1 # SOME DESCRIPTIVE TITLE
2 # Copyright (C) YEAR Free Software Foundation, Inc.
3 # This file is distributed under the same license as the PACKAGE package.
4 # FIRST AUTHOR <EMAIL@ADDRESS>, YEAR.
8 "Project-Id-Version: PACKAGE VERSION\n"
9 "Report-Msgid-Bugs-To: tails-l10n@boum.org\n"
10 "POT-Creation-Date: 2018-10-01 16:15+0000\n"
11 "PO-Revision-Date: 2018-10-26 10:59+0000\n"
12 "Last-Translator: Weblate Admin <admin@example.com>\n"
13 "Language-Team: LANGUAGE <LL@li.org>\n"
16 "Content-Type: text/plain; charset=UTF-8\n"
17 "Content-Transfer-Encoding: 8bit\n"
18 "Plural-Forms: nplurals=3; plural=n==1 ? 0 : n%10>=2 && n%10<=4 && (n%100<10 "
19 "|| n%100>=20) ? 1 : 2;\n"
20 "X-Generator: Weblate 2.19.1\n"
24 msgid "[[!meta title=\"Call for testing: MAC address spoofing\"]]\n"
29 msgid "[[!meta date=\"Sun, 29 Dec 2013 12:00:00 +0000\"]]\n"
34 msgid "[[!pagetemplate template=\"news.tmpl\"]]\n"
35 msgstr "[[!pagetemplate template=\"news.tmpl\"]]\n"
39 "You can help Tails! The [[MAC address spoofing|contribute/design/"
40 "MAC_address]] feature is ready for testing. This feature prevents "
41 "geographical tracking of your network devices (and by extension, you) by "
42 "randomising their [[!wikipedia MAC addresses]]."
47 "If you have security auditing skills you are more than welcome to review our "
48 "[[design|contribute/design/MAC_address]] and [[implementation|contribute/"
49 "design/MAC_address#implementation]]."
54 msgid "[[!toc levels=2]]\n"
55 msgstr "[[!toc levels=2]]\n"
64 "Every network device (wired, Wi-Fi/wireless, 3G/mobile) has a [[!wikipedia "
65 "MAC address]], which is a unique identifier used to address them on the "
66 "local network. Broadcasting a unique identifier in this manner introduce a "
67 "couple of potential privacy issues for Tails users. Geographical location "
68 "tracking is the main one: observing a MAC address at a particular location "
69 "and time ties the corresponding device to the same location and time. If the "
70 "real identity of the device's owner is known, their movements can be "
71 "determined. To prevent this one can temporarily change the MAC address to "
72 "something random at each boot, which is referred to as \"MAC address spoofing"
78 msgid "How to download the test image"
83 "Download the latest test ISO from [build_Tails_ISO_devel](http://nightly."
84 "tails.boum.org/build_Tails_ISO_devel/). **Keep in mind that this is a test "
85 "image.** Do not use it for anything else than testing this feature."
90 "To verify the download, use the `.shasum` file. It is signed with OpenPGP "
91 "key [0xD83A438B2F916605](http://keys.indymedia.org/pks/lookup?"
92 "op=get&fingerprint=on&search=0xD83A438B2F916605)."
97 msgid "How to use MAC spoofing in Tails"
102 "MAC spoofing is enabled by default in this test ISO. You can change this "
103 "with a [[startup option|doc/first_steps/welcome_screen]]. The "
104 "(preliminary) MAC spoofing documentation tries to explain situations where "
105 "it actually may be a bad idea to keep this option enabled. However, as this "
106 "is just a test version we of course urge you to not use it for anything "
107 "serious, and if possible, to test both to enable and disable the option."
117 "For any MAC spoofing-related issues you experience using this test ISO, "
118 "please include the output from the following commands when reporting it to "
119 "us (note: it requires setting an [[doc/first_steps/welcome_screen/"
120 "administration_password]]):"
126 " sudo grep spoof-mac /var/log/syslog\n"
127 " sudo grep unblock-network /var/log/syslog\n"
132 "In particular, we would like you to pay extra attention to the following "
138 msgid "Verify that the MAC spoofing setting is enforced"
143 "Please verify that the MAC spoofing setting you select actually is enforced "
144 "by issuing the following commands:"
150 " . /usr/local/lib/tails-shell-library/hardware.sh\n"
151 " for i in $(get_all_ethernet_nics); do\n"
152 " echo \"Interface $i\"\n"
159 "For each network device you'll get an entry looking something like this:"
166 " Permanent MAC: 12:34:56:78:90:ab (unknown)\n"
167 " Current MAC: 12:34:56:f4:fb:22 (unknown)\n"
172 "The \"Permanent MAC\" is the network device's \"real\", unique MAC address; "
173 "the \"Current MAC\" is whatever it is set to at the moment, spoofed or not. "
177 #. type: Bullet: '* '
178 msgid "if they are *different*, then MAC spoofing is *enabled*;"
181 #. type: Bullet: '* '
182 msgid "if they are *the* *same*, then MAC spoofing is *disabled*."
186 msgid "Please report if you ever get unexpected results."
191 msgid "MAC address whitelisting problems"
196 "Some wireless networks are configured to only allow connections for devices "
197 "with certain MAC addresses, called MAC address whitelisting. MAC address "
198 "spoofing will cause issues on networks like these. Therefore Tails has a "
199 "crude mechanism for detecting this, and will show an informative "
200 "notification about what to do about it."
205 "If you have access to a wireless network that employs MAC address "
206 "whitelisting, then connect to it with MAC spoofing enabled and verify that "
207 "Tails shows a notification with the headline: \"Network connection blocked?"
213 "Note: Tails detection mechanism for MAC address whitelisting only works for "
214 "wireless (Wi-Fi) networks."
219 msgid "Network problems"
224 "Please report all network device and connection issues, e.g. if any of your "
225 "network devices do not get detected by Tails at all, if the network "
226 "connection fails, or if the network connection succeeds but actually does "
227 "not work. Also check whether you experience the same issues using Tails 0.22."
237 msgid "No fail-safe for hotplugged devices after logging in"
242 "In order to prevent the real MAC address from leaking when MAC spoofing "
243 "fails for some network device, Tails has a fail-safe that simply disables "
244 "the device. At the moment this only works for network devices present before "
245 "logging in with Tails Greeter; the fail-safe does *not* work for e.g. Wi-Fi "
246 "USB dongles hotplugged *after* that."