pentru a ruta traficul prin rețeaua Tor.
+
+Tor Browser criptează de trei ori cererea ei pentru website și o trimite la primul releu Tor în circuitul ei.
+
+Primul releu elimină primul strat de criptare, dar nu află că destinația este site-ul Bekele.
+
+Primul releu află doar următoarea locație din circuit, care este al doilea releu.
+
+Al doilea releu elimină un alt strat de criptare și înaintează cererea de pagină web către cel de-al treilea releu.
+
+Al treilea releu elimină ultimul strat de criptare și înaintează cererea de pagină web către destinația sa, site-ul Bekele, dar nu știe că cererea vine de la Amal.
+
+Bekele nu știe că cererea pentru website a venit de la Amal, cu excepția cazului în care ea i-ar fi spus asta.
+
+## 7. Cine folosește Tor?
+
+Oamenii din întreaga lume folosesc Tor pentru a-și proteja intimitatea și pentru a accesa liber internetul.
+
+Tor ajută la protejarea jurnaliștilor, a apărătorilor drepturilor omului, a victimelor violenței domestice, a cercetătorilor universitari și a oricui se confruntă cu urmărirea, cenzura sau supravegherea.
+
+## 6. De ce să aveți încredere în Tor?
+
+Tor este proiectat pentru intimitate. Nu știm cine sunt utilizatorii noștri și nu ținem jurnalele de activitate ale utilizatorilor.
+
+Operatorii releului Tor nu pot dezvălui adevărata identitate a utilizatorilor Tor.
+
+Evaluarea continuă a codului sursă Tor de către comunitățile academice și cu surse deschise garantează că nu există backdoors în Tor, iar contractul nostru social promite că backdoor nu va fi folosit niciodată în Tor.
+
+## 7. Aderați la comunitatea Tor
+
+Realizarea Tor a fost posibilă datorită mai multor utilizatori, dezvoltatori, operatori de retransmisie și avocați din întreaga lume.
+
+Avem nevoie de ajutorul dvs. pentru ca Tor să devină mai ușor de folosit și mai sigur pentru oamenii de pretutindeni.
+
+Puteți contribui voluntar la Tor, scriind un cod, rulând un releu, creând documentație, oferind suport pentru utilizatori sau spunând oamenilor din comunitatea dvs. despre Tor.
+
+Comunitatea Tor este guvernată de un cod de conduită și subliniem promisiunile noastre către comunitate din contractul nostru social.
+
+Aflați mai multe despre Tor vizitând site-ul nostru, pagina noastră wiki, găsindu-ne pe IRC, alăturându-vă uneia dintre listele noastre de discuții sau înscriindu-vă la Tor News de pe newsletter.torproject.org.
+
+
+## 8. Descărcare Tor
+
+Tor pentru Desktop
+torproject.org/download
+
+TOR PE MOBIL
+### Android
+Tor Browser pentru Android este valabil pe GooglePlay.
+
+### iOS
+Onion Browser, dezvoltat de M. Tigas, este unicul browser pe care îl recomandăm pentru iOS.
+
diff --git a/ru.po b/ru.po
new file mode 100644
index 000000000..fbe69cfd0
--- /dev/null
+++ b/ru.po
@@ -0,0 +1,162 @@
+# Tor Outreach Material 2019-2020
+
+# 1. TOR ЗА КОНФИДЕНЦИАЛЬНОСТЬ
+
+### Человек имеет право на неприкосновенность частной жизни
+
+Как и многие из нас, Алиша проводит много времени онлайн - общаясь с друзьями, оставляя комментарии в соцсетях и просматривая веб-страницы.
+
+But lately, she's noticed that advertisements related to her previous searches are following her around online.
+
+This feels so invasive that she does some research on online ads and learns that it's not just advertisers tracking her but also her ISP, analytics companies, social media platforms, and more.
+
+Aleisha decides she wants to find and use software that doesn't collect her data, doesn't track her, and doesn't tell other services anything private about her.
+
+She goes to a privacy training at a local hackerspace and learns about **Tor Browser**, the only web browser that allows her to browse anonymously.
+
+---
+
+# 2.TOR FOR FEMINISTS
+
+### The future is cyberfeminist
+
+Fernanda runs a women's collective focused on reproductive rights in Brazil, where abortion is illegal.
+
+Fernanda and her colleagues built a website with information about abortion access, birth control, and other resources for people seeking reproductive information.
+
+If this website was linked back to them, they could be arrested--or worse.
+
+To protect themselves, Fernanda and her colleagues created the website using Tor **onion services**. Onion services not only protect them from being discovered as the operators of the server but also help protect visitors to their website by requiring they use Tor Browser.
+
+In fact, Fernanda uses **Tor Browser** for all of her web browsing just to be on the safe side.
+
+She also uses a Tor-powered app called **OnionShare** to send files to other activists securely and privately.
+
+### Reproductive rights activists like Fernanda are fighting for fundamental freedoms, and Tor helps power their resistance.
+
+---
+
+# 3. TOR FOR HUMAN RIGHTS
+
+### Water is life
+
+Jelani lives in a small village which a wide river runs through.
+
+This river has provided water to his community since the days of his ancestors.
+
+But today, Jelani’s river is threatened by powerful multinational companies drilling for oil in the region.
+
+Private security firms, paid for by these companies, use powerful surveillance mechanisms to monitor the online activities of Jelani and his neighbors in the village who are organizing to protect their sacred river.
+
+Jelani uses **Tor Browser** to prevent these companies from watching as he visits websites for international human rights protection and legal aid and writes blog posts about the resistance movement in his village.
+
+He also uses **OnionShare** and **SecureDrop** to securely send documents to journalists who are helping expose these human rights violations.
+
+All of this software uses Tor to help protect Jelani’s privacy.
+
+### Human rights activists like Jelani are fighting for justice in their communities, and Tor helps power their resistance.
+
+---
+
+# 4. TOR FOR ANTI-CENSORSHIP
+
+### Build bridges not walls
+
+Jean was traveling for the first time to a country far from his family.
+
+After arriving at a hotel, he opened his laptop.
+
+He was so exhausted that when the message "Connection has timed out" first appeared on his web browser, he thought it was due to his own error.
+
+But after trying again and again, he realized that his email provider, a news website, and many apps were unavailable.
+
+He had heard that this country censors the internet and wondered if that was happening.
+How could he contact his family from behind this impenetrable wall?
+After doing some web searches, he found a forum and read about VPNs, private services that allow you to connect to another uncensored network.
+
+Jean spent half an hour trying to figure out which cheap VPN was best.
+
+He chose one and for a moment it seemed to work, but after five minutes the connection went offline and the VPN would no longer connect.
+
+Jean kept reading to find other options and learned about Tor Browser and how it can circumvent censorship.
+
+He found an official website mirror to download the program.
+
+When he opened **Tor Browser**, he followed the prompts for censored users and connected to a bridge which allowed him to access the internet again.
+
+With Tor Browser, Jean can browse freely and privately and contact his family.
+
+### Censored users all over the world rely on Tor Browser for a free, stable, and uncensored way to access the internet.
+
+---
+
+# 5. Shared Sections
+
+## Что такое Tor?
+
+Tor is free software and an open network that helps protect you from tracking, surveillance, and censorship online.
+Tor is created for free by a 501(c)3 U.S.-based nonprofit called the Tor Project.
+
+The easiest way to use Tor is Tor Browser.
+When you use Tor Browser, no one can see what websites you visit or where in the world you’re coming from.
+
+Other applications, like SecureDrop and OnionShare, use Tor to protect their users against surveillance and censorship.
+
+
+## 6. How does Tor work?
+
+Amal wants to visit Bekele’s website privately, so she opens Tor Browser.
+
+Tor Browser selects a random circuit of three relays, which are computers all over the world configured to route traffic over the Tor network.
+
+Tor Browser then encrypts her website request three times and sends it to the first Tor relay in her circuit.
+
+The first relay removes the first encryption layer but doesn't learn that the destination is Bekele’s website.
+
+The first relay learns only the next location in the circuit, which is the second relay.
+
+The second relay removes another encryption layer and forwards the web page request to the third relay.
+
+The third relay removes the last encryption layer and forwards the web page request to its destination, Bekele’s website, but it doesn't know the request comes from Amal.
+
+Bekele doesn't know that the website request came from Amal unless she tells him so.
+
+## 7. Who uses Tor?
+
+People all over the world use Tor to protect their privacy and access the web freely.
+
+Tor helps protect journalists, human rights defenders, domestic violence victims, academic researchers, and anyone experiencing tracking, censorship, or surveillance.
+
+## 6. Why trust Tor?
+
+Tor is designed for privacy. We don’t know who our users are, and we don't keep logs of user activity.
+
+Tor relay operators cannot reveal the true identity of Tor users.
+
+Continual peer review of Tor's source code by academic and open source communities ensures that there are no backdoors in Tor, and our social contract promises that we will never backdoor Tor.
+
+## 7. Join the Tor community
+
+Tor is made possible by a diverse set of users, developers, relay operators, and advocates from around the world.
+
+We need your help to make Tor more usable and secure for people everywhere.
+
+You can volunteer with Tor by writing code, running a relay, creating documentation, offering user support, or telling people in your community about Tor.
+
+The Tor community is governed by a code of conduct, and we outline our set of promises to the community in our social contract.
+
+Learn more about Tor by visiting our website, our wiki, finding us on IRC, joining one of our mailing lists, or signing up for Tor News at newsletter.torproject.org.
+
+
+## 8. Download Tor
+
+Tor for Desktop
+torproject.org/download
+
+TOR ON MOBILE
+### Android
+Tor Browser for Android is available from GooglePlay.
+
+### iOS
+Onion Browser, developed by M. Tigas, is the only browser we recommend for iOS.
+
diff --git a/sco.po b/sco.po
new file mode 100644
index 000000000..6c8fce0dc
--- /dev/null
+++ b/sco.po
@@ -0,0 +1,162 @@
+# Tor Outreach Material 2019-2020
+
+# 1. TOR FOR PRIVACY
+
+### Privacy is a human right
+
+Like many of us, Aleisha spends most of her time online--connecting with friends, posting on social media, and browsing the web.
+
+But lately, she's noticed that advertisements related to her previous searches are following her around online.
+
+This feels so invasive that she does some research on online ads and learns that it's not just advertisers tracking her but also her ISP, analytics companies, social media platforms, and more.
+
+Aleisha decides she wants to find and use software that doesn't collect her data, doesn't track her, and doesn't tell other services anything private about her.
+
+She goes to a privacy training at a local hackerspace and learns about **Tor Browser**, the only web browser that allows her to browse anonymously.
+
+---
+
+# 2.TOR FOR FEMINISTS
+
+### The future is cyberfeminist
+
+Fernanda runs a women's collective focused on reproductive rights in Brazil, where abortion is illegal.
+
+Fernanda and her colleagues built a website with information about abortion access, birth control, and other resources for people seeking reproductive information.
+
+If this website was linked back to them, they could be arrested--or worse.
+
+To protect themselves, Fernanda and her colleagues created the website using Tor **onion services**. Onion services not only protect them from being discovered as the operators of the server but also help protect visitors to their website by requiring they use Tor Browser.
+
+In fact, Fernanda uses **Tor Browser** for all of her web browsing just to be on the safe side.
+
+She also uses a Tor-powered app called **OnionShare** to send files to other activists securely and privately.
+
+### Reproductive rights activists like Fernanda are fighting for fundamental freedoms, and Tor helps power their resistance.
+
+---
+
+# 3. TOR FOR HUMAN RIGHTS
+
+### Water is life
+
+Jelani lives in a small village which a wide river runs through.
+
+This river has provided water to his community since the days of his ancestors.
+
+But today, Jelani’s river is threatened by powerful multinational companies drilling for oil in the region.
+
+Private security firms, paid for by these companies, use powerful surveillance mechanisms to monitor the online activities of Jelani and his neighbors in the village who are organizing to protect their sacred river.
+
+Jelani uses **Tor Browser** to prevent these companies from watching as he visits websites for international human rights protection and legal aid and writes blog posts about the resistance movement in his village.
+
+He also uses **OnionShare** and **SecureDrop** to securely send documents to journalists who are helping expose these human rights violations.
+
+All of this software uses Tor to help protect Jelani’s privacy.
+
+### Human rights activists like Jelani are fighting for justice in their communities, and Tor helps power their resistance.
+
+---
+
+# 4. TOR FOR ANTI-CENSORSHIP
+
+### Build bridges not walls
+
+Jean was traveling for the first time to a country far from his family.
+
+After arriving at a hotel, he opened his laptop.
+
+He was so exhausted that when the message "Connection has timed out" first appeared on his web browser, he thought it was due to his own error.
+
+But after trying again and again, he realized that his email provider, a news website, and many apps were unavailable.
+
+He had heard that this country censors the internet and wondered if that was happening.
+How could he contact his family from behind this impenetrable wall?
+After doing some web searches, he found a forum and read about VPNs, private services that allow you to connect to another uncensored network.
+
+Jean spent half an hour trying to figure out which cheap VPN was best.
+
+He chose one and for a moment it seemed to work, but after five minutes the connection went offline and the VPN would no longer connect.
+
+Jean kept reading to find other options and learned about Tor Browser and how it can circumvent censorship.
+
+He found an official website mirror to download the program.
+
+When he opened **Tor Browser**, he followed the prompts for censored users and connected to a bridge which allowed him to access the internet again.
+
+With Tor Browser, Jean can browse freely and privately and contact his family.
+
+### Censored users all over the world rely on Tor Browser for a free, stable, and uncensored way to access the internet.
+
+---
+
+# 5. Shared Sections
+
+## What is Tor?
+
+Tor is free software and an open network that helps protect you from tracking, surveillance, and censorship online.
+Tor is created for free by a 501(c)3 U.S.-based nonprofit called the Tor Project.
+
+The easiest way to use Tor is Tor Browser.
+When you use Tor Browser, no one can see what websites you visit or where in the world you’re coming from.
+
+Other applications, like SecureDrop and OnionShare, use Tor to protect their users against surveillance and censorship.
+
+
+## 6. How does Tor work?
+
+Amal wants to visit Bekele’s website privately, so she opens Tor Browser.
+
+Tor Browser selects a random circuit of three relays, which are computers all over the world configured to route traffic over the Tor network.
+
+Tor Browser then encrypts her website request three times and sends it to the first Tor relay in her circuit.
+
+The first relay removes the first encryption layer but doesn't learn that the destination is Bekele’s website.
+
+The first relay learns only the next location in the circuit, which is the second relay.
+
+The second relay removes another encryption layer and forwards the web page request to the third relay.
+
+The third relay removes the last encryption layer and forwards the web page request to its destination, Bekele’s website, but it doesn't know the request comes from Amal.
+
+Bekele doesn't know that the website request came from Amal unless she tells him so.
+
+## 7. Who uses Tor?
+
+People all over the world use Tor to protect their privacy and access the web freely.
+
+Tor helps protect journalists, human rights defenders, domestic violence victims, academic researchers, and anyone experiencing tracking, censorship, or surveillance.
+
+## 6. Why trust Tor?
+
+Tor is designed for privacy. We don’t know who our users are, and we don't keep logs of user activity.
+
+Tor relay operators cannot reveal the true identity of Tor users.
+
+Continual peer review of Tor's source code by academic and open source communities ensures that there are no backdoors in Tor, and our social contract promises that we will never backdoor Tor.
+
+## 7. Join the Tor community
+
+Tor is made possible by a diverse set of users, developers, relay operators, and advocates from around the world.
+
+We need your help to make Tor more usable and secure for people everywhere.
+
+You can volunteer with Tor by writing code, running a relay, creating documentation, offering user support, or telling people in your community about Tor.
+
+The Tor community is governed by a code of conduct, and we outline our set of promises to the community in our social contract.
+
+Learn more about Tor by visiting our website, our wiki, finding us on IRC, joining one of our mailing lists, or signing up for Tor News at newsletter.torproject.org.
+
+
+## 8. Download Tor
+
+Tor for Desktop
+torproject.org/download
+
+TOR ON MOBILE
+### Android
+Tor Browser for Android is available from GooglePlay.
+
+### iOS
+Onion Browser, developed by M. Tigas, is the only browser we recommend for iOS.
+
diff --git a/si.po b/si.po
new file mode 100644
index 000000000..6c8fce0dc
--- /dev/null
+++ b/si.po
@@ -0,0 +1,162 @@
+# Tor Outreach Material 2019-2020
+
+# 1. TOR FOR PRIVACY
+
+### Privacy is a human right
+
+Like many of us, Aleisha spends most of her time online--connecting with friends, posting on social media, and browsing the web.
+
+But lately, she's noticed that advertisements related to her previous searches are following her around online.
+
+This feels so invasive that she does some research on online ads and learns that it's not just advertisers tracking her but also her ISP, analytics companies, social media platforms, and more.
+
+Aleisha decides she wants to find and use software that doesn't collect her data, doesn't track her, and doesn't tell other services anything private about her.
+
+She goes to a privacy training at a local hackerspace and learns about **Tor Browser**, the only web browser that allows her to browse anonymously.
+
+---
+
+# 2.TOR FOR FEMINISTS
+
+### The future is cyberfeminist
+
+Fernanda runs a women's collective focused on reproductive rights in Brazil, where abortion is illegal.
+
+Fernanda and her colleagues built a website with information about abortion access, birth control, and other resources for people seeking reproductive information.
+
+If this website was linked back to them, they could be arrested--or worse.
+
+To protect themselves, Fernanda and her colleagues created the website using Tor **onion services**. Onion services not only protect them from being discovered as the operators of the server but also help protect visitors to their website by requiring they use Tor Browser.
+
+In fact, Fernanda uses **Tor Browser** for all of her web browsing just to be on the safe side.
+
+She also uses a Tor-powered app called **OnionShare** to send files to other activists securely and privately.
+
+### Reproductive rights activists like Fernanda are fighting for fundamental freedoms, and Tor helps power their resistance.
+
+---
+
+# 3. TOR FOR HUMAN RIGHTS
+
+### Water is life
+
+Jelani lives in a small village which a wide river runs through.
+
+This river has provided water to his community since the days of his ancestors.
+
+But today, Jelani’s river is threatened by powerful multinational companies drilling for oil in the region.
+
+Private security firms, paid for by these companies, use powerful surveillance mechanisms to monitor the online activities of Jelani and his neighbors in the village who are organizing to protect their sacred river.
+
+Jelani uses **Tor Browser** to prevent these companies from watching as he visits websites for international human rights protection and legal aid and writes blog posts about the resistance movement in his village.
+
+He also uses **OnionShare** and **SecureDrop** to securely send documents to journalists who are helping expose these human rights violations.
+
+All of this software uses Tor to help protect Jelani’s privacy.
+
+### Human rights activists like Jelani are fighting for justice in their communities, and Tor helps power their resistance.
+
+---
+
+# 4. TOR FOR ANTI-CENSORSHIP
+
+### Build bridges not walls
+
+Jean was traveling for the first time to a country far from his family.
+
+After arriving at a hotel, he opened his laptop.
+
+He was so exhausted that when the message "Connection has timed out" first appeared on his web browser, he thought it was due to his own error.
+
+But after trying again and again, he realized that his email provider, a news website, and many apps were unavailable.
+
+He had heard that this country censors the internet and wondered if that was happening.
+How could he contact his family from behind this impenetrable wall?
+After doing some web searches, he found a forum and read about VPNs, private services that allow you to connect to another uncensored network.
+
+Jean spent half an hour trying to figure out which cheap VPN was best.
+
+He chose one and for a moment it seemed to work, but after five minutes the connection went offline and the VPN would no longer connect.
+
+Jean kept reading to find other options and learned about Tor Browser and how it can circumvent censorship.
+
+He found an official website mirror to download the program.
+
+When he opened **Tor Browser**, he followed the prompts for censored users and connected to a bridge which allowed him to access the internet again.
+
+With Tor Browser, Jean can browse freely and privately and contact his family.
+
+### Censored users all over the world rely on Tor Browser for a free, stable, and uncensored way to access the internet.
+
+---
+
+# 5. Shared Sections
+
+## What is Tor?
+
+Tor is free software and an open network that helps protect you from tracking, surveillance, and censorship online.
+Tor is created for free by a 501(c)3 U.S.-based nonprofit called the Tor Project.
+
+The easiest way to use Tor is Tor Browser.
+When you use Tor Browser, no one can see what websites you visit or where in the world you’re coming from.
+
+Other applications, like SecureDrop and OnionShare, use Tor to protect their users against surveillance and censorship.
+
+
+## 6. How does Tor work?
+
+Amal wants to visit Bekele’s website privately, so she opens Tor Browser.
+
+Tor Browser selects a random circuit of three relays, which are computers all over the world configured to route traffic over the Tor network.
+
+Tor Browser then encrypts her website request three times and sends it to the first Tor relay in her circuit.
+
+The first relay removes the first encryption layer but doesn't learn that the destination is Bekele’s website.
+
+The first relay learns only the next location in the circuit, which is the second relay.
+
+The second relay removes another encryption layer and forwards the web page request to the third relay.
+
+The third relay removes the last encryption layer and forwards the web page request to its destination, Bekele’s website, but it doesn't know the request comes from Amal.
+
+Bekele doesn't know that the website request came from Amal unless she tells him so.
+
+## 7. Who uses Tor?
+
+People all over the world use Tor to protect their privacy and access the web freely.
+
+Tor helps protect journalists, human rights defenders, domestic violence victims, academic researchers, and anyone experiencing tracking, censorship, or surveillance.
+
+## 6. Why trust Tor?
+
+Tor is designed for privacy. We don’t know who our users are, and we don't keep logs of user activity.
+
+Tor relay operators cannot reveal the true identity of Tor users.
+
+Continual peer review of Tor's source code by academic and open source communities ensures that there are no backdoors in Tor, and our social contract promises that we will never backdoor Tor.
+
+## 7. Join the Tor community
+
+Tor is made possible by a diverse set of users, developers, relay operators, and advocates from around the world.
+
+We need your help to make Tor more usable and secure for people everywhere.
+
+You can volunteer with Tor by writing code, running a relay, creating documentation, offering user support, or telling people in your community about Tor.
+
+The Tor community is governed by a code of conduct, and we outline our set of promises to the community in our social contract.
+
+Learn more about Tor by visiting our website, our wiki, finding us on IRC, joining one of our mailing lists, or signing up for Tor News at newsletter.torproject.org.
+
+
+## 8. Download Tor
+
+Tor for Desktop
+torproject.org/download
+
+TOR ON MOBILE
+### Android
+Tor Browser for Android is available from GooglePlay.
+
+### iOS
+Onion Browser, developed by M. Tigas, is the only browser we recommend for iOS.
+
diff --git a/sk.po b/sk.po
new file mode 100644
index 000000000..69c441cd4
--- /dev/null
+++ b/sk.po
@@ -0,0 +1,162 @@
+# Tor Outreach Material 2019-2020
+
+# 1. TOR FOR PRIVACY
+
+### Privacy is a human right
+
+Like many of us, Aleisha spends most of her time online--connecting with friends, posting on social media, and browsing the web.
+
+But lately, she's noticed that advertisements related to her previous searches are following her around online.
+
+This feels so invasive that she does some research on online ads and learns that it's not just advertisers tracking her but also her ISP, analytics companies, social media platforms, and more.
+
+Aleisha decides she wants to find and use software that doesn't collect her data, doesn't track her, and doesn't tell other services anything private about her.
+
+She goes to a privacy training at a local hackerspace and learns about **Tor Browser**, the only web browser that allows her to browse anonymously.
+
+---
+
+# 2.TOR FOR FEMINISTS
+
+### The future is cyberfeminist
+
+Fernanda runs a women's collective focused on reproductive rights in Brazil, where abortion is illegal.
+
+Fernanda and her colleagues built a website with information about abortion access, birth control, and other resources for people seeking reproductive information.
+
+If this website was linked back to them, they could be arrested--or worse.
+
+To protect themselves, Fernanda and her colleagues created the website using Tor **onion services**. Onion services not only protect them from being discovered as the operators of the server but also help protect visitors to their website by requiring they use Tor Browser.
+
+In fact, Fernanda uses **Tor Browser** for all of her web browsing just to be on the safe side.
+
+She also uses a Tor-powered app called **OnionShare** to send files to other activists securely and privately.
+
+### Reproductive rights activists like Fernanda are fighting for fundamental freedoms, and Tor helps power their resistance.
+
+---
+
+# 3. TOR FOR HUMAN RIGHTS
+
+### Water is life
+
+Jelani lives in a small village which a wide river runs through.
+
+This river has provided water to his community since the days of his ancestors.
+
+But today, Jelani’s river is threatened by powerful multinational companies drilling for oil in the region.
