Jens Kubieziel commited on 2009-01-13 11:18:45
Zeige 1 geänderte Dateien mit 5 Einfügungen und 5 Löschungen.
| ... | ... |
@@ -1,5 +1,5 @@ |
| 1 | 1 |
## translation metadata |
| 2 |
-# Based-On-Revision: 16742 |
|
| 2 |
+# Based-On-Revision: 17898 |
|
| 3 | 3 |
# Last-Translator: jens@kubieziel.de, peter@palfrader.org |
| 4 | 4 |
|
| 5 | 5 |
#include "head.wmi" TITLE="Tor: Mithelfen" CHARSET="UTF-8" |
| ... | ... |
@@ -159,7 +159,7 @@ will listen. |
| 159 | 159 |
<br /> |
| 160 | 160 |
In addition, these same statistics can be gathered about the traffic |
| 161 | 161 |
through a node. Events can be added to the <a |
| 162 |
-href="https://www.torproject.org/svn/torctl/doc/howto.txt">Tor Control |
|
| 162 |
+href="https://svn.torproject.org/svn/torctl/trunk/doc/howto.txt">Tor Control |
|
| 163 | 163 |
Protocol</a> to |
| 164 | 164 |
report if a circuit extend attempt through the node succeeds or fails, and |
| 165 | 165 |
passive statistics can be gathered on both bandwidth and reliability |
| ... | ... |
@@ -386,7 +386,7 @@ href="<svnsandbox>doc/spec/proposals/131-verify-tor-usage.txt">proposal |
| 386 | 386 |
The <a href="http://p56soo2ibjkx23xo.onion/">exitlist software</a> |
| 387 | 387 |
is written by our fabulous anonymous |
| 388 | 388 |
contributer Tup. It's a DNS server written in Haskell that supports part of our <a |
| 389 |
-href="https://www.torproject.org/svn/trunk/doc/contrib/torel-design.txt">exitlist |
|
| 389 |
+href="https://<svnsandbox>doc/contrib/torel-design.txt">exitlist |
|
| 390 | 390 |
design document</a>. Currently, it is functional and it is used by |
| 391 | 391 |
check.torproject.org and other users. The issues that are outstanding |
| 392 | 392 |
are mostly aesthetic. This wonderful service could use a much better |
| ... | ... |
@@ -660,7 +660,7 @@ the core of the Blossom effort. |
| 660 | 660 |
<b>Bring up new ideas!</b> |
| 661 | 661 |
<br /> |
| 662 | 662 |
Don't like any of these? Look at the <a |
| 663 |
-href="<svnsandbox>doc/design-paper/roadmap-future.pdf">Tor development |
|
| 663 |
+href="<svnsandbox>doc/roadmap/2008-12-19-roadmap-full.pdf">Tor development |
|
| 664 | 664 |
roadmap</a> for more ideas. |
| 665 | 665 |
</li> |
| 666 | 666 |
|
| ... | ... |
@@ -842,7 +842,7 @@ roadmap</a> for more ideas. |
| 842 | 842 |
messen und verbessern und bei guten Resultaten Tor überholen.</li> |
| 843 | 843 |
<li>Unsere Ziele zum Schutz vor Zensur schließen ein, dass ein |
| 844 | 844 |
Angreifer Tor-Verkehr von <a |
| 845 |
- href="https://www.torproject.org/svn/trunk/doc/design-paper/blocking.html#sec:network-fingerprint">normalem |
|
| 845 |
+ href="<svnsandbox>doc/design-paper/blocking.html#sec:network-fingerprint">normalem |
|
| 846 | 846 |
SSL-Verkehr unterscheiden</a> kann. Offensichtlich können wir keine |
| 847 | 847 |
perfekte Steganographie erreichen und dabei benutzbar bleiben. Aber |
| 848 | 848 |
wir möchten gern Angriffen, die nur wenige Pakete betrachten, |
| 849 | 849 |