Skip to content
GitLab
Projects
Groups
Snippets
/
Help
Help
Support
Community forum
Keyboard shortcuts
?
Submit feedback
Contribute to GitLab
Sign in / Register
Toggle navigation
Menu
Open sidebar
tails
tails
Commits
d9a26d28
Commit
d9a26d28
authored
Nov 20, 2011
by
Tails developers
Browse files
Update PO and fix translations
parent
4d89fc67
Changes
56
Hide whitespace changes
Inline
Side-by-side
wiki/src/doc/about/anonymity.de.po
View file @
d9a26d28
...
...
@@ -7,7 +7,7 @@
msgid ""
msgstr ""
"Project-Id-Version: PACKAGE VERSION\n"
"POT-Creation-Date: 2011-
06-18 22:40
+0
3
00\n"
"POT-Creation-Date: 2011-
11-19 16:05
+0
1
00\n"
"PO-Revision-Date: YEAR-MO-DA HO:MI+ZONE\n"
"Last-Translator: FULL NAME <EMAIL@ADDRESS>\n"
"Language-Team: LANGUAGE <LL@li.org>\n"
...
...
@@ -31,27 +31,26 @@ msgid ""
"As you are probably aware of, we currently find ourselves in a state of "
"steady decline of our freedoms and privacy, with increasing levels of mass "
"surveillance and repression all over the world (see [this report from "
"Privacy "
"
International](http://www.privacyinternational.org/article.shtml?cmd
%5B347%5D=x-347-559597))."
"Privacy
International](http://www.privacyinternational.org/article.shtml?cmd
"
"%5B347%5D=x-347-559597))."
msgstr ""
#. type: Plain text
msgid ""
"Without taking any precautions, your Internet service provider, the state, "
"the police and global surveillance systems like "
"[ECHELON](http://en.wikipedia.org/wiki/ECHELON) (which is _not_ a conspiracy "
"theory; see [this report from the European "
"Parliament](http://www.fas.org/irp/program/process/rapport_echelon_en.pdf)) "
"can record what you do online: what you read, what you write and who you "
"communicate with."
"Without taking any precautions, your Internet service provider, the State, "
"the police and global surveillance systems like [ECHELON](http://en."
"wikipedia.org/wiki/ECHELON) (which is _not_ a conspiracy theory; see [this "
"report from the European Parliament](http://www.fas.org/irp/program/process/"
"rapport_echelon_en.pdf)) can record what you do online: what you read, what "
"you write and who you communicate with."
msgstr ""
#. type: Plain text
msgid ""
"This is possible since all messages sent over the Internet contain the [IP "
"addresses](http://en.wikipedia.org/wiki/Ip_address) of both the sender and "
"receiver, much like an ordinary mail sent through the postal system contain "
"addresses of both sender and receiver for two-way communication. IP "
"receiver, much like an ordinary mail sent through the postal system contain
s
"
"addresses of both sender and receiver for two-way
s
communication. IP "
"addresses can easily be traced back to the physical location of the "
"computers and their owners, and from that ultimately back to you."
msgstr ""
...
...
@@ -75,98 +74,7 @@ msgstr ""
#. type: Plain text
#, no-wrap
msgid ""
"**FIXME**: semi-duplicated section: this and the [[about]] page are\n"
"duplicated information. Merge or inline the [[about]] page (whithout "
"what's\n"
"next) here?\n"
msgstr ""
#. type: Plain text
msgid ""
"First of all, true anonymity is impossible. Given enough resources an "
"attacker will get you. What one can do is to make the cost of doing that so "
"high that it becomes infeasible."
msgstr ""
#. type: Plain text
msgid ""
"Tails tries to do this by sending all your Internet traffic through the "
"[Tor™ network](https://www.torproject.org/) which makes your Internet "
"traffic very hard to trace. If someone tries to trace you when you are using "
"Tails, the trail will stop somewhere in Tor network with the IP addresses of "
"some of its participants, not your. Similarly, if someone tries to see "
"destination of your traffic, they will only reach as far as some computer in "
"the Tor network. In fact, you will be the only one knowing exactly what is "
"going on – not even the computers in the Tor network that you send your "
"traffic through will know the whole picture!"