+
+Private security firms, paid for by these companies, use powerful surveillance mechanisms to monitor the online activities of Jelani and his neighbors in the village who are organizing to protect their sacred river.
+
+Jelani uses **Tor Browser** to prevent these companies from watching as he visits websites for international human rights protection and legal aid and writes blog posts about the resistance movement in his village.
+
+He also uses **OnionShare** and **SecureDrop** to securely send documents to journalists who are helping expose these human rights violations.
+
+All of this software uses Tor to help protect Jelani’s privacy.
+
+### Human rights activists like Jelani are fighting for justice in their communities, and Tor helps power their resistance.
+
+---
+
+# 4. TOR FOR ANTI-CENSORSHIP
+
+### Build bridges not walls
+
+Jean was traveling for the first time to a country far from his family.
+
+After arriving at a hotel, he opened his laptop.
+
+He was so exhausted that when the message "Connection has timed out" first appeared on his web browser, he thought it was due to his own error.
+
+But after trying again and again, he realized that his email provider, a news website, and many apps were unavailable.
+
+He had heard that this country censors the internet and wondered if that was happening.
+How could he contact his family from behind this impenetrable wall?
+After doing some web searches, he found a forum and read about VPNs, private services that allow you to connect to another uncensored network.
+
+Jean spent half an hour trying to figure out which cheap VPN was best.
+
+He chose one and for a moment it seemed to work, but after five minutes the connection went offline and the VPN would no longer connect.
+
+Jean kept reading to find other options and learned about Tor Browser and how it can circumvent censorship.
+
+He found an official website mirror to download the program.
+
+When he opened **Tor Browser**, he followed the prompts for censored users and connected to a bridge which allowed him to access the internet again.
+
+With Tor Browser, Jean can browse freely and privately and contact his family.
+
+### Censored users all over the world rely on Tor Browser for a free, stable, and uncensored way to access the internet.
+
+---
+
+# 5. Shared Sections
+
+## Čo je Tor?
+
+Tor is free software and an open network that helps protect you from tracking, surveillance, and censorship online.
+Tor is created for free by a 501(c)3 U.S.-based nonprofit called the Tor Project.
+
+The easiest way to use Tor is Tor Browser.
+When you use Tor Browser, no one can see what websites you visit or where in the world you’re coming from.
+
+Other applications, like SecureDrop and OnionShare, use Tor to protect their users against surveillance and censorship.
+
+
+## 6. How does Tor work?
+
+Amal wants to visit Bekele’s website privately, so she opens Tor Browser.
+
+Tor Browser selects a random circuit of three relays, which are computers all over the world configured to route traffic over the Tor network.
+
+Tor Browser then encrypts her website request three times and sends it to the first Tor relay in her circuit.
+
+The first relay removes the first encryption layer but doesn't learn that the destination is Bekele’s website.
+
+The first relay learns only the next location in the circuit, which is the second relay.
+
+The second relay removes another encryption layer and forwards the web page request to the third relay.
+
+The third relay removes the last encryption layer and forwards the web page request to its destination, Bekele’s website, but it doesn't know the request comes from Amal.
+
+Bekele doesn't know that the website request came from Amal unless she tells him so.
+
+## 7. Who uses Tor?
+
+People all over the world use Tor to protect their privacy and access the web freely.
+
+Tor helps protect journalists, human rights defenders, domestic violence victims, academic researchers, and anyone experiencing tracking, censorship, or surveillance.
+
+## 6. Why trust Tor?
+
+Tor is designed for privacy. We don’t know who our users are, and we don't keep logs of user activity.
+
+Tor relay operators cannot reveal the true identity of Tor users.
+
+Continual peer review of Tor's source code by academic and open source communities ensures that there are no backdoors in Tor, and our social contract promises that we will never backdoor Tor.
+
+## 7. Join the Tor community
+
+Tor is made possible by a diverse set of users, developers, relay operators, and advocates from around the world.
+
+We need your help to make Tor more usable and secure for people everywhere.
+
+You can volunteer with Tor by writing code, running a relay, creating documentation, offering user support, or telling people in your community about Tor.
+
+The Tor community is governed by a code of conduct, and we outline our set of promises to the community in our social contract.
+
+Learn more about Tor by visiting our website, our wiki, finding us on IRC, joining one of our mailing lists, or signing up for Tor News at newsletter.torproject.org.
+
+
+## 8. Download Tor
+
+Tor for Desktop
+torproject.org/download
+
+TOR ON MOBILE
+### Android
+Tor Browser for Android is available from GooglePlay.
+
+### iOS
+Onion Browser, developed by M. Tigas, is the only browser we recommend for iOS.
+
diff --git a/sl.po b/sl.po
new file mode 100644
index 000000000..1c6f4fb6d
--- /dev/null
+++ b/sl.po
@@ -0,0 +1,162 @@
+# Tor Outreach Material 2019-2020
+
+# 1. TOR FOR PRIVACY
+
+### Privacy is a human right
+
+Like many of us, Aleisha spends most of her time online--connecting with friends, posting on social media, and browsing the web.
+
+But lately, she's noticed that advertisements related to her previous searches are following her around online.
+
+This feels so invasive that she does some research on online ads and learns that it's not just advertisers tracking her but also her ISP, analytics companies, social media platforms, and more.
+
+Aleisha decides she wants to find and use software that doesn't collect her data, doesn't track her, and doesn't tell other services anything private about her.
+
+She goes to a privacy training at a local hackerspace and learns about **Tor Browser**, the only web browser that allows her to browse anonymously.
+
+---
+
+# 2.TOR FOR FEMINISTS
+
+### The future is cyberfeminist
+
+Fernanda runs a women's collective focused on reproductive rights in Brazil, where abortion is illegal.
+
+Fernanda and her colleagues built a website with information about abortion access, birth control, and other resources for people seeking reproductive information.
+
+If this website was linked back to them, they could be arrested--or worse.
+
+To protect themselves, Fernanda and her colleagues created the website using Tor **onion services**. Onion services not only protect them from being discovered as the operators of the server but also help protect visitors to their website by requiring they use Tor Browser.
+
+In fact, Fernanda uses **Tor Browser** for all of her web browsing just to be on the safe side.
+
+She also uses a Tor-powered app called **OnionShare** to send files to other activists securely and privately.
+
+### Reproductive rights activists like Fernanda are fighting for fundamental freedoms, and Tor helps power their resistance.
+
+---
+
+# 3. TOR FOR HUMAN RIGHTS
+
+### Water is life
+
+Jelani lives in a small village which a wide river runs through.
+
+This river has provided water to his community since the days of his ancestors.
+
+But today, Jelani’s river is threatened by powerful multinational companies drilling for oil in the region.
+
+Private security firms, paid for by these companies, use powerful surveillance mechanisms to monitor the online activities of Jelani and his neighbors in the village who are organizing to protect their sacred river.
+
+Jelani uses **Tor Browser** to prevent these companies from watching as he visits websites for international human rights protection and legal aid and writes blog posts about the resistance movement in his village.
+
+He also uses **OnionShare** and **SecureDrop** to securely send documents to journalists who are helping expose these human rights violations.
+
+All of this software uses Tor to help protect Jelani’s privacy.
+
+### Human rights activists like Jelani are fighting for justice in their communities, and Tor helps power their resistance.
+
+---
+
+# 4. TOR FOR ANTI-CENSORSHIP
+
+### Build bridges not walls
+
+Jean was traveling for the first time to a country far from his family.
+
+After arriving at a hotel, he opened his laptop.
+
+He was so exhausted that when the message "Connection has timed out" first appeared on his web browser, he thought it was due to his own error.
+
+But after trying again and again, he realized that his email provider, a news website, and many apps were unavailable.
+
+He had heard that this country censors the internet and wondered if that was happening.
+How could he contact his family from behind this impenetrable wall?
+After doing some web searches, he found a forum and read about VPNs, private services that allow you to connect to another uncensored network.
+
+Jean spent half an hour trying to figure out which cheap VPN was best.
+
+He chose one and for a moment it seemed to work, but after five minutes the connection went offline and the VPN would no longer connect.
+
+Jean kept reading to find other options and learned about Tor Browser and how it can circumvent censorship.
+
+He found an official website mirror to download the program.
+
+When he opened **Tor Browser**, he followed the prompts for censored users and connected to a bridge which allowed him to access the internet again.
+
+With Tor Browser, Jean can browse freely and privately and contact his family.
+
+### Censored users all over the world rely on Tor Browser for a free, stable, and uncensored way to access the internet.
+
+---
+
+# 5. Shared Sections
+
+## Kaj je Tor?
+
+Tor is free software and an open network that helps protect you from tracking, surveillance, and censorship online.
+Tor is created for free by a 501(c)3 U.S.-based nonprofit called the Tor Project.
+
+The easiest way to use Tor is Tor Browser.
+When you use Tor Browser, no one can see what websites you visit or where in the world you’re coming from.
+
+Other applications, like SecureDrop and OnionShare, use Tor to protect their users against surveillance and censorship.
+
+
+## 6. How does Tor work?
+
+Amal wants to visit Bekele’s website privately, so she opens Tor Browser.
+
+Tor Browser selects a random circuit of three relays, which are computers all over the world configured to route traffic over the Tor network.
+
+Tor Browser then encrypts her website request three times and sends it to the first Tor relay in her circuit.
+
+The first relay removes the first encryption layer but doesn't learn that the destination is Bekele’s website.
+
+The first relay learns only the next location in the circuit, which is the second relay.
+
+The second relay removes another encryption layer and forwards the web page request to the third relay.
+
+The third relay removes the last encryption layer and forwards the web page request to its destination, Bekele’s website, but it doesn't know the request comes from Amal.
+
+Bekele doesn't know that the website request came from Amal unless she tells him so.
+
+## 7. Who uses Tor?
+
+People all over the world use Tor to protect their privacy and access the web freely.
+
+Tor helps protect journalists, human rights defenders, domestic violence victims, academic researchers, and anyone experiencing tracking, censorship, or surveillance.
+
+## 6. Why trust Tor?
+
+Tor is designed for privacy. We don’t know who our users are, and we don't keep logs of user activity.
+
+Tor relay operators cannot reveal the true identity of Tor users.
+
+Continual peer review of Tor's source code by academic and open source communities ensures that there are no backdoors in Tor, and our social contract promises that we will never backdoor Tor.
+
+## 7. Join the Tor community
+
+Tor is made possible by a diverse set of users, developers, relay operators, and advocates from around the world.
+
+We need your help to make Tor more usable and secure for people everywhere.
+
+You can volunteer with Tor by writing code, running a relay, creating documentation, offering user support, or telling people in your community about Tor.
+
+The Tor community is governed by a code of conduct, and we outline our set of promises to the community in our social contract.
+
+Learn more about Tor by visiting our website, our wiki, finding us on IRC, joining one of our mailing lists, or signing up for Tor News at newsletter.torproject.org.
+
+
+## 8. Download Tor
+
+Tor for Desktop
+torproject.org/download
+
+TOR ON MOBILE
+### Android
+Tor Browser for Android is available from GooglePlay.
+
+### iOS
+Onion Browser, developed by M. Tigas, is the only browser we recommend for iOS.
+
diff --git a/sn.po b/sn.po
new file mode 100644
index 000000000..6c8fce0dc
--- /dev/null
+++ b/sn.po
@@ -0,0 +1,162 @@
+# Tor Outreach Material 2019-2020
+
+# 1. TOR FOR PRIVACY
+
+### Privacy is a human right
+
+Like many of us, Aleisha spends most of her time online--connecting with friends, posting on social media, and browsing the web.
+
+But lately, she's noticed that advertisements related to her previous searches are following her around online.
+
+This feels so invasive that she does some research on online ads and learns that it's not just advertisers tracking her but also her ISP, analytics companies, social media platforms, and more.
+
+Aleisha decides she wants to find and use software that doesn't collect her data, doesn't track her, and doesn't tell other services anything private about her.
+
+She goes to a privacy training at a local hackerspace and learns about **Tor Browser**, the only web browser that allows her to browse anonymously.
+
+---
+
+# 2.TOR FOR FEMINISTS
+
+### The future is cyberfeminist
+
+Fernanda runs a women's collective focused on reproductive rights in Brazil, where abortion is illegal.
+
+Fernanda and her colleagues built a website with information about abortion access, birth control, and other resources for people seeking reproductive information.
+
+If this website was linked back to them, they could be arrested--or worse.
+
+To protect themselves, Fernanda and her colleagues created the website using Tor **onion services**. Onion services not only protect them from being discovered as the operators of the server but also help protect visitors to their website by requiring they use Tor Browser.
+
+In fact, Fernanda uses **Tor Browser** for all of her web browsing just to be on the safe side.
+
+She also uses a Tor-powered app called **OnionShare** to send files to other activists securely and privately.
+
+### Reproductive rights activists like Fernanda are fighting for fundamental freedoms, and Tor helps power their resistance.
+
+---
+
+# 3. TOR FOR HUMAN RIGHTS
+
+### Water is life
+
+Jelani lives in a small village which a wide river runs through.
+
+This river has provided water to his community since the days of his ancestors.
+
+But today, Jelani’s river is threatened by powerful multinational companies drilling for oil in the region.
+
+Private security firms, paid for by these companies, use powerful surveillance mechanisms to monitor the online activities of Jelani and his neighbors in the village who are organizing to protect their sacred river.
+
+Jelani uses **Tor Browser** to prevent these companies from watching as he visits websites for international human rights protection and legal aid and writes blog posts about the resistance movement in his village.
+
+He also uses **OnionShare** and **SecureDrop** to securely send documents to journalists who are helping expose these human rights violations.
+
+All of this software uses Tor to help protect Jelani’s privacy.
+
+### Human rights activists like Jelani are fighting for justice in their communities, and Tor helps power their resistance.
+
+---
+
+# 4. TOR FOR ANTI-CENSORSHIP
+
+### Build bridges not walls
+
+Jean was traveling for the first time to a country far from his family.
+
+After arriving at a hotel, he opened his laptop.
+
+He was so exhausted that when the message "Connection has timed out" first appeared on his web browser, he thought it was due to his own error.
+
+But after trying again and again, he realized that his email provider, a news website, and many apps were unavailable.
+
+He had heard that this country censors the internet and wondered if that was happening.
+How could he contact his family from behind this impenetrable wall?
+After doing some web searches, he found a forum and read about VPNs, private services that allow you to connect to another uncensored network.
+
+Jean spent half an hour trying to figure out which cheap VPN was best.
+
+He chose one and for a moment it seemed to work, but after five minutes the connection went offline and the VPN would no longer connect.
+
+Jean kept reading to find other options and learned about Tor Browser and how it can circumvent censorship.
+
+He found an official website mirror to download the program.
+
+When he opened **Tor Browser**, he followed the prompts for censored users and connected to a bridge which allowed him to access the internet again.
+
+With Tor Browser, Jean can browse freely and privately and contact his family.
+
+### Censored users all over the world rely on Tor Browser for a free, stable, and uncensored way to access the internet.
+
+---
+
+# 5. Shared Sections
+
+## What is Tor?
+
+Tor is free software and an open network that helps protect you from tracking, surveillance, and censorship online.
+Tor is created for free by a 501(c)3 U.S.-based nonprofit called the Tor Project.
+
+The easiest way to use Tor is Tor Browser.
+When you use Tor Browser, no one can see what websites you visit or where in the world you’re coming from.
+
+Other applications, like SecureDrop and OnionShare, use Tor to protect their users against surveillance and censorship.
+
+
+## 6. How does Tor work?
+
+Amal wants to visit Bekele’s website privately, so she opens Tor Browser.
+
+Tor Browser selects a random circuit of three relays, which are computers all over the world configured to route traffic over the Tor network.
+
+Tor Browser then encrypts her website request three times and sends it to the first Tor relay in her circuit.
+
+The first relay removes the first encryption layer but doesn't learn that the destination is Bekele’s website.
+
+The first relay learns only the next location in the circuit, which is the second relay.
+
+The second relay removes another encryption layer and forwards the web page request to the third relay.
+
+The third relay removes the last encryption layer and forwards the web page request to its destination, Bekele’s website, but it doesn't know the request comes from Amal.
+
+Bekele doesn't know that the website request came from Amal unless she tells him so.
+
+## 7. Who uses Tor?
+
+People all over the world use Tor to protect their privacy and access the web freely.
+
+Tor helps protect journalists, human rights defenders, domestic violence victims, academic researchers, and anyone experiencing tracking, censorship, or surveillance.
+
+## 6. Why trust Tor?
+
+Tor is designed for privacy. We don’t know who our users are, and we don't keep logs of user activity.
+
+Tor relay operators cannot reveal the true identity of Tor users.
+
+Continual peer review of Tor's source code by academic and open source communities ensures that there are no backdoors in Tor, and our social contract promises that we will never backdoor Tor.
+
+## 7. Join the Tor community
+
+Tor is made possible by a diverse set of users, developers, relay operators, and advocates from around the world.
+
+We need your help to make Tor more usable and secure for people everywhere.
+
+You can volunteer with Tor by writing code, running a relay, creating documentation, offering user support, or telling people in your community about Tor.
+
+The Tor community is governed by a code of conduct, and we outline our set of promises to the community in our social contract.
+
+Learn more about Tor by visiting our website, our wiki, finding us on IRC, joining one of our mailing lists, or signing up for Tor News at newsletter.torproject.org.
+
+
+## 8. Download Tor
+
+Tor for Desktop
+torproject.org/download
+
+TOR ON MOBILE
+### Android
+Tor Browser for Android is available from GooglePlay.
+
+### iOS
+Onion Browser, developed by M. Tigas, is the only browser we recommend for iOS.
+
diff --git a/so.po b/so.po
new file mode 100644
index 000000000..6c8fce0dc
--- /dev/null
+++ b/so.po
@@ -0,0 +1,162 @@
+# Tor Outreach Material 2019-2020
+
+# 1. TOR FOR PRIVACY
+
+### Privacy is a human right
+
+Like many of us, Aleisha spends most of her time online--connecting with friends, posting on social media, and browsing the web.
+
+But lately, she's noticed that advertisements related to her previous searches are following her around online.
+
+This feels so invasive that she does some research on online ads and learns that it's not just advertisers tracking her but also her ISP, analytics companies, social media platforms, and more.
+
+Aleisha decides she wants to find and use software that doesn't collect her data, doesn't track her, and doesn't tell other services anything private about her.
+
+She goes to a privacy training at a local hackerspace and learns about **Tor Browser**, the only web browser that allows her to browse anonymously.
+
+---
+
+# 2.TOR FOR FEMINISTS
+
+### The future is cyberfeminist
+
+Fernanda runs a women's collective focused on reproductive rights in Brazil, where abortion is illegal.
+
+Fernanda and her colleagues built a website with information about abortion access, birth control, and other resources for people seeking reproductive information.
+
+If this website was linked back to them, they could be arrested--or worse.
+
+To protect themselves, Fernanda and her colleagues created the website using Tor **onion services**. Onion services not only protect them from being discovered as the operators of the server but also help protect visitors to their website by requiring they use Tor Browser.
+
+In fact, Fernanda uses **Tor Browser** for all of her web browsing just to be on the safe side.
+
+She also uses a Tor-powered app called **OnionShare** to send files to other activists securely and privately.
+
+### Reproductive rights activists like Fernanda are fighting for fundamental freedoms, and Tor helps power their resistance.
+
+---
+
+# 3. TOR FOR HUMAN RIGHTS
+
+### Water is life
+
+Jelani lives in a small village which a wide river runs through.
+
+This river has provided water to his community since the days of his ancestors.
+
+But today, Jelani’s river is threatened by powerful multinational companies drilling for oil in the region.
+
+Private security firms, paid for by these companies, use powerful surveillance mechanisms to monitor the online activities of Jelani and his neighbors in the village who are organizing to protect their sacred river.
+
+Jelani uses **Tor Browser** to prevent these companies from watching as he visits websites for international human rights protection and legal aid and writes blog posts about the resistance movement in his village.
+
+He also uses **OnionShare** and **SecureDrop** to securely send documents to journalists who are helping expose these human rights violations.
+
+All of this software uses Tor to help protect Jelani’s privacy.
+
+### Human rights activists like Jelani are fighting for justice in their communities, and Tor helps power their resistance.
+
+---
+
+# 4. TOR FOR ANTI-CENSORSHIP
+
+### Build bridges not walls
+
+Jean was traveling for the first time to a country far from his family.
+
+After arriving at a hotel, he opened his laptop.
+
+He was so exhausted that when the message "Connection has timed out" first appeared on his web browser, he thought it was due to his own error.
+
+But after trying again and again, he realized that his email provider, a news website, and many apps were unavailable.
+
+He had heard that this country censors the internet and wondered if that was happening.
+How could he contact his family from behind this impenetrable wall?
+After doing some web searches, he found a forum and read about VPNs, private services that allow you to connect to another uncensored network.
+
+Jean spent half an hour trying to figure out which cheap VPN was best.
+
+He chose one and for a moment it seemed to work, but after five minutes the connection went offline and the VPN would no longer connect.
+
+Jean kept reading to find other options and learned about Tor Browser and how it can circumvent censorship.
+
+He found an official website mirror to download the program.
+
+When he opened **Tor Browser**, he followed the prompts for censored users and connected to a bridge which allowed him to access the internet again.
+
+With Tor Browser, Jean can browse freely and privately and contact his family.
+
+### Censored users all over the world rely on Tor Browser for a free, stable, and uncensored way to access the internet.
+
+---
+
+# 5. Shared Sections
+
+## What is Tor?
+
+Tor is free software and an open network that helps protect you from tracking, surveillance, and censorship online.
+Tor is created for free by a 501(c)3 U.S.-based nonprofit called the Tor Project.
+
+The easiest way to use Tor is Tor Browser.
+When you use Tor Browser, no one can see what websites you visit or where in the world you’re coming from.
+
+Other applications, like SecureDrop and OnionShare, use Tor to protect their users against surveillance and censorship.
+
+
+## 6. How does Tor work?
+
+Amal wants to visit Bekele’s website privately, so she opens Tor Browser.
+
+Tor Browser selects a random circuit of three relays, which are computers all over the world configured to route traffic over the Tor network.
+
+Tor Browser then encrypts her website request three times and sends it to the first Tor relay in her circuit.
+
+The first relay removes the first encryption layer but doesn't learn that the destination is Bekele’s website.
+
+The first relay learns only the next location in the circuit, which is the second relay.
+
+The second relay removes another encryption layer and forwards the web page request to the third relay.
+
+The third relay removes the last encryption layer and forwards the web page request to its destination, Bekele’s website, but it doesn't know the request comes from Amal.
+
+Bekele doesn't know that the website request came from Amal unless she tells him so.
+
+## 7. Who uses Tor?
+
+People all over the world use Tor to protect their privacy and access the web freely.
+
+Tor helps protect journalists, human rights defenders, domestic violence victims, academic researchers, and anyone experiencing tracking, censorship, or surveillance.
+
+## 6. Why trust Tor?
+
+Tor is designed for privacy. We don’t know who our users are, and we don't keep logs of user activity.
+
+Tor relay operators cannot reveal the true identity of Tor users.
+
+Continual peer review of Tor's source code by academic and open source communities ensures that there are no backdoors in Tor, and our social contract promises that we will never backdoor Tor.
+
+## 7. Join the Tor community
+
+Tor is made possible by a diverse set of users, developers, relay operators, and advocates from around the world.
+
+We need your help to make Tor more usable and secure for people everywhere.
+
+You can volunteer with Tor by writing code, running a relay, creating documentation, offering user support, or telling people in your community about Tor.
+
+The Tor community is governed by a code of conduct, and we outline our set of promises to the community in our social contract.
+
+Learn more about Tor by visiting our website, our wiki, finding us on IRC, joining one of our mailing lists, or signing up for Tor News at newsletter.torproject.org.
+
+
+## 8. Download Tor
+
+Tor for Desktop
+torproject.org/download
+
+TOR ON MOBILE
+### Android
+Tor Browser for Android is available from GooglePlay.
+
+### iOS
+Onion Browser, developed by M. Tigas, is the only browser we recommend for iOS.
+
diff --git a/sq.po b/sq.po
new file mode 100644
index 000000000..6c8fce0dc
--- /dev/null
+++ b/sq.po
@@ -0,0 +1,162 @@
+# Tor Outreach Material 2019-2020
+
+# 1. TOR FOR PRIVACY
+
+### Privacy is a human right
+
+Like many of us, Aleisha spends most of her time online--connecting with friends, posting on social media, and browsing the web.
+
+But lately, she's noticed that advertisements related to her previous searches are following her around online.
+
+This feels so invasive that she does some research on online ads and learns that it's not just advertisers tracking her but also her ISP, analytics companies, social media platforms, and more.
