[tor-commits] [translation/support-portal] https://gitweb.torproject.org/translation.git/commit/?h=support-portal
translation at torproject.org
translation at torproject.org
Wed Sep 1 13:18:52 UTC 2021
commit 1220b0151f0c882a7cec61a31021e10f73106a54
Author: Translation commit bot <translation at torproject.org>
Date: Wed Sep 1 13:18:50 2021 +0000
https://gitweb.torproject.org/translation.git/commit/?h=support-portal
---
contents+ar.po | 1281 +++++++++++++++++++++++++++++++++++++++----
contents+bn.po | 1248 ++++++++++++++++++++++++++++++++++++++---
contents+ca.po | 1248 ++++++++++++++++++++++++++++++++++++++---
contents+cs.po | 1249 +++++++++++++++++++++++++++++++++++++++---
contents+de.po | 1294 ++++++++++++++++++++++++++++++++++++++-----
contents+el.po | 1252 ++++++++++++++++++++++++++++++++++++++----
contents+es.po | 1287 ++++++++++++++++++++++++++++++++++++++-----
contents+fa.po | 1275 ++++++++++++++++++++++++++++++++++++++----
contents+fr.po | 1258 ++++++++++++++++++++++++++++++++++++++----
contents+ga.po | 1244 ++++++++++++++++++++++++++++++++++++++---
contents+he.po | 1244 ++++++++++++++++++++++++++++++++++++++---
contents+hr.po | 1244 ++++++++++++++++++++++++++++++++++++++---
contents+hu.po | 1266 ++++++++++++++++++++++++++++++++++++++----
contents+id.po | 1268 ++++++++++++++++++++++++++++++++++++++----
contents+is.po | 1249 +++++++++++++++++++++++++++++++++++++++---
contents+it.po | 1279 +++++++++++++++++++++++++++++++++++++++----
contents+ja.po | 1260 ++++++++++++++++++++++++++++++++++++++----
contents+ka.po | 1288 ++++++++++++++++++++++++++++++++++++++-----
contents+ko.po | 1252 ++++++++++++++++++++++++++++++++++++++----
contents+lt.po | 1244 ++++++++++++++++++++++++++++++++++++++---
contents+mk.po | 1248 ++++++++++++++++++++++++++++++++++++++---
contents+ml.po | 1273 ++++++++++++++++++++++++++++++++++++++----
contents+ms.po | 1248 ++++++++++++++++++++++++++++++++++++++---
contents+my.po | 1248 ++++++++++++++++++++++++++++++++++++++---
contents+nb.po | 1250 +++++++++++++++++++++++++++++++++++++++---
contents+nl.po | 1248 ++++++++++++++++++++++++++++++++++++++---
contents+pl.po | 1285 ++++++++++++++++++++++++++++++++++++++-----
contents+pt-BR.po | 1286 +++++++++++++++++++++++++++++++++++++++----
contents+pt-PT.po | 1251 +++++++++++++++++++++++++++++++++++++++---
contents+ro.po | 1273 ++++++++++++++++++++++++++++++++++++++----
contents+ru.po | 1280 +++++++++++++++++++++++++++++++++++++++----
contents+sq.po | 1246 ++++++++++++++++++++++++++++++++++++++---
contents+sr.po | 1244 ++++++++++++++++++++++++++++++++++++++---
contents+sv.po | 1244 ++++++++++++++++++++++++++++++++++++++---
contents+sw.po | 1248 ++++++++++++++++++++++++++++++++++++++---
contents+tr.po | 1285 +++++++++++++++++++++++++++++++++++++++----
contents+uk.po | 1244 ++++++++++++++++++++++++++++++++++++++---
contents+zh-CN.po | 1271 ++++++++++++++++++++++++++++++++++++++----
contents+zh-TW.po | 1248 ++++++++++++++++++++++++++++++++++++++---
contents.pot | 1583 +++++++++++++++++++++++++++++++++++++++++++++++++----
40 files changed, 46758 insertions(+), 3975 deletions(-)
diff --git a/contents+ar.po b/contents+ar.po
index ee76ee49aa..93b22be9bf 100644
--- a/contents+ar.po
+++ b/contents+ar.po
@@ -22,7 +22,7 @@ msgid ""
msgstr ""
"Project-Id-Version: PACKAGE VERSION\n"
"Report-Msgid-Bugs-To: \n"
-"POT-Creation-Date: 2021-08-25 11:14+CET\n"
+"POT-Creation-Date: 2021-09-01 12:20+CET\n"
"PO-Revision-Date: 2018-10-02 22:41+0000\n"
"Last-Translator: NASIâ¿ <nomadweb at protonmail.ch>, 2021\n"
"Language-Team: Arabic (https://www.transifex.com/otf/teams/1519/ar/)\n"
@@ -155,6 +155,11 @@ msgstr "اÙأسئÙØ© اÙÙ
تÙررة ع٠إساءة اÙاستخداÙ
"
msgid "Tor Metrics"
msgstr "Ø¥ØصائÙات تÙر"
+#: https//support.torproject.org/alternate-designs/
+#: (content/alternate-designs/contents+en.lrtopic.title)
+msgid "Alternate Designs We Don't Do (Yet)"
+msgstr ""
+
#: https//support.torproject.org/glossary/add-on-extension-or-plugin/
#: (content/glossary/add-on-extension-or-plugin/contents+en.lrword.term)
msgid "add-on, extension, or plugin"
@@ -2443,6 +2448,61 @@ msgstr ""
"اÙÙÙÙ٠اÙخاصÙØ© "
"بÙا](https://trac.torproject.org/projects/tor/wiki/doc/TorPlusVPN). "
+#: https//support.torproject.org/faq/relay-donations/
+#: (content/faq/relay-donations/contents+en.lrquestion.title)
+msgid "Can I donate for a relay rather than run my own?"
+msgstr ""
+
+#: https//support.torproject.org/faq/relay-donations/
+#: (content/faq/relay-donations/contents+en.lrquestion.description)
+msgid ""
+"Sure! We have a [list of organizations that run Tor "
+"relays](https://community.torproject.org/relay/community-resources/relay-"
+"associations/) that are happy to turn your donations into better speed and "
+"anonymity for the Tor network."
+msgstr ""
+
+#: https//support.torproject.org/faq/relay-donations/
+#: (content/faq/relay-donations/contents+en.lrquestion.description)
+msgid ""
+"These organizations are not the same as [The Tor Project, "
+"Inc](https://donate.torproject.org/), but we consider that a good thing."
+msgstr ""
+
+#: https//support.torproject.org/faq/relay-donations/
+#: (content/faq/relay-donations/contents+en.lrquestion.description)
+msgid "They're run by nice people who are part of the Tor community."
+msgstr "ÙدÙرÙÙ
Ø£Ùاس ÙØ·Ùاء ÙÙ
جزء Ù
Ù Ù
جتÙ
ع Tor."
+
+#: https//support.torproject.org/faq/relay-donations/
+#: (content/faq/relay-donations/contents+en.lrquestion.description)
+msgid ""
+"Note that there can be a tradeoff here between anonymity and performance."
+msgstr ""
+
+#: https//support.torproject.org/faq/relay-donations/
+#: (content/faq/relay-donations/contents+en.lrquestion.description)
+msgid ""
+"The Tor network's anonymity comes in part from diversity, so if you are in a"
+" position to run your own relay, you will be improving Tor's anonymity more "
+"than by donating."
+msgstr ""
+
+#: https//support.torproject.org/faq/relay-donations/
+#: (content/faq/relay-donations/contents+en.lrquestion.description)
+msgid ""
+"At the same time though, economies of scale for bandwidth mean that "
+"combining many small donations into several larger relays is more efficient "
+"at improving network performance."
+msgstr ""
+
+#: https//support.torproject.org/faq/relay-donations/
+#: (content/faq/relay-donations/contents+en.lrquestion.description)
+msgid ""
+"Improving anonymity and improving performance are both worthwhile goals, so "
+"however you can help is great!"
+msgstr ""
+
#: https//support.torproject.org/faq/staying-anonymous/
#: (content/faq/staying-anonymous/contents+en.lrquestion.title)
msgid "Am I totally anonymous if I use Tor?"
@@ -2802,6 +2862,61 @@ msgstr ""
"ÙائÙ
Ø© اÙÙ
خاطر ÙØ°Ù ÙÙست ÙاÙ
ÙØ© Ø ÙÙØتاج Ø¥ÙÙ Ù
ساعدت٠[تØدÙد جÙ
Ùع اÙÙ
Ø´ÙÙات ÙتÙØ«ÙÙÙا\n"
"(https://community.torproject.org/)."
+#: https//support.torproject.org/about/attacks-on-onion-routing/
+#: (content/about/attacks-on-onion-routing/contents+en.lrquestion.title)
+msgid "What attacks remain against onion routing?"
+msgstr ""
+
+#: https//support.torproject.org/about/attacks-on-onion-routing/
+#: (content/about/attacks-on-onion-routing/contents+en.lrquestion.description)
+msgid ""
+"As mentioned above, it is possible for an observer who can view both you and"
+" either the destination website or your Tor exit node to correlate timings "
+"of your traffic as it enters the Tor network and also as it exits."
+msgstr ""
+
+#: https//support.torproject.org/about/attacks-on-onion-routing/
+#: (content/about/attacks-on-onion-routing/contents+en.lrquestion.description)
+msgid "Tor does not defend against such a threat model."
+msgstr ""
+
+#: https//support.torproject.org/about/attacks-on-onion-routing/
+#: (content/about/attacks-on-onion-routing/contents+en.lrquestion.description)
+msgid ""
+"In a more limited sense, note that if a censor or law enforcement agency has"
+" the ability to obtain specific observation of parts of the network, it is "
+"possible for them to verify a suspicion that you talk regularly to your "
+"friend by observing traffic at both ends and correlating the timing of only "
+"that traffic."
+msgstr ""
+
+#: https//support.torproject.org/about/attacks-on-onion-routing/
+#: (content/about/attacks-on-onion-routing/contents+en.lrquestion.description)
+msgid ""
+"Again, this is only useful to verify that parties already suspected of "
+"communicating with one another are doing so."
+msgstr ""
+
+#: https//support.torproject.org/about/attacks-on-onion-routing/
+#: (content/about/attacks-on-onion-routing/contents+en.lrquestion.description)
+msgid ""
+"In most countries, the suspicion required to obtain a warrant already "
+"carries more weight than timing correlation would provide."
+msgstr ""
+
+#: https//support.torproject.org/about/attacks-on-onion-routing/
+#: (content/about/attacks-on-onion-routing/contents+en.lrquestion.description)
+msgid ""
+"Furthermore, since Tor reuses circuits for multiple TCP connections, it is "
+"possible to associate non anonymous and anonymous traffic at a given exit "
+"node, so be careful about what applications you run concurrently over Tor."
+msgstr ""
+
+#: https//support.torproject.org/about/attacks-on-onion-routing/
+#: (content/about/attacks-on-onion-routing/contents+en.lrquestion.description)
+msgid "Perhaps even run separate Tor clients for these applications."
+msgstr ""
+
#: https//support.torproject.org/about/backdoor/
#: (content/about/backdoor/contents+en.lrquestion.title)
msgid "Is there a backdoor in Tor?"
@@ -2963,6 +3078,43 @@ msgid ""
"recommended](/tbb/tbb-9/)."
msgstr "استخداÙ
Tor Ù
ع Ù
تصÙÙØات أخر٠[خطر ÙÙا ÙÙØµØ Ø¨Ù](/ar/tbb/tbb-9/)"
+#: https//support.torproject.org/about/change-paths/
+#: (content/about/change-paths/contents+en.lrquestion.title)
+msgid "How often does Tor change its paths?"
+msgstr ""
+
+#: https//support.torproject.org/about/change-paths/
+#: (content/about/change-paths/contents+en.lrquestion.description)
+msgid ""
+"Tor will reuse the same circuit for new TCP streams for 10 minutes, as long "
+"as the circuit is working fine."
+msgstr ""
+
+#: https//support.torproject.org/about/change-paths/
+#: (content/about/change-paths/contents+en.lrquestion.description)
+msgid "(If the circuit fails, Tor will switch to a new circuit immediately.)"
+msgstr ""
+
+#: https//support.torproject.org/about/change-paths/
+#: (content/about/change-paths/contents+en.lrquestion.description)
+msgid ""
+"But note that a single TCP stream (e.g. a long IRC connection) will stay on "
+"the same circuit forever."
+msgstr ""
+
+#: https//support.torproject.org/about/change-paths/
+#: (content/about/change-paths/contents+en.lrquestion.description)
+msgid "We don't rotate individual streams from one circuit to the next."
+msgstr ""
+
+#: https//support.torproject.org/about/change-paths/
+#: (content/about/change-paths/contents+en.lrquestion.description)
+msgid ""
+"Otherwise, an adversary with a partial view of the network would be given "
+"many chances over time to link you to your destination, rather than just one"
+" chance."
+msgstr ""
+
#: https//support.torproject.org/about/distribute-tor/
#: (content/about/distribute-tor/contents+en.lrquestion.title)
msgid "Can I distribute Tor?"
@@ -3077,6 +3229,133 @@ msgstr ""
"اÙظر Ø¥ÙÙ [اÙأسئÙØ© اÙشائعة ع٠اÙعÙاÙ
Ø© "
"اÙÙ
سجÙØ©](https://www.torproject.org/about/trademark/) ÙÙتÙاصÙÙ."
+#: https//support.torproject.org/about/entry-guards/
+#: (content/about/entry-guards/contents+en.lrquestion.title)
+msgid "What are Entry Guards?"
+msgstr ""
+
+#: https//support.torproject.org/about/entry-guards/
+#: (content/about/entry-guards/contents+en.lrquestion.description)
+msgid ""
+"Tor (like all current practical low-latency anonymity designs) fails when "
+"the attacker can see both ends of the communications channel."
+msgstr ""
+
+#: https//support.torproject.org/about/entry-guards/
+#: (content/about/entry-guards/contents+en.lrquestion.description)
+msgid ""
+"For example, suppose the attacker controls or watches the Tor relay you "
+"choose to enter the network, and also controls or watches the website you "
+"visit."
+msgstr ""
+
+#: https//support.torproject.org/about/entry-guards/
+#: (content/about/entry-guards/contents+en.lrquestion.description)
+msgid ""
+"In this case, the research community knows no practical low-latency design "
+"that can reliably stop the attacker from correlating volume and timing "
+"information on the two sides."
+msgstr ""
+
+#: https//support.torproject.org/about/entry-guards/
+#: (content/about/entry-guards/contents+en.lrquestion.description)
+msgid "So, what should we do?"
+msgstr ""
+
+#: https//support.torproject.org/about/entry-guards/
+#: (content/about/entry-guards/contents+en.lrquestion.description)
+msgid "Suppose the attacker controls, or can observe, C relays."
+msgstr ""
+
+#: https//support.torproject.org/about/entry-guards/
+#: (content/about/entry-guards/contents+en.lrquestion.description)
+msgid "Suppose there are N relays total."
+msgstr ""
+
+#: https//support.torproject.org/about/entry-guards/
+#: (content/about/entry-guards/contents+en.lrquestion.description)
+msgid ""
+"If you select new entry and exit relays each time you use the network, the "
+"attacker will be able to correlate all traffic you send with probability "
+"around (c/n)2."
+msgstr ""
+
+#: https//support.torproject.org/about/entry-guards/
+#: (content/about/entry-guards/contents+en.lrquestion.description)
+msgid ""
+"But profiling is, for most users, as bad as being traced all the time: they "
+"want to do something often without an attacker noticing, and the attacker "
+"noticing once is as bad as the attacker noticing more often."
+msgstr ""
+
+#: https//support.torproject.org/about/entry-guards/
+#: (content/about/entry-guards/contents+en.lrquestion.description)
+msgid ""
+"Thus, choosing many random entries and exits gives the user no chance of "
+"escaping profiling by this kind of attacker."
+msgstr ""
+
+#: https//support.torproject.org/about/entry-guards/
+#: (content/about/entry-guards/contents+en.lrquestion.description)
+msgid ""
+"The solution is \"entry guards\": each Tor client selects a few relays at "
+"random to use as entry points, and uses only those relays for their first "
+"hop."
+msgstr ""
+
+#: https//support.torproject.org/about/entry-guards/
+#: (content/about/entry-guards/contents+en.lrquestion.description)
+msgid ""
+"If those relays are not controlled or observed, the attacker can't win, "
+"ever, and the user is secure."
+msgstr ""
+
+#: https//support.torproject.org/about/entry-guards/
+#: (content/about/entry-guards/contents+en.lrquestion.description)
+msgid ""
+"If those relays are observed or controlled by the attacker, the attacker "
+"sees a larger fraction of the user's traffic - but still the user is no more"
+" profiled than before."
+msgstr ""
+
+#: https//support.torproject.org/about/entry-guards/
+#: (content/about/entry-guards/contents+en.lrquestion.description)
+msgid ""
+"Thus, the user has some chance (on the order of (n-c)/n) of avoiding "
+"profiling, whereas they had none before."
+msgstr ""
+
+#: https//support.torproject.org/about/entry-guards/
+#: (content/about/entry-guards/contents+en.lrquestion.description)
+msgid ""
+"You can read more at [An Analysis of the Degradation of Anonymous "
+"Protocols](http://freehaven.net/anonbib/#wright02), [Defending Anonymous "
+"Communication Against Passive Logging "
+"Attacks](http://freehaven.net/anonbib/#wright03), and especially [Locating "
+"Hidden Servers](http://freehaven.net/anonbib/#hs-attack06)."
+msgstr ""
+
+#: https//support.torproject.org/about/entry-guards/
+#: (content/about/entry-guards/contents+en.lrquestion.description)
+msgid ""
+"Restricting your entry nodes may also help against attackers who want to run"
+" a few Tor nodes and easily enumerate all of the Tor user IP addresses."
+msgstr ""
+
+#: https//support.torproject.org/about/entry-guards/
+#: (content/about/entry-guards/contents+en.lrquestion.description)
+msgid ""
+"(Even though they can't learn what destinations the users are talking to, "
+"they still might be able to do bad things with just a list of users.)"
+msgstr ""
+
+#: https//support.torproject.org/about/entry-guards/
+#: (content/about/entry-guards/contents+en.lrquestion.description)
+msgid ""
+"However, that feature won't really become useful until we move to a "
+"\"directory guard\" design as well."
+msgstr ""
+
#: https//support.torproject.org/about/how-is-tor-different-from-other-proxies/
#: (content/about/how-is-tor-different-from-other-proxies/contents+en.lrquestion.title)
msgid "How is Tor different from other proxies?"
@@ -3274,6 +3553,162 @@ msgstr ""
"اÙظر Ø¥ÙÙ Ùذا اÙØ´Ù٠اÙØ°Ù ÙÙØ¶Ø Ø§ÙعÙاÙØ© بÙÙ [Tor Ù HTTPS](/https/https-1/) "
"ÙتÙÙÙ
ÙÙÙ ÙتÙاع٠Tor ÙHTTPS."
+#: https//support.torproject.org/about/key-management/
+#: (content/about/key-management/contents+en.lrquestion.title)
+msgid "Tell me about all the keys Tor uses"
+msgstr ""
+
+#: https//support.torproject.org/about/key-management/
+#: (content/about/key-management/contents+en.lrquestion.description)
+msgid ""
+"Tor uses a variety of different keys, with three goals in mind: 1) "
+"encryption to ensure privacy of data within the Tor network, 2) "
+"authentication so clients know they're talking to the relays they meant to "
+"talk to, and 3) signatures to make sure all clients know the same set of "
+"relays."
+msgstr ""
+
+#: https//support.torproject.org/about/key-management/
+#: (content/about/key-management/contents+en.lrquestion.description)
+msgid ""
+"**Encryption**: first, all connections in Tor use TLS link encryption, so "
+"observers can't look inside to see which circuit a given cell is intended "
+"for."
+msgstr ""
+
+#: https//support.torproject.org/about/key-management/
+#: (content/about/key-management/contents+en.lrquestion.description)
+msgid ""
+"Further, the Tor client establishes an ephemeral encryption key with each "
+"relay in the circuit; these extra layers of encryption mean that only the "
+"exit relay can read the cells."
+msgstr ""
+
+#: https//support.torproject.org/about/key-management/
+#: (content/about/key-management/contents+en.lrquestion.description)
+msgid ""
+"Both sides discard the circuit key when the circuit ends, so logging traffic"
+" and then breaking into the relay to discover the key won't work."
+msgstr ""
+
+#: https//support.torproject.org/about/key-management/
+#: (content/about/key-management/contents+en.lrquestion.description)
+msgid ""
+"**Authentication**: Every Tor relay has a public decryption key called the "
+"\"onion key\"."
+msgstr ""
+
+#: https//support.torproject.org/about/key-management/
+#: (content/about/key-management/contents+en.lrquestion.description)
+msgid "Each relay rotates its onion key once a week."
+msgstr ""
+
+#: https//support.torproject.org/about/key-management/
+#: (content/about/key-management/contents+en.lrquestion.description)
+msgid ""
+"When the Tor client establishes circuits, at each step it [demands that the "
+"Tor relay prove knowledge of its onion key](https://svn-"
+"archive.torproject.org/svn/projects/design-paper/tor-"
+"design.html#subsec:circuits)."
+msgstr ""
+
+#: https//support.torproject.org/about/key-management/
+#: (content/about/key-management/contents+en.lrquestion.description)
+msgid ""
+"That way the first node in the path can't just spoof the rest of the path."
+msgstr ""
+
+#: https//support.torproject.org/about/key-management/
+#: (content/about/key-management/contents+en.lrquestion.description)
+msgid ""
+"Because the Tor client chooses the path, it can make sure to get Tor's "
+"\"distributed trust\" property: no single relay in the path can know about "
+"both the client and what the client is doing."
+msgstr ""
+
+#: https//support.torproject.org/about/key-management/
+#: (content/about/key-management/contents+en.lrquestion.description)
+msgid ""
+"**Coordination**: How do clients know what the relays are, and how do they "
+"know that they have the right keys for them?"
+msgstr ""
+
+#: https//support.torproject.org/about/key-management/
+#: (content/about/key-management/contents+en.lrquestion.description)
+msgid "Each relay has a long-term public signing key called the \"identity key\"."
+msgstr ""
+
+#: https//support.torproject.org/about/key-management/
+#: (content/about/key-management/contents+en.lrquestion.description)
+msgid "Each directory authority additionally has a \"directory signing key\"."
+msgstr ""
+
+#: https//support.torproject.org/about/key-management/
+#: (content/about/key-management/contents+en.lrquestion.description)
+msgid ""
+"The directory authorities [provide a signed "
+"list](https://gitweb.torproject.org/torspec.git/tree/dir-spec.txt) of all "
+"the known relays, and in that list are a set of certificates from each relay"
+" (self-signed by their identity key) specifying their keys, locations, exit "
+"policies, and so on."
+msgstr ""
+
+#: https//support.torproject.org/about/key-management/
+#: (content/about/key-management/contents+en.lrquestion.description)
+msgid ""
+"So unless the adversary can control a majority of the directory authorities "
+"(as of 2021 there are 10 directory authorities), they can't trick the Tor "
+"client into using other Tor relays."
+msgstr ""
+
+#: https//support.torproject.org/about/key-management/
+#: (content/about/key-management/contents+en.lrquestion.description)
+msgid "How do clients know what the directory authorities are?"
+msgstr ""
+
+#: https//support.torproject.org/about/key-management/
+#: (content/about/key-management/contents+en.lrquestion.description)
+msgid ""
+"The Tor software comes with a built-in list of location and public key for "
+"each directory authority."
+msgstr ""
+
+#: https//support.torproject.org/about/key-management/
+#: (content/about/key-management/contents+en.lrquestion.description)
+msgid ""
+"So the only way to trick users into using a fake Tor network is to give them"
+" a specially modified version of the software."
+msgstr ""
+
+#: https//support.torproject.org/about/key-management/
+#: (content/about/key-management/contents+en.lrquestion.description)
+msgid "How do users know they've got the right software?"
+msgstr ""
+
+#: https//support.torproject.org/about/key-management/
+#: (content/about/key-management/contents+en.lrquestion.description)
+msgid ""
+"When we distribute the source code or a package, we digitally sign it with "
+"[GNU Privacy Guard](http://www.gnupg.org/). See the [instructions on how to "
+"check Tor Browser's signature](https://support.torproject.org/tbb/how-to-"
+"verify-signature/)."
+msgstr ""
+
+#: https//support.torproject.org/about/key-management/
+#: (content/about/key-management/contents+en.lrquestion.description)
+msgid ""
+"In order to be certain that it's really signed by us, you need to have met "
+"us in person and gotten a copy of our GPG key fingerprint, or you need to "
+"know somebody who has."
+msgstr ""
+
+#: https//support.torproject.org/about/key-management/
+#: (content/about/key-management/contents+en.lrquestion.description)
+msgid ""
+"If you're concerned about an attack on this level, we recommend you get "
+"involved with the security community and start meeting people."
+msgstr ""
+
#: https//support.torproject.org/about/no-data-scrubbing/
#: (content/about/no-data-scrubbing/contents+en.lrquestion.title)
msgid ""
@@ -3312,6 +3747,151 @@ msgstr ""
"ÙÙÙÙ Ù
تصÙØ Tor Ùا ÙÙ
ÙÙÙ Ùع٠شÙØ¡ ÙخصÙص اÙÙصÙص اÙت٠تÙتÙÙا Ù٠اÙÙÙ
اذج "
"اÙاÙÙترÙÙÙØ©."
+#: https//support.torproject.org/about/protections/
+#: (content/about/protections/contents+en.lrquestion.title)
+msgid "What protections does Tor provide?"
+msgstr ""
+
+#: https//support.torproject.org/about/protections/
+#: (content/about/protections/contents+en.lrquestion.description)
+msgid ""
+"Internet communication is based on a store-and-forward model that can be "
+"understood in analogy to postal mail: Data is transmitted in blocks called "
+"IP datagrams or packets."
+msgstr ""
+
+#: https//support.torproject.org/about/protections/
+#: (content/about/protections/contents+en.lrquestion.description)
+msgid ""
+"Every packet includes a source IP address (of the sender) and a destination "
+"IP address (of the receiver), just as ordinary letters contain postal "
+"addresses of sender and receiver."
+msgstr ""
+
+#: https//support.torproject.org/about/protections/
+#: (content/about/protections/contents+en.lrquestion.description)
+msgid ""
+"The way from sender to receiver involves multiple hops of routers, where "
+"each router inspects the destination IP address and forwards the packet "
+"closer to its destination."
+msgstr ""
+
+#: https//support.torproject.org/about/protections/
+#: (content/about/protections/contents+en.lrquestion.description)
+msgid ""
+"Thus, every router between sender and receiver learns that the sender is "
+"communicating with the receiver."
+msgstr ""
+
+#: https//support.torproject.org/about/protections/
+#: (content/about/protections/contents+en.lrquestion.description)
+msgid ""
+"In particular, your local ISP is in the position to build a complete profile"
+" of your Internet usage."
+msgstr ""
+
+#: https//support.torproject.org/about/protections/
+#: (content/about/protections/contents+en.lrquestion.description)
+msgid ""
+"In addition, every server in the Internet that can see any of the packets "
+"can profile your behavior."
+msgstr ""
+
+#: https//support.torproject.org/about/protections/
+#: (content/about/protections/contents+en.lrquestion.description)
+msgid ""
+"The aim of Tor is to improve your privacy by sending your traffic through a "
+"series of proxies."
+msgstr ""
+
+#: https//support.torproject.org/about/protections/
+#: (content/about/protections/contents+en.lrquestion.description)
+msgid ""
+"Your communication is encrypted in multiple layers and routed via multiple "
+"hops through the Tor network to the final receiver."
+msgstr ""
+
+#: https//support.torproject.org/about/protections/
+#: (content/about/protections/contents+en.lrquestion.description)
+msgid ""
+"More details on this process can be found in this "
+"[visualization](https://support.torproject.org/https/https-1/)."
+msgstr ""
+
+#: https//support.torproject.org/about/protections/
+#: (content/about/protections/contents+en.lrquestion.description)
+msgid ""
+"Note that all your local ISP can observe now is that you are communicating "
+"with Tor nodes."
+msgstr ""
+
+#: https//support.torproject.org/about/protections/
+#: (content/about/protections/contents+en.lrquestion.description)
+msgid ""
+"Similarly, servers in the Internet just see that they are being contacted by"
+" Tor nodes."
+msgstr ""
+
+#: https//support.torproject.org/about/protections/
+#: (content/about/protections/contents+en.lrquestion.description)
+msgid "Generally speaking, Tor aims to solve three privacy problems:"
+msgstr ""
+
+#: https//support.torproject.org/about/protections/
+#: (content/about/protections/contents+en.lrquestion.description)
+msgid ""
+"First, Tor prevents websites and other services from learning your location,"
+" which they can use to build databases about your habits and interests."
+msgstr ""
+
+#: https//support.torproject.org/about/protections/
+#: (content/about/protections/contents+en.lrquestion.description)
+msgid ""
+"With Tor, your Internet connections don't give you away by default -- now "
+"you can have the ability to choose, for each connection, how much "
+"information to reveal."
+msgstr ""
+
+#: https//support.torproject.org/about/protections/
+#: (content/about/protections/contents+en.lrquestion.description)
+msgid ""
+"Second, Tor prevents people watching your traffic locally (such as your ISP "
+"or someone with access to your home wifi or router) from learning what "
+"information you're fetching and where you're fetching it from."
+msgstr ""
+
+#: https//support.torproject.org/about/protections/
+#: (content/about/protections/contents+en.lrquestion.description)
+msgid ""
+"It also stops them from deciding what you're allowed to learn and publish --"
+" if you can get to any part of the Tor network, you can reach any site on "
+"the Internet."
+msgstr ""
+
+#: https//support.torproject.org/about/protections/
+#: (content/about/protections/contents+en.lrquestion.description)
+msgid ""
+"Third, Tor routes your connection through more than one Tor relay so no "
+"single relay can learn what you're up to."
+msgstr ""
+
+#: https//support.torproject.org/about/protections/
+#: (content/about/protections/contents+en.lrquestion.description)
+msgid ""
+"Because these relays are run by different individuals or organizations, "
+"distributing trust provides more security than the old [one hop "
+"proxy](https://support.torproject.org/about/#how-is-tor-different-from-"
+"other-proxies) approach."
+msgstr ""
+
+#: https//support.torproject.org/about/protections/
+#: (content/about/protections/contents+en.lrquestion.description)
+msgid ""
+"Note, however, that there are situations where Tor fails to solve these "
+"privacy problems entirely: see the entry below on [remaining "
+"attacks](https://support.torproject.org/about/#attacks-on-onion-routing)."
+msgstr ""
+
#: https//support.torproject.org/about/what-is-tor/
#: (content/about/what-is-tor/contents+en.lrquestion.title)
msgid "What is Tor?"
@@ -5937,14 +6517,12 @@ msgstr ""
#: (content/tbb/tbb-47/contents+en.lrquestion.description)
msgid ""
"Also, read up on the HTTPProxyAuthenticator and HTTPSProxyAuthenticator "
-"options if your proxy requires auth. We only support basic auth currently, "
-"but if you need NTLM authentication, you may find [this post in the "
-"archives](https://archives.seul.org/or/talk/Jun-2005/msg00223.html) useful."
+"options if your [proxy requires auth.](https://developer.mozilla.org/en-"
+"US/docs/Web/HTTP/Headers/Proxy-Authenticate) We only support basic auth "
+"currently, but if you need NTLM authentication, you may find [this post in "
+"the archives](https://archives.seul.org/or/talk/Jun-2005/msg00223.html) "
+"useful."
msgstr ""
-"اÙرأ Ø£ÙضÙا Ø®Ùارات HTTPProxyAuthenticator Ù HTTPSProxyAuthenticator إذا Ùا٠"
-"ÙÙÙÙÙ ÙتطÙب Ù
صادÙØ©. ÙØÙ ÙدعÙ
اÙÙ
صادÙØ© اÙأساسÙØ© ÙÙØ· ØاÙÙÙا Ø ÙÙÙ٠إذا ÙÙت "
-"بØاجة Ø¥ÙÙ Ù
صادÙØ© NTLM Ø ÙÙد تجد [Ùذا اÙÙ
ÙØ´Ùر ÙÙ "
-"اÙأرشÙÙ](https://archives.seul.org/or/talk/Jun-2005/msg00223.html) Ù
ÙÙدÙا."
#: https//support.torproject.org/tbb/tbb-47/
#: (content/tbb/tbb-47/contents+en.lrquestion.description)
@@ -6213,6 +6791,219 @@ msgstr ""
"تذÙر أ٠جÙ
Ùع اÙأسطر اÙت٠تبدأ ب٠`` # '' ÙÙ torrc ÙتÙ
اÙتعاÙ
Ù Ù
عÙا ÙتعÙÙÙات "
"ÙÙÙس ÙÙا أ٠تأثÙر عÙ٠تÙÙÙÙ Tor."
+#: https//support.torproject.org/tbb/tbb-firewall-ports/
+#: (content/tbb/tbb-firewall-ports/contents+en.lrquestion.title)
+msgid "My firewall only allows a few outgoing ports"
+msgstr ""
+
+#: https//support.torproject.org/tbb/tbb-firewall-ports/
+#: (content/tbb/tbb-firewall-ports/contents+en.lrquestion.description)
+msgid ""
+"If your firewall works by blocking ports, then you can tell Tor to only use "
+"the ports when you start your Tor Browser."
+msgstr ""
+
+#: https//support.torproject.org/tbb/tbb-firewall-ports/
+#: (content/tbb/tbb-firewall-ports/contents+en.lrquestion.description)
+msgid ""
+"Or you can add the ports that your firewall permits by adding "
+"\"FascistFirewall 1\" to your torrc configuration file."
+msgstr ""
+
+#: https//support.torproject.org/tbb/tbb-firewall-ports/
+#: (content/tbb/tbb-firewall-ports/contents+en.lrquestion.description)
+msgid ""
+"By default, when you set this Tor assumes that your firewall allows only "
+"port 80 and port 443 (HTTP and HTTPS respectively)."
+msgstr ""
+
+#: https//support.torproject.org/tbb/tbb-firewall-ports/
+#: (content/tbb/tbb-firewall-ports/contents+en.lrquestion.description)
+msgid ""
+"You can select a different set of ports with the FirewallPorts torrc option."
+msgstr ""
+
+#: https//support.torproject.org/tbb/tbb-firewall-ports/
+#: (content/tbb/tbb-firewall-ports/contents+en.lrquestion.description)
+msgid ""
+"If you want to be more fine-grained with your controls, you can also use the"
+" ReachableAddresses config options, e.g.:"
+msgstr ""
+
+#: https//support.torproject.org/tbb/tbb-firewall-ports/
+#: (content/tbb/tbb-firewall-ports/contents+en.lrquestion.description)
+#: https//support.torproject.org/tbb/tbb-install-tor-central-server/
+#: (content/tbb/tbb-install-tor-central-server/contents+en.lrquestion.description)
+#: https//support.torproject.org/operators/default-exit-ports/
+#: (content/operators/default-exit-ports/contents+en.lrquestion.description)
+#: https//support.torproject.org/operators/hibernation/
+#: (content/operators/hibernation/contents+en.lrquestion.description)
+#: https//support.torproject.org/operators/limit-total-bandwidth/
+#: (content/operators/limit-total-bandwidth/contents+en.lrquestion.description)
+#: https//support.torproject.org/misc/bug-or-feedback/
+#: (content/misc/bug-or-feedback/contents+en.lrquestion.description)
+#: https//support.torproject.org/get-in-touch/why-i-cant-join-tor-channels/
+#: (content/get-in-touch/why-i-cant-join-tor-channels/contents+en.lrquestion.description)
+#: https//support.torproject.org/apt/tor-deb-repo/
+#: (content/apt/apt-1/contents+en.lrquestion.description)
+#: https//support.torproject.org/apt/apt-over-tor/
+#: (content/apt/apt-3/contents+en.lrquestion.description)
+msgid "```"
+msgstr "```"
+
+#: https//support.torproject.org/tbb/tbb-firewall-ports/
+#: (content/tbb/tbb-firewall-ports/contents+en.lrquestion.description)
+msgid "ReachableDirAddresses *:80"
+msgstr ""
+
+#: https//support.torproject.org/tbb/tbb-firewall-ports/
+#: (content/tbb/tbb-firewall-ports/contents+en.lrquestion.description)
+msgid "ReachableORAddresses *:443"
+msgstr ""
+
+#: https//support.torproject.org/tbb/tbb-install-tor-central-server/
+#: (content/tbb/tbb-install-tor-central-server/contents+en.lrquestion.title)
+msgid ""
+"Can I install Tor on a central server, and have my clients connect to it?"
+msgstr ""
+
+#: https//support.torproject.org/tbb/tbb-install-tor-central-server/
+#: (content/tbb/tbb-install-tor-central-server/contents+en.lrquestion.description)
+msgid ""
+"Yes. Tor can be configured as a client or a relay on another machine, and "
+"allow other machines to be able to connect to it for anonymity."
+msgstr ""
+
+#: https//support.torproject.org/tbb/tbb-install-tor-central-server/
+#: (content/tbb/tbb-install-tor-central-server/contents+en.lrquestion.description)
+msgid ""
+"This is most useful in an environment where many computers want a gateway of"
+" anonymity to the rest of the world."
+msgstr ""
+
+#: https//support.torproject.org/tbb/tbb-install-tor-central-server/
+#: (content/tbb/tbb-install-tor-central-server/contents+en.lrquestion.description)
+msgid ""
+"However, be forewarned that with this configuration, anyone within your "
+"private network (existing between you and the Tor client/relay) can see what"
+" traffic you are sending in clear text."
+msgstr ""
+
+#: https//support.torproject.org/tbb/tbb-install-tor-central-server/
+#: (content/tbb/tbb-install-tor-central-server/contents+en.lrquestion.description)
+msgid "The anonymity doesn't start until you get to the Tor relay."
+msgstr ""
+
+#: https//support.torproject.org/tbb/tbb-install-tor-central-server/
+#: (content/tbb/tbb-install-tor-central-server/contents+en.lrquestion.description)
+msgid ""
+"Because of this, if you are the controller of your domain and you know "
+"everything's locked down, you will be OK, but this configuration may not be "
+"suitable for large private networks where security is key all around."
+msgstr ""
+
+#: https//support.torproject.org/tbb/tbb-install-tor-central-server/
+#: (content/tbb/tbb-install-tor-central-server/contents+en.lrquestion.description)
+msgid ""
+"Configuration is simple, editing your torrc file's SocksListenAddress "
+"according to the following examples:"
+msgstr ""
+
+#: https//support.torproject.org/tbb/tbb-install-tor-central-server/
+#: (content/tbb/tbb-install-tor-central-server/contents+en.lrquestion.description)
+msgid "SocksListenAddress 127.0.0.1"
+msgstr ""
+
+#: https//support.torproject.org/tbb/tbb-install-tor-central-server/
+#: (content/tbb/tbb-install-tor-central-server/contents+en.lrquestion.description)
+msgid "SocksListenAddress 192.168.x.x:9100"
+msgstr ""
+
+#: https//support.torproject.org/tbb/tbb-install-tor-central-server/
+#: (content/tbb/tbb-install-tor-central-server/contents+en.lrquestion.description)
+msgid "SocksListenAddress 0.0.0.0:9100"
+msgstr ""
+
+#: https//support.torproject.org/tbb/tbb-install-tor-central-server/
+#: (content/tbb/tbb-install-tor-central-server/contents+en.lrquestion.description)
+msgid ""
+"You can state multiple listen addresses, in the case that you are part of "
+"several networks or subnets."
+msgstr ""
+
+#: https//support.torproject.org/tbb/tbb-install-tor-central-server/
+#: (content/tbb/tbb-install-tor-central-server/contents+en.lrquestion.description)
+msgid "SocksListenAddress 192.168.x.x:9100 #eth0"
+msgstr ""
+
+#: https//support.torproject.org/tbb/tbb-install-tor-central-server/
+#: (content/tbb/tbb-install-tor-central-server/contents+en.lrquestion.description)
+msgid "SocksListenAddress 10.x.x.x:9100 #eth1"
+msgstr ""
+
+#: https//support.torproject.org/tbb/tbb-install-tor-central-server/
+#: (content/tbb/tbb-install-tor-central-server/contents+en.lrquestion.description)
+msgid ""
+"After this, your clients on their respective networks/subnets would specify "
+"a socks proxy with the address and port you specified SocksListenAddress to "
+"be."
+msgstr ""
+
+#: https//support.torproject.org/tbb/tbb-install-tor-central-server/
+#: (content/tbb/tbb-install-tor-central-server/contents+en.lrquestion.description)
+msgid ""
+"Please note that the SocksPort configuration option gives the port ONLY for "
+"localhost (127.0.0.1)."
+msgstr ""
+
+#: https//support.torproject.org/tbb/tbb-install-tor-central-server/
+#: (content/tbb/tbb-install-tor-central-server/contents+en.lrquestion.description)
+msgid ""
+"When setting up your SocksListenAddress(es), you need to give the port with "
+"the address, as shown above."
+msgstr ""
+
+#: https//support.torproject.org/tbb/tbb-install-tor-central-server/
+#: (content/tbb/tbb-install-tor-central-server/contents+en.lrquestion.description)
+msgid ""
+"If you are interested in forcing all outgoing data through the central Tor "
+"client/relay, instead of the server only being an optional proxy, you may "
+"find the program iptables (for *nix) useful."
+msgstr ""
+
+#: https//support.torproject.org/tbb/tbb-run-client-different-computer/
+#: (content/tbb/tbb-run-client-different-computer/contents+en.lrquestion.title)
+msgid ""
+"I want to run my Tor client on a different computer than my applications"
+msgstr ""
+
+#: https//support.torproject.org/tbb/tbb-run-client-different-computer/
+#: (content/tbb/tbb-run-client-different-computer/contents+en.lrquestion.description)
+msgid ""
+"By default, your Tor client only listens for applications that connect from "
+"localhost."
+msgstr ""
+
+#: https//support.torproject.org/tbb/tbb-run-client-different-computer/
+#: (content/tbb/tbb-run-client-different-computer/contents+en.lrquestion.description)
+msgid "Connections from other computers are refused."
+msgstr ""
+
+#: https//support.torproject.org/tbb/tbb-run-client-different-computer/
+#: (content/tbb/tbb-run-client-different-computer/contents+en.lrquestion.description)
+msgid ""
+"If you want to torify applications on different computers than the Tor "
+"client, you should edit your torrc to define `SocksListenAddress 0.0.0.0` "
+"and then restart (or hup) Tor."
+msgstr ""
+
+#: https//support.torproject.org/tbb/tbb-run-client-different-computer/
+#: (content/tbb/tbb-run-client-different-computer/contents+en.lrquestion.description)
+msgid ""
+"If you want to get more advanced, you can configure your Tor client on a "
+"firewall to bind to your internal IP but not your external IP."
+msgstr ""
+
#: https//support.torproject.org/tbb/website-blocking-tor/
#: (content/tbb/website-blocking-tor/contents+en.lrquestion.title)
msgid "A website I am trying to reach is blocking access over Tor."
@@ -7968,6 +8759,130 @@ msgid ""
"guide."
msgstr ""
+#: https//support.torproject.org/operators/default-exit-ports/
+#: (content/operators/default-exit-ports/contents+en.lrquestion.title)
+msgid "Is there a list of default exit ports?"
+msgstr ""
+
+#: https//support.torproject.org/operators/default-exit-ports/
+#: (content/operators/default-exit-ports/contents+en.lrquestion.description)
+msgid ""
+"The default open ports are listed below but keep in mind that, any port or "
+"ports can be opened by the relay operator by configuring it in torrc or "
+"modifying the source code."
+msgstr ""
+
+#: https//support.torproject.org/operators/default-exit-ports/
+#: (content/operators/default-exit-ports/contents+en.lrquestion.description)
+msgid ""
+"The default according to src/or/policies.c ([line 85][1] and [line 1901][2])"
+" from the source code release [release-0.4.6][3]:"
+msgstr ""
+
+#: https//support.torproject.org/operators/default-exit-ports/
+#: (content/operators/default-exit-ports/contents+en.lrquestion.description)
+msgid "reject 0.0.0.0/8"
+msgstr ""
+
+#: https//support.torproject.org/operators/default-exit-ports/
+#: (content/operators/default-exit-ports/contents+en.lrquestion.description)
+msgid "reject 169.254.0.0/16"
+msgstr ""
+
+#: https//support.torproject.org/operators/default-exit-ports/
+#: (content/operators/default-exit-ports/contents+en.lrquestion.description)
+msgid "reject 127.0.0.0/8"
+msgstr ""
+
+#: https//support.torproject.org/operators/default-exit-ports/
+#: (content/operators/default-exit-ports/contents+en.lrquestion.description)
+msgid "reject 192.168.0.0/16"
+msgstr ""
+
+#: https//support.torproject.org/operators/default-exit-ports/
+#: (content/operators/default-exit-ports/contents+en.lrquestion.description)
+msgid "reject 10.0.0.0/8"
+msgstr ""
+
+#: https//support.torproject.org/operators/default-exit-ports/
+#: (content/operators/default-exit-ports/contents+en.lrquestion.description)
+msgid "reject 172.16.0.0/12"
+msgstr ""
+
+#: https//support.torproject.org/operators/default-exit-ports/
+#: (content/operators/default-exit-ports/contents+en.lrquestion.description)
+msgid "reject *:25"
+msgstr ""
+
+#: https//support.torproject.org/operators/default-exit-ports/
+#: (content/operators/default-exit-ports/contents+en.lrquestion.description)
+msgid "reject *:119"
+msgstr ""
+
+#: https//support.torproject.org/operators/default-exit-ports/
+#: (content/operators/default-exit-ports/contents+en.lrquestion.description)
+msgid "reject *:135-139"
+msgstr ""
+
+#: https//support.torproject.org/operators/default-exit-ports/
+#: (content/operators/default-exit-ports/contents+en.lrquestion.description)
+msgid "reject *:445"
+msgstr ""
+
+#: https//support.torproject.org/operators/default-exit-ports/
+#: (content/operators/default-exit-ports/contents+en.lrquestion.description)
+msgid "reject *:563"
+msgstr ""
+
+#: https//support.torproject.org/operators/default-exit-ports/
+#: (content/operators/default-exit-ports/contents+en.lrquestion.description)
+msgid "reject *:1214"
+msgstr ""
+
+#: https//support.torproject.org/operators/default-exit-ports/
+#: (content/operators/default-exit-ports/contents+en.lrquestion.description)
+msgid "reject *:4661-4666"
+msgstr ""
+
+#: https//support.torproject.org/operators/default-exit-ports/
+#: (content/operators/default-exit-ports/contents+en.lrquestion.description)
+msgid "reject *:6346-6429"
+msgstr ""
+
+#: https//support.torproject.org/operators/default-exit-ports/
+#: (content/operators/default-exit-ports/contents+en.lrquestion.description)
+msgid "reject *:6699"
+msgstr ""
+
+#: https//support.torproject.org/operators/default-exit-ports/
+#: (content/operators/default-exit-ports/contents+en.lrquestion.description)
+msgid "reject *:6881-6999"
+msgstr ""
+
+#: https//support.torproject.org/operators/default-exit-ports/
+#: (content/operators/default-exit-ports/contents+en.lrquestion.description)
+msgid "accept *:*"
+msgstr ""
+
+#: https//support.torproject.org/operators/default-exit-ports/
+#: (content/operators/default-exit-ports/contents+en.lrquestion.description)
+msgid ""
+"[1]: "
+"https://gitlab.torproject.org/tpo/core/tor/-/blob/release-0.4.6/src/core/or/policies.c#L85"
+msgstr ""
+
+#: https//support.torproject.org/operators/default-exit-ports/
+#: (content/operators/default-exit-ports/contents+en.lrquestion.description)
+msgid ""
+"[2]: "
+"https://gitlab.torproject.org/tpo/core/tor/-/blob/release-0.4.6/src/core/or/policies.c#L1901"
+msgstr ""
+
+#: https//support.torproject.org/operators/default-exit-ports/
+#: (content/operators/default-exit-ports/contents+en.lrquestion.description)
+msgid "[3]: https://gitlab.torproject.org/tpo/core/tor/-/tree/release-0.4.6/"
+msgstr ""
+
#: https//support.torproject.org/operators/dynamic-ip/
#: (content/operators/dynamic-ip/contents+en.lrquestion.title)
msgid "Can I run a Tor relay using a dynamic IP address?"
@@ -8155,21 +9070,6 @@ msgstr ""
"ÙباÙتاÙÙ Ùد تجد Ø£Ù٠غÙر Ùادر عÙ٠اÙتصÙØ Ø¨Ù
جرد دخÙ٠إصبع ÙدÙ
Ù ÙÙ Ùضع اÙسبات Ø"
" اÙØ°Ù ÙØ´Ùر Ø¥ÙÙÙ Ùذا اÙإدخا٠Ù٠اÙسجÙ:"
-#: https//support.torproject.org/operators/hibernation/
-#: (content/operators/hibernation/contents+en.lrquestion.description)
-#: https//support.torproject.org/operators/limit-total-bandwidth/
-#: (content/operators/limit-total-bandwidth/contents+en.lrquestion.description)
-#: https//support.torproject.org/misc/bug-or-feedback/
-#: (content/misc/bug-or-feedback/contents+en.lrquestion.description)
-#: https//support.torproject.org/get-in-touch/why-i-cant-join-tor-channels/
-#: (content/get-in-touch/why-i-cant-join-tor-channels/contents+en.lrquestion.description)
-#: https//support.torproject.org/apt/tor-deb-repo/
-#: (content/apt/apt-1/contents+en.lrquestion.description)
-#: https//support.torproject.org/apt/apt-over-tor/
-#: (content/apt/apt-3/contents+en.lrquestion.description)
-msgid "```"
-msgstr "```"
-
#: https//support.torproject.org/operators/hibernation/
#: (content/operators/hibernation/contents+en.lrquestion.description)
msgid "Bandwidth soft limit reached; commencing hibernation."
@@ -10870,6 +11770,131 @@ msgstr "uid tor-security at lists.torproject.org"
msgid "sub 4096R/C00942E4 2017-03-13"
msgstr "sub 4096R/C00942E4 2017-03-13"
+#: https//support.torproject.org/misc/check-socks-dns-leaks/
+#: (content/misc/check-socks-dns-leaks/contents+en.lrquestion.title)
+msgid ""
+"How do I check if my application that uses SOCKS is leaking DNS requests?"
+msgstr ""
+
+#: https//support.torproject.org/misc/check-socks-dns-leaks/
+#: (content/misc/check-socks-dns-leaks/contents+en.lrquestion.description)
+msgid ""
+"Even if your application is using the correct variant of the SOCKS protocol,"
+" there is still a risk that it could be leaking DNS queries."
+msgstr ""
+
+#: https//support.torproject.org/misc/check-socks-dns-leaks/
+#: (content/misc/check-socks-dns-leaks/contents+en.lrquestion.description)
+msgid ""
+"This problem happens in Firefox extensions that resolve the destination "
+"hostname themselves, for example to show you its IP address, what country "
+"it's in, etc."
+msgstr ""
+
+#: https//support.torproject.org/misc/check-socks-dns-leaks/
+#: (content/misc/check-socks-dns-leaks/contents+en.lrquestion.description)
+msgid ""
+"If you suspect your application might behave like this, follow the "
+"instructions below to check."
+msgstr ""
+
+#: https//support.torproject.org/misc/check-socks-dns-leaks/
+#: (content/misc/check-socks-dns-leaks/contents+en.lrquestion.description)
+msgid ""
+"1. Add `TestSocks 1` to your [torrc file](https://support.torproject.org/tbb"
+"/tbb-editing-torrc/)."
+msgstr ""
+
+#: https//support.torproject.org/misc/check-socks-dns-leaks/
+#: (content/misc/check-socks-dns-leaks/contents+en.lrquestion.description)
+msgid ""
+"1. Start Tor, and point your program's SOCKS proxy settings to Tor's SOCKS5 "
+"server (`socks5://127.0.0.1:9050` by default)."
+msgstr ""
+
+#: https//support.torproject.org/misc/check-socks-dns-leaks/
+#: (content/misc/check-socks-dns-leaks/contents+en.lrquestion.description)
+msgid ""
+"1. Watch your logs as you use your application. For each socks connection, "
+"Tor will log a `notice` for safe connections, and a `warn` for connections "
+"leaking DNS requests."
+msgstr ""
+
+#: https//support.torproject.org/misc/check-socks-dns-leaks/
+#: (content/misc/check-socks-dns-leaks/contents+en.lrquestion.description)
+msgid ""
+"If you want to automatically disable all connections leaking DNS requests, "
+"set `SafeSocks 1` in your torrc file."
+msgstr ""
+
+#: https//support.torproject.org/misc/hide-exits/
+#: (content/misc/hide-exits/contents+en.lrquestion.title)
+msgid ""
+"You should hide the list of Tor relays, so people can't block the exits."
+msgstr ""
+
+#: https//support.torproject.org/misc/hide-exits/
+#: (content/misc/hide-exits/contents+en.lrquestion.description)
+msgid "There are a few reasons we don't:"
+msgstr ""
+
+#: https//support.torproject.org/misc/hide-exits/
+#: (content/misc/hide-exits/contents+en.lrquestion.description)
+msgid ""
+"1. We can't help but make the information available, since Tor clients need "
+"to use it to pick their paths."
+msgstr ""
+
+#: https//support.torproject.org/misc/hide-exits/
+#: (content/misc/hide-exits/contents+en.lrquestion.description)
+msgid "So if the \"blockers\" want it, they can get it anyway."
+msgstr ""
+
+#: https//support.torproject.org/misc/hide-exits/
+#: (content/misc/hide-exits/contents+en.lrquestion.description)
+msgid ""
+"Further, even if we didn't tell clients about the list of relays directly, "
+"somebody could still make a lot of connections through Tor to a test site "
+"and build a list of the addresses they see."
+msgstr ""
+
+#: https//support.torproject.org/misc/hide-exits/
+#: (content/misc/hide-exits/contents+en.lrquestion.description)
+msgid ""
+"1. If people want to block us, we believe that they should be allowed to do "
+"so."
+msgstr ""
+
+#: https//support.torproject.org/misc/hide-exits/
+#: (content/misc/hide-exits/contents+en.lrquestion.description)
+msgid ""
+"Obviously, we would prefer for everybody to allow Tor users to connect to "
+"them, but people have the right to decide who their services should allow "
+"connections from, and if they want to block anonymous users, they can."
+msgstr ""
+
+#: https//support.torproject.org/misc/hide-exits/
+#: (content/misc/hide-exits/contents+en.lrquestion.description)
+msgid ""
+"1. Being blockable also has tactical advantages: it may be a persuasive "
+"response to website maintainers who feel threatened by Tor."
+msgstr ""
+
+#: https//support.torproject.org/misc/hide-exits/
+#: (content/misc/hide-exits/contents+en.lrquestion.description)
+msgid ""
+"Giving them the option may inspire them to stop and think about whether they"
+" really want to eliminate private access to their system, and if not, what "
+"other options they might have."
+msgstr ""
+
+#: https//support.torproject.org/misc/hide-exits/
+#: (content/misc/hide-exits/contents+en.lrquestion.description)
+msgid ""
+"The time they might otherwise have spent blocking Tor, they may instead "
+"spend rethinking their overall approach to privacy and anonymity."
+msgstr ""
+
#: https//support.torproject.org/misc/menu/
#: (content/misc/menu/contents+en.lrquestion.description)
msgid "About"
@@ -11557,64 +12582,21 @@ msgstr "### ÙÙÙÙØ© تÙعÙ٠اسÙ
اÙÙ
ستخدÙ
"
#: https//support.torproject.org/get-in-touch/why-i-cant-join-tor-channels/
#: (content/get-in-touch/why-i-cant-join-tor-channels/contents+en.lrquestion.description)
msgid ""
-"Then, to complete the registration and ultimately gain access to the #tor-"
-"project channel, your nickname must be **verified**."
+"After registering your nickname, to gain access to the #tor-project and "
+"other protected channels, your nickname must be **verified**."
msgstr ""
-"بعد Ø°ÙÙ Ø ÙØ¥ÙÙ
ا٠اÙتسجÙÙ ÙاÙÙصÙÙ Ù٠اÙÙÙاÙØ© Ø¥ÙÙ ÙÙاة # tor-project Ø Ùجب Ø£Ù "
-"ÙÙÙ٠اسÙ
٠اÙÙ
ستعار ** Ù
تØÙÙ Ù
ÙÙ **."
#: https//support.torproject.org/get-in-touch/why-i-cant-join-tor-channels/
#: (content/get-in-touch/why-i-cant-join-tor-channels/contents+en.lrquestion.description)
msgid ""
-"1. To verify your nick, open a new browser window and go to "
-"https://webchat.oftc.net/?channels=tor."
-msgstr ""
-"1. ÙÙتØÙÙ Ù
Ù ÙÙÙ Ø Ø§ÙØªØ ÙاÙذة Ù
تصÙØ Ø¬Ø¯Ùدة ÙاÙتÙ٠إÙÙ "
-"https://webchat.oftc.net/Øchannels=tor."
-
-#: https//support.torproject.org/get-in-touch/why-i-cant-join-tor-channels/
-#: (content/get-in-touch/why-i-cant-join-tor-channels/contents+en.lrquestion.description)
-msgid "2. Log in with your IRC nickname and password."
+"1. Go to https://services.oftc.net/ and follow the steps in the '*To verify "
+"your account*' section"
msgstr ""
-"2. ÙÙ
بتسجÙ٠اÙدخÙ٠باستخداÙ
اÙاسÙ
اÙÙ
ستعار ÙÙÙÙ
Ø© اÙÙ
رÙر اÙخاصÙ٠ب٠عÙÙ IRC."
#: https//support.torproject.org/get-in-touch/why-i-cant-join-tor-channels/
#: (content/get-in-touch/why-i-cant-join-tor-channels/contents+en.lrquestion.description)
-msgid ""
-"3. Look for the word **verify** and log in there. It may appear that nothing"
-" has happened. Look at the top of the page, and there will be a column "
-"called **Account**."
+msgid "2. Go back to the IRC webpage where you are logged in and type:"
msgstr ""
-"3. ابØØ« ع٠ÙÙÙ
Ø© ** تØÙÙ ** ÙÙÙ
بتسجÙ٠اÙدخÙÙ ÙÙاÙ. Ùد Ùبد٠أÙÙ ÙÙ
ÙØدث Ø´ÙØ¡. "
-"اÙظر Ø¥Ù٠أعÙ٠اÙصÙØØ© Ø ÙسÙÙÙÙ ÙÙا٠عÙ
Ùد ÙسÙ
Ù ** اÙØساب **."
-
-#: https//support.torproject.org/get-in-touch/why-i-cant-join-tor-channels/
-#: (content/get-in-touch/why-i-cant-join-tor-channels/contents+en.lrquestion.description)
-msgid "4. Click on **Account**."
-msgstr "4. اÙÙر ÙÙÙ ** اÙØساب **."
-
-#: https//support.torproject.org/get-in-touch/why-i-cant-join-tor-channels/
-#: (content/get-in-touch/why-i-cant-join-tor-channels/contents+en.lrquestion.description)
-msgid ""
-"5. Click on the small sentence at the bottom of the square that says: Verify"
-" account."
-msgstr "5. اÙÙر عÙ٠اÙجÙ
ÙØ© اÙصغÙرة Ù٠أسÙ٠اÙÙ
ربع اÙØ°Ù ÙÙÙÙ: تØÙÙ Ù
٠اÙØساب."
-
-#: https//support.torproject.org/get-in-touch/why-i-cant-join-tor-channels/
-#: (content/get-in-touch/why-i-cant-join-tor-channels/contents+en.lrquestion.description)
-msgid "6. Fill out the Captcha that pops up, and click ok."
-msgstr "6. اÙ
ÙØ£ ÙÙÙ
Ø© اÙتØÙ٠اÙت٠تÙØ¨Ø«Ù Ø ÙاÙÙر ÙÙÙ Ù
ÙاÙÙ."
-
-#: https//support.torproject.org/get-in-touch/why-i-cant-join-tor-channels/
-#: (content/get-in-touch/why-i-cant-join-tor-channels/contents+en.lrquestion.description)
-msgid ""
-"7. A tiny message will appear: \"Your NickServ account has been verified.\""
-msgstr "7. ستظÙر Ù٠رساÙØ© صغÙرة تخبرÙ: \"Øساب٠Ùد تÙ
تÙعÙÙÙ\"."
-
-#: https//support.torproject.org/get-in-touch/why-i-cant-join-tor-channels/
-#: (content/get-in-touch/why-i-cant-join-tor-channels/contents+en.lrquestion.description)
-msgid "8. Go back to the IRC webpage where you are logged in and type:"
-msgstr "8. ÙÙ
باÙرجÙع Ù
جددÙا Ø¥Ù٠صÙØØ© اÙدردشة اÙت٠Ùد سجÙت دخÙ٠إÙÙÙا ÙاÙتب:"
#: https//support.torproject.org/get-in-touch/why-i-cant-join-tor-channels/
#: (content/get-in-touch/why-i-cant-join-tor-channels/contents+en.lrquestion.description)
@@ -11623,13 +12605,13 @@ msgstr "`/msg اسÙ
اÙÙ
ستخدÙ
تØÙÙ`"
#: https//support.torproject.org/get-in-touch/why-i-cant-join-tor-channels/
#: (content/get-in-touch/why-i-cant-join-tor-channels/contents+en.lrquestion.description)
-msgid "9. Click ENTER."
-msgstr "9. اضغط إدخاÙ."
+msgid "3. Click ENTER."
+msgstr ""
#: https//support.torproject.org/get-in-touch/why-i-cant-join-tor-channels/
#: (content/get-in-touch/why-i-cant-join-tor-channels/contents+en.lrquestion.description)
-msgid "10. If all is well, you will receive a message that says:"
-msgstr "10. إذا Ùا٠ÙÙ Ø´ÙØ¡ صØÙØØ Ø³ØªØµÙ٠رساÙØ© تخبر٠أÙ:"
+msgid "4. If all is well, you will receive a message that says:"
+msgstr ""
#: https//support.torproject.org/get-in-touch/why-i-cant-join-tor-channels/
#: (content/get-in-touch/why-i-cant-join-tor-channels/contents+en.lrquestion.description)
@@ -11788,21 +12770,23 @@ msgstr "# apt install apt-transport-https"
#: https//support.torproject.org/apt/tor-deb-repo/
#: (content/apt/apt-1/contents+en.lrquestion.description)
msgid ""
-"#### 2. Add the following entries to `/etc/apt/sources.list` or a new file "
-"in `/etc/apt/sources.list.d/`"
+"#### 2. Create a new file in `/etc/apt/sources.list.d/` named `tor.list`. "
+"Add the following entries:"
msgstr ""
-"#### 2. ÙÙ
بإضاÙØ© اÙÙ
دخÙات اÙتاÙÙØ© Ø¥ÙÙ `/etc/apt/sources.list` أ٠إÙÙ Ù
جÙد "
-"جدÙد ÙÙ `/etc/apt/sources.list.d/`"
#: https//support.torproject.org/apt/tor-deb-repo/
#: (content/apt/apt-1/contents+en.lrquestion.description)
-msgid "deb https://deb.torproject.org/torproject.org <DISTRIBUTION> main"
-msgstr "deb https://deb.torproject.org/torproject.org <DISTRIBUTION> main"
+msgid ""
+"deb [signed-by=/usr/share/keyrings/tor-archive-keyring.gpg] "
+"https://deb.torproject.org/torproject.org <DISTRIBUTION> main"
+msgstr ""
#: https//support.torproject.org/apt/tor-deb-repo/
#: (content/apt/apt-1/contents+en.lrquestion.description)
-msgid "deb-src https://deb.torproject.org/torproject.org <DISTRIBUTION> main"
-msgstr "deb-src https://deb.torproject.org/torproject.org <DISTRIBUTION> main"
+msgid ""
+"deb-src [signed-by=/usr/share/keyrings/tor-archive-keyring.gpg] "
+"https://deb.torproject.org/torproject.org <DISTRIBUTION> main"
+msgstr ""
#: https//support.torproject.org/apt/tor-deb-repo/
#: (content/apt/apt-1/contents+en.lrquestion.description)
@@ -11818,20 +12802,18 @@ msgstr ""
#: https//support.torproject.org/apt/tor-deb-repo/
#: (content/apt/apt-1/contents+en.lrquestion.description)
msgid ""
-"deb https://deb.torproject.org/torproject.org tor-"
+"deb [signed-by=/usr/share/keyrings/tor-archive-keyring.gpg] "
+"https://deb.torproject.org/torproject.org tor-"
"experimental-0.4.6.x-<DISTRIBUTION> main"
msgstr ""
-"deb https://deb.torproject.org/torproject.org tor-"
-"experimental-0.4.6.x-<DISTRIBUTION> main"
#: https//support.torproject.org/apt/tor-deb-repo/
#: (content/apt/apt-1/contents+en.lrquestion.description)
msgid ""
-"deb-src https://deb.torproject.org/torproject.org tor-"
+"deb-src [signed-by=/usr/share/keyrings/tor-archive-keyring.gpg] "
+"https://deb.torproject.org/torproject.org tor-"
"experimental-0.4.6.x-<DISTRIBUTION> main"
msgstr ""
-"deb-src https://deb.torproject.org/torproject.org tor-"
-"experimental-0.4.6.x-<DISTRIBUTION> main"
#: https//support.torproject.org/apt/tor-deb-repo/
#: (content/apt/apt-1/contents+en.lrquestion.description)
@@ -11841,20 +12823,18 @@ msgstr "Ø£Ù ÙبÙÙ ÙÙÙا:"
#: https//support.torproject.org/apt/tor-deb-repo/
#: (content/apt/apt-1/contents+en.lrquestion.description)
msgid ""
-"deb https://deb.torproject.org/torproject.org tor-nightly-"
-"master-<DISTRIBUTION> main"
+"deb [signed-by=/usr/share/keyrings/tor-archive-keyring.gpg] "
+"https://deb.torproject.org/torproject.org tor-nightly-master-<DISTRIBUTION> "
+"main"
msgstr ""
-"deb https://deb.torproject.org/torproject.org tor-nightly-"
-"master-<DISTRIBUTION> main"
#: https//support.torproject.org/apt/tor-deb-repo/
#: (content/apt/apt-1/contents+en.lrquestion.description)
msgid ""
-"deb-src https://deb.torproject.org/torproject.org tor-nightly-"
-"master-<DISTRIBUTION> main"
+"deb-src [signed-by=/usr/share/keyrings/tor-archive-keyring.gpg] "
+"https://deb.torproject.org/torproject.org tor-nightly-master-<DISTRIBUTION> "
+"main"
msgstr ""
-"deb-src https://deb.torproject.org/torproject.org tor-nightly-"
-"master-<DISTRIBUTION> main"
#: https//support.torproject.org/apt/tor-deb-repo/
#: (content/apt/apt-1/contents+en.lrquestion.description)
@@ -11878,16 +12858,16 @@ msgstr ""
#: https//support.torproject.org/apt/tor-deb-repo/
#: (content/apt/apt-1/contents+en.lrquestion.description)
msgid ""
-"deb [arch=amd64] https://deb.torproject.org/torproject.org focal main"
+"deb [arch=amd64 signed-by=/usr/share/keyrings/tor-archive-keyring.gpg] "
+"https://deb.torproject.org/torproject.org focal main"
msgstr ""
-"deb [arch=amd64] https://deb.torproject.org/torproject.org focal main"
#: https//support.torproject.org/apt/tor-deb-repo/
#: (content/apt/apt-1/contents+en.lrquestion.description)
msgid ""
-"deb-src [arch=amd64] https://deb.torproject.org/torproject.org focal main"
+"deb-src [arch=amd64 signed-by=/usr/share/keyrings/tor-archive-keyring.gpg] "
+"https://deb.torproject.org/torproject.org focal main"
msgstr ""
-"deb-src [arch=amd64] https://deb.torproject.org/torproject.org focal main"
#: https//support.torproject.org/apt/tor-deb-repo/
#: (content/apt/apt-1/contents+en.lrquestion.description)
@@ -11909,28 +12889,17 @@ msgstr ""
#: (content/apt/apt-1/contents+en.lrquestion.description)
msgid ""
"#### 3. Then add the gpg key used to sign the packages by running the "
-"following commands at your command prompt"
+"following command at your command prompt:"
msgstr ""
-"#### 3. Ø«Ù
أض٠Ù
ÙØªØ§Ø gpg اÙÙ
ستخدÙ
ÙتÙÙÙع اÙØزÙ
ع٠طرÙ٠تشغÙ٠اÙØ£ÙاÙ
ر اÙتاÙÙØ©"
-" ÙÙ Ù
Ùج٠اÙØ£ÙاÙ
ر"
#: https//support.torproject.org/apt/tor-deb-repo/
#: (content/apt/apt-1/contents+en.lrquestion.description)
msgid ""
-"# wget -qO- "
+"# wget -O- "
"https://deb.torproject.org/torproject.org/A3C4F0F979CAA22CDBA8F512EE8CBC9E886DDD89.asc"
-" | gpg --import"
+" | gpg --dearmor | tee /usr/share/keyrings/tor-archive-keyring.gpg "
+">/dev/null"
msgstr ""
-"# wget -qO- "
-"https://deb.torproject.org/torproject.org/A3C4F0F979CAA22CDBA8F512EE8CBC9E886DDD89.asc"
-" | gpg --import"
-
-#: https//support.torproject.org/apt/tor-deb-repo/
-#: (content/apt/apt-1/contents+en.lrquestion.description)
-msgid ""
-"# gpg --export A3C4F0F979CAA22CDBA8F512EE8CBC9E886DDD89 | apt-key add -"
-msgstr ""
-"# gpg --export A3C4F0F979CAA22CDBA8F512EE8CBC9E886DDD89 | apt-key add -"
#: https//support.torproject.org/apt/tor-deb-repo/
#: (content/apt/apt-1/contents+en.lrquestion.description)
@@ -13869,6 +14838,82 @@ msgstr ""
"Ùا Ø ÙØ£Ù Ùذا اÙÙ
ستخدÙ
ÙÙÙÙ
بتØدÙØ« ÙائÙ
Ø© اÙÙ
رØÙات اÙخاصة ب٠ÙØ«ÙرÙا Ù
Ø«Ù Ù
ستخدÙ
"
" Ùا ÙغÙر عÙÙا٠IP عÙÙ Ù
دار اÙÙÙÙ
."
+#: https//support.torproject.org/alternate-designs/block-websites/
+#: (content/alternate-designs/block-websites/contents+en.lrquestion.title)
+msgid "Exit policies should be able to block websites, not just IP addresses."
+msgstr ""
+
+#: https//support.torproject.org/alternate-designs/block-websites/
+#: (content/alternate-designs/block-websites/contents+en.lrquestion.description)
+msgid ""
+"It would be nice to let relay operators say things like `reject "
+"www.slashdot.org` in their exit policies, rather than requiring them to "
+"learn all the IP address space that could be covered by the site (and then "
+"also blocking other sites at those IP addresses)."
+msgstr ""
+
+#: https//support.torproject.org/alternate-designs/block-websites/
+#: (content/alternate-designs/block-websites/contents+en.lrquestion.description)
+msgid "There are two problems, though."
+msgstr ""
+
+#: https//support.torproject.org/alternate-designs/block-websites/
+#: (content/alternate-designs/block-websites/contents+en.lrquestion.description)
+msgid "First, users could still get around these blocks."
+msgstr ""
+
+#: https//support.torproject.org/alternate-designs/block-websites/
+#: (content/alternate-designs/block-websites/contents+en.lrquestion.description)
+msgid ""
+"For example, they could request the IP address rather than the hostname when"
+" they exit from the Tor network."
+msgstr ""
+
+#: https//support.torproject.org/alternate-designs/block-websites/
+#: (content/alternate-designs/block-websites/contents+en.lrquestion.description)
+msgid ""
+"This means operators would still need to learn all the IP addresses for the "
+"destinations in question."
+msgstr ""
+
+#: https//support.torproject.org/alternate-designs/block-websites/
+#: (content/alternate-designs/block-websites/contents+en.lrquestion.description)
+msgid ""
+"The second problem is that it would allow remote attackers to censor "
+"arbitrary sites."
+msgstr ""
+
+#: https//support.torproject.org/alternate-designs/block-websites/
+#: (content/alternate-designs/block-websites/contents+en.lrquestion.description)
+msgid ""
+"For example, if a Tor operator blocks www1.slashdot.org, and then some "
+"attacker poisons the Tor relay's DNS or otherwise changes that hostname to "
+"resolve to the IP address for a major news site, then suddenly that Tor "
+"relay is blocking the news site."
+msgstr ""
+
+#: https//support.torproject.org/alternate-designs/let-the-network-pick-the-path/
+#: (content/alternate-designs/let-the-network-pick-the-path/contents+en.lrquestion.title)
+msgid "You should let the network pick the path, not the client."
+msgstr ""
+
+#: https//support.torproject.org/alternate-designs/let-the-network-pick-the-path/
+#: (content/alternate-designs/let-the-network-pick-the-path/contents+en.lrquestion.description)
+msgid "No, you cannot trust the network to pick the path."
+msgstr ""
+
+#: https//support.torproject.org/alternate-designs/let-the-network-pick-the-path/
+#: (content/alternate-designs/let-the-network-pick-the-path/contents+en.lrquestion.description)
+msgid "Malicious relays could route you through their colluding friends."
+msgstr ""
+
+#: https//support.torproject.org/alternate-designs/let-the-network-pick-the-path/
+#: (content/alternate-designs/let-the-network-pick-the-path/contents+en.lrquestion.description)
+msgid ""
+"This would give an adversary the ability to watch all of your traffic end to"
+" end."
+msgstr ""
+
#: lego/templates/banner.html:3 lego/templates/banner.html:5
#: templates/banner.html:3 templates/banner.html:5
msgid "Close banner"
@@ -13899,8 +14944,8 @@ msgid "DONATE NOW"
msgstr "تبرع اÙØ¢Ù"
#: lego/templates/footer.html:13 lego/templates/footer.html:22
-#: lego/templates/navbar.html:83 templates/footer.html:13
-#: templates/footer.html:22 templates/navbar.html:83
+#: lego/templates/navbar.html:95 templates/footer.html:13
+#: templates/footer.html:22 templates/navbar.html:95
msgid "Download Tor Browser"
msgstr "تÙزÙÙ Ù
تصÙØ ØªÙر"
diff --git a/contents+bn.po b/contents+bn.po
index 9898451fcb..f7b0ac0bc6 100644
--- a/contents+bn.po
+++ b/contents+bn.po
@@ -14,7 +14,7 @@ msgid ""
msgstr ""
"Project-Id-Version: PACKAGE VERSION\n"
"Report-Msgid-Bugs-To: \n"
-"POT-Creation-Date: 2021-08-25 11:14+CET\n"
+"POT-Creation-Date: 2021-09-01 12:20+CET\n"
"PO-Revision-Date: 2018-10-02 22:41+0000\n"
"Last-Translator: Foxom Toto <foxomot957 at coalamails.com>, 2021\n"
"Language-Team: Bengali (https://www.transifex.com/otf/teams/1519/bn/)\n"
@@ -147,6 +147,11 @@ msgstr "à¦
পবà§à¦¯à¦¬à¦¹à¦¾à¦° পà§à¦°à¦¾à¦à¦¿à¦ªà§à¦°"
msgid "Tor Metrics"
msgstr "à¦à¦° পরিসà¦à¦à§à¦¯à¦¾à¦¨"
+#: https//support.torproject.org/alternate-designs/
+#: (content/alternate-designs/contents+en.lrtopic.title)
+msgid "Alternate Designs We Don't Do (Yet)"
+msgstr ""
+
#: https//support.torproject.org/glossary/add-on-extension-or-plugin/
#: (content/glossary/add-on-extension-or-plugin/contents+en.lrword.term)
msgid "add-on, extension, or plugin"
@@ -2042,6 +2047,61 @@ msgstr ""
"[à¦à¦¿à¦ªà¦¿à¦à¦¨](https://trac.torproject.org/projects/tor/wiki/doc/TorPlusVPN) "
"সমà§à¦ªà¦°à§à¦à§ à¦à¦°à§ বিসà§à¦¤à¦¾à¦°à¦¿à¦¤ তথà§à¦¯ পà§à¦¤à§ পারà§à¦¨à¥¤"
+#: https//support.torproject.org/faq/relay-donations/
+#: (content/faq/relay-donations/contents+en.lrquestion.title)
+msgid "Can I donate for a relay rather than run my own?"
+msgstr ""
+
+#: https//support.torproject.org/faq/relay-donations/
+#: (content/faq/relay-donations/contents+en.lrquestion.description)
+msgid ""
+"Sure! We have a [list of organizations that run Tor "
+"relays](https://community.torproject.org/relay/community-resources/relay-"
+"associations/) that are happy to turn your donations into better speed and "
+"anonymity for the Tor network."
+msgstr ""
+
+#: https//support.torproject.org/faq/relay-donations/
+#: (content/faq/relay-donations/contents+en.lrquestion.description)
+msgid ""
+"These organizations are not the same as [The Tor Project, "
+"Inc](https://donate.torproject.org/), but we consider that a good thing."
+msgstr ""
+
+#: https//support.torproject.org/faq/relay-donations/
+#: (content/faq/relay-donations/contents+en.lrquestion.description)
+msgid "They're run by nice people who are part of the Tor community."
+msgstr ""
+
+#: https//support.torproject.org/faq/relay-donations/
+#: (content/faq/relay-donations/contents+en.lrquestion.description)
+msgid ""
+"Note that there can be a tradeoff here between anonymity and performance."
+msgstr ""
+
+#: https//support.torproject.org/faq/relay-donations/
+#: (content/faq/relay-donations/contents+en.lrquestion.description)
+msgid ""
+"The Tor network's anonymity comes in part from diversity, so if you are in a"
+" position to run your own relay, you will be improving Tor's anonymity more "
+"than by donating."
+msgstr ""
+
+#: https//support.torproject.org/faq/relay-donations/
+#: (content/faq/relay-donations/contents+en.lrquestion.description)
+msgid ""
+"At the same time though, economies of scale for bandwidth mean that "
+"combining many small donations into several larger relays is more efficient "
+"at improving network performance."
+msgstr ""
+
+#: https//support.torproject.org/faq/relay-donations/
+#: (content/faq/relay-donations/contents+en.lrquestion.description)
+msgid ""
+"Improving anonymity and improving performance are both worthwhile goals, so "
+"however you can help is great!"
+msgstr ""
+
#: https//support.torproject.org/faq/staying-anonymous/
#: (content/faq/staying-anonymous/contents+en.lrquestion.title)
msgid "Am I totally anonymous if I use Tor?"
@@ -2345,6 +2405,61 @@ msgid ""
" documenting all the issues](https://community.torproject.org/)."
msgstr ""
+#: https//support.torproject.org/about/attacks-on-onion-routing/
+#: (content/about/attacks-on-onion-routing/contents+en.lrquestion.title)
+msgid "What attacks remain against onion routing?"
+msgstr ""
+
+#: https//support.torproject.org/about/attacks-on-onion-routing/
+#: (content/about/attacks-on-onion-routing/contents+en.lrquestion.description)
+msgid ""
+"As mentioned above, it is possible for an observer who can view both you and"
+" either the destination website or your Tor exit node to correlate timings "
+"of your traffic as it enters the Tor network and also as it exits."
+msgstr ""
+
+#: https//support.torproject.org/about/attacks-on-onion-routing/
+#: (content/about/attacks-on-onion-routing/contents+en.lrquestion.description)
+msgid "Tor does not defend against such a threat model."
+msgstr ""
+
+#: https//support.torproject.org/about/attacks-on-onion-routing/
+#: (content/about/attacks-on-onion-routing/contents+en.lrquestion.description)
+msgid ""
+"In a more limited sense, note that if a censor or law enforcement agency has"
+" the ability to obtain specific observation of parts of the network, it is "
+"possible for them to verify a suspicion that you talk regularly to your "
+"friend by observing traffic at both ends and correlating the timing of only "
+"that traffic."
+msgstr ""
+
+#: https//support.torproject.org/about/attacks-on-onion-routing/
+#: (content/about/attacks-on-onion-routing/contents+en.lrquestion.description)
+msgid ""
+"Again, this is only useful to verify that parties already suspected of "
+"communicating with one another are doing so."
+msgstr ""
+
+#: https//support.torproject.org/about/attacks-on-onion-routing/
+#: (content/about/attacks-on-onion-routing/contents+en.lrquestion.description)
+msgid ""
+"In most countries, the suspicion required to obtain a warrant already "
+"carries more weight than timing correlation would provide."
+msgstr ""
+
+#: https//support.torproject.org/about/attacks-on-onion-routing/
+#: (content/about/attacks-on-onion-routing/contents+en.lrquestion.description)
+msgid ""
+"Furthermore, since Tor reuses circuits for multiple TCP connections, it is "
+"possible to associate non anonymous and anonymous traffic at a given exit "
+"node, so be careful about what applications you run concurrently over Tor."
+msgstr ""
+
+#: https//support.torproject.org/about/attacks-on-onion-routing/
+#: (content/about/attacks-on-onion-routing/contents+en.lrquestion.description)
+msgid "Perhaps even run separate Tor clients for these applications."
+msgstr ""
+
#: https//support.torproject.org/about/backdoor/
#: (content/about/backdoor/contents+en.lrquestion.title)
msgid "Is there a backdoor in Tor?"
@@ -2480,6 +2595,43 @@ msgid ""
"recommended](/tbb/tbb-9/)."
msgstr ""
+#: https//support.torproject.org/about/change-paths/
+#: (content/about/change-paths/contents+en.lrquestion.title)
+msgid "How often does Tor change its paths?"
+msgstr ""
+
+#: https//support.torproject.org/about/change-paths/
+#: (content/about/change-paths/contents+en.lrquestion.description)
+msgid ""
+"Tor will reuse the same circuit for new TCP streams for 10 minutes, as long "
+"as the circuit is working fine."
+msgstr ""
+
+#: https//support.torproject.org/about/change-paths/
+#: (content/about/change-paths/contents+en.lrquestion.description)
+msgid "(If the circuit fails, Tor will switch to a new circuit immediately.)"
+msgstr ""
+
+#: https//support.torproject.org/about/change-paths/
+#: (content/about/change-paths/contents+en.lrquestion.description)
+msgid ""
+"But note that a single TCP stream (e.g. a long IRC connection) will stay on "
+"the same circuit forever."
+msgstr ""
+
+#: https//support.torproject.org/about/change-paths/
+#: (content/about/change-paths/contents+en.lrquestion.description)
+msgid "We don't rotate individual streams from one circuit to the next."
+msgstr ""
+
+#: https//support.torproject.org/about/change-paths/
+#: (content/about/change-paths/contents+en.lrquestion.description)
+msgid ""
+"Otherwise, an adversary with a partial view of the network would be given "
+"many chances over time to link you to your destination, rather than just one"
+" chance."
+msgstr ""
+
#: https//support.torproject.org/about/distribute-tor/
#: (content/about/distribute-tor/contents+en.lrquestion.title)
msgid "Can I distribute Tor?"
@@ -2575,6 +2727,133 @@ msgid ""
"details."
msgstr ""
+#: https//support.torproject.org/about/entry-guards/
+#: (content/about/entry-guards/contents+en.lrquestion.title)
+msgid "What are Entry Guards?"
+msgstr ""
+
+#: https//support.torproject.org/about/entry-guards/
+#: (content/about/entry-guards/contents+en.lrquestion.description)
+msgid ""
+"Tor (like all current practical low-latency anonymity designs) fails when "
+"the attacker can see both ends of the communications channel."
+msgstr ""
+
+#: https//support.torproject.org/about/entry-guards/
+#: (content/about/entry-guards/contents+en.lrquestion.description)
+msgid ""
+"For example, suppose the attacker controls or watches the Tor relay you "
+"choose to enter the network, and also controls or watches the website you "
+"visit."
+msgstr ""
+
+#: https//support.torproject.org/about/entry-guards/
+#: (content/about/entry-guards/contents+en.lrquestion.description)
+msgid ""
+"In this case, the research community knows no practical low-latency design "
+"that can reliably stop the attacker from correlating volume and timing "
+"information on the two sides."
+msgstr ""
+
+#: https//support.torproject.org/about/entry-guards/
+#: (content/about/entry-guards/contents+en.lrquestion.description)
+msgid "So, what should we do?"
+msgstr ""
+
+#: https//support.torproject.org/about/entry-guards/
+#: (content/about/entry-guards/contents+en.lrquestion.description)
+msgid "Suppose the attacker controls, or can observe, C relays."
+msgstr ""
+
+#: https//support.torproject.org/about/entry-guards/
+#: (content/about/entry-guards/contents+en.lrquestion.description)
+msgid "Suppose there are N relays total."
+msgstr ""
+
+#: https//support.torproject.org/about/entry-guards/
+#: (content/about/entry-guards/contents+en.lrquestion.description)
+msgid ""
+"If you select new entry and exit relays each time you use the network, the "
+"attacker will be able to correlate all traffic you send with probability "
+"around (c/n)2."
+msgstr ""
+
+#: https//support.torproject.org/about/entry-guards/
+#: (content/about/entry-guards/contents+en.lrquestion.description)
+msgid ""
+"But profiling is, for most users, as bad as being traced all the time: they "
+"want to do something often without an attacker noticing, and the attacker "
+"noticing once is as bad as the attacker noticing more often."
+msgstr ""
+
+#: https//support.torproject.org/about/entry-guards/
+#: (content/about/entry-guards/contents+en.lrquestion.description)
+msgid ""
+"Thus, choosing many random entries and exits gives the user no chance of "
+"escaping profiling by this kind of attacker."
+msgstr ""
+
+#: https//support.torproject.org/about/entry-guards/
+#: (content/about/entry-guards/contents+en.lrquestion.description)
+msgid ""
+"The solution is \"entry guards\": each Tor client selects a few relays at "
+"random to use as entry points, and uses only those relays for their first "
+"hop."
+msgstr ""
+
+#: https//support.torproject.org/about/entry-guards/
+#: (content/about/entry-guards/contents+en.lrquestion.description)
+msgid ""
+"If those relays are not controlled or observed, the attacker can't win, "
+"ever, and the user is secure."
+msgstr ""
+
+#: https//support.torproject.org/about/entry-guards/
+#: (content/about/entry-guards/contents+en.lrquestion.description)
+msgid ""
+"If those relays are observed or controlled by the attacker, the attacker "
+"sees a larger fraction of the user's traffic - but still the user is no more"
+" profiled than before."
+msgstr ""
+
+#: https//support.torproject.org/about/entry-guards/
+#: (content/about/entry-guards/contents+en.lrquestion.description)
+msgid ""
+"Thus, the user has some chance (on the order of (n-c)/n) of avoiding "
+"profiling, whereas they had none before."
+msgstr ""
+
+#: https//support.torproject.org/about/entry-guards/
+#: (content/about/entry-guards/contents+en.lrquestion.description)
+msgid ""
+"You can read more at [An Analysis of the Degradation of Anonymous "
+"Protocols](http://freehaven.net/anonbib/#wright02), [Defending Anonymous "
+"Communication Against Passive Logging "
+"Attacks](http://freehaven.net/anonbib/#wright03), and especially [Locating "
+"Hidden Servers](http://freehaven.net/anonbib/#hs-attack06)."
+msgstr ""
+
+#: https//support.torproject.org/about/entry-guards/
+#: (content/about/entry-guards/contents+en.lrquestion.description)
+msgid ""
+"Restricting your entry nodes may also help against attackers who want to run"
+" a few Tor nodes and easily enumerate all of the Tor user IP addresses."
+msgstr ""
+
+#: https//support.torproject.org/about/entry-guards/
+#: (content/about/entry-guards/contents+en.lrquestion.description)
+msgid ""
+"(Even though they can't learn what destinations the users are talking to, "
+"they still might be able to do bad things with just a list of users.)"
+msgstr ""
+
+#: https//support.torproject.org/about/entry-guards/
+#: (content/about/entry-guards/contents+en.lrquestion.description)
+msgid ""
+"However, that feature won't really become useful until we move to a "
+"\"directory guard\" design as well."
+msgstr ""
+
#: https//support.torproject.org/about/how-is-tor-different-from-other-proxies/
#: (content/about/how-is-tor-different-from-other-proxies/contents+en.lrquestion.title)
msgid "How is Tor different from other proxies?"
@@ -2745,6 +3024,162 @@ msgid ""
" Tor and HTTPS interact."
msgstr ""
+#: https//support.torproject.org/about/key-management/
+#: (content/about/key-management/contents+en.lrquestion.title)
+msgid "Tell me about all the keys Tor uses"
+msgstr ""
+
+#: https//support.torproject.org/about/key-management/
+#: (content/about/key-management/contents+en.lrquestion.description)
+msgid ""
+"Tor uses a variety of different keys, with three goals in mind: 1) "
+"encryption to ensure privacy of data within the Tor network, 2) "
+"authentication so clients know they're talking to the relays they meant to "
+"talk to, and 3) signatures to make sure all clients know the same set of "
+"relays."
+msgstr ""
+
+#: https//support.torproject.org/about/key-management/
+#: (content/about/key-management/contents+en.lrquestion.description)
+msgid ""
+"**Encryption**: first, all connections in Tor use TLS link encryption, so "
+"observers can't look inside to see which circuit a given cell is intended "
+"for."
+msgstr ""
+
+#: https//support.torproject.org/about/key-management/
+#: (content/about/key-management/contents+en.lrquestion.description)
+msgid ""
+"Further, the Tor client establishes an ephemeral encryption key with each "
+"relay in the circuit; these extra layers of encryption mean that only the "
+"exit relay can read the cells."
+msgstr ""
+
+#: https//support.torproject.org/about/key-management/
+#: (content/about/key-management/contents+en.lrquestion.description)
+msgid ""
+"Both sides discard the circuit key when the circuit ends, so logging traffic"
+" and then breaking into the relay to discover the key won't work."
+msgstr ""
+
+#: https//support.torproject.org/about/key-management/
+#: (content/about/key-management/contents+en.lrquestion.description)
+msgid ""
+"**Authentication**: Every Tor relay has a public decryption key called the "
+"\"onion key\"."
+msgstr ""
+
+#: https//support.torproject.org/about/key-management/
+#: (content/about/key-management/contents+en.lrquestion.description)
+msgid "Each relay rotates its onion key once a week."
+msgstr ""
+
+#: https//support.torproject.org/about/key-management/
+#: (content/about/key-management/contents+en.lrquestion.description)
+msgid ""
+"When the Tor client establishes circuits, at each step it [demands that the "
+"Tor relay prove knowledge of its onion key](https://svn-"
+"archive.torproject.org/svn/projects/design-paper/tor-"
+"design.html#subsec:circuits)."
+msgstr ""
+
+#: https//support.torproject.org/about/key-management/
+#: (content/about/key-management/contents+en.lrquestion.description)
+msgid ""
+"That way the first node in the path can't just spoof the rest of the path."
+msgstr ""
+
+#: https//support.torproject.org/about/key-management/
+#: (content/about/key-management/contents+en.lrquestion.description)
+msgid ""
+"Because the Tor client chooses the path, it can make sure to get Tor's "
+"\"distributed trust\" property: no single relay in the path can know about "
+"both the client and what the client is doing."
+msgstr ""
+
+#: https//support.torproject.org/about/key-management/
+#: (content/about/key-management/contents+en.lrquestion.description)
+msgid ""
+"**Coordination**: How do clients know what the relays are, and how do they "
+"know that they have the right keys for them?"
+msgstr ""
+
+#: https//support.torproject.org/about/key-management/
+#: (content/about/key-management/contents+en.lrquestion.description)
+msgid "Each relay has a long-term public signing key called the \"identity key\"."
+msgstr ""
+
+#: https//support.torproject.org/about/key-management/
+#: (content/about/key-management/contents+en.lrquestion.description)
+msgid "Each directory authority additionally has a \"directory signing key\"."
+msgstr ""
+
+#: https//support.torproject.org/about/key-management/
+#: (content/about/key-management/contents+en.lrquestion.description)
+msgid ""
+"The directory authorities [provide a signed "
+"list](https://gitweb.torproject.org/torspec.git/tree/dir-spec.txt) of all "
+"the known relays, and in that list are a set of certificates from each relay"
+" (self-signed by their identity key) specifying their keys, locations, exit "
+"policies, and so on."
+msgstr ""
+
+#: https//support.torproject.org/about/key-management/
+#: (content/about/key-management/contents+en.lrquestion.description)
+msgid ""
+"So unless the adversary can control a majority of the directory authorities "
+"(as of 2021 there are 10 directory authorities), they can't trick the Tor "
+"client into using other Tor relays."
+msgstr ""
+
+#: https//support.torproject.org/about/key-management/
+#: (content/about/key-management/contents+en.lrquestion.description)
+msgid "How do clients know what the directory authorities are?"
+msgstr ""
+
+#: https//support.torproject.org/about/key-management/
+#: (content/about/key-management/contents+en.lrquestion.description)
+msgid ""
+"The Tor software comes with a built-in list of location and public key for "
+"each directory authority."
+msgstr ""
+
+#: https//support.torproject.org/about/key-management/
+#: (content/about/key-management/contents+en.lrquestion.description)
+msgid ""
+"So the only way to trick users into using a fake Tor network is to give them"
+" a specially modified version of the software."
+msgstr ""
+
+#: https//support.torproject.org/about/key-management/
+#: (content/about/key-management/contents+en.lrquestion.description)
+msgid "How do users know they've got the right software?"
+msgstr ""
+
+#: https//support.torproject.org/about/key-management/
+#: (content/about/key-management/contents+en.lrquestion.description)
+msgid ""
+"When we distribute the source code or a package, we digitally sign it with "
+"[GNU Privacy Guard](http://www.gnupg.org/). See the [instructions on how to "
+"check Tor Browser's signature](https://support.torproject.org/tbb/how-to-"
+"verify-signature/)."
+msgstr ""
+
+#: https//support.torproject.org/about/key-management/
+#: (content/about/key-management/contents+en.lrquestion.description)
+msgid ""
+"In order to be certain that it's really signed by us, you need to have met "
+"us in person and gotten a copy of our GPG key fingerprint, or you need to "
+"know somebody who has."
+msgstr ""
+
+#: https//support.torproject.org/about/key-management/
+#: (content/about/key-management/contents+en.lrquestion.description)
+msgid ""
+"If you're concerned about an attack on this level, we recommend you get "
+"involved with the security community and start meeting people."
+msgstr ""
+
#: https//support.torproject.org/about/no-data-scrubbing/
#: (content/about/no-data-scrubbing/contents+en.lrquestion.title)
msgid ""
@@ -2777,6 +3212,151 @@ msgid ""
"though."
msgstr ""
+#: https//support.torproject.org/about/protections/
+#: (content/about/protections/contents+en.lrquestion.title)
+msgid "What protections does Tor provide?"
+msgstr ""
+
+#: https//support.torproject.org/about/protections/
+#: (content/about/protections/contents+en.lrquestion.description)
+msgid ""
+"Internet communication is based on a store-and-forward model that can be "
+"understood in analogy to postal mail: Data is transmitted in blocks called "
+"IP datagrams or packets."
+msgstr ""
+
+#: https//support.torproject.org/about/protections/
+#: (content/about/protections/contents+en.lrquestion.description)
+msgid ""
+"Every packet includes a source IP address (of the sender) and a destination "
+"IP address (of the receiver), just as ordinary letters contain postal "
+"addresses of sender and receiver."
+msgstr ""
+
+#: https//support.torproject.org/about/protections/
+#: (content/about/protections/contents+en.lrquestion.description)
+msgid ""
+"The way from sender to receiver involves multiple hops of routers, where "
+"each router inspects the destination IP address and forwards the packet "
+"closer to its destination."
+msgstr ""
+
+#: https//support.torproject.org/about/protections/
+#: (content/about/protections/contents+en.lrquestion.description)
+msgid ""
+"Thus, every router between sender and receiver learns that the sender is "
+"communicating with the receiver."
+msgstr ""
+
+#: https//support.torproject.org/about/protections/
+#: (content/about/protections/contents+en.lrquestion.description)
+msgid ""
+"In particular, your local ISP is in the position to build a complete profile"
+" of your Internet usage."
+msgstr ""
+
+#: https//support.torproject.org/about/protections/
+#: (content/about/protections/contents+en.lrquestion.description)
+msgid ""
+"In addition, every server in the Internet that can see any of the packets "
+"can profile your behavior."
+msgstr ""
+
+#: https//support.torproject.org/about/protections/
+#: (content/about/protections/contents+en.lrquestion.description)
+msgid ""
+"The aim of Tor is to improve your privacy by sending your traffic through a "
+"series of proxies."
+msgstr ""
+
+#: https//support.torproject.org/about/protections/
+#: (content/about/protections/contents+en.lrquestion.description)
+msgid ""
+"Your communication is encrypted in multiple layers and routed via multiple "
+"hops through the Tor network to the final receiver."
+msgstr ""
+
+#: https//support.torproject.org/about/protections/
+#: (content/about/protections/contents+en.lrquestion.description)
+msgid ""
+"More details on this process can be found in this "
+"[visualization](https://support.torproject.org/https/https-1/)."
+msgstr ""
+
+#: https//support.torproject.org/about/protections/
+#: (content/about/protections/contents+en.lrquestion.description)
+msgid ""
+"Note that all your local ISP can observe now is that you are communicating "
+"with Tor nodes."
+msgstr ""
+
+#: https//support.torproject.org/about/protections/
+#: (content/about/protections/contents+en.lrquestion.description)
+msgid ""
+"Similarly, servers in the Internet just see that they are being contacted by"
+" Tor nodes."
+msgstr ""
+
+#: https//support.torproject.org/about/protections/
+#: (content/about/protections/contents+en.lrquestion.description)
+msgid "Generally speaking, Tor aims to solve three privacy problems:"
+msgstr ""
+
+#: https//support.torproject.org/about/protections/
+#: (content/about/protections/contents+en.lrquestion.description)
+msgid ""
+"First, Tor prevents websites and other services from learning your location,"
+" which they can use to build databases about your habits and interests."
+msgstr ""
+
+#: https//support.torproject.org/about/protections/
+#: (content/about/protections/contents+en.lrquestion.description)
+msgid ""
+"With Tor, your Internet connections don't give you away by default -- now "
+"you can have the ability to choose, for each connection, how much "
+"information to reveal."
+msgstr ""
+
+#: https//support.torproject.org/about/protections/
+#: (content/about/protections/contents+en.lrquestion.description)
+msgid ""
+"Second, Tor prevents people watching your traffic locally (such as your ISP "
+"or someone with access to your home wifi or router) from learning what "
+"information you're fetching and where you're fetching it from."
+msgstr ""
+
+#: https//support.torproject.org/about/protections/
+#: (content/about/protections/contents+en.lrquestion.description)
+msgid ""
+"It also stops them from deciding what you're allowed to learn and publish --"
+" if you can get to any part of the Tor network, you can reach any site on "
+"the Internet."
+msgstr ""
+
+#: https//support.torproject.org/about/protections/
+#: (content/about/protections/contents+en.lrquestion.description)
+msgid ""
+"Third, Tor routes your connection through more than one Tor relay so no "
+"single relay can learn what you're up to."
+msgstr ""
+
+#: https//support.torproject.org/about/protections/
+#: (content/about/protections/contents+en.lrquestion.description)
+msgid ""
+"Because these relays are run by different individuals or organizations, "
+"distributing trust provides more security than the old [one hop "
+"proxy](https://support.torproject.org/about/#how-is-tor-different-from-"
+"other-proxies) approach."
+msgstr ""
+
+#: https//support.torproject.org/about/protections/
+#: (content/about/protections/contents+en.lrquestion.description)
+msgid ""
+"Note, however, that there are situations where Tor fails to solve these "
+"privacy problems entirely: see the entry below on [remaining "
+"attacks](https://support.torproject.org/about/#attacks-on-onion-routing)."
+msgstr ""
+
#: https//support.torproject.org/about/what-is-tor/
#: (content/about/what-is-tor/contents+en.lrquestion.title)
msgid "What is Tor?"
@@ -5107,9 +5687,11 @@ msgstr ""
#: (content/tbb/tbb-47/contents+en.lrquestion.description)
msgid ""
"Also, read up on the HTTPProxyAuthenticator and HTTPSProxyAuthenticator "
-"options if your proxy requires auth. We only support basic auth currently, "
-"but if you need NTLM authentication, you may find [this post in the "
-"archives](https://archives.seul.org/or/talk/Jun-2005/msg00223.html) useful."
+"options if your [proxy requires auth.](https://developer.mozilla.org/en-"
+"US/docs/Web/HTTP/Headers/Proxy-Authenticate) We only support basic auth "
+"currently, but if you need NTLM authentication, you may find [this post in "
+"the archives](https://archives.seul.org/or/talk/Jun-2005/msg00223.html) "
+"useful."
msgstr ""
#: https//support.torproject.org/tbb/tbb-47/
@@ -5340,6 +5922,219 @@ msgid ""
"have no effect on Tor's configuration."
msgstr ""
+#: https//support.torproject.org/tbb/tbb-firewall-ports/
+#: (content/tbb/tbb-firewall-ports/contents+en.lrquestion.title)
+msgid "My firewall only allows a few outgoing ports"
+msgstr ""
+
+#: https//support.torproject.org/tbb/tbb-firewall-ports/
+#: (content/tbb/tbb-firewall-ports/contents+en.lrquestion.description)
+msgid ""
+"If your firewall works by blocking ports, then you can tell Tor to only use "
+"the ports when you start your Tor Browser."
+msgstr ""
+
+#: https//support.torproject.org/tbb/tbb-firewall-ports/
+#: (content/tbb/tbb-firewall-ports/contents+en.lrquestion.description)
+msgid ""
+"Or you can add the ports that your firewall permits by adding "
+"\"FascistFirewall 1\" to your torrc configuration file."
+msgstr ""
+
+#: https//support.torproject.org/tbb/tbb-firewall-ports/
+#: (content/tbb/tbb-firewall-ports/contents+en.lrquestion.description)
+msgid ""
+"By default, when you set this Tor assumes that your firewall allows only "
+"port 80 and port 443 (HTTP and HTTPS respectively)."
+msgstr ""
+
+#: https//support.torproject.org/tbb/tbb-firewall-ports/
+#: (content/tbb/tbb-firewall-ports/contents+en.lrquestion.description)
+msgid ""
+"You can select a different set of ports with the FirewallPorts torrc option."
+msgstr ""
+
+#: https//support.torproject.org/tbb/tbb-firewall-ports/
+#: (content/tbb/tbb-firewall-ports/contents+en.lrquestion.description)
+msgid ""
+"If you want to be more fine-grained with your controls, you can also use the"
+" ReachableAddresses config options, e.g.:"
+msgstr ""
+
+#: https//support.torproject.org/tbb/tbb-firewall-ports/
+#: (content/tbb/tbb-firewall-ports/contents+en.lrquestion.description)
+#: https//support.torproject.org/tbb/tbb-install-tor-central-server/
+#: (content/tbb/tbb-install-tor-central-server/contents+en.lrquestion.description)
+#: https//support.torproject.org/operators/default-exit-ports/
+#: (content/operators/default-exit-ports/contents+en.lrquestion.description)
+#: https//support.torproject.org/operators/hibernation/
+#: (content/operators/hibernation/contents+en.lrquestion.description)
+#: https//support.torproject.org/operators/limit-total-bandwidth/
+#: (content/operators/limit-total-bandwidth/contents+en.lrquestion.description)
+#: https//support.torproject.org/misc/bug-or-feedback/
+#: (content/misc/bug-or-feedback/contents+en.lrquestion.description)
+#: https//support.torproject.org/get-in-touch/why-i-cant-join-tor-channels/
+#: (content/get-in-touch/why-i-cant-join-tor-channels/contents+en.lrquestion.description)
+#: https//support.torproject.org/apt/tor-deb-repo/
+#: (content/apt/apt-1/contents+en.lrquestion.description)
+#: https//support.torproject.org/apt/apt-over-tor/
+#: (content/apt/apt-3/contents+en.lrquestion.description)
+msgid "```"
+msgstr "```"
+
+#: https//support.torproject.org/tbb/tbb-firewall-ports/
+#: (content/tbb/tbb-firewall-ports/contents+en.lrquestion.description)
+msgid "ReachableDirAddresses *:80"
+msgstr ""
+
+#: https//support.torproject.org/tbb/tbb-firewall-ports/
+#: (content/tbb/tbb-firewall-ports/contents+en.lrquestion.description)
+msgid "ReachableORAddresses *:443"
+msgstr ""
+
+#: https//support.torproject.org/tbb/tbb-install-tor-central-server/
+#: (content/tbb/tbb-install-tor-central-server/contents+en.lrquestion.title)
+msgid ""
+"Can I install Tor on a central server, and have my clients connect to it?"
+msgstr ""
+
+#: https//support.torproject.org/tbb/tbb-install-tor-central-server/
+#: (content/tbb/tbb-install-tor-central-server/contents+en.lrquestion.description)
+msgid ""
+"Yes. Tor can be configured as a client or a relay on another machine, and "
+"allow other machines to be able to connect to it for anonymity."
+msgstr ""
+
+#: https//support.torproject.org/tbb/tbb-install-tor-central-server/
+#: (content/tbb/tbb-install-tor-central-server/contents+en.lrquestion.description)
+msgid ""
+"This is most useful in an environment where many computers want a gateway of"
+" anonymity to the rest of the world."
+msgstr ""
+
+#: https//support.torproject.org/tbb/tbb-install-tor-central-server/
+#: (content/tbb/tbb-install-tor-central-server/contents+en.lrquestion.description)
+msgid ""
+"However, be forewarned that with this configuration, anyone within your "
+"private network (existing between you and the Tor client/relay) can see what"
+" traffic you are sending in clear text."
+msgstr ""
+
+#: https//support.torproject.org/tbb/tbb-install-tor-central-server/
+#: (content/tbb/tbb-install-tor-central-server/contents+en.lrquestion.description)
+msgid "The anonymity doesn't start until you get to the Tor relay."
+msgstr ""
+
+#: https//support.torproject.org/tbb/tbb-install-tor-central-server/
+#: (content/tbb/tbb-install-tor-central-server/contents+en.lrquestion.description)
+msgid ""
+"Because of this, if you are the controller of your domain and you know "
+"everything's locked down, you will be OK, but this configuration may not be "
+"suitable for large private networks where security is key all around."
+msgstr ""
+
+#: https//support.torproject.org/tbb/tbb-install-tor-central-server/
+#: (content/tbb/tbb-install-tor-central-server/contents+en.lrquestion.description)
+msgid ""
+"Configuration is simple, editing your torrc file's SocksListenAddress "
+"according to the following examples:"
+msgstr ""
+
+#: https//support.torproject.org/tbb/tbb-install-tor-central-server/
+#: (content/tbb/tbb-install-tor-central-server/contents+en.lrquestion.description)
+msgid "SocksListenAddress 127.0.0.1"
+msgstr ""
+
+#: https//support.torproject.org/tbb/tbb-install-tor-central-server/
+#: (content/tbb/tbb-install-tor-central-server/contents+en.lrquestion.description)
+msgid "SocksListenAddress 192.168.x.x:9100"
+msgstr ""
+
+#: https//support.torproject.org/tbb/tbb-install-tor-central-server/
+#: (content/tbb/tbb-install-tor-central-server/contents+en.lrquestion.description)
+msgid "SocksListenAddress 0.0.0.0:9100"
+msgstr ""
+
+#: https//support.torproject.org/tbb/tbb-install-tor-central-server/
+#: (content/tbb/tbb-install-tor-central-server/contents+en.lrquestion.description)
+msgid ""
+"You can state multiple listen addresses, in the case that you are part of "
+"several networks or subnets."
+msgstr ""
+
+#: https//support.torproject.org/tbb/tbb-install-tor-central-server/
+#: (content/tbb/tbb-install-tor-central-server/contents+en.lrquestion.description)
+msgid "SocksListenAddress 192.168.x.x:9100 #eth0"
+msgstr ""
+
+#: https//support.torproject.org/tbb/tbb-install-tor-central-server/
+#: (content/tbb/tbb-install-tor-central-server/contents+en.lrquestion.description)
+msgid "SocksListenAddress 10.x.x.x:9100 #eth1"
+msgstr ""
+
+#: https//support.torproject.org/tbb/tbb-install-tor-central-server/
+#: (content/tbb/tbb-install-tor-central-server/contents+en.lrquestion.description)
+msgid ""
+"After this, your clients on their respective networks/subnets would specify "
+"a socks proxy with the address and port you specified SocksListenAddress to "
+"be."
+msgstr ""
+
+#: https//support.torproject.org/tbb/tbb-install-tor-central-server/
+#: (content/tbb/tbb-install-tor-central-server/contents+en.lrquestion.description)
+msgid ""
+"Please note that the SocksPort configuration option gives the port ONLY for "
+"localhost (127.0.0.1)."
+msgstr ""
+
+#: https//support.torproject.org/tbb/tbb-install-tor-central-server/
+#: (content/tbb/tbb-install-tor-central-server/contents+en.lrquestion.description)
+msgid ""
+"When setting up your SocksListenAddress(es), you need to give the port with "
+"the address, as shown above."
+msgstr ""
+
+#: https//support.torproject.org/tbb/tbb-install-tor-central-server/
+#: (content/tbb/tbb-install-tor-central-server/contents+en.lrquestion.description)
+msgid ""
+"If you are interested in forcing all outgoing data through the central Tor "
+"client/relay, instead of the server only being an optional proxy, you may "
+"find the program iptables (for *nix) useful."
+msgstr ""
+
+#: https//support.torproject.org/tbb/tbb-run-client-different-computer/
+#: (content/tbb/tbb-run-client-different-computer/contents+en.lrquestion.title)
+msgid ""
+"I want to run my Tor client on a different computer than my applications"
+msgstr ""
+
+#: https//support.torproject.org/tbb/tbb-run-client-different-computer/
+#: (content/tbb/tbb-run-client-different-computer/contents+en.lrquestion.description)
+msgid ""
+"By default, your Tor client only listens for applications that connect from "
+"localhost."
+msgstr ""
+
+#: https//support.torproject.org/tbb/tbb-run-client-different-computer/
+#: (content/tbb/tbb-run-client-different-computer/contents+en.lrquestion.description)
+msgid "Connections from other computers are refused."
+msgstr ""
+
+#: https//support.torproject.org/tbb/tbb-run-client-different-computer/
+#: (content/tbb/tbb-run-client-different-computer/contents+en.lrquestion.description)
+msgid ""
+"If you want to torify applications on different computers than the Tor "
+"client, you should edit your torrc to define `SocksListenAddress 0.0.0.0` "
+"and then restart (or hup) Tor."
+msgstr ""
+
+#: https//support.torproject.org/tbb/tbb-run-client-different-computer/
+#: (content/tbb/tbb-run-client-different-computer/contents+en.lrquestion.description)
+msgid ""
+"If you want to get more advanced, you can configure your Tor client on a "
+"firewall to bind to your internal IP but not your external IP."
+msgstr ""
+
#: https//support.torproject.org/tbb/website-blocking-tor/
#: (content/tbb/website-blocking-tor/contents+en.lrquestion.title)
msgid "A website I am trying to reach is blocking access over Tor."
@@ -6909,6 +7704,130 @@ msgid ""
"guide."
msgstr ""
+#: https//support.torproject.org/operators/default-exit-ports/
+#: (content/operators/default-exit-ports/contents+en.lrquestion.title)
+msgid "Is there a list of default exit ports?"
+msgstr ""
+
+#: https//support.torproject.org/operators/default-exit-ports/
+#: (content/operators/default-exit-ports/contents+en.lrquestion.description)
+msgid ""
+"The default open ports are listed below but keep in mind that, any port or "
+"ports can be opened by the relay operator by configuring it in torrc or "
+"modifying the source code."
+msgstr ""
+
+#: https//support.torproject.org/operators/default-exit-ports/
+#: (content/operators/default-exit-ports/contents+en.lrquestion.description)
+msgid ""
+"The default according to src/or/policies.c ([line 85][1] and [line 1901][2])"
+" from the source code release [release-0.4.6][3]:"
+msgstr ""
+
+#: https//support.torproject.org/operators/default-exit-ports/
+#: (content/operators/default-exit-ports/contents+en.lrquestion.description)
+msgid "reject 0.0.0.0/8"
+msgstr ""
+
+#: https//support.torproject.org/operators/default-exit-ports/
+#: (content/operators/default-exit-ports/contents+en.lrquestion.description)
+msgid "reject 169.254.0.0/16"
+msgstr ""
+
+#: https//support.torproject.org/operators/default-exit-ports/
+#: (content/operators/default-exit-ports/contents+en.lrquestion.description)
+msgid "reject 127.0.0.0/8"
+msgstr ""
+
+#: https//support.torproject.org/operators/default-exit-ports/
+#: (content/operators/default-exit-ports/contents+en.lrquestion.description)
+msgid "reject 192.168.0.0/16"
+msgstr ""
+
+#: https//support.torproject.org/operators/default-exit-ports/
+#: (content/operators/default-exit-ports/contents+en.lrquestion.description)
+msgid "reject 10.0.0.0/8"
+msgstr ""
+
+#: https//support.torproject.org/operators/default-exit-ports/
+#: (content/operators/default-exit-ports/contents+en.lrquestion.description)
+msgid "reject 172.16.0.0/12"
+msgstr ""
+
+#: https//support.torproject.org/operators/default-exit-ports/
+#: (content/operators/default-exit-ports/contents+en.lrquestion.description)
+msgid "reject *:25"
+msgstr ""
+
+#: https//support.torproject.org/operators/default-exit-ports/
+#: (content/operators/default-exit-ports/contents+en.lrquestion.description)
+msgid "reject *:119"
+msgstr ""
+
+#: https//support.torproject.org/operators/default-exit-ports/
+#: (content/operators/default-exit-ports/contents+en.lrquestion.description)
+msgid "reject *:135-139"
+msgstr ""
+
+#: https//support.torproject.org/operators/default-exit-ports/
+#: (content/operators/default-exit-ports/contents+en.lrquestion.description)
+msgid "reject *:445"
+msgstr ""
+
+#: https//support.torproject.org/operators/default-exit-ports/
+#: (content/operators/default-exit-ports/contents+en.lrquestion.description)
+msgid "reject *:563"
+msgstr ""
+
+#: https//support.torproject.org/operators/default-exit-ports/
+#: (content/operators/default-exit-ports/contents+en.lrquestion.description)
+msgid "reject *:1214"
+msgstr ""
+
+#: https//support.torproject.org/operators/default-exit-ports/
+#: (content/operators/default-exit-ports/contents+en.lrquestion.description)
+msgid "reject *:4661-4666"
+msgstr ""
+
+#: https//support.torproject.org/operators/default-exit-ports/
+#: (content/operators/default-exit-ports/contents+en.lrquestion.description)
+msgid "reject *:6346-6429"
+msgstr ""
+
+#: https//support.torproject.org/operators/default-exit-ports/
+#: (content/operators/default-exit-ports/contents+en.lrquestion.description)
+msgid "reject *:6699"
+msgstr ""
+
+#: https//support.torproject.org/operators/default-exit-ports/
+#: (content/operators/default-exit-ports/contents+en.lrquestion.description)
+msgid "reject *:6881-6999"
+msgstr ""
+
+#: https//support.torproject.org/operators/default-exit-ports/
+#: (content/operators/default-exit-ports/contents+en.lrquestion.description)
+msgid "accept *:*"
+msgstr ""
+
+#: https//support.torproject.org/operators/default-exit-ports/
+#: (content/operators/default-exit-ports/contents+en.lrquestion.description)
+msgid ""
+"[1]: "
+"https://gitlab.torproject.org/tpo/core/tor/-/blob/release-0.4.6/src/core/or/policies.c#L85"
+msgstr ""
+
+#: https//support.torproject.org/operators/default-exit-ports/
+#: (content/operators/default-exit-ports/contents+en.lrquestion.description)
+msgid ""
+"[2]: "
+"https://gitlab.torproject.org/tpo/core/tor/-/blob/release-0.4.6/src/core/or/policies.c#L1901"
+msgstr ""
+
+#: https//support.torproject.org/operators/default-exit-ports/
+#: (content/operators/default-exit-ports/contents+en.lrquestion.description)
+msgid "[3]: https://gitlab.torproject.org/tpo/core/tor/-/tree/release-0.4.6/"
+msgstr ""
+
#: https//support.torproject.org/operators/dynamic-ip/
#: (content/operators/dynamic-ip/contents+en.lrquestion.title)
msgid "Can I run a Tor relay using a dynamic IP address?"
@@ -7056,21 +7975,6 @@ msgid ""
"into hibernation, signaled by this entry in the log:"
msgstr ""
-#: https//support.torproject.org/operators/hibernation/
-#: (content/operators/hibernation/contents+en.lrquestion.description)
-#: https//support.torproject.org/operators/limit-total-bandwidth/
-#: (content/operators/limit-total-bandwidth/contents+en.lrquestion.description)
-#: https//support.torproject.org/misc/bug-or-feedback/
-#: (content/misc/bug-or-feedback/contents+en.lrquestion.description)
-#: https//support.torproject.org/get-in-touch/why-i-cant-join-tor-channels/
-#: (content/get-in-touch/why-i-cant-join-tor-channels/contents+en.lrquestion.description)
-#: https//support.torproject.org/apt/tor-deb-repo/
-#: (content/apt/apt-1/contents+en.lrquestion.description)
-#: https//support.torproject.org/apt/apt-over-tor/
-#: (content/apt/apt-3/contents+en.lrquestion.description)
-msgid "```"
-msgstr "```"
-
#: https//support.torproject.org/operators/hibernation/
#: (content/operators/hibernation/contents+en.lrquestion.description)
msgid "Bandwidth soft limit reached; commencing hibernation."
@@ -9344,6 +10248,131 @@ msgstr ""
msgid "sub 4096R/C00942E4 2017-03-13"
msgstr ""
+#: https//support.torproject.org/misc/check-socks-dns-leaks/
+#: (content/misc/check-socks-dns-leaks/contents+en.lrquestion.title)
+msgid ""
+"How do I check if my application that uses SOCKS is leaking DNS requests?"
+msgstr ""
+
+#: https//support.torproject.org/misc/check-socks-dns-leaks/
+#: (content/misc/check-socks-dns-leaks/contents+en.lrquestion.description)
+msgid ""
+"Even if your application is using the correct variant of the SOCKS protocol,"
+" there is still a risk that it could be leaking DNS queries."
+msgstr ""
+
+#: https//support.torproject.org/misc/check-socks-dns-leaks/
+#: (content/misc/check-socks-dns-leaks/contents+en.lrquestion.description)
+msgid ""
+"This problem happens in Firefox extensions that resolve the destination "
+"hostname themselves, for example to show you its IP address, what country "
+"it's in, etc."
+msgstr ""
+
+#: https//support.torproject.org/misc/check-socks-dns-leaks/
+#: (content/misc/check-socks-dns-leaks/contents+en.lrquestion.description)
+msgid ""
+"If you suspect your application might behave like this, follow the "
+"instructions below to check."
+msgstr ""
+
+#: https//support.torproject.org/misc/check-socks-dns-leaks/
+#: (content/misc/check-socks-dns-leaks/contents+en.lrquestion.description)
+msgid ""
+"1. Add `TestSocks 1` to your [torrc file](https://support.torproject.org/tbb"
+"/tbb-editing-torrc/)."
+msgstr ""
+
+#: https//support.torproject.org/misc/check-socks-dns-leaks/
+#: (content/misc/check-socks-dns-leaks/contents+en.lrquestion.description)
+msgid ""
+"1. Start Tor, and point your program's SOCKS proxy settings to Tor's SOCKS5 "
+"server (`socks5://127.0.0.1:9050` by default)."
+msgstr ""
+
+#: https//support.torproject.org/misc/check-socks-dns-leaks/
+#: (content/misc/check-socks-dns-leaks/contents+en.lrquestion.description)
+msgid ""
+"1. Watch your logs as you use your application. For each socks connection, "
+"Tor will log a `notice` for safe connections, and a `warn` for connections "
+"leaking DNS requests."
+msgstr ""
+
+#: https//support.torproject.org/misc/check-socks-dns-leaks/
+#: (content/misc/check-socks-dns-leaks/contents+en.lrquestion.description)
+msgid ""
+"If you want to automatically disable all connections leaking DNS requests, "
+"set `SafeSocks 1` in your torrc file."
+msgstr ""
+
+#: https//support.torproject.org/misc/hide-exits/
+#: (content/misc/hide-exits/contents+en.lrquestion.title)
+msgid ""
+"You should hide the list of Tor relays, so people can't block the exits."
+msgstr ""
+
+#: https//support.torproject.org/misc/hide-exits/
+#: (content/misc/hide-exits/contents+en.lrquestion.description)
+msgid "There are a few reasons we don't:"
+msgstr ""
+
+#: https//support.torproject.org/misc/hide-exits/
+#: (content/misc/hide-exits/contents+en.lrquestion.description)
+msgid ""
+"1. We can't help but make the information available, since Tor clients need "
+"to use it to pick their paths."
+msgstr ""
+
+#: https//support.torproject.org/misc/hide-exits/
+#: (content/misc/hide-exits/contents+en.lrquestion.description)
+msgid "So if the \"blockers\" want it, they can get it anyway."
+msgstr ""
+
+#: https//support.torproject.org/misc/hide-exits/
+#: (content/misc/hide-exits/contents+en.lrquestion.description)
+msgid ""
+"Further, even if we didn't tell clients about the list of relays directly, "
+"somebody could still make a lot of connections through Tor to a test site "
+"and build a list of the addresses they see."
+msgstr ""
+
+#: https//support.torproject.org/misc/hide-exits/
+#: (content/misc/hide-exits/contents+en.lrquestion.description)
+msgid ""
+"1. If people want to block us, we believe that they should be allowed to do "
+"so."
+msgstr ""
+
+#: https//support.torproject.org/misc/hide-exits/
+#: (content/misc/hide-exits/contents+en.lrquestion.description)
+msgid ""
+"Obviously, we would prefer for everybody to allow Tor users to connect to "
+"them, but people have the right to decide who their services should allow "
+"connections from, and if they want to block anonymous users, they can."
+msgstr ""
+
+#: https//support.torproject.org/misc/hide-exits/
+#: (content/misc/hide-exits/contents+en.lrquestion.description)
+msgid ""
+"1. Being blockable also has tactical advantages: it may be a persuasive "
+"response to website maintainers who feel threatened by Tor."
+msgstr ""
+
+#: https//support.torproject.org/misc/hide-exits/
+#: (content/misc/hide-exits/contents+en.lrquestion.description)
+msgid ""
+"Giving them the option may inspire them to stop and think about whether they"
+" really want to eliminate private access to their system, and if not, what "
+"other options they might have."
+msgstr ""
+
+#: https//support.torproject.org/misc/hide-exits/
+#: (content/misc/hide-exits/contents+en.lrquestion.description)
+msgid ""
+"The time they might otherwise have spent blocking Tor, they may instead "
+"spend rethinking their overall approach to privacy and anonymity."
+msgstr ""
+
#: https//support.torproject.org/misc/menu/
#: (content/misc/menu/contents+en.lrquestion.description)
msgid "About"
@@ -9985,56 +11014,20 @@ msgstr ""
#: https//support.torproject.org/get-in-touch/why-i-cant-join-tor-channels/
#: (content/get-in-touch/why-i-cant-join-tor-channels/contents+en.lrquestion.description)
msgid ""
-"Then, to complete the registration and ultimately gain access to the #tor-"
-"project channel, your nickname must be **verified**."
-msgstr ""
-
-#: https//support.torproject.org/get-in-touch/why-i-cant-join-tor-channels/
-#: (content/get-in-touch/why-i-cant-join-tor-channels/contents+en.lrquestion.description)
-msgid ""
-"1. To verify your nick, open a new browser window and go to "
-"https://webchat.oftc.net/?channels=tor."
-msgstr ""
-
-#: https//support.torproject.org/get-in-touch/why-i-cant-join-tor-channels/
-#: (content/get-in-touch/why-i-cant-join-tor-channels/contents+en.lrquestion.description)
-msgid "2. Log in with your IRC nickname and password."
-msgstr ""
-
-#: https//support.torproject.org/get-in-touch/why-i-cant-join-tor-channels/
-#: (content/get-in-touch/why-i-cant-join-tor-channels/contents+en.lrquestion.description)
-msgid ""
-"3. Look for the word **verify** and log in there. It may appear that nothing"
-" has happened. Look at the top of the page, and there will be a column "
-"called **Account**."
-msgstr ""
-
-#: https//support.torproject.org/get-in-touch/why-i-cant-join-tor-channels/
-#: (content/get-in-touch/why-i-cant-join-tor-channels/contents+en.lrquestion.description)
-msgid "4. Click on **Account**."
-msgstr ""
-
-#: https//support.torproject.org/get-in-touch/why-i-cant-join-tor-channels/
-#: (content/get-in-touch/why-i-cant-join-tor-channels/contents+en.lrquestion.description)
-msgid ""
-"5. Click on the small sentence at the bottom of the square that says: Verify"
-" account."
-msgstr ""
-
-#: https//support.torproject.org/get-in-touch/why-i-cant-join-tor-channels/
-#: (content/get-in-touch/why-i-cant-join-tor-channels/contents+en.lrquestion.description)
-msgid "6. Fill out the Captcha that pops up, and click ok."
+"After registering your nickname, to gain access to the #tor-project and "
+"other protected channels, your nickname must be **verified**."
msgstr ""
#: https//support.torproject.org/get-in-touch/why-i-cant-join-tor-channels/
#: (content/get-in-touch/why-i-cant-join-tor-channels/contents+en.lrquestion.description)
msgid ""
-"7. A tiny message will appear: \"Your NickServ account has been verified.\""
+"1. Go to https://services.oftc.net/ and follow the steps in the '*To verify "
+"your account*' section"
msgstr ""
#: https//support.torproject.org/get-in-touch/why-i-cant-join-tor-channels/
#: (content/get-in-touch/why-i-cant-join-tor-channels/contents+en.lrquestion.description)
-msgid "8. Go back to the IRC webpage where you are logged in and type:"
+msgid "2. Go back to the IRC webpage where you are logged in and type:"
msgstr ""
#: https//support.torproject.org/get-in-touch/why-i-cant-join-tor-channels/
@@ -10044,12 +11037,12 @@ msgstr ""
#: https//support.torproject.org/get-in-touch/why-i-cant-join-tor-channels/
#: (content/get-in-touch/why-i-cant-join-tor-channels/contents+en.lrquestion.description)
-msgid "9. Click ENTER."
+msgid "3. Click ENTER."
msgstr ""
#: https//support.torproject.org/get-in-touch/why-i-cant-join-tor-channels/
#: (content/get-in-touch/why-i-cant-join-tor-channels/contents+en.lrquestion.description)
-msgid "10. If all is well, you will receive a message that says:"
+msgid "4. If all is well, you will receive a message that says:"
msgstr ""
#: https//support.torproject.org/get-in-touch/why-i-cant-join-tor-channels/
@@ -10190,18 +11183,22 @@ msgstr "# apt install apt-transport-https"
#: https//support.torproject.org/apt/tor-deb-repo/
#: (content/apt/apt-1/contents+en.lrquestion.description)
msgid ""
-"#### 2. Add the following entries to `/etc/apt/sources.list` or a new file "
-"in `/etc/apt/sources.list.d/`"
+"#### 2. Create a new file in `/etc/apt/sources.list.d/` named `tor.list`. "
+"Add the following entries:"
msgstr ""
#: https//support.torproject.org/apt/tor-deb-repo/
#: (content/apt/apt-1/contents+en.lrquestion.description)
-msgid "deb https://deb.torproject.org/torproject.org <DISTRIBUTION> main"
+msgid ""
+"deb [signed-by=/usr/share/keyrings/tor-archive-keyring.gpg] "
+"https://deb.torproject.org/torproject.org <DISTRIBUTION> main"
msgstr ""
#: https//support.torproject.org/apt/tor-deb-repo/
#: (content/apt/apt-1/contents+en.lrquestion.description)
-msgid "deb-src https://deb.torproject.org/torproject.org <DISTRIBUTION> main"
+msgid ""
+"deb-src [signed-by=/usr/share/keyrings/tor-archive-keyring.gpg] "
+"https://deb.torproject.org/torproject.org <DISTRIBUTION> main"
msgstr ""
#: https//support.torproject.org/apt/tor-deb-repo/
@@ -10215,14 +11212,16 @@ msgstr ""
#: https//support.torproject.org/apt/tor-deb-repo/
#: (content/apt/apt-1/contents+en.lrquestion.description)
msgid ""
-"deb https://deb.torproject.org/torproject.org tor-"
+"deb [signed-by=/usr/share/keyrings/tor-archive-keyring.gpg] "
+"https://deb.torproject.org/torproject.org tor-"
"experimental-0.4.6.x-<DISTRIBUTION> main"
msgstr ""
#: https//support.torproject.org/apt/tor-deb-repo/
#: (content/apt/apt-1/contents+en.lrquestion.description)
msgid ""
-"deb-src https://deb.torproject.org/torproject.org tor-"
+"deb-src [signed-by=/usr/share/keyrings/tor-archive-keyring.gpg] "
+"https://deb.torproject.org/torproject.org tor-"
"experimental-0.4.6.x-<DISTRIBUTION> main"
msgstr ""
@@ -10234,15 +11233,17 @@ msgstr ""
#: https//support.torproject.org/apt/tor-deb-repo/
#: (content/apt/apt-1/contents+en.lrquestion.description)
msgid ""
-"deb https://deb.torproject.org/torproject.org tor-nightly-"
-"master-<DISTRIBUTION> main"
+"deb [signed-by=/usr/share/keyrings/tor-archive-keyring.gpg] "
+"https://deb.torproject.org/torproject.org tor-nightly-master-<DISTRIBUTION> "
+"main"
msgstr ""
#: https//support.torproject.org/apt/tor-deb-repo/
#: (content/apt/apt-1/contents+en.lrquestion.description)
msgid ""
-"deb-src https://deb.torproject.org/torproject.org tor-nightly-"
-"master-<DISTRIBUTION> main"
+"deb-src [signed-by=/usr/share/keyrings/tor-archive-keyring.gpg] "
+"https://deb.torproject.org/torproject.org tor-nightly-master-<DISTRIBUTION> "
+"main"
msgstr ""
#: https//support.torproject.org/apt/tor-deb-repo/
@@ -10263,13 +11264,15 @@ msgstr ""
#: https//support.torproject.org/apt/tor-deb-repo/
#: (content/apt/apt-1/contents+en.lrquestion.description)
msgid ""
-"deb [arch=amd64] https://deb.torproject.org/torproject.org focal main"
+"deb [arch=amd64 signed-by=/usr/share/keyrings/tor-archive-keyring.gpg] "
+"https://deb.torproject.org/torproject.org focal main"
msgstr ""
#: https//support.torproject.org/apt/tor-deb-repo/
#: (content/apt/apt-1/contents+en.lrquestion.description)
msgid ""
-"deb-src [arch=amd64] https://deb.torproject.org/torproject.org focal main"
+"deb-src [arch=amd64 signed-by=/usr/share/keyrings/tor-archive-keyring.gpg] "
+"https://deb.torproject.org/torproject.org focal main"
msgstr ""
#: https//support.torproject.org/apt/tor-deb-repo/
@@ -10289,26 +11292,17 @@ msgstr ""
#: (content/apt/apt-1/contents+en.lrquestion.description)
msgid ""
"#### 3. Then add the gpg key used to sign the packages by running the "
-"following commands at your command prompt"
+"following command at your command prompt:"
msgstr ""
#: https//support.torproject.org/apt/tor-deb-repo/
#: (content/apt/apt-1/contents+en.lrquestion.description)
msgid ""
-"# wget -qO- "
+"# wget -O- "
"https://deb.torproject.org/torproject.org/A3C4F0F979CAA22CDBA8F512EE8CBC9E886DDD89.asc"
-" | gpg --import"
+" | gpg --dearmor | tee /usr/share/keyrings/tor-archive-keyring.gpg "
+">/dev/null"
msgstr ""
-"# wget -qO- "
-"https://deb.torproject.org/torproject.org/A3C4F0F979CAA22CDBA8F512EE8CBC9E886DDD89.asc"
-" | gpg --import"
-
-#: https//support.torproject.org/apt/tor-deb-repo/
-#: (content/apt/apt-1/contents+en.lrquestion.description)
-msgid ""
-"# gpg --export A3C4F0F979CAA22CDBA8F512EE8CBC9E886DDD89 | apt-key add -"
-msgstr ""
-"# gpg --export A3C4F0F979CAA22CDBA8F512EE8CBC9E886DDD89 | apt-key add -"
#: https//support.torproject.org/apt/tor-deb-repo/
#: (content/apt/apt-1/contents+en.lrquestion.description)
@@ -11915,6 +12909,82 @@ msgid ""
"doesn't change IP address over the day."
msgstr ""
+#: https//support.torproject.org/alternate-designs/block-websites/
+#: (content/alternate-designs/block-websites/contents+en.lrquestion.title)
+msgid "Exit policies should be able to block websites, not just IP addresses."
+msgstr ""
+
+#: https//support.torproject.org/alternate-designs/block-websites/
+#: (content/alternate-designs/block-websites/contents+en.lrquestion.description)
+msgid ""
+"It would be nice to let relay operators say things like `reject "
+"www.slashdot.org` in their exit policies, rather than requiring them to "
+"learn all the IP address space that could be covered by the site (and then "
+"also blocking other sites at those IP addresses)."
+msgstr ""
+
+#: https//support.torproject.org/alternate-designs/block-websites/
+#: (content/alternate-designs/block-websites/contents+en.lrquestion.description)
+msgid "There are two problems, though."
+msgstr ""
+
+#: https//support.torproject.org/alternate-designs/block-websites/
+#: (content/alternate-designs/block-websites/contents+en.lrquestion.description)
+msgid "First, users could still get around these blocks."
+msgstr ""
+
+#: https//support.torproject.org/alternate-designs/block-websites/
+#: (content/alternate-designs/block-websites/contents+en.lrquestion.description)
+msgid ""
+"For example, they could request the IP address rather than the hostname when"
+" they exit from the Tor network."
+msgstr ""
+
+#: https//support.torproject.org/alternate-designs/block-websites/
+#: (content/alternate-designs/block-websites/contents+en.lrquestion.description)
+msgid ""
+"This means operators would still need to learn all the IP addresses for the "
+"destinations in question."
+msgstr ""
+
+#: https//support.torproject.org/alternate-designs/block-websites/
+#: (content/alternate-designs/block-websites/contents+en.lrquestion.description)
+msgid ""
+"The second problem is that it would allow remote attackers to censor "
+"arbitrary sites."
+msgstr ""
+
+#: https//support.torproject.org/alternate-designs/block-websites/
+#: (content/alternate-designs/block-websites/contents+en.lrquestion.description)
+msgid ""
+"For example, if a Tor operator blocks www1.slashdot.org, and then some "
+"attacker poisons the Tor relay's DNS or otherwise changes that hostname to "
+"resolve to the IP address for a major news site, then suddenly that Tor "
+"relay is blocking the news site."
+msgstr ""
+
+#: https//support.torproject.org/alternate-designs/let-the-network-pick-the-path/
+#: (content/alternate-designs/let-the-network-pick-the-path/contents+en.lrquestion.title)
+msgid "You should let the network pick the path, not the client."
+msgstr ""
+
+#: https//support.torproject.org/alternate-designs/let-the-network-pick-the-path/
+#: (content/alternate-designs/let-the-network-pick-the-path/contents+en.lrquestion.description)
+msgid "No, you cannot trust the network to pick the path."
+msgstr ""
+
+#: https//support.torproject.org/alternate-designs/let-the-network-pick-the-path/
+#: (content/alternate-designs/let-the-network-pick-the-path/contents+en.lrquestion.description)
+msgid "Malicious relays could route you through their colluding friends."
+msgstr ""
+
+#: https//support.torproject.org/alternate-designs/let-the-network-pick-the-path/
+#: (content/alternate-designs/let-the-network-pick-the-path/contents+en.lrquestion.description)
+msgid ""
+"This would give an adversary the ability to watch all of your traffic end to"
+" end."
+msgstr ""
+
#: lego/templates/banner.html:3 lego/templates/banner.html:5
#: templates/banner.html:3 templates/banner.html:5
msgid "Close banner"
@@ -11945,8 +13015,8 @@ msgid "DONATE NOW"
msgstr "à¦à¦à¦¨à¦¿ দান à¦à¦°à§"
#: lego/templates/footer.html:13 lego/templates/footer.html:22
-#: lego/templates/navbar.html:83 templates/footer.html:13
-#: templates/footer.html:22 templates/navbar.html:83
+#: lego/templates/navbar.html:95 templates/footer.html:13
+#: templates/footer.html:22 templates/navbar.html:95
msgid "Download Tor Browser"
msgstr "à¦à¦° বà§à¦°à¦¾à¦à¦à¦¾à¦° ডাà¦à¦¨à¦²à§à¦¡ à¦à¦°à§à¦¨"
diff --git a/contents+ca.po b/contents+ca.po
index 360c60b848..b62e5b55e9 100644
--- a/contents+ca.po
+++ b/contents+ca.po
@@ -15,7 +15,7 @@ msgid ""
msgstr ""
"Project-Id-Version: PACKAGE VERSION\n"
"Report-Msgid-Bugs-To: \n"
-"POT-Creation-Date: 2021-08-25 11:14+CET\n"
+"POT-Creation-Date: 2021-09-01 12:20+CET\n"
"PO-Revision-Date: 2018-10-02 22:41+0000\n"
"Last-Translator: Emma Peel, 2021\n"
"Language-Team: Catalan (https://www.transifex.com/otf/teams/1519/ca/)\n"
@@ -148,6 +148,11 @@ msgstr ""
msgid "Tor Metrics"
msgstr ""
+#: https//support.torproject.org/alternate-designs/
+#: (content/alternate-designs/contents+en.lrtopic.title)
+msgid "Alternate Designs We Don't Do (Yet)"
+msgstr ""
+
#: https//support.torproject.org/glossary/add-on-extension-or-plugin/
#: (content/glossary/add-on-extension-or-plugin/contents+en.lrword.term)
msgid "add-on, extension, or plugin"
@@ -2042,6 +2047,61 @@ msgstr ""
"Podeu trobar informació més detallada sobre Tor + VPN al [nostre "
"wiki](https://trac.torproject.org/projects/tor/wiki/doc/TorPlusVPN)."
+#: https//support.torproject.org/faq/relay-donations/
+#: (content/faq/relay-donations/contents+en.lrquestion.title)
+msgid "Can I donate for a relay rather than run my own?"
+msgstr ""
+
+#: https//support.torproject.org/faq/relay-donations/
+#: (content/faq/relay-donations/contents+en.lrquestion.description)
+msgid ""
+"Sure! We have a [list of organizations that run Tor "
+"relays](https://community.torproject.org/relay/community-resources/relay-"
+"associations/) that are happy to turn your donations into better speed and "
+"anonymity for the Tor network."
+msgstr ""
+
+#: https//support.torproject.org/faq/relay-donations/
+#: (content/faq/relay-donations/contents+en.lrquestion.description)
+msgid ""
+"These organizations are not the same as [The Tor Project, "
+"Inc](https://donate.torproject.org/), but we consider that a good thing."
+msgstr ""
+
+#: https//support.torproject.org/faq/relay-donations/
+#: (content/faq/relay-donations/contents+en.lrquestion.description)
+msgid "They're run by nice people who are part of the Tor community."
+msgstr ""
+
+#: https//support.torproject.org/faq/relay-donations/
+#: (content/faq/relay-donations/contents+en.lrquestion.description)
+msgid ""
+"Note that there can be a tradeoff here between anonymity and performance."
+msgstr ""
+
+#: https//support.torproject.org/faq/relay-donations/
+#: (content/faq/relay-donations/contents+en.lrquestion.description)
+msgid ""
+"The Tor network's anonymity comes in part from diversity, so if you are in a"
+" position to run your own relay, you will be improving Tor's anonymity more "
+"than by donating."
+msgstr ""
+
+#: https//support.torproject.org/faq/relay-donations/
+#: (content/faq/relay-donations/contents+en.lrquestion.description)
+msgid ""
+"At the same time though, economies of scale for bandwidth mean that "
+"combining many small donations into several larger relays is more efficient "
+"at improving network performance."
+msgstr ""
+
+#: https//support.torproject.org/faq/relay-donations/
+#: (content/faq/relay-donations/contents+en.lrquestion.description)
+msgid ""
+"Improving anonymity and improving performance are both worthwhile goals, so "
+"however you can help is great!"
+msgstr ""
+
#: https//support.torproject.org/faq/staying-anonymous/
#: (content/faq/staying-anonymous/contents+en.lrquestion.title)
msgid "Am I totally anonymous if I use Tor?"
@@ -2344,6 +2404,61 @@ msgid ""
" documenting all the issues](https://community.torproject.org/)."
msgstr ""
+#: https//support.torproject.org/about/attacks-on-onion-routing/
+#: (content/about/attacks-on-onion-routing/contents+en.lrquestion.title)
+msgid "What attacks remain against onion routing?"
+msgstr ""
+
+#: https//support.torproject.org/about/attacks-on-onion-routing/
+#: (content/about/attacks-on-onion-routing/contents+en.lrquestion.description)
+msgid ""
+"As mentioned above, it is possible for an observer who can view both you and"
+" either the destination website or your Tor exit node to correlate timings "
+"of your traffic as it enters the Tor network and also as it exits."
+msgstr ""
+
+#: https//support.torproject.org/about/attacks-on-onion-routing/
+#: (content/about/attacks-on-onion-routing/contents+en.lrquestion.description)
+msgid "Tor does not defend against such a threat model."
+msgstr ""
+
+#: https//support.torproject.org/about/attacks-on-onion-routing/
+#: (content/about/attacks-on-onion-routing/contents+en.lrquestion.description)
+msgid ""
+"In a more limited sense, note that if a censor or law enforcement agency has"
+" the ability to obtain specific observation of parts of the network, it is "
+"possible for them to verify a suspicion that you talk regularly to your "
+"friend by observing traffic at both ends and correlating the timing of only "
+"that traffic."
+msgstr ""
+
+#: https//support.torproject.org/about/attacks-on-onion-routing/
+#: (content/about/attacks-on-onion-routing/contents+en.lrquestion.description)
+msgid ""
+"Again, this is only useful to verify that parties already suspected of "
+"communicating with one another are doing so."
+msgstr ""
+
+#: https//support.torproject.org/about/attacks-on-onion-routing/
+#: (content/about/attacks-on-onion-routing/contents+en.lrquestion.description)
+msgid ""
+"In most countries, the suspicion required to obtain a warrant already "
+"carries more weight than timing correlation would provide."
+msgstr ""
+
+#: https//support.torproject.org/about/attacks-on-onion-routing/
+#: (content/about/attacks-on-onion-routing/contents+en.lrquestion.description)
+msgid ""
+"Furthermore, since Tor reuses circuits for multiple TCP connections, it is "
+"possible to associate non anonymous and anonymous traffic at a given exit "
+"node, so be careful about what applications you run concurrently over Tor."
+msgstr ""
+
+#: https//support.torproject.org/about/attacks-on-onion-routing/
+#: (content/about/attacks-on-onion-routing/contents+en.lrquestion.description)
+msgid "Perhaps even run separate Tor clients for these applications."
+msgstr ""
+
#: https//support.torproject.org/about/backdoor/
#: (content/about/backdoor/contents+en.lrquestion.title)
msgid "Is there a backdoor in Tor?"
@@ -2508,6 +2623,43 @@ msgstr ""
"Utilitzar el Tor amb altres navegadors és [perillós i no "
"recomanable](/ca/tbb/tbb-9/)."
+#: https//support.torproject.org/about/change-paths/
+#: (content/about/change-paths/contents+en.lrquestion.title)
+msgid "How often does Tor change its paths?"
+msgstr ""
+
+#: https//support.torproject.org/about/change-paths/
+#: (content/about/change-paths/contents+en.lrquestion.description)
+msgid ""
+"Tor will reuse the same circuit for new TCP streams for 10 minutes, as long "
+"as the circuit is working fine."
+msgstr ""
+
+#: https//support.torproject.org/about/change-paths/
+#: (content/about/change-paths/contents+en.lrquestion.description)
+msgid "(If the circuit fails, Tor will switch to a new circuit immediately.)"
+msgstr ""
+
+#: https//support.torproject.org/about/change-paths/
+#: (content/about/change-paths/contents+en.lrquestion.description)
+msgid ""
+"But note that a single TCP stream (e.g. a long IRC connection) will stay on "
+"the same circuit forever."
+msgstr ""
+
+#: https//support.torproject.org/about/change-paths/
+#: (content/about/change-paths/contents+en.lrquestion.description)
+msgid "We don't rotate individual streams from one circuit to the next."
+msgstr ""
+
+#: https//support.torproject.org/about/change-paths/
+#: (content/about/change-paths/contents+en.lrquestion.description)
+msgid ""
+"Otherwise, an adversary with a partial view of the network would be given "
+"many chances over time to link you to your destination, rather than just one"
+" chance."
+msgstr ""
+
#: https//support.torproject.org/about/distribute-tor/
#: (content/about/distribute-tor/contents+en.lrquestion.title)
msgid "Can I distribute Tor?"
@@ -2623,6 +2775,133 @@ msgstr ""
"Mireu les nostres [PMF sobre la "
"marca](https://www.torproject.org/about/trademark/) per a més detalls."
+#: https//support.torproject.org/about/entry-guards/
+#: (content/about/entry-guards/contents+en.lrquestion.title)
+msgid "What are Entry Guards?"
+msgstr ""
+
+#: https//support.torproject.org/about/entry-guards/
+#: (content/about/entry-guards/contents+en.lrquestion.description)
+msgid ""
+"Tor (like all current practical low-latency anonymity designs) fails when "
+"the attacker can see both ends of the communications channel."
+msgstr ""
+
+#: https//support.torproject.org/about/entry-guards/
+#: (content/about/entry-guards/contents+en.lrquestion.description)
+msgid ""
+"For example, suppose the attacker controls or watches the Tor relay you "
+"choose to enter the network, and also controls or watches the website you "
+"visit."
+msgstr ""
+
+#: https//support.torproject.org/about/entry-guards/
+#: (content/about/entry-guards/contents+en.lrquestion.description)
+msgid ""
+"In this case, the research community knows no practical low-latency design "
+"that can reliably stop the attacker from correlating volume and timing "
+"information on the two sides."
+msgstr ""
+
+#: https//support.torproject.org/about/entry-guards/
+#: (content/about/entry-guards/contents+en.lrquestion.description)
+msgid "So, what should we do?"
+msgstr ""
+
+#: https//support.torproject.org/about/entry-guards/
+#: (content/about/entry-guards/contents+en.lrquestion.description)
+msgid "Suppose the attacker controls, or can observe, C relays."
+msgstr ""
+
+#: https//support.torproject.org/about/entry-guards/
+#: (content/about/entry-guards/contents+en.lrquestion.description)
+msgid "Suppose there are N relays total."
+msgstr ""
+
+#: https//support.torproject.org/about/entry-guards/
+#: (content/about/entry-guards/contents+en.lrquestion.description)
+msgid ""
+"If you select new entry and exit relays each time you use the network, the "
+"attacker will be able to correlate all traffic you send with probability "
+"around (c/n)2."
+msgstr ""
+
+#: https//support.torproject.org/about/entry-guards/
+#: (content/about/entry-guards/contents+en.lrquestion.description)
+msgid ""
+"But profiling is, for most users, as bad as being traced all the time: they "
+"want to do something often without an attacker noticing, and the attacker "
+"noticing once is as bad as the attacker noticing more often."
+msgstr ""
+
+#: https//support.torproject.org/about/entry-guards/
+#: (content/about/entry-guards/contents+en.lrquestion.description)
+msgid ""
+"Thus, choosing many random entries and exits gives the user no chance of "
+"escaping profiling by this kind of attacker."
+msgstr ""
+
+#: https//support.torproject.org/about/entry-guards/
+#: (content/about/entry-guards/contents+en.lrquestion.description)
+msgid ""
+"The solution is \"entry guards\": each Tor client selects a few relays at "
+"random to use as entry points, and uses only those relays for their first "
+"hop."
+msgstr ""
+
+#: https//support.torproject.org/about/entry-guards/
+#: (content/about/entry-guards/contents+en.lrquestion.description)
+msgid ""
+"If those relays are not controlled or observed, the attacker can't win, "
+"ever, and the user is secure."
+msgstr ""
+
+#: https//support.torproject.org/about/entry-guards/
+#: (content/about/entry-guards/contents+en.lrquestion.description)
+msgid ""
+"If those relays are observed or controlled by the attacker, the attacker "
+"sees a larger fraction of the user's traffic - but still the user is no more"
+" profiled than before."
+msgstr ""
+
+#: https//support.torproject.org/about/entry-guards/
+#: (content/about/entry-guards/contents+en.lrquestion.description)
+msgid ""
+"Thus, the user has some chance (on the order of (n-c)/n) of avoiding "
+"profiling, whereas they had none before."
+msgstr ""
+
+#: https//support.torproject.org/about/entry-guards/
+#: (content/about/entry-guards/contents+en.lrquestion.description)
+msgid ""
+"You can read more at [An Analysis of the Degradation of Anonymous "
+"Protocols](http://freehaven.net/anonbib/#wright02), [Defending Anonymous "
+"Communication Against Passive Logging "
+"Attacks](http://freehaven.net/anonbib/#wright03), and especially [Locating "
+"Hidden Servers](http://freehaven.net/anonbib/#hs-attack06)."
+msgstr ""
+
+#: https//support.torproject.org/about/entry-guards/
+#: (content/about/entry-guards/contents+en.lrquestion.description)
+msgid ""
+"Restricting your entry nodes may also help against attackers who want to run"
+" a few Tor nodes and easily enumerate all of the Tor user IP addresses."
+msgstr ""
+
+#: https//support.torproject.org/about/entry-guards/
+#: (content/about/entry-guards/contents+en.lrquestion.description)
+msgid ""
+"(Even though they can't learn what destinations the users are talking to, "
+"they still might be able to do bad things with just a list of users.)"
+msgstr ""
+
+#: https//support.torproject.org/about/entry-guards/
+#: (content/about/entry-guards/contents+en.lrquestion.description)
+msgid ""
+"However, that feature won't really become useful until we move to a "
+"\"directory guard\" design as well."
+msgstr ""
+
#: https//support.torproject.org/about/how-is-tor-different-from-other-proxies/
#: (content/about/how-is-tor-different-from-other-proxies/contents+en.lrquestion.title)
msgid "How is Tor different from other proxies?"
@@ -2824,6 +3103,162 @@ msgstr ""
"Mireu aquesta visualització del [Tor i l'HTTPS](/ca/https/https-1/) per a "
"entendre com interactuen entre ells."
+#: https//support.torproject.org/about/key-management/
+#: (content/about/key-management/contents+en.lrquestion.title)
+msgid "Tell me about all the keys Tor uses"
+msgstr ""
+
+#: https//support.torproject.org/about/key-management/
+#: (content/about/key-management/contents+en.lrquestion.description)
+msgid ""
+"Tor uses a variety of different keys, with three goals in mind: 1) "
+"encryption to ensure privacy of data within the Tor network, 2) "
+"authentication so clients know they're talking to the relays they meant to "
+"talk to, and 3) signatures to make sure all clients know the same set of "
+"relays."
+msgstr ""
+
+#: https//support.torproject.org/about/key-management/
+#: (content/about/key-management/contents+en.lrquestion.description)
+msgid ""
+"**Encryption**: first, all connections in Tor use TLS link encryption, so "
+"observers can't look inside to see which circuit a given cell is intended "
+"for."
+msgstr ""
+
+#: https//support.torproject.org/about/key-management/
+#: (content/about/key-management/contents+en.lrquestion.description)
+msgid ""
+"Further, the Tor client establishes an ephemeral encryption key with each "
+"relay in the circuit; these extra layers of encryption mean that only the "
+"exit relay can read the cells."
+msgstr ""
+
+#: https//support.torproject.org/about/key-management/
+#: (content/about/key-management/contents+en.lrquestion.description)
+msgid ""
+"Both sides discard the circuit key when the circuit ends, so logging traffic"
+" and then breaking into the relay to discover the key won't work."
+msgstr ""
+
+#: https//support.torproject.org/about/key-management/
+#: (content/about/key-management/contents+en.lrquestion.description)
+msgid ""
+"**Authentication**: Every Tor relay has a public decryption key called the "
+"\"onion key\"."
+msgstr ""
+
+#: https//support.torproject.org/about/key-management/
+#: (content/about/key-management/contents+en.lrquestion.description)
+msgid "Each relay rotates its onion key once a week."
+msgstr ""
+
+#: https//support.torproject.org/about/key-management/
+#: (content/about/key-management/contents+en.lrquestion.description)
+msgid ""
+"When the Tor client establishes circuits, at each step it [demands that the "
+"Tor relay prove knowledge of its onion key](https://svn-"
+"archive.torproject.org/svn/projects/design-paper/tor-"
+"design.html#subsec:circuits)."
+msgstr ""
+
+#: https//support.torproject.org/about/key-management/
+#: (content/about/key-management/contents+en.lrquestion.description)
+msgid ""
+"That way the first node in the path can't just spoof the rest of the path."
+msgstr ""
+
+#: https//support.torproject.org/about/key-management/
+#: (content/about/key-management/contents+en.lrquestion.description)
+msgid ""
+"Because the Tor client chooses the path, it can make sure to get Tor's "
+"\"distributed trust\" property: no single relay in the path can know about "
+"both the client and what the client is doing."
+msgstr ""
+
+#: https//support.torproject.org/about/key-management/
+#: (content/about/key-management/contents+en.lrquestion.description)
+msgid ""
+"**Coordination**: How do clients know what the relays are, and how do they "
+"know that they have the right keys for them?"
+msgstr ""
+
+#: https//support.torproject.org/about/key-management/
+#: (content/about/key-management/contents+en.lrquestion.description)
+msgid "Each relay has a long-term public signing key called the \"identity key\"."
+msgstr ""
+
+#: https//support.torproject.org/about/key-management/
+#: (content/about/key-management/contents+en.lrquestion.description)
+msgid "Each directory authority additionally has a \"directory signing key\"."
+msgstr ""
+
+#: https//support.torproject.org/about/key-management/
+#: (content/about/key-management/contents+en.lrquestion.description)
+msgid ""
+"The directory authorities [provide a signed "
+"list](https://gitweb.torproject.org/torspec.git/tree/dir-spec.txt) of all "
+"the known relays, and in that list are a set of certificates from each relay"
+" (self-signed by their identity key) specifying their keys, locations, exit "
+"policies, and so on."
+msgstr ""
+
+#: https//support.torproject.org/about/key-management/
+#: (content/about/key-management/contents+en.lrquestion.description)
+msgid ""
+"So unless the adversary can control a majority of the directory authorities "
+"(as of 2021 there are 10 directory authorities), they can't trick the Tor "
+"client into using other Tor relays."
+msgstr ""
+
+#: https//support.torproject.org/about/key-management/
+#: (content/about/key-management/contents+en.lrquestion.description)
+msgid "How do clients know what the directory authorities are?"
+msgstr ""
+
+#: https//support.torproject.org/about/key-management/
+#: (content/about/key-management/contents+en.lrquestion.description)
+msgid ""
+"The Tor software comes with a built-in list of location and public key for "
+"each directory authority."
+msgstr ""
+
+#: https//support.torproject.org/about/key-management/
+#: (content/about/key-management/contents+en.lrquestion.description)
+msgid ""
+"So the only way to trick users into using a fake Tor network is to give them"
+" a specially modified version of the software."
+msgstr ""
+
+#: https//support.torproject.org/about/key-management/
+#: (content/about/key-management/contents+en.lrquestion.description)
+msgid "How do users know they've got the right software?"
+msgstr ""
+
+#: https//support.torproject.org/about/key-management/
+#: (content/about/key-management/contents+en.lrquestion.description)
+msgid ""
+"When we distribute the source code or a package, we digitally sign it with "
+"[GNU Privacy Guard](http://www.gnupg.org/). See the [instructions on how to "
+"check Tor Browser's signature](https://support.torproject.org/tbb/how-to-"
+"verify-signature/)."
+msgstr ""
+
+#: https//support.torproject.org/about/key-management/
+#: (content/about/key-management/contents+en.lrquestion.description)
+msgid ""
+"In order to be certain that it's really signed by us, you need to have met "
+"us in person and gotten a copy of our GPG key fingerprint, or you need to "
+"know somebody who has."
+msgstr ""
+
+#: https//support.torproject.org/about/key-management/
+#: (content/about/key-management/contents+en.lrquestion.description)
+msgid ""
+"If you're concerned about an attack on this level, we recommend you get "
+"involved with the security community and start meeting people."
+msgstr ""
+
#: https//support.torproject.org/about/no-data-scrubbing/
#: (content/about/no-data-scrubbing/contents+en.lrquestion.title)
msgid ""
@@ -2861,6 +3296,151 @@ msgid ""
"though."
msgstr ""
+#: https//support.torproject.org/about/protections/
+#: (content/about/protections/contents+en.lrquestion.title)
+msgid "What protections does Tor provide?"
+msgstr ""
+
+#: https//support.torproject.org/about/protections/
+#: (content/about/protections/contents+en.lrquestion.description)
+msgid ""
+"Internet communication is based on a store-and-forward model that can be "
+"understood in analogy to postal mail: Data is transmitted in blocks called "
+"IP datagrams or packets."
+msgstr ""
+
+#: https//support.torproject.org/about/protections/
+#: (content/about/protections/contents+en.lrquestion.description)
+msgid ""
+"Every packet includes a source IP address (of the sender) and a destination "
+"IP address (of the receiver), just as ordinary letters contain postal "
+"addresses of sender and receiver."
+msgstr ""
+
+#: https//support.torproject.org/about/protections/
+#: (content/about/protections/contents+en.lrquestion.description)
+msgid ""
+"The way from sender to receiver involves multiple hops of routers, where "
+"each router inspects the destination IP address and forwards the packet "
+"closer to its destination."
+msgstr ""
+
+#: https//support.torproject.org/about/protections/
+#: (content/about/protections/contents+en.lrquestion.description)
+msgid ""
+"Thus, every router between sender and receiver learns that the sender is "
+"communicating with the receiver."
+msgstr ""
+
+#: https//support.torproject.org/about/protections/
+#: (content/about/protections/contents+en.lrquestion.description)
+msgid ""
+"In particular, your local ISP is in the position to build a complete profile"
+" of your Internet usage."
+msgstr ""
+
+#: https//support.torproject.org/about/protections/
+#: (content/about/protections/contents+en.lrquestion.description)
+msgid ""
+"In addition, every server in the Internet that can see any of the packets "
+"can profile your behavior."
+msgstr ""
+
+#: https//support.torproject.org/about/protections/
+#: (content/about/protections/contents+en.lrquestion.description)
+msgid ""
+"The aim of Tor is to improve your privacy by sending your traffic through a "
+"series of proxies."
+msgstr ""
+
+#: https//support.torproject.org/about/protections/
+#: (content/about/protections/contents+en.lrquestion.description)
+msgid ""
+"Your communication is encrypted in multiple layers and routed via multiple "
+"hops through the Tor network to the final receiver."
+msgstr ""
+
+#: https//support.torproject.org/about/protections/
+#: (content/about/protections/contents+en.lrquestion.description)
+msgid ""
+"More details on this process can be found in this "
+"[visualization](https://support.torproject.org/https/https-1/)."
+msgstr ""
+
+#: https//support.torproject.org/about/protections/
+#: (content/about/protections/contents+en.lrquestion.description)
+msgid ""
+"Note that all your local ISP can observe now is that you are communicating "
+"with Tor nodes."
+msgstr ""
+
+#: https//support.torproject.org/about/protections/
+#: (content/about/protections/contents+en.lrquestion.description)
+msgid ""
+"Similarly, servers in the Internet just see that they are being contacted by"
+" Tor nodes."
+msgstr ""
+
+#: https//support.torproject.org/about/protections/
+#: (content/about/protections/contents+en.lrquestion.description)
+msgid "Generally speaking, Tor aims to solve three privacy problems:"
+msgstr ""
+
+#: https//support.torproject.org/about/protections/
+#: (content/about/protections/contents+en.lrquestion.description)
+msgid ""
+"First, Tor prevents websites and other services from learning your location,"
+" which they can use to build databases about your habits and interests."
+msgstr ""
+
+#: https//support.torproject.org/about/protections/
+#: (content/about/protections/contents+en.lrquestion.description)
+msgid ""
+"With Tor, your Internet connections don't give you away by default -- now "
+"you can have the ability to choose, for each connection, how much "
+"information to reveal."
+msgstr ""
+
+#: https//support.torproject.org/about/protections/
+#: (content/about/protections/contents+en.lrquestion.description)
+msgid ""
+"Second, Tor prevents people watching your traffic locally (such as your ISP "
+"or someone with access to your home wifi or router) from learning what "
+"information you're fetching and where you're fetching it from."
+msgstr ""
+
+#: https//support.torproject.org/about/protections/
+#: (content/about/protections/contents+en.lrquestion.description)
+msgid ""
+"It also stops them from deciding what you're allowed to learn and publish --"
+" if you can get to any part of the Tor network, you can reach any site on "
+"the Internet."
+msgstr ""
+
+#: https//support.torproject.org/about/protections/
+#: (content/about/protections/contents+en.lrquestion.description)
+msgid ""
+"Third, Tor routes your connection through more than one Tor relay so no "
+"single relay can learn what you're up to."
+msgstr ""
+
+#: https//support.torproject.org/about/protections/
+#: (content/about/protections/contents+en.lrquestion.description)
+msgid ""
+"Because these relays are run by different individuals or organizations, "
+"distributing trust provides more security than the old [one hop "
+"proxy](https://support.torproject.org/about/#how-is-tor-different-from-"
+"other-proxies) approach."
+msgstr ""
+
+#: https//support.torproject.org/about/protections/
+#: (content/about/protections/contents+en.lrquestion.description)
+msgid ""
+"Note, however, that there are situations where Tor fails to solve these "
+"privacy problems entirely: see the entry below on [remaining "
+"attacks](https://support.torproject.org/about/#attacks-on-onion-routing)."
+msgstr ""
+
#: https//support.torproject.org/about/what-is-tor/
#: (content/about/what-is-tor/contents+en.lrquestion.title)
msgid "What is Tor?"
@@ -5226,9 +5806,11 @@ msgstr ""
#: (content/tbb/tbb-47/contents+en.lrquestion.description)
msgid ""
"Also, read up on the HTTPProxyAuthenticator and HTTPSProxyAuthenticator "
-"options if your proxy requires auth. We only support basic auth currently, "
-"but if you need NTLM authentication, you may find [this post in the "
-"archives](https://archives.seul.org/or/talk/Jun-2005/msg00223.html) useful."
+"options if your [proxy requires auth.](https://developer.mozilla.org/en-"
+"US/docs/Web/HTTP/Headers/Proxy-Authenticate) We only support basic auth "
+"currently, but if you need NTLM authentication, you may find [this post in "
+"the archives](https://archives.seul.org/or/talk/Jun-2005/msg00223.html) "
+"useful."
msgstr ""
#: https//support.torproject.org/tbb/tbb-47/
@@ -5458,6 +6040,219 @@ msgid ""
"have no effect on Tor's configuration."
msgstr ""
+#: https//support.torproject.org/tbb/tbb-firewall-ports/
+#: (content/tbb/tbb-firewall-ports/contents+en.lrquestion.title)
+msgid "My firewall only allows a few outgoing ports"
+msgstr ""
+
+#: https//support.torproject.org/tbb/tbb-firewall-ports/
+#: (content/tbb/tbb-firewall-ports/contents+en.lrquestion.description)
+msgid ""
+"If your firewall works by blocking ports, then you can tell Tor to only use "
+"the ports when you start your Tor Browser."
+msgstr ""
+
+#: https//support.torproject.org/tbb/tbb-firewall-ports/
+#: (content/tbb/tbb-firewall-ports/contents+en.lrquestion.description)
+msgid ""
+"Or you can add the ports that your firewall permits by adding "
+"\"FascistFirewall 1\" to your torrc configuration file."
+msgstr ""
+
+#: https//support.torproject.org/tbb/tbb-firewall-ports/
+#: (content/tbb/tbb-firewall-ports/contents+en.lrquestion.description)
+msgid ""
+"By default, when you set this Tor assumes that your firewall allows only "
+"port 80 and port 443 (HTTP and HTTPS respectively)."
+msgstr ""
+
+#: https//support.torproject.org/tbb/tbb-firewall-ports/
+#: (content/tbb/tbb-firewall-ports/contents+en.lrquestion.description)
+msgid ""
+"You can select a different set of ports with the FirewallPorts torrc option."
+msgstr ""
+
+#: https//support.torproject.org/tbb/tbb-firewall-ports/
+#: (content/tbb/tbb-firewall-ports/contents+en.lrquestion.description)
+msgid ""
+"If you want to be more fine-grained with your controls, you can also use the"
+" ReachableAddresses config options, e.g.:"
+msgstr ""
+
+#: https//support.torproject.org/tbb/tbb-firewall-ports/
+#: (content/tbb/tbb-firewall-ports/contents+en.lrquestion.description)
+#: https//support.torproject.org/tbb/tbb-install-tor-central-server/
+#: (content/tbb/tbb-install-tor-central-server/contents+en.lrquestion.description)
+#: https//support.torproject.org/operators/default-exit-ports/
+#: (content/operators/default-exit-ports/contents+en.lrquestion.description)
+#: https//support.torproject.org/operators/hibernation/
+#: (content/operators/hibernation/contents+en.lrquestion.description)
+#: https//support.torproject.org/operators/limit-total-bandwidth/
+#: (content/operators/limit-total-bandwidth/contents+en.lrquestion.description)
+#: https//support.torproject.org/misc/bug-or-feedback/
+#: (content/misc/bug-or-feedback/contents+en.lrquestion.description)
+#: https//support.torproject.org/get-in-touch/why-i-cant-join-tor-channels/
+#: (content/get-in-touch/why-i-cant-join-tor-channels/contents+en.lrquestion.description)
+#: https//support.torproject.org/apt/tor-deb-repo/
+#: (content/apt/apt-1/contents+en.lrquestion.description)
+#: https//support.torproject.org/apt/apt-over-tor/
+#: (content/apt/apt-3/contents+en.lrquestion.description)
+msgid "```"
+msgstr "```"
+
+#: https//support.torproject.org/tbb/tbb-firewall-ports/
+#: (content/tbb/tbb-firewall-ports/contents+en.lrquestion.description)
+msgid "ReachableDirAddresses *:80"
+msgstr ""
+
+#: https//support.torproject.org/tbb/tbb-firewall-ports/
+#: (content/tbb/tbb-firewall-ports/contents+en.lrquestion.description)
+msgid "ReachableORAddresses *:443"
+msgstr ""
+
+#: https//support.torproject.org/tbb/tbb-install-tor-central-server/
+#: (content/tbb/tbb-install-tor-central-server/contents+en.lrquestion.title)
+msgid ""
+"Can I install Tor on a central server, and have my clients connect to it?"
+msgstr ""
+
+#: https//support.torproject.org/tbb/tbb-install-tor-central-server/
+#: (content/tbb/tbb-install-tor-central-server/contents+en.lrquestion.description)
+msgid ""
+"Yes. Tor can be configured as a client or a relay on another machine, and "
+"allow other machines to be able to connect to it for anonymity."
+msgstr ""
+
+#: https//support.torproject.org/tbb/tbb-install-tor-central-server/
+#: (content/tbb/tbb-install-tor-central-server/contents+en.lrquestion.description)
+msgid ""
+"This is most useful in an environment where many computers want a gateway of"
+" anonymity to the rest of the world."
+msgstr ""
+
+#: https//support.torproject.org/tbb/tbb-install-tor-central-server/
+#: (content/tbb/tbb-install-tor-central-server/contents+en.lrquestion.description)
+msgid ""
+"However, be forewarned that with this configuration, anyone within your "
+"private network (existing between you and the Tor client/relay) can see what"
+" traffic you are sending in clear text."
+msgstr ""
+
+#: https//support.torproject.org/tbb/tbb-install-tor-central-server/
+#: (content/tbb/tbb-install-tor-central-server/contents+en.lrquestion.description)
+msgid "The anonymity doesn't start until you get to the Tor relay."
+msgstr ""
+
+#: https//support.torproject.org/tbb/tbb-install-tor-central-server/
+#: (content/tbb/tbb-install-tor-central-server/contents+en.lrquestion.description)
+msgid ""
+"Because of this, if you are the controller of your domain and you know "
+"everything's locked down, you will be OK, but this configuration may not be "
+"suitable for large private networks where security is key all around."
+msgstr ""
+
+#: https//support.torproject.org/tbb/tbb-install-tor-central-server/
+#: (content/tbb/tbb-install-tor-central-server/contents+en.lrquestion.description)
+msgid ""
+"Configuration is simple, editing your torrc file's SocksListenAddress "
+"according to the following examples:"
+msgstr ""
+
+#: https//support.torproject.org/tbb/tbb-install-tor-central-server/
+#: (content/tbb/tbb-install-tor-central-server/contents+en.lrquestion.description)
+msgid "SocksListenAddress 127.0.0.1"
+msgstr ""
+
+#: https//support.torproject.org/tbb/tbb-install-tor-central-server/
+#: (content/tbb/tbb-install-tor-central-server/contents+en.lrquestion.description)
+msgid "SocksListenAddress 192.168.x.x:9100"
+msgstr ""
+
+#: https//support.torproject.org/tbb/tbb-install-tor-central-server/
+#: (content/tbb/tbb-install-tor-central-server/contents+en.lrquestion.description)
+msgid "SocksListenAddress 0.0.0.0:9100"
+msgstr ""
+
+#: https//support.torproject.org/tbb/tbb-install-tor-central-server/
+#: (content/tbb/tbb-install-tor-central-server/contents+en.lrquestion.description)
+msgid ""
+"You can state multiple listen addresses, in the case that you are part of "
+"several networks or subnets."
+msgstr ""
+
+#: https//support.torproject.org/tbb/tbb-install-tor-central-server/
+#: (content/tbb/tbb-install-tor-central-server/contents+en.lrquestion.description)
+msgid "SocksListenAddress 192.168.x.x:9100 #eth0"
+msgstr ""
+
+#: https//support.torproject.org/tbb/tbb-install-tor-central-server/
+#: (content/tbb/tbb-install-tor-central-server/contents+en.lrquestion.description)
+msgid "SocksListenAddress 10.x.x.x:9100 #eth1"
+msgstr ""
+
+#: https//support.torproject.org/tbb/tbb-install-tor-central-server/
+#: (content/tbb/tbb-install-tor-central-server/contents+en.lrquestion.description)
+msgid ""
+"After this, your clients on their respective networks/subnets would specify "
+"a socks proxy with the address and port you specified SocksListenAddress to "
+"be."
+msgstr ""
+
+#: https//support.torproject.org/tbb/tbb-install-tor-central-server/
+#: (content/tbb/tbb-install-tor-central-server/contents+en.lrquestion.description)
+msgid ""
+"Please note that the SocksPort configuration option gives the port ONLY for "
+"localhost (127.0.0.1)."
+msgstr ""
+
+#: https//support.torproject.org/tbb/tbb-install-tor-central-server/
+#: (content/tbb/tbb-install-tor-central-server/contents+en.lrquestion.description)
+msgid ""
+"When setting up your SocksListenAddress(es), you need to give the port with "
+"the address, as shown above."
+msgstr ""
+
+#: https//support.torproject.org/tbb/tbb-install-tor-central-server/
+#: (content/tbb/tbb-install-tor-central-server/contents+en.lrquestion.description)
+msgid ""
+"If you are interested in forcing all outgoing data through the central Tor "
+"client/relay, instead of the server only being an optional proxy, you may "
+"find the program iptables (for *nix) useful."
+msgstr ""
+
+#: https//support.torproject.org/tbb/tbb-run-client-different-computer/
+#: (content/tbb/tbb-run-client-different-computer/contents+en.lrquestion.title)
+msgid ""
+"I want to run my Tor client on a different computer than my applications"
+msgstr ""
+
+#: https//support.torproject.org/tbb/tbb-run-client-different-computer/
+#: (content/tbb/tbb-run-client-different-computer/contents+en.lrquestion.description)
+msgid ""
+"By default, your Tor client only listens for applications that connect from "
+"localhost."
+msgstr ""
+
+#: https//support.torproject.org/tbb/tbb-run-client-different-computer/
+#: (content/tbb/tbb-run-client-different-computer/contents+en.lrquestion.description)
+msgid "Connections from other computers are refused."
+msgstr ""
+
+#: https//support.torproject.org/tbb/tbb-run-client-different-computer/
+#: (content/tbb/tbb-run-client-different-computer/contents+en.lrquestion.description)
+msgid ""
+"If you want to torify applications on different computers than the Tor "
+"client, you should edit your torrc to define `SocksListenAddress 0.0.0.0` "
+"and then restart (or hup) Tor."
+msgstr ""
+
+#: https//support.torproject.org/tbb/tbb-run-client-different-computer/
+#: (content/tbb/tbb-run-client-different-computer/contents+en.lrquestion.description)
+msgid ""
+"If you want to get more advanced, you can configure your Tor client on a "
+"firewall to bind to your internal IP but not your external IP."
+msgstr ""
+
#: https//support.torproject.org/tbb/website-blocking-tor/
#: (content/tbb/website-blocking-tor/contents+en.lrquestion.title)
msgid "A website I am trying to reach is blocking access over Tor."
@@ -7025,6 +7820,130 @@ msgid ""
"guide."
msgstr ""
+#: https//support.torproject.org/operators/default-exit-ports/
+#: (content/operators/default-exit-ports/contents+en.lrquestion.title)
+msgid "Is there a list of default exit ports?"
+msgstr ""
+
+#: https//support.torproject.org/operators/default-exit-ports/
+#: (content/operators/default-exit-ports/contents+en.lrquestion.description)
+msgid ""
+"The default open ports are listed below but keep in mind that, any port or "
+"ports can be opened by the relay operator by configuring it in torrc or "
+"modifying the source code."
+msgstr ""
+
+#: https//support.torproject.org/operators/default-exit-ports/
+#: (content/operators/default-exit-ports/contents+en.lrquestion.description)
+msgid ""
+"The default according to src/or/policies.c ([line 85][1] and [line 1901][2])"
+" from the source code release [release-0.4.6][3]:"
+msgstr ""
+
+#: https//support.torproject.org/operators/default-exit-ports/
+#: (content/operators/default-exit-ports/contents+en.lrquestion.description)
+msgid "reject 0.0.0.0/8"
+msgstr ""
+
+#: https//support.torproject.org/operators/default-exit-ports/
+#: (content/operators/default-exit-ports/contents+en.lrquestion.description)
+msgid "reject 169.254.0.0/16"
+msgstr ""
+
+#: https//support.torproject.org/operators/default-exit-ports/
+#: (content/operators/default-exit-ports/contents+en.lrquestion.description)
+msgid "reject 127.0.0.0/8"
+msgstr ""
+
+#: https//support.torproject.org/operators/default-exit-ports/
+#: (content/operators/default-exit-ports/contents+en.lrquestion.description)
+msgid "reject 192.168.0.0/16"
+msgstr ""
+
+#: https//support.torproject.org/operators/default-exit-ports/
+#: (content/operators/default-exit-ports/contents+en.lrquestion.description)
+msgid "reject 10.0.0.0/8"
+msgstr ""
+
+#: https//support.torproject.org/operators/default-exit-ports/
+#: (content/operators/default-exit-ports/contents+en.lrquestion.description)
+msgid "reject 172.16.0.0/12"
+msgstr ""
+
+#: https//support.torproject.org/operators/default-exit-ports/
+#: (content/operators/default-exit-ports/contents+en.lrquestion.description)
+msgid "reject *:25"
+msgstr ""
+
+#: https//support.torproject.org/operators/default-exit-ports/
+#: (content/operators/default-exit-ports/contents+en.lrquestion.description)
+msgid "reject *:119"
+msgstr ""
+
+#: https//support.torproject.org/operators/default-exit-ports/
+#: (content/operators/default-exit-ports/contents+en.lrquestion.description)
+msgid "reject *:135-139"
+msgstr ""
+
+#: https//support.torproject.org/operators/default-exit-ports/
+#: (content/operators/default-exit-ports/contents+en.lrquestion.description)
+msgid "reject *:445"
+msgstr ""
+
+#: https//support.torproject.org/operators/default-exit-ports/
+#: (content/operators/default-exit-ports/contents+en.lrquestion.description)
+msgid "reject *:563"
+msgstr ""
+
+#: https//support.torproject.org/operators/default-exit-ports/
+#: (content/operators/default-exit-ports/contents+en.lrquestion.description)
+msgid "reject *:1214"
+msgstr ""
+
+#: https//support.torproject.org/operators/default-exit-ports/
+#: (content/operators/default-exit-ports/contents+en.lrquestion.description)
+msgid "reject *:4661-4666"
+msgstr ""
+
+#: https//support.torproject.org/operators/default-exit-ports/
+#: (content/operators/default-exit-ports/contents+en.lrquestion.description)
+msgid "reject *:6346-6429"
+msgstr ""
+
+#: https//support.torproject.org/operators/default-exit-ports/
+#: (content/operators/default-exit-ports/contents+en.lrquestion.description)
+msgid "reject *:6699"
+msgstr ""
+
+#: https//support.torproject.org/operators/default-exit-ports/
+#: (content/operators/default-exit-ports/contents+en.lrquestion.description)
+msgid "reject *:6881-6999"
+msgstr ""
+
+#: https//support.torproject.org/operators/default-exit-ports/
+#: (content/operators/default-exit-ports/contents+en.lrquestion.description)
+msgid "accept *:*"
+msgstr ""
+
+#: https//support.torproject.org/operators/default-exit-ports/
+#: (content/operators/default-exit-ports/contents+en.lrquestion.description)
+msgid ""
+"[1]: "
+"https://gitlab.torproject.org/tpo/core/tor/-/blob/release-0.4.6/src/core/or/policies.c#L85"
+msgstr ""
+
+#: https//support.torproject.org/operators/default-exit-ports/
+#: (content/operators/default-exit-ports/contents+en.lrquestion.description)
+msgid ""
+"[2]: "
+"https://gitlab.torproject.org/tpo/core/tor/-/blob/release-0.4.6/src/core/or/policies.c#L1901"
+msgstr ""
+
+#: https//support.torproject.org/operators/default-exit-ports/
+#: (content/operators/default-exit-ports/contents+en.lrquestion.description)
+msgid "[3]: https://gitlab.torproject.org/tpo/core/tor/-/tree/release-0.4.6/"
+msgstr ""
+
#: https//support.torproject.org/operators/dynamic-ip/
#: (content/operators/dynamic-ip/contents+en.lrquestion.title)
msgid "Can I run a Tor relay using a dynamic IP address?"
@@ -7172,21 +8091,6 @@ msgid ""
"into hibernation, signaled by this entry in the log:"
msgstr ""
-#: https//support.torproject.org/operators/hibernation/
-#: (content/operators/hibernation/contents+en.lrquestion.description)
-#: https//support.torproject.org/operators/limit-total-bandwidth/
-#: (content/operators/limit-total-bandwidth/contents+en.lrquestion.description)
-#: https//support.torproject.org/misc/bug-or-feedback/
-#: (content/misc/bug-or-feedback/contents+en.lrquestion.description)
-#: https//support.torproject.org/get-in-touch/why-i-cant-join-tor-channels/
-#: (content/get-in-touch/why-i-cant-join-tor-channels/contents+en.lrquestion.description)
-#: https//support.torproject.org/apt/tor-deb-repo/
-#: (content/apt/apt-1/contents+en.lrquestion.description)
-#: https//support.torproject.org/apt/apt-over-tor/
-#: (content/apt/apt-3/contents+en.lrquestion.description)
-msgid "```"
-msgstr "```"
-
#: https//support.torproject.org/operators/hibernation/
#: (content/operators/hibernation/contents+en.lrquestion.description)
msgid "Bandwidth soft limit reached; commencing hibernation."
@@ -9471,6 +10375,131 @@ msgstr ""
msgid "sub 4096R/C00942E4 2017-03-13"
msgstr ""
+#: https//support.torproject.org/misc/check-socks-dns-leaks/
+#: (content/misc/check-socks-dns-leaks/contents+en.lrquestion.title)
+msgid ""
+"How do I check if my application that uses SOCKS is leaking DNS requests?"
+msgstr ""
+
+#: https//support.torproject.org/misc/check-socks-dns-leaks/
+#: (content/misc/check-socks-dns-leaks/contents+en.lrquestion.description)
+msgid ""
+"Even if your application is using the correct variant of the SOCKS protocol,"
+" there is still a risk that it could be leaking DNS queries."
+msgstr ""
+
+#: https//support.torproject.org/misc/check-socks-dns-leaks/
+#: (content/misc/check-socks-dns-leaks/contents+en.lrquestion.description)
+msgid ""
+"This problem happens in Firefox extensions that resolve the destination "
+"hostname themselves, for example to show you its IP address, what country "
+"it's in, etc."
+msgstr ""
+
+#: https//support.torproject.org/misc/check-socks-dns-leaks/
+#: (content/misc/check-socks-dns-leaks/contents+en.lrquestion.description)
+msgid ""
+"If you suspect your application might behave like this, follow the "
+"instructions below to check."
+msgstr ""
+
+#: https//support.torproject.org/misc/check-socks-dns-leaks/
+#: (content/misc/check-socks-dns-leaks/contents+en.lrquestion.description)
+msgid ""
+"1. Add `TestSocks 1` to your [torrc file](https://support.torproject.org/tbb"
+"/tbb-editing-torrc/)."
+msgstr ""
+
+#: https//support.torproject.org/misc/check-socks-dns-leaks/
+#: (content/misc/check-socks-dns-leaks/contents+en.lrquestion.description)
+msgid ""
+"1. Start Tor, and point your program's SOCKS proxy settings to Tor's SOCKS5 "
+"server (`socks5://127.0.0.1:9050` by default)."
+msgstr ""
+
+#: https//support.torproject.org/misc/check-socks-dns-leaks/
+#: (content/misc/check-socks-dns-leaks/contents+en.lrquestion.description)
+msgid ""
+"1. Watch your logs as you use your application. For each socks connection, "
+"Tor will log a `notice` for safe connections, and a `warn` for connections "
+"leaking DNS requests."
+msgstr ""
+
+#: https//support.torproject.org/misc/check-socks-dns-leaks/
+#: (content/misc/check-socks-dns-leaks/contents+en.lrquestion.description)
+msgid ""
+"If you want to automatically disable all connections leaking DNS requests, "
+"set `SafeSocks 1` in your torrc file."
+msgstr ""
+
+#: https//support.torproject.org/misc/hide-exits/
+#: (content/misc/hide-exits/contents+en.lrquestion.title)
+msgid ""
+"You should hide the list of Tor relays, so people can't block the exits."
+msgstr ""
+
+#: https//support.torproject.org/misc/hide-exits/
+#: (content/misc/hide-exits/contents+en.lrquestion.description)
+msgid "There are a few reasons we don't:"
+msgstr ""
+
+#: https//support.torproject.org/misc/hide-exits/
+#: (content/misc/hide-exits/contents+en.lrquestion.description)
+msgid ""
+"1. We can't help but make the information available, since Tor clients need "
+"to use it to pick their paths."
+msgstr ""
+
+#: https//support.torproject.org/misc/hide-exits/
+#: (content/misc/hide-exits/contents+en.lrquestion.description)
+msgid "So if the \"blockers\" want it, they can get it anyway."
+msgstr ""
+
+#: https//support.torproject.org/misc/hide-exits/
+#: (content/misc/hide-exits/contents+en.lrquestion.description)
+msgid ""
+"Further, even if we didn't tell clients about the list of relays directly, "
+"somebody could still make a lot of connections through Tor to a test site "
+"and build a list of the addresses they see."
+msgstr ""
+
+#: https//support.torproject.org/misc/hide-exits/
+#: (content/misc/hide-exits/contents+en.lrquestion.description)
+msgid ""
+"1. If people want to block us, we believe that they should be allowed to do "
+"so."
+msgstr ""
+
+#: https//support.torproject.org/misc/hide-exits/
+#: (content/misc/hide-exits/contents+en.lrquestion.description)
+msgid ""
+"Obviously, we would prefer for everybody to allow Tor users to connect to "
+"them, but people have the right to decide who their services should allow "
+"connections from, and if they want to block anonymous users, they can."
+msgstr ""
+
+#: https//support.torproject.org/misc/hide-exits/
+#: (content/misc/hide-exits/contents+en.lrquestion.description)
+msgid ""
+"1. Being blockable also has tactical advantages: it may be a persuasive "
+"response to website maintainers who feel threatened by Tor."
+msgstr ""
+
+#: https//support.torproject.org/misc/hide-exits/
+#: (content/misc/hide-exits/contents+en.lrquestion.description)
+msgid ""
+"Giving them the option may inspire them to stop and think about whether they"
+" really want to eliminate private access to their system, and if not, what "
+"other options they might have."
+msgstr ""
+
+#: https//support.torproject.org/misc/hide-exits/
+#: (content/misc/hide-exits/contents+en.lrquestion.description)
+msgid ""
+"The time they might otherwise have spent blocking Tor, they may instead "
+"spend rethinking their overall approach to privacy and anonymity."
+msgstr ""
+
#: https//support.torproject.org/misc/menu/
#: (content/misc/menu/contents+en.lrquestion.description)
msgid "About"
@@ -10117,56 +11146,20 @@ msgstr ""
#: https//support.torproject.org/get-in-touch/why-i-cant-join-tor-channels/
#: (content/get-in-touch/why-i-cant-join-tor-channels/contents+en.lrquestion.description)
msgid ""
-"Then, to complete the registration and ultimately gain access to the #tor-"
-"project channel, your nickname must be **verified**."
-msgstr ""
-
-#: https//support.torproject.org/get-in-touch/why-i-cant-join-tor-channels/
-#: (content/get-in-touch/why-i-cant-join-tor-channels/contents+en.lrquestion.description)
-msgid ""
-"1. To verify your nick, open a new browser window and go to "
-"https://webchat.oftc.net/?channels=tor."
-msgstr ""
-
-#: https//support.torproject.org/get-in-touch/why-i-cant-join-tor-channels/
-#: (content/get-in-touch/why-i-cant-join-tor-channels/contents+en.lrquestion.description)
-msgid "2. Log in with your IRC nickname and password."
-msgstr ""
-
-#: https//support.torproject.org/get-in-touch/why-i-cant-join-tor-channels/
-#: (content/get-in-touch/why-i-cant-join-tor-channels/contents+en.lrquestion.description)
-msgid ""
-"3. Look for the word **verify** and log in there. It may appear that nothing"
-" has happened. Look at the top of the page, and there will be a column "
-"called **Account**."
-msgstr ""
-
-#: https//support.torproject.org/get-in-touch/why-i-cant-join-tor-channels/
-#: (content/get-in-touch/why-i-cant-join-tor-channels/contents+en.lrquestion.description)
-msgid "4. Click on **Account**."
-msgstr ""
-
-#: https//support.torproject.org/get-in-touch/why-i-cant-join-tor-channels/
-#: (content/get-in-touch/why-i-cant-join-tor-channels/contents+en.lrquestion.description)
-msgid ""
-"5. Click on the small sentence at the bottom of the square that says: Verify"
-" account."
-msgstr ""
-
-#: https//support.torproject.org/get-in-touch/why-i-cant-join-tor-channels/
-#: (content/get-in-touch/why-i-cant-join-tor-channels/contents+en.lrquestion.description)
-msgid "6. Fill out the Captcha that pops up, and click ok."
+"After registering your nickname, to gain access to the #tor-project and "
+"other protected channels, your nickname must be **verified**."
msgstr ""
#: https//support.torproject.org/get-in-touch/why-i-cant-join-tor-channels/
#: (content/get-in-touch/why-i-cant-join-tor-channels/contents+en.lrquestion.description)
msgid ""
-"7. A tiny message will appear: \"Your NickServ account has been verified.\""
+"1. Go to https://services.oftc.net/ and follow the steps in the '*To verify "
+"your account*' section"
msgstr ""
#: https//support.torproject.org/get-in-touch/why-i-cant-join-tor-channels/
#: (content/get-in-touch/why-i-cant-join-tor-channels/contents+en.lrquestion.description)
-msgid "8. Go back to the IRC webpage where you are logged in and type:"
+msgid "2. Go back to the IRC webpage where you are logged in and type:"
msgstr ""
#: https//support.torproject.org/get-in-touch/why-i-cant-join-tor-channels/
@@ -10176,12 +11169,12 @@ msgstr ""
#: https//support.torproject.org/get-in-touch/why-i-cant-join-tor-channels/
#: (content/get-in-touch/why-i-cant-join-tor-channels/contents+en.lrquestion.description)
-msgid "9. Click ENTER."
+msgid "3. Click ENTER."
msgstr ""
#: https//support.torproject.org/get-in-touch/why-i-cant-join-tor-channels/
#: (content/get-in-touch/why-i-cant-join-tor-channels/contents+en.lrquestion.description)
-msgid "10. If all is well, you will receive a message that says:"
+msgid "4. If all is well, you will receive a message that says:"
msgstr ""
#: https//support.torproject.org/get-in-touch/why-i-cant-join-tor-channels/
@@ -10322,18 +11315,22 @@ msgstr "# apt install apt-transport-https"
#: https//support.torproject.org/apt/tor-deb-repo/
#: (content/apt/apt-1/contents+en.lrquestion.description)
msgid ""
-"#### 2. Add the following entries to `/etc/apt/sources.list` or a new file "
-"in `/etc/apt/sources.list.d/`"
+"#### 2. Create a new file in `/etc/apt/sources.list.d/` named `tor.list`. "
+"Add the following entries:"
msgstr ""
#: https//support.torproject.org/apt/tor-deb-repo/
#: (content/apt/apt-1/contents+en.lrquestion.description)
-msgid "deb https://deb.torproject.org/torproject.org <DISTRIBUTION> main"
+msgid ""
+"deb [signed-by=/usr/share/keyrings/tor-archive-keyring.gpg] "
+"https://deb.torproject.org/torproject.org <DISTRIBUTION> main"
msgstr ""
#: https//support.torproject.org/apt/tor-deb-repo/
#: (content/apt/apt-1/contents+en.lrquestion.description)
-msgid "deb-src https://deb.torproject.org/torproject.org <DISTRIBUTION> main"
+msgid ""
+"deb-src [signed-by=/usr/share/keyrings/tor-archive-keyring.gpg] "
+"https://deb.torproject.org/torproject.org <DISTRIBUTION> main"
msgstr ""
#: https//support.torproject.org/apt/tor-deb-repo/
@@ -10347,14 +11344,16 @@ msgstr ""
#: https//support.torproject.org/apt/tor-deb-repo/
#: (content/apt/apt-1/contents+en.lrquestion.description)
msgid ""
-"deb https://deb.torproject.org/torproject.org tor-"
+"deb [signed-by=/usr/share/keyrings/tor-archive-keyring.gpg] "
+"https://deb.torproject.org/torproject.org tor-"
"experimental-0.4.6.x-<DISTRIBUTION> main"
msgstr ""
#: https//support.torproject.org/apt/tor-deb-repo/
#: (content/apt/apt-1/contents+en.lrquestion.description)
msgid ""
-"deb-src https://deb.torproject.org/torproject.org tor-"
+"deb-src [signed-by=/usr/share/keyrings/tor-archive-keyring.gpg] "
+"https://deb.torproject.org/torproject.org tor-"
"experimental-0.4.6.x-<DISTRIBUTION> main"
msgstr ""
@@ -10366,15 +11365,17 @@ msgstr ""
#: https//support.torproject.org/apt/tor-deb-repo/
#: (content/apt/apt-1/contents+en.lrquestion.description)
msgid ""
-"deb https://deb.torproject.org/torproject.org tor-nightly-"
-"master-<DISTRIBUTION> main"
+"deb [signed-by=/usr/share/keyrings/tor-archive-keyring.gpg] "
+"https://deb.torproject.org/torproject.org tor-nightly-master-<DISTRIBUTION> "
+"main"
msgstr ""
#: https//support.torproject.org/apt/tor-deb-repo/
#: (content/apt/apt-1/contents+en.lrquestion.description)
msgid ""
-"deb-src https://deb.torproject.org/torproject.org tor-nightly-"
-"master-<DISTRIBUTION> main"
+"deb-src [signed-by=/usr/share/keyrings/tor-archive-keyring.gpg] "
+"https://deb.torproject.org/torproject.org tor-nightly-master-<DISTRIBUTION> "
+"main"
msgstr ""
#: https//support.torproject.org/apt/tor-deb-repo/
@@ -10395,13 +11396,15 @@ msgstr ""
#: https//support.torproject.org/apt/tor-deb-repo/
#: (content/apt/apt-1/contents+en.lrquestion.description)
msgid ""
-"deb [arch=amd64] https://deb.torproject.org/torproject.org focal main"
+"deb [arch=amd64 signed-by=/usr/share/keyrings/tor-archive-keyring.gpg] "
+"https://deb.torproject.org/torproject.org focal main"
msgstr ""
#: https//support.torproject.org/apt/tor-deb-repo/
#: (content/apt/apt-1/contents+en.lrquestion.description)
msgid ""
-"deb-src [arch=amd64] https://deb.torproject.org/torproject.org focal main"
+"deb-src [arch=amd64 signed-by=/usr/share/keyrings/tor-archive-keyring.gpg] "
+"https://deb.torproject.org/torproject.org focal main"
msgstr ""
#: https//support.torproject.org/apt/tor-deb-repo/
@@ -10421,26 +11424,17 @@ msgstr ""
#: (content/apt/apt-1/contents+en.lrquestion.description)
msgid ""
"#### 3. Then add the gpg key used to sign the packages by running the "
-"following commands at your command prompt"
+"following command at your command prompt:"
msgstr ""
#: https//support.torproject.org/apt/tor-deb-repo/
#: (content/apt/apt-1/contents+en.lrquestion.description)
msgid ""
-"# wget -qO- "
+"# wget -O- "
"https://deb.torproject.org/torproject.org/A3C4F0F979CAA22CDBA8F512EE8CBC9E886DDD89.asc"
-" | gpg --import"
+" | gpg --dearmor | tee /usr/share/keyrings/tor-archive-keyring.gpg "
+">/dev/null"
msgstr ""
-"# wget -qO- "
-"https://deb.torproject.org/torproject.org/A3C4F0F979CAA22CDBA8F512EE8CBC9E886DDD89.asc"
-" | gpg --import"
-
-#: https//support.torproject.org/apt/tor-deb-repo/
-#: (content/apt/apt-1/contents+en.lrquestion.description)
-msgid ""
-"# gpg --export A3C4F0F979CAA22CDBA8F512EE8CBC9E886DDD89 | apt-key add -"
-msgstr ""
-"# gpg --export A3C4F0F979CAA22CDBA8F512EE8CBC9E886DDD89 | apt-key add -"
#: https//support.torproject.org/apt/tor-deb-repo/
#: (content/apt/apt-1/contents+en.lrquestion.description)
@@ -12046,6 +13040,82 @@ msgid ""
"doesn't change IP address over the day."
msgstr ""
+#: https//support.torproject.org/alternate-designs/block-websites/
+#: (content/alternate-designs/block-websites/contents+en.lrquestion.title)
+msgid "Exit policies should be able to block websites, not just IP addresses."
+msgstr ""
+
+#: https//support.torproject.org/alternate-designs/block-websites/
+#: (content/alternate-designs/block-websites/contents+en.lrquestion.description)
+msgid ""
+"It would be nice to let relay operators say things like `reject "
+"www.slashdot.org` in their exit policies, rather than requiring them to "
+"learn all the IP address space that could be covered by the site (and then "
+"also blocking other sites at those IP addresses)."
+msgstr ""
+
+#: https//support.torproject.org/alternate-designs/block-websites/
+#: (content/alternate-designs/block-websites/contents+en.lrquestion.description)
+msgid "There are two problems, though."
+msgstr ""
+
+#: https//support.torproject.org/alternate-designs/block-websites/
+#: (content/alternate-designs/block-websites/contents+en.lrquestion.description)
+msgid "First, users could still get around these blocks."
+msgstr ""
+
+#: https//support.torproject.org/alternate-designs/block-websites/
+#: (content/alternate-designs/block-websites/contents+en.lrquestion.description)
+msgid ""
+"For example, they could request the IP address rather than the hostname when"
+" they exit from the Tor network."
+msgstr ""
+
+#: https//support.torproject.org/alternate-designs/block-websites/
+#: (content/alternate-designs/block-websites/contents+en.lrquestion.description)
+msgid ""
+"This means operators would still need to learn all the IP addresses for the "
+"destinations in question."
+msgstr ""
+
+#: https//support.torproject.org/alternate-designs/block-websites/
+#: (content/alternate-designs/block-websites/contents+en.lrquestion.description)
+msgid ""
+"The second problem is that it would allow remote attackers to censor "
+"arbitrary sites."
+msgstr ""
+
+#: https//support.torproject.org/alternate-designs/block-websites/
+#: (content/alternate-designs/block-websites/contents+en.lrquestion.description)
+msgid ""
+"For example, if a Tor operator blocks www1.slashdot.org, and then some "
+"attacker poisons the Tor relay's DNS or otherwise changes that hostname to "
+"resolve to the IP address for a major news site, then suddenly that Tor "
+"relay is blocking the news site."
+msgstr ""
+
+#: https//support.torproject.org/alternate-designs/let-the-network-pick-the-path/
+#: (content/alternate-designs/let-the-network-pick-the-path/contents+en.lrquestion.title)
+msgid "You should let the network pick the path, not the client."
+msgstr ""
+
+#: https//support.torproject.org/alternate-designs/let-the-network-pick-the-path/
+#: (content/alternate-designs/let-the-network-pick-the-path/contents+en.lrquestion.description)
+msgid "No, you cannot trust the network to pick the path."
+msgstr ""
+
+#: https//support.torproject.org/alternate-designs/let-the-network-pick-the-path/
+#: (content/alternate-designs/let-the-network-pick-the-path/contents+en.lrquestion.description)
+msgid "Malicious relays could route you through their colluding friends."
+msgstr ""
+
+#: https//support.torproject.org/alternate-designs/let-the-network-pick-the-path/
+#: (content/alternate-designs/let-the-network-pick-the-path/contents+en.lrquestion.description)
+msgid ""
+"This would give an adversary the ability to watch all of your traffic end to"
+" end."
+msgstr ""
+
#: lego/templates/banner.html:3 lego/templates/banner.html:5
#: templates/banner.html:3 templates/banner.html:5
msgid "Close banner"
@@ -12076,8 +13146,8 @@ msgid "DONATE NOW"
msgstr "FES UNA DONACIÃ"
#: lego/templates/footer.html:13 lego/templates/footer.html:22
-#: lego/templates/navbar.html:83 templates/footer.html:13
-#: templates/footer.html:22 templates/navbar.html:83
+#: lego/templates/navbar.html:95 templates/footer.html:13
+#: templates/footer.html:22 templates/navbar.html:95
msgid "Download Tor Browser"
msgstr "Baixeu el navegador Tor"
diff --git a/contents+cs.po b/contents+cs.po
index d5c5932987..c5bb8a43e1 100644
--- a/contents+cs.po
+++ b/contents+cs.po
@@ -18,7 +18,7 @@ msgid ""
msgstr ""
"Project-Id-Version: PACKAGE VERSION\n"
"Report-Msgid-Bugs-To: \n"
-"POT-Creation-Date: 2021-08-25 11:14+CET\n"
+"POT-Creation-Date: 2021-09-01 12:20+CET\n"
"PO-Revision-Date: 2018-10-02 22:41+0000\n"
"Last-Translator: Pavel Borecki <pavel.borecki at gmail.com>, 2021\n"
"Language-Team: Czech (https://www.transifex.com/otf/teams/1519/cs/)\n"
@@ -151,6 +151,11 @@ msgstr ""
msgid "Tor Metrics"
msgstr "Tor metriky"
+#: https//support.torproject.org/alternate-designs/
+#: (content/alternate-designs/contents+en.lrtopic.title)
+msgid "Alternate Designs We Don't Do (Yet)"
+msgstr ""
+
#: https//support.torproject.org/glossary/add-on-extension-or-plugin/
#: (content/glossary/add-on-extension-or-plugin/contents+en.lrword.term)
msgid "add-on, extension, or plugin"
@@ -2054,6 +2059,61 @@ msgid ""
"wiki](https://trac.torproject.org/projects/tor/wiki/doc/TorPlusVPN)."
msgstr ""
+#: https//support.torproject.org/faq/relay-donations/
+#: (content/faq/relay-donations/contents+en.lrquestion.title)
+msgid "Can I donate for a relay rather than run my own?"
+msgstr ""
+
+#: https//support.torproject.org/faq/relay-donations/
+#: (content/faq/relay-donations/contents+en.lrquestion.description)
+msgid ""
+"Sure! We have a [list of organizations that run Tor "
+"relays](https://community.torproject.org/relay/community-resources/relay-"
+"associations/) that are happy to turn your donations into better speed and "
+"anonymity for the Tor network."
+msgstr ""
+
+#: https//support.torproject.org/faq/relay-donations/
+#: (content/faq/relay-donations/contents+en.lrquestion.description)
+msgid ""
+"These organizations are not the same as [The Tor Project, "
+"Inc](https://donate.torproject.org/), but we consider that a good thing."
+msgstr ""
+
+#: https//support.torproject.org/faq/relay-donations/
+#: (content/faq/relay-donations/contents+en.lrquestion.description)
+msgid "They're run by nice people who are part of the Tor community."
+msgstr ""
+
+#: https//support.torproject.org/faq/relay-donations/
+#: (content/faq/relay-donations/contents+en.lrquestion.description)
+msgid ""
+"Note that there can be a tradeoff here between anonymity and performance."
+msgstr ""
+
+#: https//support.torproject.org/faq/relay-donations/
+#: (content/faq/relay-donations/contents+en.lrquestion.description)
+msgid ""
+"The Tor network's anonymity comes in part from diversity, so if you are in a"
+" position to run your own relay, you will be improving Tor's anonymity more "
+"than by donating."
+msgstr ""
+
+#: https//support.torproject.org/faq/relay-donations/
+#: (content/faq/relay-donations/contents+en.lrquestion.description)
+msgid ""
+"At the same time though, economies of scale for bandwidth mean that "
+"combining many small donations into several larger relays is more efficient "
+"at improving network performance."
+msgstr ""
+
+#: https//support.torproject.org/faq/relay-donations/
+#: (content/faq/relay-donations/contents+en.lrquestion.description)
+msgid ""
+"Improving anonymity and improving performance are both worthwhile goals, so "
+"however you can help is great!"
+msgstr ""
+
#: https//support.torproject.org/faq/staying-anonymous/
#: (content/faq/staying-anonymous/contents+en.lrquestion.title)
msgid "Am I totally anonymous if I use Tor?"
@@ -2354,6 +2414,61 @@ msgid ""
" documenting all the issues](https://community.torproject.org/)."
msgstr ""
+#: https//support.torproject.org/about/attacks-on-onion-routing/
+#: (content/about/attacks-on-onion-routing/contents+en.lrquestion.title)
+msgid "What attacks remain against onion routing?"
+msgstr ""
+
+#: https//support.torproject.org/about/attacks-on-onion-routing/
+#: (content/about/attacks-on-onion-routing/contents+en.lrquestion.description)
+msgid ""
+"As mentioned above, it is possible for an observer who can view both you and"
+" either the destination website or your Tor exit node to correlate timings "
+"of your traffic as it enters the Tor network and also as it exits."
+msgstr ""
+
+#: https//support.torproject.org/about/attacks-on-onion-routing/
+#: (content/about/attacks-on-onion-routing/contents+en.lrquestion.description)
+msgid "Tor does not defend against such a threat model."
+msgstr ""
+
+#: https//support.torproject.org/about/attacks-on-onion-routing/
+#: (content/about/attacks-on-onion-routing/contents+en.lrquestion.description)
+msgid ""
+"In a more limited sense, note that if a censor or law enforcement agency has"
+" the ability to obtain specific observation of parts of the network, it is "
+"possible for them to verify a suspicion that you talk regularly to your "
+"friend by observing traffic at both ends and correlating the timing of only "
+"that traffic."
+msgstr ""
+
+#: https//support.torproject.org/about/attacks-on-onion-routing/
+#: (content/about/attacks-on-onion-routing/contents+en.lrquestion.description)
+msgid ""
+"Again, this is only useful to verify that parties already suspected of "
+"communicating with one another are doing so."
+msgstr ""
+
+#: https//support.torproject.org/about/attacks-on-onion-routing/
+#: (content/about/attacks-on-onion-routing/contents+en.lrquestion.description)
+msgid ""
+"In most countries, the suspicion required to obtain a warrant already "
+"carries more weight than timing correlation would provide."
+msgstr ""
+
+#: https//support.torproject.org/about/attacks-on-onion-routing/
+#: (content/about/attacks-on-onion-routing/contents+en.lrquestion.description)
+msgid ""
+"Furthermore, since Tor reuses circuits for multiple TCP connections, it is "
+"possible to associate non anonymous and anonymous traffic at a given exit "
+"node, so be careful about what applications you run concurrently over Tor."
+msgstr ""
+
+#: https//support.torproject.org/about/attacks-on-onion-routing/
+#: (content/about/attacks-on-onion-routing/contents+en.lrquestion.description)
+msgid "Perhaps even run separate Tor clients for these applications."
+msgstr ""
+
#: https//support.torproject.org/about/backdoor/
#: (content/about/backdoor/contents+en.lrquestion.title)
msgid "Is there a backdoor in Tor?"
@@ -2489,6 +2604,43 @@ msgid ""
"recommended](/tbb/tbb-9/)."
msgstr ""
+#: https//support.torproject.org/about/change-paths/
+#: (content/about/change-paths/contents+en.lrquestion.title)
+msgid "How often does Tor change its paths?"
+msgstr ""
+
+#: https//support.torproject.org/about/change-paths/
+#: (content/about/change-paths/contents+en.lrquestion.description)
+msgid ""
+"Tor will reuse the same circuit for new TCP streams for 10 minutes, as long "
+"as the circuit is working fine."
+msgstr ""
+
+#: https//support.torproject.org/about/change-paths/
+#: (content/about/change-paths/contents+en.lrquestion.description)
+msgid "(If the circuit fails, Tor will switch to a new circuit immediately.)"
+msgstr ""
+
+#: https//support.torproject.org/about/change-paths/
+#: (content/about/change-paths/contents+en.lrquestion.description)
+msgid ""
+"But note that a single TCP stream (e.g. a long IRC connection) will stay on "
+"the same circuit forever."
+msgstr ""
+
+#: https//support.torproject.org/about/change-paths/
+#: (content/about/change-paths/contents+en.lrquestion.description)
+msgid "We don't rotate individual streams from one circuit to the next."
+msgstr ""
+
+#: https//support.torproject.org/about/change-paths/
+#: (content/about/change-paths/contents+en.lrquestion.description)
+msgid ""
+"Otherwise, an adversary with a partial view of the network would be given "
+"many chances over time to link you to your destination, rather than just one"
+" chance."
+msgstr ""
+
#: https//support.torproject.org/about/distribute-tor/
#: (content/about/distribute-tor/contents+en.lrquestion.title)
msgid "Can I distribute Tor?"
@@ -2584,6 +2736,133 @@ msgid ""
"details."
msgstr ""
+#: https//support.torproject.org/about/entry-guards/
+#: (content/about/entry-guards/contents+en.lrquestion.title)
+msgid "What are Entry Guards?"
+msgstr ""
+
+#: https//support.torproject.org/about/entry-guards/
+#: (content/about/entry-guards/contents+en.lrquestion.description)
+msgid ""
+"Tor (like all current practical low-latency anonymity designs) fails when "
+"the attacker can see both ends of the communications channel."
+msgstr ""
+
+#: https//support.torproject.org/about/entry-guards/
+#: (content/about/entry-guards/contents+en.lrquestion.description)
+msgid ""
+"For example, suppose the attacker controls or watches the Tor relay you "
+"choose to enter the network, and also controls or watches the website you "
+"visit."
+msgstr ""
+
+#: https//support.torproject.org/about/entry-guards/
+#: (content/about/entry-guards/contents+en.lrquestion.description)
+msgid ""
+"In this case, the research community knows no practical low-latency design "
+"that can reliably stop the attacker from correlating volume and timing "
+"information on the two sides."
+msgstr ""
+
+#: https//support.torproject.org/about/entry-guards/
+#: (content/about/entry-guards/contents+en.lrquestion.description)
+msgid "So, what should we do?"
+msgstr ""
+
+#: https//support.torproject.org/about/entry-guards/
+#: (content/about/entry-guards/contents+en.lrquestion.description)
+msgid "Suppose the attacker controls, or can observe, C relays."
+msgstr ""
+
+#: https//support.torproject.org/about/entry-guards/
+#: (content/about/entry-guards/contents+en.lrquestion.description)
+msgid "Suppose there are N relays total."
+msgstr ""
+
+#: https//support.torproject.org/about/entry-guards/
+#: (content/about/entry-guards/contents+en.lrquestion.description)
+msgid ""
+"If you select new entry and exit relays each time you use the network, the "
+"attacker will be able to correlate all traffic you send with probability "
+"around (c/n)2."
+msgstr ""
+
+#: https//support.torproject.org/about/entry-guards/
+#: (content/about/entry-guards/contents+en.lrquestion.description)
+msgid ""
+"But profiling is, for most users, as bad as being traced all the time: they "
+"want to do something often without an attacker noticing, and the attacker "
+"noticing once is as bad as the attacker noticing more often."
+msgstr ""
+
+#: https//support.torproject.org/about/entry-guards/
+#: (content/about/entry-guards/contents+en.lrquestion.description)
+msgid ""
+"Thus, choosing many random entries and exits gives the user no chance of "
+"escaping profiling by this kind of attacker."
+msgstr ""
+
+#: https//support.torproject.org/about/entry-guards/
+#: (content/about/entry-guards/contents+en.lrquestion.description)
+msgid ""
+"The solution is \"entry guards\": each Tor client selects a few relays at "
+"random to use as entry points, and uses only those relays for their first "
+"hop."
+msgstr ""
+
+#: https//support.torproject.org/about/entry-guards/
+#: (content/about/entry-guards/contents+en.lrquestion.description)
+msgid ""
+"If those relays are not controlled or observed, the attacker can't win, "
+"ever, and the user is secure."
+msgstr ""
+
+#: https//support.torproject.org/about/entry-guards/
+#: (content/about/entry-guards/contents+en.lrquestion.description)
+msgid ""
+"If those relays are observed or controlled by the attacker, the attacker "
+"sees a larger fraction of the user's traffic - but still the user is no more"
+" profiled than before."
+msgstr ""
+
+#: https//support.torproject.org/about/entry-guards/
+#: (content/about/entry-guards/contents+en.lrquestion.description)
+msgid ""
+"Thus, the user has some chance (on the order of (n-c)/n) of avoiding "
+"profiling, whereas they had none before."
+msgstr ""
+
+#: https//support.torproject.org/about/entry-guards/
+#: (content/about/entry-guards/contents+en.lrquestion.description)
+msgid ""
+"You can read more at [An Analysis of the Degradation of Anonymous "
+"Protocols](http://freehaven.net/anonbib/#wright02), [Defending Anonymous "
+"Communication Against Passive Logging "
+"Attacks](http://freehaven.net/anonbib/#wright03), and especially [Locating "
+"Hidden Servers](http://freehaven.net/anonbib/#hs-attack06)."
+msgstr ""
+
+#: https//support.torproject.org/about/entry-guards/
+#: (content/about/entry-guards/contents+en.lrquestion.description)
+msgid ""
+"Restricting your entry nodes may also help against attackers who want to run"
+" a few Tor nodes and easily enumerate all of the Tor user IP addresses."
+msgstr ""
+
+#: https//support.torproject.org/about/entry-guards/
+#: (content/about/entry-guards/contents+en.lrquestion.description)
+msgid ""
+"(Even though they can't learn what destinations the users are talking to, "
+"they still might be able to do bad things with just a list of users.)"
+msgstr ""
+
+#: https//support.torproject.org/about/entry-guards/
+#: (content/about/entry-guards/contents+en.lrquestion.description)
+msgid ""
+"However, that feature won't really become useful until we move to a "
+"\"directory guard\" design as well."
+msgstr ""
+
#: https//support.torproject.org/about/how-is-tor-different-from-other-proxies/
#: (content/about/how-is-tor-different-from-other-proxies/contents+en.lrquestion.title)
msgid "How is Tor different from other proxies?"
@@ -2754,6 +3033,162 @@ msgid ""
" Tor and HTTPS interact."
msgstr ""
+#: https//support.torproject.org/about/key-management/
+#: (content/about/key-management/contents+en.lrquestion.title)
+msgid "Tell me about all the keys Tor uses"
+msgstr ""
+
+#: https//support.torproject.org/about/key-management/
+#: (content/about/key-management/contents+en.lrquestion.description)
+msgid ""
+"Tor uses a variety of different keys, with three goals in mind: 1) "
+"encryption to ensure privacy of data within the Tor network, 2) "
+"authentication so clients know they're talking to the relays they meant to "
+"talk to, and 3) signatures to make sure all clients know the same set of "
+"relays."
+msgstr ""
+
+#: https//support.torproject.org/about/key-management/
+#: (content/about/key-management/contents+en.lrquestion.description)
+msgid ""
+"**Encryption**: first, all connections in Tor use TLS link encryption, so "
+"observers can't look inside to see which circuit a given cell is intended "
+"for."
+msgstr ""
+
+#: https//support.torproject.org/about/key-management/
+#: (content/about/key-management/contents+en.lrquestion.description)
+msgid ""
+"Further, the Tor client establishes an ephemeral encryption key with each "
+"relay in the circuit; these extra layers of encryption mean that only the "
+"exit relay can read the cells."
+msgstr ""
+
+#: https//support.torproject.org/about/key-management/
+#: (content/about/key-management/contents+en.lrquestion.description)
+msgid ""
+"Both sides discard the circuit key when the circuit ends, so logging traffic"
+" and then breaking into the relay to discover the key won't work."
+msgstr ""
+
+#: https//support.torproject.org/about/key-management/
+#: (content/about/key-management/contents+en.lrquestion.description)
+msgid ""
+"**Authentication**: Every Tor relay has a public decryption key called the "
+"\"onion key\"."
+msgstr ""
+
+#: https//support.torproject.org/about/key-management/
+#: (content/about/key-management/contents+en.lrquestion.description)
+msgid "Each relay rotates its onion key once a week."
+msgstr ""
+
+#: https//support.torproject.org/about/key-management/
+#: (content/about/key-management/contents+en.lrquestion.description)
+msgid ""
+"When the Tor client establishes circuits, at each step it [demands that the "
+"Tor relay prove knowledge of its onion key](https://svn-"
+"archive.torproject.org/svn/projects/design-paper/tor-"
+"design.html#subsec:circuits)."
+msgstr ""
+
+#: https//support.torproject.org/about/key-management/
+#: (content/about/key-management/contents+en.lrquestion.description)
+msgid ""
+"That way the first node in the path can't just spoof the rest of the path."
+msgstr ""
+
+#: https//support.torproject.org/about/key-management/
+#: (content/about/key-management/contents+en.lrquestion.description)
+msgid ""
+"Because the Tor client chooses the path, it can make sure to get Tor's "
+"\"distributed trust\" property: no single relay in the path can know about "
+"both the client and what the client is doing."
+msgstr ""
+
+#: https//support.torproject.org/about/key-management/
+#: (content/about/key-management/contents+en.lrquestion.description)
+msgid ""
+"**Coordination**: How do clients know what the relays are, and how do they "
+"know that they have the right keys for them?"
+msgstr ""
+
+#: https//support.torproject.org/about/key-management/
+#: (content/about/key-management/contents+en.lrquestion.description)
+msgid "Each relay has a long-term public signing key called the \"identity key\"."
+msgstr ""
+
+#: https//support.torproject.org/about/key-management/
+#: (content/about/key-management/contents+en.lrquestion.description)
+msgid "Each directory authority additionally has a \"directory signing key\"."
+msgstr ""
+
+#: https//support.torproject.org/about/key-management/
+#: (content/about/key-management/contents+en.lrquestion.description)
+msgid ""
+"The directory authorities [provide a signed "
+"list](https://gitweb.torproject.org/torspec.git/tree/dir-spec.txt) of all "
+"the known relays, and in that list are a set of certificates from each relay"
+" (self-signed by their identity key) specifying their keys, locations, exit "
+"policies, and so on."
+msgstr ""
+
+#: https//support.torproject.org/about/key-management/
+#: (content/about/key-management/contents+en.lrquestion.description)
+msgid ""
+"So unless the adversary can control a majority of the directory authorities "
+"(as of 2021 there are 10 directory authorities), they can't trick the Tor "
+"client into using other Tor relays."
+msgstr ""
+
+#: https//support.torproject.org/about/key-management/
+#: (content/about/key-management/contents+en.lrquestion.description)
+msgid "How do clients know what the directory authorities are?"
+msgstr ""
+
+#: https//support.torproject.org/about/key-management/
+#: (content/about/key-management/contents+en.lrquestion.description)
+msgid ""
+"The Tor software comes with a built-in list of location and public key for "
+"each directory authority."
+msgstr ""
+
+#: https//support.torproject.org/about/key-management/
+#: (content/about/key-management/contents+en.lrquestion.description)
+msgid ""
+"So the only way to trick users into using a fake Tor network is to give them"
+" a specially modified version of the software."
+msgstr ""
+
+#: https//support.torproject.org/about/key-management/
+#: (content/about/key-management/contents+en.lrquestion.description)
+msgid "How do users know they've got the right software?"
+msgstr ""
+
+#: https//support.torproject.org/about/key-management/
+#: (content/about/key-management/contents+en.lrquestion.description)
+msgid ""
+"When we distribute the source code or a package, we digitally sign it with "
+"[GNU Privacy Guard](http://www.gnupg.org/). See the [instructions on how to "
+"check Tor Browser's signature](https://support.torproject.org/tbb/how-to-"
+"verify-signature/)."
+msgstr ""
+
+#: https//support.torproject.org/about/key-management/
+#: (content/about/key-management/contents+en.lrquestion.description)
+msgid ""
+"In order to be certain that it's really signed by us, you need to have met "
+"us in person and gotten a copy of our GPG key fingerprint, or you need to "
+"know somebody who has."
+msgstr ""
+
+#: https//support.torproject.org/about/key-management/
+#: (content/about/key-management/contents+en.lrquestion.description)
+msgid ""
+"If you're concerned about an attack on this level, we recommend you get "
+"involved with the security community and start meeting people."
+msgstr ""
+
#: https//support.torproject.org/about/no-data-scrubbing/
#: (content/about/no-data-scrubbing/contents+en.lrquestion.title)
msgid ""
@@ -2786,6 +3221,151 @@ msgid ""
"though."
msgstr ""
+#: https//support.torproject.org/about/protections/
+#: (content/about/protections/contents+en.lrquestion.title)
+msgid "What protections does Tor provide?"
+msgstr ""
+
+#: https//support.torproject.org/about/protections/
+#: (content/about/protections/contents+en.lrquestion.description)
+msgid ""
+"Internet communication is based on a store-and-forward model that can be "
+"understood in analogy to postal mail: Data is transmitted in blocks called "
+"IP datagrams or packets."
+msgstr ""
+
+#: https//support.torproject.org/about/protections/
+#: (content/about/protections/contents+en.lrquestion.description)
+msgid ""
+"Every packet includes a source IP address (of the sender) and a destination "
+"IP address (of the receiver), just as ordinary letters contain postal "
+"addresses of sender and receiver."
+msgstr ""
+
+#: https//support.torproject.org/about/protections/
+#: (content/about/protections/contents+en.lrquestion.description)
+msgid ""
+"The way from sender to receiver involves multiple hops of routers, where "
+"each router inspects the destination IP address and forwards the packet "
+"closer to its destination."
+msgstr ""
+
+#: https//support.torproject.org/about/protections/
+#: (content/about/protections/contents+en.lrquestion.description)
+msgid ""
+"Thus, every router between sender and receiver learns that the sender is "
+"communicating with the receiver."
+msgstr ""
+
+#: https//support.torproject.org/about/protections/
+#: (content/about/protections/contents+en.lrquestion.description)
+msgid ""
+"In particular, your local ISP is in the position to build a complete profile"
+" of your Internet usage."
+msgstr ""
+
+#: https//support.torproject.org/about/protections/
+#: (content/about/protections/contents+en.lrquestion.description)
+msgid ""
+"In addition, every server in the Internet that can see any of the packets "
+"can profile your behavior."
+msgstr ""
+
+#: https//support.torproject.org/about/protections/
+#: (content/about/protections/contents+en.lrquestion.description)
+msgid ""
+"The aim of Tor is to improve your privacy by sending your traffic through a "
+"series of proxies."
+msgstr ""
+
+#: https//support.torproject.org/about/protections/
+#: (content/about/protections/contents+en.lrquestion.description)
+msgid ""
+"Your communication is encrypted in multiple layers and routed via multiple "
+"hops through the Tor network to the final receiver."
+msgstr ""
+
+#: https//support.torproject.org/about/protections/
+#: (content/about/protections/contents+en.lrquestion.description)
+msgid ""
+"More details on this process can be found in this "
+"[visualization](https://support.torproject.org/https/https-1/)."
+msgstr ""
+
+#: https//support.torproject.org/about/protections/
+#: (content/about/protections/contents+en.lrquestion.description)
+msgid ""
+"Note that all your local ISP can observe now is that you are communicating "
+"with Tor nodes."
+msgstr ""
+
+#: https//support.torproject.org/about/protections/
+#: (content/about/protections/contents+en.lrquestion.description)
+msgid ""
+"Similarly, servers in the Internet just see that they are being contacted by"
+" Tor nodes."
+msgstr ""
+
+#: https//support.torproject.org/about/protections/
+#: (content/about/protections/contents+en.lrquestion.description)
+msgid "Generally speaking, Tor aims to solve three privacy problems:"
+msgstr ""
+
+#: https//support.torproject.org/about/protections/
+#: (content/about/protections/contents+en.lrquestion.description)
+msgid ""
+"First, Tor prevents websites and other services from learning your location,"
+" which they can use to build databases about your habits and interests."
+msgstr ""
+
+#: https//support.torproject.org/about/protections/
+#: (content/about/protections/contents+en.lrquestion.description)
+msgid ""
+"With Tor, your Internet connections don't give you away by default -- now "
+"you can have the ability to choose, for each connection, how much "
+"information to reveal."
+msgstr ""
+
+#: https//support.torproject.org/about/protections/
+#: (content/about/protections/contents+en.lrquestion.description)
+msgid ""
+"Second, Tor prevents people watching your traffic locally (such as your ISP "
+"or someone with access to your home wifi or router) from learning what "
+"information you're fetching and where you're fetching it from."
+msgstr ""
+
+#: https//support.torproject.org/about/protections/
+#: (content/about/protections/contents+en.lrquestion.description)
+msgid ""
+"It also stops them from deciding what you're allowed to learn and publish --"
+" if you can get to any part of the Tor network, you can reach any site on "
+"the Internet."
+msgstr ""
+
+#: https//support.torproject.org/about/protections/
+#: (content/about/protections/contents+en.lrquestion.description)
+msgid ""
+"Third, Tor routes your connection through more than one Tor relay so no "
+"single relay can learn what you're up to."
+msgstr ""
+
+#: https//support.torproject.org/about/protections/
+#: (content/about/protections/contents+en.lrquestion.description)
+msgid ""
+"Because these relays are run by different individuals or organizations, "
+"distributing trust provides more security than the old [one hop "
+"proxy](https://support.torproject.org/about/#how-is-tor-different-from-"
+"other-proxies) approach."
+msgstr ""
+
+#: https//support.torproject.org/about/protections/
+#: (content/about/protections/contents+en.lrquestion.description)
+msgid ""
+"Note, however, that there are situations where Tor fails to solve these "
+"privacy problems entirely: see the entry below on [remaining "
+"attacks](https://support.torproject.org/about/#attacks-on-onion-routing)."
+msgstr ""
+
#: https//support.torproject.org/about/what-is-tor/
#: (content/about/what-is-tor/contents+en.lrquestion.title)
msgid "What is Tor?"
@@ -5000,9 +5580,11 @@ msgstr ""
#: (content/tbb/tbb-47/contents+en.lrquestion.description)
msgid ""
"Also, read up on the HTTPProxyAuthenticator and HTTPSProxyAuthenticator "
-"options if your proxy requires auth. We only support basic auth currently, "
-"but if you need NTLM authentication, you may find [this post in the "
-"archives](https://archives.seul.org/or/talk/Jun-2005/msg00223.html) useful."
+"options if your [proxy requires auth.](https://developer.mozilla.org/en-"
+"US/docs/Web/HTTP/Headers/Proxy-Authenticate) We only support basic auth "
+"currently, but if you need NTLM authentication, you may find [this post in "
+"the archives](https://archives.seul.org/or/talk/Jun-2005/msg00223.html) "
+"useful."
msgstr ""
#: https//support.torproject.org/tbb/tbb-47/
@@ -5219,6 +5801,219 @@ msgid ""
"have no effect on Tor's configuration."
msgstr ""
+#: https//support.torproject.org/tbb/tbb-firewall-ports/
+#: (content/tbb/tbb-firewall-ports/contents+en.lrquestion.title)
+msgid "My firewall only allows a few outgoing ports"
+msgstr ""
+
+#: https//support.torproject.org/tbb/tbb-firewall-ports/
+#: (content/tbb/tbb-firewall-ports/contents+en.lrquestion.description)
+msgid ""
+"If your firewall works by blocking ports, then you can tell Tor to only use "
+"the ports when you start your Tor Browser."
+msgstr ""
+
+#: https//support.torproject.org/tbb/tbb-firewall-ports/
+#: (content/tbb/tbb-firewall-ports/contents+en.lrquestion.description)
+msgid ""
+"Or you can add the ports that your firewall permits by adding "
+"\"FascistFirewall 1\" to your torrc configuration file."
+msgstr ""
+
+#: https//support.torproject.org/tbb/tbb-firewall-ports/
+#: (content/tbb/tbb-firewall-ports/contents+en.lrquestion.description)
+msgid ""
+"By default, when you set this Tor assumes that your firewall allows only "
+"port 80 and port 443 (HTTP and HTTPS respectively)."
+msgstr ""
+
+#: https//support.torproject.org/tbb/tbb-firewall-ports/
+#: (content/tbb/tbb-firewall-ports/contents+en.lrquestion.description)
+msgid ""
+"You can select a different set of ports with the FirewallPorts torrc option."
+msgstr ""
+
+#: https//support.torproject.org/tbb/tbb-firewall-ports/
+#: (content/tbb/tbb-firewall-ports/contents+en.lrquestion.description)
+msgid ""
+"If you want to be more fine-grained with your controls, you can also use the"
+" ReachableAddresses config options, e.g.:"
+msgstr ""
+
+#: https//support.torproject.org/tbb/tbb-firewall-ports/
+#: (content/tbb/tbb-firewall-ports/contents+en.lrquestion.description)
+#: https//support.torproject.org/tbb/tbb-install-tor-central-server/
+#: (content/tbb/tbb-install-tor-central-server/contents+en.lrquestion.description)
+#: https//support.torproject.org/operators/default-exit-ports/
+#: (content/operators/default-exit-ports/contents+en.lrquestion.description)
+#: https//support.torproject.org/operators/hibernation/
+#: (content/operators/hibernation/contents+en.lrquestion.description)
+#: https//support.torproject.org/operators/limit-total-bandwidth/
+#: (content/operators/limit-total-bandwidth/contents+en.lrquestion.description)
+#: https//support.torproject.org/misc/bug-or-feedback/
+#: (content/misc/bug-or-feedback/contents+en.lrquestion.description)
+#: https//support.torproject.org/get-in-touch/why-i-cant-join-tor-channels/
+#: (content/get-in-touch/why-i-cant-join-tor-channels/contents+en.lrquestion.description)
+#: https//support.torproject.org/apt/tor-deb-repo/
+#: (content/apt/apt-1/contents+en.lrquestion.description)
+#: https//support.torproject.org/apt/apt-over-tor/
+#: (content/apt/apt-3/contents+en.lrquestion.description)
+msgid "```"
+msgstr ""
+
+#: https//support.torproject.org/tbb/tbb-firewall-ports/
+#: (content/tbb/tbb-firewall-ports/contents+en.lrquestion.description)
+msgid "ReachableDirAddresses *:80"
+msgstr ""
+
+#: https//support.torproject.org/tbb/tbb-firewall-ports/
+#: (content/tbb/tbb-firewall-ports/contents+en.lrquestion.description)
+msgid "ReachableORAddresses *:443"
+msgstr ""
+
+#: https//support.torproject.org/tbb/tbb-install-tor-central-server/
+#: (content/tbb/tbb-install-tor-central-server/contents+en.lrquestion.title)
+msgid ""
+"Can I install Tor on a central server, and have my clients connect to it?"
+msgstr ""
+
+#: https//support.torproject.org/tbb/tbb-install-tor-central-server/
+#: (content/tbb/tbb-install-tor-central-server/contents+en.lrquestion.description)
+msgid ""
+"Yes. Tor can be configured as a client or a relay on another machine, and "
+"allow other machines to be able to connect to it for anonymity."
+msgstr ""
+
+#: https//support.torproject.org/tbb/tbb-install-tor-central-server/
+#: (content/tbb/tbb-install-tor-central-server/contents+en.lrquestion.description)
+msgid ""
+"This is most useful in an environment where many computers want a gateway of"
+" anonymity to the rest of the world."
+msgstr ""
+
+#: https//support.torproject.org/tbb/tbb-install-tor-central-server/
+#: (content/tbb/tbb-install-tor-central-server/contents+en.lrquestion.description)
+msgid ""
+"However, be forewarned that with this configuration, anyone within your "
+"private network (existing between you and the Tor client/relay) can see what"
+" traffic you are sending in clear text."
+msgstr ""
+
+#: https//support.torproject.org/tbb/tbb-install-tor-central-server/
+#: (content/tbb/tbb-install-tor-central-server/contents+en.lrquestion.description)
+msgid "The anonymity doesn't start until you get to the Tor relay."
+msgstr ""
+
+#: https//support.torproject.org/tbb/tbb-install-tor-central-server/
+#: (content/tbb/tbb-install-tor-central-server/contents+en.lrquestion.description)
+msgid ""
+"Because of this, if you are the controller of your domain and you know "
+"everything's locked down, you will be OK, but this configuration may not be "
+"suitable for large private networks where security is key all around."
+msgstr ""
+
+#: https//support.torproject.org/tbb/tbb-install-tor-central-server/
+#: (content/tbb/tbb-install-tor-central-server/contents+en.lrquestion.description)
+msgid ""
+"Configuration is simple, editing your torrc file's SocksListenAddress "
+"according to the following examples:"
+msgstr ""
+
+#: https//support.torproject.org/tbb/tbb-install-tor-central-server/
+#: (content/tbb/tbb-install-tor-central-server/contents+en.lrquestion.description)
+msgid "SocksListenAddress 127.0.0.1"
+msgstr ""
+
+#: https//support.torproject.org/tbb/tbb-install-tor-central-server/
+#: (content/tbb/tbb-install-tor-central-server/contents+en.lrquestion.description)
+msgid "SocksListenAddress 192.168.x.x:9100"
+msgstr ""
+
+#: https//support.torproject.org/tbb/tbb-install-tor-central-server/
+#: (content/tbb/tbb-install-tor-central-server/contents+en.lrquestion.description)
+msgid "SocksListenAddress 0.0.0.0:9100"
+msgstr ""
+
+#: https//support.torproject.org/tbb/tbb-install-tor-central-server/
+#: (content/tbb/tbb-install-tor-central-server/contents+en.lrquestion.description)
+msgid ""
+"You can state multiple listen addresses, in the case that you are part of "
+"several networks or subnets."
+msgstr ""
+
+#: https//support.torproject.org/tbb/tbb-install-tor-central-server/
+#: (content/tbb/tbb-install-tor-central-server/contents+en.lrquestion.description)
+msgid "SocksListenAddress 192.168.x.x:9100 #eth0"
+msgstr ""
+
+#: https//support.torproject.org/tbb/tbb-install-tor-central-server/
+#: (content/tbb/tbb-install-tor-central-server/contents+en.lrquestion.description)
+msgid "SocksListenAddress 10.x.x.x:9100 #eth1"
+msgstr ""
+
+#: https//support.torproject.org/tbb/tbb-install-tor-central-server/
+#: (content/tbb/tbb-install-tor-central-server/contents+en.lrquestion.description)
+msgid ""
+"After this, your clients on their respective networks/subnets would specify "
+"a socks proxy with the address and port you specified SocksListenAddress to "
+"be."
+msgstr ""
+
+#: https//support.torproject.org/tbb/tbb-install-tor-central-server/
+#: (content/tbb/tbb-install-tor-central-server/contents+en.lrquestion.description)
+msgid ""
+"Please note that the SocksPort configuration option gives the port ONLY for "
+"localhost (127.0.0.1)."
+msgstr ""
+
+#: https//support.torproject.org/tbb/tbb-install-tor-central-server/
+#: (content/tbb/tbb-install-tor-central-server/contents+en.lrquestion.description)
+msgid ""
+"When setting up your SocksListenAddress(es), you need to give the port with "
+"the address, as shown above."
+msgstr ""
+
+#: https//support.torproject.org/tbb/tbb-install-tor-central-server/
+#: (content/tbb/tbb-install-tor-central-server/contents+en.lrquestion.description)
+msgid ""
+"If you are interested in forcing all outgoing data through the central Tor "
+"client/relay, instead of the server only being an optional proxy, you may "
+"find the program iptables (for *nix) useful."
+msgstr ""
+
+#: https//support.torproject.org/tbb/tbb-run-client-different-computer/
+#: (content/tbb/tbb-run-client-different-computer/contents+en.lrquestion.title)
+msgid ""
+"I want to run my Tor client on a different computer than my applications"
+msgstr ""
+
+#: https//support.torproject.org/tbb/tbb-run-client-different-computer/
+#: (content/tbb/tbb-run-client-different-computer/contents+en.lrquestion.description)
+msgid ""
+"By default, your Tor client only listens for applications that connect from "
+"localhost."
+msgstr ""
+
+#: https//support.torproject.org/tbb/tbb-run-client-different-computer/
+#: (content/tbb/tbb-run-client-different-computer/contents+en.lrquestion.description)
+msgid "Connections from other computers are refused."
+msgstr ""
+
+#: https//support.torproject.org/tbb/tbb-run-client-different-computer/
+#: (content/tbb/tbb-run-client-different-computer/contents+en.lrquestion.description)
+msgid ""
+"If you want to torify applications on different computers than the Tor "
+"client, you should edit your torrc to define `SocksListenAddress 0.0.0.0` "
+"and then restart (or hup) Tor."
+msgstr ""
+
+#: https//support.torproject.org/tbb/tbb-run-client-different-computer/
+#: (content/tbb/tbb-run-client-different-computer/contents+en.lrquestion.description)
+msgid ""
+"If you want to get more advanced, you can configure your Tor client on a "
+"firewall to bind to your internal IP but not your external IP."
+msgstr ""
+
#: https//support.torproject.org/tbb/website-blocking-tor/
#: (content/tbb/website-blocking-tor/contents+en.lrquestion.title)
msgid "A website I am trying to reach is blocking access over Tor."
@@ -6680,6 +7475,130 @@ msgid ""
"guide."
msgstr ""
+#: https//support.torproject.org/operators/default-exit-ports/
+#: (content/operators/default-exit-ports/contents+en.lrquestion.title)
+msgid "Is there a list of default exit ports?"
+msgstr ""
+
+#: https//support.torproject.org/operators/default-exit-ports/
+#: (content/operators/default-exit-ports/contents+en.lrquestion.description)
+msgid ""
+"The default open ports are listed below but keep in mind that, any port or "
+"ports can be opened by the relay operator by configuring it in torrc or "
+"modifying the source code."
+msgstr ""
+
+#: https//support.torproject.org/operators/default-exit-ports/
+#: (content/operators/default-exit-ports/contents+en.lrquestion.description)
+msgid ""
+"The default according to src/or/policies.c ([line 85][1] and [line 1901][2])"
+" from the source code release [release-0.4.6][3]:"
+msgstr ""
+
+#: https//support.torproject.org/operators/default-exit-ports/
+#: (content/operators/default-exit-ports/contents+en.lrquestion.description)
+msgid "reject 0.0.0.0/8"
+msgstr ""
+
+#: https//support.torproject.org/operators/default-exit-ports/
+#: (content/operators/default-exit-ports/contents+en.lrquestion.description)
+msgid "reject 169.254.0.0/16"
+msgstr ""
+
+#: https//support.torproject.org/operators/default-exit-ports/
+#: (content/operators/default-exit-ports/contents+en.lrquestion.description)
+msgid "reject 127.0.0.0/8"
+msgstr ""
+
+#: https//support.torproject.org/operators/default-exit-ports/
+#: (content/operators/default-exit-ports/contents+en.lrquestion.description)
+msgid "reject 192.168.0.0/16"
+msgstr ""
+
+#: https//support.torproject.org/operators/default-exit-ports/
+#: (content/operators/default-exit-ports/contents+en.lrquestion.description)
+msgid "reject 10.0.0.0/8"
+msgstr ""
+
+#: https//support.torproject.org/operators/default-exit-ports/
+#: (content/operators/default-exit-ports/contents+en.lrquestion.description)
+msgid "reject 172.16.0.0/12"
+msgstr ""
+
+#: https//support.torproject.org/operators/default-exit-ports/
+#: (content/operators/default-exit-ports/contents+en.lrquestion.description)
+msgid "reject *:25"
+msgstr ""
+
+#: https//support.torproject.org/operators/default-exit-ports/
+#: (content/operators/default-exit-ports/contents+en.lrquestion.description)
+msgid "reject *:119"
+msgstr ""
+
+#: https//support.torproject.org/operators/default-exit-ports/
+#: (content/operators/default-exit-ports/contents+en.lrquestion.description)
+msgid "reject *:135-139"
+msgstr ""
+
+#: https//support.torproject.org/operators/default-exit-ports/
+#: (content/operators/default-exit-ports/contents+en.lrquestion.description)
+msgid "reject *:445"
+msgstr ""
+
+#: https//support.torproject.org/operators/default-exit-ports/
+#: (content/operators/default-exit-ports/contents+en.lrquestion.description)
+msgid "reject *:563"
+msgstr ""
+
+#: https//support.torproject.org/operators/default-exit-ports/
+#: (content/operators/default-exit-ports/contents+en.lrquestion.description)
+msgid "reject *:1214"
+msgstr ""
+
+#: https//support.torproject.org/operators/default-exit-ports/
+#: (content/operators/default-exit-ports/contents+en.lrquestion.description)
+msgid "reject *:4661-4666"
+msgstr ""
+
+#: https//support.torproject.org/operators/default-exit-ports/
+#: (content/operators/default-exit-ports/contents+en.lrquestion.description)
+msgid "reject *:6346-6429"
+msgstr ""
+
+#: https//support.torproject.org/operators/default-exit-ports/
+#: (content/operators/default-exit-ports/contents+en.lrquestion.description)
+msgid "reject *:6699"
+msgstr ""
+
+#: https//support.torproject.org/operators/default-exit-ports/
+#: (content/operators/default-exit-ports/contents+en.lrquestion.description)
+msgid "reject *:6881-6999"
+msgstr ""
+
+#: https//support.torproject.org/operators/default-exit-ports/
+#: (content/operators/default-exit-ports/contents+en.lrquestion.description)
+msgid "accept *:*"
+msgstr ""
+
+#: https//support.torproject.org/operators/default-exit-ports/
+#: (content/operators/default-exit-ports/contents+en.lrquestion.description)
+msgid ""
+"[1]: "
+"https://gitlab.torproject.org/tpo/core/tor/-/blob/release-0.4.6/src/core/or/policies.c#L85"
+msgstr ""
+
+#: https//support.torproject.org/operators/default-exit-ports/
+#: (content/operators/default-exit-ports/contents+en.lrquestion.description)
+msgid ""
+"[2]: "
+"https://gitlab.torproject.org/tpo/core/tor/-/blob/release-0.4.6/src/core/or/policies.c#L1901"
+msgstr ""
+
+#: https//support.torproject.org/operators/default-exit-ports/
+#: (content/operators/default-exit-ports/contents+en.lrquestion.description)
+msgid "[3]: https://gitlab.torproject.org/tpo/core/tor/-/tree/release-0.4.6/"
+msgstr ""
+
#: https//support.torproject.org/operators/dynamic-ip/
#: (content/operators/dynamic-ip/contents+en.lrquestion.title)
msgid "Can I run a Tor relay using a dynamic IP address?"
@@ -6827,21 +7746,6 @@ msgid ""
"into hibernation, signaled by this entry in the log:"
msgstr ""
-#: https//support.torproject.org/operators/hibernation/
-#: (content/operators/hibernation/contents+en.lrquestion.description)
-#: https//support.torproject.org/operators/limit-total-bandwidth/
-#: (content/operators/limit-total-bandwidth/contents+en.lrquestion.description)
-#: https//support.torproject.org/misc/bug-or-feedback/
-#: (content/misc/bug-or-feedback/contents+en.lrquestion.description)
-#: https//support.torproject.org/get-in-touch/why-i-cant-join-tor-channels/
-#: (content/get-in-touch/why-i-cant-join-tor-channels/contents+en.lrquestion.description)
-#: https//support.torproject.org/apt/tor-deb-repo/
-#: (content/apt/apt-1/contents+en.lrquestion.description)
-#: https//support.torproject.org/apt/apt-over-tor/
-#: (content/apt/apt-3/contents+en.lrquestion.description)
-msgid "```"
-msgstr ""
-
#: https//support.torproject.org/operators/hibernation/
#: (content/operators/hibernation/contents+en.lrquestion.description)
msgid "Bandwidth soft limit reached; commencing hibernation."
@@ -9079,6 +9983,131 @@ msgstr ""
msgid "sub 4096R/C00942E4 2017-03-13"
msgstr "sub 4096R/C00942E4 2017-03-13"
+#: https//support.torproject.org/misc/check-socks-dns-leaks/
+#: (content/misc/check-socks-dns-leaks/contents+en.lrquestion.title)
+msgid ""
+"How do I check if my application that uses SOCKS is leaking DNS requests?"
+msgstr ""
+
+#: https//support.torproject.org/misc/check-socks-dns-leaks/
+#: (content/misc/check-socks-dns-leaks/contents+en.lrquestion.description)
+msgid ""
+"Even if your application is using the correct variant of the SOCKS protocol,"
+" there is still a risk that it could be leaking DNS queries."
+msgstr ""
+
+#: https//support.torproject.org/misc/check-socks-dns-leaks/
+#: (content/misc/check-socks-dns-leaks/contents+en.lrquestion.description)
+msgid ""
+"This problem happens in Firefox extensions that resolve the destination "
+"hostname themselves, for example to show you its IP address, what country "
+"it's in, etc."
+msgstr ""
+
+#: https//support.torproject.org/misc/check-socks-dns-leaks/
+#: (content/misc/check-socks-dns-leaks/contents+en.lrquestion.description)
+msgid ""
+"If you suspect your application might behave like this, follow the "
+"instructions below to check."
+msgstr ""
+
+#: https//support.torproject.org/misc/check-socks-dns-leaks/
+#: (content/misc/check-socks-dns-leaks/contents+en.lrquestion.description)
+msgid ""
+"1. Add `TestSocks 1` to your [torrc file](https://support.torproject.org/tbb"
+"/tbb-editing-torrc/)."
+msgstr ""
+
+#: https//support.torproject.org/misc/check-socks-dns-leaks/
+#: (content/misc/check-socks-dns-leaks/contents+en.lrquestion.description)
+msgid ""
+"1. Start Tor, and point your program's SOCKS proxy settings to Tor's SOCKS5 "
+"server (`socks5://127.0.0.1:9050` by default)."
+msgstr ""
+
+#: https//support.torproject.org/misc/check-socks-dns-leaks/
+#: (content/misc/check-socks-dns-leaks/contents+en.lrquestion.description)
+msgid ""
+"1. Watch your logs as you use your application. For each socks connection, "
+"Tor will log a `notice` for safe connections, and a `warn` for connections "
+"leaking DNS requests."
+msgstr ""
+
+#: https//support.torproject.org/misc/check-socks-dns-leaks/
+#: (content/misc/check-socks-dns-leaks/contents+en.lrquestion.description)
+msgid ""
+"If you want to automatically disable all connections leaking DNS requests, "
+"set `SafeSocks 1` in your torrc file."
+msgstr ""
+
+#: https//support.torproject.org/misc/hide-exits/
+#: (content/misc/hide-exits/contents+en.lrquestion.title)
+msgid ""
+"You should hide the list of Tor relays, so people can't block the exits."
+msgstr ""
+
+#: https//support.torproject.org/misc/hide-exits/
+#: (content/misc/hide-exits/contents+en.lrquestion.description)
+msgid "There are a few reasons we don't:"
+msgstr ""
+
+#: https//support.torproject.org/misc/hide-exits/
+#: (content/misc/hide-exits/contents+en.lrquestion.description)
+msgid ""
+"1. We can't help but make the information available, since Tor clients need "
+"to use it to pick their paths."
+msgstr ""
+
+#: https//support.torproject.org/misc/hide-exits/
+#: (content/misc/hide-exits/contents+en.lrquestion.description)
+msgid "So if the \"blockers\" want it, they can get it anyway."
+msgstr ""
+
+#: https//support.torproject.org/misc/hide-exits/
+#: (content/misc/hide-exits/contents+en.lrquestion.description)
+msgid ""
+"Further, even if we didn't tell clients about the list of relays directly, "
+"somebody could still make a lot of connections through Tor to a test site "
+"and build a list of the addresses they see."
+msgstr ""
+
+#: https//support.torproject.org/misc/hide-exits/
+#: (content/misc/hide-exits/contents+en.lrquestion.description)
+msgid ""
+"1. If people want to block us, we believe that they should be allowed to do "
+"so."
+msgstr ""
+
+#: https//support.torproject.org/misc/hide-exits/
+#: (content/misc/hide-exits/contents+en.lrquestion.description)
+msgid ""
+"Obviously, we would prefer for everybody to allow Tor users to connect to "
+"them, but people have the right to decide who their services should allow "
+"connections from, and if they want to block anonymous users, they can."
+msgstr ""
+
+#: https//support.torproject.org/misc/hide-exits/
+#: (content/misc/hide-exits/contents+en.lrquestion.description)
+msgid ""
+"1. Being blockable also has tactical advantages: it may be a persuasive "
+"response to website maintainers who feel threatened by Tor."
+msgstr ""
+
+#: https//support.torproject.org/misc/hide-exits/
+#: (content/misc/hide-exits/contents+en.lrquestion.description)
+msgid ""
+"Giving them the option may inspire them to stop and think about whether they"
+" really want to eliminate private access to their system, and if not, what "
+"other options they might have."
+msgstr ""
+
+#: https//support.torproject.org/misc/hide-exits/
+#: (content/misc/hide-exits/contents+en.lrquestion.description)
+msgid ""
+"The time they might otherwise have spent blocking Tor, they may instead "
+"spend rethinking their overall approach to privacy and anonymity."
+msgstr ""
+
#: https//support.torproject.org/misc/menu/
#: (content/misc/menu/contents+en.lrquestion.description)
msgid "About"
@@ -9663,56 +10692,20 @@ msgstr ""
#: https//support.torproject.org/get-in-touch/why-i-cant-join-tor-channels/
#: (content/get-in-touch/why-i-cant-join-tor-channels/contents+en.lrquestion.description)
msgid ""
-"Then, to complete the registration and ultimately gain access to the #tor-"
-"project channel, your nickname must be **verified**."
-msgstr ""
-
-#: https//support.torproject.org/get-in-touch/why-i-cant-join-tor-channels/
-#: (content/get-in-touch/why-i-cant-join-tor-channels/contents+en.lrquestion.description)
-msgid ""
-"1. To verify your nick, open a new browser window and go to "
-"https://webchat.oftc.net/?channels=tor."
-msgstr ""
-
-#: https//support.torproject.org/get-in-touch/why-i-cant-join-tor-channels/
-#: (content/get-in-touch/why-i-cant-join-tor-channels/contents+en.lrquestion.description)
-msgid "2. Log in with your IRC nickname and password."
-msgstr ""
-
-#: https//support.torproject.org/get-in-touch/why-i-cant-join-tor-channels/
-#: (content/get-in-touch/why-i-cant-join-tor-channels/contents+en.lrquestion.description)
-msgid ""
-"3. Look for the word **verify** and log in there. It may appear that nothing"
-" has happened. Look at the top of the page, and there will be a column "
-"called **Account**."
-msgstr ""
-
-#: https//support.torproject.org/get-in-touch/why-i-cant-join-tor-channels/
-#: (content/get-in-touch/why-i-cant-join-tor-channels/contents+en.lrquestion.description)
-msgid "4. Click on **Account**."
-msgstr ""
-
-#: https//support.torproject.org/get-in-touch/why-i-cant-join-tor-channels/
-#: (content/get-in-touch/why-i-cant-join-tor-channels/contents+en.lrquestion.description)
-msgid ""
-"5. Click on the small sentence at the bottom of the square that says: Verify"
-" account."
-msgstr ""
-
-#: https//support.torproject.org/get-in-touch/why-i-cant-join-tor-channels/
-#: (content/get-in-touch/why-i-cant-join-tor-channels/contents+en.lrquestion.description)
-msgid "6. Fill out the Captcha that pops up, and click ok."
+"After registering your nickname, to gain access to the #tor-project and "
+"other protected channels, your nickname must be **verified**."
msgstr ""
#: https//support.torproject.org/get-in-touch/why-i-cant-join-tor-channels/
#: (content/get-in-touch/why-i-cant-join-tor-channels/contents+en.lrquestion.description)
msgid ""
-"7. A tiny message will appear: \"Your NickServ account has been verified.\""
+"1. Go to https://services.oftc.net/ and follow the steps in the '*To verify "
+"your account*' section"
msgstr ""
#: https//support.torproject.org/get-in-touch/why-i-cant-join-tor-channels/
#: (content/get-in-touch/why-i-cant-join-tor-channels/contents+en.lrquestion.description)
-msgid "8. Go back to the IRC webpage where you are logged in and type:"
+msgid "2. Go back to the IRC webpage where you are logged in and type:"
msgstr ""
#: https//support.torproject.org/get-in-touch/why-i-cant-join-tor-channels/
@@ -9722,12 +10715,12 @@ msgstr ""
#: https//support.torproject.org/get-in-touch/why-i-cant-join-tor-channels/
#: (content/get-in-touch/why-i-cant-join-tor-channels/contents+en.lrquestion.description)
-msgid "9. Click ENTER."
+msgid "3. Click ENTER."
msgstr ""
#: https//support.torproject.org/get-in-touch/why-i-cant-join-tor-channels/
#: (content/get-in-touch/why-i-cant-join-tor-channels/contents+en.lrquestion.description)
-msgid "10. If all is well, you will receive a message that says:"
+msgid "4. If all is well, you will receive a message that says:"
msgstr ""
#: https//support.torproject.org/get-in-touch/why-i-cant-join-tor-channels/
@@ -9868,19 +10861,23 @@ msgstr "# apt install apt-transport-https"
#: https//support.torproject.org/apt/tor-deb-repo/
#: (content/apt/apt-1/contents+en.lrquestion.description)
msgid ""
-"#### 2. Add the following entries to `/etc/apt/sources.list` or a new file "
-"in `/etc/apt/sources.list.d/`"
+"#### 2. Create a new file in `/etc/apt/sources.list.d/` named `tor.list`. "
+"Add the following entries:"
msgstr ""
#: https//support.torproject.org/apt/tor-deb-repo/
#: (content/apt/apt-1/contents+en.lrquestion.description)
-msgid "deb https://deb.torproject.org/torproject.org <DISTRIBUTION> main"
+msgid ""
+"deb [signed-by=/usr/share/keyrings/tor-archive-keyring.gpg] "
+"https://deb.torproject.org/torproject.org <DISTRIBUTION> main"
msgstr ""
#: https//support.torproject.org/apt/tor-deb-repo/
#: (content/apt/apt-1/contents+en.lrquestion.description)
-msgid "deb-src https://deb.torproject.org/torproject.org <DISTRIBUTION> main"
-msgstr "deb-src https://deb.torproject.org/torproject.org <DISTRIBUTION> main"
+msgid ""
+"deb-src [signed-by=/usr/share/keyrings/tor-archive-keyring.gpg] "
+"https://deb.torproject.org/torproject.org <DISTRIBUTION> main"
+msgstr ""
#: https//support.torproject.org/apt/tor-deb-repo/
#: (content/apt/apt-1/contents+en.lrquestion.description)
@@ -9893,14 +10890,16 @@ msgstr ""
#: https//support.torproject.org/apt/tor-deb-repo/
#: (content/apt/apt-1/contents+en.lrquestion.description)
msgid ""
-"deb https://deb.torproject.org/torproject.org tor-"
+"deb [signed-by=/usr/share/keyrings/tor-archive-keyring.gpg] "
+"https://deb.torproject.org/torproject.org tor-"
"experimental-0.4.6.x-<DISTRIBUTION> main"
msgstr ""
#: https//support.torproject.org/apt/tor-deb-repo/
#: (content/apt/apt-1/contents+en.lrquestion.description)
msgid ""
-"deb-src https://deb.torproject.org/torproject.org tor-"
+"deb-src [signed-by=/usr/share/keyrings/tor-archive-keyring.gpg] "
+"https://deb.torproject.org/torproject.org tor-"
"experimental-0.4.6.x-<DISTRIBUTION> main"
msgstr ""
@@ -9912,18 +10911,18 @@ msgstr ""
#: https//support.torproject.org/apt/tor-deb-repo/
#: (content/apt/apt-1/contents+en.lrquestion.description)
msgid ""
-"deb https://deb.torproject.org/torproject.org tor-nightly-"
-"master-<DISTRIBUTION> main"
+"deb [signed-by=/usr/share/keyrings/tor-archive-keyring.gpg] "
+"https://deb.torproject.org/torproject.org tor-nightly-master-<DISTRIBUTION> "
+"main"
msgstr ""
#: https//support.torproject.org/apt/tor-deb-repo/
#: (content/apt/apt-1/contents+en.lrquestion.description)
msgid ""
-"deb-src https://deb.torproject.org/torproject.org tor-nightly-"
-"master-<DISTRIBUTION> main"
+"deb-src [signed-by=/usr/share/keyrings/tor-archive-keyring.gpg] "
+"https://deb.torproject.org/torproject.org tor-nightly-master-<DISTRIBUTION> "
+"main"
msgstr ""
-"deb-src https://deb.torproject.org/torproject.org tor-nightly-"
-"master-<DISTRIBUTION> main"
#: https//support.torproject.org/apt/tor-deb-repo/
#: (content/apt/apt-1/contents+en.lrquestion.description)
@@ -9943,13 +10942,15 @@ msgstr ""
#: https//support.torproject.org/apt/tor-deb-repo/
#: (content/apt/apt-1/contents+en.lrquestion.description)
msgid ""
-"deb [arch=amd64] https://deb.torproject.org/torproject.org focal main"
+"deb [arch=amd64 signed-by=/usr/share/keyrings/tor-archive-keyring.gpg] "
+"https://deb.torproject.org/torproject.org focal main"
msgstr ""
#: https//support.torproject.org/apt/tor-deb-repo/
#: (content/apt/apt-1/contents+en.lrquestion.description)
msgid ""
-"deb-src [arch=amd64] https://deb.torproject.org/torproject.org focal main"
+"deb-src [arch=amd64 signed-by=/usr/share/keyrings/tor-archive-keyring.gpg] "
+"https://deb.torproject.org/torproject.org focal main"
msgstr ""
#: https//support.torproject.org/apt/tor-deb-repo/
@@ -9969,24 +10970,18 @@ msgstr ""
#: (content/apt/apt-1/contents+en.lrquestion.description)
msgid ""
"#### 3. Then add the gpg key used to sign the packages by running the "
-"following commands at your command prompt"
+"following command at your command prompt:"
msgstr ""
#: https//support.torproject.org/apt/tor-deb-repo/
#: (content/apt/apt-1/contents+en.lrquestion.description)
msgid ""
-"# wget -qO- "
+"# wget -O- "
"https://deb.torproject.org/torproject.org/A3C4F0F979CAA22CDBA8F512EE8CBC9E886DDD89.asc"
-" | gpg --import"
+" | gpg --dearmor | tee /usr/share/keyrings/tor-archive-keyring.gpg "
+">/dev/null"
msgstr ""
-#: https//support.torproject.org/apt/tor-deb-repo/
-#: (content/apt/apt-1/contents+en.lrquestion.description)
-msgid ""
-"# gpg --export A3C4F0F979CAA22CDBA8F512EE8CBC9E886DDD89 | apt-key add -"
-msgstr ""
-"# gpg --export A3C4F0F979CAA22CDBA8F512EE8CBC9E886DDD89 | apt-key add -"
-
#: https//support.torproject.org/apt/tor-deb-repo/
#: (content/apt/apt-1/contents+en.lrquestion.description)
msgid "#### 4. Install tor and tor debian keyring"
@@ -11591,6 +12586,82 @@ msgid ""
"doesn't change IP address over the day."
msgstr ""
+#: https//support.torproject.org/alternate-designs/block-websites/
+#: (content/alternate-designs/block-websites/contents+en.lrquestion.title)
+msgid "Exit policies should be able to block websites, not just IP addresses."
+msgstr ""
+
+#: https//support.torproject.org/alternate-designs/block-websites/
+#: (content/alternate-designs/block-websites/contents+en.lrquestion.description)
+msgid ""
+"It would be nice to let relay operators say things like `reject "
+"www.slashdot.org` in their exit policies, rather than requiring them to "
+"learn all the IP address space that could be covered by the site (and then "
+"also blocking other sites at those IP addresses)."
+msgstr ""
+
+#: https//support.torproject.org/alternate-designs/block-websites/
+#: (content/alternate-designs/block-websites/contents+en.lrquestion.description)
+msgid "There are two problems, though."
+msgstr ""
+
+#: https//support.torproject.org/alternate-designs/block-websites/
+#: (content/alternate-designs/block-websites/contents+en.lrquestion.description)
+msgid "First, users could still get around these blocks."
+msgstr ""
+
+#: https//support.torproject.org/alternate-designs/block-websites/
+#: (content/alternate-designs/block-websites/contents+en.lrquestion.description)
+msgid ""
+"For example, they could request the IP address rather than the hostname when"
+" they exit from the Tor network."
+msgstr ""
+
+#: https//support.torproject.org/alternate-designs/block-websites/
+#: (content/alternate-designs/block-websites/contents+en.lrquestion.description)
+msgid ""
+"This means operators would still need to learn all the IP addresses for the "
+"destinations in question."
+msgstr ""
+
+#: https//support.torproject.org/alternate-designs/block-websites/
+#: (content/alternate-designs/block-websites/contents+en.lrquestion.description)
+msgid ""
+"The second problem is that it would allow remote attackers to censor "
+"arbitrary sites."
+msgstr ""
+
+#: https//support.torproject.org/alternate-designs/block-websites/
+#: (content/alternate-designs/block-websites/contents+en.lrquestion.description)
+msgid ""
+"For example, if a Tor operator blocks www1.slashdot.org, and then some "
+"attacker poisons the Tor relay's DNS or otherwise changes that hostname to "
+"resolve to the IP address for a major news site, then suddenly that Tor "
+"relay is blocking the news site."
+msgstr ""
+
+#: https//support.torproject.org/alternate-designs/let-the-network-pick-the-path/
+#: (content/alternate-designs/let-the-network-pick-the-path/contents+en.lrquestion.title)
+msgid "You should let the network pick the path, not the client."
+msgstr ""
+
+#: https//support.torproject.org/alternate-designs/let-the-network-pick-the-path/
+#: (content/alternate-designs/let-the-network-pick-the-path/contents+en.lrquestion.description)
+msgid "No, you cannot trust the network to pick the path."
+msgstr ""
+
+#: https//support.torproject.org/alternate-designs/let-the-network-pick-the-path/
+#: (content/alternate-designs/let-the-network-pick-the-path/contents+en.lrquestion.description)
+msgid "Malicious relays could route you through their colluding friends."
+msgstr ""
+
+#: https//support.torproject.org/alternate-designs/let-the-network-pick-the-path/
+#: (content/alternate-designs/let-the-network-pick-the-path/contents+en.lrquestion.description)
+msgid ""
+"This would give an adversary the ability to watch all of your traffic end to"
+" end."
+msgstr ""
+
#: lego/templates/banner.html:3 lego/templates/banner.html:5
#: templates/banner.html:3 templates/banner.html:5
msgid "Close banner"
@@ -11621,8 +12692,8 @@ msgid "DONATE NOW"
msgstr ""
#: lego/templates/footer.html:13 lego/templates/footer.html:22
-#: lego/templates/navbar.html:83 templates/footer.html:13
-#: templates/footer.html:22 templates/navbar.html:83
+#: lego/templates/navbar.html:95 templates/footer.html:13
+#: templates/footer.html:22 templates/navbar.html:95
msgid "Download Tor Browser"
msgstr "Stáhnout prohlÞeÄ Tor"
diff --git a/contents+de.po b/contents+de.po
index dc553699d6..5005030da0 100644
--- a/contents+de.po
+++ b/contents+de.po
@@ -20,14 +20,15 @@
# Christian Nelke, 2021
# kwadronaut <kwadronaut at autistici.org>, 2021
# Curtis Baltimore <curtisbaltimore at protonmail.com>, 2021
+# Philipp . <Kuschat at gmx.de>, 2021
#
msgid ""
msgstr ""
"Project-Id-Version: PACKAGE VERSION\n"
"Report-Msgid-Bugs-To: \n"
-"POT-Creation-Date: 2021-08-25 11:14+CET\n"
+"POT-Creation-Date: 2021-09-01 12:20+CET\n"
"PO-Revision-Date: 2018-10-02 22:41+0000\n"
-"Last-Translator: Curtis Baltimore <curtisbaltimore at protonmail.com>, 2021\n"
+"Last-Translator: Philipp . <Kuschat at gmx.de>, 2021\n"
"Language-Team: German (https://www.transifex.com/otf/teams/1519/de/)\n"
"MIME-Version: 1.0\n"
"Content-Type: text/plain; charset=UTF-8\n"
@@ -158,6 +159,11 @@ msgstr "Missbrauchs-FAQ"
msgid "Tor Metrics"
msgstr "Tor Metriken"
+#: https//support.torproject.org/alternate-designs/
+#: (content/alternate-designs/contents+en.lrtopic.title)
+msgid "Alternate Designs We Don't Do (Yet)"
+msgstr ""
+
#: https//support.torproject.org/glossary/add-on-extension-or-plugin/
#: (content/glossary/add-on-extension-or-plugin/contents+en.lrword.term)
msgid "add-on, extension, or plugin"
@@ -2572,6 +2578,63 @@ msgstr ""
"Weitere Informationen über Tor + VPN findest du in [unserem "
"Wiki](https://trac.torproject.org/projects/tor/wiki/doc/TorPlusVPN)."
+#: https//support.torproject.org/faq/relay-donations/
+#: (content/faq/relay-donations/contents+en.lrquestion.title)
+msgid "Can I donate for a relay rather than run my own?"
+msgstr ""
+
+#: https//support.torproject.org/faq/relay-donations/
+#: (content/faq/relay-donations/contents+en.lrquestion.description)
+msgid ""
+"Sure! We have a [list of organizations that run Tor "
+"relays](https://community.torproject.org/relay/community-resources/relay-"
+"associations/) that are happy to turn your donations into better speed and "
+"anonymity for the Tor network."
+msgstr ""
+
+#: https//support.torproject.org/faq/relay-donations/
+#: (content/faq/relay-donations/contents+en.lrquestion.description)
+msgid ""
+"These organizations are not the same as [The Tor Project, "
+"Inc](https://donate.torproject.org/), but we consider that a good thing."
+msgstr ""
+
+#: https//support.torproject.org/faq/relay-donations/
+#: (content/faq/relay-donations/contents+en.lrquestion.description)
+msgid "They're run by nice people who are part of the Tor community."
+msgstr ""
+"Sie werden von netten Menschen betrieben, welche Teil der Tor Community "
+"sind. "
+
+#: https//support.torproject.org/faq/relay-donations/
+#: (content/faq/relay-donations/contents+en.lrquestion.description)
+msgid ""
+"Note that there can be a tradeoff here between anonymity and performance."
+msgstr ""
+
+#: https//support.torproject.org/faq/relay-donations/
+#: (content/faq/relay-donations/contents+en.lrquestion.description)
+msgid ""
+"The Tor network's anonymity comes in part from diversity, so if you are in a"
+" position to run your own relay, you will be improving Tor's anonymity more "
+"than by donating."
+msgstr ""
+
+#: https//support.torproject.org/faq/relay-donations/
+#: (content/faq/relay-donations/contents+en.lrquestion.description)
+msgid ""
+"At the same time though, economies of scale for bandwidth mean that "
+"combining many small donations into several larger relays is more efficient "
+"at improving network performance."
+msgstr ""
+
+#: https//support.torproject.org/faq/relay-donations/
+#: (content/faq/relay-donations/contents+en.lrquestion.description)
+msgid ""
+"Improving anonymity and improving performance are both worthwhile goals, so "
+"however you can help is great!"
+msgstr ""
+
#: https//support.torproject.org/faq/staying-anonymous/
#: (content/faq/staying-anonymous/contents+en.lrquestion.title)
msgid "Am I totally anonymous if I use Tor?"
@@ -2955,6 +3018,61 @@ msgstr ""
"Hilfe [bei der Identifizierung und Dokumentation aller "
"Probleme](https://community.torproject.org/)."
+#: https//support.torproject.org/about/attacks-on-onion-routing/
+#: (content/about/attacks-on-onion-routing/contents+en.lrquestion.title)
+msgid "What attacks remain against onion routing?"
+msgstr ""
+
+#: https//support.torproject.org/about/attacks-on-onion-routing/
+#: (content/about/attacks-on-onion-routing/contents+en.lrquestion.description)
+msgid ""
+"As mentioned above, it is possible for an observer who can view both you and"
+" either the destination website or your Tor exit node to correlate timings "
+"of your traffic as it enters the Tor network and also as it exits."
+msgstr ""
+
+#: https//support.torproject.org/about/attacks-on-onion-routing/
+#: (content/about/attacks-on-onion-routing/contents+en.lrquestion.description)
+msgid "Tor does not defend against such a threat model."
+msgstr ""
+
+#: https//support.torproject.org/about/attacks-on-onion-routing/
+#: (content/about/attacks-on-onion-routing/contents+en.lrquestion.description)
+msgid ""
+"In a more limited sense, note that if a censor or law enforcement agency has"
+" the ability to obtain specific observation of parts of the network, it is "
+"possible for them to verify a suspicion that you talk regularly to your "
+"friend by observing traffic at both ends and correlating the timing of only "
+"that traffic."
+msgstr ""
+
+#: https//support.torproject.org/about/attacks-on-onion-routing/
+#: (content/about/attacks-on-onion-routing/contents+en.lrquestion.description)
+msgid ""
+"Again, this is only useful to verify that parties already suspected of "
+"communicating with one another are doing so."
+msgstr ""
+
+#: https//support.torproject.org/about/attacks-on-onion-routing/
+#: (content/about/attacks-on-onion-routing/contents+en.lrquestion.description)
+msgid ""
+"In most countries, the suspicion required to obtain a warrant already "
+"carries more weight than timing correlation would provide."
+msgstr ""
+
+#: https//support.torproject.org/about/attacks-on-onion-routing/
+#: (content/about/attacks-on-onion-routing/contents+en.lrquestion.description)
+msgid ""
+"Furthermore, since Tor reuses circuits for multiple TCP connections, it is "
+"possible to associate non anonymous and anonymous traffic at a given exit "
+"node, so be careful about what applications you run concurrently over Tor."
+msgstr ""
+
+#: https//support.torproject.org/about/attacks-on-onion-routing/
+#: (content/about/attacks-on-onion-routing/contents+en.lrquestion.description)
+msgid "Perhaps even run separate Tor clients for these applications."
+msgstr ""
+
#: https//support.torproject.org/about/backdoor/
#: (content/about/backdoor/contents+en.lrquestion.title)
msgid "Is there a backdoor in Tor?"
@@ -3127,6 +3245,43 @@ msgstr ""
"Die Benutzung von Tor mit anderen Browsern ist [gefährlich und nicht "
"empfohlen](/tbb/tbb-9/)."
+#: https//support.torproject.org/about/change-paths/
+#: (content/about/change-paths/contents+en.lrquestion.title)
+msgid "How often does Tor change its paths?"
+msgstr ""
+
+#: https//support.torproject.org/about/change-paths/
+#: (content/about/change-paths/contents+en.lrquestion.description)
+msgid ""
+"Tor will reuse the same circuit for new TCP streams for 10 minutes, as long "
+"as the circuit is working fine."
+msgstr ""
+
+#: https//support.torproject.org/about/change-paths/
+#: (content/about/change-paths/contents+en.lrquestion.description)
+msgid "(If the circuit fails, Tor will switch to a new circuit immediately.)"
+msgstr ""
+
+#: https//support.torproject.org/about/change-paths/
+#: (content/about/change-paths/contents+en.lrquestion.description)
+msgid ""
+"But note that a single TCP stream (e.g. a long IRC connection) will stay on "
+"the same circuit forever."
+msgstr ""
+
+#: https//support.torproject.org/about/change-paths/
+#: (content/about/change-paths/contents+en.lrquestion.description)
+msgid "We don't rotate individual streams from one circuit to the next."
+msgstr ""
+
+#: https//support.torproject.org/about/change-paths/
+#: (content/about/change-paths/contents+en.lrquestion.description)
+msgid ""
+"Otherwise, an adversary with a partial view of the network would be given "
+"many chances over time to link you to your destination, rather than just one"
+" chance."
+msgstr ""
+
#: https//support.torproject.org/about/distribute-tor/
#: (content/about/distribute-tor/contents+en.lrquestion.title)
msgid "Can I distribute Tor?"
@@ -3244,6 +3399,133 @@ msgstr ""
"Siehe unsere [Marken-F&A](https://www.torproject.org/about/trademark/) für "
"Einzelheiten."
+#: https//support.torproject.org/about/entry-guards/
+#: (content/about/entry-guards/contents+en.lrquestion.title)
+msgid "What are Entry Guards?"
+msgstr ""
+
+#: https//support.torproject.org/about/entry-guards/
+#: (content/about/entry-guards/contents+en.lrquestion.description)
+msgid ""
+"Tor (like all current practical low-latency anonymity designs) fails when "
+"the attacker can see both ends of the communications channel."
+msgstr ""
+
+#: https//support.torproject.org/about/entry-guards/
+#: (content/about/entry-guards/contents+en.lrquestion.description)
+msgid ""
+"For example, suppose the attacker controls or watches the Tor relay you "
+"choose to enter the network, and also controls or watches the website you "
+"visit."
+msgstr ""
+
+#: https//support.torproject.org/about/entry-guards/
+#: (content/about/entry-guards/contents+en.lrquestion.description)
+msgid ""
+"In this case, the research community knows no practical low-latency design "
+"that can reliably stop the attacker from correlating volume and timing "
+"information on the two sides."
+msgstr ""
+
+#: https//support.torproject.org/about/entry-guards/
+#: (content/about/entry-guards/contents+en.lrquestion.description)
+msgid "So, what should we do?"
+msgstr ""
+
+#: https//support.torproject.org/about/entry-guards/
+#: (content/about/entry-guards/contents+en.lrquestion.description)
+msgid "Suppose the attacker controls, or can observe, C relays."
+msgstr ""
+
+#: https//support.torproject.org/about/entry-guards/
+#: (content/about/entry-guards/contents+en.lrquestion.description)
+msgid "Suppose there are N relays total."
+msgstr ""
+
+#: https//support.torproject.org/about/entry-guards/
+#: (content/about/entry-guards/contents+en.lrquestion.description)
+msgid ""
+"If you select new entry and exit relays each time you use the network, the "
+"attacker will be able to correlate all traffic you send with probability "
+"around (c/n)2."
+msgstr ""
+
+#: https//support.torproject.org/about/entry-guards/
+#: (content/about/entry-guards/contents+en.lrquestion.description)
+msgid ""
+"But profiling is, for most users, as bad as being traced all the time: they "
+"want to do something often without an attacker noticing, and the attacker "
+"noticing once is as bad as the attacker noticing more often."
+msgstr ""
+
+#: https//support.torproject.org/about/entry-guards/
+#: (content/about/entry-guards/contents+en.lrquestion.description)
+msgid ""
+"Thus, choosing many random entries and exits gives the user no chance of "
+"escaping profiling by this kind of attacker."
+msgstr ""
+
+#: https//support.torproject.org/about/entry-guards/
+#: (content/about/entry-guards/contents+en.lrquestion.description)
+msgid ""
+"The solution is \"entry guards\": each Tor client selects a few relays at "
+"random to use as entry points, and uses only those relays for their first "
+"hop."
+msgstr ""
+
+#: https//support.torproject.org/about/entry-guards/
+#: (content/about/entry-guards/contents+en.lrquestion.description)
+msgid ""
+"If those relays are not controlled or observed, the attacker can't win, "
+"ever, and the user is secure."
+msgstr ""
+
+#: https//support.torproject.org/about/entry-guards/
+#: (content/about/entry-guards/contents+en.lrquestion.description)
+msgid ""
+"If those relays are observed or controlled by the attacker, the attacker "
+"sees a larger fraction of the user's traffic - but still the user is no more"
+" profiled than before."
+msgstr ""
+
+#: https//support.torproject.org/about/entry-guards/
+#: (content/about/entry-guards/contents+en.lrquestion.description)
+msgid ""
+"Thus, the user has some chance (on the order of (n-c)/n) of avoiding "
+"profiling, whereas they had none before."
+msgstr ""
+
+#: https//support.torproject.org/about/entry-guards/
+#: (content/about/entry-guards/contents+en.lrquestion.description)
+msgid ""
+"You can read more at [An Analysis of the Degradation of Anonymous "
+"Protocols](http://freehaven.net/anonbib/#wright02), [Defending Anonymous "
+"Communication Against Passive Logging "
+"Attacks](http://freehaven.net/anonbib/#wright03), and especially [Locating "
+"Hidden Servers](http://freehaven.net/anonbib/#hs-attack06)."
+msgstr ""
+
+#: https//support.torproject.org/about/entry-guards/
+#: (content/about/entry-guards/contents+en.lrquestion.description)
+msgid ""
+"Restricting your entry nodes may also help against attackers who want to run"
+" a few Tor nodes and easily enumerate all of the Tor user IP addresses."
+msgstr ""
+
+#: https//support.torproject.org/about/entry-guards/
+#: (content/about/entry-guards/contents+en.lrquestion.description)
+msgid ""
+"(Even though they can't learn what destinations the users are talking to, "
+"they still might be able to do bad things with just a list of users.)"
+msgstr ""
+
+#: https//support.torproject.org/about/entry-guards/
+#: (content/about/entry-guards/contents+en.lrquestion.description)
+msgid ""
+"However, that feature won't really become useful until we move to a "
+"\"directory guard\" design as well."
+msgstr ""
+
#: https//support.torproject.org/about/how-is-tor-different-from-other-proxies/
#: (content/about/how-is-tor-different-from-other-proxies/contents+en.lrquestion.title)
msgid "How is Tor different from other proxies?"
@@ -3449,6 +3731,162 @@ msgstr ""
"Sieh dir diese Visualisierung von [Tor and HTTPS](/https/https-1/) an, um zu"
" verstehen wie Tor und HTTPS interagieren."
+#: https//support.torproject.org/about/key-management/
+#: (content/about/key-management/contents+en.lrquestion.title)
+msgid "Tell me about all the keys Tor uses"
+msgstr ""
+
+#: https//support.torproject.org/about/key-management/
+#: (content/about/key-management/contents+en.lrquestion.description)
+msgid ""
+"Tor uses a variety of different keys, with three goals in mind: 1) "
+"encryption to ensure privacy of data within the Tor network, 2) "
+"authentication so clients know they're talking to the relays they meant to "
+"talk to, and 3) signatures to make sure all clients know the same set of "
+"relays."
+msgstr ""
+
+#: https//support.torproject.org/about/key-management/
+#: (content/about/key-management/contents+en.lrquestion.description)
+msgid ""
+"**Encryption**: first, all connections in Tor use TLS link encryption, so "
+"observers can't look inside to see which circuit a given cell is intended "
+"for."
+msgstr ""
+
+#: https//support.torproject.org/about/key-management/
+#: (content/about/key-management/contents+en.lrquestion.description)
+msgid ""
+"Further, the Tor client establishes an ephemeral encryption key with each "
+"relay in the circuit; these extra layers of encryption mean that only the "
+"exit relay can read the cells."
+msgstr ""
+
+#: https//support.torproject.org/about/key-management/
+#: (content/about/key-management/contents+en.lrquestion.description)
+msgid ""
+"Both sides discard the circuit key when the circuit ends, so logging traffic"
+" and then breaking into the relay to discover the key won't work."
+msgstr ""
+
+#: https//support.torproject.org/about/key-management/
+#: (content/about/key-management/contents+en.lrquestion.description)
+msgid ""
+"**Authentication**: Every Tor relay has a public decryption key called the "
+"\"onion key\"."
+msgstr ""
+
+#: https//support.torproject.org/about/key-management/
+#: (content/about/key-management/contents+en.lrquestion.description)
+msgid "Each relay rotates its onion key once a week."
+msgstr ""
+
+#: https//support.torproject.org/about/key-management/
+#: (content/about/key-management/contents+en.lrquestion.description)
+msgid ""
+"When the Tor client establishes circuits, at each step it [demands that the "
+"Tor relay prove knowledge of its onion key](https://svn-"
+"archive.torproject.org/svn/projects/design-paper/tor-"
+"design.html#subsec:circuits)."
+msgstr ""
+
+#: https//support.torproject.org/about/key-management/
+#: (content/about/key-management/contents+en.lrquestion.description)
+msgid ""
+"That way the first node in the path can't just spoof the rest of the path."
+msgstr ""
+
+#: https//support.torproject.org/about/key-management/
+#: (content/about/key-management/contents+en.lrquestion.description)
+msgid ""
+"Because the Tor client chooses the path, it can make sure to get Tor's "
+"\"distributed trust\" property: no single relay in the path can know about "
+"both the client and what the client is doing."
+msgstr ""
+
+#: https//support.torproject.org/about/key-management/
+#: (content/about/key-management/contents+en.lrquestion.description)
+msgid ""
+"**Coordination**: How do clients know what the relays are, and how do they "
+"know that they have the right keys for them?"
+msgstr ""
+
+#: https//support.torproject.org/about/key-management/
+#: (content/about/key-management/contents+en.lrquestion.description)
+msgid "Each relay has a long-term public signing key called the \"identity key\"."
+msgstr ""
+
+#: https//support.torproject.org/about/key-management/
+#: (content/about/key-management/contents+en.lrquestion.description)
+msgid "Each directory authority additionally has a \"directory signing key\"."
+msgstr ""
+
+#: https//support.torproject.org/about/key-management/
+#: (content/about/key-management/contents+en.lrquestion.description)
+msgid ""
+"The directory authorities [provide a signed "
+"list](https://gitweb.torproject.org/torspec.git/tree/dir-spec.txt) of all "
+"the known relays, and in that list are a set of certificates from each relay"
+" (self-signed by their identity key) specifying their keys, locations, exit "
+"policies, and so on."
+msgstr ""
+
+#: https//support.torproject.org/about/key-management/
+#: (content/about/key-management/contents+en.lrquestion.description)
+msgid ""
+"So unless the adversary can control a majority of the directory authorities "
+"(as of 2021 there are 10 directory authorities), they can't trick the Tor "
+"client into using other Tor relays."
+msgstr ""
+
+#: https//support.torproject.org/about/key-management/
+#: (content/about/key-management/contents+en.lrquestion.description)
+msgid "How do clients know what the directory authorities are?"
+msgstr ""
+
+#: https//support.torproject.org/about/key-management/
+#: (content/about/key-management/contents+en.lrquestion.description)
+msgid ""
+"The Tor software comes with a built-in list of location and public key for "
+"each directory authority."
+msgstr ""
+
+#: https//support.torproject.org/about/key-management/
+#: (content/about/key-management/contents+en.lrquestion.description)
+msgid ""
+"So the only way to trick users into using a fake Tor network is to give them"
+" a specially modified version of the software."
+msgstr ""
+
+#: https//support.torproject.org/about/key-management/
+#: (content/about/key-management/contents+en.lrquestion.description)
+msgid "How do users know they've got the right software?"
+msgstr ""
+
+#: https//support.torproject.org/about/key-management/
+#: (content/about/key-management/contents+en.lrquestion.description)
+msgid ""
+"When we distribute the source code or a package, we digitally sign it with "
+"[GNU Privacy Guard](http://www.gnupg.org/). See the [instructions on how to "
+"check Tor Browser's signature](https://support.torproject.org/tbb/how-to-"
+"verify-signature/)."
+msgstr ""
+
+#: https//support.torproject.org/about/key-management/
+#: (content/about/key-management/contents+en.lrquestion.description)
+msgid ""
+"In order to be certain that it's really signed by us, you need to have met "
+"us in person and gotten a copy of our GPG key fingerprint, or you need to "
+"know somebody who has."
+msgstr ""
+
+#: https//support.torproject.org/about/key-management/
+#: (content/about/key-management/contents+en.lrquestion.description)
+msgid ""
+"If you're concerned about an attack on this level, we recommend you get "
+"involved with the security community and start meeting people."
+msgstr ""
+
#: https//support.torproject.org/about/no-data-scrubbing/
#: (content/about/no-data-scrubbing/contents+en.lrquestion.title)
msgid ""
@@ -3490,6 +3928,151 @@ msgstr ""
"Tor Browser kann natürlich nichts für den Text tun, den du in Formulare "
"eintippst."
+#: https//support.torproject.org/about/protections/
+#: (content/about/protections/contents+en.lrquestion.title)
+msgid "What protections does Tor provide?"
+msgstr ""
+
+#: https//support.torproject.org/about/protections/
+#: (content/about/protections/contents+en.lrquestion.description)
+msgid ""
+"Internet communication is based on a store-and-forward model that can be "
+"understood in analogy to postal mail: Data is transmitted in blocks called "
+"IP datagrams or packets."
+msgstr ""
+
+#: https//support.torproject.org/about/protections/
+#: (content/about/protections/contents+en.lrquestion.description)
+msgid ""
+"Every packet includes a source IP address (of the sender) and a destination "
+"IP address (of the receiver), just as ordinary letters contain postal "
+"addresses of sender and receiver."
+msgstr ""
+
+#: https//support.torproject.org/about/protections/
+#: (content/about/protections/contents+en.lrquestion.description)
+msgid ""
+"The way from sender to receiver involves multiple hops of routers, where "
+"each router inspects the destination IP address and forwards the packet "
+"closer to its destination."
+msgstr ""
+
+#: https//support.torproject.org/about/protections/
+#: (content/about/protections/contents+en.lrquestion.description)
+msgid ""
+"Thus, every router between sender and receiver learns that the sender is "
+"communicating with the receiver."
+msgstr ""
+
+#: https//support.torproject.org/about/protections/
+#: (content/about/protections/contents+en.lrquestion.description)
+msgid ""
+"In particular, your local ISP is in the position to build a complete profile"
+" of your Internet usage."
+msgstr ""
+
+#: https//support.torproject.org/about/protections/
+#: (content/about/protections/contents+en.lrquestion.description)
+msgid ""
+"In addition, every server in the Internet that can see any of the packets "
+"can profile your behavior."
+msgstr ""
+
+#: https//support.torproject.org/about/protections/
+#: (content/about/protections/contents+en.lrquestion.description)
+msgid ""
+"The aim of Tor is to improve your privacy by sending your traffic through a "
+"series of proxies."
+msgstr ""
+
+#: https//support.torproject.org/about/protections/
+#: (content/about/protections/contents+en.lrquestion.description)
+msgid ""
+"Your communication is encrypted in multiple layers and routed via multiple "
+"hops through the Tor network to the final receiver."
+msgstr ""
+
+#: https//support.torproject.org/about/protections/
+#: (content/about/protections/contents+en.lrquestion.description)
+msgid ""
+"More details on this process can be found in this "
+"[visualization](https://support.torproject.org/https/https-1/)."
+msgstr ""
+
+#: https//support.torproject.org/about/protections/
+#: (content/about/protections/contents+en.lrquestion.description)
+msgid ""
+"Note that all your local ISP can observe now is that you are communicating "
+"with Tor nodes."
+msgstr ""
+
+#: https//support.torproject.org/about/protections/
+#: (content/about/protections/contents+en.lrquestion.description)
+msgid ""
+"Similarly, servers in the Internet just see that they are being contacted by"
+" Tor nodes."
+msgstr ""
+
+#: https//support.torproject.org/about/protections/
+#: (content/about/protections/contents+en.lrquestion.description)
+msgid "Generally speaking, Tor aims to solve three privacy problems:"
+msgstr ""
+
+#: https//support.torproject.org/about/protections/
+#: (content/about/protections/contents+en.lrquestion.description)
+msgid ""
+"First, Tor prevents websites and other services from learning your location,"
+" which they can use to build databases about your habits and interests."
+msgstr ""
+
+#: https//support.torproject.org/about/protections/
+#: (content/about/protections/contents+en.lrquestion.description)
+msgid ""
+"With Tor, your Internet connections don't give you away by default -- now "
+"you can have the ability to choose, for each connection, how much "
+"information to reveal."
+msgstr ""
+
+#: https//support.torproject.org/about/protections/
+#: (content/about/protections/contents+en.lrquestion.description)
+msgid ""
+"Second, Tor prevents people watching your traffic locally (such as your ISP "
+"or someone with access to your home wifi or router) from learning what "
+"information you're fetching and where you're fetching it from."
+msgstr ""
+
+#: https//support.torproject.org/about/protections/
+#: (content/about/protections/contents+en.lrquestion.description)
+msgid ""
+"It also stops them from deciding what you're allowed to learn and publish --"
+" if you can get to any part of the Tor network, you can reach any site on "
+"the Internet."
+msgstr ""
+
+#: https//support.torproject.org/about/protections/
+#: (content/about/protections/contents+en.lrquestion.description)
+msgid ""
+"Third, Tor routes your connection through more than one Tor relay so no "
+"single relay can learn what you're up to."
+msgstr ""
+
+#: https//support.torproject.org/about/protections/
+#: (content/about/protections/contents+en.lrquestion.description)
+msgid ""
+"Because these relays are run by different individuals or organizations, "
+"distributing trust provides more security than the old [one hop "
+"proxy](https://support.torproject.org/about/#how-is-tor-different-from-"
+"other-proxies) approach."
+msgstr ""
+
+#: https//support.torproject.org/about/protections/
+#: (content/about/protections/contents+en.lrquestion.description)
+msgid ""
+"Note, however, that there are situations where Tor fails to solve these "
+"privacy problems entirely: see the entry below on [remaining "
+"attacks](https://support.torproject.org/about/#attacks-on-onion-routing)."
+msgstr ""
+
#: https//support.torproject.org/about/what-is-tor/
#: (content/about/what-is-tor/contents+en.lrquestion.title)
msgid "What is Tor?"
@@ -6267,16 +6850,12 @@ msgstr ""
#: (content/tbb/tbb-47/contents+en.lrquestion.description)
msgid ""
"Also, read up on the HTTPProxyAuthenticator and HTTPSProxyAuthenticator "
-"options if your proxy requires auth. We only support basic auth currently, "
-"but if you need NTLM authentication, you may find [this post in the "
-"archives](https://archives.seul.org/or/talk/Jun-2005/msg00223.html) useful."
+"options if your [proxy requires auth.](https://developer.mozilla.org/en-"
+"US/docs/Web/HTTP/Headers/Proxy-Authenticate) We only support basic auth "
+"currently, but if you need NTLM authentication, you may find [this post in "
+"the archives](https://archives.seul.org/or/talk/Jun-2005/msg00223.html) "
+"useful."
msgstr ""
-"Lies dir auch die HTTPProxyAuthenticator und HTTPSProxyAuthenticator "
-"Optionen durch, wenn dein Proxy eine Authentifikation braucht. Wir "
-"unterstützen momentan nur einfache Auth., aber wenn du NTLM-Authentifikation"
-" brauchst, findest du vielleicht [diesen Post, in den "
-"Archiven,](https://archives.seul.org/or/talk/Jun-2005/msg00223.html) "
-"nützlich."
#: https//support.torproject.org/tbb/tbb-47/
#: (content/tbb/tbb-47/contents+en.lrquestion.description)
@@ -6558,6 +7137,219 @@ msgstr ""
"Denk daran, dass alle Zeilen, die mit `#` beginnen, in der torrc als "
"Kommentare behandelt werden und keinen Effekt auf Tor's Konfiguration haben."
+#: https//support.torproject.org/tbb/tbb-firewall-ports/
+#: (content/tbb/tbb-firewall-ports/contents+en.lrquestion.title)
+msgid "My firewall only allows a few outgoing ports"
+msgstr ""
+
+#: https//support.torproject.org/tbb/tbb-firewall-ports/
+#: (content/tbb/tbb-firewall-ports/contents+en.lrquestion.description)
+msgid ""
+"If your firewall works by blocking ports, then you can tell Tor to only use "
+"the ports when you start your Tor Browser."
+msgstr ""
+
+#: https//support.torproject.org/tbb/tbb-firewall-ports/
+#: (content/tbb/tbb-firewall-ports/contents+en.lrquestion.description)
+msgid ""
+"Or you can add the ports that your firewall permits by adding "
+"\"FascistFirewall 1\" to your torrc configuration file."
+msgstr ""
+
+#: https//support.torproject.org/tbb/tbb-firewall-ports/
+#: (content/tbb/tbb-firewall-ports/contents+en.lrquestion.description)
+msgid ""
+"By default, when you set this Tor assumes that your firewall allows only "
+"port 80 and port 443 (HTTP and HTTPS respectively)."
+msgstr ""
+
+#: https//support.torproject.org/tbb/tbb-firewall-ports/
+#: (content/tbb/tbb-firewall-ports/contents+en.lrquestion.description)
+msgid ""
+"You can select a different set of ports with the FirewallPorts torrc option."
+msgstr ""
+
+#: https//support.torproject.org/tbb/tbb-firewall-ports/
+#: (content/tbb/tbb-firewall-ports/contents+en.lrquestion.description)
+msgid ""
+"If you want to be more fine-grained with your controls, you can also use the"
+" ReachableAddresses config options, e.g.:"
+msgstr ""
+
+#: https//support.torproject.org/tbb/tbb-firewall-ports/
+#: (content/tbb/tbb-firewall-ports/contents+en.lrquestion.description)
+#: https//support.torproject.org/tbb/tbb-install-tor-central-server/
+#: (content/tbb/tbb-install-tor-central-server/contents+en.lrquestion.description)
+#: https//support.torproject.org/operators/default-exit-ports/
+#: (content/operators/default-exit-ports/contents+en.lrquestion.description)
+#: https//support.torproject.org/operators/hibernation/
+#: (content/operators/hibernation/contents+en.lrquestion.description)
+#: https//support.torproject.org/operators/limit-total-bandwidth/
+#: (content/operators/limit-total-bandwidth/contents+en.lrquestion.description)
+#: https//support.torproject.org/misc/bug-or-feedback/
+#: (content/misc/bug-or-feedback/contents+en.lrquestion.description)
+#: https//support.torproject.org/get-in-touch/why-i-cant-join-tor-channels/
+#: (content/get-in-touch/why-i-cant-join-tor-channels/contents+en.lrquestion.description)
+#: https//support.torproject.org/apt/tor-deb-repo/
+#: (content/apt/apt-1/contents+en.lrquestion.description)
+#: https//support.torproject.org/apt/apt-over-tor/
+#: (content/apt/apt-3/contents+en.lrquestion.description)
+msgid "```"
+msgstr "```"
+
+#: https//support.torproject.org/tbb/tbb-firewall-ports/
+#: (content/tbb/tbb-firewall-ports/contents+en.lrquestion.description)
+msgid "ReachableDirAddresses *:80"
+msgstr ""
+
+#: https//support.torproject.org/tbb/tbb-firewall-ports/
+#: (content/tbb/tbb-firewall-ports/contents+en.lrquestion.description)
+msgid "ReachableORAddresses *:443"
+msgstr ""
+
+#: https//support.torproject.org/tbb/tbb-install-tor-central-server/
+#: (content/tbb/tbb-install-tor-central-server/contents+en.lrquestion.title)
+msgid ""
+"Can I install Tor on a central server, and have my clients connect to it?"
+msgstr ""
+
+#: https//support.torproject.org/tbb/tbb-install-tor-central-server/
+#: (content/tbb/tbb-install-tor-central-server/contents+en.lrquestion.description)
+msgid ""
+"Yes. Tor can be configured as a client or a relay on another machine, and "
+"allow other machines to be able to connect to it for anonymity."
+msgstr ""
+
+#: https//support.torproject.org/tbb/tbb-install-tor-central-server/
+#: (content/tbb/tbb-install-tor-central-server/contents+en.lrquestion.description)
+msgid ""
+"This is most useful in an environment where many computers want a gateway of"
+" anonymity to the rest of the world."
+msgstr ""
+
+#: https//support.torproject.org/tbb/tbb-install-tor-central-server/
+#: (content/tbb/tbb-install-tor-central-server/contents+en.lrquestion.description)
+msgid ""
+"However, be forewarned that with this configuration, anyone within your "
+"private network (existing between you and the Tor client/relay) can see what"
+" traffic you are sending in clear text."
+msgstr ""
+
+#: https//support.torproject.org/tbb/tbb-install-tor-central-server/
+#: (content/tbb/tbb-install-tor-central-server/contents+en.lrquestion.description)
+msgid "The anonymity doesn't start until you get to the Tor relay."
+msgstr ""
+
+#: https//support.torproject.org/tbb/tbb-install-tor-central-server/
+#: (content/tbb/tbb-install-tor-central-server/contents+en.lrquestion.description)
+msgid ""
+"Because of this, if you are the controller of your domain and you know "
+"everything's locked down, you will be OK, but this configuration may not be "
+"suitable for large private networks where security is key all around."
+msgstr ""
+
+#: https//support.torproject.org/tbb/tbb-install-tor-central-server/
+#: (content/tbb/tbb-install-tor-central-server/contents+en.lrquestion.description)
+msgid ""
+"Configuration is simple, editing your torrc file's SocksListenAddress "
+"according to the following examples:"
+msgstr ""
+
+#: https//support.torproject.org/tbb/tbb-install-tor-central-server/
+#: (content/tbb/tbb-install-tor-central-server/contents+en.lrquestion.description)
+msgid "SocksListenAddress 127.0.0.1"
+msgstr ""
+
+#: https//support.torproject.org/tbb/tbb-install-tor-central-server/
+#: (content/tbb/tbb-install-tor-central-server/contents+en.lrquestion.description)
+msgid "SocksListenAddress 192.168.x.x:9100"
+msgstr ""
+
+#: https//support.torproject.org/tbb/tbb-install-tor-central-server/
+#: (content/tbb/tbb-install-tor-central-server/contents+en.lrquestion.description)
+msgid "SocksListenAddress 0.0.0.0:9100"
+msgstr ""
+
+#: https//support.torproject.org/tbb/tbb-install-tor-central-server/
+#: (content/tbb/tbb-install-tor-central-server/contents+en.lrquestion.description)
+msgid ""
+"You can state multiple listen addresses, in the case that you are part of "
+"several networks or subnets."
+msgstr ""
+
+#: https//support.torproject.org/tbb/tbb-install-tor-central-server/
+#: (content/tbb/tbb-install-tor-central-server/contents+en.lrquestion.description)
+msgid "SocksListenAddress 192.168.x.x:9100 #eth0"
+msgstr ""
+
+#: https//support.torproject.org/tbb/tbb-install-tor-central-server/
+#: (content/tbb/tbb-install-tor-central-server/contents+en.lrquestion.description)
+msgid "SocksListenAddress 10.x.x.x:9100 #eth1"
+msgstr ""
+
+#: https//support.torproject.org/tbb/tbb-install-tor-central-server/
+#: (content/tbb/tbb-install-tor-central-server/contents+en.lrquestion.description)
+msgid ""
+"After this, your clients on their respective networks/subnets would specify "
+"a socks proxy with the address and port you specified SocksListenAddress to "
+"be."
+msgstr ""
+
+#: https//support.torproject.org/tbb/tbb-install-tor-central-server/
+#: (content/tbb/tbb-install-tor-central-server/contents+en.lrquestion.description)
+msgid ""
+"Please note that the SocksPort configuration option gives the port ONLY for "
+"localhost (127.0.0.1)."
+msgstr ""
+
+#: https//support.torproject.org/tbb/tbb-install-tor-central-server/
+#: (content/tbb/tbb-install-tor-central-server/contents+en.lrquestion.description)
+msgid ""
+"When setting up your SocksListenAddress(es), you need to give the port with "
+"the address, as shown above."
+msgstr ""
+
+#: https//support.torproject.org/tbb/tbb-install-tor-central-server/
+#: (content/tbb/tbb-install-tor-central-server/contents+en.lrquestion.description)
+msgid ""
+"If you are interested in forcing all outgoing data through the central Tor "
+"client/relay, instead of the server only being an optional proxy, you may "
+"find the program iptables (for *nix) useful."
+msgstr ""
+
+#: https//support.torproject.org/tbb/tbb-run-client-different-computer/
+#: (content/tbb/tbb-run-client-different-computer/contents+en.lrquestion.title)
+msgid ""
+"I want to run my Tor client on a different computer than my applications"
+msgstr ""
+
+#: https//support.torproject.org/tbb/tbb-run-client-different-computer/
+#: (content/tbb/tbb-run-client-different-computer/contents+en.lrquestion.description)
+msgid ""
+"By default, your Tor client only listens for applications that connect from "
+"localhost."
+msgstr ""
+
+#: https//support.torproject.org/tbb/tbb-run-client-different-computer/
+#: (content/tbb/tbb-run-client-different-computer/contents+en.lrquestion.description)
+msgid "Connections from other computers are refused."
+msgstr ""
+
+#: https//support.torproject.org/tbb/tbb-run-client-different-computer/
+#: (content/tbb/tbb-run-client-different-computer/contents+en.lrquestion.description)
+msgid ""
+"If you want to torify applications on different computers than the Tor "
+"client, you should edit your torrc to define `SocksListenAddress 0.0.0.0` "
+"and then restart (or hup) Tor."
+msgstr ""
+
+#: https//support.torproject.org/tbb/tbb-run-client-different-computer/
+#: (content/tbb/tbb-run-client-different-computer/contents+en.lrquestion.description)
+msgid ""
+"If you want to get more advanced, you can configure your Tor client on a "
+"firewall to bind to your internal IP but not your external IP."
+msgstr ""
+
#: https//support.torproject.org/tbb/website-blocking-tor/
#: (content/tbb/website-blocking-tor/contents+en.lrquestion.title)
msgid "A website I am trying to reach is blocking access over Tor."
@@ -8415,6 +9207,130 @@ msgstr ""
"Brücken-[Nachinstallations](https://community.torproject.org/relay/setup/bridge"
"/post-install/)-Anleitung."
+#: https//support.torproject.org/operators/default-exit-ports/
+#: (content/operators/default-exit-ports/contents+en.lrquestion.title)
+msgid "Is there a list of default exit ports?"
+msgstr ""
+
+#: https//support.torproject.org/operators/default-exit-ports/
+#: (content/operators/default-exit-ports/contents+en.lrquestion.description)
+msgid ""
+"The default open ports are listed below but keep in mind that, any port or "
+"ports can be opened by the relay operator by configuring it in torrc or "
+"modifying the source code."
+msgstr ""
+
+#: https//support.torproject.org/operators/default-exit-ports/
+#: (content/operators/default-exit-ports/contents+en.lrquestion.description)
+msgid ""
+"The default according to src/or/policies.c ([line 85][1] and [line 1901][2])"
+" from the source code release [release-0.4.6][3]:"
+msgstr ""
+
+#: https//support.torproject.org/operators/default-exit-ports/
+#: (content/operators/default-exit-ports/contents+en.lrquestion.description)
+msgid "reject 0.0.0.0/8"
+msgstr ""
+
+#: https//support.torproject.org/operators/default-exit-ports/
+#: (content/operators/default-exit-ports/contents+en.lrquestion.description)
+msgid "reject 169.254.0.0/16"
+msgstr ""
+
+#: https//support.torproject.org/operators/default-exit-ports/
+#: (content/operators/default-exit-ports/contents+en.lrquestion.description)
+msgid "reject 127.0.0.0/8"
+msgstr ""
+
+#: https//support.torproject.org/operators/default-exit-ports/
+#: (content/operators/default-exit-ports/contents+en.lrquestion.description)
+msgid "reject 192.168.0.0/16"
+msgstr ""
+
+#: https//support.torproject.org/operators/default-exit-ports/
+#: (content/operators/default-exit-ports/contents+en.lrquestion.description)
+msgid "reject 10.0.0.0/8"
+msgstr ""
+
+#: https//support.torproject.org/operators/default-exit-ports/
+#: (content/operators/default-exit-ports/contents+en.lrquestion.description)
+msgid "reject 172.16.0.0/12"
+msgstr ""
+
+#: https//support.torproject.org/operators/default-exit-ports/
+#: (content/operators/default-exit-ports/contents+en.lrquestion.description)
+msgid "reject *:25"
+msgstr ""
+
+#: https//support.torproject.org/operators/default-exit-ports/
+#: (content/operators/default-exit-ports/contents+en.lrquestion.description)
+msgid "reject *:119"
+msgstr ""
+
+#: https//support.torproject.org/operators/default-exit-ports/
+#: (content/operators/default-exit-ports/contents+en.lrquestion.description)
+msgid "reject *:135-139"
+msgstr ""
+
+#: https//support.torproject.org/operators/default-exit-ports/
+#: (content/operators/default-exit-ports/contents+en.lrquestion.description)
+msgid "reject *:445"
+msgstr ""
+
+#: https//support.torproject.org/operators/default-exit-ports/
+#: (content/operators/default-exit-ports/contents+en.lrquestion.description)
+msgid "reject *:563"
+msgstr ""
+
+#: https//support.torproject.org/operators/default-exit-ports/
+#: (content/operators/default-exit-ports/contents+en.lrquestion.description)
+msgid "reject *:1214"
+msgstr ""
+
+#: https//support.torproject.org/operators/default-exit-ports/
+#: (content/operators/default-exit-ports/contents+en.lrquestion.description)
+msgid "reject *:4661-4666"
+msgstr ""
+
+#: https//support.torproject.org/operators/default-exit-ports/
+#: (content/operators/default-exit-ports/contents+en.lrquestion.description)
+msgid "reject *:6346-6429"
+msgstr ""
+
+#: https//support.torproject.org/operators/default-exit-ports/
+#: (content/operators/default-exit-ports/contents+en.lrquestion.description)
+msgid "reject *:6699"
+msgstr ""
+
+#: https//support.torproject.org/operators/default-exit-ports/
+#: (content/operators/default-exit-ports/contents+en.lrquestion.description)
+msgid "reject *:6881-6999"
+msgstr ""
+
+#: https//support.torproject.org/operators/default-exit-ports/
+#: (content/operators/default-exit-ports/contents+en.lrquestion.description)
+msgid "accept *:*"
+msgstr ""
+
+#: https//support.torproject.org/operators/default-exit-ports/
+#: (content/operators/default-exit-ports/contents+en.lrquestion.description)
+msgid ""
+"[1]: "
+"https://gitlab.torproject.org/tpo/core/tor/-/blob/release-0.4.6/src/core/or/policies.c#L85"
+msgstr ""
+
+#: https//support.torproject.org/operators/default-exit-ports/
+#: (content/operators/default-exit-ports/contents+en.lrquestion.description)
+msgid ""
+"[2]: "
+"https://gitlab.torproject.org/tpo/core/tor/-/blob/release-0.4.6/src/core/or/policies.c#L1901"
+msgstr ""
+
+#: https//support.torproject.org/operators/default-exit-ports/
+#: (content/operators/default-exit-ports/contents+en.lrquestion.description)
+msgid "[3]: https://gitlab.torproject.org/tpo/core/tor/-/tree/release-0.4.6/"
+msgstr ""
+
#: https//support.torproject.org/operators/dynamic-ip/
#: (content/operators/dynamic-ip/contents+en.lrquestion.title)
msgid "Can I run a Tor relay using a dynamic IP address?"
@@ -8612,21 +9528,6 @@ msgstr ""
"Deshalb kann es sein, dass du nicht mehr surfen kannst sobald dein Tor im "
"Ruhezustnad ist. Dann steht folgendes im Protokoll:"
-#: https//support.torproject.org/operators/hibernation/
-#: (content/operators/hibernation/contents+en.lrquestion.description)
-#: https//support.torproject.org/operators/limit-total-bandwidth/
-#: (content/operators/limit-total-bandwidth/contents+en.lrquestion.description)
-#: https//support.torproject.org/misc/bug-or-feedback/
-#: (content/misc/bug-or-feedback/contents+en.lrquestion.description)
-#: https//support.torproject.org/get-in-touch/why-i-cant-join-tor-channels/
-#: (content/get-in-touch/why-i-cant-join-tor-channels/contents+en.lrquestion.description)
-#: https//support.torproject.org/apt/tor-deb-repo/
-#: (content/apt/apt-1/contents+en.lrquestion.description)
-#: https//support.torproject.org/apt/apt-over-tor/
-#: (content/apt/apt-3/contents+en.lrquestion.description)
-msgid "```"
-msgstr "```"
-
#: https//support.torproject.org/operators/hibernation/
#: (content/operators/hibernation/contents+en.lrquestion.description)
msgid "Bandwidth soft limit reached; commencing hibernation."
@@ -11475,6 +12376,131 @@ msgstr "uid tor-security at lists.torproject.org"
msgid "sub 4096R/C00942E4 2017-03-13"
msgstr "sub 4096R/C00942E4 2017-03-13"
+#: https//support.torproject.org/misc/check-socks-dns-leaks/
+#: (content/misc/check-socks-dns-leaks/contents+en.lrquestion.title)
+msgid ""
+"How do I check if my application that uses SOCKS is leaking DNS requests?"
+msgstr ""
+
+#: https//support.torproject.org/misc/check-socks-dns-leaks/
+#: (content/misc/check-socks-dns-leaks/contents+en.lrquestion.description)
+msgid ""
+"Even if your application is using the correct variant of the SOCKS protocol,"
+" there is still a risk that it could be leaking DNS queries."
+msgstr ""
+
+#: https//support.torproject.org/misc/check-socks-dns-leaks/
+#: (content/misc/check-socks-dns-leaks/contents+en.lrquestion.description)
+msgid ""
+"This problem happens in Firefox extensions that resolve the destination "
+"hostname themselves, for example to show you its IP address, what country "
+"it's in, etc."
+msgstr ""
+
+#: https//support.torproject.org/misc/check-socks-dns-leaks/
+#: (content/misc/check-socks-dns-leaks/contents+en.lrquestion.description)
+msgid ""
+"If you suspect your application might behave like this, follow the "
+"instructions below to check."
+msgstr ""
+
+#: https//support.torproject.org/misc/check-socks-dns-leaks/
+#: (content/misc/check-socks-dns-leaks/contents+en.lrquestion.description)
+msgid ""
+"1. Add `TestSocks 1` to your [torrc file](https://support.torproject.org/tbb"
+"/tbb-editing-torrc/)."
+msgstr ""
+
+#: https//support.torproject.org/misc/check-socks-dns-leaks/
+#: (content/misc/check-socks-dns-leaks/contents+en.lrquestion.description)
+msgid ""
+"1. Start Tor, and point your program's SOCKS proxy settings to Tor's SOCKS5 "
+"server (`socks5://127.0.0.1:9050` by default)."
+msgstr ""
+
+#: https//support.torproject.org/misc/check-socks-dns-leaks/
+#: (content/misc/check-socks-dns-leaks/contents+en.lrquestion.description)
+msgid ""
+"1. Watch your logs as you use your application. For each socks connection, "
+"Tor will log a `notice` for safe connections, and a `warn` for connections "
+"leaking DNS requests."
+msgstr ""
+
+#: https//support.torproject.org/misc/check-socks-dns-leaks/
+#: (content/misc/check-socks-dns-leaks/contents+en.lrquestion.description)
+msgid ""
+"If you want to automatically disable all connections leaking DNS requests, "
+"set `SafeSocks 1` in your torrc file."
+msgstr ""
+
+#: https//support.torproject.org/misc/hide-exits/
+#: (content/misc/hide-exits/contents+en.lrquestion.title)
+msgid ""
+"You should hide the list of Tor relays, so people can't block the exits."
+msgstr ""
+
+#: https//support.torproject.org/misc/hide-exits/
+#: (content/misc/hide-exits/contents+en.lrquestion.description)
+msgid "There are a few reasons we don't:"
+msgstr ""
+
+#: https//support.torproject.org/misc/hide-exits/
+#: (content/misc/hide-exits/contents+en.lrquestion.description)
+msgid ""
+"1. We can't help but make the information available, since Tor clients need "
+"to use it to pick their paths."
+msgstr ""
+
+#: https//support.torproject.org/misc/hide-exits/
+#: (content/misc/hide-exits/contents+en.lrquestion.description)
+msgid "So if the \"blockers\" want it, they can get it anyway."
+msgstr ""
+
+#: https//support.torproject.org/misc/hide-exits/
+#: (content/misc/hide-exits/contents+en.lrquestion.description)
+msgid ""
+"Further, even if we didn't tell clients about the list of relays directly, "
+"somebody could still make a lot of connections through Tor to a test site "
+"and build a list of the addresses they see."
+msgstr ""
+
+#: https//support.torproject.org/misc/hide-exits/
+#: (content/misc/hide-exits/contents+en.lrquestion.description)
+msgid ""
+"1. If people want to block us, we believe that they should be allowed to do "
+"so."
+msgstr ""
+
+#: https//support.torproject.org/misc/hide-exits/
+#: (content/misc/hide-exits/contents+en.lrquestion.description)
+msgid ""
+"Obviously, we would prefer for everybody to allow Tor users to connect to "
+"them, but people have the right to decide who their services should allow "
+"connections from, and if they want to block anonymous users, they can."
+msgstr ""
+
+#: https//support.torproject.org/misc/hide-exits/
+#: (content/misc/hide-exits/contents+en.lrquestion.description)
+msgid ""
+"1. Being blockable also has tactical advantages: it may be a persuasive "
+"response to website maintainers who feel threatened by Tor."
+msgstr ""
+
+#: https//support.torproject.org/misc/hide-exits/
+#: (content/misc/hide-exits/contents+en.lrquestion.description)
+msgid ""
+"Giving them the option may inspire them to stop and think about whether they"
+" really want to eliminate private access to their system, and if not, what "
+"other options they might have."
+msgstr ""
+
+#: https//support.torproject.org/misc/hide-exits/
+#: (content/misc/hide-exits/contents+en.lrquestion.description)
+msgid ""
+"The time they might otherwise have spent blocking Tor, they may instead "
+"spend rethinking their overall approach to privacy and anonymity."
+msgstr ""
+
#: https//support.torproject.org/misc/menu/
#: (content/misc/menu/contents+en.lrquestion.description)
msgid "About"
@@ -12194,69 +13220,21 @@ msgstr "### Wie du deinen Spitznamen überprüfen kannst"
#: https//support.torproject.org/get-in-touch/why-i-cant-join-tor-channels/
#: (content/get-in-touch/why-i-cant-join-tor-channels/contents+en.lrquestion.description)
msgid ""
-"Then, to complete the registration and ultimately gain access to the #tor-"
-"project channel, your nickname must be **verified**."
+"After registering your nickname, to gain access to the #tor-project and "
+"other protected channels, your nickname must be **verified**."
msgstr ""
-"Um die Registrierung abzuschlieÃen und schlieÃlich Zugang zum Channel #tor-"
-"project zu erhalten, muss dein Spitzname **überprüft** werden."
#: https//support.torproject.org/get-in-touch/why-i-cant-join-tor-channels/
#: (content/get-in-touch/why-i-cant-join-tor-channels/contents+en.lrquestion.description)
msgid ""
-"1. To verify your nick, open a new browser window and go to "
-"https://webchat.oftc.net/?channels=tor."
+"1. Go to https://services.oftc.net/ and follow the steps in the '*To verify "
+"your account*' section"
msgstr ""
-"1. Um deinen Spitznamen zu überprüfen, öffne ein neues Browser-Fenster und "
-"gehe zu https://webchat.oftc.net/?channels=tor."
-
-#: https//support.torproject.org/get-in-touch/why-i-cant-join-tor-channels/
-#: (content/get-in-touch/why-i-cant-join-tor-channels/contents+en.lrquestion.description)
-msgid "2. Log in with your IRC nickname and password."
-msgstr "2. Melde dich mit deinem IRC-Spitznamen und Passwort an."
#: https//support.torproject.org/get-in-touch/why-i-cant-join-tor-channels/
#: (content/get-in-touch/why-i-cant-join-tor-channels/contents+en.lrquestion.description)
-msgid ""
-"3. Look for the word **verify** and log in there. It may appear that nothing"
-" has happened. Look at the top of the page, and there will be a column "
-"called **Account**."
+msgid "2. Go back to the IRC webpage where you are logged in and type:"
msgstr ""
-"3. Suche nach dem Wort **Prüfen** und melde dich dort an. Es mag den "
-"Anschein haben, dass nichts passiert ist. Schaue oben auf der Seite nach, "
-"und dort wird eine Spalte mit dem Namen **Konto** sein."
-
-#: https//support.torproject.org/get-in-touch/why-i-cant-join-tor-channels/
-#: (content/get-in-touch/why-i-cant-join-tor-channels/contents+en.lrquestion.description)
-msgid "4. Click on **Account**."
-msgstr "4. Klick auf **Konto**."
-
-#: https//support.torproject.org/get-in-touch/why-i-cant-join-tor-channels/
-#: (content/get-in-touch/why-i-cant-join-tor-channels/contents+en.lrquestion.description)
-msgid ""
-"5. Click on the small sentence at the bottom of the square that says: Verify"
-" account."
-msgstr ""
-"5. Klick auf den kleinen Satz am unteren Rand des Quadrats mit der "
-"Aufschrift: Konto überprüfen."
-
-#: https//support.torproject.org/get-in-touch/why-i-cant-join-tor-channels/
-#: (content/get-in-touch/why-i-cant-join-tor-channels/contents+en.lrquestion.description)
-msgid "6. Fill out the Captcha that pops up, and click ok."
-msgstr "6. Füll das Captcha aus, das sich öffnet, und klick auf OK."
-
-#: https//support.torproject.org/get-in-touch/why-i-cant-join-tor-channels/
-#: (content/get-in-touch/why-i-cant-join-tor-channels/contents+en.lrquestion.description)
-msgid ""
-"7. A tiny message will appear: \"Your NickServ account has been verified.\""
-msgstr ""
-"7. Es erscheint eine kleine Nachricht: \"Dein NickServ-Konto wurde "
-"überprüft\"."
-
-#: https//support.torproject.org/get-in-touch/why-i-cant-join-tor-channels/
-#: (content/get-in-touch/why-i-cant-join-tor-channels/contents+en.lrquestion.description)
-msgid "8. Go back to the IRC webpage where you are logged in and type:"
-msgstr ""
-"8. Geh zurück zur IRC-Webseite, auf der du angemeldet bist, und gib ein:"
#: https//support.torproject.org/get-in-touch/why-i-cant-join-tor-channels/
#: (content/get-in-touch/why-i-cant-join-tor-channels/contents+en.lrquestion.description)
@@ -12265,14 +13243,13 @@ msgstr "`/msg nickserv checkverify`"
#: https//support.torproject.org/get-in-touch/why-i-cant-join-tor-channels/
#: (content/get-in-touch/why-i-cant-join-tor-channels/contents+en.lrquestion.description)
-msgid "9. Click ENTER."
-msgstr "9. Klick ENTER."
+msgid "3. Click ENTER."
+msgstr ""
#: https//support.torproject.org/get-in-touch/why-i-cant-join-tor-channels/
#: (content/get-in-touch/why-i-cant-join-tor-channels/contents+en.lrquestion.description)
-msgid "10. If all is well, you will receive a message that says:"
+msgid "4. If all is well, you will receive a message that says:"
msgstr ""
-"10. Wenn alles in Ordnung ist, erhältst du eine Nachricht, die besagt:"
#: https//support.torproject.org/get-in-touch/why-i-cant-join-tor-channels/
#: (content/get-in-touch/why-i-cant-join-tor-channels/contents+en.lrquestion.description)
@@ -12442,21 +13419,23 @@ msgstr "# apt install apt-transport-https"
#: https//support.torproject.org/apt/tor-deb-repo/
#: (content/apt/apt-1/contents+en.lrquestion.description)
msgid ""
-"#### 2. Add the following entries to `/etc/apt/sources.list` or a new file "
-"in `/etc/apt/sources.list.d/`"
+"#### 2. Create a new file in `/etc/apt/sources.list.d/` named `tor.list`. "
+"Add the following entries:"
msgstr ""
-"#### 2. Füge die folgenden Einträge zu `/etc/apt/sources.list` oder eine "
-"neue Datei in `/etc/apt/sources.list.d/` hinzu"
#: https//support.torproject.org/apt/tor-deb-repo/
#: (content/apt/apt-1/contents+en.lrquestion.description)
-msgid "deb https://deb.torproject.org/torproject.org <DISTRIBUTION> main"
-msgstr "deb https://deb.torproject.org/torproject.org <DISTRIBUTION> main"
+msgid ""
+"deb [signed-by=/usr/share/keyrings/tor-archive-keyring.gpg] "
+"https://deb.torproject.org/torproject.org <DISTRIBUTION> main"
+msgstr ""
#: https//support.torproject.org/apt/tor-deb-repo/
#: (content/apt/apt-1/contents+en.lrquestion.description)
-msgid "deb-src https://deb.torproject.org/torproject.org <DISTRIBUTION> main"
-msgstr "deb-src https://deb.torproject.org/torproject.org <DISTRIBUTION> main"
+msgid ""
+"deb-src [signed-by=/usr/share/keyrings/tor-archive-keyring.gpg] "
+"https://deb.torproject.org/torproject.org <DISTRIBUTION> main"
+msgstr ""
#: https//support.torproject.org/apt/tor-deb-repo/
#: (content/apt/apt-1/contents+en.lrquestion.description)
@@ -12472,20 +13451,18 @@ msgstr ""
#: https//support.torproject.org/apt/tor-deb-repo/
#: (content/apt/apt-1/contents+en.lrquestion.description)
msgid ""
-"deb https://deb.torproject.org/torproject.org tor-"
+"deb [signed-by=/usr/share/keyrings/tor-archive-keyring.gpg] "
+"https://deb.torproject.org/torproject.org tor-"
"experimental-0.4.6.x-<DISTRIBUTION> main"
msgstr ""
-"deb https://deb.torproject.org/torproject.org tor-"
-"experimental-0.4.6.x-<DISTRIBUTION> main"
#: https//support.torproject.org/apt/tor-deb-repo/
#: (content/apt/apt-1/contents+en.lrquestion.description)
msgid ""
-"deb-src https://deb.torproject.org/torproject.org tor-"
+"deb-src [signed-by=/usr/share/keyrings/tor-archive-keyring.gpg] "
+"https://deb.torproject.org/torproject.org tor-"
"experimental-0.4.6.x-<DISTRIBUTION> main"
msgstr ""
-"deb-src https://deb.torproject.org/torproject.org tor-"
-"experimental-0.4.6.x-<DISTRIBUTION> main"
#: https//support.torproject.org/apt/tor-deb-repo/
#: (content/apt/apt-1/contents+en.lrquestion.description)
@@ -12495,20 +13472,18 @@ msgstr "Oder Nightly Builds:"
#: https//support.torproject.org/apt/tor-deb-repo/
#: (content/apt/apt-1/contents+en.lrquestion.description)
msgid ""
-"deb https://deb.torproject.org/torproject.org tor-nightly-"
-"master-<DISTRIBUTION> main"
+"deb [signed-by=/usr/share/keyrings/tor-archive-keyring.gpg] "
+"https://deb.torproject.org/torproject.org tor-nightly-master-<DISTRIBUTION> "
+"main"
msgstr ""
-"deb https://deb.torproject.org/torproject.org tor-nightly-"
-"master-<DISTRIBUTION> main"
#: https//support.torproject.org/apt/tor-deb-repo/
#: (content/apt/apt-1/contents+en.lrquestion.description)
msgid ""
-"deb-src https://deb.torproject.org/torproject.org tor-nightly-"
-"master-<DISTRIBUTION> main"
+"deb-src [signed-by=/usr/share/keyrings/tor-archive-keyring.gpg] "
+"https://deb.torproject.org/torproject.org tor-nightly-master-<DISTRIBUTION> "
+"main"
msgstr ""
-"deb-src https://deb.torproject.org/torproject.org tor-nightly-"
-"master-<DISTRIBUTION> main"
#: https//support.torproject.org/apt/tor-deb-repo/
#: (content/apt/apt-1/contents+en.lrquestion.description)
@@ -12533,15 +13508,16 @@ msgstr ""
#: https//support.torproject.org/apt/tor-deb-repo/
#: (content/apt/apt-1/contents+en.lrquestion.description)
msgid ""
-"deb [arch=amd64] https://deb.torproject.org/torproject.org focal main"
-msgstr "deb [arch=amd64] https://deb.torproject.org/torproject.org focal main"
+"deb [arch=amd64 signed-by=/usr/share/keyrings/tor-archive-keyring.gpg] "
+"https://deb.torproject.org/torproject.org focal main"
+msgstr ""
#: https//support.torproject.org/apt/tor-deb-repo/
#: (content/apt/apt-1/contents+en.lrquestion.description)
msgid ""
-"deb-src [arch=amd64] https://deb.torproject.org/torproject.org focal main"
+"deb-src [arch=amd64 signed-by=/usr/share/keyrings/tor-archive-keyring.gpg] "
+"https://deb.torproject.org/torproject.org focal main"
msgstr ""
-"deb-src [arch=amd64] https://deb.torproject.org/torproject.org focal main"
#: https//support.torproject.org/apt/tor-deb-repo/
#: (content/apt/apt-1/contents+en.lrquestion.description)
@@ -12563,29 +13539,17 @@ msgstr ""
#: (content/apt/apt-1/contents+en.lrquestion.description)
msgid ""
"#### 3. Then add the gpg key used to sign the packages by running the "
-"following commands at your command prompt"
+"following command at your command prompt:"
msgstr ""
-"#### 3. Füge dann den gpg-Schlüssel hinzu, der zum Signieren der Pakete "
-"verwendet wurde, indem du die folgenden Befehle an deiner "
-"Eingabeaufforderung ausführst"
#: https//support.torproject.org/apt/tor-deb-repo/
#: (content/apt/apt-1/contents+en.lrquestion.description)
msgid ""
-"# wget -qO- "
+"# wget -O- "
"https://deb.torproject.org/torproject.org/A3C4F0F979CAA22CDBA8F512EE8CBC9E886DDD89.asc"
-" | gpg --import"
+" | gpg --dearmor | tee /usr/share/keyrings/tor-archive-keyring.gpg "
+">/dev/null"
msgstr ""
-"# wget -qO- "
-"https://deb.torproject.org/torproject.org/A3C4F0F979CAA22CDBA8F512EE8CBC9E886DDD89.asc"
-" | gpg --import"
-
-#: https//support.torproject.org/apt/tor-deb-repo/
-#: (content/apt/apt-1/contents+en.lrquestion.description)
-msgid ""
-"# gpg --export A3C4F0F979CAA22CDBA8F512EE8CBC9E886DDD89 | apt-key add -"
-msgstr ""
-"# gpg --export A3C4F0F979CAA22CDBA8F512EE8CBC9E886DDD89 | apt-key add -"
#: https//support.torproject.org/apt/tor-deb-repo/
#: (content/apt/apt-1/contents+en.lrquestion.description)
@@ -14666,6 +15630,82 @@ msgstr ""
"Nein, denn dieser Benutzer aktualisiert seine Liste der Relays so oft wie "
"ein Benutzer, der seine IP-Adresse im Laufe des Tages nicht ändert."