msgstr ""
#. type: Plain text
msgid ""
"As at least a rudimentary understanding of Tor currently is essential for "
"using it securely (and knowing its limits) we strongly recommend reading the "
"[Tor overview](https://www.torproject.org/overview.html) and [Understanding "
"and Using Tor – An Introduction for the "
"Layman](https://wiki.torproject.org/noreply/TheOnionRouter/TorALaymansGuide). "
"At the very least you should read the following paragraphs about common "
"misconceptions about the service offered by the Tor software."
msgstr ""
#. type: Plain text
#, no-wrap
msgid "**FIXME**: start of session duplicated with warning\n"
msgstr ""
#. type: Plain text
msgid ""
"By relaying your Internet traffic through the Tor network (which Tails does "
"per default) your communications should _only_ be considered to be "
"untraceable back to the computer you use, not encrypted or in any other way "
"unreadable by others. While the traffic _is_ encrypted when it leaves your "
"computer and when you get back your responses, it will not necessarily be so "
"when sent between the Tor network and your destination (this is unavoidable "
"for technical reasons). This means that an eavesdropper at some later point "
"will be able see your traffic without Tor's encryption unless you take "
"further precautions (described [later on](#ff)), but will not be able to "
"link it back to your computer."
msgstr ""
#. type: Plain text
msgid ""
"As such, if you are sending or receiving sensitive data whose disclosure "
"would be damaging in itself even if it is untraceable, you need to use "
"end-to-end encryption to hide the meaning of your data to everyone except "
"the recipient. Examples of such sensitive information that you need to "
"protect in this way are your real identity or other personal information "
"linkable to you, login details and passwords, bank account or financial "
"details, anything illegal or political, and secrets in general."
msgstr ""
#. type: Plain text
msgid ""
"There are several tools bundled with Tails offering end-to-end encryption "
"for various applications: [GnuPG](http://www.gnupg.org/) provides with "
"encryption for email, [OTR](http://www.cypherpunks.ca/otr) is for instant "
"messaging (MSN, ICQ, IRC, etc.) among others."
msgstr ""
#. type: Plain text
msgid ""
"Also, bear in mind that while web browsing on sites for whom the addresses "
"begin with `http://` the connections are not encrypted (see [more about "
"this](#ff)). However, web sites whose addresses start with `https://` "
"(notice the additional \"**s**\") use encrypted connections and are thus "
"**s**ecure. FIXME: tell a bit about certificates and X.509 limits. Many web "
"browsers, including Firefox, also display a lock or a similar symbol in the "
"address field or status bar indicating that the connection is secure."
msgstr ""
#. type: Plain text
msgid ""
"Notice that not all web sites offer this feature, but most that in any way "
"handle your data (webmail logins, bank account logins etc.) usually "
"do. Keep your eyes open!"
msgid "**FIXME**: This still needs to be rescued somewhere:\n"
msgstr ""
#. type: Plain text
...
...
@@ -180,19 +88,9 @@ msgid ""
"At last, some applications have features and services that may compromise "
"the anonymity offered by the Tor network. All modern web browsers, such as "
"Firefox, support [JavaScript](http://en.wikipedia.org/wiki/Javascript), "
"[Adobe Flash](http://en.wikipedia.org/wiki/Adobe_flash), "
"[Cookies](http://en.wikipedia.org/wiki/HTTP_cookie) and other services which "
"have been shown to be able to defeat the anonymity provided by the Tor "
"network."
msgstr ""
#. type: Plain text
msgid ""
"For instance, a web page using JavaScript can make your web browser send "
"your real IP address to the web server hosting the web page which possibly "
"can disclose it not only to the web server's owner but also eavesdroppers "
"that happen to fetch the message when it is sent between the Tor network and "
"the web server."
"[Adobe Flash](http://en.wikipedia.org/wiki/Adobe_flash), [Cookies](http://en."
"wikipedia.org/wiki/HTTP_cookie) and other services which have been shown to "
"be able to defeat the anonymity provided by the Tor network."
msgstr ""
#. type: Plain text
...
...
