1 # SOME DESCRIPTIVE TITLE
2 # Copyright (C) YEAR Free Software Foundation, Inc.
3 # This file is distributed under the same license as the PACKAGE package.
4 # FIRST AUTHOR <EMAIL@ADDRESS>, YEAR.
9 "Project-Id-Version: PACKAGE VERSION\n"
10 "POT-Creation-Date: 2014-04-30 07:36+0300\n"
11 "PO-Revision-Date: YEAR-MO-DA HO:MI+ZONE\n"
12 "Last-Translator: FULL NAME <EMAIL@ADDRESS>\n"
13 "Language-Team: LANGUAGE <LL@li.org>\n"
16 "Content-Type: text/plain; charset=UTF-8\n"
17 "Content-Transfer-Encoding: 8bit\n"
21 msgid "[[!meta title=\"Why does Tails use Tor?\"]]\n"
25 msgid "Tails uses Tor because it is the best available anonymity network."
30 msgid "Anonymity enforcement\n"
35 "We want to enforce good security by default for our users. That is why it is "
36 "a fundamental assumption of Tails to force all outgoing traffic to anonymity "
37 "networks such as Tor."
42 "Over the years Tor has become a big network with a lot of capacity and a "
48 "Virtual Private Networks (VPNs) could be faster than Tor but they are not "
49 "anonymity networks, because the administrators of the VPN can know both "
50 "where you are connecting from and where you are connecting to and break your "
51 "anonymity. Tor provides anonymity by making it impossible for a single point "
52 "in the network to know both the origin and the destination of a connection."
57 "When using a VPN, an attacker can also break your anonymity by monitoring "
58 "the incoming and outgoing connections of the few servers of the VPN. On the "
59 "other hand, the Tor network is formed by over 5000 relays run worldwide by "
70 "Tor is the anonymity network with the largest user base. More than "
71 "700 000 users connected to Tor daily in 2013. Being adopted by such a "
72 "large audience proves its maturity, stability, and usability."
77 "Tor is being used equally by journalists, law enforcement, governments, "
78 "human rights activists, business leaders, militaries, abuse victims and "
79 "average citizens concerned about online privacy. This diversity actually "
80 "provides stronger anonymity to everyone as it makes it more difficult to "
81 "identify or target a specific profile of Tor user. Anonymity loves company."
86 msgid "Technical merits and recognition\n"
91 "Tor has partnered with leading research institutions, and has been subjected "
92 "to intensive academic research. It is the anonymity network which benefits "
93 "from the most auditing and peer review."
98 "Tor has been received awards by institutions such as the [Electronic "
99 "Frontier Foundation](https://www.eff.org/awards/pioneer/2012), and the [Free "
101 "Foundation](https://www.fsf.org/news/2010-free-software-awards-announced) to "
107 "An extract of a Top Secret appraisal by the NSA characterized Tor as \"[the "
108 "King of high secure, low latency Internet "
109 "anonymity](http://www.theguardian.com/world/interactive/2013/oct/04/tor-high-secure-internet-anonymity)\" "
110 "with \"no contenders for the throne in waiting\"."
115 msgid "<a id=\"relationship\"></a>\n"
120 msgid "Relationship between Tor and Tails\n"
123 #. type: Bullet: ' - '
124 msgid "The Tor software is made by [The Tor Project](https://torproject.org/)."
127 #. type: Bullet: ' - '
128 msgid "The Tor network is run by a worldwide community of volunteers."
131 #. type: Bullet: ' - '
132 msgid "Tails is a separate project made by a different group of people."
138 "Tails is a complete operating system which uses Tor as its default "
140 "application. The Tor Project recommends the usage of Tails for the use "
142 "that are not covered by its own projects (for example the <span\n"
143 "class=\"application\">Tor Browser</span>).\n"
148 "But many people use Tor outside of Tails, and many people use Tails to do "
149 "other things than accessing the Internet through Tor, for example to work "
150 "offline on sensitive documents."
160 "Tails also allows you to connect to [[I2P|doc/anonymous_internet/i2p/]], "
161 "which is another anonymity network different from Tor."