+#: https//support.torproject.org/alternate-designs/block-websites/
+#: (content/alternate-designs/block-websites/contents+en.lrquestion.title)
+msgid "Exit policies should be able to block websites, not just IP addresses."
+msgstr ""
+
+#: https//support.torproject.org/alternate-designs/block-websites/
+#: (content/alternate-designs/block-websites/contents+en.lrquestion.description)
+msgid ""
+"It would be nice to let relay operators say things like `reject "
+"www.slashdot.org` in their exit policies, rather than requiring them to "
+"learn all the IP address space that could be covered by the site (and then "
+"also blocking other sites at those IP addresses)."
+msgstr ""
+
+#: https//support.torproject.org/alternate-designs/block-websites/
+#: (content/alternate-designs/block-websites/contents+en.lrquestion.description)
+msgid "There are two problems, though."
+msgstr ""
+
+#: https//support.torproject.org/alternate-designs/block-websites/
+#: (content/alternate-designs/block-websites/contents+en.lrquestion.description)
+msgid "First, users could still get around these blocks."
+msgstr ""
+
+#: https//support.torproject.org/alternate-designs/block-websites/
+#: (content/alternate-designs/block-websites/contents+en.lrquestion.description)
+msgid ""
+"For example, they could request the IP address rather than the hostname when"
+" they exit from the Tor network."
+msgstr ""
+
+#: https//support.torproject.org/alternate-designs/block-websites/
+#: (content/alternate-designs/block-websites/contents+en.lrquestion.description)
+msgid ""
+"This means operators would still need to learn all the IP addresses for the "
+"destinations in question."
+msgstr ""
+
+#: https//support.torproject.org/alternate-designs/block-websites/
+#: (content/alternate-designs/block-websites/contents+en.lrquestion.description)
+msgid ""
+"The second problem is that it would allow remote attackers to censor "
+"arbitrary sites."
+msgstr ""
+
+#: https//support.torproject.org/alternate-designs/block-websites/
+#: (content/alternate-designs/block-websites/contents+en.lrquestion.description)
+msgid ""
+"For example, if a Tor operator blocks www1.slashdot.org, and then some "
+"attacker poisons the Tor relay's DNS or otherwise changes that hostname to "
+"resolve to the IP address for a major news site, then suddenly that Tor "
+"relay is blocking the news site."
+msgstr ""
+
+#: https//support.torproject.org/alternate-designs/let-the-network-pick-the-path/
+#: (content/alternate-designs/let-the-network-pick-the-path/contents+en.lrquestion.title)
+msgid "You should let the network pick the path, not the client."
+msgstr ""
+
+#: https//support.torproject.org/alternate-designs/let-the-network-pick-the-path/
+#: (content/alternate-designs/let-the-network-pick-the-path/contents+en.lrquestion.description)
+msgid "No, you cannot trust the network to pick the path."
+msgstr ""
+
+#: https//support.torproject.org/alternate-designs/let-the-network-pick-the-path/
+#: (content/alternate-designs/let-the-network-pick-the-path/contents+en.lrquestion.description)
+msgid "Malicious relays could route you through their colluding friends."
+msgstr ""
+
+#: https//support.torproject.org/alternate-designs/let-the-network-pick-the-path/
+#: (content/alternate-designs/let-the-network-pick-the-path/contents+en.lrquestion.description)
+msgid ""
+"This would give an adversary the ability to watch all of your traffic end to"
+" end."
+msgstr ""
+
#: lego/templates/banner.html:3 lego/templates/banner.html:5
#: templates/banner.html:3 templates/banner.html:5
msgid "Close banner"
@@ -14696,8 +15736,8 @@ msgid "DONATE NOW"
msgstr "SPENDE JETZT"
#: lego/templates/footer.html:13 lego/templates/footer.html:22
-#: lego/templates/navbar.html:83 templates/footer.html:13
-#: templates/footer.html:22 templates/navbar.html:83
+#: lego/templates/navbar.html:95 templates/footer.html:13
+#: templates/footer.html:22 templates/navbar.html:95
msgid "Download Tor Browser"
msgstr "Tor Browser herunterladen"
diff --git a/contents+el.po b/contents+el.po
index 34d9dfb26b..3810ec98e0 100644
--- a/contents+el.po
+++ b/contents+el.po
@@ -19,7 +19,7 @@ msgid ""
msgstr ""
"Project-Id-Version: PACKAGE VERSION\n"
"Report-Msgid-Bugs-To: \n"
-"POT-Creation-Date: 2021-08-25 11:14+CET\n"
+"POT-Creation-Date: 2021-09-01 12:20+CET\n"
"PO-Revision-Date: 2018-10-02 22:41+0000\n"
"Last-Translator: anvo <fragos.george at hotmail.com>, 2021\n"
"Language-Team: Greek (https://www.transifex.com/otf/teams/1519/el/)\n"
@@ -152,6 +152,11 @@ msgstr "ΣÏ
ÏνÎÏ ÎµÏÏÏήÏÎµÎ¹Ï ÎºÎ±ÏάÏÏηÏηÏ"
msgid "Tor Metrics"
msgstr "Tor Metrics"
+#: https//support.torproject.org/alternate-designs/
+#: (content/alternate-designs/contents+en.lrtopic.title)
+msgid "Alternate Designs We Don't Do (Yet)"
+msgstr ""
+
#: https//support.torproject.org/glossary/add-on-extension-or-plugin/
#: (content/glossary/add-on-extension-or-plugin/contents+en.lrword.term)
msgid "add-on, extension, or plugin"
@@ -2100,6 +2105,61 @@ msgstr ""
"ÎÏοÏείÏε να βÏείÏε ÏεÏιÏÏÏÏεÏÎµÏ Î»ÎµÏÏομεÏÎµÎ¯Ï ÏληÏοÏοÏÎ¯ÎµÏ Î³Î¹Î± Ïο Tor + VPN ÏÏο"
" [wiki μαÏ](https://trac.torproject.org/projects/tor/wiki/doc/TorPlusVPN)."
+#: https//support.torproject.org/faq/relay-donations/
+#: (content/faq/relay-donations/contents+en.lrquestion.title)
+msgid "Can I donate for a relay rather than run my own?"
+msgstr ""
+
+#: https//support.torproject.org/faq/relay-donations/
+#: (content/faq/relay-donations/contents+en.lrquestion.description)
+msgid ""
+"Sure! We have a [list of organizations that run Tor "
+"relays](https://community.torproject.org/relay/community-resources/relay-"
+"associations/) that are happy to turn your donations into better speed and "
+"anonymity for the Tor network."
+msgstr ""
+
+#: https//support.torproject.org/faq/relay-donations/
+#: (content/faq/relay-donations/contents+en.lrquestion.description)
+msgid ""
+"These organizations are not the same as [The Tor Project, "
+"Inc](https://donate.torproject.org/), but we consider that a good thing."
+msgstr ""
+
+#: https//support.torproject.org/faq/relay-donations/
+#: (content/faq/relay-donations/contents+en.lrquestion.description)
+msgid "They're run by nice people who are part of the Tor community."
+msgstr ""
+
+#: https//support.torproject.org/faq/relay-donations/
+#: (content/faq/relay-donations/contents+en.lrquestion.description)
+msgid ""
+"Note that there can be a tradeoff here between anonymity and performance."
+msgstr ""
+
+#: https//support.torproject.org/faq/relay-donations/
+#: (content/faq/relay-donations/contents+en.lrquestion.description)
+msgid ""
+"The Tor network's anonymity comes in part from diversity, so if you are in a"
+" position to run your own relay, you will be improving Tor's anonymity more "
+"than by donating."
+msgstr ""
+
+#: https//support.torproject.org/faq/relay-donations/
+#: (content/faq/relay-donations/contents+en.lrquestion.description)
+msgid ""
+"At the same time though, economies of scale for bandwidth mean that "
+"combining many small donations into several larger relays is more efficient "
+"at improving network performance."
+msgstr ""
+
+#: https//support.torproject.org/faq/relay-donations/
+#: (content/faq/relay-donations/contents+en.lrquestion.description)
+msgid ""
+"Improving anonymity and improving performance are both worthwhile goals, so "
+"however you can help is great!"
+msgstr ""
+
#: https//support.torproject.org/faq/staying-anonymous/
#: (content/faq/staying-anonymous/contents+en.lrquestion.title)
msgid "Am I totally anonymous if I use Tor?"
@@ -2400,6 +2460,61 @@ msgid ""
" documenting all the issues](https://community.torproject.org/)."
msgstr ""
+#: https//support.torproject.org/about/attacks-on-onion-routing/
+#: (content/about/attacks-on-onion-routing/contents+en.lrquestion.title)
+msgid "What attacks remain against onion routing?"
+msgstr ""
+
+#: https//support.torproject.org/about/attacks-on-onion-routing/
+#: (content/about/attacks-on-onion-routing/contents+en.lrquestion.description)
+msgid ""
+"As mentioned above, it is possible for an observer who can view both you and"
+" either the destination website or your Tor exit node to correlate timings "
+"of your traffic as it enters the Tor network and also as it exits."
+msgstr ""
+
+#: https//support.torproject.org/about/attacks-on-onion-routing/
+#: (content/about/attacks-on-onion-routing/contents+en.lrquestion.description)
+msgid "Tor does not defend against such a threat model."
+msgstr ""
+
+#: https//support.torproject.org/about/attacks-on-onion-routing/
+#: (content/about/attacks-on-onion-routing/contents+en.lrquestion.description)
+msgid ""
+"In a more limited sense, note that if a censor or law enforcement agency has"
+" the ability to obtain specific observation of parts of the network, it is "
+"possible for them to verify a suspicion that you talk regularly to your "
+"friend by observing traffic at both ends and correlating the timing of only "
+"that traffic."
+msgstr ""
+
+#: https//support.torproject.org/about/attacks-on-onion-routing/
+#: (content/about/attacks-on-onion-routing/contents+en.lrquestion.description)
+msgid ""
+"Again, this is only useful to verify that parties already suspected of "
+"communicating with one another are doing so."
+msgstr ""
+
+#: https//support.torproject.org/about/attacks-on-onion-routing/
+#: (content/about/attacks-on-onion-routing/contents+en.lrquestion.description)
+msgid ""
+"In most countries, the suspicion required to obtain a warrant already "
+"carries more weight than timing correlation would provide."
+msgstr ""
+
+#: https//support.torproject.org/about/attacks-on-onion-routing/
+#: (content/about/attacks-on-onion-routing/contents+en.lrquestion.description)
+msgid ""
+"Furthermore, since Tor reuses circuits for multiple TCP connections, it is "
+"possible to associate non anonymous and anonymous traffic at a given exit "
+"node, so be careful about what applications you run concurrently over Tor."
+msgstr ""
+
+#: https//support.torproject.org/about/attacks-on-onion-routing/
+#: (content/about/attacks-on-onion-routing/contents+en.lrquestion.description)
+msgid "Perhaps even run separate Tor clients for these applications."
+msgstr ""
+
#: https//support.torproject.org/about/backdoor/
#: (content/about/backdoor/contents+en.lrquestion.title)
msgid "Is there a backdoor in Tor?"
@@ -2535,6 +2650,43 @@ msgid ""
"recommended](/tbb/tbb-9/)."
msgstr ""
+#: https//support.torproject.org/about/change-paths/
+#: (content/about/change-paths/contents+en.lrquestion.title)
+msgid "How often does Tor change its paths?"
+msgstr ""
+
+#: https//support.torproject.org/about/change-paths/
+#: (content/about/change-paths/contents+en.lrquestion.description)
+msgid ""
+"Tor will reuse the same circuit for new TCP streams for 10 minutes, as long "
+"as the circuit is working fine."
+msgstr ""
+
+#: https//support.torproject.org/about/change-paths/
+#: (content/about/change-paths/contents+en.lrquestion.description)
+msgid "(If the circuit fails, Tor will switch to a new circuit immediately.)"
+msgstr ""
+
+#: https//support.torproject.org/about/change-paths/
+#: (content/about/change-paths/contents+en.lrquestion.description)
+msgid ""
+"But note that a single TCP stream (e.g. a long IRC connection) will stay on "
+"the same circuit forever."
+msgstr ""
+
+#: https//support.torproject.org/about/change-paths/
+#: (content/about/change-paths/contents+en.lrquestion.description)
+msgid "We don't rotate individual streams from one circuit to the next."
+msgstr ""
+
+#: https//support.torproject.org/about/change-paths/
+#: (content/about/change-paths/contents+en.lrquestion.description)
+msgid ""
+"Otherwise, an adversary with a partial view of the network would be given "
+"many chances over time to link you to your destination, rather than just one"
+" chance."
+msgstr ""
+
#: https//support.torproject.org/about/distribute-tor/
#: (content/about/distribute-tor/contents+en.lrquestion.title)
msgid "Can I distribute Tor?"
@@ -2630,6 +2782,133 @@ msgid ""
"details."
msgstr ""
+#: https//support.torproject.org/about/entry-guards/
+#: (content/about/entry-guards/contents+en.lrquestion.title)
+msgid "What are Entry Guards?"
+msgstr ""
+
+#: https//support.torproject.org/about/entry-guards/
+#: (content/about/entry-guards/contents+en.lrquestion.description)
+msgid ""
+"Tor (like all current practical low-latency anonymity designs) fails when "
+"the attacker can see both ends of the communications channel."
+msgstr ""
+
+#: https//support.torproject.org/about/entry-guards/
+#: (content/about/entry-guards/contents+en.lrquestion.description)
+msgid ""
+"For example, suppose the attacker controls or watches the Tor relay you "
+"choose to enter the network, and also controls or watches the website you "
+"visit."
+msgstr ""
+
+#: https//support.torproject.org/about/entry-guards/
+#: (content/about/entry-guards/contents+en.lrquestion.description)
+msgid ""
+"In this case, the research community knows no practical low-latency design "
+"that can reliably stop the attacker from correlating volume and timing "
+"information on the two sides."
+msgstr ""
+
+#: https//support.torproject.org/about/entry-guards/
+#: (content/about/entry-guards/contents+en.lrquestion.description)
+msgid "So, what should we do?"
+msgstr ""
+
+#: https//support.torproject.org/about/entry-guards/
+#: (content/about/entry-guards/contents+en.lrquestion.description)
+msgid "Suppose the attacker controls, or can observe, C relays."
+msgstr ""
+
+#: https//support.torproject.org/about/entry-guards/
+#: (content/about/entry-guards/contents+en.lrquestion.description)
+msgid "Suppose there are N relays total."
+msgstr ""
+
+#: https//support.torproject.org/about/entry-guards/
+#: (content/about/entry-guards/contents+en.lrquestion.description)
+msgid ""
+"If you select new entry and exit relays each time you use the network, the "
+"attacker will be able to correlate all traffic you send with probability "
+"around (c/n)2."
+msgstr ""
+
+#: https//support.torproject.org/about/entry-guards/
+#: (content/about/entry-guards/contents+en.lrquestion.description)
+msgid ""
+"But profiling is, for most users, as bad as being traced all the time: they "
+"want to do something often without an attacker noticing, and the attacker "
+"noticing once is as bad as the attacker noticing more often."
+msgstr ""
+
+#: https//support.torproject.org/about/entry-guards/
+#: (content/about/entry-guards/contents+en.lrquestion.description)
+msgid ""
+"Thus, choosing many random entries and exits gives the user no chance of "
+"escaping profiling by this kind of attacker."
+msgstr ""
+
+#: https//support.torproject.org/about/entry-guards/
+#: (content/about/entry-guards/contents+en.lrquestion.description)
+msgid ""
+"The solution is \"entry guards\": each Tor client selects a few relays at "
+"random to use as entry points, and uses only those relays for their first "
+"hop."
+msgstr ""
+
+#: https//support.torproject.org/about/entry-guards/
+#: (content/about/entry-guards/contents+en.lrquestion.description)
+msgid ""
+"If those relays are not controlled or observed, the attacker can't win, "
+"ever, and the user is secure."
+msgstr ""
+
+#: https//support.torproject.org/about/entry-guards/
+#: (content/about/entry-guards/contents+en.lrquestion.description)
+msgid ""
+"If those relays are observed or controlled by the attacker, the attacker "
+"sees a larger fraction of the user's traffic - but still the user is no more"
+" profiled than before."
+msgstr ""
+
+#: https//support.torproject.org/about/entry-guards/
+#: (content/about/entry-guards/contents+en.lrquestion.description)
+msgid ""
+"Thus, the user has some chance (on the order of (n-c)/n) of avoiding "
+"profiling, whereas they had none before."
+msgstr ""
+
+#: https//support.torproject.org/about/entry-guards/
+#: (content/about/entry-guards/contents+en.lrquestion.description)
+msgid ""
+"You can read more at [An Analysis of the Degradation of Anonymous "
+"Protocols](http://freehaven.net/anonbib/#wright02), [Defending Anonymous "
+"Communication Against Passive Logging "
+"Attacks](http://freehaven.net/anonbib/#wright03), and especially [Locating "
+"Hidden Servers](http://freehaven.net/anonbib/#hs-attack06)."
+msgstr ""
+
+#: https//support.torproject.org/about/entry-guards/
+#: (content/about/entry-guards/contents+en.lrquestion.description)
+msgid ""
+"Restricting your entry nodes may also help against attackers who want to run"
+" a few Tor nodes and easily enumerate all of the Tor user IP addresses."
+msgstr ""
+
+#: https//support.torproject.org/about/entry-guards/
+#: (content/about/entry-guards/contents+en.lrquestion.description)
+msgid ""
+"(Even though they can't learn what destinations the users are talking to, "
+"they still might be able to do bad things with just a list of users.)"
+msgstr ""
+
+#: https//support.torproject.org/about/entry-guards/
+#: (content/about/entry-guards/contents+en.lrquestion.description)
+msgid ""
+"However, that feature won't really become useful until we move to a "
+"\"directory guard\" design as well."
+msgstr ""
+
#: https//support.torproject.org/about/how-is-tor-different-from-other-proxies/
#: (content/about/how-is-tor-different-from-other-proxies/contents+en.lrquestion.title)
msgid "How is Tor different from other proxies?"
@@ -2800,6 +3079,162 @@ msgid ""
" Tor and HTTPS interact."
msgstr ""
+#: https//support.torproject.org/about/key-management/
+#: (content/about/key-management/contents+en.lrquestion.title)
+msgid "Tell me about all the keys Tor uses"
+msgstr ""
+
+#: https//support.torproject.org/about/key-management/
+#: (content/about/key-management/contents+en.lrquestion.description)
+msgid ""
+"Tor uses a variety of different keys, with three goals in mind: 1) "
+"encryption to ensure privacy of data within the Tor network, 2) "
+"authentication so clients know they're talking to the relays they meant to "
+"talk to, and 3) signatures to make sure all clients know the same set of "
+"relays."
+msgstr ""
+
+#: https//support.torproject.org/about/key-management/
+#: (content/about/key-management/contents+en.lrquestion.description)
+msgid ""
+"**Encryption**: first, all connections in Tor use TLS link encryption, so "
+"observers can't look inside to see which circuit a given cell is intended "
+"for."
+msgstr ""
+
+#: https//support.torproject.org/about/key-management/
+#: (content/about/key-management/contents+en.lrquestion.description)
+msgid ""
+"Further, the Tor client establishes an ephemeral encryption key with each "
+"relay in the circuit; these extra layers of encryption mean that only the "
+"exit relay can read the cells."
+msgstr ""
+
+#: https//support.torproject.org/about/key-management/
+#: (content/about/key-management/contents+en.lrquestion.description)
+msgid ""
+"Both sides discard the circuit key when the circuit ends, so logging traffic"
+" and then breaking into the relay to discover the key won't work."
+msgstr ""
+
+#: https//support.torproject.org/about/key-management/
+#: (content/about/key-management/contents+en.lrquestion.description)
+msgid ""
+"**Authentication**: Every Tor relay has a public decryption key called the "
+"\"onion key\"."
+msgstr ""
+
+#: https//support.torproject.org/about/key-management/
+#: (content/about/key-management/contents+en.lrquestion.description)
+msgid "Each relay rotates its onion key once a week."
+msgstr ""
+
+#: https//support.torproject.org/about/key-management/
+#: (content/about/key-management/contents+en.lrquestion.description)
+msgid ""
+"When the Tor client establishes circuits, at each step it [demands that the "
+"Tor relay prove knowledge of its onion key](https://svn-"
+"archive.torproject.org/svn/projects/design-paper/tor-"
+"design.html#subsec:circuits)."
+msgstr ""
+
+#: https//support.torproject.org/about/key-management/
+#: (content/about/key-management/contents+en.lrquestion.description)
+msgid ""
+"That way the first node in the path can't just spoof the rest of the path."
+msgstr ""
+
+#: https//support.torproject.org/about/key-management/
+#: (content/about/key-management/contents+en.lrquestion.description)
+msgid ""
+"Because the Tor client chooses the path, it can make sure to get Tor's "
+"\"distributed trust\" property: no single relay in the path can know about "
+"both the client and what the client is doing."
+msgstr ""
+
+#: https//support.torproject.org/about/key-management/
+#: (content/about/key-management/contents+en.lrquestion.description)
+msgid ""
+"**Coordination**: How do clients know what the relays are, and how do they "
+"know that they have the right keys for them?"
+msgstr ""
+
+#: https//support.torproject.org/about/key-management/
+#: (content/about/key-management/contents+en.lrquestion.description)
+msgid "Each relay has a long-term public signing key called the \"identity key\"."
+msgstr ""
+
+#: https//support.torproject.org/about/key-management/
+#: (content/about/key-management/contents+en.lrquestion.description)
+msgid "Each directory authority additionally has a \"directory signing key\"."
+msgstr ""
+
+#: https//support.torproject.org/about/key-management/
+#: (content/about/key-management/contents+en.lrquestion.description)
+msgid ""
+"The directory authorities [provide a signed "
+"list](https://gitweb.torproject.org/torspec.git/tree/dir-spec.txt) of all "
+"the known relays, and in that list are a set of certificates from each relay"
+" (self-signed by their identity key) specifying their keys, locations, exit "
+"policies, and so on."
+msgstr ""
+
+#: https//support.torproject.org/about/key-management/
+#: (content/about/key-management/contents+en.lrquestion.description)
+msgid ""
+"So unless the adversary can control a majority of the directory authorities "
+"(as of 2021 there are 10 directory authorities), they can't trick the Tor "
+"client into using other Tor relays."
+msgstr ""
+
+#: https//support.torproject.org/about/key-management/
+#: (content/about/key-management/contents+en.lrquestion.description)
+msgid "How do clients know what the directory authorities are?"
+msgstr ""
+
+#: https//support.torproject.org/about/key-management/
+#: (content/about/key-management/contents+en.lrquestion.description)
+msgid ""
+"The Tor software comes with a built-in list of location and public key for "
+"each directory authority."
+msgstr ""
+
+#: https//support.torproject.org/about/key-management/
+#: (content/about/key-management/contents+en.lrquestion.description)
+msgid ""
+"So the only way to trick users into using a fake Tor network is to give them"
+" a specially modified version of the software."
+msgstr ""
+
+#: https//support.torproject.org/about/key-management/
+#: (content/about/key-management/contents+en.lrquestion.description)
+msgid "How do users know they've got the right software?"
+msgstr ""
+
+#: https//support.torproject.org/about/key-management/
+#: (content/about/key-management/contents+en.lrquestion.description)
+msgid ""
+"When we distribute the source code or a package, we digitally sign it with "
+"[GNU Privacy Guard](http://www.gnupg.org/). See the [instructions on how to "
+"check Tor Browser's signature](https://support.torproject.org/tbb/how-to-"
+"verify-signature/)."
+msgstr ""
+
+#: https//support.torproject.org/about/key-management/
+#: (content/about/key-management/contents+en.lrquestion.description)
+msgid ""
+"In order to be certain that it's really signed by us, you need to have met "
+"us in person and gotten a copy of our GPG key fingerprint, or you need to "
+"know somebody who has."
+msgstr ""
+
+#: https//support.torproject.org/about/key-management/
+#: (content/about/key-management/contents+en.lrquestion.description)
+msgid ""
+"If you're concerned about an attack on this level, we recommend you get "
+"involved with the security community and start meeting people."
+msgstr ""
+
#: https//support.torproject.org/about/no-data-scrubbing/
#: (content/about/no-data-scrubbing/contents+en.lrquestion.title)
msgid ""
@@ -2832,6 +3267,151 @@ msgid ""
"though."
msgstr ""
+#: https//support.torproject.org/about/protections/
+#: (content/about/protections/contents+en.lrquestion.title)
+msgid "What protections does Tor provide?"
+msgstr ""
+
+#: https//support.torproject.org/about/protections/
+#: (content/about/protections/contents+en.lrquestion.description)
+msgid ""
+"Internet communication is based on a store-and-forward model that can be "
+"understood in analogy to postal mail: Data is transmitted in blocks called "
+"IP datagrams or packets."
+msgstr ""
+
+#: https//support.torproject.org/about/protections/
+#: (content/about/protections/contents+en.lrquestion.description)
+msgid ""
+"Every packet includes a source IP address (of the sender) and a destination "
+"IP address (of the receiver), just as ordinary letters contain postal "
+"addresses of sender and receiver."
+msgstr ""
+
+#: https//support.torproject.org/about/protections/
+#: (content/about/protections/contents+en.lrquestion.description)
+msgid ""
+"The way from sender to receiver involves multiple hops of routers, where "
+"each router inspects the destination IP address and forwards the packet "
+"closer to its destination."
+msgstr ""
+
+#: https//support.torproject.org/about/protections/
+#: (content/about/protections/contents+en.lrquestion.description)
+msgid ""
+"Thus, every router between sender and receiver learns that the sender is "
+"communicating with the receiver."
+msgstr ""
+
+#: https//support.torproject.org/about/protections/
+#: (content/about/protections/contents+en.lrquestion.description)
+msgid ""
+"In particular, your local ISP is in the position to build a complete profile"
+" of your Internet usage."
+msgstr ""
+
+#: https//support.torproject.org/about/protections/
+#: (content/about/protections/contents+en.lrquestion.description)
+msgid ""
+"In addition, every server in the Internet that can see any of the packets "
+"can profile your behavior."
+msgstr ""
+
+#: https//support.torproject.org/about/protections/
+#: (content/about/protections/contents+en.lrquestion.description)
+msgid ""
+"The aim of Tor is to improve your privacy by sending your traffic through a "
+"series of proxies."
+msgstr ""
+
+#: https//support.torproject.org/about/protections/
+#: (content/about/protections/contents+en.lrquestion.description)
+msgid ""
+"Your communication is encrypted in multiple layers and routed via multiple "
+"hops through the Tor network to the final receiver."
+msgstr ""
+
+#: https//support.torproject.org/about/protections/
+#: (content/about/protections/contents+en.lrquestion.description)
+msgid ""
+"More details on this process can be found in this "
+"[visualization](https://support.torproject.org/https/https-1/)."
+msgstr ""
+
+#: https//support.torproject.org/about/protections/
+#: (content/about/protections/contents+en.lrquestion.description)
+msgid ""
+"Note that all your local ISP can observe now is that you are communicating "
+"with Tor nodes."
+msgstr ""
+
+#: https//support.torproject.org/about/protections/
+#: (content/about/protections/contents+en.lrquestion.description)
+msgid ""
+"Similarly, servers in the Internet just see that they are being contacted by"
+" Tor nodes."
+msgstr ""
+
+#: https//support.torproject.org/about/protections/
+#: (content/about/protections/contents+en.lrquestion.description)
+msgid "Generally speaking, Tor aims to solve three privacy problems:"
+msgstr ""
+
+#: https//support.torproject.org/about/protections/
+#: (content/about/protections/contents+en.lrquestion.description)
+msgid ""
+"First, Tor prevents websites and other services from learning your location,"
+" which they can use to build databases about your habits and interests."
+msgstr ""
+
+#: https//support.torproject.org/about/protections/
+#: (content/about/protections/contents+en.lrquestion.description)
+msgid ""
+"With Tor, your Internet connections don't give you away by default -- now "
+"you can have the ability to choose, for each connection, how much "
+"information to reveal."
+msgstr ""
+
+#: https//support.torproject.org/about/protections/
+#: (content/about/protections/contents+en.lrquestion.description)
+msgid ""
+"Second, Tor prevents people watching your traffic locally (such as your ISP "
+"or someone with access to your home wifi or router) from learning what "
+"information you're fetching and where you're fetching it from."
+msgstr ""
+
+#: https//support.torproject.org/about/protections/
+#: (content/about/protections/contents+en.lrquestion.description)
+msgid ""
+"It also stops them from deciding what you're allowed to learn and publish --"
+" if you can get to any part of the Tor network, you can reach any site on "
+"the Internet."
+msgstr ""
+
+#: https//support.torproject.org/about/protections/
+#: (content/about/protections/contents+en.lrquestion.description)
+msgid ""
+"Third, Tor routes your connection through more than one Tor relay so no "
+"single relay can learn what you're up to."
+msgstr ""
+
+#: https//support.torproject.org/about/protections/
+#: (content/about/protections/contents+en.lrquestion.description)
+msgid ""
+"Because these relays are run by different individuals or organizations, "
+"distributing trust provides more security than the old [one hop "
+"proxy](https://support.torproject.org/about/#how-is-tor-different-from-"
+"other-proxies) approach."
+msgstr ""
+
+#: https//support.torproject.org/about/protections/
+#: (content/about/protections/contents+en.lrquestion.description)
+msgid ""
+"Note, however, that there are situations where Tor fails to solve these "
+"privacy problems entirely: see the entry below on [remaining "
+"attacks](https://support.torproject.org/about/#attacks-on-onion-routing)."
+msgstr ""
+
#: https//support.torproject.org/about/what-is-tor/
#: (content/about/what-is-tor/contents+en.lrquestion.title)
msgid "What is Tor?"
@@ -5159,9 +5739,11 @@ msgstr ""
#: (content/tbb/tbb-47/contents+en.lrquestion.description)
msgid ""
"Also, read up on the HTTPProxyAuthenticator and HTTPSProxyAuthenticator "
-"options if your proxy requires auth. We only support basic auth currently, "
-"but if you need NTLM authentication, you may find [this post in the "
-"archives](https://archives.seul.org/or/talk/Jun-2005/msg00223.html) useful."
+"options if your [proxy requires auth.](https://developer.mozilla.org/en-"
+"US/docs/Web/HTTP/Headers/Proxy-Authenticate) We only support basic auth "
+"currently, but if you need NTLM authentication, you may find [this post in "
+"the archives](https://archives.seul.org/or/talk/Jun-2005/msg00223.html) "
+"useful."
msgstr ""
#: https//support.torproject.org/tbb/tbb-47/
@@ -5394,6 +5976,219 @@ msgid ""
"have no effect on Tor's configuration."
msgstr ""
+#: https//support.torproject.org/tbb/tbb-firewall-ports/
+#: (content/tbb/tbb-firewall-ports/contents+en.lrquestion.title)
+msgid "My firewall only allows a few outgoing ports"
+msgstr ""
+
+#: https//support.torproject.org/tbb/tbb-firewall-ports/
+#: (content/tbb/tbb-firewall-ports/contents+en.lrquestion.description)
+msgid ""
+"If your firewall works by blocking ports, then you can tell Tor to only use "
+"the ports when you start your Tor Browser."
+msgstr ""
+
+#: https//support.torproject.org/tbb/tbb-firewall-ports/
+#: (content/tbb/tbb-firewall-ports/contents+en.lrquestion.description)
+msgid ""
+"Or you can add the ports that your firewall permits by adding "
+"\"FascistFirewall 1\" to your torrc configuration file."
+msgstr ""
+
+#: https//support.torproject.org/tbb/tbb-firewall-ports/
+#: (content/tbb/tbb-firewall-ports/contents+en.lrquestion.description)
+msgid ""
+"By default, when you set this Tor assumes that your firewall allows only "
+"port 80 and port 443 (HTTP and HTTPS respectively)."
+msgstr ""
+
+#: https//support.torproject.org/tbb/tbb-firewall-ports/
+#: (content/tbb/tbb-firewall-ports/contents+en.lrquestion.description)
+msgid ""
+"You can select a different set of ports with the FirewallPorts torrc option."
+msgstr ""
+
+#: https//support.torproject.org/tbb/tbb-firewall-ports/
+#: (content/tbb/tbb-firewall-ports/contents+en.lrquestion.description)
+msgid ""
+"If you want to be more fine-grained with your controls, you can also use the"
+" ReachableAddresses config options, e.g.:"
+msgstr ""
+
+#: https//support.torproject.org/tbb/tbb-firewall-ports/
+#: (content/tbb/tbb-firewall-ports/contents+en.lrquestion.description)
+#: https//support.torproject.org/tbb/tbb-install-tor-central-server/
+#: (content/tbb/tbb-install-tor-central-server/contents+en.lrquestion.description)
+#: https//support.torproject.org/operators/default-exit-ports/
+#: (content/operators/default-exit-ports/contents+en.lrquestion.description)
+#: https//support.torproject.org/operators/hibernation/
+#: (content/operators/hibernation/contents+en.lrquestion.description)
+#: https//support.torproject.org/operators/limit-total-bandwidth/
+#: (content/operators/limit-total-bandwidth/contents+en.lrquestion.description)
+#: https//support.torproject.org/misc/bug-or-feedback/
+#: (content/misc/bug-or-feedback/contents+en.lrquestion.description)
+#: https//support.torproject.org/get-in-touch/why-i-cant-join-tor-channels/
+#: (content/get-in-touch/why-i-cant-join-tor-channels/contents+en.lrquestion.description)
+#: https//support.torproject.org/apt/tor-deb-repo/
+#: (content/apt/apt-1/contents+en.lrquestion.description)
+#: https//support.torproject.org/apt/apt-over-tor/
+#: (content/apt/apt-3/contents+en.lrquestion.description)
+msgid "```"
+msgstr "```"
+
+#: https//support.torproject.org/tbb/tbb-firewall-ports/
+#: (content/tbb/tbb-firewall-ports/contents+en.lrquestion.description)
+msgid "ReachableDirAddresses *:80"
+msgstr ""
+
+#: https//support.torproject.org/tbb/tbb-firewall-ports/
+#: (content/tbb/tbb-firewall-ports/contents+en.lrquestion.description)
+msgid "ReachableORAddresses *:443"
+msgstr ""
+
+#: https//support.torproject.org/tbb/tbb-install-tor-central-server/
+#: (content/tbb/tbb-install-tor-central-server/contents+en.lrquestion.title)
+msgid ""
+"Can I install Tor on a central server, and have my clients connect to it?"
+msgstr ""
+
+#: https//support.torproject.org/tbb/tbb-install-tor-central-server/
+#: (content/tbb/tbb-install-tor-central-server/contents+en.lrquestion.description)
+msgid ""
+"Yes. Tor can be configured as a client or a relay on another machine, and "
+"allow other machines to be able to connect to it for anonymity."
+msgstr ""
+
+#: https//support.torproject.org/tbb/tbb-install-tor-central-server/
+#: (content/tbb/tbb-install-tor-central-server/contents+en.lrquestion.description)
+msgid ""
+"This is most useful in an environment where many computers want a gateway of"
+" anonymity to the rest of the world."
+msgstr ""
+
+#: https//support.torproject.org/tbb/tbb-install-tor-central-server/
+#: (content/tbb/tbb-install-tor-central-server/contents+en.lrquestion.description)
+msgid ""
+"However, be forewarned that with this configuration, anyone within your "
+"private network (existing between you and the Tor client/relay) can see what"
+" traffic you are sending in clear text."
+msgstr ""
+
+#: https//support.torproject.org/tbb/tbb-install-tor-central-server/
+#: (content/tbb/tbb-install-tor-central-server/contents+en.lrquestion.description)
+msgid "The anonymity doesn't start until you get to the Tor relay."
+msgstr ""
+
+#: https//support.torproject.org/tbb/tbb-install-tor-central-server/
+#: (content/tbb/tbb-install-tor-central-server/contents+en.lrquestion.description)
+msgid ""
+"Because of this, if you are the controller of your domain and you know "
+"everything's locked down, you will be OK, but this configuration may not be "
+"suitable for large private networks where security is key all around."
+msgstr ""
+
+#: https//support.torproject.org/tbb/tbb-install-tor-central-server/
+#: (content/tbb/tbb-install-tor-central-server/contents+en.lrquestion.description)
+msgid ""
+"Configuration is simple, editing your torrc file's SocksListenAddress "
+"according to the following examples:"
+msgstr ""
+
+#: https//support.torproject.org/tbb/tbb-install-tor-central-server/
+#: (content/tbb/tbb-install-tor-central-server/contents+en.lrquestion.description)
+msgid "SocksListenAddress 127.0.0.1"
+msgstr ""
+
+#: https//support.torproject.org/tbb/tbb-install-tor-central-server/
+#: (content/tbb/tbb-install-tor-central-server/contents+en.lrquestion.description)
+msgid "SocksListenAddress 192.168.x.x:9100"
+msgstr ""
+
+#: https//support.torproject.org/tbb/tbb-install-tor-central-server/
+#: (content/tbb/tbb-install-tor-central-server/contents+en.lrquestion.description)
+msgid "SocksListenAddress 0.0.0.0:9100"
+msgstr ""
+
+#: https//support.torproject.org/tbb/tbb-install-tor-central-server/
+#: (content/tbb/tbb-install-tor-central-server/contents+en.lrquestion.description)
+msgid ""
+"You can state multiple listen addresses, in the case that you are part of "
+"several networks or subnets."
+msgstr ""
+
+#: https//support.torproject.org/tbb/tbb-install-tor-central-server/
+#: (content/tbb/tbb-install-tor-central-server/contents+en.lrquestion.description)
+msgid "SocksListenAddress 192.168.x.x:9100 #eth0"
+msgstr ""
+
+#: https//support.torproject.org/tbb/tbb-install-tor-central-server/
+#: (content/tbb/tbb-install-tor-central-server/contents+en.lrquestion.description)
+msgid "SocksListenAddress 10.x.x.x:9100 #eth1"
+msgstr ""
+
+#: https//support.torproject.org/tbb/tbb-install-tor-central-server/
+#: (content/tbb/tbb-install-tor-central-server/contents+en.lrquestion.description)
+msgid ""
+"After this, your clients on their respective networks/subnets would specify "
+"a socks proxy with the address and port you specified SocksListenAddress to "
+"be."
+msgstr ""
+
+#: https//support.torproject.org/tbb/tbb-install-tor-central-server/
+#: (content/tbb/tbb-install-tor-central-server/contents+en.lrquestion.description)
+msgid ""
+"Please note that the SocksPort configuration option gives the port ONLY for "
+"localhost (127.0.0.1)."
+msgstr ""
+
+#: https//support.torproject.org/tbb/tbb-install-tor-central-server/
+#: (content/tbb/tbb-install-tor-central-server/contents+en.lrquestion.description)
+msgid ""
+"When setting up your SocksListenAddress(es), you need to give the port with "
+"the address, as shown above."
+msgstr ""
+
+#: https//support.torproject.org/tbb/tbb-install-tor-central-server/
+#: (content/tbb/tbb-install-tor-central-server/contents+en.lrquestion.description)
+msgid ""
+"If you are interested in forcing all outgoing data through the central Tor "
+"client/relay, instead of the server only being an optional proxy, you may "
+"find the program iptables (for *nix) useful."
+msgstr ""
+
+#: https//support.torproject.org/tbb/tbb-run-client-different-computer/
+#: (content/tbb/tbb-run-client-different-computer/contents+en.lrquestion.title)
+msgid ""
+"I want to run my Tor client on a different computer than my applications"
+msgstr ""
+
+#: https//support.torproject.org/tbb/tbb-run-client-different-computer/
+#: (content/tbb/tbb-run-client-different-computer/contents+en.lrquestion.description)
+msgid ""
+"By default, your Tor client only listens for applications that connect from "
+"localhost."
+msgstr ""
+
+#: https//support.torproject.org/tbb/tbb-run-client-different-computer/
+#: (content/tbb/tbb-run-client-different-computer/contents+en.lrquestion.description)
+msgid "Connections from other computers are refused."
+msgstr ""
+
+#: https//support.torproject.org/tbb/tbb-run-client-different-computer/
+#: (content/tbb/tbb-run-client-different-computer/contents+en.lrquestion.description)
+msgid ""
+"If you want to torify applications on different computers than the Tor "
+"client, you should edit your torrc to define `SocksListenAddress 0.0.0.0` "
+"and then restart (or hup) Tor."
+msgstr ""
+
+#: https//support.torproject.org/tbb/tbb-run-client-different-computer/
+#: (content/tbb/tbb-run-client-different-computer/contents+en.lrquestion.description)
+msgid ""
+"If you want to get more advanced, you can configure your Tor client on a "
+"firewall to bind to your internal IP but not your external IP."
+msgstr ""
+
#: https//support.torproject.org/tbb/website-blocking-tor/
#: (content/tbb/website-blocking-tor/contents+en.lrquestion.title)
msgid "A website I am trying to reach is blocking access over Tor."
@@ -6977,6 +7772,130 @@ msgid ""
"guide."
msgstr ""
+#: https//support.torproject.org/operators/default-exit-ports/
+#: (content/operators/default-exit-ports/contents+en.lrquestion.title)
+msgid "Is there a list of default exit ports?"
+msgstr ""
+
+#: https//support.torproject.org/operators/default-exit-ports/
+#: (content/operators/default-exit-ports/contents+en.lrquestion.description)
+msgid ""
+"The default open ports are listed below but keep in mind that, any port or "
+"ports can be opened by the relay operator by configuring it in torrc or "
+"modifying the source code."
+msgstr ""
+
+#: https//support.torproject.org/operators/default-exit-ports/
+#: (content/operators/default-exit-ports/contents+en.lrquestion.description)
+msgid ""
+"The default according to src/or/policies.c ([line 85][1] and [line 1901][2])"
+" from the source code release [release-0.4.6][3]:"
+msgstr ""
+
+#: https//support.torproject.org/operators/default-exit-ports/
+#: (content/operators/default-exit-ports/contents+en.lrquestion.description)
+msgid "reject 0.0.0.0/8"
+msgstr ""
+
+#: https//support.torproject.org/operators/default-exit-ports/
+#: (content/operators/default-exit-ports/contents+en.lrquestion.description)
+msgid "reject 169.254.0.0/16"
+msgstr ""
+
+#: https//support.torproject.org/operators/default-exit-ports/
+#: (content/operators/default-exit-ports/contents+en.lrquestion.description)
+msgid "reject 127.0.0.0/8"
+msgstr ""
+
+#: https//support.torproject.org/operators/default-exit-ports/
+#: (content/operators/default-exit-ports/contents+en.lrquestion.description)
+msgid "reject 192.168.0.0/16"
+msgstr ""
+
+#: https//support.torproject.org/operators/default-exit-ports/
+#: (content/operators/default-exit-ports/contents+en.lrquestion.description)
+msgid "reject 10.0.0.0/8"
+msgstr ""
+
+#: https//support.torproject.org/operators/default-exit-ports/
+#: (content/operators/default-exit-ports/contents+en.lrquestion.description)
+msgid "reject 172.16.0.0/12"
+msgstr ""
+
+#: https//support.torproject.org/operators/default-exit-ports/
+#: (content/operators/default-exit-ports/contents+en.lrquestion.description)
+msgid "reject *:25"
+msgstr ""
+
+#: https//support.torproject.org/operators/default-exit-ports/
+#: (content/operators/default-exit-ports/contents+en.lrquestion.description)
+msgid "reject *:119"
+msgstr ""
+
+#: https//support.torproject.org/operators/default-exit-ports/
+#: (content/operators/default-exit-ports/contents+en.lrquestion.description)
+msgid "reject *:135-139"
+msgstr ""
+
+#: https//support.torproject.org/operators/default-exit-ports/
+#: (content/operators/default-exit-ports/contents+en.lrquestion.description)
+msgid "reject *:445"
+msgstr ""
+
+#: https//support.torproject.org/operators/default-exit-ports/
+#: (content/operators/default-exit-ports/contents+en.lrquestion.description)
+msgid "reject *:563"
+msgstr ""
+
+#: https//support.torproject.org/operators/default-exit-ports/
+#: (content/operators/default-exit-ports/contents+en.lrquestion.description)
+msgid "reject *:1214"
+msgstr ""
+
+#: https//support.torproject.org/operators/default-exit-ports/
+#: (content/operators/default-exit-ports/contents+en.lrquestion.description)
+msgid "reject *:4661-4666"
+msgstr ""
+
+#: https//support.torproject.org/operators/default-exit-ports/
+#: (content/operators/default-exit-ports/contents+en.lrquestion.description)
+msgid "reject *:6346-6429"
+msgstr ""
+
+#: https//support.torproject.org/operators/default-exit-ports/
+#: (content/operators/default-exit-ports/contents+en.lrquestion.description)
+msgid "reject *:6699"
+msgstr ""
+
+#: https//support.torproject.org/operators/default-exit-ports/
+#: (content/operators/default-exit-ports/contents+en.lrquestion.description)
+msgid "reject *:6881-6999"
+msgstr ""
+
+#: https//support.torproject.org/operators/default-exit-ports/
+#: (content/operators/default-exit-ports/contents+en.lrquestion.description)
+msgid "accept *:*"
+msgstr ""
+
+#: https//support.torproject.org/operators/default-exit-ports/
+#: (content/operators/default-exit-ports/contents+en.lrquestion.description)
+msgid ""
+"[1]: "
+"https://gitlab.torproject.org/tpo/core/tor/-/blob/release-0.4.6/src/core/or/policies.c#L85"
+msgstr ""
+
+#: https//support.torproject.org/operators/default-exit-ports/
+#: (content/operators/default-exit-ports/contents+en.lrquestion.description)
+msgid ""
+"[2]: "
+"https://gitlab.torproject.org/tpo/core/tor/-/blob/release-0.4.6/src/core/or/policies.c#L1901"
+msgstr ""
+
+#: https//support.torproject.org/operators/default-exit-ports/
+#: (content/operators/default-exit-ports/contents+en.lrquestion.description)
+msgid "[3]: https://gitlab.torproject.org/tpo/core/tor/-/tree/release-0.4.6/"
+msgstr ""
+
#: https//support.torproject.org/operators/dynamic-ip/
#: (content/operators/dynamic-ip/contents+en.lrquestion.title)
msgid "Can I run a Tor relay using a dynamic IP address?"
@@ -7124,21 +8043,6 @@ msgid ""
"into hibernation, signaled by this entry in the log:"
msgstr ""
-#: https//support.torproject.org/operators/hibernation/
-#: (content/operators/hibernation/contents+en.lrquestion.description)
-#: https//support.torproject.org/operators/limit-total-bandwidth/
-#: (content/operators/limit-total-bandwidth/contents+en.lrquestion.description)
-#: https//support.torproject.org/misc/bug-or-feedback/
-#: (content/misc/bug-or-feedback/contents+en.lrquestion.description)
-#: https//support.torproject.org/get-in-touch/why-i-cant-join-tor-channels/
-#: (content/get-in-touch/why-i-cant-join-tor-channels/contents+en.lrquestion.description)
-#: https//support.torproject.org/apt/tor-deb-repo/
-#: (content/apt/apt-1/contents+en.lrquestion.description)
-#: https//support.torproject.org/apt/apt-over-tor/
-#: (content/apt/apt-3/contents+en.lrquestion.description)
-msgid "```"
-msgstr "```"
-
#: https//support.torproject.org/operators/hibernation/
#: (content/operators/hibernation/contents+en.lrquestion.description)
msgid "Bandwidth soft limit reached; commencing hibernation."
@@ -9407,6 +10311,131 @@ msgstr ""
msgid "sub 4096R/C00942E4 2017-03-13"
msgstr "sub 4096R/C00942E4 2017-03-13"
+#: https//support.torproject.org/misc/check-socks-dns-leaks/
+#: (content/misc/check-socks-dns-leaks/contents+en.lrquestion.title)
+msgid ""
+"How do I check if my application that uses SOCKS is leaking DNS requests?"
+msgstr ""
+
+#: https//support.torproject.org/misc/check-socks-dns-leaks/
+#: (content/misc/check-socks-dns-leaks/contents+en.lrquestion.description)
+msgid ""
+"Even if your application is using the correct variant of the SOCKS protocol,"
+" there is still a risk that it could be leaking DNS queries."
+msgstr ""
+
+#: https//support.torproject.org/misc/check-socks-dns-leaks/
+#: (content/misc/check-socks-dns-leaks/contents+en.lrquestion.description)
+msgid ""
+"This problem happens in Firefox extensions that resolve the destination "
+"hostname themselves, for example to show you its IP address, what country "
+"it's in, etc."
+msgstr ""
+
+#: https//support.torproject.org/misc/check-socks-dns-leaks/
+#: (content/misc/check-socks-dns-leaks/contents+en.lrquestion.description)
+msgid ""
+"If you suspect your application might behave like this, follow the "
+"instructions below to check."
+msgstr ""
+
+#: https//support.torproject.org/misc/check-socks-dns-leaks/
+#: (content/misc/check-socks-dns-leaks/contents+en.lrquestion.description)
+msgid ""
+"1. Add `TestSocks 1` to your [torrc file](https://support.torproject.org/tbb"
+"/tbb-editing-torrc/)."
+msgstr ""
+
+#: https//support.torproject.org/misc/check-socks-dns-leaks/
+#: (content/misc/check-socks-dns-leaks/contents+en.lrquestion.description)
+msgid ""
+"1. Start Tor, and point your program's SOCKS proxy settings to Tor's SOCKS5 "
+"server (`socks5://127.0.0.1:9050` by default)."
+msgstr ""
+
+#: https//support.torproject.org/misc/check-socks-dns-leaks/
+#: (content/misc/check-socks-dns-leaks/contents+en.lrquestion.description)
+msgid ""
+"1. Watch your logs as you use your application. For each socks connection, "
+"Tor will log a `notice` for safe connections, and a `warn` for connections "
+"leaking DNS requests."
+msgstr ""
+
+#: https//support.torproject.org/misc/check-socks-dns-leaks/
+#: (content/misc/check-socks-dns-leaks/contents+en.lrquestion.description)
+msgid ""
+"If you want to automatically disable all connections leaking DNS requests, "
+"set `SafeSocks 1` in your torrc file."
+msgstr ""
+
+#: https//support.torproject.org/misc/hide-exits/
+#: (content/misc/hide-exits/contents+en.lrquestion.title)
+msgid ""
+"You should hide the list of Tor relays, so people can't block the exits."
+msgstr ""
+
+#: https//support.torproject.org/misc/hide-exits/
+#: (content/misc/hide-exits/contents+en.lrquestion.description)
+msgid "There are a few reasons we don't:"
+msgstr ""
+
+#: https//support.torproject.org/misc/hide-exits/
+#: (content/misc/hide-exits/contents+en.lrquestion.description)
+msgid ""
+"1. We can't help but make the information available, since Tor clients need "
+"to use it to pick their paths."
+msgstr ""
+
+#: https//support.torproject.org/misc/hide-exits/
+#: (content/misc/hide-exits/contents+en.lrquestion.description)
+msgid "So if the \"blockers\" want it, they can get it anyway."
+msgstr ""
+
+#: https//support.torproject.org/misc/hide-exits/
+#: (content/misc/hide-exits/contents+en.lrquestion.description)
+msgid ""
+"Further, even if we didn't tell clients about the list of relays directly, "
+"somebody could still make a lot of connections through Tor to a test site "
+"and build a list of the addresses they see."
+msgstr ""
+
+#: https//support.torproject.org/misc/hide-exits/
+#: (content/misc/hide-exits/contents+en.lrquestion.description)
+msgid ""
+"1. If people want to block us, we believe that they should be allowed to do "
+"so."
+msgstr ""
+
+#: https//support.torproject.org/misc/hide-exits/
+#: (content/misc/hide-exits/contents+en.lrquestion.description)
+msgid ""
+"Obviously, we would prefer for everybody to allow Tor users to connect to "
+"them, but people have the right to decide who their services should allow "
+"connections from, and if they want to block anonymous users, they can."
+msgstr ""
+
+#: https//support.torproject.org/misc/hide-exits/
+#: (content/misc/hide-exits/contents+en.lrquestion.description)
+msgid ""
+"1. Being blockable also has tactical advantages: it may be a persuasive "
+"response to website maintainers who feel threatened by Tor."
+msgstr ""
+
+#: https//support.torproject.org/misc/hide-exits/
+#: (content/misc/hide-exits/contents+en.lrquestion.description)
+msgid ""
+"Giving them the option may inspire them to stop and think about whether they"
+" really want to eliminate private access to their system, and if not, what "
+"other options they might have."
+msgstr ""
+
+#: https//support.torproject.org/misc/hide-exits/
+#: (content/misc/hide-exits/contents+en.lrquestion.description)
+msgid ""
+"The time they might otherwise have spent blocking Tor, they may instead "
+"spend rethinking their overall approach to privacy and anonymity."
+msgstr ""
+
#: https//support.torproject.org/misc/menu/
#: (content/misc/menu/contents+en.lrquestion.description)
msgid "About"
@@ -10032,56 +11061,20 @@ msgstr ""
#: https//support.torproject.org/get-in-touch/why-i-cant-join-tor-channels/
#: (content/get-in-touch/why-i-cant-join-tor-channels/contents+en.lrquestion.description)
msgid ""
-"Then, to complete the registration and ultimately gain access to the #tor-"
-"project channel, your nickname must be **verified**."
+"After registering your nickname, to gain access to the #tor-project and "
+"other protected channels, your nickname must be **verified**."
msgstr ""
#: https//support.torproject.org/get-in-touch/why-i-cant-join-tor-channels/
#: (content/get-in-touch/why-i-cant-join-tor-channels/contents+en.lrquestion.description)
msgid ""
-"1. To verify your nick, open a new browser window and go to "
-"https://webchat.oftc.net/?channels=tor."
+"1. Go to https://services.oftc.net/ and follow the steps in the '*To verify "
+"your account*' section"
msgstr ""
#: https//support.torproject.org/get-in-touch/why-i-cant-join-tor-channels/
#: (content/get-in-touch/why-i-cant-join-tor-channels/contents+en.lrquestion.description)
-msgid "2. Log in with your IRC nickname and password."
-msgstr ""
-
-#: https//support.torproject.org/get-in-touch/why-i-cant-join-tor-channels/
-#: (content/get-in-touch/why-i-cant-join-tor-channels/contents+en.lrquestion.description)
-msgid ""
-"3. Look for the word **verify** and log in there. It may appear that nothing"
-" has happened. Look at the top of the page, and there will be a column "
-"called **Account**."
-msgstr ""
-
-#: https//support.torproject.org/get-in-touch/why-i-cant-join-tor-channels/
-#: (content/get-in-touch/why-i-cant-join-tor-channels/contents+en.lrquestion.description)
-msgid "4. Click on **Account**."
-msgstr ""
-
-#: https//support.torproject.org/get-in-touch/why-i-cant-join-tor-channels/
-#: (content/get-in-touch/why-i-cant-join-tor-channels/contents+en.lrquestion.description)
-msgid ""
-"5. Click on the small sentence at the bottom of the square that says: Verify"
-" account."
-msgstr ""
-
-#: https//support.torproject.org/get-in-touch/why-i-cant-join-tor-channels/
-#: (content/get-in-touch/why-i-cant-join-tor-channels/contents+en.lrquestion.description)
-msgid "6. Fill out the Captcha that pops up, and click ok."
-msgstr ""
-
-#: https//support.torproject.org/get-in-touch/why-i-cant-join-tor-channels/
-#: (content/get-in-touch/why-i-cant-join-tor-channels/contents+en.lrquestion.description)
-msgid ""
-"7. A tiny message will appear: \"Your NickServ account has been verified.\""
-msgstr ""
-
-#: https//support.torproject.org/get-in-touch/why-i-cant-join-tor-channels/
-#: (content/get-in-touch/why-i-cant-join-tor-channels/contents+en.lrquestion.description)
-msgid "8. Go back to the IRC webpage where you are logged in and type:"
+msgid "2. Go back to the IRC webpage where you are logged in and type:"
msgstr ""
#: https//support.torproject.org/get-in-touch/why-i-cant-join-tor-channels/
@@ -10091,12 +11084,12 @@ msgstr ""
#: https//support.torproject.org/get-in-touch/why-i-cant-join-tor-channels/
#: (content/get-in-touch/why-i-cant-join-tor-channels/contents+en.lrquestion.description)
-msgid "9. Click ENTER."
+msgid "3. Click ENTER."
msgstr ""
#: https//support.torproject.org/get-in-touch/why-i-cant-join-tor-channels/
#: (content/get-in-touch/why-i-cant-join-tor-channels/contents+en.lrquestion.description)
-msgid "10. If all is well, you will receive a message that says:"
+msgid "4. If all is well, you will receive a message that says:"
msgstr ""
#: https//support.torproject.org/get-in-touch/why-i-cant-join-tor-channels/
@@ -10237,19 +11230,23 @@ msgstr "# apt install apt-transport-https"
#: https//support.torproject.org/apt/tor-deb-repo/
#: (content/apt/apt-1/contents+en.lrquestion.description)
msgid ""
-"#### 2. Add the following entries to `/etc/apt/sources.list` or a new file "
-"in `/etc/apt/sources.list.d/`"
+"#### 2. Create a new file in `/etc/apt/sources.list.d/` named `tor.list`. "
+"Add the following entries:"
msgstr ""
#: https//support.torproject.org/apt/tor-deb-repo/
#: (content/apt/apt-1/contents+en.lrquestion.description)
-msgid "deb https://deb.torproject.org/torproject.org <DISTRIBUTION> main"
+msgid ""
+"deb [signed-by=/usr/share/keyrings/tor-archive-keyring.gpg] "
+"https://deb.torproject.org/torproject.org <DISTRIBUTION> main"
msgstr ""
#: https//support.torproject.org/apt/tor-deb-repo/
#: (content/apt/apt-1/contents+en.lrquestion.description)
-msgid "deb-src https://deb.torproject.org/torproject.org <DISTRIBUTION> main"
-msgstr "deb-src https://deb.torproject.org/torproject.org <DISTRIBUTION> main"
+msgid ""
+"deb-src [signed-by=/usr/share/keyrings/tor-archive-keyring.gpg] "
+"https://deb.torproject.org/torproject.org <DISTRIBUTION> main"
+msgstr ""
#: https//support.torproject.org/apt/tor-deb-repo/
#: (content/apt/apt-1/contents+en.lrquestion.description)
@@ -10262,14 +11259,16 @@ msgstr ""
#: https//support.torproject.org/apt/tor-deb-repo/
#: (content/apt/apt-1/contents+en.lrquestion.description)
msgid ""
-"deb https://deb.torproject.org/torproject.org tor-"
+"deb [signed-by=/usr/share/keyrings/tor-archive-keyring.gpg] "
+"https://deb.torproject.org/torproject.org tor-"
"experimental-0.4.6.x-<DISTRIBUTION> main"
msgstr ""
#: https//support.torproject.org/apt/tor-deb-repo/
#: (content/apt/apt-1/contents+en.lrquestion.description)
msgid ""
-"deb-src https://deb.torproject.org/torproject.org tor-"
+"deb-src [signed-by=/usr/share/keyrings/tor-archive-keyring.gpg] "
+"https://deb.torproject.org/torproject.org tor-"
"experimental-0.4.6.x-<DISTRIBUTION> main"
msgstr ""
@@ -10281,18 +11280,18 @@ msgstr ""
#: https//support.torproject.org/apt/tor-deb-repo/
#: (content/apt/apt-1/contents+en.lrquestion.description)
msgid ""
-"deb https://deb.torproject.org/torproject.org tor-nightly-"
-"master-<DISTRIBUTION> main"
+"deb [signed-by=/usr/share/keyrings/tor-archive-keyring.gpg] "
+"https://deb.torproject.org/torproject.org tor-nightly-master-<DISTRIBUTION> "
+"main"
msgstr ""
#: https//support.torproject.org/apt/tor-deb-repo/
#: (content/apt/apt-1/contents+en.lrquestion.description)
msgid ""
-"deb-src https://deb.torproject.org/torproject.org tor-nightly-"
-"master-<DISTRIBUTION> main"
+"deb-src [signed-by=/usr/share/keyrings/tor-archive-keyring.gpg] "
+"https://deb.torproject.org/torproject.org tor-nightly-master-<DISTRIBUTION> "
+"main"
msgstr ""
-"deb-src https://deb.torproject.org/torproject.org tor-nightly-"
-"master-<DISTRIBUTION> main"
#: https//support.torproject.org/apt/tor-deb-repo/
#: (content/apt/apt-1/contents+en.lrquestion.description)
@@ -10312,13 +11311,15 @@ msgstr ""
#: https//support.torproject.org/apt/tor-deb-repo/
#: (content/apt/apt-1/contents+en.lrquestion.description)
msgid ""
-"deb [arch=amd64] https://deb.torproject.org/torproject.org focal main"
+"deb [arch=amd64 signed-by=/usr/share/keyrings/tor-archive-keyring.gpg] "
+"https://deb.torproject.org/torproject.org focal main"
msgstr ""
#: https//support.torproject.org/apt/tor-deb-repo/
#: (content/apt/apt-1/contents+en.lrquestion.description)
msgid ""
-"deb-src [arch=amd64] https://deb.torproject.org/torproject.org focal main"
+"deb-src [arch=amd64 signed-by=/usr/share/keyrings/tor-archive-keyring.gpg] "
+"https://deb.torproject.org/torproject.org focal main"
msgstr ""
#: https//support.torproject.org/apt/tor-deb-repo/
@@ -10338,26 +11339,17 @@ msgstr ""
#: (content/apt/apt-1/contents+en.lrquestion.description)
msgid ""
"#### 3. Then add the gpg key used to sign the packages by running the "
-"following commands at your command prompt"
+"following command at your command prompt:"
msgstr ""
#: https//support.torproject.org/apt/tor-deb-repo/
#: (content/apt/apt-1/contents+en.lrquestion.description)
msgid ""
-"# wget -qO- "
+"# wget -O- "
"https://deb.torproject.org/torproject.org/A3C4F0F979CAA22CDBA8F512EE8CBC9E886DDD89.asc"
-" | gpg --import"
+" | gpg --dearmor | tee /usr/share/keyrings/tor-archive-keyring.gpg "
+">/dev/null"
msgstr ""
-"# wget -qO- "
-"https://deb.torproject.org/torproject.org/A3C4F0F979CAA22CDBA8F512EE8CBC9E886DDD89.asc"
-" | gpg --import"
-
-#: https//support.torproject.org/apt/tor-deb-repo/
-#: (content/apt/apt-1/contents+en.lrquestion.description)
-msgid ""
-"# gpg --export A3C4F0F979CAA22CDBA8F512EE8CBC9E886DDD89 | apt-key add -"
-msgstr ""
-"# gpg --export A3C4F0F979CAA22CDBA8F512EE8CBC9E886DDD89 | apt-key add -"
#: https//support.torproject.org/apt/tor-deb-repo/
#: (content/apt/apt-1/contents+en.lrquestion.description)
@@ -11963,6 +12955,82 @@ msgid ""
"doesn't change IP address over the day."
msgstr ""
+#: https//support.torproject.org/alternate-designs/block-websites/
+#: (content/alternate-designs/block-websites/contents+en.lrquestion.title)
+msgid "Exit policies should be able to block websites, not just IP addresses."
+msgstr ""
+
+#: https//support.torproject.org/alternate-designs/block-websites/
+#: (content/alternate-designs/block-websites/contents+en.lrquestion.description)
+msgid ""
+"It would be nice to let relay operators say things like `reject "
+"www.slashdot.org` in their exit policies, rather than requiring them to "
+"learn all the IP address space that could be covered by the site (and then "
+"also blocking other sites at those IP addresses)."
+msgstr ""
+
+#: https//support.torproject.org/alternate-designs/block-websites/
+#: (content/alternate-designs/block-websites/contents+en.lrquestion.description)
+msgid "There are two problems, though."
+msgstr ""
+
+#: https//support.torproject.org/alternate-designs/block-websites/
+#: (content/alternate-designs/block-websites/contents+en.lrquestion.description)
+msgid "First, users could still get around these blocks."
+msgstr ""
+
+#: https//support.torproject.org/alternate-designs/block-websites/
+#: (content/alternate-designs/block-websites/contents+en.lrquestion.description)
+msgid ""
+"For example, they could request the IP address rather than the hostname when"
+" they exit from the Tor network."
+msgstr ""
+
+#: https//support.torproject.org/alternate-designs/block-websites/
+#: (content/alternate-designs/block-websites/contents+en.lrquestion.description)
+msgid ""
+"This means operators would still need to learn all the IP addresses for the "
+"destinations in question."
+msgstr ""
+
+#: https//support.torproject.org/alternate-designs/block-websites/
+#: (content/alternate-designs/block-websites/contents+en.lrquestion.description)
+msgid ""
+"The second problem is that it would allow remote attackers to censor "
+"arbitrary sites."
+msgstr ""
+
+#: https//support.torproject.org/alternate-designs/block-websites/
+#: (content/alternate-designs/block-websites/contents+en.lrquestion.description)
+msgid ""
+"For example, if a Tor operator blocks www1.slashdot.org, and then some "
+"attacker poisons the Tor relay's DNS or otherwise changes that hostname to "
+"resolve to the IP address for a major news site, then suddenly that Tor "
+"relay is blocking the news site."
+msgstr ""
+
+#: https//support.torproject.org/alternate-designs/let-the-network-pick-the-path/
+#: (content/alternate-designs/let-the-network-pick-the-path/contents+en.lrquestion.title)
+msgid "You should let the network pick the path, not the client."
+msgstr ""
+
+#: https//support.torproject.org/alternate-designs/let-the-network-pick-the-path/
+#: (content/alternate-designs/let-the-network-pick-the-path/contents+en.lrquestion.description)
+msgid "No, you cannot trust the network to pick the path."
+msgstr ""
+
+#: https//support.torproject.org/alternate-designs/let-the-network-pick-the-path/
+#: (content/alternate-designs/let-the-network-pick-the-path/contents+en.lrquestion.description)
+msgid "Malicious relays could route you through their colluding friends."
+msgstr ""
+
+#: https//support.torproject.org/alternate-designs/let-the-network-pick-the-path/
+#: (content/alternate-designs/let-the-network-pick-the-path/contents+en.lrquestion.description)
+msgid ""
+"This would give an adversary the ability to watch all of your traffic end to"
+" end."
+msgstr ""
+
#: lego/templates/banner.html:3 lego/templates/banner.html:5
#: templates/banner.html:3 templates/banner.html:5
msgid "Close banner"
@@ -11994,8 +13062,8 @@ msgid "DONATE NOW"
msgstr "ÎΩΡÎΣTΠΤΩΡÎ"
#: lego/templates/footer.html:13 lego/templates/footer.html:22
-#: lego/templates/navbar.html:83 templates/footer.html:13
-#: templates/footer.html:22 templates/navbar.html:83
+#: lego/templates/navbar.html:95 templates/footer.html:13
+#: templates/footer.html:22 templates/navbar.html:95
msgid "Download Tor Browser"
msgstr "ÎαÏεβάÏÏε Ïο Tor Browser"
diff --git a/contents+es.po b/contents+es.po
index 15645b43dd..403bd2cdf3 100644
--- a/contents+es.po
+++ b/contents+es.po
@@ -16,7 +16,7 @@ msgid ""
msgstr ""
"Project-Id-Version: PACKAGE VERSION\n"
"Report-Msgid-Bugs-To: \n"
-"POT-Creation-Date: 2021-08-25 11:14+CET\n"
+"POT-Creation-Date: 2021-09-01 12:20+CET\n"
"PO-Revision-Date: 2018-10-02 22:41+0000\n"
"Last-Translator: David Figuera <dfb at fastmail.com>, 2021\n"
"Language-Team: Spanish (https://www.transifex.com/otf/teams/1519/es/)\n"
@@ -149,6 +149,11 @@ msgstr "Preguntas Más Frecuentes sobre Abusos"
msgid "Tor Metrics"
msgstr "Métricas de Tor"
+#: https//support.torproject.org/alternate-designs/
+#: (content/alternate-designs/contents+en.lrtopic.title)
+msgid "Alternate Designs We Don't Do (Yet)"
+msgstr ""
+
#: https//support.torproject.org/glossary/add-on-extension-or-plugin/
#: (content/glossary/add-on-extension-or-plugin/contents+en.lrword.term)
msgid "add-on, extension, or plugin"
@@ -2549,6 +2554,61 @@ msgstr ""
"Puedes encontrar más información detallada sobre Tor + VPN en [nuestra "
"wiki](https://trac.torproject.org/projects/tor/wiki/doc/TorPlusVPN)."
+#: https//support.torproject.org/faq/relay-donations/
+#: (content/faq/relay-donations/contents+en.lrquestion.title)
+msgid "Can I donate for a relay rather than run my own?"
+msgstr ""
+
+#: https//support.torproject.org/faq/relay-donations/
+#: (content/faq/relay-donations/contents+en.lrquestion.description)
+msgid ""
+"Sure! We have a [list of organizations that run Tor "
+"relays](https://community.torproject.org/relay/community-resources/relay-"
+"associations/) that are happy to turn your donations into better speed and "
+"anonymity for the Tor network."
+msgstr ""
+
+#: https//support.torproject.org/faq/relay-donations/
+#: (content/faq/relay-donations/contents+en.lrquestion.description)
+msgid ""
+"These organizations are not the same as [The Tor Project, "
+"Inc](https://donate.torproject.org/), but we consider that a good thing."
+msgstr ""
+
+#: https//support.torproject.org/faq/relay-donations/
+#: (content/faq/relay-donations/contents+en.lrquestion.description)
+msgid "They're run by nice people who are part of the Tor community."
+msgstr "Son dirigidas por buena gente que son parte de la comunidad Tor."
+
+#: https//support.torproject.org/faq/relay-donations/
+#: (content/faq/relay-donations/contents+en.lrquestion.description)
+msgid ""
+"Note that there can be a tradeoff here between anonymity and performance."
+msgstr ""
+
+#: https//support.torproject.org/faq/relay-donations/
+#: (content/faq/relay-donations/contents+en.lrquestion.description)
+msgid ""
+"The Tor network's anonymity comes in part from diversity, so if you are in a"
+" position to run your own relay, you will be improving Tor's anonymity more "
+"than by donating."
+msgstr ""
+
+#: https//support.torproject.org/faq/relay-donations/
+#: (content/faq/relay-donations/contents+en.lrquestion.description)
+msgid ""
+"At the same time though, economies of scale for bandwidth mean that "
+"combining many small donations into several larger relays is more efficient "
+"at improving network performance."
+msgstr ""
+
+#: https//support.torproject.org/faq/relay-donations/
+#: (content/faq/relay-donations/contents+en.lrquestion.description)
+msgid ""
+"Improving anonymity and improving performance are both worthwhile goals, so "
+"however you can help is great!"
+msgstr ""
+
#: https//support.torproject.org/faq/staying-anonymous/
#: (content/faq/staying-anonymous/contents+en.lrquestion.title)
msgid "Am I totally anonymous if I use Tor?"
@@ -2926,6 +2986,61 @@ msgstr ""
"identificar y documentar todas las "
"cuestiones](https://community.torproject.org/)."
+#: https//support.torproject.org/about/attacks-on-onion-routing/
+#: (content/about/attacks-on-onion-routing/contents+en.lrquestion.title)
+msgid "What attacks remain against onion routing?"
+msgstr ""
+
+#: https//support.torproject.org/about/attacks-on-onion-routing/
+#: (content/about/attacks-on-onion-routing/contents+en.lrquestion.description)
+msgid ""
+"As mentioned above, it is possible for an observer who can view both you and"
+" either the destination website or your Tor exit node to correlate timings "
+"of your traffic as it enters the Tor network and also as it exits."
+msgstr ""
+
+#: https//support.torproject.org/about/attacks-on-onion-routing/
+#: (content/about/attacks-on-onion-routing/contents+en.lrquestion.description)
+msgid "Tor does not defend against such a threat model."
+msgstr ""
+
+#: https//support.torproject.org/about/attacks-on-onion-routing/
+#: (content/about/attacks-on-onion-routing/contents+en.lrquestion.description)
+msgid ""
+"In a more limited sense, note that if a censor or law enforcement agency has"
+" the ability to obtain specific observation of parts of the network, it is "
+"possible for them to verify a suspicion that you talk regularly to your "
+"friend by observing traffic at both ends and correlating the timing of only "
+"that traffic."
+msgstr ""
+
+#: https//support.torproject.org/about/attacks-on-onion-routing/
+#: (content/about/attacks-on-onion-routing/contents+en.lrquestion.description)
+msgid ""
+"Again, this is only useful to verify that parties already suspected of "
+"communicating with one another are doing so."
+msgstr ""
+
+#: https//support.torproject.org/about/attacks-on-onion-routing/
+#: (content/about/attacks-on-onion-routing/contents+en.lrquestion.description)
+msgid ""
+"In most countries, the suspicion required to obtain a warrant already "
+"carries more weight than timing correlation would provide."
+msgstr ""
+
+#: https//support.torproject.org/about/attacks-on-onion-routing/
+#: (content/about/attacks-on-onion-routing/contents+en.lrquestion.description)
+msgid ""
+"Furthermore, since Tor reuses circuits for multiple TCP connections, it is "
+"possible to associate non anonymous and anonymous traffic at a given exit "
+"node, so be careful about what applications you run concurrently over Tor."
+msgstr ""
+
+#: https//support.torproject.org/about/attacks-on-onion-routing/
+#: (content/about/attacks-on-onion-routing/contents+en.lrquestion.description)
+msgid "Perhaps even run separate Tor clients for these applications."
+msgstr ""
+
#: https//support.torproject.org/about/backdoor/
#: (content/about/backdoor/contents+en.lrquestion.title)
msgid "Is there a backdoor in Tor?"
@@ -3096,6 +3211,43 @@ msgstr ""
"Usar Tor con otros navegadores es [peligroso y no se "
"recomienda](/es/tbb/tbb-9/)."
+#: https//support.torproject.org/about/change-paths/
+#: (content/about/change-paths/contents+en.lrquestion.title)
+msgid "How often does Tor change its paths?"
+msgstr ""
+
+#: https//support.torproject.org/about/change-paths/
+#: (content/about/change-paths/contents+en.lrquestion.description)
+msgid ""
+"Tor will reuse the same circuit for new TCP streams for 10 minutes, as long "
+"as the circuit is working fine."
+msgstr ""
+
+#: https//support.torproject.org/about/change-paths/
+#: (content/about/change-paths/contents+en.lrquestion.description)
+msgid "(If the circuit fails, Tor will switch to a new circuit immediately.)"
+msgstr ""
+
+#: https//support.torproject.org/about/change-paths/
+#: (content/about/change-paths/contents+en.lrquestion.description)
+msgid ""
+"But note that a single TCP stream (e.g. a long IRC connection) will stay on "
+"the same circuit forever."
+msgstr ""
+
+#: https//support.torproject.org/about/change-paths/
+#: (content/about/change-paths/contents+en.lrquestion.description)
+msgid "We don't rotate individual streams from one circuit to the next."
+msgstr ""
+
+#: https//support.torproject.org/about/change-paths/
+#: (content/about/change-paths/contents+en.lrquestion.description)
+msgid ""
+"Otherwise, an adversary with a partial view of the network would be given "
+"many chances over time to link you to your destination, rather than just one"
+" chance."
+msgstr ""
+
#: https//support.torproject.org/about/distribute-tor/
#: (content/about/distribute-tor/contents+en.lrquestion.title)
msgid "Can I distribute Tor?"
@@ -3214,6 +3366,133 @@ msgstr ""
"Consulta nuestras [preguntas frecuentes al "
"respecto](https://www.torproject.org/about/trademark/) para más detalles."
+#: https//support.torproject.org/about/entry-guards/
+#: (content/about/entry-guards/contents+en.lrquestion.title)
+msgid "What are Entry Guards?"
+msgstr ""
+
+#: https//support.torproject.org/about/entry-guards/
+#: (content/about/entry-guards/contents+en.lrquestion.description)
+msgid ""
+"Tor (like all current practical low-latency anonymity designs) fails when "
+"the attacker can see both ends of the communications channel."
+msgstr ""
+
+#: https//support.torproject.org/about/entry-guards/
+#: (content/about/entry-guards/contents+en.lrquestion.description)
+msgid ""
+"For example, suppose the attacker controls or watches the Tor relay you "
+"choose to enter the network, and also controls or watches the website you "
+"visit."
+msgstr ""
+
+#: https//support.torproject.org/about/entry-guards/
+#: (content/about/entry-guards/contents+en.lrquestion.description)
+msgid ""
+"In this case, the research community knows no practical low-latency design "
+"that can reliably stop the attacker from correlating volume and timing "
+"information on the two sides."
+msgstr ""
+
+#: https//support.torproject.org/about/entry-guards/
+#: (content/about/entry-guards/contents+en.lrquestion.description)
+msgid "So, what should we do?"
+msgstr ""
+
+#: https//support.torproject.org/about/entry-guards/
+#: (content/about/entry-guards/contents+en.lrquestion.description)
+msgid "Suppose the attacker controls, or can observe, C relays."
+msgstr ""
+
+#: https//support.torproject.org/about/entry-guards/
+#: (content/about/entry-guards/contents+en.lrquestion.description)
+msgid "Suppose there are N relays total."
+msgstr ""
+
+#: https//support.torproject.org/about/entry-guards/
+#: (content/about/entry-guards/contents+en.lrquestion.description)
+msgid ""
+"If you select new entry and exit relays each time you use the network, the "
+"attacker will be able to correlate all traffic you send with probability "
+"around (c/n)2."
+msgstr ""
+
+#: https//support.torproject.org/about/entry-guards/
+#: (content/about/entry-guards/contents+en.lrquestion.description)
+msgid ""
+"But profiling is, for most users, as bad as being traced all the time: they "
+"want to do something often without an attacker noticing, and the attacker "
+"noticing once is as bad as the attacker noticing more often."
+msgstr ""
+
+#: https//support.torproject.org/about/entry-guards/
+#: (content/about/entry-guards/contents+en.lrquestion.description)
+msgid ""
+"Thus, choosing many random entries and exits gives the user no chance of "
+"escaping profiling by this kind of attacker."
+msgstr ""
+
+#: https//support.torproject.org/about/entry-guards/
+#: (content/about/entry-guards/contents+en.lrquestion.description)
+msgid ""
+"The solution is \"entry guards\": each Tor client selects a few relays at "
+"random to use as entry points, and uses only those relays for their first "
+"hop."
+msgstr ""
+
+#: https//support.torproject.org/about/entry-guards/
+#: (content/about/entry-guards/contents+en.lrquestion.description)
+msgid ""
+"If those relays are not controlled or observed, the attacker can't win, "
+"ever, and the user is secure."
+msgstr ""
+
+#: https//support.torproject.org/about/entry-guards/
+#: (content/about/entry-guards/contents+en.lrquestion.description)
+msgid ""
+"If those relays are observed or controlled by the attacker, the attacker "
+"sees a larger fraction of the user's traffic - but still the user is no more"
+" profiled than before."
+msgstr ""
+
+#: https//support.torproject.org/about/entry-guards/
+#: (content/about/entry-guards/contents+en.lrquestion.description)
+msgid ""
+"Thus, the user has some chance (on the order of (n-c)/n) of avoiding "
+"profiling, whereas they had none before."
+msgstr ""
+
+#: https//support.torproject.org/about/entry-guards/
+#: (content/about/entry-guards/contents+en.lrquestion.description)
+msgid ""
+"You can read more at [An Analysis of the Degradation of Anonymous "
+"Protocols](http://freehaven.net/anonbib/#wright02), [Defending Anonymous "
+"Communication Against Passive Logging "
+"Attacks](http://freehaven.net/anonbib/#wright03), and especially [Locating "
+"Hidden Servers](http://freehaven.net/anonbib/#hs-attack06)."
+msgstr ""
+
+#: https//support.torproject.org/about/entry-guards/
+#: (content/about/entry-guards/contents+en.lrquestion.description)
+msgid ""
+"Restricting your entry nodes may also help against attackers who want to run"
+" a few Tor nodes and easily enumerate all of the Tor user IP addresses."
+msgstr ""
+
+#: https//support.torproject.org/about/entry-guards/
+#: (content/about/entry-guards/contents+en.lrquestion.description)
+msgid ""
+"(Even though they can't learn what destinations the users are talking to, "
+"they still might be able to do bad things with just a list of users.)"
+msgstr ""
+
+#: https//support.torproject.org/about/entry-guards/
+#: (content/about/entry-guards/contents+en.lrquestion.description)
+msgid ""
+"However, that feature won't really become useful until we move to a "
+"\"directory guard\" design as well."
+msgstr ""
+
#: https//support.torproject.org/about/how-is-tor-different-from-other-proxies/
#: (content/about/how-is-tor-different-from-other-proxies/contents+en.lrquestion.title)
msgid "How is Tor different from other proxies?"
@@ -3415,6 +3694,162 @@ msgstr ""
"Mira este gráfico de [Tor y HTTPS](/es/https/https-1/) para entender cuál es"
" la relación entre Tor y HTTPS."
+#: https//support.torproject.org/about/key-management/
+#: (content/about/key-management/contents+en.lrquestion.title)
+msgid "Tell me about all the keys Tor uses"
+msgstr ""
+
+#: https//support.torproject.org/about/key-management/
+#: (content/about/key-management/contents+en.lrquestion.description)
+msgid ""
+"Tor uses a variety of different keys, with three goals in mind: 1) "
+"encryption to ensure privacy of data within the Tor network, 2) "
+"authentication so clients know they're talking to the relays they meant to "
+"talk to, and 3) signatures to make sure all clients know the same set of "
+"relays."
+msgstr ""
+
+#: https//support.torproject.org/about/key-management/
+#: (content/about/key-management/contents+en.lrquestion.description)
+msgid ""
+"**Encryption**: first, all connections in Tor use TLS link encryption, so "
+"observers can't look inside to see which circuit a given cell is intended "
+"for."
+msgstr ""
+
+#: https//support.torproject.org/about/key-management/
+#: (content/about/key-management/contents+en.lrquestion.description)
+msgid ""
+"Further, the Tor client establishes an ephemeral encryption key with each "
+"relay in the circuit; these extra layers of encryption mean that only the "
+"exit relay can read the cells."
+msgstr ""
+
+#: https//support.torproject.org/about/key-management/
+#: (content/about/key-management/contents+en.lrquestion.description)
+msgid ""
+"Both sides discard the circuit key when the circuit ends, so logging traffic"
+" and then breaking into the relay to discover the key won't work."
+msgstr ""
+
+#: https//support.torproject.org/about/key-management/
+#: (content/about/key-management/contents+en.lrquestion.description)
+msgid ""
+"**Authentication**: Every Tor relay has a public decryption key called the "
+"\"onion key\"."
+msgstr ""
+
+#: https//support.torproject.org/about/key-management/
+#: (content/about/key-management/contents+en.lrquestion.description)
+msgid "Each relay rotates its onion key once a week."
+msgstr ""
+
+#: https//support.torproject.org/about/key-management/
+#: (content/about/key-management/contents+en.lrquestion.description)
+msgid ""
+"When the Tor client establishes circuits, at each step it [demands that the "
+"Tor relay prove knowledge of its onion key](https://svn-"
+"archive.torproject.org/svn/projects/design-paper/tor-"
+"design.html#subsec:circuits)."
+msgstr ""
+
+#: https//support.torproject.org/about/key-management/
+#: (content/about/key-management/contents+en.lrquestion.description)
+msgid ""
+"That way the first node in the path can't just spoof the rest of the path."
+msgstr ""
+
+#: https//support.torproject.org/about/key-management/
+#: (content/about/key-management/contents+en.lrquestion.description)
+msgid ""
+"Because the Tor client chooses the path, it can make sure to get Tor's "
+"\"distributed trust\" property: no single relay in the path can know about "
+"both the client and what the client is doing."
+msgstr ""
+
+#: https//support.torproject.org/about/key-management/
+#: (content/about/key-management/contents+en.lrquestion.description)
+msgid ""
+"**Coordination**: How do clients know what the relays are, and how do they "
+"know that they have the right keys for them?"
+msgstr ""
+
+#: https//support.torproject.org/about/key-management/
+#: (content/about/key-management/contents+en.lrquestion.description)
+msgid "Each relay has a long-term public signing key called the \"identity key\"."
+msgstr ""
+
+#: https//support.torproject.org/about/key-management/
+#: (content/about/key-management/contents+en.lrquestion.description)
+msgid "Each directory authority additionally has a \"directory signing key\"."
+msgstr ""
+
+#: https//support.torproject.org/about/key-management/
+#: (content/about/key-management/contents+en.lrquestion.description)
+msgid ""
+"The directory authorities [provide a signed "
+"list](https://gitweb.torproject.org/torspec.git/tree/dir-spec.txt) of all "
+"the known relays, and in that list are a set of certificates from each relay"
+" (self-signed by their identity key) specifying their keys, locations, exit "
+"policies, and so on."
+msgstr ""
+
+#: https//support.torproject.org/about/key-management/
+#: (content/about/key-management/contents+en.lrquestion.description)
+msgid ""
+"So unless the adversary can control a majority of the directory authorities "
+"(as of 2021 there are 10 directory authorities), they can't trick the Tor "
+"client into using other Tor relays."
+msgstr ""
+
+#: https//support.torproject.org/about/key-management/
+#: (content/about/key-management/contents+en.lrquestion.description)
+msgid "How do clients know what the directory authorities are?"
+msgstr ""
+
+#: https//support.torproject.org/about/key-management/
+#: (content/about/key-management/contents+en.lrquestion.description)
+msgid ""
+"The Tor software comes with a built-in list of location and public key for "
+"each directory authority."
+msgstr ""
+
+#: https//support.torproject.org/about/key-management/
+#: (content/about/key-management/contents+en.lrquestion.description)
+msgid ""
+"So the only way to trick users into using a fake Tor network is to give them"
+" a specially modified version of the software."
+msgstr ""
+
+#: https//support.torproject.org/about/key-management/
+#: (content/about/key-management/contents+en.lrquestion.description)
+msgid "How do users know they've got the right software?"
+msgstr ""
+
+#: https//support.torproject.org/about/key-management/
+#: (content/about/key-management/contents+en.lrquestion.description)
+msgid ""
+"When we distribute the source code or a package, we digitally sign it with "
+"[GNU Privacy Guard](http://www.gnupg.org/). See the [instructions on how to "
+"check Tor Browser's signature](https://support.torproject.org/tbb/how-to-"
+"verify-signature/)."
+msgstr ""
+
+#: https//support.torproject.org/about/key-management/
+#: (content/about/key-management/contents+en.lrquestion.description)
+msgid ""
+"In order to be certain that it's really signed by us, you need to have met "
+"us in person and gotten a copy of our GPG key fingerprint, or you need to "
+"know somebody who has."
+msgstr ""
+
+#: https//support.torproject.org/about/key-management/
+#: (content/about/key-management/contents+en.lrquestion.description)
+msgid ""
+"If you're concerned about an attack on this level, we recommend you get "
+"involved with the security community and start meeting people."
+msgstr ""
+
#: https//support.torproject.org/about/no-data-scrubbing/
#: (content/about/no-data-scrubbing/contents+en.lrquestion.title)
msgid ""
@@ -3456,6 +3891,151 @@ msgstr ""
"No obstante, el Navegador Tor no puede hacer nada con el texto que ingresas "
"en formularios."
+#: https//support.torproject.org/about/protections/
+#: (content/about/protections/contents+en.lrquestion.title)
+msgid "What protections does Tor provide?"
+msgstr ""
+
+#: https//support.torproject.org/about/protections/
+#: (content/about/protections/contents+en.lrquestion.description)
+msgid ""
+"Internet communication is based on a store-and-forward model that can be "
+"understood in analogy to postal mail: Data is transmitted in blocks called "
+"IP datagrams or packets."
+msgstr ""
+
+#: https//support.torproject.org/about/protections/
+#: (content/about/protections/contents+en.lrquestion.description)
+msgid ""
+"Every packet includes a source IP address (of the sender) and a destination "
+"IP address (of the receiver), just as ordinary letters contain postal "
+"addresses of sender and receiver."
+msgstr ""
+
+#: https//support.torproject.org/about/protections/
+#: (content/about/protections/contents+en.lrquestion.description)
+msgid ""
+"The way from sender to receiver involves multiple hops of routers, where "
+"each router inspects the destination IP address and forwards the packet "
+"closer to its destination."
+msgstr ""
+
+#: https//support.torproject.org/about/protections/
+#: (content/about/protections/contents+en.lrquestion.description)
+msgid ""
+"Thus, every router between sender and receiver learns that the sender is "
+"communicating with the receiver."
+msgstr ""
+
+#: https//support.torproject.org/about/protections/
+#: (content/about/protections/contents+en.lrquestion.description)
+msgid ""
+"In particular, your local ISP is in the position to build a complete profile"
+" of your Internet usage."
+msgstr ""
+
+#: https//support.torproject.org/about/protections/
+#: (content/about/protections/contents+en.lrquestion.description)
+msgid ""
+"In addition, every server in the Internet that can see any of the packets "
+"can profile your behavior."
+msgstr ""
+
+#: https//support.torproject.org/about/protections/
+#: (content/about/protections/contents+en.lrquestion.description)
+msgid ""
+"The aim of Tor is to improve your privacy by sending your traffic through a "
+"series of proxies."
+msgstr ""
+
+#: https//support.torproject.org/about/protections/
+#: (content/about/protections/contents+en.lrquestion.description)
+msgid ""
+"Your communication is encrypted in multiple layers and routed via multiple "
+"hops through the Tor network to the final receiver."
+msgstr ""
+
+#: https//support.torproject.org/about/protections/
+#: (content/about/protections/contents+en.lrquestion.description)
+msgid ""
+"More details on this process can be found in this "
+"[visualization](https://support.torproject.org/https/https-1/)."
+msgstr ""
+
+#: https//support.torproject.org/about/protections/
+#: (content/about/protections/contents+en.lrquestion.description)
+msgid ""
+"Note that all your local ISP can observe now is that you are communicating "
+"with Tor nodes."
+msgstr ""
+
+#: https//support.torproject.org/about/protections/
+#: (content/about/protections/contents+en.lrquestion.description)
+msgid ""
+"Similarly, servers in the Internet just see that they are being contacted by"
+" Tor nodes."
+msgstr ""
+
+#: https//support.torproject.org/about/protections/
+#: (content/about/protections/contents+en.lrquestion.description)
+msgid "Generally speaking, Tor aims to solve three privacy problems:"
+msgstr ""
+
+#: https//support.torproject.org/about/protections/
+#: (content/about/protections/contents+en.lrquestion.description)
+msgid ""
+"First, Tor prevents websites and other services from learning your location,"
+" which they can use to build databases about your habits and interests."
+msgstr ""
+
+#: https//support.torproject.org/about/protections/
+#: (content/about/protections/contents+en.lrquestion.description)
+msgid ""
+"With Tor, your Internet connections don't give you away by default -- now "
+"you can have the ability to choose, for each connection, how much "
+"information to reveal."
+msgstr ""
+
+#: https//support.torproject.org/about/protections/
+#: (content/about/protections/contents+en.lrquestion.description)
+msgid ""
+"Second, Tor prevents people watching your traffic locally (such as your ISP "
+"or someone with access to your home wifi or router) from learning what "
+"information you're fetching and where you're fetching it from."
+msgstr ""
+
+#: https//support.torproject.org/about/protections/
+#: (content/about/protections/contents+en.lrquestion.description)
+msgid ""
+"It also stops them from deciding what you're allowed to learn and publish --"
+" if you can get to any part of the Tor network, you can reach any site on "
+"the Internet."
+msgstr ""
+
+#: https//support.torproject.org/about/protections/
+#: (content/about/protections/contents+en.lrquestion.description)
+msgid ""
+"Third, Tor routes your connection through more than one Tor relay so no "
+"single relay can learn what you're up to."
+msgstr ""
+
+#: https//support.torproject.org/about/protections/
+#: (content/about/protections/contents+en.lrquestion.description)
+msgid ""
+"Because these relays are run by different individuals or organizations, "
+"distributing trust provides more security than the old [one hop "
+"proxy](https://support.torproject.org/about/#how-is-tor-different-from-"
+"other-proxies) approach."
+msgstr ""
+
+#: https//support.torproject.org/about/protections/
+#: (content/about/protections/contents+en.lrquestion.description)
+msgid ""
+"Note, however, that there are situations where Tor fails to solve these "
+"privacy problems entirely: see the entry below on [remaining "
+"attacks](https://support.torproject.org/about/#attacks-on-onion-routing)."
+msgstr ""
+
#: https//support.torproject.org/about/what-is-tor/
#: (content/about/what-is-tor/contents+en.lrquestion.title)
msgid "What is Tor?"
@@ -6236,16 +6816,12 @@ msgstr ""
#: (content/tbb/tbb-47/contents+en.lrquestion.description)
msgid ""
"Also, read up on the HTTPProxyAuthenticator and HTTPSProxyAuthenticator "
-"options if your proxy requires auth. We only support basic auth currently, "
-"but if you need NTLM authentication, you may find [this post in the "
-"archives](https://archives.seul.org/or/talk/Jun-2005/msg00223.html) useful."
+"options if your [proxy requires auth.](https://developer.mozilla.org/en-"
+"US/docs/Web/HTTP/Headers/Proxy-Authenticate) We only support basic auth "
+"currently, but if you need NTLM authentication, you may find [this post in "
+"the archives](https://archives.seul.org/or/talk/Jun-2005/msg00223.html) "
+"useful."
msgstr ""
-"Si tu proxy requiere del uso de credenciales, puedes leer acerca de las "
-"opciones \"HTTPProxyAuthenticator\" y \"HTTPSProxyAuthenticator\". Por ahora"
-" sólo soportamos la acreditación sencilla (basic auth), pero si necesitas "
-"usar una acreditaciónn de tipo NTLM, puedes encontrar [esta entrada "
-"archivada](http://archives.seul.org/or/talk/Jun-2005/msg00223.html) "
-"interesante."
#: https//support.torproject.org/tbb/tbb-47/
#: (content/tbb/tbb-47/contents+en.lrquestion.description)
@@ -6527,6 +7103,219 @@ msgstr ""
"Recuerda que las lÃneas que comienzan por `#` en el archivo torrc se tratan "
"como comentarios y no tienen efecto en la configuración de Tor."
+#: https//support.torproject.org/tbb/tbb-firewall-ports/
+#: (content/tbb/tbb-firewall-ports/contents+en.lrquestion.title)
+msgid "My firewall only allows a few outgoing ports"
+msgstr ""
+
+#: https//support.torproject.org/tbb/tbb-firewall-ports/
+#: (content/tbb/tbb-firewall-ports/contents+en.lrquestion.description)
+msgid ""
+"If your firewall works by blocking ports, then you can tell Tor to only use "
+"the ports when you start your Tor Browser."
+msgstr ""
+
+#: https//support.torproject.org/tbb/tbb-firewall-ports/
+#: (content/tbb/tbb-firewall-ports/contents+en.lrquestion.description)
+msgid ""
+"Or you can add the ports that your firewall permits by adding "
+"\"FascistFirewall 1\" to your torrc configuration file."
+msgstr ""
+
+#: https//support.torproject.org/tbb/tbb-firewall-ports/
+#: (content/tbb/tbb-firewall-ports/contents+en.lrquestion.description)
+msgid ""
+"By default, when you set this Tor assumes that your firewall allows only "
+"port 80 and port 443 (HTTP and HTTPS respectively)."
+msgstr ""
+
+#: https//support.torproject.org/tbb/tbb-firewall-ports/
+#: (content/tbb/tbb-firewall-ports/contents+en.lrquestion.description)
+msgid ""
+"You can select a different set of ports with the FirewallPorts torrc option."
+msgstr ""
+
+#: https//support.torproject.org/tbb/tbb-firewall-ports/
+#: (content/tbb/tbb-firewall-ports/contents+en.lrquestion.description)
+msgid ""
+"If you want to be more fine-grained with your controls, you can also use the"
+" ReachableAddresses config options, e.g.:"
+msgstr ""
+
+#: https//support.torproject.org/tbb/tbb-firewall-ports/
+#: (content/tbb/tbb-firewall-ports/contents+en.lrquestion.description)
+#: https//support.torproject.org/tbb/tbb-install-tor-central-server/
+#: (content/tbb/tbb-install-tor-central-server/contents+en.lrquestion.description)
+#: https//support.torproject.org/operators/default-exit-ports/
+#: (content/operators/default-exit-ports/contents+en.lrquestion.description)
+#: https//support.torproject.org/operators/hibernation/
+#: (content/operators/hibernation/contents+en.lrquestion.description)
+#: https//support.torproject.org/operators/limit-total-bandwidth/
+#: (content/operators/limit-total-bandwidth/contents+en.lrquestion.description)
+#: https//support.torproject.org/misc/bug-or-feedback/
+#: (content/misc/bug-or-feedback/contents+en.lrquestion.description)
+#: https//support.torproject.org/get-in-touch/why-i-cant-join-tor-channels/
+#: (content/get-in-touch/why-i-cant-join-tor-channels/contents+en.lrquestion.description)
+#: https//support.torproject.org/apt/tor-deb-repo/
+#: (content/apt/apt-1/contents+en.lrquestion.description)
+#: https//support.torproject.org/apt/apt-over-tor/
+#: (content/apt/apt-3/contents+en.lrquestion.description)
+msgid "```"
+msgstr "```"
+
+#: https//support.torproject.org/tbb/tbb-firewall-ports/
+#: (content/tbb/tbb-firewall-ports/contents+en.lrquestion.description)
+msgid "ReachableDirAddresses *:80"
+msgstr ""
+
+#: https//support.torproject.org/tbb/tbb-firewall-ports/
+#: (content/tbb/tbb-firewall-ports/contents+en.lrquestion.description)
+msgid "ReachableORAddresses *:443"
+msgstr ""
+
+#: https//support.torproject.org/tbb/tbb-install-tor-central-server/
+#: (content/tbb/tbb-install-tor-central-server/contents+en.lrquestion.title)
+msgid ""
+"Can I install Tor on a central server, and have my clients connect to it?"
+msgstr ""
+
+#: https//support.torproject.org/tbb/tbb-install-tor-central-server/
+#: (content/tbb/tbb-install-tor-central-server/contents+en.lrquestion.description)
+msgid ""
+"Yes. Tor can be configured as a client or a relay on another machine, and "
+"allow other machines to be able to connect to it for anonymity."
+msgstr ""
+
+#: https//support.torproject.org/tbb/tbb-install-tor-central-server/
+#: (content/tbb/tbb-install-tor-central-server/contents+en.lrquestion.description)
+msgid ""
+"This is most useful in an environment where many computers want a gateway of"
+" anonymity to the rest of the world."
+msgstr ""
+
+#: https//support.torproject.org/tbb/tbb-install-tor-central-server/
+#: (content/tbb/tbb-install-tor-central-server/contents+en.lrquestion.description)
+msgid ""
+"However, be forewarned that with this configuration, anyone within your "
+"private network (existing between you and the Tor client/relay) can see what"
+" traffic you are sending in clear text."
+msgstr ""
+
+#: https//support.torproject.org/tbb/tbb-install-tor-central-server/
+#: (content/tbb/tbb-install-tor-central-server/contents+en.lrquestion.description)
+msgid "The anonymity doesn't start until you get to the Tor relay."
+msgstr ""
+
+#: https//support.torproject.org/tbb/tbb-install-tor-central-server/
+#: (content/tbb/tbb-install-tor-central-server/contents+en.lrquestion.description)
+msgid ""
+"Because of this, if you are the controller of your domain and you know "
+"everything's locked down, you will be OK, but this configuration may not be "
+"suitable for large private networks where security is key all around."
+msgstr ""
+
+#: https//support.torproject.org/tbb/tbb-install-tor-central-server/
+#: (content/tbb/tbb-install-tor-central-server/contents+en.lrquestion.description)
+msgid ""
+"Configuration is simple, editing your torrc file's SocksListenAddress "
+"according to the following examples:"
+msgstr ""
+
+#: https//support.torproject.org/tbb/tbb-install-tor-central-server/
+#: (content/tbb/tbb-install-tor-central-server/contents+en.lrquestion.description)
+msgid "SocksListenAddress 127.0.0.1"
+msgstr ""
+
+#: https//support.torproject.org/tbb/tbb-install-tor-central-server/
+#: (content/tbb/tbb-install-tor-central-server/contents+en.lrquestion.description)
+msgid "SocksListenAddress 192.168.x.x:9100"
+msgstr ""
+
+#: https//support.torproject.org/tbb/tbb-install-tor-central-server/
+#: (content/tbb/tbb-install-tor-central-server/contents+en.lrquestion.description)
+msgid "SocksListenAddress 0.0.0.0:9100"
+msgstr ""
+
+#: https//support.torproject.org/tbb/tbb-install-tor-central-server/
+#: (content/tbb/tbb-install-tor-central-server/contents+en.lrquestion.description)
+msgid ""
+"You can state multiple listen addresses, in the case that you are part of "
+"several networks or subnets."
+msgstr ""
+
+#: https//support.torproject.org/tbb/tbb-install-tor-central-server/
+#: (content/tbb/tbb-install-tor-central-server/contents+en.lrquestion.description)
+msgid "SocksListenAddress 192.168.x.x:9100 #eth0"
+msgstr ""
+
+#: https//support.torproject.org/tbb/tbb-install-tor-central-server/
+#: (content/tbb/tbb-install-tor-central-server/contents+en.lrquestion.description)
+msgid "SocksListenAddress 10.x.x.x:9100 #eth1"
+msgstr ""
+
+#: https//support.torproject.org/tbb/tbb-install-tor-central-server/
+#: (content/tbb/tbb-install-tor-central-server/contents+en.lrquestion.description)
+msgid ""
+"After this, your clients on their respective networks/subnets would specify "
+"a socks proxy with the address and port you specified SocksListenAddress to "
+"be."
+msgstr ""
+
+#: https//support.torproject.org/tbb/tbb-install-tor-central-server/
+#: (content/tbb/tbb-install-tor-central-server/contents+en.lrquestion.description)
+msgid ""
+"Please note that the SocksPort configuration option gives the port ONLY for "
+"localhost (127.0.0.1)."
+msgstr ""
+
+#: https//support.torproject.org/tbb/tbb-install-tor-central-server/
+#: (content/tbb/tbb-install-tor-central-server/contents+en.lrquestion.description)
+msgid ""
+"When setting up your SocksListenAddress(es), you need to give the port with "
+"the address, as shown above."
+msgstr ""
+
+#: https//support.torproject.org/tbb/tbb-install-tor-central-server/
+#: (content/tbb/tbb-install-tor-central-server/contents+en.lrquestion.description)
+msgid ""
+"If you are interested in forcing all outgoing data through the central Tor "
+"client/relay, instead of the server only being an optional proxy, you may "
+"find the program iptables (for *nix) useful."
+msgstr ""
+
+#: https//support.torproject.org/tbb/tbb-run-client-different-computer/
+#: (content/tbb/tbb-run-client-different-computer/contents+en.lrquestion.title)
+msgid ""
+"I want to run my Tor client on a different computer than my applications"
+msgstr ""
+
+#: https//support.torproject.org/tbb/tbb-run-client-different-computer/
+#: (content/tbb/tbb-run-client-different-computer/contents+en.lrquestion.description)
+msgid ""
+"By default, your Tor client only listens for applications that connect from "
+"localhost."
+msgstr ""
+
+#: https//support.torproject.org/tbb/tbb-run-client-different-computer/
+#: (content/tbb/tbb-run-client-different-computer/contents+en.lrquestion.description)
+msgid "Connections from other computers are refused."
+msgstr ""
+
+#: https//support.torproject.org/tbb/tbb-run-client-different-computer/
+#: (content/tbb/tbb-run-client-different-computer/contents+en.lrquestion.description)
+msgid ""
+"If you want to torify applications on different computers than the Tor "
+"client, you should edit your torrc to define `SocksListenAddress 0.0.0.0` "
+"and then restart (or hup) Tor."
+msgstr ""
+
+#: https//support.torproject.org/tbb/tbb-run-client-different-computer/
+#: (content/tbb/tbb-run-client-different-computer/contents+en.lrquestion.description)
+msgid ""
+"If you want to get more advanced, you can configure your Tor client on a "
+"firewall to bind to your internal IP but not your external IP."
+msgstr ""
+
#: https//support.torproject.org/tbb/website-blocking-tor/
#: (content/tbb/website-blocking-tor/contents+en.lrquestion.title)
msgid "A website I am trying to reach is blocking access over Tor."
@@ -8354,6 +9143,130 @@ msgid ""
"guide."
msgstr ""
+#: https//support.torproject.org/operators/default-exit-ports/
+#: (content/operators/default-exit-ports/contents+en.lrquestion.title)
+msgid "Is there a list of default exit ports?"
+msgstr ""
+
+#: https//support.torproject.org/operators/default-exit-ports/
+#: (content/operators/default-exit-ports/contents+en.lrquestion.description)
+msgid ""
+"The default open ports are listed below but keep in mind that, any port or "
+"ports can be opened by the relay operator by configuring it in torrc or "
+"modifying the source code."
+msgstr ""
+
+#: https//support.torproject.org/operators/default-exit-ports/
+#: (content/operators/default-exit-ports/contents+en.lrquestion.description)
+msgid ""
+"The default according to src/or/policies.c ([line 85][1] and [line 1901][2])"
+" from the source code release [release-0.4.6][3]:"
+msgstr ""
+
+#: https//support.torproject.org/operators/default-exit-ports/
+#: (content/operators/default-exit-ports/contents+en.lrquestion.description)
+msgid "reject 0.0.0.0/8"
+msgstr ""
+
+#: https//support.torproject.org/operators/default-exit-ports/
+#: (content/operators/default-exit-ports/contents+en.lrquestion.description)
+msgid "reject 169.254.0.0/16"
+msgstr ""
+
+#: https//support.torproject.org/operators/default-exit-ports/
+#: (content/operators/default-exit-ports/contents+en.lrquestion.description)
+msgid "reject 127.0.0.0/8"
+msgstr ""
+
+#: https//support.torproject.org/operators/default-exit-ports/
+#: (content/operators/default-exit-ports/contents+en.lrquestion.description)
+msgid "reject 192.168.0.0/16"
+msgstr ""
+
+#: https//support.torproject.org/operators/default-exit-ports/
+#: (content/operators/default-exit-ports/contents+en.lrquestion.description)
+msgid "reject 10.0.0.0/8"
+msgstr ""
+
+#: https//support.torproject.org/operators/default-exit-ports/
+#: (content/operators/default-exit-ports/contents+en.lrquestion.description)
+msgid "reject 172.16.0.0/12"
+msgstr ""
+
+#: https//support.torproject.org/operators/default-exit-ports/
+#: (content/operators/default-exit-ports/contents+en.lrquestion.description)
+msgid "reject *:25"
+msgstr ""
+
+#: https//support.torproject.org/operators/default-exit-ports/
+#: (content/operators/default-exit-ports/contents+en.lrquestion.description)
+msgid "reject *:119"
+msgstr ""
+
+#: https//support.torproject.org/operators/default-exit-ports/
+#: (content/operators/default-exit-ports/contents+en.lrquestion.description)
+msgid "reject *:135-139"
+msgstr ""
+
+#: https//support.torproject.org/operators/default-exit-ports/
+#: (content/operators/default-exit-ports/contents+en.lrquestion.description)
+msgid "reject *:445"
+msgstr ""
+
+#: https//support.torproject.org/operators/default-exit-ports/
+#: (content/operators/default-exit-ports/contents+en.lrquestion.description)
+msgid "reject *:563"
+msgstr ""
+
+#: https//support.torproject.org/operators/default-exit-ports/
+#: (content/operators/default-exit-ports/contents+en.lrquestion.description)
+msgid "reject *:1214"
+msgstr ""
+
+#: https//support.torproject.org/operators/default-exit-ports/
+#: (content/operators/default-exit-ports/contents+en.lrquestion.description)
+msgid "reject *:4661-4666"
+msgstr ""
+
+#: https//support.torproject.org/operators/default-exit-ports/
+#: (content/operators/default-exit-ports/contents+en.lrquestion.description)
+msgid "reject *:6346-6429"
+msgstr ""
+
+#: https//support.torproject.org/operators/default-exit-ports/
+#: (content/operators/default-exit-ports/contents+en.lrquestion.description)
+msgid "reject *:6699"
+msgstr ""
+
+#: https//support.torproject.org/operators/default-exit-ports/
+#: (content/operators/default-exit-ports/contents+en.lrquestion.description)
+msgid "reject *:6881-6999"
+msgstr ""
+
+#: https//support.torproject.org/operators/default-exit-ports/
+#: (content/operators/default-exit-ports/contents+en.lrquestion.description)
+msgid "accept *:*"
+msgstr ""
+
+#: https//support.torproject.org/operators/default-exit-ports/
+#: (content/operators/default-exit-ports/contents+en.lrquestion.description)
+msgid ""
+"[1]: "
+"https://gitlab.torproject.org/tpo/core/tor/-/blob/release-0.4.6/src/core/or/policies.c#L85"
+msgstr ""
+
+#: https//support.torproject.org/operators/default-exit-ports/
+#: (content/operators/default-exit-ports/contents+en.lrquestion.description)
+msgid ""
+"[2]: "
+"https://gitlab.torproject.org/tpo/core/tor/-/blob/release-0.4.6/src/core/or/policies.c#L1901"
+msgstr ""
+
+#: https//support.torproject.org/operators/default-exit-ports/
+#: (content/operators/default-exit-ports/contents+en.lrquestion.description)
+msgid "[3]: https://gitlab.torproject.org/tpo/core/tor/-/tree/release-0.4.6/"
+msgstr ""
+
#: https//support.torproject.org/operators/dynamic-ip/
#: (content/operators/dynamic-ip/contents+en.lrquestion.title)
msgid "Can I run a Tor relay using a dynamic IP address?"
@@ -8554,21 +9467,6 @@ msgstr ""
"programa Tor entra en modo hibernación, indicado por esta entrada en el "
"registro:"
-#: https//support.torproject.org/operators/hibernation/
-#: (content/operators/hibernation/contents+en.lrquestion.description)
-#: https//support.torproject.org/operators/limit-total-bandwidth/
-#: (content/operators/limit-total-bandwidth/contents+en.lrquestion.description)
-#: https//support.torproject.org/misc/bug-or-feedback/
-#: (content/misc/bug-or-feedback/contents+en.lrquestion.description)
-#: https//support.torproject.org/get-in-touch/why-i-cant-join-tor-channels/
-#: (content/get-in-touch/why-i-cant-join-tor-channels/contents+en.lrquestion.description)
-#: https//support.torproject.org/apt/tor-deb-repo/
-#: (content/apt/apt-1/contents+en.lrquestion.description)
-#: https//support.torproject.org/apt/apt-over-tor/
-#: (content/apt/apt-3/contents+en.lrquestion.description)
-msgid "```"
-msgstr "```"
-
#: https//support.torproject.org/operators/hibernation/
#: (content/operators/hibernation/contents+en.lrquestion.description)
msgid "Bandwidth soft limit reached; commencing hibernation."
@@ -11408,6 +12306,131 @@ msgstr "uid tor-security at lists.torproject.org"
msgid "sub 4096R/C00942E4 2017-03-13"
msgstr "sub 4096R/C00942E4 2017-03-13"
+#: https//support.torproject.org/misc/check-socks-dns-leaks/
+#: (content/misc/check-socks-dns-leaks/contents+en.lrquestion.title)
+msgid ""
+"How do I check if my application that uses SOCKS is leaking DNS requests?"
+msgstr ""
+
+#: https//support.torproject.org/misc/check-socks-dns-leaks/
+#: (content/misc/check-socks-dns-leaks/contents+en.lrquestion.description)
+msgid ""
+"Even if your application is using the correct variant of the SOCKS protocol,"
+" there is still a risk that it could be leaking DNS queries."
+msgstr ""
+
+#: https//support.torproject.org/misc/check-socks-dns-leaks/
+#: (content/misc/check-socks-dns-leaks/contents+en.lrquestion.description)
+msgid ""
+"This problem happens in Firefox extensions that resolve the destination "
+"hostname themselves, for example to show you its IP address, what country "
+"it's in, etc."
+msgstr ""
+
+#: https//support.torproject.org/misc/check-socks-dns-leaks/
+#: (content/misc/check-socks-dns-leaks/contents+en.lrquestion.description)
+msgid ""
+"If you suspect your application might behave like this, follow the "
+"instructions below to check."
+msgstr ""
+
+#: https//support.torproject.org/misc/check-socks-dns-leaks/
+#: (content/misc/check-socks-dns-leaks/contents+en.lrquestion.description)
+msgid ""
+"1. Add `TestSocks 1` to your [torrc file](https://support.torproject.org/tbb"
+"/tbb-editing-torrc/)."
+msgstr ""
+
+#: https//support.torproject.org/misc/check-socks-dns-leaks/
+#: (content/misc/check-socks-dns-leaks/contents+en.lrquestion.description)
+msgid ""
+"1. Start Tor, and point your program's SOCKS proxy settings to Tor's SOCKS5 "
+"server (`socks5://127.0.0.1:9050` by default)."
+msgstr ""
+
+#: https//support.torproject.org/misc/check-socks-dns-leaks/
+#: (content/misc/check-socks-dns-leaks/contents+en.lrquestion.description)
+msgid ""
+"1. Watch your logs as you use your application. For each socks connection, "
+"Tor will log a `notice` for safe connections, and a `warn` for connections "
+"leaking DNS requests."
+msgstr ""
+
+#: https//support.torproject.org/misc/check-socks-dns-leaks/
+#: (content/misc/check-socks-dns-leaks/contents+en.lrquestion.description)
+msgid ""
+"If you want to automatically disable all connections leaking DNS requests, "
+"set `SafeSocks 1` in your torrc file."
+msgstr ""
+
+#: https//support.torproject.org/misc/hide-exits/
+#: (content/misc/hide-exits/contents+en.lrquestion.title)
+msgid ""
+"You should hide the list of Tor relays, so people can't block the exits."
+msgstr ""
+
+#: https//support.torproject.org/misc/hide-exits/
+#: (content/misc/hide-exits/contents+en.lrquestion.description)
+msgid "There are a few reasons we don't:"
+msgstr ""
+
+#: https//support.torproject.org/misc/hide-exits/
+#: (content/misc/hide-exits/contents+en.lrquestion.description)
+msgid ""
+"1. We can't help but make the information available, since Tor clients need "
+"to use it to pick their paths."
+msgstr ""
+
+#: https//support.torproject.org/misc/hide-exits/
+#: (content/misc/hide-exits/contents+en.lrquestion.description)
+msgid "So if the \"blockers\" want it, they can get it anyway."
+msgstr ""
+
+#: https//support.torproject.org/misc/hide-exits/
+#: (content/misc/hide-exits/contents+en.lrquestion.description)
+msgid ""
+"Further, even if we didn't tell clients about the list of relays directly, "
+"somebody could still make a lot of connections through Tor to a test site "
+"and build a list of the addresses they see."
+msgstr ""
+
+#: https//support.torproject.org/misc/hide-exits/
+#: (content/misc/hide-exits/contents+en.lrquestion.description)
+msgid ""
+"1. If people want to block us, we believe that they should be allowed to do "
+"so."
+msgstr ""
+
+#: https//support.torproject.org/misc/hide-exits/
+#: (content/misc/hide-exits/contents+en.lrquestion.description)
+msgid ""
+"Obviously, we would prefer for everybody to allow Tor users to connect to "
+"them, but people have the right to decide who their services should allow "
+"connections from, and if they want to block anonymous users, they can."
+msgstr ""
+
+#: https//support.torproject.org/misc/hide-exits/
+#: (content/misc/hide-exits/contents+en.lrquestion.description)
+msgid ""
+"1. Being blockable also has tactical advantages: it may be a persuasive "
+"response to website maintainers who feel threatened by Tor."
+msgstr ""
+
+#: https//support.torproject.org/misc/hide-exits/
+#: (content/misc/hide-exits/contents+en.lrquestion.description)
+msgid ""
+"Giving them the option may inspire them to stop and think about whether they"
+" really want to eliminate private access to their system, and if not, what "
+"other options they might have."
+msgstr ""
+
+#: https//support.torproject.org/misc/hide-exits/
+#: (content/misc/hide-exits/contents+en.lrquestion.description)
+msgid ""
+"The time they might otherwise have spent blocking Tor, they may instead "
+"spend rethinking their overall approach to privacy and anonymity."
+msgstr ""
+
#: https//support.torproject.org/misc/menu/
#: (content/misc/menu/contents+en.lrquestion.description)
msgid "About"
@@ -12125,68 +13148,21 @@ msgstr "### Como verificar tu apodo"
#: https//support.torproject.org/get-in-touch/why-i-cant-join-tor-channels/
#: (content/get-in-touch/why-i-cant-join-tor-channels/contents+en.lrquestion.description)
msgid ""
-"Then, to complete the registration and ultimately gain access to the #tor-"
-"project channel, your nickname must be **verified**."
+"After registering your nickname, to gain access to the #tor-project and "
+"other protected channels, your nickname must be **verified**."
msgstr ""
-"Ahora, para completar el registro y obtener acceso al canal #tor-project, "
-"debes **verificar** tu apodo."
#: https//support.torproject.org/get-in-touch/why-i-cant-join-tor-channels/
#: (content/get-in-touch/why-i-cant-join-tor-channels/contents+en.lrquestion.description)
msgid ""
-"1. To verify your nick, open a new browser window and go to "
-"https://webchat.oftc.net/?channels=tor."
+"1. Go to https://services.oftc.net/ and follow the steps in the '*To verify "
+"your account*' section"
msgstr ""
-"1. Para verificar tu apodo, abre una ventana del navegador y ve a "
-"https://webchat.oftc.net/?channels=tor."
#: https//support.torproject.org/get-in-touch/why-i-cant-join-tor-channels/
#: (content/get-in-touch/why-i-cant-join-tor-channels/contents+en.lrquestion.description)
-msgid "2. Log in with your IRC nickname and password."
-msgstr "2. Entra con tu apodo para el IRC y tu contraseña."
-
-#: https//support.torproject.org/get-in-touch/why-i-cant-join-tor-channels/
-#: (content/get-in-touch/why-i-cant-join-tor-channels/contents+en.lrquestion.description)
-msgid ""
-"3. Look for the word **verify** and log in there. It may appear that nothing"
-" has happened. Look at the top of the page, and there will be a column "
-"called **Account**."
+msgid "2. Go back to the IRC webpage where you are logged in and type:"
msgstr ""
-"3. Busca la palabra **verify** e ingresa allÃ. Puede parecer que no ha "
-"pasado nada. Mira en la parte superior de la página, en la columna con el "
-"texto **Account**."
-
-#: https//support.torproject.org/get-in-touch/why-i-cant-join-tor-channels/
-#: (content/get-in-touch/why-i-cant-join-tor-channels/contents+en.lrquestion.description)
-msgid "4. Click on **Account**."
-msgstr "4. Haz clic en **Account**."
-
-#: https//support.torproject.org/get-in-touch/why-i-cant-join-tor-channels/
-#: (content/get-in-touch/why-i-cant-join-tor-channels/contents+en.lrquestion.description)
-msgid ""
-"5. Click on the small sentence at the bottom of the square that says: Verify"
-" account."
-msgstr ""
-"5. Haz clic en la frase \"Verify account\" que aparece debajo del "
-"rectángulo."
-
-#: https//support.torproject.org/get-in-touch/why-i-cant-join-tor-channels/
-#: (content/get-in-touch/why-i-cant-join-tor-channels/contents+en.lrquestion.description)
-msgid "6. Fill out the Captcha that pops up, and click ok."
-msgstr "6. Completa el Captcha que aparece, y cliquea \"Aceptar\"."
-
-#: https//support.torproject.org/get-in-touch/why-i-cant-join-tor-channels/
-#: (content/get-in-touch/why-i-cant-join-tor-channels/contents+en.lrquestion.description)
-msgid ""
-"7. A tiny message will appear: \"Your NickServ account has been verified.\""
-msgstr ""
-"7. Aparecerá un pequeño mensaje: \"Your NickServ account has been "
-"verified.\""
-
-#: https//support.torproject.org/get-in-touch/why-i-cant-join-tor-channels/
-#: (content/get-in-touch/why-i-cant-join-tor-channels/contents+en.lrquestion.description)
-msgid "8. Go back to the IRC webpage where you are logged in and type:"
-msgstr "8. Vuelve a la página donde has ingresado y escribe:"
#: https//support.torproject.org/get-in-touch/why-i-cant-join-tor-channels/
#: (content/get-in-touch/why-i-cant-join-tor-channels/contents+en.lrquestion.description)
@@ -12195,13 +13171,13 @@ msgstr "`/msg nickserv checkverify`"
#: https//support.torproject.org/get-in-touch/why-i-cant-join-tor-channels/
#: (content/get-in-touch/why-i-cant-join-tor-channels/contents+en.lrquestion.description)
-msgid "9. Click ENTER."
-msgstr "9. Pulsa ENTER."
+msgid "3. Click ENTER."
+msgstr ""
#: https//support.torproject.org/get-in-touch/why-i-cant-join-tor-channels/
#: (content/get-in-touch/why-i-cant-join-tor-channels/contents+en.lrquestion.description)
-msgid "10. If all is well, you will receive a message that says:"
-msgstr "10. Si todo ha ido bien, recibirás un mensaje que dice:"
+msgid "4. If all is well, you will receive a message that says:"
+msgstr ""
#: https//support.torproject.org/get-in-touch/why-i-cant-join-tor-channels/
#: (content/get-in-touch/why-i-cant-join-tor-channels/contents+en.lrquestion.description)
@@ -12366,21 +13342,23 @@ msgstr "# apt install apt-transport-https"
#: https//support.torproject.org/apt/tor-deb-repo/
#: (content/apt/apt-1/contents+en.lrquestion.description)
msgid ""
-"#### 2. Add the following entries to `/etc/apt/sources.list` or a new file "
-"in `/etc/apt/sources.list.d/`"
+"#### 2. Create a new file in `/etc/apt/sources.list.d/` named `tor.list`. "
+"Add the following entries:"
msgstr ""
-"#### 2. Añade las siguientes entradas a `/etc/apt/sources.list` o a un nuevo"
-" archivo en `/etc/apt/sources.list.d/`"
#: https//support.torproject.org/apt/tor-deb-repo/
#: (content/apt/apt-1/contents+en.lrquestion.description)
-msgid "deb https://deb.torproject.org/torproject.org <DISTRIBUTION> main"
-msgstr "deb https://deb.torproject.org/torproject.org <DISTRIBUTION> main"
+msgid ""
+"deb [signed-by=/usr/share/keyrings/tor-archive-keyring.gpg] "
+"https://deb.torproject.org/torproject.org <DISTRIBUTION> main"
+msgstr ""
#: https//support.torproject.org/apt/tor-deb-repo/
#: (content/apt/apt-1/contents+en.lrquestion.description)
-msgid "deb-src https://deb.torproject.org/torproject.org <DISTRIBUTION> main"
-msgstr "deb-src https://deb.torproject.org/torproject.org <DISTRIBUTION> main"
+msgid ""
+"deb-src [signed-by=/usr/share/keyrings/tor-archive-keyring.gpg] "
+"https://deb.torproject.org/torproject.org <DISTRIBUTION> main"
+msgstr ""
#: https//support.torproject.org/apt/tor-deb-repo/
#: (content/apt/apt-1/contents+en.lrquestion.description)
@@ -12396,20 +13374,18 @@ msgstr ""
#: https//support.torproject.org/apt/tor-deb-repo/
#: (content/apt/apt-1/contents+en.lrquestion.description)
msgid ""
-"deb https://deb.torproject.org/torproject.org tor-"
+"deb [signed-by=/usr/share/keyrings/tor-archive-keyring.gpg] "
+"https://deb.torproject.org/torproject.org tor-"
"experimental-0.4.6.x-<DISTRIBUTION> main"
msgstr ""
-"deb https://deb.torproject.org/torproject.org tor-"
-"experimental-0.4.6.x-<DISTRIBUTION> main"
#: https//support.torproject.org/apt/tor-deb-repo/
#: (content/apt/apt-1/contents+en.lrquestion.description)
msgid ""
-"deb-src https://deb.torproject.org/torproject.org tor-"
+"deb-src [signed-by=/usr/share/keyrings/tor-archive-keyring.gpg] "
+"https://deb.torproject.org/torproject.org tor-"
"experimental-0.4.6.x-<DISTRIBUTION> main"
msgstr ""
-"deb-src https://deb.torproject.org/torproject.org tor-"
-"experimental-0.4.6.x-<DISTRIBUTION> main"
#: https//support.torproject.org/apt/tor-deb-repo/
#: (content/apt/apt-1/contents+en.lrquestion.description)
@@ -12419,20 +13395,18 @@ msgstr "O versiones compiladas diariamente:"
#: https//support.torproject.org/apt/tor-deb-repo/
#: (content/apt/apt-1/contents+en.lrquestion.description)
msgid ""
-"deb https://deb.torproject.org/torproject.org tor-nightly-"
-"master-<DISTRIBUTION> main"
+"deb [signed-by=/usr/share/keyrings/tor-archive-keyring.gpg] "
+"https://deb.torproject.org/torproject.org tor-nightly-master-<DISTRIBUTION> "
+"main"
msgstr ""
-"deb https://deb.torproject.org/torproject.org tor-nightly-"
-"master-<DISTRIBUTION> main"
#: https//support.torproject.org/apt/tor-deb-repo/
#: (content/apt/apt-1/contents+en.lrquestion.description)
msgid ""
-"deb-src https://deb.torproject.org/torproject.org tor-nightly-"
-"master-<DISTRIBUTION> main"
+"deb-src [signed-by=/usr/share/keyrings/tor-archive-keyring.gpg] "
+"https://deb.torproject.org/torproject.org tor-nightly-master-<DISTRIBUTION> "
+"main"
msgstr ""
-"deb-src https://deb.torproject.org/torproject.org tor-nightly-"
-"master-<DISTRIBUTION> main"
#: https//support.torproject.org/apt/tor-deb-repo/
#: (content/apt/apt-1/contents+en.lrquestion.description)
@@ -12457,16 +13431,16 @@ msgstr ""
#: https//support.torproject.org/apt/tor-deb-repo/
#: (content/apt/apt-1/contents+en.lrquestion.description)
msgid ""
-"deb [arch=amd64] https://deb.torproject.org/torproject.org focal main"
+"deb [arch=amd64 signed-by=/usr/share/keyrings/tor-archive-keyring.gpg] "
+"https://deb.torproject.org/torproject.org focal main"
msgstr ""
-"deb [arch=amd64] https://deb.torproject.org/torproject.org focal main"
#: https//support.torproject.org/apt/tor-deb-repo/
#: (content/apt/apt-1/contents+en.lrquestion.description)
msgid ""
-"deb-src [arch=amd64] https://deb.torproject.org/torproject.org focal main"
+"deb-src [arch=amd64 signed-by=/usr/share/keyrings/tor-archive-keyring.gpg] "
+"https://deb.torproject.org/torproject.org focal main"
msgstr ""
-"deb-src [arch=amd64] https://deb.torproject.org/torproject.org focal main"
#: https//support.torproject.org/apt/tor-deb-repo/
#: (content/apt/apt-1/contents+en.lrquestion.description)
@@ -12488,28 +13462,17 @@ msgstr ""
#: (content/apt/apt-1/contents+en.lrquestion.description)
msgid ""
"#### 3. Then add the gpg key used to sign the packages by running the "
-"following commands at your command prompt"
+"following command at your command prompt:"
msgstr ""
-"#### 3. A continuación añade la clave PGP usada para firmar digitalmente los"
-" paquetes ejecutando el siguiente comando en un terminal"
#: https//support.torproject.org/apt/tor-deb-repo/
#: (content/apt/apt-1/contents+en.lrquestion.description)
msgid ""
-"# wget -qO- "
+"# wget -O- "
"https://deb.torproject.org/torproject.org/A3C4F0F979CAA22CDBA8F512EE8CBC9E886DDD89.asc"
-" | gpg --import"
+" | gpg --dearmor | tee /usr/share/keyrings/tor-archive-keyring.gpg "
+">/dev/null"
msgstr ""
-"# wget -qO- "
-"https://deb.torproject.org/torproject.org/A3C4F0F979CAA22CDBA8F512EE8CBC9E886DDD89.asc"
-" | gpg --import"
-
-#: https//support.torproject.org/apt/tor-deb-repo/
-#: (content/apt/apt-1/contents+en.lrquestion.description)
-msgid ""
-"# gpg --export A3C4F0F979CAA22CDBA8F512EE8CBC9E886DDD89 | apt-key add -"
-msgstr ""
-"# gpg --export A3C4F0F979CAA22CDBA8F512EE8CBC9E886DDD89 | apt-key add -"
#: https//support.torproject.org/apt/tor-deb-repo/
#: (content/apt/apt-1/contents+en.lrquestion.description)
@@ -14568,6 +15531,82 @@ msgstr ""
"No, porque ese usuario actualiza su lista de repetidores tan frecuentemente "
"como un usuario que no cambia la dirección IP a lo largo del dÃa."
+#: https//support.torproject.org/alternate-designs/block-websites/
+#: (content/alternate-designs/block-websites/contents+en.lrquestion.title)
+msgid "Exit policies should be able to block websites, not just IP addresses."
+msgstr ""
+
+#: https//support.torproject.org/alternate-designs/block-websites/
+#: (content/alternate-designs/block-websites/contents+en.lrquestion.description)
+msgid ""
+"It would be nice to let relay operators say things like `reject "
+"www.slashdot.org` in their exit policies, rather than requiring them to "
+"learn all the IP address space that could be covered by the site (and then "
+"also blocking other sites at those IP addresses)."
+msgstr ""
+
+#: https//support.torproject.org/alternate-designs/block-websites/
+#: (content/alternate-designs/block-websites/contents+en.lrquestion.description)
+msgid "There are two problems, though."
+msgstr ""
+
+#: https//support.torproject.org/alternate-designs/block-websites/
+#: (content/alternate-designs/block-websites/contents+en.lrquestion.description)
+msgid "First, users could still get around these blocks."
+msgstr ""
+
+#: https//support.torproject.org/alternate-designs/block-websites/
+#: (content/alternate-designs/block-websites/contents+en.lrquestion.description)
+msgid ""
+"For example, they could request the IP address rather than the hostname when"
+" they exit from the Tor network."
+msgstr ""
+
+#: https//support.torproject.org/alternate-designs/block-websites/
+#: (content/alternate-designs/block-websites/contents+en.lrquestion.description)
+msgid ""
+"This means operators would still need to learn all the IP addresses for the "
+"destinations in question."
+msgstr ""
+
+#: https//support.torproject.org/alternate-designs/block-websites/
+#: (content/alternate-designs/block-websites/contents+en.lrquestion.description)
+msgid ""
+"The second problem is that it would allow remote attackers to censor "
+"arbitrary sites."
+msgstr ""
+
+#: https//support.torproject.org/alternate-designs/block-websites/
+#: (content/alternate-designs/block-websites/contents+en.lrquestion.description)
+msgid ""
+"For example, if a Tor operator blocks www1.slashdot.org, and then some "
+"attacker poisons the Tor relay's DNS or otherwise changes that hostname to "
+"resolve to the IP address for a major news site, then suddenly that Tor "
+"relay is blocking the news site."
+msgstr ""
+
+#: https//support.torproject.org/alternate-designs/let-the-network-pick-the-path/
+#: (content/alternate-designs/let-the-network-pick-the-path/contents+en.lrquestion.title)
+msgid "You should let the network pick the path, not the client."
+msgstr ""
+
+#: https//support.torproject.org/alternate-designs/let-the-network-pick-the-path/
+#: (content/alternate-designs/let-the-network-pick-the-path/contents+en.lrquestion.description)
+msgid "No, you cannot trust the network to pick the path."
+msgstr ""
+
+#: https//support.torproject.org/alternate-designs/let-the-network-pick-the-path/
+#: (content/alternate-designs/let-the-network-pick-the-path/contents+en.lrquestion.description)
+msgid "Malicious relays could route you through their colluding friends."
+msgstr ""
+
+#: https//support.torproject.org/alternate-designs/let-the-network-pick-the-path/
+#: (content/alternate-designs/let-the-network-pick-the-path/contents+en.lrquestion.description)
+msgid ""
+"This would give an adversary the ability to watch all of your traffic end to"
+" end."
+msgstr ""
+
#: lego/templates/banner.html:3 lego/templates/banner.html:5
#: templates/banner.html:3 templates/banner.html:5
msgid "Close banner"
@@ -14598,8 +15637,8 @@ msgid "DONATE NOW"
msgstr "DONA AHORA"
#: lego/templates/footer.html:13 lego/templates/footer.html:22
-#: lego/templates/navbar.html:83 templates/footer.html:13
-#: templates/footer.html:22 templates/navbar.html:83
+#: lego/templates/navbar.html:95 templates/footer.html:13
+#: templates/footer.html:22 templates/navbar.html:95
msgid "Download Tor Browser"
msgstr "Bajarse el Navegador Tor"
diff --git a/contents+fa.po b/contents+fa.po
index 79b33b8c70..c057caea9f 100644
--- a/contents+fa.po
+++ b/contents+fa.po
@@ -22,7 +22,7 @@ msgid ""
msgstr ""
"Project-Id-Version: PACKAGE VERSION\n"
"Report-Msgid-Bugs-To: \n"
-"POT-Creation-Date: 2021-08-25 11:14+CET\n"
+"POT-Creation-Date: 2021-09-01 12:20+CET\n"
"PO-Revision-Date: 2018-10-02 22:41+0000\n"
"Last-Translator: Reza Ghasemi, 2021\n"
"Language-Team: Persian (https://www.transifex.com/otf/teams/1519/fa/)\n"
@@ -155,6 +155,11 @@ msgstr ""
msgid "Tor Metrics"
msgstr "Ù
عÛارâÙØ§Û ØªÙر"
+#: https//support.torproject.org/alternate-designs/
+#: (content/alternate-designs/contents+en.lrtopic.title)
+msgid "Alternate Designs We Don't Do (Yet)"
+msgstr ""
+
#: https//support.torproject.org/glossary/add-on-extension-or-plugin/
#: (content/glossary/add-on-extension-or-plugin/contents+en.lrword.term)
msgid "add-on, extension, or plugin"
@@ -2434,6 +2439,61 @@ msgstr ""
"Ø´Ù
ا Ù
ÛتÙاÙÛد اطÙاعات بÛØ´ØªØ±Û Ø¯Ø±Ø¨Ø§Ø±Ù ØªÙر + ÙÛ Ù¾Û Ø§Ù Ø¨Ø± [رÙÛ "
"ÙÛÚ©Û](https://trac.torproject.org/projects/tor/wiki/doc/TorPlusVPN) ببÛÙÛد."
+#: https//support.torproject.org/faq/relay-donations/
+#: (content/faq/relay-donations/contents+en.lrquestion.title)
+msgid "Can I donate for a relay rather than run my own?"
+msgstr ""
+
+#: https//support.torproject.org/faq/relay-donations/
+#: (content/faq/relay-donations/contents+en.lrquestion.description)
+msgid ""
+"Sure! We have a [list of organizations that run Tor "
+"relays](https://community.torproject.org/relay/community-resources/relay-"
+"associations/) that are happy to turn your donations into better speed and "
+"anonymity for the Tor network."
+msgstr ""
+
+#: https//support.torproject.org/faq/relay-donations/
+#: (content/faq/relay-donations/contents+en.lrquestion.description)
+msgid ""
+"These organizations are not the same as [The Tor Project, "
+"Inc](https://donate.torproject.org/), but we consider that a good thing."
+msgstr ""
+
+#: https//support.torproject.org/faq/relay-donations/
+#: (content/faq/relay-donations/contents+en.lrquestion.description)
+msgid "They're run by nice people who are part of the Tor community."
+msgstr "تÙسط اÙراد بسÛار Ø®ÙØ¨Û Ú©Ù Ø¨Ø®Ø´Û Ø§Ø² اÙجÙ
٠تÙر ÙستÙد گرداÙد٠Ù
Û Ø´Ùد."
+
+#: https//support.torproject.org/faq/relay-donations/
+#: (content/faq/relay-donations/contents+en.lrquestion.description)
+msgid ""
+"Note that there can be a tradeoff here between anonymity and performance."
+msgstr ""
+
+#: https//support.torproject.org/faq/relay-donations/
+#: (content/faq/relay-donations/contents+en.lrquestion.description)
+msgid ""
+"The Tor network's anonymity comes in part from diversity, so if you are in a"
+" position to run your own relay, you will be improving Tor's anonymity more "
+"than by donating."
+msgstr ""
+
+#: https//support.torproject.org/faq/relay-donations/
+#: (content/faq/relay-donations/contents+en.lrquestion.description)
+msgid ""
+"At the same time though, economies of scale for bandwidth mean that "
+"combining many small donations into several larger relays is more efficient "
+"at improving network performance."
+msgstr ""
+
+#: https//support.torproject.org/faq/relay-donations/
+#: (content/faq/relay-donations/contents+en.lrquestion.description)
+msgid ""
+"Improving anonymity and improving performance are both worthwhile goals, so "
+"however you can help is great!"
+msgstr ""
+
#: https//support.torproject.org/faq/staying-anonymous/
#: (content/faq/staying-anonymous/contents+en.lrquestion.title)
msgid "Am I totally anonymous if I use Tor?"
@@ -2798,6 +2858,61 @@ msgstr ""
"ÙÙرست Ù
Ø´Ú©Ùات کاÙ
Ù ÙÛØ³ØªØ Ù
ا ب٠کÙ
Ú© Ø´Ù
ا در [Ø´ÙاساÛÛ Ù Ù
ستÙدâØ³Ø§Ø²Û "
"Ù
Ø´Ú©Ùات](https://community.torproject.org/) ÙÛاز دارÛÙ
."
+#: https//support.torproject.org/about/attacks-on-onion-routing/
+#: (content/about/attacks-on-onion-routing/contents+en.lrquestion.title)
+msgid "What attacks remain against onion routing?"
+msgstr ""
+
+#: https//support.torproject.org/about/attacks-on-onion-routing/
+#: (content/about/attacks-on-onion-routing/contents+en.lrquestion.description)
+msgid ""
+"As mentioned above, it is possible for an observer who can view both you and"
+" either the destination website or your Tor exit node to correlate timings "
+"of your traffic as it enters the Tor network and also as it exits."
+msgstr ""
+
+#: https//support.torproject.org/about/attacks-on-onion-routing/
+#: (content/about/attacks-on-onion-routing/contents+en.lrquestion.description)
+msgid "Tor does not defend against such a threat model."
+msgstr ""
+
+#: https//support.torproject.org/about/attacks-on-onion-routing/
+#: (content/about/attacks-on-onion-routing/contents+en.lrquestion.description)
+msgid ""
+"In a more limited sense, note that if a censor or law enforcement agency has"
+" the ability to obtain specific observation of parts of the network, it is "
+"possible for them to verify a suspicion that you talk regularly to your "
+"friend by observing traffic at both ends and correlating the timing of only "
+"that traffic."
+msgstr ""
+
+#: https//support.torproject.org/about/attacks-on-onion-routing/
+#: (content/about/attacks-on-onion-routing/contents+en.lrquestion.description)
+msgid ""
+"Again, this is only useful to verify that parties already suspected of "
+"communicating with one another are doing so."
+msgstr ""
+
+#: https//support.torproject.org/about/attacks-on-onion-routing/
+#: (content/about/attacks-on-onion-routing/contents+en.lrquestion.description)
+msgid ""
+"In most countries, the suspicion required to obtain a warrant already "
+"carries more weight than timing correlation would provide."
+msgstr ""
+
+#: https//support.torproject.org/about/attacks-on-onion-routing/
+#: (content/about/attacks-on-onion-routing/contents+en.lrquestion.description)
+msgid ""
+"Furthermore, since Tor reuses circuits for multiple TCP connections, it is "
+"possible to associate non anonymous and anonymous traffic at a given exit "
+"node, so be careful about what applications you run concurrently over Tor."
+msgstr ""
+
+#: https//support.torproject.org/about/attacks-on-onion-routing/
+#: (content/about/attacks-on-onion-routing/contents+en.lrquestion.description)
+msgid "Perhaps even run separate Tor clients for these applications."
+msgstr ""
+
#: https//support.torproject.org/about/backdoor/
#: (content/about/backdoor/contents+en.lrquestion.title)
msgid "Is there a backdoor in Tor?"
@@ -2962,6 +3077,43 @@ msgstr ""
"استÙاد٠از تÙر ÙÙ
را٠ساÛر Ù
رÙرگر Ùا [خطرÙاک Ù
Û Ø¨Ø§Ø´Ø¯ ٠تÙصÛÙ ÙÙ
Û "
"Ø´Ùد](/tbb/tbb-9/)."
+#: https//support.torproject.org/about/change-paths/
+#: (content/about/change-paths/contents+en.lrquestion.title)
+msgid "How often does Tor change its paths?"
+msgstr ""
+
+#: https//support.torproject.org/about/change-paths/
+#: (content/about/change-paths/contents+en.lrquestion.description)
+msgid ""
+"Tor will reuse the same circuit for new TCP streams for 10 minutes, as long "
+"as the circuit is working fine."
+msgstr ""
+
+#: https//support.torproject.org/about/change-paths/
+#: (content/about/change-paths/contents+en.lrquestion.description)
+msgid "(If the circuit fails, Tor will switch to a new circuit immediately.)"
+msgstr ""
+
+#: https//support.torproject.org/about/change-paths/
+#: (content/about/change-paths/contents+en.lrquestion.description)
+msgid ""
+"But note that a single TCP stream (e.g. a long IRC connection) will stay on "
+"the same circuit forever."
+msgstr ""
+
+#: https//support.torproject.org/about/change-paths/
+#: (content/about/change-paths/contents+en.lrquestion.description)
+msgid "We don't rotate individual streams from one circuit to the next."
+msgstr ""
+
+#: https//support.torproject.org/about/change-paths/
+#: (content/about/change-paths/contents+en.lrquestion.description)
+msgid ""
+"Otherwise, an adversary with a partial view of the network would be given "
+"many chances over time to link you to your destination, rather than just one"
+" chance."
+msgstr ""
+
#: https//support.torproject.org/about/distribute-tor/
#: (content/about/distribute-tor/contents+en.lrquestion.title)
msgid "Can I distribute Tor?"
@@ -3078,6 +3230,133 @@ msgstr ""
"Ø¨Ø±Ø§Û Ø¬Ø²ÛÛات سÙاÙات Ù
تداÙÙ [عÙاÙ
ت ØªØ¬Ø§Ø±Û "
"Ù
ا](https://www.torproject.org/about/trademark/) را ببÛÙÛد."
+#: https//support.torproject.org/about/entry-guards/
+#: (content/about/entry-guards/contents+en.lrquestion.title)
+msgid "What are Entry Guards?"
+msgstr ""
+
+#: https//support.torproject.org/about/entry-guards/
+#: (content/about/entry-guards/contents+en.lrquestion.description)
+msgid ""
+"Tor (like all current practical low-latency anonymity designs) fails when "
+"the attacker can see both ends of the communications channel."
+msgstr ""
+
+#: https//support.torproject.org/about/entry-guards/
+#: (content/about/entry-guards/contents+en.lrquestion.description)
+msgid ""
+"For example, suppose the attacker controls or watches the Tor relay you "
+"choose to enter the network, and also controls or watches the website you "
+"visit."
+msgstr ""
+
+#: https//support.torproject.org/about/entry-guards/
+#: (content/about/entry-guards/contents+en.lrquestion.description)
+msgid ""
+"In this case, the research community knows no practical low-latency design "
+"that can reliably stop the attacker from correlating volume and timing "
+"information on the two sides."
+msgstr ""
+
+#: https//support.torproject.org/about/entry-guards/
+#: (content/about/entry-guards/contents+en.lrquestion.description)
+msgid "So, what should we do?"
+msgstr ""
+
+#: https//support.torproject.org/about/entry-guards/
+#: (content/about/entry-guards/contents+en.lrquestion.description)
+msgid "Suppose the attacker controls, or can observe, C relays."
+msgstr ""
+
+#: https//support.torproject.org/about/entry-guards/
+#: (content/about/entry-guards/contents+en.lrquestion.description)
+msgid "Suppose there are N relays total."
+msgstr ""
+
+#: https//support.torproject.org/about/entry-guards/
+#: (content/about/entry-guards/contents+en.lrquestion.description)
+msgid ""
+"If you select new entry and exit relays each time you use the network, the "
+"attacker will be able to correlate all traffic you send with probability "
+"around (c/n)2."
+msgstr ""
+
+#: https//support.torproject.org/about/entry-guards/
+#: (content/about/entry-guards/contents+en.lrquestion.description)
+msgid ""
+"But profiling is, for most users, as bad as being traced all the time: they "
+"want to do something often without an attacker noticing, and the attacker "
+"noticing once is as bad as the attacker noticing more often."
+msgstr ""
+
+#: https//support.torproject.org/about/entry-guards/
+#: (content/about/entry-guards/contents+en.lrquestion.description)
+msgid ""
+"Thus, choosing many random entries and exits gives the user no chance of "
+"escaping profiling by this kind of attacker."
+msgstr ""
+
+#: https//support.torproject.org/about/entry-guards/
+#: (content/about/entry-guards/contents+en.lrquestion.description)
+msgid ""
+"The solution is \"entry guards\": each Tor client selects a few relays at "
+"random to use as entry points, and uses only those relays for their first "
+"hop."
+msgstr ""
+
+#: https//support.torproject.org/about/entry-guards/
+#: (content/about/entry-guards/contents+en.lrquestion.description)
+msgid ""
+"If those relays are not controlled or observed, the attacker can't win, "
+"ever, and the user is secure."
+msgstr ""
+
+#: https//support.torproject.org/about/entry-guards/
+#: (content/about/entry-guards/contents+en.lrquestion.description)
+msgid ""
+"If those relays are observed or controlled by the attacker, the attacker "
+"sees a larger fraction of the user's traffic - but still the user is no more"
+" profiled than before."
+msgstr ""
+
+#: https//support.torproject.org/about/entry-guards/
+#: (content/about/entry-guards/contents+en.lrquestion.description)
+msgid ""
+"Thus, the user has some chance (on the order of (n-c)/n) of avoiding "
+"profiling, whereas they had none before."
+msgstr ""
+
+#: https//support.torproject.org/about/entry-guards/
+#: (content/about/entry-guards/contents+en.lrquestion.description)
+msgid ""
+"You can read more at [An Analysis of the Degradation of Anonymous "
+"Protocols](http://freehaven.net/anonbib/#wright02), [Defending Anonymous "
+"Communication Against Passive Logging "
+"Attacks](http://freehaven.net/anonbib/#wright03), and especially [Locating "
+"Hidden Servers](http://freehaven.net/anonbib/#hs-attack06)."
+msgstr ""
+
+#: https//support.torproject.org/about/entry-guards/
+#: (content/about/entry-guards/contents+en.lrquestion.description)
+msgid ""
+"Restricting your entry nodes may also help against attackers who want to run"
+" a few Tor nodes and easily enumerate all of the Tor user IP addresses."
+msgstr ""
+
+#: https//support.torproject.org/about/entry-guards/
+#: (content/about/entry-guards/contents+en.lrquestion.description)
+msgid ""
+"(Even though they can't learn what destinations the users are talking to, "
+"they still might be able to do bad things with just a list of users.)"
+msgstr ""
+
+#: https//support.torproject.org/about/entry-guards/
+#: (content/about/entry-guards/contents+en.lrquestion.description)
+msgid ""
+"However, that feature won't really become useful until we move to a "
+"\"directory guard\" design as well."
+msgstr ""
+
#: https//support.torproject.org/about/how-is-tor-different-from-other-proxies/
#: (content/about/how-is-tor-different-from-other-proxies/contents+en.lrquestion.title)
msgid "How is Tor different from other proxies?"
@@ -3280,6 +3559,162 @@ msgstr ""
"Ø¨Ø±Ø§Û ÙÙÙ
اÛÙÚ©Ù Tor Ù HTTPS ÚÚ¯ÙÙ٠با ÛکدÛگر تعاÙ
٠دارÙد اÛ٠تصÙÛر از [Tor Ù "
"HTTPS را ببÛÙÛد](/https/https-1/)."
+#: https//support.torproject.org/about/key-management/
+#: (content/about/key-management/contents+en.lrquestion.title)
+msgid "Tell me about all the keys Tor uses"
+msgstr ""
+
+#: https//support.torproject.org/about/key-management/
+#: (content/about/key-management/contents+en.lrquestion.description)
+msgid ""
+"Tor uses a variety of different keys, with three goals in mind: 1) "
+"encryption to ensure privacy of data within the Tor network, 2) "
+"authentication so clients know they're talking to the relays they meant to "
+"talk to, and 3) signatures to make sure all clients know the same set of "
+"relays."
+msgstr ""
+
+#: https//support.torproject.org/about/key-management/
+#: (content/about/key-management/contents+en.lrquestion.description)
+msgid ""
+"**Encryption**: first, all connections in Tor use TLS link encryption, so "
+"observers can't look inside to see which circuit a given cell is intended "
+"for."
+msgstr ""
+
+#: https//support.torproject.org/about/key-management/
+#: (content/about/key-management/contents+en.lrquestion.description)
+msgid ""
+"Further, the Tor client establishes an ephemeral encryption key with each "
+"relay in the circuit; these extra layers of encryption mean that only the "
+"exit relay can read the cells."
+msgstr ""
+
+#: https//support.torproject.org/about/key-management/
+#: (content/about/key-management/contents+en.lrquestion.description)
+msgid ""
+"Both sides discard the circuit key when the circuit ends, so logging traffic"
+" and then breaking into the relay to discover the key won't work."
+msgstr ""
+
+#: https//support.torproject.org/about/key-management/
+#: (content/about/key-management/contents+en.lrquestion.description)
+msgid ""
+"**Authentication**: Every Tor relay has a public decryption key called the "
+"\"onion key\"."
+msgstr ""
+
+#: https//support.torproject.org/about/key-management/
+#: (content/about/key-management/contents+en.lrquestion.description)
+msgid "Each relay rotates its onion key once a week."
+msgstr ""
+
+#: https//support.torproject.org/about/key-management/
+#: (content/about/key-management/contents+en.lrquestion.description)
+msgid ""
+"When the Tor client establishes circuits, at each step it [demands that the "
+"Tor relay prove knowledge of its onion key](https://svn-"
+"archive.torproject.org/svn/projects/design-paper/tor-"
+"design.html#subsec:circuits)."
+msgstr ""
+
+#: https//support.torproject.org/about/key-management/
+#: (content/about/key-management/contents+en.lrquestion.description)
+msgid ""
+"That way the first node in the path can't just spoof the rest of the path."
+msgstr ""
+
+#: https//support.torproject.org/about/key-management/
+#: (content/about/key-management/contents+en.lrquestion.description)
+msgid ""
+"Because the Tor client chooses the path, it can make sure to get Tor's "
+"\"distributed trust\" property: no single relay in the path can know about "
+"both the client and what the client is doing."
+msgstr ""
+
+#: https//support.torproject.org/about/key-management/
+#: (content/about/key-management/contents+en.lrquestion.description)
+msgid ""
+"**Coordination**: How do clients know what the relays are, and how do they "
+"know that they have the right keys for them?"
+msgstr ""
+
+#: https//support.torproject.org/about/key-management/
+#: (content/about/key-management/contents+en.lrquestion.description)
+msgid "Each relay has a long-term public signing key called the \"identity key\"."
+msgstr ""
+
+#: https//support.torproject.org/about/key-management/
+#: (content/about/key-management/contents+en.lrquestion.description)
+msgid "Each directory authority additionally has a \"directory signing key\"."
+msgstr ""
+
+#: https//support.torproject.org/about/key-management/
+#: (content/about/key-management/contents+en.lrquestion.description)
+msgid ""
+"The directory authorities [provide a signed "
+"list](https://gitweb.torproject.org/torspec.git/tree/dir-spec.txt) of all "
+"the known relays, and in that list are a set of certificates from each relay"
+" (self-signed by their identity key) specifying their keys, locations, exit "
+"policies, and so on."
+msgstr ""
+
+#: https//support.torproject.org/about/key-management/
+#: (content/about/key-management/contents+en.lrquestion.description)
+msgid ""
+"So unless the adversary can control a majority of the directory authorities "
+"(as of 2021 there are 10 directory authorities), they can't trick the Tor "
+"client into using other Tor relays."
+msgstr ""
+
+#: https//support.torproject.org/about/key-management/
+#: (content/about/key-management/contents+en.lrquestion.description)
+msgid "How do clients know what the directory authorities are?"
+msgstr ""
+
+#: https//support.torproject.org/about/key-management/
+#: (content/about/key-management/contents+en.lrquestion.description)
+msgid ""
+"The Tor software comes with a built-in list of location and public key for "
+"each directory authority."
+msgstr ""
+
+#: https//support.torproject.org/about/key-management/
+#: (content/about/key-management/contents+en.lrquestion.description)
+msgid ""
+"So the only way to trick users into using a fake Tor network is to give them"
+" a specially modified version of the software."
+msgstr ""
+
+#: https//support.torproject.org/about/key-management/
+#: (content/about/key-management/contents+en.lrquestion.description)
+msgid "How do users know they've got the right software?"
+msgstr ""
+
+#: https//support.torproject.org/about/key-management/
+#: (content/about/key-management/contents+en.lrquestion.description)
+msgid ""
+"When we distribute the source code or a package, we digitally sign it with "
+"[GNU Privacy Guard](http://www.gnupg.org/). See the [instructions on how to "
+"check Tor Browser's signature](https://support.torproject.org/tbb/how-to-"
+"verify-signature/)."
+msgstr ""
+
+#: https//support.torproject.org/about/key-management/
+#: (content/about/key-management/contents+en.lrquestion.description)
+msgid ""
+"In order to be certain that it's really signed by us, you need to have met "
+"us in person and gotten a copy of our GPG key fingerprint, or you need to "
+"know somebody who has."
+msgstr ""
+
+#: https//support.torproject.org/about/key-management/
+#: (content/about/key-management/contents+en.lrquestion.description)
+msgid ""
+"If you're concerned about an attack on this level, we recommend you get "
+"involved with the security community and start meeting people."
+msgstr ""
+
#: https//support.torproject.org/about/no-data-scrubbing/
#: (content/about/no-data-scrubbing/contents+en.lrquestion.title)
msgid ""
@@ -3319,6 +3754,151 @@ msgid ""
msgstr ""
"Ù
رÙرگر تÙر اÙ
ا ÙÙ
Û ØªÙاÙد Ú©Ø§Ø±Û Ø¯Ø±Ø¨Ø§Ø±Ù Ù
تÙÛ Ú©Ù Ùارد ÙرÙ
Ùا Ù
Û Ú©ÙÛد اÙجاÙ
دÙد."
+#: https//support.torproject.org/about/protections/
+#: (content/about/protections/contents+en.lrquestion.title)
+msgid "What protections does Tor provide?"
+msgstr ""
+
+#: https//support.torproject.org/about/protections/
+#: (content/about/protections/contents+en.lrquestion.description)
+msgid ""
+"Internet communication is based on a store-and-forward model that can be "
+"understood in analogy to postal mail: Data is transmitted in blocks called "
+"IP datagrams or packets."
+msgstr ""
+
+#: https//support.torproject.org/about/protections/
+#: (content/about/protections/contents+en.lrquestion.description)
+msgid ""
+"Every packet includes a source IP address (of the sender) and a destination "
+"IP address (of the receiver), just as ordinary letters contain postal "
+"addresses of sender and receiver."
+msgstr ""
+
+#: https//support.torproject.org/about/protections/
+#: (content/about/protections/contents+en.lrquestion.description)
+msgid ""
+"The way from sender to receiver involves multiple hops of routers, where "
+"each router inspects the destination IP address and forwards the packet "
+"closer to its destination."
+msgstr ""
+
+#: https//support.torproject.org/about/protections/
+#: (content/about/protections/contents+en.lrquestion.description)
+msgid ""
+"Thus, every router between sender and receiver learns that the sender is "
+"communicating with the receiver."
+msgstr ""
+
+#: https//support.torproject.org/about/protections/
+#: (content/about/protections/contents+en.lrquestion.description)
+msgid ""
+"In particular, your local ISP is in the position to build a complete profile"
+" of your Internet usage."
+msgstr ""
+
+#: https//support.torproject.org/about/protections/
+#: (content/about/protections/contents+en.lrquestion.description)
+msgid ""
+"In addition, every server in the Internet that can see any of the packets "
+"can profile your behavior."
+msgstr ""
+
+#: https//support.torproject.org/about/protections/
+#: (content/about/protections/contents+en.lrquestion.description)
+msgid ""
+"The aim of Tor is to improve your privacy by sending your traffic through a "
+"series of proxies."
+msgstr ""
+
+#: https//support.torproject.org/about/protections/
+#: (content/about/protections/contents+en.lrquestion.description)
+msgid ""
+"Your communication is encrypted in multiple layers and routed via multiple "
+"hops through the Tor network to the final receiver."
+msgstr ""
+
+#: https//support.torproject.org/about/protections/
+#: (content/about/protections/contents+en.lrquestion.description)
+msgid ""
+"More details on this process can be found in this "
+"[visualization](https://support.torproject.org/https/https-1/)."
+msgstr ""
+
+#: https//support.torproject.org/about/protections/
+#: (content/about/protections/contents+en.lrquestion.description)
+msgid ""
+"Note that all your local ISP can observe now is that you are communicating "
+"with Tor nodes."
+msgstr ""
+
+#: https//support.torproject.org/about/protections/
+#: (content/about/protections/contents+en.lrquestion.description)
+msgid ""
+"Similarly, servers in the Internet just see that they are being contacted by"
+" Tor nodes."
+msgstr ""
+
+#: https//support.torproject.org/about/protections/
+#: (content/about/protections/contents+en.lrquestion.description)
+msgid "Generally speaking, Tor aims to solve three privacy problems:"
+msgstr ""
+
+#: https//support.torproject.org/about/protections/
+#: (content/about/protections/contents+en.lrquestion.description)
+msgid ""
+"First, Tor prevents websites and other services from learning your location,"
+" which they can use to build databases about your habits and interests."
+msgstr ""
+
+#: https//support.torproject.org/about/protections/
+#: (content/about/protections/contents+en.lrquestion.description)
+msgid ""
+"With Tor, your Internet connections don't give you away by default -- now "
+"you can have the ability to choose, for each connection, how much "
+"information to reveal."
+msgstr ""
+
+#: https//support.torproject.org/about/protections/
+#: (content/about/protections/contents+en.lrquestion.description)
+msgid ""
+"Second, Tor prevents people watching your traffic locally (such as your ISP "
+"or someone with access to your home wifi or router) from learning what "
+"information you're fetching and where you're fetching it from."
+msgstr ""
+
+#: https//support.torproject.org/about/protections/
+#: (content/about/protections/contents+en.lrquestion.description)
+msgid ""
+"It also stops them from deciding what you're allowed to learn and publish --"
+" if you can get to any part of the Tor network, you can reach any site on "
+"the Internet."
+msgstr ""
+
+#: https//support.torproject.org/about/protections/
+#: (content/about/protections/contents+en.lrquestion.description)
+msgid ""
+"Third, Tor routes your connection through more than one Tor relay so no "
+"single relay can learn what you're up to."
+msgstr ""
+
+#: https//support.torproject.org/about/protections/
+#: (content/about/protections/contents+en.lrquestion.description)
+msgid ""
+"Because these relays are run by different individuals or organizations, "
+"distributing trust provides more security than the old [one hop "
+"proxy](https://support.torproject.org/about/#how-is-tor-different-from-"
+"other-proxies) approach."
+msgstr ""
+
+#: https//support.torproject.org/about/protections/
+#: (content/about/protections/contents+en.lrquestion.description)
+msgid ""
+"Note, however, that there are situations where Tor fails to solve these "
+"privacy problems entirely: see the entry below on [remaining "
+"attacks](https://support.torproject.org/about/#attacks-on-onion-routing)."
+msgstr ""
+
#: https//support.torproject.org/about/what-is-tor/
#: (content/about/what-is-tor/contents+en.lrquestion.title)
msgid "What is Tor?"
@@ -5895,16 +6475,12 @@ msgstr ""
#: (content/tbb/tbb-47/contents+en.lrquestion.description)
msgid ""
"Also, read up on the HTTPProxyAuthenticator and HTTPSProxyAuthenticator "
-"options if your proxy requires auth. We only support basic auth currently, "
-"but if you need NTLM authentication, you may find [this post in the "
-"archives](https://archives.seul.org/or/talk/Jun-2005/msg00223.html) useful."
+"options if your [proxy requires auth.](https://developer.mozilla.org/en-"
+"US/docs/Web/HTTP/Headers/Proxy-Authenticate) We only support basic auth "
+"currently, but if you need NTLM authentication, you may find [this post in "
+"the archives](https://archives.seul.org/or/talk/Jun-2005/msg00223.html) "
+"useful."
msgstr ""
-"ÙÙ
ÚÙÛ٠رÙÛ Ú¯Ø²ÛÙÙ ÙØ§Û HTTPProxyAuthenticator Ù HTTPSProxyAuthenticator ÙگاÙÛ "
-"داشت٠باشÛد اگر Ù¾Ø±Ø§Ú©Ø³Û Ø´Ù
ا ÙÛاز ب٠اØراز ÙÙÛت دارد. Ù
ا در اÛÙ ÙØظ٠ÙÙØ· از "
-"اØراز ÙÙÛت ساد٠پشتÛباÙÛ Ù
Û Ú©ÙÛÙ
اÙ
ا اگر ÙÛاز ب٠اØراز ÙÙÛت NTLM دارÛØ¯Ø Ù
Ù
Ú©Ù"
-" است [اÛ٠پست در آرشÛÙ "
-"Ùا](https://archives.seul.org/or/talk/Jun-2005/msg00223.html) ب٠کار Ø´Ù
ا "
-"بÛاÛد."
#: https//support.torproject.org/tbb/tbb-47/
#: (content/tbb/tbb-47/contents+en.lrquestion.description)
@@ -6179,6 +6755,219 @@ msgstr ""
"ب٠Ûاد داشت٠باشÛØ¯Ø ØªÙ
اÙ
خطÙØ· در torrc ک٠با `#` شرÙع Ù
Û Ø´ÙÙد ب٠عÙÙا٠کاÙ
Ùت"
" در Ùظر گرÙت٠Ù
Û Ø´ÙÙد Ù ÙÛÚ ØªØ§Ø«ÛØ±Û Ø±ÙÛ Ù¾ÛکربÙØ¯Û Tor ÙدارÙد."
+#: https//support.torproject.org/tbb/tbb-firewall-ports/
+#: (content/tbb/tbb-firewall-ports/contents+en.lrquestion.title)
+msgid "My firewall only allows a few outgoing ports"
+msgstr ""
+
+#: https//support.torproject.org/tbb/tbb-firewall-ports/
+#: (content/tbb/tbb-firewall-ports/contents+en.lrquestion.description)
+msgid ""
+"If your firewall works by blocking ports, then you can tell Tor to only use "
+"the ports when you start your Tor Browser."
+msgstr ""
+
+#: https//support.torproject.org/tbb/tbb-firewall-ports/
+#: (content/tbb/tbb-firewall-ports/contents+en.lrquestion.description)
+msgid ""
+"Or you can add the ports that your firewall permits by adding "
+"\"FascistFirewall 1\" to your torrc configuration file."
+msgstr ""
+
+#: https//support.torproject.org/tbb/tbb-firewall-ports/
+#: (content/tbb/tbb-firewall-ports/contents+en.lrquestion.description)
+msgid ""
+"By default, when you set this Tor assumes that your firewall allows only "
+"port 80 and port 443 (HTTP and HTTPS respectively)."
+msgstr ""
+
+#: https//support.torproject.org/tbb/tbb-firewall-ports/
+#: (content/tbb/tbb-firewall-ports/contents+en.lrquestion.description)
+msgid ""
+"You can select a different set of ports with the FirewallPorts torrc option."
+msgstr ""
+
+#: https//support.torproject.org/tbb/tbb-firewall-ports/
+#: (content/tbb/tbb-firewall-ports/contents+en.lrquestion.description)
+msgid ""
+"If you want to be more fine-grained with your controls, you can also use the"
+" ReachableAddresses config options, e.g.:"
+msgstr ""
+
+#: https//support.torproject.org/tbb/tbb-firewall-ports/
+#: (content/tbb/tbb-firewall-ports/contents+en.lrquestion.description)
+#: https//support.torproject.org/tbb/tbb-install-tor-central-server/
+#: (content/tbb/tbb-install-tor-central-server/contents+en.lrquestion.description)
+#: https//support.torproject.org/operators/default-exit-ports/
+#: (content/operators/default-exit-ports/contents+en.lrquestion.description)
+#: https//support.torproject.org/operators/hibernation/
+#: (content/operators/hibernation/contents+en.lrquestion.description)
+#: https//support.torproject.org/operators/limit-total-bandwidth/
+#: (content/operators/limit-total-bandwidth/contents+en.lrquestion.description)
+#: https//support.torproject.org/misc/bug-or-feedback/
+#: (content/misc/bug-or-feedback/contents+en.lrquestion.description)
+#: https//support.torproject.org/get-in-touch/why-i-cant-join-tor-channels/
+#: (content/get-in-touch/why-i-cant-join-tor-channels/contents+en.lrquestion.description)
+#: https//support.torproject.org/apt/tor-deb-repo/
+#: (content/apt/apt-1/contents+en.lrquestion.description)
+#: https//support.torproject.org/apt/apt-over-tor/
+#: (content/apt/apt-3/contents+en.lrquestion.description)
+msgid "```"
+msgstr "```"
+
+#: https//support.torproject.org/tbb/tbb-firewall-ports/
+#: (content/tbb/tbb-firewall-ports/contents+en.lrquestion.description)
+msgid "ReachableDirAddresses *:80"
+msgstr ""
+
+#: https//support.torproject.org/tbb/tbb-firewall-ports/
+#: (content/tbb/tbb-firewall-ports/contents+en.lrquestion.description)
+msgid "ReachableORAddresses *:443"
+msgstr ""
+
+#: https//support.torproject.org/tbb/tbb-install-tor-central-server/
+#: (content/tbb/tbb-install-tor-central-server/contents+en.lrquestion.title)
+msgid ""
+"Can I install Tor on a central server, and have my clients connect to it?"
+msgstr ""
+
+#: https//support.torproject.org/tbb/tbb-install-tor-central-server/
+#: (content/tbb/tbb-install-tor-central-server/contents+en.lrquestion.description)
+msgid ""
+"Yes. Tor can be configured as a client or a relay on another machine, and "
+"allow other machines to be able to connect to it for anonymity."
+msgstr ""
+
+#: https//support.torproject.org/tbb/tbb-install-tor-central-server/
+#: (content/tbb/tbb-install-tor-central-server/contents+en.lrquestion.description)
+msgid ""
+"This is most useful in an environment where many computers want a gateway of"
+" anonymity to the rest of the world."
+msgstr ""
+
+#: https//support.torproject.org/tbb/tbb-install-tor-central-server/
+#: (content/tbb/tbb-install-tor-central-server/contents+en.lrquestion.description)
+msgid ""
+"However, be forewarned that with this configuration, anyone within your "
+"private network (existing between you and the Tor client/relay) can see what"
+" traffic you are sending in clear text."
+msgstr ""
+
+#: https//support.torproject.org/tbb/tbb-install-tor-central-server/
+#: (content/tbb/tbb-install-tor-central-server/contents+en.lrquestion.description)
+msgid "The anonymity doesn't start until you get to the Tor relay."
+msgstr ""
+
+#: https//support.torproject.org/tbb/tbb-install-tor-central-server/
+#: (content/tbb/tbb-install-tor-central-server/contents+en.lrquestion.description)
+msgid ""
+"Because of this, if you are the controller of your domain and you know "
+"everything's locked down, you will be OK, but this configuration may not be "
+"suitable for large private networks where security is key all around."
+msgstr ""
+
+#: https//support.torproject.org/tbb/tbb-install-tor-central-server/
+#: (content/tbb/tbb-install-tor-central-server/contents+en.lrquestion.description)
+msgid ""
+"Configuration is simple, editing your torrc file's SocksListenAddress "
+"according to the following examples:"
+msgstr ""
+
+#: https//support.torproject.org/tbb/tbb-install-tor-central-server/
+#: (content/tbb/tbb-install-tor-central-server/contents+en.lrquestion.description)
+msgid "SocksListenAddress 127.0.0.1"
+msgstr ""
+
+#: https//support.torproject.org/tbb/tbb-install-tor-central-server/
+#: (content/tbb/tbb-install-tor-central-server/contents+en.lrquestion.description)
+msgid "SocksListenAddress 192.168.x.x:9100"
+msgstr ""
+
+#: https//support.torproject.org/tbb/tbb-install-tor-central-server/
+#: (content/tbb/tbb-install-tor-central-server/contents+en.lrquestion.description)
+msgid "SocksListenAddress 0.0.0.0:9100"
+msgstr ""
+
+#: https//support.torproject.org/tbb/tbb-install-tor-central-server/
+#: (content/tbb/tbb-install-tor-central-server/contents+en.lrquestion.description)
+msgid ""
+"You can state multiple listen addresses, in the case that you are part of "
+"several networks or subnets."
+msgstr ""
+
+#: https//support.torproject.org/tbb/tbb-install-tor-central-server/
+#: (content/tbb/tbb-install-tor-central-server/contents+en.lrquestion.description)
+msgid "SocksListenAddress 192.168.x.x:9100 #eth0"
+msgstr ""
+
+#: https//support.torproject.org/tbb/tbb-install-tor-central-server/
+#: (content/tbb/tbb-install-tor-central-server/contents+en.lrquestion.description)
+msgid "SocksListenAddress 10.x.x.x:9100 #eth1"
+msgstr ""
+
+#: https//support.torproject.org/tbb/tbb-install-tor-central-server/
+#: (content/tbb/tbb-install-tor-central-server/contents+en.lrquestion.description)
+msgid ""
+"After this, your clients on their respective networks/subnets would specify "
+"a socks proxy with the address and port you specified SocksListenAddress to "
+"be."
+msgstr ""
+
+#: https//support.torproject.org/tbb/tbb-install-tor-central-server/
+#: (content/tbb/tbb-install-tor-central-server/contents+en.lrquestion.description)
+msgid ""
+"Please note that the SocksPort configuration option gives the port ONLY for "
+"localhost (127.0.0.1)."
+msgstr ""
+
+#: https//support.torproject.org/tbb/tbb-install-tor-central-server/
+#: (content/tbb/tbb-install-tor-central-server/contents+en.lrquestion.description)
+msgid ""
+"When setting up your SocksListenAddress(es), you need to give the port with "
+"the address, as shown above."
+msgstr ""
+
+#: https//support.torproject.org/tbb/tbb-install-tor-central-server/
+#: (content/tbb/tbb-install-tor-central-server/contents+en.lrquestion.description)
+msgid ""
+"If you are interested in forcing all outgoing data through the central Tor "
+"client/relay, instead of the server only being an optional proxy, you may "
+"find the program iptables (for *nix) useful."
+msgstr ""
+
+#: https//support.torproject.org/tbb/tbb-run-client-different-computer/
+#: (content/tbb/tbb-run-client-different-computer/contents+en.lrquestion.title)
+msgid ""
+"I want to run my Tor client on a different computer than my applications"
+msgstr ""
+
+#: https//support.torproject.org/tbb/tbb-run-client-different-computer/
+#: (content/tbb/tbb-run-client-different-computer/contents+en.lrquestion.description)
+msgid ""
+"By default, your Tor client only listens for applications that connect from "
+"localhost."
+msgstr ""
+
+#: https//support.torproject.org/tbb/tbb-run-client-different-computer/
+#: (content/tbb/tbb-run-client-different-computer/contents+en.lrquestion.description)
+msgid "Connections from other computers are refused."
+msgstr ""
+
+#: https//support.torproject.org/tbb/tbb-run-client-different-computer/
+#: (content/tbb/tbb-run-client-different-computer/contents+en.lrquestion.description)
+msgid ""
+"If you want to torify applications on different computers than the Tor "
+"client, you should edit your torrc to define `SocksListenAddress 0.0.0.0` "
+"and then restart (or hup) Tor."
+msgstr ""
+
+#: https//support.torproject.org/tbb/tbb-run-client-different-computer/
+#: (content/tbb/tbb-run-client-different-computer/contents+en.lrquestion.description)
+msgid ""
+"If you want to get more advanced, you can configure your Tor client on a "
+"firewall to bind to your internal IP but not your external IP."
+msgstr ""
+
#: https//support.torproject.org/tbb/website-blocking-tor/
#: (content/tbb/website-blocking-tor/contents+en.lrquestion.title)
msgid "A website I am trying to reach is blocking access over Tor."
@@ -7859,6 +8648,130 @@ msgid ""
"guide."
msgstr ""
+#: https//support.torproject.org/operators/default-exit-ports/
+#: (content/operators/default-exit-ports/contents+en.lrquestion.title)
+msgid "Is there a list of default exit ports?"
+msgstr ""
+
+#: https//support.torproject.org/operators/default-exit-ports/
+#: (content/operators/default-exit-ports/contents+en.lrquestion.description)
+msgid ""
+"The default open ports are listed below but keep in mind that, any port or "
+"ports can be opened by the relay operator by configuring it in torrc or "
+"modifying the source code."
+msgstr ""
+
+#: https//support.torproject.org/operators/default-exit-ports/
+#: (content/operators/default-exit-ports/contents+en.lrquestion.description)
+msgid ""
+"The default according to src/or/policies.c ([line 85][1] and [line 1901][2])"
+" from the source code release [release-0.4.6][3]:"
+msgstr ""
+
+#: https//support.torproject.org/operators/default-exit-ports/
+#: (content/operators/default-exit-ports/contents+en.lrquestion.description)
+msgid "reject 0.0.0.0/8"
+msgstr ""
+
+#: https//support.torproject.org/operators/default-exit-ports/
+#: (content/operators/default-exit-ports/contents+en.lrquestion.description)
+msgid "reject 169.254.0.0/16"
+msgstr ""
+
+#: https//support.torproject.org/operators/default-exit-ports/
+#: (content/operators/default-exit-ports/contents+en.lrquestion.description)
+msgid "reject 127.0.0.0/8"
+msgstr ""
+
+#: https//support.torproject.org/operators/default-exit-ports/
+#: (content/operators/default-exit-ports/contents+en.lrquestion.description)
+msgid "reject 192.168.0.0/16"
+msgstr ""
+
+#: https//support.torproject.org/operators/default-exit-ports/
+#: (content/operators/default-exit-ports/contents+en.lrquestion.description)
+msgid "reject 10.0.0.0/8"
+msgstr ""
+
+#: https//support.torproject.org/operators/default-exit-ports/
+#: (content/operators/default-exit-ports/contents+en.lrquestion.description)
+msgid "reject 172.16.0.0/12"
+msgstr ""
+
+#: https//support.torproject.org/operators/default-exit-ports/
+#: (content/operators/default-exit-ports/contents+en.lrquestion.description)
+msgid "reject *:25"
+msgstr ""
+
+#: https//support.torproject.org/operators/default-exit-ports/
+#: (content/operators/default-exit-ports/contents+en.lrquestion.description)
+msgid "reject *:119"
+msgstr ""
+
+#: https//support.torproject.org/operators/default-exit-ports/
+#: (content/operators/default-exit-ports/contents+en.lrquestion.description)
+msgid "reject *:135-139"
+msgstr ""
+
+#: https//support.torproject.org/operators/default-exit-ports/
+#: (content/operators/default-exit-ports/contents+en.lrquestion.description)
+msgid "reject *:445"
+msgstr ""
+
+#: https//support.torproject.org/operators/default-exit-ports/
+#: (content/operators/default-exit-ports/contents+en.lrquestion.description)
+msgid "reject *:563"
+msgstr ""
+
+#: https//support.torproject.org/operators/default-exit-ports/
+#: (content/operators/default-exit-ports/contents+en.lrquestion.description)
+msgid "reject *:1214"
+msgstr ""
+
+#: https//support.torproject.org/operators/default-exit-ports/
+#: (content/operators/default-exit-ports/contents+en.lrquestion.description)
+msgid "reject *:4661-4666"
+msgstr ""
+
+#: https//support.torproject.org/operators/default-exit-ports/
+#: (content/operators/default-exit-ports/contents+en.lrquestion.description)
+msgid "reject *:6346-6429"
+msgstr ""
+
+#: https//support.torproject.org/operators/default-exit-ports/
+#: (content/operators/default-exit-ports/contents+en.lrquestion.description)
+msgid "reject *:6699"
+msgstr ""
+
+#: https//support.torproject.org/operators/default-exit-ports/
+#: (content/operators/default-exit-ports/contents+en.lrquestion.description)
+msgid "reject *:6881-6999"
+msgstr ""
+
+#: https//support.torproject.org/operators/default-exit-ports/
+#: (content/operators/default-exit-ports/contents+en.lrquestion.description)
+msgid "accept *:*"
+msgstr ""
+
+#: https//support.torproject.org/operators/default-exit-ports/
+#: (content/operators/default-exit-ports/contents+en.lrquestion.description)
+msgid ""
+"[1]: "
+"https://gitlab.torproject.org/tpo/core/tor/-/blob/release-0.4.6/src/core/or/policies.c#L85"
+msgstr ""
+
+#: https//support.torproject.org/operators/default-exit-ports/
+#: (content/operators/default-exit-ports/contents+en.lrquestion.description)
+msgid ""
+"[2]: "
+"https://gitlab.torproject.org/tpo/core/tor/-/blob/release-0.4.6/src/core/or/policies.c#L1901"
+msgstr ""
+
+#: https//support.torproject.org/operators/default-exit-ports/
+#: (content/operators/default-exit-ports/contents+en.lrquestion.description)
+msgid "[3]: https://gitlab.torproject.org/tpo/core/tor/-/tree/release-0.4.6/"
+msgstr ""
+
#: https//support.torproject.org/operators/dynamic-ip/
#: (content/operators/dynamic-ip/contents+en.lrquestion.title)
msgid "Can I run a Tor relay using a dynamic IP address?"
@@ -8053,21 +8966,6 @@ msgstr ""
"بÙابراÛÙ Ù
Ù
ک٠است زÙ
اÙÛ Ú©Ù Ú©Ù Tor ب٠خÙاب Ù
Û Ø±Ùد Ø´Ù
ا Ù
تÙج٠شÙÛد Ú©Ù Ùادر ب٠"
"گردش ÙÛستÛØ¯Ø Ø³ÛÚ¯Ùا٠اÛÙ ÙضعÛت از طرÛ٠اÛÙ ÙرÙØ¯Û Ø¯Ø± Ùاگ داد٠Ù
Û Ø´Ùد:"
-#: https//support.torproject.org/operators/hibernation/
-#: (content/operators/hibernation/contents+en.lrquestion.description)
-#: https//support.torproject.org/operators/limit-total-bandwidth/
-#: (content/operators/limit-total-bandwidth/contents+en.lrquestion.description)
-#: https//support.torproject.org/misc/bug-or-feedback/
-#: (content/misc/bug-or-feedback/contents+en.lrquestion.description)
-#: https//support.torproject.org/get-in-touch/why-i-cant-join-tor-channels/
-#: (content/get-in-touch/why-i-cant-join-tor-channels/contents+en.lrquestion.description)
-#: https//support.torproject.org/apt/tor-deb-repo/
-#: (content/apt/apt-1/contents+en.lrquestion.description)
-#: https//support.torproject.org/apt/apt-over-tor/
-#: (content/apt/apt-3/contents+en.lrquestion.description)
-msgid "```"
-msgstr "```"
-
#: https//support.torproject.org/operators/hibernation/
#: (content/operators/hibernation/contents+en.lrquestion.description)
msgid "Bandwidth soft limit reached; commencing hibernation."
@@ -10615,6 +11513,131 @@ msgstr "uid tor-security at lists.torproject.org"
msgid "sub 4096R/C00942E4 2017-03-13"
msgstr "sub 4096R/C00942E4 2017-03-13"
+#: https//support.torproject.org/misc/check-socks-dns-leaks/
+#: (content/misc/check-socks-dns-leaks/contents+en.lrquestion.title)
+msgid ""
+"How do I check if my application that uses SOCKS is leaking DNS requests?"
+msgstr ""
+
+#: https//support.torproject.org/misc/check-socks-dns-leaks/
+#: (content/misc/check-socks-dns-leaks/contents+en.lrquestion.description)
+msgid ""
+"Even if your application is using the correct variant of the SOCKS protocol,"
+" there is still a risk that it could be leaking DNS queries."
+msgstr ""
+
+#: https//support.torproject.org/misc/check-socks-dns-leaks/
+#: (content/misc/check-socks-dns-leaks/contents+en.lrquestion.description)
+msgid ""
+"This problem happens in Firefox extensions that resolve the destination "
+"hostname themselves, for example to show you its IP address, what country "
+"it's in, etc."
+msgstr ""
+
+#: https//support.torproject.org/misc/check-socks-dns-leaks/
+#: (content/misc/check-socks-dns-leaks/contents+en.lrquestion.description)
+msgid ""
+"If you suspect your application might behave like this, follow the "
+"instructions below to check."
+msgstr ""
+
+#: https//support.torproject.org/misc/check-socks-dns-leaks/
+#: (content/misc/check-socks-dns-leaks/contents+en.lrquestion.description)
+msgid ""
+"1. Add `TestSocks 1` to your [torrc file](https://support.torproject.org/tbb"
+"/tbb-editing-torrc/)."
+msgstr ""
+
+#: https//support.torproject.org/misc/check-socks-dns-leaks/
+#: (content/misc/check-socks-dns-leaks/contents+en.lrquestion.description)
+msgid ""
+"1. Start Tor, and point your program's SOCKS proxy settings to Tor's SOCKS5 "
+"server (`socks5://127.0.0.1:9050` by default)."
+msgstr ""
+
+#: https//support.torproject.org/misc/check-socks-dns-leaks/
+#: (content/misc/check-socks-dns-leaks/contents+en.lrquestion.description)
+msgid ""
+"1. Watch your logs as you use your application. For each socks connection, "
+"Tor will log a `notice` for safe connections, and a `warn` for connections "
+"leaking DNS requests."
+msgstr ""
+
+#: https//support.torproject.org/misc/check-socks-dns-leaks/
+#: (content/misc/check-socks-dns-leaks/contents+en.lrquestion.description)
+msgid ""
+"If you want to automatically disable all connections leaking DNS requests, "
+"set `SafeSocks 1` in your torrc file."
+msgstr ""
+
+#: https//support.torproject.org/misc/hide-exits/
+#: (content/misc/hide-exits/contents+en.lrquestion.title)
+msgid ""
+"You should hide the list of Tor relays, so people can't block the exits."
+msgstr ""
+
+#: https//support.torproject.org/misc/hide-exits/
+#: (content/misc/hide-exits/contents+en.lrquestion.description)
+msgid "There are a few reasons we don't:"
+msgstr ""
+
+#: https//support.torproject.org/misc/hide-exits/
+#: (content/misc/hide-exits/contents+en.lrquestion.description)
+msgid ""
+"1. We can't help but make the information available, since Tor clients need "
+"to use it to pick their paths."
+msgstr ""
+
+#: https//support.torproject.org/misc/hide-exits/
+#: (content/misc/hide-exits/contents+en.lrquestion.description)
+msgid "So if the \"blockers\" want it, they can get it anyway."
+msgstr ""
+
+#: https//support.torproject.org/misc/hide-exits/
+#: (content/misc/hide-exits/contents+en.lrquestion.description)
+msgid ""
+"Further, even if we didn't tell clients about the list of relays directly, "
+"somebody could still make a lot of connections through Tor to a test site "
+"and build a list of the addresses they see."
+msgstr ""
+
+#: https//support.torproject.org/misc/hide-exits/
+#: (content/misc/hide-exits/contents+en.lrquestion.description)
+msgid ""
+"1. If people want to block us, we believe that they should be allowed to do "
+"so."
+msgstr ""
+
+#: https//support.torproject.org/misc/hide-exits/
+#: (content/misc/hide-exits/contents+en.lrquestion.description)
+msgid ""
+"Obviously, we would prefer for everybody to allow Tor users to connect to "
+"them, but people have the right to decide who their services should allow "
+"connections from, and if they want to block anonymous users, they can."
+msgstr ""
+
+#: https//support.torproject.org/misc/hide-exits/
+#: (content/misc/hide-exits/contents+en.lrquestion.description)
+msgid ""
+"1. Being blockable also has tactical advantages: it may be a persuasive "
+"response to website maintainers who feel threatened by Tor."
+msgstr ""
+
+#: https//support.torproject.org/misc/hide-exits/
+#: (content/misc/hide-exits/contents+en.lrquestion.description)
+msgid ""
+"Giving them the option may inspire them to stop and think about whether they"
+" really want to eliminate private access to their system, and if not, what "
+"other options they might have."
+msgstr ""
+
+#: https//support.torproject.org/misc/hide-exits/
+#: (content/misc/hide-exits/contents+en.lrquestion.description)
+msgid ""
+"The time they might otherwise have spent blocking Tor, they may instead "
+"spend rethinking their overall approach to privacy and anonymity."
+msgstr ""
+
#: https//support.torproject.org/misc/menu/
#: (content/misc/menu/contents+en.lrquestion.description)
msgid "About"
@@ -11323,67 +12346,21 @@ msgstr "### ÚÚ¯ÙÙÙ ÙاÙ
Ù
ستعار Ø®Ùد را تاÛÛد Ú©ÙÛد"
#: https//support.torproject.org/get-in-touch/why-i-cant-join-tor-channels/
#: (content/get-in-touch/why-i-cant-join-tor-channels/contents+en.lrquestion.description)
msgid ""
-"Then, to complete the registration and ultimately gain access to the #tor-"
-"project channel, your nickname must be **verified**."
-msgstr ""
-"Ø³Ù¾Ø³Ø Ø¨Ø±Ø§Û ØªÚ©Ù
Û٠ثبت ÙاÙ
Ù Ø¯Ø³ØªØ±Ø³Û Ø¯Ø§Ø´ØªÙ Ø¨Ù Ú©Ø§Ùا٠tor-project#Ø ÙاÙ
Ù
ستعار Ø´Ù
ا"
-" باÛد **تاÛÛد شدÙ** باشد."
-
-#: https//support.torproject.org/get-in-touch/why-i-cant-join-tor-channels/
-#: (content/get-in-touch/why-i-cant-join-tor-channels/contents+en.lrquestion.description)
-msgid ""
-"1. To verify your nick, open a new browser window and go to "
-"https://webchat.oftc.net/?channels=tor."
-msgstr ""
-"1. Ø¨Ø±Ø§Û ØªØ§ÛÛد ÙاÙ
Ù
ستعار Ø®ÙØ¯Ø ÛÚ© Ù¾Ùجر٠Ù
رÙرگر جدÛد را باز Ú©ÙÛد ٠ب٠"
-"https://webchat.oftc.net/?channels=tor برÙÛد."
-
-#: https//support.torproject.org/get-in-touch/why-i-cant-join-tor-channels/
-#: (content/get-in-touch/why-i-cant-join-tor-channels/contents+en.lrquestion.description)
-msgid "2. Log in with your IRC nickname and password."
-msgstr "2. ÙاÙ
Ù
ستعار ٠گذرÙاÚÙ IRC Ø®Ùد را Ùارد Ú©ÙÛد."
-
-#: https//support.torproject.org/get-in-touch/why-i-cant-join-tor-channels/
-#: (content/get-in-touch/why-i-cant-join-tor-channels/contents+en.lrquestion.description)
-msgid ""
-"3. Look for the word **verify** and log in there. It may appear that nothing"
-" has happened. Look at the top of the page, and there will be a column "
-"called **Account**."
+"After registering your nickname, to gain access to the #tor-project and "
+"other protected channels, your nickname must be **verified**."
msgstr ""
-"3. ب٠دÙبا٠کÙÙ
Ù **تاÛÛد** بگردÛد Ù Ùارد Ø´ÙÛد. Ù
Ù
ک٠است ب٠Ùظر بÛاÛد Ú©Ù "
-"اتÙاÙÛ ÙÛاÙتد٠است. ب٠باÙØ§Û ØµØÙÙ Ùگا٠کÙÛØ¯Ø Ù ÛÚ© ستÙ٠ب٠ÙاÙ
**Øساب "
-"کاربرÛ** Ø®ÙاÙد بÙد."
-
-#: https//support.torproject.org/get-in-touch/why-i-cant-join-tor-channels/
-#: (content/get-in-touch/why-i-cant-join-tor-channels/contents+en.lrquestion.description)
-msgid "4. Click on **Account**."
-msgstr "4. رÙÛ **Øساب کاربرÛ** Ú©ÙÛÚ© Ú©ÙÛد."
#: https//support.torproject.org/get-in-touch/why-i-cant-join-tor-channels/
#: (content/get-in-touch/why-i-cant-join-tor-channels/contents+en.lrquestion.description)
msgid ""
-"5. Click on the small sentence at the bottom of the square that says: Verify"
-" account."
-msgstr ""
-"5. رÙÛ Ø¬Ù
ÙÙ Ú©Ùتا٠در پاÛÛÙ Ù
ربع Ú©Ù Ù
Û Ú¯ÙÛد: تاÛÛد Øساب Ú©Ø§Ø±Ø¨Ø±Û Ú©ÙÛÚ© Ú©ÙÛد."
-
-#: https//support.torproject.org/get-in-touch/why-i-cant-join-tor-channels/
-#: (content/get-in-touch/why-i-cant-join-tor-channels/contents+en.lrquestion.description)
-msgid "6. Fill out the Captcha that pops up, and click ok."
+"1. Go to https://services.oftc.net/ and follow the steps in the '*To verify "
+"your account*' section"
msgstr ""
#: https//support.torproject.org/get-in-touch/why-i-cant-join-tor-channels/
#: (content/get-in-touch/why-i-cant-join-tor-channels/contents+en.lrquestion.description)
-msgid ""
-"7. A tiny message will appear: \"Your NickServ account has been verified.\""
+msgid "2. Go back to the IRC webpage where you are logged in and type:"
msgstr ""
-"7. ÛÚ© Ù¾ÛاÙ
Ú©Ùتا٠پدÛدار Ø®ÙاÙد شد: \"Øساب Ú©Ø§Ø±Ø¨Ø±Û NickServ Ø´Ù
ا تاÛÛد شد٠"
-"است.\""
-
-#: https//support.torproject.org/get-in-touch/why-i-cant-join-tor-channels/
-#: (content/get-in-touch/why-i-cant-join-tor-channels/contents+en.lrquestion.description)
-msgid "8. Go back to the IRC webpage where you are logged in and type:"
-msgstr "8. ب٠صÙØÙ Ùب IRC Ú©Ù Ùارد شدÛد برگردÛد ٠بÙÙÛسÛد:"
#: https//support.torproject.org/get-in-touch/why-i-cant-join-tor-channels/
#: (content/get-in-touch/why-i-cant-join-tor-channels/contents+en.lrquestion.description)
@@ -11392,14 +12369,13 @@ msgstr "`/msg nickserv checkverify`"
#: https//support.torproject.org/get-in-touch/why-i-cant-join-tor-channels/
#: (content/get-in-touch/why-i-cant-join-tor-channels/contents+en.lrquestion.description)
-msgid "9. Click ENTER."
-msgstr "9. رÙÛ ÙرÙد Ú©ÙÛÚ© Ú©ÙÛد."
+msgid "3. Click ENTER."
+msgstr ""
#: https//support.torproject.org/get-in-touch/why-i-cant-join-tor-channels/
#: (content/get-in-touch/why-i-cant-join-tor-channels/contents+en.lrquestion.description)
-msgid "10. If all is well, you will receive a message that says:"
+msgid "4. If all is well, you will receive a message that says:"
msgstr ""
-"10. اگر ÙÙ
Ù ÚÛز Ø¨Ù Ø¯Ø±Ø³ØªÛ Ù¾ÛØ´ برÙØ¯Ø Ø´Ù
ا Ù¾ÛاÙ
Û Ø¯Ø±ÛاÙت Ø®ÙاÙÛد کرد Ú©Ù Ù
Û Ú¯ÙÛد:"
#: https//support.torproject.org/get-in-touch/why-i-cant-join-tor-channels/
#: (content/get-in-touch/why-i-cant-join-tor-channels/contents+en.lrquestion.description)
@@ -11551,21 +12527,23 @@ msgstr "# apt install apt-transport-https"
#: https//support.torproject.org/apt/tor-deb-repo/
#: (content/apt/apt-1/contents+en.lrquestion.description)
msgid ""
-"#### 2. Add the following entries to `/etc/apt/sources.list` or a new file "
-"in `/etc/apt/sources.list.d/`"
+"#### 2. Create a new file in `/etc/apt/sources.list.d/` named `tor.list`. "
+"Add the following entries:"
msgstr ""
-"#### 2. ÙرÙØ¯Û ÙØ§Û Ø²Ûر را ب٠`/etc/apt/sources.list` Ûا ÛÚ© ÙاÛ٠جدÛد در "
-"`/etc/apt/sources.list.d/` اضاÙÙ Ú©ÙÛد."
#: https//support.torproject.org/apt/tor-deb-repo/
#: (content/apt/apt-1/contents+en.lrquestion.description)
-msgid "deb https://deb.torproject.org/torproject.org <DISTRIBUTION> main"
+msgid ""
+"deb [signed-by=/usr/share/keyrings/tor-archive-keyring.gpg] "
+"https://deb.torproject.org/torproject.org <DISTRIBUTION> main"
msgstr ""
#: https//support.torproject.org/apt/tor-deb-repo/
#: (content/apt/apt-1/contents+en.lrquestion.description)
-msgid "deb-src https://deb.torproject.org/torproject.org <DISTRIBUTION> main"
-msgstr "deb-src https://deb.torproject.org/torproject.org <DISTRIBUTION> main"
+msgid ""
+"deb-src [signed-by=/usr/share/keyrings/tor-archive-keyring.gpg] "
+"https://deb.torproject.org/torproject.org <DISTRIBUTION> main"
+msgstr ""
#: https//support.torproject.org/apt/tor-deb-repo/
#: (content/apt/apt-1/contents+en.lrquestion.description)
@@ -11578,14 +12556,16 @@ msgstr ""
#: https//support.torproject.org/apt/tor-deb-repo/
#: (content/apt/apt-1/contents+en.lrquestion.description)
msgid ""
-"deb https://deb.torproject.org/torproject.org tor-"
+"deb [signed-by=/usr/share/keyrings/tor-archive-keyring.gpg] "
+"https://deb.torproject.org/torproject.org tor-"
"experimental-0.4.6.x-<DISTRIBUTION> main"
msgstr ""
#: https//support.torproject.org/apt/tor-deb-repo/
#: (content/apt/apt-1/contents+en.lrquestion.description)
msgid ""
-"deb-src https://deb.torproject.org/torproject.org tor-"
+"deb-src [signed-by=/usr/share/keyrings/tor-archive-keyring.gpg] "
+"https://deb.torproject.org/torproject.org tor-"
"experimental-0.4.6.x-<DISTRIBUTION> main"
msgstr ""
@@ -11597,18 +12577,18 @@ msgstr "Ûا ساخت ÙØ§Û Ø´Ø¨Ø§ÙÙ:"
#: https//support.torproject.org/apt/tor-deb-repo/
#: (content/apt/apt-1/contents+en.lrquestion.description)
msgid ""
-"deb https://deb.torproject.org/torproject.org tor-nightly-"
-"master-<DISTRIBUTION> main"
+"deb [signed-by=/usr/share/keyrings/tor-archive-keyring.gpg] "
+"https://deb.torproject.org/torproject.org tor-nightly-master-<DISTRIBUTION> "
+"main"
msgstr ""
#: https//support.torproject.org/apt/tor-deb-repo/
#: (content/apt/apt-1/contents+en.lrquestion.description)
msgid ""
-"deb-src https://deb.torproject.org/torproject.org tor-nightly-"
-"master-<DISTRIBUTION> main"
+"deb-src [signed-by=/usr/share/keyrings/tor-archive-keyring.gpg] "
+"https://deb.torproject.org/torproject.org tor-nightly-master-<DISTRIBUTION> "
+"main"
msgstr ""
-"deb-src https://deb.torproject.org/torproject.org tor-nightly-"
-"master-<DISTRIBUTION> main"
#: https//support.torproject.org/apt/tor-deb-repo/
#: (content/apt/apt-1/contents+en.lrquestion.description)
@@ -11630,13 +12610,15 @@ msgstr ""
#: https//support.torproject.org/apt/tor-deb-repo/
#: (content/apt/apt-1/contents+en.lrquestion.description)
msgid ""
-"deb [arch=amd64] https://deb.torproject.org/torproject.org focal main"
+"deb [arch=amd64 signed-by=/usr/share/keyrings/tor-archive-keyring.gpg] "
+"https://deb.torproject.org/torproject.org focal main"
msgstr ""
#: https//support.torproject.org/apt/tor-deb-repo/
#: (content/apt/apt-1/contents+en.lrquestion.description)
msgid ""
-"deb-src [arch=amd64] https://deb.torproject.org/torproject.org focal main"
+"deb-src [arch=amd64 signed-by=/usr/share/keyrings/tor-archive-keyring.gpg] "
+"https://deb.torproject.org/torproject.org focal main"
msgstr ""
#: https//support.torproject.org/apt/tor-deb-repo/
@@ -11656,28 +12638,17 @@ msgstr ""
#: (content/apt/apt-1/contents+en.lrquestion.description)
msgid ""
"#### 3. Then add the gpg key used to sign the packages by running the "
-"following commands at your command prompt"
+"following command at your command prompt:"
msgstr ""
-"#### 3. سپس Ú©ÙÛد gpg استÙاد٠شد٠را Ø¨Ø±Ø§Û Ø§Ù
Ø¶Ø§Û Ø¨Ø³ØªÙ Ùا با Ø§Ø¬Ø±Ø§Û ÙرÙ
ا٠ÙØ§Û "
-"زÛر در خط ÙرÙ
ا٠خÙد اجرا Ú©ÙÛد"
#: https//support.torproject.org/apt/tor-deb-repo/
#: (content/apt/apt-1/contents+en.lrquestion.description)
msgid ""
-"# wget -qO- "
+"# wget -O- "
"https://deb.torproject.org/torproject.org/A3C4F0F979CAA22CDBA8F512EE8CBC9E886DDD89.asc"
-" | gpg --import"
+" | gpg --dearmor | tee /usr/share/keyrings/tor-archive-keyring.gpg "
+">/dev/null"
msgstr ""
-"# wget -qO- "
-"https://deb.torproject.org/torproject.org/A3C4F0F979CAA22CDBA8F512EE8CBC9E886DDD89.asc"
-" | gpg --import"
-
-#: https//support.torproject.org/apt/tor-deb-repo/
-#: (content/apt/apt-1/contents+en.lrquestion.description)
-msgid ""
-"# gpg --export A3C4F0F979CAA22CDBA8F512EE8CBC9E886DDD89 | apt-key add -"
-msgstr ""
-"# gpg --export A3C4F0F979CAA22CDBA8F512EE8CBC9E886DDD89 | apt-key add -"
#: https//support.torproject.org/apt/tor-deb-repo/
#: (content/apt/apt-1/contents+en.lrquestion.description)
@@ -13634,6 +14605,82 @@ msgstr ""
"ÙÙØ ÚÙ٠آ٠کاربر ÙÙرست رÙÙâÙØ§Û Ø®Ùد را ب٠اÙØ¯Ø§Ø²Ù Ú©Ø§Ø±Ø¨Ø±Û Ú©Ù ÙشاÙÛ IP Ø®Ùد را در"
" Ø·Ù٠رÙز تغÛÛر ÙÙ
Û Ø¯Ùد برÙزâرساÙÛ Ù
ÛâÚ©Ùد."
+#: https//support.torproject.org/alternate-designs/block-websites/
+#: (content/alternate-designs/block-websites/contents+en.lrquestion.title)
+msgid "Exit policies should be able to block websites, not just IP addresses."
+msgstr ""
+
+#: https//support.torproject.org/alternate-designs/block-websites/
+#: (content/alternate-designs/block-websites/contents+en.lrquestion.description)
+msgid ""
+"It would be nice to let relay operators say things like `reject "
+"www.slashdot.org` in their exit policies, rather than requiring them to "
+"learn all the IP address space that could be covered by the site (and then "
+"also blocking other sites at those IP addresses)."
+msgstr ""
+
+#: https//support.torproject.org/alternate-designs/block-websites/
+#: (content/alternate-designs/block-websites/contents+en.lrquestion.description)
+msgid "There are two problems, though."
+msgstr ""
+
+#: https//support.torproject.org/alternate-designs/block-websites/
+#: (content/alternate-designs/block-websites/contents+en.lrquestion.description)
+msgid "First, users could still get around these blocks."
+msgstr ""
+
+#: https//support.torproject.org/alternate-designs/block-websites/
+#: (content/alternate-designs/block-websites/contents+en.lrquestion.description)
+msgid ""
+"For example, they could request the IP address rather than the hostname when"
+" they exit from the Tor network."
+msgstr ""
+
+#: https//support.torproject.org/alternate-designs/block-websites/
+#: (content/alternate-designs/block-websites/contents+en.lrquestion.description)
+msgid ""
+"This means operators would still need to learn all the IP addresses for the "
+"destinations in question."
+msgstr ""
+
+#: https//support.torproject.org/alternate-designs/block-websites/
+#: (content/alternate-designs/block-websites/contents+en.lrquestion.description)
+msgid ""
+"The second problem is that it would allow remote attackers to censor "
+"arbitrary sites."
+msgstr ""
+
+#: https//support.torproject.org/alternate-designs/block-websites/
+#: (content/alternate-designs/block-websites/contents+en.lrquestion.description)
+msgid ""
+"For example, if a Tor operator blocks www1.slashdot.org, and then some "
+"attacker poisons the Tor relay's DNS or otherwise changes that hostname to "
+"resolve to the IP address for a major news site, then suddenly that Tor "
+"relay is blocking the news site."
+msgstr ""
+
+#: https//support.torproject.org/alternate-designs/let-the-network-pick-the-path/
+#: (content/alternate-designs/let-the-network-pick-the-path/contents+en.lrquestion.title)
+msgid "You should let the network pick the path, not the client."
+msgstr ""
+
+#: https//support.torproject.org/alternate-designs/let-the-network-pick-the-path/
+#: (content/alternate-designs/let-the-network-pick-the-path/contents+en.lrquestion.description)
+msgid "No, you cannot trust the network to pick the path."
+msgstr ""
+
+#: https//support.torproject.org/alternate-designs/let-the-network-pick-the-path/
+#: (content/alternate-designs/let-the-network-pick-the-path/contents+en.lrquestion.description)
+msgid "Malicious relays could route you through their colluding friends."
+msgstr ""
+
+#: https//support.torproject.org/alternate-designs/let-the-network-pick-the-path/
+#: (content/alternate-designs/let-the-network-pick-the-path/contents+en.lrquestion.description)
+msgid ""
+"This would give an adversary the ability to watch all of your traffic end to"
+" end."
+msgstr ""
+
#: lego/templates/banner.html:3 lego/templates/banner.html:5
#: templates/banner.html:3 templates/banner.html:5
msgid "Close banner"
@@ -13666,8 +14713,8 @@ msgid "DONATE NOW"
msgstr "اکÙÙ٠اÙداء Ú©ÙÛد"
#: lego/templates/footer.html:13 lego/templates/footer.html:22
-#: lego/templates/navbar.html:83 templates/footer.html:13
-#: templates/footer.html:22 templates/navbar.html:83
+#: lego/templates/navbar.html:95 templates/footer.html:13
+#: templates/footer.html:22 templates/navbar.html:95
msgid "Download Tor Browser"
msgstr "بارگÛØ±Û Ù
رÙرگر تÙر"
diff --git a/contents+fr.po b/contents+fr.po
index 3cacabaffc..4b2dc5bea6 100644
--- a/contents+fr.po
+++ b/contents+fr.po
@@ -12,16 +12,16 @@
# Mehdi Djazzi <contact at mehdidjazzi.com>, 2020
# Emeric Vallespi <evallespi at protonmail.com>, 2021
# Emma Peel, 2021
-# AO <ao at localizationlab.org>, 2021
# Matburnx <matboury at gmail.com>, 2021
+# AO <ao at localizationlab.org>, 2021
#
msgid ""
msgstr ""
"Project-Id-Version: PACKAGE VERSION\n"
"Report-Msgid-Bugs-To: \n"
-"POT-Creation-Date: 2021-08-25 11:14+CET\n"
+"POT-Creation-Date: 2021-09-01 12:20+CET\n"
"PO-Revision-Date: 2018-10-02 22:41+0000\n"
-"Last-Translator: Matburnx <matboury at gmail.com>, 2021\n"
+"Last-Translator: AO <ao at localizationlab.org>, 2021\n"
"Language-Team: French (https://www.transifex.com/otf/teams/1519/fr/)\n"
"MIME-Version: 1.0\n"
"Content-Type: text/plain; charset=UTF-8\n"
@@ -152,6 +152,11 @@ msgstr "FAQ sur les abus"
msgid "Tor Metrics"
msgstr "mesures de Tor"
+#: https//support.torproject.org/alternate-designs/
+#: (content/alternate-designs/contents+en.lrtopic.title)
+msgid "Alternate Designs We Don't Do (Yet)"
+msgstr ""
+
#: https//support.torproject.org/glossary/add-on-extension-or-plugin/
#: (content/glossary/add-on-extension-or-plugin/contents+en.lrword.term)
msgid "add-on, extension, or plugin"
@@ -2570,6 +2575,63 @@ msgstr ""
"[wiki](https://trac.torproject.org/projects/tor/wiki/doc/TorPlusVPN) (page "
"en anglais)."
+#: https//support.torproject.org/faq/relay-donations/
+#: (content/faq/relay-donations/contents+en.lrquestion.title)
+msgid "Can I donate for a relay rather than run my own?"
+msgstr ""
+
+#: https//support.torproject.org/faq/relay-donations/
+#: (content/faq/relay-donations/contents+en.lrquestion.description)
+msgid ""
+"Sure! We have a [list of organizations that run Tor "
+"relays](https://community.torproject.org/relay/community-resources/relay-"
+"associations/) that are happy to turn your donations into better speed and "
+"anonymity for the Tor network."
+msgstr ""
+
+#: https//support.torproject.org/faq/relay-donations/
+#: (content/faq/relay-donations/contents+en.lrquestion.description)
+msgid ""
+"These organizations are not the same as [The Tor Project, "
+"Inc](https://donate.torproject.org/), but we consider that a good thing."
+msgstr ""
+
+#: https//support.torproject.org/faq/relay-donations/
+#: (content/faq/relay-donations/contents+en.lrquestion.description)
+msgid "They're run by nice people who are part of the Tor community."
+msgstr ""
+"Ils sont administrés par des gens sympathiques qui font partie de la "
+"communauté Tor."
+
+#: https//support.torproject.org/faq/relay-donations/
+#: (content/faq/relay-donations/contents+en.lrquestion.description)
+msgid ""
+"Note that there can be a tradeoff here between anonymity and performance."
+msgstr ""
+
+#: https//support.torproject.org/faq/relay-donations/
+#: (content/faq/relay-donations/contents+en.lrquestion.description)
+msgid ""
+"The Tor network's anonymity comes in part from diversity, so if you are in a"
+" position to run your own relay, you will be improving Tor's anonymity more "
+"than by donating."
+msgstr ""
+
+#: https//support.torproject.org/faq/relay-donations/
+#: (content/faq/relay-donations/contents+en.lrquestion.description)
+msgid ""
+"At the same time though, economies of scale for bandwidth mean that "
+"combining many small donations into several larger relays is more efficient "
+"at improving network performance."
+msgstr ""
+
+#: https//support.torproject.org/faq/relay-donations/
+#: (content/faq/relay-donations/contents+en.lrquestion.description)
+msgid ""
+"Improving anonymity and improving performance are both worthwhile goals, so "
+"however you can help is great!"
+msgstr ""
+
#: https//support.torproject.org/faq/staying-anonymous/
#: (content/faq/staying-anonymous/contents+en.lrquestion.title)
msgid "Am I totally anonymous if I use Tor?"
@@ -2955,6 +3017,61 @@ msgstr ""
" [pour identifier et documenter tous les "
"problèmes](https://community.torproject.org/)."
+#: https//support.torproject.org/about/attacks-on-onion-routing/
+#: (content/about/attacks-on-onion-routing/contents+en.lrquestion.title)
+msgid "What attacks remain against onion routing?"
+msgstr ""
+
+#: https//support.torproject.org/about/attacks-on-onion-routing/
+#: (content/about/attacks-on-onion-routing/contents+en.lrquestion.description)
+msgid ""
+"As mentioned above, it is possible for an observer who can view both you and"
+" either the destination website or your Tor exit node to correlate timings "
+"of your traffic as it enters the Tor network and also as it exits."
+msgstr ""
+
+#: https//support.torproject.org/about/attacks-on-onion-routing/
+#: (content/about/attacks-on-onion-routing/contents+en.lrquestion.description)
+msgid "Tor does not defend against such a threat model."
+msgstr ""
+
+#: https//support.torproject.org/about/attacks-on-onion-routing/
+#: (content/about/attacks-on-onion-routing/contents+en.lrquestion.description)
+msgid ""
+"In a more limited sense, note that if a censor or law enforcement agency has"
+" the ability to obtain specific observation of parts of the network, it is "
+"possible for them to verify a suspicion that you talk regularly to your "
+"friend by observing traffic at both ends and correlating the timing of only "
+"that traffic."
+msgstr ""
+
+#: https//support.torproject.org/about/attacks-on-onion-routing/
+#: (content/about/attacks-on-onion-routing/contents+en.lrquestion.description)
+msgid ""
+"Again, this is only useful to verify that parties already suspected of "
+"communicating with one another are doing so."
+msgstr ""
+
+#: https//support.torproject.org/about/attacks-on-onion-routing/
+#: (content/about/attacks-on-onion-routing/contents+en.lrquestion.description)
+msgid ""
+"In most countries, the suspicion required to obtain a warrant already "
+"carries more weight than timing correlation would provide."
+msgstr ""
+
+#: https//support.torproject.org/about/attacks-on-onion-routing/
+#: (content/about/attacks-on-onion-routing/contents+en.lrquestion.description)
+msgid ""
+"Furthermore, since Tor reuses circuits for multiple TCP connections, it is "
+"possible to associate non anonymous and anonymous traffic at a given exit "
+"node, so be careful about what applications you run concurrently over Tor."
+msgstr ""
+
+#: https//support.torproject.org/about/attacks-on-onion-routing/
+#: (content/about/attacks-on-onion-routing/contents+en.lrquestion.description)
+msgid "Perhaps even run separate Tor clients for these applications."
+msgstr ""
+
#: https//support.torproject.org/about/backdoor/
#: (content/about/backdoor/contents+en.lrquestion.title)
msgid "Is there a backdoor in Tor?"
@@ -3129,6 +3246,43 @@ msgstr ""
"Il est [dangereux et non recommandé](/fr/tbb/tbb-9/) dâutiliser Tor avec "
"dâautres navigateurs."
+#: https//support.torproject.org/about/change-paths/
+#: (content/about/change-paths/contents+en.lrquestion.title)
+msgid "How often does Tor change its paths?"
+msgstr ""
+
+#: https//support.torproject.org/about/change-paths/
+#: (content/about/change-paths/contents+en.lrquestion.description)
+msgid ""
+"Tor will reuse the same circuit for new TCP streams for 10 minutes, as long "
+"as the circuit is working fine."
+msgstr ""
+
+#: https//support.torproject.org/about/change-paths/
+#: (content/about/change-paths/contents+en.lrquestion.description)
+msgid "(If the circuit fails, Tor will switch to a new circuit immediately.)"
+msgstr ""
+
+#: https//support.torproject.org/about/change-paths/
+#: (content/about/change-paths/contents+en.lrquestion.description)
+msgid ""
+"But note that a single TCP stream (e.g. a long IRC connection) will stay on "
+"the same circuit forever."
+msgstr ""
+
+#: https//support.torproject.org/about/change-paths/
+#: (content/about/change-paths/contents+en.lrquestion.description)
+msgid "We don't rotate individual streams from one circuit to the next."
+msgstr ""
+
+#: https//support.torproject.org/about/change-paths/
+#: (content/about/change-paths/contents+en.lrquestion.description)
+msgid ""
+"Otherwise, an adversary with a partial view of the network would be given "
+"many chances over time to link you to your destination, rather than just one"
+" chance."
+msgstr ""
+
#: https//support.torproject.org/about/distribute-tor/
#: (content/about/distribute-tor/contents+en.lrquestion.title)
msgid "Can I distribute Tor?"
@@ -3250,6 +3404,133 @@ msgstr ""
"Voir notre [FAQ sur les marques de "
"commerce](https://www.torproject.org/about/trademark/) pour plus de détails."
+#: https//support.torproject.org/about/entry-guards/
+#: (content/about/entry-guards/contents+en.lrquestion.title)
+msgid "What are Entry Guards?"
+msgstr ""
+
+#: https//support.torproject.org/about/entry-guards/
+#: (content/about/entry-guards/contents+en.lrquestion.description)
+msgid ""
+"Tor (like all current practical low-latency anonymity designs) fails when "
+"the attacker can see both ends of the communications channel."
+msgstr ""
+
+#: https//support.torproject.org/about/entry-guards/
+#: (content/about/entry-guards/contents+en.lrquestion.description)
+msgid ""
+"For example, suppose the attacker controls or watches the Tor relay you "
+"choose to enter the network, and also controls or watches the website you "
+"visit."
+msgstr ""
+
+#: https//support.torproject.org/about/entry-guards/
+#: (content/about/entry-guards/contents+en.lrquestion.description)
+msgid ""
+"In this case, the research community knows no practical low-latency design "
+"that can reliably stop the attacker from correlating volume and timing "
+"information on the two sides."
+msgstr ""
+
+#: https//support.torproject.org/about/entry-guards/
+#: (content/about/entry-guards/contents+en.lrquestion.description)
+msgid "So, what should we do?"
+msgstr ""
+
+#: https//support.torproject.org/about/entry-guards/
+#: (content/about/entry-guards/contents+en.lrquestion.description)
+msgid "Suppose the attacker controls, or can observe, C relays."
+msgstr ""
+
+#: https//support.torproject.org/about/entry-guards/
+#: (content/about/entry-guards/contents+en.lrquestion.description)
+msgid "Suppose there are N relays total."
+msgstr ""
+
+#: https//support.torproject.org/about/entry-guards/
+#: (content/about/entry-guards/contents+en.lrquestion.description)
+msgid ""
+"If you select new entry and exit relays each time you use the network, the "
+"attacker will be able to correlate all traffic you send with probability "
+"around (c/n)2."
+msgstr ""
+
+#: https//support.torproject.org/about/entry-guards/
+#: (content/about/entry-guards/contents+en.lrquestion.description)
+msgid ""
+"But profiling is, for most users, as bad as being traced all the time: they "
+"want to do something often without an attacker noticing, and the attacker "
+"noticing once is as bad as the attacker noticing more often."
+msgstr ""
+
+#: https//support.torproject.org/about/entry-guards/
+#: (content/about/entry-guards/contents+en.lrquestion.description)
+msgid ""
+"Thus, choosing many random entries and exits gives the user no chance of "
+"escaping profiling by this kind of attacker."
+msgstr ""
+
+#: https//support.torproject.org/about/entry-guards/
+#: (content/about/entry-guards/contents+en.lrquestion.description)
+msgid ""
+"The solution is \"entry guards\": each Tor client selects a few relays at "
+"random to use as entry points, and uses only those relays for their first "
+"hop."
+msgstr ""
+
+#: https//support.torproject.org/about/entry-guards/
+#: (content/about/entry-guards/contents+en.lrquestion.description)
+msgid ""
+"If those relays are not controlled or observed, the attacker can't win, "
+"ever, and the user is secure."
+msgstr ""
+
+#: https//support.torproject.org/about/entry-guards/
+#: (content/about/entry-guards/contents+en.lrquestion.description)
+msgid ""
+"If those relays are observed or controlled by the attacker, the attacker "
+"sees a larger fraction of the user's traffic - but still the user is no more"
+" profiled than before."
+msgstr ""
+
+#: https//support.torproject.org/about/entry-guards/
+#: (content/about/entry-guards/contents+en.lrquestion.description)
+msgid ""
+"Thus, the user has some chance (on the order of (n-c)/n) of avoiding "
+"profiling, whereas they had none before."
+msgstr ""
+
+#: https//support.torproject.org/about/entry-guards/
+#: (content/about/entry-guards/contents+en.lrquestion.description)
+msgid ""
+"You can read more at [An Analysis of the Degradation of Anonymous "
+"Protocols](http://freehaven.net/anonbib/#wright02), [Defending Anonymous "
+"Communication Against Passive Logging "
+"Attacks](http://freehaven.net/anonbib/#wright03), and especially [Locating "
+"Hidden Servers](http://freehaven.net/anonbib/#hs-attack06)."
+msgstr ""
+
+#: https//support.torproject.org/about/entry-guards/
+#: (content/about/entry-guards/contents+en.lrquestion.description)
+msgid ""
+"Restricting your entry nodes may also help against attackers who want to run"
+" a few Tor nodes and easily enumerate all of the Tor user IP addresses."
+msgstr ""
+
+#: https//support.torproject.org/about/entry-guards/
+#: (content/about/entry-guards/contents+en.lrquestion.description)
+msgid ""
+"(Even though they can't learn what destinations the users are talking to, "
+"they still might be able to do bad things with just a list of users.)"
+msgstr ""
+
+#: https//support.torproject.org/about/entry-guards/
+#: (content/about/entry-guards/contents+en.lrquestion.description)
+msgid ""
+"However, that feature won't really become useful until we move to a "
+"\"directory guard\" design as well."
+msgstr ""
+
#: https//support.torproject.org/about/how-is-tor-different-from-other-proxies/
#: (content/about/how-is-tor-different-from-other-proxies/contents+en.lrquestion.title)
msgid "How is Tor different from other proxies?"
@@ -3460,6 +3741,162 @@ msgstr ""
"Voir cette visualisation de [Tor et HTTPS](/https/https-1/) pour comprendre "
"comment Tor et HTTPS interagissent."
+#: https//support.torproject.org/about/key-management/
+#: (content/about/key-management/contents+en.lrquestion.title)
+msgid "Tell me about all the keys Tor uses"
+msgstr ""
+
+#: https//support.torproject.org/about/key-management/
+#: (content/about/key-management/contents+en.lrquestion.description)
+msgid ""
+"Tor uses a variety of different keys, with three goals in mind: 1) "
+"encryption to ensure privacy of data within the Tor network, 2) "
+"authentication so clients know they're talking to the relays they meant to "
+"talk to, and 3) signatures to make sure all clients know the same set of "
+"relays."
+msgstr ""
+
+#: https//support.torproject.org/about/key-management/
+#: (content/about/key-management/contents+en.lrquestion.description)
+msgid ""
+"**Encryption**: first, all connections in Tor use TLS link encryption, so "
+"observers can't look inside to see which circuit a given cell is intended "
+"for."
+msgstr ""
+
+#: https//support.torproject.org/about/key-management/
+#: (content/about/key-management/contents+en.lrquestion.description)
+msgid ""
+"Further, the Tor client establishes an ephemeral encryption key with each "
+"relay in the circuit; these extra layers of encryption mean that only the "
+"exit relay can read the cells."
+msgstr ""
+
+#: https//support.torproject.org/about/key-management/
+#: (content/about/key-management/contents+en.lrquestion.description)
+msgid ""
+"Both sides discard the circuit key when the circuit ends, so logging traffic"
+" and then breaking into the relay to discover the key won't work."
+msgstr ""
+
+#: https//support.torproject.org/about/key-management/
+#: (content/about/key-management/contents+en.lrquestion.description)
+msgid ""
+"**Authentication**: Every Tor relay has a public decryption key called the "
+"\"onion key\"."
+msgstr ""
+
+#: https//support.torproject.org/about/key-management/
+#: (content/about/key-management/contents+en.lrquestion.description)
+msgid "Each relay rotates its onion key once a week."
+msgstr ""
+
+#: https//support.torproject.org/about/key-management/
+#: (content/about/key-management/contents+en.lrquestion.description)
+msgid ""
+"When the Tor client establishes circuits, at each step it [demands that the "
+"Tor relay prove knowledge of its onion key](https://svn-"
+"archive.torproject.org/svn/projects/design-paper/tor-"
+"design.html#subsec:circuits)."
+msgstr ""
+
+#: https//support.torproject.org/about/key-management/
+#: (content/about/key-management/contents+en.lrquestion.description)
+msgid ""
+"That way the first node in the path can't just spoof the rest of the path."
+msgstr ""
+
+#: https//support.torproject.org/about/key-management/
+#: (content/about/key-management/contents+en.lrquestion.description)
+msgid ""
+"Because the Tor client chooses the path, it can make sure to get Tor's "
+"\"distributed trust\" property: no single relay in the path can know about "
+"both the client and what the client is doing."
+msgstr ""
+
+#: https//support.torproject.org/about/key-management/
+#: (content/about/key-management/contents+en.lrquestion.description)
+msgid ""
+"**Coordination**: How do clients know what the relays are, and how do they "
+"know that they have the right keys for them?"
+msgstr ""
+
+#: https//support.torproject.org/about/key-management/
+#: (content/about/key-management/contents+en.lrquestion.description)
+msgid "Each relay has a long-term public signing key called the \"identity key\"."
+msgstr ""
+
+#: https//support.torproject.org/about/key-management/
+#: (content/about/key-management/contents+en.lrquestion.description)
+msgid "Each directory authority additionally has a \"directory signing key\"."
+msgstr ""
+
+#: https//support.torproject.org/about/key-management/
+#: (content/about/key-management/contents+en.lrquestion.description)
+msgid ""
+"The directory authorities [provide a signed "
+"list](https://gitweb.torproject.org/torspec.git/tree/dir-spec.txt) of all "
+"the known relays, and in that list are a set of certificates from each relay"
+" (self-signed by their identity key) specifying their keys, locations, exit "
+"policies, and so on."
+msgstr ""
+
+#: https//support.torproject.org/about/key-management/
+#: (content/about/key-management/contents+en.lrquestion.description)
+msgid ""
+"So unless the adversary can control a majority of the directory authorities "
+"(as of 2021 there are 10 directory authorities), they can't trick the Tor "
+"client into using other Tor relays."
+msgstr ""
+
+#: https//support.torproject.org/about/key-management/
+#: (content/about/key-management/contents+en.lrquestion.description)
+msgid "How do clients know what the directory authorities are?"
+msgstr ""
+
+#: https//support.torproject.org/about/key-management/
+#: (content/about/key-management/contents+en.lrquestion.description)
+msgid ""
+"The Tor software comes with a built-in list of location and public key for "
+"each directory authority."
+msgstr ""
+
+#: https//support.torproject.org/about/key-management/
+#: (content/about/key-management/contents+en.lrquestion.description)
+msgid ""
+"So the only way to trick users into using a fake Tor network is to give them"
+" a specially modified version of the software."
+msgstr ""
+
+#: https//support.torproject.org/about/key-management/
+#: (content/about/key-management/contents+en.lrquestion.description)
+msgid "How do users know they've got the right software?"
+msgstr ""
+
+#: https//support.torproject.org/about/key-management/
+#: (content/about/key-management/contents+en.lrquestion.description)
+msgid ""
+"When we distribute the source code or a package, we digitally sign it with "
+"[GNU Privacy Guard](http://www.gnupg.org/). See the [instructions on how to "
+"check Tor Browser's signature](https://support.torproject.org/tbb/how-to-"
+"verify-signature/)."
+msgstr ""
+
+#: https//support.torproject.org/about/key-management/
+#: (content/about/key-management/contents+en.lrquestion.description)
+msgid ""
+"In order to be certain that it's really signed by us, you need to have met "
+"us in person and gotten a copy of our GPG key fingerprint, or you need to "
+"know somebody who has."
+msgstr ""
+
+#: https//support.torproject.org/about/key-management/
+#: (content/about/key-management/contents+en.lrquestion.description)
+msgid ""
+"If you're concerned about an attack on this level, we recommend you get "
+"involved with the security community and start meeting people."
+msgstr ""
+
#: https//support.torproject.org/about/no-data-scrubbing/
#: (content/about/no-data-scrubbing/contents+en.lrquestion.title)
msgid ""
@@ -3501,6 +3938,151 @@ msgstr ""
"Cependant, le Navigateur Tor ne peut rien faire pour le texte que vous tapez"
" dans les formulaires."
+#: https//support.torproject.org/about/protections/
+#: (content/about/protections/contents+en.lrquestion.title)
+msgid "What protections does Tor provide?"
+msgstr ""
+
+#: https//support.torproject.org/about/protections/
+#: (content/about/protections/contents+en.lrquestion.description)
+msgid ""
+"Internet communication is based on a store-and-forward model that can be "
+"understood in analogy to postal mail: Data is transmitted in blocks called "
+"IP datagrams or packets."
+msgstr ""
+
+#: https//support.torproject.org/about/protections/
+#: (content/about/protections/contents+en.lrquestion.description)
+msgid ""
+"Every packet includes a source IP address (of the sender) and a destination "
+"IP address (of the receiver), just as ordinary letters contain postal "
+"addresses of sender and receiver."
+msgstr ""
+
+#: https//support.torproject.org/about/protections/
+#: (content/about/protections/contents+en.lrquestion.description)
+msgid ""
+"The way from sender to receiver involves multiple hops of routers, where "
+"each router inspects the destination IP address and forwards the packet "
+"closer to its destination."
+msgstr ""
+
+#: https//support.torproject.org/about/protections/
+#: (content/about/protections/contents+en.lrquestion.description)
+msgid ""
+"Thus, every router between sender and receiver learns that the sender is "
+"communicating with the receiver."
+msgstr ""
+
+#: https//support.torproject.org/about/protections/
+#: (content/about/protections/contents+en.lrquestion.description)
+msgid ""
+"In particular, your local ISP is in the position to build a complete profile"
+" of your Internet usage."
+msgstr ""
+
+#: https//support.torproject.org/about/protections/
+#: (content/about/protections/contents+en.lrquestion.description)
+msgid ""
+"In addition, every server in the Internet that can see any of the packets "
+"can profile your behavior."
+msgstr ""
+
+#: https//support.torproject.org/about/protections/
+#: (content/about/protections/contents+en.lrquestion.description)
+msgid ""
+"The aim of Tor is to improve your privacy by sending your traffic through a "
+"series of proxies."
+msgstr ""
+
+#: https//support.torproject.org/about/protections/
+#: (content/about/protections/contents+en.lrquestion.description)
+msgid ""
+"Your communication is encrypted in multiple layers and routed via multiple "
+"hops through the Tor network to the final receiver."
+msgstr ""
+
+#: https//support.torproject.org/about/protections/
+#: (content/about/protections/contents+en.lrquestion.description)
+msgid ""
+"More details on this process can be found in this "
+"[visualization](https://support.torproject.org/https/https-1/)."
+msgstr ""
+
+#: https//support.torproject.org/about/protections/
+#: (content/about/protections/contents+en.lrquestion.description)
+msgid ""
+"Note that all your local ISP can observe now is that you are communicating "
+"with Tor nodes."
+msgstr ""
+
+#: https//support.torproject.org/about/protections/
+#: (content/about/protections/contents+en.lrquestion.description)
+msgid ""
+"Similarly, servers in the Internet just see that they are being contacted by"
+" Tor nodes."
+msgstr ""
+
+#: https//support.torproject.org/about/protections/
+#: (content/about/protections/contents+en.lrquestion.description)
+msgid "Generally speaking, Tor aims to solve three privacy problems:"
+msgstr ""
+
+#: https//support.torproject.org/about/protections/
+#: (content/about/protections/contents+en.lrquestion.description)
+msgid ""
+"First, Tor prevents websites and other services from learning your location,"
+" which they can use to build databases about your habits and interests."
+msgstr ""
+
+#: https//support.torproject.org/about/protections/
+#: (content/about/protections/contents+en.lrquestion.description)
+msgid ""
+"With Tor, your Internet connections don't give you away by default -- now "
+"you can have the ability to choose, for each connection, how much "
+"information to reveal."
+msgstr ""
+
+#: https//support.torproject.org/about/protections/
+#: (content/about/protections/contents+en.lrquestion.description)
+msgid ""
+"Second, Tor prevents people watching your traffic locally (such as your ISP "
+"or someone with access to your home wifi or router) from learning what "
+"information you're fetching and where you're fetching it from."
+msgstr ""
+
+#: https//support.torproject.org/about/protections/
+#: (content/about/protections/contents+en.lrquestion.description)
+msgid ""
+"It also stops them from deciding what you're allowed to learn and publish --"
+" if you can get to any part of the Tor network, you can reach any site on "
+"the Internet."
+msgstr ""
+
+#: https//support.torproject.org/about/protections/
+#: (content/about/protections/contents+en.lrquestion.description)
+msgid ""
+"Third, Tor routes your connection through more than one Tor relay so no "
+"single relay can learn what you're up to."
+msgstr ""
+
+#: https//support.torproject.org/about/protections/
+#: (content/about/protections/contents+en.lrquestion.description)
+msgid ""
+"Because these relays are run by different individuals or organizations, "
+"distributing trust provides more security than the old [one hop "
+"proxy](https://support.torproject.org/about/#how-is-tor-different-from-"
+"other-proxies) approach."
+msgstr ""
+
+#: https//support.torproject.org/about/protections/
+#: (content/about/protections/contents+en.lrquestion.description)
+msgid ""
+"Note, however, that there are situations where Tor fails to solve these "
+"privacy problems entirely: see the entry below on [remaining "
+"attacks](https://support.torproject.org/about/#attacks-on-onion-routing)."
+msgstr ""
+
#: https//support.torproject.org/about/what-is-tor/
#: (content/about/what-is-tor/contents+en.lrquestion.title)
msgid "What is Tor?"
@@ -6230,9 +6812,11 @@ msgstr ""
#: (content/tbb/tbb-47/contents+en.lrquestion.description)
msgid ""
"Also, read up on the HTTPProxyAuthenticator and HTTPSProxyAuthenticator "
-"options if your proxy requires auth. We only support basic auth currently, "
-"but if you need NTLM authentication, you may find [this post in the "
-"archives](https://archives.seul.org/or/talk/Jun-2005/msg00223.html) useful."
+"options if your [proxy requires auth.](https://developer.mozilla.org/en-"
+"US/docs/Web/HTTP/Headers/Proxy-Authenticate) We only support basic auth "
+"currently, but if you need NTLM authentication, you may find [this post in "
+"the archives](https://archives.seul.org/or/talk/Jun-2005/msg00223.html) "
+"useful."
msgstr ""
#: https//support.torproject.org/tbb/tbb-47/
@@ -6490,6 +7074,219 @@ msgid ""
"have no effect on Tor's configuration."
msgstr ""
+#: https//support.torproject.org/tbb/tbb-firewall-ports/
+#: (content/tbb/tbb-firewall-ports/contents+en.lrquestion.title)
+msgid "My firewall only allows a few outgoing ports"
+msgstr ""
+
+#: https//support.torproject.org/tbb/tbb-firewall-ports/
+#: (content/tbb/tbb-firewall-ports/contents+en.lrquestion.description)
+msgid ""
+"If your firewall works by blocking ports, then you can tell Tor to only use "
+"the ports when you start your Tor Browser."
+msgstr ""
+
+#: https//support.torproject.org/tbb/tbb-firewall-ports/
+#: (content/tbb/tbb-firewall-ports/contents+en.lrquestion.description)
+msgid ""
+"Or you can add the ports that your firewall permits by adding "
+"\"FascistFirewall 1\" to your torrc configuration file."
+msgstr ""
+
+#: https//support.torproject.org/tbb/tbb-firewall-ports/
+#: (content/tbb/tbb-firewall-ports/contents+en.lrquestion.description)
+msgid ""
+"By default, when you set this Tor assumes that your firewall allows only "
+"port 80 and port 443 (HTTP and HTTPS respectively)."
+msgstr ""
+
+#: https//support.torproject.org/tbb/tbb-firewall-ports/
+#: (content/tbb/tbb-firewall-ports/contents+en.lrquestion.description)
+msgid ""
+"You can select a different set of ports with the FirewallPorts torrc option."
+msgstr ""
+
+#: https//support.torproject.org/tbb/tbb-firewall-ports/
+#: (content/tbb/tbb-firewall-ports/contents+en.lrquestion.description)
+msgid ""
+"If you want to be more fine-grained with your controls, you can also use the"
+" ReachableAddresses config options, e.g.:"
+msgstr ""
+
+#: https//support.torproject.org/tbb/tbb-firewall-ports/
+#: (content/tbb/tbb-firewall-ports/contents+en.lrquestion.description)
+#: https//support.torproject.org/tbb/tbb-install-tor-central-server/
+#: (content/tbb/tbb-install-tor-central-server/contents+en.lrquestion.description)
+#: https//support.torproject.org/operators/default-exit-ports/
+#: (content/operators/default-exit-ports/contents+en.lrquestion.description)
+#: https//support.torproject.org/operators/hibernation/
+#: (content/operators/hibernation/contents+en.lrquestion.description)
+#: https//support.torproject.org/operators/limit-total-bandwidth/
+#: (content/operators/limit-total-bandwidth/contents+en.lrquestion.description)
+#: https//support.torproject.org/misc/bug-or-feedback/
+#: (content/misc/bug-or-feedback/contents+en.lrquestion.description)
+#: https//support.torproject.org/get-in-touch/why-i-cant-join-tor-channels/
+#: (content/get-in-touch/why-i-cant-join-tor-channels/contents+en.lrquestion.description)
+#: https//support.torproject.org/apt/tor-deb-repo/
+#: (content/apt/apt-1/contents+en.lrquestion.description)
+#: https//support.torproject.org/apt/apt-over-tor/
+#: (content/apt/apt-3/contents+en.lrquestion.description)
+msgid "```"
+msgstr "```"
+
+#: https//support.torproject.org/tbb/tbb-firewall-ports/
+#: (content/tbb/tbb-firewall-ports/contents+en.lrquestion.description)
+msgid "ReachableDirAddresses *:80"
+msgstr ""
+
+#: https//support.torproject.org/tbb/tbb-firewall-ports/
+#: (content/tbb/tbb-firewall-ports/contents+en.lrquestion.description)
+msgid "ReachableORAddresses *:443"
+msgstr ""
+
+#: https//support.torproject.org/tbb/tbb-install-tor-central-server/
+#: (content/tbb/tbb-install-tor-central-server/contents+en.lrquestion.title)
+msgid ""
+"Can I install Tor on a central server, and have my clients connect to it?"
+msgstr ""
+
+#: https//support.torproject.org/tbb/tbb-install-tor-central-server/
+#: (content/tbb/tbb-install-tor-central-server/contents+en.lrquestion.description)
+msgid ""
+"Yes. Tor can be configured as a client or a relay on another machine, and "
+"allow other machines to be able to connect to it for anonymity."
+msgstr ""
+
+#: https//support.torproject.org/tbb/tbb-install-tor-central-server/
+#: (content/tbb/tbb-install-tor-central-server/contents+en.lrquestion.description)
+msgid ""
+"This is most useful in an environment where many computers want a gateway of"
+" anonymity to the rest of the world."
+msgstr ""
+
+#: https//support.torproject.org/tbb/tbb-install-tor-central-server/
+#: (content/tbb/tbb-install-tor-central-server/contents+en.lrquestion.description)
+msgid ""
+"However, be forewarned that with this configuration, anyone within your "
+"private network (existing between you and the Tor client/relay) can see what"
+" traffic you are sending in clear text."
+msgstr ""
+
+#: https//support.torproject.org/tbb/tbb-install-tor-central-server/
+#: (content/tbb/tbb-install-tor-central-server/contents+en.lrquestion.description)
+msgid "The anonymity doesn't start until you get to the Tor relay."
+msgstr ""
+
+#: https//support.torproject.org/tbb/tbb-install-tor-central-server/
+#: (content/tbb/tbb-install-tor-central-server/contents+en.lrquestion.description)
+msgid ""
+"Because of this, if you are the controller of your domain and you know "
+"everything's locked down, you will be OK, but this configuration may not be "
+"suitable for large private networks where security is key all around."
+msgstr ""
+
+#: https//support.torproject.org/tbb/tbb-install-tor-central-server/
+#: (content/tbb/tbb-install-tor-central-server/contents+en.lrquestion.description)
+msgid ""
+"Configuration is simple, editing your torrc file's SocksListenAddress "
+"according to the following examples:"
+msgstr ""
+
+#: https//support.torproject.org/tbb/tbb-install-tor-central-server/
+#: (content/tbb/tbb-install-tor-central-server/contents+en.lrquestion.description)
+msgid "SocksListenAddress 127.0.0.1"
+msgstr ""
+
+#: https//support.torproject.org/tbb/tbb-install-tor-central-server/
+#: (content/tbb/tbb-install-tor-central-server/contents+en.lrquestion.description)
+msgid "SocksListenAddress 192.168.x.x:9100"
+msgstr ""
+
+#: https//support.torproject.org/tbb/tbb-install-tor-central-server/
+#: (content/tbb/tbb-install-tor-central-server/contents+en.lrquestion.description)
+msgid "SocksListenAddress 0.0.0.0:9100"
+msgstr ""
+
+#: https//support.torproject.org/tbb/tbb-install-tor-central-server/
+#: (content/tbb/tbb-install-tor-central-server/contents+en.lrquestion.description)
+msgid ""
+"You can state multiple listen addresses, in the case that you are part of "
+"several networks or subnets."
+msgstr ""
+
+#: https//support.torproject.org/tbb/tbb-install-tor-central-server/
+#: (content/tbb/tbb-install-tor-central-server/contents+en.lrquestion.description)
+msgid "SocksListenAddress 192.168.x.x:9100 #eth0"
+msgstr ""
+
+#: https//support.torproject.org/tbb/tbb-install-tor-central-server/
+#: (content/tbb/tbb-install-tor-central-server/contents+en.lrquestion.description)
+msgid "SocksListenAddress 10.x.x.x:9100 #eth1"
+msgstr ""
+
+#: https//support.torproject.org/tbb/tbb-install-tor-central-server/
+#: (content/tbb/tbb-install-tor-central-server/contents+en.lrquestion.description)
+msgid ""
+"After this, your clients on their respective networks/subnets would specify "
+"a socks proxy with the address and port you specified SocksListenAddress to "
+"be."
+msgstr ""
+
+#: https//support.torproject.org/tbb/tbb-install-tor-central-server/
+#: (content/tbb/tbb-install-tor-central-server/contents+en.lrquestion.description)
+msgid ""
+"Please note that the SocksPort configuration option gives the port ONLY for "
+"localhost (127.0.0.1)."
+msgstr ""
+
+#: https//support.torproject.org/tbb/tbb-install-tor-central-server/
+#: (content/tbb/tbb-install-tor-central-server/contents+en.lrquestion.description)
+msgid ""
+"When setting up your SocksListenAddress(es), you need to give the port with "
+"the address, as shown above."
+msgstr ""
+
+#: https//support.torproject.org/tbb/tbb-install-tor-central-server/
+#: (content/tbb/tbb-install-tor-central-server/contents+en.lrquestion.description)
+msgid ""
+"If you are interested in forcing all outgoing data through the central Tor "
+"client/relay, instead of the server only being an optional proxy, you may "
+"find the program iptables (for *nix) useful."
+msgstr ""
+
+#: https//support.torproject.org/tbb/tbb-run-client-different-computer/
+#: (content/tbb/tbb-run-client-different-computer/contents+en.lrquestion.title)
+msgid ""
+"I want to run my Tor client on a different computer than my applications"
+msgstr ""
+
+#: https//support.torproject.org/tbb/tbb-run-client-different-computer/
+#: (content/tbb/tbb-run-client-different-computer/contents+en.lrquestion.description)
+msgid ""
+"By default, your Tor client only listens for applications that connect from "
+"localhost."
+msgstr ""
+
+#: https//support.torproject.org/tbb/tbb-run-client-different-computer/
+#: (content/tbb/tbb-run-client-different-computer/contents+en.lrquestion.description)
+msgid "Connections from other computers are refused."
+msgstr ""
+
+#: https//support.torproject.org/tbb/tbb-run-client-different-computer/
+#: (content/tbb/tbb-run-client-different-computer/contents+en.lrquestion.description)
+msgid ""
+"If you want to torify applications on different computers than the Tor "
+"client, you should edit your torrc to define `SocksListenAddress 0.0.0.0` "
+"and then restart (or hup) Tor."
+msgstr ""
+
+#: https//support.torproject.org/tbb/tbb-run-client-different-computer/
+#: (content/tbb/tbb-run-client-different-computer/contents+en.lrquestion.description)
+msgid ""
+"If you want to get more advanced, you can configure your Tor client on a "
+"firewall to bind to your internal IP but not your external IP."
+msgstr ""
+
#: https//support.torproject.org/tbb/website-blocking-tor/
#: (content/tbb/website-blocking-tor/contents+en.lrquestion.title)
msgid "A website I am trying to reach is blocking access over Tor."
@@ -8148,6 +8945,130 @@ msgid ""
"guide."
msgstr ""
+#: https//support.torproject.org/operators/default-exit-ports/
+#: (content/operators/default-exit-ports/contents+en.lrquestion.title)
+msgid "Is there a list of default exit ports?"
+msgstr ""
+
+#: https//support.torproject.org/operators/default-exit-ports/
+#: (content/operators/default-exit-ports/contents+en.lrquestion.description)
+msgid ""
+"The default open ports are listed below but keep in mind that, any port or "
+"ports can be opened by the relay operator by configuring it in torrc or "
+"modifying the source code."
+msgstr ""
+
+#: https//support.torproject.org/operators/default-exit-ports/
+#: (content/operators/default-exit-ports/contents+en.lrquestion.description)
+msgid ""
+"The default according to src/or/policies.c ([line 85][1] and [line 1901][2])"
+" from the source code release [release-0.4.6][3]:"
+msgstr ""
+
+#: https//support.torproject.org/operators/default-exit-ports/
+#: (content/operators/default-exit-ports/contents+en.lrquestion.description)
+msgid "reject 0.0.0.0/8"
+msgstr ""
+
+#: https//support.torproject.org/operators/default-exit-ports/
+#: (content/operators/default-exit-ports/contents+en.lrquestion.description)
+msgid "reject 169.254.0.0/16"
+msgstr ""
+
+#: https//support.torproject.org/operators/default-exit-ports/
+#: (content/operators/default-exit-ports/contents+en.lrquestion.description)
+msgid "reject 127.0.0.0/8"
+msgstr ""
+
+#: https//support.torproject.org/operators/default-exit-ports/
+#: (content/operators/default-exit-ports/contents+en.lrquestion.description)
+msgid "reject 192.168.0.0/16"
+msgstr ""
+
+#: https//support.torproject.org/operators/default-exit-ports/
+#: (content/operators/default-exit-ports/contents+en.lrquestion.description)
+msgid "reject 10.0.0.0/8"
+msgstr ""
+
+#: https//support.torproject.org/operators/default-exit-ports/
+#: (content/operators/default-exit-ports/contents+en.lrquestion.description)
+msgid "reject 172.16.0.0/12"
+msgstr ""
+
+#: https//support.torproject.org/operators/default-exit-ports/
+#: (content/operators/default-exit-ports/contents+en.lrquestion.description)
+msgid "reject *:25"
+msgstr ""
+
+#: https//support.torproject.org/operators/default-exit-ports/
+#: (content/operators/default-exit-ports/contents+en.lrquestion.description)
+msgid "reject *:119"
+msgstr ""
+
+#: https//support.torproject.org/operators/default-exit-ports/
+#: (content/operators/default-exit-ports/contents+en.lrquestion.description)
+msgid "reject *:135-139"
+msgstr ""
+
+#: https//support.torproject.org/operators/default-exit-ports/
+#: (content/operators/default-exit-ports/contents+en.lrquestion.description)
+msgid "reject *:445"
+msgstr ""
+
+#: https//support.torproject.org/operators/default-exit-ports/
+#: (content/operators/default-exit-ports/contents+en.lrquestion.description)
+msgid "reject *:563"
+msgstr ""
+
+#: https//support.torproject.org/operators/default-exit-ports/
+#: (content/operators/default-exit-ports/contents+en.lrquestion.description)
+msgid "reject *:1214"
+msgstr ""
+
+#: https//support.torproject.org/operators/default-exit-ports/
+#: (content/operators/default-exit-ports/contents+en.lrquestion.description)
+msgid "reject *:4661-4666"
+msgstr ""
+
+#: https//support.torproject.org/operators/default-exit-ports/
+#: (content/operators/default-exit-ports/contents+en.lrquestion.description)
+msgid "reject *:6346-6429"
+msgstr ""
+
+#: https//support.torproject.org/operators/default-exit-ports/
+#: (content/operators/default-exit-ports/contents+en.lrquestion.description)
+msgid "reject *:6699"
+msgstr ""
+
+#: https//support.torproject.org/operators/default-exit-ports/
+#: (content/operators/default-exit-ports/contents+en.lrquestion.description)
+msgid "reject *:6881-6999"
+msgstr ""
+
+#: https//support.torproject.org/operators/default-exit-ports/
+#: (content/operators/default-exit-ports/contents+en.lrquestion.description)
+msgid "accept *:*"
+msgstr ""
+
+#: https//support.torproject.org/operators/default-exit-ports/
+#: (content/operators/default-exit-ports/contents+en.lrquestion.description)
+msgid ""
+"[1]: "
+"https://gitlab.torproject.org/tpo/core/tor/-/blob/release-0.4.6/src/core/or/policies.c#L85"
+msgstr ""
+
+#: https//support.torproject.org/operators/default-exit-ports/
+#: (content/operators/default-exit-ports/contents+en.lrquestion.description)
+msgid ""
+"[2]: "
+"https://gitlab.torproject.org/tpo/core/tor/-/blob/release-0.4.6/src/core/or/policies.c#L1901"
+msgstr ""
+
+#: https//support.torproject.org/operators/default-exit-ports/
+#: (content/operators/default-exit-ports/contents+en.lrquestion.description)
+msgid "[3]: https://gitlab.torproject.org/tpo/core/tor/-/tree/release-0.4.6/"
+msgstr ""
+
#: https//support.torproject.org/operators/dynamic-ip/
#: (content/operators/dynamic-ip/contents+en.lrquestion.title)
msgid "Can I run a Tor relay using a dynamic IP address?"
@@ -8297,21 +9218,6 @@ msgid ""
"into hibernation, signaled by this entry in the log:"
msgstr ""
-#: https//support.torproject.org/operators/hibernation/
-#: (content/operators/hibernation/contents+en.lrquestion.description)
-#: https//support.torproject.org/operators/limit-total-bandwidth/
-#: (content/operators/limit-total-bandwidth/contents+en.lrquestion.description)
-#: https//support.torproject.org/misc/bug-or-feedback/
-#: (content/misc/bug-or-feedback/contents+en.lrquestion.description)
-#: https//support.torproject.org/get-in-touch/why-i-cant-join-tor-channels/
-#: (content/get-in-touch/why-i-cant-join-tor-channels/contents+en.lrquestion.description)
-#: https//support.torproject.org/apt/tor-deb-repo/
-#: (content/apt/apt-1/contents+en.lrquestion.description)
-#: https//support.torproject.org/apt/apt-over-tor/
-#: (content/apt/apt-3/contents+en.lrquestion.description)
-msgid "```"
-msgstr "```"
-
#: https//support.torproject.org/operators/hibernation/
#: (content/operators/hibernation/contents+en.lrquestion.description)
msgid "Bandwidth soft limit reached; commencing hibernation."
@@ -10623,6 +11529,131 @@ msgstr ""
msgid "sub 4096R/C00942E4 2017-03-13"
msgstr "sub 4096R/C00942E4 2017-03-13"
+#: https//support.torproject.org/misc/check-socks-dns-leaks/
+#: (content/misc/check-socks-dns-leaks/contents+en.lrquestion.title)
+msgid ""
+"How do I check if my application that uses SOCKS is leaking DNS requests?"
+msgstr ""
+
+#: https//support.torproject.org/misc/check-socks-dns-leaks/
+#: (content/misc/check-socks-dns-leaks/contents+en.lrquestion.description)
+msgid ""
+"Even if your application is using the correct variant of the SOCKS protocol,"
+" there is still a risk that it could be leaking DNS queries."
+msgstr ""
+
+#: https//support.torproject.org/misc/check-socks-dns-leaks/
+#: (content/misc/check-socks-dns-leaks/contents+en.lrquestion.description)
+msgid ""
+"This problem happens in Firefox extensions that resolve the destination "
+"hostname themselves, for example to show you its IP address, what country "
+"it's in, etc."
+msgstr ""
+
+#: https//support.torproject.org/misc/check-socks-dns-leaks/
+#: (content/misc/check-socks-dns-leaks/contents+en.lrquestion.description)
+msgid ""
+"If you suspect your application might behave like this, follow the "
+"instructions below to check."
+msgstr ""
+
+#: https//support.torproject.org/misc/check-socks-dns-leaks/
+#: (content/misc/check-socks-dns-leaks/contents+en.lrquestion.description)
+msgid ""
+"1. Add `TestSocks 1` to your [torrc file](https://support.torproject.org/tbb"
+"/tbb-editing-torrc/)."
+msgstr ""
+
+#: https//support.torproject.org/misc/check-socks-dns-leaks/
+#: (content/misc/check-socks-dns-leaks/contents+en.lrquestion.description)
+msgid ""
+"1. Start Tor, and point your program's SOCKS proxy settings to Tor's SOCKS5 "
+"server (`socks5://127.0.0.1:9050` by default)."
+msgstr ""
+
+#: https//support.torproject.org/misc/check-socks-dns-leaks/
+#: (content/misc/check-socks-dns-leaks/contents+en.lrquestion.description)
+msgid ""
+"1. Watch your logs as you use your application. For each socks connection, "
+"Tor will log a `notice` for safe connections, and a `warn` for connections "
+"leaking DNS requests."
+msgstr ""
+
+#: https//support.torproject.org/misc/check-socks-dns-leaks/
+#: (content/misc/check-socks-dns-leaks/contents+en.lrquestion.description)
+msgid ""
+"If you want to automatically disable all connections leaking DNS requests, "
+"set `SafeSocks 1` in your torrc file."
+msgstr ""
+
+#: https//support.torproject.org/misc/hide-exits/
+#: (content/misc/hide-exits/contents+en.lrquestion.title)
+msgid ""
+"You should hide the list of Tor relays, so people can't block the exits."
+msgstr ""
+
+#: https//support.torproject.org/misc/hide-exits/
+#: (content/misc/hide-exits/contents+en.lrquestion.description)
+msgid "There are a few reasons we don't:"
+msgstr ""
+
+#: https//support.torproject.org/misc/hide-exits/
+#: (content/misc/hide-exits/contents+en.lrquestion.description)
+msgid ""
+"1. We can't help but make the information available, since Tor clients need "
+"to use it to pick their paths."
+msgstr ""
+
+#: https//support.torproject.org/misc/hide-exits/
+#: (content/misc/hide-exits/contents+en.lrquestion.description)
+msgid "So if the \"blockers\" want it, they can get it anyway."
+msgstr ""
+
+#: https//support.torproject.org/misc/hide-exits/
+#: (content/misc/hide-exits/contents+en.lrquestion.description)
+msgid ""
+"Further, even if we didn't tell clients about the list of relays directly, "
+"somebody could still make a lot of connections through Tor to a test site "
+"and build a list of the addresses they see."
+msgstr ""
+
+#: https//support.torproject.org/misc/hide-exits/
+#: (content/misc/hide-exits/contents+en.lrquestion.description)
+msgid ""
+"1. If people want to block us, we believe that they should be allowed to do "
+"so."
+msgstr ""
+
+#: https//support.torproject.org/misc/hide-exits/
+#: (content/misc/hide-exits/contents+en.lrquestion.description)
+msgid ""
+"Obviously, we would prefer for everybody to allow Tor users to connect to "
+"them, but people have the right to decide who their services should allow "
+"connections from, and if they want to block anonymous users, they can."
+msgstr ""
+
+#: https//support.torproject.org/misc/hide-exits/
+#: (content/misc/hide-exits/contents+en.lrquestion.description)
+msgid ""
+"1. Being blockable also has tactical advantages: it may be a persuasive "
+"response to website maintainers who feel threatened by Tor."
+msgstr ""
+
+#: https//support.torproject.org/misc/hide-exits/
+#: (content/misc/hide-exits/contents+en.lrquestion.description)
+msgid ""
+"Giving them the option may inspire them to stop and think about whether they"
+" really want to eliminate private access to their system, and if not, what "
+"other options they might have."
+msgstr ""
+
+#: https//support.torproject.org/misc/hide-exits/
+#: (content/misc/hide-exits/contents+en.lrquestion.description)
+msgid ""
+"The time they might otherwise have spent blocking Tor, they may instead "
+"spend rethinking their overall approach to privacy and anonymity."
+msgstr ""
+
#: https//support.torproject.org/misc/menu/
#: (content/misc/menu/contents+en.lrquestion.description)
msgid "About"
@@ -11271,56 +12302,20 @@ msgstr ""
#: https//support.torproject.org/get-in-touch/why-i-cant-join-tor-channels/
#: (content/get-in-touch/why-i-cant-join-tor-channels/contents+en.lrquestion.description)
msgid ""
-"Then, to complete the registration and ultimately gain access to the #tor-"
-"project channel, your nickname must be **verified**."
+"After registering your nickname, to gain access to the #tor-project and "
+"other protected channels, your nickname must be **verified**."
msgstr ""
#: https//support.torproject.org/get-in-touch/why-i-cant-join-tor-channels/
#: (content/get-in-touch/why-i-cant-join-tor-channels/contents+en.lrquestion.description)
msgid ""
-"1. To verify your nick, open a new browser window and go to "
-"https://webchat.oftc.net/?channels=tor."
+"1. Go to https://services.oftc.net/ and follow the steps in the '*To verify "
+"your account*' section"
msgstr ""
#: https//support.torproject.org/get-in-touch/why-i-cant-join-tor-channels/
#: (content/get-in-touch/why-i-cant-join-tor-channels/contents+en.lrquestion.description)
-msgid "2. Log in with your IRC nickname and password."
-msgstr ""
-
-#: https//support.torproject.org/get-in-touch/why-i-cant-join-tor-channels/
-#: (content/get-in-touch/why-i-cant-join-tor-channels/contents+en.lrquestion.description)
-msgid ""
-"3. Look for the word **verify** and log in there. It may appear that nothing"
-" has happened. Look at the top of the page, and there will be a column "
-"called **Account**."
-msgstr ""
-
-#: https//support.torproject.org/get-in-touch/why-i-cant-join-tor-channels/
-#: (content/get-in-touch/why-i-cant-join-tor-channels/contents+en.lrquestion.description)
-msgid "4. Click on **Account**."
-msgstr ""
-
-#: https//support.torproject.org/get-in-touch/why-i-cant-join-tor-channels/
-#: (content/get-in-touch/why-i-cant-join-tor-channels/contents+en.lrquestion.description)
-msgid ""
-"5. Click on the small sentence at the bottom of the square that says: Verify"
-" account."
-msgstr ""
-
-#: https//support.torproject.org/get-in-touch/why-i-cant-join-tor-channels/
-#: (content/get-in-touch/why-i-cant-join-tor-channels/contents+en.lrquestion.description)
-msgid "6. Fill out the Captcha that pops up, and click ok."
-msgstr ""
-
-#: https//support.torproject.org/get-in-touch/why-i-cant-join-tor-channels/
-#: (content/get-in-touch/why-i-cant-join-tor-channels/contents+en.lrquestion.description)
-msgid ""
-"7. A tiny message will appear: \"Your NickServ account has been verified.\""
-msgstr ""
-
-#: https//support.torproject.org/get-in-touch/why-i-cant-join-tor-channels/
-#: (content/get-in-touch/why-i-cant-join-tor-channels/contents+en.lrquestion.description)
-msgid "8. Go back to the IRC webpage where you are logged in and type:"
+msgid "2. Go back to the IRC webpage where you are logged in and type:"
msgstr ""
#: https//support.torproject.org/get-in-touch/why-i-cant-join-tor-channels/
@@ -11330,12 +12325,12 @@ msgstr ""
#: https//support.torproject.org/get-in-touch/why-i-cant-join-tor-channels/
#: (content/get-in-touch/why-i-cant-join-tor-channels/contents+en.lrquestion.description)
-msgid "9. Click ENTER."
+msgid "3. Click ENTER."
msgstr ""
#: https//support.torproject.org/get-in-touch/why-i-cant-join-tor-channels/
#: (content/get-in-touch/why-i-cant-join-tor-channels/contents+en.lrquestion.description)
-msgid "10. If all is well, you will receive a message that says:"
+msgid "4. If all is well, you will receive a message that says:"
msgstr ""
#: https//support.torproject.org/get-in-touch/why-i-cant-join-tor-channels/
@@ -11476,19 +12471,23 @@ msgstr "# apt install apt-transport-https"
#: https//support.torproject.org/apt/tor-deb-repo/
#: (content/apt/apt-1/contents+en.lrquestion.description)
msgid ""
-"#### 2. Add the following entries to `/etc/apt/sources.list` or a new file "
-"in `/etc/apt/sources.list.d/`"
+"#### 2. Create a new file in `/etc/apt/sources.list.d/` named `tor.list`. "
+"Add the following entries:"
msgstr ""
#: https//support.torproject.org/apt/tor-deb-repo/
#: (content/apt/apt-1/contents+en.lrquestion.description)
-msgid "deb https://deb.torproject.org/torproject.org <DISTRIBUTION> main"
+msgid ""
+"deb [signed-by=/usr/share/keyrings/tor-archive-keyring.gpg] "
+"https://deb.torproject.org/torproject.org <DISTRIBUTION> main"
msgstr ""
#: https//support.torproject.org/apt/tor-deb-repo/
#: (content/apt/apt-1/contents+en.lrquestion.description)
-msgid "deb-src https://deb.torproject.org/torproject.org <DISTRIBUTION> main"
-msgstr "deb-src https://deb.torproject.org/torproject.org <DISTRIBUTION> main"
+msgid ""
+"deb-src [signed-by=/usr/share/keyrings/tor-archive-keyring.gpg] "
+"https://deb.torproject.org/torproject.org <DISTRIBUTION> main"
+msgstr ""
#: https//support.torproject.org/apt/tor-deb-repo/
#: (content/apt/apt-1/contents+en.lrquestion.description)
@@ -11501,14 +12500,16 @@ msgstr ""
#: https//support.torproject.org/apt/tor-deb-repo/
#: (content/apt/apt-1/contents+en.lrquestion.description)
msgid ""
-"deb https://deb.torproject.org/torproject.org tor-"
+"deb [signed-by=/usr/share/keyrings/tor-archive-keyring.gpg] "
+"https://deb.torproject.org/torproject.org tor-"
"experimental-0.4.6.x-<DISTRIBUTION> main"
msgstr ""
#: https//support.torproject.org/apt/tor-deb-repo/
#: (content/apt/apt-1/contents+en.lrquestion.description)
msgid ""
-"deb-src https://deb.torproject.org/torproject.org tor-"
+"deb-src [signed-by=/usr/share/keyrings/tor-archive-keyring.gpg] "
+"https://deb.torproject.org/torproject.org tor-"
"experimental-0.4.6.x-<DISTRIBUTION> main"
msgstr ""
@@ -11520,18 +12521,18 @@ msgstr "Ou les versions quotidiennes :"
#: https//support.torproject.org/apt/tor-deb-repo/
#: (content/apt/apt-1/contents+en.lrquestion.description)
msgid ""
-"deb https://deb.torproject.org/torproject.org tor-nightly-"
-"master-<DISTRIBUTION> main"
+"deb [signed-by=/usr/share/keyrings/tor-archive-keyring.gpg] "
+"https://deb.torproject.org/torproject.org tor-nightly-master-<DISTRIBUTION> "
+"main"
msgstr ""
#: https//support.torproject.org/apt/tor-deb-repo/
#: (content/apt/apt-1/contents+en.lrquestion.description)
msgid ""
-"deb-src https://deb.torproject.org/torproject.org tor-nightly-"
-"master-<DISTRIBUTION> main"
+"deb-src [signed-by=/usr/share/keyrings/tor-archive-keyring.gpg] "
+"https://deb.torproject.org/torproject.org tor-nightly-master-<DISTRIBUTION> "
+"main"
msgstr ""
-"deb-src https://deb.torproject.org/torproject.org tor-nightly-"
-"master-<DISTRIBUTION> main"
#: https//support.torproject.org/apt/tor-deb-repo/
#: (content/apt/apt-1/contents+en.lrquestion.description)
@@ -11551,13 +12552,15 @@ msgstr ""
#: https//support.torproject.org/apt/tor-deb-repo/
#: (content/apt/apt-1/contents+en.lrquestion.description)
msgid ""
-"deb [arch=amd64] https://deb.torproject.org/torproject.org focal main"
+"deb [arch=amd64 signed-by=/usr/share/keyrings/tor-archive-keyring.gpg] "
+"https://deb.torproject.org/torproject.org focal main"
msgstr ""
#: https//support.torproject.org/apt/tor-deb-repo/
#: (content/apt/apt-1/contents+en.lrquestion.description)
msgid ""
-"deb-src [arch=amd64] https://deb.torproject.org/torproject.org focal main"
+"deb-src [arch=amd64 signed-by=/usr/share/keyrings/tor-archive-keyring.gpg] "
+"https://deb.torproject.org/torproject.org focal main"
msgstr ""
#: https//support.torproject.org/apt/tor-deb-repo/
@@ -11577,26 +12580,17 @@ msgstr ""
#: (content/apt/apt-1/contents+en.lrquestion.description)
msgid ""
"#### 3. Then add the gpg key used to sign the packages by running the "
-"following commands at your command prompt"
+"following command at your command prompt:"
msgstr ""
#: https//support.torproject.org/apt/tor-deb-repo/
#: (content/apt/apt-1/contents+en.lrquestion.description)
msgid ""
-"# wget -qO- "
+"# wget -O- "
"https://deb.torproject.org/torproject.org/A3C4F0F979CAA22CDBA8F512EE8CBC9E886DDD89.asc"
-" | gpg --import"
+" | gpg --dearmor | tee /usr/share/keyrings/tor-archive-keyring.gpg "
+">/dev/null"
msgstr ""
-"# wget -qO- "
-"https://deb.torproject.org/torproject.org/A3C4F0F979CAA22CDBA8F512EE8CBC9E886DDD89.asc"
-" | gpg --import"
-
-#: https//support.torproject.org/apt/tor-deb-repo/
-#: (content/apt/apt-1/contents+en.lrquestion.description)
-msgid ""
-"# gpg --export A3C4F0F979CAA22CDBA8F512EE8CBC9E886DDD89 | apt-key add -"
-msgstr ""
-"# gpg --export A3C4F0F979CAA22CDBA8F512EE8CBC9E886DDD89 | apt-key add -"
#: https//support.torproject.org/apt/tor-deb-repo/
#: (content/apt/apt-1/contents+en.lrquestion.description)
@@ -13202,6 +14196,82 @@ msgid ""
"doesn't change IP address over the day."
msgstr ""
+#: https//support.torproject.org/alternate-designs/block-websites/
+#: (content/alternate-designs/block-websites/contents+en.lrquestion.title)
+msgid "Exit policies should be able to block websites, not just IP addresses."
+msgstr ""
+
+#: https//support.torproject.org/alternate-designs/block-websites/
+#: (content/alternate-designs/block-websites/contents+en.lrquestion.description)
+msgid ""
+"It would be nice to let relay operators say things like `reject "
+"www.slashdot.org` in their exit policies, rather than requiring them to "
+"learn all the IP address space that could be covered by the site (and then "
+"also blocking other sites at those IP addresses)."
+msgstr ""
+
+#: https//support.torproject.org/alternate-designs/block-websites/
+#: (content/alternate-designs/block-websites/contents+en.lrquestion.description)
+msgid "There are two problems, though."
+msgstr ""
+
+#: https//support.torproject.org/alternate-designs/block-websites/
+#: (content/alternate-designs/block-websites/contents+en.lrquestion.description)
+msgid "First, users could still get around these blocks."
+msgstr ""
+
+#: https//support.torproject.org/alternate-designs/block-websites/
+#: (content/alternate-designs/block-websites/contents+en.lrquestion.description)
+msgid ""
+"For example, they could request the IP address rather than the hostname when"
+" they exit from the Tor network."
+msgstr ""
+
+#: https//support.torproject.org/alternate-designs/block-websites/
+#: (content/alternate-designs/block-websites/contents+en.lrquestion.description)
+msgid ""
+"This means operators would still need to learn all the IP addresses for the "
+"destinations in question."
+msgstr ""
+
+#: https//support.torproject.org/alternate-designs/block-websites/
+#: (content/alternate-designs/block-websites/contents+en.lrquestion.description)
+msgid ""
+"The second problem is that it would allow remote attackers to censor "
+"arbitrary sites."
+msgstr ""
+
+#: https//support.torproject.org/alternate-designs/block-websites/
+#: (content/alternate-designs/block-websites/contents+en.lrquestion.description)
+msgid ""
+"For example, if a Tor operator blocks www1.slashdot.org, and then some "
+"attacker poisons the Tor relay's DNS or otherwise changes that hostname to "
+"resolve to the IP address for a major news site, then suddenly that Tor "
+"relay is blocking the news site."
+msgstr ""
+
+#: https//support.torproject.org/alternate-designs/let-the-network-pick-the-path/
+#: (content/alternate-designs/let-the-network-pick-the-path/contents+en.lrquestion.title)
+msgid "You should let the network pick the path, not the client."
+msgstr ""
+
+#: https//support.torproject.org/alternate-designs/let-the-network-pick-the-path/
+#: (content/alternate-designs/let-the-network-pick-the-path/contents+en.lrquestion.description)
+msgid "No, you cannot trust the network to pick the path."
+msgstr ""
+
+#: https//support.torproject.org/alternate-designs/let-the-network-pick-the-path/
+#: (content/alternate-designs/let-the-network-pick-the-path/contents+en.lrquestion.description)
+msgid "Malicious relays could route you through their colluding friends."
+msgstr ""
+
+#: https//support.torproject.org/alternate-designs/let-the-network-pick-the-path/
+#: (content/alternate-designs/let-the-network-pick-the-path/contents+en.lrquestion.description)
+msgid ""
+"This would give an adversary the ability to watch all of your traffic end to"
+" end."
+msgstr ""
+
#: lego/templates/banner.html:3 lego/templates/banner.html:5
#: templates/banner.html:3 templates/banner.html:5
msgid "Close banner"
@@ -13232,8 +14302,8 @@ msgid "DONATE NOW"
msgstr "FAITES UN DON MAINTENANT"
#: lego/templates/footer.html:13 lego/templates/footer.html:22
-#: lego/templates/navbar.html:83 templates/footer.html:13
-#: templates/footer.html:22 templates/navbar.html:83
+#: lego/templates/navbar.html:95 templates/footer.html:13
+#: templates/footer.html:22 templates/navbar.html:95
msgid "Download Tor Browser"
msgstr "Télécharger le Navigateur Tor"
diff --git a/contents+ga.po b/contents+ga.po
index 5edf867b4c..17228ce792 100644
--- a/contents+ga.po
+++ b/contents+ga.po
@@ -10,7 +10,7 @@ msgid ""
msgstr ""
"Project-Id-Version: PACKAGE VERSION\n"
"Report-Msgid-Bugs-To: \n"
-"POT-Creation-Date: 2021-08-25 11:14+CET\n"
+"POT-Creation-Date: 2021-09-01 12:20+CET\n"
"PO-Revision-Date: 2018-10-02 22:41+0000\n"
"Last-Translator: Emma Peel, 2021\n"
"Language-Team: Irish (https://www.transifex.com/otf/teams/1519/ga/)\n"
@@ -143,6 +143,11 @@ msgstr ""
msgid "Tor Metrics"
msgstr ""
+#: https//support.torproject.org/alternate-designs/
+#: (content/alternate-designs/contents+en.lrtopic.title)
+msgid "Alternate Designs We Don't Do (Yet)"
+msgstr ""
+
#: https//support.torproject.org/glossary/add-on-extension-or-plugin/
#: (content/glossary/add-on-extension-or-plugin/contents+en.lrword.term)
msgid "add-on, extension, or plugin"
@@ -2033,6 +2038,61 @@ msgid ""
"wiki](https://trac.torproject.org/projects/tor/wiki/doc/TorPlusVPN)."
msgstr ""
+#: https//support.torproject.org/faq/relay-donations/
+#: (content/faq/relay-donations/contents+en.lrquestion.title)
+msgid "Can I donate for a relay rather than run my own?"
+msgstr ""
+
+#: https//support.torproject.org/faq/relay-donations/
+#: (content/faq/relay-donations/contents+en.lrquestion.description)
+msgid ""
+"Sure! We have a [list of organizations that run Tor "
+"relays](https://community.torproject.org/relay/community-resources/relay-"
+"associations/) that are happy to turn your donations into better speed and "
+"anonymity for the Tor network."
+msgstr ""
+
+#: https//support.torproject.org/faq/relay-donations/
+#: (content/faq/relay-donations/contents+en.lrquestion.description)
+msgid ""
+"These organizations are not the same as [The Tor Project, "
+"Inc](https://donate.torproject.org/), but we consider that a good thing."
+msgstr ""
+
+#: https//support.torproject.org/faq/relay-donations/
+#: (content/faq/relay-donations/contents+en.lrquestion.description)
+msgid "They're run by nice people who are part of the Tor community."
+msgstr ""
+
+#: https//support.torproject.org/faq/relay-donations/
+#: (content/faq/relay-donations/contents+en.lrquestion.description)
+msgid ""
+"Note that there can be a tradeoff here between anonymity and performance."
+msgstr ""
+
+#: https//support.torproject.org/faq/relay-donations/
+#: (content/faq/relay-donations/contents+en.lrquestion.description)
+msgid ""
+"The Tor network's anonymity comes in part from diversity, so if you are in a"
+" position to run your own relay, you will be improving Tor's anonymity more "
+"than by donating."
+msgstr ""
+
+#: https//support.torproject.org/faq/relay-donations/
+#: (content/faq/relay-donations/contents+en.lrquestion.description)
+msgid ""
+"At the same time though, economies of scale for bandwidth mean that "
+"combining many small donations into several larger relays is more efficient "
+"at improving network performance."
+msgstr ""
+
+#: https//support.torproject.org/faq/relay-donations/
+#: (content/faq/relay-donations/contents+en.lrquestion.description)
+msgid ""
+"Improving anonymity and improving performance are both worthwhile goals, so "
+"however you can help is great!"
+msgstr ""
+
#: https//support.torproject.org/faq/staying-anonymous/
#: (content/faq/staying-anonymous/contents+en.lrquestion.title)
msgid "Am I totally anonymous if I use Tor?"
@@ -2333,6 +2393,61 @@ msgid ""
" documenting all the issues](https://community.torproject.org/)."
msgstr ""
+#: https//support.torproject.org/about/attacks-on-onion-routing/
+#: (content/about/attacks-on-onion-routing/contents+en.lrquestion.title)
+msgid "What attacks remain against onion routing?"
+msgstr ""
+
+#: https//support.torproject.org/about/attacks-on-onion-routing/
+#: (content/about/attacks-on-onion-routing/contents+en.lrquestion.description)
+msgid ""
+"As mentioned above, it is possible for an observer who can view both you and"
+" either the destination website or your Tor exit node to correlate timings "
+"of your traffic as it enters the Tor network and also as it exits."
+msgstr ""
+
+#: https//support.torproject.org/about/attacks-on-onion-routing/
+#: (content/about/attacks-on-onion-routing/contents+en.lrquestion.description)
+msgid "Tor does not defend against such a threat model."
+msgstr ""
+
+#: https//support.torproject.org/about/attacks-on-onion-routing/
+#: (content/about/attacks-on-onion-routing/contents+en.lrquestion.description)
+msgid ""
+"In a more limited sense, note that if a censor or law enforcement agency has"
+" the ability to obtain specific observation of parts of the network, it is "
+"possible for them to verify a suspicion that you talk regularly to your "
+"friend by observing traffic at both ends and correlating the timing of only "
+"that traffic."
+msgstr ""
+
+#: https//support.torproject.org/about/attacks-on-onion-routing/
+#: (content/about/attacks-on-onion-routing/contents+en.lrquestion.description)
+msgid ""
+"Again, this is only useful to verify that parties already suspected of "
+"communicating with one another are doing so."
+msgstr ""
+
+#: https//support.torproject.org/about/attacks-on-onion-routing/
+#: (content/about/attacks-on-onion-routing/contents+en.lrquestion.description)
+msgid ""
+"In most countries, the suspicion required to obtain a warrant already "
+"carries more weight than timing correlation would provide."
+msgstr ""
+
+#: https//support.torproject.org/about/attacks-on-onion-routing/
+#: (content/about/attacks-on-onion-routing/contents+en.lrquestion.description)
+msgid ""
+"Furthermore, since Tor reuses circuits for multiple TCP connections, it is "
+"possible to associate non anonymous and anonymous traffic at a given exit "
+"node, so be careful about what applications you run concurrently over Tor."
+msgstr ""
+
+#: https//support.torproject.org/about/attacks-on-onion-routing/
+#: (content/about/attacks-on-onion-routing/contents+en.lrquestion.description)
+msgid "Perhaps even run separate Tor clients for these applications."
+msgstr ""
+
#: https//support.torproject.org/about/backdoor/
#: (content/about/backdoor/contents+en.lrquestion.title)
msgid "Is there a backdoor in Tor?"
@@ -2468,6 +2583,43 @@ msgid ""
"recommended](/tbb/tbb-9/)."
msgstr ""
+#: https//support.torproject.org/about/change-paths/
+#: (content/about/change-paths/contents+en.lrquestion.title)
+msgid "How often does Tor change its paths?"
+msgstr ""
+
+#: https//support.torproject.org/about/change-paths/
+#: (content/about/change-paths/contents+en.lrquestion.description)
+msgid ""
+"Tor will reuse the same circuit for new TCP streams for 10 minutes, as long "
+"as the circuit is working fine."
+msgstr ""
+
+#: https//support.torproject.org/about/change-paths/
+#: (content/about/change-paths/contents+en.lrquestion.description)
+msgid "(If the circuit fails, Tor will switch to a new circuit immediately.)"
+msgstr ""
+
+#: https//support.torproject.org/about/change-paths/
+#: (content/about/change-paths/contents+en.lrquestion.description)
+msgid ""
+"But note that a single TCP stream (e.g. a long IRC connection) will stay on "
+"the same circuit forever."
+msgstr ""
+
+#: https//support.torproject.org/about/change-paths/
+#: (content/about/change-paths/contents+en.lrquestion.description)
+msgid "We don't rotate individual streams from one circuit to the next."
+msgstr ""
+
+#: https//support.torproject.org/about/change-paths/
+#: (content/about/change-paths/contents+en.lrquestion.description)
+msgid ""
+"Otherwise, an adversary with a partial view of the network would be given "
+"many chances over time to link you to your destination, rather than just one"
+" chance."
+msgstr ""
+
#: https//support.torproject.org/about/distribute-tor/
#: (content/about/distribute-tor/contents+en.lrquestion.title)
msgid "Can I distribute Tor?"
@@ -2563,6 +2715,133 @@ msgid ""
"details."
msgstr ""
+#: https//support.torproject.org/about/entry-guards/
+#: (content/about/entry-guards/contents+en.lrquestion.title)
+msgid "What are Entry Guards?"
+msgstr ""
+
+#: https//support.torproject.org/about/entry-guards/
+#: (content/about/entry-guards/contents+en.lrquestion.description)
+msgid ""
+"Tor (like all current practical low-latency anonymity designs) fails when "
+"the attacker can see both ends of the communications channel."
+msgstr ""
+
+#: https//support.torproject.org/about/entry-guards/
+#: (content/about/entry-guards/contents+en.lrquestion.description)
+msgid ""
+"For example, suppose the attacker controls or watches the Tor relay you "
+"choose to enter the network, and also controls or watches the website you "
+"visit."
+msgstr ""
+
+#: https//support.torproject.org/about/entry-guards/
+#: (content/about/entry-guards/contents+en.lrquestion.description)
+msgid ""
+"In this case, the research community knows no practical low-latency design "
+"that can reliably stop the attacker from correlating volume and timing "
+"information on the two sides."
+msgstr ""
+
+#: https//support.torproject.org/about/entry-guards/
+#: (content/about/entry-guards/contents+en.lrquestion.description)
+msgid "So, what should we do?"
+msgstr ""
+
+#: https//support.torproject.org/about/entry-guards/
+#: (content/about/entry-guards/contents+en.lrquestion.description)
+msgid "Suppose the attacker controls, or can observe, C relays."
+msgstr ""
+
+#: https//support.torproject.org/about/entry-guards/
+#: (content/about/entry-guards/contents+en.lrquestion.description)
+msgid "Suppose there are N relays total."
+msgstr ""
+
+#: https//support.torproject.org/about/entry-guards/
+#: (content/about/entry-guards/contents+en.lrquestion.description)
+msgid ""
+"If you select new entry and exit relays each time you use the network, the "
+"attacker will be able to correlate all traffic you send with probability "
+"around (c/n)2."
+msgstr ""
+
+#: https//support.torproject.org/about/entry-guards/
+#: (content/about/entry-guards/contents+en.lrquestion.description)
+msgid ""
+"But profiling is, for most users, as bad as being traced all the time: they "
+"want to do something often without an attacker noticing, and the attacker "
+"noticing once is as bad as the attacker noticing more often."
+msgstr ""
+
+#: https//support.torproject.org/about/entry-guards/
+#: (content/about/entry-guards/contents+en.lrquestion.description)
+msgid ""
+"Thus, choosing many random entries and exits gives the user no chance of "
+"escaping profiling by this kind of attacker."
+msgstr ""
+
+#: https//support.torproject.org/about/entry-guards/
+#: (content/about/entry-guards/contents+en.lrquestion.description)
+msgid ""
+"The solution is \"entry guards\": each Tor client selects a few relays at "
+"random to use as entry points, and uses only those relays for their first "
+"hop."
+msgstr ""
+
+#: https//support.torproject.org/about/entry-guards/
+#: (content/about/entry-guards/contents+en.lrquestion.description)
+msgid ""
+"If those relays are not controlled or observed, the attacker can't win, "
+"ever, and the user is secure."
+msgstr ""
+
+#: https//support.torproject.org/about/entry-guards/
+#: (content/about/entry-guards/contents+en.lrquestion.description)
+msgid ""
+"If those relays are observed or controlled by the attacker, the attacker "
+"sees a larger fraction of the user's traffic - but still the user is no more"
+" profiled than before."
+msgstr ""
+
+#: https//support.torproject.org/about/entry-guards/
+#: (content/about/entry-guards/contents+en.lrquestion.description)
+msgid ""
+"Thus, the user has some chance (on the order of (n-c)/n) of avoiding "
+"profiling, whereas they had none before."
+msgstr ""
+
+#: https//support.torproject.org/about/entry-guards/
+#: (content/about/entry-guards/contents+en.lrquestion.description)
+msgid ""
+"You can read more at [An Analysis of the Degradation of Anonymous "
+"Protocols](http://freehaven.net/anonbib/#wright02), [Defending Anonymous "
+"Communication Against Passive Logging "
+"Attacks](http://freehaven.net/anonbib/#wright03), and especially [Locating "
+"Hidden Servers](http://freehaven.net/anonbib/#hs-attack06)."
+msgstr ""
+
+#: https//support.torproject.org/about/entry-guards/
+#: (content/about/entry-guards/contents+en.lrquestion.description)
+msgid ""
+"Restricting your entry nodes may also help against attackers who want to run"
+" a few Tor nodes and easily enumerate all of the Tor user IP addresses."
+msgstr ""
+
+#: https//support.torproject.org/about/entry-guards/
+#: (content/about/entry-guards/contents+en.lrquestion.description)
+msgid ""
+"(Even though they can't learn what destinations the users are talking to, "
+"they still might be able to do bad things with just a list of users.)"
+msgstr ""
+
+#: https//support.torproject.org/about/entry-guards/
+#: (content/about/entry-guards/contents+en.lrquestion.description)
+msgid ""
+"However, that feature won't really become useful until we move to a "
+"\"directory guard\" design as well."
+msgstr ""
+
#: https//support.torproject.org/about/how-is-tor-different-from-other-proxies/
#: (content/about/how-is-tor-different-from-other-proxies/contents+en.lrquestion.title)
msgid "How is Tor different from other proxies?"
@@ -2733,6 +3012,162 @@ msgid ""
" Tor and HTTPS interact."
msgstr ""
+#: https//support.torproject.org/about/key-management/
+#: (content/about/key-management/contents+en.lrquestion.title)
+msgid "Tell me about all the keys Tor uses"
+msgstr ""
+
+#: https//support.torproject.org/about/key-management/
+#: (content/about/key-management/contents+en.lrquestion.description)
+msgid ""
+"Tor uses a variety of different keys, with three goals in mind: 1) "
+"encryption to ensure privacy of data within the Tor network, 2) "
+"authentication so clients know they're talking to the relays they meant to "
+"talk to, and 3) signatures to make sure all clients know the same set of "
+"relays."
+msgstr ""
+
+#: https//support.torproject.org/about/key-management/
+#: (content/about/key-management/contents+en.lrquestion.description)
+msgid ""
+"**Encryption**: first, all connections in Tor use TLS link encryption, so "
+"observers can't look inside to see which circuit a given cell is intended "
+"for."
+msgstr ""
+
+#: https//support.torproject.org/about/key-management/
+#: (content/about/key-management/contents+en.lrquestion.description)
+msgid ""
+"Further, the Tor client establishes an ephemeral encryption key with each "
+"relay in the circuit; these extra layers of encryption mean that only the "
+"exit relay can read the cells."
+msgstr ""
+
+#: https//support.torproject.org/about/key-management/
+#: (content/about/key-management/contents+en.lrquestion.description)
+msgid ""
+"Both sides discard the circuit key when the circuit ends, so logging traffic"
+" and then breaking into the relay to discover the key won't work."
+msgstr ""
+
+#: https//support.torproject.org/about/key-management/
+#: (content/about/key-management/contents+en.lrquestion.description)
+msgid ""
+"**Authentication**: Every Tor relay has a public decryption key called the "
+"\"onion key\"."
+msgstr ""
+
+#: https//support.torproject.org/about/key-management/
+#: (content/about/key-management/contents+en.lrquestion.description)
+msgid "Each relay rotates its onion key once a week."
+msgstr ""
+
+#: https//support.torproject.org/about/key-management/
+#: (content/about/key-management/contents+en.lrquestion.description)
+msgid ""
+"When the Tor client establishes circuits, at each step it [demands that the "
+"Tor relay prove knowledge of its onion key](https://svn-"
+"archive.torproject.org/svn/projects/design-paper/tor-"
+"design.html#subsec:circuits)."
+msgstr ""
+
+#: https//support.torproject.org/about/key-management/
+#: (content/about/key-management/contents+en.lrquestion.description)
+msgid ""
+"That way the first node in the path can't just spoof the rest of the path."
+msgstr ""
+
+#: https//support.torproject.org/about/key-management/
+#: (content/about/key-management/contents+en.lrquestion.description)
+msgid ""
+"Because the Tor client chooses the path, it can make sure to get Tor's "
+"\"distributed trust\" property: no single relay in the path can know about "
+"both the client and what the client is doing."
+msgstr ""
+
+#: https//support.torproject.org/about/key-management/
+#: (content/about/key-management/contents+en.lrquestion.description)
+msgid ""
+"**Coordination**: How do clients know what the relays are, and how do they "
+"know that they have the right keys for them?"
+msgstr ""
+
+#: https//support.torproject.org/about/key-management/
+#: (content/about/key-management/contents+en.lrquestion.description)
+msgid "Each relay has a long-term public signing key called the \"identity key\"."
+msgstr ""
+
+#: https//support.torproject.org/about/key-management/
+#: (content/about/key-management/contents+en.lrquestion.description)
+msgid "Each directory authority additionally has a \"directory signing key\"."
+msgstr ""
+
+#: https//support.torproject.org/about/key-management/
+#: (content/about/key-management/contents+en.lrquestion.description)
+msgid ""
+"The directory authorities [provide a signed "
+"list](https://gitweb.torproject.org/torspec.git/tree/dir-spec.txt) of all "
+"the known relays, and in that list are a set of certificates from each relay"
+" (self-signed by their identity key) specifying their keys, locations, exit "
+"policies, and so on."
+msgstr ""
+
+#: https//support.torproject.org/about/key-management/
+#: (content/about/key-management/contents+en.lrquestion.description)
+msgid ""
+"So unless the adversary can control a majority of the directory authorities "
+"(as of 2021 there are 10 directory authorities), they can't trick the Tor "
+"client into using other Tor relays."
+msgstr ""
+
+#: https//support.torproject.org/about/key-management/
+#: (content/about/key-management/contents+en.lrquestion.description)
+msgid "How do clients know what the directory authorities are?"
+msgstr ""
+
+#: https//support.torproject.org/about/key-management/
+#: (content/about/key-management/contents+en.lrquestion.description)
+msgid ""
+"The Tor software comes with a built-in list of location and public key for "
+"each directory authority."
+msgstr ""
+
+#: https//support.torproject.org/about/key-management/
+#: (content/about/key-management/contents+en.lrquestion.description)
+msgid ""
+"So the only way to trick users into using a fake Tor network is to give them"
+" a specially modified version of the software."
+msgstr ""
+
+#: https//support.torproject.org/about/key-management/
+#: (content/about/key-management/contents+en.lrquestion.description)
+msgid "How do users know they've got the right software?"
+msgstr ""
+
+#: https//support.torproject.org/about/key-management/
+#: (content/about/key-management/contents+en.lrquestion.description)
+msgid ""
+"When we distribute the source code or a package, we digitally sign it with "
+"[GNU Privacy Guard](http://www.gnupg.org/). See the [instructions on how to "
+"check Tor Browser's signature](https://support.torproject.org/tbb/how-to-"
+"verify-signature/)."
+msgstr ""
+
+#: https//support.torproject.org/about/key-management/
+#: (content/about/key-management/contents+en.lrquestion.description)
+msgid ""
+"In order to be certain that it's really signed by us, you need to have met "
+"us in person and gotten a copy of our GPG key fingerprint, or you need to "
+"know somebody who has."
+msgstr ""
+
+#: https//support.torproject.org/about/key-management/
+#: (content/about/key-management/contents+en.lrquestion.description)
+msgid ""
+"If you're concerned about an attack on this level, we recommend you get "
+"involved with the security community and start meeting people."
+msgstr ""
+
#: https//support.torproject.org/about/no-data-scrubbing/
#: (content/about/no-data-scrubbing/contents+en.lrquestion.title)
msgid ""
@@ -2765,6 +3200,151 @@ msgid ""
"though."
msgstr ""
+#: https//support.torproject.org/about/protections/
+#: (content/about/protections/contents+en.lrquestion.title)
+msgid "What protections does Tor provide?"
+msgstr ""
+
+#: https//support.torproject.org/about/protections/
+#: (content/about/protections/contents+en.lrquestion.description)
+msgid ""
+"Internet communication is based on a store-and-forward model that can be "
+"understood in analogy to postal mail: Data is transmitted in blocks called "
+"IP datagrams or packets."
+msgstr ""
+
+#: https//support.torproject.org/about/protections/
+#: (content/about/protections/contents+en.lrquestion.description)
+msgid ""
+"Every packet includes a source IP address (of the sender) and a destination "
+"IP address (of the receiver), just as ordinary letters contain postal "
+"addresses of sender and receiver."
+msgstr ""
+
+#: https//support.torproject.org/about/protections/
+#: (content/about/protections/contents+en.lrquestion.description)
+msgid ""
+"The way from sender to receiver involves multiple hops of routers, where "
+"each router inspects the destination IP address and forwards the packet "
+"closer to its destination."
+msgstr ""
+
+#: https//support.torproject.org/about/protections/
+#: (content/about/protections/contents+en.lrquestion.description)
+msgid ""
+"Thus, every router between sender and receiver learns that the sender is "
+"communicating with the receiver."
+msgstr ""
+
+#: https//support.torproject.org/about/protections/
+#: (content/about/protections/contents+en.lrquestion.description)
+msgid ""
+"In particular, your local ISP is in the position to build a complete profile"
+" of your Internet usage."
+msgstr ""
+
+#: https//support.torproject.org/about/protections/
+#: (content/about/protections/contents+en.lrquestion.description)
+msgid ""
+"In addition, every server in the Internet that can see any of the packets "
+"can profile your behavior."
+msgstr ""
+
+#: https//support.torproject.org/about/protections/
+#: (content/about/protections/contents+en.lrquestion.description)
+msgid ""
+"The aim of Tor is to improve your privacy by sending your traffic through a "
+"series of proxies."
+msgstr ""
+
+#: https//support.torproject.org/about/protections/
+#: (content/about/protections/contents+en.lrquestion.description)
+msgid ""
+"Your communication is encrypted in multiple layers and routed via multiple "
+"hops through the Tor network to the final receiver."
+msgstr ""
+
+#: https//support.torproject.org/about/protections/
+#: (content/about/protections/contents+en.lrquestion.description)
+msgid ""
+"More details on this process can be found in this "
+"[visualization](https://support.torproject.org/https/https-1/)."
+msgstr ""
+
+#: https//support.torproject.org/about/protections/
+#: (content/about/protections/contents+en.lrquestion.description)
+msgid ""
+"Note that all your local ISP can observe now is that you are communicating "
+"with Tor nodes."
+msgstr ""
+
+#: https//support.torproject.org/about/protections/
+#: (content/about/protections/contents+en.lrquestion.description)
+msgid ""
+"Similarly, servers in the Internet just see that they are being contacted by"
+" Tor nodes."
+msgstr ""
+
+#: https//support.torproject.org/about/protections/
+#: (content/about/protections/contents+en.lrquestion.description)
+msgid "Generally speaking, Tor aims to solve three privacy problems:"
+msgstr ""
+
+#: https//support.torproject.org/about/protections/
+#: (content/about/protections/contents+en.lrquestion.description)
+msgid ""
+"First, Tor prevents websites and other services from learning your location,"
+" which they can use to build databases about your habits and interests."
+msgstr ""
+
+#: https//support.torproject.org/about/protections/
+#: (content/about/protections/contents+en.lrquestion.description)
+msgid ""
+"With Tor, your Internet connections don't give you away by default -- now "
+"you can have the ability to choose, for each connection, how much "
+"information to reveal."
+msgstr ""
+
+#: https//support.torproject.org/about/protections/
+#: (content/about/protections/contents+en.lrquestion.description)
+msgid ""
+"Second, Tor prevents people watching your traffic locally (such as your ISP "
+"or someone with access to your home wifi or router) from learning what "
+"information you're fetching and where you're fetching it from."
+msgstr ""
+
+#: https//support.torproject.org/about/protections/
+#: (content/about/protections/contents+en.lrquestion.description)
+msgid ""
+"It also stops them from deciding what you're allowed to learn and publish --"
+" if you can get to any part of the Tor network, you can reach any site on "
+"the Internet."
+msgstr ""
+
+#: https//support.torproject.org/about/protections/
+#: (content/about/protections/contents+en.lrquestion.description)
+msgid ""
+"Third, Tor routes your connection through more than one Tor relay so no "
+"single relay can learn what you're up to."
+msgstr ""
+
+#: https//support.torproject.org/about/protections/
+#: (content/about/protections/contents+en.lrquestion.description)
+msgid ""
+"Because these relays are run by different individuals or organizations, "
+"distributing trust provides more security than the old [one hop "
+"proxy](https://support.torproject.org/about/#how-is-tor-different-from-"
+"other-proxies) approach."
+msgstr ""
+
+#: https//support.torproject.org/about/protections/
+#: (content/about/protections/contents+en.lrquestion.description)
+msgid ""
+"Note, however, that there are situations where Tor fails to solve these "
+"privacy problems entirely: see the entry below on [remaining "
+"attacks](https://support.torproject.org/about/#attacks-on-onion-routing)."
+msgstr ""
+
#: https//support.torproject.org/about/what-is-tor/
#: (content/about/what-is-tor/contents+en.lrquestion.title)
msgid "What is Tor?"
@@ -5069,9 +5649,11 @@ msgstr ""
#: (content/tbb/tbb-47/contents+en.lrquestion.description)
msgid ""
"Also, read up on the HTTPProxyAuthenticator and HTTPSProxyAuthenticator "
-"options if your proxy requires auth. We only support basic auth currently, "
-"but if you need NTLM authentication, you may find [this post in the "
-"archives](https://archives.seul.org/or/talk/Jun-2005/msg00223.html) useful."
+"options if your [proxy requires auth.](https://developer.mozilla.org/en-"
+"US/docs/Web/HTTP/Headers/Proxy-Authenticate) We only support basic auth "
+"currently, but if you need NTLM authentication, you may find [this post in "
+"the archives](https://archives.seul.org/or/talk/Jun-2005/msg00223.html) "
+"useful."
msgstr ""
#: https//support.torproject.org/tbb/tbb-47/
@@ -5300,6 +5882,219 @@ msgid ""
"have no effect on Tor's configuration."
msgstr ""
+#: https//support.torproject.org/tbb/tbb-firewall-ports/
+#: (content/tbb/tbb-firewall-ports/contents+en.lrquestion.title)
+msgid "My firewall only allows a few outgoing ports"
+msgstr ""
+
+#: https//support.torproject.org/tbb/tbb-firewall-ports/
+#: (content/tbb/tbb-firewall-ports/contents+en.lrquestion.description)
+msgid ""
+"If your firewall works by blocking ports, then you can tell Tor to only use "
+"the ports when you start your Tor Browser."
+msgstr ""
+
+#: https//support.torproject.org/tbb/tbb-firewall-ports/
+#: (content/tbb/tbb-firewall-ports/contents+en.lrquestion.description)
+msgid ""
+"Or you can add the ports that your firewall permits by adding "
+"\"FascistFirewall 1\" to your torrc configuration file."
+msgstr ""
+
+#: https//support.torproject.org/tbb/tbb-firewall-ports/
+#: (content/tbb/tbb-firewall-ports/contents+en.lrquestion.description)
+msgid ""
+"By default, when you set this Tor assumes that your firewall allows only "
+"port 80 and port 443 (HTTP and HTTPS respectively)."
+msgstr ""
+
+#: https//support.torproject.org/tbb/tbb-firewall-ports/
+#: (content/tbb/tbb-firewall-ports/contents+en.lrquestion.description)
+msgid ""
+"You can select a different set of ports with the FirewallPorts torrc option."
+msgstr ""
+
+#: https//support.torproject.org/tbb/tbb-firewall-ports/
+#: (content/tbb/tbb-firewall-ports/contents+en.lrquestion.description)
+msgid ""
+"If you want to be more fine-grained with your controls, you can also use the"
+" ReachableAddresses config options, e.g.:"
+msgstr ""
+
+#: https//support.torproject.org/tbb/tbb-firewall-ports/
+#: (content/tbb/tbb-firewall-ports/contents+en.lrquestion.description)
+#: https//support.torproject.org/tbb/tbb-install-tor-central-server/
+#: (content/tbb/tbb-install-tor-central-server/contents+en.lrquestion.description)
+#: https//support.torproject.org/operators/default-exit-ports/
+#: (content/operators/default-exit-ports/contents+en.lrquestion.description)
+#: https//support.torproject.org/operators/hibernation/
+#: (content/operators/hibernation/contents+en.lrquestion.description)
+#: https//support.torproject.org/operators/limit-total-bandwidth/
+#: (content/operators/limit-total-bandwidth/contents+en.lrquestion.description)
+#: https//support.torproject.org/misc/bug-or-feedback/
+#: (content/misc/bug-or-feedback/contents+en.lrquestion.description)
+#: https//support.torproject.org/get-in-touch/why-i-cant-join-tor-channels/
+#: (content/get-in-touch/why-i-cant-join-tor-channels/contents+en.lrquestion.description)
+#: https//support.torproject.org/apt/tor-deb-repo/
+#: (content/apt/apt-1/contents+en.lrquestion.description)
+#: https//support.torproject.org/apt/apt-over-tor/
+#: (content/apt/apt-3/contents+en.lrquestion.description)
+msgid "```"
+msgstr ""
+
+#: https//support.torproject.org/tbb/tbb-firewall-ports/
+#: (content/tbb/tbb-firewall-ports/contents+en.lrquestion.description)
+msgid "ReachableDirAddresses *:80"
+msgstr ""
+
+#: https//support.torproject.org/tbb/tbb-firewall-ports/
+#: (content/tbb/tbb-firewall-ports/contents+en.lrquestion.description)
+msgid "ReachableORAddresses *:443"
+msgstr ""
+
+#: https//support.torproject.org/tbb/tbb-install-tor-central-server/
+#: (content/tbb/tbb-install-tor-central-server/contents+en.lrquestion.title)
+msgid ""
+"Can I install Tor on a central server, and have my clients connect to it?"
+msgstr ""
+
+#: https//support.torproject.org/tbb/tbb-install-tor-central-server/
+#: (content/tbb/tbb-install-tor-central-server/contents+en.lrquestion.description)
+msgid ""
+"Yes. Tor can be configured as a client or a relay on another machine, and "
+"allow other machines to be able to connect to it for anonymity."
+msgstr ""
+
+#: https//support.torproject.org/tbb/tbb-install-tor-central-server/
+#: (content/tbb/tbb-install-tor-central-server/contents+en.lrquestion.description)
+msgid ""
+"This is most useful in an environment where many computers want a gateway of"
+" anonymity to the rest of the world."
+msgstr ""
+
+#: https//support.torproject.org/tbb/tbb-install-tor-central-server/
+#: (content/tbb/tbb-install-tor-central-server/contents+en.lrquestion.description)
+msgid ""
+"However, be forewarned that with this configuration, anyone within your "
+"private network (existing between you and the Tor client/relay) can see what"
+" traffic you are sending in clear text."
+msgstr ""
+
+#: https//support.torproject.org/tbb/tbb-install-tor-central-server/
+#: (content/tbb/tbb-install-tor-central-server/contents+en.lrquestion.description)
+msgid "The anonymity doesn't start until you get to the Tor relay."
+msgstr ""
+
+#: https//support.torproject.org/tbb/tbb-install-tor-central-server/
+#: (content/tbb/tbb-install-tor-central-server/contents+en.lrquestion.description)
+msgid ""
+"Because of this, if you are the controller of your domain and you know "
+"everything's locked down, you will be OK, but this configuration may not be "
+"suitable for large private networks where security is key all around."
+msgstr ""
+
+#: https//support.torproject.org/tbb/tbb-install-tor-central-server/
+#: (content/tbb/tbb-install-tor-central-server/contents+en.lrquestion.description)
+msgid ""
+"Configuration is simple, editing your torrc file's SocksListenAddress "
+"according to the following examples:"
+msgstr ""
+
+#: https//support.torproject.org/tbb/tbb-install-tor-central-server/
+#: (content/tbb/tbb-install-tor-central-server/contents+en.lrquestion.description)
+msgid "SocksListenAddress 127.0.0.1"
+msgstr ""
+
+#: https//support.torproject.org/tbb/tbb-install-tor-central-server/
+#: (content/tbb/tbb-install-tor-central-server/contents+en.lrquestion.description)
+msgid "SocksListenAddress 192.168.x.x:9100"
+msgstr ""
+
+#: https//support.torproject.org/tbb/tbb-install-tor-central-server/
+#: (content/tbb/tbb-install-tor-central-server/contents+en.lrquestion.description)
+msgid "SocksListenAddress 0.0.0.0:9100"
+msgstr ""
+
+#: https//support.torproject.org/tbb/tbb-install-tor-central-server/
+#: (content/tbb/tbb-install-tor-central-server/contents+en.lrquestion.description)
+msgid ""
+"You can state multiple listen addresses, in the case that you are part of "
+"several networks or subnets."
+msgstr ""
+
+#: https//support.torproject.org/tbb/tbb-install-tor-central-server/
+#: (content/tbb/tbb-install-tor-central-server/contents+en.lrquestion.description)
+msgid "SocksListenAddress 192.168.x.x:9100 #eth0"
+msgstr ""
+
+#: https//support.torproject.org/tbb/tbb-install-tor-central-server/
+#: (content/tbb/tbb-install-tor-central-server/contents+en.lrquestion.description)
+msgid "SocksListenAddress 10.x.x.x:9100 #eth1"
+msgstr ""
+
+#: https//support.torproject.org/tbb/tbb-install-tor-central-server/
+#: (content/tbb/tbb-install-tor-central-server/contents+en.lrquestion.description)
+msgid ""
+"After this, your clients on their respective networks/subnets would specify "
+"a socks proxy with the address and port you specified SocksListenAddress to "
+"be."
+msgstr ""
+
+#: https//support.torproject.org/tbb/tbb-install-tor-central-server/
+#: (content/tbb/tbb-install-tor-central-server/contents+en.lrquestion.description)
+msgid ""
+"Please note that the SocksPort configuration option gives the port ONLY for "
+"localhost (127.0.0.1)."
+msgstr ""
+
+#: https//support.torproject.org/tbb/tbb-install-tor-central-server/
+#: (content/tbb/tbb-install-tor-central-server/contents+en.lrquestion.description)
+msgid ""
+"When setting up your SocksListenAddress(es), you need to give the port with "
+"the address, as shown above."
+msgstr ""
+
+#: https//support.torproject.org/tbb/tbb-install-tor-central-server/
+#: (content/tbb/tbb-install-tor-central-server/contents+en.lrquestion.description)
+msgid ""
+"If you are interested in forcing all outgoing data through the central Tor "
+"client/relay, instead of the server only being an optional proxy, you may "
+"find the program iptables (for *nix) useful."
+msgstr ""
+
+#: https//support.torproject.org/tbb/tbb-run-client-different-computer/
+#: (content/tbb/tbb-run-client-different-computer/contents+en.lrquestion.title)
+msgid ""
+"I want to run my Tor client on a different computer than my applications"
+msgstr ""
+
+#: https//support.torproject.org/tbb/tbb-run-client-different-computer/
+#: (content/tbb/tbb-run-client-different-computer/contents+en.lrquestion.description)
+msgid ""
+"By default, your Tor client only listens for applications that connect from "
+"localhost."
+msgstr ""
+
+#: https//support.torproject.org/tbb/tbb-run-client-different-computer/
+#: (content/tbb/tbb-run-client-different-computer/contents+en.lrquestion.description)
+msgid "Connections from other computers are refused."
+msgstr ""
+
+#: https//support.torproject.org/tbb/tbb-run-client-different-computer/
+#: (content/tbb/tbb-run-client-different-computer/contents+en.lrquestion.description)
+msgid ""
+"If you want to torify applications on different computers than the Tor "
+"client, you should edit your torrc to define `SocksListenAddress 0.0.0.0` "
+"and then restart (or hup) Tor."
+msgstr ""
+
+#: https//support.torproject.org/tbb/tbb-run-client-different-computer/
+#: (content/tbb/tbb-run-client-different-computer/contents+en.lrquestion.description)
+msgid ""
+"If you want to get more advanced, you can configure your Tor client on a "
+"firewall to bind to your internal IP but not your external IP."
+msgstr ""
+
#: https//support.torproject.org/tbb/website-blocking-tor/
#: (content/tbb/website-blocking-tor/contents+en.lrquestion.title)
msgid "A website I am trying to reach is blocking access over Tor."
@@ -6867,6 +7662,130 @@ msgid ""
"guide."
msgstr ""
+#: https//support.torproject.org/operators/default-exit-ports/
+#: (content/operators/default-exit-ports/contents+en.lrquestion.title)
+msgid "Is there a list of default exit ports?"
+msgstr ""
+
+#: https//support.torproject.org/operators/default-exit-ports/
+#: (content/operators/default-exit-ports/contents+en.lrquestion.description)
+msgid ""
+"The default open ports are listed below but keep in mind that, any port or "
+"ports can be opened by the relay operator by configuring it in torrc or "
+"modifying the source code."
+msgstr ""
+
+#: https//support.torproject.org/operators/default-exit-ports/
+#: (content/operators/default-exit-ports/contents+en.lrquestion.description)
+msgid ""
+"The default according to src/or/policies.c ([line 85][1] and [line 1901][2])"
+" from the source code release [release-0.4.6][3]:"
+msgstr ""
+
+#: https//support.torproject.org/operators/default-exit-ports/
+#: (content/operators/default-exit-ports/contents+en.lrquestion.description)
+msgid "reject 0.0.0.0/8"
+msgstr ""
+
+#: https//support.torproject.org/operators/default-exit-ports/
+#: (content/operators/default-exit-ports/contents+en.lrquestion.description)
+msgid "reject 169.254.0.0/16"
+msgstr ""
+
+#: https//support.torproject.org/operators/default-exit-ports/
+#: (content/operators/default-exit-ports/contents+en.lrquestion.description)
+msgid "reject 127.0.0.0/8"
+msgstr ""
+
+#: https//support.torproject.org/operators/default-exit-ports/
+#: (content/operators/default-exit-ports/contents+en.lrquestion.description)
+msgid "reject 192.168.0.0/16"
+msgstr ""
+
+#: https//support.torproject.org/operators/default-exit-ports/
+#: (content/operators/default-exit-ports/contents+en.lrquestion.description)
+msgid "reject 10.0.0.0/8"
+msgstr ""
+
+#: https//support.torproject.org/operators/default-exit-ports/
+#: (content/operators/default-exit-ports/contents+en.lrquestion.description)
+msgid "reject 172.16.0.0/12"
+msgstr ""
+
+#: https//support.torproject.org/operators/default-exit-ports/
+#: (content/operators/default-exit-ports/contents+en.lrquestion.description)
+msgid "reject *:25"
+msgstr ""
+
+#: https//support.torproject.org/operators/default-exit-ports/
+#: (content/operators/default-exit-ports/contents+en.lrquestion.description)
+msgid "reject *:119"
+msgstr ""
+
+#: https//support.torproject.org/operators/default-exit-ports/
+#: (content/operators/default-exit-ports/contents+en.lrquestion.description)
+msgid "reject *:135-139"
+msgstr ""
+
+#: https//support.torproject.org/operators/default-exit-ports/
+#: (content/operators/default-exit-ports/contents+en.lrquestion.description)
+msgid "reject *:445"
+msgstr ""
+
+#: https//support.torproject.org/operators/default-exit-ports/
+#: (content/operators/default-exit-ports/contents+en.lrquestion.description)
+msgid "reject *:563"
+msgstr ""
+
+#: https//support.torproject.org/operators/default-exit-ports/
+#: (content/operators/default-exit-ports/contents+en.lrquestion.description)
+msgid "reject *:1214"
+msgstr ""
+
+#: https//support.torproject.org/operators/default-exit-ports/
+#: (content/operators/default-exit-ports/contents+en.lrquestion.description)
+msgid "reject *:4661-4666"
+msgstr ""
+
+#: https//support.torproject.org/operators/default-exit-ports/
+#: (content/operators/default-exit-ports/contents+en.lrquestion.description)
+msgid "reject *:6346-6429"
+msgstr ""
+
+#: https//support.torproject.org/operators/default-exit-ports/
+#: (content/operators/default-exit-ports/contents+en.lrquestion.description)
+msgid "reject *:6699"
+msgstr ""
+
+#: https//support.torproject.org/operators/default-exit-ports/
+#: (content/operators/default-exit-ports/contents+en.lrquestion.description)
+msgid "reject *:6881-6999"
+msgstr ""
+
+#: https//support.torproject.org/operators/default-exit-ports/
+#: (content/operators/default-exit-ports/contents+en.lrquestion.description)
+msgid "accept *:*"
+msgstr ""
+
+#: https//support.torproject.org/operators/default-exit-ports/
+#: (content/operators/default-exit-ports/contents+en.lrquestion.description)
+msgid ""
+"[1]: "
+"https://gitlab.torproject.org/tpo/core/tor/-/blob/release-0.4.6/src/core/or/policies.c#L85"
+msgstr ""
+
+#: https//support.torproject.org/operators/default-exit-ports/
+#: (content/operators/default-exit-ports/contents+en.lrquestion.description)
+msgid ""
+"[2]: "
+"https://gitlab.torproject.org/tpo/core/tor/-/blob/release-0.4.6/src/core/or/policies.c#L1901"
+msgstr ""
+
+#: https//support.torproject.org/operators/default-exit-ports/
+#: (content/operators/default-exit-ports/contents+en.lrquestion.description)
+msgid "[3]: https://gitlab.torproject.org/tpo/core/tor/-/tree/release-0.4.6/"
+msgstr ""
+
#: https//support.torproject.org/operators/dynamic-ip/
#: (content/operators/dynamic-ip/contents+en.lrquestion.title)
msgid "Can I run a Tor relay using a dynamic IP address?"
@@ -7014,21 +7933,6 @@ msgid ""
"into hibernation, signaled by this entry in the log:"
msgstr ""
-#: https//support.torproject.org/operators/hibernation/
-#: (content/operators/hibernation/contents+en.lrquestion.description)
-#: https//support.torproject.org/operators/limit-total-bandwidth/
-#: (content/operators/limit-total-bandwidth/contents+en.lrquestion.description)
-#: https//support.torproject.org/misc/bug-or-feedback/
-#: (content/misc/bug-or-feedback/contents+en.lrquestion.description)
-#: https//support.torproject.org/get-in-touch/why-i-cant-join-tor-channels/
-#: (content/get-in-touch/why-i-cant-join-tor-channels/contents+en.lrquestion.description)
-#: https//support.torproject.org/apt/tor-deb-repo/
-#: (content/apt/apt-1/contents+en.lrquestion.description)
-#: https//support.torproject.org/apt/apt-over-tor/
-#: (content/apt/apt-3/contents+en.lrquestion.description)
-msgid "```"
-msgstr ""
-
#: https//support.torproject.org/operators/hibernation/
#: (content/operators/hibernation/contents+en.lrquestion.description)
msgid "Bandwidth soft limit reached; commencing hibernation."
@@ -9301,6 +10205,131 @@ msgstr ""
msgid "sub 4096R/C00942E4 2017-03-13"
msgstr ""
+#: https//support.torproject.org/misc/check-socks-dns-leaks/
+#: (content/misc/check-socks-dns-leaks/contents+en.lrquestion.title)
+msgid ""
+"How do I check if my application that uses SOCKS is leaking DNS requests?"
+msgstr ""
+
+#: https//support.torproject.org/misc/check-socks-dns-leaks/
+#: (content/misc/check-socks-dns-leaks/contents+en.lrquestion.description)
+msgid ""
+"Even if your application is using the correct variant of the SOCKS protocol,"
+" there is still a risk that it could be leaking DNS queries."
+msgstr ""
+
+#: https//support.torproject.org/misc/check-socks-dns-leaks/
+#: (content/misc/check-socks-dns-leaks/contents+en.lrquestion.description)
+msgid ""
+"This problem happens in Firefox extensions that resolve the destination "
+"hostname themselves, for example to show you its IP address, what country "
+"it's in, etc."
+msgstr ""
+
+#: https//support.torproject.org/misc/check-socks-dns-leaks/
+#: (content/misc/check-socks-dns-leaks/contents+en.lrquestion.description)
+msgid ""
+"If you suspect your application might behave like this, follow the "
+"instructions below to check."
+msgstr ""
+
+#: https//support.torproject.org/misc/check-socks-dns-leaks/
+#: (content/misc/check-socks-dns-leaks/contents+en.lrquestion.description)
+msgid ""
+"1. Add `TestSocks 1` to your [torrc file](https://support.torproject.org/tbb"
+"/tbb-editing-torrc/)."
+msgstr ""
+
+#: https//support.torproject.org/misc/check-socks-dns-leaks/
+#: (content/misc/check-socks-dns-leaks/contents+en.lrquestion.description)
+msgid ""
+"1. Start Tor, and point your program's SOCKS proxy settings to Tor's SOCKS5 "
+"server (`socks5://127.0.0.1:9050` by default)."
+msgstr ""
+
+#: https//support.torproject.org/misc/check-socks-dns-leaks/
+#: (content/misc/check-socks-dns-leaks/contents+en.lrquestion.description)
+msgid ""
+"1. Watch your logs as you use your application. For each socks connection, "
+"Tor will log a `notice` for safe connections, and a `warn` for connections "
+"leaking DNS requests."
+msgstr ""
+
+#: https//support.torproject.org/misc/check-socks-dns-leaks/
+#: (content/misc/check-socks-dns-leaks/contents+en.lrquestion.description)
+msgid ""
+"If you want to automatically disable all connections leaking DNS requests, "
+"set `SafeSocks 1` in your torrc file."
+msgstr ""
+
+#: https//support.torproject.org/misc/hide-exits/
+#: (content/misc/hide-exits/contents+en.lrquestion.title)
+msgid ""
+"You should hide the list of Tor relays, so people can't block the exits."
+msgstr ""
+
+#: https//support.torproject.org/misc/hide-exits/
+#: (content/misc/hide-exits/contents+en.lrquestion.description)
+msgid "There are a few reasons we don't:"
+msgstr ""
+
+#: https//support.torproject.org/misc/hide-exits/
+#: (content/misc/hide-exits/contents+en.lrquestion.description)
+msgid ""
+"1. We can't help but make the information available, since Tor clients need "
+"to use it to pick their paths."
+msgstr ""
+
+#: https//support.torproject.org/misc/hide-exits/
+#: (content/misc/hide-exits/contents+en.lrquestion.description)
+msgid "So if the \"blockers\" want it, they can get it anyway."
+msgstr ""
+
+#: https//support.torproject.org/misc/hide-exits/
+#: (content/misc/hide-exits/contents+en.lrquestion.description)
+msgid ""
+"Further, even if we didn't tell clients about the list of relays directly, "
+"somebody could still make a lot of connections through Tor to a test site "
+"and build a list of the addresses they see."
+msgstr ""
+
+#: https//support.torproject.org/misc/hide-exits/
+#: (content/misc/hide-exits/contents+en.lrquestion.description)
+msgid ""
+"1. If people want to block us, we believe that they should be allowed to do "
+"so."
+msgstr ""
+
+#: https//support.torproject.org/misc/hide-exits/
+#: (content/misc/hide-exits/contents+en.lrquestion.description)
+msgid ""
+"Obviously, we would prefer for everybody to allow Tor users to connect to "
+"them, but people have the right to decide who their services should allow "
+"connections from, and if they want to block anonymous users, they can."
+msgstr ""
+
+#: https//support.torproject.org/misc/hide-exits/
+#: (content/misc/hide-exits/contents+en.lrquestion.description)
+msgid ""
+"1. Being blockable also has tactical advantages: it may be a persuasive "
+"response to website maintainers who feel threatened by Tor."
+msgstr ""
+
+#: https//support.torproject.org/misc/hide-exits/
+#: (content/misc/hide-exits/contents+en.lrquestion.description)
+msgid ""
+"Giving them the option may inspire them to stop and think about whether they"
+" really want to eliminate private access to their system, and if not, what "
+"other options they might have."
+msgstr ""
+
+#: https//support.torproject.org/misc/hide-exits/
+#: (content/misc/hide-exits/contents+en.lrquestion.description)
+msgid ""
+"The time they might otherwise have spent blocking Tor, they may instead "
+"spend rethinking their overall approach to privacy and anonymity."
+msgstr ""
+
#: https//support.torproject.org/misc/menu/
#: (content/misc/menu/contents+en.lrquestion.description)
msgid "About"
@@ -9935,56 +10964,20 @@ msgstr ""
#: https//support.torproject.org/get-in-touch/why-i-cant-join-tor-channels/
#: (content/get-in-touch/why-i-cant-join-tor-channels/contents+en.lrquestion.description)
msgid ""
-"Then, to complete the registration and ultimately gain access to the #tor-"
-"project channel, your nickname must be **verified**."
-msgstr ""
-
-#: https//support.torproject.org/get-in-touch/why-i-cant-join-tor-channels/
-#: (content/get-in-touch/why-i-cant-join-tor-channels/contents+en.lrquestion.description)
-msgid ""
-"1. To verify your nick, open a new browser window and go to "
-"https://webchat.oftc.net/?channels=tor."
-msgstr ""
-
-#: https//support.torproject.org/get-in-touch/why-i-cant-join-tor-channels/
-#: (content/get-in-touch/why-i-cant-join-tor-channels/contents+en.lrquestion.description)
-msgid "2. Log in with your IRC nickname and password."
-msgstr ""
-
-#: https//support.torproject.org/get-in-touch/why-i-cant-join-tor-channels/
-#: (content/get-in-touch/why-i-cant-join-tor-channels/contents+en.lrquestion.description)
-msgid ""
-"3. Look for the word **verify** and log in there. It may appear that nothing"
-" has happened. Look at the top of the page, and there will be a column "
-"called **Account**."
-msgstr ""
-
-#: https//support.torproject.org/get-in-touch/why-i-cant-join-tor-channels/
-#: (content/get-in-touch/why-i-cant-join-tor-channels/contents+en.lrquestion.description)
-msgid "4. Click on **Account**."
-msgstr ""
-
-#: https//support.torproject.org/get-in-touch/why-i-cant-join-tor-channels/
-#: (content/get-in-touch/why-i-cant-join-tor-channels/contents+en.lrquestion.description)
-msgid ""
-"5. Click on the small sentence at the bottom of the square that says: Verify"
-" account."
-msgstr ""
-
-#: https//support.torproject.org/get-in-touch/why-i-cant-join-tor-channels/
-#: (content/get-in-touch/why-i-cant-join-tor-channels/contents+en.lrquestion.description)
-msgid "6. Fill out the Captcha that pops up, and click ok."
+"After registering your nickname, to gain access to the #tor-project and "
+"other protected channels, your nickname must be **verified**."
msgstr ""
#: https//support.torproject.org/get-in-touch/why-i-cant-join-tor-channels/
#: (content/get-in-touch/why-i-cant-join-tor-channels/contents+en.lrquestion.description)
msgid ""
-"7. A tiny message will appear: \"Your NickServ account has been verified.\""
+"1. Go to https://services.oftc.net/ and follow the steps in the '*To verify "
+"your account*' section"
msgstr ""
#: https//support.torproject.org/get-in-touch/why-i-cant-join-tor-channels/
#: (content/get-in-touch/why-i-cant-join-tor-channels/contents+en.lrquestion.description)
-msgid "8. Go back to the IRC webpage where you are logged in and type:"
+msgid "2. Go back to the IRC webpage where you are logged in and type:"
msgstr ""
#: https//support.torproject.org/get-in-touch/why-i-cant-join-tor-channels/
@@ -9994,12 +10987,12 @@ msgstr ""
#: https//support.torproject.org/get-in-touch/why-i-cant-join-tor-channels/
#: (content/get-in-touch/why-i-cant-join-tor-channels/contents+en.lrquestion.description)
-msgid "9. Click ENTER."
+msgid "3. Click ENTER."
msgstr ""
#: https//support.torproject.org/get-in-touch/why-i-cant-join-tor-channels/
#: (content/get-in-touch/why-i-cant-join-tor-channels/contents+en.lrquestion.description)
-msgid "10. If all is well, you will receive a message that says:"
+msgid "4. If all is well, you will receive a message that says:"
msgstr ""
#: https//support.torproject.org/get-in-touch/why-i-cant-join-tor-channels/
@@ -10140,18 +11133,22 @@ msgstr ""
#: https//support.torproject.org/apt/tor-deb-repo/
#: (content/apt/apt-1/contents+en.lrquestion.description)
msgid ""
-"#### 2. Add the following entries to `/etc/apt/sources.list` or a new file "
-"in `/etc/apt/sources.list.d/`"
+"#### 2. Create a new file in `/etc/apt/sources.list.d/` named `tor.list`. "
+"Add the following entries:"
msgstr ""
#: https//support.torproject.org/apt/tor-deb-repo/
#: (content/apt/apt-1/contents+en.lrquestion.description)
-msgid "deb https://deb.torproject.org/torproject.org <DISTRIBUTION> main"
+msgid ""
+"deb [signed-by=/usr/share/keyrings/tor-archive-keyring.gpg] "
+"https://deb.torproject.org/torproject.org <DISTRIBUTION> main"
msgstr ""
#: https//support.torproject.org/apt/tor-deb-repo/
#: (content/apt/apt-1/contents+en.lrquestion.description)
-msgid "deb-src https://deb.torproject.org/torproject.org <DISTRIBUTION> main"
+msgid ""
+"deb-src [signed-by=/usr/share/keyrings/tor-archive-keyring.gpg] "
+"https://deb.torproject.org/torproject.org <DISTRIBUTION> main"
msgstr ""
#: https//support.torproject.org/apt/tor-deb-repo/
@@ -10165,14 +11162,16 @@ msgstr ""
#: https//support.torproject.org/apt/tor-deb-repo/
#: (content/apt/apt-1/contents+en.lrquestion.description)
msgid ""
-"deb https://deb.torproject.org/torproject.org tor-"
+"deb [signed-by=/usr/share/keyrings/tor-archive-keyring.gpg] "
+"https://deb.torproject.org/torproject.org tor-"
"experimental-0.4.6.x-<DISTRIBUTION> main"
msgstr ""
#: https//support.torproject.org/apt/tor-deb-repo/
#: (content/apt/apt-1/contents+en.lrquestion.description)
msgid ""
-"deb-src https://deb.torproject.org/torproject.org tor-"
+"deb-src [signed-by=/usr/share/keyrings/tor-archive-keyring.gpg] "
+"https://deb.torproject.org/torproject.org tor-"
"experimental-0.4.6.x-<DISTRIBUTION> main"
msgstr ""
@@ -10184,15 +11183,17 @@ msgstr ""
#: https//support.torproject.org/apt/tor-deb-repo/
#: (content/apt/apt-1/contents+en.lrquestion.description)
msgid ""
-"deb https://deb.torproject.org/torproject.org tor-nightly-"
-"master-<DISTRIBUTION> main"
+"deb [signed-by=/usr/share/keyrings/tor-archive-keyring.gpg] "
+"https://deb.torproject.org/torproject.org tor-nightly-master-<DISTRIBUTION> "
+"main"
msgstr ""
#: https//support.torproject.org/apt/tor-deb-repo/
#: (content/apt/apt-1/contents+en.lrquestion.description)
msgid ""
-"deb-src https://deb.torproject.org/torproject.org tor-nightly-"
-"master-<DISTRIBUTION> main"
+"deb-src [signed-by=/usr/share/keyrings/tor-archive-keyring.gpg] "
+"https://deb.torproject.org/torproject.org tor-nightly-master-<DISTRIBUTION> "
+"main"
msgstr ""
#: https//support.torproject.org/apt/tor-deb-repo/
@@ -10213,13 +11214,15 @@ msgstr ""
#: https//support.torproject.org/apt/tor-deb-repo/
#: (content/apt/apt-1/contents+en.lrquestion.description)
msgid ""
-"deb [arch=amd64] https://deb.torproject.org/torproject.org focal main"
+"deb [arch=amd64 signed-by=/usr/share/keyrings/tor-archive-keyring.gpg] "
+"https://deb.torproject.org/torproject.org focal main"
msgstr ""
#: https//support.torproject.org/apt/tor-deb-repo/
#: (content/apt/apt-1/contents+en.lrquestion.description)
msgid ""
-"deb-src [arch=amd64] https://deb.torproject.org/torproject.org focal main"
+"deb-src [arch=amd64 signed-by=/usr/share/keyrings/tor-archive-keyring.gpg] "
+"https://deb.torproject.org/torproject.org focal main"
msgstr ""
#: https//support.torproject.org/apt/tor-deb-repo/
@@ -10239,21 +11242,16 @@ msgstr ""
#: (content/apt/apt-1/contents+en.lrquestion.description)
msgid ""
"#### 3. Then add the gpg key used to sign the packages by running the "
-"following commands at your command prompt"
+"following command at your command prompt:"
msgstr ""
#: https//support.torproject.org/apt/tor-deb-repo/
#: (content/apt/apt-1/contents+en.lrquestion.description)
msgid ""
-"# wget -qO- "
+"# wget -O- "
"https://deb.torproject.org/torproject.org/A3C4F0F979CAA22CDBA8F512EE8CBC9E886DDD89.asc"
-" | gpg --import"
-msgstr ""
-
-#: https//support.torproject.org/apt/tor-deb-repo/
-#: (content/apt/apt-1/contents+en.lrquestion.description)
-msgid ""
-"# gpg --export A3C4F0F979CAA22CDBA8F512EE8CBC9E886DDD89 | apt-key add -"
+" | gpg --dearmor | tee /usr/share/keyrings/tor-archive-keyring.gpg "
+">/dev/null"
msgstr ""
#: https//support.torproject.org/apt/tor-deb-repo/
@@ -11860,6 +12858,82 @@ msgid ""
"doesn't change IP address over the day."
msgstr ""
+#: https//support.torproject.org/alternate-designs/block-websites/
+#: (content/alternate-designs/block-websites/contents+en.lrquestion.title)
+msgid "Exit policies should be able to block websites, not just IP addresses."