@@ -200,11 +98,6 @@ msgid ""
"When running Iceweasel (Firefox) in Tails all such features are handled by "
"an extension called [Torbutton](https://www.torproject.org/torbutton/) which "
"does all sorts of things to prevent the above type of attacks. But that "
"comes at a price – since this will disable some functionality,
certain
sites "
"comes at a price – since this will disable some functionality
s
,
some
sites "
"might not work as intended."
msgstr ""
#. type: Plain text
#, no-wrap
msgid "**FIXME**: end of session duplicated with warning\n"
msgstr ""
wiki/src/doc/about/anonymity.es.po
View file @
d9a26d28
...
...
@@ -7,7 +7,7 @@
msgid ""
msgstr ""
"Project-Id-Version: PACKAGE VERSION\n"
"POT-Creation-Date: 2011-
06-18 22:40
+0
3
00\n"
"POT-Creation-Date: 2011-
11-19 16:05
+0
1
00\n"
"PO-Revision-Date: YEAR-MO-DA HO:MI+ZONE\n"
"Last-Translator: FULL NAME <EMAIL@ADDRESS>\n"
"Language-Team: LANGUAGE <LL@li.org>\n"
...
...
@@ -31,27 +31,26 @@ msgid ""
"As you are probably aware of, we currently find ourselves in a state of "
"steady decline of our freedoms and privacy, with increasing levels of mass "
"surveillance and repression all over the world (see [this report from "
"Privacy "
"
International](http://www.privacyinternational.org/article.shtml?cmd
%5B347%5D=x-347-559597))."
"Privacy
International](http://www.privacyinternational.org/article.shtml?cmd
"
"%5B347%5D=x-347-559597))."
msgstr ""
#. type: Plain text
msgid ""
"Without taking any precautions, your Internet service provider, the state, "
"the police and global surveillance systems like "
"[ECHELON](http://en.wikipedia.org/wiki/ECHELON) (which is _not_ a conspiracy "
"theory; see [this report from the European "
"Parliament](http://www.fas.org/irp/program/process/rapport_echelon_en.pdf)) "
"can record what you do online: what you read, what you write and who you "
"communicate with."
"Without taking any precautions, your Internet service provider, the State, "
"the police and global surveillance systems like [ECHELON](http://en."
"wikipedia.org/wiki/ECHELON) (which is _not_ a conspiracy theory; see [this "
"report from the European Parliament](http://www.fas.org/irp/program/process/"
"rapport_echelon_en.pdf)) can record what you do online: what you read, what "
"you write and who you communicate with."
msgstr ""
#. type: Plain text
msgid ""
"This is possible since all messages sent over the Internet contain the [IP "
"addresses](http://en.wikipedia.org/wiki/Ip_address) of both the sender and "
"receiver, much like an ordinary mail sent through the postal system contain "
"addresses of both sender and receiver for two-way communication. IP "
"receiver, much like an ordinary mail sent through the postal system contain
s
"
"addresses of both sender and receiver for two-way
s
communication. IP "
"addresses can easily be traced back to the physical location of the "
"computers and their owners, and from that ultimately back to you."
msgstr ""
...
...
@@ -75,98 +74,7 @@ msgstr ""
#. type: Plain text
#, no-wrap
msgid ""
"**FIXME**: semi-duplicated section: this and the [[about]] page are\n"
"duplicated information. Merge or inline the [[about]] page (whithout "
"what's\n"
"next) here?\n"
msgstr ""
#. type: Plain text
msgid ""
"First of all, true anonymity is impossible. Given enough resources an "
"attacker will get you. What one can do is to make the cost of doing that so "
"high that it becomes infeasible."
msgstr ""
#. type: Plain text
msgid ""
"Tails tries to do this by sending all your Internet traffic through the "
"[Tor™ network](https://www.torproject.org/) which makes your Internet "
"traffic very hard to trace. If someone tries to trace you when you are using "
"Tails, the trail will stop somewhere in Tor network with the IP addresses of "
"some of its participants, not your. Similarly, if someone tries to see "
"destination of your traffic, they will only reach as far as some computer in "
"the Tor network. In fact, you will be the only one knowing exactly what is "
"going on – not even the computers in the Tor network that you send your "
"traffic through will know the whole picture!"
