1 # SOME DESCRIPTIVE TITLE
2 # Copyright (C) YEAR Free Software Foundation, Inc.
3 # This file is distributed under the same license as the PACKAGE package.
4 # FIRST AUTHOR <EMAIL@ADDRESS>, YEAR.
7 "Project-Id-Version: Tails\n"
8 "POT-Creation-Date: 2018-09-18 06:11+0200\n"
9 "PO-Revision-Date: 2017-05-17 00:00+0000\n"
10 "Last-Translator: JoaquĆn Serna <bubuanabelas@cryptolab.net>\n"
11 "Language-Team: Spanish <http://translate.tails.boum.org/projects/tails/spoof-"
15 "Content-Type: text/plain; charset=UTF-8\n"
16 "Content-Transfer-Encoding: 8bit\n"
17 "Plural-Forms: nplurals=2; plural=n != 1;\n"
18 "X-Generator: Weblate 2.10.1\n"
22 msgid "[[!meta title=\"Call for testing: MAC address spoofing\"]]\n"
27 msgid "[[!meta date=\"Sun, 29 Dec 2013 12:00:00 +0000\"]]\n"
32 msgid "[[!pagetemplate template=\"news.tmpl\"]]\n"
33 msgstr "[[!pagetemplate template=\"news.tmpl\"]]\n"
37 "You can help Tails! The [[MAC address spoofing|contribute/design/"
38 "MAC_address]] feature is ready for testing. This feature prevents "
39 "geographical tracking of your network devices (and by extension, you) by "
40 "randomising their [[!wikipedia MAC addresses]]."
45 "If you have security auditing skills you are more than welcome to review our "
46 "[[design|contribute/design/MAC_address]] and [[implementation|contribute/"
47 "design/MAC_address#implementation]]."
52 msgid "[[!toc levels=2]]\n"
53 msgstr "[[!toc levels=2]]\n"
62 "Every network device (wired, Wi-Fi/wireless, 3G/mobile) has a [[!wikipedia "
63 "MAC address]], which is a unique identifier used to address them on the "
64 "local network. Broadcasting a unique identifier in this manner introduce a "
65 "couple of potential privacy issues for Tails users. Geographical location "
66 "tracking is the main one: observing a MAC address at a particular location "
67 "and time ties the corresponding device to the same location and time. If the "
68 "real identity of the device's owner is known, their movements can be "
69 "determined. To prevent this one can temporarily change the MAC address to "
70 "something random at each boot, which is referred to as \"MAC address spoofing"
76 msgid "How to download the test image"
81 "Download the latest test ISO from [build_Tails_ISO_devel](http://nightly."
82 "tails.boum.org/build_Tails_ISO_devel/). **Keep in mind that this is a test "
83 "image.** Do not use it for anything else than testing this feature."
88 "To verify the download, use the `.shasum` file. It is signed with OpenPGP "
89 "key [0xD83A438B2F916605](http://keys.indymedia.org/pks/lookup?"
90 "op=get&fingerprint=on&search=0xD83A438B2F916605)."
95 msgid "How to use MAC spoofing in Tails"
100 "MAC spoofing is enabled by default in this test ISO. You can change this "
101 "with a [[startup option|doc/first_steps/welcome_screen]]. The "
102 "(preliminary) MAC spoofing documentation tries to explain situations where "
103 "it actually may be a bad idea to keep this option enabled. However, as this "
104 "is just a test version we of course urge you to not use it for anything "
105 "serious, and if possible, to test both to enable and disable the option."
115 "For any MAC spoofing-related issues you experience using this test ISO, "
116 "please include the output from the following commands when reporting it to "
117 "us (note: it requires setting an [[doc/first_steps/welcome_screen/"
118 "administration_password]]):"
124 " sudo grep spoof-mac /var/log/syslog\n"
125 " sudo grep unblock-network /var/log/syslog\n"
130 "In particular, we would like you to pay extra attention to the following "
136 msgid "Verify that the MAC spoofing setting is enforced"
141 "Please verify that the MAC spoofing setting you select actually is enforced "
142 "by issuing the following commands:"
148 " . /usr/local/lib/tails-shell-library/hardware.sh\n"
149 " for i in $(get_all_ethernet_nics); do\n"
150 " echo \"Interface $i\"\n"
157 "For each network device you'll get an entry looking something like this:"
164 " Permanent MAC: 12:34:56:78:90:ab (unknown)\n"
165 " Current MAC: 12:34:56:f4:fb:22 (unknown)\n"
170 "The \"Permanent MAC\" is the network device's \"real\", unique MAC address; "
171 "the \"Current MAC\" is whatever it is set to at the moment, spoofed or not. "
175 #. type: Bullet: '* '
176 msgid "if they are *different*, then MAC spoofing is *enabled*;"
179 #. type: Bullet: '* '
180 msgid "if they are *the* *same*, then MAC spoofing is *disabled*."
184 msgid "Please report if you ever get unexpected results."
189 msgid "MAC address whitelisting problems"
194 "Some wireless networks are configured to only allow connections for devices "
195 "with certain MAC addresses, called MAC address whitelisting. MAC address "
196 "spoofing will cause issues on networks like these. Therefore Tails has a "
197 "crude mechanism for detecting this, and will show an informative "
198 "notification about what to do about it."
203 "If you have access to a wireless network that employs MAC address "
204 "whitelisting, then connect to it with MAC spoofing enabled and verify that "
205 "Tails shows a notification with the headline: \"Network connection blocked?"
211 "Note: Tails detection mechanism for MAC address whitelisting only works for "
212 "wireless (Wi-Fi) networks."
217 msgid "Network problems"
222 "Please report all network device and connection issues, e.g. if any of your "
223 "network devices do not get detected by Tails at all, if the network "
224 "connection fails, or if the network connection succeeds but actually does "
225 "not work. Also check whether you experience the same issues using Tails 0.22."
231 msgstr "Problemas conocidos"
235 msgid "No fail-safe for hotplugged devices after logging in"
240 "In order to prevent the real MAC address from leaking when MAC spoofing "
241 "fails for some network device, Tails has a fail-safe that simply disables "
242 "the device. At the moment this only works for network devices present before "
243 "logging in with Tails Greeter; the fail-safe does *not* work for e.g. Wi-Fi "
244 "USB dongles hotplugged *after* that."