+msgstr ""
+
+#: https//support.torproject.org/alternate-designs/block-websites/
+#: (content/alternate-designs/block-websites/contents+en.lrquestion.description)
+msgid ""
+"It would be nice to let relay operators say things like `reject "
+"www.slashdot.org` in their exit policies, rather than requiring them to "
+"learn all the IP address space that could be covered by the site (and then "
+"also blocking other sites at those IP addresses)."
+msgstr ""
+
+#: https//support.torproject.org/alternate-designs/block-websites/
+#: (content/alternate-designs/block-websites/contents+en.lrquestion.description)
+msgid "There are two problems, though."
+msgstr ""
+
+#: https//support.torproject.org/alternate-designs/block-websites/
+#: (content/alternate-designs/block-websites/contents+en.lrquestion.description)
+msgid "First, users could still get around these blocks."
+msgstr ""
+
+#: https//support.torproject.org/alternate-designs/block-websites/
+#: (content/alternate-designs/block-websites/contents+en.lrquestion.description)
+msgid ""
+"For example, they could request the IP address rather than the hostname when"
+" they exit from the Tor network."
+msgstr ""
+
+#: https//support.torproject.org/alternate-designs/block-websites/
+#: (content/alternate-designs/block-websites/contents+en.lrquestion.description)
+msgid ""
+"This means operators would still need to learn all the IP addresses for the "
+"destinations in question."
+msgstr ""
+
+#: https//support.torproject.org/alternate-designs/block-websites/
+#: (content/alternate-designs/block-websites/contents+en.lrquestion.description)
+msgid ""
+"The second problem is that it would allow remote attackers to censor "
+"arbitrary sites."
+msgstr ""
+
+#: https//support.torproject.org/alternate-designs/block-websites/
+#: (content/alternate-designs/block-websites/contents+en.lrquestion.description)
+msgid ""
+"For example, if a Tor operator blocks www1.slashdot.org, and then some "
+"attacker poisons the Tor relay's DNS or otherwise changes that hostname to "
+"resolve to the IP address for a major news site, then suddenly that Tor "
+"relay is blocking the news site."
+msgstr ""
+
+#: https//support.torproject.org/alternate-designs/let-the-network-pick-the-path/
+#: (content/alternate-designs/let-the-network-pick-the-path/contents+en.lrquestion.title)
+msgid "You should let the network pick the path, not the client."
+msgstr ""
+
+#: https//support.torproject.org/alternate-designs/let-the-network-pick-the-path/
+#: (content/alternate-designs/let-the-network-pick-the-path/contents+en.lrquestion.description)
+msgid "No, you cannot trust the network to pick the path."
+msgstr ""
+
+#: https//support.torproject.org/alternate-designs/let-the-network-pick-the-path/
+#: (content/alternate-designs/let-the-network-pick-the-path/contents+en.lrquestion.description)
+msgid "Malicious relays could route you through their colluding friends."
+msgstr ""
+
+#: https//support.torproject.org/alternate-designs/let-the-network-pick-the-path/
+#: (content/alternate-designs/let-the-network-pick-the-path/contents+en.lrquestion.description)
+msgid ""
+"This would give an adversary the ability to watch all of your traffic end to"
+" end."
+msgstr ""
+
#: lego/templates/banner.html:3 lego/templates/banner.html:5
#: templates/banner.html:3 templates/banner.html:5
msgid "Close banner"
@@ -11890,8 +12964,8 @@ msgid "DONATE NOW"
msgstr ""
#: lego/templates/footer.html:13 lego/templates/footer.html:22
-#: lego/templates/navbar.html:83 templates/footer.html:13
-#: templates/footer.html:22 templates/navbar.html:83
+#: lego/templates/navbar.html:95 templates/footer.html:13
+#: templates/footer.html:22 templates/navbar.html:95
msgid "Download Tor Browser"
msgstr "Ãoslódáil Brabhsálaà Tor"
diff --git a/contents+he.po b/contents+he.po
index 6e87f2cd8c..85079c321b 100644
--- a/contents+he.po
+++ b/contents+he.po
@@ -12,7 +12,7 @@ msgid ""
msgstr ""
"Project-Id-Version: PACKAGE VERSION\n"
"Report-Msgid-Bugs-To: \n"
-"POT-Creation-Date: 2021-08-25 11:14+CET\n"
+"POT-Creation-Date: 2021-09-01 12:20+CET\n"
"PO-Revision-Date: 2018-10-02 22:41+0000\n"
"Last-Translator: Zeev Shilor <zshilor at gmail.com>, 2021\n"
"Language-Team: Hebrew (https://www.transifex.com/otf/teams/1519/he/)\n"
@@ -145,6 +145,11 @@ msgstr ""
msgid "Tor Metrics"
msgstr ""
+#: https//support.torproject.org/alternate-designs/
+#: (content/alternate-designs/contents+en.lrtopic.title)
+msgid "Alternate Designs We Don't Do (Yet)"
+msgstr ""
+
#: https//support.torproject.org/glossary/add-on-extension-or-plugin/
#: (content/glossary/add-on-extension-or-plugin/contents+en.lrword.term)
msgid "add-on, extension, or plugin"
@@ -2034,6 +2039,61 @@ msgid ""
"wiki](https://trac.torproject.org/projects/tor/wiki/doc/TorPlusVPN)."
msgstr ""
+#: https//support.torproject.org/faq/relay-donations/
+#: (content/faq/relay-donations/contents+en.lrquestion.title)
+msgid "Can I donate for a relay rather than run my own?"
+msgstr ""
+
+#: https//support.torproject.org/faq/relay-donations/
+#: (content/faq/relay-donations/contents+en.lrquestion.description)
+msgid ""
+"Sure! We have a [list of organizations that run Tor "
+"relays](https://community.torproject.org/relay/community-resources/relay-"
+"associations/) that are happy to turn your donations into better speed and "
+"anonymity for the Tor network."
+msgstr ""
+
+#: https//support.torproject.org/faq/relay-donations/
+#: (content/faq/relay-donations/contents+en.lrquestion.description)
+msgid ""
+"These organizations are not the same as [The Tor Project, "
+"Inc](https://donate.torproject.org/), but we consider that a good thing."
+msgstr ""
+
+#: https//support.torproject.org/faq/relay-donations/
+#: (content/faq/relay-donations/contents+en.lrquestion.description)
+msgid "They're run by nice people who are part of the Tor community."
+msgstr ""
+
+#: https//support.torproject.org/faq/relay-donations/
+#: (content/faq/relay-donations/contents+en.lrquestion.description)
+msgid ""
+"Note that there can be a tradeoff here between anonymity and performance."
+msgstr ""
+
+#: https//support.torproject.org/faq/relay-donations/
+#: (content/faq/relay-donations/contents+en.lrquestion.description)
+msgid ""
+"The Tor network's anonymity comes in part from diversity, so if you are in a"
+" position to run your own relay, you will be improving Tor's anonymity more "
+"than by donating."
+msgstr ""
+
+#: https//support.torproject.org/faq/relay-donations/
+#: (content/faq/relay-donations/contents+en.lrquestion.description)
+msgid ""
+"At the same time though, economies of scale for bandwidth mean that "
+"combining many small donations into several larger relays is more efficient "
+"at improving network performance."
+msgstr ""
+
+#: https//support.torproject.org/faq/relay-donations/
+#: (content/faq/relay-donations/contents+en.lrquestion.description)
+msgid ""
+"Improving anonymity and improving performance are both worthwhile goals, so "
+"however you can help is great!"
+msgstr ""
+
#: https//support.torproject.org/faq/staying-anonymous/
#: (content/faq/staying-anonymous/contents+en.lrquestion.title)
msgid "Am I totally anonymous if I use Tor?"
@@ -2334,6 +2394,61 @@ msgid ""
" documenting all the issues](https://community.torproject.org/)."
msgstr ""
+#: https//support.torproject.org/about/attacks-on-onion-routing/
+#: (content/about/attacks-on-onion-routing/contents+en.lrquestion.title)
+msgid "What attacks remain against onion routing?"
+msgstr ""
+
+#: https//support.torproject.org/about/attacks-on-onion-routing/
+#: (content/about/attacks-on-onion-routing/contents+en.lrquestion.description)
+msgid ""
+"As mentioned above, it is possible for an observer who can view both you and"
+" either the destination website or your Tor exit node to correlate timings "
+"of your traffic as it enters the Tor network and also as it exits."
+msgstr ""
+
+#: https//support.torproject.org/about/attacks-on-onion-routing/
+#: (content/about/attacks-on-onion-routing/contents+en.lrquestion.description)
+msgid "Tor does not defend against such a threat model."
+msgstr ""
+
+#: https//support.torproject.org/about/attacks-on-onion-routing/
+#: (content/about/attacks-on-onion-routing/contents+en.lrquestion.description)
+msgid ""
+"In a more limited sense, note that if a censor or law enforcement agency has"
+" the ability to obtain specific observation of parts of the network, it is "
+"possible for them to verify a suspicion that you talk regularly to your "
+"friend by observing traffic at both ends and correlating the timing of only "
+"that traffic."
+msgstr ""
+
+#: https//support.torproject.org/about/attacks-on-onion-routing/
+#: (content/about/attacks-on-onion-routing/contents+en.lrquestion.description)
+msgid ""
+"Again, this is only useful to verify that parties already suspected of "
+"communicating with one another are doing so."
+msgstr ""
+
+#: https//support.torproject.org/about/attacks-on-onion-routing/
+#: (content/about/attacks-on-onion-routing/contents+en.lrquestion.description)
+msgid ""
+"In most countries, the suspicion required to obtain a warrant already "
+"carries more weight than timing correlation would provide."
+msgstr ""
+
+#: https//support.torproject.org/about/attacks-on-onion-routing/
+#: (content/about/attacks-on-onion-routing/contents+en.lrquestion.description)
+msgid ""
+"Furthermore, since Tor reuses circuits for multiple TCP connections, it is "
+"possible to associate non anonymous and anonymous traffic at a given exit "
+"node, so be careful about what applications you run concurrently over Tor."
+msgstr ""
+
+#: https//support.torproject.org/about/attacks-on-onion-routing/
+#: (content/about/attacks-on-onion-routing/contents+en.lrquestion.description)
+msgid "Perhaps even run separate Tor clients for these applications."
+msgstr ""
+
#: https//support.torproject.org/about/backdoor/
#: (content/about/backdoor/contents+en.lrquestion.title)
msgid "Is there a backdoor in Tor?"
@@ -2469,6 +2584,43 @@ msgid ""
"recommended](/tbb/tbb-9/)."
msgstr ""
+#: https//support.torproject.org/about/change-paths/
+#: (content/about/change-paths/contents+en.lrquestion.title)
+msgid "How often does Tor change its paths?"
+msgstr ""
+
+#: https//support.torproject.org/about/change-paths/
+#: (content/about/change-paths/contents+en.lrquestion.description)
+msgid ""
+"Tor will reuse the same circuit for new TCP streams for 10 minutes, as long "
+"as the circuit is working fine."
+msgstr ""
+
+#: https//support.torproject.org/about/change-paths/
+#: (content/about/change-paths/contents+en.lrquestion.description)
+msgid "(If the circuit fails, Tor will switch to a new circuit immediately.)"
+msgstr ""
+
+#: https//support.torproject.org/about/change-paths/
+#: (content/about/change-paths/contents+en.lrquestion.description)
+msgid ""
+"But note that a single TCP stream (e.g. a long IRC connection) will stay on "
+"the same circuit forever."
+msgstr ""
+
+#: https//support.torproject.org/about/change-paths/
+#: (content/about/change-paths/contents+en.lrquestion.description)
+msgid "We don't rotate individual streams from one circuit to the next."
+msgstr ""
+
+#: https//support.torproject.org/about/change-paths/
+#: (content/about/change-paths/contents+en.lrquestion.description)
+msgid ""
+"Otherwise, an adversary with a partial view of the network would be given "
+"many chances over time to link you to your destination, rather than just one"
+" chance."
+msgstr ""
+
#: https//support.torproject.org/about/distribute-tor/
#: (content/about/distribute-tor/contents+en.lrquestion.title)
msgid "Can I distribute Tor?"
@@ -2564,6 +2716,133 @@ msgid ""
"details."
msgstr ""
+#: https//support.torproject.org/about/entry-guards/
+#: (content/about/entry-guards/contents+en.lrquestion.title)
+msgid "What are Entry Guards?"
+msgstr ""
+
+#: https//support.torproject.org/about/entry-guards/
+#: (content/about/entry-guards/contents+en.lrquestion.description)
+msgid ""
+"Tor (like all current practical low-latency anonymity designs) fails when "
+"the attacker can see both ends of the communications channel."
+msgstr ""
+
+#: https//support.torproject.org/about/entry-guards/
+#: (content/about/entry-guards/contents+en.lrquestion.description)
+msgid ""
+"For example, suppose the attacker controls or watches the Tor relay you "
+"choose to enter the network, and also controls or watches the website you "
+"visit."
+msgstr ""
+
+#: https//support.torproject.org/about/entry-guards/
+#: (content/about/entry-guards/contents+en.lrquestion.description)
+msgid ""
+"In this case, the research community knows no practical low-latency design "
+"that can reliably stop the attacker from correlating volume and timing "
+"information on the two sides."
+msgstr ""
+
+#: https//support.torproject.org/about/entry-guards/
+#: (content/about/entry-guards/contents+en.lrquestion.description)
+msgid "So, what should we do?"
+msgstr ""
+
+#: https//support.torproject.org/about/entry-guards/
+#: (content/about/entry-guards/contents+en.lrquestion.description)
+msgid "Suppose the attacker controls, or can observe, C relays."
+msgstr ""
+
+#: https//support.torproject.org/about/entry-guards/
+#: (content/about/entry-guards/contents+en.lrquestion.description)
+msgid "Suppose there are N relays total."
+msgstr ""
+
+#: https//support.torproject.org/about/entry-guards/
+#: (content/about/entry-guards/contents+en.lrquestion.description)
+msgid ""
+"If you select new entry and exit relays each time you use the network, the "
+"attacker will be able to correlate all traffic you send with probability "
+"around (c/n)2."
+msgstr ""
+
+#: https//support.torproject.org/about/entry-guards/
+#: (content/about/entry-guards/contents+en.lrquestion.description)
+msgid ""
+"But profiling is, for most users, as bad as being traced all the time: they "
+"want to do something often without an attacker noticing, and the attacker "
+"noticing once is as bad as the attacker noticing more often."
+msgstr ""
+
+#: https//support.torproject.org/about/entry-guards/
+#: (content/about/entry-guards/contents+en.lrquestion.description)
+msgid ""
+"Thus, choosing many random entries and exits gives the user no chance of "
+"escaping profiling by this kind of attacker."
+msgstr ""
+
+#: https//support.torproject.org/about/entry-guards/
+#: (content/about/entry-guards/contents+en.lrquestion.description)
+msgid ""
+"The solution is \"entry guards\": each Tor client selects a few relays at "
+"random to use as entry points, and uses only those relays for their first "
+"hop."
+msgstr ""
+
+#: https//support.torproject.org/about/entry-guards/
+#: (content/about/entry-guards/contents+en.lrquestion.description)
+msgid ""
+"If those relays are not controlled or observed, the attacker can't win, "
+"ever, and the user is secure."
+msgstr ""
+
+#: https//support.torproject.org/about/entry-guards/
+#: (content/about/entry-guards/contents+en.lrquestion.description)
+msgid ""
+"If those relays are observed or controlled by the attacker, the attacker "
+"sees a larger fraction of the user's traffic - but still the user is no more"
+" profiled than before."
+msgstr ""
+
+#: https//support.torproject.org/about/entry-guards/
+#: (content/about/entry-guards/contents+en.lrquestion.description)
+msgid ""
+"Thus, the user has some chance (on the order of (n-c)/n) of avoiding "
+"profiling, whereas they had none before."
+msgstr ""
+
+#: https//support.torproject.org/about/entry-guards/
+#: (content/about/entry-guards/contents+en.lrquestion.description)
+msgid ""
+"You can read more at [An Analysis of the Degradation of Anonymous "
+"Protocols](http://freehaven.net/anonbib/#wright02), [Defending Anonymous "
+"Communication Against Passive Logging "
+"Attacks](http://freehaven.net/anonbib/#wright03), and especially [Locating "
+"Hidden Servers](http://freehaven.net/anonbib/#hs-attack06)."
+msgstr ""
+
+#: https//support.torproject.org/about/entry-guards/
+#: (content/about/entry-guards/contents+en.lrquestion.description)
+msgid ""
+"Restricting your entry nodes may also help against attackers who want to run"
+" a few Tor nodes and easily enumerate all of the Tor user IP addresses."
+msgstr ""
+
+#: https//support.torproject.org/about/entry-guards/
+#: (content/about/entry-guards/contents+en.lrquestion.description)
+msgid ""
+"(Even though they can't learn what destinations the users are talking to, "
+"they still might be able to do bad things with just a list of users.)"
+msgstr ""
+
+#: https//support.torproject.org/about/entry-guards/
+#: (content/about/entry-guards/contents+en.lrquestion.description)
+msgid ""
+"However, that feature won't really become useful until we move to a "
+"\"directory guard\" design as well."
+msgstr ""
+
#: https//support.torproject.org/about/how-is-tor-different-from-other-proxies/
#: (content/about/how-is-tor-different-from-other-proxies/contents+en.lrquestion.title)
msgid "How is Tor different from other proxies?"
@@ -2734,6 +3013,162 @@ msgid ""
" Tor and HTTPS interact."
msgstr ""
+#: https//support.torproject.org/about/key-management/
+#: (content/about/key-management/contents+en.lrquestion.title)
+msgid "Tell me about all the keys Tor uses"
+msgstr ""
+
+#: https//support.torproject.org/about/key-management/
+#: (content/about/key-management/contents+en.lrquestion.description)
+msgid ""
+"Tor uses a variety of different keys, with three goals in mind: 1) "
+"encryption to ensure privacy of data within the Tor network, 2) "
+"authentication so clients know they're talking to the relays they meant to "
+"talk to, and 3) signatures to make sure all clients know the same set of "
+"relays."
+msgstr ""
+
+#: https//support.torproject.org/about/key-management/
+#: (content/about/key-management/contents+en.lrquestion.description)
+msgid ""
+"**Encryption**: first, all connections in Tor use TLS link encryption, so "
+"observers can't look inside to see which circuit a given cell is intended "
+"for."
+msgstr ""
+
+#: https//support.torproject.org/about/key-management/
+#: (content/about/key-management/contents+en.lrquestion.description)
+msgid ""
+"Further, the Tor client establishes an ephemeral encryption key with each "
+"relay in the circuit; these extra layers of encryption mean that only the "
+"exit relay can read the cells."
+msgstr ""
+
+#: https//support.torproject.org/about/key-management/
+#: (content/about/key-management/contents+en.lrquestion.description)
+msgid ""
+"Both sides discard the circuit key when the circuit ends, so logging traffic"
+" and then breaking into the relay to discover the key won't work."
+msgstr ""
+
+#: https//support.torproject.org/about/key-management/
+#: (content/about/key-management/contents+en.lrquestion.description)
+msgid ""
+"**Authentication**: Every Tor relay has a public decryption key called the "
+"\"onion key\"."
+msgstr ""
+
+#: https//support.torproject.org/about/key-management/
+#: (content/about/key-management/contents+en.lrquestion.description)
+msgid "Each relay rotates its onion key once a week."
+msgstr ""
+
+#: https//support.torproject.org/about/key-management/
+#: (content/about/key-management/contents+en.lrquestion.description)
+msgid ""
+"When the Tor client establishes circuits, at each step it [demands that the "
+"Tor relay prove knowledge of its onion key](https://svn-"
+"archive.torproject.org/svn/projects/design-paper/tor-"
+"design.html#subsec:circuits)."
+msgstr ""
+
+#: https//support.torproject.org/about/key-management/
+#: (content/about/key-management/contents+en.lrquestion.description)
+msgid ""
+"That way the first node in the path can't just spoof the rest of the path."
+msgstr ""
+
+#: https//support.torproject.org/about/key-management/
+#: (content/about/key-management/contents+en.lrquestion.description)
+msgid ""
+"Because the Tor client chooses the path, it can make sure to get Tor's "
+"\"distributed trust\" property: no single relay in the path can know about "
+"both the client and what the client is doing."
+msgstr ""
+
+#: https//support.torproject.org/about/key-management/
+#: (content/about/key-management/contents+en.lrquestion.description)
+msgid ""
+"**Coordination**: How do clients know what the relays are, and how do they "
+"know that they have the right keys for them?"
+msgstr ""
+
+#: https//support.torproject.org/about/key-management/
+#: (content/about/key-management/contents+en.lrquestion.description)
+msgid "Each relay has a long-term public signing key called the \"identity key\"."
+msgstr ""
+
+#: https//support.torproject.org/about/key-management/
+#: (content/about/key-management/contents+en.lrquestion.description)
+msgid "Each directory authority additionally has a \"directory signing key\"."
+msgstr ""
+
+#: https//support.torproject.org/about/key-management/
+#: (content/about/key-management/contents+en.lrquestion.description)
+msgid ""
+"The directory authorities [provide a signed "
+"list](https://gitweb.torproject.org/torspec.git/tree/dir-spec.txt) of all "
+"the known relays, and in that list are a set of certificates from each relay"
+" (self-signed by their identity key) specifying their keys, locations, exit "
+"policies, and so on."
+msgstr ""
+
+#: https//support.torproject.org/about/key-management/
+#: (content/about/key-management/contents+en.lrquestion.description)
+msgid ""
+"So unless the adversary can control a majority of the directory authorities "
+"(as of 2021 there are 10 directory authorities), they can't trick the Tor "
+"client into using other Tor relays."
+msgstr ""
+
+#: https//support.torproject.org/about/key-management/
+#: (content/about/key-management/contents+en.lrquestion.description)
+msgid "How do clients know what the directory authorities are?"
+msgstr ""
+
+#: https//support.torproject.org/about/key-management/
+#: (content/about/key-management/contents+en.lrquestion.description)
+msgid ""
+"The Tor software comes with a built-in list of location and public key for "
+"each directory authority."
+msgstr ""
+
+#: https//support.torproject.org/about/key-management/
+#: (content/about/key-management/contents+en.lrquestion.description)
+msgid ""
+"So the only way to trick users into using a fake Tor network is to give them"
+" a specially modified version of the software."
+msgstr ""
+
+#: https//support.torproject.org/about/key-management/
+#: (content/about/key-management/contents+en.lrquestion.description)
+msgid "How do users know they've got the right software?"
+msgstr ""
+
+#: https//support.torproject.org/about/key-management/
+#: (content/about/key-management/contents+en.lrquestion.description)
+msgid ""
+"When we distribute the source code or a package, we digitally sign it with "
+"[GNU Privacy Guard](http://www.gnupg.org/). See the [instructions on how to "
+"check Tor Browser's signature](https://support.torproject.org/tbb/how-to-"
+"verify-signature/)."
+msgstr ""
+
+#: https//support.torproject.org/about/key-management/
+#: (content/about/key-management/contents+en.lrquestion.description)
+msgid ""
+"In order to be certain that it's really signed by us, you need to have met "
+"us in person and gotten a copy of our GPG key fingerprint, or you need to "
+"know somebody who has."
+msgstr ""
+
+#: https//support.torproject.org/about/key-management/
+#: (content/about/key-management/contents+en.lrquestion.description)
+msgid ""
+"If you're concerned about an attack on this level, we recommend you get "
+"involved with the security community and start meeting people."
+msgstr ""
+
#: https//support.torproject.org/about/no-data-scrubbing/
#: (content/about/no-data-scrubbing/contents+en.lrquestion.title)
msgid ""
@@ -2766,6 +3201,151 @@ msgid ""
"though."
msgstr ""
+#: https//support.torproject.org/about/protections/
+#: (content/about/protections/contents+en.lrquestion.title)
+msgid "What protections does Tor provide?"
+msgstr ""
+
+#: https//support.torproject.org/about/protections/
+#: (content/about/protections/contents+en.lrquestion.description)
+msgid ""
+"Internet communication is based on a store-and-forward model that can be "
+"understood in analogy to postal mail: Data is transmitted in blocks called "
+"IP datagrams or packets."
+msgstr ""
+
+#: https//support.torproject.org/about/protections/
+#: (content/about/protections/contents+en.lrquestion.description)
+msgid ""
+"Every packet includes a source IP address (of the sender) and a destination "
+"IP address (of the receiver), just as ordinary letters contain postal "
+"addresses of sender and receiver."
+msgstr ""
+
+#: https//support.torproject.org/about/protections/
+#: (content/about/protections/contents+en.lrquestion.description)
+msgid ""
+"The way from sender to receiver involves multiple hops of routers, where "
+"each router inspects the destination IP address and forwards the packet "
+"closer to its destination."
+msgstr ""
+
+#: https//support.torproject.org/about/protections/
+#: (content/about/protections/contents+en.lrquestion.description)
+msgid ""
+"Thus, every router between sender and receiver learns that the sender is "
+"communicating with the receiver."
+msgstr ""
+
+#: https//support.torproject.org/about/protections/
+#: (content/about/protections/contents+en.lrquestion.description)
+msgid ""
+"In particular, your local ISP is in the position to build a complete profile"
+" of your Internet usage."
+msgstr ""
+
+#: https//support.torproject.org/about/protections/
+#: (content/about/protections/contents+en.lrquestion.description)
+msgid ""
+"In addition, every server in the Internet that can see any of the packets "
+"can profile your behavior."
+msgstr ""
+
+#: https//support.torproject.org/about/protections/
+#: (content/about/protections/contents+en.lrquestion.description)
+msgid ""
+"The aim of Tor is to improve your privacy by sending your traffic through a "
+"series of proxies."
+msgstr ""
+
+#: https//support.torproject.org/about/protections/
+#: (content/about/protections/contents+en.lrquestion.description)
+msgid ""
+"Your communication is encrypted in multiple layers and routed via multiple "
+"hops through the Tor network to the final receiver."
+msgstr ""
+
+#: https//support.torproject.org/about/protections/
+#: (content/about/protections/contents+en.lrquestion.description)
+msgid ""
+"More details on this process can be found in this "
+"[visualization](https://support.torproject.org/https/https-1/)."
+msgstr ""
+
+#: https//support.torproject.org/about/protections/
+#: (content/about/protections/contents+en.lrquestion.description)
+msgid ""
+"Note that all your local ISP can observe now is that you are communicating "
+"with Tor nodes."
+msgstr ""
+
+#: https//support.torproject.org/about/protections/
+#: (content/about/protections/contents+en.lrquestion.description)
+msgid ""
+"Similarly, servers in the Internet just see that they are being contacted by"
+" Tor nodes."
+msgstr ""
+
+#: https//support.torproject.org/about/protections/
+#: (content/about/protections/contents+en.lrquestion.description)
+msgid "Generally speaking, Tor aims to solve three privacy problems:"
+msgstr ""
+
+#: https//support.torproject.org/about/protections/
+#: (content/about/protections/contents+en.lrquestion.description)
+msgid ""
+"First, Tor prevents websites and other services from learning your location,"
+" which they can use to build databases about your habits and interests."
+msgstr ""
+
+#: https//support.torproject.org/about/protections/
+#: (content/about/protections/contents+en.lrquestion.description)
+msgid ""
+"With Tor, your Internet connections don't give you away by default -- now "
+"you can have the ability to choose, for each connection, how much "
+"information to reveal."
+msgstr ""
+
+#: https//support.torproject.org/about/protections/
+#: (content/about/protections/contents+en.lrquestion.description)
+msgid ""
+"Second, Tor prevents people watching your traffic locally (such as your ISP "
+"or someone with access to your home wifi or router) from learning what "
+"information you're fetching and where you're fetching it from."
+msgstr ""
+
+#: https//support.torproject.org/about/protections/
+#: (content/about/protections/contents+en.lrquestion.description)
+msgid ""
+"It also stops them from deciding what you're allowed to learn and publish --"
+" if you can get to any part of the Tor network, you can reach any site on "
+"the Internet."
+msgstr ""
+
+#: https//support.torproject.org/about/protections/
+#: (content/about/protections/contents+en.lrquestion.description)
+msgid ""
+"Third, Tor routes your connection through more than one Tor relay so no "
+"single relay can learn what you're up to."
+msgstr ""
+
+#: https//support.torproject.org/about/protections/
+#: (content/about/protections/contents+en.lrquestion.description)
+msgid ""
+"Because these relays are run by different individuals or organizations, "
+"distributing trust provides more security than the old [one hop "
+"proxy](https://support.torproject.org/about/#how-is-tor-different-from-"
+"other-proxies) approach."
+msgstr ""
+
+#: https//support.torproject.org/about/protections/
+#: (content/about/protections/contents+en.lrquestion.description)
+msgid ""
+"Note, however, that there are situations where Tor fails to solve these "
+"privacy problems entirely: see the entry below on [remaining "
+"attacks](https://support.torproject.org/about/#attacks-on-onion-routing)."
+msgstr ""
+
#: https//support.torproject.org/about/what-is-tor/
#: (content/about/what-is-tor/contents+en.lrquestion.title)
msgid "What is Tor?"
@@ -4945,9 +5525,11 @@ msgstr ""
#: (content/tbb/tbb-47/contents+en.lrquestion.description)
msgid ""
"Also, read up on the HTTPProxyAuthenticator and HTTPSProxyAuthenticator "
-"options if your proxy requires auth. We only support basic auth currently, "
-"but if you need NTLM authentication, you may find [this post in the "
-"archives](https://archives.seul.org/or/talk/Jun-2005/msg00223.html) useful."
+"options if your [proxy requires auth.](https://developer.mozilla.org/en-"
+"US/docs/Web/HTTP/Headers/Proxy-Authenticate) We only support basic auth "
+"currently, but if you need NTLM authentication, you may find [this post in "
+"the archives](https://archives.seul.org/or/talk/Jun-2005/msg00223.html) "
+"useful."
msgstr ""
#: https//support.torproject.org/tbb/tbb-47/
@@ -5168,6 +5750,219 @@ msgid ""
"have no effect on Tor's configuration."
msgstr ""
+#: https//support.torproject.org/tbb/tbb-firewall-ports/
+#: (content/tbb/tbb-firewall-ports/contents+en.lrquestion.title)
+msgid "My firewall only allows a few outgoing ports"
+msgstr ""
+
+#: https//support.torproject.org/tbb/tbb-firewall-ports/
+#: (content/tbb/tbb-firewall-ports/contents+en.lrquestion.description)
+msgid ""
+"If your firewall works by blocking ports, then you can tell Tor to only use "
+"the ports when you start your Tor Browser."
+msgstr ""
+
+#: https//support.torproject.org/tbb/tbb-firewall-ports/
+#: (content/tbb/tbb-firewall-ports/contents+en.lrquestion.description)
+msgid ""
+"Or you can add the ports that your firewall permits by adding "
+"\"FascistFirewall 1\" to your torrc configuration file."
+msgstr ""
+
+#: https//support.torproject.org/tbb/tbb-firewall-ports/
+#: (content/tbb/tbb-firewall-ports/contents+en.lrquestion.description)
+msgid ""
+"By default, when you set this Tor assumes that your firewall allows only "
+"port 80 and port 443 (HTTP and HTTPS respectively)."
+msgstr ""
+
+#: https//support.torproject.org/tbb/tbb-firewall-ports/
+#: (content/tbb/tbb-firewall-ports/contents+en.lrquestion.description)
+msgid ""
+"You can select a different set of ports with the FirewallPorts torrc option."
+msgstr ""
+
+#: https//support.torproject.org/tbb/tbb-firewall-ports/
+#: (content/tbb/tbb-firewall-ports/contents+en.lrquestion.description)
+msgid ""
+"If you want to be more fine-grained with your controls, you can also use the"
+" ReachableAddresses config options, e.g.:"
+msgstr ""
+
+#: https//support.torproject.org/tbb/tbb-firewall-ports/
+#: (content/tbb/tbb-firewall-ports/contents+en.lrquestion.description)
+#: https//support.torproject.org/tbb/tbb-install-tor-central-server/
+#: (content/tbb/tbb-install-tor-central-server/contents+en.lrquestion.description)
+#: https//support.torproject.org/operators/default-exit-ports/
+#: (content/operators/default-exit-ports/contents+en.lrquestion.description)
+#: https//support.torproject.org/operators/hibernation/
+#: (content/operators/hibernation/contents+en.lrquestion.description)
+#: https//support.torproject.org/operators/limit-total-bandwidth/
+#: (content/operators/limit-total-bandwidth/contents+en.lrquestion.description)
+#: https//support.torproject.org/misc/bug-or-feedback/
+#: (content/misc/bug-or-feedback/contents+en.lrquestion.description)
+#: https//support.torproject.org/get-in-touch/why-i-cant-join-tor-channels/
+#: (content/get-in-touch/why-i-cant-join-tor-channels/contents+en.lrquestion.description)
+#: https//support.torproject.org/apt/tor-deb-repo/
+#: (content/apt/apt-1/contents+en.lrquestion.description)
+#: https//support.torproject.org/apt/apt-over-tor/
+#: (content/apt/apt-3/contents+en.lrquestion.description)
+msgid "```"
+msgstr "```"
+
+#: https//support.torproject.org/tbb/tbb-firewall-ports/
+#: (content/tbb/tbb-firewall-ports/contents+en.lrquestion.description)
+msgid "ReachableDirAddresses *:80"
+msgstr ""
+
+#: https//support.torproject.org/tbb/tbb-firewall-ports/
+#: (content/tbb/tbb-firewall-ports/contents+en.lrquestion.description)
+msgid "ReachableORAddresses *:443"
+msgstr ""
+
+#: https//support.torproject.org/tbb/tbb-install-tor-central-server/
+#: (content/tbb/tbb-install-tor-central-server/contents+en.lrquestion.title)
+msgid ""
+"Can I install Tor on a central server, and have my clients connect to it?"
+msgstr ""
+
+#: https//support.torproject.org/tbb/tbb-install-tor-central-server/
+#: (content/tbb/tbb-install-tor-central-server/contents+en.lrquestion.description)
+msgid ""
+"Yes. Tor can be configured as a client or a relay on another machine, and "
+"allow other machines to be able to connect to it for anonymity."
+msgstr ""
+
+#: https//support.torproject.org/tbb/tbb-install-tor-central-server/
+#: (content/tbb/tbb-install-tor-central-server/contents+en.lrquestion.description)
+msgid ""
+"This is most useful in an environment where many computers want a gateway of"
+" anonymity to the rest of the world."
+msgstr ""
+
+#: https//support.torproject.org/tbb/tbb-install-tor-central-server/
+#: (content/tbb/tbb-install-tor-central-server/contents+en.lrquestion.description)
+msgid ""
+"However, be forewarned that with this configuration, anyone within your "
+"private network (existing between you and the Tor client/relay) can see what"
+" traffic you are sending in clear text."
+msgstr ""
+
+#: https//support.torproject.org/tbb/tbb-install-tor-central-server/
+#: (content/tbb/tbb-install-tor-central-server/contents+en.lrquestion.description)
+msgid "The anonymity doesn't start until you get to the Tor relay."
+msgstr ""
+
+#: https//support.torproject.org/tbb/tbb-install-tor-central-server/
+#: (content/tbb/tbb-install-tor-central-server/contents+en.lrquestion.description)
+msgid ""
+"Because of this, if you are the controller of your domain and you know "
+"everything's locked down, you will be OK, but this configuration may not be "
+"suitable for large private networks where security is key all around."
+msgstr ""
+
+#: https//support.torproject.org/tbb/tbb-install-tor-central-server/
+#: (content/tbb/tbb-install-tor-central-server/contents+en.lrquestion.description)
+msgid ""
+"Configuration is simple, editing your torrc file's SocksListenAddress "
+"according to the following examples:"
+msgstr ""
+
+#: https//support.torproject.org/tbb/tbb-install-tor-central-server/
+#: (content/tbb/tbb-install-tor-central-server/contents+en.lrquestion.description)
+msgid "SocksListenAddress 127.0.0.1"
+msgstr ""
+
+#: https//support.torproject.org/tbb/tbb-install-tor-central-server/
+#: (content/tbb/tbb-install-tor-central-server/contents+en.lrquestion.description)
+msgid "SocksListenAddress 192.168.x.x:9100"
+msgstr ""
+
+#: https//support.torproject.org/tbb/tbb-install-tor-central-server/
+#: (content/tbb/tbb-install-tor-central-server/contents+en.lrquestion.description)
+msgid "SocksListenAddress 0.0.0.0:9100"
+msgstr ""
+
+#: https//support.torproject.org/tbb/tbb-install-tor-central-server/
+#: (content/tbb/tbb-install-tor-central-server/contents+en.lrquestion.description)
+msgid ""
+"You can state multiple listen addresses, in the case that you are part of "
+"several networks or subnets."
+msgstr ""
+
+#: https//support.torproject.org/tbb/tbb-install-tor-central-server/
+#: (content/tbb/tbb-install-tor-central-server/contents+en.lrquestion.description)
+msgid "SocksListenAddress 192.168.x.x:9100 #eth0"
+msgstr ""
+
+#: https//support.torproject.org/tbb/tbb-install-tor-central-server/
+#: (content/tbb/tbb-install-tor-central-server/contents+en.lrquestion.description)
+msgid "SocksListenAddress 10.x.x.x:9100 #eth1"
+msgstr ""
+
+#: https//support.torproject.org/tbb/tbb-install-tor-central-server/
+#: (content/tbb/tbb-install-tor-central-server/contents+en.lrquestion.description)
+msgid ""
+"After this, your clients on their respective networks/subnets would specify "
+"a socks proxy with the address and port you specified SocksListenAddress to "
+"be."
+msgstr ""
+
+#: https//support.torproject.org/tbb/tbb-install-tor-central-server/
+#: (content/tbb/tbb-install-tor-central-server/contents+en.lrquestion.description)
+msgid ""
+"Please note that the SocksPort configuration option gives the port ONLY for "
+"localhost (127.0.0.1)."
+msgstr ""
+
+#: https//support.torproject.org/tbb/tbb-install-tor-central-server/
+#: (content/tbb/tbb-install-tor-central-server/contents+en.lrquestion.description)
+msgid ""
+"When setting up your SocksListenAddress(es), you need to give the port with "
+"the address, as shown above."
+msgstr ""
+
+#: https//support.torproject.org/tbb/tbb-install-tor-central-server/
+#: (content/tbb/tbb-install-tor-central-server/contents+en.lrquestion.description)
+msgid ""
+"If you are interested in forcing all outgoing data through the central Tor "
+"client/relay, instead of the server only being an optional proxy, you may "
+"find the program iptables (for *nix) useful."
+msgstr ""
+
+#: https//support.torproject.org/tbb/tbb-run-client-different-computer/
+#: (content/tbb/tbb-run-client-different-computer/contents+en.lrquestion.title)
+msgid ""
+"I want to run my Tor client on a different computer than my applications"
+msgstr ""
+
+#: https//support.torproject.org/tbb/tbb-run-client-different-computer/
+#: (content/tbb/tbb-run-client-different-computer/contents+en.lrquestion.description)
+msgid ""
+"By default, your Tor client only listens for applications that connect from "
+"localhost."
+msgstr ""
+
+#: https//support.torproject.org/tbb/tbb-run-client-different-computer/
+#: (content/tbb/tbb-run-client-different-computer/contents+en.lrquestion.description)
+msgid "Connections from other computers are refused."
+msgstr ""
+
+#: https//support.torproject.org/tbb/tbb-run-client-different-computer/
+#: (content/tbb/tbb-run-client-different-computer/contents+en.lrquestion.description)
+msgid ""
+"If you want to torify applications on different computers than the Tor "
+"client, you should edit your torrc to define `SocksListenAddress 0.0.0.0` "
+"and then restart (or hup) Tor."
+msgstr ""
+
+#: https//support.torproject.org/tbb/tbb-run-client-different-computer/
+#: (content/tbb/tbb-run-client-different-computer/contents+en.lrquestion.description)
+msgid ""
+"If you want to get more advanced, you can configure your Tor client on a "
+"firewall to bind to your internal IP but not your external IP."
+msgstr ""
+
#: https//support.torproject.org/tbb/website-blocking-tor/
#: (content/tbb/website-blocking-tor/contents+en.lrquestion.title)
msgid "A website I am trying to reach is blocking access over Tor."
@@ -6632,6 +7427,130 @@ msgid ""
"guide."
msgstr ""
+#: https//support.torproject.org/operators/default-exit-ports/
+#: (content/operators/default-exit-ports/contents+en.lrquestion.title)
+msgid "Is there a list of default exit ports?"
+msgstr ""
+
+#: https//support.torproject.org/operators/default-exit-ports/
+#: (content/operators/default-exit-ports/contents+en.lrquestion.description)
+msgid ""
+"The default open ports are listed below but keep in mind that, any port or "
+"ports can be opened by the relay operator by configuring it in torrc or "
+"modifying the source code."
+msgstr ""
+
+#: https//support.torproject.org/operators/default-exit-ports/
+#: (content/operators/default-exit-ports/contents+en.lrquestion.description)
+msgid ""
+"The default according to src/or/policies.c ([line 85][1] and [line 1901][2])"
+" from the source code release [release-0.4.6][3]:"
+msgstr ""
+
+#: https//support.torproject.org/operators/default-exit-ports/
+#: (content/operators/default-exit-ports/contents+en.lrquestion.description)
+msgid "reject 0.0.0.0/8"
+msgstr ""
+
+#: https//support.torproject.org/operators/default-exit-ports/
+#: (content/operators/default-exit-ports/contents+en.lrquestion.description)
+msgid "reject 169.254.0.0/16"
+msgstr ""
+
+#: https//support.torproject.org/operators/default-exit-ports/
+#: (content/operators/default-exit-ports/contents+en.lrquestion.description)
+msgid "reject 127.0.0.0/8"
+msgstr ""
+
+#: https//support.torproject.org/operators/default-exit-ports/
+#: (content/operators/default-exit-ports/contents+en.lrquestion.description)
+msgid "reject 192.168.0.0/16"
+msgstr ""
+
+#: https//support.torproject.org/operators/default-exit-ports/
+#: (content/operators/default-exit-ports/contents+en.lrquestion.description)
+msgid "reject 10.0.0.0/8"
+msgstr ""
+
+#: https//support.torproject.org/operators/default-exit-ports/
+#: (content/operators/default-exit-ports/contents+en.lrquestion.description)
+msgid "reject 172.16.0.0/12"
+msgstr ""
+
+#: https//support.torproject.org/operators/default-exit-ports/
+#: (content/operators/default-exit-ports/contents+en.lrquestion.description)
+msgid "reject *:25"
+msgstr ""
+
+#: https//support.torproject.org/operators/default-exit-ports/
+#: (content/operators/default-exit-ports/contents+en.lrquestion.description)
+msgid "reject *:119"
+msgstr ""
+
+#: https//support.torproject.org/operators/default-exit-ports/
+#: (content/operators/default-exit-ports/contents+en.lrquestion.description)
+msgid "reject *:135-139"
+msgstr ""
+
+#: https//support.torproject.org/operators/default-exit-ports/
+#: (content/operators/default-exit-ports/contents+en.lrquestion.description)
+msgid "reject *:445"
+msgstr ""
+
+#: https//support.torproject.org/operators/default-exit-ports/
+#: (content/operators/default-exit-ports/contents+en.lrquestion.description)
+msgid "reject *:563"
+msgstr ""
+
+#: https//support.torproject.org/operators/default-exit-ports/
+#: (content/operators/default-exit-ports/contents+en.lrquestion.description)
+msgid "reject *:1214"
+msgstr ""
+
+#: https//support.torproject.org/operators/default-exit-ports/
+#: (content/operators/default-exit-ports/contents+en.lrquestion.description)
+msgid "reject *:4661-4666"
+msgstr ""
+
+#: https//support.torproject.org/operators/default-exit-ports/
+#: (content/operators/default-exit-ports/contents+en.lrquestion.description)
+msgid "reject *:6346-6429"
+msgstr ""
+
+#: https//support.torproject.org/operators/default-exit-ports/
+#: (content/operators/default-exit-ports/contents+en.lrquestion.description)
+msgid "reject *:6699"
+msgstr ""
+
+#: https//support.torproject.org/operators/default-exit-ports/
+#: (content/operators/default-exit-ports/contents+en.lrquestion.description)
+msgid "reject *:6881-6999"
+msgstr ""
+
+#: https//support.torproject.org/operators/default-exit-ports/
+#: (content/operators/default-exit-ports/contents+en.lrquestion.description)
+msgid "accept *:*"
+msgstr ""
+
+#: https//support.torproject.org/operators/default-exit-ports/
+#: (content/operators/default-exit-ports/contents+en.lrquestion.description)
+msgid ""
+"[1]: "
+"https://gitlab.torproject.org/tpo/core/tor/-/blob/release-0.4.6/src/core/or/policies.c#L85"
+msgstr ""
+
+#: https//support.torproject.org/operators/default-exit-ports/
+#: (content/operators/default-exit-ports/contents+en.lrquestion.description)
+msgid ""
+"[2]: "
+"https://gitlab.torproject.org/tpo/core/tor/-/blob/release-0.4.6/src/core/or/policies.c#L1901"
+msgstr ""
+
+#: https//support.torproject.org/operators/default-exit-ports/
+#: (content/operators/default-exit-ports/contents+en.lrquestion.description)
+msgid "[3]: https://gitlab.torproject.org/tpo/core/tor/-/tree/release-0.4.6/"
+msgstr ""
+
#: https//support.torproject.org/operators/dynamic-ip/
#: (content/operators/dynamic-ip/contents+en.lrquestion.title)
msgid "Can I run a Tor relay using a dynamic IP address?"
@@ -6779,21 +7698,6 @@ msgid ""
"into hibernation, signaled by this entry in the log:"
msgstr ""
-#: https//support.torproject.org/operators/hibernation/
-#: (content/operators/hibernation/contents+en.lrquestion.description)
-#: https//support.torproject.org/operators/limit-total-bandwidth/
-#: (content/operators/limit-total-bandwidth/contents+en.lrquestion.description)
-#: https//support.torproject.org/misc/bug-or-feedback/
-#: (content/misc/bug-or-feedback/contents+en.lrquestion.description)
-#: https//support.torproject.org/get-in-touch/why-i-cant-join-tor-channels/
-#: (content/get-in-touch/why-i-cant-join-tor-channels/contents+en.lrquestion.description)
-#: https//support.torproject.org/apt/tor-deb-repo/
-#: (content/apt/apt-1/contents+en.lrquestion.description)
-#: https//support.torproject.org/apt/apt-over-tor/
-#: (content/apt/apt-3/contents+en.lrquestion.description)
-msgid "```"
-msgstr "```"
-
#: https//support.torproject.org/operators/hibernation/
#: (content/operators/hibernation/contents+en.lrquestion.description)
msgid "Bandwidth soft limit reached; commencing hibernation."
@@ -9033,6 +9937,131 @@ msgstr ""
msgid "sub 4096R/C00942E4 2017-03-13"
msgstr ""
+#: https//support.torproject.org/misc/check-socks-dns-leaks/
+#: (content/misc/check-socks-dns-leaks/contents+en.lrquestion.title)
+msgid ""
+"How do I check if my application that uses SOCKS is leaking DNS requests?"
+msgstr ""
+
+#: https//support.torproject.org/misc/check-socks-dns-leaks/
+#: (content/misc/check-socks-dns-leaks/contents+en.lrquestion.description)
+msgid ""
+"Even if your application is using the correct variant of the SOCKS protocol,"
+" there is still a risk that it could be leaking DNS queries."
+msgstr ""
+
+#: https//support.torproject.org/misc/check-socks-dns-leaks/
+#: (content/misc/check-socks-dns-leaks/contents+en.lrquestion.description)
+msgid ""
+"This problem happens in Firefox extensions that resolve the destination "
+"hostname themselves, for example to show you its IP address, what country "
+"it's in, etc."
+msgstr ""
+
+#: https//support.torproject.org/misc/check-socks-dns-leaks/
+#: (content/misc/check-socks-dns-leaks/contents+en.lrquestion.description)
+msgid ""
+"If you suspect your application might behave like this, follow the "
+"instructions below to check."
+msgstr ""
+
+#: https//support.torproject.org/misc/check-socks-dns-leaks/
+#: (content/misc/check-socks-dns-leaks/contents+en.lrquestion.description)
+msgid ""
+"1. Add `TestSocks 1` to your [torrc file](https://support.torproject.org/tbb"
+"/tbb-editing-torrc/)."
+msgstr ""
+
+#: https//support.torproject.org/misc/check-socks-dns-leaks/
+#: (content/misc/check-socks-dns-leaks/contents+en.lrquestion.description)
+msgid ""
+"1. Start Tor, and point your program's SOCKS proxy settings to Tor's SOCKS5 "
+"server (`socks5://127.0.0.1:9050` by default)."
+msgstr ""
+
+#: https//support.torproject.org/misc/check-socks-dns-leaks/
+#: (content/misc/check-socks-dns-leaks/contents+en.lrquestion.description)
+msgid ""
+"1. Watch your logs as you use your application. For each socks connection, "
+"Tor will log a `notice` for safe connections, and a `warn` for connections "
+"leaking DNS requests."
+msgstr ""
+
+#: https//support.torproject.org/misc/check-socks-dns-leaks/
+#: (content/misc/check-socks-dns-leaks/contents+en.lrquestion.description)
+msgid ""
+"If you want to automatically disable all connections leaking DNS requests, "
+"set `SafeSocks 1` in your torrc file."
+msgstr ""
+
+#: https//support.torproject.org/misc/hide-exits/
+#: (content/misc/hide-exits/contents+en.lrquestion.title)
+msgid ""
+"You should hide the list of Tor relays, so people can't block the exits."
+msgstr ""
+
+#: https//support.torproject.org/misc/hide-exits/
+#: (content/misc/hide-exits/contents+en.lrquestion.description)
+msgid "There are a few reasons we don't:"
+msgstr ""
+
+#: https//support.torproject.org/misc/hide-exits/
+#: (content/misc/hide-exits/contents+en.lrquestion.description)
+msgid ""
+"1. We can't help but make the information available, since Tor clients need "
+"to use it to pick their paths."
+msgstr ""
+
+#: https//support.torproject.org/misc/hide-exits/
+#: (content/misc/hide-exits/contents+en.lrquestion.description)
+msgid "So if the \"blockers\" want it, they can get it anyway."
+msgstr ""
+
+#: https//support.torproject.org/misc/hide-exits/
+#: (content/misc/hide-exits/contents+en.lrquestion.description)
+msgid ""
+"Further, even if we didn't tell clients about the list of relays directly, "
+"somebody could still make a lot of connections through Tor to a test site "
+"and build a list of the addresses they see."
+msgstr ""
+
+#: https//support.torproject.org/misc/hide-exits/
+#: (content/misc/hide-exits/contents+en.lrquestion.description)
+msgid ""
+"1. If people want to block us, we believe that they should be allowed to do "
+"so."
+msgstr ""
+
+#: https//support.torproject.org/misc/hide-exits/
+#: (content/misc/hide-exits/contents+en.lrquestion.description)
+msgid ""
+"Obviously, we would prefer for everybody to allow Tor users to connect to "
+"them, but people have the right to decide who their services should allow "
+"connections from, and if they want to block anonymous users, they can."
+msgstr ""
+
+#: https//support.torproject.org/misc/hide-exits/
+#: (content/misc/hide-exits/contents+en.lrquestion.description)
+msgid ""
+"1. Being blockable also has tactical advantages: it may be a persuasive "
+"response to website maintainers who feel threatened by Tor."
+msgstr ""
+
+#: https//support.torproject.org/misc/hide-exits/
+#: (content/misc/hide-exits/contents+en.lrquestion.description)
+msgid ""
+"Giving them the option may inspire them to stop and think about whether they"
+" really want to eliminate private access to their system, and if not, what "
+"other options they might have."
+msgstr ""
+
+#: https//support.torproject.org/misc/hide-exits/
+#: (content/misc/hide-exits/contents+en.lrquestion.description)
+msgid ""
+"The time they might otherwise have spent blocking Tor, they may instead "
+"spend rethinking their overall approach to privacy and anonymity."
+msgstr ""
+
#: https//support.torproject.org/misc/menu/
#: (content/misc/menu/contents+en.lrquestion.description)
msgid "About"
@@ -9617,56 +10646,20 @@ msgstr ""
#: https//support.torproject.org/get-in-touch/why-i-cant-join-tor-channels/
#: (content/get-in-touch/why-i-cant-join-tor-channels/contents+en.lrquestion.description)
msgid ""
-"Then, to complete the registration and ultimately gain access to the #tor-"
-"project channel, your nickname must be **verified**."
-msgstr ""
-
-#: https//support.torproject.org/get-in-touch/why-i-cant-join-tor-channels/
-#: (content/get-in-touch/why-i-cant-join-tor-channels/contents+en.lrquestion.description)
-msgid ""
-"1. To verify your nick, open a new browser window and go to "
-"https://webchat.oftc.net/?channels=tor."
-msgstr ""
-
-#: https//support.torproject.org/get-in-touch/why-i-cant-join-tor-channels/
-#: (content/get-in-touch/why-i-cant-join-tor-channels/contents+en.lrquestion.description)
-msgid "2. Log in with your IRC nickname and password."
-msgstr ""
-
-#: https//support.torproject.org/get-in-touch/why-i-cant-join-tor-channels/
-#: (content/get-in-touch/why-i-cant-join-tor-channels/contents+en.lrquestion.description)
-msgid ""
-"3. Look for the word **verify** and log in there. It may appear that nothing"
-" has happened. Look at the top of the page, and there will be a column "
-"called **Account**."
-msgstr ""
-
-#: https//support.torproject.org/get-in-touch/why-i-cant-join-tor-channels/
-#: (content/get-in-touch/why-i-cant-join-tor-channels/contents+en.lrquestion.description)
-msgid "4. Click on **Account**."
-msgstr ""
-
-#: https//support.torproject.org/get-in-touch/why-i-cant-join-tor-channels/
-#: (content/get-in-touch/why-i-cant-join-tor-channels/contents+en.lrquestion.description)
-msgid ""
-"5. Click on the small sentence at the bottom of the square that says: Verify"
-" account."
-msgstr ""
-
-#: https//support.torproject.org/get-in-touch/why-i-cant-join-tor-channels/
-#: (content/get-in-touch/why-i-cant-join-tor-channels/contents+en.lrquestion.description)
-msgid "6. Fill out the Captcha that pops up, and click ok."
+"After registering your nickname, to gain access to the #tor-project and "
+"other protected channels, your nickname must be **verified**."
msgstr ""
#: https//support.torproject.org/get-in-touch/why-i-cant-join-tor-channels/
#: (content/get-in-touch/why-i-cant-join-tor-channels/contents+en.lrquestion.description)
msgid ""
-"7. A tiny message will appear: \"Your NickServ account has been verified.\""
+"1. Go to https://services.oftc.net/ and follow the steps in the '*To verify "
+"your account*' section"
msgstr ""
#: https//support.torproject.org/get-in-touch/why-i-cant-join-tor-channels/
#: (content/get-in-touch/why-i-cant-join-tor-channels/contents+en.lrquestion.description)
-msgid "8. Go back to the IRC webpage where you are logged in and type:"
+msgid "2. Go back to the IRC webpage where you are logged in and type:"
msgstr ""
#: https//support.torproject.org/get-in-touch/why-i-cant-join-tor-channels/
@@ -9676,12 +10669,12 @@ msgstr ""
#: https//support.torproject.org/get-in-touch/why-i-cant-join-tor-channels/
#: (content/get-in-touch/why-i-cant-join-tor-channels/contents+en.lrquestion.description)
-msgid "9. Click ENTER."
+msgid "3. Click ENTER."
msgstr ""
#: https//support.torproject.org/get-in-touch/why-i-cant-join-tor-channels/
#: (content/get-in-touch/why-i-cant-join-tor-channels/contents+en.lrquestion.description)
-msgid "10. If all is well, you will receive a message that says:"
+msgid "4. If all is well, you will receive a message that says:"
msgstr ""
#: https//support.torproject.org/get-in-touch/why-i-cant-join-tor-channels/
@@ -9822,18 +10815,22 @@ msgstr ""
#: https//support.torproject.org/apt/tor-deb-repo/
#: (content/apt/apt-1/contents+en.lrquestion.description)
msgid ""
-"#### 2. Add the following entries to `/etc/apt/sources.list` or a new file "
-"in `/etc/apt/sources.list.d/`"
+"#### 2. Create a new file in `/etc/apt/sources.list.d/` named `tor.list`. "
+"Add the following entries:"
msgstr ""
#: https//support.torproject.org/apt/tor-deb-repo/
#: (content/apt/apt-1/contents+en.lrquestion.description)
-msgid "deb https://deb.torproject.org/torproject.org <DISTRIBUTION> main"
+msgid ""
+"deb [signed-by=/usr/share/keyrings/tor-archive-keyring.gpg] "
+"https://deb.torproject.org/torproject.org <DISTRIBUTION> main"
msgstr ""
#: https//support.torproject.org/apt/tor-deb-repo/
#: (content/apt/apt-1/contents+en.lrquestion.description)
-msgid "deb-src https://deb.torproject.org/torproject.org <DISTRIBUTION> main"
+msgid ""
+"deb-src [signed-by=/usr/share/keyrings/tor-archive-keyring.gpg] "
+"https://deb.torproject.org/torproject.org <DISTRIBUTION> main"
msgstr ""
#: https//support.torproject.org/apt/tor-deb-repo/
@@ -9847,14 +10844,16 @@ msgstr ""
#: https//support.torproject.org/apt/tor-deb-repo/
#: (content/apt/apt-1/contents+en.lrquestion.description)
msgid ""
-"deb https://deb.torproject.org/torproject.org tor-"
+"deb [signed-by=/usr/share/keyrings/tor-archive-keyring.gpg] "
+"https://deb.torproject.org/torproject.org tor-"
"experimental-0.4.6.x-<DISTRIBUTION> main"
msgstr ""
#: https//support.torproject.org/apt/tor-deb-repo/
#: (content/apt/apt-1/contents+en.lrquestion.description)
msgid ""
-"deb-src https://deb.torproject.org/torproject.org tor-"
+"deb-src [signed-by=/usr/share/keyrings/tor-archive-keyring.gpg] "
+"https://deb.torproject.org/torproject.org tor-"
"experimental-0.4.6.x-<DISTRIBUTION> main"
msgstr ""
@@ -9866,15 +10865,17 @@ msgstr ""
#: https//support.torproject.org/apt/tor-deb-repo/
#: (content/apt/apt-1/contents+en.lrquestion.description)
msgid ""
-"deb https://deb.torproject.org/torproject.org tor-nightly-"
-"master-<DISTRIBUTION> main"
+"deb [signed-by=/usr/share/keyrings/tor-archive-keyring.gpg] "
+"https://deb.torproject.org/torproject.org tor-nightly-master-<DISTRIBUTION> "
+"main"
msgstr ""
#: https//support.torproject.org/apt/tor-deb-repo/
#: (content/apt/apt-1/contents+en.lrquestion.description)
msgid ""
-"deb-src https://deb.torproject.org/torproject.org tor-nightly-"
-"master-<DISTRIBUTION> main"
+"deb-src [signed-by=/usr/share/keyrings/tor-archive-keyring.gpg] "
+"https://deb.torproject.org/torproject.org tor-nightly-master-<DISTRIBUTION> "
+"main"
msgstr ""
#: https//support.torproject.org/apt/tor-deb-repo/
@@ -9895,13 +10896,15 @@ msgstr ""
#: https//support.torproject.org/apt/tor-deb-repo/
#: (content/apt/apt-1/contents+en.lrquestion.description)
msgid ""
-"deb [arch=amd64] https://deb.torproject.org/torproject.org focal main"
+"deb [arch=amd64 signed-by=/usr/share/keyrings/tor-archive-keyring.gpg] "
+"https://deb.torproject.org/torproject.org focal main"
msgstr ""
#: https//support.torproject.org/apt/tor-deb-repo/
#: (content/apt/apt-1/contents+en.lrquestion.description)
msgid ""
-"deb-src [arch=amd64] https://deb.torproject.org/torproject.org focal main"
+"deb-src [arch=amd64 signed-by=/usr/share/keyrings/tor-archive-keyring.gpg] "
+"https://deb.torproject.org/torproject.org focal main"
msgstr ""
#: https//support.torproject.org/apt/tor-deb-repo/
@@ -9921,21 +10924,16 @@ msgstr ""
#: (content/apt/apt-1/contents+en.lrquestion.description)
msgid ""
"#### 3. Then add the gpg key used to sign the packages by running the "
-"following commands at your command prompt"
+"following command at your command prompt:"
msgstr ""
#: https//support.torproject.org/apt/tor-deb-repo/
#: (content/apt/apt-1/contents+en.lrquestion.description)
msgid ""
-"# wget -qO- "
+"# wget -O- "
"https://deb.torproject.org/torproject.org/A3C4F0F979CAA22CDBA8F512EE8CBC9E886DDD89.asc"
-" | gpg --import"
-msgstr ""
-
-#: https//support.torproject.org/apt/tor-deb-repo/
-#: (content/apt/apt-1/contents+en.lrquestion.description)
-msgid ""
-"# gpg --export A3C4F0F979CAA22CDBA8F512EE8CBC9E886DDD89 | apt-key add -"
+" | gpg --dearmor | tee /usr/share/keyrings/tor-archive-keyring.gpg "
+">/dev/null"
msgstr ""
#: https//support.torproject.org/apt/tor-deb-repo/
@@ -11542,6 +12540,82 @@ msgid ""
"doesn't change IP address over the day."
msgstr ""
+#: https//support.torproject.org/alternate-designs/block-websites/
+#: (content/alternate-designs/block-websites/contents+en.lrquestion.title)
+msgid "Exit policies should be able to block websites, not just IP addresses."
+msgstr ""
+
+#: https//support.torproject.org/alternate-designs/block-websites/
+#: (content/alternate-designs/block-websites/contents+en.lrquestion.description)
+msgid ""
+"It would be nice to let relay operators say things like `reject "
+"www.slashdot.org` in their exit policies, rather than requiring them to "
+"learn all the IP address space that could be covered by the site (and then "
+"also blocking other sites at those IP addresses)."
+msgstr ""
+
+#: https//support.torproject.org/alternate-designs/block-websites/
+#: (content/alternate-designs/block-websites/contents+en.lrquestion.description)
+msgid "There are two problems, though."
+msgstr ""
+
+#: https//support.torproject.org/alternate-designs/block-websites/
+#: (content/alternate-designs/block-websites/contents+en.lrquestion.description)
+msgid "First, users could still get around these blocks."
+msgstr ""
+
+#: https//support.torproject.org/alternate-designs/block-websites/
+#: (content/alternate-designs/block-websites/contents+en.lrquestion.description)
+msgid ""
+"For example, they could request the IP address rather than the hostname when"
+" they exit from the Tor network."
+msgstr ""
+
+#: https//support.torproject.org/alternate-designs/block-websites/
+#: (content/alternate-designs/block-websites/contents+en.lrquestion.description)
+msgid ""
+"This means operators would still need to learn all the IP addresses for the "
+"destinations in question."
+msgstr ""
+
+#: https//support.torproject.org/alternate-designs/block-websites/
+#: (content/alternate-designs/block-websites/contents+en.lrquestion.description)
+msgid ""
+"The second problem is that it would allow remote attackers to censor "
+"arbitrary sites."
+msgstr ""
+
+#: https//support.torproject.org/alternate-designs/block-websites/
+#: (content/alternate-designs/block-websites/contents+en.lrquestion.description)
+msgid ""
+"For example, if a Tor operator blocks www1.slashdot.org, and then some "
+"attacker poisons the Tor relay's DNS or otherwise changes that hostname to "
+"resolve to the IP address for a major news site, then suddenly that Tor "
+"relay is blocking the news site."
+msgstr ""
+
+#: https//support.torproject.org/alternate-designs/let-the-network-pick-the-path/
+#: (content/alternate-designs/let-the-network-pick-the-path/contents+en.lrquestion.title)
+msgid "You should let the network pick the path, not the client."
+msgstr ""
+
+#: https//support.torproject.org/alternate-designs/let-the-network-pick-the-path/
+#: (content/alternate-designs/let-the-network-pick-the-path/contents+en.lrquestion.description)
+msgid "No, you cannot trust the network to pick the path."
+msgstr ""
+
+#: https//support.torproject.org/alternate-designs/let-the-network-pick-the-path/
+#: (content/alternate-designs/let-the-network-pick-the-path/contents+en.lrquestion.description)
+msgid "Malicious relays could route you through their colluding friends."
+msgstr ""
+
+#: https//support.torproject.org/alternate-designs/let-the-network-pick-the-path/
+#: (content/alternate-designs/let-the-network-pick-the-path/contents+en.lrquestion.description)
+msgid ""
+"This would give an adversary the ability to watch all of your traffic end to"
+" end."
+msgstr ""
+
#: lego/templates/banner.html:3 lego/templates/banner.html:5
#: templates/banner.html:3 templates/banner.html:5
msgid "Close banner"
@@ -11572,8 +12646,8 @@ msgid "DONATE NOW"
msgstr "תר×× ×¢×ש××"
#: lego/templates/footer.html:13 lego/templates/footer.html:22
-#: lego/templates/navbar.html:83 templates/footer.html:13
-#: templates/footer.html:22 templates/navbar.html:83
+#: lego/templates/navbar.html:95 templates/footer.html:13
+#: templates/footer.html:22 templates/navbar.html:95
msgid "Download Tor Browser"
msgstr "×××¨× ×ת ×פ××¤× Tor"
diff --git a/contents+hr.po b/contents+hr.po
index 38c1e2de8b..4726aa9796 100644
--- a/contents+hr.po
+++ b/contents+hr.po
@@ -11,7 +11,7 @@ msgid ""
msgstr ""
"Project-Id-Version: PACKAGE VERSION\n"
"Report-Msgid-Bugs-To: \n"
-"POT-Creation-Date: 2021-08-25 11:14+CET\n"
+"POT-Creation-Date: 2021-09-01 12:20+CET\n"
"PO-Revision-Date: 2018-10-02 22:41+0000\n"
"Last-Translator: milotype <mail at milotype.de>, 2021\n"
"Language-Team: Croatian (https://www.transifex.com/otf/teams/1519/hr/)\n"
@@ -144,6 +144,11 @@ msgstr ""
msgid "Tor Metrics"
msgstr "Tor metrika"
+#: https//support.torproject.org/alternate-designs/
+#: (content/alternate-designs/contents+en.lrtopic.title)
+msgid "Alternate Designs We Don't Do (Yet)"
+msgstr ""
+
#: https//support.torproject.org/glossary/add-on-extension-or-plugin/
#: (content/glossary/add-on-extension-or-plugin/contents+en.lrword.term)
msgid "add-on, extension, or plugin"
@@ -2423,6 +2428,61 @@ msgid ""
"wiki](https://trac.torproject.org/projects/tor/wiki/doc/TorPlusVPN)."
msgstr ""
+#: https//support.torproject.org/faq/relay-donations/
+#: (content/faq/relay-donations/contents+en.lrquestion.title)
+msgid "Can I donate for a relay rather than run my own?"
+msgstr ""
+
+#: https//support.torproject.org/faq/relay-donations/
+#: (content/faq/relay-donations/contents+en.lrquestion.description)
+msgid ""
+"Sure! We have a [list of organizations that run Tor "
+"relays](https://community.torproject.org/relay/community-resources/relay-"
+"associations/) that are happy to turn your donations into better speed and "
+"anonymity for the Tor network."
+msgstr ""
+
+#: https//support.torproject.org/faq/relay-donations/
+#: (content/faq/relay-donations/contents+en.lrquestion.description)
+msgid ""
+"These organizations are not the same as [The Tor Project, "
+"Inc](https://donate.torproject.org/), but we consider that a good thing."
+msgstr ""
+
+#: https//support.torproject.org/faq/relay-donations/
+#: (content/faq/relay-donations/contents+en.lrquestion.description)
+msgid "They're run by nice people who are part of the Tor community."
+msgstr ""
+
+#: https//support.torproject.org/faq/relay-donations/
+#: (content/faq/relay-donations/contents+en.lrquestion.description)
+msgid ""
+"Note that there can be a tradeoff here between anonymity and performance."
+msgstr ""
+
+#: https//support.torproject.org/faq/relay-donations/
+#: (content/faq/relay-donations/contents+en.lrquestion.description)
+msgid ""
+"The Tor network's anonymity comes in part from diversity, so if you are in a"
+" position to run your own relay, you will be improving Tor's anonymity more "
+"than by donating."
+msgstr ""
+
+#: https//support.torproject.org/faq/relay-donations/
+#: (content/faq/relay-donations/contents+en.lrquestion.description)
+msgid ""
+"At the same time though, economies of scale for bandwidth mean that "
+"combining many small donations into several larger relays is more efficient "
+"at improving network performance."
+msgstr ""
+
+#: https//support.torproject.org/faq/relay-donations/
+#: (content/faq/relay-donations/contents+en.lrquestion.description)
+msgid ""
+"Improving anonymity and improving performance are both worthwhile goals, so "
+"however you can help is great!"
+msgstr ""
+
#: https//support.torproject.org/faq/staying-anonymous/
#: (content/faq/staying-anonymous/contents+en.lrquestion.title)
msgid "Am I totally anonymous if I use Tor?"
@@ -2733,6 +2793,61 @@ msgid ""
" documenting all the issues](https://community.torproject.org/)."
msgstr ""
+#: https//support.torproject.org/about/attacks-on-onion-routing/
+#: (content/about/attacks-on-onion-routing/contents+en.lrquestion.title)
+msgid "What attacks remain against onion routing?"
+msgstr ""
+
+#: https//support.torproject.org/about/attacks-on-onion-routing/
+#: (content/about/attacks-on-onion-routing/contents+en.lrquestion.description)
+msgid ""
+"As mentioned above, it is possible for an observer who can view both you and"
+" either the destination website or your Tor exit node to correlate timings "
+"of your traffic as it enters the Tor network and also as it exits."
+msgstr ""
+
+#: https//support.torproject.org/about/attacks-on-onion-routing/
+#: (content/about/attacks-on-onion-routing/contents+en.lrquestion.description)
+msgid "Tor does not defend against such a threat model."
+msgstr ""
+
+#: https//support.torproject.org/about/attacks-on-onion-routing/
+#: (content/about/attacks-on-onion-routing/contents+en.lrquestion.description)
+msgid ""
+"In a more limited sense, note that if a censor or law enforcement agency has"
+" the ability to obtain specific observation of parts of the network, it is "
+"possible for them to verify a suspicion that you talk regularly to your "
+"friend by observing traffic at both ends and correlating the timing of only "
+"that traffic."
+msgstr ""
+
+#: https//support.torproject.org/about/attacks-on-onion-routing/
+#: (content/about/attacks-on-onion-routing/contents+en.lrquestion.description)
+msgid ""
+"Again, this is only useful to verify that parties already suspected of "
+"communicating with one another are doing so."
+msgstr ""
+
+#: https//support.torproject.org/about/attacks-on-onion-routing/
+#: (content/about/attacks-on-onion-routing/contents+en.lrquestion.description)
+msgid ""
+"In most countries, the suspicion required to obtain a warrant already "
+"carries more weight than timing correlation would provide."
+msgstr ""
+
+#: https//support.torproject.org/about/attacks-on-onion-routing/
+#: (content/about/attacks-on-onion-routing/contents+en.lrquestion.description)
+msgid ""
+"Furthermore, since Tor reuses circuits for multiple TCP connections, it is "
+"possible to associate non anonymous and anonymous traffic at a given exit "
+"node, so be careful about what applications you run concurrently over Tor."
+msgstr ""
+
+#: https//support.torproject.org/about/attacks-on-onion-routing/
+#: (content/about/attacks-on-onion-routing/contents+en.lrquestion.description)
+msgid "Perhaps even run separate Tor clients for these applications."
+msgstr ""
+
#: https//support.torproject.org/about/backdoor/
#: (content/about/backdoor/contents+en.lrquestion.title)
msgid "Is there a backdoor in Tor?"
@@ -2868,6 +2983,43 @@ msgid ""
"recommended](/tbb/tbb-9/)."
msgstr ""
+#: https//support.torproject.org/about/change-paths/
+#: (content/about/change-paths/contents+en.lrquestion.title)
+msgid "How often does Tor change its paths?"
+msgstr ""
+
+#: https//support.torproject.org/about/change-paths/
+#: (content/about/change-paths/contents+en.lrquestion.description)
+msgid ""
+"Tor will reuse the same circuit for new TCP streams for 10 minutes, as long "
+"as the circuit is working fine."
+msgstr ""
+
+#: https//support.torproject.org/about/change-paths/
+#: (content/about/change-paths/contents+en.lrquestion.description)
+msgid "(If the circuit fails, Tor will switch to a new circuit immediately.)"
+msgstr ""
+
+#: https//support.torproject.org/about/change-paths/
+#: (content/about/change-paths/contents+en.lrquestion.description)
+msgid ""
+"But note that a single TCP stream (e.g. a long IRC connection) will stay on "
+"the same circuit forever."
+msgstr ""
+
+#: https//support.torproject.org/about/change-paths/
+#: (content/about/change-paths/contents+en.lrquestion.description)
+msgid "We don't rotate individual streams from one circuit to the next."
+msgstr ""
+
+#: https//support.torproject.org/about/change-paths/
+#: (content/about/change-paths/contents+en.lrquestion.description)
+msgid ""
+"Otherwise, an adversary with a partial view of the network would be given "
+"many chances over time to link you to your destination, rather than just one"
+" chance."
+msgstr ""
+
#: https//support.torproject.org/about/distribute-tor/
#: (content/about/distribute-tor/contents+en.lrquestion.title)
msgid "Can I distribute Tor?"
@@ -2966,6 +3118,133 @@ msgid ""
"details."
msgstr ""
+#: https//support.torproject.org/about/entry-guards/
+#: (content/about/entry-guards/contents+en.lrquestion.title)
+msgid "What are Entry Guards?"
+msgstr ""
+
+#: https//support.torproject.org/about/entry-guards/
+#: (content/about/entry-guards/contents+en.lrquestion.description)
+msgid ""
+"Tor (like all current practical low-latency anonymity designs) fails when "
+"the attacker can see both ends of the communications channel."
+msgstr ""
+
+#: https//support.torproject.org/about/entry-guards/
+#: (content/about/entry-guards/contents+en.lrquestion.description)
+msgid ""
+"For example, suppose the attacker controls or watches the Tor relay you "
+"choose to enter the network, and also controls or watches the website you "
+"visit."
+msgstr ""
+
+#: https//support.torproject.org/about/entry-guards/
+#: (content/about/entry-guards/contents+en.lrquestion.description)
+msgid ""
+"In this case, the research community knows no practical low-latency design "
+"that can reliably stop the attacker from correlating volume and timing "
+"information on the two sides."
+msgstr ""
+
+#: https//support.torproject.org/about/entry-guards/
+#: (content/about/entry-guards/contents+en.lrquestion.description)
+msgid "So, what should we do?"
+msgstr ""
+
+#: https//support.torproject.org/about/entry-guards/
+#: (content/about/entry-guards/contents+en.lrquestion.description)
+msgid "Suppose the attacker controls, or can observe, C relays."
+msgstr ""
+
+#: https//support.torproject.org/about/entry-guards/
+#: (content/about/entry-guards/contents+en.lrquestion.description)
+msgid "Suppose there are N relays total."
+msgstr ""
+
+#: https//support.torproject.org/about/entry-guards/
+#: (content/about/entry-guards/contents+en.lrquestion.description)
+msgid ""
+"If you select new entry and exit relays each time you use the network, the "
+"attacker will be able to correlate all traffic you send with probability "
+"around (c/n)2."
+msgstr ""
+
+#: https//support.torproject.org/about/entry-guards/
+#: (content/about/entry-guards/contents+en.lrquestion.description)
+msgid ""
+"But profiling is, for most users, as bad as being traced all the time: they "
+"want to do something often without an attacker noticing, and the attacker "
+"noticing once is as bad as the attacker noticing more often."
+msgstr ""
+
+#: https//support.torproject.org/about/entry-guards/
+#: (content/about/entry-guards/contents+en.lrquestion.description)
+msgid ""
+"Thus, choosing many random entries and exits gives the user no chance of "
+"escaping profiling by this kind of attacker."
+msgstr ""
+
+#: https//support.torproject.org/about/entry-guards/
+#: (content/about/entry-guards/contents+en.lrquestion.description)
+msgid ""
+"The solution is \"entry guards\": each Tor client selects a few relays at "
+"random to use as entry points, and uses only those relays for their first "
+"hop."
+msgstr ""
+
+#: https//support.torproject.org/about/entry-guards/
+#: (content/about/entry-guards/contents+en.lrquestion.description)
+msgid ""
+"If those relays are not controlled or observed, the attacker can't win, "
+"ever, and the user is secure."
+msgstr ""
+
+#: https//support.torproject.org/about/entry-guards/
+#: (content/about/entry-guards/contents+en.lrquestion.description)
+msgid ""
+"If those relays are observed or controlled by the attacker, the attacker "
+"sees a larger fraction of the user's traffic - but still the user is no more"
+" profiled than before."
+msgstr ""
+
+#: https//support.torproject.org/about/entry-guards/
+#: (content/about/entry-guards/contents+en.lrquestion.description)
+msgid ""
+"Thus, the user has some chance (on the order of (n-c)/n) of avoiding "
+"profiling, whereas they had none before."
+msgstr ""
+
+#: https//support.torproject.org/about/entry-guards/
+#: (content/about/entry-guards/contents+en.lrquestion.description)
+msgid ""
+"You can read more at [An Analysis of the Degradation of Anonymous "
+"Protocols](http://freehaven.net/anonbib/#wright02), [Defending Anonymous "
+"Communication Against Passive Logging "
+"Attacks](http://freehaven.net/anonbib/#wright03), and especially [Locating "
+"Hidden Servers](http://freehaven.net/anonbib/#hs-attack06)."
+msgstr ""
+
+#: https//support.torproject.org/about/entry-guards/
+#: (content/about/entry-guards/contents+en.lrquestion.description)
+msgid ""
+"Restricting your entry nodes may also help against attackers who want to run"
+" a few Tor nodes and easily enumerate all of the Tor user IP addresses."
+msgstr ""
+
+#: https//support.torproject.org/about/entry-guards/
+#: (content/about/entry-guards/contents+en.lrquestion.description)
+msgid ""
+"(Even though they can't learn what destinations the users are talking to, "
+"they still might be able to do bad things with just a list of users.)"
+msgstr ""
+
+#: https//support.torproject.org/about/entry-guards/
+#: (content/about/entry-guards/contents+en.lrquestion.description)
+msgid ""
+"However, that feature won't really become useful until we move to a "
+"\"directory guard\" design as well."
+msgstr ""
+
#: https//support.torproject.org/about/how-is-tor-different-from-other-proxies/
#: (content/about/how-is-tor-different-from-other-proxies/contents+en.lrquestion.title)
msgid "How is Tor different from other proxies?"
@@ -3136,6 +3415,162 @@ msgid ""
" Tor and HTTPS interact."
msgstr ""
+#: https//support.torproject.org/about/key-management/
+#: (content/about/key-management/contents+en.lrquestion.title)
+msgid "Tell me about all the keys Tor uses"
+msgstr ""
+
+#: https//support.torproject.org/about/key-management/
+#: (content/about/key-management/contents+en.lrquestion.description)
+msgid ""
+"Tor uses a variety of different keys, with three goals in mind: 1) "
+"encryption to ensure privacy of data within the Tor network, 2) "
+"authentication so clients know they're talking to the relays they meant to "
+"talk to, and 3) signatures to make sure all clients know the same set of "
+"relays."
+msgstr ""
+
+#: https//support.torproject.org/about/key-management/
+#: (content/about/key-management/contents+en.lrquestion.description)
+msgid ""
+"**Encryption**: first, all connections in Tor use TLS link encryption, so "
+"observers can't look inside to see which circuit a given cell is intended "
+"for."
+msgstr ""
+
+#: https//support.torproject.org/about/key-management/
+#: (content/about/key-management/contents+en.lrquestion.description)
+msgid ""
+"Further, the Tor client establishes an ephemeral encryption key with each "
+"relay in the circuit; these extra layers of encryption mean that only the "
+"exit relay can read the cells."
+msgstr ""
+
+#: https//support.torproject.org/about/key-management/
+#: (content/about/key-management/contents+en.lrquestion.description)
+msgid ""
+"Both sides discard the circuit key when the circuit ends, so logging traffic"
+" and then breaking into the relay to discover the key won't work."
+msgstr ""
+
+#: https//support.torproject.org/about/key-management/
+#: (content/about/key-management/contents+en.lrquestion.description)
+msgid ""
+"**Authentication**: Every Tor relay has a public decryption key called the "
+"\"onion key\"."
+msgstr ""
+
+#: https//support.torproject.org/about/key-management/
+#: (content/about/key-management/contents+en.lrquestion.description)
+msgid "Each relay rotates its onion key once a week."
+msgstr ""
+
+#: https//support.torproject.org/about/key-management/
+#: (content/about/key-management/contents+en.lrquestion.description)
+msgid ""
+"When the Tor client establishes circuits, at each step it [demands that the "
+"Tor relay prove knowledge of its onion key](https://svn-"
+"archive.torproject.org/svn/projects/design-paper/tor-"
+"design.html#subsec:circuits)."
+msgstr ""
+
+#: https//support.torproject.org/about/key-management/
+#: (content/about/key-management/contents+en.lrquestion.description)
+msgid ""
+"That way the first node in the path can't just spoof the rest of the path."
+msgstr ""
+
+#: https//support.torproject.org/about/key-management/
+#: (content/about/key-management/contents+en.lrquestion.description)
+msgid ""
+"Because the Tor client chooses the path, it can make sure to get Tor's "
+"\"distributed trust\" property: no single relay in the path can know about "
+"both the client and what the client is doing."
+msgstr ""
+
+#: https//support.torproject.org/about/key-management/
+#: (content/about/key-management/contents+en.lrquestion.description)
+msgid ""
+"**Coordination**: How do clients know what the relays are, and how do they "
+"know that they have the right keys for them?"
+msgstr ""
+
+#: https//support.torproject.org/about/key-management/
+#: (content/about/key-management/contents+en.lrquestion.description)
+msgid "Each relay has a long-term public signing key called the \"identity key\"."
+msgstr ""
+
+#: https//support.torproject.org/about/key-management/
+#: (content/about/key-management/contents+en.lrquestion.description)
+msgid "Each directory authority additionally has a \"directory signing key\"."
+msgstr ""
+
+#: https//support.torproject.org/about/key-management/
+#: (content/about/key-management/contents+en.lrquestion.description)
+msgid ""
+"The directory authorities [provide a signed "
+"list](https://gitweb.torproject.org/torspec.git/tree/dir-spec.txt) of all "
+"the known relays, and in that list are a set of certificates from each relay"
+" (self-signed by their identity key) specifying their keys, locations, exit "
+"policies, and so on."
+msgstr ""
+
+#: https//support.torproject.org/about/key-management/
+#: (content/about/key-management/contents+en.lrquestion.description)
+msgid ""
+"So unless the adversary can control a majority of the directory authorities "
+"(as of 2021 there are 10 directory authorities), they can't trick the Tor "
+"client into using other Tor relays."
+msgstr ""
+
+#: https//support.torproject.org/about/key-management/
+#: (content/about/key-management/contents+en.lrquestion.description)
+msgid "How do clients know what the directory authorities are?"
+msgstr ""
+
+#: https//support.torproject.org/about/key-management/
+#: (content/about/key-management/contents+en.lrquestion.description)
+msgid ""
+"The Tor software comes with a built-in list of location and public key for "
+"each directory authority."
+msgstr ""
+
+#: https//support.torproject.org/about/key-management/
+#: (content/about/key-management/contents+en.lrquestion.description)
+msgid ""
+"So the only way to trick users into using a fake Tor network is to give them"
+" a specially modified version of the software."
+msgstr ""
+
+#: https//support.torproject.org/about/key-management/
+#: (content/about/key-management/contents+en.lrquestion.description)
+msgid "How do users know they've got the right software?"
+msgstr ""
+
+#: https//support.torproject.org/about/key-management/
+#: (content/about/key-management/contents+en.lrquestion.description)
+msgid ""
+"When we distribute the source code or a package, we digitally sign it with "
+"[GNU Privacy Guard](http://www.gnupg.org/). See the [instructions on how to "
+"check Tor Browser's signature](https://support.torproject.org/tbb/how-to-"
+"verify-signature/)."
+msgstr ""
+
+#: https//support.torproject.org/about/key-management/
+#: (content/about/key-management/contents+en.lrquestion.description)
+msgid ""
+"In order to be certain that it's really signed by us, you need to have met "
+"us in person and gotten a copy of our GPG key fingerprint, or you need to "
+"know somebody who has."
+msgstr ""
+
+#: https//support.torproject.org/about/key-management/
+#: (content/about/key-management/contents+en.lrquestion.description)
+msgid ""
+"If you're concerned about an attack on this level, we recommend you get "
+"involved with the security community and start meeting people."
+msgstr ""
+
#: https//support.torproject.org/about/no-data-scrubbing/
#: (content/about/no-data-scrubbing/contents+en.lrquestion.title)
msgid ""
@@ -3168,6 +3603,151 @@ msgid ""
"though."
msgstr ""
+#: https//support.torproject.org/about/protections/
+#: (content/about/protections/contents+en.lrquestion.title)
+msgid "What protections does Tor provide?"
+msgstr ""
+
+#: https//support.torproject.org/about/protections/
+#: (content/about/protections/contents+en.lrquestion.description)
+msgid ""
+"Internet communication is based on a store-and-forward model that can be "
+"understood in analogy to postal mail: Data is transmitted in blocks called "
+"IP datagrams or packets."
+msgstr ""
+
+#: https//support.torproject.org/about/protections/
+#: (content/about/protections/contents+en.lrquestion.description)
+msgid ""
+"Every packet includes a source IP address (of the sender) and a destination "
+"IP address (of the receiver), just as ordinary letters contain postal "
+"addresses of sender and receiver."
+msgstr ""
+
+#: https//support.torproject.org/about/protections/
+#: (content/about/protections/contents+en.lrquestion.description)
+msgid ""
+"The way from sender to receiver involves multiple hops of routers, where "
+"each router inspects the destination IP address and forwards the packet "
+"closer to its destination."
+msgstr ""
+
+#: https//support.torproject.org/about/protections/
+#: (content/about/protections/contents+en.lrquestion.description)
+msgid ""
+"Thus, every router between sender and receiver learns that the sender is "
+"communicating with the receiver."
+msgstr ""
+
+#: https//support.torproject.org/about/protections/
+#: (content/about/protections/contents+en.lrquestion.description)
+msgid ""
+"In particular, your local ISP is in the position to build a complete profile"
+" of your Internet usage."
+msgstr ""
+
+#: https//support.torproject.org/about/protections/
+#: (content/about/protections/contents+en.lrquestion.description)
+msgid ""
+"In addition, every server in the Internet that can see any of the packets "
+"can profile your behavior."
+msgstr ""
+
+#: https//support.torproject.org/about/protections/
+#: (content/about/protections/contents+en.lrquestion.description)
+msgid ""
+"The aim of Tor is to improve your privacy by sending your traffic through a "
+"series of proxies."
+msgstr ""
+
+#: https//support.torproject.org/about/protections/
+#: (content/about/protections/contents+en.lrquestion.description)
+msgid ""
+"Your communication is encrypted in multiple layers and routed via multiple "
+"hops through the Tor network to the final receiver."
+msgstr ""
+
+#: https//support.torproject.org/about/protections/
+#: (content/about/protections/contents+en.lrquestion.description)
+msgid ""
+"More details on this process can be found in this "
+"[visualization](https://support.torproject.org/https/https-1/)."
+msgstr ""
+
+#: https//support.torproject.org/about/protections/
+#: (content/about/protections/contents+en.lrquestion.description)
+msgid ""
+"Note that all your local ISP can observe now is that you are communicating "
+"with Tor nodes."
+msgstr ""
+
+#: https//support.torproject.org/about/protections/
+#: (content/about/protections/contents+en.lrquestion.description)
+msgid ""
+"Similarly, servers in the Internet just see that they are being contacted by"
+" Tor nodes."
+msgstr ""
+
+#: https//support.torproject.org/about/protections/
+#: (content/about/protections/contents+en.lrquestion.description)
+msgid "Generally speaking, Tor aims to solve three privacy problems:"
+msgstr ""
+
+#: https//support.torproject.org/about/protections/
+#: (content/about/protections/contents+en.lrquestion.description)
+msgid ""
+"First, Tor prevents websites and other services from learning your location,"
+" which they can use to build databases about your habits and interests."
+msgstr ""
+
+#: https//support.torproject.org/about/protections/
+#: (content/about/protections/contents+en.lrquestion.description)
+msgid ""
+"With Tor, your Internet connections don't give you away by default -- now "
+"you can have the ability to choose, for each connection, how much "
+"information to reveal."
+msgstr ""
+
+#: https//support.torproject.org/about/protections/
+#: (content/about/protections/contents+en.lrquestion.description)
+msgid ""
+"Second, Tor prevents people watching your traffic locally (such as your ISP "
+"or someone with access to your home wifi or router) from learning what "
+"information you're fetching and where you're fetching it from."
+msgstr ""
+
+#: https//support.torproject.org/about/protections/
+#: (content/about/protections/contents+en.lrquestion.description)
+msgid ""
+"It also stops them from deciding what you're allowed to learn and publish --"
+" if you can get to any part of the Tor network, you can reach any site on "
+"the Internet."
+msgstr ""
+
+#: https//support.torproject.org/about/protections/
+#: (content/about/protections/contents+en.lrquestion.description)
+msgid ""
+"Third, Tor routes your connection through more than one Tor relay so no "
+"single relay can learn what you're up to."
+msgstr ""
+
+#: https//support.torproject.org/about/protections/
+#: (content/about/protections/contents+en.lrquestion.description)
+msgid ""
+"Because these relays are run by different individuals or organizations, "
+"distributing trust provides more security than the old [one hop "
+"proxy](https://support.torproject.org/about/#how-is-tor-different-from-"
+"other-proxies) approach."
+msgstr ""
+
+#: https//support.torproject.org/about/protections/
+#: (content/about/protections/contents+en.lrquestion.description)
+msgid ""
+"Note, however, that there are situations where Tor fails to solve these "
+"privacy problems entirely: see the entry below on [remaining "
+"attacks](https://support.torproject.org/about/#attacks-on-onion-routing)."
+msgstr ""
+
#: https//support.torproject.org/about/what-is-tor/
#: (content/about/what-is-tor/contents+en.lrquestion.title)
msgid "What is Tor?"
@@ -5358,9 +5938,11 @@ msgstr ""
#: (content/tbb/tbb-47/contents+en.lrquestion.description)
msgid ""
"Also, read up on the HTTPProxyAuthenticator and HTTPSProxyAuthenticator "
-"options if your proxy requires auth. We only support basic auth currently, "
-"but if you need NTLM authentication, you may find [this post in the "
-"archives](https://archives.seul.org/or/talk/Jun-2005/msg00223.html) useful."
+"options if your [proxy requires auth.](https://developer.mozilla.org/en-"
+"US/docs/Web/HTTP/Headers/Proxy-Authenticate) We only support basic auth "
+"currently, but if you need NTLM authentication, you may find [this post in "
+"the archives](https://archives.seul.org/or/talk/Jun-2005/msg00223.html) "
+"useful."
msgstr ""
#: https//support.torproject.org/tbb/tbb-47/
@@ -5580,6 +6162,219 @@ msgid ""
"have no effect on Tor's configuration."
msgstr ""
+#: https//support.torproject.org/tbb/tbb-firewall-ports/
+#: (content/tbb/tbb-firewall-ports/contents+en.lrquestion.title)
+msgid "My firewall only allows a few outgoing ports"
+msgstr ""
+
+#: https//support.torproject.org/tbb/tbb-firewall-ports/
+#: (content/tbb/tbb-firewall-ports/contents+en.lrquestion.description)
+msgid ""
+"If your firewall works by blocking ports, then you can tell Tor to only use "
+"the ports when you start your Tor Browser."
+msgstr ""
+
+#: https//support.torproject.org/tbb/tbb-firewall-ports/
+#: (content/tbb/tbb-firewall-ports/contents+en.lrquestion.description)
+msgid ""
+"Or you can add the ports that your firewall permits by adding "
+"\"FascistFirewall 1\" to your torrc configuration file."
+msgstr ""
+
+#: https//support.torproject.org/tbb/tbb-firewall-ports/
+#: (content/tbb/tbb-firewall-ports/contents+en.lrquestion.description)
+msgid ""
+"By default, when you set this Tor assumes that your firewall allows only "
+"port 80 and port 443 (HTTP and HTTPS respectively)."
+msgstr ""
+
+#: https//support.torproject.org/tbb/tbb-firewall-ports/
+#: (content/tbb/tbb-firewall-ports/contents+en.lrquestion.description)
+msgid ""
+"You can select a different set of ports with the FirewallPorts torrc option."
+msgstr ""
+
+#: https//support.torproject.org/tbb/tbb-firewall-ports/
+#: (content/tbb/tbb-firewall-ports/contents+en.lrquestion.description)
+msgid ""
+"If you want to be more fine-grained with your controls, you can also use the"
+" ReachableAddresses config options, e.g.:"
+msgstr ""
+
+#: https//support.torproject.org/tbb/tbb-firewall-ports/
+#: (content/tbb/tbb-firewall-ports/contents+en.lrquestion.description)
+#: https//support.torproject.org/tbb/tbb-install-tor-central-server/
+#: (content/tbb/tbb-install-tor-central-server/contents+en.lrquestion.description)
+#: https//support.torproject.org/operators/default-exit-ports/
+#: (content/operators/default-exit-ports/contents+en.lrquestion.description)
+#: https//support.torproject.org/operators/hibernation/
+#: (content/operators/hibernation/contents+en.lrquestion.description)
+#: https//support.torproject.org/operators/limit-total-bandwidth/
+#: (content/operators/limit-total-bandwidth/contents+en.lrquestion.description)
+#: https//support.torproject.org/misc/bug-or-feedback/
+#: (content/misc/bug-or-feedback/contents+en.lrquestion.description)
+#: https//support.torproject.org/get-in-touch/why-i-cant-join-tor-channels/
+#: (content/get-in-touch/why-i-cant-join-tor-channels/contents+en.lrquestion.description)
+#: https//support.torproject.org/apt/tor-deb-repo/
+#: (content/apt/apt-1/contents+en.lrquestion.description)
+#: https//support.torproject.org/apt/apt-over-tor/
+#: (content/apt/apt-3/contents+en.lrquestion.description)
+msgid "```"
+msgstr ""
+
+#: https//support.torproject.org/tbb/tbb-firewall-ports/
+#: (content/tbb/tbb-firewall-ports/contents+en.lrquestion.description)
+msgid "ReachableDirAddresses *:80"
+msgstr ""
+
+#: https//support.torproject.org/tbb/tbb-firewall-ports/
+#: (content/tbb/tbb-firewall-ports/contents+en.lrquestion.description)
+msgid "ReachableORAddresses *:443"
+msgstr ""
+
+#: https//support.torproject.org/tbb/tbb-install-tor-central-server/
+#: (content/tbb/tbb-install-tor-central-server/contents+en.lrquestion.title)
+msgid ""
+"Can I install Tor on a central server, and have my clients connect to it?"
+msgstr ""
+
+#: https//support.torproject.org/tbb/tbb-install-tor-central-server/
+#: (content/tbb/tbb-install-tor-central-server/contents+en.lrquestion.description)
+msgid ""
+"Yes. Tor can be configured as a client or a relay on another machine, and "
+"allow other machines to be able to connect to it for anonymity."
+msgstr ""
+
+#: https//support.torproject.org/tbb/tbb-install-tor-central-server/
+#: (content/tbb/tbb-install-tor-central-server/contents+en.lrquestion.description)
+msgid ""
+"This is most useful in an environment where many computers want a gateway of"
+" anonymity to the rest of the world."
+msgstr ""
+
+#: https//support.torproject.org/tbb/tbb-install-tor-central-server/
+#: (content/tbb/tbb-install-tor-central-server/contents+en.lrquestion.description)
+msgid ""
+"However, be forewarned that with this configuration, anyone within your "
+"private network (existing between you and the Tor client/relay) can see what"
+" traffic you are sending in clear text."
+msgstr ""
+
+#: https//support.torproject.org/tbb/tbb-install-tor-central-server/
+#: (content/tbb/tbb-install-tor-central-server/contents+en.lrquestion.description)
+msgid "The anonymity doesn't start until you get to the Tor relay."
+msgstr ""
+
+#: https//support.torproject.org/tbb/tbb-install-tor-central-server/
+#: (content/tbb/tbb-install-tor-central-server/contents+en.lrquestion.description)
+msgid ""
+"Because of this, if you are the controller of your domain and you know "
+"everything's locked down, you will be OK, but this configuration may not be "
+"suitable for large private networks where security is key all around."
+msgstr ""
+
+#: https//support.torproject.org/tbb/tbb-install-tor-central-server/
+#: (content/tbb/tbb-install-tor-central-server/contents+en.lrquestion.description)
+msgid ""
+"Configuration is simple, editing your torrc file's SocksListenAddress "
+"according to the following examples:"
+msgstr ""
+
+#: https//support.torproject.org/tbb/tbb-install-tor-central-server/
+#: (content/tbb/tbb-install-tor-central-server/contents+en.lrquestion.description)
+msgid "SocksListenAddress 127.0.0.1"
+msgstr ""
+
+#: https//support.torproject.org/tbb/tbb-install-tor-central-server/
+#: (content/tbb/tbb-install-tor-central-server/contents+en.lrquestion.description)
+msgid "SocksListenAddress 192.168.x.x:9100"
+msgstr ""
+
+#: https//support.torproject.org/tbb/tbb-install-tor-central-server/
+#: (content/tbb/tbb-install-tor-central-server/contents+en.lrquestion.description)
+msgid "SocksListenAddress 0.0.0.0:9100"
+msgstr ""
+
+#: https//support.torproject.org/tbb/tbb-install-tor-central-server/
+#: (content/tbb/tbb-install-tor-central-server/contents+en.lrquestion.description)
+msgid ""
+"You can state multiple listen addresses, in the case that you are part of "
+"several networks or subnets."
+msgstr ""
+
+#: https//support.torproject.org/tbb/tbb-install-tor-central-server/
+#: (content/tbb/tbb-install-tor-central-server/contents+en.lrquestion.description)
+msgid "SocksListenAddress 192.168.x.x:9100 #eth0"
+msgstr ""
+
+#: https//support.torproject.org/tbb/tbb-install-tor-central-server/
+#: (content/tbb/tbb-install-tor-central-server/contents+en.lrquestion.description)
+msgid "SocksListenAddress 10.x.x.x:9100 #eth1"
+msgstr ""
+
+#: https//support.torproject.org/tbb/tbb-install-tor-central-server/
+#: (content/tbb/tbb-install-tor-central-server/contents+en.lrquestion.description)
+msgid ""
+"After this, your clients on their respective networks/subnets would specify "
+"a socks proxy with the address and port you specified SocksListenAddress to "
+"be."
+msgstr ""
+
+#: https//support.torproject.org/tbb/tbb-install-tor-central-server/
+#: (content/tbb/tbb-install-tor-central-server/contents+en.lrquestion.description)
+msgid ""
+"Please note that the SocksPort configuration option gives the port ONLY for "
+"localhost (127.0.0.1)."
+msgstr ""
+
+#: https//support.torproject.org/tbb/tbb-install-tor-central-server/
+#: (content/tbb/tbb-install-tor-central-server/contents+en.lrquestion.description)
+msgid ""
+"When setting up your SocksListenAddress(es), you need to give the port with "
+"the address, as shown above."
+msgstr ""
+
+#: https//support.torproject.org/tbb/tbb-install-tor-central-server/
+#: (content/tbb/tbb-install-tor-central-server/contents+en.lrquestion.description)
+msgid ""
+"If you are interested in forcing all outgoing data through the central Tor "
+"client/relay, instead of the server only being an optional proxy, you may "
+"find the program iptables (for *nix) useful."
+msgstr ""
+
+#: https//support.torproject.org/tbb/tbb-run-client-different-computer/
+#: (content/tbb/tbb-run-client-different-computer/contents+en.lrquestion.title)
+msgid ""
+"I want to run my Tor client on a different computer than my applications"
+msgstr ""
+
+#: https//support.torproject.org/tbb/tbb-run-client-different-computer/
+#: (content/tbb/tbb-run-client-different-computer/contents+en.lrquestion.description)
+msgid ""
+"By default, your Tor client only listens for applications that connect from "
+"localhost."
+msgstr ""
+
+#: https//support.torproject.org/tbb/tbb-run-client-different-computer/
+#: (content/tbb/tbb-run-client-different-computer/contents+en.lrquestion.description)
+msgid "Connections from other computers are refused."
+msgstr ""
+
+#: https//support.torproject.org/tbb/tbb-run-client-different-computer/
+#: (content/tbb/tbb-run-client-different-computer/contents+en.lrquestion.description)
+msgid ""
+"If you want to torify applications on different computers than the Tor "
+"client, you should edit your torrc to define `SocksListenAddress 0.0.0.0` "
+"and then restart (or hup) Tor."
+msgstr ""
+
+#: https//support.torproject.org/tbb/tbb-run-client-different-computer/
+#: (content/tbb/tbb-run-client-different-computer/contents+en.lrquestion.description)
+msgid ""
+"If you want to get more advanced, you can configure your Tor client on a "
+"firewall to bind to your internal IP but not your external IP."
+msgstr ""
+
#: https//support.torproject.org/tbb/website-blocking-tor/
#: (content/tbb/website-blocking-tor/contents+en.lrquestion.title)
msgid "A website I am trying to reach is blocking access over Tor."
@@ -7033,6 +7828,130 @@ msgid ""
"guide."
msgstr ""
+#: https//support.torproject.org/operators/default-exit-ports/
+#: (content/operators/default-exit-ports/contents+en.lrquestion.title)
+msgid "Is there a list of default exit ports?"
+msgstr ""
+
+#: https//support.torproject.org/operators/default-exit-ports/
+#: (content/operators/default-exit-ports/contents+en.lrquestion.description)
+msgid ""
+"The default open ports are listed below but keep in mind that, any port or "
+"ports can be opened by the relay operator by configuring it in torrc or "
+"modifying the source code."
+msgstr ""
+
+#: https//support.torproject.org/operators/default-exit-ports/
+#: (content/operators/default-exit-ports/contents+en.lrquestion.description)
+msgid ""
+"The default according to src/or/policies.c ([line 85][1] and [line 1901][2])"
+" from the source code release [release-0.4.6][3]:"
+msgstr ""
+
+#: https//support.torproject.org/operators/default-exit-ports/
+#: (content/operators/default-exit-ports/contents+en.lrquestion.description)
+msgid "reject 0.0.0.0/8"
+msgstr ""
+
+#: https//support.torproject.org/operators/default-exit-ports/
+#: (content/operators/default-exit-ports/contents+en.lrquestion.description)
+msgid "reject 169.254.0.0/16"
+msgstr ""
+
+#: https//support.torproject.org/operators/default-exit-ports/
+#: (content/operators/default-exit-ports/contents+en.lrquestion.description)
+msgid "reject 127.0.0.0/8"
+msgstr ""
+
+#: https//support.torproject.org/operators/default-exit-ports/
+#: (content/operators/default-exit-ports/contents+en.lrquestion.description)
+msgid "reject 192.168.0.0/16"
+msgstr ""
+
+#: https//support.torproject.org/operators/default-exit-ports/
+#: (content/operators/default-exit-ports/contents+en.lrquestion.description)
+msgid "reject 10.0.0.0/8"
+msgstr ""
+
+#: https//support.torproject.org/operators/default-exit-ports/
+#: (content/operators/default-exit-ports/contents+en.lrquestion.description)
+msgid "reject 172.16.0.0/12"
+msgstr ""
+
+#: https//support.torproject.org/operators/default-exit-ports/
+#: (content/operators/default-exit-ports/contents+en.lrquestion.description)
+msgid "reject *:25"
+msgstr ""
+
+#: https//support.torproject.org/operators/default-exit-ports/
+#: (content/operators/default-exit-ports/contents+en.lrquestion.description)
+msgid "reject *:119"
+msgstr ""
+
+#: https//support.torproject.org/operators/default-exit-ports/
+#: (content/operators/default-exit-ports/contents+en.lrquestion.description)
+msgid "reject *:135-139"
+msgstr ""
+
+#: https//support.torproject.org/operators/default-exit-ports/
+#: (content/operators/default-exit-ports/contents+en.lrquestion.description)
+msgid "reject *:445"
+msgstr ""
+
+#: https//support.torproject.org/operators/default-exit-ports/
+#: (content/operators/default-exit-ports/contents+en.lrquestion.description)
+msgid "reject *:563"
+msgstr ""
+
+#: https//support.torproject.org/operators/default-exit-ports/
+#: (content/operators/default-exit-ports/contents+en.lrquestion.description)
+msgid "reject *:1214"
+msgstr ""
+
+#: https//support.torproject.org/operators/default-exit-ports/
+#: (content/operators/default-exit-ports/contents+en.lrquestion.description)
+msgid "reject *:4661-4666"
+msgstr ""
+
+#: https//support.torproject.org/operators/default-exit-ports/
+#: (content/operators/default-exit-ports/contents+en.lrquestion.description)
+msgid "reject *:6346-6429"
+msgstr ""
+
+#: https//support.torproject.org/operators/default-exit-ports/
+#: (content/operators/default-exit-ports/contents+en.lrquestion.description)
+msgid "reject *:6699"
+msgstr ""
+
+#: https//support.torproject.org/operators/default-exit-ports/
+#: (content/operators/default-exit-ports/contents+en.lrquestion.description)
+msgid "reject *:6881-6999"
+msgstr ""
+
+#: https//support.torproject.org/operators/default-exit-ports/
+#: (content/operators/default-exit-ports/contents+en.lrquestion.description)
+msgid "accept *:*"
+msgstr ""
+
+#: https//support.torproject.org/operators/default-exit-ports/
+#: (content/operators/default-exit-ports/contents+en.lrquestion.description)
+msgid ""
+"[1]: "
+"https://gitlab.torproject.org/tpo/core/tor/-/blob/release-0.4.6/src/core/or/policies.c#L85"
+msgstr ""
+
+#: https//support.torproject.org/operators/default-exit-ports/
+#: (content/operators/default-exit-ports/contents+en.lrquestion.description)
+msgid ""
+"[2]: "
+"https://gitlab.torproject.org/tpo/core/tor/-/blob/release-0.4.6/src/core/or/policies.c#L1901"
+msgstr ""
+
+#: https//support.torproject.org/operators/default-exit-ports/
+#: (content/operators/default-exit-ports/contents+en.lrquestion.description)
+msgid "[3]: https://gitlab.torproject.org/tpo/core/tor/-/tree/release-0.4.6/"
+msgstr ""
+
#: https//support.torproject.org/operators/dynamic-ip/
#: (content/operators/dynamic-ip/contents+en.lrquestion.title)
msgid "Can I run a Tor relay using a dynamic IP address?"
@@ -7180,21 +8099,6 @@ msgid ""
"into hibernation, signaled by this entry in the log:"
msgstr ""
-#: https//support.torproject.org/operators/hibernation/
-#: (content/operators/hibernation/contents+en.lrquestion.description)
-#: https//support.torproject.org/operators/limit-total-bandwidth/
-#: (content/operators/limit-total-bandwidth/contents+en.lrquestion.description)
-#: https//support.torproject.org/misc/bug-or-feedback/
-#: (content/misc/bug-or-feedback/contents+en.lrquestion.description)
-#: https//support.torproject.org/get-in-touch/why-i-cant-join-tor-channels/
-#: (content/get-in-touch/why-i-cant-join-tor-channels/contents+en.lrquestion.description)
-#: https//support.torproject.org/apt/tor-deb-repo/
-#: (content/apt/apt-1/contents+en.lrquestion.description)
-#: https//support.torproject.org/apt/apt-over-tor/
-#: (content/apt/apt-3/contents+en.lrquestion.description)
-msgid "```"
-msgstr ""
-
#: https//support.torproject.org/operators/hibernation/
#: (content/operators/hibernation/contents+en.lrquestion.description)
msgid "Bandwidth soft limit reached; commencing hibernation."
@@ -9441,6 +10345,131 @@ msgstr "uid tor-security at lists.torproject.org"
msgid "sub 4096R/C00942E4 2017-03-13"
msgstr "sub 4096R/C00942E4 2017-03-13"
+#: https//support.torproject.org/misc/check-socks-dns-leaks/
+#: (content/misc/check-socks-dns-leaks/contents+en.lrquestion.title)
+msgid ""
+"How do I check if my application that uses SOCKS is leaking DNS requests?"
+msgstr ""
+
+#: https//support.torproject.org/misc/check-socks-dns-leaks/
+#: (content/misc/check-socks-dns-leaks/contents+en.lrquestion.description)
+msgid ""
+"Even if your application is using the correct variant of the SOCKS protocol,"
+" there is still a risk that it could be leaking DNS queries."
+msgstr ""
+
+#: https//support.torproject.org/misc/check-socks-dns-leaks/
+#: (content/misc/check-socks-dns-leaks/contents+en.lrquestion.description)
+msgid ""
+"This problem happens in Firefox extensions that resolve the destination "
+"hostname themselves, for example to show you its IP address, what country "
+"it's in, etc."
+msgstr ""
+
+#: https//support.torproject.org/misc/check-socks-dns-leaks/
+#: (content/misc/check-socks-dns-leaks/contents+en.lrquestion.description)
+msgid ""
+"If you suspect your application might behave like this, follow the "
+"instructions below to check."
+msgstr ""
+
+#: https//support.torproject.org/misc/check-socks-dns-leaks/
+#: (content/misc/check-socks-dns-leaks/contents+en.lrquestion.description)
+msgid ""
+"1. Add `TestSocks 1` to your [torrc file](https://support.torproject.org/tbb"
+"/tbb-editing-torrc/)."
+msgstr ""
+
+#: https//support.torproject.org/misc/check-socks-dns-leaks/
+#: (content/misc/check-socks-dns-leaks/contents+en.lrquestion.description)
+msgid ""
+"1. Start Tor, and point your program's SOCKS proxy settings to Tor's SOCKS5 "
+"server (`socks5://127.0.0.1:9050` by default)."
+msgstr ""
+
+#: https//support.torproject.org/misc/check-socks-dns-leaks/
+#: (content/misc/check-socks-dns-leaks/contents+en.lrquestion.description)
+msgid ""
+"1. Watch your logs as you use your application. For each socks connection, "
+"Tor will log a `notice` for safe connections, and a `warn` for connections "
+"leaking DNS requests."
+msgstr ""
+
+#: https//support.torproject.org/misc/check-socks-dns-leaks/
+#: (content/misc/check-socks-dns-leaks/contents+en.lrquestion.description)
+msgid ""
+"If you want to automatically disable all connections leaking DNS requests, "
+"set `SafeSocks 1` in your torrc file."
+msgstr ""
+
+#: https//support.torproject.org/misc/hide-exits/
+#: (content/misc/hide-exits/contents+en.lrquestion.title)
+msgid ""
+"You should hide the list of Tor relays, so people can't block the exits."
+msgstr ""
+
+#: https//support.torproject.org/misc/hide-exits/
+#: (content/misc/hide-exits/contents+en.lrquestion.description)
+msgid "There are a few reasons we don't:"
+msgstr ""
+
+#: https//support.torproject.org/misc/hide-exits/
+#: (content/misc/hide-exits/contents+en.lrquestion.description)
+msgid ""
+"1. We can't help but make the information available, since Tor clients need "
+"to use it to pick their paths."
+msgstr ""
+
+#: https//support.torproject.org/misc/hide-exits/
+#: (content/misc/hide-exits/contents+en.lrquestion.description)
+msgid "So if the \"blockers\" want it, they can get it anyway."
+msgstr ""
+
+#: https//support.torproject.org/misc/hide-exits/
+#: (content/misc/hide-exits/contents+en.lrquestion.description)
+msgid ""
+"Further, even if we didn't tell clients about the list of relays directly, "
+"somebody could still make a lot of connections through Tor to a test site "
+"and build a list of the addresses they see."
+msgstr ""
+
+#: https//support.torproject.org/misc/hide-exits/
+#: (content/misc/hide-exits/contents+en.lrquestion.description)
+msgid ""
+"1. If people want to block us, we believe that they should be allowed to do "
+"so."
+msgstr ""
+
+#: https//support.torproject.org/misc/hide-exits/
+#: (content/misc/hide-exits/contents+en.lrquestion.description)
+msgid ""
+"Obviously, we would prefer for everybody to allow Tor users to connect to "
+"them, but people have the right to decide who their services should allow "
+"connections from, and if they want to block anonymous users, they can."
+msgstr ""
+
+#: https//support.torproject.org/misc/hide-exits/
+#: (content/misc/hide-exits/contents+en.lrquestion.description)
+msgid ""
+"1. Being blockable also has tactical advantages: it may be a persuasive "
+"response to website maintainers who feel threatened by Tor."
+msgstr ""
+
+#: https//support.torproject.org/misc/hide-exits/
+#: (content/misc/hide-exits/contents+en.lrquestion.description)
+msgid ""
+"Giving them the option may inspire them to stop and think about whether they"
+" really want to eliminate private access to their system, and if not, what "
+"other options they might have."
+msgstr ""
+
+#: https//support.torproject.org/misc/hide-exits/
+#: (content/misc/hide-exits/contents+en.lrquestion.description)
+msgid ""
+"The time they might otherwise have spent blocking Tor, they may instead "
+"spend rethinking their overall approach to privacy and anonymity."
+msgstr ""
+
#: https//support.torproject.org/misc/menu/
#: (content/misc/menu/contents+en.lrquestion.description)
msgid "About"
@@ -10025,56 +11054,20 @@ msgstr ""
#: https//support.torproject.org/get-in-touch/why-i-cant-join-tor-channels/
#: (content/get-in-touch/why-i-cant-join-tor-channels/contents+en.lrquestion.description)
msgid ""
-"Then, to complete the registration and ultimately gain access to the #tor-"
-"project channel, your nickname must be **verified**."
-msgstr ""
-
-#: https//support.torproject.org/get-in-touch/why-i-cant-join-tor-channels/
-#: (content/get-in-touch/why-i-cant-join-tor-channels/contents+en.lrquestion.description)
-msgid ""
-"1. To verify your nick, open a new browser window and go to "
-"https://webchat.oftc.net/?channels=tor."
-msgstr ""
-
-#: https//support.torproject.org/get-in-touch/why-i-cant-join-tor-channels/
-#: (content/get-in-touch/why-i-cant-join-tor-channels/contents+en.lrquestion.description)
-msgid "2. Log in with your IRC nickname and password."
-msgstr ""
-
-#: https//support.torproject.org/get-in-touch/why-i-cant-join-tor-channels/
-#: (content/get-in-touch/why-i-cant-join-tor-channels/contents+en.lrquestion.description)
-msgid ""
-"3. Look for the word **verify** and log in there. It may appear that nothing"
-" has happened. Look at the top of the page, and there will be a column "
-"called **Account**."
-msgstr ""
-
-#: https//support.torproject.org/get-in-touch/why-i-cant-join-tor-channels/
-#: (content/get-in-touch/why-i-cant-join-tor-channels/contents+en.lrquestion.description)
-msgid "4. Click on **Account**."
-msgstr ""
-
-#: https//support.torproject.org/get-in-touch/why-i-cant-join-tor-channels/
-#: (content/get-in-touch/why-i-cant-join-tor-channels/contents+en.lrquestion.description)
-msgid ""
-"5. Click on the small sentence at the bottom of the square that says: Verify"
-" account."
-msgstr ""
-
-#: https//support.torproject.org/get-in-touch/why-i-cant-join-tor-channels/
-#: (content/get-in-touch/why-i-cant-join-tor-channels/contents+en.lrquestion.description)
-msgid "6. Fill out the Captcha that pops up, and click ok."
+"After registering your nickname, to gain access to the #tor-project and "
+"other protected channels, your nickname must be **verified**."
msgstr ""
#: https//support.torproject.org/get-in-touch/why-i-cant-join-tor-channels/
#: (content/get-in-touch/why-i-cant-join-tor-channels/contents+en.lrquestion.description)
msgid ""
-"7. A tiny message will appear: \"Your NickServ account has been verified.\""
+"1. Go to https://services.oftc.net/ and follow the steps in the '*To verify "
+"your account*' section"
msgstr ""
#: https//support.torproject.org/get-in-touch/why-i-cant-join-tor-channels/
#: (content/get-in-touch/why-i-cant-join-tor-channels/contents+en.lrquestion.description)
-msgid "8. Go back to the IRC webpage where you are logged in and type:"
+msgid "2. Go back to the IRC webpage where you are logged in and type:"
msgstr ""
#: https//support.torproject.org/get-in-touch/why-i-cant-join-tor-channels/
@@ -10084,12 +11077,12 @@ msgstr ""
#: https//support.torproject.org/get-in-touch/why-i-cant-join-tor-channels/
#: (content/get-in-touch/why-i-cant-join-tor-channels/contents+en.lrquestion.description)
-msgid "9. Click ENTER."
+msgid "3. Click ENTER."
msgstr ""
#: https//support.torproject.org/get-in-touch/why-i-cant-join-tor-channels/
#: (content/get-in-touch/why-i-cant-join-tor-channels/contents+en.lrquestion.description)
-msgid "10. If all is well, you will receive a message that says:"
+msgid "4. If all is well, you will receive a message that says:"
msgstr ""
#: https//support.torproject.org/get-in-touch/why-i-cant-join-tor-channels/
@@ -10230,18 +11223,22 @@ msgstr ""
#: https//support.torproject.org/apt/tor-deb-repo/
#: (content/apt/apt-1/contents+en.lrquestion.description)
msgid ""
-"#### 2. Add the following entries to `/etc/apt/sources.list` or a new file "
-"in `/etc/apt/sources.list.d/`"
+"#### 2. Create a new file in `/etc/apt/sources.list.d/` named `tor.list`. "
+"Add the following entries:"
msgstr ""
#: https//support.torproject.org/apt/tor-deb-repo/
#: (content/apt/apt-1/contents+en.lrquestion.description)
-msgid "deb https://deb.torproject.org/torproject.org <DISTRIBUTION> main"
+msgid ""
+"deb [signed-by=/usr/share/keyrings/tor-archive-keyring.gpg] "
+"https://deb.torproject.org/torproject.org <DISTRIBUTION> main"
msgstr ""
#: https//support.torproject.org/apt/tor-deb-repo/
#: (content/apt/apt-1/contents+en.lrquestion.description)
-msgid "deb-src https://deb.torproject.org/torproject.org <DISTRIBUTION> main"
+msgid ""
+"deb-src [signed-by=/usr/share/keyrings/tor-archive-keyring.gpg] "
+"https://deb.torproject.org/torproject.org <DISTRIBUTION> main"
msgstr ""
#: https//support.torproject.org/apt/tor-deb-repo/
@@ -10255,14 +11252,16 @@ msgstr ""
#: https//support.torproject.org/apt/tor-deb-repo/
#: (content/apt/apt-1/contents+en.lrquestion.description)
msgid ""
-"deb https://deb.torproject.org/torproject.org tor-"
+"deb [signed-by=/usr/share/keyrings/tor-archive-keyring.gpg] "
+"https://deb.torproject.org/torproject.org tor-"
"experimental-0.4.6.x-<DISTRIBUTION> main"
msgstr ""
#: https//support.torproject.org/apt/tor-deb-repo/
#: (content/apt/apt-1/contents+en.lrquestion.description)
msgid ""
-"deb-src https://deb.torproject.org/torproject.org tor-"
+"deb-src [signed-by=/usr/share/keyrings/tor-archive-keyring.gpg] "
+"https://deb.torproject.org/torproject.org tor-"
"experimental-0.4.6.x-<DISTRIBUTION> main"
msgstr ""
@@ -10274,15 +11273,17 @@ msgstr ""
#: https//support.torproject.org/apt/tor-deb-repo/
#: (content/apt/apt-1/contents+en.lrquestion.description)
msgid ""
-"deb https://deb.torproject.org/torproject.org tor-nightly-"
-"master-<DISTRIBUTION> main"
+"deb [signed-by=/usr/share/keyrings/tor-archive-keyring.gpg] "
+"https://deb.torproject.org/torproject.org tor-nightly-master-<DISTRIBUTION> "
+"main"
msgstr ""
#: https//support.torproject.org/apt/tor-deb-repo/
#: (content/apt/apt-1/contents+en.lrquestion.description)
msgid ""
-"deb-src https://deb.torproject.org/torproject.org tor-nightly-"
-"master-<DISTRIBUTION> main"
+"deb-src [signed-by=/usr/share/keyrings/tor-archive-keyring.gpg] "
+"https://deb.torproject.org/torproject.org tor-nightly-master-<DISTRIBUTION> "
+"main"
msgstr ""
#: https//support.torproject.org/apt/tor-deb-repo/
@@ -10303,13 +11304,15 @@ msgstr ""
#: https//support.torproject.org/apt/tor-deb-repo/
#: (content/apt/apt-1/contents+en.lrquestion.description)
msgid ""
-"deb [arch=amd64] https://deb.torproject.org/torproject.org focal main"
+"deb [arch=amd64 signed-by=/usr/share/keyrings/tor-archive-keyring.gpg] "
+"https://deb.torproject.org/torproject.org focal main"
msgstr ""
#: https//support.torproject.org/apt/tor-deb-repo/
#: (content/apt/apt-1/contents+en.lrquestion.description)
msgid ""
-"deb-src [arch=amd64] https://deb.torproject.org/torproject.org focal main"
+"deb-src [arch=amd64 signed-by=/usr/share/keyrings/tor-archive-keyring.gpg] "
+"https://deb.torproject.org/torproject.org focal main"
msgstr ""
#: https//support.torproject.org/apt/tor-deb-repo/
@@ -10329,21 +11332,16 @@ msgstr ""
#: (content/apt/apt-1/contents+en.lrquestion.description)
msgid ""
"#### 3. Then add the gpg key used to sign the packages by running the "
-"following commands at your command prompt"
+"following command at your command prompt:"
msgstr ""
#: https//support.torproject.org/apt/tor-deb-repo/
#: (content/apt/apt-1/contents+en.lrquestion.description)
msgid ""
-"# wget -qO- "
+"# wget -O- "
"https://deb.torproject.org/torproject.org/A3C4F0F979CAA22CDBA8F512EE8CBC9E886DDD89.asc"
-" | gpg --import"
-msgstr ""
-
-#: https//support.torproject.org/apt/tor-deb-repo/
-#: (content/apt/apt-1/contents+en.lrquestion.description)
-msgid ""
-"# gpg --export A3C4F0F979CAA22CDBA8F512EE8CBC9E886DDD89 | apt-key add -"
+" | gpg --dearmor | tee /usr/share/keyrings/tor-archive-keyring.gpg "
+">/dev/null"
msgstr ""
#: https//support.torproject.org/apt/tor-deb-repo/
@@ -11950,6 +12948,82 @@ msgid ""
"doesn't change IP address over the day."
msgstr ""
+#: https//support.torproject.org/alternate-designs/block-websites/
+#: (content/alternate-designs/block-websites/contents+en.lrquestion.title)
+msgid "Exit policies should be able to block websites, not just IP addresses."
+msgstr ""
+
+#: https//support.torproject.org/alternate-designs/block-websites/
+#: (content/alternate-designs/block-websites/contents+en.lrquestion.description)
+msgid ""
+"It would be nice to let relay operators say things like `reject "
+"www.slashdot.org` in their exit policies, rather than requiring them to "
+"learn all the IP address space that could be covered by the site (and then "
+"also blocking other sites at those IP addresses)."
+msgstr ""
+
+#: https//support.torproject.org/alternate-designs/block-websites/
+#: (content/alternate-designs/block-websites/contents+en.lrquestion.description)
+msgid "There are two problems, though."
+msgstr ""
+
+#: https//support.torproject.org/alternate-designs/block-websites/
+#: (content/alternate-designs/block-websites/contents+en.lrquestion.description)
+msgid "First, users could still get around these blocks."
+msgstr ""
+
+#: https//support.torproject.org/alternate-designs/block-websites/
+#: (content/alternate-designs/block-websites/contents+en.lrquestion.description)
+msgid ""
+"For example, they could request the IP address rather than the hostname when"
+" they exit from the Tor network."
+msgstr ""
+
+#: https//support.torproject.org/alternate-designs/block-websites/
+#: (content/alternate-designs/block-websites/contents+en.lrquestion.description)
+msgid ""
+"This means operators would still need to learn all the IP addresses for the "
+"destinations in question."
+msgstr ""
+
+#: https//support.torproject.org/alternate-designs/block-websites/
+#: (content/alternate-designs/block-websites/contents+en.lrquestion.description)
+msgid ""
+"The second problem is that it would allow remote attackers to censor "
+"arbitrary sites."
+msgstr ""
+
+#: https//support.torproject.org/alternate-designs/block-websites/
+#: (content/alternate-designs/block-websites/contents+en.lrquestion.description)
+msgid ""
+"For example, if a Tor operator blocks www1.slashdot.org, and then some "
+"attacker poisons the Tor relay's DNS or otherwise changes that hostname to "
+"resolve to the IP address for a major news site, then suddenly that Tor "
+"relay is blocking the news site."
+msgstr ""
+
+#: https//support.torproject.org/alternate-designs/let-the-network-pick-the-path/
+#: (content/alternate-designs/let-the-network-pick-the-path/contents+en.lrquestion.title)
+msgid "You should let the network pick the path, not the client."
+msgstr ""
+
+#: https//support.torproject.org/alternate-designs/let-the-network-pick-the-path/
+#: (content/alternate-designs/let-the-network-pick-the-path/contents+en.lrquestion.description)
+msgid "No, you cannot trust the network to pick the path."
+msgstr ""
+
+#: https//support.torproject.org/alternate-designs/let-the-network-pick-the-path/
+#: (content/alternate-designs/let-the-network-pick-the-path/contents+en.lrquestion.description)
+msgid "Malicious relays could route you through their colluding friends."
+msgstr ""
+
+#: https//support.torproject.org/alternate-designs/let-the-network-pick-the-path/
+#: (content/alternate-designs/let-the-network-pick-the-path/contents+en.lrquestion.description)
+msgid ""
+"This would give an adversary the ability to watch all of your traffic end to"
+" end."
+msgstr ""
+
#: lego/templates/banner.html:3 lego/templates/banner.html:5
#: templates/banner.html:3 templates/banner.html:5
msgid "Close banner"
@@ -11980,8 +13054,8 @@ msgid "DONATE NOW"
msgstr "DONIRAJ SADA"
#: lego/templates/footer.html:13 lego/templates/footer.html:22
-#: lego/templates/navbar.html:83 templates/footer.html:13
-#: templates/footer.html:22 templates/navbar.html:83
+#: lego/templates/navbar.html:95 templates/footer.html:13
+#: templates/footer.html:22 templates/navbar.html:95
msgid "Download Tor Browser"
msgstr "Kako preuzeti Tor preglednik"
diff --git a/contents+hu.po b/contents+hu.po
index 90d0e1da49..0369eb631b 100644
--- a/contents+hu.po
+++ b/contents+hu.po
@@ -13,7 +13,7 @@ msgid ""
msgstr ""
"Project-Id-Version: PACKAGE VERSION\n"
"Report-Msgid-Bugs-To: \n"
-"POT-Creation-Date: 2021-08-25 11:14+CET\n"
+"POT-Creation-Date: 2021-09-01 12:20+CET\n"
"PO-Revision-Date: 2018-10-02 22:41+0000\n"
"Last-Translator: Emma Peel, 2021\n"
"Language-Team: Hungarian (https://www.transifex.com/otf/teams/1519/hu/)\n"
@@ -146,6 +146,11 @@ msgstr "Visszaélések GYIK"
msgid "Tor Metrics"
msgstr "Tor metrika"
+#: https//support.torproject.org/alternate-designs/
+#: (content/alternate-designs/contents+en.lrtopic.title)
+msgid "Alternate Designs We Don't Do (Yet)"
+msgstr ""
+
#: https//support.torproject.org/glossary/add-on-extension-or-plugin/
#: (content/glossary/add-on-extension-or-plugin/contents+en.lrword.term)
msgid "add-on, extension, or plugin"
@@ -2144,6 +2149,61 @@ msgid ""
"wiki](https://trac.torproject.org/projects/tor/wiki/doc/TorPlusVPN)."
msgstr ""
+#: https//support.torproject.org/faq/relay-donations/
+#: (content/faq/relay-donations/contents+en.lrquestion.title)
+msgid "Can I donate for a relay rather than run my own?"
+msgstr ""
+
+#: https//support.torproject.org/faq/relay-donations/
+#: (content/faq/relay-donations/contents+en.lrquestion.description)
+msgid ""
+"Sure! We have a [list of organizations that run Tor "
+"relays](https://community.torproject.org/relay/community-resources/relay-"
+"associations/) that are happy to turn your donations into better speed and "
+"anonymity for the Tor network."
+msgstr ""
+
+#: https//support.torproject.org/faq/relay-donations/
+#: (content/faq/relay-donations/contents+en.lrquestion.description)
+msgid ""
+"These organizations are not the same as [The Tor Project, "
+"Inc](https://donate.torproject.org/), but we consider that a good thing."
+msgstr ""
+
+#: https//support.torproject.org/faq/relay-donations/
+#: (content/faq/relay-donations/contents+en.lrquestion.description)
+msgid "They're run by nice people who are part of the Tor community."
+msgstr ""
+
+#: https//support.torproject.org/faq/relay-donations/
+#: (content/faq/relay-donations/contents+en.lrquestion.description)
+msgid ""
+"Note that there can be a tradeoff here between anonymity and performance."
+msgstr ""
+
+#: https//support.torproject.org/faq/relay-donations/
+#: (content/faq/relay-donations/contents+en.lrquestion.description)
+msgid ""
+"The Tor network's anonymity comes in part from diversity, so if you are in a"
+" position to run your own relay, you will be improving Tor's anonymity more "
+"than by donating."
+msgstr ""
+
+#: https//support.torproject.org/faq/relay-donations/
+#: (content/faq/relay-donations/contents+en.lrquestion.description)
+msgid ""
+"At the same time though, economies of scale for bandwidth mean that "
+"combining many small donations into several larger relays is more efficient "
+"at improving network performance."
+msgstr ""
+
+#: https//support.torproject.org/faq/relay-donations/
+#: (content/faq/relay-donations/contents+en.lrquestion.description)
+msgid ""
+"Improving anonymity and improving performance are both worthwhile goals, so "
+"however you can help is great!"
+msgstr ""
+
#: https//support.torproject.org/faq/staying-anonymous/
#: (content/faq/staying-anonymous/contents+en.lrquestion.title)
msgid "Am I totally anonymous if I use Tor?"
@@ -2449,6 +2509,61 @@ msgid ""
" documenting all the issues](https://community.torproject.org/)."
msgstr ""
+#: https//support.torproject.org/about/attacks-on-onion-routing/
+#: (content/about/attacks-on-onion-routing/contents+en.lrquestion.title)
+msgid "What attacks remain against onion routing?"
+msgstr ""
+
+#: https//support.torproject.org/about/attacks-on-onion-routing/
+#: (content/about/attacks-on-onion-routing/contents+en.lrquestion.description)
+msgid ""
+"As mentioned above, it is possible for an observer who can view both you and"
+" either the destination website or your Tor exit node to correlate timings "
+"of your traffic as it enters the Tor network and also as it exits."
+msgstr ""
+
+#: https//support.torproject.org/about/attacks-on-onion-routing/
+#: (content/about/attacks-on-onion-routing/contents+en.lrquestion.description)
+msgid "Tor does not defend against such a threat model."
+msgstr ""
+
+#: https//support.torproject.org/about/attacks-on-onion-routing/
+#: (content/about/attacks-on-onion-routing/contents+en.lrquestion.description)
+msgid ""
+"In a more limited sense, note that if a censor or law enforcement agency has"
+" the ability to obtain specific observation of parts of the network, it is "
+"possible for them to verify a suspicion that you talk regularly to your "
+"friend by observing traffic at both ends and correlating the timing of only "
+"that traffic."
+msgstr ""
+
+#: https//support.torproject.org/about/attacks-on-onion-routing/
+#: (content/about/attacks-on-onion-routing/contents+en.lrquestion.description)
+msgid ""
+"Again, this is only useful to verify that parties already suspected of "
+"communicating with one another are doing so."
+msgstr ""
+
+#: https//support.torproject.org/about/attacks-on-onion-routing/
+#: (content/about/attacks-on-onion-routing/contents+en.lrquestion.description)
+msgid ""
+"In most countries, the suspicion required to obtain a warrant already "
+"carries more weight than timing correlation would provide."
+msgstr ""
+
+#: https//support.torproject.org/about/attacks-on-onion-routing/
+#: (content/about/attacks-on-onion-routing/contents+en.lrquestion.description)
+msgid ""
+"Furthermore, since Tor reuses circuits for multiple TCP connections, it is "
+"possible to associate non anonymous and anonymous traffic at a given exit "
+"node, so be careful about what applications you run concurrently over Tor."
+msgstr ""
+
+#: https//support.torproject.org/about/attacks-on-onion-routing/
+#: (content/about/attacks-on-onion-routing/contents+en.lrquestion.description)
+msgid "Perhaps even run separate Tor clients for these applications."
+msgstr ""
+
#: https//support.torproject.org/about/backdoor/
#: (content/about/backdoor/contents+en.lrquestion.title)
msgid "Is there a backdoor in Tor?"
@@ -2584,6 +2699,43 @@ msgid ""
"recommended](/tbb/tbb-9/)."
msgstr ""
+#: https//support.torproject.org/about/change-paths/
+#: (content/about/change-paths/contents+en.lrquestion.title)
+msgid "How often does Tor change its paths?"
+msgstr ""
+
+#: https//support.torproject.org/about/change-paths/
+#: (content/about/change-paths/contents+en.lrquestion.description)
+msgid ""
+"Tor will reuse the same circuit for new TCP streams for 10 minutes, as long "
+"as the circuit is working fine."
+msgstr ""
+
+#: https//support.torproject.org/about/change-paths/
+#: (content/about/change-paths/contents+en.lrquestion.description)
+msgid "(If the circuit fails, Tor will switch to a new circuit immediately.)"
+msgstr ""
+
+#: https//support.torproject.org/about/change-paths/
+#: (content/about/change-paths/contents+en.lrquestion.description)
+msgid ""
+"But note that a single TCP stream (e.g. a long IRC connection) will stay on "
+"the same circuit forever."
+msgstr ""
+
+#: https//support.torproject.org/about/change-paths/
+#: (content/about/change-paths/contents+en.lrquestion.description)
+msgid "We don't rotate individual streams from one circuit to the next."
+msgstr ""
+
+#: https//support.torproject.org/about/change-paths/
+#: (content/about/change-paths/contents+en.lrquestion.description)
+msgid ""
+"Otherwise, an adversary with a partial view of the network would be given "
+"many chances over time to link you to your destination, rather than just one"
+" chance."
+msgstr ""
+
#: https//support.torproject.org/about/distribute-tor/
#: (content/about/distribute-tor/contents+en.lrquestion.title)
msgid "Can I distribute Tor?"
@@ -2688,6 +2840,133 @@ msgid ""
"details."
msgstr ""
+#: https//support.torproject.org/about/entry-guards/
+#: (content/about/entry-guards/contents+en.lrquestion.title)
+msgid "What are Entry Guards?"
+msgstr ""
+
+#: https//support.torproject.org/about/entry-guards/
+#: (content/about/entry-guards/contents+en.lrquestion.description)
+msgid ""
+"Tor (like all current practical low-latency anonymity designs) fails when "
+"the attacker can see both ends of the communications channel."
+msgstr ""
+
+#: https//support.torproject.org/about/entry-guards/
+#: (content/about/entry-guards/contents+en.lrquestion.description)
+msgid ""
+"For example, suppose the attacker controls or watches the Tor relay you "
+"choose to enter the network, and also controls or watches the website you "
+"visit."
+msgstr ""
+
+#: https//support.torproject.org/about/entry-guards/
+#: (content/about/entry-guards/contents+en.lrquestion.description)
+msgid ""
+"In this case, the research community knows no practical low-latency design "
+"that can reliably stop the attacker from correlating volume and timing "
+"information on the two sides."
+msgstr ""
+
+#: https//support.torproject.org/about/entry-guards/
+#: (content/about/entry-guards/contents+en.lrquestion.description)
+msgid "So, what should we do?"
+msgstr ""
+
+#: https//support.torproject.org/about/entry-guards/
+#: (content/about/entry-guards/contents+en.lrquestion.description)
+msgid "Suppose the attacker controls, or can observe, C relays."
+msgstr ""
+
+#: https//support.torproject.org/about/entry-guards/
+#: (content/about/entry-guards/contents+en.lrquestion.description)
+msgid "Suppose there are N relays total."
+msgstr ""
+
+#: https//support.torproject.org/about/entry-guards/
+#: (content/about/entry-guards/contents+en.lrquestion.description)
+msgid ""
+"If you select new entry and exit relays each time you use the network, the "
+"attacker will be able to correlate all traffic you send with probability "
+"around (c/n)2."
+msgstr ""
+
+#: https//support.torproject.org/about/entry-guards/
+#: (content/about/entry-guards/contents+en.lrquestion.description)
+msgid ""
+"But profiling is, for most users, as bad as being traced all the time: they "
+"want to do something often without an attacker noticing, and the attacker "
+"noticing once is as bad as the attacker noticing more often."
+msgstr ""
+
+#: https//support.torproject.org/about/entry-guards/
+#: (content/about/entry-guards/contents+en.lrquestion.description)
+msgid ""
+"Thus, choosing many random entries and exits gives the user no chance of "
+"escaping profiling by this kind of attacker."
+msgstr ""
+
+#: https//support.torproject.org/about/entry-guards/
+#: (content/about/entry-guards/contents+en.lrquestion.description)
+msgid ""
+"The solution is \"entry guards\": each Tor client selects a few relays at "
+"random to use as entry points, and uses only those relays for their first "
+"hop."
+msgstr ""
+
+#: https//support.torproject.org/about/entry-guards/
+#: (content/about/entry-guards/contents+en.lrquestion.description)
+msgid ""
+"If those relays are not controlled or observed, the attacker can't win, "
+"ever, and the user is secure."
+msgstr ""
+
+#: https//support.torproject.org/about/entry-guards/
+#: (content/about/entry-guards/contents+en.lrquestion.description)
+msgid ""
+"If those relays are observed or controlled by the attacker, the attacker "
+"sees a larger fraction of the user's traffic - but still the user is no more"
+" profiled than before."
+msgstr ""
+
+#: https//support.torproject.org/about/entry-guards/
+#: (content/about/entry-guards/contents+en.lrquestion.description)
+msgid ""
+"Thus, the user has some chance (on the order of (n-c)/n) of avoiding "
+"profiling, whereas they had none before."
+msgstr ""
+
+#: https//support.torproject.org/about/entry-guards/
+#: (content/about/entry-guards/contents+en.lrquestion.description)
+msgid ""
+"You can read more at [An Analysis of the Degradation of Anonymous "
+"Protocols](http://freehaven.net/anonbib/#wright02), [Defending Anonymous "
+"Communication Against Passive Logging "
+"Attacks](http://freehaven.net/anonbib/#wright03), and especially [Locating "
+"Hidden Servers](http://freehaven.net/anonbib/#hs-attack06)."
+msgstr ""
+
+#: https//support.torproject.org/about/entry-guards/
+#: (content/about/entry-guards/contents+en.lrquestion.description)
+msgid ""
+"Restricting your entry nodes may also help against attackers who want to run"
+" a few Tor nodes and easily enumerate all of the Tor user IP addresses."
+msgstr ""
+
+#: https//support.torproject.org/about/entry-guards/
+#: (content/about/entry-guards/contents+en.lrquestion.description)
+msgid ""
+"(Even though they can't learn what destinations the users are talking to, "
+"they still might be able to do bad things with just a list of users.)"
+msgstr ""
+
+#: https//support.torproject.org/about/entry-guards/
+#: (content/about/entry-guards/contents+en.lrquestion.description)
+msgid ""
+"However, that feature won't really become useful until we move to a "
+"\"directory guard\" design as well."
+msgstr ""
+
#: https//support.torproject.org/about/how-is-tor-different-from-other-proxies/
#: (content/about/how-is-tor-different-from-other-proxies/contents+en.lrquestion.title)
msgid "How is Tor different from other proxies?"
@@ -2858,6 +3137,162 @@ msgid ""
" Tor and HTTPS interact."
msgstr ""
+#: https//support.torproject.org/about/key-management/
+#: (content/about/key-management/contents+en.lrquestion.title)
+msgid "Tell me about all the keys Tor uses"
+msgstr ""
+
+#: https//support.torproject.org/about/key-management/
+#: (content/about/key-management/contents+en.lrquestion.description)
+msgid ""
+"Tor uses a variety of different keys, with three goals in mind: 1) "
+"encryption to ensure privacy of data within the Tor network, 2) "
+"authentication so clients know they're talking to the relays they meant to "
+"talk to, and 3) signatures to make sure all clients know the same set of "
+"relays."
+msgstr ""
+
+#: https//support.torproject.org/about/key-management/
+#: (content/about/key-management/contents+en.lrquestion.description)
+msgid ""
+"**Encryption**: first, all connections in Tor use TLS link encryption, so "
+"observers can't look inside to see which circuit a given cell is intended "
+"for."
+msgstr ""
+
+#: https//support.torproject.org/about/key-management/
+#: (content/about/key-management/contents+en.lrquestion.description)
+msgid ""
+"Further, the Tor client establishes an ephemeral encryption key with each "
+"relay in the circuit; these extra layers of encryption mean that only the "
+"exit relay can read the cells."
+msgstr ""
+
+#: https//support.torproject.org/about/key-management/
+#: (content/about/key-management/contents+en.lrquestion.description)
+msgid ""
+"Both sides discard the circuit key when the circuit ends, so logging traffic"
+" and then breaking into the relay to discover the key won't work."
+msgstr ""
+
+#: https//support.torproject.org/about/key-management/
+#: (content/about/key-management/contents+en.lrquestion.description)
+msgid ""
+"**Authentication**: Every Tor relay has a public decryption key called the "
+"\"onion key\"."
+msgstr ""
+
+#: https//support.torproject.org/about/key-management/
+#: (content/about/key-management/contents+en.lrquestion.description)
+msgid "Each relay rotates its onion key once a week."
+msgstr ""
+
+#: https//support.torproject.org/about/key-management/
+#: (content/about/key-management/contents+en.lrquestion.description)
+msgid ""
+"When the Tor client establishes circuits, at each step it [demands that the "
+"Tor relay prove knowledge of its onion key](https://svn-"
+"archive.torproject.org/svn/projects/design-paper/tor-"
+"design.html#subsec:circuits)."
+msgstr ""
+
+#: https//support.torproject.org/about/key-management/
+#: (content/about/key-management/contents+en.lrquestion.description)
+msgid ""
+"That way the first node in the path can't just spoof the rest of the path."
+msgstr ""
+
+#: https//support.torproject.org/about/key-management/
+#: (content/about/key-management/contents+en.lrquestion.description)
+msgid ""
+"Because the Tor client chooses the path, it can make sure to get Tor's "
+"\"distributed trust\" property: no single relay in the path can know about "
+"both the client and what the client is doing."
+msgstr ""
+
+#: https//support.torproject.org/about/key-management/
+#: (content/about/key-management/contents+en.lrquestion.description)
+msgid ""
+"**Coordination**: How do clients know what the relays are, and how do they "
+"know that they have the right keys for them?"
+msgstr ""
+
+#: https//support.torproject.org/about/key-management/
+#: (content/about/key-management/contents+en.lrquestion.description)
+msgid "Each relay has a long-term public signing key called the \"identity key\"."
+msgstr ""
+
+#: https//support.torproject.org/about/key-management/
+#: (content/about/key-management/contents+en.lrquestion.description)
+msgid "Each directory authority additionally has a \"directory signing key\"."
+msgstr ""
+
+#: https//support.torproject.org/about/key-management/
+#: (content/about/key-management/contents+en.lrquestion.description)
+msgid ""
+"The directory authorities [provide a signed "
+"list](https://gitweb.torproject.org/torspec.git/tree/dir-spec.txt) of all "
+"the known relays, and in that list are a set of certificates from each relay"
+" (self-signed by their identity key) specifying their keys, locations, exit "
+"policies, and so on."
+msgstr ""
+
+#: https//support.torproject.org/about/key-management/
+#: (content/about/key-management/contents+en.lrquestion.description)
+msgid ""
+"So unless the adversary can control a majority of the directory authorities "
+"(as of 2021 there are 10 directory authorities), they can't trick the Tor "
+"client into using other Tor relays."
+msgstr ""
+
+#: https//support.torproject.org/about/key-management/
+#: (content/about/key-management/contents+en.lrquestion.description)
+msgid "How do clients know what the directory authorities are?"
+msgstr ""
+
+#: https//support.torproject.org/about/key-management/
+#: (content/about/key-management/contents+en.lrquestion.description)
+msgid ""
+"The Tor software comes with a built-in list of location and public key for "
+"each directory authority."
+msgstr ""
+
+#: https//support.torproject.org/about/key-management/
+#: (content/about/key-management/contents+en.lrquestion.description)
+msgid ""
+"So the only way to trick users into using a fake Tor network is to give them"
+" a specially modified version of the software."
+msgstr ""
+
+#: https//support.torproject.org/about/key-management/
+#: (content/about/key-management/contents+en.lrquestion.description)
+msgid "How do users know they've got the right software?"
+msgstr ""
+
+#: https//support.torproject.org/about/key-management/
+#: (content/about/key-management/contents+en.lrquestion.description)
+msgid ""
+"When we distribute the source code or a package, we digitally sign it with "
+"[GNU Privacy Guard](http://www.gnupg.org/). See the [instructions on how to "
+"check Tor Browser's signature](https://support.torproject.org/tbb/how-to-"
+"verify-signature/)."
+msgstr ""
+
+#: https//support.torproject.org/about/key-management/
+#: (content/about/key-management/contents+en.lrquestion.description)
+msgid ""
+"In order to be certain that it's really signed by us, you need to have met "
+"us in person and gotten a copy of our GPG key fingerprint, or you need to "
+"know somebody who has."
+msgstr ""
+
+#: https//support.torproject.org/about/key-management/
+#: (content/about/key-management/contents+en.lrquestion.description)
+msgid ""
+"If you're concerned about an attack on this level, we recommend you get "
+"involved with the security community and start meeting people."
+msgstr ""
+
#: https//support.torproject.org/about/no-data-scrubbing/
#: (content/about/no-data-scrubbing/contents+en.lrquestion.title)
msgid ""
@@ -2890,6 +3325,151 @@ msgid ""
"though."
msgstr ""
+#: https//support.torproject.org/about/protections/
+#: (content/about/protections/contents+en.lrquestion.title)
+msgid "What protections does Tor provide?"
+msgstr ""
+
+#: https//support.torproject.org/about/protections/
+#: (content/about/protections/contents+en.lrquestion.description)
+msgid ""
+"Internet communication is based on a store-and-forward model that can be "
+"understood in analogy to postal mail: Data is transmitted in blocks called "
+"IP datagrams or packets."
+msgstr ""
+
+#: https//support.torproject.org/about/protections/
+#: (content/about/protections/contents+en.lrquestion.description)
+msgid ""
+"Every packet includes a source IP address (of the sender) and a destination "
+"IP address (of the receiver), just as ordinary letters contain postal "
+"addresses of sender and receiver."
+msgstr ""
+
+#: https//support.torproject.org/about/protections/
+#: (content/about/protections/contents+en.lrquestion.description)
+msgid ""
+"The way from sender to receiver involves multiple hops of routers, where "
+"each router inspects the destination IP address and forwards the packet "
+"closer to its destination."
+msgstr ""
+
+#: https//support.torproject.org/about/protections/
+#: (content/about/protections/contents+en.lrquestion.description)
+msgid ""
+"Thus, every router between sender and receiver learns that the sender is "
+"communicating with the receiver."
+msgstr ""
+
+#: https//support.torproject.org/about/protections/
+#: (content/about/protections/contents+en.lrquestion.description)
+msgid ""
+"In particular, your local ISP is in the position to build a complete profile"
+" of your Internet usage."
+msgstr ""
+
+#: https//support.torproject.org/about/protections/
+#: (content/about/protections/contents+en.lrquestion.description)
+msgid ""
+"In addition, every server in the Internet that can see any of the packets "
+"can profile your behavior."
+msgstr ""
+
+#: https//support.torproject.org/about/protections/
+#: (content/about/protections/contents+en.lrquestion.description)
+msgid ""
+"The aim of Tor is to improve your privacy by sending your traffic through a "
+"series of proxies."
+msgstr ""
+
+#: https//support.torproject.org/about/protections/
+#: (content/about/protections/contents+en.lrquestion.description)
+msgid ""
+"Your communication is encrypted in multiple layers and routed via multiple "
+"hops through the Tor network to the final receiver."
+msgstr ""
+
+#: https//support.torproject.org/about/protections/
+#: (content/about/protections/contents+en.lrquestion.description)
+msgid ""
+"More details on this process can be found in this "
+"[visualization](https://support.torproject.org/https/https-1/)."
+msgstr ""
+
+#: https//support.torproject.org/about/protections/
+#: (content/about/protections/contents+en.lrquestion.description)
+msgid ""
+"Note that all your local ISP can observe now is that you are communicating "
+"with Tor nodes."
+msgstr ""
+
+#: https//support.torproject.org/about/protections/
+#: (content/about/protections/contents+en.lrquestion.description)
+msgid ""
+"Similarly, servers in the Internet just see that they are being contacted by"
+" Tor nodes."
+msgstr ""
+
+#: https//support.torproject.org/about/protections/
+#: (content/about/protections/contents+en.lrquestion.description)
+msgid "Generally speaking, Tor aims to solve three privacy problems:"
+msgstr ""
+
+#: https//support.torproject.org/about/protections/
+#: (content/about/protections/contents+en.lrquestion.description)
+msgid ""
+"First, Tor prevents websites and other services from learning your location,"
+" which they can use to build databases about your habits and interests."
+msgstr ""
+
+#: https//support.torproject.org/about/protections/
+#: (content/about/protections/contents+en.lrquestion.description)
+msgid ""
+"With Tor, your Internet connections don't give you away by default -- now "
+"you can have the ability to choose, for each connection, how much "
+"information to reveal."
+msgstr ""
+
+#: https//support.torproject.org/about/protections/
+#: (content/about/protections/contents+en.lrquestion.description)
+msgid ""
+"Second, Tor prevents people watching your traffic locally (such as your ISP "
+"or someone with access to your home wifi or router) from learning what "
+"information you're fetching and where you're fetching it from."
+msgstr ""
+
+#: https//support.torproject.org/about/protections/
+#: (content/about/protections/contents+en.lrquestion.description)
+msgid ""
+"It also stops them from deciding what you're allowed to learn and publish --"
+" if you can get to any part of the Tor network, you can reach any site on "
+"the Internet."
+msgstr ""
+
+#: https//support.torproject.org/about/protections/
+#: (content/about/protections/contents+en.lrquestion.description)
+msgid ""
+"Third, Tor routes your connection through more than one Tor relay so no "
+"single relay can learn what you're up to."
+msgstr ""
+
+#: https//support.torproject.org/about/protections/
+#: (content/about/protections/contents+en.lrquestion.description)
+msgid ""
+"Because these relays are run by different individuals or organizations, "
+"distributing trust provides more security than the old [one hop "
+"proxy](https://support.torproject.org/about/#how-is-tor-different-from-"
+"other-proxies) approach."
+msgstr ""
+
+#: https//support.torproject.org/about/protections/
+#: (content/about/protections/contents+en.lrquestion.description)
+msgid ""
+"Note, however, that there are situations where Tor fails to solve these "
+"privacy problems entirely: see the entry below on [remaining "
+"attacks](https://support.torproject.org/about/#attacks-on-onion-routing)."
+msgstr ""
+
#: https//support.torproject.org/about/what-is-tor/
#: (content/about/what-is-tor/contents+en.lrquestion.title)
msgid "What is Tor?"
@@ -5135,9 +5715,11 @@ msgstr ""
#: (content/tbb/tbb-47/contents+en.lrquestion.description)
msgid ""
"Also, read up on the HTTPProxyAuthenticator and HTTPSProxyAuthenticator "
-"options if your proxy requires auth. We only support basic auth currently, "
-"but if you need NTLM authentication, you may find [this post in the "
-"archives](https://archives.seul.org/or/talk/Jun-2005/msg00223.html) useful."
+"options if your [proxy requires auth.](https://developer.mozilla.org/en-"
+"US/docs/Web/HTTP/Headers/Proxy-Authenticate) We only support basic auth "
+"currently, but if you need NTLM authentication, you may find [this post in "
+"the archives](https://archives.seul.org/or/talk/Jun-2005/msg00223.html) "
+"useful."
msgstr ""
#: https//support.torproject.org/tbb/tbb-47/
@@ -5364,6 +5946,219 @@ msgid ""
"have no effect on Tor's configuration."
msgstr ""
+#: https//support.torproject.org/tbb/tbb-firewall-ports/
+#: (content/tbb/tbb-firewall-ports/contents+en.lrquestion.title)
+msgid "My firewall only allows a few outgoing ports"
+msgstr ""
+
+#: https//support.torproject.org/tbb/tbb-firewall-ports/
+#: (content/tbb/tbb-firewall-ports/contents+en.lrquestion.description)
+msgid ""
+"If your firewall works by blocking ports, then you can tell Tor to only use "
+"the ports when you start your Tor Browser."
+msgstr ""
+
+#: https//support.torproject.org/tbb/tbb-firewall-ports/
+#: (content/tbb/tbb-firewall-ports/contents+en.lrquestion.description)
+msgid ""
+"Or you can add the ports that your firewall permits by adding "
+"\"FascistFirewall 1\" to your torrc configuration file."
+msgstr ""
+
+#: https//support.torproject.org/tbb/tbb-firewall-ports/
+#: (content/tbb/tbb-firewall-ports/contents+en.lrquestion.description)
+msgid ""
+"By default, when you set this Tor assumes that your firewall allows only "
+"port 80 and port 443 (HTTP and HTTPS respectively)."
+msgstr ""
+
+#: https//support.torproject.org/tbb/tbb-firewall-ports/
+#: (content/tbb/tbb-firewall-ports/contents+en.lrquestion.description)
+msgid ""
+"You can select a different set of ports with the FirewallPorts torrc option."
+msgstr ""
+
+#: https//support.torproject.org/tbb/tbb-firewall-ports/
+#: (content/tbb/tbb-firewall-ports/contents+en.lrquestion.description)
+msgid ""
+"If you want to be more fine-grained with your controls, you can also use the"
+" ReachableAddresses config options, e.g.:"
+msgstr ""
+
+#: https//support.torproject.org/tbb/tbb-firewall-ports/
+#: (content/tbb/tbb-firewall-ports/contents+en.lrquestion.description)
+#: https//support.torproject.org/tbb/tbb-install-tor-central-server/
+#: (content/tbb/tbb-install-tor-central-server/contents+en.lrquestion.description)
+#: https//support.torproject.org/operators/default-exit-ports/
+#: (content/operators/default-exit-ports/contents+en.lrquestion.description)
+#: https//support.torproject.org/operators/hibernation/
+#: (content/operators/hibernation/contents+en.lrquestion.description)
+#: https//support.torproject.org/operators/limit-total-bandwidth/
+#: (content/operators/limit-total-bandwidth/contents+en.lrquestion.description)
+#: https//support.torproject.org/misc/bug-or-feedback/
+#: (content/misc/bug-or-feedback/contents+en.lrquestion.description)
+#: https//support.torproject.org/get-in-touch/why-i-cant-join-tor-channels/
+#: (content/get-in-touch/why-i-cant-join-tor-channels/contents+en.lrquestion.description)
+#: https//support.torproject.org/apt/tor-deb-repo/
+#: (content/apt/apt-1/contents+en.lrquestion.description)
+#: https//support.torproject.org/apt/apt-over-tor/
+#: (content/apt/apt-3/contents+en.lrquestion.description)
+msgid "```"
+msgstr "```"
+
+#: https//support.torproject.org/tbb/tbb-firewall-ports/
+#: (content/tbb/tbb-firewall-ports/contents+en.lrquestion.description)
+msgid "ReachableDirAddresses *:80"
+msgstr ""
+
+#: https//support.torproject.org/tbb/tbb-firewall-ports/
+#: (content/tbb/tbb-firewall-ports/contents+en.lrquestion.description)
+msgid "ReachableORAddresses *:443"
+msgstr ""
+
+#: https//support.torproject.org/tbb/tbb-install-tor-central-server/
+#: (content/tbb/tbb-install-tor-central-server/contents+en.lrquestion.title)
+msgid ""
+"Can I install Tor on a central server, and have my clients connect to it?"
+msgstr ""
+
+#: https//support.torproject.org/tbb/tbb-install-tor-central-server/
+#: (content/tbb/tbb-install-tor-central-server/contents+en.lrquestion.description)
+msgid ""
+"Yes. Tor can be configured as a client or a relay on another machine, and "
+"allow other machines to be able to connect to it for anonymity."
+msgstr ""
+
+#: https//support.torproject.org/tbb/tbb-install-tor-central-server/
+#: (content/tbb/tbb-install-tor-central-server/contents+en.lrquestion.description)
+msgid ""
+"This is most useful in an environment where many computers want a gateway of"
+" anonymity to the rest of the world."
+msgstr ""
+
+#: https//support.torproject.org/tbb/tbb-install-tor-central-server/
+#: (content/tbb/tbb-install-tor-central-server/contents+en.lrquestion.description)
+msgid ""
+"However, be forewarned that with this configuration, anyone within your "
+"private network (existing between you and the Tor client/relay) can see what"
+" traffic you are sending in clear text."
+msgstr ""
+
+#: https//support.torproject.org/tbb/tbb-install-tor-central-server/
+#: (content/tbb/tbb-install-tor-central-server/contents+en.lrquestion.description)
+msgid "The anonymity doesn't start until you get to the Tor relay."
+msgstr ""
+
+#: https//support.torproject.org/tbb/tbb-install-tor-central-server/
+#: (content/tbb/tbb-install-tor-central-server/contents+en.lrquestion.description)
+msgid ""
+"Because of this, if you are the controller of your domain and you know "
+"everything's locked down, you will be OK, but this configuration may not be "
+"suitable for large private networks where security is key all around."
+msgstr ""
+
+#: https//support.torproject.org/tbb/tbb-install-tor-central-server/
+#: (content/tbb/tbb-install-tor-central-server/contents+en.lrquestion.description)
+msgid ""
+"Configuration is simple, editing your torrc file's SocksListenAddress "
+"according to the following examples:"
+msgstr ""
+
+#: https//support.torproject.org/tbb/tbb-install-tor-central-server/
+#: (content/tbb/tbb-install-tor-central-server/contents+en.lrquestion.description)
+msgid "SocksListenAddress 127.0.0.1"
+msgstr ""
+
+#: https//support.torproject.org/tbb/tbb-install-tor-central-server/
+#: (content/tbb/tbb-install-tor-central-server/contents+en.lrquestion.description)
+msgid "SocksListenAddress 192.168.x.x:9100"
+msgstr ""
+
+#: https//support.torproject.org/tbb/tbb-install-tor-central-server/
+#: (content/tbb/tbb-install-tor-central-server/contents+en.lrquestion.description)
+msgid "SocksListenAddress 0.0.0.0:9100"
+msgstr ""
+
+#: https//support.torproject.org/tbb/tbb-install-tor-central-server/
+#: (content/tbb/tbb-install-tor-central-server/contents+en.lrquestion.description)
+msgid ""
+"You can state multiple listen addresses, in the case that you are part of "
+"several networks or subnets."
+msgstr ""
+
+#: https//support.torproject.org/tbb/tbb-install-tor-central-server/
+#: (content/tbb/tbb-install-tor-central-server/contents+en.lrquestion.description)
+msgid "SocksListenAddress 192.168.x.x:9100 #eth0"
+msgstr ""
+
+#: https//support.torproject.org/tbb/tbb-install-tor-central-server/
+#: (content/tbb/tbb-install-tor-central-server/contents+en.lrquestion.description)
+msgid "SocksListenAddress 10.x.x.x:9100 #eth1"
+msgstr ""
+
+#: https//support.torproject.org/tbb/tbb-install-tor-central-server/
+#: (content/tbb/tbb-install-tor-central-server/contents+en.lrquestion.description)
+msgid ""
+"After this, your clients on their respective networks/subnets would specify "
+"a socks proxy with the address and port you specified SocksListenAddress to "
+"be."
+msgstr ""
+
+#: https//support.torproject.org/tbb/tbb-install-tor-central-server/
+#: (content/tbb/tbb-install-tor-central-server/contents+en.lrquestion.description)
+msgid ""
+"Please note that the SocksPort configuration option gives the port ONLY for "
+"localhost (127.0.0.1)."
+msgstr ""
+
+#: https//support.torproject.org/tbb/tbb-install-tor-central-server/
+#: (content/tbb/tbb-install-tor-central-server/contents+en.lrquestion.description)
+msgid ""
+"When setting up your SocksListenAddress(es), you need to give the port with "
+"the address, as shown above."
+msgstr ""
+
+#: https//support.torproject.org/tbb/tbb-install-tor-central-server/
+#: (content/tbb/tbb-install-tor-central-server/contents+en.lrquestion.description)
+msgid ""
+"If you are interested in forcing all outgoing data through the central Tor "
+"client/relay, instead of the server only being an optional proxy, you may "
+"find the program iptables (for *nix) useful."
+msgstr ""
+
+#: https//support.torproject.org/tbb/tbb-run-client-different-computer/
+#: (content/tbb/tbb-run-client-different-computer/contents+en.lrquestion.title)
+msgid ""
+"I want to run my Tor client on a different computer than my applications"
+msgstr ""
+
+#: https//support.torproject.org/tbb/tbb-run-client-different-computer/
+#: (content/tbb/tbb-run-client-different-computer/contents+en.lrquestion.description)
+msgid ""
+"By default, your Tor client only listens for applications that connect from "
+"localhost."
+msgstr ""
+
+#: https//support.torproject.org/tbb/tbb-run-client-different-computer/
+#: (content/tbb/tbb-run-client-different-computer/contents+en.lrquestion.description)
+msgid "Connections from other computers are refused."
+msgstr ""
+
+#: https//support.torproject.org/tbb/tbb-run-client-different-computer/
+#: (content/tbb/tbb-run-client-different-computer/contents+en.lrquestion.description)
+msgid ""
+"If you want to torify applications on different computers than the Tor "
+"client, you should edit your torrc to define `SocksListenAddress 0.0.0.0` "
+"and then restart (or hup) Tor."
+msgstr ""
+
+#: https//support.torproject.org/tbb/tbb-run-client-different-computer/
+#: (content/tbb/tbb-run-client-different-computer/contents+en.lrquestion.description)
+msgid ""
+"If you want to get more advanced, you can configure your Tor client on a "
+"firewall to bind to your internal IP but not your external IP."
+msgstr ""
+
#: https//support.torproject.org/tbb/website-blocking-tor/
#: (content/tbb/website-blocking-tor/contents+en.lrquestion.title)
msgid "A website I am trying to reach is blocking access over Tor."
@@ -6880,6 +7675,130 @@ msgid ""
"guide."
msgstr ""
+#: https//support.torproject.org/operators/default-exit-ports/
+#: (content/operators/default-exit-ports/contents+en.lrquestion.title)
+msgid "Is there a list of default exit ports?"
+msgstr ""
+
+#: https//support.torproject.org/operators/default-exit-ports/
+#: (content/operators/default-exit-ports/contents+en.lrquestion.description)
+msgid ""
+"The default open ports are listed below but keep in mind that, any port or "
+"ports can be opened by the relay operator by configuring it in torrc or "
+"modifying the source code."
+msgstr ""
+
+#: https//support.torproject.org/operators/default-exit-ports/
+#: (content/operators/default-exit-ports/contents+en.lrquestion.description)
+msgid ""
+"The default according to src/or/policies.c ([line 85][1] and [line 1901][2])"
+" from the source code release [release-0.4.6][3]:"
+msgstr ""
+
+#: https//support.torproject.org/operators/default-exit-ports/
+#: (content/operators/default-exit-ports/contents+en.lrquestion.description)
+msgid "reject 0.0.0.0/8"
+msgstr ""
+
+#: https//support.torproject.org/operators/default-exit-ports/
+#: (content/operators/default-exit-ports/contents+en.lrquestion.description)
+msgid "reject 169.254.0.0/16"
+msgstr ""
+
+#: https//support.torproject.org/operators/default-exit-ports/
+#: (content/operators/default-exit-ports/contents+en.lrquestion.description)
+msgid "reject 127.0.0.0/8"
+msgstr ""
+
+#: https//support.torproject.org/operators/default-exit-ports/
+#: (content/operators/default-exit-ports/contents+en.lrquestion.description)
+msgid "reject 192.168.0.0/16"
+msgstr ""
+
+#: https//support.torproject.org/operators/default-exit-ports/
+#: (content/operators/default-exit-ports/contents+en.lrquestion.description)
+msgid "reject 10.0.0.0/8"
+msgstr ""
+
+#: https//support.torproject.org/operators/default-exit-ports/
+#: (content/operators/default-exit-ports/contents+en.lrquestion.description)
+msgid "reject 172.16.0.0/12"
+msgstr ""
+
+#: https//support.torproject.org/operators/default-exit-ports/
+#: (content/operators/default-exit-ports/contents+en.lrquestion.description)
+msgid "reject *:25"
+msgstr ""
+
+#: https//support.torproject.org/operators/default-exit-ports/
+#: (content/operators/default-exit-ports/contents+en.lrquestion.description)
+msgid "reject *:119"
+msgstr ""
+
+#: https//support.torproject.org/operators/default-exit-ports/
+#: (content/operators/default-exit-ports/contents+en.lrquestion.description)
+msgid "reject *:135-139"
+msgstr ""
+
+#: https//support.torproject.org/operators/default-exit-ports/
+#: (content/operators/default-exit-ports/contents+en.lrquestion.description)
+msgid "reject *:445"
+msgstr ""
+
+#: https//support.torproject.org/operators/default-exit-ports/
+#: (content/operators/default-exit-ports/contents+en.lrquestion.description)
+msgid "reject *:563"
+msgstr ""
+
+#: https//support.torproject.org/operators/default-exit-ports/
+#: (content/operators/default-exit-ports/contents+en.lrquestion.description)
+msgid "reject *:1214"
+msgstr ""
+
+#: https//support.torproject.org/operators/default-exit-ports/
+#: (content/operators/default-exit-ports/contents+en.lrquestion.description)
+msgid "reject *:4661-4666"
+msgstr ""
+
+#: https//support.torproject.org/operators/default-exit-ports/
+#: (content/operators/default-exit-ports/contents+en.lrquestion.description)
+msgid "reject *:6346-6429"
+msgstr ""
+
+#: https//support.torproject.org/operators/default-exit-ports/
+#: (content/operators/default-exit-ports/contents+en.lrquestion.description)
+msgid "reject *:6699"
+msgstr ""
+
+#: https//support.torproject.org/operators/default-exit-ports/
+#: (content/operators/default-exit-ports/contents+en.lrquestion.description)
+msgid "reject *:6881-6999"
+msgstr ""
+
+#: https//support.torproject.org/operators/default-exit-ports/
+#: (content/operators/default-exit-ports/contents+en.lrquestion.description)
+msgid "accept *:*"
+msgstr ""
+
+#: https//support.torproject.org/operators/default-exit-ports/
+#: (content/operators/default-exit-ports/contents+en.lrquestion.description)
+msgid ""
+"[1]: "
+"https://gitlab.torproject.org/tpo/core/tor/-/blob/release-0.4.6/src/core/or/policies.c#L85"
+msgstr ""
+
+#: https//support.torproject.org/operators/default-exit-ports/
+#: (content/operators/default-exit-ports/contents+en.lrquestion.description)
+msgid ""
+"[2]: "
+"https://gitlab.torproject.org/tpo/core/tor/-/blob/release-0.4.6/src/core/or/policies.c#L1901"
+msgstr ""
+
+#: https//support.torproject.org/operators/default-exit-ports/
+#: (content/operators/default-exit-ports/contents+en.lrquestion.description)
+msgid "[3]: https://gitlab.torproject.org/tpo/core/tor/-/tree/release-0.4.6/"
+msgstr ""
+
#: https//support.torproject.org/operators/dynamic-ip/
#: (content/operators/dynamic-ip/contents+en.lrquestion.title)
msgid "Can I run a Tor relay using a dynamic IP address?"
@@ -7027,21 +7946,6 @@ msgid ""
"into hibernation, signaled by this entry in the log:"
msgstr ""
-#: https//support.torproject.org/operators/hibernation/
-#: (content/operators/hibernation/contents+en.lrquestion.description)
-#: https//support.torproject.org/operators/limit-total-bandwidth/
-#: (content/operators/limit-total-bandwidth/contents+en.lrquestion.description)
-#: https//support.torproject.org/misc/bug-or-feedback/
-#: (content/misc/bug-or-feedback/contents+en.lrquestion.description)
-#: https//support.torproject.org/get-in-touch/why-i-cant-join-tor-channels/
-#: (content/get-in-touch/why-i-cant-join-tor-channels/contents+en.lrquestion.description)
-#: https//support.torproject.org/apt/tor-deb-repo/
-#: (content/apt/apt-1/contents+en.lrquestion.description)
-#: https//support.torproject.org/apt/apt-over-tor/
-#: (content/apt/apt-3/contents+en.lrquestion.description)
-msgid "```"
-msgstr "```"
-
#: https//support.torproject.org/operators/hibernation/
#: (content/operators/hibernation/contents+en.lrquestion.description)
msgid "Bandwidth soft limit reached; commencing hibernation."
@@ -9346,6 +10250,131 @@ msgstr "uid tor-security at lists.torproject.org"
msgid "sub 4096R/C00942E4 2017-03-13"
msgstr "sub 4096R/C00942E4 2017-03-13"
+#: https//support.torproject.org/misc/check-socks-dns-leaks/
+#: (content/misc/check-socks-dns-leaks/contents+en.lrquestion.title)
+msgid ""
+"How do I check if my application that uses SOCKS is leaking DNS requests?"
+msgstr ""
+
+#: https//support.torproject.org/misc/check-socks-dns-leaks/
+#: (content/misc/check-socks-dns-leaks/contents+en.lrquestion.description)
+msgid ""
+"Even if your application is using the correct variant of the SOCKS protocol,"
+" there is still a risk that it could be leaking DNS queries."
+msgstr ""
+
+#: https//support.torproject.org/misc/check-socks-dns-leaks/
+#: (content/misc/check-socks-dns-leaks/contents+en.lrquestion.description)
+msgid ""
+"This problem happens in Firefox extensions that resolve the destination "
+"hostname themselves, for example to show you its IP address, what country "
+"it's in, etc."
+msgstr ""
+
+#: https//support.torproject.org/misc/check-socks-dns-leaks/
+#: (content/misc/check-socks-dns-leaks/contents+en.lrquestion.description)
+msgid ""
+"If you suspect your application might behave like this, follow the "
+"instructions below to check."
+msgstr ""
+
+#: https//support.torproject.org/misc/check-socks-dns-leaks/
+#: (content/misc/check-socks-dns-leaks/contents+en.lrquestion.description)
+msgid ""
+"1. Add `TestSocks 1` to your [torrc file](https://support.torproject.org/tbb"
+"/tbb-editing-torrc/)."
+msgstr ""
+
+#: https//support.torproject.org/misc/check-socks-dns-leaks/
+#: (content/misc/check-socks-dns-leaks/contents+en.lrquestion.description)
+msgid ""
+"1. Start Tor, and point your program's SOCKS proxy settings to Tor's SOCKS5 "
+"server (`socks5://127.0.0.1:9050` by default)."
+msgstr ""
+
+#: https//support.torproject.org/misc/check-socks-dns-leaks/
+#: (content/misc/check-socks-dns-leaks/contents+en.lrquestion.description)
+msgid ""
+"1. Watch your logs as you use your application. For each socks connection, "
+"Tor will log a `notice` for safe connections, and a `warn` for connections "
+"leaking DNS requests."
+msgstr ""
+
+#: https//support.torproject.org/misc/check-socks-dns-leaks/
+#: (content/misc/check-socks-dns-leaks/contents+en.lrquestion.description)
+msgid ""
+"If you want to automatically disable all connections leaking DNS requests, "
+"set `SafeSocks 1` in your torrc file."
+msgstr ""
+
+#: https//support.torproject.org/misc/hide-exits/
+#: (content/misc/hide-exits/contents+en.lrquestion.title)
+msgid ""
+"You should hide the list of Tor relays, so people can't block the exits."
+msgstr ""
+
+#: https//support.torproject.org/misc/hide-exits/
+#: (content/misc/hide-exits/contents+en.lrquestion.description)
+msgid "There are a few reasons we don't:"
+msgstr ""
+
+#: https//support.torproject.org/misc/hide-exits/
+#: (content/misc/hide-exits/contents+en.lrquestion.description)
+msgid ""
+"1. We can't help but make the information available, since Tor clients need "
+"to use it to pick their paths."
+msgstr ""
+
+#: https//support.torproject.org/misc/hide-exits/
+#: (content/misc/hide-exits/contents+en.lrquestion.description)
+msgid "So if the \"blockers\" want it, they can get it anyway."
+msgstr ""
+
+#: https//support.torproject.org/misc/hide-exits/
+#: (content/misc/hide-exits/contents+en.lrquestion.description)
+msgid ""
+"Further, even if we didn't tell clients about the list of relays directly, "
+"somebody could still make a lot of connections through Tor to a test site "
+"and build a list of the addresses they see."
+msgstr ""
+
+#: https//support.torproject.org/misc/hide-exits/
+#: (content/misc/hide-exits/contents+en.lrquestion.description)
+msgid ""
+"1. If people want to block us, we believe that they should be allowed to do "
+"so."
+msgstr ""
+
+#: https//support.torproject.org/misc/hide-exits/
+#: (content/misc/hide-exits/contents+en.lrquestion.description)
+msgid ""
+"Obviously, we would prefer for everybody to allow Tor users to connect to "
+"them, but people have the right to decide who their services should allow "
+"connections from, and if they want to block anonymous users, they can."
+msgstr ""
+
+#: https//support.torproject.org/misc/hide-exits/
+#: (content/misc/hide-exits/contents+en.lrquestion.description)
+msgid ""
+"1. Being blockable also has tactical advantages: it may be a persuasive "
+"response to website maintainers who feel threatened by Tor."
+msgstr ""
+
+#: https//support.torproject.org/misc/hide-exits/
+#: (content/misc/hide-exits/contents+en.lrquestion.description)
+msgid ""
+"Giving them the option may inspire them to stop and think about whether they"
+" really want to eliminate private access to their system, and if not, what "
+"other options they might have."
+msgstr ""
+
+#: https//support.torproject.org/misc/hide-exits/
+#: (content/misc/hide-exits/contents+en.lrquestion.description)
+msgid ""
+"The time they might otherwise have spent blocking Tor, they may instead "
+"spend rethinking their overall approach to privacy and anonymity."
+msgstr ""
+
#: https//support.torproject.org/misc/menu/
#: (content/misc/menu/contents+en.lrquestion.description)
msgid "About"
@@ -9932,56 +10961,20 @@ msgstr "### Hogy tudja megerÅsÃteni a becenenét"
#: https//support.torproject.org/get-in-touch/why-i-cant-join-tor-channels/
#: (content/get-in-touch/why-i-cant-join-tor-channels/contents+en.lrquestion.description)
msgid ""
-"Then, to complete the registration and ultimately gain access to the #tor-"
-"project channel, your nickname must be **verified**."
+"After registering your nickname, to gain access to the #tor-project and "
+"other protected channels, your nickname must be **verified**."
msgstr ""
#: https//support.torproject.org/get-in-touch/why-i-cant-join-tor-channels/
#: (content/get-in-touch/why-i-cant-join-tor-channels/contents+en.lrquestion.description)
msgid ""
-"1. To verify your nick, open a new browser window and go to "
-"https://webchat.oftc.net/?channels=tor."
+"1. Go to https://services.oftc.net/ and follow the steps in the '*To verify "
+"your account*' section"
msgstr ""
#: https//support.torproject.org/get-in-touch/why-i-cant-join-tor-channels/
#: (content/get-in-touch/why-i-cant-join-tor-channels/contents+en.lrquestion.description)
-msgid "2. Log in with your IRC nickname and password."
-msgstr "2. Jelentkezzen be az IRC-s becenevével és jelszavával."
-
-#: https//support.torproject.org/get-in-touch/why-i-cant-join-tor-channels/
-#: (content/get-in-touch/why-i-cant-join-tor-channels/contents+en.lrquestion.description)
-msgid ""
-"3. Look for the word **verify** and log in there. It may appear that nothing"
-" has happened. Look at the top of the page, and there will be a column "
-"called **Account**."
-msgstr ""
-
-#: https//support.torproject.org/get-in-touch/why-i-cant-join-tor-channels/
-#: (content/get-in-touch/why-i-cant-join-tor-channels/contents+en.lrquestion.description)
-msgid "4. Click on **Account**."
-msgstr ""
-
-#: https//support.torproject.org/get-in-touch/why-i-cant-join-tor-channels/
-#: (content/get-in-touch/why-i-cant-join-tor-channels/contents+en.lrquestion.description)
-msgid ""
-"5. Click on the small sentence at the bottom of the square that says: Verify"
-" account."
-msgstr ""
-
-#: https//support.torproject.org/get-in-touch/why-i-cant-join-tor-channels/
-#: (content/get-in-touch/why-i-cant-join-tor-channels/contents+en.lrquestion.description)
-msgid "6. Fill out the Captcha that pops up, and click ok."
-msgstr "6. Töltse ki a a megjelenŠCaptcha-t, majd kattintson az OK-ra."
-
-#: https//support.torproject.org/get-in-touch/why-i-cant-join-tor-channels/
-#: (content/get-in-touch/why-i-cant-join-tor-channels/contents+en.lrquestion.description)
-msgid ""
-"7. A tiny message will appear: \"Your NickServ account has been verified.\""
-msgstr ""
-
-#: https//support.torproject.org/get-in-touch/why-i-cant-join-tor-channels/
-#: (content/get-in-touch/why-i-cant-join-tor-channels/contents+en.lrquestion.description)
-msgid "8. Go back to the IRC webpage where you are logged in and type:"
+msgid "2. Go back to the IRC webpage where you are logged in and type:"
msgstr ""
#: https//support.torproject.org/get-in-touch/why-i-cant-join-tor-channels/
@@ -9991,13 +10984,13 @@ msgstr "`/msg nickserv checkverify`"
#: https//support.torproject.org/get-in-touch/why-i-cant-join-tor-channels/
#: (content/get-in-touch/why-i-cant-join-tor-channels/contents+en.lrquestion.description)
-msgid "9. Click ENTER."
-msgstr "9. Nyomja meg az Enter gombot."
+msgid "3. Click ENTER."
+msgstr ""
#: https//support.torproject.org/get-in-touch/why-i-cant-join-tor-channels/
#: (content/get-in-touch/why-i-cant-join-tor-channels/contents+en.lrquestion.description)
-msgid "10. If all is well, you will receive a message that says:"
-msgstr "10. Ha minden rendben ment, akkor a következŠüzenet jelenik meg:"
+msgid "4. If all is well, you will receive a message that says:"
+msgstr ""
#: https//support.torproject.org/get-in-touch/why-i-cant-join-tor-channels/
#: (content/get-in-touch/why-i-cant-join-tor-channels/contents+en.lrquestion.description)
@@ -10137,19 +11130,23 @@ msgstr "# apt install apt-transport-https"
#: https//support.torproject.org/apt/tor-deb-repo/
#: (content/apt/apt-1/contents+en.lrquestion.description)
msgid ""
-"#### 2. Add the following entries to `/etc/apt/sources.list` or a new file "
-"in `/etc/apt/sources.list.d/`"
+"#### 2. Create a new file in `/etc/apt/sources.list.d/` named `tor.list`. "
+"Add the following entries:"
msgstr ""
#: https//support.torproject.org/apt/tor-deb-repo/
#: (content/apt/apt-1/contents+en.lrquestion.description)
-msgid "deb https://deb.torproject.org/torproject.org <DISTRIBUTION> main"
-msgstr "deb https://deb.torproject.org/torproject.org <DISTRIBUTION> main"
+msgid ""
+"deb [signed-by=/usr/share/keyrings/tor-archive-keyring.gpg] "
+"https://deb.torproject.org/torproject.org <DISTRIBUTION> main"
+msgstr ""
#: https//support.torproject.org/apt/tor-deb-repo/
#: (content/apt/apt-1/contents+en.lrquestion.description)
-msgid "deb-src https://deb.torproject.org/torproject.org <DISTRIBUTION> main"
-msgstr "deb-src https://deb.torproject.org/torproject.org <DISTRIBUTION> main"
+msgid ""
+"deb-src [signed-by=/usr/share/keyrings/tor-archive-keyring.gpg] "
+"https://deb.torproject.org/torproject.org <DISTRIBUTION> main"
+msgstr ""
#: https//support.torproject.org/apt/tor-deb-repo/
#: (content/apt/apt-1/contents+en.lrquestion.description)
@@ -10162,20 +11159,18 @@ msgstr ""
#: https//support.torproject.org/apt/tor-deb-repo/
#: (content/apt/apt-1/contents+en.lrquestion.description)
msgid ""
-"deb https://deb.torproject.org/torproject.org tor-"
+"deb [signed-by=/usr/share/keyrings/tor-archive-keyring.gpg] "
+"https://deb.torproject.org/torproject.org tor-"
"experimental-0.4.6.x-<DISTRIBUTION> main"
msgstr ""
-"deb https://deb.torproject.org/torproject.org tor-"
-"experimental-0.4.6.x-<DISTRIBUTION> main"
#: https//support.torproject.org/apt/tor-deb-repo/
#: (content/apt/apt-1/contents+en.lrquestion.description)
msgid ""
-"deb-src https://deb.torproject.org/torproject.org tor-"
+"deb-src [signed-by=/usr/share/keyrings/tor-archive-keyring.gpg] "
+"https://deb.torproject.org/torproject.org tor-"
"experimental-0.4.6.x-<DISTRIBUTION> main"
msgstr ""
-"deb-src https://deb.torproject.org/torproject.org tor-"
-"experimental-0.4.6.x-<DISTRIBUTION> main"
#: https//support.torproject.org/apt/tor-deb-repo/
#: (content/apt/apt-1/contents+en.lrquestion.description)
@@ -10185,20 +11180,18 @@ msgstr ""
#: https//support.torproject.org/apt/tor-deb-repo/
#: (content/apt/apt-1/contents+en.lrquestion.description)
msgid ""
-"deb https://deb.torproject.org/torproject.org tor-nightly-"
-"master-<DISTRIBUTION> main"
+"deb [signed-by=/usr/share/keyrings/tor-archive-keyring.gpg] "
+"https://deb.torproject.org/torproject.org tor-nightly-master-<DISTRIBUTION> "
+"main"
msgstr ""
-"deb https://deb.torproject.org/torproject.org tor-nightly-"
-"master-<DISTRIBUTION> main"
#: https//support.torproject.org/apt/tor-deb-repo/
#: (content/apt/apt-1/contents+en.lrquestion.description)
msgid ""
-"deb-src https://deb.torproject.org/torproject.org tor-nightly-"
-"master-<DISTRIBUTION> main"
+"deb-src [signed-by=/usr/share/keyrings/tor-archive-keyring.gpg] "
+"https://deb.torproject.org/torproject.org tor-nightly-master-<DISTRIBUTION> "
+"main"
msgstr ""
-"deb-src https://deb.torproject.org/torproject.org tor-nightly-"
-"master-<DISTRIBUTION> main"
#: https//support.torproject.org/apt/tor-deb-repo/
#: (content/apt/apt-1/contents+en.lrquestion.description)
@@ -10218,16 +11211,16 @@ msgstr ""
#: https//support.torproject.org/apt/tor-deb-repo/
#: (content/apt/apt-1/contents+en.lrquestion.description)
msgid ""
-"deb [arch=amd64] https://deb.torproject.org/torproject.org focal main"
+"deb [arch=amd64 signed-by=/usr/share/keyrings/tor-archive-keyring.gpg] "
+"https://deb.torproject.org/torproject.org focal main"
msgstr ""
-"deb [arch=amd64] https://deb.torproject.org/torproject.org focal main"
#: https//support.torproject.org/apt/tor-deb-repo/
#: (content/apt/apt-1/contents+en.lrquestion.description)
msgid ""
-"deb-src [arch=amd64] https://deb.torproject.org/torproject.org focal main"
+"deb-src [arch=amd64 signed-by=/usr/share/keyrings/tor-archive-keyring.gpg] "
+"https://deb.torproject.org/torproject.org focal main"
msgstr ""
-"deb-src [arch=amd64] https://deb.torproject.org/torproject.org focal main"
#: https//support.torproject.org/apt/tor-deb-repo/
#: (content/apt/apt-1/contents+en.lrquestion.description)
@@ -10246,26 +11239,17 @@ msgstr ""
#: (content/apt/apt-1/contents+en.lrquestion.description)
msgid ""
"#### 3. Then add the gpg key used to sign the packages by running the "
-"following commands at your command prompt"
+"following command at your command prompt:"
msgstr ""
#: https//support.torproject.org/apt/tor-deb-repo/
#: (content/apt/apt-1/contents+en.lrquestion.description)
msgid ""
-"# wget -qO- "
+"# wget -O- "
"https://deb.torproject.org/torproject.org/A3C4F0F979CAA22CDBA8F512EE8CBC9E886DDD89.asc"
-" | gpg --import"
+" | gpg --dearmor | tee /usr/share/keyrings/tor-archive-keyring.gpg "
+">/dev/null"
msgstr ""
-"# wget -qO- "
-"https://deb.torproject.org/torproject.org/A3C4F0F979CAA22CDBA8F512EE8CBC9E886DDD89.asc"
-" | gpg --import"
-
-#: https//support.torproject.org/apt/tor-deb-repo/
-#: (content/apt/apt-1/contents+en.lrquestion.description)
-msgid ""
-"# gpg --export A3C4F0F979CAA22CDBA8F512EE8CBC9E886DDD89 | apt-key add -"
-msgstr ""
-"# gpg --export A3C4F0F979CAA22CDBA8F512EE8CBC9E886DDD89 | apt-key add -"
#: https//support.torproject.org/apt/tor-deb-repo/
#: (content/apt/apt-1/contents+en.lrquestion.description)
@@ -11891,6 +12875,82 @@ msgid ""
"doesn't change IP address over the day."
msgstr ""
+#: https//support.torproject.org/alternate-designs/block-websites/
+#: (content/alternate-designs/block-websites/contents+en.lrquestion.title)
+msgid "Exit policies should be able to block websites, not just IP addresses."
+msgstr ""
+
+#: https//support.torproject.org/alternate-designs/block-websites/
+#: (content/alternate-designs/block-websites/contents+en.lrquestion.description)
+msgid ""
+"It would be nice to let relay operators say things like `reject "
+"www.slashdot.org` in their exit policies, rather than requiring them to "
+"learn all the IP address space that could be covered by the site (and then "
+"also blocking other sites at those IP addresses)."
+msgstr ""
+
+#: https//support.torproject.org/alternate-designs/block-websites/
+#: (content/alternate-designs/block-websites/contents+en.lrquestion.description)
+msgid "There are two problems, though."
+msgstr ""
+
+#: https//support.torproject.org/alternate-designs/block-websites/
+#: (content/alternate-designs/block-websites/contents+en.lrquestion.description)
+msgid "First, users could still get around these blocks."
+msgstr ""
+
+#: https//support.torproject.org/alternate-designs/block-websites/
+#: (content/alternate-designs/block-websites/contents+en.lrquestion.description)
+msgid ""
+"For example, they could request the IP address rather than the hostname when"
+" they exit from the Tor network."
+msgstr ""
+
+#: https//support.torproject.org/alternate-designs/block-websites/
+#: (content/alternate-designs/block-websites/contents+en.lrquestion.description)
+msgid ""
+"This means operators would still need to learn all the IP addresses for the "
+"destinations in question."
+msgstr ""
+
+#: https//support.torproject.org/alternate-designs/block-websites/
+#: (content/alternate-designs/block-websites/contents+en.lrquestion.description)
+msgid ""
+"The second problem is that it would allow remote attackers to censor "
+"arbitrary sites."
+msgstr ""
+
+#: https//support.torproject.org/alternate-designs/block-websites/
+#: (content/alternate-designs/block-websites/contents+en.lrquestion.description)
+msgid ""
+"For example, if a Tor operator blocks www1.slashdot.org, and then some "
+"attacker poisons the Tor relay's DNS or otherwise changes that hostname to "
+"resolve to the IP address for a major news site, then suddenly that Tor "
+"relay is blocking the news site."
+msgstr ""
+
+#: https//support.torproject.org/alternate-designs/let-the-network-pick-the-path/
+#: (content/alternate-designs/let-the-network-pick-the-path/contents+en.lrquestion.title)
+msgid "You should let the network pick the path, not the client."
+msgstr ""
+
+#: https//support.torproject.org/alternate-designs/let-the-network-pick-the-path/
+#: (content/alternate-designs/let-the-network-pick-the-path/contents+en.lrquestion.description)
+msgid "No, you cannot trust the network to pick the path."
+msgstr ""
+
+#: https//support.torproject.org/alternate-designs/let-the-network-pick-the-path/
+#: (content/alternate-designs/let-the-network-pick-the-path/contents+en.lrquestion.description)
+msgid "Malicious relays could route you through their colluding friends."
+msgstr ""
+
+#: https//support.torproject.org/alternate-designs/let-the-network-pick-the-path/
+#: (content/alternate-designs/let-the-network-pick-the-path/contents+en.lrquestion.description)
+msgid ""
+"This would give an adversary the ability to watch all of your traffic end to"
+" end."
+msgstr ""
+
#: lego/templates/banner.html:3 lego/templates/banner.html:5
#: templates/banner.html:3 templates/banner.html:5
msgid "Close banner"
@@ -11923,8 +12983,8 @@ msgid "DONATE NOW"
msgstr "TÃMOGASSON MOST"
#: lego/templates/footer.html:13 lego/templates/footer.html:22
-#: lego/templates/navbar.html:83 templates/footer.html:13
-#: templates/footer.html:22 templates/navbar.html:83
+#: lego/templates/navbar.html:95 templates/footer.html:13
+#: templates/footer.html:22 templates/navbar.html:95
msgid "Download Tor Browser"
msgstr "Tor BöngészŠletöltése"
diff --git a/contents+id.po b/contents+id.po
index 915dace741..2541bdc72f 100644
--- a/contents+id.po
+++ b/contents+id.po
@@ -13,16 +13,16 @@
# Joshua P, 2021
# Sidiq Pangestu <sani21bimo at gmail.com>, 2021
# Evanna Audrey <evanna.n.audrey at gmail.com>, 2021
-# Emma Peel, 2021
# 9hs <saptohadi.1110 at gmail.com>, 2021
+# Emma Peel, 2021
#
msgid ""
msgstr ""
"Project-Id-Version: PACKAGE VERSION\n"
"Report-Msgid-Bugs-To: \n"
-"POT-Creation-Date: 2021-08-25 11:14+CET\n"
+"POT-Creation-Date: 2021-09-01 12:20+CET\n"
"PO-Revision-Date: 2018-10-02 22:41+0000\n"
-"Last-Translator: 9hs <saptohadi.1110 at gmail.com>, 2021\n"
+"Last-Translator: Emma Peel, 2021\n"
"Language-Team: Indonesian (https://www.transifex.com/otf/teams/1519/id/)\n"
"MIME-Version: 1.0\n"
"Content-Type: text/plain; charset=UTF-8\n"
@@ -153,6 +153,11 @@ msgstr "Penyalahgunaan FAQ"
msgid "Tor Metrics"
msgstr "Metrik Tor"
+#: https//support.torproject.org/alternate-designs/
+#: (content/alternate-designs/contents+en.lrtopic.title)
+msgid "Alternate Designs We Don't Do (Yet)"
+msgstr ""
+
#: https//support.torproject.org/glossary/add-on-extension-or-plugin/
#: (content/glossary/add-on-extension-or-plugin/contents+en.lrword.term)
msgid "add-on, extension, or plugin"
@@ -462,8 +467,8 @@ msgid ""
msgstr ""
"Cookie [HTTP](../http) (juga disebut cookie web, cookie Internet, cookie "
"peramban, atau hanya cookie) adalah beberapa data yang dikirim dari situs "
-"web dan disimpan di komputer pengguna oleh [browser web] pengguna ( ../web-"
-"browser) saat pengguna menjelajah."
+"web dan disimpan di komputer pengguna oleh [browser web]( ../web-browser) "
+"pengguna saat pengguna menjelajah."
#: https//support.torproject.org/glossary/cookie/
#: (content/glossary/cookie/contents+en.lrword.definition)
@@ -632,9 +637,9 @@ msgid ""
"manual.torproject.org/mobile-tor/) if you prefer installing the app through "
"F-Droid."
msgstr ""
-"Tor Browser tersedia di F-Droid. Ikuti [langkah-langkah] ini (https://tb-"
-"manual.torproject.org/mobile-tor/) jika Anda lebih suka menginstal aplikasi "
-"melalui F-Droid."
+"Tor Browser tersedia di F-Droid. Ikuti [langkah-langkah](https://tb-"
+"manual.torproject.org/mobile-tor/) ini jika Anda lebih suka menginstal "
+"aplikasi melalui F-Droid."
#: https//support.torproject.org/glossary/firefox/
#: (content/glossary/firefox/contents+en.lrword.term)
@@ -2102,6 +2107,61 @@ msgstr ""
"Anda dapat menemukan informasi lebih rinci tentang Tor + VPN di [our "
"wiki](https://trac.torproject.org/projects/tor/wiki/doc/TorPlusVPN)."
+#: https//support.torproject.org/faq/relay-donations/
+#: (content/faq/relay-donations/contents+en.lrquestion.title)
+msgid "Can I donate for a relay rather than run my own?"
+msgstr ""
+
+#: https//support.torproject.org/faq/relay-donations/
+#: (content/faq/relay-donations/contents+en.lrquestion.description)
+msgid ""
+"Sure! We have a [list of organizations that run Tor "
+"relays](https://community.torproject.org/relay/community-resources/relay-"
+"associations/) that are happy to turn your donations into better speed and "
+"anonymity for the Tor network."
+msgstr ""
+
+#: https//support.torproject.org/faq/relay-donations/
+#: (content/faq/relay-donations/contents+en.lrquestion.description)
+msgid ""
+"These organizations are not the same as [The Tor Project, "
+"Inc](https://donate.torproject.org/), but we consider that a good thing."
+msgstr ""
+
+#: https//support.torproject.org/faq/relay-donations/
+#: (content/faq/relay-donations/contents+en.lrquestion.description)
+msgid "They're run by nice people who are part of the Tor community."
+msgstr ""
+
+#: https//support.torproject.org/faq/relay-donations/
+#: (content/faq/relay-donations/contents+en.lrquestion.description)
+msgid ""
+"Note that there can be a tradeoff here between anonymity and performance."
+msgstr ""
+
+#: https//support.torproject.org/faq/relay-donations/
+#: (content/faq/relay-donations/contents+en.lrquestion.description)
+msgid ""
+"The Tor network's anonymity comes in part from diversity, so if you are in a"
+" position to run your own relay, you will be improving Tor's anonymity more "
+"than by donating."
+msgstr ""
+
+#: https//support.torproject.org/faq/relay-donations/
+#: (content/faq/relay-donations/contents+en.lrquestion.description)
+msgid ""
+"At the same time though, economies of scale for bandwidth mean that "
+"combining many small donations into several larger relays is more efficient "
+"at improving network performance."
+msgstr ""
+
+#: https//support.torproject.org/faq/relay-donations/
+#: (content/faq/relay-donations/contents+en.lrquestion.description)
+msgid ""
+"Improving anonymity and improving performance are both worthwhile goals, so "
+"however you can help is great!"
+msgstr ""
+
#: https//support.torproject.org/faq/staying-anonymous/
#: (content/faq/staying-anonymous/contents+en.lrquestion.title)
msgid "Am I totally anonymous if I use Tor?"
@@ -2402,6 +2462,61 @@ msgid ""
" documenting all the issues](https://community.torproject.org/)."
msgstr ""
+#: https//support.torproject.org/about/attacks-on-onion-routing/
+#: (content/about/attacks-on-onion-routing/contents+en.lrquestion.title)
+msgid "What attacks remain against onion routing?"
+msgstr ""
+
+#: https//support.torproject.org/about/attacks-on-onion-routing/
+#: (content/about/attacks-on-onion-routing/contents+en.lrquestion.description)
+msgid ""
+"As mentioned above, it is possible for an observer who can view both you and"
+" either the destination website or your Tor exit node to correlate timings "
+"of your traffic as it enters the Tor network and also as it exits."
+msgstr ""
+
+#: https//support.torproject.org/about/attacks-on-onion-routing/
+#: (content/about/attacks-on-onion-routing/contents+en.lrquestion.description)
+msgid "Tor does not defend against such a threat model."
+msgstr ""
+
+#: https//support.torproject.org/about/attacks-on-onion-routing/
+#: (content/about/attacks-on-onion-routing/contents+en.lrquestion.description)
+msgid ""
+"In a more limited sense, note that if a censor or law enforcement agency has"
+" the ability to obtain specific observation of parts of the network, it is "
+"possible for them to verify a suspicion that you talk regularly to your "
+"friend by observing traffic at both ends and correlating the timing of only "
+"that traffic."
+msgstr ""
+
+#: https//support.torproject.org/about/attacks-on-onion-routing/
+#: (content/about/attacks-on-onion-routing/contents+en.lrquestion.description)
+msgid ""
+"Again, this is only useful to verify that parties already suspected of "
+"communicating with one another are doing so."
+msgstr ""
+
+#: https//support.torproject.org/about/attacks-on-onion-routing/
+#: (content/about/attacks-on-onion-routing/contents+en.lrquestion.description)
+msgid ""
+"In most countries, the suspicion required to obtain a warrant already "
+"carries more weight than timing correlation would provide."
+msgstr ""
+
+#: https//support.torproject.org/about/attacks-on-onion-routing/
+#: (content/about/attacks-on-onion-routing/contents+en.lrquestion.description)
+msgid ""
+"Furthermore, since Tor reuses circuits for multiple TCP connections, it is "
+"possible to associate non anonymous and anonymous traffic at a given exit "
+"node, so be careful about what applications you run concurrently over Tor."
+msgstr ""
+
+#: https//support.torproject.org/about/attacks-on-onion-routing/
+#: (content/about/attacks-on-onion-routing/contents+en.lrquestion.description)
+msgid "Perhaps even run separate Tor clients for these applications."
+msgstr ""
+
#: https//support.torproject.org/about/backdoor/
#: (content/about/backdoor/contents+en.lrquestion.title)
msgid "Is there a backdoor in Tor?"
@@ -2561,6 +2676,43 @@ msgstr ""
"Menggunakan Tor dengan browser lain itu [dangerous and not "
"recommended](/tbb/tbb-9/)."
+#: https//support.torproject.org/about/change-paths/
+#: (content/about/change-paths/contents+en.lrquestion.title)
+msgid "How often does Tor change its paths?"
+msgstr ""
+
+#: https//support.torproject.org/about/change-paths/
+#: (content/about/change-paths/contents+en.lrquestion.description)
+msgid ""
+"Tor will reuse the same circuit for new TCP streams for 10 minutes, as long "
+"as the circuit is working fine."
+msgstr ""
+
+#: https//support.torproject.org/about/change-paths/
+#: (content/about/change-paths/contents+en.lrquestion.description)
+msgid "(If the circuit fails, Tor will switch to a new circuit immediately.)"
+msgstr ""
+
+#: https//support.torproject.org/about/change-paths/
+#: (content/about/change-paths/contents+en.lrquestion.description)
+msgid ""
+"But note that a single TCP stream (e.g. a long IRC connection) will stay on "
+"the same circuit forever."
+msgstr ""
+
+#: https//support.torproject.org/about/change-paths/
+#: (content/about/change-paths/contents+en.lrquestion.description)
+msgid "We don't rotate individual streams from one circuit to the next."
+msgstr ""
+
+#: https//support.torproject.org/about/change-paths/
+#: (content/about/change-paths/contents+en.lrquestion.description)
+msgid ""
+"Otherwise, an adversary with a partial view of the network would be given "
+"many chances over time to link you to your destination, rather than just one"
+" chance."
+msgstr ""
+
#: https//support.torproject.org/about/distribute-tor/
#: (content/about/distribute-tor/contents+en.lrquestion.title)
msgid "Can I distribute Tor?"
@@ -2664,6 +2816,133 @@ msgid ""
"details."
msgstr ""
+#: https//support.torproject.org/about/entry-guards/
+#: (content/about/entry-guards/contents+en.lrquestion.title)
+msgid "What are Entry Guards?"
+msgstr ""
+
+#: https//support.torproject.org/about/entry-guards/
+#: (content/about/entry-guards/contents+en.lrquestion.description)
+msgid ""
+"Tor (like all current practical low-latency anonymity designs) fails when "
+"the attacker can see both ends of the communications channel."
+msgstr ""
+
+#: https//support.torproject.org/about/entry-guards/
+#: (content/about/entry-guards/contents+en.lrquestion.description)
+msgid ""
+"For example, suppose the attacker controls or watches the Tor relay you "
+"choose to enter the network, and also controls or watches the website you "
+"visit."
+msgstr ""
+
+#: https//support.torproject.org/about/entry-guards/
+#: (content/about/entry-guards/contents+en.lrquestion.description)
+msgid ""
+"In this case, the research community knows no practical low-latency design "
+"that can reliably stop the attacker from correlating volume and timing "
+"information on the two sides."
+msgstr ""
+
+#: https//support.torproject.org/about/entry-guards/
+#: (content/about/entry-guards/contents+en.lrquestion.description)
+msgid "So, what should we do?"
+msgstr ""
+
+#: https//support.torproject.org/about/entry-guards/
+#: (content/about/entry-guards/contents+en.lrquestion.description)
+msgid "Suppose the attacker controls, or can observe, C relays."
+msgstr ""
+
+#: https//support.torproject.org/about/entry-guards/
+#: (content/about/entry-guards/contents+en.lrquestion.description)
+msgid "Suppose there are N relays total."
+msgstr ""
+
+#: https//support.torproject.org/about/entry-guards/
+#: (content/about/entry-guards/contents+en.lrquestion.description)
+msgid ""
+"If you select new entry and exit relays each time you use the network, the "
+"attacker will be able to correlate all traffic you send with probability "
+"around (c/n)2."
+msgstr ""
+
+#: https//support.torproject.org/about/entry-guards/
+#: (content/about/entry-guards/contents+en.lrquestion.description)
+msgid ""
+"But profiling is, for most users, as bad as being traced all the time: they "
+"want to do something often without an attacker noticing, and the attacker "
+"noticing once is as bad as the attacker noticing more often."
+msgstr ""
+
+#: https//support.torproject.org/about/entry-guards/
+#: (content/about/entry-guards/contents+en.lrquestion.description)
+msgid ""
+"Thus, choosing many random entries and exits gives the user no chance of "
+"escaping profiling by this kind of attacker."
+msgstr ""
+
+#: https//support.torproject.org/about/entry-guards/
+#: (content/about/entry-guards/contents+en.lrquestion.description)
+msgid ""
+"The solution is \"entry guards\": each Tor client selects a few relays at "
+"random to use as entry points, and uses only those relays for their first "
+"hop."
+msgstr ""
+
+#: https//support.torproject.org/about/entry-guards/
+#: (content/about/entry-guards/contents+en.lrquestion.description)
+msgid ""
+"If those relays are not controlled or observed, the attacker can't win, "
+"ever, and the user is secure."
+msgstr ""
+
+#: https//support.torproject.org/about/entry-guards/
+#: (content/about/entry-guards/contents+en.lrquestion.description)
+msgid ""
+"If those relays are observed or controlled by the attacker, the attacker "
+"sees a larger fraction of the user's traffic - but still the user is no more"
+" profiled than before."
+msgstr ""
+
+#: https//support.torproject.org/about/entry-guards/
+#: (content/about/entry-guards/contents+en.lrquestion.description)
+msgid ""
+"Thus, the user has some chance (on the order of (n-c)/n) of avoiding "
+"profiling, whereas they had none before."
+msgstr ""
+
+#: https//support.torproject.org/about/entry-guards/
+#: (content/about/entry-guards/contents+en.lrquestion.description)
+msgid ""
+"You can read more at [An Analysis of the Degradation of Anonymous "
+"Protocols](http://freehaven.net/anonbib/#wright02), [Defending Anonymous "
+"Communication Against Passive Logging "
+"Attacks](http://freehaven.net/anonbib/#wright03), and especially [Locating "
+"Hidden Servers](http://freehaven.net/anonbib/#hs-attack06)."
+msgstr ""
+
+#: https//support.torproject.org/about/entry-guards/
+#: (content/about/entry-guards/contents+en.lrquestion.description)
+msgid ""
+"Restricting your entry nodes may also help against attackers who want to run"
+" a few Tor nodes and easily enumerate all of the Tor user IP addresses."
+msgstr ""
+
+#: https//support.torproject.org/about/entry-guards/
+#: (content/about/entry-guards/contents+en.lrquestion.description)
+msgid ""
+"(Even though they can't learn what destinations the users are talking to, "
+"they still might be able to do bad things with just a list of users.)"
+msgstr ""
+
+#: https//support.torproject.org/about/entry-guards/
+#: (content/about/entry-guards/contents+en.lrquestion.description)
+msgid ""
+"However, that feature won't really become useful until we move to a "
+"\"directory guard\" design as well."
+msgstr ""
+
#: https//support.torproject.org/about/how-is-tor-different-from-other-proxies/
#: (content/about/how-is-tor-different-from-other-proxies/contents+en.lrquestion.title)
msgid "How is Tor different from other proxies?"
@@ -2834,6 +3113,162 @@ msgid ""
" Tor and HTTPS interact."
msgstr ""
+#: https//support.torproject.org/about/key-management/
+#: (content/about/key-management/contents+en.lrquestion.title)
+msgid "Tell me about all the keys Tor uses"
+msgstr ""
+
+#: https//support.torproject.org/about/key-management/
+#: (content/about/key-management/contents+en.lrquestion.description)
+msgid ""
+"Tor uses a variety of different keys, with three goals in mind: 1) "
+"encryption to ensure privacy of data within the Tor network, 2) "
+"authentication so clients know they're talking to the relays they meant to "
+"talk to, and 3) signatures to make sure all clients know the same set of "
+"relays."
+msgstr ""
+
+#: https//support.torproject.org/about/key-management/
+#: (content/about/key-management/contents+en.lrquestion.description)
+msgid ""
+"**Encryption**: first, all connections in Tor use TLS link encryption, so "
+"observers can't look inside to see which circuit a given cell is intended "
+"for."
+msgstr ""
+
+#: https//support.torproject.org/about/key-management/
+#: (content/about/key-management/contents+en.lrquestion.description)
+msgid ""
+"Further, the Tor client establishes an ephemeral encryption key with each "
+"relay in the circuit; these extra layers of encryption mean that only the "
+"exit relay can read the cells."
+msgstr ""
+
+#: https//support.torproject.org/about/key-management/
+#: (content/about/key-management/contents+en.lrquestion.description)
+msgid ""
+"Both sides discard the circuit key when the circuit ends, so logging traffic"
+" and then breaking into the relay to discover the key won't work."
+msgstr ""
+
+#: https//support.torproject.org/about/key-management/
+#: (content/about/key-management/contents+en.lrquestion.description)
+msgid ""
+"**Authentication**: Every Tor relay has a public decryption key called the "
+"\"onion key\"."
+msgstr ""
+
+#: https//support.torproject.org/about/key-management/
+#: (content/about/key-management/contents+en.lrquestion.description)
+msgid "Each relay rotates its onion key once a week."
+msgstr ""
+
+#: https//support.torproject.org/about/key-management/
+#: (content/about/key-management/contents+en.lrquestion.description)
+msgid ""
+"When the Tor client establishes circuits, at each step it [demands that the "
+"Tor relay prove knowledge of its onion key](https://svn-"
+"archive.torproject.org/svn/projects/design-paper/tor-"
+"design.html#subsec:circuits)."
+msgstr ""
+
+#: https//support.torproject.org/about/key-management/
+#: (content/about/key-management/contents+en.lrquestion.description)
+msgid ""
+"That way the first node in the path can't just spoof the rest of the path."
+msgstr ""
+
+#: https//support.torproject.org/about/key-management/
+#: (content/about/key-management/contents+en.lrquestion.description)
+msgid ""
+"Because the Tor client chooses the path, it can make sure to get Tor's "
+"\"distributed trust\" property: no single relay in the path can know about "
+"both the client and what the client is doing."
+msgstr ""
+
+#: https//support.torproject.org/about/key-management/
+#: (content/about/key-management/contents+en.lrquestion.description)
+msgid ""
+"**Coordination**: How do clients know what the relays are, and how do they "
+"know that they have the right keys for them?"
+msgstr ""
+
+#: https//support.torproject.org/about/key-management/
+#: (content/about/key-management/contents+en.lrquestion.description)
+msgid "Each relay has a long-term public signing key called the \"identity key\"."
+msgstr ""
+
+#: https//support.torproject.org/about/key-management/
+#: (content/about/key-management/contents+en.lrquestion.description)
+msgid "Each directory authority additionally has a \"directory signing key\"."
+msgstr ""
+
+#: https//support.torproject.org/about/key-management/
+#: (content/about/key-management/contents+en.lrquestion.description)
+msgid ""
+"The directory authorities [provide a signed "
+"list](https://gitweb.torproject.org/torspec.git/tree/dir-spec.txt) of all "
+"the known relays, and in that list are a set of certificates from each relay"
+" (self-signed by their identity key) specifying their keys, locations, exit "
+"policies, and so on."
+msgstr ""
+
+#: https//support.torproject.org/about/key-management/
+#: (content/about/key-management/contents+en.lrquestion.description)
+msgid ""
+"So unless the adversary can control a majority of the directory authorities "
+"(as of 2021 there are 10 directory authorities), they can't trick the Tor "
+"client into using other Tor relays."
+msgstr ""
+
+#: https//support.torproject.org/about/key-management/
+#: (content/about/key-management/contents+en.lrquestion.description)
+msgid "How do clients know what the directory authorities are?"
+msgstr ""
+
+#: https//support.torproject.org/about/key-management/
+#: (content/about/key-management/contents+en.lrquestion.description)
+msgid ""
+"The Tor software comes with a built-in list of location and public key for "
+"each directory authority."
+msgstr ""
+
+#: https//support.torproject.org/about/key-management/
+#: (content/about/key-management/contents+en.lrquestion.description)
+msgid ""
+"So the only way to trick users into using a fake Tor network is to give them"
+" a specially modified version of the software."
+msgstr ""
+
+#: https//support.torproject.org/about/key-management/
+#: (content/about/key-management/contents+en.lrquestion.description)
+msgid "How do users know they've got the right software?"
+msgstr ""
+
+#: https//support.torproject.org/about/key-management/
+#: (content/about/key-management/contents+en.lrquestion.description)
+msgid ""
+"When we distribute the source code or a package, we digitally sign it with "
+"[GNU Privacy Guard](http://www.gnupg.org/). See the [instructions on how to "
+"check Tor Browser's signature](https://support.torproject.org/tbb/how-to-"
+"verify-signature/)."
+msgstr ""
+
+#: https//support.torproject.org/about/key-management/
+#: (content/about/key-management/contents+en.lrquestion.description)
+msgid ""
+"In order to be certain that it's really signed by us, you need to have met "
+"us in person and gotten a copy of our GPG key fingerprint, or you need to "
+"know somebody who has."
+msgstr ""
+
+#: https//support.torproject.org/about/key-management/
+#: (content/about/key-management/contents+en.lrquestion.description)
+msgid ""
+"If you're concerned about an attack on this level, we recommend you get "
+"involved with the security community and start meeting people."
+msgstr ""
+
#: https//support.torproject.org/about/no-data-scrubbing/
#: (content/about/no-data-scrubbing/contents+en.lrquestion.title)
msgid ""
@@ -2866,6 +3301,151 @@ msgid ""
"though."
msgstr ""
+#: https//support.torproject.org/about/protections/
+#: (content/about/protections/contents+en.lrquestion.title)
+msgid "What protections does Tor provide?"
+msgstr ""
+
+#: https//support.torproject.org/about/protections/
+#: (content/about/protections/contents+en.lrquestion.description)
+msgid ""
+"Internet communication is based on a store-and-forward model that can be "
+"understood in analogy to postal mail: Data is transmitted in blocks called "
+"IP datagrams or packets."
+msgstr ""
+
+#: https//support.torproject.org/about/protections/
+#: (content/about/protections/contents+en.lrquestion.description)
+msgid ""
+"Every packet includes a source IP address (of the sender) and a destination "
+"IP address (of the receiver), just as ordinary letters contain postal "
+"addresses of sender and receiver."
+msgstr ""
+
+#: https//support.torproject.org/about/protections/
+#: (content/about/protections/contents+en.lrquestion.description)
+msgid ""
+"The way from sender to receiver involves multiple hops of routers, where "
+"each router inspects the destination IP address and forwards the packet "
+"closer to its destination."
+msgstr ""
+
+#: https//support.torproject.org/about/protections/
+#: (content/about/protections/contents+en.lrquestion.description)
+msgid ""
+"Thus, every router between sender and receiver learns that the sender is "
+"communicating with the receiver."
+msgstr ""
+
+#: https//support.torproject.org/about/protections/
+#: (content/about/protections/contents+en.lrquestion.description)
+msgid ""
+"In particular, your local ISP is in the position to build a complete profile"
+" of your Internet usage."
+msgstr ""
+
+#: https//support.torproject.org/about/protections/
+#: (content/about/protections/contents+en.lrquestion.description)
+msgid ""
+"In addition, every server in the Internet that can see any of the packets "
+"can profile your behavior."
+msgstr ""
+
+#: https//support.torproject.org/about/protections/
+#: (content/about/protections/contents+en.lrquestion.description)
+msgid ""
+"The aim of Tor is to improve your privacy by sending your traffic through a "
+"series of proxies."
+msgstr ""
+
+#: https//support.torproject.org/about/protections/
+#: (content/about/protections/contents+en.lrquestion.description)
+msgid ""
+"Your communication is encrypted in multiple layers and routed via multiple "
+"hops through the Tor network to the final receiver."
+msgstr ""
+
+#: https//support.torproject.org/about/protections/
+#: (content/about/protections/contents+en.lrquestion.description)
+msgid ""
+"More details on this process can be found in this "
+"[visualization](https://support.torproject.org/https/https-1/)."
+msgstr ""
+
+#: https//support.torproject.org/about/protections/
+#: (content/about/protections/contents+en.lrquestion.description)
+msgid ""
+"Note that all your local ISP can observe now is that you are communicating "
+"with Tor nodes."
+msgstr ""
+
+#: https//support.torproject.org/about/protections/
+#: (content/about/protections/contents+en.lrquestion.description)
+msgid ""
+"Similarly, servers in the Internet just see that they are being contacted by"
+" Tor nodes."
+msgstr ""
+
+#: https//support.torproject.org/about/protections/
+#: (content/about/protections/contents+en.lrquestion.description)
+msgid "Generally speaking, Tor aims to solve three privacy problems:"
+msgstr ""
+
+#: https//support.torproject.org/about/protections/
+#: (content/about/protections/contents+en.lrquestion.description)
+msgid ""
+"First, Tor prevents websites and other services from learning your location,"
+" which they can use to build databases about your habits and interests."
+msgstr ""
+
+#: https//support.torproject.org/about/protections/
+#: (content/about/protections/contents+en.lrquestion.description)
+msgid ""
+"With Tor, your Internet connections don't give you away by default -- now "
+"you can have the ability to choose, for each connection, how much "
+"information to reveal."
+msgstr ""
+
+#: https//support.torproject.org/about/protections/
+#: (content/about/protections/contents+en.lrquestion.description)
+msgid ""
+"Second, Tor prevents people watching your traffic locally (such as your ISP "
+"or someone with access to your home wifi or router) from learning what "
+"information you're fetching and where you're fetching it from."
+msgstr ""
+
+#: https//support.torproject.org/about/protections/
+#: (content/about/protections/contents+en.lrquestion.description)
+msgid ""
+"It also stops them from deciding what you're allowed to learn and publish --"
+" if you can get to any part of the Tor network, you can reach any site on "
+"the Internet."
+msgstr ""
+
+#: https//support.torproject.org/about/protections/
+#: (content/about/protections/contents+en.lrquestion.description)
+msgid ""
+"Third, Tor routes your connection through more than one Tor relay so no "
+"single relay can learn what you're up to."
+msgstr ""
+
+#: https//support.torproject.org/about/protections/
+#: (content/about/protections/contents+en.lrquestion.description)
+msgid ""
+"Because these relays are run by different individuals or organizations, "
+"distributing trust provides more security than the old [one hop "
+"proxy](https://support.torproject.org/about/#how-is-tor-different-from-"
+"other-proxies) approach."
+msgstr ""
+
+#: https//support.torproject.org/about/protections/
+#: (content/about/protections/contents+en.lrquestion.description)
+msgid ""
+"Note, however, that there are situations where Tor fails to solve these "
+"privacy problems entirely: see the entry below on [remaining "
+"attacks](https://support.torproject.org/about/#attacks-on-onion-routing)."
+msgstr ""
+
#: https//support.torproject.org/about/what-is-tor/
#: (content/about/what-is-tor/contents+en.lrquestion.title)
msgid "What is Tor?"
@@ -5218,9 +5798,11 @@ msgstr ""
#: (content/tbb/tbb-47/contents+en.lrquestion.description)
msgid ""
"Also, read up on the HTTPProxyAuthenticator and HTTPSProxyAuthenticator "
-"options if your proxy requires auth. We only support basic auth currently, "
-"but if you need NTLM authentication, you may find [this post in the "
-"archives](https://archives.seul.org/or/talk/Jun-2005/msg00223.html) useful."
+"options if your [proxy requires auth.](https://developer.mozilla.org/en-"
+"US/docs/Web/HTTP/Headers/Proxy-Authenticate) We only support basic auth "
+"currently, but if you need NTLM authentication, you may find [this post in "
+"the archives](https://archives.seul.org/or/talk/Jun-2005/msg00223.html) "
+"useful."
msgstr ""
#: https//support.torproject.org/tbb/tbb-47/
@@ -5449,6 +6031,219 @@ msgid ""
"have no effect on Tor's configuration."
msgstr ""
+#: https//support.torproject.org/tbb/tbb-firewall-ports/
+#: (content/tbb/tbb-firewall-ports/contents+en.lrquestion.title)
+msgid "My firewall only allows a few outgoing ports"
+msgstr ""
+
+#: https//support.torproject.org/tbb/tbb-firewall-ports/
+#: (content/tbb/tbb-firewall-ports/contents+en.lrquestion.description)
+msgid ""
+"If your firewall works by blocking ports, then you can tell Tor to only use "
+"the ports when you start your Tor Browser."
+msgstr ""
+
+#: https//support.torproject.org/tbb/tbb-firewall-ports/
+#: (content/tbb/tbb-firewall-ports/contents+en.lrquestion.description)
+msgid ""
+"Or you can add the ports that your firewall permits by adding "
+"\"FascistFirewall 1\" to your torrc configuration file."
+msgstr ""
+
+#: https//support.torproject.org/tbb/tbb-firewall-ports/
+#: (content/tbb/tbb-firewall-ports/contents+en.lrquestion.description)
+msgid ""
+"By default, when you set this Tor assumes that your firewall allows only "
+"port 80 and port 443 (HTTP and HTTPS respectively)."
+msgstr ""
+
+#: https//support.torproject.org/tbb/tbb-firewall-ports/
+#: (content/tbb/tbb-firewall-ports/contents+en.lrquestion.description)
+msgid ""
+"You can select a different set of ports with the FirewallPorts torrc option."
+msgstr ""
+
+#: https//support.torproject.org/tbb/tbb-firewall-ports/
+#: (content/tbb/tbb-firewall-ports/contents+en.lrquestion.description)
+msgid ""
+"If you want to be more fine-grained with your controls, you can also use the"
+" ReachableAddresses config options, e.g.:"
+msgstr ""
+
+#: https//support.torproject.org/tbb/tbb-firewall-ports/
+#: (content/tbb/tbb-firewall-ports/contents+en.lrquestion.description)
+#: https//support.torproject.org/tbb/tbb-install-tor-central-server/
+#: (content/tbb/tbb-install-tor-central-server/contents+en.lrquestion.description)
+#: https//support.torproject.org/operators/default-exit-ports/
+#: (content/operators/default-exit-ports/contents+en.lrquestion.description)
+#: https//support.torproject.org/operators/hibernation/
+#: (content/operators/hibernation/contents+en.lrquestion.description)
+#: https//support.torproject.org/operators/limit-total-bandwidth/
+#: (content/operators/limit-total-bandwidth/contents+en.lrquestion.description)
+#: https//support.torproject.org/misc/bug-or-feedback/
+#: (content/misc/bug-or-feedback/contents+en.lrquestion.description)
+#: https//support.torproject.org/get-in-touch/why-i-cant-join-tor-channels/
+#: (content/get-in-touch/why-i-cant-join-tor-channels/contents+en.lrquestion.description)
+#: https//support.torproject.org/apt/tor-deb-repo/
+#: (content/apt/apt-1/contents+en.lrquestion.description)
+#: https//support.torproject.org/apt/apt-over-tor/
+#: (content/apt/apt-3/contents+en.lrquestion.description)
+msgid "```"
+msgstr "```"
+
+#: https//support.torproject.org/tbb/tbb-firewall-ports/
+#: (content/tbb/tbb-firewall-ports/contents+en.lrquestion.description)
+msgid "ReachableDirAddresses *:80"
+msgstr ""
+
+#: https//support.torproject.org/tbb/tbb-firewall-ports/
+#: (content/tbb/tbb-firewall-ports/contents+en.lrquestion.description)
+msgid "ReachableORAddresses *:443"
+msgstr ""
+
+#: https//support.torproject.org/tbb/tbb-install-tor-central-server/
+#: (content/tbb/tbb-install-tor-central-server/contents+en.lrquestion.title)
+msgid ""
+"Can I install Tor on a central server, and have my clients connect to it?"
+msgstr ""
+
+#: https//support.torproject.org/tbb/tbb-install-tor-central-server/
+#: (content/tbb/tbb-install-tor-central-server/contents+en.lrquestion.description)
+msgid ""
+"Yes. Tor can be configured as a client or a relay on another machine, and "
+"allow other machines to be able to connect to it for anonymity."
+msgstr ""
+
+#: https//support.torproject.org/tbb/tbb-install-tor-central-server/
+#: (content/tbb/tbb-install-tor-central-server/contents+en.lrquestion.description)
+msgid ""
+"This is most useful in an environment where many computers want a gateway of"
+" anonymity to the rest of the world."
+msgstr ""
+
+#: https//support.torproject.org/tbb/tbb-install-tor-central-server/
+#: (content/tbb/tbb-install-tor-central-server/contents+en.lrquestion.description)
+msgid ""
+"However, be forewarned that with this configuration, anyone within your "
+"private network (existing between you and the Tor client/relay) can see what"
+" traffic you are sending in clear text."
+msgstr ""
+
+#: https//support.torproject.org/tbb/tbb-install-tor-central-server/
+#: (content/tbb/tbb-install-tor-central-server/contents+en.lrquestion.description)
+msgid "The anonymity doesn't start until you get to the Tor relay."
+msgstr ""
+
+#: https//support.torproject.org/tbb/tbb-install-tor-central-server/
+#: (content/tbb/tbb-install-tor-central-server/contents+en.lrquestion.description)
+msgid ""
+"Because of this, if you are the controller of your domain and you know "
+"everything's locked down, you will be OK, but this configuration may not be "
+"suitable for large private networks where security is key all around."
+msgstr ""
+
+#: https//support.torproject.org/tbb/tbb-install-tor-central-server/
+#: (content/tbb/tbb-install-tor-central-server/contents+en.lrquestion.description)
+msgid ""
+"Configuration is simple, editing your torrc file's SocksListenAddress "
+"according to the following examples:"
+msgstr ""
+
+#: https//support.torproject.org/tbb/tbb-install-tor-central-server/
+#: (content/tbb/tbb-install-tor-central-server/contents+en.lrquestion.description)
+msgid "SocksListenAddress 127.0.0.1"
+msgstr ""
+
+#: https//support.torproject.org/tbb/tbb-install-tor-central-server/
+#: (content/tbb/tbb-install-tor-central-server/contents+en.lrquestion.description)
+msgid "SocksListenAddress 192.168.x.x:9100"
+msgstr ""
+
+#: https//support.torproject.org/tbb/tbb-install-tor-central-server/
+#: (content/tbb/tbb-install-tor-central-server/contents+en.lrquestion.description)
+msgid "SocksListenAddress 0.0.0.0:9100"
+msgstr ""
+
+#: https//support.torproject.org/tbb/tbb-install-tor-central-server/
+#: (content/tbb/tbb-install-tor-central-server/contents+en.lrquestion.description)
+msgid ""
+"You can state multiple listen addresses, in the case that you are part of "
+"several networks or subnets."
+msgstr ""
+
+#: https//support.torproject.org/tbb/tbb-install-tor-central-server/
+#: (content/tbb/tbb-install-tor-central-server/contents+en.lrquestion.description)
+msgid "SocksListenAddress 192.168.x.x:9100 #eth0"
+msgstr ""
+
+#: https//support.torproject.org/tbb/tbb-install-tor-central-server/
+#: (content/tbb/tbb-install-tor-central-server/contents+en.lrquestion.description)
+msgid "SocksListenAddress 10.x.x.x:9100 #eth1"
+msgstr ""
+
+#: https//support.torproject.org/tbb/tbb-install-tor-central-server/
+#: (content/tbb/tbb-install-tor-central-server/contents+en.lrquestion.description)
+msgid ""
+"After this, your clients on their respective networks/subnets would specify "
+"a socks proxy with the address and port you specified SocksListenAddress to "
+"be."
+msgstr ""
+
+#: https//support.torproject.org/tbb/tbb-install-tor-central-server/
+#: (content/tbb/tbb-install-tor-central-server/contents+en.lrquestion.description)
+msgid ""
+"Please note that the SocksPort configuration option gives the port ONLY for "
+"localhost (127.0.0.1)."
+msgstr ""
+
+#: https//support.torproject.org/tbb/tbb-install-tor-central-server/
+#: (content/tbb/tbb-install-tor-central-server/contents+en.lrquestion.description)
+msgid ""
+"When setting up your SocksListenAddress(es), you need to give the port with "
+"the address, as shown above."
+msgstr ""
+
+#: https//support.torproject.org/tbb/tbb-install-tor-central-server/
+#: (content/tbb/tbb-install-tor-central-server/contents+en.lrquestion.description)
+msgid ""
+"If you are interested in forcing all outgoing data through the central Tor "
+"client/relay, instead of the server only being an optional proxy, you may "
+"find the program iptables (for *nix) useful."
+msgstr ""
+
+#: https//support.torproject.org/tbb/tbb-run-client-different-computer/
+#: (content/tbb/tbb-run-client-different-computer/contents+en.lrquestion.title)
+msgid ""
+"I want to run my Tor client on a different computer than my applications"
+msgstr ""
+
+#: https//support.torproject.org/tbb/tbb-run-client-different-computer/
+#: (content/tbb/tbb-run-client-different-computer/contents+en.lrquestion.description)
+msgid ""
+"By default, your Tor client only listens for applications that connect from "
+"localhost."
+msgstr ""
+
+#: https//support.torproject.org/tbb/tbb-run-client-different-computer/
+#: (content/tbb/tbb-run-client-different-computer/contents+en.lrquestion.description)
+msgid "Connections from other computers are refused."
+msgstr ""
+
+#: https//support.torproject.org/tbb/tbb-run-client-different-computer/
+#: (content/tbb/tbb-run-client-different-computer/contents+en.lrquestion.description)
+msgid ""
+"If you want to torify applications on different computers than the Tor "
+"client, you should edit your torrc to define `SocksListenAddress 0.0.0.0` "
+"and then restart (or hup) Tor."
+msgstr ""
+
+#: https//support.torproject.org/tbb/tbb-run-client-different-computer/
+#: (content/tbb/tbb-run-client-different-computer/contents+en.lrquestion.description)
+msgid ""
+"If you want to get more advanced, you can configure your Tor client on a "
+"firewall to bind to your internal IP but not your external IP."
+msgstr ""
+
#: https//support.torproject.org/tbb/website-blocking-tor/
#: (content/tbb/website-blocking-tor/contents+en.lrquestion.title)
msgid "A website I am trying to reach is blocking access over Tor."
@@ -7029,6 +7824,130 @@ msgid ""
"guide."
msgstr ""
+#: https//support.torproject.org/operators/default-exit-ports/
+#: (content/operators/default-exit-ports/contents+en.lrquestion.title)
+msgid "Is there a list of default exit ports?"
+msgstr ""
+
+#: https//support.torproject.org/operators/default-exit-ports/
+#: (content/operators/default-exit-ports/contents+en.lrquestion.description)
+msgid ""
+"The default open ports are listed below but keep in mind that, any port or "
+"ports can be opened by the relay operator by configuring it in torrc or "
+"modifying the source code."
+msgstr ""
+
+#: https//support.torproject.org/operators/default-exit-ports/
+#: (content/operators/default-exit-ports/contents+en.lrquestion.description)
+msgid ""
+"The default according to src/or/policies.c ([line 85][1] and [line 1901][2])"
+" from the source code release [release-0.4.6][3]:"
+msgstr ""
+
+#: https//support.torproject.org/operators/default-exit-ports/
+#: (content/operators/default-exit-ports/contents+en.lrquestion.description)
+msgid "reject 0.0.0.0/8"
+msgstr ""
+
+#: https//support.torproject.org/operators/default-exit-ports/
+#: (content/operators/default-exit-ports/contents+en.lrquestion.description)
+msgid "reject 169.254.0.0/16"
+msgstr ""
+
+#: https//support.torproject.org/operators/default-exit-ports/
+#: (content/operators/default-exit-ports/contents+en.lrquestion.description)
+msgid "reject 127.0.0.0/8"
+msgstr ""
+
+#: https//support.torproject.org/operators/default-exit-ports/
+#: (content/operators/default-exit-ports/contents+en.lrquestion.description)
+msgid "reject 192.168.0.0/16"
+msgstr ""
+
+#: https//support.torproject.org/operators/default-exit-ports/
+#: (content/operators/default-exit-ports/contents+en.lrquestion.description)
+msgid "reject 10.0.0.0/8"
+msgstr ""
+
+#: https//support.torproject.org/operators/default-exit-ports/
+#: (content/operators/default-exit-ports/contents+en.lrquestion.description)
+msgid "reject 172.16.0.0/12"
+msgstr ""
+
+#: https//support.torproject.org/operators/default-exit-ports/
+#: (content/operators/default-exit-ports/contents+en.lrquestion.description)
+msgid "reject *:25"
+msgstr ""
+
+#: https//support.torproject.org/operators/default-exit-ports/
+#: (content/operators/default-exit-ports/contents+en.lrquestion.description)
+msgid "reject *:119"
+msgstr ""
+
+#: https//support.torproject.org/operators/default-exit-ports/
+#: (content/operators/default-exit-ports/contents+en.lrquestion.description)
+msgid "reject *:135-139"
+msgstr ""
+
+#: https//support.torproject.org/operators/default-exit-ports/
+#: (content/operators/default-exit-ports/contents+en.lrquestion.description)
+msgid "reject *:445"
+msgstr ""
+
+#: https//support.torproject.org/operators/default-exit-ports/
+#: (content/operators/default-exit-ports/contents+en.lrquestion.description)
+msgid "reject *:563"
+msgstr ""
+
+#: https//support.torproject.org/operators/default-exit-ports/
+#: (content/operators/default-exit-ports/contents+en.lrquestion.description)
+msgid "reject *:1214"
+msgstr ""
+
+#: https//support.torproject.org/operators/default-exit-ports/
+#: (content/operators/default-exit-ports/contents+en.lrquestion.description)
+msgid "reject *:4661-4666"
+msgstr ""
+
+#: https//support.torproject.org/operators/default-exit-ports/
+#: (content/operators/default-exit-ports/contents+en.lrquestion.description)
+msgid "reject *:6346-6429"
+msgstr ""
+
+#: https//support.torproject.org/operators/default-exit-ports/
+#: (content/operators/default-exit-ports/contents+en.lrquestion.description)
+msgid "reject *:6699"
+msgstr ""
+
+#: https//support.torproject.org/operators/default-exit-ports/
+#: (content/operators/default-exit-ports/contents+en.lrquestion.description)
+msgid "reject *:6881-6999"
+msgstr ""
+
+#: https//support.torproject.org/operators/default-exit-ports/
+#: (content/operators/default-exit-ports/contents+en.lrquestion.description)
+msgid "accept *:*"
+msgstr ""
+
+#: https//support.torproject.org/operators/default-exit-ports/
+#: (content/operators/default-exit-ports/contents+en.lrquestion.description)
+msgid ""
+"[1]: "
+"https://gitlab.torproject.org/tpo/core/tor/-/blob/release-0.4.6/src/core/or/policies.c#L85"
+msgstr ""
+
+#: https//support.torproject.org/operators/default-exit-ports/
+#: (content/operators/default-exit-ports/contents+en.lrquestion.description)
+msgid ""
+"[2]: "
+"https://gitlab.torproject.org/tpo/core/tor/-/blob/release-0.4.6/src/core/or/policies.c#L1901"
+msgstr ""
+
+#: https//support.torproject.org/operators/default-exit-ports/
+#: (content/operators/default-exit-ports/contents+en.lrquestion.description)
+msgid "[3]: https://gitlab.torproject.org/tpo/core/tor/-/tree/release-0.4.6/"
+msgstr ""
+
#: https//support.torproject.org/operators/dynamic-ip/
#: (content/operators/dynamic-ip/contents+en.lrquestion.title)
msgid "Can I run a Tor relay using a dynamic IP address?"
@@ -7178,21 +8097,6 @@ msgid ""
"into hibernation, signaled by this entry in the log:"
msgstr ""
-#: https//support.torproject.org/operators/hibernation/
-#: (content/operators/hibernation/contents+en.lrquestion.description)
-#: https//support.torproject.org/operators/limit-total-bandwidth/
-#: (content/operators/limit-total-bandwidth/contents+en.lrquestion.description)
-#: https//support.torproject.org/misc/bug-or-feedback/
-#: (content/misc/bug-or-feedback/contents+en.lrquestion.description)
-#: https//support.torproject.org/get-in-touch/why-i-cant-join-tor-channels/
-#: (content/get-in-touch/why-i-cant-join-tor-channels/contents+en.lrquestion.description)
-#: https//support.torproject.org/apt/tor-deb-repo/
-#: (content/apt/apt-1/contents+en.lrquestion.description)
-#: https//support.torproject.org/apt/apt-over-tor/
-#: (content/apt/apt-3/contents+en.lrquestion.description)
-msgid "```"
-msgstr "```"
-
#: https//support.torproject.org/operators/hibernation/
#: (content/operators/hibernation/contents+en.lrquestion.description)
msgid "Bandwidth soft limit reached; commencing hibernation."
@@ -9469,6 +10373,131 @@ msgstr ""
msgid "sub 4096R/C00942E4 2017-03-13"
msgstr "sub 4096R/C00942E4 2017-03-13"
+#: https//support.torproject.org/misc/check-socks-dns-leaks/
+#: (content/misc/check-socks-dns-leaks/contents+en.lrquestion.title)
+msgid ""
+"How do I check if my application that uses SOCKS is leaking DNS requests?"
+msgstr ""
+
+#: https//support.torproject.org/misc/check-socks-dns-leaks/
+#: (content/misc/check-socks-dns-leaks/contents+en.lrquestion.description)
+msgid ""
+"Even if your application is using the correct variant of the SOCKS protocol,"
+" there is still a risk that it could be leaking DNS queries."
+msgstr ""
+
+#: https//support.torproject.org/misc/check-socks-dns-leaks/
+#: (content/misc/check-socks-dns-leaks/contents+en.lrquestion.description)
+msgid ""
+"This problem happens in Firefox extensions that resolve the destination "
+"hostname themselves, for example to show you its IP address, what country "
+"it's in, etc."
+msgstr ""
+
+#: https//support.torproject.org/misc/check-socks-dns-leaks/
+#: (content/misc/check-socks-dns-leaks/contents+en.lrquestion.description)
+msgid ""
+"If you suspect your application might behave like this, follow the "
+"instructions below to check."
+msgstr ""
+
+#: https//support.torproject.org/misc/check-socks-dns-leaks/
+#: (content/misc/check-socks-dns-leaks/contents+en.lrquestion.description)
+msgid ""
+"1. Add `TestSocks 1` to your [torrc file](https://support.torproject.org/tbb"
+"/tbb-editing-torrc/)."
+msgstr ""
+
+#: https//support.torproject.org/misc/check-socks-dns-leaks/
+#: (content/misc/check-socks-dns-leaks/contents+en.lrquestion.description)
+msgid ""
+"1. Start Tor, and point your program's SOCKS proxy settings to Tor's SOCKS5 "
+"server (`socks5://127.0.0.1:9050` by default)."
+msgstr ""
+
+#: https//support.torproject.org/misc/check-socks-dns-leaks/
+#: (content/misc/check-socks-dns-leaks/contents+en.lrquestion.description)
+msgid ""
+"1. Watch your logs as you use your application. For each socks connection, "
+"Tor will log a `notice` for safe connections, and a `warn` for connections "
+"leaking DNS requests."
+msgstr ""
+
+#: https//support.torproject.org/misc/check-socks-dns-leaks/
+#: (content/misc/check-socks-dns-leaks/contents+en.lrquestion.description)
+msgid ""
+"If you want to automatically disable all connections leaking DNS requests, "
+"set `SafeSocks 1` in your torrc file."
+msgstr ""
+
+#: https//support.torproject.org/misc/hide-exits/
+#: (content/misc/hide-exits/contents+en.lrquestion.title)
+msgid ""
+"You should hide the list of Tor relays, so people can't block the exits."
+msgstr ""
+
+#: https//support.torproject.org/misc/hide-exits/
+#: (content/misc/hide-exits/contents+en.lrquestion.description)
+msgid "There are a few reasons we don't:"
+msgstr ""
+
+#: https//support.torproject.org/misc/hide-exits/
+#: (content/misc/hide-exits/contents+en.lrquestion.description)
+msgid ""
+"1. We can't help but make the information available, since Tor clients need "
+"to use it to pick their paths."
+msgstr ""
+
+#: https//support.torproject.org/misc/hide-exits/
+#: (content/misc/hide-exits/contents+en.lrquestion.description)
+msgid "So if the \"blockers\" want it, they can get it anyway."
+msgstr ""
+
+#: https//support.torproject.org/misc/hide-exits/
+#: (content/misc/hide-exits/contents+en.lrquestion.description)
+msgid ""
+"Further, even if we didn't tell clients about the list of relays directly, "
+"somebody could still make a lot of connections through Tor to a test site "
+"and build a list of the addresses they see."
+msgstr ""
+
+#: https//support.torproject.org/misc/hide-exits/
+#: (content/misc/hide-exits/contents+en.lrquestion.description)
+msgid ""
+"1. If people want to block us, we believe that they should be allowed to do "
+"so."
+msgstr ""
+
+#: https//support.torproject.org/misc/hide-exits/
+#: (content/misc/hide-exits/contents+en.lrquestion.description)
+msgid ""
+"Obviously, we would prefer for everybody to allow Tor users to connect to "
+"them, but people have the right to decide who their services should allow "
+"connections from, and if they want to block anonymous users, they can."
+msgstr ""
+
+#: https//support.torproject.org/misc/hide-exits/
+#: (content/misc/hide-exits/contents+en.lrquestion.description)
+msgid ""
+"1. Being blockable also has tactical advantages: it may be a persuasive "
+"response to website maintainers who feel threatened by Tor."
+msgstr ""
+
+#: https//support.torproject.org/misc/hide-exits/
+#: (content/misc/hide-exits/contents+en.lrquestion.description)
+msgid ""
+"Giving them the option may inspire them to stop and think about whether they"
+" really want to eliminate private access to their system, and if not, what "
+"other options they might have."
+msgstr ""
+
+#: https//support.torproject.org/misc/hide-exits/
+#: (content/misc/hide-exits/contents+en.lrquestion.description)
+msgid ""
+"The time they might otherwise have spent blocking Tor, they may instead "
+"spend rethinking their overall approach to privacy and anonymity."
+msgstr ""
+
#: https//support.torproject.org/misc/menu/
#: (content/misc/menu/contents+en.lrquestion.description)
msgid "About"
@@ -10105,56 +11134,20 @@ msgstr ""
#: https//support.torproject.org/get-in-touch/why-i-cant-join-tor-channels/
#: (content/get-in-touch/why-i-cant-join-tor-channels/contents+en.lrquestion.description)
msgid ""
-"Then, to complete the registration and ultimately gain access to the #tor-"
-"project channel, your nickname must be **verified**."
+"After registering your nickname, to gain access to the #tor-project and "
+"other protected channels, your nickname must be **verified**."
msgstr ""
#: https//support.torproject.org/get-in-touch/why-i-cant-join-tor-channels/
#: (content/get-in-touch/why-i-cant-join-tor-channels/contents+en.lrquestion.description)
msgid ""
-"1. To verify your nick, open a new browser window and go to "
-"https://webchat.oftc.net/?channels=tor."
+"1. Go to https://services.oftc.net/ and follow the steps in the '*To verify "
+"your account*' section"
msgstr ""
#: https//support.torproject.org/get-in-touch/why-i-cant-join-tor-channels/
#: (content/get-in-touch/why-i-cant-join-tor-channels/contents+en.lrquestion.description)
-msgid "2. Log in with your IRC nickname and password."
-msgstr ""
-
-#: https//support.torproject.org/get-in-touch/why-i-cant-join-tor-channels/
-#: (content/get-in-touch/why-i-cant-join-tor-channels/contents+en.lrquestion.description)
-msgid ""
-"3. Look for the word **verify** and log in there. It may appear that nothing"
-" has happened. Look at the top of the page, and there will be a column "
-"called **Account**."
-msgstr ""
-
-#: https//support.torproject.org/get-in-touch/why-i-cant-join-tor-channels/
-#: (content/get-in-touch/why-i-cant-join-tor-channels/contents+en.lrquestion.description)
-msgid "4. Click on **Account**."
-msgstr ""
-
-#: https//support.torproject.org/get-in-touch/why-i-cant-join-tor-channels/
-#: (content/get-in-touch/why-i-cant-join-tor-channels/contents+en.lrquestion.description)
-msgid ""
-"5. Click on the small sentence at the bottom of the square that says: Verify"
-" account."
-msgstr ""
-
-#: https//support.torproject.org/get-in-touch/why-i-cant-join-tor-channels/
-#: (content/get-in-touch/why-i-cant-join-tor-channels/contents+en.lrquestion.description)
-msgid "6. Fill out the Captcha that pops up, and click ok."
-msgstr ""
-
-#: https//support.torproject.org/get-in-touch/why-i-cant-join-tor-channels/
-#: (content/get-in-touch/why-i-cant-join-tor-channels/contents+en.lrquestion.description)
-msgid ""
-"7. A tiny message will appear: \"Your NickServ account has been verified.\""
-msgstr ""
-
-#: https//support.torproject.org/get-in-touch/why-i-cant-join-tor-channels/
-#: (content/get-in-touch/why-i-cant-join-tor-channels/contents+en.lrquestion.description)
-msgid "8. Go back to the IRC webpage where you are logged in and type:"
+msgid "2. Go back to the IRC webpage where you are logged in and type:"
msgstr ""
#: https//support.torproject.org/get-in-touch/why-i-cant-join-tor-channels/
@@ -10164,12 +11157,12 @@ msgstr ""
#: https//support.torproject.org/get-in-touch/why-i-cant-join-tor-channels/
#: (content/get-in-touch/why-i-cant-join-tor-channels/contents+en.lrquestion.description)
-msgid "9. Click ENTER."
+msgid "3. Click ENTER."
msgstr ""
#: https//support.torproject.org/get-in-touch/why-i-cant-join-tor-channels/
#: (content/get-in-touch/why-i-cant-join-tor-channels/contents+en.lrquestion.description)
-msgid "10. If all is well, you will receive a message that says:"
+msgid "4. If all is well, you will receive a message that says:"
msgstr ""
#: https//support.torproject.org/get-in-touch/why-i-cant-join-tor-channels/
@@ -10314,21 +11307,23 @@ msgstr "# apt install apt-transport-https"
#: https//support.torproject.org/apt/tor-deb-repo/
#: (content/apt/apt-1/contents+en.lrquestion.description)
msgid ""
-"#### 2. Add the following entries to `/etc/apt/sources.list` or a new file "
-"in `/etc/apt/sources.list.d/`"
+"#### 2. Create a new file in `/etc/apt/sources.list.d/` named `tor.list`. "
+"Add the following entries:"
msgstr ""
-"#### 2. Tambahkan entri berikut ke `/etc/apt/sources.list` atau sebuah file "
-"baru di `/etc/apt/sources.list.d/`"
#: https//support.torproject.org/apt/tor-deb-repo/
#: (content/apt/apt-1/contents+en.lrquestion.description)
-msgid "deb https://deb.torproject.org/torproject.org <DISTRIBUTION> main"
+msgid ""
+"deb [signed-by=/usr/share/keyrings/tor-archive-keyring.gpg] "
+"https://deb.torproject.org/torproject.org <DISTRIBUTION> main"
msgstr ""
#: https//support.torproject.org/apt/tor-deb-repo/
#: (content/apt/apt-1/contents+en.lrquestion.description)
-msgid "deb-src https://deb.torproject.org/torproject.org <DISTRIBUTION> main"
-msgstr "deb-src https://deb.torproject.org/torproject.org <DISTRIBUTION> main"
+msgid ""
+"deb-src [signed-by=/usr/share/keyrings/tor-archive-keyring.gpg] "
+"https://deb.torproject.org/torproject.org <DISTRIBUTION> main"
+msgstr ""
#: https//support.torproject.org/apt/tor-deb-repo/
#: (content/apt/apt-1/contents+en.lrquestion.description)
@@ -10341,14 +11336,16 @@ msgstr ""
#: https//support.torproject.org/apt/tor-deb-repo/
#: (content/apt/apt-1/contents+en.lrquestion.description)
msgid ""
-"deb https://deb.torproject.org/torproject.org tor-"
+"deb [signed-by=/usr/share/keyrings/tor-archive-keyring.gpg] "
+"https://deb.torproject.org/torproject.org tor-"
"experimental-0.4.6.x-<DISTRIBUTION> main"
msgstr ""
#: https//support.torproject.org/apt/tor-deb-repo/
#: (content/apt/apt-1/contents+en.lrquestion.description)
msgid ""
-"deb-src https://deb.torproject.org/torproject.org tor-"
+"deb-src [signed-by=/usr/share/keyrings/tor-archive-keyring.gpg] "
+"https://deb.torproject.org/torproject.org tor-"
"experimental-0.4.6.x-<DISTRIBUTION> main"
msgstr ""
@@ -10360,18 +11357,18 @@ msgstr ""
#: https//support.torproject.org/apt/tor-deb-repo/
#: (content/apt/apt-1/contents+en.lrquestion.description)
msgid ""
-"deb https://deb.torproject.org/torproject.org tor-nightly-"
-"master-<DISTRIBUTION> main"
+"deb [signed-by=/usr/share/keyrings/tor-archive-keyring.gpg] "
+"https://deb.torproject.org/torproject.org tor-nightly-master-<DISTRIBUTION> "
+"main"
msgstr ""
#: https//support.torproject.org/apt/tor-deb-repo/
#: (content/apt/apt-1/contents+en.lrquestion.description)
msgid ""
-"deb-src https://deb.torproject.org/torproject.org tor-nightly-"
-"master-<DISTRIBUTION> main"
+"deb-src [signed-by=/usr/share/keyrings/tor-archive-keyring.gpg] "
+"https://deb.torproject.org/torproject.org tor-nightly-master-<DISTRIBUTION> "
+"main"
msgstr ""
-"deb-src https://deb.torproject.org/torproject.org tor-nightly-"
-"master-<DISTRIBUTION> main"
#: https//support.torproject.org/apt/tor-deb-repo/
#: (content/apt/apt-1/contents+en.lrquestion.description)
@@ -10391,13 +11388,15 @@ msgstr ""
#: https//support.torproject.org/apt/tor-deb-repo/
#: (content/apt/apt-1/contents+en.lrquestion.description)
msgid ""
-"deb [arch=amd64] https://deb.torproject.org/torproject.org focal main"
+"deb [arch=amd64 signed-by=/usr/share/keyrings/tor-archive-keyring.gpg] "
+"https://deb.torproject.org/torproject.org focal main"
msgstr ""
#: https//support.torproject.org/apt/tor-deb-repo/
#: (content/apt/apt-1/contents+en.lrquestion.description)
msgid ""
-"deb-src [arch=amd64] https://deb.torproject.org/torproject.org focal main"
+"deb-src [arch=amd64 signed-by=/usr/share/keyrings/tor-archive-keyring.gpg] "
+"https://deb.torproject.org/torproject.org focal main"
msgstr ""
#: https//support.torproject.org/apt/tor-deb-repo/
@@ -10417,26 +11416,17 @@ msgstr ""
#: (content/apt/apt-1/contents+en.lrquestion.description)
msgid ""
"#### 3. Then add the gpg key used to sign the packages by running the "
-"following commands at your command prompt"
+"following command at your command prompt:"
msgstr ""
#: https//support.torproject.org/apt/tor-deb-repo/
#: (content/apt/apt-1/contents+en.lrquestion.description)
msgid ""
-"# wget -qO- "
+"# wget -O- "
"https://deb.torproject.org/torproject.org/A3C4F0F979CAA22CDBA8F512EE8CBC9E886DDD89.asc"
-" | gpg --import"
+" | gpg --dearmor | tee /usr/share/keyrings/tor-archive-keyring.gpg "
+">/dev/null"
msgstr ""
-"# wget -qO- "
-"https://deb.torproject.org/torproject.org/A3C4F0F979CAA22CDBA8F512EE8CBC9E886DDD89.asc"
-" | gpg --import"
-
-#: https//support.torproject.org/apt/tor-deb-repo/
-#: (content/apt/apt-1/contents+en.lrquestion.description)
-msgid ""
-"# gpg --export A3C4F0F979CAA22CDBA8F512EE8CBC9E886DDD89 | apt-key add -"
-msgstr ""
-"# gpg --export A3C4F0F979CAA22CDBA8F512EE8CBC9E886DDD89 | apt-key add -"
#: https//support.torproject.org/apt/tor-deb-repo/
#: (content/apt/apt-1/contents+en.lrquestion.description)
@@ -12044,6 +13034,82 @@ msgid ""
"doesn't change IP address over the day."
msgstr ""
+#: https//support.torproject.org/alternate-designs/block-websites/
+#: (content/alternate-designs/block-websites/contents+en.lrquestion.title)
+msgid "Exit policies should be able to block websites, not just IP addresses."
+msgstr ""
+
+#: https//support.torproject.org/alternate-designs/block-websites/
+#: (content/alternate-designs/block-websites/contents+en.lrquestion.description)
+msgid ""
+"It would be nice to let relay operators say things like `reject "
+"www.slashdot.org` in their exit policies, rather than requiring them to "
+"learn all the IP address space that could be covered by the site (and then "
+"also blocking other sites at those IP addresses)."
+msgstr ""
+
+#: https//support.torproject.org/alternate-designs/block-websites/
+#: (content/alternate-designs/block-websites/contents+en.lrquestion.description)
+msgid "There are two problems, though."
+msgstr ""
+
+#: https//support.torproject.org/alternate-designs/block-websites/
+#: (content/alternate-designs/block-websites/contents+en.lrquestion.description)
+msgid "First, users could still get around these blocks."
+msgstr ""
+
+#: https//support.torproject.org/alternate-designs/block-websites/
+#: (content/alternate-designs/block-websites/contents+en.lrquestion.description)
+msgid ""
+"For example, they could request the IP address rather than the hostname when"
+" they exit from the Tor network."
+msgstr ""
+
+#: https//support.torproject.org/alternate-designs/block-websites/
+#: (content/alternate-designs/block-websites/contents+en.lrquestion.description)
+msgid ""
+"This means operators would still need to learn all the IP addresses for the "
+"destinations in question."
+msgstr ""
+
+#: https//support.torproject.org/alternate-designs/block-websites/
+#: (content/alternate-designs/block-websites/contents+en.lrquestion.description)
+msgid ""
+"The second problem is that it would allow remote attackers to censor "
+"arbitrary sites."
+msgstr ""
+
+#: https//support.torproject.org/alternate-designs/block-websites/
+#: (content/alternate-designs/block-websites/contents+en.lrquestion.description)
+msgid ""
+"For example, if a Tor operator blocks www1.slashdot.org, and then some "
+"attacker poisons the Tor relay's DNS or otherwise changes that hostname to "
+"resolve to the IP address for a major news site, then suddenly that Tor "
+"relay is blocking the news site."
+msgstr ""
+
+#: https//support.torproject.org/alternate-designs/let-the-network-pick-the-path/
+#: (content/alternate-designs/let-the-network-pick-the-path/contents+en.lrquestion.title)
+msgid "You should let the network pick the path, not the client."
+msgstr ""
+
+#: https//support.torproject.org/alternate-designs/let-the-network-pick-the-path/
+#: (content/alternate-designs/let-the-network-pick-the-path/contents+en.lrquestion.description)
+msgid "No, you cannot trust the network to pick the path."
+msgstr ""
+
+#: https//support.torproject.org/alternate-designs/let-the-network-pick-the-path/
+#: (content/alternate-designs/let-the-network-pick-the-path/contents+en.lrquestion.description)
+msgid "Malicious relays could route you through their colluding friends."
+msgstr ""
+
+#: https//support.torproject.org/alternate-designs/let-the-network-pick-the-path/
+#: (content/alternate-designs/let-the-network-pick-the-path/contents+en.lrquestion.description)
+msgid ""
+"This would give an adversary the ability to watch all of your traffic end to"
+" end."
+msgstr ""
+
#: lego/templates/banner.html:3 lego/templates/banner.html:5
#: templates/banner.html:3 templates/banner.html:5
msgid "Close banner"
@@ -12074,8 +13140,8 @@ msgid "DONATE NOW"
msgstr "DONASI SEKARANG"
#: lego/templates/footer.html:13 lego/templates/footer.html:22
-#: lego/templates/navbar.html:83 templates/footer.html:13
-#: templates/footer.html:22 templates/navbar.html:83
+#: lego/templates/navbar.html:95 templates/footer.html:13
+#: templates/footer.html:22 templates/navbar.html:95
msgid "Download Tor Browser"
msgstr "Unduh Tor Browser"
diff --git a/contents+is.po b/contents+is.po
index 1df124e2f2..d9c19a46c2 100644
--- a/contents+is.po
+++ b/contents+is.po
@@ -9,7 +9,7 @@ msgid ""
msgstr ""
"Project-Id-Version: PACKAGE VERSION\n"
"Report-Msgid-Bugs-To: \n"
-"POT-Creation-Date: 2021-08-25 11:14+CET\n"
+"POT-Creation-Date: 2021-09-01 12:20+CET\n"
"PO-Revision-Date: 2018-10-02 22:41+0000\n"
"Last-Translator: Sveinn à Felli <sv1 at fellsnet.is>, 2021\n"
"Language-Team: Icelandic (https://www.transifex.com/otf/teams/1519/is/)\n"
@@ -142,6 +142,11 @@ msgstr ""
msgid "Tor Metrics"
msgstr ""
+#: https//support.torproject.org/alternate-designs/
+#: (content/alternate-designs/contents+en.lrtopic.title)
+msgid "Alternate Designs We Don't Do (Yet)"
+msgstr ""
+
#: https//support.torproject.org/glossary/add-on-extension-or-plugin/
#: (content/glossary/add-on-extension-or-plugin/contents+en.lrword.term)
msgid "add-on, extension, or plugin"
@@ -2291,6 +2296,61 @@ msgid ""
"wiki](https://trac.torproject.org/projects/tor/wiki/doc/TorPlusVPN)."
msgstr ""
+#: https//support.torproject.org/faq/relay-donations/
+#: (content/faq/relay-donations/contents+en.lrquestion.title)
+msgid "Can I donate for a relay rather than run my own?"
+msgstr ""
+
+#: https//support.torproject.org/faq/relay-donations/
+#: (content/faq/relay-donations/contents+en.lrquestion.description)
+msgid ""
+"Sure! We have a [list of organizations that run Tor "
+"relays](https://community.torproject.org/relay/community-resources/relay-"
+"associations/) that are happy to turn your donations into better speed and "
+"anonymity for the Tor network."
+msgstr ""
+
+#: https//support.torproject.org/faq/relay-donations/
+#: (content/faq/relay-donations/contents+en.lrquestion.description)
+msgid ""
+"These organizations are not the same as [The Tor Project, "
+"Inc](https://donate.torproject.org/), but we consider that a good thing."
+msgstr ""
+
+#: https//support.torproject.org/faq/relay-donations/
+#: (content/faq/relay-donations/contents+en.lrquestion.description)
+msgid "They're run by nice people who are part of the Tor community."
+msgstr ""
+
+#: https//support.torproject.org/faq/relay-donations/
+#: (content/faq/relay-donations/contents+en.lrquestion.description)
+msgid ""
+"Note that there can be a tradeoff here between anonymity and performance."
+msgstr ""
+
+#: https//support.torproject.org/faq/relay-donations/
+#: (content/faq/relay-donations/contents+en.lrquestion.description)
+msgid ""
+"The Tor network's anonymity comes in part from diversity, so if you are in a"
+" position to run your own relay, you will be improving Tor's anonymity more "
+"than by donating."
+msgstr ""
+
+#: https//support.torproject.org/faq/relay-donations/
+#: (content/faq/relay-donations/contents+en.lrquestion.description)
+msgid ""
+"At the same time though, economies of scale for bandwidth mean that "
+"combining many small donations into several larger relays is more efficient "
+"at improving network performance."
+msgstr ""
+
+#: https//support.torproject.org/faq/relay-donations/
+#: (content/faq/relay-donations/contents+en.lrquestion.description)
+msgid ""
+"Improving anonymity and improving performance are both worthwhile goals, so "
+"however you can help is great!"
+msgstr ""
+
#: https//support.torproject.org/faq/staying-anonymous/
#: (content/faq/staying-anonymous/contents+en.lrquestion.title)
msgid "Am I totally anonymous if I use Tor?"
@@ -2594,6 +2654,61 @@ msgid ""
" documenting all the issues](https://community.torproject.org/)."
msgstr ""
+#: https//support.torproject.org/about/attacks-on-onion-routing/
+#: (content/about/attacks-on-onion-routing/contents+en.lrquestion.title)
+msgid "What attacks remain against onion routing?"
+msgstr ""
+
+#: https//support.torproject.org/about/attacks-on-onion-routing/
+#: (content/about/attacks-on-onion-routing/contents+en.lrquestion.description)
+msgid ""
+"As mentioned above, it is possible for an observer who can view both you and"
+" either the destination website or your Tor exit node to correlate timings "
+"of your traffic as it enters the Tor network and also as it exits."
+msgstr ""
+
+#: https//support.torproject.org/about/attacks-on-onion-routing/
+#: (content/about/attacks-on-onion-routing/contents+en.lrquestion.description)
+msgid "Tor does not defend against such a threat model."
+msgstr ""
+
+#: https//support.torproject.org/about/attacks-on-onion-routing/
+#: (content/about/attacks-on-onion-routing/contents+en.lrquestion.description)
+msgid ""
+"In a more limited sense, note that if a censor or law enforcement agency has"
+" the ability to obtain specific observation of parts of the network, it is "
+"possible for them to verify a suspicion that you talk regularly to your "
+"friend by observing traffic at both ends and correlating the timing of only "
+"that traffic."
+msgstr ""
+
+#: https//support.torproject.org/about/attacks-on-onion-routing/
+#: (content/about/attacks-on-onion-routing/contents+en.lrquestion.description)
+msgid ""
+"Again, this is only useful to verify that parties already suspected of "
+"communicating with one another are doing so."
+msgstr ""
+
+#: https//support.torproject.org/about/attacks-on-onion-routing/
+#: (content/about/attacks-on-onion-routing/contents+en.lrquestion.description)
+msgid ""
+"In most countries, the suspicion required to obtain a warrant already "
+"carries more weight than timing correlation would provide."
+msgstr ""
+
+#: https//support.torproject.org/about/attacks-on-onion-routing/
+#: (content/about/attacks-on-onion-routing/contents+en.lrquestion.description)
+msgid ""
+"Furthermore, since Tor reuses circuits for multiple TCP connections, it is "
+"possible to associate non anonymous and anonymous traffic at a given exit "
+"node, so be careful about what applications you run concurrently over Tor."
+msgstr ""
+
+#: https//support.torproject.org/about/attacks-on-onion-routing/
+#: (content/about/attacks-on-onion-routing/contents+en.lrquestion.description)
+msgid "Perhaps even run separate Tor clients for these applications."
+msgstr ""
+
#: https//support.torproject.org/about/backdoor/
#: (content/about/backdoor/contents+en.lrquestion.title)
msgid "Is there a backdoor in Tor?"
@@ -2729,6 +2844,43 @@ msgid ""
"recommended](/tbb/tbb-9/)."
msgstr ""
+#: https//support.torproject.org/about/change-paths/
+#: (content/about/change-paths/contents+en.lrquestion.title)
+msgid "How often does Tor change its paths?"
+msgstr ""
+
+#: https//support.torproject.org/about/change-paths/
+#: (content/about/change-paths/contents+en.lrquestion.description)
+msgid ""
+"Tor will reuse the same circuit for new TCP streams for 10 minutes, as long "
+"as the circuit is working fine."
+msgstr ""
+
+#: https//support.torproject.org/about/change-paths/
+#: (content/about/change-paths/contents+en.lrquestion.description)
+msgid "(If the circuit fails, Tor will switch to a new circuit immediately.)"
+msgstr ""
+
+#: https//support.torproject.org/about/change-paths/
+#: (content/about/change-paths/contents+en.lrquestion.description)
+msgid ""
+"But note that a single TCP stream (e.g. a long IRC connection) will stay on "
+"the same circuit forever."
+msgstr ""
+
+#: https//support.torproject.org/about/change-paths/
+#: (content/about/change-paths/contents+en.lrquestion.description)
+msgid "We don't rotate individual streams from one circuit to the next."
+msgstr ""
+
+#: https//support.torproject.org/about/change-paths/
+#: (content/about/change-paths/contents+en.lrquestion.description)
+msgid ""
+"Otherwise, an adversary with a partial view of the network would be given "
+"many chances over time to link you to your destination, rather than just one"
+" chance."
+msgstr ""
+
#: https//support.torproject.org/about/distribute-tor/
#: (content/about/distribute-tor/contents+en.lrquestion.title)
msgid "Can I distribute Tor?"
@@ -2827,6 +2979,133 @@ msgstr ""
"FAQ](https://www.torproject.org/about/trademark/) til að sjá nánari "
"upplýsingar."
+#: https//support.torproject.org/about/entry-guards/
+#: (content/about/entry-guards/contents+en.lrquestion.title)
+msgid "What are Entry Guards?"
+msgstr ""
+
+#: https//support.torproject.org/about/entry-guards/
+#: (content/about/entry-guards/contents+en.lrquestion.description)
+msgid ""
+"Tor (like all current practical low-latency anonymity designs) fails when "
+"the attacker can see both ends of the communications channel."
+msgstr ""
+
+#: https//support.torproject.org/about/entry-guards/
+#: (content/about/entry-guards/contents+en.lrquestion.description)
+msgid ""
+"For example, suppose the attacker controls or watches the Tor relay you "
+"choose to enter the network, and also controls or watches the website you "
+"visit."
+msgstr ""
+
+#: https//support.torproject.org/about/entry-guards/
+#: (content/about/entry-guards/contents+en.lrquestion.description)
+msgid ""
+"In this case, the research community knows no practical low-latency design "
+"that can reliably stop the attacker from correlating volume and timing "
+"information on the two sides."
+msgstr ""
+
+#: https//support.torproject.org/about/entry-guards/
+#: (content/about/entry-guards/contents+en.lrquestion.description)
+msgid "So, what should we do?"
+msgstr ""
+
+#: https//support.torproject.org/about/entry-guards/
+#: (content/about/entry-guards/contents+en.lrquestion.description)
+msgid "Suppose the attacker controls, or can observe, C relays."
+msgstr ""
+
+#: https//support.torproject.org/about/entry-guards/
+#: (content/about/entry-guards/contents+en.lrquestion.description)
+msgid "Suppose there are N relays total."
+msgstr ""
+
+#: https//support.torproject.org/about/entry-guards/
+#: (content/about/entry-guards/contents+en.lrquestion.description)
+msgid ""
+"If you select new entry and exit relays each time you use the network, the "
+"attacker will be able to correlate all traffic you send with probability "
+"around (c/n)2."
+msgstr ""
+
+#: https//support.torproject.org/about/entry-guards/
+#: (content/about/entry-guards/contents+en.lrquestion.description)
+msgid ""
+"But profiling is, for most users, as bad as being traced all the time: they "
+"want to do something often without an attacker noticing, and the attacker "
+"noticing once is as bad as the attacker noticing more often."
+msgstr ""
+
+#: https//support.torproject.org/about/entry-guards/
+#: (content/about/entry-guards/contents+en.lrquestion.description)
+msgid ""
+"Thus, choosing many random entries and exits gives the user no chance of "
+"escaping profiling by this kind of attacker."
+msgstr ""
+
+#: https//support.torproject.org/about/entry-guards/
+#: (content/about/entry-guards/contents+en.lrquestion.description)
+msgid ""
+"The solution is \"entry guards\": each Tor client selects a few relays at "
+"random to use as entry points, and uses only those relays for their first "
+"hop."
+msgstr ""
+
+#: https//support.torproject.org/about/entry-guards/
+#: (content/about/entry-guards/contents+en.lrquestion.description)
+msgid ""
+"If those relays are not controlled or observed, the attacker can't win, "
+"ever, and the user is secure."
+msgstr ""
+
+#: https//support.torproject.org/about/entry-guards/
+#: (content/about/entry-guards/contents+en.lrquestion.description)
+msgid ""
+"If those relays are observed or controlled by the attacker, the attacker "
+"sees a larger fraction of the user's traffic - but still the user is no more"
+" profiled than before."
+msgstr ""
+
+#: https//support.torproject.org/about/entry-guards/
+#: (content/about/entry-guards/contents+en.lrquestion.description)
+msgid ""
+"Thus, the user has some chance (on the order of (n-c)/n) of avoiding "
+"profiling, whereas they had none before."
+msgstr ""
+
+#: https//support.torproject.org/about/entry-guards/
+#: (content/about/entry-guards/contents+en.lrquestion.description)
+msgid ""
+"You can read more at [An Analysis of the Degradation of Anonymous "
+"Protocols](http://freehaven.net/anonbib/#wright02), [Defending Anonymous "
+"Communication Against Passive Logging "
+"Attacks](http://freehaven.net/anonbib/#wright03), and especially [Locating "
+"Hidden Servers](http://freehaven.net/anonbib/#hs-attack06)."
+msgstr ""
+
+#: https//support.torproject.org/about/entry-guards/
+#: (content/about/entry-guards/contents+en.lrquestion.description)
+msgid ""
+"Restricting your entry nodes may also help against attackers who want to run"
+" a few Tor nodes and easily enumerate all of the Tor user IP addresses."
+msgstr ""
+
+#: https//support.torproject.org/about/entry-guards/
+#: (content/about/entry-guards/contents+en.lrquestion.description)
+msgid ""
+"(Even though they can't learn what destinations the users are talking to, "
+"they still might be able to do bad things with just a list of users.)"
+msgstr ""
+
+#: https//support.torproject.org/about/entry-guards/
+#: (content/about/entry-guards/contents+en.lrquestion.description)
+msgid ""
+"However, that feature won't really become useful until we move to a "
+"\"directory guard\" design as well."
+msgstr ""
+
#: https//support.torproject.org/about/how-is-tor-different-from-other-proxies/
#: (content/about/how-is-tor-different-from-other-proxies/contents+en.lrquestion.title)
msgid "How is Tor different from other proxies?"
@@ -2997,6 +3276,162 @@ msgid ""
" Tor and HTTPS interact."
msgstr ""
+#: https//support.torproject.org/about/key-management/
+#: (content/about/key-management/contents+en.lrquestion.title)
+msgid "Tell me about all the keys Tor uses"
+msgstr ""
+
+#: https//support.torproject.org/about/key-management/
+#: (content/about/key-management/contents+en.lrquestion.description)
+msgid ""
+"Tor uses a variety of different keys, with three goals in mind: 1) "
+"encryption to ensure privacy of data within the Tor network, 2) "
+"authentication so clients know they're talking to the relays they meant to "
+"talk to, and 3) signatures to make sure all clients know the same set of "
+"relays."
+msgstr ""
+
+#: https//support.torproject.org/about/key-management/
+#: (content/about/key-management/contents+en.lrquestion.description)
+msgid ""
+"**Encryption**: first, all connections in Tor use TLS link encryption, so "
+"observers can't look inside to see which circuit a given cell is intended "
+"for."
+msgstr ""
+
+#: https//support.torproject.org/about/key-management/
+#: (content/about/key-management/contents+en.lrquestion.description)
+msgid ""
+"Further, the Tor client establishes an ephemeral encryption key with each "
+"relay in the circuit; these extra layers of encryption mean that only the "
+"exit relay can read the cells."
+msgstr ""
+
+#: https//support.torproject.org/about/key-management/
+#: (content/about/key-management/contents+en.lrquestion.description)
+msgid ""
+"Both sides discard the circuit key when the circuit ends, so logging traffic"
+" and then breaking into the relay to discover the key won't work."
+msgstr ""
+
+#: https//support.torproject.org/about/key-management/
+#: (content/about/key-management/contents+en.lrquestion.description)
+msgid ""
+"**Authentication**: Every Tor relay has a public decryption key called the "
+"\"onion key\"."
+msgstr ""
+
+#: https//support.torproject.org/about/key-management/
+#: (content/about/key-management/contents+en.lrquestion.description)
+msgid "Each relay rotates its onion key once a week."
+msgstr ""
+
+#: https//support.torproject.org/about/key-management/
+#: (content/about/key-management/contents+en.lrquestion.description)
+msgid ""
+"When the Tor client establishes circuits, at each step it [demands that the "
+"Tor relay prove knowledge of its onion key](https://svn-"
+"archive.torproject.org/svn/projects/design-paper/tor-"
+"design.html#subsec:circuits)."
+msgstr ""
+
+#: https//support.torproject.org/about/key-management/
+#: (content/about/key-management/contents+en.lrquestion.description)
+msgid ""
+"That way the first node in the path can't just spoof the rest of the path."
+msgstr ""
+
+#: https//support.torproject.org/about/key-management/
+#: (content/about/key-management/contents+en.lrquestion.description)
+msgid ""
+"Because the Tor client chooses the path, it can make sure to get Tor's "
+"\"distributed trust\" property: no single relay in the path can know about "
+"both the client and what the client is doing."
+msgstr ""
+
+#: https//support.torproject.org/about/key-management/
+#: (content/about/key-management/contents+en.lrquestion.description)
+msgid ""
+"**Coordination**: How do clients know what the relays are, and how do they "
+"know that they have the right keys for them?"
+msgstr ""
+
+#: https//support.torproject.org/about/key-management/
+#: (content/about/key-management/contents+en.lrquestion.description)
+msgid "Each relay has a long-term public signing key called the \"identity key\"."
+msgstr ""
+
+#: https//support.torproject.org/about/key-management/
+#: (content/about/key-management/contents+en.lrquestion.description)
+msgid "Each directory authority additionally has a \"directory signing key\"."
+msgstr ""
+
+#: https//support.torproject.org/about/key-management/
+#: (content/about/key-management/contents+en.lrquestion.description)
+msgid ""
+"The directory authorities [provide a signed "
+"list](https://gitweb.torproject.org/torspec.git/tree/dir-spec.txt) of all "
+"the known relays, and in that list are a set of certificates from each relay"
+" (self-signed by their identity key) specifying their keys, locations, exit "
+"policies, and so on."
+msgstr ""
+
+#: https//support.torproject.org/about/key-management/
+#: (content/about/key-management/contents+en.lrquestion.description)
+msgid ""
+"So unless the adversary can control a majority of the directory authorities "
+"(as of 2021 there are 10 directory authorities), they can't trick the Tor "
+"client into using other Tor relays."
+msgstr ""
+
+#: https//support.torproject.org/about/key-management/
+#: (content/about/key-management/contents+en.lrquestion.description)
+msgid "How do clients know what the directory authorities are?"
+msgstr ""
+
+#: https//support.torproject.org/about/key-management/
+#: (content/about/key-management/contents+en.lrquestion.description)
+msgid ""
+"The Tor software comes with a built-in list of location and public key for "
+"each directory authority."
+msgstr ""
+
+#: https//support.torproject.org/about/key-management/
+#: (content/about/key-management/contents+en.lrquestion.description)
+msgid ""
+"So the only way to trick users into using a fake Tor network is to give them"
+" a specially modified version of the software."
+msgstr ""
+
+#: https//support.torproject.org/about/key-management/
+#: (content/about/key-management/contents+en.lrquestion.description)
+msgid "How do users know they've got the right software?"
+msgstr ""
+
+#: https//support.torproject.org/about/key-management/
+#: (content/about/key-management/contents+en.lrquestion.description)
+msgid ""
+"When we distribute the source code or a package, we digitally sign it with "
+"[GNU Privacy Guard](http://www.gnupg.org/). See the [instructions on how to "
+"check Tor Browser's signature](https://support.torproject.org/tbb/how-to-"
+"verify-signature/)."
+msgstr ""
+
+#: https//support.torproject.org/about/key-management/
+#: (content/about/key-management/contents+en.lrquestion.description)
+msgid ""
+"In order to be certain that it's really signed by us, you need to have met "
+"us in person and gotten a copy of our GPG key fingerprint, or you need to "
+"know somebody who has."
+msgstr ""
+
+#: https//support.torproject.org/about/key-management/
+#: (content/about/key-management/contents+en.lrquestion.description)
+msgid ""
+"If you're concerned about an attack on this level, we recommend you get "
+"involved with the security community and start meeting people."
+msgstr ""
+
#: https//support.torproject.org/about/no-data-scrubbing/
#: (content/about/no-data-scrubbing/contents+en.lrquestion.title)
msgid ""
@@ -3029,6 +3464,151 @@ msgid ""
"though."
msgstr ""
+#: https//support.torproject.org/about/protections/
+#: (content/about/protections/contents+en.lrquestion.title)
+msgid "What protections does Tor provide?"
+msgstr ""
+
+#: https//support.torproject.org/about/protections/
+#: (content/about/protections/contents+en.lrquestion.description)
+msgid ""
+"Internet communication is based on a store-and-forward model that can be "
+"understood in analogy to postal mail: Data is transmitted in blocks called "
+"IP datagrams or packets."
+msgstr ""
+
+#: https//support.torproject.org/about/protections/
+#: (content/about/protections/contents+en.lrquestion.description)
+msgid ""
+"Every packet includes a source IP address (of the sender) and a destination "
+"IP address (of the receiver), just as ordinary letters contain postal "
+"addresses of sender and receiver."
+msgstr ""
+
+#: https//support.torproject.org/about/protections/
+#: (content/about/protections/contents+en.lrquestion.description)
+msgid ""
+"The way from sender to receiver involves multiple hops of routers, where "
+"each router inspects the destination IP address and forwards the packet "
+"closer to its destination."
+msgstr ""
+
+#: https//support.torproject.org/about/protections/
+#: (content/about/protections/contents+en.lrquestion.description)
+msgid ""
+"Thus, every router between sender and receiver learns that the sender is "
+"communicating with the receiver."
+msgstr ""
+
+#: https//support.torproject.org/about/protections/
+#: (content/about/protections/contents+en.lrquestion.description)
+msgid ""
+"In particular, your local ISP is in the position to build a complete profile"
+" of your Internet usage."
+msgstr ""
+
+#: https//support.torproject.org/about/protections/
+#: (content/about/protections/contents+en.lrquestion.description)
+msgid ""
+"In addition, every server in the Internet that can see any of the packets "
+"can profile your behavior."
+msgstr ""
+
+#: https//support.torproject.org/about/protections/
+#: (content/about/protections/contents+en.lrquestion.description)
+msgid ""
+"The aim of Tor is to improve your privacy by sending your traffic through a "
+"series of proxies."
+msgstr ""
+
+#: https//support.torproject.org/about/protections/
+#: (content/about/protections/contents+en.lrquestion.description)
+msgid ""
+"Your communication is encrypted in multiple layers and routed via multiple "
+"hops through the Tor network to the final receiver."
+msgstr ""
+
+#: https//support.torproject.org/about/protections/
+#: (content/about/protections/contents+en.lrquestion.description)
+msgid ""
+"More details on this process can be found in this "
+"[visualization](https://support.torproject.org/https/https-1/)."
+msgstr ""
+
+#: https//support.torproject.org/about/protections/
+#: (content/about/protections/contents+en.lrquestion.description)
+msgid ""
+"Note that all your local ISP can observe now is that you are communicating "
+"with Tor nodes."
+msgstr ""
+
+#: https//support.torproject.org/about/protections/
+#: (content/about/protections/contents+en.lrquestion.description)
+msgid ""
+"Similarly, servers in the Internet just see that they are being contacted by"
+" Tor nodes."
+msgstr ""
+
+#: https//support.torproject.org/about/protections/
+#: (content/about/protections/contents+en.lrquestion.description)
+msgid "Generally speaking, Tor aims to solve three privacy problems:"
+msgstr ""
+
+#: https//support.torproject.org/about/protections/
+#: (content/about/protections/contents+en.lrquestion.description)
+msgid ""
+"First, Tor prevents websites and other services from learning your location,"
+" which they can use to build databases about your habits and interests."
+msgstr ""
+
+#: https//support.torproject.org/about/protections/
+#: (content/about/protections/contents+en.lrquestion.description)
+msgid ""
+"With Tor, your Internet connections don't give you away by default -- now "
+"you can have the ability to choose, for each connection, how much "
+"information to reveal."
+msgstr ""
+
+#: https//support.torproject.org/about/protections/
+#: (content/about/protections/contents+en.lrquestion.description)
+msgid ""
+"Second, Tor prevents people watching your traffic locally (such as your ISP "
+"or someone with access to your home wifi or router) from learning what "
+"information you're fetching and where you're fetching it from."
+msgstr ""
+
+#: https//support.torproject.org/about/protections/
+#: (content/about/protections/contents+en.lrquestion.description)
+msgid ""
+"It also stops them from deciding what you're allowed to learn and publish --"
+" if you can get to any part of the Tor network, you can reach any site on "
+"the Internet."
+msgstr ""
+
+#: https//support.torproject.org/about/protections/
+#: (content/about/protections/contents+en.lrquestion.description)
+msgid ""
+"Third, Tor routes your connection through more than one Tor relay so no "
+"single relay can learn what you're up to."
+msgstr ""
+
+#: https//support.torproject.org/about/protections/
+#: (content/about/protections/contents+en.lrquestion.description)
+msgid ""
+"Because these relays are run by different individuals or organizations, "
+"distributing trust provides more security than the old [one hop "
+"proxy](https://support.torproject.org/about/#how-is-tor-different-from-"
+"other-proxies) approach."
+msgstr ""
+
+#: https//support.torproject.org/about/protections/
+#: (content/about/protections/contents+en.lrquestion.description)
+msgid ""
+"Note, however, that there are situations where Tor fails to solve these "
+"privacy problems entirely: see the entry below on [remaining "
+"attacks](https://support.torproject.org/about/#attacks-on-onion-routing)."
+msgstr ""
+
#: https//support.torproject.org/about/what-is-tor/
#: (content/about/what-is-tor/contents+en.lrquestion.title)
msgid "What is Tor?"
@@ -5363,9 +5943,11 @@ msgstr ""
#: (content/tbb/tbb-47/contents+en.lrquestion.description)
msgid ""
"Also, read up on the HTTPProxyAuthenticator and HTTPSProxyAuthenticator "
-"options if your proxy requires auth. We only support basic auth currently, "
-"but if you need NTLM authentication, you may find [this post in the "
-"archives](https://archives.seul.org/or/talk/Jun-2005/msg00223.html) useful."
+"options if your [proxy requires auth.](https://developer.mozilla.org/en-"
+"US/docs/Web/HTTP/Headers/Proxy-Authenticate) We only support basic auth "
+"currently, but if you need NTLM authentication, you may find [this post in "
+"the archives](https://archives.seul.org/or/talk/Jun-2005/msg00223.html) "
+"useful."
msgstr ""
#: https//support.torproject.org/tbb/tbb-47/
@@ -5596,6 +6178,219 @@ msgid ""
"have no effect on Tor's configuration."
msgstr ""
+#: https//support.torproject.org/tbb/tbb-firewall-ports/
+#: (content/tbb/tbb-firewall-ports/contents+en.lrquestion.title)
+msgid "My firewall only allows a few outgoing ports"
+msgstr ""
+
+#: https//support.torproject.org/tbb/tbb-firewall-ports/
+#: (content/tbb/tbb-firewall-ports/contents+en.lrquestion.description)
+msgid ""
+"If your firewall works by blocking ports, then you can tell Tor to only use "
+"the ports when you start your Tor Browser."
+msgstr ""
+
+#: https//support.torproject.org/tbb/tbb-firewall-ports/
+#: (content/tbb/tbb-firewall-ports/contents+en.lrquestion.description)
+msgid ""
+"Or you can add the ports that your firewall permits by adding "
+"\"FascistFirewall 1\" to your torrc configuration file."
+msgstr ""
+
+#: https//support.torproject.org/tbb/tbb-firewall-ports/
+#: (content/tbb/tbb-firewall-ports/contents+en.lrquestion.description)
+msgid ""
+"By default, when you set this Tor assumes that your firewall allows only "
+"port 80 and port 443 (HTTP and HTTPS respectively)."
+msgstr ""
+
+#: https//support.torproject.org/tbb/tbb-firewall-ports/
+#: (content/tbb/tbb-firewall-ports/contents+en.lrquestion.description)
+msgid ""
+"You can select a different set of ports with the FirewallPorts torrc option."
+msgstr ""
+
+#: https//support.torproject.org/tbb/tbb-firewall-ports/
+#: (content/tbb/tbb-firewall-ports/contents+en.lrquestion.description)
+msgid ""
+"If you want to be more fine-grained with your controls, you can also use the"
+" ReachableAddresses config options, e.g.:"
+msgstr ""
+
+#: https//support.torproject.org/tbb/tbb-firewall-ports/
+#: (content/tbb/tbb-firewall-ports/contents+en.lrquestion.description)
+#: https//support.torproject.org/tbb/tbb-install-tor-central-server/
+#: (content/tbb/tbb-install-tor-central-server/contents+en.lrquestion.description)
+#: https//support.torproject.org/operators/default-exit-ports/
+#: (content/operators/default-exit-ports/contents+en.lrquestion.description)
+#: https//support.torproject.org/operators/hibernation/
+#: (content/operators/hibernation/contents+en.lrquestion.description)
+#: https//support.torproject.org/operators/limit-total-bandwidth/
+#: (content/operators/limit-total-bandwidth/contents+en.lrquestion.description)
+#: https//support.torproject.org/misc/bug-or-feedback/
+#: (content/misc/bug-or-feedback/contents+en.lrquestion.description)
+#: https//support.torproject.org/get-in-touch/why-i-cant-join-tor-channels/
+#: (content/get-in-touch/why-i-cant-join-tor-channels/contents+en.lrquestion.description)
+#: https//support.torproject.org/apt/tor-deb-repo/
+#: (content/apt/apt-1/contents+en.lrquestion.description)
+#: https//support.torproject.org/apt/apt-over-tor/
+#: (content/apt/apt-3/contents+en.lrquestion.description)
+msgid "```"
+msgstr "```"
+
+#: https//support.torproject.org/tbb/tbb-firewall-ports/
+#: (content/tbb/tbb-firewall-ports/contents+en.lrquestion.description)
+msgid "ReachableDirAddresses *:80"
+msgstr ""
+
+#: https//support.torproject.org/tbb/tbb-firewall-ports/
+#: (content/tbb/tbb-firewall-ports/contents+en.lrquestion.description)
+msgid "ReachableORAddresses *:443"
+msgstr ""
+
+#: https//support.torproject.org/tbb/tbb-install-tor-central-server/
+#: (content/tbb/tbb-install-tor-central-server/contents+en.lrquestion.title)
+msgid ""
+"Can I install Tor on a central server, and have my clients connect to it?"
+msgstr ""
+
+#: https//support.torproject.org/tbb/tbb-install-tor-central-server/
+#: (content/tbb/tbb-install-tor-central-server/contents+en.lrquestion.description)
+msgid ""
+"Yes. Tor can be configured as a client or a relay on another machine, and "
+"allow other machines to be able to connect to it for anonymity."
+msgstr ""
+
+#: https//support.torproject.org/tbb/tbb-install-tor-central-server/
+#: (content/tbb/tbb-install-tor-central-server/contents+en.lrquestion.description)
+msgid ""
+"This is most useful in an environment where many computers want a gateway of"
+" anonymity to the rest of the world."
+msgstr ""
+
+#: https//support.torproject.org/tbb/tbb-install-tor-central-server/
+#: (content/tbb/tbb-install-tor-central-server/contents+en.lrquestion.description)
+msgid ""
+"However, be forewarned that with this configuration, anyone within your "
+"private network (existing between you and the Tor client/relay) can see what"
+" traffic you are sending in clear text."
+msgstr ""
+
+#: https//support.torproject.org/tbb/tbb-install-tor-central-server/
+#: (content/tbb/tbb-install-tor-central-server/contents+en.lrquestion.description)
+msgid "The anonymity doesn't start until you get to the Tor relay."
+msgstr ""
+
+#: https//support.torproject.org/tbb/tbb-install-tor-central-server/
+#: (content/tbb/tbb-install-tor-central-server/contents+en.lrquestion.description)
+msgid ""
+"Because of this, if you are the controller of your domain and you know "
+"everything's locked down, you will be OK, but this configuration may not be "
+"suitable for large private networks where security is key all around."
+msgstr ""
+
+#: https//support.torproject.org/tbb/tbb-install-tor-central-server/
+#: (content/tbb/tbb-install-tor-central-server/contents+en.lrquestion.description)
+msgid ""
+"Configuration is simple, editing your torrc file's SocksListenAddress "
+"according to the following examples:"
+msgstr ""
+
+#: https//support.torproject.org/tbb/tbb-install-tor-central-server/
+#: (content/tbb/tbb-install-tor-central-server/contents+en.lrquestion.description)
+msgid "SocksListenAddress 127.0.0.1"
+msgstr ""
+
+#: https//support.torproject.org/tbb/tbb-install-tor-central-server/
+#: (content/tbb/tbb-install-tor-central-server/contents+en.lrquestion.description)
+msgid "SocksListenAddress 192.168.x.x:9100"
+msgstr ""
+
+#: https//support.torproject.org/tbb/tbb-install-tor-central-server/
+#: (content/tbb/tbb-install-tor-central-server/contents+en.lrquestion.description)
+msgid "SocksListenAddress 0.0.0.0:9100"
+msgstr ""
+
+#: https//support.torproject.org/tbb/tbb-install-tor-central-server/
+#: (content/tbb/tbb-install-tor-central-server/contents+en.lrquestion.description)
+msgid ""
+"You can state multiple listen addresses, in the case that you are part of "
+"several networks or subnets."
+msgstr ""
+
+#: https//support.torproject.org/tbb/tbb-install-tor-central-server/
+#: (content/tbb/tbb-install-tor-central-server/contents+en.lrquestion.description)
+msgid "SocksListenAddress 192.168.x.x:9100 #eth0"
+msgstr ""
+
+#: https//support.torproject.org/tbb/tbb-install-tor-central-server/
+#: (content/tbb/tbb-install-tor-central-server/contents+en.lrquestion.description)
+msgid "SocksListenAddress 10.x.x.x:9100 #eth1"
+msgstr ""
+
+#: https//support.torproject.org/tbb/tbb-install-tor-central-server/
+#: (content/tbb/tbb-install-tor-central-server/contents+en.lrquestion.description)
+msgid ""
+"After this, your clients on their respective networks/subnets would specify "
+"a socks proxy with the address and port you specified SocksListenAddress to "
+"be."
+msgstr ""
+
+#: https//support.torproject.org/tbb/tbb-install-tor-central-server/
+#: (content/tbb/tbb-install-tor-central-server/contents+en.lrquestion.description)
+msgid ""
+"Please note that the SocksPort configuration option gives the port ONLY for "
+"localhost (127.0.0.1)."
+msgstr ""
+
+#: https//support.torproject.org/tbb/tbb-install-tor-central-server/
+#: (content/tbb/tbb-install-tor-central-server/contents+en.lrquestion.description)
+msgid ""
+"When setting up your SocksListenAddress(es), you need to give the port with "
+"the address, as shown above."
+msgstr ""
+
+#: https//support.torproject.org/tbb/tbb-install-tor-central-server/
+#: (content/tbb/tbb-install-tor-central-server/contents+en.lrquestion.description)
+msgid ""
+"If you are interested in forcing all outgoing data through the central Tor "
+"client/relay, instead of the server only being an optional proxy, you may "
+"find the program iptables (for *nix) useful."
+msgstr ""
+
+#: https//support.torproject.org/tbb/tbb-run-client-different-computer/
+#: (content/tbb/tbb-run-client-different-computer/contents+en.lrquestion.title)
+msgid ""
+"I want to run my Tor client on a different computer than my applications"
+msgstr ""
+
+#: https//support.torproject.org/tbb/tbb-run-client-different-computer/
+#: (content/tbb/tbb-run-client-different-computer/contents+en.lrquestion.description)
+msgid ""
+"By default, your Tor client only listens for applications that connect from "
+"localhost."
+msgstr ""
+
+#: https//support.torproject.org/tbb/tbb-run-client-different-computer/
+#: (content/tbb/tbb-run-client-different-computer/contents+en.lrquestion.description)
+msgid "Connections from other computers are refused."
+msgstr ""
+
+#: https//support.torproject.org/tbb/tbb-run-client-different-computer/
+#: (content/tbb/tbb-run-client-different-computer/contents+en.lrquestion.description)
+msgid ""
+"If you want to torify applications on different computers than the Tor "
+"client, you should edit your torrc to define `SocksListenAddress 0.0.0.0` "
+"and then restart (or hup) Tor."
+msgstr ""
+
+#: https//support.torproject.org/tbb/tbb-run-client-different-computer/
+#: (content/tbb/tbb-run-client-different-computer/contents+en.lrquestion.description)
+msgid ""
+"If you want to get more advanced, you can configure your Tor client on a "
+"firewall to bind to your internal IP but not your external IP."
+msgstr ""
+
#: https//support.torproject.org/tbb/website-blocking-tor/
#: (content/tbb/website-blocking-tor/contents+en.lrquestion.title)
msgid "A website I am trying to reach is blocking access over Tor."
@@ -7191,6 +7986,130 @@ msgid ""
"guide."
msgstr ""
+#: https//support.torproject.org/operators/default-exit-ports/
+#: (content/operators/default-exit-ports/contents+en.lrquestion.title)
+msgid "Is there a list of default exit ports?"
+msgstr ""
+
+#: https//support.torproject.org/operators/default-exit-ports/
+#: (content/operators/default-exit-ports/contents+en.lrquestion.description)
+msgid ""
+"The default open ports are listed below but keep in mind that, any port or "
+"ports can be opened by the relay operator by configuring it in torrc or "
+"modifying the source code."
+msgstr ""
+
+#: https//support.torproject.org/operators/default-exit-ports/
+#: (content/operators/default-exit-ports/contents+en.lrquestion.description)
+msgid ""
+"The default according to src/or/policies.c ([line 85][1] and [line 1901][2])"
+" from the source code release [release-0.4.6][3]:"
+msgstr ""
+
+#: https//support.torproject.org/operators/default-exit-ports/
+#: (content/operators/default-exit-ports/contents+en.lrquestion.description)
+msgid "reject 0.0.0.0/8"
+msgstr ""
+
+#: https//support.torproject.org/operators/default-exit-ports/
+#: (content/operators/default-exit-ports/contents+en.lrquestion.description)
+msgid "reject 169.254.0.0/16"
+msgstr ""
+
+#: https//support.torproject.org/operators/default-exit-ports/
+#: (content/operators/default-exit-ports/contents+en.lrquestion.description)
+msgid "reject 127.0.0.0/8"
+msgstr ""
+
+#: https//support.torproject.org/operators/default-exit-ports/
+#: (content/operators/default-exit-ports/contents+en.lrquestion.description)
+msgid "reject 192.168.0.0/16"
+msgstr ""
+
+#: https//support.torproject.org/operators/default-exit-ports/
+#: (content/operators/default-exit-ports/contents+en.lrquestion.description)
+msgid "reject 10.0.0.0/8"
+msgstr ""
+
+#: https//support.torproject.org/operators/default-exit-ports/
+#: (content/operators/default-exit-ports/contents+en.lrquestion.description)
+msgid "reject 172.16.0.0/12"
+msgstr ""
+
+#: https//support.torproject.org/operators/default-exit-ports/
+#: (content/operators/default-exit-ports/contents+en.lrquestion.description)
+msgid "reject *:25"
+msgstr ""
+
+#: https//support.torproject.org/operators/default-exit-ports/
+#: (content/operators/default-exit-ports/contents+en.lrquestion.description)
+msgid "reject *:119"
+msgstr ""
+
+#: https//support.torproject.org/operators/default-exit-ports/
+#: (content/operators/default-exit-ports/contents+en.lrquestion.description)
+msgid "reject *:135-139"
+msgstr ""
+
+#: https//support.torproject.org/operators/default-exit-ports/
+#: (content/operators/default-exit-ports/contents+en.lrquestion.description)
+msgid "reject *:445"
+msgstr ""
+
+#: https//support.torproject.org/operators/default-exit-ports/
+#: (content/operators/default-exit-ports/contents+en.lrquestion.description)
+msgid "reject *:563"
+msgstr ""
+
+#: https//support.torproject.org/operators/default-exit-ports/
+#: (content/operators/default-exit-ports/contents+en.lrquestion.description)
+msgid "reject *:1214"
+msgstr ""
+
+#: https//support.torproject.org/operators/default-exit-ports/
+#: (content/operators/default-exit-ports/contents+en.lrquestion.description)
+msgid "reject *:4661-4666"
+msgstr ""
+
+#: https//support.torproject.org/operators/default-exit-ports/
+#: (content/operators/default-exit-ports/contents+en.lrquestion.description)
+msgid "reject *:6346-6429"
+msgstr ""
+
+#: https//support.torproject.org/operators/default-exit-ports/
+#: (content/operators/default-exit-ports/contents+en.lrquestion.description)
+msgid "reject *:6699"
+msgstr ""
+
+#: https//support.torproject.org/operators/default-exit-ports/
+#: (content/operators/default-exit-ports/contents+en.lrquestion.description)
+msgid "reject *:6881-6999"
+msgstr ""
+
+#: https//support.torproject.org/operators/default-exit-ports/
+#: (content/operators/default-exit-ports/contents+en.lrquestion.description)
+msgid "accept *:*"
+msgstr ""
+
+#: https//support.torproject.org/operators/default-exit-ports/
+#: (content/operators/default-exit-ports/contents+en.lrquestion.description)
+msgid ""
+"[1]: "
+"https://gitlab.torproject.org/tpo/core/tor/-/blob/release-0.4.6/src/core/or/policies.c#L85"
+msgstr ""
+
+#: https//support.torproject.org/operators/default-exit-ports/
+#: (content/operators/default-exit-ports/contents+en.lrquestion.description)
+msgid ""
+"[2]: "
+"https://gitlab.torproject.org/tpo/core/tor/-/blob/release-0.4.6/src/core/or/policies.c#L1901"
+msgstr ""
+
+#: https//support.torproject.org/operators/default-exit-ports/
+#: (content/operators/default-exit-ports/contents+en.lrquestion.description)
+msgid "[3]: https://gitlab.torproject.org/tpo/core/tor/-/tree/release-0.4.6/"
+msgstr ""
+
#: https//support.torproject.org/operators/dynamic-ip/
#: (content/operators/dynamic-ip/contents+en.lrquestion.title)
msgid "Can I run a Tor relay using a dynamic IP address?"
@@ -7338,21 +8257,6 @@ msgid ""
"into hibernation, signaled by this entry in the log:"
msgstr ""
-#: https//support.torproject.org/operators/hibernation/
-#: (content/operators/hibernation/contents+en.lrquestion.description)
-#: https//support.torproject.org/operators/limit-total-bandwidth/
-#: (content/operators/limit-total-bandwidth/contents+en.lrquestion.description)
-#: https//support.torproject.org/misc/bug-or-feedback/
-#: (content/misc/bug-or-feedback/contents+en.lrquestion.description)
-#: https//support.torproject.org/get-in-touch/why-i-cant-join-tor-channels/
-#: (content/get-in-touch/why-i-cant-join-tor-channels/contents+en.lrquestion.description)
-#: https//support.torproject.org/apt/tor-deb-repo/
-#: (content/apt/apt-1/contents+en.lrquestion.description)
-#: https//support.torproject.org/apt/apt-over-tor/
-#: (content/apt/apt-3/contents+en.lrquestion.description)
-msgid "```"
-msgstr "```"
-
#: https//support.torproject.org/operators/hibernation/
#: (content/operators/hibernation/contents+en.lrquestion.description)
msgid "Bandwidth soft limit reached; commencing hibernation."
@@ -9633,6 +10537,131 @@ msgstr "uid tor-security at lists.torproject.org"
msgid "sub 4096R/C00942E4 2017-03-13"
msgstr "sub 4096R/C00942E4 2017-03-13"
+#: https//support.torproject.org/misc/check-socks-dns-leaks/
+#: (content/misc/check-socks-dns-leaks/contents+en.lrquestion.title)
+msgid ""
+"How do I check if my application that uses SOCKS is leaking DNS requests?"
+msgstr ""
+
+#: https//support.torproject.org/misc/check-socks-dns-leaks/
+#: (content/misc/check-socks-dns-leaks/contents+en.lrquestion.description)
+msgid ""
+"Even if your application is using the correct variant of the SOCKS protocol,"
+" there is still a risk that it could be leaking DNS queries."
+msgstr ""
+
+#: https//support.torproject.org/misc/check-socks-dns-leaks/
+#: (content/misc/check-socks-dns-leaks/contents+en.lrquestion.description)
+msgid ""
+"This problem happens in Firefox extensions that resolve the destination "
+"hostname themselves, for example to show you its IP address, what country "
+"it's in, etc."
+msgstr ""
+
+#: https//support.torproject.org/misc/check-socks-dns-leaks/
+#: (content/misc/check-socks-dns-leaks/contents+en.lrquestion.description)
+msgid ""
+"If you suspect your application might behave like this, follow the "
+"instructions below to check."
+msgstr ""
+
+#: https//support.torproject.org/misc/check-socks-dns-leaks/
+#: (content/misc/check-socks-dns-leaks/contents+en.lrquestion.description)
+msgid ""
+"1. Add `TestSocks 1` to your [torrc file](https://support.torproject.org/tbb"
+"/tbb-editing-torrc/)."
+msgstr ""
+
+#: https//support.torproject.org/misc/check-socks-dns-leaks/
+#: (content/misc/check-socks-dns-leaks/contents+en.lrquestion.description)
+msgid ""
+"1. Start Tor, and point your program's SOCKS proxy settings to Tor's SOCKS5 "
+"server (`socks5://127.0.0.1:9050` by default)."
+msgstr ""
+
+#: https//support.torproject.org/misc/check-socks-dns-leaks/
+#: (content/misc/check-socks-dns-leaks/contents+en.lrquestion.description)
+msgid ""
+"1. Watch your logs as you use your application. For each socks connection, "
+"Tor will log a `notice` for safe connections, and a `warn` for connections "
+"leaking DNS requests."
+msgstr ""
+
+#: https//support.torproject.org/misc/check-socks-dns-leaks/
+#: (content/misc/check-socks-dns-leaks/contents+en.lrquestion.description)
+msgid ""
+"If you want to automatically disable all connections leaking DNS requests, "
+"set `SafeSocks 1` in your torrc file."
+msgstr ""
+
+#: https//support.torproject.org/misc/hide-exits/
+#: (content/misc/hide-exits/contents+en.lrquestion.title)
+msgid ""
+"You should hide the list of Tor relays, so people can't block the exits."
+msgstr ""
+
+#: https//support.torproject.org/misc/hide-exits/
+#: (content/misc/hide-exits/contents+en.lrquestion.description)
+msgid "There are a few reasons we don't:"
+msgstr ""
+
+#: https//support.torproject.org/misc/hide-exits/
+#: (content/misc/hide-exits/contents+en.lrquestion.description)
+msgid ""
+"1. We can't help but make the information available, since Tor clients need "
+"to use it to pick their paths."
+msgstr ""
+
+#: https//support.torproject.org/misc/hide-exits/
+#: (content/misc/hide-exits/contents+en.lrquestion.description)
+msgid "So if the \"blockers\" want it, they can get it anyway."
+msgstr ""
+
+#: https//support.torproject.org/misc/hide-exits/
+#: (content/misc/hide-exits/contents+en.lrquestion.description)
+msgid ""
+"Further, even if we didn't tell clients about the list of relays directly, "
+"somebody could still make a lot of connections through Tor to a test site "
+"and build a list of the addresses they see."
+msgstr ""
+
+#: https//support.torproject.org/misc/hide-exits/
+#: (content/misc/hide-exits/contents+en.lrquestion.description)
+msgid ""
+"1. If people want to block us, we believe that they should be allowed to do "
+"so."
+msgstr ""
+
+#: https//support.torproject.org/misc/hide-exits/
+#: (content/misc/hide-exits/contents+en.lrquestion.description)
+msgid ""
+"Obviously, we would prefer for everybody to allow Tor users to connect to "
+"them, but people have the right to decide who their services should allow "
+"connections from, and if they want to block anonymous users, they can."
+msgstr ""
+
+#: https//support.torproject.org/misc/hide-exits/
+#: (content/misc/hide-exits/contents+en.lrquestion.description)
+msgid ""
+"1. Being blockable also has tactical advantages: it may be a persuasive "
+"response to website maintainers who feel threatened by Tor."
+msgstr ""
+
+#: https//support.torproject.org/misc/hide-exits/
+#: (content/misc/hide-exits/contents+en.lrquestion.description)
+msgid ""
+"Giving them the option may inspire them to stop and think about whether they"
+" really want to eliminate private access to their system, and if not, what "
+"other options they might have."
+msgstr ""
+
+#: https//support.torproject.org/misc/hide-exits/
+#: (content/misc/hide-exits/contents+en.lrquestion.description)
+msgid ""
+"The time they might otherwise have spent blocking Tor, they may instead "
+"spend rethinking their overall approach to privacy and anonymity."
+msgstr ""
+
#: https//support.torproject.org/misc/menu/
#: (content/misc/menu/contents+en.lrquestion.description)
msgid "About"
@@ -10274,56 +11303,20 @@ msgstr ""
#: https//support.torproject.org/get-in-touch/why-i-cant-join-tor-channels/
#: (content/get-in-touch/why-i-cant-join-tor-channels/contents+en.lrquestion.description)
msgid ""
-"Then, to complete the registration and ultimately gain access to the #tor-"
-"project channel, your nickname must be **verified**."
-msgstr ""
-
-#: https//support.torproject.org/get-in-touch/why-i-cant-join-tor-channels/
-#: (content/get-in-touch/why-i-cant-join-tor-channels/contents+en.lrquestion.description)
-msgid ""
-"1. To verify your nick, open a new browser window and go to "
-"https://webchat.oftc.net/?channels=tor."
-msgstr ""
-
-#: https//support.torproject.org/get-in-touch/why-i-cant-join-tor-channels/
-#: (content/get-in-touch/why-i-cant-join-tor-channels/contents+en.lrquestion.description)
-msgid "2. Log in with your IRC nickname and password."
-msgstr ""
-
-#: https//support.torproject.org/get-in-touch/why-i-cant-join-tor-channels/
-#: (content/get-in-touch/why-i-cant-join-tor-channels/contents+en.lrquestion.description)
-msgid ""
-"3. Look for the word **verify** and log in there. It may appear that nothing"
-" has happened. Look at the top of the page, and there will be a column "
-"called **Account**."
-msgstr ""
-
-#: https//support.torproject.org/get-in-touch/why-i-cant-join-tor-channels/
-#: (content/get-in-touch/why-i-cant-join-tor-channels/contents+en.lrquestion.description)
-msgid "4. Click on **Account**."
-msgstr ""
-
-#: https//support.torproject.org/get-in-touch/why-i-cant-join-tor-channels/
-#: (content/get-in-touch/why-i-cant-join-tor-channels/contents+en.lrquestion.description)
-msgid ""
-"5. Click on the small sentence at the bottom of the square that says: Verify"
-" account."
-msgstr ""
-
-#: https//support.torproject.org/get-in-touch/why-i-cant-join-tor-channels/
-#: (content/get-in-touch/why-i-cant-join-tor-channels/contents+en.lrquestion.description)
-msgid "6. Fill out the Captcha that pops up, and click ok."
+"After registering your nickname, to gain access to the #tor-project and "
+"other protected channels, your nickname must be **verified**."
msgstr ""
#: https//support.torproject.org/get-in-touch/why-i-cant-join-tor-channels/
#: (content/get-in-touch/why-i-cant-join-tor-channels/contents+en.lrquestion.description)
msgid ""
-"7. A tiny message will appear: \"Your NickServ account has been verified.\""
+"1. Go to https://services.oftc.net/ and follow the steps in the '*To verify "
+"your account*' section"
msgstr ""
#: https//support.torproject.org/get-in-touch/why-i-cant-join-tor-channels/
#: (content/get-in-touch/why-i-cant-join-tor-channels/contents+en.lrquestion.description)
-msgid "8. Go back to the IRC webpage where you are logged in and type:"
+msgid "2. Go back to the IRC webpage where you are logged in and type:"
msgstr ""
#: https//support.torproject.org/get-in-touch/why-i-cant-join-tor-channels/
@@ -10333,12 +11326,12 @@ msgstr ""
#: https//support.torproject.org/get-in-touch/why-i-cant-join-tor-channels/
#: (content/get-in-touch/why-i-cant-join-tor-channels/contents+en.lrquestion.description)
-msgid "9. Click ENTER."
+msgid "3. Click ENTER."
msgstr ""
#: https//support.torproject.org/get-in-touch/why-i-cant-join-tor-channels/
#: (content/get-in-touch/why-i-cant-join-tor-channels/contents+en.lrquestion.description)
-msgid "10. If all is well, you will receive a message that says:"
+msgid "4. If all is well, you will receive a message that says:"
msgstr ""
#: https//support.torproject.org/get-in-touch/why-i-cant-join-tor-channels/
@@ -10479,19 +11472,23 @@ msgstr "# apt install apt-transport-https"
#: https//support.torproject.org/apt/tor-deb-repo/
#: (content/apt/apt-1/contents+en.lrquestion.description)
msgid ""
-"#### 2. Add the following entries to `/etc/apt/sources.list` or a new file "
-"in `/etc/apt/sources.list.d/`"
+"#### 2. Create a new file in `/etc/apt/sources.list.d/` named `tor.list`. "
+"Add the following entries:"
msgstr ""
#: https//support.torproject.org/apt/tor-deb-repo/
#: (content/apt/apt-1/contents+en.lrquestion.description)
-msgid "deb https://deb.torproject.org/torproject.org <DISTRIBUTION> main"
+msgid ""
+"deb [signed-by=/usr/share/keyrings/tor-archive-keyring.gpg] "
+"https://deb.torproject.org/torproject.org <DISTRIBUTION> main"
msgstr ""
#: https//support.torproject.org/apt/tor-deb-repo/
#: (content/apt/apt-1/contents+en.lrquestion.description)
-msgid "deb-src https://deb.torproject.org/torproject.org <DISTRIBUTION> main"
-msgstr "deb-src https://deb.torproject.org/torproject.org <DISTRIBUTION> main"
+msgid ""
+"deb-src [signed-by=/usr/share/keyrings/tor-archive-keyring.gpg] "
+"https://deb.torproject.org/torproject.org <DISTRIBUTION> main"
+msgstr ""
#: https//support.torproject.org/apt/tor-deb-repo/
#: (content/apt/apt-1/contents+en.lrquestion.description)
@@ -10504,14 +11501,16 @@ msgstr ""
#: https//support.torproject.org/apt/tor-deb-repo/
#: (content/apt/apt-1/contents+en.lrquestion.description)
msgid ""
-"deb https://deb.torproject.org/torproject.org tor-"
+"deb [signed-by=/usr/share/keyrings/tor-archive-keyring.gpg] "
+"https://deb.torproject.org/torproject.org tor-"
"experimental-0.4.6.x-<DISTRIBUTION> main"
msgstr ""
#: https//support.torproject.org/apt/tor-deb-repo/
#: (content/apt/apt-1/contents+en.lrquestion.description)
msgid ""
-"deb-src https://deb.torproject.org/torproject.org tor-"
+"deb-src [signed-by=/usr/share/keyrings/tor-archive-keyring.gpg] "
+"https://deb.torproject.org/torproject.org tor-"
"experimental-0.4.6.x-<DISTRIBUTION> main"
msgstr ""
@@ -10523,18 +11522,18 @@ msgstr ""
#: https//support.torproject.org/apt/tor-deb-repo/
#: (content/apt/apt-1/contents+en.lrquestion.description)
msgid ""
-"deb https://deb.torproject.org/torproject.org tor-nightly-"
-"master-<DISTRIBUTION> main"
+"deb [signed-by=/usr/share/keyrings/tor-archive-keyring.gpg] "
+"https://deb.torproject.org/torproject.org tor-nightly-master-<DISTRIBUTION> "
+"main"
msgstr ""
#: https//support.torproject.org/apt/tor-deb-repo/
#: (content/apt/apt-1/contents+en.lrquestion.description)
msgid ""
-"deb-src https://deb.torproject.org/torproject.org tor-nightly-"
-"master-<DISTRIBUTION> main"
+"deb-src [signed-by=/usr/share/keyrings/tor-archive-keyring.gpg] "
+"https://deb.torproject.org/torproject.org tor-nightly-master-<DISTRIBUTION> "
+"main"
msgstr ""
-"deb-src https://deb.torproject.org/torproject.org tor-nightly-"
-"master-<DISTRIBUTION> main"
#: https//support.torproject.org/apt/tor-deb-repo/
#: (content/apt/apt-1/contents+en.lrquestion.description)
@@ -10554,13 +11553,15 @@ msgstr ""
#: https//support.torproject.org/apt/tor-deb-repo/
#: (content/apt/apt-1/contents+en.lrquestion.description)
msgid ""
-"deb [arch=amd64] https://deb.torproject.org/torproject.org focal main"
+"deb [arch=amd64 signed-by=/usr/share/keyrings/tor-archive-keyring.gpg] "
+"https://deb.torproject.org/torproject.org focal main"
msgstr ""
#: https//support.torproject.org/apt/tor-deb-repo/
#: (content/apt/apt-1/contents+en.lrquestion.description)
msgid ""
-"deb-src [arch=amd64] https://deb.torproject.org/torproject.org focal main"
+"deb-src [arch=amd64 signed-by=/usr/share/keyrings/tor-archive-keyring.gpg] "
+"https://deb.torproject.org/torproject.org focal main"
msgstr ""
#: https//support.torproject.org/apt/tor-deb-repo/
@@ -10580,24 +11581,18 @@ msgstr ""
#: (content/apt/apt-1/contents+en.lrquestion.description)
msgid ""
"#### 3. Then add the gpg key used to sign the packages by running the "
-"following commands at your command prompt"
+"following command at your command prompt:"
msgstr ""
#: https//support.torproject.org/apt/tor-deb-repo/
#: (content/apt/apt-1/contents+en.lrquestion.description)
msgid ""
-"# wget -qO- "
+"# wget -O- "
"https://deb.torproject.org/torproject.org/A3C4F0F979CAA22CDBA8F512EE8CBC9E886DDD89.asc"
-" | gpg --import"
+" | gpg --dearmor | tee /usr/share/keyrings/tor-archive-keyring.gpg "
+">/dev/null"
msgstr ""
-#: https//support.torproject.org/apt/tor-deb-repo/
-#: (content/apt/apt-1/contents+en.lrquestion.description)
-msgid ""
-"# gpg --export A3C4F0F979CAA22CDBA8F512EE8CBC9E886DDD89 | apt-key add -"
-msgstr ""
-"# gpg --export A3C4F0F979CAA22CDBA8F512EE8CBC9E886DDD89 | apt-key add -"
-
#: https//support.torproject.org/apt/tor-deb-repo/
#: (content/apt/apt-1/contents+en.lrquestion.description)
msgid "#### 4. Install tor and tor debian keyring"
@@ -12202,6 +13197,82 @@ msgid ""
"doesn't change IP address over the day."
msgstr ""
+#: https//support.torproject.org/alternate-designs/block-websites/
+#: (content/alternate-designs/block-websites/contents+en.lrquestion.title)
+msgid "Exit policies should be able to block websites, not just IP addresses."
+msgstr ""
+
+#: https//support.torproject.org/alternate-designs/block-websites/
+#: (content/alternate-designs/block-websites/contents+en.lrquestion.description)
+msgid ""
+"It would be nice to let relay operators say things like `reject "
+"www.slashdot.org` in their exit policies, rather than requiring them to "
+"learn all the IP address space that could be covered by the site (and then "
+"also blocking other sites at those IP addresses)."
+msgstr ""
+
+#: https//support.torproject.org/alternate-designs/block-websites/
+#: (content/alternate-designs/block-websites/contents+en.lrquestion.description)
+msgid "There are two problems, though."
+msgstr ""
+
+#: https//support.torproject.org/alternate-designs/block-websites/
+#: (content/alternate-designs/block-websites/contents+en.lrquestion.description)
+msgid "First, users could still get around these blocks."
+msgstr ""
+
+#: https//support.torproject.org/alternate-designs/block-websites/
+#: (content/alternate-designs/block-websites/contents+en.lrquestion.description)
+msgid ""
+"For example, they could request the IP address rather than the hostname when"
+" they exit from the Tor network."
+msgstr ""
+
+#: https//support.torproject.org/alternate-designs/block-websites/
+#: (content/alternate-designs/block-websites/contents+en.lrquestion.description)
+msgid ""
+"This means operators would still need to learn all the IP addresses for the "
+"destinations in question."
+msgstr ""
+
+#: https//support.torproject.org/alternate-designs/block-websites/
+#: (content/alternate-designs/block-websites/contents+en.lrquestion.description)
+msgid ""
+"The second problem is that it would allow remote attackers to censor "
+"arbitrary sites."
+msgstr ""
+
+#: https//support.torproject.org/alternate-designs/block-websites/
+#: (content/alternate-designs/block-websites/contents+en.lrquestion.description)
+msgid ""
+"For example, if a Tor operator blocks www1.slashdot.org, and then some "
+"attacker poisons the Tor relay's DNS or otherwise changes that hostname to "
+"resolve to the IP address for a major news site, then suddenly that Tor "
+"relay is blocking the news site."
+msgstr ""
+
+#: https//support.torproject.org/alternate-designs/let-the-network-pick-the-path/
+#: (content/alternate-designs/let-the-network-pick-the-path/contents+en.lrquestion.title)
+msgid "You should let the network pick the path, not the client."
+msgstr ""
+
+#: https//support.torproject.org/alternate-designs/let-the-network-pick-the-path/
+#: (content/alternate-designs/let-the-network-pick-the-path/contents+en.lrquestion.description)
+msgid "No, you cannot trust the network to pick the path."
+msgstr ""
+
+#: https//support.torproject.org/alternate-designs/let-the-network-pick-the-path/
+#: (content/alternate-designs/let-the-network-pick-the-path/contents+en.lrquestion.description)
+msgid "Malicious relays could route you through their colluding friends."
+msgstr ""
+
+#: https//support.torproject.org/alternate-designs/let-the-network-pick-the-path/
+#: (content/alternate-designs/let-the-network-pick-the-path/contents+en.lrquestion.description)
+msgid ""
+"This would give an adversary the ability to watch all of your traffic end to"
+" end."
+msgstr ""
+
#: lego/templates/banner.html:3 lego/templates/banner.html:5
#: templates/banner.html:3 templates/banner.html:5
msgid "Close banner"
@@ -12233,8 +13304,8 @@ msgid "DONATE NOW"
msgstr "STYRKJA NÃNA"
#: lego/templates/footer.html:13 lego/templates/footer.html:22
-#: lego/templates/navbar.html:83 templates/footer.html:13
-#: templates/footer.html:22 templates/navbar.html:83
+#: lego/templates/navbar.html:95 templates/footer.html:13
+#: templates/footer.html:22 templates/navbar.html:95
msgid "Download Tor Browser"
msgstr "Sæktu Tor-vafrann"
diff --git a/contents+it.po b/contents+it.po
index d44326c33f..affb4fe82a 100644
--- a/contents+it.po
+++ b/contents+it.po
@@ -18,21 +18,21 @@
# francesco ercolani <erco99 at live.it>, 2020
# Luke <94lukecatellani at gmail.com>, 2020
# fabio carletti <fabiocarlettiryuw at gmail.com>, 2020
-# giulio marino <iulio.marino at gmail.com>, 2020
# Irene Quadrelli <irene.quadrelli at gmail.com>, 2020
# fbd, 2020
# Alex G <alecs at alecs.ga>, 2021
# P P, 2021
# Emma Peel, 2021
# Random_R, 2021
+# giulio marino <iulio.marino at gmail.com>, 2021
#
msgid ""
msgstr ""
"Project-Id-Version: PACKAGE VERSION\n"
"Report-Msgid-Bugs-To: \n"
-"POT-Creation-Date: 2021-08-25 11:14+CET\n"
+"POT-Creation-Date: 2021-09-01 12:20+CET\n"
"PO-Revision-Date: 2018-10-02 22:41+0000\n"
-"Last-Translator: Random_R, 2021\n"
+"Last-Translator: giulio marino <iulio.marino at gmail.com>, 2021\n"
"Language-Team: Italian (https://www.transifex.com/otf/teams/1519/it/)\n"
"MIME-Version: 1.0\n"
"Content-Type: text/plain; charset=UTF-8\n"
@@ -163,6 +163,11 @@ msgstr "Domande frequenti sull'abuso"
msgid "Tor Metrics"
msgstr "Metriche di Tor"
+#: https//support.torproject.org/alternate-designs/
+#: (content/alternate-designs/contents+en.lrtopic.title)
+msgid "Alternate Designs We Don't Do (Yet)"
+msgstr ""
+
#: https//support.torproject.org/glossary/add-on-extension-or-plugin/
#: (content/glossary/add-on-extension-or-plugin/contents+en.lrword.term)
msgid "add-on, extension, or plugin"
@@ -2495,6 +2500,61 @@ msgstr ""
"Puoi trovare informazioni più dettagliate riguardo Tor + VPN sulla [nostra "
"wiki](https://trac.torproject.org/projects/tor/wiki/doc/TorPlusVPN)."
+#: https//support.torproject.org/faq/relay-donations/
+#: (content/faq/relay-donations/contents+en.lrquestion.title)
+msgid "Can I donate for a relay rather than run my own?"
+msgstr ""
+
+#: https//support.torproject.org/faq/relay-donations/
+#: (content/faq/relay-donations/contents+en.lrquestion.description)
+msgid ""
+"Sure! We have a [list of organizations that run Tor "
+"relays](https://community.torproject.org/relay/community-resources/relay-"
+"associations/) that are happy to turn your donations into better speed and "
+"anonymity for the Tor network."
+msgstr ""
+
+#: https//support.torproject.org/faq/relay-donations/
+#: (content/faq/relay-donations/contents+en.lrquestion.description)
+msgid ""
+"These organizations are not the same as [The Tor Project, "
+"Inc](https://donate.torproject.org/), but we consider that a good thing."
+msgstr ""
+
+#: https//support.torproject.org/faq/relay-donations/
+#: (content/faq/relay-donations/contents+en.lrquestion.description)
+msgid "They're run by nice people who are part of the Tor community."
+msgstr "Sono gestite da gente notevole che è parte della community di Tor."
+
+#: https//support.torproject.org/faq/relay-donations/
+#: (content/faq/relay-donations/contents+en.lrquestion.description)
+msgid ""
+"Note that there can be a tradeoff here between anonymity and performance."
+msgstr ""
+
+#: https//support.torproject.org/faq/relay-donations/
+#: (content/faq/relay-donations/contents+en.lrquestion.description)
+msgid ""
+"The Tor network's anonymity comes in part from diversity, so if you are in a"
+" position to run your own relay, you will be improving Tor's anonymity more "
+"than by donating."
+msgstr ""
+
+#: https//support.torproject.org/faq/relay-donations/
+#: (content/faq/relay-donations/contents+en.lrquestion.description)
+msgid ""
+"At the same time though, economies of scale for bandwidth mean that "
+"combining many small donations into several larger relays is more efficient "
+"at improving network performance."
+msgstr ""
+
+#: https//support.torproject.org/faq/relay-donations/
+#: (content/faq/relay-donations/contents+en.lrquestion.description)
+msgid ""
+"Improving anonymity and improving performance are both worthwhile goals, so "
+"however you can help is great!"
+msgstr ""
+
#: https//support.torproject.org/faq/staying-anonymous/
#: (content/faq/staying-anonymous/contents+en.lrquestion.title)
msgid "Am I totally anonymous if I use Tor?"
@@ -2868,6 +2928,61 @@ msgstr ""
"Questa lista di vulnerabilità non è completa, e ci serve il tuo aiuto per "
"[identificare e documentare i problemi](https://community.torproject.org/)."
+#: https//support.torproject.org/about/attacks-on-onion-routing/
+#: (content/about/attacks-on-onion-routing/contents+en.lrquestion.title)
+msgid "What attacks remain against onion routing?"