+
+Aleisha decides she wants to find and use software that doesn't collect her data, doesn't track her, and doesn't tell other services anything private about her.
+
+She goes to a privacy training at a local hackerspace and learns about **Tor Browser**, the only web browser that allows her to browse anonymously.
+
+---
+
+# 2.TOR FOR FEMINISTS
+
+### The future is cyberfeminist
+
+Fernanda runs a women's collective focused on reproductive rights in Brazil, where abortion is illegal.
+
+Fernanda and her colleagues built a website with information about abortion access, birth control, and other resources for people seeking reproductive information.
+
+If this website was linked back to them, they could be arrested--or worse.
+
+To protect themselves, Fernanda and her colleagues created the website using Tor **onion services**. Onion services not only protect them from being discovered as the operators of the server but also help protect visitors to their website by requiring they use Tor Browser.
+
+In fact, Fernanda uses **Tor Browser** for all of her web browsing just to be on the safe side.
+
+She also uses a Tor-powered app called **OnionShare** to send files to other activists securely and privately.
+
+### Reproductive rights activists like Fernanda are fighting for fundamental freedoms, and Tor helps power their resistance.
+
+---
+
+# 3. TOR FOR HUMAN RIGHTS
+
+### Water is life
+
+Jelani lives in a small village which a wide river runs through.
+
+This river has provided water to his community since the days of his ancestors.
+
+But today, Jelani’s river is threatened by powerful multinational companies drilling for oil in the region.
+
+Private security firms, paid for by these companies, use powerful surveillance mechanisms to monitor the online activities of Jelani and his neighbors in the village who are organizing to protect their sacred river.
+
+Jelani uses **Tor Browser** to prevent these companies from watching as he visits websites for international human rights protection and legal aid and writes blog posts about the resistance movement in his village.
+
+He also uses **OnionShare** and **SecureDrop** to securely send documents to journalists who are helping expose these human rights violations.
+
+All of this software uses Tor to help protect Jelani’s privacy.
+
+### Human rights activists like Jelani are fighting for justice in their communities, and Tor helps power their resistance.
+
+---
+
+# 4. TOR FOR ANTI-CENSORSHIP
+
+### Build bridges not walls
+
+Jean was traveling for the first time to a country far from his family.
+
+After arriving at a hotel, he opened his laptop.
+
+He was so exhausted that when the message "Connection has timed out" first appeared on his web browser, he thought it was due to his own error.
+
+But after trying again and again, he realized that his email provider, a news website, and many apps were unavailable.
+
+He had heard that this country censors the internet and wondered if that was happening.
+How could he contact his family from behind this impenetrable wall?
+After doing some web searches, he found a forum and read about VPNs, private services that allow you to connect to another uncensored network.
+
+Jean spent half an hour trying to figure out which cheap VPN was best.
+
+He chose one and for a moment it seemed to work, but after five minutes the connection went offline and the VPN would no longer connect.
+
+Jean kept reading to find other options and learned about Tor Browser and how it can circumvent censorship.
+
+He found an official website mirror to download the program.
+
+When he opened **Tor Browser**, he followed the prompts for censored users and connected to a bridge which allowed him to access the internet again.
+
+With Tor Browser, Jean can browse freely and privately and contact his family.
+
+### Censored users all over the world rely on Tor Browser for a free, stable, and uncensored way to access the internet.
+
+---
+
+# 5. Shared Sections
+
+## What is Tor?
+
+Tor is free software and an open network that helps protect you from tracking, surveillance, and censorship online.
+Tor is created for free by a 501(c)3 U.S.-based nonprofit called the Tor Project.
+
+The easiest way to use Tor is Tor Browser.
+When you use Tor Browser, no one can see what websites you visit or where in the world you’re coming from.
+
+Other applications, like SecureDrop and OnionShare, use Tor to protect their users against surveillance and censorship.
+
+
+## 6. How does Tor work?
+
+Amal wants to visit Bekele’s website privately, so she opens Tor Browser.
+
+Tor Browser selects a random circuit of three relays, which are computers all over the world configured to route traffic over the Tor network.
+
+Tor Browser then encrypts her website request three times and sends it to the first Tor relay in her circuit.
+
+The first relay removes the first encryption layer but doesn't learn that the destination is Bekele’s website.
+
+The first relay learns only the next location in the circuit, which is the second relay.
+
+The second relay removes another encryption layer and forwards the web page request to the third relay.
+
+The third relay removes the last encryption layer and forwards the web page request to its destination, Bekele’s website, but it doesn't know the request comes from Amal.
+
+Bekele doesn't know that the website request came from Amal unless she tells him so.
+
+## 7. Who uses Tor?
+
+People all over the world use Tor to protect their privacy and access the web freely.
+
+Tor helps protect journalists, human rights defenders, domestic violence victims, academic researchers, and anyone experiencing tracking, censorship, or surveillance.
+
+## 6. Why trust Tor?
+
+Tor is designed for privacy. We don’t know who our users are, and we don't keep logs of user activity.
+
+Tor relay operators cannot reveal the true identity of Tor users.
+
+Continual peer review of Tor's source code by academic and open source communities ensures that there are no backdoors in Tor, and our social contract promises that we will never backdoor Tor.
+
+## 7. Join the Tor community
+
+Tor is made possible by a diverse set of users, developers, relay operators, and advocates from around the world.
+
+We need your help to make Tor more usable and secure for people everywhere.
+
+You can volunteer with Tor by writing code, running a relay, creating documentation, offering user support, or telling people in your community about Tor.
+
+The Tor community is governed by a code of conduct, and we outline our set of promises to the community in our social contract.
+
+Learn more about Tor by visiting our website, our wiki, finding us on IRC, joining one of our mailing lists, or signing up for Tor News at newsletter.torproject.org.
+
+
+## 8. Download Tor
+
+Tor for Desktop
+torproject.org/download
+
+TOR ON MOBILE
+### Android
+Tor Browser for Android is available from GooglePlay.
+
+### iOS
+Onion Browser, developed by M. Tigas, is the only browser we recommend for iOS.
+
diff --git a/sr.po b/sr.po
new file mode 100644
index 000000000..9d39f37d2
--- /dev/null
+++ b/sr.po
@@ -0,0 +1,162 @@
+# Tor Outreach Material 2019-2020
+
+# 1. TOR FOR PRIVACY
+
+### Privacy is a human right
+
+Like many of us, Aleisha spends most of her time online--connecting with friends, posting on social media, and browsing the web.
+
+But lately, she's noticed that advertisements related to her previous searches are following her around online.
+
+This feels so invasive that she does some research on online ads and learns that it's not just advertisers tracking her but also her ISP, analytics companies, social media platforms, and more.
+
+Aleisha decides she wants to find and use software that doesn't collect her data, doesn't track her, and doesn't tell other services anything private about her.
+
+She goes to a privacy training at a local hackerspace and learns about **Tor Browser**, the only web browser that allows her to browse anonymously.
+
+---
+
+# 2.TOR FOR FEMINISTS
+
+### The future is cyberfeminist
+
+Fernanda runs a women's collective focused on reproductive rights in Brazil, where abortion is illegal.
+
+Fernanda and her colleagues built a website with information about abortion access, birth control, and other resources for people seeking reproductive information.
+
+If this website was linked back to them, they could be arrested--or worse.
+
+To protect themselves, Fernanda and her colleagues created the website using Tor **onion services**. Onion services not only protect them from being discovered as the operators of the server but also help protect visitors to their website by requiring they use Tor Browser.
+
+In fact, Fernanda uses **Tor Browser** for all of her web browsing just to be on the safe side.
+
+She also uses a Tor-powered app called **OnionShare** to send files to other activists securely and privately.
+
+### Reproductive rights activists like Fernanda are fighting for fundamental freedoms, and Tor helps power their resistance.
+
+---
+
+# 3. TOR FOR HUMAN RIGHTS
+
+### Water is life
+
+Jelani lives in a small village which a wide river runs through.
+
+This river has provided water to his community since the days of his ancestors.
+
+But today, Jelani’s river is threatened by powerful multinational companies drilling for oil in the region.
+
+Private security firms, paid for by these companies, use powerful surveillance mechanisms to monitor the online activities of Jelani and his neighbors in the village who are organizing to protect their sacred river.
+
+Jelani uses **Tor Browser** to prevent these companies from watching as he visits websites for international human rights protection and legal aid and writes blog posts about the resistance movement in his village.
+
+He also uses **OnionShare** and **SecureDrop** to securely send documents to journalists who are helping expose these human rights violations.
+
+All of this software uses Tor to help protect Jelani’s privacy.
+
+### Human rights activists like Jelani are fighting for justice in their communities, and Tor helps power their resistance.
+
+---
+
+# 4. TOR FOR ANTI-CENSORSHIP
+
+### Build bridges not walls
+
+Jean was traveling for the first time to a country far from his family.
+
+After arriving at a hotel, he opened his laptop.
+
+He was so exhausted that when the message "Connection has timed out" first appeared on his web browser, he thought it was due to his own error.
+
+But after trying again and again, he realized that his email provider, a news website, and many apps were unavailable.
+
+He had heard that this country censors the internet and wondered if that was happening.
+How could he contact his family from behind this impenetrable wall?
+After doing some web searches, he found a forum and read about VPNs, private services that allow you to connect to another uncensored network.
+
+Jean spent half an hour trying to figure out which cheap VPN was best.
+
+He chose one and for a moment it seemed to work, but after five minutes the connection went offline and the VPN would no longer connect.
+
+Jean kept reading to find other options and learned about Tor Browser and how it can circumvent censorship.
+
+He found an official website mirror to download the program.
+
+When he opened **Tor Browser**, he followed the prompts for censored users and connected to a bridge which allowed him to access the internet again.
+
+With Tor Browser, Jean can browse freely and privately and contact his family.
+
+### Censored users all over the world rely on Tor Browser for a free, stable, and uncensored way to access the internet.
+
+---
+
+# 5. Shared Sections
+
+## Šta je TOR?
+
+Tor is free software and an open network that helps protect you from tracking, surveillance, and censorship online.
+Tor is created for free by a 501(c)3 U.S.-based nonprofit called the Tor Project.
+
+The easiest way to use Tor is Tor Browser.
+When you use Tor Browser, no one can see what websites you visit or where in the world you’re coming from.
+
+Other applications, like SecureDrop and OnionShare, use Tor to protect their users against surveillance and censorship.
+
+
+## 6. How does Tor work?
+
+Amal wants to visit Bekele’s website privately, so she opens Tor Browser.
+
+Tor Browser selects a random circuit of three relays, which are computers all over the world configured to route traffic over the Tor network.
+
+Tor Browser then encrypts her website request three times and sends it to the first Tor relay in her circuit.
+
+The first relay removes the first encryption layer but doesn't learn that the destination is Bekele’s website.
+
+The first relay learns only the next location in the circuit, which is the second relay.
+
+The second relay removes another encryption layer and forwards the web page request to the third relay.
+
+The third relay removes the last encryption layer and forwards the web page request to its destination, Bekele’s website, but it doesn't know the request comes from Amal.
+
+Bekele doesn't know that the website request came from Amal unless she tells him so.
+
+## 7. Who uses Tor?
+
+People all over the world use Tor to protect their privacy and access the web freely.
+
+Tor helps protect journalists, human rights defenders, domestic violence victims, academic researchers, and anyone experiencing tracking, censorship, or surveillance.
+
+## 6. Why trust Tor?
+
+Tor is designed for privacy. We don’t know who our users are, and we don't keep logs of user activity.
+
+Tor relay operators cannot reveal the true identity of Tor users.
+
+Continual peer review of Tor's source code by academic and open source communities ensures that there are no backdoors in Tor, and our social contract promises that we will never backdoor Tor.
+
+## 7. Join the Tor community
+
+Tor is made possible by a diverse set of users, developers, relay operators, and advocates from around the world.
+
+We need your help to make Tor more usable and secure for people everywhere.
+
+You can volunteer with Tor by writing code, running a relay, creating documentation, offering user support, or telling people in your community about Tor.
+
+The Tor community is governed by a code of conduct, and we outline our set of promises to the community in our social contract.
+
+Learn more about Tor by visiting our website, our wiki, finding us on IRC, joining one of our mailing lists, or signing up for Tor News at newsletter.torproject.org.
+
+
+## 8. Download Tor
+
+Tor for Desktop
+torproject.org/download
+
+TOR ON MOBILE
+### Android
+Tor Browser for Android is available from GooglePlay.
+
+### iOS
+Onion Browser, developed by M. Tigas, is the only browser we recommend for iOS.
+
diff --git a/sv.po b/sv.po
new file mode 100644
index 000000000..244c5ad66
--- /dev/null
+++ b/sv.po
@@ -0,0 +1,162 @@
+# Tor Outreach Material 2019-2020
+
+# 1. TOR FOR PRIVACY
+
+### Privacy is a human right
+
+Like many of us, Aleisha spends most of her time online--connecting with friends, posting on social media, and browsing the web.
+
+But lately, she's noticed that advertisements related to her previous searches are following her around online.
+
+This feels so invasive that she does some research on online ads and learns that it's not just advertisers tracking her but also her ISP, analytics companies, social media platforms, and more.
+
+Aleisha decides she wants to find and use software that doesn't collect her data, doesn't track her, and doesn't tell other services anything private about her.
+
+She goes to a privacy training at a local hackerspace and learns about **Tor Browser**, the only web browser that allows her to browse anonymously.
+
+---
+
+# 2.TOR FOR FEMINISTS
+
+### The future is cyberfeminist
+
+Fernanda runs a women's collective focused on reproductive rights in Brazil, where abortion is illegal.
+
+Fernanda and her colleagues built a website with information about abortion access, birth control, and other resources for people seeking reproductive information.
+
+If this website was linked back to them, they could be arrested--or worse.
+
+To protect themselves, Fernanda and her colleagues created the website using Tor **onion services**. Onion services not only protect them from being discovered as the operators of the server but also help protect visitors to their website by requiring they use Tor Browser.
+
+In fact, Fernanda uses **Tor Browser** for all of her web browsing just to be on the safe side.
+
+She also uses a Tor-powered app called **OnionShare** to send files to other activists securely and privately.
+
+### Reproductive rights activists like Fernanda are fighting for fundamental freedoms, and Tor helps power their resistance.
+
+---
+
+# 3. TOR FOR HUMAN RIGHTS
+
+### Water is life
+
+Jelani lives in a small village which a wide river runs through.
+
+This river has provided water to his community since the days of his ancestors.
+
+But today, Jelani’s river is threatened by powerful multinational companies drilling for oil in the region.
+
+Private security firms, paid for by these companies, use powerful surveillance mechanisms to monitor the online activities of Jelani and his neighbors in the village who are organizing to protect their sacred river.
+
+Jelani uses **Tor Browser** to prevent these companies from watching as he visits websites for international human rights protection and legal aid and writes blog posts about the resistance movement in his village.
+
+He also uses **OnionShare** and **SecureDrop** to securely send documents to journalists who are helping expose these human rights violations.
+
+All of this software uses Tor to help protect Jelani’s privacy.
+
+### Human rights activists like Jelani are fighting for justice in their communities, and Tor helps power their resistance.
+
+---
+
+# 4. TOR FOR ANTI-CENSORSHIP
+
+### Build bridges not walls
+
+Jean was traveling for the first time to a country far from his family.
+
+After arriving at a hotel, he opened his laptop.
+
+He was so exhausted that when the message "Connection has timed out" first appeared on his web browser, he thought it was due to his own error.
+
+But after trying again and again, he realized that his email provider, a news website, and many apps were unavailable.
+
+He had heard that this country censors the internet and wondered if that was happening.
+How could he contact his family from behind this impenetrable wall?
+After doing some web searches, he found a forum and read about VPNs, private services that allow you to connect to another uncensored network.
+
+Jean spent half an hour trying to figure out which cheap VPN was best.
+
+He chose one and for a moment it seemed to work, but after five minutes the connection went offline and the VPN would no longer connect.
+
+Jean kept reading to find other options and learned about Tor Browser and how it can circumvent censorship.
+
+He found an official website mirror to download the program.
+
+When he opened **Tor Browser**, he followed the prompts for censored users and connected to a bridge which allowed him to access the internet again.
+
+With Tor Browser, Jean can browse freely and privately and contact his family.
+
+### Censored users all over the world rely on Tor Browser for a free, stable, and uncensored way to access the internet.
+
+---
+
+# 5. Shared Sections
+
+## Vad är Tor?
+
+Tor is free software and an open network that helps protect you from tracking, surveillance, and censorship online.
+Tor is created for free by a 501(c)3 U.S.-based nonprofit called the Tor Project.
+
+The easiest way to use Tor is Tor Browser.
+When you use Tor Browser, no one can see what websites you visit or where in the world you’re coming from.
+
+Other applications, like SecureDrop and OnionShare, use Tor to protect their users against surveillance and censorship.
+
+
+## 6. How does Tor work?
+
+Amal wants to visit Bekele’s website privately, so she opens Tor Browser.
+
+Tor Browser selects a random circuit of three relays, which are computers all over the world configured to route traffic over the Tor network.
+
+Tor Browser then encrypts her website request three times and sends it to the first Tor relay in her circuit.
+
+The first relay removes the first encryption layer but doesn't learn that the destination is Bekele’s website.
+
+The first relay learns only the next location in the circuit, which is the second relay.
+
+The second relay removes another encryption layer and forwards the web page request to the third relay.
+
+The third relay removes the last encryption layer and forwards the web page request to its destination, Bekele’s website, but it doesn't know the request comes from Amal.
+
+Bekele doesn't know that the website request came from Amal unless she tells him so.
+
+## 7. Who uses Tor?
+
+People all over the world use Tor to protect their privacy and access the web freely.
+
+Tor helps protect journalists, human rights defenders, domestic violence victims, academic researchers, and anyone experiencing tracking, censorship, or surveillance.
+
+## 6. Why trust Tor?
+
+Tor is designed for privacy. We don’t know who our users are, and we don't keep logs of user activity.
+
+Tor relay operators cannot reveal the true identity of Tor users.
+
+Continual peer review of Tor's source code by academic and open source communities ensures that there are no backdoors in Tor, and our social contract promises that we will never backdoor Tor.
+
+## 7. Join the Tor community
+
+Tor is made possible by a diverse set of users, developers, relay operators, and advocates from around the world.
+
+We need your help to make Tor more usable and secure for people everywhere.
+
+You can volunteer with Tor by writing code, running a relay, creating documentation, offering user support, or telling people in your community about Tor.
+
+The Tor community is governed by a code of conduct, and we outline our set of promises to the community in our social contract.
+
+Learn more about Tor by visiting our website, our wiki, finding us on IRC, joining one of our mailing lists, or signing up for Tor News at newsletter.torproject.org.
+
+
+## 8. Download Tor
+
+Tor for Desktop
+torproject.org/download
+
+TOR ON MOBILE
+### Android
+Tor Browser for Android is available from GooglePlay.
+
+### iOS
+Onion Browser, developed by M. Tigas, is the only browser we recommend for iOS.
+
diff --git a/sw.po b/sw.po
new file mode 100644
index 000000000..6c8fce0dc
--- /dev/null
+++ b/sw.po
@@ -0,0 +1,162 @@
+# Tor Outreach Material 2019-2020
+
+# 1. TOR FOR PRIVACY
+
+### Privacy is a human right
+
+Like many of us, Aleisha spends most of her time online--connecting with friends, posting on social media, and browsing the web.
+
+But lately, she's noticed that advertisements related to her previous searches are following her around online.
+
+This feels so invasive that she does some research on online ads and learns that it's not just advertisers tracking her but also her ISP, analytics companies, social media platforms, and more.
+
+Aleisha decides she wants to find and use software that doesn't collect her data, doesn't track her, and doesn't tell other services anything private about her.
+
+She goes to a privacy training at a local hackerspace and learns about **Tor Browser**, the only web browser that allows her to browse anonymously.
+
+---
+
+# 2.TOR FOR FEMINISTS
+
+### The future is cyberfeminist
+
+Fernanda runs a women's collective focused on reproductive rights in Brazil, where abortion is illegal.
+
+Fernanda and her colleagues built a website with information about abortion access, birth control, and other resources for people seeking reproductive information.
+
+If this website was linked back to them, they could be arrested--or worse.
+
+To protect themselves, Fernanda and her colleagues created the website using Tor **onion services**. Onion services not only protect them from being discovered as the operators of the server but also help protect visitors to their website by requiring they use Tor Browser.
+
+In fact, Fernanda uses **Tor Browser** for all of her web browsing just to be on the safe side.
+
+She also uses a Tor-powered app called **OnionShare** to send files to other activists securely and privately.
+
+### Reproductive rights activists like Fernanda are fighting for fundamental freedoms, and Tor helps power their resistance.
+
+---
+
+# 3. TOR FOR HUMAN RIGHTS
+
+### Water is life
+
+Jelani lives in a small village which a wide river runs through.
+
+This river has provided water to his community since the days of his ancestors.
+
+But today, Jelani’s river is threatened by powerful multinational companies drilling for oil in the region.
+
+Private security firms, paid for by these companies, use powerful surveillance mechanisms to monitor the online activities of Jelani and his neighbors in the village who are organizing to protect their sacred river.
+
+Jelani uses **Tor Browser** to prevent these companies from watching as he visits websites for international human rights protection and legal aid and writes blog posts about the resistance movement in his village.
+
+He also uses **OnionShare** and **SecureDrop** to securely send documents to journalists who are helping expose these human rights violations.
+
+All of this software uses Tor to help protect Jelani’s privacy.
+
+### Human rights activists like Jelani are fighting for justice in their communities, and Tor helps power their resistance.
+
+---
+
+# 4. TOR FOR ANTI-CENSORSHIP
+
+### Build bridges not walls
+
+Jean was traveling for the first time to a country far from his family.
+
+After arriving at a hotel, he opened his laptop.
+
+He was so exhausted that when the message "Connection has timed out" first appeared on his web browser, he thought it was due to his own error.
+
+But after trying again and again, he realized that his email provider, a news website, and many apps were unavailable.
+
+He had heard that this country censors the internet and wondered if that was happening.
+How could he contact his family from behind this impenetrable wall?
+After doing some web searches, he found a forum and read about VPNs, private services that allow you to connect to another uncensored network.
+
+Jean spent half an hour trying to figure out which cheap VPN was best.
+
+He chose one and for a moment it seemed to work, but after five minutes the connection went offline and the VPN would no longer connect.
+
+Jean kept reading to find other options and learned about Tor Browser and how it can circumvent censorship.
+
+He found an official website mirror to download the program.
+
+When he opened **Tor Browser**, he followed the prompts for censored users and connected to a bridge which allowed him to access the internet again.
+
+With Tor Browser, Jean can browse freely and privately and contact his family.
+
+### Censored users all over the world rely on Tor Browser for a free, stable, and uncensored way to access the internet.
+
+---
+
+# 5. Shared Sections
+
+## What is Tor?
+
+Tor is free software and an open network that helps protect you from tracking, surveillance, and censorship online.
+Tor is created for free by a 501(c)3 U.S.-based nonprofit called the Tor Project.
+
+The easiest way to use Tor is Tor Browser.
+When you use Tor Browser, no one can see what websites you visit or where in the world you’re coming from.
+
+Other applications, like SecureDrop and OnionShare, use Tor to protect their users against surveillance and censorship.
+
+
+## 6. How does Tor work?
+
+Amal wants to visit Bekele’s website privately, so she opens Tor Browser.
+
+Tor Browser selects a random circuit of three relays, which are computers all over the world configured to route traffic over the Tor network.
+
+Tor Browser then encrypts her website request three times and sends it to the first Tor relay in her circuit.
+
+The first relay removes the first encryption layer but doesn't learn that the destination is Bekele’s website.
+
+The first relay learns only the next location in the circuit, which is the second relay.
+
+The second relay removes another encryption layer and forwards the web page request to the third relay.
+
+The third relay removes the last encryption layer and forwards the web page request to its destination, Bekele’s website, but it doesn't know the request comes from Amal.
+
+Bekele doesn't know that the website request came from Amal unless she tells him so.
+
+## 7. Who uses Tor?
+
+People all over the world use Tor to protect their privacy and access the web freely.
+
+Tor helps protect journalists, human rights defenders, domestic violence victims, academic researchers, and anyone experiencing tracking, censorship, or surveillance.
+
+## 6. Why trust Tor?
+
+Tor is designed for privacy. We don’t know who our users are, and we don't keep logs of user activity.
+
+Tor relay operators cannot reveal the true identity of Tor users.
+
+Continual peer review of Tor's source code by academic and open source communities ensures that there are no backdoors in Tor, and our social contract promises that we will never backdoor Tor.
