commit 17968159ffdc39db72da04482b44cf78f8747ac4
Author: emma peel <[email protected]>
Date:   Fri Jun 14 09:03:40 2019 +0200

    better strings for l10n
---
 content/training/best-practices/contents.lr | 39 ++++++++++++++++++-----------
 content/training/contents.lr                |  6 +++--
 2 files changed, 28 insertions(+), 17 deletions(-)

diff --git a/content/training/best-practices/contents.lr 
b/content/training/best-practices/contents.lr
index 09e08aa..1f9fced 100644
--- a/content/training/best-practices/contents.lr
+++ b/content/training/best-practices/contents.lr
@@ -20,13 +20,16 @@ html: two-columns-page.html
 ---
 body:
 
-Running security trainings is a fun and rewarding way to help your community 
conduct human rights work safely. Good preparation is essential to an effective 
and safe training, so we've curated some resources to help you make the most of 
your training event. 
+Running security trainings is a fun and rewarding way to help your community 
conduct human rights work safely.
+Good preparation is essential to an effective and safe training, so we've 
curated some resources to help you make the most of your training event.
 
 ## Before the training
 
 _Am I the right person to give this training?_
 
-Security trainings can help people communicate and use the internet safely, 
but there are additional considerations to be made before training some at-risk 
groups. That's why we recommend this resource from EFF's Security Education 
Companion, ["Am I the right person to give this 
training?"](https://sec.eff.org/articles/right-person-to-train). This resource 
can help you be sure that you're doing the best by the community of people you 
wish to train. 
+Security trainings can help people communicate and use the internet safely, 
but there are additional considerations to be made before training some at-risk 
groups.
+That's why we recommend this resource from EFF's Security Education Companion, 
["Am I the right person to give this 
training?"](https://sec.eff.org/articles/right-person-to-train).
+This resource can help you be sure that you're doing the best by the community 
of people you wish to train.
 
 Other questions to ask yourself before deciding to do a training:
 
@@ -35,26 +38,32 @@ Other questions to ask yourself before deciding to do a 
training:
 
 Once you've answered those questions, you're ready to plan your training!
 
-1. Find a location that is accessible, affordable, has an internet connection 
and other materials like a white board, projector, and screen. Make sure that 
the location is safe for your attendees to visit. 
-2. Promote your event in your community's spaces, taking safety into 
consideration. Under many circumstances, social media is great for promotion, 
but for higher risk groups, you may want to use a smaller word-of-mouth network 
or require community members to share information individually to other trusted 
people. 
+1. Find a location that is accessible, affordable, has an internet connection 
and other materials like a white board, projector, and screen.
+   Make sure that the location is safe for your attendees to visit.
+2. Promote your event in your community's spaces, taking safety into 
consideration.
+   Under many circumstances, social media is great for promotion, but for 
higher risk groups, you may want to use a smaller word-of-mouth network or 
require community members to share information individually to other trusted 
people.
 3. Create localized handouts for some of the more difficult concepts that 
you'll be teaching.
 4. Make sure you have plenty of stickers to hand out to participants!
-5. Create a link list of all the resources you'll be talking about. This 
includes downloads and PDFs of handouts. You'll share this link list on a 
whiteboard or project it at the training. 
-6. Determine how you'll do hands-on assistance at your training. Will you be 
able to handle this alone? Or will you require partners? If you need more help, 
make sure the partners you're bringing in are aware of the safety needs of the 
community, and communicate with your contacts in the community to make sure 
they're okay with you bringing in additional trainers. 
-7. Make sure your presentation is up-to-date (both information and 
screenshots) and save your presentation in two file formats -- for example, odp 
and pdf -- and on at least one additional device -- for example, on your 
computer and on a USB stick. 
-8. Decide how you will facilitate a safer space. We recommend using the Tor 
Code of Conduct. You can also start the training by asking participants to come 
up with their own community agreements for the space. 
+5. Create a link list of all the resources you'll be talking about.
+   This includes downloads and PDFs of handouts.
+   You'll share this link list on a whiteboard or project it at the training.
+6. Determine how you'll do hands-on assistance at your training.
+   Will you be able to handle this alone? Or will you require partners? If you 
need more help, make sure the partners you're bringing in are aware of the 
safety needs of the community, and communicate with your contacts in the 
community to make sure they're okay with you bringing in additional trainers.
+7. Make sure your presentation is up-to-date (both information and 
screenshots) and save your presentation in two file formats -- for example, odp 
and pdf -- and on at least one additional device -- for example, on your 
computer and on a USB stick.
+8. Decide how you will facilitate a safer space. We recommend using the Tor 
Code of Conduct.
+   You can also start the training by asking participants to come up with 
their own community agreements for the space.
 
 ## At the training
 
-1. Create an agenda and share it on a projection or on a whiteboard so that 
your participants can be prepared for the day. 
+1. Create an agenda and share it on a projection or on a whiteboard so that 
your participants can be prepared for the day.
 2. Communicate about how much time the training will take, and when breaks 
will happen. Make sure you take breaks!
-3. Communicate about when you'll take questions, either during the training, 
at the end, or both. 
+3. Communicate about when you'll take questions, either during the training, 
at the end, or both.
 4. Communicate about how you'll offer hands-on help (if at all).
-5. Communicate about how participants can contact you securely after the 
training. 
-6. Show the participants the resources at community.torproject.org and 
support.torproject.org. 
-7. Show the participants other resources like sec.eff.org. 
+5. Communicate about how participants can contact you securely after the 
training.
+6. Show the participants the resources at community.torproject.org and 
support.torproject.org.
+7. Show the participants other resources like sec.eff.org.
 
 ## After the training
 
-1. Think about how you will evaluate your success at the training. You may 
want to create a follow up survey, or at least contact participants and ask 
them to share their feedback with you. 
-
+1. Think about how you will evaluate your success at the training.
+   You may want to create a follow up survey, or at least contact participants 
and ask them to share their feedback with you.
diff --git a/content/training/contents.lr b/content/training/contents.lr
index da8dfc2..3553914 100644
--- a/content/training/contents.lr
+++ b/content/training/contents.lr
@@ -18,6 +18,8 @@ html: training.html
 ---
 body:
 
-##We want to teach the world about Tor. Will you help?
+## We want to teach the world about Tor. Will you help?
 
-Are you a Tor trainer or interested in becoming one? Looking for resources to 
help your community learn the most about Tor? We've got you covered. For some 
users with serious threat models, using Tor and other privacy tools can be 
risky if not done with care. If this describes your community, or if you're not 
sure, please [contact our community 
team](https://trac.torproject.org/projects/tor/wiki/org/teams/CommunityTeam#Communication)
 for more help.
+Are you a Tor trainer or interested in becoming one? Looking for resources to 
help your community learn the most about Tor? We've got you covered.
+For some users with serious threat models, using Tor and other privacy tools 
can be risky if not done with care.
+If this describes your community, or if you're not sure, please [contact our 
community 
team](https://trac.torproject.org/projects/tor/wiki/org/teams/CommunityTeam#Communication)
 for more help.

_______________________________________________
tor-commits mailing list
[email protected]
https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-commits

Reply via email to