+msgstr ""
+
+#: https//support.torproject.org/about/attacks-on-onion-routing/
+#: (content/about/attacks-on-onion-routing/contents+en.lrquestion.description)
+msgid ""
+"As mentioned above, it is possible for an observer who can view both you and"
+" either the destination website or your Tor exit node to correlate timings "
+"of your traffic as it enters the Tor network and also as it exits."
+msgstr ""
+
+#: https//support.torproject.org/about/attacks-on-onion-routing/
+#: (content/about/attacks-on-onion-routing/contents+en.lrquestion.description)
+msgid "Tor does not defend against such a threat model."
+msgstr ""
+
+#: https//support.torproject.org/about/attacks-on-onion-routing/
+#: (content/about/attacks-on-onion-routing/contents+en.lrquestion.description)
+msgid ""
+"In a more limited sense, note that if a censor or law enforcement agency has"
+" the ability to obtain specific observation of parts of the network, it is "
+"possible for them to verify a suspicion that you talk regularly to your "
+"friend by observing traffic at both ends and correlating the timing of only "
+"that traffic."
+msgstr ""
+
+#: https//support.torproject.org/about/attacks-on-onion-routing/
+#: (content/about/attacks-on-onion-routing/contents+en.lrquestion.description)
+msgid ""
+"Again, this is only useful to verify that parties already suspected of "
+"communicating with one another are doing so."
+msgstr ""
+
+#: https//support.torproject.org/about/attacks-on-onion-routing/
+#: (content/about/attacks-on-onion-routing/contents+en.lrquestion.description)
+msgid ""
+"In most countries, the suspicion required to obtain a warrant already "
+"carries more weight than timing correlation would provide."
+msgstr ""
+
+#: https//support.torproject.org/about/attacks-on-onion-routing/
+#: (content/about/attacks-on-onion-routing/contents+en.lrquestion.description)
+msgid ""
+"Furthermore, since Tor reuses circuits for multiple TCP connections, it is "
+"possible to associate non anonymous and anonymous traffic at a given exit "
+"node, so be careful about what applications you run concurrently over Tor."
+msgstr ""
+
+#: https//support.torproject.org/about/attacks-on-onion-routing/
+#: (content/about/attacks-on-onion-routing/contents+en.lrquestion.description)
+msgid "Perhaps even run separate Tor clients for these applications."
+msgstr ""
+
#: https//support.torproject.org/about/backdoor/
#: (content/about/backdoor/contents+en.lrquestion.title)
msgid "Is there a backdoor in Tor?"
@@ -3036,6 +3151,43 @@ msgid ""
msgstr ""
"Usare Tor con altri browser è [pericoloso e non raccomandato](/tbb/tbb-9/)."
+#: https//support.torproject.org/about/change-paths/
+#: (content/about/change-paths/contents+en.lrquestion.title)
+msgid "How often does Tor change its paths?"
+msgstr ""
+
+#: https//support.torproject.org/about/change-paths/
+#: (content/about/change-paths/contents+en.lrquestion.description)
+msgid ""
+"Tor will reuse the same circuit for new TCP streams for 10 minutes, as long "
+"as the circuit is working fine."
+msgstr ""
+
+#: https//support.torproject.org/about/change-paths/
+#: (content/about/change-paths/contents+en.lrquestion.description)
+msgid "(If the circuit fails, Tor will switch to a new circuit immediately.)"
+msgstr ""
+
+#: https//support.torproject.org/about/change-paths/
+#: (content/about/change-paths/contents+en.lrquestion.description)
+msgid ""
+"But note that a single TCP stream (e.g. a long IRC connection) will stay on "
+"the same circuit forever."
+msgstr ""
+
+#: https//support.torproject.org/about/change-paths/
+#: (content/about/change-paths/contents+en.lrquestion.description)
+msgid "We don't rotate individual streams from one circuit to the next."
+msgstr ""
+
+#: https//support.torproject.org/about/change-paths/
+#: (content/about/change-paths/contents+en.lrquestion.description)
+msgid ""
+"Otherwise, an adversary with a partial view of the network would be given "
+"many chances over time to link you to your destination, rather than just one"
+" chance."
+msgstr ""
+
#: https//support.torproject.org/about/distribute-tor/
#: (content/about/distribute-tor/contents+en.lrquestion.title)
msgid "Can I distribute Tor?"
@@ -3150,6 +3302,133 @@ msgstr ""
"Guarda le nostre [FAQ marchio](https://www.torproject.org/about/trademark/) "
"per i dettagli."
+#: https//support.torproject.org/about/entry-guards/
+#: (content/about/entry-guards/contents+en.lrquestion.title)
+msgid "What are Entry Guards?"
+msgstr ""
+
+#: https//support.torproject.org/about/entry-guards/
+#: (content/about/entry-guards/contents+en.lrquestion.description)
+msgid ""
+"Tor (like all current practical low-latency anonymity designs) fails when "
+"the attacker can see both ends of the communications channel."
+msgstr ""
+
+#: https//support.torproject.org/about/entry-guards/
+#: (content/about/entry-guards/contents+en.lrquestion.description)
+msgid ""
+"For example, suppose the attacker controls or watches the Tor relay you "
+"choose to enter the network, and also controls or watches the website you "
+"visit."
+msgstr ""
+
+#: https//support.torproject.org/about/entry-guards/
+#: (content/about/entry-guards/contents+en.lrquestion.description)
+msgid ""
+"In this case, the research community knows no practical low-latency design "
+"that can reliably stop the attacker from correlating volume and timing "
+"information on the two sides."
+msgstr ""
+
+#: https//support.torproject.org/about/entry-guards/
+#: (content/about/entry-guards/contents+en.lrquestion.description)
+msgid "So, what should we do?"
+msgstr ""
+
+#: https//support.torproject.org/about/entry-guards/
+#: (content/about/entry-guards/contents+en.lrquestion.description)
+msgid "Suppose the attacker controls, or can observe, C relays."
+msgstr ""
+
+#: https//support.torproject.org/about/entry-guards/
+#: (content/about/entry-guards/contents+en.lrquestion.description)
+msgid "Suppose there are N relays total."
+msgstr ""
+
+#: https//support.torproject.org/about/entry-guards/
+#: (content/about/entry-guards/contents+en.lrquestion.description)
+msgid ""
+"If you select new entry and exit relays each time you use the network, the "
+"attacker will be able to correlate all traffic you send with probability "
+"around (c/n)2."
+msgstr ""
+
+#: https//support.torproject.org/about/entry-guards/
+#: (content/about/entry-guards/contents+en.lrquestion.description)
+msgid ""
+"But profiling is, for most users, as bad as being traced all the time: they "
+"want to do something often without an attacker noticing, and the attacker "
+"noticing once is as bad as the attacker noticing more often."
+msgstr ""
+
+#: https//support.torproject.org/about/entry-guards/
+#: (content/about/entry-guards/contents+en.lrquestion.description)
+msgid ""
+"Thus, choosing many random entries and exits gives the user no chance of "
+"escaping profiling by this kind of attacker."
+msgstr ""
+
+#: https//support.torproject.org/about/entry-guards/
+#: (content/about/entry-guards/contents+en.lrquestion.description)
+msgid ""
+"The solution is \"entry guards\": each Tor client selects a few relays at "
+"random to use as entry points, and uses only those relays for their first "
+"hop."
+msgstr ""
+
+#: https//support.torproject.org/about/entry-guards/
+#: (content/about/entry-guards/contents+en.lrquestion.description)
+msgid ""
+"If those relays are not controlled or observed, the attacker can't win, "
+"ever, and the user is secure."
+msgstr ""
+
+#: https//support.torproject.org/about/entry-guards/
+#: (content/about/entry-guards/contents+en.lrquestion.description)
+msgid ""
+"If those relays are observed or controlled by the attacker, the attacker "
+"sees a larger fraction of the user's traffic - but still the user is no more"
+" profiled than before."
+msgstr ""
+
+#: https//support.torproject.org/about/entry-guards/
+#: (content/about/entry-guards/contents+en.lrquestion.description)
+msgid ""
+"Thus, the user has some chance (on the order of (n-c)/n) of avoiding "
+"profiling, whereas they had none before."
+msgstr ""
+
+#: https//support.torproject.org/about/entry-guards/
+#: (content/about/entry-guards/contents+en.lrquestion.description)
+msgid ""
+"You can read more at [An Analysis of the Degradation of Anonymous "
+"Protocols](http://freehaven.net/anonbib/#wright02), [Defending Anonymous "
+"Communication Against Passive Logging "
+"Attacks](http://freehaven.net/anonbib/#wright03), and especially [Locating "
+"Hidden Servers](http://freehaven.net/anonbib/#hs-attack06)."
+msgstr ""
+
+#: https//support.torproject.org/about/entry-guards/
+#: (content/about/entry-guards/contents+en.lrquestion.description)
+msgid ""
+"Restricting your entry nodes may also help against attackers who want to run"
+" a few Tor nodes and easily enumerate all of the Tor user IP addresses."
+msgstr ""
+
+#: https//support.torproject.org/about/entry-guards/
+#: (content/about/entry-guards/contents+en.lrquestion.description)
+msgid ""
+"(Even though they can't learn what destinations the users are talking to, "
+"they still might be able to do bad things with just a list of users.)"
+msgstr ""
+
+#: https//support.torproject.org/about/entry-guards/
+#: (content/about/entry-guards/contents+en.lrquestion.description)
+msgid ""
+"However, that feature won't really become useful until we move to a "
+"\"directory guard\" design as well."
+msgstr ""
+
#: https//support.torproject.org/about/how-is-tor-different-from-other-proxies/
#: (content/about/how-is-tor-different-from-other-proxies/contents+en.lrquestion.title)
msgid "How is Tor different from other proxies?"
@@ -3353,6 +3632,162 @@ msgstr ""
"Guarda questa rappresentazione di [Tor e HTTPS](/https/https-1/) per capire "
"come interagiscono Tor e HTTPS. "
+#: https//support.torproject.org/about/key-management/
+#: (content/about/key-management/contents+en.lrquestion.title)
+msgid "Tell me about all the keys Tor uses"
+msgstr ""
+
+#: https//support.torproject.org/about/key-management/
+#: (content/about/key-management/contents+en.lrquestion.description)
+msgid ""
+"Tor uses a variety of different keys, with three goals in mind: 1) "
+"encryption to ensure privacy of data within the Tor network, 2) "
+"authentication so clients know they're talking to the relays they meant to "
+"talk to, and 3) signatures to make sure all clients know the same set of "
+"relays."
+msgstr ""
+
+#: https//support.torproject.org/about/key-management/
+#: (content/about/key-management/contents+en.lrquestion.description)
+msgid ""
+"**Encryption**: first, all connections in Tor use TLS link encryption, so "
+"observers can't look inside to see which circuit a given cell is intended "
+"for."
+msgstr ""
+
+#: https//support.torproject.org/about/key-management/
+#: (content/about/key-management/contents+en.lrquestion.description)
+msgid ""
+"Further, the Tor client establishes an ephemeral encryption key with each "
+"relay in the circuit; these extra layers of encryption mean that only the "
+"exit relay can read the cells."
+msgstr ""
+
+#: https//support.torproject.org/about/key-management/
+#: (content/about/key-management/contents+en.lrquestion.description)
+msgid ""
+"Both sides discard the circuit key when the circuit ends, so logging traffic"
+" and then breaking into the relay to discover the key won't work."
+msgstr ""
+
+#: https//support.torproject.org/about/key-management/
+#: (content/about/key-management/contents+en.lrquestion.description)
+msgid ""
+"**Authentication**: Every Tor relay has a public decryption key called the "
+"\"onion key\"."
+msgstr ""
+
+#: https//support.torproject.org/about/key-management/
+#: (content/about/key-management/contents+en.lrquestion.description)
+msgid "Each relay rotates its onion key once a week."
+msgstr ""
+
+#: https//support.torproject.org/about/key-management/
+#: (content/about/key-management/contents+en.lrquestion.description)
+msgid ""
+"When the Tor client establishes circuits, at each step it [demands that the "
+"Tor relay prove knowledge of its onion key](https://svn-"
+"archive.torproject.org/svn/projects/design-paper/tor-"
+"design.html#subsec:circuits)."
+msgstr ""
+
+#: https//support.torproject.org/about/key-management/
+#: (content/about/key-management/contents+en.lrquestion.description)
+msgid ""
+"That way the first node in the path can't just spoof the rest of the path."
+msgstr ""
+
+#: https//support.torproject.org/about/key-management/
+#: (content/about/key-management/contents+en.lrquestion.description)
+msgid ""
+"Because the Tor client chooses the path, it can make sure to get Tor's "
+"\"distributed trust\" property: no single relay in the path can know about "
+"both the client and what the client is doing."
+msgstr ""
+
+#: https//support.torproject.org/about/key-management/
+#: (content/about/key-management/contents+en.lrquestion.description)
+msgid ""
+"**Coordination**: How do clients know what the relays are, and how do they "
+"know that they have the right keys for them?"
+msgstr ""
+
+#: https//support.torproject.org/about/key-management/
+#: (content/about/key-management/contents+en.lrquestion.description)
+msgid "Each relay has a long-term public signing key called the \"identity key\"."
+msgstr ""
+
+#: https//support.torproject.org/about/key-management/
+#: (content/about/key-management/contents+en.lrquestion.description)
+msgid "Each directory authority additionally has a \"directory signing key\"."
+msgstr ""
+
+#: https//support.torproject.org/about/key-management/
+#: (content/about/key-management/contents+en.lrquestion.description)
+msgid ""
+"The directory authorities [provide a signed "
+"list](https://gitweb.torproject.org/torspec.git/tree/dir-spec.txt) of all "
+"the known relays, and in that list are a set of certificates from each relay"
+" (self-signed by their identity key) specifying their keys, locations, exit "
+"policies, and so on."
+msgstr ""
+
+#: https//support.torproject.org/about/key-management/
+#: (content/about/key-management/contents+en.lrquestion.description)
+msgid ""
+"So unless the adversary can control a majority of the directory authorities "
+"(as of 2021 there are 10 directory authorities), they can't trick the Tor "
+"client into using other Tor relays."
+msgstr ""
+
+#: https//support.torproject.org/about/key-management/
+#: (content/about/key-management/contents+en.lrquestion.description)
+msgid "How do clients know what the directory authorities are?"
+msgstr ""
+
+#: https//support.torproject.org/about/key-management/
+#: (content/about/key-management/contents+en.lrquestion.description)
+msgid ""
+"The Tor software comes with a built-in list of location and public key for "
+"each directory authority."
+msgstr ""
+
+#: https//support.torproject.org/about/key-management/
+#: (content/about/key-management/contents+en.lrquestion.description)
+msgid ""
+"So the only way to trick users into using a fake Tor network is to give them"
+" a specially modified version of the software."
+msgstr ""
+
+#: https//support.torproject.org/about/key-management/
+#: (content/about/key-management/contents+en.lrquestion.description)
+msgid "How do users know they've got the right software?"
+msgstr ""
+
+#: https//support.torproject.org/about/key-management/
+#: (content/about/key-management/contents+en.lrquestion.description)
+msgid ""
+"When we distribute the source code or a package, we digitally sign it with "
+"[GNU Privacy Guard](http://www.gnupg.org/). See the [instructions on how to "
+"check Tor Browser's signature](https://support.torproject.org/tbb/how-to-"
+"verify-signature/)."
+msgstr ""
+
+#: https//support.torproject.org/about/key-management/
+#: (content/about/key-management/contents+en.lrquestion.description)
+msgid ""
+"In order to be certain that it's really signed by us, you need to have met "
+"us in person and gotten a copy of our GPG key fingerprint, or you need to "
+"know somebody who has."
+msgstr ""
+
+#: https//support.torproject.org/about/key-management/
+#: (content/about/key-management/contents+en.lrquestion.description)
+msgid ""
+"If you're concerned about an attack on this level, we recommend you get "
+"involved with the security community and start meeting people."
+msgstr ""
+
#: https//support.torproject.org/about/no-data-scrubbing/
#: (content/about/no-data-scrubbing/contents+en.lrquestion.title)
msgid ""
@@ -3393,6 +3828,151 @@ msgstr ""
"Tor Browser, tuttavia, non può fare nulla per il testo che digiti nei "
"moduli."
+#: https//support.torproject.org/about/protections/
+#: (content/about/protections/contents+en.lrquestion.title)
+msgid "What protections does Tor provide?"
+msgstr ""
+
+#: https//support.torproject.org/about/protections/
+#: (content/about/protections/contents+en.lrquestion.description)
+msgid ""
+"Internet communication is based on a store-and-forward model that can be "
+"understood in analogy to postal mail: Data is transmitted in blocks called "
+"IP datagrams or packets."
+msgstr ""
+
+#: https//support.torproject.org/about/protections/
+#: (content/about/protections/contents+en.lrquestion.description)
+msgid ""
+"Every packet includes a source IP address (of the sender) and a destination "
+"IP address (of the receiver), just as ordinary letters contain postal "
+"addresses of sender and receiver."
+msgstr ""
+
+#: https//support.torproject.org/about/protections/
+#: (content/about/protections/contents+en.lrquestion.description)
+msgid ""
+"The way from sender to receiver involves multiple hops of routers, where "
+"each router inspects the destination IP address and forwards the packet "
+"closer to its destination."
+msgstr ""
+
+#: https//support.torproject.org/about/protections/
+#: (content/about/protections/contents+en.lrquestion.description)
+msgid ""
+"Thus, every router between sender and receiver learns that the sender is "
+"communicating with the receiver."
+msgstr ""
+
+#: https//support.torproject.org/about/protections/
+#: (content/about/protections/contents+en.lrquestion.description)
+msgid ""
+"In particular, your local ISP is in the position to build a complete profile"
+" of your Internet usage."
+msgstr ""
+
+#: https//support.torproject.org/about/protections/
+#: (content/about/protections/contents+en.lrquestion.description)
+msgid ""
+"In addition, every server in the Internet that can see any of the packets "
+"can profile your behavior."
+msgstr ""
+
+#: https//support.torproject.org/about/protections/
+#: (content/about/protections/contents+en.lrquestion.description)
+msgid ""
+"The aim of Tor is to improve your privacy by sending your traffic through a "
+"series of proxies."
+msgstr ""
+
+#: https//support.torproject.org/about/protections/
+#: (content/about/protections/contents+en.lrquestion.description)
+msgid ""
+"Your communication is encrypted in multiple layers and routed via multiple "
+"hops through the Tor network to the final receiver."
+msgstr ""
+
+#: https//support.torproject.org/about/protections/
+#: (content/about/protections/contents+en.lrquestion.description)
+msgid ""
+"More details on this process can be found in this "
+"[visualization](https://support.torproject.org/https/https-1/)."
+msgstr ""
+
+#: https//support.torproject.org/about/protections/
+#: (content/about/protections/contents+en.lrquestion.description)
+msgid ""
+"Note that all your local ISP can observe now is that you are communicating "
+"with Tor nodes."
+msgstr ""
+
+#: https//support.torproject.org/about/protections/
+#: (content/about/protections/contents+en.lrquestion.description)
+msgid ""
+"Similarly, servers in the Internet just see that they are being contacted by"
+" Tor nodes."
+msgstr ""
+
+#: https//support.torproject.org/about/protections/
+#: (content/about/protections/contents+en.lrquestion.description)
+msgid "Generally speaking, Tor aims to solve three privacy problems:"
+msgstr ""
+
+#: https//support.torproject.org/about/protections/
+#: (content/about/protections/contents+en.lrquestion.description)
+msgid ""
+"First, Tor prevents websites and other services from learning your location,"
+" which they can use to build databases about your habits and interests."
+msgstr ""
+
+#: https//support.torproject.org/about/protections/
+#: (content/about/protections/contents+en.lrquestion.description)
+msgid ""
+"With Tor, your Internet connections don't give you away by default -- now "
+"you can have the ability to choose, for each connection, how much "
+"information to reveal."
+msgstr ""
+
+#: https//support.torproject.org/about/protections/
+#: (content/about/protections/contents+en.lrquestion.description)
+msgid ""
+"Second, Tor prevents people watching your traffic locally (such as your ISP "
+"or someone with access to your home wifi or router) from learning what "
+"information you're fetching and where you're fetching it from."
+msgstr ""
+
+#: https//support.torproject.org/about/protections/
+#: (content/about/protections/contents+en.lrquestion.description)
+msgid ""
+"It also stops them from deciding what you're allowed to learn and publish --"
+" if you can get to any part of the Tor network, you can reach any site on "
+"the Internet."
+msgstr ""
+
+#: https//support.torproject.org/about/protections/
+#: (content/about/protections/contents+en.lrquestion.description)
+msgid ""
+"Third, Tor routes your connection through more than one Tor relay so no "
+"single relay can learn what you're up to."
+msgstr ""
+
+#: https//support.torproject.org/about/protections/
+#: (content/about/protections/contents+en.lrquestion.description)
+msgid ""
+"Because these relays are run by different individuals or organizations, "
+"distributing trust provides more security than the old [one hop "
+"proxy](https://support.torproject.org/about/#how-is-tor-different-from-"
+"other-proxies) approach."
+msgstr ""
+
+#: https//support.torproject.org/about/protections/
+#: (content/about/protections/contents+en.lrquestion.description)
+msgid ""
+"Note, however, that there are situations where Tor fails to solve these "
+"privacy problems entirely: see the entry below on [remaining "
+"attacks](https://support.torproject.org/about/#attacks-on-onion-routing)."
+msgstr ""
+
#: https//support.torproject.org/about/what-is-tor/
#: (content/about/what-is-tor/contents+en.lrquestion.title)
msgid "What is Tor?"
@@ -6067,15 +6647,12 @@ msgstr ""
#: (content/tbb/tbb-47/contents+en.lrquestion.description)
msgid ""
"Also, read up on the HTTPProxyAuthenticator and HTTPSProxyAuthenticator "
-"options if your proxy requires auth. We only support basic auth currently, "
-"but if you need NTLM authentication, you may find [this post in the "
-"archives](https://archives.seul.org/or/talk/Jun-2005/msg00223.html) useful."
+"options if your [proxy requires auth.](https://developer.mozilla.org/en-"
+"US/docs/Web/HTTP/Headers/Proxy-Authenticate) We only support basic auth "
+"currently, but if you need NTLM authentication, you may find [this post in "
+"the archives](https://archives.seul.org/or/talk/Jun-2005/msg00223.html) "
+"useful."
msgstr ""
-"Altrimenti puoi leggere il HTTPSProxyAuthenticator and "
-"HTTPSProxyAuthenticator opzioni se il tuo proxy richiede l'autenticazione. "
-"Noi supportiamo solo basilari autenticazioni, ma necessiti di un NTLM "
-"autenticazione, potrà esserti utile [qusto post "
-"nell'archivio](https://archives.seul.org/or/talk/Jun-2005/msg00223.html). "
#: https//support.torproject.org/tbb/tbb-47/
#: (content/tbb/tbb-47/contents+en.lrquestion.description)
@@ -6355,6 +6932,219 @@ msgstr ""
"Ricorda, tutte le righe che iniziano con `#` in torrc sono trattate come "
"commenti e non hanno effetto sulla configurazione di Tor."
+#: https//support.torproject.org/tbb/tbb-firewall-ports/
+#: (content/tbb/tbb-firewall-ports/contents+en.lrquestion.title)
+msgid "My firewall only allows a few outgoing ports"
+msgstr ""
+
+#: https//support.torproject.org/tbb/tbb-firewall-ports/
+#: (content/tbb/tbb-firewall-ports/contents+en.lrquestion.description)
+msgid ""
+"If your firewall works by blocking ports, then you can tell Tor to only use "
+"the ports when you start your Tor Browser."
+msgstr ""
+
+#: https//support.torproject.org/tbb/tbb-firewall-ports/
+#: (content/tbb/tbb-firewall-ports/contents+en.lrquestion.description)
+msgid ""
+"Or you can add the ports that your firewall permits by adding "
+"\"FascistFirewall 1\" to your torrc configuration file."
+msgstr ""
+
+#: https//support.torproject.org/tbb/tbb-firewall-ports/
+#: (content/tbb/tbb-firewall-ports/contents+en.lrquestion.description)
+msgid ""
+"By default, when you set this Tor assumes that your firewall allows only "
+"port 80 and port 443 (HTTP and HTTPS respectively)."
+msgstr ""
+
+#: https//support.torproject.org/tbb/tbb-firewall-ports/
+#: (content/tbb/tbb-firewall-ports/contents+en.lrquestion.description)
+msgid ""
+"You can select a different set of ports with the FirewallPorts torrc option."
+msgstr ""
+
+#: https//support.torproject.org/tbb/tbb-firewall-ports/
+#: (content/tbb/tbb-firewall-ports/contents+en.lrquestion.description)
+msgid ""
+"If you want to be more fine-grained with your controls, you can also use the"
+" ReachableAddresses config options, e.g.:"
+msgstr ""
+
+#: https//support.torproject.org/tbb/tbb-firewall-ports/
+#: (content/tbb/tbb-firewall-ports/contents+en.lrquestion.description)
+#: https//support.torproject.org/tbb/tbb-install-tor-central-server/
+#: (content/tbb/tbb-install-tor-central-server/contents+en.lrquestion.description)
+#: https//support.torproject.org/operators/default-exit-ports/
+#: (content/operators/default-exit-ports/contents+en.lrquestion.description)
+#: https//support.torproject.org/operators/hibernation/
+#: (content/operators/hibernation/contents+en.lrquestion.description)
+#: https//support.torproject.org/operators/limit-total-bandwidth/
+#: (content/operators/limit-total-bandwidth/contents+en.lrquestion.description)
+#: https//support.torproject.org/misc/bug-or-feedback/
+#: (content/misc/bug-or-feedback/contents+en.lrquestion.description)
+#: https//support.torproject.org/get-in-touch/why-i-cant-join-tor-channels/
+#: (content/get-in-touch/why-i-cant-join-tor-channels/contents+en.lrquestion.description)
+#: https//support.torproject.org/apt/tor-deb-repo/
+#: (content/apt/apt-1/contents+en.lrquestion.description)
+#: https//support.torproject.org/apt/apt-over-tor/
+#: (content/apt/apt-3/contents+en.lrquestion.description)
+msgid "```"
+msgstr "```"
+
+#: https//support.torproject.org/tbb/tbb-firewall-ports/
+#: (content/tbb/tbb-firewall-ports/contents+en.lrquestion.description)
+msgid "ReachableDirAddresses *:80"
+msgstr ""
+
+#: https//support.torproject.org/tbb/tbb-firewall-ports/
+#: (content/tbb/tbb-firewall-ports/contents+en.lrquestion.description)
+msgid "ReachableORAddresses *:443"
+msgstr ""
+
+#: https//support.torproject.org/tbb/tbb-install-tor-central-server/
+#: (content/tbb/tbb-install-tor-central-server/contents+en.lrquestion.title)
+msgid ""
+"Can I install Tor on a central server, and have my clients connect to it?"
+msgstr ""
+
+#: https//support.torproject.org/tbb/tbb-install-tor-central-server/
+#: (content/tbb/tbb-install-tor-central-server/contents+en.lrquestion.description)
+msgid ""
+"Yes. Tor can be configured as a client or a relay on another machine, and "
+"allow other machines to be able to connect to it for anonymity."
+msgstr ""
+
+#: https//support.torproject.org/tbb/tbb-install-tor-central-server/
+#: (content/tbb/tbb-install-tor-central-server/contents+en.lrquestion.description)
+msgid ""
+"This is most useful in an environment where many computers want a gateway of"
+" anonymity to the rest of the world."
+msgstr ""
+
+#: https//support.torproject.org/tbb/tbb-install-tor-central-server/
+#: (content/tbb/tbb-install-tor-central-server/contents+en.lrquestion.description)
+msgid ""
+"However, be forewarned that with this configuration, anyone within your "
+"private network (existing between you and the Tor client/relay) can see what"
+" traffic you are sending in clear text."
+msgstr ""
+
+#: https//support.torproject.org/tbb/tbb-install-tor-central-server/
+#: (content/tbb/tbb-install-tor-central-server/contents+en.lrquestion.description)
+msgid "The anonymity doesn't start until you get to the Tor relay."
+msgstr ""
+
+#: https//support.torproject.org/tbb/tbb-install-tor-central-server/
+#: (content/tbb/tbb-install-tor-central-server/contents+en.lrquestion.description)
+msgid ""
+"Because of this, if you are the controller of your domain and you know "
+"everything's locked down, you will be OK, but this configuration may not be "
+"suitable for large private networks where security is key all around."
+msgstr ""
+
+#: https//support.torproject.org/tbb/tbb-install-tor-central-server/
+#: (content/tbb/tbb-install-tor-central-server/contents+en.lrquestion.description)
+msgid ""
+"Configuration is simple, editing your torrc file's SocksListenAddress "
+"according to the following examples:"
+msgstr ""
+
+#: https//support.torproject.org/tbb/tbb-install-tor-central-server/
+#: (content/tbb/tbb-install-tor-central-server/contents+en.lrquestion.description)
+msgid "SocksListenAddress 127.0.0.1"
+msgstr ""
+
+#: https//support.torproject.org/tbb/tbb-install-tor-central-server/
+#: (content/tbb/tbb-install-tor-central-server/contents+en.lrquestion.description)
+msgid "SocksListenAddress 192.168.x.x:9100"
+msgstr ""
+
+#: https//support.torproject.org/tbb/tbb-install-tor-central-server/
+#: (content/tbb/tbb-install-tor-central-server/contents+en.lrquestion.description)
+msgid "SocksListenAddress 0.0.0.0:9100"
+msgstr ""
+
+#: https//support.torproject.org/tbb/tbb-install-tor-central-server/
+#: (content/tbb/tbb-install-tor-central-server/contents+en.lrquestion.description)
+msgid ""
+"You can state multiple listen addresses, in the case that you are part of "
+"several networks or subnets."
+msgstr ""
+
+#: https//support.torproject.org/tbb/tbb-install-tor-central-server/
+#: (content/tbb/tbb-install-tor-central-server/contents+en.lrquestion.description)
+msgid "SocksListenAddress 192.168.x.x:9100 #eth0"
+msgstr ""
+
+#: https//support.torproject.org/tbb/tbb-install-tor-central-server/
+#: (content/tbb/tbb-install-tor-central-server/contents+en.lrquestion.description)
+msgid "SocksListenAddress 10.x.x.x:9100 #eth1"
+msgstr ""
+
+#: https//support.torproject.org/tbb/tbb-install-tor-central-server/
+#: (content/tbb/tbb-install-tor-central-server/contents+en.lrquestion.description)
+msgid ""
+"After this, your clients on their respective networks/subnets would specify "
+"a socks proxy with the address and port you specified SocksListenAddress to "
+"be."
+msgstr ""
+
+#: https//support.torproject.org/tbb/tbb-install-tor-central-server/
+#: (content/tbb/tbb-install-tor-central-server/contents+en.lrquestion.description)
+msgid ""
+"Please note that the SocksPort configuration option gives the port ONLY for "
+"localhost (127.0.0.1)."
+msgstr ""
+
+#: https//support.torproject.org/tbb/tbb-install-tor-central-server/
+#: (content/tbb/tbb-install-tor-central-server/contents+en.lrquestion.description)
+msgid ""
+"When setting up your SocksListenAddress(es), you need to give the port with "
+"the address, as shown above."
+msgstr ""
+
+#: https//support.torproject.org/tbb/tbb-install-tor-central-server/
+#: (content/tbb/tbb-install-tor-central-server/contents+en.lrquestion.description)
+msgid ""
+"If you are interested in forcing all outgoing data through the central Tor "
+"client/relay, instead of the server only being an optional proxy, you may "
+"find the program iptables (for *nix) useful."
+msgstr ""
+
+#: https//support.torproject.org/tbb/tbb-run-client-different-computer/
+#: (content/tbb/tbb-run-client-different-computer/contents+en.lrquestion.title)
+msgid ""
+"I want to run my Tor client on a different computer than my applications"
+msgstr ""
+
+#: https//support.torproject.org/tbb/tbb-run-client-different-computer/
+#: (content/tbb/tbb-run-client-different-computer/contents+en.lrquestion.description)
+msgid ""
+"By default, your Tor client only listens for applications that connect from "
+"localhost."
+msgstr ""
+
+#: https//support.torproject.org/tbb/tbb-run-client-different-computer/
+#: (content/tbb/tbb-run-client-different-computer/contents+en.lrquestion.description)
+msgid "Connections from other computers are refused."
+msgstr ""
+
+#: https//support.torproject.org/tbb/tbb-run-client-different-computer/
+#: (content/tbb/tbb-run-client-different-computer/contents+en.lrquestion.description)
+msgid ""
+"If you want to torify applications on different computers than the Tor "
+"client, you should edit your torrc to define `SocksListenAddress 0.0.0.0` "
+"and then restart (or hup) Tor."
+msgstr ""
+
+#: https//support.torproject.org/tbb/tbb-run-client-different-computer/
+#: (content/tbb/tbb-run-client-different-computer/contents+en.lrquestion.description)
+msgid ""
+"If you want to get more advanced, you can configure your Tor client on a "
+"firewall to bind to your internal IP but not your external IP."
+msgstr ""
+
#: https//support.torproject.org/tbb/website-blocking-tor/
#: (content/tbb/website-blocking-tor/contents+en.lrquestion.title)
msgid "A website I am trying to reach is blocking access over Tor."
@@ -8083,6 +8873,130 @@ msgid ""
"guide."
msgstr ""
+#: https//support.torproject.org/operators/default-exit-ports/
+#: (content/operators/default-exit-ports/contents+en.lrquestion.title)
+msgid "Is there a list of default exit ports?"
+msgstr ""
+
+#: https//support.torproject.org/operators/default-exit-ports/
+#: (content/operators/default-exit-ports/contents+en.lrquestion.description)
+msgid ""
+"The default open ports are listed below but keep in mind that, any port or "
+"ports can be opened by the relay operator by configuring it in torrc or "
+"modifying the source code."
+msgstr ""
+
+#: https//support.torproject.org/operators/default-exit-ports/
+#: (content/operators/default-exit-ports/contents+en.lrquestion.description)
+msgid ""
+"The default according to src/or/policies.c ([line 85][1] and [line 1901][2])"
+" from the source code release [release-0.4.6][3]:"
+msgstr ""
+
+#: https//support.torproject.org/operators/default-exit-ports/
+#: (content/operators/default-exit-ports/contents+en.lrquestion.description)
+msgid "reject 0.0.0.0/8"
+msgstr ""
+
+#: https//support.torproject.org/operators/default-exit-ports/
+#: (content/operators/default-exit-ports/contents+en.lrquestion.description)
+msgid "reject 169.254.0.0/16"
+msgstr ""
+
+#: https//support.torproject.org/operators/default-exit-ports/
+#: (content/operators/default-exit-ports/contents+en.lrquestion.description)
+msgid "reject 127.0.0.0/8"
+msgstr ""
+
+#: https//support.torproject.org/operators/default-exit-ports/
+#: (content/operators/default-exit-ports/contents+en.lrquestion.description)
+msgid "reject 192.168.0.0/16"
+msgstr ""
+
+#: https//support.torproject.org/operators/default-exit-ports/
+#: (content/operators/default-exit-ports/contents+en.lrquestion.description)
+msgid "reject 10.0.0.0/8"
+msgstr ""
+
+#: https//support.torproject.org/operators/default-exit-ports/
+#: (content/operators/default-exit-ports/contents+en.lrquestion.description)
+msgid "reject 172.16.0.0/12"
+msgstr ""
+
+#: https//support.torproject.org/operators/default-exit-ports/
+#: (content/operators/default-exit-ports/contents+en.lrquestion.description)
+msgid "reject *:25"
+msgstr ""
+
+#: https//support.torproject.org/operators/default-exit-ports/
+#: (content/operators/default-exit-ports/contents+en.lrquestion.description)
+msgid "reject *:119"
+msgstr ""
+
+#: https//support.torproject.org/operators/default-exit-ports/
+#: (content/operators/default-exit-ports/contents+en.lrquestion.description)
+msgid "reject *:135-139"
+msgstr ""
+
+#: https//support.torproject.org/operators/default-exit-ports/
+#: (content/operators/default-exit-ports/contents+en.lrquestion.description)
+msgid "reject *:445"
+msgstr ""
+
+#: https//support.torproject.org/operators/default-exit-ports/
+#: (content/operators/default-exit-ports/contents+en.lrquestion.description)
+msgid "reject *:563"
+msgstr ""
+
+#: https//support.torproject.org/operators/default-exit-ports/
+#: (content/operators/default-exit-ports/contents+en.lrquestion.description)
+msgid "reject *:1214"
+msgstr ""
+
+#: https//support.torproject.org/operators/default-exit-ports/
+#: (content/operators/default-exit-ports/contents+en.lrquestion.description)
+msgid "reject *:4661-4666"
+msgstr ""
+
+#: https//support.torproject.org/operators/default-exit-ports/
+#: (content/operators/default-exit-ports/contents+en.lrquestion.description)
+msgid "reject *:6346-6429"
+msgstr ""
+
+#: https//support.torproject.org/operators/default-exit-ports/
+#: (content/operators/default-exit-ports/contents+en.lrquestion.description)
+msgid "reject *:6699"
+msgstr ""
+
+#: https//support.torproject.org/operators/default-exit-ports/
+#: (content/operators/default-exit-ports/contents+en.lrquestion.description)
+msgid "reject *:6881-6999"
+msgstr ""
+
+#: https//support.torproject.org/operators/default-exit-ports/
+#: (content/operators/default-exit-ports/contents+en.lrquestion.description)
+msgid "accept *:*"
+msgstr ""
+
+#: https//support.torproject.org/operators/default-exit-ports/
+#: (content/operators/default-exit-ports/contents+en.lrquestion.description)
+msgid ""
+"[1]: "
+"https://gitlab.torproject.org/tpo/core/tor/-/blob/release-0.4.6/src/core/or/policies.c#L85"
+msgstr ""
+
+#: https//support.torproject.org/operators/default-exit-ports/
+#: (content/operators/default-exit-ports/contents+en.lrquestion.description)
+msgid ""
+"[2]: "
+"https://gitlab.torproject.org/tpo/core/tor/-/blob/release-0.4.6/src/core/or/policies.c#L1901"
+msgstr ""
+
+#: https//support.torproject.org/operators/default-exit-ports/
+#: (content/operators/default-exit-ports/contents+en.lrquestion.description)
+msgid "[3]: https://gitlab.torproject.org/tpo/core/tor/-/tree/release-0.4.6/"
+msgstr ""
+
#: https//support.torproject.org/operators/dynamic-ip/
#: (content/operators/dynamic-ip/contents+en.lrquestion.title)
msgid "Can I run a Tor relay using a dynamic IP address?"
@@ -8277,21 +9191,6 @@ msgstr ""
"Perciò potresti scoprire di non essere in grado di navigare non appena Tor "
"entra in ibernazione, segnalato da questa voce nel registro:"
-#: https//support.torproject.org/operators/hibernation/
-#: (content/operators/hibernation/contents+en.lrquestion.description)
-#: https//support.torproject.org/operators/limit-total-bandwidth/
-#: (content/operators/limit-total-bandwidth/contents+en.lrquestion.description)
-#: https//support.torproject.org/misc/bug-or-feedback/
-#: (content/misc/bug-or-feedback/contents+en.lrquestion.description)
-#: https//support.torproject.org/get-in-touch/why-i-cant-join-tor-channels/
-#: (content/get-in-touch/why-i-cant-join-tor-channels/contents+en.lrquestion.description)
-#: https//support.torproject.org/apt/tor-deb-repo/
-#: (content/apt/apt-1/contents+en.lrquestion.description)
-#: https//support.torproject.org/apt/apt-over-tor/
-#: (content/apt/apt-3/contents+en.lrquestion.description)
-msgid "```"
-msgstr "```"
-
#: https//support.torproject.org/operators/hibernation/
#: (content/operators/hibernation/contents+en.lrquestion.description)
msgid "Bandwidth soft limit reached; commencing hibernation."
@@ -10881,6 +11780,131 @@ msgstr "uid tor-security at lists.torproject.org"
msgid "sub 4096R/C00942E4 2017-03-13"
msgstr "sub 4096R/C00942E4 2017-03-13"
+#: https//support.torproject.org/misc/check-socks-dns-leaks/
+#: (content/misc/check-socks-dns-leaks/contents+en.lrquestion.title)
+msgid ""
+"How do I check if my application that uses SOCKS is leaking DNS requests?"
+msgstr ""
+
+#: https//support.torproject.org/misc/check-socks-dns-leaks/
+#: (content/misc/check-socks-dns-leaks/contents+en.lrquestion.description)
+msgid ""
+"Even if your application is using the correct variant of the SOCKS protocol,"
+" there is still a risk that it could be leaking DNS queries."
+msgstr ""
+
+#: https//support.torproject.org/misc/check-socks-dns-leaks/
+#: (content/misc/check-socks-dns-leaks/contents+en.lrquestion.description)
+msgid ""
+"This problem happens in Firefox extensions that resolve the destination "
+"hostname themselves, for example to show you its IP address, what country "
+"it's in, etc."
+msgstr ""
+
+#: https//support.torproject.org/misc/check-socks-dns-leaks/
+#: (content/misc/check-socks-dns-leaks/contents+en.lrquestion.description)
+msgid ""
+"If you suspect your application might behave like this, follow the "
+"instructions below to check."
+msgstr ""
+
+#: https//support.torproject.org/misc/check-socks-dns-leaks/
+#: (content/misc/check-socks-dns-leaks/contents+en.lrquestion.description)
+msgid ""
+"1. Add `TestSocks 1` to your [torrc file](https://support.torproject.org/tbb"
+"/tbb-editing-torrc/)."
+msgstr ""
+
+#: https//support.torproject.org/misc/check-socks-dns-leaks/
+#: (content/misc/check-socks-dns-leaks/contents+en.lrquestion.description)
+msgid ""
+"1. Start Tor, and point your program's SOCKS proxy settings to Tor's SOCKS5 "
+"server (`socks5://127.0.0.1:9050` by default)."
+msgstr ""
+
+#: https//support.torproject.org/misc/check-socks-dns-leaks/
+#: (content/misc/check-socks-dns-leaks/contents+en.lrquestion.description)
+msgid ""
+"1. Watch your logs as you use your application. For each socks connection, "
+"Tor will log a `notice` for safe connections, and a `warn` for connections "
+"leaking DNS requests."
+msgstr ""
+
+#: https//support.torproject.org/misc/check-socks-dns-leaks/
+#: (content/misc/check-socks-dns-leaks/contents+en.lrquestion.description)
+msgid ""
+"If you want to automatically disable all connections leaking DNS requests, "
+"set `SafeSocks 1` in your torrc file."
+msgstr ""
+
+#: https//support.torproject.org/misc/hide-exits/
+#: (content/misc/hide-exits/contents+en.lrquestion.title)
+msgid ""
+"You should hide the list of Tor relays, so people can't block the exits."
+msgstr ""
+
+#: https//support.torproject.org/misc/hide-exits/
+#: (content/misc/hide-exits/contents+en.lrquestion.description)
+msgid "There are a few reasons we don't:"
+msgstr ""
+
+#: https//support.torproject.org/misc/hide-exits/
+#: (content/misc/hide-exits/contents+en.lrquestion.description)
+msgid ""
+"1. We can't help but make the information available, since Tor clients need "
+"to use it to pick their paths."
+msgstr ""
+
+#: https//support.torproject.org/misc/hide-exits/
+#: (content/misc/hide-exits/contents+en.lrquestion.description)
+msgid "So if the \"blockers\" want it, they can get it anyway."
+msgstr ""
+
+#: https//support.torproject.org/misc/hide-exits/
+#: (content/misc/hide-exits/contents+en.lrquestion.description)
+msgid ""
+"Further, even if we didn't tell clients about the list of relays directly, "
+"somebody could still make a lot of connections through Tor to a test site "
+"and build a list of the addresses they see."
+msgstr ""
+
+#: https//support.torproject.org/misc/hide-exits/
+#: (content/misc/hide-exits/contents+en.lrquestion.description)
+msgid ""
+"1. If people want to block us, we believe that they should be allowed to do "
+"so."
+msgstr ""
+
+#: https//support.torproject.org/misc/hide-exits/
+#: (content/misc/hide-exits/contents+en.lrquestion.description)
+msgid ""
+"Obviously, we would prefer for everybody to allow Tor users to connect to "
+"them, but people have the right to decide who their services should allow "
+"connections from, and if they want to block anonymous users, they can."
+msgstr ""
+
+#: https//support.torproject.org/misc/hide-exits/
+#: (content/misc/hide-exits/contents+en.lrquestion.description)
+msgid ""
+"1. Being blockable also has tactical advantages: it may be a persuasive "
+"response to website maintainers who feel threatened by Tor."
+msgstr ""
+
+#: https//support.torproject.org/misc/hide-exits/
+#: (content/misc/hide-exits/contents+en.lrquestion.description)
+msgid ""
+"Giving them the option may inspire them to stop and think about whether they"
+" really want to eliminate private access to their system, and if not, what "
+"other options they might have."
+msgstr ""
+
+#: https//support.torproject.org/misc/hide-exits/
+#: (content/misc/hide-exits/contents+en.lrquestion.description)
+msgid ""
+"The time they might otherwise have spent blocking Tor, they may instead "
+"spend rethinking their overall approach to privacy and anonymity."
+msgstr ""
+
#: https//support.torproject.org/misc/menu/
#: (content/misc/menu/contents+en.lrquestion.description)
msgid "About"
@@ -11595,65 +12619,21 @@ msgstr "### Come verificare il tuo nickname"
#: https//support.torproject.org/get-in-touch/why-i-cant-join-tor-channels/
#: (content/get-in-touch/why-i-cant-join-tor-channels/contents+en.lrquestion.description)
msgid ""
-"Then, to complete the registration and ultimately gain access to the #tor-"
-"project channel, your nickname must be **verified**."
-msgstr ""
-"Per completare la registrazione e avere accesso al canale #tor-project, il "
-"tuo nickname deve essere **verificato**."
-
-#: https//support.torproject.org/get-in-touch/why-i-cant-join-tor-channels/
-#: (content/get-in-touch/why-i-cant-join-tor-channels/contents+en.lrquestion.description)
-msgid ""
-"1. To verify your nick, open a new browser window and go to "
-"https://webchat.oftc.net/?channels=tor."
-msgstr ""
-
-#: https//support.torproject.org/get-in-touch/why-i-cant-join-tor-channels/
-#: (content/get-in-touch/why-i-cant-join-tor-channels/contents+en.lrquestion.description)
-msgid "2. Log in with your IRC nickname and password."
-msgstr "2. Loggati con il nickname e la password IRC."
-
-#: https//support.torproject.org/get-in-touch/why-i-cant-join-tor-channels/
-#: (content/get-in-touch/why-i-cant-join-tor-channels/contents+en.lrquestion.description)
-msgid ""
-"3. Look for the word **verify** and log in there. It may appear that nothing"
-" has happened. Look at the top of the page, and there will be a column "
-"called **Account**."
+"After registering your nickname, to gain access to the #tor-project and "
+"other protected channels, your nickname must be **verified**."
msgstr ""
-"3. Cerca la parola **verify** e loggati da lì. Può sembrare che non avvenga "
-"nulla. Guarda in alto e vedrai una colonna chiamata **Account**."
-
-#: https//support.torproject.org/get-in-touch/why-i-cant-join-tor-channels/
-#: (content/get-in-touch/why-i-cant-join-tor-channels/contents+en.lrquestion.description)
-msgid "4. Click on **Account**."
-msgstr "4. Clicca su **Account**."
#: https//support.torproject.org/get-in-touch/why-i-cant-join-tor-channels/
#: (content/get-in-touch/why-i-cant-join-tor-channels/contents+en.lrquestion.description)
msgid ""
-"5. Click on the small sentence at the bottom of the square that says: Verify"
-" account."
-msgstr ""
-"5. Clicca sulla piccola frase alla base del quadrato che dice: Verifica "
-"account."
-
-#: https//support.torproject.org/get-in-touch/why-i-cant-join-tor-channels/
-#: (content/get-in-touch/why-i-cant-join-tor-channels/contents+en.lrquestion.description)
-msgid "6. Fill out the Captcha that pops up, and click ok."
+"1. Go to https://services.oftc.net/ and follow the steps in the '*To verify "
+"your account*' section"
msgstr ""
#: https//support.torproject.org/get-in-touch/why-i-cant-join-tor-channels/
#: (content/get-in-touch/why-i-cant-join-tor-channels/contents+en.lrquestion.description)
-msgid ""
-"7. A tiny message will appear: \"Your NickServ account has been verified.\""
+msgid "2. Go back to the IRC webpage where you are logged in and type:"
msgstr ""
-"7. Apparirà un piccolo messaggio: \"Il tuo account NickServ è stato "
-"verificato\"."
-
-#: https//support.torproject.org/get-in-touch/why-i-cant-join-tor-channels/
-#: (content/get-in-touch/why-i-cant-join-tor-channels/contents+en.lrquestion.description)
-msgid "8. Go back to the IRC webpage where you are logged in and type:"
-msgstr "8. Torna sulla pagina IRC in cui ti sei loggato e digita:"
#: https//support.torproject.org/get-in-touch/why-i-cant-join-tor-channels/
#: (content/get-in-touch/why-i-cant-join-tor-channels/contents+en.lrquestion.description)
@@ -11662,13 +12642,13 @@ msgstr "`/msg nickserv checkverify`"
#: https//support.torproject.org/get-in-touch/why-i-cant-join-tor-channels/
#: (content/get-in-touch/why-i-cant-join-tor-channels/contents+en.lrquestion.description)
-msgid "9. Click ENTER."
-msgstr "9. Clicca su INVIO."
+msgid "3. Click ENTER."
+msgstr ""
#: https//support.torproject.org/get-in-touch/why-i-cant-join-tor-channels/
#: (content/get-in-touch/why-i-cant-join-tor-channels/contents+en.lrquestion.description)
-msgid "10. If all is well, you will receive a message that says:"
-msgstr "10. Se tutto è ok, riceverai un messaggio con la dicitura:"
+msgid "4. If all is well, you will receive a message that says:"
+msgstr ""
#: https//support.torproject.org/get-in-touch/why-i-cant-join-tor-channels/
#: (content/get-in-touch/why-i-cant-join-tor-channels/contents+en.lrquestion.description)
@@ -11816,21 +12796,23 @@ msgstr "# apt install apt-transport-https"
#: https//support.torproject.org/apt/tor-deb-repo/
#: (content/apt/apt-1/contents+en.lrquestion.description)
msgid ""
-"#### 2. Add the following entries to `/etc/apt/sources.list` or a new file "
-"in `/etc/apt/sources.list.d/`"
+"#### 2. Create a new file in `/etc/apt/sources.list.d/` named `tor.list`. "
+"Add the following entries:"
msgstr ""
-"#### 2. Aggiungere le voci seguenti a `/etc/apt/sources.list` oppure creare "
-"un nuovo file in `/etc/apt/sources.list.d/`"
#: https//support.torproject.org/apt/tor-deb-repo/
#: (content/apt/apt-1/contents+en.lrquestion.description)
-msgid "deb https://deb.torproject.org/torproject.org <DISTRIBUTION> main"
-msgstr "deb https://deb.torproject.org/torproject.org <DISTRIBUTION> main "
+msgid ""
+"deb [signed-by=/usr/share/keyrings/tor-archive-keyring.gpg] "
+"https://deb.torproject.org/torproject.org <DISTRIBUTION> main"
+msgstr ""
#: https//support.torproject.org/apt/tor-deb-repo/
#: (content/apt/apt-1/contents+en.lrquestion.description)
-msgid "deb-src https://deb.torproject.org/torproject.org <DISTRIBUTION> main"
-msgstr "deb-src https://deb.torproject.org/torproject.org <DISTRIBUTION> main"
+msgid ""
+"deb-src [signed-by=/usr/share/keyrings/tor-archive-keyring.gpg] "
+"https://deb.torproject.org/torproject.org <DISTRIBUTION> main"
+msgstr ""
#: https//support.torproject.org/apt/tor-deb-repo/
#: (content/apt/apt-1/contents+en.lrquestion.description)
@@ -11843,14 +12825,16 @@ msgstr ""
#: https//support.torproject.org/apt/tor-deb-repo/
#: (content/apt/apt-1/contents+en.lrquestion.description)
msgid ""
-"deb https://deb.torproject.org/torproject.org tor-"
+"deb [signed-by=/usr/share/keyrings/tor-archive-keyring.gpg] "
+"https://deb.torproject.org/torproject.org tor-"
"experimental-0.4.6.x-<DISTRIBUTION> main"
msgstr ""
#: https//support.torproject.org/apt/tor-deb-repo/
#: (content/apt/apt-1/contents+en.lrquestion.description)
msgid ""
-"deb-src https://deb.torproject.org/torproject.org tor-"
+"deb-src [signed-by=/usr/share/keyrings/tor-archive-keyring.gpg] "
+"https://deb.torproject.org/torproject.org tor-"
"experimental-0.4.6.x-<DISTRIBUTION> main"
msgstr ""
@@ -11862,18 +12846,18 @@ msgstr "O le nightly build:"
#: https//support.torproject.org/apt/tor-deb-repo/
#: (content/apt/apt-1/contents+en.lrquestion.description)
msgid ""
-"deb https://deb.torproject.org/torproject.org tor-nightly-"
-"master-<DISTRIBUTION> main"
+"deb [signed-by=/usr/share/keyrings/tor-archive-keyring.gpg] "
+"https://deb.torproject.org/torproject.org tor-nightly-master-<DISTRIBUTION> "
+"main"
msgstr ""
#: https//support.torproject.org/apt/tor-deb-repo/
#: (content/apt/apt-1/contents+en.lrquestion.description)
msgid ""
-"deb-src https://deb.torproject.org/torproject.org tor-nightly-"
-"master-<DISTRIBUTION> main"
+"deb-src [signed-by=/usr/share/keyrings/tor-archive-keyring.gpg] "
+"https://deb.torproject.org/torproject.org tor-nightly-master-<DISTRIBUTION> "
+"main"
msgstr ""
-"deb-src https://deb.torproject.org/torproject.org tor-nightly-"
-"master-<DISTRIBUTION> main"
#: https//support.torproject.org/apt/tor-deb-repo/
#: (content/apt/apt-1/contents+en.lrquestion.description)
@@ -11893,13 +12877,15 @@ msgstr ""
#: https//support.torproject.org/apt/tor-deb-repo/
#: (content/apt/apt-1/contents+en.lrquestion.description)
msgid ""
-"deb [arch=amd64] https://deb.torproject.org/torproject.org focal main"
+"deb [arch=amd64 signed-by=/usr/share/keyrings/tor-archive-keyring.gpg] "
+"https://deb.torproject.org/torproject.org focal main"
msgstr ""
#: https//support.torproject.org/apt/tor-deb-repo/
#: (content/apt/apt-1/contents+en.lrquestion.description)
msgid ""
-"deb-src [arch=amd64] https://deb.torproject.org/torproject.org focal main"
+"deb-src [arch=amd64 signed-by=/usr/share/keyrings/tor-archive-keyring.gpg] "
+"https://deb.torproject.org/torproject.org focal main"
msgstr ""
#: https//support.torproject.org/apt/tor-deb-repo/
@@ -11919,28 +12905,17 @@ msgstr ""
#: (content/apt/apt-1/contents+en.lrquestion.description)
msgid ""
"#### 3. Then add the gpg key used to sign the packages by running the "
-"following commands at your command prompt"
+"following command at your command prompt:"
msgstr ""
-"#### 3. Poi aggiunti la chiave gpg usata per firmare i pacchetti lanciando i"
-" seguenti comandi dal tuo prompt dei comandi"
#: https//support.torproject.org/apt/tor-deb-repo/
#: (content/apt/apt-1/contents+en.lrquestion.description)
msgid ""
-"# wget -qO- "
+"# wget -O- "
"https://deb.torproject.org/torproject.org/A3C4F0F979CAA22CDBA8F512EE8CBC9E886DDD89.asc"
-" | gpg --import"
+" | gpg --dearmor | tee /usr/share/keyrings/tor-archive-keyring.gpg "
+">/dev/null"
msgstr ""
-"# wget -qO- "
-"https://deb.torproject.org/torproject.org/A3C4F0F979CAA22CDBA8F512EE8CBC9E886DDD89.asc"
-" | gpg --import"
-
-#: https//support.torproject.org/apt/tor-deb-repo/
-#: (content/apt/apt-1/contents+en.lrquestion.description)
-msgid ""
-"# gpg --export A3C4F0F979CAA22CDBA8F512EE8CBC9E886DDD89 | apt-key add -"
-msgstr ""
-"# gpg --export A3C4F0F979CAA22CDBA8F512EE8CBC9E886DDD89 | apt-key add -"
#: https//support.torproject.org/apt/tor-deb-repo/
#: (content/apt/apt-1/contents+en.lrquestion.description)
@@ -13801,6 +14776,82 @@ msgstr ""
"No, perché l'utente aggiorna l'elenco dei relays con la stessa frequenza di "
"un utente che non cambia l'indirizzo IP nel corso della giornata."
+#: https//support.torproject.org/alternate-designs/block-websites/
+#: (content/alternate-designs/block-websites/contents+en.lrquestion.title)
+msgid "Exit policies should be able to block websites, not just IP addresses."
+msgstr ""
+
+#: https//support.torproject.org/alternate-designs/block-websites/
+#: (content/alternate-designs/block-websites/contents+en.lrquestion.description)
+msgid ""
+"It would be nice to let relay operators say things like `reject "
+"www.slashdot.org` in their exit policies, rather than requiring them to "
+"learn all the IP address space that could be covered by the site (and then "
+"also blocking other sites at those IP addresses)."
+msgstr ""
+
+#: https//support.torproject.org/alternate-designs/block-websites/
+#: (content/alternate-designs/block-websites/contents+en.lrquestion.description)
+msgid "There are two problems, though."
+msgstr ""
+
+#: https//support.torproject.org/alternate-designs/block-websites/
+#: (content/alternate-designs/block-websites/contents+en.lrquestion.description)
+msgid "First, users could still get around these blocks."
+msgstr ""
+
+#: https//support.torproject.org/alternate-designs/block-websites/
+#: (content/alternate-designs/block-websites/contents+en.lrquestion.description)
+msgid ""
+"For example, they could request the IP address rather than the hostname when"
+" they exit from the Tor network."
+msgstr ""
+
+#: https//support.torproject.org/alternate-designs/block-websites/
+#: (content/alternate-designs/block-websites/contents+en.lrquestion.description)
+msgid ""
+"This means operators would still need to learn all the IP addresses for the "
+"destinations in question."
+msgstr ""
+
+#: https//support.torproject.org/alternate-designs/block-websites/
+#: (content/alternate-designs/block-websites/contents+en.lrquestion.description)
+msgid ""
+"The second problem is that it would allow remote attackers to censor "
+"arbitrary sites."
+msgstr ""
+
+#: https//support.torproject.org/alternate-designs/block-websites/
+#: (content/alternate-designs/block-websites/contents+en.lrquestion.description)
+msgid ""
+"For example, if a Tor operator blocks www1.slashdot.org, and then some "
+"attacker poisons the Tor relay's DNS or otherwise changes that hostname to "
+"resolve to the IP address for a major news site, then suddenly that Tor "
+"relay is blocking the news site."
+msgstr ""
+
+#: https//support.torproject.org/alternate-designs/let-the-network-pick-the-path/
+#: (content/alternate-designs/let-the-network-pick-the-path/contents+en.lrquestion.title)
+msgid "You should let the network pick the path, not the client."
+msgstr ""
+
+#: https//support.torproject.org/alternate-designs/let-the-network-pick-the-path/
+#: (content/alternate-designs/let-the-network-pick-the-path/contents+en.lrquestion.description)
+msgid "No, you cannot trust the network to pick the path."
+msgstr ""
+
+#: https//support.torproject.org/alternate-designs/let-the-network-pick-the-path/
+#: (content/alternate-designs/let-the-network-pick-the-path/contents+en.lrquestion.description)
+msgid "Malicious relays could route you through their colluding friends."
+msgstr ""
+
+#: https//support.torproject.org/alternate-designs/let-the-network-pick-the-path/
+#: (content/alternate-designs/let-the-network-pick-the-path/contents+en.lrquestion.description)
+msgid ""
+"This would give an adversary the ability to watch all of your traffic end to"
+" end."
+msgstr ""
+
#: lego/templates/banner.html:3 lego/templates/banner.html:5
#: templates/banner.html:3 templates/banner.html:5
msgid "Close banner"
@@ -13831,8 +14882,8 @@ msgid "DONATE NOW"
msgstr "DONA ORA"
#: lego/templates/footer.html:13 lego/templates/footer.html:22
-#: lego/templates/navbar.html:83 templates/footer.html:13
-#: templates/footer.html:22 templates/navbar.html:83
+#: lego/templates/navbar.html:95 templates/footer.html:13
+#: templates/footer.html:22 templates/navbar.html:95
msgid "Download Tor Browser"
msgstr "Scarica Tor Browser"
diff --git a/contents+ja.po b/contents+ja.po
index 71ffdbe980..91d1841d9e 100644
--- a/contents+ja.po
+++ b/contents+ja.po
@@ -20,7 +20,7 @@ msgid ""
msgstr ""
"Project-Id-Version: PACKAGE VERSION\n"
"Report-Msgid-Bugs-To: \n"
-"POT-Creation-Date: 2021-08-25 11:14+CET\n"
+"POT-Creation-Date: 2021-09-01 12:20+CET\n"
"PO-Revision-Date: 2018-10-02 22:41+0000\n"
"Last-Translator: Kaede, 2021\n"
"Language-Team: Japanese (https://www.transifex.com/otf/teams/1519/ja/)\n"
@@ -153,6 +153,11 @@ msgstr "ä¸æ£ã«é¢ãã質å"
msgid "Tor Metrics"
msgstr "Tor ã¡ããªã¯ã¹"
+#: https//support.torproject.org/alternate-designs/
+#: (content/alternate-designs/contents+en.lrtopic.title)
+msgid "Alternate Designs We Don't Do (Yet)"
+msgstr ""
+
#: https//support.torproject.org/glossary/add-on-extension-or-plugin/
#: (content/glossary/add-on-extension-or-plugin/contents+en.lrword.term)
msgid "add-on, extension, or plugin"
@@ -2078,6 +2083,61 @@ msgstr ""
"Wiki](https://trac.torproject.org/projects/tor/wiki/doc/TorPlusVPN) "
"ã§ã確èªããã ãã¾ãã"
+#: https//support.torproject.org/faq/relay-donations/
+#: (content/faq/relay-donations/contents+en.lrquestion.title)
+msgid "Can I donate for a relay rather than run my own?"
+msgstr ""
+
+#: https//support.torproject.org/faq/relay-donations/
+#: (content/faq/relay-donations/contents+en.lrquestion.description)
+msgid ""
+"Sure! We have a [list of organizations that run Tor "
+"relays](https://community.torproject.org/relay/community-resources/relay-"
+"associations/) that are happy to turn your donations into better speed and "
+"anonymity for the Tor network."
+msgstr ""
+
+#: https//support.torproject.org/faq/relay-donations/
+#: (content/faq/relay-donations/contents+en.lrquestion.description)
+msgid ""
+"These organizations are not the same as [The Tor Project, "
+"Inc](https://donate.torproject.org/), but we consider that a good thing."
+msgstr ""
+
+#: https//support.torproject.org/faq/relay-donations/
+#: (content/faq/relay-donations/contents+en.lrquestion.description)
+msgid "They're run by nice people who are part of the Tor community."
+msgstr ""
+
+#: https//support.torproject.org/faq/relay-donations/
+#: (content/faq/relay-donations/contents+en.lrquestion.description)
+msgid ""
+"Note that there can be a tradeoff here between anonymity and performance."
+msgstr ""
+
+#: https//support.torproject.org/faq/relay-donations/
+#: (content/faq/relay-donations/contents+en.lrquestion.description)
+msgid ""
+"The Tor network's anonymity comes in part from diversity, so if you are in a"
+" position to run your own relay, you will be improving Tor's anonymity more "
+"than by donating."
+msgstr ""
+
+#: https//support.torproject.org/faq/relay-donations/
+#: (content/faq/relay-donations/contents+en.lrquestion.description)
+msgid ""
+"At the same time though, economies of scale for bandwidth mean that "
+"combining many small donations into several larger relays is more efficient "
+"at improving network performance."
+msgstr ""
+
+#: https//support.torproject.org/faq/relay-donations/
+#: (content/faq/relay-donations/contents+en.lrquestion.description)
+msgid ""
+"Improving anonymity and improving performance are both worthwhile goals, so "
+"however you can help is great!"
+msgstr ""
+
#: https//support.torproject.org/faq/staying-anonymous/
#: (content/faq/staying-anonymous/contents+en.lrquestion.title)
msgid "Am I totally anonymous if I use Tor?"
@@ -2382,6 +2442,61 @@ msgid ""
" documenting all the issues](https://community.torproject.org/)."
msgstr ""
+#: https//support.torproject.org/about/attacks-on-onion-routing/
+#: (content/about/attacks-on-onion-routing/contents+en.lrquestion.title)
+msgid "What attacks remain against onion routing?"
+msgstr ""
+
+#: https//support.torproject.org/about/attacks-on-onion-routing/
+#: (content/about/attacks-on-onion-routing/contents+en.lrquestion.description)
+msgid ""
+"As mentioned above, it is possible for an observer who can view both you and"
+" either the destination website or your Tor exit node to correlate timings "
+"of your traffic as it enters the Tor network and also as it exits."
+msgstr ""
+
+#: https//support.torproject.org/about/attacks-on-onion-routing/
+#: (content/about/attacks-on-onion-routing/contents+en.lrquestion.description)
+msgid "Tor does not defend against such a threat model."
+msgstr ""
+
+#: https//support.torproject.org/about/attacks-on-onion-routing/
+#: (content/about/attacks-on-onion-routing/contents+en.lrquestion.description)
+msgid ""
+"In a more limited sense, note that if a censor or law enforcement agency has"
+" the ability to obtain specific observation of parts of the network, it is "
+"possible for them to verify a suspicion that you talk regularly to your "
+"friend by observing traffic at both ends and correlating the timing of only "
+"that traffic."
+msgstr ""
+
+#: https//support.torproject.org/about/attacks-on-onion-routing/
+#: (content/about/attacks-on-onion-routing/contents+en.lrquestion.description)
+msgid ""
+"Again, this is only useful to verify that parties already suspected of "
+"communicating with one another are doing so."
+msgstr ""
+
+#: https//support.torproject.org/about/attacks-on-onion-routing/
+#: (content/about/attacks-on-onion-routing/contents+en.lrquestion.description)
+msgid ""
+"In most countries, the suspicion required to obtain a warrant already "
+"carries more weight than timing correlation would provide."
+msgstr ""
+
+#: https//support.torproject.org/about/attacks-on-onion-routing/
+#: (content/about/attacks-on-onion-routing/contents+en.lrquestion.description)
+msgid ""
+"Furthermore, since Tor reuses circuits for multiple TCP connections, it is "
+"possible to associate non anonymous and anonymous traffic at a given exit "
+"node, so be careful about what applications you run concurrently over Tor."
+msgstr ""
+
+#: https//support.torproject.org/about/attacks-on-onion-routing/
+#: (content/about/attacks-on-onion-routing/contents+en.lrquestion.description)
+msgid "Perhaps even run separate Tor clients for these applications."
+msgstr ""
+
#: https//support.torproject.org/about/backdoor/
#: (content/about/backdoor/contents+en.lrquestion.title)
msgid "Is there a backdoor in Tor?"
@@ -2517,6 +2632,43 @@ msgid ""
"recommended](/tbb/tbb-9/)."
msgstr ""
+#: https//support.torproject.org/about/change-paths/
+#: (content/about/change-paths/contents+en.lrquestion.title)
+msgid "How often does Tor change its paths?"
+msgstr ""
+
+#: https//support.torproject.org/about/change-paths/
+#: (content/about/change-paths/contents+en.lrquestion.description)
+msgid ""
+"Tor will reuse the same circuit for new TCP streams for 10 minutes, as long "
+"as the circuit is working fine."
+msgstr ""
+
+#: https//support.torproject.org/about/change-paths/
+#: (content/about/change-paths/contents+en.lrquestion.description)
+msgid "(If the circuit fails, Tor will switch to a new circuit immediately.)"
+msgstr ""
+
+#: https//support.torproject.org/about/change-paths/
+#: (content/about/change-paths/contents+en.lrquestion.description)
+msgid ""
+"But note that a single TCP stream (e.g. a long IRC connection) will stay on "
+"the same circuit forever."
+msgstr ""
+
+#: https//support.torproject.org/about/change-paths/
+#: (content/about/change-paths/contents+en.lrquestion.description)
+msgid "We don't rotate individual streams from one circuit to the next."
+msgstr ""
+
+#: https//support.torproject.org/about/change-paths/
+#: (content/about/change-paths/contents+en.lrquestion.description)
+msgid ""
+"Otherwise, an adversary with a partial view of the network would be given "
+"many chances over time to link you to your destination, rather than just one"
+" chance."
+msgstr ""
+
#: https//support.torproject.org/about/distribute-tor/
#: (content/about/distribute-tor/contents+en.lrquestion.title)
msgid "Can I distribute Tor?"
@@ -2613,6 +2765,133 @@ msgid ""
msgstr ""
"[åæ¨ã«é¢ããFAQ](https://www.torproject.org/about/trademark/)ã®è©³ç´°ã«ã¤ãã¦èªãã§ãã ããã"
+#: https//support.torproject.org/about/entry-guards/
+#: (content/about/entry-guards/contents+en.lrquestion.title)
+msgid "What are Entry Guards?"
+msgstr ""
+
+#: https//support.torproject.org/about/entry-guards/
+#: (content/about/entry-guards/contents+en.lrquestion.description)
+msgid ""
+"Tor (like all current practical low-latency anonymity designs) fails when "
+"the attacker can see both ends of the communications channel."
+msgstr ""
+
+#: https//support.torproject.org/about/entry-guards/
+#: (content/about/entry-guards/contents+en.lrquestion.description)
+msgid ""
+"For example, suppose the attacker controls or watches the Tor relay you "
+"choose to enter the network, and also controls or watches the website you "
+"visit."
+msgstr ""
+
+#: https//support.torproject.org/about/entry-guards/
+#: (content/about/entry-guards/contents+en.lrquestion.description)
+msgid ""
+"In this case, the research community knows no practical low-latency design "
+"that can reliably stop the attacker from correlating volume and timing "
+"information on the two sides."
+msgstr ""
+
+#: https//support.torproject.org/about/entry-guards/
+#: (content/about/entry-guards/contents+en.lrquestion.description)
+msgid "So, what should we do?"
+msgstr ""
+
+#: https//support.torproject.org/about/entry-guards/
+#: (content/about/entry-guards/contents+en.lrquestion.description)
+msgid "Suppose the attacker controls, or can observe, C relays."
+msgstr ""
+
+#: https//support.torproject.org/about/entry-guards/
+#: (content/about/entry-guards/contents+en.lrquestion.description)
+msgid "Suppose there are N relays total."
+msgstr ""
+
+#: https//support.torproject.org/about/entry-guards/
+#: (content/about/entry-guards/contents+en.lrquestion.description)
+msgid ""
+"If you select new entry and exit relays each time you use the network, the "
+"attacker will be able to correlate all traffic you send with probability "
+"around (c/n)2."
+msgstr ""
+
+#: https//support.torproject.org/about/entry-guards/
+#: (content/about/entry-guards/contents+en.lrquestion.description)
+msgid ""
+"But profiling is, for most users, as bad as being traced all the time: they "
+"want to do something often without an attacker noticing, and the attacker "
+"noticing once is as bad as the attacker noticing more often."
+msgstr ""
+
+#: https//support.torproject.org/about/entry-guards/
+#: (content/about/entry-guards/contents+en.lrquestion.description)
+msgid ""
+"Thus, choosing many random entries and exits gives the user no chance of "
+"escaping profiling by this kind of attacker."
+msgstr ""
+
+#: https//support.torproject.org/about/entry-guards/
+#: (content/about/entry-guards/contents+en.lrquestion.description)
+msgid ""
+"The solution is \"entry guards\": each Tor client selects a few relays at "
+"random to use as entry points, and uses only those relays for their first "
+"hop."
+msgstr ""
+
+#: https//support.torproject.org/about/entry-guards/
+#: (content/about/entry-guards/contents+en.lrquestion.description)
+msgid ""
+"If those relays are not controlled or observed, the attacker can't win, "
+"ever, and the user is secure."
+msgstr ""
+
+#: https//support.torproject.org/about/entry-guards/
+#: (content/about/entry-guards/contents+en.lrquestion.description)
+msgid ""
+"If those relays are observed or controlled by the attacker, the attacker "
+"sees a larger fraction of the user's traffic - but still the user is no more"
+" profiled than before."
+msgstr ""
+
+#: https//support.torproject.org/about/entry-guards/
+#: (content/about/entry-guards/contents+en.lrquestion.description)
+msgid ""
+"Thus, the user has some chance (on the order of (n-c)/n) of avoiding "
+"profiling, whereas they had none before."
+msgstr ""
+
+#: https//support.torproject.org/about/entry-guards/
+#: (content/about/entry-guards/contents+en.lrquestion.description)
+msgid ""
+"You can read more at [An Analysis of the Degradation of Anonymous "
+"Protocols](http://freehaven.net/anonbib/#wright02), [Defending Anonymous "
+"Communication Against Passive Logging "
+"Attacks](http://freehaven.net/anonbib/#wright03), and especially [Locating "
+"Hidden Servers](http://freehaven.net/anonbib/#hs-attack06)."
+msgstr ""
+
+#: https//support.torproject.org/about/entry-guards/
+#: (content/about/entry-guards/contents+en.lrquestion.description)
+msgid ""
+"Restricting your entry nodes may also help against attackers who want to run"
+" a few Tor nodes and easily enumerate all of the Tor user IP addresses."
+msgstr ""
+
+#: https//support.torproject.org/about/entry-guards/
+#: (content/about/entry-guards/contents+en.lrquestion.description)
+msgid ""
+"(Even though they can't learn what destinations the users are talking to, "
+"they still might be able to do bad things with just a list of users.)"
+msgstr ""
+
+#: https//support.torproject.org/about/entry-guards/
+#: (content/about/entry-guards/contents+en.lrquestion.description)
+msgid ""
+"However, that feature won't really become useful until we move to a "
+"\"directory guard\" design as well."
+msgstr ""
+
#: https//support.torproject.org/about/how-is-tor-different-from-other-proxies/
#: (content/about/how-is-tor-different-from-other-proxies/contents+en.lrquestion.title)
msgid "How is Tor different from other proxies?"
@@ -2783,6 +3062,162 @@ msgid ""
" Tor and HTTPS interact."
msgstr ""
+#: https//support.torproject.org/about/key-management/
+#: (content/about/key-management/contents+en.lrquestion.title)
+msgid "Tell me about all the keys Tor uses"
+msgstr ""
+
+#: https//support.torproject.org/about/key-management/
+#: (content/about/key-management/contents+en.lrquestion.description)
+msgid ""
+"Tor uses a variety of different keys, with three goals in mind: 1) "
+"encryption to ensure privacy of data within the Tor network, 2) "
+"authentication so clients know they're talking to the relays they meant to "
+"talk to, and 3) signatures to make sure all clients know the same set of "
+"relays."
+msgstr ""
+
+#: https//support.torproject.org/about/key-management/
+#: (content/about/key-management/contents+en.lrquestion.description)
+msgid ""
+"**Encryption**: first, all connections in Tor use TLS link encryption, so "
+"observers can't look inside to see which circuit a given cell is intended "
+"for."
+msgstr ""
+
+#: https//support.torproject.org/about/key-management/
+#: (content/about/key-management/contents+en.lrquestion.description)
+msgid ""
+"Further, the Tor client establishes an ephemeral encryption key with each "
+"relay in the circuit; these extra layers of encryption mean that only the "
+"exit relay can read the cells."
+msgstr ""
+
+#: https//support.torproject.org/about/key-management/
+#: (content/about/key-management/contents+en.lrquestion.description)
+msgid ""
+"Both sides discard the circuit key when the circuit ends, so logging traffic"
+" and then breaking into the relay to discover the key won't work."
+msgstr ""
+
+#: https//support.torproject.org/about/key-management/
+#: (content/about/key-management/contents+en.lrquestion.description)
+msgid ""
+"**Authentication**: Every Tor relay has a public decryption key called the "
+"\"onion key\"."
+msgstr ""
+
+#: https//support.torproject.org/about/key-management/
+#: (content/about/key-management/contents+en.lrquestion.description)
+msgid "Each relay rotates its onion key once a week."
+msgstr ""
+
+#: https//support.torproject.org/about/key-management/
+#: (content/about/key-management/contents+en.lrquestion.description)
+msgid ""
+"When the Tor client establishes circuits, at each step it [demands that the "
+"Tor relay prove knowledge of its onion key](https://svn-"
+"archive.torproject.org/svn/projects/design-paper/tor-"
+"design.html#subsec:circuits)."
+msgstr ""
+
+#: https//support.torproject.org/about/key-management/
+#: (content/about/key-management/contents+en.lrquestion.description)
+msgid ""
+"That way the first node in the path can't just spoof the rest of the path."
+msgstr ""
+
+#: https//support.torproject.org/about/key-management/
+#: (content/about/key-management/contents+en.lrquestion.description)
+msgid ""
+"Because the Tor client chooses the path, it can make sure to get Tor's "
+"\"distributed trust\" property: no single relay in the path can know about "
+"both the client and what the client is doing."
+msgstr ""
+
+#: https//support.torproject.org/about/key-management/
+#: (content/about/key-management/contents+en.lrquestion.description)
+msgid ""
+"**Coordination**: How do clients know what the relays are, and how do they "
+"know that they have the right keys for them?"
+msgstr ""
+
+#: https//support.torproject.org/about/key-management/
+#: (content/about/key-management/contents+en.lrquestion.description)
+msgid "Each relay has a long-term public signing key called the \"identity key\"."
+msgstr ""
+
+#: https//support.torproject.org/about/key-management/
+#: (content/about/key-management/contents+en.lrquestion.description)
+msgid "Each directory authority additionally has a \"directory signing key\"."
+msgstr ""
+
+#: https//support.torproject.org/about/key-management/
+#: (content/about/key-management/contents+en.lrquestion.description)
+msgid ""
+"The directory authorities [provide a signed "
+"list](https://gitweb.torproject.org/torspec.git/tree/dir-spec.txt) of all "
+"the known relays, and in that list are a set of certificates from each relay"
+" (self-signed by their identity key) specifying their keys, locations, exit "
+"policies, and so on."
+msgstr ""
+
+#: https//support.torproject.org/about/key-management/
+#: (content/about/key-management/contents+en.lrquestion.description)
+msgid ""
+"So unless the adversary can control a majority of the directory authorities "
+"(as of 2021 there are 10 directory authorities), they can't trick the Tor "
+"client into using other Tor relays."
+msgstr ""
+
+#: https//support.torproject.org/about/key-management/
+#: (content/about/key-management/contents+en.lrquestion.description)
+msgid "How do clients know what the directory authorities are?"
+msgstr ""
+
+#: https//support.torproject.org/about/key-management/
+#: (content/about/key-management/contents+en.lrquestion.description)
+msgid ""
+"The Tor software comes with a built-in list of location and public key for "
+"each directory authority."
+msgstr ""
+
+#: https//support.torproject.org/about/key-management/
+#: (content/about/key-management/contents+en.lrquestion.description)
+msgid ""
+"So the only way to trick users into using a fake Tor network is to give them"
+" a specially modified version of the software."
+msgstr ""
+
+#: https//support.torproject.org/about/key-management/
+#: (content/about/key-management/contents+en.lrquestion.description)
+msgid "How do users know they've got the right software?"
+msgstr ""
+
+#: https//support.torproject.org/about/key-management/
+#: (content/about/key-management/contents+en.lrquestion.description)
+msgid ""
+"When we distribute the source code or a package, we digitally sign it with "
+"[GNU Privacy Guard](http://www.gnupg.org/). See the [instructions on how to "
+"check Tor Browser's signature](https://support.torproject.org/tbb/how-to-"
+"verify-signature/)."
+msgstr ""
+
+#: https//support.torproject.org/about/key-management/
+#: (content/about/key-management/contents+en.lrquestion.description)
+msgid ""
+"In order to be certain that it's really signed by us, you need to have met "
+"us in person and gotten a copy of our GPG key fingerprint, or you need to "
+"know somebody who has."
+msgstr ""
+
+#: https//support.torproject.org/about/key-management/
+#: (content/about/key-management/contents+en.lrquestion.description)
+msgid ""
+"If you're concerned about an attack on this level, we recommend you get "
+"involved with the security community and start meeting people."
+msgstr ""
+
#: https//support.torproject.org/about/no-data-scrubbing/
#: (content/about/no-data-scrubbing/contents+en.lrquestion.title)
msgid ""
@@ -2815,6 +3250,151 @@ msgid ""
"though."
msgstr ""
+#: https//support.torproject.org/about/protections/
+#: (content/about/protections/contents+en.lrquestion.title)
+msgid "What protections does Tor provide?"
+msgstr ""
+
+#: https//support.torproject.org/about/protections/
+#: (content/about/protections/contents+en.lrquestion.description)
+msgid ""
+"Internet communication is based on a store-and-forward model that can be "
+"understood in analogy to postal mail: Data is transmitted in blocks called "
+"IP datagrams or packets."
+msgstr ""
+
+#: https//support.torproject.org/about/protections/
+#: (content/about/protections/contents+en.lrquestion.description)
+msgid ""
+"Every packet includes a source IP address (of the sender) and a destination "
+"IP address (of the receiver), just as ordinary letters contain postal "
+"addresses of sender and receiver."
+msgstr ""
+
+#: https//support.torproject.org/about/protections/
+#: (content/about/protections/contents+en.lrquestion.description)
+msgid ""
+"The way from sender to receiver involves multiple hops of routers, where "
+"each router inspects the destination IP address and forwards the packet "
+"closer to its destination."
+msgstr ""
+
+#: https//support.torproject.org/about/protections/
+#: (content/about/protections/contents+en.lrquestion.description)
+msgid ""
+"Thus, every router between sender and receiver learns that the sender is "
+"communicating with the receiver."
+msgstr ""
+
+#: https//support.torproject.org/about/protections/
+#: (content/about/protections/contents+en.lrquestion.description)
+msgid ""
+"In particular, your local ISP is in the position to build a complete profile"
+" of your Internet usage."
+msgstr ""
+
+#: https//support.torproject.org/about/protections/
+#: (content/about/protections/contents+en.lrquestion.description)
+msgid ""
+"In addition, every server in the Internet that can see any of the packets "
+"can profile your behavior."
+msgstr ""
+
+#: https//support.torproject.org/about/protections/
+#: (content/about/protections/contents+en.lrquestion.description)
+msgid ""
+"The aim of Tor is to improve your privacy by sending your traffic through a "
+"series of proxies."
+msgstr ""
+
+#: https//support.torproject.org/about/protections/
+#: (content/about/protections/contents+en.lrquestion.description)
+msgid ""
+"Your communication is encrypted in multiple layers and routed via multiple "
+"hops through the Tor network to the final receiver."
+msgstr ""
+
+#: https//support.torproject.org/about/protections/
+#: (content/about/protections/contents+en.lrquestion.description)
+msgid ""
+"More details on this process can be found in this "
+"[visualization](https://support.torproject.org/https/https-1/)."
+msgstr ""
+
+#: https//support.torproject.org/about/protections/
+#: (content/about/protections/contents+en.lrquestion.description)
+msgid ""
+"Note that all your local ISP can observe now is that you are communicating "
+"with Tor nodes."
+msgstr ""
+
+#: https//support.torproject.org/about/protections/
+#: (content/about/protections/contents+en.lrquestion.description)
+msgid ""
+"Similarly, servers in the Internet just see that they are being contacted by"
+" Tor nodes."
+msgstr ""
+
+#: https//support.torproject.org/about/protections/
+#: (content/about/protections/contents+en.lrquestion.description)
+msgid "Generally speaking, Tor aims to solve three privacy problems:"
+msgstr ""
+
+#: https//support.torproject.org/about/protections/
+#: (content/about/protections/contents+en.lrquestion.description)
+msgid ""
+"First, Tor prevents websites and other services from learning your location,"
+" which they can use to build databases about your habits and interests."
+msgstr ""
+
+#: https//support.torproject.org/about/protections/
+#: (content/about/protections/contents+en.lrquestion.description)
+msgid ""
+"With Tor, your Internet connections don't give you away by default -- now "
+"you can have the ability to choose, for each connection, how much "
+"information to reveal."
+msgstr ""
+
+#: https//support.torproject.org/about/protections/
+#: (content/about/protections/contents+en.lrquestion.description)
+msgid ""
+"Second, Tor prevents people watching your traffic locally (such as your ISP "
+"or someone with access to your home wifi or router) from learning what "
+"information you're fetching and where you're fetching it from."
+msgstr ""
+
+#: https//support.torproject.org/about/protections/
+#: (content/about/protections/contents+en.lrquestion.description)
+msgid ""
+"It also stops them from deciding what you're allowed to learn and publish --"
+" if you can get to any part of the Tor network, you can reach any site on "
+"the Internet."
+msgstr ""
+
+#: https//support.torproject.org/about/protections/
+#: (content/about/protections/contents+en.lrquestion.description)
+msgid ""
+"Third, Tor routes your connection through more than one Tor relay so no "
+"single relay can learn what you're up to."
+msgstr ""
+
+#: https//support.torproject.org/about/protections/
+#: (content/about/protections/contents+en.lrquestion.description)
+msgid ""
+"Because these relays are run by different individuals or organizations, "
+"distributing trust provides more security than the old [one hop "
+"proxy](https://support.torproject.org/about/#how-is-tor-different-from-"
+"other-proxies) approach."
+msgstr ""
+
+#: https//support.torproject.org/about/protections/
+#: (content/about/protections/contents+en.lrquestion.description)
+msgid ""
+"Note, however, that there are situations where Tor fails to solve these "
+"privacy problems entirely: see the entry below on [remaining "
+"attacks](https://support.torproject.org/about/#attacks-on-onion-routing)."
+msgstr ""
+
#: https//support.torproject.org/about/what-is-tor/
#: (content/about/what-is-tor/contents+en.lrquestion.title)
msgid "What is Tor?"
@@ -5035,9 +5615,11 @@ msgstr ""
#: (content/tbb/tbb-47/contents+en.lrquestion.description)
msgid ""
"Also, read up on the HTTPProxyAuthenticator and HTTPSProxyAuthenticator "
-"options if your proxy requires auth. We only support basic auth currently, "
-"but if you need NTLM authentication, you may find [this post in the "
-"archives](https://archives.seul.org/or/talk/Jun-2005/msg00223.html) useful."
+"options if your [proxy requires auth.](https://developer.mozilla.org/en-"
+"US/docs/Web/HTTP/Headers/Proxy-Authenticate) We only support basic auth "
+"currently, but if you need NTLM authentication, you may find [this post in "
+"the archives](https://archives.seul.org/or/talk/Jun-2005/msg00223.html) "
+"useful."
msgstr ""
#: https//support.torproject.org/tbb/tbb-47/
@@ -5256,6 +5838,219 @@ msgid ""
"have no effect on Tor's configuration."
msgstr ""
+#: https//support.torproject.org/tbb/tbb-firewall-ports/
+#: (content/tbb/tbb-firewall-ports/contents+en.lrquestion.title)
+msgid "My firewall only allows a few outgoing ports"
+msgstr ""
+
+#: https//support.torproject.org/tbb/tbb-firewall-ports/
+#: (content/tbb/tbb-firewall-ports/contents+en.lrquestion.description)
+msgid ""
+"If your firewall works by blocking ports, then you can tell Tor to only use "
+"the ports when you start your Tor Browser."
+msgstr ""
+
+#: https//support.torproject.org/tbb/tbb-firewall-ports/
+#: (content/tbb/tbb-firewall-ports/contents+en.lrquestion.description)
+msgid ""
+"Or you can add the ports that your firewall permits by adding "
+"\"FascistFirewall 1\" to your torrc configuration file."
+msgstr ""
+
+#: https//support.torproject.org/tbb/tbb-firewall-ports/
+#: (content/tbb/tbb-firewall-ports/contents+en.lrquestion.description)
+msgid ""
+"By default, when you set this Tor assumes that your firewall allows only "
+"port 80 and port 443 (HTTP and HTTPS respectively)."
+msgstr ""
+
+#: https//support.torproject.org/tbb/tbb-firewall-ports/
+#: (content/tbb/tbb-firewall-ports/contents+en.lrquestion.description)
+msgid ""
+"You can select a different set of ports with the FirewallPorts torrc option."
+msgstr ""
+
+#: https//support.torproject.org/tbb/tbb-firewall-ports/
+#: (content/tbb/tbb-firewall-ports/contents+en.lrquestion.description)
+msgid ""
+"If you want to be more fine-grained with your controls, you can also use the"
+" ReachableAddresses config options, e.g.:"
+msgstr ""
+
+#: https//support.torproject.org/tbb/tbb-firewall-ports/
+#: (content/tbb/tbb-firewall-ports/contents+en.lrquestion.description)
+#: https//support.torproject.org/tbb/tbb-install-tor-central-server/
+#: (content/tbb/tbb-install-tor-central-server/contents+en.lrquestion.description)
+#: https//support.torproject.org/operators/default-exit-ports/
+#: (content/operators/default-exit-ports/contents+en.lrquestion.description)
+#: https//support.torproject.org/operators/hibernation/
+#: (content/operators/hibernation/contents+en.lrquestion.description)
+#: https//support.torproject.org/operators/limit-total-bandwidth/
+#: (content/operators/limit-total-bandwidth/contents+en.lrquestion.description)
+#: https//support.torproject.org/misc/bug-or-feedback/
+#: (content/misc/bug-or-feedback/contents+en.lrquestion.description)
+#: https//support.torproject.org/get-in-touch/why-i-cant-join-tor-channels/
+#: (content/get-in-touch/why-i-cant-join-tor-channels/contents+en.lrquestion.description)
+#: https//support.torproject.org/apt/tor-deb-repo/
+#: (content/apt/apt-1/contents+en.lrquestion.description)
+#: https//support.torproject.org/apt/apt-over-tor/
+#: (content/apt/apt-3/contents+en.lrquestion.description)
+msgid "```"
+msgstr "```"
+
+#: https//support.torproject.org/tbb/tbb-firewall-ports/
+#: (content/tbb/tbb-firewall-ports/contents+en.lrquestion.description)
+msgid "ReachableDirAddresses *:80"
+msgstr ""
+
+#: https//support.torproject.org/tbb/tbb-firewall-ports/
+#: (content/tbb/tbb-firewall-ports/contents+en.lrquestion.description)
+msgid "ReachableORAddresses *:443"
+msgstr ""
+
+#: https//support.torproject.org/tbb/tbb-install-tor-central-server/
+#: (content/tbb/tbb-install-tor-central-server/contents+en.lrquestion.title)
+msgid ""
+"Can I install Tor on a central server, and have my clients connect to it?"
+msgstr ""
+
+#: https//support.torproject.org/tbb/tbb-install-tor-central-server/
+#: (content/tbb/tbb-install-tor-central-server/contents+en.lrquestion.description)
+msgid ""
+"Yes. Tor can be configured as a client or a relay on another machine, and "
+"allow other machines to be able to connect to it for anonymity."
+msgstr ""
+
+#: https//support.torproject.org/tbb/tbb-install-tor-central-server/
+#: (content/tbb/tbb-install-tor-central-server/contents+en.lrquestion.description)
+msgid ""
+"This is most useful in an environment where many computers want a gateway of"
+" anonymity to the rest of the world."
+msgstr ""
+
+#: https//support.torproject.org/tbb/tbb-install-tor-central-server/
+#: (content/tbb/tbb-install-tor-central-server/contents+en.lrquestion.description)
+msgid ""
+"However, be forewarned that with this configuration, anyone within your "
+"private network (existing between you and the Tor client/relay) can see what"
+" traffic you are sending in clear text."
+msgstr ""
+
+#: https//support.torproject.org/tbb/tbb-install-tor-central-server/
+#: (content/tbb/tbb-install-tor-central-server/contents+en.lrquestion.description)
+msgid "The anonymity doesn't start until you get to the Tor relay."
+msgstr ""
+
+#: https//support.torproject.org/tbb/tbb-install-tor-central-server/
+#: (content/tbb/tbb-install-tor-central-server/contents+en.lrquestion.description)
+msgid ""
+"Because of this, if you are the controller of your domain and you know "
+"everything's locked down, you will be OK, but this configuration may not be "
+"suitable for large private networks where security is key all around."
+msgstr ""
+
+#: https//support.torproject.org/tbb/tbb-install-tor-central-server/
+#: (content/tbb/tbb-install-tor-central-server/contents+en.lrquestion.description)
+msgid ""
+"Configuration is simple, editing your torrc file's SocksListenAddress "
+"according to the following examples:"
+msgstr ""
+
+#: https//support.torproject.org/tbb/tbb-install-tor-central-server/
+#: (content/tbb/tbb-install-tor-central-server/contents+en.lrquestion.description)
+msgid "SocksListenAddress 127.0.0.1"
+msgstr ""
+
+#: https//support.torproject.org/tbb/tbb-install-tor-central-server/
+#: (content/tbb/tbb-install-tor-central-server/contents+en.lrquestion.description)
+msgid "SocksListenAddress 192.168.x.x:9100"
+msgstr ""
+
+#: https//support.torproject.org/tbb/tbb-install-tor-central-server/
+#: (content/tbb/tbb-install-tor-central-server/contents+en.lrquestion.description)
+msgid "SocksListenAddress 0.0.0.0:9100"
+msgstr ""
+
+#: https//support.torproject.org/tbb/tbb-install-tor-central-server/
+#: (content/tbb/tbb-install-tor-central-server/contents+en.lrquestion.description)
+msgid ""
+"You can state multiple listen addresses, in the case that you are part of "
+"several networks or subnets."
+msgstr ""
+
+#: https//support.torproject.org/tbb/tbb-install-tor-central-server/
+#: (content/tbb/tbb-install-tor-central-server/contents+en.lrquestion.description)
+msgid "SocksListenAddress 192.168.x.x:9100 #eth0"
+msgstr ""
+
+#: https//support.torproject.org/tbb/tbb-install-tor-central-server/
+#: (content/tbb/tbb-install-tor-central-server/contents+en.lrquestion.description)
+msgid "SocksListenAddress 10.x.x.x:9100 #eth1"
+msgstr ""
+
+#: https//support.torproject.org/tbb/tbb-install-tor-central-server/
+#: (content/tbb/tbb-install-tor-central-server/contents+en.lrquestion.description)
+msgid ""
+"After this, your clients on their respective networks/subnets would specify "
+"a socks proxy with the address and port you specified SocksListenAddress to "
+"be."
+msgstr ""
+
+#: https//support.torproject.org/tbb/tbb-install-tor-central-server/
+#: (content/tbb/tbb-install-tor-central-server/contents+en.lrquestion.description)
+msgid ""
+"Please note that the SocksPort configuration option gives the port ONLY for "
+"localhost (127.0.0.1)."
+msgstr ""
+
+#: https//support.torproject.org/tbb/tbb-install-tor-central-server/
+#: (content/tbb/tbb-install-tor-central-server/contents+en.lrquestion.description)
+msgid ""
+"When setting up your SocksListenAddress(es), you need to give the port with "
+"the address, as shown above."
+msgstr ""
+
+#: https//support.torproject.org/tbb/tbb-install-tor-central-server/
+#: (content/tbb/tbb-install-tor-central-server/contents+en.lrquestion.description)
+msgid ""
+"If you are interested in forcing all outgoing data through the central Tor "
+"client/relay, instead of the server only being an optional proxy, you may "
+"find the program iptables (for *nix) useful."
+msgstr ""
+
+#: https//support.torproject.org/tbb/tbb-run-client-different-computer/
+#: (content/tbb/tbb-run-client-different-computer/contents+en.lrquestion.title)
+msgid ""
+"I want to run my Tor client on a different computer than my applications"
+msgstr ""
+
+#: https//support.torproject.org/tbb/tbb-run-client-different-computer/
+#: (content/tbb/tbb-run-client-different-computer/contents+en.lrquestion.description)
+msgid ""
+"By default, your Tor client only listens for applications that connect from "
+"localhost."
+msgstr ""
+
+#: https//support.torproject.org/tbb/tbb-run-client-different-computer/
+#: (content/tbb/tbb-run-client-different-computer/contents+en.lrquestion.description)
+msgid "Connections from other computers are refused."
+msgstr ""
+
+#: https//support.torproject.org/tbb/tbb-run-client-different-computer/
+#: (content/tbb/tbb-run-client-different-computer/contents+en.lrquestion.description)
+msgid ""
+"If you want to torify applications on different computers than the Tor "
+"client, you should edit your torrc to define `SocksListenAddress 0.0.0.0` "
+"and then restart (or hup) Tor."
+msgstr ""
+
+#: https//support.torproject.org/tbb/tbb-run-client-different-computer/
+#: (content/tbb/tbb-run-client-different-computer/contents+en.lrquestion.description)
+msgid ""
+"If you want to get more advanced, you can configure your Tor client on a "
+"firewall to bind to your internal IP but not your external IP."
+msgstr ""
+
#: https//support.torproject.org/tbb/website-blocking-tor/
#: (content/tbb/website-blocking-tor/contents+en.lrquestion.title)
msgid "A website I am trying to reach is blocking access over Tor."
@@ -6750,6 +7545,130 @@ msgid ""
"guide."
msgstr ""
+#: https//support.torproject.org/operators/default-exit-ports/
+#: (content/operators/default-exit-ports/contents+en.lrquestion.title)
+msgid "Is there a list of default exit ports?"
+msgstr ""
+
+#: https//support.torproject.org/operators/default-exit-ports/
+#: (content/operators/default-exit-ports/contents+en.lrquestion.description)
+msgid ""
+"The default open ports are listed below but keep in mind that, any port or "
+"ports can be opened by the relay operator by configuring it in torrc or "
+"modifying the source code."
+msgstr ""
+
+#: https//support.torproject.org/operators/default-exit-ports/
+#: (content/operators/default-exit-ports/contents+en.lrquestion.description)
+msgid ""
+"The default according to src/or/policies.c ([line 85][1] and [line 1901][2])"
+" from the source code release [release-0.4.6][3]:"
+msgstr ""
+
+#: https//support.torproject.org/operators/default-exit-ports/
+#: (content/operators/default-exit-ports/contents+en.lrquestion.description)
+msgid "reject 0.0.0.0/8"
+msgstr ""
+
+#: https//support.torproject.org/operators/default-exit-ports/
+#: (content/operators/default-exit-ports/contents+en.lrquestion.description)
+msgid "reject 169.254.0.0/16"
+msgstr ""
+
+#: https//support.torproject.org/operators/default-exit-ports/
+#: (content/operators/default-exit-ports/contents+en.lrquestion.description)
+msgid "reject 127.0.0.0/8"
+msgstr ""
+
+#: https//support.torproject.org/operators/default-exit-ports/
+#: (content/operators/default-exit-ports/contents+en.lrquestion.description)
+msgid "reject 192.168.0.0/16"
+msgstr ""
+
+#: https//support.torproject.org/operators/default-exit-ports/
+#: (content/operators/default-exit-ports/contents+en.lrquestion.description)
+msgid "reject 10.0.0.0/8"
+msgstr ""
+
+#: https//support.torproject.org/operators/default-exit-ports/
+#: (content/operators/default-exit-ports/contents+en.lrquestion.description)
+msgid "reject 172.16.0.0/12"
+msgstr ""
+
+#: https//support.torproject.org/operators/default-exit-ports/
+#: (content/operators/default-exit-ports/contents+en.lrquestion.description)
+msgid "reject *:25"
+msgstr ""
+
+#: https//support.torproject.org/operators/default-exit-ports/
+#: (content/operators/default-exit-ports/contents+en.lrquestion.description)
+msgid "reject *:119"
+msgstr ""
+
+#: https//support.torproject.org/operators/default-exit-ports/
+#: (content/operators/default-exit-ports/contents+en.lrquestion.description)
+msgid "reject *:135-139"
+msgstr ""
+
+#: https//support.torproject.org/operators/default-exit-ports/
+#: (content/operators/default-exit-ports/contents+en.lrquestion.description)
+msgid "reject *:445"
+msgstr ""
+
+#: https//support.torproject.org/operators/default-exit-ports/
+#: (content/operators/default-exit-ports/contents+en.lrquestion.description)
+msgid "reject *:563"
+msgstr ""
+
+#: https//support.torproject.org/operators/default-exit-ports/
+#: (content/operators/default-exit-ports/contents+en.lrquestion.description)
+msgid "reject *:1214"
+msgstr ""
+
+#: https//support.torproject.org/operators/default-exit-ports/
+#: (content/operators/default-exit-ports/contents+en.lrquestion.description)
+msgid "reject *:4661-4666"
+msgstr ""
+
+#: https//support.torproject.org/operators/default-exit-ports/
+#: (content/operators/default-exit-ports/contents+en.lrquestion.description)
+msgid "reject *:6346-6429"
+msgstr ""
+
+#: https//support.torproject.org/operators/default-exit-ports/
+#: (content/operators/default-exit-ports/contents+en.lrquestion.description)
+msgid "reject *:6699"
+msgstr ""
+
+#: https//support.torproject.org/operators/default-exit-ports/
+#: (content/operators/default-exit-ports/contents+en.lrquestion.description)
+msgid "reject *:6881-6999"
+msgstr ""
+
+#: https//support.torproject.org/operators/default-exit-ports/
+#: (content/operators/default-exit-ports/contents+en.lrquestion.description)
+msgid "accept *:*"
+msgstr ""
+
+#: https//support.torproject.org/operators/default-exit-ports/
+#: (content/operators/default-exit-ports/contents+en.lrquestion.description)
+msgid ""
+"[1]: "
+"https://gitlab.torproject.org/tpo/core/tor/-/blob/release-0.4.6/src/core/or/policies.c#L85"
+msgstr ""
+
+#: https//support.torproject.org/operators/default-exit-ports/
+#: (content/operators/default-exit-ports/contents+en.lrquestion.description)
+msgid ""
+"[2]: "
+"https://gitlab.torproject.org/tpo/core/tor/-/blob/release-0.4.6/src/core/or/policies.c#L1901"
+msgstr ""
+
+#: https//support.torproject.org/operators/default-exit-ports/
+#: (content/operators/default-exit-ports/contents+en.lrquestion.description)
+msgid "[3]: https://gitlab.torproject.org/tpo/core/tor/-/tree/release-0.4.6/"
+msgstr ""
+
#: https//support.torproject.org/operators/dynamic-ip/
#: (content/operators/dynamic-ip/contents+en.lrquestion.title)
msgid "Can I run a Tor relay using a dynamic IP address?"
@@ -6897,21 +7816,6 @@ msgid ""
"into hibernation, signaled by this entry in the log:"
msgstr ""
-#: https//support.torproject.org/operators/hibernation/
-#: (content/operators/hibernation/contents+en.lrquestion.description)
-#: https//support.torproject.org/operators/limit-total-bandwidth/
-#: (content/operators/limit-total-bandwidth/contents+en.lrquestion.description)
-#: https//support.torproject.org/misc/bug-or-feedback/
-#: (content/misc/bug-or-feedback/contents+en.lrquestion.description)
-#: https//support.torproject.org/get-in-touch/why-i-cant-join-tor-channels/
-#: (content/get-in-touch/why-i-cant-join-tor-channels/contents+en.lrquestion.description)
-#: https//support.torproject.org/apt/tor-deb-repo/
-#: (content/apt/apt-1/contents+en.lrquestion.description)
-#: https//support.torproject.org/apt/apt-over-tor/
-#: (content/apt/apt-3/contents+en.lrquestion.description)
-msgid "```"
-msgstr "```"
-
#: https//support.torproject.org/operators/hibernation/
#: (content/operators/hibernation/contents+en.lrquestion.description)
msgid "Bandwidth soft limit reached; commencing hibernation."
@@ -9156,6 +10060,131 @@ msgstr "uid tor-security at lists.torproject.org"
msgid "sub 4096R/C00942E4 2017-03-13"
msgstr "sub 4096R/C00942E4 2017-03-13"
+#: https//support.torproject.org/misc/check-socks-dns-leaks/
+#: (content/misc/check-socks-dns-leaks/contents+en.lrquestion.title)
+msgid ""
+"How do I check if my application that uses SOCKS is leaking DNS requests?"
+msgstr ""
+
+#: https//support.torproject.org/misc/check-socks-dns-leaks/
+#: (content/misc/check-socks-dns-leaks/contents+en.lrquestion.description)
+msgid ""
+"Even if your application is using the correct variant of the SOCKS protocol,"
+" there is still a risk that it could be leaking DNS queries."
+msgstr ""
+
+#: https//support.torproject.org/misc/check-socks-dns-leaks/
+#: (content/misc/check-socks-dns-leaks/contents+en.lrquestion.description)
+msgid ""
+"This problem happens in Firefox extensions that resolve the destination "
+"hostname themselves, for example to show you its IP address, what country "
+"it's in, etc."
+msgstr ""
+
+#: https//support.torproject.org/misc/check-socks-dns-leaks/
+#: (content/misc/check-socks-dns-leaks/contents+en.lrquestion.description)
+msgid ""
+"If you suspect your application might behave like this, follow the "
+"instructions below to check."
+msgstr ""
+
+#: https//support.torproject.org/misc/check-socks-dns-leaks/
+#: (content/misc/check-socks-dns-leaks/contents+en.lrquestion.description)
+msgid ""
+"1. Add `TestSocks 1` to your [torrc file](https://support.torproject.org/tbb"
+"/tbb-editing-torrc/)."
+msgstr ""
+
+#: https//support.torproject.org/misc/check-socks-dns-leaks/
+#: (content/misc/check-socks-dns-leaks/contents+en.lrquestion.description)
+msgid ""
+"1. Start Tor, and point your program's SOCKS proxy settings to Tor's SOCKS5 "
+"server (`socks5://127.0.0.1:9050` by default)."
+msgstr ""
+
+#: https//support.torproject.org/misc/check-socks-dns-leaks/
+#: (content/misc/check-socks-dns-leaks/contents+en.lrquestion.description)
+msgid ""
+"1. Watch your logs as you use your application. For each socks connection, "
+"Tor will log a `notice` for safe connections, and a `warn` for connections "
+"leaking DNS requests."
+msgstr ""
+
+#: https//support.torproject.org/misc/check-socks-dns-leaks/
+#: (content/misc/check-socks-dns-leaks/contents+en.lrquestion.description)
+msgid ""
+"If you want to automatically disable all connections leaking DNS requests, "
+"set `SafeSocks 1` in your torrc file."
+msgstr ""
+
+#: https//support.torproject.org/misc/hide-exits/
+#: (content/misc/hide-exits/contents+en.lrquestion.title)
+msgid ""
+"You should hide the list of Tor relays, so people can't block the exits."
+msgstr ""
+
+#: https//support.torproject.org/misc/hide-exits/
+#: (content/misc/hide-exits/contents+en.lrquestion.description)
+msgid "There are a few reasons we don't:"
+msgstr ""
+
+#: https//support.torproject.org/misc/hide-exits/
+#: (content/misc/hide-exits/contents+en.lrquestion.description)
+msgid ""
+"1. We can't help but make the information available, since Tor clients need "
+"to use it to pick their paths."
+msgstr ""
+
+#: https//support.torproject.org/misc/hide-exits/
+#: (content/misc/hide-exits/contents+en.lrquestion.description)
+msgid "So if the \"blockers\" want it, they can get it anyway."
+msgstr ""
+
+#: https//support.torproject.org/misc/hide-exits/
+#: (content/misc/hide-exits/contents+en.lrquestion.description)
+msgid ""
+"Further, even if we didn't tell clients about the list of relays directly, "
+"somebody could still make a lot of connections through Tor to a test site "
+"and build a list of the addresses they see."
+msgstr ""
+
+#: https//support.torproject.org/misc/hide-exits/
+#: (content/misc/hide-exits/contents+en.lrquestion.description)
+msgid ""
+"1. If people want to block us, we believe that they should be allowed to do "
+"so."
+msgstr ""
+
+#: https//support.torproject.org/misc/hide-exits/
+#: (content/misc/hide-exits/contents+en.lrquestion.description)
+msgid ""
+"Obviously, we would prefer for everybody to allow Tor users to connect to "
+"them, but people have the right to decide who their services should allow "
+"connections from, and if they want to block anonymous users, they can."
+msgstr ""
+
+#: https//support.torproject.org/misc/hide-exits/
+#: (content/misc/hide-exits/contents+en.lrquestion.description)
+msgid ""
+"1. Being blockable also has tactical advantages: it may be a persuasive "
+"response to website maintainers who feel threatened by Tor."
+msgstr ""
+
+#: https//support.torproject.org/misc/hide-exits/
+#: (content/misc/hide-exits/contents+en.lrquestion.description)
+msgid ""
+"Giving them the option may inspire them to stop and think about whether they"
+" really want to eliminate private access to their system, and if not, what "
+"other options they might have."
+msgstr ""
+
+#: https//support.torproject.org/misc/hide-exits/
+#: (content/misc/hide-exits/contents+en.lrquestion.description)
+msgid ""
+"The time they might otherwise have spent blocking Tor, they may instead "
+"spend rethinking their overall approach to privacy and anonymity."
+msgstr ""
+
#: https//support.torproject.org/misc/menu/
#: (content/misc/menu/contents+en.lrquestion.description)
msgid "About"
@@ -9742,56 +10771,20 @@ msgstr "### ããã¯ãã¼ã ãæ¤è¨¼ããæ¹æ³"
#: https//support.torproject.org/get-in-touch/why-i-cant-join-tor-channels/
#: (content/get-in-touch/why-i-cant-join-tor-channels/contents+en.lrquestion.description)
msgid ""
-"Then, to complete the registration and ultimately gain access to the #tor-"
-"project channel, your nickname must be **verified**."
+"After registering your nickname, to gain access to the #tor-project and "
+"other protected channels, your nickname must be **verified**."
msgstr ""
#: https//support.torproject.org/get-in-touch/why-i-cant-join-tor-channels/
#: (content/get-in-touch/why-i-cant-join-tor-channels/contents+en.lrquestion.description)
msgid ""
-"1. To verify your nick, open a new browser window and go to "
-"https://webchat.oftc.net/?channels=tor."
+"1. Go to https://services.oftc.net/ and follow the steps in the '*To verify "
+"your account*' section"
msgstr ""
#: https//support.torproject.org/get-in-touch/why-i-cant-join-tor-channels/
#: (content/get-in-touch/why-i-cant-join-tor-channels/contents+en.lrquestion.description)
-msgid "2. Log in with your IRC nickname and password."
-msgstr "2. IRC ããã¯ãã¼ã ã¨ãã¹ã¯ã¼ãã使ããã°ã¤ã³ãã¾ãã"
-
-#: https//support.torproject.org/get-in-touch/why-i-cant-join-tor-channels/
-#: (content/get-in-touch/why-i-cant-join-tor-channels/contents+en.lrquestion.description)
-msgid ""
-"3. Look for the word **verify** and log in there. It may appear that nothing"
-" has happened. Look at the top of the page, and there will be a column "
-"called **Account**."
-msgstr ""
-
-#: https//support.torproject.org/get-in-touch/why-i-cant-join-tor-channels/
-#: (content/get-in-touch/why-i-cant-join-tor-channels/contents+en.lrquestion.description)
-msgid "4. Click on **Account**."
-msgstr "4. **Account** ãã¯ãªãã¯ãã¾ãã"
-
-#: https//support.torproject.org/get-in-touch/why-i-cant-join-tor-channels/
-#: (content/get-in-touch/why-i-cant-join-tor-channels/contents+en.lrquestion.description)
-msgid ""
-"5. Click on the small sentence at the bottom of the square that says: Verify"
-" account."
-msgstr ""
-
-#: https//support.torproject.org/get-in-touch/why-i-cant-join-tor-channels/
-#: (content/get-in-touch/why-i-cant-join-tor-channels/contents+en.lrquestion.description)
-msgid "6. Fill out the Captcha that pops up, and click ok."
-msgstr ""
-
-#: https//support.torproject.org/get-in-touch/why-i-cant-join-tor-channels/
-#: (content/get-in-touch/why-i-cant-join-tor-channels/contents+en.lrquestion.description)
-msgid ""
-"7. A tiny message will appear: \"Your NickServ account has been verified.\""
-msgstr ""
-
-#: https//support.torproject.org/get-in-touch/why-i-cant-join-tor-channels/
-#: (content/get-in-touch/why-i-cant-join-tor-channels/contents+en.lrquestion.description)
-msgid "8. Go back to the IRC webpage where you are logged in and type:"
+msgid "2. Go back to the IRC webpage where you are logged in and type:"
msgstr ""
#: https//support.torproject.org/get-in-touch/why-i-cant-join-tor-channels/
@@ -9801,12 +10794,12 @@ msgstr "`/msg nickserv checkverify`"
#: https//support.torproject.org/get-in-touch/why-i-cant-join-tor-channels/
#: (content/get-in-touch/why-i-cant-join-tor-channels/contents+en.lrquestion.description)
-msgid "9. Click ENTER."
-msgstr "9. ENTER ãã¯ãªãã¯ãã¾ãã"
+msgid "3. Click ENTER."
+msgstr ""
#: https//support.torproject.org/get-in-touch/why-i-cant-join-tor-channels/
#: (content/get-in-touch/why-i-cant-join-tor-channels/contents+en.lrquestion.description)
-msgid "10. If all is well, you will receive a message that says:"
+msgid "4. If all is well, you will receive a message that says:"
msgstr ""
#: https//support.torproject.org/get-in-touch/why-i-cant-join-tor-channels/
@@ -9950,19 +10943,23 @@ msgstr "# apt install apt-transport-https"
#: https//support.torproject.org/apt/tor-deb-repo/
#: (content/apt/apt-1/contents+en.lrquestion.description)
msgid ""
-"#### 2. Add the following entries to `/etc/apt/sources.list` or a new file "
-"in `/etc/apt/sources.list.d/`"
+"#### 2. Create a new file in `/etc/apt/sources.list.d/` named `tor.list`. "
+"Add the following entries:"
msgstr ""
#: https//support.torproject.org/apt/tor-deb-repo/
#: (content/apt/apt-1/contents+en.lrquestion.description)
-msgid "deb https://deb.torproject.org/torproject.org <DISTRIBUTION> main"
-msgstr "deb https://deb.torproject.org/torproject.org <DISTRIBUTION> main"
+msgid ""
+"deb [signed-by=/usr/share/keyrings/tor-archive-keyring.gpg] "
+"https://deb.torproject.org/torproject.org <DISTRIBUTION> main"
+msgstr ""
#: https//support.torproject.org/apt/tor-deb-repo/
#: (content/apt/apt-1/contents+en.lrquestion.description)
-msgid "deb-src https://deb.torproject.org/torproject.org <DISTRIBUTION> main"
-msgstr "deb-src https://deb.torproject.org/torproject.org <ãã£ã¹ããªãã¥ã¼ã·ã§ã³> main"
+msgid ""
+"deb-src [signed-by=/usr/share/keyrings/tor-archive-keyring.gpg] "
+"https://deb.torproject.org/torproject.org <DISTRIBUTION> main"
+msgstr ""
#: https//support.torproject.org/apt/tor-deb-repo/
#: (content/apt/apt-1/contents+en.lrquestion.description)
@@ -9975,14 +10972,16 @@ msgstr ""
#: https//support.torproject.org/apt/tor-deb-repo/
#: (content/apt/apt-1/contents+en.lrquestion.description)
msgid ""
-"deb https://deb.torproject.org/torproject.org tor-"
+"deb [signed-by=/usr/share/keyrings/tor-archive-keyring.gpg] "
+"https://deb.torproject.org/torproject.org tor-"
"experimental-0.4.6.x-<DISTRIBUTION> main"
msgstr ""
#: https//support.torproject.org/apt/tor-deb-repo/
#: (content/apt/apt-1/contents+en.lrquestion.description)
msgid ""
-"deb-src https://deb.torproject.org/torproject.org tor-"
+"deb-src [signed-by=/usr/share/keyrings/tor-archive-keyring.gpg] "
+"https://deb.torproject.org/torproject.org tor-"
"experimental-0.4.6.x-<DISTRIBUTION> main"
msgstr ""
@@ -9994,20 +10993,18 @@ msgstr "ãã¤ããªã¼ãã«ãã®å ´å:"
#: https//support.torproject.org/apt/tor-deb-repo/
#: (content/apt/apt-1/contents+en.lrquestion.description)
msgid ""
-"deb https://deb.torproject.org/torproject.org tor-nightly-"
-"master-<DISTRIBUTION> main"
+"deb [signed-by=/usr/share/keyrings/tor-archive-keyring.gpg] "
+"https://deb.torproject.org/torproject.org tor-nightly-master-<DISTRIBUTION> "
+"main"
msgstr ""
-"deb https://deb.torproject.org/torproject.org tor-nightly-"
-"master-<DISTRIBUTION> main"
#: https//support.torproject.org/apt/tor-deb-repo/
#: (content/apt/apt-1/contents+en.lrquestion.description)
msgid ""
-"deb-src https://deb.torproject.org/torproject.org tor-nightly-"
-"master-<DISTRIBUTION> main"
+"deb-src [signed-by=/usr/share/keyrings/tor-archive-keyring.gpg] "
+"https://deb.torproject.org/torproject.org tor-nightly-master-<DISTRIBUTION> "
+"main"
msgstr ""
-"deb-src https://deb.torproject.org/torproject.org tor-nightly-"
-"master-<ãã£ã¹ããªãã¥ã¼ã·ã§ã³> main"
#: https//support.torproject.org/apt/tor-deb-repo/
#: (content/apt/apt-1/contents+en.lrquestion.description)
@@ -10027,16 +11024,16 @@ msgstr ""
#: https//support.torproject.org/apt/tor-deb-repo/
#: (content/apt/apt-1/contents+en.lrquestion.description)
msgid ""
-"deb [arch=amd64] https://deb.torproject.org/torproject.org focal main"
+"deb [arch=amd64 signed-by=/usr/share/keyrings/tor-archive-keyring.gpg] "
+"https://deb.torproject.org/torproject.org focal main"
msgstr ""
-"deb [arch=amd64] https://deb.torproject.org/torproject.org focal main"
#: https//support.torproject.org/apt/tor-deb-repo/
#: (content/apt/apt-1/contents+en.lrquestion.description)
msgid ""
-"deb-src [arch=amd64] https://deb.torproject.org/torproject.org focal main"
+"deb-src [arch=amd64 signed-by=/usr/share/keyrings/tor-archive-keyring.gpg] "
+"https://deb.torproject.org/torproject.org focal main"
msgstr ""
-"deb-src [arch=amd64] https://deb.torproject.org/torproject.org focal main"
#: https//support.torproject.org/apt/tor-deb-repo/
#: (content/apt/apt-1/contents+en.lrquestion.description)
@@ -10055,26 +11052,17 @@ msgstr ""
#: (content/apt/apt-1/contents+en.lrquestion.description)
msgid ""
"#### 3. Then add the gpg key used to sign the packages by running the "
-"following commands at your command prompt"
+"following command at your command prompt:"
msgstr ""
#: https//support.torproject.org/apt/tor-deb-repo/
#: (content/apt/apt-1/contents+en.lrquestion.description)
msgid ""
-"# wget -qO- "
+"# wget -O- "
"https://deb.torproject.org/torproject.org/A3C4F0F979CAA22CDBA8F512EE8CBC9E886DDD89.asc"
-" | gpg --import"
+" | gpg --dearmor | tee /usr/share/keyrings/tor-archive-keyring.gpg "
+">/dev/null"
msgstr ""
-"# wget -qO- "
-"https://deb.torproject.org/torproject.org/A3C4F0F979CAA22CDBA8F512EE8CBC9E886DDD89.asc"
-" | gpg --import"
-
-#: https//support.torproject.org/apt/tor-deb-repo/
-#: (content/apt/apt-1/contents+en.lrquestion.description)
-msgid ""
-"# gpg --export A3C4F0F979CAA22CDBA8F512EE8CBC9E886DDD89 | apt-key add -"
-msgstr ""
-"# gpg --export A3C4F0F979CAA22CDBA8F512EE8CBC9E886DDD89 | apt-key add -"
#: https//support.torproject.org/apt/tor-deb-repo/
#: (content/apt/apt-1/contents+en.lrquestion.description)
@@ -11686,6 +12674,82 @@ msgid ""
"doesn't change IP address over the day."
msgstr ""
+#: https//support.torproject.org/alternate-designs/block-websites/
+#: (content/alternate-designs/block-websites/contents+en.lrquestion.title)
+msgid "Exit policies should be able to block websites, not just IP addresses."
+msgstr ""
+
+#: https//support.torproject.org/alternate-designs/block-websites/
+#: (content/alternate-designs/block-websites/contents+en.lrquestion.description)
+msgid ""
+"It would be nice to let relay operators say things like `reject "
+"www.slashdot.org` in their exit policies, rather than requiring them to "
+"learn all the IP address space that could be covered by the site (and then "
+"also blocking other sites at those IP addresses)."
+msgstr ""
+
+#: https//support.torproject.org/alternate-designs/block-websites/
+#: (content/alternate-designs/block-websites/contents+en.lrquestion.description)
+msgid "There are two problems, though."
+msgstr ""
+
+#: https//support.torproject.org/alternate-designs/block-websites/
+#: (content/alternate-designs/block-websites/contents+en.lrquestion.description)
+msgid "First, users could still get around these blocks."
+msgstr ""
+
+#: https//support.torproject.org/alternate-designs/block-websites/
+#: (content/alternate-designs/block-websites/contents+en.lrquestion.description)
+msgid ""
+"For example, they could request the IP address rather than the hostname when"
+" they exit from the Tor network."
+msgstr ""
+
+#: https//support.torproject.org/alternate-designs/block-websites/
+#: (content/alternate-designs/block-websites/contents+en.lrquestion.description)
+msgid ""
+"This means operators would still need to learn all the IP addresses for the "
+"destinations in question."
+msgstr ""
+
+#: https//support.torproject.org/alternate-designs/block-websites/
+#: (content/alternate-designs/block-websites/contents+en.lrquestion.description)
+msgid ""
+"The second problem is that it would allow remote attackers to censor "
+"arbitrary sites."
+msgstr ""
+
+#: https//support.torproject.org/alternate-designs/block-websites/
+#: (content/alternate-designs/block-websites/contents+en.lrquestion.description)
+msgid ""
+"For example, if a Tor operator blocks www1.slashdot.org, and then some "
+"attacker poisons the Tor relay's DNS or otherwise changes that hostname to "
+"resolve to the IP address for a major news site, then suddenly that Tor "
+"relay is blocking the news site."
+msgstr ""
+
+#: https//support.torproject.org/alternate-designs/let-the-network-pick-the-path/
+#: (content/alternate-designs/let-the-network-pick-the-path/contents+en.lrquestion.title)
+msgid "You should let the network pick the path, not the client."
+msgstr ""
+
+#: https//support.torproject.org/alternate-designs/let-the-network-pick-the-path/
+#: (content/alternate-designs/let-the-network-pick-the-path/contents+en.lrquestion.description)
+msgid "No, you cannot trust the network to pick the path."
+msgstr ""
+
+#: https//support.torproject.org/alternate-designs/let-the-network-pick-the-path/
+#: (content/alternate-designs/let-the-network-pick-the-path/contents+en.lrquestion.description)
+msgid "Malicious relays could route you through their colluding friends."
+msgstr ""
+
+#: https//support.torproject.org/alternate-designs/let-the-network-pick-the-path/
+#: (content/alternate-designs/let-the-network-pick-the-path/contents+en.lrquestion.description)
+msgid ""
+"This would give an adversary the ability to watch all of your traffic end to"
+" end."
+msgstr ""
+
#: lego/templates/banner.html:3 lego/templates/banner.html:5
#: templates/banner.html:3 templates/banner.html:5
msgid "Close banner"
@@ -11716,8 +12780,8 @@ msgid "DONATE NOW"
msgstr "ä»ããå¯ä»ãã"
#: lego/templates/footer.html:13 lego/templates/footer.html:22
-#: lego/templates/navbar.html:83 templates/footer.html:13
-#: templates/footer.html:22 templates/navbar.html:83
+#: lego/templates/navbar.html:95 templates/footer.html:13
+#: templates/footer.html:22 templates/navbar.html:95
msgid "Download Tor Browser"
msgstr "Tor Browser ããã¦ã³ãã¼ã"
diff --git a/contents+ka.po b/contents+ka.po
index d68e57531d..82f55d3f9f 100644
--- a/contents+ka.po
+++ b/contents+ka.po
@@ -8,7 +8,7 @@ msgid ""
msgstr ""
"Project-Id-Version: PACKAGE VERSION\n"
"Report-Msgid-Bugs-To: \n"
-"POT-Creation-Date: 2021-08-25 11:14+CET\n"
+"POT-Creation-Date: 2021-09-01 12:20+CET\n"
"PO-Revision-Date: 2018-10-02 22:41+0000\n"
"Last-Translator: Georgianization, 2021\n"
"Language-Team: Georgian (https://www.transifex.com/otf/teams/1519/ka/)\n"
@@ -141,6 +141,11 @@ msgstr "ááá á¦ááááááá¡ á²®á²á²"
msgid "Tor Metrics"
msgstr "Tor-ááááááááá"
+#: https//support.torproject.org/alternate-designs/
+#: (content/alternate-designs/contents+en.lrtopic.title)
+msgid "Alternate Designs We Don't Do (Yet)"
+msgstr ""
+
#: https//support.torproject.org/glossary/add-on-extension-or-plugin/
#: (content/glossary/add-on-extension-or-plugin/contents+en.lrword.term)
msgid "add-on, extension, or plugin"
@@ -2547,6 +2552,63 @@ msgstr ""
"ááááá¢áááá, Tor-áá¡ VPN-ááá ááááá§áááááá¡ á¨áá¡áá®áá, á¨áááá«áááá áá®áááá [á©áááá¡ "
"ááááá¨á](https://trac.torproject.org/projects/tor/wiki/doc/TorPlusVPN)."
+#: https//support.torproject.org/faq/relay-donations/
+#: (content/faq/relay-donations/contents+en.lrquestion.title)
+msgid "Can I donate for a relay rather than run my own?"
+msgstr ""
+
+#: https//support.torproject.org/faq/relay-donations/
+#: (content/faq/relay-donations/contents+en.lrquestion.description)
+msgid ""
+"Sure! We have a [list of organizations that run Tor "
+"relays](https://community.torproject.org/relay/community-resources/relay-"
+"associations/) that are happy to turn your donations into better speed and "
+"anonymity for the Tor network."
+msgstr ""
+
+#: https//support.torproject.org/faq/relay-donations/
+#: (content/faq/relay-donations/contents+en.lrquestion.description)
+msgid ""
+"These organizations are not the same as [The Tor Project, "
+"Inc](https://donate.torproject.org/), but we consider that a good thing."
+msgstr ""
+
+#: https//support.torproject.org/faq/relay-donations/
+#: (content/faq/relay-donations/contents+en.lrquestion.description)
+msgid "They're run by nice people who are part of the Tor community."
+msgstr ""
+"ááá áá£á¨ááááá¨á ááááá¬ááááááá¡ áá¦áááá áááááááááá, á áááááá᪠Tor-áá ááááá¡ "
+"ááá£áááááá."
+
+#: https//support.torproject.org/faq/relay-donations/
+#: (content/faq/relay-donations/contents+en.lrquestion.description)
+msgid ""
+"Note that there can be a tradeoff here between anonymity and performance."
+msgstr ""
+
+#: https//support.torproject.org/faq/relay-donations/
+#: (content/faq/relay-donations/contents+en.lrquestion.description)
+msgid ""
+"The Tor network's anonymity comes in part from diversity, so if you are in a"
+" position to run your own relay, you will be improving Tor's anonymity more "
+"than by donating."
+msgstr ""
+
+#: https//support.torproject.org/faq/relay-donations/
+#: (content/faq/relay-donations/contents+en.lrquestion.description)
+msgid ""
+"At the same time though, economies of scale for bandwidth mean that "
+"combining many small donations into several larger relays is more efficient "
+"at improving network performance."
+msgstr ""
+
+#: https//support.torproject.org/faq/relay-donations/
+#: (content/faq/relay-donations/contents+en.lrquestion.description)
+msgid ""
+"Improving anonymity and improving performance are both worthwhile goals, so "
+"however you can help is great!"
+msgstr ""
+
#: https//support.torproject.org/faq/staying-anonymous/
#: (content/faq/staying-anonymous/contents+en.lrquestion.title)
msgid "Am I totally anonymous if I use Tor?"
@@ -2916,6 +2978,61 @@ msgstr ""
"áá¡ á¡áá á¡áá¤á áá®ááááá¡á áá áá á¡á á£áá, áááááá®ááá áá [áááááááááááá áá áá¦áá¬áá áá á§áááá "
"ááááááá](https://community.torproject.org/)."
+#: https//support.torproject.org/about/attacks-on-onion-routing/
+#: (content/about/attacks-on-onion-routing/contents+en.lrquestion.title)
+msgid "What attacks remain against onion routing?"
+msgstr ""
+
+#: https//support.torproject.org/about/attacks-on-onion-routing/
+#: (content/about/attacks-on-onion-routing/contents+en.lrquestion.description)
+msgid ""
+"As mentioned above, it is possible for an observer who can view both you and"
+" either the destination website or your Tor exit node to correlate timings "
+"of your traffic as it enters the Tor network and also as it exits."
+msgstr ""
+
+#: https//support.torproject.org/about/attacks-on-onion-routing/
+#: (content/about/attacks-on-onion-routing/contents+en.lrquestion.description)
+msgid "Tor does not defend against such a threat model."
+msgstr ""
+
+#: https//support.torproject.org/about/attacks-on-onion-routing/
+#: (content/about/attacks-on-onion-routing/contents+en.lrquestion.description)
+msgid ""
+"In a more limited sense, note that if a censor or law enforcement agency has"
+" the ability to obtain specific observation of parts of the network, it is "
+"possible for them to verify a suspicion that you talk regularly to your "
+"friend by observing traffic at both ends and correlating the timing of only "
+"that traffic."
+msgstr ""
+
+#: https//support.torproject.org/about/attacks-on-onion-routing/
+#: (content/about/attacks-on-onion-routing/contents+en.lrquestion.description)
+msgid ""
+"Again, this is only useful to verify that parties already suspected of "
+"communicating with one another are doing so."
+msgstr ""
+
+#: https//support.torproject.org/about/attacks-on-onion-routing/
+#: (content/about/attacks-on-onion-routing/contents+en.lrquestion.description)
+msgid ""
+"In most countries, the suspicion required to obtain a warrant already "
+"carries more weight than timing correlation would provide."
+msgstr ""
+
+#: https//support.torproject.org/about/attacks-on-onion-routing/
+#: (content/about/attacks-on-onion-routing/contents+en.lrquestion.description)
+msgid ""
+"Furthermore, since Tor reuses circuits for multiple TCP connections, it is "
+"possible to associate non anonymous and anonymous traffic at a given exit "
+"node, so be careful about what applications you run concurrently over Tor."
+msgstr ""
+
+#: https//support.torproject.org/about/attacks-on-onion-routing/
+#: (content/about/attacks-on-onion-routing/contents+en.lrquestion.description)
+msgid "Perhaps even run separate Tor clients for these applications."
+msgstr ""
+
#: https//support.torproject.org/about/backdoor/
#: (content/about/backdoor/contents+en.lrquestion.title)
msgid "Is there a backdoor in Tor?"
@@ -3086,6 +3203,43 @@ msgstr ""
"Tor-áá¡ á¡á®áá áá áá£ááá ááááá ááááá§ááááá [á¡áá¤á áá®áá¡ á¨áááªáááá áá "
"áá áá¡áá¡á£á ááááá](/ka/tbb/tbb-9/)."
+#: https//support.torproject.org/about/change-paths/
+#: (content/about/change-paths/contents+en.lrquestion.title)
+msgid "How often does Tor change its paths?"
+msgstr ""
+
+#: https//support.torproject.org/about/change-paths/
+#: (content/about/change-paths/contents+en.lrquestion.description)
+msgid ""
+"Tor will reuse the same circuit for new TCP streams for 10 minutes, as long "
+"as the circuit is working fine."
+msgstr ""
+
+#: https//support.torproject.org/about/change-paths/
+#: (content/about/change-paths/contents+en.lrquestion.description)
+msgid "(If the circuit fails, Tor will switch to a new circuit immediately.)"
+msgstr ""
+
+#: https//support.torproject.org/about/change-paths/
+#: (content/about/change-paths/contents+en.lrquestion.description)
+msgid ""
+"But note that a single TCP stream (e.g. a long IRC connection) will stay on "
+"the same circuit forever."
+msgstr ""
+
+#: https//support.torproject.org/about/change-paths/
+#: (content/about/change-paths/contents+en.lrquestion.description)
+msgid "We don't rotate individual streams from one circuit to the next."
+msgstr ""
+
+#: https//support.torproject.org/about/change-paths/
+#: (content/about/change-paths/contents+en.lrquestion.description)
+msgid ""
+"Otherwise, an adversary with a partial view of the network would be given "
+"many chances over time to link you to your destination, rather than just one"
+" chance."
+msgstr ""
+
#: https//support.torproject.org/about/distribute-tor/
#: (content/about/distribute-tor/contents+en.lrquestion.title)
msgid "Can I distribute Tor?"
@@ -3201,6 +3355,133 @@ msgstr ""
"áá®áááá, á©áááá [á¡ááááá á ááá¨ááááá¡ "
"á®.á.á.](https://www.torproject.org/ka/about/trademark/) áá áªááá."
+#: https//support.torproject.org/about/entry-guards/
+#: (content/about/entry-guards/contents+en.lrquestion.title)
+msgid "What are Entry Guards?"
+msgstr ""
+
+#: https//support.torproject.org/about/entry-guards/
+#: (content/about/entry-guards/contents+en.lrquestion.description)
+msgid ""
+"Tor (like all current practical low-latency anonymity designs) fails when "
+"the attacker can see both ends of the communications channel."
+msgstr ""
+
+#: https//support.torproject.org/about/entry-guards/
+#: (content/about/entry-guards/contents+en.lrquestion.description)
+msgid ""
+"For example, suppose the attacker controls or watches the Tor relay you "
+"choose to enter the network, and also controls or watches the website you "
+"visit."
+msgstr ""
+
+#: https//support.torproject.org/about/entry-guards/
+#: (content/about/entry-guards/contents+en.lrquestion.description)
+msgid ""
+"In this case, the research community knows no practical low-latency design "
+"that can reliably stop the attacker from correlating volume and timing "
+"information on the two sides."
+msgstr ""
+
+#: https//support.torproject.org/about/entry-guards/
+#: (content/about/entry-guards/contents+en.lrquestion.description)
+msgid "So, what should we do?"
+msgstr ""
+
+#: https//support.torproject.org/about/entry-guards/
+#: (content/about/entry-guards/contents+en.lrquestion.description)
+msgid "Suppose the attacker controls, or can observe, C relays."
+msgstr ""
+
+#: https//support.torproject.org/about/entry-guards/
+#: (content/about/entry-guards/contents+en.lrquestion.description)
+msgid "Suppose there are N relays total."
+msgstr ""
+
+#: https//support.torproject.org/about/entry-guards/
+#: (content/about/entry-guards/contents+en.lrquestion.description)
+msgid ""
+"If you select new entry and exit relays each time you use the network, the "
+"attacker will be able to correlate all traffic you send with probability "
+"around (c/n)2."
+msgstr ""
+
+#: https//support.torproject.org/about/entry-guards/
+#: (content/about/entry-guards/contents+en.lrquestion.description)
+msgid ""
+"But profiling is, for most users, as bad as being traced all the time: they "
+"want to do something often without an attacker noticing, and the attacker "
+"noticing once is as bad as the attacker noticing more often."
+msgstr ""
+
+#: https//support.torproject.org/about/entry-guards/
+#: (content/about/entry-guards/contents+en.lrquestion.description)
+msgid ""
+"Thus, choosing many random entries and exits gives the user no chance of "
+"escaping profiling by this kind of attacker."
+msgstr ""
+
+#: https//support.torproject.org/about/entry-guards/
+#: (content/about/entry-guards/contents+en.lrquestion.description)
+msgid ""
+"The solution is \"entry guards\": each Tor client selects a few relays at "
+"random to use as entry points, and uses only those relays for their first "
+"hop."
+msgstr ""
+
+#: https//support.torproject.org/about/entry-guards/
+#: (content/about/entry-guards/contents+en.lrquestion.description)
+msgid ""
+"If those relays are not controlled or observed, the attacker can't win, "
+"ever, and the user is secure."
+msgstr ""
+
+#: https//support.torproject.org/about/entry-guards/
+#: (content/about/entry-guards/contents+en.lrquestion.description)
+msgid ""
+"If those relays are observed or controlled by the attacker, the attacker "
+"sees a larger fraction of the user's traffic - but still the user is no more"
+" profiled than before."
+msgstr ""
+
+#: https//support.torproject.org/about/entry-guards/
+#: (content/about/entry-guards/contents+en.lrquestion.description)
+msgid ""
+"Thus, the user has some chance (on the order of (n-c)/n) of avoiding "
+"profiling, whereas they had none before."
+msgstr ""
+
+#: https//support.torproject.org/about/entry-guards/
+#: (content/about/entry-guards/contents+en.lrquestion.description)
+msgid ""
+"You can read more at [An Analysis of the Degradation of Anonymous "
+"Protocols](http://freehaven.net/anonbib/#wright02), [Defending Anonymous "
+"Communication Against Passive Logging "
+"Attacks](http://freehaven.net/anonbib/#wright03), and especially [Locating "
+"Hidden Servers](http://freehaven.net/anonbib/#hs-attack06)."
+msgstr ""
+
+#: https//support.torproject.org/about/entry-guards/
+#: (content/about/entry-guards/contents+en.lrquestion.description)
+msgid ""
+"Restricting your entry nodes may also help against attackers who want to run"
+" a few Tor nodes and easily enumerate all of the Tor user IP addresses."
+msgstr ""
+
+#: https//support.torproject.org/about/entry-guards/
+#: (content/about/entry-guards/contents+en.lrquestion.description)
+msgid ""
+"(Even though they can't learn what destinations the users are talking to, "
+"they still might be able to do bad things with just a list of users.)"
+msgstr ""
+
+#: https//support.torproject.org/about/entry-guards/
+#: (content/about/entry-guards/contents+en.lrquestion.description)
+msgid ""
+"However, that feature won't really become useful until we move to a "
+"\"directory guard\" design as well."
+msgstr ""
+
#: https//support.torproject.org/about/how-is-tor-different-from-other-proxies/
#: (content/about/how-is-tor-different-from-other-proxies/contents+en.lrquestion.title)
msgid "How is Tor different from other proxies?"
@@ -3407,6 +3688,162 @@ msgstr ""
"áá®áááá ááááá¡áá®á£áááá [Tor áá HTTPS](/ka/https/https-1/), á áá á£ááá áááááá "
"á áááá á£á áááá áá¥áááááá¡ Tor áá HTTPS."
+#: https//support.torproject.org/about/key-management/
+#: (content/about/key-management/contents+en.lrquestion.title)
+msgid "Tell me about all the keys Tor uses"
+msgstr ""
+
+#: https//support.torproject.org/about/key-management/
+#: (content/about/key-management/contents+en.lrquestion.description)
+msgid ""
+"Tor uses a variety of different keys, with three goals in mind: 1) "
+"encryption to ensure privacy of data within the Tor network, 2) "
+"authentication so clients know they're talking to the relays they meant to "
+"talk to, and 3) signatures to make sure all clients know the same set of "
+"relays."
+msgstr ""
+
+#: https//support.torproject.org/about/key-management/
+#: (content/about/key-management/contents+en.lrquestion.description)
+msgid ""
+"**Encryption**: first, all connections in Tor use TLS link encryption, so "
+"observers can't look inside to see which circuit a given cell is intended "
+"for."
+msgstr ""
+
+#: https//support.torproject.org/about/key-management/
+#: (content/about/key-management/contents+en.lrquestion.description)
+msgid ""
+"Further, the Tor client establishes an ephemeral encryption key with each "
+"relay in the circuit; these extra layers of encryption mean that only the "
+"exit relay can read the cells."
+msgstr ""
+
+#: https//support.torproject.org/about/key-management/
+#: (content/about/key-management/contents+en.lrquestion.description)
+msgid ""
+"Both sides discard the circuit key when the circuit ends, so logging traffic"
+" and then breaking into the relay to discover the key won't work."
+msgstr ""
+
+#: https//support.torproject.org/about/key-management/
+#: (content/about/key-management/contents+en.lrquestion.description)
+msgid ""
+"**Authentication**: Every Tor relay has a public decryption key called the "
+"\"onion key\"."
+msgstr ""
+
+#: https//support.torproject.org/about/key-management/
+#: (content/about/key-management/contents+en.lrquestion.description)
+msgid "Each relay rotates its onion key once a week."
+msgstr ""
+
+#: https//support.torproject.org/about/key-management/
+#: (content/about/key-management/contents+en.lrquestion.description)
+msgid ""
+"When the Tor client establishes circuits, at each step it [demands that the "
+"Tor relay prove knowledge of its onion key](https://svn-"
+"archive.torproject.org/svn/projects/design-paper/tor-"
+"design.html#subsec:circuits)."
+msgstr ""
+
+#: https//support.torproject.org/about/key-management/
+#: (content/about/key-management/contents+en.lrquestion.description)
+msgid ""
+"That way the first node in the path can't just spoof the rest of the path."
+msgstr ""
+
+#: https//support.torproject.org/about/key-management/
+#: (content/about/key-management/contents+en.lrquestion.description)
+msgid ""
+"Because the Tor client chooses the path, it can make sure to get Tor's "
+"\"distributed trust\" property: no single relay in the path can know about "
+"both the client and what the client is doing."
+msgstr ""
+
+#: https//support.torproject.org/about/key-management/
+#: (content/about/key-management/contents+en.lrquestion.description)
+msgid ""
+"**Coordination**: How do clients know what the relays are, and how do they "
+"know that they have the right keys for them?"
+msgstr ""
+
+#: https//support.torproject.org/about/key-management/
+#: (content/about/key-management/contents+en.lrquestion.description)
+msgid "Each relay has a long-term public signing key called the \"identity key\"."
+msgstr ""
+
+#: https//support.torproject.org/about/key-management/
+#: (content/about/key-management/contents+en.lrquestion.description)
+msgid "Each directory authority additionally has a \"directory signing key\"."
+msgstr ""
+
+#: https//support.torproject.org/about/key-management/
+#: (content/about/key-management/contents+en.lrquestion.description)
+msgid ""
+"The directory authorities [provide a signed "
+"list](https://gitweb.torproject.org/torspec.git/tree/dir-spec.txt) of all "
+"the known relays, and in that list are a set of certificates from each relay"
+" (self-signed by their identity key) specifying their keys, locations, exit "
+"policies, and so on."
+msgstr ""
+
+#: https//support.torproject.org/about/key-management/
+#: (content/about/key-management/contents+en.lrquestion.description)
+msgid ""
+"So unless the adversary can control a majority of the directory authorities "
+"(as of 2021 there are 10 directory authorities), they can't trick the Tor "
+"client into using other Tor relays."
+msgstr ""
+
+#: https//support.torproject.org/about/key-management/
+#: (content/about/key-management/contents+en.lrquestion.description)
+msgid "How do clients know what the directory authorities are?"
+msgstr ""
+
+#: https//support.torproject.org/about/key-management/
+#: (content/about/key-management/contents+en.lrquestion.description)
+msgid ""
+"The Tor software comes with a built-in list of location and public key for "
+"each directory authority."
+msgstr ""
+
+#: https//support.torproject.org/about/key-management/
+#: (content/about/key-management/contents+en.lrquestion.description)
+msgid ""
+"So the only way to trick users into using a fake Tor network is to give them"
+" a specially modified version of the software."
+msgstr ""
+
+#: https//support.torproject.org/about/key-management/
+#: (content/about/key-management/contents+en.lrquestion.description)
+msgid "How do users know they've got the right software?"
+msgstr ""
+
+#: https//support.torproject.org/about/key-management/
+#: (content/about/key-management/contents+en.lrquestion.description)
+msgid ""
+"When we distribute the source code or a package, we digitally sign it with "
+"[GNU Privacy Guard](http://www.gnupg.org/). See the [instructions on how to "
+"check Tor Browser's signature](https://support.torproject.org/tbb/how-to-"
+"verify-signature/)."
+msgstr ""
+
+#: https//support.torproject.org/about/key-management/
+#: (content/about/key-management/contents+en.lrquestion.description)
+msgid ""
+"In order to be certain that it's really signed by us, you need to have met "
+"us in person and gotten a copy of our GPG key fingerprint, or you need to "
+"know somebody who has."
+msgstr ""
+
+#: https//support.torproject.org/about/key-management/
+#: (content/about/key-management/contents+en.lrquestion.description)
+msgid ""
+"If you're concerned about an attack on this level, we recommend you get "
+"involved with the security community and start meeting people."
+msgstr ""
+
#: https//support.torproject.org/about/no-data-scrubbing/
#: (content/about/no-data-scrubbing/contents+en.lrquestion.title)
msgid ""
@@ -3446,6 +3883,151 @@ msgstr ""
"áá£ááªá, Tor-áá áá£ááá á ááá áá¤áá á¡ áááá¬á§ááá¡ áááááá¨á áá¥ááá áááá á¨áá§ááááá "
"áááááªááááááá."
+#: https//support.torproject.org/about/protections/
+#: (content/about/protections/contents+en.lrquestion.title)
+msgid "What protections does Tor provide?"
+msgstr ""
+
+#: https//support.torproject.org/about/protections/
+#: (content/about/protections/contents+en.lrquestion.description)
+msgid ""
+"Internet communication is based on a store-and-forward model that can be "
+"understood in analogy to postal mail: Data is transmitted in blocks called "
+"IP datagrams or packets."
+msgstr ""
+
+#: https//support.torproject.org/about/protections/
+#: (content/about/protections/contents+en.lrquestion.description)
+msgid ""
+"Every packet includes a source IP address (of the sender) and a destination "
+"IP address (of the receiver), just as ordinary letters contain postal "
+"addresses of sender and receiver."
+msgstr ""
+
+#: https//support.torproject.org/about/protections/
+#: (content/about/protections/contents+en.lrquestion.description)
+msgid ""
+"The way from sender to receiver involves multiple hops of routers, where "
+"each router inspects the destination IP address and forwards the packet "
+"closer to its destination."
+msgstr ""
+
+#: https//support.torproject.org/about/protections/
+#: (content/about/protections/contents+en.lrquestion.description)
+msgid ""
+"Thus, every router between sender and receiver learns that the sender is "
+"communicating with the receiver."
+msgstr ""
+
+#: https//support.torproject.org/about/protections/
+#: (content/about/protections/contents+en.lrquestion.description)
+msgid ""
+"In particular, your local ISP is in the position to build a complete profile"
+" of your Internet usage."
+msgstr ""
+
+#: https//support.torproject.org/about/protections/
+#: (content/about/protections/contents+en.lrquestion.description)
+msgid ""
+"In addition, every server in the Internet that can see any of the packets "
+"can profile your behavior."
+msgstr ""
+
+#: https//support.torproject.org/about/protections/
+#: (content/about/protections/contents+en.lrquestion.description)
+msgid ""
+"The aim of Tor is to improve your privacy by sending your traffic through a "
+"series of proxies."
+msgstr ""
+
+#: https//support.torproject.org/about/protections/
+#: (content/about/protections/contents+en.lrquestion.description)
+msgid ""
+"Your communication is encrypted in multiple layers and routed via multiple "
+"hops through the Tor network to the final receiver."
+msgstr ""
+
+#: https//support.torproject.org/about/protections/
+#: (content/about/protections/contents+en.lrquestion.description)
+msgid ""
+"More details on this process can be found in this "
+"[visualization](https://support.torproject.org/https/https-1/)."
+msgstr ""
+
+#: https//support.torproject.org/about/protections/
+#: (content/about/protections/contents+en.lrquestion.description)
+msgid ""
+"Note that all your local ISP can observe now is that you are communicating "
+"with Tor nodes."
+msgstr ""
+
+#: https//support.torproject.org/about/protections/
+#: (content/about/protections/contents+en.lrquestion.description)
+msgid ""
+"Similarly, servers in the Internet just see that they are being contacted by"
+" Tor nodes."
+msgstr ""
+
+#: https//support.torproject.org/about/protections/
+#: (content/about/protections/contents+en.lrquestion.description)
+msgid "Generally speaking, Tor aims to solve three privacy problems:"
+msgstr ""
+
+#: https//support.torproject.org/about/protections/
+#: (content/about/protections/contents+en.lrquestion.description)
+msgid ""
+"First, Tor prevents websites and other services from learning your location,"
+" which they can use to build databases about your habits and interests."
+msgstr ""
+
+#: https//support.torproject.org/about/protections/
+#: (content/about/protections/contents+en.lrquestion.description)
+msgid ""
+"With Tor, your Internet connections don't give you away by default -- now "
+"you can have the ability to choose, for each connection, how much "
+"information to reveal."
+msgstr ""
+
+#: https//support.torproject.org/about/protections/
+#: (content/about/protections/contents+en.lrquestion.description)
+msgid ""
+"Second, Tor prevents people watching your traffic locally (such as your ISP "
+"or someone with access to your home wifi or router) from learning what "
+"information you're fetching and where you're fetching it from."
+msgstr ""
+
+#: https//support.torproject.org/about/protections/
+#: (content/about/protections/contents+en.lrquestion.description)
+msgid ""
+"It also stops them from deciding what you're allowed to learn and publish --"
+" if you can get to any part of the Tor network, you can reach any site on "
+"the Internet."
+msgstr ""
+
+#: https//support.torproject.org/about/protections/
+#: (content/about/protections/contents+en.lrquestion.description)
+msgid ""
+"Third, Tor routes your connection through more than one Tor relay so no "
+"single relay can learn what you're up to."
+msgstr ""
+
+#: https//support.torproject.org/about/protections/
+#: (content/about/protections/contents+en.lrquestion.description)
+msgid ""
+"Because these relays are run by different individuals or organizations, "
+"distributing trust provides more security than the old [one hop "
+"proxy](https://support.torproject.org/about/#how-is-tor-different-from-"
+"other-proxies) approach."
+msgstr ""
+
+#: https//support.torproject.org/about/protections/
+#: (content/about/protections/contents+en.lrquestion.description)
+msgid ""
+"Note, however, that there are situations where Tor fails to solve these "
+"privacy problems entirely: see the entry below on [remaining "
+"attacks](https://support.torproject.org/about/#attacks-on-onion-routing)."
+msgstr ""
+
#: https//support.torproject.org/about/what-is-tor/
#: (content/about/what-is-tor/contents+en.lrquestion.title)
msgid "What is Tor?"
@@ -6175,15 +6757,12 @@ msgstr ""
#: (content/tbb/tbb-47/contents+en.lrquestion.description)
msgid ""
"Also, read up on the HTTPProxyAuthenticator and HTTPSProxyAuthenticator "
-"options if your proxy requires auth. We only support basic auth currently, "
-"but if you need NTLM authentication, you may find [this post in the "
-"archives](https://archives.seul.org/or/talk/Jun-2005/msg00223.html) useful."
+"options if your [proxy requires auth.](https://developer.mozilla.org/en-"
+"US/docs/Web/HTTP/Headers/Proxy-Authenticate) We only support basic auth "
+"currently, but if you need NTLM authentication, you may find [this post in "
+"the archives](https://archives.seul.org/or/talk/Jun-2005/msg00223.html) "
+"useful."
msgstr ""
-"ááá áááá, ááááá®áááá HTTPProxyAuthenticator áá HTTPSProxyAuthenticator "
-"ááá áááá¢á ááá¡, áᣠáá¥áááá áá áá¥á¡á á¡áááá áááá¡ ááááá áá¨áá á¨áá¡áááá¡. á©áááááá, "
-"áá®áá ááááá áááá áá®áááá ááá á¢ááá á¨áá¡áááá¡ á¨áá¡áá«ááááááá, áááá áá áᣠNTLM-ááááá¬áááá "
-"ááá¡áááá ááááá, á¨ááá«áááá áááááááááá [áá¡ ááá¡á¢á "
-"áá á¥áááááá](https://archives.seul.org/or/talk/Jun-2005/msg00223.html)."
#: https//support.torproject.org/tbb/tbb-47/
#: (content/tbb/tbb-47/contents+en.lrquestion.description)
@@ -6463,6 +7042,219 @@ msgstr ""
"áááá®á¡áááá, á®ááá á ááááá᪠áá¬á§ááá `#` ááá¨ááá torrc á¤áááá¨á á¬áá áááááááá¡ áá®áááá "
"á¨áááá¨áááá¡ áá áá áá¥áá¡ ááááááá Tor-áá¡ áááá¤ááá£á ááªáááá."
+#: https//support.torproject.org/tbb/tbb-firewall-ports/
+#: (content/tbb/tbb-firewall-ports/contents+en.lrquestion.title)
+msgid "My firewall only allows a few outgoing ports"
+msgstr ""
+
+#: https//support.torproject.org/tbb/tbb-firewall-ports/
+#: (content/tbb/tbb-firewall-ports/contents+en.lrquestion.description)
+msgid ""
+"If your firewall works by blocking ports, then you can tell Tor to only use "
+"the ports when you start your Tor Browser."
+msgstr ""
+
+#: https//support.torproject.org/tbb/tbb-firewall-ports/
+#: (content/tbb/tbb-firewall-ports/contents+en.lrquestion.description)
+msgid ""
+"Or you can add the ports that your firewall permits by adding "
+"\"FascistFirewall 1\" to your torrc configuration file."
+msgstr ""
+
+#: https//support.torproject.org/tbb/tbb-firewall-ports/
+#: (content/tbb/tbb-firewall-ports/contents+en.lrquestion.description)
+msgid ""
+"By default, when you set this Tor assumes that your firewall allows only "
+"port 80 and port 443 (HTTP and HTTPS respectively)."
+msgstr ""
+
+#: https//support.torproject.org/tbb/tbb-firewall-ports/
+#: (content/tbb/tbb-firewall-ports/contents+en.lrquestion.description)
+msgid ""
+"You can select a different set of ports with the FirewallPorts torrc option."
+msgstr ""
+
+#: https//support.torproject.org/tbb/tbb-firewall-ports/
+#: (content/tbb/tbb-firewall-ports/contents+en.lrquestion.description)
+msgid ""
+"If you want to be more fine-grained with your controls, you can also use the"
+" ReachableAddresses config options, e.g.:"
+msgstr ""
+
+#: https//support.torproject.org/tbb/tbb-firewall-ports/
+#: (content/tbb/tbb-firewall-ports/contents+en.lrquestion.description)
+#: https//support.torproject.org/tbb/tbb-install-tor-central-server/
+#: (content/tbb/tbb-install-tor-central-server/contents+en.lrquestion.description)
+#: https//support.torproject.org/operators/default-exit-ports/
+#: (content/operators/default-exit-ports/contents+en.lrquestion.description)
+#: https//support.torproject.org/operators/hibernation/
+#: (content/operators/hibernation/contents+en.lrquestion.description)
+#: https//support.torproject.org/operators/limit-total-bandwidth/
+#: (content/operators/limit-total-bandwidth/contents+en.lrquestion.description)
+#: https//support.torproject.org/misc/bug-or-feedback/
+#: (content/misc/bug-or-feedback/contents+en.lrquestion.description)
+#: https//support.torproject.org/get-in-touch/why-i-cant-join-tor-channels/
+#: (content/get-in-touch/why-i-cant-join-tor-channels/contents+en.lrquestion.description)
+#: https//support.torproject.org/apt/tor-deb-repo/
+#: (content/apt/apt-1/contents+en.lrquestion.description)
+#: https//support.torproject.org/apt/apt-over-tor/
+#: (content/apt/apt-3/contents+en.lrquestion.description)
+msgid "```"
+msgstr "```"
+
+#: https//support.torproject.org/tbb/tbb-firewall-ports/
+#: (content/tbb/tbb-firewall-ports/contents+en.lrquestion.description)
+msgid "ReachableDirAddresses *:80"
+msgstr ""
+
+#: https//support.torproject.org/tbb/tbb-firewall-ports/
+#: (content/tbb/tbb-firewall-ports/contents+en.lrquestion.description)
+msgid "ReachableORAddresses *:443"
+msgstr ""
+
+#: https//support.torproject.org/tbb/tbb-install-tor-central-server/
+#: (content/tbb/tbb-install-tor-central-server/contents+en.lrquestion.title)
+msgid ""
+"Can I install Tor on a central server, and have my clients connect to it?"
+msgstr ""
+
+#: https//support.torproject.org/tbb/tbb-install-tor-central-server/
+#: (content/tbb/tbb-install-tor-central-server/contents+en.lrquestion.description)
+msgid ""
+"Yes. Tor can be configured as a client or a relay on another machine, and "
+"allow other machines to be able to connect to it for anonymity."
+msgstr ""
+
+#: https//support.torproject.org/tbb/tbb-install-tor-central-server/
+#: (content/tbb/tbb-install-tor-central-server/contents+en.lrquestion.description)
+msgid ""
+"This is most useful in an environment where many computers want a gateway of"
+" anonymity to the rest of the world."
+msgstr ""
+
+#: https//support.torproject.org/tbb/tbb-install-tor-central-server/
+#: (content/tbb/tbb-install-tor-central-server/contents+en.lrquestion.description)
+msgid ""
+"However, be forewarned that with this configuration, anyone within your "
+"private network (existing between you and the Tor client/relay) can see what"
+" traffic you are sending in clear text."
+msgstr ""
+
+#: https//support.torproject.org/tbb/tbb-install-tor-central-server/
+#: (content/tbb/tbb-install-tor-central-server/contents+en.lrquestion.description)
+msgid "The anonymity doesn't start until you get to the Tor relay."
+msgstr ""
+
+#: https//support.torproject.org/tbb/tbb-install-tor-central-server/
+#: (content/tbb/tbb-install-tor-central-server/contents+en.lrquestion.description)
+msgid ""
+"Because of this, if you are the controller of your domain and you know "
+"everything's locked down, you will be OK, but this configuration may not be "
+"suitable for large private networks where security is key all around."
+msgstr ""
+
+#: https//support.torproject.org/tbb/tbb-install-tor-central-server/
+#: (content/tbb/tbb-install-tor-central-server/contents+en.lrquestion.description)
+msgid ""
+"Configuration is simple, editing your torrc file's SocksListenAddress "
+"according to the following examples:"
+msgstr ""
+
+#: https//support.torproject.org/tbb/tbb-install-tor-central-server/
+#: (content/tbb/tbb-install-tor-central-server/contents+en.lrquestion.description)
+msgid "SocksListenAddress 127.0.0.1"
+msgstr ""
+
+#: https//support.torproject.org/tbb/tbb-install-tor-central-server/
+#: (content/tbb/tbb-install-tor-central-server/contents+en.lrquestion.description)
+msgid "SocksListenAddress 192.168.x.x:9100"
+msgstr ""
+
+#: https//support.torproject.org/tbb/tbb-install-tor-central-server/
+#: (content/tbb/tbb-install-tor-central-server/contents+en.lrquestion.description)
+msgid "SocksListenAddress 0.0.0.0:9100"
+msgstr ""
+
+#: https//support.torproject.org/tbb/tbb-install-tor-central-server/
+#: (content/tbb/tbb-install-tor-central-server/contents+en.lrquestion.description)
+msgid ""
+"You can state multiple listen addresses, in the case that you are part of "
+"several networks or subnets."
+msgstr ""
+
+#: https//support.torproject.org/tbb/tbb-install-tor-central-server/
+#: (content/tbb/tbb-install-tor-central-server/contents+en.lrquestion.description)
+msgid "SocksListenAddress 192.168.x.x:9100 #eth0"
+msgstr ""
+
+#: https//support.torproject.org/tbb/tbb-install-tor-central-server/
+#: (content/tbb/tbb-install-tor-central-server/contents+en.lrquestion.description)
+msgid "SocksListenAddress 10.x.x.x:9100 #eth1"
+msgstr ""
+
+#: https//support.torproject.org/tbb/tbb-install-tor-central-server/
+#: (content/tbb/tbb-install-tor-central-server/contents+en.lrquestion.description)
+msgid ""
+"After this, your clients on their respective networks/subnets would specify "
+"a socks proxy with the address and port you specified SocksListenAddress to "
+"be."
+msgstr ""
+
+#: https//support.torproject.org/tbb/tbb-install-tor-central-server/
+#: (content/tbb/tbb-install-tor-central-server/contents+en.lrquestion.description)
+msgid ""
+"Please note that the SocksPort configuration option gives the port ONLY for "
+"localhost (127.0.0.1)."
+msgstr ""
+
+#: https//support.torproject.org/tbb/tbb-install-tor-central-server/
+#: (content/tbb/tbb-install-tor-central-server/contents+en.lrquestion.description)
+msgid ""
+"When setting up your SocksListenAddress(es), you need to give the port with "
+"the address, as shown above."
+msgstr ""
+
+#: https//support.torproject.org/tbb/tbb-install-tor-central-server/
+#: (content/tbb/tbb-install-tor-central-server/contents+en.lrquestion.description)
+msgid ""
+"If you are interested in forcing all outgoing data through the central Tor "
+"client/relay, instead of the server only being an optional proxy, you may "
+"find the program iptables (for *nix) useful."
+msgstr ""
+
+#: https//support.torproject.org/tbb/tbb-run-client-different-computer/
+#: (content/tbb/tbb-run-client-different-computer/contents+en.lrquestion.title)
+msgid ""
+"I want to run my Tor client on a different computer than my applications"
+msgstr ""
+
+#: https//support.torproject.org/tbb/tbb-run-client-different-computer/
+#: (content/tbb/tbb-run-client-different-computer/contents+en.lrquestion.description)
+msgid ""
+"By default, your Tor client only listens for applications that connect from "
+"localhost."
+msgstr ""
+
+#: https//support.torproject.org/tbb/tbb-run-client-different-computer/
+#: (content/tbb/tbb-run-client-different-computer/contents+en.lrquestion.description)
+msgid "Connections from other computers are refused."
+msgstr ""
+
+#: https//support.torproject.org/tbb/tbb-run-client-different-computer/
+#: (content/tbb/tbb-run-client-different-computer/contents+en.lrquestion.description)
+msgid ""
+"If you want to torify applications on different computers than the Tor "
+"client, you should edit your torrc to define `SocksListenAddress 0.0.0.0` "
+"and then restart (or hup) Tor."
+msgstr ""
+
+#: https//support.torproject.org/tbb/tbb-run-client-different-computer/
+#: (content/tbb/tbb-run-client-different-computer/contents+en.lrquestion.description)
+msgid ""
+"If you want to get more advanced, you can configure your Tor client on a "
+"firewall to bind to your internal IP but not your external IP."
+msgstr ""
+
#: https//support.torproject.org/tbb/website-blocking-tor/
#: (content/tbb/website-blocking-tor/contents+en.lrquestion.title)
msgid "A website I am trying to reach is blocking access over Tor."
@@ -8283,6 +9075,130 @@ msgid ""
"guide."
msgstr ""
+#: https//support.torproject.org/operators/default-exit-ports/
+#: (content/operators/default-exit-ports/contents+en.lrquestion.title)
+msgid "Is there a list of default exit ports?"
+msgstr ""
+
+#: https//support.torproject.org/operators/default-exit-ports/
+#: (content/operators/default-exit-ports/contents+en.lrquestion.description)
+msgid ""
+"The default open ports are listed below but keep in mind that, any port or "
+"ports can be opened by the relay operator by configuring it in torrc or "
+"modifying the source code."
+msgstr ""
+
+#: https//support.torproject.org/operators/default-exit-ports/
+#: (content/operators/default-exit-ports/contents+en.lrquestion.description)
+msgid ""
+"The default according to src/or/policies.c ([line 85][1] and [line 1901][2])"
+" from the source code release [release-0.4.6][3]:"
+msgstr ""
+
+#: https//support.torproject.org/operators/default-exit-ports/
+#: (content/operators/default-exit-ports/contents+en.lrquestion.description)
+msgid "reject 0.0.0.0/8"
+msgstr ""
+
+#: https//support.torproject.org/operators/default-exit-ports/
+#: (content/operators/default-exit-ports/contents+en.lrquestion.description)
+msgid "reject 169.254.0.0/16"
+msgstr ""
+
+#: https//support.torproject.org/operators/default-exit-ports/
+#: (content/operators/default-exit-ports/contents+en.lrquestion.description)
+msgid "reject 127.0.0.0/8"
+msgstr ""
+
+#: https//support.torproject.org/operators/default-exit-ports/
+#: (content/operators/default-exit-ports/contents+en.lrquestion.description)
+msgid "reject 192.168.0.0/16"
+msgstr ""
+
+#: https//support.torproject.org/operators/default-exit-ports/
+#: (content/operators/default-exit-ports/contents+en.lrquestion.description)
+msgid "reject 10.0.0.0/8"
+msgstr ""
+
+#: https//support.torproject.org/operators/default-exit-ports/
+#: (content/operators/default-exit-ports/contents+en.lrquestion.description)
+msgid "reject 172.16.0.0/12"
+msgstr ""
+
+#: https//support.torproject.org/operators/default-exit-ports/
+#: (content/operators/default-exit-ports/contents+en.lrquestion.description)
+msgid "reject *:25"
+msgstr ""
+
+#: https//support.torproject.org/operators/default-exit-ports/
+#: (content/operators/default-exit-ports/contents+en.lrquestion.description)
+msgid "reject *:119"
+msgstr ""
+
+#: https//support.torproject.org/operators/default-exit-ports/
+#: (content/operators/default-exit-ports/contents+en.lrquestion.description)
+msgid "reject *:135-139"
+msgstr ""
+
+#: https//support.torproject.org/operators/default-exit-ports/
+#: (content/operators/default-exit-ports/contents+en.lrquestion.description)
+msgid "reject *:445"
+msgstr ""
+
+#: https//support.torproject.org/operators/default-exit-ports/
+#: (content/operators/default-exit-ports/contents+en.lrquestion.description)
+msgid "reject *:563"
+msgstr ""
+
+#: https//support.torproject.org/operators/default-exit-ports/
+#: (content/operators/default-exit-ports/contents+en.lrquestion.description)
+msgid "reject *:1214"
+msgstr ""
+
+#: https//support.torproject.org/operators/default-exit-ports/
+#: (content/operators/default-exit-ports/contents+en.lrquestion.description)
+msgid "reject *:4661-4666"
+msgstr ""
+
+#: https//support.torproject.org/operators/default-exit-ports/
+#: (content/operators/default-exit-ports/contents+en.lrquestion.description)
+msgid "reject *:6346-6429"
+msgstr ""
+
+#: https//support.torproject.org/operators/default-exit-ports/
+#: (content/operators/default-exit-ports/contents+en.lrquestion.description)
+msgid "reject *:6699"
+msgstr ""
+
+#: https//support.torproject.org/operators/default-exit-ports/
+#: (content/operators/default-exit-ports/contents+en.lrquestion.description)
+msgid "reject *:6881-6999"
+msgstr ""
+
+#: https//support.torproject.org/operators/default-exit-ports/
+#: (content/operators/default-exit-ports/contents+en.lrquestion.description)
+msgid "accept *:*"
+msgstr ""
+
+#: https//support.torproject.org/operators/default-exit-ports/
+#: (content/operators/default-exit-ports/contents+en.lrquestion.description)
+msgid ""
+"[1]: "
+"https://gitlab.torproject.org/tpo/core/tor/-/blob/release-0.4.6/src/core/or/policies.c#L85"
+msgstr ""
+
+#: https//support.torproject.org/operators/default-exit-ports/
+#: (content/operators/default-exit-ports/contents+en.lrquestion.description)
+msgid ""
+"[2]: "
+"https://gitlab.torproject.org/tpo/core/tor/-/blob/release-0.4.6/src/core/or/policies.c#L1901"
+msgstr ""
+
+#: https//support.torproject.org/operators/default-exit-ports/
+#: (content/operators/default-exit-ports/contents+en.lrquestion.description)
+msgid "[3]: https://gitlab.torproject.org/tpo/core/tor/-/tree/release-0.4.6/"
+msgstr ""
+
#: https//support.torproject.org/operators/dynamic-ip/
#: (content/operators/dynamic-ip/contents+en.lrquestion.title)
msgid "Can I run a Tor relay using a dynamic IP address?"
@@ -8484,21 +9400,6 @@ msgstr ""
" áá áá¡, á ááªá áá¥áááá Tor ááááááá¡ á£á¥á á ááááá¨á, á á᪠áá¦áááá¨áááá á©áááá¬áá á¨á "
"á¨ááááááááá áá:"
-#: https//support.torproject.org/operators/hibernation/
-#: (content/operators/hibernation/contents+en.lrquestion.description)
-#: https//support.torproject.org/operators/limit-total-bandwidth/
-#: (content/operators/limit-total-bandwidth/contents+en.lrquestion.description)
-#: https//support.torproject.org/misc/bug-or-feedback/
-#: (content/misc/bug-or-feedback/contents+en.lrquestion.description)
-#: https//support.torproject.org/get-in-touch/why-i-cant-join-tor-channels/
-#: (content/get-in-touch/why-i-cant-join-tor-channels/contents+en.lrquestion.description)
-#: https//support.torproject.org/apt/tor-deb-repo/
-#: (content/apt/apt-1/contents+en.lrquestion.description)
-#: https//support.torproject.org/apt/apt-over-tor/
-#: (content/apt/apt-3/contents+en.lrquestion.description)
-msgid "```"
-msgstr "```"
-
#: https//support.torproject.org/operators/hibernation/
#: (content/operators/hibernation/contents+en.lrquestion.description)
msgid "Bandwidth soft limit reached; commencing hibernation."
@@ -11293,6 +12194,131 @@ msgstr "uid tor-security at lists.torproject.org"
msgid "sub 4096R/C00942E4 2017-03-13"
msgstr "sub 4096R/C00942E4 2017-03-13"
+#: https//support.torproject.org/misc/check-socks-dns-leaks/
+#: (content/misc/check-socks-dns-leaks/contents+en.lrquestion.title)
+msgid ""
+"How do I check if my application that uses SOCKS is leaking DNS requests?"
+msgstr ""
+
+#: https//support.torproject.org/misc/check-socks-dns-leaks/
+#: (content/misc/check-socks-dns-leaks/contents+en.lrquestion.description)
+msgid ""
+"Even if your application is using the correct variant of the SOCKS protocol,"
+" there is still a risk that it could be leaking DNS queries."
+msgstr ""
+
+#: https//support.torproject.org/misc/check-socks-dns-leaks/
+#: (content/misc/check-socks-dns-leaks/contents+en.lrquestion.description)
+msgid ""
+"This problem happens in Firefox extensions that resolve the destination "
+"hostname themselves, for example to show you its IP address, what country "
+"it's in, etc."
+msgstr ""
+
+#: https//support.torproject.org/misc/check-socks-dns-leaks/
+#: (content/misc/check-socks-dns-leaks/contents+en.lrquestion.description)
+msgid ""
+"If you suspect your application might behave like this, follow the "
+"instructions below to check."
+msgstr ""
+
+#: https//support.torproject.org/misc/check-socks-dns-leaks/
+#: (content/misc/check-socks-dns-leaks/contents+en.lrquestion.description)
+msgid ""
+"1. Add `TestSocks 1` to your [torrc file](https://support.torproject.org/tbb"
+"/tbb-editing-torrc/)."
+msgstr ""
+
+#: https//support.torproject.org/misc/check-socks-dns-leaks/
+#: (content/misc/check-socks-dns-leaks/contents+en.lrquestion.description)
+msgid ""
+"1. Start Tor, and point your program's SOCKS proxy settings to Tor's SOCKS5 "
+"server (`socks5://127.0.0.1:9050` by default)."
+msgstr ""
+
+#: https//support.torproject.org/misc/check-socks-dns-leaks/
+#: (content/misc/check-socks-dns-leaks/contents+en.lrquestion.description)
+msgid ""
+"1. Watch your logs as you use your application. For each socks connection, "
+"Tor will log a `notice` for safe connections, and a `warn` for connections "
+"leaking DNS requests."
+msgstr ""
+
+#: https//support.torproject.org/misc/check-socks-dns-leaks/
+#: (content/misc/check-socks-dns-leaks/contents+en.lrquestion.description)
+msgid ""
+"If you want to automatically disable all connections leaking DNS requests, "
+"set `SafeSocks 1` in your torrc file."
+msgstr ""
+
+#: https//support.torproject.org/misc/hide-exits/
+#: (content/misc/hide-exits/contents+en.lrquestion.title)
+msgid ""
+"You should hide the list of Tor relays, so people can't block the exits."
+msgstr ""
+
+#: https//support.torproject.org/misc/hide-exits/
+#: (content/misc/hide-exits/contents+en.lrquestion.description)
+msgid "There are a few reasons we don't:"
+msgstr ""
+
+#: https//support.torproject.org/misc/hide-exits/
+#: (content/misc/hide-exits/contents+en.lrquestion.description)
+msgid ""
+"1. We can't help but make the information available, since Tor clients need "
+"to use it to pick their paths."
+msgstr ""
+
+#: https//support.torproject.org/misc/hide-exits/
+#: (content/misc/hide-exits/contents+en.lrquestion.description)
+msgid "So if the \"blockers\" want it, they can get it anyway."
+msgstr ""
+
+#: https//support.torproject.org/misc/hide-exits/
+#: (content/misc/hide-exits/contents+en.lrquestion.description)
+msgid ""
+"Further, even if we didn't tell clients about the list of relays directly, "
+"somebody could still make a lot of connections through Tor to a test site "
+"and build a list of the addresses they see."
+msgstr ""
+
+#: https//support.torproject.org/misc/hide-exits/
+#: (content/misc/hide-exits/contents+en.lrquestion.description)
+msgid ""
+"1. If people want to block us, we believe that they should be allowed to do "
+"so."
+msgstr ""
+
+#: https//support.torproject.org/misc/hide-exits/
+#: (content/misc/hide-exits/contents+en.lrquestion.description)
+msgid ""
+"Obviously, we would prefer for everybody to allow Tor users to connect to "
+"them, but people have the right to decide who their services should allow "
+"connections from, and if they want to block anonymous users, they can."
+msgstr ""
+
+#: https//support.torproject.org/misc/hide-exits/
+#: (content/misc/hide-exits/contents+en.lrquestion.description)
+msgid ""
+"1. Being blockable also has tactical advantages: it may be a persuasive "
+"response to website maintainers who feel threatened by Tor."
+msgstr ""
+
+#: https//support.torproject.org/misc/hide-exits/
+#: (content/misc/hide-exits/contents+en.lrquestion.description)
+msgid ""
+"Giving them the option may inspire them to stop and think about whether they"
+" really want to eliminate private access to their system, and if not, what "
+"other options they might have."
+msgstr ""
+
+#: https//support.torproject.org/misc/hide-exits/
+#: (content/misc/hide-exits/contents+en.lrquestion.description)
+msgid ""
+"The time they might otherwise have spent blocking Tor, they may instead "
+"spend rethinking their overall approach to privacy and anonymity."
+msgstr ""
+
#: https//support.torproject.org/misc/menu/
#: (content/misc/menu/contents+en.lrquestion.description)
msgid "About"
@@ -12005,68 +13031,21 @@ msgstr "### á áááá á£ááá áááááá¬ááá áá¥á
#: https//support.torproject.org/get-in-touch/why-i-cant-join-tor-channels/
#: (content/get-in-touch/why-i-cant-join-tor-channels/contents+en.lrquestion.description)
msgid ""
-"Then, to complete the registration and ultimately gain access to the #tor-"
-"project channel, your nickname must be **verified**."
+"After registering your nickname, to gain access to the #tor-project and "
+"other protected channels, your nickname must be **verified**."
msgstr ""
-"á¨ááááá áááá¡á á£ááá á áááá¡á¢á ááªáá áá áááá¦áá á¡á á£áá á¬ááááá #tor-project-áá á®ááá, "
-"áá¥áááá ááá¢á¡áá®ááá á£ááá áá§áá¡ **verified**."
#: https//support.torproject.org/get-in-touch/why-i-cant-join-tor-channels/
#: (content/get-in-touch/why-i-cant-join-tor-channels/contents+en.lrquestion.description)
msgid ""
-"1. To verify your nick, open a new browser window and go to "
-"https://webchat.oftc.net/?channels=tor."
+"1. Go to https://services.oftc.net/ and follow the steps in the '*To verify "
+"your account*' section"
msgstr ""
-"1. ááá¢á¡áá®áááá¡ ááá¡áááá¬áááááá, ááá®á¡áááá áá áá£ááá áá¡ áá®ááá á¤ááá¯áá á áá ááááááá "
-"ááá£ááá https://webchat.oftc.net/?channels=tor."
#: https//support.torproject.org/get-in-touch/why-i-cant-join-tor-channels/
#: (content/get-in-touch/why-i-cant-join-tor-channels/contents+en.lrquestion.description)
-msgid "2. Log in with your IRC nickname and password."
-msgstr "2. á¨áááá áá¥áááá IRC-ááá¢á¡áá®ááááá áá ááá áááá."
-
-#: https//support.torproject.org/get-in-touch/why-i-cant-join-tor-channels/
-#: (content/get-in-touch/why-i-cant-join-tor-channels/contents+en.lrquestion.description)
-msgid ""
-"3. Look for the word **verify** and log in there. It may appear that nothing"
-" has happened. Look at the top of the page, and there will be a column "
-"called **Account**."
+msgid "2. Go back to the IRC webpage where you are logged in and type:"
msgstr ""
-"3. ááááá®áá á¡áá¢á§áá **verify** áá á¨áááá áá¥áááá. á¨ááá«áááá áá¡á ááááá©áááá¡, áááá¥áá¡"
-" áá áá¤áá á ááá®áá. áá®áááá áááá ááá¡ áááá áá áá¡ áá áᥠáá¥áááá á¡ááá¢á á¡áá®ááá¬áááááá "
-"**Account**."
-
-#: https//support.torproject.org/get-in-touch/why-i-cant-join-tor-channels/
-#: (content/get-in-touch/why-i-cant-join-tor-channels/contents+en.lrquestion.description)
-msgid "4. Click on **Account**."
-msgstr "4. ááá¬ááááá **Account**."
-
-#: https//support.torproject.org/get-in-touch/why-i-cant-join-tor-channels/
-#: (content/get-in-touch/why-i-cant-join-tor-channels/contents+en.lrquestion.description)
-msgid ""
-"5. Click on the small sentence at the bottom of the square that says: Verify"
-" account."
-msgstr ""
-"5. ááá¬ááááá ááªáá á á¬ááááááááá ááááá áá¢áá¡ á¥ááááá, á ááááá᪠áááááá¡: Verify "
-"account (áááááá¬ááá ááááá áá¨á)."
-
-#: https//support.torproject.org/get-in-touch/why-i-cant-join-tor-channels/
-#: (content/get-in-touch/why-i-cant-join-tor-channels/contents+en.lrquestion.description)
-msgid "6. Fill out the Captcha that pops up, and click ok."
-msgstr "6. ááááá áá Captcha, á ááááá᪠áááááá áááá áá ááá¬ááááá ok."
-
-#: https//support.torproject.org/get-in-touch/why-i-cant-join-tor-channels/
-#: (content/get-in-touch/why-i-cant-join-tor-channels/contents+en.lrquestion.description)
-msgid ""
-"7. A tiny message will appear: \"Your NickServ account has been verified.\""
-msgstr ""
-"7. ááá¢áá á á¨áá¢á§ááááááá ááááá©ááááá: âYour NickServ account has been verifiedâ "
-"(ááááá áá¨á ááááá¬áááá£ááá)."
-
-#: https//support.torproject.org/get-in-touch/why-i-cant-join-tor-channels/
-#: (content/get-in-touch/why-i-cant-join-tor-channels/contents+en.lrquestion.description)
-msgid "8. Go back to the IRC webpage where you are logged in and type:"
-msgstr "8. áááá á£áááá áá¥áááá¡ IRC ááááááá ááá á¡ááá᪠á¨áá¡á£áá á®áá á áá ááá áá¤áá:"
#: https//support.torproject.org/get-in-touch/why-i-cant-join-tor-channels/
#: (content/get-in-touch/why-i-cant-join-tor-channels/contents+en.lrquestion.description)
@@ -12075,13 +13054,13 @@ msgstr "`/msg nickserv checkverify`"
#: https//support.torproject.org/get-in-touch/why-i-cant-join-tor-channels/
#: (content/get-in-touch/why-i-cant-join-tor-channels/contents+en.lrquestion.description)
-msgid "9. Click ENTER."
-msgstr "9. ááá¬ááááá ENTER."
+msgid "3. Click ENTER."
+msgstr ""
#: https//support.torproject.org/get-in-touch/why-i-cant-join-tor-channels/
#: (content/get-in-touch/why-i-cant-join-tor-channels/contents+en.lrquestion.description)
-msgid "10. If all is well, you will receive a message that says:"
-msgstr "10. áᣠá§ááááá¤áá á ááá ááááá, áááá¦ááá á¨áá¢á§áááááááá¡:"
+msgid "4. If all is well, you will receive a message that says:"
+msgstr ""
#: https//support.torproject.org/get-in-touch/why-i-cant-join-tor-channels/
#: (content/get-in-touch/why-i-cant-join-tor-channels/contents+en.lrquestion.description)
@@ -12246,21 +13225,23 @@ msgstr "# apt install apt-transport-https"
#: https//support.torproject.org/apt/tor-deb-repo/
#: (content/apt/apt-1/contents+en.lrquestion.description)
msgid ""
-"#### 2. Add the following entries to `/etc/apt/sources.list` or a new file "
-"in `/etc/apt/sources.list.d/`"
+"#### 2. Create a new file in `/etc/apt/sources.list.d/` named `tor.list`. "
+"Add the following entries:"
msgstr ""
-"#### 2. áááááá¢áá á¨áááááá á©áááá¬áá ááá á¤áááá¨á `/etc/apt/sources.list` áá áá®ááá "
-"á®ááá á¤áááá¨á `/etc/apt/sources.list.d/`"
#: https//support.torproject.org/apt/tor-deb-repo/
#: (content/apt/apt-1/contents+en.lrquestion.description)
-msgid "deb https://deb.torproject.org/torproject.org <DISTRIBUTION> main"
-msgstr "deb https://deb.torproject.org/torproject.org <DISTRIBUTION> main"
+msgid ""
+"deb [signed-by=/usr/share/keyrings/tor-archive-keyring.gpg] "
+"https://deb.torproject.org/torproject.org <DISTRIBUTION> main"
+msgstr ""
#: https//support.torproject.org/apt/tor-deb-repo/
#: (content/apt/apt-1/contents+en.lrquestion.description)
-msgid "deb-src https://deb.torproject.org/torproject.org <DISTRIBUTION> main"
-msgstr "deb-src https://deb.torproject.org/torproject.org <DISTRIBUTION> main"
+msgid ""
+"deb-src [signed-by=/usr/share/keyrings/tor-archive-keyring.gpg] "
+"https://deb.torproject.org/torproject.org <DISTRIBUTION> main"
+msgstr ""
#: https//support.torproject.org/apt/tor-deb-repo/
#: (content/apt/apt-1/contents+en.lrquestion.description)
@@ -12275,20 +13256,18 @@ msgstr ""
#: https//support.torproject.org/apt/tor-deb-repo/
#: (content/apt/apt-1/contents+en.lrquestion.description)
msgid ""
-"deb https://deb.torproject.org/torproject.org tor-"
+"deb [signed-by=/usr/share/keyrings/tor-archive-keyring.gpg] "
+"https://deb.torproject.org/torproject.org tor-"
"experimental-0.4.6.x-<DISTRIBUTION> main"
msgstr ""
-"deb https://deb.torproject.org/torproject.org tor-"
-"experimental-0.4.6.x-<DISTRIBUTION> main"
#: https//support.torproject.org/apt/tor-deb-repo/
#: (content/apt/apt-1/contents+en.lrquestion.description)
msgid ""
-"deb-src https://deb.torproject.org/torproject.org tor-"
+"deb-src [signed-by=/usr/share/keyrings/tor-archive-keyring.gpg] "
+"https://deb.torproject.org/torproject.org tor-"
"experimental-0.4.6.x-<DISTRIBUTION> main"
msgstr ""
-"deb-src https://deb.torproject.org/torproject.org tor-"
-"experimental-0.4.6.x-<DISTRIBUTION> main"
#: https//support.torproject.org/apt/tor-deb-repo/
#: (content/apt/apt-1/contents+en.lrquestion.description)
@@ -12298,20 +13277,18 @@ msgstr "áá nightly-áááá¬á§ááááá:"
#: https//support.torproject.org/apt/tor-deb-repo/
#: (content/apt/apt-1/contents+en.lrquestion.description)
msgid ""
-"deb https://deb.torproject.org/torproject.org tor-nightly-"
-"master-<DISTRIBUTION> main"
+"deb [signed-by=/usr/share/keyrings/tor-archive-keyring.gpg] "
+"https://deb.torproject.org/torproject.org tor-nightly-master-<DISTRIBUTION> "
+"main"
msgstr ""
-"deb https://deb.torproject.org/torproject.org tor-nightly-"
-"master-<DISTRIBUTION> main"
#: https//support.torproject.org/apt/tor-deb-repo/
#: (content/apt/apt-1/contents+en.lrquestion.description)
msgid ""
-"deb-src https://deb.torproject.org/torproject.org tor-nightly-"
-"master-<DISTRIBUTION> main"
+"deb-src [signed-by=/usr/share/keyrings/tor-archive-keyring.gpg] "
+"https://deb.torproject.org/torproject.org tor-nightly-master-<DISTRIBUTION> "
+"main"
msgstr ""
-"deb-src https://deb.torproject.org/torproject.org tor-nightly-"
-"master-<DISTRIBUTION> main"
#: https//support.torproject.org/apt/tor-deb-repo/
#: (content/apt/apt-1/contents+en.lrquestion.description)
@@ -12335,16 +13312,16 @@ msgstr ""
#: https//support.torproject.org/apt/tor-deb-repo/
#: (content/apt/apt-1/contents+en.lrquestion.description)
msgid ""
-"deb [arch=amd64] https://deb.torproject.org/torproject.org focal main"
+"deb [arch=amd64 signed-by=/usr/share/keyrings/tor-archive-keyring.gpg] "
+"https://deb.torproject.org/torproject.org focal main"
msgstr ""
-"deb [arch=amd64] https://deb.torproject.org/torproject.org focal main"
#: https//support.torproject.org/apt/tor-deb-repo/
#: (content/apt/apt-1/contents+en.lrquestion.description)
msgid ""
-"deb-src [arch=amd64] https://deb.torproject.org/torproject.org focal main"
+"deb-src [arch=amd64 signed-by=/usr/share/keyrings/tor-archive-keyring.gpg] "
+"https://deb.torproject.org/torproject.org focal main"
msgstr ""
-"deb-src [arch=amd64] https://deb.torproject.org/torproject.org focal main"
#: https//support.torproject.org/apt/tor-deb-repo/
#: (content/apt/apt-1/contents+en.lrquestion.description)
@@ -12366,28 +13343,17 @@ msgstr ""
#: (content/apt/apt-1/contents+en.lrquestion.description)
msgid ""
"#### 3. Then add the gpg key used to sign the packages by running the "
-"following commands at your command prompt"
+"following command at your command prompt:"
msgstr ""
-"#### 3. á¨ááááá áááááá¢áá ááá¡áá¦ááá gpg, á ááááá᪠ááááá§ááááá£ááá áá ááá£ááá¡ "
-"á®ááááá¡áá¬áá áá, áá¥áááá¡ áá á«ááááááá ááááááá á¨áááááá áá á«áááááá¡ ááá¨ááááá"
#: https//support.torproject.org/apt/tor-deb-repo/
#: (content/apt/apt-1/contents+en.lrquestion.description)
msgid ""
-"# wget -qO- "
+"# wget -O- "
"https://deb.torproject.org/torproject.org/A3C4F0F979CAA22CDBA8F512EE8CBC9E886DDD89.asc"
-" | gpg --import"
+" | gpg --dearmor | tee /usr/share/keyrings/tor-archive-keyring.gpg "
+">/dev/null"
msgstr ""
-"# wget -qO- "
-"https://deb.torproject.org/torproject.org/A3C4F0F979CAA22CDBA8F512EE8CBC9E886DDD89.asc"
-" | gpg --import"
-
-#: https//support.torproject.org/apt/tor-deb-repo/
-#: (content/apt/apt-1/contents+en.lrquestion.description)
-msgid ""
-"# gpg --export A3C4F0F979CAA22CDBA8F512EE8CBC9E886DDD89 | apt-key add -"
-msgstr ""
-"# gpg --export A3C4F0F979CAA22CDBA8F512EE8CBC9E886DDD89 | apt-key add -"
#: https//support.torproject.org/apt/tor-deb-repo/
#: (content/apt/apt-1/contents+en.lrquestion.description)
@@ -14430,6 +15396,82 @@ msgstr ""
"áá á, áááááááá áá¡ áááá®ááá ááááá ááá®áááá¡ ááááááªáááááá¡ á¡ááá¡ áááááá¯áá áá áá¦áá¨á, "
"á áááááá¯áá á᪠áá¡ áááá®ááá ááááá, á ááááá᪠áá áªáááá¡ IP-ááá¡áááá áá¡."
+#: https//support.torproject.org/alternate-designs/block-websites/
+#: (content/alternate-designs/block-websites/contents+en.lrquestion.title)
+msgid "Exit policies should be able to block websites, not just IP addresses."
+msgstr ""
+
+#: https//support.torproject.org/alternate-designs/block-websites/
+#: (content/alternate-designs/block-websites/contents+en.lrquestion.description)
+msgid ""
+"It would be nice to let relay operators say things like `reject "
+"www.slashdot.org` in their exit policies, rather than requiring them to "
+"learn all the IP address space that could be covered by the site (and then "
+"also blocking other sites at those IP addresses)."
+msgstr ""
+
+#: https//support.torproject.org/alternate-designs/block-websites/
+#: (content/alternate-designs/block-websites/contents+en.lrquestion.description)
+msgid "There are two problems, though."
+msgstr ""
+
+#: https//support.torproject.org/alternate-designs/block-websites/
+#: (content/alternate-designs/block-websites/contents+en.lrquestion.description)
+msgid "First, users could still get around these blocks."
+msgstr ""
+
+#: https//support.torproject.org/alternate-designs/block-websites/
+#: (content/alternate-designs/block-websites/contents+en.lrquestion.description)
+msgid ""
+"For example, they could request the IP address rather than the hostname when"
+" they exit from the Tor network."
+msgstr ""
+
+#: https//support.torproject.org/alternate-designs/block-websites/
+#: (content/alternate-designs/block-websites/contents+en.lrquestion.description)
+msgid ""
+"This means operators would still need to learn all the IP addresses for the "
+"destinations in question."
+msgstr ""
+
+#: https//support.torproject.org/alternate-designs/block-websites/
+#: (content/alternate-designs/block-websites/contents+en.lrquestion.description)
+msgid ""
+"The second problem is that it would allow remote attackers to censor "
+"arbitrary sites."
+msgstr ""
+
+#: https//support.torproject.org/alternate-designs/block-websites/
+#: (content/alternate-designs/block-websites/contents+en.lrquestion.description)
+msgid ""
+"For example, if a Tor operator blocks www1.slashdot.org, and then some "
+"attacker poisons the Tor relay's DNS or otherwise changes that hostname to "
+"resolve to the IP address for a major news site, then suddenly that Tor "
+"relay is blocking the news site."
+msgstr ""
+
+#: https//support.torproject.org/alternate-designs/let-the-network-pick-the-path/
+#: (content/alternate-designs/let-the-network-pick-the-path/contents+en.lrquestion.title)
+msgid "You should let the network pick the path, not the client."
+msgstr ""
+
+#: https//support.torproject.org/alternate-designs/let-the-network-pick-the-path/
+#: (content/alternate-designs/let-the-network-pick-the-path/contents+en.lrquestion.description)
+msgid "No, you cannot trust the network to pick the path."
+msgstr ""
+
+#: https//support.torproject.org/alternate-designs/let-the-network-pick-the-path/
+#: (content/alternate-designs/let-the-network-pick-the-path/contents+en.lrquestion.description)
+msgid "Malicious relays could route you through their colluding friends."
+msgstr ""
+
+#: https//support.torproject.org/alternate-designs/let-the-network-pick-the-path/
+#: (content/alternate-designs/let-the-network-pick-the-path/contents+en.lrquestion.description)
+msgid ""
+"This would give an adversary the ability to watch all of your traffic end to"
+" end."
+msgstr ""
+
#: lego/templates/banner.html:3 lego/templates/banner.html:5
#: templates/banner.html:3 templates/banner.html:5
msgid "Close banner"
@@ -14462,8 +15504,8 @@ msgid "DONATE NOW"
msgstr "áááá¦áá áááá®á"
#: lego/templates/footer.html:13 lego/templates/footer.html:22
-#: lego/templates/navbar.html:83 templates/footer.html:13
-#: templates/footer.html:22 templates/navbar.html:83
+#: lego/templates/navbar.html:95 templates/footer.html:13
+#: templates/footer.html:22 templates/navbar.html:95
msgid "Download Tor Browser"
msgstr "á©áááá¢ááá ááá Tor-áá áá£ááá á"
diff --git a/contents+ko.po b/contents+ko.po
index 734cb358ab..c366c96e8a 100644
--- a/contents+ko.po
+++ b/contents+ko.po
@@ -14,7 +14,7 @@ msgid ""
msgstr ""
"Project-Id-Version: PACKAGE VERSION\n"
"Report-Msgid-Bugs-To: \n"
-"POT-Creation-Date: 2021-08-25 11:14+CET\n"
+"POT-Creation-Date: 2021-09-01 12:20+CET\n"
"PO-Revision-Date: 2018-10-02 22:41+0000\n"
"Last-Translator: ì¥ë¯¼ì¤, 2021\n"
"Language-Team: Korean (https://www.transifex.com/otf/teams/1519/ko/)\n"
@@ -147,6 +147,11 @@ msgstr ""
msgid "Tor Metrics"
msgstr ""
+#: https//support.torproject.org/alternate-designs/
+#: (content/alternate-designs/contents+en.lrtopic.title)
+msgid "Alternate Designs We Don't Do (Yet)"
+msgstr ""
+
#: https//support.torproject.org/glossary/add-on-extension-or-plugin/
#: (content/glossary/add-on-extension-or-plugin/contents+en.lrword.term)
msgid "add-on, extension, or plugin"
@@ -2034,6 +2039,61 @@ msgid ""
"wiki](https://trac.torproject.org/projects/tor/wiki/doc/TorPlusVPN)."
msgstr ""
+#: https//support.torproject.org/faq/relay-donations/
+#: (content/faq/relay-donations/contents+en.lrquestion.title)
+msgid "Can I donate for a relay rather than run my own?"
+msgstr ""
+
+#: https//support.torproject.org/faq/relay-donations/
+#: (content/faq/relay-donations/contents+en.lrquestion.description)
+msgid ""
+"Sure! We have a [list of organizations that run Tor "
+"relays](https://community.torproject.org/relay/community-resources/relay-"
+"associations/) that are happy to turn your donations into better speed and "
+"anonymity for the Tor network."
+msgstr ""
+
+#: https//support.torproject.org/faq/relay-donations/
+#: (content/faq/relay-donations/contents+en.lrquestion.description)
+msgid ""
+"These organizations are not the same as [The Tor Project, "
+"Inc](https://donate.torproject.org/), but we consider that a good thing."
+msgstr ""
+
+#: https//support.torproject.org/faq/relay-donations/
+#: (content/faq/relay-donations/contents+en.lrquestion.description)
+msgid "They're run by nice people who are part of the Tor community."
+msgstr "Tor 커뮤ëí°ì ìí ì¹ì í ì¬ëë¤ì´ ì´ìí©ëë¤."
+
+#: https//support.torproject.org/faq/relay-donations/
+#: (content/faq/relay-donations/contents+en.lrquestion.description)
+msgid ""
+"Note that there can be a tradeoff here between anonymity and performance."
+msgstr ""
+
+#: https//support.torproject.org/faq/relay-donations/
+#: (content/faq/relay-donations/contents+en.lrquestion.description)
+msgid ""
+"The Tor network's anonymity comes in part from diversity, so if you are in a"
+" position to run your own relay, you will be improving Tor's anonymity more "
+"than by donating."
+msgstr ""
+
+#: https//support.torproject.org/faq/relay-donations/
+#: (content/faq/relay-donations/contents+en.lrquestion.description)
+msgid ""
+"At the same time though, economies of scale for bandwidth mean that "
+"combining many small donations into several larger relays is more efficient "
+"at improving network performance."
+msgstr ""
+
+#: https//support.torproject.org/faq/relay-donations/
+#: (content/faq/relay-donations/contents+en.lrquestion.description)
+msgid ""
+"Improving anonymity and improving performance are both worthwhile goals, so "
+"however you can help is great!"
+msgstr ""
+
#: https//support.torproject.org/faq/staying-anonymous/
#: (content/faq/staying-anonymous/contents+en.lrquestion.title)
msgid "Am I totally anonymous if I use Tor?"
@@ -2334,6 +2394,61 @@ msgid ""
" documenting all the issues](https://community.torproject.org/)."
msgstr ""
+#: https//support.torproject.org/about/attacks-on-onion-routing/
+#: (content/about/attacks-on-onion-routing/contents+en.lrquestion.title)
+msgid "What attacks remain against onion routing?"
+msgstr ""
+
+#: https//support.torproject.org/about/attacks-on-onion-routing/
+#: (content/about/attacks-on-onion-routing/contents+en.lrquestion.description)
+msgid ""
+"As mentioned above, it is possible for an observer who can view both you and"
+" either the destination website or your Tor exit node to correlate timings "
+"of your traffic as it enters the Tor network and also as it exits."
+msgstr ""
+
+#: https//support.torproject.org/about/attacks-on-onion-routing/
+#: (content/about/attacks-on-onion-routing/contents+en.lrquestion.description)
+msgid "Tor does not defend against such a threat model."
+msgstr ""
+
+#: https//support.torproject.org/about/attacks-on-onion-routing/
+#: (content/about/attacks-on-onion-routing/contents+en.lrquestion.description)
+msgid ""
+"In a more limited sense, note that if a censor or law enforcement agency has"
+" the ability to obtain specific observation of parts of the network, it is "
+"possible for them to verify a suspicion that you talk regularly to your "
+"friend by observing traffic at both ends and correlating the timing of only "
+"that traffic."
+msgstr ""
+
+#: https//support.torproject.org/about/attacks-on-onion-routing/
+#: (content/about/attacks-on-onion-routing/contents+en.lrquestion.description)
+msgid ""
+"Again, this is only useful to verify that parties already suspected of "
+"communicating with one another are doing so."
+msgstr ""
+
+#: https//support.torproject.org/about/attacks-on-onion-routing/
+#: (content/about/attacks-on-onion-routing/contents+en.lrquestion.description)
+msgid ""
+"In most countries, the suspicion required to obtain a warrant already "
+"carries more weight than timing correlation would provide."
+msgstr ""
+
+#: https//support.torproject.org/about/attacks-on-onion-routing/
+#: (content/about/attacks-on-onion-routing/contents+en.lrquestion.description)
+msgid ""
+"Furthermore, since Tor reuses circuits for multiple TCP connections, it is "
+"possible to associate non anonymous and anonymous traffic at a given exit "
+"node, so be careful about what applications you run concurrently over Tor."
+msgstr ""
+
+#: https//support.torproject.org/about/attacks-on-onion-routing/
+#: (content/about/attacks-on-onion-routing/contents+en.lrquestion.description)
+msgid "Perhaps even run separate Tor clients for these applications."
+msgstr ""
+
#: https//support.torproject.org/about/backdoor/
#: (content/about/backdoor/contents+en.lrquestion.title)
msgid "Is there a backdoor in Tor?"
@@ -2469,6 +2584,43 @@ msgid ""
"recommended](/tbb/tbb-9/)."
msgstr ""
+#: https//support.torproject.org/about/change-paths/
+#: (content/about/change-paths/contents+en.lrquestion.title)
+msgid "How often does Tor change its paths?"
+msgstr ""
+
+#: https//support.torproject.org/about/change-paths/
+#: (content/about/change-paths/contents+en.lrquestion.description)
+msgid ""
+"Tor will reuse the same circuit for new TCP streams for 10 minutes, as long "
+"as the circuit is working fine."
+msgstr ""
+
+#: https//support.torproject.org/about/change-paths/
+#: (content/about/change-paths/contents+en.lrquestion.description)
+msgid "(If the circuit fails, Tor will switch to a new circuit immediately.)"
+msgstr ""
+
+#: https//support.torproject.org/about/change-paths/
+#: (content/about/change-paths/contents+en.lrquestion.description)
+msgid ""
+"But note that a single TCP stream (e.g. a long IRC connection) will stay on "
+"the same circuit forever."
+msgstr ""
+
+#: https//support.torproject.org/about/change-paths/
+#: (content/about/change-paths/contents+en.lrquestion.description)
+msgid "We don't rotate individual streams from one circuit to the next."
+msgstr ""
+
+#: https//support.torproject.org/about/change-paths/
+#: (content/about/change-paths/contents+en.lrquestion.description)
+msgid ""
+"Otherwise, an adversary with a partial view of the network would be given "
+"many chances over time to link you to your destination, rather than just one"
+" chance."
+msgstr ""
+
#: https//support.torproject.org/about/distribute-tor/
#: (content/about/distribute-tor/contents+en.lrquestion.title)
msgid "Can I distribute Tor?"
@@ -2564,6 +2716,133 @@ msgid ""
"details."
msgstr ""
+#: https//support.torproject.org/about/entry-guards/
+#: (content/about/entry-guards/contents+en.lrquestion.title)
+msgid "What are Entry Guards?"
+msgstr ""
+
+#: https//support.torproject.org/about/entry-guards/
+#: (content/about/entry-guards/contents+en.lrquestion.description)
+msgid ""
+"Tor (like all current practical low-latency anonymity designs) fails when "
+"the attacker can see both ends of the communications channel."
+msgstr ""
+
+#: https//support.torproject.org/about/entry-guards/
+#: (content/about/entry-guards/contents+en.lrquestion.description)
+msgid ""
+"For example, suppose the attacker controls or watches the Tor relay you "
+"choose to enter the network, and also controls or watches the website you "
+"visit."
+msgstr ""
+
+#: https//support.torproject.org/about/entry-guards/
+#: (content/about/entry-guards/contents+en.lrquestion.description)
+msgid ""
+"In this case, the research community knows no practical low-latency design "
+"that can reliably stop the attacker from correlating volume and timing "
+"information on the two sides."
+msgstr ""
+
+#: https//support.torproject.org/about/entry-guards/
+#: (content/about/entry-guards/contents+en.lrquestion.description)
+msgid "So, what should we do?"
+msgstr ""
+
+#: https//support.torproject.org/about/entry-guards/
+#: (content/about/entry-guards/contents+en.lrquestion.description)
+msgid "Suppose the attacker controls, or can observe, C relays."
+msgstr ""
+
+#: https//support.torproject.org/about/entry-guards/
+#: (content/about/entry-guards/contents+en.lrquestion.description)
+msgid "Suppose there are N relays total."
+msgstr ""
+
+#: https//support.torproject.org/about/entry-guards/
+#: (content/about/entry-guards/contents+en.lrquestion.description)
+msgid ""
+"If you select new entry and exit relays each time you use the network, the "
+"attacker will be able to correlate all traffic you send with probability "
+"around (c/n)2."
+msgstr ""
+
+#: https//support.torproject.org/about/entry-guards/
+#: (content/about/entry-guards/contents+en.lrquestion.description)
+msgid ""
+"But profiling is, for most users, as bad as being traced all the time: they "
+"want to do something often without an attacker noticing, and the attacker "
+"noticing once is as bad as the attacker noticing more often."
+msgstr ""
+
+#: https//support.torproject.org/about/entry-guards/
+#: (content/about/entry-guards/contents+en.lrquestion.description)
+msgid ""
+"Thus, choosing many random entries and exits gives the user no chance of "
+"escaping profiling by this kind of attacker."
+msgstr ""
+
+#: https//support.torproject.org/about/entry-guards/
+#: (content/about/entry-guards/contents+en.lrquestion.description)
+msgid ""
+"The solution is \"entry guards\": each Tor client selects a few relays at "
+"random to use as entry points, and uses only those relays for their first "
+"hop."
+msgstr ""
+
+#: https//support.torproject.org/about/entry-guards/
+#: (content/about/entry-guards/contents+en.lrquestion.description)
+msgid ""
+"If those relays are not controlled or observed, the attacker can't win, "
+"ever, and the user is secure."
+msgstr ""
+
+#: https//support.torproject.org/about/entry-guards/
+#: (content/about/entry-guards/contents+en.lrquestion.description)
+msgid ""
+"If those relays are observed or controlled by the attacker, the attacker "
+"sees a larger fraction of the user's traffic - but still the user is no more"
+" profiled than before."
+msgstr ""
+
+#: https//support.torproject.org/about/entry-guards/
+#: (content/about/entry-guards/contents+en.lrquestion.description)
+msgid ""
+"Thus, the user has some chance (on the order of (n-c)/n) of avoiding "
+"profiling, whereas they had none before."
+msgstr ""
+
+#: https//support.torproject.org/about/entry-guards/
+#: (content/about/entry-guards/contents+en.lrquestion.description)
+msgid ""
+"You can read more at [An Analysis of the Degradation of Anonymous "
+"Protocols](http://freehaven.net/anonbib/#wright02), [Defending Anonymous "
+"Communication Against Passive Logging "
+"Attacks](http://freehaven.net/anonbib/#wright03), and especially [Locating "
+"Hidden Servers](http://freehaven.net/anonbib/#hs-attack06)."
+msgstr ""
+
+#: https//support.torproject.org/about/entry-guards/
+#: (content/about/entry-guards/contents+en.lrquestion.description)
+msgid ""
+"Restricting your entry nodes may also help against attackers who want to run"
+" a few Tor nodes and easily enumerate all of the Tor user IP addresses."
+msgstr ""
+
+#: https//support.torproject.org/about/entry-guards/
+#: (content/about/entry-guards/contents+en.lrquestion.description)
+msgid ""
+"(Even though they can't learn what destinations the users are talking to, "
+"they still might be able to do bad things with just a list of users.)"
+msgstr ""
+
+#: https//support.torproject.org/about/entry-guards/
+#: (content/about/entry-guards/contents+en.lrquestion.description)
+msgid ""
+"However, that feature won't really become useful until we move to a "
+"\"directory guard\" design as well."
+msgstr ""
+
#: https//support.torproject.org/about/how-is-tor-different-from-other-proxies/
#: (content/about/how-is-tor-different-from-other-proxies/contents+en.lrquestion.title)
msgid "How is Tor different from other proxies?"
@@ -2734,6 +3013,162 @@ msgid ""
" Tor and HTTPS interact."
msgstr ""
+#: https//support.torproject.org/about/key-management/
+#: (content/about/key-management/contents+en.lrquestion.title)
+msgid "Tell me about all the keys Tor uses"
+msgstr ""
+
+#: https//support.torproject.org/about/key-management/
+#: (content/about/key-management/contents+en.lrquestion.description)
+msgid ""
+"Tor uses a variety of different keys, with three goals in mind: 1) "
+"encryption to ensure privacy of data within the Tor network, 2) "
+"authentication so clients know they're talking to the relays they meant to "
+"talk to, and 3) signatures to make sure all clients know the same set of "
+"relays."
+msgstr ""
+
+#: https//support.torproject.org/about/key-management/
+#: (content/about/key-management/contents+en.lrquestion.description)
+msgid ""
+"**Encryption**: first, all connections in Tor use TLS link encryption, so "
+"observers can't look inside to see which circuit a given cell is intended "
+"for."
+msgstr ""
+
+#: https//support.torproject.org/about/key-management/
+#: (content/about/key-management/contents+en.lrquestion.description)
+msgid ""
+"Further, the Tor client establishes an ephemeral encryption key with each "
+"relay in the circuit; these extra layers of encryption mean that only the "
+"exit relay can read the cells."
+msgstr ""
+
+#: https//support.torproject.org/about/key-management/
+#: (content/about/key-management/contents+en.lrquestion.description)
+msgid ""
+"Both sides discard the circuit key when the circuit ends, so logging traffic"
+" and then breaking into the relay to discover the key won't work."
+msgstr ""
+
+#: https//support.torproject.org/about/key-management/
+#: (content/about/key-management/contents+en.lrquestion.description)
+msgid ""
+"**Authentication**: Every Tor relay has a public decryption key called the "
+"\"onion key\"."
+msgstr ""
+
+#: https//support.torproject.org/about/key-management/
+#: (content/about/key-management/contents+en.lrquestion.description)
+msgid "Each relay rotates its onion key once a week."
+msgstr ""
+
+#: https//support.torproject.org/about/key-management/
+#: (content/about/key-management/contents+en.lrquestion.description)
+msgid ""
+"When the Tor client establishes circuits, at each step it [demands that the "
+"Tor relay prove knowledge of its onion key](https://svn-"
+"archive.torproject.org/svn/projects/design-paper/tor-"
+"design.html#subsec:circuits)."
+msgstr ""
+
+#: https//support.torproject.org/about/key-management/
+#: (content/about/key-management/contents+en.lrquestion.description)
+msgid ""
+"That way the first node in the path can't just spoof the rest of the path."
+msgstr ""
+
+#: https//support.torproject.org/about/key-management/
+#: (content/about/key-management/contents+en.lrquestion.description)
+msgid ""
+"Because the Tor client chooses the path, it can make sure to get Tor's "
+"\"distributed trust\" property: no single relay in the path can know about "
+"both the client and what the client is doing."
+msgstr ""
+
+#: https//support.torproject.org/about/key-management/
+#: (content/about/key-management/contents+en.lrquestion.description)
+msgid ""
+"**Coordination**: How do clients know what the relays are, and how do they "
+"know that they have the right keys for them?"
+msgstr ""
+
+#: https//support.torproject.org/about/key-management/
+#: (content/about/key-management/contents+en.lrquestion.description)
+msgid "Each relay has a long-term public signing key called the \"identity key\"."
+msgstr ""
+
+#: https//support.torproject.org/about/key-management/
+#: (content/about/key-management/contents+en.lrquestion.description)
+msgid "Each directory authority additionally has a \"directory signing key\"."
+msgstr ""
+
+#: https//support.torproject.org/about/key-management/
+#: (content/about/key-management/contents+en.lrquestion.description)
+msgid ""
+"The directory authorities [provide a signed "
+"list](https://gitweb.torproject.org/torspec.git/tree/dir-spec.txt) of all "
+"the known relays, and in that list are a set of certificates from each relay"
+" (self-signed by their identity key) specifying their keys, locations, exit "
+"policies, and so on."
+msgstr ""
+
+#: https//support.torproject.org/about/key-management/
+#: (content/about/key-management/contents+en.lrquestion.description)
+msgid ""
+"So unless the adversary can control a majority of the directory authorities "
+"(as of 2021 there are 10 directory authorities), they can't trick the Tor "
+"client into using other Tor relays."
+msgstr ""
+
+#: https//support.torproject.org/about/key-management/
+#: (content/about/key-management/contents+en.lrquestion.description)
+msgid "How do clients know what the directory authorities are?"
+msgstr ""
+
+#: https//support.torproject.org/about/key-management/
+#: (content/about/key-management/contents+en.lrquestion.description)
+msgid ""
+"The Tor software comes with a built-in list of location and public key for "
+"each directory authority."
+msgstr ""
+
+#: https//support.torproject.org/about/key-management/
+#: (content/about/key-management/contents+en.lrquestion.description)
+msgid ""
+"So the only way to trick users into using a fake Tor network is to give them"
+" a specially modified version of the software."
+msgstr ""
+
+#: https//support.torproject.org/about/key-management/
+#: (content/about/key-management/contents+en.lrquestion.description)
+msgid "How do users know they've got the right software?"
+msgstr ""
+
+#: https//support.torproject.org/about/key-management/
+#: (content/about/key-management/contents+en.lrquestion.description)
+msgid ""
+"When we distribute the source code or a package, we digitally sign it with "
+"[GNU Privacy Guard](http://www.gnupg.org/). See the [instructions on how to "
+"check Tor Browser's signature](https://support.torproject.org/tbb/how-to-"
+"verify-signature/)."
+msgstr ""
+
+#: https//support.torproject.org/about/key-management/
+#: (content/about/key-management/contents+en.lrquestion.description)
+msgid ""
+"In order to be certain that it's really signed by us, you need to have met "
+"us in person and gotten a copy of our GPG key fingerprint, or you need to "
+"know somebody who has."
+msgstr ""
+
+#: https//support.torproject.org/about/key-management/
+#: (content/about/key-management/contents+en.lrquestion.description)
+msgid ""
+"If you're concerned about an attack on this level, we recommend you get "
+"involved with the security community and start meeting people."
+msgstr ""
+
#: https//support.torproject.org/about/no-data-scrubbing/
#: (content/about/no-data-scrubbing/contents+en.lrquestion.title)
msgid ""
@@ -2766,6 +3201,151 @@ msgid ""
"though."
msgstr ""
+#: https//support.torproject.org/about/protections/
+#: (content/about/protections/contents+en.lrquestion.title)
+msgid "What protections does Tor provide?"
+msgstr ""
+
+#: https//support.torproject.org/about/protections/
+#: (content/about/protections/contents+en.lrquestion.description)
+msgid ""
+"Internet communication is based on a store-and-forward model that can be "
+"understood in analogy to postal mail: Data is transmitted in blocks called "
+"IP datagrams or packets."
+msgstr ""
+
+#: https//support.torproject.org/about/protections/
+#: (content/about/protections/contents+en.lrquestion.description)
+msgid ""
+"Every packet includes a source IP address (of the sender) and a destination "
+"IP address (of the receiver), just as ordinary letters contain postal "
+"addresses of sender and receiver."
+msgstr ""
+
+#: https//support.torproject.org/about/protections/
+#: (content/about/protections/contents+en.lrquestion.description)
+msgid ""
+"The way from sender to receiver involves multiple hops of routers, where "
+"each router inspects the destination IP address and forwards the packet "
+"closer to its destination."
+msgstr ""
+
+#: https//support.torproject.org/about/protections/
+#: (content/about/protections/contents+en.lrquestion.description)
+msgid ""
+"Thus, every router between sender and receiver learns that the sender is "
+"communicating with the receiver."
+msgstr ""
+
+#: https//support.torproject.org/about/protections/
+#: (content/about/protections/contents+en.lrquestion.description)
+msgid ""
+"In particular, your local ISP is in the position to build a complete profile"
+" of your Internet usage."
+msgstr ""
+
+#: https//support.torproject.org/about/protections/
+#: (content/about/protections/contents+en.lrquestion.description)
+msgid ""
+"In addition, every server in the Internet that can see any of the packets "
+"can profile your behavior."
+msgstr ""
+
+#: https//support.torproject.org/about/protections/
+#: (content/about/protections/contents+en.lrquestion.description)
+msgid ""
+"The aim of Tor is to improve your privacy by sending your traffic through a "
+"series of proxies."
+msgstr ""
+
+#: https//support.torproject.org/about/protections/
+#: (content/about/protections/contents+en.lrquestion.description)
+msgid ""
+"Your communication is encrypted in multiple layers and routed via multiple "
+"hops through the Tor network to the final receiver."
+msgstr ""
+
+#: https//support.torproject.org/about/protections/
+#: (content/about/protections/contents+en.lrquestion.description)
+msgid ""
+"More details on this process can be found in this "
+"[visualization](https://support.torproject.org/https/https-1/)."
+msgstr ""
+
+#: https//support.torproject.org/about/protections/
+#: (content/about/protections/contents+en.lrquestion.description)
+msgid ""
+"Note that all your local ISP can observe now is that you are communicating "
+"with Tor nodes."
+msgstr ""
+
+#: https//support.torproject.org/about/protections/
+#: (content/about/protections/contents+en.lrquestion.description)
+msgid ""
+"Similarly, servers in the Internet just see that they are being contacted by"
+" Tor nodes."
+msgstr ""
+
+#: https//support.torproject.org/about/protections/
+#: (content/about/protections/contents+en.lrquestion.description)
+msgid "Generally speaking, Tor aims to solve three privacy problems:"
+msgstr ""
+
+#: https//support.torproject.org/about/protections/
+#: (content/about/protections/contents+en.lrquestion.description)
+msgid ""
+"First, Tor prevents websites and other services from learning your location,"
+" which they can use to build databases about your habits and interests."
+msgstr ""
+
+#: https//support.torproject.org/about/protections/
+#: (content/about/protections/contents+en.lrquestion.description)
+msgid ""
+"With Tor, your Internet connections don't give you away by default -- now "
+"you can have the ability to choose, for each connection, how much "
+"information to reveal."
+msgstr ""
+
+#: https//support.torproject.org/about/protections/
+#: (content/about/protections/contents+en.lrquestion.description)
+msgid ""
+"Second, Tor prevents people watching your traffic locally (such as your ISP "
+"or someone with access to your home wifi or router) from learning what "
+"information you're fetching and where you're fetching it from."
+msgstr ""
+
+#: https//support.torproject.org/about/protections/
+#: (content/about/protections/contents+en.lrquestion.description)
+msgid ""
+"It also stops them from deciding what you're allowed to learn and publish --"
+" if you can get to any part of the Tor network, you can reach any site on "
+"the Internet."
+msgstr ""
+
+#: https//support.torproject.org/about/protections/
+#: (content/about/protections/contents+en.lrquestion.description)
+msgid ""
+"Third, Tor routes your connection through more than one Tor relay so no "
+"single relay can learn what you're up to."
+msgstr ""
+
+#: https//support.torproject.org/about/protections/
+#: (content/about/protections/contents+en.lrquestion.description)
+msgid ""
+"Because these relays are run by different individuals or organizations, "
+"distributing trust provides more security than the old [one hop "
+"proxy](https://support.torproject.org/about/#how-is-tor-different-from-"
+"other-proxies) approach."
+msgstr ""
+
+#: https//support.torproject.org/about/protections/
+#: (content/about/protections/contents+en.lrquestion.description)
+msgid ""
+"Note, however, that there are situations where Tor fails to solve these "
+"privacy problems entirely: see the entry below on [remaining "
+"attacks](https://support.torproject.org/about/#attacks-on-onion-routing)."
+msgstr ""
+
#: https//support.torproject.org/about/what-is-tor/
#: (content/about/what-is-tor/contents+en.lrquestion.title)
msgid "What is Tor?"
@@ -4946,9 +5526,11 @@ msgstr ""
#: (content/tbb/tbb-47/contents+en.lrquestion.description)
msgid ""
"Also, read up on the HTTPProxyAuthenticator and HTTPSProxyAuthenticator "
-"options if your proxy requires auth. We only support basic auth currently, "
-"but if you need NTLM authentication, you may find [this post in the "
-"archives](https://archives.seul.org/or/talk/Jun-2005/msg00223.html) useful."
+"options if your [proxy requires auth.](https://developer.mozilla.org/en-"
+"US/docs/Web/HTTP/Headers/Proxy-Authenticate) We only support basic auth "
+"currently, but if you need NTLM authentication, you may find [this post in "
+"the archives](https://archives.seul.org/or/talk/Jun-2005/msg00223.html) "
+"useful."
msgstr ""
#: https//support.torproject.org/tbb/tbb-47/
@@ -5167,6 +5749,219 @@ msgid ""
"have no effect on Tor's configuration."
msgstr ""
+#: https//support.torproject.org/tbb/tbb-firewall-ports/
+#: (content/tbb/tbb-firewall-ports/contents+en.lrquestion.title)
+msgid "My firewall only allows a few outgoing ports"
+msgstr ""
+
+#: https//support.torproject.org/tbb/tbb-firewall-ports/
+#: (content/tbb/tbb-firewall-ports/contents+en.lrquestion.description)
+msgid ""
+"If your firewall works by blocking ports, then you can tell Tor to only use "
+"the ports when you start your Tor Browser."
+msgstr ""
+
+#: https//support.torproject.org/tbb/tbb-firewall-ports/
+#: (content/tbb/tbb-firewall-ports/contents+en.lrquestion.description)
+msgid ""
+"Or you can add the ports that your firewall permits by adding "
+"\"FascistFirewall 1\" to your torrc configuration file."
+msgstr ""
+
+#: https//support.torproject.org/tbb/tbb-firewall-ports/
+#: (content/tbb/tbb-firewall-ports/contents+en.lrquestion.description)
+msgid ""
+"By default, when you set this Tor assumes that your firewall allows only "
+"port 80 and port 443 (HTTP and HTTPS respectively)."
+msgstr ""
+
+#: https//support.torproject.org/tbb/tbb-firewall-ports/
+#: (content/tbb/tbb-firewall-ports/contents+en.lrquestion.description)
+msgid ""
+"You can select a different set of ports with the FirewallPorts torrc option."
+msgstr ""
+
+#: https//support.torproject.org/tbb/tbb-firewall-ports/
+#: (content/tbb/tbb-firewall-ports/contents+en.lrquestion.description)
+msgid ""
+"If you want to be more fine-grained with your controls, you can also use the"
+" ReachableAddresses config options, e.g.:"
+msgstr ""
+
+#: https//support.torproject.org/tbb/tbb-firewall-ports/
+#: (content/tbb/tbb-firewall-ports/contents+en.lrquestion.description)
+#: https//support.torproject.org/tbb/tbb-install-tor-central-server/
+#: (content/tbb/tbb-install-tor-central-server/contents+en.lrquestion.description)
+#: https//support.torproject.org/operators/default-exit-ports/
+#: (content/operators/default-exit-ports/contents+en.lrquestion.description)
+#: https//support.torproject.org/operators/hibernation/
+#: (content/operators/hibernation/contents+en.lrquestion.description)
+#: https//support.torproject.org/operators/limit-total-bandwidth/
+#: (content/operators/limit-total-bandwidth/contents+en.lrquestion.description)
+#: https//support.torproject.org/misc/bug-or-feedback/
+#: (content/misc/bug-or-feedback/contents+en.lrquestion.description)
+#: https//support.torproject.org/get-in-touch/why-i-cant-join-tor-channels/
+#: (content/get-in-touch/why-i-cant-join-tor-channels/contents+en.lrquestion.description)
+#: https//support.torproject.org/apt/tor-deb-repo/
+#: (content/apt/apt-1/contents+en.lrquestion.description)
+#: https//support.torproject.org/apt/apt-over-tor/
+#: (content/apt/apt-3/contents+en.lrquestion.description)
+msgid "```"
+msgstr "```"
+
+#: https//support.torproject.org/tbb/tbb-firewall-ports/
+#: (content/tbb/tbb-firewall-ports/contents+en.lrquestion.description)
+msgid "ReachableDirAddresses *:80"
+msgstr ""
+
+#: https//support.torproject.org/tbb/tbb-firewall-ports/
+#: (content/tbb/tbb-firewall-ports/contents+en.lrquestion.description)
+msgid "ReachableORAddresses *:443"
+msgstr ""
+
+#: https//support.torproject.org/tbb/tbb-install-tor-central-server/
+#: (content/tbb/tbb-install-tor-central-server/contents+en.lrquestion.title)
+msgid ""
+"Can I install Tor on a central server, and have my clients connect to it?"
+msgstr ""
+
+#: https//support.torproject.org/tbb/tbb-install-tor-central-server/
+#: (content/tbb/tbb-install-tor-central-server/contents+en.lrquestion.description)
+msgid ""
+"Yes. Tor can be configured as a client or a relay on another machine, and "
+"allow other machines to be able to connect to it for anonymity."
+msgstr ""
+
+#: https//support.torproject.org/tbb/tbb-install-tor-central-server/
+#: (content/tbb/tbb-install-tor-central-server/contents+en.lrquestion.description)
+msgid ""
+"This is most useful in an environment where many computers want a gateway of"
+" anonymity to the rest of the world."
+msgstr ""
+
+#: https//support.torproject.org/tbb/tbb-install-tor-central-server/
+#: (content/tbb/tbb-install-tor-central-server/contents+en.lrquestion.description)
+msgid ""
+"However, be forewarned that with this configuration, anyone within your "
+"private network (existing between you and the Tor client/relay) can see what"
+" traffic you are sending in clear text."
+msgstr ""
+
+#: https//support.torproject.org/tbb/tbb-install-tor-central-server/
+#: (content/tbb/tbb-install-tor-central-server/contents+en.lrquestion.description)
+msgid "The anonymity doesn't start until you get to the Tor relay."
+msgstr ""
+
+#: https//support.torproject.org/tbb/tbb-install-tor-central-server/
+#: (content/tbb/tbb-install-tor-central-server/contents+en.lrquestion.description)
+msgid ""
+"Because of this, if you are the controller of your domain and you know "
+"everything's locked down, you will be OK, but this configuration may not be "
+"suitable for large private networks where security is key all around."
+msgstr ""
+
+#: https//support.torproject.org/tbb/tbb-install-tor-central-server/
+#: (content/tbb/tbb-install-tor-central-server/contents+en.lrquestion.description)
+msgid ""
+"Configuration is simple, editing your torrc file's SocksListenAddress "
+"according to the following examples:"
+msgstr ""
+
+#: https//support.torproject.org/tbb/tbb-install-tor-central-server/
+#: (content/tbb/tbb-install-tor-central-server/contents+en.lrquestion.description)
+msgid "SocksListenAddress 127.0.0.1"
+msgstr ""
+
+#: https//support.torproject.org/tbb/tbb-install-tor-central-server/
+#: (content/tbb/tbb-install-tor-central-server/contents+en.lrquestion.description)
+msgid "SocksListenAddress 192.168.x.x:9100"
+msgstr ""
+
+#: https//support.torproject.org/tbb/tbb-install-tor-central-server/
+#: (content/tbb/tbb-install-tor-central-server/contents+en.lrquestion.description)
+msgid "SocksListenAddress 0.0.0.0:9100"
+msgstr ""
+
+#: https//support.torproject.org/tbb/tbb-install-tor-central-server/
+#: (content/tbb/tbb-install-tor-central-server/contents+en.lrquestion.description)
+msgid ""
+"You can state multiple listen addresses, in the case that you are part of "
+"several networks or subnets."
+msgstr ""
+
+#: https//support.torproject.org/tbb/tbb-install-tor-central-server/
+#: (content/tbb/tbb-install-tor-central-server/contents+en.lrquestion.description)
+msgid "SocksListenAddress 192.168.x.x:9100 #eth0"
+msgstr ""
+
+#: https//support.torproject.org/tbb/tbb-install-tor-central-server/
+#: (content/tbb/tbb-install-tor-central-server/contents+en.lrquestion.description)
+msgid "SocksListenAddress 10.x.x.x:9100 #eth1"
+msgstr ""
+
+#: https//support.torproject.org/tbb/tbb-install-tor-central-server/
+#: (content/tbb/tbb-install-tor-central-server/contents+en.lrquestion.description)
+msgid ""
+"After this, your clients on their respective networks/subnets would specify "
+"a socks proxy with the address and port you specified SocksListenAddress to "
+"be."
+msgstr ""
+
+#: https//support.torproject.org/tbb/tbb-install-tor-central-server/
+#: (content/tbb/tbb-install-tor-central-server/contents+en.lrquestion.description)
+msgid ""
+"Please note that the SocksPort configuration option gives the port ONLY for "
+"localhost (127.0.0.1)."
+msgstr ""
+
+#: https//support.torproject.org/tbb/tbb-install-tor-central-server/
+#: (content/tbb/tbb-install-tor-central-server/contents+en.lrquestion.description)
+msgid ""
+"When setting up your SocksListenAddress(es), you need to give the port with "
+"the address, as shown above."
+msgstr ""
+
+#: https//support.torproject.org/tbb/tbb-install-tor-central-server/
+#: (content/tbb/tbb-install-tor-central-server/contents+en.lrquestion.description)
+msgid ""
+"If you are interested in forcing all outgoing data through the central Tor "
+"client/relay, instead of the server only being an optional proxy, you may "
+"find the program iptables (for *nix) useful."
+msgstr ""
+
+#: https//support.torproject.org/tbb/tbb-run-client-different-computer/
+#: (content/tbb/tbb-run-client-different-computer/contents+en.lrquestion.title)
+msgid ""
+"I want to run my Tor client on a different computer than my applications"
+msgstr ""
+
+#: https//support.torproject.org/tbb/tbb-run-client-different-computer/
+#: (content/tbb/tbb-run-client-different-computer/contents+en.lrquestion.description)
+msgid ""
+"By default, your Tor client only listens for applications that connect from "
+"localhost."
+msgstr ""
+
+#: https//support.torproject.org/tbb/tbb-run-client-different-computer/
+#: (content/tbb/tbb-run-client-different-computer/contents+en.lrquestion.description)
+msgid "Connections from other computers are refused."
+msgstr ""
+
+#: https//support.torproject.org/tbb/tbb-run-client-different-computer/
+#: (content/tbb/tbb-run-client-different-computer/contents+en.lrquestion.description)
+msgid ""
+"If you want to torify applications on different computers than the Tor "
+"client, you should edit your torrc to define `SocksListenAddress 0.0.0.0` "
+"and then restart (or hup) Tor."
+msgstr ""
+
+#: https//support.torproject.org/tbb/tbb-run-client-different-computer/
+#: (content/tbb/tbb-run-client-different-computer/contents+en.lrquestion.description)
+msgid ""
+"If you want to get more advanced, you can configure your Tor client on a "
+"firewall to bind to your internal IP but not your external IP."
+msgstr ""
+
#: https//support.torproject.org/tbb/website-blocking-tor/
#: (content/tbb/website-blocking-tor/contents+en.lrquestion.title)
msgid "A website I am trying to reach is blocking access over Tor."
@@ -6622,6 +7417,130 @@ msgid ""
"guide."
msgstr ""
+#: https//support.torproject.org/operators/default-exit-ports/
+#: (content/operators/default-exit-ports/contents+en.lrquestion.title)
+msgid "Is there a list of default exit ports?"
+msgstr ""
+
+#: https//support.torproject.org/operators/default-exit-ports/
+#: (content/operators/default-exit-ports/contents+en.lrquestion.description)
+msgid ""
+"The default open ports are listed below but keep in mind that, any port or "
+"ports can be opened by the relay operator by configuring it in torrc or "
+"modifying the source code."
+msgstr ""
+
+#: https//support.torproject.org/operators/default-exit-ports/
+#: (content/operators/default-exit-ports/contents+en.lrquestion.description)
+msgid ""
+"The default according to src/or/policies.c ([line 85][1] and [line 1901][2])"
+" from the source code release [release-0.4.6][3]:"
+msgstr ""
+
+#: https//support.torproject.org/operators/default-exit-ports/
+#: (content/operators/default-exit-ports/contents+en.lrquestion.description)
+msgid "reject 0.0.0.0/8"
+msgstr ""
+
+#: https//support.torproject.org/operators/default-exit-ports/
+#: (content/operators/default-exit-ports/contents+en.lrquestion.description)
+msgid "reject 169.254.0.0/16"
+msgstr ""
+
+#: https//support.torproject.org/operators/default-exit-ports/
+#: (content/operators/default-exit-ports/contents+en.lrquestion.description)
+msgid "reject 127.0.0.0/8"
+msgstr ""
+
+#: https//support.torproject.org/operators/default-exit-ports/
+#: (content/operators/default-exit-ports/contents+en.lrquestion.description)
+msgid "reject 192.168.0.0/16"
+msgstr ""
+
+#: https//support.torproject.org/operators/default-exit-ports/
+#: (content/operators/default-exit-ports/contents+en.lrquestion.description)
+msgid "reject 10.0.0.0/8"
+msgstr ""
+
+#: https//support.torproject.org/operators/default-exit-ports/
+#: (content/operators/default-exit-ports/contents+en.lrquestion.description)
+msgid "reject 172.16.0.0/12"
+msgstr ""
+
+#: https//support.torproject.org/operators/default-exit-ports/
+#: (content/operators/default-exit-ports/contents+en.lrquestion.description)
+msgid "reject *:25"
+msgstr ""
+
+#: https//support.torproject.org/operators/default-exit-ports/
+#: (content/operators/default-exit-ports/contents+en.lrquestion.description)
+msgid "reject *:119"
+msgstr ""
+
+#: https//support.torproject.org/operators/default-exit-ports/
+#: (content/operators/default-exit-ports/contents+en.lrquestion.description)
+msgid "reject *:135-139"
+msgstr ""
+
+#: https//support.torproject.org/operators/default-exit-ports/
+#: (content/operators/default-exit-ports/contents+en.lrquestion.description)
+msgid "reject *:445"
+msgstr ""
+
+#: https//support.torproject.org/operators/default-exit-ports/
+#: (content/operators/default-exit-ports/contents+en.lrquestion.description)
+msgid "reject *:563"
+msgstr ""
+
+#: https//support.torproject.org/operators/default-exit-ports/
+#: (content/operators/default-exit-ports/contents+en.lrquestion.description)
+msgid "reject *:1214"
+msgstr ""
+
+#: https//support.torproject.org/operators/default-exit-ports/
+#: (content/operators/default-exit-ports/contents+en.lrquestion.description)
+msgid "reject *:4661-4666"
+msgstr ""
+
+#: https//support.torproject.org/operators/default-exit-ports/
+#: (content/operators/default-exit-ports/contents+en.lrquestion.description)
+msgid "reject *:6346-6429"
+msgstr ""
+
+#: https//support.torproject.org/operators/default-exit-ports/
+#: (content/operators/default-exit-ports/contents+en.lrquestion.description)
+msgid "reject *:6699"
+msgstr ""
+
+#: https//support.torproject.org/operators/default-exit-ports/
+#: (content/operators/default-exit-ports/contents+en.lrquestion.description)
+msgid "reject *:6881-6999"
+msgstr ""
+
+#: https//support.torproject.org/operators/default-exit-ports/
+#: (content/operators/default-exit-ports/contents+en.lrquestion.description)
+msgid "accept *:*"
+msgstr ""
+
+#: https//support.torproject.org/operators/default-exit-ports/
+#: (content/operators/default-exit-ports/contents+en.lrquestion.description)
+msgid ""
+"[1]: "
+"https://gitlab.torproject.org/tpo/core/tor/-/blob/release-0.4.6/src/core/or/policies.c#L85"
+msgstr ""
+
+#: https//support.torproject.org/operators/default-exit-ports/
+#: (content/operators/default-exit-ports/contents+en.lrquestion.description)
+msgid ""
+"[2]: "
+"https://gitlab.torproject.org/tpo/core/tor/-/blob/release-0.4.6/src/core/or/policies.c#L1901"
+msgstr ""
+
+#: https//support.torproject.org/operators/default-exit-ports/
+#: (content/operators/default-exit-ports/contents+en.lrquestion.description)
+msgid "[3]: https://gitlab.torproject.org/tpo/core/tor/-/tree/release-0.4.6/"
+msgstr ""
+
#: https//support.torproject.org/operators/dynamic-ip/
#: (content/operators/dynamic-ip/contents+en.lrquestion.title)
msgid "Can I run a Tor relay using a dynamic IP address?"
@@ -6769,21 +7688,6 @@ msgid ""
"into hibernation, signaled by this entry in the log:"
msgstr ""
-#: https//support.torproject.org/operators/hibernation/
-#: (content/operators/hibernation/contents+en.lrquestion.description)
-#: https//support.torproject.org/operators/limit-total-bandwidth/
-#: (content/operators/limit-total-bandwidth/contents+en.lrquestion.description)
-#: https//support.torproject.org/misc/bug-or-feedback/
-#: (content/misc/bug-or-feedback/contents+en.lrquestion.description)
-#: https//support.torproject.org/get-in-touch/why-i-cant-join-tor-channels/
-#: (content/get-in-touch/why-i-cant-join-tor-channels/contents+en.lrquestion.description)
-#: https//support.torproject.org/apt/tor-deb-repo/
-#: (content/apt/apt-1/contents+en.lrquestion.description)
-#: https//support.torproject.org/apt/apt-over-tor/
-#: (content/apt/apt-3/contents+en.lrquestion.description)
-msgid "```"
-msgstr "```"
-
#: https//support.torproject.org/operators/hibernation/
#: (content/operators/hibernation/contents+en.lrquestion.description)
msgid "Bandwidth soft limit reached; commencing hibernation."
@@ -9027,6 +9931,131 @@ msgstr ""
msgid "sub 4096R/C00942E4 2017-03-13"
msgstr "sub 4096R/C00942E4 2017-03-13"
+#: https//support.torproject.org/misc/check-socks-dns-leaks/
+#: (content/misc/check-socks-dns-leaks/contents+en.lrquestion.title)
+msgid ""
+"How do I check if my application that uses SOCKS is leaking DNS requests?"
+msgstr ""
+
+#: https//support.torproject.org/misc/check-socks-dns-leaks/
+#: (content/misc/check-socks-dns-leaks/contents+en.lrquestion.description)
+msgid ""
+"Even if your application is using the correct variant of the SOCKS protocol,"
+" there is still a risk that it could be leaking DNS queries."
+msgstr ""
+
+#: https//support.torproject.org/misc/check-socks-dns-leaks/
+#: (content/misc/check-socks-dns-leaks/contents+en.lrquestion.description)
+msgid ""
+"This problem happens in Firefox extensions that resolve the destination "
+"hostname themselves, for example to show you its IP address, what country "
+"it's in, etc."
+msgstr ""
+
+#: https//support.torproject.org/misc/check-socks-dns-leaks/
+#: (content/misc/check-socks-dns-leaks/contents+en.lrquestion.description)
+msgid ""
+"If you suspect your application might behave like this, follow the "
+"instructions below to check."
+msgstr ""
+
+#: https//support.torproject.org/misc/check-socks-dns-leaks/
+#: (content/misc/check-socks-dns-leaks/contents+en.lrquestion.description)
+msgid ""
+"1. Add `TestSocks 1` to your [torrc file](https://support.torproject.org/tbb"
+"/tbb-editing-torrc/)."
+msgstr ""
+
+#: https//support.torproject.org/misc/check-socks-dns-leaks/
+#: (content/misc/check-socks-dns-leaks/contents+en.lrquestion.description)
+msgid ""
+"1. Start Tor, and point your program's SOCKS proxy settings to Tor's SOCKS5 "
+"server (`socks5://127.0.0.1:9050` by default)."
+msgstr ""
+
+#: https//support.torproject.org/misc/check-socks-dns-leaks/
+#: (content/misc/check-socks-dns-leaks/contents+en.lrquestion.description)
+msgid ""
+"1. Watch your logs as you use your application. For each socks connection, "
+"Tor will log a `notice` for safe connections, and a `warn` for connections "
+"leaking DNS requests."
+msgstr ""
+
+#: https//support.torproject.org/misc/check-socks-dns-leaks/
+#: (content/misc/check-socks-dns-leaks/contents+en.lrquestion.description)
+msgid ""
+"If you want to automatically disable all connections leaking DNS requests, "
+"set `SafeSocks 1` in your torrc file."
+msgstr ""
+
+#: https//support.torproject.org/misc/hide-exits/
+#: (content/misc/hide-exits/contents+en.lrquestion.title)
+msgid ""
+"You should hide the list of Tor relays, so people can't block the exits."
+msgstr ""
+
+#: https//support.torproject.org/misc/hide-exits/
+#: (content/misc/hide-exits/contents+en.lrquestion.description)
+msgid "There are a few reasons we don't:"
+msgstr ""
+
+#: https//support.torproject.org/misc/hide-exits/
+#: (content/misc/hide-exits/contents+en.lrquestion.description)
+msgid ""
+"1. We can't help but make the information available, since Tor clients need "
+"to use it to pick their paths."
+msgstr ""
+
+#: https//support.torproject.org/misc/hide-exits/
+#: (content/misc/hide-exits/contents+en.lrquestion.description)
+msgid "So if the \"blockers\" want it, they can get it anyway."
+msgstr ""
+
+#: https//support.torproject.org/misc/hide-exits/
+#: (content/misc/hide-exits/contents+en.lrquestion.description)
+msgid ""
+"Further, even if we didn't tell clients about the list of relays directly, "
+"somebody could still make a lot of connections through Tor to a test site "
+"and build a list of the addresses they see."
+msgstr ""
+
+#: https//support.torproject.org/misc/hide-exits/
+#: (content/misc/hide-exits/contents+en.lrquestion.description)
+msgid ""
+"1. If people want to block us, we believe that they should be allowed to do "
+"so."
+msgstr ""
+
+#: https//support.torproject.org/misc/hide-exits/
+#: (content/misc/hide-exits/contents+en.lrquestion.description)
+msgid ""
+"Obviously, we would prefer for everybody to allow Tor users to connect to "
+"them, but people have the right to decide who their services should allow "
+"connections from, and if they want to block anonymous users, they can."
+msgstr ""
+
+#: https//support.torproject.org/misc/hide-exits/
+#: (content/misc/hide-exits/contents+en.lrquestion.description)
+msgid ""
+"1. Being blockable also has tactical advantages: it may be a persuasive "
+"response to website maintainers who feel threatened by Tor."
+msgstr ""
+
+#: https//support.torproject.org/misc/hide-exits/
+#: (content/misc/hide-exits/contents+en.lrquestion.description)
+msgid ""
+"Giving them the option may inspire them to stop and think about whether they"
+" really want to eliminate private access to their system, and if not, what "
+"other options they might have."
+msgstr ""
+
+#: https//support.torproject.org/misc/hide-exits/
+#: (content/misc/hide-exits/contents+en.lrquestion.description)
+msgid ""
+"The time they might otherwise have spent blocking Tor, they may instead "
+"spend rethinking their overall approach to privacy and anonymity."
+msgstr ""
+
#: https//support.torproject.org/misc/menu/
#: (content/misc/menu/contents+en.lrquestion.description)
msgid "About"
@@ -9615,56 +10644,20 @@ msgstr ""
#: https//support.torproject.org/get-in-touch/why-i-cant-join-tor-channels/
#: (content/get-in-touch/why-i-cant-join-tor-channels/contents+en.lrquestion.description)
msgid ""
-"Then, to complete the registration and ultimately gain access to the #tor-"
-"project channel, your nickname must be **verified**."
-msgstr ""
-
-#: https//support.torproject.org/get-in-touch/why-i-cant-join-tor-channels/
-#: (content/get-in-touch/why-i-cant-join-tor-channels/contents+en.lrquestion.description)
-msgid ""
-"1. To verify your nick, open a new browser window and go to "
-"https://webchat.oftc.net/?channels=tor."
-msgstr ""
-
-#: https//support.torproject.org/get-in-touch/why-i-cant-join-tor-channels/
-#: (content/get-in-touch/why-i-cant-join-tor-channels/contents+en.lrquestion.description)
-msgid "2. Log in with your IRC nickname and password."
-msgstr ""
-
-#: https//support.torproject.org/get-in-touch/why-i-cant-join-tor-channels/
-#: (content/get-in-touch/why-i-cant-join-tor-channels/contents+en.lrquestion.description)
-msgid ""
-"3. Look for the word **verify** and log in there. It may appear that nothing"
-" has happened. Look at the top of the page, and there will be a column "
-"called **Account**."
-msgstr ""
-
-#: https//support.torproject.org/get-in-touch/why-i-cant-join-tor-channels/
-#: (content/get-in-touch/why-i-cant-join-tor-channels/contents+en.lrquestion.description)
-msgid "4. Click on **Account**."
-msgstr ""
-
-#: https//support.torproject.org/get-in-touch/why-i-cant-join-tor-channels/
-#: (content/get-in-touch/why-i-cant-join-tor-channels/contents+en.lrquestion.description)
-msgid ""
-"5. Click on the small sentence at the bottom of the square that says: Verify"
-" account."
-msgstr ""
-
-#: https//support.torproject.org/get-in-touch/why-i-cant-join-tor-channels/
-#: (content/get-in-touch/why-i-cant-join-tor-channels/contents+en.lrquestion.description)
-msgid "6. Fill out the Captcha that pops up, and click ok."
+"After registering your nickname, to gain access to the #tor-project and "
+"other protected channels, your nickname must be **verified**."
msgstr ""
#: https//support.torproject.org/get-in-touch/why-i-cant-join-tor-channels/
#: (content/get-in-touch/why-i-cant-join-tor-channels/contents+en.lrquestion.description)
msgid ""
-"7. A tiny message will appear: \"Your NickServ account has been verified.\""
+"1. Go to https://services.oftc.net/ and follow the steps in the '*To verify "
+"your account*' section"
msgstr ""
#: https//support.torproject.org/get-in-touch/why-i-cant-join-tor-channels/
#: (content/get-in-touch/why-i-cant-join-tor-channels/contents+en.lrquestion.description)
-msgid "8. Go back to the IRC webpage where you are logged in and type:"
+msgid "2. Go back to the IRC webpage where you are logged in and type:"
msgstr ""
#: https//support.torproject.org/get-in-touch/why-i-cant-join-tor-channels/
@@ -9674,12 +10667,12 @@ msgstr ""
#: https//support.torproject.org/get-in-touch/why-i-cant-join-tor-channels/
#: (content/get-in-touch/why-i-cant-join-tor-channels/contents+en.lrquestion.description)
-msgid "9. Click ENTER."
+msgid "3. Click ENTER."
msgstr ""
#: https//support.torproject.org/get-in-touch/why-i-cant-join-tor-channels/
#: (content/get-in-touch/why-i-cant-join-tor-channels/contents+en.lrquestion.description)
-msgid "10. If all is well, you will receive a message that says:"
+msgid "4. If all is well, you will receive a message that says:"
msgstr ""
#: https//support.torproject.org/get-in-touch/why-i-cant-join-tor-channels/
@@ -9820,19 +10813,23 @@ msgstr "# apt install apt-transport-https"
#: https//support.torproject.org/apt/tor-deb-repo/
#: (content/apt/apt-1/contents+en.lrquestion.description)
msgid ""
-"#### 2. Add the following entries to `/etc/apt/sources.list` or a new file "
-"in `/etc/apt/sources.list.d/`"
+"#### 2. Create a new file in `/etc/apt/sources.list.d/` named `tor.list`. "
+"Add the following entries:"
msgstr ""
#: https//support.torproject.org/apt/tor-deb-repo/
#: (content/apt/apt-1/contents+en.lrquestion.description)
-msgid "deb https://deb.torproject.org/torproject.org <DISTRIBUTION> main"
+msgid ""
+"deb [signed-by=/usr/share/keyrings/tor-archive-keyring.gpg] "
+"https://deb.torproject.org/torproject.org <DISTRIBUTION> main"
msgstr ""
#: https//support.torproject.org/apt/tor-deb-repo/
#: (content/apt/apt-1/contents+en.lrquestion.description)
-msgid "deb-src https://deb.torproject.org/torproject.org <DISTRIBUTION> main"
-msgstr "deb-src https://deb.torproject.org/torproject.org <DISTRIBUTION> main"
+msgid ""
+"deb-src [signed-by=/usr/share/keyrings/tor-archive-keyring.gpg] "
+"https://deb.torproject.org/torproject.org <DISTRIBUTION> main"
+msgstr ""
#: https//support.torproject.org/apt/tor-deb-repo/
#: (content/apt/apt-1/contents+en.lrquestion.description)
@@ -9845,14 +10842,16 @@ msgstr ""
#: https//support.torproject.org/apt/tor-deb-repo/
#: (content/apt/apt-1/contents+en.lrquestion.description)
msgid ""
-"deb https://deb.torproject.org/torproject.org tor-"
+"deb [signed-by=/usr/share/keyrings/tor-archive-keyring.gpg] "
+"https://deb.torproject.org/torproject.org tor-"
"experimental-0.4.6.x-<DISTRIBUTION> main"
msgstr ""
#: https//support.torproject.org/apt/tor-deb-repo/
#: (content/apt/apt-1/contents+en.lrquestion.description)
msgid ""
-"deb-src https://deb.torproject.org/torproject.org tor-"
+"deb-src [signed-by=/usr/share/keyrings/tor-archive-keyring.gpg] "
+"https://deb.torproject.org/torproject.org tor-"
"experimental-0.4.6.x-<DISTRIBUTION> main"
msgstr ""
@@ -9864,18 +10863,18 @@ msgstr ""
#: https//support.torproject.org/apt/tor-deb-repo/
#: (content/apt/apt-1/contents+en.lrquestion.description)
msgid ""
-"deb https://deb.torproject.org/torproject.org tor-nightly-"
-"master-<DISTRIBUTION> main"
+"deb [signed-by=/usr/share/keyrings/tor-archive-keyring.gpg] "
+"https://deb.torproject.org/torproject.org tor-nightly-master-<DISTRIBUTION> "
+"main"
msgstr ""
#: https//support.torproject.org/apt/tor-deb-repo/
#: (content/apt/apt-1/contents+en.lrquestion.description)
msgid ""
-"deb-src https://deb.torproject.org/torproject.org tor-nightly-"
-"master-<DISTRIBUTION> main"
+"deb-src [signed-by=/usr/share/keyrings/tor-archive-keyring.gpg] "
+"https://deb.torproject.org/torproject.org tor-nightly-master-<DISTRIBUTION> "
+"main"
msgstr ""
-"deb-src https://deb.torproject.org/torproject.org tor-nightly-"
-"master-<DISTRIBUTION> main"
#: https//support.torproject.org/apt/tor-deb-repo/
#: (content/apt/apt-1/contents+en.lrquestion.description)
@@ -9895,13 +10894,15 @@ msgstr ""
#: https//support.torproject.org/apt/tor-deb-repo/
#: (content/apt/apt-1/contents+en.lrquestion.description)
msgid ""
-"deb [arch=amd64] https://deb.torproject.org/torproject.org focal main"
+"deb [arch=amd64 signed-by=/usr/share/keyrings/tor-archive-keyring.gpg] "
+"https://deb.torproject.org/torproject.org focal main"
msgstr ""
#: https//support.torproject.org/apt/tor-deb-repo/
#: (content/apt/apt-1/contents+en.lrquestion.description)
msgid ""
-"deb-src [arch=amd64] https://deb.torproject.org/torproject.org focal main"
+"deb-src [arch=amd64 signed-by=/usr/share/keyrings/tor-archive-keyring.gpg] "
+"https://deb.torproject.org/torproject.org focal main"
msgstr ""
#: https//support.torproject.org/apt/tor-deb-repo/
@@ -9921,26 +10922,17 @@ msgstr ""
#: (content/apt/apt-1/contents+en.lrquestion.description)
msgid ""
"#### 3. Then add the gpg key used to sign the packages by running the "
-"following commands at your command prompt"
+"following command at your command prompt:"
msgstr ""
#: https//support.torproject.org/apt/tor-deb-repo/
#: (content/apt/apt-1/contents+en.lrquestion.description)
msgid ""
-"# wget -qO- "
+"# wget -O- "
"https://deb.torproject.org/torproject.org/A3C4F0F979CAA22CDBA8F512EE8CBC9E886DDD89.asc"
-" | gpg --import"
+" | gpg --dearmor | tee /usr/share/keyrings/tor-archive-keyring.gpg "
+">/dev/null"
msgstr ""
-"# wget -qO- "
-"https://deb.torproject.org/torproject.org/A3C4F0F979CAA22CDBA8F512EE8CBC9E886DDD89.asc"
-" | gpg --import"
-
-#: https//support.torproject.org/apt/tor-deb-repo/
-#: (content/apt/apt-1/contents+en.lrquestion.description)
-msgid ""
-"# gpg --export A3C4F0F979CAA22CDBA8F512EE8CBC9E886DDD89 | apt-key add -"
-msgstr ""
-"# gpg --export A3C4F0F979CAA22CDBA8F512EE8CBC9E886DDD89 | apt-key add -"
#: https//support.torproject.org/apt/tor-deb-repo/
#: (content/apt/apt-1/contents+en.lrquestion.description)
@@ -11546,6 +12538,82 @@ msgid ""
"doesn't change IP address over the day."
msgstr ""
+#: https//support.torproject.org/alternate-designs/block-websites/
+#: (content/alternate-designs/block-websites/contents+en.lrquestion.title)
+msgid "Exit policies should be able to block websites, not just IP addresses."
+msgstr ""
+
+#: https//support.torproject.org/alternate-designs/block-websites/
+#: (content/alternate-designs/block-websites/contents+en.lrquestion.description)
+msgid ""
+"It would be nice to let relay operators say things like `reject "
+"www.slashdot.org` in their exit policies, rather than requiring them to "
+"learn all the IP address space that could be covered by the site (and then "
+"also blocking other sites at those IP addresses)."
+msgstr ""
+
+#: https//support.torproject.org/alternate-designs/block-websites/
+#: (content/alternate-designs/block-websites/contents+en.lrquestion.description)
+msgid "There are two problems, though."
+msgstr ""
+
+#: https//support.torproject.org/alternate-designs/block-websites/
+#: (content/alternate-designs/block-websites/contents+en.lrquestion.description)
+msgid "First, users could still get around these blocks."
+msgstr ""
+
+#: https//support.torproject.org/alternate-designs/block-websites/
+#: (content/alternate-designs/block-websites/contents+en.lrquestion.description)
+msgid ""
+"For example, they could request the IP address rather than the hostname when"
+" they exit from the Tor network."
+msgstr ""
+
+#: https//support.torproject.org/alternate-designs/block-websites/
+#: (content/alternate-designs/block-websites/contents+en.lrquestion.description)
+msgid ""
+"This means operators would still need to learn all the IP addresses for the "
+"destinations in question."
+msgstr ""
+
+#: https//support.torproject.org/alternate-designs/block-websites/
+#: (content/alternate-designs/block-websites/contents+en.lrquestion.description)
+msgid ""
+"The second problem is that it would allow remote attackers to censor "
+"arbitrary sites."
+msgstr ""
+
+#: https//support.torproject.org/alternate-designs/block-websites/
+#: (content/alternate-designs/block-websites/contents+en.lrquestion.description)
+msgid ""
+"For example, if a Tor operator blocks www1.slashdot.org, and then some "
+"attacker poisons the Tor relay's DNS or otherwise changes that hostname to "
+"resolve to the IP address for a major news site, then suddenly that Tor "
+"relay is blocking the news site."
+msgstr ""
+
+#: https//support.torproject.org/alternate-designs/let-the-network-pick-the-path/
+#: (content/alternate-designs/let-the-network-pick-the-path/contents+en.lrquestion.title)
+msgid "You should let the network pick the path, not the client."
+msgstr ""
+
+#: https//support.torproject.org/alternate-designs/let-the-network-pick-the-path/
+#: (content/alternate-designs/let-the-network-pick-the-path/contents+en.lrquestion.description)
+msgid "No, you cannot trust the network to pick the path."
+msgstr ""
+
+#: https//support.torproject.org/alternate-designs/let-the-network-pick-the-path/
+#: (content/alternate-designs/let-the-network-pick-the-path/contents+en.lrquestion.description)
+msgid "Malicious relays could route you through their colluding friends."
+msgstr ""
+
+#: https//support.torproject.org/alternate-designs/let-the-network-pick-the-path/
+#: (content/alternate-designs/let-the-network-pick-the-path/contents+en.lrquestion.description)
+msgid ""
+"This would give an adversary the ability to watch all of your traffic end to"
+" end."
+msgstr ""
+
#: lego/templates/banner.html:3 lego/templates/banner.html:5
#: templates/banner.html:3 templates/banner.html:5
msgid "Close banner"
@@ -11576,8 +12644,8 @@ msgid "DONATE NOW"
msgstr "기ë¶í기"
#: lego/templates/footer.html:13 lego/templates/footer.html:22
-#: lego/templates/navbar.html:83 templates/footer.html:13
-#: templates/footer.html:22 templates/navbar.html:83
+#: lego/templates/navbar.html:95 templates/footer.html:13
+#: templates/footer.html:22 templates/navbar.html:95
msgid "Download Tor Browser"
msgstr "Tor ë¸ë¼ì°ì ë¤ì´ë¡ë"
diff --git a/contents+lt.po b/contents+lt.po
index 7d510230ff..a61a9c1adc 100644
--- a/contents+lt.po
+++ b/contents+lt.po
@@ -11,7 +11,7 @@ msgid ""
msgstr ""
"Project-Id-Version: PACKAGE VERSION\n"
"Report-Msgid-Bugs-To: \n"
-"POT-Creation-Date: 2021-08-25 11:14+CET\n"
+"POT-Creation-Date: 2021-09-01 12:20+CET\n"
"PO-Revision-Date: 2018-10-02 22:41+0000\n"
"Last-Translator: Tautvydas Ž., 2021\n"
"Language-Team: Lithuanian (https://www.transifex.com/otf/teams/1519/lt/)\n"
@@ -144,6 +144,11 @@ msgstr ""
msgid "Tor Metrics"
msgstr ""
+#: https//support.torproject.org/alternate-designs/
+#: (content/alternate-designs/contents+en.lrtopic.title)
+msgid "Alternate Designs We Don't Do (Yet)"
+msgstr ""
+
#: https//support.torproject.org/glossary/add-on-extension-or-plugin/
#: (content/glossary/add-on-extension-or-plugin/contents+en.lrword.term)
msgid "add-on, extension, or plugin"
@@ -2038,6 +2043,61 @@ msgstr ""
"IÅ¡samesnÄ informacijÄ
apie Tor + VPN galite rasti [mūsų "
"vikyje](https://trac.torproject.org/projects/tor/wiki/doc/TorPlusVPN)."
+#: https//support.torproject.org/faq/relay-donations/
+#: (content/faq/relay-donations/contents+en.lrquestion.title)
+msgid "Can I donate for a relay rather than run my own?"
+msgstr ""
+
+#: https//support.torproject.org/faq/relay-donations/
+#: (content/faq/relay-donations/contents+en.lrquestion.description)
+msgid ""
+"Sure! We have a [list of organizations that run Tor "
+"relays](https://community.torproject.org/relay/community-resources/relay-"
+"associations/) that are happy to turn your donations into better speed and "
+"anonymity for the Tor network."
+msgstr ""
+
+#: https//support.torproject.org/faq/relay-donations/
+#: (content/faq/relay-donations/contents+en.lrquestion.description)
+msgid ""
+"These organizations are not the same as [The Tor Project, "
+"Inc](https://donate.torproject.org/), but we consider that a good thing."
+msgstr ""
+
+#: https//support.torproject.org/faq/relay-donations/
+#: (content/faq/relay-donations/contents+en.lrquestion.description)
+msgid "They're run by nice people who are part of the Tor community."
+msgstr ""
+
+#: https//support.torproject.org/faq/relay-donations/
+#: (content/faq/relay-donations/contents+en.lrquestion.description)
+msgid ""
+"Note that there can be a tradeoff here between anonymity and performance."
+msgstr ""
+
+#: https//support.torproject.org/faq/relay-donations/
+#: (content/faq/relay-donations/contents+en.lrquestion.description)
+msgid ""
+"The Tor network's anonymity comes in part from diversity, so if you are in a"
+" position to run your own relay, you will be improving Tor's anonymity more "
+"than by donating."
+msgstr ""
+
+#: https//support.torproject.org/faq/relay-donations/
+#: (content/faq/relay-donations/contents+en.lrquestion.description)
+msgid ""
+"At the same time though, economies of scale for bandwidth mean that "
+"combining many small donations into several larger relays is more efficient "
+"at improving network performance."
+msgstr ""
+
+#: https//support.torproject.org/faq/relay-donations/
+#: (content/faq/relay-donations/contents+en.lrquestion.description)
+msgid ""
+"Improving anonymity and improving performance are both worthwhile goals, so "
+"however you can help is great!"
+msgstr ""
+
#: https//support.torproject.org/faq/staying-anonymous/
#: (content/faq/staying-anonymous/contents+en.lrquestion.title)
msgid "Am I totally anonymous if I use Tor?"
@@ -2338,6 +2398,61 @@ msgid ""
" documenting all the issues](https://community.torproject.org/)."
msgstr ""
+#: https//support.torproject.org/about/attacks-on-onion-routing/
+#: (content/about/attacks-on-onion-routing/contents+en.lrquestion.title)
+msgid "What attacks remain against onion routing?"
+msgstr ""
+
+#: https//support.torproject.org/about/attacks-on-onion-routing/
+#: (content/about/attacks-on-onion-routing/contents+en.lrquestion.description)
+msgid ""
+"As mentioned above, it is possible for an observer who can view both you and"
+" either the destination website or your Tor exit node to correlate timings "
+"of your traffic as it enters the Tor network and also as it exits."
+msgstr ""
+
+#: https//support.torproject.org/about/attacks-on-onion-routing/
+#: (content/about/attacks-on-onion-routing/contents+en.lrquestion.description)
+msgid "Tor does not defend against such a threat model."
+msgstr ""
+
+#: https//support.torproject.org/about/attacks-on-onion-routing/
+#: (content/about/attacks-on-onion-routing/contents+en.lrquestion.description)
+msgid ""
+"In a more limited sense, note that if a censor or law enforcement agency has"
+" the ability to obtain specific observation of parts of the network, it is "
+"possible for them to verify a suspicion that you talk regularly to your "
+"friend by observing traffic at both ends and correlating the timing of only "
+"that traffic."
+msgstr ""
+
+#: https//support.torproject.org/about/attacks-on-onion-routing/
+#: (content/about/attacks-on-onion-routing/contents+en.lrquestion.description)
+msgid ""
+"Again, this is only useful to verify that parties already suspected of "
+"communicating with one another are doing so."
+msgstr ""
+
+#: https//support.torproject.org/about/attacks-on-onion-routing/
+#: (content/about/attacks-on-onion-routing/contents+en.lrquestion.description)
+msgid ""
+"In most countries, the suspicion required to obtain a warrant already "
+"carries more weight than timing correlation would provide."
+msgstr ""
+
+#: https//support.torproject.org/about/attacks-on-onion-routing/
+#: (content/about/attacks-on-onion-routing/contents+en.lrquestion.description)
+msgid ""
+"Furthermore, since Tor reuses circuits for multiple TCP connections, it is "
+"possible to associate non anonymous and anonymous traffic at a given exit "
+"node, so be careful about what applications you run concurrently over Tor."
+msgstr ""
+
+#: https//support.torproject.org/about/attacks-on-onion-routing/
+#: (content/about/attacks-on-onion-routing/contents+en.lrquestion.description)
+msgid "Perhaps even run separate Tor clients for these applications."
+msgstr ""
+
#: https//support.torproject.org/about/backdoor/
#: (content/about/backdoor/contents+en.lrquestion.title)
msgid "Is there a backdoor in Tor?"
@@ -2475,6 +2590,43 @@ msgid ""
"recommended](/tbb/tbb-9/)."
msgstr ""
+#: https//support.torproject.org/about/change-paths/
+#: (content/about/change-paths/contents+en.lrquestion.title)
+msgid "How often does Tor change its paths?"
+msgstr ""
+
+#: https//support.torproject.org/about/change-paths/
+#: (content/about/change-paths/contents+en.lrquestion.description)
+msgid ""
+"Tor will reuse the same circuit for new TCP streams for 10 minutes, as long "
+"as the circuit is working fine."
+msgstr ""
+
+#: https//support.torproject.org/about/change-paths/
+#: (content/about/change-paths/contents+en.lrquestion.description)
+msgid "(If the circuit fails, Tor will switch to a new circuit immediately.)"
+msgstr ""
+
+#: https//support.torproject.org/about/change-paths/
+#: (content/about/change-paths/contents+en.lrquestion.description)
+msgid ""
+"But note that a single TCP stream (e.g. a long IRC connection) will stay on "
+"the same circuit forever."
+msgstr ""
+
+#: https//support.torproject.org/about/change-paths/
+#: (content/about/change-paths/contents+en.lrquestion.description)
+msgid "We don't rotate individual streams from one circuit to the next."
+msgstr ""
+
+#: https//support.torproject.org/about/change-paths/
+#: (content/about/change-paths/contents+en.lrquestion.description)
+msgid ""
+"Otherwise, an adversary with a partial view of the network would be given "
+"many chances over time to link you to your destination, rather than just one"
+" chance."
+msgstr ""
+
#: https//support.torproject.org/about/distribute-tor/
#: (content/about/distribute-tor/contents+en.lrquestion.title)
msgid "Can I distribute Tor?"
@@ -2572,6 +2724,133 @@ msgid ""
"details."
msgstr ""
+#: https//support.torproject.org/about/entry-guards/
+#: (content/about/entry-guards/contents+en.lrquestion.title)
+msgid "What are Entry Guards?"
+msgstr ""
+
+#: https//support.torproject.org/about/entry-guards/
+#: (content/about/entry-guards/contents+en.lrquestion.description)
+msgid ""
+"Tor (like all current practical low-latency anonymity designs) fails when "
+"the attacker can see both ends of the communications channel."
+msgstr ""
+
+#: https//support.torproject.org/about/entry-guards/
+#: (content/about/entry-guards/contents+en.lrquestion.description)
+msgid ""
+"For example, suppose the attacker controls or watches the Tor relay you "
+"choose to enter the network, and also controls or watches the website you "
+"visit."
+msgstr ""
+
+#: https//support.torproject.org/about/entry-guards/
+#: (content/about/entry-guards/contents+en.lrquestion.description)
+msgid ""
+"In this case, the research community knows no practical low-latency design "
+"that can reliably stop the attacker from correlating volume and timing "
+"information on the two sides."
+msgstr ""
+
+#: https//support.torproject.org/about/entry-guards/
+#: (content/about/entry-guards/contents+en.lrquestion.description)
+msgid "So, what should we do?"
+msgstr ""
+
+#: https//support.torproject.org/about/entry-guards/
+#: (content/about/entry-guards/contents+en.lrquestion.description)
+msgid "Suppose the attacker controls, or can observe, C relays."
+msgstr ""
+
+#: https//support.torproject.org/about/entry-guards/
+#: (content/about/entry-guards/contents+en.lrquestion.description)
+msgid "Suppose there are N relays total."
+msgstr ""
+
+#: https//support.torproject.org/about/entry-guards/
+#: (content/about/entry-guards/contents+en.lrquestion.description)
+msgid ""
+"If you select new entry and exit relays each time you use the network, the "
+"attacker will be able to correlate all traffic you send with probability "
+"around (c/n)2."
+msgstr ""
+
+#: https//support.torproject.org/about/entry-guards/
+#: (content/about/entry-guards/contents+en.lrquestion.description)
+msgid ""
+"But profiling is, for most users, as bad as being traced all the time: they "
+"want to do something often without an attacker noticing, and the attacker "
+"noticing once is as bad as the attacker noticing more often."
+msgstr ""
+
+#: https//support.torproject.org/about/entry-guards/
+#: (content/about/entry-guards/contents+en.lrquestion.description)
+msgid ""
+"Thus, choosing many random entries and exits gives the user no chance of "
+"escaping profiling by this kind of attacker."
+msgstr ""
+
+#: https//support.torproject.org/about/entry-guards/
+#: (content/about/entry-guards/contents+en.lrquestion.description)
+msgid ""
+"The solution is \"entry guards\": each Tor client selects a few relays at "
+"random to use as entry points, and uses only those relays for their first "
+"hop."
+msgstr ""
+
+#: https//support.torproject.org/about/entry-guards/
+#: (content/about/entry-guards/contents+en.lrquestion.description)
+msgid ""
+"If those relays are not controlled or observed, the attacker can't win, "
+"ever, and the user is secure."
+msgstr ""
+
+#: https//support.torproject.org/about/entry-guards/
+#: (content/about/entry-guards/contents+en.lrquestion.description)
+msgid ""
+"If those relays are observed or controlled by the attacker, the attacker "
+"sees a larger fraction of the user's traffic - but still the user is no more"
+" profiled than before."
+msgstr ""
+
+#: https//support.torproject.org/about/entry-guards/
+#: (content/about/entry-guards/contents+en.lrquestion.description)
+msgid ""
+"Thus, the user has some chance (on the order of (n-c)/n) of avoiding "
+"profiling, whereas they had none before."
+msgstr ""
+
+#: https//support.torproject.org/about/entry-guards/
+#: (content/about/entry-guards/contents+en.lrquestion.description)
+msgid ""
+"You can read more at [An Analysis of the Degradation of Anonymous "
+"Protocols](http://freehaven.net/anonbib/#wright02), [Defending Anonymous "
+"Communication Against Passive Logging "
+"Attacks](http://freehaven.net/anonbib/#wright03), and especially [Locating "
+"Hidden Servers](http://freehaven.net/anonbib/#hs-attack06)."
+msgstr ""
+
+#: https//support.torproject.org/about/entry-guards/
+#: (content/about/entry-guards/contents+en.lrquestion.description)
+msgid ""
+"Restricting your entry nodes may also help against attackers who want to run"
+" a few Tor nodes and easily enumerate all of the Tor user IP addresses."
+msgstr ""
+
+#: https//support.torproject.org/about/entry-guards/
+#: (content/about/entry-guards/contents+en.lrquestion.description)
+msgid ""
+"(Even though they can't learn what destinations the users are talking to, "
+"they still might be able to do bad things with just a list of users.)"
+msgstr ""
+
+#: https//support.torproject.org/about/entry-guards/
+#: (content/about/entry-guards/contents+en.lrquestion.description)
+msgid ""
+"However, that feature won't really become useful until we move to a "
+"\"directory guard\" design as well."
+msgstr ""
+
#: https//support.torproject.org/about/how-is-tor-different-from-other-proxies/
#: (content/about/how-is-tor-different-from-other-proxies/contents+en.lrquestion.title)
msgid "How is Tor different from other proxies?"
@@ -2742,6 +3021,162 @@ msgid ""
" Tor and HTTPS interact."
msgstr ""
+#: https//support.torproject.org/about/key-management/
+#: (content/about/key-management/contents+en.lrquestion.title)
+msgid "Tell me about all the keys Tor uses"
+msgstr ""
+
+#: https//support.torproject.org/about/key-management/
+#: (content/about/key-management/contents+en.lrquestion.description)
+msgid ""
+"Tor uses a variety of different keys, with three goals in mind: 1) "
+"encryption to ensure privacy of data within the Tor network, 2) "
+"authentication so clients know they're talking to the relays they meant to "
+"talk to, and 3) signatures to make sure all clients know the same set of "
+"relays."
+msgstr ""
+
+#: https//support.torproject.org/about/key-management/
+#: (content/about/key-management/contents+en.lrquestion.description)
+msgid ""
+"**Encryption**: first, all connections in Tor use TLS link encryption, so "
+"observers can't look inside to see which circuit a given cell is intended "
+"for."
+msgstr ""
+
+#: https//support.torproject.org/about/key-management/
+#: (content/about/key-management/contents+en.lrquestion.description)
+msgid ""
+"Further, the Tor client establishes an ephemeral encryption key with each "
+"relay in the circuit; these extra layers of encryption mean that only the "
+"exit relay can read the cells."
+msgstr ""
+
+#: https//support.torproject.org/about/key-management/
+#: (content/about/key-management/contents+en.lrquestion.description)
+msgid ""
+"Both sides discard the circuit key when the circuit ends, so logging traffic"
+" and then breaking into the relay to discover the key won't work."
+msgstr ""
+
+#: https//support.torproject.org/about/key-management/
+#: (content/about/key-management/contents+en.lrquestion.description)
+msgid ""
+"**Authentication**: Every Tor relay has a public decryption key called the "
+"\"onion key\"."
+msgstr ""
+
+#: https//support.torproject.org/about/key-management/
+#: (content/about/key-management/contents+en.lrquestion.description)
+msgid "Each relay rotates its onion key once a week."
+msgstr ""
+
+#: https//support.torproject.org/about/key-management/
+#: (content/about/key-management/contents+en.lrquestion.description)
+msgid ""
+"When the Tor client establishes circuits, at each step it [demands that the "
+"Tor relay prove knowledge of its onion key](https://svn-"
+"archive.torproject.org/svn/projects/design-paper/tor-"
+"design.html#subsec:circuits)."
+msgstr ""
+
+#: https//support.torproject.org/about/key-management/
+#: (content/about/key-management/contents+en.lrquestion.description)
+msgid ""
+"That way the first node in the path can't just spoof the rest of the path."
+msgstr ""
+
+#: https//support.torproject.org/about/key-management/
+#: (content/about/key-management/contents+en.lrquestion.description)
+msgid ""
+"Because the Tor client chooses the path, it can make sure to get Tor's "
+"\"distributed trust\" property: no single relay in the path can know about "
+"both the client and what the client is doing."
+msgstr ""
+
+#: https//support.torproject.org/about/key-management/
+#: (content/about/key-management/contents+en.lrquestion.description)
+msgid ""
+"**Coordination**: How do clients know what the relays are, and how do they "
+"know that they have the right keys for them?"
+msgstr ""
+
+#: https//support.torproject.org/about/key-management/
+#: (content/about/key-management/contents+en.lrquestion.description)
+msgid "Each relay has a long-term public signing key called the \"identity key\"."
+msgstr ""
+
+#: https//support.torproject.org/about/key-management/
+#: (content/about/key-management/contents+en.lrquestion.description)
+msgid "Each directory authority additionally has a \"directory signing key\"."
+msgstr ""
+
+#: https//support.torproject.org/about/key-management/
+#: (content/about/key-management/contents+en.lrquestion.description)
+msgid ""
+"The directory authorities [provide a signed "
+"list](https://gitweb.torproject.org/torspec.git/tree/dir-spec.txt) of all "
+"the known relays, and in that list are a set of certificates from each relay"
+" (self-signed by their identity key) specifying their keys, locations, exit "
+"policies, and so on."
+msgstr ""
+
+#: https//support.torproject.org/about/key-management/
+#: (content/about/key-management/contents+en.lrquestion.description)
+msgid ""
+"So unless the adversary can control a majority of the directory authorities "
+"(as of 2021 there are 10 directory authorities), they can't trick the Tor "
+"client into using other Tor relays."
+msgstr ""
+
+#: https//support.torproject.org/about/key-management/
+#: (content/about/key-management/contents+en.lrquestion.description)
+msgid "How do clients know what the directory authorities are?"
+msgstr ""
+
+#: https//support.torproject.org/about/key-management/
+#: (content/about/key-management/contents+en.lrquestion.description)
+msgid ""
+"The Tor software comes with a built-in list of location and public key for "
+"each directory authority."
+msgstr ""
+
+#: https//support.torproject.org/about/key-management/
+#: (content/about/key-management/contents+en.lrquestion.description)
+msgid ""
+"So the only way to trick users into using a fake Tor network is to give them"
+" a specially modified version of the software."
+msgstr ""
+
+#: https//support.torproject.org/about/key-management/
+#: (content/about/key-management/contents+en.lrquestion.description)
+msgid "How do users know they've got the right software?"
+msgstr ""
+
+#: https//support.torproject.org/about/key-management/
+#: (content/about/key-management/contents+en.lrquestion.description)
+msgid ""
+"When we distribute the source code or a package, we digitally sign it with "
+"[GNU Privacy Guard](http://www.gnupg.org/). See the [instructions on how to "
+"check Tor Browser's signature](https://support.torproject.org/tbb/how-to-"
+"verify-signature/)."
+msgstr ""
+
+#: https//support.torproject.org/about/key-management/
+#: (content/about/key-management/contents+en.lrquestion.description)
+msgid ""
+"In order to be certain that it's really signed by us, you need to have met "
+"us in person and gotten a copy of our GPG key fingerprint, or you need to "
+"know somebody who has."
+msgstr ""
+
+#: https//support.torproject.org/about/key-management/
+#: (content/about/key-management/contents+en.lrquestion.description)
+msgid ""
+"If you're concerned about an attack on this level, we recommend you get "
+"involved with the security community and start meeting people."
+msgstr ""
+
#: https//support.torproject.org/about/no-data-scrubbing/
#: (content/about/no-data-scrubbing/contents+en.lrquestion.title)
msgid ""
@@ -2774,6 +3209,151 @@ msgid ""
"though."
msgstr ""
+#: https//support.torproject.org/about/protections/
+#: (content/about/protections/contents+en.lrquestion.title)
+msgid "What protections does Tor provide?"
+msgstr ""
+
+#: https//support.torproject.org/about/protections/
+#: (content/about/protections/contents+en.lrquestion.description)
+msgid ""
+"Internet communication is based on a store-and-forward model that can be "
+"understood in analogy to postal mail: Data is transmitted in blocks called "
+"IP datagrams or packets."
+msgstr ""
+
+#: https//support.torproject.org/about/protections/
+#: (content/about/protections/contents+en.lrquestion.description)
+msgid ""
+"Every packet includes a source IP address (of the sender) and a destination "
+"IP address (of the receiver), just as ordinary letters contain postal "
+"addresses of sender and receiver."
+msgstr ""
+
+#: https//support.torproject.org/about/protections/
+#: (content/about/protections/contents+en.lrquestion.description)
+msgid ""
+"The way from sender to receiver involves multiple hops of routers, where "
+"each router inspects the destination IP address and forwards the packet "
+"closer to its destination."
+msgstr ""
+
+#: https//support.torproject.org/about/protections/
+#: (content/about/protections/contents+en.lrquestion.description)
+msgid ""
+"Thus, every router between sender and receiver learns that the sender is "
+"communicating with the receiver."
+msgstr ""
+
+#: https//support.torproject.org/about/protections/
+#: (content/about/protections/contents+en.lrquestion.description)
+msgid ""
+"In particular, your local ISP is in the position to build a complete profile"
+" of your Internet usage."
+msgstr ""
+
+#: https//support.torproject.org/about/protections/
+#: (content/about/protections/contents+en.lrquestion.description)
+msgid ""
+"In addition, every server in the Internet that can see any of the packets "
+"can profile your behavior."
+msgstr ""
+
+#: https//support.torproject.org/about/protections/
+#: (content/about/protections/contents+en.lrquestion.description)
+msgid ""
+"The aim of Tor is to improve your privacy by sending your traffic through a "
+"series of proxies."
+msgstr ""
+
+#: https//support.torproject.org/about/protections/
+#: (content/about/protections/contents+en.lrquestion.description)
+msgid ""
+"Your communication is encrypted in multiple layers and routed via multiple "
+"hops through the Tor network to the final receiver."
+msgstr ""
+
+#: https//support.torproject.org/about/protections/
+#: (content/about/protections/contents+en.lrquestion.description)
+msgid ""
+"More details on this process can be found in this "
+"[visualization](https://support.torproject.org/https/https-1/)."
+msgstr ""
+
+#: https//support.torproject.org/about/protections/
+#: (content/about/protections/contents+en.lrquestion.description)
+msgid ""
+"Note that all your local ISP can observe now is that you are communicating "
+"with Tor nodes."
+msgstr ""
+
+#: https//support.torproject.org/about/protections/
+#: (content/about/protections/contents+en.lrquestion.description)
+msgid ""
+"Similarly, servers in the Internet just see that they are being contacted by"
+" Tor nodes."
+msgstr ""
+
+#: https//support.torproject.org/about/protections/
+#: (content/about/protections/contents+en.lrquestion.description)
+msgid "Generally speaking, Tor aims to solve three privacy problems:"
+msgstr ""
+
+#: https//support.torproject.org/about/protections/
+#: (content/about/protections/contents+en.lrquestion.description)
+msgid ""
+"First, Tor prevents websites and other services from learning your location,"
+" which they can use to build databases about your habits and interests."
+msgstr ""
+
+#: https//support.torproject.org/about/protections/
+#: (content/about/protections/contents+en.lrquestion.description)
+msgid ""
+"With Tor, your Internet connections don't give you away by default -- now "
+"you can have the ability to choose, for each connection, how much "
+"information to reveal."
+msgstr ""
+
+#: https//support.torproject.org/about/protections/
+#: (content/about/protections/contents+en.lrquestion.description)
+msgid ""
+"Second, Tor prevents people watching your traffic locally (such as your ISP "
+"or someone with access to your home wifi or router) from learning what "
+"information you're fetching and where you're fetching it from."
+msgstr ""
+
+#: https//support.torproject.org/about/protections/
+#: (content/about/protections/contents+en.lrquestion.description)
+msgid ""
+"It also stops them from deciding what you're allowed to learn and publish --"
+" if you can get to any part of the Tor network, you can reach any site on "
+"the Internet."
+msgstr ""
+
+#: https//support.torproject.org/about/protections/
+#: (content/about/protections/contents+en.lrquestion.description)
+msgid ""
+"Third, Tor routes your connection through more than one Tor relay so no "
+"single relay can learn what you're up to."
+msgstr ""
+
+#: https//support.torproject.org/about/protections/
+#: (content/about/protections/contents+en.lrquestion.description)
+msgid ""
+"Because these relays are run by different individuals or organizations, "
+"distributing trust provides more security than the old [one hop "
+"proxy](https://support.torproject.org/about/#how-is-tor-different-from-"
+"other-proxies) approach."
+msgstr ""
+
+#: https//support.torproject.org/about/protections/
+#: (content/about/protections/contents+en.lrquestion.description)
+msgid ""
+"Note, however, that there are situations where Tor fails to solve these "
+"privacy problems entirely: see the entry below on [remaining "
+"attacks](https://support.torproject.org/about/#attacks-on-onion-routing)."
+msgstr ""
+
#: https//support.torproject.org/about/what-is-tor/
#: (content/about/what-is-tor/contents+en.lrquestion.title)
msgid "What is Tor?"
@@ -4957,9 +5537,11 @@ msgstr ""
#: (content/tbb/tbb-47/contents+en.lrquestion.description)
msgid ""
"Also, read up on the HTTPProxyAuthenticator and HTTPSProxyAuthenticator "
-"options if your proxy requires auth. We only support basic auth currently, "
-"but if you need NTLM authentication, you may find [this post in the "
-"archives](https://archives.seul.org/or/talk/Jun-2005/msg00223.html) useful."
+"options if your [proxy requires auth.](https://developer.mozilla.org/en-"
+"US/docs/Web/HTTP/Headers/Proxy-Authenticate) We only support basic auth "
+"currently, but if you need NTLM authentication, you may find [this post in "
+"the archives](https://archives.seul.org/or/talk/Jun-2005/msg00223.html) "
+"useful."
msgstr ""
#: https//support.torproject.org/tbb/tbb-47/
@@ -5180,6 +5762,219 @@ msgid ""
"have no effect on Tor's configuration."
msgstr ""
+#: https//support.torproject.org/tbb/tbb-firewall-ports/
+#: (content/tbb/tbb-firewall-ports/contents+en.lrquestion.title)
+msgid "My firewall only allows a few outgoing ports"
+msgstr ""
+
+#: https//support.torproject.org/tbb/tbb-firewall-ports/
+#: (content/tbb/tbb-firewall-ports/contents+en.lrquestion.description)
+msgid ""
+"If your firewall works by blocking ports, then you can tell Tor to only use "
+"the ports when you start your Tor Browser."
+msgstr ""
+
+#: https//support.torproject.org/tbb/tbb-firewall-ports/
+#: (content/tbb/tbb-firewall-ports/contents+en.lrquestion.description)
+msgid ""
+"Or you can add the ports that your firewall permits by adding "
+"\"FascistFirewall 1\" to your torrc configuration file."
+msgstr ""
+
+#: https//support.torproject.org/tbb/tbb-firewall-ports/
+#: (content/tbb/tbb-firewall-ports/contents+en.lrquestion.description)
+msgid ""
+"By default, when you set this Tor assumes that your firewall allows only "
+"port 80 and port 443 (HTTP and HTTPS respectively)."
+msgstr ""
+
+#: https//support.torproject.org/tbb/tbb-firewall-ports/
+#: (content/tbb/tbb-firewall-ports/contents+en.lrquestion.description)
+msgid ""
+"You can select a different set of ports with the FirewallPorts torrc option."
+msgstr ""
+
+#: https//support.torproject.org/tbb/tbb-firewall-ports/
+#: (content/tbb/tbb-firewall-ports/contents+en.lrquestion.description)
+msgid ""
+"If you want to be more fine-grained with your controls, you can also use the"
+" ReachableAddresses config options, e.g.:"
+msgstr ""
+
+#: https//support.torproject.org/tbb/tbb-firewall-ports/
+#: (content/tbb/tbb-firewall-ports/contents+en.lrquestion.description)
+#: https//support.torproject.org/tbb/tbb-install-tor-central-server/
+#: (content/tbb/tbb-install-tor-central-server/contents+en.lrquestion.description)
+#: https//support.torproject.org/operators/default-exit-ports/
+#: (content/operators/default-exit-ports/contents+en.lrquestion.description)
+#: https//support.torproject.org/operators/hibernation/
+#: (content/operators/hibernation/contents+en.lrquestion.description)
+#: https//support.torproject.org/operators/limit-total-bandwidth/
+#: (content/operators/limit-total-bandwidth/contents+en.lrquestion.description)
+#: https//support.torproject.org/misc/bug-or-feedback/
+#: (content/misc/bug-or-feedback/contents+en.lrquestion.description)
+#: https//support.torproject.org/get-in-touch/why-i-cant-join-tor-channels/
+#: (content/get-in-touch/why-i-cant-join-tor-channels/contents+en.lrquestion.description)
+#: https//support.torproject.org/apt/tor-deb-repo/
+#: (content/apt/apt-1/contents+en.lrquestion.description)
+#: https//support.torproject.org/apt/apt-over-tor/
+#: (content/apt/apt-3/contents+en.lrquestion.description)
+msgid "```"
+msgstr "```"
+
+#: https//support.torproject.org/tbb/tbb-firewall-ports/
+#: (content/tbb/tbb-firewall-ports/contents+en.lrquestion.description)
+msgid "ReachableDirAddresses *:80"
+msgstr ""
+
+#: https//support.torproject.org/tbb/tbb-firewall-ports/
+#: (content/tbb/tbb-firewall-ports/contents+en.lrquestion.description)
+msgid "ReachableORAddresses *:443"
+msgstr ""
+
+#: https//support.torproject.org/tbb/tbb-install-tor-central-server/
+#: (content/tbb/tbb-install-tor-central-server/contents+en.lrquestion.title)
+msgid ""
+"Can I install Tor on a central server, and have my clients connect to it?"
+msgstr ""
+
+#: https//support.torproject.org/tbb/tbb-install-tor-central-server/
+#: (content/tbb/tbb-install-tor-central-server/contents+en.lrquestion.description)
+msgid ""
+"Yes. Tor can be configured as a client or a relay on another machine, and "
+"allow other machines to be able to connect to it for anonymity."
+msgstr ""
+
+#: https//support.torproject.org/tbb/tbb-install-tor-central-server/
+#: (content/tbb/tbb-install-tor-central-server/contents+en.lrquestion.description)
+msgid ""
+"This is most useful in an environment where many computers want a gateway of"
+" anonymity to the rest of the world."
+msgstr ""
+
+#: https//support.torproject.org/tbb/tbb-install-tor-central-server/
+#: (content/tbb/tbb-install-tor-central-server/contents+en.lrquestion.description)
+msgid ""
+"However, be forewarned that with this configuration, anyone within your "
+"private network (existing between you and the Tor client/relay) can see what"
+" traffic you are sending in clear text."
+msgstr ""
+
+#: https//support.torproject.org/tbb/tbb-install-tor-central-server/
+#: (content/tbb/tbb-install-tor-central-server/contents+en.lrquestion.description)
+msgid "The anonymity doesn't start until you get to the Tor relay."
+msgstr ""
+
+#: https//support.torproject.org/tbb/tbb-install-tor-central-server/
+#: (content/tbb/tbb-install-tor-central-server/contents+en.lrquestion.description)
+msgid ""
+"Because of this, if you are the controller of your domain and you know "
+"everything's locked down, you will be OK, but this configuration may not be "
+"suitable for large private networks where security is key all around."
+msgstr ""
+
+#: https//support.torproject.org/tbb/tbb-install-tor-central-server/
+#: (content/tbb/tbb-install-tor-central-server/contents+en.lrquestion.description)
+msgid ""
+"Configuration is simple, editing your torrc file's SocksListenAddress "
+"according to the following examples:"
+msgstr ""
+
+#: https//support.torproject.org/tbb/tbb-install-tor-central-server/
+#: (content/tbb/tbb-install-tor-central-server/contents+en.lrquestion.description)
+msgid "SocksListenAddress 127.0.0.1"
+msgstr ""
+
+#: https//support.torproject.org/tbb/tbb-install-tor-central-server/
+#: (content/tbb/tbb-install-tor-central-server/contents+en.lrquestion.description)
+msgid "SocksListenAddress 192.168.x.x:9100"
+msgstr ""
+
+#: https//support.torproject.org/tbb/tbb-install-tor-central-server/
+#: (content/tbb/tbb-install-tor-central-server/contents+en.lrquestion.description)
+msgid "SocksListenAddress 0.0.0.0:9100"
+msgstr ""
+
+#: https//support.torproject.org/tbb/tbb-install-tor-central-server/
+#: (content/tbb/tbb-install-tor-central-server/contents+en.lrquestion.description)
+msgid ""
+"You can state multiple listen addresses, in the case that you are part of "
+"several networks or subnets."
+msgstr ""
+
+#: https//support.torproject.org/tbb/tbb-install-tor-central-server/
+#: (content/tbb/tbb-install-tor-central-server/contents+en.lrquestion.description)
+msgid "SocksListenAddress 192.168.x.x:9100 #eth0"
+msgstr ""
+
+#: https//support.torproject.org/tbb/tbb-install-tor-central-server/
+#: (content/tbb/tbb-install-tor-central-server/contents+en.lrquestion.description)
+msgid "SocksListenAddress 10.x.x.x:9100 #eth1"
+msgstr ""
+
+#: https//support.torproject.org/tbb/tbb-install-tor-central-server/
+#: (content/tbb/tbb-install-tor-central-server/contents+en.lrquestion.description)
+msgid ""
+"After this, your clients on their respective networks/subnets would specify "
+"a socks proxy with the address and port you specified SocksListenAddress to "
+"be."
+msgstr ""
+
+#: https//support.torproject.org/tbb/tbb-install-tor-central-server/
+#: (content/tbb/tbb-install-tor-central-server/contents+en.lrquestion.description)
+msgid ""
+"Please note that the SocksPort configuration option gives the port ONLY for "
+"localhost (127.0.0.1)."
+msgstr ""
+
+#: https//support.torproject.org/tbb/tbb-install-tor-central-server/
+#: (content/tbb/tbb-install-tor-central-server/contents+en.lrquestion.description)
+msgid ""
+"When setting up your SocksListenAddress(es), you need to give the port with "
+"the address, as shown above."
+msgstr ""
+
+#: https//support.torproject.org/tbb/tbb-install-tor-central-server/
+#: (content/tbb/tbb-install-tor-central-server/contents+en.lrquestion.description)
+msgid ""
+"If you are interested in forcing all outgoing data through the central Tor "
+"client/relay, instead of the server only being an optional proxy, you may "
+"find the program iptables (for *nix) useful."
+msgstr ""
+
+#: https//support.torproject.org/tbb/tbb-run-client-different-computer/
+#: (content/tbb/tbb-run-client-different-computer/contents+en.lrquestion.title)
+msgid ""
+"I want to run my Tor client on a different computer than my applications"
+msgstr ""
+
+#: https//support.torproject.org/tbb/tbb-run-client-different-computer/
+#: (content/tbb/tbb-run-client-different-computer/contents+en.lrquestion.description)
+msgid ""
+"By default, your Tor client only listens for applications that connect from "
+"localhost."
+msgstr ""
+
+#: https//support.torproject.org/tbb/tbb-run-client-different-computer/
+#: (content/tbb/tbb-run-client-different-computer/contents+en.lrquestion.description)
+msgid "Connections from other computers are refused."
+msgstr ""
+
+#: https//support.torproject.org/tbb/tbb-run-client-different-computer/
+#: (content/tbb/tbb-run-client-different-computer/contents+en.lrquestion.description)
+msgid ""
+"If you want to torify applications on different computers than the Tor "
+"client, you should edit your torrc to define `SocksListenAddress 0.0.0.0` "
+"and then restart (or hup) Tor."
+msgstr ""
+
+#: https//support.torproject.org/tbb/tbb-run-client-different-computer/
+#: (content/tbb/tbb-run-client-different-computer/contents+en.lrquestion.description)
+msgid ""
+"If you want to get more advanced, you can configure your Tor client on a "
+"firewall to bind to your internal IP but not your external IP."
+msgstr ""
+
#: https//support.torproject.org/tbb/website-blocking-tor/
#: (content/tbb/website-blocking-tor/contents+en.lrquestion.title)
msgid "A website I am trying to reach is blocking access over Tor."
@@ -6618,6 +7413,130 @@ msgid ""
"guide."
msgstr ""
+#: https//support.torproject.org/operators/default-exit-ports/
+#: (content/operators/default-exit-ports/contents+en.lrquestion.title)
+msgid "Is there a list of default exit ports?"
+msgstr ""
+
+#: https//support.torproject.org/operators/default-exit-ports/
+#: (content/operators/default-exit-ports/contents+en.lrquestion.description)
+msgid ""
+"The default open ports are listed below but keep in mind that, any port or "
+"ports can be opened by the relay operator by configuring it in torrc or "
+"modifying the source code."
+msgstr ""
+
+#: https//support.torproject.org/operators/default-exit-ports/
+#: (content/operators/default-exit-ports/contents+en.lrquestion.description)
+msgid ""
+"The default according to src/or/policies.c ([line 85][1] and [line 1901][2])"
+" from the source code release [release-0.4.6][3]:"
+msgstr ""
+
+#: https//support.torproject.org/operators/default-exit-ports/
+#: (content/operators/default-exit-ports/contents+en.lrquestion.description)
+msgid "reject 0.0.0.0/8"
+msgstr ""
+
+#: https//support.torproject.org/operators/default-exit-ports/
+#: (content/operators/default-exit-ports/contents+en.lrquestion.description)
+msgid "reject 169.254.0.0/16"
+msgstr ""
+
+#: https//support.torproject.org/operators/default-exit-ports/
+#: (content/operators/default-exit-ports/contents+en.lrquestion.description)
+msgid "reject 127.0.0.0/8"
+msgstr ""
+
+#: https//support.torproject.org/operators/default-exit-ports/
+#: (content/operators/default-exit-ports/contents+en.lrquestion.description)
+msgid "reject 192.168.0.0/16"
+msgstr ""
+
+#: https//support.torproject.org/operators/default-exit-ports/
+#: (content/operators/default-exit-ports/contents+en.lrquestion.description)
+msgid "reject 10.0.0.0/8"
+msgstr ""
+
+#: https//support.torproject.org/operators/default-exit-ports/
+#: (content/operators/default-exit-ports/contents+en.lrquestion.description)
+msgid "reject 172.16.0.0/12"
+msgstr ""
+
+#: https//support.torproject.org/operators/default-exit-ports/
+#: (content/operators/default-exit-ports/contents+en.lrquestion.description)
+msgid "reject *:25"
+msgstr ""
+
+#: https//support.torproject.org/operators/default-exit-ports/
+#: (content/operators/default-exit-ports/contents+en.lrquestion.description)
+msgid "reject *:119"
+msgstr ""
+
+#: https//support.torproject.org/operators/default-exit-ports/
+#: (content/operators/default-exit-ports/contents+en.lrquestion.description)
+msgid "reject *:135-139"
+msgstr ""
+
+#: https//support.torproject.org/operators/default-exit-ports/
+#: (content/operators/default-exit-ports/contents+en.lrquestion.description)
+msgid "reject *:445"
+msgstr ""
+
+#: https//support.torproject.org/operators/default-exit-ports/
+#: (content/operators/default-exit-ports/contents+en.lrquestion.description)
+msgid "reject *:563"
+msgstr ""
+
+#: https//support.torproject.org/operators/default-exit-ports/
+#: (content/operators/default-exit-ports/contents+en.lrquestion.description)
+msgid "reject *:1214"
+msgstr ""
+
+#: https//support.torproject.org/operators/default-exit-ports/
+#: (content/operators/default-exit-ports/contents+en.lrquestion.description)
+msgid "reject *:4661-4666"
+msgstr ""
+
+#: https//support.torproject.org/operators/default-exit-ports/
+#: (content/operators/default-exit-ports/contents+en.lrquestion.description)
+msgid "reject *:6346-6429"
+msgstr ""
+
+#: https//support.torproject.org/operators/default-exit-ports/
+#: (content/operators/default-exit-ports/contents+en.lrquestion.description)
+msgid "reject *:6699"
+msgstr ""
+
+#: https//support.torproject.org/operators/default-exit-ports/
+#: (content/operators/default-exit-ports/contents+en.lrquestion.description)
+msgid "reject *:6881-6999"
+msgstr ""
+
+#: https//support.torproject.org/operators/default-exit-ports/
+#: (content/operators/default-exit-ports/contents+en.lrquestion.description)
+msgid "accept *:*"
+msgstr ""
+
+#: https//support.torproject.org/operators/default-exit-ports/
+#: (content/operators/default-exit-ports/contents+en.lrquestion.description)
+msgid ""
+"[1]: "
+"https://gitlab.torproject.org/tpo/core/tor/-/blob/release-0.4.6/src/core/or/policies.c#L85"
+msgstr ""
+
+#: https//support.torproject.org/operators/default-exit-ports/
+#: (content/operators/default-exit-ports/contents+en.lrquestion.description)
+msgid ""
+"[2]: "
+"https://gitlab.torproject.org/tpo/core/tor/-/blob/release-0.4.6/src/core/or/policies.c#L1901"
+msgstr ""
+
+#: https//support.torproject.org/operators/default-exit-ports/
+#: (content/operators/default-exit-ports/contents+en.lrquestion.description)
+msgid "[3]: https://gitlab.torproject.org/tpo/core/tor/-/tree/release-0.4.6/"
+msgstr ""
+
#: https//support.torproject.org/operators/dynamic-ip/
#: (content/operators/dynamic-ip/contents+en.lrquestion.title)
msgid "Can I run a Tor relay using a dynamic IP address?"
@@ -6765,21 +7684,6 @@ msgid ""
"into hibernation, signaled by this entry in the log:"
msgstr ""
-#: https//support.torproject.org/operators/hibernation/
-#: (content/operators/hibernation/contents+en.lrquestion.description)
-#: https//support.torproject.org/operators/limit-total-bandwidth/
-#: (content/operators/limit-total-bandwidth/contents+en.lrquestion.description)
-#: https//support.torproject.org/misc/bug-or-feedback/
-#: (content/misc/bug-or-feedback/contents+en.lrquestion.description)
-#: https//support.torproject.org/get-in-touch/why-i-cant-join-tor-channels/
-#: (content/get-in-touch/why-i-cant-join-tor-channels/contents+en.lrquestion.description)
-#: https//support.torproject.org/apt/tor-deb-repo/
-#: (content/apt/apt-1/contents+en.lrquestion.description)
-#: https//support.torproject.org/apt/apt-over-tor/
-#: (content/apt/apt-3/contents+en.lrquestion.description)
-msgid "```"
-msgstr "```"
-
#: https//support.torproject.org/operators/hibernation/
#: (content/operators/hibernation/contents+en.lrquestion.description)
msgid "Bandwidth soft limit reached; commencing hibernation."
@@ -9017,6 +9921,131 @@ msgstr ""
msgid "sub 4096R/C00942E4 2017-03-13"
msgstr ""
+#: https//support.torproject.org/misc/check-socks-dns-leaks/
+#: (content/misc/check-socks-dns-leaks/contents+en.lrquestion.title)
+msgid ""
+"How do I check if my application that uses SOCKS is leaking DNS requests?"
+msgstr ""
+
+#: https//support.torproject.org/misc/check-socks-dns-leaks/
+#: (content/misc/check-socks-dns-leaks/contents+en.lrquestion.description)
+msgid ""
+"Even if your application is using the correct variant of the SOCKS protocol,"
+" there is still a risk that it could be leaking DNS queries."
+msgstr ""
+
+#: https//support.torproject.org/misc/check-socks-dns-leaks/
+#: (content/misc/check-socks-dns-leaks/contents+en.lrquestion.description)
+msgid ""
+"This problem happens in Firefox extensions that resolve the destination "
+"hostname themselves, for example to show you its IP address, what country "
+"it's in, etc."
+msgstr ""
+
+#: https//support.torproject.org/misc/check-socks-dns-leaks/
+#: (content/misc/check-socks-dns-leaks/contents+en.lrquestion.description)
+msgid ""
+"If you suspect your application might behave like this, follow the "
+"instructions below to check."
+msgstr ""
+
+#: https//support.torproject.org/misc/check-socks-dns-leaks/
+#: (content/misc/check-socks-dns-leaks/contents+en.lrquestion.description)
+msgid ""
+"1. Add `TestSocks 1` to your [torrc file](https://support.torproject.org/tbb"
+"/tbb-editing-torrc/)."
+msgstr ""
+
+#: https//support.torproject.org/misc/check-socks-dns-leaks/
+#: (content/misc/check-socks-dns-leaks/contents+en.lrquestion.description)
+msgid ""
+"1. Start Tor, and point your program's SOCKS proxy settings to Tor's SOCKS5 "
+"server (`socks5://127.0.0.1:9050` by default)."
+msgstr ""
+
+#: https//support.torproject.org/misc/check-socks-dns-leaks/
+#: (content/misc/check-socks-dns-leaks/contents+en.lrquestion.description)
+msgid ""
+"1. Watch your logs as you use your application. For each socks connection, "
+"Tor will log a `notice` for safe connections, and a `warn` for connections "
+"leaking DNS requests."
+msgstr ""
+
+#: https//support.torproject.org/misc/check-socks-dns-leaks/
+#: (content/misc/check-socks-dns-leaks/contents+en.lrquestion.description)
+msgid ""
+"If you want to automatically disable all connections leaking DNS requests, "
+"set `SafeSocks 1` in your torrc file."
+msgstr ""
+
+#: https//support.torproject.org/misc/hide-exits/
+#: (content/misc/hide-exits/contents+en.lrquestion.title)
+msgid ""
+"You should hide the list of Tor relays, so people can't block the exits."
+msgstr ""
+
+#: https//support.torproject.org/misc/hide-exits/
+#: (content/misc/hide-exits/contents+en.lrquestion.description)
+msgid "There are a few reasons we don't:"
+msgstr ""
+
+#: https//support.torproject.org/misc/hide-exits/
+#: (content/misc/hide-exits/contents+en.lrquestion.description)
+msgid ""
+"1. We can't help but make the information available, since Tor clients need "
+"to use it to pick their paths."
+msgstr ""
+
+#: https//support.torproject.org/misc/hide-exits/
+#: (content/misc/hide-exits/contents+en.lrquestion.description)
+msgid "So if the \"blockers\" want it, they can get it anyway."
+msgstr ""
+
+#: https//support.torproject.org/misc/hide-exits/
+#: (content/misc/hide-exits/contents+en.lrquestion.description)
+msgid ""
+"Further, even if we didn't tell clients about the list of relays directly, "
+"somebody could still make a lot of connections through Tor to a test site "
+"and build a list of the addresses they see."
+msgstr ""
+
+#: https//support.torproject.org/misc/hide-exits/
+#: (content/misc/hide-exits/contents+en.lrquestion.description)
+msgid ""
+"1. If people want to block us, we believe that they should be allowed to do "
+"so."
+msgstr ""
+
+#: https//support.torproject.org/misc/hide-exits/
+#: (content/misc/hide-exits/contents+en.lrquestion.description)
+msgid ""
+"Obviously, we would prefer for everybody to allow Tor users to connect to "
+"them, but people have the right to decide who their services should allow "
+"connections from, and if they want to block anonymous users, they can."
+msgstr ""
+
+#: https//support.torproject.org/misc/hide-exits/
+#: (content/misc/hide-exits/contents+en.lrquestion.description)
+msgid ""
+"1. Being blockable also has tactical advantages: it may be a persuasive "
+"response to website maintainers who feel threatened by Tor."
+msgstr ""
+
+#: https//support.torproject.org/misc/hide-exits/
+#: (content/misc/hide-exits/contents+en.lrquestion.description)
+msgid ""
+"Giving them the option may inspire them to stop and think about whether they"
+" really want to eliminate private access to their system, and if not, what "
+"other options they might have."
+msgstr ""
+
+#: https//support.torproject.org/misc/hide-exits/
+#: (content/misc/hide-exits/contents+en.lrquestion.description)
+msgid ""
+"The time they might otherwise have spent blocking Tor, they may instead "
+"spend rethinking their overall approach to privacy and anonymity."
+msgstr ""
+
#: https//support.torproject.org/misc/menu/
#: (content/misc/menu/contents+en.lrquestion.description)
msgid "About"
@@ -9601,56 +10630,20 @@ msgstr ""
#: https//support.torproject.org/get-in-touch/why-i-cant-join-tor-channels/
#: (content/get-in-touch/why-i-cant-join-tor-channels/contents+en.lrquestion.description)
msgid ""
-"Then, to complete the registration and ultimately gain access to the #tor-"
-"project channel, your nickname must be **verified**."
-msgstr ""
-
-#: https//support.torproject.org/get-in-touch/why-i-cant-join-tor-channels/
-#: (content/get-in-touch/why-i-cant-join-tor-channels/contents+en.lrquestion.description)
-msgid ""
-"1. To verify your nick, open a new browser window and go to "
-"https://webchat.oftc.net/?channels=tor."
-msgstr ""
-
-#: https//support.torproject.org/get-in-touch/why-i-cant-join-tor-channels/
-#: (content/get-in-touch/why-i-cant-join-tor-channels/contents+en.lrquestion.description)
-msgid "2. Log in with your IRC nickname and password."
-msgstr ""
-
-#: https//support.torproject.org/get-in-touch/why-i-cant-join-tor-channels/
-#: (content/get-in-touch/why-i-cant-join-tor-channels/contents+en.lrquestion.description)
-msgid ""
-"3. Look for the word **verify** and log in there. It may appear that nothing"
-" has happened. Look at the top of the page, and there will be a column "
-"called **Account**."
-msgstr ""
-
-#: https//support.torproject.org/get-in-touch/why-i-cant-join-tor-channels/
-#: (content/get-in-touch/why-i-cant-join-tor-channels/contents+en.lrquestion.description)
-msgid "4. Click on **Account**."
-msgstr ""
-
-#: https//support.torproject.org/get-in-touch/why-i-cant-join-tor-channels/
-#: (content/get-in-touch/why-i-cant-join-tor-channels/contents+en.lrquestion.description)
-msgid ""
-"5. Click on the small sentence at the bottom of the square that says: Verify"
-" account."
-msgstr ""
-
-#: https//support.torproject.org/get-in-touch/why-i-cant-join-tor-channels/
-#: (content/get-in-touch/why-i-cant-join-tor-channels/contents+en.lrquestion.description)
-msgid "6. Fill out the Captcha that pops up, and click ok."
+"After registering your nickname, to gain access to the #tor-project and "
+"other protected channels, your nickname must be **verified**."
msgstr ""
#: https//support.torproject.org/get-in-touch/why-i-cant-join-tor-channels/
#: (content/get-in-touch/why-i-cant-join-tor-channels/contents+en.lrquestion.description)
msgid ""
-"7. A tiny message will appear: \"Your NickServ account has been verified.\""
+"1. Go to https://services.oftc.net/ and follow the steps in the '*To verify "
+"your account*' section"
msgstr ""
#: https//support.torproject.org/get-in-touch/why-i-cant-join-tor-channels/
#: (content/get-in-touch/why-i-cant-join-tor-channels/contents+en.lrquestion.description)
-msgid "8. Go back to the IRC webpage where you are logged in and type:"
+msgid "2. Go back to the IRC webpage where you are logged in and type:"
msgstr ""
#: https//support.torproject.org/get-in-touch/why-i-cant-join-tor-channels/
@@ -9660,12 +10653,12 @@ msgstr ""
#: https//support.torproject.org/get-in-touch/why-i-cant-join-tor-channels/
#: (content/get-in-touch/why-i-cant-join-tor-channels/contents+en.lrquestion.description)
-msgid "9. Click ENTER."
+msgid "3. Click ENTER."
msgstr ""
#: https//support.torproject.org/get-in-touch/why-i-cant-join-tor-channels/
#: (content/get-in-touch/why-i-cant-join-tor-channels/contents+en.lrquestion.description)
-msgid "10. If all is well, you will receive a message that says:"
+msgid "4. If all is well, you will receive a message that says:"
msgstr ""
#: https//support.torproject.org/get-in-touch/why-i-cant-join-tor-channels/
@@ -9806,18 +10799,22 @@ msgstr ""
#: https//support.torproject.org/apt/tor-deb-repo/
#: (content/apt/apt-1/contents+en.lrquestion.description)
msgid ""
-"#### 2. Add the following entries to `/etc/apt/sources.list` or a new file "
-"in `/etc/apt/sources.list.d/`"
+"#### 2. Create a new file in `/etc/apt/sources.list.d/` named `tor.list`. "
+"Add the following entries:"
msgstr ""
#: https//support.torproject.org/apt/tor-deb-repo/
#: (content/apt/apt-1/contents+en.lrquestion.description)
-msgid "deb https://deb.torproject.org/torproject.org <DISTRIBUTION> main"
+msgid ""
+"deb [signed-by=/usr/share/keyrings/tor-archive-keyring.gpg] "
+"https://deb.torproject.org/torproject.org <DISTRIBUTION> main"
msgstr ""
#: https//support.torproject.org/apt/tor-deb-repo/
#: (content/apt/apt-1/contents+en.lrquestion.description)
-msgid "deb-src https://deb.torproject.org/torproject.org <DISTRIBUTION> main"
+msgid ""
+"deb-src [signed-by=/usr/share/keyrings/tor-archive-keyring.gpg] "
+"https://deb.torproject.org/torproject.org <DISTRIBUTION> main"
msgstr ""
#: https//support.torproject.org/apt/tor-deb-repo/
@@ -9831,14 +10828,16 @@ msgstr ""
#: https//support.torproject.org/apt/tor-deb-repo/
#: (content/apt/apt-1/contents+en.lrquestion.description)
msgid ""
-"deb https://deb.torproject.org/torproject.org tor-"
+"deb [signed-by=/usr/share/keyrings/tor-archive-keyring.gpg] "
+"https://deb.torproject.org/torproject.org tor-"
"experimental-0.4.6.x-<DISTRIBUTION> main"
msgstr ""
#: https//support.torproject.org/apt/tor-deb-repo/
#: (content/apt/apt-1/contents+en.lrquestion.description)
msgid ""
-"deb-src https://deb.torproject.org/torproject.org tor-"
+"deb-src [signed-by=/usr/share/keyrings/tor-archive-keyring.gpg] "
+"https://deb.torproject.org/torproject.org tor-"
"experimental-0.4.6.x-<DISTRIBUTION> main"
msgstr ""
@@ -9850,15 +10849,17 @@ msgstr ""
#: https//support.torproject.org/apt/tor-deb-repo/
#: (content/apt/apt-1/contents+en.lrquestion.description)
msgid ""
-"deb https://deb.torproject.org/torproject.org tor-nightly-"
-"master-<DISTRIBUTION> main"
+"deb [signed-by=/usr/share/keyrings/tor-archive-keyring.gpg] "
+"https://deb.torproject.org/torproject.org tor-nightly-master-<DISTRIBUTION> "
+"main"
msgstr ""
#: https//support.torproject.org/apt/tor-deb-repo/
#: (content/apt/apt-1/contents+en.lrquestion.description)
msgid ""
-"deb-src https://deb.torproject.org/torproject.org tor-nightly-"
-"master-<DISTRIBUTION> main"
+"deb-src [signed-by=/usr/share/keyrings/tor-archive-keyring.gpg] "
+"https://deb.torproject.org/torproject.org tor-nightly-master-<DISTRIBUTION> "
+"main"
msgstr ""
#: https//support.torproject.org/apt/tor-deb-repo/
@@ -9879,13 +10880,15 @@ msgstr ""
#: https//support.torproject.org/apt/tor-deb-repo/
#: (content/apt/apt-1/contents+en.lrquestion.description)
msgid ""
-"deb [arch=amd64] https://deb.torproject.org/torproject.org focal main"
+"deb [arch=amd64 signed-by=/usr/share/keyrings/tor-archive-keyring.gpg] "
+"https://deb.torproject.org/torproject.org focal main"
msgstr ""
#: https//support.torproject.org/apt/tor-deb-repo/
#: (content/apt/apt-1/contents+en.lrquestion.description)
msgid ""
-"deb-src [arch=amd64] https://deb.torproject.org/torproject.org focal main"
+"deb-src [arch=amd64 signed-by=/usr/share/keyrings/tor-archive-keyring.gpg] "
+"https://deb.torproject.org/torproject.org focal main"
msgstr ""
#: https//support.torproject.org/apt/tor-deb-repo/
@@ -9905,21 +10908,16 @@ msgstr ""
#: (content/apt/apt-1/contents+en.lrquestion.description)
msgid ""
"#### 3. Then add the gpg key used to sign the packages by running the "
-"following commands at your command prompt"
+"following command at your command prompt:"
msgstr ""
#: https//support.torproject.org/apt/tor-deb-repo/
#: (content/apt/apt-1/contents+en.lrquestion.description)
msgid ""
-"# wget -qO- "
+"# wget -O- "
"https://deb.torproject.org/torproject.org/A3C4F0F979CAA22CDBA8F512EE8CBC9E886DDD89.asc"
-" | gpg --import"
-msgstr ""
-
-#: https//support.torproject.org/apt/tor-deb-repo/
-#: (content/apt/apt-1/contents+en.lrquestion.description)
-msgid ""
-"# gpg --export A3C4F0F979CAA22CDBA8F512EE8CBC9E886DDD89 | apt-key add -"
+" | gpg --dearmor | tee /usr/share/keyrings/tor-archive-keyring.gpg "
+">/dev/null"
msgstr ""
#: https//support.torproject.org/apt/tor-deb-repo/
@@ -11526,6 +12524,82 @@ msgid ""
"doesn't change IP address over the day."
msgstr ""
+#: https//support.torproject.org/alternate-designs/block-websites/
+#: (content/alternate-designs/block-websites/contents+en.lrquestion.title)
+msgid "Exit policies should be able to block websites, not just IP addresses."
+msgstr ""
+
+#: https//support.torproject.org/alternate-designs/block-websites/
+#: (content/alternate-designs/block-websites/contents+en.lrquestion.description)
+msgid ""
+"It would be nice to let relay operators say things like `reject "
+"www.slashdot.org` in their exit policies, rather than requiring them to "
+"learn all the IP address space that could be covered by the site (and then "
+"also blocking other sites at those IP addresses)."
+msgstr ""
+
+#: https//support.torproject.org/alternate-designs/block-websites/
+#: (content/alternate-designs/block-websites/contents+en.lrquestion.description)
+msgid "There are two problems, though."
+msgstr ""
+
+#: https//support.torproject.org/alternate-designs/block-websites/
+#: (content/alternate-designs/block-websites/contents+en.lrquestion.description)
+msgid "First, users could still get around these blocks."
+msgstr ""
+
+#: https//support.torproject.org/alternate-designs/block-websites/
+#: (content/alternate-designs/block-websites/contents+en.lrquestion.description)
+msgid ""
+"For example, they could request the IP address rather than the hostname when"
+" they exit from the Tor network."
+msgstr ""
+
+#: https//support.torproject.org/alternate-designs/block-websites/
+#: (content/alternate-designs/block-websites/contents+en.lrquestion.description)
+msgid ""
+"This means operators would still need to learn all the IP addresses for the "
+"destinations in question."
+msgstr ""
+
+#: https//support.torproject.org/alternate-designs/block-websites/
+#: (content/alternate-designs/block-websites/contents+en.lrquestion.description)
+msgid ""
+"The second problem is that it would allow remote attackers to censor "
+"arbitrary sites."
+msgstr ""
+
+#: https//support.torproject.org/alternate-designs/block-websites/
+#: (content/alternate-designs/block-websites/contents+en.lrquestion.description)
+msgid ""
+"For example, if a Tor operator blocks www1.slashdot.org, and then some "
+"attacker poisons the Tor relay's DNS or otherwise changes that hostname to "
+"resolve to the IP address for a major news site, then suddenly that Tor "
+"relay is blocking the news site."
+msgstr ""
+
+#: https//support.torproject.org/alternate-designs/let-the-network-pick-the-path/
+#: (content/alternate-designs/let-the-network-pick-the-path/contents+en.lrquestion.title)
+msgid "You should let the network pick the path, not the client."
+msgstr ""
+
+#: https//support.torproject.org/alternate-designs/let-the-network-pick-the-path/
+#: (content/alternate-designs/let-the-network-pick-the-path/contents+en.lrquestion.description)
+msgid "No, you cannot trust the network to pick the path."
+msgstr ""
+
+#: https//support.torproject.org/alternate-designs/let-the-network-pick-the-path/
+#: (content/alternate-designs/let-the-network-pick-the-path/contents+en.lrquestion.description)
+msgid "Malicious relays could route you through their colluding friends."
+msgstr ""
+
+#: https//support.torproject.org/alternate-designs/let-the-network-pick-the-path/
+#: (content/alternate-designs/let-the-network-pick-the-path/contents+en.lrquestion.description)
+msgid ""
+"This would give an adversary the ability to watch all of your traffic end to"
+" end."
+msgstr ""
+
#: lego/templates/banner.html:3 lego/templates/banner.html:5
#: templates/banner.html:3 templates/banner.html:5
msgid "Close banner"
@@ -11556,8 +12630,8 @@ msgid "DONATE NOW"
msgstr "PAAUKOKITE DABAR"
#: lego/templates/footer.html:13 lego/templates/footer.html:22
-#: lego/templates/navbar.html:83 templates/footer.html:13
-#: templates/footer.html:22 templates/navbar.html:83
+#: lego/templates/navbar.html:95 templates/footer.html:13
+#: templates/footer.html:22 templates/navbar.html:95
msgid "Download Tor Browser"
msgstr "Parsisiųsti Tor NarÅ¡yklÄ"
diff --git a/contents+mk.po b/contents+mk.po
index 05ae0cce99..7095bf9a4f 100644
--- a/contents+mk.po
+++ b/contents+mk.po
@@ -11,7 +11,7 @@ msgid ""
msgstr ""
"Project-Id-Version: PACKAGE VERSION\n"
"Report-Msgid-Bugs-To: \n"
-"POT-Creation-Date: 2021-08-25 11:14+CET\n"
+"POT-Creation-Date: 2021-09-01 12:20+CET\n"
"PO-Revision-Date: 2018-10-02 22:41+0000\n"
"Last-Translator: Emma Peel, 2021\n"
"Language-Team: Macedonian (https://www.transifex.com/otf/teams/1519/mk/)\n"
@@ -144,6 +144,11 @@ msgstr ""
msgid "Tor Metrics"
msgstr ""
+#: https//support.torproject.org/alternate-designs/
+#: (content/alternate-designs/contents+en.lrtopic.title)
+msgid "Alternate Designs We Don't Do (Yet)"
+msgstr ""
+
#: https//support.torproject.org/glossary/add-on-extension-or-plugin/
#: (content/glossary/add-on-extension-or-plugin/contents+en.lrword.term)
msgid "add-on, extension, or plugin"
@@ -2031,6 +2036,61 @@ msgid ""
"wiki](https://trac.torproject.org/projects/tor/wiki/doc/TorPlusVPN)."
msgstr ""
+#: https//support.torproject.org/faq/relay-donations/
+#: (content/faq/relay-donations/contents+en.lrquestion.title)
+msgid "Can I donate for a relay rather than run my own?"
+msgstr ""
+
+#: https//support.torproject.org/faq/relay-donations/
+#: (content/faq/relay-donations/contents+en.lrquestion.description)
+msgid ""
+"Sure! We have a [list of organizations that run Tor "
+"relays](https://community.torproject.org/relay/community-resources/relay-"
+"associations/) that are happy to turn your donations into better speed and "
+"anonymity for the Tor network."
+msgstr ""
+
+#: https//support.torproject.org/faq/relay-donations/
+#: (content/faq/relay-donations/contents+en.lrquestion.description)
+msgid ""
+"These organizations are not the same as [The Tor Project, "
+"Inc](https://donate.torproject.org/), but we consider that a good thing."
+msgstr ""
+
+#: https//support.torproject.org/faq/relay-donations/
+#: (content/faq/relay-donations/contents+en.lrquestion.description)
+msgid "They're run by nice people who are part of the Tor community."
+msgstr ""
+
+#: https//support.torproject.org/faq/relay-donations/
+#: (content/faq/relay-donations/contents+en.lrquestion.description)
+msgid ""
+"Note that there can be a tradeoff here between anonymity and performance."
+msgstr ""
+
+#: https//support.torproject.org/faq/relay-donations/
+#: (content/faq/relay-donations/contents+en.lrquestion.description)
+msgid ""
+"The Tor network's anonymity comes in part from diversity, so if you are in a"
+" position to run your own relay, you will be improving Tor's anonymity more "
+"than by donating."
+msgstr ""
+
+#: https//support.torproject.org/faq/relay-donations/
+#: (content/faq/relay-donations/contents+en.lrquestion.description)
+msgid ""
+"At the same time though, economies of scale for bandwidth mean that "
+"combining many small donations into several larger relays is more efficient "
+"at improving network performance."
+msgstr ""
+
+#: https//support.torproject.org/faq/relay-donations/
+#: (content/faq/relay-donations/contents+en.lrquestion.description)
+msgid ""
+"Improving anonymity and improving performance are both worthwhile goals, so "
+"however you can help is great!"
+msgstr ""
+
#: https//support.torproject.org/faq/staying-anonymous/
#: (content/faq/staying-anonymous/contents+en.lrquestion.title)
msgid "Am I totally anonymous if I use Tor?"
@@ -2331,6 +2391,61 @@ msgid ""
" documenting all the issues](https://community.torproject.org/)."
msgstr ""
+#: https//support.torproject.org/about/attacks-on-onion-routing/
+#: (content/about/attacks-on-onion-routing/contents+en.lrquestion.title)
+msgid "What attacks remain against onion routing?"
+msgstr ""
+
+#: https//support.torproject.org/about/attacks-on-onion-routing/
+#: (content/about/attacks-on-onion-routing/contents+en.lrquestion.description)
+msgid ""
+"As mentioned above, it is possible for an observer who can view both you and"
+" either the destination website or your Tor exit node to correlate timings "
+"of your traffic as it enters the Tor network and also as it exits."
+msgstr ""
+
+#: https//support.torproject.org/about/attacks-on-onion-routing/
+#: (content/about/attacks-on-onion-routing/contents+en.lrquestion.description)
+msgid "Tor does not defend against such a threat model."
+msgstr ""
+
+#: https//support.torproject.org/about/attacks-on-onion-routing/
+#: (content/about/attacks-on-onion-routing/contents+en.lrquestion.description)
+msgid ""
+"In a more limited sense, note that if a censor or law enforcement agency has"
+" the ability to obtain specific observation of parts of the network, it is "
+"possible for them to verify a suspicion that you talk regularly to your "
+"friend by observing traffic at both ends and correlating the timing of only "
+"that traffic."
+msgstr ""
+
+#: https//support.torproject.org/about/attacks-on-onion-routing/
+#: (content/about/attacks-on-onion-routing/contents+en.lrquestion.description)
+msgid ""
+"Again, this is only useful to verify that parties already suspected of "
+"communicating with one another are doing so."
+msgstr ""
+
+#: https//support.torproject.org/about/attacks-on-onion-routing/
+#: (content/about/attacks-on-onion-routing/contents+en.lrquestion.description)
+msgid ""
+"In most countries, the suspicion required to obtain a warrant already "
+"carries more weight than timing correlation would provide."
+msgstr ""
+
+#: https//support.torproject.org/about/attacks-on-onion-routing/
+#: (content/about/attacks-on-onion-routing/contents+en.lrquestion.description)
+msgid ""
+"Furthermore, since Tor reuses circuits for multiple TCP connections, it is "
+"possible to associate non anonymous and anonymous traffic at a given exit "
+"node, so be careful about what applications you run concurrently over Tor."
+msgstr ""
+
+#: https//support.torproject.org/about/attacks-on-onion-routing/
+#: (content/about/attacks-on-onion-routing/contents+en.lrquestion.description)
+msgid "Perhaps even run separate Tor clients for these applications."
+msgstr ""
+
#: https//support.torproject.org/about/backdoor/
#: (content/about/backdoor/contents+en.lrquestion.title)
msgid "Is there a backdoor in Tor?"