+
+## 7. Join the Tor community
+
+Tor is made possible by a diverse set of users, developers, relay operators, and advocates from around the world.
+
+We need your help to make Tor more usable and secure for people everywhere.
+
+You can volunteer with Tor by writing code, running a relay, creating documentation, offering user support, or telling people in your community about Tor.
+
+The Tor community is governed by a code of conduct, and we outline our set of promises to the community in our social contract.
+
+Learn more about Tor by visiting our website, our wiki, finding us on IRC, joining one of our mailing lists, or signing up for Tor News at newsletter.torproject.org.
+
+
+## 8. Download Tor
+
+Tor for Desktop
+torproject.org/download
+
+TOR ON MOBILE
+### Android
+Tor Browser for Android is available from GooglePlay.
+
+### iOS
+Onion Browser, developed by M. Tigas, is the only browser we recommend for iOS.
+
diff --git a/szl.po b/szl.po
new file mode 100644
index 000000000..6c8fce0dc
--- /dev/null
+++ b/szl.po
@@ -0,0 +1,162 @@
+# Tor Outreach Material 2019-2020
+
+# 1. TOR FOR PRIVACY
+
+### Privacy is a human right
+
+Like many of us, Aleisha spends most of her time online--connecting with friends, posting on social media, and browsing the web.
+
+But lately, she's noticed that advertisements related to her previous searches are following her around online.
+
+This feels so invasive that she does some research on online ads and learns that it's not just advertisers tracking her but also her ISP, analytics companies, social media platforms, and more.
+
+Aleisha decides she wants to find and use software that doesn't collect her data, doesn't track her, and doesn't tell other services anything private about her.
+
+She goes to a privacy training at a local hackerspace and learns about **Tor Browser**, the only web browser that allows her to browse anonymously.
+
+---
+
+# 2.TOR FOR FEMINISTS
+
+### The future is cyberfeminist
+
+Fernanda runs a women's collective focused on reproductive rights in Brazil, where abortion is illegal.
+
+Fernanda and her colleagues built a website with information about abortion access, birth control, and other resources for people seeking reproductive information.
+
+If this website was linked back to them, they could be arrested--or worse.
+
+To protect themselves, Fernanda and her colleagues created the website using Tor **onion services**. Onion services not only protect them from being discovered as the operators of the server but also help protect visitors to their website by requiring they use Tor Browser.
+
+In fact, Fernanda uses **Tor Browser** for all of her web browsing just to be on the safe side.
+
+She also uses a Tor-powered app called **OnionShare** to send files to other activists securely and privately.
+
+### Reproductive rights activists like Fernanda are fighting for fundamental freedoms, and Tor helps power their resistance.
+
+---
+
+# 3. TOR FOR HUMAN RIGHTS
+
+### Water is life
+
+Jelani lives in a small village which a wide river runs through.
+
+This river has provided water to his community since the days of his ancestors.
+
+But today, Jelani’s river is threatened by powerful multinational companies drilling for oil in the region.
+
+Private security firms, paid for by these companies, use powerful surveillance mechanisms to monitor the online activities of Jelani and his neighbors in the village who are organizing to protect their sacred river.
+
+Jelani uses **Tor Browser** to prevent these companies from watching as he visits websites for international human rights protection and legal aid and writes blog posts about the resistance movement in his village.
+
+He also uses **OnionShare** and **SecureDrop** to securely send documents to journalists who are helping expose these human rights violations.
+
+All of this software uses Tor to help protect Jelani’s privacy.
+
+### Human rights activists like Jelani are fighting for justice in their communities, and Tor helps power their resistance.
+
+---
+
+# 4. TOR FOR ANTI-CENSORSHIP
+
+### Build bridges not walls
+
+Jean was traveling for the first time to a country far from his family.
+
+After arriving at a hotel, he opened his laptop.
+
+He was so exhausted that when the message "Connection has timed out" first appeared on his web browser, he thought it was due to his own error.
+
+But after trying again and again, he realized that his email provider, a news website, and many apps were unavailable.
+
+He had heard that this country censors the internet and wondered if that was happening.
+How could he contact his family from behind this impenetrable wall?
+After doing some web searches, he found a forum and read about VPNs, private services that allow you to connect to another uncensored network.
+
+Jean spent half an hour trying to figure out which cheap VPN was best.
+
+He chose one and for a moment it seemed to work, but after five minutes the connection went offline and the VPN would no longer connect.
+
+Jean kept reading to find other options and learned about Tor Browser and how it can circumvent censorship.
+
+He found an official website mirror to download the program.
+
+When he opened **Tor Browser**, he followed the prompts for censored users and connected to a bridge which allowed him to access the internet again.
+
+With Tor Browser, Jean can browse freely and privately and contact his family.
+
+### Censored users all over the world rely on Tor Browser for a free, stable, and uncensored way to access the internet.
+
+---
+
+# 5. Shared Sections
+
+## What is Tor?
+
+Tor is free software and an open network that helps protect you from tracking, surveillance, and censorship online.
+Tor is created for free by a 501(c)3 U.S.-based nonprofit called the Tor Project.
+
+The easiest way to use Tor is Tor Browser.
+When you use Tor Browser, no one can see what websites you visit or where in the world you’re coming from.
+
+Other applications, like SecureDrop and OnionShare, use Tor to protect their users against surveillance and censorship.
+
+
+## 6. How does Tor work?
+
+Amal wants to visit Bekele’s website privately, so she opens Tor Browser.
+
+Tor Browser selects a random circuit of three relays, which are computers all over the world configured to route traffic over the Tor network.
+
+Tor Browser then encrypts her website request three times and sends it to the first Tor relay in her circuit.
+
+The first relay removes the first encryption layer but doesn't learn that the destination is Bekele’s website.
+
+The first relay learns only the next location in the circuit, which is the second relay.
+
+The second relay removes another encryption layer and forwards the web page request to the third relay.
+
+The third relay removes the last encryption layer and forwards the web page request to its destination, Bekele’s website, but it doesn't know the request comes from Amal.
+
+Bekele doesn't know that the website request came from Amal unless she tells him so.
+
+## 7. Who uses Tor?
+
+People all over the world use Tor to protect their privacy and access the web freely.
+
+Tor helps protect journalists, human rights defenders, domestic violence victims, academic researchers, and anyone experiencing tracking, censorship, or surveillance.
+
+## 6. Why trust Tor?
+
+Tor is designed for privacy. We don’t know who our users are, and we don't keep logs of user activity.
+
+Tor relay operators cannot reveal the true identity of Tor users.
+
+Continual peer review of Tor's source code by academic and open source communities ensures that there are no backdoors in Tor, and our social contract promises that we will never backdoor Tor.
+
+## 7. Join the Tor community
+
+Tor is made possible by a diverse set of users, developers, relay operators, and advocates from around the world.
+
+We need your help to make Tor more usable and secure for people everywhere.
+
+You can volunteer with Tor by writing code, running a relay, creating documentation, offering user support, or telling people in your community about Tor.
+
+The Tor community is governed by a code of conduct, and we outline our set of promises to the community in our social contract.
+
+Learn more about Tor by visiting our website, our wiki, finding us on IRC, joining one of our mailing lists, or signing up for Tor News at newsletter.torproject.org.
+
+
+## 8. Download Tor
+
+Tor for Desktop
+torproject.org/download
+
+TOR ON MOBILE
+### Android
+Tor Browser for Android is available from GooglePlay.
+
+### iOS
+Onion Browser, developed by M. Tigas, is the only browser we recommend for iOS.
+
diff --git a/ta.po b/ta.po
new file mode 100644
index 000000000..b4dd074a7
--- /dev/null
+++ b/ta.po
@@ -0,0 +1,162 @@
+# Tor Outreach Material 2019-2020
+
+# 1. TOR FOR PRIVACY
+
+### Privacy is a human right
+
+Like many of us, Aleisha spends most of her time online--connecting with friends, posting on social media, and browsing the web.
+
+But lately, she's noticed that advertisements related to her previous searches are following her around online.
+
+This feels so invasive that she does some research on online ads and learns that it's not just advertisers tracking her but also her ISP, analytics companies, social media platforms, and more.
+
+Aleisha decides she wants to find and use software that doesn't collect her data, doesn't track her, and doesn't tell other services anything private about her.
+
+She goes to a privacy training at a local hackerspace and learns about **Tor Browser**, the only web browser that allows her to browse anonymously.
+
+---
+
+# 2.TOR FOR FEMINISTS
+
+### The future is cyberfeminist
+
+Fernanda runs a women's collective focused on reproductive rights in Brazil, where abortion is illegal.
+
+Fernanda and her colleagues built a website with information about abortion access, birth control, and other resources for people seeking reproductive information.
+
+If this website was linked back to them, they could be arrested--or worse.
+
+To protect themselves, Fernanda and her colleagues created the website using Tor **onion services**. Onion services not only protect them from being discovered as the operators of the server but also help protect visitors to their website by requiring they use Tor Browser.
+
+In fact, Fernanda uses **Tor Browser** for all of her web browsing just to be on the safe side.
+
+She also uses a Tor-powered app called **OnionShare** to send files to other activists securely and privately.
+
+### Reproductive rights activists like Fernanda are fighting for fundamental freedoms, and Tor helps power their resistance.
+
+---
+
+# 3. TOR FOR HUMAN RIGHTS
+
+### Water is life
+
+Jelani lives in a small village which a wide river runs through.
+
+This river has provided water to his community since the days of his ancestors.
+
+But today, Jelani’s river is threatened by powerful multinational companies drilling for oil in the region.
+
+Private security firms, paid for by these companies, use powerful surveillance mechanisms to monitor the online activities of Jelani and his neighbors in the village who are organizing to protect their sacred river.
+
+Jelani uses **Tor Browser** to prevent these companies from watching as he visits websites for international human rights protection and legal aid and writes blog posts about the resistance movement in his village.
+
+He also uses **OnionShare** and **SecureDrop** to securely send documents to journalists who are helping expose these human rights violations.
+
+All of this software uses Tor to help protect Jelani’s privacy.
+
+### Human rights activists like Jelani are fighting for justice in their communities, and Tor helps power their resistance.
+
+---
+
+# 4. TOR FOR ANTI-CENSORSHIP
+
+### Build bridges not walls
+
+Jean was traveling for the first time to a country far from his family.
+
+After arriving at a hotel, he opened his laptop.
+
+He was so exhausted that when the message "Connection has timed out" first appeared on his web browser, he thought it was due to his own error.
+
+But after trying again and again, he realized that his email provider, a news website, and many apps were unavailable.
+
+He had heard that this country censors the internet and wondered if that was happening.
+How could he contact his family from behind this impenetrable wall?
+After doing some web searches, he found a forum and read about VPNs, private services that allow you to connect to another uncensored network.
+
+Jean spent half an hour trying to figure out which cheap VPN was best.
+
+He chose one and for a moment it seemed to work, but after five minutes the connection went offline and the VPN would no longer connect.
+
+Jean kept reading to find other options and learned about Tor Browser and how it can circumvent censorship.
+
+He found an official website mirror to download the program.
+
+When he opened **Tor Browser**, he followed the prompts for censored users and connected to a bridge which allowed him to access the internet again.
+
+With Tor Browser, Jean can browse freely and privately and contact his family.
+
+### Censored users all over the world rely on Tor Browser for a free, stable, and uncensored way to access the internet.
+
+---
+
+# 5. Shared Sections
+
+## Tor என்றால் என்ன?
+
+Tor is free software and an open network that helps protect you from tracking, surveillance, and censorship online.
+Tor is created for free by a 501(c)3 U.S.-based nonprofit called the Tor Project.
+
+The easiest way to use Tor is Tor Browser.
+When you use Tor Browser, no one can see what websites you visit or where in the world you’re coming from.
+
+Other applications, like SecureDrop and OnionShare, use Tor to protect their users against surveillance and censorship.
+
+
+## 6. How does Tor work?
+
+Amal wants to visit Bekele’s website privately, so she opens Tor Browser.
+
+Tor Browser selects a random circuit of three relays, which are computers all over the world configured to route traffic over the Tor network.
+
+Tor Browser then encrypts her website request three times and sends it to the first Tor relay in her circuit.
+
+The first relay removes the first encryption layer but doesn't learn that the destination is Bekele’s website.
+
+The first relay learns only the next location in the circuit, which is the second relay.
+
+The second relay removes another encryption layer and forwards the web page request to the third relay.
+
+The third relay removes the last encryption layer and forwards the web page request to its destination, Bekele’s website, but it doesn't know the request comes from Amal.
+
+Bekele doesn't know that the website request came from Amal unless she tells him so.
+
+## 7. Who uses Tor?
+
+People all over the world use Tor to protect their privacy and access the web freely.
+
+Tor helps protect journalists, human rights defenders, domestic violence victims, academic researchers, and anyone experiencing tracking, censorship, or surveillance.
+
+## 6. Why trust Tor?
+
+Tor is designed for privacy. We don’t know who our users are, and we don't keep logs of user activity.
+
+Tor relay operators cannot reveal the true identity of Tor users.
+
+Continual peer review of Tor's source code by academic and open source communities ensures that there are no backdoors in Tor, and our social contract promises that we will never backdoor Tor.
+
+## 7. Join the Tor community
+
+Tor is made possible by a diverse set of users, developers, relay operators, and advocates from around the world.
+
+We need your help to make Tor more usable and secure for people everywhere.
+
+You can volunteer with Tor by writing code, running a relay, creating documentation, offering user support, or telling people in your community about Tor.
+
+The Tor community is governed by a code of conduct, and we outline our set of promises to the community in our social contract.
+
+Learn more about Tor by visiting our website, our wiki, finding us on IRC, joining one of our mailing lists, or signing up for Tor News at newsletter.torproject.org.
+
+
+## 8. Download Tor
+
+Tor for Desktop
+torproject.org/download
+
+TOR ON MOBILE
+### Android
+Tor Browser for Android is available from GooglePlay.
+
+### iOS
+Onion Browser, developed by M. Tigas, is the only browser we recommend for iOS.
+
diff --git a/te.po b/te.po
new file mode 100644
index 000000000..ef59c80b9
--- /dev/null
+++ b/te.po
@@ -0,0 +1,162 @@
+# Tor Outreach Material 2019-2020
+
+# 1. TOR FOR PRIVACY
+
+### Privacy is a human right
+
+Like many of us, Aleisha spends most of her time online--connecting with friends, posting on social media, and browsing the web.
+
+But lately, she's noticed that advertisements related to her previous searches are following her around online.
+
+This feels so invasive that she does some research on online ads and learns that it's not just advertisers tracking her but also her ISP, analytics companies, social media platforms, and more.
+
+Aleisha decides she wants to find and use software that doesn't collect her data, doesn't track her, and doesn't tell other services anything private about her.
+
+She goes to a privacy training at a local hackerspace and learns about **Tor Browser**, the only web browser that allows her to browse anonymously.
+
+---
+
+# 2.TOR FOR FEMINISTS
+
+### The future is cyberfeminist
+
+Fernanda runs a women's collective focused on reproductive rights in Brazil, where abortion is illegal.
+
+Fernanda and her colleagues built a website with information about abortion access, birth control, and other resources for people seeking reproductive information.
+
+If this website was linked back to them, they could be arrested--or worse.
+
+To protect themselves, Fernanda and her colleagues created the website using Tor **onion services**. Onion services not only protect them from being discovered as the operators of the server but also help protect visitors to their website by requiring they use Tor Browser.
+
+In fact, Fernanda uses **Tor Browser** for all of her web browsing just to be on the safe side.
+
+She also uses a Tor-powered app called **OnionShare** to send files to other activists securely and privately.
+
+### Reproductive rights activists like Fernanda are fighting for fundamental freedoms, and Tor helps power their resistance.
+
+---
+
+# 3. TOR FOR HUMAN RIGHTS
+
+### Water is life
+
+Jelani lives in a small village which a wide river runs through.
+
+This river has provided water to his community since the days of his ancestors.
+
+But today, Jelani’s river is threatened by powerful multinational companies drilling for oil in the region.
+
+Private security firms, paid for by these companies, use powerful surveillance mechanisms to monitor the online activities of Jelani and his neighbors in the village who are organizing to protect their sacred river.
+
+Jelani uses **Tor Browser** to prevent these companies from watching as he visits websites for international human rights protection and legal aid and writes blog posts about the resistance movement in his village.
+
+He also uses **OnionShare** and **SecureDrop** to securely send documents to journalists who are helping expose these human rights violations.
+
+All of this software uses Tor to help protect Jelani’s privacy.
+
+### Human rights activists like Jelani are fighting for justice in their communities, and Tor helps power their resistance.
+
+---
+
+# 4. TOR FOR ANTI-CENSORSHIP
+
+### Build bridges not walls
+
+Jean was traveling for the first time to a country far from his family.
+
+After arriving at a hotel, he opened his laptop.
+
+He was so exhausted that when the message "Connection has timed out" first appeared on his web browser, he thought it was due to his own error.
+
+But after trying again and again, he realized that his email provider, a news website, and many apps were unavailable.
+
+He had heard that this country censors the internet and wondered if that was happening.
+How could he contact his family from behind this impenetrable wall?
+After doing some web searches, he found a forum and read about VPNs, private services that allow you to connect to another uncensored network.
+
+Jean spent half an hour trying to figure out which cheap VPN was best.
+
+He chose one and for a moment it seemed to work, but after five minutes the connection went offline and the VPN would no longer connect.
+
+Jean kept reading to find other options and learned about Tor Browser and how it can circumvent censorship.
+
+He found an official website mirror to download the program.
+
+When he opened **Tor Browser**, he followed the prompts for censored users and connected to a bridge which allowed him to access the internet again.
+
+With Tor Browser, Jean can browse freely and privately and contact his family.
+
+### Censored users all over the world rely on Tor Browser for a free, stable, and uncensored way to access the internet.
+
+---
+
+# 5. Shared Sections
+
+## టార్ అంటే ఏమిటి?
+
+Tor is free software and an open network that helps protect you from tracking, surveillance, and censorship online.
+Tor is created for free by a 501(c)3 U.S.-based nonprofit called the Tor Project.
+
+The easiest way to use Tor is Tor Browser.
+When you use Tor Browser, no one can see what websites you visit or where in the world you’re coming from.
+
+Other applications, like SecureDrop and OnionShare, use Tor to protect their users against surveillance and censorship.
+
+
+## 6. How does Tor work?
+
+Amal wants to visit Bekele’s website privately, so she opens Tor Browser.
+
+Tor Browser selects a random circuit of three relays, which are computers all over the world configured to route traffic over the Tor network.
+
+Tor Browser then encrypts her website request three times and sends it to the first Tor relay in her circuit.
+
+The first relay removes the first encryption layer but doesn't learn that the destination is Bekele’s website.
+
+The first relay learns only the next location in the circuit, which is the second relay.
+
+The second relay removes another encryption layer and forwards the web page request to the third relay.
+
+The third relay removes the last encryption layer and forwards the web page request to its destination, Bekele’s website, but it doesn't know the request comes from Amal.
+
+Bekele doesn't know that the website request came from Amal unless she tells him so.
+
+## 7. Who uses Tor?
+
+People all over the world use Tor to protect their privacy and access the web freely.
+
+Tor helps protect journalists, human rights defenders, domestic violence victims, academic researchers, and anyone experiencing tracking, censorship, or surveillance.
+
+## 6. Why trust Tor?
+
+Tor is designed for privacy. We don’t know who our users are, and we don't keep logs of user activity.
+
+Tor relay operators cannot reveal the true identity of Tor users.
+
+Continual peer review of Tor's source code by academic and open source communities ensures that there are no backdoors in Tor, and our social contract promises that we will never backdoor Tor.
+
+## 7. Join the Tor community
+
+Tor is made possible by a diverse set of users, developers, relay operators, and advocates from around the world.
+
+We need your help to make Tor more usable and secure for people everywhere.
+
+You can volunteer with Tor by writing code, running a relay, creating documentation, offering user support, or telling people in your community about Tor.
+
+The Tor community is governed by a code of conduct, and we outline our set of promises to the community in our social contract.
+
+Learn more about Tor by visiting our website, our wiki, finding us on IRC, joining one of our mailing lists, or signing up for Tor News at newsletter.torproject.org.
+
+
+## 8. Download Tor
+
+Tor for Desktop
+torproject.org/download
+
+TOR ON MOBILE
+### Android
+Tor Browser for Android is available from GooglePlay.
+
+### iOS
+Onion Browser, developed by M. Tigas, is the only browser we recommend for iOS.
+
diff --git a/tg.po b/tg.po
new file mode 100644
index 000000000..6c8fce0dc
--- /dev/null
+++ b/tg.po
@@ -0,0 +1,162 @@
+# Tor Outreach Material 2019-2020
+
+# 1. TOR FOR PRIVACY
+
+### Privacy is a human right
+
+Like many of us, Aleisha spends most of her time online--connecting with friends, posting on social media, and browsing the web.
+
+But lately, she's noticed that advertisements related to her previous searches are following her around online.
+
+This feels so invasive that she does some research on online ads and learns that it's not just advertisers tracking her but also her ISP, analytics companies, social media platforms, and more.
+
+Aleisha decides she wants to find and use software that doesn't collect her data, doesn't track her, and doesn't tell other services anything private about her.
+
+She goes to a privacy training at a local hackerspace and learns about **Tor Browser**, the only web browser that allows her to browse anonymously.
+
+---
+
+# 2.TOR FOR FEMINISTS
+
+### The future is cyberfeminist
+
+Fernanda runs a women's collective focused on reproductive rights in Brazil, where abortion is illegal.
+
+Fernanda and her colleagues built a website with information about abortion access, birth control, and other resources for people seeking reproductive information.
+
+If this website was linked back to them, they could be arrested--or worse.
+
+To protect themselves, Fernanda and her colleagues created the website using Tor **onion services**. Onion services not only protect them from being discovered as the operators of the server but also help protect visitors to their website by requiring they use Tor Browser.
+
+In fact, Fernanda uses **Tor Browser** for all of her web browsing just to be on the safe side.
+
+She also uses a Tor-powered app called **OnionShare** to send files to other activists securely and privately.
+
+### Reproductive rights activists like Fernanda are fighting for fundamental freedoms, and Tor helps power their resistance.
+
+---
+
+# 3. TOR FOR HUMAN RIGHTS
+
+### Water is life
+
+Jelani lives in a small village which a wide river runs through.
+
+This river has provided water to his community since the days of his ancestors.
+
+But today, Jelani’s river is threatened by powerful multinational companies drilling for oil in the region.
+
+Private security firms, paid for by these companies, use powerful surveillance mechanisms to monitor the online activities of Jelani and his neighbors in the village who are organizing to protect their sacred river.
+
+Jelani uses **Tor Browser** to prevent these companies from watching as he visits websites for international human rights protection and legal aid and writes blog posts about the resistance movement in his village.
+
+He also uses **OnionShare** and **SecureDrop** to securely send documents to journalists who are helping expose these human rights violations.
+
+All of this software uses Tor to help protect Jelani’s privacy.
+
+### Human rights activists like Jelani are fighting for justice in their communities, and Tor helps power their resistance.
+
+---
+
+# 4. TOR FOR ANTI-CENSORSHIP
+
+### Build bridges not walls
+
+Jean was traveling for the first time to a country far from his family.
+
+After arriving at a hotel, he opened his laptop.
+
+He was so exhausted that when the message "Connection has timed out" first appeared on his web browser, he thought it was due to his own error.
+
+But after trying again and again, he realized that his email provider, a news website, and many apps were unavailable.
+
+He had heard that this country censors the internet and wondered if that was happening.
+How could he contact his family from behind this impenetrable wall?
+After doing some web searches, he found a forum and read about VPNs, private services that allow you to connect to another uncensored network.
+
+Jean spent half an hour trying to figure out which cheap VPN was best.
+
+He chose one and for a moment it seemed to work, but after five minutes the connection went offline and the VPN would no longer connect.
+
+Jean kept reading to find other options and learned about Tor Browser and how it can circumvent censorship.
+
+He found an official website mirror to download the program.
+
+When he opened **Tor Browser**, he followed the prompts for censored users and connected to a bridge which allowed him to access the internet again.
+
+With Tor Browser, Jean can browse freely and privately and contact his family.
+
+### Censored users all over the world rely on Tor Browser for a free, stable, and uncensored way to access the internet.
+
+---
+
+# 5. Shared Sections
+
+## What is Tor?
+
+Tor is free software and an open network that helps protect you from tracking, surveillance, and censorship online.
+Tor is created for free by a 501(c)3 U.S.-based nonprofit called the Tor Project.
+
+The easiest way to use Tor is Tor Browser.
+When you use Tor Browser, no one can see what websites you visit or where in the world you’re coming from.