msgstr ""
#. type: Plain text
msgid ""
"As at least a rudimentary understanding of Tor currently is essential for "
"using it securely (and knowing its limits) we strongly recommend reading the "
"[Tor overview](https://www.torproject.org/overview.html) and [Understanding "
"and Using Tor – An Introduction for the "
"Layman](https://wiki.torproject.org/noreply/TheOnionRouter/TorALaymansGuide). "
"At the very least you should read the following paragraphs about common "
"misconceptions about the service offered by the Tor software."
msgstr ""
#. type: Plain text
#, no-wrap
msgid "**FIXME**: start of session duplicated with warning\n"
msgstr ""
#. type: Plain text
msgid ""
"By relaying your Internet traffic through the Tor network (which Tails does "
"per default) your communications should _only_ be considered to be "
"untraceable back to the computer you use, not encrypted or in any other way "
"unreadable by others. While the traffic _is_ encrypted when it leaves your "
"computer and when you get back your responses, it will not necessarily be so "
"when sent between the Tor network and your destination (this is unavoidable "
"for technical reasons). This means that an eavesdropper at some later point "
"will be able see your traffic without Tor's encryption unless you take "
"further precautions (described [later on](#ff)), but will not be able to "
"link it back to your computer."
msgstr ""
#. type: Plain text
msgid ""
"As such, if you are sending or receiving sensitive data whose disclosure "
"would be damaging in itself even if it is untraceable, you need to use "
"end-to-end encryption to hide the meaning of your data to everyone except "
"the recipient. Examples of such sensitive information that you need to "
"protect in this way are your real identity or other personal information "
"linkable to you, login details and passwords, bank account or financial "
"details, anything illegal or political, and secrets in general."
msgstr ""
#. type: Plain text
msgid ""
"There are several tools bundled with Tails offering end-to-end encryption "
"for various applications: [GnuPG](http://www.gnupg.org/) provides with "
"encryption for email, [OTR](http://www.cypherpunks.ca/otr) is for instant "
"messaging (MSN, ICQ, IRC, etc.) among others."
msgstr ""
#. type: Plain text
msgid ""
"Also, bear in mind that while web browsing on sites for whom the addresses "
"begin with `http://` the connections are not encrypted (see [more about "
"this](#ff)). However, web sites whose addresses start with `https://` "
"(notice the additional \"**s**\") use encrypted connections and are thus "
"**s**ecure. FIXME: tell a bit about certificates and X.509 limits. Many web "
"browsers, including Firefox, also display a lock or a similar symbol in the "
"address field or status bar indicating that the connection is secure."
msgstr ""
#. type: Plain text
msgid ""
"Notice that not all web sites offer this feature, but most that in any way "
"handle your data (webmail logins, bank account logins etc.) usually "
"do. Keep your eyes open!"
msgid "**FIXME**: This still needs to be rescued somewhere:\n"
msgstr ""
#. type: Plain text
...
...
@@ -180,19 +88,9 @@ msgid ""
"At last, some applications have features and services that may compromise "
"the anonymity offered by the Tor network. All modern web browsers, such as "
"Firefox, support [JavaScript](http://en.wikipedia.org/wiki/Javascript), "
"[Adobe Flash](http://en.wikipedia.org/wiki/Adobe_flash), "
"[Cookies](http://en.wikipedia.org/wiki/HTTP_cookie) and other services which "
"have been shown to be able to defeat the anonymity provided by the Tor "
"network."
msgstr ""
#. type: Plain text
msgid ""
"For instance, a web page using JavaScript can make your web browser send "
"your real IP address to the web server hosting the web page which possibly "
"can disclose it not only to the web server's owner but also eavesdroppers "
"that happen to fetch the message when it is sent between the Tor network and "
"the web server."
"[Adobe Flash](http://en.wikipedia.org/wiki/Adobe_flash), [Cookies](http://en."
"wikipedia.org/wiki/HTTP_cookie) and other services which have been shown to "
"be able to defeat the anonymity provided by the Tor network."
msgstr ""
#. type: Plain text
...
...
