commit d90030ac552eea86a0e742ae5ae7fd9ef8dbb89e
Author: Translation commit bot <[email protected]>
Date: Wed Apr 3 05:50:37 2019 +0000
Update translations for tor_outreach_md
---
tor-outreach2019-2020-ar.md | 48 ++++++++++++++++++++++-----------------------
1 file changed, 24 insertions(+), 24 deletions(-)
diff --git a/tor-outreach2019-2020-ar.md b/tor-outreach2019-2020-ar.md
index 1f392900a..d0bc3fd38 100644
--- a/tor-outreach2019-2020-ar.md
+++ b/tor-outreach2019-2020-ar.md
@@ -1,18 +1,18 @@
# Tor Outreach Material 2019-2020
-# 1. TOR FOR PRIVACY
+# 1. TOR ÙÙØ®ØµÙØµÙØ©
-### Privacy is a human right
+### Ø§ÙØ®ØµÙØµÙØ© ÙÙ ØÙ Ù
Ù ØÙÙÙ Ø§ÙØ¥ÙساÙ
-Like many of us, Aleisha spends most of her time online--connecting with
friends, posting on social media, and browsing the web.
+Ù
Ø«Ù Ø§ÙØ¹Ø¯Ùد Ù
ÙØ§ Ø ØªÙØ¶Ù Aleisha Ù
عظÙ
ÙÙØªÙا عبر
Ø§ÙØ¥ÙØªØ±ÙØª - Ø§ÙØªÙاص٠Ù
ع Ø§ÙØ£ØµØ¯Ùاء Ø ÙØ§ÙÙØ´Ø± عÙÙ
ÙØ³Ø§Ø¦Ù Ø§ÙØªÙØ§ØµÙ Ø§ÙØ§Ø¬ØªÙ
Ø§Ø¹Ù Ø ÙØªØµÙØ Ø§ÙØ¥ÙØªØ±ÙØª.
-But lately, she's noticed that advertisements related to her previous searches
are following her around online.
+ÙÙÙ ÙÙ Ø§ÙØ¢ÙÙØ© Ø§ÙØ£Ø®Ùرة Ø ÙØ§ØØ¸Øª Ø£Ù Ø§ÙØ¥Ø¹ÙØ§ÙØ§Øª
اÙÙ
تعÙÙØ© بعÙ
ÙÙØ§Øª Ø§ÙØ¨ØØ« Ø§ÙØ³Ø§Ø¨ÙØ© ØªØªØ§Ø¨Ø¹ÙØ§ عÙÙ
Ø§ÙØ¥ÙØªØ±ÙØª.
-This feels so invasive that she does some research on online ads and learns
that it's not just advertisers tracking her but also her ISP, analytics
companies, social media platforms, and more.
+شعرت Ø¨Ø§Ù Ø§ÙØ§Ù
ر ÙØ§ØªÙ ÙÙØ®ØµÙØµÙØ© ÙØ°Ù٠أجرت بعض
Ø§ÙØ£Ø¨ØØ§Ø« Ø¹Ù Ø§ÙØ¥Ø¹ÙØ§ÙØ§Øª عبر Ø§ÙØ¥ÙØªØ±ÙØª Ù Ø§ÙØªØ´Ùت
Ø£Ù ÙÙØ³Øª Ù
جرد اÙÙ
عÙÙÙÙ ÙØªØ¹ÙبÙÙÙØ§ ÙÙÙÙ Ø£ÙØ¶Ùا
Ù
ÙÙØ± خدÙ
Ø© Ø§ÙØ¥ÙØªØ±ÙØª ÙÙØ§ ÙØ´Ø±Ùات Ø§ÙØªØÙÙÙØ§Øª ÙÙ
ÙØµØ§Øª اÙÙØ³Ø§Ø¦Ø· Ø§ÙØ§Ø¬ØªÙ
Ø§Ø¹ÙØ© ÙØºÙر ذÙ٠اÙÙØ«Ùر.
-Aleisha decides she wants to find and use software that doesn't collect her
data, doesn't track her, and doesn't tell other services anything private about
her.
+ÙØ±Ø±Øª Aleisha Ø£ÙÙØ§ ØªØ±ÙØ¯ Ø§ÙØ¹Ø«Ùر عÙÙ Ø¨Ø±ÙØ§Ù
ج ÙØ§ ÙØ¬Ù
ع Ø¨ÙØ§ÙØ§ØªÙØ§ ÙØ§Ø³ØªØ®Ø¯Ø§Ù
ÙØ§ ÙÙ ØªØ¹ÙØ¨Ùا ÙØ§Ø¹ÙاÙ
Ø§ÙØ®Ø¯Ù
ات Ø§ÙØ£Ø®Ø±Ù Ø¨Ø£Ù Ø´ÙØ¡ خاص عÙÙØ§.
