From: ned Date: Mon, 23 Dec 2024 13:18:50 +0000 (+0100) Subject: traduction actualite webtunnel X-Git-Url: https://nos-oignons.net/gitweb/website.git/commitdiff_plain/3708d09381416ab6e6eba6b5b1861c652166624a traduction actualite webtunnel --- diff --git "a/Actualit\303\251s/20241219_objectif_200_webtunnels.en.po" "b/Actualit\303\251s/20241219_objectif_200_webtunnels.en.po" index aea75e5..1c7fe82 100644 --- "a/Actualit\303\251s/20241219_objectif_200_webtunnels.en.po" +++ "b/Actualit\303\251s/20241219_objectif_200_webtunnels.en.po" @@ -20,6 +20,7 @@ msgstr "" #, markdown-text, no-wrap msgid "[[!meta title=\"Objectif 200 Web Tunnels !\"]]\n" msgstr "" +"[[!meta title=\"200 WebTunnels Challenge!\"]]\n" #. type: Plain text #, markdown-text, no-wrap @@ -45,6 +46,19 @@ msgid "" "yeux d'attaquants qui se demanderaient ce que l'adresse de la connexion " "HTTPS sert." msgstr "" +"On March 12, 2024, to mark the World Day Against Cyber Censorship, the Tor " +"Project [introduced WebTunnel](https://blog.torproject.org/introducing-webtunnel-evading-censorship-by-hiding-in-plain-sight/)," +" a new type of *bridge* designed to help users access the internet from " +"areas under strong censorship. " +"WebTunnel works by mimicking [WebSocket](https://en.wikipedia.org/wiki/WebSocket)" +" traffic over an HTTPS connection. From the perspective of an attacker " +"monitoring network traffic, someone using this type of bridge appears " +"to be simply browsing a website over HTTPS." +"Connections made through WebTunnel are so similar to standard HTTPS traffic " +"that they can be placed behind an existing reverse proxy. This not only " +"simplifies deployment but also allows these connections to blend in as " +"regular website traffic, making it harder for attackers to detect or block them." + #. type: Plain text #, markdown-text @@ -62,3 +76,13 @@ msgid "" "et le 10 mars 2025. Si vous ne pouvez pas contribuer de cette manière, vous " "pouvez évidement partager cette campagne un peu partout !" msgstr "" +"On November 28, 2024, following the systematic blocking of Tor by Russia, " +"the Tor Project [issued a call](https://blog.torproject.org/call-for-webtunnel-bridges/)" +" to deploy at least 200 WebTunnel bridges by the end of December 2024. " +"If you already host a website, contributing is straightforward: you just " +"need to follow [the guide](https://community.torproject.org/relay/setup/webtunnel/)." +"To encourage participation, the Tor Project is [offering a " +"t-shirt](https://blog.torproject.org/call-for-webtunnel-bridges/) to anyone " +"who operates at least five WebTunnel bridges online between November 28, 2024," +" and March 10, 2025. If you’re unable to contribute directly, you can still" +" help by spreading the word about this campaign!"