+
+Other applications, like SecureDrop and OnionShare, use Tor to protect their users against surveillance and censorship.
+
+
+## 6. How does Tor work?
+
+Amal wants to visit Bekele’s website privately, so she opens Tor Browser.
+
+Tor Browser selects a random circuit of three relays, which are computers all over the world configured to route traffic over the Tor network.
+
+Tor Browser then encrypts her website request three times and sends it to the first Tor relay in her circuit.
+
+The first relay removes the first encryption layer but doesn't learn that the destination is Bekele’s website.
+
+The first relay learns only the next location in the circuit, which is the second relay.
+
+The second relay removes another encryption layer and forwards the web page request to the third relay.
+
+The third relay removes the last encryption layer and forwards the web page request to its destination, Bekele’s website, but it doesn't know the request comes from Amal.
+
+Bekele doesn't know that the website request came from Amal unless she tells him so.
+
+## 7. Who uses Tor?
+
+People all over the world use Tor to protect their privacy and access the web freely.
+
+Tor helps protect journalists, human rights defenders, domestic violence victims, academic researchers, and anyone experiencing tracking, censorship, or surveillance.
+
+## 6. Why trust Tor?
+
+Tor is designed for privacy. We don’t know who our users are, and we don't keep logs of user activity.
+
+Tor relay operators cannot reveal the true identity of Tor users.
+
+Continual peer review of Tor's source code by academic and open source communities ensures that there are no backdoors in Tor, and our social contract promises that we will never backdoor Tor.
+
+## 7. Join the Tor community
+
+Tor is made possible by a diverse set of users, developers, relay operators, and advocates from around the world.
+
+We need your help to make Tor more usable and secure for people everywhere.
+
+You can volunteer with Tor by writing code, running a relay, creating documentation, offering user support, or telling people in your community about Tor.
+
+The Tor community is governed by a code of conduct, and we outline our set of promises to the community in our social contract.
+
+Learn more about Tor by visiting our website, our wiki, finding us on IRC, joining one of our mailing lists, or signing up for Tor News at newsletter.torproject.org.
+
+
+## 8. Download Tor
+
+Tor for Desktop
+torproject.org/download
+
+TOR ON MOBILE
+### Android
+Tor Browser for Android is available from GooglePlay.
+
+### iOS
+Onion Browser, developed by M. Tigas, is the only browser we recommend for iOS.
+
diff --git a/th.po b/th.po
new file mode 100644
index 000000000..42edc0e97
--- /dev/null
+++ b/th.po
@@ -0,0 +1,162 @@
+# Tor Outreach Material 2019-2020
+
+# 1. TOR FOR PRIVACY
+
+### Privacy is a human right
+
+Like many of us, Aleisha spends most of her time online--connecting with friends, posting on social media, and browsing the web.
+
+But lately, she's noticed that advertisements related to her previous searches are following her around online.
+
+This feels so invasive that she does some research on online ads and learns that it's not just advertisers tracking her but also her ISP, analytics companies, social media platforms, and more.
+
+Aleisha decides she wants to find and use software that doesn't collect her data, doesn't track her, and doesn't tell other services anything private about her.
+
+She goes to a privacy training at a local hackerspace and learns about **Tor Browser**, the only web browser that allows her to browse anonymously.
+
+---
+
+# 2.TOR FOR FEMINISTS
+
+### The future is cyberfeminist
+
+Fernanda runs a women's collective focused on reproductive rights in Brazil, where abortion is illegal.
+
+Fernanda and her colleagues built a website with information about abortion access, birth control, and other resources for people seeking reproductive information.
+
+If this website was linked back to them, they could be arrested--or worse.
+
+To protect themselves, Fernanda and her colleagues created the website using Tor **onion services**. Onion services not only protect them from being discovered as the operators of the server but also help protect visitors to their website by requiring they use Tor Browser.
+
+In fact, Fernanda uses **Tor Browser** for all of her web browsing just to be on the safe side.
+
+She also uses a Tor-powered app called **OnionShare** to send files to other activists securely and privately.
+
+### Reproductive rights activists like Fernanda are fighting for fundamental freedoms, and Tor helps power their resistance.
+
+---
+
+# 3. TOR FOR HUMAN RIGHTS
+
+### Water is life
+
+Jelani lives in a small village which a wide river runs through.
+
+This river has provided water to his community since the days of his ancestors.
+
+But today, Jelani’s river is threatened by powerful multinational companies drilling for oil in the region.
+
+Private security firms, paid for by these companies, use powerful surveillance mechanisms to monitor the online activities of Jelani and his neighbors in the village who are organizing to protect their sacred river.
+
+Jelani uses **Tor Browser** to prevent these companies from watching as he visits websites for international human rights protection and legal aid and writes blog posts about the resistance movement in his village.
+
+He also uses **OnionShare** and **SecureDrop** to securely send documents to journalists who are helping expose these human rights violations.
+
+All of this software uses Tor to help protect Jelani’s privacy.
+
+### Human rights activists like Jelani are fighting for justice in their communities, and Tor helps power their resistance.
+
+---
+
+# 4. TOR FOR ANTI-CENSORSHIP
+
+### Build bridges not walls
+
+Jean was traveling for the first time to a country far from his family.
+
+After arriving at a hotel, he opened his laptop.
+
+He was so exhausted that when the message "Connection has timed out" first appeared on his web browser, he thought it was due to his own error.
+
+But after trying again and again, he realized that his email provider, a news website, and many apps were unavailable.
+
+He had heard that this country censors the internet and wondered if that was happening.
+How could he contact his family from behind this impenetrable wall?
+After doing some web searches, he found a forum and read about VPNs, private services that allow you to connect to another uncensored network.
+
+Jean spent half an hour trying to figure out which cheap VPN was best.
+
+He chose one and for a moment it seemed to work, but after five minutes the connection went offline and the VPN would no longer connect.
+
+Jean kept reading to find other options and learned about Tor Browser and how it can circumvent censorship.
+
+He found an official website mirror to download the program.
+
+When he opened **Tor Browser**, he followed the prompts for censored users and connected to a bridge which allowed him to access the internet again.
+
+With Tor Browser, Jean can browse freely and privately and contact his family.
+
+### Censored users all over the world rely on Tor Browser for a free, stable, and uncensored way to access the internet.
+
+---
+
+# 5. Shared Sections
+
+## Tor คืออะไร
+
+Tor is free software and an open network that helps protect you from tracking, surveillance, and censorship online.
+Tor is created for free by a 501(c)3 U.S.-based nonprofit called the Tor Project.
+
+The easiest way to use Tor is Tor Browser.
+When you use Tor Browser, no one can see what websites you visit or where in the world you’re coming from.
+
+Other applications, like SecureDrop and OnionShare, use Tor to protect their users against surveillance and censorship.
+
+
+## 6. How does Tor work?
+
+Amal wants to visit Bekele’s website privately, so she opens Tor Browser.
+
+Tor Browser selects a random circuit of three relays, which are computers all over the world configured to route traffic over the Tor network.
+
+Tor Browser then encrypts her website request three times and sends it to the first Tor relay in her circuit.
+
+The first relay removes the first encryption layer but doesn't learn that the destination is Bekele’s website.
+
+The first relay learns only the next location in the circuit, which is the second relay.
+
+The second relay removes another encryption layer and forwards the web page request to the third relay.
+
+The third relay removes the last encryption layer and forwards the web page request to its destination, Bekele’s website, but it doesn't know the request comes from Amal.
+
+Bekele doesn't know that the website request came from Amal unless she tells him so.
+
+## 7. Who uses Tor?
+
+People all over the world use Tor to protect their privacy and access the web freely.
+
+Tor helps protect journalists, human rights defenders, domestic violence victims, academic researchers, and anyone experiencing tracking, censorship, or surveillance.
+
+## 6. Why trust Tor?
+
+Tor is designed for privacy. We don’t know who our users are, and we don't keep logs of user activity.
+
+Tor relay operators cannot reveal the true identity of Tor users.
+
+Continual peer review of Tor's source code by academic and open source communities ensures that there are no backdoors in Tor, and our social contract promises that we will never backdoor Tor.
+
+## 7. Join the Tor community
+
+Tor is made possible by a diverse set of users, developers, relay operators, and advocates from around the world.
+
+We need your help to make Tor more usable and secure for people everywhere.
+
+You can volunteer with Tor by writing code, running a relay, creating documentation, offering user support, or telling people in your community about Tor.
+
+The Tor community is governed by a code of conduct, and we outline our set of promises to the community in our social contract.
+
+Learn more about Tor by visiting our website, our wiki, finding us on IRC, joining one of our mailing lists, or signing up for Tor News at newsletter.torproject.org.
+
+
+## 8. Download Tor
+
+Tor for Desktop
+torproject.org/download
+
+TOR ON MOBILE
+### Android
+Tor Browser for Android is available from GooglePlay.
+
+### iOS
+Onion Browser, developed by M. Tigas, is the only browser we recommend for iOS.
+
diff --git a/tk.po b/tk.po
new file mode 100644
index 000000000..6c8fce0dc
--- /dev/null
+++ b/tk.po
@@ -0,0 +1,162 @@
+# Tor Outreach Material 2019-2020
+
+# 1. TOR FOR PRIVACY
+
+### Privacy is a human right
+
+Like many of us, Aleisha spends most of her time online--connecting with friends, posting on social media, and browsing the web.
+
+But lately, she's noticed that advertisements related to her previous searches are following her around online.
+
+This feels so invasive that she does some research on online ads and learns that it's not just advertisers tracking her but also her ISP, analytics companies, social media platforms, and more.
+
+Aleisha decides she wants to find and use software that doesn't collect her data, doesn't track her, and doesn't tell other services anything private about her.
+
+She goes to a privacy training at a local hackerspace and learns about **Tor Browser**, the only web browser that allows her to browse anonymously.
+
+---
+
+# 2.TOR FOR FEMINISTS
+
+### The future is cyberfeminist
+
+Fernanda runs a women's collective focused on reproductive rights in Brazil, where abortion is illegal.
+
+Fernanda and her colleagues built a website with information about abortion access, birth control, and other resources for people seeking reproductive information.
+
+If this website was linked back to them, they could be arrested--or worse.
+
+To protect themselves, Fernanda and her colleagues created the website using Tor **onion services**. Onion services not only protect them from being discovered as the operators of the server but also help protect visitors to their website by requiring they use Tor Browser.
+
+In fact, Fernanda uses **Tor Browser** for all of her web browsing just to be on the safe side.
+
+She also uses a Tor-powered app called **OnionShare** to send files to other activists securely and privately.
+
+### Reproductive rights activists like Fernanda are fighting for fundamental freedoms, and Tor helps power their resistance.
+
+---
+
+# 3. TOR FOR HUMAN RIGHTS
+
+### Water is life
+
+Jelani lives in a small village which a wide river runs through.
+
+This river has provided water to his community since the days of his ancestors.
+
+But today, Jelani’s river is threatened by powerful multinational companies drilling for oil in the region.
+
+Private security firms, paid for by these companies, use powerful surveillance mechanisms to monitor the online activities of Jelani and his neighbors in the village who are organizing to protect their sacred river.
+
+Jelani uses **Tor Browser** to prevent these companies from watching as he visits websites for international human rights protection and legal aid and writes blog posts about the resistance movement in his village.
+
+He also uses **OnionShare** and **SecureDrop** to securely send documents to journalists who are helping expose these human rights violations.
+
+All of this software uses Tor to help protect Jelani’s privacy.
+
+### Human rights activists like Jelani are fighting for justice in their communities, and Tor helps power their resistance.
+
+---
+
+# 4. TOR FOR ANTI-CENSORSHIP
+
+### Build bridges not walls
+
+Jean was traveling for the first time to a country far from his family.
+
+After arriving at a hotel, he opened his laptop.
+
+He was so exhausted that when the message "Connection has timed out" first appeared on his web browser, he thought it was due to his own error.
+
+But after trying again and again, he realized that his email provider, a news website, and many apps were unavailable.
+
+He had heard that this country censors the internet and wondered if that was happening.
+How could he contact his family from behind this impenetrable wall?
+After doing some web searches, he found a forum and read about VPNs, private services that allow you to connect to another uncensored network.
+
+Jean spent half an hour trying to figure out which cheap VPN was best.
+
+He chose one and for a moment it seemed to work, but after five minutes the connection went offline and the VPN would no longer connect.
+
+Jean kept reading to find other options and learned about Tor Browser and how it can circumvent censorship.
+
+He found an official website mirror to download the program.
+
+When he opened **Tor Browser**, he followed the prompts for censored users and connected to a bridge which allowed him to access the internet again.
+
+With Tor Browser, Jean can browse freely and privately and contact his family.
+
+### Censored users all over the world rely on Tor Browser for a free, stable, and uncensored way to access the internet.
+
+---
+
+# 5. Shared Sections
+
+## What is Tor?
+
+Tor is free software and an open network that helps protect you from tracking, surveillance, and censorship online.
+Tor is created for free by a 501(c)3 U.S.-based nonprofit called the Tor Project.
+
+The easiest way to use Tor is Tor Browser.
+When you use Tor Browser, no one can see what websites you visit or where in the world you’re coming from.
+
+Other applications, like SecureDrop and OnionShare, use Tor to protect their users against surveillance and censorship.
+
+
+## 6. How does Tor work?
+
+Amal wants to visit Bekele’s website privately, so she opens Tor Browser.
+
+Tor Browser selects a random circuit of three relays, which are computers all over the world configured to route traffic over the Tor network.
+
+Tor Browser then encrypts her website request three times and sends it to the first Tor relay in her circuit.
+
+The first relay removes the first encryption layer but doesn't learn that the destination is Bekele’s website.
+
+The first relay learns only the next location in the circuit, which is the second relay.
+
+The second relay removes another encryption layer and forwards the web page request to the third relay.
+
+The third relay removes the last encryption layer and forwards the web page request to its destination, Bekele’s website, but it doesn't know the request comes from Amal.
+
+Bekele doesn't know that the website request came from Amal unless she tells him so.
+
+## 7. Who uses Tor?
+
+People all over the world use Tor to protect their privacy and access the web freely.
+
+Tor helps protect journalists, human rights defenders, domestic violence victims, academic researchers, and anyone experiencing tracking, censorship, or surveillance.
+
+## 6. Why trust Tor?
+
+Tor is designed for privacy. We don’t know who our users are, and we don't keep logs of user activity.
+
+Tor relay operators cannot reveal the true identity of Tor users.
+
+Continual peer review of Tor's source code by academic and open source communities ensures that there are no backdoors in Tor, and our social contract promises that we will never backdoor Tor.
+
+## 7. Join the Tor community
+
+Tor is made possible by a diverse set of users, developers, relay operators, and advocates from around the world.
+
+We need your help to make Tor more usable and secure for people everywhere.
+
+You can volunteer with Tor by writing code, running a relay, creating documentation, offering user support, or telling people in your community about Tor.
+
+The Tor community is governed by a code of conduct, and we outline our set of promises to the community in our social contract.
+
+Learn more about Tor by visiting our website, our wiki, finding us on IRC, joining one of our mailing lists, or signing up for Tor News at newsletter.torproject.org.
+
+
+## 8. Download Tor
+
+Tor for Desktop
+torproject.org/download
+
+TOR ON MOBILE
+### Android
+Tor Browser for Android is available from GooglePlay.
+
+### iOS
+Onion Browser, developed by M. Tigas, is the only browser we recommend for iOS.
+
diff --git a/tl_PH.po b/tl_PH.po
new file mode 100644
index 000000000..6c8fce0dc
--- /dev/null
+++ b/tl_PH.po
@@ -0,0 +1,162 @@
+# Tor Outreach Material 2019-2020
+
+# 1. TOR FOR PRIVACY
+
+### Privacy is a human right
+
+Like many of us, Aleisha spends most of her time online--connecting with friends, posting on social media, and browsing the web.
+
+But lately, she's noticed that advertisements related to her previous searches are following her around online.
+
+This feels so invasive that she does some research on online ads and learns that it's not just advertisers tracking her but also her ISP, analytics companies, social media platforms, and more.
+
+Aleisha decides she wants to find and use software that doesn't collect her data, doesn't track her, and doesn't tell other services anything private about her.
+
+She goes to a privacy training at a local hackerspace and learns about **Tor Browser**, the only web browser that allows her to browse anonymously.
+
+---
+
+# 2.TOR FOR FEMINISTS
+
+### The future is cyberfeminist
+
+Fernanda runs a women's collective focused on reproductive rights in Brazil, where abortion is illegal.
+
+Fernanda and her colleagues built a website with information about abortion access, birth control, and other resources for people seeking reproductive information.
+
+If this website was linked back to them, they could be arrested--or worse.
+
+To protect themselves, Fernanda and her colleagues created the website using Tor **onion services**. Onion services not only protect them from being discovered as the operators of the server but also help protect visitors to their website by requiring they use Tor Browser.
+
+In fact, Fernanda uses **Tor Browser** for all of her web browsing just to be on the safe side.
+
+She also uses a Tor-powered app called **OnionShare** to send files to other activists securely and privately.
+
+### Reproductive rights activists like Fernanda are fighting for fundamental freedoms, and Tor helps power their resistance.
+
+---
+
+# 3. TOR FOR HUMAN RIGHTS
+
+### Water is life
+
+Jelani lives in a small village which a wide river runs through.
+
+This river has provided water to his community since the days of his ancestors.
+
+But today, Jelani’s river is threatened by powerful multinational companies drilling for oil in the region.
+
+Private security firms, paid for by these companies, use powerful surveillance mechanisms to monitor the online activities of Jelani and his neighbors in the village who are organizing to protect their sacred river.
+
+Jelani uses **Tor Browser** to prevent these companies from watching as he visits websites for international human rights protection and legal aid and writes blog posts about the resistance movement in his village.
+
+He also uses **OnionShare** and **SecureDrop** to securely send documents to journalists who are helping expose these human rights violations.
+
+All of this software uses Tor to help protect Jelani’s privacy.
+
+### Human rights activists like Jelani are fighting for justice in their communities, and Tor helps power their resistance.
+
+---
+
+# 4. TOR FOR ANTI-CENSORSHIP
+
+### Build bridges not walls
+
+Jean was traveling for the first time to a country far from his family.
+
+After arriving at a hotel, he opened his laptop.
+
+He was so exhausted that when the message "Connection has timed out" first appeared on his web browser, he thought it was due to his own error.
+
+But after trying again and again, he realized that his email provider, a news website, and many apps were unavailable.
+
+He had heard that this country censors the internet and wondered if that was happening.
+How could he contact his family from behind this impenetrable wall?
+After doing some web searches, he found a forum and read about VPNs, private services that allow you to connect to another uncensored network.
+
+Jean spent half an hour trying to figure out which cheap VPN was best.
+
+He chose one and for a moment it seemed to work, but after five minutes the connection went offline and the VPN would no longer connect.
+
+Jean kept reading to find other options and learned about Tor Browser and how it can circumvent censorship.
+
+He found an official website mirror to download the program.
+
+When he opened **Tor Browser**, he followed the prompts for censored users and connected to a bridge which allowed him to access the internet again.
+
+With Tor Browser, Jean can browse freely and privately and contact his family.
+
+### Censored users all over the world rely on Tor Browser for a free, stable, and uncensored way to access the internet.
+
+---
+
+# 5. Shared Sections
+
+## What is Tor?
+
+Tor is free software and an open network that helps protect you from tracking, surveillance, and censorship online.
+Tor is created for free by a 501(c)3 U.S.-based nonprofit called the Tor Project.
+
+The easiest way to use Tor is Tor Browser.
+When you use Tor Browser, no one can see what websites you visit or where in the world you’re coming from.
+
+Other applications, like SecureDrop and OnionShare, use Tor to protect their users against surveillance and censorship.
+
+
+## 6. How does Tor work?
+
+Amal wants to visit Bekele’s website privately, so she opens Tor Browser.
+
+Tor Browser selects a random circuit of three relays, which are computers all over the world configured to route traffic over the Tor network.
+
+Tor Browser then encrypts her website request three times and sends it to the first Tor relay in her circuit.
+
+The first relay removes the first encryption layer but doesn't learn that the destination is Bekele’s website.
+
+The first relay learns only the next location in the circuit, which is the second relay.
+
+The second relay removes another encryption layer and forwards the web page request to the third relay.
+
+The third relay removes the last encryption layer and forwards the web page request to its destination, Bekele’s website, but it doesn't know the request comes from Amal.
+
+Bekele doesn't know that the website request came from Amal unless she tells him so.
+
+## 7. Who uses Tor?
+
+People all over the world use Tor to protect their privacy and access the web freely.
+
+Tor helps protect journalists, human rights defenders, domestic violence victims, academic researchers, and anyone experiencing tracking, censorship, or surveillance.
+
+## 6. Why trust Tor?
+
+Tor is designed for privacy. We don’t know who our users are, and we don't keep logs of user activity.
+
+Tor relay operators cannot reveal the true identity of Tor users.
+
+Continual peer review of Tor's source code by academic and open source communities ensures that there are no backdoors in Tor, and our social contract promises that we will never backdoor Tor.
+
+## 7. Join the Tor community
+
+Tor is made possible by a diverse set of users, developers, relay operators, and advocates from around the world.
+
+We need your help to make Tor more usable and secure for people everywhere.
+
+You can volunteer with Tor by writing code, running a relay, creating documentation, offering user support, or telling people in your community about Tor.
+
+The Tor community is governed by a code of conduct, and we outline our set of promises to the community in our social contract.
+
+Learn more about Tor by visiting our website, our wiki, finding us on IRC, joining one of our mailing lists, or signing up for Tor News at newsletter.torproject.org.
+
+
+## 8. Download Tor
+
+Tor for Desktop
+torproject.org/download
+
+TOR ON MOBILE
+### Android
+Tor Browser for Android is available from GooglePlay.
+
+### iOS
+Onion Browser, developed by M. Tigas, is the only browser we recommend for iOS.
+
diff --git a/tor-outreach2019-2020.md b/tor-outreach2019-2020.md
new file mode 100644
index 000000000..6c8fce0dc
--- /dev/null
+++ b/tor-outreach2019-2020.md
@@ -0,0 +1,162 @@
+# Tor Outreach Material 2019-2020
+
+# 1. TOR FOR PRIVACY
+
+### Privacy is a human right
+
+Like many of us, Aleisha spends most of her time online--connecting with friends, posting on social media, and browsing the web.
+
+But lately, she's noticed that advertisements related to her previous searches are following her around online.
+
+This feels so invasive that she does some research on online ads and learns that it's not just advertisers tracking her but also her ISP, analytics companies, social media platforms, and more.
+
+Aleisha decides she wants to find and use software that doesn't collect her data, doesn't track her, and doesn't tell other services anything private about her.
+
+She goes to a privacy training at a local hackerspace and learns about **Tor Browser**, the only web browser that allows her to browse anonymously.
+
+---
+
+# 2.TOR FOR FEMINISTS
+
+### The future is cyberfeminist
+
+Fernanda runs a women's collective focused on reproductive rights in Brazil, where abortion is illegal.
+
+Fernanda and her colleagues built a website with information about abortion access, birth control, and other resources for people seeking reproductive information.
+
+If this website was linked back to them, they could be arrested--or worse.
+
+To protect themselves, Fernanda and her colleagues created the website using Tor **onion services**. Onion services not only protect them from being discovered as the operators of the server but also help protect visitors to their website by requiring they use Tor Browser.
+
+In fact, Fernanda uses **Tor Browser** for all of her web browsing just to be on the safe side.
+
+She also uses a Tor-powered app called **OnionShare** to send files to other activists securely and privately.
+
+### Reproductive rights activists like Fernanda are fighting for fundamental freedoms, and Tor helps power their resistance.
+
+---
+
+# 3. TOR FOR HUMAN RIGHTS
+
+### Water is life
+
+Jelani lives in a small village which a wide river runs through.
+
+This river has provided water to his community since the days of his ancestors.
+
+But today, Jelani’s river is threatened by powerful multinational companies drilling for oil in the region.
+
+Private security firms, paid for by these companies, use powerful surveillance mechanisms to monitor the online activities of Jelani and his neighbors in the village who are organizing to protect their sacred river.
+
+Jelani uses **Tor Browser** to prevent these companies from watching as he visits websites for international human rights protection and legal aid and writes blog posts about the resistance movement in his village.
+
+He also uses **OnionShare** and **SecureDrop** to securely send documents to journalists who are helping expose these human rights violations.
+
+All of this software uses Tor to help protect Jelani’s privacy.
+
+### Human rights activists like Jelani are fighting for justice in their communities, and Tor helps power their resistance.
+
+---
+
+# 4. TOR FOR ANTI-CENSORSHIP
+
+### Build bridges not walls
+
+Jean was traveling for the first time to a country far from his family.