-She goes to a privacy training at a local hackerspace and learns about **Tor
Browser**, the only web browser that allows her to browse anonymously.
+ÙØ§Ù
ت باÙÙ
Ø´Ø§Ø±ÙØ© Ø¨Ø¯ÙØ±Ø© ØªØ¯Ø±ÙØ¨ÙØ© عÙÙ Ø§ÙØ®ØµÙØµÙØ©
ÙÙ hackerspace Ù
ØÙÙ ÙØªØ¹Ø±Ùت عÙÙ ** Tor Browser ** Ø Ù
ØªØµÙØ
اÙÙÙØ¨ اÙÙØÙØ¯ Ø§ÙØ°Ù ÙØ³Ù
Ø ÙÙØ§ Ø¨Ø§ÙØªØµÙØ Ø¯ÙÙ
اÙÙØ´Ù ع٠ÙÙÙØªÙ.
---
@@ -36,15 +36,15 @@ She also uses a Tor-powered app called **OnionShare** to
send files to other act
---
-# 3. TOR FOR HUMAN RIGHTS
+# 3. TOR ÙØÙÙÙ Ø§ÙØ¥ÙساÙ
-### Water is life
+### اÙÙ
اء ÙÙ Ø§ÙØÙØ§Ø©
-Jelani lives in a small village which a wide river runs through.
+ØªØ¹ÙØ´ Jelani ÙÙ ÙØ±ÙØ© ØµØºÙØ±Ø© ÙÙ
ر Ø¨ÙØ§ ÙÙØ± Ø¹Ø±ÙØ¶.
-This river has provided water to his community since the days of his
ancestors.
+ÙÙØ¯ ÙÙØ± ÙØ°Ø§ اÙÙÙØ± اÙÙ
ÙØ§Ù ÙÙ
جتÙ
ع٠Ù
ÙØ° Ø£ÙØ§Ù
Ø£Ø³ÙØ§ÙÙ.
-But today, Jelaniâs river is threatened by powerful multinational companies
drilling for oil in the region.
+ÙÙÙ ÙÙØ± Jelani اÙÙÙÙ
Ù
ÙØ¯Ø¯ Ù
Ù ÙØ¨Ù Ø§ÙØ´Ø±Ùات اÙÙ
تعددة Ø§ÙØ¬ÙØ³ÙØ§Øª اÙÙÙÙØ© Ø§ÙØªÙ تÙÙØ¨ ع٠اÙÙÙØ· ÙÙ
اÙÙ
ÙØ·ÙØ©.
Private security firms, paid for by these companies, use powerful surveillance
mechanisms to monitor the online activities of Jelani and his neighbors in the
village who are organizing to protect their sacred river.
@@ -82,11 +82,11 @@ Jean kept reading to find other options and learned about
Tor Browser and how it
He found an official website mirror to download the program.
-When he opened **Tor Browser**, he followed the prompts for censored users and
connected to a bridge which allowed him to access the internet again.
+Ø¹ÙØ¯Ù
ا ÙØªØ ** Tor Browser ** Ø Ø§ØªØ¨Ø¹ Ø§ÙØªØ¹ÙÙÙ
ات
Ø§ÙØ®Ø§ØµØ© باÙÙ
ستخدÙ
ÙÙ Ø§ÙØ®Ø§Ø¶Ø¹ÙÙ ÙÙØ±Ùابة ÙÙ
تصÙÙØ§ بجسر ÙØ³Ù
Ø Ù٠باÙÙØµÙ٠إÙÙ Ø§ÙØ¥ÙØªØ±ÙØª Ù
رة
أخرÙ.
-With Tor Browser, Jean can browse freely and privately and contact his family.
+Ù
ع Tor Browser Ø ÙØ³ØªØ·Ùع Jean Ø§ÙØªØµÙØ Ø¨ØØ±ÙØ© ÙØ³Ø±ÙØ©
ÙØ§Ùاتصا٠بأسرتÙ.
-### Censored users all over the world rely on Tor Browser for a free, stable,
and uncensored way to access the internet.
+### ÙØ¹ØªÙ
د اÙÙ
ستخدÙ
ÙÙ Ø§ÙØ®Ø§Ø¶Ø¹ÙÙ ÙÙØ±Ùابة Ù٠جÙ
ÙØ¹ Ø£ÙØØ§Ø¡ Ø§ÙØ¹Ø§ÙÙ
عÙÙ Ù
ØªØµÙØ Tor ÙÙØØµÙ٠عÙÙ
ÙØ³ÙÙØ© Ù
جاÙÙØ© ÙÙ
Ø³ØªÙØ±Ø© ÙØºÙر خاضعة ÙÙØ±Ùابة
ÙÙÙØµÙ٠إÙÙ Ø§ÙØ¥ÙØªØ±ÙØª.