@@ -200,11 +98,6 @@ msgid ""
"When running Iceweasel (Firefox) in Tails all such features are handled by "
"an extension called [Torbutton](https://www.torproject.org/torbutton/) which "
"does all sorts of things to prevent the above type of attacks. But that "
"comes at a price – since this will disable some functionality,
certain
sites "
"comes at a price – since this will disable some functionality
s
,
some
sites "
"might not work as intended."
msgstr ""
#. type: Plain text
#, no-wrap
msgid "**FIXME**: end of session duplicated with warning\n"
msgstr ""
wiki/src/doc/about/anonymity.fr.po
View file @
d9a26d28
...
...
@@ -7,7 +7,7 @@
msgid ""
msgstr ""
"Project-Id-Version: PACKAGE VERSION\n"
"POT-Creation-Date: 2011-
06-18 22:40
+0
3
00\n"
"POT-Creation-Date: 2011-
11-19 16:05
+0
1
00\n"
"PO-Revision-Date: YEAR-MO-DA HO:MI+ZONE\n"
"Last-Translator: FULL NAME <EMAIL@ADDRESS>\n"
"Language-Team: LANGUAGE <LL@li.org>\n"
...
...
@@ -31,27 +31,26 @@ msgid ""
"As you are probably aware of, we currently find ourselves in a state of "
"steady decline of our freedoms and privacy, with increasing levels of mass "
"surveillance and repression all over the world (see [this report from "
"Privacy "
"
International](http://www.privacyinternational.org/article.shtml?cmd
%5B347%5D=x-347-559597))."
"Privacy
International](http://www.privacyinternational.org/article.shtml?cmd
"
"%5B347%5D=x-347-559597))."
msgstr ""
#. type: Plain text
msgid ""
"Without taking any precautions, your Internet service provider, the state, "
"the police and global surveillance systems like "
"[ECHELON](http://en.wikipedia.org/wiki/ECHELON) (which is _not_ a conspiracy "
"theory; see [this report from the European "
"Parliament](http://www.fas.org/irp/program/process/rapport_echelon_en.pdf)) "
"can record what you do online: what you read, what you write and who you "
"communicate with."
"Without taking any precautions, your Internet service provider, the State, "
"the police and global surveillance systems like [ECHELON](http://en."
"wikipedia.org/wiki/ECHELON) (which is _not_ a conspiracy theory; see [this "
"report from the European Parliament](http://www.fas.org/irp/program/process/"
"rapport_echelon_en.pdf)) can record what you do online: what you read, what "
"you write and who you communicate with."
msgstr ""
#. type: Plain text
msgid ""
"This is possible since all messages sent over the Internet contain the [IP "
"addresses](http://en.wikipedia.org/wiki/Ip_address) of both the sender and "
"receiver, much like an ordinary mail sent through the postal system contain "
"addresses of both sender and receiver for two-way communication. IP "
"receiver, much like an ordinary mail sent through the postal system contain
s
"
"addresses of both sender and receiver for two-way
s
communication. IP "
"addresses can easily be traced back to the physical location of the "
"computers and their owners, and from that ultimately back to you."
msgstr ""
...
...
@@ -75,98 +74,7 @@ msgstr ""
#. type: Plain text
#, no-wrap
msgid ""
"**FIXME**: semi-duplicated section: this and the [[about]] page are\n"
"duplicated information. Merge or inline the [[about]] page (whithout "
"what's\n"
"next) here?\n"
msgstr ""
#. type: Plain text
msgid ""
"First of all, true anonymity is impossible. Given enough resources an "
"attacker will get you. What one can do is to make the cost of doing that so "
"high that it becomes infeasible."
msgstr ""
#. type: Plain text
msgid ""
"Tails tries to do this by sending all your Internet traffic through the "
"[Tor™ network](https://www.torproject.org/) which makes your Internet "
"traffic very hard to trace. If someone tries to trace you when you are using "
"Tails, the trail will stop somewhere in Tor network with the IP addresses of "
"some of its participants, not your. Similarly, if someone tries to see "
"destination of your traffic, they will only reach as far as some computer in "
"the Tor network. In fact, you will be the only one knowing exactly what is "
"going on – not even the computers in the Tor network that you send your "
"traffic through will know the whole picture!"