+
+After arriving at a hotel, he opened his laptop.
+
+He was so exhausted that when the message "Connection has timed out" first appeared on his web browser, he thought it was due to his own error.
+
+But after trying again and again, he realized that his email provider, a news website, and many apps were unavailable.
+
+He had heard that this country censors the internet and wondered if that was happening.
+How could he contact his family from behind this impenetrable wall?
+After doing some web searches, he found a forum and read about VPNs, private services that allow you to connect to another uncensored network.
+
+Jean spent half an hour trying to figure out which cheap VPN was best.
+
+He chose one and for a moment it seemed to work, but after five minutes the connection went offline and the VPN would no longer connect.
+
+Jean kept reading to find other options and learned about Tor Browser and how it can circumvent censorship.
+
+He found an official website mirror to download the program.
+
+When he opened **Tor Browser**, he followed the prompts for censored users and connected to a bridge which allowed him to access the internet again.
+
+With Tor Browser, Jean can browse freely and privately and contact his family.
+
+### Censored users all over the world rely on Tor Browser for a free, stable, and uncensored way to access the internet.
+
+---
+
+# 5. Shared Sections
+
+## What is Tor?
+
+Tor is free software and an open network that helps protect you from tracking, surveillance, and censorship online.
+Tor is created for free by a 501(c)3 U.S.-based nonprofit called the Tor Project.
+
+The easiest way to use Tor is Tor Browser.
+When you use Tor Browser, no one can see what websites you visit or where in the world you’re coming from.
+
+Other applications, like SecureDrop and OnionShare, use Tor to protect their users against surveillance and censorship.
+
+
+## 6. How does Tor work?
+
+Amal wants to visit Bekele’s website privately, so she opens Tor Browser.
+
+Tor Browser selects a random circuit of three relays, which are computers all over the world configured to route traffic over the Tor network.
+
+Tor Browser then encrypts her website request three times and sends it to the first Tor relay in her circuit.
+
+The first relay removes the first encryption layer but doesn't learn that the destination is Bekele’s website.
+
+The first relay learns only the next location in the circuit, which is the second relay.
+
+The second relay removes another encryption layer and forwards the web page request to the third relay.
+
+The third relay removes the last encryption layer and forwards the web page request to its destination, Bekele’s website, but it doesn't know the request comes from Amal.
+
+Bekele doesn't know that the website request came from Amal unless she tells him so.
+
+## 7. Who uses Tor?
+
+People all over the world use Tor to protect their privacy and access the web freely.
+
+Tor helps protect journalists, human rights defenders, domestic violence victims, academic researchers, and anyone experiencing tracking, censorship, or surveillance.
+
+## 6. Why trust Tor?
+
+Tor is designed for privacy. We don’t know who our users are, and we don't keep logs of user activity.
+
+Tor relay operators cannot reveal the true identity of Tor users.
+
+Continual peer review of Tor's source code by academic and open source communities ensures that there are no backdoors in Tor, and our social contract promises that we will never backdoor Tor.
+
+## 7. Join the Tor community
+
+Tor is made possible by a diverse set of users, developers, relay operators, and advocates from around the world.
+
+We need your help to make Tor more usable and secure for people everywhere.
+
+You can volunteer with Tor by writing code, running a relay, creating documentation, offering user support, or telling people in your community about Tor.
+
+The Tor community is governed by a code of conduct, and we outline our set of promises to the community in our social contract.
+
+Learn more about Tor by visiting our website, our wiki, finding us on IRC, joining one of our mailing lists, or signing up for Tor News at newsletter.torproject.org.
+
+
+## 8. Download Tor
+
+Tor for Desktop
+torproject.org/download
+
+TOR ON MOBILE
+### Android
+Tor Browser for Android is available from GooglePlay.
+
+### iOS
+Onion Browser, developed by M. Tigas, is the only browser we recommend for iOS.
+
diff --git a/tr.po b/tr.po
new file mode 100644
index 000000000..12fffdd7f
--- /dev/null
+++ b/tr.po
@@ -0,0 +1,162 @@
+# Tor Bilgilendirme Başlıkları 2019-2020
+
+# 1. KİŞİSEL GİZLİLİK İÇİN TOR
+
+### Kişisel gizlilik bir insan hakkıdır
+
+Aleisha çoğumuz gibi zamanının önemli bir kısmında çevrimiçi oluyor. Arkadaşları ile görüşüyor, sosyal ağlarda paylaşım yapıyor ve İnternet sitelerine bakıyor.
+
+Bir süre önce, çevrimiçi olduğu yerlerde daha önce yaptığı aramalar ile ilgili reklamlar görmeye başladığını farketti.
+
+Bu durumu rahatsız edici bularak çevrimiçi reklamlar konusunu araştırdığında, yalnız reklamcıların değil, İnternet hizmeti sağlayıcıları, istatistik ve çevrimiçi davranış toplama firmaları, sosyal ağ platformları gibi pek çok kuruluşun kendisini izlediğini öğrendi.
+
+Aleisha kişisel bilgilerini toplamayan, çevrimiçi işlemlerini izlemeyen ve onun hakkında özel olan herhangi bir bilgiyi başka yerlere aktarmayan bir yazılım bulmak ve kullanmak istediğine karar verdi.
+
+Bunun üzerine katıldığı bir kişisel bilgileri koruma eğitiminde **Tor Browser** uygulamasının anonim kalarak işlem yapmayı sağlayan tek tarayıcı olduğunu öğrendi.
+
+---
+
+# 2. FEMİNİSTLER İÇİN TOR
+
+### Gelecek siberfeminist olacak
+
+Fernanda kürtajın yasa dışı olduğu Brezilya'da bir kadın birliği ile üreme hakları üzerinde çalışıyor.
+
+Fernanda ve arkadaşları kürtaj olanakları, doğum kontrolü ve üreme ile ilgili diğer bilgileri içeren bir web sitesi oluşturmuş.
+
+Bu web sitesi ile bağlantılı oldukları anlaşılırsa tutuklanabilirler ya da başlarına daha kötü şeyler gelebilir.
+
+Kendilerini korumak için Fernanda ve arkadaşları web sitesini Tor **onion hizmetleri** üzerinde hazırladılar. Onion hizmetleri hem onların web sitesini hazırlayanlar olarak bulunabilmelerini engelliyor hem de web sitesine erişmek için Tor Browser kullanması gerektiğinden ziyaretçilerini de korumuş oluyor.
+
+Aslında Fernanda güvenli tarafta kalabilmek için tüm İnternet aramalarını yalnız **Tor Browser** ile yapıyor.
+
+Ayrıca çeşitli dosyaları diğer aktivistler ile güvenli bir şekilde paylaşırken kişisel gizliliğini de korumak için Tor tarafından geliştirilmiş **OnionShare** uygulamasını kullanıyor.
+
+### Tor, üreme hakkı için mücadele eden Fernanda gibi temel hakları savunan aktivistlere yardımcı olur.
+
+---
+
+# 3. İNSAN HAKLARI İÇİN TOR
+
+### Su hayattır
+
+Jelanı içinden büyük bir nehir geçen küçük bir köyde yaşıyor.
+
+Bu nehir atalarının zamanından beri köy halkının suyunu sağlıyor.
+
+Ancak bugün Jelani'nin nehri bölgede petrol sondajı yapan çok uluslu güçlü şirketlerin tehdidi altında.
+
+Bu şirketler için çalışan özel güvenlik firmaları, nehirlerini korumak için bir araya gelen Jelani ve komşularından oluşan köy halkının çevrimiçi yaptıklarını izlemek için gelişmiş yöntemler kullanıyor.
+
+Jelani uluslararası insan hakları ya da hukuk ile ilgili web sitelerini ziyaret etmek ve köyündeki direniş hakkında yazılar yazmak için **Tor Browser** kullanıyor.
+
+Ayrıca elindeki belgeleri insan haklarını açığa çıkarmak üzerine çalışan gazetecilere güvenli bir şekilde iletmek için **OnionShare** ve **SecureDrop** uygulamalarını kullanıyor.
+
+Jelani'nin kişisel gizliliğin korunmasına yardımcı olan tüm bu uygulamalar Tor kullanır.
+
+### Jelani gibi insan hakları aktivistleri toplumlarında adaleti sağlamak için çalışırlarken Tor onlara yardımcı olur.
+
+---
+
+# 4. SANSÜRE KARŞI TOR
+
+### Duvarlar değil köprüler kurun
+
+Jean ilk kez ailesinden uzakta bir ülkeye gidiyor.
+
+Oteline vardığında bilgisayarını açıyor.
+
+Web tarayıcısında "Bağlantı zaman aşımına uğradı" iletisini görünce önce bunun kendi hatasından olduğunu düşünüyor.
+
+Ancak bir kaç kez yeniden denediğinde e-posta hizmeti sağlayıcısına, bir haber sitesine giremediğini ve pek çok uygulamayı kullanamadığını fark ediyor.
+
+Bu ülkede İnternet erişimine sansür uygulandığını duyduğunu anımsayınca sorunun bu olduğunu anlıyor.
+Aşılmaz bir duvarın arkasından ailesi ile nasıl görüşebileceğini merak ediyor.
+Web üzerinde biraz araştırma yapınca bir forumda sansürlenmeyen bir ağ üzerine bağlanmayı sağlayan VPN adında özel hizmetler bulunduğunu öğreniyor.
+
+Jean en ucuz ve iyi VPN hizmetinin hangisi olduğunu anlamak için bir buçuk saat harcıyor.
+
+İçlerinden birini seçiyor ve bu bir süre için işe yarıyor gibi görünüyor. Ancak beş dakika sonra bağlantı kopuyor ve bir daha VPN bağlantısı kurulamıyor.
+
+Jean başka ne yapabileceğini araştırıyor ve Tor Browser uygulaması ile sansürü nasıl aşabileceğini öğreniyor.
+
+Uygulamayı indirebileceği bir resmi yansı web sitesi buluyor.
+
+**Tor Browser** uygulamasını başlattıktan sonra sansür uygulanan kullanıcılara uygun ayarları seçerek bir köprüye bağlanıyor ve İnternet'e yeniden erişebiliyor.
+
+Jean Tor Browser kullanarak kişisel gizliliğinin korunmasını sağlarken İnternet'e özgürce bağlanıp ailesi ile görüşebiliyor.
+
+### Dünyada sansüre uğrayan tüm kullanıcılar Tor Browser kullanarak ücretsiz ve güvenli bir şekilde İnternet'e erişebilir.
+
+---
+
+# 5. PAYLAŞILAN BÖLÜMLER
+
+## Tor nedir?
+
+Tor çevrimiçi izlenmenizi engelleyen ve sansürü aşmanızı sağlayan özgür ve ücretsiz bir açık ağdır.
+Tor Birleşik Devletler 501(c)3 koşulları altında faaliyet gösteren ve kar amacı gütmeyen bir kuruluş olan Tor Projesi tarafından geliştirilmiştir.
+
+Tor kullanmanın en kolay yolu Tor Browser uygulamasıdır.
+Tor Browser uygulamasını kullandığınızda hiç kimse hangi web sitelerini ziyaret ettiğinizi ve dünyanın neresinde olduğunuzu göremez.
+
+SecureDrop ve OnionShare gibi diğer uygulamalar kullanıcılarını izleme ve sansüre karşı korur.
+
+
+## 6. TOR NASIL ÇALIŞIR?
+
+Amal, kişisel gizliliğini koruyarak Bekele'nin web sitesine bakmak ister ve Tor Browser uygulamasını açar.
+
+Tor Browser, tüm dünya üzerinde Tor ağının trafiğini yönlendirmek üzere ayarlanmış pek çok bilgisayardan rastgele üç tanesini seçer ve bir aktarıcı devresi oluşturur.
+
+Ardından Tor Browser, web sitesi isteğini üç kez şifreler ve az önce oluşturulmuş olan Tor devresindeki ilk aktarıcıya gönderir.
+
+İlk aktarıcı birinci şifreleme katmanını çözer ancak hedefin Bekele'nin web sitesi olduğunu öğrenemez.
+
+Birinci aktarıcı yalnız devrede bir sonraki hedefin ikinci aktarıcı olduğunu öğrenir.
+
+İkinci aktarıcı ikinci şifreleme katmanını çözer ve hedefi öğrenerek web sayfası isteğini üçüncü aktarıcıya iletir.
+
+Üçüncü aktarıcı son şifreleme katmanını çözer ve web sayfasını isteğini Bekele'nin web sitesine iletir. Ancak bu isteğin Amal tarafından yapıldığını bilmez.
+
+Bekele, Amal kendisine söylemedikçe web sitesi ile ilgili isteğin ondan geldiğini bilemez.
+
+## 7. KİMLER TOR KULLANIR?
+
+Tüm dünyadan insanlar kişisel gizliliklerini korumak ve web sitelerine özgürce erişmek için Tor kullanır.
+
+Tor gazetecilere, insan hakları savunucularına, yerel şiddet kurbanlarına, akademik araştırmacılara ve izleme, sansür ya da gözetimle karşılaşan herkese yardımcı olur.
+
+## 6. TOR'A NEDEN GÜVENEYİM?
+
+Tor kişisel gizliliği korumak için tasarlanmıştır. Kullanıcılarımızın kim olduğunu bilmeyiz ve kullanıcıların işlemleri ile ilgili herhangi bir günlük kaydı tutmayız.
+
+Tor aktarıcı hizmeti sunanlar, aktarıcılarını kullanan Tor kullanıcılarının gerçek kimliklerini öğrenemez.
+
+Tor kaynak kodunun akademik ve açık kaynak toplulukları tarafından sürekli gözden geçirilmesi sayesinde Tor üzerinde herhangi bir arka kapı bulunmaz. Ayrıca topluma Tor üzerinde bir arka kapı bulunmayacağına dair verdiğimiz bir söz var.
+
+## 7. TOR TOPLULUĞUNA KATILIN
+
+Tor, dünyanın dört bir yanındaki kullanıcılar, geliştiriciler, aktarıcı işletmecileri ve destekçiler sayesinde var oluyor.
+
+İsteyen herkes için Tor uygulamasını daha kullanışlı ve güvenli hale getirmek için desteğiniz gerekiyor.
+
+Kod geliştirerek, bir aktarıcı işleterek, belgeler yazarak, kullanıcı desteği sunarak ya da çevrenizdekileri Tor hakkında bilgilendirerek Tor projesine gönüllü destek verebilirsiniz.
+
+Tor topluluğunun davranış kuralları vardır ve topluluğa verdiğimiz sözleri toplumsal sözleşmemizde özetliyoruz.
+
+Web sitemizi ve wiki sayfalarımızı ziyaret ederek, IRC üzerinde bizi bularak, e-posta listelerimizden birine katılarak ya da newsletter.torproject.org adresinden Tor News duyurularına abone olarak Tor hakkında daha fazla bilgi alabilirsiniz.
+
+
+## 8. TOR UYGULAMASINI İNDİRİN
+
+Masaüstü için Tor
+torproject.org/download
+
+MOBİL AYGIT ÜZERİNDE TOR
+### Android
+Android için Tor Browser, GooglePlay üzerinden alınabilir.
+
+### iOS
+M. Tigas tarafından geliştirilen Onion Browser, iOS için önerdiğimiz tek tarayıcıdır.
+
diff --git a/ug at Arab.po b/ug at Arab.po
new file mode 100644
index 000000000..6c8fce0dc
--- /dev/null
+++ b/ug at Arab.po
@@ -0,0 +1,162 @@
+# Tor Outreach Material 2019-2020
+
+# 1. TOR FOR PRIVACY
+
+### Privacy is a human right
+
+Like many of us, Aleisha spends most of her time online--connecting with friends, posting on social media, and browsing the web.
+
+But lately, she's noticed that advertisements related to her previous searches are following her around online.
+
+This feels so invasive that she does some research on online ads and learns that it's not just advertisers tracking her but also her ISP, analytics companies, social media platforms, and more.
+
+Aleisha decides she wants to find and use software that doesn't collect her data, doesn't track her, and doesn't tell other services anything private about her.
+
+She goes to a privacy training at a local hackerspace and learns about **Tor Browser**, the only web browser that allows her to browse anonymously.
+
+---
+
+# 2.TOR FOR FEMINISTS
+
+### The future is cyberfeminist
+
+Fernanda runs a women's collective focused on reproductive rights in Brazil, where abortion is illegal.
+
+Fernanda and her colleagues built a website with information about abortion access, birth control, and other resources for people seeking reproductive information.
+
+If this website was linked back to them, they could be arrested--or worse.
+
+To protect themselves, Fernanda and her colleagues created the website using Tor **onion services**. Onion services not only protect them from being discovered as the operators of the server but also help protect visitors to their website by requiring they use Tor Browser.
+
+In fact, Fernanda uses **Tor Browser** for all of her web browsing just to be on the safe side.
+
+She also uses a Tor-powered app called **OnionShare** to send files to other activists securely and privately.
+
+### Reproductive rights activists like Fernanda are fighting for fundamental freedoms, and Tor helps power their resistance.
+
+---
+
+# 3. TOR FOR HUMAN RIGHTS
+
+### Water is life
+
+Jelani lives in a small village which a wide river runs through.
+
+This river has provided water to his community since the days of his ancestors.
+
+But today, Jelani’s river is threatened by powerful multinational companies drilling for oil in the region.
+
+Private security firms, paid for by these companies, use powerful surveillance mechanisms to monitor the online activities of Jelani and his neighbors in the village who are organizing to protect their sacred river.
+
+Jelani uses **Tor Browser** to prevent these companies from watching as he visits websites for international human rights protection and legal aid and writes blog posts about the resistance movement in his village.
+
+He also uses **OnionShare** and **SecureDrop** to securely send documents to journalists who are helping expose these human rights violations.
+
+All of this software uses Tor to help protect Jelani’s privacy.
+
+### Human rights activists like Jelani are fighting for justice in their communities, and Tor helps power their resistance.
+
+---
+
+# 4. TOR FOR ANTI-CENSORSHIP
+
+### Build bridges not walls
+
+Jean was traveling for the first time to a country far from his family.
+
+After arriving at a hotel, he opened his laptop.
+
+He was so exhausted that when the message "Connection has timed out" first appeared on his web browser, he thought it was due to his own error.
+
+But after trying again and again, he realized that his email provider, a news website, and many apps were unavailable.
+
+He had heard that this country censors the internet and wondered if that was happening.
+How could he contact his family from behind this impenetrable wall?
+After doing some web searches, he found a forum and read about VPNs, private services that allow you to connect to another uncensored network.
+
+Jean spent half an hour trying to figure out which cheap VPN was best.
+
+He chose one and for a moment it seemed to work, but after five minutes the connection went offline and the VPN would no longer connect.
+
+Jean kept reading to find other options and learned about Tor Browser and how it can circumvent censorship.
+
+He found an official website mirror to download the program.
+
+When he opened **Tor Browser**, he followed the prompts for censored users and connected to a bridge which allowed him to access the internet again.
+
+With Tor Browser, Jean can browse freely and privately and contact his family.
+
+### Censored users all over the world rely on Tor Browser for a free, stable, and uncensored way to access the internet.
+
+---
+
+# 5. Shared Sections
+
+## What is Tor?
+
+Tor is free software and an open network that helps protect you from tracking, surveillance, and censorship online.
+Tor is created for free by a 501(c)3 U.S.-based nonprofit called the Tor Project.
+
+The easiest way to use Tor is Tor Browser.
+When you use Tor Browser, no one can see what websites you visit or where in the world you’re coming from.
+
+Other applications, like SecureDrop and OnionShare, use Tor to protect their users against surveillance and censorship.
+
+
+## 6. How does Tor work?
+
+Amal wants to visit Bekele’s website privately, so she opens Tor Browser.
+
+Tor Browser selects a random circuit of three relays, which are computers all over the world configured to route traffic over the Tor network.
+
+Tor Browser then encrypts her website request three times and sends it to the first Tor relay in her circuit.
+
+The first relay removes the first encryption layer but doesn't learn that the destination is Bekele’s website.
+
+The first relay learns only the next location in the circuit, which is the second relay.
+
+The second relay removes another encryption layer and forwards the web page request to the third relay.
+
+The third relay removes the last encryption layer and forwards the web page request to its destination, Bekele’s website, but it doesn't know the request comes from Amal.
+
+Bekele doesn't know that the website request came from Amal unless she tells him so.
+
+## 7. Who uses Tor?
+
+People all over the world use Tor to protect their privacy and access the web freely.
+
+Tor helps protect journalists, human rights defenders, domestic violence victims, academic researchers, and anyone experiencing tracking, censorship, or surveillance.
+
+## 6. Why trust Tor?
+
+Tor is designed for privacy. We don’t know who our users are, and we don't keep logs of user activity.
+
+Tor relay operators cannot reveal the true identity of Tor users.
+
+Continual peer review of Tor's source code by academic and open source communities ensures that there are no backdoors in Tor, and our social contract promises that we will never backdoor Tor.
+
+## 7. Join the Tor community
+
+Tor is made possible by a diverse set of users, developers, relay operators, and advocates from around the world.
+
+We need your help to make Tor more usable and secure for people everywhere.
+
+You can volunteer with Tor by writing code, running a relay, creating documentation, offering user support, or telling people in your community about Tor.
+
+The Tor community is governed by a code of conduct, and we outline our set of promises to the community in our social contract.
+
+Learn more about Tor by visiting our website, our wiki, finding us on IRC, joining one of our mailing lists, or signing up for Tor News at newsletter.torproject.org.
+
+
+## 8. Download Tor
+
+Tor for Desktop
+torproject.org/download
+
+TOR ON MOBILE
+### Android
+Tor Browser for Android is available from GooglePlay.
+
+### iOS
+Onion Browser, developed by M. Tigas, is the only browser we recommend for iOS.
+
diff --git a/uk.po b/uk.po
new file mode 100644
index 000000000..d20d81414
--- /dev/null
+++ b/uk.po
@@ -0,0 +1,162 @@
+# Tor Outreach Material 2019-2020
+
+# 1. TOR FOR PRIVACY
+
+### Privacy is a human right
+
+Like many of us, Aleisha spends most of her time online--connecting with friends, posting on social media, and browsing the web.
+
+But lately, she's noticed that advertisements related to her previous searches are following her around online.
+
+This feels so invasive that she does some research on online ads and learns that it's not just advertisers tracking her but also her ISP, analytics companies, social media platforms, and more.
+
+Aleisha decides she wants to find and use software that doesn't collect her data, doesn't track her, and doesn't tell other services anything private about her.
+
+She goes to a privacy training at a local hackerspace and learns about **Tor Browser**, the only web browser that allows her to browse anonymously.
+
+---
+
+# 2.TOR FOR FEMINISTS
+
+### The future is cyberfeminist
+
+Fernanda runs a women's collective focused on reproductive rights in Brazil, where abortion is illegal.
+
+Fernanda and her colleagues built a website with information about abortion access, birth control, and other resources for people seeking reproductive information.
+
+If this website was linked back to them, they could be arrested--or worse.
+
+To protect themselves, Fernanda and her colleagues created the website using Tor **onion services**. Onion services not only protect them from being discovered as the operators of the server but also help protect visitors to their website by requiring they use Tor Browser.
+
+In fact, Fernanda uses **Tor Browser** for all of her web browsing just to be on the safe side.
+
+She also uses a Tor-powered app called **OnionShare** to send files to other activists securely and privately.
+
+### Reproductive rights activists like Fernanda are fighting for fundamental freedoms, and Tor helps power their resistance.
+
+---
+
+# 3. TOR FOR HUMAN RIGHTS
+
+### Water is life
+
+Jelani lives in a small village which a wide river runs through.
+
+This river has provided water to his community since the days of his ancestors.
+
+But today, Jelani’s river is threatened by powerful multinational companies drilling for oil in the region.
+
+Private security firms, paid for by these companies, use powerful surveillance mechanisms to monitor the online activities of Jelani and his neighbors in the village who are organizing to protect their sacred river.
+
+Jelani uses **Tor Browser** to prevent these companies from watching as he visits websites for international human rights protection and legal aid and writes blog posts about the resistance movement in his village.
+
+He also uses **OnionShare** and **SecureDrop** to securely send documents to journalists who are helping expose these human rights violations.
+
+All of this software uses Tor to help protect Jelani’s privacy.
+
+### Human rights activists like Jelani are fighting for justice in their communities, and Tor helps power their resistance.
+
+---
+
+# 4. TOR FOR ANTI-CENSORSHIP
+
+### Build bridges not walls
+
+Jean was traveling for the first time to a country far from his family.
+
+After arriving at a hotel, he opened his laptop.
+
+He was so exhausted that when the message "Connection has timed out" first appeared on his web browser, he thought it was due to his own error.