@@ -2466,6 +2581,43 @@ msgid ""
"recommended](/tbb/tbb-9/)."
msgstr ""
+#: https//support.torproject.org/about/change-paths/
+#: (content/about/change-paths/contents+en.lrquestion.title)
+msgid "How often does Tor change its paths?"
+msgstr ""
+
+#: https//support.torproject.org/about/change-paths/
+#: (content/about/change-paths/contents+en.lrquestion.description)
+msgid ""
+"Tor will reuse the same circuit for new TCP streams for 10 minutes, as long "
+"as the circuit is working fine."
+msgstr ""
+
+#: https//support.torproject.org/about/change-paths/
+#: (content/about/change-paths/contents+en.lrquestion.description)
+msgid "(If the circuit fails, Tor will switch to a new circuit immediately.)"
+msgstr ""
+
+#: https//support.torproject.org/about/change-paths/
+#: (content/about/change-paths/contents+en.lrquestion.description)
+msgid ""
+"But note that a single TCP stream (e.g. a long IRC connection) will stay on "
+"the same circuit forever."
+msgstr ""
+
+#: https//support.torproject.org/about/change-paths/
+#: (content/about/change-paths/contents+en.lrquestion.description)
+msgid "We don't rotate individual streams from one circuit to the next."
+msgstr ""
+
+#: https//support.torproject.org/about/change-paths/
+#: (content/about/change-paths/contents+en.lrquestion.description)
+msgid ""
+"Otherwise, an adversary with a partial view of the network would be given "
+"many chances over time to link you to your destination, rather than just one"
+" chance."
+msgstr ""
+
#: https//support.torproject.org/about/distribute-tor/
#: (content/about/distribute-tor/contents+en.lrquestion.title)
msgid "Can I distribute Tor?"
@@ -2561,6 +2713,133 @@ msgid ""
"details."
msgstr ""
+#: https//support.torproject.org/about/entry-guards/
+#: (content/about/entry-guards/contents+en.lrquestion.title)
+msgid "What are Entry Guards?"
+msgstr ""
+
+#: https//support.torproject.org/about/entry-guards/
+#: (content/about/entry-guards/contents+en.lrquestion.description)
+msgid ""
+"Tor (like all current practical low-latency anonymity designs) fails when "
+"the attacker can see both ends of the communications channel."
+msgstr ""
+
+#: https//support.torproject.org/about/entry-guards/
+#: (content/about/entry-guards/contents+en.lrquestion.description)
+msgid ""
+"For example, suppose the attacker controls or watches the Tor relay you "
+"choose to enter the network, and also controls or watches the website you "
+"visit."
+msgstr ""
+
+#: https//support.torproject.org/about/entry-guards/
+#: (content/about/entry-guards/contents+en.lrquestion.description)
+msgid ""
+"In this case, the research community knows no practical low-latency design "
+"that can reliably stop the attacker from correlating volume and timing "
+"information on the two sides."
+msgstr ""
+
+#: https//support.torproject.org/about/entry-guards/
+#: (content/about/entry-guards/contents+en.lrquestion.description)
+msgid "So, what should we do?"
+msgstr ""
+
+#: https//support.torproject.org/about/entry-guards/
+#: (content/about/entry-guards/contents+en.lrquestion.description)
+msgid "Suppose the attacker controls, or can observe, C relays."
+msgstr ""
+
+#: https//support.torproject.org/about/entry-guards/
+#: (content/about/entry-guards/contents+en.lrquestion.description)
+msgid "Suppose there are N relays total."
+msgstr ""
+
+#: https//support.torproject.org/about/entry-guards/
+#: (content/about/entry-guards/contents+en.lrquestion.description)
+msgid ""
+"If you select new entry and exit relays each time you use the network, the "
+"attacker will be able to correlate all traffic you send with probability "
+"around (c/n)2."
+msgstr ""
+
+#: https//support.torproject.org/about/entry-guards/
+#: (content/about/entry-guards/contents+en.lrquestion.description)
+msgid ""
+"But profiling is, for most users, as bad as being traced all the time: they "
+"want to do something often without an attacker noticing, and the attacker "
+"noticing once is as bad as the attacker noticing more often."
+msgstr ""
+
+#: https//support.torproject.org/about/entry-guards/
+#: (content/about/entry-guards/contents+en.lrquestion.description)
+msgid ""
+"Thus, choosing many random entries and exits gives the user no chance of "
+"escaping profiling by this kind of attacker."
+msgstr ""
+
+#: https//support.torproject.org/about/entry-guards/
+#: (content/about/entry-guards/contents+en.lrquestion.description)
+msgid ""
+"The solution is \"entry guards\": each Tor client selects a few relays at "
+"random to use as entry points, and uses only those relays for their first "
+"hop."
+msgstr ""
+
+#: https//support.torproject.org/about/entry-guards/
+#: (content/about/entry-guards/contents+en.lrquestion.description)
+msgid ""
+"If those relays are not controlled or observed, the attacker can't win, "
+"ever, and the user is secure."
+msgstr ""
+
+#: https//support.torproject.org/about/entry-guards/
+#: (content/about/entry-guards/contents+en.lrquestion.description)
+msgid ""
+"If those relays are observed or controlled by the attacker, the attacker "
+"sees a larger fraction of the user's traffic - but still the user is no more"
+" profiled than before."
+msgstr ""
+
+#: https//support.torproject.org/about/entry-guards/
+#: (content/about/entry-guards/contents+en.lrquestion.description)
+msgid ""
+"Thus, the user has some chance (on the order of (n-c)/n) of avoiding "
+"profiling, whereas they had none before."
+msgstr ""
+
+#: https//support.torproject.org/about/entry-guards/
+#: (content/about/entry-guards/contents+en.lrquestion.description)
+msgid ""
+"You can read more at [An Analysis of the Degradation of Anonymous "
+"Protocols](http://freehaven.net/anonbib/#wright02), [Defending Anonymous "
+"Communication Against Passive Logging "
+"Attacks](http://freehaven.net/anonbib/#wright03), and especially [Locating "
+"Hidden Servers](http://freehaven.net/anonbib/#hs-attack06)."
+msgstr ""
+
+#: https//support.torproject.org/about/entry-guards/
+#: (content/about/entry-guards/contents+en.lrquestion.description)
+msgid ""
+"Restricting your entry nodes may also help against attackers who want to run"
+" a few Tor nodes and easily enumerate all of the Tor user IP addresses."
+msgstr ""
+
+#: https//support.torproject.org/about/entry-guards/
+#: (content/about/entry-guards/contents+en.lrquestion.description)
+msgid ""
+"(Even though they can't learn what destinations the users are talking to, "
+"they still might be able to do bad things with just a list of users.)"
+msgstr ""
+
+#: https//support.torproject.org/about/entry-guards/
+#: (content/about/entry-guards/contents+en.lrquestion.description)
+msgid ""
+"However, that feature won't really become useful until we move to a "
+"\"directory guard\" design as well."
+msgstr ""
+
#: https//support.torproject.org/about/how-is-tor-different-from-other-proxies/
#: (content/about/how-is-tor-different-from-other-proxies/contents+en.lrquestion.title)
msgid "How is Tor different from other proxies?"
@@ -2731,6 +3010,162 @@ msgid ""
" Tor and HTTPS interact."
msgstr ""
+#: https//support.torproject.org/about/key-management/
+#: (content/about/key-management/contents+en.lrquestion.title)
+msgid "Tell me about all the keys Tor uses"
+msgstr ""
+
+#: https//support.torproject.org/about/key-management/
+#: (content/about/key-management/contents+en.lrquestion.description)
+msgid ""
+"Tor uses a variety of different keys, with three goals in mind: 1) "
+"encryption to ensure privacy of data within the Tor network, 2) "
+"authentication so clients know they're talking to the relays they meant to "
+"talk to, and 3) signatures to make sure all clients know the same set of "
+"relays."
+msgstr ""
+
+#: https//support.torproject.org/about/key-management/
+#: (content/about/key-management/contents+en.lrquestion.description)
+msgid ""
+"**Encryption**: first, all connections in Tor use TLS link encryption, so "
+"observers can't look inside to see which circuit a given cell is intended "
+"for."
+msgstr ""
+
+#: https//support.torproject.org/about/key-management/
+#: (content/about/key-management/contents+en.lrquestion.description)
+msgid ""
+"Further, the Tor client establishes an ephemeral encryption key with each "
+"relay in the circuit; these extra layers of encryption mean that only the "
+"exit relay can read the cells."
+msgstr ""
+
+#: https//support.torproject.org/about/key-management/
+#: (content/about/key-management/contents+en.lrquestion.description)
+msgid ""
+"Both sides discard the circuit key when the circuit ends, so logging traffic"
+" and then breaking into the relay to discover the key won't work."
+msgstr ""
+
+#: https//support.torproject.org/about/key-management/
+#: (content/about/key-management/contents+en.lrquestion.description)
+msgid ""
+"**Authentication**: Every Tor relay has a public decryption key called the "
+"\"onion key\"."
+msgstr ""
+
+#: https//support.torproject.org/about/key-management/
+#: (content/about/key-management/contents+en.lrquestion.description)
+msgid "Each relay rotates its onion key once a week."
+msgstr ""
+
+#: https//support.torproject.org/about/key-management/
+#: (content/about/key-management/contents+en.lrquestion.description)
+msgid ""
+"When the Tor client establishes circuits, at each step it [demands that the "
+"Tor relay prove knowledge of its onion key](https://svn-"
+"archive.torproject.org/svn/projects/design-paper/tor-"
+"design.html#subsec:circuits)."
+msgstr ""
+
+#: https//support.torproject.org/about/key-management/
+#: (content/about/key-management/contents+en.lrquestion.description)
+msgid ""
+"That way the first node in the path can't just spoof the rest of the path."
+msgstr ""
+
+#: https//support.torproject.org/about/key-management/
+#: (content/about/key-management/contents+en.lrquestion.description)
+msgid ""
+"Because the Tor client chooses the path, it can make sure to get Tor's "
+"\"distributed trust\" property: no single relay in the path can know about "
+"both the client and what the client is doing."
+msgstr ""
+
+#: https//support.torproject.org/about/key-management/
+#: (content/about/key-management/contents+en.lrquestion.description)
+msgid ""
+"**Coordination**: How do clients know what the relays are, and how do they "
+"know that they have the right keys for them?"
+msgstr ""
+
+#: https//support.torproject.org/about/key-management/
+#: (content/about/key-management/contents+en.lrquestion.description)
+msgid "Each relay has a long-term public signing key called the \"identity key\"."
+msgstr ""
+
+#: https//support.torproject.org/about/key-management/
+#: (content/about/key-management/contents+en.lrquestion.description)
+msgid "Each directory authority additionally has a \"directory signing key\"."
+msgstr ""
+
+#: https//support.torproject.org/about/key-management/
+#: (content/about/key-management/contents+en.lrquestion.description)
+msgid ""
+"The directory authorities [provide a signed "
+"list](https://gitweb.torproject.org/torspec.git/tree/dir-spec.txt) of all "
+"the known relays, and in that list are a set of certificates from each relay"
+" (self-signed by their identity key) specifying their keys, locations, exit "
+"policies, and so on."
+msgstr ""
+
+#: https//support.torproject.org/about/key-management/
+#: (content/about/key-management/contents+en.lrquestion.description)
+msgid ""
+"So unless the adversary can control a majority of the directory authorities "
+"(as of 2021 there are 10 directory authorities), they can't trick the Tor "
+"client into using other Tor relays."
+msgstr ""
+
+#: https//support.torproject.org/about/key-management/
+#: (content/about/key-management/contents+en.lrquestion.description)
+msgid "How do clients know what the directory authorities are?"
+msgstr ""
+
+#: https//support.torproject.org/about/key-management/
+#: (content/about/key-management/contents+en.lrquestion.description)
+msgid ""
+"The Tor software comes with a built-in list of location and public key for "
+"each directory authority."
+msgstr ""
+
+#: https//support.torproject.org/about/key-management/
+#: (content/about/key-management/contents+en.lrquestion.description)
+msgid ""
+"So the only way to trick users into using a fake Tor network is to give them"
+" a specially modified version of the software."
+msgstr ""
+
+#: https//support.torproject.org/about/key-management/
+#: (content/about/key-management/contents+en.lrquestion.description)
+msgid "How do users know they've got the right software?"
+msgstr ""
+
+#: https//support.torproject.org/about/key-management/
+#: (content/about/key-management/contents+en.lrquestion.description)
+msgid ""
+"When we distribute the source code or a package, we digitally sign it with "
+"[GNU Privacy Guard](http://www.gnupg.org/). See the [instructions on how to "
+"check Tor Browser's signature](https://support.torproject.org/tbb/how-to-"
+"verify-signature/)."
+msgstr ""
+
+#: https//support.torproject.org/about/key-management/
+#: (content/about/key-management/contents+en.lrquestion.description)
+msgid ""
+"In order to be certain that it's really signed by us, you need to have met "
+"us in person and gotten a copy of our GPG key fingerprint, or you need to "
+"know somebody who has."
+msgstr ""
+
+#: https//support.torproject.org/about/key-management/
+#: (content/about/key-management/contents+en.lrquestion.description)
+msgid ""
+"If you're concerned about an attack on this level, we recommend you get "
+"involved with the security community and start meeting people."
+msgstr ""
+
#: https//support.torproject.org/about/no-data-scrubbing/
#: (content/about/no-data-scrubbing/contents+en.lrquestion.title)
msgid ""
@@ -2763,6 +3198,151 @@ msgid ""
"though."
msgstr ""
+#: https//support.torproject.org/about/protections/
+#: (content/about/protections/contents+en.lrquestion.title)
+msgid "What protections does Tor provide?"
+msgstr ""
+
+#: https//support.torproject.org/about/protections/
+#: (content/about/protections/contents+en.lrquestion.description)
+msgid ""
+"Internet communication is based on a store-and-forward model that can be "
+"understood in analogy to postal mail: Data is transmitted in blocks called "
+"IP datagrams or packets."
+msgstr ""
+
+#: https//support.torproject.org/about/protections/
+#: (content/about/protections/contents+en.lrquestion.description)
+msgid ""
+"Every packet includes a source IP address (of the sender) and a destination "
+"IP address (of the receiver), just as ordinary letters contain postal "
+"addresses of sender and receiver."
+msgstr ""
+
+#: https//support.torproject.org/about/protections/
+#: (content/about/protections/contents+en.lrquestion.description)
+msgid ""
+"The way from sender to receiver involves multiple hops of routers, where "
+"each router inspects the destination IP address and forwards the packet "
+"closer to its destination."
+msgstr ""
+
+#: https//support.torproject.org/about/protections/
+#: (content/about/protections/contents+en.lrquestion.description)
+msgid ""
+"Thus, every router between sender and receiver learns that the sender is "
+"communicating with the receiver."
+msgstr ""
+
+#: https//support.torproject.org/about/protections/
+#: (content/about/protections/contents+en.lrquestion.description)
+msgid ""
+"In particular, your local ISP is in the position to build a complete profile"
+" of your Internet usage."
+msgstr ""
+
+#: https//support.torproject.org/about/protections/
+#: (content/about/protections/contents+en.lrquestion.description)
+msgid ""
+"In addition, every server in the Internet that can see any of the packets "
+"can profile your behavior."
+msgstr ""
+
+#: https//support.torproject.org/about/protections/
+#: (content/about/protections/contents+en.lrquestion.description)
+msgid ""
+"The aim of Tor is to improve your privacy by sending your traffic through a "
+"series of proxies."
+msgstr ""
+
+#: https//support.torproject.org/about/protections/
+#: (content/about/protections/contents+en.lrquestion.description)
+msgid ""
+"Your communication is encrypted in multiple layers and routed via multiple "
+"hops through the Tor network to the final receiver."
+msgstr ""
+
+#: https//support.torproject.org/about/protections/
+#: (content/about/protections/contents+en.lrquestion.description)
+msgid ""
+"More details on this process can be found in this "
+"[visualization](https://support.torproject.org/https/https-1/)."
+msgstr ""
+
+#: https//support.torproject.org/about/protections/
+#: (content/about/protections/contents+en.lrquestion.description)
+msgid ""
+"Note that all your local ISP can observe now is that you are communicating "
+"with Tor nodes."
+msgstr ""
+
+#: https//support.torproject.org/about/protections/
+#: (content/about/protections/contents+en.lrquestion.description)
+msgid ""
+"Similarly, servers in the Internet just see that they are being contacted by"
+" Tor nodes."
+msgstr ""
+
+#: https//support.torproject.org/about/protections/
+#: (content/about/protections/contents+en.lrquestion.description)
+msgid "Generally speaking, Tor aims to solve three privacy problems:"
+msgstr ""
+
+#: https//support.torproject.org/about/protections/
+#: (content/about/protections/contents+en.lrquestion.description)
+msgid ""
+"First, Tor prevents websites and other services from learning your location,"
+" which they can use to build databases about your habits and interests."
+msgstr ""
+
+#: https//support.torproject.org/about/protections/
+#: (content/about/protections/contents+en.lrquestion.description)
+msgid ""
+"With Tor, your Internet connections don't give you away by default -- now "
+"you can have the ability to choose, for each connection, how much "
+"information to reveal."
+msgstr ""
+
+#: https//support.torproject.org/about/protections/
+#: (content/about/protections/contents+en.lrquestion.description)
+msgid ""
+"Second, Tor prevents people watching your traffic locally (such as your ISP "
+"or someone with access to your home wifi or router) from learning what "
+"information you're fetching and where you're fetching it from."
+msgstr ""
+
+#: https//support.torproject.org/about/protections/
+#: (content/about/protections/contents+en.lrquestion.description)
+msgid ""
+"It also stops them from deciding what you're allowed to learn and publish --"
+" if you can get to any part of the Tor network, you can reach any site on "
+"the Internet."
+msgstr ""
+
+#: https//support.torproject.org/about/protections/
+#: (content/about/protections/contents+en.lrquestion.description)
+msgid ""
+"Third, Tor routes your connection through more than one Tor relay so no "
+"single relay can learn what you're up to."
+msgstr ""
+
+#: https//support.torproject.org/about/protections/
+#: (content/about/protections/contents+en.lrquestion.description)
+msgid ""
+"Because these relays are run by different individuals or organizations, "
+"distributing trust provides more security than the old [one hop "
+"proxy](https://support.torproject.org/about/#how-is-tor-different-from-"
+"other-proxies) approach."
+msgstr ""
+
+#: https//support.torproject.org/about/protections/
+#: (content/about/protections/contents+en.lrquestion.description)
+msgid ""
+"Note, however, that there are situations where Tor fails to solve these "
+"privacy problems entirely: see the entry below on [remaining "
+"attacks](https://support.torproject.org/about/#attacks-on-onion-routing)."
+msgstr ""
+
#: https//support.torproject.org/about/what-is-tor/
#: (content/about/what-is-tor/contents+en.lrquestion.title)
msgid "What is Tor?"
@@ -4934,9 +5514,11 @@ msgstr ""
#: (content/tbb/tbb-47/contents+en.lrquestion.description)
msgid ""
"Also, read up on the HTTPProxyAuthenticator and HTTPSProxyAuthenticator "
-"options if your proxy requires auth. We only support basic auth currently, "
-"but if you need NTLM authentication, you may find [this post in the "
-"archives](https://archives.seul.org/or/talk/Jun-2005/msg00223.html) useful."
+"options if your [proxy requires auth.](https://developer.mozilla.org/en-"
+"US/docs/Web/HTTP/Headers/Proxy-Authenticate) We only support basic auth "
+"currently, but if you need NTLM authentication, you may find [this post in "
+"the archives](https://archives.seul.org/or/talk/Jun-2005/msg00223.html) "
+"useful."
msgstr ""
#: https//support.torproject.org/tbb/tbb-47/
@@ -5153,6 +5735,219 @@ msgid ""
"have no effect on Tor's configuration."
msgstr ""
+#: https//support.torproject.org/tbb/tbb-firewall-ports/
+#: (content/tbb/tbb-firewall-ports/contents+en.lrquestion.title)
+msgid "My firewall only allows a few outgoing ports"
+msgstr ""
+
+#: https//support.torproject.org/tbb/tbb-firewall-ports/
+#: (content/tbb/tbb-firewall-ports/contents+en.lrquestion.description)
+msgid ""
+"If your firewall works by blocking ports, then you can tell Tor to only use "
+"the ports when you start your Tor Browser."
+msgstr ""
+
+#: https//support.torproject.org/tbb/tbb-firewall-ports/
+#: (content/tbb/tbb-firewall-ports/contents+en.lrquestion.description)
+msgid ""
+"Or you can add the ports that your firewall permits by adding "
+"\"FascistFirewall 1\" to your torrc configuration file."
+msgstr ""
+
+#: https//support.torproject.org/tbb/tbb-firewall-ports/
+#: (content/tbb/tbb-firewall-ports/contents+en.lrquestion.description)
+msgid ""
+"By default, when you set this Tor assumes that your firewall allows only "
+"port 80 and port 443 (HTTP and HTTPS respectively)."
+msgstr ""
+
+#: https//support.torproject.org/tbb/tbb-firewall-ports/
+#: (content/tbb/tbb-firewall-ports/contents+en.lrquestion.description)
+msgid ""
+"You can select a different set of ports with the FirewallPorts torrc option."
+msgstr ""
+
+#: https//support.torproject.org/tbb/tbb-firewall-ports/
+#: (content/tbb/tbb-firewall-ports/contents+en.lrquestion.description)
+msgid ""
+"If you want to be more fine-grained with your controls, you can also use the"
+" ReachableAddresses config options, e.g.:"
+msgstr ""
+
+#: https//support.torproject.org/tbb/tbb-firewall-ports/
+#: (content/tbb/tbb-firewall-ports/contents+en.lrquestion.description)
+#: https//support.torproject.org/tbb/tbb-install-tor-central-server/
+#: (content/tbb/tbb-install-tor-central-server/contents+en.lrquestion.description)
+#: https//support.torproject.org/operators/default-exit-ports/
+#: (content/operators/default-exit-ports/contents+en.lrquestion.description)
+#: https//support.torproject.org/operators/hibernation/
+#: (content/operators/hibernation/contents+en.lrquestion.description)
+#: https//support.torproject.org/operators/limit-total-bandwidth/
+#: (content/operators/limit-total-bandwidth/contents+en.lrquestion.description)
+#: https//support.torproject.org/misc/bug-or-feedback/
+#: (content/misc/bug-or-feedback/contents+en.lrquestion.description)
+#: https//support.torproject.org/get-in-touch/why-i-cant-join-tor-channels/
+#: (content/get-in-touch/why-i-cant-join-tor-channels/contents+en.lrquestion.description)
+#: https//support.torproject.org/apt/tor-deb-repo/
+#: (content/apt/apt-1/contents+en.lrquestion.description)
+#: https//support.torproject.org/apt/apt-over-tor/
+#: (content/apt/apt-3/contents+en.lrquestion.description)
+msgid "```"
+msgstr "```"
+
+#: https//support.torproject.org/tbb/tbb-firewall-ports/
+#: (content/tbb/tbb-firewall-ports/contents+en.lrquestion.description)
+msgid "ReachableDirAddresses *:80"
+msgstr ""
+
+#: https//support.torproject.org/tbb/tbb-firewall-ports/
+#: (content/tbb/tbb-firewall-ports/contents+en.lrquestion.description)
+msgid "ReachableORAddresses *:443"
+msgstr ""
+
+#: https//support.torproject.org/tbb/tbb-install-tor-central-server/
+#: (content/tbb/tbb-install-tor-central-server/contents+en.lrquestion.title)
+msgid ""
+"Can I install Tor on a central server, and have my clients connect to it?"
+msgstr ""
+
+#: https//support.torproject.org/tbb/tbb-install-tor-central-server/
+#: (content/tbb/tbb-install-tor-central-server/contents+en.lrquestion.description)
+msgid ""
+"Yes. Tor can be configured as a client or a relay on another machine, and "
+"allow other machines to be able to connect to it for anonymity."
+msgstr ""
+
+#: https//support.torproject.org/tbb/tbb-install-tor-central-server/
+#: (content/tbb/tbb-install-tor-central-server/contents+en.lrquestion.description)
+msgid ""
+"This is most useful in an environment where many computers want a gateway of"
+" anonymity to the rest of the world."
+msgstr ""
+
+#: https//support.torproject.org/tbb/tbb-install-tor-central-server/
+#: (content/tbb/tbb-install-tor-central-server/contents+en.lrquestion.description)
+msgid ""
+"However, be forewarned that with this configuration, anyone within your "
+"private network (existing between you and the Tor client/relay) can see what"
+" traffic you are sending in clear text."
+msgstr ""
+
+#: https//support.torproject.org/tbb/tbb-install-tor-central-server/
+#: (content/tbb/tbb-install-tor-central-server/contents+en.lrquestion.description)
+msgid "The anonymity doesn't start until you get to the Tor relay."
+msgstr ""
+
+#: https//support.torproject.org/tbb/tbb-install-tor-central-server/
+#: (content/tbb/tbb-install-tor-central-server/contents+en.lrquestion.description)
+msgid ""
+"Because of this, if you are the controller of your domain and you know "
+"everything's locked down, you will be OK, but this configuration may not be "
+"suitable for large private networks where security is key all around."
+msgstr ""
+
+#: https//support.torproject.org/tbb/tbb-install-tor-central-server/
+#: (content/tbb/tbb-install-tor-central-server/contents+en.lrquestion.description)
+msgid ""
+"Configuration is simple, editing your torrc file's SocksListenAddress "
+"according to the following examples:"
+msgstr ""
+
+#: https//support.torproject.org/tbb/tbb-install-tor-central-server/
+#: (content/tbb/tbb-install-tor-central-server/contents+en.lrquestion.description)
+msgid "SocksListenAddress 127.0.0.1"
+msgstr ""
+
+#: https//support.torproject.org/tbb/tbb-install-tor-central-server/
+#: (content/tbb/tbb-install-tor-central-server/contents+en.lrquestion.description)
+msgid "SocksListenAddress 192.168.x.x:9100"
+msgstr ""
+
+#: https//support.torproject.org/tbb/tbb-install-tor-central-server/
+#: (content/tbb/tbb-install-tor-central-server/contents+en.lrquestion.description)
+msgid "SocksListenAddress 0.0.0.0:9100"
+msgstr ""
+
+#: https//support.torproject.org/tbb/tbb-install-tor-central-server/
+#: (content/tbb/tbb-install-tor-central-server/contents+en.lrquestion.description)
+msgid ""
+"You can state multiple listen addresses, in the case that you are part of "
+"several networks or subnets."
+msgstr ""
+
+#: https//support.torproject.org/tbb/tbb-install-tor-central-server/
+#: (content/tbb/tbb-install-tor-central-server/contents+en.lrquestion.description)
+msgid "SocksListenAddress 192.168.x.x:9100 #eth0"
+msgstr ""
+
+#: https//support.torproject.org/tbb/tbb-install-tor-central-server/
+#: (content/tbb/tbb-install-tor-central-server/contents+en.lrquestion.description)
+msgid "SocksListenAddress 10.x.x.x:9100 #eth1"
+msgstr ""
+
+#: https//support.torproject.org/tbb/tbb-install-tor-central-server/
+#: (content/tbb/tbb-install-tor-central-server/contents+en.lrquestion.description)
+msgid ""
+"After this, your clients on their respective networks/subnets would specify "
+"a socks proxy with the address and port you specified SocksListenAddress to "
+"be."
+msgstr ""
+
+#: https//support.torproject.org/tbb/tbb-install-tor-central-server/
+#: (content/tbb/tbb-install-tor-central-server/contents+en.lrquestion.description)
+msgid ""
+"Please note that the SocksPort configuration option gives the port ONLY for "
+"localhost (127.0.0.1)."
+msgstr ""
+
+#: https//support.torproject.org/tbb/tbb-install-tor-central-server/
+#: (content/tbb/tbb-install-tor-central-server/contents+en.lrquestion.description)
+msgid ""
+"When setting up your SocksListenAddress(es), you need to give the port with "
+"the address, as shown above."
+msgstr ""
+
+#: https//support.torproject.org/tbb/tbb-install-tor-central-server/
+#: (content/tbb/tbb-install-tor-central-server/contents+en.lrquestion.description)
+msgid ""
+"If you are interested in forcing all outgoing data through the central Tor "
+"client/relay, instead of the server only being an optional proxy, you may "
+"find the program iptables (for *nix) useful."
+msgstr ""
+
+#: https//support.torproject.org/tbb/tbb-run-client-different-computer/
+#: (content/tbb/tbb-run-client-different-computer/contents+en.lrquestion.title)
+msgid ""
+"I want to run my Tor client on a different computer than my applications"
+msgstr ""
+
+#: https//support.torproject.org/tbb/tbb-run-client-different-computer/
+#: (content/tbb/tbb-run-client-different-computer/contents+en.lrquestion.description)
+msgid ""
+"By default, your Tor client only listens for applications that connect from "
+"localhost."
+msgstr ""
+
+#: https//support.torproject.org/tbb/tbb-run-client-different-computer/
+#: (content/tbb/tbb-run-client-different-computer/contents+en.lrquestion.description)
+msgid "Connections from other computers are refused."
+msgstr ""
+
+#: https//support.torproject.org/tbb/tbb-run-client-different-computer/
+#: (content/tbb/tbb-run-client-different-computer/contents+en.lrquestion.description)
+msgid ""
+"If you want to torify applications on different computers than the Tor "
+"client, you should edit your torrc to define `SocksListenAddress 0.0.0.0` "
+"and then restart (or hup) Tor."
+msgstr ""
+
+#: https//support.torproject.org/tbb/tbb-run-client-different-computer/
+#: (content/tbb/tbb-run-client-different-computer/contents+en.lrquestion.description)
+msgid ""
+"If you want to get more advanced, you can configure your Tor client on a "
+"firewall to bind to your internal IP but not your external IP."
+msgstr ""
+
#: https//support.torproject.org/tbb/website-blocking-tor/
#: (content/tbb/website-blocking-tor/contents+en.lrquestion.title)
msgid "A website I am trying to reach is blocking access over Tor."
@@ -6587,6 +7382,130 @@ msgid ""
"guide."
msgstr ""
+#: https//support.torproject.org/operators/default-exit-ports/
+#: (content/operators/default-exit-ports/contents+en.lrquestion.title)
+msgid "Is there a list of default exit ports?"
+msgstr ""
+
+#: https//support.torproject.org/operators/default-exit-ports/
+#: (content/operators/default-exit-ports/contents+en.lrquestion.description)
+msgid ""
+"The default open ports are listed below but keep in mind that, any port or "
+"ports can be opened by the relay operator by configuring it in torrc or "
+"modifying the source code."
+msgstr ""
+
+#: https//support.torproject.org/operators/default-exit-ports/
+#: (content/operators/default-exit-ports/contents+en.lrquestion.description)
+msgid ""
+"The default according to src/or/policies.c ([line 85][1] and [line 1901][2])"
+" from the source code release [release-0.4.6][3]:"
+msgstr ""
+
+#: https//support.torproject.org/operators/default-exit-ports/
+#: (content/operators/default-exit-ports/contents+en.lrquestion.description)
+msgid "reject 0.0.0.0/8"
+msgstr ""
+
+#: https//support.torproject.org/operators/default-exit-ports/
+#: (content/operators/default-exit-ports/contents+en.lrquestion.description)
+msgid "reject 169.254.0.0/16"
+msgstr ""
+
+#: https//support.torproject.org/operators/default-exit-ports/
+#: (content/operators/default-exit-ports/contents+en.lrquestion.description)
+msgid "reject 127.0.0.0/8"
+msgstr ""
+
+#: https//support.torproject.org/operators/default-exit-ports/
+#: (content/operators/default-exit-ports/contents+en.lrquestion.description)
+msgid "reject 192.168.0.0/16"
+msgstr ""
+
+#: https//support.torproject.org/operators/default-exit-ports/
+#: (content/operators/default-exit-ports/contents+en.lrquestion.description)
+msgid "reject 10.0.0.0/8"
+msgstr ""
+
+#: https//support.torproject.org/operators/default-exit-ports/
+#: (content/operators/default-exit-ports/contents+en.lrquestion.description)
+msgid "reject 172.16.0.0/12"
+msgstr ""
+
+#: https//support.torproject.org/operators/default-exit-ports/
+#: (content/operators/default-exit-ports/contents+en.lrquestion.description)
+msgid "reject *:25"
+msgstr ""
+
+#: https//support.torproject.org/operators/default-exit-ports/
+#: (content/operators/default-exit-ports/contents+en.lrquestion.description)
+msgid "reject *:119"
+msgstr ""
+
+#: https//support.torproject.org/operators/default-exit-ports/
+#: (content/operators/default-exit-ports/contents+en.lrquestion.description)
+msgid "reject *:135-139"
+msgstr ""
+
+#: https//support.torproject.org/operators/default-exit-ports/
+#: (content/operators/default-exit-ports/contents+en.lrquestion.description)
+msgid "reject *:445"
+msgstr ""
+
+#: https//support.torproject.org/operators/default-exit-ports/
+#: (content/operators/default-exit-ports/contents+en.lrquestion.description)
+msgid "reject *:563"
+msgstr ""
+
+#: https//support.torproject.org/operators/default-exit-ports/
+#: (content/operators/default-exit-ports/contents+en.lrquestion.description)
+msgid "reject *:1214"
+msgstr ""
+
+#: https//support.torproject.org/operators/default-exit-ports/
+#: (content/operators/default-exit-ports/contents+en.lrquestion.description)
+msgid "reject *:4661-4666"
+msgstr ""
+
+#: https//support.torproject.org/operators/default-exit-ports/
+#: (content/operators/default-exit-ports/contents+en.lrquestion.description)
+msgid "reject *:6346-6429"
+msgstr ""
+
+#: https//support.torproject.org/operators/default-exit-ports/
+#: (content/operators/default-exit-ports/contents+en.lrquestion.description)
+msgid "reject *:6699"
+msgstr ""
+
+#: https//support.torproject.org/operators/default-exit-ports/
+#: (content/operators/default-exit-ports/contents+en.lrquestion.description)
+msgid "reject *:6881-6999"
+msgstr ""
+
+#: https//support.torproject.org/operators/default-exit-ports/
+#: (content/operators/default-exit-ports/contents+en.lrquestion.description)
+msgid "accept *:*"
+msgstr ""
+
+#: https//support.torproject.org/operators/default-exit-ports/
+#: (content/operators/default-exit-ports/contents+en.lrquestion.description)
+msgid ""
+"[1]: "
+"https://gitlab.torproject.org/tpo/core/tor/-/blob/release-0.4.6/src/core/or/policies.c#L85"
+msgstr ""
+
+#: https//support.torproject.org/operators/default-exit-ports/
+#: (content/operators/default-exit-ports/contents+en.lrquestion.description)
+msgid ""
+"[2]: "
+"https://gitlab.torproject.org/tpo/core/tor/-/blob/release-0.4.6/src/core/or/policies.c#L1901"
+msgstr ""
+
+#: https//support.torproject.org/operators/default-exit-ports/
+#: (content/operators/default-exit-ports/contents+en.lrquestion.description)
+msgid "[3]: https://gitlab.torproject.org/tpo/core/tor/-/tree/release-0.4.6/"
+msgstr ""
+
#: https//support.torproject.org/operators/dynamic-ip/
#: (content/operators/dynamic-ip/contents+en.lrquestion.title)
msgid "Can I run a Tor relay using a dynamic IP address?"
@@ -6734,21 +7653,6 @@ msgid ""
"into hibernation, signaled by this entry in the log:"
msgstr ""
-#: https//support.torproject.org/operators/hibernation/
-#: (content/operators/hibernation/contents+en.lrquestion.description)
-#: https//support.torproject.org/operators/limit-total-bandwidth/
-#: (content/operators/limit-total-bandwidth/contents+en.lrquestion.description)
-#: https//support.torproject.org/misc/bug-or-feedback/
-#: (content/misc/bug-or-feedback/contents+en.lrquestion.description)
-#: https//support.torproject.org/get-in-touch/why-i-cant-join-tor-channels/
-#: (content/get-in-touch/why-i-cant-join-tor-channels/contents+en.lrquestion.description)
-#: https//support.torproject.org/apt/tor-deb-repo/
-#: (content/apt/apt-1/contents+en.lrquestion.description)
-#: https//support.torproject.org/apt/apt-over-tor/
-#: (content/apt/apt-3/contents+en.lrquestion.description)
-msgid "```"
-msgstr "```"
-
#: https//support.torproject.org/operators/hibernation/
#: (content/operators/hibernation/contents+en.lrquestion.description)
msgid "Bandwidth soft limit reached; commencing hibernation."
@@ -8986,6 +9890,131 @@ msgstr ""
msgid "sub 4096R/C00942E4 2017-03-13"
msgstr ""
+#: https//support.torproject.org/misc/check-socks-dns-leaks/
+#: (content/misc/check-socks-dns-leaks/contents+en.lrquestion.title)
+msgid ""
+"How do I check if my application that uses SOCKS is leaking DNS requests?"
+msgstr ""
+
+#: https//support.torproject.org/misc/check-socks-dns-leaks/
+#: (content/misc/check-socks-dns-leaks/contents+en.lrquestion.description)
+msgid ""
+"Even if your application is using the correct variant of the SOCKS protocol,"
+" there is still a risk that it could be leaking DNS queries."
+msgstr ""
+
+#: https//support.torproject.org/misc/check-socks-dns-leaks/
+#: (content/misc/check-socks-dns-leaks/contents+en.lrquestion.description)
+msgid ""
+"This problem happens in Firefox extensions that resolve the destination "
+"hostname themselves, for example to show you its IP address, what country "
+"it's in, etc."
+msgstr ""
+
+#: https//support.torproject.org/misc/check-socks-dns-leaks/
+#: (content/misc/check-socks-dns-leaks/contents+en.lrquestion.description)
+msgid ""
+"If you suspect your application might behave like this, follow the "
+"instructions below to check."
+msgstr ""
+
+#: https//support.torproject.org/misc/check-socks-dns-leaks/
+#: (content/misc/check-socks-dns-leaks/contents+en.lrquestion.description)
+msgid ""
+"1. Add `TestSocks 1` to your [torrc file](https://support.torproject.org/tbb"
+"/tbb-editing-torrc/)."
+msgstr ""
+
+#: https//support.torproject.org/misc/check-socks-dns-leaks/
+#: (content/misc/check-socks-dns-leaks/contents+en.lrquestion.description)
+msgid ""
+"1. Start Tor, and point your program's SOCKS proxy settings to Tor's SOCKS5 "
+"server (`socks5://127.0.0.1:9050` by default)."
+msgstr ""
+
+#: https//support.torproject.org/misc/check-socks-dns-leaks/
+#: (content/misc/check-socks-dns-leaks/contents+en.lrquestion.description)
+msgid ""
+"1. Watch your logs as you use your application. For each socks connection, "
+"Tor will log a `notice` for safe connections, and a `warn` for connections "
+"leaking DNS requests."
+msgstr ""
+
+#: https//support.torproject.org/misc/check-socks-dns-leaks/
+#: (content/misc/check-socks-dns-leaks/contents+en.lrquestion.description)
+msgid ""
+"If you want to automatically disable all connections leaking DNS requests, "
+"set `SafeSocks 1` in your torrc file."
+msgstr ""
+
+#: https//support.torproject.org/misc/hide-exits/
+#: (content/misc/hide-exits/contents+en.lrquestion.title)
+msgid ""
+"You should hide the list of Tor relays, so people can't block the exits."
+msgstr ""
+
+#: https//support.torproject.org/misc/hide-exits/
+#: (content/misc/hide-exits/contents+en.lrquestion.description)
+msgid "There are a few reasons we don't:"
+msgstr ""
+
+#: https//support.torproject.org/misc/hide-exits/
+#: (content/misc/hide-exits/contents+en.lrquestion.description)
+msgid ""
+"1. We can't help but make the information available, since Tor clients need "
+"to use it to pick their paths."
+msgstr ""
+
+#: https//support.torproject.org/misc/hide-exits/
+#: (content/misc/hide-exits/contents+en.lrquestion.description)
+msgid "So if the \"blockers\" want it, they can get it anyway."
+msgstr ""
+
+#: https//support.torproject.org/misc/hide-exits/
+#: (content/misc/hide-exits/contents+en.lrquestion.description)
+msgid ""
+"Further, even if we didn't tell clients about the list of relays directly, "
+"somebody could still make a lot of connections through Tor to a test site "
+"and build a list of the addresses they see."
+msgstr ""
+
+#: https//support.torproject.org/misc/hide-exits/
+#: (content/misc/hide-exits/contents+en.lrquestion.description)
+msgid ""
+"1. If people want to block us, we believe that they should be allowed to do "
+"so."
+msgstr ""
+
+#: https//support.torproject.org/misc/hide-exits/
+#: (content/misc/hide-exits/contents+en.lrquestion.description)
+msgid ""
+"Obviously, we would prefer for everybody to allow Tor users to connect to "
+"them, but people have the right to decide who their services should allow "
+"connections from, and if they want to block anonymous users, they can."
+msgstr ""
+
+#: https//support.torproject.org/misc/hide-exits/
+#: (content/misc/hide-exits/contents+en.lrquestion.description)
+msgid ""
+"1. Being blockable also has tactical advantages: it may be a persuasive "
+"response to website maintainers who feel threatened by Tor."
+msgstr ""
+
+#: https//support.torproject.org/misc/hide-exits/
+#: (content/misc/hide-exits/contents+en.lrquestion.description)
+msgid ""
+"Giving them the option may inspire them to stop and think about whether they"
+" really want to eliminate private access to their system, and if not, what "
+"other options they might have."
+msgstr ""
+
+#: https//support.torproject.org/misc/hide-exits/
+#: (content/misc/hide-exits/contents+en.lrquestion.description)
+msgid ""
+"The time they might otherwise have spent blocking Tor, they may instead "
+"spend rethinking their overall approach to privacy and anonymity."
+msgstr ""
+
#: https//support.torproject.org/misc/menu/
#: (content/misc/menu/contents+en.lrquestion.description)
msgid "About"
@@ -9570,56 +10599,20 @@ msgstr ""
#: https//support.torproject.org/get-in-touch/why-i-cant-join-tor-channels/
#: (content/get-in-touch/why-i-cant-join-tor-channels/contents+en.lrquestion.description)
msgid ""
-"Then, to complete the registration and ultimately gain access to the #tor-"
-"project channel, your nickname must be **verified**."
-msgstr ""
-
-#: https//support.torproject.org/get-in-touch/why-i-cant-join-tor-channels/
-#: (content/get-in-touch/why-i-cant-join-tor-channels/contents+en.lrquestion.description)
-msgid ""
-"1. To verify your nick, open a new browser window and go to "
-"https://webchat.oftc.net/?channels=tor."
-msgstr ""
-
-#: https//support.torproject.org/get-in-touch/why-i-cant-join-tor-channels/
-#: (content/get-in-touch/why-i-cant-join-tor-channels/contents+en.lrquestion.description)
-msgid "2. Log in with your IRC nickname and password."
-msgstr ""
-
-#: https//support.torproject.org/get-in-touch/why-i-cant-join-tor-channels/
-#: (content/get-in-touch/why-i-cant-join-tor-channels/contents+en.lrquestion.description)
-msgid ""
-"3. Look for the word **verify** and log in there. It may appear that nothing"
-" has happened. Look at the top of the page, and there will be a column "
-"called **Account**."
-msgstr ""
-
-#: https//support.torproject.org/get-in-touch/why-i-cant-join-tor-channels/
-#: (content/get-in-touch/why-i-cant-join-tor-channels/contents+en.lrquestion.description)
-msgid "4. Click on **Account**."
-msgstr ""
-
-#: https//support.torproject.org/get-in-touch/why-i-cant-join-tor-channels/
-#: (content/get-in-touch/why-i-cant-join-tor-channels/contents+en.lrquestion.description)
-msgid ""
-"5. Click on the small sentence at the bottom of the square that says: Verify"
-" account."
-msgstr ""
-
-#: https//support.torproject.org/get-in-touch/why-i-cant-join-tor-channels/
-#: (content/get-in-touch/why-i-cant-join-tor-channels/contents+en.lrquestion.description)
-msgid "6. Fill out the Captcha that pops up, and click ok."
+"After registering your nickname, to gain access to the #tor-project and "
+"other protected channels, your nickname must be **verified**."
msgstr ""
#: https//support.torproject.org/get-in-touch/why-i-cant-join-tor-channels/
#: (content/get-in-touch/why-i-cant-join-tor-channels/contents+en.lrquestion.description)
msgid ""
-"7. A tiny message will appear: \"Your NickServ account has been verified.\""
+"1. Go to https://services.oftc.net/ and follow the steps in the '*To verify "
+"your account*' section"
msgstr ""
#: https//support.torproject.org/get-in-touch/why-i-cant-join-tor-channels/
#: (content/get-in-touch/why-i-cant-join-tor-channels/contents+en.lrquestion.description)
-msgid "8. Go back to the IRC webpage where you are logged in and type:"
+msgid "2. Go back to the IRC webpage where you are logged in and type:"
msgstr ""
#: https//support.torproject.org/get-in-touch/why-i-cant-join-tor-channels/
@@ -9629,12 +10622,12 @@ msgstr ""
#: https//support.torproject.org/get-in-touch/why-i-cant-join-tor-channels/
#: (content/get-in-touch/why-i-cant-join-tor-channels/contents+en.lrquestion.description)
-msgid "9. Click ENTER."
+msgid "3. Click ENTER."
msgstr ""
#: https//support.torproject.org/get-in-touch/why-i-cant-join-tor-channels/
#: (content/get-in-touch/why-i-cant-join-tor-channels/contents+en.lrquestion.description)
-msgid "10. If all is well, you will receive a message that says:"
+msgid "4. If all is well, you will receive a message that says:"
msgstr ""
#: https//support.torproject.org/get-in-touch/why-i-cant-join-tor-channels/
@@ -9775,18 +10768,22 @@ msgstr "# apt install apt-transport-https"
#: https//support.torproject.org/apt/tor-deb-repo/
#: (content/apt/apt-1/contents+en.lrquestion.description)
msgid ""
-"#### 2. Add the following entries to `/etc/apt/sources.list` or a new file "
-"in `/etc/apt/sources.list.d/`"
+"#### 2. Create a new file in `/etc/apt/sources.list.d/` named `tor.list`. "
+"Add the following entries:"
msgstr ""
#: https//support.torproject.org/apt/tor-deb-repo/
#: (content/apt/apt-1/contents+en.lrquestion.description)
-msgid "deb https://deb.torproject.org/torproject.org <DISTRIBUTION> main"
+msgid ""
+"deb [signed-by=/usr/share/keyrings/tor-archive-keyring.gpg] "
+"https://deb.torproject.org/torproject.org <DISTRIBUTION> main"
msgstr ""
#: https//support.torproject.org/apt/tor-deb-repo/
#: (content/apt/apt-1/contents+en.lrquestion.description)
-msgid "deb-src https://deb.torproject.org/torproject.org <DISTRIBUTION> main"
+msgid ""
+"deb-src [signed-by=/usr/share/keyrings/tor-archive-keyring.gpg] "
+"https://deb.torproject.org/torproject.org <DISTRIBUTION> main"
msgstr ""
#: https//support.torproject.org/apt/tor-deb-repo/
@@ -9800,14 +10797,16 @@ msgstr ""
#: https//support.torproject.org/apt/tor-deb-repo/
#: (content/apt/apt-1/contents+en.lrquestion.description)
msgid ""
-"deb https://deb.torproject.org/torproject.org tor-"
+"deb [signed-by=/usr/share/keyrings/tor-archive-keyring.gpg] "
+"https://deb.torproject.org/torproject.org tor-"
"experimental-0.4.6.x-<DISTRIBUTION> main"
msgstr ""
#: https//support.torproject.org/apt/tor-deb-repo/
#: (content/apt/apt-1/contents+en.lrquestion.description)
msgid ""
-"deb-src https://deb.torproject.org/torproject.org tor-"
+"deb-src [signed-by=/usr/share/keyrings/tor-archive-keyring.gpg] "
+"https://deb.torproject.org/torproject.org tor-"
"experimental-0.4.6.x-<DISTRIBUTION> main"
msgstr ""
@@ -9819,15 +10818,17 @@ msgstr ""
#: https//support.torproject.org/apt/tor-deb-repo/
#: (content/apt/apt-1/contents+en.lrquestion.description)
msgid ""
-"deb https://deb.torproject.org/torproject.org tor-nightly-"
-"master-<DISTRIBUTION> main"
+"deb [signed-by=/usr/share/keyrings/tor-archive-keyring.gpg] "
+"https://deb.torproject.org/torproject.org tor-nightly-master-<DISTRIBUTION> "
+"main"
msgstr ""
#: https//support.torproject.org/apt/tor-deb-repo/
#: (content/apt/apt-1/contents+en.lrquestion.description)
msgid ""
-"deb-src https://deb.torproject.org/torproject.org tor-nightly-"
-"master-<DISTRIBUTION> main"
+"deb-src [signed-by=/usr/share/keyrings/tor-archive-keyring.gpg] "
+"https://deb.torproject.org/torproject.org tor-nightly-master-<DISTRIBUTION> "
+"main"
msgstr ""
#: https//support.torproject.org/apt/tor-deb-repo/
@@ -9848,13 +10849,15 @@ msgstr ""
#: https//support.torproject.org/apt/tor-deb-repo/
#: (content/apt/apt-1/contents+en.lrquestion.description)
msgid ""
-"deb [arch=amd64] https://deb.torproject.org/torproject.org focal main"
+"deb [arch=amd64 signed-by=/usr/share/keyrings/tor-archive-keyring.gpg] "
+"https://deb.torproject.org/torproject.org focal main"
msgstr ""
#: https//support.torproject.org/apt/tor-deb-repo/
#: (content/apt/apt-1/contents+en.lrquestion.description)
msgid ""
-"deb-src [arch=amd64] https://deb.torproject.org/torproject.org focal main"
+"deb-src [arch=amd64 signed-by=/usr/share/keyrings/tor-archive-keyring.gpg] "
+"https://deb.torproject.org/torproject.org focal main"
msgstr ""
#: https//support.torproject.org/apt/tor-deb-repo/
@@ -9874,26 +10877,17 @@ msgstr ""
#: (content/apt/apt-1/contents+en.lrquestion.description)
msgid ""
"#### 3. Then add the gpg key used to sign the packages by running the "
-"following commands at your command prompt"
+"following command at your command prompt:"
msgstr ""
#: https//support.torproject.org/apt/tor-deb-repo/
#: (content/apt/apt-1/contents+en.lrquestion.description)
msgid ""
-"# wget -qO- "
+"# wget -O- "
"https://deb.torproject.org/torproject.org/A3C4F0F979CAA22CDBA8F512EE8CBC9E886DDD89.asc"
-" | gpg --import"
+" | gpg --dearmor | tee /usr/share/keyrings/tor-archive-keyring.gpg "
+">/dev/null"
msgstr ""
-"# wget -qO- "
-"https://deb.torproject.org/torproject.org/A3C4F0F979CAA22CDBA8F512EE8CBC9E886DDD89.asc"
-" | gpg --import"
-
-#: https//support.torproject.org/apt/tor-deb-repo/
-#: (content/apt/apt-1/contents+en.lrquestion.description)
-msgid ""
-"# gpg --export A3C4F0F979CAA22CDBA8F512EE8CBC9E886DDD89 | apt-key add -"
-msgstr ""
-"# gpg --export A3C4F0F979CAA22CDBA8F512EE8CBC9E886DDD89 | apt-key add -"
#: https//support.torproject.org/apt/tor-deb-repo/
#: (content/apt/apt-1/contents+en.lrquestion.description)
@@ -11499,6 +12493,82 @@ msgid ""
"doesn't change IP address over the day."
msgstr ""
+#: https//support.torproject.org/alternate-designs/block-websites/
+#: (content/alternate-designs/block-websites/contents+en.lrquestion.title)
+msgid "Exit policies should be able to block websites, not just IP addresses."
+msgstr ""
+
+#: https//support.torproject.org/alternate-designs/block-websites/
+#: (content/alternate-designs/block-websites/contents+en.lrquestion.description)
+msgid ""
+"It would be nice to let relay operators say things like `reject "
+"www.slashdot.org` in their exit policies, rather than requiring them to "
+"learn all the IP address space that could be covered by the site (and then "
+"also blocking other sites at those IP addresses)."
+msgstr ""
+
+#: https//support.torproject.org/alternate-designs/block-websites/
+#: (content/alternate-designs/block-websites/contents+en.lrquestion.description)
+msgid "There are two problems, though."
+msgstr ""
+
+#: https//support.torproject.org/alternate-designs/block-websites/
+#: (content/alternate-designs/block-websites/contents+en.lrquestion.description)
+msgid "First, users could still get around these blocks."
+msgstr ""
+
+#: https//support.torproject.org/alternate-designs/block-websites/
+#: (content/alternate-designs/block-websites/contents+en.lrquestion.description)
+msgid ""
+"For example, they could request the IP address rather than the hostname when"
+" they exit from the Tor network."
+msgstr ""
+
+#: https//support.torproject.org/alternate-designs/block-websites/
+#: (content/alternate-designs/block-websites/contents+en.lrquestion.description)
+msgid ""
+"This means operators would still need to learn all the IP addresses for the "
+"destinations in question."
+msgstr ""
+
+#: https//support.torproject.org/alternate-designs/block-websites/
+#: (content/alternate-designs/block-websites/contents+en.lrquestion.description)
+msgid ""
+"The second problem is that it would allow remote attackers to censor "
+"arbitrary sites."
+msgstr ""
+
+#: https//support.torproject.org/alternate-designs/block-websites/
+#: (content/alternate-designs/block-websites/contents+en.lrquestion.description)
+msgid ""
+"For example, if a Tor operator blocks www1.slashdot.org, and then some "
+"attacker poisons the Tor relay's DNS or otherwise changes that hostname to "
+"resolve to the IP address for a major news site, then suddenly that Tor "
+"relay is blocking the news site."
+msgstr ""
+
+#: https//support.torproject.org/alternate-designs/let-the-network-pick-the-path/
+#: (content/alternate-designs/let-the-network-pick-the-path/contents+en.lrquestion.title)
+msgid "You should let the network pick the path, not the client."
+msgstr ""
+
+#: https//support.torproject.org/alternate-designs/let-the-network-pick-the-path/
+#: (content/alternate-designs/let-the-network-pick-the-path/contents+en.lrquestion.description)
+msgid "No, you cannot trust the network to pick the path."
+msgstr ""
+
+#: https//support.torproject.org/alternate-designs/let-the-network-pick-the-path/
+#: (content/alternate-designs/let-the-network-pick-the-path/contents+en.lrquestion.description)
+msgid "Malicious relays could route you through their colluding friends."
+msgstr ""
+
+#: https//support.torproject.org/alternate-designs/let-the-network-pick-the-path/
+#: (content/alternate-designs/let-the-network-pick-the-path/contents+en.lrquestion.description)
+msgid ""
+"This would give an adversary the ability to watch all of your traffic end to"
+" end."
+msgstr ""
+
#: lego/templates/banner.html:3 lego/templates/banner.html:5
#: templates/banner.html:3 templates/banner.html:5
msgid "Close banner"
@@ -11529,8 +12599,8 @@ msgid "DONATE NOW"
msgstr "ÐÐÐÐÐ ÐÐТРСÐÐÐ"
#: lego/templates/footer.html:13 lego/templates/footer.html:22
-#: lego/templates/navbar.html:83 templates/footer.html:13
-#: templates/footer.html:22 templates/navbar.html:83
+#: lego/templates/navbar.html:95 templates/footer.html:13
+#: templates/footer.html:22 templates/navbar.html:95
msgid "Download Tor Browser"
msgstr "ÐÑевземи Tor ÐÑелиÑÑÑваÑ"
diff --git a/contents+ml.po b/contents+ml.po
index cfdaee6f85..92f9692603 100644
--- a/contents+ml.po
+++ b/contents+ml.po
@@ -10,7 +10,7 @@ msgid ""
msgstr ""
"Project-Id-Version: PACKAGE VERSION\n"
"Report-Msgid-Bugs-To: \n"
-"POT-Creation-Date: 2021-08-25 11:14+CET\n"
+"POT-Creation-Date: 2021-09-01 12:20+CET\n"
"PO-Revision-Date: 2018-10-02 22:41+0000\n"
"Last-Translator: Emma Peel, 2021\n"
"Language-Team: Malayalam (https://www.transifex.com/otf/teams/1519/ml/)\n"
@@ -143,6 +143,11 @@ msgstr ""
msgid "Tor Metrics"
msgstr ""
+#: https//support.torproject.org/alternate-designs/
+#: (content/alternate-designs/contents+en.lrtopic.title)
+msgid "Alternate Designs We Don't Do (Yet)"
+msgstr ""
+
#: https//support.torproject.org/glossary/add-on-extension-or-plugin/
#: (content/glossary/add-on-extension-or-plugin/contents+en.lrword.term)
msgid "add-on, extension, or plugin"
@@ -2350,6 +2355,61 @@ msgstr ""
"വിà´àµà´à´¿à´¯à´¿àµ½](https://trac.torproject.org/projects/tor/wiki/doc/TorPlusVPN) "
"à´à´£àµà´àµà´¤àµà´¤à´¾à´¨à´¾à´àµà´."
+#: https//support.torproject.org/faq/relay-donations/
+#: (content/faq/relay-donations/contents+en.lrquestion.title)
+msgid "Can I donate for a relay rather than run my own?"
+msgstr ""
+
+#: https//support.torproject.org/faq/relay-donations/
+#: (content/faq/relay-donations/contents+en.lrquestion.description)
+msgid ""
+"Sure! We have a [list of organizations that run Tor "
+"relays](https://community.torproject.org/relay/community-resources/relay-"
+"associations/) that are happy to turn your donations into better speed and "
+"anonymity for the Tor network."
+msgstr ""
+
+#: https//support.torproject.org/faq/relay-donations/
+#: (content/faq/relay-donations/contents+en.lrquestion.description)
+msgid ""
+"These organizations are not the same as [The Tor Project, "
+"Inc](https://donate.torproject.org/), but we consider that a good thing."
+msgstr ""
+
+#: https//support.torproject.org/faq/relay-donations/
+#: (content/faq/relay-donations/contents+en.lrquestion.description)
+msgid "They're run by nice people who are part of the Tor community."
+msgstr ""
+
+#: https//support.torproject.org/faq/relay-donations/
+#: (content/faq/relay-donations/contents+en.lrquestion.description)
+msgid ""
+"Note that there can be a tradeoff here between anonymity and performance."
+msgstr ""
+
+#: https//support.torproject.org/faq/relay-donations/
+#: (content/faq/relay-donations/contents+en.lrquestion.description)
+msgid ""
+"The Tor network's anonymity comes in part from diversity, so if you are in a"
+" position to run your own relay, you will be improving Tor's anonymity more "
+"than by donating."
+msgstr ""
+
+#: https//support.torproject.org/faq/relay-donations/
+#: (content/faq/relay-donations/contents+en.lrquestion.description)
+msgid ""
+"At the same time though, economies of scale for bandwidth mean that "
+"combining many small donations into several larger relays is more efficient "
+"at improving network performance."
+msgstr ""
+
+#: https//support.torproject.org/faq/relay-donations/
+#: (content/faq/relay-donations/contents+en.lrquestion.description)
+msgid ""
+"Improving anonymity and improving performance are both worthwhile goals, so "
+"however you can help is great!"
+msgstr ""
+
#: https//support.torproject.org/faq/staying-anonymous/
#: (content/faq/staying-anonymous/contents+en.lrquestion.title)
msgid "Am I totally anonymous if I use Tor?"
@@ -2650,6 +2710,61 @@ msgid ""
" documenting all the issues](https://community.torproject.org/)."
msgstr ""
+#: https//support.torproject.org/about/attacks-on-onion-routing/
+#: (content/about/attacks-on-onion-routing/contents+en.lrquestion.title)
+msgid "What attacks remain against onion routing?"
+msgstr ""
+
+#: https//support.torproject.org/about/attacks-on-onion-routing/
+#: (content/about/attacks-on-onion-routing/contents+en.lrquestion.description)
+msgid ""
+"As mentioned above, it is possible for an observer who can view both you and"
+" either the destination website or your Tor exit node to correlate timings "
+"of your traffic as it enters the Tor network and also as it exits."
+msgstr ""
+
+#: https//support.torproject.org/about/attacks-on-onion-routing/
+#: (content/about/attacks-on-onion-routing/contents+en.lrquestion.description)
+msgid "Tor does not defend against such a threat model."
+msgstr ""
+
+#: https//support.torproject.org/about/attacks-on-onion-routing/
+#: (content/about/attacks-on-onion-routing/contents+en.lrquestion.description)
+msgid ""
+"In a more limited sense, note that if a censor or law enforcement agency has"
+" the ability to obtain specific observation of parts of the network, it is "
+"possible for them to verify a suspicion that you talk regularly to your "
+"friend by observing traffic at both ends and correlating the timing of only "
+"that traffic."
+msgstr ""
+
+#: https//support.torproject.org/about/attacks-on-onion-routing/
+#: (content/about/attacks-on-onion-routing/contents+en.lrquestion.description)
+msgid ""
+"Again, this is only useful to verify that parties already suspected of "
+"communicating with one another are doing so."
+msgstr ""
+
+#: https//support.torproject.org/about/attacks-on-onion-routing/
+#: (content/about/attacks-on-onion-routing/contents+en.lrquestion.description)
+msgid ""
+"In most countries, the suspicion required to obtain a warrant already "
+"carries more weight than timing correlation would provide."
+msgstr ""
+
+#: https//support.torproject.org/about/attacks-on-onion-routing/
+#: (content/about/attacks-on-onion-routing/contents+en.lrquestion.description)
+msgid ""
+"Furthermore, since Tor reuses circuits for multiple TCP connections, it is "
+"possible to associate non anonymous and anonymous traffic at a given exit "
+"node, so be careful about what applications you run concurrently over Tor."
+msgstr ""
+
+#: https//support.torproject.org/about/attacks-on-onion-routing/
+#: (content/about/attacks-on-onion-routing/contents+en.lrquestion.description)
+msgid "Perhaps even run separate Tor clients for these applications."
+msgstr ""
+
#: https//support.torproject.org/about/backdoor/
#: (content/about/backdoor/contents+en.lrquestion.title)
msgid "Is there a backdoor in Tor?"
@@ -2815,6 +2930,43 @@ msgstr ""
"മറàµà´±àµ à´¬àµà´°àµà´¸à´±àµà´à´³à´¿àµ½ à´àµàµ¼ à´à´ªà´¯àµà´à´¿à´àµà´àµà´¨àµà´¨à´¤àµ [à´
à´ªà´à´à´à´°à´®à´¾à´£àµ, à´¶àµà´ªà´¾àµ¼à´¶ "
"à´àµà´¯àµà´¯àµà´¨àµà´¨à´¿à´²àµà´²](/ml/tbb/tbb-9/)."
+#: https//support.torproject.org/about/change-paths/
+#: (content/about/change-paths/contents+en.lrquestion.title)
+msgid "How often does Tor change its paths?"
+msgstr ""
+
+#: https//support.torproject.org/about/change-paths/
+#: (content/about/change-paths/contents+en.lrquestion.description)
+msgid ""
+"Tor will reuse the same circuit for new TCP streams for 10 minutes, as long "
+"as the circuit is working fine."
+msgstr ""
+
+#: https//support.torproject.org/about/change-paths/
+#: (content/about/change-paths/contents+en.lrquestion.description)
+msgid "(If the circuit fails, Tor will switch to a new circuit immediately.)"
+msgstr ""
+
+#: https//support.torproject.org/about/change-paths/
+#: (content/about/change-paths/contents+en.lrquestion.description)
+msgid ""
+"But note that a single TCP stream (e.g. a long IRC connection) will stay on "
+"the same circuit forever."
+msgstr ""
+
+#: https//support.torproject.org/about/change-paths/
+#: (content/about/change-paths/contents+en.lrquestion.description)
+msgid "We don't rotate individual streams from one circuit to the next."
+msgstr ""
+
+#: https//support.torproject.org/about/change-paths/
+#: (content/about/change-paths/contents+en.lrquestion.description)
+msgid ""
+"Otherwise, an adversary with a partial view of the network would be given "
+"many chances over time to link you to your destination, rather than just one"
+" chance."
+msgstr ""
+
#: https//support.torproject.org/about/distribute-tor/
#: (content/about/distribute-tor/contents+en.lrquestion.title)
msgid "Can I distribute Tor?"
@@ -2934,6 +3086,133 @@ msgstr ""
"വിശദാà´à´¶à´àµà´àµ¾à´àµà´àµ à´à´àµà´à´³àµà´àµ [à´µàµà´¯à´¾à´ªà´¾à´°à´®àµà´¦àµà´° "
"പതിവàµà´àµà´¦àµà´¯à´àµà´àµ¾](https://www.torproject.org/about/trademark/) à´à´¾à´£àµà´."
+#: https//support.torproject.org/about/entry-guards/
+#: (content/about/entry-guards/contents+en.lrquestion.title)
+msgid "What are Entry Guards?"
+msgstr ""
+
+#: https//support.torproject.org/about/entry-guards/
+#: (content/about/entry-guards/contents+en.lrquestion.description)
+msgid ""
+"Tor (like all current practical low-latency anonymity designs) fails when "
+"the attacker can see both ends of the communications channel."
+msgstr ""
+
+#: https//support.torproject.org/about/entry-guards/
+#: (content/about/entry-guards/contents+en.lrquestion.description)
+msgid ""
+"For example, suppose the attacker controls or watches the Tor relay you "
+"choose to enter the network, and also controls or watches the website you "
+"visit."
+msgstr ""
+
+#: https//support.torproject.org/about/entry-guards/
+#: (content/about/entry-guards/contents+en.lrquestion.description)
+msgid ""
+"In this case, the research community knows no practical low-latency design "
+"that can reliably stop the attacker from correlating volume and timing "
+"information on the two sides."
+msgstr ""
+
+#: https//support.torproject.org/about/entry-guards/
+#: (content/about/entry-guards/contents+en.lrquestion.description)
+msgid "So, what should we do?"
+msgstr ""
+
+#: https//support.torproject.org/about/entry-guards/
+#: (content/about/entry-guards/contents+en.lrquestion.description)
+msgid "Suppose the attacker controls, or can observe, C relays."
+msgstr ""
+
+#: https//support.torproject.org/about/entry-guards/
+#: (content/about/entry-guards/contents+en.lrquestion.description)
+msgid "Suppose there are N relays total."
+msgstr ""
+
+#: https//support.torproject.org/about/entry-guards/
+#: (content/about/entry-guards/contents+en.lrquestion.description)
+msgid ""
+"If you select new entry and exit relays each time you use the network, the "
+"attacker will be able to correlate all traffic you send with probability "
+"around (c/n)2."
+msgstr ""
+
+#: https//support.torproject.org/about/entry-guards/
+#: (content/about/entry-guards/contents+en.lrquestion.description)
+msgid ""
+"But profiling is, for most users, as bad as being traced all the time: they "
+"want to do something often without an attacker noticing, and the attacker "
+"noticing once is as bad as the attacker noticing more often."
+msgstr ""
+
+#: https//support.torproject.org/about/entry-guards/
+#: (content/about/entry-guards/contents+en.lrquestion.description)
+msgid ""
+"Thus, choosing many random entries and exits gives the user no chance of "
+"escaping profiling by this kind of attacker."
+msgstr ""
+
+#: https//support.torproject.org/about/entry-guards/
+#: (content/about/entry-guards/contents+en.lrquestion.description)
+msgid ""
+"The solution is \"entry guards\": each Tor client selects a few relays at "
+"random to use as entry points, and uses only those relays for their first "
+"hop."
+msgstr ""
+
+#: https//support.torproject.org/about/entry-guards/
+#: (content/about/entry-guards/contents+en.lrquestion.description)
+msgid ""
+"If those relays are not controlled or observed, the attacker can't win, "
+"ever, and the user is secure."
+msgstr ""
+
+#: https//support.torproject.org/about/entry-guards/
+#: (content/about/entry-guards/contents+en.lrquestion.description)
+msgid ""
+"If those relays are observed or controlled by the attacker, the attacker "
+"sees a larger fraction of the user's traffic - but still the user is no more"
+" profiled than before."
+msgstr ""
+
+#: https//support.torproject.org/about/entry-guards/
+#: (content/about/entry-guards/contents+en.lrquestion.description)
+msgid ""
+"Thus, the user has some chance (on the order of (n-c)/n) of avoiding "
+"profiling, whereas they had none before."
+msgstr ""
+
+#: https//support.torproject.org/about/entry-guards/
+#: (content/about/entry-guards/contents+en.lrquestion.description)
+msgid ""
+"You can read more at [An Analysis of the Degradation of Anonymous "
+"Protocols](http://freehaven.net/anonbib/#wright02), [Defending Anonymous "
+"Communication Against Passive Logging "
+"Attacks](http://freehaven.net/anonbib/#wright03), and especially [Locating "
+"Hidden Servers](http://freehaven.net/anonbib/#hs-attack06)."
+msgstr ""
+
+#: https//support.torproject.org/about/entry-guards/
+#: (content/about/entry-guards/contents+en.lrquestion.description)
+msgid ""
+"Restricting your entry nodes may also help against attackers who want to run"
+" a few Tor nodes and easily enumerate all of the Tor user IP addresses."
+msgstr ""
+
+#: https//support.torproject.org/about/entry-guards/
+#: (content/about/entry-guards/contents+en.lrquestion.description)
+msgid ""
+"(Even though they can't learn what destinations the users are talking to, "
+"they still might be able to do bad things with just a list of users.)"
+msgstr ""
+
+#: https//support.torproject.org/about/entry-guards/
+#: (content/about/entry-guards/contents+en.lrquestion.description)
+msgid ""
+"However, that feature won't really become useful until we move to a "
+"\"directory guard\" design as well."
+msgstr ""
+
#: https//support.torproject.org/about/how-is-tor-different-from-other-proxies/
#: (content/about/how-is-tor-different-from-other-proxies/contents+en.lrquestion.title)
msgid "How is Tor different from other proxies?"
@@ -3146,6 +3425,162 @@ msgstr ""
"à´àµà´±àµà´ à´à´àµà´àµà´à´¿à´à´¿à´ªà´¿à´à´¸àµà´ à´à´àµà´à´¨àµ à´à´à´ªà´´à´àµà´¨àµà´¨àµà´µàµà´¨àµà´¨àµ മനസിലാà´àµà´à´¾àµ» [à´àµàµ¼, "
"à´à´àµà´àµà´à´¿à´à´¿à´ªà´¿à´à´¸àµ](/ml/https/https-1/) à´¨àµà´±àµ à´ à´¦àµà´¶àµà´¯à´µàµ½à´àµà´à´°à´£à´ à´à´¾à´£àµà´."
+#: https//support.torproject.org/about/key-management/
+#: (content/about/key-management/contents+en.lrquestion.title)
+msgid "Tell me about all the keys Tor uses"
+msgstr ""
+
+#: https//support.torproject.org/about/key-management/
+#: (content/about/key-management/contents+en.lrquestion.description)
+msgid ""
+"Tor uses a variety of different keys, with three goals in mind: 1) "
+"encryption to ensure privacy of data within the Tor network, 2) "
+"authentication so clients know they're talking to the relays they meant to "
+"talk to, and 3) signatures to make sure all clients know the same set of "
+"relays."
+msgstr ""
+
+#: https//support.torproject.org/about/key-management/
+#: (content/about/key-management/contents+en.lrquestion.description)
+msgid ""
+"**Encryption**: first, all connections in Tor use TLS link encryption, so "
+"observers can't look inside to see which circuit a given cell is intended "
+"for."
+msgstr ""
+
+#: https//support.torproject.org/about/key-management/
+#: (content/about/key-management/contents+en.lrquestion.description)
+msgid ""
+"Further, the Tor client establishes an ephemeral encryption key with each "
+"relay in the circuit; these extra layers of encryption mean that only the "
+"exit relay can read the cells."
+msgstr ""
+
+#: https//support.torproject.org/about/key-management/
+#: (content/about/key-management/contents+en.lrquestion.description)
+msgid ""
+"Both sides discard the circuit key when the circuit ends, so logging traffic"
+" and then breaking into the relay to discover the key won't work."
+msgstr ""
+
+#: https//support.torproject.org/about/key-management/
+#: (content/about/key-management/contents+en.lrquestion.description)
+msgid ""
+"**Authentication**: Every Tor relay has a public decryption key called the "
+"\"onion key\"."
+msgstr ""
+
+#: https//support.torproject.org/about/key-management/
+#: (content/about/key-management/contents+en.lrquestion.description)
+msgid "Each relay rotates its onion key once a week."
+msgstr ""
+
+#: https//support.torproject.org/about/key-management/
+#: (content/about/key-management/contents+en.lrquestion.description)
+msgid ""
+"When the Tor client establishes circuits, at each step it [demands that the "
+"Tor relay prove knowledge of its onion key](https://svn-"
+"archive.torproject.org/svn/projects/design-paper/tor-"
+"design.html#subsec:circuits)."
+msgstr ""
+
+#: https//support.torproject.org/about/key-management/
+#: (content/about/key-management/contents+en.lrquestion.description)
+msgid ""
+"That way the first node in the path can't just spoof the rest of the path."
+msgstr ""
+
+#: https//support.torproject.org/about/key-management/
+#: (content/about/key-management/contents+en.lrquestion.description)
+msgid ""
+"Because the Tor client chooses the path, it can make sure to get Tor's "
+"\"distributed trust\" property: no single relay in the path can know about "
+"both the client and what the client is doing."
+msgstr ""
+
+#: https//support.torproject.org/about/key-management/
+#: (content/about/key-management/contents+en.lrquestion.description)
+msgid ""
+"**Coordination**: How do clients know what the relays are, and how do they "
+"know that they have the right keys for them?"
+msgstr ""
+
+#: https//support.torproject.org/about/key-management/
+#: (content/about/key-management/contents+en.lrquestion.description)
+msgid "Each relay has a long-term public signing key called the \"identity key\"."
+msgstr ""
+
+#: https//support.torproject.org/about/key-management/
+#: (content/about/key-management/contents+en.lrquestion.description)
+msgid "Each directory authority additionally has a \"directory signing key\"."
+msgstr ""
+
+#: https//support.torproject.org/about/key-management/
+#: (content/about/key-management/contents+en.lrquestion.description)
+msgid ""
+"The directory authorities [provide a signed "
+"list](https://gitweb.torproject.org/torspec.git/tree/dir-spec.txt) of all "
+"the known relays, and in that list are a set of certificates from each relay"
+" (self-signed by their identity key) specifying their keys, locations, exit "
+"policies, and so on."
+msgstr ""
+
+#: https//support.torproject.org/about/key-management/
+#: (content/about/key-management/contents+en.lrquestion.description)
+msgid ""
+"So unless the adversary can control a majority of the directory authorities "
+"(as of 2021 there are 10 directory authorities), they can't trick the Tor "
+"client into using other Tor relays."
+msgstr ""
+
+#: https//support.torproject.org/about/key-management/
+#: (content/about/key-management/contents+en.lrquestion.description)
+msgid "How do clients know what the directory authorities are?"
+msgstr ""
+
+#: https//support.torproject.org/about/key-management/
+#: (content/about/key-management/contents+en.lrquestion.description)
+msgid ""
+"The Tor software comes with a built-in list of location and public key for "
+"each directory authority."
+msgstr ""
+
+#: https//support.torproject.org/about/key-management/
+#: (content/about/key-management/contents+en.lrquestion.description)
+msgid ""
+"So the only way to trick users into using a fake Tor network is to give them"
+" a specially modified version of the software."
+msgstr ""
+
+#: https//support.torproject.org/about/key-management/
+#: (content/about/key-management/contents+en.lrquestion.description)
+msgid "How do users know they've got the right software?"
+msgstr ""
+
+#: https//support.torproject.org/about/key-management/
+#: (content/about/key-management/contents+en.lrquestion.description)
+msgid ""
+"When we distribute the source code or a package, we digitally sign it with "
+"[GNU Privacy Guard](http://www.gnupg.org/). See the [instructions on how to "
+"check Tor Browser's signature](https://support.torproject.org/tbb/how-to-"
+"verify-signature/)."
+msgstr ""
+
+#: https//support.torproject.org/about/key-management/
+#: (content/about/key-management/contents+en.lrquestion.description)
+msgid ""
+"In order to be certain that it's really signed by us, you need to have met "
+"us in person and gotten a copy of our GPG key fingerprint, or you need to "
+"know somebody who has."
+msgstr ""
+
+#: https//support.torproject.org/about/key-management/
+#: (content/about/key-management/contents+en.lrquestion.description)
+msgid ""
+"If you're concerned about an attack on this level, we recommend you get "
+"involved with the security community and start meeting people."
+msgstr ""
+
#: https//support.torproject.org/about/no-data-scrubbing/
#: (content/about/no-data-scrubbing/contents+en.lrquestion.title)
msgid ""
@@ -3187,6 +3622,151 @@ msgstr ""
"à´àµàµ¼ à´¬àµà´°àµà´¸à´±à´¿à´¨àµ നിà´àµà´àµ¾â à´«àµà´®àµà´à´³à´¿àµ½â à´àµà´ªàµà´ªàµà´àµà´¯àµà´¯àµà´¨àµà´¨ വാà´à´à´¤àµà´¤àµà´àµà´àµà´±à´¿à´àµà´àµ à´à´¨àµà´¨àµà´ "
"à´àµà´¯àµà´¯à´¾àµ»â à´à´´à´¿à´¯à´¿à´²àµà´²."
+#: https//support.torproject.org/about/protections/
+#: (content/about/protections/contents+en.lrquestion.title)
+msgid "What protections does Tor provide?"
+msgstr ""
+
+#: https//support.torproject.org/about/protections/
+#: (content/about/protections/contents+en.lrquestion.description)
+msgid ""
+"Internet communication is based on a store-and-forward model that can be "
+"understood in analogy to postal mail: Data is transmitted in blocks called "
+"IP datagrams or packets."
+msgstr ""
+
+#: https//support.torproject.org/about/protections/
+#: (content/about/protections/contents+en.lrquestion.description)
+msgid ""
+"Every packet includes a source IP address (of the sender) and a destination "
+"IP address (of the receiver), just as ordinary letters contain postal "
+"addresses of sender and receiver."
+msgstr ""
+
+#: https//support.torproject.org/about/protections/
+#: (content/about/protections/contents+en.lrquestion.description)
+msgid ""
+"The way from sender to receiver involves multiple hops of routers, where "
+"each router inspects the destination IP address and forwards the packet "
+"closer to its destination."
+msgstr ""
+
+#: https//support.torproject.org/about/protections/
+#: (content/about/protections/contents+en.lrquestion.description)
+msgid ""
+"Thus, every router between sender and receiver learns that the sender is "
+"communicating with the receiver."
+msgstr ""
+
+#: https//support.torproject.org/about/protections/
+#: (content/about/protections/contents+en.lrquestion.description)
+msgid ""
+"In particular, your local ISP is in the position to build a complete profile"
+" of your Internet usage."
+msgstr ""
+
+#: https//support.torproject.org/about/protections/
+#: (content/about/protections/contents+en.lrquestion.description)
+msgid ""
+"In addition, every server in the Internet that can see any of the packets "
+"can profile your behavior."
+msgstr ""
+
+#: https//support.torproject.org/about/protections/
+#: (content/about/protections/contents+en.lrquestion.description)
+msgid ""
+"The aim of Tor is to improve your privacy by sending your traffic through a "
+"series of proxies."
+msgstr ""
+
+#: https//support.torproject.org/about/protections/
+#: (content/about/protections/contents+en.lrquestion.description)
+msgid ""
+"Your communication is encrypted in multiple layers and routed via multiple "
+"hops through the Tor network to the final receiver."
+msgstr ""
+
+#: https//support.torproject.org/about/protections/
+#: (content/about/protections/contents+en.lrquestion.description)
+msgid ""
+"More details on this process can be found in this "
+"[visualization](https://support.torproject.org/https/https-1/)."
+msgstr ""
+
+#: https//support.torproject.org/about/protections/
+#: (content/about/protections/contents+en.lrquestion.description)
+msgid ""
+"Note that all your local ISP can observe now is that you are communicating "
+"with Tor nodes."
+msgstr ""
+
+#: https//support.torproject.org/about/protections/
+#: (content/about/protections/contents+en.lrquestion.description)
+msgid ""
+"Similarly, servers in the Internet just see that they are being contacted by"
+" Tor nodes."
+msgstr ""
+
+#: https//support.torproject.org/about/protections/
+#: (content/about/protections/contents+en.lrquestion.description)
+msgid "Generally speaking, Tor aims to solve three privacy problems:"
+msgstr ""
+
+#: https//support.torproject.org/about/protections/
+#: (content/about/protections/contents+en.lrquestion.description)
+msgid ""
+"First, Tor prevents websites and other services from learning your location,"
+" which they can use to build databases about your habits and interests."
+msgstr ""
+
+#: https//support.torproject.org/about/protections/
+#: (content/about/protections/contents+en.lrquestion.description)
+msgid ""
+"With Tor, your Internet connections don't give you away by default -- now "
+"you can have the ability to choose, for each connection, how much "
+"information to reveal."
+msgstr ""
+
+#: https//support.torproject.org/about/protections/
+#: (content/about/protections/contents+en.lrquestion.description)
+msgid ""
+"Second, Tor prevents people watching your traffic locally (such as your ISP "
+"or someone with access to your home wifi or router) from learning what "
+"information you're fetching and where you're fetching it from."
+msgstr ""
+
+#: https//support.torproject.org/about/protections/
+#: (content/about/protections/contents+en.lrquestion.description)
+msgid ""
+"It also stops them from deciding what you're allowed to learn and publish --"
+" if you can get to any part of the Tor network, you can reach any site on "
+"the Internet."
+msgstr ""
+
+#: https//support.torproject.org/about/protections/
+#: (content/about/protections/contents+en.lrquestion.description)
+msgid ""
+"Third, Tor routes your connection through more than one Tor relay so no "
+"single relay can learn what you're up to."
+msgstr ""
+
+#: https//support.torproject.org/about/protections/
+#: (content/about/protections/contents+en.lrquestion.description)
+msgid ""
+"Because these relays are run by different individuals or organizations, "
+"distributing trust provides more security than the old [one hop "
+"proxy](https://support.torproject.org/about/#how-is-tor-different-from-"
+"other-proxies) approach."
+msgstr ""
+
+#: https//support.torproject.org/about/protections/
+#: (content/about/protections/contents+en.lrquestion.description)
+msgid ""
+"Note, however, that there are situations where Tor fails to solve these "
+"privacy problems entirely: see the entry below on [remaining "
+"attacks](https://support.torproject.org/about/#attacks-on-onion-routing)."
+msgstr ""
+
#: https//support.torproject.org/about/what-is-tor/
#: (content/about/what-is-tor/contents+en.lrquestion.title)
msgid "What is Tor?"
@@ -5785,16 +6365,12 @@ msgstr ""
#: (content/tbb/tbb-47/contents+en.lrquestion.description)
msgid ""
"Also, read up on the HTTPProxyAuthenticator and HTTPSProxyAuthenticator "
-"options if your proxy requires auth. We only support basic auth currently, "
-"but if you need NTLM authentication, you may find [this post in the "
-"archives](https://archives.seul.org/or/talk/Jun-2005/msg00223.html) useful."
+"options if your [proxy requires auth.](https://developer.mozilla.org/en-"
+"US/docs/Web/HTTP/Headers/Proxy-Authenticate) We only support basic auth "
+"currently, but if you need NTLM authentication, you may find [this post in "
+"the archives](https://archives.seul.org/or/talk/Jun-2005/msg00223.html) "
+"useful."
msgstr ""
-"à´àµà´à´¾à´¤àµ, നിà´àµà´à´³àµà´àµ à´ªàµà´°àµà´àµà´¸à´¿à´àµà´àµ à´ªàµà´°à´¾à´®à´¾à´£àµà´à´°à´£à´ à´à´µà´¶àµà´¯à´®àµà´àµà´à´¿àµ½ "
-"HTTPProxyAuthenticator, HTTPSProxyAuthenticator à´à´ªàµà´·à´¨àµà´àµ¾ വായിà´àµà´àµà´. à´à´àµà´àµ¾ "
-"നിലവിൽ à´
à´à´¿à´¸àµà´¥à´¾à´¨ à´ªàµà´°à´¾à´®à´¾à´£àµà´à´°à´£à´¤àµà´¤àµ മാതàµà´°à´®àµ പിനàµà´¤àµà´£à´¯àµà´àµà´àµ, à´ªà´àµà´·àµ നിà´àµà´àµ¾à´àµà´àµ "
-"à´àµ»âà´à´¿âà´àµ½âà´à´ à´ªàµà´°à´¾à´®à´¾à´£àµà´à´°à´£à´ à´à´µà´¶àµà´¯à´®àµà´£àµà´àµà´àµà´à´¿àµ½, നിà´àµà´àµ¾à´àµà´àµ [à´àµ¼à´àµà´àµà´µàµà´à´³à´¿à´²àµ à´ "
-"à´àµà´±à´¿à´ªàµà´ªàµ](https://archives.seul.org/or/talk/Jun-2005/msg00223.html) "
-"à´à´£àµà´àµà´¤àµà´¤à´¾à´."
#: https//support.torproject.org/tbb/tbb-47/
#: (content/tbb/tbb-47/contents+en.lrquestion.description)
@@ -6075,6 +6651,219 @@ msgstr ""
"à´àµàµ¼à´àµà´à´¿à´²àµ `#` à´à´¨àµà´¨àµ à´à´°à´à´à´¿à´àµà´àµà´¨àµà´¨ à´à´²àµà´²à´¾ വരിà´à´³àµà´ à´
à´à´¿à´ªàµà´°à´¾à´¯à´àµà´à´³à´¾à´¯à´¿ "
"à´à´£à´àµà´à´¾à´àµà´àµà´¨àµà´¨àµà´µàµà´¨àµà´¨àµà´ à´àµàµ¼ à´àµàµºà´«à´¿à´à´±àµà´·à´¨àµ ബാധിà´àµà´à´¿à´²àµà´²àµà´¨àµà´¨àµà´ à´àµ¼à´®àµà´®à´¿à´àµà´àµà´."
+#: https//support.torproject.org/tbb/tbb-firewall-ports/
+#: (content/tbb/tbb-firewall-ports/contents+en.lrquestion.title)
+msgid "My firewall only allows a few outgoing ports"
+msgstr ""
+
+#: https//support.torproject.org/tbb/tbb-firewall-ports/
+#: (content/tbb/tbb-firewall-ports/contents+en.lrquestion.description)
+msgid ""
+"If your firewall works by blocking ports, then you can tell Tor to only use "
+"the ports when you start your Tor Browser."
+msgstr ""
+
+#: https//support.torproject.org/tbb/tbb-firewall-ports/
+#: (content/tbb/tbb-firewall-ports/contents+en.lrquestion.description)
+msgid ""
+"Or you can add the ports that your firewall permits by adding "
+"\"FascistFirewall 1\" to your torrc configuration file."
+msgstr ""
+
+#: https//support.torproject.org/tbb/tbb-firewall-ports/
+#: (content/tbb/tbb-firewall-ports/contents+en.lrquestion.description)
+msgid ""
+"By default, when you set this Tor assumes that your firewall allows only "
+"port 80 and port 443 (HTTP and HTTPS respectively)."
+msgstr ""
+
+#: https//support.torproject.org/tbb/tbb-firewall-ports/
+#: (content/tbb/tbb-firewall-ports/contents+en.lrquestion.description)
+msgid ""
+"You can select a different set of ports with the FirewallPorts torrc option."
+msgstr ""
+
+#: https//support.torproject.org/tbb/tbb-firewall-ports/
+#: (content/tbb/tbb-firewall-ports/contents+en.lrquestion.description)
+msgid ""
+"If you want to be more fine-grained with your controls, you can also use the"
+" ReachableAddresses config options, e.g.:"
+msgstr ""
+
+#: https//support.torproject.org/tbb/tbb-firewall-ports/
+#: (content/tbb/tbb-firewall-ports/contents+en.lrquestion.description)
+#: https//support.torproject.org/tbb/tbb-install-tor-central-server/
+#: (content/tbb/tbb-install-tor-central-server/contents+en.lrquestion.description)
+#: https//support.torproject.org/operators/default-exit-ports/
+#: (content/operators/default-exit-ports/contents+en.lrquestion.description)
+#: https//support.torproject.org/operators/hibernation/
+#: (content/operators/hibernation/contents+en.lrquestion.description)
+#: https//support.torproject.org/operators/limit-total-bandwidth/
+#: (content/operators/limit-total-bandwidth/contents+en.lrquestion.description)
+#: https//support.torproject.org/misc/bug-or-feedback/
+#: (content/misc/bug-or-feedback/contents+en.lrquestion.description)
+#: https//support.torproject.org/get-in-touch/why-i-cant-join-tor-channels/
+#: (content/get-in-touch/why-i-cant-join-tor-channels/contents+en.lrquestion.description)
+#: https//support.torproject.org/apt/tor-deb-repo/
+#: (content/apt/apt-1/contents+en.lrquestion.description)
+#: https//support.torproject.org/apt/apt-over-tor/
+#: (content/apt/apt-3/contents+en.lrquestion.description)
+msgid "```"
+msgstr "```"
+
+#: https//support.torproject.org/tbb/tbb-firewall-ports/
+#: (content/tbb/tbb-firewall-ports/contents+en.lrquestion.description)
+msgid "ReachableDirAddresses *:80"
+msgstr ""
+
+#: https//support.torproject.org/tbb/tbb-firewall-ports/
+#: (content/tbb/tbb-firewall-ports/contents+en.lrquestion.description)
+msgid "ReachableORAddresses *:443"
+msgstr ""
+
+#: https//support.torproject.org/tbb/tbb-install-tor-central-server/
+#: (content/tbb/tbb-install-tor-central-server/contents+en.lrquestion.title)
+msgid ""
+"Can I install Tor on a central server, and have my clients connect to it?"
+msgstr ""
+
+#: https//support.torproject.org/tbb/tbb-install-tor-central-server/
+#: (content/tbb/tbb-install-tor-central-server/contents+en.lrquestion.description)
+msgid ""
+"Yes. Tor can be configured as a client or a relay on another machine, and "
+"allow other machines to be able to connect to it for anonymity."
+msgstr ""
+
+#: https//support.torproject.org/tbb/tbb-install-tor-central-server/
+#: (content/tbb/tbb-install-tor-central-server/contents+en.lrquestion.description)
+msgid ""
+"This is most useful in an environment where many computers want a gateway of"
+" anonymity to the rest of the world."
+msgstr ""
+
+#: https//support.torproject.org/tbb/tbb-install-tor-central-server/
+#: (content/tbb/tbb-install-tor-central-server/contents+en.lrquestion.description)
+msgid ""
+"However, be forewarned that with this configuration, anyone within your "
+"private network (existing between you and the Tor client/relay) can see what"
+" traffic you are sending in clear text."
+msgstr ""
+
+#: https//support.torproject.org/tbb/tbb-install-tor-central-server/
+#: (content/tbb/tbb-install-tor-central-server/contents+en.lrquestion.description)
+msgid "The anonymity doesn't start until you get to the Tor relay."
+msgstr ""
+
+#: https//support.torproject.org/tbb/tbb-install-tor-central-server/
+#: (content/tbb/tbb-install-tor-central-server/contents+en.lrquestion.description)
+msgid ""
+"Because of this, if you are the controller of your domain and you know "
+"everything's locked down, you will be OK, but this configuration may not be "
+"suitable for large private networks where security is key all around."
+msgstr ""
+
+#: https//support.torproject.org/tbb/tbb-install-tor-central-server/
+#: (content/tbb/tbb-install-tor-central-server/contents+en.lrquestion.description)
+msgid ""
+"Configuration is simple, editing your torrc file's SocksListenAddress "
+"according to the following examples:"
+msgstr ""
+
+#: https//support.torproject.org/tbb/tbb-install-tor-central-server/
+#: (content/tbb/tbb-install-tor-central-server/contents+en.lrquestion.description)
+msgid "SocksListenAddress 127.0.0.1"
+msgstr ""
+
+#: https//support.torproject.org/tbb/tbb-install-tor-central-server/
+#: (content/tbb/tbb-install-tor-central-server/contents+en.lrquestion.description)
+msgid "SocksListenAddress 192.168.x.x:9100"
+msgstr ""
+
+#: https//support.torproject.org/tbb/tbb-install-tor-central-server/
+#: (content/tbb/tbb-install-tor-central-server/contents+en.lrquestion.description)
+msgid "SocksListenAddress 0.0.0.0:9100"
+msgstr ""
+
+#: https//support.torproject.org/tbb/tbb-install-tor-central-server/
+#: (content/tbb/tbb-install-tor-central-server/contents+en.lrquestion.description)
+msgid ""
+"You can state multiple listen addresses, in the case that you are part of "
+"several networks or subnets."
+msgstr ""
+
+#: https//support.torproject.org/tbb/tbb-install-tor-central-server/
+#: (content/tbb/tbb-install-tor-central-server/contents+en.lrquestion.description)
+msgid "SocksListenAddress 192.168.x.x:9100 #eth0"
+msgstr ""
+
+#: https//support.torproject.org/tbb/tbb-install-tor-central-server/
+#: (content/tbb/tbb-install-tor-central-server/contents+en.lrquestion.description)
+msgid "SocksListenAddress 10.x.x.x:9100 #eth1"
+msgstr ""
+
+#: https//support.torproject.org/tbb/tbb-install-tor-central-server/
+#: (content/tbb/tbb-install-tor-central-server/contents+en.lrquestion.description)
+msgid ""
+"After this, your clients on their respective networks/subnets would specify "
+"a socks proxy with the address and port you specified SocksListenAddress to "
+"be."
+msgstr ""
+
+#: https//support.torproject.org/tbb/tbb-install-tor-central-server/
+#: (content/tbb/tbb-install-tor-central-server/contents+en.lrquestion.description)
+msgid ""
+"Please note that the SocksPort configuration option gives the port ONLY for "
+"localhost (127.0.0.1)."
+msgstr ""
+
+#: https//support.torproject.org/tbb/tbb-install-tor-central-server/
+#: (content/tbb/tbb-install-tor-central-server/contents+en.lrquestion.description)
+msgid ""
+"When setting up your SocksListenAddress(es), you need to give the port with "
+"the address, as shown above."
+msgstr ""
+
+#: https//support.torproject.org/tbb/tbb-install-tor-central-server/
+#: (content/tbb/tbb-install-tor-central-server/contents+en.lrquestion.description)
+msgid ""
+"If you are interested in forcing all outgoing data through the central Tor "
+"client/relay, instead of the server only being an optional proxy, you may "
+"find the program iptables (for *nix) useful."
+msgstr ""
+
+#: https//support.torproject.org/tbb/tbb-run-client-different-computer/
+#: (content/tbb/tbb-run-client-different-computer/contents+en.lrquestion.title)
+msgid ""
+"I want to run my Tor client on a different computer than my applications"
+msgstr ""
+
+#: https//support.torproject.org/tbb/tbb-run-client-different-computer/
+#: (content/tbb/tbb-run-client-different-computer/contents+en.lrquestion.description)
+msgid ""
+"By default, your Tor client only listens for applications that connect from "
+"localhost."
+msgstr ""
+
+#: https//support.torproject.org/tbb/tbb-run-client-different-computer/
+#: (content/tbb/tbb-run-client-different-computer/contents+en.lrquestion.description)
+msgid "Connections from other computers are refused."
+msgstr ""
+
+#: https//support.torproject.org/tbb/tbb-run-client-different-computer/
+#: (content/tbb/tbb-run-client-different-computer/contents+en.lrquestion.description)
+msgid ""
+"If you want to torify applications on different computers than the Tor "
+"client, you should edit your torrc to define `SocksListenAddress 0.0.0.0` "
+"and then restart (or hup) Tor."
+msgstr ""
+
+#: https//support.torproject.org/tbb/tbb-run-client-different-computer/
+#: (content/tbb/tbb-run-client-different-computer/contents+en.lrquestion.description)
+msgid ""
+"If you want to get more advanced, you can configure your Tor client on a "
+"firewall to bind to your internal IP but not your external IP."
+msgstr ""
+
#: https//support.torproject.org/tbb/website-blocking-tor/
#: (content/tbb/website-blocking-tor/contents+en.lrquestion.title)
msgid "A website I am trying to reach is blocking access over Tor."
@@ -7808,6 +8597,130 @@ msgid ""
"guide."
msgstr ""
+#: https//support.torproject.org/operators/default-exit-ports/
+#: (content/operators/default-exit-ports/contents+en.lrquestion.title)
+msgid "Is there a list of default exit ports?"
+msgstr ""
+
+#: https//support.torproject.org/operators/default-exit-ports/
+#: (content/operators/default-exit-ports/contents+en.lrquestion.description)
+msgid ""
+"The default open ports are listed below but keep in mind that, any port or "
+"ports can be opened by the relay operator by configuring it in torrc or "
+"modifying the source code."
+msgstr ""
+
+#: https//support.torproject.org/operators/default-exit-ports/
+#: (content/operators/default-exit-ports/contents+en.lrquestion.description)
+msgid ""
+"The default according to src/or/policies.c ([line 85][1] and [line 1901][2])"
+" from the source code release [release-0.4.6][3]:"
+msgstr ""
+
+#: https//support.torproject.org/operators/default-exit-ports/
+#: (content/operators/default-exit-ports/contents+en.lrquestion.description)
+msgid "reject 0.0.0.0/8"
+msgstr ""
+
+#: https//support.torproject.org/operators/default-exit-ports/
+#: (content/operators/default-exit-ports/contents+en.lrquestion.description)
+msgid "reject 169.254.0.0/16"
+msgstr ""
+
+#: https//support.torproject.org/operators/default-exit-ports/
+#: (content/operators/default-exit-ports/contents+en.lrquestion.description)
+msgid "reject 127.0.0.0/8"
+msgstr ""
+
+#: https//support.torproject.org/operators/default-exit-ports/
+#: (content/operators/default-exit-ports/contents+en.lrquestion.description)
+msgid "reject 192.168.0.0/16"
+msgstr ""
+
+#: https//support.torproject.org/operators/default-exit-ports/
+#: (content/operators/default-exit-ports/contents+en.lrquestion.description)
+msgid "reject 10.0.0.0/8"
+msgstr ""
+
+#: https//support.torproject.org/operators/default-exit-ports/
+#: (content/operators/default-exit-ports/contents+en.lrquestion.description)
+msgid "reject 172.16.0.0/12"
+msgstr ""
+
+#: https//support.torproject.org/operators/default-exit-ports/
+#: (content/operators/default-exit-ports/contents+en.lrquestion.description)
+msgid "reject *:25"
+msgstr ""
+
+#: https//support.torproject.org/operators/default-exit-ports/
+#: (content/operators/default-exit-ports/contents+en.lrquestion.description)
+msgid "reject *:119"
+msgstr ""
+
+#: https//support.torproject.org/operators/default-exit-ports/
+#: (content/operators/default-exit-ports/contents+en.lrquestion.description)
+msgid "reject *:135-139"
+msgstr ""
+
+#: https//support.torproject.org/operators/default-exit-ports/
+#: (content/operators/default-exit-ports/contents+en.lrquestion.description)
+msgid "reject *:445"
+msgstr ""
+
+#: https//support.torproject.org/operators/default-exit-ports/
+#: (content/operators/default-exit-ports/contents+en.lrquestion.description)
+msgid "reject *:563"
+msgstr ""
+
+#: https//support.torproject.org/operators/default-exit-ports/
+#: (content/operators/default-exit-ports/contents+en.lrquestion.description)
+msgid "reject *:1214"
+msgstr ""
+
+#: https//support.torproject.org/operators/default-exit-ports/
+#: (content/operators/default-exit-ports/contents+en.lrquestion.description)
+msgid "reject *:4661-4666"
+msgstr ""
+
+#: https//support.torproject.org/operators/default-exit-ports/
+#: (content/operators/default-exit-ports/contents+en.lrquestion.description)
+msgid "reject *:6346-6429"
+msgstr ""
+
+#: https//support.torproject.org/operators/default-exit-ports/
+#: (content/operators/default-exit-ports/contents+en.lrquestion.description)
+msgid "reject *:6699"
+msgstr ""
+
+#: https//support.torproject.org/operators/default-exit-ports/
+#: (content/operators/default-exit-ports/contents+en.lrquestion.description)
+msgid "reject *:6881-6999"
+msgstr ""
+
+#: https//support.torproject.org/operators/default-exit-ports/
+#: (content/operators/default-exit-ports/contents+en.lrquestion.description)
+msgid "accept *:*"
+msgstr ""
+
+#: https//support.torproject.org/operators/default-exit-ports/
+#: (content/operators/default-exit-ports/contents+en.lrquestion.description)
+msgid ""
+"[1]: "
+"https://gitlab.torproject.org/tpo/core/tor/-/blob/release-0.4.6/src/core/or/policies.c#L85"
+msgstr ""
+
+#: https//support.torproject.org/operators/default-exit-ports/
+#: (content/operators/default-exit-ports/contents+en.lrquestion.description)
+msgid ""
+"[2]: "
+"https://gitlab.torproject.org/tpo/core/tor/-/blob/release-0.4.6/src/core/or/policies.c#L1901"
+msgstr ""
+
+#: https//support.torproject.org/operators/default-exit-ports/
+#: (content/operators/default-exit-ports/contents+en.lrquestion.description)
+msgid "[3]: https://gitlab.torproject.org/tpo/core/tor/-/tree/release-0.4.6/"
+msgstr ""
+
#: https//support.torproject.org/operators/dynamic-ip/
#: (content/operators/dynamic-ip/contents+en.lrquestion.title)
msgid "Can I run a Tor relay using a dynamic IP address?"
@@ -8001,21 +8914,6 @@ msgstr ""
"à´à´´à´¿à´¯à´¿à´²àµà´²àµà´¨àµà´¨àµ നിà´àµà´àµ¾â à´à´£àµà´àµà´¤àµà´¤à´¿à´¯àµà´àµà´à´¾à´, à´à´¤àµ à´²àµà´à´¿à´²àµ à´ à´àµ»âà´àµà´°à´¿ "
"à´¸àµà´à´¿à´ªàµà´ªà´¿à´àµà´àµà´¨àµà´¨àµ:"
-#: https//support.torproject.org/operators/hibernation/
-#: (content/operators/hibernation/contents+en.lrquestion.description)
-#: https//support.torproject.org/operators/limit-total-bandwidth/
-#: (content/operators/limit-total-bandwidth/contents+en.lrquestion.description)
-#: https//support.torproject.org/misc/bug-or-feedback/
-#: (content/misc/bug-or-feedback/contents+en.lrquestion.description)
-#: https//support.torproject.org/get-in-touch/why-i-cant-join-tor-channels/
-#: (content/get-in-touch/why-i-cant-join-tor-channels/contents+en.lrquestion.description)
-#: https//support.torproject.org/apt/tor-deb-repo/
-#: (content/apt/apt-1/contents+en.lrquestion.description)
-#: https//support.torproject.org/apt/apt-over-tor/
-#: (content/apt/apt-3/contents+en.lrquestion.description)
-msgid "```"
-msgstr "```"
-
#: https//support.torproject.org/operators/hibernation/
#: (content/operators/hibernation/contents+en.lrquestion.description)
msgid "Bandwidth soft limit reached; commencing hibernation."
@@ -10608,6 +11506,131 @@ msgstr "uid tor-security at lists.torproject.org"
msgid "sub 4096R/C00942E4 2017-03-13"
msgstr "sub 4096R/C00942E4 2017-03-13"
+#: https//support.torproject.org/misc/check-socks-dns-leaks/
+#: (content/misc/check-socks-dns-leaks/contents+en.lrquestion.title)
+msgid ""
+"How do I check if my application that uses SOCKS is leaking DNS requests?"
+msgstr ""
+
+#: https//support.torproject.org/misc/check-socks-dns-leaks/
+#: (content/misc/check-socks-dns-leaks/contents+en.lrquestion.description)
+msgid ""
+"Even if your application is using the correct variant of the SOCKS protocol,"
+" there is still a risk that it could be leaking DNS queries."
+msgstr ""
+
+#: https//support.torproject.org/misc/check-socks-dns-leaks/
+#: (content/misc/check-socks-dns-leaks/contents+en.lrquestion.description)
+msgid ""
+"This problem happens in Firefox extensions that resolve the destination "
+"hostname themselves, for example to show you its IP address, what country "
+"it's in, etc."
+msgstr ""
+
+#: https//support.torproject.org/misc/check-socks-dns-leaks/
+#: (content/misc/check-socks-dns-leaks/contents+en.lrquestion.description)
+msgid ""
+"If you suspect your application might behave like this, follow the "
+"instructions below to check."
+msgstr ""
+
+#: https//support.torproject.org/misc/check-socks-dns-leaks/
+#: (content/misc/check-socks-dns-leaks/contents+en.lrquestion.description)
+msgid ""
+"1. Add `TestSocks 1` to your [torrc file](https://support.torproject.org/tbb"
+"/tbb-editing-torrc/)."
+msgstr ""
+
+#: https//support.torproject.org/misc/check-socks-dns-leaks/
+#: (content/misc/check-socks-dns-leaks/contents+en.lrquestion.description)
+msgid ""
+"1. Start Tor, and point your program's SOCKS proxy settings to Tor's SOCKS5 "
+"server (`socks5://127.0.0.1:9050` by default)."
+msgstr ""
+
+#: https//support.torproject.org/misc/check-socks-dns-leaks/
+#: (content/misc/check-socks-dns-leaks/contents+en.lrquestion.description)
+msgid ""
+"1. Watch your logs as you use your application. For each socks connection, "
+"Tor will log a `notice` for safe connections, and a `warn` for connections "
+"leaking DNS requests."
+msgstr ""
+
+#: https//support.torproject.org/misc/check-socks-dns-leaks/
+#: (content/misc/check-socks-dns-leaks/contents+en.lrquestion.description)
+msgid ""
+"If you want to automatically disable all connections leaking DNS requests, "
+"set `SafeSocks 1` in your torrc file."
+msgstr ""
+
+#: https//support.torproject.org/misc/hide-exits/
+#: (content/misc/hide-exits/contents+en.lrquestion.title)
+msgid ""
+"You should hide the list of Tor relays, so people can't block the exits."
+msgstr ""
+
+#: https//support.torproject.org/misc/hide-exits/
+#: (content/misc/hide-exits/contents+en.lrquestion.description)
+msgid "There are a few reasons we don't:"
+msgstr ""
+
+#: https//support.torproject.org/misc/hide-exits/
+#: (content/misc/hide-exits/contents+en.lrquestion.description)
+msgid ""
+"1. We can't help but make the information available, since Tor clients need "
+"to use it to pick their paths."
+msgstr ""
+
+#: https//support.torproject.org/misc/hide-exits/
+#: (content/misc/hide-exits/contents+en.lrquestion.description)
+msgid "So if the \"blockers\" want it, they can get it anyway."
+msgstr ""
+
+#: https//support.torproject.org/misc/hide-exits/
+#: (content/misc/hide-exits/contents+en.lrquestion.description)
+msgid ""
+"Further, even if we didn't tell clients about the list of relays directly, "
+"somebody could still make a lot of connections through Tor to a test site "
+"and build a list of the addresses they see."
+msgstr ""
+
+#: https//support.torproject.org/misc/hide-exits/
+#: (content/misc/hide-exits/contents+en.lrquestion.description)
+msgid ""
+"1. If people want to block us, we believe that they should be allowed to do "
+"so."
+msgstr ""
+
+#: https//support.torproject.org/misc/hide-exits/
+#: (content/misc/hide-exits/contents+en.lrquestion.description)
+msgid ""
+"Obviously, we would prefer for everybody to allow Tor users to connect to "
+"them, but people have the right to decide who their services should allow "
+"connections from, and if they want to block anonymous users, they can."
+msgstr ""
+
+#: https//support.torproject.org/misc/hide-exits/
+#: (content/misc/hide-exits/contents+en.lrquestion.description)
+msgid ""
+"1. Being blockable also has tactical advantages: it may be a persuasive "
+"response to website maintainers who feel threatened by Tor."
+msgstr ""
+
+#: https//support.torproject.org/misc/hide-exits/
+#: (content/misc/hide-exits/contents+en.lrquestion.description)
+msgid ""
+"Giving them the option may inspire them to stop and think about whether they"
+" really want to eliminate private access to their system, and if not, what "
+"other options they might have."
+msgstr ""
+
+#: https//support.torproject.org/misc/hide-exits/
+#: (content/misc/hide-exits/contents+en.lrquestion.description)
+msgid ""
+"The time they might otherwise have spent blocking Tor, they may instead "
+"spend rethinking their overall approach to privacy and anonymity."
+msgstr ""
+
#: https//support.torproject.org/misc/menu/
#: (content/misc/menu/contents+en.lrquestion.description)
msgid "About"
@@ -11336,68 +12359,21 @@ msgstr "### How to verify your nickname"
#: https//support.torproject.org/get-in-touch/why-i-cant-join-tor-channels/
#: (content/get-in-touch/why-i-cant-join-tor-channels/contents+en.lrquestion.description)
msgid ""
-"Then, to complete the registration and ultimately gain access to the #tor-"
-"project channel, your nickname must be **verified**."
-msgstr ""
-"à´¤àµà´àµ¼à´¨àµà´¨àµ, à´°à´à´¿à´¸àµà´àµà´°àµà´·àµ» à´ªàµàµ¼à´¤àµà´¤à´¿à´¯à´¾à´àµà´à´¿ #tor-project à´à´¾à´¨à´²à´¿à´²àµà´àµà´àµ à´à´àµà´¸à´¸àµ "
-"à´¨àµà´àµà´¨àµà´¨à´¤à´¿à´¨àµ, നിà´àµà´à´³àµà´àµ വിളിപàµà´ªàµà´°àµ ** പരിശàµà´§à´¿à´àµà´àµà´±à´ªàµà´ªà´¿à´àµà´à´£à´ **."
-
-#: https//support.torproject.org/get-in-touch/why-i-cant-join-tor-channels/
-#: (content/get-in-touch/why-i-cant-join-tor-channels/contents+en.lrquestion.description)
-msgid ""
-"1. To verify your nick, open a new browser window and go to "
-"https://webchat.oftc.net/?channels=tor."
-msgstr ""
-
-#: https//support.torproject.org/get-in-touch/why-i-cant-join-tor-channels/
-#: (content/get-in-touch/why-i-cant-join-tor-channels/contents+en.lrquestion.description)
-msgid "2. Log in with your IRC nickname and password."
-msgstr "2. നിà´àµà´à´³àµà´àµ à´à´àµ¼âസി വിളിപàµà´ªàµà´°àµà´ പാസàµâà´µàµà´¡àµà´ à´à´ªà´¯àµà´à´¿à´àµà´àµ à´ªàµà´°à´µàµà´¶à´¿à´àµà´àµà´."
-
-#: https//support.torproject.org/get-in-touch/why-i-cant-join-tor-channels/
-#: (content/get-in-touch/why-i-cant-join-tor-channels/contents+en.lrquestion.description)
-msgid ""
-"3. Look for the word **verify** and log in there. It may appear that nothing"
-" has happened. Look at the top of the page, and there will be a column "
-"called **Account**."
-msgstr ""
-"3.  **verify** à´à´¨àµà´¨ വാà´àµà´àµ à´¨àµà´àµà´à´¿ à´
വിà´àµ à´ªàµà´°à´µàµà´¶à´¿à´àµà´àµà´. à´à´¨àµà´¨àµà´ "
-"à´¸à´à´à´µà´¿à´àµà´à´¿à´àµà´à´¿à´²àµà´²àµà´¨àµà´¨àµ à´¤àµà´¨àµà´¨à´¾à´. à´ªàµà´à´¿à´¨àµà´±àµ à´®àµà´à´³à´¿àµ½ à´¨àµà´àµà´àµà´, **Account** à´à´¨àµà´¨ à´à´°àµ"
-" നിര à´à´£àµà´à´¾à´àµà´."
-
-#: https//support.torproject.org/get-in-touch/why-i-cant-join-tor-channels/
-#: (content/get-in-touch/why-i-cant-join-tor-channels/contents+en.lrquestion.description)
-msgid "4. Click on **Account**."
-msgstr "4. **Account** à´àµà´²à´¿à´àµà´àµà´àµà´¯àµà´¯àµà´."
-
-#: https//support.torproject.org/get-in-touch/why-i-cant-join-tor-channels/
-#: (content/get-in-touch/why-i-cant-join-tor-channels/contents+en.lrquestion.description)
-msgid ""
-"5. Click on the small sentence at the bottom of the square that says: Verify"
-" account."
-msgstr ""
-"5. à´à´¤àµà´°à´¤àµà´¤à´¿à´¨àµà´±àµ à´àµà´µà´àµà´¯àµà´³àµà´³ à´àµà´±à´¿à´¯ വാà´àµà´¯à´¤àµà´¤à´¿àµ½ à´àµà´²à´¿à´àµà´àµà´àµà´¯àµà´¯àµà´: à´
à´àµà´àµà´£àµà´àµ "
-"പരിശàµà´§à´¿à´àµà´àµà´."
-
-#: https//support.torproject.org/get-in-touch/why-i-cant-join-tor-channels/
-#: (content/get-in-touch/why-i-cant-join-tor-channels/contents+en.lrquestion.description)
-msgid "6. Fill out the Captcha that pops up, and click ok."
+"After registering your nickname, to gain access to the #tor-project and "
+"other protected channels, your nickname must be **verified**."
msgstr ""
#: https//support.torproject.org/get-in-touch/why-i-cant-join-tor-channels/
#: (content/get-in-touch/why-i-cant-join-tor-channels/contents+en.lrquestion.description)
msgid ""
-"7. A tiny message will appear: \"Your NickServ account has been verified.\""
+"1. Go to https://services.oftc.net/ and follow the steps in the '*To verify "
+"your account*' section"
msgstr ""
-"7. à´à´°àµ à´àµà´±à´¿à´¯ സനàµà´¦àµà´¶à´ à´¦àµà´¶àµà´¯à´®à´¾à´àµà´: \"Your NickServ account has been "
-"verified.\""
#: https//support.torproject.org/get-in-touch/why-i-cant-join-tor-channels/
#: (content/get-in-touch/why-i-cant-join-tor-channels/contents+en.lrquestion.description)
-msgid "8. Go back to the IRC webpage where you are logged in and type:"
+msgid "2. Go back to the IRC webpage where you are logged in and type:"
msgstr ""
-"8. നിà´àµà´àµ¾ à´²àµà´à´¿àµ» à´àµà´¯àµà´¤à´¿à´àµà´àµà´³àµà´³ à´à´àµ¼âസി à´µàµà´¬àµâà´ªàµà´à´¿à´²àµà´àµà´àµ തിരിà´àµ à´ªàµà´¯à´¿ à´àµà´ªàµà´ªàµ "
-"à´àµà´¯àµà´¯àµà´:"
#: https//support.torproject.org/get-in-touch/why-i-cant-join-tor-channels/
#: (content/get-in-touch/why-i-cant-join-tor-channels/contents+en.lrquestion.description)
@@ -11406,14 +12382,13 @@ msgstr "`/msg nickserv checkverify`"
#: https//support.torproject.org/get-in-touch/why-i-cant-join-tor-channels/
#: (content/get-in-touch/why-i-cant-join-tor-channels/contents+en.lrquestion.description)
-msgid "9. Click ENTER."
-msgstr "9. ENTER à´àµà´²à´¿à´àµà´àµà´àµà´¯àµà´¯àµà´."
+msgid "3. Click ENTER."
+msgstr ""
#: https//support.torproject.org/get-in-touch/why-i-cant-join-tor-channels/
#: (content/get-in-touch/why-i-cant-join-tor-channels/contents+en.lrquestion.description)
-msgid "10. If all is well, you will receive a message that says:"
+msgid "4. If all is well, you will receive a message that says:"
msgstr ""
-"10. à´à´²àµà´²à´¾à´ ശരിയാണàµà´àµà´à´¿àµ½, à´à´¨à´¿à´ªàµà´ªà´±à´¯àµà´¨àµà´¨ à´à´°àµ സനàµà´¦àµà´¶à´ നിà´àµà´àµ¾à´àµà´àµ à´²à´à´¿à´àµà´àµà´:"
#: https//support.torproject.org/get-in-touch/why-i-cant-join-tor-channels/
#: (content/get-in-touch/why-i-cant-join-tor-channels/contents+en.lrquestion.description)
@@ -11564,21 +12539,23 @@ msgstr "# apt install apt-transport-https"
#: https//support.torproject.org/apt/tor-deb-repo/
#: (content/apt/apt-1/contents+en.lrquestion.description)
msgid ""
-"#### 2. Add the following entries to `/etc/apt/sources.list` or a new file "
-"in `/etc/apt/sources.list.d/`"
+"#### 2. Create a new file in `/etc/apt/sources.list.d/` named `tor.list`. "
+"Add the following entries:"
msgstr ""
-"#### 2. à´à´¨à´¿à´ªàµà´ªà´±à´¯àµà´¨àµà´¨ à´àµ»âà´àµà´°à´¿à´àµ¾â `/etc/apt/sources.list` à´
à´²àµà´²àµà´àµà´à´¿àµ½â "
-"`/etc/apt/sources.list.d/` à´à´¨àµà´¨à´¤à´¿à´²àµ à´à´°àµ à´ªàµà´¤à´¿à´¯ ഫയൽâ à´àµàµ¼âà´àµà´àµà´."
#: https//support.torproject.org/apt/tor-deb-repo/
#: (content/apt/apt-1/contents+en.lrquestion.description)
-msgid "deb https://deb.torproject.org/torproject.org <DISTRIBUTION> main"
+msgid ""
+"deb [signed-by=/usr/share/keyrings/tor-archive-keyring.gpg] "
+"https://deb.torproject.org/torproject.org <DISTRIBUTION> main"
msgstr ""
#: https//support.torproject.org/apt/tor-deb-repo/
#: (content/apt/apt-1/contents+en.lrquestion.description)
-msgid "deb-src https://deb.torproject.org/torproject.org <DISTRIBUTION> main"
-msgstr "deb-src https://deb.torproject.org/torproject.org <DISTRIBUTION> main"
+msgid ""
+"deb-src [signed-by=/usr/share/keyrings/tor-archive-keyring.gpg] "
+"https://deb.torproject.org/torproject.org <DISTRIBUTION> main"
+msgstr ""
#: https//support.torproject.org/apt/tor-deb-repo/
#: (content/apt/apt-1/contents+en.lrquestion.description)
@@ -11591,14 +12568,16 @@ msgstr ""
#: https//support.torproject.org/apt/tor-deb-repo/
#: (content/apt/apt-1/contents+en.lrquestion.description)
msgid ""
-"deb https://deb.torproject.org/torproject.org tor-"
+"deb [signed-by=/usr/share/keyrings/tor-archive-keyring.gpg] "
+"https://deb.torproject.org/torproject.org tor-"
"experimental-0.4.6.x-<DISTRIBUTION> main"
msgstr ""
#: https//support.torproject.org/apt/tor-deb-repo/
#: (content/apt/apt-1/contents+en.lrquestion.description)
msgid ""
-"deb-src https://deb.torproject.org/torproject.org tor-"
+"deb-src [signed-by=/usr/share/keyrings/tor-archive-keyring.gpg] "
+"https://deb.torproject.org/torproject.org tor-"
"experimental-0.4.6.x-<DISTRIBUTION> main"
msgstr ""
@@ -11610,18 +12589,18 @@ msgstr "à´
à´²àµà´²àµà´àµà´à´¿àµ½ രാതàµà´°à´¿ ബിൽഡàµà´àµ¾:
#: https//support.torproject.org/apt/tor-deb-repo/
#: (content/apt/apt-1/contents+en.lrquestion.description)
msgid ""
-"deb https://deb.torproject.org/torproject.org tor-nightly-"
-"master-<DISTRIBUTION> main"
+"deb [signed-by=/usr/share/keyrings/tor-archive-keyring.gpg] "
+"https://deb.torproject.org/torproject.org tor-nightly-master-<DISTRIBUTION> "
+"main"
msgstr ""
#: https//support.torproject.org/apt/tor-deb-repo/
#: (content/apt/apt-1/contents+en.lrquestion.description)
msgid ""
-"deb-src https://deb.torproject.org/torproject.org tor-nightly-"
-"master-<DISTRIBUTION> main"
+"deb-src [signed-by=/usr/share/keyrings/tor-archive-keyring.gpg] "
+"https://deb.torproject.org/torproject.org tor-nightly-master-<DISTRIBUTION> "
+"main"
msgstr ""
-"deb-src https://deb.torproject.org/torproject.org tor-nightly-"
-"master-<DISTRIBUTION> main"
#: https//support.torproject.org/apt/tor-deb-repo/
#: (content/apt/apt-1/contents+en.lrquestion.description)
@@ -11641,13 +12620,15 @@ msgstr ""
#: https//support.torproject.org/apt/tor-deb-repo/
#: (content/apt/apt-1/contents+en.lrquestion.description)
msgid ""
-"deb [arch=amd64] https://deb.torproject.org/torproject.org focal main"
+"deb [arch=amd64 signed-by=/usr/share/keyrings/tor-archive-keyring.gpg] "
+"https://deb.torproject.org/torproject.org focal main"
msgstr ""
#: https//support.torproject.org/apt/tor-deb-repo/
#: (content/apt/apt-1/contents+en.lrquestion.description)
msgid ""
-"deb-src [arch=amd64] https://deb.torproject.org/torproject.org focal main"
+"deb-src [arch=amd64 signed-by=/usr/share/keyrings/tor-archive-keyring.gpg] "
+"https://deb.torproject.org/torproject.org focal main"
msgstr ""
#: https//support.torproject.org/apt/tor-deb-repo/
@@ -11667,26 +12648,18 @@ msgstr ""
#: (content/apt/apt-1/contents+en.lrquestion.description)
msgid ""
"#### 3. Then add the gpg key used to sign the packages by running the "
-"following commands at your command prompt"
+"following command at your command prompt:"
msgstr ""
-"#### 3. à´¤àµà´àµ¼à´¨àµà´¨àµ നിà´àµà´à´³àµà´àµ à´à´®à´¾àµ»à´¡àµ à´ªàµà´°àµà´à´ªàµà´±àµà´±à´¿àµ½ à´à´¨à´¿à´ªàµà´ªà´±à´¯àµà´¨àµà´¨ à´à´®à´¾àµ»à´¡àµà´àµ¾ "
-"à´ªàµà´°à´µàµ¼à´¤àµà´¤à´¿à´ªàµà´ªà´¿à´àµà´àµ പാà´àµà´àµà´àµà´à´³à´¿àµ½ à´à´ªàµà´ªà´¿à´à´¾àµ» à´à´ªà´¯àµà´à´¿à´àµà´àµà´¨àµà´¨ gpg à´àµ à´àµàµ¼à´àµà´àµà´"
#: https//support.torproject.org/apt/tor-deb-repo/
#: (content/apt/apt-1/contents+en.lrquestion.description)
msgid ""
-"# wget -qO- "
+"# wget -O- "
"https://deb.torproject.org/torproject.org/A3C4F0F979CAA22CDBA8F512EE8CBC9E886DDD89.asc"
-" | gpg --import"
+" | gpg --dearmor | tee /usr/share/keyrings/tor-archive-keyring.gpg "
+">/dev/null"
msgstr ""
-#: https//support.torproject.org/apt/tor-deb-repo/
-#: (content/apt/apt-1/contents+en.lrquestion.description)
-msgid ""
-"# gpg --export A3C4F0F979CAA22CDBA8F512EE8CBC9E886DDD89 | apt-key add -"
-msgstr ""
-"# gpg --export A3C4F0F979CAA22CDBA8F512EE8CBC9E886DDD89 | apt-key add -"
-
#: https//support.torproject.org/apt/tor-deb-repo/
#: (content/apt/apt-1/contents+en.lrquestion.description)
msgid "#### 4. Install tor and tor debian keyring"
@@ -13295,6 +14268,82 @@ msgid ""
"doesn't change IP address over the day."
msgstr ""
+#: https//support.torproject.org/alternate-designs/block-websites/
+#: (content/alternate-designs/block-websites/contents+en.lrquestion.title)
+msgid "Exit policies should be able to block websites, not just IP addresses."
+msgstr ""
+
+#: https//support.torproject.org/alternate-designs/block-websites/
+#: (content/alternate-designs/block-websites/contents+en.lrquestion.description)
+msgid ""
+"It would be nice to let relay operators say things like `reject "
+"www.slashdot.org` in their exit policies, rather than requiring them to "
+"learn all the IP address space that could be covered by the site (and then "
+"also blocking other sites at those IP addresses)."
+msgstr ""
+
+#: https//support.torproject.org/alternate-designs/block-websites/
+#: (content/alternate-designs/block-websites/contents+en.lrquestion.description)
+msgid "There are two problems, though."
+msgstr ""
+
+#: https//support.torproject.org/alternate-designs/block-websites/
+#: (content/alternate-designs/block-websites/contents+en.lrquestion.description)
+msgid "First, users could still get around these blocks."
+msgstr ""
+
+#: https//support.torproject.org/alternate-designs/block-websites/
+#: (content/alternate-designs/block-websites/contents+en.lrquestion.description)
+msgid ""
+"For example, they could request the IP address rather than the hostname when"
+" they exit from the Tor network."
+msgstr ""
+
+#: https//support.torproject.org/alternate-designs/block-websites/
+#: (content/alternate-designs/block-websites/contents+en.lrquestion.description)
+msgid ""
+"This means operators would still need to learn all the IP addresses for the "
+"destinations in question."
+msgstr ""
+
+#: https//support.torproject.org/alternate-designs/block-websites/
+#: (content/alternate-designs/block-websites/contents+en.lrquestion.description)
+msgid ""
+"The second problem is that it would allow remote attackers to censor "
+"arbitrary sites."
+msgstr ""
+
+#: https//support.torproject.org/alternate-designs/block-websites/
+#: (content/alternate-designs/block-websites/contents+en.lrquestion.description)
+msgid ""
+"For example, if a Tor operator blocks www1.slashdot.org, and then some "
+"attacker poisons the Tor relay's DNS or otherwise changes that hostname to "
+"resolve to the IP address for a major news site, then suddenly that Tor "
+"relay is blocking the news site."
+msgstr ""
+
+#: https//support.torproject.org/alternate-designs/let-the-network-pick-the-path/
+#: (content/alternate-designs/let-the-network-pick-the-path/contents+en.lrquestion.title)
+msgid "You should let the network pick the path, not the client."
+msgstr ""
+
+#: https//support.torproject.org/alternate-designs/let-the-network-pick-the-path/
+#: (content/alternate-designs/let-the-network-pick-the-path/contents+en.lrquestion.description)
+msgid "No, you cannot trust the network to pick the path."
+msgstr ""
+
+#: https//support.torproject.org/alternate-designs/let-the-network-pick-the-path/
+#: (content/alternate-designs/let-the-network-pick-the-path/contents+en.lrquestion.description)
+msgid "Malicious relays could route you through their colluding friends."
+msgstr ""
+
+#: https//support.torproject.org/alternate-designs/let-the-network-pick-the-path/
+#: (content/alternate-designs/let-the-network-pick-the-path/contents+en.lrquestion.description)
+msgid ""
+"This would give an adversary the ability to watch all of your traffic end to"
+" end."
+msgstr ""
+
#: lego/templates/banner.html:3 lego/templates/banner.html:5
#: templates/banner.html:3 templates/banner.html:5
msgid "Close banner"
@@ -13325,8 +14374,8 @@ msgid "DONATE NOW"
msgstr "à´à´ªàµà´ªàµà´¾àµ¾ ദാനഠà´àµà´¯àµà´¯àµ"
#: lego/templates/footer.html:13 lego/templates/footer.html:22
-#: lego/templates/navbar.html:83 templates/footer.html:13
-#: templates/footer.html:22 templates/navbar.html:83
+#: lego/templates/navbar.html:95 templates/footer.html:13
+#: templates/footer.html:22 templates/navbar.html:95
msgid "Download Tor Browser"
msgstr "à´àµàµ¼ à´¬àµà´°àµà´¸àµ¼ à´¡àµàµºà´²àµà´¡àµà´àµà´¯àµà´¯àµà´"
diff --git a/contents+ms.po b/contents+ms.po
index c924aa56bf..d430a8e115 100644
--- a/contents+ms.po
+++ b/contents+ms.po
@@ -10,7 +10,7 @@ msgid ""
msgstr ""
"Project-Id-Version: PACKAGE VERSION\n"
"Report-Msgid-Bugs-To: \n"
-"POT-Creation-Date: 2021-08-25 11:14+CET\n"
+"POT-Creation-Date: 2021-09-01 12:20+CET\n"
"PO-Revision-Date: 2018-10-02 22:41+0000\n"
"Last-Translator: Emma Peel, 2021\n"
"Language-Team: Malay (Malaysia) (https://www.transifex.com/otf/teams/1519/ms_MY/)\n"
@@ -143,6 +143,11 @@ msgstr ""
msgid "Tor Metrics"
msgstr ""
+#: https//support.torproject.org/alternate-designs/
+#: (content/alternate-designs/contents+en.lrtopic.title)
+msgid "Alternate Designs We Don't Do (Yet)"
+msgstr ""
+
#: https//support.torproject.org/glossary/add-on-extension-or-plugin/
#: (content/glossary/add-on-extension-or-plugin/contents+en.lrword.term)
msgid "add-on, extension, or plugin"
@@ -2030,6 +2035,61 @@ msgid ""
"wiki](https://trac.torproject.org/projects/tor/wiki/doc/TorPlusVPN)."
msgstr ""
+#: https//support.torproject.org/faq/relay-donations/
+#: (content/faq/relay-donations/contents+en.lrquestion.title)
+msgid "Can I donate for a relay rather than run my own?"
+msgstr ""
+
+#: https//support.torproject.org/faq/relay-donations/
+#: (content/faq/relay-donations/contents+en.lrquestion.description)
+msgid ""
+"Sure! We have a [list of organizations that run Tor "
+"relays](https://community.torproject.org/relay/community-resources/relay-"
+"associations/) that are happy to turn your donations into better speed and "
+"anonymity for the Tor network."
+msgstr ""
+
+#: https//support.torproject.org/faq/relay-donations/
+#: (content/faq/relay-donations/contents+en.lrquestion.description)
+msgid ""
+"These organizations are not the same as [The Tor Project, "
+"Inc](https://donate.torproject.org/), but we consider that a good thing."
+msgstr ""
+
+#: https//support.torproject.org/faq/relay-donations/
+#: (content/faq/relay-donations/contents+en.lrquestion.description)
+msgid "They're run by nice people who are part of the Tor community."
+msgstr ""
+
+#: https//support.torproject.org/faq/relay-donations/
+#: (content/faq/relay-donations/contents+en.lrquestion.description)
+msgid ""
+"Note that there can be a tradeoff here between anonymity and performance."
+msgstr ""
+
+#: https//support.torproject.org/faq/relay-donations/
+#: (content/faq/relay-donations/contents+en.lrquestion.description)
+msgid ""
+"The Tor network's anonymity comes in part from diversity, so if you are in a"
+" position to run your own relay, you will be improving Tor's anonymity more "
+"than by donating."
+msgstr ""
+
+#: https//support.torproject.org/faq/relay-donations/
+#: (content/faq/relay-donations/contents+en.lrquestion.description)
+msgid ""
+"At the same time though, economies of scale for bandwidth mean that "
+"combining many small donations into several larger relays is more efficient "
+"at improving network performance."
+msgstr ""
+
+#: https//support.torproject.org/faq/relay-donations/
+#: (content/faq/relay-donations/contents+en.lrquestion.description)
+msgid ""
+"Improving anonymity and improving performance are both worthwhile goals, so "
+"however you can help is great!"
+msgstr ""
+
#: https//support.torproject.org/faq/staying-anonymous/
#: (content/faq/staying-anonymous/contents+en.lrquestion.title)
msgid "Am I totally anonymous if I use Tor?"
@@ -2333,6 +2393,61 @@ msgid ""
" documenting all the issues](https://community.torproject.org/)."
msgstr ""
+#: https//support.torproject.org/about/attacks-on-onion-routing/
+#: (content/about/attacks-on-onion-routing/contents+en.lrquestion.title)
+msgid "What attacks remain against onion routing?"
+msgstr ""
+
+#: https//support.torproject.org/about/attacks-on-onion-routing/
+#: (content/about/attacks-on-onion-routing/contents+en.lrquestion.description)
+msgid ""
+"As mentioned above, it is possible for an observer who can view both you and"
+" either the destination website or your Tor exit node to correlate timings "
+"of your traffic as it enters the Tor network and also as it exits."
+msgstr ""
+
+#: https//support.torproject.org/about/attacks-on-onion-routing/
+#: (content/about/attacks-on-onion-routing/contents+en.lrquestion.description)
+msgid "Tor does not defend against such a threat model."
+msgstr ""
+
+#: https//support.torproject.org/about/attacks-on-onion-routing/
+#: (content/about/attacks-on-onion-routing/contents+en.lrquestion.description)
+msgid ""
+"In a more limited sense, note that if a censor or law enforcement agency has"
+" the ability to obtain specific observation of parts of the network, it is "
+"possible for them to verify a suspicion that you talk regularly to your "
+"friend by observing traffic at both ends and correlating the timing of only "
+"that traffic."
+msgstr ""
+
+#: https//support.torproject.org/about/attacks-on-onion-routing/
+#: (content/about/attacks-on-onion-routing/contents+en.lrquestion.description)
+msgid ""
+"Again, this is only useful to verify that parties already suspected of "
+"communicating with one another are doing so."
+msgstr ""
+
+#: https//support.torproject.org/about/attacks-on-onion-routing/
+#: (content/about/attacks-on-onion-routing/contents+en.lrquestion.description)
+msgid ""
+"In most countries, the suspicion required to obtain a warrant already "
+"carries more weight than timing correlation would provide."
+msgstr ""
+
+#: https//support.torproject.org/about/attacks-on-onion-routing/
+#: (content/about/attacks-on-onion-routing/contents+en.lrquestion.description)
+msgid ""
+"Furthermore, since Tor reuses circuits for multiple TCP connections, it is "
+"possible to associate non anonymous and anonymous traffic at a given exit "
+"node, so be careful about what applications you run concurrently over Tor."
+msgstr ""
+
+#: https//support.torproject.org/about/attacks-on-onion-routing/
+#: (content/about/attacks-on-onion-routing/contents+en.lrquestion.description)
+msgid "Perhaps even run separate Tor clients for these applications."
+msgstr ""
+
#: https//support.torproject.org/about/backdoor/
#: (content/about/backdoor/contents+en.lrquestion.title)
msgid "Is there a backdoor in Tor?"
@@ -2468,6 +2583,43 @@ msgid ""
"recommended](/tbb/tbb-9/)."
msgstr ""
+#: https//support.torproject.org/about/change-paths/
+#: (content/about/change-paths/contents+en.lrquestion.title)
+msgid "How often does Tor change its paths?"
+msgstr ""
+
+#: https//support.torproject.org/about/change-paths/
+#: (content/about/change-paths/contents+en.lrquestion.description)
+msgid ""
+"Tor will reuse the same circuit for new TCP streams for 10 minutes, as long "
+"as the circuit is working fine."
+msgstr ""
+
+#: https//support.torproject.org/about/change-paths/
+#: (content/about/change-paths/contents+en.lrquestion.description)
+msgid "(If the circuit fails, Tor will switch to a new circuit immediately.)"
+msgstr ""
+
+#: https//support.torproject.org/about/change-paths/
+#: (content/about/change-paths/contents+en.lrquestion.description)
+msgid ""
+"But note that a single TCP stream (e.g. a long IRC connection) will stay on "
+"the same circuit forever."
+msgstr ""
+
+#: https//support.torproject.org/about/change-paths/
+#: (content/about/change-paths/contents+en.lrquestion.description)
+msgid "We don't rotate individual streams from one circuit to the next."
+msgstr ""
+
+#: https//support.torproject.org/about/change-paths/
+#: (content/about/change-paths/contents+en.lrquestion.description)
+msgid ""
+"Otherwise, an adversary with a partial view of the network would be given "
+"many chances over time to link you to your destination, rather than just one"
+" chance."
+msgstr ""
+
#: https//support.torproject.org/about/distribute-tor/
#: (content/about/distribute-tor/contents+en.lrquestion.title)
msgid "Can I distribute Tor?"
@@ -2563,6 +2715,133 @@ msgid ""
"details."
msgstr ""
+#: https//support.torproject.org/about/entry-guards/
+#: (content/about/entry-guards/contents+en.lrquestion.title)
+msgid "What are Entry Guards?"
+msgstr ""
+
+#: https//support.torproject.org/about/entry-guards/
+#: (content/about/entry-guards/contents+en.lrquestion.description)
+msgid ""
+"Tor (like all current practical low-latency anonymity designs) fails when "
+"the attacker can see both ends of the communications channel."
+msgstr ""
+
+#: https//support.torproject.org/about/entry-guards/
+#: (content/about/entry-guards/contents+en.lrquestion.description)
+msgid ""
+"For example, suppose the attacker controls or watches the Tor relay you "
+"choose to enter the network, and also controls or watches the website you "
+"visit."
+msgstr ""
+
+#: https//support.torproject.org/about/entry-guards/
+#: (content/about/entry-guards/contents+en.lrquestion.description)
+msgid ""
+"In this case, the research community knows no practical low-latency design "
+"that can reliably stop the attacker from correlating volume and timing "
+"information on the two sides."
+msgstr ""
+
+#: https//support.torproject.org/about/entry-guards/
+#: (content/about/entry-guards/contents+en.lrquestion.description)
+msgid "So, what should we do?"
+msgstr ""
+
+#: https//support.torproject.org/about/entry-guards/
+#: (content/about/entry-guards/contents+en.lrquestion.description)
+msgid "Suppose the attacker controls, or can observe, C relays."
+msgstr ""
+
+#: https//support.torproject.org/about/entry-guards/
+#: (content/about/entry-guards/contents+en.lrquestion.description)
+msgid "Suppose there are N relays total."
+msgstr ""
+
+#: https//support.torproject.org/about/entry-guards/
+#: (content/about/entry-guards/contents+en.lrquestion.description)
+msgid ""
+"If you select new entry and exit relays each time you use the network, the "
+"attacker will be able to correlate all traffic you send with probability "
+"around (c/n)2."
+msgstr ""
+
+#: https//support.torproject.org/about/entry-guards/
+#: (content/about/entry-guards/contents+en.lrquestion.description)
+msgid ""
+"But profiling is, for most users, as bad as being traced all the time: they "
+"want to do something often without an attacker noticing, and the attacker "
+"noticing once is as bad as the attacker noticing more often."
+msgstr ""
+
+#: https//support.torproject.org/about/entry-guards/
+#: (content/about/entry-guards/contents+en.lrquestion.description)
+msgid ""
+"Thus, choosing many random entries and exits gives the user no chance of "
+"escaping profiling by this kind of attacker."
+msgstr ""
+
+#: https//support.torproject.org/about/entry-guards/
+#: (content/about/entry-guards/contents+en.lrquestion.description)
+msgid ""
+"The solution is \"entry guards\": each Tor client selects a few relays at "
+"random to use as entry points, and uses only those relays for their first "
+"hop."
+msgstr ""
+
+#: https//support.torproject.org/about/entry-guards/
+#: (content/about/entry-guards/contents+en.lrquestion.description)
+msgid ""
+"If those relays are not controlled or observed, the attacker can't win, "
+"ever, and the user is secure."
+msgstr ""
+
+#: https//support.torproject.org/about/entry-guards/
+#: (content/about/entry-guards/contents+en.lrquestion.description)
+msgid ""
+"If those relays are observed or controlled by the attacker, the attacker "
+"sees a larger fraction of the user's traffic - but still the user is no more"
+" profiled than before."
+msgstr ""
+
+#: https//support.torproject.org/about/entry-guards/
+#: (content/about/entry-guards/contents+en.lrquestion.description)
+msgid ""
+"Thus, the user has some chance (on the order of (n-c)/n) of avoiding "
+"profiling, whereas they had none before."
+msgstr ""
+
+#: https//support.torproject.org/about/entry-guards/
+#: (content/about/entry-guards/contents+en.lrquestion.description)
+msgid ""
+"You can read more at [An Analysis of the Degradation of Anonymous "
+"Protocols](http://freehaven.net/anonbib/#wright02), [Defending Anonymous "
+"Communication Against Passive Logging "
+"Attacks](http://freehaven.net/anonbib/#wright03), and especially [Locating "
+"Hidden Servers](http://freehaven.net/anonbib/#hs-attack06)."
+msgstr ""
+
+#: https//support.torproject.org/about/entry-guards/
+#: (content/about/entry-guards/contents+en.lrquestion.description)
+msgid ""
+"Restricting your entry nodes may also help against attackers who want to run"
+" a few Tor nodes and easily enumerate all of the Tor user IP addresses."
+msgstr ""
+
+#: https//support.torproject.org/about/entry-guards/
+#: (content/about/entry-guards/contents+en.lrquestion.description)
+msgid ""
+"(Even though they can't learn what destinations the users are talking to, "
+"they still might be able to do bad things with just a list of users.)"
+msgstr ""
+
+#: https//support.torproject.org/about/entry-guards/
+#: (content/about/entry-guards/contents+en.lrquestion.description)
+msgid ""
+"However, that feature won't really become useful until we move to a "
+"\"directory guard\" design as well."
+msgstr ""
+
#: https//support.torproject.org/about/how-is-tor-different-from-other-proxies/
#: (content/about/how-is-tor-different-from-other-proxies/contents+en.lrquestion.title)
msgid "How is Tor different from other proxies?"
@@ -2733,6 +3012,162 @@ msgid ""
" Tor and HTTPS interact."
msgstr ""
+#: https//support.torproject.org/about/key-management/
+#: (content/about/key-management/contents+en.lrquestion.title)
+msgid "Tell me about all the keys Tor uses"
+msgstr ""
+
+#: https//support.torproject.org/about/key-management/
+#: (content/about/key-management/contents+en.lrquestion.description)
+msgid ""
+"Tor uses a variety of different keys, with three goals in mind: 1) "
+"encryption to ensure privacy of data within the Tor network, 2) "
+"authentication so clients know they're talking to the relays they meant to "
+"talk to, and 3) signatures to make sure all clients know the same set of "
+"relays."
+msgstr ""
+
+#: https//support.torproject.org/about/key-management/
+#: (content/about/key-management/contents+en.lrquestion.description)
+msgid ""
+"**Encryption**: first, all connections in Tor use TLS link encryption, so "
+"observers can't look inside to see which circuit a given cell is intended "
+"for."
+msgstr ""
+
+#: https//support.torproject.org/about/key-management/
+#: (content/about/key-management/contents+en.lrquestion.description)
+msgid ""
+"Further, the Tor client establishes an ephemeral encryption key with each "
+"relay in the circuit; these extra layers of encryption mean that only the "
+"exit relay can read the cells."
+msgstr ""
+
+#: https//support.torproject.org/about/key-management/
+#: (content/about/key-management/contents+en.lrquestion.description)
+msgid ""
+"Both sides discard the circuit key when the circuit ends, so logging traffic"
+" and then breaking into the relay to discover the key won't work."
+msgstr ""
+
+#: https//support.torproject.org/about/key-management/
+#: (content/about/key-management/contents+en.lrquestion.description)
+msgid ""
+"**Authentication**: Every Tor relay has a public decryption key called the "
+"\"onion key\"."
+msgstr ""
+
+#: https//support.torproject.org/about/key-management/
+#: (content/about/key-management/contents+en.lrquestion.description)
+msgid "Each relay rotates its onion key once a week."
+msgstr ""
+
+#: https//support.torproject.org/about/key-management/
+#: (content/about/key-management/contents+en.lrquestion.description)
+msgid ""
+"When the Tor client establishes circuits, at each step it [demands that the "
+"Tor relay prove knowledge of its onion key](https://svn-"
+"archive.torproject.org/svn/projects/design-paper/tor-"
+"design.html#subsec:circuits)."
+msgstr ""
+
+#: https//support.torproject.org/about/key-management/
+#: (content/about/key-management/contents+en.lrquestion.description)
+msgid ""
+"That way the first node in the path can't just spoof the rest of the path."
+msgstr ""
+
+#: https//support.torproject.org/about/key-management/
+#: (content/about/key-management/contents+en.lrquestion.description)
+msgid ""
+"Because the Tor client chooses the path, it can make sure to get Tor's "
+"\"distributed trust\" property: no single relay in the path can know about "
+"both the client and what the client is doing."
+msgstr ""
+
+#: https//support.torproject.org/about/key-management/
+#: (content/about/key-management/contents+en.lrquestion.description)
+msgid ""
+"**Coordination**: How do clients know what the relays are, and how do they "
+"know that they have the right keys for them?"
+msgstr ""
+
+#: https//support.torproject.org/about/key-management/
+#: (content/about/key-management/contents+en.lrquestion.description)
+msgid "Each relay has a long-term public signing key called the \"identity key\"."
+msgstr ""
+
+#: https//support.torproject.org/about/key-management/
+#: (content/about/key-management/contents+en.lrquestion.description)
+msgid "Each directory authority additionally has a \"directory signing key\"."
+msgstr ""
+
+#: https//support.torproject.org/about/key-management/
+#: (content/about/key-management/contents+en.lrquestion.description)
+msgid ""
+"The directory authorities [provide a signed "
+"list](https://gitweb.torproject.org/torspec.git/tree/dir-spec.txt) of all "
+"the known relays, and in that list are a set of certificates from each relay"
+" (self-signed by their identity key) specifying their keys, locations, exit "
+"policies, and so on."
+msgstr ""
+
+#: https//support.torproject.org/about/key-management/
+#: (content/about/key-management/contents+en.lrquestion.description)
+msgid ""
+"So unless the adversary can control a majority of the directory authorities "
+"(as of 2021 there are 10 directory authorities), they can't trick the Tor "
+"client into using other Tor relays."
+msgstr ""
+
+#: https//support.torproject.org/about/key-management/
+#: (content/about/key-management/contents+en.lrquestion.description)
+msgid "How do clients know what the directory authorities are?"
+msgstr ""
+
+#: https//support.torproject.org/about/key-management/
+#: (content/about/key-management/contents+en.lrquestion.description)
+msgid ""
+"The Tor software comes with a built-in list of location and public key for "
+"each directory authority."
+msgstr ""
+
+#: https//support.torproject.org/about/key-management/
+#: (content/about/key-management/contents+en.lrquestion.description)
+msgid ""
+"So the only way to trick users into using a fake Tor network is to give them"
+" a specially modified version of the software."
+msgstr ""
+
+#: https//support.torproject.org/about/key-management/
+#: (content/about/key-management/contents+en.lrquestion.description)
+msgid "How do users know they've got the right software?"
+msgstr ""
+
+#: https//support.torproject.org/about/key-management/
+#: (content/about/key-management/contents+en.lrquestion.description)
+msgid ""
+"When we distribute the source code or a package, we digitally sign it with "
+"[GNU Privacy Guard](http://www.gnupg.org/). See the [instructions on how to "
+"check Tor Browser's signature](https://support.torproject.org/tbb/how-to-"
+"verify-signature/)."
+msgstr ""
+
+#: https//support.torproject.org/about/key-management/
+#: (content/about/key-management/contents+en.lrquestion.description)
+msgid ""
+"In order to be certain that it's really signed by us, you need to have met "
+"us in person and gotten a copy of our GPG key fingerprint, or you need to "
+"know somebody who has."
+msgstr ""
+
+#: https//support.torproject.org/about/key-management/
+#: (content/about/key-management/contents+en.lrquestion.description)
+msgid ""
+"If you're concerned about an attack on this level, we recommend you get "
+"involved with the security community and start meeting people."
+msgstr ""
+
#: https//support.torproject.org/about/no-data-scrubbing/
#: (content/about/no-data-scrubbing/contents+en.lrquestion.title)
msgid ""
@@ -2765,6 +3200,151 @@ msgid ""
"though."
msgstr ""
+#: https//support.torproject.org/about/protections/
+#: (content/about/protections/contents+en.lrquestion.title)
+msgid "What protections does Tor provide?"
+msgstr ""
+
+#: https//support.torproject.org/about/protections/
+#: (content/about/protections/contents+en.lrquestion.description)
+msgid ""
+"Internet communication is based on a store-and-forward model that can be "
+"understood in analogy to postal mail: Data is transmitted in blocks called "
+"IP datagrams or packets."
+msgstr ""
+
+#: https//support.torproject.org/about/protections/
+#: (content/about/protections/contents+en.lrquestion.description)
+msgid ""
+"Every packet includes a source IP address (of the sender) and a destination "
+"IP address (of the receiver), just as ordinary letters contain postal "
+"addresses of sender and receiver."
+msgstr ""
+
+#: https//support.torproject.org/about/protections/
+#: (content/about/protections/contents+en.lrquestion.description)
+msgid ""
+"The way from sender to receiver involves multiple hops of routers, where "
+"each router inspects the destination IP address and forwards the packet "
+"closer to its destination."
+msgstr ""
+
+#: https//support.torproject.org/about/protections/
+#: (content/about/protections/contents+en.lrquestion.description)
+msgid ""
+"Thus, every router between sender and receiver learns that the sender is "
+"communicating with the receiver."
+msgstr ""
+
+#: https//support.torproject.org/about/protections/
+#: (content/about/protections/contents+en.lrquestion.description)
+msgid ""
+"In particular, your local ISP is in the position to build a complete profile"
+" of your Internet usage."
+msgstr ""
+
+#: https//support.torproject.org/about/protections/
+#: (content/about/protections/contents+en.lrquestion.description)
+msgid ""
+"In addition, every server in the Internet that can see any of the packets "
+"can profile your behavior."
+msgstr ""
+
+#: https//support.torproject.org/about/protections/
+#: (content/about/protections/contents+en.lrquestion.description)
+msgid ""
+"The aim of Tor is to improve your privacy by sending your traffic through a "
+"series of proxies."
+msgstr ""
+
+#: https//support.torproject.org/about/protections/
+#: (content/about/protections/contents+en.lrquestion.description)
+msgid ""
+"Your communication is encrypted in multiple layers and routed via multiple "
+"hops through the Tor network to the final receiver."
+msgstr ""
+
+#: https//support.torproject.org/about/protections/
+#: (content/about/protections/contents+en.lrquestion.description)
+msgid ""
+"More details on this process can be found in this "
+"[visualization](https://support.torproject.org/https/https-1/)."
+msgstr ""
+
+#: https//support.torproject.org/about/protections/
+#: (content/about/protections/contents+en.lrquestion.description)
+msgid ""
+"Note that all your local ISP can observe now is that you are communicating "
+"with Tor nodes."
+msgstr ""
+
+#: https//support.torproject.org/about/protections/
+#: (content/about/protections/contents+en.lrquestion.description)
+msgid ""
+"Similarly, servers in the Internet just see that they are being contacted by"
+" Tor nodes."
+msgstr ""
+
+#: https//support.torproject.org/about/protections/
+#: (content/about/protections/contents+en.lrquestion.description)
+msgid "Generally speaking, Tor aims to solve three privacy problems:"
+msgstr ""
+
+#: https//support.torproject.org/about/protections/
+#: (content/about/protections/contents+en.lrquestion.description)
+msgid ""
+"First, Tor prevents websites and other services from learning your location,"
+" which they can use to build databases about your habits and interests."
+msgstr ""
+
+#: https//support.torproject.org/about/protections/
+#: (content/about/protections/contents+en.lrquestion.description)
+msgid ""
+"With Tor, your Internet connections don't give you away by default -- now "
+"you can have the ability to choose, for each connection, how much "
+"information to reveal."
+msgstr ""
+
+#: https//support.torproject.org/about/protections/
+#: (content/about/protections/contents+en.lrquestion.description)
+msgid ""
+"Second, Tor prevents people watching your traffic locally (such as your ISP "
+"or someone with access to your home wifi or router) from learning what "
+"information you're fetching and where you're fetching it from."
+msgstr ""
+
+#: https//support.torproject.org/about/protections/
+#: (content/about/protections/contents+en.lrquestion.description)
+msgid ""
+"It also stops them from deciding what you're allowed to learn and publish --"
+" if you can get to any part of the Tor network, you can reach any site on "
+"the Internet."
+msgstr ""
+
+#: https//support.torproject.org/about/protections/
+#: (content/about/protections/contents+en.lrquestion.description)
+msgid ""
+"Third, Tor routes your connection through more than one Tor relay so no "
+"single relay can learn what you're up to."
+msgstr ""
+
+#: https//support.torproject.org/about/protections/
+#: (content/about/protections/contents+en.lrquestion.description)
+msgid ""
+"Because these relays are run by different individuals or organizations, "
+"distributing trust provides more security than the old [one hop "
+"proxy](https://support.torproject.org/about/#how-is-tor-different-from-"
+"other-proxies) approach."
+msgstr ""
+
+#: https//support.torproject.org/about/protections/
+#: (content/about/protections/contents+en.lrquestion.description)
+msgid ""
+"Note, however, that there are situations where Tor fails to solve these "
+"privacy problems entirely: see the entry below on [remaining "
+"attacks](https://support.torproject.org/about/#attacks-on-onion-routing)."
+msgstr ""
+
#: https//support.torproject.org/about/what-is-tor/
#: (content/about/what-is-tor/contents+en.lrquestion.title)
msgid "What is Tor?"
@@ -4936,9 +5516,11 @@ msgstr ""
#: (content/tbb/tbb-47/contents+en.lrquestion.description)
msgid ""
"Also, read up on the HTTPProxyAuthenticator and HTTPSProxyAuthenticator "
-"options if your proxy requires auth. We only support basic auth currently, "
-"but if you need NTLM authentication, you may find [this post in the "
-"archives](https://archives.seul.org/or/talk/Jun-2005/msg00223.html) useful."
+"options if your [proxy requires auth.](https://developer.mozilla.org/en-"
+"US/docs/Web/HTTP/Headers/Proxy-Authenticate) We only support basic auth "
+"currently, but if you need NTLM authentication, you may find [this post in "
+"the archives](https://archives.seul.org/or/talk/Jun-2005/msg00223.html) "
+"useful."
msgstr ""
#: https//support.torproject.org/tbb/tbb-47/
@@ -5158,6 +5740,219 @@ msgid ""
"have no effect on Tor's configuration."
msgstr ""
+#: https//support.torproject.org/tbb/tbb-firewall-ports/
+#: (content/tbb/tbb-firewall-ports/contents+en.lrquestion.title)
+msgid "My firewall only allows a few outgoing ports"
+msgstr ""
+
+#: https//support.torproject.org/tbb/tbb-firewall-ports/
+#: (content/tbb/tbb-firewall-ports/contents+en.lrquestion.description)
+msgid ""
+"If your firewall works by blocking ports, then you can tell Tor to only use "
+"the ports when you start your Tor Browser."
+msgstr ""
+
+#: https//support.torproject.org/tbb/tbb-firewall-ports/
+#: (content/tbb/tbb-firewall-ports/contents+en.lrquestion.description)
+msgid ""
+"Or you can add the ports that your firewall permits by adding "
+"\"FascistFirewall 1\" to your torrc configuration file."
+msgstr ""
+
+#: https//support.torproject.org/tbb/tbb-firewall-ports/
+#: (content/tbb/tbb-firewall-ports/contents+en.lrquestion.description)
+msgid ""
+"By default, when you set this Tor assumes that your firewall allows only "
+"port 80 and port 443 (HTTP and HTTPS respectively)."
+msgstr ""
+
+#: https//support.torproject.org/tbb/tbb-firewall-ports/
+#: (content/tbb/tbb-firewall-ports/contents+en.lrquestion.description)
+msgid ""
+"You can select a different set of ports with the FirewallPorts torrc option."
+msgstr ""
+
+#: https//support.torproject.org/tbb/tbb-firewall-ports/
+#: (content/tbb/tbb-firewall-ports/contents+en.lrquestion.description)
+msgid ""
+"If you want to be more fine-grained with your controls, you can also use the"
+" ReachableAddresses config options, e.g.:"
+msgstr ""
+
+#: https//support.torproject.org/tbb/tbb-firewall-ports/
+#: (content/tbb/tbb-firewall-ports/contents+en.lrquestion.description)
+#: https//support.torproject.org/tbb/tbb-install-tor-central-server/
+#: (content/tbb/tbb-install-tor-central-server/contents+en.lrquestion.description)
+#: https//support.torproject.org/operators/default-exit-ports/
+#: (content/operators/default-exit-ports/contents+en.lrquestion.description)
+#: https//support.torproject.org/operators/hibernation/
+#: (content/operators/hibernation/contents+en.lrquestion.description)
+#: https//support.torproject.org/operators/limit-total-bandwidth/
+#: (content/operators/limit-total-bandwidth/contents+en.lrquestion.description)
+#: https//support.torproject.org/misc/bug-or-feedback/
+#: (content/misc/bug-or-feedback/contents+en.lrquestion.description)
+#: https//support.torproject.org/get-in-touch/why-i-cant-join-tor-channels/
+#: (content/get-in-touch/why-i-cant-join-tor-channels/contents+en.lrquestion.description)
+#: https//support.torproject.org/apt/tor-deb-repo/
+#: (content/apt/apt-1/contents+en.lrquestion.description)
+#: https//support.torproject.org/apt/apt-over-tor/
+#: (content/apt/apt-3/contents+en.lrquestion.description)
+msgid "```"
+msgstr "```"
+
+#: https//support.torproject.org/tbb/tbb-firewall-ports/
+#: (content/tbb/tbb-firewall-ports/contents+en.lrquestion.description)
+msgid "ReachableDirAddresses *:80"
+msgstr ""
+
+#: https//support.torproject.org/tbb/tbb-firewall-ports/
+#: (content/tbb/tbb-firewall-ports/contents+en.lrquestion.description)
+msgid "ReachableORAddresses *:443"
+msgstr ""
+
+#: https//support.torproject.org/tbb/tbb-install-tor-central-server/
+#: (content/tbb/tbb-install-tor-central-server/contents+en.lrquestion.title)
+msgid ""
+"Can I install Tor on a central server, and have my clients connect to it?"
+msgstr ""
+
+#: https//support.torproject.org/tbb/tbb-install-tor-central-server/
+#: (content/tbb/tbb-install-tor-central-server/contents+en.lrquestion.description)
+msgid ""
+"Yes. Tor can be configured as a client or a relay on another machine, and "
+"allow other machines to be able to connect to it for anonymity."
+msgstr ""
+
+#: https//support.torproject.org/tbb/tbb-install-tor-central-server/
+#: (content/tbb/tbb-install-tor-central-server/contents+en.lrquestion.description)
+msgid ""
+"This is most useful in an environment where many computers want a gateway of"
+" anonymity to the rest of the world."
+msgstr ""
+
+#: https//support.torproject.org/tbb/tbb-install-tor-central-server/
+#: (content/tbb/tbb-install-tor-central-server/contents+en.lrquestion.description)
+msgid ""
+"However, be forewarned that with this configuration, anyone within your "
+"private network (existing between you and the Tor client/relay) can see what"
+" traffic you are sending in clear text."
+msgstr ""
+
+#: https//support.torproject.org/tbb/tbb-install-tor-central-server/
+#: (content/tbb/tbb-install-tor-central-server/contents+en.lrquestion.description)
+msgid "The anonymity doesn't start until you get to the Tor relay."
+msgstr ""
+
+#: https//support.torproject.org/tbb/tbb-install-tor-central-server/
+#: (content/tbb/tbb-install-tor-central-server/contents+en.lrquestion.description)
+msgid ""
+"Because of this, if you are the controller of your domain and you know "
+"everything's locked down, you will be OK, but this configuration may not be "
+"suitable for large private networks where security is key all around."
+msgstr ""
+
+#: https//support.torproject.org/tbb/tbb-install-tor-central-server/
+#: (content/tbb/tbb-install-tor-central-server/contents+en.lrquestion.description)
+msgid ""
+"Configuration is simple, editing your torrc file's SocksListenAddress "
+"according to the following examples:"
+msgstr ""
+
+#: https//support.torproject.org/tbb/tbb-install-tor-central-server/
+#: (content/tbb/tbb-install-tor-central-server/contents+en.lrquestion.description)
+msgid "SocksListenAddress 127.0.0.1"
+msgstr ""
+
+#: https//support.torproject.org/tbb/tbb-install-tor-central-server/
+#: (content/tbb/tbb-install-tor-central-server/contents+en.lrquestion.description)
+msgid "SocksListenAddress 192.168.x.x:9100"
+msgstr ""
+
+#: https//support.torproject.org/tbb/tbb-install-tor-central-server/
+#: (content/tbb/tbb-install-tor-central-server/contents+en.lrquestion.description)
+msgid "SocksListenAddress 0.0.0.0:9100"
+msgstr ""
+
+#: https//support.torproject.org/tbb/tbb-install-tor-central-server/
+#: (content/tbb/tbb-install-tor-central-server/contents+en.lrquestion.description)
+msgid ""
+"You can state multiple listen addresses, in the case that you are part of "
+"several networks or subnets."
+msgstr ""
+
+#: https//support.torproject.org/tbb/tbb-install-tor-central-server/
+#: (content/tbb/tbb-install-tor-central-server/contents+en.lrquestion.description)
+msgid "SocksListenAddress 192.168.x.x:9100 #eth0"
+msgstr ""
+
+#: https//support.torproject.org/tbb/tbb-install-tor-central-server/
+#: (content/tbb/tbb-install-tor-central-server/contents+en.lrquestion.description)
+msgid "SocksListenAddress 10.x.x.x:9100 #eth1"
+msgstr ""
+
+#: https//support.torproject.org/tbb/tbb-install-tor-central-server/
+#: (content/tbb/tbb-install-tor-central-server/contents+en.lrquestion.description)
+msgid ""
+"After this, your clients on their respective networks/subnets would specify "
+"a socks proxy with the address and port you specified SocksListenAddress to "
+"be."
+msgstr ""
+
+#: https//support.torproject.org/tbb/tbb-install-tor-central-server/
+#: (content/tbb/tbb-install-tor-central-server/contents+en.lrquestion.description)
+msgid ""
+"Please note that the SocksPort configuration option gives the port ONLY for "
+"localhost (127.0.0.1)."
+msgstr ""
+
+#: https//support.torproject.org/tbb/tbb-install-tor-central-server/
+#: (content/tbb/tbb-install-tor-central-server/contents+en.lrquestion.description)
+msgid ""
+"When setting up your SocksListenAddress(es), you need to give the port with "
+"the address, as shown above."
+msgstr ""
+
+#: https//support.torproject.org/tbb/tbb-install-tor-central-server/
+#: (content/tbb/tbb-install-tor-central-server/contents+en.lrquestion.description)
+msgid ""
+"If you are interested in forcing all outgoing data through the central Tor "
+"client/relay, instead of the server only being an optional proxy, you may "
+"find the program iptables (for *nix) useful."
+msgstr ""
+
+#: https//support.torproject.org/tbb/tbb-run-client-different-computer/
+#: (content/tbb/tbb-run-client-different-computer/contents+en.lrquestion.title)
+msgid ""
+"I want to run my Tor client on a different computer than my applications"
+msgstr ""
+
+#: https//support.torproject.org/tbb/tbb-run-client-different-computer/
+#: (content/tbb/tbb-run-client-different-computer/contents+en.lrquestion.description)
+msgid ""
+"By default, your Tor client only listens for applications that connect from "
+"localhost."
+msgstr ""
+
+#: https//support.torproject.org/tbb/tbb-run-client-different-computer/
+#: (content/tbb/tbb-run-client-different-computer/contents+en.lrquestion.description)
+msgid "Connections from other computers are refused."
+msgstr ""
+
+#: https//support.torproject.org/tbb/tbb-run-client-different-computer/
+#: (content/tbb/tbb-run-client-different-computer/contents+en.lrquestion.description)
+msgid ""
+"If you want to torify applications on different computers than the Tor "
+"client, you should edit your torrc to define `SocksListenAddress 0.0.0.0` "
+"and then restart (or hup) Tor."
+msgstr ""
+
+#: https//support.torproject.org/tbb/tbb-run-client-different-computer/
+#: (content/tbb/tbb-run-client-different-computer/contents+en.lrquestion.description)
+msgid ""
+"If you want to get more advanced, you can configure your Tor client on a "
+"firewall to bind to your internal IP but not your external IP."
+msgstr ""
+
#: https//support.torproject.org/tbb/website-blocking-tor/
#: (content/tbb/website-blocking-tor/contents+en.lrquestion.title)
msgid "A website I am trying to reach is blocking access over Tor."
@@ -6601,6 +7396,130 @@ msgid ""
"guide."
msgstr ""
+#: https//support.torproject.org/operators/default-exit-ports/
+#: (content/operators/default-exit-ports/contents+en.lrquestion.title)
+msgid "Is there a list of default exit ports?"
+msgstr ""
+
+#: https//support.torproject.org/operators/default-exit-ports/
+#: (content/operators/default-exit-ports/contents+en.lrquestion.description)
+msgid ""
+"The default open ports are listed below but keep in mind that, any port or "
+"ports can be opened by the relay operator by configuring it in torrc or "
+"modifying the source code."
+msgstr ""
+
+#: https//support.torproject.org/operators/default-exit-ports/
+#: (content/operators/default-exit-ports/contents+en.lrquestion.description)
+msgid ""
+"The default according to src/or/policies.c ([line 85][1] and [line 1901][2])"
+" from the source code release [release-0.4.6][3]:"
+msgstr ""
+
+#: https//support.torproject.org/operators/default-exit-ports/
+#: (content/operators/default-exit-ports/contents+en.lrquestion.description)
+msgid "reject 0.0.0.0/8"
+msgstr ""
+
+#: https//support.torproject.org/operators/default-exit-ports/
+#: (content/operators/default-exit-ports/contents+en.lrquestion.description)
+msgid "reject 169.254.0.0/16"
+msgstr ""
+
+#: https//support.torproject.org/operators/default-exit-ports/
+#: (content/operators/default-exit-ports/contents+en.lrquestion.description)
+msgid "reject 127.0.0.0/8"
+msgstr ""
+
+#: https//support.torproject.org/operators/default-exit-ports/
+#: (content/operators/default-exit-ports/contents+en.lrquestion.description)
+msgid "reject 192.168.0.0/16"
+msgstr ""
+
+#: https//support.torproject.org/operators/default-exit-ports/
+#: (content/operators/default-exit-ports/contents+en.lrquestion.description)
+msgid "reject 10.0.0.0/8"
+msgstr ""
+
+#: https//support.torproject.org/operators/default-exit-ports/
+#: (content/operators/default-exit-ports/contents+en.lrquestion.description)
+msgid "reject 172.16.0.0/12"
+msgstr ""
+
+#: https//support.torproject.org/operators/default-exit-ports/
+#: (content/operators/default-exit-ports/contents+en.lrquestion.description)
+msgid "reject *:25"
+msgstr ""
+
+#: https//support.torproject.org/operators/default-exit-ports/
+#: (content/operators/default-exit-ports/contents+en.lrquestion.description)
+msgid "reject *:119"
+msgstr ""
+
+#: https//support.torproject.org/operators/default-exit-ports/
+#: (content/operators/default-exit-ports/contents+en.lrquestion.description)
+msgid "reject *:135-139"
+msgstr ""
+
+#: https//support.torproject.org/operators/default-exit-ports/
+#: (content/operators/default-exit-ports/contents+en.lrquestion.description)
+msgid "reject *:445"
+msgstr ""
+
+#: https//support.torproject.org/operators/default-exit-ports/
+#: (content/operators/default-exit-ports/contents+en.lrquestion.description)
+msgid "reject *:563"
+msgstr ""
+
+#: https//support.torproject.org/operators/default-exit-ports/
+#: (content/operators/default-exit-ports/contents+en.lrquestion.description)
+msgid "reject *:1214"
+msgstr ""
+
+#: https//support.torproject.org/operators/default-exit-ports/
+#: (content/operators/default-exit-ports/contents+en.lrquestion.description)
+msgid "reject *:4661-4666"
+msgstr ""
+
+#: https//support.torproject.org/operators/default-exit-ports/
+#: (content/operators/default-exit-ports/contents+en.lrquestion.description)
+msgid "reject *:6346-6429"
+msgstr ""
+
+#: https//support.torproject.org/operators/default-exit-ports/
+#: (content/operators/default-exit-ports/contents+en.lrquestion.description)
+msgid "reject *:6699"
+msgstr ""
+
+#: https//support.torproject.org/operators/default-exit-ports/
+#: (content/operators/default-exit-ports/contents+en.lrquestion.description)
+msgid "reject *:6881-6999"
+msgstr ""
+
+#: https//support.torproject.org/operators/default-exit-ports/
+#: (content/operators/default-exit-ports/contents+en.lrquestion.description)
+msgid "accept *:*"
+msgstr ""
+
+#: https//support.torproject.org/operators/default-exit-ports/
+#: (content/operators/default-exit-ports/contents+en.lrquestion.description)
+msgid ""
+"[1]: "
+"https://gitlab.torproject.org/tpo/core/tor/-/blob/release-0.4.6/src/core/or/policies.c#L85"
+msgstr ""
+
+#: https//support.torproject.org/operators/default-exit-ports/
+#: (content/operators/default-exit-ports/contents+en.lrquestion.description)
+msgid ""
+"[2]: "
+"https://gitlab.torproject.org/tpo/core/tor/-/blob/release-0.4.6/src/core/or/policies.c#L1901"
+msgstr ""
+
+#: https//support.torproject.org/operators/default-exit-ports/
+#: (content/operators/default-exit-ports/contents+en.lrquestion.description)
+msgid "[3]: https://gitlab.torproject.org/tpo/core/tor/-/tree/release-0.4.6/"
+msgstr ""
+
#: https//support.torproject.org/operators/dynamic-ip/
#: (content/operators/dynamic-ip/contents+en.lrquestion.title)
msgid "Can I run a Tor relay using a dynamic IP address?"
@@ -6748,21 +7667,6 @@ msgid ""
"into hibernation, signaled by this entry in the log:"
msgstr ""
-#: https//support.torproject.org/operators/hibernation/
-#: (content/operators/hibernation/contents+en.lrquestion.description)
-#: https//support.torproject.org/operators/limit-total-bandwidth/
-#: (content/operators/limit-total-bandwidth/contents+en.lrquestion.description)
-#: https//support.torproject.org/misc/bug-or-feedback/
-#: (content/misc/bug-or-feedback/contents+en.lrquestion.description)
-#: https//support.torproject.org/get-in-touch/why-i-cant-join-tor-channels/
-#: (content/get-in-touch/why-i-cant-join-tor-channels/contents+en.lrquestion.description)
-#: https//support.torproject.org/apt/tor-deb-repo/
-#: (content/apt/apt-1/contents+en.lrquestion.description)
-#: https//support.torproject.org/apt/apt-over-tor/
-#: (content/apt/apt-3/contents+en.lrquestion.description)
-msgid "```"
-msgstr "```"
-
#: https//support.torproject.org/operators/hibernation/
#: (content/operators/hibernation/contents+en.lrquestion.description)
msgid "Bandwidth soft limit reached; commencing hibernation."
@@ -9004,6 +9908,131 @@ msgstr ""
msgid "sub 4096R/C00942E4 2017-03-13"
msgstr ""
+#: https//support.torproject.org/misc/check-socks-dns-leaks/
+#: (content/misc/check-socks-dns-leaks/contents+en.lrquestion.title)
+msgid ""
+"How do I check if my application that uses SOCKS is leaking DNS requests?"
+msgstr ""
+
+#: https//support.torproject.org/misc/check-socks-dns-leaks/
+#: (content/misc/check-socks-dns-leaks/contents+en.lrquestion.description)
+msgid ""
+"Even if your application is using the correct variant of the SOCKS protocol,"
+" there is still a risk that it could be leaking DNS queries."
+msgstr ""
+
+#: https//support.torproject.org/misc/check-socks-dns-leaks/
+#: (content/misc/check-socks-dns-leaks/contents+en.lrquestion.description)
+msgid ""
+"This problem happens in Firefox extensions that resolve the destination "
+"hostname themselves, for example to show you its IP address, what country "
+"it's in, etc."
+msgstr ""
+
+#: https//support.torproject.org/misc/check-socks-dns-leaks/
+#: (content/misc/check-socks-dns-leaks/contents+en.lrquestion.description)
+msgid ""
+"If you suspect your application might behave like this, follow the "
+"instructions below to check."
+msgstr ""
+
+#: https//support.torproject.org/misc/check-socks-dns-leaks/
+#: (content/misc/check-socks-dns-leaks/contents+en.lrquestion.description)
+msgid ""
+"1. Add `TestSocks 1` to your [torrc file](https://support.torproject.org/tbb"
+"/tbb-editing-torrc/)."
+msgstr ""
+
+#: https//support.torproject.org/misc/check-socks-dns-leaks/
+#: (content/misc/check-socks-dns-leaks/contents+en.lrquestion.description)
+msgid ""
+"1. Start Tor, and point your program's SOCKS proxy settings to Tor's SOCKS5 "
+"server (`socks5://127.0.0.1:9050` by default)."
+msgstr ""
+
+#: https//support.torproject.org/misc/check-socks-dns-leaks/
+#: (content/misc/check-socks-dns-leaks/contents+en.lrquestion.description)
+msgid ""
+"1. Watch your logs as you use your application. For each socks connection, "
+"Tor will log a `notice` for safe connections, and a `warn` for connections "
+"leaking DNS requests."
+msgstr ""
+
+#: https//support.torproject.org/misc/check-socks-dns-leaks/
+#: (content/misc/check-socks-dns-leaks/contents+en.lrquestion.description)
+msgid ""
+"If you want to automatically disable all connections leaking DNS requests, "
+"set `SafeSocks 1` in your torrc file."
+msgstr ""
+
+#: https//support.torproject.org/misc/hide-exits/
+#: (content/misc/hide-exits/contents+en.lrquestion.title)
+msgid ""
+"You should hide the list of Tor relays, so people can't block the exits."
+msgstr ""
+
+#: https//support.torproject.org/misc/hide-exits/
+#: (content/misc/hide-exits/contents+en.lrquestion.description)
+msgid "There are a few reasons we don't:"
+msgstr ""
+
+#: https//support.torproject.org/misc/hide-exits/
+#: (content/misc/hide-exits/contents+en.lrquestion.description)
+msgid ""
+"1. We can't help but make the information available, since Tor clients need "
+"to use it to pick their paths."
+msgstr ""
+
+#: https//support.torproject.org/misc/hide-exits/
+#: (content/misc/hide-exits/contents+en.lrquestion.description)
+msgid "So if the \"blockers\" want it, they can get it anyway."
+msgstr ""
+
+#: https//support.torproject.org/misc/hide-exits/
+#: (content/misc/hide-exits/contents+en.lrquestion.description)
+msgid ""
+"Further, even if we didn't tell clients about the list of relays directly, "
+"somebody could still make a lot of connections through Tor to a test site "
+"and build a list of the addresses they see."
+msgstr ""
+
+#: https//support.torproject.org/misc/hide-exits/
+#: (content/misc/hide-exits/contents+en.lrquestion.description)
+msgid ""
+"1. If people want to block us, we believe that they should be allowed to do "
+"so."
+msgstr ""
+
+#: https//support.torproject.org/misc/hide-exits/
+#: (content/misc/hide-exits/contents+en.lrquestion.description)
+msgid ""
+"Obviously, we would prefer for everybody to allow Tor users to connect to "
+"them, but people have the right to decide who their services should allow "
+"connections from, and if they want to block anonymous users, they can."
+msgstr ""
+
+#: https//support.torproject.org/misc/hide-exits/
+#: (content/misc/hide-exits/contents+en.lrquestion.description)
+msgid ""
+"1. Being blockable also has tactical advantages: it may be a persuasive "
+"response to website maintainers who feel threatened by Tor."
+msgstr ""
+
+#: https//support.torproject.org/misc/hide-exits/
+#: (content/misc/hide-exits/contents+en.lrquestion.description)
+msgid ""
+"Giving them the option may inspire them to stop and think about whether they"
+" really want to eliminate private access to their system, and if not, what "
+"other options they might have."
+msgstr ""
+
+#: https//support.torproject.org/misc/hide-exits/
+#: (content/misc/hide-exits/contents+en.lrquestion.description)
+msgid ""
+"The time they might otherwise have spent blocking Tor, they may instead "
+"spend rethinking their overall approach to privacy and anonymity."
+msgstr ""
+
#: https//support.torproject.org/misc/menu/
#: (content/misc/menu/contents+en.lrquestion.description)
msgid "About"
@@ -9588,56 +10617,20 @@ msgstr ""
#: https//support.torproject.org/get-in-touch/why-i-cant-join-tor-channels/
#: (content/get-in-touch/why-i-cant-join-tor-channels/contents+en.lrquestion.description)
msgid ""
-"Then, to complete the registration and ultimately gain access to the #tor-"
-"project channel, your nickname must be **verified**."
-msgstr ""
-
-#: https//support.torproject.org/get-in-touch/why-i-cant-join-tor-channels/
-#: (content/get-in-touch/why-i-cant-join-tor-channels/contents+en.lrquestion.description)
-msgid ""
-"1. To verify your nick, open a new browser window and go to "
-"https://webchat.oftc.net/?channels=tor."
-msgstr ""
-
-#: https//support.torproject.org/get-in-touch/why-i-cant-join-tor-channels/
-#: (content/get-in-touch/why-i-cant-join-tor-channels/contents+en.lrquestion.description)
-msgid "2. Log in with your IRC nickname and password."
-msgstr ""
-
-#: https//support.torproject.org/get-in-touch/why-i-cant-join-tor-channels/
-#: (content/get-in-touch/why-i-cant-join-tor-channels/contents+en.lrquestion.description)
-msgid ""
-"3. Look for the word **verify** and log in there. It may appear that nothing"
-" has happened. Look at the top of the page, and there will be a column "
-"called **Account**."
-msgstr ""
-
-#: https//support.torproject.org/get-in-touch/why-i-cant-join-tor-channels/
-#: (content/get-in-touch/why-i-cant-join-tor-channels/contents+en.lrquestion.description)
-msgid "4. Click on **Account**."
-msgstr ""
-
-#: https//support.torproject.org/get-in-touch/why-i-cant-join-tor-channels/
-#: (content/get-in-touch/why-i-cant-join-tor-channels/contents+en.lrquestion.description)
-msgid ""
-"5. Click on the small sentence at the bottom of the square that says: Verify"
-" account."
-msgstr ""
-
-#: https//support.torproject.org/get-in-touch/why-i-cant-join-tor-channels/
-#: (content/get-in-touch/why-i-cant-join-tor-channels/contents+en.lrquestion.description)
-msgid "6. Fill out the Captcha that pops up, and click ok."
+"After registering your nickname, to gain access to the #tor-project and "
+"other protected channels, your nickname must be **verified**."
msgstr ""
#: https//support.torproject.org/get-in-touch/why-i-cant-join-tor-channels/
#: (content/get-in-touch/why-i-cant-join-tor-channels/contents+en.lrquestion.description)
msgid ""
-"7. A tiny message will appear: \"Your NickServ account has been verified.\""
+"1. Go to https://services.oftc.net/ and follow the steps in the '*To verify "
+"your account*' section"
msgstr ""
#: https//support.torproject.org/get-in-touch/why-i-cant-join-tor-channels/
#: (content/get-in-touch/why-i-cant-join-tor-channels/contents+en.lrquestion.description)
-msgid "8. Go back to the IRC webpage where you are logged in and type:"
+msgid "2. Go back to the IRC webpage where you are logged in and type:"
msgstr ""
#: https//support.torproject.org/get-in-touch/why-i-cant-join-tor-channels/
@@ -9647,12 +10640,12 @@ msgstr ""
#: https//support.torproject.org/get-in-touch/why-i-cant-join-tor-channels/
#: (content/get-in-touch/why-i-cant-join-tor-channels/contents+en.lrquestion.description)
-msgid "9. Click ENTER."
+msgid "3. Click ENTER."
msgstr ""
#: https//support.torproject.org/get-in-touch/why-i-cant-join-tor-channels/
#: (content/get-in-touch/why-i-cant-join-tor-channels/contents+en.lrquestion.description)
-msgid "10. If all is well, you will receive a message that says:"
+msgid "4. If all is well, you will receive a message that says:"
msgstr ""
#: https//support.torproject.org/get-in-touch/why-i-cant-join-tor-channels/
@@ -9793,18 +10786,22 @@ msgstr "# apt install apt-transport-https"
#: https//support.torproject.org/apt/tor-deb-repo/
#: (content/apt/apt-1/contents+en.lrquestion.description)
msgid ""
-"#### 2. Add the following entries to `/etc/apt/sources.list` or a new file "
-"in `/etc/apt/sources.list.d/`"
+"#### 2. Create a new file in `/etc/apt/sources.list.d/` named `tor.list`. "
+"Add the following entries:"
msgstr ""
#: https//support.torproject.org/apt/tor-deb-repo/
#: (content/apt/apt-1/contents+en.lrquestion.description)
-msgid "deb https://deb.torproject.org/torproject.org <DISTRIBUTION> main"
+msgid ""
+"deb [signed-by=/usr/share/keyrings/tor-archive-keyring.gpg] "
+"https://deb.torproject.org/torproject.org <DISTRIBUTION> main"
msgstr ""
#: https//support.torproject.org/apt/tor-deb-repo/
#: (content/apt/apt-1/contents+en.lrquestion.description)
-msgid "deb-src https://deb.torproject.org/torproject.org <DISTRIBUTION> main"
+msgid ""
+"deb-src [signed-by=/usr/share/keyrings/tor-archive-keyring.gpg] "
+"https://deb.torproject.org/torproject.org <DISTRIBUTION> main"
msgstr ""
#: https//support.torproject.org/apt/tor-deb-repo/
@@ -9818,14 +10815,16 @@ msgstr ""
#: https//support.torproject.org/apt/tor-deb-repo/
#: (content/apt/apt-1/contents+en.lrquestion.description)
msgid ""
-"deb https://deb.torproject.org/torproject.org tor-"
+"deb [signed-by=/usr/share/keyrings/tor-archive-keyring.gpg] "
+"https://deb.torproject.org/torproject.org tor-"
"experimental-0.4.6.x-<DISTRIBUTION> main"
msgstr ""
#: https//support.torproject.org/apt/tor-deb-repo/
#: (content/apt/apt-1/contents+en.lrquestion.description)
msgid ""
-"deb-src https://deb.torproject.org/torproject.org tor-"
+"deb-src [signed-by=/usr/share/keyrings/tor-archive-keyring.gpg] "
+"https://deb.torproject.org/torproject.org tor-"
"experimental-0.4.6.x-<DISTRIBUTION> main"
msgstr ""
@@ -9837,15 +10836,17 @@ msgstr ""
#: https//support.torproject.org/apt/tor-deb-repo/
#: (content/apt/apt-1/contents+en.lrquestion.description)
msgid ""
-"deb https://deb.torproject.org/torproject.org tor-nightly-"
-"master-<DISTRIBUTION> main"
+"deb [signed-by=/usr/share/keyrings/tor-archive-keyring.gpg] "
+"https://deb.torproject.org/torproject.org tor-nightly-master-<DISTRIBUTION> "
+"main"
msgstr ""
#: https//support.torproject.org/apt/tor-deb-repo/
#: (content/apt/apt-1/contents+en.lrquestion.description)
msgid ""
-"deb-src https://deb.torproject.org/torproject.org tor-nightly-"
-"master-<DISTRIBUTION> main"
+"deb-src [signed-by=/usr/share/keyrings/tor-archive-keyring.gpg] "
+"https://deb.torproject.org/torproject.org tor-nightly-master-<DISTRIBUTION> "
+"main"
msgstr ""
#: https//support.torproject.org/apt/tor-deb-repo/
@@ -9866,13 +10867,15 @@ msgstr ""
#: https//support.torproject.org/apt/tor-deb-repo/
#: (content/apt/apt-1/contents+en.lrquestion.description)
msgid ""
-"deb [arch=amd64] https://deb.torproject.org/torproject.org focal main"
+"deb [arch=amd64 signed-by=/usr/share/keyrings/tor-archive-keyring.gpg] "
+"https://deb.torproject.org/torproject.org focal main"
msgstr ""
#: https//support.torproject.org/apt/tor-deb-repo/
#: (content/apt/apt-1/contents+en.lrquestion.description)
msgid ""
-"deb-src [arch=amd64] https://deb.torproject.org/torproject.org focal main"
+"deb-src [arch=amd64 signed-by=/usr/share/keyrings/tor-archive-keyring.gpg] "
+"https://deb.torproject.org/torproject.org focal main"
msgstr ""
#: https//support.torproject.org/apt/tor-deb-repo/
@@ -9892,26 +10895,17 @@ msgstr ""
#: (content/apt/apt-1/contents+en.lrquestion.description)
msgid ""
"#### 3. Then add the gpg key used to sign the packages by running the "
-"following commands at your command prompt"
+"following command at your command prompt:"
msgstr ""
#: https//support.torproject.org/apt/tor-deb-repo/
#: (content/apt/apt-1/contents+en.lrquestion.description)
msgid ""
-"# wget -qO- "
+"# wget -O- "
"https://deb.torproject.org/torproject.org/A3C4F0F979CAA22CDBA8F512EE8CBC9E886DDD89.asc"
-" | gpg --import"
+" | gpg --dearmor | tee /usr/share/keyrings/tor-archive-keyring.gpg "
+">/dev/null"
msgstr ""
-"# wget -qO- "
-"https://deb.torproject.org/torproject.org/A3C4F0F979CAA22CDBA8F512EE8CBC9E886DDD89.asc"
-" | gpg --import"
-
-#: https//support.torproject.org/apt/tor-deb-repo/
-#: (content/apt/apt-1/contents+en.lrquestion.description)
-msgid ""
-"# gpg --export A3C4F0F979CAA22CDBA8F512EE8CBC9E886DDD89 | apt-key add -"
-msgstr ""
-"# gpg --export A3C4F0F979CAA22CDBA8F512EE8CBC9E886DDD89 | apt-key add -"
#: https//support.torproject.org/apt/tor-deb-repo/
#: (content/apt/apt-1/contents+en.lrquestion.description)
@@ -11517,6 +12511,82 @@ msgid ""
"doesn't change IP address over the day."
msgstr ""
+#: https//support.torproject.org/alternate-designs/block-websites/
+#: (content/alternate-designs/block-websites/contents+en.lrquestion.title)
+msgid "Exit policies should be able to block websites, not just IP addresses."
+msgstr ""
+
+#: https//support.torproject.org/alternate-designs/block-websites/
+#: (content/alternate-designs/block-websites/contents+en.lrquestion.description)
+msgid ""
+"It would be nice to let relay operators say things like `reject "
+"www.slashdot.org` in their exit policies, rather than requiring them to "
+"learn all the IP address space that could be covered by the site (and then "
+"also blocking other sites at those IP addresses)."
+msgstr ""
+
+#: https//support.torproject.org/alternate-designs/block-websites/
+#: (content/alternate-designs/block-websites/contents+en.lrquestion.description)
+msgid "There are two problems, though."
+msgstr ""
+
+#: https//support.torproject.org/alternate-designs/block-websites/
+#: (content/alternate-designs/block-websites/contents+en.lrquestion.description)
+msgid "First, users could still get around these blocks."
+msgstr ""
+
+#: https//support.torproject.org/alternate-designs/block-websites/
+#: (content/alternate-designs/block-websites/contents+en.lrquestion.description)
+msgid ""
+"For example, they could request the IP address rather than the hostname when"
+" they exit from the Tor network."
+msgstr ""
+
+#: https//support.torproject.org/alternate-designs/block-websites/
+#: (content/alternate-designs/block-websites/contents+en.lrquestion.description)
+msgid ""
+"This means operators would still need to learn all the IP addresses for the "
+"destinations in question."
+msgstr ""
+
+#: https//support.torproject.org/alternate-designs/block-websites/
+#: (content/alternate-designs/block-websites/contents+en.lrquestion.description)
+msgid ""
+"The second problem is that it would allow remote attackers to censor "
+"arbitrary sites."
+msgstr ""
+
+#: https//support.torproject.org/alternate-designs/block-websites/
+#: (content/alternate-designs/block-websites/contents+en.lrquestion.description)
+msgid ""
+"For example, if a Tor operator blocks www1.slashdot.org, and then some "
+"attacker poisons the Tor relay's DNS or otherwise changes that hostname to "
+"resolve to the IP address for a major news site, then suddenly that Tor "
+"relay is blocking the news site."
+msgstr ""
+
+#: https//support.torproject.org/alternate-designs/let-the-network-pick-the-path/
+#: (content/alternate-designs/let-the-network-pick-the-path/contents+en.lrquestion.title)
+msgid "You should let the network pick the path, not the client."
+msgstr ""
+
+#: https//support.torproject.org/alternate-designs/let-the-network-pick-the-path/
+#: (content/alternate-designs/let-the-network-pick-the-path/contents+en.lrquestion.description)
+msgid "No, you cannot trust the network to pick the path."
+msgstr ""
+
+#: https//support.torproject.org/alternate-designs/let-the-network-pick-the-path/
+#: (content/alternate-designs/let-the-network-pick-the-path/contents+en.lrquestion.description)
+msgid "Malicious relays could route you through their colluding friends."
+msgstr ""
+
+#: https//support.torproject.org/alternate-designs/let-the-network-pick-the-path/
+#: (content/alternate-designs/let-the-network-pick-the-path/contents+en.lrquestion.description)
+msgid ""
+"This would give an adversary the ability to watch all of your traffic end to"
+" end."
+msgstr ""
+
#: lego/templates/banner.html:3 lego/templates/banner.html:5
#: templates/banner.html:3 templates/banner.html:5
msgid "Close banner"
@@ -11547,8 +12617,8 @@ msgid "DONATE NOW"
msgstr "BERI DERMA SEKARANG"
#: lego/templates/footer.html:13 lego/templates/footer.html:22
-#: lego/templates/navbar.html:83 templates/footer.html:13
-#: templates/footer.html:22 templates/navbar.html:83
+#: lego/templates/navbar.html:95 templates/footer.html:13
+#: templates/footer.html:22 templates/navbar.html:95
msgid "Download Tor Browser"
msgstr "Muat Turun Pelayar Tor"
diff --git a/contents+my.po b/contents+my.po
index 93e3dc7ade..87c774a7c1 100644
--- a/contents+my.po
+++ b/contents+my.po
@@ -13,7 +13,7 @@ msgid ""
msgstr ""
"Project-Id-Version: PACKAGE VERSION\n"
"Report-Msgid-Bugs-To: \n"
-"POT-Creation-Date: 2021-08-25 11:14+CET\n"
+"POT-Creation-Date: 2021-09-01 12:20+CET\n"
"PO-Revision-Date: 2018-10-02 22:41+0000\n"
"Last-Translator: Christine Ivy <christineivy19 at gmail.com>, 2021\n"
"Language-Team: Burmese (https://www.transifex.com/otf/teams/1519/my/)\n"
@@ -146,6 +146,11 @@ msgstr ""
msgid "Tor Metrics"
msgstr ""
+#: https//support.torproject.org/alternate-designs/
+#: (content/alternate-designs/contents+en.lrtopic.title)
+msgid "Alternate Designs We Don't Do (Yet)"
+msgstr ""
+
#: https//support.torproject.org/glossary/add-on-extension-or-plugin/
#: (content/glossary/add-on-extension-or-plugin/contents+en.lrword.term)
msgid "add-on, extension, or plugin"
@@ -2033,6 +2038,61 @@ msgid ""
"wiki](https://trac.torproject.org/projects/tor/wiki/doc/TorPlusVPN)."
msgstr ""
+#: https//support.torproject.org/faq/relay-donations/
+#: (content/faq/relay-donations/contents+en.lrquestion.title)
+msgid "Can I donate for a relay rather than run my own?"
+msgstr ""
+
+#: https//support.torproject.org/faq/relay-donations/
+#: (content/faq/relay-donations/contents+en.lrquestion.description)
+msgid ""
+"Sure! We have a [list of organizations that run Tor "
+"relays](https://community.torproject.org/relay/community-resources/relay-"
+"associations/) that are happy to turn your donations into better speed and "
+"anonymity for the Tor network."
+msgstr ""
+
+#: https//support.torproject.org/faq/relay-donations/
+#: (content/faq/relay-donations/contents+en.lrquestion.description)
+msgid ""
+"These organizations are not the same as [The Tor Project, "
+"Inc](https://donate.torproject.org/), but we consider that a good thing."
+msgstr ""
+
+#: https//support.torproject.org/faq/relay-donations/
+#: (content/faq/relay-donations/contents+en.lrquestion.description)
+msgid "They're run by nice people who are part of the Tor community."
+msgstr ""
+
+#: https//support.torproject.org/faq/relay-donations/
+#: (content/faq/relay-donations/contents+en.lrquestion.description)
+msgid ""
+"Note that there can be a tradeoff here between anonymity and performance."
+msgstr ""
+
+#: https//support.torproject.org/faq/relay-donations/
+#: (content/faq/relay-donations/contents+en.lrquestion.description)
+msgid ""
+"The Tor network's anonymity comes in part from diversity, so if you are in a"
+" position to run your own relay, you will be improving Tor's anonymity more "
+"than by donating."
+msgstr ""
+
+#: https//support.torproject.org/faq/relay-donations/
+#: (content/faq/relay-donations/contents+en.lrquestion.description)
+msgid ""
+"At the same time though, economies of scale for bandwidth mean that "
+"combining many small donations into several larger relays is more efficient "
+"at improving network performance."
+msgstr ""
+
+#: https//support.torproject.org/faq/relay-donations/
+#: (content/faq/relay-donations/contents+en.lrquestion.description)
+msgid ""
+"Improving anonymity and improving performance are both worthwhile goals, so "
+"however you can help is great!"
+msgstr ""
+
#: https//support.torproject.org/faq/staying-anonymous/
#: (content/faq/staying-anonymous/contents+en.lrquestion.title)
msgid "Am I totally anonymous if I use Tor?"
@@ -2333,6 +2393,61 @@ msgid ""
" documenting all the issues](https://community.torproject.org/)."
msgstr ""
+#: https//support.torproject.org/about/attacks-on-onion-routing/
+#: (content/about/attacks-on-onion-routing/contents+en.lrquestion.title)
+msgid "What attacks remain against onion routing?"
+msgstr ""
+
+#: https//support.torproject.org/about/attacks-on-onion-routing/
+#: (content/about/attacks-on-onion-routing/contents+en.lrquestion.description)
+msgid ""
+"As mentioned above, it is possible for an observer who can view both you and"
+" either the destination website or your Tor exit node to correlate timings "
+"of your traffic as it enters the Tor network and also as it exits."
+msgstr ""
+
+#: https//support.torproject.org/about/attacks-on-onion-routing/
+#: (content/about/attacks-on-onion-routing/contents+en.lrquestion.description)
+msgid "Tor does not defend against such a threat model."
+msgstr ""
+
+#: https//support.torproject.org/about/attacks-on-onion-routing/
+#: (content/about/attacks-on-onion-routing/contents+en.lrquestion.description)
+msgid ""
+"In a more limited sense, note that if a censor or law enforcement agency has"
+" the ability to obtain specific observation of parts of the network, it is "
+"possible for them to verify a suspicion that you talk regularly to your "
+"friend by observing traffic at both ends and correlating the timing of only "
+"that traffic."
+msgstr ""
+
+#: https//support.torproject.org/about/attacks-on-onion-routing/
+#: (content/about/attacks-on-onion-routing/contents+en.lrquestion.description)
+msgid ""
+"Again, this is only useful to verify that parties already suspected of "
+"communicating with one another are doing so."
+msgstr ""
+
+#: https//support.torproject.org/about/attacks-on-onion-routing/
+#: (content/about/attacks-on-onion-routing/contents+en.lrquestion.description)
+msgid ""
+"In most countries, the suspicion required to obtain a warrant already "
+"carries more weight than timing correlation would provide."
+msgstr ""
+
+#: https//support.torproject.org/about/attacks-on-onion-routing/
+#: (content/about/attacks-on-onion-routing/contents+en.lrquestion.description)
+msgid ""
+"Furthermore, since Tor reuses circuits for multiple TCP connections, it is "
+"possible to associate non anonymous and anonymous traffic at a given exit "
+"node, so be careful about what applications you run concurrently over Tor."
+msgstr ""
+
+#: https//support.torproject.org/about/attacks-on-onion-routing/
+#: (content/about/attacks-on-onion-routing/contents+en.lrquestion.description)
+msgid "Perhaps even run separate Tor clients for these applications."
+msgstr ""
+
#: https//support.torproject.org/about/backdoor/
#: (content/about/backdoor/contents+en.lrquestion.title)
msgid "Is there a backdoor in Tor?"
@@ -2468,6 +2583,43 @@ msgid ""
"recommended](/tbb/tbb-9/)."
msgstr ""
+#: https//support.torproject.org/about/change-paths/
+#: (content/about/change-paths/contents+en.lrquestion.title)
+msgid "How often does Tor change its paths?"
+msgstr ""
+
+#: https//support.torproject.org/about/change-paths/
+#: (content/about/change-paths/contents+en.lrquestion.description)
+msgid ""
+"Tor will reuse the same circuit for new TCP streams for 10 minutes, as long "
+"as the circuit is working fine."
+msgstr ""
+
+#: https//support.torproject.org/about/change-paths/
+#: (content/about/change-paths/contents+en.lrquestion.description)
+msgid "(If the circuit fails, Tor will switch to a new circuit immediately.)"
+msgstr ""
+
+#: https//support.torproject.org/about/change-paths/
+#: (content/about/change-paths/contents+en.lrquestion.description)
+msgid ""
+"But note that a single TCP stream (e.g. a long IRC connection) will stay on "
+"the same circuit forever."
+msgstr ""
+
+#: https//support.torproject.org/about/change-paths/
+#: (content/about/change-paths/contents+en.lrquestion.description)
+msgid "We don't rotate individual streams from one circuit to the next."
+msgstr ""
+
+#: https//support.torproject.org/about/change-paths/
+#: (content/about/change-paths/contents+en.lrquestion.description)
+msgid ""
+"Otherwise, an adversary with a partial view of the network would be given "
+"many chances over time to link you to your destination, rather than just one"
+" chance."
+msgstr ""
+
#: https//support.torproject.org/about/distribute-tor/
#: (content/about/distribute-tor/contents+en.lrquestion.title)
msgid "Can I distribute Tor?"
@@ -2563,6 +2715,133 @@ msgid ""
"details."
msgstr ""
+#: https//support.torproject.org/about/entry-guards/
+#: (content/about/entry-guards/contents+en.lrquestion.title)
+msgid "What are Entry Guards?"
+msgstr ""
+
+#: https//support.torproject.org/about/entry-guards/
+#: (content/about/entry-guards/contents+en.lrquestion.description)
+msgid ""
+"Tor (like all current practical low-latency anonymity designs) fails when "
+"the attacker can see both ends of the communications channel."
+msgstr ""
+
+#: https//support.torproject.org/about/entry-guards/
+#: (content/about/entry-guards/contents+en.lrquestion.description)
+msgid ""
+"For example, suppose the attacker controls or watches the Tor relay you "
+"choose to enter the network, and also controls or watches the website you "
+"visit."
+msgstr ""
+
+#: https//support.torproject.org/about/entry-guards/
+#: (content/about/entry-guards/contents+en.lrquestion.description)
+msgid ""
+"In this case, the research community knows no practical low-latency design "
+"that can reliably stop the attacker from correlating volume and timing "
+"information on the two sides."
+msgstr ""
+
+#: https//support.torproject.org/about/entry-guards/
+#: (content/about/entry-guards/contents+en.lrquestion.description)
+msgid "So, what should we do?"
+msgstr ""
+
+#: https//support.torproject.org/about/entry-guards/
+#: (content/about/entry-guards/contents+en.lrquestion.description)
+msgid "Suppose the attacker controls, or can observe, C relays."
+msgstr ""
+
+#: https//support.torproject.org/about/entry-guards/
+#: (content/about/entry-guards/contents+en.lrquestion.description)
+msgid "Suppose there are N relays total."
+msgstr ""
+
+#: https//support.torproject.org/about/entry-guards/
+#: (content/about/entry-guards/contents+en.lrquestion.description)
+msgid ""
+"If you select new entry and exit relays each time you use the network, the "
+"attacker will be able to correlate all traffic you send with probability "
+"around (c/n)2."
+msgstr ""
+
+#: https//support.torproject.org/about/entry-guards/
+#: (content/about/entry-guards/contents+en.lrquestion.description)
+msgid ""
+"But profiling is, for most users, as bad as being traced all the time: they "
+"want to do something often without an attacker noticing, and the attacker "
+"noticing once is as bad as the attacker noticing more often."
+msgstr ""
+
+#: https//support.torproject.org/about/entry-guards/
+#: (content/about/entry-guards/contents+en.lrquestion.description)
+msgid ""
+"Thus, choosing many random entries and exits gives the user no chance of "
+"escaping profiling by this kind of attacker."
+msgstr ""
+
+#: https//support.torproject.org/about/entry-guards/
+#: (content/about/entry-guards/contents+en.lrquestion.description)
+msgid ""
+"The solution is \"entry guards\": each Tor client selects a few relays at "
+"random to use as entry points, and uses only those relays for their first "
+"hop."
+msgstr ""
+
+#: https//support.torproject.org/about/entry-guards/
+#: (content/about/entry-guards/contents+en.lrquestion.description)
+msgid ""
+"If those relays are not controlled or observed, the attacker can't win, "
+"ever, and the user is secure."
+msgstr ""
+
+#: https//support.torproject.org/about/entry-guards/
+#: (content/about/entry-guards/contents+en.lrquestion.description)
+msgid ""
+"If those relays are observed or controlled by the attacker, the attacker "
+"sees a larger fraction of the user's traffic - but still the user is no more"
+" profiled than before."
+msgstr ""
+
+#: https//support.torproject.org/about/entry-guards/
+#: (content/about/entry-guards/contents+en.lrquestion.description)
+msgid ""
+"Thus, the user has some chance (on the order of (n-c)/n) of avoiding "
+"profiling, whereas they had none before."
+msgstr ""
+
+#: https//support.torproject.org/about/entry-guards/
+#: (content/about/entry-guards/contents+en.lrquestion.description)
+msgid ""
+"You can read more at [An Analysis of the Degradation of Anonymous "
+"Protocols](http://freehaven.net/anonbib/#wright02), [Defending Anonymous "
+"Communication Against Passive Logging "
+"Attacks](http://freehaven.net/anonbib/#wright03), and especially [Locating "
+"Hidden Servers](http://freehaven.net/anonbib/#hs-attack06)."
+msgstr ""
+
+#: https//support.torproject.org/about/entry-guards/
+#: (content/about/entry-guards/contents+en.lrquestion.description)
+msgid ""
+"Restricting your entry nodes may also help against attackers who want to run"
+" a few Tor nodes and easily enumerate all of the Tor user IP addresses."
+msgstr ""
+
+#: https//support.torproject.org/about/entry-guards/
+#: (content/about/entry-guards/contents+en.lrquestion.description)
+msgid ""
+"(Even though they can't learn what destinations the users are talking to, "
+"they still might be able to do bad things with just a list of users.)"
+msgstr ""
+
+#: https//support.torproject.org/about/entry-guards/
+#: (content/about/entry-guards/contents+en.lrquestion.description)
+msgid ""
+"However, that feature won't really become useful until we move to a "
+"\"directory guard\" design as well."
+msgstr ""
+
#: https//support.torproject.org/about/how-is-tor-different-from-other-proxies/
#: (content/about/how-is-tor-different-from-other-proxies/contents+en.lrquestion.title)
msgid "How is Tor different from other proxies?"
@@ -2733,6 +3012,162 @@ msgid ""
" Tor and HTTPS interact."
msgstr ""
+#: https//support.torproject.org/about/key-management/
+#: (content/about/key-management/contents+en.lrquestion.title)
+msgid "Tell me about all the keys Tor uses"
+msgstr ""
+
+#: https//support.torproject.org/about/key-management/
+#: (content/about/key-management/contents+en.lrquestion.description)
+msgid ""
+"Tor uses a variety of different keys, with three goals in mind: 1) "
+"encryption to ensure privacy of data within the Tor network, 2) "
+"authentication so clients know they're talking to the relays they meant to "
+"talk to, and 3) signatures to make sure all clients know the same set of "
+"relays."
+msgstr ""
+
+#: https//support.torproject.org/about/key-management/
+#: (content/about/key-management/contents+en.lrquestion.description)
+msgid ""
+"**Encryption**: first, all connections in Tor use TLS link encryption, so "
+"observers can't look inside to see which circuit a given cell is intended "
+"for."
+msgstr ""
+
+#: https//support.torproject.org/about/key-management/
+#: (content/about/key-management/contents+en.lrquestion.description)
+msgid ""
+"Further, the Tor client establishes an ephemeral encryption key with each "
+"relay in the circuit; these extra layers of encryption mean that only the "
+"exit relay can read the cells."
+msgstr ""
+
+#: https//support.torproject.org/about/key-management/
+#: (content/about/key-management/contents+en.lrquestion.description)
+msgid ""
+"Both sides discard the circuit key when the circuit ends, so logging traffic"
+" and then breaking into the relay to discover the key won't work."
+msgstr ""
+
+#: https//support.torproject.org/about/key-management/
+#: (content/about/key-management/contents+en.lrquestion.description)
+msgid ""
+"**Authentication**: Every Tor relay has a public decryption key called the "
+"\"onion key\"."
+msgstr ""
+
+#: https//support.torproject.org/about/key-management/
+#: (content/about/key-management/contents+en.lrquestion.description)
+msgid "Each relay rotates its onion key once a week."
+msgstr ""
+
+#: https//support.torproject.org/about/key-management/
+#: (content/about/key-management/contents+en.lrquestion.description)
+msgid ""
+"When the Tor client establishes circuits, at each step it [demands that the "
+"Tor relay prove knowledge of its onion key](https://svn-"
+"archive.torproject.org/svn/projects/design-paper/tor-"
+"design.html#subsec:circuits)."
+msgstr ""
+
+#: https//support.torproject.org/about/key-management/
+#: (content/about/key-management/contents+en.lrquestion.description)
+msgid ""
+"That way the first node in the path can't just spoof the rest of the path."
+msgstr ""
+
+#: https//support.torproject.org/about/key-management/
+#: (content/about/key-management/contents+en.lrquestion.description)
+msgid ""
+"Because the Tor client chooses the path, it can make sure to get Tor's "
+"\"distributed trust\" property: no single relay in the path can know about "
+"both the client and what the client is doing."
+msgstr ""
+
+#: https//support.torproject.org/about/key-management/
+#: (content/about/key-management/contents+en.lrquestion.description)
+msgid ""
+"**Coordination**: How do clients know what the relays are, and how do they "
+"know that they have the right keys for them?"
+msgstr ""
+
+#: https//support.torproject.org/about/key-management/
+#: (content/about/key-management/contents+en.lrquestion.description)
+msgid "Each relay has a long-term public signing key called the \"identity key\"."
+msgstr ""
+
+#: https//support.torproject.org/about/key-management/
+#: (content/about/key-management/contents+en.lrquestion.description)
+msgid "Each directory authority additionally has a \"directory signing key\"."
+msgstr ""
+
+#: https//support.torproject.org/about/key-management/
+#: (content/about/key-management/contents+en.lrquestion.description)
+msgid ""
+"The directory authorities [provide a signed "
+"list](https://gitweb.torproject.org/torspec.git/tree/dir-spec.txt) of all "
+"the known relays, and in that list are a set of certificates from each relay"
+" (self-signed by their identity key) specifying their keys, locations, exit "
+"policies, and so on."
+msgstr ""
+
+#: https//support.torproject.org/about/key-management/
+#: (content/about/key-management/contents+en.lrquestion.description)
+msgid ""
+"So unless the adversary can control a majority of the directory authorities "
+"(as of 2021 there are 10 directory authorities), they can't trick the Tor "
+"client into using other Tor relays."
+msgstr ""
+
+#: https//support.torproject.org/about/key-management/
+#: (content/about/key-management/contents+en.lrquestion.description)
+msgid "How do clients know what the directory authorities are?"
+msgstr ""
+
+#: https//support.torproject.org/about/key-management/
+#: (content/about/key-management/contents+en.lrquestion.description)
+msgid ""
+"The Tor software comes with a built-in list of location and public key for "
+"each directory authority."
+msgstr ""
+
+#: https//support.torproject.org/about/key-management/
+#: (content/about/key-management/contents+en.lrquestion.description)
+msgid ""
+"So the only way to trick users into using a fake Tor network is to give them"
+" a specially modified version of the software."
+msgstr ""
+
+#: https//support.torproject.org/about/key-management/
+#: (content/about/key-management/contents+en.lrquestion.description)
+msgid "How do users know they've got the right software?"
+msgstr ""
+
+#: https//support.torproject.org/about/key-management/
+#: (content/about/key-management/contents+en.lrquestion.description)
+msgid ""
+"When we distribute the source code or a package, we digitally sign it with "
+"[GNU Privacy Guard](http://www.gnupg.org/). See the [instructions on how to "
+"check Tor Browser's signature](https://support.torproject.org/tbb/how-to-"
+"verify-signature/)."
+msgstr ""
+
+#: https//support.torproject.org/about/key-management/
+#: (content/about/key-management/contents+en.lrquestion.description)
+msgid ""
+"In order to be certain that it's really signed by us, you need to have met "
+"us in person and gotten a copy of our GPG key fingerprint, or you need to "
+"know somebody who has."
+msgstr ""
+
+#: https//support.torproject.org/about/key-management/
+#: (content/about/key-management/contents+en.lrquestion.description)
+msgid ""
+"If you're concerned about an attack on this level, we recommend you get "
+"involved with the security community and start meeting people."
+msgstr ""
+
#: https//support.torproject.org/about/no-data-scrubbing/
#: (content/about/no-data-scrubbing/contents+en.lrquestion.title)
msgid ""
@@ -2765,6 +3200,151 @@ msgid ""
"though."
msgstr ""
+#: https//support.torproject.org/about/protections/
+#: (content/about/protections/contents+en.lrquestion.title)
+msgid "What protections does Tor provide?"
+msgstr ""
+
+#: https//support.torproject.org/about/protections/
+#: (content/about/protections/contents+en.lrquestion.description)
+msgid ""
+"Internet communication is based on a store-and-forward model that can be "
+"understood in analogy to postal mail: Data is transmitted in blocks called "
+"IP datagrams or packets."
+msgstr ""
+
+#: https//support.torproject.org/about/protections/
+#: (content/about/protections/contents+en.lrquestion.description)
+msgid ""
+"Every packet includes a source IP address (of the sender) and a destination "
+"IP address (of the receiver), just as ordinary letters contain postal "
+"addresses of sender and receiver."
+msgstr ""
+
+#: https//support.torproject.org/about/protections/
+#: (content/about/protections/contents+en.lrquestion.description)
+msgid ""
+"The way from sender to receiver involves multiple hops of routers, where "
+"each router inspects the destination IP address and forwards the packet "
+"closer to its destination."
+msgstr ""
+
+#: https//support.torproject.org/about/protections/
+#: (content/about/protections/contents+en.lrquestion.description)
+msgid ""
+"Thus, every router between sender and receiver learns that the sender is "
+"communicating with the receiver."
+msgstr ""
+
+#: https//support.torproject.org/about/protections/
+#: (content/about/protections/contents+en.lrquestion.description)
+msgid ""
+"In particular, your local ISP is in the position to build a complete profile"
+" of your Internet usage."
+msgstr ""
+
+#: https//support.torproject.org/about/protections/
+#: (content/about/protections/contents+en.lrquestion.description)
+msgid ""
+"In addition, every server in the Internet that can see any of the packets "
+"can profile your behavior."
+msgstr ""
+
+#: https//support.torproject.org/about/protections/
+#: (content/about/protections/contents+en.lrquestion.description)
+msgid ""
+"The aim of Tor is to improve your privacy by sending your traffic through a "
+"series of proxies."
+msgstr ""
+
+#: https//support.torproject.org/about/protections/
+#: (content/about/protections/contents+en.lrquestion.description)
+msgid ""
+"Your communication is encrypted in multiple layers and routed via multiple "
+"hops through the Tor network to the final receiver."
+msgstr ""
+
+#: https//support.torproject.org/about/protections/
+#: (content/about/protections/contents+en.lrquestion.description)
+msgid ""
+"More details on this process can be found in this "
+"[visualization](https://support.torproject.org/https/https-1/)."
+msgstr ""
+
+#: https//support.torproject.org/about/protections/
+#: (content/about/protections/contents+en.lrquestion.description)
+msgid ""
+"Note that all your local ISP can observe now is that you are communicating "
+"with Tor nodes."
+msgstr ""
+
+#: https//support.torproject.org/about/protections/
+#: (content/about/protections/contents+en.lrquestion.description)
+msgid ""
+"Similarly, servers in the Internet just see that they are being contacted by"
+" Tor nodes."
+msgstr ""
+
+#: https//support.torproject.org/about/protections/
+#: (content/about/protections/contents+en.lrquestion.description)
+msgid "Generally speaking, Tor aims to solve three privacy problems:"
+msgstr ""
+
+#: https//support.torproject.org/about/protections/
+#: (content/about/protections/contents+en.lrquestion.description)
+msgid ""
+"First, Tor prevents websites and other services from learning your location,"
+" which they can use to build databases about your habits and interests."
+msgstr ""
+
+#: https//support.torproject.org/about/protections/
+#: (content/about/protections/contents+en.lrquestion.description)
+msgid ""
+"With Tor, your Internet connections don't give you away by default -- now "
+"you can have the ability to choose, for each connection, how much "
+"information to reveal."
+msgstr ""
+
+#: https//support.torproject.org/about/protections/
+#: (content/about/protections/contents+en.lrquestion.description)
+msgid ""
+"Second, Tor prevents people watching your traffic locally (such as your ISP "
+"or someone with access to your home wifi or router) from learning what "
+"information you're fetching and where you're fetching it from."
+msgstr ""
+
+#: https//support.torproject.org/about/protections/
+#: (content/about/protections/contents+en.lrquestion.description)
+msgid ""
+"It also stops them from deciding what you're allowed to learn and publish --"
+" if you can get to any part of the Tor network, you can reach any site on "
+"the Internet."
+msgstr ""
+
+#: https//support.torproject.org/about/protections/
+#: (content/about/protections/contents+en.lrquestion.description)
+msgid ""
+"Third, Tor routes your connection through more than one Tor relay so no "
+"single relay can learn what you're up to."
+msgstr ""
+
+#: https//support.torproject.org/about/protections/
+#: (content/about/protections/contents+en.lrquestion.description)
+msgid ""
+"Because these relays are run by different individuals or organizations, "
+"distributing trust provides more security than the old [one hop "
+"proxy](https://support.torproject.org/about/#how-is-tor-different-from-"
+"other-proxies) approach."
+msgstr ""
+
+#: https//support.torproject.org/about/protections/
+#: (content/about/protections/contents+en.lrquestion.description)
+msgid ""
+"Note, however, that there are situations where Tor fails to solve these "
+"privacy problems entirely: see the entry below on [remaining "
+"attacks](https://support.torproject.org/about/#attacks-on-onion-routing)."
+msgstr ""
+
#: https//support.torproject.org/about/what-is-tor/
#: (content/about/what-is-tor/contents+en.lrquestion.title)
msgid "What is Tor?"
@@ -4939,9 +5519,11 @@ msgstr ""
#: (content/tbb/tbb-47/contents+en.lrquestion.description)
msgid ""
"Also, read up on the HTTPProxyAuthenticator and HTTPSProxyAuthenticator "
-"options if your proxy requires auth. We only support basic auth currently, "
-"but if you need NTLM authentication, you may find [this post in the "
-"archives](https://archives.seul.org/or/talk/Jun-2005/msg00223.html) useful."
+"options if your [proxy requires auth.](https://developer.mozilla.org/en-"
+"US/docs/Web/HTTP/Headers/Proxy-Authenticate) We only support basic auth "
+"currently, but if you need NTLM authentication, you may find [this post in "
+"the archives](https://archives.seul.org/or/talk/Jun-2005/msg00223.html) "
+"useful."
msgstr ""
#: https//support.torproject.org/tbb/tbb-47/
@@ -5158,6 +5740,219 @@ msgid ""
"have no effect on Tor's configuration."
msgstr ""
+#: https//support.torproject.org/tbb/tbb-firewall-ports/
+#: (content/tbb/tbb-firewall-ports/contents+en.lrquestion.title)
+msgid "My firewall only allows a few outgoing ports"
+msgstr ""
+
+#: https//support.torproject.org/tbb/tbb-firewall-ports/
+#: (content/tbb/tbb-firewall-ports/contents+en.lrquestion.description)
+msgid ""
+"If your firewall works by blocking ports, then you can tell Tor to only use "
+"the ports when you start your Tor Browser."
+msgstr ""
+
+#: https//support.torproject.org/tbb/tbb-firewall-ports/
+#: (content/tbb/tbb-firewall-ports/contents+en.lrquestion.description)
+msgid ""
+"Or you can add the ports that your firewall permits by adding "
+"\"FascistFirewall 1\" to your torrc configuration file."
+msgstr ""
+
+#: https//support.torproject.org/tbb/tbb-firewall-ports/
+#: (content/tbb/tbb-firewall-ports/contents+en.lrquestion.description)
+msgid ""
+"By default, when you set this Tor assumes that your firewall allows only "
+"port 80 and port 443 (HTTP and HTTPS respectively)."
+msgstr ""
+
+#: https//support.torproject.org/tbb/tbb-firewall-ports/
+#: (content/tbb/tbb-firewall-ports/contents+en.lrquestion.description)
+msgid ""
+"You can select a different set of ports with the FirewallPorts torrc option."
+msgstr ""
+
+#: https//support.torproject.org/tbb/tbb-firewall-ports/
+#: (content/tbb/tbb-firewall-ports/contents+en.lrquestion.description)
+msgid ""
+"If you want to be more fine-grained with your controls, you can also use the"
+" ReachableAddresses config options, e.g.:"
+msgstr ""
+
+#: https//support.torproject.org/tbb/tbb-firewall-ports/
+#: (content/tbb/tbb-firewall-ports/contents+en.lrquestion.description)
+#: https//support.torproject.org/tbb/tbb-install-tor-central-server/
+#: (content/tbb/tbb-install-tor-central-server/contents+en.lrquestion.description)
+#: https//support.torproject.org/operators/default-exit-ports/
+#: (content/operators/default-exit-ports/contents+en.lrquestion.description)
+#: https//support.torproject.org/operators/hibernation/
+#: (content/operators/hibernation/contents+en.lrquestion.description)
+#: https//support.torproject.org/operators/limit-total-bandwidth/
+#: (content/operators/limit-total-bandwidth/contents+en.lrquestion.description)
+#: https//support.torproject.org/misc/bug-or-feedback/
+#: (content/misc/bug-or-feedback/contents+en.lrquestion.description)
+#: https//support.torproject.org/get-in-touch/why-i-cant-join-tor-channels/
+#: (content/get-in-touch/why-i-cant-join-tor-channels/contents+en.lrquestion.description)
+#: https//support.torproject.org/apt/tor-deb-repo/
+#: (content/apt/apt-1/contents+en.lrquestion.description)
+#: https//support.torproject.org/apt/apt-over-tor/
+#: (content/apt/apt-3/contents+en.lrquestion.description)
+msgid "```"
+msgstr "```"
+
+#: https//support.torproject.org/tbb/tbb-firewall-ports/
+#: (content/tbb/tbb-firewall-ports/contents+en.lrquestion.description)
+msgid "ReachableDirAddresses *:80"
+msgstr ""
+
+#: https//support.torproject.org/tbb/tbb-firewall-ports/
+#: (content/tbb/tbb-firewall-ports/contents+en.lrquestion.description)
+msgid "ReachableORAddresses *:443"
+msgstr ""
+
+#: https//support.torproject.org/tbb/tbb-install-tor-central-server/
+#: (content/tbb/tbb-install-tor-central-server/contents+en.lrquestion.title)
+msgid ""
+"Can I install Tor on a central server, and have my clients connect to it?"
+msgstr ""
+
+#: https//support.torproject.org/tbb/tbb-install-tor-central-server/
+#: (content/tbb/tbb-install-tor-central-server/contents+en.lrquestion.description)
+msgid ""
+"Yes. Tor can be configured as a client or a relay on another machine, and "
+"allow other machines to be able to connect to it for anonymity."
+msgstr ""
+
+#: https//support.torproject.org/tbb/tbb-install-tor-central-server/
+#: (content/tbb/tbb-install-tor-central-server/contents+en.lrquestion.description)
+msgid ""
+"This is most useful in an environment where many computers want a gateway of"
+" anonymity to the rest of the world."
+msgstr ""
+
+#: https//support.torproject.org/tbb/tbb-install-tor-central-server/
+#: (content/tbb/tbb-install-tor-central-server/contents+en.lrquestion.description)
+msgid ""
+"However, be forewarned that with this configuration, anyone within your "
+"private network (existing between you and the Tor client/relay) can see what"
+" traffic you are sending in clear text."
+msgstr ""
+
+#: https//support.torproject.org/tbb/tbb-install-tor-central-server/
+#: (content/tbb/tbb-install-tor-central-server/contents+en.lrquestion.description)
+msgid "The anonymity doesn't start until you get to the Tor relay."
+msgstr ""
+
+#: https//support.torproject.org/tbb/tbb-install-tor-central-server/
+#: (content/tbb/tbb-install-tor-central-server/contents+en.lrquestion.description)
+msgid ""
+"Because of this, if you are the controller of your domain and you know "
+"everything's locked down, you will be OK, but this configuration may not be "
+"suitable for large private networks where security is key all around."
+msgstr ""
+
+#: https//support.torproject.org/tbb/tbb-install-tor-central-server/
+#: (content/tbb/tbb-install-tor-central-server/contents+en.lrquestion.description)
+msgid ""
+"Configuration is simple, editing your torrc file's SocksListenAddress "
+"according to the following examples:"
+msgstr ""
+
+#: https//support.torproject.org/tbb/tbb-install-tor-central-server/
+#: (content/tbb/tbb-install-tor-central-server/contents+en.lrquestion.description)
+msgid "SocksListenAddress 127.0.0.1"
+msgstr ""
+
+#: https//support.torproject.org/tbb/tbb-install-tor-central-server/
+#: (content/tbb/tbb-install-tor-central-server/contents+en.lrquestion.description)
+msgid "SocksListenAddress 192.168.x.x:9100"
+msgstr ""
+
+#: https//support.torproject.org/tbb/tbb-install-tor-central-server/
+#: (content/tbb/tbb-install-tor-central-server/contents+en.lrquestion.description)
+msgid "SocksListenAddress 0.0.0.0:9100"
+msgstr ""
+
+#: https//support.torproject.org/tbb/tbb-install-tor-central-server/
+#: (content/tbb/tbb-install-tor-central-server/contents+en.lrquestion.description)
+msgid ""
+"You can state multiple listen addresses, in the case that you are part of "
+"several networks or subnets."
+msgstr ""
+
+#: https//support.torproject.org/tbb/tbb-install-tor-central-server/
+#: (content/tbb/tbb-install-tor-central-server/contents+en.lrquestion.description)
+msgid "SocksListenAddress 192.168.x.x:9100 #eth0"
+msgstr ""
+
+#: https//support.torproject.org/tbb/tbb-install-tor-central-server/
+#: (content/tbb/tbb-install-tor-central-server/contents+en.lrquestion.description)
+msgid "SocksListenAddress 10.x.x.x:9100 #eth1"
+msgstr ""
+
+#: https//support.torproject.org/tbb/tbb-install-tor-central-server/
+#: (content/tbb/tbb-install-tor-central-server/contents+en.lrquestion.description)
+msgid ""
+"After this, your clients on their respective networks/subnets would specify "
+"a socks proxy with the address and port you specified SocksListenAddress to "
+"be."
+msgstr ""
+
+#: https//support.torproject.org/tbb/tbb-install-tor-central-server/
+#: (content/tbb/tbb-install-tor-central-server/contents+en.lrquestion.description)
+msgid ""
+"Please note that the SocksPort configuration option gives the port ONLY for "
+"localhost (127.0.0.1)."
+msgstr ""
+
+#: https//support.torproject.org/tbb/tbb-install-tor-central-server/
+#: (content/tbb/tbb-install-tor-central-server/contents+en.lrquestion.description)
+msgid ""
+"When setting up your SocksListenAddress(es), you need to give the port with "
+"the address, as shown above."
+msgstr ""
+
+#: https//support.torproject.org/tbb/tbb-install-tor-central-server/
+#: (content/tbb/tbb-install-tor-central-server/contents+en.lrquestion.description)
+msgid ""
+"If you are interested in forcing all outgoing data through the central Tor "
+"client/relay, instead of the server only being an optional proxy, you may "
+"find the program iptables (for *nix) useful."
+msgstr ""
+
+#: https//support.torproject.org/tbb/tbb-run-client-different-computer/
+#: (content/tbb/tbb-run-client-different-computer/contents+en.lrquestion.title)
+msgid ""
+"I want to run my Tor client on a different computer than my applications"
+msgstr ""
+
+#: https//support.torproject.org/tbb/tbb-run-client-different-computer/
+#: (content/tbb/tbb-run-client-different-computer/contents+en.lrquestion.description)
+msgid ""
+"By default, your Tor client only listens for applications that connect from "
+"localhost."
+msgstr ""
+
+#: https//support.torproject.org/tbb/tbb-run-client-different-computer/
+#: (content/tbb/tbb-run-client-different-computer/contents+en.lrquestion.description)
+msgid "Connections from other computers are refused."
+msgstr ""
+
+#: https//support.torproject.org/tbb/tbb-run-client-different-computer/
+#: (content/tbb/tbb-run-client-different-computer/contents+en.lrquestion.description)
+msgid ""
+"If you want to torify applications on different computers than the Tor "
+"client, you should edit your torrc to define `SocksListenAddress 0.0.0.0` "
+"and then restart (or hup) Tor."
+msgstr ""
+
+#: https//support.torproject.org/tbb/tbb-run-client-different-computer/
+#: (content/tbb/tbb-run-client-different-computer/contents+en.lrquestion.description)
+msgid ""
+"If you want to get more advanced, you can configure your Tor client on a "
+"firewall to bind to your internal IP but not your external IP."
+msgstr ""
+
#: https//support.torproject.org/tbb/website-blocking-tor/
#: (content/tbb/website-blocking-tor/contents+en.lrquestion.title)
msgid "A website I am trying to reach is blocking access over Tor."
@@ -6607,6 +7402,130 @@ msgid ""
"guide."
msgstr ""
+#: https//support.torproject.org/operators/default-exit-ports/
+#: (content/operators/default-exit-ports/contents+en.lrquestion.title)
+msgid "Is there a list of default exit ports?"
+msgstr ""
+
+#: https//support.torproject.org/operators/default-exit-ports/
+#: (content/operators/default-exit-ports/contents+en.lrquestion.description)
+msgid ""
+"The default open ports are listed below but keep in mind that, any port or "
+"ports can be opened by the relay operator by configuring it in torrc or "
+"modifying the source code."
+msgstr ""
+
+#: https//support.torproject.org/operators/default-exit-ports/
+#: (content/operators/default-exit-ports/contents+en.lrquestion.description)
+msgid ""
+"The default according to src/or/policies.c ([line 85][1] and [line 1901][2])"
+" from the source code release [release-0.4.6][3]:"
+msgstr ""
+
+#: https//support.torproject.org/operators/default-exit-ports/
+#: (content/operators/default-exit-ports/contents+en.lrquestion.description)
+msgid "reject 0.0.0.0/8"
+msgstr ""
+
+#: https//support.torproject.org/operators/default-exit-ports/
+#: (content/operators/default-exit-ports/contents+en.lrquestion.description)
+msgid "reject 169.254.0.0/16"
+msgstr ""
+
+#: https//support.torproject.org/operators/default-exit-ports/
+#: (content/operators/default-exit-ports/contents+en.lrquestion.description)
+msgid "reject 127.0.0.0/8"
+msgstr ""
+
+#: https//support.torproject.org/operators/default-exit-ports/
+#: (content/operators/default-exit-ports/contents+en.lrquestion.description)
+msgid "reject 192.168.0.0/16"
+msgstr ""
+
+#: https//support.torproject.org/operators/default-exit-ports/
+#: (content/operators/default-exit-ports/contents+en.lrquestion.description)
+msgid "reject 10.0.0.0/8"
+msgstr ""
+
+#: https//support.torproject.org/operators/default-exit-ports/
+#: (content/operators/default-exit-ports/contents+en.lrquestion.description)
+msgid "reject 172.16.0.0/12"
+msgstr ""
+
+#: https//support.torproject.org/operators/default-exit-ports/
+#: (content/operators/default-exit-ports/contents+en.lrquestion.description)
+msgid "reject *:25"
+msgstr ""
+
+#: https//support.torproject.org/operators/default-exit-ports/
+#: (content/operators/default-exit-ports/contents+en.lrquestion.description)
+msgid "reject *:119"
+msgstr ""
+
+#: https//support.torproject.org/operators/default-exit-ports/
+#: (content/operators/default-exit-ports/contents+en.lrquestion.description)
+msgid "reject *:135-139"
+msgstr ""
+
+#: https//support.torproject.org/operators/default-exit-ports/
+#: (content/operators/default-exit-ports/contents+en.lrquestion.description)
+msgid "reject *:445"
+msgstr ""
+
+#: https//support.torproject.org/operators/default-exit-ports/
+#: (content/operators/default-exit-ports/contents+en.lrquestion.description)
+msgid "reject *:563"
+msgstr ""
+
+#: https//support.torproject.org/operators/default-exit-ports/
+#: (content/operators/default-exit-ports/contents+en.lrquestion.description)
+msgid "reject *:1214"
+msgstr ""
+
+#: https//support.torproject.org/operators/default-exit-ports/
+#: (content/operators/default-exit-ports/contents+en.lrquestion.description)
+msgid "reject *:4661-4666"
+msgstr ""
+
+#: https//support.torproject.org/operators/default-exit-ports/
+#: (content/operators/default-exit-ports/contents+en.lrquestion.description)
+msgid "reject *:6346-6429"
+msgstr ""
+
+#: https//support.torproject.org/operators/default-exit-ports/
+#: (content/operators/default-exit-ports/contents+en.lrquestion.description)
+msgid "reject *:6699"
+msgstr ""
+
+#: https//support.torproject.org/operators/default-exit-ports/
+#: (content/operators/default-exit-ports/contents+en.lrquestion.description)
+msgid "reject *:6881-6999"
+msgstr ""
+
+#: https//support.torproject.org/operators/default-exit-ports/
+#: (content/operators/default-exit-ports/contents+en.lrquestion.description)
+msgid "accept *:*"
+msgstr ""
+
+#: https//support.torproject.org/operators/default-exit-ports/
+#: (content/operators/default-exit-ports/contents+en.lrquestion.description)
+msgid ""
+"[1]: "
+"https://gitlab.torproject.org/tpo/core/tor/-/blob/release-0.4.6/src/core/or/policies.c#L85"
+msgstr ""
+
+#: https//support.torproject.org/operators/default-exit-ports/
+#: (content/operators/default-exit-ports/contents+en.lrquestion.description)
+msgid ""
+"[2]: "
+"https://gitlab.torproject.org/tpo/core/tor/-/blob/release-0.4.6/src/core/or/policies.c#L1901"
+msgstr ""
+
+#: https//support.torproject.org/operators/default-exit-ports/
+#: (content/operators/default-exit-ports/contents+en.lrquestion.description)
+msgid "[3]: https://gitlab.torproject.org/tpo/core/tor/-/tree/release-0.4.6/"
+msgstr ""
+
#: https//support.torproject.org/operators/dynamic-ip/
#: (content/operators/dynamic-ip/contents+en.lrquestion.title)
msgid "Can I run a Tor relay using a dynamic IP address?"
@@ -6754,21 +7673,6 @@ msgid ""
"into hibernation, signaled by this entry in the log:"
msgstr ""
-#: https//support.torproject.org/operators/hibernation/
-#: (content/operators/hibernation/contents+en.lrquestion.description)
-#: https//support.torproject.org/operators/limit-total-bandwidth/
-#: (content/operators/limit-total-bandwidth/contents+en.lrquestion.description)
-#: https//support.torproject.org/misc/bug-or-feedback/
-#: (content/misc/bug-or-feedback/contents+en.lrquestion.description)
-#: https//support.torproject.org/get-in-touch/why-i-cant-join-tor-channels/
-#: (content/get-in-touch/why-i-cant-join-tor-channels/contents+en.lrquestion.description)
-#: https//support.torproject.org/apt/tor-deb-repo/
-#: (content/apt/apt-1/contents+en.lrquestion.description)
-#: https//support.torproject.org/apt/apt-over-tor/
-#: (content/apt/apt-3/contents+en.lrquestion.description)
-msgid "```"
-msgstr "```"
-
#: https//support.torproject.org/operators/hibernation/
#: (content/operators/hibernation/contents+en.lrquestion.description)
msgid "Bandwidth soft limit reached; commencing hibernation."
@@ -9006,6 +9910,131 @@ msgstr ""
msgid "sub 4096R/C00942E4 2017-03-13"
msgstr ""
+#: https//support.torproject.org/misc/check-socks-dns-leaks/
+#: (content/misc/check-socks-dns-leaks/contents+en.lrquestion.title)
+msgid ""
+"How do I check if my application that uses SOCKS is leaking DNS requests?"
+msgstr ""
+
+#: https//support.torproject.org/misc/check-socks-dns-leaks/
+#: (content/misc/check-socks-dns-leaks/contents+en.lrquestion.description)
+msgid ""
+"Even if your application is using the correct variant of the SOCKS protocol,"
+" there is still a risk that it could be leaking DNS queries."
+msgstr ""
+
+#: https//support.torproject.org/misc/check-socks-dns-leaks/
+#: (content/misc/check-socks-dns-leaks/contents+en.lrquestion.description)
+msgid ""
+"This problem happens in Firefox extensions that resolve the destination "
+"hostname themselves, for example to show you its IP address, what country "
+"it's in, etc."
+msgstr ""
+
+#: https//support.torproject.org/misc/check-socks-dns-leaks/
+#: (content/misc/check-socks-dns-leaks/contents+en.lrquestion.description)
+msgid ""
+"If you suspect your application might behave like this, follow the "
+"instructions below to check."
+msgstr ""
+
+#: https//support.torproject.org/misc/check-socks-dns-leaks/
+#: (content/misc/check-socks-dns-leaks/contents+en.lrquestion.description)
+msgid ""
+"1. Add `TestSocks 1` to your [torrc file](https://support.torproject.org/tbb"
+"/tbb-editing-torrc/)."
+msgstr ""
+
+#: https//support.torproject.org/misc/check-socks-dns-leaks/
+#: (content/misc/check-socks-dns-leaks/contents+en.lrquestion.description)
+msgid ""
+"1. Start Tor, and point your program's SOCKS proxy settings to Tor's SOCKS5 "
+"server (`socks5://127.0.0.1:9050` by default)."
+msgstr ""
+
+#: https//support.torproject.org/misc/check-socks-dns-leaks/
+#: (content/misc/check-socks-dns-leaks/contents+en.lrquestion.description)
+msgid ""
+"1. Watch your logs as you use your application. For each socks connection, "
+"Tor will log a `notice` for safe connections, and a `warn` for connections "
+"leaking DNS requests."
+msgstr ""
+
+#: https//support.torproject.org/misc/check-socks-dns-leaks/
+#: (content/misc/check-socks-dns-leaks/contents+en.lrquestion.description)
+msgid ""
+"If you want to automatically disable all connections leaking DNS requests, "
+"set `SafeSocks 1` in your torrc file."
+msgstr ""
+
+#: https//support.torproject.org/misc/hide-exits/
+#: (content/misc/hide-exits/contents+en.lrquestion.title)
+msgid ""
+"You should hide the list of Tor relays, so people can't block the exits."
+msgstr ""
+
+#: https//support.torproject.org/misc/hide-exits/
+#: (content/misc/hide-exits/contents+en.lrquestion.description)
+msgid "There are a few reasons we don't:"
+msgstr ""
+
+#: https//support.torproject.org/misc/hide-exits/
+#: (content/misc/hide-exits/contents+en.lrquestion.description)
+msgid ""
+"1. We can't help but make the information available, since Tor clients need "
+"to use it to pick their paths."
+msgstr ""
+
+#: https//support.torproject.org/misc/hide-exits/
+#: (content/misc/hide-exits/contents+en.lrquestion.description)
+msgid "So if the \"blockers\" want it, they can get it anyway."
+msgstr ""
+
+#: https//support.torproject.org/misc/hide-exits/
+#: (content/misc/hide-exits/contents+en.lrquestion.description)
+msgid ""
+"Further, even if we didn't tell clients about the list of relays directly, "
+"somebody could still make a lot of connections through Tor to a test site "
+"and build a list of the addresses they see."
+msgstr ""
+
+#: https//support.torproject.org/misc/hide-exits/
+#: (content/misc/hide-exits/contents+en.lrquestion.description)
+msgid ""
+"1. If people want to block us, we believe that they should be allowed to do "
+"so."
+msgstr ""
+
+#: https//support.torproject.org/misc/hide-exits/
+#: (content/misc/hide-exits/contents+en.lrquestion.description)
+msgid ""
+"Obviously, we would prefer for everybody to allow Tor users to connect to "
+"them, but people have the right to decide who their services should allow "
+"connections from, and if they want to block anonymous users, they can."
+msgstr ""
+
+#: https//support.torproject.org/misc/hide-exits/
+#: (content/misc/hide-exits/contents+en.lrquestion.description)
+msgid ""
+"1. Being blockable also has tactical advantages: it may be a persuasive "
+"response to website maintainers who feel threatened by Tor."
+msgstr ""
+
+#: https//support.torproject.org/misc/hide-exits/
+#: (content/misc/hide-exits/contents+en.lrquestion.description)
+msgid ""
+"Giving them the option may inspire them to stop and think about whether they"
+" really want to eliminate private access to their system, and if not, what "
+"other options they might have."
+msgstr ""
+
+#: https//support.torproject.org/misc/hide-exits/
+#: (content/misc/hide-exits/contents+en.lrquestion.description)
+msgid ""
+"The time they might otherwise have spent blocking Tor, they may instead "
+"spend rethinking their overall approach to privacy and anonymity."
+msgstr ""
+
#: https//support.torproject.org/misc/menu/
#: (content/misc/menu/contents+en.lrquestion.description)
msgid "About"
@@ -9590,56 +10619,20 @@ msgstr ""
#: https//support.torproject.org/get-in-touch/why-i-cant-join-tor-channels/
#: (content/get-in-touch/why-i-cant-join-tor-channels/contents+en.lrquestion.description)
msgid ""
-"Then, to complete the registration and ultimately gain access to the #tor-"
-"project channel, your nickname must be **verified**."
-msgstr ""
-
-#: https//support.torproject.org/get-in-touch/why-i-cant-join-tor-channels/
-#: (content/get-in-touch/why-i-cant-join-tor-channels/contents+en.lrquestion.description)
-msgid ""
-"1. To verify your nick, open a new browser window and go to "
-"https://webchat.oftc.net/?channels=tor."
-msgstr ""
-
-#: https//support.torproject.org/get-in-touch/why-i-cant-join-tor-channels/
-#: (content/get-in-touch/why-i-cant-join-tor-channels/contents+en.lrquestion.description)
-msgid "2. Log in with your IRC nickname and password."
-msgstr ""
-
-#: https//support.torproject.org/get-in-touch/why-i-cant-join-tor-channels/
-#: (content/get-in-touch/why-i-cant-join-tor-channels/contents+en.lrquestion.description)
-msgid ""
-"3. Look for the word **verify** and log in there. It may appear that nothing"
-" has happened. Look at the top of the page, and there will be a column "
-"called **Account**."
-msgstr ""
-
-#: https//support.torproject.org/get-in-touch/why-i-cant-join-tor-channels/
-#: (content/get-in-touch/why-i-cant-join-tor-channels/contents+en.lrquestion.description)
-msgid "4. Click on **Account**."
-msgstr ""
-
-#: https//support.torproject.org/get-in-touch/why-i-cant-join-tor-channels/
-#: (content/get-in-touch/why-i-cant-join-tor-channels/contents+en.lrquestion.description)
-msgid ""
-"5. Click on the small sentence at the bottom of the square that says: Verify"
-" account."
-msgstr ""
-
-#: https//support.torproject.org/get-in-touch/why-i-cant-join-tor-channels/
-#: (content/get-in-touch/why-i-cant-join-tor-channels/contents+en.lrquestion.description)
-msgid "6. Fill out the Captcha that pops up, and click ok."
+"After registering your nickname, to gain access to the #tor-project and "
+"other protected channels, your nickname must be **verified**."
msgstr ""
#: https//support.torproject.org/get-in-touch/why-i-cant-join-tor-channels/
#: (content/get-in-touch/why-i-cant-join-tor-channels/contents+en.lrquestion.description)
msgid ""
-"7. A tiny message will appear: \"Your NickServ account has been verified.\""
+"1. Go to https://services.oftc.net/ and follow the steps in the '*To verify "
+"your account*' section"
msgstr ""
#: https//support.torproject.org/get-in-touch/why-i-cant-join-tor-channels/
#: (content/get-in-touch/why-i-cant-join-tor-channels/contents+en.lrquestion.description)
-msgid "8. Go back to the IRC webpage where you are logged in and type:"
+msgid "2. Go back to the IRC webpage where you are logged in and type:"
msgstr ""
#: https//support.torproject.org/get-in-touch/why-i-cant-join-tor-channels/
@@ -9649,12 +10642,12 @@ msgstr ""
#: https//support.torproject.org/get-in-touch/why-i-cant-join-tor-channels/
#: (content/get-in-touch/why-i-cant-join-tor-channels/contents+en.lrquestion.description)
-msgid "9. Click ENTER."
+msgid "3. Click ENTER."
msgstr ""
#: https//support.torproject.org/get-in-touch/why-i-cant-join-tor-channels/
#: (content/get-in-touch/why-i-cant-join-tor-channels/contents+en.lrquestion.description)
-msgid "10. If all is well, you will receive a message that says:"
+msgid "4. If all is well, you will receive a message that says:"
msgstr ""
#: https//support.torproject.org/get-in-touch/why-i-cant-join-tor-channels/
@@ -9795,18 +10788,22 @@ msgstr "# apt install apt-transport-https"
#: https//support.torproject.org/apt/tor-deb-repo/
#: (content/apt/apt-1/contents+en.lrquestion.description)
msgid ""
-"#### 2. Add the following entries to `/etc/apt/sources.list` or a new file "
-"in `/etc/apt/sources.list.d/`"
+"#### 2. Create a new file in `/etc/apt/sources.list.d/` named `tor.list`. "
+"Add the following entries:"
msgstr ""
#: https//support.torproject.org/apt/tor-deb-repo/
#: (content/apt/apt-1/contents+en.lrquestion.description)
-msgid "deb https://deb.torproject.org/torproject.org <DISTRIBUTION> main"
+msgid ""
+"deb [signed-by=/usr/share/keyrings/tor-archive-keyring.gpg] "
+"https://deb.torproject.org/torproject.org <DISTRIBUTION> main"
msgstr ""
#: https//support.torproject.org/apt/tor-deb-repo/
#: (content/apt/apt-1/contents+en.lrquestion.description)
-msgid "deb-src https://deb.torproject.org/torproject.org <DISTRIBUTION> main"
+msgid ""
+"deb-src [signed-by=/usr/share/keyrings/tor-archive-keyring.gpg] "
+"https://deb.torproject.org/torproject.org <DISTRIBUTION> main"
msgstr ""
#: https//support.torproject.org/apt/tor-deb-repo/
@@ -9820,14 +10817,16 @@ msgstr ""
#: https//support.torproject.org/apt/tor-deb-repo/
#: (content/apt/apt-1/contents+en.lrquestion.description)
msgid ""
-"deb https://deb.torproject.org/torproject.org tor-"
+"deb [signed-by=/usr/share/keyrings/tor-archive-keyring.gpg] "
+"https://deb.torproject.org/torproject.org tor-"
"experimental-0.4.6.x-<DISTRIBUTION> main"
msgstr ""
#: https//support.torproject.org/apt/tor-deb-repo/
#: (content/apt/apt-1/contents+en.lrquestion.description)
msgid ""
-"deb-src https://deb.torproject.org/torproject.org tor-"
+"deb-src [signed-by=/usr/share/keyrings/tor-archive-keyring.gpg] "
+"https://deb.torproject.org/torproject.org tor-"
"experimental-0.4.6.x-<DISTRIBUTION> main"
msgstr ""
@@ -9839,15 +10838,17 @@ msgstr ""
#: https//support.torproject.org/apt/tor-deb-repo/
#: (content/apt/apt-1/contents+en.lrquestion.description)
msgid ""
-"deb https://deb.torproject.org/torproject.org tor-nightly-"
-"master-<DISTRIBUTION> main"
+"deb [signed-by=/usr/share/keyrings/tor-archive-keyring.gpg] "
+"https://deb.torproject.org/torproject.org tor-nightly-master-<DISTRIBUTION> "
+"main"
msgstr ""
#: https//support.torproject.org/apt/tor-deb-repo/
#: (content/apt/apt-1/contents+en.lrquestion.description)
msgid ""
-"deb-src https://deb.torproject.org/torproject.org tor-nightly-"
-"master-<DISTRIBUTION> main"
+"deb-src [signed-by=/usr/share/keyrings/tor-archive-keyring.gpg] "
+"https://deb.torproject.org/torproject.org tor-nightly-master-<DISTRIBUTION> "
+"main"
msgstr ""
#: https//support.torproject.org/apt/tor-deb-repo/
@@ -9868,13 +10869,15 @@ msgstr ""
#: https//support.torproject.org/apt/tor-deb-repo/
#: (content/apt/apt-1/contents+en.lrquestion.description)
msgid ""
-"deb [arch=amd64] https://deb.torproject.org/torproject.org focal main"
+"deb [arch=amd64 signed-by=/usr/share/keyrings/tor-archive-keyring.gpg] "
+"https://deb.torproject.org/torproject.org focal main"
msgstr ""
#: https//support.torproject.org/apt/tor-deb-repo/
#: (content/apt/apt-1/contents+en.lrquestion.description)
msgid ""
-"deb-src [arch=amd64] https://deb.torproject.org/torproject.org focal main"
+"deb-src [arch=amd64 signed-by=/usr/share/keyrings/tor-archive-keyring.gpg] "
+"https://deb.torproject.org/torproject.org focal main"
msgstr ""
#: https//support.torproject.org/apt/tor-deb-repo/
@@ -9894,26 +10897,17 @@ msgstr ""
#: (content/apt/apt-1/contents+en.lrquestion.description)
msgid ""
"#### 3. Then add the gpg key used to sign the packages by running the "
-"following commands at your command prompt"
+"following command at your command prompt:"
msgstr ""
#: https//support.torproject.org/apt/tor-deb-repo/
#: (content/apt/apt-1/contents+en.lrquestion.description)
msgid ""
-"# wget -qO- "
+"# wget -O- "
"https://deb.torproject.org/torproject.org/A3C4F0F979CAA22CDBA8F512EE8CBC9E886DDD89.asc"
-" | gpg --import"
+" | gpg --dearmor | tee /usr/share/keyrings/tor-archive-keyring.gpg "
+">/dev/null"
msgstr ""
-"# wget -qO- "
-"https://deb.torproject.org/torproject.org/A3C4F0F979CAA22CDBA8F512EE8CBC9E886DDD89.asc"
-" | gpg --import"
-
-#: https//support.torproject.org/apt/tor-deb-repo/
-#: (content/apt/apt-1/contents+en.lrquestion.description)
-msgid ""
-"# gpg --export A3C4F0F979CAA22CDBA8F512EE8CBC9E886DDD89 | apt-key add -"
-msgstr ""
-"# gpg --export A3C4F0F979CAA22CDBA8F512EE8CBC9E886DDD89 | apt-key add -"
#: https//support.torproject.org/apt/tor-deb-repo/
#: (content/apt/apt-1/contents+en.lrquestion.description)
@@ -11519,6 +12513,82 @@ msgid ""
"doesn't change IP address over the day."
msgstr ""
+#: https//support.torproject.org/alternate-designs/block-websites/
+#: (content/alternate-designs/block-websites/contents+en.lrquestion.title)
+msgid "Exit policies should be able to block websites, not just IP addresses."
+msgstr ""
+
+#: https//support.torproject.org/alternate-designs/block-websites/
+#: (content/alternate-designs/block-websites/contents+en.lrquestion.description)
+msgid ""
+"It would be nice to let relay operators say things like `reject "
+"www.slashdot.org` in their exit policies, rather than requiring them to "
+"learn all the IP address space that could be covered by the site (and then "
+"also blocking other sites at those IP addresses)."
+msgstr ""
+
+#: https//support.torproject.org/alternate-designs/block-websites/
+#: (content/alternate-designs/block-websites/contents+en.lrquestion.description)
+msgid "There are two problems, though."
+msgstr ""
+
+#: https//support.torproject.org/alternate-designs/block-websites/
+#: (content/alternate-designs/block-websites/contents+en.lrquestion.description)
+msgid "First, users could still get around these blocks."
+msgstr ""
+
+#: https//support.torproject.org/alternate-designs/block-websites/
+#: (content/alternate-designs/block-websites/contents+en.lrquestion.description)
+msgid ""
+"For example, they could request the IP address rather than the hostname when"
+" they exit from the Tor network."
+msgstr ""
+
+#: https//support.torproject.org/alternate-designs/block-websites/
+#: (content/alternate-designs/block-websites/contents+en.lrquestion.description)
+msgid ""
+"This means operators would still need to learn all the IP addresses for the "
+"destinations in question."
+msgstr ""
+
+#: https//support.torproject.org/alternate-designs/block-websites/
+#: (content/alternate-designs/block-websites/contents+en.lrquestion.description)
+msgid ""
+"The second problem is that it would allow remote attackers to censor "
+"arbitrary sites."
+msgstr ""
+
+#: https//support.torproject.org/alternate-designs/block-websites/
+#: (content/alternate-designs/block-websites/contents+en.lrquestion.description)
+msgid ""
+"For example, if a Tor operator blocks www1.slashdot.org, and then some "
+"attacker poisons the Tor relay's DNS or otherwise changes that hostname to "
+"resolve to the IP address for a major news site, then suddenly that Tor "
+"relay is blocking the news site."
+msgstr ""
+
+#: https//support.torproject.org/alternate-designs/let-the-network-pick-the-path/
+#: (content/alternate-designs/let-the-network-pick-the-path/contents+en.lrquestion.title)
+msgid "You should let the network pick the path, not the client."
+msgstr ""
+
+#: https//support.torproject.org/alternate-designs/let-the-network-pick-the-path/
+#: (content/alternate-designs/let-the-network-pick-the-path/contents+en.lrquestion.description)
+msgid "No, you cannot trust the network to pick the path."
+msgstr ""
+
+#: https//support.torproject.org/alternate-designs/let-the-network-pick-the-path/
+#: (content/alternate-designs/let-the-network-pick-the-path/contents+en.lrquestion.description)
+msgid "Malicious relays could route you through their colluding friends."
+msgstr ""
+
+#: https//support.torproject.org/alternate-designs/let-the-network-pick-the-path/
+#: (content/alternate-designs/let-the-network-pick-the-path/contents+en.lrquestion.description)
+msgid ""
+"This would give an adversary the ability to watch all of your traffic end to"
+" end."
+msgstr ""
+
#: lego/templates/banner.html:3 lego/templates/banner.html:5
#: templates/banner.html:3 templates/banner.html:5
msgid "Close banner"
@@ -11551,8 +12621,8 @@ msgid "DONATE NOW"
msgstr "ááᯠáá¾á°áááº"
#: lego/templates/footer.html:13 lego/templates/footer.html:22
-#: lego/templates/navbar.html:83 templates/footer.html:13
-#: templates/footer.html:22 templates/navbar.html:83
+#: lego/templates/navbar.html:95 templates/footer.html:13
+#: templates/footer.html:22 templates/navbar.html:95
msgid "Download Tor Browser"
msgstr "Tor Browser áá±á«ááºá¸áá¯ááºáá¯ááºáááº"
diff --git a/contents+nb.po b/contents+nb.po
index 4e43428ea7..ac4400c2a4 100644
--- a/contents+nb.po
+++ b/contents+nb.po
@@ -11,7 +11,7 @@ msgid ""
msgstr ""
"Project-Id-Version: PACKAGE VERSION\n"
"Report-Msgid-Bugs-To: \n"
-"POT-Creation-Date: 2021-08-25 11:14+CET\n"
+"POT-Creation-Date: 2021-09-01 12:20+CET\n"
"PO-Revision-Date: 2018-10-02 22:41+0000\n"
"Last-Translator: Emma Peel, 2021\n"
"Language-Team: Norwegian Bokmål (https://www.transifex.com/otf/teams/1519/nb/)\n"
@@ -144,6 +144,11 @@ msgstr ""
msgid "Tor Metrics"
msgstr "Tor-metrisk"
+#: https//support.torproject.org/alternate-designs/
+#: (content/alternate-designs/contents+en.lrtopic.title)
+msgid "Alternate Designs We Don't Do (Yet)"
+msgstr ""
+
#: https//support.torproject.org/glossary/add-on-extension-or-plugin/
#: (content/glossary/add-on-extension-or-plugin/contents+en.lrword.term)
msgid "add-on, extension, or plugin"
@@ -2036,6 +2041,61 @@ msgid ""
"wiki](https://trac.torproject.org/projects/tor/wiki/doc/TorPlusVPN)."
msgstr ""
+#: https//support.torproject.org/faq/relay-donations/
+#: (content/faq/relay-donations/contents+en.lrquestion.title)
+msgid "Can I donate for a relay rather than run my own?"
+msgstr ""
+
+#: https//support.torproject.org/faq/relay-donations/
+#: (content/faq/relay-donations/contents+en.lrquestion.description)
+msgid ""
+"Sure! We have a [list of organizations that run Tor "
+"relays](https://community.torproject.org/relay/community-resources/relay-"
+"associations/) that are happy to turn your donations into better speed and "
+"anonymity for the Tor network."
+msgstr ""
+
+#: https//support.torproject.org/faq/relay-donations/
+#: (content/faq/relay-donations/contents+en.lrquestion.description)
+msgid ""
+"These organizations are not the same as [The Tor Project, "
+"Inc](https://donate.torproject.org/), but we consider that a good thing."
+msgstr ""
+
+#: https//support.torproject.org/faq/relay-donations/
+#: (content/faq/relay-donations/contents+en.lrquestion.description)
+msgid "They're run by nice people who are part of the Tor community."
+msgstr ""
+
+#: https//support.torproject.org/faq/relay-donations/
+#: (content/faq/relay-donations/contents+en.lrquestion.description)
+msgid ""
+"Note that there can be a tradeoff here between anonymity and performance."
+msgstr ""
+
+#: https//support.torproject.org/faq/relay-donations/
+#: (content/faq/relay-donations/contents+en.lrquestion.description)
+msgid ""
+"The Tor network's anonymity comes in part from diversity, so if you are in a"
+" position to run your own relay, you will be improving Tor's anonymity more "
+"than by donating."
+msgstr ""
+
+#: https//support.torproject.org/faq/relay-donations/
+#: (content/faq/relay-donations/contents+en.lrquestion.description)
+msgid ""
+"At the same time though, economies of scale for bandwidth mean that "
+"combining many small donations into several larger relays is more efficient "
+"at improving network performance."
+msgstr ""
+
+#: https//support.torproject.org/faq/relay-donations/
+#: (content/faq/relay-donations/contents+en.lrquestion.description)
+msgid ""
+"Improving anonymity and improving performance are both worthwhile goals, so "
+"however you can help is great!"
+msgstr ""
+
#: https//support.torproject.org/faq/staying-anonymous/
#: (content/faq/staying-anonymous/contents+en.lrquestion.title)
msgid "Am I totally anonymous if I use Tor?"
@@ -2338,6 +2398,61 @@ msgid ""
" documenting all the issues](https://community.torproject.org/)."
msgstr ""
+#: https//support.torproject.org/about/attacks-on-onion-routing/
+#: (content/about/attacks-on-onion-routing/contents+en.lrquestion.title)
+msgid "What attacks remain against onion routing?"
+msgstr ""
+
+#: https//support.torproject.org/about/attacks-on-onion-routing/
+#: (content/about/attacks-on-onion-routing/contents+en.lrquestion.description)
+msgid ""
+"As mentioned above, it is possible for an observer who can view both you and"
+" either the destination website or your Tor exit node to correlate timings "
+"of your traffic as it enters the Tor network and also as it exits."
+msgstr ""
+
+#: https//support.torproject.org/about/attacks-on-onion-routing/
+#: (content/about/attacks-on-onion-routing/contents+en.lrquestion.description)
+msgid "Tor does not defend against such a threat model."
+msgstr ""
+
+#: https//support.torproject.org/about/attacks-on-onion-routing/
+#: (content/about/attacks-on-onion-routing/contents+en.lrquestion.description)
+msgid ""
+"In a more limited sense, note that if a censor or law enforcement agency has"
+" the ability to obtain specific observation of parts of the network, it is "
+"possible for them to verify a suspicion that you talk regularly to your "
+"friend by observing traffic at both ends and correlating the timing of only "
+"that traffic."
+msgstr ""
+
+#: https//support.torproject.org/about/attacks-on-onion-routing/
+#: (content/about/attacks-on-onion-routing/contents+en.lrquestion.description)
+msgid ""
+"Again, this is only useful to verify that parties already suspected of "
+"communicating with one another are doing so."
+msgstr ""
+
+#: https//support.torproject.org/about/attacks-on-onion-routing/
+#: (content/about/attacks-on-onion-routing/contents+en.lrquestion.description)
+msgid ""
+"In most countries, the suspicion required to obtain a warrant already "
+"carries more weight than timing correlation would provide."
+msgstr ""
+
+#: https//support.torproject.org/about/attacks-on-onion-routing/
+#: (content/about/attacks-on-onion-routing/contents+en.lrquestion.description)
+msgid ""
+"Furthermore, since Tor reuses circuits for multiple TCP connections, it is "
+"possible to associate non anonymous and anonymous traffic at a given exit "
+"node, so be careful about what applications you run concurrently over Tor."
+msgstr ""
+
+#: https//support.torproject.org/about/attacks-on-onion-routing/
+#: (content/about/attacks-on-onion-routing/contents+en.lrquestion.description)
+msgid "Perhaps even run separate Tor clients for these applications."
+msgstr ""
+
#: https//support.torproject.org/about/backdoor/
#: (content/about/backdoor/contents+en.lrquestion.title)
msgid "Is there a backdoor in Tor?"
@@ -2473,6 +2588,43 @@ msgid ""
"recommended](/tbb/tbb-9/)."
msgstr ""
+#: https//support.torproject.org/about/change-paths/
+#: (content/about/change-paths/contents+en.lrquestion.title)
+msgid "How often does Tor change its paths?"
+msgstr ""
+
+#: https//support.torproject.org/about/change-paths/
+#: (content/about/change-paths/contents+en.lrquestion.description)
+msgid ""
+"Tor will reuse the same circuit for new TCP streams for 10 minutes, as long "
+"as the circuit is working fine."
+msgstr ""
+
+#: https//support.torproject.org/about/change-paths/
+#: (content/about/change-paths/contents+en.lrquestion.description)
+msgid "(If the circuit fails, Tor will switch to a new circuit immediately.)"
+msgstr ""
+
+#: https//support.torproject.org/about/change-paths/
+#: (content/about/change-paths/contents+en.lrquestion.description)
+msgid ""
+"But note that a single TCP stream (e.g. a long IRC connection) will stay on "
+"the same circuit forever."
+msgstr ""
+
+#: https//support.torproject.org/about/change-paths/
+#: (content/about/change-paths/contents+en.lrquestion.description)
+msgid "We don't rotate individual streams from one circuit to the next."
+msgstr ""
+
+#: https//support.torproject.org/about/change-paths/
+#: (content/about/change-paths/contents+en.lrquestion.description)
+msgid ""
+"Otherwise, an adversary with a partial view of the network would be given "
+"many chances over time to link you to your destination, rather than just one"
+" chance."
+msgstr ""
+
#: https//support.torproject.org/about/distribute-tor/
#: (content/about/distribute-tor/contents+en.lrquestion.title)
msgid "Can I distribute Tor?"
@@ -2568,6 +2720,133 @@ msgid ""
"details."
msgstr ""
+#: https//support.torproject.org/about/entry-guards/
+#: (content/about/entry-guards/contents+en.lrquestion.title)
+msgid "What are Entry Guards?"
+msgstr ""
+
+#: https//support.torproject.org/about/entry-guards/
+#: (content/about/entry-guards/contents+en.lrquestion.description)
+msgid ""
+"Tor (like all current practical low-latency anonymity designs) fails when "
+"the attacker can see both ends of the communications channel."
+msgstr ""
+
+#: https//support.torproject.org/about/entry-guards/
+#: (content/about/entry-guards/contents+en.lrquestion.description)
+msgid ""
+"For example, suppose the attacker controls or watches the Tor relay you "
+"choose to enter the network, and also controls or watches the website you "
+"visit."
+msgstr ""
+
+#: https//support.torproject.org/about/entry-guards/
+#: (content/about/entry-guards/contents+en.lrquestion.description)
+msgid ""
+"In this case, the research community knows no practical low-latency design "
+"that can reliably stop the attacker from correlating volume and timing "
+"information on the two sides."
+msgstr ""
+
+#: https//support.torproject.org/about/entry-guards/
+#: (content/about/entry-guards/contents+en.lrquestion.description)
+msgid "So, what should we do?"
+msgstr ""
+
+#: https//support.torproject.org/about/entry-guards/
+#: (content/about/entry-guards/contents+en.lrquestion.description)
+msgid "Suppose the attacker controls, or can observe, C relays."
+msgstr ""
+
+#: https//support.torproject.org/about/entry-guards/
+#: (content/about/entry-guards/contents+en.lrquestion.description)
+msgid "Suppose there are N relays total."
+msgstr ""
+
+#: https//support.torproject.org/about/entry-guards/
+#: (content/about/entry-guards/contents+en.lrquestion.description)
+msgid ""
+"If you select new entry and exit relays each time you use the network, the "
+"attacker will be able to correlate all traffic you send with probability "
+"around (c/n)2."
+msgstr ""
+
+#: https//support.torproject.org/about/entry-guards/
+#: (content/about/entry-guards/contents+en.lrquestion.description)
+msgid ""
+"But profiling is, for most users, as bad as being traced all the time: they "
+"want to do something often without an attacker noticing, and the attacker "
+"noticing once is as bad as the attacker noticing more often."
+msgstr ""
+
+#: https//support.torproject.org/about/entry-guards/
+#: (content/about/entry-guards/contents+en.lrquestion.description)
+msgid ""
+"Thus, choosing many random entries and exits gives the user no chance of "
+"escaping profiling by this kind of attacker."
+msgstr ""
+
+#: https//support.torproject.org/about/entry-guards/
+#: (content/about/entry-guards/contents+en.lrquestion.description)
+msgid ""
+"The solution is \"entry guards\": each Tor client selects a few relays at "
+"random to use as entry points, and uses only those relays for their first "
+"hop."
+msgstr ""
+
+#: https//support.torproject.org/about/entry-guards/
+#: (content/about/entry-guards/contents+en.lrquestion.description)
+msgid ""
+"If those relays are not controlled or observed, the attacker can't win, "
+"ever, and the user is secure."
+msgstr ""
+
+#: https//support.torproject.org/about/entry-guards/
+#: (content/about/entry-guards/contents+en.lrquestion.description)
+msgid ""
+"If those relays are observed or controlled by the attacker, the attacker "
+"sees a larger fraction of the user's traffic - but still the user is no more"
+" profiled than before."
+msgstr ""
+
+#: https//support.torproject.org/about/entry-guards/
+#: (content/about/entry-guards/contents+en.lrquestion.description)
+msgid ""
+"Thus, the user has some chance (on the order of (n-c)/n) of avoiding "
+"profiling, whereas they had none before."
+msgstr ""
+
+#: https//support.torproject.org/about/entry-guards/
+#: (content/about/entry-guards/contents+en.lrquestion.description)
+msgid ""
+"You can read more at [An Analysis of the Degradation of Anonymous "
+"Protocols](http://freehaven.net/anonbib/#wright02), [Defending Anonymous "
+"Communication Against Passive Logging "
+"Attacks](http://freehaven.net/anonbib/#wright03), and especially [Locating "
+"Hidden Servers](http://freehaven.net/anonbib/#hs-attack06)."
+msgstr ""
+
+#: https//support.torproject.org/about/entry-guards/
+#: (content/about/entry-guards/contents+en.lrquestion.description)
+msgid ""
+"Restricting your entry nodes may also help against attackers who want to run"
+" a few Tor nodes and easily enumerate all of the Tor user IP addresses."
+msgstr ""
+
+#: https//support.torproject.org/about/entry-guards/
+#: (content/about/entry-guards/contents+en.lrquestion.description)
+msgid ""
+"(Even though they can't learn what destinations the users are talking to, "
+"they still might be able to do bad things with just a list of users.)"
+msgstr ""
+
+#: https//support.torproject.org/about/entry-guards/
+#: (content/about/entry-guards/contents+en.lrquestion.description)
+msgid ""
+"However, that feature won't really become useful until we move to a "
+"\"directory guard\" design as well."
+msgstr ""
+
#: https//support.torproject.org/about/how-is-tor-different-from-other-proxies/
#: (content/about/how-is-tor-different-from-other-proxies/contents+en.lrquestion.title)
msgid "How is Tor different from other proxies?"
@@ -2738,6 +3017,162 @@ msgid ""
" Tor and HTTPS interact."
msgstr ""
+#: https//support.torproject.org/about/key-management/
+#: (content/about/key-management/contents+en.lrquestion.title)
+msgid "Tell me about all the keys Tor uses"
+msgstr ""
+
+#: https//support.torproject.org/about/key-management/
+#: (content/about/key-management/contents+en.lrquestion.description)
+msgid ""
+"Tor uses a variety of different keys, with three goals in mind: 1) "
+"encryption to ensure privacy of data within the Tor network, 2) "
+"authentication so clients know they're talking to the relays they meant to "
+"talk to, and 3) signatures to make sure all clients know the same set of "
+"relays."
+msgstr ""
+
+#: https//support.torproject.org/about/key-management/
+#: (content/about/key-management/contents+en.lrquestion.description)
+msgid ""
+"**Encryption**: first, all connections in Tor use TLS link encryption, so "
+"observers can't look inside to see which circuit a given cell is intended "
+"for."
+msgstr ""
+
+#: https//support.torproject.org/about/key-management/
+#: (content/about/key-management/contents+en.lrquestion.description)
+msgid ""
+"Further, the Tor client establishes an ephemeral encryption key with each "
+"relay in the circuit; these extra layers of encryption mean that only the "
+"exit relay can read the cells."
+msgstr ""
+
+#: https//support.torproject.org/about/key-management/
+#: (content/about/key-management/contents+en.lrquestion.description)
+msgid ""
+"Both sides discard the circuit key when the circuit ends, so logging traffic"
+" and then breaking into the relay to discover the key won't work."
+msgstr ""
+
+#: https//support.torproject.org/about/key-management/
+#: (content/about/key-management/contents+en.lrquestion.description)
+msgid ""
+"**Authentication**: Every Tor relay has a public decryption key called the "
+"\"onion key\"."
+msgstr ""
+
+#: https//support.torproject.org/about/key-management/
+#: (content/about/key-management/contents+en.lrquestion.description)
+msgid "Each relay rotates its onion key once a week."
+msgstr ""
+
+#: https//support.torproject.org/about/key-management/
+#: (content/about/key-management/contents+en.lrquestion.description)
+msgid ""
+"When the Tor client establishes circuits, at each step it [demands that the "
+"Tor relay prove knowledge of its onion key](https://svn-"
+"archive.torproject.org/svn/projects/design-paper/tor-"
+"design.html#subsec:circuits)."
+msgstr ""
+
+#: https//support.torproject.org/about/key-management/
+#: (content/about/key-management/contents+en.lrquestion.description)
+msgid ""
+"That way the first node in the path can't just spoof the rest of the path."
+msgstr ""
+
+#: https//support.torproject.org/about/key-management/
+#: (content/about/key-management/contents+en.lrquestion.description)
+msgid ""
+"Because the Tor client chooses the path, it can make sure to get Tor's "
+"\"distributed trust\" property: no single relay in the path can know about "
+"both the client and what the client is doing."
+msgstr ""
+
+#: https//support.torproject.org/about/key-management/
+#: (content/about/key-management/contents+en.lrquestion.description)
+msgid ""
+"**Coordination**: How do clients know what the relays are, and how do they "
+"know that they have the right keys for them?"
+msgstr ""
+
+#: https//support.torproject.org/about/key-management/
+#: (content/about/key-management/contents+en.lrquestion.description)
+msgid "Each relay has a long-term public signing key called the \"identity key\"."
+msgstr ""
+
+#: https//support.torproject.org/about/key-management/
+#: (content/about/key-management/contents+en.lrquestion.description)
+msgid "Each directory authority additionally has a \"directory signing key\"."
+msgstr ""
+
+#: https//support.torproject.org/about/key-management/
+#: (content/about/key-management/contents+en.lrquestion.description)
+msgid ""
+"The directory authorities [provide a signed "
+"list](https://gitweb.torproject.org/torspec.git/tree/dir-spec.txt) of all "
+"the known relays, and in that list are a set of certificates from each relay"
+" (self-signed by their identity key) specifying their keys, locations, exit "
+"policies, and so on."
+msgstr ""
+
+#: https//support.torproject.org/about/key-management/
+#: (content/about/key-management/contents+en.lrquestion.description)
+msgid ""
+"So unless the adversary can control a majority of the directory authorities "
+"(as of 2021 there are 10 directory authorities), they can't trick the Tor "
+"client into using other Tor relays."
+msgstr ""
+
+#: https//support.torproject.org/about/key-management/
+#: (content/about/key-management/contents+en.lrquestion.description)
+msgid "How do clients know what the directory authorities are?"
+msgstr ""
+
+#: https//support.torproject.org/about/key-management/
+#: (content/about/key-management/contents+en.lrquestion.description)
+msgid ""
+"The Tor software comes with a built-in list of location and public key for "
+"each directory authority."
+msgstr ""
+
+#: https//support.torproject.org/about/key-management/
+#: (content/about/key-management/contents+en.lrquestion.description)
+msgid ""
+"So the only way to trick users into using a fake Tor network is to give them"
+" a specially modified version of the software."
+msgstr ""
+
+#: https//support.torproject.org/about/key-management/
+#: (content/about/key-management/contents+en.lrquestion.description)
+msgid "How do users know they've got the right software?"
+msgstr ""
+
+#: https//support.torproject.org/about/key-management/
+#: (content/about/key-management/contents+en.lrquestion.description)
+msgid ""
+"When we distribute the source code or a package, we digitally sign it with "
+"[GNU Privacy Guard](http://www.gnupg.org/). See the [instructions on how to "
+"check Tor Browser's signature](https://support.torproject.org/tbb/how-to-"
+"verify-signature/)."
+msgstr ""
+
+#: https//support.torproject.org/about/key-management/
+#: (content/about/key-management/contents+en.lrquestion.description)
+msgid ""
+"In order to be certain that it's really signed by us, you need to have met "
+"us in person and gotten a copy of our GPG key fingerprint, or you need to "
+"know somebody who has."
+msgstr ""
+
+#: https//support.torproject.org/about/key-management/
+#: (content/about/key-management/contents+en.lrquestion.description)
+msgid ""
+"If you're concerned about an attack on this level, we recommend you get "
+"involved with the security community and start meeting people."
+msgstr ""
+
#: https//support.torproject.org/about/no-data-scrubbing/
#: (content/about/no-data-scrubbing/contents+en.lrquestion.title)
msgid ""
@@ -2770,6 +3205,151 @@ msgid ""
"though."
msgstr ""
+#: https//support.torproject.org/about/protections/
+#: (content/about/protections/contents+en.lrquestion.title)
+msgid "What protections does Tor provide?"
+msgstr ""
+
+#: https//support.torproject.org/about/protections/
+#: (content/about/protections/contents+en.lrquestion.description)
+msgid ""
+"Internet communication is based on a store-and-forward model that can be "
+"understood in analogy to postal mail: Data is transmitted in blocks called "
+"IP datagrams or packets."
+msgstr ""
+
+#: https//support.torproject.org/about/protections/
+#: (content/about/protections/contents+en.lrquestion.description)
+msgid ""
+"Every packet includes a source IP address (of the sender) and a destination "
+"IP address (of the receiver), just as ordinary letters contain postal "
+"addresses of sender and receiver."
+msgstr ""
+
+#: https//support.torproject.org/about/protections/
+#: (content/about/protections/contents+en.lrquestion.description)
+msgid ""
+"The way from sender to receiver involves multiple hops of routers, where "
+"each router inspects the destination IP address and forwards the packet "
+"closer to its destination."
+msgstr ""
+
+#: https//support.torproject.org/about/protections/
+#: (content/about/protections/contents+en.lrquestion.description)
+msgid ""
+"Thus, every router between sender and receiver learns that the sender is "
+"communicating with the receiver."
+msgstr ""
+
+#: https//support.torproject.org/about/protections/
+#: (content/about/protections/contents+en.lrquestion.description)
+msgid ""
+"In particular, your local ISP is in the position to build a complete profile"
+" of your Internet usage."
+msgstr ""
+
+#: https//support.torproject.org/about/protections/
+#: (content/about/protections/contents+en.lrquestion.description)
+msgid ""
+"In addition, every server in the Internet that can see any of the packets "
+"can profile your behavior."
+msgstr ""
+
+#: https//support.torproject.org/about/protections/
+#: (content/about/protections/contents+en.lrquestion.description)
+msgid ""
+"The aim of Tor is to improve your privacy by sending your traffic through a "
+"series of proxies."
+msgstr ""
+
+#: https//support.torproject.org/about/protections/
+#: (content/about/protections/contents+en.lrquestion.description)
+msgid ""
+"Your communication is encrypted in multiple layers and routed via multiple "
+"hops through the Tor network to the final receiver."
+msgstr ""
+
+#: https//support.torproject.org/about/protections/
+#: (content/about/protections/contents+en.lrquestion.description)
+msgid ""
+"More details on this process can be found in this "
+"[visualization](https://support.torproject.org/https/https-1/)."
+msgstr ""
+
+#: https//support.torproject.org/about/protections/
+#: (content/about/protections/contents+en.lrquestion.description)
+msgid ""
+"Note that all your local ISP can observe now is that you are communicating "
+"with Tor nodes."
+msgstr ""
+
+#: https//support.torproject.org/about/protections/
+#: (content/about/protections/contents+en.lrquestion.description)
+msgid ""
+"Similarly, servers in the Internet just see that they are being contacted by"
+" Tor nodes."
+msgstr ""
+
+#: https//support.torproject.org/about/protections/
+#: (content/about/protections/contents+en.lrquestion.description)
+msgid "Generally speaking, Tor aims to solve three privacy problems:"
+msgstr ""
+
+#: https//support.torproject.org/about/protections/
+#: (content/about/protections/contents+en.lrquestion.description)
+msgid ""
+"First, Tor prevents websites and other services from learning your location,"
+" which they can use to build databases about your habits and interests."
+msgstr ""
+
+#: https//support.torproject.org/about/protections/
+#: (content/about/protections/contents+en.lrquestion.description)
+msgid ""
+"With Tor, your Internet connections don't give you away by default -- now "
+"you can have the ability to choose, for each connection, how much "
+"information to reveal."
+msgstr ""
+
+#: https//support.torproject.org/about/protections/
+#: (content/about/protections/contents+en.lrquestion.description)
+msgid ""
+"Second, Tor prevents people watching your traffic locally (such as your ISP "
+"or someone with access to your home wifi or router) from learning what "
+"information you're fetching and where you're fetching it from."
+msgstr ""
+
+#: https//support.torproject.org/about/protections/
+#: (content/about/protections/contents+en.lrquestion.description)
+msgid ""
+"It also stops them from deciding what you're allowed to learn and publish --"
+" if you can get to any part of the Tor network, you can reach any site on "
+"the Internet."
+msgstr ""
+
+#: https//support.torproject.org/about/protections/
+#: (content/about/protections/contents+en.lrquestion.description)
+msgid ""
+"Third, Tor routes your connection through more than one Tor relay so no "
+"single relay can learn what you're up to."
+msgstr ""
+
+#: https//support.torproject.org/about/protections/
+#: (content/about/protections/contents+en.lrquestion.description)
+msgid ""
+"Because these relays are run by different individuals or organizations, "
+"distributing trust provides more security than the old [one hop "
+"proxy](https://support.torproject.org/about/#how-is-tor-different-from-"
+"other-proxies) approach."
+msgstr ""
+
+#: https//support.torproject.org/about/protections/
+#: (content/about/protections/contents+en.lrquestion.description)
+msgid ""
+"Note, however, that there are situations where Tor fails to solve these "
+"privacy problems entirely: see the entry below on [remaining "
+"attacks](https://support.torproject.org/about/#attacks-on-onion-routing)."
+msgstr ""
+
#: https//support.torproject.org/about/what-is-tor/
#: (content/about/what-is-tor/contents+en.lrquestion.title)
msgid "What is Tor?"
@@ -4975,9 +5555,11 @@ msgstr ""
#: (content/tbb/tbb-47/contents+en.lrquestion.description)
msgid ""
"Also, read up on the HTTPProxyAuthenticator and HTTPSProxyAuthenticator "
-"options if your proxy requires auth. We only support basic auth currently, "
-"but if you need NTLM authentication, you may find [this post in the "
-"archives](https://archives.seul.org/or/talk/Jun-2005/msg00223.html) useful."
+"options if your [proxy requires auth.](https://developer.mozilla.org/en-"
+"US/docs/Web/HTTP/Headers/Proxy-Authenticate) We only support basic auth "
+"currently, but if you need NTLM authentication, you may find [this post in "
+"the archives](https://archives.seul.org/or/talk/Jun-2005/msg00223.html) "
+"useful."
msgstr ""
#: https//support.torproject.org/tbb/tbb-47/
@@ -5194,6 +5776,219 @@ msgid ""
"have no effect on Tor's configuration."
msgstr ""
+#: https//support.torproject.org/tbb/tbb-firewall-ports/
+#: (content/tbb/tbb-firewall-ports/contents+en.lrquestion.title)
+msgid "My firewall only allows a few outgoing ports"
+msgstr ""
+
+#: https//support.torproject.org/tbb/tbb-firewall-ports/
+#: (content/tbb/tbb-firewall-ports/contents+en.lrquestion.description)
+msgid ""
+"If your firewall works by blocking ports, then you can tell Tor to only use "
+"the ports when you start your Tor Browser."
+msgstr ""
+
+#: https//support.torproject.org/tbb/tbb-firewall-ports/
+#: (content/tbb/tbb-firewall-ports/contents+en.lrquestion.description)
+msgid ""
+"Or you can add the ports that your firewall permits by adding "
+"\"FascistFirewall 1\" to your torrc configuration file."
+msgstr ""
+
+#: https//support.torproject.org/tbb/tbb-firewall-ports/
+#: (content/tbb/tbb-firewall-ports/contents+en.lrquestion.description)
+msgid ""
+"By default, when you set this Tor assumes that your firewall allows only "
+"port 80 and port 443 (HTTP and HTTPS respectively)."
+msgstr ""
+
+#: https//support.torproject.org/tbb/tbb-firewall-ports/
+#: (content/tbb/tbb-firewall-ports/contents+en.lrquestion.description)
+msgid ""
+"You can select a different set of ports with the FirewallPorts torrc option."
+msgstr ""
+
+#: https//support.torproject.org/tbb/tbb-firewall-ports/
+#: (content/tbb/tbb-firewall-ports/contents+en.lrquestion.description)
+msgid ""
+"If you want to be more fine-grained with your controls, you can also use the"
+" ReachableAddresses config options, e.g.:"
+msgstr ""
+
+#: https//support.torproject.org/tbb/tbb-firewall-ports/
+#: (content/tbb/tbb-firewall-ports/contents+en.lrquestion.description)
+#: https//support.torproject.org/tbb/tbb-install-tor-central-server/
+#: (content/tbb/tbb-install-tor-central-server/contents+en.lrquestion.description)
+#: https//support.torproject.org/operators/default-exit-ports/
+#: (content/operators/default-exit-ports/contents+en.lrquestion.description)
+#: https//support.torproject.org/operators/hibernation/
+#: (content/operators/hibernation/contents+en.lrquestion.description)
+#: https//support.torproject.org/operators/limit-total-bandwidth/
+#: (content/operators/limit-total-bandwidth/contents+en.lrquestion.description)
+#: https//support.torproject.org/misc/bug-or-feedback/
+#: (content/misc/bug-or-feedback/contents+en.lrquestion.description)
+#: https//support.torproject.org/get-in-touch/why-i-cant-join-tor-channels/
+#: (content/get-in-touch/why-i-cant-join-tor-channels/contents+en.lrquestion.description)
+#: https//support.torproject.org/apt/tor-deb-repo/
+#: (content/apt/apt-1/contents+en.lrquestion.description)
+#: https//support.torproject.org/apt/apt-over-tor/
+#: (content/apt/apt-3/contents+en.lrquestion.description)
+msgid "```"
+msgstr "```"
+
+#: https//support.torproject.org/tbb/tbb-firewall-ports/
+#: (content/tbb/tbb-firewall-ports/contents+en.lrquestion.description)
+msgid "ReachableDirAddresses *:80"
+msgstr ""
+
+#: https//support.torproject.org/tbb/tbb-firewall-ports/
+#: (content/tbb/tbb-firewall-ports/contents+en.lrquestion.description)
+msgid "ReachableORAddresses *:443"
+msgstr ""
+
+#: https//support.torproject.org/tbb/tbb-install-tor-central-server/
+#: (content/tbb/tbb-install-tor-central-server/contents+en.lrquestion.title)
+msgid ""
+"Can I install Tor on a central server, and have my clients connect to it?"
+msgstr ""
+
+#: https//support.torproject.org/tbb/tbb-install-tor-central-server/
+#: (content/tbb/tbb-install-tor-central-server/contents+en.lrquestion.description)
+msgid ""
+"Yes. Tor can be configured as a client or a relay on another machine, and "
+"allow other machines to be able to connect to it for anonymity."
+msgstr ""
+
+#: https//support.torproject.org/tbb/tbb-install-tor-central-server/
+#: (content/tbb/tbb-install-tor-central-server/contents+en.lrquestion.description)
+msgid ""
+"This is most useful in an environment where many computers want a gateway of"
+" anonymity to the rest of the world."
+msgstr ""
+
+#: https//support.torproject.org/tbb/tbb-install-tor-central-server/
+#: (content/tbb/tbb-install-tor-central-server/contents+en.lrquestion.description)
+msgid ""
+"However, be forewarned that with this configuration, anyone within your "
+"private network (existing between you and the Tor client/relay) can see what"
+" traffic you are sending in clear text."
+msgstr ""
+
+#: https//support.torproject.org/tbb/tbb-install-tor-central-server/
+#: (content/tbb/tbb-install-tor-central-server/contents+en.lrquestion.description)
+msgid "The anonymity doesn't start until you get to the Tor relay."
+msgstr ""
+
+#: https//support.torproject.org/tbb/tbb-install-tor-central-server/
+#: (content/tbb/tbb-install-tor-central-server/contents+en.lrquestion.description)
+msgid ""
+"Because of this, if you are the controller of your domain and you know "
+"everything's locked down, you will be OK, but this configuration may not be "
+"suitable for large private networks where security is key all around."
+msgstr ""
+
+#: https//support.torproject.org/tbb/tbb-install-tor-central-server/
+#: (content/tbb/tbb-install-tor-central-server/contents+en.lrquestion.description)
+msgid ""
+"Configuration is simple, editing your torrc file's SocksListenAddress "
+"according to the following examples:"
+msgstr ""
+
+#: https//support.torproject.org/tbb/tbb-install-tor-central-server/
+#: (content/tbb/tbb-install-tor-central-server/contents+en.lrquestion.description)
+msgid "SocksListenAddress 127.0.0.1"
+msgstr ""
+
+#: https//support.torproject.org/tbb/tbb-install-tor-central-server/
+#: (content/tbb/tbb-install-tor-central-server/contents+en.lrquestion.description)
+msgid "SocksListenAddress 192.168.x.x:9100"
+msgstr ""
+
+#: https//support.torproject.org/tbb/tbb-install-tor-central-server/
+#: (content/tbb/tbb-install-tor-central-server/contents+en.lrquestion.description)
+msgid "SocksListenAddress 0.0.0.0:9100"
+msgstr ""
+
+#: https//support.torproject.org/tbb/tbb-install-tor-central-server/
+#: (content/tbb/tbb-install-tor-central-server/contents+en.lrquestion.description)
+msgid ""
+"You can state multiple listen addresses, in the case that you are part of "
+"several networks or subnets."
+msgstr ""
+
+#: https//support.torproject.org/tbb/tbb-install-tor-central-server/
+#: (content/tbb/tbb-install-tor-central-server/contents+en.lrquestion.description)
+msgid "SocksListenAddress 192.168.x.x:9100 #eth0"
+msgstr ""
+
+#: https//support.torproject.org/tbb/tbb-install-tor-central-server/
+#: (content/tbb/tbb-install-tor-central-server/contents+en.lrquestion.description)
+msgid "SocksListenAddress 10.x.x.x:9100 #eth1"
+msgstr ""
+
+#: https//support.torproject.org/tbb/tbb-install-tor-central-server/
+#: (content/tbb/tbb-install-tor-central-server/contents+en.lrquestion.description)
+msgid ""
+"After this, your clients on their respective networks/subnets would specify "
+"a socks proxy with the address and port you specified SocksListenAddress to "
+"be."
+msgstr ""
+
+#: https//support.torproject.org/tbb/tbb-install-tor-central-server/
+#: (content/tbb/tbb-install-tor-central-server/contents+en.lrquestion.description)
+msgid ""
+"Please note that the SocksPort configuration option gives the port ONLY for "
+"localhost (127.0.0.1)."
+msgstr ""
+
+#: https//support.torproject.org/tbb/tbb-install-tor-central-server/
+#: (content/tbb/tbb-install-tor-central-server/contents+en.lrquestion.description)
+msgid ""
+"When setting up your SocksListenAddress(es), you need to give the port with "
+"the address, as shown above."
+msgstr ""
+
+#: https//support.torproject.org/tbb/tbb-install-tor-central-server/
+#: (content/tbb/tbb-install-tor-central-server/contents+en.lrquestion.description)
+msgid ""
+"If you are interested in forcing all outgoing data through the central Tor "
+"client/relay, instead of the server only being an optional proxy, you may "
+"find the program iptables (for *nix) useful."
+msgstr ""
+
+#: https//support.torproject.org/tbb/tbb-run-client-different-computer/
+#: (content/tbb/tbb-run-client-different-computer/contents+en.lrquestion.title)
+msgid ""
+"I want to run my Tor client on a different computer than my applications"
+msgstr ""
+
+#: https//support.torproject.org/tbb/tbb-run-client-different-computer/
+#: (content/tbb/tbb-run-client-different-computer/contents+en.lrquestion.description)
+msgid ""
+"By default, your Tor client only listens for applications that connect from "
+"localhost."
+msgstr ""
+
+#: https//support.torproject.org/tbb/tbb-run-client-different-computer/
+#: (content/tbb/tbb-run-client-different-computer/contents+en.lrquestion.description)
+msgid "Connections from other computers are refused."
+msgstr ""
+
+#: https//support.torproject.org/tbb/tbb-run-client-different-computer/
+#: (content/tbb/tbb-run-client-different-computer/contents+en.lrquestion.description)
+msgid ""
+"If you want to torify applications on different computers than the Tor "
+"client, you should edit your torrc to define `SocksListenAddress 0.0.0.0` "
+"and then restart (or hup) Tor."
+msgstr ""
+
+#: https//support.torproject.org/tbb/tbb-run-client-different-computer/
+#: (content/tbb/tbb-run-client-different-computer/contents+en.lrquestion.description)
+msgid ""
+"If you want to get more advanced, you can configure your Tor client on a "
+"firewall to bind to your internal IP but not your external IP."
+msgstr ""
+
#: https//support.torproject.org/tbb/website-blocking-tor/
#: (content/tbb/website-blocking-tor/contents+en.lrquestion.title)
msgid "A website I am trying to reach is blocking access over Tor."
@@ -6669,6 +7464,130 @@ msgid ""
"guide."
msgstr ""
+#: https//support.torproject.org/operators/default-exit-ports/
+#: (content/operators/default-exit-ports/contents+en.lrquestion.title)
+msgid "Is there a list of default exit ports?"
+msgstr ""
+
+#: https//support.torproject.org/operators/default-exit-ports/
+#: (content/operators/default-exit-ports/contents+en.lrquestion.description)
+msgid ""
+"The default open ports are listed below but keep in mind that, any port or "
+"ports can be opened by the relay operator by configuring it in torrc or "
+"modifying the source code."
+msgstr ""
+
+#: https//support.torproject.org/operators/default-exit-ports/
+#: (content/operators/default-exit-ports/contents+en.lrquestion.description)
+msgid ""
+"The default according to src/or/policies.c ([line 85][1] and [line 1901][2])"
+" from the source code release [release-0.4.6][3]:"
+msgstr ""
+
+#: https//support.torproject.org/operators/default-exit-ports/
+#: (content/operators/default-exit-ports/contents+en.lrquestion.description)
+msgid "reject 0.0.0.0/8"
+msgstr ""
+
+#: https//support.torproject.org/operators/default-exit-ports/
+#: (content/operators/default-exit-ports/contents+en.lrquestion.description)
+msgid "reject 169.254.0.0/16"
+msgstr ""
+
+#: https//support.torproject.org/operators/default-exit-ports/
+#: (content/operators/default-exit-ports/contents+en.lrquestion.description)
+msgid "reject 127.0.0.0/8"
+msgstr ""
+
+#: https//support.torproject.org/operators/default-exit-ports/
+#: (content/operators/default-exit-ports/contents+en.lrquestion.description)
+msgid "reject 192.168.0.0/16"
+msgstr ""
+
+#: https//support.torproject.org/operators/default-exit-ports/
+#: (content/operators/default-exit-ports/contents+en.lrquestion.description)
+msgid "reject 10.0.0.0/8"
+msgstr ""
+
+#: https//support.torproject.org/operators/default-exit-ports/
+#: (content/operators/default-exit-ports/contents+en.lrquestion.description)
+msgid "reject 172.16.0.0/12"
+msgstr ""
+
+#: https//support.torproject.org/operators/default-exit-ports/
+#: (content/operators/default-exit-ports/contents+en.lrquestion.description)
+msgid "reject *:25"
+msgstr ""
+
+#: https//support.torproject.org/operators/default-exit-ports/
+#: (content/operators/default-exit-ports/contents+en.lrquestion.description)
+msgid "reject *:119"
+msgstr ""
+
+#: https//support.torproject.org/operators/default-exit-ports/
+#: (content/operators/default-exit-ports/contents+en.lrquestion.description)
+msgid "reject *:135-139"
+msgstr ""
+
+#: https//support.torproject.org/operators/default-exit-ports/
+#: (content/operators/default-exit-ports/contents+en.lrquestion.description)
+msgid "reject *:445"
+msgstr ""
+
+#: https//support.torproject.org/operators/default-exit-ports/
+#: (content/operators/default-exit-ports/contents+en.lrquestion.description)
+msgid "reject *:563"
+msgstr ""
+
+#: https//support.torproject.org/operators/default-exit-ports/
+#: (content/operators/default-exit-ports/contents+en.lrquestion.description)
+msgid "reject *:1214"
+msgstr ""
+
+#: https//support.torproject.org/operators/default-exit-ports/
+#: (content/operators/default-exit-ports/contents+en.lrquestion.description)
+msgid "reject *:4661-4666"
+msgstr ""
+
+#: https//support.torproject.org/operators/default-exit-ports/
+#: (content/operators/default-exit-ports/contents+en.lrquestion.description)
+msgid "reject *:6346-6429"
+msgstr ""
+
+#: https//support.torproject.org/operators/default-exit-ports/
+#: (content/operators/default-exit-ports/contents+en.lrquestion.description)
+msgid "reject *:6699"
+msgstr ""
+
+#: https//support.torproject.org/operators/default-exit-ports/
+#: (content/operators/default-exit-ports/contents+en.lrquestion.description)
+msgid "reject *:6881-6999"
+msgstr ""
+
+#: https//support.torproject.org/operators/default-exit-ports/
+#: (content/operators/default-exit-ports/contents+en.lrquestion.description)
+msgid "accept *:*"
+msgstr ""
+
+#: https//support.torproject.org/operators/default-exit-ports/
+#: (content/operators/default-exit-ports/contents+en.lrquestion.description)
+msgid ""
+"[1]: "
+"https://gitlab.torproject.org/tpo/core/tor/-/blob/release-0.4.6/src/core/or/policies.c#L85"
+msgstr ""
+
+#: https//support.torproject.org/operators/default-exit-ports/
+#: (content/operators/default-exit-ports/contents+en.lrquestion.description)
+msgid ""
+"[2]: "
+"https://gitlab.torproject.org/tpo/core/tor/-/blob/release-0.4.6/src/core/or/policies.c#L1901"
+msgstr ""
+
+#: https//support.torproject.org/operators/default-exit-ports/
+#: (content/operators/default-exit-ports/contents+en.lrquestion.description)
+msgid "[3]: https://gitlab.torproject.org/tpo/core/tor/-/tree/release-0.4.6/"
+msgstr ""
+
#: https//support.torproject.org/operators/dynamic-ip/
#: (content/operators/dynamic-ip/contents+en.lrquestion.title)
msgid "Can I run a Tor relay using a dynamic IP address?"
@@ -6816,21 +7735,6 @@ msgid ""
"into hibernation, signaled by this entry in the log:"
msgstr ""
-#: https//support.torproject.org/operators/hibernation/
-#: (content/operators/hibernation/contents+en.lrquestion.description)
-#: https//support.torproject.org/operators/limit-total-bandwidth/
-#: (content/operators/limit-total-bandwidth/contents+en.lrquestion.description)
-#: https//support.torproject.org/misc/bug-or-feedback/
-#: (content/misc/bug-or-feedback/contents+en.lrquestion.description)
-#: https//support.torproject.org/get-in-touch/why-i-cant-join-tor-channels/
-#: (content/get-in-touch/why-i-cant-join-tor-channels/contents+en.lrquestion.description)
-#: https//support.torproject.org/apt/tor-deb-repo/
-#: (content/apt/apt-1/contents+en.lrquestion.description)
-#: https//support.torproject.org/apt/apt-over-tor/
-#: (content/apt/apt-3/contents+en.lrquestion.description)
-msgid "```"
-msgstr "```"
-
#: https//support.torproject.org/operators/hibernation/
#: (content/operators/hibernation/contents+en.lrquestion.description)
msgid "Bandwidth soft limit reached; commencing hibernation."
@@ -9068,6 +9972,131 @@ msgstr "uid tor-security at lists.torproject.org"
msgid "sub 4096R/C00942E4 2017-03-13"
msgstr "sub 4096R/C00942E4 2017-03-13"
+#: https//support.torproject.org/misc/check-socks-dns-leaks/
+#: (content/misc/check-socks-dns-leaks/contents+en.lrquestion.title)
+msgid ""
+"How do I check if my application that uses SOCKS is leaking DNS requests?"
+msgstr ""
+
+#: https//support.torproject.org/misc/check-socks-dns-leaks/
+#: (content/misc/check-socks-dns-leaks/contents+en.lrquestion.description)
+msgid ""
+"Even if your application is using the correct variant of the SOCKS protocol,"
+" there is still a risk that it could be leaking DNS queries."
+msgstr ""
+
+#: https//support.torproject.org/misc/check-socks-dns-leaks/
+#: (content/misc/check-socks-dns-leaks/contents+en.lrquestion.description)
+msgid ""
+"This problem happens in Firefox extensions that resolve the destination "
+"hostname themselves, for example to show you its IP address, what country "
+"it's in, etc."
+msgstr ""
+
+#: https//support.torproject.org/misc/check-socks-dns-leaks/
+#: (content/misc/check-socks-dns-leaks/contents+en.lrquestion.description)
+msgid ""
+"If you suspect your application might behave like this, follow the "
+"instructions below to check."
+msgstr ""
+
+#: https//support.torproject.org/misc/check-socks-dns-leaks/
+#: (content/misc/check-socks-dns-leaks/contents+en.lrquestion.description)
+msgid ""
+"1. Add `TestSocks 1` to your [torrc file](https://support.torproject.org/tbb"
+"/tbb-editing-torrc/)."
+msgstr ""
+
+#: https//support.torproject.org/misc/check-socks-dns-leaks/
+#: (content/misc/check-socks-dns-leaks/contents+en.lrquestion.description)
+msgid ""
+"1. Start Tor, and point your program's SOCKS proxy settings to Tor's SOCKS5 "
+"server (`socks5://127.0.0.1:9050` by default)."
+msgstr ""
+
+#: https//support.torproject.org/misc/check-socks-dns-leaks/
+#: (content/misc/check-socks-dns-leaks/contents+en.lrquestion.description)
+msgid ""
+"1. Watch your logs as you use your application. For each socks connection, "
+"Tor will log a `notice` for safe connections, and a `warn` for connections "
+"leaking DNS requests."
+msgstr ""
+
+#: https//support.torproject.org/misc/check-socks-dns-leaks/
+#: (content/misc/check-socks-dns-leaks/contents+en.lrquestion.description)
+msgid ""
+"If you want to automatically disable all connections leaking DNS requests, "
+"set `SafeSocks 1` in your torrc file."
+msgstr ""
+
+#: https//support.torproject.org/misc/hide-exits/
+#: (content/misc/hide-exits/contents+en.lrquestion.title)
+msgid ""
+"You should hide the list of Tor relays, so people can't block the exits."
+msgstr ""
+
+#: https//support.torproject.org/misc/hide-exits/
+#: (content/misc/hide-exits/contents+en.lrquestion.description)
+msgid "There are a few reasons we don't:"
+msgstr ""
+
+#: https//support.torproject.org/misc/hide-exits/
+#: (content/misc/hide-exits/contents+en.lrquestion.description)
+msgid ""
+"1. We can't help but make the information available, since Tor clients need "
+"to use it to pick their paths."
+msgstr ""
+
+#: https//support.torproject.org/misc/hide-exits/
+#: (content/misc/hide-exits/contents+en.lrquestion.description)
+msgid "So if the \"blockers\" want it, they can get it anyway."
+msgstr ""
+
+#: https//support.torproject.org/misc/hide-exits/
+#: (content/misc/hide-exits/contents+en.lrquestion.description)
+msgid ""
+"Further, even if we didn't tell clients about the list of relays directly, "
+"somebody could still make a lot of connections through Tor to a test site "
+"and build a list of the addresses they see."
+msgstr ""
+
+#: https//support.torproject.org/misc/hide-exits/
+#: (content/misc/hide-exits/contents+en.lrquestion.description)
+msgid ""
+"1. If people want to block us, we believe that they should be allowed to do "
+"so."
+msgstr ""
+
+#: https//support.torproject.org/misc/hide-exits/
+#: (content/misc/hide-exits/contents+en.lrquestion.description)
+msgid ""
+"Obviously, we would prefer for everybody to allow Tor users to connect to "
+"them, but people have the right to decide who their services should allow "
+"connections from, and if they want to block anonymous users, they can."
+msgstr ""
+
+#: https//support.torproject.org/misc/hide-exits/
+#: (content/misc/hide-exits/contents+en.lrquestion.description)
+msgid ""
+"1. Being blockable also has tactical advantages: it may be a persuasive "
+"response to website maintainers who feel threatened by Tor."
+msgstr ""
+
+#: https//support.torproject.org/misc/hide-exits/
+#: (content/misc/hide-exits/contents+en.lrquestion.description)
+msgid ""
+"Giving them the option may inspire them to stop and think about whether they"
+" really want to eliminate private access to their system, and if not, what "
+"other options they might have."
+msgstr ""
+
+#: https//support.torproject.org/misc/hide-exits/
+#: (content/misc/hide-exits/contents+en.lrquestion.description)
+msgid ""
+"The time they might otherwise have spent blocking Tor, they may instead "
+"spend rethinking their overall approach to privacy and anonymity."
+msgstr ""
+
#: https//support.torproject.org/misc/menu/
#: (content/misc/menu/contents+en.lrquestion.description)
msgid "About"
@@ -9660,56 +10689,20 @@ msgstr ""
#: https//support.torproject.org/get-in-touch/why-i-cant-join-tor-channels/
#: (content/get-in-touch/why-i-cant-join-tor-channels/contents+en.lrquestion.description)
msgid ""
-"Then, to complete the registration and ultimately gain access to the #tor-"
-"project channel, your nickname must be **verified**."
-msgstr ""
-
-#: https//support.torproject.org/get-in-touch/why-i-cant-join-tor-channels/
-#: (content/get-in-touch/why-i-cant-join-tor-channels/contents+en.lrquestion.description)
-msgid ""
-"1. To verify your nick, open a new browser window and go to "
-"https://webchat.oftc.net/?channels=tor."
-msgstr ""
-
-#: https//support.torproject.org/get-in-touch/why-i-cant-join-tor-channels/
-#: (content/get-in-touch/why-i-cant-join-tor-channels/contents+en.lrquestion.description)
-msgid "2. Log in with your IRC nickname and password."
-msgstr ""
-
-#: https//support.torproject.org/get-in-touch/why-i-cant-join-tor-channels/
-#: (content/get-in-touch/why-i-cant-join-tor-channels/contents+en.lrquestion.description)
-msgid ""
-"3. Look for the word **verify** and log in there. It may appear that nothing"
-" has happened. Look at the top of the page, and there will be a column "
-"called **Account**."
-msgstr ""
-
-#: https//support.torproject.org/get-in-touch/why-i-cant-join-tor-channels/
-#: (content/get-in-touch/why-i-cant-join-tor-channels/contents+en.lrquestion.description)
-msgid "4. Click on **Account**."
-msgstr ""
-
-#: https//support.torproject.org/get-in-touch/why-i-cant-join-tor-channels/
-#: (content/get-in-touch/why-i-cant-join-tor-channels/contents+en.lrquestion.description)
-msgid ""
-"5. Click on the small sentence at the bottom of the square that says: Verify"
-" account."
-msgstr ""
-
-#: https//support.torproject.org/get-in-touch/why-i-cant-join-tor-channels/
-#: (content/get-in-touch/why-i-cant-join-tor-channels/contents+en.lrquestion.description)
-msgid "6. Fill out the Captcha that pops up, and click ok."
+"After registering your nickname, to gain access to the #tor-project and "
+"other protected channels, your nickname must be **verified**."
msgstr ""
#: https//support.torproject.org/get-in-touch/why-i-cant-join-tor-channels/
#: (content/get-in-touch/why-i-cant-join-tor-channels/contents+en.lrquestion.description)
msgid ""
-"7. A tiny message will appear: \"Your NickServ account has been verified.\""
+"1. Go to https://services.oftc.net/ and follow the steps in the '*To verify "
+"your account*' section"
msgstr ""
#: https//support.torproject.org/get-in-touch/why-i-cant-join-tor-channels/
#: (content/get-in-touch/why-i-cant-join-tor-channels/contents+en.lrquestion.description)
-msgid "8. Go back to the IRC webpage where you are logged in and type:"
+msgid "2. Go back to the IRC webpage where you are logged in and type:"
msgstr ""
#: https//support.torproject.org/get-in-touch/why-i-cant-join-tor-channels/
@@ -9719,12 +10712,12 @@ msgstr "`/msg nickserv checkverify`"
#: https//support.torproject.org/get-in-touch/why-i-cant-join-tor-channels/
#: (content/get-in-touch/why-i-cant-join-tor-channels/contents+en.lrquestion.description)
-msgid "9. Click ENTER."
+msgid "3. Click ENTER."
msgstr ""
#: https//support.torproject.org/get-in-touch/why-i-cant-join-tor-channels/
#: (content/get-in-touch/why-i-cant-join-tor-channels/contents+en.lrquestion.description)
-msgid "10. If all is well, you will receive a message that says:"
+msgid "4. If all is well, you will receive a message that says:"
msgstr ""
#: https//support.torproject.org/get-in-touch/why-i-cant-join-tor-channels/
@@ -9865,18 +10858,22 @@ msgstr "# apt install apt-transport-https"
#: https//support.torproject.org/apt/tor-deb-repo/
#: (content/apt/apt-1/contents+en.lrquestion.description)
msgid ""
-"#### 2. Add the following entries to `/etc/apt/sources.list` or a new file "
-"in `/etc/apt/sources.list.d/`"
+"#### 2. Create a new file in `/etc/apt/sources.list.d/` named `tor.list`. "
+"Add the following entries:"
msgstr ""
#: https//support.torproject.org/apt/tor-deb-repo/
#: (content/apt/apt-1/contents+en.lrquestion.description)
-msgid "deb https://deb.torproject.org/torproject.org <DISTRIBUTION> main"
+msgid ""
+"deb [signed-by=/usr/share/keyrings/tor-archive-keyring.gpg] "
+"https://deb.torproject.org/torproject.org <DISTRIBUTION> main"
msgstr ""
#: https//support.torproject.org/apt/tor-deb-repo/
#: (content/apt/apt-1/contents+en.lrquestion.description)
-msgid "deb-src https://deb.torproject.org/torproject.org <DISTRIBUTION> main"
+msgid ""
+"deb-src [signed-by=/usr/share/keyrings/tor-archive-keyring.gpg] "
+"https://deb.torproject.org/torproject.org <DISTRIBUTION> main"
msgstr ""
#: https//support.torproject.org/apt/tor-deb-repo/
@@ -9890,14 +10887,16 @@ msgstr ""
#: https//support.torproject.org/apt/tor-deb-repo/
#: (content/apt/apt-1/contents+en.lrquestion.description)
msgid ""
-"deb https://deb.torproject.org/torproject.org tor-"
+"deb [signed-by=/usr/share/keyrings/tor-archive-keyring.gpg] "
+"https://deb.torproject.org/torproject.org tor-"
"experimental-0.4.6.x-<DISTRIBUTION> main"
msgstr ""
#: https//support.torproject.org/apt/tor-deb-repo/
#: (content/apt/apt-1/contents+en.lrquestion.description)
msgid ""
-"deb-src https://deb.torproject.org/torproject.org tor-"
+"deb-src [signed-by=/usr/share/keyrings/tor-archive-keyring.gpg] "
+"https://deb.torproject.org/torproject.org tor-"
"experimental-0.4.6.x-<DISTRIBUTION> main"
msgstr ""
@@ -9909,18 +10908,18 @@ msgstr "Eller nattlige bygg:"
#: https//support.torproject.org/apt/tor-deb-repo/
#: (content/apt/apt-1/contents+en.lrquestion.description)
msgid ""
-"deb https://deb.torproject.org/torproject.org tor-nightly-"
-"master-<DISTRIBUTION> main"
+"deb [signed-by=/usr/share/keyrings/tor-archive-keyring.gpg] "
+"https://deb.torproject.org/torproject.org tor-nightly-master-<DISTRIBUTION> "
+"main"
msgstr ""
#: https//support.torproject.org/apt/tor-deb-repo/
#: (content/apt/apt-1/contents+en.lrquestion.description)
msgid ""
-"deb-src https://deb.torproject.org/torproject.org tor-nightly-"
-"master-<DISTRIBUTION> main"
+"deb-src [signed-by=/usr/share/keyrings/tor-archive-keyring.gpg] "
+"https://deb.torproject.org/torproject.org tor-nightly-master-<DISTRIBUTION> "
+"main"
msgstr ""
-"deb-src https://deb.torproject.org/torproject.org tor-nightly-"
-"master-<DISTRIBUTION> main"
#: https//support.torproject.org/apt/tor-deb-repo/
#: (content/apt/apt-1/contents+en.lrquestion.description)
@@ -9940,13 +10939,15 @@ msgstr ""
#: https//support.torproject.org/apt/tor-deb-repo/
#: (content/apt/apt-1/contents+en.lrquestion.description)
msgid ""
-"deb [arch=amd64] https://deb.torproject.org/torproject.org focal main"
+"deb [arch=amd64 signed-by=/usr/share/keyrings/tor-archive-keyring.gpg] "
+"https://deb.torproject.org/torproject.org focal main"
msgstr ""
#: https//support.torproject.org/apt/tor-deb-repo/
#: (content/apt/apt-1/contents+en.lrquestion.description)
msgid ""
-"deb-src [arch=amd64] https://deb.torproject.org/torproject.org focal main"
+"deb-src [arch=amd64 signed-by=/usr/share/keyrings/tor-archive-keyring.gpg] "
+"https://deb.torproject.org/torproject.org focal main"
msgstr ""
#: https//support.torproject.org/apt/tor-deb-repo/
@@ -9966,26 +10967,17 @@ msgstr ""
#: (content/apt/apt-1/contents+en.lrquestion.description)
msgid ""
"#### 3. Then add the gpg key used to sign the packages by running the "
-"following commands at your command prompt"
+"following command at your command prompt:"
msgstr ""
#: https//support.torproject.org/apt/tor-deb-repo/
#: (content/apt/apt-1/contents+en.lrquestion.description)
msgid ""
-"# wget -qO- "
+"# wget -O- "
"https://deb.torproject.org/torproject.org/A3C4F0F979CAA22CDBA8F512EE8CBC9E886DDD89.asc"
-" | gpg --import"
+" | gpg --dearmor | tee /usr/share/keyrings/tor-archive-keyring.gpg "
+">/dev/null"
msgstr ""
-"# wget -qO- "
-"https://deb.torproject.org/torproject.org/A3C4F0F979CAA22CDBA8F512EE8CBC9E886DDD89.asc"
-" | gpg --import"
-
-#: https//support.torproject.org/apt/tor-deb-repo/
-#: (content/apt/apt-1/contents+en.lrquestion.description)
-msgid ""
-"# gpg --export A3C4F0F979CAA22CDBA8F512EE8CBC9E886DDD89 | apt-key add -"
-msgstr ""
-"# gpg --export A3C4F0F979CAA22CDBA8F512EE8CBC9E886DDD89 | apt-key add -"
#: https//support.torproject.org/apt/tor-deb-repo/
#: (content/apt/apt-1/contents+en.lrquestion.description)
@@ -11593,6 +12585,82 @@ msgid ""
"doesn't change IP address over the day."
msgstr ""
+#: https//support.torproject.org/alternate-designs/block-websites/
+#: (content/alternate-designs/block-websites/contents+en.lrquestion.title)
+msgid "Exit policies should be able to block websites, not just IP addresses."
+msgstr ""
+
+#: https//support.torproject.org/alternate-designs/block-websites/
+#: (content/alternate-designs/block-websites/contents+en.lrquestion.description)
+msgid ""
+"It would be nice to let relay operators say things like `reject "
+"www.slashdot.org` in their exit policies, rather than requiring them to "
+"learn all the IP address space that could be covered by the site (and then "
+"also blocking other sites at those IP addresses)."
+msgstr ""
+
+#: https//support.torproject.org/alternate-designs/block-websites/
+#: (content/alternate-designs/block-websites/contents+en.lrquestion.description)
+msgid "There are two problems, though."
+msgstr ""
+
+#: https//support.torproject.org/alternate-designs/block-websites/
+#: (content/alternate-designs/block-websites/contents+en.lrquestion.description)
+msgid "First, users could still get around these blocks."
+msgstr ""
+
+#: https//support.torproject.org/alternate-designs/block-websites/
+#: (content/alternate-designs/block-websites/contents+en.lrquestion.description)
+msgid ""
+"For example, they could request the IP address rather than the hostname when"
+" they exit from the Tor network."
+msgstr ""
+
+#: https//support.torproject.org/alternate-designs/block-websites/
+#: (content/alternate-designs/block-websites/contents+en.lrquestion.description)
+msgid ""
+"This means operators would still need to learn all the IP addresses for the "
+"destinations in question."
+msgstr ""
+
+#: https//support.torproject.org/alternate-designs/block-websites/
+#: (content/alternate-designs/block-websites/contents+en.lrquestion.description)
+msgid ""
+"The second problem is that it would allow remote attackers to censor "
+"arbitrary sites."
+msgstr ""
+
+#: https//support.torproject.org/alternate-designs/block-websites/
+#: (content/alternate-designs/block-websites/contents+en.lrquestion.description)
+msgid ""
+"For example, if a Tor operator blocks www1.slashdot.org, and then some "
+"attacker poisons the Tor relay's DNS or otherwise changes that hostname to "
+"resolve to the IP address for a major news site, then suddenly that Tor "
+"relay is blocking the news site."
+msgstr ""
+
+#: https//support.torproject.org/alternate-designs/let-the-network-pick-the-path/
+#: (content/alternate-designs/let-the-network-pick-the-path/contents+en.lrquestion.title)
+msgid "You should let the network pick the path, not the client."
+msgstr ""
+
+#: https//support.torproject.org/alternate-designs/let-the-network-pick-the-path/
+#: (content/alternate-designs/let-the-network-pick-the-path/contents+en.lrquestion.description)
+msgid "No, you cannot trust the network to pick the path."
+msgstr ""
+
+#: https//support.torproject.org/alternate-designs/let-the-network-pick-the-path/
+#: (content/alternate-designs/let-the-network-pick-the-path/contents+en.lrquestion.description)
+msgid "Malicious relays could route you through their colluding friends."
+msgstr ""
+
+#: https//support.torproject.org/alternate-designs/let-the-network-pick-the-path/
+#: (content/alternate-designs/let-the-network-pick-the-path/contents+en.lrquestion.description)
+msgid ""
+"This would give an adversary the ability to watch all of your traffic end to"
+" end."
+msgstr ""
+
#: lego/templates/banner.html:3 lego/templates/banner.html:5
#: templates/banner.html:3 templates/banner.html:5
msgid "Close banner"
@@ -11623,8 +12691,8 @@ msgid "DONATE NOW"
msgstr "DONÃR NÃ
"
#: lego/templates/footer.html:13 lego/templates/footer.html:22
-#: lego/templates/navbar.html:83 templates/footer.html:13
-#: templates/footer.html:22 templates/navbar.html:83
+#: lego/templates/navbar.html:95 templates/footer.html:13
+#: templates/footer.html:22 templates/navbar.html:95
msgid "Download Tor Browser"
msgstr "Last ned Tor-nettleseren"
diff --git a/contents+nl.po b/contents+nl.po
index 4052f67084..1d635a8593 100644
--- a/contents+nl.po
+++ b/contents+nl.po
@@ -17,7 +17,7 @@ msgid ""
msgstr ""
"Project-Id-Version: PACKAGE VERSION\n"
"Report-Msgid-Bugs-To: \n"
-"POT-Creation-Date: 2021-08-25 11:14+CET\n"
+"POT-Creation-Date: 2021-09-01 12:20+CET\n"
"PO-Revision-Date: 2018-10-02 22:41+0000\n"
"Last-Translator: kwadronaut <kwadronaut at autistici.org>, 2021\n"
"Language-Team: Dutch (https://www.transifex.com/otf/teams/1519/nl/)\n"
@@ -150,6 +150,11 @@ msgstr "Misbruik FAQ"
msgid "Tor Metrics"
msgstr "Tor statistieken"
+#: https//support.torproject.org/alternate-designs/
+#: (content/alternate-designs/contents+en.lrtopic.title)
+msgid "Alternate Designs We Don't Do (Yet)"
+msgstr ""
+
#: https//support.torproject.org/glossary/add-on-extension-or-plugin/
#: (content/glossary/add-on-extension-or-plugin/contents+en.lrword.term)
msgid "add-on, extension, or plugin"
@@ -2198,6 +2203,61 @@ msgid ""
"wiki](https://trac.torproject.org/projects/tor/wiki/doc/TorPlusVPN)."
msgstr ""
+#: https//support.torproject.org/faq/relay-donations/
+#: (content/faq/relay-donations/contents+en.lrquestion.title)
+msgid "Can I donate for a relay rather than run my own?"
+msgstr ""
+
+#: https//support.torproject.org/faq/relay-donations/
+#: (content/faq/relay-donations/contents+en.lrquestion.description)
+msgid ""
+"Sure! We have a [list of organizations that run Tor "
+"relays](https://community.torproject.org/relay/community-resources/relay-"
+"associations/) that are happy to turn your donations into better speed and "
+"anonymity for the Tor network."
+msgstr ""
+
+#: https//support.torproject.org/faq/relay-donations/
+#: (content/faq/relay-donations/contents+en.lrquestion.description)
+msgid ""
+"These organizations are not the same as [The Tor Project, "
+"Inc](https://donate.torproject.org/), but we consider that a good thing."
+msgstr ""
+
+#: https//support.torproject.org/faq/relay-donations/
+#: (content/faq/relay-donations/contents+en.lrquestion.description)
+msgid "They're run by nice people who are part of the Tor community."
+msgstr ""
+
+#: https//support.torproject.org/faq/relay-donations/
+#: (content/faq/relay-donations/contents+en.lrquestion.description)
+msgid ""
+"Note that there can be a tradeoff here between anonymity and performance."
+msgstr ""
+
+#: https//support.torproject.org/faq/relay-donations/
+#: (content/faq/relay-donations/contents+en.lrquestion.description)
+msgid ""
+"The Tor network's anonymity comes in part from diversity, so if you are in a"
+" position to run your own relay, you will be improving Tor's anonymity more "
+"than by donating."
+msgstr ""
+
+#: https//support.torproject.org/faq/relay-donations/
+#: (content/faq/relay-donations/contents+en.lrquestion.description)
+msgid ""
+"At the same time though, economies of scale for bandwidth mean that "
+"combining many small donations into several larger relays is more efficient "
+"at improving network performance."
+msgstr ""
+
+#: https//support.torproject.org/faq/relay-donations/
+#: (content/faq/relay-donations/contents+en.lrquestion.description)
+msgid ""
+"Improving anonymity and improving performance are both worthwhile goals, so "
+"however you can help is great!"
+msgstr ""
+
#: https//support.torproject.org/faq/staying-anonymous/
#: (content/faq/staying-anonymous/contents+en.lrquestion.title)
msgid "Am I totally anonymous if I use Tor?"
@@ -2501,6 +2561,61 @@ msgid ""
" documenting all the issues](https://community.torproject.org/)."
msgstr ""
+#: https//support.torproject.org/about/attacks-on-onion-routing/
+#: (content/about/attacks-on-onion-routing/contents+en.lrquestion.title)
+msgid "What attacks remain against onion routing?"
+msgstr ""
+
+#: https//support.torproject.org/about/attacks-on-onion-routing/
+#: (content/about/attacks-on-onion-routing/contents+en.lrquestion.description)
+msgid ""
+"As mentioned above, it is possible for an observer who can view both you and"
+" either the destination website or your Tor exit node to correlate timings "
+"of your traffic as it enters the Tor network and also as it exits."
+msgstr ""
+
+#: https//support.torproject.org/about/attacks-on-onion-routing/
+#: (content/about/attacks-on-onion-routing/contents+en.lrquestion.description)
+msgid "Tor does not defend against such a threat model."
+msgstr ""
+
+#: https//support.torproject.org/about/attacks-on-onion-routing/
+#: (content/about/attacks-on-onion-routing/contents+en.lrquestion.description)
+msgid ""
+"In a more limited sense, note that if a censor or law enforcement agency has"
+" the ability to obtain specific observation of parts of the network, it is "
+"possible for them to verify a suspicion that you talk regularly to your "
+"friend by observing traffic at both ends and correlating the timing of only "
+"that traffic."
+msgstr ""
+
+#: https//support.torproject.org/about/attacks-on-onion-routing/
+#: (content/about/attacks-on-onion-routing/contents+en.lrquestion.description)
+msgid ""
+"Again, this is only useful to verify that parties already suspected of "
+"communicating with one another are doing so."
+msgstr ""
+
+#: https//support.torproject.org/about/attacks-on-onion-routing/
+#: (content/about/attacks-on-onion-routing/contents+en.lrquestion.description)
+msgid ""
+"In most countries, the suspicion required to obtain a warrant already "
+"carries more weight than timing correlation would provide."
+msgstr ""
+
+#: https//support.torproject.org/about/attacks-on-onion-routing/
+#: (content/about/attacks-on-onion-routing/contents+en.lrquestion.description)
+msgid ""
+"Furthermore, since Tor reuses circuits for multiple TCP connections, it is "
+"possible to associate non anonymous and anonymous traffic at a given exit "
+"node, so be careful about what applications you run concurrently over Tor."
+msgstr ""
+
+#: https//support.torproject.org/about/attacks-on-onion-routing/
+#: (content/about/attacks-on-onion-routing/contents+en.lrquestion.description)
+msgid "Perhaps even run separate Tor clients for these applications."
+msgstr ""
+
#: https//support.torproject.org/about/backdoor/
#: (content/about/backdoor/contents+en.lrquestion.title)
msgid "Is there a backdoor in Tor?"
@@ -2636,6 +2751,43 @@ msgid ""
"recommended](/tbb/tbb-9/)."
msgstr ""
+#: https//support.torproject.org/about/change-paths/
+#: (content/about/change-paths/contents+en.lrquestion.title)
+msgid "How often does Tor change its paths?"
+msgstr ""
+
+#: https//support.torproject.org/about/change-paths/
+#: (content/about/change-paths/contents+en.lrquestion.description)
+msgid ""
+"Tor will reuse the same circuit for new TCP streams for 10 minutes, as long "
+"as the circuit is working fine."
+msgstr ""
+
+#: https//support.torproject.org/about/change-paths/
+#: (content/about/change-paths/contents+en.lrquestion.description)
+msgid "(If the circuit fails, Tor will switch to a new circuit immediately.)"
+msgstr ""
+
+#: https//support.torproject.org/about/change-paths/
+#: (content/about/change-paths/contents+en.lrquestion.description)
+msgid ""
+"But note that a single TCP stream (e.g. a long IRC connection) will stay on "
+"the same circuit forever."
+msgstr ""
+
+#: https//support.torproject.org/about/change-paths/
+#: (content/about/change-paths/contents+en.lrquestion.description)
+msgid "We don't rotate individual streams from one circuit to the next."
+msgstr ""
+
+#: https//support.torproject.org/about/change-paths/
+#: (content/about/change-paths/contents+en.lrquestion.description)
+msgid ""
+"Otherwise, an adversary with a partial view of the network would be given "
+"many chances over time to link you to your destination, rather than just one"
+" chance."
+msgstr ""
+
#: https//support.torproject.org/about/distribute-tor/
#: (content/about/distribute-tor/contents+en.lrquestion.title)
msgid "Can I distribute Tor?"
@@ -2731,6 +2883,133 @@ msgid ""
"details."
msgstr ""
+#: https//support.torproject.org/about/entry-guards/
+#: (content/about/entry-guards/contents+en.lrquestion.title)
+msgid "What are Entry Guards?"
+msgstr ""
+
+#: https//support.torproject.org/about/entry-guards/
+#: (content/about/entry-guards/contents+en.lrquestion.description)
+msgid ""
+"Tor (like all current practical low-latency anonymity designs) fails when "
+"the attacker can see both ends of the communications channel."
+msgstr ""
+
+#: https//support.torproject.org/about/entry-guards/
+#: (content/about/entry-guards/contents+en.lrquestion.description)
+msgid ""
+"For example, suppose the attacker controls or watches the Tor relay you "
+"choose to enter the network, and also controls or watches the website you "
+"visit."
+msgstr ""
+
+#: https//support.torproject.org/about/entry-guards/
+#: (content/about/entry-guards/contents+en.lrquestion.description)
+msgid ""
+"In this case, the research community knows no practical low-latency design "
+"that can reliably stop the attacker from correlating volume and timing "
+"information on the two sides."
+msgstr ""
+
+#: https//support.torproject.org/about/entry-guards/
+#: (content/about/entry-guards/contents+en.lrquestion.description)
+msgid "So, what should we do?"
+msgstr ""
+
+#: https//support.torproject.org/about/entry-guards/
+#: (content/about/entry-guards/contents+en.lrquestion.description)
+msgid "Suppose the attacker controls, or can observe, C relays."