msgstr ""
#. type: Plain text
msgid ""
"As at least a rudimentary understanding of Tor currently is essential for "
"using it securely (and knowing its limits) we strongly recommend reading the "
"[Tor overview](https://www.torproject.org/overview.html) and [Understanding "
"and Using Tor – An Introduction for the "
"Layman](https://wiki.torproject.org/noreply/TheOnionRouter/TorALaymansGuide). "
"At the very least you should read the following paragraphs about common "
"misconceptions about the service offered by the Tor software."
msgstr ""
#. type: Plain text
#, no-wrap
msgid "**FIXME**: start of session duplicated with warning\n"
msgstr ""
#. type: Plain text
msgid ""
"By relaying your Internet traffic through the Tor network (which Tails does "
"per default) your communications should _only_ be considered to be "
"untraceable back to the computer you use, not encrypted or in any other way "
"unreadable by others. While the traffic _is_ encrypted when it leaves your "
"computer and when you get back your responses, it will not necessarily be so "
"when sent between the Tor network and your destination (this is unavoidable "
"for technical reasons). This means that an eavesdropper at some later point "
"will be able see your traffic without Tor's encryption unless you take "
"further precautions (described [later on](#ff)), but will not be able to "
"link it back to your computer."
msgstr ""
#. type: Plain text
msgid ""
"As such, if you are sending or receiving sensitive data whose disclosure "
"would be damaging in itself even if it is untraceable, you need to use "
"end-to-end encryption to hide the meaning of your data to everyone except "
"the recipient. Examples of such sensitive information that you need to "
"protect in this way are your real identity or other personal information "
"linkable to you, login details and passwords, bank account or financial "
"details, anything illegal or political, and secrets in general."
msgstr ""
#. type: Plain text
msgid ""
"There are several tools bundled with Tails offering end-to-end encryption "
"for various applications: [GnuPG](http://www.gnupg.org/) provides with "
"encryption for email, [OTR](http://www.cypherpunks.ca/otr) is for instant "
"messaging (MSN, ICQ, IRC, etc.) among others."
msgstr ""
#. type: Plain text
msgid ""
"Also, bear in mind that while web browsing on sites for whom the addresses "
"begin with `http://` the connections are not encrypted (see [more about "
"this](#ff)). However, web sites whose addresses start with `https://` "
"(notice the additional \"**s**\") use encrypted connections and are thus "
"**s**ecure. FIXME: tell a bit about certificates and X.509 limits. Many web "
"browsers, including Firefox, also display a lock or a similar symbol in the "
"address field or status bar indicating that the connection is secure."
msgstr ""
#. type: Plain text
msgid ""
"Notice that not all web sites offer this feature, but most that in any way "
"handle your data (webmail logins, bank account logins etc.) usually "
"do. Keep your eyes open!"
msgid "**FIXME**: This still needs to be rescued somewhere:\n"
msgstr ""
#. type: Plain text
...
...
@@ -180,19 +88,9 @@ msgid ""
"At last, some applications have features and services that may compromise "
"the anonymity offered by the Tor network. All modern web browsers, such as "
"Firefox, support [JavaScript](http://en.wikipedia.org/wiki/Javascript), "
"[Adobe Flash](http://en.wikipedia.org/wiki/Adobe_flash), "
"[Cookies](http://en.wikipedia.org/wiki/HTTP_cookie) and other services which "
"have been shown to be able to defeat the anonymity provided by the Tor "
"network."
msgstr ""
#. type: Plain text
msgid ""
"For instance, a web page using JavaScript can make your web browser send "
"your real IP address to the web server hosting the web page which possibly "
"can disclose it not only to the web server's owner but also eavesdroppers "
"that happen to fetch the message when it is sent between the Tor network and "
"the web server."
"[Adobe Flash](http://en.wikipedia.org/wiki/Adobe_flash), [Cookies](http://en."
"wikipedia.org/wiki/HTTP_cookie) and other services which have been shown to "
"be able to defeat the anonymity provided by the Tor network."
msgstr ""
#. type: Plain text
...
...