+
+But after trying again and again, he realized that his email provider, a news website, and many apps were unavailable.
+
+He had heard that this country censors the internet and wondered if that was happening.
+How could he contact his family from behind this impenetrable wall?
+After doing some web searches, he found a forum and read about VPNs, private services that allow you to connect to another uncensored network.
+
+Jean spent half an hour trying to figure out which cheap VPN was best.
+
+He chose one and for a moment it seemed to work, but after five minutes the connection went offline and the VPN would no longer connect.
+
+Jean kept reading to find other options and learned about Tor Browser and how it can circumvent censorship.
+
+He found an official website mirror to download the program.
+
+When he opened **Tor Browser**, he followed the prompts for censored users and connected to a bridge which allowed him to access the internet again.
+
+With Tor Browser, Jean can browse freely and privately and contact his family.
+
+### Censored users all over the world rely on Tor Browser for a free, stable, and uncensored way to access the internet.
+
+---
+
+# 5. Shared Sections
+
+## Що таке Tor?
+
+Tor is free software and an open network that helps protect you from tracking, surveillance, and censorship online.
+Tor is created for free by a 501(c)3 U.S.-based nonprofit called the Tor Project.
+
+The easiest way to use Tor is Tor Browser.
+When you use Tor Browser, no one can see what websites you visit or where in the world you’re coming from.
+
+Other applications, like SecureDrop and OnionShare, use Tor to protect their users against surveillance and censorship.
+
+
+## 6. How does Tor work?
+
+Amal wants to visit Bekele’s website privately, so she opens Tor Browser.
+
+Tor Browser selects a random circuit of three relays, which are computers all over the world configured to route traffic over the Tor network.
+
+Tor Browser then encrypts her website request three times and sends it to the first Tor relay in her circuit.
+
+The first relay removes the first encryption layer but doesn't learn that the destination is Bekele’s website.
+
+The first relay learns only the next location in the circuit, which is the second relay.
+
+The second relay removes another encryption layer and forwards the web page request to the third relay.
+
+The third relay removes the last encryption layer and forwards the web page request to its destination, Bekele’s website, but it doesn't know the request comes from Amal.
+
+Bekele doesn't know that the website request came from Amal unless she tells him so.
+
+## 7. Who uses Tor?
+
+People all over the world use Tor to protect their privacy and access the web freely.
+
+Tor helps protect journalists, human rights defenders, domestic violence victims, academic researchers, and anyone experiencing tracking, censorship, or surveillance.
+
+## 6. Why trust Tor?
+
+Tor is designed for privacy. We don’t know who our users are, and we don't keep logs of user activity.
+
+Tor relay operators cannot reveal the true identity of Tor users.
+
+Continual peer review of Tor's source code by academic and open source communities ensures that there are no backdoors in Tor, and our social contract promises that we will never backdoor Tor.
+
+## 7. Join the Tor community
+
+Tor is made possible by a diverse set of users, developers, relay operators, and advocates from around the world.
+
+We need your help to make Tor more usable and secure for people everywhere.
+
+You can volunteer with Tor by writing code, running a relay, creating documentation, offering user support, or telling people in your community about Tor.
+
+The Tor community is governed by a code of conduct, and we outline our set of promises to the community in our social contract.
+
+Learn more about Tor by visiting our website, our wiki, finding us on IRC, joining one of our mailing lists, or signing up for Tor News at newsletter.torproject.org.
+
+
+## 8. Download Tor
+
+Tor for Desktop
+torproject.org/download
+
+TOR ON MOBILE
+### Android
+Tor Browser for Android is available from GooglePlay.
+
+### iOS
+Onion Browser, developed by M. Tigas, is the only browser we recommend for iOS.
+
diff --git a/ur.po b/ur.po
new file mode 100644
index 000000000..6c8fce0dc
--- /dev/null
+++ b/ur.po
@@ -0,0 +1,162 @@
+# Tor Outreach Material 2019-2020
+
+# 1. TOR FOR PRIVACY
+
+### Privacy is a human right
+
+Like many of us, Aleisha spends most of her time online--connecting with friends, posting on social media, and browsing the web.
+
+But lately, she's noticed that advertisements related to her previous searches are following her around online.
+
+This feels so invasive that she does some research on online ads and learns that it's not just advertisers tracking her but also her ISP, analytics companies, social media platforms, and more.
+
+Aleisha decides she wants to find and use software that doesn't collect her data, doesn't track her, and doesn't tell other services anything private about her.
+
+She goes to a privacy training at a local hackerspace and learns about **Tor Browser**, the only web browser that allows her to browse anonymously.
+
+---
+
+# 2.TOR FOR FEMINISTS
+
+### The future is cyberfeminist
+
+Fernanda runs a women's collective focused on reproductive rights in Brazil, where abortion is illegal.
+
+Fernanda and her colleagues built a website with information about abortion access, birth control, and other resources for people seeking reproductive information.
+
+If this website was linked back to them, they could be arrested--or worse.
+
+To protect themselves, Fernanda and her colleagues created the website using Tor **onion services**. Onion services not only protect them from being discovered as the operators of the server but also help protect visitors to their website by requiring they use Tor Browser.
+
+In fact, Fernanda uses **Tor Browser** for all of her web browsing just to be on the safe side.
+
+She also uses a Tor-powered app called **OnionShare** to send files to other activists securely and privately.
+
+### Reproductive rights activists like Fernanda are fighting for fundamental freedoms, and Tor helps power their resistance.
+
+---
+
+# 3. TOR FOR HUMAN RIGHTS
+
+### Water is life
+
+Jelani lives in a small village which a wide river runs through.
+
+This river has provided water to his community since the days of his ancestors.
+
+But today, Jelani’s river is threatened by powerful multinational companies drilling for oil in the region.
+
+Private security firms, paid for by these companies, use powerful surveillance mechanisms to monitor the online activities of Jelani and his neighbors in the village who are organizing to protect their sacred river.
+
+Jelani uses **Tor Browser** to prevent these companies from watching as he visits websites for international human rights protection and legal aid and writes blog posts about the resistance movement in his village.
+
+He also uses **OnionShare** and **SecureDrop** to securely send documents to journalists who are helping expose these human rights violations.
+
+All of this software uses Tor to help protect Jelani’s privacy.
+
+### Human rights activists like Jelani are fighting for justice in their communities, and Tor helps power their resistance.
+
+---
+
+# 4. TOR FOR ANTI-CENSORSHIP
+
+### Build bridges not walls
+
+Jean was traveling for the first time to a country far from his family.
+
+After arriving at a hotel, he opened his laptop.
+
+He was so exhausted that when the message "Connection has timed out" first appeared on his web browser, he thought it was due to his own error.
+
+But after trying again and again, he realized that his email provider, a news website, and many apps were unavailable.
+
+He had heard that this country censors the internet and wondered if that was happening.
+How could he contact his family from behind this impenetrable wall?
+After doing some web searches, he found a forum and read about VPNs, private services that allow you to connect to another uncensored network.
+
+Jean spent half an hour trying to figure out which cheap VPN was best.
+
+He chose one and for a moment it seemed to work, but after five minutes the connection went offline and the VPN would no longer connect.
+
+Jean kept reading to find other options and learned about Tor Browser and how it can circumvent censorship.
+
+He found an official website mirror to download the program.
+
+When he opened **Tor Browser**, he followed the prompts for censored users and connected to a bridge which allowed him to access the internet again.
+
+With Tor Browser, Jean can browse freely and privately and contact his family.
+
+### Censored users all over the world rely on Tor Browser for a free, stable, and uncensored way to access the internet.
+
+---
+
+# 5. Shared Sections
+
+## What is Tor?
+
+Tor is free software and an open network that helps protect you from tracking, surveillance, and censorship online.
+Tor is created for free by a 501(c)3 U.S.-based nonprofit called the Tor Project.
+
+The easiest way to use Tor is Tor Browser.
+When you use Tor Browser, no one can see what websites you visit or where in the world you’re coming from.
+
+Other applications, like SecureDrop and OnionShare, use Tor to protect their users against surveillance and censorship.
+
+
+## 6. How does Tor work?
+
+Amal wants to visit Bekele’s website privately, so she opens Tor Browser.
+
+Tor Browser selects a random circuit of three relays, which are computers all over the world configured to route traffic over the Tor network.
+
+Tor Browser then encrypts her website request three times and sends it to the first Tor relay in her circuit.
+
+The first relay removes the first encryption layer but doesn't learn that the destination is Bekele’s website.
+
+The first relay learns only the next location in the circuit, which is the second relay.
+
+The second relay removes another encryption layer and forwards the web page request to the third relay.
+
+The third relay removes the last encryption layer and forwards the web page request to its destination, Bekele’s website, but it doesn't know the request comes from Amal.
+
+Bekele doesn't know that the website request came from Amal unless she tells him so.
+
+## 7. Who uses Tor?
+
+People all over the world use Tor to protect their privacy and access the web freely.
+
+Tor helps protect journalists, human rights defenders, domestic violence victims, academic researchers, and anyone experiencing tracking, censorship, or surveillance.
+
+## 6. Why trust Tor?
+
+Tor is designed for privacy. We don’t know who our users are, and we don't keep logs of user activity.
+
+Tor relay operators cannot reveal the true identity of Tor users.
+
+Continual peer review of Tor's source code by academic and open source communities ensures that there are no backdoors in Tor, and our social contract promises that we will never backdoor Tor.
+
+## 7. Join the Tor community
+
+Tor is made possible by a diverse set of users, developers, relay operators, and advocates from around the world.
+
+We need your help to make Tor more usable and secure for people everywhere.
+
+You can volunteer with Tor by writing code, running a relay, creating documentation, offering user support, or telling people in your community about Tor.
+
+The Tor community is governed by a code of conduct, and we outline our set of promises to the community in our social contract.
+
+Learn more about Tor by visiting our website, our wiki, finding us on IRC, joining one of our mailing lists, or signing up for Tor News at newsletter.torproject.org.
+
+
+## 8. Download Tor
+
+Tor for Desktop
+torproject.org/download
+
+TOR ON MOBILE
+### Android
+Tor Browser for Android is available from GooglePlay.
+
+### iOS
+Onion Browser, developed by M. Tigas, is the only browser we recommend for iOS.
+
diff --git a/uz.po b/uz.po
new file mode 100644
index 000000000..6c8fce0dc
--- /dev/null
+++ b/uz.po
@@ -0,0 +1,162 @@
+# Tor Outreach Material 2019-2020
+
+# 1. TOR FOR PRIVACY
+
+### Privacy is a human right
+
+Like many of us, Aleisha spends most of her time online--connecting with friends, posting on social media, and browsing the web.
+
+But lately, she's noticed that advertisements related to her previous searches are following her around online.
+
+This feels so invasive that she does some research on online ads and learns that it's not just advertisers tracking her but also her ISP, analytics companies, social media platforms, and more.
+
+Aleisha decides she wants to find and use software that doesn't collect her data, doesn't track her, and doesn't tell other services anything private about her.
+
+She goes to a privacy training at a local hackerspace and learns about **Tor Browser**, the only web browser that allows her to browse anonymously.
+
+---
+
+# 2.TOR FOR FEMINISTS
+
+### The future is cyberfeminist
+
+Fernanda runs a women's collective focused on reproductive rights in Brazil, where abortion is illegal.
+
+Fernanda and her colleagues built a website with information about abortion access, birth control, and other resources for people seeking reproductive information.
+
+If this website was linked back to them, they could be arrested--or worse.
+
+To protect themselves, Fernanda and her colleagues created the website using Tor **onion services**. Onion services not only protect them from being discovered as the operators of the server but also help protect visitors to their website by requiring they use Tor Browser.
+
+In fact, Fernanda uses **Tor Browser** for all of her web browsing just to be on the safe side.
+
+She also uses a Tor-powered app called **OnionShare** to send files to other activists securely and privately.
+
+### Reproductive rights activists like Fernanda are fighting for fundamental freedoms, and Tor helps power their resistance.
+
+---
+
+# 3. TOR FOR HUMAN RIGHTS
+
+### Water is life
+
+Jelani lives in a small village which a wide river runs through.
+
+This river has provided water to his community since the days of his ancestors.
+
+But today, Jelani’s river is threatened by powerful multinational companies drilling for oil in the region.
+
+Private security firms, paid for by these companies, use powerful surveillance mechanisms to monitor the online activities of Jelani and his neighbors in the village who are organizing to protect their sacred river.
+
+Jelani uses **Tor Browser** to prevent these companies from watching as he visits websites for international human rights protection and legal aid and writes blog posts about the resistance movement in his village.
+
+He also uses **OnionShare** and **SecureDrop** to securely send documents to journalists who are helping expose these human rights violations.
+
+All of this software uses Tor to help protect Jelani’s privacy.
+
+### Human rights activists like Jelani are fighting for justice in their communities, and Tor helps power their resistance.
+
+---
+
+# 4. TOR FOR ANTI-CENSORSHIP
+
+### Build bridges not walls
+
+Jean was traveling for the first time to a country far from his family.
+
+After arriving at a hotel, he opened his laptop.
+
+He was so exhausted that when the message "Connection has timed out" first appeared on his web browser, he thought it was due to his own error.
+
+But after trying again and again, he realized that his email provider, a news website, and many apps were unavailable.
+
+He had heard that this country censors the internet and wondered if that was happening.
+How could he contact his family from behind this impenetrable wall?
+After doing some web searches, he found a forum and read about VPNs, private services that allow you to connect to another uncensored network.
+
+Jean spent half an hour trying to figure out which cheap VPN was best.
+
+He chose one and for a moment it seemed to work, but after five minutes the connection went offline and the VPN would no longer connect.
+
+Jean kept reading to find other options and learned about Tor Browser and how it can circumvent censorship.
+
+He found an official website mirror to download the program.
+
+When he opened **Tor Browser**, he followed the prompts for censored users and connected to a bridge which allowed him to access the internet again.
+
+With Tor Browser, Jean can browse freely and privately and contact his family.
+
+### Censored users all over the world rely on Tor Browser for a free, stable, and uncensored way to access the internet.
+
+---
+
+# 5. Shared Sections
+
+## What is Tor?
+
+Tor is free software and an open network that helps protect you from tracking, surveillance, and censorship online.
+Tor is created for free by a 501(c)3 U.S.-based nonprofit called the Tor Project.
+
+The easiest way to use Tor is Tor Browser.
+When you use Tor Browser, no one can see what websites you visit or where in the world you’re coming from.
+
+Other applications, like SecureDrop and OnionShare, use Tor to protect their users against surveillance and censorship.
+
+
+## 6. How does Tor work?
+
+Amal wants to visit Bekele’s website privately, so she opens Tor Browser.
+
+Tor Browser selects a random circuit of three relays, which are computers all over the world configured to route traffic over the Tor network.
+
+Tor Browser then encrypts her website request three times and sends it to the first Tor relay in her circuit.
+
+The first relay removes the first encryption layer but doesn't learn that the destination is Bekele’s website.
+
+The first relay learns only the next location in the circuit, which is the second relay.
+
+The second relay removes another encryption layer and forwards the web page request to the third relay.
+
+The third relay removes the last encryption layer and forwards the web page request to its destination, Bekele’s website, but it doesn't know the request comes from Amal.
+
+Bekele doesn't know that the website request came from Amal unless she tells him so.
+
+## 7. Who uses Tor?
+
+People all over the world use Tor to protect their privacy and access the web freely.
+
+Tor helps protect journalists, human rights defenders, domestic violence victims, academic researchers, and anyone experiencing tracking, censorship, or surveillance.
+
+## 6. Why trust Tor?
+
+Tor is designed for privacy. We don’t know who our users are, and we don't keep logs of user activity.
+
+Tor relay operators cannot reveal the true identity of Tor users.
+
+Continual peer review of Tor's source code by academic and open source communities ensures that there are no backdoors in Tor, and our social contract promises that we will never backdoor Tor.
+
+## 7. Join the Tor community
+
+Tor is made possible by a diverse set of users, developers, relay operators, and advocates from around the world.
+
+We need your help to make Tor more usable and secure for people everywhere.
+
+You can volunteer with Tor by writing code, running a relay, creating documentation, offering user support, or telling people in your community about Tor.
+
+The Tor community is governed by a code of conduct, and we outline our set of promises to the community in our social contract.
+
+Learn more about Tor by visiting our website, our wiki, finding us on IRC, joining one of our mailing lists, or signing up for Tor News at newsletter.torproject.org.
+
+
+## 8. Download Tor
+
+Tor for Desktop
+torproject.org/download
+
+TOR ON MOBILE
+### Android
+Tor Browser for Android is available from GooglePlay.
+
+### iOS
+Onion Browser, developed by M. Tigas, is the only browser we recommend for iOS.
+
diff --git a/vi.po b/vi.po
new file mode 100644
index 000000000..e4474d649
--- /dev/null
+++ b/vi.po
@@ -0,0 +1,162 @@
+# Tor Outreach Material 2019-2020
+
+# 1. TOR FOR PRIVACY
+
+### Privacy is a human right
+
+Like many of us, Aleisha spends most of her time online--connecting with friends, posting on social media, and browsing the web.
+
+But lately, she's noticed that advertisements related to her previous searches are following her around online.
+
+This feels so invasive that she does some research on online ads and learns that it's not just advertisers tracking her but also her ISP, analytics companies, social media platforms, and more.
+
+Aleisha decides she wants to find and use software that doesn't collect her data, doesn't track her, and doesn't tell other services anything private about her.
+
+She goes to a privacy training at a local hackerspace and learns about **Tor Browser**, the only web browser that allows her to browse anonymously.
+
+---
+
+# 2.TOR FOR FEMINISTS
+
+### The future is cyberfeminist
+
+Fernanda runs a women's collective focused on reproductive rights in Brazil, where abortion is illegal.
+
+Fernanda and her colleagues built a website with information about abortion access, birth control, and other resources for people seeking reproductive information.
+
+If this website was linked back to them, they could be arrested--or worse.
+
+To protect themselves, Fernanda and her colleagues created the website using Tor **onion services**. Onion services not only protect them from being discovered as the operators of the server but also help protect visitors to their website by requiring they use Tor Browser.
+
+In fact, Fernanda uses **Tor Browser** for all of her web browsing just to be on the safe side.
+
+She also uses a Tor-powered app called **OnionShare** to send files to other activists securely and privately.
+
+### Reproductive rights activists like Fernanda are fighting for fundamental freedoms, and Tor helps power their resistance.
+
+---
+
+# 3. TOR FOR HUMAN RIGHTS
+
+### Water is life
+
+Jelani lives in a small village which a wide river runs through.
+
+This river has provided water to his community since the days of his ancestors.
+
+But today, Jelani’s river is threatened by powerful multinational companies drilling for oil in the region.
+
+Private security firms, paid for by these companies, use powerful surveillance mechanisms to monitor the online activities of Jelani and his neighbors in the village who are organizing to protect their sacred river.
+
+Jelani uses **Tor Browser** to prevent these companies from watching as he visits websites for international human rights protection and legal aid and writes blog posts about the resistance movement in his village.
+
+He also uses **OnionShare** and **SecureDrop** to securely send documents to journalists who are helping expose these human rights violations.
+
+All of this software uses Tor to help protect Jelani’s privacy.
+
+### Human rights activists like Jelani are fighting for justice in their communities, and Tor helps power their resistance.
+
+---
+
+# 4. TOR FOR ANTI-CENSORSHIP
+
+### Build bridges not walls
+
+Jean was traveling for the first time to a country far from his family.
+
+After arriving at a hotel, he opened his laptop.
+
+He was so exhausted that when the message "Connection has timed out" first appeared on his web browser, he thought it was due to his own error.
+
+But after trying again and again, he realized that his email provider, a news website, and many apps were unavailable.
+
+He had heard that this country censors the internet and wondered if that was happening.
+How could he contact his family from behind this impenetrable wall?
+After doing some web searches, he found a forum and read about VPNs, private services that allow you to connect to another uncensored network.
+
+Jean spent half an hour trying to figure out which cheap VPN was best.
+
+He chose one and for a moment it seemed to work, but after five minutes the connection went offline and the VPN would no longer connect.
+
+Jean kept reading to find other options and learned about Tor Browser and how it can circumvent censorship.
+
+He found an official website mirror to download the program.
+
+When he opened **Tor Browser**, he followed the prompts for censored users and connected to a bridge which allowed him to access the internet again.
+
+With Tor Browser, Jean can browse freely and privately and contact his family.
+
+### Censored users all over the world rely on Tor Browser for a free, stable, and uncensored way to access the internet.
+
+---
+
+# 5. Shared Sections
+
+## Tor là gì?
+
+Tor is free software and an open network that helps protect you from tracking, surveillance, and censorship online.
+Tor is created for free by a 501(c)3 U.S.-based nonprofit called the Tor Project.
+
+The easiest way to use Tor is Tor Browser.
+When you use Tor Browser, no one can see what websites you visit or where in the world you’re coming from.
+
+Other applications, like SecureDrop and OnionShare, use Tor to protect their users against surveillance and censorship.
+
+
+## 6. How does Tor work?
+
+Amal wants to visit Bekele’s website privately, so she opens Tor Browser.
+
+Tor Browser selects a random circuit of three relays, which are computers all over the world configured to route traffic over the Tor network.
+
+Tor Browser then encrypts her website request three times and sends it to the first Tor relay in her circuit.
+
+The first relay removes the first encryption layer but doesn't learn that the destination is Bekele’s website.
+
+The first relay learns only the next location in the circuit, which is the second relay.
+
+The second relay removes another encryption layer and forwards the web page request to the third relay.
+
+The third relay removes the last encryption layer and forwards the web page request to its destination, Bekele’s website, but it doesn't know the request comes from Amal.
+
+Bekele doesn't know that the website request came from Amal unless she tells him so.
+
+## 7. Who uses Tor?
+
+People all over the world use Tor to protect their privacy and access the web freely.
+
+Tor helps protect journalists, human rights defenders, domestic violence victims, academic researchers, and anyone experiencing tracking, censorship, or surveillance.
+
+## 6. Why trust Tor?
+
+Tor is designed for privacy. We don’t know who our users are, and we don't keep logs of user activity.
+
+Tor relay operators cannot reveal the true identity of Tor users.
+
+Continual peer review of Tor's source code by academic and open source communities ensures that there are no backdoors in Tor, and our social contract promises that we will never backdoor Tor.
+
+## 7. Join the Tor community
+
+Tor is made possible by a diverse set of users, developers, relay operators, and advocates from around the world.
+
+We need your help to make Tor more usable and secure for people everywhere.
+
+You can volunteer with Tor by writing code, running a relay, creating documentation, offering user support, or telling people in your community about Tor.
+
+The Tor community is governed by a code of conduct, and we outline our set of promises to the community in our social contract.
+
+Learn more about Tor by visiting our website, our wiki, finding us on IRC, joining one of our mailing lists, or signing up for Tor News at newsletter.torproject.org.
+
+
+## 8. Download Tor
+
+Tor for Desktop
+torproject.org/download
+
+TOR ON MOBILE
+### Android
+Tor Browser for Android is available from GooglePlay.
+
+### iOS
+Onion Browser, developed by M. Tigas, is the only browser we recommend for iOS.
+
diff --git a/vls.po b/vls.po
new file mode 100644
index 000000000..6c8fce0dc
--- /dev/null
+++ b/vls.po
@@ -0,0 +1,162 @@
+# Tor Outreach Material 2019-2020
+
+# 1. TOR FOR PRIVACY
+
+### Privacy is a human right
+
+Like many of us, Aleisha spends most of her time online--connecting with friends, posting on social media, and browsing the web.
+
+But lately, she's noticed that advertisements related to her previous searches are following her around online.
+
+This feels so invasive that she does some research on online ads and learns that it's not just advertisers tracking her but also her ISP, analytics companies, social media platforms, and more.
+
+Aleisha decides she wants to find and use software that doesn't collect her data, doesn't track her, and doesn't tell other services anything private about her.
+
+She goes to a privacy training at a local hackerspace and learns about **Tor Browser**, the only web browser that allows her to browse anonymously.
+
+---
+
+# 2.TOR FOR FEMINISTS
+
+### The future is cyberfeminist
+
+Fernanda runs a women's collective focused on reproductive rights in Brazil, where abortion is illegal.
+
+Fernanda and her colleagues built a website with information about abortion access, birth control, and other resources for people seeking reproductive information.
+
+If this website was linked back to them, they could be arrested--or worse.
+
+To protect themselves, Fernanda and her colleagues created the website using Tor **onion services**. Onion services not only protect them from being discovered as the operators of the server but also help protect visitors to their website by requiring they use Tor Browser.
+
+In fact, Fernanda uses **Tor Browser** for all of her web browsing just to be on the safe side.