+msgstr ""
+
+#: https//support.torproject.org/about/entry-guards/
+#: (content/about/entry-guards/contents+en.lrquestion.description)
+msgid "Suppose there are N relays total."
+msgstr ""
+
+#: https//support.torproject.org/about/entry-guards/
+#: (content/about/entry-guards/contents+en.lrquestion.description)
+msgid ""
+"If you select new entry and exit relays each time you use the network, the "
+"attacker will be able to correlate all traffic you send with probability "
+"around (c/n)2."
+msgstr ""
+
+#: https//support.torproject.org/about/entry-guards/
+#: (content/about/entry-guards/contents+en.lrquestion.description)
+msgid ""
+"But profiling is, for most users, as bad as being traced all the time: they "
+"want to do something often without an attacker noticing, and the attacker "
+"noticing once is as bad as the attacker noticing more often."
+msgstr ""
+
+#: https//support.torproject.org/about/entry-guards/
+#: (content/about/entry-guards/contents+en.lrquestion.description)
+msgid ""
+"Thus, choosing many random entries and exits gives the user no chance of "
+"escaping profiling by this kind of attacker."
+msgstr ""
+
+#: https//support.torproject.org/about/entry-guards/
+#: (content/about/entry-guards/contents+en.lrquestion.description)
+msgid ""
+"The solution is \"entry guards\": each Tor client selects a few relays at "
+"random to use as entry points, and uses only those relays for their first "
+"hop."
+msgstr ""
+
+#: https//support.torproject.org/about/entry-guards/
+#: (content/about/entry-guards/contents+en.lrquestion.description)
+msgid ""
+"If those relays are not controlled or observed, the attacker can't win, "
+"ever, and the user is secure."
+msgstr ""
+
+#: https//support.torproject.org/about/entry-guards/
+#: (content/about/entry-guards/contents+en.lrquestion.description)
+msgid ""
+"If those relays are observed or controlled by the attacker, the attacker "
+"sees a larger fraction of the user's traffic - but still the user is no more"
+" profiled than before."
+msgstr ""
+
+#: https//support.torproject.org/about/entry-guards/
+#: (content/about/entry-guards/contents+en.lrquestion.description)
+msgid ""
+"Thus, the user has some chance (on the order of (n-c)/n) of avoiding "
+"profiling, whereas they had none before."
+msgstr ""
+
+#: https//support.torproject.org/about/entry-guards/
+#: (content/about/entry-guards/contents+en.lrquestion.description)
+msgid ""
+"You can read more at [An Analysis of the Degradation of Anonymous "
+"Protocols](http://freehaven.net/anonbib/#wright02), [Defending Anonymous "
+"Communication Against Passive Logging "
+"Attacks](http://freehaven.net/anonbib/#wright03), and especially [Locating "
+"Hidden Servers](http://freehaven.net/anonbib/#hs-attack06)."
+msgstr ""
+
+#: https//support.torproject.org/about/entry-guards/
+#: (content/about/entry-guards/contents+en.lrquestion.description)
+msgid ""
+"Restricting your entry nodes may also help against attackers who want to run"
+" a few Tor nodes and easily enumerate all of the Tor user IP addresses."
+msgstr ""
+
+#: https//support.torproject.org/about/entry-guards/
+#: (content/about/entry-guards/contents+en.lrquestion.description)
+msgid ""
+"(Even though they can't learn what destinations the users are talking to, "
+"they still might be able to do bad things with just a list of users.)"
+msgstr ""
+
+#: https//support.torproject.org/about/entry-guards/
+#: (content/about/entry-guards/contents+en.lrquestion.description)
+msgid ""
+"However, that feature won't really become useful until we move to a "
+"\"directory guard\" design as well."
+msgstr ""
+
#: https//support.torproject.org/about/how-is-tor-different-from-other-proxies/
#: (content/about/how-is-tor-different-from-other-proxies/contents+en.lrquestion.title)
msgid "How is Tor different from other proxies?"
@@ -2901,6 +3180,162 @@ msgid ""
" Tor and HTTPS interact."
msgstr ""
+#: https//support.torproject.org/about/key-management/
+#: (content/about/key-management/contents+en.lrquestion.title)
+msgid "Tell me about all the keys Tor uses"
+msgstr ""
+
+#: https//support.torproject.org/about/key-management/
+#: (content/about/key-management/contents+en.lrquestion.description)
+msgid ""
+"Tor uses a variety of different keys, with three goals in mind: 1) "
+"encryption to ensure privacy of data within the Tor network, 2) "
+"authentication so clients know they're talking to the relays they meant to "
+"talk to, and 3) signatures to make sure all clients know the same set of "
+"relays."
+msgstr ""
+
+#: https//support.torproject.org/about/key-management/
+#: (content/about/key-management/contents+en.lrquestion.description)
+msgid ""
+"**Encryption**: first, all connections in Tor use TLS link encryption, so "
+"observers can't look inside to see which circuit a given cell is intended "
+"for."
+msgstr ""
+
+#: https//support.torproject.org/about/key-management/
+#: (content/about/key-management/contents+en.lrquestion.description)
+msgid ""
+"Further, the Tor client establishes an ephemeral encryption key with each "
+"relay in the circuit; these extra layers of encryption mean that only the "
+"exit relay can read the cells."
+msgstr ""
+
+#: https//support.torproject.org/about/key-management/
+#: (content/about/key-management/contents+en.lrquestion.description)
+msgid ""
+"Both sides discard the circuit key when the circuit ends, so logging traffic"
+" and then breaking into the relay to discover the key won't work."
+msgstr ""
+
+#: https//support.torproject.org/about/key-management/
+#: (content/about/key-management/contents+en.lrquestion.description)
+msgid ""
+"**Authentication**: Every Tor relay has a public decryption key called the "
+"\"onion key\"."
+msgstr ""
+
+#: https//support.torproject.org/about/key-management/
+#: (content/about/key-management/contents+en.lrquestion.description)
+msgid "Each relay rotates its onion key once a week."
+msgstr ""
+
+#: https//support.torproject.org/about/key-management/
+#: (content/about/key-management/contents+en.lrquestion.description)
+msgid ""
+"When the Tor client establishes circuits, at each step it [demands that the "
+"Tor relay prove knowledge of its onion key](https://svn-"
+"archive.torproject.org/svn/projects/design-paper/tor-"
+"design.html#subsec:circuits)."
+msgstr ""
+
+#: https//support.torproject.org/about/key-management/
+#: (content/about/key-management/contents+en.lrquestion.description)
+msgid ""
+"That way the first node in the path can't just spoof the rest of the path."
+msgstr ""
+
+#: https//support.torproject.org/about/key-management/
+#: (content/about/key-management/contents+en.lrquestion.description)
+msgid ""
+"Because the Tor client chooses the path, it can make sure to get Tor's "
+"\"distributed trust\" property: no single relay in the path can know about "
+"both the client and what the client is doing."
+msgstr ""
+
+#: https//support.torproject.org/about/key-management/
+#: (content/about/key-management/contents+en.lrquestion.description)
+msgid ""
+"**Coordination**: How do clients know what the relays are, and how do they "
+"know that they have the right keys for them?"
+msgstr ""
+
+#: https//support.torproject.org/about/key-management/
+#: (content/about/key-management/contents+en.lrquestion.description)
+msgid "Each relay has a long-term public signing key called the \"identity key\"."
+msgstr ""
+
+#: https//support.torproject.org/about/key-management/
+#: (content/about/key-management/contents+en.lrquestion.description)
+msgid "Each directory authority additionally has a \"directory signing key\"."
+msgstr ""
+
+#: https//support.torproject.org/about/key-management/
+#: (content/about/key-management/contents+en.lrquestion.description)
+msgid ""
+"The directory authorities [provide a signed "
+"list](https://gitweb.torproject.org/torspec.git/tree/dir-spec.txt) of all "
+"the known relays, and in that list are a set of certificates from each relay"
+" (self-signed by their identity key) specifying their keys, locations, exit "
+"policies, and so on."
+msgstr ""
+
+#: https//support.torproject.org/about/key-management/
+#: (content/about/key-management/contents+en.lrquestion.description)
+msgid ""
+"So unless the adversary can control a majority of the directory authorities "
+"(as of 2021 there are 10 directory authorities), they can't trick the Tor "
+"client into using other Tor relays."
+msgstr ""
+
+#: https//support.torproject.org/about/key-management/
+#: (content/about/key-management/contents+en.lrquestion.description)
+msgid "How do clients know what the directory authorities are?"
+msgstr ""
+
+#: https//support.torproject.org/about/key-management/
+#: (content/about/key-management/contents+en.lrquestion.description)
+msgid ""
+"The Tor software comes with a built-in list of location and public key for "
+"each directory authority."
+msgstr ""
+
+#: https//support.torproject.org/about/key-management/
+#: (content/about/key-management/contents+en.lrquestion.description)
+msgid ""
+"So the only way to trick users into using a fake Tor network is to give them"
+" a specially modified version of the software."
+msgstr ""
+
+#: https//support.torproject.org/about/key-management/
+#: (content/about/key-management/contents+en.lrquestion.description)
+msgid "How do users know they've got the right software?"
+msgstr ""
+
+#: https//support.torproject.org/about/key-management/
+#: (content/about/key-management/contents+en.lrquestion.description)
+msgid ""
+"When we distribute the source code or a package, we digitally sign it with "
+"[GNU Privacy Guard](http://www.gnupg.org/). See the [instructions on how to "
+"check Tor Browser's signature](https://support.torproject.org/tbb/how-to-"
+"verify-signature/)."
+msgstr ""
+
+#: https//support.torproject.org/about/key-management/
+#: (content/about/key-management/contents+en.lrquestion.description)
+msgid ""
+"In order to be certain that it's really signed by us, you need to have met "
+"us in person and gotten a copy of our GPG key fingerprint, or you need to "
+"know somebody who has."
+msgstr ""
+
+#: https//support.torproject.org/about/key-management/
+#: (content/about/key-management/contents+en.lrquestion.description)
+msgid ""
+"If you're concerned about an attack on this level, we recommend you get "
+"involved with the security community and start meeting people."
+msgstr ""
+
#: https//support.torproject.org/about/no-data-scrubbing/
#: (content/about/no-data-scrubbing/contents+en.lrquestion.title)
msgid ""
@@ -2933,6 +3368,151 @@ msgid ""
"though."
msgstr ""
+#: https//support.torproject.org/about/protections/
+#: (content/about/protections/contents+en.lrquestion.title)
+msgid "What protections does Tor provide?"
+msgstr ""
+
+#: https//support.torproject.org/about/protections/
+#: (content/about/protections/contents+en.lrquestion.description)
+msgid ""
+"Internet communication is based on a store-and-forward model that can be "
+"understood in analogy to postal mail: Data is transmitted in blocks called "
+"IP datagrams or packets."
+msgstr ""
+
+#: https//support.torproject.org/about/protections/
+#: (content/about/protections/contents+en.lrquestion.description)
+msgid ""
+"Every packet includes a source IP address (of the sender) and a destination "
+"IP address (of the receiver), just as ordinary letters contain postal "
+"addresses of sender and receiver."
+msgstr ""
+
+#: https//support.torproject.org/about/protections/
+#: (content/about/protections/contents+en.lrquestion.description)
+msgid ""
+"The way from sender to receiver involves multiple hops of routers, where "
+"each router inspects the destination IP address and forwards the packet "
+"closer to its destination."
+msgstr ""
+
+#: https//support.torproject.org/about/protections/
+#: (content/about/protections/contents+en.lrquestion.description)
+msgid ""
+"Thus, every router between sender and receiver learns that the sender is "
+"communicating with the receiver."
+msgstr ""
+
+#: https//support.torproject.org/about/protections/
+#: (content/about/protections/contents+en.lrquestion.description)
+msgid ""
+"In particular, your local ISP is in the position to build a complete profile"
+" of your Internet usage."
+msgstr ""
+
+#: https//support.torproject.org/about/protections/
+#: (content/about/protections/contents+en.lrquestion.description)
+msgid ""
+"In addition, every server in the Internet that can see any of the packets "
+"can profile your behavior."
+msgstr ""
+
+#: https//support.torproject.org/about/protections/
+#: (content/about/protections/contents+en.lrquestion.description)
+msgid ""
+"The aim of Tor is to improve your privacy by sending your traffic through a "
+"series of proxies."
+msgstr ""
+
+#: https//support.torproject.org/about/protections/
+#: (content/about/protections/contents+en.lrquestion.description)
+msgid ""
+"Your communication is encrypted in multiple layers and routed via multiple "
+"hops through the Tor network to the final receiver."
+msgstr ""
+
+#: https//support.torproject.org/about/protections/
+#: (content/about/protections/contents+en.lrquestion.description)
+msgid ""
+"More details on this process can be found in this "
+"[visualization](https://support.torproject.org/https/https-1/)."
+msgstr ""
+
+#: https//support.torproject.org/about/protections/
+#: (content/about/protections/contents+en.lrquestion.description)
+msgid ""
+"Note that all your local ISP can observe now is that you are communicating "
+"with Tor nodes."
+msgstr ""
+
+#: https//support.torproject.org/about/protections/
+#: (content/about/protections/contents+en.lrquestion.description)
+msgid ""
+"Similarly, servers in the Internet just see that they are being contacted by"
+" Tor nodes."
+msgstr ""
+
+#: https//support.torproject.org/about/protections/
+#: (content/about/protections/contents+en.lrquestion.description)
+msgid "Generally speaking, Tor aims to solve three privacy problems:"
+msgstr ""
+
+#: https//support.torproject.org/about/protections/
+#: (content/about/protections/contents+en.lrquestion.description)
+msgid ""
+"First, Tor prevents websites and other services from learning your location,"
+" which they can use to build databases about your habits and interests."
+msgstr ""
+
+#: https//support.torproject.org/about/protections/
+#: (content/about/protections/contents+en.lrquestion.description)
+msgid ""
+"With Tor, your Internet connections don't give you away by default -- now "
+"you can have the ability to choose, for each connection, how much "
+"information to reveal."
+msgstr ""
+
+#: https//support.torproject.org/about/protections/
+#: (content/about/protections/contents+en.lrquestion.description)
+msgid ""
+"Second, Tor prevents people watching your traffic locally (such as your ISP "
+"or someone with access to your home wifi or router) from learning what "
+"information you're fetching and where you're fetching it from."
+msgstr ""
+
+#: https//support.torproject.org/about/protections/
+#: (content/about/protections/contents+en.lrquestion.description)
+msgid ""
+"It also stops them from deciding what you're allowed to learn and publish --"
+" if you can get to any part of the Tor network, you can reach any site on "
+"the Internet."
+msgstr ""
+
+#: https//support.torproject.org/about/protections/
+#: (content/about/protections/contents+en.lrquestion.description)
+msgid ""
+"Third, Tor routes your connection through more than one Tor relay so no "
+"single relay can learn what you're up to."
+msgstr ""
+
+#: https//support.torproject.org/about/protections/
+#: (content/about/protections/contents+en.lrquestion.description)
+msgid ""
+"Because these relays are run by different individuals or organizations, "
+"distributing trust provides more security than the old [one hop "
+"proxy](https://support.torproject.org/about/#how-is-tor-different-from-"
+"other-proxies) approach."
+msgstr ""
+
+#: https//support.torproject.org/about/protections/
+#: (content/about/protections/contents+en.lrquestion.description)
+msgid ""
+"Note, however, that there are situations where Tor fails to solve these "
+"privacy problems entirely: see the entry below on [remaining "
+"attacks](https://support.torproject.org/about/#attacks-on-onion-routing)."
+msgstr ""
+
#: https//support.torproject.org/about/what-is-tor/
#: (content/about/what-is-tor/contents+en.lrquestion.title)
msgid "What is Tor?"
@@ -5136,9 +5716,11 @@ msgstr ""
#: (content/tbb/tbb-47/contents+en.lrquestion.description)
msgid ""
"Also, read up on the HTTPProxyAuthenticator and HTTPSProxyAuthenticator "
-"options if your proxy requires auth. We only support basic auth currently, "
-"but if you need NTLM authentication, you may find [this post in the "
-"archives](https://archives.seul.org/or/talk/Jun-2005/msg00223.html) useful."
+"options if your [proxy requires auth.](https://developer.mozilla.org/en-"
+"US/docs/Web/HTTP/Headers/Proxy-Authenticate) We only support basic auth "
+"currently, but if you need NTLM authentication, you may find [this post in "
+"the archives](https://archives.seul.org/or/talk/Jun-2005/msg00223.html) "
+"useful."
msgstr ""
#: https//support.torproject.org/tbb/tbb-47/
@@ -5358,6 +5940,219 @@ msgid ""
"have no effect on Tor's configuration."
msgstr ""
+#: https//support.torproject.org/tbb/tbb-firewall-ports/
+#: (content/tbb/tbb-firewall-ports/contents+en.lrquestion.title)
+msgid "My firewall only allows a few outgoing ports"
+msgstr ""
+
+#: https//support.torproject.org/tbb/tbb-firewall-ports/
+#: (content/tbb/tbb-firewall-ports/contents+en.lrquestion.description)
+msgid ""
+"If your firewall works by blocking ports, then you can tell Tor to only use "
+"the ports when you start your Tor Browser."
+msgstr ""
+
+#: https//support.torproject.org/tbb/tbb-firewall-ports/
+#: (content/tbb/tbb-firewall-ports/contents+en.lrquestion.description)
+msgid ""
+"Or you can add the ports that your firewall permits by adding "
+"\"FascistFirewall 1\" to your torrc configuration file."
+msgstr ""
+
+#: https//support.torproject.org/tbb/tbb-firewall-ports/
+#: (content/tbb/tbb-firewall-ports/contents+en.lrquestion.description)
+msgid ""
+"By default, when you set this Tor assumes that your firewall allows only "
+"port 80 and port 443 (HTTP and HTTPS respectively)."
+msgstr ""
+
+#: https//support.torproject.org/tbb/tbb-firewall-ports/
+#: (content/tbb/tbb-firewall-ports/contents+en.lrquestion.description)
+msgid ""
+"You can select a different set of ports with the FirewallPorts torrc option."
+msgstr ""
+
+#: https//support.torproject.org/tbb/tbb-firewall-ports/
+#: (content/tbb/tbb-firewall-ports/contents+en.lrquestion.description)
+msgid ""
+"If you want to be more fine-grained with your controls, you can also use the"
+" ReachableAddresses config options, e.g.:"
+msgstr ""
+
+#: https//support.torproject.org/tbb/tbb-firewall-ports/
+#: (content/tbb/tbb-firewall-ports/contents+en.lrquestion.description)
+#: https//support.torproject.org/tbb/tbb-install-tor-central-server/
+#: (content/tbb/tbb-install-tor-central-server/contents+en.lrquestion.description)
+#: https//support.torproject.org/operators/default-exit-ports/
+#: (content/operators/default-exit-ports/contents+en.lrquestion.description)
+#: https//support.torproject.org/operators/hibernation/
+#: (content/operators/hibernation/contents+en.lrquestion.description)
+#: https//support.torproject.org/operators/limit-total-bandwidth/
+#: (content/operators/limit-total-bandwidth/contents+en.lrquestion.description)
+#: https//support.torproject.org/misc/bug-or-feedback/
+#: (content/misc/bug-or-feedback/contents+en.lrquestion.description)
+#: https//support.torproject.org/get-in-touch/why-i-cant-join-tor-channels/
+#: (content/get-in-touch/why-i-cant-join-tor-channels/contents+en.lrquestion.description)
+#: https//support.torproject.org/apt/tor-deb-repo/
+#: (content/apt/apt-1/contents+en.lrquestion.description)
+#: https//support.torproject.org/apt/apt-over-tor/
+#: (content/apt/apt-3/contents+en.lrquestion.description)
+msgid "```"
+msgstr "```"
+
+#: https//support.torproject.org/tbb/tbb-firewall-ports/
+#: (content/tbb/tbb-firewall-ports/contents+en.lrquestion.description)
+msgid "ReachableDirAddresses *:80"
+msgstr ""
+
+#: https//support.torproject.org/tbb/tbb-firewall-ports/
+#: (content/tbb/tbb-firewall-ports/contents+en.lrquestion.description)
+msgid "ReachableORAddresses *:443"
+msgstr ""
+
+#: https//support.torproject.org/tbb/tbb-install-tor-central-server/
+#: (content/tbb/tbb-install-tor-central-server/contents+en.lrquestion.title)
+msgid ""
+"Can I install Tor on a central server, and have my clients connect to it?"
+msgstr ""
+
+#: https//support.torproject.org/tbb/tbb-install-tor-central-server/
+#: (content/tbb/tbb-install-tor-central-server/contents+en.lrquestion.description)
+msgid ""
+"Yes. Tor can be configured as a client or a relay on another machine, and "
+"allow other machines to be able to connect to it for anonymity."
+msgstr ""
+
+#: https//support.torproject.org/tbb/tbb-install-tor-central-server/
+#: (content/tbb/tbb-install-tor-central-server/contents+en.lrquestion.description)
+msgid ""
+"This is most useful in an environment where many computers want a gateway of"
+" anonymity to the rest of the world."
+msgstr ""
+
+#: https//support.torproject.org/tbb/tbb-install-tor-central-server/
+#: (content/tbb/tbb-install-tor-central-server/contents+en.lrquestion.description)
+msgid ""
+"However, be forewarned that with this configuration, anyone within your "
+"private network (existing between you and the Tor client/relay) can see what"
+" traffic you are sending in clear text."
+msgstr ""
+
+#: https//support.torproject.org/tbb/tbb-install-tor-central-server/
+#: (content/tbb/tbb-install-tor-central-server/contents+en.lrquestion.description)
+msgid "The anonymity doesn't start until you get to the Tor relay."
+msgstr ""
+
+#: https//support.torproject.org/tbb/tbb-install-tor-central-server/
+#: (content/tbb/tbb-install-tor-central-server/contents+en.lrquestion.description)
+msgid ""
+"Because of this, if you are the controller of your domain and you know "
+"everything's locked down, you will be OK, but this configuration may not be "
+"suitable for large private networks where security is key all around."
+msgstr ""
+
+#: https//support.torproject.org/tbb/tbb-install-tor-central-server/
+#: (content/tbb/tbb-install-tor-central-server/contents+en.lrquestion.description)
+msgid ""
+"Configuration is simple, editing your torrc file's SocksListenAddress "
+"according to the following examples:"
+msgstr ""
+
+#: https//support.torproject.org/tbb/tbb-install-tor-central-server/
+#: (content/tbb/tbb-install-tor-central-server/contents+en.lrquestion.description)
+msgid "SocksListenAddress 127.0.0.1"
+msgstr ""
+
+#: https//support.torproject.org/tbb/tbb-install-tor-central-server/
+#: (content/tbb/tbb-install-tor-central-server/contents+en.lrquestion.description)
+msgid "SocksListenAddress 192.168.x.x:9100"
+msgstr ""
+
+#: https//support.torproject.org/tbb/tbb-install-tor-central-server/
+#: (content/tbb/tbb-install-tor-central-server/contents+en.lrquestion.description)
+msgid "SocksListenAddress 0.0.0.0:9100"
+msgstr ""
+
+#: https//support.torproject.org/tbb/tbb-install-tor-central-server/
+#: (content/tbb/tbb-install-tor-central-server/contents+en.lrquestion.description)
+msgid ""
+"You can state multiple listen addresses, in the case that you are part of "
+"several networks or subnets."
+msgstr ""
+
+#: https//support.torproject.org/tbb/tbb-install-tor-central-server/
+#: (content/tbb/tbb-install-tor-central-server/contents+en.lrquestion.description)
+msgid "SocksListenAddress 192.168.x.x:9100 #eth0"
+msgstr ""
+
+#: https//support.torproject.org/tbb/tbb-install-tor-central-server/
+#: (content/tbb/tbb-install-tor-central-server/contents+en.lrquestion.description)
+msgid "SocksListenAddress 10.x.x.x:9100 #eth1"
+msgstr ""
+
+#: https//support.torproject.org/tbb/tbb-install-tor-central-server/
+#: (content/tbb/tbb-install-tor-central-server/contents+en.lrquestion.description)
+msgid ""
+"After this, your clients on their respective networks/subnets would specify "
+"a socks proxy with the address and port you specified SocksListenAddress to "
+"be."
+msgstr ""
+
+#: https//support.torproject.org/tbb/tbb-install-tor-central-server/
+#: (content/tbb/tbb-install-tor-central-server/contents+en.lrquestion.description)
+msgid ""
+"Please note that the SocksPort configuration option gives the port ONLY for "
+"localhost (127.0.0.1)."
+msgstr ""
+
+#: https//support.torproject.org/tbb/tbb-install-tor-central-server/
+#: (content/tbb/tbb-install-tor-central-server/contents+en.lrquestion.description)
+msgid ""
+"When setting up your SocksListenAddress(es), you need to give the port with "
+"the address, as shown above."
+msgstr ""
+
+#: https//support.torproject.org/tbb/tbb-install-tor-central-server/
+#: (content/tbb/tbb-install-tor-central-server/contents+en.lrquestion.description)
+msgid ""
+"If you are interested in forcing all outgoing data through the central Tor "
+"client/relay, instead of the server only being an optional proxy, you may "
+"find the program iptables (for *nix) useful."
+msgstr ""
+
+#: https//support.torproject.org/tbb/tbb-run-client-different-computer/
+#: (content/tbb/tbb-run-client-different-computer/contents+en.lrquestion.title)
+msgid ""
+"I want to run my Tor client on a different computer than my applications"
+msgstr ""
+
+#: https//support.torproject.org/tbb/tbb-run-client-different-computer/
+#: (content/tbb/tbb-run-client-different-computer/contents+en.lrquestion.description)
+msgid ""
+"By default, your Tor client only listens for applications that connect from "
+"localhost."
+msgstr ""
+
+#: https//support.torproject.org/tbb/tbb-run-client-different-computer/
+#: (content/tbb/tbb-run-client-different-computer/contents+en.lrquestion.description)
+msgid "Connections from other computers are refused."
+msgstr ""
+
+#: https//support.torproject.org/tbb/tbb-run-client-different-computer/
+#: (content/tbb/tbb-run-client-different-computer/contents+en.lrquestion.description)
+msgid ""
+"If you want to torify applications on different computers than the Tor "
+"client, you should edit your torrc to define `SocksListenAddress 0.0.0.0` "
+"and then restart (or hup) Tor."
+msgstr ""
+
+#: https//support.torproject.org/tbb/tbb-run-client-different-computer/
+#: (content/tbb/tbb-run-client-different-computer/contents+en.lrquestion.description)
+msgid ""
+"If you want to get more advanced, you can configure your Tor client on a "
+"firewall to bind to your internal IP but not your external IP."
+msgstr ""
+
#: https//support.torproject.org/tbb/website-blocking-tor/
#: (content/tbb/website-blocking-tor/contents+en.lrquestion.title)
msgid "A website I am trying to reach is blocking access over Tor."
@@ -6816,6 +7611,130 @@ msgid ""
"guide."
msgstr ""
+#: https//support.torproject.org/operators/default-exit-ports/
+#: (content/operators/default-exit-ports/contents+en.lrquestion.title)
+msgid "Is there a list of default exit ports?"
+msgstr ""
+
+#: https//support.torproject.org/operators/default-exit-ports/
+#: (content/operators/default-exit-ports/contents+en.lrquestion.description)
+msgid ""
+"The default open ports are listed below but keep in mind that, any port or "
+"ports can be opened by the relay operator by configuring it in torrc or "
+"modifying the source code."
+msgstr ""
+
+#: https//support.torproject.org/operators/default-exit-ports/
+#: (content/operators/default-exit-ports/contents+en.lrquestion.description)
+msgid ""
+"The default according to src/or/policies.c ([line 85][1] and [line 1901][2])"
+" from the source code release [release-0.4.6][3]:"
+msgstr ""
+
+#: https//support.torproject.org/operators/default-exit-ports/
+#: (content/operators/default-exit-ports/contents+en.lrquestion.description)
+msgid "reject 0.0.0.0/8"
+msgstr ""
+
+#: https//support.torproject.org/operators/default-exit-ports/
+#: (content/operators/default-exit-ports/contents+en.lrquestion.description)
+msgid "reject 169.254.0.0/16"
+msgstr ""
+
+#: https//support.torproject.org/operators/default-exit-ports/
+#: (content/operators/default-exit-ports/contents+en.lrquestion.description)
+msgid "reject 127.0.0.0/8"
+msgstr ""
+
+#: https//support.torproject.org/operators/default-exit-ports/
+#: (content/operators/default-exit-ports/contents+en.lrquestion.description)
+msgid "reject 192.168.0.0/16"
+msgstr ""
+
+#: https//support.torproject.org/operators/default-exit-ports/
+#: (content/operators/default-exit-ports/contents+en.lrquestion.description)
+msgid "reject 10.0.0.0/8"
+msgstr ""
+
+#: https//support.torproject.org/operators/default-exit-ports/
+#: (content/operators/default-exit-ports/contents+en.lrquestion.description)
+msgid "reject 172.16.0.0/12"
+msgstr ""
+
+#: https//support.torproject.org/operators/default-exit-ports/
+#: (content/operators/default-exit-ports/contents+en.lrquestion.description)
+msgid "reject *:25"
+msgstr ""
+
+#: https//support.torproject.org/operators/default-exit-ports/
+#: (content/operators/default-exit-ports/contents+en.lrquestion.description)
+msgid "reject *:119"
+msgstr ""
+
+#: https//support.torproject.org/operators/default-exit-ports/
+#: (content/operators/default-exit-ports/contents+en.lrquestion.description)
+msgid "reject *:135-139"
+msgstr ""
+
+#: https//support.torproject.org/operators/default-exit-ports/
+#: (content/operators/default-exit-ports/contents+en.lrquestion.description)
+msgid "reject *:445"
+msgstr ""
+
+#: https//support.torproject.org/operators/default-exit-ports/
+#: (content/operators/default-exit-ports/contents+en.lrquestion.description)
+msgid "reject *:563"
+msgstr ""
+
+#: https//support.torproject.org/operators/default-exit-ports/
+#: (content/operators/default-exit-ports/contents+en.lrquestion.description)
+msgid "reject *:1214"
+msgstr ""
+
+#: https//support.torproject.org/operators/default-exit-ports/
+#: (content/operators/default-exit-ports/contents+en.lrquestion.description)
+msgid "reject *:4661-4666"
+msgstr ""
+
+#: https//support.torproject.org/operators/default-exit-ports/
+#: (content/operators/default-exit-ports/contents+en.lrquestion.description)
+msgid "reject *:6346-6429"
+msgstr ""
+
+#: https//support.torproject.org/operators/default-exit-ports/
+#: (content/operators/default-exit-ports/contents+en.lrquestion.description)
+msgid "reject *:6699"
+msgstr ""
+
+#: https//support.torproject.org/operators/default-exit-ports/
+#: (content/operators/default-exit-ports/contents+en.lrquestion.description)
+msgid "reject *:6881-6999"
+msgstr ""
+
+#: https//support.torproject.org/operators/default-exit-ports/
+#: (content/operators/default-exit-ports/contents+en.lrquestion.description)
+msgid "accept *:*"
+msgstr ""
+
+#: https//support.torproject.org/operators/default-exit-ports/
+#: (content/operators/default-exit-ports/contents+en.lrquestion.description)
+msgid ""
+"[1]: "
+"https://gitlab.torproject.org/tpo/core/tor/-/blob/release-0.4.6/src/core/or/policies.c#L85"
+msgstr ""
+
+#: https//support.torproject.org/operators/default-exit-ports/
+#: (content/operators/default-exit-ports/contents+en.lrquestion.description)
+msgid ""
+"[2]: "
+"https://gitlab.torproject.org/tpo/core/tor/-/blob/release-0.4.6/src/core/or/policies.c#L1901"
+msgstr ""
+
+#: https//support.torproject.org/operators/default-exit-ports/
+#: (content/operators/default-exit-ports/contents+en.lrquestion.description)
+msgid "[3]: https://gitlab.torproject.org/tpo/core/tor/-/tree/release-0.4.6/"
+msgstr ""
+
#: https//support.torproject.org/operators/dynamic-ip/
#: (content/operators/dynamic-ip/contents+en.lrquestion.title)
msgid "Can I run a Tor relay using a dynamic IP address?"
@@ -6963,21 +7882,6 @@ msgid ""
"into hibernation, signaled by this entry in the log:"
msgstr ""
-#: https//support.torproject.org/operators/hibernation/
-#: (content/operators/hibernation/contents+en.lrquestion.description)
-#: https//support.torproject.org/operators/limit-total-bandwidth/
-#: (content/operators/limit-total-bandwidth/contents+en.lrquestion.description)
-#: https//support.torproject.org/misc/bug-or-feedback/
-#: (content/misc/bug-or-feedback/contents+en.lrquestion.description)
-#: https//support.torproject.org/get-in-touch/why-i-cant-join-tor-channels/
-#: (content/get-in-touch/why-i-cant-join-tor-channels/contents+en.lrquestion.description)
-#: https//support.torproject.org/apt/tor-deb-repo/
-#: (content/apt/apt-1/contents+en.lrquestion.description)
-#: https//support.torproject.org/apt/apt-over-tor/
-#: (content/apt/apt-3/contents+en.lrquestion.description)
-msgid "```"
-msgstr "```"
-
#: https//support.torproject.org/operators/hibernation/
#: (content/operators/hibernation/contents+en.lrquestion.description)
msgid "Bandwidth soft limit reached; commencing hibernation."
@@ -9222,6 +10126,131 @@ msgstr ""
msgid "sub 4096R/C00942E4 2017-03-13"
msgstr ""
+#: https//support.torproject.org/misc/check-socks-dns-leaks/
+#: (content/misc/check-socks-dns-leaks/contents+en.lrquestion.title)
+msgid ""
+"How do I check if my application that uses SOCKS is leaking DNS requests?"
+msgstr ""
+
+#: https//support.torproject.org/misc/check-socks-dns-leaks/
+#: (content/misc/check-socks-dns-leaks/contents+en.lrquestion.description)
+msgid ""
+"Even if your application is using the correct variant of the SOCKS protocol,"
+" there is still a risk that it could be leaking DNS queries."
+msgstr ""
+
+#: https//support.torproject.org/misc/check-socks-dns-leaks/
+#: (content/misc/check-socks-dns-leaks/contents+en.lrquestion.description)
+msgid ""
+"This problem happens in Firefox extensions that resolve the destination "
+"hostname themselves, for example to show you its IP address, what country "
+"it's in, etc."
+msgstr ""
+
+#: https//support.torproject.org/misc/check-socks-dns-leaks/
+#: (content/misc/check-socks-dns-leaks/contents+en.lrquestion.description)
+msgid ""
+"If you suspect your application might behave like this, follow the "
+"instructions below to check."
+msgstr ""
+
+#: https//support.torproject.org/misc/check-socks-dns-leaks/
+#: (content/misc/check-socks-dns-leaks/contents+en.lrquestion.description)
+msgid ""
+"1. Add `TestSocks 1` to your [torrc file](https://support.torproject.org/tbb"
+"/tbb-editing-torrc/)."
+msgstr ""
+
+#: https//support.torproject.org/misc/check-socks-dns-leaks/
+#: (content/misc/check-socks-dns-leaks/contents+en.lrquestion.description)
+msgid ""
+"1. Start Tor, and point your program's SOCKS proxy settings to Tor's SOCKS5 "
+"server (`socks5://127.0.0.1:9050` by default)."
+msgstr ""
+
+#: https//support.torproject.org/misc/check-socks-dns-leaks/
+#: (content/misc/check-socks-dns-leaks/contents+en.lrquestion.description)
+msgid ""
+"1. Watch your logs as you use your application. For each socks connection, "
+"Tor will log a `notice` for safe connections, and a `warn` for connections "
+"leaking DNS requests."
+msgstr ""
+
+#: https//support.torproject.org/misc/check-socks-dns-leaks/
+#: (content/misc/check-socks-dns-leaks/contents+en.lrquestion.description)
+msgid ""
+"If you want to automatically disable all connections leaking DNS requests, "
+"set `SafeSocks 1` in your torrc file."
+msgstr ""
+
+#: https//support.torproject.org/misc/hide-exits/
+#: (content/misc/hide-exits/contents+en.lrquestion.title)
+msgid ""
+"You should hide the list of Tor relays, so people can't block the exits."
+msgstr ""
+
+#: https//support.torproject.org/misc/hide-exits/
+#: (content/misc/hide-exits/contents+en.lrquestion.description)
+msgid "There are a few reasons we don't:"
+msgstr ""
+
+#: https//support.torproject.org/misc/hide-exits/
+#: (content/misc/hide-exits/contents+en.lrquestion.description)
+msgid ""
+"1. We can't help but make the information available, since Tor clients need "
+"to use it to pick their paths."
+msgstr ""
+
+#: https//support.torproject.org/misc/hide-exits/
+#: (content/misc/hide-exits/contents+en.lrquestion.description)
+msgid "So if the \"blockers\" want it, they can get it anyway."
+msgstr ""
+
+#: https//support.torproject.org/misc/hide-exits/
+#: (content/misc/hide-exits/contents+en.lrquestion.description)
+msgid ""
+"Further, even if we didn't tell clients about the list of relays directly, "
+"somebody could still make a lot of connections through Tor to a test site "
+"and build a list of the addresses they see."
+msgstr ""
+
+#: https//support.torproject.org/misc/hide-exits/
+#: (content/misc/hide-exits/contents+en.lrquestion.description)
+msgid ""
+"1. If people want to block us, we believe that they should be allowed to do "
+"so."
+msgstr ""
+
+#: https//support.torproject.org/misc/hide-exits/
+#: (content/misc/hide-exits/contents+en.lrquestion.description)
+msgid ""
+"Obviously, we would prefer for everybody to allow Tor users to connect to "
+"them, but people have the right to decide who their services should allow "
+"connections from, and if they want to block anonymous users, they can."
+msgstr ""
+
+#: https//support.torproject.org/misc/hide-exits/
+#: (content/misc/hide-exits/contents+en.lrquestion.description)
+msgid ""
+"1. Being blockable also has tactical advantages: it may be a persuasive "
+"response to website maintainers who feel threatened by Tor."
+msgstr ""
+
+#: https//support.torproject.org/misc/hide-exits/
+#: (content/misc/hide-exits/contents+en.lrquestion.description)
+msgid ""
+"Giving them the option may inspire them to stop and think about whether they"
+" really want to eliminate private access to their system, and if not, what "
+"other options they might have."
+msgstr ""
+
+#: https//support.torproject.org/misc/hide-exits/
+#: (content/misc/hide-exits/contents+en.lrquestion.description)
+msgid ""
+"The time they might otherwise have spent blocking Tor, they may instead "
+"spend rethinking their overall approach to privacy and anonymity."
+msgstr ""
+
#: https//support.torproject.org/misc/menu/
#: (content/misc/menu/contents+en.lrquestion.description)
msgid "About"
@@ -9813,56 +10842,20 @@ msgstr ""
#: https//support.torproject.org/get-in-touch/why-i-cant-join-tor-channels/
#: (content/get-in-touch/why-i-cant-join-tor-channels/contents+en.lrquestion.description)
msgid ""
-"Then, to complete the registration and ultimately gain access to the #tor-"
-"project channel, your nickname must be **verified**."
-msgstr ""
-
-#: https//support.torproject.org/get-in-touch/why-i-cant-join-tor-channels/
-#: (content/get-in-touch/why-i-cant-join-tor-channels/contents+en.lrquestion.description)
-msgid ""
-"1. To verify your nick, open a new browser window and go to "
-"https://webchat.oftc.net/?channels=tor."
-msgstr ""
-
-#: https//support.torproject.org/get-in-touch/why-i-cant-join-tor-channels/
-#: (content/get-in-touch/why-i-cant-join-tor-channels/contents+en.lrquestion.description)
-msgid "2. Log in with your IRC nickname and password."
-msgstr ""
-
-#: https//support.torproject.org/get-in-touch/why-i-cant-join-tor-channels/
-#: (content/get-in-touch/why-i-cant-join-tor-channels/contents+en.lrquestion.description)
-msgid ""
-"3. Look for the word **verify** and log in there. It may appear that nothing"
-" has happened. Look at the top of the page, and there will be a column "
-"called **Account**."
-msgstr ""
-
-#: https//support.torproject.org/get-in-touch/why-i-cant-join-tor-channels/
-#: (content/get-in-touch/why-i-cant-join-tor-channels/contents+en.lrquestion.description)
-msgid "4. Click on **Account**."
-msgstr ""
-
-#: https//support.torproject.org/get-in-touch/why-i-cant-join-tor-channels/
-#: (content/get-in-touch/why-i-cant-join-tor-channels/contents+en.lrquestion.description)
-msgid ""
-"5. Click on the small sentence at the bottom of the square that says: Verify"
-" account."
-msgstr ""
-
-#: https//support.torproject.org/get-in-touch/why-i-cant-join-tor-channels/
-#: (content/get-in-touch/why-i-cant-join-tor-channels/contents+en.lrquestion.description)
-msgid "6. Fill out the Captcha that pops up, and click ok."
+"After registering your nickname, to gain access to the #tor-project and "
+"other protected channels, your nickname must be **verified**."
msgstr ""
#: https//support.torproject.org/get-in-touch/why-i-cant-join-tor-channels/
#: (content/get-in-touch/why-i-cant-join-tor-channels/contents+en.lrquestion.description)
msgid ""
-"7. A tiny message will appear: \"Your NickServ account has been verified.\""
+"1. Go to https://services.oftc.net/ and follow the steps in the '*To verify "
+"your account*' section"
msgstr ""
#: https//support.torproject.org/get-in-touch/why-i-cant-join-tor-channels/
#: (content/get-in-touch/why-i-cant-join-tor-channels/contents+en.lrquestion.description)
-msgid "8. Go back to the IRC webpage where you are logged in and type:"
+msgid "2. Go back to the IRC webpage where you are logged in and type:"
msgstr ""
#: https//support.torproject.org/get-in-touch/why-i-cant-join-tor-channels/
@@ -9872,12 +10865,12 @@ msgstr ""
#: https//support.torproject.org/get-in-touch/why-i-cant-join-tor-channels/
#: (content/get-in-touch/why-i-cant-join-tor-channels/contents+en.lrquestion.description)
-msgid "9. Click ENTER."
+msgid "3. Click ENTER."
msgstr ""
#: https//support.torproject.org/get-in-touch/why-i-cant-join-tor-channels/
#: (content/get-in-touch/why-i-cant-join-tor-channels/contents+en.lrquestion.description)
-msgid "10. If all is well, you will receive a message that says:"
+msgid "4. If all is well, you will receive a message that says:"
msgstr ""
#: https//support.torproject.org/get-in-touch/why-i-cant-join-tor-channels/
@@ -10018,18 +11011,22 @@ msgstr "# apt install apt-transport-https"
#: https//support.torproject.org/apt/tor-deb-repo/
#: (content/apt/apt-1/contents+en.lrquestion.description)
msgid ""
-"#### 2. Add the following entries to `/etc/apt/sources.list` or a new file "
-"in `/etc/apt/sources.list.d/`"
+"#### 2. Create a new file in `/etc/apt/sources.list.d/` named `tor.list`. "
+"Add the following entries:"
msgstr ""
#: https//support.torproject.org/apt/tor-deb-repo/
#: (content/apt/apt-1/contents+en.lrquestion.description)
-msgid "deb https://deb.torproject.org/torproject.org <DISTRIBUTION> main"
+msgid ""
+"deb [signed-by=/usr/share/keyrings/tor-archive-keyring.gpg] "
+"https://deb.torproject.org/torproject.org <DISTRIBUTION> main"
msgstr ""
#: https//support.torproject.org/apt/tor-deb-repo/
#: (content/apt/apt-1/contents+en.lrquestion.description)
-msgid "deb-src https://deb.torproject.org/torproject.org <DISTRIBUTION> main"
+msgid ""
+"deb-src [signed-by=/usr/share/keyrings/tor-archive-keyring.gpg] "
+"https://deb.torproject.org/torproject.org <DISTRIBUTION> main"
msgstr ""
#: https//support.torproject.org/apt/tor-deb-repo/
@@ -10043,14 +11040,16 @@ msgstr ""
#: https//support.torproject.org/apt/tor-deb-repo/
#: (content/apt/apt-1/contents+en.lrquestion.description)
msgid ""
-"deb https://deb.torproject.org/torproject.org tor-"
+"deb [signed-by=/usr/share/keyrings/tor-archive-keyring.gpg] "
+"https://deb.torproject.org/torproject.org tor-"
"experimental-0.4.6.x-<DISTRIBUTION> main"
msgstr ""
#: https//support.torproject.org/apt/tor-deb-repo/
#: (content/apt/apt-1/contents+en.lrquestion.description)
msgid ""
-"deb-src https://deb.torproject.org/torproject.org tor-"
+"deb-src [signed-by=/usr/share/keyrings/tor-archive-keyring.gpg] "
+"https://deb.torproject.org/torproject.org tor-"
"experimental-0.4.6.x-<DISTRIBUTION> main"
msgstr ""
@@ -10062,15 +11061,17 @@ msgstr ""
#: https//support.torproject.org/apt/tor-deb-repo/
#: (content/apt/apt-1/contents+en.lrquestion.description)
msgid ""
-"deb https://deb.torproject.org/torproject.org tor-nightly-"
-"master-<DISTRIBUTION> main"
+"deb [signed-by=/usr/share/keyrings/tor-archive-keyring.gpg] "
+"https://deb.torproject.org/torproject.org tor-nightly-master-<DISTRIBUTION> "
+"main"
msgstr ""
#: https//support.torproject.org/apt/tor-deb-repo/
#: (content/apt/apt-1/contents+en.lrquestion.description)
msgid ""
-"deb-src https://deb.torproject.org/torproject.org tor-nightly-"
-"master-<DISTRIBUTION> main"
+"deb-src [signed-by=/usr/share/keyrings/tor-archive-keyring.gpg] "
+"https://deb.torproject.org/torproject.org tor-nightly-master-<DISTRIBUTION> "
+"main"
msgstr ""
#: https//support.torproject.org/apt/tor-deb-repo/
@@ -10091,13 +11092,15 @@ msgstr ""
#: https//support.torproject.org/apt/tor-deb-repo/
#: (content/apt/apt-1/contents+en.lrquestion.description)
msgid ""
-"deb [arch=amd64] https://deb.torproject.org/torproject.org focal main"
+"deb [arch=amd64 signed-by=/usr/share/keyrings/tor-archive-keyring.gpg] "
+"https://deb.torproject.org/torproject.org focal main"
msgstr ""
#: https//support.torproject.org/apt/tor-deb-repo/
#: (content/apt/apt-1/contents+en.lrquestion.description)
msgid ""
-"deb-src [arch=amd64] https://deb.torproject.org/torproject.org focal main"
+"deb-src [arch=amd64 signed-by=/usr/share/keyrings/tor-archive-keyring.gpg] "
+"https://deb.torproject.org/torproject.org focal main"
msgstr ""
#: https//support.torproject.org/apt/tor-deb-repo/
@@ -10117,26 +11120,17 @@ msgstr ""
#: (content/apt/apt-1/contents+en.lrquestion.description)
msgid ""
"#### 3. Then add the gpg key used to sign the packages by running the "
-"following commands at your command prompt"
+"following command at your command prompt:"
msgstr ""
#: https//support.torproject.org/apt/tor-deb-repo/
#: (content/apt/apt-1/contents+en.lrquestion.description)
msgid ""
-"# wget -qO- "
+"# wget -O- "
"https://deb.torproject.org/torproject.org/A3C4F0F979CAA22CDBA8F512EE8CBC9E886DDD89.asc"
-" | gpg --import"
+" | gpg --dearmor | tee /usr/share/keyrings/tor-archive-keyring.gpg "
+">/dev/null"
msgstr ""
-"# wget -qO- "
-"https://deb.torproject.org/torproject.org/A3C4F0F979CAA22CDBA8F512EE8CBC9E886DDD89.asc"
-" | gpg --import"
-
-#: https//support.torproject.org/apt/tor-deb-repo/
-#: (content/apt/apt-1/contents+en.lrquestion.description)
-msgid ""
-"# gpg --export A3C4F0F979CAA22CDBA8F512EE8CBC9E886DDD89 | apt-key add -"
-msgstr ""
-"# gpg --export A3C4F0F979CAA22CDBA8F512EE8CBC9E886DDD89 | apt-key add -"
#: https//support.torproject.org/apt/tor-deb-repo/
#: (content/apt/apt-1/contents+en.lrquestion.description)
@@ -11742,6 +12736,82 @@ msgid ""
"doesn't change IP address over the day."
msgstr ""
+#: https//support.torproject.org/alternate-designs/block-websites/
+#: (content/alternate-designs/block-websites/contents+en.lrquestion.title)
+msgid "Exit policies should be able to block websites, not just IP addresses."
+msgstr ""
+
+#: https//support.torproject.org/alternate-designs/block-websites/
+#: (content/alternate-designs/block-websites/contents+en.lrquestion.description)
+msgid ""
+"It would be nice to let relay operators say things like `reject "
+"www.slashdot.org` in their exit policies, rather than requiring them to "
+"learn all the IP address space that could be covered by the site (and then "
+"also blocking other sites at those IP addresses)."
+msgstr ""
+
+#: https//support.torproject.org/alternate-designs/block-websites/
+#: (content/alternate-designs/block-websites/contents+en.lrquestion.description)
+msgid "There are two problems, though."
+msgstr ""
+
+#: https//support.torproject.org/alternate-designs/block-websites/
+#: (content/alternate-designs/block-websites/contents+en.lrquestion.description)
+msgid "First, users could still get around these blocks."
+msgstr ""
+
+#: https//support.torproject.org/alternate-designs/block-websites/
+#: (content/alternate-designs/block-websites/contents+en.lrquestion.description)
+msgid ""
+"For example, they could request the IP address rather than the hostname when"
+" they exit from the Tor network."
+msgstr ""
+
+#: https//support.torproject.org/alternate-designs/block-websites/
+#: (content/alternate-designs/block-websites/contents+en.lrquestion.description)
+msgid ""
+"This means operators would still need to learn all the IP addresses for the "
+"destinations in question."
+msgstr ""
+
+#: https//support.torproject.org/alternate-designs/block-websites/
+#: (content/alternate-designs/block-websites/contents+en.lrquestion.description)
+msgid ""
+"The second problem is that it would allow remote attackers to censor "
+"arbitrary sites."
+msgstr ""
+
+#: https//support.torproject.org/alternate-designs/block-websites/
+#: (content/alternate-designs/block-websites/contents+en.lrquestion.description)
+msgid ""
+"For example, if a Tor operator blocks www1.slashdot.org, and then some "
+"attacker poisons the Tor relay's DNS or otherwise changes that hostname to "
+"resolve to the IP address for a major news site, then suddenly that Tor "
+"relay is blocking the news site."
+msgstr ""
+
+#: https//support.torproject.org/alternate-designs/let-the-network-pick-the-path/
+#: (content/alternate-designs/let-the-network-pick-the-path/contents+en.lrquestion.title)
+msgid "You should let the network pick the path, not the client."
+msgstr ""
+
+#: https//support.torproject.org/alternate-designs/let-the-network-pick-the-path/
+#: (content/alternate-designs/let-the-network-pick-the-path/contents+en.lrquestion.description)
+msgid "No, you cannot trust the network to pick the path."
+msgstr ""
+
+#: https//support.torproject.org/alternate-designs/let-the-network-pick-the-path/
+#: (content/alternate-designs/let-the-network-pick-the-path/contents+en.lrquestion.description)
+msgid "Malicious relays could route you through their colluding friends."
+msgstr ""
+
+#: https//support.torproject.org/alternate-designs/let-the-network-pick-the-path/
+#: (content/alternate-designs/let-the-network-pick-the-path/contents+en.lrquestion.description)
+msgid ""
+"This would give an adversary the ability to watch all of your traffic end to"
+" end."
+msgstr ""
+
#: lego/templates/banner.html:3 lego/templates/banner.html:5
#: templates/banner.html:3 templates/banner.html:5
msgid "Close banner"
@@ -11772,8 +12842,8 @@ msgid "DONATE NOW"
msgstr "DONEER NU"
#: lego/templates/footer.html:13 lego/templates/footer.html:22
-#: lego/templates/navbar.html:83 templates/footer.html:13
-#: templates/footer.html:22 templates/navbar.html:83
+#: lego/templates/navbar.html:95 templates/footer.html:13
+#: templates/footer.html:22 templates/navbar.html:95
msgid "Download Tor Browser"
msgstr "Download Tor Browser"
diff --git a/contents+pl.po b/contents+pl.po
index ccd7b1e1bb..8402ba5cb8 100644
--- a/contents+pl.po
+++ b/contents+pl.po
@@ -21,7 +21,7 @@ msgid ""
msgstr ""
"Project-Id-Version: PACKAGE VERSION\n"
"Report-Msgid-Bugs-To: \n"
-"POT-Creation-Date: 2021-08-25 11:14+CET\n"
+"POT-Creation-Date: 2021-09-01 12:20+CET\n"
"PO-Revision-Date: 2018-10-02 22:41+0000\n"
"Last-Translator: Waldemar Stoczkowski, 2021\n"
"Language-Team: Polish (https://www.transifex.com/otf/teams/1519/pl/)\n"
@@ -154,6 +154,11 @@ msgstr "CzÄsto zadawane pytania dotyczÄ
ce nadużyÄ"
msgid "Tor Metrics"
msgstr "Wskaźniki Tor"
+#: https//support.torproject.org/alternate-designs/
+#: (content/alternate-designs/contents+en.lrtopic.title)
+msgid "Alternate Designs We Don't Do (Yet)"
+msgstr ""
+
#: https//support.torproject.org/glossary/add-on-extension-or-plugin/
#: (content/glossary/add-on-extension-or-plugin/contents+en.lrword.term)
msgid "add-on, extension, or plugin"
@@ -2554,6 +2559,61 @@ msgstr ""
"Możesz znaleÅºÄ bardziej szczegóÅowe informacje jak używaÄ Tor + VPN na "
"[naszej wiki](https://trac.torproject.org/projects/tor/wiki/doc/TorPlusVPN)."
+#: https//support.torproject.org/faq/relay-donations/
+#: (content/faq/relay-donations/contents+en.lrquestion.title)
+msgid "Can I donate for a relay rather than run my own?"
+msgstr ""
+
+#: https//support.torproject.org/faq/relay-donations/
+#: (content/faq/relay-donations/contents+en.lrquestion.description)
+msgid ""
+"Sure! We have a [list of organizations that run Tor "
+"relays](https://community.torproject.org/relay/community-resources/relay-"
+"associations/) that are happy to turn your donations into better speed and "
+"anonymity for the Tor network."
+msgstr ""
+
+#: https//support.torproject.org/faq/relay-donations/
+#: (content/faq/relay-donations/contents+en.lrquestion.description)
+msgid ""
+"These organizations are not the same as [The Tor Project, "
+"Inc](https://donate.torproject.org/), but we consider that a good thing."
+msgstr ""
+
+#: https//support.torproject.org/faq/relay-donations/
+#: (content/faq/relay-donations/contents+en.lrquestion.description)
+msgid "They're run by nice people who are part of the Tor community."
+msgstr ""
+
+#: https//support.torproject.org/faq/relay-donations/
+#: (content/faq/relay-donations/contents+en.lrquestion.description)
+msgid ""
+"Note that there can be a tradeoff here between anonymity and performance."
+msgstr ""
+
+#: https//support.torproject.org/faq/relay-donations/
+#: (content/faq/relay-donations/contents+en.lrquestion.description)
+msgid ""
+"The Tor network's anonymity comes in part from diversity, so if you are in a"
+" position to run your own relay, you will be improving Tor's anonymity more "
+"than by donating."
+msgstr ""
+
+#: https//support.torproject.org/faq/relay-donations/
+#: (content/faq/relay-donations/contents+en.lrquestion.description)
+msgid ""
+"At the same time though, economies of scale for bandwidth mean that "
+"combining many small donations into several larger relays is more efficient "
+"at improving network performance."
+msgstr ""
+
+#: https//support.torproject.org/faq/relay-donations/
+#: (content/faq/relay-donations/contents+en.lrquestion.description)
+msgid ""
+"Improving anonymity and improving performance are both worthwhile goals, so "
+"however you can help is great!"
+msgstr ""
+
#: https//support.torproject.org/faq/staying-anonymous/
#: (content/faq/staying-anonymous/contents+en.lrquestion.title)
msgid "Am I totally anonymous if I use Tor?"
@@ -2934,6 +2994,61 @@ msgstr ""
"[identyfikowaniu i dokumentowaniu wszystkich "
"problemów](https://community.torproject.org/)."
+#: https//support.torproject.org/about/attacks-on-onion-routing/
+#: (content/about/attacks-on-onion-routing/contents+en.lrquestion.title)
+msgid "What attacks remain against onion routing?"
+msgstr ""
+
+#: https//support.torproject.org/about/attacks-on-onion-routing/
+#: (content/about/attacks-on-onion-routing/contents+en.lrquestion.description)
+msgid ""
+"As mentioned above, it is possible for an observer who can view both you and"
+" either the destination website or your Tor exit node to correlate timings "
+"of your traffic as it enters the Tor network and also as it exits."
+msgstr ""
+
+#: https//support.torproject.org/about/attacks-on-onion-routing/
+#: (content/about/attacks-on-onion-routing/contents+en.lrquestion.description)
+msgid "Tor does not defend against such a threat model."
+msgstr ""
+
+#: https//support.torproject.org/about/attacks-on-onion-routing/
+#: (content/about/attacks-on-onion-routing/contents+en.lrquestion.description)
+msgid ""
+"In a more limited sense, note that if a censor or law enforcement agency has"
+" the ability to obtain specific observation of parts of the network, it is "
+"possible for them to verify a suspicion that you talk regularly to your "
+"friend by observing traffic at both ends and correlating the timing of only "
+"that traffic."
+msgstr ""
+
+#: https//support.torproject.org/about/attacks-on-onion-routing/
+#: (content/about/attacks-on-onion-routing/contents+en.lrquestion.description)
+msgid ""
+"Again, this is only useful to verify that parties already suspected of "
+"communicating with one another are doing so."
+msgstr ""
+
+#: https//support.torproject.org/about/attacks-on-onion-routing/
+#: (content/about/attacks-on-onion-routing/contents+en.lrquestion.description)
+msgid ""
+"In most countries, the suspicion required to obtain a warrant already "
+"carries more weight than timing correlation would provide."
+msgstr ""
+
+#: https//support.torproject.org/about/attacks-on-onion-routing/
+#: (content/about/attacks-on-onion-routing/contents+en.lrquestion.description)
+msgid ""
+"Furthermore, since Tor reuses circuits for multiple TCP connections, it is "
+"possible to associate non anonymous and anonymous traffic at a given exit "
+"node, so be careful about what applications you run concurrently over Tor."
+msgstr ""
+
+#: https//support.torproject.org/about/attacks-on-onion-routing/
+#: (content/about/attacks-on-onion-routing/contents+en.lrquestion.description)
+msgid "Perhaps even run separate Tor clients for these applications."
+msgstr ""
+
#: https//support.torproject.org/about/backdoor/
#: (content/about/backdoor/contents+en.lrquestion.title)
msgid "Is there a backdoor in Tor?"
@@ -3104,6 +3219,43 @@ msgstr ""
"Używanie Tora wraz z innymi przeglÄ
darkami jest [niebezpiecznie i "
"nierekomendowane](/tbb/tbb-9/)."
+#: https//support.torproject.org/about/change-paths/
+#: (content/about/change-paths/contents+en.lrquestion.title)
+msgid "How often does Tor change its paths?"
+msgstr ""
+
+#: https//support.torproject.org/about/change-paths/
+#: (content/about/change-paths/contents+en.lrquestion.description)
+msgid ""
+"Tor will reuse the same circuit for new TCP streams for 10 minutes, as long "
+"as the circuit is working fine."
+msgstr ""
+
+#: https//support.torproject.org/about/change-paths/
+#: (content/about/change-paths/contents+en.lrquestion.description)
+msgid "(If the circuit fails, Tor will switch to a new circuit immediately.)"
+msgstr ""
+
+#: https//support.torproject.org/about/change-paths/
+#: (content/about/change-paths/contents+en.lrquestion.description)
+msgid ""
+"But note that a single TCP stream (e.g. a long IRC connection) will stay on "
+"the same circuit forever."
+msgstr ""
+
+#: https//support.torproject.org/about/change-paths/
+#: (content/about/change-paths/contents+en.lrquestion.description)
+msgid "We don't rotate individual streams from one circuit to the next."
+msgstr ""
+
+#: https//support.torproject.org/about/change-paths/
+#: (content/about/change-paths/contents+en.lrquestion.description)
+msgid ""
+"Otherwise, an adversary with a partial view of the network would be given "
+"many chances over time to link you to your destination, rather than just one"
+" chance."
+msgstr ""
+
#: https//support.torproject.org/about/distribute-tor/
#: (content/about/distribute-tor/contents+en.lrquestion.title)
msgid "Can I distribute Tor?"
@@ -3222,6 +3374,133 @@ msgstr ""
"towarowych](https://www.torproject.org/about/trademark/), aby uzyskaÄ wiÄcej"
" szczegóÅów."
+#: https//support.torproject.org/about/entry-guards/
+#: (content/about/entry-guards/contents+en.lrquestion.title)
+msgid "What are Entry Guards?"
+msgstr ""
+
+#: https//support.torproject.org/about/entry-guards/
+#: (content/about/entry-guards/contents+en.lrquestion.description)
+msgid ""
+"Tor (like all current practical low-latency anonymity designs) fails when "
+"the attacker can see both ends of the communications channel."
+msgstr ""
+
+#: https//support.torproject.org/about/entry-guards/
+#: (content/about/entry-guards/contents+en.lrquestion.description)
+msgid ""
+"For example, suppose the attacker controls or watches the Tor relay you "
+"choose to enter the network, and also controls or watches the website you "
+"visit."
+msgstr ""
+
+#: https//support.torproject.org/about/entry-guards/
+#: (content/about/entry-guards/contents+en.lrquestion.description)
+msgid ""
+"In this case, the research community knows no practical low-latency design "
+"that can reliably stop the attacker from correlating volume and timing "
+"information on the two sides."
+msgstr ""
+
+#: https//support.torproject.org/about/entry-guards/
+#: (content/about/entry-guards/contents+en.lrquestion.description)
+msgid "So, what should we do?"
+msgstr ""
+
+#: https//support.torproject.org/about/entry-guards/
+#: (content/about/entry-guards/contents+en.lrquestion.description)
+msgid "Suppose the attacker controls, or can observe, C relays."
+msgstr ""
+
+#: https//support.torproject.org/about/entry-guards/
+#: (content/about/entry-guards/contents+en.lrquestion.description)
+msgid "Suppose there are N relays total."
+msgstr ""
+
+#: https//support.torproject.org/about/entry-guards/
+#: (content/about/entry-guards/contents+en.lrquestion.description)
+msgid ""
+"If you select new entry and exit relays each time you use the network, the "
+"attacker will be able to correlate all traffic you send with probability "
+"around (c/n)2."
+msgstr ""
+
+#: https//support.torproject.org/about/entry-guards/
+#: (content/about/entry-guards/contents+en.lrquestion.description)
+msgid ""
+"But profiling is, for most users, as bad as being traced all the time: they "
+"want to do something often without an attacker noticing, and the attacker "
+"noticing once is as bad as the attacker noticing more often."
+msgstr ""
+
+#: https//support.torproject.org/about/entry-guards/
+#: (content/about/entry-guards/contents+en.lrquestion.description)
+msgid ""
+"Thus, choosing many random entries and exits gives the user no chance of "
+"escaping profiling by this kind of attacker."
+msgstr ""
+
+#: https//support.torproject.org/about/entry-guards/
+#: (content/about/entry-guards/contents+en.lrquestion.description)
+msgid ""
+"The solution is \"entry guards\": each Tor client selects a few relays at "
+"random to use as entry points, and uses only those relays for their first "
+"hop."
+msgstr ""
+
+#: https//support.torproject.org/about/entry-guards/
+#: (content/about/entry-guards/contents+en.lrquestion.description)
+msgid ""
+"If those relays are not controlled or observed, the attacker can't win, "
+"ever, and the user is secure."
+msgstr ""
+
+#: https//support.torproject.org/about/entry-guards/
+#: (content/about/entry-guards/contents+en.lrquestion.description)
+msgid ""
+"If those relays are observed or controlled by the attacker, the attacker "
+"sees a larger fraction of the user's traffic - but still the user is no more"
+" profiled than before."
+msgstr ""
+
+#: https//support.torproject.org/about/entry-guards/
+#: (content/about/entry-guards/contents+en.lrquestion.description)
+msgid ""
+"Thus, the user has some chance (on the order of (n-c)/n) of avoiding "
+"profiling, whereas they had none before."
+msgstr ""
+
+#: https//support.torproject.org/about/entry-guards/
+#: (content/about/entry-guards/contents+en.lrquestion.description)
+msgid ""
+"You can read more at [An Analysis of the Degradation of Anonymous "
+"Protocols](http://freehaven.net/anonbib/#wright02), [Defending Anonymous "
+"Communication Against Passive Logging "
+"Attacks](http://freehaven.net/anonbib/#wright03), and especially [Locating "
+"Hidden Servers](http://freehaven.net/anonbib/#hs-attack06)."
+msgstr ""
+
+#: https//support.torproject.org/about/entry-guards/
+#: (content/about/entry-guards/contents+en.lrquestion.description)
+msgid ""
+"Restricting your entry nodes may also help against attackers who want to run"
+" a few Tor nodes and easily enumerate all of the Tor user IP addresses."
+msgstr ""
+
+#: https//support.torproject.org/about/entry-guards/
+#: (content/about/entry-guards/contents+en.lrquestion.description)
+msgid ""
+"(Even though they can't learn what destinations the users are talking to, "
+"they still might be able to do bad things with just a list of users.)"
+msgstr ""
+
+#: https//support.torproject.org/about/entry-guards/
+#: (content/about/entry-guards/contents+en.lrquestion.description)
+msgid ""
+"However, that feature won't really become useful until we move to a "
+"\"directory guard\" design as well."
+msgstr ""
+
#: https//support.torproject.org/about/how-is-tor-different-from-other-proxies/
#: (content/about/how-is-tor-different-from-other-proxies/contents+en.lrquestion.title)
msgid "How is Tor different from other proxies?"
@@ -3424,6 +3703,162 @@ msgstr ""
"Zobacz wizualizacjÄ [Tora wraz z HTTPS](/https/https-1/), aby zrozumieÄ jak "
"Tor zachowuje siÄ z HTTPS."
+#: https//support.torproject.org/about/key-management/
+#: (content/about/key-management/contents+en.lrquestion.title)
+msgid "Tell me about all the keys Tor uses"
+msgstr ""
+
+#: https//support.torproject.org/about/key-management/
+#: (content/about/key-management/contents+en.lrquestion.description)
+msgid ""
+"Tor uses a variety of different keys, with three goals in mind: 1) "
+"encryption to ensure privacy of data within the Tor network, 2) "
+"authentication so clients know they're talking to the relays they meant to "
+"talk to, and 3) signatures to make sure all clients know the same set of "
+"relays."
+msgstr ""
+
+#: https//support.torproject.org/about/key-management/
+#: (content/about/key-management/contents+en.lrquestion.description)
+msgid ""
+"**Encryption**: first, all connections in Tor use TLS link encryption, so "
+"observers can't look inside to see which circuit a given cell is intended "
+"for."
+msgstr ""
+
+#: https//support.torproject.org/about/key-management/
+#: (content/about/key-management/contents+en.lrquestion.description)
+msgid ""
+"Further, the Tor client establishes an ephemeral encryption key with each "
+"relay in the circuit; these extra layers of encryption mean that only the "
+"exit relay can read the cells."
+msgstr ""
+
+#: https//support.torproject.org/about/key-management/
+#: (content/about/key-management/contents+en.lrquestion.description)
+msgid ""
+"Both sides discard the circuit key when the circuit ends, so logging traffic"
+" and then breaking into the relay to discover the key won't work."
+msgstr ""
+
+#: https//support.torproject.org/about/key-management/
+#: (content/about/key-management/contents+en.lrquestion.description)
+msgid ""
+"**Authentication**: Every Tor relay has a public decryption key called the "
+"\"onion key\"."
+msgstr ""
+
+#: https//support.torproject.org/about/key-management/
+#: (content/about/key-management/contents+en.lrquestion.description)
+msgid "Each relay rotates its onion key once a week."
+msgstr ""
+
+#: https//support.torproject.org/about/key-management/
+#: (content/about/key-management/contents+en.lrquestion.description)
+msgid ""
+"When the Tor client establishes circuits, at each step it [demands that the "
+"Tor relay prove knowledge of its onion key](https://svn-"
+"archive.torproject.org/svn/projects/design-paper/tor-"
+"design.html#subsec:circuits)."
+msgstr ""
+
+#: https//support.torproject.org/about/key-management/
+#: (content/about/key-management/contents+en.lrquestion.description)
+msgid ""
+"That way the first node in the path can't just spoof the rest of the path."
+msgstr ""
+
+#: https//support.torproject.org/about/key-management/
+#: (content/about/key-management/contents+en.lrquestion.description)
+msgid ""
+"Because the Tor client chooses the path, it can make sure to get Tor's "
+"\"distributed trust\" property: no single relay in the path can know about "
+"both the client and what the client is doing."
+msgstr ""
+
+#: https//support.torproject.org/about/key-management/
+#: (content/about/key-management/contents+en.lrquestion.description)
+msgid ""
+"**Coordination**: How do clients know what the relays are, and how do they "
+"know that they have the right keys for them?"
+msgstr ""
+
+#: https//support.torproject.org/about/key-management/
+#: (content/about/key-management/contents+en.lrquestion.description)
+msgid "Each relay has a long-term public signing key called the \"identity key\"."
+msgstr ""
+
+#: https//support.torproject.org/about/key-management/
+#: (content/about/key-management/contents+en.lrquestion.description)
+msgid "Each directory authority additionally has a \"directory signing key\"."
+msgstr ""
+
+#: https//support.torproject.org/about/key-management/
+#: (content/about/key-management/contents+en.lrquestion.description)
+msgid ""
+"The directory authorities [provide a signed "
+"list](https://gitweb.torproject.org/torspec.git/tree/dir-spec.txt) of all "
+"the known relays, and in that list are a set of certificates from each relay"
+" (self-signed by their identity key) specifying their keys, locations, exit "
+"policies, and so on."
+msgstr ""
+
+#: https//support.torproject.org/about/key-management/
+#: (content/about/key-management/contents+en.lrquestion.description)
+msgid ""
+"So unless the adversary can control a majority of the directory authorities "
+"(as of 2021 there are 10 directory authorities), they can't trick the Tor "
+"client into using other Tor relays."
+msgstr ""
+
+#: https//support.torproject.org/about/key-management/
+#: (content/about/key-management/contents+en.lrquestion.description)
+msgid "How do clients know what the directory authorities are?"
+msgstr ""
+
+#: https//support.torproject.org/about/key-management/
+#: (content/about/key-management/contents+en.lrquestion.description)
+msgid ""
+"The Tor software comes with a built-in list of location and public key for "
+"each directory authority."
+msgstr ""
+
+#: https//support.torproject.org/about/key-management/
+#: (content/about/key-management/contents+en.lrquestion.description)
+msgid ""
+"So the only way to trick users into using a fake Tor network is to give them"
+" a specially modified version of the software."
+msgstr ""
+
+#: https//support.torproject.org/about/key-management/
+#: (content/about/key-management/contents+en.lrquestion.description)
+msgid "How do users know they've got the right software?"
+msgstr ""
+
+#: https//support.torproject.org/about/key-management/
+#: (content/about/key-management/contents+en.lrquestion.description)
+msgid ""
+"When we distribute the source code or a package, we digitally sign it with "
+"[GNU Privacy Guard](http://www.gnupg.org/). See the [instructions on how to "
+"check Tor Browser's signature](https://support.torproject.org/tbb/how-to-"
+"verify-signature/)."
+msgstr ""
+
+#: https//support.torproject.org/about/key-management/
+#: (content/about/key-management/contents+en.lrquestion.description)
+msgid ""
+"In order to be certain that it's really signed by us, you need to have met "
+"us in person and gotten a copy of our GPG key fingerprint, or you need to "
+"know somebody who has."
+msgstr ""
+
+#: https//support.torproject.org/about/key-management/
+#: (content/about/key-management/contents+en.lrquestion.description)
+msgid ""
+"If you're concerned about an attack on this level, we recommend you get "
+"involved with the security community and start meeting people."
+msgstr ""
+
#: https//support.torproject.org/about/no-data-scrubbing/
#: (content/about/no-data-scrubbing/contents+en.lrquestion.title)
msgid ""
@@ -3464,6 +3899,151 @@ msgstr ""
"PrzeglÄ
darka Tor nie może zrobiÄ nic odnoÅnie tekstu który wpisujesz w "
"formularze internetowe."
+#: https//support.torproject.org/about/protections/
+#: (content/about/protections/contents+en.lrquestion.title)
+msgid "What protections does Tor provide?"
+msgstr ""
+
+#: https//support.torproject.org/about/protections/
+#: (content/about/protections/contents+en.lrquestion.description)
+msgid ""
+"Internet communication is based on a store-and-forward model that can be "
+"understood in analogy to postal mail: Data is transmitted in blocks called "
+"IP datagrams or packets."
+msgstr ""
+
+#: https//support.torproject.org/about/protections/
+#: (content/about/protections/contents+en.lrquestion.description)
+msgid ""
+"Every packet includes a source IP address (of the sender) and a destination "
+"IP address (of the receiver), just as ordinary letters contain postal "
+"addresses of sender and receiver."
+msgstr ""
+
+#: https//support.torproject.org/about/protections/
+#: (content/about/protections/contents+en.lrquestion.description)
+msgid ""
+"The way from sender to receiver involves multiple hops of routers, where "
+"each router inspects the destination IP address and forwards the packet "
+"closer to its destination."
+msgstr ""
+
+#: https//support.torproject.org/about/protections/
+#: (content/about/protections/contents+en.lrquestion.description)
+msgid ""
+"Thus, every router between sender and receiver learns that the sender is "
+"communicating with the receiver."
+msgstr ""
+
+#: https//support.torproject.org/about/protections/
+#: (content/about/protections/contents+en.lrquestion.description)
+msgid ""
+"In particular, your local ISP is in the position to build a complete profile"
+" of your Internet usage."
+msgstr ""
+
+#: https//support.torproject.org/about/protections/
+#: (content/about/protections/contents+en.lrquestion.description)
+msgid ""
+"In addition, every server in the Internet that can see any of the packets "
+"can profile your behavior."
+msgstr ""
+
+#: https//support.torproject.org/about/protections/
+#: (content/about/protections/contents+en.lrquestion.description)
+msgid ""
+"The aim of Tor is to improve your privacy by sending your traffic through a "
+"series of proxies."
+msgstr ""
+
+#: https//support.torproject.org/about/protections/
+#: (content/about/protections/contents+en.lrquestion.description)
+msgid ""
+"Your communication is encrypted in multiple layers and routed via multiple "
+"hops through the Tor network to the final receiver."
+msgstr ""
+
+#: https//support.torproject.org/about/protections/
+#: (content/about/protections/contents+en.lrquestion.description)
+msgid ""
+"More details on this process can be found in this "
+"[visualization](https://support.torproject.org/https/https-1/)."
+msgstr ""
+
+#: https//support.torproject.org/about/protections/
+#: (content/about/protections/contents+en.lrquestion.description)
+msgid ""
+"Note that all your local ISP can observe now is that you are communicating "
+"with Tor nodes."
+msgstr ""
+
+#: https//support.torproject.org/about/protections/
+#: (content/about/protections/contents+en.lrquestion.description)
+msgid ""
+"Similarly, servers in the Internet just see that they are being contacted by"
+" Tor nodes."
+msgstr ""
+
+#: https//support.torproject.org/about/protections/
+#: (content/about/protections/contents+en.lrquestion.description)
+msgid "Generally speaking, Tor aims to solve three privacy problems:"
+msgstr ""
+
+#: https//support.torproject.org/about/protections/
+#: (content/about/protections/contents+en.lrquestion.description)
+msgid ""
+"First, Tor prevents websites and other services from learning your location,"
+" which they can use to build databases about your habits and interests."
+msgstr ""
+
+#: https//support.torproject.org/about/protections/
+#: (content/about/protections/contents+en.lrquestion.description)
+msgid ""
+"With Tor, your Internet connections don't give you away by default -- now "
+"you can have the ability to choose, for each connection, how much "
+"information to reveal."
+msgstr ""
+
+#: https//support.torproject.org/about/protections/
+#: (content/about/protections/contents+en.lrquestion.description)
+msgid ""
+"Second, Tor prevents people watching your traffic locally (such as your ISP "
+"or someone with access to your home wifi or router) from learning what "
+"information you're fetching and where you're fetching it from."
+msgstr ""
+
+#: https//support.torproject.org/about/protections/
+#: (content/about/protections/contents+en.lrquestion.description)
+msgid ""
+"It also stops them from deciding what you're allowed to learn and publish --"
+" if you can get to any part of the Tor network, you can reach any site on "
+"the Internet."
+msgstr ""
+
+#: https//support.torproject.org/about/protections/
+#: (content/about/protections/contents+en.lrquestion.description)
+msgid ""
+"Third, Tor routes your connection through more than one Tor relay so no "
+"single relay can learn what you're up to."
+msgstr ""
+
+#: https//support.torproject.org/about/protections/
+#: (content/about/protections/contents+en.lrquestion.description)
+msgid ""
+"Because these relays are run by different individuals or organizations, "
+"distributing trust provides more security than the old [one hop "
+"proxy](https://support.torproject.org/about/#how-is-tor-different-from-"
+"other-proxies) approach."
+msgstr ""
+
+#: https//support.torproject.org/about/protections/
+#: (content/about/protections/contents+en.lrquestion.description)
+msgid ""
+"Note, however, that there are situations where Tor fails to solve these "
+"privacy problems entirely: see the entry below on [remaining "
+"attacks](https://support.torproject.org/about/#attacks-on-onion-routing)."
+msgstr ""
+
#: https//support.torproject.org/about/what-is-tor/
#: (content/about/what-is-tor/contents+en.lrquestion.title)
msgid "What is Tor?"
@@ -6222,14 +6802,12 @@ msgstr ""
#: (content/tbb/tbb-47/contents+en.lrquestion.description)
msgid ""
"Also, read up on the HTTPProxyAuthenticator and HTTPSProxyAuthenticator "
-"options if your proxy requires auth. We only support basic auth currently, "
-"but if you need NTLM authentication, you may find [this post in the "
-"archives](https://archives.seul.org/or/talk/Jun-2005/msg00223.html) useful."
+"options if your [proxy requires auth.](https://developer.mozilla.org/en-"
+"US/docs/Web/HTTP/Headers/Proxy-Authenticate) We only support basic auth "
+"currently, but if you need NTLM authentication, you may find [this post in "
+"the archives](https://archives.seul.org/or/talk/Jun-2005/msg00223.html) "
+"useful."
msgstr ""
-"Sprawdź również czy opcje HTTPProxyAuthenticator oraz "
-"HTTPSProxyAuthenticator wymagajÄ
autoryzacji. Wspieramy jedynie podstawowe "
-"metody autoryzacji, jeÅli potrzebujesz autoryzacji NTLM, sprawdź [ten post w"
-" archiwum](https://archives.seul.org/or/talk/Jun-2005/msg00223.html)."
#: https//support.torproject.org/tbb/tbb-47/
#: (content/tbb/tbb-47/contents+en.lrquestion.description)
@@ -6509,6 +7087,219 @@ msgstr ""
"PamiÄtaj, wszystkie linie zaczynajÄ
ce siÄ znakiem '#' w torrc sÄ
traktowane "
"jako komentarz, i nie majÄ
wpÅywu na konfiguracjÄ Tora."
+#: https//support.torproject.org/tbb/tbb-firewall-ports/
+#: (content/tbb/tbb-firewall-ports/contents+en.lrquestion.title)
+msgid "My firewall only allows a few outgoing ports"
+msgstr ""
+
+#: https//support.torproject.org/tbb/tbb-firewall-ports/
+#: (content/tbb/tbb-firewall-ports/contents+en.lrquestion.description)
+msgid ""
+"If your firewall works by blocking ports, then you can tell Tor to only use "
+"the ports when you start your Tor Browser."
+msgstr ""
+
+#: https//support.torproject.org/tbb/tbb-firewall-ports/
+#: (content/tbb/tbb-firewall-ports/contents+en.lrquestion.description)
+msgid ""
+"Or you can add the ports that your firewall permits by adding "
+"\"FascistFirewall 1\" to your torrc configuration file."
+msgstr ""
+
+#: https//support.torproject.org/tbb/tbb-firewall-ports/
+#: (content/tbb/tbb-firewall-ports/contents+en.lrquestion.description)
+msgid ""
+"By default, when you set this Tor assumes that your firewall allows only "
+"port 80 and port 443 (HTTP and HTTPS respectively)."
+msgstr ""
+
+#: https//support.torproject.org/tbb/tbb-firewall-ports/
+#: (content/tbb/tbb-firewall-ports/contents+en.lrquestion.description)
+msgid ""
+"You can select a different set of ports with the FirewallPorts torrc option."
+msgstr ""
+
+#: https//support.torproject.org/tbb/tbb-firewall-ports/
+#: (content/tbb/tbb-firewall-ports/contents+en.lrquestion.description)
+msgid ""
+"If you want to be more fine-grained with your controls, you can also use the"
+" ReachableAddresses config options, e.g.:"
+msgstr ""
+
+#: https//support.torproject.org/tbb/tbb-firewall-ports/
+#: (content/tbb/tbb-firewall-ports/contents+en.lrquestion.description)
+#: https//support.torproject.org/tbb/tbb-install-tor-central-server/
+#: (content/tbb/tbb-install-tor-central-server/contents+en.lrquestion.description)
+#: https//support.torproject.org/operators/default-exit-ports/
+#: (content/operators/default-exit-ports/contents+en.lrquestion.description)
+#: https//support.torproject.org/operators/hibernation/
+#: (content/operators/hibernation/contents+en.lrquestion.description)
+#: https//support.torproject.org/operators/limit-total-bandwidth/
+#: (content/operators/limit-total-bandwidth/contents+en.lrquestion.description)
+#: https//support.torproject.org/misc/bug-or-feedback/
+#: (content/misc/bug-or-feedback/contents+en.lrquestion.description)
+#: https//support.torproject.org/get-in-touch/why-i-cant-join-tor-channels/
+#: (content/get-in-touch/why-i-cant-join-tor-channels/contents+en.lrquestion.description)
+#: https//support.torproject.org/apt/tor-deb-repo/
+#: (content/apt/apt-1/contents+en.lrquestion.description)
+#: https//support.torproject.org/apt/apt-over-tor/
+#: (content/apt/apt-3/contents+en.lrquestion.description)
+msgid "```"
+msgstr "```"
+
+#: https//support.torproject.org/tbb/tbb-firewall-ports/
+#: (content/tbb/tbb-firewall-ports/contents+en.lrquestion.description)
+msgid "ReachableDirAddresses *:80"
+msgstr ""
+
+#: https//support.torproject.org/tbb/tbb-firewall-ports/
+#: (content/tbb/tbb-firewall-ports/contents+en.lrquestion.description)
+msgid "ReachableORAddresses *:443"
+msgstr ""
+
+#: https//support.torproject.org/tbb/tbb-install-tor-central-server/
+#: (content/tbb/tbb-install-tor-central-server/contents+en.lrquestion.title)
+msgid ""
+"Can I install Tor on a central server, and have my clients connect to it?"
+msgstr ""
+
+#: https//support.torproject.org/tbb/tbb-install-tor-central-server/
+#: (content/tbb/tbb-install-tor-central-server/contents+en.lrquestion.description)
+msgid ""
+"Yes. Tor can be configured as a client or a relay on another machine, and "
+"allow other machines to be able to connect to it for anonymity."
+msgstr ""
+
+#: https//support.torproject.org/tbb/tbb-install-tor-central-server/
+#: (content/tbb/tbb-install-tor-central-server/contents+en.lrquestion.description)
+msgid ""
+"This is most useful in an environment where many computers want a gateway of"
+" anonymity to the rest of the world."
+msgstr ""
+
+#: https//support.torproject.org/tbb/tbb-install-tor-central-server/
+#: (content/tbb/tbb-install-tor-central-server/contents+en.lrquestion.description)
+msgid ""
+"However, be forewarned that with this configuration, anyone within your "
+"private network (existing between you and the Tor client/relay) can see what"
+" traffic you are sending in clear text."
+msgstr ""
+
+#: https//support.torproject.org/tbb/tbb-install-tor-central-server/
+#: (content/tbb/tbb-install-tor-central-server/contents+en.lrquestion.description)
+msgid "The anonymity doesn't start until you get to the Tor relay."
+msgstr ""
+
+#: https//support.torproject.org/tbb/tbb-install-tor-central-server/
+#: (content/tbb/tbb-install-tor-central-server/contents+en.lrquestion.description)
+msgid ""
+"Because of this, if you are the controller of your domain and you know "
+"everything's locked down, you will be OK, but this configuration may not be "
+"suitable for large private networks where security is key all around."
+msgstr ""
+
+#: https//support.torproject.org/tbb/tbb-install-tor-central-server/
+#: (content/tbb/tbb-install-tor-central-server/contents+en.lrquestion.description)
+msgid ""
+"Configuration is simple, editing your torrc file's SocksListenAddress "
+"according to the following examples:"
+msgstr ""
+
+#: https//support.torproject.org/tbb/tbb-install-tor-central-server/
+#: (content/tbb/tbb-install-tor-central-server/contents+en.lrquestion.description)
+msgid "SocksListenAddress 127.0.0.1"
+msgstr ""
+
+#: https//support.torproject.org/tbb/tbb-install-tor-central-server/
+#: (content/tbb/tbb-install-tor-central-server/contents+en.lrquestion.description)
+msgid "SocksListenAddress 192.168.x.x:9100"
+msgstr ""
+
+#: https//support.torproject.org/tbb/tbb-install-tor-central-server/
+#: (content/tbb/tbb-install-tor-central-server/contents+en.lrquestion.description)
+msgid "SocksListenAddress 0.0.0.0:9100"
+msgstr ""
+
+#: https//support.torproject.org/tbb/tbb-install-tor-central-server/
+#: (content/tbb/tbb-install-tor-central-server/contents+en.lrquestion.description)
+msgid ""
+"You can state multiple listen addresses, in the case that you are part of "
+"several networks or subnets."
+msgstr ""
+
+#: https//support.torproject.org/tbb/tbb-install-tor-central-server/
+#: (content/tbb/tbb-install-tor-central-server/contents+en.lrquestion.description)
+msgid "SocksListenAddress 192.168.x.x:9100 #eth0"
+msgstr ""
+
+#: https//support.torproject.org/tbb/tbb-install-tor-central-server/
+#: (content/tbb/tbb-install-tor-central-server/contents+en.lrquestion.description)
+msgid "SocksListenAddress 10.x.x.x:9100 #eth1"
+msgstr ""
+
+#: https//support.torproject.org/tbb/tbb-install-tor-central-server/
+#: (content/tbb/tbb-install-tor-central-server/contents+en.lrquestion.description)
+msgid ""
+"After this, your clients on their respective networks/subnets would specify "
+"a socks proxy with the address and port you specified SocksListenAddress to "
+"be."
+msgstr ""
+
+#: https//support.torproject.org/tbb/tbb-install-tor-central-server/
+#: (content/tbb/tbb-install-tor-central-server/contents+en.lrquestion.description)
+msgid ""
+"Please note that the SocksPort configuration option gives the port ONLY for "
+"localhost (127.0.0.1)."
+msgstr ""
+
+#: https//support.torproject.org/tbb/tbb-install-tor-central-server/
+#: (content/tbb/tbb-install-tor-central-server/contents+en.lrquestion.description)
+msgid ""
+"When setting up your SocksListenAddress(es), you need to give the port with "
+"the address, as shown above."
+msgstr ""
+
+#: https//support.torproject.org/tbb/tbb-install-tor-central-server/
+#: (content/tbb/tbb-install-tor-central-server/contents+en.lrquestion.description)
+msgid ""
+"If you are interested in forcing all outgoing data through the central Tor "
+"client/relay, instead of the server only being an optional proxy, you may "
+"find the program iptables (for *nix) useful."
+msgstr ""
+
+#: https//support.torproject.org/tbb/tbb-run-client-different-computer/
+#: (content/tbb/tbb-run-client-different-computer/contents+en.lrquestion.title)
+msgid ""
+"I want to run my Tor client on a different computer than my applications"
+msgstr ""
+
+#: https//support.torproject.org/tbb/tbb-run-client-different-computer/
+#: (content/tbb/tbb-run-client-different-computer/contents+en.lrquestion.description)
+msgid ""
+"By default, your Tor client only listens for applications that connect from "
+"localhost."
+msgstr ""
+
+#: https//support.torproject.org/tbb/tbb-run-client-different-computer/
+#: (content/tbb/tbb-run-client-different-computer/contents+en.lrquestion.description)
+msgid "Connections from other computers are refused."
+msgstr ""
+
+#: https//support.torproject.org/tbb/tbb-run-client-different-computer/
+#: (content/tbb/tbb-run-client-different-computer/contents+en.lrquestion.description)
+msgid ""
+"If you want to torify applications on different computers than the Tor "
+"client, you should edit your torrc to define `SocksListenAddress 0.0.0.0` "
+"and then restart (or hup) Tor."
+msgstr ""
+
+#: https//support.torproject.org/tbb/tbb-run-client-different-computer/
+#: (content/tbb/tbb-run-client-different-computer/contents+en.lrquestion.description)
+msgid ""
+"If you want to get more advanced, you can configure your Tor client on a "
+"firewall to bind to your internal IP but not your external IP."
+msgstr ""
+
#: https//support.torproject.org/tbb/website-blocking-tor/
#: (content/tbb/website-blocking-tor/contents+en.lrquestion.title)
msgid "A website I am trying to reach is blocking access over Tor."
@@ -8343,6 +9134,130 @@ msgid ""
"guide."
msgstr ""
+#: https//support.torproject.org/operators/default-exit-ports/
+#: (content/operators/default-exit-ports/contents+en.lrquestion.title)
+msgid "Is there a list of default exit ports?"
+msgstr ""
+
+#: https//support.torproject.org/operators/default-exit-ports/
+#: (content/operators/default-exit-ports/contents+en.lrquestion.description)
+msgid ""
+"The default open ports are listed below but keep in mind that, any port or "
+"ports can be opened by the relay operator by configuring it in torrc or "
+"modifying the source code."
+msgstr ""
+
+#: https//support.torproject.org/operators/default-exit-ports/
+#: (content/operators/default-exit-ports/contents+en.lrquestion.description)
+msgid ""
+"The default according to src/or/policies.c ([line 85][1] and [line 1901][2])"
+" from the source code release [release-0.4.6][3]:"
+msgstr ""
+
+#: https//support.torproject.org/operators/default-exit-ports/
+#: (content/operators/default-exit-ports/contents+en.lrquestion.description)
+msgid "reject 0.0.0.0/8"
+msgstr ""
+
+#: https//support.torproject.org/operators/default-exit-ports/
+#: (content/operators/default-exit-ports/contents+en.lrquestion.description)
+msgid "reject 169.254.0.0/16"
+msgstr ""
+
+#: https//support.torproject.org/operators/default-exit-ports/
+#: (content/operators/default-exit-ports/contents+en.lrquestion.description)
+msgid "reject 127.0.0.0/8"
+msgstr ""
+
+#: https//support.torproject.org/operators/default-exit-ports/
+#: (content/operators/default-exit-ports/contents+en.lrquestion.description)
+msgid "reject 192.168.0.0/16"
+msgstr ""
+
+#: https//support.torproject.org/operators/default-exit-ports/
+#: (content/operators/default-exit-ports/contents+en.lrquestion.description)
+msgid "reject 10.0.0.0/8"
+msgstr ""
+
+#: https//support.torproject.org/operators/default-exit-ports/
+#: (content/operators/default-exit-ports/contents+en.lrquestion.description)
+msgid "reject 172.16.0.0/12"
+msgstr ""
+
+#: https//support.torproject.org/operators/default-exit-ports/
+#: (content/operators/default-exit-ports/contents+en.lrquestion.description)
+msgid "reject *:25"
+msgstr ""
+
+#: https//support.torproject.org/operators/default-exit-ports/
+#: (content/operators/default-exit-ports/contents+en.lrquestion.description)
+msgid "reject *:119"
+msgstr ""
+
+#: https//support.torproject.org/operators/default-exit-ports/
+#: (content/operators/default-exit-ports/contents+en.lrquestion.description)
+msgid "reject *:135-139"
+msgstr ""
+
+#: https//support.torproject.org/operators/default-exit-ports/
+#: (content/operators/default-exit-ports/contents+en.lrquestion.description)
+msgid "reject *:445"
+msgstr ""
+
+#: https//support.torproject.org/operators/default-exit-ports/
+#: (content/operators/default-exit-ports/contents+en.lrquestion.description)
+msgid "reject *:563"
+msgstr ""
+
+#: https//support.torproject.org/operators/default-exit-ports/
+#: (content/operators/default-exit-ports/contents+en.lrquestion.description)
+msgid "reject *:1214"
+msgstr ""
+
+#: https//support.torproject.org/operators/default-exit-ports/
+#: (content/operators/default-exit-ports/contents+en.lrquestion.description)
+msgid "reject *:4661-4666"
+msgstr ""
+
+#: https//support.torproject.org/operators/default-exit-ports/
+#: (content/operators/default-exit-ports/contents+en.lrquestion.description)
+msgid "reject *:6346-6429"
+msgstr ""
+
+#: https//support.torproject.org/operators/default-exit-ports/
+#: (content/operators/default-exit-ports/contents+en.lrquestion.description)
+msgid "reject *:6699"
+msgstr ""
+
+#: https//support.torproject.org/operators/default-exit-ports/
+#: (content/operators/default-exit-ports/contents+en.lrquestion.description)
+msgid "reject *:6881-6999"
+msgstr ""
+
+#: https//support.torproject.org/operators/default-exit-ports/
+#: (content/operators/default-exit-ports/contents+en.lrquestion.description)
+msgid "accept *:*"
+msgstr ""
+
+#: https//support.torproject.org/operators/default-exit-ports/
+#: (content/operators/default-exit-ports/contents+en.lrquestion.description)
+msgid ""
+"[1]: "
+"https://gitlab.torproject.org/tpo/core/tor/-/blob/release-0.4.6/src/core/or/policies.c#L85"
+msgstr ""
+
+#: https//support.torproject.org/operators/default-exit-ports/
+#: (content/operators/default-exit-ports/contents+en.lrquestion.description)
+msgid ""
+"[2]: "
+"https://gitlab.torproject.org/tpo/core/tor/-/blob/release-0.4.6/src/core/or/policies.c#L1901"
+msgstr ""
+
+#: https//support.torproject.org/operators/default-exit-ports/
+#: (content/operators/default-exit-ports/contents+en.lrquestion.description)
+msgid "[3]: https://gitlab.torproject.org/tpo/core/tor/-/tree/release-0.4.6/"
+msgstr ""
+
#: https//support.torproject.org/operators/dynamic-ip/
#: (content/operators/dynamic-ip/contents+en.lrquestion.title)
msgid "Can I run a Tor relay using a dynamic IP address?"
@@ -8542,21 +9457,6 @@ msgstr ""
"tylko Tor przejdzie w stan hibernacji, zostanie to zasygnalizowane takim "
"wpisem w dzienniku zdarzeÅ:"
-#: https//support.torproject.org/operators/hibernation/
-#: (content/operators/hibernation/contents+en.lrquestion.description)
-#: https//support.torproject.org/operators/limit-total-bandwidth/
-#: (content/operators/limit-total-bandwidth/contents+en.lrquestion.description)
-#: https//support.torproject.org/misc/bug-or-feedback/
-#: (content/misc/bug-or-feedback/contents+en.lrquestion.description)
-#: https//support.torproject.org/get-in-touch/why-i-cant-join-tor-channels/
-#: (content/get-in-touch/why-i-cant-join-tor-channels/contents+en.lrquestion.description)
-#: https//support.torproject.org/apt/tor-deb-repo/
-#: (content/apt/apt-1/contents+en.lrquestion.description)
-#: https//support.torproject.org/apt/apt-over-tor/
-#: (content/apt/apt-3/contents+en.lrquestion.description)
-msgid "```"
-msgstr "```"
-
#: https//support.torproject.org/operators/hibernation/
#: (content/operators/hibernation/contents+en.lrquestion.description)
msgid "Bandwidth soft limit reached; commencing hibernation."
@@ -11376,6 +12276,131 @@ msgstr "uid tor-security at lists.torproject.org"
msgid "sub 4096R/C00942E4 2017-03-13"
msgstr "sub 4096R/C00942E4 2017-03-13"
+#: https//support.torproject.org/misc/check-socks-dns-leaks/
+#: (content/misc/check-socks-dns-leaks/contents+en.lrquestion.title)
+msgid ""
+"How do I check if my application that uses SOCKS is leaking DNS requests?"
+msgstr ""
+
+#: https//support.torproject.org/misc/check-socks-dns-leaks/
+#: (content/misc/check-socks-dns-leaks/contents+en.lrquestion.description)
+msgid ""
+"Even if your application is using the correct variant of the SOCKS protocol,"
+" there is still a risk that it could be leaking DNS queries."
+msgstr ""
+
+#: https//support.torproject.org/misc/check-socks-dns-leaks/
+#: (content/misc/check-socks-dns-leaks/contents+en.lrquestion.description)
+msgid ""
+"This problem happens in Firefox extensions that resolve the destination "
+"hostname themselves, for example to show you its IP address, what country "
+"it's in, etc."
+msgstr ""
+
+#: https//support.torproject.org/misc/check-socks-dns-leaks/
+#: (content/misc/check-socks-dns-leaks/contents+en.lrquestion.description)
+msgid ""
+"If you suspect your application might behave like this, follow the "
+"instructions below to check."
+msgstr ""
+
+#: https//support.torproject.org/misc/check-socks-dns-leaks/
+#: (content/misc/check-socks-dns-leaks/contents+en.lrquestion.description)
+msgid ""
+"1. Add `TestSocks 1` to your [torrc file](https://support.torproject.org/tbb"
+"/tbb-editing-torrc/)."
+msgstr ""
+
+#: https//support.torproject.org/misc/check-socks-dns-leaks/
+#: (content/misc/check-socks-dns-leaks/contents+en.lrquestion.description)
+msgid ""
+"1. Start Tor, and point your program's SOCKS proxy settings to Tor's SOCKS5 "
+"server (`socks5://127.0.0.1:9050` by default)."
+msgstr ""
+
+#: https//support.torproject.org/misc/check-socks-dns-leaks/
+#: (content/misc/check-socks-dns-leaks/contents+en.lrquestion.description)
+msgid ""
+"1. Watch your logs as you use your application. For each socks connection, "
+"Tor will log a `notice` for safe connections, and a `warn` for connections "
+"leaking DNS requests."
+msgstr ""
+
+#: https//support.torproject.org/misc/check-socks-dns-leaks/
+#: (content/misc/check-socks-dns-leaks/contents+en.lrquestion.description)
+msgid ""
+"If you want to automatically disable all connections leaking DNS requests, "
+"set `SafeSocks 1` in your torrc file."
+msgstr ""
+
+#: https//support.torproject.org/misc/hide-exits/
+#: (content/misc/hide-exits/contents+en.lrquestion.title)
+msgid ""
+"You should hide the list of Tor relays, so people can't block the exits."
+msgstr ""
+
+#: https//support.torproject.org/misc/hide-exits/
+#: (content/misc/hide-exits/contents+en.lrquestion.description)
+msgid "There are a few reasons we don't:"
+msgstr ""
+
+#: https//support.torproject.org/misc/hide-exits/
+#: (content/misc/hide-exits/contents+en.lrquestion.description)
+msgid ""
+"1. We can't help but make the information available, since Tor clients need "
+"to use it to pick their paths."
+msgstr ""
+
+#: https//support.torproject.org/misc/hide-exits/
+#: (content/misc/hide-exits/contents+en.lrquestion.description)
+msgid "So if the \"blockers\" want it, they can get it anyway."
+msgstr ""
+
+#: https//support.torproject.org/misc/hide-exits/
+#: (content/misc/hide-exits/contents+en.lrquestion.description)
+msgid ""
+"Further, even if we didn't tell clients about the list of relays directly, "
+"somebody could still make a lot of connections through Tor to a test site "
+"and build a list of the addresses they see."
+msgstr ""
+
+#: https//support.torproject.org/misc/hide-exits/
+#: (content/misc/hide-exits/contents+en.lrquestion.description)
+msgid ""
+"1. If people want to block us, we believe that they should be allowed to do "
+"so."
+msgstr ""
+
+#: https//support.torproject.org/misc/hide-exits/
+#: (content/misc/hide-exits/contents+en.lrquestion.description)
+msgid ""
+"Obviously, we would prefer for everybody to allow Tor users to connect to "
+"them, but people have the right to decide who their services should allow "
+"connections from, and if they want to block anonymous users, they can."
+msgstr ""
+
+#: https//support.torproject.org/misc/hide-exits/
+#: (content/misc/hide-exits/contents+en.lrquestion.description)
+msgid ""
+"1. Being blockable also has tactical advantages: it may be a persuasive "
+"response to website maintainers who feel threatened by Tor."
+msgstr ""
+
+#: https//support.torproject.org/misc/hide-exits/
+#: (content/misc/hide-exits/contents+en.lrquestion.description)
+msgid ""
+"Giving them the option may inspire them to stop and think about whether they"
+" really want to eliminate private access to their system, and if not, what "
+"other options they might have."
+msgstr ""
+
+#: https//support.torproject.org/misc/hide-exits/
+#: (content/misc/hide-exits/contents+en.lrquestion.description)
+msgid ""
+"The time they might otherwise have spent blocking Tor, they may instead "
+"spend rethinking their overall approach to privacy and anonymity."
+msgstr ""
+
#: https//support.torproject.org/misc/menu/
#: (content/misc/menu/contents+en.lrquestion.description)
msgid "About"
@@ -12099,68 +13124,21 @@ msgstr "### Jak zweryfikowaÄ nazwÄ użytkownika"
#: https//support.torproject.org/get-in-touch/why-i-cant-join-tor-channels/
#: (content/get-in-touch/why-i-cant-join-tor-channels/contents+en.lrquestion.description)
msgid ""
-"Then, to complete the registration and ultimately gain access to the #tor-"
-"project channel, your nickname must be **verified**."
+"After registering your nickname, to gain access to the #tor-project and "
+"other protected channels, your nickname must be **verified**."
msgstr ""
-"NastÄpnie, aby dokoÅczyÄ proces rejestracji i ostatecznie uzyskaÄ dostÄp do "
-"kanaÅu #tor-project, Twoja nazwa użytkownika musi byÄ **zweryfikowana**."
#: https//support.torproject.org/get-in-touch/why-i-cant-join-tor-channels/
#: (content/get-in-touch/why-i-cant-join-tor-channels/contents+en.lrquestion.description)
msgid ""
-"1. To verify your nick, open a new browser window and go to "
-"https://webchat.oftc.net/?channels=tor."
+"1. Go to https://services.oftc.net/ and follow the steps in the '*To verify "
+"your account*' section"
msgstr ""
-"1. Aby zweryfikowaÄ nazwÄ użytkownika, otwórz nowe okno przeglÄ
darki i "
-"przejdź do https://webchat.oftc.net/?channels=tor."
#: https//support.torproject.org/get-in-touch/why-i-cant-join-tor-channels/
#: (content/get-in-touch/why-i-cant-join-tor-channels/contents+en.lrquestion.description)
-msgid "2. Log in with your IRC nickname and password."
-msgstr "2. Zaloguj siÄ na IRC nazwÄ
użytkownika i hasÅem."
-
-#: https//support.torproject.org/get-in-touch/why-i-cant-join-tor-channels/
-#: (content/get-in-touch/why-i-cant-join-tor-channels/contents+en.lrquestion.description)
-msgid ""
-"3. Look for the word **verify** and log in there. It may appear that nothing"
-" has happened. Look at the top of the page, and there will be a column "
-"called **Account**."
+msgid "2. Go back to the IRC webpage where you are logged in and type:"
msgstr ""
-"3. Znajdź sÅowo **zweryfikuj (en: verify)**, i zaloguj siÄ. Może siÄ "
-"wydawaÄ, że nic siÄ nie staÅo. Sprawdź górÄ strony, powinna pojawiÄ siÄ "
-"kolumna o nazwie **Konto (en: Account)**."
-
-#: https//support.torproject.org/get-in-touch/why-i-cant-join-tor-channels/
-#: (content/get-in-touch/why-i-cant-join-tor-channels/contents+en.lrquestion.description)
-msgid "4. Click on **Account**."
-msgstr "4. Kliknij na **Konto (en: Account)**."
-
-#: https//support.torproject.org/get-in-touch/why-i-cant-join-tor-channels/
-#: (content/get-in-touch/why-i-cant-join-tor-channels/contents+en.lrquestion.description)
-msgid ""
-"5. Click on the small sentence at the bottom of the square that says: Verify"
-" account."
-msgstr ""
-"5. Kliknij na krótkie zdanie na dole kwadraciku, które mówi: Zweryfikuj "
-"konto (en: Verify account)."
-
-#: https//support.torproject.org/get-in-touch/why-i-cant-join-tor-channels/
-#: (content/get-in-touch/why-i-cant-join-tor-channels/contents+en.lrquestion.description)
-msgid "6. Fill out the Captcha that pops up, and click ok."
-msgstr "6. WypeÅnij Captcha które siÄ pojawi, i kliknij ok."
-
-#: https//support.torproject.org/get-in-touch/why-i-cant-join-tor-channels/
-#: (content/get-in-touch/why-i-cant-join-tor-channels/contents+en.lrquestion.description)
-msgid ""
-"7. A tiny message will appear: \"Your NickServ account has been verified.\""
-msgstr ""
-"7. Pojawi siÄ maÅa wiadomoÅÄ: \"Twoje konto NickServ zostaÅo zweryfikowane "
-"(en: Your NickServ account has been verified).\""
-
-#: https//support.torproject.org/get-in-touch/why-i-cant-join-tor-channels/
-#: (content/get-in-touch/why-i-cant-join-tor-channels/contents+en.lrquestion.description)
-msgid "8. Go back to the IRC webpage where you are logged in and type:"
-msgstr "8. WrÃ³Ä do strony IRC gdzie jesteÅ zalogowany i wpisz:"
#: https//support.torproject.org/get-in-touch/why-i-cant-join-tor-channels/
#: (content/get-in-touch/why-i-cant-join-tor-channels/contents+en.lrquestion.description)
@@ -12169,13 +13147,13 @@ msgstr "`/msg nickserv checkverify`"
#: https//support.torproject.org/get-in-touch/why-i-cant-join-tor-channels/
#: (content/get-in-touch/why-i-cant-join-tor-channels/contents+en.lrquestion.description)
-msgid "9. Click ENTER."
-msgstr "9. Kliknij ENTER."
+msgid "3. Click ENTER."
+msgstr ""
#: https//support.torproject.org/get-in-touch/why-i-cant-join-tor-channels/
#: (content/get-in-touch/why-i-cant-join-tor-channels/contents+en.lrquestion.description)
-msgid "10. If all is well, you will receive a message that says:"
-msgstr "10. JeÅli proces siÄ powiedzie, otrzymasz wiadomoÅÄ mówiÄ
cÄ
:"
+msgid "4. If all is well, you will receive a message that says:"
+msgstr ""
#: https//support.torproject.org/get-in-touch/why-i-cant-join-tor-channels/
#: (content/get-in-touch/why-i-cant-join-tor-channels/contents+en.lrquestion.description)
@@ -12339,21 +13317,23 @@ msgstr "# apt install apt-transport-https"
#: https//support.torproject.org/apt/tor-deb-repo/
#: (content/apt/apt-1/contents+en.lrquestion.description)
msgid ""
-"#### 2. Add the following entries to `/etc/apt/sources.list` or a new file "
-"in `/etc/apt/sources.list.d/`"
+"#### 2. Create a new file in `/etc/apt/sources.list.d/` named `tor.list`. "
+"Add the following entries:"
msgstr ""
-"#### 2. Dodaj nastÄpujÄ
ce wpisy do `/etc/apt/sources.list` lub w nowym pliku"
-" `/etc/apt/sources.list.d/`"
#: https//support.torproject.org/apt/tor-deb-repo/
#: (content/apt/apt-1/contents+en.lrquestion.description)
-msgid "deb https://deb.torproject.org/torproject.org <DISTRIBUTION> main"
-msgstr "deb https://deb.torproject.org/torproject.org <DISTRIBUTION> main"
+msgid ""
+"deb [signed-by=/usr/share/keyrings/tor-archive-keyring.gpg] "
+"https://deb.torproject.org/torproject.org <DISTRIBUTION> main"
+msgstr ""
#: https//support.torproject.org/apt/tor-deb-repo/
#: (content/apt/apt-1/contents+en.lrquestion.description)
-msgid "deb-src https://deb.torproject.org/torproject.org <DISTRIBUTION> main"
-msgstr "deb-src https://deb.torproject.org/torproject.org <DISTRIBUTION> main"
+msgid ""
+"deb-src [signed-by=/usr/share/keyrings/tor-archive-keyring.gpg] "
+"https://deb.torproject.org/torproject.org <DISTRIBUTION> main"
+msgstr ""
#: https//support.torproject.org/apt/tor-deb-repo/
#: (content/apt/apt-1/contents+en.lrquestion.description)
@@ -12369,20 +13349,18 @@ msgstr ""
#: https//support.torproject.org/apt/tor-deb-repo/
#: (content/apt/apt-1/contents+en.lrquestion.description)
msgid ""
-"deb https://deb.torproject.org/torproject.org tor-"
+"deb [signed-by=/usr/share/keyrings/tor-archive-keyring.gpg] "
+"https://deb.torproject.org/torproject.org tor-"
"experimental-0.4.6.x-<DISTRIBUTION> main"
msgstr ""
-"deb https://deb.torproject.org/torproject.org tor-"
-"experimental-0.4.6.x-<DISTRIBUTION> main"
#: https//support.torproject.org/apt/tor-deb-repo/
#: (content/apt/apt-1/contents+en.lrquestion.description)
msgid ""
-"deb-src https://deb.torproject.org/torproject.org tor-"
+"deb-src [signed-by=/usr/share/keyrings/tor-archive-keyring.gpg] "
+"https://deb.torproject.org/torproject.org tor-"
"experimental-0.4.6.x-<DISTRIBUTION> main"
msgstr ""
-"deb-src https://deb.torproject.org/torproject.org tor-"
-"experimental-0.4.6.x-<DISTRIBUTION> main"
#: https//support.torproject.org/apt/tor-deb-repo/
#: (content/apt/apt-1/contents+en.lrquestion.description)
@@ -12392,20 +13370,18 @@ msgstr "Lub wersje nightly:"
#: https//support.torproject.org/apt/tor-deb-repo/
#: (content/apt/apt-1/contents+en.lrquestion.description)
msgid ""
-"deb https://deb.torproject.org/torproject.org tor-nightly-"
-"master-<DISTRIBUTION> main"
+"deb [signed-by=/usr/share/keyrings/tor-archive-keyring.gpg] "
+"https://deb.torproject.org/torproject.org tor-nightly-master-<DISTRIBUTION> "
+"main"
msgstr ""
-"deb https://deb.torproject.org/torproject.org tor-nightly-"
-"master-<DISTRIBUTION> main"
#: https//support.torproject.org/apt/tor-deb-repo/
#: (content/apt/apt-1/contents+en.lrquestion.description)
msgid ""
-"deb-src https://deb.torproject.org/torproject.org tor-nightly-"
-"master-<DISTRIBUTION> main"
+"deb-src [signed-by=/usr/share/keyrings/tor-archive-keyring.gpg] "
+"https://deb.torproject.org/torproject.org tor-nightly-master-<DISTRIBUTION> "
+"main"
msgstr ""
-"deb-src https://deb.torproject.org/torproject.org tor-nightly-"
-"master-<DISTRIBUTION> main"
#: https//support.torproject.org/apt/tor-deb-repo/
#: (content/apt/apt-1/contents+en.lrquestion.description)
@@ -12429,16 +13405,16 @@ msgstr ""
#: https//support.torproject.org/apt/tor-deb-repo/
#: (content/apt/apt-1/contents+en.lrquestion.description)
msgid ""
-"deb [arch=amd64] https://deb.torproject.org/torproject.org focal main"
+"deb [arch=amd64 signed-by=/usr/share/keyrings/tor-archive-keyring.gpg] "
+"https://deb.torproject.org/torproject.org focal main"
msgstr ""
-"deb [arch=amd64] https://deb.torproject.org/torproject.org focal main"
#: https//support.torproject.org/apt/tor-deb-repo/
#: (content/apt/apt-1/contents+en.lrquestion.description)
msgid ""
-"deb-src [arch=amd64] https://deb.torproject.org/torproject.org focal main"
+"deb-src [arch=amd64 signed-by=/usr/share/keyrings/tor-archive-keyring.gpg] "
+"https://deb.torproject.org/torproject.org focal main"
msgstr ""
-"deb-src [arch=amd64] https://deb.torproject.org/torproject.org focal main"
#: https//support.torproject.org/apt/tor-deb-repo/
#: (content/apt/apt-1/contents+en.lrquestion.description)
@@ -12460,28 +13436,17 @@ msgstr ""
#: (content/apt/apt-1/contents+en.lrquestion.description)
msgid ""
"#### 3. Then add the gpg key used to sign the packages by running the "
-"following commands at your command prompt"
+"following command at your command prompt:"
msgstr ""
-"#### 3. NastÄpnie dodaj klucz gpg używany do podpisywania pakietów, wpisujÄ
c"
-" nastÄpujÄ
ce polecenia w terminalu:"
#: https//support.torproject.org/apt/tor-deb-repo/
#: (content/apt/apt-1/contents+en.lrquestion.description)
msgid ""
-"# wget -qO- "
+"# wget -O- "
"https://deb.torproject.org/torproject.org/A3C4F0F979CAA22CDBA8F512EE8CBC9E886DDD89.asc"
-" | gpg --import"
+" | gpg --dearmor | tee /usr/share/keyrings/tor-archive-keyring.gpg "
+">/dev/null"
msgstr ""
-"# wget -qO- "
-"https://deb.torproject.org/torproject.org/A3C4F0F979CAA22CDBA8F512EE8CBC9E886DDD89.asc"
-" | gpg --import"
-
-#: https//support.torproject.org/apt/tor-deb-repo/
-#: (content/apt/apt-1/contents+en.lrquestion.description)
-msgid ""
-"# gpg --export A3C4F0F979CAA22CDBA8F512EE8CBC9E886DDD89 | apt-key add -"
-msgstr ""
-"# gpg --export A3C4F0F979CAA22CDBA8F512EE8CBC9E886DDD89 | apt-key add -"
#: https//support.torproject.org/apt/tor-deb-repo/
#: (content/apt/apt-1/contents+en.lrquestion.description)
@@ -14515,6 +15480,82 @@ msgstr ""
"Nie, ponieważ ten użytkownik aktualizuje swojÄ
listÄ przekaźników tak "
"czÄsto, jak użytkownik, który nie zmienia adresu IP w ciÄ
gu dnia."
+#: https//support.torproject.org/alternate-designs/block-websites/
+#: (content/alternate-designs/block-websites/contents+en.lrquestion.title)
+msgid "Exit policies should be able to block websites, not just IP addresses."
+msgstr ""
+
+#: https//support.torproject.org/alternate-designs/block-websites/
+#: (content/alternate-designs/block-websites/contents+en.lrquestion.description)
+msgid ""
+"It would be nice to let relay operators say things like `reject "
+"www.slashdot.org` in their exit policies, rather than requiring them to "
+"learn all the IP address space that could be covered by the site (and then "
+"also blocking other sites at those IP addresses)."
+msgstr ""
+
+#: https//support.torproject.org/alternate-designs/block-websites/
+#: (content/alternate-designs/block-websites/contents+en.lrquestion.description)
+msgid "There are two problems, though."
+msgstr ""
+
+#: https//support.torproject.org/alternate-designs/block-websites/
+#: (content/alternate-designs/block-websites/contents+en.lrquestion.description)
+msgid "First, users could still get around these blocks."
+msgstr ""
+
+#: https//support.torproject.org/alternate-designs/block-websites/
+#: (content/alternate-designs/block-websites/contents+en.lrquestion.description)
+msgid ""
+"For example, they could request the IP address rather than the hostname when"
+" they exit from the Tor network."
+msgstr ""
+
+#: https//support.torproject.org/alternate-designs/block-websites/
+#: (content/alternate-designs/block-websites/contents+en.lrquestion.description)
+msgid ""
+"This means operators would still need to learn all the IP addresses for the "
+"destinations in question."
+msgstr ""
+
+#: https//support.torproject.org/alternate-designs/block-websites/
+#: (content/alternate-designs/block-websites/contents+en.lrquestion.description)
+msgid ""
+"The second problem is that it would allow remote attackers to censor "
+"arbitrary sites."
+msgstr ""
+
+#: https//support.torproject.org/alternate-designs/block-websites/
+#: (content/alternate-designs/block-websites/contents+en.lrquestion.description)
+msgid ""
+"For example, if a Tor operator blocks www1.slashdot.org, and then some "
+"attacker poisons the Tor relay's DNS or otherwise changes that hostname to "
+"resolve to the IP address for a major news site, then suddenly that Tor "
+"relay is blocking the news site."
+msgstr ""
+
+#: https//support.torproject.org/alternate-designs/let-the-network-pick-the-path/
+#: (content/alternate-designs/let-the-network-pick-the-path/contents+en.lrquestion.title)
+msgid "You should let the network pick the path, not the client."
+msgstr ""
+
+#: https//support.torproject.org/alternate-designs/let-the-network-pick-the-path/
+#: (content/alternate-designs/let-the-network-pick-the-path/contents+en.lrquestion.description)
+msgid "No, you cannot trust the network to pick the path."
+msgstr ""
+
+#: https//support.torproject.org/alternate-designs/let-the-network-pick-the-path/
+#: (content/alternate-designs/let-the-network-pick-the-path/contents+en.lrquestion.description)
+msgid "Malicious relays could route you through their colluding friends."
+msgstr ""
+
+#: https//support.torproject.org/alternate-designs/let-the-network-pick-the-path/
+#: (content/alternate-designs/let-the-network-pick-the-path/contents+en.lrquestion.description)
+msgid ""
+"This would give an adversary the ability to watch all of your traffic end to"
+" end."
+msgstr ""
+
#: lego/templates/banner.html:3 lego/templates/banner.html:5
#: templates/banner.html:3 templates/banner.html:5
msgid "Close banner"
@@ -14547,8 +15588,8 @@ msgid "DONATE NOW"
msgstr "ZRÃB DOTACJE"
#: lego/templates/footer.html:13 lego/templates/footer.html:22
-#: lego/templates/navbar.html:83 templates/footer.html:13
-#: templates/footer.html:22 templates/navbar.html:83
+#: lego/templates/navbar.html:95 templates/footer.html:13
+#: templates/footer.html:22 templates/navbar.html:95
msgid "Download Tor Browser"
msgstr "Pobierz PrzeglÄ
darkÄ Tor"
diff --git a/contents+pt-BR.po b/contents+pt-BR.po
index b990a63d5e..b511ebd64a 100644
--- a/contents+pt-BR.po
+++ b/contents+pt-BR.po
@@ -23,16 +23,16 @@
# Daniel, 2021
# Eduardo Addad de Oliveira <eduardoaddad at hotmail.com>, 2021
# José Ricardo dos Santos Júnior <hricardo2007 at yandex.com>, 2021
-# Igor Bk 13, 2021
# Emma Peel, 2021
+# Igor Bk 13, 2021
#
msgid ""
msgstr ""
"Project-Id-Version: PACKAGE VERSION\n"
"Report-Msgid-Bugs-To: \n"
-"POT-Creation-Date: 2021-08-25 11:14+CET\n"
+"POT-Creation-Date: 2021-09-01 12:20+CET\n"
"PO-Revision-Date: 2018-10-02 22:41+0000\n"
-"Last-Translator: Emma Peel, 2021\n"
+"Last-Translator: Igor Bk 13, 2021\n"
"Language-Team: Portuguese (Brazil) (https://www.transifex.com/otf/teams/1519/pt_BR/)\n"
"MIME-Version: 1.0\n"
"Content-Type: text/plain; charset=UTF-8\n"
@@ -163,6 +163,11 @@ msgstr "FAQ sobre abuso"
msgid "Tor Metrics"
msgstr "Métricas do Tor"
+#: https//support.torproject.org/alternate-designs/
+#: (content/alternate-designs/contents+en.lrtopic.title)
+msgid "Alternate Designs We Don't Do (Yet)"
+msgstr ""
+
#: https//support.torproject.org/glossary/add-on-extension-or-plugin/
#: (content/glossary/add-on-extension-or-plugin/contents+en.lrword.term)
msgid "add-on, extension, or plugin"
@@ -2518,6 +2523,61 @@ msgstr ""
"Você pode encontrar informações mais detalhadas sobre Tor + VPN na [nossa "
"wiki](https://trac.torproject.org/projects/tor/wiki/doc/TorPlusVPN)."
+#: https//support.torproject.org/faq/relay-donations/
+#: (content/faq/relay-donations/contents+en.lrquestion.title)
+msgid "Can I donate for a relay rather than run my own?"
+msgstr ""
+
+#: https//support.torproject.org/faq/relay-donations/
+#: (content/faq/relay-donations/contents+en.lrquestion.description)
+msgid ""
+"Sure! We have a [list of organizations that run Tor "
+"relays](https://community.torproject.org/relay/community-resources/relay-"
+"associations/) that are happy to turn your donations into better speed and "
+"anonymity for the Tor network."
+msgstr ""
+
+#: https//support.torproject.org/faq/relay-donations/
+#: (content/faq/relay-donations/contents+en.lrquestion.description)
+msgid ""
+"These organizations are not the same as [The Tor Project, "
+"Inc](https://donate.torproject.org/), but we consider that a good thing."
+msgstr ""
+
+#: https//support.torproject.org/faq/relay-donations/
+#: (content/faq/relay-donations/contents+en.lrquestion.description)
+msgid "They're run by nice people who are part of the Tor community."
+msgstr "Elas são mantidas por boas pessoas que fazer parte da comunidade Tor."
+
+#: https//support.torproject.org/faq/relay-donations/
+#: (content/faq/relay-donations/contents+en.lrquestion.description)
+msgid ""
+"Note that there can be a tradeoff here between anonymity and performance."
+msgstr ""
+
+#: https//support.torproject.org/faq/relay-donations/
+#: (content/faq/relay-donations/contents+en.lrquestion.description)
+msgid ""
+"The Tor network's anonymity comes in part from diversity, so if you are in a"
+" position to run your own relay, you will be improving Tor's anonymity more "
+"than by donating."
+msgstr ""
+
+#: https//support.torproject.org/faq/relay-donations/
+#: (content/faq/relay-donations/contents+en.lrquestion.description)
+msgid ""
+"At the same time though, economies of scale for bandwidth mean that "
+"combining many small donations into several larger relays is more efficient "
+"at improving network performance."
+msgstr ""
+
+#: https//support.torproject.org/faq/relay-donations/
+#: (content/faq/relay-donations/contents+en.lrquestion.description)
+msgid ""
+"Improving anonymity and improving performance are both worthwhile goals, so "
+"however you can help is great!"
+msgstr ""
+
#: https//support.torproject.org/faq/staying-anonymous/
#: (content/faq/staying-anonymous/contents+en.lrquestion.title)
msgid "Am I totally anonymous if I use Tor?"
@@ -2895,6 +2955,61 @@ msgstr ""
"[identificando e documentando todos os "
"problemas](https://community.torproject.org/)."
+#: https//support.torproject.org/about/attacks-on-onion-routing/
+#: (content/about/attacks-on-onion-routing/contents+en.lrquestion.title)
+msgid "What attacks remain against onion routing?"
+msgstr ""
+
+#: https//support.torproject.org/about/attacks-on-onion-routing/
+#: (content/about/attacks-on-onion-routing/contents+en.lrquestion.description)
+msgid ""
+"As mentioned above, it is possible for an observer who can view both you and"
+" either the destination website or your Tor exit node to correlate timings "
+"of your traffic as it enters the Tor network and also as it exits."
+msgstr ""
+
+#: https//support.torproject.org/about/attacks-on-onion-routing/
+#: (content/about/attacks-on-onion-routing/contents+en.lrquestion.description)
+msgid "Tor does not defend against such a threat model."
+msgstr ""
+
+#: https//support.torproject.org/about/attacks-on-onion-routing/
+#: (content/about/attacks-on-onion-routing/contents+en.lrquestion.description)
+msgid ""
+"In a more limited sense, note that if a censor or law enforcement agency has"
+" the ability to obtain specific observation of parts of the network, it is "
+"possible for them to verify a suspicion that you talk regularly to your "
+"friend by observing traffic at both ends and correlating the timing of only "
+"that traffic."
+msgstr ""
+
+#: https//support.torproject.org/about/attacks-on-onion-routing/
+#: (content/about/attacks-on-onion-routing/contents+en.lrquestion.description)
+msgid ""
+"Again, this is only useful to verify that parties already suspected of "
+"communicating with one another are doing so."
+msgstr ""
+
+#: https//support.torproject.org/about/attacks-on-onion-routing/
+#: (content/about/attacks-on-onion-routing/contents+en.lrquestion.description)
+msgid ""
+"In most countries, the suspicion required to obtain a warrant already "
+"carries more weight than timing correlation would provide."
+msgstr ""
+
+#: https//support.torproject.org/about/attacks-on-onion-routing/
+#: (content/about/attacks-on-onion-routing/contents+en.lrquestion.description)
+msgid ""
+"Furthermore, since Tor reuses circuits for multiple TCP connections, it is "
+"possible to associate non anonymous and anonymous traffic at a given exit "
+"node, so be careful about what applications you run concurrently over Tor."
+msgstr ""
+
+#: https//support.torproject.org/about/attacks-on-onion-routing/
+#: (content/about/attacks-on-onion-routing/contents+en.lrquestion.description)
+msgid "Perhaps even run separate Tor clients for these applications."
+msgstr ""
+
#: https//support.torproject.org/about/backdoor/
#: (content/about/backdoor/contents+en.lrquestion.title)
msgid "Is there a backdoor in Tor?"
@@ -3064,6 +3179,43 @@ msgstr ""
"O uso do Tor com outros navegadores é [perigoso e não recomendado](/pt-"
"BR/tbb/tbb-9/)."
+#: https//support.torproject.org/about/change-paths/
+#: (content/about/change-paths/contents+en.lrquestion.title)
+msgid "How often does Tor change its paths?"
+msgstr ""
+
+#: https//support.torproject.org/about/change-paths/
+#: (content/about/change-paths/contents+en.lrquestion.description)
+msgid ""
+"Tor will reuse the same circuit for new TCP streams for 10 minutes, as long "
+"as the circuit is working fine."
+msgstr ""
+
+#: https//support.torproject.org/about/change-paths/
+#: (content/about/change-paths/contents+en.lrquestion.description)
+msgid "(If the circuit fails, Tor will switch to a new circuit immediately.)"
+msgstr ""
+
+#: https//support.torproject.org/about/change-paths/
+#: (content/about/change-paths/contents+en.lrquestion.description)
+msgid ""
+"But note that a single TCP stream (e.g. a long IRC connection) will stay on "
+"the same circuit forever."
+msgstr ""
+
+#: https//support.torproject.org/about/change-paths/
+#: (content/about/change-paths/contents+en.lrquestion.description)
+msgid "We don't rotate individual streams from one circuit to the next."
+msgstr ""
+
+#: https//support.torproject.org/about/change-paths/
+#: (content/about/change-paths/contents+en.lrquestion.description)
+msgid ""
+"Otherwise, an adversary with a partial view of the network would be given "
+"many chances over time to link you to your destination, rather than just one"
+" chance."
+msgstr ""
+
#: https//support.torproject.org/about/distribute-tor/
#: (content/about/distribute-tor/contents+en.lrquestion.title)
msgid "Can I distribute Tor?"
@@ -3179,6 +3331,133 @@ msgstr ""
"Veja nosso [FAQ da marca](https://www.torproject.org/about/trademark/) para "
"mais detalhes."
+#: https//support.torproject.org/about/entry-guards/
+#: (content/about/entry-guards/contents+en.lrquestion.title)
+msgid "What are Entry Guards?"
+msgstr ""
+
+#: https//support.torproject.org/about/entry-guards/
+#: (content/about/entry-guards/contents+en.lrquestion.description)
+msgid ""
+"Tor (like all current practical low-latency anonymity designs) fails when "
+"the attacker can see both ends of the communications channel."
+msgstr ""
+
+#: https//support.torproject.org/about/entry-guards/
+#: (content/about/entry-guards/contents+en.lrquestion.description)
+msgid ""
+"For example, suppose the attacker controls or watches the Tor relay you "
+"choose to enter the network, and also controls or watches the website you "
+"visit."
+msgstr ""
+
+#: https//support.torproject.org/about/entry-guards/
+#: (content/about/entry-guards/contents+en.lrquestion.description)
+msgid ""
+"In this case, the research community knows no practical low-latency design "
+"that can reliably stop the attacker from correlating volume and timing "
+"information on the two sides."
+msgstr ""
+
+#: https//support.torproject.org/about/entry-guards/
+#: (content/about/entry-guards/contents+en.lrquestion.description)
+msgid "So, what should we do?"
+msgstr ""
+
+#: https//support.torproject.org/about/entry-guards/
+#: (content/about/entry-guards/contents+en.lrquestion.description)
+msgid "Suppose the attacker controls, or can observe, C relays."
+msgstr ""
+
+#: https//support.torproject.org/about/entry-guards/
+#: (content/about/entry-guards/contents+en.lrquestion.description)
+msgid "Suppose there are N relays total."
+msgstr ""
+
+#: https//support.torproject.org/about/entry-guards/
+#: (content/about/entry-guards/contents+en.lrquestion.description)
+msgid ""
+"If you select new entry and exit relays each time you use the network, the "
+"attacker will be able to correlate all traffic you send with probability "
+"around (c/n)2."
+msgstr ""
+
+#: https//support.torproject.org/about/entry-guards/
+#: (content/about/entry-guards/contents+en.lrquestion.description)
+msgid ""
+"But profiling is, for most users, as bad as being traced all the time: they "
+"want to do something often without an attacker noticing, and the attacker "
+"noticing once is as bad as the attacker noticing more often."
+msgstr ""
+
+#: https//support.torproject.org/about/entry-guards/
+#: (content/about/entry-guards/contents+en.lrquestion.description)
+msgid ""
+"Thus, choosing many random entries and exits gives the user no chance of "
+"escaping profiling by this kind of attacker."
+msgstr ""
+
+#: https//support.torproject.org/about/entry-guards/
+#: (content/about/entry-guards/contents+en.lrquestion.description)
+msgid ""
+"The solution is \"entry guards\": each Tor client selects a few relays at "
+"random to use as entry points, and uses only those relays for their first "
+"hop."
+msgstr ""
+
+#: https//support.torproject.org/about/entry-guards/
+#: (content/about/entry-guards/contents+en.lrquestion.description)
+msgid ""
+"If those relays are not controlled or observed, the attacker can't win, "
+"ever, and the user is secure."
+msgstr ""
+
+#: https//support.torproject.org/about/entry-guards/
+#: (content/about/entry-guards/contents+en.lrquestion.description)
+msgid ""
+"If those relays are observed or controlled by the attacker, the attacker "
+"sees a larger fraction of the user's traffic - but still the user is no more"
+" profiled than before."
+msgstr ""
+
+#: https//support.torproject.org/about/entry-guards/
+#: (content/about/entry-guards/contents+en.lrquestion.description)
+msgid ""
+"Thus, the user has some chance (on the order of (n-c)/n) of avoiding "
+"profiling, whereas they had none before."
+msgstr ""
+
+#: https//support.torproject.org/about/entry-guards/
+#: (content/about/entry-guards/contents+en.lrquestion.description)
+msgid ""
+"You can read more at [An Analysis of the Degradation of Anonymous "
+"Protocols](http://freehaven.net/anonbib/#wright02), [Defending Anonymous "
+"Communication Against Passive Logging "
+"Attacks](http://freehaven.net/anonbib/#wright03), and especially [Locating "
+"Hidden Servers](http://freehaven.net/anonbib/#hs-attack06)."
+msgstr ""
+
+#: https//support.torproject.org/about/entry-guards/
+#: (content/about/entry-guards/contents+en.lrquestion.description)
+msgid ""
+"Restricting your entry nodes may also help against attackers who want to run"
+" a few Tor nodes and easily enumerate all of the Tor user IP addresses."
+msgstr ""
+
+#: https//support.torproject.org/about/entry-guards/
+#: (content/about/entry-guards/contents+en.lrquestion.description)
+msgid ""
+"(Even though they can't learn what destinations the users are talking to, "
+"they still might be able to do bad things with just a list of users.)"
+msgstr ""
+
+#: https//support.torproject.org/about/entry-guards/
+#: (content/about/entry-guards/contents+en.lrquestion.description)
+msgid ""
+"However, that feature won't really become useful until we move to a "
+"\"directory guard\" design as well."
+msgstr ""
+
#: https//support.torproject.org/about/how-is-tor-different-from-other-proxies/
#: (content/about/how-is-tor-different-from-other-proxies/contents+en.lrquestion.title)
msgid "How is Tor different from other proxies?"
@@ -3381,6 +3660,162 @@ msgstr ""
"Acesse esta visualização do [Tor e do HTTPS](/pt-BR/https/https-1/) para "
"entender como eles se interagem."
+#: https//support.torproject.org/about/key-management/
+#: (content/about/key-management/contents+en.lrquestion.title)
+msgid "Tell me about all the keys Tor uses"
+msgstr ""
+
+#: https//support.torproject.org/about/key-management/
+#: (content/about/key-management/contents+en.lrquestion.description)
+msgid ""
+"Tor uses a variety of different keys, with three goals in mind: 1) "
+"encryption to ensure privacy of data within the Tor network, 2) "
+"authentication so clients know they're talking to the relays they meant to "
+"talk to, and 3) signatures to make sure all clients know the same set of "
+"relays."
+msgstr ""
+
+#: https//support.torproject.org/about/key-management/
+#: (content/about/key-management/contents+en.lrquestion.description)
+msgid ""
+"**Encryption**: first, all connections in Tor use TLS link encryption, so "
+"observers can't look inside to see which circuit a given cell is intended "
+"for."
+msgstr ""
+
+#: https//support.torproject.org/about/key-management/
+#: (content/about/key-management/contents+en.lrquestion.description)
+msgid ""
+"Further, the Tor client establishes an ephemeral encryption key with each "
+"relay in the circuit; these extra layers of encryption mean that only the "
+"exit relay can read the cells."
+msgstr ""
+
+#: https//support.torproject.org/about/key-management/
+#: (content/about/key-management/contents+en.lrquestion.description)
+msgid ""
+"Both sides discard the circuit key when the circuit ends, so logging traffic"
+" and then breaking into the relay to discover the key won't work."
+msgstr ""
+
+#: https//support.torproject.org/about/key-management/
+#: (content/about/key-management/contents+en.lrquestion.description)
+msgid ""
+"**Authentication**: Every Tor relay has a public decryption key called the "
+"\"onion key\"."
+msgstr ""
+
+#: https//support.torproject.org/about/key-management/
+#: (content/about/key-management/contents+en.lrquestion.description)
+msgid "Each relay rotates its onion key once a week."
+msgstr ""
+
+#: https//support.torproject.org/about/key-management/
+#: (content/about/key-management/contents+en.lrquestion.description)
+msgid ""
+"When the Tor client establishes circuits, at each step it [demands that the "
+"Tor relay prove knowledge of its onion key](https://svn-"
+"archive.torproject.org/svn/projects/design-paper/tor-"
+"design.html#subsec:circuits)."
+msgstr ""
+
+#: https//support.torproject.org/about/key-management/
+#: (content/about/key-management/contents+en.lrquestion.description)
+msgid ""
+"That way the first node in the path can't just spoof the rest of the path."
+msgstr ""
+
+#: https//support.torproject.org/about/key-management/
+#: (content/about/key-management/contents+en.lrquestion.description)
+msgid ""
+"Because the Tor client chooses the path, it can make sure to get Tor's "
+"\"distributed trust\" property: no single relay in the path can know about "
+"both the client and what the client is doing."
+msgstr ""
+
+#: https//support.torproject.org/about/key-management/
+#: (content/about/key-management/contents+en.lrquestion.description)
+msgid ""
+"**Coordination**: How do clients know what the relays are, and how do they "
+"know that they have the right keys for them?"
+msgstr ""
+
+#: https//support.torproject.org/about/key-management/
+#: (content/about/key-management/contents+en.lrquestion.description)
+msgid "Each relay has a long-term public signing key called the \"identity key\"."
+msgstr ""
+
+#: https//support.torproject.org/about/key-management/
+#: (content/about/key-management/contents+en.lrquestion.description)
+msgid "Each directory authority additionally has a \"directory signing key\"."
+msgstr ""
+
+#: https//support.torproject.org/about/key-management/
+#: (content/about/key-management/contents+en.lrquestion.description)
+msgid ""
+"The directory authorities [provide a signed "
+"list](https://gitweb.torproject.org/torspec.git/tree/dir-spec.txt) of all "
+"the known relays, and in that list are a set of certificates from each relay"
+" (self-signed by their identity key) specifying their keys, locations, exit "
+"policies, and so on."
+msgstr ""
+
+#: https//support.torproject.org/about/key-management/
+#: (content/about/key-management/contents+en.lrquestion.description)
+msgid ""
+"So unless the adversary can control a majority of the directory authorities "
+"(as of 2021 there are 10 directory authorities), they can't trick the Tor "
+"client into using other Tor relays."
+msgstr ""
+
+#: https//support.torproject.org/about/key-management/
+#: (content/about/key-management/contents+en.lrquestion.description)
+msgid "How do clients know what the directory authorities are?"
+msgstr ""
+
+#: https//support.torproject.org/about/key-management/
+#: (content/about/key-management/contents+en.lrquestion.description)
+msgid ""
+"The Tor software comes with a built-in list of location and public key for "
+"each directory authority."
+msgstr ""
+
+#: https//support.torproject.org/about/key-management/
+#: (content/about/key-management/contents+en.lrquestion.description)
+msgid ""
+"So the only way to trick users into using a fake Tor network is to give them"
+" a specially modified version of the software."
+msgstr ""
+
+#: https//support.torproject.org/about/key-management/
+#: (content/about/key-management/contents+en.lrquestion.description)
+msgid "How do users know they've got the right software?"
+msgstr ""
+
+#: https//support.torproject.org/about/key-management/
+#: (content/about/key-management/contents+en.lrquestion.description)
+msgid ""
+"When we distribute the source code or a package, we digitally sign it with "
+"[GNU Privacy Guard](http://www.gnupg.org/). See the [instructions on how to "
+"check Tor Browser's signature](https://support.torproject.org/tbb/how-to-"
+"verify-signature/)."
+msgstr ""
+
+#: https//support.torproject.org/about/key-management/
+#: (content/about/key-management/contents+en.lrquestion.description)
+msgid ""
+"In order to be certain that it's really signed by us, you need to have met "
+"us in person and gotten a copy of our GPG key fingerprint, or you need to "
+"know somebody who has."
+msgstr ""
+
+#: https//support.torproject.org/about/key-management/
+#: (content/about/key-management/contents+en.lrquestion.description)
+msgid ""
+"If you're concerned about an attack on this level, we recommend you get "
+"involved with the security community and start meeting people."
+msgstr ""
+
#: https//support.torproject.org/about/no-data-scrubbing/
#: (content/about/no-data-scrubbing/contents+en.lrquestion.title)
msgid ""
@@ -3419,6 +3854,151 @@ msgstr ""
"O Navegador Tor, porém, não consegue fazer nada em relação ao texto que você"
" digita nos formulários."
+#: https//support.torproject.org/about/protections/
+#: (content/about/protections/contents+en.lrquestion.title)
+msgid "What protections does Tor provide?"
+msgstr ""
+
+#: https//support.torproject.org/about/protections/
+#: (content/about/protections/contents+en.lrquestion.description)
+msgid ""
+"Internet communication is based on a store-and-forward model that can be "
+"understood in analogy to postal mail: Data is transmitted in blocks called "
+"IP datagrams or packets."
+msgstr ""
+
+#: https//support.torproject.org/about/protections/
+#: (content/about/protections/contents+en.lrquestion.description)
+msgid ""
+"Every packet includes a source IP address (of the sender) and a destination "
+"IP address (of the receiver), just as ordinary letters contain postal "
+"addresses of sender and receiver."
+msgstr ""
+
+#: https//support.torproject.org/about/protections/
+#: (content/about/protections/contents+en.lrquestion.description)
+msgid ""
+"The way from sender to receiver involves multiple hops of routers, where "
+"each router inspects the destination IP address and forwards the packet "
+"closer to its destination."
+msgstr ""
+
+#: https//support.torproject.org/about/protections/
+#: (content/about/protections/contents+en.lrquestion.description)
+msgid ""
+"Thus, every router between sender and receiver learns that the sender is "
+"communicating with the receiver."
+msgstr ""
+
+#: https//support.torproject.org/about/protections/
+#: (content/about/protections/contents+en.lrquestion.description)
+msgid ""
+"In particular, your local ISP is in the position to build a complete profile"
+" of your Internet usage."
+msgstr ""
+
+#: https//support.torproject.org/about/protections/
+#: (content/about/protections/contents+en.lrquestion.description)
+msgid ""
+"In addition, every server in the Internet that can see any of the packets "
+"can profile your behavior."
+msgstr ""
+
+#: https//support.torproject.org/about/protections/
+#: (content/about/protections/contents+en.lrquestion.description)
+msgid ""
+"The aim of Tor is to improve your privacy by sending your traffic through a "
+"series of proxies."
+msgstr ""
+
+#: https//support.torproject.org/about/protections/
+#: (content/about/protections/contents+en.lrquestion.description)
+msgid ""
+"Your communication is encrypted in multiple layers and routed via multiple "
+"hops through the Tor network to the final receiver."
+msgstr ""
+
+#: https//support.torproject.org/about/protections/
+#: (content/about/protections/contents+en.lrquestion.description)
+msgid ""
+"More details on this process can be found in this "
+"[visualization](https://support.torproject.org/https/https-1/)."
+msgstr ""
+
+#: https//support.torproject.org/about/protections/
+#: (content/about/protections/contents+en.lrquestion.description)
+msgid ""
+"Note that all your local ISP can observe now is that you are communicating "
+"with Tor nodes."
+msgstr ""
+
+#: https//support.torproject.org/about/protections/
+#: (content/about/protections/contents+en.lrquestion.description)
+msgid ""
+"Similarly, servers in the Internet just see that they are being contacted by"
+" Tor nodes."
+msgstr ""
+
+#: https//support.torproject.org/about/protections/
+#: (content/about/protections/contents+en.lrquestion.description)
+msgid "Generally speaking, Tor aims to solve three privacy problems:"
+msgstr ""
+
+#: https//support.torproject.org/about/protections/
+#: (content/about/protections/contents+en.lrquestion.description)
+msgid ""
+"First, Tor prevents websites and other services from learning your location,"
+" which they can use to build databases about your habits and interests."
+msgstr ""
+
+#: https//support.torproject.org/about/protections/
+#: (content/about/protections/contents+en.lrquestion.description)
+msgid ""
+"With Tor, your Internet connections don't give you away by default -- now "
+"you can have the ability to choose, for each connection, how much "
+"information to reveal."
+msgstr ""
+
+#: https//support.torproject.org/about/protections/
+#: (content/about/protections/contents+en.lrquestion.description)
+msgid ""
+"Second, Tor prevents people watching your traffic locally (such as your ISP "
+"or someone with access to your home wifi or router) from learning what "
+"information you're fetching and where you're fetching it from."
+msgstr ""
+
+#: https//support.torproject.org/about/protections/
+#: (content/about/protections/contents+en.lrquestion.description)
+msgid ""
+"It also stops them from deciding what you're allowed to learn and publish --"
+" if you can get to any part of the Tor network, you can reach any site on "
+"the Internet."
+msgstr ""
+
+#: https//support.torproject.org/about/protections/
+#: (content/about/protections/contents+en.lrquestion.description)
+msgid ""
+"Third, Tor routes your connection through more than one Tor relay so no "
+"single relay can learn what you're up to."
+msgstr ""
+
+#: https//support.torproject.org/about/protections/
+#: (content/about/protections/contents+en.lrquestion.description)
+msgid ""
+"Because these relays are run by different individuals or organizations, "
+"distributing trust provides more security than the old [one hop "
+"proxy](https://support.torproject.org/about/#how-is-tor-different-from-"
+"other-proxies) approach."
+msgstr ""
+
+#: https//support.torproject.org/about/protections/
+#: (content/about/protections/contents+en.lrquestion.description)
+msgid ""
+"Note, however, that there are situations where Tor fails to solve these "
+"privacy problems entirely: see the entry below on [remaining "
+"attacks](https://support.torproject.org/about/#attacks-on-onion-routing)."
+msgstr ""
+
#: https//support.torproject.org/about/what-is-tor/
#: (content/about/what-is-tor/contents+en.lrquestion.title)
msgid "What is Tor?"
@@ -6150,15 +6730,12 @@ msgstr ""
#: (content/tbb/tbb-47/contents+en.lrquestion.description)
msgid ""
"Also, read up on the HTTPProxyAuthenticator and HTTPSProxyAuthenticator "
-"options if your proxy requires auth. We only support basic auth currently, "
-"but if you need NTLM authentication, you may find [this post in the "
-"archives](https://archives.seul.org/or/talk/Jun-2005/msg00223.html) useful."
+"options if your [proxy requires auth.](https://developer.mozilla.org/en-"
+"US/docs/Web/HTTP/Headers/Proxy-Authenticate) We only support basic auth "
+"currently, but if you need NTLM authentication, you may find [this post in "
+"the archives](https://archives.seul.org/or/talk/Jun-2005/msg00223.html) "
+"useful."
msgstr ""
-"Também, leia sobre as opções HTTPProxyAuthenticator e "
-"HTTPSProxyAuthenticator se suas solicitações de proxy exigirem autenticação."
-" Nós apenas suportamos atualmente autenticação básica, porém se você precisa"
-" de autenticação NTLM, você pode achar [este post nos "
-"arquivos](https://archives.seul.org/or/talk/Jun-2005/msg00223.html) útil."
#: https//support.torproject.org/tbb/tbb-47/
#: (content/tbb/tbb-47/contents+en.lrquestion.description)
@@ -6437,6 +7014,219 @@ msgstr ""
"Lembre, todas as linhas iniciadas com '#' no torrc são tratadas como "
"comentários e não surtem efeito na configuração do Tor."
+#: https//support.torproject.org/tbb/tbb-firewall-ports/
+#: (content/tbb/tbb-firewall-ports/contents+en.lrquestion.title)
+msgid "My firewall only allows a few outgoing ports"
+msgstr ""
+
+#: https//support.torproject.org/tbb/tbb-firewall-ports/
+#: (content/tbb/tbb-firewall-ports/contents+en.lrquestion.description)
+msgid ""
+"If your firewall works by blocking ports, then you can tell Tor to only use "
+"the ports when you start your Tor Browser."
+msgstr ""
+
+#: https//support.torproject.org/tbb/tbb-firewall-ports/
+#: (content/tbb/tbb-firewall-ports/contents+en.lrquestion.description)
+msgid ""
+"Or you can add the ports that your firewall permits by adding "
+"\"FascistFirewall 1\" to your torrc configuration file."
+msgstr ""
+
+#: https//support.torproject.org/tbb/tbb-firewall-ports/
+#: (content/tbb/tbb-firewall-ports/contents+en.lrquestion.description)
+msgid ""
+"By default, when you set this Tor assumes that your firewall allows only "
+"port 80 and port 443 (HTTP and HTTPS respectively)."
+msgstr ""
+
+#: https//support.torproject.org/tbb/tbb-firewall-ports/
+#: (content/tbb/tbb-firewall-ports/contents+en.lrquestion.description)
+msgid ""
+"You can select a different set of ports with the FirewallPorts torrc option."
+msgstr ""
+
+#: https//support.torproject.org/tbb/tbb-firewall-ports/
+#: (content/tbb/tbb-firewall-ports/contents+en.lrquestion.description)
+msgid ""
+"If you want to be more fine-grained with your controls, you can also use the"
+" ReachableAddresses config options, e.g.:"
+msgstr ""
+
+#: https//support.torproject.org/tbb/tbb-firewall-ports/
+#: (content/tbb/tbb-firewall-ports/contents+en.lrquestion.description)
+#: https//support.torproject.org/tbb/tbb-install-tor-central-server/
+#: (content/tbb/tbb-install-tor-central-server/contents+en.lrquestion.description)
+#: https//support.torproject.org/operators/default-exit-ports/
+#: (content/operators/default-exit-ports/contents+en.lrquestion.description)
+#: https//support.torproject.org/operators/hibernation/
+#: (content/operators/hibernation/contents+en.lrquestion.description)
+#: https//support.torproject.org/operators/limit-total-bandwidth/
+#: (content/operators/limit-total-bandwidth/contents+en.lrquestion.description)
+#: https//support.torproject.org/misc/bug-or-feedback/
+#: (content/misc/bug-or-feedback/contents+en.lrquestion.description)
+#: https//support.torproject.org/get-in-touch/why-i-cant-join-tor-channels/
+#: (content/get-in-touch/why-i-cant-join-tor-channels/contents+en.lrquestion.description)
+#: https//support.torproject.org/apt/tor-deb-repo/
+#: (content/apt/apt-1/contents+en.lrquestion.description)
+#: https//support.torproject.org/apt/apt-over-tor/
+#: (content/apt/apt-3/contents+en.lrquestion.description)
+msgid "```"
+msgstr "```"
+
+#: https//support.torproject.org/tbb/tbb-firewall-ports/
+#: (content/tbb/tbb-firewall-ports/contents+en.lrquestion.description)
+msgid "ReachableDirAddresses *:80"
+msgstr ""
+
+#: https//support.torproject.org/tbb/tbb-firewall-ports/
+#: (content/tbb/tbb-firewall-ports/contents+en.lrquestion.description)
+msgid "ReachableORAddresses *:443"
+msgstr ""
+
+#: https//support.torproject.org/tbb/tbb-install-tor-central-server/
+#: (content/tbb/tbb-install-tor-central-server/contents+en.lrquestion.title)
+msgid ""
+"Can I install Tor on a central server, and have my clients connect to it?"
+msgstr ""
+
+#: https//support.torproject.org/tbb/tbb-install-tor-central-server/
+#: (content/tbb/tbb-install-tor-central-server/contents+en.lrquestion.description)
+msgid ""
+"Yes. Tor can be configured as a client or a relay on another machine, and "
+"allow other machines to be able to connect to it for anonymity."
+msgstr ""
+
+#: https//support.torproject.org/tbb/tbb-install-tor-central-server/
+#: (content/tbb/tbb-install-tor-central-server/contents+en.lrquestion.description)
+msgid ""
+"This is most useful in an environment where many computers want a gateway of"
+" anonymity to the rest of the world."
+msgstr ""
+
+#: https//support.torproject.org/tbb/tbb-install-tor-central-server/
+#: (content/tbb/tbb-install-tor-central-server/contents+en.lrquestion.description)
+msgid ""
+"However, be forewarned that with this configuration, anyone within your "
+"private network (existing between you and the Tor client/relay) can see what"
+" traffic you are sending in clear text."
+msgstr ""
+
+#: https//support.torproject.org/tbb/tbb-install-tor-central-server/
+#: (content/tbb/tbb-install-tor-central-server/contents+en.lrquestion.description)
+msgid "The anonymity doesn't start until you get to the Tor relay."
+msgstr ""
+
+#: https//support.torproject.org/tbb/tbb-install-tor-central-server/
+#: (content/tbb/tbb-install-tor-central-server/contents+en.lrquestion.description)
+msgid ""
+"Because of this, if you are the controller of your domain and you know "
+"everything's locked down, you will be OK, but this configuration may not be "
+"suitable for large private networks where security is key all around."
+msgstr ""
+
+#: https//support.torproject.org/tbb/tbb-install-tor-central-server/
+#: (content/tbb/tbb-install-tor-central-server/contents+en.lrquestion.description)
+msgid ""
+"Configuration is simple, editing your torrc file's SocksListenAddress "
+"according to the following examples:"
+msgstr ""
+
+#: https//support.torproject.org/tbb/tbb-install-tor-central-server/
+#: (content/tbb/tbb-install-tor-central-server/contents+en.lrquestion.description)
+msgid "SocksListenAddress 127.0.0.1"
+msgstr ""
+
+#: https//support.torproject.org/tbb/tbb-install-tor-central-server/
+#: (content/tbb/tbb-install-tor-central-server/contents+en.lrquestion.description)
+msgid "SocksListenAddress 192.168.x.x:9100"
+msgstr ""
+
+#: https//support.torproject.org/tbb/tbb-install-tor-central-server/
+#: (content/tbb/tbb-install-tor-central-server/contents+en.lrquestion.description)
+msgid "SocksListenAddress 0.0.0.0:9100"
+msgstr ""
+
+#: https//support.torproject.org/tbb/tbb-install-tor-central-server/
+#: (content/tbb/tbb-install-tor-central-server/contents+en.lrquestion.description)
+msgid ""
+"You can state multiple listen addresses, in the case that you are part of "
+"several networks or subnets."
+msgstr ""
+
+#: https//support.torproject.org/tbb/tbb-install-tor-central-server/
+#: (content/tbb/tbb-install-tor-central-server/contents+en.lrquestion.description)
+msgid "SocksListenAddress 192.168.x.x:9100 #eth0"
+msgstr ""
+
+#: https//support.torproject.org/tbb/tbb-install-tor-central-server/
+#: (content/tbb/tbb-install-tor-central-server/contents+en.lrquestion.description)
+msgid "SocksListenAddress 10.x.x.x:9100 #eth1"
+msgstr ""
+
+#: https//support.torproject.org/tbb/tbb-install-tor-central-server/
+#: (content/tbb/tbb-install-tor-central-server/contents+en.lrquestion.description)
+msgid ""
+"After this, your clients on their respective networks/subnets would specify "
+"a socks proxy with the address and port you specified SocksListenAddress to "
+"be."
+msgstr ""
+
+#: https//support.torproject.org/tbb/tbb-install-tor-central-server/
+#: (content/tbb/tbb-install-tor-central-server/contents+en.lrquestion.description)
+msgid ""
+"Please note that the SocksPort configuration option gives the port ONLY for "
+"localhost (127.0.0.1)."
+msgstr ""
+
+#: https//support.torproject.org/tbb/tbb-install-tor-central-server/
+#: (content/tbb/tbb-install-tor-central-server/contents+en.lrquestion.description)
+msgid ""
+"When setting up your SocksListenAddress(es), you need to give the port with "
+"the address, as shown above."
+msgstr ""
+
+#: https//support.torproject.org/tbb/tbb-install-tor-central-server/
+#: (content/tbb/tbb-install-tor-central-server/contents+en.lrquestion.description)
+msgid ""
+"If you are interested in forcing all outgoing data through the central Tor "
+"client/relay, instead of the server only being an optional proxy, you may "
+"find the program iptables (for *nix) useful."
+msgstr ""
+
+#: https//support.torproject.org/tbb/tbb-run-client-different-computer/
+#: (content/tbb/tbb-run-client-different-computer/contents+en.lrquestion.title)
+msgid ""
+"I want to run my Tor client on a different computer than my applications"
+msgstr ""
+
+#: https//support.torproject.org/tbb/tbb-run-client-different-computer/
+#: (content/tbb/tbb-run-client-different-computer/contents+en.lrquestion.description)
+msgid ""
+"By default, your Tor client only listens for applications that connect from "
+"localhost."
+msgstr ""
+
+#: https//support.torproject.org/tbb/tbb-run-client-different-computer/
+#: (content/tbb/tbb-run-client-different-computer/contents+en.lrquestion.description)
+msgid "Connections from other computers are refused."
+msgstr ""
+
+#: https//support.torproject.org/tbb/tbb-run-client-different-computer/
+#: (content/tbb/tbb-run-client-different-computer/contents+en.lrquestion.description)
+msgid ""
+"If you want to torify applications on different computers than the Tor "
+"client, you should edit your torrc to define `SocksListenAddress 0.0.0.0` "
+"and then restart (or hup) Tor."
+msgstr ""
+
+#: https//support.torproject.org/tbb/tbb-run-client-different-computer/
+#: (content/tbb/tbb-run-client-different-computer/contents+en.lrquestion.description)
+msgid ""
+"If you want to get more advanced, you can configure your Tor client on a "
+"firewall to bind to your internal IP but not your external IP."
+msgstr ""
+
#: https//support.torproject.org/tbb/website-blocking-tor/
#: (content/tbb/website-blocking-tor/contents+en.lrquestion.title)
msgid "A website I am trying to reach is blocking access over Tor."
@@ -8216,6 +9006,130 @@ msgid ""
"guide."
msgstr ""
+#: https//support.torproject.org/operators/default-exit-ports/
+#: (content/operators/default-exit-ports/contents+en.lrquestion.title)
+msgid "Is there a list of default exit ports?"
+msgstr ""
+
+#: https//support.torproject.org/operators/default-exit-ports/
+#: (content/operators/default-exit-ports/contents+en.lrquestion.description)
+msgid ""
+"The default open ports are listed below but keep in mind that, any port or "
+"ports can be opened by the relay operator by configuring it in torrc or "
+"modifying the source code."
+msgstr ""
+
+#: https//support.torproject.org/operators/default-exit-ports/
+#: (content/operators/default-exit-ports/contents+en.lrquestion.description)
+msgid ""
+"The default according to src/or/policies.c ([line 85][1] and [line 1901][2])"
+" from the source code release [release-0.4.6][3]:"
+msgstr ""
+
+#: https//support.torproject.org/operators/default-exit-ports/
+#: (content/operators/default-exit-ports/contents+en.lrquestion.description)
+msgid "reject 0.0.0.0/8"
+msgstr ""
+
+#: https//support.torproject.org/operators/default-exit-ports/
+#: (content/operators/default-exit-ports/contents+en.lrquestion.description)
+msgid "reject 169.254.0.0/16"
+msgstr ""
+
+#: https//support.torproject.org/operators/default-exit-ports/
+#: (content/operators/default-exit-ports/contents+en.lrquestion.description)
+msgid "reject 127.0.0.0/8"
+msgstr ""
+
+#: https//support.torproject.org/operators/default-exit-ports/
+#: (content/operators/default-exit-ports/contents+en.lrquestion.description)
+msgid "reject 192.168.0.0/16"
+msgstr ""
+
+#: https//support.torproject.org/operators/default-exit-ports/
+#: (content/operators/default-exit-ports/contents+en.lrquestion.description)
+msgid "reject 10.0.0.0/8"
+msgstr ""
+
+#: https//support.torproject.org/operators/default-exit-ports/
+#: (content/operators/default-exit-ports/contents+en.lrquestion.description)
+msgid "reject 172.16.0.0/12"
+msgstr ""
+
+#: https//support.torproject.org/operators/default-exit-ports/
+#: (content/operators/default-exit-ports/contents+en.lrquestion.description)
+msgid "reject *:25"
+msgstr ""
+
+#: https//support.torproject.org/operators/default-exit-ports/
+#: (content/operators/default-exit-ports/contents+en.lrquestion.description)
+msgid "reject *:119"
+msgstr ""
+
+#: https//support.torproject.org/operators/default-exit-ports/
+#: (content/operators/default-exit-ports/contents+en.lrquestion.description)
+msgid "reject *:135-139"
+msgstr ""
+
+#: https//support.torproject.org/operators/default-exit-ports/
+#: (content/operators/default-exit-ports/contents+en.lrquestion.description)
+msgid "reject *:445"
+msgstr ""
+
+#: https//support.torproject.org/operators/default-exit-ports/
+#: (content/operators/default-exit-ports/contents+en.lrquestion.description)
+msgid "reject *:563"
+msgstr ""
+
+#: https//support.torproject.org/operators/default-exit-ports/
+#: (content/operators/default-exit-ports/contents+en.lrquestion.description)
+msgid "reject *:1214"
+msgstr ""
+
+#: https//support.torproject.org/operators/default-exit-ports/
+#: (content/operators/default-exit-ports/contents+en.lrquestion.description)
+msgid "reject *:4661-4666"
+msgstr ""
+
+#: https//support.torproject.org/operators/default-exit-ports/
+#: (content/operators/default-exit-ports/contents+en.lrquestion.description)
+msgid "reject *:6346-6429"
+msgstr ""
+
+#: https//support.torproject.org/operators/default-exit-ports/
+#: (content/operators/default-exit-ports/contents+en.lrquestion.description)
+msgid "reject *:6699"
+msgstr ""
+
+#: https//support.torproject.org/operators/default-exit-ports/
+#: (content/operators/default-exit-ports/contents+en.lrquestion.description)
+msgid "reject *:6881-6999"
+msgstr ""
+
+#: https//support.torproject.org/operators/default-exit-ports/
+#: (content/operators/default-exit-ports/contents+en.lrquestion.description)
+msgid "accept *:*"
+msgstr ""
+
+#: https//support.torproject.org/operators/default-exit-ports/
+#: (content/operators/default-exit-ports/contents+en.lrquestion.description)
+msgid ""
+"[1]: "
+"https://gitlab.torproject.org/tpo/core/tor/-/blob/release-0.4.6/src/core/or/policies.c#L85"
+msgstr ""
+
+#: https//support.torproject.org/operators/default-exit-ports/
+#: (content/operators/default-exit-ports/contents+en.lrquestion.description)
+msgid ""
+"[2]: "
+"https://gitlab.torproject.org/tpo/core/tor/-/blob/release-0.4.6/src/core/or/policies.c#L1901"
+msgstr ""
+
+#: https//support.torproject.org/operators/default-exit-ports/
+#: (content/operators/default-exit-ports/contents+en.lrquestion.description)
+msgid "[3]: https://gitlab.torproject.org/tpo/core/tor/-/tree/release-0.4.6/"
+msgstr ""
+
#: https//support.torproject.org/operators/dynamic-ip/
#: (content/operators/dynamic-ip/contents+en.lrquestion.title)
msgid "Can I run a Tor relay using a dynamic IP address?"
@@ -8418,21 +9332,6 @@ msgstr ""
"Portanto você pode achar que não está apto a navegar assim que seu Tor entra"
" em hibernação, sinalizado por esta entrada no log:"
-#: https//support.torproject.org/operators/hibernation/
-#: (content/operators/hibernation/contents+en.lrquestion.description)
-#: https//support.torproject.org/operators/limit-total-bandwidth/
-#: (content/operators/limit-total-bandwidth/contents+en.lrquestion.description)
-#: https//support.torproject.org/misc/bug-or-feedback/
-#: (content/misc/bug-or-feedback/contents+en.lrquestion.description)
-#: https//support.torproject.org/get-in-touch/why-i-cant-join-tor-channels/
-#: (content/get-in-touch/why-i-cant-join-tor-channels/contents+en.lrquestion.description)
-#: https//support.torproject.org/apt/tor-deb-repo/
-#: (content/apt/apt-1/contents+en.lrquestion.description)
-#: https//support.torproject.org/apt/apt-over-tor/
-#: (content/apt/apt-3/contents+en.lrquestion.description)
-msgid "```"
-msgstr "```"
-
#: https//support.torproject.org/operators/hibernation/
#: (content/operators/hibernation/contents+en.lrquestion.description)
msgid "Bandwidth soft limit reached; commencing hibernation."
@@ -11093,6 +11992,131 @@ msgstr "uid tor-security at lists.torproject.org"
msgid "sub 4096R/C00942E4 2017-03-13"
msgstr "sub 4096R/C00942E4 2017-03-13"
+#: https//support.torproject.org/misc/check-socks-dns-leaks/
+#: (content/misc/check-socks-dns-leaks/contents+en.lrquestion.title)
+msgid ""
+"How do I check if my application that uses SOCKS is leaking DNS requests?"
+msgstr ""
+
+#: https//support.torproject.org/misc/check-socks-dns-leaks/
+#: (content/misc/check-socks-dns-leaks/contents+en.lrquestion.description)
+msgid ""
+"Even if your application is using the correct variant of the SOCKS protocol,"
+" there is still a risk that it could be leaking DNS queries."
+msgstr ""
+
+#: https//support.torproject.org/misc/check-socks-dns-leaks/
+#: (content/misc/check-socks-dns-leaks/contents+en.lrquestion.description)
+msgid ""
+"This problem happens in Firefox extensions that resolve the destination "
+"hostname themselves, for example to show you its IP address, what country "
+"it's in, etc."
+msgstr ""
+
+#: https//support.torproject.org/misc/check-socks-dns-leaks/
+#: (content/misc/check-socks-dns-leaks/contents+en.lrquestion.description)
+msgid ""
+"If you suspect your application might behave like this, follow the "
+"instructions below to check."
+msgstr ""
+
+#: https//support.torproject.org/misc/check-socks-dns-leaks/
+#: (content/misc/check-socks-dns-leaks/contents+en.lrquestion.description)
+msgid ""
+"1. Add `TestSocks 1` to your [torrc file](https://support.torproject.org/tbb"
+"/tbb-editing-torrc/)."
+msgstr ""
+
+#: https//support.torproject.org/misc/check-socks-dns-leaks/
+#: (content/misc/check-socks-dns-leaks/contents+en.lrquestion.description)
+msgid ""
+"1. Start Tor, and point your program's SOCKS proxy settings to Tor's SOCKS5 "
+"server (`socks5://127.0.0.1:9050` by default)."
+msgstr ""
+
+#: https//support.torproject.org/misc/check-socks-dns-leaks/
+#: (content/misc/check-socks-dns-leaks/contents+en.lrquestion.description)
+msgid ""
+"1. Watch your logs as you use your application. For each socks connection, "
+"Tor will log a `notice` for safe connections, and a `warn` for connections "
+"leaking DNS requests."
+msgstr ""
+
+#: https//support.torproject.org/misc/check-socks-dns-leaks/
+#: (content/misc/check-socks-dns-leaks/contents+en.lrquestion.description)
+msgid ""
+"If you want to automatically disable all connections leaking DNS requests, "
+"set `SafeSocks 1` in your torrc file."
+msgstr ""
+
+#: https//support.torproject.org/misc/hide-exits/
+#: (content/misc/hide-exits/contents+en.lrquestion.title)
+msgid ""
+"You should hide the list of Tor relays, so people can't block the exits."
+msgstr ""
+
+#: https//support.torproject.org/misc/hide-exits/
+#: (content/misc/hide-exits/contents+en.lrquestion.description)
+msgid "There are a few reasons we don't:"
+msgstr ""
+
+#: https//support.torproject.org/misc/hide-exits/
+#: (content/misc/hide-exits/contents+en.lrquestion.description)
+msgid ""
+"1. We can't help but make the information available, since Tor clients need "
+"to use it to pick their paths."
+msgstr ""
+
+#: https//support.torproject.org/misc/hide-exits/
+#: (content/misc/hide-exits/contents+en.lrquestion.description)
+msgid "So if the \"blockers\" want it, they can get it anyway."
+msgstr ""
+
+#: https//support.torproject.org/misc/hide-exits/
+#: (content/misc/hide-exits/contents+en.lrquestion.description)
+msgid ""
+"Further, even if we didn't tell clients about the list of relays directly, "
+"somebody could still make a lot of connections through Tor to a test site "
+"and build a list of the addresses they see."
+msgstr ""
+
+#: https//support.torproject.org/misc/hide-exits/
+#: (content/misc/hide-exits/contents+en.lrquestion.description)
+msgid ""
+"1. If people want to block us, we believe that they should be allowed to do "
+"so."
+msgstr ""
+
+#: https//support.torproject.org/misc/hide-exits/
+#: (content/misc/hide-exits/contents+en.lrquestion.description)
+msgid ""
+"Obviously, we would prefer for everybody to allow Tor users to connect to "
+"them, but people have the right to decide who their services should allow "
+"connections from, and if they want to block anonymous users, they can."
+msgstr ""
+
+#: https//support.torproject.org/misc/hide-exits/
+#: (content/misc/hide-exits/contents+en.lrquestion.description)
+msgid ""
+"1. Being blockable also has tactical advantages: it may be a persuasive "
+"response to website maintainers who feel threatened by Tor."
+msgstr ""
+
+#: https//support.torproject.org/misc/hide-exits/
+#: (content/misc/hide-exits/contents+en.lrquestion.description)
+msgid ""
+"Giving them the option may inspire them to stop and think about whether they"
+" really want to eliminate private access to their system, and if not, what "
+"other options they might have."
+msgstr ""
+
+#: https//support.torproject.org/misc/hide-exits/
+#: (content/misc/hide-exits/contents+en.lrquestion.description)
+msgid ""
+"The time they might otherwise have spent blocking Tor, they may instead "
+"spend rethinking their overall approach to privacy and anonymity."
+msgstr ""
+
#: https//support.torproject.org/misc/menu/
#: (content/misc/menu/contents+en.lrquestion.description)
msgid "About"
@@ -11818,68 +12842,21 @@ msgstr "### Como verificar seu codinome"
#: https//support.torproject.org/get-in-touch/why-i-cant-join-tor-channels/
#: (content/get-in-touch/why-i-cant-join-tor-channels/contents+en.lrquestion.description)
msgid ""
-"Then, to complete the registration and ultimately gain access to the #tor-"
-"project channel, your nickname must be **verified**."
+"After registering your nickname, to gain access to the #tor-project and "
+"other protected channels, your nickname must be **verified**."
msgstr ""
-"Então, para completar o registro e efetivamente obter acesso ao canal #tor-"
-"project, seu codinome deve ser **verificado**."
#: https//support.torproject.org/get-in-touch/why-i-cant-join-tor-channels/
#: (content/get-in-touch/why-i-cant-join-tor-channels/contents+en.lrquestion.description)
msgid ""
-"1. To verify your nick, open a new browser window and go to "
-"https://webchat.oftc.net/?channels=tor."
+"1. Go to https://services.oftc.net/ and follow the steps in the '*To verify "
+"your account*' section"
msgstr ""
-"1. Para verificar seu apelido, abra uma nova janela no navegador e vá para "
-"https://webchat.oftc.net/?channels=tor."
-
-#: https//support.torproject.org/get-in-touch/why-i-cant-join-tor-channels/
-#: (content/get-in-touch/why-i-cant-join-tor-channels/contents+en.lrquestion.description)
-msgid "2. Log in with your IRC nickname and password."
-msgstr "2. Faça o log in com seu codinome IRC e senha."
#: https//support.torproject.org/get-in-touch/why-i-cant-join-tor-channels/
#: (content/get-in-touch/why-i-cant-join-tor-channels/contents+en.lrquestion.description)
-msgid ""
-"3. Look for the word **verify** and log in there. It may appear that nothing"
-" has happened. Look at the top of the page, and there will be a column "
-"called **Account**."
-msgstr ""
-"3. Busque pela palavra **verificar** e faça log in. Pode ser que nada "
-"aconteça. Olhe para o topo da página e você verá um espaço chamado "
-"**Conta**."
-
-#: https//support.torproject.org/get-in-touch/why-i-cant-join-tor-channels/
-#: (content/get-in-touch/why-i-cant-join-tor-channels/contents+en.lrquestion.description)
-msgid "4. Click on **Account**."
-msgstr "4. Clique em **Conta**."
-
-#: https//support.torproject.org/get-in-touch/why-i-cant-join-tor-channels/
-#: (content/get-in-touch/why-i-cant-join-tor-channels/contents+en.lrquestion.description)
-msgid ""
-"5. Click on the small sentence at the bottom of the square that says: Verify"
-" account."
-msgstr ""
-"5. Clique na frase pequena na parte inferior do quadrado que diz: Verificar "
-"conta."
-
-#: https//support.torproject.org/get-in-touch/why-i-cant-join-tor-channels/
-#: (content/get-in-touch/why-i-cant-join-tor-channels/contents+en.lrquestion.description)
-msgid "6. Fill out the Captcha that pops up, and click ok."
-msgstr "6. Preencha o Captcha que aparece, e clique em ok."
-
-#: https//support.torproject.org/get-in-touch/why-i-cant-join-tor-channels/
-#: (content/get-in-touch/why-i-cant-join-tor-channels/contents+en.lrquestion.description)
-msgid ""
-"7. A tiny message will appear: \"Your NickServ account has been verified.\""
+msgid "2. Go back to the IRC webpage where you are logged in and type:"
msgstr ""
-"7. Uma pequena mensagem irá aparecer: \"Sua conta NickServ foi verificada.\""
-" "
-
-#: https//support.torproject.org/get-in-touch/why-i-cant-join-tor-channels/
-#: (content/get-in-touch/why-i-cant-join-tor-channels/contents+en.lrquestion.description)
-msgid "8. Go back to the IRC webpage where you are logged in and type:"
-msgstr "8. Volte para a página IRC em que você está logado e digite:"
#: https//support.torproject.org/get-in-touch/why-i-cant-join-tor-channels/
#: (content/get-in-touch/why-i-cant-join-tor-channels/contents+en.lrquestion.description)
@@ -11888,13 +12865,13 @@ msgstr "`/msg nickserv checkverify`"
#: https//support.torproject.org/get-in-touch/why-i-cant-join-tor-channels/
#: (content/get-in-touch/why-i-cant-join-tor-channels/contents+en.lrquestion.description)
-msgid "9. Click ENTER."
-msgstr "9. Pressione Enter."
+msgid "3. Click ENTER."
+msgstr ""
#: https//support.torproject.org/get-in-touch/why-i-cant-join-tor-channels/
#: (content/get-in-touch/why-i-cant-join-tor-channels/contents+en.lrquestion.description)
-msgid "10. If all is well, you will receive a message that says:"
-msgstr "10. Se tudo correr bem, você receberá uma mensagem que dirá:"
+msgid "4. If all is well, you will receive a message that says:"
+msgstr ""
#: https//support.torproject.org/get-in-touch/why-i-cant-join-tor-channels/
#: (content/get-in-touch/why-i-cant-join-tor-channels/contents+en.lrquestion.description)
@@ -12060,21 +13037,23 @@ msgstr "# apt install apt-transport-https"
#: https//support.torproject.org/apt/tor-deb-repo/
#: (content/apt/apt-1/contents+en.lrquestion.description)
msgid ""
-"#### 2. Add the following entries to `/etc/apt/sources.list` or a new file "
-"in `/etc/apt/sources.list.d/`"
+"#### 2. Create a new file in `/etc/apt/sources.list.d/` named `tor.list`. "
+"Add the following entries:"
msgstr ""
-"#### 2. Adicione as seguintes linhas em `/etc/apt/sources.list` ou um novo "
-"arquivo em `/etc/apt/sources.list.d/`"
#: https//support.torproject.org/apt/tor-deb-repo/
#: (content/apt/apt-1/contents+en.lrquestion.description)
-msgid "deb https://deb.torproject.org/torproject.org <DISTRIBUTION> main"
-msgstr "deb https://deb.torproject.org/torproject.org <DISTRIBUTION> main"
+msgid ""
+"deb [signed-by=/usr/share/keyrings/tor-archive-keyring.gpg] "
+"https://deb.torproject.org/torproject.org <DISTRIBUTION> main"
+msgstr ""
#: https//support.torproject.org/apt/tor-deb-repo/
#: (content/apt/apt-1/contents+en.lrquestion.description)
-msgid "deb-src https://deb.torproject.org/torproject.org <DISTRIBUTION> main"
-msgstr "deb-src https://deb.torproject.org/torproject.org <DISTRIBUTION> main"
+msgid ""
+"deb-src [signed-by=/usr/share/keyrings/tor-archive-keyring.gpg] "
+"https://deb.torproject.org/torproject.org <DISTRIBUTION> main"
+msgstr ""
#: https//support.torproject.org/apt/tor-deb-repo/
#: (content/apt/apt-1/contents+en.lrquestion.description)
@@ -12087,14 +13066,16 @@ msgstr ""
#: https//support.torproject.org/apt/tor-deb-repo/
#: (content/apt/apt-1/contents+en.lrquestion.description)
msgid ""
-"deb https://deb.torproject.org/torproject.org tor-"
+"deb [signed-by=/usr/share/keyrings/tor-archive-keyring.gpg] "
+"https://deb.torproject.org/torproject.org tor-"
"experimental-0.4.6.x-<DISTRIBUTION> main"
msgstr ""
#: https//support.torproject.org/apt/tor-deb-repo/
#: (content/apt/apt-1/contents+en.lrquestion.description)
msgid ""
-"deb-src https://deb.torproject.org/torproject.org tor-"
+"deb-src [signed-by=/usr/share/keyrings/tor-archive-keyring.gpg] "
+"https://deb.torproject.org/torproject.org tor-"
"experimental-0.4.6.x-<DISTRIBUTION> main"
msgstr ""
@@ -12106,20 +13087,18 @@ msgstr "Ou compilações noturnas:"
#: https//support.torproject.org/apt/tor-deb-repo/
#: (content/apt/apt-1/contents+en.lrquestion.description)
msgid ""
-"deb https://deb.torproject.org/torproject.org tor-nightly-"
-"master-<DISTRIBUTION> main"
+"deb [signed-by=/usr/share/keyrings/tor-archive-keyring.gpg] "
+"https://deb.torproject.org/torproject.org tor-nightly-master-<DISTRIBUTION> "
+"main"
msgstr ""
-"deb https://deb.torproject.org/torproject.org tor-nightly-"
-"master-<DISTRIBUTION> main"
#: https//support.torproject.org/apt/tor-deb-repo/
#: (content/apt/apt-1/contents+en.lrquestion.description)
msgid ""
-"deb-src https://deb.torproject.org/torproject.org tor-nightly-"
-"master-<DISTRIBUTION> main"
+"deb-src [signed-by=/usr/share/keyrings/tor-archive-keyring.gpg] "
+"https://deb.torproject.org/torproject.org tor-nightly-master-<DISTRIBUTION> "
+"main"
msgstr ""
-"deb-src https://deb.torproject.org/torproject.org tor-nightly-"
-"master-<DISTRIBUTION> main"
#: https//support.torproject.org/apt/tor-deb-repo/
#: (content/apt/apt-1/contents+en.lrquestion.description)
@@ -12144,16 +13123,16 @@ msgstr ""
#: https//support.torproject.org/apt/tor-deb-repo/
#: (content/apt/apt-1/contents+en.lrquestion.description)
msgid ""
-"deb [arch=amd64] https://deb.torproject.org/torproject.org focal main"
+"deb [arch=amd64 signed-by=/usr/share/keyrings/tor-archive-keyring.gpg] "
+"https://deb.torproject.org/torproject.org focal main"
msgstr ""
-"deb [arch=amd64] https://deb.torproject.org/torproject.org focal main"
#: https//support.torproject.org/apt/tor-deb-repo/
#: (content/apt/apt-1/contents+en.lrquestion.description)
msgid ""
-"deb-src [arch=amd64] https://deb.torproject.org/torproject.org focal main"
+"deb-src [arch=amd64 signed-by=/usr/share/keyrings/tor-archive-keyring.gpg] "
+"https://deb.torproject.org/torproject.org focal main"
msgstr ""
-"deb-src [arch=amd64] https://deb.torproject.org/torproject.org focal main"
#: https//support.torproject.org/apt/tor-deb-repo/
#: (content/apt/apt-1/contents+en.lrquestion.description)
@@ -12175,28 +13154,17 @@ msgstr ""
#: (content/apt/apt-1/contents+en.lrquestion.description)
msgid ""
"#### 3. Then add the gpg key used to sign the packages by running the "
-"following commands at your command prompt"
+"following command at your command prompt:"
msgstr ""
-"#### 3. Então adicione a chave gpg usada para assinar os pacotes executando "
-"os seguintes comandas em seu prompt de comando"
#: https//support.torproject.org/apt/tor-deb-repo/
#: (content/apt/apt-1/contents+en.lrquestion.description)
msgid ""
-"# wget -qO- "
+"# wget -O- "
"https://deb.torproject.org/torproject.org/A3C4F0F979CAA22CDBA8F512EE8CBC9E886DDD89.asc"
-" | gpg --import"
+" | gpg --dearmor | tee /usr/share/keyrings/tor-archive-keyring.gpg "
+">/dev/null"
msgstr ""
-"# wget -qO- "
-"https://deb.torproject.org/torproject.org/A3C4F0F979CAA22CDBA8F512EE8CBC9E886DDD89.asc"
-" | gpg --import"
-
-#: https//support.torproject.org/apt/tor-deb-repo/
-#: (content/apt/apt-1/contents+en.lrquestion.description)
-msgid ""
-"# gpg --export A3C4F0F979CAA22CDBA8F512EE8CBC9E886DDD89 | apt-key add -"
-msgstr ""
-"# gpg --export A3C4F0F979CAA22CDBA8F512EE8CBC9E886DDD89 | apt-key add -"
#: https//support.torproject.org/apt/tor-deb-repo/
#: (content/apt/apt-1/contents+en.lrquestion.description)
@@ -14222,6 +15190,82 @@ msgstr ""
"Não, porque aquele usuário atualiza sua lista de retransmissores com a mesma"
" frequência que um usuário que não muda seu endereço de IP durante o dia."
+#: https//support.torproject.org/alternate-designs/block-websites/
+#: (content/alternate-designs/block-websites/contents+en.lrquestion.title)
+msgid "Exit policies should be able to block websites, not just IP addresses."
+msgstr ""
+
+#: https//support.torproject.org/alternate-designs/block-websites/
+#: (content/alternate-designs/block-websites/contents+en.lrquestion.description)
+msgid ""
+"It would be nice to let relay operators say things like `reject "
+"www.slashdot.org` in their exit policies, rather than requiring them to "
+"learn all the IP address space that could be covered by the site (and then "
+"also blocking other sites at those IP addresses)."
+msgstr ""
+
+#: https//support.torproject.org/alternate-designs/block-websites/
+#: (content/alternate-designs/block-websites/contents+en.lrquestion.description)
+msgid "There are two problems, though."
+msgstr ""
+
+#: https//support.torproject.org/alternate-designs/block-websites/
+#: (content/alternate-designs/block-websites/contents+en.lrquestion.description)
+msgid "First, users could still get around these blocks."
+msgstr ""
+
+#: https//support.torproject.org/alternate-designs/block-websites/
+#: (content/alternate-designs/block-websites/contents+en.lrquestion.description)
+msgid ""
+"For example, they could request the IP address rather than the hostname when"
+" they exit from the Tor network."
+msgstr ""
+
+#: https//support.torproject.org/alternate-designs/block-websites/
+#: (content/alternate-designs/block-websites/contents+en.lrquestion.description)
+msgid ""
+"This means operators would still need to learn all the IP addresses for the "
+"destinations in question."
+msgstr ""
+
+#: https//support.torproject.org/alternate-designs/block-websites/
+#: (content/alternate-designs/block-websites/contents+en.lrquestion.description)
+msgid ""
+"The second problem is that it would allow remote attackers to censor "
+"arbitrary sites."
+msgstr ""
+
+#: https//support.torproject.org/alternate-designs/block-websites/
+#: (content/alternate-designs/block-websites/contents+en.lrquestion.description)
+msgid ""
+"For example, if a Tor operator blocks www1.slashdot.org, and then some "
+"attacker poisons the Tor relay's DNS or otherwise changes that hostname to "
+"resolve to the IP address for a major news site, then suddenly that Tor "
+"relay is blocking the news site."
+msgstr ""
+
+#: https//support.torproject.org/alternate-designs/let-the-network-pick-the-path/
+#: (content/alternate-designs/let-the-network-pick-the-path/contents+en.lrquestion.title)
+msgid "You should let the network pick the path, not the client."
+msgstr ""
+
+#: https//support.torproject.org/alternate-designs/let-the-network-pick-the-path/
+#: (content/alternate-designs/let-the-network-pick-the-path/contents+en.lrquestion.description)
+msgid "No, you cannot trust the network to pick the path."
+msgstr ""
+
+#: https//support.torproject.org/alternate-designs/let-the-network-pick-the-path/
+#: (content/alternate-designs/let-the-network-pick-the-path/contents+en.lrquestion.description)
+msgid "Malicious relays could route you through their colluding friends."
+msgstr ""
+
+#: https//support.torproject.org/alternate-designs/let-the-network-pick-the-path/
+#: (content/alternate-designs/let-the-network-pick-the-path/contents+en.lrquestion.description)
+msgid ""
+"This would give an adversary the ability to watch all of your traffic end to"
+" end."
+msgstr ""
+
#: lego/templates/banner.html:3 lego/templates/banner.html:5
#: templates/banner.html:3 templates/banner.html:5
msgid "Close banner"
@@ -14253,8 +15297,8 @@ msgid "DONATE NOW"
msgstr "DOE AGORA"
#: lego/templates/footer.html:13 lego/templates/footer.html:22
-#: lego/templates/navbar.html:83 templates/footer.html:13
-#: templates/footer.html:22 templates/navbar.html:83
+#: lego/templates/navbar.html:95 templates/footer.html:13
+#: templates/footer.html:22 templates/navbar.html:95
msgid "Download Tor Browser"
msgstr "Baixar o Navegador Tor"
diff --git a/contents+pt-PT.po b/contents+pt-PT.po
index b4ffd138e7..5a5d157f76 100644
--- a/contents+pt-PT.po
+++ b/contents+pt-PT.po
@@ -6,19 +6,19 @@
# A Russo <quisquiliarum2001-habitica at yahoo.co.uk>, 2020
# fc2d9c36d73e741383fbbf46a4aac49f_013445b, 2020
# erinm, 2020
-# Manuela Silva <mmsrs at sky.com>, 2020
# Mário Furtado <furmario at aol.com>, 2020
# Emma Peel, 2021
# Rui <xymarior at yandex.com>, 2021
# Hugo Costa <hugoncosta at gmail.com>, 2021
+# Manuela Silva <mmsrs at sky.com>, 2021
#
msgid ""
msgstr ""
"Project-Id-Version: PACKAGE VERSION\n"
"Report-Msgid-Bugs-To: \n"
-"POT-Creation-Date: 2021-08-25 11:14+CET\n"
+"POT-Creation-Date: 2021-09-01 12:20+CET\n"
"PO-Revision-Date: 2018-10-02 22:41+0000\n"
-"Last-Translator: Hugo Costa <hugoncosta at gmail.com>, 2021\n"
+"Last-Translator: Manuela Silva <mmsrs at sky.com>, 2021\n"
"Language-Team: Portuguese (Portugal) (https://www.transifex.com/otf/teams/1519/pt_PT/)\n"
"MIME-Version: 1.0\n"
"Content-Type: text/plain; charset=UTF-8\n"
@@ -149,6 +149,11 @@ msgstr ""
msgid "Tor Metrics"
msgstr "Medições do Tor"
+#: https//support.torproject.org/alternate-designs/
+#: (content/alternate-designs/contents+en.lrtopic.title)
+msgid "Alternate Designs We Don't Do (Yet)"
+msgstr ""
+
#: https//support.torproject.org/glossary/add-on-extension-or-plugin/
#: (content/glossary/add-on-extension-or-plugin/contents+en.lrword.term)
msgid "add-on, extension, or plugin"
@@ -2480,6 +2485,62 @@ msgstr ""
"Pode encontrar mais informação detalhada sobre Tor + VPN na [nossa "
"wiki](https://trac.torproject.org/projects/tor/wiki/doc/TorPlusVPN)."
+#: https//support.torproject.org/faq/relay-donations/
+#: (content/faq/relay-donations/contents+en.lrquestion.title)
+msgid "Can I donate for a relay rather than run my own?"
+msgstr ""
+
+#: https//support.torproject.org/faq/relay-donations/
+#: (content/faq/relay-donations/contents+en.lrquestion.description)
+msgid ""
+"Sure! We have a [list of organizations that run Tor "
+"relays](https://community.torproject.org/relay/community-resources/relay-"
+"associations/) that are happy to turn your donations into better speed and "
+"anonymity for the Tor network."
+msgstr ""
+
+#: https//support.torproject.org/faq/relay-donations/
+#: (content/faq/relay-donations/contents+en.lrquestion.description)
+msgid ""
+"These organizations are not the same as [The Tor Project, "
+"Inc](https://donate.torproject.org/), but we consider that a good thing."
+msgstr ""
+
+#: https//support.torproject.org/faq/relay-donations/
+#: (content/faq/relay-donations/contents+en.lrquestion.description)
+msgid "They're run by nice people who are part of the Tor community."
+msgstr ""
+"Elas são administradas por boas pessoas que fazem parte da comunidade Tor."
+
+#: https//support.torproject.org/faq/relay-donations/
+#: (content/faq/relay-donations/contents+en.lrquestion.description)
+msgid ""
+"Note that there can be a tradeoff here between anonymity and performance."
+msgstr ""
+
+#: https//support.torproject.org/faq/relay-donations/
+#: (content/faq/relay-donations/contents+en.lrquestion.description)
+msgid ""
+"The Tor network's anonymity comes in part from diversity, so if you are in a"
+" position to run your own relay, you will be improving Tor's anonymity more "
+"than by donating."
+msgstr ""
+
+#: https//support.torproject.org/faq/relay-donations/
+#: (content/faq/relay-donations/contents+en.lrquestion.description)
+msgid ""
+"At the same time though, economies of scale for bandwidth mean that "
+"combining many small donations into several larger relays is more efficient "
+"at improving network performance."
+msgstr ""
+
+#: https//support.torproject.org/faq/relay-donations/
+#: (content/faq/relay-donations/contents+en.lrquestion.description)
+msgid ""
+"Improving anonymity and improving performance are both worthwhile goals, so "
+"however you can help is great!"
+msgstr ""
+
#: https//support.torproject.org/faq/staying-anonymous/
#: (content/faq/staying-anonymous/contents+en.lrquestion.title)
msgid "Am I totally anonymous if I use Tor?"
@@ -2793,6 +2854,61 @@ msgid ""
" documenting all the issues](https://community.torproject.org/)."
msgstr ""
+#: https//support.torproject.org/about/attacks-on-onion-routing/
+#: (content/about/attacks-on-onion-routing/contents+en.lrquestion.title)
+msgid "What attacks remain against onion routing?"
+msgstr ""
+
+#: https//support.torproject.org/about/attacks-on-onion-routing/
+#: (content/about/attacks-on-onion-routing/contents+en.lrquestion.description)
+msgid ""
+"As mentioned above, it is possible for an observer who can view both you and"
+" either the destination website or your Tor exit node to correlate timings "
+"of your traffic as it enters the Tor network and also as it exits."
+msgstr ""
+
+#: https//support.torproject.org/about/attacks-on-onion-routing/
+#: (content/about/attacks-on-onion-routing/contents+en.lrquestion.description)
+msgid "Tor does not defend against such a threat model."
+msgstr ""
+
+#: https//support.torproject.org/about/attacks-on-onion-routing/
+#: (content/about/attacks-on-onion-routing/contents+en.lrquestion.description)
+msgid ""
+"In a more limited sense, note that if a censor or law enforcement agency has"
+" the ability to obtain specific observation of parts of the network, it is "
+"possible for them to verify a suspicion that you talk regularly to your "
+"friend by observing traffic at both ends and correlating the timing of only "
+"that traffic."
+msgstr ""
+
+#: https//support.torproject.org/about/attacks-on-onion-routing/
+#: (content/about/attacks-on-onion-routing/contents+en.lrquestion.description)
+msgid ""
+"Again, this is only useful to verify that parties already suspected of "
+"communicating with one another are doing so."
+msgstr ""
+
+#: https//support.torproject.org/about/attacks-on-onion-routing/
+#: (content/about/attacks-on-onion-routing/contents+en.lrquestion.description)
+msgid ""
+"In most countries, the suspicion required to obtain a warrant already "
+"carries more weight than timing correlation would provide."
+msgstr ""
+
+#: https//support.torproject.org/about/attacks-on-onion-routing/
+#: (content/about/attacks-on-onion-routing/contents+en.lrquestion.description)
+msgid ""
+"Furthermore, since Tor reuses circuits for multiple TCP connections, it is "
+"possible to associate non anonymous and anonymous traffic at a given exit "
+"node, so be careful about what applications you run concurrently over Tor."
+msgstr ""
+
+#: https//support.torproject.org/about/attacks-on-onion-routing/
+#: (content/about/attacks-on-onion-routing/contents+en.lrquestion.description)
+msgid "Perhaps even run separate Tor clients for these applications."
+msgstr ""
+
#: https//support.torproject.org/about/backdoor/
#: (content/about/backdoor/contents+en.lrquestion.title)
msgid "Is there a backdoor in Tor?"
@@ -2962,6 +3078,43 @@ msgid ""
msgstr ""
"Usar o Tor com outros browsers é [perigroso e não recomendado](/tbb/tbb-9/)."
+#: https//support.torproject.org/about/change-paths/
+#: (content/about/change-paths/contents+en.lrquestion.title)
+msgid "How often does Tor change its paths?"
+msgstr ""
+
+#: https//support.torproject.org/about/change-paths/
+#: (content/about/change-paths/contents+en.lrquestion.description)
+msgid ""
+"Tor will reuse the same circuit for new TCP streams for 10 minutes, as long "
+"as the circuit is working fine."
+msgstr ""
+
+#: https//support.torproject.org/about/change-paths/
+#: (content/about/change-paths/contents+en.lrquestion.description)
+msgid "(If the circuit fails, Tor will switch to a new circuit immediately.)"
+msgstr ""
+
+#: https//support.torproject.org/about/change-paths/
+#: (content/about/change-paths/contents+en.lrquestion.description)
+msgid ""
+"But note that a single TCP stream (e.g. a long IRC connection) will stay on "
+"the same circuit forever."
+msgstr ""
+
+#: https//support.torproject.org/about/change-paths/
+#: (content/about/change-paths/contents+en.lrquestion.description)
+msgid "We don't rotate individual streams from one circuit to the next."
+msgstr ""
+
+#: https//support.torproject.org/about/change-paths/
+#: (content/about/change-paths/contents+en.lrquestion.description)
+msgid ""
+"Otherwise, an adversary with a partial view of the network would be given "
+"many chances over time to link you to your destination, rather than just one"
+" chance."
+msgstr ""
+
#: https//support.torproject.org/about/distribute-tor/
#: (content/about/distribute-tor/contents+en.lrquestion.title)
msgid "Can I distribute Tor?"
@@ -3077,6 +3230,133 @@ msgstr ""
"Consulte as nossas [Perguntas Mais Frequentes sobre a marca "
"registada](https://www.torproject.org/about/trademark/) para detalhes."
+#: https//support.torproject.org/about/entry-guards/
+#: (content/about/entry-guards/contents+en.lrquestion.title)
+msgid "What are Entry Guards?"
+msgstr ""
+
+#: https//support.torproject.org/about/entry-guards/
+#: (content/about/entry-guards/contents+en.lrquestion.description)
+msgid ""
+"Tor (like all current practical low-latency anonymity designs) fails when "
+"the attacker can see both ends of the communications channel."
+msgstr ""
+
+#: https//support.torproject.org/about/entry-guards/
+#: (content/about/entry-guards/contents+en.lrquestion.description)
+msgid ""
+"For example, suppose the attacker controls or watches the Tor relay you "
+"choose to enter the network, and also controls or watches the website you "
+"visit."
+msgstr ""
+
+#: https//support.torproject.org/about/entry-guards/
+#: (content/about/entry-guards/contents+en.lrquestion.description)
+msgid ""
+"In this case, the research community knows no practical low-latency design "
+"that can reliably stop the attacker from correlating volume and timing "
+"information on the two sides."
+msgstr ""
+
+#: https//support.torproject.org/about/entry-guards/
+#: (content/about/entry-guards/contents+en.lrquestion.description)
+msgid "So, what should we do?"
+msgstr ""
+
+#: https//support.torproject.org/about/entry-guards/
+#: (content/about/entry-guards/contents+en.lrquestion.description)
+msgid "Suppose the attacker controls, or can observe, C relays."
+msgstr ""
+
+#: https//support.torproject.org/about/entry-guards/
+#: (content/about/entry-guards/contents+en.lrquestion.description)
+msgid "Suppose there are N relays total."
+msgstr ""
+
+#: https//support.torproject.org/about/entry-guards/
+#: (content/about/entry-guards/contents+en.lrquestion.description)
+msgid ""
+"If you select new entry and exit relays each time you use the network, the "
+"attacker will be able to correlate all traffic you send with probability "
+"around (c/n)2."
+msgstr ""
+
+#: https//support.torproject.org/about/entry-guards/
+#: (content/about/entry-guards/contents+en.lrquestion.description)
+msgid ""
+"But profiling is, for most users, as bad as being traced all the time: they "
+"want to do something often without an attacker noticing, and the attacker "
+"noticing once is as bad as the attacker noticing more often."
+msgstr ""
+
+#: https//support.torproject.org/about/entry-guards/
+#: (content/about/entry-guards/contents+en.lrquestion.description)
+msgid ""
+"Thus, choosing many random entries and exits gives the user no chance of "
+"escaping profiling by this kind of attacker."
+msgstr ""
+
+#: https//support.torproject.org/about/entry-guards/
+#: (content/about/entry-guards/contents+en.lrquestion.description)
+msgid ""
+"The solution is \"entry guards\": each Tor client selects a few relays at "
+"random to use as entry points, and uses only those relays for their first "
+"hop."
+msgstr ""
+
+#: https//support.torproject.org/about/entry-guards/
+#: (content/about/entry-guards/contents+en.lrquestion.description)
+msgid ""
+"If those relays are not controlled or observed, the attacker can't win, "
+"ever, and the user is secure."
+msgstr ""
+
+#: https//support.torproject.org/about/entry-guards/
+#: (content/about/entry-guards/contents+en.lrquestion.description)
+msgid ""
+"If those relays are observed or controlled by the attacker, the attacker "
+"sees a larger fraction of the user's traffic - but still the user is no more"
+" profiled than before."
+msgstr ""
+
+#: https//support.torproject.org/about/entry-guards/
+#: (content/about/entry-guards/contents+en.lrquestion.description)
+msgid ""
+"Thus, the user has some chance (on the order of (n-c)/n) of avoiding "
+"profiling, whereas they had none before."
+msgstr ""
+
+#: https//support.torproject.org/about/entry-guards/
+#: (content/about/entry-guards/contents+en.lrquestion.description)
+msgid ""
+"You can read more at [An Analysis of the Degradation of Anonymous "
+"Protocols](http://freehaven.net/anonbib/#wright02), [Defending Anonymous "
+"Communication Against Passive Logging "
+"Attacks](http://freehaven.net/anonbib/#wright03), and especially [Locating "
+"Hidden Servers](http://freehaven.net/anonbib/#hs-attack06)."
+msgstr ""
+
+#: https//support.torproject.org/about/entry-guards/
+#: (content/about/entry-guards/contents+en.lrquestion.description)
+msgid ""
+"Restricting your entry nodes may also help against attackers who want to run"
+" a few Tor nodes and easily enumerate all of the Tor user IP addresses."
+msgstr ""
+
+#: https//support.torproject.org/about/entry-guards/
+#: (content/about/entry-guards/contents+en.lrquestion.description)
+msgid ""
+"(Even though they can't learn what destinations the users are talking to, "
+"they still might be able to do bad things with just a list of users.)"
+msgstr ""
+
+#: https//support.torproject.org/about/entry-guards/
+#: (content/about/entry-guards/contents+en.lrquestion.description)
+msgid ""
+"However, that feature won't really become useful until we move to a "
+"\"directory guard\" design as well."
+msgstr ""
+
#: https//support.torproject.org/about/how-is-tor-different-from-other-proxies/
#: (content/about/how-is-tor-different-from-other-proxies/contents+en.lrquestion.title)
msgid "How is Tor different from other proxies?"
@@ -3277,6 +3557,162 @@ msgstr ""
"Veja esta visualização de [Tor e HTTPS](/https/https-1/) para perceber como "
"é que o Tor e HTTPS interagem."
+#: https//support.torproject.org/about/key-management/
+#: (content/about/key-management/contents+en.lrquestion.title)
+msgid "Tell me about all the keys Tor uses"
+msgstr ""
+
+#: https//support.torproject.org/about/key-management/
+#: (content/about/key-management/contents+en.lrquestion.description)
+msgid ""
+"Tor uses a variety of different keys, with three goals in mind: 1) "
+"encryption to ensure privacy of data within the Tor network, 2) "
+"authentication so clients know they're talking to the relays they meant to "
+"talk to, and 3) signatures to make sure all clients know the same set of "
+"relays."
+msgstr ""
+
+#: https//support.torproject.org/about/key-management/
+#: (content/about/key-management/contents+en.lrquestion.description)
+msgid ""
+"**Encryption**: first, all connections in Tor use TLS link encryption, so "
+"observers can't look inside to see which circuit a given cell is intended "
+"for."
+msgstr ""
+
+#: https//support.torproject.org/about/key-management/
+#: (content/about/key-management/contents+en.lrquestion.description)
+msgid ""
+"Further, the Tor client establishes an ephemeral encryption key with each "
+"relay in the circuit; these extra layers of encryption mean that only the "
+"exit relay can read the cells."
+msgstr ""
+
+#: https//support.torproject.org/about/key-management/
+#: (content/about/key-management/contents+en.lrquestion.description)
+msgid ""
+"Both sides discard the circuit key when the circuit ends, so logging traffic"
+" and then breaking into the relay to discover the key won't work."
+msgstr ""
+
+#: https//support.torproject.org/about/key-management/
+#: (content/about/key-management/contents+en.lrquestion.description)
+msgid ""
+"**Authentication**: Every Tor relay has a public decryption key called the "
+"\"onion key\"."
+msgstr ""
+
+#: https//support.torproject.org/about/key-management/
+#: (content/about/key-management/contents+en.lrquestion.description)
+msgid "Each relay rotates its onion key once a week."
+msgstr ""
+
+#: https//support.torproject.org/about/key-management/
+#: (content/about/key-management/contents+en.lrquestion.description)
+msgid ""
+"When the Tor client establishes circuits, at each step it [demands that the "
+"Tor relay prove knowledge of its onion key](https://svn-"
+"archive.torproject.org/svn/projects/design-paper/tor-"
+"design.html#subsec:circuits)."
+msgstr ""
+
+#: https//support.torproject.org/about/key-management/
+#: (content/about/key-management/contents+en.lrquestion.description)
+msgid ""
+"That way the first node in the path can't just spoof the rest of the path."
+msgstr ""
+
+#: https//support.torproject.org/about/key-management/
+#: (content/about/key-management/contents+en.lrquestion.description)
+msgid ""
+"Because the Tor client chooses the path, it can make sure to get Tor's "
+"\"distributed trust\" property: no single relay in the path can know about "
+"both the client and what the client is doing."
+msgstr ""
+
+#: https//support.torproject.org/about/key-management/
+#: (content/about/key-management/contents+en.lrquestion.description)
+msgid ""
+"**Coordination**: How do clients know what the relays are, and how do they "
+"know that they have the right keys for them?"
+msgstr ""
+
+#: https//support.torproject.org/about/key-management/
+#: (content/about/key-management/contents+en.lrquestion.description)
+msgid "Each relay has a long-term public signing key called the \"identity key\"."
+msgstr ""
+
+#: https//support.torproject.org/about/key-management/
+#: (content/about/key-management/contents+en.lrquestion.description)
+msgid "Each directory authority additionally has a \"directory signing key\"."
+msgstr ""
+
+#: https//support.torproject.org/about/key-management/
+#: (content/about/key-management/contents+en.lrquestion.description)
+msgid ""
+"The directory authorities [provide a signed "
+"list](https://gitweb.torproject.org/torspec.git/tree/dir-spec.txt) of all "
+"the known relays, and in that list are a set of certificates from each relay"
+" (self-signed by their identity key) specifying their keys, locations, exit "
+"policies, and so on."
+msgstr ""
+
+#: https//support.torproject.org/about/key-management/
+#: (content/about/key-management/contents+en.lrquestion.description)
+msgid ""
+"So unless the adversary can control a majority of the directory authorities "
+"(as of 2021 there are 10 directory authorities), they can't trick the Tor "
+"client into using other Tor relays."
+msgstr ""
+
+#: https//support.torproject.org/about/key-management/
+#: (content/about/key-management/contents+en.lrquestion.description)
+msgid "How do clients know what the directory authorities are?"
+msgstr ""
+
+#: https//support.torproject.org/about/key-management/
+#: (content/about/key-management/contents+en.lrquestion.description)
+msgid ""
+"The Tor software comes with a built-in list of location and public key for "
+"each directory authority."
+msgstr ""
+
+#: https//support.torproject.org/about/key-management/
+#: (content/about/key-management/contents+en.lrquestion.description)
+msgid ""
+"So the only way to trick users into using a fake Tor network is to give them"
+" a specially modified version of the software."
+msgstr ""
+
+#: https//support.torproject.org/about/key-management/
+#: (content/about/key-management/contents+en.lrquestion.description)
+msgid "How do users know they've got the right software?"
+msgstr ""
+
+#: https//support.torproject.org/about/key-management/
+#: (content/about/key-management/contents+en.lrquestion.description)
+msgid ""
+"When we distribute the source code or a package, we digitally sign it with "
+"[GNU Privacy Guard](http://www.gnupg.org/). See the [instructions on how to "
+"check Tor Browser's signature](https://support.torproject.org/tbb/how-to-"
+"verify-signature/)."
+msgstr ""
+
+#: https//support.torproject.org/about/key-management/
+#: (content/about/key-management/contents+en.lrquestion.description)
+msgid ""
+"In order to be certain that it's really signed by us, you need to have met "
+"us in person and gotten a copy of our GPG key fingerprint, or you need to "
+"know somebody who has."
+msgstr ""
+
+#: https//support.torproject.org/about/key-management/
+#: (content/about/key-management/contents+en.lrquestion.description)
+msgid ""
+"If you're concerned about an attack on this level, we recommend you get "
+"involved with the security community and start meeting people."
+msgstr ""
+
#: https//support.torproject.org/about/no-data-scrubbing/
#: (content/about/no-data-scrubbing/contents+en.lrquestion.title)
msgid ""
@@ -3317,6 +3753,151 @@ msgstr ""
"O Tor Browser não pode, no entanto, fazer nada em relação ao texto que você "
"escreva em formulários."
+#: https//support.torproject.org/about/protections/
+#: (content/about/protections/contents+en.lrquestion.title)
+msgid "What protections does Tor provide?"
+msgstr ""
+
+#: https//support.torproject.org/about/protections/
+#: (content/about/protections/contents+en.lrquestion.description)
+msgid ""
+"Internet communication is based on a store-and-forward model that can be "
+"understood in analogy to postal mail: Data is transmitted in blocks called "
+"IP datagrams or packets."
+msgstr ""
+
+#: https//support.torproject.org/about/protections/
+#: (content/about/protections/contents+en.lrquestion.description)
+msgid ""
+"Every packet includes a source IP address (of the sender) and a destination "
+"IP address (of the receiver), just as ordinary letters contain postal "
+"addresses of sender and receiver."
+msgstr ""
+
+#: https//support.torproject.org/about/protections/
+#: (content/about/protections/contents+en.lrquestion.description)
+msgid ""
+"The way from sender to receiver involves multiple hops of routers, where "
+"each router inspects the destination IP address and forwards the packet "
+"closer to its destination."
+msgstr ""
+
+#: https//support.torproject.org/about/protections/
+#: (content/about/protections/contents+en.lrquestion.description)
+msgid ""
+"Thus, every router between sender and receiver learns that the sender is "
+"communicating with the receiver."
+msgstr ""
+
+#: https//support.torproject.org/about/protections/
+#: (content/about/protections/contents+en.lrquestion.description)
+msgid ""
+"In particular, your local ISP is in the position to build a complete profile"
+" of your Internet usage."
+msgstr ""
+
+#: https//support.torproject.org/about/protections/
+#: (content/about/protections/contents+en.lrquestion.description)
+msgid ""
+"In addition, every server in the Internet that can see any of the packets "
+"can profile your behavior."
+msgstr ""
+
+#: https//support.torproject.org/about/protections/
+#: (content/about/protections/contents+en.lrquestion.description)
+msgid ""
+"The aim of Tor is to improve your privacy by sending your traffic through a "
+"series of proxies."
+msgstr ""
+
+#: https//support.torproject.org/about/protections/
+#: (content/about/protections/contents+en.lrquestion.description)
+msgid ""
+"Your communication is encrypted in multiple layers and routed via multiple "
+"hops through the Tor network to the final receiver."
+msgstr ""
+
+#: https//support.torproject.org/about/protections/
+#: (content/about/protections/contents+en.lrquestion.description)
+msgid ""
+"More details on this process can be found in this "
+"[visualization](https://support.torproject.org/https/https-1/)."
+msgstr ""
+
+#: https//support.torproject.org/about/protections/
+#: (content/about/protections/contents+en.lrquestion.description)
+msgid ""
+"Note that all your local ISP can observe now is that you are communicating "
+"with Tor nodes."
+msgstr ""
+
+#: https//support.torproject.org/about/protections/
+#: (content/about/protections/contents+en.lrquestion.description)
+msgid ""
+"Similarly, servers in the Internet just see that they are being contacted by"
+" Tor nodes."
+msgstr ""
+
+#: https//support.torproject.org/about/protections/
+#: (content/about/protections/contents+en.lrquestion.description)
+msgid "Generally speaking, Tor aims to solve three privacy problems:"
+msgstr ""
+
+#: https//support.torproject.org/about/protections/
+#: (content/about/protections/contents+en.lrquestion.description)
+msgid ""
+"First, Tor prevents websites and other services from learning your location,"
+" which they can use to build databases about your habits and interests."
+msgstr ""
+
+#: https//support.torproject.org/about/protections/
+#: (content/about/protections/contents+en.lrquestion.description)
+msgid ""
+"With Tor, your Internet connections don't give you away by default -- now "
+"you can have the ability to choose, for each connection, how much "
+"information to reveal."
+msgstr ""
+
+#: https//support.torproject.org/about/protections/
+#: (content/about/protections/contents+en.lrquestion.description)
+msgid ""
+"Second, Tor prevents people watching your traffic locally (such as your ISP "
+"or someone with access to your home wifi or router) from learning what "
+"information you're fetching and where you're fetching it from."
+msgstr ""
+
+#: https//support.torproject.org/about/protections/
+#: (content/about/protections/contents+en.lrquestion.description)
+msgid ""
+"It also stops them from deciding what you're allowed to learn and publish --"
+" if you can get to any part of the Tor network, you can reach any site on "
+"the Internet."
+msgstr ""
+
+#: https//support.torproject.org/about/protections/
+#: (content/about/protections/contents+en.lrquestion.description)
+msgid ""
+"Third, Tor routes your connection through more than one Tor relay so no "
+"single relay can learn what you're up to."
+msgstr ""
+
+#: https//support.torproject.org/about/protections/
+#: (content/about/protections/contents+en.lrquestion.description)
+msgid ""
+"Because these relays are run by different individuals or organizations, "
+"distributing trust provides more security than the old [one hop "
+"proxy](https://support.torproject.org/about/#how-is-tor-different-from-"
+"other-proxies) approach."
+msgstr ""
+
+#: https//support.torproject.org/about/protections/
+#: (content/about/protections/contents+en.lrquestion.description)
+msgid ""
+"Note, however, that there are situations where Tor fails to solve these "
+"privacy problems entirely: see the entry below on [remaining "
+"attacks](https://support.torproject.org/about/#attacks-on-onion-routing)."
+msgstr ""
+
#: https//support.torproject.org/about/what-is-tor/
#: (content/about/what-is-tor/contents+en.lrquestion.title)
msgid "What is Tor?"
@@ -5861,9 +6442,11 @@ msgstr ""
#: (content/tbb/tbb-47/contents+en.lrquestion.description)
msgid ""
"Also, read up on the HTTPProxyAuthenticator and HTTPSProxyAuthenticator "
-"options if your proxy requires auth. We only support basic auth currently, "
-"but if you need NTLM authentication, you may find [this post in the "
-"archives](https://archives.seul.org/or/talk/Jun-2005/msg00223.html) useful."
+"options if your [proxy requires auth.](https://developer.mozilla.org/en-"
+"US/docs/Web/HTTP/Headers/Proxy-Authenticate) We only support basic auth "
+"currently, but if you need NTLM authentication, you may find [this post in "
+"the archives](https://archives.seul.org/or/talk/Jun-2005/msg00223.html) "
+"useful."
msgstr ""
#: https//support.torproject.org/tbb/tbb-47/
@@ -6096,6 +6679,219 @@ msgid ""
"have no effect on Tor's configuration."
msgstr ""
+#: https//support.torproject.org/tbb/tbb-firewall-ports/
+#: (content/tbb/tbb-firewall-ports/contents+en.lrquestion.title)
+msgid "My firewall only allows a few outgoing ports"
+msgstr ""
+
+#: https//support.torproject.org/tbb/tbb-firewall-ports/
+#: (content/tbb/tbb-firewall-ports/contents+en.lrquestion.description)
+msgid ""
+"If your firewall works by blocking ports, then you can tell Tor to only use "
+"the ports when you start your Tor Browser."
+msgstr ""
+
+#: https//support.torproject.org/tbb/tbb-firewall-ports/
+#: (content/tbb/tbb-firewall-ports/contents+en.lrquestion.description)
+msgid ""
+"Or you can add the ports that your firewall permits by adding "
+"\"FascistFirewall 1\" to your torrc configuration file."
+msgstr ""
+
+#: https//support.torproject.org/tbb/tbb-firewall-ports/
+#: (content/tbb/tbb-firewall-ports/contents+en.lrquestion.description)
+msgid ""
+"By default, when you set this Tor assumes that your firewall allows only "
+"port 80 and port 443 (HTTP and HTTPS respectively)."
+msgstr ""
+
+#: https//support.torproject.org/tbb/tbb-firewall-ports/
+#: (content/tbb/tbb-firewall-ports/contents+en.lrquestion.description)
+msgid ""
+"You can select a different set of ports with the FirewallPorts torrc option."
+msgstr ""
+
+#: https//support.torproject.org/tbb/tbb-firewall-ports/
+#: (content/tbb/tbb-firewall-ports/contents+en.lrquestion.description)
+msgid ""
+"If you want to be more fine-grained with your controls, you can also use the"
+" ReachableAddresses config options, e.g.:"
+msgstr ""
+
+#: https//support.torproject.org/tbb/tbb-firewall-ports/
+#: (content/tbb/tbb-firewall-ports/contents+en.lrquestion.description)
+#: https//support.torproject.org/tbb/tbb-install-tor-central-server/
+#: (content/tbb/tbb-install-tor-central-server/contents+en.lrquestion.description)
+#: https//support.torproject.org/operators/default-exit-ports/
+#: (content/operators/default-exit-ports/contents+en.lrquestion.description)
+#: https//support.torproject.org/operators/hibernation/
+#: (content/operators/hibernation/contents+en.lrquestion.description)
+#: https//support.torproject.org/operators/limit-total-bandwidth/
+#: (content/operators/limit-total-bandwidth/contents+en.lrquestion.description)
+#: https//support.torproject.org/misc/bug-or-feedback/
+#: (content/misc/bug-or-feedback/contents+en.lrquestion.description)
+#: https//support.torproject.org/get-in-touch/why-i-cant-join-tor-channels/
+#: (content/get-in-touch/why-i-cant-join-tor-channels/contents+en.lrquestion.description)
+#: https//support.torproject.org/apt/tor-deb-repo/
+#: (content/apt/apt-1/contents+en.lrquestion.description)
+#: https//support.torproject.org/apt/apt-over-tor/
+#: (content/apt/apt-3/contents+en.lrquestion.description)
+msgid "```"
+msgstr "```"
+
+#: https//support.torproject.org/tbb/tbb-firewall-ports/
+#: (content/tbb/tbb-firewall-ports/contents+en.lrquestion.description)
+msgid "ReachableDirAddresses *:80"
+msgstr ""
+
+#: https//support.torproject.org/tbb/tbb-firewall-ports/
+#: (content/tbb/tbb-firewall-ports/contents+en.lrquestion.description)
+msgid "ReachableORAddresses *:443"
+msgstr ""
+
+#: https//support.torproject.org/tbb/tbb-install-tor-central-server/
+#: (content/tbb/tbb-install-tor-central-server/contents+en.lrquestion.title)
+msgid ""
+"Can I install Tor on a central server, and have my clients connect to it?"
+msgstr ""
+
+#: https//support.torproject.org/tbb/tbb-install-tor-central-server/
+#: (content/tbb/tbb-install-tor-central-server/contents+en.lrquestion.description)
+msgid ""
+"Yes. Tor can be configured as a client or a relay on another machine, and "
+"allow other machines to be able to connect to it for anonymity."
+msgstr ""
+
+#: https//support.torproject.org/tbb/tbb-install-tor-central-server/
+#: (content/tbb/tbb-install-tor-central-server/contents+en.lrquestion.description)
+msgid ""
+"This is most useful in an environment where many computers want a gateway of"
+" anonymity to the rest of the world."
+msgstr ""
+
+#: https//support.torproject.org/tbb/tbb-install-tor-central-server/
+#: (content/tbb/tbb-install-tor-central-server/contents+en.lrquestion.description)
+msgid ""
+"However, be forewarned that with this configuration, anyone within your "
+"private network (existing between you and the Tor client/relay) can see what"
+" traffic you are sending in clear text."
+msgstr ""
+
+#: https//support.torproject.org/tbb/tbb-install-tor-central-server/
+#: (content/tbb/tbb-install-tor-central-server/contents+en.lrquestion.description)
+msgid "The anonymity doesn't start until you get to the Tor relay."
+msgstr ""
+
+#: https//support.torproject.org/tbb/tbb-install-tor-central-server/
+#: (content/tbb/tbb-install-tor-central-server/contents+en.lrquestion.description)
+msgid ""
+"Because of this, if you are the controller of your domain and you know "
+"everything's locked down, you will be OK, but this configuration may not be "
+"suitable for large private networks where security is key all around."
+msgstr ""
+
+#: https//support.torproject.org/tbb/tbb-install-tor-central-server/
+#: (content/tbb/tbb-install-tor-central-server/contents+en.lrquestion.description)
+msgid ""
+"Configuration is simple, editing your torrc file's SocksListenAddress "
+"according to the following examples:"
+msgstr ""
+
+#: https//support.torproject.org/tbb/tbb-install-tor-central-server/
+#: (content/tbb/tbb-install-tor-central-server/contents+en.lrquestion.description)
+msgid "SocksListenAddress 127.0.0.1"
+msgstr ""
+
+#: https//support.torproject.org/tbb/tbb-install-tor-central-server/
+#: (content/tbb/tbb-install-tor-central-server/contents+en.lrquestion.description)
+msgid "SocksListenAddress 192.168.x.x:9100"
+msgstr ""
+
+#: https//support.torproject.org/tbb/tbb-install-tor-central-server/
+#: (content/tbb/tbb-install-tor-central-server/contents+en.lrquestion.description)
+msgid "SocksListenAddress 0.0.0.0:9100"
+msgstr ""
+
+#: https//support.torproject.org/tbb/tbb-install-tor-central-server/
+#: (content/tbb/tbb-install-tor-central-server/contents+en.lrquestion.description)
+msgid ""
+"You can state multiple listen addresses, in the case that you are part of "
+"several networks or subnets."
+msgstr ""
+
+#: https//support.torproject.org/tbb/tbb-install-tor-central-server/
+#: (content/tbb/tbb-install-tor-central-server/contents+en.lrquestion.description)
+msgid "SocksListenAddress 192.168.x.x:9100 #eth0"
+msgstr ""
+
+#: https//support.torproject.org/tbb/tbb-install-tor-central-server/
+#: (content/tbb/tbb-install-tor-central-server/contents+en.lrquestion.description)
+msgid "SocksListenAddress 10.x.x.x:9100 #eth1"
+msgstr ""
+
+#: https//support.torproject.org/tbb/tbb-install-tor-central-server/
+#: (content/tbb/tbb-install-tor-central-server/contents+en.lrquestion.description)
+msgid ""
+"After this, your clients on their respective networks/subnets would specify "
+"a socks proxy with the address and port you specified SocksListenAddress to "
+"be."
+msgstr ""
+
+#: https//support.torproject.org/tbb/tbb-install-tor-central-server/
+#: (content/tbb/tbb-install-tor-central-server/contents+en.lrquestion.description)
+msgid ""
+"Please note that the SocksPort configuration option gives the port ONLY for "
+"localhost (127.0.0.1)."
+msgstr ""
+
+#: https//support.torproject.org/tbb/tbb-install-tor-central-server/
+#: (content/tbb/tbb-install-tor-central-server/contents+en.lrquestion.description)
+msgid ""
+"When setting up your SocksListenAddress(es), you need to give the port with "
+"the address, as shown above."
+msgstr ""
+
+#: https//support.torproject.org/tbb/tbb-install-tor-central-server/
+#: (content/tbb/tbb-install-tor-central-server/contents+en.lrquestion.description)
+msgid ""
+"If you are interested in forcing all outgoing data through the central Tor "
+"client/relay, instead of the server only being an optional proxy, you may "
+"find the program iptables (for *nix) useful."
+msgstr ""
+
+#: https//support.torproject.org/tbb/tbb-run-client-different-computer/
+#: (content/tbb/tbb-run-client-different-computer/contents+en.lrquestion.title)
+msgid ""
+"I want to run my Tor client on a different computer than my applications"
+msgstr ""
+
+#: https//support.torproject.org/tbb/tbb-run-client-different-computer/
+#: (content/tbb/tbb-run-client-different-computer/contents+en.lrquestion.description)
+msgid ""
+"By default, your Tor client only listens for applications that connect from "
+"localhost."
+msgstr ""
+
+#: https//support.torproject.org/tbb/tbb-run-client-different-computer/
+#: (content/tbb/tbb-run-client-different-computer/contents+en.lrquestion.description)
+msgid "Connections from other computers are refused."
+msgstr ""
+
+#: https//support.torproject.org/tbb/tbb-run-client-different-computer/
+#: (content/tbb/tbb-run-client-different-computer/contents+en.lrquestion.description)
+msgid ""
+"If you want to torify applications on different computers than the Tor "
+"client, you should edit your torrc to define `SocksListenAddress 0.0.0.0` "
+"and then restart (or hup) Tor."
+msgstr ""
+
+#: https//support.torproject.org/tbb/tbb-run-client-different-computer/
+#: (content/tbb/tbb-run-client-different-computer/contents+en.lrquestion.description)
+msgid ""
+"If you want to get more advanced, you can configure your Tor client on a "
+"firewall to bind to your internal IP but not your external IP."
+msgstr ""
+
#: https//support.torproject.org/tbb/website-blocking-tor/
#: (content/tbb/website-blocking-tor/contents+en.lrquestion.title)
msgid "A website I am trying to reach is blocking access over Tor."
@@ -7699,6 +8495,130 @@ msgid ""
"guide."
msgstr ""
+#: https//support.torproject.org/operators/default-exit-ports/
+#: (content/operators/default-exit-ports/contents+en.lrquestion.title)
+msgid "Is there a list of default exit ports?"
+msgstr ""
+
+#: https//support.torproject.org/operators/default-exit-ports/
+#: (content/operators/default-exit-ports/contents+en.lrquestion.description)
+msgid ""
+"The default open ports are listed below but keep in mind that, any port or "
+"ports can be opened by the relay operator by configuring it in torrc or "
+"modifying the source code."
+msgstr ""
+
+#: https//support.torproject.org/operators/default-exit-ports/
+#: (content/operators/default-exit-ports/contents+en.lrquestion.description)
+msgid ""
+"The default according to src/or/policies.c ([line 85][1] and [line 1901][2])"
+" from the source code release [release-0.4.6][3]:"
+msgstr ""
+
+#: https//support.torproject.org/operators/default-exit-ports/
+#: (content/operators/default-exit-ports/contents+en.lrquestion.description)
+msgid "reject 0.0.0.0/8"
+msgstr ""
+
+#: https//support.torproject.org/operators/default-exit-ports/
+#: (content/operators/default-exit-ports/contents+en.lrquestion.description)
+msgid "reject 169.254.0.0/16"
+msgstr ""
+
+#: https//support.torproject.org/operators/default-exit-ports/
+#: (content/operators/default-exit-ports/contents+en.lrquestion.description)
+msgid "reject 127.0.0.0/8"
+msgstr ""
+
+#: https//support.torproject.org/operators/default-exit-ports/
+#: (content/operators/default-exit-ports/contents+en.lrquestion.description)
+msgid "reject 192.168.0.0/16"
+msgstr ""
+
+#: https//support.torproject.org/operators/default-exit-ports/
+#: (content/operators/default-exit-ports/contents+en.lrquestion.description)
+msgid "reject 10.0.0.0/8"
+msgstr ""
+
+#: https//support.torproject.org/operators/default-exit-ports/
+#: (content/operators/default-exit-ports/contents+en.lrquestion.description)
+msgid "reject 172.16.0.0/12"
+msgstr ""
+
+#: https//support.torproject.org/operators/default-exit-ports/
+#: (content/operators/default-exit-ports/contents+en.lrquestion.description)
+msgid "reject *:25"
+msgstr ""
+
+#: https//support.torproject.org/operators/default-exit-ports/
+#: (content/operators/default-exit-ports/contents+en.lrquestion.description)
+msgid "reject *:119"
+msgstr ""
+
+#: https//support.torproject.org/operators/default-exit-ports/
+#: (content/operators/default-exit-ports/contents+en.lrquestion.description)
+msgid "reject *:135-139"
+msgstr ""
+
+#: https//support.torproject.org/operators/default-exit-ports/
+#: (content/operators/default-exit-ports/contents+en.lrquestion.description)
+msgid "reject *:445"
+msgstr ""
+
+#: https//support.torproject.org/operators/default-exit-ports/
+#: (content/operators/default-exit-ports/contents+en.lrquestion.description)
+msgid "reject *:563"
+msgstr ""
+
+#: https//support.torproject.org/operators/default-exit-ports/
+#: (content/operators/default-exit-ports/contents+en.lrquestion.description)
+msgid "reject *:1214"
+msgstr ""
+
+#: https//support.torproject.org/operators/default-exit-ports/
+#: (content/operators/default-exit-ports/contents+en.lrquestion.description)
+msgid "reject *:4661-4666"
+msgstr ""
+
+#: https//support.torproject.org/operators/default-exit-ports/
+#: (content/operators/default-exit-ports/contents+en.lrquestion.description)
+msgid "reject *:6346-6429"
+msgstr ""
+
+#: https//support.torproject.org/operators/default-exit-ports/
+#: (content/operators/default-exit-ports/contents+en.lrquestion.description)
+msgid "reject *:6699"
+msgstr ""
+
+#: https//support.torproject.org/operators/default-exit-ports/
+#: (content/operators/default-exit-ports/contents+en.lrquestion.description)
+msgid "reject *:6881-6999"
+msgstr ""
+
+#: https//support.torproject.org/operators/default-exit-ports/
+#: (content/operators/default-exit-ports/contents+en.lrquestion.description)
+msgid "accept *:*"
+msgstr ""
+
+#: https//support.torproject.org/operators/default-exit-ports/
+#: (content/operators/default-exit-ports/contents+en.lrquestion.description)
+msgid ""
+"[1]: "
+"https://gitlab.torproject.org/tpo/core/tor/-/blob/release-0.4.6/src/core/or/policies.c#L85"
+msgstr ""
+
+#: https//support.torproject.org/operators/default-exit-ports/
+#: (content/operators/default-exit-ports/contents+en.lrquestion.description)
+msgid ""
+"[2]: "
+"https://gitlab.torproject.org/tpo/core/tor/-/blob/release-0.4.6/src/core/or/policies.c#L1901"
+msgstr ""
+
+#: https//support.torproject.org/operators/default-exit-ports/
+#: (content/operators/default-exit-ports/contents+en.lrquestion.description)
+msgid "[3]: https://gitlab.torproject.org/tpo/core/tor/-/tree/release-0.4.6/"
+msgstr ""
+
#: https//support.torproject.org/operators/dynamic-ip/
#: (content/operators/dynamic-ip/contents+en.lrquestion.title)
msgid "Can I run a Tor relay using a dynamic IP address?"
@@ -7846,21 +8766,6 @@ msgid ""
"into hibernation, signaled by this entry in the log:"
msgstr ""
-#: https//support.torproject.org/operators/hibernation/
-#: (content/operators/hibernation/contents+en.lrquestion.description)
-#: https//support.torproject.org/operators/limit-total-bandwidth/
-#: (content/operators/limit-total-bandwidth/contents+en.lrquestion.description)
-#: https//support.torproject.org/misc/bug-or-feedback/
-#: (content/misc/bug-or-feedback/contents+en.lrquestion.description)
-#: https//support.torproject.org/get-in-touch/why-i-cant-join-tor-channels/
-#: (content/get-in-touch/why-i-cant-join-tor-channels/contents+en.lrquestion.description)
-#: https//support.torproject.org/apt/tor-deb-repo/
-#: (content/apt/apt-1/contents+en.lrquestion.description)
-#: https//support.torproject.org/apt/apt-over-tor/
-#: (content/apt/apt-3/contents+en.lrquestion.description)
-msgid "```"
-msgstr "```"
-
#: https//support.torproject.org/operators/hibernation/
#: (content/operators/hibernation/contents+en.lrquestion.description)
msgid "Bandwidth soft limit reached; commencing hibernation."
@@ -10146,6 +11051,131 @@ msgstr ""
msgid "sub 4096R/C00942E4 2017-03-13"
msgstr ""
+#: https//support.torproject.org/misc/check-socks-dns-leaks/
+#: (content/misc/check-socks-dns-leaks/contents+en.lrquestion.title)
+msgid ""
+"How do I check if my application that uses SOCKS is leaking DNS requests?"
+msgstr ""
+
+#: https//support.torproject.org/misc/check-socks-dns-leaks/
+#: (content/misc/check-socks-dns-leaks/contents+en.lrquestion.description)
+msgid ""
+"Even if your application is using the correct variant of the SOCKS protocol,"
+" there is still a risk that it could be leaking DNS queries."
+msgstr ""
+
+#: https//support.torproject.org/misc/check-socks-dns-leaks/
+#: (content/misc/check-socks-dns-leaks/contents+en.lrquestion.description)
+msgid ""
+"This problem happens in Firefox extensions that resolve the destination "
+"hostname themselves, for example to show you its IP address, what country "
+"it's in, etc."
+msgstr ""
+
+#: https//support.torproject.org/misc/check-socks-dns-leaks/
+#: (content/misc/check-socks-dns-leaks/contents+en.lrquestion.description)
+msgid ""
+"If you suspect your application might behave like this, follow the "
+"instructions below to check."
+msgstr ""
+
+#: https//support.torproject.org/misc/check-socks-dns-leaks/
+#: (content/misc/check-socks-dns-leaks/contents+en.lrquestion.description)
+msgid ""
+"1. Add `TestSocks 1` to your [torrc file](https://support.torproject.org/tbb"
+"/tbb-editing-torrc/)."
+msgstr ""
+
+#: https//support.torproject.org/misc/check-socks-dns-leaks/
+#: (content/misc/check-socks-dns-leaks/contents+en.lrquestion.description)
+msgid ""
+"1. Start Tor, and point your program's SOCKS proxy settings to Tor's SOCKS5 "
+"server (`socks5://127.0.0.1:9050` by default)."
+msgstr ""
+
+#: https//support.torproject.org/misc/check-socks-dns-leaks/
+#: (content/misc/check-socks-dns-leaks/contents+en.lrquestion.description)
+msgid ""
+"1. Watch your logs as you use your application. For each socks connection, "
+"Tor will log a `notice` for safe connections, and a `warn` for connections "
+"leaking DNS requests."
+msgstr ""
+
+#: https//support.torproject.org/misc/check-socks-dns-leaks/
+#: (content/misc/check-socks-dns-leaks/contents+en.lrquestion.description)
+msgid ""
+"If you want to automatically disable all connections leaking DNS requests, "
+"set `SafeSocks 1` in your torrc file."
+msgstr ""
+
+#: https//support.torproject.org/misc/hide-exits/
+#: (content/misc/hide-exits/contents+en.lrquestion.title)
+msgid ""
+"You should hide the list of Tor relays, so people can't block the exits."
+msgstr ""
+
+#: https//support.torproject.org/misc/hide-exits/
+#: (content/misc/hide-exits/contents+en.lrquestion.description)
+msgid "There are a few reasons we don't:"
+msgstr ""
+
+#: https//support.torproject.org/misc/hide-exits/
+#: (content/misc/hide-exits/contents+en.lrquestion.description)
+msgid ""
+"1. We can't help but make the information available, since Tor clients need "
+"to use it to pick their paths."
+msgstr ""
+
+#: https//support.torproject.org/misc/hide-exits/
+#: (content/misc/hide-exits/contents+en.lrquestion.description)
+msgid "So if the \"blockers\" want it, they can get it anyway."
+msgstr ""
+
+#: https//support.torproject.org/misc/hide-exits/
+#: (content/misc/hide-exits/contents+en.lrquestion.description)
+msgid ""
+"Further, even if we didn't tell clients about the list of relays directly, "
+"somebody could still make a lot of connections through Tor to a test site "
+"and build a list of the addresses they see."
+msgstr ""
+
+#: https//support.torproject.org/misc/hide-exits/
+#: (content/misc/hide-exits/contents+en.lrquestion.description)
+msgid ""
+"1. If people want to block us, we believe that they should be allowed to do "
+"so."
+msgstr ""
+
+#: https//support.torproject.org/misc/hide-exits/
+#: (content/misc/hide-exits/contents+en.lrquestion.description)
+msgid ""
+"Obviously, we would prefer for everybody to allow Tor users to connect to "
+"them, but people have the right to decide who their services should allow "
+"connections from, and if they want to block anonymous users, they can."
+msgstr ""
+
+#: https//support.torproject.org/misc/hide-exits/
+#: (content/misc/hide-exits/contents+en.lrquestion.description)
+msgid ""
+"1. Being blockable also has tactical advantages: it may be a persuasive "
+"response to website maintainers who feel threatened by Tor."
+msgstr ""
+
+#: https//support.torproject.org/misc/hide-exits/
+#: (content/misc/hide-exits/contents+en.lrquestion.description)
+msgid ""
+"Giving them the option may inspire them to stop and think about whether they"
+" really want to eliminate private access to their system, and if not, what "
+"other options they might have."
+msgstr ""
+
+#: https//support.torproject.org/misc/hide-exits/
+#: (content/misc/hide-exits/contents+en.lrquestion.description)
+msgid ""
+"The time they might otherwise have spent blocking Tor, they may instead "
+"spend rethinking their overall approach to privacy and anonymity."
+msgstr ""
+
#: https//support.torproject.org/misc/menu/
#: (content/misc/menu/contents+en.lrquestion.description)
msgid "About"
@@ -10796,56 +11826,20 @@ msgstr ""
#: https//support.torproject.org/get-in-touch/why-i-cant-join-tor-channels/
#: (content/get-in-touch/why-i-cant-join-tor-channels/contents+en.lrquestion.description)
msgid ""
-"Then, to complete the registration and ultimately gain access to the #tor-"
-"project channel, your nickname must be **verified**."
-msgstr ""
-
-#: https//support.torproject.org/get-in-touch/why-i-cant-join-tor-channels/
-#: (content/get-in-touch/why-i-cant-join-tor-channels/contents+en.lrquestion.description)
-msgid ""
-"1. To verify your nick, open a new browser window and go to "
-"https://webchat.oftc.net/?channels=tor."
-msgstr ""
-
-#: https//support.torproject.org/get-in-touch/why-i-cant-join-tor-channels/
-#: (content/get-in-touch/why-i-cant-join-tor-channels/contents+en.lrquestion.description)
-msgid "2. Log in with your IRC nickname and password."
-msgstr ""
-
-#: https//support.torproject.org/get-in-touch/why-i-cant-join-tor-channels/
-#: (content/get-in-touch/why-i-cant-join-tor-channels/contents+en.lrquestion.description)
-msgid ""
-"3. Look for the word **verify** and log in there. It may appear that nothing"
-" has happened. Look at the top of the page, and there will be a column "
-"called **Account**."
-msgstr ""
-
-#: https//support.torproject.org/get-in-touch/why-i-cant-join-tor-channels/
-#: (content/get-in-touch/why-i-cant-join-tor-channels/contents+en.lrquestion.description)
-msgid "4. Click on **Account**."
-msgstr "4. Clique em **Conta**."
-
-#: https//support.torproject.org/get-in-touch/why-i-cant-join-tor-channels/
-#: (content/get-in-touch/why-i-cant-join-tor-channels/contents+en.lrquestion.description)
-msgid ""
-"5. Click on the small sentence at the bottom of the square that says: Verify"
-" account."
-msgstr ""
-
-#: https//support.torproject.org/get-in-touch/why-i-cant-join-tor-channels/
-#: (content/get-in-touch/why-i-cant-join-tor-channels/contents+en.lrquestion.description)
-msgid "6. Fill out the Captcha that pops up, and click ok."
+"After registering your nickname, to gain access to the #tor-project and "
+"other protected channels, your nickname must be **verified**."
msgstr ""
#: https//support.torproject.org/get-in-touch/why-i-cant-join-tor-channels/
#: (content/get-in-touch/why-i-cant-join-tor-channels/contents+en.lrquestion.description)
msgid ""
-"7. A tiny message will appear: \"Your NickServ account has been verified.\""
+"1. Go to https://services.oftc.net/ and follow the steps in the '*To verify "
+"your account*' section"
msgstr ""
#: https//support.torproject.org/get-in-touch/why-i-cant-join-tor-channels/
#: (content/get-in-touch/why-i-cant-join-tor-channels/contents+en.lrquestion.description)
-msgid "8. Go back to the IRC webpage where you are logged in and type:"
+msgid "2. Go back to the IRC webpage where you are logged in and type:"
msgstr ""
#: https//support.torproject.org/get-in-touch/why-i-cant-join-tor-channels/
@@ -10855,12 +11849,12 @@ msgstr ""
#: https//support.torproject.org/get-in-touch/why-i-cant-join-tor-channels/
#: (content/get-in-touch/why-i-cant-join-tor-channels/contents+en.lrquestion.description)
-msgid "9. Click ENTER."
-msgstr "9. Clique em \"Enter\""
+msgid "3. Click ENTER."
+msgstr ""
#: https//support.torproject.org/get-in-touch/why-i-cant-join-tor-channels/
#: (content/get-in-touch/why-i-cant-join-tor-channels/contents+en.lrquestion.description)
-msgid "10. If all is well, you will receive a message that says:"
+msgid "4. If all is well, you will receive a message that says:"
msgstr ""
#: https//support.torproject.org/get-in-touch/why-i-cant-join-tor-channels/
@@ -11001,18 +11995,22 @@ msgstr ""
#: https//support.torproject.org/apt/tor-deb-repo/
#: (content/apt/apt-1/contents+en.lrquestion.description)
msgid ""
-"#### 2. Add the following entries to `/etc/apt/sources.list` or a new file "
-"in `/etc/apt/sources.list.d/`"
+"#### 2. Create a new file in `/etc/apt/sources.list.d/` named `tor.list`. "
+"Add the following entries:"
msgstr ""
#: https//support.torproject.org/apt/tor-deb-repo/
#: (content/apt/apt-1/contents+en.lrquestion.description)
-msgid "deb https://deb.torproject.org/torproject.org <DISTRIBUTION> main"
+msgid ""
+"deb [signed-by=/usr/share/keyrings/tor-archive-keyring.gpg] "
+"https://deb.torproject.org/torproject.org <DISTRIBUTION> main"
msgstr ""
#: https//support.torproject.org/apt/tor-deb-repo/
#: (content/apt/apt-1/contents+en.lrquestion.description)
-msgid "deb-src https://deb.torproject.org/torproject.org <DISTRIBUTION> main"
+msgid ""
+"deb-src [signed-by=/usr/share/keyrings/tor-archive-keyring.gpg] "
+"https://deb.torproject.org/torproject.org <DISTRIBUTION> main"
msgstr ""
#: https//support.torproject.org/apt/tor-deb-repo/
@@ -11026,14 +12024,16 @@ msgstr ""
#: https//support.torproject.org/apt/tor-deb-repo/
#: (content/apt/apt-1/contents+en.lrquestion.description)
msgid ""
-"deb https://deb.torproject.org/torproject.org tor-"
+"deb [signed-by=/usr/share/keyrings/tor-archive-keyring.gpg] "
+"https://deb.torproject.org/torproject.org tor-"
"experimental-0.4.6.x-<DISTRIBUTION> main"
msgstr ""
#: https//support.torproject.org/apt/tor-deb-repo/
#: (content/apt/apt-1/contents+en.lrquestion.description)
msgid ""
-"deb-src https://deb.torproject.org/torproject.org tor-"
+"deb-src [signed-by=/usr/share/keyrings/tor-archive-keyring.gpg] "
+"https://deb.torproject.org/torproject.org tor-"
"experimental-0.4.6.x-<DISTRIBUTION> main"
msgstr ""
@@ -11045,15 +12045,17 @@ msgstr ""
#: https//support.torproject.org/apt/tor-deb-repo/
#: (content/apt/apt-1/contents+en.lrquestion.description)
msgid ""
-"deb https://deb.torproject.org/torproject.org tor-nightly-"
-"master-<DISTRIBUTION> main"
+"deb [signed-by=/usr/share/keyrings/tor-archive-keyring.gpg] "
+"https://deb.torproject.org/torproject.org tor-nightly-master-<DISTRIBUTION> "
+"main"
msgstr ""
#: https//support.torproject.org/apt/tor-deb-repo/
#: (content/apt/apt-1/contents+en.lrquestion.description)
msgid ""
-"deb-src https://deb.torproject.org/torproject.org tor-nightly-"
-"master-<DISTRIBUTION> main"
+"deb-src [signed-by=/usr/share/keyrings/tor-archive-keyring.gpg] "
+"https://deb.torproject.org/torproject.org tor-nightly-master-<DISTRIBUTION> "
+"main"
msgstr ""
#: https//support.torproject.org/apt/tor-deb-repo/
@@ -11074,13 +12076,15 @@ msgstr ""
#: https//support.torproject.org/apt/tor-deb-repo/
#: (content/apt/apt-1/contents+en.lrquestion.description)
msgid ""
-"deb [arch=amd64] https://deb.torproject.org/torproject.org focal main"
+"deb [arch=amd64 signed-by=/usr/share/keyrings/tor-archive-keyring.gpg] "
+"https://deb.torproject.org/torproject.org focal main"
msgstr ""
#: https//support.torproject.org/apt/tor-deb-repo/
#: (content/apt/apt-1/contents+en.lrquestion.description)
msgid ""
-"deb-src [arch=amd64] https://deb.torproject.org/torproject.org focal main"
+"deb-src [arch=amd64 signed-by=/usr/share/keyrings/tor-archive-keyring.gpg] "
+"https://deb.torproject.org/torproject.org focal main"
msgstr ""
#: https//support.torproject.org/apt/tor-deb-repo/
@@ -11100,21 +12104,16 @@ msgstr ""
#: (content/apt/apt-1/contents+en.lrquestion.description)
msgid ""
"#### 3. Then add the gpg key used to sign the packages by running the "
-"following commands at your command prompt"
+"following command at your command prompt:"
msgstr ""
#: https//support.torproject.org/apt/tor-deb-repo/
#: (content/apt/apt-1/contents+en.lrquestion.description)
msgid ""
-"# wget -qO- "
+"# wget -O- "
"https://deb.torproject.org/torproject.org/A3C4F0F979CAA22CDBA8F512EE8CBC9E886DDD89.asc"
-" | gpg --import"
-msgstr ""
-
-#: https//support.torproject.org/apt/tor-deb-repo/
-#: (content/apt/apt-1/contents+en.lrquestion.description)
-msgid ""
-"# gpg --export A3C4F0F979CAA22CDBA8F512EE8CBC9E886DDD89 | apt-key add -"
+" | gpg --dearmor | tee /usr/share/keyrings/tor-archive-keyring.gpg "
+">/dev/null"
msgstr ""
#: https//support.torproject.org/apt/tor-deb-repo/
@@ -12721,6 +13720,82 @@ msgid ""
"doesn't change IP address over the day."
msgstr ""
+#: https//support.torproject.org/alternate-designs/block-websites/
+#: (content/alternate-designs/block-websites/contents+en.lrquestion.title)
+msgid "Exit policies should be able to block websites, not just IP addresses."
+msgstr ""
+
+#: https//support.torproject.org/alternate-designs/block-websites/
+#: (content/alternate-designs/block-websites/contents+en.lrquestion.description)
+msgid ""
+"It would be nice to let relay operators say things like `reject "
+"www.slashdot.org` in their exit policies, rather than requiring them to "
+"learn all the IP address space that could be covered by the site (and then "
+"also blocking other sites at those IP addresses)."
+msgstr ""
+
+#: https//support.torproject.org/alternate-designs/block-websites/
+#: (content/alternate-designs/block-websites/contents+en.lrquestion.description)
+msgid "There are two problems, though."
+msgstr ""
+
+#: https//support.torproject.org/alternate-designs/block-websites/
+#: (content/alternate-designs/block-websites/contents+en.lrquestion.description)
+msgid "First, users could still get around these blocks."
+msgstr ""
+
+#: https//support.torproject.org/alternate-designs/block-websites/
+#: (content/alternate-designs/block-websites/contents+en.lrquestion.description)
+msgid ""
+"For example, they could request the IP address rather than the hostname when"
+" they exit from the Tor network."
+msgstr ""
+
+#: https//support.torproject.org/alternate-designs/block-websites/
+#: (content/alternate-designs/block-websites/contents+en.lrquestion.description)
+msgid ""
+"This means operators would still need to learn all the IP addresses for the "
+"destinations in question."
+msgstr ""
+
+#: https//support.torproject.org/alternate-designs/block-websites/
+#: (content/alternate-designs/block-websites/contents+en.lrquestion.description)
+msgid ""
+"The second problem is that it would allow remote attackers to censor "
+"arbitrary sites."
+msgstr ""
+
+#: https//support.torproject.org/alternate-designs/block-websites/
+#: (content/alternate-designs/block-websites/contents+en.lrquestion.description)
+msgid ""
+"For example, if a Tor operator blocks www1.slashdot.org, and then some "
+"attacker poisons the Tor relay's DNS or otherwise changes that hostname to "
+"resolve to the IP address for a major news site, then suddenly that Tor "
+"relay is blocking the news site."
+msgstr ""
+
+#: https//support.torproject.org/alternate-designs/let-the-network-pick-the-path/
+#: (content/alternate-designs/let-the-network-pick-the-path/contents+en.lrquestion.title)
+msgid "You should let the network pick the path, not the client."
+msgstr ""
+
+#: https//support.torproject.org/alternate-designs/let-the-network-pick-the-path/
+#: (content/alternate-designs/let-the-network-pick-the-path/contents+en.lrquestion.description)
+msgid "No, you cannot trust the network to pick the path."
+msgstr ""
+
+#: https//support.torproject.org/alternate-designs/let-the-network-pick-the-path/
+#: (content/alternate-designs/let-the-network-pick-the-path/contents+en.lrquestion.description)
+msgid "Malicious relays could route you through their colluding friends."
+msgstr ""
+
+#: https//support.torproject.org/alternate-designs/let-the-network-pick-the-path/
+#: (content/alternate-designs/let-the-network-pick-the-path/contents+en.lrquestion.description)
+msgid ""
+"This would give an adversary the ability to watch all of your traffic end to"
+" end."
+msgstr ""
+
#: lego/templates/banner.html:3 lego/templates/banner.html:5
#: templates/banner.html:3 templates/banner.html:5
msgid "Close banner"
@@ -12751,8 +13826,8 @@ msgid "DONATE NOW"
msgstr "DOAR AGORA"
#: lego/templates/footer.html:13 lego/templates/footer.html:22
-#: lego/templates/navbar.html:83 templates/footer.html:13
-#: templates/footer.html:22 templates/navbar.html:83
+#: lego/templates/navbar.html:95 templates/footer.html:13
+#: templates/footer.html:22 templates/navbar.html:95
msgid "Download Tor Browser"
msgstr "Transferir o Tor Browser"
diff --git a/contents+ro.po b/contents+ro.po
index 6bb5f3cd79..b6173c822e 100644
--- a/contents+ro.po
+++ b/contents+ro.po
@@ -16,7 +16,7 @@ msgid ""
msgstr ""
"Project-Id-Version: PACKAGE VERSION\n"
"Report-Msgid-Bugs-To: \n"
-"POT-Creation-Date: 2021-08-25 11:14+CET\n"
+"POT-Creation-Date: 2021-09-01 12:20+CET\n"
"PO-Revision-Date: 2018-10-02 22:41+0000\n"
"Last-Translator: eduard pintilie <eduard.pintilie at gmail.com>, 2021\n"
"Language-Team: Romanian (https://www.transifex.com/otf/teams/1519/ro/)\n"
@@ -149,6 +149,11 @@ msgstr ""
msgid "Tor Metrics"
msgstr "Tor Metrics"
+#: https//support.torproject.org/alternate-designs/
+#: (content/alternate-designs/contents+en.lrtopic.title)
+msgid "Alternate Designs We Don't Do (Yet)"
+msgstr ""
+
#: https//support.torproject.org/glossary/add-on-extension-or-plugin/
#: (content/glossary/add-on-extension-or-plugin/contents+en.lrword.term)
msgid "add-on, extension, or plugin"
@@ -2416,6 +2421,61 @@ msgstr ""
"PuteÈi gÄsi informaÈii mai detaliate despre Tor + VPN pe [wiki-ul "
"nostru](https://trac.torproject.org/projects/tor/wiki/doc/TorPlusVPN)."
+#: https//support.torproject.org/faq/relay-donations/
+#: (content/faq/relay-donations/contents+en.lrquestion.title)
+msgid "Can I donate for a relay rather than run my own?"
+msgstr ""
+
+#: https//support.torproject.org/faq/relay-donations/
+#: (content/faq/relay-donations/contents+en.lrquestion.description)
+msgid ""
+"Sure! We have a [list of organizations that run Tor "
+"relays](https://community.torproject.org/relay/community-resources/relay-"
+"associations/) that are happy to turn your donations into better speed and "
+"anonymity for the Tor network."
+msgstr ""
+
+#: https//support.torproject.org/faq/relay-donations/
+#: (content/faq/relay-donations/contents+en.lrquestion.description)
+msgid ""
+"These organizations are not the same as [The Tor Project, "
+"Inc](https://donate.torproject.org/), but we consider that a good thing."
+msgstr ""
+
+#: https//support.torproject.org/faq/relay-donations/
+#: (content/faq/relay-donations/contents+en.lrquestion.description)
+msgid "They're run by nice people who are part of the Tor community."
+msgstr "Sunt conduse de oameni simpli care fac parte din comunitatea Tor."
+
+#: https//support.torproject.org/faq/relay-donations/
+#: (content/faq/relay-donations/contents+en.lrquestion.description)
+msgid ""
+"Note that there can be a tradeoff here between anonymity and performance."
+msgstr ""
+
+#: https//support.torproject.org/faq/relay-donations/
+#: (content/faq/relay-donations/contents+en.lrquestion.description)
+msgid ""
+"The Tor network's anonymity comes in part from diversity, so if you are in a"
+" position to run your own relay, you will be improving Tor's anonymity more "
+"than by donating."
+msgstr ""
+
+#: https//support.torproject.org/faq/relay-donations/
+#: (content/faq/relay-donations/contents+en.lrquestion.description)
+msgid ""
+"At the same time though, economies of scale for bandwidth mean that "
+"combining many small donations into several larger relays is more efficient "
+"at improving network performance."
+msgstr ""
+
+#: https//support.torproject.org/faq/relay-donations/
+#: (content/faq/relay-donations/contents+en.lrquestion.description)
+msgid ""
+"Improving anonymity and improving performance are both worthwhile goals, so "
+"however you can help is great!"
+msgstr ""
+
#: https//support.torproject.org/faq/staying-anonymous/
#: (content/faq/staying-anonymous/contents+en.lrquestion.title)
msgid "Am I totally anonymous if I use Tor?"
@@ -2726,6 +2786,61 @@ msgid ""
" documenting all the issues](https://community.torproject.org/)."
msgstr ""
+#: https//support.torproject.org/about/attacks-on-onion-routing/
+#: (content/about/attacks-on-onion-routing/contents+en.lrquestion.title)
+msgid "What attacks remain against onion routing?"
+msgstr ""
+
+#: https//support.torproject.org/about/attacks-on-onion-routing/
+#: (content/about/attacks-on-onion-routing/contents+en.lrquestion.description)
+msgid ""
+"As mentioned above, it is possible for an observer who can view both you and"
+" either the destination website or your Tor exit node to correlate timings "
+"of your traffic as it enters the Tor network and also as it exits."
+msgstr ""
+
+#: https//support.torproject.org/about/attacks-on-onion-routing/
+#: (content/about/attacks-on-onion-routing/contents+en.lrquestion.description)
+msgid "Tor does not defend against such a threat model."
+msgstr ""
+
+#: https//support.torproject.org/about/attacks-on-onion-routing/
+#: (content/about/attacks-on-onion-routing/contents+en.lrquestion.description)
+msgid ""
+"In a more limited sense, note that if a censor or law enforcement agency has"
+" the ability to obtain specific observation of parts of the network, it is "
+"possible for them to verify a suspicion that you talk regularly to your "
+"friend by observing traffic at both ends and correlating the timing of only "
+"that traffic."
+msgstr ""
+
+#: https//support.torproject.org/about/attacks-on-onion-routing/
+#: (content/about/attacks-on-onion-routing/contents+en.lrquestion.description)
+msgid ""
+"Again, this is only useful to verify that parties already suspected of "
+"communicating with one another are doing so."
+msgstr ""
+
+#: https//support.torproject.org/about/attacks-on-onion-routing/
+#: (content/about/attacks-on-onion-routing/contents+en.lrquestion.description)
+msgid ""
+"In most countries, the suspicion required to obtain a warrant already "
+"carries more weight than timing correlation would provide."
+msgstr ""
+
+#: https//support.torproject.org/about/attacks-on-onion-routing/
+#: (content/about/attacks-on-onion-routing/contents+en.lrquestion.description)
+msgid ""
+"Furthermore, since Tor reuses circuits for multiple TCP connections, it is "
+"possible to associate non anonymous and anonymous traffic at a given exit "
+"node, so be careful about what applications you run concurrently over Tor."
+msgstr ""
+
+#: https//support.torproject.org/about/attacks-on-onion-routing/
+#: (content/about/attacks-on-onion-routing/contents+en.lrquestion.description)
+msgid "Perhaps even run separate Tor clients for these applications."
+msgstr ""
+
#: https//support.torproject.org/about/backdoor/
#: (content/about/backdoor/contents+en.lrquestion.title)
msgid "Is there a backdoor in Tor?"
@@ -2898,6 +3013,43 @@ msgstr ""
"Folosirea Tor cu alte browsere este [periculoasÄ Èi nu este "
"recomandatÄ](/ro/tbb/tbb-9/)."
+#: https//support.torproject.org/about/change-paths/
+#: (content/about/change-paths/contents+en.lrquestion.title)
+msgid "How often does Tor change its paths?"
+msgstr ""
+
+#: https//support.torproject.org/about/change-paths/
+#: (content/about/change-paths/contents+en.lrquestion.description)
+msgid ""
+"Tor will reuse the same circuit for new TCP streams for 10 minutes, as long "
+"as the circuit is working fine."
+msgstr ""
+
+#: https//support.torproject.org/about/change-paths/
+#: (content/about/change-paths/contents+en.lrquestion.description)
+msgid "(If the circuit fails, Tor will switch to a new circuit immediately.)"
+msgstr ""
+
+#: https//support.torproject.org/about/change-paths/
+#: (content/about/change-paths/contents+en.lrquestion.description)
+msgid ""
+"But note that a single TCP stream (e.g. a long IRC connection) will stay on "
+"the same circuit forever."
+msgstr ""
+
+#: https//support.torproject.org/about/change-paths/
+#: (content/about/change-paths/contents+en.lrquestion.description)
+msgid "We don't rotate individual streams from one circuit to the next."
+msgstr ""
+
+#: https//support.torproject.org/about/change-paths/
+#: (content/about/change-paths/contents+en.lrquestion.description)
+msgid ""
+"Otherwise, an adversary with a partial view of the network would be given "
+"many chances over time to link you to your destination, rather than just one"
+" chance."
+msgstr ""
+
#: https//support.torproject.org/about/distribute-tor/
#: (content/about/distribute-tor/contents+en.lrquestion.title)
msgid "Can I distribute Tor?"
@@ -3015,6 +3167,133 @@ msgstr ""
"ConsultaÈi [întrebÄrile noastre referitoare la mÄrcile "
"comerciale](https://www.torproject.org/about/trademark/) pentru detalii."
+#: https//support.torproject.org/about/entry-guards/
+#: (content/about/entry-guards/contents+en.lrquestion.title)
+msgid "What are Entry Guards?"
+msgstr ""
+
+#: https//support.torproject.org/about/entry-guards/
+#: (content/about/entry-guards/contents+en.lrquestion.description)
+msgid ""
+"Tor (like all current practical low-latency anonymity designs) fails when "
+"the attacker can see both ends of the communications channel."
+msgstr ""
+
+#: https//support.torproject.org/about/entry-guards/
+#: (content/about/entry-guards/contents+en.lrquestion.description)
+msgid ""
+"For example, suppose the attacker controls or watches the Tor relay you "
+"choose to enter the network, and also controls or watches the website you "
+"visit."
+msgstr ""
+
+#: https//support.torproject.org/about/entry-guards/
+#: (content/about/entry-guards/contents+en.lrquestion.description)
+msgid ""
+"In this case, the research community knows no practical low-latency design "
+"that can reliably stop the attacker from correlating volume and timing "
+"information on the two sides."
+msgstr ""
+
+#: https//support.torproject.org/about/entry-guards/
+#: (content/about/entry-guards/contents+en.lrquestion.description)
+msgid "So, what should we do?"
+msgstr ""
+
+#: https//support.torproject.org/about/entry-guards/
+#: (content/about/entry-guards/contents+en.lrquestion.description)
+msgid "Suppose the attacker controls, or can observe, C relays."
+msgstr ""
+
+#: https//support.torproject.org/about/entry-guards/
+#: (content/about/entry-guards/contents+en.lrquestion.description)
+msgid "Suppose there are N relays total."
+msgstr ""
+
+#: https//support.torproject.org/about/entry-guards/
+#: (content/about/entry-guards/contents+en.lrquestion.description)
+msgid ""
+"If you select new entry and exit relays each time you use the network, the "
+"attacker will be able to correlate all traffic you send with probability "
+"around (c/n)2."
+msgstr ""
+
+#: https//support.torproject.org/about/entry-guards/
+#: (content/about/entry-guards/contents+en.lrquestion.description)
+msgid ""
+"But profiling is, for most users, as bad as being traced all the time: they "
+"want to do something often without an attacker noticing, and the attacker "
+"noticing once is as bad as the attacker noticing more often."
+msgstr ""
+
+#: https//support.torproject.org/about/entry-guards/
+#: (content/about/entry-guards/contents+en.lrquestion.description)
+msgid ""
+"Thus, choosing many random entries and exits gives the user no chance of "
+"escaping profiling by this kind of attacker."
+msgstr ""
+
+#: https//support.torproject.org/about/entry-guards/
+#: (content/about/entry-guards/contents+en.lrquestion.description)
+msgid ""
+"The solution is \"entry guards\": each Tor client selects a few relays at "
+"random to use as entry points, and uses only those relays for their first "
+"hop."
+msgstr ""
+
+#: https//support.torproject.org/about/entry-guards/
+#: (content/about/entry-guards/contents+en.lrquestion.description)
+msgid ""
+"If those relays are not controlled or observed, the attacker can't win, "
+"ever, and the user is secure."
+msgstr ""
+
+#: https//support.torproject.org/about/entry-guards/
+#: (content/about/entry-guards/contents+en.lrquestion.description)
+msgid ""
+"If those relays are observed or controlled by the attacker, the attacker "
+"sees a larger fraction of the user's traffic - but still the user is no more"
+" profiled than before."
+msgstr ""
+
+#: https//support.torproject.org/about/entry-guards/
+#: (content/about/entry-guards/contents+en.lrquestion.description)
+msgid ""
+"Thus, the user has some chance (on the order of (n-c)/n) of avoiding "
+"profiling, whereas they had none before."
+msgstr ""
+
+#: https//support.torproject.org/about/entry-guards/
+#: (content/about/entry-guards/contents+en.lrquestion.description)
+msgid ""
+"You can read more at [An Analysis of the Degradation of Anonymous "
+"Protocols](http://freehaven.net/anonbib/#wright02), [Defending Anonymous "
+"Communication Against Passive Logging "
+"Attacks](http://freehaven.net/anonbib/#wright03), and especially [Locating "
+"Hidden Servers](http://freehaven.net/anonbib/#hs-attack06)."
+msgstr ""
+
+#: https//support.torproject.org/about/entry-guards/
+#: (content/about/entry-guards/contents+en.lrquestion.description)
+msgid ""
+"Restricting your entry nodes may also help against attackers who want to run"
+" a few Tor nodes and easily enumerate all of the Tor user IP addresses."
+msgstr ""
+
+#: https//support.torproject.org/about/entry-guards/
+#: (content/about/entry-guards/contents+en.lrquestion.description)
+msgid ""
+"(Even though they can't learn what destinations the users are talking to, "
+"they still might be able to do bad things with just a list of users.)"
+msgstr ""
+
+#: https//support.torproject.org/about/entry-guards/
+#: (content/about/entry-guards/contents+en.lrquestion.description)
+msgid ""
+"However, that feature won't really become useful until we move to a "
+"\"directory guard\" design as well."
+msgstr ""
+
#: https//support.torproject.org/about/how-is-tor-different-from-other-proxies/
#: (content/about/how-is-tor-different-from-other-proxies/contents+en.lrquestion.title)
msgid "How is Tor different from other proxies?"
@@ -3214,6 +3493,162 @@ msgstr ""
"VedeÈi aceastÄ vizualizare a [Tor Èi HTTPS](/ro/https/https-1/) pentru a "
"înÈelege cum interacÈioneazÄ Tor Èi HTTPS."
+#: https//support.torproject.org/about/key-management/
+#: (content/about/key-management/contents+en.lrquestion.title)
+msgid "Tell me about all the keys Tor uses"
+msgstr ""
+
+#: https//support.torproject.org/about/key-management/
+#: (content/about/key-management/contents+en.lrquestion.description)
+msgid ""
+"Tor uses a variety of different keys, with three goals in mind: 1) "
+"encryption to ensure privacy of data within the Tor network, 2) "
+"authentication so clients know they're talking to the relays they meant to "
+"talk to, and 3) signatures to make sure all clients know the same set of "
+"relays."
+msgstr ""
+
+#: https//support.torproject.org/about/key-management/
+#: (content/about/key-management/contents+en.lrquestion.description)
+msgid ""
+"**Encryption**: first, all connections in Tor use TLS link encryption, so "
+"observers can't look inside to see which circuit a given cell is intended "
+"for."
+msgstr ""
+
+#: https//support.torproject.org/about/key-management/
+#: (content/about/key-management/contents+en.lrquestion.description)
+msgid ""
+"Further, the Tor client establishes an ephemeral encryption key with each "
+"relay in the circuit; these extra layers of encryption mean that only the "
+"exit relay can read the cells."
+msgstr ""
+
+#: https//support.torproject.org/about/key-management/
+#: (content/about/key-management/contents+en.lrquestion.description)
+msgid ""
+"Both sides discard the circuit key when the circuit ends, so logging traffic"
+" and then breaking into the relay to discover the key won't work."
+msgstr ""
+
+#: https//support.torproject.org/about/key-management/
+#: (content/about/key-management/contents+en.lrquestion.description)
+msgid ""
+"**Authentication**: Every Tor relay has a public decryption key called the "
+"\"onion key\"."
+msgstr ""
+
+#: https//support.torproject.org/about/key-management/
+#: (content/about/key-management/contents+en.lrquestion.description)
+msgid "Each relay rotates its onion key once a week."
+msgstr ""
+
+#: https//support.torproject.org/about/key-management/
+#: (content/about/key-management/contents+en.lrquestion.description)
+msgid ""
+"When the Tor client establishes circuits, at each step it [demands that the "
+"Tor relay prove knowledge of its onion key](https://svn-"
+"archive.torproject.org/svn/projects/design-paper/tor-"
+"design.html#subsec:circuits)."
+msgstr ""
+
+#: https//support.torproject.org/about/key-management/
+#: (content/about/key-management/contents+en.lrquestion.description)
+msgid ""
+"That way the first node in the path can't just spoof the rest of the path."
+msgstr ""
+
+#: https//support.torproject.org/about/key-management/
+#: (content/about/key-management/contents+en.lrquestion.description)
+msgid ""
+"Because the Tor client chooses the path, it can make sure to get Tor's "
+"\"distributed trust\" property: no single relay in the path can know about "
+"both the client and what the client is doing."
+msgstr ""
+
+#: https//support.torproject.org/about/key-management/
+#: (content/about/key-management/contents+en.lrquestion.description)
+msgid ""
+"**Coordination**: How do clients know what the relays are, and how do they "
+"know that they have the right keys for them?"
+msgstr ""
+
+#: https//support.torproject.org/about/key-management/
+#: (content/about/key-management/contents+en.lrquestion.description)
+msgid "Each relay has a long-term public signing key called the \"identity key\"."
+msgstr ""
+
+#: https//support.torproject.org/about/key-management/
+#: (content/about/key-management/contents+en.lrquestion.description)
+msgid "Each directory authority additionally has a \"directory signing key\"."
+msgstr ""
+
+#: https//support.torproject.org/about/key-management/
+#: (content/about/key-management/contents+en.lrquestion.description)
+msgid ""
+"The directory authorities [provide a signed "
+"list](https://gitweb.torproject.org/torspec.git/tree/dir-spec.txt) of all "
+"the known relays, and in that list are a set of certificates from each relay"
+" (self-signed by their identity key) specifying their keys, locations, exit "
+"policies, and so on."
+msgstr ""
+
+#: https//support.torproject.org/about/key-management/
+#: (content/about/key-management/contents+en.lrquestion.description)
+msgid ""
+"So unless the adversary can control a majority of the directory authorities "
+"(as of 2021 there are 10 directory authorities), they can't trick the Tor "
+"client into using other Tor relays."
+msgstr ""
+
+#: https//support.torproject.org/about/key-management/
+#: (content/about/key-management/contents+en.lrquestion.description)
+msgid "How do clients know what the directory authorities are?"
+msgstr ""
+
+#: https//support.torproject.org/about/key-management/
+#: (content/about/key-management/contents+en.lrquestion.description)
+msgid ""
+"The Tor software comes with a built-in list of location and public key for "
+"each directory authority."
+msgstr ""
+
+#: https//support.torproject.org/about/key-management/
+#: (content/about/key-management/contents+en.lrquestion.description)
+msgid ""
+"So the only way to trick users into using a fake Tor network is to give them"
+" a specially modified version of the software."
+msgstr ""
+
+#: https//support.torproject.org/about/key-management/
+#: (content/about/key-management/contents+en.lrquestion.description)
+msgid "How do users know they've got the right software?"
+msgstr ""
+
+#: https//support.torproject.org/about/key-management/
+#: (content/about/key-management/contents+en.lrquestion.description)
+msgid ""
+"When we distribute the source code or a package, we digitally sign it with "
+"[GNU Privacy Guard](http://www.gnupg.org/). See the [instructions on how to "
+"check Tor Browser's signature](https://support.torproject.org/tbb/how-to-"
+"verify-signature/)."
+msgstr ""
+
+#: https//support.torproject.org/about/key-management/
+#: (content/about/key-management/contents+en.lrquestion.description)
+msgid ""
+"In order to be certain that it's really signed by us, you need to have met "
+"us in person and gotten a copy of our GPG key fingerprint, or you need to "
+"know somebody who has."
+msgstr ""
+
+#: https//support.torproject.org/about/key-management/
+#: (content/about/key-management/contents+en.lrquestion.description)
+msgid ""
+"If you're concerned about an attack on this level, we recommend you get "
+"involved with the security community and start meeting people."
+msgstr ""
+
#: https//support.torproject.org/about/no-data-scrubbing/
#: (content/about/no-data-scrubbing/contents+en.lrquestion.title)
msgid ""
@@ -3254,6 +3689,151 @@ msgstr ""
"Tor Browser nu poate face nimic cu privire la textul pe care îl introduceÈi "
"în formulare."
+#: https//support.torproject.org/about/protections/
+#: (content/about/protections/contents+en.lrquestion.title)
+msgid "What protections does Tor provide?"
+msgstr ""
+
+#: https//support.torproject.org/about/protections/
+#: (content/about/protections/contents+en.lrquestion.description)
+msgid ""
+"Internet communication is based on a store-and-forward model that can be "
+"understood in analogy to postal mail: Data is transmitted in blocks called "
+"IP datagrams or packets."
+msgstr ""
+
+#: https//support.torproject.org/about/protections/
+#: (content/about/protections/contents+en.lrquestion.description)
+msgid ""
+"Every packet includes a source IP address (of the sender) and a destination "
+"IP address (of the receiver), just as ordinary letters contain postal "
+"addresses of sender and receiver."
+msgstr ""
+
+#: https//support.torproject.org/about/protections/
+#: (content/about/protections/contents+en.lrquestion.description)
+msgid ""
+"The way from sender to receiver involves multiple hops of routers, where "
+"each router inspects the destination IP address and forwards the packet "
+"closer to its destination."
+msgstr ""
+
+#: https//support.torproject.org/about/protections/
+#: (content/about/protections/contents+en.lrquestion.description)
+msgid ""
+"Thus, every router between sender and receiver learns that the sender is "
+"communicating with the receiver."
+msgstr ""
+
+#: https//support.torproject.org/about/protections/
+#: (content/about/protections/contents+en.lrquestion.description)
+msgid ""
+"In particular, your local ISP is in the position to build a complete profile"
+" of your Internet usage."
+msgstr ""
+
+#: https//support.torproject.org/about/protections/
+#: (content/about/protections/contents+en.lrquestion.description)
+msgid ""
+"In addition, every server in the Internet that can see any of the packets "
+"can profile your behavior."
+msgstr ""
+
+#: https//support.torproject.org/about/protections/
+#: (content/about/protections/contents+en.lrquestion.description)
+msgid ""
+"The aim of Tor is to improve your privacy by sending your traffic through a "
+"series of proxies."
+msgstr ""
+
+#: https//support.torproject.org/about/protections/
+#: (content/about/protections/contents+en.lrquestion.description)
+msgid ""
+"Your communication is encrypted in multiple layers and routed via multiple "
+"hops through the Tor network to the final receiver."
+msgstr ""
+
+#: https//support.torproject.org/about/protections/
+#: (content/about/protections/contents+en.lrquestion.description)
+msgid ""
+"More details on this process can be found in this "
+"[visualization](https://support.torproject.org/https/https-1/)."
+msgstr ""
+
+#: https//support.torproject.org/about/protections/
+#: (content/about/protections/contents+en.lrquestion.description)
+msgid ""
+"Note that all your local ISP can observe now is that you are communicating "
+"with Tor nodes."
+msgstr ""
+
+#: https//support.torproject.org/about/protections/
+#: (content/about/protections/contents+en.lrquestion.description)
+msgid ""
+"Similarly, servers in the Internet just see that they are being contacted by"
+" Tor nodes."
+msgstr ""
+
+#: https//support.torproject.org/about/protections/
+#: (content/about/protections/contents+en.lrquestion.description)
+msgid "Generally speaking, Tor aims to solve three privacy problems:"
+msgstr ""
+
+#: https//support.torproject.org/about/protections/
+#: (content/about/protections/contents+en.lrquestion.description)
+msgid ""
+"First, Tor prevents websites and other services from learning your location,"
+" which they can use to build databases about your habits and interests."
+msgstr ""
+
+#: https//support.torproject.org/about/protections/
+#: (content/about/protections/contents+en.lrquestion.description)
+msgid ""
+"With Tor, your Internet connections don't give you away by default -- now "
+"you can have the ability to choose, for each connection, how much "
+"information to reveal."
+msgstr ""
+
+#: https//support.torproject.org/about/protections/
+#: (content/about/protections/contents+en.lrquestion.description)
+msgid ""
+"Second, Tor prevents people watching your traffic locally (such as your ISP "
+"or someone with access to your home wifi or router) from learning what "
+"information you're fetching and where you're fetching it from."
+msgstr ""
+
+#: https//support.torproject.org/about/protections/
+#: (content/about/protections/contents+en.lrquestion.description)
+msgid ""
+"It also stops them from deciding what you're allowed to learn and publish --"
+" if you can get to any part of the Tor network, you can reach any site on "
+"the Internet."
+msgstr ""
+
+#: https//support.torproject.org/about/protections/
+#: (content/about/protections/contents+en.lrquestion.description)
+msgid ""
+"Third, Tor routes your connection through more than one Tor relay so no "
+"single relay can learn what you're up to."
+msgstr ""
+
+#: https//support.torproject.org/about/protections/
+#: (content/about/protections/contents+en.lrquestion.description)
+msgid ""
+"Because these relays are run by different individuals or organizations, "
+"distributing trust provides more security than the old [one hop "
+"proxy](https://support.torproject.org/about/#how-is-tor-different-from-"
+"other-proxies) approach."
+msgstr ""
+
+#: https//support.torproject.org/about/protections/
+#: (content/about/protections/contents+en.lrquestion.description)
+msgid ""
+"Note, however, that there are situations where Tor fails to solve these "
+"privacy problems entirely: see the entry below on [remaining "
+"attacks](https://support.torproject.org/about/#attacks-on-onion-routing)."
+msgstr ""
+
#: https//support.torproject.org/about/what-is-tor/
#: (content/about/what-is-tor/contents+en.lrquestion.title)
msgid "What is Tor?"
@@ -5847,15 +6427,12 @@ msgstr ""
#: (content/tbb/tbb-47/contents+en.lrquestion.description)
msgid ""
"Also, read up on the HTTPProxyAuthenticator and HTTPSProxyAuthenticator "
-"options if your proxy requires auth. We only support basic auth currently, "
-"but if you need NTLM authentication, you may find [this post in the "
-"archives](https://archives.seul.org/or/talk/Jun-2005/msg00223.html) useful."
+"options if your [proxy requires auth.](https://developer.mozilla.org/en-"
+"US/docs/Web/HTTP/Headers/Proxy-Authenticate) We only support basic auth "
+"currently, but if you need NTLM authentication, you may find [this post in "
+"the archives](https://archives.seul.org/or/talk/Jun-2005/msg00223.html) "
+"useful."
msgstr ""
-"De asemenea, citiÈi opÈiunile HTTPProxyAuthenticator Èi "
-"HTTPSProxyAuthenticator dacÄ proxy-ul dvs. necesitÄ autentificare. Ãn "
-"prezent acceptÄm numai autentificarea de bazÄ, dar dacÄ aveÈi nevoie de "
-"autentificare NTLM, puteÈi gÄsi utilÄ [aceastÄ postare în "
-"arhive](https://archives.seul.org/or/talk/Jun-2005/msg00223.html)."
#: https//support.torproject.org/tbb/tbb-47/
#: (content/tbb/tbb-47/contents+en.lrquestion.description)
@@ -6139,6 +6716,219 @@ msgstr ""
"Nu uitaÈi, toate liniile care încep cu `#` în torrc sunt tratate ca Èi "
"comentarii Èi nu au niciun efect asupra configuraÈiei lui Tor."
+#: https//support.torproject.org/tbb/tbb-firewall-ports/
+#: (content/tbb/tbb-firewall-ports/contents+en.lrquestion.title)
+msgid "My firewall only allows a few outgoing ports"
+msgstr ""
+
+#: https//support.torproject.org/tbb/tbb-firewall-ports/
+#: (content/tbb/tbb-firewall-ports/contents+en.lrquestion.description)
+msgid ""
+"If your firewall works by blocking ports, then you can tell Tor to only use "
+"the ports when you start your Tor Browser."
+msgstr ""
+
+#: https//support.torproject.org/tbb/tbb-firewall-ports/
+#: (content/tbb/tbb-firewall-ports/contents+en.lrquestion.description)
+msgid ""
+"Or you can add the ports that your firewall permits by adding "
+"\"FascistFirewall 1\" to your torrc configuration file."
+msgstr ""
+
+#: https//support.torproject.org/tbb/tbb-firewall-ports/
+#: (content/tbb/tbb-firewall-ports/contents+en.lrquestion.description)
+msgid ""
+"By default, when you set this Tor assumes that your firewall allows only "
+"port 80 and port 443 (HTTP and HTTPS respectively)."
+msgstr ""
+
+#: https//support.torproject.org/tbb/tbb-firewall-ports/
+#: (content/tbb/tbb-firewall-ports/contents+en.lrquestion.description)
+msgid ""
+"You can select a different set of ports with the FirewallPorts torrc option."
+msgstr ""
+
+#: https//support.torproject.org/tbb/tbb-firewall-ports/
+#: (content/tbb/tbb-firewall-ports/contents+en.lrquestion.description)
+msgid ""
+"If you want to be more fine-grained with your controls, you can also use the"
+" ReachableAddresses config options, e.g.:"
+msgstr ""
+
+#: https//support.torproject.org/tbb/tbb-firewall-ports/
+#: (content/tbb/tbb-firewall-ports/contents+en.lrquestion.description)
+#: https//support.torproject.org/tbb/tbb-install-tor-central-server/
+#: (content/tbb/tbb-install-tor-central-server/contents+en.lrquestion.description)
+#: https//support.torproject.org/operators/default-exit-ports/
+#: (content/operators/default-exit-ports/contents+en.lrquestion.description)
+#: https//support.torproject.org/operators/hibernation/
+#: (content/operators/hibernation/contents+en.lrquestion.description)
+#: https//support.torproject.org/operators/limit-total-bandwidth/
+#: (content/operators/limit-total-bandwidth/contents+en.lrquestion.description)
+#: https//support.torproject.org/misc/bug-or-feedback/
+#: (content/misc/bug-or-feedback/contents+en.lrquestion.description)
+#: https//support.torproject.org/get-in-touch/why-i-cant-join-tor-channels/
+#: (content/get-in-touch/why-i-cant-join-tor-channels/contents+en.lrquestion.description)
+#: https//support.torproject.org/apt/tor-deb-repo/
+#: (content/apt/apt-1/contents+en.lrquestion.description)
+#: https//support.torproject.org/apt/apt-over-tor/
+#: (content/apt/apt-3/contents+en.lrquestion.description)
+msgid "```"
+msgstr "```"
+
+#: https//support.torproject.org/tbb/tbb-firewall-ports/
+#: (content/tbb/tbb-firewall-ports/contents+en.lrquestion.description)
+msgid "ReachableDirAddresses *:80"
+msgstr ""
+
+#: https//support.torproject.org/tbb/tbb-firewall-ports/
+#: (content/tbb/tbb-firewall-ports/contents+en.lrquestion.description)
+msgid "ReachableORAddresses *:443"
+msgstr ""
+
+#: https//support.torproject.org/tbb/tbb-install-tor-central-server/
+#: (content/tbb/tbb-install-tor-central-server/contents+en.lrquestion.title)
+msgid ""
+"Can I install Tor on a central server, and have my clients connect to it?"
+msgstr ""
+
+#: https//support.torproject.org/tbb/tbb-install-tor-central-server/
+#: (content/tbb/tbb-install-tor-central-server/contents+en.lrquestion.description)
+msgid ""
+"Yes. Tor can be configured as a client or a relay on another machine, and "
+"allow other machines to be able to connect to it for anonymity."
+msgstr ""
+
+#: https//support.torproject.org/tbb/tbb-install-tor-central-server/
+#: (content/tbb/tbb-install-tor-central-server/contents+en.lrquestion.description)
+msgid ""
+"This is most useful in an environment where many computers want a gateway of"
+" anonymity to the rest of the world."
+msgstr ""
+
+#: https//support.torproject.org/tbb/tbb-install-tor-central-server/
+#: (content/tbb/tbb-install-tor-central-server/contents+en.lrquestion.description)
+msgid ""
+"However, be forewarned that with this configuration, anyone within your "
+"private network (existing between you and the Tor client/relay) can see what"
+" traffic you are sending in clear text."
+msgstr ""
+
+#: https//support.torproject.org/tbb/tbb-install-tor-central-server/
+#: (content/tbb/tbb-install-tor-central-server/contents+en.lrquestion.description)
+msgid "The anonymity doesn't start until you get to the Tor relay."
+msgstr ""
+
+#: https//support.torproject.org/tbb/tbb-install-tor-central-server/
+#: (content/tbb/tbb-install-tor-central-server/contents+en.lrquestion.description)
+msgid ""
+"Because of this, if you are the controller of your domain and you know "
+"everything's locked down, you will be OK, but this configuration may not be "
+"suitable for large private networks where security is key all around."
+msgstr ""
+
+#: https//support.torproject.org/tbb/tbb-install-tor-central-server/
+#: (content/tbb/tbb-install-tor-central-server/contents+en.lrquestion.description)
+msgid ""
+"Configuration is simple, editing your torrc file's SocksListenAddress "
+"according to the following examples:"
+msgstr ""
+
+#: https//support.torproject.org/tbb/tbb-install-tor-central-server/
+#: (content/tbb/tbb-install-tor-central-server/contents+en.lrquestion.description)
+msgid "SocksListenAddress 127.0.0.1"
+msgstr ""
+
+#: https//support.torproject.org/tbb/tbb-install-tor-central-server/
+#: (content/tbb/tbb-install-tor-central-server/contents+en.lrquestion.description)
+msgid "SocksListenAddress 192.168.x.x:9100"
+msgstr ""
+
+#: https//support.torproject.org/tbb/tbb-install-tor-central-server/
+#: (content/tbb/tbb-install-tor-central-server/contents+en.lrquestion.description)
+msgid "SocksListenAddress 0.0.0.0:9100"
+msgstr ""
+
+#: https//support.torproject.org/tbb/tbb-install-tor-central-server/
+#: (content/tbb/tbb-install-tor-central-server/contents+en.lrquestion.description)
+msgid ""
+"You can state multiple listen addresses, in the case that you are part of "
+"several networks or subnets."
+msgstr ""
+
+#: https//support.torproject.org/tbb/tbb-install-tor-central-server/
+#: (content/tbb/tbb-install-tor-central-server/contents+en.lrquestion.description)
+msgid "SocksListenAddress 192.168.x.x:9100 #eth0"
+msgstr ""
+
+#: https//support.torproject.org/tbb/tbb-install-tor-central-server/
+#: (content/tbb/tbb-install-tor-central-server/contents+en.lrquestion.description)
+msgid "SocksListenAddress 10.x.x.x:9100 #eth1"
+msgstr ""
+
+#: https//support.torproject.org/tbb/tbb-install-tor-central-server/
+#: (content/tbb/tbb-install-tor-central-server/contents+en.lrquestion.description)
+msgid ""
+"After this, your clients on their respective networks/subnets would specify "
+"a socks proxy with the address and port you specified SocksListenAddress to "
+"be."
+msgstr ""
+
+#: https//support.torproject.org/tbb/tbb-install-tor-central-server/
+#: (content/tbb/tbb-install-tor-central-server/contents+en.lrquestion.description)
+msgid ""
+"Please note that the SocksPort configuration option gives the port ONLY for "
+"localhost (127.0.0.1)."
+msgstr ""
+
+#: https//support.torproject.org/tbb/tbb-install-tor-central-server/
+#: (content/tbb/tbb-install-tor-central-server/contents+en.lrquestion.description)
+msgid ""
+"When setting up your SocksListenAddress(es), you need to give the port with "
+"the address, as shown above."
+msgstr ""
+
+#: https//support.torproject.org/tbb/tbb-install-tor-central-server/
+#: (content/tbb/tbb-install-tor-central-server/contents+en.lrquestion.description)
+msgid ""
+"If you are interested in forcing all outgoing data through the central Tor "
+"client/relay, instead of the server only being an optional proxy, you may "
+"find the program iptables (for *nix) useful."
+msgstr ""
+
+#: https//support.torproject.org/tbb/tbb-run-client-different-computer/
+#: (content/tbb/tbb-run-client-different-computer/contents+en.lrquestion.title)
+msgid ""
+"I want to run my Tor client on a different computer than my applications"
+msgstr ""
+
+#: https//support.torproject.org/tbb/tbb-run-client-different-computer/
+#: (content/tbb/tbb-run-client-different-computer/contents+en.lrquestion.description)
+msgid ""
+"By default, your Tor client only listens for applications that connect from "
+"localhost."
+msgstr ""
+
+#: https//support.torproject.org/tbb/tbb-run-client-different-computer/
+#: (content/tbb/tbb-run-client-different-computer/contents+en.lrquestion.description)
+msgid "Connections from other computers are refused."
+msgstr ""
+
+#: https//support.torproject.org/tbb/tbb-run-client-different-computer/
+#: (content/tbb/tbb-run-client-different-computer/contents+en.lrquestion.description)
+msgid ""
+"If you want to torify applications on different computers than the Tor "
+"client, you should edit your torrc to define `SocksListenAddress 0.0.0.0` "
+"and then restart (or hup) Tor."
+msgstr ""
+
+#: https//support.torproject.org/tbb/tbb-run-client-different-computer/
+#: (content/tbb/tbb-run-client-different-computer/contents+en.lrquestion.description)
+msgid ""
+"If you want to get more advanced, you can configure your Tor client on a "
+"firewall to bind to your internal IP but not your external IP."
+msgstr ""
+
#: https//support.torproject.org/tbb/website-blocking-tor/
#: (content/tbb/website-blocking-tor/contents+en.lrquestion.title)
msgid "A website I am trying to reach is blocking access over Tor."
@@ -7845,6 +8635,130 @@ msgid ""
"guide."
msgstr ""
+#: https//support.torproject.org/operators/default-exit-ports/
+#: (content/operators/default-exit-ports/contents+en.lrquestion.title)
+msgid "Is there a list of default exit ports?"
+msgstr ""
+
+#: https//support.torproject.org/operators/default-exit-ports/
+#: (content/operators/default-exit-ports/contents+en.lrquestion.description)
+msgid ""
+"The default open ports are listed below but keep in mind that, any port or "
+"ports can be opened by the relay operator by configuring it in torrc or "
+"modifying the source code."
+msgstr ""
+
+#: https//support.torproject.org/operators/default-exit-ports/
+#: (content/operators/default-exit-ports/contents+en.lrquestion.description)
+msgid ""
+"The default according to src/or/policies.c ([line 85][1] and [line 1901][2])"
+" from the source code release [release-0.4.6][3]:"
+msgstr ""
+
+#: https//support.torproject.org/operators/default-exit-ports/
+#: (content/operators/default-exit-ports/contents+en.lrquestion.description)
+msgid "reject 0.0.0.0/8"
+msgstr ""
+
+#: https//support.torproject.org/operators/default-exit-ports/
+#: (content/operators/default-exit-ports/contents+en.lrquestion.description)
+msgid "reject 169.254.0.0/16"
+msgstr ""
+
+#: https//support.torproject.org/operators/default-exit-ports/
+#: (content/operators/default-exit-ports/contents+en.lrquestion.description)
+msgid "reject 127.0.0.0/8"
+msgstr ""
+
+#: https//support.torproject.org/operators/default-exit-ports/
+#: (content/operators/default-exit-ports/contents+en.lrquestion.description)
+msgid "reject 192.168.0.0/16"
+msgstr ""
+
+#: https//support.torproject.org/operators/default-exit-ports/
+#: (content/operators/default-exit-ports/contents+en.lrquestion.description)
+msgid "reject 10.0.0.0/8"
+msgstr ""
+
+#: https//support.torproject.org/operators/default-exit-ports/
+#: (content/operators/default-exit-ports/contents+en.lrquestion.description)
+msgid "reject 172.16.0.0/12"
+msgstr ""
+
+#: https//support.torproject.org/operators/default-exit-ports/
+#: (content/operators/default-exit-ports/contents+en.lrquestion.description)
+msgid "reject *:25"
+msgstr ""
+
+#: https//support.torproject.org/operators/default-exit-ports/
+#: (content/operators/default-exit-ports/contents+en.lrquestion.description)
+msgid "reject *:119"
+msgstr ""
+
+#: https//support.torproject.org/operators/default-exit-ports/
+#: (content/operators/default-exit-ports/contents+en.lrquestion.description)
+msgid "reject *:135-139"
+msgstr ""
+
+#: https//support.torproject.org/operators/default-exit-ports/
+#: (content/operators/default-exit-ports/contents+en.lrquestion.description)
+msgid "reject *:445"
+msgstr ""
+
+#: https//support.torproject.org/operators/default-exit-ports/
+#: (content/operators/default-exit-ports/contents+en.lrquestion.description)
+msgid "reject *:563"
+msgstr ""
+
+#: https//support.torproject.org/operators/default-exit-ports/
+#: (content/operators/default-exit-ports/contents+en.lrquestion.description)
+msgid "reject *:1214"
+msgstr ""
+
+#: https//support.torproject.org/operators/default-exit-ports/
+#: (content/operators/default-exit-ports/contents+en.lrquestion.description)
+msgid "reject *:4661-4666"
+msgstr ""
+
+#: https//support.torproject.org/operators/default-exit-ports/
+#: (content/operators/default-exit-ports/contents+en.lrquestion.description)
+msgid "reject *:6346-6429"
+msgstr ""
+
+#: https//support.torproject.org/operators/default-exit-ports/
+#: (content/operators/default-exit-ports/contents+en.lrquestion.description)
+msgid "reject *:6699"
+msgstr ""
+
+#: https//support.torproject.org/operators/default-exit-ports/
+#: (content/operators/default-exit-ports/contents+en.lrquestion.description)
+msgid "reject *:6881-6999"
+msgstr ""
+
+#: https//support.torproject.org/operators/default-exit-ports/
+#: (content/operators/default-exit-ports/contents+en.lrquestion.description)
+msgid "accept *:*"
+msgstr ""
+
+#: https//support.torproject.org/operators/default-exit-ports/
+#: (content/operators/default-exit-ports/contents+en.lrquestion.description)
+msgid ""
+"[1]: "
+"https://gitlab.torproject.org/tpo/core/tor/-/blob/release-0.4.6/src/core/or/policies.c#L85"
+msgstr ""
+
+#: https//support.torproject.org/operators/default-exit-ports/
+#: (content/operators/default-exit-ports/contents+en.lrquestion.description)
+msgid ""
+"[2]: "
+"https://gitlab.torproject.org/tpo/core/tor/-/blob/release-0.4.6/src/core/or/policies.c#L1901"
+msgstr ""
+
+#: https//support.torproject.org/operators/default-exit-ports/
+#: (content/operators/default-exit-ports/contents+en.lrquestion.description)
+msgid "[3]: https://gitlab.torproject.org/tpo/core/tor/-/tree/release-0.4.6/"
+msgstr ""
+
#: https//support.torproject.org/operators/dynamic-ip/
#: (content/operators/dynamic-ip/contents+en.lrquestion.title)
msgid "Can I run a Tor relay using a dynamic IP address?"
@@ -8031,21 +8945,6 @@ msgstr ""
"Astfel, este posibil sÄ descoperiÈi cÄ nu puteÈi naviga imediat ce Tor trece"
" în hibernare, lucru semnalat de aceastÄ intrare din jurnal:"
-#: https//support.torproject.org/operators/hibernation/
-#: (content/operators/hibernation/contents+en.lrquestion.description)
-#: https//support.torproject.org/operators/limit-total-bandwidth/
-#: (content/operators/limit-total-bandwidth/contents+en.lrquestion.description)
-#: https//support.torproject.org/misc/bug-or-feedback/
-#: (content/misc/bug-or-feedback/contents+en.lrquestion.description)
-#: https//support.torproject.org/get-in-touch/why-i-cant-join-tor-channels/
-#: (content/get-in-touch/why-i-cant-join-tor-channels/contents+en.lrquestion.description)
-#: https//support.torproject.org/apt/tor-deb-repo/
-#: (content/apt/apt-1/contents+en.lrquestion.description)
-#: https//support.torproject.org/apt/apt-over-tor/
-#: (content/apt/apt-3/contents+en.lrquestion.description)
-msgid "```"
-msgstr "```"
-
#: https//support.torproject.org/operators/hibernation/
#: (content/operators/hibernation/contents+en.lrquestion.description)
msgid "Bandwidth soft limit reached; commencing hibernation."
@@ -10607,6 +11506,131 @@ msgstr "uid tor-security at lists.torproject.org"
msgid "sub 4096R/C00942E4 2017-03-13"
msgstr "sub 4096R/C00942E4 2017-03-13"
+#: https//support.torproject.org/misc/check-socks-dns-leaks/
+#: (content/misc/check-socks-dns-leaks/contents+en.lrquestion.title)
+msgid ""
+"How do I check if my application that uses SOCKS is leaking DNS requests?"
+msgstr ""
+
+#: https//support.torproject.org/misc/check-socks-dns-leaks/
+#: (content/misc/check-socks-dns-leaks/contents+en.lrquestion.description)
+msgid ""
+"Even if your application is using the correct variant of the SOCKS protocol,"
+" there is still a risk that it could be leaking DNS queries."
+msgstr ""
+
+#: https//support.torproject.org/misc/check-socks-dns-leaks/
+#: (content/misc/check-socks-dns-leaks/contents+en.lrquestion.description)
+msgid ""
+"This problem happens in Firefox extensions that resolve the destination "
+"hostname themselves, for example to show you its IP address, what country "
+"it's in, etc."
+msgstr ""
+
+#: https//support.torproject.org/misc/check-socks-dns-leaks/
+#: (content/misc/check-socks-dns-leaks/contents+en.lrquestion.description)
+msgid ""
+"If you suspect your application might behave like this, follow the "
+"instructions below to check."
+msgstr ""
+
+#: https//support.torproject.org/misc/check-socks-dns-leaks/
+#: (content/misc/check-socks-dns-leaks/contents+en.lrquestion.description)
+msgid ""
+"1. Add `TestSocks 1` to your [torrc file](https://support.torproject.org/tbb"
+"/tbb-editing-torrc/)."
+msgstr ""
+
+#: https//support.torproject.org/misc/check-socks-dns-leaks/
+#: (content/misc/check-socks-dns-leaks/contents+en.lrquestion.description)
+msgid ""
+"1. Start Tor, and point your program's SOCKS proxy settings to Tor's SOCKS5 "
+"server (`socks5://127.0.0.1:9050` by default)."
+msgstr ""
+
+#: https//support.torproject.org/misc/check-socks-dns-leaks/
+#: (content/misc/check-socks-dns-leaks/contents+en.lrquestion.description)
+msgid ""
+"1. Watch your logs as you use your application. For each socks connection, "
+"Tor will log a `notice` for safe connections, and a `warn` for connections "
+"leaking DNS requests."
+msgstr ""
+
+#: https//support.torproject.org/misc/check-socks-dns-leaks/
+#: (content/misc/check-socks-dns-leaks/contents+en.lrquestion.description)
+msgid ""
+"If you want to automatically disable all connections leaking DNS requests, "
+"set `SafeSocks 1` in your torrc file."
+msgstr ""
+
+#: https//support.torproject.org/misc/hide-exits/
+#: (content/misc/hide-exits/contents+en.lrquestion.title)
+msgid ""
+"You should hide the list of Tor relays, so people can't block the exits."
+msgstr ""
+
+#: https//support.torproject.org/misc/hide-exits/
+#: (content/misc/hide-exits/contents+en.lrquestion.description)
+msgid "There are a few reasons we don't:"
+msgstr ""
+
+#: https//support.torproject.org/misc/hide-exits/
+#: (content/misc/hide-exits/contents+en.lrquestion.description)
+msgid ""
+"1. We can't help but make the information available, since Tor clients need "
+"to use it to pick their paths."
+msgstr ""
+
+#: https//support.torproject.org/misc/hide-exits/
+#: (content/misc/hide-exits/contents+en.lrquestion.description)
+msgid "So if the \"blockers\" want it, they can get it anyway."
+msgstr ""
+
+#: https//support.torproject.org/misc/hide-exits/
+#: (content/misc/hide-exits/contents+en.lrquestion.description)
+msgid ""
+"Further, even if we didn't tell clients about the list of relays directly, "
+"somebody could still make a lot of connections through Tor to a test site "
+"and build a list of the addresses they see."
+msgstr ""
+
+#: https//support.torproject.org/misc/hide-exits/
+#: (content/misc/hide-exits/contents+en.lrquestion.description)
+msgid ""
+"1. If people want to block us, we believe that they should be allowed to do "
+"so."
+msgstr ""
+
+#: https//support.torproject.org/misc/hide-exits/
+#: (content/misc/hide-exits/contents+en.lrquestion.description)
+msgid ""
+"Obviously, we would prefer for everybody to allow Tor users to connect to "
+"them, but people have the right to decide who their services should allow "
+"connections from, and if they want to block anonymous users, they can."
+msgstr ""
+
+#: https//support.torproject.org/misc/hide-exits/
+#: (content/misc/hide-exits/contents+en.lrquestion.description)
+msgid ""
+"1. Being blockable also has tactical advantages: it may be a persuasive "
+"response to website maintainers who feel threatened by Tor."
+msgstr ""
+
+#: https//support.torproject.org/misc/hide-exits/
+#: (content/misc/hide-exits/contents+en.lrquestion.description)
+msgid ""
+"Giving them the option may inspire them to stop and think about whether they"
+" really want to eliminate private access to their system, and if not, what "
+"other options they might have."
+msgstr ""
+
+#: https//support.torproject.org/misc/hide-exits/
+#: (content/misc/hide-exits/contents+en.lrquestion.description)
+msgid ""
+"The time they might otherwise have spent blocking Tor, they may instead "
+"spend rethinking their overall approach to privacy and anonymity."
+msgstr ""
+
#: https//support.torproject.org/misc/menu/
#: (content/misc/menu/contents+en.lrquestion.description)
msgid "About"
@@ -11323,65 +12347,21 @@ msgstr "### Cum sÄ vÄ verificaÈi pseudonimul"
#: https//support.torproject.org/get-in-touch/why-i-cant-join-tor-channels/
#: (content/get-in-touch/why-i-cant-join-tor-channels/contents+en.lrquestion.description)
msgid ""
-"Then, to complete the registration and ultimately gain access to the #tor-"
-"project channel, your nickname must be **verified**."
-msgstr ""
-"Apoi, pentru a finaliza înregistrarea Èi a obÈine în final acces la canalul "
-"#tor-project, pseudonimul dvs. trebuie sÄ fie **verified**."
-
-#: https//support.torproject.org/get-in-touch/why-i-cant-join-tor-channels/
-#: (content/get-in-touch/why-i-cant-join-tor-channels/contents+en.lrquestion.description)
-msgid ""
-"1. To verify your nick, open a new browser window and go to "
-"https://webchat.oftc.net/?channels=tor."
-msgstr ""
-
-#: https//support.torproject.org/get-in-touch/why-i-cant-join-tor-channels/
-#: (content/get-in-touch/why-i-cant-join-tor-channels/contents+en.lrquestion.description)
-msgid "2. Log in with your IRC nickname and password."
-msgstr "2. ConectaÈi-vÄ cu pseudonimul Èi parola IRC."
-
-#: https//support.torproject.org/get-in-touch/why-i-cant-join-tor-channels/
-#: (content/get-in-touch/why-i-cant-join-tor-channels/contents+en.lrquestion.description)
-msgid ""
-"3. Look for the word **verify** and log in there. It may appear that nothing"
-" has happened. Look at the top of the page, and there will be a column "
-"called **Account**."
+"After registering your nickname, to gain access to the #tor-project and "
+"other protected channels, your nickname must be **verified**."
msgstr ""
-"3. CÄutaÈi cuvântul **verify** Èi conectaÈi-vÄ acolo. Se pare cÄ nu s-a "
-"întâmplat nimic. UitaÈi-vÄ Ã®n partea de sus a paginii, unde existÄ o coloanÄ"
-" numitÄ **Account**."
-
-#: https//support.torproject.org/get-in-touch/why-i-cant-join-tor-channels/
-#: (content/get-in-touch/why-i-cant-join-tor-channels/contents+en.lrquestion.description)
-msgid "4. Click on **Account**."
-msgstr "4. Clic pe **Account**."
#: https//support.torproject.org/get-in-touch/why-i-cant-join-tor-channels/
#: (content/get-in-touch/why-i-cant-join-tor-channels/contents+en.lrquestion.description)
msgid ""
-"5. Click on the small sentence at the bottom of the square that says: Verify"
-" account."
-msgstr ""
-"5. FaceÈi clic pe propoziÈia micÄ din partea de jos a pÄtratului care spune:"
-" VerificaÈi contul."
-
-#: https//support.torproject.org/get-in-touch/why-i-cant-join-tor-channels/
-#: (content/get-in-touch/why-i-cant-join-tor-channels/contents+en.lrquestion.description)
-msgid "6. Fill out the Captcha that pops up, and click ok."
+"1. Go to https://services.oftc.net/ and follow the steps in the '*To verify "
+"your account*' section"
msgstr ""
#: https//support.torproject.org/get-in-touch/why-i-cant-join-tor-channels/
#: (content/get-in-touch/why-i-cant-join-tor-channels/contents+en.lrquestion.description)
-msgid ""
-"7. A tiny message will appear: \"Your NickServ account has been verified.\""
+msgid "2. Go back to the IRC webpage where you are logged in and type:"
msgstr ""
-"7. Va apÄrea un mesaj minuscul: âContul dvs. NickServ a fost verificat.â"
-
-#: https//support.torproject.org/get-in-touch/why-i-cant-join-tor-channels/
-#: (content/get-in-touch/why-i-cant-join-tor-channels/contents+en.lrquestion.description)
-msgid "8. Go back to the IRC webpage where you are logged in and type:"
-msgstr "8. ReveniÈi la pagina web IRC unde sunteÈi conectat Èi tastaÈi:"
#: https//support.torproject.org/get-in-touch/why-i-cant-join-tor-channels/
#: (content/get-in-touch/why-i-cant-join-tor-channels/contents+en.lrquestion.description)
@@ -11390,13 +12370,13 @@ msgstr "`/msg nickserv checkverify`"
#: https//support.torproject.org/get-in-touch/why-i-cant-join-tor-channels/
#: (content/get-in-touch/why-i-cant-join-tor-channels/contents+en.lrquestion.description)
-msgid "9. Click ENTER."
-msgstr "9. Clic pe tasta Enter."
+msgid "3. Click ENTER."
+msgstr ""
#: https//support.torproject.org/get-in-touch/why-i-cant-join-tor-channels/
#: (content/get-in-touch/why-i-cant-join-tor-channels/contents+en.lrquestion.description)
-msgid "10. If all is well, you will receive a message that says:"
-msgstr "10. DacÄ totul este bine, veÈi primi un mesaj care spune:"
+msgid "4. If all is well, you will receive a message that says:"
+msgstr ""
#: https//support.torproject.org/get-in-touch/why-i-cant-join-tor-channels/
#: (content/get-in-touch/why-i-cant-join-tor-channels/contents+en.lrquestion.description)
@@ -11543,21 +12523,23 @@ msgstr "# apt install apt-transport-https"
#: https//support.torproject.org/apt/tor-deb-repo/
#: (content/apt/apt-1/contents+en.lrquestion.description)
msgid ""
-"#### 2. Add the following entries to `/etc/apt/sources.list` or a new file "
-"in `/etc/apt/sources.list.d/`"
+"#### 2. Create a new file in `/etc/apt/sources.list.d/` named `tor.list`. "
+"Add the following entries:"
msgstr ""
-"#### 2. AdÄugaÈi urmÄtoarele intrÄri la `/etc/apt/sources.list` or a new "
-"file in `/etc/apt/sources.list.d/`"
#: https//support.torproject.org/apt/tor-deb-repo/
#: (content/apt/apt-1/contents+en.lrquestion.description)
-msgid "deb https://deb.torproject.org/torproject.org <DISTRIBUTION> main"
+msgid ""
+"deb [signed-by=/usr/share/keyrings/tor-archive-keyring.gpg] "
+"https://deb.torproject.org/torproject.org <DISTRIBUTION> main"
msgstr ""
#: https//support.torproject.org/apt/tor-deb-repo/
#: (content/apt/apt-1/contents+en.lrquestion.description)
-msgid "deb-src https://deb.torproject.org/torproject.org <DISTRIBUTION> main"
-msgstr "deb-src https://deb.torproject.org/torproject.org <DISTRIBUTION> main"
+msgid ""
+"deb-src [signed-by=/usr/share/keyrings/tor-archive-keyring.gpg] "
+"https://deb.torproject.org/torproject.org <DISTRIBUTION> main"
+msgstr ""
#: https//support.torproject.org/apt/tor-deb-repo/
#: (content/apt/apt-1/contents+en.lrquestion.description)
@@ -11570,14 +12552,16 @@ msgstr ""
#: https//support.torproject.org/apt/tor-deb-repo/
#: (content/apt/apt-1/contents+en.lrquestion.description)
msgid ""
-"deb https://deb.torproject.org/torproject.org tor-"
+"deb [signed-by=/usr/share/keyrings/tor-archive-keyring.gpg] "
+"https://deb.torproject.org/torproject.org tor-"
"experimental-0.4.6.x-<DISTRIBUTION> main"
msgstr ""
#: https//support.torproject.org/apt/tor-deb-repo/
#: (content/apt/apt-1/contents+en.lrquestion.description)
msgid ""
-"deb-src https://deb.torproject.org/torproject.org tor-"
+"deb-src [signed-by=/usr/share/keyrings/tor-archive-keyring.gpg] "
+"https://deb.torproject.org/torproject.org tor-"
"experimental-0.4.6.x-<DISTRIBUTION> main"
msgstr ""
@@ -11589,18 +12573,18 @@ msgstr "Sau versiuni nocturne:"
#: https//support.torproject.org/apt/tor-deb-repo/
#: (content/apt/apt-1/contents+en.lrquestion.description)
msgid ""
-"deb https://deb.torproject.org/torproject.org tor-nightly-"
-"master-<DISTRIBUTION> main"
+"deb [signed-by=/usr/share/keyrings/tor-archive-keyring.gpg] "
+"https://deb.torproject.org/torproject.org tor-nightly-master-<DISTRIBUTION> "
+"main"
msgstr ""
#: https//support.torproject.org/apt/tor-deb-repo/
#: (content/apt/apt-1/contents+en.lrquestion.description)
msgid ""
-"deb-src https://deb.torproject.org/torproject.org tor-nightly-"
-"master-<DISTRIBUTION> main"
+"deb-src [signed-by=/usr/share/keyrings/tor-archive-keyring.gpg] "
+"https://deb.torproject.org/torproject.org tor-nightly-master-<DISTRIBUTION> "
+"main"
msgstr ""
-"deb-src https://deb.torproject.org/torproject.org tor-nightly-"
-"master-<DISTRIBUTION> main"
#: https//support.torproject.org/apt/tor-deb-repo/
#: (content/apt/apt-1/contents+en.lrquestion.description)
@@ -11620,13 +12604,15 @@ msgstr ""
#: https//support.torproject.org/apt/tor-deb-repo/
#: (content/apt/apt-1/contents+en.lrquestion.description)
msgid ""
-"deb [arch=amd64] https://deb.torproject.org/torproject.org focal main"
+"deb [arch=amd64 signed-by=/usr/share/keyrings/tor-archive-keyring.gpg] "
+"https://deb.torproject.org/torproject.org focal main"
msgstr ""
#: https//support.torproject.org/apt/tor-deb-repo/
#: (content/apt/apt-1/contents+en.lrquestion.description)
msgid ""
-"deb-src [arch=amd64] https://deb.torproject.org/torproject.org focal main"
+"deb-src [arch=amd64 signed-by=/usr/share/keyrings/tor-archive-keyring.gpg] "
+"https://deb.torproject.org/torproject.org focal main"
msgstr ""
#: https//support.torproject.org/apt/tor-deb-repo/
@@ -11646,28 +12632,17 @@ msgstr ""
#: (content/apt/apt-1/contents+en.lrquestion.description)
msgid ""
"#### 3. Then add the gpg key used to sign the packages by running the "
-"following commands at your command prompt"
+"following command at your command prompt:"
msgstr ""
-"#### 3. Apoi adÄugaÈi cheia gpg folositÄ pentru a semna pachetele rulând "
-"urmÄtoarele comenzi la promptul dvs. de comandÄ"
#: https//support.torproject.org/apt/tor-deb-repo/
#: (content/apt/apt-1/contents+en.lrquestion.description)
msgid ""
-"# wget -qO- "
+"# wget -O- "
"https://deb.torproject.org/torproject.org/A3C4F0F979CAA22CDBA8F512EE8CBC9E886DDD89.asc"
-" | gpg --import"
+" | gpg --dearmor | tee /usr/share/keyrings/tor-archive-keyring.gpg "
+">/dev/null"
msgstr ""
-"# wget -qO- "
-"https://deb.torproject.org/torproject.org/A3C4F0F979CAA22CDBA8F512EE8CBC9E886DDD89.asc"
-" | gpg --import"
-
-#: https//support.torproject.org/apt/tor-deb-repo/
-#: (content/apt/apt-1/contents+en.lrquestion.description)
-msgid ""
-"# gpg --export A3C4F0F979CAA22CDBA8F512EE8CBC9E886DDD89 | apt-key add -"
-msgstr ""
-"# gpg --export A3C4F0F979CAA22CDBA8F512EE8CBC9E886DDD89 | apt-key add -"
#: https//support.torproject.org/apt/tor-deb-repo/
#: (content/apt/apt-1/contents+en.lrquestion.description)
@@ -13281,6 +14256,82 @@ msgid ""
"doesn't change IP address over the day."
msgstr ""
+#: https//support.torproject.org/alternate-designs/block-websites/
+#: (content/alternate-designs/block-websites/contents+en.lrquestion.title)
+msgid "Exit policies should be able to block websites, not just IP addresses."
+msgstr ""
+
+#: https//support.torproject.org/alternate-designs/block-websites/
+#: (content/alternate-designs/block-websites/contents+en.lrquestion.description)
+msgid ""
+"It would be nice to let relay operators say things like `reject "
+"www.slashdot.org` in their exit policies, rather than requiring them to "
+"learn all the IP address space that could be covered by the site (and then "
+"also blocking other sites at those IP addresses)."
+msgstr ""
+
+#: https//support.torproject.org/alternate-designs/block-websites/
+#: (content/alternate-designs/block-websites/contents+en.lrquestion.description)
+msgid "There are two problems, though."
+msgstr ""
+
+#: https//support.torproject.org/alternate-designs/block-websites/
+#: (content/alternate-designs/block-websites/contents+en.lrquestion.description)
+msgid "First, users could still get around these blocks."
+msgstr ""
+
+#: https//support.torproject.org/alternate-designs/block-websites/
+#: (content/alternate-designs/block-websites/contents+en.lrquestion.description)
+msgid ""
+"For example, they could request the IP address rather than the hostname when"
+" they exit from the Tor network."
+msgstr ""
+
+#: https//support.torproject.org/alternate-designs/block-websites/
+#: (content/alternate-designs/block-websites/contents+en.lrquestion.description)
+msgid ""
+"This means operators would still need to learn all the IP addresses for the "
+"destinations in question."
+msgstr ""
+
+#: https//support.torproject.org/alternate-designs/block-websites/
+#: (content/alternate-designs/block-websites/contents+en.lrquestion.description)
+msgid ""
+"The second problem is that it would allow remote attackers to censor "
+"arbitrary sites."
+msgstr ""
+
+#: https//support.torproject.org/alternate-designs/block-websites/
+#: (content/alternate-designs/block-websites/contents+en.lrquestion.description)
+msgid ""
+"For example, if a Tor operator blocks www1.slashdot.org, and then some "
+"attacker poisons the Tor relay's DNS or otherwise changes that hostname to "
+"resolve to the IP address for a major news site, then suddenly that Tor "
+"relay is blocking the news site."
+msgstr ""
+
+#: https//support.torproject.org/alternate-designs/let-the-network-pick-the-path/
+#: (content/alternate-designs/let-the-network-pick-the-path/contents+en.lrquestion.title)
+msgid "You should let the network pick the path, not the client."
+msgstr ""
+
+#: https//support.torproject.org/alternate-designs/let-the-network-pick-the-path/
+#: (content/alternate-designs/let-the-network-pick-the-path/contents+en.lrquestion.description)
+msgid "No, you cannot trust the network to pick the path."
+msgstr ""
+
+#: https//support.torproject.org/alternate-designs/let-the-network-pick-the-path/
+#: (content/alternate-designs/let-the-network-pick-the-path/contents+en.lrquestion.description)
+msgid "Malicious relays could route you through their colluding friends."
+msgstr ""
+
+#: https//support.torproject.org/alternate-designs/let-the-network-pick-the-path/
+#: (content/alternate-designs/let-the-network-pick-the-path/contents+en.lrquestion.description)
+msgid ""
+"This would give an adversary the ability to watch all of your traffic end to"
+" end."
+msgstr ""
+
#: lego/templates/banner.html:3 lego/templates/banner.html:5
#: templates/banner.html:3 templates/banner.html:5
msgid "Close banner"
@@ -13311,8 +14362,8 @@ msgid "DONATE NOW"
msgstr "DONAÈI ACUM"
#: lego/templates/footer.html:13 lego/templates/footer.html:22
-#: lego/templates/navbar.html:83 templates/footer.html:13
-#: templates/footer.html:22 templates/navbar.html:83
+#: lego/templates/navbar.html:95 templates/footer.html:13
+#: templates/footer.html:22 templates/navbar.html:95
msgid "Download Tor Browser"
msgstr "DescÄrcare Tor Browser"
diff --git a/contents+ru.po b/contents+ru.po
index efce6203e3..e8fa514d0f 100644
--- a/contents+ru.po
+++ b/contents+ru.po
@@ -24,7 +24,7 @@ msgid ""
msgstr ""
"Project-Id-Version: PACKAGE VERSION\n"
"Report-Msgid-Bugs-To: \n"
-"POT-Creation-Date: 2021-08-25 11:14+CET\n"
+"POT-Creation-Date: 2021-09-01 12:20+CET\n"
"PO-Revision-Date: 2018-10-02 22:41+0000\n"
"Last-Translator: Emma Peel, 2021\n"
"Language-Team: Russian (https://www.transifex.com/otf/teams/1519/ru/)\n"
@@ -157,6 +157,11 @@ msgstr "FAQ по злоÑпоÑÑеблениÑм"
msgid "Tor Metrics"
msgstr "Tor Metrics"
+#: https//support.torproject.org/alternate-designs/
+#: (content/alternate-designs/contents+en.lrtopic.title)
+msgid "Alternate Designs We Don't Do (Yet)"
+msgstr ""
+
#: https//support.torproject.org/glossary/add-on-extension-or-plugin/
#: (content/glossary/add-on-extension-or-plugin/contents+en.lrword.term)
msgid "add-on, extension, or plugin"
@@ -2446,6 +2451,61 @@ msgstr ""
"ÐодÑобнее об иÑполÑзовании Tor вмеÑÑе Ñ VPN можно пÑоÑиÑаÑÑ Ñ Ð½Ð°Ñ Ð² "
"[wiki](https://trac.torproject.org/projects/tor/wiki/doc/TorPlusVPN)."
+#: https//support.torproject.org/faq/relay-donations/
+#: (content/faq/relay-donations/contents+en.lrquestion.title)
+msgid "Can I donate for a relay rather than run my own?"
+msgstr ""
+
+#: https//support.torproject.org/faq/relay-donations/
+#: (content/faq/relay-donations/contents+en.lrquestion.description)
+msgid ""
+"Sure! We have a [list of organizations that run Tor "
+"relays](https://community.torproject.org/relay/community-resources/relay-"
+"associations/) that are happy to turn your donations into better speed and "
+"anonymity for the Tor network."
+msgstr ""
+
+#: https//support.torproject.org/faq/relay-donations/
+#: (content/faq/relay-donations/contents+en.lrquestion.description)
+msgid ""
+"These organizations are not the same as [The Tor Project, "
+"Inc](https://donate.torproject.org/), but we consider that a good thing."
+msgstr ""
+
+#: https//support.torproject.org/faq/relay-donations/
+#: (content/faq/relay-donations/contents+en.lrquestion.description)
+msgid "They're run by nice people who are part of the Tor community."
+msgstr ""
+
+#: https//support.torproject.org/faq/relay-donations/
+#: (content/faq/relay-donations/contents+en.lrquestion.description)
+msgid ""
+"Note that there can be a tradeoff here between anonymity and performance."
+msgstr ""
+
+#: https//support.torproject.org/faq/relay-donations/
+#: (content/faq/relay-donations/contents+en.lrquestion.description)
+msgid ""
+"The Tor network's anonymity comes in part from diversity, so if you are in a"
+" position to run your own relay, you will be improving Tor's anonymity more "
+"than by donating."
+msgstr ""
+
+#: https//support.torproject.org/faq/relay-donations/
+#: (content/faq/relay-donations/contents+en.lrquestion.description)
+msgid ""
+"At the same time though, economies of scale for bandwidth mean that "
+"combining many small donations into several larger relays is more efficient "
+"at improving network performance."
+msgstr ""
+
+#: https//support.torproject.org/faq/relay-donations/
+#: (content/faq/relay-donations/contents+en.lrquestion.description)
+msgid ""
+"Improving anonymity and improving performance are both worthwhile goals, so "
+"however you can help is great!"
+msgstr ""
+
#: https//support.torproject.org/faq/staying-anonymous/
#: (content/faq/staying-anonymous/contents+en.lrquestion.title)
msgid "Am I totally anonymous if I use Tor?"
@@ -2811,6 +2871,61 @@ msgstr ""
"ÐÑÐ¾Ñ ÑпиÑок неполнÑй. ÐÑÐ´ÐµÑ Ñ
оÑоÑо, еÑли Ð²Ñ Ð¿Ð¾Ð¼Ð¾Ð¶ÐµÑе нам [опÑеделиÑÑ Ð¸ "
"докÑменÑиÑоваÑÑ Ð²Ñе Ñакие моменÑÑ](https://community.torproject.org/)."
+#: https//support.torproject.org/about/attacks-on-onion-routing/
+#: (content/about/attacks-on-onion-routing/contents+en.lrquestion.title)
+msgid "What attacks remain against onion routing?"
+msgstr ""
+
+#: https//support.torproject.org/about/attacks-on-onion-routing/
+#: (content/about/attacks-on-onion-routing/contents+en.lrquestion.description)
+msgid ""
+"As mentioned above, it is possible for an observer who can view both you and"
+" either the destination website or your Tor exit node to correlate timings "
+"of your traffic as it enters the Tor network and also as it exits."
+msgstr ""
+
+#: https//support.torproject.org/about/attacks-on-onion-routing/
+#: (content/about/attacks-on-onion-routing/contents+en.lrquestion.description)
+msgid "Tor does not defend against such a threat model."
+msgstr ""
+
+#: https//support.torproject.org/about/attacks-on-onion-routing/
+#: (content/about/attacks-on-onion-routing/contents+en.lrquestion.description)
+msgid ""
+"In a more limited sense, note that if a censor or law enforcement agency has"
+" the ability to obtain specific observation of parts of the network, it is "
+"possible for them to verify a suspicion that you talk regularly to your "
+"friend by observing traffic at both ends and correlating the timing of only "
+"that traffic."
+msgstr ""
+
+#: https//support.torproject.org/about/attacks-on-onion-routing/
+#: (content/about/attacks-on-onion-routing/contents+en.lrquestion.description)
+msgid ""
+"Again, this is only useful to verify that parties already suspected of "
+"communicating with one another are doing so."
+msgstr ""
+
+#: https//support.torproject.org/about/attacks-on-onion-routing/
+#: (content/about/attacks-on-onion-routing/contents+en.lrquestion.description)
+msgid ""
+"In most countries, the suspicion required to obtain a warrant already "
+"carries more weight than timing correlation would provide."
+msgstr ""
+
+#: https//support.torproject.org/about/attacks-on-onion-routing/
+#: (content/about/attacks-on-onion-routing/contents+en.lrquestion.description)
+msgid ""
+"Furthermore, since Tor reuses circuits for multiple TCP connections, it is "
+"possible to associate non anonymous and anonymous traffic at a given exit "
+"node, so be careful about what applications you run concurrently over Tor."
+msgstr ""
+
+#: https//support.torproject.org/about/attacks-on-onion-routing/
+#: (content/about/attacks-on-onion-routing/contents+en.lrquestion.description)
+msgid "Perhaps even run separate Tor clients for these applications."
+msgstr ""
+
#: https//support.torproject.org/about/backdoor/
#: (content/about/backdoor/contents+en.lrquestion.title)
msgid "Is there a backdoor in Tor?"
@@ -2986,6 +3101,43 @@ msgstr ""
"ÐÑполÑзоваÑÑ Tor Ñ Ð´ÑÑгими бÑаÑзеÑами [опаÑно и не "
"ÑекомендÑеÑÑÑ](/ru/tbb/tbb-9/)."
+#: https//support.torproject.org/about/change-paths/
+#: (content/about/change-paths/contents+en.lrquestion.title)
+msgid "How often does Tor change its paths?"
+msgstr ""
+
+#: https//support.torproject.org/about/change-paths/
+#: (content/about/change-paths/contents+en.lrquestion.description)
+msgid ""
+"Tor will reuse the same circuit for new TCP streams for 10 minutes, as long "
+"as the circuit is working fine."
+msgstr ""
+
+#: https//support.torproject.org/about/change-paths/
+#: (content/about/change-paths/contents+en.lrquestion.description)
+msgid "(If the circuit fails, Tor will switch to a new circuit immediately.)"
+msgstr ""
+
+#: https//support.torproject.org/about/change-paths/
+#: (content/about/change-paths/contents+en.lrquestion.description)
+msgid ""
+"But note that a single TCP stream (e.g. a long IRC connection) will stay on "
+"the same circuit forever."
+msgstr ""
+
+#: https//support.torproject.org/about/change-paths/
+#: (content/about/change-paths/contents+en.lrquestion.description)
+msgid "We don't rotate individual streams from one circuit to the next."
+msgstr ""
+
+#: https//support.torproject.org/about/change-paths/
+#: (content/about/change-paths/contents+en.lrquestion.description)
+msgid ""
+"Otherwise, an adversary with a partial view of the network would be given "
+"many chances over time to link you to your destination, rather than just one"
+" chance."
+msgstr ""
+
#: https//support.torproject.org/about/distribute-tor/
#: (content/about/distribute-tor/contents+en.lrquestion.title)
msgid "Can I distribute Tor?"
@@ -3101,6 +3253,133 @@ msgstr ""
"У Ð½Ð°Ñ Ñакже еÑÑÑ [FAQ по ÑоÑговÑм "
"маÑкам](https://www.torproject.org/ru/about/trademark/)."
+#: https//support.torproject.org/about/entry-guards/
+#: (content/about/entry-guards/contents+en.lrquestion.title)
+msgid "What are Entry Guards?"
+msgstr ""
+
+#: https//support.torproject.org/about/entry-guards/
+#: (content/about/entry-guards/contents+en.lrquestion.description)
+msgid ""
+"Tor (like all current practical low-latency anonymity designs) fails when "
+"the attacker can see both ends of the communications channel."
+msgstr ""
+
+#: https//support.torproject.org/about/entry-guards/
+#: (content/about/entry-guards/contents+en.lrquestion.description)
+msgid ""
+"For example, suppose the attacker controls or watches the Tor relay you "
+"choose to enter the network, and also controls or watches the website you "
+"visit."
+msgstr ""
+
+#: https//support.torproject.org/about/entry-guards/
+#: (content/about/entry-guards/contents+en.lrquestion.description)
+msgid ""
+"In this case, the research community knows no practical low-latency design "
+"that can reliably stop the attacker from correlating volume and timing "
+"information on the two sides."
+msgstr ""
+
+#: https//support.torproject.org/about/entry-guards/
+#: (content/about/entry-guards/contents+en.lrquestion.description)
+msgid "So, what should we do?"
+msgstr ""
+
+#: https//support.torproject.org/about/entry-guards/
+#: (content/about/entry-guards/contents+en.lrquestion.description)
+msgid "Suppose the attacker controls, or can observe, C relays."