@@ -200,11 +98,6 @@ msgid ""
"When running Iceweasel (Firefox) in Tails all such features are handled by "
"an extension called [Torbutton](https://www.torproject.org/torbutton/) which "
"does all sorts of things to prevent the above type of attacks. But that "
"comes at a price – since this will disable some functionality,
certain
sites "
"comes at a price – since this will disable some functionality
s
,
some
sites "
"might not work as intended."
msgstr ""
#. type: Plain text
#, no-wrap
msgid "**FIXME**: end of session duplicated with warning\n"
msgstr ""
wiki/src/doc/about/license.de.po
0 → 100644
View file @
d9a26d28
# SOME DESCRIPTIVE TITLE
# Copyright (C) YEAR Free Software Foundation, Inc.
# This file is distributed under the same license as the PACKAGE package.
# FIRST AUTHOR <EMAIL@ADDRESS>, YEAR.
#
#, fuzzy
msgid ""
msgstr ""
"Project-Id-Version: PACKAGE VERSION\n"
"POT-Creation-Date: 2011-11-19 16:05+0100\n"
"PO-Revision-Date: YEAR-MO-DA HO:MI+ZONE\n"
"Last-Translator: FULL NAME <EMAIL@ADDRESS>\n"
"Language-Team: LANGUAGE <LL@li.org>\n"
"Language: \n"
"MIME-Version: 1.0\n"
"Content-Type: text/plain; charset=UTF-8\n"
"Content-Transfer-Encoding: 8bit\n"
#. type: Plain text
#, no-wrap
msgid "[[!meta title=\"License\"]]\n"
msgstr ""
#. type: Plain text
msgid ""
"Tails is [[Free Software|http://www.gnu.org/philosophy/free-sw.html]] "
"released under the GNU/GPL (version 3 or above)."
msgstr ""
#. type: Plain text
msgid ""
"This website uses several images with various copyright, licenses, "
"trademarks and terms of distributions:"
msgstr ""
#. type: Bullet: ' - '
msgid "Debian logo: Copyright (c) 1999 Software in the Public Interest."
msgstr ""
#. type: Plain text
#, no-wrap
msgid ""
" - USB stick icon: [[source|http://www.openclipart.org/detail/29129]]; "
"waived\n"
"of all copyright and related or neighboring rights under the CC0 PD "
"Dedication;\n"
"[[policies|http://www.openclipart.org/policies]].\n"
" - CD icon: [[source|http://thenounproject.com/noun/cd/#icon-No255]]; "
"license:\n"
"attribution; designer: The Noun Project.\n"
" - Onion Logo: registered trademark of The Tor Project, Inc.; the Tails\n"
"project is authorized to use it under certain conditions; licensed under\n"
"Creative Commons Attribution 3.0 United States License.\n"
msgstr ""
wiki/src/doc/about/license.es.po
0 → 100644
View file @
d9a26d28
# SOME DESCRIPTIVE TITLE
# Copyright (C) YEAR Free Software Foundation, Inc.
# This file is distributed under the same license as the PACKAGE package.
# FIRST AUTHOR <EMAIL@ADDRESS>, YEAR.
#
#, fuzzy
msgid ""
msgstr ""
"Project-Id-Version: PACKAGE VERSION\n"
"POT-Creation-Date: 2011-11-19 16:05+0100\n"
"PO-Revision-Date: YEAR-MO-DA HO:MI+ZONE\n"
"Last-Translator: FULL NAME <EMAIL@ADDRESS>\n"
"Language-Team: LANGUAGE <LL@li.org>\n"
"Language: \n"
"MIME-Version: 1.0\n"
"Content-Type: text/plain; charset=UTF-8\n"
"Content-Transfer-Encoding: 8bit\n"
#. type: Plain text
#, no-wrap
msgid "[[!meta title=\"License\"]]\n"
msgstr ""
#. type: Plain text
msgid ""
"Tails is [[Free Software|http://www.gnu.org/philosophy/free-sw.html]] "
"released under the GNU/GPL (version 3 or above)."
msgstr ""
#. type: Plain text
msgid ""
"This website uses several images with various copyright, licenses, "
"trademarks and terms of distributions:"
msgstr ""
#. type: Bullet: ' - '
msgid "Debian logo: Copyright (c) 1999 Software in the Public Interest."
msgstr ""
#. type: Plain text
#, no-wrap
msgid ""
" - USB stick icon: [[source|http://www.openclipart.org/detail/29129]]; "