+
+She also uses a Tor-powered app called **OnionShare** to send files to other activists securely and privately.
+
+### Reproductive rights activists like Fernanda are fighting for fundamental freedoms, and Tor helps power their resistance.
+
+---
+
+# 3. TOR FOR HUMAN RIGHTS
+
+### Water is life
+
+Jelani lives in a small village which a wide river runs through.
+
+This river has provided water to his community since the days of his ancestors.
+
+But today, Jelani’s river is threatened by powerful multinational companies drilling for oil in the region.
+
+Private security firms, paid for by these companies, use powerful surveillance mechanisms to monitor the online activities of Jelani and his neighbors in the village who are organizing to protect their sacred river.
+
+Jelani uses **Tor Browser** to prevent these companies from watching as he visits websites for international human rights protection and legal aid and writes blog posts about the resistance movement in his village.
+
+He also uses **OnionShare** and **SecureDrop** to securely send documents to journalists who are helping expose these human rights violations.
+
+All of this software uses Tor to help protect Jelani’s privacy.
+
+### Human rights activists like Jelani are fighting for justice in their communities, and Tor helps power their resistance.
+
+---
+
+# 4. TOR FOR ANTI-CENSORSHIP
+
+### Build bridges not walls
+
+Jean was traveling for the first time to a country far from his family.
+
+After arriving at a hotel, he opened his laptop.
+
+He was so exhausted that when the message "Connection has timed out" first appeared on his web browser, he thought it was due to his own error.
+
+But after trying again and again, he realized that his email provider, a news website, and many apps were unavailable.
+
+He had heard that this country censors the internet and wondered if that was happening.
+How could he contact his family from behind this impenetrable wall?
+After doing some web searches, he found a forum and read about VPNs, private services that allow you to connect to another uncensored network.
+
+Jean spent half an hour trying to figure out which cheap VPN was best.
+
+He chose one and for a moment it seemed to work, but after five minutes the connection went offline and the VPN would no longer connect.
+
+Jean kept reading to find other options and learned about Tor Browser and how it can circumvent censorship.
+
+He found an official website mirror to download the program.
+
+When he opened **Tor Browser**, he followed the prompts for censored users and connected to a bridge which allowed him to access the internet again.
+
+With Tor Browser, Jean can browse freely and privately and contact his family.
+
+### Censored users all over the world rely on Tor Browser for a free, stable, and uncensored way to access the internet.
+
+---
+
+# 5. Shared Sections
+
+## What is Tor?
+
+Tor is free software and an open network that helps protect you from tracking, surveillance, and censorship online.
+Tor is created for free by a 501(c)3 U.S.-based nonprofit called the Tor Project.
+
+The easiest way to use Tor is Tor Browser.
+When you use Tor Browser, no one can see what websites you visit or where in the world you’re coming from.
+
+Other applications, like SecureDrop and OnionShare, use Tor to protect their users against surveillance and censorship.
+
+
+## 6. How does Tor work?
+
+Amal wants to visit Bekele’s website privately, so she opens Tor Browser.
+
+Tor Browser selects a random circuit of three relays, which are computers all over the world configured to route traffic over the Tor network.
+
+Tor Browser then encrypts her website request three times and sends it to the first Tor relay in her circuit.
+
+The first relay removes the first encryption layer but doesn't learn that the destination is Bekele’s website.
+
+The first relay learns only the next location in the circuit, which is the second relay.
+
+The second relay removes another encryption layer and forwards the web page request to the third relay.
+
+The third relay removes the last encryption layer and forwards the web page request to its destination, Bekele’s website, but it doesn't know the request comes from Amal.
+
+Bekele doesn't know that the website request came from Amal unless she tells him so.
+
+## 7. Who uses Tor?
+
+People all over the world use Tor to protect their privacy and access the web freely.
+
+Tor helps protect journalists, human rights defenders, domestic violence victims, academic researchers, and anyone experiencing tracking, censorship, or surveillance.
+
+## 6. Why trust Tor?
+
+Tor is designed for privacy. We don’t know who our users are, and we don't keep logs of user activity.
+
+Tor relay operators cannot reveal the true identity of Tor users.
+
+Continual peer review of Tor's source code by academic and open source communities ensures that there are no backdoors in Tor, and our social contract promises that we will never backdoor Tor.
+
+## 7. Join the Tor community
+
+Tor is made possible by a diverse set of users, developers, relay operators, and advocates from around the world.
+
+We need your help to make Tor more usable and secure for people everywhere.
+
+You can volunteer with Tor by writing code, running a relay, creating documentation, offering user support, or telling people in your community about Tor.
+
+The Tor community is governed by a code of conduct, and we outline our set of promises to the community in our social contract.
+
+Learn more about Tor by visiting our website, our wiki, finding us on IRC, joining one of our mailing lists, or signing up for Tor News at newsletter.torproject.org.
+
+
+## 8. Download Tor
+
+Tor for Desktop
+torproject.org/download
+
+TOR ON MOBILE
+### Android
+Tor Browser for Android is available from GooglePlay.
+
+### iOS
+Onion Browser, developed by M. Tigas, is the only browser we recommend for iOS.
+
diff --git a/yo.po b/yo.po
new file mode 100644
index 000000000..6c8fce0dc
--- /dev/null
+++ b/yo.po
@@ -0,0 +1,162 @@
+# Tor Outreach Material 2019-2020
+
+# 1. TOR FOR PRIVACY
+
+### Privacy is a human right
+
+Like many of us, Aleisha spends most of her time online--connecting with friends, posting on social media, and browsing the web.
+
+But lately, she's noticed that advertisements related to her previous searches are following her around online.
+
+This feels so invasive that she does some research on online ads and learns that it's not just advertisers tracking her but also her ISP, analytics companies, social media platforms, and more.
+
+Aleisha decides she wants to find and use software that doesn't collect her data, doesn't track her, and doesn't tell other services anything private about her.
+
+She goes to a privacy training at a local hackerspace and learns about **Tor Browser**, the only web browser that allows her to browse anonymously.
+
+---
+
+# 2.TOR FOR FEMINISTS
+
+### The future is cyberfeminist
+
+Fernanda runs a women's collective focused on reproductive rights in Brazil, where abortion is illegal.
+
+Fernanda and her colleagues built a website with information about abortion access, birth control, and other resources for people seeking reproductive information.
+
+If this website was linked back to them, they could be arrested--or worse.
+
+To protect themselves, Fernanda and her colleagues created the website using Tor **onion services**. Onion services not only protect them from being discovered as the operators of the server but also help protect visitors to their website by requiring they use Tor Browser.
+
+In fact, Fernanda uses **Tor Browser** for all of her web browsing just to be on the safe side.
+
+She also uses a Tor-powered app called **OnionShare** to send files to other activists securely and privately.
+
+### Reproductive rights activists like Fernanda are fighting for fundamental freedoms, and Tor helps power their resistance.
+
+---
+
+# 3. TOR FOR HUMAN RIGHTS
+
+### Water is life
+
+Jelani lives in a small village which a wide river runs through.
+
+This river has provided water to his community since the days of his ancestors.
+
+But today, Jelani’s river is threatened by powerful multinational companies drilling for oil in the region.
+
+Private security firms, paid for by these companies, use powerful surveillance mechanisms to monitor the online activities of Jelani and his neighbors in the village who are organizing to protect their sacred river.
+
+Jelani uses **Tor Browser** to prevent these companies from watching as he visits websites for international human rights protection and legal aid and writes blog posts about the resistance movement in his village.
+
+He also uses **OnionShare** and **SecureDrop** to securely send documents to journalists who are helping expose these human rights violations.
+
+All of this software uses Tor to help protect Jelani’s privacy.
+
+### Human rights activists like Jelani are fighting for justice in their communities, and Tor helps power their resistance.
+
+---
+
+# 4. TOR FOR ANTI-CENSORSHIP
+
+### Build bridges not walls
+
+Jean was traveling for the first time to a country far from his family.
+
+After arriving at a hotel, he opened his laptop.
+
+He was so exhausted that when the message "Connection has timed out" first appeared on his web browser, he thought it was due to his own error.
+
+But after trying again and again, he realized that his email provider, a news website, and many apps were unavailable.
+
+He had heard that this country censors the internet and wondered if that was happening.
+How could he contact his family from behind this impenetrable wall?
+After doing some web searches, he found a forum and read about VPNs, private services that allow you to connect to another uncensored network.
+
+Jean spent half an hour trying to figure out which cheap VPN was best.
+
+He chose one and for a moment it seemed to work, but after five minutes the connection went offline and the VPN would no longer connect.
+
+Jean kept reading to find other options and learned about Tor Browser and how it can circumvent censorship.
+
+He found an official website mirror to download the program.
+
+When he opened **Tor Browser**, he followed the prompts for censored users and connected to a bridge which allowed him to access the internet again.
+
+With Tor Browser, Jean can browse freely and privately and contact his family.
+
+### Censored users all over the world rely on Tor Browser for a free, stable, and uncensored way to access the internet.
+
+---
+
+# 5. Shared Sections
+
+## What is Tor?
+
+Tor is free software and an open network that helps protect you from tracking, surveillance, and censorship online.
+Tor is created for free by a 501(c)3 U.S.-based nonprofit called the Tor Project.
+
+The easiest way to use Tor is Tor Browser.
+When you use Tor Browser, no one can see what websites you visit or where in the world you’re coming from.
+
+Other applications, like SecureDrop and OnionShare, use Tor to protect their users against surveillance and censorship.
+
+
+## 6. How does Tor work?
+
+Amal wants to visit Bekele’s website privately, so she opens Tor Browser.
+
+Tor Browser selects a random circuit of three relays, which are computers all over the world configured to route traffic over the Tor network.
+
+Tor Browser then encrypts her website request three times and sends it to the first Tor relay in her circuit.
+
+The first relay removes the first encryption layer but doesn't learn that the destination is Bekele’s website.
+
+The first relay learns only the next location in the circuit, which is the second relay.
+
+The second relay removes another encryption layer and forwards the web page request to the third relay.
+
+The third relay removes the last encryption layer and forwards the web page request to its destination, Bekele’s website, but it doesn't know the request comes from Amal.
+
+Bekele doesn't know that the website request came from Amal unless she tells him so.
+
+## 7. Who uses Tor?
+
+People all over the world use Tor to protect their privacy and access the web freely.
+
+Tor helps protect journalists, human rights defenders, domestic violence victims, academic researchers, and anyone experiencing tracking, censorship, or surveillance.
+
+## 6. Why trust Tor?
+
+Tor is designed for privacy. We don’t know who our users are, and we don't keep logs of user activity.
+
+Tor relay operators cannot reveal the true identity of Tor users.
+
+Continual peer review of Tor's source code by academic and open source communities ensures that there are no backdoors in Tor, and our social contract promises that we will never backdoor Tor.
+
+## 7. Join the Tor community
+
+Tor is made possible by a diverse set of users, developers, relay operators, and advocates from around the world.
+
+We need your help to make Tor more usable and secure for people everywhere.
+
+You can volunteer with Tor by writing code, running a relay, creating documentation, offering user support, or telling people in your community about Tor.
+
+The Tor community is governed by a code of conduct, and we outline our set of promises to the community in our social contract.
+
+Learn more about Tor by visiting our website, our wiki, finding us on IRC, joining one of our mailing lists, or signing up for Tor News at newsletter.torproject.org.
+
+
+## 8. Download Tor
+
+Tor for Desktop
+torproject.org/download
+
+TOR ON MOBILE
+### Android
+Tor Browser for Android is available from GooglePlay.
+
+### iOS
+Onion Browser, developed by M. Tigas, is the only browser we recommend for iOS.
+
diff --git a/zh_CN.po b/zh_CN.po
new file mode 100644
index 000000000..507a23dee
--- /dev/null
+++ b/zh_CN.po
@@ -0,0 +1,162 @@
+# Tor Outreach Material 2019-2020
+
+# 1. TOR FOR PRIVACY
+
+### Privacy is a human right
+
+Like many of us, Aleisha spends most of her time online--connecting with friends, posting on social media, and browsing the web.
+
+But lately, she's noticed that advertisements related to her previous searches are following her around online.
+
+This feels so invasive that she does some research on online ads and learns that it's not just advertisers tracking her but also her ISP, analytics companies, social media platforms, and more.
+
+Aleisha decides she wants to find and use software that doesn't collect her data, doesn't track her, and doesn't tell other services anything private about her.
+
+She goes to a privacy training at a local hackerspace and learns about **Tor Browser**, the only web browser that allows her to browse anonymously.
+
+---
+
+# 2.TOR FOR FEMINISTS
+
+### The future is cyberfeminist
+
+Fernanda runs a women's collective focused on reproductive rights in Brazil, where abortion is illegal.
+
+Fernanda and her colleagues built a website with information about abortion access, birth control, and other resources for people seeking reproductive information.
+
+If this website was linked back to them, they could be arrested--or worse.
+
+To protect themselves, Fernanda and her colleagues created the website using Tor **onion services**. Onion services not only protect them from being discovered as the operators of the server but also help protect visitors to their website by requiring they use Tor Browser.
+
+In fact, Fernanda uses **Tor Browser** for all of her web browsing just to be on the safe side.
+
+She also uses a Tor-powered app called **OnionShare** to send files to other activists securely and privately.
+
+### Reproductive rights activists like Fernanda are fighting for fundamental freedoms, and Tor helps power their resistance.
+
+---
+
+# 3. TOR FOR HUMAN RIGHTS
+
+### 水是生命之源
+
+Jelani lives in a small village which a wide river runs through.
+
+This river has provided water to his community since the days of his ancestors.
+
+But today, Jelani’s river is threatened by powerful multinational companies drilling for oil in the region.
+
+Private security firms, paid for by these companies, use powerful surveillance mechanisms to monitor the online activities of Jelani and his neighbors in the village who are organizing to protect their sacred river.
+
+Jelani uses **Tor Browser** to prevent these companies from watching as he visits websites for international human rights protection and legal aid and writes blog posts about the resistance movement in his village.
+
+He also uses **OnionShare** and **SecureDrop** to securely send documents to journalists who are helping expose these human rights violations.
+
+All of this software uses Tor to help protect Jelani’s privacy.
+
+### Human rights activists like Jelani are fighting for justice in their communities, and Tor helps power their resistance.
+
+---
+
+# 4. TOR FOR ANTI-CENSORSHIP
+
+### Build bridges not walls
+
+Jean was traveling for the first time to a country far from his family.
+
+After arriving at a hotel, he opened his laptop.
+
+He was so exhausted that when the message "Connection has timed out" first appeared on his web browser, he thought it was due to his own error.
+
+But after trying again and again, he realized that his email provider, a news website, and many apps were unavailable.
+
+He had heard that this country censors the internet and wondered if that was happening.
+How could he contact his family from behind this impenetrable wall?
+After doing some web searches, he found a forum and read about VPNs, private services that allow you to connect to another uncensored network.
+
+Jean spent half an hour trying to figure out which cheap VPN was best.
+
+He chose one and for a moment it seemed to work, but after five minutes the connection went offline and the VPN would no longer connect.
+
+Jean kept reading to find other options and learned about Tor Browser and how it can circumvent censorship.
+
+He found an official website mirror to download the program.
+
+When he opened **Tor Browser**, he followed the prompts for censored users and connected to a bridge which allowed him to access the internet again.
+
+With Tor Browser, Jean can browse freely and privately and contact his family.
+
+### Censored users all over the world rely on Tor Browser for a free, stable, and uncensored way to access the internet.
+
+---
+
+# 5. Shared Sections
+
+## 什么是 Tor?
+
+Tor is free software and an open network that helps protect you from tracking, surveillance, and censorship online.
+Tor is created for free by a 501(c)3 U.S.-based nonprofit called the Tor Project.
+
+The easiest way to use Tor is Tor Browser.
+When you use Tor Browser, no one can see what websites you visit or where in the world you’re coming from.
+
+Other applications, like SecureDrop and OnionShare, use Tor to protect their users against surveillance and censorship.
+
+
+## 6. How does Tor work?
+
+Amal wants to visit Bekele’s website privately, so she opens Tor Browser.
+
+Tor Browser selects a random circuit of three relays, which are computers all over the world configured to route traffic over the Tor network.
+
+Tor Browser then encrypts her website request three times and sends it to the first Tor relay in her circuit.
+
+The first relay removes the first encryption layer but doesn't learn that the destination is Bekele’s website.
+
+The first relay learns only the next location in the circuit, which is the second relay.
+
+The second relay removes another encryption layer and forwards the web page request to the third relay.
+
+The third relay removes the last encryption layer and forwards the web page request to its destination, Bekele’s website, but it doesn't know the request comes from Amal.
+
+Bekele doesn't know that the website request came from Amal unless she tells him so.
+
+## 7. Who uses Tor?
+
+People all over the world use Tor to protect their privacy and access the web freely.
+
+Tor helps protect journalists, human rights defenders, domestic violence victims, academic researchers, and anyone experiencing tracking, censorship, or surveillance.
+
+## 6. Why trust Tor?
+
+Tor is designed for privacy. We don’t know who our users are, and we don't keep logs of user activity.
+
+Tor relay operators cannot reveal the true identity of Tor users.
+
+Continual peer review of Tor's source code by academic and open source communities ensures that there are no backdoors in Tor, and our social contract promises that we will never backdoor Tor.
+
+## 7. Join the Tor community
+
+Tor is made possible by a diverse set of users, developers, relay operators, and advocates from around the world.
+
+We need your help to make Tor more usable and secure for people everywhere.
+
+You can volunteer with Tor by writing code, running a relay, creating documentation, offering user support, or telling people in your community about Tor.
+
+The Tor community is governed by a code of conduct, and we outline our set of promises to the community in our social contract.
+
+Learn more about Tor by visiting our website, our wiki, finding us on IRC, joining one of our mailing lists, or signing up for Tor News at newsletter.torproject.org.
+
+
+## 8. Download Tor
+
+Tor for Desktop
+torproject.org/download
+
+TOR ON MOBILE
+### Android
+Tor Browser for Android is available from GooglePlay.
+
+### iOS
+Onion Browser, developed by M. Tigas, is the only browser we recommend for iOS.
+
diff --git a/zh_TW.po b/zh_TW.po
new file mode 100644
index 000000000..dc7cc8368
--- /dev/null
+++ b/zh_TW.po
@@ -0,0 +1,162 @@
+# Tor Outreach Material 2019-2020
+
+# 1. TOR FOR PRIVACY
+
+### Privacy is a human right
+
+Like many of us, Aleisha spends most of her time online--connecting with friends, posting on social media, and browsing the web.
+
+But lately, she's noticed that advertisements related to her previous searches are following her around online.
+
+This feels so invasive that she does some research on online ads and learns that it's not just advertisers tracking her but also her ISP, analytics companies, social media platforms, and more.
+
+Aleisha decides she wants to find and use software that doesn't collect her data, doesn't track her, and doesn't tell other services anything private about her.
+
+She goes to a privacy training at a local hackerspace and learns about **Tor Browser**, the only web browser that allows her to browse anonymously.
+
+---
+
+# 2.TOR FOR FEMINISTS
+
+### The future is cyberfeminist
+
+Fernanda runs a women's collective focused on reproductive rights in Brazil, where abortion is illegal.
+
+Fernanda and her colleagues built a website with information about abortion access, birth control, and other resources for people seeking reproductive information.
+
+If this website was linked back to them, they could be arrested--or worse.
+
+To protect themselves, Fernanda and her colleagues created the website using Tor **onion services**. Onion services not only protect them from being discovered as the operators of the server but also help protect visitors to their website by requiring they use Tor Browser.
+
+In fact, Fernanda uses **Tor Browser** for all of her web browsing just to be on the safe side.
+
+She also uses a Tor-powered app called **OnionShare** to send files to other activists securely and privately.
+
+### Reproductive rights activists like Fernanda are fighting for fundamental freedoms, and Tor helps power their resistance.
+
+---
+
+# 3. TOR FOR HUMAN RIGHTS
+
+### Water is life
+
+Jelani lives in a small village which a wide river runs through.
+
+This river has provided water to his community since the days of his ancestors.
+
+But today, Jelani’s river is threatened by powerful multinational companies drilling for oil in the region.
+
+Private security firms, paid for by these companies, use powerful surveillance mechanisms to monitor the online activities of Jelani and his neighbors in the village who are organizing to protect their sacred river.
+
+Jelani uses **Tor Browser** to prevent these companies from watching as he visits websites for international human rights protection and legal aid and writes blog posts about the resistance movement in his village.
+
+He also uses **OnionShare** and **SecureDrop** to securely send documents to journalists who are helping expose these human rights violations.
+
+All of this software uses Tor to help protect Jelani’s privacy.
+
+### Human rights activists like Jelani are fighting for justice in their communities, and Tor helps power their resistance.
+
+---
+
+# 4. TOR FOR ANTI-CENSORSHIP
+
+### Build bridges not walls
+
+Jean was traveling for the first time to a country far from his family.
+
+After arriving at a hotel, he opened his laptop.
+
+He was so exhausted that when the message "Connection has timed out" first appeared on his web browser, he thought it was due to his own error.
+
+But after trying again and again, he realized that his email provider, a news website, and many apps were unavailable.
+
+He had heard that this country censors the internet and wondered if that was happening.
+How could he contact his family from behind this impenetrable wall?
+After doing some web searches, he found a forum and read about VPNs, private services that allow you to connect to another uncensored network.
+
+Jean spent half an hour trying to figure out which cheap VPN was best.
+
+He chose one and for a moment it seemed to work, but after five minutes the connection went offline and the VPN would no longer connect.
+
+Jean kept reading to find other options and learned about Tor Browser and how it can circumvent censorship.
+
+He found an official website mirror to download the program.
+
+When he opened **Tor Browser**, he followed the prompts for censored users and connected to a bridge which allowed him to access the internet again.
+
+With Tor Browser, Jean can browse freely and privately and contact his family.
+
+### Censored users all over the world rely on Tor Browser for a free, stable, and uncensored way to access the internet.
+
+---
+
+# 5. Shared Sections
+
+## 什麼是 Tor?
+
+Tor is free software and an open network that helps protect you from tracking, surveillance, and censorship online.
+Tor is created for free by a 501(c)3 U.S.-based nonprofit called the Tor Project.
+
+The easiest way to use Tor is Tor Browser.
+When you use Tor Browser, no one can see what websites you visit or where in the world you’re coming from.
+
+Other applications, like SecureDrop and OnionShare, use Tor to protect their users against surveillance and censorship.
+
+
+## 6. How does Tor work?
+
+Amal wants to visit Bekele’s website privately, so she opens Tor Browser.
+
+Tor Browser selects a random circuit of three relays, which are computers all over the world configured to route traffic over the Tor network.
+
+Tor Browser then encrypts her website request three times and sends it to the first Tor relay in her circuit.
+
+The first relay removes the first encryption layer but doesn't learn that the destination is Bekele’s website.
+
+The first relay learns only the next location in the circuit, which is the second relay.
+
+The second relay removes another encryption layer and forwards the web page request to the third relay.
+
+The third relay removes the last encryption layer and forwards the web page request to its destination, Bekele’s website, but it doesn't know the request comes from Amal.
+
+Bekele doesn't know that the website request came from Amal unless she tells him so.
+
+## 7. Who uses Tor?
+
+People all over the world use Tor to protect their privacy and access the web freely.
+
+Tor helps protect journalists, human rights defenders, domestic violence victims, academic researchers, and anyone experiencing tracking, censorship, or surveillance.
+
+## 6. Why trust Tor?
+
+Tor is designed for privacy. We don’t know who our users are, and we don't keep logs of user activity.
+
+Tor relay operators cannot reveal the true identity of Tor users.
+
+Continual peer review of Tor's source code by academic and open source communities ensures that there are no backdoors in Tor, and our social contract promises that we will never backdoor Tor.
+
+## 7. Join the Tor community
+
+Tor is made possible by a diverse set of users, developers, relay operators, and advocates from around the world.
+
+We need your help to make Tor more usable and secure for people everywhere.
+
+You can volunteer with Tor by writing code, running a relay, creating documentation, offering user support, or telling people in your community about Tor.
+
+The Tor community is governed by a code of conduct, and we outline our set of promises to the community in our social contract.
+
+Learn more about Tor by visiting our website, our wiki, finding us on IRC, joining one of our mailing lists, or signing up for Tor News at newsletter.torproject.org.
+
+
+## 8. Download Tor
+
+Tor for Desktop
+torproject.org/download
+
+TOR ON MOBILE
+### Android
+Tor Browser for Android is available from GooglePlay.
+
+### iOS
+Onion Browser, developed by M. Tigas, is the only browser we recommend for iOS.
+
More information about the tor-commits
mailing list