+msgstr ""
+
+#: https//support.torproject.org/about/entry-guards/
+#: (content/about/entry-guards/contents+en.lrquestion.description)
+msgid "Suppose there are N relays total."
+msgstr ""
+
+#: https//support.torproject.org/about/entry-guards/
+#: (content/about/entry-guards/contents+en.lrquestion.description)
+msgid ""
+"If you select new entry and exit relays each time you use the network, the "
+"attacker will be able to correlate all traffic you send with probability "
+"around (c/n)2."
+msgstr ""
+
+#: https//support.torproject.org/about/entry-guards/
+#: (content/about/entry-guards/contents+en.lrquestion.description)
+msgid ""
+"But profiling is, for most users, as bad as being traced all the time: they "
+"want to do something often without an attacker noticing, and the attacker "
+"noticing once is as bad as the attacker noticing more often."
+msgstr ""
+
+#: https//support.torproject.org/about/entry-guards/
+#: (content/about/entry-guards/contents+en.lrquestion.description)
+msgid ""
+"Thus, choosing many random entries and exits gives the user no chance of "
+"escaping profiling by this kind of attacker."
+msgstr ""
+
+#: https//support.torproject.org/about/entry-guards/
+#: (content/about/entry-guards/contents+en.lrquestion.description)
+msgid ""
+"The solution is \"entry guards\": each Tor client selects a few relays at "
+"random to use as entry points, and uses only those relays for their first "
+"hop."
+msgstr ""
+
+#: https//support.torproject.org/about/entry-guards/
+#: (content/about/entry-guards/contents+en.lrquestion.description)
+msgid ""
+"If those relays are not controlled or observed, the attacker can't win, "
+"ever, and the user is secure."
+msgstr ""
+
+#: https//support.torproject.org/about/entry-guards/
+#: (content/about/entry-guards/contents+en.lrquestion.description)
+msgid ""
+"If those relays are observed or controlled by the attacker, the attacker "
+"sees a larger fraction of the user's traffic - but still the user is no more"
+" profiled than before."
+msgstr ""
+
+#: https//support.torproject.org/about/entry-guards/
+#: (content/about/entry-guards/contents+en.lrquestion.description)
+msgid ""
+"Thus, the user has some chance (on the order of (n-c)/n) of avoiding "
+"profiling, whereas they had none before."
+msgstr ""
+
+#: https//support.torproject.org/about/entry-guards/
+#: (content/about/entry-guards/contents+en.lrquestion.description)
+msgid ""
+"You can read more at [An Analysis of the Degradation of Anonymous "
+"Protocols](http://freehaven.net/anonbib/#wright02), [Defending Anonymous "
+"Communication Against Passive Logging "
+"Attacks](http://freehaven.net/anonbib/#wright03), and especially [Locating "
+"Hidden Servers](http://freehaven.net/anonbib/#hs-attack06)."
+msgstr ""
+
+#: https//support.torproject.org/about/entry-guards/
+#: (content/about/entry-guards/contents+en.lrquestion.description)
+msgid ""
+"Restricting your entry nodes may also help against attackers who want to run"
+" a few Tor nodes and easily enumerate all of the Tor user IP addresses."
+msgstr ""
+
+#: https//support.torproject.org/about/entry-guards/
+#: (content/about/entry-guards/contents+en.lrquestion.description)
+msgid ""
+"(Even though they can't learn what destinations the users are talking to, "
+"they still might be able to do bad things with just a list of users.)"
+msgstr ""
+
+#: https//support.torproject.org/about/entry-guards/
+#: (content/about/entry-guards/contents+en.lrquestion.description)
+msgid ""
+"However, that feature won't really become useful until we move to a "
+"\"directory guard\" design as well."
+msgstr ""
+
#: https//support.torproject.org/about/how-is-tor-different-from-other-proxies/
#: (content/about/how-is-tor-different-from-other-proxies/contents+en.lrquestion.title)
msgid "How is Tor different from other proxies?"
@@ -3300,6 +3579,162 @@ msgstr ""
"[ÐÑа иллÑÑÑÑаÑиÑ](/ru/https/https-1/) Ð¿Ð¾Ð¼Ð¾Ð¶ÐµÑ Ð¿Ð¾Ð½ÑÑÑ, как вмеÑÑе "
"иÑполÑзÑÑÑÑÑ Tor и HTTPS."
+#: https//support.torproject.org/about/key-management/
+#: (content/about/key-management/contents+en.lrquestion.title)
+msgid "Tell me about all the keys Tor uses"
+msgstr ""
+
+#: https//support.torproject.org/about/key-management/
+#: (content/about/key-management/contents+en.lrquestion.description)
+msgid ""
+"Tor uses a variety of different keys, with three goals in mind: 1) "
+"encryption to ensure privacy of data within the Tor network, 2) "
+"authentication so clients know they're talking to the relays they meant to "
+"talk to, and 3) signatures to make sure all clients know the same set of "
+"relays."
+msgstr ""
+
+#: https//support.torproject.org/about/key-management/
+#: (content/about/key-management/contents+en.lrquestion.description)
+msgid ""
+"**Encryption**: first, all connections in Tor use TLS link encryption, so "
+"observers can't look inside to see which circuit a given cell is intended "
+"for."
+msgstr ""
+
+#: https//support.torproject.org/about/key-management/
+#: (content/about/key-management/contents+en.lrquestion.description)
+msgid ""
+"Further, the Tor client establishes an ephemeral encryption key with each "
+"relay in the circuit; these extra layers of encryption mean that only the "
+"exit relay can read the cells."
+msgstr ""
+
+#: https//support.torproject.org/about/key-management/
+#: (content/about/key-management/contents+en.lrquestion.description)
+msgid ""
+"Both sides discard the circuit key when the circuit ends, so logging traffic"
+" and then breaking into the relay to discover the key won't work."
+msgstr ""
+
+#: https//support.torproject.org/about/key-management/
+#: (content/about/key-management/contents+en.lrquestion.description)
+msgid ""
+"**Authentication**: Every Tor relay has a public decryption key called the "
+"\"onion key\"."
+msgstr ""
+
+#: https//support.torproject.org/about/key-management/
+#: (content/about/key-management/contents+en.lrquestion.description)
+msgid "Each relay rotates its onion key once a week."
+msgstr ""
+
+#: https//support.torproject.org/about/key-management/
+#: (content/about/key-management/contents+en.lrquestion.description)
+msgid ""
+"When the Tor client establishes circuits, at each step it [demands that the "
+"Tor relay prove knowledge of its onion key](https://svn-"
+"archive.torproject.org/svn/projects/design-paper/tor-"
+"design.html#subsec:circuits)."
+msgstr ""
+
+#: https//support.torproject.org/about/key-management/
+#: (content/about/key-management/contents+en.lrquestion.description)
+msgid ""
+"That way the first node in the path can't just spoof the rest of the path."
+msgstr ""
+
+#: https//support.torproject.org/about/key-management/
+#: (content/about/key-management/contents+en.lrquestion.description)
+msgid ""
+"Because the Tor client chooses the path, it can make sure to get Tor's "
+"\"distributed trust\" property: no single relay in the path can know about "
+"both the client and what the client is doing."
+msgstr ""
+
+#: https//support.torproject.org/about/key-management/
+#: (content/about/key-management/contents+en.lrquestion.description)
+msgid ""
+"**Coordination**: How do clients know what the relays are, and how do they "
+"know that they have the right keys for them?"
+msgstr ""
+
+#: https//support.torproject.org/about/key-management/
+#: (content/about/key-management/contents+en.lrquestion.description)
+msgid "Each relay has a long-term public signing key called the \"identity key\"."
+msgstr ""
+
+#: https//support.torproject.org/about/key-management/
+#: (content/about/key-management/contents+en.lrquestion.description)
+msgid "Each directory authority additionally has a \"directory signing key\"."
+msgstr ""
+
+#: https//support.torproject.org/about/key-management/
+#: (content/about/key-management/contents+en.lrquestion.description)
+msgid ""
+"The directory authorities [provide a signed "
+"list](https://gitweb.torproject.org/torspec.git/tree/dir-spec.txt) of all "
+"the known relays, and in that list are a set of certificates from each relay"
+" (self-signed by their identity key) specifying their keys, locations, exit "
+"policies, and so on."
+msgstr ""
+
+#: https//support.torproject.org/about/key-management/
+#: (content/about/key-management/contents+en.lrquestion.description)
+msgid ""
+"So unless the adversary can control a majority of the directory authorities "
+"(as of 2021 there are 10 directory authorities), they can't trick the Tor "
+"client into using other Tor relays."
+msgstr ""
+
+#: https//support.torproject.org/about/key-management/
+#: (content/about/key-management/contents+en.lrquestion.description)
+msgid "How do clients know what the directory authorities are?"
+msgstr ""
+
+#: https//support.torproject.org/about/key-management/
+#: (content/about/key-management/contents+en.lrquestion.description)
+msgid ""
+"The Tor software comes with a built-in list of location and public key for "
+"each directory authority."
+msgstr ""
+
+#: https//support.torproject.org/about/key-management/
+#: (content/about/key-management/contents+en.lrquestion.description)
+msgid ""
+"So the only way to trick users into using a fake Tor network is to give them"
+" a specially modified version of the software."
+msgstr ""
+
+#: https//support.torproject.org/about/key-management/
+#: (content/about/key-management/contents+en.lrquestion.description)
+msgid "How do users know they've got the right software?"
+msgstr ""
+
+#: https//support.torproject.org/about/key-management/
+#: (content/about/key-management/contents+en.lrquestion.description)
+msgid ""
+"When we distribute the source code or a package, we digitally sign it with "
+"[GNU Privacy Guard](http://www.gnupg.org/). See the [instructions on how to "
+"check Tor Browser's signature](https://support.torproject.org/tbb/how-to-"
+"verify-signature/)."
+msgstr ""
+
+#: https//support.torproject.org/about/key-management/
+#: (content/about/key-management/contents+en.lrquestion.description)
+msgid ""
+"In order to be certain that it's really signed by us, you need to have met "
+"us in person and gotten a copy of our GPG key fingerprint, or you need to "
+"know somebody who has."
+msgstr ""
+
+#: https//support.torproject.org/about/key-management/
+#: (content/about/key-management/contents+en.lrquestion.description)
+msgid ""
+"If you're concerned about an attack on this level, we recommend you get "
+"involved with the security community and start meeting people."
+msgstr ""
+
#: https//support.torproject.org/about/no-data-scrubbing/
#: (content/about/no-data-scrubbing/contents+en.lrquestion.title)
msgid ""
@@ -3339,6 +3774,151 @@ msgstr ""
"ÐÑи ÑÑом Tor Browser ниÑего не Ð¼Ð¾Ð¶ÐµÑ Ð¿Ð¾Ð´ÐµÐ»Ð°ÑÑ, напÑимеÑ, Ñ Ð´Ð°Ð½Ð½Ñми, коÑоÑÑе "
"Ñам полÑзоваÑÐµÐ»Ñ Ð²Ð¿Ð¸ÑÑÐ²Ð°ÐµÑ Ð² Ð¿Ð¾Ð»Ñ ÑоÑм на ÑайÑаÑ
."
+#: https//support.torproject.org/about/protections/
+#: (content/about/protections/contents+en.lrquestion.title)
+msgid "What protections does Tor provide?"
+msgstr ""
+
+#: https//support.torproject.org/about/protections/
+#: (content/about/protections/contents+en.lrquestion.description)
+msgid ""
+"Internet communication is based on a store-and-forward model that can be "
+"understood in analogy to postal mail: Data is transmitted in blocks called "
+"IP datagrams or packets."
+msgstr ""
+
+#: https//support.torproject.org/about/protections/
+#: (content/about/protections/contents+en.lrquestion.description)
+msgid ""
+"Every packet includes a source IP address (of the sender) and a destination "
+"IP address (of the receiver), just as ordinary letters contain postal "
+"addresses of sender and receiver."
+msgstr ""
+
+#: https//support.torproject.org/about/protections/
+#: (content/about/protections/contents+en.lrquestion.description)
+msgid ""
+"The way from sender to receiver involves multiple hops of routers, where "
+"each router inspects the destination IP address and forwards the packet "
+"closer to its destination."
+msgstr ""
+
+#: https//support.torproject.org/about/protections/
+#: (content/about/protections/contents+en.lrquestion.description)
+msgid ""
+"Thus, every router between sender and receiver learns that the sender is "
+"communicating with the receiver."
+msgstr ""
+
+#: https//support.torproject.org/about/protections/
+#: (content/about/protections/contents+en.lrquestion.description)
+msgid ""
+"In particular, your local ISP is in the position to build a complete profile"
+" of your Internet usage."
+msgstr ""
+
+#: https//support.torproject.org/about/protections/
+#: (content/about/protections/contents+en.lrquestion.description)
+msgid ""
+"In addition, every server in the Internet that can see any of the packets "
+"can profile your behavior."
+msgstr ""
+
+#: https//support.torproject.org/about/protections/
+#: (content/about/protections/contents+en.lrquestion.description)
+msgid ""
+"The aim of Tor is to improve your privacy by sending your traffic through a "
+"series of proxies."
+msgstr ""
+
+#: https//support.torproject.org/about/protections/
+#: (content/about/protections/contents+en.lrquestion.description)
+msgid ""
+"Your communication is encrypted in multiple layers and routed via multiple "
+"hops through the Tor network to the final receiver."
+msgstr ""
+
+#: https//support.torproject.org/about/protections/
+#: (content/about/protections/contents+en.lrquestion.description)
+msgid ""
+"More details on this process can be found in this "
+"[visualization](https://support.torproject.org/https/https-1/)."
+msgstr ""
+
+#: https//support.torproject.org/about/protections/
+#: (content/about/protections/contents+en.lrquestion.description)
+msgid ""
+"Note that all your local ISP can observe now is that you are communicating "
+"with Tor nodes."
+msgstr ""
+
+#: https//support.torproject.org/about/protections/
+#: (content/about/protections/contents+en.lrquestion.description)
+msgid ""
+"Similarly, servers in the Internet just see that they are being contacted by"
+" Tor nodes."
+msgstr ""
+
+#: https//support.torproject.org/about/protections/
+#: (content/about/protections/contents+en.lrquestion.description)
+msgid "Generally speaking, Tor aims to solve three privacy problems:"
+msgstr ""
+
+#: https//support.torproject.org/about/protections/
+#: (content/about/protections/contents+en.lrquestion.description)
+msgid ""
+"First, Tor prevents websites and other services from learning your location,"
+" which they can use to build databases about your habits and interests."
+msgstr ""
+
+#: https//support.torproject.org/about/protections/
+#: (content/about/protections/contents+en.lrquestion.description)
+msgid ""
+"With Tor, your Internet connections don't give you away by default -- now "
+"you can have the ability to choose, for each connection, how much "
+"information to reveal."
+msgstr ""
+
+#: https//support.torproject.org/about/protections/
+#: (content/about/protections/contents+en.lrquestion.description)
+msgid ""
+"Second, Tor prevents people watching your traffic locally (such as your ISP "
+"or someone with access to your home wifi or router) from learning what "
+"information you're fetching and where you're fetching it from."
+msgstr ""
+
+#: https//support.torproject.org/about/protections/
+#: (content/about/protections/contents+en.lrquestion.description)
+msgid ""
+"It also stops them from deciding what you're allowed to learn and publish --"
+" if you can get to any part of the Tor network, you can reach any site on "
+"the Internet."
+msgstr ""
+
+#: https//support.torproject.org/about/protections/
+#: (content/about/protections/contents+en.lrquestion.description)
+msgid ""
+"Third, Tor routes your connection through more than one Tor relay so no "
+"single relay can learn what you're up to."
+msgstr ""
+
+#: https//support.torproject.org/about/protections/
+#: (content/about/protections/contents+en.lrquestion.description)
+msgid ""
+"Because these relays are run by different individuals or organizations, "
+"distributing trust provides more security than the old [one hop "
+"proxy](https://support.torproject.org/about/#how-is-tor-different-from-"
+"other-proxies) approach."
+msgstr ""
+
+#: https//support.torproject.org/about/protections/
+#: (content/about/protections/contents+en.lrquestion.description)
+msgid ""
+"Note, however, that there are situations where Tor fails to solve these "
+"privacy problems entirely: see the entry below on [remaining "
+"attacks](https://support.torproject.org/about/#attacks-on-onion-routing)."
+msgstr ""
+
#: https//support.torproject.org/about/what-is-tor/
#: (content/about/what-is-tor/contents+en.lrquestion.title)
msgid "What is Tor?"
@@ -5988,15 +6568,12 @@ msgstr ""
#: (content/tbb/tbb-47/contents+en.lrquestion.description)
msgid ""
"Also, read up on the HTTPProxyAuthenticator and HTTPSProxyAuthenticator "
-"options if your proxy requires auth. We only support basic auth currently, "
-"but if you need NTLM authentication, you may find [this post in the "
-"archives](https://archives.seul.org/or/talk/Jun-2005/msg00223.html) useful."
+"options if your [proxy requires auth.](https://developer.mozilla.org/en-"
+"US/docs/Web/HTTP/Headers/Proxy-Authenticate) We only support basic auth "
+"currently, but if you need NTLM authentication, you may find [this post in "
+"the archives](https://archives.seul.org/or/talk/Jun-2005/msg00223.html) "
+"useful."
msgstr ""
-"ÐÑли Ð²Ð°Ñ Ð¿ÑокÑи ÑÑебÑÐµÑ Ð°ÑÑенÑиÑикаÑиÑ, обÑаÑиÑе внимание на опÑии "
-"HTTPProxyAuthenticator и HTTPSProxyAuthenticator. РнаÑÑоÑÑее вÑÐµÐ¼Ñ Ð¼Ñ "
-"поддеÑживаем ÑолÑко базовÑÑ Ð°ÑÑенÑиÑикаÑиÑ. ÐÑли вам нÑжна NTLM-"
-"аÑÑенÑиÑикаÑиÑ, ÑовеÑÑем обÑаÑиÑÑÑÑ Ðº [ÑÑÐ¾Ð¼Ñ "
-"маÑеÑиалÑ](https://archives.seul.org/or/talk/Jun-2005/msg00223.html)."
#: https//support.torproject.org/tbb/tbb-47/
#: (content/tbb/tbb-47/contents+en.lrquestion.description)
@@ -6266,6 +6843,219 @@ msgstr ""
"ÐбÑаÑиÑе внимание: вÑе ÑÑÑоки, коÑоÑÑе наÑинаÑÑÑÑ Ñ `#`, ÑÑиÑаÑÑÑÑ "
"комменÑаÑиÑми. Ðни не влиÑÑÑ Ð½Ð° наÑÑÑойки Tor."
+#: https//support.torproject.org/tbb/tbb-firewall-ports/
+#: (content/tbb/tbb-firewall-ports/contents+en.lrquestion.title)
+msgid "My firewall only allows a few outgoing ports"
+msgstr ""
+
+#: https//support.torproject.org/tbb/tbb-firewall-ports/
+#: (content/tbb/tbb-firewall-ports/contents+en.lrquestion.description)
+msgid ""
+"If your firewall works by blocking ports, then you can tell Tor to only use "
+"the ports when you start your Tor Browser."
+msgstr ""
+
+#: https//support.torproject.org/tbb/tbb-firewall-ports/
+#: (content/tbb/tbb-firewall-ports/contents+en.lrquestion.description)
+msgid ""
+"Or you can add the ports that your firewall permits by adding "
+"\"FascistFirewall 1\" to your torrc configuration file."
+msgstr ""
+
+#: https//support.torproject.org/tbb/tbb-firewall-ports/
+#: (content/tbb/tbb-firewall-ports/contents+en.lrquestion.description)
+msgid ""
+"By default, when you set this Tor assumes that your firewall allows only "
+"port 80 and port 443 (HTTP and HTTPS respectively)."
+msgstr ""
+
+#: https//support.torproject.org/tbb/tbb-firewall-ports/
+#: (content/tbb/tbb-firewall-ports/contents+en.lrquestion.description)
+msgid ""
+"You can select a different set of ports with the FirewallPorts torrc option."
+msgstr ""
+
+#: https//support.torproject.org/tbb/tbb-firewall-ports/
+#: (content/tbb/tbb-firewall-ports/contents+en.lrquestion.description)
+msgid ""
+"If you want to be more fine-grained with your controls, you can also use the"
+" ReachableAddresses config options, e.g.:"
+msgstr ""
+
+#: https//support.torproject.org/tbb/tbb-firewall-ports/
+#: (content/tbb/tbb-firewall-ports/contents+en.lrquestion.description)
+#: https//support.torproject.org/tbb/tbb-install-tor-central-server/
+#: (content/tbb/tbb-install-tor-central-server/contents+en.lrquestion.description)
+#: https//support.torproject.org/operators/default-exit-ports/
+#: (content/operators/default-exit-ports/contents+en.lrquestion.description)
+#: https//support.torproject.org/operators/hibernation/
+#: (content/operators/hibernation/contents+en.lrquestion.description)
+#: https//support.torproject.org/operators/limit-total-bandwidth/
+#: (content/operators/limit-total-bandwidth/contents+en.lrquestion.description)
+#: https//support.torproject.org/misc/bug-or-feedback/
+#: (content/misc/bug-or-feedback/contents+en.lrquestion.description)
+#: https//support.torproject.org/get-in-touch/why-i-cant-join-tor-channels/
+#: (content/get-in-touch/why-i-cant-join-tor-channels/contents+en.lrquestion.description)
+#: https//support.torproject.org/apt/tor-deb-repo/
+#: (content/apt/apt-1/contents+en.lrquestion.description)
+#: https//support.torproject.org/apt/apt-over-tor/
+#: (content/apt/apt-3/contents+en.lrquestion.description)
+msgid "```"
+msgstr "```"
+
+#: https//support.torproject.org/tbb/tbb-firewall-ports/
+#: (content/tbb/tbb-firewall-ports/contents+en.lrquestion.description)
+msgid "ReachableDirAddresses *:80"
+msgstr ""
+
+#: https//support.torproject.org/tbb/tbb-firewall-ports/
+#: (content/tbb/tbb-firewall-ports/contents+en.lrquestion.description)
+msgid "ReachableORAddresses *:443"
+msgstr ""
+
+#: https//support.torproject.org/tbb/tbb-install-tor-central-server/
+#: (content/tbb/tbb-install-tor-central-server/contents+en.lrquestion.title)
+msgid ""
+"Can I install Tor on a central server, and have my clients connect to it?"
+msgstr ""
+
+#: https//support.torproject.org/tbb/tbb-install-tor-central-server/
+#: (content/tbb/tbb-install-tor-central-server/contents+en.lrquestion.description)
+msgid ""
+"Yes. Tor can be configured as a client or a relay on another machine, and "
+"allow other machines to be able to connect to it for anonymity."
+msgstr ""
+
+#: https//support.torproject.org/tbb/tbb-install-tor-central-server/
+#: (content/tbb/tbb-install-tor-central-server/contents+en.lrquestion.description)
+msgid ""
+"This is most useful in an environment where many computers want a gateway of"
+" anonymity to the rest of the world."
+msgstr ""
+
+#: https//support.torproject.org/tbb/tbb-install-tor-central-server/
+#: (content/tbb/tbb-install-tor-central-server/contents+en.lrquestion.description)
+msgid ""
+"However, be forewarned that with this configuration, anyone within your "
+"private network (existing between you and the Tor client/relay) can see what"
+" traffic you are sending in clear text."
+msgstr ""
+
+#: https//support.torproject.org/tbb/tbb-install-tor-central-server/
+#: (content/tbb/tbb-install-tor-central-server/contents+en.lrquestion.description)
+msgid "The anonymity doesn't start until you get to the Tor relay."
+msgstr ""
+
+#: https//support.torproject.org/tbb/tbb-install-tor-central-server/
+#: (content/tbb/tbb-install-tor-central-server/contents+en.lrquestion.description)
+msgid ""
+"Because of this, if you are the controller of your domain and you know "
+"everything's locked down, you will be OK, but this configuration may not be "
+"suitable for large private networks where security is key all around."
+msgstr ""
+
+#: https//support.torproject.org/tbb/tbb-install-tor-central-server/
+#: (content/tbb/tbb-install-tor-central-server/contents+en.lrquestion.description)
+msgid ""
+"Configuration is simple, editing your torrc file's SocksListenAddress "
+"according to the following examples:"
+msgstr ""
+
+#: https//support.torproject.org/tbb/tbb-install-tor-central-server/
+#: (content/tbb/tbb-install-tor-central-server/contents+en.lrquestion.description)
+msgid "SocksListenAddress 127.0.0.1"
+msgstr ""
+
+#: https//support.torproject.org/tbb/tbb-install-tor-central-server/
+#: (content/tbb/tbb-install-tor-central-server/contents+en.lrquestion.description)
+msgid "SocksListenAddress 192.168.x.x:9100"
+msgstr ""
+
+#: https//support.torproject.org/tbb/tbb-install-tor-central-server/
+#: (content/tbb/tbb-install-tor-central-server/contents+en.lrquestion.description)
+msgid "SocksListenAddress 0.0.0.0:9100"
+msgstr ""
+
+#: https//support.torproject.org/tbb/tbb-install-tor-central-server/
+#: (content/tbb/tbb-install-tor-central-server/contents+en.lrquestion.description)
+msgid ""
+"You can state multiple listen addresses, in the case that you are part of "
+"several networks or subnets."
+msgstr ""
+
+#: https//support.torproject.org/tbb/tbb-install-tor-central-server/
+#: (content/tbb/tbb-install-tor-central-server/contents+en.lrquestion.description)
+msgid "SocksListenAddress 192.168.x.x:9100 #eth0"
+msgstr ""
+
+#: https//support.torproject.org/tbb/tbb-install-tor-central-server/
+#: (content/tbb/tbb-install-tor-central-server/contents+en.lrquestion.description)
+msgid "SocksListenAddress 10.x.x.x:9100 #eth1"
+msgstr ""
+
+#: https//support.torproject.org/tbb/tbb-install-tor-central-server/
+#: (content/tbb/tbb-install-tor-central-server/contents+en.lrquestion.description)
+msgid ""
+"After this, your clients on their respective networks/subnets would specify "
+"a socks proxy with the address and port you specified SocksListenAddress to "
+"be."
+msgstr ""
+
+#: https//support.torproject.org/tbb/tbb-install-tor-central-server/
+#: (content/tbb/tbb-install-tor-central-server/contents+en.lrquestion.description)
+msgid ""
+"Please note that the SocksPort configuration option gives the port ONLY for "
+"localhost (127.0.0.1)."
+msgstr ""
+
+#: https//support.torproject.org/tbb/tbb-install-tor-central-server/
+#: (content/tbb/tbb-install-tor-central-server/contents+en.lrquestion.description)
+msgid ""
+"When setting up your SocksListenAddress(es), you need to give the port with "
+"the address, as shown above."
+msgstr ""
+
+#: https//support.torproject.org/tbb/tbb-install-tor-central-server/
+#: (content/tbb/tbb-install-tor-central-server/contents+en.lrquestion.description)
+msgid ""
+"If you are interested in forcing all outgoing data through the central Tor "
+"client/relay, instead of the server only being an optional proxy, you may "
+"find the program iptables (for *nix) useful."
+msgstr ""
+
+#: https//support.torproject.org/tbb/tbb-run-client-different-computer/
+#: (content/tbb/tbb-run-client-different-computer/contents+en.lrquestion.title)
+msgid ""
+"I want to run my Tor client on a different computer than my applications"
+msgstr ""
+
+#: https//support.torproject.org/tbb/tbb-run-client-different-computer/
+#: (content/tbb/tbb-run-client-different-computer/contents+en.lrquestion.description)
+msgid ""
+"By default, your Tor client only listens for applications that connect from "
+"localhost."
+msgstr ""
+
+#: https//support.torproject.org/tbb/tbb-run-client-different-computer/
+#: (content/tbb/tbb-run-client-different-computer/contents+en.lrquestion.description)
+msgid "Connections from other computers are refused."
+msgstr ""
+
+#: https//support.torproject.org/tbb/tbb-run-client-different-computer/
+#: (content/tbb/tbb-run-client-different-computer/contents+en.lrquestion.description)
+msgid ""
+"If you want to torify applications on different computers than the Tor "
+"client, you should edit your torrc to define `SocksListenAddress 0.0.0.0` "
+"and then restart (or hup) Tor."
+msgstr ""
+
+#: https//support.torproject.org/tbb/tbb-run-client-different-computer/
+#: (content/tbb/tbb-run-client-different-computer/contents+en.lrquestion.description)
+msgid ""
+"If you want to get more advanced, you can configure your Tor client on a "
+"firewall to bind to your internal IP but not your external IP."
+msgstr ""
+
#: https//support.torproject.org/tbb/website-blocking-tor/
#: (content/tbb/website-blocking-tor/contents+en.lrquestion.title)
msgid "A website I am trying to reach is blocking access over Tor."
@@ -7960,6 +8750,130 @@ msgid ""
"guide."
msgstr ""
+#: https//support.torproject.org/operators/default-exit-ports/
+#: (content/operators/default-exit-ports/contents+en.lrquestion.title)
+msgid "Is there a list of default exit ports?"
+msgstr ""
+
+#: https//support.torproject.org/operators/default-exit-ports/
+#: (content/operators/default-exit-ports/contents+en.lrquestion.description)
+msgid ""
+"The default open ports are listed below but keep in mind that, any port or "
+"ports can be opened by the relay operator by configuring it in torrc or "
+"modifying the source code."
+msgstr ""
+
+#: https//support.torproject.org/operators/default-exit-ports/
+#: (content/operators/default-exit-ports/contents+en.lrquestion.description)
+msgid ""
+"The default according to src/or/policies.c ([line 85][1] and [line 1901][2])"
+" from the source code release [release-0.4.6][3]:"
+msgstr ""
+
+#: https//support.torproject.org/operators/default-exit-ports/
+#: (content/operators/default-exit-ports/contents+en.lrquestion.description)
+msgid "reject 0.0.0.0/8"
+msgstr ""
+
+#: https//support.torproject.org/operators/default-exit-ports/
+#: (content/operators/default-exit-ports/contents+en.lrquestion.description)
+msgid "reject 169.254.0.0/16"
+msgstr ""
+
+#: https//support.torproject.org/operators/default-exit-ports/
+#: (content/operators/default-exit-ports/contents+en.lrquestion.description)
+msgid "reject 127.0.0.0/8"
+msgstr ""
+
+#: https//support.torproject.org/operators/default-exit-ports/
+#: (content/operators/default-exit-ports/contents+en.lrquestion.description)
+msgid "reject 192.168.0.0/16"
+msgstr ""
+
+#: https//support.torproject.org/operators/default-exit-ports/
+#: (content/operators/default-exit-ports/contents+en.lrquestion.description)
+msgid "reject 10.0.0.0/8"
+msgstr ""
+
+#: https//support.torproject.org/operators/default-exit-ports/
+#: (content/operators/default-exit-ports/contents+en.lrquestion.description)
+msgid "reject 172.16.0.0/12"
+msgstr ""
+
+#: https//support.torproject.org/operators/default-exit-ports/
+#: (content/operators/default-exit-ports/contents+en.lrquestion.description)
+msgid "reject *:25"
+msgstr ""
+
+#: https//support.torproject.org/operators/default-exit-ports/
+#: (content/operators/default-exit-ports/contents+en.lrquestion.description)
+msgid "reject *:119"
+msgstr ""
+
+#: https//support.torproject.org/operators/default-exit-ports/
+#: (content/operators/default-exit-ports/contents+en.lrquestion.description)
+msgid "reject *:135-139"
+msgstr ""
+
+#: https//support.torproject.org/operators/default-exit-ports/
+#: (content/operators/default-exit-ports/contents+en.lrquestion.description)
+msgid "reject *:445"
+msgstr ""
+
+#: https//support.torproject.org/operators/default-exit-ports/
+#: (content/operators/default-exit-ports/contents+en.lrquestion.description)
+msgid "reject *:563"
+msgstr ""
+
+#: https//support.torproject.org/operators/default-exit-ports/
+#: (content/operators/default-exit-ports/contents+en.lrquestion.description)
+msgid "reject *:1214"
+msgstr ""
+
+#: https//support.torproject.org/operators/default-exit-ports/
+#: (content/operators/default-exit-ports/contents+en.lrquestion.description)
+msgid "reject *:4661-4666"
+msgstr ""
+
+#: https//support.torproject.org/operators/default-exit-ports/
+#: (content/operators/default-exit-ports/contents+en.lrquestion.description)
+msgid "reject *:6346-6429"
+msgstr ""
+
+#: https//support.torproject.org/operators/default-exit-ports/
+#: (content/operators/default-exit-ports/contents+en.lrquestion.description)
+msgid "reject *:6699"
+msgstr ""
+
+#: https//support.torproject.org/operators/default-exit-ports/
+#: (content/operators/default-exit-ports/contents+en.lrquestion.description)
+msgid "reject *:6881-6999"
+msgstr ""
+
+#: https//support.torproject.org/operators/default-exit-ports/
+#: (content/operators/default-exit-ports/contents+en.lrquestion.description)
+msgid "accept *:*"
+msgstr ""
+
+#: https//support.torproject.org/operators/default-exit-ports/
+#: (content/operators/default-exit-ports/contents+en.lrquestion.description)
+msgid ""
+"[1]: "
+"https://gitlab.torproject.org/tpo/core/tor/-/blob/release-0.4.6/src/core/or/policies.c#L85"
+msgstr ""
+
+#: https//support.torproject.org/operators/default-exit-ports/
+#: (content/operators/default-exit-ports/contents+en.lrquestion.description)
+msgid ""
+"[2]: "
+"https://gitlab.torproject.org/tpo/core/tor/-/blob/release-0.4.6/src/core/or/policies.c#L1901"
+msgstr ""
+
+#: https//support.torproject.org/operators/default-exit-ports/
+#: (content/operators/default-exit-ports/contents+en.lrquestion.description)
+msgid "[3]: https://gitlab.torproject.org/tpo/core/tor/-/tree/release-0.4.6/"
+msgstr ""
+
#: https//support.torproject.org/operators/dynamic-ip/
#: (content/operators/dynamic-ip/contents+en.lrquestion.title)
msgid "Can I run a Tor relay using a dynamic IP address?"
@@ -8151,21 +9065,6 @@ msgstr ""
"Ðак ÑолÑко Tor Ð²Ð¿Ð°Ð´ÐµÑ Ð² ÑпÑÑÐºÑ (гибеÑнаÑиÑ), Ð²Ñ Ð¼Ð¾Ð¶ÐµÑе оÑÑаÑÑÑÑ Ñ "
"неÑабоÑаÑÑим бÑаÑзеÑом. РжÑÑнале поÑвиÑÑÑ ÑÐ°ÐºÐ°Ñ Ð·Ð°Ð¿Ð¸ÑÑ:"
-#: https//support.torproject.org/operators/hibernation/
-#: (content/operators/hibernation/contents+en.lrquestion.description)
-#: https//support.torproject.org/operators/limit-total-bandwidth/
-#: (content/operators/limit-total-bandwidth/contents+en.lrquestion.description)
-#: https//support.torproject.org/misc/bug-or-feedback/
-#: (content/misc/bug-or-feedback/contents+en.lrquestion.description)
-#: https//support.torproject.org/get-in-touch/why-i-cant-join-tor-channels/
-#: (content/get-in-touch/why-i-cant-join-tor-channels/contents+en.lrquestion.description)
-#: https//support.torproject.org/apt/tor-deb-repo/
-#: (content/apt/apt-1/contents+en.lrquestion.description)
-#: https//support.torproject.org/apt/apt-over-tor/
-#: (content/apt/apt-3/contents+en.lrquestion.description)
-msgid "```"
-msgstr "```"
-
#: https//support.torproject.org/operators/hibernation/
#: (content/operators/hibernation/contents+en.lrquestion.description)
msgid "Bandwidth soft limit reached; commencing hibernation."
@@ -10803,6 +11702,131 @@ msgstr "uid tor-security at lists.torproject.org"
msgid "sub 4096R/C00942E4 2017-03-13"
msgstr "sub 4096R/C00942E4 2017-03-13"
+#: https//support.torproject.org/misc/check-socks-dns-leaks/
+#: (content/misc/check-socks-dns-leaks/contents+en.lrquestion.title)
+msgid ""
+"How do I check if my application that uses SOCKS is leaking DNS requests?"
+msgstr ""
+
+#: https//support.torproject.org/misc/check-socks-dns-leaks/
+#: (content/misc/check-socks-dns-leaks/contents+en.lrquestion.description)
+msgid ""
+"Even if your application is using the correct variant of the SOCKS protocol,"
+" there is still a risk that it could be leaking DNS queries."
+msgstr ""
+
+#: https//support.torproject.org/misc/check-socks-dns-leaks/
+#: (content/misc/check-socks-dns-leaks/contents+en.lrquestion.description)
+msgid ""
+"This problem happens in Firefox extensions that resolve the destination "
+"hostname themselves, for example to show you its IP address, what country "
+"it's in, etc."
+msgstr ""
+
+#: https//support.torproject.org/misc/check-socks-dns-leaks/
+#: (content/misc/check-socks-dns-leaks/contents+en.lrquestion.description)
+msgid ""
+"If you suspect your application might behave like this, follow the "
+"instructions below to check."
+msgstr ""
+
+#: https//support.torproject.org/misc/check-socks-dns-leaks/
+#: (content/misc/check-socks-dns-leaks/contents+en.lrquestion.description)
+msgid ""
+"1. Add `TestSocks 1` to your [torrc file](https://support.torproject.org/tbb"
+"/tbb-editing-torrc/)."
+msgstr ""
+
+#: https//support.torproject.org/misc/check-socks-dns-leaks/
+#: (content/misc/check-socks-dns-leaks/contents+en.lrquestion.description)
+msgid ""
+"1. Start Tor, and point your program's SOCKS proxy settings to Tor's SOCKS5 "
+"server (`socks5://127.0.0.1:9050` by default)."
+msgstr ""
+
+#: https//support.torproject.org/misc/check-socks-dns-leaks/
+#: (content/misc/check-socks-dns-leaks/contents+en.lrquestion.description)
+msgid ""
+"1. Watch your logs as you use your application. For each socks connection, "
+"Tor will log a `notice` for safe connections, and a `warn` for connections "
+"leaking DNS requests."
+msgstr ""
+
+#: https//support.torproject.org/misc/check-socks-dns-leaks/
+#: (content/misc/check-socks-dns-leaks/contents+en.lrquestion.description)
+msgid ""
+"If you want to automatically disable all connections leaking DNS requests, "
+"set `SafeSocks 1` in your torrc file."
+msgstr ""
+
+#: https//support.torproject.org/misc/hide-exits/
+#: (content/misc/hide-exits/contents+en.lrquestion.title)
+msgid ""
+"You should hide the list of Tor relays, so people can't block the exits."
+msgstr ""
+
+#: https//support.torproject.org/misc/hide-exits/
+#: (content/misc/hide-exits/contents+en.lrquestion.description)
+msgid "There are a few reasons we don't:"
+msgstr ""
+
+#: https//support.torproject.org/misc/hide-exits/
+#: (content/misc/hide-exits/contents+en.lrquestion.description)
+msgid ""
+"1. We can't help but make the information available, since Tor clients need "
+"to use it to pick their paths."
+msgstr ""
+
+#: https//support.torproject.org/misc/hide-exits/
+#: (content/misc/hide-exits/contents+en.lrquestion.description)
+msgid "So if the \"blockers\" want it, they can get it anyway."
+msgstr ""
+
+#: https//support.torproject.org/misc/hide-exits/
+#: (content/misc/hide-exits/contents+en.lrquestion.description)
+msgid ""
+"Further, even if we didn't tell clients about the list of relays directly, "
+"somebody could still make a lot of connections through Tor to a test site "
+"and build a list of the addresses they see."
+msgstr ""
+
+#: https//support.torproject.org/misc/hide-exits/
+#: (content/misc/hide-exits/contents+en.lrquestion.description)
+msgid ""
+"1. If people want to block us, we believe that they should be allowed to do "
+"so."
+msgstr ""
+
+#: https//support.torproject.org/misc/hide-exits/
+#: (content/misc/hide-exits/contents+en.lrquestion.description)
+msgid ""
+"Obviously, we would prefer for everybody to allow Tor users to connect to "
+"them, but people have the right to decide who their services should allow "
+"connections from, and if they want to block anonymous users, they can."
+msgstr ""
+
+#: https//support.torproject.org/misc/hide-exits/
+#: (content/misc/hide-exits/contents+en.lrquestion.description)
+msgid ""
+"1. Being blockable also has tactical advantages: it may be a persuasive "
+"response to website maintainers who feel threatened by Tor."
+msgstr ""
+
+#: https//support.torproject.org/misc/hide-exits/
+#: (content/misc/hide-exits/contents+en.lrquestion.description)
+msgid ""
+"Giving them the option may inspire them to stop and think about whether they"
+" really want to eliminate private access to their system, and if not, what "
+"other options they might have."
+msgstr ""
+
+#: https//support.torproject.org/misc/hide-exits/
+#: (content/misc/hide-exits/contents+en.lrquestion.description)
+msgid ""
+"The time they might otherwise have spent blocking Tor, they may instead "
+"spend rethinking their overall approach to privacy and anonymity."
+msgstr ""
+
#: https//support.torproject.org/misc/menu/
#: (content/misc/menu/contents+en.lrquestion.description)
msgid "About"
@@ -11507,66 +12531,21 @@ msgstr "### Ðак подÑвеÑдиÑÑ Ð½Ð¸ÐºÐ½ÐµÐ¹Ð¼"
#: https//support.torproject.org/get-in-touch/why-i-cant-join-tor-channels/
#: (content/get-in-touch/why-i-cant-join-tor-channels/contents+en.lrquestion.description)
msgid ""
-"Then, to complete the registration and ultimately gain access to the #tor-"
-"project channel, your nickname must be **verified**."
-msgstr ""
-"ЧÑÐ¾Ð±Ñ Ð·Ð°Ð²ÐµÑÑиÑÑ ÑегиÑÑÑаÑÐ¸Ñ Ð¸ полÑÑиÑÑ Ð´Ð¾ÑÑÑп к ÐºÐ°Ð½Ð°Ð»Ñ #tor-project, никнейм"
-" должен бÑÑÑ **подÑвеÑждÑн**."
-
-#: https//support.torproject.org/get-in-touch/why-i-cant-join-tor-channels/
-#: (content/get-in-touch/why-i-cant-join-tor-channels/contents+en.lrquestion.description)
-msgid ""
-"1. To verify your nick, open a new browser window and go to "
-"https://webchat.oftc.net/?channels=tor."
+"After registering your nickname, to gain access to the #tor-project and "
+"other protected channels, your nickname must be **verified**."
msgstr ""
-"1. ЧÑÐ¾Ð±Ñ Ð¿ÑовеÑиÑÑ Ñвой никнейм, оÑкÑойÑе новое окно бÑаÑзеÑа и зайдиÑе на "
-"ÑÐ°Ð¹Ñ https://webchat.oftc.net/?channels=tor."
-
-#: https//support.torproject.org/get-in-touch/why-i-cant-join-tor-channels/
-#: (content/get-in-touch/why-i-cant-join-tor-channels/contents+en.lrquestion.description)
-msgid "2. Log in with your IRC nickname and password."
-msgstr "2. ÐойдиÑе Ñ Ð²Ð°Ñими никнеймом и паÑолем IRC."
#: https//support.torproject.org/get-in-touch/why-i-cant-join-tor-channels/
#: (content/get-in-touch/why-i-cant-join-tor-channels/contents+en.lrquestion.description)
msgid ""
-"3. Look for the word **verify** and log in there. It may appear that nothing"
-" has happened. Look at the top of the page, and there will be a column "
-"called **Account**."
+"1. Go to https://services.oftc.net/ and follow the steps in the '*To verify "
+"your account*' section"
msgstr ""
-"3. ÐайдиÑе на ÑÑÑаниÑе гипеÑÑÑÑÐ»ÐºÑ **verify**, нажмиÑе и залогинÑÑеÑÑ. "
-"Ðногда бÑваеÑ, ÑÑо ниÑего не менÑеÑÑÑ. ÐбÑаÑиÑе внимание на веÑÑ
нÑÑ ÑаÑÑÑ "
-"ÑÑÑаниÑÑ. Там еÑÑÑ ÑÑÐ¾Ð»Ð±ÐµÑ **Account**."
-
-#: https//support.torproject.org/get-in-touch/why-i-cant-join-tor-channels/
-#: (content/get-in-touch/why-i-cant-join-tor-channels/contents+en.lrquestion.description)
-msgid "4. Click on **Account**."
-msgstr "4. ÐажмиÑе **Account**."
#: https//support.torproject.org/get-in-touch/why-i-cant-join-tor-channels/
#: (content/get-in-touch/why-i-cant-join-tor-channels/contents+en.lrquestion.description)
-msgid ""
-"5. Click on the small sentence at the bottom of the square that says: Verify"
-" account."
+msgid "2. Go back to the IRC webpage where you are logged in and type:"
msgstr ""
-"5. ÐайдиÑе маленÑкÑÑ Ð³Ð¸Ð¿ÐµÑÑÑÑÐ»ÐºÑ Ð² конÑе ÑаблиÑÑ. Ðна назÑваеÑÑÑ \"Verify "
-"account\". ÐажмиÑе."
-
-#: https//support.torproject.org/get-in-touch/why-i-cant-join-tor-channels/
-#: (content/get-in-touch/why-i-cant-join-tor-channels/contents+en.lrquestion.description)
-msgid "6. Fill out the Captcha that pops up, and click ok."
-msgstr "6. РеÑиÑе капÑÑ Ð²Ð¾ вÑплÑваÑÑем окне и нажмиÑе \"Ðк\"."
-
-#: https//support.torproject.org/get-in-touch/why-i-cant-join-tor-channels/
-#: (content/get-in-touch/why-i-cant-join-tor-channels/contents+en.lrquestion.description)
-msgid ""
-"7. A tiny message will appear: \"Your NickServ account has been verified.\""
-msgstr "7. ÐÑ ÑвидиÑе ÑообÑение: \"Your NickServ account has been verified.\""
-
-#: https//support.torproject.org/get-in-touch/why-i-cant-join-tor-channels/
-#: (content/get-in-touch/why-i-cant-join-tor-channels/contents+en.lrquestion.description)
-msgid "8. Go back to the IRC webpage where you are logged in and type:"
-msgstr "8. ÐеÑниÑеÑÑ Ð½Ð° ÑÑÑаниÑÑ IRC, где Ð²Ñ Ð·Ð°Ð»Ð¾Ð³Ð¸Ð½ÐµÐ½Ñ, и набеÑиÑе:"
#: https//support.torproject.org/get-in-touch/why-i-cant-join-tor-channels/
#: (content/get-in-touch/why-i-cant-join-tor-channels/contents+en.lrquestion.description)
@@ -11575,13 +12554,13 @@ msgstr "`/msg nickserv checkverify`"
#: https//support.torproject.org/get-in-touch/why-i-cant-join-tor-channels/
#: (content/get-in-touch/why-i-cant-join-tor-channels/contents+en.lrquestion.description)
-msgid "9. Click ENTER."
-msgstr "9. ÐажмиÑе Enter."
+msgid "3. Click ENTER."
+msgstr ""
#: https//support.torproject.org/get-in-touch/why-i-cant-join-tor-channels/
#: (content/get-in-touch/why-i-cant-join-tor-channels/contents+en.lrquestion.description)
-msgid "10. If all is well, you will receive a message that says:"
-msgstr "10. ÐÑли вÑÑ Ð² поÑÑдке, Ð²Ñ ÑвидиÑе Ñакое ÑообÑение:"
+msgid "4. If all is well, you will receive a message that says:"
+msgstr ""
#: https//support.torproject.org/get-in-touch/why-i-cant-join-tor-channels/
#: (content/get-in-touch/why-i-cant-join-tor-channels/contents+en.lrquestion.description)
@@ -11732,21 +12711,23 @@ msgstr "# apt install apt-transport-https"
#: https//support.torproject.org/apt/tor-deb-repo/
#: (content/apt/apt-1/contents+en.lrquestion.description)
msgid ""
-"#### 2. Add the following entries to `/etc/apt/sources.list` or a new file "
-"in `/etc/apt/sources.list.d/`"
+"#### 2. Create a new file in `/etc/apt/sources.list.d/` named `tor.list`. "
+"Add the following entries:"
msgstr ""
-"#### 2. ÐобавÑÑе ÑледÑÑÑие даннÑе в `/etc/apt/sources.list` или в новÑй Ñайл"
-" в `/etc/apt/sources.list.d/`"
#: https//support.torproject.org/apt/tor-deb-repo/
#: (content/apt/apt-1/contents+en.lrquestion.description)
-msgid "deb https://deb.torproject.org/torproject.org <DISTRIBUTION> main"
-msgstr "deb https://deb.torproject.org/torproject.org <DISTRIBUTION> main"
+msgid ""
+"deb [signed-by=/usr/share/keyrings/tor-archive-keyring.gpg] "
+"https://deb.torproject.org/torproject.org <DISTRIBUTION> main"
+msgstr ""
#: https//support.torproject.org/apt/tor-deb-repo/
#: (content/apt/apt-1/contents+en.lrquestion.description)
-msgid "deb-src https://deb.torproject.org/torproject.org <DISTRIBUTION> main"
-msgstr "deb-src https://deb.torproject.org/torproject.org <DISTRIBUTION> main"
+msgid ""
+"deb-src [signed-by=/usr/share/keyrings/tor-archive-keyring.gpg] "
+"https://deb.torproject.org/torproject.org <DISTRIBUTION> main"
+msgstr ""
#: https//support.torproject.org/apt/tor-deb-repo/
#: (content/apt/apt-1/contents+en.lrquestion.description)
@@ -11759,14 +12740,16 @@ msgstr ""
#: https//support.torproject.org/apt/tor-deb-repo/
#: (content/apt/apt-1/contents+en.lrquestion.description)
msgid ""
-"deb https://deb.torproject.org/torproject.org tor-"
+"deb [signed-by=/usr/share/keyrings/tor-archive-keyring.gpg] "
+"https://deb.torproject.org/torproject.org tor-"
"experimental-0.4.6.x-<DISTRIBUTION> main"
msgstr ""
#: https//support.torproject.org/apt/tor-deb-repo/
#: (content/apt/apt-1/contents+en.lrquestion.description)
msgid ""
-"deb-src https://deb.torproject.org/torproject.org tor-"
+"deb-src [signed-by=/usr/share/keyrings/tor-archive-keyring.gpg] "
+"https://deb.torproject.org/torproject.org tor-"
"experimental-0.4.6.x-<DISTRIBUTION> main"
msgstr ""
@@ -11778,20 +12761,18 @@ msgstr "Ðли \"ноÑнÑе ÑбоÑки\":"
#: https//support.torproject.org/apt/tor-deb-repo/
#: (content/apt/apt-1/contents+en.lrquestion.description)
msgid ""
-"deb https://deb.torproject.org/torproject.org tor-nightly-"
-"master-<DISTRIBUTION> main"
+"deb [signed-by=/usr/share/keyrings/tor-archive-keyring.gpg] "
+"https://deb.torproject.org/torproject.org tor-nightly-master-<DISTRIBUTION> "
+"main"
msgstr ""
-"deb https://deb.torproject.org/torproject.org tor-nightly-"
-"master-<DISTRIBUTION> main"
#: https//support.torproject.org/apt/tor-deb-repo/
#: (content/apt/apt-1/contents+en.lrquestion.description)
msgid ""
-"deb-src https://deb.torproject.org/torproject.org tor-nightly-"
-"master-<DISTRIBUTION> main"
+"deb-src [signed-by=/usr/share/keyrings/tor-archive-keyring.gpg] "
+"https://deb.torproject.org/torproject.org tor-nightly-master-<DISTRIBUTION> "
+"main"
msgstr ""
-"deb-src https://deb.torproject.org/torproject.org tor-nightly-"
-"master-<DISTRIBUTION> main"
#: https//support.torproject.org/apt/tor-deb-repo/
#: (content/apt/apt-1/contents+en.lrquestion.description)
@@ -11816,16 +12797,16 @@ msgstr ""
#: https//support.torproject.org/apt/tor-deb-repo/
#: (content/apt/apt-1/contents+en.lrquestion.description)
msgid ""
-"deb [arch=amd64] https://deb.torproject.org/torproject.org focal main"
+"deb [arch=amd64 signed-by=/usr/share/keyrings/tor-archive-keyring.gpg] "
+"https://deb.torproject.org/torproject.org focal main"
msgstr ""
-"deb [arch=amd64] https://deb.torproject.org/torproject.org focal main"
#: https//support.torproject.org/apt/tor-deb-repo/
#: (content/apt/apt-1/contents+en.lrquestion.description)
msgid ""
-"deb-src [arch=amd64] https://deb.torproject.org/torproject.org focal main"
+"deb-src [arch=amd64 signed-by=/usr/share/keyrings/tor-archive-keyring.gpg] "
+"https://deb.torproject.org/torproject.org focal main"
msgstr ""
-"deb-src [arch=amd64] https://deb.torproject.org/torproject.org focal main"
#: https//support.torproject.org/apt/tor-deb-repo/
#: (content/apt/apt-1/contents+en.lrquestion.description)
@@ -11847,28 +12828,17 @@ msgstr ""
#: (content/apt/apt-1/contents+en.lrquestion.description)
msgid ""
"#### 3. Then add the gpg key used to sign the packages by running the "
-"following commands at your command prompt"
+"following command at your command prompt:"
msgstr ""
-"#### 3. ТепеÑÑ Ð´Ð¾Ð±Ð°Ð²ÑÑе gpg-клÑÑ, коÑоÑÑй бÑл иÑполÑзован Ð´Ð»Ñ Ð¿Ð¾Ð´Ð¿Ð¸ÑÑÐ²Ð°Ð½Ð¸Ñ "
-"пакеÑов. ÐÑполниÑе ÑледÑÑÑие ÐºÐ¾Ð¼Ð°Ð½Ð´Ñ Ð² командной ÑÑÑоке"
#: https//support.torproject.org/apt/tor-deb-repo/
#: (content/apt/apt-1/contents+en.lrquestion.description)
msgid ""
-"# wget -qO- "
+"# wget -O- "
"https://deb.torproject.org/torproject.org/A3C4F0F979CAA22CDBA8F512EE8CBC9E886DDD89.asc"
-" | gpg --import"
+" | gpg --dearmor | tee /usr/share/keyrings/tor-archive-keyring.gpg "
+">/dev/null"
msgstr ""
-"# wget -qO- "
-"https://deb.torproject.org/torproject.org/A3C4F0F979CAA22CDBA8F512EE8CBC9E886DDD89.asc"
-" | gpg --import"
-
-#: https//support.torproject.org/apt/tor-deb-repo/
-#: (content/apt/apt-1/contents+en.lrquestion.description)
-msgid ""
-"# gpg --export A3C4F0F979CAA22CDBA8F512EE8CBC9E886DDD89 | apt-key add -"
-msgstr ""
-"# gpg --export A3C4F0F979CAA22CDBA8F512EE8CBC9E886DDD89 | apt-key add -"
#: https//support.torproject.org/apt/tor-deb-repo/
#: (content/apt/apt-1/contents+en.lrquestion.description)
@@ -13845,6 +14815,82 @@ msgstr ""
"ÐеÑ, поÑколÑÐºÑ Ñакой полÑзоваÑÐµÐ»Ñ Ð¾Ð±Ð½Ð¾Ð²Ð»ÑÐµÑ Ñвой ÑпиÑок Ñзлов Ñак же ÑаÑÑо, "
"как и полÑзоваÑелÑ, коÑоÑÑй не менÑÐµÑ IP-адÑÐµÑ Ð² ÑеÑение днÑ."
+#: https//support.torproject.org/alternate-designs/block-websites/
+#: (content/alternate-designs/block-websites/contents+en.lrquestion.title)
+msgid "Exit policies should be able to block websites, not just IP addresses."
+msgstr ""
+
+#: https//support.torproject.org/alternate-designs/block-websites/
+#: (content/alternate-designs/block-websites/contents+en.lrquestion.description)
+msgid ""
+"It would be nice to let relay operators say things like `reject "
+"www.slashdot.org` in their exit policies, rather than requiring them to "
+"learn all the IP address space that could be covered by the site (and then "
+"also blocking other sites at those IP addresses)."
+msgstr ""
+
+#: https//support.torproject.org/alternate-designs/block-websites/
+#: (content/alternate-designs/block-websites/contents+en.lrquestion.description)
+msgid "There are two problems, though."
+msgstr ""
+
+#: https//support.torproject.org/alternate-designs/block-websites/
+#: (content/alternate-designs/block-websites/contents+en.lrquestion.description)
+msgid "First, users could still get around these blocks."
+msgstr ""
+
+#: https//support.torproject.org/alternate-designs/block-websites/
+#: (content/alternate-designs/block-websites/contents+en.lrquestion.description)
+msgid ""
+"For example, they could request the IP address rather than the hostname when"
+" they exit from the Tor network."
+msgstr ""
+
+#: https//support.torproject.org/alternate-designs/block-websites/
+#: (content/alternate-designs/block-websites/contents+en.lrquestion.description)
+msgid ""
+"This means operators would still need to learn all the IP addresses for the "
+"destinations in question."
+msgstr ""
+
+#: https//support.torproject.org/alternate-designs/block-websites/
+#: (content/alternate-designs/block-websites/contents+en.lrquestion.description)
+msgid ""
+"The second problem is that it would allow remote attackers to censor "
+"arbitrary sites."
+msgstr ""
+
+#: https//support.torproject.org/alternate-designs/block-websites/
+#: (content/alternate-designs/block-websites/contents+en.lrquestion.description)
+msgid ""
+"For example, if a Tor operator blocks www1.slashdot.org, and then some "
+"attacker poisons the Tor relay's DNS or otherwise changes that hostname to "
+"resolve to the IP address for a major news site, then suddenly that Tor "
+"relay is blocking the news site."
+msgstr ""
+
+#: https//support.torproject.org/alternate-designs/let-the-network-pick-the-path/
+#: (content/alternate-designs/let-the-network-pick-the-path/contents+en.lrquestion.title)
+msgid "You should let the network pick the path, not the client."
+msgstr ""
+
+#: https//support.torproject.org/alternate-designs/let-the-network-pick-the-path/
+#: (content/alternate-designs/let-the-network-pick-the-path/contents+en.lrquestion.description)
+msgid "No, you cannot trust the network to pick the path."
+msgstr ""
+
+#: https//support.torproject.org/alternate-designs/let-the-network-pick-the-path/
+#: (content/alternate-designs/let-the-network-pick-the-path/contents+en.lrquestion.description)
+msgid "Malicious relays could route you through their colluding friends."
+msgstr ""
+
+#: https//support.torproject.org/alternate-designs/let-the-network-pick-the-path/
+#: (content/alternate-designs/let-the-network-pick-the-path/contents+en.lrquestion.description)
+msgid ""
+"This would give an adversary the ability to watch all of your traffic end to"
+" end."
+msgstr ""
+
#: lego/templates/banner.html:3 lego/templates/banner.html:5
#: templates/banner.html:3 templates/banner.html:5
msgid "Close banner"
@@ -13875,8 +14921,8 @@ msgid "DONATE NOW"
msgstr "ÐÐÐÐРТÐÐÐÐТЬ"
#: lego/templates/footer.html:13 lego/templates/footer.html:22
-#: lego/templates/navbar.html:83 templates/footer.html:13
-#: templates/footer.html:22 templates/navbar.html:83
+#: lego/templates/navbar.html:95 templates/footer.html:13
+#: templates/footer.html:22 templates/navbar.html:95
msgid "Download Tor Browser"
msgstr "СкаÑаÑÑ Tor Browser"
diff --git a/contents+sq.po b/contents+sq.po
index 5b301f2328..17f1132b66 100644
--- a/contents+sq.po
+++ b/contents+sq.po
@@ -10,7 +10,7 @@ msgid ""
msgstr ""
"Project-Id-Version: PACKAGE VERSION\n"
"Report-Msgid-Bugs-To: \n"
-"POT-Creation-Date: 2021-08-25 11:14+CET\n"
+"POT-Creation-Date: 2021-09-01 12:20+CET\n"
"PO-Revision-Date: 2018-10-02 22:41+0000\n"
"Last-Translator: Besnik Bleta <besnik at programeshqip.org>, 2021\n"
"Language-Team: Albanian (https://www.transifex.com/otf/teams/1519/sq/)\n"
@@ -143,6 +143,11 @@ msgstr ""
msgid "Tor Metrics"
msgstr "Statistika Tor-i"
+#: https//support.torproject.org/alternate-designs/
+#: (content/alternate-designs/contents+en.lrtopic.title)
+msgid "Alternate Designs We Don't Do (Yet)"
+msgstr ""
+
#: https//support.torproject.org/glossary/add-on-extension-or-plugin/
#: (content/glossary/add-on-extension-or-plugin/contents+en.lrword.term)
msgid "add-on, extension, or plugin"
@@ -2134,6 +2139,61 @@ msgid ""
"wiki](https://trac.torproject.org/projects/tor/wiki/doc/TorPlusVPN)."
msgstr ""
+#: https//support.torproject.org/faq/relay-donations/
+#: (content/faq/relay-donations/contents+en.lrquestion.title)
+msgid "Can I donate for a relay rather than run my own?"
+msgstr ""
+
+#: https//support.torproject.org/faq/relay-donations/
+#: (content/faq/relay-donations/contents+en.lrquestion.description)
+msgid ""
+"Sure! We have a [list of organizations that run Tor "
+"relays](https://community.torproject.org/relay/community-resources/relay-"
+"associations/) that are happy to turn your donations into better speed and "
+"anonymity for the Tor network."
+msgstr ""
+
+#: https//support.torproject.org/faq/relay-donations/
+#: (content/faq/relay-donations/contents+en.lrquestion.description)
+msgid ""
+"These organizations are not the same as [The Tor Project, "
+"Inc](https://donate.torproject.org/), but we consider that a good thing."
+msgstr ""
+
+#: https//support.torproject.org/faq/relay-donations/
+#: (content/faq/relay-donations/contents+en.lrquestion.description)
+msgid "They're run by nice people who are part of the Tor community."
+msgstr "Ato mbahen në punë nga njerëz të mirë që janë pjesë e bashkësisë Tor."
+
+#: https//support.torproject.org/faq/relay-donations/
+#: (content/faq/relay-donations/contents+en.lrquestion.description)
+msgid ""
+"Note that there can be a tradeoff here between anonymity and performance."
+msgstr ""
+
+#: https//support.torproject.org/faq/relay-donations/
+#: (content/faq/relay-donations/contents+en.lrquestion.description)
+msgid ""
+"The Tor network's anonymity comes in part from diversity, so if you are in a"
+" position to run your own relay, you will be improving Tor's anonymity more "
+"than by donating."
+msgstr ""
+
+#: https//support.torproject.org/faq/relay-donations/
+#: (content/faq/relay-donations/contents+en.lrquestion.description)
+msgid ""
+"At the same time though, economies of scale for bandwidth mean that "
+"combining many small donations into several larger relays is more efficient "
+"at improving network performance."
+msgstr ""
+
+#: https//support.torproject.org/faq/relay-donations/
+#: (content/faq/relay-donations/contents+en.lrquestion.description)
+msgid ""
+"Improving anonymity and improving performance are both worthwhile goals, so "
+"however you can help is great!"
+msgstr ""
+
#: https//support.torproject.org/faq/staying-anonymous/
#: (content/faq/staying-anonymous/contents+en.lrquestion.title)
msgid "Am I totally anonymous if I use Tor?"
@@ -2437,6 +2497,61 @@ msgid ""
" documenting all the issues](https://community.torproject.org/)."
msgstr ""
+#: https//support.torproject.org/about/attacks-on-onion-routing/
+#: (content/about/attacks-on-onion-routing/contents+en.lrquestion.title)
+msgid "What attacks remain against onion routing?"
+msgstr ""
+
+#: https//support.torproject.org/about/attacks-on-onion-routing/
+#: (content/about/attacks-on-onion-routing/contents+en.lrquestion.description)
+msgid ""
+"As mentioned above, it is possible for an observer who can view both you and"
+" either the destination website or your Tor exit node to correlate timings "
+"of your traffic as it enters the Tor network and also as it exits."
+msgstr ""
+
+#: https//support.torproject.org/about/attacks-on-onion-routing/
+#: (content/about/attacks-on-onion-routing/contents+en.lrquestion.description)
+msgid "Tor does not defend against such a threat model."
+msgstr ""
+
+#: https//support.torproject.org/about/attacks-on-onion-routing/
+#: (content/about/attacks-on-onion-routing/contents+en.lrquestion.description)
+msgid ""
+"In a more limited sense, note that if a censor or law enforcement agency has"
+" the ability to obtain specific observation of parts of the network, it is "
+"possible for them to verify a suspicion that you talk regularly to your "
+"friend by observing traffic at both ends and correlating the timing of only "
+"that traffic."
+msgstr ""
+
+#: https//support.torproject.org/about/attacks-on-onion-routing/
+#: (content/about/attacks-on-onion-routing/contents+en.lrquestion.description)
+msgid ""
+"Again, this is only useful to verify that parties already suspected of "
+"communicating with one another are doing so."
+msgstr ""
+
+#: https//support.torproject.org/about/attacks-on-onion-routing/
+#: (content/about/attacks-on-onion-routing/contents+en.lrquestion.description)
+msgid ""
+"In most countries, the suspicion required to obtain a warrant already "
+"carries more weight than timing correlation would provide."
+msgstr ""
+
+#: https//support.torproject.org/about/attacks-on-onion-routing/
+#: (content/about/attacks-on-onion-routing/contents+en.lrquestion.description)
+msgid ""
+"Furthermore, since Tor reuses circuits for multiple TCP connections, it is "
+"possible to associate non anonymous and anonymous traffic at a given exit "
+"node, so be careful about what applications you run concurrently over Tor."
+msgstr ""
+
+#: https//support.torproject.org/about/attacks-on-onion-routing/
+#: (content/about/attacks-on-onion-routing/contents+en.lrquestion.description)
+msgid "Perhaps even run separate Tor clients for these applications."
+msgstr ""
+
#: https//support.torproject.org/about/backdoor/
#: (content/about/backdoor/contents+en.lrquestion.title)
msgid "Is there a backdoor in Tor?"
@@ -2572,6 +2687,43 @@ msgid ""
"recommended](/tbb/tbb-9/)."
msgstr ""
+#: https//support.torproject.org/about/change-paths/
+#: (content/about/change-paths/contents+en.lrquestion.title)
+msgid "How often does Tor change its paths?"
+msgstr ""
+
+#: https//support.torproject.org/about/change-paths/
+#: (content/about/change-paths/contents+en.lrquestion.description)
+msgid ""
+"Tor will reuse the same circuit for new TCP streams for 10 minutes, as long "
+"as the circuit is working fine."
+msgstr ""
+
+#: https//support.torproject.org/about/change-paths/
+#: (content/about/change-paths/contents+en.lrquestion.description)
+msgid "(If the circuit fails, Tor will switch to a new circuit immediately.)"
+msgstr ""
+
+#: https//support.torproject.org/about/change-paths/
+#: (content/about/change-paths/contents+en.lrquestion.description)
+msgid ""
+"But note that a single TCP stream (e.g. a long IRC connection) will stay on "
+"the same circuit forever."
+msgstr ""
+
+#: https//support.torproject.org/about/change-paths/
+#: (content/about/change-paths/contents+en.lrquestion.description)
+msgid "We don't rotate individual streams from one circuit to the next."
+msgstr ""
+
+#: https//support.torproject.org/about/change-paths/
+#: (content/about/change-paths/contents+en.lrquestion.description)
+msgid ""
+"Otherwise, an adversary with a partial view of the network would be given "
+"many chances over time to link you to your destination, rather than just one"
+" chance."
+msgstr ""
+
#: https//support.torproject.org/about/distribute-tor/
#: (content/about/distribute-tor/contents+en.lrquestion.title)
msgid "Can I distribute Tor?"
@@ -2667,6 +2819,133 @@ msgid ""
"details."
msgstr ""
+#: https//support.torproject.org/about/entry-guards/
+#: (content/about/entry-guards/contents+en.lrquestion.title)
+msgid "What are Entry Guards?"
+msgstr ""
+
+#: https//support.torproject.org/about/entry-guards/
+#: (content/about/entry-guards/contents+en.lrquestion.description)
+msgid ""
+"Tor (like all current practical low-latency anonymity designs) fails when "
+"the attacker can see both ends of the communications channel."
+msgstr ""
+
+#: https//support.torproject.org/about/entry-guards/
+#: (content/about/entry-guards/contents+en.lrquestion.description)
+msgid ""
+"For example, suppose the attacker controls or watches the Tor relay you "
+"choose to enter the network, and also controls or watches the website you "
+"visit."
+msgstr ""
+
+#: https//support.torproject.org/about/entry-guards/
+#: (content/about/entry-guards/contents+en.lrquestion.description)
+msgid ""
+"In this case, the research community knows no practical low-latency design "
+"that can reliably stop the attacker from correlating volume and timing "
+"information on the two sides."
+msgstr ""
+
+#: https//support.torproject.org/about/entry-guards/
+#: (content/about/entry-guards/contents+en.lrquestion.description)
+msgid "So, what should we do?"
+msgstr ""
+
+#: https//support.torproject.org/about/entry-guards/
+#: (content/about/entry-guards/contents+en.lrquestion.description)
+msgid "Suppose the attacker controls, or can observe, C relays."
+msgstr ""
+
+#: https//support.torproject.org/about/entry-guards/
+#: (content/about/entry-guards/contents+en.lrquestion.description)
+msgid "Suppose there are N relays total."
+msgstr ""
+
+#: https//support.torproject.org/about/entry-guards/
+#: (content/about/entry-guards/contents+en.lrquestion.description)
+msgid ""
+"If you select new entry and exit relays each time you use the network, the "
+"attacker will be able to correlate all traffic you send with probability "
+"around (c/n)2."
+msgstr ""
+
+#: https//support.torproject.org/about/entry-guards/
+#: (content/about/entry-guards/contents+en.lrquestion.description)
+msgid ""
+"But profiling is, for most users, as bad as being traced all the time: they "
+"want to do something often without an attacker noticing, and the attacker "
+"noticing once is as bad as the attacker noticing more often."
+msgstr ""
+
+#: https//support.torproject.org/about/entry-guards/
+#: (content/about/entry-guards/contents+en.lrquestion.description)
+msgid ""
+"Thus, choosing many random entries and exits gives the user no chance of "
+"escaping profiling by this kind of attacker."
+msgstr ""
+
+#: https//support.torproject.org/about/entry-guards/
+#: (content/about/entry-guards/contents+en.lrquestion.description)
+msgid ""
+"The solution is \"entry guards\": each Tor client selects a few relays at "
+"random to use as entry points, and uses only those relays for their first "
+"hop."
+msgstr ""
+
+#: https//support.torproject.org/about/entry-guards/
+#: (content/about/entry-guards/contents+en.lrquestion.description)
+msgid ""
+"If those relays are not controlled or observed, the attacker can't win, "
+"ever, and the user is secure."
+msgstr ""
+
+#: https//support.torproject.org/about/entry-guards/
+#: (content/about/entry-guards/contents+en.lrquestion.description)
+msgid ""
+"If those relays are observed or controlled by the attacker, the attacker "
+"sees a larger fraction of the user's traffic - but still the user is no more"
+" profiled than before."
+msgstr ""
+
+#: https//support.torproject.org/about/entry-guards/
+#: (content/about/entry-guards/contents+en.lrquestion.description)
+msgid ""
+"Thus, the user has some chance (on the order of (n-c)/n) of avoiding "
+"profiling, whereas they had none before."
+msgstr ""
+
+#: https//support.torproject.org/about/entry-guards/
+#: (content/about/entry-guards/contents+en.lrquestion.description)
+msgid ""
+"You can read more at [An Analysis of the Degradation of Anonymous "
+"Protocols](http://freehaven.net/anonbib/#wright02), [Defending Anonymous "
+"Communication Against Passive Logging "
+"Attacks](http://freehaven.net/anonbib/#wright03), and especially [Locating "
+"Hidden Servers](http://freehaven.net/anonbib/#hs-attack06)."
+msgstr ""
+
+#: https//support.torproject.org/about/entry-guards/
+#: (content/about/entry-guards/contents+en.lrquestion.description)
+msgid ""
+"Restricting your entry nodes may also help against attackers who want to run"
+" a few Tor nodes and easily enumerate all of the Tor user IP addresses."
+msgstr ""
+
+#: https//support.torproject.org/about/entry-guards/
+#: (content/about/entry-guards/contents+en.lrquestion.description)
+msgid ""
+"(Even though they can't learn what destinations the users are talking to, "
+"they still might be able to do bad things with just a list of users.)"
+msgstr ""
+
+#: https//support.torproject.org/about/entry-guards/
+#: (content/about/entry-guards/contents+en.lrquestion.description)
+msgid ""
+"However, that feature won't really become useful until we move to a "
+"\"directory guard\" design as well."
+msgstr ""
+
#: https//support.torproject.org/about/how-is-tor-different-from-other-proxies/
#: (content/about/how-is-tor-different-from-other-proxies/contents+en.lrquestion.title)
msgid "How is Tor different from other proxies?"
@@ -2837,6 +3116,162 @@ msgid ""
" Tor and HTTPS interact."
msgstr ""
+#: https//support.torproject.org/about/key-management/
+#: (content/about/key-management/contents+en.lrquestion.title)
+msgid "Tell me about all the keys Tor uses"
+msgstr ""
+
+#: https//support.torproject.org/about/key-management/
+#: (content/about/key-management/contents+en.lrquestion.description)
+msgid ""
+"Tor uses a variety of different keys, with three goals in mind: 1) "
+"encryption to ensure privacy of data within the Tor network, 2) "
+"authentication so clients know they're talking to the relays they meant to "
+"talk to, and 3) signatures to make sure all clients know the same set of "
+"relays."
+msgstr ""
+
+#: https//support.torproject.org/about/key-management/
+#: (content/about/key-management/contents+en.lrquestion.description)
+msgid ""
+"**Encryption**: first, all connections in Tor use TLS link encryption, so "
+"observers can't look inside to see which circuit a given cell is intended "
+"for."
+msgstr ""
+
+#: https//support.torproject.org/about/key-management/
+#: (content/about/key-management/contents+en.lrquestion.description)
+msgid ""
+"Further, the Tor client establishes an ephemeral encryption key with each "
+"relay in the circuit; these extra layers of encryption mean that only the "
+"exit relay can read the cells."
+msgstr ""
+
+#: https//support.torproject.org/about/key-management/
+#: (content/about/key-management/contents+en.lrquestion.description)
+msgid ""
+"Both sides discard the circuit key when the circuit ends, so logging traffic"
+" and then breaking into the relay to discover the key won't work."
+msgstr ""
+
+#: https//support.torproject.org/about/key-management/
+#: (content/about/key-management/contents+en.lrquestion.description)
+msgid ""
+"**Authentication**: Every Tor relay has a public decryption key called the "
+"\"onion key\"."
+msgstr ""
+
+#: https//support.torproject.org/about/key-management/
+#: (content/about/key-management/contents+en.lrquestion.description)
+msgid "Each relay rotates its onion key once a week."
+msgstr ""
+
+#: https//support.torproject.org/about/key-management/
+#: (content/about/key-management/contents+en.lrquestion.description)
+msgid ""
+"When the Tor client establishes circuits, at each step it [demands that the "
+"Tor relay prove knowledge of its onion key](https://svn-"
+"archive.torproject.org/svn/projects/design-paper/tor-"
+"design.html#subsec:circuits)."
+msgstr ""
+
+#: https//support.torproject.org/about/key-management/
+#: (content/about/key-management/contents+en.lrquestion.description)
+msgid ""
+"That way the first node in the path can't just spoof the rest of the path."
+msgstr ""
+
+#: https//support.torproject.org/about/key-management/
+#: (content/about/key-management/contents+en.lrquestion.description)
+msgid ""
+"Because the Tor client chooses the path, it can make sure to get Tor's "
+"\"distributed trust\" property: no single relay in the path can know about "
+"both the client and what the client is doing."
+msgstr ""
+
+#: https//support.torproject.org/about/key-management/
+#: (content/about/key-management/contents+en.lrquestion.description)
+msgid ""
+"**Coordination**: How do clients know what the relays are, and how do they "
+"know that they have the right keys for them?"
+msgstr ""
+
+#: https//support.torproject.org/about/key-management/
+#: (content/about/key-management/contents+en.lrquestion.description)
+msgid "Each relay has a long-term public signing key called the \"identity key\"."
+msgstr ""
+
+#: https//support.torproject.org/about/key-management/
+#: (content/about/key-management/contents+en.lrquestion.description)
+msgid "Each directory authority additionally has a \"directory signing key\"."
+msgstr ""
+
+#: https//support.torproject.org/about/key-management/
+#: (content/about/key-management/contents+en.lrquestion.description)
+msgid ""
+"The directory authorities [provide a signed "
+"list](https://gitweb.torproject.org/torspec.git/tree/dir-spec.txt) of all "
+"the known relays, and in that list are a set of certificates from each relay"
+" (self-signed by their identity key) specifying their keys, locations, exit "
+"policies, and so on."
+msgstr ""
+
+#: https//support.torproject.org/about/key-management/
+#: (content/about/key-management/contents+en.lrquestion.description)
+msgid ""
+"So unless the adversary can control a majority of the directory authorities "
+"(as of 2021 there are 10 directory authorities), they can't trick the Tor "
+"client into using other Tor relays."
+msgstr ""
+
+#: https//support.torproject.org/about/key-management/
+#: (content/about/key-management/contents+en.lrquestion.description)
+msgid "How do clients know what the directory authorities are?"
+msgstr ""
+
+#: https//support.torproject.org/about/key-management/
+#: (content/about/key-management/contents+en.lrquestion.description)
+msgid ""
+"The Tor software comes with a built-in list of location and public key for "
+"each directory authority."
+msgstr ""
+
+#: https//support.torproject.org/about/key-management/
+#: (content/about/key-management/contents+en.lrquestion.description)
+msgid ""
+"So the only way to trick users into using a fake Tor network is to give them"
+" a specially modified version of the software."
+msgstr ""
+
+#: https//support.torproject.org/about/key-management/
+#: (content/about/key-management/contents+en.lrquestion.description)
+msgid "How do users know they've got the right software?"
+msgstr ""
+
+#: https//support.torproject.org/about/key-management/
+#: (content/about/key-management/contents+en.lrquestion.description)
+msgid ""
+"When we distribute the source code or a package, we digitally sign it with "
+"[GNU Privacy Guard](http://www.gnupg.org/). See the [instructions on how to "
+"check Tor Browser's signature](https://support.torproject.org/tbb/how-to-"
+"verify-signature/)."
+msgstr ""
+
+#: https//support.torproject.org/about/key-management/
+#: (content/about/key-management/contents+en.lrquestion.description)
+msgid ""
+"In order to be certain that it's really signed by us, you need to have met "
+"us in person and gotten a copy of our GPG key fingerprint, or you need to "
+"know somebody who has."
+msgstr ""
+
+#: https//support.torproject.org/about/key-management/
+#: (content/about/key-management/contents+en.lrquestion.description)
+msgid ""
+"If you're concerned about an attack on this level, we recommend you get "
+"involved with the security community and start meeting people."
+msgstr ""
+
#: https//support.torproject.org/about/no-data-scrubbing/
#: (content/about/no-data-scrubbing/contents+en.lrquestion.title)
msgid ""
@@ -2869,6 +3304,151 @@ msgid ""
"though."
msgstr ""
+#: https//support.torproject.org/about/protections/
+#: (content/about/protections/contents+en.lrquestion.title)
+msgid "What protections does Tor provide?"
+msgstr ""
+
+#: https//support.torproject.org/about/protections/
+#: (content/about/protections/contents+en.lrquestion.description)
+msgid ""
+"Internet communication is based on a store-and-forward model that can be "
+"understood in analogy to postal mail: Data is transmitted in blocks called "
+"IP datagrams or packets."
+msgstr ""
+
+#: https//support.torproject.org/about/protections/
+#: (content/about/protections/contents+en.lrquestion.description)
+msgid ""
+"Every packet includes a source IP address (of the sender) and a destination "
+"IP address (of the receiver), just as ordinary letters contain postal "
+"addresses of sender and receiver."
+msgstr ""
+
+#: https//support.torproject.org/about/protections/
+#: (content/about/protections/contents+en.lrquestion.description)
+msgid ""
+"The way from sender to receiver involves multiple hops of routers, where "
+"each router inspects the destination IP address and forwards the packet "
+"closer to its destination."
+msgstr ""
+
+#: https//support.torproject.org/about/protections/
+#: (content/about/protections/contents+en.lrquestion.description)
+msgid ""
+"Thus, every router between sender and receiver learns that the sender is "
+"communicating with the receiver."
+msgstr ""
+
+#: https//support.torproject.org/about/protections/
+#: (content/about/protections/contents+en.lrquestion.description)
+msgid ""
+"In particular, your local ISP is in the position to build a complete profile"
+" of your Internet usage."
+msgstr ""
+
+#: https//support.torproject.org/about/protections/
+#: (content/about/protections/contents+en.lrquestion.description)
+msgid ""
+"In addition, every server in the Internet that can see any of the packets "
+"can profile your behavior."
+msgstr ""
+
+#: https//support.torproject.org/about/protections/
+#: (content/about/protections/contents+en.lrquestion.description)
+msgid ""
+"The aim of Tor is to improve your privacy by sending your traffic through a "
+"series of proxies."
+msgstr ""
+
+#: https//support.torproject.org/about/protections/
+#: (content/about/protections/contents+en.lrquestion.description)
+msgid ""
+"Your communication is encrypted in multiple layers and routed via multiple "
+"hops through the Tor network to the final receiver."
+msgstr ""
+
+#: https//support.torproject.org/about/protections/
+#: (content/about/protections/contents+en.lrquestion.description)
+msgid ""
+"More details on this process can be found in this "
+"[visualization](https://support.torproject.org/https/https-1/)."
+msgstr ""
+
+#: https//support.torproject.org/about/protections/
+#: (content/about/protections/contents+en.lrquestion.description)
+msgid ""
+"Note that all your local ISP can observe now is that you are communicating "
+"with Tor nodes."
+msgstr ""
+
+#: https//support.torproject.org/about/protections/
+#: (content/about/protections/contents+en.lrquestion.description)
+msgid ""
+"Similarly, servers in the Internet just see that they are being contacted by"
+" Tor nodes."
+msgstr ""
+
+#: https//support.torproject.org/about/protections/
+#: (content/about/protections/contents+en.lrquestion.description)
+msgid "Generally speaking, Tor aims to solve three privacy problems:"
+msgstr ""
+
+#: https//support.torproject.org/about/protections/
+#: (content/about/protections/contents+en.lrquestion.description)
+msgid ""
+"First, Tor prevents websites and other services from learning your location,"
+" which they can use to build databases about your habits and interests."
+msgstr ""
+
+#: https//support.torproject.org/about/protections/
+#: (content/about/protections/contents+en.lrquestion.description)
+msgid ""
+"With Tor, your Internet connections don't give you away by default -- now "
+"you can have the ability to choose, for each connection, how much "
+"information to reveal."
+msgstr ""
+
+#: https//support.torproject.org/about/protections/
+#: (content/about/protections/contents+en.lrquestion.description)
+msgid ""
+"Second, Tor prevents people watching your traffic locally (such as your ISP "
+"or someone with access to your home wifi or router) from learning what "
+"information you're fetching and where you're fetching it from."
+msgstr ""
+
+#: https//support.torproject.org/about/protections/
+#: (content/about/protections/contents+en.lrquestion.description)
+msgid ""
+"It also stops them from deciding what you're allowed to learn and publish --"
+" if you can get to any part of the Tor network, you can reach any site on "
+"the Internet."
+msgstr ""
+
+#: https//support.torproject.org/about/protections/
+#: (content/about/protections/contents+en.lrquestion.description)
+msgid ""
+"Third, Tor routes your connection through more than one Tor relay so no "
+"single relay can learn what you're up to."
+msgstr ""
+
+#: https//support.torproject.org/about/protections/
+#: (content/about/protections/contents+en.lrquestion.description)
+msgid ""
+"Because these relays are run by different individuals or organizations, "
+"distributing trust provides more security than the old [one hop "
+"proxy](https://support.torproject.org/about/#how-is-tor-different-from-"
+"other-proxies) approach."
+msgstr ""
+
+#: https//support.torproject.org/about/protections/
+#: (content/about/protections/contents+en.lrquestion.description)
+msgid ""
+"Note, however, that there are situations where Tor fails to solve these "
+"privacy problems entirely: see the entry below on [remaining "
+"attacks](https://support.torproject.org/about/#attacks-on-onion-routing)."
+msgstr ""
+
#: https//support.torproject.org/about/what-is-tor/
#: (content/about/what-is-tor/contents+en.lrquestion.title)
msgid "What is Tor?"
@@ -5057,9 +5637,11 @@ msgstr ""
#: (content/tbb/tbb-47/contents+en.lrquestion.description)
msgid ""
"Also, read up on the HTTPProxyAuthenticator and HTTPSProxyAuthenticator "
-"options if your proxy requires auth. We only support basic auth currently, "
-"but if you need NTLM authentication, you may find [this post in the "
-"archives](https://archives.seul.org/or/talk/Jun-2005/msg00223.html) useful."
+"options if your [proxy requires auth.](https://developer.mozilla.org/en-"
+"US/docs/Web/HTTP/Headers/Proxy-Authenticate) We only support basic auth "
+"currently, but if you need NTLM authentication, you may find [this post in "
+"the archives](https://archives.seul.org/or/talk/Jun-2005/msg00223.html) "
+"useful."
msgstr ""
#: https//support.torproject.org/tbb/tbb-47/
@@ -5281,6 +5863,219 @@ msgid ""
"have no effect on Tor's configuration."
msgstr ""
+#: https//support.torproject.org/tbb/tbb-firewall-ports/
+#: (content/tbb/tbb-firewall-ports/contents+en.lrquestion.title)
+msgid "My firewall only allows a few outgoing ports"
+msgstr ""
+
+#: https//support.torproject.org/tbb/tbb-firewall-ports/
+#: (content/tbb/tbb-firewall-ports/contents+en.lrquestion.description)
+msgid ""
+"If your firewall works by blocking ports, then you can tell Tor to only use "
+"the ports when you start your Tor Browser."
+msgstr ""
+
+#: https//support.torproject.org/tbb/tbb-firewall-ports/
+#: (content/tbb/tbb-firewall-ports/contents+en.lrquestion.description)
+msgid ""
+"Or you can add the ports that your firewall permits by adding "
+"\"FascistFirewall 1\" to your torrc configuration file."
+msgstr ""
+
+#: https//support.torproject.org/tbb/tbb-firewall-ports/
+#: (content/tbb/tbb-firewall-ports/contents+en.lrquestion.description)
+msgid ""
+"By default, when you set this Tor assumes that your firewall allows only "
+"port 80 and port 443 (HTTP and HTTPS respectively)."
+msgstr ""
+
+#: https//support.torproject.org/tbb/tbb-firewall-ports/
+#: (content/tbb/tbb-firewall-ports/contents+en.lrquestion.description)
+msgid ""
+"You can select a different set of ports with the FirewallPorts torrc option."
+msgstr ""
+
+#: https//support.torproject.org/tbb/tbb-firewall-ports/
+#: (content/tbb/tbb-firewall-ports/contents+en.lrquestion.description)
+msgid ""
+"If you want to be more fine-grained with your controls, you can also use the"
+" ReachableAddresses config options, e.g.:"
+msgstr ""
+
+#: https//support.torproject.org/tbb/tbb-firewall-ports/
+#: (content/tbb/tbb-firewall-ports/contents+en.lrquestion.description)
+#: https//support.torproject.org/tbb/tbb-install-tor-central-server/
+#: (content/tbb/tbb-install-tor-central-server/contents+en.lrquestion.description)
+#: https//support.torproject.org/operators/default-exit-ports/
+#: (content/operators/default-exit-ports/contents+en.lrquestion.description)
+#: https//support.torproject.org/operators/hibernation/
+#: (content/operators/hibernation/contents+en.lrquestion.description)
+#: https//support.torproject.org/operators/limit-total-bandwidth/
+#: (content/operators/limit-total-bandwidth/contents+en.lrquestion.description)
+#: https//support.torproject.org/misc/bug-or-feedback/
+#: (content/misc/bug-or-feedback/contents+en.lrquestion.description)
+#: https//support.torproject.org/get-in-touch/why-i-cant-join-tor-channels/
+#: (content/get-in-touch/why-i-cant-join-tor-channels/contents+en.lrquestion.description)
+#: https//support.torproject.org/apt/tor-deb-repo/
+#: (content/apt/apt-1/contents+en.lrquestion.description)
+#: https//support.torproject.org/apt/apt-over-tor/
+#: (content/apt/apt-3/contents+en.lrquestion.description)
+msgid "```"
+msgstr ""
+
+#: https//support.torproject.org/tbb/tbb-firewall-ports/
+#: (content/tbb/tbb-firewall-ports/contents+en.lrquestion.description)
+msgid "ReachableDirAddresses *:80"
+msgstr ""
+
+#: https//support.torproject.org/tbb/tbb-firewall-ports/
+#: (content/tbb/tbb-firewall-ports/contents+en.lrquestion.description)
+msgid "ReachableORAddresses *:443"
+msgstr ""
+
+#: https//support.torproject.org/tbb/tbb-install-tor-central-server/
+#: (content/tbb/tbb-install-tor-central-server/contents+en.lrquestion.title)
+msgid ""
+"Can I install Tor on a central server, and have my clients connect to it?"
+msgstr ""
+
+#: https//support.torproject.org/tbb/tbb-install-tor-central-server/
+#: (content/tbb/tbb-install-tor-central-server/contents+en.lrquestion.description)
+msgid ""
+"Yes. Tor can be configured as a client or a relay on another machine, and "
+"allow other machines to be able to connect to it for anonymity."
+msgstr ""
+
+#: https//support.torproject.org/tbb/tbb-install-tor-central-server/
+#: (content/tbb/tbb-install-tor-central-server/contents+en.lrquestion.description)
+msgid ""
+"This is most useful in an environment where many computers want a gateway of"
+" anonymity to the rest of the world."
+msgstr ""
+
+#: https//support.torproject.org/tbb/tbb-install-tor-central-server/
+#: (content/tbb/tbb-install-tor-central-server/contents+en.lrquestion.description)
+msgid ""
+"However, be forewarned that with this configuration, anyone within your "
+"private network (existing between you and the Tor client/relay) can see what"
+" traffic you are sending in clear text."
+msgstr ""
+
+#: https//support.torproject.org/tbb/tbb-install-tor-central-server/
+#: (content/tbb/tbb-install-tor-central-server/contents+en.lrquestion.description)
+msgid "The anonymity doesn't start until you get to the Tor relay."
+msgstr ""
+
+#: https//support.torproject.org/tbb/tbb-install-tor-central-server/
+#: (content/tbb/tbb-install-tor-central-server/contents+en.lrquestion.description)
+msgid ""
+"Because of this, if you are the controller of your domain and you know "
+"everything's locked down, you will be OK, but this configuration may not be "
+"suitable for large private networks where security is key all around."
+msgstr ""
+
+#: https//support.torproject.org/tbb/tbb-install-tor-central-server/
+#: (content/tbb/tbb-install-tor-central-server/contents+en.lrquestion.description)
+msgid ""
+"Configuration is simple, editing your torrc file's SocksListenAddress "
+"according to the following examples:"
+msgstr ""
+
+#: https//support.torproject.org/tbb/tbb-install-tor-central-server/
+#: (content/tbb/tbb-install-tor-central-server/contents+en.lrquestion.description)
+msgid "SocksListenAddress 127.0.0.1"
+msgstr ""
+
+#: https//support.torproject.org/tbb/tbb-install-tor-central-server/
+#: (content/tbb/tbb-install-tor-central-server/contents+en.lrquestion.description)
+msgid "SocksListenAddress 192.168.x.x:9100"
+msgstr ""
+
+#: https//support.torproject.org/tbb/tbb-install-tor-central-server/
+#: (content/tbb/tbb-install-tor-central-server/contents+en.lrquestion.description)
+msgid "SocksListenAddress 0.0.0.0:9100"
+msgstr ""
+
+#: https//support.torproject.org/tbb/tbb-install-tor-central-server/
+#: (content/tbb/tbb-install-tor-central-server/contents+en.lrquestion.description)
+msgid ""
+"You can state multiple listen addresses, in the case that you are part of "
+"several networks or subnets."
+msgstr ""
+
+#: https//support.torproject.org/tbb/tbb-install-tor-central-server/
+#: (content/tbb/tbb-install-tor-central-server/contents+en.lrquestion.description)
+msgid "SocksListenAddress 192.168.x.x:9100 #eth0"
+msgstr ""
+
+#: https//support.torproject.org/tbb/tbb-install-tor-central-server/
+#: (content/tbb/tbb-install-tor-central-server/contents+en.lrquestion.description)
+msgid "SocksListenAddress 10.x.x.x:9100 #eth1"
+msgstr ""
+
+#: https//support.torproject.org/tbb/tbb-install-tor-central-server/
+#: (content/tbb/tbb-install-tor-central-server/contents+en.lrquestion.description)
+msgid ""
+"After this, your clients on their respective networks/subnets would specify "
+"a socks proxy with the address and port you specified SocksListenAddress to "
+"be."
+msgstr ""
+
+#: https//support.torproject.org/tbb/tbb-install-tor-central-server/
+#: (content/tbb/tbb-install-tor-central-server/contents+en.lrquestion.description)
+msgid ""
+"Please note that the SocksPort configuration option gives the port ONLY for "
+"localhost (127.0.0.1)."
+msgstr ""
+
+#: https//support.torproject.org/tbb/tbb-install-tor-central-server/
+#: (content/tbb/tbb-install-tor-central-server/contents+en.lrquestion.description)
+msgid ""
+"When setting up your SocksListenAddress(es), you need to give the port with "
+"the address, as shown above."
+msgstr ""
+
+#: https//support.torproject.org/tbb/tbb-install-tor-central-server/
+#: (content/tbb/tbb-install-tor-central-server/contents+en.lrquestion.description)
+msgid ""
+"If you are interested in forcing all outgoing data through the central Tor "
+"client/relay, instead of the server only being an optional proxy, you may "
+"find the program iptables (for *nix) useful."
+msgstr ""
+
+#: https//support.torproject.org/tbb/tbb-run-client-different-computer/
+#: (content/tbb/tbb-run-client-different-computer/contents+en.lrquestion.title)
+msgid ""
+"I want to run my Tor client on a different computer than my applications"
+msgstr ""
+
+#: https//support.torproject.org/tbb/tbb-run-client-different-computer/
+#: (content/tbb/tbb-run-client-different-computer/contents+en.lrquestion.description)
+msgid ""
+"By default, your Tor client only listens for applications that connect from "
+"localhost."
+msgstr ""
+
+#: https//support.torproject.org/tbb/tbb-run-client-different-computer/
+#: (content/tbb/tbb-run-client-different-computer/contents+en.lrquestion.description)
+msgid "Connections from other computers are refused."
+msgstr ""
+
+#: https//support.torproject.org/tbb/tbb-run-client-different-computer/
+#: (content/tbb/tbb-run-client-different-computer/contents+en.lrquestion.description)
+msgid ""
+"If you want to torify applications on different computers than the Tor "
+"client, you should edit your torrc to define `SocksListenAddress 0.0.0.0` "
+"and then restart (or hup) Tor."
+msgstr ""
+
+#: https//support.torproject.org/tbb/tbb-run-client-different-computer/
+#: (content/tbb/tbb-run-client-different-computer/contents+en.lrquestion.description)
+msgid ""
+"If you want to get more advanced, you can configure your Tor client on a "
+"firewall to bind to your internal IP but not your external IP."
+msgstr ""
+
#: https//support.torproject.org/tbb/website-blocking-tor/
#: (content/tbb/website-blocking-tor/contents+en.lrquestion.title)
msgid "A website I am trying to reach is blocking access over Tor."
@@ -6740,6 +7535,130 @@ msgid ""
"guide."
msgstr ""
+#: https//support.torproject.org/operators/default-exit-ports/
+#: (content/operators/default-exit-ports/contents+en.lrquestion.title)
+msgid "Is there a list of default exit ports?"
+msgstr ""
+
+#: https//support.torproject.org/operators/default-exit-ports/
+#: (content/operators/default-exit-ports/contents+en.lrquestion.description)
+msgid ""
+"The default open ports are listed below but keep in mind that, any port or "
+"ports can be opened by the relay operator by configuring it in torrc or "
+"modifying the source code."
+msgstr ""
+
+#: https//support.torproject.org/operators/default-exit-ports/
+#: (content/operators/default-exit-ports/contents+en.lrquestion.description)
+msgid ""
+"The default according to src/or/policies.c ([line 85][1] and [line 1901][2])"
+" from the source code release [release-0.4.6][3]:"
+msgstr ""
+
+#: https//support.torproject.org/operators/default-exit-ports/
+#: (content/operators/default-exit-ports/contents+en.lrquestion.description)
+msgid "reject 0.0.0.0/8"
+msgstr ""
+
+#: https//support.torproject.org/operators/default-exit-ports/
+#: (content/operators/default-exit-ports/contents+en.lrquestion.description)
+msgid "reject 169.254.0.0/16"
+msgstr ""
+
+#: https//support.torproject.org/operators/default-exit-ports/
+#: (content/operators/default-exit-ports/contents+en.lrquestion.description)
+msgid "reject 127.0.0.0/8"
+msgstr ""
+
+#: https//support.torproject.org/operators/default-exit-ports/
+#: (content/operators/default-exit-ports/contents+en.lrquestion.description)
+msgid "reject 192.168.0.0/16"
+msgstr ""
+
+#: https//support.torproject.org/operators/default-exit-ports/
+#: (content/operators/default-exit-ports/contents+en.lrquestion.description)
+msgid "reject 10.0.0.0/8"
+msgstr ""
+
+#: https//support.torproject.org/operators/default-exit-ports/
+#: (content/operators/default-exit-ports/contents+en.lrquestion.description)
+msgid "reject 172.16.0.0/12"
+msgstr ""
+
+#: https//support.torproject.org/operators/default-exit-ports/
+#: (content/operators/default-exit-ports/contents+en.lrquestion.description)
+msgid "reject *:25"
+msgstr ""
+
+#: https//support.torproject.org/operators/default-exit-ports/
+#: (content/operators/default-exit-ports/contents+en.lrquestion.description)
+msgid "reject *:119"
+msgstr ""
+
+#: https//support.torproject.org/operators/default-exit-ports/
+#: (content/operators/default-exit-ports/contents+en.lrquestion.description)
+msgid "reject *:135-139"
+msgstr ""
+
+#: https//support.torproject.org/operators/default-exit-ports/
+#: (content/operators/default-exit-ports/contents+en.lrquestion.description)
+msgid "reject *:445"
+msgstr ""
+
+#: https//support.torproject.org/operators/default-exit-ports/
+#: (content/operators/default-exit-ports/contents+en.lrquestion.description)
+msgid "reject *:563"
+msgstr ""
+
+#: https//support.torproject.org/operators/default-exit-ports/
+#: (content/operators/default-exit-ports/contents+en.lrquestion.description)
+msgid "reject *:1214"
+msgstr ""
+
+#: https//support.torproject.org/operators/default-exit-ports/
+#: (content/operators/default-exit-ports/contents+en.lrquestion.description)
+msgid "reject *:4661-4666"
+msgstr ""
+
+#: https//support.torproject.org/operators/default-exit-ports/
+#: (content/operators/default-exit-ports/contents+en.lrquestion.description)
+msgid "reject *:6346-6429"
+msgstr ""
+
+#: https//support.torproject.org/operators/default-exit-ports/
+#: (content/operators/default-exit-ports/contents+en.lrquestion.description)
+msgid "reject *:6699"
+msgstr ""
+
+#: https//support.torproject.org/operators/default-exit-ports/
+#: (content/operators/default-exit-ports/contents+en.lrquestion.description)
+msgid "reject *:6881-6999"
+msgstr ""
+
+#: https//support.torproject.org/operators/default-exit-ports/
+#: (content/operators/default-exit-ports/contents+en.lrquestion.description)
+msgid "accept *:*"
+msgstr ""
+
+#: https//support.torproject.org/operators/default-exit-ports/
+#: (content/operators/default-exit-ports/contents+en.lrquestion.description)
+msgid ""
+"[1]: "
+"https://gitlab.torproject.org/tpo/core/tor/-/blob/release-0.4.6/src/core/or/policies.c#L85"
+msgstr ""
+
+#: https//support.torproject.org/operators/default-exit-ports/
+#: (content/operators/default-exit-ports/contents+en.lrquestion.description)
+msgid ""
+"[2]: "
+"https://gitlab.torproject.org/tpo/core/tor/-/blob/release-0.4.6/src/core/or/policies.c#L1901"
+msgstr ""
+
+#: https//support.torproject.org/operators/default-exit-ports/
+#: (content/operators/default-exit-ports/contents+en.lrquestion.description)
+msgid "[3]: https://gitlab.torproject.org/tpo/core/tor/-/tree/release-0.4.6/"
+msgstr ""
+
#: https//support.torproject.org/operators/dynamic-ip/
#: (content/operators/dynamic-ip/contents+en.lrquestion.title)
msgid "Can I run a Tor relay using a dynamic IP address?"
@@ -6887,21 +7806,6 @@ msgid ""
"into hibernation, signaled by this entry in the log:"
msgstr ""
-#: https//support.torproject.org/operators/hibernation/
-#: (content/operators/hibernation/contents+en.lrquestion.description)
-#: https//support.torproject.org/operators/limit-total-bandwidth/
-#: (content/operators/limit-total-bandwidth/contents+en.lrquestion.description)
-#: https//support.torproject.org/misc/bug-or-feedback/
-#: (content/misc/bug-or-feedback/contents+en.lrquestion.description)
-#: https//support.torproject.org/get-in-touch/why-i-cant-join-tor-channels/
-#: (content/get-in-touch/why-i-cant-join-tor-channels/contents+en.lrquestion.description)
-#: https//support.torproject.org/apt/tor-deb-repo/
-#: (content/apt/apt-1/contents+en.lrquestion.description)
-#: https//support.torproject.org/apt/apt-over-tor/
-#: (content/apt/apt-3/contents+en.lrquestion.description)
-msgid "```"
-msgstr ""
-
#: https//support.torproject.org/operators/hibernation/
#: (content/operators/hibernation/contents+en.lrquestion.description)
msgid "Bandwidth soft limit reached; commencing hibernation."
@@ -9154,6 +10058,131 @@ msgstr "uid tor-security at lists.torproject.org"
msgid "sub 4096R/C00942E4 2017-03-13"
msgstr "sub 4096R/C00942E4 2017-03-13"
+#: https//support.torproject.org/misc/check-socks-dns-leaks/
+#: (content/misc/check-socks-dns-leaks/contents+en.lrquestion.title)
+msgid ""
+"How do I check if my application that uses SOCKS is leaking DNS requests?"
+msgstr ""
+
+#: https//support.torproject.org/misc/check-socks-dns-leaks/
+#: (content/misc/check-socks-dns-leaks/contents+en.lrquestion.description)
+msgid ""
+"Even if your application is using the correct variant of the SOCKS protocol,"
+" there is still a risk that it could be leaking DNS queries."
+msgstr ""
+
+#: https//support.torproject.org/misc/check-socks-dns-leaks/
+#: (content/misc/check-socks-dns-leaks/contents+en.lrquestion.description)
+msgid ""
+"This problem happens in Firefox extensions that resolve the destination "
+"hostname themselves, for example to show you its IP address, what country "
+"it's in, etc."
+msgstr ""
+
+#: https//support.torproject.org/misc/check-socks-dns-leaks/
+#: (content/misc/check-socks-dns-leaks/contents+en.lrquestion.description)
+msgid ""
+"If you suspect your application might behave like this, follow the "
+"instructions below to check."
+msgstr ""
+
+#: https//support.torproject.org/misc/check-socks-dns-leaks/
+#: (content/misc/check-socks-dns-leaks/contents+en.lrquestion.description)
+msgid ""
+"1. Add `TestSocks 1` to your [torrc file](https://support.torproject.org/tbb"
+"/tbb-editing-torrc/)."
+msgstr ""
+
+#: https//support.torproject.org/misc/check-socks-dns-leaks/
+#: (content/misc/check-socks-dns-leaks/contents+en.lrquestion.description)
+msgid ""
+"1. Start Tor, and point your program's SOCKS proxy settings to Tor's SOCKS5 "
+"server (`socks5://127.0.0.1:9050` by default)."
+msgstr ""
+
+#: https//support.torproject.org/misc/check-socks-dns-leaks/
+#: (content/misc/check-socks-dns-leaks/contents+en.lrquestion.description)
+msgid ""
+"1. Watch your logs as you use your application. For each socks connection, "
+"Tor will log a `notice` for safe connections, and a `warn` for connections "
+"leaking DNS requests."
+msgstr ""
+
+#: https//support.torproject.org/misc/check-socks-dns-leaks/
+#: (content/misc/check-socks-dns-leaks/contents+en.lrquestion.description)
+msgid ""
+"If you want to automatically disable all connections leaking DNS requests, "
+"set `SafeSocks 1` in your torrc file."
+msgstr ""
+
+#: https//support.torproject.org/misc/hide-exits/
+#: (content/misc/hide-exits/contents+en.lrquestion.title)
+msgid ""
+"You should hide the list of Tor relays, so people can't block the exits."
+msgstr ""
+
+#: https//support.torproject.org/misc/hide-exits/
+#: (content/misc/hide-exits/contents+en.lrquestion.description)
+msgid "There are a few reasons we don't:"
+msgstr ""
+
+#: https//support.torproject.org/misc/hide-exits/
+#: (content/misc/hide-exits/contents+en.lrquestion.description)
+msgid ""
+"1. We can't help but make the information available, since Tor clients need "
+"to use it to pick their paths."
+msgstr ""
+
+#: https//support.torproject.org/misc/hide-exits/
+#: (content/misc/hide-exits/contents+en.lrquestion.description)
+msgid "So if the \"blockers\" want it, they can get it anyway."
+msgstr ""
+
+#: https//support.torproject.org/misc/hide-exits/
+#: (content/misc/hide-exits/contents+en.lrquestion.description)
+msgid ""
+"Further, even if we didn't tell clients about the list of relays directly, "
+"somebody could still make a lot of connections through Tor to a test site "
+"and build a list of the addresses they see."
+msgstr ""
+
+#: https//support.torproject.org/misc/hide-exits/
+#: (content/misc/hide-exits/contents+en.lrquestion.description)
+msgid ""
+"1. If people want to block us, we believe that they should be allowed to do "
+"so."
+msgstr ""
+
+#: https//support.torproject.org/misc/hide-exits/
+#: (content/misc/hide-exits/contents+en.lrquestion.description)
+msgid ""
+"Obviously, we would prefer for everybody to allow Tor users to connect to "
+"them, but people have the right to decide who their services should allow "
+"connections from, and if they want to block anonymous users, they can."
+msgstr ""
+
+#: https//support.torproject.org/misc/hide-exits/
+#: (content/misc/hide-exits/contents+en.lrquestion.description)
+msgid ""
+"1. Being blockable also has tactical advantages: it may be a persuasive "
+"response to website maintainers who feel threatened by Tor."
+msgstr ""
+
+#: https//support.torproject.org/misc/hide-exits/
+#: (content/misc/hide-exits/contents+en.lrquestion.description)
+msgid ""
+"Giving them the option may inspire them to stop and think about whether they"
+" really want to eliminate private access to their system, and if not, what "
+"other options they might have."
+msgstr ""
+
+#: https//support.torproject.org/misc/hide-exits/
+#: (content/misc/hide-exits/contents+en.lrquestion.description)
+msgid ""
+"The time they might otherwise have spent blocking Tor, they may instead "
+"spend rethinking their overall approach to privacy and anonymity."
+msgstr ""
+
#: https//support.torproject.org/misc/menu/
#: (content/misc/menu/contents+en.lrquestion.description)
msgid "About"
@@ -9740,56 +10769,20 @@ msgstr "### Si të verifikoni nofkën tuaj"
#: https//support.torproject.org/get-in-touch/why-i-cant-join-tor-channels/
#: (content/get-in-touch/why-i-cant-join-tor-channels/contents+en.lrquestion.description)
msgid ""
-"Then, to complete the registration and ultimately gain access to the #tor-"
-"project channel, your nickname must be **verified**."
-msgstr ""
-
-#: https//support.torproject.org/get-in-touch/why-i-cant-join-tor-channels/
-#: (content/get-in-touch/why-i-cant-join-tor-channels/contents+en.lrquestion.description)
-msgid ""
-"1. To verify your nick, open a new browser window and go to "
-"https://webchat.oftc.net/?channels=tor."
-msgstr ""
-
-#: https//support.torproject.org/get-in-touch/why-i-cant-join-tor-channels/
-#: (content/get-in-touch/why-i-cant-join-tor-channels/contents+en.lrquestion.description)
-msgid "2. Log in with your IRC nickname and password."
-msgstr ""
-
-#: https//support.torproject.org/get-in-touch/why-i-cant-join-tor-channels/
-#: (content/get-in-touch/why-i-cant-join-tor-channels/contents+en.lrquestion.description)
-msgid ""
-"3. Look for the word **verify** and log in there. It may appear that nothing"
-" has happened. Look at the top of the page, and there will be a column "
-"called **Account**."
-msgstr ""
-
-#: https//support.torproject.org/get-in-touch/why-i-cant-join-tor-channels/
-#: (content/get-in-touch/why-i-cant-join-tor-channels/contents+en.lrquestion.description)
-msgid "4. Click on **Account**."
-msgstr "4. Klikoni mbi **Llogari**."
-
-#: https//support.torproject.org/get-in-touch/why-i-cant-join-tor-channels/
-#: (content/get-in-touch/why-i-cant-join-tor-channels/contents+en.lrquestion.description)
-msgid ""
-"5. Click on the small sentence at the bottom of the square that says: Verify"
-" account."
-msgstr ""
-
-#: https//support.torproject.org/get-in-touch/why-i-cant-join-tor-channels/
-#: (content/get-in-touch/why-i-cant-join-tor-channels/contents+en.lrquestion.description)
-msgid "6. Fill out the Captcha that pops up, and click ok."
+"After registering your nickname, to gain access to the #tor-project and "
+"other protected channels, your nickname must be **verified**."
msgstr ""
#: https//support.torproject.org/get-in-touch/why-i-cant-join-tor-channels/
#: (content/get-in-touch/why-i-cant-join-tor-channels/contents+en.lrquestion.description)
msgid ""
-"7. A tiny message will appear: \"Your NickServ account has been verified.\""
+"1. Go to https://services.oftc.net/ and follow the steps in the '*To verify "
+"your account*' section"
msgstr ""
#: https//support.torproject.org/get-in-touch/why-i-cant-join-tor-channels/
#: (content/get-in-touch/why-i-cant-join-tor-channels/contents+en.lrquestion.description)
-msgid "8. Go back to the IRC webpage where you are logged in and type:"
+msgid "2. Go back to the IRC webpage where you are logged in and type:"
msgstr ""
#: https//support.torproject.org/get-in-touch/why-i-cant-join-tor-channels/
@@ -9799,12 +10792,12 @@ msgstr "`/msg nickserv checkverify`"
#: https//support.torproject.org/get-in-touch/why-i-cant-join-tor-channels/
#: (content/get-in-touch/why-i-cant-join-tor-channels/contents+en.lrquestion.description)
-msgid "9. Click ENTER."
-msgstr "9. Klikoni mbi ENTER."
+msgid "3. Click ENTER."
+msgstr ""
#: https//support.torproject.org/get-in-touch/why-i-cant-join-tor-channels/
#: (content/get-in-touch/why-i-cant-join-tor-channels/contents+en.lrquestion.description)
-msgid "10. If all is well, you will receive a message that says:"
+msgid "4. If all is well, you will receive a message that says:"
msgstr ""
#: https//support.torproject.org/get-in-touch/why-i-cant-join-tor-channels/
@@ -9945,18 +10938,22 @@ msgstr "# apt install apt-transport-https"
#: https//support.torproject.org/apt/tor-deb-repo/
#: (content/apt/apt-1/contents+en.lrquestion.description)
msgid ""
-"#### 2. Add the following entries to `/etc/apt/sources.list` or a new file "
-"in `/etc/apt/sources.list.d/`"
+"#### 2. Create a new file in `/etc/apt/sources.list.d/` named `tor.list`. "
+"Add the following entries:"
msgstr ""
#: https//support.torproject.org/apt/tor-deb-repo/
#: (content/apt/apt-1/contents+en.lrquestion.description)
-msgid "deb https://deb.torproject.org/torproject.org <DISTRIBUTION> main"
+msgid ""
+"deb [signed-by=/usr/share/keyrings/tor-archive-keyring.gpg] "
+"https://deb.torproject.org/torproject.org <DISTRIBUTION> main"
msgstr ""
#: https//support.torproject.org/apt/tor-deb-repo/
#: (content/apt/apt-1/contents+en.lrquestion.description)
-msgid "deb-src https://deb.torproject.org/torproject.org <DISTRIBUTION> main"
+msgid ""
+"deb-src [signed-by=/usr/share/keyrings/tor-archive-keyring.gpg] "
+"https://deb.torproject.org/torproject.org <DISTRIBUTION> main"
msgstr ""
#: https//support.torproject.org/apt/tor-deb-repo/
@@ -9970,14 +10967,16 @@ msgstr ""
#: https//support.torproject.org/apt/tor-deb-repo/
#: (content/apt/apt-1/contents+en.lrquestion.description)
msgid ""
-"deb https://deb.torproject.org/torproject.org tor-"
+"deb [signed-by=/usr/share/keyrings/tor-archive-keyring.gpg] "
+"https://deb.torproject.org/torproject.org tor-"
"experimental-0.4.6.x-<DISTRIBUTION> main"
msgstr ""
#: https//support.torproject.org/apt/tor-deb-repo/
#: (content/apt/apt-1/contents+en.lrquestion.description)
msgid ""
-"deb-src https://deb.torproject.org/torproject.org tor-"
+"deb-src [signed-by=/usr/share/keyrings/tor-archive-keyring.gpg] "
+"https://deb.torproject.org/torproject.org tor-"
"experimental-0.4.6.x-<DISTRIBUTION> main"
msgstr ""
@@ -9989,15 +10988,17 @@ msgstr "Ose montime të përnatshme:"
#: https//support.torproject.org/apt/tor-deb-repo/
#: (content/apt/apt-1/contents+en.lrquestion.description)
msgid ""
-"deb https://deb.torproject.org/torproject.org tor-nightly-"
-"master-<DISTRIBUTION> main"
+"deb [signed-by=/usr/share/keyrings/tor-archive-keyring.gpg] "
+"https://deb.torproject.org/torproject.org tor-nightly-master-<DISTRIBUTION> "
+"main"
msgstr ""
#: https//support.torproject.org/apt/tor-deb-repo/
#: (content/apt/apt-1/contents+en.lrquestion.description)
msgid ""
-"deb-src https://deb.torproject.org/torproject.org tor-nightly-"
-"master-<DISTRIBUTION> main"
+"deb-src [signed-by=/usr/share/keyrings/tor-archive-keyring.gpg] "
+"https://deb.torproject.org/torproject.org tor-nightly-master-<DISTRIBUTION> "
+"main"
msgstr ""
#: https//support.torproject.org/apt/tor-deb-repo/
@@ -10018,13 +11019,15 @@ msgstr ""
#: https//support.torproject.org/apt/tor-deb-repo/
#: (content/apt/apt-1/contents+en.lrquestion.description)
msgid ""
-"deb [arch=amd64] https://deb.torproject.org/torproject.org focal main"
+"deb [arch=amd64 signed-by=/usr/share/keyrings/tor-archive-keyring.gpg] "
+"https://deb.torproject.org/torproject.org focal main"
msgstr ""
#: https//support.torproject.org/apt/tor-deb-repo/
#: (content/apt/apt-1/contents+en.lrquestion.description)
msgid ""
-"deb-src [arch=amd64] https://deb.torproject.org/torproject.org focal main"
+"deb-src [arch=amd64 signed-by=/usr/share/keyrings/tor-archive-keyring.gpg] "
+"https://deb.torproject.org/torproject.org focal main"
msgstr ""
#: https//support.torproject.org/apt/tor-deb-repo/
@@ -10044,21 +11047,16 @@ msgstr ""
#: (content/apt/apt-1/contents+en.lrquestion.description)
msgid ""
"#### 3. Then add the gpg key used to sign the packages by running the "
-"following commands at your command prompt"
+"following command at your command prompt:"
msgstr ""
#: https//support.torproject.org/apt/tor-deb-repo/
#: (content/apt/apt-1/contents+en.lrquestion.description)
msgid ""
-"# wget -qO- "
+"# wget -O- "
"https://deb.torproject.org/torproject.org/A3C4F0F979CAA22CDBA8F512EE8CBC9E886DDD89.asc"
-" | gpg --import"
-msgstr ""
-
-#: https//support.torproject.org/apt/tor-deb-repo/
-#: (content/apt/apt-1/contents+en.lrquestion.description)
-msgid ""
-"# gpg --export A3C4F0F979CAA22CDBA8F512EE8CBC9E886DDD89 | apt-key add -"
+" | gpg --dearmor | tee /usr/share/keyrings/tor-archive-keyring.gpg "
+">/dev/null"
msgstr ""
#: https//support.torproject.org/apt/tor-deb-repo/
@@ -11665,6 +12663,82 @@ msgid ""
"doesn't change IP address over the day."
msgstr ""
+#: https//support.torproject.org/alternate-designs/block-websites/
+#: (content/alternate-designs/block-websites/contents+en.lrquestion.title)
+msgid "Exit policies should be able to block websites, not just IP addresses."
+msgstr ""
+
+#: https//support.torproject.org/alternate-designs/block-websites/
+#: (content/alternate-designs/block-websites/contents+en.lrquestion.description)
+msgid ""
+"It would be nice to let relay operators say things like `reject "
+"www.slashdot.org` in their exit policies, rather than requiring them to "
+"learn all the IP address space that could be covered by the site (and then "
+"also blocking other sites at those IP addresses)."
+msgstr ""
+
+#: https//support.torproject.org/alternate-designs/block-websites/
+#: (content/alternate-designs/block-websites/contents+en.lrquestion.description)
+msgid "There are two problems, though."
+msgstr ""
+
+#: https//support.torproject.org/alternate-designs/block-websites/
+#: (content/alternate-designs/block-websites/contents+en.lrquestion.description)
+msgid "First, users could still get around these blocks."
+msgstr ""
+
+#: https//support.torproject.org/alternate-designs/block-websites/
+#: (content/alternate-designs/block-websites/contents+en.lrquestion.description)
+msgid ""
+"For example, they could request the IP address rather than the hostname when"
+" they exit from the Tor network."
+msgstr ""
+
+#: https//support.torproject.org/alternate-designs/block-websites/
+#: (content/alternate-designs/block-websites/contents+en.lrquestion.description)
+msgid ""
+"This means operators would still need to learn all the IP addresses for the "
+"destinations in question."
+msgstr ""
+
+#: https//support.torproject.org/alternate-designs/block-websites/
+#: (content/alternate-designs/block-websites/contents+en.lrquestion.description)
+msgid ""
+"The second problem is that it would allow remote attackers to censor "
+"arbitrary sites."
+msgstr ""
+
+#: https//support.torproject.org/alternate-designs/block-websites/
+#: (content/alternate-designs/block-websites/contents+en.lrquestion.description)
+msgid ""
+"For example, if a Tor operator blocks www1.slashdot.org, and then some "
+"attacker poisons the Tor relay's DNS or otherwise changes that hostname to "
+"resolve to the IP address for a major news site, then suddenly that Tor "
+"relay is blocking the news site."
+msgstr ""
+
+#: https//support.torproject.org/alternate-designs/let-the-network-pick-the-path/
+#: (content/alternate-designs/let-the-network-pick-the-path/contents+en.lrquestion.title)
+msgid "You should let the network pick the path, not the client."
+msgstr ""
+
+#: https//support.torproject.org/alternate-designs/let-the-network-pick-the-path/
+#: (content/alternate-designs/let-the-network-pick-the-path/contents+en.lrquestion.description)
+msgid "No, you cannot trust the network to pick the path."
+msgstr ""
+
+#: https//support.torproject.org/alternate-designs/let-the-network-pick-the-path/
+#: (content/alternate-designs/let-the-network-pick-the-path/contents+en.lrquestion.description)
+msgid "Malicious relays could route you through their colluding friends."
+msgstr ""
+
+#: https//support.torproject.org/alternate-designs/let-the-network-pick-the-path/
+#: (content/alternate-designs/let-the-network-pick-the-path/contents+en.lrquestion.description)
+msgid ""
+"This would give an adversary the ability to watch all of your traffic end to"
+" end."
+msgstr ""
+
#: lego/templates/banner.html:3 lego/templates/banner.html:5
#: templates/banner.html:3 templates/banner.html:5
msgid "Close banner"
@@ -11697,8 +12771,8 @@ msgid "DONATE NOW"
msgstr "DHURONI TANI"
#: lego/templates/footer.html:13 lego/templates/footer.html:22
-#: lego/templates/navbar.html:83 templates/footer.html:13
-#: templates/footer.html:22 templates/navbar.html:83
+#: lego/templates/navbar.html:95 templates/footer.html:13
+#: templates/footer.html:22 templates/navbar.html:95
msgid "Download Tor Browser"
msgstr "Shkarkoni Shfletuesin Tor"
diff --git a/contents+sr.po b/contents+sr.po
index 1c0b10dbb2..4f41b718b1 100644
--- a/contents+sr.po
+++ b/contents+sr.po
@@ -9,7 +9,7 @@ msgid ""
msgstr ""
"Project-Id-Version: PACKAGE VERSION\n"
"Report-Msgid-Bugs-To: \n"
-"POT-Creation-Date: 2021-08-25 11:14+CET\n"
+"POT-Creation-Date: 2021-09-01 12:20+CET\n"
"PO-Revision-Date: 2018-10-02 22:41+0000\n"
"Last-Translator: Aleksa RistiÄ, 2020\n"
"Language-Team: Serbian (https://www.transifex.com/otf/teams/1519/sr/)\n"
@@ -142,6 +142,11 @@ msgstr ""
msgid "Tor Metrics"
msgstr ""
+#: https//support.torproject.org/alternate-designs/
+#: (content/alternate-designs/contents+en.lrtopic.title)
+msgid "Alternate Designs We Don't Do (Yet)"
+msgstr ""
+
#: https//support.torproject.org/glossary/add-on-extension-or-plugin/
#: (content/glossary/add-on-extension-or-plugin/contents+en.lrword.term)
msgid "add-on, extension, or plugin"
@@ -2029,6 +2034,61 @@ msgid ""
"wiki](https://trac.torproject.org/projects/tor/wiki/doc/TorPlusVPN)."
msgstr ""
+#: https//support.torproject.org/faq/relay-donations/
+#: (content/faq/relay-donations/contents+en.lrquestion.title)
+msgid "Can I donate for a relay rather than run my own?"
+msgstr ""
+
+#: https//support.torproject.org/faq/relay-donations/
+#: (content/faq/relay-donations/contents+en.lrquestion.description)
+msgid ""
+"Sure! We have a [list of organizations that run Tor "
+"relays](https://community.torproject.org/relay/community-resources/relay-"
+"associations/) that are happy to turn your donations into better speed and "
+"anonymity for the Tor network."
+msgstr ""
+
+#: https//support.torproject.org/faq/relay-donations/
+#: (content/faq/relay-donations/contents+en.lrquestion.description)
+msgid ""
+"These organizations are not the same as [The Tor Project, "
+"Inc](https://donate.torproject.org/), but we consider that a good thing."
+msgstr ""
+
+#: https//support.torproject.org/faq/relay-donations/
+#: (content/faq/relay-donations/contents+en.lrquestion.description)
+msgid "They're run by nice people who are part of the Tor community."
+msgstr ""
+
+#: https//support.torproject.org/faq/relay-donations/
+#: (content/faq/relay-donations/contents+en.lrquestion.description)
+msgid ""
+"Note that there can be a tradeoff here between anonymity and performance."
+msgstr ""
+
+#: https//support.torproject.org/faq/relay-donations/
+#: (content/faq/relay-donations/contents+en.lrquestion.description)
+msgid ""
+"The Tor network's anonymity comes in part from diversity, so if you are in a"
+" position to run your own relay, you will be improving Tor's anonymity more "
+"than by donating."
+msgstr ""
+
+#: https//support.torproject.org/faq/relay-donations/
+#: (content/faq/relay-donations/contents+en.lrquestion.description)
+msgid ""
+"At the same time though, economies of scale for bandwidth mean that "
+"combining many small donations into several larger relays is more efficient "
+"at improving network performance."
+msgstr ""
+
+#: https//support.torproject.org/faq/relay-donations/
+#: (content/faq/relay-donations/contents+en.lrquestion.description)
+msgid ""
+"Improving anonymity and improving performance are both worthwhile goals, so "
+"however you can help is great!"
+msgstr ""
+
#: https//support.torproject.org/faq/staying-anonymous/
#: (content/faq/staying-anonymous/contents+en.lrquestion.title)
msgid "Am I totally anonymous if I use Tor?"
@@ -2331,6 +2391,61 @@ msgid ""
" documenting all the issues](https://community.torproject.org/)."
msgstr ""
+#: https//support.torproject.org/about/attacks-on-onion-routing/
+#: (content/about/attacks-on-onion-routing/contents+en.lrquestion.title)
+msgid "What attacks remain against onion routing?"
+msgstr ""
+
+#: https//support.torproject.org/about/attacks-on-onion-routing/
+#: (content/about/attacks-on-onion-routing/contents+en.lrquestion.description)
+msgid ""
+"As mentioned above, it is possible for an observer who can view both you and"
+" either the destination website or your Tor exit node to correlate timings "
+"of your traffic as it enters the Tor network and also as it exits."
+msgstr ""
+
+#: https//support.torproject.org/about/attacks-on-onion-routing/
+#: (content/about/attacks-on-onion-routing/contents+en.lrquestion.description)
+msgid "Tor does not defend against such a threat model."
+msgstr ""
+
+#: https//support.torproject.org/about/attacks-on-onion-routing/
+#: (content/about/attacks-on-onion-routing/contents+en.lrquestion.description)
+msgid ""
+"In a more limited sense, note that if a censor or law enforcement agency has"
+" the ability to obtain specific observation of parts of the network, it is "
+"possible for them to verify a suspicion that you talk regularly to your "
+"friend by observing traffic at both ends and correlating the timing of only "
+"that traffic."
+msgstr ""
+
+#: https//support.torproject.org/about/attacks-on-onion-routing/
+#: (content/about/attacks-on-onion-routing/contents+en.lrquestion.description)
+msgid ""
+"Again, this is only useful to verify that parties already suspected of "
+"communicating with one another are doing so."
+msgstr ""
+
+#: https//support.torproject.org/about/attacks-on-onion-routing/
+#: (content/about/attacks-on-onion-routing/contents+en.lrquestion.description)
+msgid ""
+"In most countries, the suspicion required to obtain a warrant already "
+"carries more weight than timing correlation would provide."
+msgstr ""
+
+#: https//support.torproject.org/about/attacks-on-onion-routing/
+#: (content/about/attacks-on-onion-routing/contents+en.lrquestion.description)
+msgid ""
+"Furthermore, since Tor reuses circuits for multiple TCP connections, it is "
+"possible to associate non anonymous and anonymous traffic at a given exit "
+"node, so be careful about what applications you run concurrently over Tor."
+msgstr ""
+
+#: https//support.torproject.org/about/attacks-on-onion-routing/
+#: (content/about/attacks-on-onion-routing/contents+en.lrquestion.description)
+msgid "Perhaps even run separate Tor clients for these applications."
+msgstr ""
+
#: https//support.torproject.org/about/backdoor/
#: (content/about/backdoor/contents+en.lrquestion.title)
msgid "Is there a backdoor in Tor?"
@@ -2466,6 +2581,43 @@ msgid ""
"recommended](/tbb/tbb-9/)."
msgstr ""
+#: https//support.torproject.org/about/change-paths/
+#: (content/about/change-paths/contents+en.lrquestion.title)
+msgid "How often does Tor change its paths?"
+msgstr ""
+
+#: https//support.torproject.org/about/change-paths/
+#: (content/about/change-paths/contents+en.lrquestion.description)
+msgid ""
+"Tor will reuse the same circuit for new TCP streams for 10 minutes, as long "
+"as the circuit is working fine."
+msgstr ""
+
+#: https//support.torproject.org/about/change-paths/
+#: (content/about/change-paths/contents+en.lrquestion.description)
+msgid "(If the circuit fails, Tor will switch to a new circuit immediately.)"
+msgstr ""
+
+#: https//support.torproject.org/about/change-paths/
+#: (content/about/change-paths/contents+en.lrquestion.description)
+msgid ""
+"But note that a single TCP stream (e.g. a long IRC connection) will stay on "
+"the same circuit forever."
+msgstr ""
+
+#: https//support.torproject.org/about/change-paths/
+#: (content/about/change-paths/contents+en.lrquestion.description)
+msgid "We don't rotate individual streams from one circuit to the next."
+msgstr ""
+
+#: https//support.torproject.org/about/change-paths/
+#: (content/about/change-paths/contents+en.lrquestion.description)
+msgid ""
+"Otherwise, an adversary with a partial view of the network would be given "
+"many chances over time to link you to your destination, rather than just one"
+" chance."
+msgstr ""
+
#: https//support.torproject.org/about/distribute-tor/
#: (content/about/distribute-tor/contents+en.lrquestion.title)
msgid "Can I distribute Tor?"
@@ -2561,6 +2713,133 @@ msgid ""
"details."
msgstr ""
+#: https//support.torproject.org/about/entry-guards/
+#: (content/about/entry-guards/contents+en.lrquestion.title)
+msgid "What are Entry Guards?"
+msgstr ""
+
+#: https//support.torproject.org/about/entry-guards/
+#: (content/about/entry-guards/contents+en.lrquestion.description)
+msgid ""
+"Tor (like all current practical low-latency anonymity designs) fails when "
+"the attacker can see both ends of the communications channel."
+msgstr ""
+
+#: https//support.torproject.org/about/entry-guards/
+#: (content/about/entry-guards/contents+en.lrquestion.description)
+msgid ""
+"For example, suppose the attacker controls or watches the Tor relay you "
+"choose to enter the network, and also controls or watches the website you "
+"visit."
+msgstr ""
+
+#: https//support.torproject.org/about/entry-guards/
+#: (content/about/entry-guards/contents+en.lrquestion.description)
+msgid ""
+"In this case, the research community knows no practical low-latency design "
+"that can reliably stop the attacker from correlating volume and timing "
+"information on the two sides."
+msgstr ""
+
+#: https//support.torproject.org/about/entry-guards/
+#: (content/about/entry-guards/contents+en.lrquestion.description)
+msgid "So, what should we do?"
+msgstr ""
+
+#: https//support.torproject.org/about/entry-guards/
+#: (content/about/entry-guards/contents+en.lrquestion.description)
+msgid "Suppose the attacker controls, or can observe, C relays."
+msgstr ""
+
+#: https//support.torproject.org/about/entry-guards/
+#: (content/about/entry-guards/contents+en.lrquestion.description)
+msgid "Suppose there are N relays total."
+msgstr ""
+
+#: https//support.torproject.org/about/entry-guards/
+#: (content/about/entry-guards/contents+en.lrquestion.description)
+msgid ""
+"If you select new entry and exit relays each time you use the network, the "
+"attacker will be able to correlate all traffic you send with probability "
+"around (c/n)2."
+msgstr ""
+
+#: https//support.torproject.org/about/entry-guards/
+#: (content/about/entry-guards/contents+en.lrquestion.description)
+msgid ""
+"But profiling is, for most users, as bad as being traced all the time: they "
+"want to do something often without an attacker noticing, and the attacker "
+"noticing once is as bad as the attacker noticing more often."
+msgstr ""
+
+#: https//support.torproject.org/about/entry-guards/
+#: (content/about/entry-guards/contents+en.lrquestion.description)
+msgid ""
+"Thus, choosing many random entries and exits gives the user no chance of "
+"escaping profiling by this kind of attacker."
+msgstr ""
+
+#: https//support.torproject.org/about/entry-guards/
+#: (content/about/entry-guards/contents+en.lrquestion.description)
+msgid ""
+"The solution is \"entry guards\": each Tor client selects a few relays at "
+"random to use as entry points, and uses only those relays for their first "
+"hop."
+msgstr ""
+
+#: https//support.torproject.org/about/entry-guards/
+#: (content/about/entry-guards/contents+en.lrquestion.description)
+msgid ""
+"If those relays are not controlled or observed, the attacker can't win, "
+"ever, and the user is secure."
+msgstr ""
+
+#: https//support.torproject.org/about/entry-guards/
+#: (content/about/entry-guards/contents+en.lrquestion.description)
+msgid ""
+"If those relays are observed or controlled by the attacker, the attacker "
+"sees a larger fraction of the user's traffic - but still the user is no more"
+" profiled than before."
+msgstr ""
+
+#: https//support.torproject.org/about/entry-guards/
+#: (content/about/entry-guards/contents+en.lrquestion.description)
+msgid ""
+"Thus, the user has some chance (on the order of (n-c)/n) of avoiding "
+"profiling, whereas they had none before."
+msgstr ""
+
+#: https//support.torproject.org/about/entry-guards/
+#: (content/about/entry-guards/contents+en.lrquestion.description)
+msgid ""
+"You can read more at [An Analysis of the Degradation of Anonymous "
+"Protocols](http://freehaven.net/anonbib/#wright02), [Defending Anonymous "
+"Communication Against Passive Logging "
+"Attacks](http://freehaven.net/anonbib/#wright03), and especially [Locating "
+"Hidden Servers](http://freehaven.net/anonbib/#hs-attack06)."
+msgstr ""
+
+#: https//support.torproject.org/about/entry-guards/
+#: (content/about/entry-guards/contents+en.lrquestion.description)
+msgid ""
+"Restricting your entry nodes may also help against attackers who want to run"
+" a few Tor nodes and easily enumerate all of the Tor user IP addresses."
+msgstr ""
+
+#: https//support.torproject.org/about/entry-guards/
+#: (content/about/entry-guards/contents+en.lrquestion.description)
+msgid ""
+"(Even though they can't learn what destinations the users are talking to, "
+"they still might be able to do bad things with just a list of users.)"
+msgstr ""
+
+#: https//support.torproject.org/about/entry-guards/
+#: (content/about/entry-guards/contents+en.lrquestion.description)
+msgid ""
+"However, that feature won't really become useful until we move to a "
+"\"directory guard\" design as well."
+msgstr ""
+
#: https//support.torproject.org/about/how-is-tor-different-from-other-proxies/
#: (content/about/how-is-tor-different-from-other-proxies/contents+en.lrquestion.title)
msgid "How is Tor different from other proxies?"
@@ -2731,6 +3010,162 @@ msgid ""
" Tor and HTTPS interact."
msgstr ""
+#: https//support.torproject.org/about/key-management/
+#: (content/about/key-management/contents+en.lrquestion.title)
+msgid "Tell me about all the keys Tor uses"
+msgstr ""
+
+#: https//support.torproject.org/about/key-management/
+#: (content/about/key-management/contents+en.lrquestion.description)
+msgid ""
+"Tor uses a variety of different keys, with three goals in mind: 1) "
+"encryption to ensure privacy of data within the Tor network, 2) "
+"authentication so clients know they're talking to the relays they meant to "
+"talk to, and 3) signatures to make sure all clients know the same set of "
+"relays."
+msgstr ""
+
+#: https//support.torproject.org/about/key-management/
+#: (content/about/key-management/contents+en.lrquestion.description)
+msgid ""
+"**Encryption**: first, all connections in Tor use TLS link encryption, so "
+"observers can't look inside to see which circuit a given cell is intended "
+"for."
+msgstr ""
+
+#: https//support.torproject.org/about/key-management/
+#: (content/about/key-management/contents+en.lrquestion.description)
+msgid ""
+"Further, the Tor client establishes an ephemeral encryption key with each "
+"relay in the circuit; these extra layers of encryption mean that only the "
+"exit relay can read the cells."
+msgstr ""
+
+#: https//support.torproject.org/about/key-management/
+#: (content/about/key-management/contents+en.lrquestion.description)
+msgid ""
+"Both sides discard the circuit key when the circuit ends, so logging traffic"
+" and then breaking into the relay to discover the key won't work."
+msgstr ""
+
+#: https//support.torproject.org/about/key-management/
+#: (content/about/key-management/contents+en.lrquestion.description)
+msgid ""
+"**Authentication**: Every Tor relay has a public decryption key called the "
+"\"onion key\"."
+msgstr ""
+
+#: https//support.torproject.org/about/key-management/
+#: (content/about/key-management/contents+en.lrquestion.description)
+msgid "Each relay rotates its onion key once a week."
+msgstr ""
+
+#: https//support.torproject.org/about/key-management/
+#: (content/about/key-management/contents+en.lrquestion.description)
+msgid ""
+"When the Tor client establishes circuits, at each step it [demands that the "
+"Tor relay prove knowledge of its onion key](https://svn-"
+"archive.torproject.org/svn/projects/design-paper/tor-"
+"design.html#subsec:circuits)."
+msgstr ""
+
+#: https//support.torproject.org/about/key-management/
+#: (content/about/key-management/contents+en.lrquestion.description)
+msgid ""
+"That way the first node in the path can't just spoof the rest of the path."
+msgstr ""
+
+#: https//support.torproject.org/about/key-management/
+#: (content/about/key-management/contents+en.lrquestion.description)
+msgid ""
+"Because the Tor client chooses the path, it can make sure to get Tor's "
+"\"distributed trust\" property: no single relay in the path can know about "
+"both the client and what the client is doing."
+msgstr ""
+
+#: https//support.torproject.org/about/key-management/
+#: (content/about/key-management/contents+en.lrquestion.description)
+msgid ""
+"**Coordination**: How do clients know what the relays are, and how do they "
+"know that they have the right keys for them?"
+msgstr ""
+
+#: https//support.torproject.org/about/key-management/
+#: (content/about/key-management/contents+en.lrquestion.description)
+msgid "Each relay has a long-term public signing key called the \"identity key\"."
+msgstr ""
+
+#: https//support.torproject.org/about/key-management/
+#: (content/about/key-management/contents+en.lrquestion.description)
+msgid "Each directory authority additionally has a \"directory signing key\"."
+msgstr ""
+
+#: https//support.torproject.org/about/key-management/
+#: (content/about/key-management/contents+en.lrquestion.description)
+msgid ""
+"The directory authorities [provide a signed "
+"list](https://gitweb.torproject.org/torspec.git/tree/dir-spec.txt) of all "
+"the known relays, and in that list are a set of certificates from each relay"
+" (self-signed by their identity key) specifying their keys, locations, exit "
+"policies, and so on."
+msgstr ""
+
+#: https//support.torproject.org/about/key-management/
+#: (content/about/key-management/contents+en.lrquestion.description)
+msgid ""
+"So unless the adversary can control a majority of the directory authorities "
+"(as of 2021 there are 10 directory authorities), they can't trick the Tor "
+"client into using other Tor relays."
+msgstr ""
+
+#: https//support.torproject.org/about/key-management/
+#: (content/about/key-management/contents+en.lrquestion.description)
+msgid "How do clients know what the directory authorities are?"
+msgstr ""
+
+#: https//support.torproject.org/about/key-management/
+#: (content/about/key-management/contents+en.lrquestion.description)
+msgid ""
+"The Tor software comes with a built-in list of location and public key for "
+"each directory authority."
+msgstr ""
+
+#: https//support.torproject.org/about/key-management/
+#: (content/about/key-management/contents+en.lrquestion.description)
+msgid ""
+"So the only way to trick users into using a fake Tor network is to give them"
+" a specially modified version of the software."
+msgstr ""
+
+#: https//support.torproject.org/about/key-management/
+#: (content/about/key-management/contents+en.lrquestion.description)
+msgid "How do users know they've got the right software?"
+msgstr ""
+
+#: https//support.torproject.org/about/key-management/
+#: (content/about/key-management/contents+en.lrquestion.description)
+msgid ""
+"When we distribute the source code or a package, we digitally sign it with "
+"[GNU Privacy Guard](http://www.gnupg.org/). See the [instructions on how to "
+"check Tor Browser's signature](https://support.torproject.org/tbb/how-to-"
+"verify-signature/)."
+msgstr ""
+
+#: https//support.torproject.org/about/key-management/
+#: (content/about/key-management/contents+en.lrquestion.description)
+msgid ""
+"In order to be certain that it's really signed by us, you need to have met "
+"us in person and gotten a copy of our GPG key fingerprint, or you need to "
+"know somebody who has."
+msgstr ""
+
+#: https//support.torproject.org/about/key-management/
+#: (content/about/key-management/contents+en.lrquestion.description)
+msgid ""
+"If you're concerned about an attack on this level, we recommend you get "
+"involved with the security community and start meeting people."
+msgstr ""
+
#: https//support.torproject.org/about/no-data-scrubbing/
#: (content/about/no-data-scrubbing/contents+en.lrquestion.title)
msgid ""
@@ -2763,6 +3198,151 @@ msgid ""
"though."
msgstr ""
+#: https//support.torproject.org/about/protections/
+#: (content/about/protections/contents+en.lrquestion.title)
+msgid "What protections does Tor provide?"
+msgstr ""
+
+#: https//support.torproject.org/about/protections/
+#: (content/about/protections/contents+en.lrquestion.description)
+msgid ""
+"Internet communication is based on a store-and-forward model that can be "
+"understood in analogy to postal mail: Data is transmitted in blocks called "
+"IP datagrams or packets."
+msgstr ""
+
+#: https//support.torproject.org/about/protections/
+#: (content/about/protections/contents+en.lrquestion.description)
+msgid ""
+"Every packet includes a source IP address (of the sender) and a destination "
+"IP address (of the receiver), just as ordinary letters contain postal "
+"addresses of sender and receiver."
+msgstr ""
+
+#: https//support.torproject.org/about/protections/
+#: (content/about/protections/contents+en.lrquestion.description)
+msgid ""
+"The way from sender to receiver involves multiple hops of routers, where "
+"each router inspects the destination IP address and forwards the packet "
+"closer to its destination."
+msgstr ""
+
+#: https//support.torproject.org/about/protections/
+#: (content/about/protections/contents+en.lrquestion.description)
+msgid ""
+"Thus, every router between sender and receiver learns that the sender is "
+"communicating with the receiver."
+msgstr ""
+
+#: https//support.torproject.org/about/protections/
+#: (content/about/protections/contents+en.lrquestion.description)
+msgid ""
+"In particular, your local ISP is in the position to build a complete profile"
+" of your Internet usage."
+msgstr ""
+
+#: https//support.torproject.org/about/protections/
+#: (content/about/protections/contents+en.lrquestion.description)
+msgid ""
+"In addition, every server in the Internet that can see any of the packets "
+"can profile your behavior."
+msgstr ""
+
+#: https//support.torproject.org/about/protections/
+#: (content/about/protections/contents+en.lrquestion.description)
+msgid ""
+"The aim of Tor is to improve your privacy by sending your traffic through a "
+"series of proxies."
+msgstr ""
+
+#: https//support.torproject.org/about/protections/
+#: (content/about/protections/contents+en.lrquestion.description)
+msgid ""
+"Your communication is encrypted in multiple layers and routed via multiple "
+"hops through the Tor network to the final receiver."
+msgstr ""
+
+#: https//support.torproject.org/about/protections/
+#: (content/about/protections/contents+en.lrquestion.description)
+msgid ""
+"More details on this process can be found in this "
+"[visualization](https://support.torproject.org/https/https-1/)."
+msgstr ""
+
+#: https//support.torproject.org/about/protections/
+#: (content/about/protections/contents+en.lrquestion.description)
+msgid ""
+"Note that all your local ISP can observe now is that you are communicating "
+"with Tor nodes."
+msgstr ""
+
+#: https//support.torproject.org/about/protections/
+#: (content/about/protections/contents+en.lrquestion.description)
+msgid ""
+"Similarly, servers in the Internet just see that they are being contacted by"
+" Tor nodes."
+msgstr ""
+
+#: https//support.torproject.org/about/protections/
+#: (content/about/protections/contents+en.lrquestion.description)
+msgid "Generally speaking, Tor aims to solve three privacy problems:"
+msgstr ""
+
+#: https//support.torproject.org/about/protections/
+#: (content/about/protections/contents+en.lrquestion.description)
+msgid ""
+"First, Tor prevents websites and other services from learning your location,"
+" which they can use to build databases about your habits and interests."
+msgstr ""
+
+#: https//support.torproject.org/about/protections/
+#: (content/about/protections/contents+en.lrquestion.description)
+msgid ""
+"With Tor, your Internet connections don't give you away by default -- now "
+"you can have the ability to choose, for each connection, how much "
+"information to reveal."
+msgstr ""
+
+#: https//support.torproject.org/about/protections/
+#: (content/about/protections/contents+en.lrquestion.description)
+msgid ""
+"Second, Tor prevents people watching your traffic locally (such as your ISP "
+"or someone with access to your home wifi or router) from learning what "
+"information you're fetching and where you're fetching it from."
+msgstr ""
+
+#: https//support.torproject.org/about/protections/
+#: (content/about/protections/contents+en.lrquestion.description)
+msgid ""
+"It also stops them from deciding what you're allowed to learn and publish --"
+" if you can get to any part of the Tor network, you can reach any site on "
+"the Internet."
+msgstr ""
+
+#: https//support.torproject.org/about/protections/
+#: (content/about/protections/contents+en.lrquestion.description)
+msgid ""
+"Third, Tor routes your connection through more than one Tor relay so no "
+"single relay can learn what you're up to."
+msgstr ""
+
+#: https//support.torproject.org/about/protections/
+#: (content/about/protections/contents+en.lrquestion.description)
+msgid ""
+"Because these relays are run by different individuals or organizations, "
+"distributing trust provides more security than the old [one hop "
+"proxy](https://support.torproject.org/about/#how-is-tor-different-from-"
+"other-proxies) approach."
+msgstr ""
+
+#: https//support.torproject.org/about/protections/
+#: (content/about/protections/contents+en.lrquestion.description)
+msgid ""
+"Note, however, that there are situations where Tor fails to solve these "
+"privacy problems entirely: see the entry below on [remaining "
+"attacks](https://support.torproject.org/about/#attacks-on-onion-routing)."
+msgstr ""
+
#: https//support.torproject.org/about/what-is-tor/
#: (content/about/what-is-tor/contents+en.lrquestion.title)
msgid "What is Tor?"
@@ -4943,9 +5523,11 @@ msgstr ""
#: (content/tbb/tbb-47/contents+en.lrquestion.description)
msgid ""
"Also, read up on the HTTPProxyAuthenticator and HTTPSProxyAuthenticator "
-"options if your proxy requires auth. We only support basic auth currently, "
-"but if you need NTLM authentication, you may find [this post in the "
-"archives](https://archives.seul.org/or/talk/Jun-2005/msg00223.html) useful."
+"options if your [proxy requires auth.](https://developer.mozilla.org/en-"
+"US/docs/Web/HTTP/Headers/Proxy-Authenticate) We only support basic auth "
+"currently, but if you need NTLM authentication, you may find [this post in "
+"the archives](https://archives.seul.org/or/talk/Jun-2005/msg00223.html) "
+"useful."
msgstr ""
#: https//support.torproject.org/tbb/tbb-47/
@@ -5162,6 +5744,219 @@ msgid ""
"have no effect on Tor's configuration."
msgstr ""
+#: https//support.torproject.org/tbb/tbb-firewall-ports/
+#: (content/tbb/tbb-firewall-ports/contents+en.lrquestion.title)
+msgid "My firewall only allows a few outgoing ports"
+msgstr ""
+
+#: https//support.torproject.org/tbb/tbb-firewall-ports/
+#: (content/tbb/tbb-firewall-ports/contents+en.lrquestion.description)
+msgid ""
+"If your firewall works by blocking ports, then you can tell Tor to only use "
+"the ports when you start your Tor Browser."
+msgstr ""
+
+#: https//support.torproject.org/tbb/tbb-firewall-ports/
+#: (content/tbb/tbb-firewall-ports/contents+en.lrquestion.description)
+msgid ""
+"Or you can add the ports that your firewall permits by adding "
+"\"FascistFirewall 1\" to your torrc configuration file."
+msgstr ""
+
+#: https//support.torproject.org/tbb/tbb-firewall-ports/
+#: (content/tbb/tbb-firewall-ports/contents+en.lrquestion.description)
+msgid ""
+"By default, when you set this Tor assumes that your firewall allows only "
+"port 80 and port 443 (HTTP and HTTPS respectively)."
+msgstr ""
+
+#: https//support.torproject.org/tbb/tbb-firewall-ports/
+#: (content/tbb/tbb-firewall-ports/contents+en.lrquestion.description)
+msgid ""
+"You can select a different set of ports with the FirewallPorts torrc option."
+msgstr ""
+
+#: https//support.torproject.org/tbb/tbb-firewall-ports/
+#: (content/tbb/tbb-firewall-ports/contents+en.lrquestion.description)
+msgid ""
+"If you want to be more fine-grained with your controls, you can also use the"
+" ReachableAddresses config options, e.g.:"
+msgstr ""
+
+#: https//support.torproject.org/tbb/tbb-firewall-ports/
+#: (content/tbb/tbb-firewall-ports/contents+en.lrquestion.description)
+#: https//support.torproject.org/tbb/tbb-install-tor-central-server/
+#: (content/tbb/tbb-install-tor-central-server/contents+en.lrquestion.description)
+#: https//support.torproject.org/operators/default-exit-ports/
+#: (content/operators/default-exit-ports/contents+en.lrquestion.description)
+#: https//support.torproject.org/operators/hibernation/
+#: (content/operators/hibernation/contents+en.lrquestion.description)
+#: https//support.torproject.org/operators/limit-total-bandwidth/
+#: (content/operators/limit-total-bandwidth/contents+en.lrquestion.description)
+#: https//support.torproject.org/misc/bug-or-feedback/
+#: (content/misc/bug-or-feedback/contents+en.lrquestion.description)
+#: https//support.torproject.org/get-in-touch/why-i-cant-join-tor-channels/
+#: (content/get-in-touch/why-i-cant-join-tor-channels/contents+en.lrquestion.description)
+#: https//support.torproject.org/apt/tor-deb-repo/
+#: (content/apt/apt-1/contents+en.lrquestion.description)
+#: https//support.torproject.org/apt/apt-over-tor/
+#: (content/apt/apt-3/contents+en.lrquestion.description)
+msgid "```"
+msgstr ""
+
+#: https//support.torproject.org/tbb/tbb-firewall-ports/
+#: (content/tbb/tbb-firewall-ports/contents+en.lrquestion.description)
+msgid "ReachableDirAddresses *:80"
+msgstr ""
+
+#: https//support.torproject.org/tbb/tbb-firewall-ports/
+#: (content/tbb/tbb-firewall-ports/contents+en.lrquestion.description)
+msgid "ReachableORAddresses *:443"
+msgstr ""
+
+#: https//support.torproject.org/tbb/tbb-install-tor-central-server/
+#: (content/tbb/tbb-install-tor-central-server/contents+en.lrquestion.title)
+msgid ""
+"Can I install Tor on a central server, and have my clients connect to it?"
+msgstr ""
+
+#: https//support.torproject.org/tbb/tbb-install-tor-central-server/
+#: (content/tbb/tbb-install-tor-central-server/contents+en.lrquestion.description)
+msgid ""
+"Yes. Tor can be configured as a client or a relay on another machine, and "
+"allow other machines to be able to connect to it for anonymity."
+msgstr ""
+
+#: https//support.torproject.org/tbb/tbb-install-tor-central-server/
+#: (content/tbb/tbb-install-tor-central-server/contents+en.lrquestion.description)
+msgid ""
+"This is most useful in an environment where many computers want a gateway of"
+" anonymity to the rest of the world."
+msgstr ""
+
+#: https//support.torproject.org/tbb/tbb-install-tor-central-server/
+#: (content/tbb/tbb-install-tor-central-server/contents+en.lrquestion.description)
+msgid ""
+"However, be forewarned that with this configuration, anyone within your "
+"private network (existing between you and the Tor client/relay) can see what"
+" traffic you are sending in clear text."
+msgstr ""
+
+#: https//support.torproject.org/tbb/tbb-install-tor-central-server/
+#: (content/tbb/tbb-install-tor-central-server/contents+en.lrquestion.description)
+msgid "The anonymity doesn't start until you get to the Tor relay."
+msgstr ""
+
+#: https//support.torproject.org/tbb/tbb-install-tor-central-server/
+#: (content/tbb/tbb-install-tor-central-server/contents+en.lrquestion.description)
+msgid ""
+"Because of this, if you are the controller of your domain and you know "
+"everything's locked down, you will be OK, but this configuration may not be "
+"suitable for large private networks where security is key all around."
+msgstr ""
+
+#: https//support.torproject.org/tbb/tbb-install-tor-central-server/
+#: (content/tbb/tbb-install-tor-central-server/contents+en.lrquestion.description)
+msgid ""
+"Configuration is simple, editing your torrc file's SocksListenAddress "
+"according to the following examples:"
+msgstr ""
+
+#: https//support.torproject.org/tbb/tbb-install-tor-central-server/
+#: (content/tbb/tbb-install-tor-central-server/contents+en.lrquestion.description)
+msgid "SocksListenAddress 127.0.0.1"
+msgstr ""
+
+#: https//support.torproject.org/tbb/tbb-install-tor-central-server/
+#: (content/tbb/tbb-install-tor-central-server/contents+en.lrquestion.description)
+msgid "SocksListenAddress 192.168.x.x:9100"
+msgstr ""
+
+#: https//support.torproject.org/tbb/tbb-install-tor-central-server/
+#: (content/tbb/tbb-install-tor-central-server/contents+en.lrquestion.description)
+msgid "SocksListenAddress 0.0.0.0:9100"
+msgstr ""
+
+#: https//support.torproject.org/tbb/tbb-install-tor-central-server/
+#: (content/tbb/tbb-install-tor-central-server/contents+en.lrquestion.description)
+msgid ""
+"You can state multiple listen addresses, in the case that you are part of "
+"several networks or subnets."
+msgstr ""
+
+#: https//support.torproject.org/tbb/tbb-install-tor-central-server/
+#: (content/tbb/tbb-install-tor-central-server/contents+en.lrquestion.description)
+msgid "SocksListenAddress 192.168.x.x:9100 #eth0"
+msgstr ""
+
+#: https//support.torproject.org/tbb/tbb-install-tor-central-server/
+#: (content/tbb/tbb-install-tor-central-server/contents+en.lrquestion.description)
+msgid "SocksListenAddress 10.x.x.x:9100 #eth1"
+msgstr ""
+
+#: https//support.torproject.org/tbb/tbb-install-tor-central-server/
+#: (content/tbb/tbb-install-tor-central-server/contents+en.lrquestion.description)
+msgid ""
+"After this, your clients on their respective networks/subnets would specify "
+"a socks proxy with the address and port you specified SocksListenAddress to "
+"be."
+msgstr ""
+
+#: https//support.torproject.org/tbb/tbb-install-tor-central-server/
+#: (content/tbb/tbb-install-tor-central-server/contents+en.lrquestion.description)
+msgid ""
+"Please note that the SocksPort configuration option gives the port ONLY for "
+"localhost (127.0.0.1)."
+msgstr ""
+
+#: https//support.torproject.org/tbb/tbb-install-tor-central-server/
+#: (content/tbb/tbb-install-tor-central-server/contents+en.lrquestion.description)
+msgid ""
+"When setting up your SocksListenAddress(es), you need to give the port with "
+"the address, as shown above."
+msgstr ""
+
+#: https//support.torproject.org/tbb/tbb-install-tor-central-server/
+#: (content/tbb/tbb-install-tor-central-server/contents+en.lrquestion.description)
+msgid ""
+"If you are interested in forcing all outgoing data through the central Tor "
+"client/relay, instead of the server only being an optional proxy, you may "
+"find the program iptables (for *nix) useful."
+msgstr ""
+
+#: https//support.torproject.org/tbb/tbb-run-client-different-computer/
+#: (content/tbb/tbb-run-client-different-computer/contents+en.lrquestion.title)
+msgid ""
+"I want to run my Tor client on a different computer than my applications"
+msgstr ""
+
+#: https//support.torproject.org/tbb/tbb-run-client-different-computer/
+#: (content/tbb/tbb-run-client-different-computer/contents+en.lrquestion.description)
+msgid ""
+"By default, your Tor client only listens for applications that connect from "
+"localhost."
+msgstr ""
+
+#: https//support.torproject.org/tbb/tbb-run-client-different-computer/
+#: (content/tbb/tbb-run-client-different-computer/contents+en.lrquestion.description)
+msgid "Connections from other computers are refused."
+msgstr ""
+
+#: https//support.torproject.org/tbb/tbb-run-client-different-computer/
+#: (content/tbb/tbb-run-client-different-computer/contents+en.lrquestion.description)
+msgid ""
+"If you want to torify applications on different computers than the Tor "
+"client, you should edit your torrc to define `SocksListenAddress 0.0.0.0` "
+"and then restart (or hup) Tor."
+msgstr ""
+
+#: https//support.torproject.org/tbb/tbb-run-client-different-computer/
+#: (content/tbb/tbb-run-client-different-computer/contents+en.lrquestion.description)
+msgid ""
+"If you want to get more advanced, you can configure your Tor client on a "
+"firewall to bind to your internal IP but not your external IP."
+msgstr ""
+
#: https//support.torproject.org/tbb/website-blocking-tor/
#: (content/tbb/website-blocking-tor/contents+en.lrquestion.title)
msgid "A website I am trying to reach is blocking access over Tor."
@@ -6613,6 +7408,130 @@ msgid ""
"guide."
msgstr ""
+#: https//support.torproject.org/operators/default-exit-ports/
+#: (content/operators/default-exit-ports/contents+en.lrquestion.title)
+msgid "Is there a list of default exit ports?"
+msgstr ""
+
+#: https//support.torproject.org/operators/default-exit-ports/
+#: (content/operators/default-exit-ports/contents+en.lrquestion.description)
+msgid ""
+"The default open ports are listed below but keep in mind that, any port or "
+"ports can be opened by the relay operator by configuring it in torrc or "
+"modifying the source code."
+msgstr ""
+
+#: https//support.torproject.org/operators/default-exit-ports/
+#: (content/operators/default-exit-ports/contents+en.lrquestion.description)
+msgid ""
+"The default according to src/or/policies.c ([line 85][1] and [line 1901][2])"
+" from the source code release [release-0.4.6][3]:"
+msgstr ""
+
+#: https//support.torproject.org/operators/default-exit-ports/
+#: (content/operators/default-exit-ports/contents+en.lrquestion.description)
+msgid "reject 0.0.0.0/8"
+msgstr ""
+
+#: https//support.torproject.org/operators/default-exit-ports/
+#: (content/operators/default-exit-ports/contents+en.lrquestion.description)
+msgid "reject 169.254.0.0/16"
+msgstr ""
+
+#: https//support.torproject.org/operators/default-exit-ports/
+#: (content/operators/default-exit-ports/contents+en.lrquestion.description)
+msgid "reject 127.0.0.0/8"
+msgstr ""
+
+#: https//support.torproject.org/operators/default-exit-ports/
+#: (content/operators/default-exit-ports/contents+en.lrquestion.description)
+msgid "reject 192.168.0.0/16"
+msgstr ""
+
+#: https//support.torproject.org/operators/default-exit-ports/
+#: (content/operators/default-exit-ports/contents+en.lrquestion.description)
+msgid "reject 10.0.0.0/8"
+msgstr ""
+
+#: https//support.torproject.org/operators/default-exit-ports/
+#: (content/operators/default-exit-ports/contents+en.lrquestion.description)
+msgid "reject 172.16.0.0/12"
+msgstr ""
+
+#: https//support.torproject.org/operators/default-exit-ports/
+#: (content/operators/default-exit-ports/contents+en.lrquestion.description)
+msgid "reject *:25"
+msgstr ""
+
+#: https//support.torproject.org/operators/default-exit-ports/
+#: (content/operators/default-exit-ports/contents+en.lrquestion.description)
+msgid "reject *:119"
+msgstr ""
+
+#: https//support.torproject.org/operators/default-exit-ports/
+#: (content/operators/default-exit-ports/contents+en.lrquestion.description)
+msgid "reject *:135-139"
+msgstr ""
+
+#: https//support.torproject.org/operators/default-exit-ports/
+#: (content/operators/default-exit-ports/contents+en.lrquestion.description)
+msgid "reject *:445"
+msgstr ""
+
+#: https//support.torproject.org/operators/default-exit-ports/
+#: (content/operators/default-exit-ports/contents+en.lrquestion.description)
+msgid "reject *:563"
+msgstr ""
+
+#: https//support.torproject.org/operators/default-exit-ports/
+#: (content/operators/default-exit-ports/contents+en.lrquestion.description)
+msgid "reject *:1214"
+msgstr ""
+
+#: https//support.torproject.org/operators/default-exit-ports/
+#: (content/operators/default-exit-ports/contents+en.lrquestion.description)
+msgid "reject *:4661-4666"
+msgstr ""
+
+#: https//support.torproject.org/operators/default-exit-ports/
+#: (content/operators/default-exit-ports/contents+en.lrquestion.description)
+msgid "reject *:6346-6429"
+msgstr ""
+
+#: https//support.torproject.org/operators/default-exit-ports/
+#: (content/operators/default-exit-ports/contents+en.lrquestion.description)
+msgid "reject *:6699"
+msgstr ""
+
+#: https//support.torproject.org/operators/default-exit-ports/
+#: (content/operators/default-exit-ports/contents+en.lrquestion.description)
+msgid "reject *:6881-6999"
+msgstr ""
+
+#: https//support.torproject.org/operators/default-exit-ports/
+#: (content/operators/default-exit-ports/contents+en.lrquestion.description)
+msgid "accept *:*"
+msgstr ""
+
+#: https//support.torproject.org/operators/default-exit-ports/
+#: (content/operators/default-exit-ports/contents+en.lrquestion.description)
+msgid ""
+"[1]: "
+"https://gitlab.torproject.org/tpo/core/tor/-/blob/release-0.4.6/src/core/or/policies.c#L85"
+msgstr ""
+
+#: https//support.torproject.org/operators/default-exit-ports/
+#: (content/operators/default-exit-ports/contents+en.lrquestion.description)
+msgid ""
+"[2]: "
+"https://gitlab.torproject.org/tpo/core/tor/-/blob/release-0.4.6/src/core/or/policies.c#L1901"
+msgstr ""
+
+#: https//support.torproject.org/operators/default-exit-ports/
+#: (content/operators/default-exit-ports/contents+en.lrquestion.description)
+msgid "[3]: https://gitlab.torproject.org/tpo/core/tor/-/tree/release-0.4.6/"
+msgstr ""
+
#: https//support.torproject.org/operators/dynamic-ip/
#: (content/operators/dynamic-ip/contents+en.lrquestion.title)
msgid "Can I run a Tor relay using a dynamic IP address?"
@@ -6760,21 +7679,6 @@ msgid ""
"into hibernation, signaled by this entry in the log:"
msgstr ""
-#: https//support.torproject.org/operators/hibernation/
-#: (content/operators/hibernation/contents+en.lrquestion.description)
-#: https//support.torproject.org/operators/limit-total-bandwidth/
-#: (content/operators/limit-total-bandwidth/contents+en.lrquestion.description)
-#: https//support.torproject.org/misc/bug-or-feedback/
-#: (content/misc/bug-or-feedback/contents+en.lrquestion.description)
-#: https//support.torproject.org/get-in-touch/why-i-cant-join-tor-channels/
-#: (content/get-in-touch/why-i-cant-join-tor-channels/contents+en.lrquestion.description)
-#: https//support.torproject.org/apt/tor-deb-repo/
-#: (content/apt/apt-1/contents+en.lrquestion.description)
-#: https//support.torproject.org/apt/apt-over-tor/
-#: (content/apt/apt-3/contents+en.lrquestion.description)
-msgid "```"
-msgstr ""
-
#: https//support.torproject.org/operators/hibernation/
#: (content/operators/hibernation/contents+en.lrquestion.description)
msgid "Bandwidth soft limit reached; commencing hibernation."
@@ -9009,6 +9913,131 @@ msgstr ""
msgid "sub 4096R/C00942E4 2017-03-13"
msgstr ""
+#: https//support.torproject.org/misc/check-socks-dns-leaks/
+#: (content/misc/check-socks-dns-leaks/contents+en.lrquestion.title)
+msgid ""
+"How do I check if my application that uses SOCKS is leaking DNS requests?"
+msgstr ""
+
+#: https//support.torproject.org/misc/check-socks-dns-leaks/
+#: (content/misc/check-socks-dns-leaks/contents+en.lrquestion.description)
+msgid ""
+"Even if your application is using the correct variant of the SOCKS protocol,"
+" there is still a risk that it could be leaking DNS queries."
+msgstr ""
+
+#: https//support.torproject.org/misc/check-socks-dns-leaks/
+#: (content/misc/check-socks-dns-leaks/contents+en.lrquestion.description)
+msgid ""
+"This problem happens in Firefox extensions that resolve the destination "
+"hostname themselves, for example to show you its IP address, what country "
+"it's in, etc."
+msgstr ""
+
+#: https//support.torproject.org/misc/check-socks-dns-leaks/
+#: (content/misc/check-socks-dns-leaks/contents+en.lrquestion.description)
+msgid ""
+"If you suspect your application might behave like this, follow the "
+"instructions below to check."
+msgstr ""
+
+#: https//support.torproject.org/misc/check-socks-dns-leaks/
+#: (content/misc/check-socks-dns-leaks/contents+en.lrquestion.description)
+msgid ""
+"1. Add `TestSocks 1` to your [torrc file](https://support.torproject.org/tbb"
+"/tbb-editing-torrc/)."
+msgstr ""
+
+#: https//support.torproject.org/misc/check-socks-dns-leaks/
+#: (content/misc/check-socks-dns-leaks/contents+en.lrquestion.description)
+msgid ""
+"1. Start Tor, and point your program's SOCKS proxy settings to Tor's SOCKS5 "
+"server (`socks5://127.0.0.1:9050` by default)."
+msgstr ""
+
+#: https//support.torproject.org/misc/check-socks-dns-leaks/
+#: (content/misc/check-socks-dns-leaks/contents+en.lrquestion.description)
+msgid ""
+"1. Watch your logs as you use your application. For each socks connection, "
+"Tor will log a `notice` for safe connections, and a `warn` for connections "
+"leaking DNS requests."
+msgstr ""
+
+#: https//support.torproject.org/misc/check-socks-dns-leaks/
+#: (content/misc/check-socks-dns-leaks/contents+en.lrquestion.description)
+msgid ""
+"If you want to automatically disable all connections leaking DNS requests, "
+"set `SafeSocks 1` in your torrc file."
+msgstr ""
+
+#: https//support.torproject.org/misc/hide-exits/
+#: (content/misc/hide-exits/contents+en.lrquestion.title)
+msgid ""
+"You should hide the list of Tor relays, so people can't block the exits."
+msgstr ""
+
+#: https//support.torproject.org/misc/hide-exits/
+#: (content/misc/hide-exits/contents+en.lrquestion.description)
+msgid "There are a few reasons we don't:"
+msgstr ""
+
+#: https//support.torproject.org/misc/hide-exits/
+#: (content/misc/hide-exits/contents+en.lrquestion.description)
+msgid ""
+"1. We can't help but make the information available, since Tor clients need "
+"to use it to pick their paths."
+msgstr ""
+
+#: https//support.torproject.org/misc/hide-exits/
+#: (content/misc/hide-exits/contents+en.lrquestion.description)
+msgid "So if the \"blockers\" want it, they can get it anyway."
+msgstr ""
+
+#: https//support.torproject.org/misc/hide-exits/
+#: (content/misc/hide-exits/contents+en.lrquestion.description)
+msgid ""
+"Further, even if we didn't tell clients about the list of relays directly, "
+"somebody could still make a lot of connections through Tor to a test site "
+"and build a list of the addresses they see."
+msgstr ""
+
+#: https//support.torproject.org/misc/hide-exits/
+#: (content/misc/hide-exits/contents+en.lrquestion.description)
+msgid ""
+"1. If people want to block us, we believe that they should be allowed to do "
+"so."
+msgstr ""
+
+#: https//support.torproject.org/misc/hide-exits/
+#: (content/misc/hide-exits/contents+en.lrquestion.description)
+msgid ""
+"Obviously, we would prefer for everybody to allow Tor users to connect to "
+"them, but people have the right to decide who their services should allow "
+"connections from, and if they want to block anonymous users, they can."
+msgstr ""
+
+#: https//support.torproject.org/misc/hide-exits/
+#: (content/misc/hide-exits/contents+en.lrquestion.description)
+msgid ""
+"1. Being blockable also has tactical advantages: it may be a persuasive "
+"response to website maintainers who feel threatened by Tor."
+msgstr ""
+
+#: https//support.torproject.org/misc/hide-exits/
+#: (content/misc/hide-exits/contents+en.lrquestion.description)
+msgid ""
+"Giving them the option may inspire them to stop and think about whether they"
+" really want to eliminate private access to their system, and if not, what "
+"other options they might have."
+msgstr ""
+
+#: https//support.torproject.org/misc/hide-exits/
+#: (content/misc/hide-exits/contents+en.lrquestion.description)
+msgid ""
+"The time they might otherwise have spent blocking Tor, they may instead "
+"spend rethinking their overall approach to privacy and anonymity."
+msgstr ""
+
#: https//support.torproject.org/misc/menu/
#: (content/misc/menu/contents+en.lrquestion.description)
msgid "About"
@@ -9593,56 +10622,20 @@ msgstr ""
#: https//support.torproject.org/get-in-touch/why-i-cant-join-tor-channels/
#: (content/get-in-touch/why-i-cant-join-tor-channels/contents+en.lrquestion.description)
msgid ""
-"Then, to complete the registration and ultimately gain access to the #tor-"
-"project channel, your nickname must be **verified**."
-msgstr ""
-
-#: https//support.torproject.org/get-in-touch/why-i-cant-join-tor-channels/
-#: (content/get-in-touch/why-i-cant-join-tor-channels/contents+en.lrquestion.description)
-msgid ""
-"1. To verify your nick, open a new browser window and go to "
-"https://webchat.oftc.net/?channels=tor."
-msgstr ""
-
-#: https//support.torproject.org/get-in-touch/why-i-cant-join-tor-channels/
-#: (content/get-in-touch/why-i-cant-join-tor-channels/contents+en.lrquestion.description)
-msgid "2. Log in with your IRC nickname and password."
-msgstr ""
-
-#: https//support.torproject.org/get-in-touch/why-i-cant-join-tor-channels/
-#: (content/get-in-touch/why-i-cant-join-tor-channels/contents+en.lrquestion.description)
-msgid ""
-"3. Look for the word **verify** and log in there. It may appear that nothing"
-" has happened. Look at the top of the page, and there will be a column "
-"called **Account**."
-msgstr ""
-
-#: https//support.torproject.org/get-in-touch/why-i-cant-join-tor-channels/
-#: (content/get-in-touch/why-i-cant-join-tor-channels/contents+en.lrquestion.description)
-msgid "4. Click on **Account**."
-msgstr ""
-
-#: https//support.torproject.org/get-in-touch/why-i-cant-join-tor-channels/
-#: (content/get-in-touch/why-i-cant-join-tor-channels/contents+en.lrquestion.description)
-msgid ""
-"5. Click on the small sentence at the bottom of the square that says: Verify"
-" account."
-msgstr ""
-
-#: https//support.torproject.org/get-in-touch/why-i-cant-join-tor-channels/
-#: (content/get-in-touch/why-i-cant-join-tor-channels/contents+en.lrquestion.description)
-msgid "6. Fill out the Captcha that pops up, and click ok."
+"After registering your nickname, to gain access to the #tor-project and "
+"other protected channels, your nickname must be **verified**."
msgstr ""
#: https//support.torproject.org/get-in-touch/why-i-cant-join-tor-channels/
#: (content/get-in-touch/why-i-cant-join-tor-channels/contents+en.lrquestion.description)
msgid ""
-"7. A tiny message will appear: \"Your NickServ account has been verified.\""
+"1. Go to https://services.oftc.net/ and follow the steps in the '*To verify "
+"your account*' section"
msgstr ""
#: https//support.torproject.org/get-in-touch/why-i-cant-join-tor-channels/
#: (content/get-in-touch/why-i-cant-join-tor-channels/contents+en.lrquestion.description)
-msgid "8. Go back to the IRC webpage where you are logged in and type:"
+msgid "2. Go back to the IRC webpage where you are logged in and type:"
msgstr ""
#: https//support.torproject.org/get-in-touch/why-i-cant-join-tor-channels/
@@ -9652,12 +10645,12 @@ msgstr ""
#: https//support.torproject.org/get-in-touch/why-i-cant-join-tor-channels/
#: (content/get-in-touch/why-i-cant-join-tor-channels/contents+en.lrquestion.description)
-msgid "9. Click ENTER."
+msgid "3. Click ENTER."
msgstr ""
#: https//support.torproject.org/get-in-touch/why-i-cant-join-tor-channels/
#: (content/get-in-touch/why-i-cant-join-tor-channels/contents+en.lrquestion.description)
-msgid "10. If all is well, you will receive a message that says:"
+msgid "4. If all is well, you will receive a message that says:"
msgstr ""
#: https//support.torproject.org/get-in-touch/why-i-cant-join-tor-channels/
@@ -9798,18 +10791,22 @@ msgstr ""
#: https//support.torproject.org/apt/tor-deb-repo/
#: (content/apt/apt-1/contents+en.lrquestion.description)
msgid ""
-"#### 2. Add the following entries to `/etc/apt/sources.list` or a new file "
-"in `/etc/apt/sources.list.d/`"
+"#### 2. Create a new file in `/etc/apt/sources.list.d/` named `tor.list`. "
+"Add the following entries:"
msgstr ""
#: https//support.torproject.org/apt/tor-deb-repo/
#: (content/apt/apt-1/contents+en.lrquestion.description)
-msgid "deb https://deb.torproject.org/torproject.org <DISTRIBUTION> main"
+msgid ""
+"deb [signed-by=/usr/share/keyrings/tor-archive-keyring.gpg] "
+"https://deb.torproject.org/torproject.org <DISTRIBUTION> main"
msgstr ""
#: https//support.torproject.org/apt/tor-deb-repo/
#: (content/apt/apt-1/contents+en.lrquestion.description)
-msgid "deb-src https://deb.torproject.org/torproject.org <DISTRIBUTION> main"
+msgid ""
+"deb-src [signed-by=/usr/share/keyrings/tor-archive-keyring.gpg] "
+"https://deb.torproject.org/torproject.org <DISTRIBUTION> main"
msgstr ""
#: https//support.torproject.org/apt/tor-deb-repo/
@@ -9823,14 +10820,16 @@ msgstr ""
#: https//support.torproject.org/apt/tor-deb-repo/
#: (content/apt/apt-1/contents+en.lrquestion.description)
msgid ""
-"deb https://deb.torproject.org/torproject.org tor-"
+"deb [signed-by=/usr/share/keyrings/tor-archive-keyring.gpg] "
+"https://deb.torproject.org/torproject.org tor-"
"experimental-0.4.6.x-<DISTRIBUTION> main"
msgstr ""
#: https//support.torproject.org/apt/tor-deb-repo/
#: (content/apt/apt-1/contents+en.lrquestion.description)
msgid ""
-"deb-src https://deb.torproject.org/torproject.org tor-"
+"deb-src [signed-by=/usr/share/keyrings/tor-archive-keyring.gpg] "
+"https://deb.torproject.org/torproject.org tor-"
"experimental-0.4.6.x-<DISTRIBUTION> main"
msgstr ""
@@ -9842,15 +10841,17 @@ msgstr ""
#: https//support.torproject.org/apt/tor-deb-repo/
#: (content/apt/apt-1/contents+en.lrquestion.description)
msgid ""
-"deb https://deb.torproject.org/torproject.org tor-nightly-"
-"master-<DISTRIBUTION> main"
+"deb [signed-by=/usr/share/keyrings/tor-archive-keyring.gpg] "
+"https://deb.torproject.org/torproject.org tor-nightly-master-<DISTRIBUTION> "
+"main"
msgstr ""
#: https//support.torproject.org/apt/tor-deb-repo/
#: (content/apt/apt-1/contents+en.lrquestion.description)
msgid ""
-"deb-src https://deb.torproject.org/torproject.org tor-nightly-"
-"master-<DISTRIBUTION> main"
+"deb-src [signed-by=/usr/share/keyrings/tor-archive-keyring.gpg] "
+"https://deb.torproject.org/torproject.org tor-nightly-master-<DISTRIBUTION> "
+"main"
msgstr ""
#: https//support.torproject.org/apt/tor-deb-repo/
@@ -9871,13 +10872,15 @@ msgstr ""
#: https//support.torproject.org/apt/tor-deb-repo/
#: (content/apt/apt-1/contents+en.lrquestion.description)
msgid ""
-"deb [arch=amd64] https://deb.torproject.org/torproject.org focal main"
+"deb [arch=amd64 signed-by=/usr/share/keyrings/tor-archive-keyring.gpg] "
+"https://deb.torproject.org/torproject.org focal main"
msgstr ""
#: https//support.torproject.org/apt/tor-deb-repo/
#: (content/apt/apt-1/contents+en.lrquestion.description)
msgid ""
-"deb-src [arch=amd64] https://deb.torproject.org/torproject.org focal main"
+"deb-src [arch=amd64 signed-by=/usr/share/keyrings/tor-archive-keyring.gpg] "
+"https://deb.torproject.org/torproject.org focal main"
msgstr ""
#: https//support.torproject.org/apt/tor-deb-repo/
@@ -9897,21 +10900,16 @@ msgstr ""
#: (content/apt/apt-1/contents+en.lrquestion.description)
msgid ""
"#### 3. Then add the gpg key used to sign the packages by running the "
-"following commands at your command prompt"
+"following command at your command prompt:"
msgstr ""
#: https//support.torproject.org/apt/tor-deb-repo/
#: (content/apt/apt-1/contents+en.lrquestion.description)
msgid ""
-"# wget -qO- "
+"# wget -O- "
"https://deb.torproject.org/torproject.org/A3C4F0F979CAA22CDBA8F512EE8CBC9E886DDD89.asc"
-" | gpg --import"
-msgstr ""
-
-#: https//support.torproject.org/apt/tor-deb-repo/
-#: (content/apt/apt-1/contents+en.lrquestion.description)
-msgid ""
-"# gpg --export A3C4F0F979CAA22CDBA8F512EE8CBC9E886DDD89 | apt-key add -"
+" | gpg --dearmor | tee /usr/share/keyrings/tor-archive-keyring.gpg "
+">/dev/null"
msgstr ""
#: https//support.torproject.org/apt/tor-deb-repo/
@@ -11518,6 +12516,82 @@ msgid ""
"doesn't change IP address over the day."
msgstr ""
+#: https//support.torproject.org/alternate-designs/block-websites/
+#: (content/alternate-designs/block-websites/contents+en.lrquestion.title)
+msgid "Exit policies should be able to block websites, not just IP addresses."
+msgstr ""
+
+#: https//support.torproject.org/alternate-designs/block-websites/
+#: (content/alternate-designs/block-websites/contents+en.lrquestion.description)
+msgid ""
+"It would be nice to let relay operators say things like `reject "
+"www.slashdot.org` in their exit policies, rather than requiring them to "
+"learn all the IP address space that could be covered by the site (and then "
+"also blocking other sites at those IP addresses)."
+msgstr ""
+
+#: https//support.torproject.org/alternate-designs/block-websites/
+#: (content/alternate-designs/block-websites/contents+en.lrquestion.description)
+msgid "There are two problems, though."
+msgstr ""
+
+#: https//support.torproject.org/alternate-designs/block-websites/
+#: (content/alternate-designs/block-websites/contents+en.lrquestion.description)
+msgid "First, users could still get around these blocks."
+msgstr ""
+
+#: https//support.torproject.org/alternate-designs/block-websites/
+#: (content/alternate-designs/block-websites/contents+en.lrquestion.description)
+msgid ""
+"For example, they could request the IP address rather than the hostname when"
+" they exit from the Tor network."
+msgstr ""
+
+#: https//support.torproject.org/alternate-designs/block-websites/
+#: (content/alternate-designs/block-websites/contents+en.lrquestion.description)
+msgid ""
+"This means operators would still need to learn all the IP addresses for the "
+"destinations in question."
+msgstr ""
+
+#: https//support.torproject.org/alternate-designs/block-websites/
+#: (content/alternate-designs/block-websites/contents+en.lrquestion.description)
+msgid ""
+"The second problem is that it would allow remote attackers to censor "
+"arbitrary sites."
+msgstr ""
+
+#: https//support.torproject.org/alternate-designs/block-websites/
+#: (content/alternate-designs/block-websites/contents+en.lrquestion.description)
+msgid ""
+"For example, if a Tor operator blocks www1.slashdot.org, and then some "
+"attacker poisons the Tor relay's DNS or otherwise changes that hostname to "
+"resolve to the IP address for a major news site, then suddenly that Tor "
+"relay is blocking the news site."
+msgstr ""
+
+#: https//support.torproject.org/alternate-designs/let-the-network-pick-the-path/
+#: (content/alternate-designs/let-the-network-pick-the-path/contents+en.lrquestion.title)
+msgid "You should let the network pick the path, not the client."
+msgstr ""
+
+#: https//support.torproject.org/alternate-designs/let-the-network-pick-the-path/
+#: (content/alternate-designs/let-the-network-pick-the-path/contents+en.lrquestion.description)
+msgid "No, you cannot trust the network to pick the path."
+msgstr ""
+
+#: https//support.torproject.org/alternate-designs/let-the-network-pick-the-path/
+#: (content/alternate-designs/let-the-network-pick-the-path/contents+en.lrquestion.description)
+msgid "Malicious relays could route you through their colluding friends."
+msgstr ""
+
+#: https//support.torproject.org/alternate-designs/let-the-network-pick-the-path/
+#: (content/alternate-designs/let-the-network-pick-the-path/contents+en.lrquestion.description)
+msgid ""
+"This would give an adversary the ability to watch all of your traffic end to"
+" end."
+msgstr ""
+
#: lego/templates/banner.html:3 lego/templates/banner.html:5
#: templates/banner.html:3 templates/banner.html:5
msgid "Close banner"
@@ -11548,8 +12622,8 @@ msgid "DONATE NOW"
msgstr "DONIRAJ SADA"
#: lego/templates/footer.html:13 lego/templates/footer.html:22
-#: lego/templates/navbar.html:83 templates/footer.html:13
-#: templates/footer.html:22 templates/navbar.html:83
+#: lego/templates/navbar.html:95 templates/footer.html:13
+#: templates/footer.html:22 templates/navbar.html:95
msgid "Download Tor Browser"
msgstr "Preuzmi Tor pregledaÄ"
diff --git a/contents+sv.po b/contents+sv.po
index eee14588bd..42a16e6e26 100644
--- a/contents+sv.po
+++ b/contents+sv.po
@@ -10,7 +10,7 @@ msgid ""
msgstr ""
"Project-Id-Version: PACKAGE VERSION\n"
"Report-Msgid-Bugs-To: \n"
-"POT-Creation-Date: 2021-08-25 11:14+CET\n"
+"POT-Creation-Date: 2021-09-01 12:20+CET\n"
"PO-Revision-Date: 2018-10-02 22:41+0000\n"
"Last-Translator: erinm, 2021\n"
"Language-Team: Swedish (https://www.transifex.com/otf/teams/1519/sv/)\n"
@@ -143,6 +143,11 @@ msgstr ""
msgid "Tor Metrics"
msgstr ""
+#: https//support.torproject.org/alternate-designs/
+#: (content/alternate-designs/contents+en.lrtopic.title)
+msgid "Alternate Designs We Don't Do (Yet)"
+msgstr ""
+
#: https//support.torproject.org/glossary/add-on-extension-or-plugin/
#: (content/glossary/add-on-extension-or-plugin/contents+en.lrword.term)
msgid "add-on, extension, or plugin"
@@ -2033,6 +2038,61 @@ msgid ""
"wiki](https://trac.torproject.org/projects/tor/wiki/doc/TorPlusVPN)."
msgstr ""
+#: https//support.torproject.org/faq/relay-donations/
+#: (content/faq/relay-donations/contents+en.lrquestion.title)
+msgid "Can I donate for a relay rather than run my own?"
+msgstr ""
+
+#: https//support.torproject.org/faq/relay-donations/
+#: (content/faq/relay-donations/contents+en.lrquestion.description)
+msgid ""
+"Sure! We have a [list of organizations that run Tor "
+"relays](https://community.torproject.org/relay/community-resources/relay-"
+"associations/) that are happy to turn your donations into better speed and "
+"anonymity for the Tor network."
+msgstr ""
+
+#: https//support.torproject.org/faq/relay-donations/
+#: (content/faq/relay-donations/contents+en.lrquestion.description)
+msgid ""
+"These organizations are not the same as [The Tor Project, "
+"Inc](https://donate.torproject.org/), but we consider that a good thing."
+msgstr ""
+
+#: https//support.torproject.org/faq/relay-donations/
+#: (content/faq/relay-donations/contents+en.lrquestion.description)
+msgid "They're run by nice people who are part of the Tor community."
+msgstr ""
+
+#: https//support.torproject.org/faq/relay-donations/
+#: (content/faq/relay-donations/contents+en.lrquestion.description)
+msgid ""
+"Note that there can be a tradeoff here between anonymity and performance."
+msgstr ""
+
+#: https//support.torproject.org/faq/relay-donations/
+#: (content/faq/relay-donations/contents+en.lrquestion.description)
+msgid ""
+"The Tor network's anonymity comes in part from diversity, so if you are in a"
+" position to run your own relay, you will be improving Tor's anonymity more "
+"than by donating."
+msgstr ""
+
+#: https//support.torproject.org/faq/relay-donations/
+#: (content/faq/relay-donations/contents+en.lrquestion.description)
+msgid ""
+"At the same time though, economies of scale for bandwidth mean that "
+"combining many small donations into several larger relays is more efficient "
+"at improving network performance."
+msgstr ""
+
+#: https//support.torproject.org/faq/relay-donations/
+#: (content/faq/relay-donations/contents+en.lrquestion.description)
+msgid ""
+"Improving anonymity and improving performance are both worthwhile goals, so "
+"however you can help is great!"
+msgstr ""
+
#: https//support.torproject.org/faq/staying-anonymous/
#: (content/faq/staying-anonymous/contents+en.lrquestion.title)
msgid "Am I totally anonymous if I use Tor?"
@@ -2333,6 +2393,61 @@ msgid ""
" documenting all the issues](https://community.torproject.org/)."
msgstr ""
+#: https//support.torproject.org/about/attacks-on-onion-routing/
+#: (content/about/attacks-on-onion-routing/contents+en.lrquestion.title)
+msgid "What attacks remain against onion routing?"
+msgstr ""
+
+#: https//support.torproject.org/about/attacks-on-onion-routing/
+#: (content/about/attacks-on-onion-routing/contents+en.lrquestion.description)
+msgid ""
+"As mentioned above, it is possible for an observer who can view both you and"
+" either the destination website or your Tor exit node to correlate timings "
+"of your traffic as it enters the Tor network and also as it exits."
+msgstr ""
+
+#: https//support.torproject.org/about/attacks-on-onion-routing/
+#: (content/about/attacks-on-onion-routing/contents+en.lrquestion.description)
+msgid "Tor does not defend against such a threat model."
+msgstr ""
+
+#: https//support.torproject.org/about/attacks-on-onion-routing/
+#: (content/about/attacks-on-onion-routing/contents+en.lrquestion.description)
+msgid ""
+"In a more limited sense, note that if a censor or law enforcement agency has"
+" the ability to obtain specific observation of parts of the network, it is "
+"possible for them to verify a suspicion that you talk regularly to your "
+"friend by observing traffic at both ends and correlating the timing of only "
+"that traffic."
+msgstr ""
+
+#: https//support.torproject.org/about/attacks-on-onion-routing/
+#: (content/about/attacks-on-onion-routing/contents+en.lrquestion.description)
+msgid ""
+"Again, this is only useful to verify that parties already suspected of "
+"communicating with one another are doing so."
+msgstr ""
+
+#: https//support.torproject.org/about/attacks-on-onion-routing/
+#: (content/about/attacks-on-onion-routing/contents+en.lrquestion.description)
+msgid ""
+"In most countries, the suspicion required to obtain a warrant already "
+"carries more weight than timing correlation would provide."
+msgstr ""
+
+#: https//support.torproject.org/about/attacks-on-onion-routing/
+#: (content/about/attacks-on-onion-routing/contents+en.lrquestion.description)
+msgid ""
+"Furthermore, since Tor reuses circuits for multiple TCP connections, it is "
+"possible to associate non anonymous and anonymous traffic at a given exit "
+"node, so be careful about what applications you run concurrently over Tor."
+msgstr ""
+
+#: https//support.torproject.org/about/attacks-on-onion-routing/
+#: (content/about/attacks-on-onion-routing/contents+en.lrquestion.description)
+msgid "Perhaps even run separate Tor clients for these applications."
+msgstr ""
+
#: https//support.torproject.org/about/backdoor/
#: (content/about/backdoor/contents+en.lrquestion.title)
msgid "Is there a backdoor in Tor?"
@@ -2468,6 +2583,43 @@ msgid ""
"recommended](/tbb/tbb-9/)."
msgstr ""
+#: https//support.torproject.org/about/change-paths/
+#: (content/about/change-paths/contents+en.lrquestion.title)
+msgid "How often does Tor change its paths?"
+msgstr ""
+
+#: https//support.torproject.org/about/change-paths/
+#: (content/about/change-paths/contents+en.lrquestion.description)
+msgid ""
+"Tor will reuse the same circuit for new TCP streams for 10 minutes, as long "
+"as the circuit is working fine."
+msgstr ""
+
+#: https//support.torproject.org/about/change-paths/
+#: (content/about/change-paths/contents+en.lrquestion.description)
+msgid "(If the circuit fails, Tor will switch to a new circuit immediately.)"
+msgstr ""
+
+#: https//support.torproject.org/about/change-paths/
+#: (content/about/change-paths/contents+en.lrquestion.description)
+msgid ""
+"But note that a single TCP stream (e.g. a long IRC connection) will stay on "
+"the same circuit forever."
+msgstr ""
+
+#: https//support.torproject.org/about/change-paths/
+#: (content/about/change-paths/contents+en.lrquestion.description)
+msgid "We don't rotate individual streams from one circuit to the next."
+msgstr ""
+
+#: https//support.torproject.org/about/change-paths/
+#: (content/about/change-paths/contents+en.lrquestion.description)
+msgid ""
+"Otherwise, an adversary with a partial view of the network would be given "
+"many chances over time to link you to your destination, rather than just one"
+" chance."
+msgstr ""
+
#: https//support.torproject.org/about/distribute-tor/
#: (content/about/distribute-tor/contents+en.lrquestion.title)
msgid "Can I distribute Tor?"
@@ -2563,6 +2715,133 @@ msgid ""
"details."
msgstr ""
+#: https//support.torproject.org/about/entry-guards/
+#: (content/about/entry-guards/contents+en.lrquestion.title)
+msgid "What are Entry Guards?"
+msgstr ""
+
+#: https//support.torproject.org/about/entry-guards/
+#: (content/about/entry-guards/contents+en.lrquestion.description)
+msgid ""
+"Tor (like all current practical low-latency anonymity designs) fails when "
+"the attacker can see both ends of the communications channel."
+msgstr ""
+
+#: https//support.torproject.org/about/entry-guards/
+#: (content/about/entry-guards/contents+en.lrquestion.description)
+msgid ""
+"For example, suppose the attacker controls or watches the Tor relay you "
+"choose to enter the network, and also controls or watches the website you "
+"visit."
+msgstr ""
+
+#: https//support.torproject.org/about/entry-guards/
+#: (content/about/entry-guards/contents+en.lrquestion.description)
+msgid ""
+"In this case, the research community knows no practical low-latency design "
+"that can reliably stop the attacker from correlating volume and timing "
+"information on the two sides."
+msgstr ""
+
+#: https//support.torproject.org/about/entry-guards/
+#: (content/about/entry-guards/contents+en.lrquestion.description)
+msgid "So, what should we do?"
+msgstr ""
+
+#: https//support.torproject.org/about/entry-guards/
+#: (content/about/entry-guards/contents+en.lrquestion.description)
+msgid "Suppose the attacker controls, or can observe, C relays."
+msgstr ""
+
+#: https//support.torproject.org/about/entry-guards/
+#: (content/about/entry-guards/contents+en.lrquestion.description)
+msgid "Suppose there are N relays total."
+msgstr ""
+
+#: https//support.torproject.org/about/entry-guards/
+#: (content/about/entry-guards/contents+en.lrquestion.description)
+msgid ""
+"If you select new entry and exit relays each time you use the network, the "
+"attacker will be able to correlate all traffic you send with probability "
+"around (c/n)2."
+msgstr ""
+
+#: https//support.torproject.org/about/entry-guards/
+#: (content/about/entry-guards/contents+en.lrquestion.description)
+msgid ""
+"But profiling is, for most users, as bad as being traced all the time: they "
+"want to do something often without an attacker noticing, and the attacker "
+"noticing once is as bad as the attacker noticing more often."
+msgstr ""
+
+#: https//support.torproject.org/about/entry-guards/
+#: (content/about/entry-guards/contents+en.lrquestion.description)
+msgid ""
+"Thus, choosing many random entries and exits gives the user no chance of "
+"escaping profiling by this kind of attacker."
+msgstr ""
+
+#: https//support.torproject.org/about/entry-guards/
+#: (content/about/entry-guards/contents+en.lrquestion.description)
+msgid ""
+"The solution is \"entry guards\": each Tor client selects a few relays at "
+"random to use as entry points, and uses only those relays for their first "
+"hop."
+msgstr ""
+
+#: https//support.torproject.org/about/entry-guards/
+#: (content/about/entry-guards/contents+en.lrquestion.description)
+msgid ""
+"If those relays are not controlled or observed, the attacker can't win, "
+"ever, and the user is secure."
+msgstr ""
+
+#: https//support.torproject.org/about/entry-guards/
+#: (content/about/entry-guards/contents+en.lrquestion.description)
+msgid ""
+"If those relays are observed or controlled by the attacker, the attacker "
+"sees a larger fraction of the user's traffic - but still the user is no more"
+" profiled than before."
+msgstr ""
+
+#: https//support.torproject.org/about/entry-guards/
+#: (content/about/entry-guards/contents+en.lrquestion.description)
+msgid ""
+"Thus, the user has some chance (on the order of (n-c)/n) of avoiding "
+"profiling, whereas they had none before."
+msgstr ""
+
+#: https//support.torproject.org/about/entry-guards/
+#: (content/about/entry-guards/contents+en.lrquestion.description)
+msgid ""
+"You can read more at [An Analysis of the Degradation of Anonymous "
+"Protocols](http://freehaven.net/anonbib/#wright02), [Defending Anonymous "
+"Communication Against Passive Logging "
+"Attacks](http://freehaven.net/anonbib/#wright03), and especially [Locating "
+"Hidden Servers](http://freehaven.net/anonbib/#hs-attack06)."
+msgstr ""
+
+#: https//support.torproject.org/about/entry-guards/
+#: (content/about/entry-guards/contents+en.lrquestion.description)
+msgid ""
+"Restricting your entry nodes may also help against attackers who want to run"
+" a few Tor nodes and easily enumerate all of the Tor user IP addresses."
+msgstr ""
+
+#: https//support.torproject.org/about/entry-guards/
+#: (content/about/entry-guards/contents+en.lrquestion.description)
+msgid ""
+"(Even though they can't learn what destinations the users are talking to, "
+"they still might be able to do bad things with just a list of users.)"
+msgstr ""
+
+#: https//support.torproject.org/about/entry-guards/
+#: (content/about/entry-guards/contents+en.lrquestion.description)
+msgid ""
+"However, that feature won't really become useful until we move to a "
+"\"directory guard\" design as well."
+msgstr ""
+
#: https//support.torproject.org/about/how-is-tor-different-from-other-proxies/
#: (content/about/how-is-tor-different-from-other-proxies/contents+en.lrquestion.title)
msgid "How is Tor different from other proxies?"
@@ -2733,6 +3012,162 @@ msgid ""
" Tor and HTTPS interact."
msgstr ""
+#: https//support.torproject.org/about/key-management/
+#: (content/about/key-management/contents+en.lrquestion.title)
+msgid "Tell me about all the keys Tor uses"
+msgstr ""
+
+#: https//support.torproject.org/about/key-management/
+#: (content/about/key-management/contents+en.lrquestion.description)
+msgid ""
+"Tor uses a variety of different keys, with three goals in mind: 1) "
+"encryption to ensure privacy of data within the Tor network, 2) "
+"authentication so clients know they're talking to the relays they meant to "
+"talk to, and 3) signatures to make sure all clients know the same set of "
+"relays."
+msgstr ""
+
+#: https//support.torproject.org/about/key-management/
+#: (content/about/key-management/contents+en.lrquestion.description)
+msgid ""
+"**Encryption**: first, all connections in Tor use TLS link encryption, so "
+"observers can't look inside to see which circuit a given cell is intended "
+"for."
+msgstr ""
+
+#: https//support.torproject.org/about/key-management/
+#: (content/about/key-management/contents+en.lrquestion.description)
+msgid ""
+"Further, the Tor client establishes an ephemeral encryption key with each "
+"relay in the circuit; these extra layers of encryption mean that only the "
+"exit relay can read the cells."
+msgstr ""
+
+#: https//support.torproject.org/about/key-management/
+#: (content/about/key-management/contents+en.lrquestion.description)
+msgid ""
+"Both sides discard the circuit key when the circuit ends, so logging traffic"
+" and then breaking into the relay to discover the key won't work."
+msgstr ""
+
+#: https//support.torproject.org/about/key-management/
+#: (content/about/key-management/contents+en.lrquestion.description)
+msgid ""
+"**Authentication**: Every Tor relay has a public decryption key called the "
+"\"onion key\"."
+msgstr ""
+
+#: https//support.torproject.org/about/key-management/
+#: (content/about/key-management/contents+en.lrquestion.description)
+msgid "Each relay rotates its onion key once a week."
+msgstr ""
+
+#: https//support.torproject.org/about/key-management/
+#: (content/about/key-management/contents+en.lrquestion.description)
+msgid ""
+"When the Tor client establishes circuits, at each step it [demands that the "
+"Tor relay prove knowledge of its onion key](https://svn-"
+"archive.torproject.org/svn/projects/design-paper/tor-"
+"design.html#subsec:circuits)."
+msgstr ""
+
+#: https//support.torproject.org/about/key-management/
+#: (content/about/key-management/contents+en.lrquestion.description)
+msgid ""
+"That way the first node in the path can't just spoof the rest of the path."
+msgstr ""
+
+#: https//support.torproject.org/about/key-management/
+#: (content/about/key-management/contents+en.lrquestion.description)
+msgid ""
+"Because the Tor client chooses the path, it can make sure to get Tor's "
+"\"distributed trust\" property: no single relay in the path can know about "
+"both the client and what the client is doing."
+msgstr ""
+
+#: https//support.torproject.org/about/key-management/
+#: (content/about/key-management/contents+en.lrquestion.description)
+msgid ""
+"**Coordination**: How do clients know what the relays are, and how do they "
+"know that they have the right keys for them?"
+msgstr ""
+
+#: https//support.torproject.org/about/key-management/
+#: (content/about/key-management/contents+en.lrquestion.description)
+msgid "Each relay has a long-term public signing key called the \"identity key\"."
+msgstr ""
+
+#: https//support.torproject.org/about/key-management/
+#: (content/about/key-management/contents+en.lrquestion.description)
+msgid "Each directory authority additionally has a \"directory signing key\"."
+msgstr ""
+
+#: https//support.torproject.org/about/key-management/
+#: (content/about/key-management/contents+en.lrquestion.description)
+msgid ""
+"The directory authorities [provide a signed "
+"list](https://gitweb.torproject.org/torspec.git/tree/dir-spec.txt) of all "
+"the known relays, and in that list are a set of certificates from each relay"
+" (self-signed by their identity key) specifying their keys, locations, exit "
+"policies, and so on."
+msgstr ""
+
+#: https//support.torproject.org/about/key-management/
+#: (content/about/key-management/contents+en.lrquestion.description)
+msgid ""
+"So unless the adversary can control a majority of the directory authorities "
+"(as of 2021 there are 10 directory authorities), they can't trick the Tor "
+"client into using other Tor relays."
+msgstr ""
+
+#: https//support.torproject.org/about/key-management/
+#: (content/about/key-management/contents+en.lrquestion.description)
+msgid "How do clients know what the directory authorities are?"
+msgstr ""
+
+#: https//support.torproject.org/about/key-management/
+#: (content/about/key-management/contents+en.lrquestion.description)
+msgid ""
+"The Tor software comes with a built-in list of location and public key for "
+"each directory authority."
+msgstr ""
+
+#: https//support.torproject.org/about/key-management/
+#: (content/about/key-management/contents+en.lrquestion.description)
+msgid ""
+"So the only way to trick users into using a fake Tor network is to give them"
+" a specially modified version of the software."
+msgstr ""
+
+#: https//support.torproject.org/about/key-management/
+#: (content/about/key-management/contents+en.lrquestion.description)
+msgid "How do users know they've got the right software?"
+msgstr ""
+
+#: https//support.torproject.org/about/key-management/
+#: (content/about/key-management/contents+en.lrquestion.description)
+msgid ""
+"When we distribute the source code or a package, we digitally sign it with "
+"[GNU Privacy Guard](http://www.gnupg.org/). See the [instructions on how to "
+"check Tor Browser's signature](https://support.torproject.org/tbb/how-to-"
+"verify-signature/)."
+msgstr ""
+
+#: https//support.torproject.org/about/key-management/
+#: (content/about/key-management/contents+en.lrquestion.description)
+msgid ""
+"In order to be certain that it's really signed by us, you need to have met "
+"us in person and gotten a copy of our GPG key fingerprint, or you need to "
+"know somebody who has."
+msgstr ""
+
+#: https//support.torproject.org/about/key-management/
+#: (content/about/key-management/contents+en.lrquestion.description)
+msgid ""
+"If you're concerned about an attack on this level, we recommend you get "
+"involved with the security community and start meeting people."
+msgstr ""
+
#: https//support.torproject.org/about/no-data-scrubbing/
#: (content/about/no-data-scrubbing/contents+en.lrquestion.title)
msgid ""
@@ -2765,6 +3200,151 @@ msgid ""
"though."
msgstr ""
+#: https//support.torproject.org/about/protections/
+#: (content/about/protections/contents+en.lrquestion.title)
+msgid "What protections does Tor provide?"
+msgstr ""
+
+#: https//support.torproject.org/about/protections/
+#: (content/about/protections/contents+en.lrquestion.description)
+msgid ""
+"Internet communication is based on a store-and-forward model that can be "
+"understood in analogy to postal mail: Data is transmitted in blocks called "
+"IP datagrams or packets."
+msgstr ""
+
+#: https//support.torproject.org/about/protections/
+#: (content/about/protections/contents+en.lrquestion.description)
+msgid ""
+"Every packet includes a source IP address (of the sender) and a destination "
+"IP address (of the receiver), just as ordinary letters contain postal "
+"addresses of sender and receiver."
+msgstr ""
+
+#: https//support.torproject.org/about/protections/
+#: (content/about/protections/contents+en.lrquestion.description)
+msgid ""
+"The way from sender to receiver involves multiple hops of routers, where "
+"each router inspects the destination IP address and forwards the packet "
+"closer to its destination."
+msgstr ""
+
+#: https//support.torproject.org/about/protections/
+#: (content/about/protections/contents+en.lrquestion.description)
+msgid ""
+"Thus, every router between sender and receiver learns that the sender is "
+"communicating with the receiver."
+msgstr ""
+
+#: https//support.torproject.org/about/protections/
+#: (content/about/protections/contents+en.lrquestion.description)
+msgid ""
+"In particular, your local ISP is in the position to build a complete profile"
+" of your Internet usage."
+msgstr ""
+
+#: https//support.torproject.org/about/protections/
+#: (content/about/protections/contents+en.lrquestion.description)
+msgid ""
+"In addition, every server in the Internet that can see any of the packets "
+"can profile your behavior."
+msgstr ""
+
+#: https//support.torproject.org/about/protections/
+#: (content/about/protections/contents+en.lrquestion.description)
+msgid ""
+"The aim of Tor is to improve your privacy by sending your traffic through a "
+"series of proxies."
+msgstr ""
+
+#: https//support.torproject.org/about/protections/
+#: (content/about/protections/contents+en.lrquestion.description)
+msgid ""
+"Your communication is encrypted in multiple layers and routed via multiple "
+"hops through the Tor network to the final receiver."
+msgstr ""
+
+#: https//support.torproject.org/about/protections/
+#: (content/about/protections/contents+en.lrquestion.description)
+msgid ""
+"More details on this process can be found in this "
+"[visualization](https://support.torproject.org/https/https-1/)."
+msgstr ""
+
+#: https//support.torproject.org/about/protections/
+#: (content/about/protections/contents+en.lrquestion.description)
+msgid ""
+"Note that all your local ISP can observe now is that you are communicating "
+"with Tor nodes."
+msgstr ""
+
+#: https//support.torproject.org/about/protections/
+#: (content/about/protections/contents+en.lrquestion.description)
+msgid ""
+"Similarly, servers in the Internet just see that they are being contacted by"
+" Tor nodes."
+msgstr ""
+
+#: https//support.torproject.org/about/protections/
+#: (content/about/protections/contents+en.lrquestion.description)
+msgid "Generally speaking, Tor aims to solve three privacy problems:"
+msgstr ""
+
+#: https//support.torproject.org/about/protections/
+#: (content/about/protections/contents+en.lrquestion.description)
+msgid ""
+"First, Tor prevents websites and other services from learning your location,"
+" which they can use to build databases about your habits and interests."
+msgstr ""
+
+#: https//support.torproject.org/about/protections/
+#: (content/about/protections/contents+en.lrquestion.description)
+msgid ""
+"With Tor, your Internet connections don't give you away by default -- now "
+"you can have the ability to choose, for each connection, how much "
+"information to reveal."
+msgstr ""
+
+#: https//support.torproject.org/about/protections/
+#: (content/about/protections/contents+en.lrquestion.description)
+msgid ""
+"Second, Tor prevents people watching your traffic locally (such as your ISP "
+"or someone with access to your home wifi or router) from learning what "
+"information you're fetching and where you're fetching it from."
+msgstr ""
+
+#: https//support.torproject.org/about/protections/
+#: (content/about/protections/contents+en.lrquestion.description)
+msgid ""
+"It also stops them from deciding what you're allowed to learn and publish --"
+" if you can get to any part of the Tor network, you can reach any site on "
+"the Internet."
+msgstr ""
+
+#: https//support.torproject.org/about/protections/
+#: (content/about/protections/contents+en.lrquestion.description)
+msgid ""
+"Third, Tor routes your connection through more than one Tor relay so no "
+"single relay can learn what you're up to."
+msgstr ""
+
+#: https//support.torproject.org/about/protections/
+#: (content/about/protections/contents+en.lrquestion.description)
+msgid ""
+"Because these relays are run by different individuals or organizations, "
+"distributing trust provides more security than the old [one hop "
+"proxy](https://support.torproject.org/about/#how-is-tor-different-from-"
+"other-proxies) approach."
+msgstr ""
+
+#: https//support.torproject.org/about/protections/
+#: (content/about/protections/contents+en.lrquestion.description)
+msgid ""
+"Note, however, that there are situations where Tor fails to solve these "
+"privacy problems entirely: see the entry below on [remaining "
+"attacks](https://support.torproject.org/about/#attacks-on-onion-routing)."
+msgstr ""
+
#: https//support.torproject.org/about/what-is-tor/
#: (content/about/what-is-tor/contents+en.lrquestion.title)
msgid "What is Tor?"
@@ -4972,9 +5552,11 @@ msgstr ""
#: (content/tbb/tbb-47/contents+en.lrquestion.description)
msgid ""
"Also, read up on the HTTPProxyAuthenticator and HTTPSProxyAuthenticator "
-"options if your proxy requires auth. We only support basic auth currently, "
-"but if you need NTLM authentication, you may find [this post in the "
-"archives](https://archives.seul.org/or/talk/Jun-2005/msg00223.html) useful."
+"options if your [proxy requires auth.](https://developer.mozilla.org/en-"
+"US/docs/Web/HTTP/Headers/Proxy-Authenticate) We only support basic auth "
+"currently, but if you need NTLM authentication, you may find [this post in "
+"the archives](https://archives.seul.org/or/talk/Jun-2005/msg00223.html) "
+"useful."
msgstr ""
#: https//support.torproject.org/tbb/tbb-47/
@@ -5194,6 +5776,219 @@ msgid ""
"have no effect on Tor's configuration."
msgstr ""
+#: https//support.torproject.org/tbb/tbb-firewall-ports/
+#: (content/tbb/tbb-firewall-ports/contents+en.lrquestion.title)
+msgid "My firewall only allows a few outgoing ports"
+msgstr ""
+
+#: https//support.torproject.org/tbb/tbb-firewall-ports/
+#: (content/tbb/tbb-firewall-ports/contents+en.lrquestion.description)
+msgid ""
+"If your firewall works by blocking ports, then you can tell Tor to only use "
+"the ports when you start your Tor Browser."
+msgstr ""
+
+#: https//support.torproject.org/tbb/tbb-firewall-ports/
+#: (content/tbb/tbb-firewall-ports/contents+en.lrquestion.description)
+msgid ""
+"Or you can add the ports that your firewall permits by adding "
+"\"FascistFirewall 1\" to your torrc configuration file."
+msgstr ""
+
+#: https//support.torproject.org/tbb/tbb-firewall-ports/
+#: (content/tbb/tbb-firewall-ports/contents+en.lrquestion.description)
+msgid ""
+"By default, when you set this Tor assumes that your firewall allows only "
+"port 80 and port 443 (HTTP and HTTPS respectively)."
+msgstr ""
+
+#: https//support.torproject.org/tbb/tbb-firewall-ports/
+#: (content/tbb/tbb-firewall-ports/contents+en.lrquestion.description)
+msgid ""
+"You can select a different set of ports with the FirewallPorts torrc option."
+msgstr ""
+
+#: https//support.torproject.org/tbb/tbb-firewall-ports/
+#: (content/tbb/tbb-firewall-ports/contents+en.lrquestion.description)
+msgid ""
+"If you want to be more fine-grained with your controls, you can also use the"
+" ReachableAddresses config options, e.g.:"
+msgstr ""
+
+#: https//support.torproject.org/tbb/tbb-firewall-ports/
+#: (content/tbb/tbb-firewall-ports/contents+en.lrquestion.description)
+#: https//support.torproject.org/tbb/tbb-install-tor-central-server/
+#: (content/tbb/tbb-install-tor-central-server/contents+en.lrquestion.description)
+#: https//support.torproject.org/operators/default-exit-ports/
+#: (content/operators/default-exit-ports/contents+en.lrquestion.description)
+#: https//support.torproject.org/operators/hibernation/
+#: (content/operators/hibernation/contents+en.lrquestion.description)
+#: https//support.torproject.org/operators/limit-total-bandwidth/
+#: (content/operators/limit-total-bandwidth/contents+en.lrquestion.description)
+#: https//support.torproject.org/misc/bug-or-feedback/
+#: (content/misc/bug-or-feedback/contents+en.lrquestion.description)
+#: https//support.torproject.org/get-in-touch/why-i-cant-join-tor-channels/
+#: (content/get-in-touch/why-i-cant-join-tor-channels/contents+en.lrquestion.description)
+#: https//support.torproject.org/apt/tor-deb-repo/
+#: (content/apt/apt-1/contents+en.lrquestion.description)
+#: https//support.torproject.org/apt/apt-over-tor/
+#: (content/apt/apt-3/contents+en.lrquestion.description)
+msgid "```"
+msgstr ""
+
+#: https//support.torproject.org/tbb/tbb-firewall-ports/
+#: (content/tbb/tbb-firewall-ports/contents+en.lrquestion.description)
+msgid "ReachableDirAddresses *:80"
+msgstr ""
+
+#: https//support.torproject.org/tbb/tbb-firewall-ports/
+#: (content/tbb/tbb-firewall-ports/contents+en.lrquestion.description)
+msgid "ReachableORAddresses *:443"
+msgstr ""
+
+#: https//support.torproject.org/tbb/tbb-install-tor-central-server/
+#: (content/tbb/tbb-install-tor-central-server/contents+en.lrquestion.title)
+msgid ""
+"Can I install Tor on a central server, and have my clients connect to it?"
+msgstr ""
+
+#: https//support.torproject.org/tbb/tbb-install-tor-central-server/
+#: (content/tbb/tbb-install-tor-central-server/contents+en.lrquestion.description)
+msgid ""
+"Yes. Tor can be configured as a client or a relay on another machine, and "
+"allow other machines to be able to connect to it for anonymity."
+msgstr ""
+
+#: https//support.torproject.org/tbb/tbb-install-tor-central-server/
+#: (content/tbb/tbb-install-tor-central-server/contents+en.lrquestion.description)
+msgid ""
+"This is most useful in an environment where many computers want a gateway of"
+" anonymity to the rest of the world."
+msgstr ""
+
+#: https//support.torproject.org/tbb/tbb-install-tor-central-server/
+#: (content/tbb/tbb-install-tor-central-server/contents+en.lrquestion.description)
+msgid ""
+"However, be forewarned that with this configuration, anyone within your "
+"private network (existing between you and the Tor client/relay) can see what"
+" traffic you are sending in clear text."
+msgstr ""
+
+#: https//support.torproject.org/tbb/tbb-install-tor-central-server/
+#: (content/tbb/tbb-install-tor-central-server/contents+en.lrquestion.description)
+msgid "The anonymity doesn't start until you get to the Tor relay."
+msgstr ""
+
+#: https//support.torproject.org/tbb/tbb-install-tor-central-server/
+#: (content/tbb/tbb-install-tor-central-server/contents+en.lrquestion.description)
+msgid ""
+"Because of this, if you are the controller of your domain and you know "
+"everything's locked down, you will be OK, but this configuration may not be "
+"suitable for large private networks where security is key all around."
+msgstr ""
+
+#: https//support.torproject.org/tbb/tbb-install-tor-central-server/
+#: (content/tbb/tbb-install-tor-central-server/contents+en.lrquestion.description)
+msgid ""
+"Configuration is simple, editing your torrc file's SocksListenAddress "
+"according to the following examples:"
+msgstr ""
+
+#: https//support.torproject.org/tbb/tbb-install-tor-central-server/
+#: (content/tbb/tbb-install-tor-central-server/contents+en.lrquestion.description)
+msgid "SocksListenAddress 127.0.0.1"
+msgstr ""
+
+#: https//support.torproject.org/tbb/tbb-install-tor-central-server/
+#: (content/tbb/tbb-install-tor-central-server/contents+en.lrquestion.description)
+msgid "SocksListenAddress 192.168.x.x:9100"
+msgstr ""
+
+#: https//support.torproject.org/tbb/tbb-install-tor-central-server/
+#: (content/tbb/tbb-install-tor-central-server/contents+en.lrquestion.description)
+msgid "SocksListenAddress 0.0.0.0:9100"
+msgstr ""
+
+#: https//support.torproject.org/tbb/tbb-install-tor-central-server/
+#: (content/tbb/tbb-install-tor-central-server/contents+en.lrquestion.description)
+msgid ""
+"You can state multiple listen addresses, in the case that you are part of "
+"several networks or subnets."
+msgstr ""
+
+#: https//support.torproject.org/tbb/tbb-install-tor-central-server/
+#: (content/tbb/tbb-install-tor-central-server/contents+en.lrquestion.description)
+msgid "SocksListenAddress 192.168.x.x:9100 #eth0"
+msgstr ""
+
+#: https//support.torproject.org/tbb/tbb-install-tor-central-server/
+#: (content/tbb/tbb-install-tor-central-server/contents+en.lrquestion.description)
+msgid "SocksListenAddress 10.x.x.x:9100 #eth1"
+msgstr ""
+
+#: https//support.torproject.org/tbb/tbb-install-tor-central-server/
+#: (content/tbb/tbb-install-tor-central-server/contents+en.lrquestion.description)
+msgid ""
+"After this, your clients on their respective networks/subnets would specify "
+"a socks proxy with the address and port you specified SocksListenAddress to "
+"be."
+msgstr ""
+
+#: https//support.torproject.org/tbb/tbb-install-tor-central-server/
+#: (content/tbb/tbb-install-tor-central-server/contents+en.lrquestion.description)
+msgid ""
+"Please note that the SocksPort configuration option gives the port ONLY for "
+"localhost (127.0.0.1)."
+msgstr ""
+
+#: https//support.torproject.org/tbb/tbb-install-tor-central-server/
+#: (content/tbb/tbb-install-tor-central-server/contents+en.lrquestion.description)
+msgid ""
+"When setting up your SocksListenAddress(es), you need to give the port with "
+"the address, as shown above."
+msgstr ""
+
+#: https//support.torproject.org/tbb/tbb-install-tor-central-server/
+#: (content/tbb/tbb-install-tor-central-server/contents+en.lrquestion.description)
+msgid ""
+"If you are interested in forcing all outgoing data through the central Tor "
+"client/relay, instead of the server only being an optional proxy, you may "
+"find the program iptables (for *nix) useful."
+msgstr ""
+
+#: https//support.torproject.org/tbb/tbb-run-client-different-computer/
+#: (content/tbb/tbb-run-client-different-computer/contents+en.lrquestion.title)
+msgid ""
+"I want to run my Tor client on a different computer than my applications"
+msgstr ""
+
+#: https//support.torproject.org/tbb/tbb-run-client-different-computer/
+#: (content/tbb/tbb-run-client-different-computer/contents+en.lrquestion.description)
+msgid ""
+"By default, your Tor client only listens for applications that connect from "
+"localhost."
+msgstr ""
+
+#: https//support.torproject.org/tbb/tbb-run-client-different-computer/
+#: (content/tbb/tbb-run-client-different-computer/contents+en.lrquestion.description)
+msgid "Connections from other computers are refused."
+msgstr ""
+
+#: https//support.torproject.org/tbb/tbb-run-client-different-computer/
+#: (content/tbb/tbb-run-client-different-computer/contents+en.lrquestion.description)
+msgid ""
+"If you want to torify applications on different computers than the Tor "
+"client, you should edit your torrc to define `SocksListenAddress 0.0.0.0` "
+"and then restart (or hup) Tor."
+msgstr ""
+
+#: https//support.torproject.org/tbb/tbb-run-client-different-computer/
+#: (content/tbb/tbb-run-client-different-computer/contents+en.lrquestion.description)
+msgid ""
+"If you want to get more advanced, you can configure your Tor client on a "
+"firewall to bind to your internal IP but not your external IP."
+msgstr ""
+
#: https//support.torproject.org/tbb/website-blocking-tor/
#: (content/tbb/website-blocking-tor/contents+en.lrquestion.title)
msgid "A website I am trying to reach is blocking access over Tor."
@@ -6653,6 +7448,130 @@ msgid ""
"guide."
msgstr ""
+#: https//support.torproject.org/operators/default-exit-ports/
+#: (content/operators/default-exit-ports/contents+en.lrquestion.title)
+msgid "Is there a list of default exit ports?"
+msgstr ""
+
+#: https//support.torproject.org/operators/default-exit-ports/
+#: (content/operators/default-exit-ports/contents+en.lrquestion.description)
+msgid ""
+"The default open ports are listed below but keep in mind that, any port or "
+"ports can be opened by the relay operator by configuring it in torrc or "
+"modifying the source code."
+msgstr ""
+
+#: https//support.torproject.org/operators/default-exit-ports/
+#: (content/operators/default-exit-ports/contents+en.lrquestion.description)
+msgid ""
+"The default according to src/or/policies.c ([line 85][1] and [line 1901][2])"
+" from the source code release [release-0.4.6][3]:"
+msgstr ""
+
+#: https//support.torproject.org/operators/default-exit-ports/
+#: (content/operators/default-exit-ports/contents+en.lrquestion.description)
+msgid "reject 0.0.0.0/8"
+msgstr ""
+
+#: https//support.torproject.org/operators/default-exit-ports/
+#: (content/operators/default-exit-ports/contents+en.lrquestion.description)
+msgid "reject 169.254.0.0/16"
+msgstr ""
+
+#: https//support.torproject.org/operators/default-exit-ports/
+#: (content/operators/default-exit-ports/contents+en.lrquestion.description)
+msgid "reject 127.0.0.0/8"
+msgstr ""
+
+#: https//support.torproject.org/operators/default-exit-ports/
+#: (content/operators/default-exit-ports/contents+en.lrquestion.description)
+msgid "reject 192.168.0.0/16"
+msgstr ""
+
+#: https//support.torproject.org/operators/default-exit-ports/
+#: (content/operators/default-exit-ports/contents+en.lrquestion.description)
+msgid "reject 10.0.0.0/8"
+msgstr ""
+
+#: https//support.torproject.org/operators/default-exit-ports/
+#: (content/operators/default-exit-ports/contents+en.lrquestion.description)
+msgid "reject 172.16.0.0/12"
+msgstr ""
+
+#: https//support.torproject.org/operators/default-exit-ports/
+#: (content/operators/default-exit-ports/contents+en.lrquestion.description)
+msgid "reject *:25"
+msgstr ""
+
+#: https//support.torproject.org/operators/default-exit-ports/
+#: (content/operators/default-exit-ports/contents+en.lrquestion.description)
+msgid "reject *:119"
+msgstr ""
+
+#: https//support.torproject.org/operators/default-exit-ports/
+#: (content/operators/default-exit-ports/contents+en.lrquestion.description)
+msgid "reject *:135-139"
+msgstr ""
+
+#: https//support.torproject.org/operators/default-exit-ports/
+#: (content/operators/default-exit-ports/contents+en.lrquestion.description)
+msgid "reject *:445"
+msgstr ""
+
+#: https//support.torproject.org/operators/default-exit-ports/
+#: (content/operators/default-exit-ports/contents+en.lrquestion.description)
+msgid "reject *:563"
+msgstr ""
+
+#: https//support.torproject.org/operators/default-exit-ports/
+#: (content/operators/default-exit-ports/contents+en.lrquestion.description)
+msgid "reject *:1214"
+msgstr ""
+
+#: https//support.torproject.org/operators/default-exit-ports/
+#: (content/operators/default-exit-ports/contents+en.lrquestion.description)
+msgid "reject *:4661-4666"
+msgstr ""
+
+#: https//support.torproject.org/operators/default-exit-ports/
+#: (content/operators/default-exit-ports/contents+en.lrquestion.description)
+msgid "reject *:6346-6429"
+msgstr ""
+
+#: https//support.torproject.org/operators/default-exit-ports/
+#: (content/operators/default-exit-ports/contents+en.lrquestion.description)
+msgid "reject *:6699"
+msgstr ""
+
+#: https//support.torproject.org/operators/default-exit-ports/
+#: (content/operators/default-exit-ports/contents+en.lrquestion.description)
+msgid "reject *:6881-6999"
+msgstr ""
+
+#: https//support.torproject.org/operators/default-exit-ports/
+#: (content/operators/default-exit-ports/contents+en.lrquestion.description)
+msgid "accept *:*"
+msgstr ""
+
+#: https//support.torproject.org/operators/default-exit-ports/
+#: (content/operators/default-exit-ports/contents+en.lrquestion.description)
+msgid ""
+"[1]: "
+"https://gitlab.torproject.org/tpo/core/tor/-/blob/release-0.4.6/src/core/or/policies.c#L85"
+msgstr ""
+
+#: https//support.torproject.org/operators/default-exit-ports/
+#: (content/operators/default-exit-ports/contents+en.lrquestion.description)
+msgid ""
+"[2]: "
+"https://gitlab.torproject.org/tpo/core/tor/-/blob/release-0.4.6/src/core/or/policies.c#L1901"
+msgstr ""
+
+#: https//support.torproject.org/operators/default-exit-ports/
+#: (content/operators/default-exit-ports/contents+en.lrquestion.description)
+msgid "[3]: https://gitlab.torproject.org/tpo/core/tor/-/tree/release-0.4.6/"
+msgstr ""
+
#: https//support.torproject.org/operators/dynamic-ip/
#: (content/operators/dynamic-ip/contents+en.lrquestion.title)
msgid "Can I run a Tor relay using a dynamic IP address?"
@@ -6800,21 +7719,6 @@ msgid ""
"into hibernation, signaled by this entry in the log:"
msgstr ""
-#: https//support.torproject.org/operators/hibernation/
-#: (content/operators/hibernation/contents+en.lrquestion.description)
-#: https//support.torproject.org/operators/limit-total-bandwidth/
-#: (content/operators/limit-total-bandwidth/contents+en.lrquestion.description)
-#: https//support.torproject.org/misc/bug-or-feedback/
-#: (content/misc/bug-or-feedback/contents+en.lrquestion.description)
-#: https//support.torproject.org/get-in-touch/why-i-cant-join-tor-channels/
-#: (content/get-in-touch/why-i-cant-join-tor-channels/contents+en.lrquestion.description)
-#: https//support.torproject.org/apt/tor-deb-repo/
-#: (content/apt/apt-1/contents+en.lrquestion.description)
-#: https//support.torproject.org/apt/apt-over-tor/
-#: (content/apt/apt-3/contents+en.lrquestion.description)
-msgid "```"
-msgstr ""
-
#: https//support.torproject.org/operators/hibernation/
#: (content/operators/hibernation/contents+en.lrquestion.description)
msgid "Bandwidth soft limit reached; commencing hibernation."
@@ -9057,6 +9961,131 @@ msgstr ""
msgid "sub 4096R/C00942E4 2017-03-13"
msgstr ""
+#: https//support.torproject.org/misc/check-socks-dns-leaks/
+#: (content/misc/check-socks-dns-leaks/contents+en.lrquestion.title)
+msgid ""
+"How do I check if my application that uses SOCKS is leaking DNS requests?"
+msgstr ""
+
+#: https//support.torproject.org/misc/check-socks-dns-leaks/
+#: (content/misc/check-socks-dns-leaks/contents+en.lrquestion.description)
+msgid ""
+"Even if your application is using the correct variant of the SOCKS protocol,"
+" there is still a risk that it could be leaking DNS queries."
+msgstr ""
+
+#: https//support.torproject.org/misc/check-socks-dns-leaks/
+#: (content/misc/check-socks-dns-leaks/contents+en.lrquestion.description)
+msgid ""
+"This problem happens in Firefox extensions that resolve the destination "
+"hostname themselves, for example to show you its IP address, what country "
+"it's in, etc."
+msgstr ""
+
+#: https//support.torproject.org/misc/check-socks-dns-leaks/
+#: (content/misc/check-socks-dns-leaks/contents+en.lrquestion.description)
+msgid ""
+"If you suspect your application might behave like this, follow the "
+"instructions below to check."
+msgstr ""
+
+#: https//support.torproject.org/misc/check-socks-dns-leaks/
+#: (content/misc/check-socks-dns-leaks/contents+en.lrquestion.description)
+msgid ""
+"1. Add `TestSocks 1` to your [torrc file](https://support.torproject.org/tbb"
+"/tbb-editing-torrc/)."
+msgstr ""
+
+#: https//support.torproject.org/misc/check-socks-dns-leaks/
+#: (content/misc/check-socks-dns-leaks/contents+en.lrquestion.description)
+msgid ""
+"1. Start Tor, and point your program's SOCKS proxy settings to Tor's SOCKS5 "
+"server (`socks5://127.0.0.1:9050` by default)."
+msgstr ""
+
+#: https//support.torproject.org/misc/check-socks-dns-leaks/
+#: (content/misc/check-socks-dns-leaks/contents+en.lrquestion.description)
+msgid ""
+"1. Watch your logs as you use your application. For each socks connection, "
+"Tor will log a `notice` for safe connections, and a `warn` for connections "
+"leaking DNS requests."
+msgstr ""
+
+#: https//support.torproject.org/misc/check-socks-dns-leaks/
+#: (content/misc/check-socks-dns-leaks/contents+en.lrquestion.description)
+msgid ""
+"If you want to automatically disable all connections leaking DNS requests, "
+"set `SafeSocks 1` in your torrc file."
+msgstr ""
+
+#: https//support.torproject.org/misc/hide-exits/
+#: (content/misc/hide-exits/contents+en.lrquestion.title)
+msgid ""
+"You should hide the list of Tor relays, so people can't block the exits."
+msgstr ""
+
+#: https//support.torproject.org/misc/hide-exits/
+#: (content/misc/hide-exits/contents+en.lrquestion.description)
+msgid "There are a few reasons we don't:"
+msgstr ""
+
+#: https//support.torproject.org/misc/hide-exits/
+#: (content/misc/hide-exits/contents+en.lrquestion.description)
+msgid ""
+"1. We can't help but make the information available, since Tor clients need "
+"to use it to pick their paths."
+msgstr ""
+
+#: https//support.torproject.org/misc/hide-exits/
+#: (content/misc/hide-exits/contents+en.lrquestion.description)
+msgid "So if the \"blockers\" want it, they can get it anyway."
+msgstr ""
+
+#: https//support.torproject.org/misc/hide-exits/
+#: (content/misc/hide-exits/contents+en.lrquestion.description)
+msgid ""
+"Further, even if we didn't tell clients about the list of relays directly, "
+"somebody could still make a lot of connections through Tor to a test site "
+"and build a list of the addresses they see."
+msgstr ""
+
+#: https//support.torproject.org/misc/hide-exits/
+#: (content/misc/hide-exits/contents+en.lrquestion.description)
+msgid ""
+"1. If people want to block us, we believe that they should be allowed to do "
+"so."
+msgstr ""
+
+#: https//support.torproject.org/misc/hide-exits/
+#: (content/misc/hide-exits/contents+en.lrquestion.description)
+msgid ""
+"Obviously, we would prefer for everybody to allow Tor users to connect to "
+"them, but people have the right to decide who their services should allow "
+"connections from, and if they want to block anonymous users, they can."
+msgstr ""
+
+#: https//support.torproject.org/misc/hide-exits/
+#: (content/misc/hide-exits/contents+en.lrquestion.description)
+msgid ""
+"1. Being blockable also has tactical advantages: it may be a persuasive "
+"response to website maintainers who feel threatened by Tor."
+msgstr ""
+
+#: https//support.torproject.org/misc/hide-exits/
+#: (content/misc/hide-exits/contents+en.lrquestion.description)
+msgid ""
+"Giving them the option may inspire them to stop and think about whether they"
+" really want to eliminate private access to their system, and if not, what "
+"other options they might have."
+msgstr ""
+
+#: https//support.torproject.org/misc/hide-exits/
+#: (content/misc/hide-exits/contents+en.lrquestion.description)
+msgid ""
+"The time they might otherwise have spent blocking Tor, they may instead "
+"spend rethinking their overall approach to privacy and anonymity."
+msgstr ""
+
#: https//support.torproject.org/misc/menu/
#: (content/misc/menu/contents+en.lrquestion.description)
msgid "About"
@@ -9658,56 +10687,20 @@ msgstr ""
#: https//support.torproject.org/get-in-touch/why-i-cant-join-tor-channels/
#: (content/get-in-touch/why-i-cant-join-tor-channels/contents+en.lrquestion.description)
msgid ""
-"Then, to complete the registration and ultimately gain access to the #tor-"
-"project channel, your nickname must be **verified**."
-msgstr ""
-
-#: https//support.torproject.org/get-in-touch/why-i-cant-join-tor-channels/
-#: (content/get-in-touch/why-i-cant-join-tor-channels/contents+en.lrquestion.description)
-msgid ""
-"1. To verify your nick, open a new browser window and go to "
-"https://webchat.oftc.net/?channels=tor."
-msgstr ""
-
-#: https//support.torproject.org/get-in-touch/why-i-cant-join-tor-channels/
-#: (content/get-in-touch/why-i-cant-join-tor-channels/contents+en.lrquestion.description)
-msgid "2. Log in with your IRC nickname and password."
-msgstr ""
-
-#: https//support.torproject.org/get-in-touch/why-i-cant-join-tor-channels/
-#: (content/get-in-touch/why-i-cant-join-tor-channels/contents+en.lrquestion.description)
-msgid ""
-"3. Look for the word **verify** and log in there. It may appear that nothing"
-" has happened. Look at the top of the page, and there will be a column "
-"called **Account**."
-msgstr ""
-
-#: https//support.torproject.org/get-in-touch/why-i-cant-join-tor-channels/
-#: (content/get-in-touch/why-i-cant-join-tor-channels/contents+en.lrquestion.description)
-msgid "4. Click on **Account**."
-msgstr ""
-
-#: https//support.torproject.org/get-in-touch/why-i-cant-join-tor-channels/
-#: (content/get-in-touch/why-i-cant-join-tor-channels/contents+en.lrquestion.description)
-msgid ""
-"5. Click on the small sentence at the bottom of the square that says: Verify"
-" account."
-msgstr ""
-
-#: https//support.torproject.org/get-in-touch/why-i-cant-join-tor-channels/
-#: (content/get-in-touch/why-i-cant-join-tor-channels/contents+en.lrquestion.description)
-msgid "6. Fill out the Captcha that pops up, and click ok."
+"After registering your nickname, to gain access to the #tor-project and "
+"other protected channels, your nickname must be **verified**."
msgstr ""
#: https//support.torproject.org/get-in-touch/why-i-cant-join-tor-channels/
#: (content/get-in-touch/why-i-cant-join-tor-channels/contents+en.lrquestion.description)
msgid ""
-"7. A tiny message will appear: \"Your NickServ account has been verified.\""
+"1. Go to https://services.oftc.net/ and follow the steps in the '*To verify "
+"your account*' section"
msgstr ""
#: https//support.torproject.org/get-in-touch/why-i-cant-join-tor-channels/
#: (content/get-in-touch/why-i-cant-join-tor-channels/contents+en.lrquestion.description)
-msgid "8. Go back to the IRC webpage where you are logged in and type:"
+msgid "2. Go back to the IRC webpage where you are logged in and type:"
msgstr ""
#: https//support.torproject.org/get-in-touch/why-i-cant-join-tor-channels/
@@ -9717,12 +10710,12 @@ msgstr ""
#: https//support.torproject.org/get-in-touch/why-i-cant-join-tor-channels/
#: (content/get-in-touch/why-i-cant-join-tor-channels/contents+en.lrquestion.description)
-msgid "9. Click ENTER."
+msgid "3. Click ENTER."
msgstr ""
#: https//support.torproject.org/get-in-touch/why-i-cant-join-tor-channels/
#: (content/get-in-touch/why-i-cant-join-tor-channels/contents+en.lrquestion.description)
-msgid "10. If all is well, you will receive a message that says:"
+msgid "4. If all is well, you will receive a message that says:"
msgstr ""
#: https//support.torproject.org/get-in-touch/why-i-cant-join-tor-channels/
@@ -9863,18 +10856,22 @@ msgstr ""
#: https//support.torproject.org/apt/tor-deb-repo/
#: (content/apt/apt-1/contents+en.lrquestion.description)
msgid ""
-"#### 2. Add the following entries to `/etc/apt/sources.list` or a new file "
-"in `/etc/apt/sources.list.d/`"
+"#### 2. Create a new file in `/etc/apt/sources.list.d/` named `tor.list`. "
+"Add the following entries:"
msgstr ""
#: https//support.torproject.org/apt/tor-deb-repo/
#: (content/apt/apt-1/contents+en.lrquestion.description)
-msgid "deb https://deb.torproject.org/torproject.org <DISTRIBUTION> main"
+msgid ""
+"deb [signed-by=/usr/share/keyrings/tor-archive-keyring.gpg] "
+"https://deb.torproject.org/torproject.org <DISTRIBUTION> main"
msgstr ""
#: https//support.torproject.org/apt/tor-deb-repo/
#: (content/apt/apt-1/contents+en.lrquestion.description)
-msgid "deb-src https://deb.torproject.org/torproject.org <DISTRIBUTION> main"
+msgid ""
+"deb-src [signed-by=/usr/share/keyrings/tor-archive-keyring.gpg] "
+"https://deb.torproject.org/torproject.org <DISTRIBUTION> main"
msgstr ""
#: https//support.torproject.org/apt/tor-deb-repo/
@@ -9888,14 +10885,16 @@ msgstr ""
#: https//support.torproject.org/apt/tor-deb-repo/
#: (content/apt/apt-1/contents+en.lrquestion.description)
msgid ""
-"deb https://deb.torproject.org/torproject.org tor-"
+"deb [signed-by=/usr/share/keyrings/tor-archive-keyring.gpg] "
+"https://deb.torproject.org/torproject.org tor-"
"experimental-0.4.6.x-<DISTRIBUTION> main"
msgstr ""
#: https//support.torproject.org/apt/tor-deb-repo/
#: (content/apt/apt-1/contents+en.lrquestion.description)
msgid ""
-"deb-src https://deb.torproject.org/torproject.org tor-"
+"deb-src [signed-by=/usr/share/keyrings/tor-archive-keyring.gpg] "
+"https://deb.torproject.org/torproject.org tor-"
"experimental-0.4.6.x-<DISTRIBUTION> main"
msgstr ""
@@ -9907,15 +10906,17 @@ msgstr ""
#: https//support.torproject.org/apt/tor-deb-repo/
#: (content/apt/apt-1/contents+en.lrquestion.description)
msgid ""
-"deb https://deb.torproject.org/torproject.org tor-nightly-"
-"master-<DISTRIBUTION> main"
+"deb [signed-by=/usr/share/keyrings/tor-archive-keyring.gpg] "
+"https://deb.torproject.org/torproject.org tor-nightly-master-<DISTRIBUTION> "
+"main"
msgstr ""
#: https//support.torproject.org/apt/tor-deb-repo/
#: (content/apt/apt-1/contents+en.lrquestion.description)
msgid ""
-"deb-src https://deb.torproject.org/torproject.org tor-nightly-"
-"master-<DISTRIBUTION> main"
+"deb-src [signed-by=/usr/share/keyrings/tor-archive-keyring.gpg] "
+"https://deb.torproject.org/torproject.org tor-nightly-master-<DISTRIBUTION> "
+"main"
msgstr ""
#: https//support.torproject.org/apt/tor-deb-repo/
@@ -9936,13 +10937,15 @@ msgstr ""
#: https//support.torproject.org/apt/tor-deb-repo/
#: (content/apt/apt-1/contents+en.lrquestion.description)
msgid ""
-"deb [arch=amd64] https://deb.torproject.org/torproject.org focal main"
+"deb [arch=amd64 signed-by=/usr/share/keyrings/tor-archive-keyring.gpg] "
+"https://deb.torproject.org/torproject.org focal main"
msgstr ""
#: https//support.torproject.org/apt/tor-deb-repo/
#: (content/apt/apt-1/contents+en.lrquestion.description)
msgid ""
-"deb-src [arch=amd64] https://deb.torproject.org/torproject.org focal main"
+"deb-src [arch=amd64 signed-by=/usr/share/keyrings/tor-archive-keyring.gpg] "
+"https://deb.torproject.org/torproject.org focal main"
msgstr ""
#: https//support.torproject.org/apt/tor-deb-repo/
@@ -9962,21 +10965,16 @@ msgstr ""
#: (content/apt/apt-1/contents+en.lrquestion.description)
msgid ""
"#### 3. Then add the gpg key used to sign the packages by running the "
-"following commands at your command prompt"
+"following command at your command prompt:"
msgstr ""
#: https//support.torproject.org/apt/tor-deb-repo/
#: (content/apt/apt-1/contents+en.lrquestion.description)
msgid ""
-"# wget -qO- "
+"# wget -O- "
"https://deb.torproject.org/torproject.org/A3C4F0F979CAA22CDBA8F512EE8CBC9E886DDD89.asc"
-" | gpg --import"
-msgstr ""
-
-#: https//support.torproject.org/apt/tor-deb-repo/
-#: (content/apt/apt-1/contents+en.lrquestion.description)
-msgid ""
-"# gpg --export A3C4F0F979CAA22CDBA8F512EE8CBC9E886DDD89 | apt-key add -"
+" | gpg --dearmor | tee /usr/share/keyrings/tor-archive-keyring.gpg "
+">/dev/null"
msgstr ""
#: https//support.torproject.org/apt/tor-deb-repo/
@@ -11583,6 +12581,82 @@ msgid ""
"doesn't change IP address over the day."
msgstr ""
+#: https//support.torproject.org/alternate-designs/block-websites/
+#: (content/alternate-designs/block-websites/contents+en.lrquestion.title)
+msgid "Exit policies should be able to block websites, not just IP addresses."
+msgstr ""
+
+#: https//support.torproject.org/alternate-designs/block-websites/
+#: (content/alternate-designs/block-websites/contents+en.lrquestion.description)
+msgid ""
+"It would be nice to let relay operators say things like `reject "
+"www.slashdot.org` in their exit policies, rather than requiring them to "
+"learn all the IP address space that could be covered by the site (and then "
+"also blocking other sites at those IP addresses)."
+msgstr ""
+
+#: https//support.torproject.org/alternate-designs/block-websites/
+#: (content/alternate-designs/block-websites/contents+en.lrquestion.description)
+msgid "There are two problems, though."
+msgstr ""
+
+#: https//support.torproject.org/alternate-designs/block-websites/
+#: (content/alternate-designs/block-websites/contents+en.lrquestion.description)
+msgid "First, users could still get around these blocks."
+msgstr ""
+
+#: https//support.torproject.org/alternate-designs/block-websites/
+#: (content/alternate-designs/block-websites/contents+en.lrquestion.description)
+msgid ""
+"For example, they could request the IP address rather than the hostname when"
+" they exit from the Tor network."
+msgstr ""
+
+#: https//support.torproject.org/alternate-designs/block-websites/
+#: (content/alternate-designs/block-websites/contents+en.lrquestion.description)
+msgid ""
+"This means operators would still need to learn all the IP addresses for the "
+"destinations in question."
+msgstr ""
+
+#: https//support.torproject.org/alternate-designs/block-websites/
+#: (content/alternate-designs/block-websites/contents+en.lrquestion.description)
+msgid ""
+"The second problem is that it would allow remote attackers to censor "
+"arbitrary sites."
+msgstr ""
+
+#: https//support.torproject.org/alternate-designs/block-websites/
+#: (content/alternate-designs/block-websites/contents+en.lrquestion.description)
+msgid ""
+"For example, if a Tor operator blocks www1.slashdot.org, and then some "
+"attacker poisons the Tor relay's DNS or otherwise changes that hostname to "
+"resolve to the IP address for a major news site, then suddenly that Tor "
+"relay is blocking the news site."
+msgstr ""
+
+#: https//support.torproject.org/alternate-designs/let-the-network-pick-the-path/
+#: (content/alternate-designs/let-the-network-pick-the-path/contents+en.lrquestion.title)
+msgid "You should let the network pick the path, not the client."
+msgstr ""
+
+#: https//support.torproject.org/alternate-designs/let-the-network-pick-the-path/
+#: (content/alternate-designs/let-the-network-pick-the-path/contents+en.lrquestion.description)
+msgid "No, you cannot trust the network to pick the path."
+msgstr ""
+
+#: https//support.torproject.org/alternate-designs/let-the-network-pick-the-path/
+#: (content/alternate-designs/let-the-network-pick-the-path/contents+en.lrquestion.description)
+msgid "Malicious relays could route you through their colluding friends."
+msgstr ""
+
+#: https//support.torproject.org/alternate-designs/let-the-network-pick-the-path/
+#: (content/alternate-designs/let-the-network-pick-the-path/contents+en.lrquestion.description)
+msgid ""
+"This would give an adversary the ability to watch all of your traffic end to"
+" end."
+msgstr ""
+
#: lego/templates/banner.html:3 lego/templates/banner.html:5
#: templates/banner.html:3 templates/banner.html:5
msgid "Close banner"
@@ -11613,8 +12687,8 @@ msgid "DONATE NOW"
msgstr "DONERA NU"
#: lego/templates/footer.html:13 lego/templates/footer.html:22
-#: lego/templates/navbar.html:83 templates/footer.html:13
-#: templates/footer.html:22 templates/navbar.html:83
+#: lego/templates/navbar.html:95 templates/footer.html:13
+#: templates/footer.html:22 templates/navbar.html:95
msgid "Download Tor Browser"
msgstr "Hämta Tor Browser"
diff --git a/contents+sw.po b/contents+sw.po
index d25d51ff7b..e73564713d 100644
--- a/contents+sw.po
+++ b/contents+sw.po
@@ -10,7 +10,7 @@ msgid ""
msgstr ""
"Project-Id-Version: PACKAGE VERSION\n"
"Report-Msgid-Bugs-To: \n"
-"POT-Creation-Date: 2021-08-25 11:14+CET\n"
+"POT-Creation-Date: 2021-09-01 12:20+CET\n"
"PO-Revision-Date: 2018-10-02 22:41+0000\n"
"Last-Translator: Emma Peel, 2021\n"
"Language-Team: Swahili (https://www.transifex.com/otf/teams/1519/sw/)\n"
@@ -143,6 +143,11 @@ msgstr ""
msgid "Tor Metrics"
msgstr ""
+#: https//support.torproject.org/alternate-designs/
+#: (content/alternate-designs/contents+en.lrtopic.title)
+msgid "Alternate Designs We Don't Do (Yet)"
+msgstr ""
+
#: https//support.torproject.org/glossary/add-on-extension-or-plugin/
#: (content/glossary/add-on-extension-or-plugin/contents+en.lrword.term)
msgid "add-on, extension, or plugin"
@@ -2030,6 +2035,61 @@ msgid ""
"wiki](https://trac.torproject.org/projects/tor/wiki/doc/TorPlusVPN)."
msgstr ""
+#: https//support.torproject.org/faq/relay-donations/
+#: (content/faq/relay-donations/contents+en.lrquestion.title)
+msgid "Can I donate for a relay rather than run my own?"
+msgstr ""
+
+#: https//support.torproject.org/faq/relay-donations/
+#: (content/faq/relay-donations/contents+en.lrquestion.description)
+msgid ""
+"Sure! We have a [list of organizations that run Tor "
+"relays](https://community.torproject.org/relay/community-resources/relay-"
+"associations/) that are happy to turn your donations into better speed and "
+"anonymity for the Tor network."
+msgstr ""
+
+#: https//support.torproject.org/faq/relay-donations/
+#: (content/faq/relay-donations/contents+en.lrquestion.description)
+msgid ""
+"These organizations are not the same as [The Tor Project, "
+"Inc](https://donate.torproject.org/), but we consider that a good thing."
+msgstr ""
+
+#: https//support.torproject.org/faq/relay-donations/
+#: (content/faq/relay-donations/contents+en.lrquestion.description)
+msgid "They're run by nice people who are part of the Tor community."
+msgstr ""
+
+#: https//support.torproject.org/faq/relay-donations/
+#: (content/faq/relay-donations/contents+en.lrquestion.description)
+msgid ""
+"Note that there can be a tradeoff here between anonymity and performance."
+msgstr ""
+
+#: https//support.torproject.org/faq/relay-donations/
+#: (content/faq/relay-donations/contents+en.lrquestion.description)
+msgid ""
+"The Tor network's anonymity comes in part from diversity, so if you are in a"
+" position to run your own relay, you will be improving Tor's anonymity more "
+"than by donating."
+msgstr ""
+
+#: https//support.torproject.org/faq/relay-donations/
+#: (content/faq/relay-donations/contents+en.lrquestion.description)
+msgid ""
+"At the same time though, economies of scale for bandwidth mean that "
+"combining many small donations into several larger relays is more efficient "
+"at improving network performance."
+msgstr ""
+
+#: https//support.torproject.org/faq/relay-donations/
+#: (content/faq/relay-donations/contents+en.lrquestion.description)
+msgid ""
+"Improving anonymity and improving performance are both worthwhile goals, so "
+"however you can help is great!"
+msgstr ""
+
#: https//support.torproject.org/faq/staying-anonymous/
#: (content/faq/staying-anonymous/contents+en.lrquestion.title)
msgid "Am I totally anonymous if I use Tor?"
@@ -2330,6 +2390,61 @@ msgid ""
" documenting all the issues](https://community.torproject.org/)."
msgstr ""
+#: https//support.torproject.org/about/attacks-on-onion-routing/
+#: (content/about/attacks-on-onion-routing/contents+en.lrquestion.title)
+msgid "What attacks remain against onion routing?"
+msgstr ""
+
+#: https//support.torproject.org/about/attacks-on-onion-routing/
+#: (content/about/attacks-on-onion-routing/contents+en.lrquestion.description)
+msgid ""
+"As mentioned above, it is possible for an observer who can view both you and"
+" either the destination website or your Tor exit node to correlate timings "
+"of your traffic as it enters the Tor network and also as it exits."
+msgstr ""
+
+#: https//support.torproject.org/about/attacks-on-onion-routing/
+#: (content/about/attacks-on-onion-routing/contents+en.lrquestion.description)
+msgid "Tor does not defend against such a threat model."
+msgstr ""
+
+#: https//support.torproject.org/about/attacks-on-onion-routing/
+#: (content/about/attacks-on-onion-routing/contents+en.lrquestion.description)
+msgid ""
+"In a more limited sense, note that if a censor or law enforcement agency has"
+" the ability to obtain specific observation of parts of the network, it is "
+"possible for them to verify a suspicion that you talk regularly to your "
+"friend by observing traffic at both ends and correlating the timing of only "
+"that traffic."
+msgstr ""
+
+#: https//support.torproject.org/about/attacks-on-onion-routing/
+#: (content/about/attacks-on-onion-routing/contents+en.lrquestion.description)
+msgid ""
+"Again, this is only useful to verify that parties already suspected of "
+"communicating with one another are doing so."
+msgstr ""
+
+#: https//support.torproject.org/about/attacks-on-onion-routing/
+#: (content/about/attacks-on-onion-routing/contents+en.lrquestion.description)
+msgid ""
+"In most countries, the suspicion required to obtain a warrant already "
+"carries more weight than timing correlation would provide."
+msgstr ""
+
+#: https//support.torproject.org/about/attacks-on-onion-routing/
+#: (content/about/attacks-on-onion-routing/contents+en.lrquestion.description)
+msgid ""
+"Furthermore, since Tor reuses circuits for multiple TCP connections, it is "
+"possible to associate non anonymous and anonymous traffic at a given exit "
+"node, so be careful about what applications you run concurrently over Tor."
+msgstr ""
+
+#: https//support.torproject.org/about/attacks-on-onion-routing/
+#: (content/about/attacks-on-onion-routing/contents+en.lrquestion.description)
+msgid "Perhaps even run separate Tor clients for these applications."
+msgstr ""
+
#: https//support.torproject.org/about/backdoor/
#: (content/about/backdoor/contents+en.lrquestion.title)
msgid "Is there a backdoor in Tor?"
@@ -2465,6 +2580,43 @@ msgid ""
"recommended](/tbb/tbb-9/)."
msgstr ""
+#: https//support.torproject.org/about/change-paths/
+#: (content/about/change-paths/contents+en.lrquestion.title)
+msgid "How often does Tor change its paths?"
+msgstr ""
+
+#: https//support.torproject.org/about/change-paths/
+#: (content/about/change-paths/contents+en.lrquestion.description)
+msgid ""
+"Tor will reuse the same circuit for new TCP streams for 10 minutes, as long "
+"as the circuit is working fine."
+msgstr ""
+
+#: https//support.torproject.org/about/change-paths/
+#: (content/about/change-paths/contents+en.lrquestion.description)
+msgid "(If the circuit fails, Tor will switch to a new circuit immediately.)"
+msgstr ""
+
+#: https//support.torproject.org/about/change-paths/
+#: (content/about/change-paths/contents+en.lrquestion.description)
+msgid ""
+"But note that a single TCP stream (e.g. a long IRC connection) will stay on "
+"the same circuit forever."
+msgstr ""
+
+#: https//support.torproject.org/about/change-paths/
+#: (content/about/change-paths/contents+en.lrquestion.description)
+msgid "We don't rotate individual streams from one circuit to the next."
+msgstr ""
+
+#: https//support.torproject.org/about/change-paths/
+#: (content/about/change-paths/contents+en.lrquestion.description)
+msgid ""
+"Otherwise, an adversary with a partial view of the network would be given "
+"many chances over time to link you to your destination, rather than just one"
+" chance."
+msgstr ""
+
#: https//support.torproject.org/about/distribute-tor/
#: (content/about/distribute-tor/contents+en.lrquestion.title)
msgid "Can I distribute Tor?"
@@ -2560,6 +2712,133 @@ msgid ""
"details."
msgstr ""
+#: https//support.torproject.org/about/entry-guards/
+#: (content/about/entry-guards/contents+en.lrquestion.title)
+msgid "What are Entry Guards?"
+msgstr ""
+
+#: https//support.torproject.org/about/entry-guards/
+#: (content/about/entry-guards/contents+en.lrquestion.description)
+msgid ""
+"Tor (like all current practical low-latency anonymity designs) fails when "
+"the attacker can see both ends of the communications channel."
+msgstr ""
+
+#: https//support.torproject.org/about/entry-guards/
+#: (content/about/entry-guards/contents+en.lrquestion.description)
+msgid ""
+"For example, suppose the attacker controls or watches the Tor relay you "
+"choose to enter the network, and also controls or watches the website you "
+"visit."
+msgstr ""
+
+#: https//support.torproject.org/about/entry-guards/
+#: (content/about/entry-guards/contents+en.lrquestion.description)
+msgid ""
+"In this case, the research community knows no practical low-latency design "
+"that can reliably stop the attacker from correlating volume and timing "
+"information on the two sides."
+msgstr ""
+
+#: https//support.torproject.org/about/entry-guards/
+#: (content/about/entry-guards/contents+en.lrquestion.description)
+msgid "So, what should we do?"
+msgstr ""
+
+#: https//support.torproject.org/about/entry-guards/
+#: (content/about/entry-guards/contents+en.lrquestion.description)
+msgid "Suppose the attacker controls, or can observe, C relays."
+msgstr ""
+
+#: https//support.torproject.org/about/entry-guards/
+#: (content/about/entry-guards/contents+en.lrquestion.description)
+msgid "Suppose there are N relays total."
+msgstr ""
+
+#: https//support.torproject.org/about/entry-guards/
+#: (content/about/entry-guards/contents+en.lrquestion.description)
+msgid ""
+"If you select new entry and exit relays each time you use the network, the "
+"attacker will be able to correlate all traffic you send with probability "
+"around (c/n)2."
+msgstr ""
+
+#: https//support.torproject.org/about/entry-guards/
+#: (content/about/entry-guards/contents+en.lrquestion.description)
+msgid ""
+"But profiling is, for most users, as bad as being traced all the time: they "
+"want to do something often without an attacker noticing, and the attacker "
+"noticing once is as bad as the attacker noticing more often."
+msgstr ""
+
+#: https//support.torproject.org/about/entry-guards/
+#: (content/about/entry-guards/contents+en.lrquestion.description)
+msgid ""
+"Thus, choosing many random entries and exits gives the user no chance of "
+"escaping profiling by this kind of attacker."
+msgstr ""
+
+#: https//support.torproject.org/about/entry-guards/
+#: (content/about/entry-guards/contents+en.lrquestion.description)
+msgid ""
+"The solution is \"entry guards\": each Tor client selects a few relays at "
+"random to use as entry points, and uses only those relays for their first "
+"hop."
+msgstr ""
+
+#: https//support.torproject.org/about/entry-guards/
+#: (content/about/entry-guards/contents+en.lrquestion.description)
+msgid ""
+"If those relays are not controlled or observed, the attacker can't win, "
+"ever, and the user is secure."
+msgstr ""
+
+#: https//support.torproject.org/about/entry-guards/
+#: (content/about/entry-guards/contents+en.lrquestion.description)
+msgid ""
+"If those relays are observed or controlled by the attacker, the attacker "
+"sees a larger fraction of the user's traffic - but still the user is no more"
+" profiled than before."
+msgstr ""
+
+#: https//support.torproject.org/about/entry-guards/
+#: (content/about/entry-guards/contents+en.lrquestion.description)
+msgid ""
+"Thus, the user has some chance (on the order of (n-c)/n) of avoiding "
+"profiling, whereas they had none before."
+msgstr ""
+
+#: https//support.torproject.org/about/entry-guards/
+#: (content/about/entry-guards/contents+en.lrquestion.description)
+msgid ""
+"You can read more at [An Analysis of the Degradation of Anonymous "
+"Protocols](http://freehaven.net/anonbib/#wright02), [Defending Anonymous "
+"Communication Against Passive Logging "
+"Attacks](http://freehaven.net/anonbib/#wright03), and especially [Locating "
+"Hidden Servers](http://freehaven.net/anonbib/#hs-attack06)."
+msgstr ""
+
+#: https//support.torproject.org/about/entry-guards/
+#: (content/about/entry-guards/contents+en.lrquestion.description)
+msgid ""
+"Restricting your entry nodes may also help against attackers who want to run"
+" a few Tor nodes and easily enumerate all of the Tor user IP addresses."
+msgstr ""
+
+#: https//support.torproject.org/about/entry-guards/
+#: (content/about/entry-guards/contents+en.lrquestion.description)
+msgid ""
+"(Even though they can't learn what destinations the users are talking to, "
+"they still might be able to do bad things with just a list of users.)"
+msgstr ""
+
+#: https//support.torproject.org/about/entry-guards/
+#: (content/about/entry-guards/contents+en.lrquestion.description)
+msgid ""
+"However, that feature won't really become useful until we move to a "
+"\"directory guard\" design as well."
+msgstr ""
+
#: https//support.torproject.org/about/how-is-tor-different-from-other-proxies/
#: (content/about/how-is-tor-different-from-other-proxies/contents+en.lrquestion.title)
msgid "How is Tor different from other proxies?"
@@ -2730,6 +3009,162 @@ msgid ""
" Tor and HTTPS interact."
msgstr ""
+#: https//support.torproject.org/about/key-management/
+#: (content/about/key-management/contents+en.lrquestion.title)
+msgid "Tell me about all the keys Tor uses"
+msgstr ""
+
+#: https//support.torproject.org/about/key-management/
+#: (content/about/key-management/contents+en.lrquestion.description)
+msgid ""
+"Tor uses a variety of different keys, with three goals in mind: 1) "
+"encryption to ensure privacy of data within the Tor network, 2) "
+"authentication so clients know they're talking to the relays they meant to "
+"talk to, and 3) signatures to make sure all clients know the same set of "
+"relays."
+msgstr ""
+
+#: https//support.torproject.org/about/key-management/
+#: (content/about/key-management/contents+en.lrquestion.description)
+msgid ""
+"**Encryption**: first, all connections in Tor use TLS link encryption, so "
+"observers can't look inside to see which circuit a given cell is intended "
+"for."
+msgstr ""
+
+#: https//support.torproject.org/about/key-management/
+#: (content/about/key-management/contents+en.lrquestion.description)
+msgid ""
+"Further, the Tor client establishes an ephemeral encryption key with each "
+"relay in the circuit; these extra layers of encryption mean that only the "
+"exit relay can read the cells."
+msgstr ""
+
+#: https//support.torproject.org/about/key-management/
+#: (content/about/key-management/contents+en.lrquestion.description)
+msgid ""
+"Both sides discard the circuit key when the circuit ends, so logging traffic"
+" and then breaking into the relay to discover the key won't work."
+msgstr ""
+
+#: https//support.torproject.org/about/key-management/
+#: (content/about/key-management/contents+en.lrquestion.description)
+msgid ""
+"**Authentication**: Every Tor relay has a public decryption key called the "
+"\"onion key\"."
+msgstr ""
+
+#: https//support.torproject.org/about/key-management/
+#: (content/about/key-management/contents+en.lrquestion.description)
+msgid "Each relay rotates its onion key once a week."
+msgstr ""
+
+#: https//support.torproject.org/about/key-management/
+#: (content/about/key-management/contents+en.lrquestion.description)
+msgid ""
+"When the Tor client establishes circuits, at each step it [demands that the "
+"Tor relay prove knowledge of its onion key](https://svn-"
+"archive.torproject.org/svn/projects/design-paper/tor-"
+"design.html#subsec:circuits)."
+msgstr ""
+
+#: https//support.torproject.org/about/key-management/
+#: (content/about/key-management/contents+en.lrquestion.description)
+msgid ""
+"That way the first node in the path can't just spoof the rest of the path."
+msgstr ""
+
+#: https//support.torproject.org/about/key-management/
+#: (content/about/key-management/contents+en.lrquestion.description)
+msgid ""
+"Because the Tor client chooses the path, it can make sure to get Tor's "
+"\"distributed trust\" property: no single relay in the path can know about "
+"both the client and what the client is doing."
+msgstr ""
+
+#: https//support.torproject.org/about/key-management/
+#: (content/about/key-management/contents+en.lrquestion.description)
+msgid ""
+"**Coordination**: How do clients know what the relays are, and how do they "
+"know that they have the right keys for them?"
+msgstr ""
+
+#: https//support.torproject.org/about/key-management/
+#: (content/about/key-management/contents+en.lrquestion.description)
+msgid "Each relay has a long-term public signing key called the \"identity key\"."
+msgstr ""
+
+#: https//support.torproject.org/about/key-management/
+#: (content/about/key-management/contents+en.lrquestion.description)
+msgid "Each directory authority additionally has a \"directory signing key\"."
+msgstr ""
+
+#: https//support.torproject.org/about/key-management/
+#: (content/about/key-management/contents+en.lrquestion.description)
+msgid ""
+"The directory authorities [provide a signed "
+"list](https://gitweb.torproject.org/torspec.git/tree/dir-spec.txt) of all "
+"the known relays, and in that list are a set of certificates from each relay"
+" (self-signed by their identity key) specifying their keys, locations, exit "
+"policies, and so on."
+msgstr ""
+
+#: https//support.torproject.org/about/key-management/
+#: (content/about/key-management/contents+en.lrquestion.description)
+msgid ""
+"So unless the adversary can control a majority of the directory authorities "
+"(as of 2021 there are 10 directory authorities), they can't trick the Tor "
+"client into using other Tor relays."
+msgstr ""
+
+#: https//support.torproject.org/about/key-management/
+#: (content/about/key-management/contents+en.lrquestion.description)
+msgid "How do clients know what the directory authorities are?"
+msgstr ""
+
+#: https//support.torproject.org/about/key-management/
+#: (content/about/key-management/contents+en.lrquestion.description)
+msgid ""
+"The Tor software comes with a built-in list of location and public key for "
+"each directory authority."
+msgstr ""
+
+#: https//support.torproject.org/about/key-management/
+#: (content/about/key-management/contents+en.lrquestion.description)
+msgid ""
+"So the only way to trick users into using a fake Tor network is to give them"
+" a specially modified version of the software."
+msgstr ""
+
+#: https//support.torproject.org/about/key-management/
+#: (content/about/key-management/contents+en.lrquestion.description)
+msgid "How do users know they've got the right software?"
+msgstr ""
+
+#: https//support.torproject.org/about/key-management/
+#: (content/about/key-management/contents+en.lrquestion.description)
+msgid ""
+"When we distribute the source code or a package, we digitally sign it with "
+"[GNU Privacy Guard](http://www.gnupg.org/). See the [instructions on how to "
+"check Tor Browser's signature](https://support.torproject.org/tbb/how-to-"
+"verify-signature/)."
+msgstr ""
+
+#: https//support.torproject.org/about/key-management/
+#: (content/about/key-management/contents+en.lrquestion.description)
+msgid ""
+"In order to be certain that it's really signed by us, you need to have met "
+"us in person and gotten a copy of our GPG key fingerprint, or you need to "
+"know somebody who has."
+msgstr ""
+
+#: https//support.torproject.org/about/key-management/
+#: (content/about/key-management/contents+en.lrquestion.description)
+msgid ""
+"If you're concerned about an attack on this level, we recommend you get "
+"involved with the security community and start meeting people."
+msgstr ""
+
#: https//support.torproject.org/about/no-data-scrubbing/
#: (content/about/no-data-scrubbing/contents+en.lrquestion.title)
msgid ""
@@ -2762,6 +3197,151 @@ msgid ""
"though."
msgstr ""
+#: https//support.torproject.org/about/protections/
+#: (content/about/protections/contents+en.lrquestion.title)
+msgid "What protections does Tor provide?"
+msgstr ""
+
+#: https//support.torproject.org/about/protections/
+#: (content/about/protections/contents+en.lrquestion.description)
+msgid ""
+"Internet communication is based on a store-and-forward model that can be "
+"understood in analogy to postal mail: Data is transmitted in blocks called "
+"IP datagrams or packets."
+msgstr ""
+
+#: https//support.torproject.org/about/protections/
+#: (content/about/protections/contents+en.lrquestion.description)
+msgid ""
+"Every packet includes a source IP address (of the sender) and a destination "
+"IP address (of the receiver), just as ordinary letters contain postal "
+"addresses of sender and receiver."
+msgstr ""
+
+#: https//support.torproject.org/about/protections/
+#: (content/about/protections/contents+en.lrquestion.description)
+msgid ""
+"The way from sender to receiver involves multiple hops of routers, where "
+"each router inspects the destination IP address and forwards the packet "
+"closer to its destination."
+msgstr ""
+
+#: https//support.torproject.org/about/protections/
+#: (content/about/protections/contents+en.lrquestion.description)
+msgid ""
+"Thus, every router between sender and receiver learns that the sender is "
+"communicating with the receiver."
+msgstr ""
+
+#: https//support.torproject.org/about/protections/
+#: (content/about/protections/contents+en.lrquestion.description)
+msgid ""
+"In particular, your local ISP is in the position to build a complete profile"
+" of your Internet usage."
+msgstr ""
+
+#: https//support.torproject.org/about/protections/
+#: (content/about/protections/contents+en.lrquestion.description)
+msgid ""
+"In addition, every server in the Internet that can see any of the packets "
+"can profile your behavior."
+msgstr ""
+
+#: https//support.torproject.org/about/protections/
+#: (content/about/protections/contents+en.lrquestion.description)
+msgid ""
+"The aim of Tor is to improve your privacy by sending your traffic through a "
+"series of proxies."
+msgstr ""
+
+#: https//support.torproject.org/about/protections/
+#: (content/about/protections/contents+en.lrquestion.description)
+msgid ""
+"Your communication is encrypted in multiple layers and routed via multiple "
+"hops through the Tor network to the final receiver."
+msgstr ""
+
+#: https//support.torproject.org/about/protections/
+#: (content/about/protections/contents+en.lrquestion.description)
+msgid ""
+"More details on this process can be found in this "
+"[visualization](https://support.torproject.org/https/https-1/)."
+msgstr ""
+
+#: https//support.torproject.org/about/protections/
+#: (content/about/protections/contents+en.lrquestion.description)
+msgid ""
+"Note that all your local ISP can observe now is that you are communicating "
+"with Tor nodes."
+msgstr ""
+
+#: https//support.torproject.org/about/protections/
+#: (content/about/protections/contents+en.lrquestion.description)
+msgid ""
+"Similarly, servers in the Internet just see that they are being contacted by"
+" Tor nodes."
+msgstr ""
+
+#: https//support.torproject.org/about/protections/
+#: (content/about/protections/contents+en.lrquestion.description)
+msgid "Generally speaking, Tor aims to solve three privacy problems:"
+msgstr ""
+
+#: https//support.torproject.org/about/protections/
+#: (content/about/protections/contents+en.lrquestion.description)
+msgid ""
+"First, Tor prevents websites and other services from learning your location,"
+" which they can use to build databases about your habits and interests."
+msgstr ""
+
+#: https//support.torproject.org/about/protections/
+#: (content/about/protections/contents+en.lrquestion.description)
+msgid ""
+"With Tor, your Internet connections don't give you away by default -- now "
+"you can have the ability to choose, for each connection, how much "
+"information to reveal."
+msgstr ""
+
+#: https//support.torproject.org/about/protections/
+#: (content/about/protections/contents+en.lrquestion.description)
+msgid ""
+"Second, Tor prevents people watching your traffic locally (such as your ISP "
+"or someone with access to your home wifi or router) from learning what "
+"information you're fetching and where you're fetching it from."
+msgstr ""
+
+#: https//support.torproject.org/about/protections/
+#: (content/about/protections/contents+en.lrquestion.description)
+msgid ""
+"It also stops them from deciding what you're allowed to learn and publish --"
+" if you can get to any part of the Tor network, you can reach any site on "
+"the Internet."
+msgstr ""
+
+#: https//support.torproject.org/about/protections/
+#: (content/about/protections/contents+en.lrquestion.description)
+msgid ""
+"Third, Tor routes your connection through more than one Tor relay so no "
+"single relay can learn what you're up to."
+msgstr ""
+
+#: https//support.torproject.org/about/protections/
+#: (content/about/protections/contents+en.lrquestion.description)
+msgid ""
+"Because these relays are run by different individuals or organizations, "
+"distributing trust provides more security than the old [one hop "
+"proxy](https://support.torproject.org/about/#how-is-tor-different-from-"
+"other-proxies) approach."
+msgstr ""
+
+#: https//support.torproject.org/about/protections/
+#: (content/about/protections/contents+en.lrquestion.description)
+msgid ""
+"Note, however, that there are situations where Tor fails to solve these "
+"privacy problems entirely: see the entry below on [remaining "
+"attacks](https://support.torproject.org/about/#attacks-on-onion-routing)."
+msgstr ""
+
#: https//support.torproject.org/about/what-is-tor/
#: (content/about/what-is-tor/contents+en.lrquestion.title)
msgid "What is Tor?"
@@ -4931,9 +5511,11 @@ msgstr ""
#: (content/tbb/tbb-47/contents+en.lrquestion.description)
msgid ""
"Also, read up on the HTTPProxyAuthenticator and HTTPSProxyAuthenticator "
-"options if your proxy requires auth. We only support basic auth currently, "
-"but if you need NTLM authentication, you may find [this post in the "
-"archives](https://archives.seul.org/or/talk/Jun-2005/msg00223.html) useful."
+"options if your [proxy requires auth.](https://developer.mozilla.org/en-"
+"US/docs/Web/HTTP/Headers/Proxy-Authenticate) We only support basic auth "
+"currently, but if you need NTLM authentication, you may find [this post in "
+"the archives](https://archives.seul.org/or/talk/Jun-2005/msg00223.html) "
+"useful."
msgstr ""
#: https//support.torproject.org/tbb/tbb-47/
@@ -5155,6 +5737,219 @@ msgid ""
"have no effect on Tor's configuration."
msgstr ""
+#: https//support.torproject.org/tbb/tbb-firewall-ports/
+#: (content/tbb/tbb-firewall-ports/contents+en.lrquestion.title)
+msgid "My firewall only allows a few outgoing ports"
+msgstr ""
+
+#: https//support.torproject.org/tbb/tbb-firewall-ports/
+#: (content/tbb/tbb-firewall-ports/contents+en.lrquestion.description)
+msgid ""
+"If your firewall works by blocking ports, then you can tell Tor to only use "
+"the ports when you start your Tor Browser."
+msgstr ""
+
+#: https//support.torproject.org/tbb/tbb-firewall-ports/
+#: (content/tbb/tbb-firewall-ports/contents+en.lrquestion.description)
+msgid ""
+"Or you can add the ports that your firewall permits by adding "
+"\"FascistFirewall 1\" to your torrc configuration file."
+msgstr ""
+
+#: https//support.torproject.org/tbb/tbb-firewall-ports/
+#: (content/tbb/tbb-firewall-ports/contents+en.lrquestion.description)
+msgid ""
+"By default, when you set this Tor assumes that your firewall allows only "
+"port 80 and port 443 (HTTP and HTTPS respectively)."
+msgstr ""
+
+#: https//support.torproject.org/tbb/tbb-firewall-ports/
+#: (content/tbb/tbb-firewall-ports/contents+en.lrquestion.description)
+msgid ""
+"You can select a different set of ports with the FirewallPorts torrc option."
+msgstr ""
+
+#: https//support.torproject.org/tbb/tbb-firewall-ports/
+#: (content/tbb/tbb-firewall-ports/contents+en.lrquestion.description)
+msgid ""
+"If you want to be more fine-grained with your controls, you can also use the"
+" ReachableAddresses config options, e.g.:"
+msgstr ""
+
+#: https//support.torproject.org/tbb/tbb-firewall-ports/
+#: (content/tbb/tbb-firewall-ports/contents+en.lrquestion.description)
+#: https//support.torproject.org/tbb/tbb-install-tor-central-server/
+#: (content/tbb/tbb-install-tor-central-server/contents+en.lrquestion.description)
+#: https//support.torproject.org/operators/default-exit-ports/
+#: (content/operators/default-exit-ports/contents+en.lrquestion.description)
+#: https//support.torproject.org/operators/hibernation/
+#: (content/operators/hibernation/contents+en.lrquestion.description)
+#: https//support.torproject.org/operators/limit-total-bandwidth/
+#: (content/operators/limit-total-bandwidth/contents+en.lrquestion.description)
+#: https//support.torproject.org/misc/bug-or-feedback/
+#: (content/misc/bug-or-feedback/contents+en.lrquestion.description)
+#: https//support.torproject.org/get-in-touch/why-i-cant-join-tor-channels/
+#: (content/get-in-touch/why-i-cant-join-tor-channels/contents+en.lrquestion.description)
+#: https//support.torproject.org/apt/tor-deb-repo/
+#: (content/apt/apt-1/contents+en.lrquestion.description)
+#: https//support.torproject.org/apt/apt-over-tor/
+#: (content/apt/apt-3/contents+en.lrquestion.description)
+msgid "```"
+msgstr "```"
+
+#: https//support.torproject.org/tbb/tbb-firewall-ports/
+#: (content/tbb/tbb-firewall-ports/contents+en.lrquestion.description)
+msgid "ReachableDirAddresses *:80"
+msgstr ""
+
+#: https//support.torproject.org/tbb/tbb-firewall-ports/
+#: (content/tbb/tbb-firewall-ports/contents+en.lrquestion.description)
+msgid "ReachableORAddresses *:443"
+msgstr ""
+
+#: https//support.torproject.org/tbb/tbb-install-tor-central-server/
+#: (content/tbb/tbb-install-tor-central-server/contents+en.lrquestion.title)
+msgid ""
+"Can I install Tor on a central server, and have my clients connect to it?"
+msgstr ""
+
+#: https//support.torproject.org/tbb/tbb-install-tor-central-server/
+#: (content/tbb/tbb-install-tor-central-server/contents+en.lrquestion.description)
+msgid ""
+"Yes. Tor can be configured as a client or a relay on another machine, and "
+"allow other machines to be able to connect to it for anonymity."
+msgstr ""
+
+#: https//support.torproject.org/tbb/tbb-install-tor-central-server/
+#: (content/tbb/tbb-install-tor-central-server/contents+en.lrquestion.description)
+msgid ""
+"This is most useful in an environment where many computers want a gateway of"
+" anonymity to the rest of the world."
+msgstr ""
+
+#: https//support.torproject.org/tbb/tbb-install-tor-central-server/
+#: (content/tbb/tbb-install-tor-central-server/contents+en.lrquestion.description)
+msgid ""
+"However, be forewarned that with this configuration, anyone within your "
+"private network (existing between you and the Tor client/relay) can see what"
+" traffic you are sending in clear text."
+msgstr ""
+
+#: https//support.torproject.org/tbb/tbb-install-tor-central-server/
+#: (content/tbb/tbb-install-tor-central-server/contents+en.lrquestion.description)
+msgid "The anonymity doesn't start until you get to the Tor relay."
+msgstr ""
+
+#: https//support.torproject.org/tbb/tbb-install-tor-central-server/
+#: (content/tbb/tbb-install-tor-central-server/contents+en.lrquestion.description)
+msgid ""
+"Because of this, if you are the controller of your domain and you know "
+"everything's locked down, you will be OK, but this configuration may not be "
+"suitable for large private networks where security is key all around."
+msgstr ""
+
+#: https//support.torproject.org/tbb/tbb-install-tor-central-server/
+#: (content/tbb/tbb-install-tor-central-server/contents+en.lrquestion.description)
+msgid ""
+"Configuration is simple, editing your torrc file's SocksListenAddress "
+"according to the following examples:"
+msgstr ""
+
+#: https//support.torproject.org/tbb/tbb-install-tor-central-server/
+#: (content/tbb/tbb-install-tor-central-server/contents+en.lrquestion.description)
+msgid "SocksListenAddress 127.0.0.1"
+msgstr ""
+
+#: https//support.torproject.org/tbb/tbb-install-tor-central-server/
+#: (content/tbb/tbb-install-tor-central-server/contents+en.lrquestion.description)
+msgid "SocksListenAddress 192.168.x.x:9100"
+msgstr ""
+
+#: https//support.torproject.org/tbb/tbb-install-tor-central-server/
+#: (content/tbb/tbb-install-tor-central-server/contents+en.lrquestion.description)
+msgid "SocksListenAddress 0.0.0.0:9100"
+msgstr ""
+
+#: https//support.torproject.org/tbb/tbb-install-tor-central-server/
+#: (content/tbb/tbb-install-tor-central-server/contents+en.lrquestion.description)
+msgid ""
+"You can state multiple listen addresses, in the case that you are part of "
+"several networks or subnets."
+msgstr ""
+
+#: https//support.torproject.org/tbb/tbb-install-tor-central-server/
+#: (content/tbb/tbb-install-tor-central-server/contents+en.lrquestion.description)
+msgid "SocksListenAddress 192.168.x.x:9100 #eth0"
+msgstr ""
+
+#: https//support.torproject.org/tbb/tbb-install-tor-central-server/
+#: (content/tbb/tbb-install-tor-central-server/contents+en.lrquestion.description)
+msgid "SocksListenAddress 10.x.x.x:9100 #eth1"
+msgstr ""
+
+#: https//support.torproject.org/tbb/tbb-install-tor-central-server/
+#: (content/tbb/tbb-install-tor-central-server/contents+en.lrquestion.description)
+msgid ""
+"After this, your clients on their respective networks/subnets would specify "
+"a socks proxy with the address and port you specified SocksListenAddress to "
+"be."
+msgstr ""
+
+#: https//support.torproject.org/tbb/tbb-install-tor-central-server/
+#: (content/tbb/tbb-install-tor-central-server/contents+en.lrquestion.description)
+msgid ""
+"Please note that the SocksPort configuration option gives the port ONLY for "
+"localhost (127.0.0.1)."
+msgstr ""
+
+#: https//support.torproject.org/tbb/tbb-install-tor-central-server/
+#: (content/tbb/tbb-install-tor-central-server/contents+en.lrquestion.description)
+msgid ""
+"When setting up your SocksListenAddress(es), you need to give the port with "
+"the address, as shown above."
+msgstr ""
+
+#: https//support.torproject.org/tbb/tbb-install-tor-central-server/
+#: (content/tbb/tbb-install-tor-central-server/contents+en.lrquestion.description)
+msgid ""
+"If you are interested in forcing all outgoing data through the central Tor "
+"client/relay, instead of the server only being an optional proxy, you may "
+"find the program iptables (for *nix) useful."
+msgstr ""
+
+#: https//support.torproject.org/tbb/tbb-run-client-different-computer/
+#: (content/tbb/tbb-run-client-different-computer/contents+en.lrquestion.title)
+msgid ""
+"I want to run my Tor client on a different computer than my applications"
+msgstr ""
+
+#: https//support.torproject.org/tbb/tbb-run-client-different-computer/
+#: (content/tbb/tbb-run-client-different-computer/contents+en.lrquestion.description)
+msgid ""
+"By default, your Tor client only listens for applications that connect from "
+"localhost."
+msgstr ""
+
+#: https//support.torproject.org/tbb/tbb-run-client-different-computer/
+#: (content/tbb/tbb-run-client-different-computer/contents+en.lrquestion.description)
+msgid "Connections from other computers are refused."
+msgstr ""
+
+#: https//support.torproject.org/tbb/tbb-run-client-different-computer/
+#: (content/tbb/tbb-run-client-different-computer/contents+en.lrquestion.description)
+msgid ""
+"If you want to torify applications on different computers than the Tor "
+"client, you should edit your torrc to define `SocksListenAddress 0.0.0.0` "
+"and then restart (or hup) Tor."
+msgstr ""
+
+#: https//support.torproject.org/tbb/tbb-run-client-different-computer/
+#: (content/tbb/tbb-run-client-different-computer/contents+en.lrquestion.description)
+msgid ""
+"If you want to get more advanced, you can configure your Tor client on a "
+"firewall to bind to your internal IP but not your external IP."
+msgstr ""
+
#: https//support.torproject.org/tbb/website-blocking-tor/
#: (content/tbb/website-blocking-tor/contents+en.lrquestion.title)
msgid "A website I am trying to reach is blocking access over Tor."
@@ -6593,6 +7388,130 @@ msgid ""
"guide."
msgstr ""
+#: https//support.torproject.org/operators/default-exit-ports/
+#: (content/operators/default-exit-ports/contents+en.lrquestion.title)
+msgid "Is there a list of default exit ports?"
+msgstr ""
+
+#: https//support.torproject.org/operators/default-exit-ports/
+#: (content/operators/default-exit-ports/contents+en.lrquestion.description)
+msgid ""
+"The default open ports are listed below but keep in mind that, any port or "
+"ports can be opened by the relay operator by configuring it in torrc or "
+"modifying the source code."
+msgstr ""
+
+#: https//support.torproject.org/operators/default-exit-ports/
+#: (content/operators/default-exit-ports/contents+en.lrquestion.description)
+msgid ""
+"The default according to src/or/policies.c ([line 85][1] and [line 1901][2])"
+" from the source code release [release-0.4.6][3]:"
+msgstr ""
+
+#: https//support.torproject.org/operators/default-exit-ports/
+#: (content/operators/default-exit-ports/contents+en.lrquestion.description)
+msgid "reject 0.0.0.0/8"
+msgstr ""
+
+#: https//support.torproject.org/operators/default-exit-ports/
+#: (content/operators/default-exit-ports/contents+en.lrquestion.description)
+msgid "reject 169.254.0.0/16"
+msgstr ""
+
+#: https//support.torproject.org/operators/default-exit-ports/
+#: (content/operators/default-exit-ports/contents+en.lrquestion.description)
+msgid "reject 127.0.0.0/8"
+msgstr ""
+
+#: https//support.torproject.org/operators/default-exit-ports/
+#: (content/operators/default-exit-ports/contents+en.lrquestion.description)
+msgid "reject 192.168.0.0/16"
+msgstr ""
+
+#: https//support.torproject.org/operators/default-exit-ports/
+#: (content/operators/default-exit-ports/contents+en.lrquestion.description)
+msgid "reject 10.0.0.0/8"
+msgstr ""
+
+#: https//support.torproject.org/operators/default-exit-ports/
+#: (content/operators/default-exit-ports/contents+en.lrquestion.description)
+msgid "reject 172.16.0.0/12"
+msgstr ""
+
+#: https//support.torproject.org/operators/default-exit-ports/
+#: (content/operators/default-exit-ports/contents+en.lrquestion.description)
+msgid "reject *:25"
+msgstr ""
+
+#: https//support.torproject.org/operators/default-exit-ports/
+#: (content/operators/default-exit-ports/contents+en.lrquestion.description)
+msgid "reject *:119"
+msgstr ""
+
+#: https//support.torproject.org/operators/default-exit-ports/
+#: (content/operators/default-exit-ports/contents+en.lrquestion.description)
+msgid "reject *:135-139"
+msgstr ""
+
+#: https//support.torproject.org/operators/default-exit-ports/
+#: (content/operators/default-exit-ports/contents+en.lrquestion.description)
+msgid "reject *:445"
+msgstr ""
+
+#: https//support.torproject.org/operators/default-exit-ports/
+#: (content/operators/default-exit-ports/contents+en.lrquestion.description)
+msgid "reject *:563"
+msgstr ""
+
+#: https//support.torproject.org/operators/default-exit-ports/
+#: (content/operators/default-exit-ports/contents+en.lrquestion.description)
+msgid "reject *:1214"
+msgstr ""
+
+#: https//support.torproject.org/operators/default-exit-ports/
+#: (content/operators/default-exit-ports/contents+en.lrquestion.description)
+msgid "reject *:4661-4666"
+msgstr ""
+
+#: https//support.torproject.org/operators/default-exit-ports/
+#: (content/operators/default-exit-ports/contents+en.lrquestion.description)
+msgid "reject *:6346-6429"
+msgstr ""
+
+#: https//support.torproject.org/operators/default-exit-ports/
+#: (content/operators/default-exit-ports/contents+en.lrquestion.description)
+msgid "reject *:6699"
+msgstr ""
+
+#: https//support.torproject.org/operators/default-exit-ports/
+#: (content/operators/default-exit-ports/contents+en.lrquestion.description)
+msgid "reject *:6881-6999"
+msgstr ""
+
+#: https//support.torproject.org/operators/default-exit-ports/
+#: (content/operators/default-exit-ports/contents+en.lrquestion.description)
+msgid "accept *:*"
+msgstr ""
+
+#: https//support.torproject.org/operators/default-exit-ports/
+#: (content/operators/default-exit-ports/contents+en.lrquestion.description)
+msgid ""
+"[1]: "
+"https://gitlab.torproject.org/tpo/core/tor/-/blob/release-0.4.6/src/core/or/policies.c#L85"
+msgstr ""
+
+#: https//support.torproject.org/operators/default-exit-ports/
+#: (content/operators/default-exit-ports/contents+en.lrquestion.description)
+msgid ""
+"[2]: "
+"https://gitlab.torproject.org/tpo/core/tor/-/blob/release-0.4.6/src/core/or/policies.c#L1901"
+msgstr ""
+
+#: https//support.torproject.org/operators/default-exit-ports/
+#: (content/operators/default-exit-ports/contents+en.lrquestion.description)
+msgid "[3]: https://gitlab.torproject.org/tpo/core/tor/-/tree/release-0.4.6/"
+msgstr ""
+
#: https//support.torproject.org/operators/dynamic-ip/
#: (content/operators/dynamic-ip/contents+en.lrquestion.title)
msgid "Can I run a Tor relay using a dynamic IP address?"
@@ -6740,21 +7659,6 @@ msgid ""
"into hibernation, signaled by this entry in the log:"
msgstr ""
-#: https//support.torproject.org/operators/hibernation/
-#: (content/operators/hibernation/contents+en.lrquestion.description)
-#: https//support.torproject.org/operators/limit-total-bandwidth/
-#: (content/operators/limit-total-bandwidth/contents+en.lrquestion.description)
-#: https//support.torproject.org/misc/bug-or-feedback/
-#: (content/misc/bug-or-feedback/contents+en.lrquestion.description)
-#: https//support.torproject.org/get-in-touch/why-i-cant-join-tor-channels/
-#: (content/get-in-touch/why-i-cant-join-tor-channels/contents+en.lrquestion.description)
-#: https//support.torproject.org/apt/tor-deb-repo/
-#: (content/apt/apt-1/contents+en.lrquestion.description)
-#: https//support.torproject.org/apt/apt-over-tor/
-#: (content/apt/apt-3/contents+en.lrquestion.description)
-msgid "```"
-msgstr "```"
-
#: https//support.torproject.org/operators/hibernation/
#: (content/operators/hibernation/contents+en.lrquestion.description)
msgid "Bandwidth soft limit reached; commencing hibernation."
@@ -8992,6 +9896,131 @@ msgstr ""
msgid "sub 4096R/C00942E4 2017-03-13"
msgstr ""
+#: https//support.torproject.org/misc/check-socks-dns-leaks/
+#: (content/misc/check-socks-dns-leaks/contents+en.lrquestion.title)
+msgid ""
+"How do I check if my application that uses SOCKS is leaking DNS requests?"
+msgstr ""
+
+#: https//support.torproject.org/misc/check-socks-dns-leaks/
+#: (content/misc/check-socks-dns-leaks/contents+en.lrquestion.description)
+msgid ""
+"Even if your application is using the correct variant of the SOCKS protocol,"
+" there is still a risk that it could be leaking DNS queries."
+msgstr ""
+
+#: https//support.torproject.org/misc/check-socks-dns-leaks/
+#: (content/misc/check-socks-dns-leaks/contents+en.lrquestion.description)
+msgid ""
+"This problem happens in Firefox extensions that resolve the destination "
+"hostname themselves, for example to show you its IP address, what country "
+"it's in, etc."
+msgstr ""
+
+#: https//support.torproject.org/misc/check-socks-dns-leaks/
+#: (content/misc/check-socks-dns-leaks/contents+en.lrquestion.description)
+msgid ""
+"If you suspect your application might behave like this, follow the "
+"instructions below to check."
+msgstr ""
+
+#: https//support.torproject.org/misc/check-socks-dns-leaks/
+#: (content/misc/check-socks-dns-leaks/contents+en.lrquestion.description)
+msgid ""
+"1. Add `TestSocks 1` to your [torrc file](https://support.torproject.org/tbb"
+"/tbb-editing-torrc/)."
+msgstr ""
+
+#: https//support.torproject.org/misc/check-socks-dns-leaks/
+#: (content/misc/check-socks-dns-leaks/contents+en.lrquestion.description)
+msgid ""
+"1. Start Tor, and point your program's SOCKS proxy settings to Tor's SOCKS5 "
+"server (`socks5://127.0.0.1:9050` by default)."
+msgstr ""
+
+#: https//support.torproject.org/misc/check-socks-dns-leaks/
+#: (content/misc/check-socks-dns-leaks/contents+en.lrquestion.description)
+msgid ""
+"1. Watch your logs as you use your application. For each socks connection, "
+"Tor will log a `notice` for safe connections, and a `warn` for connections "
+"leaking DNS requests."
+msgstr ""
+
+#: https//support.torproject.org/misc/check-socks-dns-leaks/
+#: (content/misc/check-socks-dns-leaks/contents+en.lrquestion.description)
+msgid ""
+"If you want to automatically disable all connections leaking DNS requests, "
+"set `SafeSocks 1` in your torrc file."
+msgstr ""
+
+#: https//support.torproject.org/misc/hide-exits/
+#: (content/misc/hide-exits/contents+en.lrquestion.title)
+msgid ""
+"You should hide the list of Tor relays, so people can't block the exits."
+msgstr ""
+
+#: https//support.torproject.org/misc/hide-exits/
+#: (content/misc/hide-exits/contents+en.lrquestion.description)
+msgid "There are a few reasons we don't:"
+msgstr ""
+
+#: https//support.torproject.org/misc/hide-exits/
+#: (content/misc/hide-exits/contents+en.lrquestion.description)
+msgid ""
+"1. We can't help but make the information available, since Tor clients need "
+"to use it to pick their paths."
+msgstr ""
+
+#: https//support.torproject.org/misc/hide-exits/
+#: (content/misc/hide-exits/contents+en.lrquestion.description)
+msgid "So if the \"blockers\" want it, they can get it anyway."
+msgstr ""
+
+#: https//support.torproject.org/misc/hide-exits/
+#: (content/misc/hide-exits/contents+en.lrquestion.description)
+msgid ""
+"Further, even if we didn't tell clients about the list of relays directly, "
+"somebody could still make a lot of connections through Tor to a test site "
+"and build a list of the addresses they see."
+msgstr ""
+
+#: https//support.torproject.org/misc/hide-exits/
+#: (content/misc/hide-exits/contents+en.lrquestion.description)
+msgid ""
+"1. If people want to block us, we believe that they should be allowed to do "
+"so."
+msgstr ""
+
+#: https//support.torproject.org/misc/hide-exits/
+#: (content/misc/hide-exits/contents+en.lrquestion.description)
+msgid ""
+"Obviously, we would prefer for everybody to allow Tor users to connect to "
+"them, but people have the right to decide who their services should allow "
+"connections from, and if they want to block anonymous users, they can."
+msgstr ""
+
+#: https//support.torproject.org/misc/hide-exits/
+#: (content/misc/hide-exits/contents+en.lrquestion.description)
+msgid ""
+"1. Being blockable also has tactical advantages: it may be a persuasive "
+"response to website maintainers who feel threatened by Tor."
+msgstr ""
+
+#: https//support.torproject.org/misc/hide-exits/
+#: (content/misc/hide-exits/contents+en.lrquestion.description)
+msgid ""
+"Giving them the option may inspire them to stop and think about whether they"
+" really want to eliminate private access to their system, and if not, what "
+"other options they might have."
+msgstr ""
+
+#: https//support.torproject.org/misc/hide-exits/
+#: (content/misc/hide-exits/contents+en.lrquestion.description)
+msgid ""
+"The time they might otherwise have spent blocking Tor, they may instead "
+"spend rethinking their overall approach to privacy and anonymity."
+msgstr ""
+
#: https//support.torproject.org/misc/menu/
#: (content/misc/menu/contents+en.lrquestion.description)
msgid "About"
@@ -9576,56 +10605,20 @@ msgstr ""
#: https//support.torproject.org/get-in-touch/why-i-cant-join-tor-channels/
#: (content/get-in-touch/why-i-cant-join-tor-channels/contents+en.lrquestion.description)
msgid ""
-"Then, to complete the registration and ultimately gain access to the #tor-"
-"project channel, your nickname must be **verified**."
-msgstr ""
-
-#: https//support.torproject.org/get-in-touch/why-i-cant-join-tor-channels/
-#: (content/get-in-touch/why-i-cant-join-tor-channels/contents+en.lrquestion.description)
-msgid ""
-"1. To verify your nick, open a new browser window and go to "
-"https://webchat.oftc.net/?channels=tor."
-msgstr ""
-
-#: https//support.torproject.org/get-in-touch/why-i-cant-join-tor-channels/
-#: (content/get-in-touch/why-i-cant-join-tor-channels/contents+en.lrquestion.description)
-msgid "2. Log in with your IRC nickname and password."
-msgstr ""
-
-#: https//support.torproject.org/get-in-touch/why-i-cant-join-tor-channels/
-#: (content/get-in-touch/why-i-cant-join-tor-channels/contents+en.lrquestion.description)
-msgid ""
-"3. Look for the word **verify** and log in there. It may appear that nothing"
-" has happened. Look at the top of the page, and there will be a column "
-"called **Account**."
-msgstr ""
-
-#: https//support.torproject.org/get-in-touch/why-i-cant-join-tor-channels/
-#: (content/get-in-touch/why-i-cant-join-tor-channels/contents+en.lrquestion.description)
-msgid "4. Click on **Account**."
-msgstr ""
-
-#: https//support.torproject.org/get-in-touch/why-i-cant-join-tor-channels/
-#: (content/get-in-touch/why-i-cant-join-tor-channels/contents+en.lrquestion.description)
-msgid ""
-"5. Click on the small sentence at the bottom of the square that says: Verify"
-" account."
-msgstr ""
-
-#: https//support.torproject.org/get-in-touch/why-i-cant-join-tor-channels/
-#: (content/get-in-touch/why-i-cant-join-tor-channels/contents+en.lrquestion.description)
-msgid "6. Fill out the Captcha that pops up, and click ok."
+"After registering your nickname, to gain access to the #tor-project and "
+"other protected channels, your nickname must be **verified**."
msgstr ""
#: https//support.torproject.org/get-in-touch/why-i-cant-join-tor-channels/
#: (content/get-in-touch/why-i-cant-join-tor-channels/contents+en.lrquestion.description)
msgid ""
-"7. A tiny message will appear: \"Your NickServ account has been verified.\""
+"1. Go to https://services.oftc.net/ and follow the steps in the '*To verify "
+"your account*' section"
msgstr ""
#: https//support.torproject.org/get-in-touch/why-i-cant-join-tor-channels/
#: (content/get-in-touch/why-i-cant-join-tor-channels/contents+en.lrquestion.description)
-msgid "8. Go back to the IRC webpage where you are logged in and type:"
+msgid "2. Go back to the IRC webpage where you are logged in and type:"
msgstr ""
#: https//support.torproject.org/get-in-touch/why-i-cant-join-tor-channels/
@@ -9635,12 +10628,12 @@ msgstr ""
#: https//support.torproject.org/get-in-touch/why-i-cant-join-tor-channels/
#: (content/get-in-touch/why-i-cant-join-tor-channels/contents+en.lrquestion.description)
-msgid "9. Click ENTER."
+msgid "3. Click ENTER."
msgstr ""
#: https//support.torproject.org/get-in-touch/why-i-cant-join-tor-channels/
#: (content/get-in-touch/why-i-cant-join-tor-channels/contents+en.lrquestion.description)
-msgid "10. If all is well, you will receive a message that says:"
+msgid "4. If all is well, you will receive a message that says:"
msgstr ""
#: https//support.torproject.org/get-in-touch/why-i-cant-join-tor-channels/
@@ -9781,18 +10774,22 @@ msgstr "# apt install apt-transport-https"
#: https//support.torproject.org/apt/tor-deb-repo/
#: (content/apt/apt-1/contents+en.lrquestion.description)
msgid ""
-"#### 2. Add the following entries to `/etc/apt/sources.list` or a new file "
-"in `/etc/apt/sources.list.d/`"
+"#### 2. Create a new file in `/etc/apt/sources.list.d/` named `tor.list`. "
+"Add the following entries:"
msgstr ""
#: https//support.torproject.org/apt/tor-deb-repo/
#: (content/apt/apt-1/contents+en.lrquestion.description)
-msgid "deb https://deb.torproject.org/torproject.org <DISTRIBUTION> main"
+msgid ""
+"deb [signed-by=/usr/share/keyrings/tor-archive-keyring.gpg] "
+"https://deb.torproject.org/torproject.org <DISTRIBUTION> main"
msgstr ""
#: https//support.torproject.org/apt/tor-deb-repo/
#: (content/apt/apt-1/contents+en.lrquestion.description)
-msgid "deb-src https://deb.torproject.org/torproject.org <DISTRIBUTION> main"
+msgid ""
+"deb-src [signed-by=/usr/share/keyrings/tor-archive-keyring.gpg] "
+"https://deb.torproject.org/torproject.org <DISTRIBUTION> main"
msgstr ""
#: https//support.torproject.org/apt/tor-deb-repo/
@@ -9806,14 +10803,16 @@ msgstr ""
#: https//support.torproject.org/apt/tor-deb-repo/
#: (content/apt/apt-1/contents+en.lrquestion.description)
msgid ""
-"deb https://deb.torproject.org/torproject.org tor-"
+"deb [signed-by=/usr/share/keyrings/tor-archive-keyring.gpg] "
+"https://deb.torproject.org/torproject.org tor-"
"experimental-0.4.6.x-<DISTRIBUTION> main"
msgstr ""
#: https//support.torproject.org/apt/tor-deb-repo/
#: (content/apt/apt-1/contents+en.lrquestion.description)
msgid ""
-"deb-src https://deb.torproject.org/torproject.org tor-"
+"deb-src [signed-by=/usr/share/keyrings/tor-archive-keyring.gpg] "
+"https://deb.torproject.org/torproject.org tor-"
"experimental-0.4.6.x-<DISTRIBUTION> main"
msgstr ""
@@ -9825,15 +10824,17 @@ msgstr ""
#: https//support.torproject.org/apt/tor-deb-repo/
#: (content/apt/apt-1/contents+en.lrquestion.description)
msgid ""
-"deb https://deb.torproject.org/torproject.org tor-nightly-"
-"master-<DISTRIBUTION> main"
+"deb [signed-by=/usr/share/keyrings/tor-archive-keyring.gpg] "
+"https://deb.torproject.org/torproject.org tor-nightly-master-<DISTRIBUTION> "
+"main"
msgstr ""
#: https//support.torproject.org/apt/tor-deb-repo/
#: (content/apt/apt-1/contents+en.lrquestion.description)
msgid ""
-"deb-src https://deb.torproject.org/torproject.org tor-nightly-"
-"master-<DISTRIBUTION> main"
+"deb-src [signed-by=/usr/share/keyrings/tor-archive-keyring.gpg] "
+"https://deb.torproject.org/torproject.org tor-nightly-master-<DISTRIBUTION> "
+"main"
msgstr ""
#: https//support.torproject.org/apt/tor-deb-repo/
@@ -9854,13 +10855,15 @@ msgstr ""
#: https//support.torproject.org/apt/tor-deb-repo/
#: (content/apt/apt-1/contents+en.lrquestion.description)
msgid ""
-"deb [arch=amd64] https://deb.torproject.org/torproject.org focal main"
+"deb [arch=amd64 signed-by=/usr/share/keyrings/tor-archive-keyring.gpg] "
+"https://deb.torproject.org/torproject.org focal main"
msgstr ""
#: https//support.torproject.org/apt/tor-deb-repo/
#: (content/apt/apt-1/contents+en.lrquestion.description)
msgid ""
-"deb-src [arch=amd64] https://deb.torproject.org/torproject.org focal main"
+"deb-src [arch=amd64 signed-by=/usr/share/keyrings/tor-archive-keyring.gpg] "
+"https://deb.torproject.org/torproject.org focal main"
msgstr ""
#: https//support.torproject.org/apt/tor-deb-repo/
@@ -9880,26 +10883,17 @@ msgstr ""
#: (content/apt/apt-1/contents+en.lrquestion.description)
msgid ""
"#### 3. Then add the gpg key used to sign the packages by running the "
-"following commands at your command prompt"
+"following command at your command prompt:"
msgstr ""
#: https//support.torproject.org/apt/tor-deb-repo/
#: (content/apt/apt-1/contents+en.lrquestion.description)
msgid ""
-"# wget -qO- "
+"# wget -O- "
"https://deb.torproject.org/torproject.org/A3C4F0F979CAA22CDBA8F512EE8CBC9E886DDD89.asc"
-" | gpg --import"
+" | gpg --dearmor | tee /usr/share/keyrings/tor-archive-keyring.gpg "
+">/dev/null"
msgstr ""
-"# wget -qO- "
-"https://deb.torproject.org/torproject.org/A3C4F0F979CAA22CDBA8F512EE8CBC9E886DDD89.asc"
-" | gpg --import"
-
-#: https//support.torproject.org/apt/tor-deb-repo/
-#: (content/apt/apt-1/contents+en.lrquestion.description)
-msgid ""
-"# gpg --export A3C4F0F979CAA22CDBA8F512EE8CBC9E886DDD89 | apt-key add -"
-msgstr ""
-"# gpg --export A3C4F0F979CAA22CDBA8F512EE8CBC9E886DDD89 | apt-key add -"
#: https//support.torproject.org/apt/tor-deb-repo/
#: (content/apt/apt-1/contents+en.lrquestion.description)
@@ -11505,6 +12499,82 @@ msgid ""
"doesn't change IP address over the day."
msgstr ""
+#: https//support.torproject.org/alternate-designs/block-websites/
+#: (content/alternate-designs/block-websites/contents+en.lrquestion.title)
+msgid "Exit policies should be able to block websites, not just IP addresses."
+msgstr ""
+
+#: https//support.torproject.org/alternate-designs/block-websites/
+#: (content/alternate-designs/block-websites/contents+en.lrquestion.description)
+msgid ""
+"It would be nice to let relay operators say things like `reject "
+"www.slashdot.org` in their exit policies, rather than requiring them to "
+"learn all the IP address space that could be covered by the site (and then "
+"also blocking other sites at those IP addresses)."
+msgstr ""
+
+#: https//support.torproject.org/alternate-designs/block-websites/
+#: (content/alternate-designs/block-websites/contents+en.lrquestion.description)
+msgid "There are two problems, though."
+msgstr ""
+
+#: https//support.torproject.org/alternate-designs/block-websites/
+#: (content/alternate-designs/block-websites/contents+en.lrquestion.description)
+msgid "First, users could still get around these blocks."
+msgstr ""
+
+#: https//support.torproject.org/alternate-designs/block-websites/
+#: (content/alternate-designs/block-websites/contents+en.lrquestion.description)
+msgid ""
+"For example, they could request the IP address rather than the hostname when"
+" they exit from the Tor network."
+msgstr ""
+
+#: https//support.torproject.org/alternate-designs/block-websites/
+#: (content/alternate-designs/block-websites/contents+en.lrquestion.description)
+msgid ""
+"This means operators would still need to learn all the IP addresses for the "
+"destinations in question."
+msgstr ""
+
+#: https//support.torproject.org/alternate-designs/block-websites/
+#: (content/alternate-designs/block-websites/contents+en.lrquestion.description)
+msgid ""
+"The second problem is that it would allow remote attackers to censor "
+"arbitrary sites."
+msgstr ""
+
+#: https//support.torproject.org/alternate-designs/block-websites/
+#: (content/alternate-designs/block-websites/contents+en.lrquestion.description)
+msgid ""
+"For example, if a Tor operator blocks www1.slashdot.org, and then some "
+"attacker poisons the Tor relay's DNS or otherwise changes that hostname to "
+"resolve to the IP address for a major news site, then suddenly that Tor "
+"relay is blocking the news site."
+msgstr ""
+
+#: https//support.torproject.org/alternate-designs/let-the-network-pick-the-path/
+#: (content/alternate-designs/let-the-network-pick-the-path/contents+en.lrquestion.title)
+msgid "You should let the network pick the path, not the client."
+msgstr ""
+
+#: https//support.torproject.org/alternate-designs/let-the-network-pick-the-path/
+#: (content/alternate-designs/let-the-network-pick-the-path/contents+en.lrquestion.description)
+msgid "No, you cannot trust the network to pick the path."
+msgstr ""
+
+#: https//support.torproject.org/alternate-designs/let-the-network-pick-the-path/
+#: (content/alternate-designs/let-the-network-pick-the-path/contents+en.lrquestion.description)
+msgid "Malicious relays could route you through their colluding friends."
+msgstr ""
+
+#: https//support.torproject.org/alternate-designs/let-the-network-pick-the-path/
+#: (content/alternate-designs/let-the-network-pick-the-path/contents+en.lrquestion.description)
+msgid ""
+"This would give an adversary the ability to watch all of your traffic end to"
+" end."
+msgstr ""
+
#: lego/templates/banner.html:3 lego/templates/banner.html:5
#: templates/banner.html:3 templates/banner.html:5
msgid "Close banner"
@@ -11535,8 +12605,8 @@ msgid "DONATE NOW"
msgstr ""
#: lego/templates/footer.html:13 lego/templates/footer.html:22
-#: lego/templates/navbar.html:83 templates/footer.html:13
-#: templates/footer.html:22 templates/navbar.html:83
+#: lego/templates/navbar.html:95 templates/footer.html:13
+#: templates/footer.html:22 templates/navbar.html:95
msgid "Download Tor Browser"
msgstr "Pakua kivinjari cha Tor"
diff --git a/contents+tr.po b/contents+tr.po
index 9f323da846..5ca4186be5 100644
--- a/contents+tr.po
+++ b/contents+tr.po
@@ -12,7 +12,7 @@ msgid ""
msgstr ""
"Project-Id-Version: PACKAGE VERSION\n"
"Report-Msgid-Bugs-To: \n"
-"POT-Creation-Date: 2021-08-25 11:14+CET\n"
+"POT-Creation-Date: 2021-09-01 12:20+CET\n"
"PO-Revision-Date: 2018-10-02 22:41+0000\n"
"Last-Translator: Kaya Zeren <kayazeren at gmail.com>, 2021\n"
"Language-Team: Turkish (https://www.transifex.com/otf/teams/1519/tr/)\n"
@@ -145,6 +145,11 @@ msgstr "Kötüye Kullanım SSS"
msgid "Tor Metrics"
msgstr "Tor Metrics"
+#: https//support.torproject.org/alternate-designs/
+#: (content/alternate-designs/contents+en.lrtopic.title)
+msgid "Alternate Designs We Don't Do (Yet)"
+msgstr ""
+
#: https//support.torproject.org/glossary/add-on-extension-or-plugin/
#: (content/glossary/add-on-extension-or-plugin/contents+en.lrword.term)
msgid "add-on, extension, or plugin"
@@ -2531,6 +2536,62 @@ msgstr ""
"Tor + VPN hakkında ayrıntılı bilgi almak için [wiki "
"sayfamıza](https://trac.torproject.org/projects/tor/wiki/doc/TorPlusVPN)."
+#: https//support.torproject.org/faq/relay-donations/
+#: (content/faq/relay-donations/contents+en.lrquestion.title)
+msgid "Can I donate for a relay rather than run my own?"
+msgstr ""
+
+#: https//support.torproject.org/faq/relay-donations/
+#: (content/faq/relay-donations/contents+en.lrquestion.description)
+msgid ""
+"Sure! We have a [list of organizations that run Tor "
+"relays](https://community.torproject.org/relay/community-resources/relay-"
+"associations/) that are happy to turn your donations into better speed and "
+"anonymity for the Tor network."
+msgstr ""
+
+#: https//support.torproject.org/faq/relay-donations/
+#: (content/faq/relay-donations/contents+en.lrquestion.description)
+msgid ""
+"These organizations are not the same as [The Tor Project, "
+"Inc](https://donate.torproject.org/), but we consider that a good thing."
+msgstr ""
+
+#: https//support.torproject.org/faq/relay-donations/
+#: (content/faq/relay-donations/contents+en.lrquestion.description)
+msgid "They're run by nice people who are part of the Tor community."
+msgstr ""
+"Tor topluluÄunun bir parçası olan iyi insanlar tarafından yöneitliyorlar."
+
+#: https//support.torproject.org/faq/relay-donations/
+#: (content/faq/relay-donations/contents+en.lrquestion.description)
+msgid ""
+"Note that there can be a tradeoff here between anonymity and performance."
+msgstr ""
+
+#: https//support.torproject.org/faq/relay-donations/
+#: (content/faq/relay-donations/contents+en.lrquestion.description)
+msgid ""
+"The Tor network's anonymity comes in part from diversity, so if you are in a"
+" position to run your own relay, you will be improving Tor's anonymity more "
+"than by donating."
+msgstr ""
+
+#: https//support.torproject.org/faq/relay-donations/
+#: (content/faq/relay-donations/contents+en.lrquestion.description)
+msgid ""
+"At the same time though, economies of scale for bandwidth mean that "
+"combining many small donations into several larger relays is more efficient "
+"at improving network performance."
+msgstr ""
+
+#: https//support.torproject.org/faq/relay-donations/
+#: (content/faq/relay-donations/contents+en.lrquestion.description)
+msgid ""
+"Improving anonymity and improving performance are both worthwhile goals, so "
+"however you can help is great!"
+msgstr ""
+
#: https//support.torproject.org/faq/staying-anonymous/
#: (content/faq/staying-anonymous/contents+en.lrquestion.title)
msgid "Am I totally anonymous if I use Tor?"
@@ -2908,6 +2969,61 @@ msgstr ""
"belgelemek](https://community.torproject.org/) için yardımınıza gerek "
"duyuyoruz."
+#: https//support.torproject.org/about/attacks-on-onion-routing/
+#: (content/about/attacks-on-onion-routing/contents+en.lrquestion.title)
+msgid "What attacks remain against onion routing?"
+msgstr ""
+
+#: https//support.torproject.org/about/attacks-on-onion-routing/
+#: (content/about/attacks-on-onion-routing/contents+en.lrquestion.description)
+msgid ""
+"As mentioned above, it is possible for an observer who can view both you and"
+" either the destination website or your Tor exit node to correlate timings "
+"of your traffic as it enters the Tor network and also as it exits."
+msgstr ""
+
+#: https//support.torproject.org/about/attacks-on-onion-routing/
+#: (content/about/attacks-on-onion-routing/contents+en.lrquestion.description)
+msgid "Tor does not defend against such a threat model."
+msgstr ""
+
+#: https//support.torproject.org/about/attacks-on-onion-routing/
+#: (content/about/attacks-on-onion-routing/contents+en.lrquestion.description)
+msgid ""
+"In a more limited sense, note that if a censor or law enforcement agency has"
+" the ability to obtain specific observation of parts of the network, it is "
+"possible for them to verify a suspicion that you talk regularly to your "
+"friend by observing traffic at both ends and correlating the timing of only "
+"that traffic."
+msgstr ""
+
+#: https//support.torproject.org/about/attacks-on-onion-routing/
+#: (content/about/attacks-on-onion-routing/contents+en.lrquestion.description)
+msgid ""
+"Again, this is only useful to verify that parties already suspected of "
+"communicating with one another are doing so."
+msgstr ""
+
+#: https//support.torproject.org/about/attacks-on-onion-routing/
+#: (content/about/attacks-on-onion-routing/contents+en.lrquestion.description)
+msgid ""
+"In most countries, the suspicion required to obtain a warrant already "
+"carries more weight than timing correlation would provide."
+msgstr ""
+
+#: https//support.torproject.org/about/attacks-on-onion-routing/
+#: (content/about/attacks-on-onion-routing/contents+en.lrquestion.description)
+msgid ""
+"Furthermore, since Tor reuses circuits for multiple TCP connections, it is "
+"possible to associate non anonymous and anonymous traffic at a given exit "
+"node, so be careful about what applications you run concurrently over Tor."
+msgstr ""
+
+#: https//support.torproject.org/about/attacks-on-onion-routing/
+#: (content/about/attacks-on-onion-routing/contents+en.lrquestion.description)
+msgid "Perhaps even run separate Tor clients for these applications."
+msgstr ""
+
#: https//support.torproject.org/about/backdoor/
#: (content/about/backdoor/contents+en.lrquestion.title)
msgid "Is there a backdoor in Tor?"
@@ -3079,6 +3195,43 @@ msgstr ""
"Tor uygulamasını diÄer tarayıcılar ile kullanmak [tehlikeli olabilir ve "
"önerilmez](/tr/tbb/tbb-9/)."
+#: https//support.torproject.org/about/change-paths/
+#: (content/about/change-paths/contents+en.lrquestion.title)
+msgid "How often does Tor change its paths?"
+msgstr ""
+
+#: https//support.torproject.org/about/change-paths/
+#: (content/about/change-paths/contents+en.lrquestion.description)
+msgid ""
+"Tor will reuse the same circuit for new TCP streams for 10 minutes, as long "
+"as the circuit is working fine."
+msgstr ""
+
+#: https//support.torproject.org/about/change-paths/
+#: (content/about/change-paths/contents+en.lrquestion.description)
+msgid "(If the circuit fails, Tor will switch to a new circuit immediately.)"
+msgstr ""
+
+#: https//support.torproject.org/about/change-paths/
+#: (content/about/change-paths/contents+en.lrquestion.description)
+msgid ""
+"But note that a single TCP stream (e.g. a long IRC connection) will stay on "
+"the same circuit forever."
+msgstr ""
+
+#: https//support.torproject.org/about/change-paths/
+#: (content/about/change-paths/contents+en.lrquestion.description)
+msgid "We don't rotate individual streams from one circuit to the next."
+msgstr ""
+
+#: https//support.torproject.org/about/change-paths/
+#: (content/about/change-paths/contents+en.lrquestion.description)
+msgid ""
+"Otherwise, an adversary with a partial view of the network would be given "
+"many chances over time to link you to your destination, rather than just one"
+" chance."
+msgstr ""
+
#: https//support.torproject.org/about/distribute-tor/
#: (content/about/distribute-tor/contents+en.lrquestion.title)
msgid "Can I distribute Tor?"
@@ -3197,6 +3350,133 @@ msgstr ""
"Ayrıntılı bilgi almak için [marka "
"SSS](https://www.torproject.org/about/trademark/) bölümüne bakabilirsiniz."
+#: https//support.torproject.org/about/entry-guards/
+#: (content/about/entry-guards/contents+en.lrquestion.title)
+msgid "What are Entry Guards?"
+msgstr ""
+
+#: https//support.torproject.org/about/entry-guards/
+#: (content/about/entry-guards/contents+en.lrquestion.description)
+msgid ""
+"Tor (like all current practical low-latency anonymity designs) fails when "
+"the attacker can see both ends of the communications channel."
+msgstr ""
+
+#: https//support.torproject.org/about/entry-guards/
+#: (content/about/entry-guards/contents+en.lrquestion.description)
+msgid ""
+"For example, suppose the attacker controls or watches the Tor relay you "
+"choose to enter the network, and also controls or watches the website you "
+"visit."
+msgstr ""
+
+#: https//support.torproject.org/about/entry-guards/
+#: (content/about/entry-guards/contents+en.lrquestion.description)
+msgid ""
+"In this case, the research community knows no practical low-latency design "
+"that can reliably stop the attacker from correlating volume and timing "
+"information on the two sides."
+msgstr ""
+
+#: https//support.torproject.org/about/entry-guards/
+#: (content/about/entry-guards/contents+en.lrquestion.description)
+msgid "So, what should we do?"
+msgstr ""
+
+#: https//support.torproject.org/about/entry-guards/
+#: (content/about/entry-guards/contents+en.lrquestion.description)
+msgid "Suppose the attacker controls, or can observe, C relays."
+msgstr ""
+
+#: https//support.torproject.org/about/entry-guards/
+#: (content/about/entry-guards/contents+en.lrquestion.description)
+msgid "Suppose there are N relays total."
+msgstr ""
+
+#: https//support.torproject.org/about/entry-guards/
+#: (content/about/entry-guards/contents+en.lrquestion.description)
+msgid ""
+"If you select new entry and exit relays each time you use the network, the "
+"attacker will be able to correlate all traffic you send with probability "
+"around (c/n)2."
+msgstr ""
+
+#: https//support.torproject.org/about/entry-guards/
+#: (content/about/entry-guards/contents+en.lrquestion.description)
+msgid ""
+"But profiling is, for most users, as bad as being traced all the time: they "
+"want to do something often without an attacker noticing, and the attacker "
+"noticing once is as bad as the attacker noticing more often."
+msgstr ""
+
+#: https//support.torproject.org/about/entry-guards/
+#: (content/about/entry-guards/contents+en.lrquestion.description)
+msgid ""
+"Thus, choosing many random entries and exits gives the user no chance of "
+"escaping profiling by this kind of attacker."
+msgstr ""
+
+#: https//support.torproject.org/about/entry-guards/
+#: (content/about/entry-guards/contents+en.lrquestion.description)
+msgid ""
+"The solution is \"entry guards\": each Tor client selects a few relays at "
+"random to use as entry points, and uses only those relays for their first "
+"hop."
+msgstr ""
+
+#: https//support.torproject.org/about/entry-guards/
+#: (content/about/entry-guards/contents+en.lrquestion.description)
+msgid ""
+"If those relays are not controlled or observed, the attacker can't win, "
+"ever, and the user is secure."
+msgstr ""
+
+#: https//support.torproject.org/about/entry-guards/
+#: (content/about/entry-guards/contents+en.lrquestion.description)
+msgid ""
+"If those relays are observed or controlled by the attacker, the attacker "
+"sees a larger fraction of the user's traffic - but still the user is no more"
+" profiled than before."
+msgstr ""
+
+#: https//support.torproject.org/about/entry-guards/
+#: (content/about/entry-guards/contents+en.lrquestion.description)
+msgid ""
+"Thus, the user has some chance (on the order of (n-c)/n) of avoiding "
+"profiling, whereas they had none before."
+msgstr ""
+
+#: https//support.torproject.org/about/entry-guards/
+#: (content/about/entry-guards/contents+en.lrquestion.description)
+msgid ""
+"You can read more at [An Analysis of the Degradation of Anonymous "
+"Protocols](http://freehaven.net/anonbib/#wright02), [Defending Anonymous "
+"Communication Against Passive Logging "
+"Attacks](http://freehaven.net/anonbib/#wright03), and especially [Locating "
+"Hidden Servers](http://freehaven.net/anonbib/#hs-attack06)."
+msgstr ""
+
+#: https//support.torproject.org/about/entry-guards/
+#: (content/about/entry-guards/contents+en.lrquestion.description)
+msgid ""
+"Restricting your entry nodes may also help against attackers who want to run"
+" a few Tor nodes and easily enumerate all of the Tor user IP addresses."
+msgstr ""
+
+#: https//support.torproject.org/about/entry-guards/
+#: (content/about/entry-guards/contents+en.lrquestion.description)
+msgid ""
+"(Even though they can't learn what destinations the users are talking to, "
+"they still might be able to do bad things with just a list of users.)"
+msgstr ""
+
+#: https//support.torproject.org/about/entry-guards/
+#: (content/about/entry-guards/contents+en.lrquestion.description)
+msgid ""
+"However, that feature won't really become useful until we move to a "
+"\"directory guard\" design as well."
+msgstr ""
+
#: https//support.torproject.org/about/how-is-tor-different-from-other-proxies/
#: (content/about/how-is-tor-different-from-other-proxies/contents+en.lrquestion.title)
msgid "How is Tor different from other proxies?"
@@ -3402,6 +3682,162 @@ msgstr ""
"Buradaki [Tor ve HTTPS](/tr/https/https-1/) görselleÅtirmesine bakarak Tor "
"ile HTTPS etkileÅimini anlayabilirsiniz."
+#: https//support.torproject.org/about/key-management/
+#: (content/about/key-management/contents+en.lrquestion.title)
+msgid "Tell me about all the keys Tor uses"
+msgstr ""
+
+#: https//support.torproject.org/about/key-management/
+#: (content/about/key-management/contents+en.lrquestion.description)
+msgid ""
+"Tor uses a variety of different keys, with three goals in mind: 1) "
+"encryption to ensure privacy of data within the Tor network, 2) "
+"authentication so clients know they're talking to the relays they meant to "
+"talk to, and 3) signatures to make sure all clients know the same set of "
+"relays."
+msgstr ""
+
+#: https//support.torproject.org/about/key-management/
+#: (content/about/key-management/contents+en.lrquestion.description)
+msgid ""
+"**Encryption**: first, all connections in Tor use TLS link encryption, so "
+"observers can't look inside to see which circuit a given cell is intended "
+"for."
+msgstr ""
+
+#: https//support.torproject.org/about/key-management/
+#: (content/about/key-management/contents+en.lrquestion.description)
+msgid ""
+"Further, the Tor client establishes an ephemeral encryption key with each "
+"relay in the circuit; these extra layers of encryption mean that only the "
+"exit relay can read the cells."
+msgstr ""
+
+#: https//support.torproject.org/about/key-management/
+#: (content/about/key-management/contents+en.lrquestion.description)
+msgid ""
+"Both sides discard the circuit key when the circuit ends, so logging traffic"
+" and then breaking into the relay to discover the key won't work."
+msgstr ""
+
+#: https//support.torproject.org/about/key-management/
+#: (content/about/key-management/contents+en.lrquestion.description)
+msgid ""
+"**Authentication**: Every Tor relay has a public decryption key called the "
+"\"onion key\"."
+msgstr ""
+
+#: https//support.torproject.org/about/key-management/
+#: (content/about/key-management/contents+en.lrquestion.description)
+msgid "Each relay rotates its onion key once a week."
+msgstr ""
+
+#: https//support.torproject.org/about/key-management/
+#: (content/about/key-management/contents+en.lrquestion.description)
+msgid ""
+"When the Tor client establishes circuits, at each step it [demands that the "
+"Tor relay prove knowledge of its onion key](https://svn-"
+"archive.torproject.org/svn/projects/design-paper/tor-"
+"design.html#subsec:circuits)."
+msgstr ""
+
+#: https//support.torproject.org/about/key-management/
+#: (content/about/key-management/contents+en.lrquestion.description)
+msgid ""
+"That way the first node in the path can't just spoof the rest of the path."
+msgstr ""
+
+#: https//support.torproject.org/about/key-management/
+#: (content/about/key-management/contents+en.lrquestion.description)
+msgid ""
+"Because the Tor client chooses the path, it can make sure to get Tor's "
+"\"distributed trust\" property: no single relay in the path can know about "
+"both the client and what the client is doing."
+msgstr ""
+
+#: https//support.torproject.org/about/key-management/
+#: (content/about/key-management/contents+en.lrquestion.description)
+msgid ""
+"**Coordination**: How do clients know what the relays are, and how do they "
+"know that they have the right keys for them?"
+msgstr ""
+
+#: https//support.torproject.org/about/key-management/
+#: (content/about/key-management/contents+en.lrquestion.description)
+msgid "Each relay has a long-term public signing key called the \"identity key\"."
+msgstr ""
+
+#: https//support.torproject.org/about/key-management/
+#: (content/about/key-management/contents+en.lrquestion.description)
+msgid "Each directory authority additionally has a \"directory signing key\"."