---
@@ -100,16 +100,16 @@ Tor is created for free by a 501(c)3 U.S.-based nonprofit
called the Tor Project
The easiest way to use Tor is Tor Browser.
When you use Tor Browser, no one can see what websites you visit or where in
the world youâre coming from.
-Other applications, like SecureDrop and OnionShare, use Tor to protect their
users against surveillance and censorship.
+Ø§ÙØªØ·Ø¨ÙÙØ§Øª Ø§ÙØ£Ø®Ø±ÙØ Ù
ث٠SecureDrop ÙOnionShareØ ØªØ³ØªØ®Ø¯Ù
ØªÙØ± ÙØÙ
Ø§ÙØ© Ù
ستخدÙ
ÙÙØ§ ضد اÙÙ
Ø±Ø§ÙØ¨Ø© ÙØ§ÙØ±ÙØ§Ø¨Ø©.
-## 6. How does Tor work?
+## 6. ÙÙÙ ÙØ¹Ù
Ù ØªÙØ±Ø
-Amal wants to visit Bekeleâs website privately, so she opens Tor Browser.
+ترغب Amal ÙÙ Ø²ÙØ§Ø±Ø© Ù
ÙÙØ¹ Bekele Ø§ÙØ®Ø§Øµ Ø ÙØ°Ø§ ÙØªØØª Ù
ØªØµÙØ Tor.
Tor Browser selects a random circuit of three relays, which are computers all
over the world configured to route traffic over the Tor network.
-Tor Browser then encrypts her website request three times and sends it to the
first Tor relay in her circuit.
+تÙÙÙ
Tor Browser بعد ذÙ٠بتشÙÙØ± Ø·ÙØ¨ Ù
ÙÙØ¹ اÙÙÙØ¨
Ø§ÙØ®Ø§Øµ Ø¨ÙØ§ Ø«ÙØ§Ø« Ù
رات ÙØ¥Ø±Ø³Ø§Ù٠إÙÙ Ù
رØÙ Tor
Ø§ÙØ£ÙÙ ÙÙ Ø¯Ø§Ø¦Ø±ØªÙØ§.
The first relay removes the first encryption layer but doesn't learn that the
destination is Bekeleâs website.
@@ -119,15 +119,15 @@ The second relay removes another encryption layer and
forwards the web page requ
The third relay removes the last encryption layer and forwards the web page
request to its destination, Bekeleâs website, but it doesn't know the request
comes from Amal.
-Bekele doesn't know that the website request came from Amal unless she tells
him so.
+ÙØ§ تعر٠بÙÙÙÙÙ Ø£Ù Ø·ÙØ¨ اÙÙ
ÙÙØ¹ جاء Ù
٠أÙ
Ù Ù
ا
ÙÙ
تخبر٠بذÙÙ.
-## 7. Who uses Tor?
+## 7. Ù
Ù ÙØ³ØªØ®Ø¯Ù
TorØ
-People all over the world use Tor to protect their privacy and access the web
freely.
+ÙØ³ØªØ®Ø¯Ù
اÙÙØ§Ø³ Ù٠جÙ
ÙØ¹ Ø£ÙØØ§Ø¡ Ø§ÙØ¹Ø§ÙÙ
Tor ÙØÙ
Ø§ÙØ©
Ø®ØµÙØµÙتÙÙ
ÙØ§ÙÙØµÙ٠إÙ٠اÙÙÙØ¨ Ø¨ØØ±ÙØ©.
Tor helps protect journalists, human rights defenders, domestic violence
victims, academic researchers, and anyone experiencing tracking, censorship, or
surveillance.
-## 6. Why trust Tor?
+## 6. ÙÙ
اذا ØªØ«Ù ØªÙØ±Ø
Tor is designed for privacy. We donât know who our users are, and we don't
keep logs of user activity.
@@ -135,7 +135,7 @@ Tor relay operators cannot reveal the true identity of Tor
users.
Continual peer review of Tor's source code by academic and open source
communities ensures that there are no backdoors in Tor, and our social contract
promises that we will never backdoor Tor.
-## 7. Join the Tor community
+## 7. Ø§ÙØ¶Ù
Ø¥ÙÙ Ù
جتÙ
ع Tor
Tor is made possible by a diverse set of users, developers, relay operators,
and advocates from around the world.
_______________________________________________
tor-commits mailing list
[email protected]
https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-commits