+msgstr ""
+
+#: https//support.torproject.org/about/key-management/
+#: (content/about/key-management/contents+en.lrquestion.description)
+msgid ""
+"The directory authorities [provide a signed "
+"list](https://gitweb.torproject.org/torspec.git/tree/dir-spec.txt) of all "
+"the known relays, and in that list are a set of certificates from each relay"
+" (self-signed by their identity key) specifying their keys, locations, exit "
+"policies, and so on."
+msgstr ""
+
+#: https//support.torproject.org/about/key-management/
+#: (content/about/key-management/contents+en.lrquestion.description)
+msgid ""
+"So unless the adversary can control a majority of the directory authorities "
+"(as of 2021 there are 10 directory authorities), they can't trick the Tor "
+"client into using other Tor relays."
+msgstr ""
+
+#: https//support.torproject.org/about/key-management/
+#: (content/about/key-management/contents+en.lrquestion.description)
+msgid "How do clients know what the directory authorities are?"
+msgstr ""
+
+#: https//support.torproject.org/about/key-management/
+#: (content/about/key-management/contents+en.lrquestion.description)
+msgid ""
+"The Tor software comes with a built-in list of location and public key for "
+"each directory authority."
+msgstr ""
+
+#: https//support.torproject.org/about/key-management/
+#: (content/about/key-management/contents+en.lrquestion.description)
+msgid ""
+"So the only way to trick users into using a fake Tor network is to give them"
+" a specially modified version of the software."
+msgstr ""
+
+#: https//support.torproject.org/about/key-management/
+#: (content/about/key-management/contents+en.lrquestion.description)
+msgid "How do users know they've got the right software?"
+msgstr ""
+
+#: https//support.torproject.org/about/key-management/
+#: (content/about/key-management/contents+en.lrquestion.description)
+msgid ""
+"When we distribute the source code or a package, we digitally sign it with "
+"[GNU Privacy Guard](http://www.gnupg.org/). See the [instructions on how to "
+"check Tor Browser's signature](https://support.torproject.org/tbb/how-to-"
+"verify-signature/)."
+msgstr ""
+
+#: https//support.torproject.org/about/key-management/
+#: (content/about/key-management/contents+en.lrquestion.description)
+msgid ""
+"In order to be certain that it's really signed by us, you need to have met "
+"us in person and gotten a copy of our GPG key fingerprint, or you need to "
+"know somebody who has."
+msgstr ""
+
+#: https//support.torproject.org/about/key-management/
+#: (content/about/key-management/contents+en.lrquestion.description)
+msgid ""
+"If you're concerned about an attack on this level, we recommend you get "
+"involved with the security community and start meeting people."
+msgstr ""
+
#: https//support.torproject.org/about/no-data-scrubbing/
#: (content/about/no-data-scrubbing/contents+en.lrquestion.title)
msgid ""
@@ -3443,6 +3879,151 @@ msgstr ""
"Tor Browser formlara yazdıÄınız metinler ile ilgili herhangi bir Åey "
"yapamaz."
+#: https//support.torproject.org/about/protections/
+#: (content/about/protections/contents+en.lrquestion.title)
+msgid "What protections does Tor provide?"
+msgstr ""
+
+#: https//support.torproject.org/about/protections/
+#: (content/about/protections/contents+en.lrquestion.description)
+msgid ""
+"Internet communication is based on a store-and-forward model that can be "
+"understood in analogy to postal mail: Data is transmitted in blocks called "
+"IP datagrams or packets."
+msgstr ""
+
+#: https//support.torproject.org/about/protections/
+#: (content/about/protections/contents+en.lrquestion.description)
+msgid ""
+"Every packet includes a source IP address (of the sender) and a destination "
+"IP address (of the receiver), just as ordinary letters contain postal "
+"addresses of sender and receiver."
+msgstr ""
+
+#: https//support.torproject.org/about/protections/
+#: (content/about/protections/contents+en.lrquestion.description)
+msgid ""
+"The way from sender to receiver involves multiple hops of routers, where "
+"each router inspects the destination IP address and forwards the packet "
+"closer to its destination."
+msgstr ""
+
+#: https//support.torproject.org/about/protections/
+#: (content/about/protections/contents+en.lrquestion.description)
+msgid ""
+"Thus, every router between sender and receiver learns that the sender is "
+"communicating with the receiver."
+msgstr ""
+
+#: https//support.torproject.org/about/protections/
+#: (content/about/protections/contents+en.lrquestion.description)
+msgid ""
+"In particular, your local ISP is in the position to build a complete profile"
+" of your Internet usage."
+msgstr ""
+
+#: https//support.torproject.org/about/protections/
+#: (content/about/protections/contents+en.lrquestion.description)
+msgid ""
+"In addition, every server in the Internet that can see any of the packets "
+"can profile your behavior."
+msgstr ""
+
+#: https//support.torproject.org/about/protections/
+#: (content/about/protections/contents+en.lrquestion.description)
+msgid ""
+"The aim of Tor is to improve your privacy by sending your traffic through a "
+"series of proxies."
+msgstr ""
+
+#: https//support.torproject.org/about/protections/
+#: (content/about/protections/contents+en.lrquestion.description)
+msgid ""
+"Your communication is encrypted in multiple layers and routed via multiple "
+"hops through the Tor network to the final receiver."
+msgstr ""
+
+#: https//support.torproject.org/about/protections/
+#: (content/about/protections/contents+en.lrquestion.description)
+msgid ""
+"More details on this process can be found in this "
+"[visualization](https://support.torproject.org/https/https-1/)."
+msgstr ""
+
+#: https//support.torproject.org/about/protections/
+#: (content/about/protections/contents+en.lrquestion.description)
+msgid ""
+"Note that all your local ISP can observe now is that you are communicating "
+"with Tor nodes."
+msgstr ""
+
+#: https//support.torproject.org/about/protections/
+#: (content/about/protections/contents+en.lrquestion.description)
+msgid ""
+"Similarly, servers in the Internet just see that they are being contacted by"
+" Tor nodes."
+msgstr ""
+
+#: https//support.torproject.org/about/protections/
+#: (content/about/protections/contents+en.lrquestion.description)
+msgid "Generally speaking, Tor aims to solve three privacy problems:"
+msgstr ""
+
+#: https//support.torproject.org/about/protections/
+#: (content/about/protections/contents+en.lrquestion.description)
+msgid ""
+"First, Tor prevents websites and other services from learning your location,"
+" which they can use to build databases about your habits and interests."
+msgstr ""
+
+#: https//support.torproject.org/about/protections/
+#: (content/about/protections/contents+en.lrquestion.description)
+msgid ""
+"With Tor, your Internet connections don't give you away by default -- now "
+"you can have the ability to choose, for each connection, how much "
+"information to reveal."
+msgstr ""
+
+#: https//support.torproject.org/about/protections/
+#: (content/about/protections/contents+en.lrquestion.description)
+msgid ""
+"Second, Tor prevents people watching your traffic locally (such as your ISP "
+"or someone with access to your home wifi or router) from learning what "
+"information you're fetching and where you're fetching it from."
+msgstr ""
+
+#: https//support.torproject.org/about/protections/
+#: (content/about/protections/contents+en.lrquestion.description)
+msgid ""
+"It also stops them from deciding what you're allowed to learn and publish --"
+" if you can get to any part of the Tor network, you can reach any site on "
+"the Internet."
+msgstr ""
+
+#: https//support.torproject.org/about/protections/
+#: (content/about/protections/contents+en.lrquestion.description)
+msgid ""
+"Third, Tor routes your connection through more than one Tor relay so no "
+"single relay can learn what you're up to."
+msgstr ""
+
+#: https//support.torproject.org/about/protections/
+#: (content/about/protections/contents+en.lrquestion.description)
+msgid ""
+"Because these relays are run by different individuals or organizations, "
+"distributing trust provides more security than the old [one hop "
+"proxy](https://support.torproject.org/about/#how-is-tor-different-from-"
+"other-proxies) approach."
+msgstr ""
+
+#: https//support.torproject.org/about/protections/
+#: (content/about/protections/contents+en.lrquestion.description)
+msgid ""
+"Note, however, that there are situations where Tor fails to solve these "
+"privacy problems entirely: see the entry below on [remaining "
+"attacks](https://support.torproject.org/about/#attacks-on-onion-routing)."
+msgstr ""
+
#: https//support.torproject.org/about/what-is-tor/
#: (content/about/what-is-tor/contents+en.lrquestion.title)
msgid "What is Tor?"
@@ -6204,16 +6785,12 @@ msgstr ""
#: (content/tbb/tbb-47/contents+en.lrquestion.description)
msgid ""
"Also, read up on the HTTPProxyAuthenticator and HTTPSProxyAuthenticator "
-"options if your proxy requires auth. We only support basic auth currently, "
-"but if you need NTLM authentication, you may find [this post in the "
-"archives](https://archives.seul.org/or/talk/Jun-2005/msg00223.html) useful."
+"options if your [proxy requires auth.](https://developer.mozilla.org/en-"
+"US/docs/Web/HTTP/Headers/Proxy-Authenticate) We only support basic auth "
+"currently, but if you need NTLM authentication, you may find [this post in "
+"the archives](https://archives.seul.org/or/talk/Jun-2005/msg00223.html) "
+"useful."
msgstr ""
-"Vekil sunucunuz için kimlik doÄrulaması gerekiyorsa, HTTPProxyAuthenticator "
-"ve HTTPSProxyAuthenticator ayarlarının ne olduÄuna da bakın. Åu anda yalnız "
-"temel kimlik doÄrulama yöntemini destekliyoruz. Bununla birlikte NTLM kimlik"
-" doÄrulama yöntemini kullanmanız gerekiyorsa [bu arÅiv "
-"yazısı](https://archives.seul.org/or/talk/Jun-2005/msg00223.html) iÅinize "
-"yarayabilir."
#: https//support.torproject.org/tbb/tbb-47/
#: (content/tbb/tbb-47/contents+en.lrquestion.description)
@@ -6501,6 +7078,219 @@ msgstr ""
"torrc dosyasında `#` karakteri ile baÅlayan tüm satırların açıklama olarak "
"deÄerlendirileceÄini ve Tor yapılandırmasını etkilemeyeceÄini unutmayın."
+#: https//support.torproject.org/tbb/tbb-firewall-ports/
+#: (content/tbb/tbb-firewall-ports/contents+en.lrquestion.title)
+msgid "My firewall only allows a few outgoing ports"
+msgstr ""
+
+#: https//support.torproject.org/tbb/tbb-firewall-ports/
+#: (content/tbb/tbb-firewall-ports/contents+en.lrquestion.description)
+msgid ""
+"If your firewall works by blocking ports, then you can tell Tor to only use "
+"the ports when you start your Tor Browser."
+msgstr ""
+
+#: https//support.torproject.org/tbb/tbb-firewall-ports/
+#: (content/tbb/tbb-firewall-ports/contents+en.lrquestion.description)
+msgid ""
+"Or you can add the ports that your firewall permits by adding "
+"\"FascistFirewall 1\" to your torrc configuration file."
+msgstr ""
+
+#: https//support.torproject.org/tbb/tbb-firewall-ports/
+#: (content/tbb/tbb-firewall-ports/contents+en.lrquestion.description)
+msgid ""
+"By default, when you set this Tor assumes that your firewall allows only "
+"port 80 and port 443 (HTTP and HTTPS respectively)."
+msgstr ""
+
+#: https//support.torproject.org/tbb/tbb-firewall-ports/
+#: (content/tbb/tbb-firewall-ports/contents+en.lrquestion.description)
+msgid ""
+"You can select a different set of ports with the FirewallPorts torrc option."
+msgstr ""
+
+#: https//support.torproject.org/tbb/tbb-firewall-ports/
+#: (content/tbb/tbb-firewall-ports/contents+en.lrquestion.description)
+msgid ""
+"If you want to be more fine-grained with your controls, you can also use the"
+" ReachableAddresses config options, e.g.:"
+msgstr ""
+
+#: https//support.torproject.org/tbb/tbb-firewall-ports/
+#: (content/tbb/tbb-firewall-ports/contents+en.lrquestion.description)
+#: https//support.torproject.org/tbb/tbb-install-tor-central-server/
+#: (content/tbb/tbb-install-tor-central-server/contents+en.lrquestion.description)
+#: https//support.torproject.org/operators/default-exit-ports/
+#: (content/operators/default-exit-ports/contents+en.lrquestion.description)
+#: https//support.torproject.org/operators/hibernation/
+#: (content/operators/hibernation/contents+en.lrquestion.description)
+#: https//support.torproject.org/operators/limit-total-bandwidth/
+#: (content/operators/limit-total-bandwidth/contents+en.lrquestion.description)
+#: https//support.torproject.org/misc/bug-or-feedback/
+#: (content/misc/bug-or-feedback/contents+en.lrquestion.description)
+#: https//support.torproject.org/get-in-touch/why-i-cant-join-tor-channels/
+#: (content/get-in-touch/why-i-cant-join-tor-channels/contents+en.lrquestion.description)
+#: https//support.torproject.org/apt/tor-deb-repo/
+#: (content/apt/apt-1/contents+en.lrquestion.description)
+#: https//support.torproject.org/apt/apt-over-tor/
+#: (content/apt/apt-3/contents+en.lrquestion.description)
+msgid "```"
+msgstr "```"
+
+#: https//support.torproject.org/tbb/tbb-firewall-ports/
+#: (content/tbb/tbb-firewall-ports/contents+en.lrquestion.description)
+msgid "ReachableDirAddresses *:80"
+msgstr ""
+
+#: https//support.torproject.org/tbb/tbb-firewall-ports/
+#: (content/tbb/tbb-firewall-ports/contents+en.lrquestion.description)
+msgid "ReachableORAddresses *:443"
+msgstr ""
+
+#: https//support.torproject.org/tbb/tbb-install-tor-central-server/
+#: (content/tbb/tbb-install-tor-central-server/contents+en.lrquestion.title)
+msgid ""
+"Can I install Tor on a central server, and have my clients connect to it?"
+msgstr ""
+
+#: https//support.torproject.org/tbb/tbb-install-tor-central-server/
+#: (content/tbb/tbb-install-tor-central-server/contents+en.lrquestion.description)
+msgid ""
+"Yes. Tor can be configured as a client or a relay on another machine, and "
+"allow other machines to be able to connect to it for anonymity."
+msgstr ""
+
+#: https//support.torproject.org/tbb/tbb-install-tor-central-server/
+#: (content/tbb/tbb-install-tor-central-server/contents+en.lrquestion.description)
+msgid ""
+"This is most useful in an environment where many computers want a gateway of"
+" anonymity to the rest of the world."
+msgstr ""
+
+#: https//support.torproject.org/tbb/tbb-install-tor-central-server/
+#: (content/tbb/tbb-install-tor-central-server/contents+en.lrquestion.description)
+msgid ""
+"However, be forewarned that with this configuration, anyone within your "
+"private network (existing between you and the Tor client/relay) can see what"
+" traffic you are sending in clear text."
+msgstr ""
+
+#: https//support.torproject.org/tbb/tbb-install-tor-central-server/
+#: (content/tbb/tbb-install-tor-central-server/contents+en.lrquestion.description)
+msgid "The anonymity doesn't start until you get to the Tor relay."
+msgstr ""
+
+#: https//support.torproject.org/tbb/tbb-install-tor-central-server/
+#: (content/tbb/tbb-install-tor-central-server/contents+en.lrquestion.description)
+msgid ""
+"Because of this, if you are the controller of your domain and you know "
+"everything's locked down, you will be OK, but this configuration may not be "
+"suitable for large private networks where security is key all around."
+msgstr ""
+
+#: https//support.torproject.org/tbb/tbb-install-tor-central-server/
+#: (content/tbb/tbb-install-tor-central-server/contents+en.lrquestion.description)
+msgid ""
+"Configuration is simple, editing your torrc file's SocksListenAddress "
+"according to the following examples:"
+msgstr ""
+
+#: https//support.torproject.org/tbb/tbb-install-tor-central-server/
+#: (content/tbb/tbb-install-tor-central-server/contents+en.lrquestion.description)
+msgid "SocksListenAddress 127.0.0.1"
+msgstr ""
+
+#: https//support.torproject.org/tbb/tbb-install-tor-central-server/
+#: (content/tbb/tbb-install-tor-central-server/contents+en.lrquestion.description)
+msgid "SocksListenAddress 192.168.x.x:9100"
+msgstr ""
+
+#: https//support.torproject.org/tbb/tbb-install-tor-central-server/
+#: (content/tbb/tbb-install-tor-central-server/contents+en.lrquestion.description)
+msgid "SocksListenAddress 0.0.0.0:9100"
+msgstr ""
+
+#: https//support.torproject.org/tbb/tbb-install-tor-central-server/
+#: (content/tbb/tbb-install-tor-central-server/contents+en.lrquestion.description)
+msgid ""
+"You can state multiple listen addresses, in the case that you are part of "
+"several networks or subnets."
+msgstr ""
+
+#: https//support.torproject.org/tbb/tbb-install-tor-central-server/
+#: (content/tbb/tbb-install-tor-central-server/contents+en.lrquestion.description)
+msgid "SocksListenAddress 192.168.x.x:9100 #eth0"
+msgstr ""
+
+#: https//support.torproject.org/tbb/tbb-install-tor-central-server/
+#: (content/tbb/tbb-install-tor-central-server/contents+en.lrquestion.description)
+msgid "SocksListenAddress 10.x.x.x:9100 #eth1"
+msgstr ""
+
+#: https//support.torproject.org/tbb/tbb-install-tor-central-server/
+#: (content/tbb/tbb-install-tor-central-server/contents+en.lrquestion.description)
+msgid ""
+"After this, your clients on their respective networks/subnets would specify "
+"a socks proxy with the address and port you specified SocksListenAddress to "
+"be."
+msgstr ""
+
+#: https//support.torproject.org/tbb/tbb-install-tor-central-server/
+#: (content/tbb/tbb-install-tor-central-server/contents+en.lrquestion.description)
+msgid ""
+"Please note that the SocksPort configuration option gives the port ONLY for "
+"localhost (127.0.0.1)."
+msgstr ""
+
+#: https//support.torproject.org/tbb/tbb-install-tor-central-server/
+#: (content/tbb/tbb-install-tor-central-server/contents+en.lrquestion.description)
+msgid ""
+"When setting up your SocksListenAddress(es), you need to give the port with "
+"the address, as shown above."
+msgstr ""
+
+#: https//support.torproject.org/tbb/tbb-install-tor-central-server/
+#: (content/tbb/tbb-install-tor-central-server/contents+en.lrquestion.description)
+msgid ""
+"If you are interested in forcing all outgoing data through the central Tor "
+"client/relay, instead of the server only being an optional proxy, you may "
+"find the program iptables (for *nix) useful."
+msgstr ""
+
+#: https//support.torproject.org/tbb/tbb-run-client-different-computer/
+#: (content/tbb/tbb-run-client-different-computer/contents+en.lrquestion.title)
+msgid ""
+"I want to run my Tor client on a different computer than my applications"
+msgstr ""
+
+#: https//support.torproject.org/tbb/tbb-run-client-different-computer/
+#: (content/tbb/tbb-run-client-different-computer/contents+en.lrquestion.description)
+msgid ""
+"By default, your Tor client only listens for applications that connect from "
+"localhost."
+msgstr ""
+
+#: https//support.torproject.org/tbb/tbb-run-client-different-computer/
+#: (content/tbb/tbb-run-client-different-computer/contents+en.lrquestion.description)
+msgid "Connections from other computers are refused."
+msgstr ""
+
+#: https//support.torproject.org/tbb/tbb-run-client-different-computer/
+#: (content/tbb/tbb-run-client-different-computer/contents+en.lrquestion.description)
+msgid ""
+"If you want to torify applications on different computers than the Tor "
+"client, you should edit your torrc to define `SocksListenAddress 0.0.0.0` "
+"and then restart (or hup) Tor."
+msgstr ""
+
+#: https//support.torproject.org/tbb/tbb-run-client-different-computer/
+#: (content/tbb/tbb-run-client-different-computer/contents+en.lrquestion.description)
+msgid ""
+"If you want to get more advanced, you can configure your Tor client on a "
+"firewall to bind to your internal IP but not your external IP."
+msgstr ""
+
#: https//support.torproject.org/tbb/website-blocking-tor/
#: (content/tbb/website-blocking-tor/contents+en.lrquestion.title)
msgid "A website I am trying to reach is blocking access over Tor."
@@ -8344,6 +9134,130 @@ msgstr ""
"sonrası](https://community.torproject.org/relay/setup/bridge/post-install/) "
"rehberine bakabilirsiniz."
+#: https//support.torproject.org/operators/default-exit-ports/
+#: (content/operators/default-exit-ports/contents+en.lrquestion.title)
+msgid "Is there a list of default exit ports?"
+msgstr ""
+
+#: https//support.torproject.org/operators/default-exit-ports/
+#: (content/operators/default-exit-ports/contents+en.lrquestion.description)
+msgid ""
+"The default open ports are listed below but keep in mind that, any port or "
+"ports can be opened by the relay operator by configuring it in torrc or "
+"modifying the source code."
+msgstr ""
+
+#: https//support.torproject.org/operators/default-exit-ports/
+#: (content/operators/default-exit-ports/contents+en.lrquestion.description)
+msgid ""
+"The default according to src/or/policies.c ([line 85][1] and [line 1901][2])"
+" from the source code release [release-0.4.6][3]:"
+msgstr ""
+
+#: https//support.torproject.org/operators/default-exit-ports/
+#: (content/operators/default-exit-ports/contents+en.lrquestion.description)
+msgid "reject 0.0.0.0/8"
+msgstr ""
+
+#: https//support.torproject.org/operators/default-exit-ports/
+#: (content/operators/default-exit-ports/contents+en.lrquestion.description)
+msgid "reject 169.254.0.0/16"
+msgstr ""
+
+#: https//support.torproject.org/operators/default-exit-ports/
+#: (content/operators/default-exit-ports/contents+en.lrquestion.description)
+msgid "reject 127.0.0.0/8"
+msgstr ""
+
+#: https//support.torproject.org/operators/default-exit-ports/
+#: (content/operators/default-exit-ports/contents+en.lrquestion.description)
+msgid "reject 192.168.0.0/16"
+msgstr ""
+
+#: https//support.torproject.org/operators/default-exit-ports/
+#: (content/operators/default-exit-ports/contents+en.lrquestion.description)
+msgid "reject 10.0.0.0/8"
+msgstr ""
+
+#: https//support.torproject.org/operators/default-exit-ports/
+#: (content/operators/default-exit-ports/contents+en.lrquestion.description)
+msgid "reject 172.16.0.0/12"
+msgstr ""
+
+#: https//support.torproject.org/operators/default-exit-ports/
+#: (content/operators/default-exit-ports/contents+en.lrquestion.description)
+msgid "reject *:25"
+msgstr ""
+
+#: https//support.torproject.org/operators/default-exit-ports/
+#: (content/operators/default-exit-ports/contents+en.lrquestion.description)
+msgid "reject *:119"
+msgstr ""
+
+#: https//support.torproject.org/operators/default-exit-ports/
+#: (content/operators/default-exit-ports/contents+en.lrquestion.description)
+msgid "reject *:135-139"
+msgstr ""
+
+#: https//support.torproject.org/operators/default-exit-ports/
+#: (content/operators/default-exit-ports/contents+en.lrquestion.description)
+msgid "reject *:445"
+msgstr ""
+
+#: https//support.torproject.org/operators/default-exit-ports/
+#: (content/operators/default-exit-ports/contents+en.lrquestion.description)
+msgid "reject *:563"
+msgstr ""
+
+#: https//support.torproject.org/operators/default-exit-ports/
+#: (content/operators/default-exit-ports/contents+en.lrquestion.description)
+msgid "reject *:1214"
+msgstr ""
+
+#: https//support.torproject.org/operators/default-exit-ports/
+#: (content/operators/default-exit-ports/contents+en.lrquestion.description)
+msgid "reject *:4661-4666"
+msgstr ""
+
+#: https//support.torproject.org/operators/default-exit-ports/
+#: (content/operators/default-exit-ports/contents+en.lrquestion.description)
+msgid "reject *:6346-6429"
+msgstr ""
+
+#: https//support.torproject.org/operators/default-exit-ports/
+#: (content/operators/default-exit-ports/contents+en.lrquestion.description)
+msgid "reject *:6699"
+msgstr ""
+
+#: https//support.torproject.org/operators/default-exit-ports/
+#: (content/operators/default-exit-ports/contents+en.lrquestion.description)
+msgid "reject *:6881-6999"
+msgstr ""
+
+#: https//support.torproject.org/operators/default-exit-ports/
+#: (content/operators/default-exit-ports/contents+en.lrquestion.description)
+msgid "accept *:*"
+msgstr ""
+
+#: https//support.torproject.org/operators/default-exit-ports/
+#: (content/operators/default-exit-ports/contents+en.lrquestion.description)
+msgid ""
+"[1]: "
+"https://gitlab.torproject.org/tpo/core/tor/-/blob/release-0.4.6/src/core/or/policies.c#L85"
+msgstr ""
+
+#: https//support.torproject.org/operators/default-exit-ports/
+#: (content/operators/default-exit-ports/contents+en.lrquestion.description)
+msgid ""
+"[2]: "
+"https://gitlab.torproject.org/tpo/core/tor/-/blob/release-0.4.6/src/core/or/policies.c#L1901"
+msgstr ""
+
+#: https//support.torproject.org/operators/default-exit-ports/
+#: (content/operators/default-exit-ports/contents+en.lrquestion.description)
+msgid "[3]: https://gitlab.torproject.org/tpo/core/tor/-/tree/release-0.4.6/"
+msgstr ""
+
#: https//support.torproject.org/operators/dynamic-ip/
#: (content/operators/dynamic-ip/contents+en.lrquestion.title)
msgid "Can I run a Tor relay using a dynamic IP address?"
@@ -8542,21 +9456,6 @@ msgstr ""
"Bu nedenle Tor uygulamanız uykuya daldıÄında gezinemeyebilirsiniz. Bu durumu"
" günlük içindeki Åu kayıtlardan anlayabilirsiniz:"
-#: https//support.torproject.org/operators/hibernation/
-#: (content/operators/hibernation/contents+en.lrquestion.description)
-#: https//support.torproject.org/operators/limit-total-bandwidth/
-#: (content/operators/limit-total-bandwidth/contents+en.lrquestion.description)
-#: https//support.torproject.org/misc/bug-or-feedback/
-#: (content/misc/bug-or-feedback/contents+en.lrquestion.description)
-#: https//support.torproject.org/get-in-touch/why-i-cant-join-tor-channels/
-#: (content/get-in-touch/why-i-cant-join-tor-channels/contents+en.lrquestion.description)
-#: https//support.torproject.org/apt/tor-deb-repo/
-#: (content/apt/apt-1/contents+en.lrquestion.description)
-#: https//support.torproject.org/apt/apt-over-tor/
-#: (content/apt/apt-3/contents+en.lrquestion.description)
-msgid "```"
-msgstr "```"
-
#: https//support.torproject.org/operators/hibernation/
#: (content/operators/hibernation/contents+en.lrquestion.description)
msgid "Bandwidth soft limit reached; commencing hibernation."
@@ -11406,6 +12305,131 @@ msgstr "uid tor-security at lists.torproject.org"
msgid "sub 4096R/C00942E4 2017-03-13"
msgstr "sub 4096R/C00942E4 2017-03-13"
+#: https//support.torproject.org/misc/check-socks-dns-leaks/
+#: (content/misc/check-socks-dns-leaks/contents+en.lrquestion.title)
+msgid ""
+"How do I check if my application that uses SOCKS is leaking DNS requests?"
+msgstr ""
+
+#: https//support.torproject.org/misc/check-socks-dns-leaks/
+#: (content/misc/check-socks-dns-leaks/contents+en.lrquestion.description)
+msgid ""
+"Even if your application is using the correct variant of the SOCKS protocol,"
+" there is still a risk that it could be leaking DNS queries."
+msgstr ""
+
+#: https//support.torproject.org/misc/check-socks-dns-leaks/
+#: (content/misc/check-socks-dns-leaks/contents+en.lrquestion.description)
+msgid ""
+"This problem happens in Firefox extensions that resolve the destination "
+"hostname themselves, for example to show you its IP address, what country "
+"it's in, etc."
+msgstr ""
+
+#: https//support.torproject.org/misc/check-socks-dns-leaks/
+#: (content/misc/check-socks-dns-leaks/contents+en.lrquestion.description)
+msgid ""
+"If you suspect your application might behave like this, follow the "
+"instructions below to check."
+msgstr ""
+
+#: https//support.torproject.org/misc/check-socks-dns-leaks/
+#: (content/misc/check-socks-dns-leaks/contents+en.lrquestion.description)
+msgid ""
+"1. Add `TestSocks 1` to your [torrc file](https://support.torproject.org/tbb"
+"/tbb-editing-torrc/)."
+msgstr ""
+
+#: https//support.torproject.org/misc/check-socks-dns-leaks/
+#: (content/misc/check-socks-dns-leaks/contents+en.lrquestion.description)
+msgid ""
+"1. Start Tor, and point your program's SOCKS proxy settings to Tor's SOCKS5 "
+"server (`socks5://127.0.0.1:9050` by default)."
+msgstr ""
+
+#: https//support.torproject.org/misc/check-socks-dns-leaks/
+#: (content/misc/check-socks-dns-leaks/contents+en.lrquestion.description)
+msgid ""
+"1. Watch your logs as you use your application. For each socks connection, "
+"Tor will log a `notice` for safe connections, and a `warn` for connections "
+"leaking DNS requests."
+msgstr ""
+
+#: https//support.torproject.org/misc/check-socks-dns-leaks/
+#: (content/misc/check-socks-dns-leaks/contents+en.lrquestion.description)
+msgid ""
+"If you want to automatically disable all connections leaking DNS requests, "
+"set `SafeSocks 1` in your torrc file."
+msgstr ""
+
+#: https//support.torproject.org/misc/hide-exits/
+#: (content/misc/hide-exits/contents+en.lrquestion.title)
+msgid ""
+"You should hide the list of Tor relays, so people can't block the exits."
+msgstr ""
+
+#: https//support.torproject.org/misc/hide-exits/
+#: (content/misc/hide-exits/contents+en.lrquestion.description)
+msgid "There are a few reasons we don't:"
+msgstr ""
+
+#: https//support.torproject.org/misc/hide-exits/
+#: (content/misc/hide-exits/contents+en.lrquestion.description)
+msgid ""
+"1. We can't help but make the information available, since Tor clients need "
+"to use it to pick their paths."
+msgstr ""
+
+#: https//support.torproject.org/misc/hide-exits/
+#: (content/misc/hide-exits/contents+en.lrquestion.description)
+msgid "So if the \"blockers\" want it, they can get it anyway."
+msgstr ""
+
+#: https//support.torproject.org/misc/hide-exits/
+#: (content/misc/hide-exits/contents+en.lrquestion.description)
+msgid ""
+"Further, even if we didn't tell clients about the list of relays directly, "
+"somebody could still make a lot of connections through Tor to a test site "
+"and build a list of the addresses they see."
+msgstr ""
+
+#: https//support.torproject.org/misc/hide-exits/
+#: (content/misc/hide-exits/contents+en.lrquestion.description)
+msgid ""
+"1. If people want to block us, we believe that they should be allowed to do "
+"so."
+msgstr ""
+
+#: https//support.torproject.org/misc/hide-exits/
+#: (content/misc/hide-exits/contents+en.lrquestion.description)
+msgid ""
+"Obviously, we would prefer for everybody to allow Tor users to connect to "
+"them, but people have the right to decide who their services should allow "
+"connections from, and if they want to block anonymous users, they can."
+msgstr ""
+
+#: https//support.torproject.org/misc/hide-exits/
+#: (content/misc/hide-exits/contents+en.lrquestion.description)
+msgid ""
+"1. Being blockable also has tactical advantages: it may be a persuasive "
+"response to website maintainers who feel threatened by Tor."
+msgstr ""
+
+#: https//support.torproject.org/misc/hide-exits/
+#: (content/misc/hide-exits/contents+en.lrquestion.description)
+msgid ""
+"Giving them the option may inspire them to stop and think about whether they"
+" really want to eliminate private access to their system, and if not, what "
+"other options they might have."
+msgstr ""
+
+#: https//support.torproject.org/misc/hide-exits/
+#: (content/misc/hide-exits/contents+en.lrquestion.description)
+msgid ""
+"The time they might otherwise have spent blocking Tor, they may instead "
+"spend rethinking their overall approach to privacy and anonymity."
+msgstr ""
+
#: https//support.torproject.org/misc/menu/
#: (content/misc/menu/contents+en.lrquestion.description)
msgid "About"
@@ -12120,65 +13144,21 @@ msgstr "### Takma adınızı nasıl doÄrularsınız"
#: https//support.torproject.org/get-in-touch/why-i-cant-join-tor-channels/
#: (content/get-in-touch/why-i-cant-join-tor-channels/contents+en.lrquestion.description)
msgid ""
-"Then, to complete the registration and ultimately gain access to the #tor-"
-"project channel, your nickname must be **verified**."
+"After registering your nickname, to gain access to the #tor-project and "
+"other protected channels, your nickname must be **verified**."
msgstr ""
-"Kayıt iÅlemini tamamlamak ve #tor-project kanalına eriÅebilmek için takma "
-"adınızın **doÄrulanmıÅ** olması gerekir."
#: https//support.torproject.org/get-in-touch/why-i-cant-join-tor-channels/
#: (content/get-in-touch/why-i-cant-join-tor-channels/contents+en.lrquestion.description)
msgid ""
-"1. To verify your nick, open a new browser window and go to "
-"https://webchat.oftc.net/?channels=tor."
+"1. Go to https://services.oftc.net/ and follow the steps in the '*To verify "
+"your account*' section"
msgstr ""
-"1. Takma adınızı doÄrulamak için yeni bir tarayıcı penceresi açın ve "
-"https://webchat.oftc.net/?channels=tor adresine gidin."
-
-#: https//support.torproject.org/get-in-touch/why-i-cant-join-tor-channels/
-#: (content/get-in-touch/why-i-cant-join-tor-channels/contents+en.lrquestion.description)
-msgid "2. Log in with your IRC nickname and password."
-msgstr "IRC takma adınız ve parolanız ile oturum açın."
#: https//support.torproject.org/get-in-touch/why-i-cant-join-tor-channels/
#: (content/get-in-touch/why-i-cant-join-tor-channels/contents+en.lrquestion.description)
-msgid ""
-"3. Look for the word **verify** and log in there. It may appear that nothing"
-" has happened. Look at the top of the page, and there will be a column "
-"called **Account**."
-msgstr ""
-"3. **verify** sözcüÄünü arayın ve oraya oturum açın. Hiç bir Åey olmamıŠ"
-"gibi görünecek. Sayfanın üst bölümüne baktıÄınızda **Account** adında bir "
-"sütun göreceksiniz."
-
-#: https//support.torproject.org/get-in-touch/why-i-cant-join-tor-channels/
-#: (content/get-in-touch/why-i-cant-join-tor-channels/contents+en.lrquestion.description)
-msgid "4. Click on **Account**."
-msgstr "4. **Account** üzerine tıklayın."
-
-#: https//support.torproject.org/get-in-touch/why-i-cant-join-tor-channels/
-#: (content/get-in-touch/why-i-cant-join-tor-channels/contents+en.lrquestion.description)
-msgid ""
-"5. Click on the small sentence at the bottom of the square that says: Verify"
-" account."
-msgstr "5. Karenin altında Hesabı doÄrula üzerine tıklayın."
-
-#: https//support.torproject.org/get-in-touch/why-i-cant-join-tor-channels/
-#: (content/get-in-touch/why-i-cant-join-tor-channels/contents+en.lrquestion.description)
-msgid "6. Fill out the Captcha that pops up, and click ok."
-msgstr "6. Açılan güvenlik denetimini geçip tamam üzerine tıklayın."
-
-#: https//support.torproject.org/get-in-touch/why-i-cant-join-tor-channels/
-#: (content/get-in-touch/why-i-cant-join-tor-channels/contents+en.lrquestion.description)
-msgid ""
-"7. A tiny message will appear: \"Your NickServ account has been verified.\""
-msgstr "7. Åu bildirim görüntülenir: \"Your NickServ account has been verified.\""
-
-#: https//support.torproject.org/get-in-touch/why-i-cant-join-tor-channels/
-#: (content/get-in-touch/why-i-cant-join-tor-channels/contents+en.lrquestion.description)
-msgid "8. Go back to the IRC webpage where you are logged in and type:"
+msgid "2. Go back to the IRC webpage where you are logged in and type:"
msgstr ""
-"8. Daha önce oturum açmıŠolduÄunuz IRC web sayfasına geçip Åunu yazın:"
#: https//support.torproject.org/get-in-touch/why-i-cant-join-tor-channels/
#: (content/get-in-touch/why-i-cant-join-tor-channels/contents+en.lrquestion.description)
@@ -12187,13 +13167,13 @@ msgstr "`/msg nickserv checkverify`"
#: https//support.torproject.org/get-in-touch/why-i-cant-join-tor-channels/
#: (content/get-in-touch/why-i-cant-join-tor-channels/contents+en.lrquestion.description)
-msgid "9. Click ENTER."
-msgstr "9. ENTER üzerine tıklayın."
+msgid "3. Click ENTER."
+msgstr ""
#: https//support.torproject.org/get-in-touch/why-i-cant-join-tor-channels/
#: (content/get-in-touch/why-i-cant-join-tor-channels/contents+en.lrquestion.description)
-msgid "10. If all is well, you will receive a message that says:"
-msgstr "10. Her Åey yolunda ise Åöyle bir ileti alırsınız:"
+msgid "4. If all is well, you will receive a message that says:"
+msgstr ""
#: https//support.torproject.org/get-in-touch/why-i-cant-join-tor-channels/
#: (content/get-in-touch/why-i-cant-join-tor-channels/contents+en.lrquestion.description)
@@ -12360,21 +13340,23 @@ msgstr "# apt install apt-transport-https"
#: https//support.torproject.org/apt/tor-deb-repo/
#: (content/apt/apt-1/contents+en.lrquestion.description)
msgid ""
-"#### 2. Add the following entries to `/etc/apt/sources.list` or a new file "
-"in `/etc/apt/sources.list.d/`"
+"#### 2. Create a new file in `/etc/apt/sources.list.d/` named `tor.list`. "
+"Add the following entries:"
msgstr ""
-"#### 2. `/etc/apt/sources.list` dosyasına ya da yeni "
-"`/etc/apt/sources.list.d/` dosyasına Åu kayıtları ekleyin"
#: https//support.torproject.org/apt/tor-deb-repo/
#: (content/apt/apt-1/contents+en.lrquestion.description)
-msgid "deb https://deb.torproject.org/torproject.org <DISTRIBUTION> main"
-msgstr "deb https://deb.torproject.org/torproject.org <DISTRIBUTION> main"
+msgid ""
+"deb [signed-by=/usr/share/keyrings/tor-archive-keyring.gpg] "
+"https://deb.torproject.org/torproject.org <DISTRIBUTION> main"
+msgstr ""
#: https//support.torproject.org/apt/tor-deb-repo/
#: (content/apt/apt-1/contents+en.lrquestion.description)
-msgid "deb-src https://deb.torproject.org/torproject.org <DISTRIBUTION> main"
-msgstr "deb-src https://deb.torproject.org/torproject.org <DISTRIBUTION> main"
+msgid ""
+"deb-src [signed-by=/usr/share/keyrings/tor-archive-keyring.gpg] "
+"https://deb.torproject.org/torproject.org <DISTRIBUTION> main"
+msgstr ""
#: https//support.torproject.org/apt/tor-deb-repo/
#: (content/apt/apt-1/contents+en.lrquestion.description)
@@ -12390,20 +13372,18 @@ msgstr ""
#: https//support.torproject.org/apt/tor-deb-repo/
#: (content/apt/apt-1/contents+en.lrquestion.description)
msgid ""
-"deb https://deb.torproject.org/torproject.org tor-"
+"deb [signed-by=/usr/share/keyrings/tor-archive-keyring.gpg] "
+"https://deb.torproject.org/torproject.org tor-"
"experimental-0.4.6.x-<DISTRIBUTION> main"
msgstr ""
-"deb https://deb.torproject.org/torproject.org tor-"
-"experimental-0.4.6.x-<DISTRIBUTION> main"
#: https//support.torproject.org/apt/tor-deb-repo/
#: (content/apt/apt-1/contents+en.lrquestion.description)
msgid ""
-"deb-src https://deb.torproject.org/torproject.org tor-"
+"deb-src [signed-by=/usr/share/keyrings/tor-archive-keyring.gpg] "
+"https://deb.torproject.org/torproject.org tor-"
"experimental-0.4.6.x-<DISTRIBUTION> main"
msgstr ""
-"deb-src https://deb.torproject.org/torproject.org tor-"
-"experimental-0.4.6.x-<DISTRIBUTION> main"
#: https//support.torproject.org/apt/tor-deb-repo/
#: (content/apt/apt-1/contents+en.lrquestion.description)
@@ -12413,20 +13393,18 @@ msgstr "Gecelik yapımları denemek isterseniz:"
#: https//support.torproject.org/apt/tor-deb-repo/
#: (content/apt/apt-1/contents+en.lrquestion.description)
msgid ""
-"deb https://deb.torproject.org/torproject.org tor-nightly-"
-"master-<DISTRIBUTION> main"
+"deb [signed-by=/usr/share/keyrings/tor-archive-keyring.gpg] "
+"https://deb.torproject.org/torproject.org tor-nightly-master-<DISTRIBUTION> "
+"main"
msgstr ""
-"deb https://deb.torproject.org/torproject.org tor-nightly-"
-"master-<DISTRIBUTION> main"
#: https//support.torproject.org/apt/tor-deb-repo/
#: (content/apt/apt-1/contents+en.lrquestion.description)
msgid ""
-"deb-src https://deb.torproject.org/torproject.org tor-nightly-"
-"master-<DISTRIBUTION> main"
+"deb-src [signed-by=/usr/share/keyrings/tor-archive-keyring.gpg] "
+"https://deb.torproject.org/torproject.org tor-nightly-master-<DISTRIBUTION> "
+"main"
msgstr ""
-"deb-src https://deb.torproject.org/torproject.org tor-nightly-"
-"master-<DISTRIBUTION> main"
#: https//support.torproject.org/apt/tor-deb-repo/
#: (content/apt/apt-1/contents+en.lrquestion.description)
@@ -12450,16 +13428,16 @@ msgstr ""
#: https//support.torproject.org/apt/tor-deb-repo/
#: (content/apt/apt-1/contents+en.lrquestion.description)
msgid ""
-"deb [arch=amd64] https://deb.torproject.org/torproject.org focal main"
+"deb [arch=amd64 signed-by=/usr/share/keyrings/tor-archive-keyring.gpg] "
+"https://deb.torproject.org/torproject.org focal main"
msgstr ""
-"deb [arch=amd64] https://deb.torproject.org/torproject.org focal main"
#: https//support.torproject.org/apt/tor-deb-repo/
#: (content/apt/apt-1/contents+en.lrquestion.description)
msgid ""
-"deb-src [arch=amd64] https://deb.torproject.org/torproject.org focal main"
+"deb-src [arch=amd64 signed-by=/usr/share/keyrings/tor-archive-keyring.gpg] "
+"https://deb.torproject.org/torproject.org focal main"
msgstr ""
-"deb-src [arch=amd64] https://deb.torproject.org/torproject.org focal main"
#: https//support.torproject.org/apt/tor-deb-repo/
#: (content/apt/apt-1/contents+en.lrquestion.description)
@@ -12481,28 +13459,17 @@ msgstr ""
#: (content/apt/apt-1/contents+en.lrquestion.description)
msgid ""
"#### 3. Then add the gpg key used to sign the packages by running the "
-"following commands at your command prompt"
+"following command at your command prompt:"
msgstr ""
-"#### 3. Ardından, komut satırından aÅaÄıdaki komutları yürüterek paketleri "
-"imzalamak için kullanılan gpg anahtarını ekleyin."
#: https//support.torproject.org/apt/tor-deb-repo/
#: (content/apt/apt-1/contents+en.lrquestion.description)
msgid ""
-"# wget -qO- "
+"# wget -O- "
"https://deb.torproject.org/torproject.org/A3C4F0F979CAA22CDBA8F512EE8CBC9E886DDD89.asc"
-" | gpg --import"
+" | gpg --dearmor | tee /usr/share/keyrings/tor-archive-keyring.gpg "
+">/dev/null"
msgstr ""
-"# wget -qO- "
-"https://deb.torproject.org/torproject.org/A3C4F0F979CAA22CDBA8F512EE8CBC9E886DDD89.asc"
-" | gpg --import"
-
-#: https//support.torproject.org/apt/tor-deb-repo/
-#: (content/apt/apt-1/contents+en.lrquestion.description)
-msgid ""
-"# gpg --export A3C4F0F979CAA22CDBA8F512EE8CBC9E886DDD89 | apt-key add -"
-msgstr ""
-"# gpg --export A3C4F0F979CAA22CDBA8F512EE8CBC9E886DDD89 | apt-key add -"
#: https//support.torproject.org/apt/tor-deb-repo/
#: (content/apt/apt-1/contents+en.lrquestion.description)
@@ -14542,6 +15509,82 @@ msgstr ""
"Hayır, çünkü bu kullanıcı da aktarıcı listesini, IP adresini gün içinde "
"deÄiÅtirmeyen bir kullanıcı ile aynı sıklıkta günceller."
+#: https//support.torproject.org/alternate-designs/block-websites/
+#: (content/alternate-designs/block-websites/contents+en.lrquestion.title)
+msgid "Exit policies should be able to block websites, not just IP addresses."
+msgstr ""
+
+#: https//support.torproject.org/alternate-designs/block-websites/
+#: (content/alternate-designs/block-websites/contents+en.lrquestion.description)
+msgid ""
+"It would be nice to let relay operators say things like `reject "
+"www.slashdot.org` in their exit policies, rather than requiring them to "
+"learn all the IP address space that could be covered by the site (and then "
+"also blocking other sites at those IP addresses)."
+msgstr ""
+
+#: https//support.torproject.org/alternate-designs/block-websites/
+#: (content/alternate-designs/block-websites/contents+en.lrquestion.description)
+msgid "There are two problems, though."
+msgstr ""
+
+#: https//support.torproject.org/alternate-designs/block-websites/
+#: (content/alternate-designs/block-websites/contents+en.lrquestion.description)
+msgid "First, users could still get around these blocks."
+msgstr ""
+
+#: https//support.torproject.org/alternate-designs/block-websites/
+#: (content/alternate-designs/block-websites/contents+en.lrquestion.description)
+msgid ""
+"For example, they could request the IP address rather than the hostname when"
+" they exit from the Tor network."
+msgstr ""
+
+#: https//support.torproject.org/alternate-designs/block-websites/
+#: (content/alternate-designs/block-websites/contents+en.lrquestion.description)
+msgid ""
+"This means operators would still need to learn all the IP addresses for the "
+"destinations in question."
+msgstr ""
+
+#: https//support.torproject.org/alternate-designs/block-websites/
+#: (content/alternate-designs/block-websites/contents+en.lrquestion.description)
+msgid ""
+"The second problem is that it would allow remote attackers to censor "
+"arbitrary sites."
+msgstr ""
+
+#: https//support.torproject.org/alternate-designs/block-websites/
+#: (content/alternate-designs/block-websites/contents+en.lrquestion.description)
+msgid ""
+"For example, if a Tor operator blocks www1.slashdot.org, and then some "
+"attacker poisons the Tor relay's DNS or otherwise changes that hostname to "
+"resolve to the IP address for a major news site, then suddenly that Tor "
+"relay is blocking the news site."
+msgstr ""
+
+#: https//support.torproject.org/alternate-designs/let-the-network-pick-the-path/
+#: (content/alternate-designs/let-the-network-pick-the-path/contents+en.lrquestion.title)
+msgid "You should let the network pick the path, not the client."
+msgstr ""
+
+#: https//support.torproject.org/alternate-designs/let-the-network-pick-the-path/
+#: (content/alternate-designs/let-the-network-pick-the-path/contents+en.lrquestion.description)
+msgid "No, you cannot trust the network to pick the path."
+msgstr ""
+
+#: https//support.torproject.org/alternate-designs/let-the-network-pick-the-path/
+#: (content/alternate-designs/let-the-network-pick-the-path/contents+en.lrquestion.description)
+msgid "Malicious relays could route you through their colluding friends."
+msgstr ""
+
+#: https//support.torproject.org/alternate-designs/let-the-network-pick-the-path/
+#: (content/alternate-designs/let-the-network-pick-the-path/contents+en.lrquestion.description)
+msgid ""
+"This would give an adversary the ability to watch all of your traffic end to"
+" end."
+msgstr ""
+
#: lego/templates/banner.html:3 lego/templates/banner.html:5
#: templates/banner.html:3 templates/banner.html:5
msgid "Close banner"
@@ -14574,8 +15617,8 @@ msgid "DONATE NOW"
msgstr "BAÄIÅ YAPIN"
#: lego/templates/footer.html:13 lego/templates/footer.html:22
-#: lego/templates/navbar.html:83 templates/footer.html:13
-#: templates/footer.html:22 templates/navbar.html:83
+#: lego/templates/navbar.html:95 templates/footer.html:13
+#: templates/footer.html:22 templates/navbar.html:95
msgid "Download Tor Browser"
msgstr "Tor Browser indirin"
diff --git a/contents+uk.po b/contents+uk.po
index c82bed0c15..e9c99dcac8 100644
--- a/contents+uk.po
+++ b/contents+uk.po
@@ -17,7 +17,7 @@ msgid ""
msgstr ""
"Project-Id-Version: PACKAGE VERSION\n"
"Report-Msgid-Bugs-To: \n"
-"POT-Creation-Date: 2021-08-25 11:14+CET\n"
+"POT-Creation-Date: 2021-09-01 12:20+CET\n"
"PO-Revision-Date: 2018-10-02 22:41+0000\n"
"Last-Translator: CuAl40qp, 2021\n"
"Language-Team: Ukrainian (https://www.transifex.com/otf/teams/1519/uk/)\n"
@@ -150,6 +150,11 @@ msgstr ""
msgid "Tor Metrics"
msgstr ""
+#: https//support.torproject.org/alternate-designs/
+#: (content/alternate-designs/contents+en.lrtopic.title)
+msgid "Alternate Designs We Don't Do (Yet)"
+msgstr ""
+
#: https//support.torproject.org/glossary/add-on-extension-or-plugin/
#: (content/glossary/add-on-extension-or-plugin/contents+en.lrword.term)
msgid "add-on, extension, or plugin"
@@ -2037,6 +2042,61 @@ msgid ""
"wiki](https://trac.torproject.org/projects/tor/wiki/doc/TorPlusVPN)."
msgstr ""
+#: https//support.torproject.org/faq/relay-donations/
+#: (content/faq/relay-donations/contents+en.lrquestion.title)
+msgid "Can I donate for a relay rather than run my own?"
+msgstr ""
+
+#: https//support.torproject.org/faq/relay-donations/
+#: (content/faq/relay-donations/contents+en.lrquestion.description)
+msgid ""
+"Sure! We have a [list of organizations that run Tor "
+"relays](https://community.torproject.org/relay/community-resources/relay-"
+"associations/) that are happy to turn your donations into better speed and "
+"anonymity for the Tor network."
+msgstr ""
+
+#: https//support.torproject.org/faq/relay-donations/
+#: (content/faq/relay-donations/contents+en.lrquestion.description)
+msgid ""
+"These organizations are not the same as [The Tor Project, "
+"Inc](https://donate.torproject.org/), but we consider that a good thing."
+msgstr ""
+
+#: https//support.torproject.org/faq/relay-donations/
+#: (content/faq/relay-donations/contents+en.lrquestion.description)
+msgid "They're run by nice people who are part of the Tor community."
+msgstr ""
+
+#: https//support.torproject.org/faq/relay-donations/
+#: (content/faq/relay-donations/contents+en.lrquestion.description)
+msgid ""
+"Note that there can be a tradeoff here between anonymity and performance."
+msgstr ""
+
+#: https//support.torproject.org/faq/relay-donations/
+#: (content/faq/relay-donations/contents+en.lrquestion.description)
+msgid ""
+"The Tor network's anonymity comes in part from diversity, so if you are in a"
+" position to run your own relay, you will be improving Tor's anonymity more "
+"than by donating."
+msgstr ""
+
+#: https//support.torproject.org/faq/relay-donations/
+#: (content/faq/relay-donations/contents+en.lrquestion.description)
+msgid ""
+"At the same time though, economies of scale for bandwidth mean that "
+"combining many small donations into several larger relays is more efficient "
+"at improving network performance."
+msgstr ""
+
+#: https//support.torproject.org/faq/relay-donations/
+#: (content/faq/relay-donations/contents+en.lrquestion.description)
+msgid ""
+"Improving anonymity and improving performance are both worthwhile goals, so "
+"however you can help is great!"
+msgstr ""
+
#: https//support.torproject.org/faq/staying-anonymous/
#: (content/faq/staying-anonymous/contents+en.lrquestion.title)
msgid "Am I totally anonymous if I use Tor?"
@@ -2337,6 +2397,61 @@ msgid ""
" documenting all the issues](https://community.torproject.org/)."
msgstr ""
+#: https//support.torproject.org/about/attacks-on-onion-routing/
+#: (content/about/attacks-on-onion-routing/contents+en.lrquestion.title)
+msgid "What attacks remain against onion routing?"
+msgstr ""
+
+#: https//support.torproject.org/about/attacks-on-onion-routing/
+#: (content/about/attacks-on-onion-routing/contents+en.lrquestion.description)
+msgid ""
+"As mentioned above, it is possible for an observer who can view both you and"
+" either the destination website or your Tor exit node to correlate timings "
+"of your traffic as it enters the Tor network and also as it exits."
+msgstr ""
+
+#: https//support.torproject.org/about/attacks-on-onion-routing/
+#: (content/about/attacks-on-onion-routing/contents+en.lrquestion.description)
+msgid "Tor does not defend against such a threat model."
+msgstr ""
+
+#: https//support.torproject.org/about/attacks-on-onion-routing/
+#: (content/about/attacks-on-onion-routing/contents+en.lrquestion.description)
+msgid ""
+"In a more limited sense, note that if a censor or law enforcement agency has"
+" the ability to obtain specific observation of parts of the network, it is "
+"possible for them to verify a suspicion that you talk regularly to your "
+"friend by observing traffic at both ends and correlating the timing of only "
+"that traffic."
+msgstr ""
+
+#: https//support.torproject.org/about/attacks-on-onion-routing/
+#: (content/about/attacks-on-onion-routing/contents+en.lrquestion.description)
+msgid ""
+"Again, this is only useful to verify that parties already suspected of "
+"communicating with one another are doing so."
+msgstr ""
+
+#: https//support.torproject.org/about/attacks-on-onion-routing/
+#: (content/about/attacks-on-onion-routing/contents+en.lrquestion.description)
+msgid ""
+"In most countries, the suspicion required to obtain a warrant already "
+"carries more weight than timing correlation would provide."
+msgstr ""
+
+#: https//support.torproject.org/about/attacks-on-onion-routing/
+#: (content/about/attacks-on-onion-routing/contents+en.lrquestion.description)
+msgid ""
+"Furthermore, since Tor reuses circuits for multiple TCP connections, it is "
+"possible to associate non anonymous and anonymous traffic at a given exit "
+"node, so be careful about what applications you run concurrently over Tor."
+msgstr ""
+
+#: https//support.torproject.org/about/attacks-on-onion-routing/
+#: (content/about/attacks-on-onion-routing/contents+en.lrquestion.description)
+msgid "Perhaps even run separate Tor clients for these applications."
+msgstr ""
+
#: https//support.torproject.org/about/backdoor/
#: (content/about/backdoor/contents+en.lrquestion.title)
msgid "Is there a backdoor in Tor?"
@@ -2472,6 +2587,43 @@ msgid ""
"recommended](/tbb/tbb-9/)."
msgstr ""
+#: https//support.torproject.org/about/change-paths/
+#: (content/about/change-paths/contents+en.lrquestion.title)
+msgid "How often does Tor change its paths?"
+msgstr ""
+
+#: https//support.torproject.org/about/change-paths/
+#: (content/about/change-paths/contents+en.lrquestion.description)
+msgid ""
+"Tor will reuse the same circuit for new TCP streams for 10 minutes, as long "
+"as the circuit is working fine."
+msgstr ""
+
+#: https//support.torproject.org/about/change-paths/
+#: (content/about/change-paths/contents+en.lrquestion.description)
+msgid "(If the circuit fails, Tor will switch to a new circuit immediately.)"
+msgstr ""
+
+#: https//support.torproject.org/about/change-paths/
+#: (content/about/change-paths/contents+en.lrquestion.description)
+msgid ""
+"But note that a single TCP stream (e.g. a long IRC connection) will stay on "
+"the same circuit forever."
+msgstr ""
+
+#: https//support.torproject.org/about/change-paths/
+#: (content/about/change-paths/contents+en.lrquestion.description)
+msgid "We don't rotate individual streams from one circuit to the next."
+msgstr ""
+
+#: https//support.torproject.org/about/change-paths/
+#: (content/about/change-paths/contents+en.lrquestion.description)
+msgid ""
+"Otherwise, an adversary with a partial view of the network would be given "
+"many chances over time to link you to your destination, rather than just one"
+" chance."
+msgstr ""
+
#: https//support.torproject.org/about/distribute-tor/
#: (content/about/distribute-tor/contents+en.lrquestion.title)
msgid "Can I distribute Tor?"
@@ -2567,6 +2719,133 @@ msgid ""
"details."
msgstr ""
+#: https//support.torproject.org/about/entry-guards/
+#: (content/about/entry-guards/contents+en.lrquestion.title)
+msgid "What are Entry Guards?"
+msgstr ""
+
+#: https//support.torproject.org/about/entry-guards/
+#: (content/about/entry-guards/contents+en.lrquestion.description)
+msgid ""
+"Tor (like all current practical low-latency anonymity designs) fails when "
+"the attacker can see both ends of the communications channel."
+msgstr ""
+
+#: https//support.torproject.org/about/entry-guards/
+#: (content/about/entry-guards/contents+en.lrquestion.description)
+msgid ""
+"For example, suppose the attacker controls or watches the Tor relay you "
+"choose to enter the network, and also controls or watches the website you "
+"visit."
+msgstr ""
+
+#: https//support.torproject.org/about/entry-guards/
+#: (content/about/entry-guards/contents+en.lrquestion.description)
+msgid ""
+"In this case, the research community knows no practical low-latency design "
+"that can reliably stop the attacker from correlating volume and timing "
+"information on the two sides."
+msgstr ""
+
+#: https//support.torproject.org/about/entry-guards/
+#: (content/about/entry-guards/contents+en.lrquestion.description)
+msgid "So, what should we do?"
+msgstr ""
+
+#: https//support.torproject.org/about/entry-guards/
+#: (content/about/entry-guards/contents+en.lrquestion.description)
+msgid "Suppose the attacker controls, or can observe, C relays."
+msgstr ""
+
+#: https//support.torproject.org/about/entry-guards/
+#: (content/about/entry-guards/contents+en.lrquestion.description)
+msgid "Suppose there are N relays total."
+msgstr ""
+
+#: https//support.torproject.org/about/entry-guards/
+#: (content/about/entry-guards/contents+en.lrquestion.description)
+msgid ""
+"If you select new entry and exit relays each time you use the network, the "
+"attacker will be able to correlate all traffic you send with probability "
+"around (c/n)2."
+msgstr ""
+
+#: https//support.torproject.org/about/entry-guards/
+#: (content/about/entry-guards/contents+en.lrquestion.description)
+msgid ""
+"But profiling is, for most users, as bad as being traced all the time: they "
+"want to do something often without an attacker noticing, and the attacker "
+"noticing once is as bad as the attacker noticing more often."
+msgstr ""
+
+#: https//support.torproject.org/about/entry-guards/
+#: (content/about/entry-guards/contents+en.lrquestion.description)
+msgid ""
+"Thus, choosing many random entries and exits gives the user no chance of "
+"escaping profiling by this kind of attacker."
+msgstr ""
+
+#: https//support.torproject.org/about/entry-guards/
+#: (content/about/entry-guards/contents+en.lrquestion.description)
+msgid ""
+"The solution is \"entry guards\": each Tor client selects a few relays at "
+"random to use as entry points, and uses only those relays for their first "
+"hop."
+msgstr ""
+
+#: https//support.torproject.org/about/entry-guards/
+#: (content/about/entry-guards/contents+en.lrquestion.description)
+msgid ""
+"If those relays are not controlled or observed, the attacker can't win, "
+"ever, and the user is secure."
+msgstr ""
+
+#: https//support.torproject.org/about/entry-guards/
+#: (content/about/entry-guards/contents+en.lrquestion.description)
+msgid ""
+"If those relays are observed or controlled by the attacker, the attacker "
+"sees a larger fraction of the user's traffic - but still the user is no more"
+" profiled than before."
+msgstr ""
+
+#: https//support.torproject.org/about/entry-guards/
+#: (content/about/entry-guards/contents+en.lrquestion.description)
+msgid ""
+"Thus, the user has some chance (on the order of (n-c)/n) of avoiding "
+"profiling, whereas they had none before."
+msgstr ""
+
+#: https//support.torproject.org/about/entry-guards/
+#: (content/about/entry-guards/contents+en.lrquestion.description)
+msgid ""
+"You can read more at [An Analysis of the Degradation of Anonymous "
+"Protocols](http://freehaven.net/anonbib/#wright02), [Defending Anonymous "
+"Communication Against Passive Logging "
+"Attacks](http://freehaven.net/anonbib/#wright03), and especially [Locating "
+"Hidden Servers](http://freehaven.net/anonbib/#hs-attack06)."
+msgstr ""
+
+#: https//support.torproject.org/about/entry-guards/
+#: (content/about/entry-guards/contents+en.lrquestion.description)
+msgid ""
+"Restricting your entry nodes may also help against attackers who want to run"
+" a few Tor nodes and easily enumerate all of the Tor user IP addresses."
+msgstr ""
+
+#: https//support.torproject.org/about/entry-guards/
+#: (content/about/entry-guards/contents+en.lrquestion.description)
+msgid ""
+"(Even though they can't learn what destinations the users are talking to, "
+"they still might be able to do bad things with just a list of users.)"
+msgstr ""
+
+#: https//support.torproject.org/about/entry-guards/
+#: (content/about/entry-guards/contents+en.lrquestion.description)
+msgid ""
+"However, that feature won't really become useful until we move to a "
+"\"directory guard\" design as well."
+msgstr ""
+
#: https//support.torproject.org/about/how-is-tor-different-from-other-proxies/
#: (content/about/how-is-tor-different-from-other-proxies/contents+en.lrquestion.title)
msgid "How is Tor different from other proxies?"
@@ -2737,6 +3016,162 @@ msgid ""
" Tor and HTTPS interact."
msgstr ""
+#: https//support.torproject.org/about/key-management/
+#: (content/about/key-management/contents+en.lrquestion.title)
+msgid "Tell me about all the keys Tor uses"
+msgstr ""
+
+#: https//support.torproject.org/about/key-management/
+#: (content/about/key-management/contents+en.lrquestion.description)
+msgid ""
+"Tor uses a variety of different keys, with three goals in mind: 1) "
+"encryption to ensure privacy of data within the Tor network, 2) "
+"authentication so clients know they're talking to the relays they meant to "
+"talk to, and 3) signatures to make sure all clients know the same set of "
+"relays."
+msgstr ""
+
+#: https//support.torproject.org/about/key-management/
+#: (content/about/key-management/contents+en.lrquestion.description)
+msgid ""
+"**Encryption**: first, all connections in Tor use TLS link encryption, so "
+"observers can't look inside to see which circuit a given cell is intended "
+"for."
+msgstr ""
+
+#: https//support.torproject.org/about/key-management/
+#: (content/about/key-management/contents+en.lrquestion.description)
+msgid ""
+"Further, the Tor client establishes an ephemeral encryption key with each "
+"relay in the circuit; these extra layers of encryption mean that only the "
+"exit relay can read the cells."
+msgstr ""
+
+#: https//support.torproject.org/about/key-management/
+#: (content/about/key-management/contents+en.lrquestion.description)
+msgid ""
+"Both sides discard the circuit key when the circuit ends, so logging traffic"
+" and then breaking into the relay to discover the key won't work."
+msgstr ""
+
+#: https//support.torproject.org/about/key-management/
+#: (content/about/key-management/contents+en.lrquestion.description)
+msgid ""
+"**Authentication**: Every Tor relay has a public decryption key called the "
+"\"onion key\"."
+msgstr ""
+
+#: https//support.torproject.org/about/key-management/
+#: (content/about/key-management/contents+en.lrquestion.description)
+msgid "Each relay rotates its onion key once a week."
+msgstr ""
+
+#: https//support.torproject.org/about/key-management/
+#: (content/about/key-management/contents+en.lrquestion.description)
+msgid ""
+"When the Tor client establishes circuits, at each step it [demands that the "
+"Tor relay prove knowledge of its onion key](https://svn-"
+"archive.torproject.org/svn/projects/design-paper/tor-"
+"design.html#subsec:circuits)."
+msgstr ""
+
+#: https//support.torproject.org/about/key-management/
+#: (content/about/key-management/contents+en.lrquestion.description)
+msgid ""
+"That way the first node in the path can't just spoof the rest of the path."
+msgstr ""
+
+#: https//support.torproject.org/about/key-management/
+#: (content/about/key-management/contents+en.lrquestion.description)
+msgid ""
+"Because the Tor client chooses the path, it can make sure to get Tor's "
+"\"distributed trust\" property: no single relay in the path can know about "
+"both the client and what the client is doing."
+msgstr ""
+
+#: https//support.torproject.org/about/key-management/
+#: (content/about/key-management/contents+en.lrquestion.description)
+msgid ""
+"**Coordination**: How do clients know what the relays are, and how do they "
+"know that they have the right keys for them?"
+msgstr ""
+
+#: https//support.torproject.org/about/key-management/
+#: (content/about/key-management/contents+en.lrquestion.description)
+msgid "Each relay has a long-term public signing key called the \"identity key\"."
+msgstr ""
+
+#: https//support.torproject.org/about/key-management/
+#: (content/about/key-management/contents+en.lrquestion.description)
+msgid "Each directory authority additionally has a \"directory signing key\"."
+msgstr ""
+
+#: https//support.torproject.org/about/key-management/
+#: (content/about/key-management/contents+en.lrquestion.description)
+msgid ""
+"The directory authorities [provide a signed "
+"list](https://gitweb.torproject.org/torspec.git/tree/dir-spec.txt) of all "
+"the known relays, and in that list are a set of certificates from each relay"
+" (self-signed by their identity key) specifying their keys, locations, exit "
+"policies, and so on."
+msgstr ""
+
+#: https//support.torproject.org/about/key-management/
+#: (content/about/key-management/contents+en.lrquestion.description)
+msgid ""
+"So unless the adversary can control a majority of the directory authorities "
+"(as of 2021 there are 10 directory authorities), they can't trick the Tor "
+"client into using other Tor relays."
+msgstr ""
+
+#: https//support.torproject.org/about/key-management/
+#: (content/about/key-management/contents+en.lrquestion.description)
+msgid "How do clients know what the directory authorities are?"
+msgstr ""
+
+#: https//support.torproject.org/about/key-management/
+#: (content/about/key-management/contents+en.lrquestion.description)
+msgid ""
+"The Tor software comes with a built-in list of location and public key for "
+"each directory authority."
+msgstr ""
+
+#: https//support.torproject.org/about/key-management/
+#: (content/about/key-management/contents+en.lrquestion.description)
+msgid ""
+"So the only way to trick users into using a fake Tor network is to give them"
+" a specially modified version of the software."
+msgstr ""
+
+#: https//support.torproject.org/about/key-management/
+#: (content/about/key-management/contents+en.lrquestion.description)
+msgid "How do users know they've got the right software?"
+msgstr ""
+
+#: https//support.torproject.org/about/key-management/
+#: (content/about/key-management/contents+en.lrquestion.description)
+msgid ""
+"When we distribute the source code or a package, we digitally sign it with "
+"[GNU Privacy Guard](http://www.gnupg.org/). See the [instructions on how to "
+"check Tor Browser's signature](https://support.torproject.org/tbb/how-to-"
+"verify-signature/)."
+msgstr ""
+
+#: https//support.torproject.org/about/key-management/
+#: (content/about/key-management/contents+en.lrquestion.description)
+msgid ""
+"In order to be certain that it's really signed by us, you need to have met "
+"us in person and gotten a copy of our GPG key fingerprint, or you need to "
+"know somebody who has."
+msgstr ""
+
+#: https//support.torproject.org/about/key-management/
+#: (content/about/key-management/contents+en.lrquestion.description)
+msgid ""
+"If you're concerned about an attack on this level, we recommend you get "
+"involved with the security community and start meeting people."
+msgstr ""
+
#: https//support.torproject.org/about/no-data-scrubbing/
#: (content/about/no-data-scrubbing/contents+en.lrquestion.title)
msgid ""
@@ -2769,6 +3204,151 @@ msgid ""
"though."
msgstr ""
+#: https//support.torproject.org/about/protections/
+#: (content/about/protections/contents+en.lrquestion.title)
+msgid "What protections does Tor provide?"
+msgstr ""
+
+#: https//support.torproject.org/about/protections/
+#: (content/about/protections/contents+en.lrquestion.description)
+msgid ""
+"Internet communication is based on a store-and-forward model that can be "
+"understood in analogy to postal mail: Data is transmitted in blocks called "
+"IP datagrams or packets."
+msgstr ""
+
+#: https//support.torproject.org/about/protections/
+#: (content/about/protections/contents+en.lrquestion.description)
+msgid ""
+"Every packet includes a source IP address (of the sender) and a destination "
+"IP address (of the receiver), just as ordinary letters contain postal "
+"addresses of sender and receiver."
+msgstr ""
+
+#: https//support.torproject.org/about/protections/
+#: (content/about/protections/contents+en.lrquestion.description)
+msgid ""
+"The way from sender to receiver involves multiple hops of routers, where "
+"each router inspects the destination IP address and forwards the packet "
+"closer to its destination."
+msgstr ""
+
+#: https//support.torproject.org/about/protections/
+#: (content/about/protections/contents+en.lrquestion.description)
+msgid ""
+"Thus, every router between sender and receiver learns that the sender is "
+"communicating with the receiver."
+msgstr ""
+
+#: https//support.torproject.org/about/protections/
+#: (content/about/protections/contents+en.lrquestion.description)
+msgid ""
+"In particular, your local ISP is in the position to build a complete profile"
+" of your Internet usage."
+msgstr ""
+
+#: https//support.torproject.org/about/protections/
+#: (content/about/protections/contents+en.lrquestion.description)
+msgid ""
+"In addition, every server in the Internet that can see any of the packets "
+"can profile your behavior."
+msgstr ""
+
+#: https//support.torproject.org/about/protections/
+#: (content/about/protections/contents+en.lrquestion.description)
+msgid ""
+"The aim of Tor is to improve your privacy by sending your traffic through a "
+"series of proxies."
+msgstr ""
+
+#: https//support.torproject.org/about/protections/
+#: (content/about/protections/contents+en.lrquestion.description)
+msgid ""
+"Your communication is encrypted in multiple layers and routed via multiple "
+"hops through the Tor network to the final receiver."
+msgstr ""
+
+#: https//support.torproject.org/about/protections/
+#: (content/about/protections/contents+en.lrquestion.description)
+msgid ""
+"More details on this process can be found in this "
+"[visualization](https://support.torproject.org/https/https-1/)."
+msgstr ""
+
+#: https//support.torproject.org/about/protections/
+#: (content/about/protections/contents+en.lrquestion.description)
+msgid ""
+"Note that all your local ISP can observe now is that you are communicating "
+"with Tor nodes."
+msgstr ""
+
+#: https//support.torproject.org/about/protections/
+#: (content/about/protections/contents+en.lrquestion.description)
+msgid ""
+"Similarly, servers in the Internet just see that they are being contacted by"
+" Tor nodes."
+msgstr ""
+
+#: https//support.torproject.org/about/protections/
+#: (content/about/protections/contents+en.lrquestion.description)
+msgid "Generally speaking, Tor aims to solve three privacy problems:"
+msgstr ""
+
+#: https//support.torproject.org/about/protections/
+#: (content/about/protections/contents+en.lrquestion.description)
+msgid ""
+"First, Tor prevents websites and other services from learning your location,"
+" which they can use to build databases about your habits and interests."
+msgstr ""
+
+#: https//support.torproject.org/about/protections/
+#: (content/about/protections/contents+en.lrquestion.description)
+msgid ""
+"With Tor, your Internet connections don't give you away by default -- now "
+"you can have the ability to choose, for each connection, how much "
+"information to reveal."
+msgstr ""
+
+#: https//support.torproject.org/about/protections/
+#: (content/about/protections/contents+en.lrquestion.description)
+msgid ""
+"Second, Tor prevents people watching your traffic locally (such as your ISP "
+"or someone with access to your home wifi or router) from learning what "
+"information you're fetching and where you're fetching it from."
+msgstr ""
+
+#: https//support.torproject.org/about/protections/
+#: (content/about/protections/contents+en.lrquestion.description)
+msgid ""
+"It also stops them from deciding what you're allowed to learn and publish --"
+" if you can get to any part of the Tor network, you can reach any site on "
+"the Internet."
+msgstr ""
+
+#: https//support.torproject.org/about/protections/
+#: (content/about/protections/contents+en.lrquestion.description)
+msgid ""
+"Third, Tor routes your connection through more than one Tor relay so no "
+"single relay can learn what you're up to."
+msgstr ""
+
+#: https//support.torproject.org/about/protections/
+#: (content/about/protections/contents+en.lrquestion.description)
+msgid ""
+"Because these relays are run by different individuals or organizations, "
+"distributing trust provides more security than the old [one hop "
+"proxy](https://support.torproject.org/about/#how-is-tor-different-from-"
+"other-proxies) approach."
+msgstr ""
+
+#: https//support.torproject.org/about/protections/
+#: (content/about/protections/contents+en.lrquestion.description)
+msgid ""
+"Note, however, that there are situations where Tor fails to solve these "
+"privacy problems entirely: see the entry below on [remaining "
+"attacks](https://support.torproject.org/about/#attacks-on-onion-routing)."
+msgstr ""
+
#: https//support.torproject.org/about/what-is-tor/
#: (content/about/what-is-tor/contents+en.lrquestion.title)
msgid "What is Tor?"
@@ -4937,9 +5517,11 @@ msgstr ""
#: (content/tbb/tbb-47/contents+en.lrquestion.description)
msgid ""
"Also, read up on the HTTPProxyAuthenticator and HTTPSProxyAuthenticator "
-"options if your proxy requires auth. We only support basic auth currently, "
-"but if you need NTLM authentication, you may find [this post in the "
-"archives](https://archives.seul.org/or/talk/Jun-2005/msg00223.html) useful."
+"options if your [proxy requires auth.](https://developer.mozilla.org/en-"
+"US/docs/Web/HTTP/Headers/Proxy-Authenticate) We only support basic auth "
+"currently, but if you need NTLM authentication, you may find [this post in "
+"the archives](https://archives.seul.org/or/talk/Jun-2005/msg00223.html) "
+"useful."
msgstr ""
#: https//support.torproject.org/tbb/tbb-47/
@@ -5156,6 +5738,219 @@ msgid ""
"have no effect on Tor's configuration."
msgstr ""
+#: https//support.torproject.org/tbb/tbb-firewall-ports/
+#: (content/tbb/tbb-firewall-ports/contents+en.lrquestion.title)
+msgid "My firewall only allows a few outgoing ports"
+msgstr ""
+
+#: https//support.torproject.org/tbb/tbb-firewall-ports/
+#: (content/tbb/tbb-firewall-ports/contents+en.lrquestion.description)
+msgid ""
+"If your firewall works by blocking ports, then you can tell Tor to only use "
+"the ports when you start your Tor Browser."
+msgstr ""
+
+#: https//support.torproject.org/tbb/tbb-firewall-ports/
+#: (content/tbb/tbb-firewall-ports/contents+en.lrquestion.description)
+msgid ""
+"Or you can add the ports that your firewall permits by adding "
+"\"FascistFirewall 1\" to your torrc configuration file."
+msgstr ""
+
+#: https//support.torproject.org/tbb/tbb-firewall-ports/
+#: (content/tbb/tbb-firewall-ports/contents+en.lrquestion.description)
+msgid ""
+"By default, when you set this Tor assumes that your firewall allows only "
+"port 80 and port 443 (HTTP and HTTPS respectively)."
+msgstr ""
+
+#: https//support.torproject.org/tbb/tbb-firewall-ports/
+#: (content/tbb/tbb-firewall-ports/contents+en.lrquestion.description)
+msgid ""
+"You can select a different set of ports with the FirewallPorts torrc option."
+msgstr ""
+
+#: https//support.torproject.org/tbb/tbb-firewall-ports/
+#: (content/tbb/tbb-firewall-ports/contents+en.lrquestion.description)
+msgid ""
+"If you want to be more fine-grained with your controls, you can also use the"
+" ReachableAddresses config options, e.g.:"
+msgstr ""
+
+#: https//support.torproject.org/tbb/tbb-firewall-ports/
+#: (content/tbb/tbb-firewall-ports/contents+en.lrquestion.description)
+#: https//support.torproject.org/tbb/tbb-install-tor-central-server/
+#: (content/tbb/tbb-install-tor-central-server/contents+en.lrquestion.description)
+#: https//support.torproject.org/operators/default-exit-ports/
+#: (content/operators/default-exit-ports/contents+en.lrquestion.description)
+#: https//support.torproject.org/operators/hibernation/
+#: (content/operators/hibernation/contents+en.lrquestion.description)
+#: https//support.torproject.org/operators/limit-total-bandwidth/
+#: (content/operators/limit-total-bandwidth/contents+en.lrquestion.description)
+#: https//support.torproject.org/misc/bug-or-feedback/
+#: (content/misc/bug-or-feedback/contents+en.lrquestion.description)
+#: https//support.torproject.org/get-in-touch/why-i-cant-join-tor-channels/
+#: (content/get-in-touch/why-i-cant-join-tor-channels/contents+en.lrquestion.description)
+#: https//support.torproject.org/apt/tor-deb-repo/
+#: (content/apt/apt-1/contents+en.lrquestion.description)
+#: https//support.torproject.org/apt/apt-over-tor/
+#: (content/apt/apt-3/contents+en.lrquestion.description)
+msgid "```"
+msgstr ""
+
+#: https//support.torproject.org/tbb/tbb-firewall-ports/
+#: (content/tbb/tbb-firewall-ports/contents+en.lrquestion.description)
+msgid "ReachableDirAddresses *:80"
+msgstr ""
+
+#: https//support.torproject.org/tbb/tbb-firewall-ports/
+#: (content/tbb/tbb-firewall-ports/contents+en.lrquestion.description)
+msgid "ReachableORAddresses *:443"
+msgstr ""
+
+#: https//support.torproject.org/tbb/tbb-install-tor-central-server/
+#: (content/tbb/tbb-install-tor-central-server/contents+en.lrquestion.title)
+msgid ""
+"Can I install Tor on a central server, and have my clients connect to it?"
+msgstr ""
+
+#: https//support.torproject.org/tbb/tbb-install-tor-central-server/
+#: (content/tbb/tbb-install-tor-central-server/contents+en.lrquestion.description)
+msgid ""
+"Yes. Tor can be configured as a client or a relay on another machine, and "
+"allow other machines to be able to connect to it for anonymity."
+msgstr ""
+
+#: https//support.torproject.org/tbb/tbb-install-tor-central-server/
+#: (content/tbb/tbb-install-tor-central-server/contents+en.lrquestion.description)
+msgid ""
+"This is most useful in an environment where many computers want a gateway of"
+" anonymity to the rest of the world."
+msgstr ""
+
+#: https//support.torproject.org/tbb/tbb-install-tor-central-server/
+#: (content/tbb/tbb-install-tor-central-server/contents+en.lrquestion.description)
+msgid ""
+"However, be forewarned that with this configuration, anyone within your "
+"private network (existing between you and the Tor client/relay) can see what"
+" traffic you are sending in clear text."
+msgstr ""
+
+#: https//support.torproject.org/tbb/tbb-install-tor-central-server/
+#: (content/tbb/tbb-install-tor-central-server/contents+en.lrquestion.description)
+msgid "The anonymity doesn't start until you get to the Tor relay."
+msgstr ""
+
+#: https//support.torproject.org/tbb/tbb-install-tor-central-server/
+#: (content/tbb/tbb-install-tor-central-server/contents+en.lrquestion.description)
+msgid ""
+"Because of this, if you are the controller of your domain and you know "
+"everything's locked down, you will be OK, but this configuration may not be "
+"suitable for large private networks where security is key all around."
+msgstr ""
+
+#: https//support.torproject.org/tbb/tbb-install-tor-central-server/
+#: (content/tbb/tbb-install-tor-central-server/contents+en.lrquestion.description)
+msgid ""
+"Configuration is simple, editing your torrc file's SocksListenAddress "
+"according to the following examples:"
+msgstr ""
+
+#: https//support.torproject.org/tbb/tbb-install-tor-central-server/
+#: (content/tbb/tbb-install-tor-central-server/contents+en.lrquestion.description)
+msgid "SocksListenAddress 127.0.0.1"
+msgstr ""
+
+#: https//support.torproject.org/tbb/tbb-install-tor-central-server/
+#: (content/tbb/tbb-install-tor-central-server/contents+en.lrquestion.description)
+msgid "SocksListenAddress 192.168.x.x:9100"
+msgstr ""
+
+#: https//support.torproject.org/tbb/tbb-install-tor-central-server/
+#: (content/tbb/tbb-install-tor-central-server/contents+en.lrquestion.description)
+msgid "SocksListenAddress 0.0.0.0:9100"
+msgstr ""
+
+#: https//support.torproject.org/tbb/tbb-install-tor-central-server/
+#: (content/tbb/tbb-install-tor-central-server/contents+en.lrquestion.description)
+msgid ""
+"You can state multiple listen addresses, in the case that you are part of "
+"several networks or subnets."
+msgstr ""
+
+#: https//support.torproject.org/tbb/tbb-install-tor-central-server/
+#: (content/tbb/tbb-install-tor-central-server/contents+en.lrquestion.description)
+msgid "SocksListenAddress 192.168.x.x:9100 #eth0"
+msgstr ""
+
+#: https//support.torproject.org/tbb/tbb-install-tor-central-server/
+#: (content/tbb/tbb-install-tor-central-server/contents+en.lrquestion.description)
+msgid "SocksListenAddress 10.x.x.x:9100 #eth1"
+msgstr ""
+
+#: https//support.torproject.org/tbb/tbb-install-tor-central-server/
+#: (content/tbb/tbb-install-tor-central-server/contents+en.lrquestion.description)
+msgid ""
+"After this, your clients on their respective networks/subnets would specify "
+"a socks proxy with the address and port you specified SocksListenAddress to "
+"be."
+msgstr ""
+
+#: https//support.torproject.org/tbb/tbb-install-tor-central-server/
+#: (content/tbb/tbb-install-tor-central-server/contents+en.lrquestion.description)
+msgid ""
+"Please note that the SocksPort configuration option gives the port ONLY for "
+"localhost (127.0.0.1)."
+msgstr ""
+
+#: https//support.torproject.org/tbb/tbb-install-tor-central-server/
+#: (content/tbb/tbb-install-tor-central-server/contents+en.lrquestion.description)
+msgid ""
+"When setting up your SocksListenAddress(es), you need to give the port with "
+"the address, as shown above."
+msgstr ""
+
+#: https//support.torproject.org/tbb/tbb-install-tor-central-server/
+#: (content/tbb/tbb-install-tor-central-server/contents+en.lrquestion.description)
+msgid ""
+"If you are interested in forcing all outgoing data through the central Tor "
+"client/relay, instead of the server only being an optional proxy, you may "
+"find the program iptables (for *nix) useful."
+msgstr ""
+
+#: https//support.torproject.org/tbb/tbb-run-client-different-computer/
+#: (content/tbb/tbb-run-client-different-computer/contents+en.lrquestion.title)
+msgid ""
+"I want to run my Tor client on a different computer than my applications"
+msgstr ""
+
+#: https//support.torproject.org/tbb/tbb-run-client-different-computer/
+#: (content/tbb/tbb-run-client-different-computer/contents+en.lrquestion.description)
+msgid ""
+"By default, your Tor client only listens for applications that connect from "
+"localhost."
+msgstr ""
+
+#: https//support.torproject.org/tbb/tbb-run-client-different-computer/
+#: (content/tbb/tbb-run-client-different-computer/contents+en.lrquestion.description)
+msgid "Connections from other computers are refused."
+msgstr ""
+
+#: https//support.torproject.org/tbb/tbb-run-client-different-computer/
+#: (content/tbb/tbb-run-client-different-computer/contents+en.lrquestion.description)
+msgid ""
+"If you want to torify applications on different computers than the Tor "
+"client, you should edit your torrc to define `SocksListenAddress 0.0.0.0` "
+"and then restart (or hup) Tor."
+msgstr ""
+
+#: https//support.torproject.org/tbb/tbb-run-client-different-computer/
+#: (content/tbb/tbb-run-client-different-computer/contents+en.lrquestion.description)
+msgid ""
+"If you want to get more advanced, you can configure your Tor client on a "
+"firewall to bind to your internal IP but not your external IP."
+msgstr ""
+
#: https//support.torproject.org/tbb/website-blocking-tor/
#: (content/tbb/website-blocking-tor/contents+en.lrquestion.title)
msgid "A website I am trying to reach is blocking access over Tor."
@@ -6605,6 +7400,130 @@ msgid ""
"guide."
msgstr ""
+#: https//support.torproject.org/operators/default-exit-ports/
+#: (content/operators/default-exit-ports/contents+en.lrquestion.title)
+msgid "Is there a list of default exit ports?"
+msgstr ""
+
+#: https//support.torproject.org/operators/default-exit-ports/
+#: (content/operators/default-exit-ports/contents+en.lrquestion.description)
+msgid ""
+"The default open ports are listed below but keep in mind that, any port or "
+"ports can be opened by the relay operator by configuring it in torrc or "
+"modifying the source code."
+msgstr ""
+
+#: https//support.torproject.org/operators/default-exit-ports/
+#: (content/operators/default-exit-ports/contents+en.lrquestion.description)
+msgid ""
+"The default according to src/or/policies.c ([line 85][1] and [line 1901][2])"
+" from the source code release [release-0.4.6][3]:"
+msgstr ""
+
+#: https//support.torproject.org/operators/default-exit-ports/
+#: (content/operators/default-exit-ports/contents+en.lrquestion.description)
+msgid "reject 0.0.0.0/8"
+msgstr ""
+
+#: https//support.torproject.org/operators/default-exit-ports/
+#: (content/operators/default-exit-ports/contents+en.lrquestion.description)
+msgid "reject 169.254.0.0/16"
+msgstr ""
+
+#: https//support.torproject.org/operators/default-exit-ports/
+#: (content/operators/default-exit-ports/contents+en.lrquestion.description)
+msgid "reject 127.0.0.0/8"
+msgstr ""
+
+#: https//support.torproject.org/operators/default-exit-ports/
+#: (content/operators/default-exit-ports/contents+en.lrquestion.description)
+msgid "reject 192.168.0.0/16"
+msgstr ""
+
+#: https//support.torproject.org/operators/default-exit-ports/
+#: (content/operators/default-exit-ports/contents+en.lrquestion.description)
+msgid "reject 10.0.0.0/8"
+msgstr ""
+
+#: https//support.torproject.org/operators/default-exit-ports/
+#: (content/operators/default-exit-ports/contents+en.lrquestion.description)
+msgid "reject 172.16.0.0/12"
+msgstr ""
+
+#: https//support.torproject.org/operators/default-exit-ports/
+#: (content/operators/default-exit-ports/contents+en.lrquestion.description)
+msgid "reject *:25"
+msgstr ""
+
+#: https//support.torproject.org/operators/default-exit-ports/
+#: (content/operators/default-exit-ports/contents+en.lrquestion.description)
+msgid "reject *:119"
+msgstr ""
+
+#: https//support.torproject.org/operators/default-exit-ports/
+#: (content/operators/default-exit-ports/contents+en.lrquestion.description)
+msgid "reject *:135-139"
+msgstr ""
+
+#: https//support.torproject.org/operators/default-exit-ports/
+#: (content/operators/default-exit-ports/contents+en.lrquestion.description)
+msgid "reject *:445"
+msgstr ""
+
+#: https//support.torproject.org/operators/default-exit-ports/
+#: (content/operators/default-exit-ports/contents+en.lrquestion.description)
+msgid "reject *:563"
+msgstr ""
+
+#: https//support.torproject.org/operators/default-exit-ports/
+#: (content/operators/default-exit-ports/contents+en.lrquestion.description)
+msgid "reject *:1214"
+msgstr ""
+
+#: https//support.torproject.org/operators/default-exit-ports/
+#: (content/operators/default-exit-ports/contents+en.lrquestion.description)
+msgid "reject *:4661-4666"
+msgstr ""
+
+#: https//support.torproject.org/operators/default-exit-ports/
+#: (content/operators/default-exit-ports/contents+en.lrquestion.description)
+msgid "reject *:6346-6429"
+msgstr ""
+
+#: https//support.torproject.org/operators/default-exit-ports/
+#: (content/operators/default-exit-ports/contents+en.lrquestion.description)
+msgid "reject *:6699"
+msgstr ""
+
+#: https//support.torproject.org/operators/default-exit-ports/
+#: (content/operators/default-exit-ports/contents+en.lrquestion.description)
+msgid "reject *:6881-6999"
+msgstr ""
+
+#: https//support.torproject.org/operators/default-exit-ports/
+#: (content/operators/default-exit-ports/contents+en.lrquestion.description)
+msgid "accept *:*"
+msgstr ""
+
+#: https//support.torproject.org/operators/default-exit-ports/
+#: (content/operators/default-exit-ports/contents+en.lrquestion.description)
+msgid ""
+"[1]: "
+"https://gitlab.torproject.org/tpo/core/tor/-/blob/release-0.4.6/src/core/or/policies.c#L85"
+msgstr ""
+
+#: https//support.torproject.org/operators/default-exit-ports/
+#: (content/operators/default-exit-ports/contents+en.lrquestion.description)
+msgid ""
+"[2]: "
+"https://gitlab.torproject.org/tpo/core/tor/-/blob/release-0.4.6/src/core/or/policies.c#L1901"
+msgstr ""
+
+#: https//support.torproject.org/operators/default-exit-ports/
+#: (content/operators/default-exit-ports/contents+en.lrquestion.description)
+msgid "[3]: https://gitlab.torproject.org/tpo/core/tor/-/tree/release-0.4.6/"
+msgstr ""
+
#: https//support.torproject.org/operators/dynamic-ip/
#: (content/operators/dynamic-ip/contents+en.lrquestion.title)
msgid "Can I run a Tor relay using a dynamic IP address?"
@@ -6752,21 +7671,6 @@ msgid ""
"into hibernation, signaled by this entry in the log:"
msgstr ""
-#: https//support.torproject.org/operators/hibernation/
-#: (content/operators/hibernation/contents+en.lrquestion.description)
-#: https//support.torproject.org/operators/limit-total-bandwidth/
-#: (content/operators/limit-total-bandwidth/contents+en.lrquestion.description)
-#: https//support.torproject.org/misc/bug-or-feedback/
-#: (content/misc/bug-or-feedback/contents+en.lrquestion.description)
-#: https//support.torproject.org/get-in-touch/why-i-cant-join-tor-channels/
-#: (content/get-in-touch/why-i-cant-join-tor-channels/contents+en.lrquestion.description)
-#: https//support.torproject.org/apt/tor-deb-repo/
-#: (content/apt/apt-1/contents+en.lrquestion.description)
-#: https//support.torproject.org/apt/apt-over-tor/
-#: (content/apt/apt-3/contents+en.lrquestion.description)
-msgid "```"
-msgstr ""
-
#: https//support.torproject.org/operators/hibernation/
#: (content/operators/hibernation/contents+en.lrquestion.description)
msgid "Bandwidth soft limit reached; commencing hibernation."
@@ -9003,6 +9907,131 @@ msgstr ""
msgid "sub 4096R/C00942E4 2017-03-13"
msgstr ""
+#: https//support.torproject.org/misc/check-socks-dns-leaks/
+#: (content/misc/check-socks-dns-leaks/contents+en.lrquestion.title)
+msgid ""
+"How do I check if my application that uses SOCKS is leaking DNS requests?"
+msgstr ""
+
+#: https//support.torproject.org/misc/check-socks-dns-leaks/
+#: (content/misc/check-socks-dns-leaks/contents+en.lrquestion.description)
+msgid ""
+"Even if your application is using the correct variant of the SOCKS protocol,"
+" there is still a risk that it could be leaking DNS queries."
+msgstr ""
+
+#: https//support.torproject.org/misc/check-socks-dns-leaks/
+#: (content/misc/check-socks-dns-leaks/contents+en.lrquestion.description)
+msgid ""
+"This problem happens in Firefox extensions that resolve the destination "
+"hostname themselves, for example to show you its IP address, what country "
+"it's in, etc."
+msgstr ""
+
+#: https//support.torproject.org/misc/check-socks-dns-leaks/
+#: (content/misc/check-socks-dns-leaks/contents+en.lrquestion.description)
+msgid ""
+"If you suspect your application might behave like this, follow the "
+"instructions below to check."
+msgstr ""
+
+#: https//support.torproject.org/misc/check-socks-dns-leaks/
+#: (content/misc/check-socks-dns-leaks/contents+en.lrquestion.description)
+msgid ""
+"1. Add `TestSocks 1` to your [torrc file](https://support.torproject.org/tbb"
+"/tbb-editing-torrc/)."
+msgstr ""
+
+#: https//support.torproject.org/misc/check-socks-dns-leaks/
+#: (content/misc/check-socks-dns-leaks/contents+en.lrquestion.description)
+msgid ""
+"1. Start Tor, and point your program's SOCKS proxy settings to Tor's SOCKS5 "
+"server (`socks5://127.0.0.1:9050` by default)."
+msgstr ""
+
+#: https//support.torproject.org/misc/check-socks-dns-leaks/
+#: (content/misc/check-socks-dns-leaks/contents+en.lrquestion.description)
+msgid ""
+"1. Watch your logs as you use your application. For each socks connection, "
+"Tor will log a `notice` for safe connections, and a `warn` for connections "
+"leaking DNS requests."
+msgstr ""
+
+#: https//support.torproject.org/misc/check-socks-dns-leaks/
+#: (content/misc/check-socks-dns-leaks/contents+en.lrquestion.description)
+msgid ""
+"If you want to automatically disable all connections leaking DNS requests, "
+"set `SafeSocks 1` in your torrc file."
+msgstr ""
+
+#: https//support.torproject.org/misc/hide-exits/
+#: (content/misc/hide-exits/contents+en.lrquestion.title)
+msgid ""
+"You should hide the list of Tor relays, so people can't block the exits."
+msgstr ""
+
+#: https//support.torproject.org/misc/hide-exits/
+#: (content/misc/hide-exits/contents+en.lrquestion.description)
+msgid "There are a few reasons we don't:"
+msgstr ""
+
+#: https//support.torproject.org/misc/hide-exits/
+#: (content/misc/hide-exits/contents+en.lrquestion.description)
+msgid ""
+"1. We can't help but make the information available, since Tor clients need "
+"to use it to pick their paths."
+msgstr ""
+
+#: https//support.torproject.org/misc/hide-exits/
+#: (content/misc/hide-exits/contents+en.lrquestion.description)
+msgid "So if the \"blockers\" want it, they can get it anyway."
+msgstr ""
+
+#: https//support.torproject.org/misc/hide-exits/
+#: (content/misc/hide-exits/contents+en.lrquestion.description)
+msgid ""
+"Further, even if we didn't tell clients about the list of relays directly, "
+"somebody could still make a lot of connections through Tor to a test site "
+"and build a list of the addresses they see."
+msgstr ""
+
+#: https//support.torproject.org/misc/hide-exits/
+#: (content/misc/hide-exits/contents+en.lrquestion.description)
+msgid ""
+"1. If people want to block us, we believe that they should be allowed to do "
+"so."
+msgstr ""
+
+#: https//support.torproject.org/misc/hide-exits/
+#: (content/misc/hide-exits/contents+en.lrquestion.description)
+msgid ""
+"Obviously, we would prefer for everybody to allow Tor users to connect to "
+"them, but people have the right to decide who their services should allow "
+"connections from, and if they want to block anonymous users, they can."
+msgstr ""
+
+#: https//support.torproject.org/misc/hide-exits/
+#: (content/misc/hide-exits/contents+en.lrquestion.description)
+msgid ""
+"1. Being blockable also has tactical advantages: it may be a persuasive "
+"response to website maintainers who feel threatened by Tor."
+msgstr ""
+
+#: https//support.torproject.org/misc/hide-exits/
+#: (content/misc/hide-exits/contents+en.lrquestion.description)
+msgid ""
+"Giving them the option may inspire them to stop and think about whether they"
+" really want to eliminate private access to their system, and if not, what "
+"other options they might have."
+msgstr ""
+
+#: https//support.torproject.org/misc/hide-exits/
+#: (content/misc/hide-exits/contents+en.lrquestion.description)
+msgid ""
+"The time they might otherwise have spent blocking Tor, they may instead "
+"spend rethinking their overall approach to privacy and anonymity."
+msgstr ""
+
#: https//support.torproject.org/misc/menu/
#: (content/misc/menu/contents+en.lrquestion.description)
msgid "About"
@@ -9594,56 +10623,20 @@ msgstr ""
#: https//support.torproject.org/get-in-touch/why-i-cant-join-tor-channels/
#: (content/get-in-touch/why-i-cant-join-tor-channels/contents+en.lrquestion.description)
msgid ""
-"Then, to complete the registration and ultimately gain access to the #tor-"
-"project channel, your nickname must be **verified**."
-msgstr ""
-
-#: https//support.torproject.org/get-in-touch/why-i-cant-join-tor-channels/
-#: (content/get-in-touch/why-i-cant-join-tor-channels/contents+en.lrquestion.description)
-msgid ""
-"1. To verify your nick, open a new browser window and go to "
-"https://webchat.oftc.net/?channels=tor."
-msgstr ""
-
-#: https//support.torproject.org/get-in-touch/why-i-cant-join-tor-channels/
-#: (content/get-in-touch/why-i-cant-join-tor-channels/contents+en.lrquestion.description)
-msgid "2. Log in with your IRC nickname and password."
-msgstr ""
-
-#: https//support.torproject.org/get-in-touch/why-i-cant-join-tor-channels/
-#: (content/get-in-touch/why-i-cant-join-tor-channels/contents+en.lrquestion.description)
-msgid ""
-"3. Look for the word **verify** and log in there. It may appear that nothing"
-" has happened. Look at the top of the page, and there will be a column "
-"called **Account**."
-msgstr ""
-
-#: https//support.torproject.org/get-in-touch/why-i-cant-join-tor-channels/
-#: (content/get-in-touch/why-i-cant-join-tor-channels/contents+en.lrquestion.description)
-msgid "4. Click on **Account**."
-msgstr ""
-
-#: https//support.torproject.org/get-in-touch/why-i-cant-join-tor-channels/
-#: (content/get-in-touch/why-i-cant-join-tor-channels/contents+en.lrquestion.description)
-msgid ""
-"5. Click on the small sentence at the bottom of the square that says: Verify"
-" account."
-msgstr ""
-
-#: https//support.torproject.org/get-in-touch/why-i-cant-join-tor-channels/
-#: (content/get-in-touch/why-i-cant-join-tor-channels/contents+en.lrquestion.description)
-msgid "6. Fill out the Captcha that pops up, and click ok."
+"After registering your nickname, to gain access to the #tor-project and "
+"other protected channels, your nickname must be **verified**."
msgstr ""
#: https//support.torproject.org/get-in-touch/why-i-cant-join-tor-channels/
#: (content/get-in-touch/why-i-cant-join-tor-channels/contents+en.lrquestion.description)
msgid ""
-"7. A tiny message will appear: \"Your NickServ account has been verified.\""
+"1. Go to https://services.oftc.net/ and follow the steps in the '*To verify "
+"your account*' section"
msgstr ""
#: https//support.torproject.org/get-in-touch/why-i-cant-join-tor-channels/
#: (content/get-in-touch/why-i-cant-join-tor-channels/contents+en.lrquestion.description)
-msgid "8. Go back to the IRC webpage where you are logged in and type:"
+msgid "2. Go back to the IRC webpage where you are logged in and type:"
msgstr ""
#: https//support.torproject.org/get-in-touch/why-i-cant-join-tor-channels/
@@ -9653,12 +10646,12 @@ msgstr ""
#: https//support.torproject.org/get-in-touch/why-i-cant-join-tor-channels/
#: (content/get-in-touch/why-i-cant-join-tor-channels/contents+en.lrquestion.description)
-msgid "9. Click ENTER."
+msgid "3. Click ENTER."
msgstr ""
#: https//support.torproject.org/get-in-touch/why-i-cant-join-tor-channels/
#: (content/get-in-touch/why-i-cant-join-tor-channels/contents+en.lrquestion.description)
-msgid "10. If all is well, you will receive a message that says:"
+msgid "4. If all is well, you will receive a message that says:"
msgstr ""
#: https//support.torproject.org/get-in-touch/why-i-cant-join-tor-channels/
@@ -9799,18 +10792,22 @@ msgstr ""
#: https//support.torproject.org/apt/tor-deb-repo/
#: (content/apt/apt-1/contents+en.lrquestion.description)
msgid ""
-"#### 2. Add the following entries to `/etc/apt/sources.list` or a new file "
-"in `/etc/apt/sources.list.d/`"
+"#### 2. Create a new file in `/etc/apt/sources.list.d/` named `tor.list`. "
+"Add the following entries:"
msgstr ""
#: https//support.torproject.org/apt/tor-deb-repo/
#: (content/apt/apt-1/contents+en.lrquestion.description)
-msgid "deb https://deb.torproject.org/torproject.org <DISTRIBUTION> main"
+msgid ""
+"deb [signed-by=/usr/share/keyrings/tor-archive-keyring.gpg] "
+"https://deb.torproject.org/torproject.org <DISTRIBUTION> main"
msgstr ""
#: https//support.torproject.org/apt/tor-deb-repo/
#: (content/apt/apt-1/contents+en.lrquestion.description)
-msgid "deb-src https://deb.torproject.org/torproject.org <DISTRIBUTION> main"
+msgid ""
+"deb-src [signed-by=/usr/share/keyrings/tor-archive-keyring.gpg] "
+"https://deb.torproject.org/torproject.org <DISTRIBUTION> main"
msgstr ""
#: https//support.torproject.org/apt/tor-deb-repo/
@@ -9824,14 +10821,16 @@ msgstr ""
#: https//support.torproject.org/apt/tor-deb-repo/
#: (content/apt/apt-1/contents+en.lrquestion.description)
msgid ""
-"deb https://deb.torproject.org/torproject.org tor-"
+"deb [signed-by=/usr/share/keyrings/tor-archive-keyring.gpg] "
+"https://deb.torproject.org/torproject.org tor-"
"experimental-0.4.6.x-<DISTRIBUTION> main"
msgstr ""
#: https//support.torproject.org/apt/tor-deb-repo/
#: (content/apt/apt-1/contents+en.lrquestion.description)
msgid ""
-"deb-src https://deb.torproject.org/torproject.org tor-"
+"deb-src [signed-by=/usr/share/keyrings/tor-archive-keyring.gpg] "
+"https://deb.torproject.org/torproject.org tor-"
"experimental-0.4.6.x-<DISTRIBUTION> main"
msgstr ""
@@ -9843,15 +10842,17 @@ msgstr ""
#: https//support.torproject.org/apt/tor-deb-repo/
#: (content/apt/apt-1/contents+en.lrquestion.description)
msgid ""
-"deb https://deb.torproject.org/torproject.org tor-nightly-"
-"master-<DISTRIBUTION> main"
+"deb [signed-by=/usr/share/keyrings/tor-archive-keyring.gpg] "
+"https://deb.torproject.org/torproject.org tor-nightly-master-<DISTRIBUTION> "
+"main"
msgstr ""
#: https//support.torproject.org/apt/tor-deb-repo/
#: (content/apt/apt-1/contents+en.lrquestion.description)
msgid ""
-"deb-src https://deb.torproject.org/torproject.org tor-nightly-"
-"master-<DISTRIBUTION> main"
+"deb-src [signed-by=/usr/share/keyrings/tor-archive-keyring.gpg] "
+"https://deb.torproject.org/torproject.org tor-nightly-master-<DISTRIBUTION> "
+"main"
msgstr ""
#: https//support.torproject.org/apt/tor-deb-repo/
@@ -9872,13 +10873,15 @@ msgstr ""
#: https//support.torproject.org/apt/tor-deb-repo/
#: (content/apt/apt-1/contents+en.lrquestion.description)
msgid ""
-"deb [arch=amd64] https://deb.torproject.org/torproject.org focal main"
+"deb [arch=amd64 signed-by=/usr/share/keyrings/tor-archive-keyring.gpg] "
+"https://deb.torproject.org/torproject.org focal main"
msgstr ""
#: https//support.torproject.org/apt/tor-deb-repo/
#: (content/apt/apt-1/contents+en.lrquestion.description)
msgid ""
-"deb-src [arch=amd64] https://deb.torproject.org/torproject.org focal main"
+"deb-src [arch=amd64 signed-by=/usr/share/keyrings/tor-archive-keyring.gpg] "
+"https://deb.torproject.org/torproject.org focal main"
msgstr ""
#: https//support.torproject.org/apt/tor-deb-repo/
@@ -9898,21 +10901,16 @@ msgstr ""
#: (content/apt/apt-1/contents+en.lrquestion.description)
msgid ""
"#### 3. Then add the gpg key used to sign the packages by running the "
-"following commands at your command prompt"
+"following command at your command prompt:"
msgstr ""
#: https//support.torproject.org/apt/tor-deb-repo/
#: (content/apt/apt-1/contents+en.lrquestion.description)
msgid ""
-"# wget -qO- "
+"# wget -O- "
"https://deb.torproject.org/torproject.org/A3C4F0F979CAA22CDBA8F512EE8CBC9E886DDD89.asc"
-" | gpg --import"
-msgstr ""
-
-#: https//support.torproject.org/apt/tor-deb-repo/
-#: (content/apt/apt-1/contents+en.lrquestion.description)
-msgid ""
-"# gpg --export A3C4F0F979CAA22CDBA8F512EE8CBC9E886DDD89 | apt-key add -"
+" | gpg --dearmor | tee /usr/share/keyrings/tor-archive-keyring.gpg "
+">/dev/null"
msgstr ""
#: https//support.torproject.org/apt/tor-deb-repo/
@@ -11519,6 +12517,82 @@ msgid ""
"doesn't change IP address over the day."
msgstr ""
+#: https//support.torproject.org/alternate-designs/block-websites/
+#: (content/alternate-designs/block-websites/contents+en.lrquestion.title)
+msgid "Exit policies should be able to block websites, not just IP addresses."
+msgstr ""
+
+#: https//support.torproject.org/alternate-designs/block-websites/
+#: (content/alternate-designs/block-websites/contents+en.lrquestion.description)
+msgid ""
+"It would be nice to let relay operators say things like `reject "
+"www.slashdot.org` in their exit policies, rather than requiring them to "
+"learn all the IP address space that could be covered by the site (and then "
+"also blocking other sites at those IP addresses)."
+msgstr ""
+
+#: https//support.torproject.org/alternate-designs/block-websites/
+#: (content/alternate-designs/block-websites/contents+en.lrquestion.description)
+msgid "There are two problems, though."
+msgstr ""
+
+#: https//support.torproject.org/alternate-designs/block-websites/
+#: (content/alternate-designs/block-websites/contents+en.lrquestion.description)
+msgid "First, users could still get around these blocks."
+msgstr ""
+
+#: https//support.torproject.org/alternate-designs/block-websites/
+#: (content/alternate-designs/block-websites/contents+en.lrquestion.description)
+msgid ""
+"For example, they could request the IP address rather than the hostname when"
+" they exit from the Tor network."
+msgstr ""
+
+#: https//support.torproject.org/alternate-designs/block-websites/
+#: (content/alternate-designs/block-websites/contents+en.lrquestion.description)
+msgid ""
+"This means operators would still need to learn all the IP addresses for the "
+"destinations in question."
+msgstr ""
+
+#: https//support.torproject.org/alternate-designs/block-websites/
+#: (content/alternate-designs/block-websites/contents+en.lrquestion.description)
+msgid ""
+"The second problem is that it would allow remote attackers to censor "
+"arbitrary sites."
+msgstr ""
+
+#: https//support.torproject.org/alternate-designs/block-websites/
+#: (content/alternate-designs/block-websites/contents+en.lrquestion.description)
+msgid ""
+"For example, if a Tor operator blocks www1.slashdot.org, and then some "
+"attacker poisons the Tor relay's DNS or otherwise changes that hostname to "
+"resolve to the IP address for a major news site, then suddenly that Tor "
+"relay is blocking the news site."
+msgstr ""
+
+#: https//support.torproject.org/alternate-designs/let-the-network-pick-the-path/
+#: (content/alternate-designs/let-the-network-pick-the-path/contents+en.lrquestion.title)
+msgid "You should let the network pick the path, not the client."
+msgstr ""
+
+#: https//support.torproject.org/alternate-designs/let-the-network-pick-the-path/
+#: (content/alternate-designs/let-the-network-pick-the-path/contents+en.lrquestion.description)
+msgid "No, you cannot trust the network to pick the path."
+msgstr ""
+
+#: https//support.torproject.org/alternate-designs/let-the-network-pick-the-path/
+#: (content/alternate-designs/let-the-network-pick-the-path/contents+en.lrquestion.description)
+msgid "Malicious relays could route you through their colluding friends."
+msgstr ""
+
+#: https//support.torproject.org/alternate-designs/let-the-network-pick-the-path/
+#: (content/alternate-designs/let-the-network-pick-the-path/contents+en.lrquestion.description)
+msgid ""
+"This would give an adversary the ability to watch all of your traffic end to"
+" end."
+msgstr ""
+
#: lego/templates/banner.html:3 lego/templates/banner.html:5
#: templates/banner.html:3 templates/banner.html:5
msgid "Close banner"
@@ -11549,8 +12623,8 @@ msgid "DONATE NOW"
msgstr "ÐÐÐТРÐÐÐТРÐÐÐ ÐÐ"
#: lego/templates/footer.html:13 lego/templates/footer.html:22
-#: lego/templates/navbar.html:83 templates/footer.html:13
-#: templates/footer.html:22 templates/navbar.html:83
+#: lego/templates/navbar.html:95 templates/footer.html:13
+#: templates/footer.html:22 templates/navbar.html:95
msgid "Download Tor Browser"
msgstr "ÐаванÑажиÑи Tor Browser"
diff --git a/contents+zh-CN.po b/contents+zh-CN.po
index f6de61d415..a73b1b2d8c 100644
--- a/contents+zh-CN.po
+++ b/contents+zh-CN.po
@@ -16,19 +16,19 @@
# å¿»ç¶ æ <2544304894 at qq.com>, 2020
# Runzhe Liang <18051080098 at 163.com>, 2020
# Feng Zi <admin at fengzi.ga>, 2021
-# ff98sha, 2021
# MD Rights <psychi2009 at gmail.com>, 2021
# çç·é£ <CrazyBoyFeng at Live.Com>, 2021
# Emma Peel, 2021
# Scott Rhodes <starring169 at gmail.com>, 2021
+# ff98sha, 2021
#
msgid ""
msgstr ""
"Project-Id-Version: PACKAGE VERSION\n"
"Report-Msgid-Bugs-To: \n"
-"POT-Creation-Date: 2021-08-25 11:14+CET\n"
+"POT-Creation-Date: 2021-09-01 12:20+CET\n"
"PO-Revision-Date: 2018-10-02 22:41+0000\n"
-"Last-Translator: Scott Rhodes <starring169 at gmail.com>, 2021\n"
+"Last-Translator: ff98sha, 2021\n"
"Language-Team: Chinese (China) (https://www.transifex.com/otf/teams/1519/zh_CN/)\n"
"MIME-Version: 1.0\n"
"Content-Type: text/plain; charset=UTF-8\n"
@@ -159,6 +159,11 @@ msgstr "æå
³æ»¥ç¨ç常è§é®é¢"
msgid "Tor Metrics"
msgstr "Tor ææ°"
+#: https//support.torproject.org/alternate-designs/
+#: (content/alternate-designs/contents+en.lrtopic.title)
+msgid "Alternate Designs We Don't Do (Yet)"
+msgstr ""
+
#: https//support.torproject.org/glossary/add-on-extension-or-plugin/
#: (content/glossary/add-on-extension-or-plugin/contents+en.lrword.term)
msgid "add-on, extension, or plugin"
@@ -2172,6 +2177,61 @@ msgstr ""
"ä¸](https://trac.torproject.org/projects/tor/wiki/doc/TorPlusVPN)æ¾å°æ´å¤æå
³ Tor ä¸"
" VPN ä¸èµ·ä½¿ç¨æ¶çä¿¡æ¯ã"
+#: https//support.torproject.org/faq/relay-donations/
+#: (content/faq/relay-donations/contents+en.lrquestion.title)
+msgid "Can I donate for a relay rather than run my own?"
+msgstr ""
+
+#: https//support.torproject.org/faq/relay-donations/
+#: (content/faq/relay-donations/contents+en.lrquestion.description)
+msgid ""
+"Sure! We have a [list of organizations that run Tor "
+"relays](https://community.torproject.org/relay/community-resources/relay-"
+"associations/) that are happy to turn your donations into better speed and "
+"anonymity for the Tor network."
+msgstr ""
+
+#: https//support.torproject.org/faq/relay-donations/
+#: (content/faq/relay-donations/contents+en.lrquestion.description)
+msgid ""
+"These organizations are not the same as [The Tor Project, "
+"Inc](https://donate.torproject.org/), but we consider that a good thing."
+msgstr ""
+
+#: https//support.torproject.org/faq/relay-donations/
+#: (content/faq/relay-donations/contents+en.lrquestion.description)
+msgid "They're run by nice people who are part of the Tor community."
+msgstr "ä»ä»¬è¢«ä¸äºåæ ·æ¥èª Tor 大家åºçä¼ç§äººæè¿è¥çã"
+
+#: https//support.torproject.org/faq/relay-donations/
+#: (content/faq/relay-donations/contents+en.lrquestion.description)
+msgid ""
+"Note that there can be a tradeoff here between anonymity and performance."
+msgstr ""
+
+#: https//support.torproject.org/faq/relay-donations/
+#: (content/faq/relay-donations/contents+en.lrquestion.description)
+msgid ""
+"The Tor network's anonymity comes in part from diversity, so if you are in a"
+" position to run your own relay, you will be improving Tor's anonymity more "
+"than by donating."
+msgstr ""
+
+#: https//support.torproject.org/faq/relay-donations/
+#: (content/faq/relay-donations/contents+en.lrquestion.description)
+msgid ""
+"At the same time though, economies of scale for bandwidth mean that "
+"combining many small donations into several larger relays is more efficient "
+"at improving network performance."
+msgstr ""
+
+#: https//support.torproject.org/faq/relay-donations/
+#: (content/faq/relay-donations/contents+en.lrquestion.description)
+msgid ""
+"Improving anonymity and improving performance are both worthwhile goals, so "
+"however you can help is great!"
+msgstr ""
+
#: https//support.torproject.org/faq/staying-anonymous/
#: (content/faq/staying-anonymous/contents+en.lrquestion.title)
msgid "Am I totally anonymous if I use Tor?"
@@ -2472,6 +2532,61 @@ msgid ""
" documenting all the issues](https://community.torproject.org/)."
msgstr ""
+#: https//support.torproject.org/about/attacks-on-onion-routing/
+#: (content/about/attacks-on-onion-routing/contents+en.lrquestion.title)
+msgid "What attacks remain against onion routing?"
+msgstr ""
+
+#: https//support.torproject.org/about/attacks-on-onion-routing/
+#: (content/about/attacks-on-onion-routing/contents+en.lrquestion.description)
+msgid ""
+"As mentioned above, it is possible for an observer who can view both you and"
+" either the destination website or your Tor exit node to correlate timings "
+"of your traffic as it enters the Tor network and also as it exits."
+msgstr ""
+
+#: https//support.torproject.org/about/attacks-on-onion-routing/
+#: (content/about/attacks-on-onion-routing/contents+en.lrquestion.description)
+msgid "Tor does not defend against such a threat model."
+msgstr ""
+
+#: https//support.torproject.org/about/attacks-on-onion-routing/
+#: (content/about/attacks-on-onion-routing/contents+en.lrquestion.description)
+msgid ""
+"In a more limited sense, note that if a censor or law enforcement agency has"
+" the ability to obtain specific observation of parts of the network, it is "
+"possible for them to verify a suspicion that you talk regularly to your "
+"friend by observing traffic at both ends and correlating the timing of only "
+"that traffic."
+msgstr ""
+
+#: https//support.torproject.org/about/attacks-on-onion-routing/
+#: (content/about/attacks-on-onion-routing/contents+en.lrquestion.description)
+msgid ""
+"Again, this is only useful to verify that parties already suspected of "
+"communicating with one another are doing so."
+msgstr ""
+
+#: https//support.torproject.org/about/attacks-on-onion-routing/
+#: (content/about/attacks-on-onion-routing/contents+en.lrquestion.description)
+msgid ""
+"In most countries, the suspicion required to obtain a warrant already "
+"carries more weight than timing correlation would provide."
+msgstr ""
+
+#: https//support.torproject.org/about/attacks-on-onion-routing/
+#: (content/about/attacks-on-onion-routing/contents+en.lrquestion.description)
+msgid ""
+"Furthermore, since Tor reuses circuits for multiple TCP connections, it is "
+"possible to associate non anonymous and anonymous traffic at a given exit "
+"node, so be careful about what applications you run concurrently over Tor."
+msgstr ""
+
+#: https//support.torproject.org/about/attacks-on-onion-routing/
+#: (content/about/attacks-on-onion-routing/contents+en.lrquestion.description)
+msgid "Perhaps even run separate Tor clients for these applications."
+msgstr ""
+
#: https//support.torproject.org/about/backdoor/
#: (content/about/backdoor/contents+en.lrquestion.title)
msgid "Is there a backdoor in Tor?"
@@ -2610,6 +2725,43 @@ msgid ""
"recommended](/tbb/tbb-9/)."
msgstr "å° Tor åå
¶ä»æµè§å¨ä¸èµ·ä½¿ç¨æ¯[å±é©ä¸ä¸æ¨èç](/zh-CN/tbb/tbb-9/)ã"
+#: https//support.torproject.org/about/change-paths/
+#: (content/about/change-paths/contents+en.lrquestion.title)
+msgid "How often does Tor change its paths?"
+msgstr ""
+
+#: https//support.torproject.org/about/change-paths/
+#: (content/about/change-paths/contents+en.lrquestion.description)
+msgid ""
+"Tor will reuse the same circuit for new TCP streams for 10 minutes, as long "
+"as the circuit is working fine."
+msgstr ""
+
+#: https//support.torproject.org/about/change-paths/
+#: (content/about/change-paths/contents+en.lrquestion.description)
+msgid "(If the circuit fails, Tor will switch to a new circuit immediately.)"
+msgstr ""
+
+#: https//support.torproject.org/about/change-paths/
+#: (content/about/change-paths/contents+en.lrquestion.description)
+msgid ""
+"But note that a single TCP stream (e.g. a long IRC connection) will stay on "
+"the same circuit forever."
+msgstr ""
+
+#: https//support.torproject.org/about/change-paths/
+#: (content/about/change-paths/contents+en.lrquestion.description)
+msgid "We don't rotate individual streams from one circuit to the next."
+msgstr ""
+
+#: https//support.torproject.org/about/change-paths/
+#: (content/about/change-paths/contents+en.lrquestion.description)
+msgid ""
+"Otherwise, an adversary with a partial view of the network would be given "
+"many chances over time to link you to your destination, rather than just one"
+" chance."
+msgstr ""
+
#: https//support.torproject.org/about/distribute-tor/
#: (content/about/distribute-tor/contents+en.lrquestion.title)
msgid "Can I distribute Tor?"
@@ -2711,6 +2863,133 @@ msgid ""
"details."
msgstr "æ¥çæ们ç[åæ 常è§é®é¢](https://www.torproject.org/about/trademark/)æ¥è·å详ç»ä¿¡æ¯ã"
+#: https//support.torproject.org/about/entry-guards/
+#: (content/about/entry-guards/contents+en.lrquestion.title)
+msgid "What are Entry Guards?"
+msgstr ""
+
+#: https//support.torproject.org/about/entry-guards/
+#: (content/about/entry-guards/contents+en.lrquestion.description)
+msgid ""
+"Tor (like all current practical low-latency anonymity designs) fails when "
+"the attacker can see both ends of the communications channel."
+msgstr ""
+
+#: https//support.torproject.org/about/entry-guards/
+#: (content/about/entry-guards/contents+en.lrquestion.description)
+msgid ""
+"For example, suppose the attacker controls or watches the Tor relay you "
+"choose to enter the network, and also controls or watches the website you "
+"visit."
+msgstr ""
+
+#: https//support.torproject.org/about/entry-guards/
+#: (content/about/entry-guards/contents+en.lrquestion.description)
+msgid ""
+"In this case, the research community knows no practical low-latency design "
+"that can reliably stop the attacker from correlating volume and timing "
+"information on the two sides."
+msgstr ""
+
+#: https//support.torproject.org/about/entry-guards/
+#: (content/about/entry-guards/contents+en.lrquestion.description)
+msgid "So, what should we do?"
+msgstr ""
+
+#: https//support.torproject.org/about/entry-guards/
+#: (content/about/entry-guards/contents+en.lrquestion.description)
+msgid "Suppose the attacker controls, or can observe, C relays."
+msgstr ""
+
+#: https//support.torproject.org/about/entry-guards/
+#: (content/about/entry-guards/contents+en.lrquestion.description)
+msgid "Suppose there are N relays total."
+msgstr ""
+
+#: https//support.torproject.org/about/entry-guards/
+#: (content/about/entry-guards/contents+en.lrquestion.description)
+msgid ""
+"If you select new entry and exit relays each time you use the network, the "
+"attacker will be able to correlate all traffic you send with probability "
+"around (c/n)2."
+msgstr ""
+
+#: https//support.torproject.org/about/entry-guards/
+#: (content/about/entry-guards/contents+en.lrquestion.description)
+msgid ""
+"But profiling is, for most users, as bad as being traced all the time: they "
+"want to do something often without an attacker noticing, and the attacker "
+"noticing once is as bad as the attacker noticing more often."
+msgstr ""
+
+#: https//support.torproject.org/about/entry-guards/
+#: (content/about/entry-guards/contents+en.lrquestion.description)
+msgid ""
+"Thus, choosing many random entries and exits gives the user no chance of "
+"escaping profiling by this kind of attacker."
+msgstr ""
+
+#: https//support.torproject.org/about/entry-guards/
+#: (content/about/entry-guards/contents+en.lrquestion.description)
+msgid ""
+"The solution is \"entry guards\": each Tor client selects a few relays at "
+"random to use as entry points, and uses only those relays for their first "
+"hop."
+msgstr ""
+
+#: https//support.torproject.org/about/entry-guards/
+#: (content/about/entry-guards/contents+en.lrquestion.description)
+msgid ""
+"If those relays are not controlled or observed, the attacker can't win, "
+"ever, and the user is secure."
+msgstr ""
+
+#: https//support.torproject.org/about/entry-guards/
+#: (content/about/entry-guards/contents+en.lrquestion.description)
+msgid ""
+"If those relays are observed or controlled by the attacker, the attacker "
+"sees a larger fraction of the user's traffic - but still the user is no more"
+" profiled than before."
+msgstr ""
+
+#: https//support.torproject.org/about/entry-guards/
+#: (content/about/entry-guards/contents+en.lrquestion.description)
+msgid ""
+"Thus, the user has some chance (on the order of (n-c)/n) of avoiding "
+"profiling, whereas they had none before."
+msgstr ""
+
+#: https//support.torproject.org/about/entry-guards/
+#: (content/about/entry-guards/contents+en.lrquestion.description)
+msgid ""
+"You can read more at [An Analysis of the Degradation of Anonymous "
+"Protocols](http://freehaven.net/anonbib/#wright02), [Defending Anonymous "
+"Communication Against Passive Logging "
+"Attacks](http://freehaven.net/anonbib/#wright03), and especially [Locating "
+"Hidden Servers](http://freehaven.net/anonbib/#hs-attack06)."
+msgstr ""
+
+#: https//support.torproject.org/about/entry-guards/
+#: (content/about/entry-guards/contents+en.lrquestion.description)
+msgid ""
+"Restricting your entry nodes may also help against attackers who want to run"
+" a few Tor nodes and easily enumerate all of the Tor user IP addresses."
+msgstr ""
+
+#: https//support.torproject.org/about/entry-guards/
+#: (content/about/entry-guards/contents+en.lrquestion.description)
+msgid ""
+"(Even though they can't learn what destinations the users are talking to, "
+"they still might be able to do bad things with just a list of users.)"
+msgstr ""
+
+#: https//support.torproject.org/about/entry-guards/
+#: (content/about/entry-guards/contents+en.lrquestion.description)
+msgid ""
+"However, that feature won't really become useful until we move to a "
+"\"directory guard\" design as well."
+msgstr ""
+
#: https//support.torproject.org/about/how-is-tor-different-from-other-proxies/
#: (content/about/how-is-tor-different-from-other-proxies/contents+en.lrquestion.title)
msgid "How is Tor different from other proxies?"
@@ -2882,6 +3161,162 @@ msgid ""
msgstr ""
"æ¥çå
³äº [Tor ä¸ HTTPS](/zh-CN/https/https-1/) çå¯è§åå
容æ¥ç解 Tor æ¯å¦ä½ä¸ HTTPS 交äºçã"
+#: https//support.torproject.org/about/key-management/
+#: (content/about/key-management/contents+en.lrquestion.title)
+msgid "Tell me about all the keys Tor uses"
+msgstr ""
+
+#: https//support.torproject.org/about/key-management/
+#: (content/about/key-management/contents+en.lrquestion.description)
+msgid ""
+"Tor uses a variety of different keys, with three goals in mind: 1) "
+"encryption to ensure privacy of data within the Tor network, 2) "
+"authentication so clients know they're talking to the relays they meant to "
+"talk to, and 3) signatures to make sure all clients know the same set of "
+"relays."
+msgstr ""
+
+#: https//support.torproject.org/about/key-management/
+#: (content/about/key-management/contents+en.lrquestion.description)
+msgid ""
+"**Encryption**: first, all connections in Tor use TLS link encryption, so "
+"observers can't look inside to see which circuit a given cell is intended "
+"for."
+msgstr ""
+
+#: https//support.torproject.org/about/key-management/
+#: (content/about/key-management/contents+en.lrquestion.description)
+msgid ""
+"Further, the Tor client establishes an ephemeral encryption key with each "
+"relay in the circuit; these extra layers of encryption mean that only the "
+"exit relay can read the cells."
+msgstr ""
+
+#: https//support.torproject.org/about/key-management/
+#: (content/about/key-management/contents+en.lrquestion.description)
+msgid ""
+"Both sides discard the circuit key when the circuit ends, so logging traffic"
+" and then breaking into the relay to discover the key won't work."
+msgstr ""
+
+#: https//support.torproject.org/about/key-management/
+#: (content/about/key-management/contents+en.lrquestion.description)
+msgid ""
+"**Authentication**: Every Tor relay has a public decryption key called the "
+"\"onion key\"."
+msgstr ""
+
+#: https//support.torproject.org/about/key-management/
+#: (content/about/key-management/contents+en.lrquestion.description)
+msgid "Each relay rotates its onion key once a week."
+msgstr ""
+
+#: https//support.torproject.org/about/key-management/
+#: (content/about/key-management/contents+en.lrquestion.description)
+msgid ""
+"When the Tor client establishes circuits, at each step it [demands that the "
+"Tor relay prove knowledge of its onion key](https://svn-"
+"archive.torproject.org/svn/projects/design-paper/tor-"
+"design.html#subsec:circuits)."
+msgstr ""
+
+#: https//support.torproject.org/about/key-management/
+#: (content/about/key-management/contents+en.lrquestion.description)
+msgid ""
+"That way the first node in the path can't just spoof the rest of the path."
+msgstr ""
+
+#: https//support.torproject.org/about/key-management/
+#: (content/about/key-management/contents+en.lrquestion.description)
+msgid ""
+"Because the Tor client chooses the path, it can make sure to get Tor's "
+"\"distributed trust\" property: no single relay in the path can know about "
+"both the client and what the client is doing."
+msgstr ""
+
+#: https//support.torproject.org/about/key-management/
+#: (content/about/key-management/contents+en.lrquestion.description)
+msgid ""
+"**Coordination**: How do clients know what the relays are, and how do they "
+"know that they have the right keys for them?"
+msgstr ""
+
+#: https//support.torproject.org/about/key-management/
+#: (content/about/key-management/contents+en.lrquestion.description)
+msgid "Each relay has a long-term public signing key called the \"identity key\"."
+msgstr ""
+
+#: https//support.torproject.org/about/key-management/
+#: (content/about/key-management/contents+en.lrquestion.description)
+msgid "Each directory authority additionally has a \"directory signing key\"."
+msgstr ""
+
+#: https//support.torproject.org/about/key-management/
+#: (content/about/key-management/contents+en.lrquestion.description)
+msgid ""
+"The directory authorities [provide a signed "
+"list](https://gitweb.torproject.org/torspec.git/tree/dir-spec.txt) of all "
+"the known relays, and in that list are a set of certificates from each relay"
+" (self-signed by their identity key) specifying their keys, locations, exit "
+"policies, and so on."
+msgstr ""
+
+#: https//support.torproject.org/about/key-management/
+#: (content/about/key-management/contents+en.lrquestion.description)
+msgid ""
+"So unless the adversary can control a majority of the directory authorities "
+"(as of 2021 there are 10 directory authorities), they can't trick the Tor "
+"client into using other Tor relays."
+msgstr ""
+
+#: https//support.torproject.org/about/key-management/
+#: (content/about/key-management/contents+en.lrquestion.description)
+msgid "How do clients know what the directory authorities are?"
+msgstr ""
+
+#: https//support.torproject.org/about/key-management/
+#: (content/about/key-management/contents+en.lrquestion.description)
+msgid ""
+"The Tor software comes with a built-in list of location and public key for "
+"each directory authority."
+msgstr ""
+
+#: https//support.torproject.org/about/key-management/
+#: (content/about/key-management/contents+en.lrquestion.description)
+msgid ""
+"So the only way to trick users into using a fake Tor network is to give them"
+" a specially modified version of the software."
+msgstr ""
+
+#: https//support.torproject.org/about/key-management/
+#: (content/about/key-management/contents+en.lrquestion.description)
+msgid "How do users know they've got the right software?"
+msgstr ""
+
+#: https//support.torproject.org/about/key-management/
+#: (content/about/key-management/contents+en.lrquestion.description)
+msgid ""
+"When we distribute the source code or a package, we digitally sign it with "
+"[GNU Privacy Guard](http://www.gnupg.org/). See the [instructions on how to "
+"check Tor Browser's signature](https://support.torproject.org/tbb/how-to-"
+"verify-signature/)."
+msgstr ""
+
+#: https//support.torproject.org/about/key-management/
+#: (content/about/key-management/contents+en.lrquestion.description)
+msgid ""
+"In order to be certain that it's really signed by us, you need to have met "
+"us in person and gotten a copy of our GPG key fingerprint, or you need to "
+"know somebody who has."
+msgstr ""
+
+#: https//support.torproject.org/about/key-management/
+#: (content/about/key-management/contents+en.lrquestion.description)
+msgid ""
+"If you're concerned about an attack on this level, we recommend you get "
+"involved with the security community and start meeting people."
+msgstr ""
+
#: https//support.torproject.org/about/no-data-scrubbing/
#: (content/about/no-data-scrubbing/contents+en.lrquestion.title)
msgid ""
@@ -2914,6 +3349,151 @@ msgid ""
"though."
msgstr "ä½æ¯ï¼Tor æµè§å¨æ æ³å¯¹æ¨è¾å
¥å°è¡¨åä¸çææ¬åä»»ä½æ´æ¹ã"
+#: https//support.torproject.org/about/protections/
+#: (content/about/protections/contents+en.lrquestion.title)
+msgid "What protections does Tor provide?"
+msgstr ""
+
+#: https//support.torproject.org/about/protections/
+#: (content/about/protections/contents+en.lrquestion.description)
+msgid ""
+"Internet communication is based on a store-and-forward model that can be "
+"understood in analogy to postal mail: Data is transmitted in blocks called "
+"IP datagrams or packets."
+msgstr ""
+
+#: https//support.torproject.org/about/protections/
+#: (content/about/protections/contents+en.lrquestion.description)
+msgid ""
+"Every packet includes a source IP address (of the sender) and a destination "
+"IP address (of the receiver), just as ordinary letters contain postal "
+"addresses of sender and receiver."
+msgstr ""
+
+#: https//support.torproject.org/about/protections/
+#: (content/about/protections/contents+en.lrquestion.description)
+msgid ""
+"The way from sender to receiver involves multiple hops of routers, where "
+"each router inspects the destination IP address and forwards the packet "
+"closer to its destination."
+msgstr ""
+
+#: https//support.torproject.org/about/protections/
+#: (content/about/protections/contents+en.lrquestion.description)
+msgid ""
+"Thus, every router between sender and receiver learns that the sender is "
+"communicating with the receiver."
+msgstr ""
+
+#: https//support.torproject.org/about/protections/
+#: (content/about/protections/contents+en.lrquestion.description)
+msgid ""
+"In particular, your local ISP is in the position to build a complete profile"
+" of your Internet usage."
+msgstr ""
+
+#: https//support.torproject.org/about/protections/
+#: (content/about/protections/contents+en.lrquestion.description)
+msgid ""
+"In addition, every server in the Internet that can see any of the packets "
+"can profile your behavior."
+msgstr ""
+
+#: https//support.torproject.org/about/protections/
+#: (content/about/protections/contents+en.lrquestion.description)
+msgid ""
+"The aim of Tor is to improve your privacy by sending your traffic through a "
+"series of proxies."
+msgstr ""
+
+#: https//support.torproject.org/about/protections/
+#: (content/about/protections/contents+en.lrquestion.description)
+msgid ""
+"Your communication is encrypted in multiple layers and routed via multiple "
+"hops through the Tor network to the final receiver."
+msgstr ""
+
+#: https//support.torproject.org/about/protections/
+#: (content/about/protections/contents+en.lrquestion.description)
+msgid ""
+"More details on this process can be found in this "
+"[visualization](https://support.torproject.org/https/https-1/)."
+msgstr ""
+
+#: https//support.torproject.org/about/protections/
+#: (content/about/protections/contents+en.lrquestion.description)
+msgid ""
+"Note that all your local ISP can observe now is that you are communicating "
+"with Tor nodes."
+msgstr ""
+
+#: https//support.torproject.org/about/protections/
+#: (content/about/protections/contents+en.lrquestion.description)
+msgid ""
+"Similarly, servers in the Internet just see that they are being contacted by"
+" Tor nodes."
+msgstr ""
+
+#: https//support.torproject.org/about/protections/
+#: (content/about/protections/contents+en.lrquestion.description)
+msgid "Generally speaking, Tor aims to solve three privacy problems:"
+msgstr ""
+
+#: https//support.torproject.org/about/protections/
+#: (content/about/protections/contents+en.lrquestion.description)
+msgid ""
+"First, Tor prevents websites and other services from learning your location,"
+" which they can use to build databases about your habits and interests."
+msgstr ""
+
+#: https//support.torproject.org/about/protections/
+#: (content/about/protections/contents+en.lrquestion.description)
+msgid ""
+"With Tor, your Internet connections don't give you away by default -- now "
+"you can have the ability to choose, for each connection, how much "
+"information to reveal."
+msgstr ""
+
+#: https//support.torproject.org/about/protections/
+#: (content/about/protections/contents+en.lrquestion.description)
+msgid ""
+"Second, Tor prevents people watching your traffic locally (such as your ISP "
+"or someone with access to your home wifi or router) from learning what "
+"information you're fetching and where you're fetching it from."
+msgstr ""
+
+#: https//support.torproject.org/about/protections/
+#: (content/about/protections/contents+en.lrquestion.description)
+msgid ""
+"It also stops them from deciding what you're allowed to learn and publish --"
+" if you can get to any part of the Tor network, you can reach any site on "
+"the Internet."
+msgstr ""
+
+#: https//support.torproject.org/about/protections/
+#: (content/about/protections/contents+en.lrquestion.description)
+msgid ""
+"Third, Tor routes your connection through more than one Tor relay so no "
+"single relay can learn what you're up to."
+msgstr ""
+
+#: https//support.torproject.org/about/protections/
+#: (content/about/protections/contents+en.lrquestion.description)
+msgid ""
+"Because these relays are run by different individuals or organizations, "
+"distributing trust provides more security than the old [one hop "
+"proxy](https://support.torproject.org/about/#how-is-tor-different-from-"
+"other-proxies) approach."
+msgstr ""
+
+#: https//support.torproject.org/about/protections/
+#: (content/about/protections/contents+en.lrquestion.description)
+msgid ""
+"Note, however, that there are situations where Tor fails to solve these "
+"privacy problems entirely: see the entry below on [remaining "
+"attacks](https://support.torproject.org/about/#attacks-on-onion-routing)."
+msgstr ""
+
#: https//support.torproject.org/about/what-is-tor/
#: (content/about/what-is-tor/contents+en.lrquestion.title)
msgid "What is Tor?"
@@ -5165,13 +5745,12 @@ msgstr ""
#: (content/tbb/tbb-47/contents+en.lrquestion.description)
msgid ""
"Also, read up on the HTTPProxyAuthenticator and HTTPSProxyAuthenticator "
-"options if your proxy requires auth. We only support basic auth currently, "
-"but if you need NTLM authentication, you may find [this post in the "
-"archives](https://archives.seul.org/or/talk/Jun-2005/msg00223.html) useful."
+"options if your [proxy requires auth.](https://developer.mozilla.org/en-"
+"US/docs/Web/HTTP/Headers/Proxy-Authenticate) We only support basic auth "
+"currently, but if you need NTLM authentication, you may find [this post in "
+"the archives](https://archives.seul.org/or/talk/Jun-2005/msg00223.html) "
+"useful."
msgstr ""
-"æ¤å¤ï¼å¦ææ¨ç代çæå¡å¨éè¦authçè¯ï¼è¯·æ¥ç HTTP 代çæå¡å¨è®¤è¯å¨å HTTPS "
-"代çæå¡å¨è®¤è¯å¨é项ãæ们ç®ååªæ¯æåºç¡çauthï¼ä½å¦ææ¨éè¦ NTLM "
-"认è¯ï¼æ¨ä¼è§å¾[æ¡£æ¡éçè¿ç¯æç« ](https://archives.seul.org/or/talk/Jun-2005/msg00223.html)å¾æ帮å©ã"
#: https//support.torproject.org/tbb/tbb-47/
#: (content/tbb/tbb-47/contents+en.lrquestion.description)
@@ -5397,6 +5976,219 @@ msgid ""
"have no effect on Tor's configuration."
msgstr "è®°ä½ï¼å¨torrcä¸ææ以â#âå¼å¤´çè¡é½ä¼è¢«è§ä¸ºæ³¨é并ä¸ä¸ä¼å½±åTorçé
ç½®ã"
+#: https//support.torproject.org/tbb/tbb-firewall-ports/
+#: (content/tbb/tbb-firewall-ports/contents+en.lrquestion.title)
+msgid "My firewall only allows a few outgoing ports"
+msgstr ""
+
+#: https//support.torproject.org/tbb/tbb-firewall-ports/
+#: (content/tbb/tbb-firewall-ports/contents+en.lrquestion.description)
+msgid ""
+"If your firewall works by blocking ports, then you can tell Tor to only use "
+"the ports when you start your Tor Browser."
+msgstr ""
+
+#: https//support.torproject.org/tbb/tbb-firewall-ports/
+#: (content/tbb/tbb-firewall-ports/contents+en.lrquestion.description)
+msgid ""
+"Or you can add the ports that your firewall permits by adding "
+"\"FascistFirewall 1\" to your torrc configuration file."
+msgstr ""
+
+#: https//support.torproject.org/tbb/tbb-firewall-ports/
+#: (content/tbb/tbb-firewall-ports/contents+en.lrquestion.description)
+msgid ""
+"By default, when you set this Tor assumes that your firewall allows only "
+"port 80 and port 443 (HTTP and HTTPS respectively)."
+msgstr ""
+
+#: https//support.torproject.org/tbb/tbb-firewall-ports/
+#: (content/tbb/tbb-firewall-ports/contents+en.lrquestion.description)
+msgid ""
+"You can select a different set of ports with the FirewallPorts torrc option."
+msgstr ""
+
+#: https//support.torproject.org/tbb/tbb-firewall-ports/
+#: (content/tbb/tbb-firewall-ports/contents+en.lrquestion.description)
+msgid ""
+"If you want to be more fine-grained with your controls, you can also use the"
+" ReachableAddresses config options, e.g.:"
+msgstr ""
+
+#: https//support.torproject.org/tbb/tbb-firewall-ports/
+#: (content/tbb/tbb-firewall-ports/contents+en.lrquestion.description)
+#: https//support.torproject.org/tbb/tbb-install-tor-central-server/
+#: (content/tbb/tbb-install-tor-central-server/contents+en.lrquestion.description)
+#: https//support.torproject.org/operators/default-exit-ports/
+#: (content/operators/default-exit-ports/contents+en.lrquestion.description)
+#: https//support.torproject.org/operators/hibernation/
+#: (content/operators/hibernation/contents+en.lrquestion.description)
+#: https//support.torproject.org/operators/limit-total-bandwidth/
+#: (content/operators/limit-total-bandwidth/contents+en.lrquestion.description)
+#: https//support.torproject.org/misc/bug-or-feedback/
+#: (content/misc/bug-or-feedback/contents+en.lrquestion.description)
+#: https//support.torproject.org/get-in-touch/why-i-cant-join-tor-channels/
+#: (content/get-in-touch/why-i-cant-join-tor-channels/contents+en.lrquestion.description)
+#: https//support.torproject.org/apt/tor-deb-repo/
+#: (content/apt/apt-1/contents+en.lrquestion.description)
+#: https//support.torproject.org/apt/apt-over-tor/
+#: (content/apt/apt-3/contents+en.lrquestion.description)
+msgid "```"
+msgstr "```"
+
+#: https//support.torproject.org/tbb/tbb-firewall-ports/
+#: (content/tbb/tbb-firewall-ports/contents+en.lrquestion.description)
+msgid "ReachableDirAddresses *:80"
+msgstr ""
+
+#: https//support.torproject.org/tbb/tbb-firewall-ports/
+#: (content/tbb/tbb-firewall-ports/contents+en.lrquestion.description)
+msgid "ReachableORAddresses *:443"
+msgstr ""
+
+#: https//support.torproject.org/tbb/tbb-install-tor-central-server/
+#: (content/tbb/tbb-install-tor-central-server/contents+en.lrquestion.title)
+msgid ""
+"Can I install Tor on a central server, and have my clients connect to it?"
+msgstr ""
+
+#: https//support.torproject.org/tbb/tbb-install-tor-central-server/
+#: (content/tbb/tbb-install-tor-central-server/contents+en.lrquestion.description)
+msgid ""
+"Yes. Tor can be configured as a client or a relay on another machine, and "
+"allow other machines to be able to connect to it for anonymity."
+msgstr ""
+
+#: https//support.torproject.org/tbb/tbb-install-tor-central-server/
+#: (content/tbb/tbb-install-tor-central-server/contents+en.lrquestion.description)
+msgid ""
+"This is most useful in an environment where many computers want a gateway of"
+" anonymity to the rest of the world."
+msgstr ""
+
+#: https//support.torproject.org/tbb/tbb-install-tor-central-server/
+#: (content/tbb/tbb-install-tor-central-server/contents+en.lrquestion.description)
+msgid ""
+"However, be forewarned that with this configuration, anyone within your "
+"private network (existing between you and the Tor client/relay) can see what"
+" traffic you are sending in clear text."
+msgstr ""
+
+#: https//support.torproject.org/tbb/tbb-install-tor-central-server/
+#: (content/tbb/tbb-install-tor-central-server/contents+en.lrquestion.description)
+msgid "The anonymity doesn't start until you get to the Tor relay."
+msgstr ""
+
+#: https//support.torproject.org/tbb/tbb-install-tor-central-server/
+#: (content/tbb/tbb-install-tor-central-server/contents+en.lrquestion.description)
+msgid ""
+"Because of this, if you are the controller of your domain and you know "
+"everything's locked down, you will be OK, but this configuration may not be "
+"suitable for large private networks where security is key all around."
+msgstr ""
+
+#: https//support.torproject.org/tbb/tbb-install-tor-central-server/
+#: (content/tbb/tbb-install-tor-central-server/contents+en.lrquestion.description)
+msgid ""
+"Configuration is simple, editing your torrc file's SocksListenAddress "
+"according to the following examples:"
+msgstr ""
+
+#: https//support.torproject.org/tbb/tbb-install-tor-central-server/
+#: (content/tbb/tbb-install-tor-central-server/contents+en.lrquestion.description)
+msgid "SocksListenAddress 127.0.0.1"
+msgstr ""
+
+#: https//support.torproject.org/tbb/tbb-install-tor-central-server/
+#: (content/tbb/tbb-install-tor-central-server/contents+en.lrquestion.description)
+msgid "SocksListenAddress 192.168.x.x:9100"
+msgstr ""
+
+#: https//support.torproject.org/tbb/tbb-install-tor-central-server/
+#: (content/tbb/tbb-install-tor-central-server/contents+en.lrquestion.description)
+msgid "SocksListenAddress 0.0.0.0:9100"
+msgstr ""
+
+#: https//support.torproject.org/tbb/tbb-install-tor-central-server/
+#: (content/tbb/tbb-install-tor-central-server/contents+en.lrquestion.description)
+msgid ""
+"You can state multiple listen addresses, in the case that you are part of "
+"several networks or subnets."
+msgstr ""
+
+#: https//support.torproject.org/tbb/tbb-install-tor-central-server/
+#: (content/tbb/tbb-install-tor-central-server/contents+en.lrquestion.description)
+msgid "SocksListenAddress 192.168.x.x:9100 #eth0"
+msgstr ""
+
+#: https//support.torproject.org/tbb/tbb-install-tor-central-server/
+#: (content/tbb/tbb-install-tor-central-server/contents+en.lrquestion.description)
+msgid "SocksListenAddress 10.x.x.x:9100 #eth1"
+msgstr ""
+
+#: https//support.torproject.org/tbb/tbb-install-tor-central-server/
+#: (content/tbb/tbb-install-tor-central-server/contents+en.lrquestion.description)
+msgid ""
+"After this, your clients on their respective networks/subnets would specify "
+"a socks proxy with the address and port you specified SocksListenAddress to "
+"be."
+msgstr ""
+
+#: https//support.torproject.org/tbb/tbb-install-tor-central-server/
+#: (content/tbb/tbb-install-tor-central-server/contents+en.lrquestion.description)
+msgid ""
+"Please note that the SocksPort configuration option gives the port ONLY for "
+"localhost (127.0.0.1)."
+msgstr ""
+
+#: https//support.torproject.org/tbb/tbb-install-tor-central-server/
+#: (content/tbb/tbb-install-tor-central-server/contents+en.lrquestion.description)
+msgid ""
+"When setting up your SocksListenAddress(es), you need to give the port with "
+"the address, as shown above."
+msgstr ""
+
+#: https//support.torproject.org/tbb/tbb-install-tor-central-server/
+#: (content/tbb/tbb-install-tor-central-server/contents+en.lrquestion.description)
+msgid ""
+"If you are interested in forcing all outgoing data through the central Tor "
+"client/relay, instead of the server only being an optional proxy, you may "
+"find the program iptables (for *nix) useful."
+msgstr ""
+
+#: https//support.torproject.org/tbb/tbb-run-client-different-computer/
+#: (content/tbb/tbb-run-client-different-computer/contents+en.lrquestion.title)
+msgid ""
+"I want to run my Tor client on a different computer than my applications"
+msgstr ""
+
+#: https//support.torproject.org/tbb/tbb-run-client-different-computer/
+#: (content/tbb/tbb-run-client-different-computer/contents+en.lrquestion.description)
+msgid ""
+"By default, your Tor client only listens for applications that connect from "
+"localhost."
+msgstr ""
+
+#: https//support.torproject.org/tbb/tbb-run-client-different-computer/
+#: (content/tbb/tbb-run-client-different-computer/contents+en.lrquestion.description)
+msgid "Connections from other computers are refused."
+msgstr ""
+
+#: https//support.torproject.org/tbb/tbb-run-client-different-computer/
+#: (content/tbb/tbb-run-client-different-computer/contents+en.lrquestion.description)
+msgid ""
+"If you want to torify applications on different computers than the Tor "
+"client, you should edit your torrc to define `SocksListenAddress 0.0.0.0` "
+"and then restart (or hup) Tor."
+msgstr ""
+
+#: https//support.torproject.org/tbb/tbb-run-client-different-computer/
+#: (content/tbb/tbb-run-client-different-computer/contents+en.lrquestion.description)
+msgid ""
+"If you want to get more advanced, you can configure your Tor client on a "
+"firewall to bind to your internal IP but not your external IP."
+msgstr ""
+
#: https//support.torproject.org/tbb/website-blocking-tor/
#: (content/tbb/website-blocking-tor/contents+en.lrquestion.title)
msgid "A website I am trying to reach is blocking access over Tor."
@@ -6924,6 +7716,130 @@ msgid ""
"guide."
msgstr ""
+#: https//support.torproject.org/operators/default-exit-ports/
+#: (content/operators/default-exit-ports/contents+en.lrquestion.title)
+msgid "Is there a list of default exit ports?"
+msgstr ""
+
+#: https//support.torproject.org/operators/default-exit-ports/
+#: (content/operators/default-exit-ports/contents+en.lrquestion.description)
+msgid ""
+"The default open ports are listed below but keep in mind that, any port or "
+"ports can be opened by the relay operator by configuring it in torrc or "
+"modifying the source code."
+msgstr ""
+
+#: https//support.torproject.org/operators/default-exit-ports/
+#: (content/operators/default-exit-ports/contents+en.lrquestion.description)
+msgid ""
+"The default according to src/or/policies.c ([line 85][1] and [line 1901][2])"
+" from the source code release [release-0.4.6][3]:"
+msgstr ""
+
+#: https//support.torproject.org/operators/default-exit-ports/
+#: (content/operators/default-exit-ports/contents+en.lrquestion.description)
+msgid "reject 0.0.0.0/8"
+msgstr ""
+
+#: https//support.torproject.org/operators/default-exit-ports/
+#: (content/operators/default-exit-ports/contents+en.lrquestion.description)
+msgid "reject 169.254.0.0/16"
+msgstr ""
+
+#: https//support.torproject.org/operators/default-exit-ports/
+#: (content/operators/default-exit-ports/contents+en.lrquestion.description)
+msgid "reject 127.0.0.0/8"
+msgstr ""
+
+#: https//support.torproject.org/operators/default-exit-ports/
+#: (content/operators/default-exit-ports/contents+en.lrquestion.description)
+msgid "reject 192.168.0.0/16"
+msgstr ""
+
+#: https//support.torproject.org/operators/default-exit-ports/
+#: (content/operators/default-exit-ports/contents+en.lrquestion.description)
+msgid "reject 10.0.0.0/8"
+msgstr ""
+
+#: https//support.torproject.org/operators/default-exit-ports/
+#: (content/operators/default-exit-ports/contents+en.lrquestion.description)
+msgid "reject 172.16.0.0/12"
+msgstr ""
+
+#: https//support.torproject.org/operators/default-exit-ports/
+#: (content/operators/default-exit-ports/contents+en.lrquestion.description)
+msgid "reject *:25"
+msgstr ""
+
+#: https//support.torproject.org/operators/default-exit-ports/
+#: (content/operators/default-exit-ports/contents+en.lrquestion.description)
+msgid "reject *:119"
+msgstr ""
+
+#: https//support.torproject.org/operators/default-exit-ports/
+#: (content/operators/default-exit-ports/contents+en.lrquestion.description)
+msgid "reject *:135-139"
+msgstr ""
+
+#: https//support.torproject.org/operators/default-exit-ports/
+#: (content/operators/default-exit-ports/contents+en.lrquestion.description)
+msgid "reject *:445"
+msgstr ""
+
+#: https//support.torproject.org/operators/default-exit-ports/
+#: (content/operators/default-exit-ports/contents+en.lrquestion.description)
+msgid "reject *:563"
+msgstr ""
+
+#: https//support.torproject.org/operators/default-exit-ports/
+#: (content/operators/default-exit-ports/contents+en.lrquestion.description)
+msgid "reject *:1214"
+msgstr ""
+
+#: https//support.torproject.org/operators/default-exit-ports/
+#: (content/operators/default-exit-ports/contents+en.lrquestion.description)
+msgid "reject *:4661-4666"
+msgstr ""
+
+#: https//support.torproject.org/operators/default-exit-ports/
+#: (content/operators/default-exit-ports/contents+en.lrquestion.description)
+msgid "reject *:6346-6429"
+msgstr ""
+
+#: https//support.torproject.org/operators/default-exit-ports/
+#: (content/operators/default-exit-ports/contents+en.lrquestion.description)
+msgid "reject *:6699"
+msgstr ""
+
+#: https//support.torproject.org/operators/default-exit-ports/
+#: (content/operators/default-exit-ports/contents+en.lrquestion.description)
+msgid "reject *:6881-6999"
+msgstr ""
+
+#: https//support.torproject.org/operators/default-exit-ports/
+#: (content/operators/default-exit-ports/contents+en.lrquestion.description)
+msgid "accept *:*"
+msgstr ""
+
+#: https//support.torproject.org/operators/default-exit-ports/
+#: (content/operators/default-exit-ports/contents+en.lrquestion.description)
+msgid ""
+"[1]: "
+"https://gitlab.torproject.org/tpo/core/tor/-/blob/release-0.4.6/src/core/or/policies.c#L85"
+msgstr ""
+
+#: https//support.torproject.org/operators/default-exit-ports/
+#: (content/operators/default-exit-ports/contents+en.lrquestion.description)
+msgid ""
+"[2]: "
+"https://gitlab.torproject.org/tpo/core/tor/-/blob/release-0.4.6/src/core/or/policies.c#L1901"
+msgstr ""
+
+#: https//support.torproject.org/operators/default-exit-ports/
+#: (content/operators/default-exit-ports/contents+en.lrquestion.description)
+msgid "[3]: https://gitlab.torproject.org/tpo/core/tor/-/tree/release-0.4.6/"
+msgstr ""
+
#: https//support.torproject.org/operators/dynamic-ip/
#: (content/operators/dynamic-ip/contents+en.lrquestion.title)
msgid "Can I run a Tor relay using a dynamic IP address?"
@@ -7082,21 +7998,6 @@ msgid ""
"into hibernation, signaled by this entry in the log:"
msgstr "å æ¤æ¨å¯è½ä¼åç°ï¼ä¸æ¦æ¨ç Tor è¿å
¥ä¼ç ï¼æ¨å°±ä¸è½è¿è¡æµè§äºï¼èä¸å¨æ¥å¿éä¼åºç°è¿æ ·ä¸æ¡è®°å½ï¼"
-#: https//support.torproject.org/operators/hibernation/
-#: (content/operators/hibernation/contents+en.lrquestion.description)
-#: https//support.torproject.org/operators/limit-total-bandwidth/
-#: (content/operators/limit-total-bandwidth/contents+en.lrquestion.description)
-#: https//support.torproject.org/misc/bug-or-feedback/
-#: (content/misc/bug-or-feedback/contents+en.lrquestion.description)
-#: https//support.torproject.org/get-in-touch/why-i-cant-join-tor-channels/
-#: (content/get-in-touch/why-i-cant-join-tor-channels/contents+en.lrquestion.description)
-#: https//support.torproject.org/apt/tor-deb-repo/
-#: (content/apt/apt-1/contents+en.lrquestion.description)
-#: https//support.torproject.org/apt/apt-over-tor/
-#: (content/apt/apt-3/contents+en.lrquestion.description)
-msgid "```"
-msgstr "```"
-
#: https//support.torproject.org/operators/hibernation/
#: (content/operators/hibernation/contents+en.lrquestion.description)
msgid "Bandwidth soft limit reached; commencing hibernation."
@@ -9412,6 +10313,131 @@ msgstr "uid tor-security at lists.torproject.org"
msgid "sub 4096R/C00942E4 2017-03-13"
msgstr "sub 4096R/C00942E4 2017-03-13"
+#: https//support.torproject.org/misc/check-socks-dns-leaks/
+#: (content/misc/check-socks-dns-leaks/contents+en.lrquestion.title)
+msgid ""
+"How do I check if my application that uses SOCKS is leaking DNS requests?"
+msgstr ""
+
+#: https//support.torproject.org/misc/check-socks-dns-leaks/
+#: (content/misc/check-socks-dns-leaks/contents+en.lrquestion.description)
+msgid ""
+"Even if your application is using the correct variant of the SOCKS protocol,"
+" there is still a risk that it could be leaking DNS queries."
+msgstr ""
+
+#: https//support.torproject.org/misc/check-socks-dns-leaks/
+#: (content/misc/check-socks-dns-leaks/contents+en.lrquestion.description)
+msgid ""
+"This problem happens in Firefox extensions that resolve the destination "
+"hostname themselves, for example to show you its IP address, what country "
+"it's in, etc."
+msgstr ""
+
+#: https//support.torproject.org/misc/check-socks-dns-leaks/
+#: (content/misc/check-socks-dns-leaks/contents+en.lrquestion.description)
+msgid ""
+"If you suspect your application might behave like this, follow the "
+"instructions below to check."
+msgstr ""
+
+#: https//support.torproject.org/misc/check-socks-dns-leaks/
+#: (content/misc/check-socks-dns-leaks/contents+en.lrquestion.description)
+msgid ""
+"1. Add `TestSocks 1` to your [torrc file](https://support.torproject.org/tbb"
+"/tbb-editing-torrc/)."
+msgstr ""
+
+#: https//support.torproject.org/misc/check-socks-dns-leaks/
+#: (content/misc/check-socks-dns-leaks/contents+en.lrquestion.description)
+msgid ""
+"1. Start Tor, and point your program's SOCKS proxy settings to Tor's SOCKS5 "
+"server (`socks5://127.0.0.1:9050` by default)."
+msgstr ""
+
+#: https//support.torproject.org/misc/check-socks-dns-leaks/
+#: (content/misc/check-socks-dns-leaks/contents+en.lrquestion.description)
+msgid ""
+"1. Watch your logs as you use your application. For each socks connection, "
+"Tor will log a `notice` for safe connections, and a `warn` for connections "
+"leaking DNS requests."
+msgstr ""
+
+#: https//support.torproject.org/misc/check-socks-dns-leaks/
+#: (content/misc/check-socks-dns-leaks/contents+en.lrquestion.description)
+msgid ""
+"If you want to automatically disable all connections leaking DNS requests, "
+"set `SafeSocks 1` in your torrc file."
+msgstr ""
+
+#: https//support.torproject.org/misc/hide-exits/
+#: (content/misc/hide-exits/contents+en.lrquestion.title)
+msgid ""
+"You should hide the list of Tor relays, so people can't block the exits."
+msgstr ""
+
+#: https//support.torproject.org/misc/hide-exits/
+#: (content/misc/hide-exits/contents+en.lrquestion.description)
+msgid "There are a few reasons we don't:"
+msgstr ""
+
+#: https//support.torproject.org/misc/hide-exits/
+#: (content/misc/hide-exits/contents+en.lrquestion.description)
+msgid ""
+"1. We can't help but make the information available, since Tor clients need "
+"to use it to pick their paths."
+msgstr ""
+
+#: https//support.torproject.org/misc/hide-exits/
+#: (content/misc/hide-exits/contents+en.lrquestion.description)
+msgid "So if the \"blockers\" want it, they can get it anyway."
+msgstr ""
+
+#: https//support.torproject.org/misc/hide-exits/
+#: (content/misc/hide-exits/contents+en.lrquestion.description)
+msgid ""
+"Further, even if we didn't tell clients about the list of relays directly, "
+"somebody could still make a lot of connections through Tor to a test site "
+"and build a list of the addresses they see."
+msgstr ""
+
+#: https//support.torproject.org/misc/hide-exits/
+#: (content/misc/hide-exits/contents+en.lrquestion.description)
+msgid ""
+"1. If people want to block us, we believe that they should be allowed to do "
+"so."
+msgstr ""
+
+#: https//support.torproject.org/misc/hide-exits/
+#: (content/misc/hide-exits/contents+en.lrquestion.description)
+msgid ""
+"Obviously, we would prefer for everybody to allow Tor users to connect to "
+"them, but people have the right to decide who their services should allow "
+"connections from, and if they want to block anonymous users, they can."
+msgstr ""
+
+#: https//support.torproject.org/misc/hide-exits/
+#: (content/misc/hide-exits/contents+en.lrquestion.description)
+msgid ""
+"1. Being blockable also has tactical advantages: it may be a persuasive "
+"response to website maintainers who feel threatened by Tor."
+msgstr ""
+
+#: https//support.torproject.org/misc/hide-exits/
+#: (content/misc/hide-exits/contents+en.lrquestion.description)
+msgid ""
+"Giving them the option may inspire them to stop and think about whether they"
+" really want to eliminate private access to their system, and if not, what "
+"other options they might have."
+msgstr ""
+
+#: https//support.torproject.org/misc/hide-exits/
+#: (content/misc/hide-exits/contents+en.lrquestion.description)
+msgid ""
+"The time they might otherwise have spent blocking Tor, they may instead "
+"spend rethinking their overall approach to privacy and anonymity."
+msgstr ""
+
#: https//support.torproject.org/misc/menu/
#: (content/misc/menu/contents+en.lrquestion.description)
msgid "About"
@@ -10020,57 +11046,21 @@ msgstr "### å¦ä½éªè¯æ¨çæµç§°"
#: https//support.torproject.org/get-in-touch/why-i-cant-join-tor-channels/
#: (content/get-in-touch/why-i-cant-join-tor-channels/contents+en.lrquestion.description)
msgid ""
-"Then, to complete the registration and ultimately gain access to the #tor-"
-"project channel, your nickname must be **verified**."
-msgstr "ç¶åï¼æ¨å¿
é¡»âéªè¯âæ¨çæµç§°ï¼ä»¥å®æ注å并æç»å¾å° #tor-projecté¢éç访é®æéã"
-
-#: https//support.torproject.org/get-in-touch/why-i-cant-join-tor-channels/
-#: (content/get-in-touch/why-i-cant-join-tor-channels/contents+en.lrquestion.description)
-msgid ""
-"1. To verify your nick, open a new browser window and go to "
-"https://webchat.oftc.net/?channels=tor."
+"After registering your nickname, to gain access to the #tor-project and "
+"other protected channels, your nickname must be **verified**."
msgstr ""
-#: https//support.torproject.org/get-in-touch/why-i-cant-join-tor-channels/
-#: (content/get-in-touch/why-i-cant-join-tor-channels/contents+en.lrquestion.description)
-msgid "2. Log in with your IRC nickname and password."
-msgstr "2. 使ç¨æ¨çIRCæµç§°åå¯ç æ¥ç»å
¥ã"
-
-#: https//support.torproject.org/get-in-touch/why-i-cant-join-tor-channels/
-#: (content/get-in-touch/why-i-cant-join-tor-channels/contents+en.lrquestion.description)
-msgid ""
-"3. Look for the word **verify** and log in there. It may appear that nothing"
-" has happened. Look at the top of the page, and there will be a column "
-"called **Account**."
-msgstr "3. æ¾å°**éªè¯**åæ ·ï¼å¹¶å¨è¯¥å¤ç»éãæå¯è½çä¸å»ä»ä¹é½æ²¡åçã请ç页é¢ç顶é¨ï¼ä¼åºç°ä¸æ å«å**è´¦æ·**ã"
-
-#: https//support.torproject.org/get-in-touch/why-i-cant-join-tor-channels/
-#: (content/get-in-touch/why-i-cant-join-tor-channels/contents+en.lrquestion.description)
-msgid "4. Click on **Account**."
-msgstr "4. ç¹å»**è´¦æ·**ã"
-
-#: https//support.torproject.org/get-in-touch/why-i-cant-join-tor-channels/
-#: (content/get-in-touch/why-i-cant-join-tor-channels/contents+en.lrquestion.description)
-msgid ""
-"5. Click on the small sentence at the bottom of the square that says: Verify"
-" account."
-msgstr "5. ç¹å»æ£æ¹å½¢åºé¨çé£å¥è¯ï¼éªè¯è´¦æ·"
-
-#: https//support.torproject.org/get-in-touch/why-i-cant-join-tor-channels/
-#: (content/get-in-touch/why-i-cant-join-tor-channels/contents+en.lrquestion.description)
-msgid "6. Fill out the Captcha that pops up, and click ok."
-msgstr "6. å¡«å
¥å¼¹åºçCAPTCHAéªè¯ï¼ç¶åç¹å»ç¡®å®ã"
-
#: https//support.torproject.org/get-in-touch/why-i-cant-join-tor-channels/
#: (content/get-in-touch/why-i-cant-join-tor-channels/contents+en.lrquestion.description)
msgid ""
-"7. A tiny message will appear: \"Your NickServ account has been verified.\""
-msgstr "7. ä¸åä¿¡æ¯ä¼åºç°ï¼âæ¨çæµç§°æå¡è´¦å·å·²ç»éè¿éªè¯ãâ"
+"1. Go to https://services.oftc.net/ and follow the steps in the '*To verify "
+"your account*' section"
+msgstr ""
#: https//support.torproject.org/get-in-touch/why-i-cant-join-tor-channels/
#: (content/get-in-touch/why-i-cant-join-tor-channels/contents+en.lrquestion.description)
-msgid "8. Go back to the IRC webpage where you are logged in and type:"
-msgstr "8. è¿åæ¨å·²ç»å½çIRCç½é¡µå¹¶è¾å
¥ï¼"
+msgid "2. Go back to the IRC webpage where you are logged in and type:"
+msgstr ""
#: https//support.torproject.org/get-in-touch/why-i-cant-join-tor-channels/
#: (content/get-in-touch/why-i-cant-join-tor-channels/contents+en.lrquestion.description)
@@ -10079,13 +11069,13 @@ msgstr "`/msg nickserv checkverify`"
#: https//support.torproject.org/get-in-touch/why-i-cant-join-tor-channels/
#: (content/get-in-touch/why-i-cant-join-tor-channels/contents+en.lrquestion.description)
-msgid "9. Click ENTER."
-msgstr "9. ç¹å»ç¡®å®ã"
+msgid "3. Click ENTER."
+msgstr ""
#: https//support.torproject.org/get-in-touch/why-i-cant-join-tor-channels/
#: (content/get-in-touch/why-i-cant-join-tor-channels/contents+en.lrquestion.description)
-msgid "10. If all is well, you will receive a message that says:"
-msgstr "10. å¦æä¸å顺å©ï¼æ¨å°ä¼æ¶å°ä¸æ¡æ¶æ¯ï¼åçï¼"
+msgid "4. If all is well, you will receive a message that says:"
+msgstr ""
#: https//support.torproject.org/get-in-touch/why-i-cant-join-tor-channels/
#: (content/get-in-touch/why-i-cant-join-tor-channels/contents+en.lrquestion.description)
@@ -10225,21 +11215,23 @@ msgstr "# apt install apt-transport-https"
#: https//support.torproject.org/apt/tor-deb-repo/
#: (content/apt/apt-1/contents+en.lrquestion.description)
msgid ""
-"#### 2. Add the following entries to `/etc/apt/sources.list` or a new file "
-"in `/etc/apt/sources.list.d/`"
+"#### 2. Create a new file in `/etc/apt/sources.list.d/` named `tor.list`. "
+"Add the following entries:"
msgstr ""
-"#### 2. å°ä»¥ä¸æ¡ç®å å° \"/etc/apt/sources.list\" åï¼æè
â/etc/apt/sources.list.d/â "
-"ä¸çä¸ä¸ªæ°æ件ä¸ã"
#: https//support.torproject.org/apt/tor-deb-repo/
#: (content/apt/apt-1/contents+en.lrquestion.description)
-msgid "deb https://deb.torproject.org/torproject.org <DISTRIBUTION> main"
+msgid ""
+"deb [signed-by=/usr/share/keyrings/tor-archive-keyring.gpg] "
+"https://deb.torproject.org/torproject.org <DISTRIBUTION> main"
msgstr ""
#: https//support.torproject.org/apt/tor-deb-repo/
#: (content/apt/apt-1/contents+en.lrquestion.description)
-msgid "deb-src https://deb.torproject.org/torproject.org <DISTRIBUTION> main"
-msgstr "deb-src https://deb.torproject.org/torproject.org <DISTRIBUTION> main"
+msgid ""
+"deb-src [signed-by=/usr/share/keyrings/tor-archive-keyring.gpg] "
+"https://deb.torproject.org/torproject.org <DISTRIBUTION> main"
+msgstr ""
#: https//support.torproject.org/apt/tor-deb-repo/
#: (content/apt/apt-1/contents+en.lrquestion.description)
@@ -10252,14 +11244,16 @@ msgstr ""
#: https//support.torproject.org/apt/tor-deb-repo/
#: (content/apt/apt-1/contents+en.lrquestion.description)
msgid ""
-"deb https://deb.torproject.org/torproject.org tor-"
+"deb [signed-by=/usr/share/keyrings/tor-archive-keyring.gpg] "
+"https://deb.torproject.org/torproject.org tor-"
"experimental-0.4.6.x-<DISTRIBUTION> main"
msgstr ""
#: https//support.torproject.org/apt/tor-deb-repo/
#: (content/apt/apt-1/contents+en.lrquestion.description)
msgid ""
-"deb-src https://deb.torproject.org/torproject.org tor-"
+"deb-src [signed-by=/usr/share/keyrings/tor-archive-keyring.gpg] "
+"https://deb.torproject.org/torproject.org tor-"
"experimental-0.4.6.x-<DISTRIBUTION> main"
msgstr ""
@@ -10271,18 +11265,18 @@ msgstr "ææ¯æ¯ææ建ï¼"
#: https//support.torproject.org/apt/tor-deb-repo/
#: (content/apt/apt-1/contents+en.lrquestion.description)
msgid ""
-"deb https://deb.torproject.org/torproject.org tor-nightly-"
-"master-<DISTRIBUTION> main"
+"deb [signed-by=/usr/share/keyrings/tor-archive-keyring.gpg] "
+"https://deb.torproject.org/torproject.org tor-nightly-master-<DISTRIBUTION> "
+"main"
msgstr ""
#: https//support.torproject.org/apt/tor-deb-repo/
#: (content/apt/apt-1/contents+en.lrquestion.description)
msgid ""
-"deb-src https://deb.torproject.org/torproject.org tor-nightly-"
-"master-<DISTRIBUTION> main"
+"deb-src [signed-by=/usr/share/keyrings/tor-archive-keyring.gpg] "
+"https://deb.torproject.org/torproject.org tor-nightly-master-<DISTRIBUTION> "
+"main"
msgstr ""
-"deb-src https://deb.torproject.org/torproject.org tor-nightly-"
-"master-<DISTRIBUTION> main"
#: https//support.torproject.org/apt/tor-deb-repo/
#: (content/apt/apt-1/contents+en.lrquestion.description)
@@ -10302,13 +11296,15 @@ msgstr ""
#: https//support.torproject.org/apt/tor-deb-repo/
#: (content/apt/apt-1/contents+en.lrquestion.description)
msgid ""
-"deb [arch=amd64] https://deb.torproject.org/torproject.org focal main"
+"deb [arch=amd64 signed-by=/usr/share/keyrings/tor-archive-keyring.gpg] "
+"https://deb.torproject.org/torproject.org focal main"
msgstr ""
#: https//support.torproject.org/apt/tor-deb-repo/
#: (content/apt/apt-1/contents+en.lrquestion.description)
msgid ""
-"deb-src [arch=amd64] https://deb.torproject.org/torproject.org focal main"
+"deb-src [arch=amd64 signed-by=/usr/share/keyrings/tor-archive-keyring.gpg] "
+"https://deb.torproject.org/torproject.org focal main"
msgstr ""
#: https//support.torproject.org/apt/tor-deb-repo/
@@ -10328,26 +11324,17 @@ msgstr ""
#: (content/apt/apt-1/contents+en.lrquestion.description)
msgid ""
"#### 3. Then add the gpg key used to sign the packages by running the "
-"following commands at your command prompt"
-msgstr "#### 3. ç¶åï¼å¨å½ä»¤çªå£ä¸è¿è¡ä¸é¢çå½ä»¤æ¥æ·»å ç¨äºç¾å软件å
ç gpg å
¬é¥ï¼"
-
-#: https//support.torproject.org/apt/tor-deb-repo/
-#: (content/apt/apt-1/contents+en.lrquestion.description)
-msgid ""
-"# wget -qO- "
-"https://deb.torproject.org/torproject.org/A3C4F0F979CAA22CDBA8F512EE8CBC9E886DDD89.asc"
-" | gpg --import"
+"following command at your command prompt:"
msgstr ""
-"# wget -qO- "
-"https://deb.torproject.org/torproject.org/A3C4F0F979CAA22CDBA8F512EE8CBC9E886DDD89.asc"
-" | gpg --import"
#: https//support.torproject.org/apt/tor-deb-repo/
#: (content/apt/apt-1/contents+en.lrquestion.description)
msgid ""
-"# gpg --export A3C4F0F979CAA22CDBA8F512EE8CBC9E886DDD89 | apt-key add -"
+"# wget -O- "
+"https://deb.torproject.org/torproject.org/A3C4F0F979CAA22CDBA8F512EE8CBC9E886DDD89.asc"
+" | gpg --dearmor | tee /usr/share/keyrings/tor-archive-keyring.gpg "
+">/dev/null"
msgstr ""
-"# gpg --export A3C4F0F979CAA22CDBA8F512EE8CBC9E886DDD89 | apt-key add -"
#: https//support.torproject.org/apt/tor-deb-repo/
#: (content/apt/apt-1/contents+en.lrquestion.description)
@@ -11954,6 +12941,82 @@ msgid ""
"doesn't change IP address over the day."
msgstr ""
+#: https//support.torproject.org/alternate-designs/block-websites/
+#: (content/alternate-designs/block-websites/contents+en.lrquestion.title)
+msgid "Exit policies should be able to block websites, not just IP addresses."
+msgstr ""
+
+#: https//support.torproject.org/alternate-designs/block-websites/
+#: (content/alternate-designs/block-websites/contents+en.lrquestion.description)
+msgid ""
+"It would be nice to let relay operators say things like `reject "
+"www.slashdot.org` in their exit policies, rather than requiring them to "
+"learn all the IP address space that could be covered by the site (and then "
+"also blocking other sites at those IP addresses)."
+msgstr ""
+
+#: https//support.torproject.org/alternate-designs/block-websites/
+#: (content/alternate-designs/block-websites/contents+en.lrquestion.description)
+msgid "There are two problems, though."
+msgstr ""
+
+#: https//support.torproject.org/alternate-designs/block-websites/
+#: (content/alternate-designs/block-websites/contents+en.lrquestion.description)
+msgid "First, users could still get around these blocks."
+msgstr ""
+
+#: https//support.torproject.org/alternate-designs/block-websites/
+#: (content/alternate-designs/block-websites/contents+en.lrquestion.description)
+msgid ""
+"For example, they could request the IP address rather than the hostname when"
+" they exit from the Tor network."
+msgstr ""
+
+#: https//support.torproject.org/alternate-designs/block-websites/
+#: (content/alternate-designs/block-websites/contents+en.lrquestion.description)
+msgid ""
+"This means operators would still need to learn all the IP addresses for the "
+"destinations in question."
+msgstr ""
+
+#: https//support.torproject.org/alternate-designs/block-websites/
+#: (content/alternate-designs/block-websites/contents+en.lrquestion.description)
+msgid ""
+"The second problem is that it would allow remote attackers to censor "
+"arbitrary sites."
+msgstr ""
+
+#: https//support.torproject.org/alternate-designs/block-websites/
+#: (content/alternate-designs/block-websites/contents+en.lrquestion.description)
+msgid ""
+"For example, if a Tor operator blocks www1.slashdot.org, and then some "
+"attacker poisons the Tor relay's DNS or otherwise changes that hostname to "
+"resolve to the IP address for a major news site, then suddenly that Tor "
+"relay is blocking the news site."
+msgstr ""
+
+#: https//support.torproject.org/alternate-designs/let-the-network-pick-the-path/
+#: (content/alternate-designs/let-the-network-pick-the-path/contents+en.lrquestion.title)
+msgid "You should let the network pick the path, not the client."
+msgstr ""
+
+#: https//support.torproject.org/alternate-designs/let-the-network-pick-the-path/
+#: (content/alternate-designs/let-the-network-pick-the-path/contents+en.lrquestion.description)
+msgid "No, you cannot trust the network to pick the path."
+msgstr ""
+
+#: https//support.torproject.org/alternate-designs/let-the-network-pick-the-path/
+#: (content/alternate-designs/let-the-network-pick-the-path/contents+en.lrquestion.description)
+msgid "Malicious relays could route you through their colluding friends."
+msgstr ""
+
+#: https//support.torproject.org/alternate-designs/let-the-network-pick-the-path/
+#: (content/alternate-designs/let-the-network-pick-the-path/contents+en.lrquestion.description)
+msgid ""
+"This would give an adversary the ability to watch all of your traffic end to"
+" end."
+msgstr ""
+
#: lego/templates/banner.html:3 lego/templates/banner.html:5
#: templates/banner.html:3 templates/banner.html:5
msgid "Close banner"
@@ -11984,8 +13047,8 @@ msgid "DONATE NOW"
msgstr "ç«å³æå©"
#: lego/templates/footer.html:13 lego/templates/footer.html:22
-#: lego/templates/navbar.html:83 templates/footer.html:13
-#: templates/footer.html:22 templates/navbar.html:83
+#: lego/templates/navbar.html:95 templates/footer.html:13
+#: templates/footer.html:22 templates/navbar.html:95
msgid "Download Tor Browser"
msgstr "ä¸è½½ Tor æµè§å¨"
diff --git a/contents+zh-TW.po b/contents+zh-TW.po
index fa0e0260cf..d52d403c2e 100644
--- a/contents+zh-TW.po
+++ b/contents+zh-TW.po
@@ -18,7 +18,7 @@ msgid ""
msgstr ""
"Project-Id-Version: PACKAGE VERSION\n"
"Report-Msgid-Bugs-To: \n"
-"POT-Creation-Date: 2021-08-25 11:14+CET\n"
+"POT-Creation-Date: 2021-09-01 12:20+CET\n"
"PO-Revision-Date: 2018-10-02 22:41+0000\n"
"Last-Translator: Emma Peel, 2021\n"
"Language-Team: Chinese (Taiwan) (https://www.transifex.com/otf/teams/1519/zh_TW/)\n"
@@ -151,6 +151,11 @@ msgstr ""
msgid "Tor Metrics"
msgstr ""
+#: https//support.torproject.org/alternate-designs/
+#: (content/alternate-designs/contents+en.lrtopic.title)
+msgid "Alternate Designs We Don't Do (Yet)"
+msgstr ""
+
#: https//support.torproject.org/glossary/add-on-extension-or-plugin/
#: (content/glossary/add-on-extension-or-plugin/contents+en.lrword.term)
msgid "add-on, extension, or plugin"
@@ -2054,6 +2059,61 @@ msgid ""
"wiki](https://trac.torproject.org/projects/tor/wiki/doc/TorPlusVPN)."
msgstr ""
+#: https//support.torproject.org/faq/relay-donations/
+#: (content/faq/relay-donations/contents+en.lrquestion.title)
+msgid "Can I donate for a relay rather than run my own?"
+msgstr ""
+
+#: https//support.torproject.org/faq/relay-donations/
+#: (content/faq/relay-donations/contents+en.lrquestion.description)
+msgid ""
+"Sure! We have a [list of organizations that run Tor "
+"relays](https://community.torproject.org/relay/community-resources/relay-"
+"associations/) that are happy to turn your donations into better speed and "
+"anonymity for the Tor network."
+msgstr ""
+
+#: https//support.torproject.org/faq/relay-donations/
+#: (content/faq/relay-donations/contents+en.lrquestion.description)
+msgid ""
+"These organizations are not the same as [The Tor Project, "
+"Inc](https://donate.torproject.org/), but we consider that a good thing."
+msgstr ""
+
+#: https//support.torproject.org/faq/relay-donations/
+#: (content/faq/relay-donations/contents+en.lrquestion.description)
+msgid "They're run by nice people who are part of the Tor community."
+msgstr ""
+
+#: https//support.torproject.org/faq/relay-donations/
+#: (content/faq/relay-donations/contents+en.lrquestion.description)
+msgid ""
+"Note that there can be a tradeoff here between anonymity and performance."
+msgstr ""
+
+#: https//support.torproject.org/faq/relay-donations/
+#: (content/faq/relay-donations/contents+en.lrquestion.description)
+msgid ""
+"The Tor network's anonymity comes in part from diversity, so if you are in a"
+" position to run your own relay, you will be improving Tor's anonymity more "
+"than by donating."
+msgstr ""
+
+#: https//support.torproject.org/faq/relay-donations/
+#: (content/faq/relay-donations/contents+en.lrquestion.description)
+msgid ""
+"At the same time though, economies of scale for bandwidth mean that "
+"combining many small donations into several larger relays is more efficient "
+"at improving network performance."
+msgstr ""
+
+#: https//support.torproject.org/faq/relay-donations/
+#: (content/faq/relay-donations/contents+en.lrquestion.description)
+msgid ""
+"Improving anonymity and improving performance are both worthwhile goals, so "
+"however you can help is great!"
+msgstr ""
+
#: https//support.torproject.org/faq/staying-anonymous/
#: (content/faq/staying-anonymous/contents+en.lrquestion.title)
msgid "Am I totally anonymous if I use Tor?"
@@ -2355,6 +2415,61 @@ msgid ""
" documenting all the issues](https://community.torproject.org/)."
msgstr ""
+#: https//support.torproject.org/about/attacks-on-onion-routing/
+#: (content/about/attacks-on-onion-routing/contents+en.lrquestion.title)
+msgid "What attacks remain against onion routing?"
+msgstr ""
+
+#: https//support.torproject.org/about/attacks-on-onion-routing/
+#: (content/about/attacks-on-onion-routing/contents+en.lrquestion.description)
+msgid ""
+"As mentioned above, it is possible for an observer who can view both you and"
+" either the destination website or your Tor exit node to correlate timings "
+"of your traffic as it enters the Tor network and also as it exits."
+msgstr ""
+
+#: https//support.torproject.org/about/attacks-on-onion-routing/
+#: (content/about/attacks-on-onion-routing/contents+en.lrquestion.description)
+msgid "Tor does not defend against such a threat model."
+msgstr ""
+
+#: https//support.torproject.org/about/attacks-on-onion-routing/
+#: (content/about/attacks-on-onion-routing/contents+en.lrquestion.description)
+msgid ""
+"In a more limited sense, note that if a censor or law enforcement agency has"
+" the ability to obtain specific observation of parts of the network, it is "
+"possible for them to verify a suspicion that you talk regularly to your "
+"friend by observing traffic at both ends and correlating the timing of only "
+"that traffic."
+msgstr ""
+
+#: https//support.torproject.org/about/attacks-on-onion-routing/
+#: (content/about/attacks-on-onion-routing/contents+en.lrquestion.description)
+msgid ""
+"Again, this is only useful to verify that parties already suspected of "
+"communicating with one another are doing so."
+msgstr ""
+
+#: https//support.torproject.org/about/attacks-on-onion-routing/
+#: (content/about/attacks-on-onion-routing/contents+en.lrquestion.description)
+msgid ""
+"In most countries, the suspicion required to obtain a warrant already "
+"carries more weight than timing correlation would provide."
+msgstr ""
+
+#: https//support.torproject.org/about/attacks-on-onion-routing/
+#: (content/about/attacks-on-onion-routing/contents+en.lrquestion.description)
+msgid ""
+"Furthermore, since Tor reuses circuits for multiple TCP connections, it is "
+"possible to associate non anonymous and anonymous traffic at a given exit "
+"node, so be careful about what applications you run concurrently over Tor."
+msgstr ""
+
+#: https//support.torproject.org/about/attacks-on-onion-routing/
+#: (content/about/attacks-on-onion-routing/contents+en.lrquestion.description)
+msgid "Perhaps even run separate Tor clients for these applications."
+msgstr ""
+
#: https//support.torproject.org/about/backdoor/
#: (content/about/backdoor/contents+en.lrquestion.title)
msgid "Is there a backdoor in Tor?"
@@ -2490,6 +2605,43 @@ msgid ""
"recommended](/tbb/tbb-9/)."
msgstr ""
+#: https//support.torproject.org/about/change-paths/
+#: (content/about/change-paths/contents+en.lrquestion.title)
+msgid "How often does Tor change its paths?"
+msgstr ""
+
+#: https//support.torproject.org/about/change-paths/
+#: (content/about/change-paths/contents+en.lrquestion.description)
+msgid ""
+"Tor will reuse the same circuit for new TCP streams for 10 minutes, as long "
+"as the circuit is working fine."
+msgstr ""
+
+#: https//support.torproject.org/about/change-paths/
+#: (content/about/change-paths/contents+en.lrquestion.description)
+msgid "(If the circuit fails, Tor will switch to a new circuit immediately.)"
+msgstr ""
+
+#: https//support.torproject.org/about/change-paths/
+#: (content/about/change-paths/contents+en.lrquestion.description)
+msgid ""
+"But note that a single TCP stream (e.g. a long IRC connection) will stay on "
+"the same circuit forever."
+msgstr ""
+
+#: https//support.torproject.org/about/change-paths/
+#: (content/about/change-paths/contents+en.lrquestion.description)
+msgid "We don't rotate individual streams from one circuit to the next."
+msgstr ""
+
+#: https//support.torproject.org/about/change-paths/
+#: (content/about/change-paths/contents+en.lrquestion.description)
+msgid ""
+"Otherwise, an adversary with a partial view of the network would be given "
+"many chances over time to link you to your destination, rather than just one"
+" chance."
+msgstr ""
+
#: https//support.torproject.org/about/distribute-tor/
#: (content/about/distribute-tor/contents+en.lrquestion.title)
msgid "Can I distribute Tor?"
@@ -2585,6 +2737,133 @@ msgid ""
"details."
msgstr ""
+#: https//support.torproject.org/about/entry-guards/
+#: (content/about/entry-guards/contents+en.lrquestion.title)
+msgid "What are Entry Guards?"
+msgstr ""
+
+#: https//support.torproject.org/about/entry-guards/
+#: (content/about/entry-guards/contents+en.lrquestion.description)
+msgid ""
+"Tor (like all current practical low-latency anonymity designs) fails when "
+"the attacker can see both ends of the communications channel."
+msgstr ""
+
+#: https//support.torproject.org/about/entry-guards/
+#: (content/about/entry-guards/contents+en.lrquestion.description)
+msgid ""
+"For example, suppose the attacker controls or watches the Tor relay you "
+"choose to enter the network, and also controls or watches the website you "
+"visit."
+msgstr ""
+
+#: https//support.torproject.org/about/entry-guards/
+#: (content/about/entry-guards/contents+en.lrquestion.description)
+msgid ""
+"In this case, the research community knows no practical low-latency design "
+"that can reliably stop the attacker from correlating volume and timing "
+"information on the two sides."
+msgstr ""
+
+#: https//support.torproject.org/about/entry-guards/
+#: (content/about/entry-guards/contents+en.lrquestion.description)
+msgid "So, what should we do?"
+msgstr ""
+
+#: https//support.torproject.org/about/entry-guards/
+#: (content/about/entry-guards/contents+en.lrquestion.description)
+msgid "Suppose the attacker controls, or can observe, C relays."
+msgstr ""
+
+#: https//support.torproject.org/about/entry-guards/
+#: (content/about/entry-guards/contents+en.lrquestion.description)
+msgid "Suppose there are N relays total."
+msgstr ""
+
+#: https//support.torproject.org/about/entry-guards/
+#: (content/about/entry-guards/contents+en.lrquestion.description)
+msgid ""
+"If you select new entry and exit relays each time you use the network, the "
+"attacker will be able to correlate all traffic you send with probability "
+"around (c/n)2."
+msgstr ""
+
+#: https//support.torproject.org/about/entry-guards/
+#: (content/about/entry-guards/contents+en.lrquestion.description)
+msgid ""
+"But profiling is, for most users, as bad as being traced all the time: they "
+"want to do something often without an attacker noticing, and the attacker "
+"noticing once is as bad as the attacker noticing more often."
+msgstr ""
+
+#: https//support.torproject.org/about/entry-guards/
+#: (content/about/entry-guards/contents+en.lrquestion.description)
+msgid ""
+"Thus, choosing many random entries and exits gives the user no chance of "
+"escaping profiling by this kind of attacker."
+msgstr ""
+
+#: https//support.torproject.org/about/entry-guards/
+#: (content/about/entry-guards/contents+en.lrquestion.description)
+msgid ""
+"The solution is \"entry guards\": each Tor client selects a few relays at "
+"random to use as entry points, and uses only those relays for their first "
+"hop."
+msgstr ""
+
+#: https//support.torproject.org/about/entry-guards/
+#: (content/about/entry-guards/contents+en.lrquestion.description)
+msgid ""
+"If those relays are not controlled or observed, the attacker can't win, "
+"ever, and the user is secure."
+msgstr ""
+
+#: https//support.torproject.org/about/entry-guards/
+#: (content/about/entry-guards/contents+en.lrquestion.description)
+msgid ""
+"If those relays are observed or controlled by the attacker, the attacker "
+"sees a larger fraction of the user's traffic - but still the user is no more"
+" profiled than before."
+msgstr ""
+
+#: https//support.torproject.org/about/entry-guards/
+#: (content/about/entry-guards/contents+en.lrquestion.description)
+msgid ""
+"Thus, the user has some chance (on the order of (n-c)/n) of avoiding "
+"profiling, whereas they had none before."
+msgstr ""
+
+#: https//support.torproject.org/about/entry-guards/
+#: (content/about/entry-guards/contents+en.lrquestion.description)
+msgid ""
+"You can read more at [An Analysis of the Degradation of Anonymous "
+"Protocols](http://freehaven.net/anonbib/#wright02), [Defending Anonymous "
+"Communication Against Passive Logging "
+"Attacks](http://freehaven.net/anonbib/#wright03), and especially [Locating "
+"Hidden Servers](http://freehaven.net/anonbib/#hs-attack06)."
+msgstr ""
+
+#: https//support.torproject.org/about/entry-guards/
+#: (content/about/entry-guards/contents+en.lrquestion.description)
+msgid ""
+"Restricting your entry nodes may also help against attackers who want to run"
+" a few Tor nodes and easily enumerate all of the Tor user IP addresses."
+msgstr ""
+
+#: https//support.torproject.org/about/entry-guards/
+#: (content/about/entry-guards/contents+en.lrquestion.description)
+msgid ""
+"(Even though they can't learn what destinations the users are talking to, "
+"they still might be able to do bad things with just a list of users.)"
+msgstr ""
+
+#: https//support.torproject.org/about/entry-guards/
+#: (content/about/entry-guards/contents+en.lrquestion.description)
+msgid ""
+"However, that feature won't really become useful until we move to a "
+"\"directory guard\" design as well."
+msgstr ""
+
#: https//support.torproject.org/about/how-is-tor-different-from-other-proxies/
#: (content/about/how-is-tor-different-from-other-proxies/contents+en.lrquestion.title)
msgid "How is Tor different from other proxies?"
@@ -2755,6 +3034,162 @@ msgid ""
" Tor and HTTPS interact."
msgstr ""
+#: https//support.torproject.org/about/key-management/
+#: (content/about/key-management/contents+en.lrquestion.title)
+msgid "Tell me about all the keys Tor uses"
+msgstr ""
+
+#: https//support.torproject.org/about/key-management/
+#: (content/about/key-management/contents+en.lrquestion.description)
+msgid ""
+"Tor uses a variety of different keys, with three goals in mind: 1) "
+"encryption to ensure privacy of data within the Tor network, 2) "
+"authentication so clients know they're talking to the relays they meant to "
+"talk to, and 3) signatures to make sure all clients know the same set of "
+"relays."
+msgstr ""
+
+#: https//support.torproject.org/about/key-management/
+#: (content/about/key-management/contents+en.lrquestion.description)
+msgid ""
+"**Encryption**: first, all connections in Tor use TLS link encryption, so "
+"observers can't look inside to see which circuit a given cell is intended "
+"for."
+msgstr ""
+
+#: https//support.torproject.org/about/key-management/
+#: (content/about/key-management/contents+en.lrquestion.description)
+msgid ""
+"Further, the Tor client establishes an ephemeral encryption key with each "
+"relay in the circuit; these extra layers of encryption mean that only the "
+"exit relay can read the cells."
+msgstr ""
+
+#: https//support.torproject.org/about/key-management/
+#: (content/about/key-management/contents+en.lrquestion.description)
+msgid ""
+"Both sides discard the circuit key when the circuit ends, so logging traffic"
+" and then breaking into the relay to discover the key won't work."
+msgstr ""
+
+#: https//support.torproject.org/about/key-management/
+#: (content/about/key-management/contents+en.lrquestion.description)
+msgid ""
+"**Authentication**: Every Tor relay has a public decryption key called the "
+"\"onion key\"."
+msgstr ""
+
+#: https//support.torproject.org/about/key-management/
+#: (content/about/key-management/contents+en.lrquestion.description)
+msgid "Each relay rotates its onion key once a week."
+msgstr ""
+
+#: https//support.torproject.org/about/key-management/
+#: (content/about/key-management/contents+en.lrquestion.description)
+msgid ""
+"When the Tor client establishes circuits, at each step it [demands that the "
+"Tor relay prove knowledge of its onion key](https://svn-"
+"archive.torproject.org/svn/projects/design-paper/tor-"
+"design.html#subsec:circuits)."
+msgstr ""
+
+#: https//support.torproject.org/about/key-management/
+#: (content/about/key-management/contents+en.lrquestion.description)
+msgid ""
+"That way the first node in the path can't just spoof the rest of the path."
+msgstr ""
+
+#: https//support.torproject.org/about/key-management/
+#: (content/about/key-management/contents+en.lrquestion.description)
+msgid ""
+"Because the Tor client chooses the path, it can make sure to get Tor's "
+"\"distributed trust\" property: no single relay in the path can know about "
+"both the client and what the client is doing."
+msgstr ""
+
+#: https//support.torproject.org/about/key-management/
+#: (content/about/key-management/contents+en.lrquestion.description)
+msgid ""
+"**Coordination**: How do clients know what the relays are, and how do they "
+"know that they have the right keys for them?"
+msgstr ""
+
+#: https//support.torproject.org/about/key-management/
+#: (content/about/key-management/contents+en.lrquestion.description)
+msgid "Each relay has a long-term public signing key called the \"identity key\"."
+msgstr ""
+
+#: https//support.torproject.org/about/key-management/
+#: (content/about/key-management/contents+en.lrquestion.description)
+msgid "Each directory authority additionally has a \"directory signing key\"."
+msgstr ""
+
+#: https//support.torproject.org/about/key-management/
+#: (content/about/key-management/contents+en.lrquestion.description)
+msgid ""
+"The directory authorities [provide a signed "
+"list](https://gitweb.torproject.org/torspec.git/tree/dir-spec.txt) of all "
+"the known relays, and in that list are a set of certificates from each relay"
+" (self-signed by their identity key) specifying their keys, locations, exit "
+"policies, and so on."
+msgstr ""
+
+#: https//support.torproject.org/about/key-management/
+#: (content/about/key-management/contents+en.lrquestion.description)
+msgid ""
+"So unless the adversary can control a majority of the directory authorities "
+"(as of 2021 there are 10 directory authorities), they can't trick the Tor "
+"client into using other Tor relays."
+msgstr ""
+
+#: https//support.torproject.org/about/key-management/
+#: (content/about/key-management/contents+en.lrquestion.description)
+msgid "How do clients know what the directory authorities are?"
+msgstr ""
+
+#: https//support.torproject.org/about/key-management/
+#: (content/about/key-management/contents+en.lrquestion.description)
+msgid ""
+"The Tor software comes with a built-in list of location and public key for "
+"each directory authority."
+msgstr ""
+
+#: https//support.torproject.org/about/key-management/
+#: (content/about/key-management/contents+en.lrquestion.description)
+msgid ""
+"So the only way to trick users into using a fake Tor network is to give them"
+" a specially modified version of the software."
+msgstr ""
+
+#: https//support.torproject.org/about/key-management/
+#: (content/about/key-management/contents+en.lrquestion.description)
+msgid "How do users know they've got the right software?"
+msgstr ""
+
+#: https//support.torproject.org/about/key-management/
+#: (content/about/key-management/contents+en.lrquestion.description)
+msgid ""
+"When we distribute the source code or a package, we digitally sign it with "
+"[GNU Privacy Guard](http://www.gnupg.org/). See the [instructions on how to "
+"check Tor Browser's signature](https://support.torproject.org/tbb/how-to-"
+"verify-signature/)."
+msgstr ""
+
+#: https//support.torproject.org/about/key-management/
+#: (content/about/key-management/contents+en.lrquestion.description)
+msgid ""
+"In order to be certain that it's really signed by us, you need to have met "
+"us in person and gotten a copy of our GPG key fingerprint, or you need to "
+"know somebody who has."
+msgstr ""
+
+#: https//support.torproject.org/about/key-management/
+#: (content/about/key-management/contents+en.lrquestion.description)
+msgid ""
+"If you're concerned about an attack on this level, we recommend you get "
+"involved with the security community and start meeting people."
+msgstr ""
+
#: https//support.torproject.org/about/no-data-scrubbing/
#: (content/about/no-data-scrubbing/contents+en.lrquestion.title)
msgid ""
@@ -2787,6 +3222,151 @@ msgid ""
"though."
msgstr ""
+#: https//support.torproject.org/about/protections/
+#: (content/about/protections/contents+en.lrquestion.title)
+msgid "What protections does Tor provide?"
+msgstr ""
+
+#: https//support.torproject.org/about/protections/
+#: (content/about/protections/contents+en.lrquestion.description)
+msgid ""
+"Internet communication is based on a store-and-forward model that can be "
+"understood in analogy to postal mail: Data is transmitted in blocks called "
+"IP datagrams or packets."
+msgstr ""
+
+#: https//support.torproject.org/about/protections/
+#: (content/about/protections/contents+en.lrquestion.description)
+msgid ""
+"Every packet includes a source IP address (of the sender) and a destination "
+"IP address (of the receiver), just as ordinary letters contain postal "
+"addresses of sender and receiver."
+msgstr ""
+
+#: https//support.torproject.org/about/protections/
+#: (content/about/protections/contents+en.lrquestion.description)
+msgid ""
+"The way from sender to receiver involves multiple hops of routers, where "
+"each router inspects the destination IP address and forwards the packet "
+"closer to its destination."
+msgstr ""
+
+#: https//support.torproject.org/about/protections/
+#: (content/about/protections/contents+en.lrquestion.description)
+msgid ""
+"Thus, every router between sender and receiver learns that the sender is "
+"communicating with the receiver."
+msgstr ""
+
+#: https//support.torproject.org/about/protections/
+#: (content/about/protections/contents+en.lrquestion.description)
+msgid ""
+"In particular, your local ISP is in the position to build a complete profile"
+" of your Internet usage."
+msgstr ""
+
+#: https//support.torproject.org/about/protections/
+#: (content/about/protections/contents+en.lrquestion.description)
+msgid ""
+"In addition, every server in the Internet that can see any of the packets "
+"can profile your behavior."
+msgstr ""
+
+#: https//support.torproject.org/about/protections/
+#: (content/about/protections/contents+en.lrquestion.description)
+msgid ""
+"The aim of Tor is to improve your privacy by sending your traffic through a "
+"series of proxies."
+msgstr ""
+
+#: https//support.torproject.org/about/protections/
+#: (content/about/protections/contents+en.lrquestion.description)
+msgid ""
+"Your communication is encrypted in multiple layers and routed via multiple "
+"hops through the Tor network to the final receiver."
+msgstr ""
+
+#: https//support.torproject.org/about/protections/
+#: (content/about/protections/contents+en.lrquestion.description)
+msgid ""
+"More details on this process can be found in this "
+"[visualization](https://support.torproject.org/https/https-1/)."
+msgstr ""
+
+#: https//support.torproject.org/about/protections/
+#: (content/about/protections/contents+en.lrquestion.description)
+msgid ""
+"Note that all your local ISP can observe now is that you are communicating "
+"with Tor nodes."
+msgstr ""
+
+#: https//support.torproject.org/about/protections/
+#: (content/about/protections/contents+en.lrquestion.description)
+msgid ""
+"Similarly, servers in the Internet just see that they are being contacted by"
+" Tor nodes."
+msgstr ""
+
+#: https//support.torproject.org/about/protections/
+#: (content/about/protections/contents+en.lrquestion.description)
+msgid "Generally speaking, Tor aims to solve three privacy problems:"
+msgstr ""
+
+#: https//support.torproject.org/about/protections/
+#: (content/about/protections/contents+en.lrquestion.description)
+msgid ""
+"First, Tor prevents websites and other services from learning your location,"
+" which they can use to build databases about your habits and interests."
+msgstr ""
+
+#: https//support.torproject.org/about/protections/
+#: (content/about/protections/contents+en.lrquestion.description)
+msgid ""
+"With Tor, your Internet connections don't give you away by default -- now "
+"you can have the ability to choose, for each connection, how much "
+"information to reveal."
+msgstr ""
+
+#: https//support.torproject.org/about/protections/
+#: (content/about/protections/contents+en.lrquestion.description)
+msgid ""
+"Second, Tor prevents people watching your traffic locally (such as your ISP "
+"or someone with access to your home wifi or router) from learning what "
+"information you're fetching and where you're fetching it from."
+msgstr ""
+
+#: https//support.torproject.org/about/protections/
+#: (content/about/protections/contents+en.lrquestion.description)
+msgid ""
+"It also stops them from deciding what you're allowed to learn and publish --"
+" if you can get to any part of the Tor network, you can reach any site on "
+"the Internet."
+msgstr ""
+
+#: https//support.torproject.org/about/protections/
+#: (content/about/protections/contents+en.lrquestion.description)
+msgid ""
+"Third, Tor routes your connection through more than one Tor relay so no "
+"single relay can learn what you're up to."
+msgstr ""
+
+#: https//support.torproject.org/about/protections/
+#: (content/about/protections/contents+en.lrquestion.description)
+msgid ""
+"Because these relays are run by different individuals or organizations, "
+"distributing trust provides more security than the old [one hop "
+"proxy](https://support.torproject.org/about/#how-is-tor-different-from-"
+"other-proxies) approach."
+msgstr ""
+
+#: https//support.torproject.org/about/protections/
+#: (content/about/protections/contents+en.lrquestion.description)
+msgid ""
+"Note, however, that there are situations where Tor fails to solve these "
+"privacy problems entirely: see the entry below on [remaining "
+"attacks](https://support.torproject.org/about/#attacks-on-onion-routing)."
+msgstr ""
+
#: https//support.torproject.org/about/what-is-tor/
#: (content/about/what-is-tor/contents+en.lrquestion.title)
msgid "What is Tor?"
@@ -4959,9 +5539,11 @@ msgstr ""
#: (content/tbb/tbb-47/contents+en.lrquestion.description)
msgid ""
"Also, read up on the HTTPProxyAuthenticator and HTTPSProxyAuthenticator "
-"options if your proxy requires auth. We only support basic auth currently, "
-"but if you need NTLM authentication, you may find [this post in the "
-"archives](https://archives.seul.org/or/talk/Jun-2005/msg00223.html) useful."
+"options if your [proxy requires auth.](https://developer.mozilla.org/en-"
+"US/docs/Web/HTTP/Headers/Proxy-Authenticate) We only support basic auth "
+"currently, but if you need NTLM authentication, you may find [this post in "
+"the archives](https://archives.seul.org/or/talk/Jun-2005/msg00223.html) "
+"useful."
msgstr ""
#: https//support.torproject.org/tbb/tbb-47/
@@ -5178,6 +5760,219 @@ msgid ""
"have no effect on Tor's configuration."
msgstr ""
+#: https//support.torproject.org/tbb/tbb-firewall-ports/
+#: (content/tbb/tbb-firewall-ports/contents+en.lrquestion.title)
+msgid "My firewall only allows a few outgoing ports"
+msgstr ""
+
+#: https//support.torproject.org/tbb/tbb-firewall-ports/
+#: (content/tbb/tbb-firewall-ports/contents+en.lrquestion.description)
+msgid ""
+"If your firewall works by blocking ports, then you can tell Tor to only use "
+"the ports when you start your Tor Browser."
+msgstr ""
+
+#: https//support.torproject.org/tbb/tbb-firewall-ports/
+#: (content/tbb/tbb-firewall-ports/contents+en.lrquestion.description)
+msgid ""
+"Or you can add the ports that your firewall permits by adding "
+"\"FascistFirewall 1\" to your torrc configuration file."
+msgstr ""
+
+#: https//support.torproject.org/tbb/tbb-firewall-ports/
+#: (content/tbb/tbb-firewall-ports/contents+en.lrquestion.description)
+msgid ""
+"By default, when you set this Tor assumes that your firewall allows only "
+"port 80 and port 443 (HTTP and HTTPS respectively)."
+msgstr ""
+
+#: https//support.torproject.org/tbb/tbb-firewall-ports/
+#: (content/tbb/tbb-firewall-ports/contents+en.lrquestion.description)
+msgid ""
+"You can select a different set of ports with the FirewallPorts torrc option."
+msgstr ""
+
+#: https//support.torproject.org/tbb/tbb-firewall-ports/
+#: (content/tbb/tbb-firewall-ports/contents+en.lrquestion.description)
+msgid ""
+"If you want to be more fine-grained with your controls, you can also use the"
+" ReachableAddresses config options, e.g.:"
+msgstr ""
+
+#: https//support.torproject.org/tbb/tbb-firewall-ports/
+#: (content/tbb/tbb-firewall-ports/contents+en.lrquestion.description)
+#: https//support.torproject.org/tbb/tbb-install-tor-central-server/
+#: (content/tbb/tbb-install-tor-central-server/contents+en.lrquestion.description)
+#: https//support.torproject.org/operators/default-exit-ports/
+#: (content/operators/default-exit-ports/contents+en.lrquestion.description)
+#: https//support.torproject.org/operators/hibernation/
+#: (content/operators/hibernation/contents+en.lrquestion.description)
+#: https//support.torproject.org/operators/limit-total-bandwidth/
+#: (content/operators/limit-total-bandwidth/contents+en.lrquestion.description)
+#: https//support.torproject.org/misc/bug-or-feedback/
+#: (content/misc/bug-or-feedback/contents+en.lrquestion.description)
+#: https//support.torproject.org/get-in-touch/why-i-cant-join-tor-channels/
+#: (content/get-in-touch/why-i-cant-join-tor-channels/contents+en.lrquestion.description)
+#: https//support.torproject.org/apt/tor-deb-repo/
+#: (content/apt/apt-1/contents+en.lrquestion.description)
+#: https//support.torproject.org/apt/apt-over-tor/
+#: (content/apt/apt-3/contents+en.lrquestion.description)
+msgid "```"
+msgstr "```"
+
+#: https//support.torproject.org/tbb/tbb-firewall-ports/
+#: (content/tbb/tbb-firewall-ports/contents+en.lrquestion.description)
+msgid "ReachableDirAddresses *:80"
+msgstr ""
+
+#: https//support.torproject.org/tbb/tbb-firewall-ports/
+#: (content/tbb/tbb-firewall-ports/contents+en.lrquestion.description)
+msgid "ReachableORAddresses *:443"
+msgstr ""
+
+#: https//support.torproject.org/tbb/tbb-install-tor-central-server/
+#: (content/tbb/tbb-install-tor-central-server/contents+en.lrquestion.title)
+msgid ""
+"Can I install Tor on a central server, and have my clients connect to it?"
+msgstr ""
+
+#: https//support.torproject.org/tbb/tbb-install-tor-central-server/
+#: (content/tbb/tbb-install-tor-central-server/contents+en.lrquestion.description)
+msgid ""
+"Yes. Tor can be configured as a client or a relay on another machine, and "
+"allow other machines to be able to connect to it for anonymity."
+msgstr ""
+
+#: https//support.torproject.org/tbb/tbb-install-tor-central-server/
+#: (content/tbb/tbb-install-tor-central-server/contents+en.lrquestion.description)
+msgid ""
+"This is most useful in an environment where many computers want a gateway of"
+" anonymity to the rest of the world."
+msgstr ""
+
+#: https//support.torproject.org/tbb/tbb-install-tor-central-server/
+#: (content/tbb/tbb-install-tor-central-server/contents+en.lrquestion.description)
+msgid ""
+"However, be forewarned that with this configuration, anyone within your "
+"private network (existing between you and the Tor client/relay) can see what"
+" traffic you are sending in clear text."
+msgstr ""
+
+#: https//support.torproject.org/tbb/tbb-install-tor-central-server/
+#: (content/tbb/tbb-install-tor-central-server/contents+en.lrquestion.description)
+msgid "The anonymity doesn't start until you get to the Tor relay."
+msgstr ""
+
+#: https//support.torproject.org/tbb/tbb-install-tor-central-server/
+#: (content/tbb/tbb-install-tor-central-server/contents+en.lrquestion.description)
+msgid ""
+"Because of this, if you are the controller of your domain and you know "
+"everything's locked down, you will be OK, but this configuration may not be "
+"suitable for large private networks where security is key all around."
+msgstr ""
+
+#: https//support.torproject.org/tbb/tbb-install-tor-central-server/
+#: (content/tbb/tbb-install-tor-central-server/contents+en.lrquestion.description)
+msgid ""
+"Configuration is simple, editing your torrc file's SocksListenAddress "
+"according to the following examples:"
+msgstr ""
+
+#: https//support.torproject.org/tbb/tbb-install-tor-central-server/
+#: (content/tbb/tbb-install-tor-central-server/contents+en.lrquestion.description)
+msgid "SocksListenAddress 127.0.0.1"
+msgstr ""
+
+#: https//support.torproject.org/tbb/tbb-install-tor-central-server/
+#: (content/tbb/tbb-install-tor-central-server/contents+en.lrquestion.description)
+msgid "SocksListenAddress 192.168.x.x:9100"
+msgstr ""
+
+#: https//support.torproject.org/tbb/tbb-install-tor-central-server/
+#: (content/tbb/tbb-install-tor-central-server/contents+en.lrquestion.description)
+msgid "SocksListenAddress 0.0.0.0:9100"
+msgstr ""
+
+#: https//support.torproject.org/tbb/tbb-install-tor-central-server/
+#: (content/tbb/tbb-install-tor-central-server/contents+en.lrquestion.description)
+msgid ""
+"You can state multiple listen addresses, in the case that you are part of "
+"several networks or subnets."
+msgstr ""
+
+#: https//support.torproject.org/tbb/tbb-install-tor-central-server/
+#: (content/tbb/tbb-install-tor-central-server/contents+en.lrquestion.description)
+msgid "SocksListenAddress 192.168.x.x:9100 #eth0"
+msgstr ""
+
+#: https//support.torproject.org/tbb/tbb-install-tor-central-server/
+#: (content/tbb/tbb-install-tor-central-server/contents+en.lrquestion.description)
+msgid "SocksListenAddress 10.x.x.x:9100 #eth1"
+msgstr ""
+
+#: https//support.torproject.org/tbb/tbb-install-tor-central-server/
+#: (content/tbb/tbb-install-tor-central-server/contents+en.lrquestion.description)
+msgid ""
+"After this, your clients on their respective networks/subnets would specify "
+"a socks proxy with the address and port you specified SocksListenAddress to "
+"be."
+msgstr ""
+
+#: https//support.torproject.org/tbb/tbb-install-tor-central-server/
+#: (content/tbb/tbb-install-tor-central-server/contents+en.lrquestion.description)
+msgid ""
+"Please note that the SocksPort configuration option gives the port ONLY for "
+"localhost (127.0.0.1)."
+msgstr ""
+
+#: https//support.torproject.org/tbb/tbb-install-tor-central-server/
+#: (content/tbb/tbb-install-tor-central-server/contents+en.lrquestion.description)
+msgid ""
+"When setting up your SocksListenAddress(es), you need to give the port with "
+"the address, as shown above."
+msgstr ""
+
+#: https//support.torproject.org/tbb/tbb-install-tor-central-server/
+#: (content/tbb/tbb-install-tor-central-server/contents+en.lrquestion.description)
+msgid ""
+"If you are interested in forcing all outgoing data through the central Tor "
+"client/relay, instead of the server only being an optional proxy, you may "
+"find the program iptables (for *nix) useful."
+msgstr ""
+
+#: https//support.torproject.org/tbb/tbb-run-client-different-computer/
+#: (content/tbb/tbb-run-client-different-computer/contents+en.lrquestion.title)
+msgid ""
+"I want to run my Tor client on a different computer than my applications"
+msgstr ""
+
+#: https//support.torproject.org/tbb/tbb-run-client-different-computer/
+#: (content/tbb/tbb-run-client-different-computer/contents+en.lrquestion.description)
+msgid ""
+"By default, your Tor client only listens for applications that connect from "
+"localhost."
+msgstr ""
+
+#: https//support.torproject.org/tbb/tbb-run-client-different-computer/
+#: (content/tbb/tbb-run-client-different-computer/contents+en.lrquestion.description)
+msgid "Connections from other computers are refused."
+msgstr ""
+
+#: https//support.torproject.org/tbb/tbb-run-client-different-computer/
+#: (content/tbb/tbb-run-client-different-computer/contents+en.lrquestion.description)
+msgid ""
+"If you want to torify applications on different computers than the Tor "
+"client, you should edit your torrc to define `SocksListenAddress 0.0.0.0` "
+"and then restart (or hup) Tor."
+msgstr ""
+
+#: https//support.torproject.org/tbb/tbb-run-client-different-computer/
+#: (content/tbb/tbb-run-client-different-computer/contents+en.lrquestion.description)
+msgid ""
+"If you want to get more advanced, you can configure your Tor client on a "
+"firewall to bind to your internal IP but not your external IP."
+msgstr ""
+
#: https//support.torproject.org/tbb/website-blocking-tor/
#: (content/tbb/website-blocking-tor/contents+en.lrquestion.title)
msgid "A website I am trying to reach is blocking access over Tor."
@@ -6671,6 +7466,130 @@ msgid ""
"guide."
msgstr ""
+#: https//support.torproject.org/operators/default-exit-ports/
+#: (content/operators/default-exit-ports/contents+en.lrquestion.title)
+msgid "Is there a list of default exit ports?"
+msgstr ""
+
+#: https//support.torproject.org/operators/default-exit-ports/
+#: (content/operators/default-exit-ports/contents+en.lrquestion.description)
+msgid ""
+"The default open ports are listed below but keep in mind that, any port or "
+"ports can be opened by the relay operator by configuring it in torrc or "
+"modifying the source code."
+msgstr ""
+
+#: https//support.torproject.org/operators/default-exit-ports/
+#: (content/operators/default-exit-ports/contents+en.lrquestion.description)
+msgid ""
+"The default according to src/or/policies.c ([line 85][1] and [line 1901][2])"
+" from the source code release [release-0.4.6][3]:"
+msgstr ""
+
+#: https//support.torproject.org/operators/default-exit-ports/
+#: (content/operators/default-exit-ports/contents+en.lrquestion.description)
+msgid "reject 0.0.0.0/8"
+msgstr ""
+
+#: https//support.torproject.org/operators/default-exit-ports/
+#: (content/operators/default-exit-ports/contents+en.lrquestion.description)
+msgid "reject 169.254.0.0/16"
+msgstr ""
+
+#: https//support.torproject.org/operators/default-exit-ports/
+#: (content/operators/default-exit-ports/contents+en.lrquestion.description)
+msgid "reject 127.0.0.0/8"
+msgstr ""
+
+#: https//support.torproject.org/operators/default-exit-ports/
+#: (content/operators/default-exit-ports/contents+en.lrquestion.description)
+msgid "reject 192.168.0.0/16"
+msgstr ""
+
+#: https//support.torproject.org/operators/default-exit-ports/
+#: (content/operators/default-exit-ports/contents+en.lrquestion.description)
+msgid "reject 10.0.0.0/8"
+msgstr ""
+
+#: https//support.torproject.org/operators/default-exit-ports/
+#: (content/operators/default-exit-ports/contents+en.lrquestion.description)
+msgid "reject 172.16.0.0/12"
+msgstr ""
+
+#: https//support.torproject.org/operators/default-exit-ports/
+#: (content/operators/default-exit-ports/contents+en.lrquestion.description)
+msgid "reject *:25"
+msgstr ""
+
+#: https//support.torproject.org/operators/default-exit-ports/
+#: (content/operators/default-exit-ports/contents+en.lrquestion.description)
+msgid "reject *:119"
+msgstr ""
+
+#: https//support.torproject.org/operators/default-exit-ports/
+#: (content/operators/default-exit-ports/contents+en.lrquestion.description)
+msgid "reject *:135-139"
+msgstr ""
+
+#: https//support.torproject.org/operators/default-exit-ports/
+#: (content/operators/default-exit-ports/contents+en.lrquestion.description)
+msgid "reject *:445"
+msgstr ""
+
+#: https//support.torproject.org/operators/default-exit-ports/
+#: (content/operators/default-exit-ports/contents+en.lrquestion.description)
+msgid "reject *:563"
+msgstr ""
+
+#: https//support.torproject.org/operators/default-exit-ports/
+#: (content/operators/default-exit-ports/contents+en.lrquestion.description)
+msgid "reject *:1214"
+msgstr ""
+
+#: https//support.torproject.org/operators/default-exit-ports/
+#: (content/operators/default-exit-ports/contents+en.lrquestion.description)
+msgid "reject *:4661-4666"
+msgstr ""
+
+#: https//support.torproject.org/operators/default-exit-ports/
+#: (content/operators/default-exit-ports/contents+en.lrquestion.description)
+msgid "reject *:6346-6429"
+msgstr ""
+
+#: https//support.torproject.org/operators/default-exit-ports/
+#: (content/operators/default-exit-ports/contents+en.lrquestion.description)
+msgid "reject *:6699"
+msgstr ""
+
+#: https//support.torproject.org/operators/default-exit-ports/
+#: (content/operators/default-exit-ports/contents+en.lrquestion.description)
+msgid "reject *:6881-6999"
+msgstr ""
+
+#: https//support.torproject.org/operators/default-exit-ports/
+#: (content/operators/default-exit-ports/contents+en.lrquestion.description)
+msgid "accept *:*"
+msgstr ""
+
+#: https//support.torproject.org/operators/default-exit-ports/
+#: (content/operators/default-exit-ports/contents+en.lrquestion.description)
+msgid ""
+"[1]: "
+"https://gitlab.torproject.org/tpo/core/tor/-/blob/release-0.4.6/src/core/or/policies.c#L85"
+msgstr ""
+
+#: https//support.torproject.org/operators/default-exit-ports/
+#: (content/operators/default-exit-ports/contents+en.lrquestion.description)
+msgid ""
+"[2]: "
+"https://gitlab.torproject.org/tpo/core/tor/-/blob/release-0.4.6/src/core/or/policies.c#L1901"
+msgstr ""
+
+#: https//support.torproject.org/operators/default-exit-ports/
+#: (content/operators/default-exit-ports/contents+en.lrquestion.description)
+msgid "[3]: https://gitlab.torproject.org/tpo/core/tor/-/tree/release-0.4.6/"
+msgstr ""
+
#: https//support.torproject.org/operators/dynamic-ip/
#: (content/operators/dynamic-ip/contents+en.lrquestion.title)
msgid "Can I run a Tor relay using a dynamic IP address?"
@@ -6818,21 +7737,6 @@ msgid ""
"into hibernation, signaled by this entry in the log:"
msgstr ""
-#: https//support.torproject.org/operators/hibernation/
-#: (content/operators/hibernation/contents+en.lrquestion.description)
-#: https//support.torproject.org/operators/limit-total-bandwidth/
-#: (content/operators/limit-total-bandwidth/contents+en.lrquestion.description)
-#: https//support.torproject.org/misc/bug-or-feedback/
-#: (content/misc/bug-or-feedback/contents+en.lrquestion.description)
-#: https//support.torproject.org/get-in-touch/why-i-cant-join-tor-channels/
-#: (content/get-in-touch/why-i-cant-join-tor-channels/contents+en.lrquestion.description)
-#: https//support.torproject.org/apt/tor-deb-repo/
-#: (content/apt/apt-1/contents+en.lrquestion.description)
-#: https//support.torproject.org/apt/apt-over-tor/
-#: (content/apt/apt-3/contents+en.lrquestion.description)
-msgid "```"
-msgstr "```"
-
#: https//support.torproject.org/operators/hibernation/
#: (content/operators/hibernation/contents+en.lrquestion.description)
msgid "Bandwidth soft limit reached; commencing hibernation."
@@ -9071,6 +9975,131 @@ msgstr ""
msgid "sub 4096R/C00942E4 2017-03-13"
msgstr ""
+#: https//support.torproject.org/misc/check-socks-dns-leaks/
+#: (content/misc/check-socks-dns-leaks/contents+en.lrquestion.title)
+msgid ""
+"How do I check if my application that uses SOCKS is leaking DNS requests?"
+msgstr ""
+
+#: https//support.torproject.org/misc/check-socks-dns-leaks/
+#: (content/misc/check-socks-dns-leaks/contents+en.lrquestion.description)
+msgid ""
+"Even if your application is using the correct variant of the SOCKS protocol,"
+" there is still a risk that it could be leaking DNS queries."
+msgstr ""
+
+#: https//support.torproject.org/misc/check-socks-dns-leaks/
+#: (content/misc/check-socks-dns-leaks/contents+en.lrquestion.description)
+msgid ""
+"This problem happens in Firefox extensions that resolve the destination "
+"hostname themselves, for example to show you its IP address, what country "
+"it's in, etc."
+msgstr ""
+
+#: https//support.torproject.org/misc/check-socks-dns-leaks/
+#: (content/misc/check-socks-dns-leaks/contents+en.lrquestion.description)
+msgid ""
+"If you suspect your application might behave like this, follow the "
+"instructions below to check."
+msgstr ""
+
+#: https//support.torproject.org/misc/check-socks-dns-leaks/
+#: (content/misc/check-socks-dns-leaks/contents+en.lrquestion.description)
+msgid ""
+"1. Add `TestSocks 1` to your [torrc file](https://support.torproject.org/tbb"
+"/tbb-editing-torrc/)."
+msgstr ""
+
+#: https//support.torproject.org/misc/check-socks-dns-leaks/
+#: (content/misc/check-socks-dns-leaks/contents+en.lrquestion.description)
+msgid ""
+"1. Start Tor, and point your program's SOCKS proxy settings to Tor's SOCKS5 "
+"server (`socks5://127.0.0.1:9050` by default)."
+msgstr ""
+
+#: https//support.torproject.org/misc/check-socks-dns-leaks/
+#: (content/misc/check-socks-dns-leaks/contents+en.lrquestion.description)
+msgid ""
+"1. Watch your logs as you use your application. For each socks connection, "
+"Tor will log a `notice` for safe connections, and a `warn` for connections "
+"leaking DNS requests."
+msgstr ""
+
+#: https//support.torproject.org/misc/check-socks-dns-leaks/
+#: (content/misc/check-socks-dns-leaks/contents+en.lrquestion.description)
+msgid ""
+"If you want to automatically disable all connections leaking DNS requests, "
+"set `SafeSocks 1` in your torrc file."
+msgstr ""
+
+#: https//support.torproject.org/misc/hide-exits/
+#: (content/misc/hide-exits/contents+en.lrquestion.title)
+msgid ""
+"You should hide the list of Tor relays, so people can't block the exits."
+msgstr ""
+
+#: https//support.torproject.org/misc/hide-exits/
+#: (content/misc/hide-exits/contents+en.lrquestion.description)
+msgid "There are a few reasons we don't:"
+msgstr ""
+
+#: https//support.torproject.org/misc/hide-exits/
+#: (content/misc/hide-exits/contents+en.lrquestion.description)
+msgid ""
+"1. We can't help but make the information available, since Tor clients need "
+"to use it to pick their paths."
+msgstr ""
+
+#: https//support.torproject.org/misc/hide-exits/
+#: (content/misc/hide-exits/contents+en.lrquestion.description)
+msgid "So if the \"blockers\" want it, they can get it anyway."
+msgstr ""
+
+#: https//support.torproject.org/misc/hide-exits/
+#: (content/misc/hide-exits/contents+en.lrquestion.description)
+msgid ""
+"Further, even if we didn't tell clients about the list of relays directly, "
+"somebody could still make a lot of connections through Tor to a test site "
+"and build a list of the addresses they see."
+msgstr ""
+
+#: https//support.torproject.org/misc/hide-exits/
+#: (content/misc/hide-exits/contents+en.lrquestion.description)
+msgid ""
+"1. If people want to block us, we believe that they should be allowed to do "
+"so."
+msgstr ""
+
+#: https//support.torproject.org/misc/hide-exits/
+#: (content/misc/hide-exits/contents+en.lrquestion.description)
+msgid ""
+"Obviously, we would prefer for everybody to allow Tor users to connect to "
+"them, but people have the right to decide who their services should allow "
+"connections from, and if they want to block anonymous users, they can."
+msgstr ""
+
+#: https//support.torproject.org/misc/hide-exits/
+#: (content/misc/hide-exits/contents+en.lrquestion.description)
+msgid ""
+"1. Being blockable also has tactical advantages: it may be a persuasive "
+"response to website maintainers who feel threatened by Tor."
+msgstr ""
+
+#: https//support.torproject.org/misc/hide-exits/
+#: (content/misc/hide-exits/contents+en.lrquestion.description)
+msgid ""
+"Giving them the option may inspire them to stop and think about whether they"
+" really want to eliminate private access to their system, and if not, what "
+"other options they might have."
+msgstr ""
+
+#: https//support.torproject.org/misc/hide-exits/
+#: (content/misc/hide-exits/contents+en.lrquestion.description)
+msgid ""
+"The time they might otherwise have spent blocking Tor, they may instead "
+"spend rethinking their overall approach to privacy and anonymity."
+msgstr ""
+
#: https//support.torproject.org/misc/menu/
#: (content/misc/menu/contents+en.lrquestion.description)
msgid "About"
@@ -9657,56 +10686,20 @@ msgstr ""
#: https//support.torproject.org/get-in-touch/why-i-cant-join-tor-channels/
#: (content/get-in-touch/why-i-cant-join-tor-channels/contents+en.lrquestion.description)
msgid ""
-"Then, to complete the registration and ultimately gain access to the #tor-"
-"project channel, your nickname must be **verified**."
-msgstr ""
-
-#: https//support.torproject.org/get-in-touch/why-i-cant-join-tor-channels/
-#: (content/get-in-touch/why-i-cant-join-tor-channels/contents+en.lrquestion.description)
-msgid ""
-"1. To verify your nick, open a new browser window and go to "
-"https://webchat.oftc.net/?channels=tor."
-msgstr ""
-
-#: https//support.torproject.org/get-in-touch/why-i-cant-join-tor-channels/
-#: (content/get-in-touch/why-i-cant-join-tor-channels/contents+en.lrquestion.description)
-msgid "2. Log in with your IRC nickname and password."
-msgstr ""
-
-#: https//support.torproject.org/get-in-touch/why-i-cant-join-tor-channels/
-#: (content/get-in-touch/why-i-cant-join-tor-channels/contents+en.lrquestion.description)
-msgid ""
-"3. Look for the word **verify** and log in there. It may appear that nothing"
-" has happened. Look at the top of the page, and there will be a column "
-"called **Account**."
-msgstr ""
-
-#: https//support.torproject.org/get-in-touch/why-i-cant-join-tor-channels/
-#: (content/get-in-touch/why-i-cant-join-tor-channels/contents+en.lrquestion.description)
-msgid "4. Click on **Account**."
-msgstr ""
-
-#: https//support.torproject.org/get-in-touch/why-i-cant-join-tor-channels/
-#: (content/get-in-touch/why-i-cant-join-tor-channels/contents+en.lrquestion.description)
-msgid ""
-"5. Click on the small sentence at the bottom of the square that says: Verify"
-" account."
-msgstr ""
-
-#: https//support.torproject.org/get-in-touch/why-i-cant-join-tor-channels/
-#: (content/get-in-touch/why-i-cant-join-tor-channels/contents+en.lrquestion.description)
-msgid "6. Fill out the Captcha that pops up, and click ok."
+"After registering your nickname, to gain access to the #tor-project and "
+"other protected channels, your nickname must be **verified**."
msgstr ""
#: https//support.torproject.org/get-in-touch/why-i-cant-join-tor-channels/
#: (content/get-in-touch/why-i-cant-join-tor-channels/contents+en.lrquestion.description)
msgid ""
-"7. A tiny message will appear: \"Your NickServ account has been verified.\""
+"1. Go to https://services.oftc.net/ and follow the steps in the '*To verify "
+"your account*' section"
msgstr ""
#: https//support.torproject.org/get-in-touch/why-i-cant-join-tor-channels/
#: (content/get-in-touch/why-i-cant-join-tor-channels/contents+en.lrquestion.description)
-msgid "8. Go back to the IRC webpage where you are logged in and type:"
+msgid "2. Go back to the IRC webpage where you are logged in and type:"
msgstr ""
#: https//support.torproject.org/get-in-touch/why-i-cant-join-tor-channels/
@@ -9716,12 +10709,12 @@ msgstr ""
#: https//support.torproject.org/get-in-touch/why-i-cant-join-tor-channels/
#: (content/get-in-touch/why-i-cant-join-tor-channels/contents+en.lrquestion.description)
-msgid "9. Click ENTER."
+msgid "3. Click ENTER."
msgstr ""
#: https//support.torproject.org/get-in-touch/why-i-cant-join-tor-channels/
#: (content/get-in-touch/why-i-cant-join-tor-channels/contents+en.lrquestion.description)
-msgid "10. If all is well, you will receive a message that says:"
+msgid "4. If all is well, you will receive a message that says:"
msgstr ""
#: https//support.torproject.org/get-in-touch/why-i-cant-join-tor-channels/
@@ -9862,18 +10855,22 @@ msgstr "# apt install apt-transport-https"
#: https//support.torproject.org/apt/tor-deb-repo/
#: (content/apt/apt-1/contents+en.lrquestion.description)
msgid ""
-"#### 2. Add the following entries to `/etc/apt/sources.list` or a new file "
-"in `/etc/apt/sources.list.d/`"
+"#### 2. Create a new file in `/etc/apt/sources.list.d/` named `tor.list`. "
+"Add the following entries:"
msgstr ""
#: https//support.torproject.org/apt/tor-deb-repo/
#: (content/apt/apt-1/contents+en.lrquestion.description)
-msgid "deb https://deb.torproject.org/torproject.org <DISTRIBUTION> main"
+msgid ""
+"deb [signed-by=/usr/share/keyrings/tor-archive-keyring.gpg] "
+"https://deb.torproject.org/torproject.org <DISTRIBUTION> main"
msgstr ""
#: https//support.torproject.org/apt/tor-deb-repo/
#: (content/apt/apt-1/contents+en.lrquestion.description)
-msgid "deb-src https://deb.torproject.org/torproject.org <DISTRIBUTION> main"
+msgid ""
+"deb-src [signed-by=/usr/share/keyrings/tor-archive-keyring.gpg] "
+"https://deb.torproject.org/torproject.org <DISTRIBUTION> main"
msgstr ""
#: https//support.torproject.org/apt/tor-deb-repo/
@@ -9887,14 +10884,16 @@ msgstr ""
#: https//support.torproject.org/apt/tor-deb-repo/
#: (content/apt/apt-1/contents+en.lrquestion.description)
msgid ""
-"deb https://deb.torproject.org/torproject.org tor-"
+"deb [signed-by=/usr/share/keyrings/tor-archive-keyring.gpg] "
+"https://deb.torproject.org/torproject.org tor-"
"experimental-0.4.6.x-<DISTRIBUTION> main"
msgstr ""
#: https//support.torproject.org/apt/tor-deb-repo/
#: (content/apt/apt-1/contents+en.lrquestion.description)
msgid ""
-"deb-src https://deb.torproject.org/torproject.org tor-"
+"deb-src [signed-by=/usr/share/keyrings/tor-archive-keyring.gpg] "
+"https://deb.torproject.org/torproject.org tor-"
"experimental-0.4.6.x-<DISTRIBUTION> main"
msgstr ""
@@ -9906,15 +10905,17 @@ msgstr ""
#: https//support.torproject.org/apt/tor-deb-repo/
#: (content/apt/apt-1/contents+en.lrquestion.description)
msgid ""
-"deb https://deb.torproject.org/torproject.org tor-nightly-"
-"master-<DISTRIBUTION> main"
+"deb [signed-by=/usr/share/keyrings/tor-archive-keyring.gpg] "
+"https://deb.torproject.org/torproject.org tor-nightly-master-<DISTRIBUTION> "
+"main"
msgstr ""
#: https//support.torproject.org/apt/tor-deb-repo/
#: (content/apt/apt-1/contents+en.lrquestion.description)
msgid ""
-"deb-src https://deb.torproject.org/torproject.org tor-nightly-"
-"master-<DISTRIBUTION> main"
+"deb-src [signed-by=/usr/share/keyrings/tor-archive-keyring.gpg] "
+"https://deb.torproject.org/torproject.org tor-nightly-master-<DISTRIBUTION> "
+"main"
msgstr ""
#: https//support.torproject.org/apt/tor-deb-repo/
@@ -9935,13 +10936,15 @@ msgstr ""
#: https//support.torproject.org/apt/tor-deb-repo/
#: (content/apt/apt-1/contents+en.lrquestion.description)
msgid ""
-"deb [arch=amd64] https://deb.torproject.org/torproject.org focal main"
+"deb [arch=amd64 signed-by=/usr/share/keyrings/tor-archive-keyring.gpg] "
+"https://deb.torproject.org/torproject.org focal main"
msgstr ""
#: https//support.torproject.org/apt/tor-deb-repo/
#: (content/apt/apt-1/contents+en.lrquestion.description)
msgid ""
-"deb-src [arch=amd64] https://deb.torproject.org/torproject.org focal main"
+"deb-src [arch=amd64 signed-by=/usr/share/keyrings/tor-archive-keyring.gpg] "
+"https://deb.torproject.org/torproject.org focal main"
msgstr ""
#: https//support.torproject.org/apt/tor-deb-repo/
@@ -9961,26 +10964,17 @@ msgstr ""
#: (content/apt/apt-1/contents+en.lrquestion.description)
msgid ""
"#### 3. Then add the gpg key used to sign the packages by running the "
-"following commands at your command prompt"
+"following command at your command prompt:"
msgstr ""
#: https//support.torproject.org/apt/tor-deb-repo/
#: (content/apt/apt-1/contents+en.lrquestion.description)
msgid ""
-"# wget -qO- "
+"# wget -O- "
"https://deb.torproject.org/torproject.org/A3C4F0F979CAA22CDBA8F512EE8CBC9E886DDD89.asc"
-" | gpg --import"
+" | gpg --dearmor | tee /usr/share/keyrings/tor-archive-keyring.gpg "
+">/dev/null"
msgstr ""
-"# wget -qO- "
-"https://deb.torproject.org/torproject.org/A3C4F0F979CAA22CDBA8F512EE8CBC9E886DDD89.asc"
-" | gpg --import"
-
-#: https//support.torproject.org/apt/tor-deb-repo/
-#: (content/apt/apt-1/contents+en.lrquestion.description)
-msgid ""
-"# gpg --export A3C4F0F979CAA22CDBA8F512EE8CBC9E886DDD89 | apt-key add -"
-msgstr ""
-"# gpg --export A3C4F0F979CAA22CDBA8F512EE8CBC9E886DDD89 | apt-key add -"
#: https//support.torproject.org/apt/tor-deb-repo/
#: (content/apt/apt-1/contents+en.lrquestion.description)
@@ -11586,6 +12580,82 @@ msgid ""
"doesn't change IP address over the day."
msgstr ""
+#: https//support.torproject.org/alternate-designs/block-websites/
+#: (content/alternate-designs/block-websites/contents+en.lrquestion.title)
+msgid "Exit policies should be able to block websites, not just IP addresses."
+msgstr ""
+
+#: https//support.torproject.org/alternate-designs/block-websites/
+#: (content/alternate-designs/block-websites/contents+en.lrquestion.description)
+msgid ""
+"It would be nice to let relay operators say things like `reject "
+"www.slashdot.org` in their exit policies, rather than requiring them to "
+"learn all the IP address space that could be covered by the site (and then "
+"also blocking other sites at those IP addresses)."
+msgstr ""
+
+#: https//support.torproject.org/alternate-designs/block-websites/
+#: (content/alternate-designs/block-websites/contents+en.lrquestion.description)
+msgid "There are two problems, though."
+msgstr ""
+
+#: https//support.torproject.org/alternate-designs/block-websites/
+#: (content/alternate-designs/block-websites/contents+en.lrquestion.description)
+msgid "First, users could still get around these blocks."
+msgstr ""
+
+#: https//support.torproject.org/alternate-designs/block-websites/
+#: (content/alternate-designs/block-websites/contents+en.lrquestion.description)
+msgid ""
+"For example, they could request the IP address rather than the hostname when"
+" they exit from the Tor network."
+msgstr ""
+
+#: https//support.torproject.org/alternate-designs/block-websites/
+#: (content/alternate-designs/block-websites/contents+en.lrquestion.description)
+msgid ""
+"This means operators would still need to learn all the IP addresses for the "
+"destinations in question."
+msgstr ""
+
+#: https//support.torproject.org/alternate-designs/block-websites/
+#: (content/alternate-designs/block-websites/contents+en.lrquestion.description)
+msgid ""
+"The second problem is that it would allow remote attackers to censor "
+"arbitrary sites."
+msgstr ""
+
+#: https//support.torproject.org/alternate-designs/block-websites/
+#: (content/alternate-designs/block-websites/contents+en.lrquestion.description)
+msgid ""
+"For example, if a Tor operator blocks www1.slashdot.org, and then some "
+"attacker poisons the Tor relay's DNS or otherwise changes that hostname to "
+"resolve to the IP address for a major news site, then suddenly that Tor "
+"relay is blocking the news site."
+msgstr ""
+
+#: https//support.torproject.org/alternate-designs/let-the-network-pick-the-path/
+#: (content/alternate-designs/let-the-network-pick-the-path/contents+en.lrquestion.title)
+msgid "You should let the network pick the path, not the client."
+msgstr ""
+
+#: https//support.torproject.org/alternate-designs/let-the-network-pick-the-path/
+#: (content/alternate-designs/let-the-network-pick-the-path/contents+en.lrquestion.description)
+msgid "No, you cannot trust the network to pick the path."
+msgstr ""
+
+#: https//support.torproject.org/alternate-designs/let-the-network-pick-the-path/
+#: (content/alternate-designs/let-the-network-pick-the-path/contents+en.lrquestion.description)
+msgid "Malicious relays could route you through their colluding friends."
+msgstr ""
+
+#: https//support.torproject.org/alternate-designs/let-the-network-pick-the-path/
+#: (content/alternate-designs/let-the-network-pick-the-path/contents+en.lrquestion.description)
+msgid ""
+"This would give an adversary the ability to watch all of your traffic end to"
+" end."
+msgstr ""
+
#: lego/templates/banner.html:3 lego/templates/banner.html:5
#: templates/banner.html:3 templates/banner.html:5
msgid "Close banner"
@@ -11616,8 +12686,8 @@ msgid "DONATE NOW"
msgstr "ç«å»æ款"
#: lego/templates/footer.html:13 lego/templates/footer.html:22
-#: lego/templates/navbar.html:83 templates/footer.html:13
-#: templates/footer.html:22 templates/navbar.html:83
+#: lego/templates/navbar.html:95 templates/footer.html:13
+#: templates/footer.html:22 templates/navbar.html:95
msgid "Download Tor Browser"
msgstr "ä¸è¼ Tor ç覽å¨"
diff --git a/contents.pot b/contents.pot
index 268759270a..354f80c1c8 100644
--- a/contents.pot
+++ b/contents.pot
@@ -3,7 +3,7 @@ msgid ""
msgstr ""
"Project-Id-Version: PACKAGE VERSION\n"
"Report-Msgid-Bugs-To: \n"
-"POT-Creation-Date: 2021-08-25 11:14+CET\n"
+"POT-Creation-Date: 2021-09-01 12:20+CET\n"
"PO-Revision-Date: YEAR-MO-DA HO:MI+ZONE\n"
"Last-Translator: FULL NAME <EMAIL at ADDRESS>\n"
"Language-Team: en <LL at li.org>\n"
@@ -135,6 +135,11 @@ msgstr "Abuse FAQ"
msgid "Tor Metrics"
msgstr "Tor Metrics"
+#: https//support.torproject.org/alternate-designs/
+#: (content/alternate-designs/contents+en.lrtopic.title)
+msgid "Alternate Designs We Don't Do (Yet)"
+msgstr "Alternate Designs We Don't Do (Yet)"
+
#: https//support.torproject.org/glossary/add-on-extension-or-plugin/
#: (content/glossary/add-on-extension-or-plugin/contents+en.lrword.term)
msgid "add-on, extension, or plugin"
@@ -2493,6 +2498,76 @@ msgstr ""
"You can find more detailed information about Tor + VPN at [our "
"wiki](https://trac.torproject.org/projects/tor/wiki/doc/TorPlusVPN)."
+#: https//support.torproject.org/faq/relay-donations/
+#: (content/faq/relay-donations/contents+en.lrquestion.title)
+msgid "Can I donate for a relay rather than run my own?"
+msgstr "Can I donate for a relay rather than run my own?"
+
+#: https//support.torproject.org/faq/relay-donations/
+#: (content/faq/relay-donations/contents+en.lrquestion.description)
+msgid ""
+"Sure! We have a [list of organizations that run Tor "
+"relays](https://community.torproject.org/relay/community-resources/relay-"
+"associations/) that are happy to turn your donations into better speed and "
+"anonymity for the Tor network."
+msgstr ""
+"Sure! We have a [list of organizations that run Tor "
+"relays](https://community.torproject.org/relay/community-resources/relay-"
+"associations/) that are happy to turn your donations into better speed and "
+"anonymity for the Tor network."
+
+#: https//support.torproject.org/faq/relay-donations/
+#: (content/faq/relay-donations/contents+en.lrquestion.description)
+msgid ""
+"These organizations are not the same as [The Tor Project, "
+"Inc](https://donate.torproject.org/), but we consider that a good thing."
+msgstr ""
+"These organizations are not the same as [The Tor Project, "
+"Inc](https://donate.torproject.org/), but we consider that a good thing."
+
+#: https//support.torproject.org/faq/relay-donations/
+#: (content/faq/relay-donations/contents+en.lrquestion.description)
+msgid "They're run by nice people who are part of the Tor community."
+msgstr "They're run by nice people who are part of the Tor community."
+
+#: https//support.torproject.org/faq/relay-donations/
+#: (content/faq/relay-donations/contents+en.lrquestion.description)
+msgid ""
+"Note that there can be a tradeoff here between anonymity and performance."
+msgstr ""
+"Note that there can be a tradeoff here between anonymity and performance."
+
+#: https//support.torproject.org/faq/relay-donations/
+#: (content/faq/relay-donations/contents+en.lrquestion.description)
+msgid ""
+"The Tor network's anonymity comes in part from diversity, so if you are in a"
+" position to run your own relay, you will be improving Tor's anonymity more "
+"than by donating."
+msgstr ""
+"The Tor network's anonymity comes in part from diversity, so if you are in a"
+" position to run your own relay, you will be improving Tor's anonymity more "
+"than by donating."
+
+#: https//support.torproject.org/faq/relay-donations/
+#: (content/faq/relay-donations/contents+en.lrquestion.description)
+msgid ""
+"At the same time though, economies of scale for bandwidth mean that "
+"combining many small donations into several larger relays is more efficient "
+"at improving network performance."
+msgstr ""
+"At the same time though, economies of scale for bandwidth mean that "
+"combining many small donations into several larger relays is more efficient "
+"at improving network performance."
+
+#: https//support.torproject.org/faq/relay-donations/
+#: (content/faq/relay-donations/contents+en.lrquestion.description)
+msgid ""
+"Improving anonymity and improving performance are both worthwhile goals, so "
+"however you can help is great!"
+msgstr ""
+"Improving anonymity and improving performance are both worthwhile goals, so "
+"however you can help is great!"
+
#: https//support.torproject.org/faq/staying-anonymous/
#: (content/faq/staying-anonymous/contents+en.lrquestion.title)
msgid "Am I totally anonymous if I use Tor?"
@@ -2863,6 +2938,76 @@ msgstr ""
"This list of pitfalls isn't complete, and we need your help [identifying and"
" documenting all the issues](https://community.torproject.org/)."
+#: https//support.torproject.org/about/attacks-on-onion-routing/
+#: (content/about/attacks-on-onion-routing/contents+en.lrquestion.title)
+msgid "What attacks remain against onion routing?"
+msgstr "What attacks remain against onion routing?"
+
+#: https//support.torproject.org/about/attacks-on-onion-routing/
+#: (content/about/attacks-on-onion-routing/contents+en.lrquestion.description)
+msgid ""
+"As mentioned above, it is possible for an observer who can view both you and"
+" either the destination website or your Tor exit node to correlate timings "
+"of your traffic as it enters the Tor network and also as it exits."
+msgstr ""
+"As mentioned above, it is possible for an observer who can view both you and"
+" either the destination website or your Tor exit node to correlate timings "
+"of your traffic as it enters the Tor network and also as it exits."
+
+#: https//support.torproject.org/about/attacks-on-onion-routing/
+#: (content/about/attacks-on-onion-routing/contents+en.lrquestion.description)
+msgid "Tor does not defend against such a threat model."
+msgstr "Tor does not defend against such a threat model."
+
+#: https//support.torproject.org/about/attacks-on-onion-routing/
+#: (content/about/attacks-on-onion-routing/contents+en.lrquestion.description)
+msgid ""
+"In a more limited sense, note that if a censor or law enforcement agency has"
+" the ability to obtain specific observation of parts of the network, it is "
+"possible for them to verify a suspicion that you talk regularly to your "
+"friend by observing traffic at both ends and correlating the timing of only "
+"that traffic."
+msgstr ""
+"In a more limited sense, note that if a censor or law enforcement agency has"
+" the ability to obtain specific observation of parts of the network, it is "
+"possible for them to verify a suspicion that you talk regularly to your "
+"friend by observing traffic at both ends and correlating the timing of only "
+"that traffic."
+
+#: https//support.torproject.org/about/attacks-on-onion-routing/
+#: (content/about/attacks-on-onion-routing/contents+en.lrquestion.description)
+msgid ""
+"Again, this is only useful to verify that parties already suspected of "
+"communicating with one another are doing so."
+msgstr ""
+"Again, this is only useful to verify that parties already suspected of "
+"communicating with one another are doing so."
+
+#: https//support.torproject.org/about/attacks-on-onion-routing/
+#: (content/about/attacks-on-onion-routing/contents+en.lrquestion.description)
+msgid ""
+"In most countries, the suspicion required to obtain a warrant already "
+"carries more weight than timing correlation would provide."
+msgstr ""
+"In most countries, the suspicion required to obtain a warrant already "
+"carries more weight than timing correlation would provide."
+
+#: https//support.torproject.org/about/attacks-on-onion-routing/
+#: (content/about/attacks-on-onion-routing/contents+en.lrquestion.description)
+msgid ""
+"Furthermore, since Tor reuses circuits for multiple TCP connections, it is "
+"possible to associate non anonymous and anonymous traffic at a given exit "
+"node, so be careful about what applications you run concurrently over Tor."
+msgstr ""
+"Furthermore, since Tor reuses circuits for multiple TCP connections, it is "
+"possible to associate non anonymous and anonymous traffic at a given exit "
+"node, so be careful about what applications you run concurrently over Tor."
+
+#: https//support.torproject.org/about/attacks-on-onion-routing/
+#: (content/about/attacks-on-onion-routing/contents+en.lrquestion.description)
+msgid "Perhaps even run separate Tor clients for these applications."
+msgstr "Perhaps even run separate Tor clients for these applications."
+
#: https//support.torproject.org/about/backdoor/
#: (content/about/backdoor/contents+en.lrquestion.title)
msgid "Is there a backdoor in Tor?"
@@ -3028,6 +3173,50 @@ msgstr ""
"Using Tor with other browsers is [dangerous and not "
"recommended](/tbb/tbb-9/)."
+#: https//support.torproject.org/about/change-paths/
+#: (content/about/change-paths/contents+en.lrquestion.title)
+msgid "How often does Tor change its paths?"
+msgstr "How often does Tor change its paths?"
+
+#: https//support.torproject.org/about/change-paths/
+#: (content/about/change-paths/contents+en.lrquestion.description)
+msgid ""
+"Tor will reuse the same circuit for new TCP streams for 10 minutes, as long "
+"as the circuit is working fine."
+msgstr ""
+"Tor will reuse the same circuit for new TCP streams for 10 minutes, as long "
+"as the circuit is working fine."
+
+#: https//support.torproject.org/about/change-paths/
+#: (content/about/change-paths/contents+en.lrquestion.description)
+msgid "(If the circuit fails, Tor will switch to a new circuit immediately.)"
+msgstr "(If the circuit fails, Tor will switch to a new circuit immediately.)"
+
+#: https//support.torproject.org/about/change-paths/
+#: (content/about/change-paths/contents+en.lrquestion.description)
+msgid ""
+"But note that a single TCP stream (e.g. a long IRC connection) will stay on "
+"the same circuit forever."
+msgstr ""
+"But note that a single TCP stream (e.g. a long IRC connection) will stay on "
+"the same circuit forever."
+
+#: https//support.torproject.org/about/change-paths/
+#: (content/about/change-paths/contents+en.lrquestion.description)
+msgid "We don't rotate individual streams from one circuit to the next."
+msgstr "We don't rotate individual streams from one circuit to the next."
+
+#: https//support.torproject.org/about/change-paths/
+#: (content/about/change-paths/contents+en.lrquestion.description)
+msgid ""
+"Otherwise, an adversary with a partial view of the network would be given "
+"many chances over time to link you to your destination, rather than just one"
+" chance."
+msgstr ""
+"Otherwise, an adversary with a partial view of the network would be given "
+"many chances over time to link you to your destination, rather than just one"
+" chance."
+
#: https//support.torproject.org/about/distribute-tor/
#: (content/about/distribute-tor/contents+en.lrquestion.title)
msgid "Can I distribute Tor?"
@@ -3143,6 +3332,170 @@ msgstr ""
"See our [trademark FAQ](https://www.torproject.org/about/trademark/) for "
"details."
+#: https//support.torproject.org/about/entry-guards/
+#: (content/about/entry-guards/contents+en.lrquestion.title)
+msgid "What are Entry Guards?"
+msgstr "What are Entry Guards?"
+
+#: https//support.torproject.org/about/entry-guards/
+#: (content/about/entry-guards/contents+en.lrquestion.description)
+msgid ""
+"Tor (like all current practical low-latency anonymity designs) fails when "
+"the attacker can see both ends of the communications channel."
+msgstr ""
+"Tor (like all current practical low-latency anonymity designs) fails when "
+"the attacker can see both ends of the communications channel."
+
+#: https//support.torproject.org/about/entry-guards/
+#: (content/about/entry-guards/contents+en.lrquestion.description)
+msgid ""
+"For example, suppose the attacker controls or watches the Tor relay you "
+"choose to enter the network, and also controls or watches the website you "
+"visit."
+msgstr ""
+"For example, suppose the attacker controls or watches the Tor relay you "
+"choose to enter the network, and also controls or watches the website you "
+"visit."
+
+#: https//support.torproject.org/about/entry-guards/
+#: (content/about/entry-guards/contents+en.lrquestion.description)
+msgid ""
+"In this case, the research community knows no practical low-latency design "
+"that can reliably stop the attacker from correlating volume and timing "
+"information on the two sides."
+msgstr ""
+"In this case, the research community knows no practical low-latency design "
+"that can reliably stop the attacker from correlating volume and timing "
+"information on the two sides."
+
+#: https//support.torproject.org/about/entry-guards/
+#: (content/about/entry-guards/contents+en.lrquestion.description)
+msgid "So, what should we do?"
+msgstr "So, what should we do?"
+
+#: https//support.torproject.org/about/entry-guards/
+#: (content/about/entry-guards/contents+en.lrquestion.description)
+msgid "Suppose the attacker controls, or can observe, C relays."
+msgstr "Suppose the attacker controls, or can observe, C relays."
+
+#: https//support.torproject.org/about/entry-guards/
+#: (content/about/entry-guards/contents+en.lrquestion.description)
+msgid "Suppose there are N relays total."
+msgstr "Suppose there are N relays total."
+
+#: https//support.torproject.org/about/entry-guards/
+#: (content/about/entry-guards/contents+en.lrquestion.description)
+msgid ""
+"If you select new entry and exit relays each time you use the network, the "
+"attacker will be able to correlate all traffic you send with probability "
+"around (c/n)2."
+msgstr ""
+"If you select new entry and exit relays each time you use the network, the "
+"attacker will be able to correlate all traffic you send with probability "
+"around (c/n)2."
+
+#: https//support.torproject.org/about/entry-guards/
+#: (content/about/entry-guards/contents+en.lrquestion.description)
+msgid ""
+"But profiling is, for most users, as bad as being traced all the time: they "
+"want to do something often without an attacker noticing, and the attacker "
+"noticing once is as bad as the attacker noticing more often."
+msgstr ""
+"But profiling is, for most users, as bad as being traced all the time: they "
+"want to do something often without an attacker noticing, and the attacker "
+"noticing once is as bad as the attacker noticing more often."
+
+#: https//support.torproject.org/about/entry-guards/
+#: (content/about/entry-guards/contents+en.lrquestion.description)
+msgid ""
+"Thus, choosing many random entries and exits gives the user no chance of "
+"escaping profiling by this kind of attacker."
+msgstr ""
+"Thus, choosing many random entries and exits gives the user no chance of "
+"escaping profiling by this kind of attacker."
+
+#: https//support.torproject.org/about/entry-guards/
+#: (content/about/entry-guards/contents+en.lrquestion.description)
+msgid ""
+"The solution is \"entry guards\": each Tor client selects a few relays at "
+"random to use as entry points, and uses only those relays for their first "
+"hop."
+msgstr ""
+"The solution is \"entry guards\": each Tor client selects a few relays at "
+"random to use as entry points, and uses only those relays for their first "
+"hop."
+
+#: https//support.torproject.org/about/entry-guards/
+#: (content/about/entry-guards/contents+en.lrquestion.description)
+msgid ""
+"If those relays are not controlled or observed, the attacker can't win, "
+"ever, and the user is secure."
+msgstr ""
+"If those relays are not controlled or observed, the attacker can't win, "
+"ever, and the user is secure."
+
+#: https//support.torproject.org/about/entry-guards/
+#: (content/about/entry-guards/contents+en.lrquestion.description)
+msgid ""
+"If those relays are observed or controlled by the attacker, the attacker "
+"sees a larger fraction of the user's traffic - but still the user is no more"
+" profiled than before."
+msgstr ""
+"If those relays are observed or controlled by the attacker, the attacker "
+"sees a larger fraction of the user's traffic - but still the user is no more"
+" profiled than before."
+
+#: https//support.torproject.org/about/entry-guards/
+#: (content/about/entry-guards/contents+en.lrquestion.description)
+msgid ""
+"Thus, the user has some chance (on the order of (n-c)/n) of avoiding "
+"profiling, whereas they had none before."
+msgstr ""
+"Thus, the user has some chance (on the order of (n-c)/n) of avoiding "
+"profiling, whereas they had none before."
+
+#: https//support.torproject.org/about/entry-guards/
+#: (content/about/entry-guards/contents+en.lrquestion.description)
+msgid ""
+"You can read more at [An Analysis of the Degradation of Anonymous "
+"Protocols](http://freehaven.net/anonbib/#wright02), [Defending Anonymous "
+"Communication Against Passive Logging "
+"Attacks](http://freehaven.net/anonbib/#wright03), and especially [Locating "
+"Hidden Servers](http://freehaven.net/anonbib/#hs-attack06)."
+msgstr ""
+"You can read more at [An Analysis of the Degradation of Anonymous "
+"Protocols](http://freehaven.net/anonbib/#wright02), [Defending Anonymous "
+"Communication Against Passive Logging "
+"Attacks](http://freehaven.net/anonbib/#wright03), and especially [Locating "
+"Hidden Servers](http://freehaven.net/anonbib/#hs-attack06)."
+
+#: https//support.torproject.org/about/entry-guards/
+#: (content/about/entry-guards/contents+en.lrquestion.description)
+msgid ""
+"Restricting your entry nodes may also help against attackers who want to run"
+" a few Tor nodes and easily enumerate all of the Tor user IP addresses."
+msgstr ""
+"Restricting your entry nodes may also help against attackers who want to run"
+" a few Tor nodes and easily enumerate all of the Tor user IP addresses."
+
+#: https//support.torproject.org/about/entry-guards/
+#: (content/about/entry-guards/contents+en.lrquestion.description)
+msgid ""
+"(Even though they can't learn what destinations the users are talking to, "
+"they still might be able to do bad things with just a list of users.)"
+msgstr ""
+"(Even though they can't learn what destinations the users are talking to, "
+"they still might be able to do bad things with just a list of users.)"
+
+#: https//support.torproject.org/about/entry-guards/
+#: (content/about/entry-guards/contents+en.lrquestion.description)
+msgid ""
+"However, that feature won't really become useful until we move to a "
+"\"directory guard\" design as well."
+msgstr ""
+"However, that feature won't really become useful until we move to a "
+"\"directory guard\" design as well."
+
#: https//support.torproject.org/about/how-is-tor-different-from-other-proxies/
#: (content/about/how-is-tor-different-from-other-proxies/contents+en.lrquestion.title)
msgid "How is Tor different from other proxies?"
@@ -3343,6 +3696,209 @@ msgstr ""
"See this visualization of [Tor and HTTPS](/https/https-1/) to understand how"
" Tor and HTTPS interact."
+#: https//support.torproject.org/about/key-management/
+#: (content/about/key-management/contents+en.lrquestion.title)
+msgid "Tell me about all the keys Tor uses"
+msgstr "Tell me about all the keys Tor uses"
+
+#: https//support.torproject.org/about/key-management/
+#: (content/about/key-management/contents+en.lrquestion.description)
+msgid ""
+"Tor uses a variety of different keys, with three goals in mind: 1) "
+"encryption to ensure privacy of data within the Tor network, 2) "
+"authentication so clients know they're talking to the relays they meant to "
+"talk to, and 3) signatures to make sure all clients know the same set of "
+"relays."
+msgstr ""
+"Tor uses a variety of different keys, with three goals in mind: 1) "
+"encryption to ensure privacy of data within the Tor network, 2) "
+"authentication so clients know they're talking to the relays they meant to "
+"talk to, and 3) signatures to make sure all clients know the same set of "
+"relays."
+
+#: https//support.torproject.org/about/key-management/
+#: (content/about/key-management/contents+en.lrquestion.description)
+msgid ""
+"**Encryption**: first, all connections in Tor use TLS link encryption, so "
+"observers can't look inside to see which circuit a given cell is intended "
+"for."
+msgstr ""
+"**Encryption**: first, all connections in Tor use TLS link encryption, so "
+"observers can't look inside to see which circuit a given cell is intended "
+"for."
+
+#: https//support.torproject.org/about/key-management/
+#: (content/about/key-management/contents+en.lrquestion.description)
+msgid ""
+"Further, the Tor client establishes an ephemeral encryption key with each "
+"relay in the circuit; these extra layers of encryption mean that only the "
+"exit relay can read the cells."
+msgstr ""
+"Further, the Tor client establishes an ephemeral encryption key with each "
+"relay in the circuit; these extra layers of encryption mean that only the "
+"exit relay can read the cells."
+
+#: https//support.torproject.org/about/key-management/
+#: (content/about/key-management/contents+en.lrquestion.description)
+msgid ""
+"Both sides discard the circuit key when the circuit ends, so logging traffic"
+" and then breaking into the relay to discover the key won't work."
+msgstr ""
+"Both sides discard the circuit key when the circuit ends, so logging traffic"
+" and then breaking into the relay to discover the key won't work."
+
+#: https//support.torproject.org/about/key-management/
+#: (content/about/key-management/contents+en.lrquestion.description)
+msgid ""
+"**Authentication**: Every Tor relay has a public decryption key called the "
+"\"onion key\"."
+msgstr ""
+"**Authentication**: Every Tor relay has a public decryption key called the "
+"\"onion key\"."
+
+#: https//support.torproject.org/about/key-management/
+#: (content/about/key-management/contents+en.lrquestion.description)
+msgid "Each relay rotates its onion key once a week."
+msgstr "Each relay rotates its onion key once a week."
+
+#: https//support.torproject.org/about/key-management/
+#: (content/about/key-management/contents+en.lrquestion.description)
+msgid ""
+"When the Tor client establishes circuits, at each step it [demands that the "
+"Tor relay prove knowledge of its onion key](https://svn-"
+"archive.torproject.org/svn/projects/design-paper/tor-"
+"design.html#subsec:circuits)."
+msgstr ""
+"When the Tor client establishes circuits, at each step it [demands that the "
+"Tor relay prove knowledge of its onion key](https://svn-"
+"archive.torproject.org/svn/projects/design-paper/tor-"
+"design.html#subsec:circuits)."
+
+#: https//support.torproject.org/about/key-management/
+#: (content/about/key-management/contents+en.lrquestion.description)
+msgid ""
+"That way the first node in the path can't just spoof the rest of the path."
+msgstr ""
+"That way the first node in the path can't just spoof the rest of the path."
+
+#: https//support.torproject.org/about/key-management/
+#: (content/about/key-management/contents+en.lrquestion.description)
+msgid ""
+"Because the Tor client chooses the path, it can make sure to get Tor's "
+"\"distributed trust\" property: no single relay in the path can know about "
+"both the client and what the client is doing."
+msgstr ""
+"Because the Tor client chooses the path, it can make sure to get Tor's "
+"\"distributed trust\" property: no single relay in the path can know about "
+"both the client and what the client is doing."
+
+#: https//support.torproject.org/about/key-management/
+#: (content/about/key-management/contents+en.lrquestion.description)
+msgid ""
+"**Coordination**: How do clients know what the relays are, and how do they "
+"know that they have the right keys for them?"
+msgstr ""
+"**Coordination**: How do clients know what the relays are, and how do they "
+"know that they have the right keys for them?"
+
+#: https//support.torproject.org/about/key-management/
+#: (content/about/key-management/contents+en.lrquestion.description)
+msgid "Each relay has a long-term public signing key called the \"identity key\"."
+msgstr ""
+"Each relay has a long-term public signing key called the \"identity key\"."
+
+#: https//support.torproject.org/about/key-management/
+#: (content/about/key-management/contents+en.lrquestion.description)
+msgid "Each directory authority additionally has a \"directory signing key\"."
+msgstr "Each directory authority additionally has a \"directory signing key\"."
+
+#: https//support.torproject.org/about/key-management/
+#: (content/about/key-management/contents+en.lrquestion.description)
+msgid ""
+"The directory authorities [provide a signed "
+"list](https://gitweb.torproject.org/torspec.git/tree/dir-spec.txt) of all "
+"the known relays, and in that list are a set of certificates from each relay"
+" (self-signed by their identity key) specifying their keys, locations, exit "
+"policies, and so on."
+msgstr ""
+"The directory authorities [provide a signed "
+"list](https://gitweb.torproject.org/torspec.git/tree/dir-spec.txt) of all "
+"the known relays, and in that list are a set of certificates from each relay"
+" (self-signed by their identity key) specifying their keys, locations, exit "
+"policies, and so on."
+
+#: https//support.torproject.org/about/key-management/
+#: (content/about/key-management/contents+en.lrquestion.description)
+msgid ""
+"So unless the adversary can control a majority of the directory authorities "
+"(as of 2021 there are 10 directory authorities), they can't trick the Tor "
+"client into using other Tor relays."
+msgstr ""
+"So unless the adversary can control a majority of the directory authorities "
+"(as of 2021 there are 10 directory authorities), they can't trick the Tor "
+"client into using other Tor relays."
+
+#: https//support.torproject.org/about/key-management/
+#: (content/about/key-management/contents+en.lrquestion.description)
+msgid "How do clients know what the directory authorities are?"
+msgstr "How do clients know what the directory authorities are?"
+
+#: https//support.torproject.org/about/key-management/
+#: (content/about/key-management/contents+en.lrquestion.description)
+msgid ""
+"The Tor software comes with a built-in list of location and public key for "
+"each directory authority."
+msgstr ""
+"The Tor software comes with a built-in list of location and public key for "
+"each directory authority."
+
+#: https//support.torproject.org/about/key-management/
+#: (content/about/key-management/contents+en.lrquestion.description)
+msgid ""
+"So the only way to trick users into using a fake Tor network is to give them"
+" a specially modified version of the software."
+msgstr ""
+"So the only way to trick users into using a fake Tor network is to give them"
+" a specially modified version of the software."
+
+#: https//support.torproject.org/about/key-management/
+#: (content/about/key-management/contents+en.lrquestion.description)
+msgid "How do users know they've got the right software?"
+msgstr "How do users know they've got the right software?"
+
+#: https//support.torproject.org/about/key-management/
+#: (content/about/key-management/contents+en.lrquestion.description)
+msgid ""
+"When we distribute the source code or a package, we digitally sign it with "
+"[GNU Privacy Guard](http://www.gnupg.org/). See the [instructions on how to "
+"check Tor Browser's signature](https://support.torproject.org/tbb/how-to-"
+"verify-signature/)."
+msgstr ""
+"When we distribute the source code or a package, we digitally sign it with "
+"[GNU Privacy Guard](http://www.gnupg.org/). See the [instructions on how to "
+"check Tor Browser's signature](https://support.torproject.org/tbb/how-to-"
+"verify-signature/)."
+
+#: https//support.torproject.org/about/key-management/
+#: (content/about/key-management/contents+en.lrquestion.description)
+msgid ""
+"In order to be certain that it's really signed by us, you need to have met "
+"us in person and gotten a copy of our GPG key fingerprint, or you need to "
+"know somebody who has."
+msgstr ""
+"In order to be certain that it's really signed by us, you need to have met "
+"us in person and gotten a copy of our GPG key fingerprint, or you need to "
+"know somebody who has."
+
+#: https//support.torproject.org/about/key-management/
+#: (content/about/key-management/contents+en.lrquestion.description)
+msgid ""
+"If you're concerned about an attack on this level, we recommend you get "
+"involved with the security community and start meeting people."
+msgstr ""
+"If you're concerned about an attack on this level, we recommend you get "
+"involved with the security community and start meeting people."
+
#: https//support.torproject.org/about/no-data-scrubbing/
#: (content/about/no-data-scrubbing/contents+en.lrquestion.title)
msgid ""
@@ -3382,6 +3938,196 @@ msgstr ""
"Tor Browser can't do anything about the text that you type into forms, "
"though."
+#: https//support.torproject.org/about/protections/
+#: (content/about/protections/contents+en.lrquestion.title)
+msgid "What protections does Tor provide?"
+msgstr "What protections does Tor provide?"
+
+#: https//support.torproject.org/about/protections/
+#: (content/about/protections/contents+en.lrquestion.description)
+msgid ""
+"Internet communication is based on a store-and-forward model that can be "
+"understood in analogy to postal mail: Data is transmitted in blocks called "
+"IP datagrams or packets."
+msgstr ""
+"Internet communication is based on a store-and-forward model that can be "
+"understood in analogy to postal mail: Data is transmitted in blocks called "
+"IP datagrams or packets."
+
+#: https//support.torproject.org/about/protections/
+#: (content/about/protections/contents+en.lrquestion.description)
+msgid ""
+"Every packet includes a source IP address (of the sender) and a destination "
+"IP address (of the receiver), just as ordinary letters contain postal "
+"addresses of sender and receiver."
+msgstr ""
+"Every packet includes a source IP address (of the sender) and a destination "
+"IP address (of the receiver), just as ordinary letters contain postal "
+"addresses of sender and receiver."
+
+#: https//support.torproject.org/about/protections/
+#: (content/about/protections/contents+en.lrquestion.description)
+msgid ""
+"The way from sender to receiver involves multiple hops of routers, where "
+"each router inspects the destination IP address and forwards the packet "
+"closer to its destination."
+msgstr ""
+"The way from sender to receiver involves multiple hops of routers, where "
+"each router inspects the destination IP address and forwards the packet "
+"closer to its destination."
+
+#: https//support.torproject.org/about/protections/
+#: (content/about/protections/contents+en.lrquestion.description)
+msgid ""
+"Thus, every router between sender and receiver learns that the sender is "
+"communicating with the receiver."
+msgstr ""
+"Thus, every router between sender and receiver learns that the sender is "
+"communicating with the receiver."
+
+#: https//support.torproject.org/about/protections/
+#: (content/about/protections/contents+en.lrquestion.description)
+msgid ""
+"In particular, your local ISP is in the position to build a complete profile"
+" of your Internet usage."
+msgstr ""
+"In particular, your local ISP is in the position to build a complete profile"
+" of your Internet usage."
+
+#: https//support.torproject.org/about/protections/
+#: (content/about/protections/contents+en.lrquestion.description)
+msgid ""
+"In addition, every server in the Internet that can see any of the packets "
+"can profile your behavior."
+msgstr ""
+"In addition, every server in the Internet that can see any of the packets "
+"can profile your behavior."
+
+#: https//support.torproject.org/about/protections/
+#: (content/about/protections/contents+en.lrquestion.description)
+msgid ""
+"The aim of Tor is to improve your privacy by sending your traffic through a "
+"series of proxies."
+msgstr ""
+"The aim of Tor is to improve your privacy by sending your traffic through a "
+"series of proxies."
+
+#: https//support.torproject.org/about/protections/
+#: (content/about/protections/contents+en.lrquestion.description)
+msgid ""
+"Your communication is encrypted in multiple layers and routed via multiple "
+"hops through the Tor network to the final receiver."
+msgstr ""
+"Your communication is encrypted in multiple layers and routed via multiple "
+"hops through the Tor network to the final receiver."
+
+#: https//support.torproject.org/about/protections/
+#: (content/about/protections/contents+en.lrquestion.description)
+msgid ""
+"More details on this process can be found in this "
+"[visualization](https://support.torproject.org/https/https-1/)."
+msgstr ""
+"More details on this process can be found in this "
+"[visualization](https://support.torproject.org/https/https-1/)."
+
+#: https//support.torproject.org/about/protections/
+#: (content/about/protections/contents+en.lrquestion.description)
+msgid ""
+"Note that all your local ISP can observe now is that you are communicating "
+"with Tor nodes."
+msgstr ""
+"Note that all your local ISP can observe now is that you are communicating "
+"with Tor nodes."
+
+#: https//support.torproject.org/about/protections/
+#: (content/about/protections/contents+en.lrquestion.description)
+msgid ""
+"Similarly, servers in the Internet just see that they are being contacted by"
+" Tor nodes."
+msgstr ""
+"Similarly, servers in the Internet just see that they are being contacted by"
+" Tor nodes."
+
+#: https//support.torproject.org/about/protections/
+#: (content/about/protections/contents+en.lrquestion.description)
+msgid "Generally speaking, Tor aims to solve three privacy problems:"
+msgstr "Generally speaking, Tor aims to solve three privacy problems:"
+
+#: https//support.torproject.org/about/protections/
+#: (content/about/protections/contents+en.lrquestion.description)
+msgid ""
+"First, Tor prevents websites and other services from learning your location,"
+" which they can use to build databases about your habits and interests."
+msgstr ""
+"First, Tor prevents websites and other services from learning your location,"
+" which they can use to build databases about your habits and interests."
+
+#: https//support.torproject.org/about/protections/
+#: (content/about/protections/contents+en.lrquestion.description)
+msgid ""
+"With Tor, your Internet connections don't give you away by default -- now "
+"you can have the ability to choose, for each connection, how much "
+"information to reveal."
+msgstr ""
+"With Tor, your Internet connections don't give you away by default -- now "
+"you can have the ability to choose, for each connection, how much "
+"information to reveal."
+
+#: https//support.torproject.org/about/protections/
+#: (content/about/protections/contents+en.lrquestion.description)
+msgid ""
+"Second, Tor prevents people watching your traffic locally (such as your ISP "
+"or someone with access to your home wifi or router) from learning what "
+"information you're fetching and where you're fetching it from."
+msgstr ""
+"Second, Tor prevents people watching your traffic locally (such as your ISP "
+"or someone with access to your home wifi or router) from learning what "
+"information you're fetching and where you're fetching it from."
+
+#: https//support.torproject.org/about/protections/
+#: (content/about/protections/contents+en.lrquestion.description)
+msgid ""
+"It also stops them from deciding what you're allowed to learn and publish --"
+" if you can get to any part of the Tor network, you can reach any site on "
+"the Internet."
+msgstr ""
+"It also stops them from deciding what you're allowed to learn and publish --"
+" if you can get to any part of the Tor network, you can reach any site on "
+"the Internet."
+
+#: https//support.torproject.org/about/protections/
+#: (content/about/protections/contents+en.lrquestion.description)
+msgid ""
+"Third, Tor routes your connection through more than one Tor relay so no "
+"single relay can learn what you're up to."
+msgstr ""
+"Third, Tor routes your connection through more than one Tor relay so no "
+"single relay can learn what you're up to."
+
+#: https//support.torproject.org/about/protections/
+#: (content/about/protections/contents+en.lrquestion.description)
+msgid ""
+"Because these relays are run by different individuals or organizations, "
+"distributing trust provides more security than the old [one hop "
+"proxy](https://support.torproject.org/about/#how-is-tor-different-from-"
+"other-proxies) approach."
+msgstr ""
+"Because these relays are run by different individuals or organizations, "
+"distributing trust provides more security than the old [one hop "
+"proxy](https://support.torproject.org/about/#how-is-tor-different-from-"
+"other-proxies) approach."
+
+#: https//support.torproject.org/about/protections/
+#: (content/about/protections/contents+en.lrquestion.description)
+msgid ""
+"Note, however, that there are situations where Tor fails to solve these "
+"privacy problems entirely: see the entry below on [remaining "
+"attacks](https://support.torproject.org/about/#attacks-on-onion-routing)."
+msgstr ""
+"Note, however, that there are situations where Tor fails to solve these "
+"privacy problems entirely: see the entry below on [remaining "
+"attacks](https://support.torproject.org/about/#attacks-on-onion-routing)."
+
#: https//support.torproject.org/about/what-is-tor/
#: (content/about/what-is-tor/contents+en.lrquestion.title)
msgid "What is Tor?"
@@ -6078,14 +6824,18 @@ msgstr ""
#: (content/tbb/tbb-47/contents+en.lrquestion.description)
msgid ""
"Also, read up on the HTTPProxyAuthenticator and HTTPSProxyAuthenticator "
-"options if your proxy requires auth. We only support basic auth currently, "
-"but if you need NTLM authentication, you may find [this post in the "
-"archives](https://archives.seul.org/or/talk/Jun-2005/msg00223.html) useful."
+"options if your [proxy requires auth.](https://developer.mozilla.org/en-"
+"US/docs/Web/HTTP/Headers/Proxy-Authenticate) We only support basic auth "
+"currently, but if you need NTLM authentication, you may find [this post in "
+"the archives](https://archives.seul.org/or/talk/Jun-2005/msg00223.html) "
+"useful."
msgstr ""
"Also, read up on the HTTPProxyAuthenticator and HTTPSProxyAuthenticator "
-"options if your proxy requires auth. We only support basic auth currently, "
-"but if you need NTLM authentication, you may find [this post in the "
-"archives](https://archives.seul.org/or/talk/Jun-2005/msg00223.html) useful."
+"options if your [proxy requires auth.](https://developer.mozilla.org/en-"
+"US/docs/Web/HTTP/Headers/Proxy-Authenticate) We only support basic auth "
+"currently, but if you need NTLM authentication, you may find [this post in "
+"the archives](https://archives.seul.org/or/talk/Jun-2005/msg00223.html) "
+"useful."
#: https//support.torproject.org/tbb/tbb-47/
#: (content/tbb/tbb-47/contents+en.lrquestion.description)
@@ -6361,6 +7111,261 @@ msgstr ""
"Remember, all lines beginning with `#` in torrc are treated as comments and "
"have no effect on Tor's configuration."
+#: https//support.torproject.org/tbb/tbb-firewall-ports/
+#: (content/tbb/tbb-firewall-ports/contents+en.lrquestion.title)
+msgid "My firewall only allows a few outgoing ports"
+msgstr "My firewall only allows a few outgoing ports"
+
+#: https//support.torproject.org/tbb/tbb-firewall-ports/
+#: (content/tbb/tbb-firewall-ports/contents+en.lrquestion.description)
+msgid ""
+"If your firewall works by blocking ports, then you can tell Tor to only use "
+"the ports when you start your Tor Browser."
+msgstr ""
+"If your firewall works by blocking ports, then you can tell Tor to only use "
+"the ports when you start your Tor Browser."
+
+#: https//support.torproject.org/tbb/tbb-firewall-ports/
+#: (content/tbb/tbb-firewall-ports/contents+en.lrquestion.description)
+msgid ""
+"Or you can add the ports that your firewall permits by adding "
+"\"FascistFirewall 1\" to your torrc configuration file."
+msgstr ""
+"Or you can add the ports that your firewall permits by adding "
+"\"FascistFirewall 1\" to your torrc configuration file."
+
+#: https//support.torproject.org/tbb/tbb-firewall-ports/
+#: (content/tbb/tbb-firewall-ports/contents+en.lrquestion.description)
+msgid ""
+"By default, when you set this Tor assumes that your firewall allows only "
+"port 80 and port 443 (HTTP and HTTPS respectively)."
+msgstr ""
+"By default, when you set this Tor assumes that your firewall allows only "
+"port 80 and port 443 (HTTP and HTTPS respectively)."
+
+#: https//support.torproject.org/tbb/tbb-firewall-ports/
+#: (content/tbb/tbb-firewall-ports/contents+en.lrquestion.description)
+msgid ""
+"You can select a different set of ports with the FirewallPorts torrc option."
+msgstr ""
+"You can select a different set of ports with the FirewallPorts torrc option."
+
+#: https//support.torproject.org/tbb/tbb-firewall-ports/
+#: (content/tbb/tbb-firewall-ports/contents+en.lrquestion.description)
+msgid ""
+"If you want to be more fine-grained with your controls, you can also use the"
+" ReachableAddresses config options, e.g.:"
+msgstr ""
+"If you want to be more fine-grained with your controls, you can also use the"
+" ReachableAddresses config options, e.g.:"
+
+#: https//support.torproject.org/tbb/tbb-firewall-ports/
+#: (content/tbb/tbb-firewall-ports/contents+en.lrquestion.description)
+#: https//support.torproject.org/tbb/tbb-install-tor-central-server/
+#: (content/tbb/tbb-install-tor-central-server/contents+en.lrquestion.description)
+#: https//support.torproject.org/operators/default-exit-ports/
+#: (content/operators/default-exit-ports/contents+en.lrquestion.description)
+#: https//support.torproject.org/operators/hibernation/
+#: (content/operators/hibernation/contents+en.lrquestion.description)
+#: https//support.torproject.org/operators/limit-total-bandwidth/
+#: (content/operators/limit-total-bandwidth/contents+en.lrquestion.description)
+#: https//support.torproject.org/misc/bug-or-feedback/
+#: (content/misc/bug-or-feedback/contents+en.lrquestion.description)
+#: https//support.torproject.org/get-in-touch/why-i-cant-join-tor-channels/
+#: (content/get-in-touch/why-i-cant-join-tor-channels/contents+en.lrquestion.description)
+#: https//support.torproject.org/apt/tor-deb-repo/
+#: (content/apt/apt-1/contents+en.lrquestion.description)
+#: https//support.torproject.org/apt/apt-over-tor/
+#: (content/apt/apt-3/contents+en.lrquestion.description)
+msgid "```"
+msgstr "```"
+
+#: https//support.torproject.org/tbb/tbb-firewall-ports/
+#: (content/tbb/tbb-firewall-ports/contents+en.lrquestion.description)
+msgid "ReachableDirAddresses *:80"
+msgstr "ReachableDirAddresses *:80"
+
+#: https//support.torproject.org/tbb/tbb-firewall-ports/
+#: (content/tbb/tbb-firewall-ports/contents+en.lrquestion.description)
+msgid "ReachableORAddresses *:443"
+msgstr "ReachableORAddresses *:443"
+
+#: https//support.torproject.org/tbb/tbb-install-tor-central-server/
+#: (content/tbb/tbb-install-tor-central-server/contents+en.lrquestion.title)
+msgid ""
+"Can I install Tor on a central server, and have my clients connect to it?"
+msgstr ""
+"Can I install Tor on a central server, and have my clients connect to it?"
+
+#: https//support.torproject.org/tbb/tbb-install-tor-central-server/
+#: (content/tbb/tbb-install-tor-central-server/contents+en.lrquestion.description)
+msgid ""
+"Yes. Tor can be configured as a client or a relay on another machine, and "
+"allow other machines to be able to connect to it for anonymity."
+msgstr ""
+"Yes. Tor can be configured as a client or a relay on another machine, and "
+"allow other machines to be able to connect to it for anonymity."
+
+#: https//support.torproject.org/tbb/tbb-install-tor-central-server/
+#: (content/tbb/tbb-install-tor-central-server/contents+en.lrquestion.description)
+msgid ""
+"This is most useful in an environment where many computers want a gateway of"
+" anonymity to the rest of the world."
+msgstr ""
+"This is most useful in an environment where many computers want a gateway of"
+" anonymity to the rest of the world."
+
+#: https//support.torproject.org/tbb/tbb-install-tor-central-server/
+#: (content/tbb/tbb-install-tor-central-server/contents+en.lrquestion.description)
+msgid ""
+"However, be forewarned that with this configuration, anyone within your "
+"private network (existing between you and the Tor client/relay) can see what"
+" traffic you are sending in clear text."
+msgstr ""
+"However, be forewarned that with this configuration, anyone within your "
+"private network (existing between you and the Tor client/relay) can see what"
+" traffic you are sending in clear text."
+
+#: https//support.torproject.org/tbb/tbb-install-tor-central-server/
+#: (content/tbb/tbb-install-tor-central-server/contents+en.lrquestion.description)
+msgid "The anonymity doesn't start until you get to the Tor relay."
+msgstr "The anonymity doesn't start until you get to the Tor relay."
+
+#: https//support.torproject.org/tbb/tbb-install-tor-central-server/
+#: (content/tbb/tbb-install-tor-central-server/contents+en.lrquestion.description)
+msgid ""
+"Because of this, if you are the controller of your domain and you know "
+"everything's locked down, you will be OK, but this configuration may not be "
+"suitable for large private networks where security is key all around."
+msgstr ""
+"Because of this, if you are the controller of your domain and you know "
+"everything's locked down, you will be OK, but this configuration may not be "
+"suitable for large private networks where security is key all around."
+
+#: https//support.torproject.org/tbb/tbb-install-tor-central-server/
+#: (content/tbb/tbb-install-tor-central-server/contents+en.lrquestion.description)
+msgid ""
+"Configuration is simple, editing your torrc file's SocksListenAddress "
+"according to the following examples:"
+msgstr ""
+"Configuration is simple, editing your torrc file's SocksListenAddress "
+"according to the following examples:"
+
+#: https//support.torproject.org/tbb/tbb-install-tor-central-server/
+#: (content/tbb/tbb-install-tor-central-server/contents+en.lrquestion.description)
+msgid "SocksListenAddress 127.0.0.1"
+msgstr "SocksListenAddress 127.0.0.1"
+
+#: https//support.torproject.org/tbb/tbb-install-tor-central-server/
+#: (content/tbb/tbb-install-tor-central-server/contents+en.lrquestion.description)
+msgid "SocksListenAddress 192.168.x.x:9100"
+msgstr "SocksListenAddress 192.168.x.x:9100"
+
+#: https//support.torproject.org/tbb/tbb-install-tor-central-server/
+#: (content/tbb/tbb-install-tor-central-server/contents+en.lrquestion.description)
+msgid "SocksListenAddress 0.0.0.0:9100"
+msgstr "SocksListenAddress 0.0.0.0:9100"
+
+#: https//support.torproject.org/tbb/tbb-install-tor-central-server/
+#: (content/tbb/tbb-install-tor-central-server/contents+en.lrquestion.description)
+msgid ""
+"You can state multiple listen addresses, in the case that you are part of "
+"several networks or subnets."
+msgstr ""
+"You can state multiple listen addresses, in the case that you are part of "
+"several networks or subnets."
+
+#: https//support.torproject.org/tbb/tbb-install-tor-central-server/
+#: (content/tbb/tbb-install-tor-central-server/contents+en.lrquestion.description)
+msgid "SocksListenAddress 192.168.x.x:9100 #eth0"
+msgstr "SocksListenAddress 192.168.x.x:9100 #eth0"
+
+#: https//support.torproject.org/tbb/tbb-install-tor-central-server/
+#: (content/tbb/tbb-install-tor-central-server/contents+en.lrquestion.description)
+msgid "SocksListenAddress 10.x.x.x:9100 #eth1"
+msgstr "SocksListenAddress 10.x.x.x:9100 #eth1"
+
+#: https//support.torproject.org/tbb/tbb-install-tor-central-server/
+#: (content/tbb/tbb-install-tor-central-server/contents+en.lrquestion.description)
+msgid ""
+"After this, your clients on their respective networks/subnets would specify "
+"a socks proxy with the address and port you specified SocksListenAddress to "
+"be."
+msgstr ""
+"After this, your clients on their respective networks/subnets would specify "
+"a socks proxy with the address and port you specified SocksListenAddress to "
+"be."
+
+#: https//support.torproject.org/tbb/tbb-install-tor-central-server/
+#: (content/tbb/tbb-install-tor-central-server/contents+en.lrquestion.description)
+msgid ""
+"Please note that the SocksPort configuration option gives the port ONLY for "
+"localhost (127.0.0.1)."
+msgstr ""
+"Please note that the SocksPort configuration option gives the port ONLY for "
+"localhost (127.0.0.1)."
+
+#: https//support.torproject.org/tbb/tbb-install-tor-central-server/
+#: (content/tbb/tbb-install-tor-central-server/contents+en.lrquestion.description)
+msgid ""
+"When setting up your SocksListenAddress(es), you need to give the port with "
+"the address, as shown above."
+msgstr ""
+"When setting up your SocksListenAddress(es), you need to give the port with "
+"the address, as shown above."
+
+#: https//support.torproject.org/tbb/tbb-install-tor-central-server/
+#: (content/tbb/tbb-install-tor-central-server/contents+en.lrquestion.description)
+msgid ""
+"If you are interested in forcing all outgoing data through the central Tor "
+"client/relay, instead of the server only being an optional proxy, you may "
+"find the program iptables (for *nix) useful."
+msgstr ""
+"If you are interested in forcing all outgoing data through the central Tor "
+"client/relay, instead of the server only being an optional proxy, you may "
+"find the program iptables (for *nix) useful."
+
+#: https//support.torproject.org/tbb/tbb-run-client-different-computer/
+#: (content/tbb/tbb-run-client-different-computer/contents+en.lrquestion.title)
+msgid ""
+"I want to run my Tor client on a different computer than my applications"
+msgstr ""
+"I want to run my Tor client on a different computer than my applications"
+
+#: https//support.torproject.org/tbb/tbb-run-client-different-computer/
+#: (content/tbb/tbb-run-client-different-computer/contents+en.lrquestion.description)
+msgid ""
+"By default, your Tor client only listens for applications that connect from "
+"localhost."
+msgstr ""
+"By default, your Tor client only listens for applications that connect from "
+"localhost."
+
+#: https//support.torproject.org/tbb/tbb-run-client-different-computer/
+#: (content/tbb/tbb-run-client-different-computer/contents+en.lrquestion.description)
+msgid "Connections from other computers are refused."
+msgstr "Connections from other computers are refused."
+
+#: https//support.torproject.org/tbb/tbb-run-client-different-computer/
+#: (content/tbb/tbb-run-client-different-computer/contents+en.lrquestion.description)
+msgid ""
+"If you want to torify applications on different computers than the Tor "
+"client, you should edit your torrc to define `SocksListenAddress 0.0.0.0` "
+"and then restart (or hup) Tor."
+msgstr ""
+"If you want to torify applications on different computers than the Tor "
+"client, you should edit your torrc to define `SocksListenAddress 0.0.0.0` "
+"and then restart (or hup) Tor."
+
+#: https//support.torproject.org/tbb/tbb-run-client-different-computer/
+#: (content/tbb/tbb-run-client-different-computer/contents+en.lrquestion.description)
+msgid ""
+"If you want to get more advanced, you can configure your Tor client on a "
+"firewall to bind to your internal IP but not your external IP."
+msgstr ""
+"If you want to get more advanced, you can configure your Tor client on a "
+"firewall to bind to your internal IP but not your external IP."
+
#: https//support.torproject.org/tbb/website-blocking-tor/
#: (content/tbb/website-blocking-tor/contents+en.lrquestion.title)
msgid "A website I am trying to reach is blocking access over Tor."
@@ -8167,6 +9172,139 @@ msgstr ""
"install](https://community.torproject.org/relay/setup/bridge/post-install/) "
"guide."
+#: https//support.torproject.org/operators/default-exit-ports/
+#: (content/operators/default-exit-ports/contents+en.lrquestion.title)
+msgid "Is there a list of default exit ports?"
+msgstr "Is there a list of default exit ports?"
+
+#: https//support.torproject.org/operators/default-exit-ports/
+#: (content/operators/default-exit-ports/contents+en.lrquestion.description)
+msgid ""
+"The default open ports are listed below but keep in mind that, any port or "
+"ports can be opened by the relay operator by configuring it in torrc or "
+"modifying the source code."
+msgstr ""
+"The default open ports are listed below but keep in mind that, any port or "
+"ports can be opened by the relay operator by configuring it in torrc or "
+"modifying the source code."
+
+#: https//support.torproject.org/operators/default-exit-ports/
+#: (content/operators/default-exit-ports/contents+en.lrquestion.description)
+msgid ""
+"The default according to src/or/policies.c ([line 85][1] and [line 1901][2])"
+" from the source code release [release-0.4.6][3]:"
+msgstr ""
+"The default according to src/or/policies.c ([line 85][1] and [line 1901][2])"
+" from the source code release [release-0.4.6][3]:"
+
+#: https//support.torproject.org/operators/default-exit-ports/
+#: (content/operators/default-exit-ports/contents+en.lrquestion.description)
+msgid "reject 0.0.0.0/8"
+msgstr "reject 0.0.0.0/8"
+
+#: https//support.torproject.org/operators/default-exit-ports/
+#: (content/operators/default-exit-ports/contents+en.lrquestion.description)
+msgid "reject 169.254.0.0/16"
+msgstr "reject 169.254.0.0/16"
+
+#: https//support.torproject.org/operators/default-exit-ports/
+#: (content/operators/default-exit-ports/contents+en.lrquestion.description)
+msgid "reject 127.0.0.0/8"
+msgstr "reject 127.0.0.0/8"
+
+#: https//support.torproject.org/operators/default-exit-ports/
+#: (content/operators/default-exit-ports/contents+en.lrquestion.description)
+msgid "reject 192.168.0.0/16"
+msgstr "reject 192.168.0.0/16"
+
+#: https//support.torproject.org/operators/default-exit-ports/
+#: (content/operators/default-exit-ports/contents+en.lrquestion.description)
+msgid "reject 10.0.0.0/8"
+msgstr "reject 10.0.0.0/8"
+
+#: https//support.torproject.org/operators/default-exit-ports/
+#: (content/operators/default-exit-ports/contents+en.lrquestion.description)
+msgid "reject 172.16.0.0/12"
+msgstr "reject 172.16.0.0/12"
+
+#: https//support.torproject.org/operators/default-exit-ports/
+#: (content/operators/default-exit-ports/contents+en.lrquestion.description)
+msgid "reject *:25"
+msgstr "reject *:25"
+
+#: https//support.torproject.org/operators/default-exit-ports/
+#: (content/operators/default-exit-ports/contents+en.lrquestion.description)
+msgid "reject *:119"
+msgstr "reject *:119"
+
+#: https//support.torproject.org/operators/default-exit-ports/
+#: (content/operators/default-exit-ports/contents+en.lrquestion.description)
+msgid "reject *:135-139"
+msgstr "reject *:135-139"
+
+#: https//support.torproject.org/operators/default-exit-ports/
+#: (content/operators/default-exit-ports/contents+en.lrquestion.description)
+msgid "reject *:445"
+msgstr "reject *:445"
+
+#: https//support.torproject.org/operators/default-exit-ports/
+#: (content/operators/default-exit-ports/contents+en.lrquestion.description)
+msgid "reject *:563"
+msgstr "reject *:563"
+
+#: https//support.torproject.org/operators/default-exit-ports/
+#: (content/operators/default-exit-ports/contents+en.lrquestion.description)
+msgid "reject *:1214"
+msgstr "reject *:1214"
+
+#: https//support.torproject.org/operators/default-exit-ports/
+#: (content/operators/default-exit-ports/contents+en.lrquestion.description)
+msgid "reject *:4661-4666"
+msgstr "reject *:4661-4666"
+
+#: https//support.torproject.org/operators/default-exit-ports/
+#: (content/operators/default-exit-ports/contents+en.lrquestion.description)
+msgid "reject *:6346-6429"
+msgstr "reject *:6346-6429"
+
+#: https//support.torproject.org/operators/default-exit-ports/
+#: (content/operators/default-exit-ports/contents+en.lrquestion.description)
+msgid "reject *:6699"
+msgstr "reject *:6699"
+
+#: https//support.torproject.org/operators/default-exit-ports/
+#: (content/operators/default-exit-ports/contents+en.lrquestion.description)
+msgid "reject *:6881-6999"
+msgstr "reject *:6881-6999"
+
+#: https//support.torproject.org/operators/default-exit-ports/
+#: (content/operators/default-exit-ports/contents+en.lrquestion.description)
+msgid "accept *:*"
+msgstr "accept *:*"
+
+#: https//support.torproject.org/operators/default-exit-ports/
+#: (content/operators/default-exit-ports/contents+en.lrquestion.description)
+msgid ""
+"[1]: "
+"https://gitlab.torproject.org/tpo/core/tor/-/blob/release-0.4.6/src/core/or/policies.c#L85"
+msgstr ""
+"[1]: "
+"https://gitlab.torproject.org/tpo/core/tor/-/blob/release-0.4.6/src/core/or/policies.c#L85"
+
+#: https//support.torproject.org/operators/default-exit-ports/
+#: (content/operators/default-exit-ports/contents+en.lrquestion.description)
+msgid ""
+"[2]: "
+"https://gitlab.torproject.org/tpo/core/tor/-/blob/release-0.4.6/src/core/or/policies.c#L1901"
+msgstr ""
+"[2]: "
+"https://gitlab.torproject.org/tpo/core/tor/-/blob/release-0.4.6/src/core/or/policies.c#L1901"
+
+#: https//support.torproject.org/operators/default-exit-ports/
+#: (content/operators/default-exit-ports/contents+en.lrquestion.description)
+msgid "[3]: https://gitlab.torproject.org/tpo/core/tor/-/tree/release-0.4.6/"
+msgstr "[3]: https://gitlab.torproject.org/tpo/core/tor/-/tree/release-0.4.6/"
+
#: https//support.torproject.org/operators/dynamic-ip/
#: (content/operators/dynamic-ip/contents+en.lrquestion.title)
msgid "Can I run a Tor relay using a dynamic IP address?"
@@ -8357,21 +9495,6 @@ msgstr ""
"Thus you may find that you are unable to browse as soon as your Tor goes "
"into hibernation, signaled by this entry in the log:"
-#: https//support.torproject.org/operators/hibernation/
-#: (content/operators/hibernation/contents+en.lrquestion.description)
-#: https//support.torproject.org/operators/limit-total-bandwidth/
-#: (content/operators/limit-total-bandwidth/contents+en.lrquestion.description)
-#: https//support.torproject.org/misc/bug-or-feedback/
-#: (content/misc/bug-or-feedback/contents+en.lrquestion.description)
-#: https//support.torproject.org/get-in-touch/why-i-cant-join-tor-channels/
-#: (content/get-in-touch/why-i-cant-join-tor-channels/contents+en.lrquestion.description)
-#: https//support.torproject.org/apt/tor-deb-repo/
-#: (content/apt/apt-1/contents+en.lrquestion.description)
-#: https//support.torproject.org/apt/apt-over-tor/
-#: (content/apt/apt-3/contents+en.lrquestion.description)
-msgid "```"
-msgstr "```"
-
#: https//support.torproject.org/operators/hibernation/
#: (content/operators/hibernation/contents+en.lrquestion.description)
msgid "Bandwidth soft limit reached; commencing hibernation."
@@ -11124,6 +12247,166 @@ msgstr "uid tor-security at lists.torproject.org"
msgid "sub 4096R/C00942E4 2017-03-13"
msgstr "sub 4096R/C00942E4 2017-03-13"
+#: https//support.torproject.org/misc/check-socks-dns-leaks/
+#: (content/misc/check-socks-dns-leaks/contents+en.lrquestion.title)
+msgid ""
+"How do I check if my application that uses SOCKS is leaking DNS requests?"
+msgstr ""
+"How do I check if my application that uses SOCKS is leaking DNS requests?"
+
+#: https//support.torproject.org/misc/check-socks-dns-leaks/
+#: (content/misc/check-socks-dns-leaks/contents+en.lrquestion.description)
+msgid ""
+"Even if your application is using the correct variant of the SOCKS protocol,"
+" there is still a risk that it could be leaking DNS queries."
+msgstr ""
+"Even if your application is using the correct variant of the SOCKS protocol,"
+" there is still a risk that it could be leaking DNS queries."
+
+#: https//support.torproject.org/misc/check-socks-dns-leaks/
+#: (content/misc/check-socks-dns-leaks/contents+en.lrquestion.description)
+msgid ""
+"This problem happens in Firefox extensions that resolve the destination "
+"hostname themselves, for example to show you its IP address, what country "
+"it's in, etc."
+msgstr ""
+"This problem happens in Firefox extensions that resolve the destination "
+"hostname themselves, for example to show you its IP address, what country "
+"it's in, etc."
+
+#: https//support.torproject.org/misc/check-socks-dns-leaks/
+#: (content/misc/check-socks-dns-leaks/contents+en.lrquestion.description)
+msgid ""
+"If you suspect your application might behave like this, follow the "
+"instructions below to check."
+msgstr ""
+"If you suspect your application might behave like this, follow the "
+"instructions below to check."
+
+#: https//support.torproject.org/misc/check-socks-dns-leaks/
+#: (content/misc/check-socks-dns-leaks/contents+en.lrquestion.description)
+msgid ""
+"1. Add `TestSocks 1` to your [torrc file](https://support.torproject.org/tbb"
+"/tbb-editing-torrc/)."
+msgstr ""
+"1. Add `TestSocks 1` to your [torrc file](https://support.torproject.org/tbb"
+"/tbb-editing-torrc/)."
+
+#: https//support.torproject.org/misc/check-socks-dns-leaks/
+#: (content/misc/check-socks-dns-leaks/contents+en.lrquestion.description)
+msgid ""
+"1. Start Tor, and point your program's SOCKS proxy settings to Tor's SOCKS5 "
+"server (`socks5://127.0.0.1:9050` by default)."
+msgstr ""
+"1. Start Tor, and point your program's SOCKS proxy settings to Tor's SOCKS5 "
+"server (`socks5://127.0.0.1:9050` by default)."
+
+#: https//support.torproject.org/misc/check-socks-dns-leaks/
+#: (content/misc/check-socks-dns-leaks/contents+en.lrquestion.description)
+msgid ""
+"1. Watch your logs as you use your application. For each socks connection, "
+"Tor will log a `notice` for safe connections, and a `warn` for connections "
+"leaking DNS requests."
+msgstr ""
+"1. Watch your logs as you use your application. For each socks connection, "
+"Tor will log a `notice` for safe connections, and a `warn` for connections "
+"leaking DNS requests."
+
+#: https//support.torproject.org/misc/check-socks-dns-leaks/
+#: (content/misc/check-socks-dns-leaks/contents+en.lrquestion.description)
+msgid ""
+"If you want to automatically disable all connections leaking DNS requests, "
+"set `SafeSocks 1` in your torrc file."
+msgstr ""
+"If you want to automatically disable all connections leaking DNS requests, "
+"set `SafeSocks 1` in your torrc file."
+
+#: https//support.torproject.org/misc/hide-exits/
+#: (content/misc/hide-exits/contents+en.lrquestion.title)
+msgid ""
+"You should hide the list of Tor relays, so people can't block the exits."
+msgstr ""
+"You should hide the list of Tor relays, so people can't block the exits."
+
+#: https//support.torproject.org/misc/hide-exits/
+#: (content/misc/hide-exits/contents+en.lrquestion.description)
+msgid "There are a few reasons we don't:"
+msgstr "There are a few reasons we don't:"
+
+#: https//support.torproject.org/misc/hide-exits/
+#: (content/misc/hide-exits/contents+en.lrquestion.description)
+msgid ""
+"1. We can't help but make the information available, since Tor clients need "
+"to use it to pick their paths."
+msgstr ""
+"1. We can't help but make the information available, since Tor clients need "
+"to use it to pick their paths."
+
+#: https//support.torproject.org/misc/hide-exits/
+#: (content/misc/hide-exits/contents+en.lrquestion.description)
+msgid "So if the \"blockers\" want it, they can get it anyway."
+msgstr "So if the \"blockers\" want it, they can get it anyway."
+
+#: https//support.torproject.org/misc/hide-exits/
+#: (content/misc/hide-exits/contents+en.lrquestion.description)
+msgid ""
+"Further, even if we didn't tell clients about the list of relays directly, "
+"somebody could still make a lot of connections through Tor to a test site "
+"and build a list of the addresses they see."
+msgstr ""
+"Further, even if we didn't tell clients about the list of relays directly, "
+"somebody could still make a lot of connections through Tor to a test site "
+"and build a list of the addresses they see."
+
+#: https//support.torproject.org/misc/hide-exits/
+#: (content/misc/hide-exits/contents+en.lrquestion.description)
+msgid ""
+"1. If people want to block us, we believe that they should be allowed to do "
+"so."
+msgstr ""
+"1. If people want to block us, we believe that they should be allowed to do "
+"so."
+
+#: https//support.torproject.org/misc/hide-exits/
+#: (content/misc/hide-exits/contents+en.lrquestion.description)
+msgid ""
+"Obviously, we would prefer for everybody to allow Tor users to connect to "
+"them, but people have the right to decide who their services should allow "
+"connections from, and if they want to block anonymous users, they can."
+msgstr ""
+"Obviously, we would prefer for everybody to allow Tor users to connect to "
+"them, but people have the right to decide who their services should allow "
+"connections from, and if they want to block anonymous users, they can."
+
+#: https//support.torproject.org/misc/hide-exits/
+#: (content/misc/hide-exits/contents+en.lrquestion.description)
+msgid ""
+"1. Being blockable also has tactical advantages: it may be a persuasive "
+"response to website maintainers who feel threatened by Tor."
+msgstr ""
+"1. Being blockable also has tactical advantages: it may be a persuasive "
+"response to website maintainers who feel threatened by Tor."
+
+#: https//support.torproject.org/misc/hide-exits/
+#: (content/misc/hide-exits/contents+en.lrquestion.description)
+msgid ""
+"Giving them the option may inspire them to stop and think about whether they"
+" really want to eliminate private access to their system, and if not, what "
+"other options they might have."
+msgstr ""
+"Giving them the option may inspire them to stop and think about whether they"
+" really want to eliminate private access to their system, and if not, what "
+"other options they might have."
+
+#: https//support.torproject.org/misc/hide-exits/
+#: (content/misc/hide-exits/contents+en.lrquestion.description)
+msgid ""
+"The time they might otherwise have spent blocking Tor, they may instead "
+"spend rethinking their overall approach to privacy and anonymity."
+msgstr ""
+"The time they might otherwise have spent blocking Tor, they may instead "
+"spend rethinking their overall approach to privacy and anonymity."
+
#: https//support.torproject.org/misc/menu/
#: (content/misc/menu/contents+en.lrquestion.description)
msgid "About"
@@ -11821,67 +13104,25 @@ msgstr "### How to verify your nickname"
#: https//support.torproject.org/get-in-touch/why-i-cant-join-tor-channels/
#: (content/get-in-touch/why-i-cant-join-tor-channels/contents+en.lrquestion.description)
msgid ""
-"Then, to complete the registration and ultimately gain access to the #tor-"
-"project channel, your nickname must be **verified**."
+"After registering your nickname, to gain access to the #tor-project and "
+"other protected channels, your nickname must be **verified**."
msgstr ""
-"Then, to complete the registration and ultimately gain access to the #tor-"
-"project channel, your nickname must be **verified**."
+"After registering your nickname, to gain access to the #tor-project and "
+"other protected channels, your nickname must be **verified**."
#: https//support.torproject.org/get-in-touch/why-i-cant-join-tor-channels/
#: (content/get-in-touch/why-i-cant-join-tor-channels/contents+en.lrquestion.description)
msgid ""
-"1. To verify your nick, open a new browser window and go to "
-"https://webchat.oftc.net/?channels=tor."
+"1. Go to https://services.oftc.net/ and follow the steps in the '*To verify "
+"your account*' section"
msgstr ""
-"1. To verify your nick, open a new browser window and go to "
-"https://webchat.oftc.net/?channels=tor."
+"1. Go to https://services.oftc.net/ and follow the steps in the '*To verify "
+"your account*' section"
#: https//support.torproject.org/get-in-touch/why-i-cant-join-tor-channels/
#: (content/get-in-touch/why-i-cant-join-tor-channels/contents+en.lrquestion.description)
-msgid "2. Log in with your IRC nickname and password."
-msgstr "2. Log in with your IRC nickname and password."
-
-#: https//support.torproject.org/get-in-touch/why-i-cant-join-tor-channels/
-#: (content/get-in-touch/why-i-cant-join-tor-channels/contents+en.lrquestion.description)
-msgid ""
-"3. Look for the word **verify** and log in there. It may appear that nothing"
-" has happened. Look at the top of the page, and there will be a column "
-"called **Account**."
-msgstr ""
-"3. Look for the word **verify** and log in there. It may appear that nothing"
-" has happened. Look at the top of the page, and there will be a column "
-"called **Account**."
-
-#: https//support.torproject.org/get-in-touch/why-i-cant-join-tor-channels/
-#: (content/get-in-touch/why-i-cant-join-tor-channels/contents+en.lrquestion.description)
-msgid "4. Click on **Account**."
-msgstr "4. Click on **Account**."
-
-#: https//support.torproject.org/get-in-touch/why-i-cant-join-tor-channels/
-#: (content/get-in-touch/why-i-cant-join-tor-channels/contents+en.lrquestion.description)
-msgid ""
-"5. Click on the small sentence at the bottom of the square that says: Verify"
-" account."
-msgstr ""
-"5. Click on the small sentence at the bottom of the square that says: Verify"
-" account."
-
-#: https//support.torproject.org/get-in-touch/why-i-cant-join-tor-channels/
-#: (content/get-in-touch/why-i-cant-join-tor-channels/contents+en.lrquestion.description)
-msgid "6. Fill out the Captcha that pops up, and click ok."
-msgstr "6. Fill out the Captcha that pops up, and click ok."
-
-#: https//support.torproject.org/get-in-touch/why-i-cant-join-tor-channels/
-#: (content/get-in-touch/why-i-cant-join-tor-channels/contents+en.lrquestion.description)
-msgid ""
-"7. A tiny message will appear: \"Your NickServ account has been verified.\""
-msgstr ""
-"7. A tiny message will appear: \"Your NickServ account has been verified.\""
-
-#: https//support.torproject.org/get-in-touch/why-i-cant-join-tor-channels/
-#: (content/get-in-touch/why-i-cant-join-tor-channels/contents+en.lrquestion.description)
-msgid "8. Go back to the IRC webpage where you are logged in and type:"
-msgstr "8. Go back to the IRC webpage where you are logged in and type:"
+msgid "2. Go back to the IRC webpage where you are logged in and type:"
+msgstr "2. Go back to the IRC webpage where you are logged in and type:"
#: https//support.torproject.org/get-in-touch/why-i-cant-join-tor-channels/
#: (content/get-in-touch/why-i-cant-join-tor-channels/contents+en.lrquestion.description)
@@ -11890,13 +13131,13 @@ msgstr "`/msg nickserv checkverify`"
#: https//support.torproject.org/get-in-touch/why-i-cant-join-tor-channels/
#: (content/get-in-touch/why-i-cant-join-tor-channels/contents+en.lrquestion.description)
-msgid "9. Click ENTER."
-msgstr "9. Click ENTER."
+msgid "3. Click ENTER."
+msgstr "3. Click ENTER."
#: https//support.torproject.org/get-in-touch/why-i-cant-join-tor-channels/
#: (content/get-in-touch/why-i-cant-join-tor-channels/contents+en.lrquestion.description)
-msgid "10. If all is well, you will receive a message that says:"
-msgstr "10. If all is well, you will receive a message that says:"
+msgid "4. If all is well, you will receive a message that says:"
+msgstr "4. If all is well, you will receive a message that says:"
#: https//support.torproject.org/get-in-touch/why-i-cant-join-tor-channels/
#: (content/get-in-touch/why-i-cant-join-tor-channels/contents+en.lrquestion.description)
@@ -12059,21 +13300,29 @@ msgstr "# apt install apt-transport-https"
#: https//support.torproject.org/apt/tor-deb-repo/
#: (content/apt/apt-1/contents+en.lrquestion.description)
msgid ""
-"#### 2. Add the following entries to `/etc/apt/sources.list` or a new file "
-"in `/etc/apt/sources.list.d/`"
+"#### 2. Create a new file in `/etc/apt/sources.list.d/` named `tor.list`. "
+"Add the following entries:"
msgstr ""
-"#### 2. Add the following entries to `/etc/apt/sources.list` or a new file "
-"in `/etc/apt/sources.list.d/`"
+"#### 2. Create a new file in `/etc/apt/sources.list.d/` named `tor.list`. "
+"Add the following entries:"
#: https//support.torproject.org/apt/tor-deb-repo/
#: (content/apt/apt-1/contents+en.lrquestion.description)
-msgid "deb https://deb.torproject.org/torproject.org <DISTRIBUTION> main"
-msgstr "deb https://deb.torproject.org/torproject.org <DISTRIBUTION> main"
+msgid ""
+"deb [signed-by=/usr/share/keyrings/tor-archive-keyring.gpg] "
+"https://deb.torproject.org/torproject.org <DISTRIBUTION> main"
+msgstr ""
+"deb [signed-by=/usr/share/keyrings/tor-archive-keyring.gpg] "
+"https://deb.torproject.org/torproject.org <DISTRIBUTION> main"
#: https//support.torproject.org/apt/tor-deb-repo/
#: (content/apt/apt-1/contents+en.lrquestion.description)
-msgid "deb-src https://deb.torproject.org/torproject.org <DISTRIBUTION> main"
-msgstr "deb-src https://deb.torproject.org/torproject.org <DISTRIBUTION> main"
+msgid ""
+"deb-src [signed-by=/usr/share/keyrings/tor-archive-keyring.gpg] "
+"https://deb.torproject.org/torproject.org <DISTRIBUTION> main"
+msgstr ""
+"deb-src [signed-by=/usr/share/keyrings/tor-archive-keyring.gpg] "
+"https://deb.torproject.org/torproject.org <DISTRIBUTION> main"
#: https//support.torproject.org/apt/tor-deb-repo/
#: (content/apt/apt-1/contents+en.lrquestion.description)
@@ -12089,19 +13338,23 @@ msgstr ""
#: https//support.torproject.org/apt/tor-deb-repo/
#: (content/apt/apt-1/contents+en.lrquestion.description)
msgid ""
-"deb https://deb.torproject.org/torproject.org tor-"
+"deb [signed-by=/usr/share/keyrings/tor-archive-keyring.gpg] "
+"https://deb.torproject.org/torproject.org tor-"
"experimental-0.4.6.x-<DISTRIBUTION> main"
msgstr ""
-"deb https://deb.torproject.org/torproject.org tor-"
+"deb [signed-by=/usr/share/keyrings/tor-archive-keyring.gpg] "
+"https://deb.torproject.org/torproject.org tor-"
"experimental-0.4.6.x-<DISTRIBUTION> main"
#: https//support.torproject.org/apt/tor-deb-repo/
#: (content/apt/apt-1/contents+en.lrquestion.description)
msgid ""
-"deb-src https://deb.torproject.org/torproject.org tor-"
+"deb-src [signed-by=/usr/share/keyrings/tor-archive-keyring.gpg] "
+"https://deb.torproject.org/torproject.org tor-"
"experimental-0.4.6.x-<DISTRIBUTION> main"
msgstr ""
-"deb-src https://deb.torproject.org/torproject.org tor-"
+"deb-src [signed-by=/usr/share/keyrings/tor-archive-keyring.gpg] "
+"https://deb.torproject.org/torproject.org tor-"
"experimental-0.4.6.x-<DISTRIBUTION> main"
#: https//support.torproject.org/apt/tor-deb-repo/
@@ -12112,20 +13365,24 @@ msgstr "Or nightly builds:"
#: https//support.torproject.org/apt/tor-deb-repo/
#: (content/apt/apt-1/contents+en.lrquestion.description)
msgid ""
-"deb https://deb.torproject.org/torproject.org tor-nightly-"
-"master-<DISTRIBUTION> main"
+"deb [signed-by=/usr/share/keyrings/tor-archive-keyring.gpg] "
+"https://deb.torproject.org/torproject.org tor-nightly-master-<DISTRIBUTION> "
+"main"
msgstr ""
-"deb https://deb.torproject.org/torproject.org tor-nightly-"
-"master-<DISTRIBUTION> main"
+"deb [signed-by=/usr/share/keyrings/tor-archive-keyring.gpg] "
+"https://deb.torproject.org/torproject.org tor-nightly-master-<DISTRIBUTION> "
+"main"
#: https//support.torproject.org/apt/tor-deb-repo/
#: (content/apt/apt-1/contents+en.lrquestion.description)
msgid ""
-"deb-src https://deb.torproject.org/torproject.org tor-nightly-"
-"master-<DISTRIBUTION> main"
+"deb-src [signed-by=/usr/share/keyrings/tor-archive-keyring.gpg] "
+"https://deb.torproject.org/torproject.org tor-nightly-master-<DISTRIBUTION> "
+"main"
msgstr ""
-"deb-src https://deb.torproject.org/torproject.org tor-nightly-"
-"master-<DISTRIBUTION> main"
+"deb-src [signed-by=/usr/share/keyrings/tor-archive-keyring.gpg] "
+"https://deb.torproject.org/torproject.org tor-nightly-master-<DISTRIBUTION> "
+"main"
#: https//support.torproject.org/apt/tor-deb-repo/
#: (content/apt/apt-1/contents+en.lrquestion.description)
@@ -12148,16 +13405,20 @@ msgstr "**Note:** Ubuntu Focal dropped support for 32-bit, so instead use:"
#: https//support.torproject.org/apt/tor-deb-repo/
#: (content/apt/apt-1/contents+en.lrquestion.description)
msgid ""
-"deb [arch=amd64] https://deb.torproject.org/torproject.org focal main"
+"deb [arch=amd64 signed-by=/usr/share/keyrings/tor-archive-keyring.gpg] "
+"https://deb.torproject.org/torproject.org focal main"
msgstr ""
-"deb [arch=amd64] https://deb.torproject.org/torproject.org focal main"
+"deb [arch=amd64 signed-by=/usr/share/keyrings/tor-archive-keyring.gpg] "
+"https://deb.torproject.org/torproject.org focal main"
#: https//support.torproject.org/apt/tor-deb-repo/
#: (content/apt/apt-1/contents+en.lrquestion.description)
msgid ""
-"deb-src [arch=amd64] https://deb.torproject.org/torproject.org focal main"
+"deb-src [arch=amd64 signed-by=/usr/share/keyrings/tor-archive-keyring.gpg] "
+"https://deb.torproject.org/torproject.org focal main"
msgstr ""
-"deb-src [arch=amd64] https://deb.torproject.org/torproject.org focal main"
+"deb-src [arch=amd64 signed-by=/usr/share/keyrings/tor-archive-keyring.gpg] "
+"https://deb.torproject.org/torproject.org focal main"
#: https//support.torproject.org/apt/tor-deb-repo/
#: (content/apt/apt-1/contents+en.lrquestion.description)
@@ -12179,28 +13440,23 @@ msgstr ""
#: (content/apt/apt-1/contents+en.lrquestion.description)
msgid ""
"#### 3. Then add the gpg key used to sign the packages by running the "
-"following commands at your command prompt"
+"following command at your command prompt:"
msgstr ""
"#### 3. Then add the gpg key used to sign the packages by running the "
-"following commands at your command prompt"
+"following command at your command prompt:"
#: https//support.torproject.org/apt/tor-deb-repo/
#: (content/apt/apt-1/contents+en.lrquestion.description)
msgid ""
-"# wget -qO- "
+"# wget -O- "
"https://deb.torproject.org/torproject.org/A3C4F0F979CAA22CDBA8F512EE8CBC9E886DDD89.asc"
-" | gpg --import"
+" | gpg --dearmor | tee /usr/share/keyrings/tor-archive-keyring.gpg "
+">/dev/null"
msgstr ""
-"# wget -qO- "
+"# wget -O- "
"https://deb.torproject.org/torproject.org/A3C4F0F979CAA22CDBA8F512EE8CBC9E886DDD89.asc"
-" | gpg --import"
-
-#: https//support.torproject.org/apt/tor-deb-repo/
-#: (content/apt/apt-1/contents+en.lrquestion.description)
-msgid ""
-"# gpg --export A3C4F0F979CAA22CDBA8F512EE8CBC9E886DDD89 | apt-key add -"
-msgstr ""
-"# gpg --export A3C4F0F979CAA22CDBA8F512EE8CBC9E886DDD89 | apt-key add -"
+" | gpg --dearmor | tee /usr/share/keyrings/tor-archive-keyring.gpg "
+">/dev/null"
#: https//support.torproject.org/apt/tor-deb-repo/
#: (content/apt/apt-1/contents+en.lrquestion.description)
@@ -14199,6 +15455,99 @@ msgstr ""
"No, because that user updates their list of relays as often as a user that "
"doesn't change IP address over the day."
+#: https//support.torproject.org/alternate-designs/block-websites/
+#: (content/alternate-designs/block-websites/contents+en.lrquestion.title)
+msgid "Exit policies should be able to block websites, not just IP addresses."
+msgstr ""
+"Exit policies should be able to block websites, not just IP addresses."
+
+#: https//support.torproject.org/alternate-designs/block-websites/
+#: (content/alternate-designs/block-websites/contents+en.lrquestion.description)
+msgid ""
+"It would be nice to let relay operators say things like `reject "
+"www.slashdot.org` in their exit policies, rather than requiring them to "
+"learn all the IP address space that could be covered by the site (and then "
+"also blocking other sites at those IP addresses)."
+msgstr ""
+"It would be nice to let relay operators say things like `reject "
+"www.slashdot.org` in their exit policies, rather than requiring them to "
+"learn all the IP address space that could be covered by the site (and then "
+"also blocking other sites at those IP addresses)."
+
+#: https//support.torproject.org/alternate-designs/block-websites/
+#: (content/alternate-designs/block-websites/contents+en.lrquestion.description)
+msgid "There are two problems, though."
+msgstr "There are two problems, though."
+
+#: https//support.torproject.org/alternate-designs/block-websites/
+#: (content/alternate-designs/block-websites/contents+en.lrquestion.description)
+msgid "First, users could still get around these blocks."
+msgstr "First, users could still get around these blocks."
+
+#: https//support.torproject.org/alternate-designs/block-websites/
+#: (content/alternate-designs/block-websites/contents+en.lrquestion.description)
+msgid ""
+"For example, they could request the IP address rather than the hostname when"
+" they exit from the Tor network."
+msgstr ""
+"For example, they could request the IP address rather than the hostname when"
+" they exit from the Tor network."
+
+#: https//support.torproject.org/alternate-designs/block-websites/
+#: (content/alternate-designs/block-websites/contents+en.lrquestion.description)
+msgid ""
+"This means operators would still need to learn all the IP addresses for the "
+"destinations in question."
+msgstr ""
+"This means operators would still need to learn all the IP addresses for the "
+"destinations in question."
+
+#: https//support.torproject.org/alternate-designs/block-websites/
+#: (content/alternate-designs/block-websites/contents+en.lrquestion.description)
+msgid ""
+"The second problem is that it would allow remote attackers to censor "
+"arbitrary sites."
+msgstr ""
+"The second problem is that it would allow remote attackers to censor "
+"arbitrary sites."
+
+#: https//support.torproject.org/alternate-designs/block-websites/
+#: (content/alternate-designs/block-websites/contents+en.lrquestion.description)
+msgid ""
+"For example, if a Tor operator blocks www1.slashdot.org, and then some "
+"attacker poisons the Tor relay's DNS or otherwise changes that hostname to "
+"resolve to the IP address for a major news site, then suddenly that Tor "
+"relay is blocking the news site."
+msgstr ""
+"For example, if a Tor operator blocks www1.slashdot.org, and then some "
+"attacker poisons the Tor relay's DNS or otherwise changes that hostname to "
+"resolve to the IP address for a major news site, then suddenly that Tor "
+"relay is blocking the news site."
+
+#: https//support.torproject.org/alternate-designs/let-the-network-pick-the-path/
+#: (content/alternate-designs/let-the-network-pick-the-path/contents+en.lrquestion.title)
+msgid "You should let the network pick the path, not the client."
+msgstr "You should let the network pick the path, not the client."
+
+#: https//support.torproject.org/alternate-designs/let-the-network-pick-the-path/
+#: (content/alternate-designs/let-the-network-pick-the-path/contents+en.lrquestion.description)
+msgid "No, you cannot trust the network to pick the path."
+msgstr "No, you cannot trust the network to pick the path."
+
+#: https//support.torproject.org/alternate-designs/let-the-network-pick-the-path/
+#: (content/alternate-designs/let-the-network-pick-the-path/contents+en.lrquestion.description)
+msgid "Malicious relays could route you through their colluding friends."
+msgstr "Malicious relays could route you through their colluding friends."
+
+#: https//support.torproject.org/alternate-designs/let-the-network-pick-the-path/
+#: (content/alternate-designs/let-the-network-pick-the-path/contents+en.lrquestion.description)
+msgid ""
+"This would give an adversary the ability to watch all of your traffic end to"
+" end."
+msgstr ""
+"This would give an adversary the ability to watch all of your traffic end to"
+" end."
+
#: lego/templates/banner.html:3 lego/templates/banner.html:5
#: templates/banner.html:3 templates/banner.html:5
msgid "Close banner"
@@ -14229,8 +15578,8 @@ msgid "DONATE NOW"
msgstr "DONATE NOW"
#: lego/templates/footer.html:13 lego/templates/footer.html:22
-#: lego/templates/navbar.html:83 templates/footer.html:13
-#: templates/footer.html:22 templates/navbar.html:83
+#: lego/templates/navbar.html:95 templates/footer.html:13
+#: templates/footer.html:22 templates/navbar.html:95
msgid "Download Tor Browser"
msgstr "Download Tor Browser"
More information about the tor-commits
mailing list